text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
DC & Virtualization
Home > DC & Virtualization
A data center (DC) is a facility that houses computer systems and associated components, such as telecommunications and storage systems. Virtualization is the process of creating a virtual version of a computer system.
Virtualization can be used in data centers to improve ... | <urn:uuid:990e15c4-f33d-4d10-84e1-c8f7c774bf07> | CC-MAIN-2024-38 | https://arwentech.com/dc-virtualization/ | 2024-09-13T18:54:00Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651535.66/warc/CC-MAIN-20240913165920-20240913195920-00455.warc.gz | en | 0.926099 | 115 | 2.9375 | 3 |
December 2, 2011
IBM, in a partnership with Micron Technology, plans to develop a very special chip it calls the “Hybrid Memory Cube,” or HMC. IBM says this 3D chip will deliver memory speeds 15 times faster than what’s already on the market. How does it work and more importantly, should you care? Read on …
The technol... | <urn:uuid:51730d7f-da4a-411e-8cb0-1357fa6f865a> | CC-MAIN-2024-38 | https://www.channelfutures.com/regulation-compliance/ibm-micron-technology-planning-to-build-3d-memory-cube- | 2024-09-13T17:45:55Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651535.66/warc/CC-MAIN-20240913165920-20240913195920-00455.warc.gz | en | 0.918627 | 585 | 3.125 | 3 |
Good leadership isn’t an art. And it isn’t a science, either. What do we mean by this? We mean that leadership is, in fact, many sciences. What makes for an effective leader and how to become one, are questions addressed by such diverse scientific fields as neuroscience, the psychology of self-efficacy, systems dynamic... | <urn:uuid:95b9f7e0-9b9a-4688-93bb-c5c80d2a3951> | CC-MAIN-2024-38 | https://www.isemag.com/columnist/article/14267796/the-sciences-of-leadership | 2024-09-16T05:45:25Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651676.3/warc/CC-MAIN-20240916044225-20240916074225-00255.warc.gz | en | 0.944261 | 679 | 3.046875 | 3 |
I have discussed factorisation of authentication before here, this one will be a little more indepth;
To reiterate authentication currently works under a model of factors. Factors are simply classifications of things, in a cumulative manner. Things could be something you know (and preferably keep private), something yo... | <urn:uuid:d33f6f97-2fae-446b-b4e9-f58ad29bd0dd> | CC-MAIN-2024-38 | https://security.morganstorey.com/2015/ | 2024-09-18T18:12:24Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00055.warc.gz | en | 0.944547 | 1,236 | 2.71875 | 3 |
While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security. As research into the design of a QC has intensified (including public access to a small implementation),... | <urn:uuid:50619cf1-9b6b-4de6-a38b-4a40a7f284bc> | CC-MAIN-2024-38 | https://blogs.cisco.com/security/engineering-postquantum-security | 2024-09-21T03:54:18Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701427996.97/warc/CC-MAIN-20240921015054-20240921045054-00755.warc.gz | en | 0.961152 | 1,635 | 2.890625 | 3 |
Improper Restriction of Operations within the Bounds of a Memory Buffer
Buffer overflow in the CreateDIBPalette function in win32k.sys in Microsoft Windows XP SP3, Server 2003 R2 Enterprise SP2, Vista Business SP1, Windows 7, and Server 2008 SP2 allows local users to cause a denial of service (crash) and possibly execu... | <urn:uuid:e52e83d3-ecbe-407b-a369-30ccf54a1a9c> | CC-MAIN-2024-38 | https://devhub.checkmarx.com/cve-details/cve-2010-2739/ | 2024-09-07T20:02:45Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00155.warc.gz | en | 0.804173 | 214 | 2.703125 | 3 |
Photonic quantum processor passes major quantum computing milestone
(IFLScience) One of quantum computing’s most significant milestones has been achieved, with a processor that can be programmed across all of its quantum gates ‘beating’ the most powerful classical computers at a task. IQT-News summarizes below.
The des... | <urn:uuid:4e3eeaa0-1572-4b0c-81ad-764abea3ab16> | CC-MAIN-2024-38 | https://www.insidequantumtechnology.com/news-archive/photonic-quantum-processor-passes-major-quantum-computing-milestone/ | 2024-09-10T03:41:17Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651196.36/warc/CC-MAIN-20240910025651-20240910055651-00855.warc.gz | en | 0.93021 | 347 | 3.265625 | 3 |
Securing your data in the Quantum Age
Quantum technology has the potential to revolutionize our approach to the most difficult problems of our time: from drug discovery, to broad impacts in defense and intelligence systems, and even in areas we haven’t yet imagined. However, the same computing power unlocked by quantum... | <urn:uuid:42fe959e-c418-4d09-9a27-02b9c432b472> | CC-MAIN-2024-38 | https://www.insidequantumtechnology.com/news-archive/securing-your-data-in-the-quantum-age/ | 2024-09-11T09:30:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651383.5/warc/CC-MAIN-20240911084051-20240911114051-00755.warc.gz | en | 0.934713 | 2,321 | 2.875 | 3 |
Space Law: In recent months, the spotlight has been cast on a declaration by the United Nations High Commissioner for Human Rights, heralding “Universal Internet Access as a Fundamental Right”. It’s an ambitious proclamation, echoing the aspirational tenets of our digital age. However, on closer scrutiny, realizing thi... | <urn:uuid:4135d813-2aad-413f-96ed-d7380933ddc8> | CC-MAIN-2024-38 | https://4imag.com/connectivity-space-law-in-the-new-age/ | 2024-09-12T15:11:54Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651460.54/warc/CC-MAIN-20240912142729-20240912172729-00655.warc.gz | en | 0.919083 | 894 | 2.765625 | 3 |
Software-defined networking (SDN) is a cost-effective, dynamic architecture well suited to support today’s high bandwidth, cloud-based applications and networking services.
By decoupling a network’s control and data planes, SDN becomes an agile architecture where centrally managed network intelligence quickly delivers ... | <urn:uuid:02b1d817-2886-44bf-8e41-bd8f718dc6b5> | CC-MAIN-2024-38 | https://www.information-age.com/reality-software-defined-networks-30298/ | 2024-09-13T20:49:43Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651540.48/warc/CC-MAIN-20240913201909-20240913231909-00555.warc.gz | en | 0.900253 | 1,061 | 2.53125 | 3 |
A wireless access point is a necessity for any business or institution that must support many wireless internet users. Compared to the usual wireless router, the wireless access point offers many different advantages. Read on to learn just how a wireless access point can provide the best needs for a safe and secure int... | <urn:uuid:caaf7e70-4fbd-47cf-a212-9accd5c8ae2a> | CC-MAIN-2024-38 | https://www.en-netservices.com/blog/comparing-routers-and-wireless-access-points/ | 2024-09-15T04:27:00Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651614.9/warc/CC-MAIN-20240915020916-20240915050916-00455.warc.gz | en | 0.934597 | 623 | 2.546875 | 3 |
How to Build a Career with vCenter
VMware vSphere is a feature-rich suite of products that enables IT organizations to maximize their investment in computing equipment by running many virtual servers on hardware that, in the past, would have only supported a single operating system.
Because VMware is a very popular vir... | <urn:uuid:324f7434-0ee4-4c93-93ae-b895ea33aadc> | CC-MAIN-2024-38 | https://www.cbtnuggets.com/blog/it-careers/how-to-build-a-career-with-vcenter | 2024-09-17T15:05:03Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651800.83/warc/CC-MAIN-20240917140525-20240917170525-00255.warc.gz | en | 0.961774 | 2,209 | 2.625 | 3 |
SOA Patterns > Basics > What is SOA > Elements of Service-Oriented Computing > A Physical View of Service-Oriented Computing
A Physical View of Service-Oriented Computing
To fully appreciate how service-oriented computing elements are ultimately used we need to explore how they translate into the real world. To do so, ... | <urn:uuid:52c86753-c469-4b5d-b6d1-818847e0f383> | CC-MAIN-2024-38 | https://patterns.arcitura.com/soa-patterns/basics/whatissoa/a_physical_view_of_service_oriented_computing | 2024-09-18T21:08:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651941.8/warc/CC-MAIN-20240918201359-20240918231359-00155.warc.gz | en | 0.935842 | 372 | 2.75 | 3 |
Resiliency is about more than protecting our current possessions, it’s about preserving our past. As we enter Black History month this February, we are reminded of the importance of preserving our historic sites in areas threatened by climate change. Karsun proudly supports the work of African American communities prep... | <urn:uuid:1280d6d2-d263-4f9a-80ea-00d275c0376d> | CC-MAIN-2024-38 | https://karsun-llc.com/tag/fema-gmm/ | 2024-09-09T05:58:19Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651072.23/warc/CC-MAIN-20240909040201-20240909070201-00155.warc.gz | en | 0.938241 | 1,233 | 2.5625 | 3 |
IT managers know the movies get it wrong. A teenager with a laptop cannot crack multiple layers of encryption — unless that laptop is connected to a supercomputer somewhere and the teenager can afford to wait a few billion years.
