text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Pain management devices help to reduce chronic pain suffering. The primary goal of hospice pain management is to enhance quality of life. Managing the pain can also help improve the physical and mental functions of an individual.
Chronic pain continues and is subdivided into cancer-related pain and non-malignant pain s... | <urn:uuid:e7ef4f06-0ad4-4a62-b5a5-e9d2435edc7f> | CC-MAIN-2022-40 | https://globalriskcommunity.com/profiles/blogs/all-about-pain-management-devices-and-top-trends-of-the-industr-1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00217.warc.gz | en | 0.937516 | 1,591 | 2.859375 | 3 |
What is the National Institute of Standards and Technology (NIST)?
The National Institute of Standards and Technology (NIST), founded in 1901, is part of the U.S. Department of Commerce. NIST is one of the nation's oldest physical science laboratories, and is a non-regulatory agency providing standards, measurement, an... | <urn:uuid:98009a29-f851-43a7-8250-57133359247e> | CC-MAIN-2022-40 | https://www.digicert.com/support/resources/faq/compliance/what-is-the-national-institute-of-standards-and-technology | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00217.warc.gz | en | 0.93079 | 191 | 3.125 | 3 |
NIST Multi-Factor Authentication (MFA) Guide for E-commerce Sites Arrives
The National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) has published a guide to help online retailers implement multi-factor protections to reduce fraudulent purchases.
The effort arrives a... | <urn:uuid:413908e6-5007-42bc-ae25-cffe34c28fb2> | CC-MAIN-2022-40 | https://www.msspalert.com/cybersecurity-services-and-products/mfa-guide-nist/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00217.warc.gz | en | 0.904625 | 532 | 2.5625 | 3 |
Short-distance wireless communication technologies generally support to connect different cordless products in 100 meters, offering more convenient application for people’s daily communications. Today, LINKVIL will introduce you more about short-distance wireless communication.
Zig-Bee is one of the short-distance wire... | <urn:uuid:850d42f8-4e64-4018-b0d3-d47214458dda> | CC-MAIN-2022-40 | https://www.fanvil.com/news/2022/20220923/8184.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333455.97/warc/CC-MAIN-20220924182740-20220924212740-00417.warc.gz | en | 0.860952 | 638 | 2.78125 | 3 |
When using Private DNS, the ISP (Internet Service Provider) and the general public will only see that you are visiting a Private DNS website. They cannot tell what websites or services you’re accessing.
Private DNS is a service that allows you to access blocked websites or content, similar to how VPNs work. Private DNS... | <urn:uuid:b61b5d4a-68bc-4e35-94cf-1fe3d120aa9b> | CC-MAIN-2022-40 | https://gigmocha.com/what-is-private-dns/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00417.warc.gz | en | 0.922657 | 1,275 | 2.734375 | 3 |
Have you been trembling a little more than normal? If you’ve already laid off the caffeine, you might want to consider a social media diet as well. A study by Anxiety UK linked social media usage with increased anxiety. That isn’t to say social media is all bad, the organization stressed (pardon the pun). It has led to... | <urn:uuid:0ebe9a2c-ef72-4837-a43b-eaa7248453c9> | CC-MAIN-2022-40 | https://www.faronics.com/news/blog/researchers-link-social-media-usage-to-anxiety | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00417.warc.gz | en | 0.959644 | 483 | 3 | 3 |
What is Data Leakage?
Data leakage is when sensitive data is unintentionally exposed to the public. Data can be exposed in transit, at rest or in use. Data exposed in transit can include data sent in emails, chat rooms, API calls, and so on.
Data exposed at rest may be the result of a misconfigured cloud storage facili... | <urn:uuid:54f427a4-277a-4566-bc55-3929316b8322> | CC-MAIN-2022-40 | https://www.lepide.com/blog/what-is-data-leakage-and-how-do-you-prevent-it/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00417.warc.gz | en | 0.927275 | 1,403 | 3.140625 | 3 |
Ensuring Data Protection and Privacy in Botswana
Botswana’s Data Protection Act 2018 or the Data Protection Act for short is a data privacy law that was recently passed in Botswana in 2018. Prior to the passing of the Data Protection Act, the country of Botswana had yet to pass any legislation strictly pertaining to da... | <urn:uuid:903fbe53-9d3c-4cfc-a6d5-7e624cd827ee> | CC-MAIN-2022-40 | https://caseguard.com/articles/ensuring-data-protection-and-privacy-in-botswana/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00417.warc.gz | en | 0.931393 | 1,186 | 2.859375 | 3 |
How Are New Technologies Like AI and Machine Learning Playing a Role in Cybersecurity?
Artificial Intelligence is more than a buzzword - it's a key weapon in the fight against breaches.
Artificial intelligence is often dismissed as an overused buzzword across the tech industry, and it certainly can be in cybersecurity ... | <urn:uuid:5b33d88d-ea3a-46cf-b86c-650e8cb9abbc> | CC-MAIN-2022-40 | https://www.idaptive.com/blog/new-technologies-Artificial-Intelligence-Cybersecurity/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00417.warc.gz | en | 0.957423 | 366 | 2.890625 | 3 |
[ Source – Featured Photo from Pexels ]
In this tech-savvy world, keeping sensitive information private has become quite challenging. From in-app permissions of mobile apps to shared organizational files and databases, you never know when you are being watched. You might have come across the terms ‘information security... | <urn:uuid:3aebbfe1-7b39-4b5a-8d37-6bd45ed29df1> | CC-MAIN-2022-40 | https://charbelnemnom.com/cybersecurity-and-information-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00417.warc.gz | en | 0.9473 | 1,349 | 3.09375 | 3 |
In 2002, the United States Congress passed the Sarbanes-Oxley (SOX) Act in response to the infamous Enron and WorldCom accounting frauds in which investors and shareholders collectively lost billions of dollars.
This act aims to bring transparency to all public companies’ financial matters and corporate governance and ... | <urn:uuid:66a7b221-eec3-4a34-b4b2-cb9c6c156782> | CC-MAIN-2022-40 | https://nira.com/sox-compliance/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00417.warc.gz | en | 0.926532 | 2,183 | 2.59375 | 3 |
BSD is the software behind the world’s most popular Web site and the world’s most popular FTP site — but unless you’re a geek, you’ve never heard of it.
An open-source operating system like Linux, BSD was developed in the 1970s at the University of California-Berkeley, well before Linus Torvalds ever took a computer co... | <urn:uuid:0946e084-9f1f-414c-a306-55e150ddb857> | CC-MAIN-2022-40 | https://www.datamation.com/erp/zdnn-bsd-a-better-os-than-linux/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00417.warc.gz | en | 0.952898 | 1,776 | 2.765625 | 3 |
Lunar New Year is celebrated in many Asian cultures and countries. It is a time for families and friends to come together to celebrate the start of a new year and hope for a year of prosperity.
