text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Degaussing is a familiar word to those who work in the data destruction industry, military, or who work with magnetic media, but the science and history behind these machines may be lost to many. The truth is the concept of degaussing has been toyed with since the late 1800’s, and its implementation and uses have stret...
<urn:uuid:6f0a685d-60d2-4449-8d66-606aafa19e4b>
CC-MAIN-2024-38
http://sem.artefactdesign.com/the-history-and-science-of-degaussers/
2024-09-18T08:05:51Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651886.88/warc/CC-MAIN-20240918064858-20240918094858-00821.warc.gz
en
0.971735
907
3.640625
4
The Sarbanes-Oxley Act (known as SOX) went into effect in 2002 to protect shareholders and the general public from accounting errors and fraudulent practices of organizations. It was also tailored to improve the accuracy of corporate disclosures. SOX was drafted to improve corporate governance and accountability follow...
<urn:uuid:d2748bb8-012a-499a-a9bf-207454b67512>
CC-MAIN-2024-38
https://cymulate.com/blog/sox-compliance-now-includes-cybersecurity/
2024-09-18T08:39:56Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651886.88/warc/CC-MAIN-20240918064858-20240918094858-00821.warc.gz
en
0.955439
1,434
2.6875
3
You might be wondering what is perfdump in Android. The perfdump function could be defined as a “service” function built-in to the operating system. The perfdump function is able to collect various pieces of performance data from the web server’s internal statistics and display them in an ASCII format when a specific r...
<urn:uuid:5d46d6da-ef34-401f-afbe-c477fb0f2dae>
CC-MAIN-2024-38
https://heimdalsecurity.com/blog/what-is-perfdump-in-android/
2024-09-20T20:58:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701423570.98/warc/CC-MAIN-20240920190822-20240920220822-00621.warc.gz
en
0.888052
1,025
2.734375
3
Intel and Micron Technology on Thursday said they had shrunk NAND flash memory in size, which could help add more storage and features to smartphones or tablets. The flash memory, made using 20-nanometer process technology, will provide more dense storage than earlier flash chips made using older manufacturing technolo...
<urn:uuid:74f50e6f-dbf3-4de2-8e78-caa02cc6a17b>
CC-MAIN-2024-38
https://www.itworldcanada.com/article/intel-and-micron-shrink-nand-flash/43468
2024-09-08T15:44:07Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651013.49/warc/CC-MAIN-20240908150334-20240908180334-00885.warc.gz
en
0.943037
362
2.640625
3
Spear phishing is a type of email scam where cybercriminals pose as a trusted individual or organization in order to gain sensitive information from their target. This article will explain what spear phishing is, how it works, and how you can protect yourself from becoming a victim. What is spear phishing? Spear phishi...
<urn:uuid:33bd2356-acc6-4885-8333-52a3ad3152e4>
CC-MAIN-2024-38
https://cybersguards.com/what-is-spear-phishing/
2024-09-09T22:41:52Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651157.15/warc/CC-MAIN-20240909201932-20240909231932-00785.warc.gz
en
0.948771
894
3.0625
3
What is pharming? Pharming is a type of cyberattack involving the redirection of web traffic from a legitimate site to a fake site for the purpose of stealing usernames, passwords, financial data, and other personal information. When you type a URL into your browser’s address bar, like www.google.com for example, sever...
<urn:uuid:599ecf0a-bc2f-419b-86ca-210a7ef45f50>
CC-MAIN-2024-38
https://www.malwarebytes.com/pharming
2024-09-11T03:23:33Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651343.80/warc/CC-MAIN-20240911020451-20240911050451-00685.warc.gz
en
0.916988
1,649
3.078125
3
CPU – Central Processing Unit – the main processor in a server, desktop or laptop computer. It executes machine-level instructions and is a general purpose processor. There can be multiple processor cores inside a CPU, and these cores can execute in parallel. The cores can have multiple threads also executing instructi...
<urn:uuid:c0957ac8-022e-494e-ad61-309022182b83>
CC-MAIN-2024-38
https://blocksandfiles.com/2022/04/23/cpu/
2024-09-07T17:58:01Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650898.24/warc/CC-MAIN-20240907162417-20240907192417-00185.warc.gz
en
0.906819
83
3.890625
4
Virtualization enables you to use the full capacity of computer hardware by distributing its capabilities among many users or environments. In essence, it refers to the procedure of running a virtual instance of a computer system in a layer abstracted from the underlying hardware resources. This virtual instance is ref...
<urn:uuid:701442cd-4659-4051-9689-8a1e3a483fa0>
CC-MAIN-2024-38
https://www.enterprisenetworkingplanet.com/os/ibm-powervm-vs-oracle-vm-virtualbox/
2024-09-07T17:18:58Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650898.24/warc/CC-MAIN-20240907162417-20240907192417-00185.warc.gz
en
0.877456
1,271
2.546875
3
Definition of Polyvinyl Chloride (PVC) Cabling in the Network Encyclopedia. What is Polyvinyl Chloride (PVC) cabling? Polyvinyl Chloride cabling, or simply PVC, is a grade of network cabling that uses polyvinyl chloride (PVC) plastic for its outer protective insulating jacket. Polyvinyl chloride cabling is cheap and fl...
<urn:uuid:7c5cd96e-21d2-44ad-bd14-a79c5db32e54>
CC-MAIN-2024-38
https://networkencyclopedia.com/polyvinyl-chloride-pvc-cabling/
2024-09-11T05:48:55Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651344.44/warc/CC-MAIN-20240911052223-20240911082223-00785.warc.gz
en
0.935386
458
3.546875
4
Wearable Devices: Keep Data Privacy In Check Consumers, businesses and manufacturers can all help ensure that the privacy rights of wearables users are respected. Wearable devices are here: in bed, at home, on the street, and in the office. We often think of fitness bands and smartglasses, but wearables are proliferati...
<urn:uuid:fea657f2-3a26-4e26-bcd1-ba32e61cd548>
CC-MAIN-2024-38
https://www.informationweek.com/it-leadership/wearable-devices-keep-data-privacy-in-check
2024-09-11T05:36:07Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651344.44/warc/CC-MAIN-20240911052223-20240911082223-00785.warc.gz
en
0.95007
916
2.6875
3
We depend on security companies for several things. First and foremost, to provide the software and tools that help keep our own networks and data secure. Second, to be the front line of the latest security issues; while we may only know some companies by their AV software, most are also involved in research and detect...
<urn:uuid:3eed5971-3e83-4ef3-9fe2-15e83a6e6956>
CC-MAIN-2024-38
https://www.itbusinessedge.com/it-management/even-security-companies-get-breached/
2024-09-13T17:51:09Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651535.66/warc/CC-MAIN-20240913165920-20240913195920-00585.warc.gz
en
0.981022
560
2.65625
3
Do you remember the movie E.T, where E.T is essentially stranded on Earth until he assembles a makeshift communication device which sends a message to his spaceship to return to earth to retrieve him? How fortunate was it that his alien counterparts assumed the message was from him? I mean, who else on earth could have...
<urn:uuid:03967dc5-6d85-438a-9347-5bfd24da8fdc>
CC-MAIN-2024-38
https://www.keyfactor.com/blog/hey-there-its-me-understanding-the-importance-of-iot-device-identity/
2024-09-15T00:56:35Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651601.85/warc/CC-MAIN-20240914225323-20240915015323-00485.warc.gz
en
0.953949
253
2.78125
3
Getting to Know About InfiniBand The surge in HPC large models represented by ChatGPT in 2023 has significantly amplified the focus on InfiniBand technology. This is because the networks used by GPT models are built on InfiniBand, developed by NVIDIA. So, what exactly is InfiniBand? Why is it highly acclaimed? This art...