Encryption works. It works so well that even the government gets stymied, as demonstrated ... | <urn:uuid:814cc2f0-565c-4b4e-bf79-ecc96784c208> | CC-MAIN-2024-38 | https://www.mariakorolov.com/2016/the-encryption-challenge/ | 2024-09-09T05:09:25Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651072.23/warc/CC-MAIN-20240909040201-20240909070201-00155.warc.gz | en | 0.952873 | 145 | 2.703125 | 3 |
With the advent of IP capable smart devices e.g. mobile phones, tablets etc. and easy internet access, there has been an exponential growth in data traffic. Cellular network operators have been trying to cope up with this ‘tsunami’ of data traffic by adopting new technological innovations like LTE. But it’s pretty much... | <urn:uuid:088fb4a1-26cf-44c5-80e0-f2e9baae9bc9> | CC-MAIN-2024-38 | https://www.hsc.com/resources/blog/lte-wifi-data-offload-a-brief-survey/ | 2024-09-15T06:28:54Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651616.56/warc/CC-MAIN-20240915052902-20240915082902-00555.warc.gz | en | 0.918255 | 865 | 2.671875 | 3 |
Have you ever been in a situation where you had to enter an email service’s Simple Mail Transfer Protocol (SMTP) port number? What number did you specify? 25? 587? 465? All three TCP port numbers are associated with SMTP. SMTP differs from other network protocols in a way that it’s associated with multiple port numbers... | <urn:uuid:37eb6566-4066-48a1-bb85-7a62b5bef706> | CC-MAIN-2024-38 | https://www.jscape.com/blog/smtp-ports | 2024-09-19T01:54:54Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651944.55/warc/CC-MAIN-20240918233405-20240919023405-00255.warc.gz | en | 0.919836 | 1,467 | 2.8125 | 3 |
A Virtual Private Network (VPN) has become an essential tool for internet users who care about their privacy and security. By creating an encrypted tunnel between your device and a remote server, a VPN allows you to browse the web, use public Wi-Fi, and access restricted content anonymously.
However, not all VPNs are c... | <urn:uuid:580e5a5f-0208-4478-8132-07afee38f9a3> | CC-MAIN-2024-38 | https://nirvanix.com/best-vpns/wireguard/ | 2024-09-20T06:53:08Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652138.47/warc/CC-MAIN-20240920054402-20240920084402-00155.warc.gz | en | 0.896085 | 1,429 | 2.625 | 3 |
First published October 2009
by Access Data
Historically, criminal or corporate investigations involving computer equipment began by immediately disconnecting any compromised machines from the network, powering them down, and securing them in a proper environment where they would be imaged and analyzed. The rationale f... | <urn:uuid:6c86f5cd-4f96-43c9-b8ec-811b32717a17> | CC-MAIN-2024-38 | https://www.forensicfocus.com/articles/the-importance-of-memory-search-and-analysis/ | 2024-09-08T02:51:51Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650958.30/warc/CC-MAIN-20240908020844-20240908050844-00355.warc.gz | en | 0.936242 | 2,443 | 2.75 | 3 |
Phishing remains pretty much synonymous with “cyber attacks” as bad actors work any angle they can to gain unauthorized access to sensitive data. One newer and more advanced form of phishing is in-session phishing, which can be harmful due to its ability to exploit active user sessions.
Here are the details.
What is In... | <urn:uuid:96df5311-b3dd-4a9a-8718-a252846abad0> | CC-MAIN-2024-38 | https://bolster.ai/blog/in-session-phishing-cybersecurity-threat | 2024-09-09T07:47:51Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651092.31/warc/CC-MAIN-20240909071529-20240909101529-00255.warc.gz | en | 0.928806 | 914 | 3.234375 | 3 |
In the landscape of modern manufacturing, the emergence of 3D printing stands as a colossal milestone, heralding an era where complexity in design equates to neither an increase in cost nor production time. This innovative method of additive manufacturing, which steadily accrued technological acumen since its inception... | <urn:uuid:df904fb3-cfcc-4e6f-ab9f-3e0b6ca824bb> | CC-MAIN-2024-38 | https://manufacturingcurated.com/manufacturing-technology/revolutionizing-industry-how-3d-printing-shapes-our-future/ | 2024-09-09T07:42:10Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651092.31/warc/CC-MAIN-20240909071529-20240909101529-00255.warc.gz | en | 0.916211 | 325 | 3.28125 | 3 |
With passwordless authentication becoming more commonplace, there is a need for standardization. One effort, called FIDO, is doing just that. Short for “Fast IDentity Online,” it aims to eliminate passwords by developing a set of standards to govern how passwordless authentication should work.
What is FIDO2
FIDO2 build... | <urn:uuid:1a5d30f4-eada-4c4f-a1ef-c19de0a28d67> | CC-MAIN-2024-38 | https://www.beyondidentity.com/glossary/fido2 | 2024-09-10T13:54:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651255.81/warc/CC-MAIN-20240910125411-20240910155411-00155.warc.gz | en | 0.909351 | 1,097 | 2.578125 | 3 |
As reported by James Glanz in the New York Times, and as noted in the newpaper's "Bits" technology blog, EBay has hatched plans to build a new data center that will draw its power from the green technology of fuel cells rather than the national power grid, as a means of reducing corporate dependence on harmful emission... | <urn:uuid:622b4fcf-9a5d-4cce-807a-4d39c1c9cd6d> | CC-MAIN-2024-38 | https://www.cablinginstall.com/home/article/16478326/ebay-data-center-to-be-powered-by-fuel-cell-technology | 2024-09-11T18:56:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00055.warc.gz | en | 0.95732 | 340 | 2.53125 | 3 |
Cloud analytics describes the application of analytic algorithms in the cloud against data in a private or public cloud to then deliver a result of interest. Cloud analytics involves deployment of scalable cloud computing with powerful analytic software to identify patterns in data and to extract new insights. More and... | <urn:uuid:ecb2aed6-d3d1-4d6a-8269-da74e1678108> | CC-MAIN-2024-38 | https://www.netapp.com/cloud-services/what-is-cloud-analytics/ | 2024-09-11T21:05:09Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00055.warc.gz | en | 0.925585 | 929 | 2.8125 | 3 |
At a Glance
- Some neural networks are now more similar to human cognition than ever before, according to a study published in Nature.
- A method called meta-learning for compositionality helps neural networks learn from a few tasks without special programming.
AI may be starting to think more like people.
In a recent ... | <urn:uuid:d6bbcab4-dcbe-47df-a79f-3e27b4abda71> | CC-MAIN-2024-38 | https://aibusiness.com/ml/how-neural-networks-can-think-like-humans-and-why-it-matters | 2024-09-14T05:25:17Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651548.18/warc/CC-MAIN-20240914025441-20240914055441-00755.warc.gz | en | 0.957961 | 1,173 | 3.609375 | 4 |
If you've ever delved into the world of artificial intelligence, you've probably heard of machine learning (ML). ML models allow computers to automatically learn from data and past experiences to identify patterns and make predictions with minimal human intervention, acting as the brains behind large language models (L... | <urn:uuid:aecc3d14-d59a-4a74-92fb-33995067a1ce> | CC-MAIN-2024-38 | https://em360tech.com/tech-article/what-is-machine-learning-ml | 2024-09-14T04:07:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651548.18/warc/CC-MAIN-20240914025441-20240914055441-00755.warc.gz | en | 0.935821 | 2,327 | 3.875 | 4 |
User-supplied compression routines must be stored in modules called USRDCnnn, where nnn is within the range 128 to 255.