The New Year starts on the first new moon of the lunar year and ends on the first full moon of the lunar year. Lunar New Year ... | <urn:uuid:cd77e557-73cd-4c8b-973e-0512283ee572> | CC-MAIN-2022-40 | https://jobs.gartner.com/life-at-gartner/diversity-equity-and-inclusion/gartner-associates-celebrate-the-lunar-new-year/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00417.warc.gz | en | 0.957459 | 408 | 2.65625 | 3 |
Did you know that not all bias in machine learning (ML) is bad? In fact, the concept of bias was first introduced into ML by Tom Mitchell in his 1980 paper, "The need for biases in learning generalizations.” He defines learning as the ability to generalize from past experience in order to deal with new situations that ... | <urn:uuid:7bf09b20-e9ac-47e9-9e3c-51af789aaece> | CC-MAIN-2022-40 | https://content.alegion.com/podcast/bias-in-machine-learning | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00617.warc.gz | en | 0.966984 | 361 | 3.171875 | 3 |
Data centers are power hogs. In the US, these facilities alone are responsible for about 2% of the total energy usage in the country (according to research by Villanova University). If all the data centers of the world are put together, their power consumption would exceed all but four sovereign nations of the world.
T... | <urn:uuid:60fdeb01-c75e-4338-a74a-4b96a5ba868e> | CC-MAIN-2022-40 | https://lifelinedatacenters.com/data-center/new-immersion-technology-promises-energy-efficient-leaner-data-centers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00617.warc.gz | en | 0.941662 | 531 | 3.265625 | 3 |
Arduino is an open source electronics prototyping platform used by an eclectic mix of people from all walks of life ranging from cake makers to artists and hobbyists. We spent some time with Brock Craft, author of Arduino Projects For Dummies, (opens in new tab) to explore why it is becoming increasingly popular.
We've... | <urn:uuid:2d165959-0533-4ebd-8d11-db321b88debb> | CC-MAIN-2022-40 | https://www.itproportal.com/2013/07/27/interview-with-brock-craft-author-of-arduino-projects-for-dummies-on-how-that-diy-pc-is-being-used-creatively-worldwide/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00617.warc.gz | en | 0.960037 | 1,218 | 3.296875 | 3 |
The Introduction to REXX Programming Language course introduces the REXX programming language and explains how it is run. It also reviews and describes the major elements that comprise a REXX program.
These courses instruct operations, systems and application staff in the use and coding of the Restructure Extended Exec... | <urn:uuid:78878638-c10d-4fc8-8b8d-c436d5c3a24e> | CC-MAIN-2022-40 | https://interskill.com/?catalogue_item=introduction-to-the-rexx-programming-language&noredirect=en-US | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335286.15/warc/CC-MAIN-20220928212030-20220929002030-00617.warc.gz | en | 0.813241 | 302 | 3.328125 | 3 |
Deep learning can help discover mathematical relations that evade human scientists, a recent paper by researchers at DeepMind shows. Like many things coming from the Alphabet-owned artificial intelligence lab, the paper, which is titled “Advancing mathematics by guiding human intuition with AI,” has received much atten... | <urn:uuid:df3971ca-f159-4cba-84aa-264f125ad91c> | CC-MAIN-2022-40 | https://swisscognitive.ch/2021/12/17/featureddeepminds-ai-can-untangle-knots/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00617.warc.gz | en | 0.928771 | 373 | 3.5625 | 4 |
The human eye and brain are an amazing data gathering tool, the eye transmits information at the rate of 10 million bits per second to the brain, comparable to an Ethernet connection. It is for this reason that data visualizations can be a powerful tool to inform about data insights. As good visualizations inform obser... | <urn:uuid:12c5d774-45e8-4870-9ba7-3b14186d7007> | CC-MAIN-2022-40 | https://straighttalk.hcltech.com/blind-sided-limitation-of-data-visualization | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00617.warc.gz | en | 0.916244 | 291 | 2.8125 | 3 |
Theoretically unrestricted by the binary limitations that limit the speed of conventional computers, quantum computers will be able to do much more in much shorter periods of time. When the quantum revolution begins, tech watches predict that five industries stand to benefit first:
Research by McKinsey found that quant... | <urn:uuid:3f95764e-b9a4-4f8e-816a-6537e8770894> | CC-MAIN-2022-40 | https://straighttalk.hcltech.com/listicles/5-industries-that-will-benefit-from-quantum-computing | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00617.warc.gz | en | 0.908749 | 336 | 3.140625 | 3 |
The ALPR matcher uses the "Number of character differences" technique to improve the plate read accuracy rate.
This technique allows for a difference in the number of characters between the plate read and the plate number in the hotlist. This allows the system to account for characters in the plate that cannot be read ... | <urn:uuid:03bf1adf-45f5-44fa-b264-0ba9f0c44755> | CC-MAIN-2022-40 | https://techdocs.genetec.com/r/en-US/Security-Center-Administrator-Guide-5.9/ALPR-matcher-technique-Number-of-character-differences | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00617.warc.gz | en | 0.878187 | 336 | 2.703125 | 3 |
A virus is a self-replicating program that produces its own copy by attaching itself to another program, computer boot sector or document.
It infects other programs,
Corrupt files and Programs
Different types of Viruses:
Boot sector virus: Replaces itself with boot sector moving boot sector into another location on the... | <urn:uuid:d39c84b7-b60e-477d-93c6-8251be90c0c5> | CC-MAIN-2022-40 | https://www.greycampus.com/opencampus/ethical-hacking/virus | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00017.warc.gz | en | 0.896399 | 443 | 3.265625 | 3 |
What is a Trojan Virus?
Table of Contents
- By David Lukic
- Oct 08, 2020
Computers, the internet, and mobile devices make our lives easier and more fun, but they also come with some danger. The digital world is replete with viruses, malware, trojans, and other infections that can ruin your hardware and software as wel... | <urn:uuid:c623ef30-1f6f-40a8-b887-119a1140a9e7> | CC-MAIN-2022-40 | https://www.idstrong.com/sentinel/trojan-virus/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00017.warc.gz | en | 0.915373 | 1,240 | 3.3125 | 3 |
Want to try Keepnets’ Phishing software for phishing training?
Cybercriminals do not only target large corporations; they also target small businesses and people, employing a variety of attack vectors such as phishing, vishing, BEC, ransomware, crypto-jacking, and SMS phishing. As a result, learning and adhering to eff... | <urn:uuid:6a2c3a44-fd3c-4ed3-a0e9-7aedd00c9385> | CC-MAIN-2022-40 | https://keepnetlabs.com/cyber-safety-rules/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00017.warc.gz | en | 0.950699 | 736 | 3.5 | 4 |
What about this course?
This course provides an introduction to programming methods and tools using Java. It introduces core programming concepts, core principles of writing in an object-oriented language, and the software development lifecycle at a very high level. Examples focus on writing applications for dynamicall... | <urn:uuid:6780a131-32ca-4f40-90fd-5183df1ed4f9> | CC-MAIN-2022-40 | https://ine.com/learning/courses/java-fundamentals-for-network-engineers | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00017.warc.gz | en | 0.759531 | 692 | 3.046875 | 3 |
Category 5, or CAT5, was ratified in 1991. CAT5 has become obsolete in recent years, due to its limitations compared to CAT5e cables. Although the CAT5 cable is a good, solid cable for 10/100 Mbps LANs, the newer versions of CAT cables are significantly faster.
