text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Degaussing is a familiar word to those who work in the data destruction industry, military, or who work with magnetic media, but the science and history behind these machines may be lost to many. The truth is the concept of degaussing has been toyed with since the late 1800’s, and its implementation and uses have stret... | <urn:uuid:6f0a685d-60d2-4449-8d66-606aafa19e4b> | CC-MAIN-2024-38 | http://sem.artefactdesign.com/the-history-and-science-of-degaussers/ | 2024-09-18T08:05:51Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651886.88/warc/CC-MAIN-20240918064858-20240918094858-00821.warc.gz | en | 0.971735 | 907 | 3.640625 | 4 |
The Sarbanes-Oxley Act (known as SOX) went into effect in 2002 to protect shareholders and the general public from accounting errors and fraudulent practices of organizations. It was also tailored to improve the accuracy of corporate disclosures.
SOX was drafted to improve corporate governance and accountability follow... | <urn:uuid:d2748bb8-012a-499a-a9bf-207454b67512> | CC-MAIN-2024-38 | https://cymulate.com/blog/sox-compliance-now-includes-cybersecurity/ | 2024-09-18T08:39:56Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651886.88/warc/CC-MAIN-20240918064858-20240918094858-00821.warc.gz | en | 0.955439 | 1,434 | 2.6875 | 3 |
You might be wondering what is perfdump in Android. The perfdump function could be defined as a “service” function built-in to the operating system.
The perfdump function is able to collect various pieces of performance data from the web server’s internal statistics and display them in an ASCII format when a specific r... | <urn:uuid:5d46d6da-ef34-401f-afbe-c477fb0f2dae> | CC-MAIN-2024-38 | https://heimdalsecurity.com/blog/what-is-perfdump-in-android/ | 2024-09-20T20:58:32Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701423570.98/warc/CC-MAIN-20240920190822-20240920220822-00621.warc.gz | en | 0.888052 | 1,025 | 2.734375 | 3 |
Intel and Micron Technology on Thursday said they had shrunk NAND flash memory in size, which could help add more storage and features to smartphones or tablets.
The flash memory, made using 20-nanometer process technology, will provide more dense storage than earlier flash chips made using older manufacturing technolo... | <urn:uuid:74f50e6f-dbf3-4de2-8e78-caa02cc6a17b> | CC-MAIN-2024-38 | https://www.itworldcanada.com/article/intel-and-micron-shrink-nand-flash/43468 | 2024-09-08T15:44:07Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651013.49/warc/CC-MAIN-20240908150334-20240908180334-00885.warc.gz | en | 0.943037 | 362 | 2.640625 | 3 |
Spear phishing is a type of email scam where cybercriminals pose as a trusted individual or organization in order to gain sensitive information from their target. This article will explain what spear phishing is, how it works, and how you can protect yourself from becoming a victim.
What is spear phishing?
Spear phishi... | <urn:uuid:33bd2356-acc6-4885-8333-52a3ad3152e4> | CC-MAIN-2024-38 | https://cybersguards.com/what-is-spear-phishing/ | 2024-09-09T22:41:52Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651157.15/warc/CC-MAIN-20240909201932-20240909231932-00785.warc.gz | en | 0.948771 | 894 | 3.0625 | 3 |
What is pharming?
Pharming is a type of cyberattack involving the redirection of web traffic from a legitimate site to a fake site for the purpose of stealing usernames, passwords, financial data, and other personal information.
When you type a URL into your browser’s address bar, like www.google.com for example, sever... | <urn:uuid:599ecf0a-bc2f-419b-86ca-210a7ef45f50> | CC-MAIN-2024-38 | https://www.malwarebytes.com/pharming | 2024-09-11T03:23:33Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651343.80/warc/CC-MAIN-20240911020451-20240911050451-00685.warc.gz | en | 0.916988 | 1,649 | 3.078125 | 3 |
CPU – Central Processing Unit – the main processor in a server, desktop or laptop computer. It executes machine-level instructions and is a general purpose processor. There can be multiple processor cores inside a CPU, and these cores can execute in parallel. The cores can have multiple threads also executing instructi... | <urn:uuid:c0957ac8-022e-494e-ad61-309022182b83> | CC-MAIN-2024-38 | https://blocksandfiles.com/2022/04/23/cpu/ | 2024-09-07T17:58:01Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650898.24/warc/CC-MAIN-20240907162417-20240907192417-00185.warc.gz | en | 0.906819 | 83 | 3.890625 | 4 |
Virtualization enables you to use the full capacity of computer hardware by distributing its capabilities among many users or environments. In essence, it refers to the procedure of running a virtual instance of a computer system in a layer abstracted from the underlying hardware resources. This virtual instance is ref... | <urn:uuid:701442cd-4659-4051-9689-8a1e3a483fa0> | CC-MAIN-2024-38 | https://www.enterprisenetworkingplanet.com/os/ibm-powervm-vs-oracle-vm-virtualbox/ | 2024-09-07T17:18:58Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650898.24/warc/CC-MAIN-20240907162417-20240907192417-00185.warc.gz | en | 0.877456 | 1,271 | 2.546875 | 3 |
Definition of Polyvinyl Chloride (PVC) Cabling in the Network Encyclopedia.
What is Polyvinyl Chloride (PVC) cabling?
Polyvinyl Chloride cabling, or simply PVC, is a grade of network cabling that uses polyvinyl chloride (PVC) plastic for its outer protective insulating jacket. Polyvinyl chloride cabling is cheap and fl... | <urn:uuid:7c5cd96e-21d2-44ad-bd14-a79c5db32e54> | CC-MAIN-2024-38 | https://networkencyclopedia.com/polyvinyl-chloride-pvc-cabling/ | 2024-09-11T05:48:55Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651344.44/warc/CC-MAIN-20240911052223-20240911082223-00785.warc.gz | en | 0.935386 | 458 | 3.546875 | 4 |
Wearable Devices: Keep Data Privacy In Check
Consumers, businesses and manufacturers can all help ensure that the privacy rights of wearables users are respected.
Wearable devices are here: in bed, at home, on the street, and in the office. We often think of fitness bands and smartglasses, but wearables are proliferati... | <urn:uuid:fea657f2-3a26-4e26-bcd1-ba32e61cd548> | CC-MAIN-2024-38 | https://www.informationweek.com/it-leadership/wearable-devices-keep-data-privacy-in-check | 2024-09-11T05:36:07Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651344.44/warc/CC-MAIN-20240911052223-20240911082223-00785.warc.gz | en | 0.95007 | 916 | 2.6875 | 3 |
We depend on security companies for several things. First and foremost, to provide the software and tools that help keep our own networks and data secure. Second, to be the front line of the latest security issues; while we may only know some companies by their AV software, most are also involved in research and detect... | <urn:uuid:3eed5971-3e83-4ef3-9fe2-15e83a6e6956> | CC-MAIN-2024-38 | https://www.itbusinessedge.com/it-management/even-security-companies-get-breached/ | 2024-09-13T17:51:09Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651535.66/warc/CC-MAIN-20240913165920-20240913195920-00585.warc.gz | en | 0.981022 | 560 | 2.65625 | 3 |
Do you remember the movie E.T, where E.T is essentially stranded on Earth until he assembles a makeshift communication device which sends a message to his spaceship to return to earth to retrieve him?