To call a user-supplied routine, use the same syntax as for calling a Micro Focus routine, but use the filename USRDCnnn instead of CBLDCnnn where nnn must be a value in the range 128 through 255.
To ... | <urn:uuid:b5a950b8-c358-43a8-acbd-1861eeeb3947> | CC-MAIN-2024-38 | https://www.microfocus.com/documentation/visual-cobol/vc60/DevHub/BKFHFHCOMPS014.html | 2024-09-16T16:08:58Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.45/warc/CC-MAIN-20240916144317-20240916174317-00555.warc.gz | en | 0.902522 | 256 | 2.5625 | 3 |
A hypervisoris a software technology used in virtualization, which allows several operating systems to run side-by-side on a given piece of hardware.
Unlike conventional virtual-computing programs, a hypervisor runs directly on the target hardware’s “bare metal,” instead of as a program in another operating system. Thi... | <urn:uuid:037e2c94-a0e4-45b4-aafe-55268e45aaff> | CC-MAIN-2024-38 | https://www.datamation.com/applications/hypervisor/ | 2024-09-17T23:01:05Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651835.53/warc/CC-MAIN-20240917204739-20240917234739-00455.warc.gz | en | 0.939443 | 1,827 | 3.28125 | 3 |
You may often see .exe files but you may not know what they are. Is it the same as an executable file? The short answer is no. So what’s the difference?
What is an .exe file?
Exe in this context is a file extension denoting an executable file for Microsoft Windows. Windows file names have two parts. The file’s name, fo... | <urn:uuid:dbaa847d-78fc-4d60-8867-aec224548a8a> | CC-MAIN-2024-38 | https://www.malwarebytes.com/blog/news/2021/10/what-is-an-exe-file-is-it-the-same-as-an-executable | 2024-09-10T17:53:51Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651303.70/warc/CC-MAIN-20240910161250-20240910191250-00255.warc.gz | en | 0.938201 | 1,250 | 3.15625 | 3 |
High Availability Definition
High Availability (HA) describes systems that are dependable enough to operate continuously without failing. They are well-tested and sometimes equipped with redundant components.
“Availability” includes two periods of time: how much time a service is accessible, and how much time the syste... | <urn:uuid:cb072c6b-d997-447c-8d13-e2455b53e2b5> | CC-MAIN-2024-38 | https://avinetworks.com/glossary/high-availability/ | 2024-09-15T14:08:25Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651630.14/warc/CC-MAIN-20240915120545-20240915150545-00755.warc.gz | en | 0.931058 | 1,641 | 3.5625 | 4 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
SQL injection vulnerability in the Joomla! Bulletin Board (aka Joo!BB or com_joobb) component 0.5.9 for Joomla! allows remote attackers to execute arbitrary SQL commands via the forum parameter in a forum action to index.php.
CWE-89 - ... | <urn:uuid:eded6378-c9cd-47c7-a435-9495c49ec04c> | CC-MAIN-2024-38 | https://devhub.checkmarx.com/cve-details/cve-2008-2651/ | 2024-09-16T20:37:14Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651710.86/warc/CC-MAIN-20240916180320-20240916210320-00655.warc.gz | en | 0.795119 | 171 | 2.546875 | 3 |
Many distinct types of cryptocurrencies are already in use, and more are being added daily. The technology that underpins cryptocurrency enables institutions and individuals to conduct transactions without using banks, governments, or other intermediaries. However, as cryptocurrency prices rise, so does the risk of cyb... | <urn:uuid:f39c9fca-a062-4767-b16c-729b416ced63> | CC-MAIN-2024-38 | https://cybersguards.com/cyber-security-in-crypto/ | 2024-09-18T00:31:26Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651835.68/warc/CC-MAIN-20240918000844-20240918030844-00555.warc.gz | en | 0.934643 | 924 | 2.875 | 3 |
Professor Bhupendra Dev got an exciting delivery in May: an ultra-low temperature dilution refrigerator built by a Finnish company Bluefors. It suited Dev’s purposes perfectly. The device will, the professor explains, provide temperatures close to absolute zero (−273.15°C) — a stark contrast from the tropical climate o... | <urn:uuid:f1451f83-db36-446f-aded-be959396c9e7> | CC-MAIN-2024-38 | https://www.techmonitor.ai/hardware/quantum/how-india-became-the-hottest-date-in-quantum-computing | 2024-09-18T00:29:48Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651835.68/warc/CC-MAIN-20240918000844-20240918030844-00555.warc.gz | en | 0.955464 | 2,252 | 2.828125 | 3 |
YUV is a color space used in the process of color imaging and video. The term YUV represents a family of color spaces used in video signals and digital photography, where ‘Y’ stands for luminance (brightness) and ‘U’ and ‘V’ are chrominance (color) components. YUV color space separates the luminance from the color info... | <urn:uuid:074cbd18-37bd-4f54-8822-741b1083c96f> | CC-MAIN-2024-38 | https://www.ituonline.com/tech-definitions/what-is-yuv/ | 2024-09-20T14:22:10Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652278.82/warc/CC-MAIN-20240920122604-20240920152604-00355.warc.gz | en | 0.893849 | 835 | 3.375 | 3 |
AI Bias Isn't A Data Issue - It's A Diversity Issue
AI Bias Isn't A Data Issue - It's A Diversity Issue
May 8, 2019
by Ciarán Daly
LONDON - Bias is everywhere. It’s an issue that crosses the boundaries between culture, mindset, data, design, and system architecture. It spans from unconscious decisions to overt prejudic... | <urn:uuid:3e3fed7d-e91f-43f3-bb85-aff1f68a5d96> | CC-MAIN-2024-38 | https://aibusiness.com/responsible-ai/ai-bias-isn-t-a-data-issue-it-s-a-diversity-issue | 2024-09-09T15:55:49Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651103.13/warc/CC-MAIN-20240909134831-20240909164831-00455.warc.gz | en | 0.967751 | 2,362 | 2.578125 | 3 |
Nuclear quantum computing
(TheNextWeb) A trio of separate research teams from three different continents published individual papers indicating similar quantum computing breakthroughs recently. All three were funded in part by the US Army.
Tristan Greene, Editor of NextWeb’s Neural editor of The Next Web’s Neural delve... | <urn:uuid:5b17a65a-1668-4a68-acab-cd7578570c8c> | CC-MAIN-2024-38 | https://www.insidequantumtechnology.com/news-archive/nuclear-quantum-computing/ | 2024-09-12T02:34:13Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651420.25/warc/CC-MAIN-20240912011254-20240912041254-00255.warc.gz | en | 0.938934 | 497 | 3.03125 | 3 |
02 September 2024
Reading Time: 6 mins
02 September 2024
Reading Time: 6 mins
IoT Hardware and Connectivity Specialists
LinkedInEducation is emerging as a sector ripe for disruption through the adoption of device connectivity technologies such as IoT.
Although internet connectivity has long been a significant contribut... | <urn:uuid:43381707-2e4a-4295-bf89-7b5033c70218> | CC-MAIN-2024-38 | https://www.eseye.com/resources/blogs/smart-campuses-how-iot-is-revolutionizing-education/ | 2024-09-13T08:46:58Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651510.65/warc/CC-MAIN-20240913070112-20240913100112-00155.warc.gz | en | 0.940329 | 1,952 | 2.53125 | 3 |
“Technology, like art, is a soaring exercise of human imagination.”