Category 5e, also known as Category 5 Enhanced, or CAT5e, ... | <urn:uuid:7927ac18-9647-406c-baf3-0227171840cd> | CC-MAIN-2022-40 | https://www.blackbox.com/en-nz/insights/blackbox-explains/inner/detail/copper-cable/copper-category-standards/what's-the-difference-between-cat5-and-cat5e | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00017.warc.gz | en | 0.927298 | 520 | 2.515625 | 3 |
It seems like there’s always a new warning about yet another online scam. Not only have Americans dealt with typical scams the last several months, but we’ve also had to contend with COVID-related scams, too.
The thing about online scams is they’re not only annoying; they’re expensive. As of mid-September, consumer com... | <urn:uuid:e8742ce7-3522-46ba-8226-eb068a677ae8> | CC-MAIN-2022-40 | https://www.komando.com/security-privacy/scam-election-sites/757777/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00217.warc.gz | en | 0.909593 | 1,007 | 2.625 | 3 |
Why was 12 and 1 not included in the solution.
Hi Gerald,The factoring example shows a multiplication "circuit" with two 3-bit inputs and a 6-bit output. Each 3-bit input can represent unsigned integer factors from 0 through 7 as follows.
000 = 0001 = 1010 = 2011 = 3100 = 4101 = 5110 = 6111 = 7
A 4-bit input would be r... | <urn:uuid:f394ba92-e20d-49e3-8636-689f1aece3f0> | CC-MAIN-2022-40 | https://support.dwavesys.com/hc/en-us/community/posts/360017486794-Factoring-12 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00217.warc.gz | en | 0.942168 | 214 | 3.328125 | 3 |
iPhone users have been warned about a recently discovered Apple security flaw that enables hackers to install fake apps and steal personal data.
The US government’s Computer Emergency Readiness Team (US-CERT) has issued information regarding the hack, informing iPhone owners to be wary of clicking malicious links.
The ... | <urn:uuid:589535c3-9526-4e3a-b65e-c504b247c96e> | CC-MAIN-2022-40 | https://www.itproportal.com/2014/11/14/iphone-masque-attack-hack-installs-fake-apps-steal-user-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00217.warc.gz | en | 0.935361 | 340 | 2.5625 | 3 |
Physicists have designed artificial intelligence that thinks like the astronomer Nicolaus Copernicus by realizing the Sun must be at the centre of the Solar System.
Copyright by www.nature.com
Astronomers took centuries to figure it out. But now, a machine-learning algorithm inspired by the brain has worked out that it... | <urn:uuid:157b4bb8-dbc0-409c-b025-db8182e1d681> | CC-MAIN-2022-40 | https://swisscognitive.ch/2019/11/10/ai-copernicus-discovers-that-earth-orbits-the-sun/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00217.warc.gz | en | 0.966942 | 617 | 3.890625 | 4 |
In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the priv... | <urn:uuid:64a16b32-bdc9-40b2-8dda-0ced54c1c17c> | CC-MAIN-2022-40 | https://wiki.glitchdata.com/index.php/Certificate_authority | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00217.warc.gz | en | 0.881982 | 6,942 | 3.578125 | 4 |
On Friday, May 12, a global ransomware attack hit in over 100 countries. This was one of the biggest cyber attackers to date. According to BBC News, approximately $70,000 were paid to cyber hackers.
This terrifying event has served as a wake up call to many businesses that ransomware is a very real threat. No matter th... | <urn:uuid:71e78b55-49ef-42e2-b21f-3e985b7fc7c4> | CC-MAIN-2022-40 | https://gxait.com/it/business-guide-to-ransomware/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00217.warc.gz | en | 0.963222 | 529 | 2.765625 | 3 |
Your Ford Mondeo might achieve bigger speeds than some hybrid or electric cars, but the only place you're getting fast is a dirty, heated planet.
Condescending talk aside, the truth is that hybrid and electric cars are gaining ground, and even though classic, internal combustion engine cars still have a huge, loyal mar... | <urn:uuid:c830db7c-ad71-4cf2-848f-ac072cc21488> | CC-MAIN-2022-40 | https://www.itproportal.com/2015/05/21/five-benefits-driving-hybrid-cars/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00217.warc.gz | en | 0.95355 | 502 | 2.859375 | 3 |
Security+: Understanding Security Risk Concepts (SY0-401) [DECOMMISSIONED ARTICLE]
NOTE: This article reflects an older version of the Security+ Exam – please see the current Security+ Certification page for the most up-to-date information.
Risk can be defined as “the possibility that something (such as virus or malwar... | <urn:uuid:99f2a646-87fa-4490-ad3a-7a47aa25a685> | CC-MAIN-2022-40 | https://resources.infosecinstitute.com/certification/security-plus-understanding-security-risk-concepts-sy0-401/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00217.warc.gz | en | 0.914214 | 2,261 | 3.5 | 4 |
Public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repos... | <urn:uuid:9db47fbe-e3ac-43aa-a8fa-7d406acb69fa> | CC-MAIN-2022-40 | https://www.encryptionconsulting.com/digital-trends-driving-pki-usage/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00217.warc.gz | en | 0.94009 | 813 | 2.765625 | 3 |
In the ever changing world of technology, security should be your utmost concern. You have passwords that help to secure a vast majority of your online accounts. But to get the most out of your security, Two-Factor Authentication (TFA) is a great way to truly protect your information.
Apple ID’s TFA, if used properly, ... | <urn:uuid:8cca3b0b-ede0-45b7-a9ac-c85ac5f8f335> | CC-MAIN-2022-40 | https://www.komando.com/privacy/why-two-factor-authentication-is-crucial-for-your-apple-id-and-how-to-use-it/411461/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00217.warc.gz | en | 0.929908 | 882 | 2.53125 | 3 |
What is Video Analytics?
Picture this, you’re in a crowded train station and have lost your friend in the mix. How do you and your brain go about picking your friend out of the crowd? Do you go through the same process each time you look for something or does it depend somewhat on what you’re seeking? From a human pers... | <urn:uuid:3d109a7d-571a-46cb-a875-61d1e5e25cd9> | CC-MAIN-2022-40 | https://blog.gorilla-technology.com/video-analytics-technology/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00417.warc.gz | en | 0.920018 | 1,943 | 2.703125 | 3 |
Is there a point you can reach where you no longer need to worry about a computer virus? Quick answer: No. You will never reach a point where you have a 100% guarantee that a virus can’t infect your system. There are, however, a few steps you can take to help get you as close as possible to that 100% guarantee.