<urn:uuid:35fb4e58-5fae-4767-bd00-c5662965a74f>
CC-MAIN-2024-38
https://community.fs.com/article/getting-to-know-about-InfiniBand.html
2024-09-18T19:32:52Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00185.warc.gz
en
0.890335
1,894
3
3
The increasing use of the Internet as a platform and delivery mechanism for computing services appears to be an inexorable march. But two recent incidents gave pause for thought, and revealed that when Internet-scale systems fail it can be catastrophic. One of the central tenets of cloud computing is that a distributed...
<urn:uuid:a604ec69-6ee1-4ec2-8a2d-3e661c092b7c>
CC-MAIN-2024-38
https://www.information-age.com/black-swans-in-the-cloud-26334/
2024-09-21T02:56:28Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701427996.97/warc/CC-MAIN-20240921015054-20240921045054-00885.warc.gz
en
0.965301
722
2.515625
3
How To Use The "top" Command On a linux/unix system, using the "top" command can be very useful. Simply open a terminal (or ssh into your server) and run `top` **This is similar to running "htop" → top is the older command and it comes preinstalled on all Linux distros. htop is newer and it adds color and gives a more ...
<urn:uuid:7985a0e3-932c-4da6-90b7-97273d64df82>
CC-MAIN-2024-38
https://support.iriusrisk.com/hc/en-us/articles/13450624265117-Slow-Performance-Troubleshooting-High-Usage-Processes
2024-09-07T21:39:12Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00285.warc.gz
en
0.942795
645
2.703125
3
Linux might be free to download and install, and it might offer you freedoms that aren’t available from commercial software, but don’t let that fool you into thinking that everything about Linux is free. You might save money, but there are still hidden costs that need to be taken into account. The first cost is uncerta...
<urn:uuid:87e8c505-3b4a-4833-ac38-76afdb1df16d>
CC-MAIN-2024-38
https://www.datamation.com/open-source/the-hidden-costs-of-linux-ownership/
2024-09-09T03:02:27Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651053.52/warc/CC-MAIN-20240909004517-20240909034517-00185.warc.gz
en
0.959307
1,211
2.53125
3
How To Make Internet Voting Secure To be effective, an Internet voting system has to auditable every step of the way, a new study says. July 10, 2015 Public elections conducted over the Internet need to be end-to-end verifiable in order to be truly effective, a team of election officials, systems engineers, cryptograph...
<urn:uuid:24c5451b-0acb-4eb9-9b2d-552f5553959b>
CC-MAIN-2024-38
https://www.darkreading.com/cloud-security/how-to-make-internet-voting-secure
2024-09-10T07:53:30Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-00085.warc.gz
en
0.959902
932
2.578125
3
There are several useful network topologies for LAN and WAN construction. Here are 8 of the most common. 1. Single switch The most basic type of small office network is a single switch. It’s probably the fastest and most stable network you can build. But of course, it has the problem of being a massive single point of ...
<urn:uuid:20168e5e-1a62-4df3-89d8-062938d6633e>
CC-MAIN-2024-38
https://www.auvik.com/franklyit/blog/network-topologies-slideshare/
2024-09-11T09:55:21Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651383.5/warc/CC-MAIN-20240911084051-20240911114051-00885.warc.gz
en
0.909816
458
2.84375
3
Why Cybersecurity Awareness Is Important: It’s Crucial Today In today’s world, our lives are deeply connected to technology. This makes cybersecurity awareness very important. We use digital devices, online platforms, and cloud services a lot. This increases the risk of cyber threats to our personal and work lives. But...
<urn:uuid:118ed4c3-5e5d-4009-988b-f4c453e63174>
CC-MAIN-2024-38
https://arksolvers.com/why-cybersecurity-awareness-is-important/
2024-09-16T09:16:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651682.69/warc/CC-MAIN-20240916080220-20240916110220-00485.warc.gz
en
0.929133
2,530
2.859375
3
TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots takes you back to the first version of the Secure Sockets Layer (SSL) protocol, which was developed in 1995 by Netscape but nev...
<urn:uuid:04f2f695-4299-440c-9812-a505f2d98af4>
CC-MAIN-2024-38
https://www.helpnetsecurity.com/2020/04/06/tls-1-3-adoption/
2024-09-18T22:23:58Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651941.8/warc/CC-MAIN-20240918201359-20240918231359-00285.warc.gz
en
0.955517
1,264
3.0625
3
Automation is a big topic for companies, no matter the industry. Whether your job is in IT or another business area, you’re likely hearing about automating as a way of saving money, improving efficiencies, and removing inherent errors. Often, automation is a term that may be used only partially correctly. The term orch...
<urn:uuid:17237c79-1b21-4c75-902b-b390095bb4e9>
CC-MAIN-2024-38
https://www.bmc.com/blogs/it-orchestration-vs-automation-whats-the-difference/
2024-09-20T03:43:04Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00185.warc.gz
en
0.924552
2,439
2.9375
3
You'll have to change all of your passwords, and temporarily avoid any site known to be vulnerable. What should you know about Heartbleed, a recently uncovered security bug? The shortest version: You'll have to change all of your passwords, and temporarily avoid any site that is known to be vulnerable. That sounds a bi...
<urn:uuid:d20e73cd-171f-4c7d-96fd-642c2cdc68dc>
CC-MAIN-2024-38
https://www.nextgov.com/cybersecurity/2014/04/what-you-need-know-about-heartbleed-new-security-bug-scaring-internet/82183/?oref=ng-next-story
2024-09-14T00:59:05Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651540.77/warc/CC-MAIN-20240913233654-20240914023654-00785.warc.gz
en
0.965276
972
2.921875
3
Undoubtedly, the IoT has deeply embedded in our lives and everything we do. From smart speakers to smart homes, wearables to self driving cars, we directly or indirectly depend on IoT devices to reduce our workload. For instance, if we take the banking sector into account, various users employ different devices for exe...
<urn:uuid:af42a1b0-f9da-46a8-a1d1-45164421b79e>
CC-MAIN-2024-38
https://www.analyticssteps.com/blogs/do-you-know-the-iots-strategies-and-planning-structures-for-financial-services
2024-09-16T12:20:59Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.32/warc/CC-MAIN-20240916112213-20240916142213-00585.warc.gz
en
0.934577
2,054
2.84375
3
The technology sector faces a growing number of regulatory requirements, particularly in areas such as data privacy, cybersecurity, consumer protection, and intellectual property. Governments around the world are enacting and strengthening regulations to address the evolving digital landscape and its associated risks. ...
<urn:uuid:b05cb6ce-a0d7-4b58-b992-0e802a73f524>
CC-MAIN-2024-38
https://www.ciocoverage.com/key-objectives-of-handling-regulatory-compliance-in-technology/
2024-09-16T13:34:59Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.32/warc/CC-MAIN-20240916112213-20240916142213-00585.warc.gz
en
0.908076
547
3.125
3
AI is transforming the healthcare industry by leveraging machine learning and deep learning techniques to analyze medical data. With ultrasound, genomics, and computed tomography scans, AI accurately diagnoses diseases like Alzheimer’s, cancer, diabetes, and heart disease. By improving clinical systems and patient info...