– Daniel Bell
Did You Know
According to, approximately 1.07 billion AR device users existed by the end of 2022, and by the end of 2023 the numbers are predicted to go up to 1.4 billion. This gradually progressing train will only move further along so i... | <urn:uuid:ea36db0d-11d8-486e-bc71-a2f0d9faa2bd> | CC-MAIN-2024-38 | https://www.fingent.com/au/blog/augmented-reality-in-business/ | 2024-09-14T15:15:38Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651579.38/warc/CC-MAIN-20240914125424-20240914155424-00055.warc.gz | en | 0.949919 | 4,841 | 2.71875 | 3 |
U.S. Army Research Laboratory, March 21, 2018 — The scientists working at the U.S. Army Research Laboratory have found out a way to use brain-like computer architectures for a problem called as integer factorization. Once the brain functions of mammals are copied, the Army scientists would come up with a solution and e... | <urn:uuid:9b536193-bad3-44f4-a362-fb3bdb1bffdf> | CC-MAIN-2024-38 | https://www.ibsi-us.com/2018/04/neuromorphic-systems-help-to-tackle-integer-factorization/ | 2024-09-14T15:35:16Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651579.38/warc/CC-MAIN-20240914125424-20240914155424-00055.warc.gz | en | 0.96435 | 895 | 3.515625 | 4 |
Very few subjects in science and technology are causing as much excitement right now as artificial intelligence (AI). In a lot of cases this is good reason, as some of the world’s brightest minds have said that it’s potential to revolutionise all aspects of our lives is unprecedented.
On the other hand, as with anythin... | <urn:uuid:ac464a45-d9e3-4899-9200-4e4d76e64e2f> | CC-MAIN-2024-38 | https://bernardmarr.com/5-myths-about-artificial-intelligence-ai-you-must-stop-believing/ | 2024-09-16T22:06:35Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00755.warc.gz | en | 0.971622 | 1,312 | 2.859375 | 3 |
Navigating the complex world of cybersecurity compliance is more important than ever. With cyber attacks evolving rapidly, organizations need to ensure their systems, processes, and Data Management practices align with strict regulations.
But compliance isn’t just about avoiding penalties; in cybersecurity it’s about s... | <urn:uuid:7079f49b-53cf-457b-bc9d-3a5efaba3c98> | CC-MAIN-2024-38 | https://blog.invgate.com/cybersecurity-compliance | 2024-09-16T22:51:09Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00755.warc.gz | en | 0.919299 | 2,715 | 2.71875 | 3 |
You have two kinds of passwords you can create: General and Embedded.
A general password is a password that's created from the main Passwords section, and then usually linked as a related item to the relevant assets.
These passwords have many uses, but should always be used whenever you have a password that can be link... | <urn:uuid:96673c74-8fc5-4683-a543-dbad3002713b> | CC-MAIN-2024-38 | https://helpdesk.kaseya.com/hc/en-gb/articles/4407476049809-Choosing-between-general-and-embedded-passwords | 2024-09-19T10:29:58Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652028.28/warc/CC-MAIN-20240919093719-20240919123719-00555.warc.gz | en | 0.919509 | 399 | 3.328125 | 3 |
What is the HAZOP method?
HAZOP is primarily intended for industrial risk analysis. Conceptualised by the company Imperial Chemical Industries, it aims to ensure the safety of procedures.
Definition of HAZOP
“HAZOP” is the acronym for “HAZard and Operability study”. This tool is primarily used to assess the potential r... | <urn:uuid:45899aec-531c-4f7f-b6a8-4d35ad2ad99f> | CC-MAIN-2024-38 | https://www.c-risk.com/blog/hazop-methodology | 2024-09-19T11:39:31Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652028.28/warc/CC-MAIN-20240919093719-20240919123719-00555.warc.gz | en | 0.930806 | 2,072 | 3.15625 | 3 |
Applied AI – the application of AI technology in business, is skyrocketing. An Accenture report on AI revealed that 84% of business executives believe that AI adoption would drive their business growth. Applied AI empowers businesses with end-to-end process automation and continuous process improvement for greater prod... | <urn:uuid:bad7d892-922b-44a4-962e-35f46ef4ed47> | CC-MAIN-2024-38 | https://saxon.ai/blogs/applied-ai-is-a-rose-understand-the-thorny-challenges/ | 2024-09-20T17:53:07Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701419169.94/warc/CC-MAIN-20240920154713-20240920184713-00455.warc.gz | en | 0.931772 | 1,778 | 2.546875 | 3 |
Achieving Cybersecurity Excellence with NIST Compliant Incident Response
Businesses face an ever-increasing threat of cyberattacks and security breaches. To effectively address these risks and protect their valuable assets, businesses need a robust incident response framework. NIST (National Institute of Standards and ... | <urn:uuid:43956dd4-becf-4f32-a019-27e6682fc34a> | CC-MAIN-2024-38 | https://www.businesstechweekly.com/legal-and-compliance/nist/incident-response-nist/ | 2024-09-20T18:07:13Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701419169.94/warc/CC-MAIN-20240920154713-20240920184713-00455.warc.gz | en | 0.923575 | 2,284 | 3.015625 | 3 |
Chances are that while browsing the internet, you’ve come across a box like this many times:
This little test is known as a CAPTCHA. But what exactly is this, and why do so many websites require you to complete it? Let’s find out.
What Is a CAPTCHA?
CAPTCHA is an acronym that stands for “Completely Automated Public Tur... | <urn:uuid:46481501-df21-421b-b35b-4ea5ee964255> | CC-MAIN-2024-38 | https://www.next7it.com/insights/what-is-captcha/ | 2024-09-11T00:05:21Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00455.warc.gz | en | 0.944428 | 1,004 | 3.609375 | 4 |
According to research by tech-specialist jobs board CWJobs, there’s a significant lack of role models within STEM (science, tech, engineering and maths), leaving many uninspired and without an identifiable route to pursue STEM careers.
When asked to identify famous STEM figures, those surveyed struggled to recognise th... | <urn:uuid:10abe0b7-5198-40a4-aeb9-bb37a2c7a83d> | CC-MAIN-2024-38 | https://www.information-age.com/study-addresses-the-lack-of-role-models-and-recognisable-women-in-stem-13972/ | 2024-09-12T05:40:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651422.16/warc/CC-MAIN-20240912043139-20240912073139-00355.warc.gz | en | 0.953228 | 663 | 3 | 3 |
What is 6G?
6G is the name for the sixth generation of cellular networks, which will deliver truly omnipresent wireless intelligence. Expected to become available early in the 2030s, the 6G research journey is already well underway.
The vision for 6G is built on the desire to create a seamless reality where the digital... | <urn:uuid:d72a0ac4-74ea-4565-bcb4-ddffd51e90b4> | CC-MAIN-2024-38 | https://www.ericsson.com/en/6g?utm_medium=referral&utm_source=3bl-content-partners&utm_campaign=mana_3BL_sustainability_20210901&utm_content=blog | 2024-09-13T12:16:22Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651513.89/warc/CC-MAIN-20240913101949-20240913131949-00255.warc.gz | en | 0.920109 | 2,852 | 2.75 | 3 |
ISTQB – CTFL Certified Tester Foundation Level – Test Management
1. Risk And Testing [CC]
Risk and Testing we have mentioned before how risk is an important factor in the testing activity. We base our testing efforts upon the amount of risk in delivering the product to early. If the risk is high, then we need to spend ... | <urn:uuid:bcbf9de6-1070-49d3-92d8-174f850ff7fc> | CC-MAIN-2024-38 | https://www.examcollection.com/blog/istqb-ctfl-certified-tester-foundation-level-test-management/ | 2024-09-13T12:34:57Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651513.89/warc/CC-MAIN-20240913101949-20240913131949-00255.warc.gz | en | 0.944968 | 7,820 | 2.578125 | 3 |
This Week’s Topic: CRAC Units
Are you on the hunt for colocation and have a long list of “must haves?” We’re here to make your search easier. For the next few segments, we are going to break down important aspects of our data center space here at 165 Halsey Street. Today we are talking about cooling; specifically, we’l... | <urn:uuid:c071d3d9-5456-4562-a527-f854215552ac> | CC-MAIN-2024-38 | https://www.165halsey.com/the-search-for-the-perfect-data-center-space-this-weeks-topic-crac-units/ | 2024-09-14T16:24:23Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651580.73/warc/CC-MAIN-20240914161327-20240914191327-00155.warc.gz | en | 0.926094 | 671 | 2.828125 | 3 |
We've got some bad news: Internet crime is on the rise. Hackers and scammers are adept at infiltrating corporate networks, stealing data and fooling individuals into sharing their more personal information. In turn, this can lead to financial disaster for many organizations.