How fortunate was it that his alien counterparts assumed the message was from him? I mean, who else on earth could have... | <urn:uuid:03967dc5-6d85-438a-9347-5bfd24da8fdc> | CC-MAIN-2024-38 | https://www.keyfactor.com/blog/hey-there-its-me-understanding-the-importance-of-iot-device-identity/ | 2024-09-15T00:56:35Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651601.85/warc/CC-MAIN-20240914225323-20240915015323-00485.warc.gz | en | 0.953949 | 253 | 2.78125 | 3 |
Getting to Know About InfiniBand
The surge in HPC large models represented by ChatGPT in 2023 has significantly amplified the focus on InfiniBand technology. This is because the networks used by GPT models are built on InfiniBand, developed by NVIDIA. So, what exactly is InfiniBand? Why is it highly acclaimed? This art... | <urn:uuid:35fb4e58-5fae-4767-bd00-c5662965a74f> | CC-MAIN-2024-38 | https://community.fs.com/article/getting-to-know-about-InfiniBand.html | 2024-09-18T19:32:52Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00185.warc.gz | en | 0.890335 | 1,894 | 3 | 3 |
The increasing use of the Internet as a platform and delivery mechanism for computing services appears to be an inexorable march. But two recent incidents gave pause for thought, and revealed that when Internet-scale systems fail it can be catastrophic.
One of the central tenets of cloud computing is that a distributed... | <urn:uuid:a604ec69-6ee1-4ec2-8a2d-3e661c092b7c> | CC-MAIN-2024-38 | https://www.information-age.com/black-swans-in-the-cloud-26334/ | 2024-09-21T02:56:28Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701427996.97/warc/CC-MAIN-20240921015054-20240921045054-00885.warc.gz | en | 0.965301 | 722 | 2.515625 | 3 |
How To Use The "top" Command
On a linux/unix system, using the "top" command can be very useful. Simply open a terminal (or ssh into your server) and run `top`
**This is similar to running "htop" → top is the older command and it comes preinstalled on all Linux distros. htop is newer and it adds color and gives a more ... | <urn:uuid:7985a0e3-932c-4da6-90b7-97273d64df82> | CC-MAIN-2024-38 | https://support.iriusrisk.com/hc/en-us/articles/13450624265117-Slow-Performance-Troubleshooting-High-Usage-Processes | 2024-09-07T21:39:12Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00285.warc.gz | en | 0.942795 | 645 | 2.703125 | 3 |
Linux might be free to download and install, and it might offer you freedoms that aren’t available from commercial software, but don’t let that fool you into thinking that everything about Linux is free. You might save money, but there are still hidden costs that need to be taken into account.
The first cost is uncerta... | <urn:uuid:87e8c505-3b4a-4833-ac38-76afdb1df16d> | CC-MAIN-2024-38 | https://www.datamation.com/open-source/the-hidden-costs-of-linux-ownership/ | 2024-09-09T03:02:27Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651053.52/warc/CC-MAIN-20240909004517-20240909034517-00185.warc.gz | en | 0.959307 | 1,211 | 2.53125 | 3 |
How To Make Internet Voting Secure
To be effective, an Internet voting system has to auditable every step of the way, a new study says.
July 10, 2015
Public elections conducted over the Internet need to be end-to-end verifiable in order to be truly effective, a team of election officials, systems engineers, cryptograph... | <urn:uuid:24c5451b-0acb-4eb9-9b2d-552f5553959b> | CC-MAIN-2024-38 | https://www.darkreading.com/cloud-security/how-to-make-internet-voting-secure | 2024-09-10T07:53:30Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-00085.warc.gz | en | 0.959902 | 932 | 2.578125 | 3 |
There are several useful network topologies for LAN and WAN construction. Here are 8 of the most common.
1. Single switch
The most basic type of small office network is a single switch. It’s probably the fastest and most stable network you can build. But of course, it has the problem of being a massive single point of ... | <urn:uuid:20168e5e-1a62-4df3-89d8-062938d6633e> | CC-MAIN-2024-38 | https://www.auvik.com/franklyit/blog/network-topologies-slideshare/ | 2024-09-11T09:55:21Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651383.5/warc/CC-MAIN-20240911084051-20240911114051-00885.warc.gz | en | 0.909816 | 458 | 2.84375 | 3 |
Why Cybersecurity Awareness Is Important: It’s Crucial Today
In today’s world, our lives are deeply connected to technology. This makes cybersecurity awareness very important. We use digital devices, online platforms, and cloud services a lot. This increases the risk of cyber threats to our personal and work lives.
But... | <urn:uuid:118ed4c3-5e5d-4009-988b-f4c453e63174> | CC-MAIN-2024-38 | https://arksolvers.com/why-cybersecurity-awareness-is-important/ | 2024-09-16T09:16:32Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651682.69/warc/CC-MAIN-20240916080220-20240916110220-00485.warc.gz | en | 0.929133 | 2,530 | 2.859375 | 3 |
TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys
For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots takes you back to the first version of the Secure Sockets Layer (SSL) protocol, which was developed in 1995 by Netscape but nev... | <urn:uuid:04f2f695-4299-440c-9812-a505f2d98af4> | CC-MAIN-2024-38 | https://www.helpnetsecurity.com/2020/04/06/tls-1-3-adoption/ | 2024-09-18T22:23:58Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651941.8/warc/CC-MAIN-20240918201359-20240918231359-00285.warc.gz | en | 0.955517 | 1,264 | 3.0625 | 3 |
Automation is a big topic for companies, no matter the industry. Whether your job is in IT or another business area, you’re likely hearing about automating as a way of saving money, improving efficiencies, and removing inherent errors.
Often, automation is a term that may be used only partially correctly. The term orch... | <urn:uuid:17237c79-1b21-4c75-902b-b390095bb4e9> | CC-MAIN-2024-38 | https://www.bmc.com/blogs/it-orchestration-vs-automation-whats-the-difference/ | 2024-09-20T03:43:04Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00185.warc.gz | en | 0.924552 | 2,439 | 2.9375 | 3 |
You'll have to change all of your passwords, and temporarily avoid any site known to be vulnerable.
What should you know about Heartbleed, a recently uncovered security bug? The shortest version: You'll have to change all of your passwords, and temporarily avoid any site that is known to be vulnerable. That sounds a bi... | <urn:uuid:d20e73cd-171f-4c7d-96fd-642c2cdc68dc> | CC-MAIN-2024-38 | https://www.nextgov.com/cybersecurity/2014/04/what-you-need-know-about-heartbleed-new-security-bug-scaring-internet/82183/?oref=ng-next-story | 2024-09-14T00:59:05Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651540.77/warc/CC-MAIN-20240913233654-20240914023654-00785.warc.gz | en | 0.965276 | 972 | 2.921875 | 3 |
Undoubtedly, the IoT has deeply embedded in our lives and everything we do. From smart speakers to smart homes, wearables to self driving cars, we directly or indirectly depend on IoT devices to reduce our workload.
For instance, if we take the banking sector into account, various users employ different devices for exe... | <urn:uuid:af42a1b0-f9da-46a8-a1d1-45164421b79e> | CC-MAIN-2024-38 | https://www.analyticssteps.com/blogs/do-you-know-the-iots-strategies-and-planning-structures-for-financial-services | 2024-09-16T12:20:59Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.32/warc/CC-MAIN-20240916112213-20240916142213-00585.warc.gz | en | 0.934577 | 2,054 | 2.84375 | 3 |
The technology sector faces a growing number of regulatory requirements, particularly in areas such as data privacy, cybersecurity, consumer protection, and intellectual property. Governments around the world are enacting and strengthening regulations to address the evolving digital landscape and its associated risks.