<urn:uuid:7b94f875-3091-4364-9e12-4f6c88515820>
CC-MAIN-2024-38
https://disruptionhub.com/how-is-ai-used-to-detect-diseases/
2024-09-20T05:57:45Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652138.47/warc/CC-MAIN-20240920054402-20240920084402-00285.warc.gz
en
0.925438
2,226
3.3125
3
Rising Threats of Vishing (VoIP Phishing) and Voice Scam As we advance further into the digital age, Voice over Internet Protocol (VoIP) technology remains a critical component of modern communication systems. Vishing, sometimes known as phone scams, scam calls or voice fraud has emerged as a significant threat, with a...
<urn:uuid:84e18f00-9b52-41ee-9f9a-80620ac355bc>
CC-MAIN-2024-38
https://www.neuralt.com/news-insights/automated-spam-and-scam-calls-detection-using-machine-learning
2024-09-08T04:07:08Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650958.30/warc/CC-MAIN-20240908020844-20240908050844-00485.warc.gz
en
0.918604
1,468
2.65625
3
Along with cryptocurrency, the dark web is one of the biggest factors driving a surge in ransomware attacks. Although the dark web enables criminals, new methods like dark web monitoring could also protect against hackers. So what is dark web monitoring, and can it boost your cybersecurity? Introduction to the Dark Web...
<urn:uuid:567db26f-b4df-41b6-9ef0-c307c0356e86>
CC-MAIN-2024-38
https://www.beforecrypt.com/en/dark-web-monitoring/
2024-09-09T08:54:39Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651092.31/warc/CC-MAIN-20240909071529-20240909101529-00385.warc.gz
en
0.939928
963
2.9375
3
Address Resolution Protocol (ARP) attacking is the point at which an attacker sends distorted ARP messages over a local area network (LAN) to connect an attacker’s MAC address with the IP address of an authentic PC or server on the system. When the attacker’s MAC address is connected, the attacker can obtain any messag...
<urn:uuid:289d2aa7-882b-4c11-99d1-e64ea80f4fc6>
CC-MAIN-2024-38
https://www.hypr.com/security-encyclopedia/address-resolution-protocol-poisoning
2024-09-10T14:20:56Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651255.81/warc/CC-MAIN-20240910125411-20240910155411-00285.warc.gz
en
0.892322
216
3.265625
3
By Varun Babbar, MD (India & SAARC), Qlik We live in a world of data. Many aspects of our lives depend on it. Yet, many people are challenged by data literacy, unable to decipher the meaning hidden in plain sight. Meanwhile, machine automation is advancing at a rapid pace, so too is the public mistrust in AI and algori...
<urn:uuid:a2c91f9a-0aee-486f-972e-4d177541127d>
CC-MAIN-2024-38
https://www.enterpriseitworld.com/the-human-touch/
2024-09-11T20:30:03Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00185.warc.gz
en
0.970397
1,497
2.53125
3
For every business, from large organisations to smaller startup companies, data loss prevention (DLP) measures are a crucial element of security that must be continually employed. The aim of this process is to fully understand how data is being utilised, knowing where it is being sent or has gone to, and whether this u...
<urn:uuid:50a10c4b-2542-46d1-99ca-f062e05c1452>
CC-MAIN-2024-38
https://www.galaxkey.com/blog/the-key-data-loss-prevention-practices-you-should-consider/
2024-09-11T18:54:59Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00185.warc.gz
en
0.942612
596
2.578125
3
Wouldn’t it be awesome if playing video games ended up being actually healthy for you? Well, you’re in luck. A recent New York Times story reported on a new study indicating that playing simple video games apparently make your brain younger. According to the story, a simple video game requiring players to swerve around...
<urn:uuid:7e5cc3f6-f795-477a-b56b-6239596a558c>
CC-MAIN-2024-38
https://www.kloud9it.com/2014/07/maybe-those-video-games-wont-rot-your-brain/
2024-09-11T19:37:29Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00185.warc.gz
en
0.963245
229
2.9375
3
SD-WAN, or software-defined wide area network, is a wide area network that uses software to control network operations across different geographies. SD-WAN is the next evolutionary step from a traditional WAN network which connects local area networks (LANs) together using VPNs or routers and un on MPLS. WANs support a...
<urn:uuid:2ce16b39-7272-4a98-b2c2-948a10501a33>
CC-MAIN-2024-38
https://www.liveaction.com/glossary/sd-wan/
2024-09-13T02:51:14Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651506.7/warc/CC-MAIN-20240913002450-20240913032450-00085.warc.gz
en
0.909618
318
2.75
3
An expansion bus, a term often heard in the realm of computers, is an integral part of a computer system. It serves as a conduit, allowing information to travel between the various components within the system. What is an expansion bus? An expansion bus exists within the heart of the computer – the motherboard. Acting ...
<urn:uuid:9848467d-ec5d-4b3a-b061-d6eadfe70314>
CC-MAIN-2024-38
https://www.ninjaone.com/it-hub/endpoint-security/what-is-an-expansion-bus/
2024-09-13T01:25:26Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651506.7/warc/CC-MAIN-20240913002450-20240913032450-00085.warc.gz
en
0.933991
369
3.78125
4
USB drives, also known as thumb drives, have become a popular form for storing and transporting files from one computer to another. Their appeal lies in the fact that they are small, readily available, inexpensive, and extremely portable. However, these same characteristics make them attractive to attackers. Just look ...
<urn:uuid:725587f8-90aa-4d0a-978d-1440fe7d0031>
CC-MAIN-2024-38
https://mapolce.com/blog/dangers-usb-devices-securing-companys-data/
2024-09-19T03:42:00Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651981.99/warc/CC-MAIN-20240919025412-20240919055412-00485.warc.gz
en
0.953653
911
2.9375
3
This post is part of a series of articles about the GraphTech ecosystem. This is the second part. It covers the graph analytics landscape. The first part was about graph databases and the third part will list the existing graph visualization tools. Actors of the graph analytics landscape in 2019 This second layer is an...
<urn:uuid:f5b2bcae-939b-44cd-8f3a-7d970106e7a1>
CC-MAIN-2024-38
https://resources.experfy.com/bigdata-cloud/the-graphtech-ecosystem-2019-part-2-graph-analytics/
2024-09-19T05:01:21Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651981.99/warc/CC-MAIN-20240919025412-20240919055412-00485.warc.gz
en
0.936837
1,117
2.734375
3
Web development has evolved, thanks to Machine learning. Discover how. It seems like science fiction fantasies have become truth. We’re not living in a real-world anymore but in a futuristic world of people and robotic devices. What we were performing physically for decades, by using machines and computers, can now be ...
<urn:uuid:7ad37c90-1222-4cf4-b49f-ec2bc9f75ee6>
CC-MAIN-2024-38
https://itchronicles.com/artificial-intelligence/evolution-of-web-development-with-machine-learning/
2024-09-20T11:45:39Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652246.93/warc/CC-MAIN-20240920090502-20240920120502-00385.warc.gz
en
0.937669
1,478
2.828125
3
A professor at Brigham Young University (BYU) is working on a new facial recognition algorithm that matches facial features and facial expressions at the same time. The goal is to deliver two-factor authentication with a single product, while simultaneously providing strong liveness detection to guard against various f...
<urn:uuid:f3e76b75-374b-47ee-86f3-42af4312329a>
CC-MAIN-2024-38
https://findbiometrics.com/byu-professor-guards-adds-anti-spoofing-expression-recognition-biometric-system-031606/
2024-09-08T06:19:47Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650960.90/warc/CC-MAIN-20240908052321-20240908082321-00585.warc.gz
en
0.962074
561
2.609375
3
What is CSMA/CD? CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It refers to the means of media access, or deciding “who gets to talk” in an Ethernet network. A more elegant term for “who gets to talk” is to refer to the “media access method”, which, in this case, would be “CSMA/CD” Carrier ...