But we also have some good news! You can pre... | <urn:uuid:434518ed-f967-4d45-933b-a90b1cdd9829> | CC-MAIN-2024-38 | https://www.cyberpolicy.com/cybersecurity-education/the-new-normal-internet-crime-climbing-site-security-flat-lining | 2024-09-14T18:38:41Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651580.73/warc/CC-MAIN-20240914161327-20240914191327-00155.warc.gz | en | 0.944995 | 586 | 2.53125 | 3 |
Cybersecurity Resource Center- Cybersecurity is an exciting field to work in. It necessitates a high level of technical knowledge and experience, primarily with computer code, data structures, and network architecture. However, it also necessitates other professional abilities such as critical thinking, problem-solving... | <urn:uuid:bb8f8412-4fd9-48d6-81cd-933ddc7153e2> | CC-MAIN-2024-38 | https://cybersguards.com/cybersecurity-resource-center/ | 2024-09-15T22:28:27Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651668.26/warc/CC-MAIN-20240915220324-20240916010324-00055.warc.gz | en | 0.945622 | 1,369 | 2.921875 | 3 |
The industrial revolution didn’t arise out of nowhere, and it didn’t arise everywhere. It was made possible by the emergence of a set of personal values that came to be known as the “work ethic.”
The idea behind this meme — inconceivable 400 years ago — is that hard work is good for its own sake. Hard work makes you a ... | <urn:uuid:5b504ea7-1df9-4cda-a9b2-3afc77f93440> | CC-MAIN-2024-38 | https://www.datamation.com/trends/hard-work-is-dead-call-it-work-ethic-2-0/ | 2024-09-15T22:36:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651668.26/warc/CC-MAIN-20240915220324-20240916010324-00055.warc.gz | en | 0.960336 | 1,092 | 2.640625 | 3 |
Is Your Network Haunted by Old Cyber Threats?
Most business owners, managers, and (especially) IT security teams are well aware that they face a near-constant stream of cyber threats. Every day, malicious actors work to create new attack methods and strategies to steal sensitive data or compromise networks. However, wh... | <urn:uuid:fdc02047-2a70-438a-833f-6d5dd7809815> | CC-MAIN-2024-38 | https://www.compuquip.com/blog/network-haunted-by-old-cyber-threats | 2024-09-17T03:13:00Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651722.42/warc/CC-MAIN-20240917004428-20240917034428-00855.warc.gz | en | 0.952523 | 947 | 2.609375 | 3 |
The U.S. government has been pushing people to avoid SMS- and voice call-based multi-factor authentication (MFA) for years, but their most recent warning is to avoid any MFA that is overly susceptible to phishing. That is only common sense (since most data breaches involve social engineering), but what MFA types do the... | <urn:uuid:5036b705-fbbf-43f1-9f44-7a5b2f81cbd3> | CC-MAIN-2024-38 | https://blog.knowbe4.com/u.s.-government-says-to-use-phishing-resistant-mfa | 2024-09-19T13:54:06Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652031.71/warc/CC-MAIN-20240919125821-20240919155821-00655.warc.gz | en | 0.959238 | 3,465 | 2.53125 | 3 |
Is it illegal to throw away electronics? Is it illegal to throw away computers? As a consumer, chances are you’ve thought this question before. The answer is not as nuanced as you may think.
If you’re like a lot of consumers, chances are you replace your electronics every few years. While some people toss their old sma... | <urn:uuid:518b6568-2012-4515-802d-462bf50f1ee5> | CC-MAIN-2024-38 | https://www.ewaste1.com/is-it-illegal-to-throw-away-electronics/ | 2024-09-19T13:01:13Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652031.71/warc/CC-MAIN-20240919125821-20240919155821-00655.warc.gz | en | 0.953546 | 2,251 | 2.78125 | 3 |
A Wide-Area Network (WAN) is an extensive telecommunications network that extends over a large geographical area. Unlike a Local Area Network (LAN) that is confined to a limited space like an office building, a WAN connects disparate LANs, enabling businesses and individuals to communicate and share data over long dist... | <urn:uuid:a322e28c-d511-4035-81f2-c039917560ae> | CC-MAIN-2024-38 | https://purple.ai/blogs/what-is-a-wide-area-network-and-how-does-it-work/ | 2024-09-07T13:20:12Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650883.10/warc/CC-MAIN-20240907131200-20240907161200-00019.warc.gz | en | 0.899784 | 2,519 | 3.703125 | 4 |
Definition: PID Controller
A PID Controller, standing for Proportional-Integral-Derivative Controller, is a control loop mechanism that uses feedback to regulate processes, systems, or machines. It combines three distinct strategies — proportional, integral, and derivative control — to provide precise and stable contro... | <urn:uuid:c90d560b-0fc6-44d2-a301-cd1cafaf83c8> | CC-MAIN-2024-38 | https://www.ituonline.com/tech-definitions/what-is-a-pid-controller/ | 2024-09-07T14:14:34Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650883.10/warc/CC-MAIN-20240907131200-20240907161200-00019.warc.gz | en | 0.903677 | 1,022 | 3.5625 | 4 |
Networks must meet the current needs of organizations and be able to support emerging technologies as new technologies are adopted. Network design principles and models can help a network engineer design and build a network that is flexible, resilient, and manageable.
This chapter introduces network design concepts, pr... | <urn:uuid:1c410ccb-76b2-40d1-83b1-34eecf78d476> | CC-MAIN-2024-38 | https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=3 | 2024-09-09T21:30:16Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651157.15/warc/CC-MAIN-20240909201932-20240909231932-00719.warc.gz | en | 0.939456 | 87 | 3.015625 | 3 |
Polymorphic phishing is an advanced form of phishing that randomizes components of an email, creating many subtly different versions of the same attack. The aim is to bypass email filters that rely on blacklists or signature-based detection, as if an element of an email is identified as malicious, that element will be ... | <urn:uuid:8c00c18c-1adb-41e0-a345-ad0bdd483109> | CC-MAIN-2024-38 | https://www.egress.com/blog/phishing/what-is-polymorphic-phishing | 2024-09-09T20:46:45Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651157.15/warc/CC-MAIN-20240909201932-20240909231932-00719.warc.gz | en | 0.935783 | 851 | 3.015625 | 3 |
Safeguarding business assets and information and ensuring the safety of team members should be two of the highest priorities of any business. According to BusinessWire, the value of the investigation and security services market will climb as high as $417.16 billion by 2025. But it’s still challenging for security team... | <urn:uuid:396c4bb4-a7d1-4abb-8488-a2f3e9b7b09f> | CC-MAIN-2024-38 | https://www.iotforall.com/improving-the-security-of-business-systems-with-computer-vision | 2024-09-09T22:47:52Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651157.15/warc/CC-MAIN-20240909201932-20240909231932-00719.warc.gz | en | 0.932794 | 1,242 | 2.6875 | 3 |
Pentesting 101: Getting in with Social Engineering
Penetration testing is all about using the tools you have at your disposal for their intended purposes or chained together to meet a larger objective. On a penetration test, more often than not, you will need to access a network discreetly and will not be provided acce... | <urn:uuid:81ce04ec-dde2-4755-9d38-d591bc2d6f41> | CC-MAIN-2024-38 | https://ine.com/blog/pentesting-101-getting-in-with-social-engineering | 2024-09-12T07:59:49Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651440.11/warc/CC-MAIN-20240912074814-20240912104814-00519.warc.gz | en | 0.966331 | 1,701 | 2.609375 | 3 |
Modern data centers are devouring more energy than ever, with the kilowatt consumption per rack rising into the double or even triple digits as genomic research, cryptocurrency mining and high-density compute systems make their way into data centers.
Unfortunately, most data centers are not geared towards energy effici... | <urn:uuid:8ffaeb2f-1bd6-4047-8ee9-e3adf6977206> | CC-MAIN-2024-38 | https://www.datacenterdynamics.com/en/analysis/addressing-rising-data-center-energy-demand/ | 2024-09-14T20:32:43Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651580.74/warc/CC-MAIN-20240914193334-20240914223334-00319.warc.gz | en | 0.957718 | 863 | 2.953125 | 3 |
As it develops and gains more and more use cases, the Internet of Things (IoT) continues to generate unprecedented amounts of data, making control of access to it increasingly important for companies.