... | <urn:uuid:b05cb6ce-a0d7-4b58-b992-0e802a73f524> | CC-MAIN-2024-38 | https://www.ciocoverage.com/key-objectives-of-handling-regulatory-compliance-in-technology/ | 2024-09-16T13:34:59Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.32/warc/CC-MAIN-20240916112213-20240916142213-00585.warc.gz | en | 0.908076 | 547 | 3.125 | 3 |
AI is transforming the healthcare industry by leveraging machine learning and deep learning techniques to analyze medical data. With ultrasound, genomics, and computed tomography scans, AI accurately diagnoses diseases like Alzheimer’s, cancer, diabetes, and heart disease. By improving clinical systems and patient info... | <urn:uuid:7b94f875-3091-4364-9e12-4f6c88515820> | CC-MAIN-2024-38 | https://disruptionhub.com/how-is-ai-used-to-detect-diseases/ | 2024-09-20T05:57:45Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652138.47/warc/CC-MAIN-20240920054402-20240920084402-00285.warc.gz | en | 0.925438 | 2,226 | 3.3125 | 3 |
Rising Threats of Vishing (VoIP Phishing) and Voice Scam
As we advance further into the digital age, Voice over Internet Protocol (VoIP) technology remains a critical component of modern communication systems. Vishing, sometimes known as phone scams, scam calls or voice fraud has emerged as a significant threat, with a... | <urn:uuid:84e18f00-9b52-41ee-9f9a-80620ac355bc> | CC-MAIN-2024-38 | https://www.neuralt.com/news-insights/automated-spam-and-scam-calls-detection-using-machine-learning | 2024-09-08T04:07:08Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650958.30/warc/CC-MAIN-20240908020844-20240908050844-00485.warc.gz | en | 0.918604 | 1,468 | 2.65625 | 3 |
Along with cryptocurrency, the dark web is one of the biggest factors driving a surge in ransomware attacks. Although the dark web enables criminals, new methods like dark web monitoring could also protect against hackers. So what is dark web monitoring, and can it boost your cybersecurity?
Introduction to the Dark Web... | <urn:uuid:567db26f-b4df-41b6-9ef0-c307c0356e86> | CC-MAIN-2024-38 | https://www.beforecrypt.com/en/dark-web-monitoring/ | 2024-09-09T08:54:39Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651092.31/warc/CC-MAIN-20240909071529-20240909101529-00385.warc.gz | en | 0.939928 | 963 | 2.9375 | 3 |
Address Resolution Protocol (ARP) attacking is the point at which an attacker sends distorted ARP messages over a local area network (LAN) to connect an attacker’s MAC address with the IP address of an authentic PC or server on the system. When the attacker’s MAC address is connected, the attacker can obtain any messag... | <urn:uuid:289d2aa7-882b-4c11-99d1-e64ea80f4fc6> | CC-MAIN-2024-38 | https://www.hypr.com/security-encyclopedia/address-resolution-protocol-poisoning | 2024-09-10T14:20:56Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651255.81/warc/CC-MAIN-20240910125411-20240910155411-00285.warc.gz | en | 0.892322 | 216 | 3.265625 | 3 |
By Varun Babbar, MD (India & SAARC), Qlik
We live in a world of data. Many aspects of our lives depend on it. Yet, many people are challenged by data literacy, unable to decipher the meaning hidden in plain sight. Meanwhile, machine automation is advancing at a rapid pace, so too is the public mistrust in AI and algori... | <urn:uuid:a2c91f9a-0aee-486f-972e-4d177541127d> | CC-MAIN-2024-38 | https://www.enterpriseitworld.com/the-human-touch/ | 2024-09-11T20:30:03Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00185.warc.gz | en | 0.970397 | 1,497 | 2.53125 | 3 |
For every business, from large organisations to smaller startup companies, data loss prevention (DLP) measures are a crucial element of security that must be continually employed. The aim of this process is to fully understand how data is being utilised, knowing where it is being sent or has gone to, and whether this u... | <urn:uuid:50a10c4b-2542-46d1-99ca-f062e05c1452> | CC-MAIN-2024-38 | https://www.galaxkey.com/blog/the-key-data-loss-prevention-practices-you-should-consider/ | 2024-09-11T18:54:59Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00185.warc.gz | en | 0.942612 | 596 | 2.578125 | 3 |
Wouldn’t it be awesome if playing video games ended up being actually healthy for you? Well, you’re in luck. A recent New York Times story reported on a new study indicating that playing simple video games apparently make your brain younger.
According to the story, a simple video game requiring players to swerve around... | <urn:uuid:7e5cc3f6-f795-477a-b56b-6239596a558c> | CC-MAIN-2024-38 | https://www.kloud9it.com/2014/07/maybe-those-video-games-wont-rot-your-brain/ | 2024-09-11T19:37:29Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00185.warc.gz | en | 0.963245 | 229 | 2.9375 | 3 |
SD-WAN, or software-defined wide area network, is a wide area network that uses software to control network operations across different geographies. SD-WAN is the next evolutionary step from a traditional WAN network which connects local area networks (LANs) together using VPNs or routers and un on MPLS.
WANs support a... | <urn:uuid:2ce16b39-7272-4a98-b2c2-948a10501a33> | CC-MAIN-2024-38 | https://www.liveaction.com/glossary/sd-wan/ | 2024-09-13T02:51:14Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651506.7/warc/CC-MAIN-20240913002450-20240913032450-00085.warc.gz | en | 0.909618 | 318 | 2.75 | 3 |
An expansion bus, a term often heard in the realm of computers, is an integral part of a computer system. It serves as a conduit, allowing information to travel between the various components within the system.
What is an expansion bus?
An expansion bus exists within the heart of the computer – the motherboard. Acting ... | <urn:uuid:9848467d-ec5d-4b3a-b061-d6eadfe70314> | CC-MAIN-2024-38 | https://www.ninjaone.com/it-hub/endpoint-security/what-is-an-expansion-bus/ | 2024-09-13T01:25:26Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651506.7/warc/CC-MAIN-20240913002450-20240913032450-00085.warc.gz | en | 0.933991 | 369 | 3.78125 | 4 |
USB drives, also known as thumb drives, have become a popular form for storing and transporting files from one computer to another. Their appeal lies in the fact that they are small, readily available, inexpensive, and extremely portable. However, these same characteristics make them attractive to attackers. Just look ... | <urn:uuid:725587f8-90aa-4d0a-978d-1440fe7d0031> | CC-MAIN-2024-38 | https://mapolce.com/blog/dangers-usb-devices-securing-companys-data/ | 2024-09-19T03:42:00Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651981.99/warc/CC-MAIN-20240919025412-20240919055412-00485.warc.gz | en | 0.953653 | 911 | 2.9375 | 3 |
This post is part of a series of articles about the GraphTech ecosystem. This is the second part. It covers the graph analytics landscape. The first part was about graph databases and the third part will list the existing graph visualization tools.
Actors of the graph analytics landscape in 2019
This second layer is an... | <urn:uuid:f5b2bcae-939b-44cd-8f3a-7d970106e7a1> | CC-MAIN-2024-38 | https://resources.experfy.com/bigdata-cloud/the-graphtech-ecosystem-2019-part-2-graph-analytics/ | 2024-09-19T05:01:21Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651981.99/warc/CC-MAIN-20240919025412-20240919055412-00485.warc.gz | en | 0.936837 | 1,117 | 2.734375 | 3 |
Web development has evolved, thanks to Machine learning. Discover how.