1. Anti... | <urn:uuid:10b5a6f2-d3cb-4211-b202-42074b46b382> | CC-MAIN-2022-40 | https://www.networkdepot.com/when-dont-i-need-to-worry-about-a-virus/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00417.warc.gz | en | 0.956144 | 864 | 2.59375 | 3 |
Every country’s government has its secrets. Whether it’s information on strategic military positions, to data on its citizens, there has long been a need for cyber-intelligence defences and the protection of High Assurance computer systems.
But, as everything from a country’s power grid to its national transportation n... | <urn:uuid:f933f32d-d243-4809-b613-8fead6f095aa> | CC-MAIN-2022-40 | https://informationsecuritybuzz.com/articles/tackling-cyber-security-global-perspective/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz | en | 0.950698 | 1,463 | 2.9375 | 3 |
With the spread of COVID-19, many organizations have adopted work-from–home policies, and more people than ever are using online conferencing tools. Zoom, a platform known for its simplicity and reliability, is the platform that has gained the most popularity in recent weeks. As of the beginning of April 2020, the comp... | <urn:uuid:cd006a37-cca2-4926-9482-3d3aa68a6c7b> | CC-MAIN-2022-40 | https://www.cybintsolutions.com/everything-to-know-about-cybersecurity-and-privacy-in-zoom/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz | en | 0.930903 | 2,262 | 2.546875 | 3 |
Cloud Computing is one of the hot topics of the moment and everyone has an opinion on it. The term “Cloud” covers a number of deployment scenarios, including PaaS (Platform as a Service), SaaS (Software as a Service) and IaaS (infrastructure as a Service). In this article I’ll discuss the latter, including the use of C... | <urn:uuid:1ca4b28b-d0c7-4a9a-aab2-7dfb42590692> | CC-MAIN-2022-40 | https://www.datamation.com/storage/comparing-iaas-providers-cost-security-location/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz | en | 0.933537 | 1,847 | 2.96875 | 3 |
The recent proliferation of the WannaCry ransomware has changed the face of this growing form of computer threat in for several reasons:
- WannaCry represents a new evolution of ransomware that not only damages the infected host but also acts as a "worm" that actively attempts to infect any other reachable device. This... | <urn:uuid:4b015cc4-58ad-4f49-8bc0-f3b4087fd4c5> | CC-MAIN-2022-40 | https://www.helpsystems.com/blog/could-ransomware-wannacry-hit-ibm-i | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz | en | 0.956235 | 1,021 | 2.65625 | 3 |
Scientists created a new type of CPU that communicates using light instead of electrons
Unexpected miracle. This nickname and many like it have been quickly ascribed to a new kind of CPU that has been created by a group of scientists from three US universities.
Their research published by Nature came out unexpectedly. ... | <urn:uuid:1cab6d35-36d1-434c-97ed-858ff535e0d2> | CC-MAIN-2022-40 | https://www.masterdc.com/blog/new-type-of-cpu-chip-uses-light-for-io-the-future-of-computing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00417.warc.gz | en | 0.939687 | 670 | 3.859375 | 4 |
Emails are an essential part of our work routine, and by now you have probably sent hundreds, if not thousands of emails to your clients, colleagues, or business partners. However, most of us spend little or no time at all thinking about how emails actually work.
Our main focus tends to be on the content of the email i... | <urn:uuid:114e8b85-108b-4247-966f-991cccfda624> | CC-MAIN-2022-40 | https://jatheon.com/blog/email-server-software/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00617.warc.gz | en | 0.944438 | 1,676 | 3.328125 | 3 |
A Wide Area Network (WAN) is the network that is used to connect various office environments over large geographic areas by linking the data center to remote locations. Generally, it consists of Multi-Protocol Label Switching (MPLS) infrastructure to connect branches to headquarter networks. However, this infrastructur... | <urn:uuid:3da74355-4d75-4f8f-9682-28db6f3631c7> | CC-MAIN-2022-40 | https://www.blackbox.com/en-se/insights/blogs/detail/bbns/2021/06/30/the-road-to-sd-wan-the-evolution-of-wan-infrastructure-why-this-changes-everything | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00617.warc.gz | en | 0.93015 | 1,039 | 3 | 3 |
MTU stands for Maximum transmission unit, which is the maximum packet length that can be sent on an egress interface toward a destination. MTU is an attribute of the egress interface and is typcially considered over a full path from the source to destination.
MTU size differes from one media to another and is often a s... | <urn:uuid:dfbd776a-f845-40a8-b87c-9a722738407b> | CC-MAIN-2022-40 | https://www.networkers-online.com/blog/2014/05/what-is-mtu/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00617.warc.gz | en | 0.94013 | 371 | 3.15625 | 3 |
The population of city dwellers is increasing across the globe, exerting an immense pressure on existing resources and infrastructures. To accommodate the growing urban population, governments across the globe are devoting a significant amount of resources for building roads, buildings, and transportation systems.
But ... | <urn:uuid:8d3bcd69-92e9-4584-ad88-e1ed11e8c9ce> | CC-MAIN-2022-40 | https://www.alltheresearch.com/blog/connected-city-problems-prospects | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00617.warc.gz | en | 0.939706 | 452 | 3.6875 | 4 |
How prepared is your small or medium business (SMB) to withstand a major cyberattack or data breach? Do you have the digital infrastructure to stymie such an intrusion? Do you have the resources available to recover from an especially malicious attack?
If you're unsure about any of these questions, you absolutely must ... | <urn:uuid:791f794d-d0e1-4fa8-9704-402a710dab4d> | CC-MAIN-2022-40 | https://www.cyberpolicy.com/cybersecurity-education/blind-spot-why-do-smbs-overlook-cyber-liability-insurance | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00017.warc.gz | en | 0.946466 | 643 | 2.53125 | 3 |
The data centers used to manage the country’s ballistic missile defense systems have major security weaknesses that could leave the US vulnerable to missile attacks, according to a newly declassified report from the Department of Defense.
The report, released earlier this month by the DoD’s Inspector General, lists a n... | <urn:uuid:0abb7e3c-64c3-46e7-b1f5-b1acbd4efb73> | CC-MAIN-2022-40 | https://www.mariakorolov.com/2018/report-of-gaping-security-holes-at-us-missile-defense-systems-data-centers-shocks-experts-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00017.warc.gz | en | 0.943848 | 159 | 2.609375 | 3 |
The Ethics of ML and AI
AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computer... | <urn:uuid:5482a1a3-302b-40c4-9c17-d021dfcd5b65> | CC-MAIN-2022-40 | https://www.careersinfosecurity.com/webinars/ethics-ml-ai-w-2274 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00017.warc.gz | en | 0.954306 | 218 | 2.9375 | 3 |
This article discusses how to exchange COVID-19 contact tracing information between countries that use contact tracing apps and infrastructure. It takes a structured look at the goals, challenges, opportunities, and limitations of this kind of interoperability between national systems. This article is not intended as a... | <urn:uuid:86e9a65c-2406-4799-98b7-290f2ef184d4> | CC-MAIN-2022-40 | https://blog.axway.com/learning-center/software-development/api-development/covid-19-contact-tracing-apps | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337322.29/warc/CC-MAIN-20221002115028-20221002145028-00017.warc.gz | en | 0.946962 | 2,067 | 3.546875 | 4 |
A Brief Introduction to NetFlow
NetFlow is data generated by network devices – routers, switches, firewalls, etc. – that contains information about the data that’s moving through the network. The term NetFlow is often used generally to refer to this type of information, but “NetFlow” is actually proprietary to Cisco. O... | <urn:uuid:8717a6c8-4076-46ac-824b-e58621557bcd> | CC-MAIN-2022-40 | https://informationsecuritybuzz.com/articles/netflow-monitoring-analysis-infosec-professionals-guide/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337322.29/warc/CC-MAIN-20221002115028-20221002145028-00017.warc.gz | en | 0.926004 | 1,540 | 2.671875 | 3 |
The following validation set and its prediction values shows an R2 value of 0.69 where as Datarobot result shows 0.65. This is not specific to this one data set, whatever model i use, when i check the validation set and calculate its R2, its slightly different from what datarobot is showing. Am i missing anything?