<urn:uuid:ec7ab9b5-8731-44e0-9dc4-39a6a4e5b2bb>
CC-MAIN-2024-38
https://www.liveaction.com/resources/blog-post/media-access/
2024-09-09T11:16:29Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651098.19/warc/CC-MAIN-20240909103148-20240909133148-00485.warc.gz
en
0.955625
333
3.09375
3
The wireless security landscape has remained largely unchanged since the development of Wi-Fi Protected Access (WPA/WPA2) in the early 2000s. However, in recent years the Wi-Fi alliance has made significant efforts to address long standing issues within these standards. In this entry I will shed some light on common in...
<urn:uuid:88e6e002-5edc-4829-a446-b4b0fc8841d1>
CC-MAIN-2024-38
https://www.depthsecurity.com/blog/securing-wireless-infrastructure-part-1/
2024-09-14T11:21:15Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651579.22/warc/CC-MAIN-20240914093425-20240914123425-00085.warc.gz
en
0.927207
1,394
2.703125
3
With the arrival of spring, the Biden administration is surging forward to finalize a series of significant environmental regulations, part of a broader initiative to counteract climate change and reinforce the United States’ environmental policy framework. This regulatory push signifies an active response to the envir...
<urn:uuid:a07a1308-c45e-4f95-86d5-cb26b84512c5>
CC-MAIN-2024-38
https://governmentcurated.com/policy-and-legislation/is-bidens-spring-agenda-cementing-environmental-protections/
2024-09-19T08:19:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651995.50/warc/CC-MAIN-20240919061514-20240919091514-00585.warc.gz
en
0.9037
315
2.90625
3
Requirement: | Notes: | Operating System: | Linux (various) | Installed Packages: | openssl tar | In order to create symmetric encrypted archive files, when public key encryption is not an option, archiving is required first. The process for creating secure archive files on a Linux system is as follows: 1. Copy the fil...
<urn:uuid:04f01f86-039c-41ba-838d-59e5d442df60>
CC-MAIN-2024-38
https://support.redshield.co/hc/en-gb/articles/207523393-Creating-Encrypted-tar-gz-Archives
2024-09-19T07:46:13Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651995.50/warc/CC-MAIN-20240919061514-20240919091514-00585.warc.gz
en
0.890233
249
2.890625
3
In recent years, the advent of large language models (LLMs) like GPT-4 has revolutionized the field of artificial intelligence (AI). These models, developed to enhance user interactions through chatbots, search engines, and other AI-driven applications, have significantly advanced how information is processed and prese...
<urn:uuid:ed9bfe6f-ed48-48bf-bd3c-b7703aa7f152>
CC-MAIN-2024-38
https://debuglies.com/2024/08/13/the-hidden-manipulation-how-indirect-prompt-injection-is-being-used-to-unfairly-influence-ai-driven-job-recruitment-systems/
2024-09-13T07:59:54Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651510.65/warc/CC-MAIN-20240913070112-20240913100112-00285.warc.gz
en
0.934643
4,826
2.5625
3
Organizations must develop strong password policies to prevent and combat destructive cyber attacks. As the number and breadth of cyber attacks and breaches increase each day, organizations must prioritize cybersecurity to prevent major damage to their infrastructure. These attacks often begin by a cyber criminal steal...
<urn:uuid:9c93bc8d-b91e-4175-b52c-d2a48b104cf5>
CC-MAIN-2024-38
https://cylera.com/tips-to-strengthen-your-password-policy/
2024-09-15T20:01:58Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651647.78/warc/CC-MAIN-20240915184230-20240915214230-00085.warc.gz
en
0.930389
1,117
3.203125
3
The dream of a single, universal memory for computers might become a reality sooner than we think thanks to GST467. Scientists have engineered an exciting new material named “GST467”, composed of germanium, antimony, and terbium. Used in an innovative structure called a superlattice, it could be the key to replacing bo...
<urn:uuid:c907a92c-08b1-4d1f-8068-2606cd03eb25>
CC-MAIN-2024-38
https://dataconomy.com/2024/02/14/what-is-universal-memory-and-gst467/
2024-09-16T22:13:28Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00885.warc.gz
en
0.919303
1,101
3.703125
4
In the dynamic world of network technology, ensuring uninterrupted and secure data transmission is more important than ever. One solution that stands out is optical fiber bypass, engineered to bolster network resilience, enhance security, and improve overall efficiency. What is Optical Fiber Bypass? Optical fiber bypas...
<urn:uuid:be2bc4f2-3f97-445d-a47d-ee75cd969cdf>
CC-MAIN-2024-38
https://lannerinc.com/news-and-events/eagle-lanner-tech-blog/understanding-optical-fiber-bypass-essential-advances-in-network-security-application
2024-09-16T23:55:20Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00885.warc.gz
en
0.910712
869
3.03125
3
As digital currencies soar in popularity, the importance of enhancing online security is becoming increasingly critical. Cryptocurrencies, despite their secure and decentralized nature, are vulnerable to the multitude of risks that plague the digital realm. The appeal of cryptocurrency exchanges, compounded by the surg...
<urn:uuid:716c5c38-6f51-4fc9-9e18-d1535b9ac740>
CC-MAIN-2024-38
https://networkingcurated.com/networking-technologies/how-do-vpns-protect-your-crypto-trading-and-payments/
2024-09-16T22:43:45Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00885.warc.gz
en
0.925942
2,382
2.65625
3
Just as electricity transformed the way industries operated, Artificial Intelligence (AI) is revolutionising how businesses function today. Electricity brought about increased efficiency, productivity, and new possibilities in manufacturing, transportation, and communication. Similarly, AI is introducing automation, da...
<urn:uuid:af548038-0b61-4a57-8c9c-317104540fd5>
CC-MAIN-2024-38
https://digitalwell.com/blogs/ai-and-business-comms-ethical-considerations/
2024-09-09T18:48:45Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651133.92/warc/CC-MAIN-20240909170505-20240909200505-00685.warc.gz
en
0.945022
915
2.9375
3
A relative file is a file in which each record is identified by its ordinal position in the file (record 1, record 2 and so on). This means that records can be accessed randomly as well as sequentially: Because records can be accessed randomly, access to relative files is fast. Although you can declare variable length ...
<urn:uuid:70f3d49b-89a3-4ed1-8382-c0ee39359239>
CC-MAIN-2024-38
https://www.microfocus.com/documentation/enterprise-developer/ed70/ED-VS2017/BKFHFHORGSS007.html
2024-09-11T00:33:42Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00585.warc.gz
en
0.905316
468
3.515625
4
Both hydrogen and oxygen are separated through this process and can leak through the battery vents and disperse into the surrounding environment. The combination of Hydrogen and oxygen/air can be explosive if there is enough Hydrogen build-up. The amount of Hydrogen produced depends on the size and number of batteries ...
<urn:uuid:d88535a0-5668-4aac-9591-01c564d71310>
CC-MAIN-2024-38
https://macurco.com/applications/batterycharging/
2024-09-14T18:10:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651580.73/warc/CC-MAIN-20240914161327-20240914191327-00285.warc.gz
en
0.929022
123
2.765625
3
Image: Getty Images (FilippoBacci) As the race to dominate the renewable energy sector accelerates, increased military posturing and geopolitical manoeuvring is likely in areas with major deposits. Image: Getty Images (Paul Souders) More extreme climate conditions are almost certain to test global resilience over the n...