It seems like science fiction fantasies have become truth. We’re not living in a real-world anymore but in a futuristic world of people and robotic devices. What we were performing physically for decades, by using machines and computers, can now be ... | <urn:uuid:7ad37c90-1222-4cf4-b49f-ec2bc9f75ee6> | CC-MAIN-2024-38 | https://itchronicles.com/artificial-intelligence/evolution-of-web-development-with-machine-learning/ | 2024-09-20T11:45:39Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652246.93/warc/CC-MAIN-20240920090502-20240920120502-00385.warc.gz | en | 0.937669 | 1,478 | 2.828125 | 3 |
A professor at Brigham Young University (BYU) is working on a new facial recognition algorithm that matches facial features and facial expressions at the same time. The goal is to deliver two-factor authentication with a single product, while simultaneously providing strong liveness detection to guard against various f... | <urn:uuid:f3e76b75-374b-47ee-86f3-42af4312329a> | CC-MAIN-2024-38 | https://findbiometrics.com/byu-professor-guards-adds-anti-spoofing-expression-recognition-biometric-system-031606/ | 2024-09-08T06:19:47Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650960.90/warc/CC-MAIN-20240908052321-20240908082321-00585.warc.gz | en | 0.962074 | 561 | 2.609375 | 3 |
What is CSMA/CD?
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It refers to the means of media access, or deciding “who gets to talk” in an Ethernet network.
A more elegant term for “who gets to talk” is to refer to the “media access method”, which, in this case, would be “CSMA/CD”
Carrier ... | <urn:uuid:ec7ab9b5-8731-44e0-9dc4-39a6a4e5b2bb> | CC-MAIN-2024-38 | https://www.liveaction.com/resources/blog-post/media-access/ | 2024-09-09T11:16:29Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651098.19/warc/CC-MAIN-20240909103148-20240909133148-00485.warc.gz | en | 0.955625 | 333 | 3.09375 | 3 |
The wireless security landscape has remained largely unchanged since the development of Wi-Fi Protected Access (WPA/WPA2) in the early 2000s. However, in recent years the Wi-Fi alliance has made significant efforts to address long standing issues within these standards. In this entry I will shed some light on common in... | <urn:uuid:88e6e002-5edc-4829-a446-b4b0fc8841d1> | CC-MAIN-2024-38 | https://www.depthsecurity.com/blog/securing-wireless-infrastructure-part-1/ | 2024-09-14T11:21:15Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651579.22/warc/CC-MAIN-20240914093425-20240914123425-00085.warc.gz | en | 0.927207 | 1,394 | 2.703125 | 3 |
With the arrival of spring, the Biden administration is surging forward to finalize a series of significant environmental regulations, part of a broader initiative to counteract climate change and reinforce the United States’ environmental policy framework. This regulatory push signifies an active response to the envir... | <urn:uuid:a07a1308-c45e-4f95-86d5-cb26b84512c5> | CC-MAIN-2024-38 | https://governmentcurated.com/policy-and-legislation/is-bidens-spring-agenda-cementing-environmental-protections/ | 2024-09-19T08:19:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651995.50/warc/CC-MAIN-20240919061514-20240919091514-00585.warc.gz | en | 0.9037 | 315 | 2.90625 | 3 |
Requirement: | Notes: |
Operating System: | Linux (various) |
Installed Packages: |
openssl tar |
In order to create symmetric encrypted archive files, when public key encryption is not an option, archiving is required first. The process for creating secure archive files on a Linux system is as follows:
1. Copy the fil... | <urn:uuid:04f01f86-039c-41ba-838d-59e5d442df60> | CC-MAIN-2024-38 | https://support.redshield.co/hc/en-gb/articles/207523393-Creating-Encrypted-tar-gz-Archives | 2024-09-19T07:46:13Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651995.50/warc/CC-MAIN-20240919061514-20240919091514-00585.warc.gz | en | 0.890233 | 249 | 2.890625 | 3 |
In recent years, the advent of large language models (LLMs) like GPT-4 has revolutionized the field of artificial intelligence (AI). These models, developed to enhance user interactions through chatbots, search engines, and other AI-driven applications, have significantly advanced how information is processed and prese... | <urn:uuid:ed9bfe6f-ed48-48bf-bd3c-b7703aa7f152> | CC-MAIN-2024-38 | https://debuglies.com/2024/08/13/the-hidden-manipulation-how-indirect-prompt-injection-is-being-used-to-unfairly-influence-ai-driven-job-recruitment-systems/ | 2024-09-13T07:59:54Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651510.65/warc/CC-MAIN-20240913070112-20240913100112-00285.warc.gz | en | 0.934643 | 4,826 | 2.5625 | 3 |
Organizations must develop strong password policies to prevent and combat destructive cyber attacks.
As the number and breadth of cyber attacks and breaches increase each day, organizations must prioritize cybersecurity to prevent major damage to their infrastructure. These attacks often begin by a cyber criminal steal... | <urn:uuid:9c93bc8d-b91e-4175-b52c-d2a48b104cf5> | CC-MAIN-2024-38 | https://cylera.com/tips-to-strengthen-your-password-policy/ | 2024-09-15T20:01:58Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651647.78/warc/CC-MAIN-20240915184230-20240915214230-00085.warc.gz | en | 0.930389 | 1,117 | 3.203125 | 3 |
The dream of a single, universal memory for computers might become a reality sooner than we think thanks to GST467.
Scientists have engineered an exciting new material named “GST467”, composed of germanium, antimony, and terbium. Used in an innovative structure called a superlattice, it could be the key to replacing bo... | <urn:uuid:c907a92c-08b1-4d1f-8068-2606cd03eb25> | CC-MAIN-2024-38 | https://dataconomy.com/2024/02/14/what-is-universal-memory-and-gst467/ | 2024-09-16T22:13:28Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00885.warc.gz | en | 0.919303 | 1,101 | 3.703125 | 4 |
In the dynamic world of network technology, ensuring uninterrupted and secure data transmission is more important than ever. One solution that stands out is optical fiber bypass, engineered to bolster network resilience, enhance security, and improve overall efficiency.
What is Optical Fiber Bypass?
Optical fiber bypas... | <urn:uuid:be2bc4f2-3f97-445d-a47d-ee75cd969cdf> | CC-MAIN-2024-38 | https://lannerinc.com/news-and-events/eagle-lanner-tech-blog/understanding-optical-fiber-bypass-essential-advances-in-network-security-application | 2024-09-16T23:55:20Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00885.warc.gz | en | 0.910712 | 869 | 3.03125 | 3 |
As digital currencies soar in popularity, the importance of enhancing online security is becoming increasingly critical. Cryptocurrencies, despite their secure and decentralized nature, are vulnerable to the multitude of risks that plague the digital realm. The appeal of cryptocurrency exchanges, compounded by the surg... | <urn:uuid:716c5c38-6f51-4fc9-9e18-d1535b9ac740> | CC-MAIN-2024-38 | https://networkingcurated.com/networking-technologies/how-do-vpns-protect-your-crypto-trading-and-payments/ | 2024-09-16T22:43:45Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651714.51/warc/CC-MAIN-20240916212424-20240917002424-00885.warc.gz | en | 0.925942 | 2,382 | 2.65625 | 3 |
Just as electricity transformed the way industries operated, Artificial Intelligence (AI) is revolutionising how businesses function today. Electricity brought about increased efficiency, productivity, and new possibilities in manufacturing, transportation, and communication. Similarly, AI is introducing automation, da... | <urn:uuid:af548038-0b61-4a57-8c9c-317104540fd5> | CC-MAIN-2024-38 | https://digitalwell.com/blogs/ai-and-business-comms-ethical-considerations/ | 2024-09-09T18:48:45Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651133.92/warc/CC-MAIN-20240909170505-20240909200505-00685.warc.gz | en | 0.945022 | 915 | 2.9375 | 3 |
A relative file is a file in which each record is identified by its ordinal position in the file (record 1, record 2 and so on). This means that records can be accessed randomly as well as sequentially:
Because records can be accessed randomly, access to relative files is fast.