Solv... | <urn:uuid:5848cbce-f40d-421a-898a-fa9af25020ca> | CC-MAIN-2022-40 | https://community.datarobot.com/t5/platform/r-square-value-different-from-manual-calculation/m-p/5359 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00017.warc.gz | en | 0.891339 | 893 | 2.984375 | 3 |
Veterans who opt-in to sharing their DNA through the program have the opportunity to support medical discoveries and health improvements across future generations.
Veterans across America now have the ability to join the Million Veterans Program research project online.
Launched in 2011, the national voluntary research... | <urn:uuid:7f1b577b-9886-45cd-9795-88531fcad842> | CC-MAIN-2022-40 | https://www.nextgov.com/it-modernization/2019/10/million-veterans-program-now-open-online-enrollment/160494/?oref=ng-next-story | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00017.warc.gz | en | 0.931191 | 501 | 2.625 | 3 |
As mobile operators are beginning their roll-outs of 5G technology, a Gartner survey reveals that two thirds of organisations worldwide see enough benefit to their businesses that they would consider deploying their own networks. The rest of us are keen to understand more about the technology, what it means for our sma... | <urn:uuid:35c13fab-abdd-4f84-bffa-956dc5e6d2fd> | CC-MAIN-2022-40 | https://www.bluwireless.com/insight/blog/what-is-5g-mmwave/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00017.warc.gz | en | 0.948282 | 1,228 | 2.59375 | 3 |
What is Data Gravity? How it Can Influence Your Cloud Strategy
The amount of data that is generated every day is amazing. The latest statistics show that 1.7 MB of data is created every second or 146.88 zettabytes every day. While your business may generate just a small slice of this massive amount, effectively managin... | <urn:uuid:01a154b2-4eb8-4f46-9764-4ca71f73922e> | CC-MAIN-2022-40 | https://www.factioninc.com/blog/data-gravity-as-the-center-of-your-multi-cloud-universe/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00017.warc.gz | en | 0.925046 | 2,415 | 2.90625 | 3 |
ThreatSCOPE Use Case: Healing the Heartbleed OpenSSL vulnerabilityhttps://www.bluerisc.com/wp-content/uploads/2018/11/heartbleed_after_insertion-1024x555.jpg 1024 555 BlueRiSC BlueRiSC https://secure.gravatar.com/avatar/a7158cc1d3cf99ba24bb066e9343643b?s=96&d=mm&r=g
In this previous post we showed how ThreatSCOPE can b... | <urn:uuid:646330b6-4641-441a-9859-7055e4c311f4> | CC-MAIN-2022-40 | https://www.bluerisc.com/2019/11/21/threatscope-use-case-healing-the-heartbleed-openssl-vulnerability/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00218.warc.gz | en | 0.897277 | 805 | 2.5625 | 3 |
How beamforming works: making the conference phone a smarter listener
Beamforming technology makes the conference phone a smarter listener, actively improving the sound quality of your distance meeting. The technology helps to pick out the right audio data for processing and refinement using intelligent algorithms. We ... | <urn:uuid:279bb258-827a-4709-98b1-59197bf830d8> | CC-MAIN-2022-40 | https://www.konftel.com/no/academy/how-beamforming-works | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00218.warc.gz | en | 0.930527 | 885 | 2.5625 | 3 |
(continued from page 1)
Our suspect string is:
Step 1: Adjust Trailing Padding if Necessary
We put the suspect string into CyberChef and choose the "From Base64" recipe, which produces the error: "Data is not a valid byteArray." Adjust the number of trailing "=" from 0-2 until the error goes away. In this example, dele... | <urn:uuid:3a67c5bc-b4cc-46c5-840b-e45a79ae5aba> | CC-MAIN-2022-40 | https://www.darkreading.com/edge-articles/hacker-pig-latin-a-base64-primer-for-security-analysts | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00218.warc.gz | en | 0.899774 | 1,184 | 2.5625 | 3 |
The pulse dialing method was technically determined by how the rotary dial of the telephone works. When the caller picks up the receiver and operates the rotary dial, it disconnects the loop between the telephone and the exchange at a specific frequency and at defined intervals based on the number dialed. The analog ex... | <urn:uuid:c1e37c06-b0b8-441a-be75-96337e026102> | CC-MAIN-2022-40 | https://www.nfon.com/en/get-started/cloud-telephony/lexicon/knowledge-base-detail/pulse-dialing | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00218.warc.gz | en | 0.933407 | 303 | 3.09375 | 3 |
This article introduces a set of evasion techniques wherein malware takes advantage of running processes. These techniques fall under the broad category of malware evasion techniques known as process injection.
Finding threats in running processes
In the past, malware infections normally involved malicious processes th... | <urn:uuid:6d7d3233-74ef-49ba-8c61-7279b7fe0dd4> | CC-MAIN-2022-40 | https://minerva-labs.com/blog/malware-evasion-memory-injection/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00218.warc.gz | en | 0.906665 | 934 | 2.609375 | 3 |
There are some obvious and not-so-obvious overlaps among various “advanced computing” concepts. Before I describe some of the inter-relationships among these concepts, it would be helpful to level-set the general definitions:
Classical Computing: is the form of data storage and analysis utilizing transistors in integra... | <urn:uuid:15456b92-ced2-4577-ab2b-4069870959f1> | CC-MAIN-2022-40 | https://quantumtech.blog/2022/02/22/at-the-intersection-of-quantum-computing-artificial-intelligence-and-machine-learning/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00218.warc.gz | en | 0.923902 | 2,052 | 3.453125 | 3 |
Every single time a terror attack happens somewhere in the world, we gasp, sigh and think “Why did this happen?” Is there really no way this could have been prevented? Be it the recent tragedy in Sri Lanka, countless school shootings in US (that have become so commonplace that we have lost count), suicide bombings,... | <urn:uuid:35ea0fc9-d76c-435c-9d0e-0fafd9eb22a2> | CC-MAIN-2022-40 | https://www.clovity.com/blog/agile-security-and-crime-prevention/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00218.warc.gz | en | 0.937427 | 1,578 | 2.765625 | 3 |
It looks like a regular roof, but the top of the Packard Electrical Engineering Building at Stanford University has been the setting of many milestones in the development of an innovative cooling technology that could someday be part of our everyday lives. Since 2013, Shanhui Fan, professor of electrical engineering, a... | <urn:uuid:465c0d80-8840-45ae-8439-d38049b67f21> | CC-MAIN-2022-40 | https://debuglies.com/2017/09/08/cooling-system-works-without-electricity/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00218.warc.gz | en | 0.952708 | 1,187 | 3.484375 | 3 |
The IT security researchers at deep learning cybersecurity firm Deep Instinct have discovered a sophisticated malware in the wild targeting Microsoft’s Windows-based computers.