According to the International Data Corporation (IDC), there is set to be over 41.6 billion IoT devices generating almo... | <urn:uuid:8b326f09-cbd0-4975-940c-9cd2aa593aff> | CC-MAIN-2024-38 | https://www.information-age.com/how-control-access-iot-data-16053/ | 2024-09-16T02:00:50Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651668.29/warc/CC-MAIN-20240916012328-20240916042328-00219.warc.gz | en | 0.938918 | 1,101 | 2.59375 | 3 |
PENETRATION TESTING Q&A
Q. What is penetration testing?
A. Penetration testing, or pen testing, is a simulated, authorized cyber-attack on a computer system performed to examine its resilience to security vulnerabilities. Pen testing may involve an attempted breach of application systems (e.g., APIs, back-end/front-end... | <urn:uuid:d452233b-6280-4527-858c-06278852b213> | CC-MAIN-2024-38 | https://www.komodosec.com/penetration-testing-faqs | 2024-09-16T01:59:45Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651668.29/warc/CC-MAIN-20240916012328-20240916042328-00219.warc.gz | en | 0.943137 | 1,724 | 2.9375 | 3 |
Penetration Testing Services Cloud Pentesting Penetration Network Pentesting Application Pentesting Web Application Pentesting Social Engineering April 23, 2021 HIPAA Security Rule for dummies HIPAA (Health Insurance Portability and Accountability Act) is a 1996 federal law that seeks to protect the medical information... | <urn:uuid:5ec253a6-e53e-4187-93e0-130e09b8a464> | CC-MAIN-2024-38 | https://www.breachlock.com/resources/aws-penetration-testing/hipaa-security-rule-for-dummies/ | 2024-09-17T08:06:17Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651750.27/warc/CC-MAIN-20240917072424-20240917102424-00119.warc.gz | en | 0.918069 | 1,099 | 2.859375 | 3 |
What is KM? Knowledge Management Explained
The classic one-line definition of Knowledge Management was offered up by Tom Davenport early on (Davenport, 1994): “Knowledge Management is the process of capturing, distributing, and effectively using knowledge.” Probably no better or more succinct single-line definition has... | <urn:uuid:3f7b4f55-ae87-4461-9369-a8c054b47ae3> | CC-MAIN-2024-38 | https://www.kmworld.com/About/What_is_Knowledge_Management | 2024-09-17T09:57:23Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651750.27/warc/CC-MAIN-20240917072424-20240917102424-00119.warc.gz | en | 0.957622 | 8,806 | 2.90625 | 3 |
Quantum Semiconductors Developed by Pritzker Researchers
(ChicagoMaroon) A recent study led by doctorate students at the Pritzker School of Molecular Engineering demonstrated that a semiconducting material common in classical electronics can reliably transfer and store information from one quantum device to another.
To... | <urn:uuid:fcc0c98b-701c-4c1d-b0c2-96ebb75c3ec9> | CC-MAIN-2024-38 | https://www.insidequantumtechnology.com/news-archive/quantum-semiconductors-developed-by-pritzker-researchers/ | 2024-09-18T15:04:16Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651899.75/warc/CC-MAIN-20240918133146-20240918163146-00019.warc.gz | en | 0.952184 | 263 | 3.46875 | 3 |
What do you think when you hear digital trust? Digital trust is often related to online activities, but its true definition isn’t entirely clear to many.
Ascertia is a global leader in high-trust products and services. Alongside our global community of partners, we help companies to establish and maintain long-term dig... | <urn:uuid:4c3063c3-6f45-40c4-8b78-0ff1ded3c74a> | CC-MAIN-2024-38 | https://blog.ascertia.com/what-is-digital-trust | 2024-09-19T16:31:16Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652055.62/warc/CC-MAIN-20240919162032-20240919192032-00819.warc.gz | en | 0.932954 | 838 | 3.046875 | 3 |
Dr. Shashi Phoha, director of the Information Technology Laboratory at the National Institute of Standards and Technology, said she thinks that the growth of VOIP technology brings with it some significant risks that users need to be prepared to address.
“The vulnerabilities are severe,” she said, pointing to a list th... | <urn:uuid:89cecb85-1f29-4bd3-8211-83bdd7308df5> | CC-MAIN-2024-38 | https://www.eweek.com/networking/severe-vulnerabilities-are-possible-in-voip-official-warns/ | 2024-09-11T05:45:21Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651344.44/warc/CC-MAIN-20240911052223-20240911082223-00719.warc.gz | en | 0.97451 | 513 | 2.765625 | 3 |
Artificial intelligence (AI) offers significant advancements in healthcare, but its environmental impact cannot be ignored. The combination of massive data processing and intensive computational needs can lead to a considerable carbon footprint within the healthcare industry. The urgency to address these environmental ... | <urn:uuid:14ef36d8-f828-4e5a-a6d8-303dd0f18f72> | CC-MAIN-2024-38 | https://energycurated.com/infrastructure-and-technology/healthcares-path-to-sustainable-ai-balancing-innovation-and-environment/ | 2024-09-12T12:08:08Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651457.35/warc/CC-MAIN-20240912110742-20240912140742-00619.warc.gz | en | 0.917729 | 1,368 | 3.34375 | 3 |
In 1959, the Council of Europe set up the European Court of Human Rights. The court hears cases against any of the 49 member states of the council that have been accused of violating its Convention on Human Rights.
The court makes 60 years’ worth of court rulings, comprising 90,000 documents, available online. These ar... | <urn:uuid:618b8396-0b39-4db4-b403-ac7c6bf382fa> | CC-MAIN-2024-38 | https://www.information-age.com/echr-upgrades-web-search-to-make-court-rulings-accessible-27286/ | 2024-09-12T13:15:43Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651457.35/warc/CC-MAIN-20240912110742-20240912140742-00619.warc.gz | en | 0.978708 | 699 | 2.546875 | 3 |
Endpoint encryption protects data on laptops, desktops, mobile devices, and servers from unauthorized access, even if the device is lost or stolen. Businesses must implement encryption to safeguard sensitive data like customer information, financial data, and intellectual property, as compromising this data can have se... | <urn:uuid:053364e1-7867-4b68-9f0c-0a7dc168e5f6> | CC-MAIN-2024-38 | https://blog.charlesit.com/encryption-best-practices-5-things-you-need-to-know | 2024-09-14T23:41:42Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651601.85/warc/CC-MAIN-20240914225323-20240915015323-00419.warc.gz | en | 0.931324 | 1,326 | 3.453125 | 3 |
Your internet search and browsing history can be seen by search engines, web browsers, websites, apps and hackers. You should protect your search and browsing history
In many households, back-to-school looks very different this year. Instead of backpacks and new clothes, students need laptops and webcams. Instead of wo... | <urn:uuid:591bd0af-a0c0-466a-9040-0c99890211da> | CC-MAIN-2024-38 | https://www.keepersecurity.com/blog/2020/08/31/back-to-school-2020-8-cybersecurity-tips-for-parents/ | 2024-09-15T01:18:38Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651601.85/warc/CC-MAIN-20240914225323-20240915015323-00419.warc.gz | en | 0.943736 | 1,275 | 3.03125 | 3 |
With 70% of businesses sharing sensitive information during fake calls, vishing is one of the emerging threats firms must be aware of.
What is Vishing?