Although you can declare variable length ... | <urn:uuid:70f3d49b-89a3-4ed1-8382-c0ee39359239> | CC-MAIN-2024-38 | https://www.microfocus.com/documentation/enterprise-developer/ed70/ED-VS2017/BKFHFHORGSS007.html | 2024-09-11T00:33:42Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00585.warc.gz | en | 0.905316 | 468 | 3.515625 | 4 |
Both hydrogen and oxygen are separated through this process and can leak through the battery vents and disperse into the surrounding environment. The combination of Hydrogen and oxygen/air can be explosive if there is enough Hydrogen build-up. The amount of Hydrogen produced depends on the size and number of batteries ... | <urn:uuid:d88535a0-5668-4aac-9591-01c564d71310> | CC-MAIN-2024-38 | https://macurco.com/applications/batterycharging/ | 2024-09-14T18:10:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651580.73/warc/CC-MAIN-20240914161327-20240914191327-00285.warc.gz | en | 0.929022 | 123 | 2.765625 | 3 |
Image: Getty Images (FilippoBacci)
As the race to dominate the renewable energy sector accelerates, increased military posturing and geopolitical manoeuvring is likely in areas with major deposits.
Image: Getty Images (Paul Souders)
More extreme climate conditions are almost certain to test global resilience over the n... | <urn:uuid:2e892904-8e6c-47f3-bf03-3b181b8e5a3e> | CC-MAIN-2024-38 | https://publications.dragonflyintelligence.com/strategic-outlook-2024/climate-change-read-more | 2024-09-18T07:06:05Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651886.88/warc/CC-MAIN-20240918064858-20240918094858-00885.warc.gz | en | 0.932648 | 436 | 3 | 3 |
In part 8 of this series we are going to unravel the mysteries of congestion management and its four main queuing methods.
Congestion is the result of many factors and can occur in many places on the network. A few of the reasons for congestion are traffic aggregation points, network transit points, speed mismatches, o... | <urn:uuid:2a65976a-45b5-46da-b4dd-ef991be529b1> | CC-MAIN-2024-38 | https://www.globalknowledge.com/ca-en/resources/resource-library/articles/qos-part-8-congestion-management/ | 2024-09-20T20:05:41Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701423570.98/warc/CC-MAIN-20240920190822-20240920220822-00685.warc.gz | en | 0.919468 | 961 | 3.390625 | 3 |
Anomaly detection, also called outlier analysis, is the process of identifying unusual patterns, rare events, atypical behaviors, or outliers of a data set. These anomalies differ significantly from the rest of the data. Anomalies usually indicate problems, such as equipment malfunction, technical glitches, structural ... | <urn:uuid:c1646324-2a4d-4356-954e-72d51889bce8> | CC-MAIN-2024-38 | https://www.collibra.com/us/en/blog/what-is-anomaly-detection | 2024-09-09T18:25:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651133.92/warc/CC-MAIN-20240909170505-20240909200505-00726.warc.gz | en | 0.896519 | 1,909 | 3.09375 | 3 |
A report of two new vulnerabilities named Meltdown and Spectre was published last Wednesday, January 3, 2018. It is a big deal because they are hardware vulnerabilities affecting pretty much everything with a silicon chip. Yes, this means microprocessors on workstations and servers, mobile phones, tablets, cloud servic... | <urn:uuid:1f1c1cc0-0048-4d89-9485-06c9bc568a6b> | CC-MAIN-2024-38 | https://conetrix.com/blog/tag/alert | 2024-09-11T00:34:38Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00626.warc.gz | en | 0.92489 | 536 | 2.59375 | 3 |
A score applies either to devices or to users and it offers an evaluation of each object from one or several points of view. The value of a score depends thus on the status of the object with respect to a particular aspect or the combination of different aspects.
In this way, scores reduce the complexity of low level a... | <urn:uuid:bcc9957c-5894-4bc0-b026-9ab64144b29f> | CC-MAIN-2024-38 | https://docs-v6.nexthink.com/V6/6.29/computing-scores | 2024-09-11T01:19:20Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00626.warc.gz | en | 0.918157 | 728 | 2.578125 | 3 |
There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet population in Canada is the highest it has been, topping the charts at 33 million. That number is only expected to increase through the upcoming years. However, this growing number a... | <urn:uuid:68b05450-2f70-473e-893f-31c8c521f2f5> | CC-MAIN-2024-38 | https://www.mcafee.com/blogs/internet-security/the-what-why-and-how-of-ai-and-threat-detection/ | 2024-09-10T23:10:48Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651323.1/warc/CC-MAIN-20240910224659-20240911014659-00626.warc.gz | en | 0.925553 | 1,368 | 3.328125 | 3 |
In the context of mobile security, physical attacks involve any technique that gains unauthorized access to a device by touching it or physically interacting with it. Physical attacks usually have a relatively low barrier to entry, meaning unskilled attackers without security or programming knowledge can do it. Despite... | <urn:uuid:48411fa0-fba3-4613-a8b5-5c7b3c3ada72> | CC-MAIN-2024-38 | https://armadillophone.com/blog/hacking-things-by-touching-them | 2024-09-18T10:47:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651895.12/warc/CC-MAIN-20240918100941-20240918130941-00026.warc.gz | en | 0.954241 | 2,718 | 2.796875 | 3 |
Data masking is a data security technique in which a dataset is copied but with sensitive data obfuscated. This benign replica is then used instead of the authentic data for testing or training purposes.
What do I need to know about data masking?