Adding devices to Botnet
The malware works in such a way that upon infecting, it allows hackers to take over the device and make it part of a b... | <urn:uuid:1f76a81e-182c-4bd1-a1cd-a60bf6c11845> | CC-MAIN-2022-40 | https://debuglies.com/2018/06/25/mylobot-malware-turning-windows-devices-into-botnet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00218.warc.gz | en | 0.927503 | 508 | 2.515625 | 3 |
If left untreated, it can cause serious and potentially life-threatening damage to the liver over many years.
Today, with the help of modern treatments it’s usually possible to cure the infection, and most people with it will have a normal life expectancy.
An estimated 1 percent of the world population is chronically i... | <urn:uuid:d1f3e524-9e99-43a9-ad1a-a0a0adeec0e0> | CC-MAIN-2022-40 | https://debuglies.com/2018/11/14/research-shows-persisting-fears-about-hiv-infection-may-impact-testing-uptake-for-the-hepatitis-c-virus-hcv/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00218.warc.gz | en | 0.924848 | 651 | 3.453125 | 3 |
With warnings of increased cyber scams related to the Coronavirus and many people working at home, it’s a good time to remember the cybersecurity basics. Learn these 16 tips to help better protect yourself and your loved ones from scams.
Passwords and Email
- Use strong passwords - The Federal Trade Commission (FTC) ad... | <urn:uuid:7e95b524-ef38-4713-a2b1-fe8aa3601f66> | CC-MAIN-2022-40 | https://www.idwatchdog.com/cybersecurity-checkup | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00418.warc.gz | en | 0.900686 | 925 | 3.015625 | 3 |
Recently, the US Securities and Exchange Commission (SEC) offered both a view and a reminder on release of data related to climate change impact. The interpretation is located at:
For businesses, this means a greater focus on carbon impact and greenhouse gas emissions. For data center owners, it goes beyond efficiency ... | <urn:uuid:1021c269-0f38-4a6b-947e-88efd8e9985f> | CC-MAIN-2022-40 | https://avoa.com/2010/02/16/u-s-sec-views-on-disclosure-bring-focus-to-carbon-impact/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00418.warc.gz | en | 0.94304 | 185 | 2.59375 | 3 |
The Internet of Things (IoT), which connects medical equipment and apps to the healthcare IT system, has been driving the expansion of wearable devices in the healthcare business, which is now known as the Internet of Health Things (IoHT). In medical equipment, the Internet of Things entails machine-to-machine (M2M) co... | <urn:uuid:8ff7bc79-29f5-4f91-b9f8-fcfa5374ca69> | CC-MAIN-2022-40 | https://www.iotavenue.com/ai-based-wearables-helpful-for-the-healthcare-industry | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00418.warc.gz | en | 0.93995 | 1,635 | 3.109375 | 3 |
As data drives more and more of the modern economy, data governance and data management are racing to keep up with an ever-expanding range of requirements, constraints and opportunities.
It is a little like a data version of the Cambrian Explosion, where data-centricity is giving rise to a rich variety of practices, ea... | <urn:uuid:39b6a360-21a6-4b35-919b-d6e0c5944216> | CC-MAIN-2022-40 | https://www.alation.com/blog/defining-data-acquisition-and-why-it-matters/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00418.warc.gz | en | 0.953691 | 1,136 | 2.59375 | 3 |
Scientists around the world are inspired by the brain and strive to mimic its abilities in the development of technology. Our research team at IBM Research Europe in Zurich shares this fascination and took inspiration from the cerebral attributes of neuronal circuits like hyperdimensionality to create a novel in-memory... | <urn:uuid:322dfdf4-3690-4d25-82da-67a401b112e7> | CC-MAIN-2022-40 | https://www.ibm.com/blogs/research/2020/06/in-memory-hyperdimensional-computing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00418.warc.gz | en | 0.92989 | 1,779 | 3.84375 | 4 |
AI mistakes? How could this happen?
Aug 10, 2018
AI perceives its environment and takes actions that maximize the probability of successfully achieving its goals. This does not ensure success (the correct answer). This is a common misconception. AI-based systems will produce some wrong answers. AI, much like natural in... | <urn:uuid:bbbcde5c-5ee4-4c75-851b-fcc3fca6e5c9> | CC-MAIN-2022-40 | https://www.asranalytics.com/about-asr/blog/2018/08/ai-mistakes-how-could-happen | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00618.warc.gz | en | 0.940694 | 505 | 3.328125 | 3 |
Microsoft ended support for XP last year but there are probably millions of computers out there, in homes and offices that are still running the operating system.
How many computers do you see running Vista, the OS that was intended to succeed XP?
Vista was buggy, unreliable, and a massively flawed product. Nobody like... | <urn:uuid:5971300a-f298-4d50-930c-32d10fed6b4d> | CC-MAIN-2022-40 | https://www.itexchangeweb.com/blog/quality-assurance-vs-quality-control-why-you-need-both-in-software-development/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335286.15/warc/CC-MAIN-20220928212030-20220929002030-00618.warc.gz | en | 0.952298 | 1,057 | 2.953125 | 3 |
Editor’s Note: This post was originally published August 2021 and has been updated for accuracy and comprehensiveness.
If you’re anything like me, you have probably fallen into the field of digital forensics (check out my Kicking and Screaming blog to learn more). You may be the semi-technical expert on your team or ju... | <urn:uuid:da553231-365e-417a-8b47-a12454f8de61> | CC-MAIN-2022-40 | https://www.grayshift.com/what-is-digital-forensics/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00618.warc.gz | en | 0.924681 | 1,465 | 2.71875 | 3 |
Critical Alert: Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution
Description: Multiple vulnerabilities have been discovered in PHP, the
most severe of which could allow an attacker to execute arbitrary code.
PHP is a programming language originally designed for use in web-based
applications with... | <urn:uuid:d64cc859-b69e-412c-9f18-b3884c23371d> | CC-MAIN-2022-40 | https://www.cirt.gov.bd/critical-alert-multiple-vulnerabilities-in-php-could-allow-for-arbitrary-code-execution/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00618.warc.gz | en | 0.823961 | 395 | 2.59375 | 3 |
Understanding the RAMBleed Exploit [cylance]
Side-channel attacks are some of the scariest exploits ever. They don’t usually exploit vulnerabilities in code, they exploit the fundamental implementation of computer systems themselves. Therefore, they’re often hardware-based.