It is a form of social engineering attack in which a fraudster uses phone calls or Voice over Internet Protocol (VoIP) technology to trick victims into sharing sensitiv... | <urn:uuid:af125c94-ec26-496e-bae0-c4a08e74200a> | CC-MAIN-2024-38 | https://itsecuritywire.com/featured/vishing-the-latest-version-of-phishing-attack-tactics/ | 2024-09-16T05:15:33Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651676.3/warc/CC-MAIN-20240916044225-20240916074225-00319.warc.gz | en | 0.91538 | 1,139 | 2.921875 | 3 |
Friday Fun Blog: High-Definition Space Edition
November 4, 2016Come Together, America
November 7, 2016and How to Avoid the Same Happening to You
In the weeks before the presidential election, thousands of hacked Democratic emails have been published by Wikileaks. These leaks could have the potential to change the outco... | <urn:uuid:3b036a5c-ac35-45e4-a6b4-f7b3c0c40f74> | CC-MAIN-2024-38 | https://www.colocationamerica.com/blog/how-the-wikileaks-were-stolen-how-to-avoid-it-yourself | 2024-09-18T19:19:08Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00119.warc.gz | en | 0.975873 | 1,423 | 2.640625 | 3 |
Trends in data storage are changing at an exponential rate. The past few years alone have seen the progression of data storage from large servers with magnetic media to cloud-based infrastructure with increasingly dense solid state media. Along with every technological advancement in data storage has come the inexorabl... | <urn:uuid:3449e21d-0c9c-4f9e-b0f2-3764ff440d4a> | CC-MAIN-2024-38 | http://sem.artefactdesign.com/the-importance-of-the-nist-800-88-standard-for-media-sanitization-in-secure-data-destruction/ | 2024-09-21T02:49:48Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701427996.97/warc/CC-MAIN-20240921015054-20240921045054-00819.warc.gz | en | 0.932787 | 1,881 | 2.640625 | 3 |
The nine principles are designed to ensure the safe and responsible use of data, especially personally identifiable information like medical data. With the increased use of data, particularly during COVID-19 response, comes thorny issues of how that data is used, protected and accessed, which the new principles aim to ... | <urn:uuid:b7389c0d-44ab-455a-8010-ebc5e5fc4326> | CC-MAIN-2024-38 | https://develop.fedscoop.com/va-new-data-ethics-principles/ | 2024-09-10T06:58:55Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-00019.warc.gz | en | 0.941855 | 527 | 2.6875 | 3 |
We have been watching the growth of drones in the sky and the FAA and states’ attempts to regulate them. Now we will start watching the growth of underwater drones.
The USS North Dakota submarine sailed into Groton, Connecticut earlier this week following a two-month deployment to the Mediterranean Sea. Why is this new... | <urn:uuid:b301384b-25c7-4b71-ae45-58e5e9c5b2b2> | CC-MAIN-2024-38 | https://www.dataprivacyandsecurityinsider.com/2015/07/u-s-navy-first-to-launch-and-recover-underwater-drone-in-military-operation/ | 2024-09-10T07:37:30Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-00019.warc.gz | en | 0.966313 | 137 | 2.65625 | 3 |
You can spot a phishing website by checking the URL, looking at the website’s content, reading reviews of the website and using a password manager that
A Distributed Denial-of-Service (DDoS) attack is an attempt to disrupt the normal traffic of a targeted server. This is done by overwhelming the server, service or netw... | <urn:uuid:acd6b112-7ebe-490f-bad0-cc2348fc6164> | CC-MAIN-2024-38 | https://www.keepersecurity.com/blog/2022/09/30/what-is-a-ddos-attack/ | 2024-09-10T08:03:06Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-00019.warc.gz | en | 0.939259 | 1,728 | 3.34375 | 3 |
Mobile networks aren’t usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren’t known to be sources of spam (at least not yet)... | <urn:uuid:54e7155f-5ea3-4b95-b1e7-85b523b57658> | CC-MAIN-2024-38 | https://circleid.com/posts/20120502_spam_from_mobile_networks_who_woulda_thought | 2024-09-12T15:23:22Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651460.54/warc/CC-MAIN-20240912142729-20240912172729-00719.warc.gz | en | 0.951345 | 642 | 2.5625 | 3 |
In response to increasing ransomware attacks targeting U.S. educational institutions, the White House convened an inaugural cybersecurity summit this Tuesday. The malicious cyber onslaughts have led to the online leakage of confidential student data, ranging from medical files to reports on sexual assaults.
A report fr... | <urn:uuid:d7385f5b-9a00-46c7-b248-f927b16c7c2e> | CC-MAIN-2024-38 | https://circleid.com/posts/20230809-u.s-schools-targeted-in-ransomware-attacks-white-house-responds | 2024-09-15T04:04:10Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651614.9/warc/CC-MAIN-20240915020916-20240915050916-00519.warc.gz | en | 0.934243 | 297 | 2.609375 | 3 |
The world has witnessed the impact of artificial intelligence (AI) in diverse applications. AI in transportation has birthed the possibility of self-driven vehicles(with less or no human intervention). These autonomous vehicles offer mind-blowing driving experiences, including road safety, especially in populous nation... | <urn:uuid:e339dff4-6e4f-44fd-bd59-ecda43e65c73> | CC-MAIN-2024-38 | https://www.aitimejournal.com/best-autonomous-vehicles-courses-2023/44527/ | 2024-09-16T08:43:07Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651682.69/warc/CC-MAIN-20240916080220-20240916110220-00419.warc.gz | en | 0.914083 | 1,496 | 2.578125 | 3 |
A new way for the artificial induction rain
With a harsh, hot desert climate, and rainfall reaching just 10 million a year, the UAE is thirsty for rainwater. In order to find a solution to the problem, they have turned to funding scientific research around the world, with the aim of controlling the rain.
One of the res... | <urn:uuid:8003198c-ef36-4100-b5ab-592ccbbc2649> | CC-MAIN-2024-38 | https://4imag.com/technology-of-creating-an-artificial-storm-using-drones/ | 2024-09-18T20:43:14Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651941.8/warc/CC-MAIN-20240918201359-20240918231359-00219.warc.gz | en | 0.957721 | 872 | 3.6875 | 4 |
By Ayesha Iqbal, IEEE senior member and engineering trainer at the Advanced Manufacturing Training Centre
Telecommunications has evolved considerably over the last few years. The five generations of cellular standards have provided consumers and businesses with greater network speed, capacity and capabilities with each... | <urn:uuid:beb54ea7-69a4-46d6-be7b-e7109f2dd6ba> | CC-MAIN-2024-38 | https://www.6gworld.com/exclusives/guest-post-the-next-network-evolution-6g-with-ai-and-robotics/ | 2024-09-18T21:25:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651941.8/warc/CC-MAIN-20240918201359-20240918231359-00219.warc.gz | en | 0.942129 | 1,290 | 3.0625 | 3 |
AI Case Study
Stanford researchers reduce heavy metal dose in MRIs using convolutional neural networks
Researchers at Stanford university are conducting research that aims to reduce the amount of gadolinium, a heavy metal, that remains in the body after an MRI scan. For this purpose the team trained convolutional neura... | <urn:uuid:673fc66a-798a-48b7-b667-27949bc660a1> | CC-MAIN-2024-38 | https://www.bestpractice.ai/ai-case-study-best-practice/stanford_researchers_reduce_heavy_metal_dose_in_mris_using_convolutional_neural_networks | 2024-09-07T23:27:58Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650926.21/warc/CC-MAIN-20240907225010-20240908015010-00319.warc.gz | en | 0.930568 | 652 | 3.03125 | 3 |
In any plumbing system there is an intended way for the water to flow. Backflow refers to water that flows in the wrong direction. This causes environmental problems, plumbing issues, and, in the case of fire sprinkler systems, delay the response time to a fire. In a fire protection system, backflow preventers rely on ... | <urn:uuid:2f974306-b119-47ee-a009-0321c599b829> | CC-MAIN-2024-38 | https://www.certasitepro.com/products-and-services/backflow-devices | 2024-09-07T22:53:04Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650926.21/warc/CC-MAIN-20240907225010-20240908015010-00319.warc.gz | en | 0.966836 | 290 | 3.359375 | 3 |
During recent years, industrial organizations are increasingly deploying digital technologies in order to automate and optimize their processes. In particular, in modern production shopfloors, technologies like Big Data, Artificial Intelligence and the Industrial Internet of Things, are combined with Cyber Physical Sys... | <urn:uuid:5267e004-ba6f-434f-9d6e-1aa63f32796d> | CC-MAIN-2024-38 | https://www.itexchangeweb.com/blog/learning-factories-empowering-workers-and-plants-for-the-future-of-work/ | 2024-09-10T10:42:34Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651241.17/warc/CC-MAIN-20240910093422-20240910123422-00119.warc.gz | en | 0.942766 | 1,383 | 2.859375 | 3 |
Global positioning systems (GPS) are in the crosshairs for quantum computing investment from the U.S. Air Force, breaking with broader investments globally by focusing on a narrow set of applications involving quantum devices and methods. So too are secure, low-power networks and on-device communications for quantum po... | <urn:uuid:32dbf629-905e-4942-9122-ef5122c60ac0> | CC-MAIN-2024-38 | https://www.nextplatform.com/2021/01/04/u-s-air-force-research-locates-possibilities-in-quantum-at-the-edge/ | 2024-09-12T19:55:27Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651491.39/warc/CC-MAIN-20240912174615-20240912204615-00819.warc.gz | en | 0.942361 | 886 | 2.6875 | 3 |
Can a Programming Language Reduce Vulnerabilities?