Data masking does not just replace sensitive data with blanks. It creates... | <urn:uuid:943ae7a2-6ba8-4dc6-a271-3bf088cb145d> | CC-MAIN-2024-38 | https://www.informatica.com/nz/services-and-training/glossary-of-terms/data-masking-definition.html | 2024-09-20T20:04:09Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725701423570.98/warc/CC-MAIN-20240920190822-20240920220822-00726.warc.gz | en | 0.927255 | 265 | 3.4375 | 3 |
Gravity, also known as gravitation, is an inherent natural phenomenon by means of which all celestial objects with kinetic or gravitational energy are attracted towards one another. In the Earth’s atmosphere, gravity provides the weight that keeps everything in place, including the air, the water, and the earth itself.... | <urn:uuid:57a9c3b6-34e9-415b-a99e-0eead6e15bf1> | CC-MAIN-2024-38 | https://bizdispatch.com/what-is-gravity/ | 2024-09-07T14:21:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650883.10/warc/CC-MAIN-20240907131200-20240907161200-00126.warc.gz | en | 0.968152 | 856 | 4.25 | 4 |
Mainframes continue to be viable for enterprise computing due to their inherent capabilities for supporting the most critical business functions. When it comes to supporting large volumes of data, high-speed transaction processing, and secure computing the mainframe continues to excel. The Fortune 1000 relies upon main... | <urn:uuid:84937d69-8c1c-4321-a048-545364a7f4bd> | CC-MAIN-2024-38 | https://cloudframe.com/three-reasons-it-makes-sense-to-convert-some-of-your-cobol-to-java/ | 2024-09-08T18:55:56Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651017.43/warc/CC-MAIN-20240908181815-20240908211815-00026.warc.gz | en | 0.940716 | 1,444 | 2.515625 | 3 |
How Do I Remote Into Another Computer Using My IP Address?- These days, being able to access a computing device from a remote location is critical. In order to stay connected to corporate processes 24 hours a day, 7 days a week, businesspeople must invest in remote access technologies. To effectively establish a remote... | <urn:uuid:5b0a6225-2350-4a89-ac3b-eaed01717bc1> | CC-MAIN-2024-38 | https://cybersguards.com/how-do-i-remote-into-another-computer-using-my-ip-address/ | 2024-09-09T21:28:26Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651157.15/warc/CC-MAIN-20240909201932-20240909231932-00826.warc.gz | en | 0.944146 | 1,225 | 2.734375 | 3 |
Presidential rhetoric has long been a powerful tool in shaping public opinion and influencing policy, especially within the realm of K-12 education. This leverage can have a profound effect, not just on the policies in question but also on the degree of partisan division that surrounds these issues. The influence of pr... | <urn:uuid:a7109e50-551e-43e7-952d-586ec4813938> | CC-MAIN-2024-38 | https://educationcurated.com/education-management/presidential-rhetoric-deepens-partisan-divides-in-k-12-education-policy/ | 2024-09-11T04:04:19Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651343.80/warc/CC-MAIN-20240911020451-20240911050451-00726.warc.gz | en | 0.938331 | 1,776 | 3.21875 | 3 |
Routing - Distance-vector routing protocol use cases
Distance vector routing protocols are a type of dynamic routing protocol which is used to exchange routing information between routing devices. Distance vector routing protocols like EIGRP and RIP are well suited for most network topologies, however, there are some u... | <urn:uuid:f61aa13a-86f6-47eb-b93f-dcb2e06cdb06> | CC-MAIN-2024-38 | https://notes.networklessons.com/routing-distance-vector-routing-protocol-use-cases | 2024-09-14T20:28:42Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651580.74/warc/CC-MAIN-20240914193334-20240914223334-00426.warc.gz | en | 0.917664 | 289 | 3.546875 | 4 |
By 2010 there will be more than 3.5 billion mobile phone subscribers, 1 billion personal computers and 2 billion televisions in use around the world, according to the International Energy Agency (IEA), an energy policy advisor to 28 member countries.
As the numbers of these devices increase, so, too, does the demand fo... | <urn:uuid:06f12aae-46a3-487a-b2ac-5b42d615bc9c> | CC-MAIN-2024-38 | https://www.eweek.com/news/growing-mobile-phone-use-hurts-energy-security-iea-says/ | 2024-09-16T03:47:56Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651668.29/warc/CC-MAIN-20240916012328-20240916042328-00326.warc.gz | en | 0.950148 | 742 | 2.609375 | 3 |
For many students, the overwhelming feeling after completing their rigorous high school courses is a relief. Relief that they’re finally done with school for the year, relief that they don’t have to deal with classes anymore, and relief that they can finally relax and enjoy their summer. However, for some students, thi... | <urn:uuid:39acef61-e43c-4693-8bb0-d51532ab5f21> | CC-MAIN-2024-38 | https://cybersguards.com/how-to-bypass-school-firewall/ | 2024-09-19T22:14:57Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652067.20/warc/CC-MAIN-20240919194038-20240919224038-00026.warc.gz | en | 0.955448 | 1,058 | 2.890625 | 3 |
In this video from the 2013 Hot Interconnects Conference, Toshihiro Hanawa presents: Interconnect for Tightly Coupled Accelerators Architecture.
In recent years, heterogenious clusters using accelerators are widely used for high performance computing system. In such clusters, the inter-node communication among accelera... | <urn:uuid:f113a59a-797c-4634-ad8d-cdfcfc254f88> | CC-MAIN-2024-38 | https://insidehpc.com/2013/08/video-interconnect-tightly-coupled-accelerators-architecture/ | 2024-09-08T23:45:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651035.2/warc/CC-MAIN-20240908213138-20240909003138-00126.warc.gz | en | 0.899328 | 238 | 2.59375 | 3 |
Here’s a fun experiment: Make a mental list of everyone you know. OK, maybe not everyone. But at least the core group of people with whom you interact every day. Friends, college roommates, romantic partner – anyone who qualifies as a favorite in your smartphone contact list.
Now think about what they do for a living. ... | <urn:uuid:5655ff20-2716-4e21-a002-b9029f355d2d> | CC-MAIN-2024-38 | https://www.entefy.com/blog/blue-collar-white-collar-tomorrows-ai-jobs-are-no-collar/ | 2024-09-10T03:42:43Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651196.36/warc/CC-MAIN-20240910025651-20240910055651-00026.warc.gz | en | 0.949027 | 1,839 | 2.59375 | 3 |
In our last article (IT Teachers Suck) we criticized IT teaching. Now we should be more constructive and look at teaching adults. There is no substitute for subject knowledge and experience to ensure an instructor is relaxed, capable of dealing with anything that comes up, and delivering real substance. But it is not e... | <urn:uuid:12778311-8f18-45c5-ac6e-e823f00ecb59> | CC-MAIN-2024-38 | https://www.datamation.com/careers/teaching-adults-yes-its-different/ | 2024-09-16T05:43:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651676.3/warc/CC-MAIN-20240916044225-20240916074225-00426.warc.gz | en | 0.966608 | 1,607 | 2.703125 | 3 |
The smart grid is still a conceptual idea for numerous electricity providers. However, many experts in the sector recognize that the current grid system is largely outdated and prone to failure. Ongoing software development for the Internet of Things (IoT) could simultaneously develop the smart grid, bringing it from t... | <urn:uuid:11052922-ae03-4f70-98ab-81e7b16a6fa5> | CC-MAIN-2024-38 | https://itchronicles.com/iot/why-iot-software-development-is-key-to-the-smart-grid/ | 2024-09-18T19:26:25Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00226.warc.gz | en | 0.937829 | 1,209 | 3.03125 | 3 |
Following some best practices when installing cable tray can pay dividends in cabling system electromagnetic compatibility performance.
The International Electrotechnical Commission (IEC; www.iec.ch) defines electromagnetic compatibility (EMC) as the ability of a device, equipment, or system to function satisfactorily ... | <urn:uuid:636c55f0-df4d-42fd-ba83-3d228142c63c> | CC-MAIN-2024-38 | https://www.cablinginstall.com/data-center/article/16466539/planning-for-emc-in-cable-tray-systems | 2024-09-18T18:34:43Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651931.60/warc/CC-MAIN-20240918165253-20240918195253-00226.warc.gz | en | 0.937392 | 1,674 | 2.609375 | 3 |
A VLAN is a group
of end stations in a switched network that is logically segmented by function,
project team, or application, without the limitation to the physical locations
of the users. VLANs have the same attributes as physical LANs, but you can
group end stations even if they are not physically located on the sam... | <urn:uuid:0562412f-0ef7-43e3-9dde-0234ff821e76> | CC-MAIN-2024-38 | https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/521_n1_1/b_5k_Layer2_Config_521N11/b_Nexus_5000_Layer2_Config_521N11_chapter_011.html | 2024-09-20T00:22:56Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652073.91/warc/CC-MAIN-20240919230146-20240920020146-00126.warc.gz | en | 0.94372 | 487 | 3.359375 | 3 |
It is safe to say that SSL and TLS certificates have become the foundation of web security in today’s digital world. It doesn’t matter whether you own a blog with over a thousand followers or manage a million-dollar business website, you will need to use HTTPS or an SSL certificate for protecting the website.