Dynamic random-access memory, or DRAM for sho... | <urn:uuid:cf4e292d-1c29-4437-9970-dedaa0368185> | CC-MAIN-2022-40 | https://www.cirt.gov.bd/understanding-the-rambleed-exploit-cylance/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00618.warc.gz | en | 0.943228 | 604 | 3 | 3 |
The national lab is developing more energy-efficient motors to improve the endurance of legged robots used in disaster response.
Steve Buerger is leading a Sandia National Laboratories project to demonstrate energy-efficient biped robots. Increased efficiency could enable bots to operate for much longer periods of time... | <urn:uuid:92e527e1-e0a5-493b-b09d-e364d05973b6> | CC-MAIN-2022-40 | https://fcw.com/2014/12/sandia-looks-to-open-source-robot-tech/254881/?oref=fcw-next-story | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00618.warc.gz | en | 0.914649 | 463 | 2.8125 | 3 |
It’s been three months since the world was shaken by the brutal murder of George Floyd. The image of a white police officer kneeling on a black citizen for 8 minutes and 46 seconds are still fresh in America’s collective memory.
This wasn’t the first case of racially-charged police brutality in the US. And unfortunatel... | <urn:uuid:60035a2a-e50e-4577-b2ae-a2949c874790> | CC-MAIN-2022-40 | https://www.iotforall.com/artificial-intelligence-the-next-front-of-the-fight-against-institutional-racism | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00618.warc.gz | en | 0.95671 | 1,295 | 2.796875 | 3 |
A student may not need a loan until they attend college. Therefore, a student signs up for a loan through the Federal Government or a private bank. Unfortunately, he or she learns that there is an existing loan in their name. Then the student finds out they are an identity theft victim.
Identity theft in education affe... | <urn:uuid:cff93647-9a3d-4452-8987-3e7d6f741387> | CC-MAIN-2022-40 | https://www.electronicverificationsystems.com/blog/the-effects-of-education-identity-fraud | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00018.warc.gz | en | 0.972556 | 281 | 3.015625 | 3 |
Two decades ago, Brain, the first boot sector virus which infected personal computers via the floppy disk, was detected. While Brain itself was relatively harmless, it marked the genesis of the world of computer viruses.
This year marks the 20th year of the existence of viruses after Brain was detected on January 19, 1... | <urn:uuid:ecec680b-88cf-433d-aebb-5cee3e3aa409> | CC-MAIN-2022-40 | https://www.itworldcanada.com/article/jan-06-20th-anniversary-of-virus-menace/4903 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00018.warc.gz | en | 0.958933 | 478 | 2.921875 | 3 |
Key things you didn't know about phishing
Phishing is one of the most common forms of cyberattack, fooling people into thinking they're dealing with a trusted organization in order to get them to part with credentials.
But what are the hallmarks of a phishing attack? Atlas VPN has collected some phishy statistics to fi... | <urn:uuid:4d0172bb-cf79-43e0-9811-c46c105baf21> | CC-MAIN-2022-40 | https://betanews.com/2022/08/01/key-things-you-didnt-know-about-phishing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335058.80/warc/CC-MAIN-20220927194248-20220927224248-00018.warc.gz | en | 0.936304 | 353 | 2.578125 | 3 |
IBM AND Duke University Team to Study Heart Disease
Duke University researchers will utilize a powerful IBM SP supercomputer to create models of the heart that they hope will lead to uncovering causes and developing treatments for life-threatening heart conditions.
Relying on the same IBM technology used in the U.S. En... | <urn:uuid:9f65a564-2f49-4049-8747-533571a8296e> | CC-MAIN-2022-40 | https://esj.com/articles/2000/11/13/ibm-and-duke-university-team-to-study-heart-disease.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335058.80/warc/CC-MAIN-20220927194248-20220927224248-00018.warc.gz | en | 0.875496 | 444 | 3.4375 | 3 |
Routing, a term commonly used in networking, is the process of selecting the most optimal path for a data packet to travel across networks. Broadly speaking, routing can be static or dynamic. In static routing, the route for a data packet is configured manually or entered each time a data packet travels across networks... | <urn:uuid:cca86a79-4904-4692-aa21-a7cbb987a1a2> | CC-MAIN-2022-40 | https://www.ittsystems.com/add-static-route-using-powershell-cmdlet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00018.warc.gz | en | 0.918586 | 2,048 | 4.03125 | 4 |
Jens Stoltenberg, NATO secretary-general, wrote that cyber-attacks “can affect every one of us”. The official mentioned that “For NATO, a serious cyber-attack could trigger Article 5 of our founding treaty. This is our collective defense commitment where an attack against one ally is treated as an attack against all.”
... | <urn:uuid:96630b8f-5e8e-471b-984d-b3674880489b> | CC-MAIN-2022-40 | https://blog.bit-guardian.com/nato-cyber-attacks-to-trigger-article-5/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00018.warc.gz | en | 0.964527 | 331 | 2.890625 | 3 |
“What exactly is a data scientist?” This question is increasingly on the minds of many in the tech world today. The mix of skills needed to be called a “data scientist” is still very much a work in progress—however, the role may not be as new as you think.
A recent Harvard Business Review article made more than a few h... | <urn:uuid:c7bcaa2f-4934-43e8-8b0f-13ab4488ecb4> | CC-MAIN-2022-40 | https://www.cio.com/article/286599/data-management-data-scientist-role-is-clear-even-if-job-description-isn-t.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00018.warc.gz | en | 0.94182 | 1,513 | 2.640625 | 3 |
SARS-COV-2 is a biological enemy, but the COVID-19 pandemic can be — and actually has been — fought with digital measures. Advanced analytics and data management made it possible to track the way coronavirus is spreading, know its tactics, its structure, and the way its features make it so efficient and dangerous.
Ther... | <urn:uuid:074c6338-14ae-45c0-b7e8-450efaa8b48c> | CC-MAIN-2022-40 | https://candf.com/articles/data-driven-life-science-understanding-the-pandemic-through-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00218.warc.gz | en | 0.950835 | 1,365 | 2.859375 | 3 |
Royals and espionage have gone together ever since Sun Tzu’s identification to his royal masters in the 4th century BC, of the three different types of intelligence agents he deemed necessary for subsequent military success. In the centuries since, we have seen Julius Caesar’s creation of a spy network to keep track of... | <urn:uuid:4b1e2e76-a726-468a-8b8f-25060c0eeb53> | CC-MAIN-2022-40 | https://kcsgroup.com/a-right-royal-case-of-espionage/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00218.warc.gz | en | 0.982902 | 843 | 2.765625 | 3 |
Virtualization has been transforming IT infrastructure strategies. It began with server virtualization. Establishing virtual machines within single systems allowed one server to host dozens of applications, changing the way data centers operate by allowing apps to use system resources on an as-needed basis. This proces... | <urn:uuid:b852ea89-cc40-445a-90f8-b8f97066bc35> | CC-MAIN-2022-40 | https://www.bcmone.com/blog/software-defined-networking-transforming-wan-capabilities/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00218.warc.gz | en | 0.929846 | 1,041 | 2.578125 | 3 |
As more IT functions are moved offshore to developing countries, there are ways for IT workers in developed countries to improve their chances of staying employed, according to a report from the Association for Computing Machinery (ACM).