Rust offers a safer programming language, but adoption is still a problem despite recent signs of increasing popularity.
March 12, 2021
When Microsoft wanted to rewrite a security-critical network processing agent to eliminate memory-safety vulnerabilities causing recu... | <urn:uuid:da01957a-4ca2-4408-9b20-e2426b3f0b2c> | CC-MAIN-2024-38 | https://www.darkreading.com/application-security/can-a-programming-language-reduce-vulnerabilities- | 2024-09-14T01:36:49Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651540.77/warc/CC-MAIN-20240913233654-20240914023654-00719.warc.gz | en | 0.93857 | 1,325 | 2.953125 | 3 |
Studying both long term climate changes and shorter term weather forecasting is very demanding computationally, typically requiring high end HPC systems. Typically these days these would be large distributed memory clusters, made up of thousands of nodes and hundreds of thousands of cores, running MPI with Fortran and ... | <urn:uuid:393a4533-6ec3-473e-bb80-c76c9d953a67> | CC-MAIN-2024-38 | https://insidehpc.com/2016/01/how-hpc-is-helping-solve-climate-and-weather-forecasting-challenges/ | 2024-09-15T07:34:01Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651616.56/warc/CC-MAIN-20240915052902-20240915082902-00619.warc.gz | en | 0.946803 | 911 | 2.90625 | 3 |
In many cases a minimum and maximum retention time needs to be defined in a video surveillance systems due to legal requirements. While the minimum retention time defines the time period for how long video recordings need to be stored, the maximum retention time defines after which period of time the recordings have to... | <urn:uuid:0f7c48c8-8966-4dab-ae6d-33dfdf17190c> | CC-MAIN-2024-38 | https://community.boschsecurity.com/t5/Security-Video/VRM-random-recording-gaps-outside-the-protected-minimum/ta-p/11018 | 2024-09-17T18:01:21Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651829.57/warc/CC-MAIN-20240917172631-20240917202631-00419.warc.gz | en | 0.939722 | 980 | 2.53125 | 3 |
According to the European Digital Strategy, energy demand for data centres in Europe is set to steadily increase in the next decade in line with global temperatures.
The Met Office confirmed that 2022 was the UK’s hottest year on record, with an annual average temperature of over 10°C recorded for the first time. A rec... | <urn:uuid:c22b1fad-1b23-4e6d-b067-30e9f5984f0a> | CC-MAIN-2024-38 | https://datacentrereview.com/2023/03/cooling-data-centres-sustainably/ | 2024-09-08T02:47:30Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650958.30/warc/CC-MAIN-20240908020844-20240908050844-00419.warc.gz | en | 0.930956 | 686 | 3.5 | 4 |
You clicked on a simulated phishing test.
Don’t feel bad, phishing emails can be very tricky. But now you can see that phishing is a huge threat. Here are some tips to help you stay safer in the future
Tip #1: Don’t Panic
Phishing emails are designed to make you have an emotional response: fear, anger, worry. This is s... | <urn:uuid:4831694d-d591-4d1f-9883-105f892613f3> | CC-MAIN-2024-38 | https://ironcomet.com/phishing-simulation/ | 2024-09-10T14:00:20Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651255.81/warc/CC-MAIN-20240910125411-20240910155411-00219.warc.gz | en | 0.929779 | 335 | 2.59375 | 3 |
The 21st century has been the focal timeline to usher in a new era of hardware and software synergy. Digital devices are increasingly ingrained into holistic ecosystems, becoming an essential part of our lives and changing the way we do business. Organizations embarking on digital transformation must leverage reliable ... | <urn:uuid:d683f99c-75d2-45ab-b85c-ed0eef65c42d> | CC-MAIN-2024-38 | https://blog.equinix.com/blog/2022/11/22/is-ambient-computing-driving-the-extinction-of-hardware-devices-in-the-future/ | 2024-09-11T20:55:22Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00119.warc.gz | en | 0.921522 | 1,526 | 2.640625 | 3 |
Generative artificial intelligence
Generative artificial intelligence, or GenAI, is the term used to describe data-led algorithms (such as ChatGPT) that can be used to create new content, including audio, code, images, text, simulations, and videos. Recent accelerated developments in the field have created a tangible p... | <urn:uuid:1ec415e4-edc0-49c8-a451-5053299fdf9f> | CC-MAIN-2024-38 | https://www.cybsafe.com/blog/interlinking-genai-and-human-cyber-risk/ | 2024-09-11T21:12:41Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00119.warc.gz | en | 0.956489 | 1,436 | 2.859375 | 3 |
CompTIA CYSA+ CS0-002 – Enumeration Tools Part 2
3. Nmap Port Scans (OBJ 1.4)
Nmap port scans. So now that we’ve started and we’ve gone through and done our Discovery scans, we have now finished our footprinting. But we now need to start beginning our fingerprinting and learning information about individual hosts. One ... | <urn:uuid:9381cbfa-5e69-473e-8795-52c27e360f36> | CC-MAIN-2024-38 | https://www.examcollection.com/blog/comptia-cysa-cs0-002-enumeration-tools-part-2/ | 2024-09-11T20:38:38Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00119.warc.gz | en | 0.949836 | 4,254 | 2.625 | 3 |
You may be receiving an increase in spam calls if your phone number is on the dark web or people search sites, if you’ve answered spam
Not only can iPads get malware but so can the rest of your devices. Although the chances of your iPad getting malware are small, it is still possible. To understand exactly what the imp... | <urn:uuid:136d2509-9909-4cd0-9672-1d24e1d66cdc> | CC-MAIN-2024-38 | https://www.keepersecurity.com/blog/2024/06/28/can-ipads-get-malware/ | 2024-09-15T10:54:57Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651622.79/warc/CC-MAIN-20240915084859-20240915114859-00719.warc.gz | en | 0.917019 | 1,107 | 2.53125 | 3 |
By design, cloud computing services and the data centers in which they run have the potential to be more environmentally friendly than the onsite IT infrastructure they are intended to replace. Economies of scale make it possible for data center operators to provide companies with the same IT services that used to run ... | <urn:uuid:5255f210-178b-4f2a-bf0c-4b194875b7b8> | CC-MAIN-2024-38 | https://direct.datacenterdynamics.com/en/opinions/green-data-centers-the-key-to-energy-efficiency-in-a-digital-world/ | 2024-09-10T16:32:51Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651303.70/warc/CC-MAIN-20240910161250-20240910191250-00319.warc.gz | en | 0.950373 | 1,058 | 2.9375 | 3 |
Contact-Tracing Apps Must Respect Privacy, Scientists Warn
Trust Hinges on Transparency, 200 Top Scientists and Researchers Say in Open LetterAll digital contact-tracing apps for combating COVID-19 must be developed in an open and transparent manner, use Bluetooth, and allow users to opt in, 200 of the world's leading ... | <urn:uuid:36d546a9-52bb-47c9-8a06-d4bc6ba4abe5> | CC-MAIN-2024-38 | https://www.bankinfosecurity.asia/contact-tracing-apps-must-respect-privacy-scientists-warn-a-14147 | 2024-09-14T10:07:33Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651579.22/warc/CC-MAIN-20240914093425-20240914123425-00019.warc.gz | en | 0.955408 | 2,224 | 2.65625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.