However, ... | <urn:uuid:361021ba-7831-4c27-8879-f61a4e9d3ffb> | CC-MAIN-2024-38 | https://cyberexperts.com/how-to-bolster-your-website-security-with-ssl-tls/ | 2024-09-07T21:41:21Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz | en | 0.942185 | 1,221 | 2.78125 | 3 |
Cross-Site Scripting (XSS) is an attack vector where hackers inject malicious code into a vulnerable web application. XSS differs from other web attack vectors in that it does not directly target the application itself; instead, users of the web application are the ones at risk. Cross-site scripting vulnerabilities nor... | <urn:uuid:2ce49e8a-6187-4382-b80f-4823fa161f8d> | CC-MAIN-2024-38 | https://cyberhoot.com/cybrary/cross-site-scripting-xss/ | 2024-09-07T21:30:46Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz | en | 0.895269 | 445 | 3.203125 | 3 |
These days many people understand at least the basics of the cloud, including the benefits it offers. They may not, however, be able to answer the question “What is edge computing?”. If that sounds like you, here is a quick guide to what you need to know about the edge.
Edge computing is the strategy of trying to keep ... | <urn:uuid:acb1b5cd-8333-4830-ba9b-b2f57a92582a> | CC-MAIN-2024-38 | https://www.databank.com/resources/blogs/what-is-edge-computing/ | 2024-09-07T21:23:51Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz | en | 0.956185 | 1,037 | 3.359375 | 3 |
Electricity has a carbon problem.
Contrary to popular belief, the increasing use of electricity does not mean a reduction in carbon footprint. According to the International Energy Agency, exceptional demands were placed on electricity markets around the world last year. Strong economic growth, combined with colder win... | <urn:uuid:65a96736-5c92-4877-8857-ef4e7f159b6c> | CC-MAIN-2024-38 | https://www.hitachivantara.com/en-hk/insights/one-way-to-solve-electricitys-energy-problem | 2024-09-07T21:36:41Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650920.0/warc/CC-MAIN-20240907193650-20240907223650-00326.warc.gz | en | 0.93077 | 772 | 3.203125 | 3 |
Anti-virus software company Symantec has uncovered a new global web server infection. Hidden scripts on servers are redirecting website visitors to potentially malicious websites. So far over 3,500 hidden scripts on servers have been identified, which are being triggered when website visitors land on the compromised si... | <urn:uuid:0b01b415-f647-4d75-bdac-239270c8915b> | CC-MAIN-2024-38 | https://www.defensorum.com/hidden-scripts-on-servers/ | 2024-09-10T07:54:30Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651224.59/warc/CC-MAIN-20240910061537-20240910091537-00126.warc.gz | en | 0.950484 | 438 | 2.515625 | 3 |
Firewalls are as one of the key devices in a security architecture, as well as in an in-depth security strategy, protecting the fixed perimeter of enterprises. The scope of firewalls has evolved a lot over time (see article Firewall: History), and so knowing key types and understanding differences are critical for secu... | <urn:uuid:9ffe913a-e9fd-4b6d-89f8-97520e1e87fd> | CC-MAIN-2024-38 | https://ostec.blog/en/perimeter/firewall-definition/ | 2024-09-15T03:09:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651614.9/warc/CC-MAIN-20240915020916-20240915050916-00626.warc.gz | en | 0.942384 | 2,172 | 3.59375 | 4 |
Creator: Dartmouth College & Institut Mines-Télécom
Category: Software > Computer Software > Educational Software
Tag: C programming, C++, Code, Linux, programming
Availability: In stock
Price: USD 49.00
Learn how to use professional tools and libraries to write and build C programs within the Linux operating system. T... | <urn:uuid:bc595aa7-ec2c-47c3-91a6-ef0e1af90d12> | CC-MAIN-2024-38 | https://datafloq.com/course/c-programming-using-linux-tools-and-libraries-7/ | 2024-09-20T04:57:34Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00226.warc.gz | en | 0.916028 | 403 | 3.328125 | 3 |
At the International Symposium on Biomedical Imaging in Prague this past April, a Harvard-based artificial intelligence system won the Camelyon16 challenge, a competition comprised of participants introducing their individual AI system and its ability to facilitate automated lymph node metastasis diagnosis.
Referred to... | <urn:uuid:4317115f-7c66-4372-9480-069014f08493> | CC-MAIN-2024-38 | https://icrunchdata.com/blog/183/artificial-intelligence-and-the-future-of-cancer-detection/ | 2024-09-20T02:54:59Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00226.warc.gz | en | 0.936101 | 553 | 3.015625 | 3 |
This webinar served as an introduction to quantum computing. Unlike classical computers, based on sequential processing principles, quantum computers leverage their strengths from two fundamental characteristics inspired from quantum physics, namely entanglement and superposition, which make them super powerful for und... | <urn:uuid:c88e4343-0f52-48a4-982c-f4d9dbdaee15> | CC-MAIN-2024-38 | https://www.abiresearch.com/market-research/product/1032150-webinar-quantum-computing/ | 2024-09-20T04:14:24Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700652130.6/warc/CC-MAIN-20240920022257-20240920052257-00226.warc.gz | en | 0.939621 | 261 | 2.65625 | 3 |
AJAX is nearly synonymous with web 2.0 applications and is used to enhance the interactivity of webpages. AJAX gives developers the means by which individual pieces of a page can be updated in real time without the need to reload all the contents of the page. In the past, if a particular piece of content in a web page ... | <urn:uuid:f479d432-3553-4b09-bfdd-4c5dd6a56f8d> | CC-MAIN-2024-38 | https://www.f5.com/glossary/asynchronous-javascript-and-xml-ajax | 2024-09-07T23:12:35Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650926.21/warc/CC-MAIN-20240907225010-20240908015010-00426.warc.gz | en | 0.903224 | 256 | 2.703125 | 3 |
With more companies encouraging their employees to work from home to mitigate the spread and effects of COVID-19, cyber hygiene is as important as ever. Clifford Neuman, cybersecurity expert at USC’s Information Sciences Institute and faculty in the Department of Computer Science at the USC Viterbi School of Engineerin... | <urn:uuid:02de1097-c1b0-4b5d-8740-bb1037ed3133> | CC-MAIN-2024-38 | https://www.industrialcybersecuritypulse.com/threats-vulnerabilities/five-tips-to-stay-cyber-secure-when-working-remotely/ | 2024-09-09T05:21:19Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651072.23/warc/CC-MAIN-20240909040201-20240909070201-00326.warc.gz | en | 0.947163 | 1,442 | 2.515625 | 3 |
One Telegram channel has been found to be behind a great deal of swatting incidents in the US. Using the anonymity provided by Telegram, caller ID spoofing, and voices generated by Artificial Intelligence (AI), a person or group of persons calling themselves Torswats is suspected to be behind dozens, if not hundreds of... | <urn:uuid:9189ab7d-b1a4-4797-a370-4dfcc13c1927> | CC-MAIN-2024-38 | https://www.malwarebytes.com/blog/news/2023/04/swatting-as-a-service-is-a-growing-and-complicated-problem-to-solve | 2024-09-13T23:51:16Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651540.77/warc/CC-MAIN-20240913233654-20240914023654-00826.warc.gz | en | 0.957971 | 812 | 2.5625 | 3 |
Analyst's Notebook Connector for Esri uses two types of map. Base maps are cached tile maps. Dynamic maps are generated in real time.