Savvy students and IT workers already know they should obtain a strong educational... | <urn:uuid:cb29f1c0-5e66-4865-b131-bc4c59ef2e9a> | CC-MAIN-2022-40 | https://www.cio.com/article/256901/it-organization-staffing-how-to-save-it-jobs.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00218.warc.gz | en | 0.958407 | 331 | 2.765625 | 3 |
Welcome to Terminology Tuesday! Where we explain some commonly misused or misunderstood terms and phrases!
This week’s term is Operating System (sometimes referred to as OS).
Operating systems (OS) are installed in nearly every consumer computer today. They’re needed to run other programs and applications that we’re fa... | <urn:uuid:33a9472f-7d18-4b61-a8fa-bc50c78df3d1> | CC-MAIN-2022-40 | https://www.computerhardwareinc.com/terminology-tuesday-vol-1/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00218.warc.gz | en | 0.965428 | 261 | 3.859375 | 4 |
Imagine two groups at war. One defends against every attack as it comes. The other anticipates threats before they happen. Which is more likely to win?
The same thing can be said about cybersecurity. Responding to attacks as they happen is important, but it's even more vital to anticipate the inevitability of a cyberat... | <urn:uuid:9d999b17-0ad0-419e-8e0f-8a15c783c54c> | CC-MAIN-2022-40 | https://www.cyberpolicy.com/cybersecurity-education/anticipation-the-best-weapon-against-cyber-attacks | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00218.warc.gz | en | 0.948515 | 680 | 2.578125 | 3 |
A map as we know it does not tell the whole story; it’s missing classifications of what makes up the land such as water, types of forests, snow, grasslands, and so on. Interplay® can be used as a land classification system, able to clearly define boundaries between land classes. This can then be graphically mapped out ... | <urn:uuid:02a69167-2ef1-4430-b879-0451a04ce028> | CC-MAIN-2022-40 | https://www.iterate.ai/use-cases/applications/landcover-classification?industry=&application=&force= | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00218.warc.gz | en | 0.933855 | 284 | 2.5625 | 3 |
What is the Surface Web?
Also known as the Visible Web “Lightnet”, or Indexed Web; Surface Web is everything that you can find on the regular World-Wide-Web.
It contains the pages that are put under “Indexable” to be readily available to its searchers in any Search Engine’s Result Page.
According to the worldwidewebsiz... | <urn:uuid:87bdb95b-d367-4bc9-8d26-e7bef0c2ff99> | CC-MAIN-2022-40 | https://www.hitechnectar.com/blogs/introduction-surface-web-deep-dark-web/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00218.warc.gz | en | 0.91741 | 874 | 3 | 3 |
If you have completed the first lesson of this course, you are well aware that personal data has no place in the public domain. So how does it end up there?
There numerous ways, and not all are under your control. For example, a cybercriminal can steal information from the server of an online store or hotel if it is no... | <urn:uuid:ea62a692-f36f-4cdf-854e-4a360aa3a533> | CC-MAIN-2022-40 | https://education.kaspersky.com/en/lesson/16/page/68 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00218.warc.gz | en | 0.947574 | 587 | 3.453125 | 3 |
If you have your laptop, you can work from just about anywhere if there’s an internet connection to your company servers. Out on a sales call and need to log in to grab your proposal? Need to get to your email from home? Updating your project timelines while you’re waiting at the airport for your next flight? No proble... | <urn:uuid:e6fa9349-67d0-401b-87df-741909e6445e> | CC-MAIN-2022-40 | https://www.accentonit.com/blog/remote-access-without-vpn-is-risky-business | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00218.warc.gz | en | 0.925736 | 798 | 2.625 | 3 |
Some counters are configured to count a duration, rather than a number of events. Basically, it is incrementing by the number of active TBF, each second.
For example : during 5s, the number of simultaneous DL TBF is:
5 TBF,4 TBF,5 TBF,6 TBF, 3 TBF
Over this 5seconds, the counter will print : 5+4+5+6+3 = 23 seconds.
Thi... | <urn:uuid:e7a6112f-3409-4fc7-90b5-23ef57122840> | CC-MAIN-2022-40 | https://www.erlang.com/reply/69524/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00218.warc.gz | en | 0.890343 | 224 | 3.015625 | 3 |
How long has AR/VR/Mixed Reality been around?
Although VR, AR and MR have garnered more attention and gained more momentum in recent memory, the idea (and rudimentary executions) of these technologies has actually been around for more than 150 years. Some would say that panoramic paintings and stereoscopes are early in... | <urn:uuid:17568928-0bb6-4b11-97b8-c5721d3cd120> | CC-MAIN-2022-40 | https://www.1623farnam.com/ar-vr-faq/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00218.warc.gz | en | 0.935512 | 578 | 2.671875 | 3 |
Today’s tech can connect you with anyone, anywhere in the world. By the minute, our world is getting more connected and increasingly in tune with our modern, on-demand, on-the-go lifestyles. There are countless organizations and individuals alike responsible for the innovations fueling this transformation. As Father’s ... | <urn:uuid:29fcb288-54a5-412c-bd7e-30d7ba86b44b> | CC-MAIN-2022-40 | https://www.beyondtrust.com/blog/entry/celebrating-the-forefathers-of-it | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00218.warc.gz | en | 0.963005 | 1,200 | 2.640625 | 3 |
To celebrate her historic visit to Bletchley Park, the home of the Codebreakers of World War II, Her Majesty The Queen has issued a challenge to schoolkids: break a book of war-time ciphers.
The Codebreakers worked in secret throughout World War II, intercepting and decoding encrypted German communications to aid the w... | <urn:uuid:e6245031-ff96-4d12-84c2-2c47022350e7> | CC-MAIN-2022-40 | https://www.itproportal.com/2011/07/15/queen-launches-code-book-challenge/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00218.warc.gz | en | 0.953135 | 354 | 2.625 | 3 |
New Physics AI Could Be a ‘Snowball that Causes a Quantum Computing Avalanche’
(NextWeb) Scientists in the quantum computing field may have found a eureka moment in recently published physics research conducted by an international team with representatives from Cornell, Harvard, Université Paris-Sud, Stanford, Universi... | <urn:uuid:8ebf64fd-f5e8-4933-9334-845545277358> | CC-MAIN-2022-40 | https://www.insidequantumtechnology.com/news-archive/new-physics-ai-snowball-causes-quantum-computing-avalanche/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00418.warc.gz | en | 0.913606 | 337 | 2.90625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.