<urn:uuid:2e892904-8e6c-47f3-bf03-3b181b8e5a3e>
CC-MAIN-2024-38
https://publications.dragonflyintelligence.com/strategic-outlook-2024/climate-change-read-more
2024-09-18T07:06:05Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651886.88/warc/CC-MAIN-20240918064858-20240918094858-00885.warc.gz
en
0.932648
436
3
3
In part 8 of this series we are going to unravel the mysteries of congestion management and its four main queuing methods. Congestion is the result of many factors and can occur in many places on the network. A few of the reasons for congestion are traffic aggregation points, network transit points, speed mismatches, o...
<urn:uuid:2a65976a-45b5-46da-b4dd-ef991be529b1>
CC-MAIN-2024-38
https://www.globalknowledge.com/ca-en/resources/resource-library/articles/qos-part-8-congestion-management/
2024-09-20T20:05:41Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701423570.98/warc/CC-MAIN-20240920190822-20240920220822-00685.warc.gz
en
0.919468
961
3.390625
3
Anomaly detection, also called outlier analysis, is the process of identifying unusual patterns, rare events, atypical behaviors, or outliers of a data set. These anomalies differ significantly from the rest of the data. Anomalies usually indicate problems, such as equipment malfunction, technical glitches, structural ...
<urn:uuid:c1646324-2a4d-4356-954e-72d51889bce8>
CC-MAIN-2024-38
https://www.collibra.com/us/en/blog/what-is-anomaly-detection
2024-09-09T18:25:02Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651133.92/warc/CC-MAIN-20240909170505-20240909200505-00726.warc.gz
en
0.896519
1,909
3.09375
3
A report of two new vulnerabilities named Meltdown and Spectre was published last Wednesday, January 3, 2018. It is a big deal because they are hardware vulnerabilities affecting pretty much everything with a silicon chip. Yes, this means microprocessors on workstations and servers, mobile phones, tablets, cloud servic...
<urn:uuid:1f1c1cc0-0048-4d89-9485-06c9bc568a6b>
CC-MAIN-2024-38
https://conetrix.com/blog/tag/alert
2024-09-11T00:34:38Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00626.warc.gz
en
0.92489
536
2.59375
3
A score applies either to devices or to users and it offers an evaluation of each object from one or several points of view. The value of a score depends thus on the status of the object with respect to a particular aspect or the combination of different aspects. In this way, scores reduce the complexity of low level a...
<urn:uuid:bcc9957c-5894-4bc0-b026-9ab64144b29f>
CC-MAIN-2024-38
https://docs-v6.nexthink.com/V6/6.29/computing-scores
2024-09-11T01:19:20Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00626.warc.gz
en
0.918157
728
2.578125
3
There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet population in Canada is the highest it has been, topping the charts at 33 million. That number is only expected to increase through the upcoming years. However, this growing number a...
<urn:uuid:68b05450-2f70-473e-893f-31c8c521f2f5>
CC-MAIN-2024-38
https://www.mcafee.com/blogs/internet-security/the-what-why-and-how-of-ai-and-threat-detection/
2024-09-10T23:10:48Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00626.warc.gz
en
0.925553
1,368
3.328125
3
In the context of mobile security, physical attacks involve any technique that gains unauthorized access to a device by touching it or physically interacting with it. Physical attacks usually have a relatively low barrier to entry, meaning unskilled attackers without security or programming knowledge can do it. Despite...
<urn:uuid:48411fa0-fba3-4613-a8b5-5c7b3c3ada72>
CC-MAIN-2024-38
https://armadillophone.com/blog/hacking-things-by-touching-them
2024-09-18T10:47:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651895.12/warc/CC-MAIN-20240918100941-20240918130941-00026.warc.gz
en
0.954241
2,718
2.796875
3
Data masking is a data security technique in which a dataset is copied but with sensitive data obfuscated. This benign replica is then used instead of the authentic data for testing or training purposes. What do I need to know about data masking? Data masking does not just replace sensitive data with blanks. It creates...
<urn:uuid:943ae7a2-6ba8-4dc6-a271-3bf088cb145d>
CC-MAIN-2024-38
https://www.informatica.com/nz/services-and-training/glossary-of-terms/data-masking-definition.html
2024-09-20T20:04:09Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701423570.98/warc/CC-MAIN-20240920190822-20240920220822-00726.warc.gz
en
0.927255
265
3.4375
3
Gravity, also known as gravitation, is an inherent natural phenomenon by means of which all celestial objects with kinetic or gravitational energy are attracted towards one another. In the Earth’s atmosphere, gravity provides the weight that keeps everything in place, including the air, the water, and the earth itself....
<urn:uuid:57a9c3b6-34e9-415b-a99e-0eead6e15bf1>
CC-MAIN-2024-38
https://bizdispatch.com/what-is-gravity/
2024-09-07T14:21:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650883.10/warc/CC-MAIN-20240907131200-20240907161200-00126.warc.gz
en
0.968152
856
4.25
4
Mainframes continue to be viable for enterprise computing due to their inherent capabilities for supporting the most critical business functions. When it comes to supporting large volumes of data, high-speed transaction processing, and secure computing the mainframe continues to excel. The Fortune 1000 relies upon main...
<urn:uuid:84937d69-8c1c-4321-a048-545364a7f4bd>
CC-MAIN-2024-38
https://cloudframe.com/three-reasons-it-makes-sense-to-convert-some-of-your-cobol-to-java/
2024-09-08T18:55:56Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651017.43/warc/CC-MAIN-20240908181815-20240908211815-00026.warc.gz
en
0.940716
1,444
2.515625
3
How Do I Remote Into Another Computer Using My IP Address?- These days, being able to access a computing device from a remote location is critical. In order to stay connected to corporate processes 24 hours a day, 7 days a week, businesspeople must invest in remote access technologies. To effectively establish a remote...
<urn:uuid:5b0a6225-2350-4a89-ac3b-eaed01717bc1>
CC-MAIN-2024-38
https://cybersguards.com/how-do-i-remote-into-another-computer-using-my-ip-address/
2024-09-09T21:28:26Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651157.15/warc/CC-MAIN-20240909201932-20240909231932-00826.warc.gz
en
0.944146
1,225
2.734375
3
Presidential rhetoric has long been a powerful tool in shaping public opinion and influencing policy, especially within the realm of K-12 education. This leverage can have a profound effect, not just on the policies in question but also on the degree of partisan division that surrounds these issues. The influence of pr...
<urn:uuid:a7109e50-551e-43e7-952d-586ec4813938>
CC-MAIN-2024-38
https://educationcurated.com/education-management/presidential-rhetoric-deepens-partisan-divides-in-k-12-education-policy/
2024-09-11T04:04:19Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651343.80/warc/CC-MAIN-20240911020451-20240911050451-00726.warc.gz
en
0.938331
1,776
3.21875
3
Routing - Distance-vector routing protocol use cases Distance vector routing protocols are a type of dynamic routing protocol which is used to exchange routing information between routing devices. Distance vector routing protocols like EIGRP and RIP are well suited for most network topologies, however, there are some u...
<urn:uuid:f61aa13a-86f6-47eb-b93f-dcb2e06cdb06>
CC-MAIN-2024-38
https://notes.networklessons.com/routing-distance-vector-routing-protocol-use-cases
2024-09-14T20:28:42Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651580.74/warc/CC-MAIN-20240914193334-20240914223334-00426.warc.gz
en
0.917664
289
3.546875
4
By 2010 there will be more than 3.5 billion mobile phone subscribers, 1 billion personal computers and 2 billion televisions in use around the world, according to the International Energy Agency (IEA), an energy policy advisor to 28 member countries. As the numbers of these devices increase, so, too, does the demand fo...
<urn:uuid:06f12aae-46a3-487a-b2ac-5b42d615bc9c>
CC-MAIN-2024-38
https://www.eweek.com/news/growing-mobile-phone-use-hurts-energy-security-iea-says/
2024-09-16T03:47:56Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651668.29/warc/CC-MAIN-20240916012328-20240916042328-00326.warc.gz
en
0.950148
742
2.609375
3
For many students, the overwhelming feeling after completing their rigorous high school courses is a relief. Relief that they’re finally done with school for the year, relief that they don’t have to deal with classes anymore, and relief that they can finally relax and enjoy their summer. However, for some students, thi...
<urn:uuid:39acef61-e43c-4693-8bb0-d51532ab5f21>
CC-MAIN-2024-38
https://cybersguards.com/how-to-bypass-school-firewall/
2024-09-19T22:14:57Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652067.20/warc/CC-MAIN-20240919194038-20240919224038-00026.warc.gz
en
0.955448
1,058
2.890625
3
In this video from the 2013 Hot Interconnects Conference, Toshihiro Hanawa presents: Interconnect for Tightly Coupled Accelerators Architecture. In recent years, heterogenious clusters using accelerators are widely used for high performance computing system. In such clusters, the inter-node communication among accelera...
<urn:uuid:f113a59a-797c-4634-ad8d-cdfcfc254f88>
CC-MAIN-2024-38
https://insidehpc.com/2013/08/video-interconnect-tightly-coupled-accelerators-architecture/
2024-09-08T23:45:02Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651035.2/warc/CC-MAIN-20240908213138-20240909003138-00126.warc.gz
en
0.899328
238
2.59375
3
Here’s a fun experiment: Make a mental list of everyone you know. OK, maybe not everyone. But at least the core group of people with whom you interact every day. Friends, college roommates, romantic partner – anyone who qualifies as a favorite in your smartphone contact list. Now think about what they do for a living. ...
<urn:uuid:5655ff20-2716-4e21-a002-b9029f355d2d>
CC-MAIN-2024-38
https://www.entefy.com/blog/blue-collar-white-collar-tomorrows-ai-jobs-are-no-collar/
2024-09-10T03:42:43Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651196.36/warc/CC-MAIN-20240910025651-20240910055651-00026.warc.gz
en
0.949027
1,839
2.59375
3
In our last article (IT Teachers Suck) we criticized IT teaching. Now we should be more constructive and look at teaching adults. There is no substitute for subject knowledge and experience to ensure an instructor is relaxed, capable of dealing with anything that comes up, and delivering real substance. But it is not e...
<urn:uuid:12778311-8f18-45c5-ac6e-e823f00ecb59>
CC-MAIN-2024-38
https://www.datamation.com/careers/teaching-adults-yes-its-different/
2024-09-16T05:43:02Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651676.3/warc/CC-MAIN-20240916044225-20240916074225-00426.warc.gz
en
0.966608
1,607
2.703125
3
The smart grid is still a conceptual idea for numerous electricity providers. However, many experts in the sector recognize that the current grid system is largely outdated and prone to failure. Ongoing software development for the Internet of Things (IoT) could simultaneously develop the smart grid, bringing it from t...
<urn:uuid:11052922-ae03-4f70-98ab-81e7b16a6fa5>
CC-MAIN-2024-38
https://itchronicles.com/iot/why-iot-software-development-is-key-to-the-smart-grid/
2024-09-18T19:26:25Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00226.warc.gz
en
0.937829
1,209
3.03125
3
Following some best practices when installing cable tray can pay dividends in cabling system electromagnetic compatibility performance. The International Electrotechnical Commission (IEC; www.iec.ch) defines electromagnetic compatibility (EMC) as the ability of a device, equipment, or system to function satisfactorily ...
<urn:uuid:636c55f0-df4d-42fd-ba83-3d228142c63c>
CC-MAIN-2024-38
https://www.cablinginstall.com/data-center/article/16466539/planning-for-emc-in-cable-tray-systems
2024-09-18T18:34:43Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00226.warc.gz
en
0.937392
1,674
2.609375
3
A VLAN is a group of end stations in a switched network that is logically segmented by function, project team, or application, without the limitation to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the sam...
<urn:uuid:0562412f-0ef7-43e3-9dde-0234ff821e76>
CC-MAIN-2024-38
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/521_n1_1/b_5k_Layer2_Config_521N11/b_Nexus_5000_Layer2_Config_521N11_chapter_011.html
2024-09-20T00:22:56Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652073.91/warc/CC-MAIN-20240919230146-20240920020146-00126.warc.gz
en
0.94372
487
3.359375
3
It is safe to say that SSL and TLS certificates have become the foundation of web security in today’s digital world. It doesn’t matter whether you own a blog with over a thousand followers or manage a million-dollar business website, you will need to use HTTPS or an SSL certificate for protecting the website. However, ...
<urn:uuid:361021ba-7831-4c27-8879-f61a4e9d3ffb>
CC-MAIN-2024-38
https://cyberexperts.com/how-to-bolster-your-website-security-with-ssl-tls/
2024-09-07T21:41:21Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz
en
0.942185
1,221
2.78125
3
Cross-Site Scripting (XSS) is an attack vector where hackers inject malicious code into a vulnerable web application. XSS differs from other web attack vectors in that it does not directly target the application itself; instead, users of the web application are the ones at risk. Cross-site scripting vulnerabilities nor...
<urn:uuid:2ce49e8a-6187-4382-b80f-4823fa161f8d>
CC-MAIN-2024-38
https://cyberhoot.com/cybrary/cross-site-scripting-xss/
2024-09-07T21:30:46Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz
en
0.895269
445
3.203125
3
These days many people understand at least the basics of the cloud, including the benefits it offers. They may not, however, be able to answer the question “What is edge computing?”. If that sounds like you, here is a quick guide to what you need to know about the edge. Edge computing is the strategy of trying to keep ...
<urn:uuid:acb1b5cd-8333-4830-ba9b-b2f57a92582a>
CC-MAIN-2024-38
https://www.databank.com/resources/blogs/what-is-edge-computing/
2024-09-07T21:23:51Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz
en
0.956185
1,037
3.359375
3
Electricity has a carbon problem. Contrary to popular belief, the increasing use of electricity does not mean a reduction in carbon footprint. According to the International Energy Agency, exceptional demands were placed on electricity markets around the world last year. Strong economic growth, combined with colder win...
<urn:uuid:65a96736-5c92-4877-8857-ef4e7f159b6c>
CC-MAIN-2024-38
https://www.hitachivantara.com/en-hk/insights/one-way-to-solve-electricitys-energy-problem
2024-09-07T21:36:41Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz
en
0.93077
772
3.203125
3
Anti-virus software company Symantec has uncovered a new global web server infection. Hidden scripts on servers are redirecting website visitors to potentially malicious websites. So far over 3,500 hidden scripts on servers have been identified, which are being triggered when website visitors land on the compromised si...
<urn:uuid:0b01b415-f647-4d75-bdac-239270c8915b>
CC-MAIN-2024-38
https://www.defensorum.com/hidden-scripts-on-servers/
2024-09-10T07:54:30Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-00126.warc.gz
en
0.950484
438
2.515625
3
Firewalls are as one of the key devices in a security architecture, as well as in an in-depth security strategy, protecting the fixed perimeter of enterprises. The scope of firewalls has evolved a lot over time (see article Firewall: History), and so knowing key types and understanding differences are critical for secu...
<urn:uuid:9ffe913a-e9fd-4b6d-89f8-97520e1e87fd>
CC-MAIN-2024-38
https://ostec.blog/en/perimeter/firewall-definition/
2024-09-15T03:09:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651614.9/warc/CC-MAIN-20240915020916-20240915050916-00626.warc.gz
en
0.942384
2,172
3.59375
4
Creator: Dartmouth College & Institut Mines-Télécom Category: Software > Computer Software > Educational Software Tag: C programming, C++, Code, Linux, programming Availability: In stock Price: USD 49.00 Learn how to use professional tools and libraries to write and build C programs within the Linux operating system. T...
<urn:uuid:bc595aa7-ec2c-47c3-91a6-ef0e1af90d12>
CC-MAIN-2024-38
https://datafloq.com/course/c-programming-using-linux-tools-and-libraries-7/
2024-09-20T04:57:34Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00226.warc.gz
en
0.916028
403
3.328125
3
At the International Symposium on Biomedical Imaging in Prague this past April, a Harvard-based artificial intelligence system won the Camelyon16 challenge, a competition comprised of participants introducing their individual AI system and its ability to facilitate automated lymph node metastasis diagnosis. Referred to...
<urn:uuid:4317115f-7c66-4372-9480-069014f08493>
CC-MAIN-2024-38
https://icrunchdata.com/blog/183/artificial-intelligence-and-the-future-of-cancer-detection/
2024-09-20T02:54:59Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00226.warc.gz
en
0.936101
553
3.015625
3
This webinar served as an introduction to quantum computing. Unlike classical computers, based on sequential processing principles, quantum computers leverage their strengths from two fundamental characteristics inspired from quantum physics, namely entanglement and superposition, which make them super powerful for und...
<urn:uuid:c88e4343-0f52-48a4-982c-f4d9dbdaee15>
CC-MAIN-2024-38
https://www.abiresearch.com/market-research/product/1032150-webinar-quantum-computing/
2024-09-20T04:14:24Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00226.warc.gz
en
0.939621
261
2.65625
3
AJAX is nearly synonymous with web 2.0 applications and is used to enhance the interactivity of webpages. AJAX gives developers the means by which individual pieces of a page can be updated in real time without the need to reload all the contents of the page. In the past, if a particular piece of content in a web page ...
<urn:uuid:f479d432-3553-4b09-bfdd-4c5dd6a56f8d>
CC-MAIN-2024-38
https://www.f5.com/glossary/asynchronous-javascript-and-xml-ajax
2024-09-07T23:12:35Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650926.21/warc/CC-MAIN-20240907225010-20240908015010-00426.warc.gz
en
0.903224
256
2.703125
3
With more companies encouraging their employees to work from home to mitigate the spread and effects of COVID-19, cyber hygiene is as important as ever. Clifford Neuman, cybersecurity expert at USC’s Information Sciences Institute and faculty in the Department of Computer Science at the USC Viterbi School of Engineerin...
<urn:uuid:02de1097-c1b0-4b5d-8740-bb1037ed3133>
CC-MAIN-2024-38
https://www.industrialcybersecuritypulse.com/threats-vulnerabilities/five-tips-to-stay-cyber-secure-when-working-remotely/
2024-09-09T05:21:19Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651072.23/warc/CC-MAIN-20240909040201-20240909070201-00326.warc.gz
en
0.947163
1,442
2.515625
3
One Telegram channel has been found to be behind a great deal of swatting incidents in the US. Using the anonymity provided by Telegram, caller ID spoofing, and voices generated by Artificial Intelligence (AI), a person or group of persons calling themselves Torswats is suspected to be behind dozens, if not hundreds of...
<urn:uuid:9189ab7d-b1a4-4797-a370-4dfcc13c1927>
CC-MAIN-2024-38
https://www.malwarebytes.com/blog/news/2023/04/swatting-as-a-service-is-a-growing-and-complicated-problem-to-solve
2024-09-13T23:51:16Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651540.77/warc/CC-MAIN-20240913233654-20240914023654-00826.warc.gz
en
0.957971
812
2.5625
3
Analyst's Notebook Connector for Esri uses two types of map. Base maps are cached tile maps. Dynamic maps are generated in real time. You can display an Esri map on a layer in the Map window. You can overlay it with chart layers, query results, other maps, and drawings to build up your geospatial analysis. Unless a map...
<urn:uuid:073c5b64-708f-4da6-90a0-c1c4550c0537>
CC-MAIN-2024-38
https://docs.i2group.com/anb/10.0.0/types_of_map.html
2024-09-17T20:09:41Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651829.57/warc/CC-MAIN-20240917172631-20240917202631-00526.warc.gz
en
0.87783
420
2.859375
3
Update: We were informed by Sick Codes that, although Signal already has a fix for this URI flaw here, it hasn’t been pushed out to market yet. We’ll further update this post once there is new development. There’s a flaw in the way many of the world’s most popular messaging and email platforms—such as Facebook Messenge...
<urn:uuid:0bca2ec1-8146-4aa1-83d4-38ed984cdaf3>
CC-MAIN-2024-38
https://www.malwarebytes.com/blog/news/2022/03/uri-spoofing-flaw-could-phish-whatsapp-signal-instagram-and-imessage-users
2024-09-17T19:58:22Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651829.57/warc/CC-MAIN-20240917172631-20240917202631-00526.warc.gz
en
0.910978
956
2.625
3
Disaggregated HCI (dHCI) What is disaggregated HCI? dHCI stands for "disaggregated hyperconverged infrastructure". It is an IT infrastructure solution that blends disaggregated architecture's scalability and flexibility with the advantages of hyperconverged infrastructure (HCI). Traditional HCI pools computing, storage...
<urn:uuid:6cfc5937-2c22-48d8-a35f-6368ad2e72d1>
CC-MAIN-2024-38
https://www.hpe.com/ae/en/what-is/dhci.html
2024-09-19T00:42:34Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651944.55/warc/CC-MAIN-20240918233405-20240919023405-00426.warc.gz
en
0.936838
1,989
2.78125
3
Energy and Utilities AI revolutionizes the energy industry from grid optimization to data management No evening Netflix, mountains of dirty laundry, pitch black nights with the day’s sweat lingering on skin: just a glimpse of life without power for 24 hours. Indeed, such a situation throws the most routine tasks into d...
<urn:uuid:8bf1c786-07b6-4d58-9b16-315c32a6171f>
CC-MAIN-2024-38
https://www.infosysbpm.com/blogs/energy-utilities/ai-revolutionizes-the-energy-industry-from-grid-optimization-to-data-management.html
2024-09-09T07:57:56Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651092.31/warc/CC-MAIN-20240909071529-20240909101529-00426.warc.gz
en
0.906959
1,126
2.953125
3
Estimated Reading Time: 4 Minutes How many of us use a variation of the same password for multiple accounts? How many have post it notes filled with passwords pasted on a desk and/or laptop? As we’ve mentioned in an earlier blog in this series, identity protection and cybersecurity go hand-in-hand – and good data secur...
<urn:uuid:a7b1d6ff-8295-46ac-acb8-82298114fff6>
CC-MAIN-2024-38
https://www.irisidentityprotection.com/blog/password-protection/
2024-09-11T19:19:24Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00226.warc.gz
en
0.939298
862
2.546875
3
Learn about Amazon Elastic Compute Cloud (EC2) and the types of virtual machines (instances) that can be deployed on EC2. Hyperconverged Infrastructure (HCI) brings together compute, storage, and networking into a single system, reducing operational costs and the number of physical machines needed in the data center. B...
<urn:uuid:ae72d7d7-2859-4fb2-8f07-5f0200985311>
CC-MAIN-2024-38
https://www.exitcertified.com/blog/what-is-hyperconverged-infrastructure
2024-09-13T00:50:19Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651506.7/warc/CC-MAIN-20240913002450-20240913032450-00126.warc.gz
en
0.947141
2,459
2.8125
3
Weighted Random Early Detection (WRED) Whereas queuing provides congestion management, mechanisms such as WRED provide congestion avoidance. Specifically, WRED can prevent an output queue from ever filling to capacity, which would result in packet loss for all incoming packets. This section examines the need for and th...
<urn:uuid:462f5555-8d1d-4a64-a7be-46f6f01f8680>
CC-MAIN-2024-38
https://www.ciscopress.com/articles/article.asp?p=352991&seqNum=8
2024-09-16T15:52:59Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.45/warc/CC-MAIN-20240916144317-20240916174317-00726.warc.gz
en
0.871213
1,811
2.890625
3
The coronavirus pandemic forced thousands of students and educators to utilize virtual education. While online classrooms proved beneficial to many students and permitted education to continue during the lockdown, not every subject can be taught effectively online. Some programs require hands-on learning. Cybersecurity...
<urn:uuid:53b3f3b4-a7f9-400f-ae91-dc4f214f868a>
CC-MAIN-2024-38
https://www.cybintsolutions.com/8-reasons-hands-on-learning-is-vital-to-cybersecurity-education/
2024-09-19T05:07:39Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651981.99/warc/CC-MAIN-20240919025412-20240919055412-00526.warc.gz
en
0.95665
1,688
3.203125
3
Are you a physician? Do you work in a private practice or a clinic setting? Are you a healthcare facility or a business that works with the healthcare industry? If you collect, store, share, and/or use patient information, you must follow HIPAA rules. If you’re unsure about how to become HIPAA compliant, continue readi...
<urn:uuid:8c0f55ab-1e3a-4cc4-97b8-cb520d6e1c5f>
CC-MAIN-2024-38
https://acentec.com/2020/04/09/hipaa-compliance-guide-a-guide-on-how-to-be-hipaa-compliant-when-working-remotely-2/
2024-09-08T07:17:24Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650960.90/warc/CC-MAIN-20240908052321-20240908082321-00626.warc.gz
en
0.920802
1,445
2.53125
3
Generative AI Use Cases: Expanding the Power of Automation Recently, there has been an explosion of artificial intelligence (AI) technologies. Generative AI is being used to generate novel content, including text, images, videos, code and music. Meanwhile, predictive AI is being used to predict future events. There’s a...
<urn:uuid:c058e629-9510-404a-8e51-a9e9b56d12f5>
CC-MAIN-2024-38
https://www.blueprism.com/resources/blog/generative-ai-vs-predictive-ai/
2024-09-10T16:54:09Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651303.70/warc/CC-MAIN-20240910161250-20240910191250-00426.warc.gz
en
0.930201
1,575
3.25
3
By Gautam Hazari, Chief Technology Officer, Sekura.id Imagine, you are sitting in a café, sipping the skillfully crafted coffee by the barista, with your laptop placed on the table in front. You open the screen and look around to see if no one is around “shoulder surfing”, and then you open your email, type in the user...
<urn:uuid:ac928eac-33fe-4f08-b678-dc6b8483f499>
CC-MAIN-2024-38
https://www.cyberdefensemagazine.com/passwords-in-the-air/
2024-09-10T16:45:11Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651303.70/warc/CC-MAIN-20240910161250-20240910191250-00426.warc.gz
en
0.942241
1,062
2.6875
3
Stay ahead of the curve with the latest news, ideas and resources on all things Identity Assurance and Passwordless. Identification vs. Authentication: What’s the Difference? 6 Min. Read | April 24, 2023 In discussions of identity and access management (IAM), you sometimes find terms used interchangeably, when they act...
<urn:uuid:dd42bb9a-97a3-4b0a-b141-ed8717e71e65>
CC-MAIN-2024-38
https://blog.hypr.com/identification-vs-authentication
2024-09-11T23:18:18Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651405.61/warc/CC-MAIN-20240911215612-20240912005612-00326.warc.gz
en
0.921689
1,510
3.328125
3
The world of cybersecurity has seen massive growth as the 21st Century marches on. More and more of our everyday lives have become digitized. From our financial transactions to our social interactions, everything we do is mainly conducted through online interactions rather than in-person. This has led to the developmen...
<urn:uuid:f7ec86ec-6830-4853-9f04-3b6466627dec>
CC-MAIN-2024-38
https://kingslanduniversity.com/start-career-penetration-tester
2024-09-11T22:55:03Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651405.61/warc/CC-MAIN-20240911215612-20240912005612-00326.warc.gz
en
0.953893
2,487
2.78125
3
GDPR Data Subject Rights For business and organizations seeking to comply with GDPR, understanding GDPR data subject rights is a crucial first step towards compliance. With the introduction of GDPR as law across all EU member states, data subjects rights became more extensive, providing a greater degree of protection a...
<urn:uuid:4367de79-c5f6-48a9-942b-f702283c3eb4>
CC-MAIN-2024-38
https://www.businesstechweekly.com/legal-and-compliance/gdpr-legislation/gdpr-data-subject-rights/
2024-09-13T04:36:15Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651507.67/warc/CC-MAIN-20240913034233-20240913064233-00226.warc.gz
en
0.933243
1,525
3.359375
3
Make no mistake – if you show the slightest bit of weakness around a bully, they will pounce. The Internet is no different, with hackers just waiting for a cybersecurity vulnerability to seize their opportunity. The latest form of cyberterrorism to take root and have explosive growth is incredibly dangerous. Forget abo...
<urn:uuid:f2510a67-79b7-4e38-8620-c5ff50a01ef9>
CC-MAIN-2024-38
https://www.compunet.ca/blog/are-you-playing-the-internets-latest-game-of-cops-and-robbers/
2024-09-13T04:44:02Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651507.67/warc/CC-MAIN-20240913034233-20240913064233-00226.warc.gz
en
0.942917
1,496
2.859375
3
Computers started being networked with one another in the late 80s. At that time, there became an increased concern for security, though it was minimal in comparison to today’s concerns. That is why understanding the history of network security can help us grasp how important it is today. This is especially true given ...
<urn:uuid:b83c2f97-3f03-48a4-88db-42992d61c503>
CC-MAIN-2024-38
https://informationsecuritybuzz.com/essay-history-network-security/
2024-09-15T17:03:39Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651632.84/warc/CC-MAIN-20240915152239-20240915182239-00026.warc.gz
en
0.981193
1,246
3.53125
4
What is Web3? The third generation of the World Wide Web (WWW), Web3 is the concept of a decentralized version of the web, and is still in its early stages of development. This new iteration would use emerging technologies like blockchain to create an ecosystem where users would have more control and be able to interac...
<urn:uuid:144e3748-3c9c-4789-bc31-469b8147a590>
CC-MAIN-2024-38
https://www.malwarebytes.com/cybersecurity/basics/what-is-web3
2024-09-15T16:17:45Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651632.84/warc/CC-MAIN-20240915152239-20240915182239-00026.warc.gz
en
0.929159
1,505
3
3
How a power-hungry industry is achieving its green ambitions The data centre has become one of the most crucial pieces of business infrastructure - everything with the word smart in front of it, has a data centre behind it. Data centres are responsible for storing and processing the vast amounts of information needed t...
<urn:uuid:e6c72edc-5229-42cc-95df-d8ab1371dc8e>
CC-MAIN-2024-38
https://datacentremagazine.com/critical-environments/how-power-hungry-industry-achieving-its-green-ambitions
2024-09-16T18:52:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651710.86/warc/CC-MAIN-20240916180320-20240916210320-00826.warc.gz
en
0.941306
961
3.0625
3