You can display an Esri map on a layer in the Map window. You can overlay it with chart layers, query results, other maps, and drawings to build up your geospatial analysis. Unless a map... | <urn:uuid:073c5b64-708f-4da6-90a0-c1c4550c0537> | CC-MAIN-2024-38 | https://docs.i2group.com/anb/10.0.0/types_of_map.html | 2024-09-17T20:09:41Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651829.57/warc/CC-MAIN-20240917172631-20240917202631-00526.warc.gz | en | 0.87783 | 420 | 2.859375 | 3 |
Update: We were informed by Sick Codes that, although Signal already has a fix for this URI flaw here, it hasn’t been pushed out to market yet. We’ll further update this post once there is new development.
There’s a flaw in the way many of the world’s most popular messaging and email platforms—such as Facebook Messenge... | <urn:uuid:0bca2ec1-8146-4aa1-83d4-38ed984cdaf3> | CC-MAIN-2024-38 | https://www.malwarebytes.com/blog/news/2022/03/uri-spoofing-flaw-could-phish-whatsapp-signal-instagram-and-imessage-users | 2024-09-17T19:58:22Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651829.57/warc/CC-MAIN-20240917172631-20240917202631-00526.warc.gz | en | 0.910978 | 956 | 2.625 | 3 |
Disaggregated HCI (dHCI)
What is disaggregated HCI?
dHCI stands for "disaggregated hyperconverged infrastructure". It is an IT infrastructure solution that blends disaggregated architecture's scalability and flexibility with the advantages of hyperconverged infrastructure (HCI). Traditional HCI pools computing, storage... | <urn:uuid:6cfc5937-2c22-48d8-a35f-6368ad2e72d1> | CC-MAIN-2024-38 | https://www.hpe.com/ae/en/what-is/dhci.html | 2024-09-19T00:42:34Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651944.55/warc/CC-MAIN-20240918233405-20240919023405-00426.warc.gz | en | 0.936838 | 1,989 | 2.78125 | 3 |
Energy and Utilities
AI revolutionizes the energy industry from grid optimization to data management
No evening Netflix, mountains of dirty laundry, pitch black nights with the day’s sweat lingering on skin: just a glimpse of life without power for 24 hours. Indeed, such a situation throws the most routine tasks into d... | <urn:uuid:8bf1c786-07b6-4d58-9b16-315c32a6171f> | CC-MAIN-2024-38 | https://www.infosysbpm.com/blogs/energy-utilities/ai-revolutionizes-the-energy-industry-from-grid-optimization-to-data-management.html | 2024-09-09T07:57:56Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651092.31/warc/CC-MAIN-20240909071529-20240909101529-00426.warc.gz | en | 0.906959 | 1,126 | 2.953125 | 3 |
Estimated Reading Time: 4 Minutes
How many of us use a variation of the same password for multiple accounts? How many have post it notes filled with passwords pasted on a desk and/or laptop? As we’ve mentioned in an earlier blog in this series, identity protection and cybersecurity go hand-in-hand – and good data secur... | <urn:uuid:a7b1d6ff-8295-46ac-acb8-82298114fff6> | CC-MAIN-2024-38 | https://www.irisidentityprotection.com/blog/password-protection/ | 2024-09-11T19:19:24Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651400.96/warc/CC-MAIN-20240911183926-20240911213926-00226.warc.gz | en | 0.939298 | 862 | 2.546875 | 3 |
Learn about Amazon Elastic Compute Cloud (EC2) and the types of virtual machines (instances) that can be deployed on EC2.
Hyperconverged Infrastructure (HCI) brings together compute, storage, and networking into a single system, reducing operational costs and the number of physical machines needed in the data center. B... | <urn:uuid:ae72d7d7-2859-4fb2-8f07-5f0200985311> | CC-MAIN-2024-38 | https://www.exitcertified.com/blog/what-is-hyperconverged-infrastructure | 2024-09-13T00:50:19Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651506.7/warc/CC-MAIN-20240913002450-20240913032450-00126.warc.gz | en | 0.947141 | 2,459 | 2.8125 | 3 |
Weighted Random Early Detection (WRED)
Whereas queuing provides congestion management, mechanisms such as WRED provide congestion avoidance. Specifically, WRED can prevent an output queue from ever filling to capacity, which would result in packet loss for all incoming packets. This section examines the need for and th... | <urn:uuid:462f5555-8d1d-4a64-a7be-46f6f01f8680> | CC-MAIN-2024-38 | https://www.ciscopress.com/articles/article.asp?p=352991&seqNum=8 | 2024-09-16T15:52:59Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651697.45/warc/CC-MAIN-20240916144317-20240916174317-00726.warc.gz | en | 0.871213 | 1,811 | 2.890625 | 3 |
The coronavirus pandemic forced thousands of students and educators to utilize virtual education. While online classrooms proved beneficial to many students and permitted education to continue during the lockdown, not every subject can be taught effectively online. Some programs require hands-on learning. Cybersecurity... | <urn:uuid:53b3f3b4-a7f9-400f-ae91-dc4f214f868a> | CC-MAIN-2024-38 | https://www.cybintsolutions.com/8-reasons-hands-on-learning-is-vital-to-cybersecurity-education/ | 2024-09-19T05:07:39Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651981.99/warc/CC-MAIN-20240919025412-20240919055412-00526.warc.gz | en | 0.95665 | 1,688 | 3.203125 | 3 |
Are you a physician? Do you work in a private practice or a clinic setting? Are you a healthcare facility or a business that works with the healthcare industry?
If you collect, store, share, and/or use patient information, you must follow HIPAA rules. If you’re unsure about how to become HIPAA compliant, continue readi... | <urn:uuid:8c0f55ab-1e3a-4cc4-97b8-cb520d6e1c5f> | CC-MAIN-2024-38 | https://acentec.com/2020/04/09/hipaa-compliance-guide-a-guide-on-how-to-be-hipaa-compliant-when-working-remotely-2/ | 2024-09-08T07:17:24Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700650960.90/warc/CC-MAIN-20240908052321-20240908082321-00626.warc.gz | en | 0.920802 | 1,445 | 2.53125 | 3 |
Generative AI Use Cases: Expanding the Power of Automation
Recently, there has been an explosion of artificial intelligence (AI) technologies. Generative AI is being used to generate novel content, including text, images, videos, code and music. Meanwhile, predictive AI is being used to predict future events. There’s a... | <urn:uuid:c058e629-9510-404a-8e51-a9e9b56d12f5> | CC-MAIN-2024-38 | https://www.blueprism.com/resources/blog/generative-ai-vs-predictive-ai/ | 2024-09-10T16:54:09Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651303.70/warc/CC-MAIN-20240910161250-20240910191250-00426.warc.gz | en | 0.930201 | 1,575 | 3.25 | 3 |
By Gautam Hazari, Chief Technology Officer, Sekura.id
Imagine, you are sitting in a café, sipping the skillfully crafted coffee by the barista, with your laptop placed on the table in front. You open the screen and look around to see if no one is around “shoulder surfing”, and then you open your email, type in the user... | <urn:uuid:ac928eac-33fe-4f08-b678-dc6b8483f499> | CC-MAIN-2024-38 | https://www.cyberdefensemagazine.com/passwords-in-the-air/ | 2024-09-10T16:45:11Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651303.70/warc/CC-MAIN-20240910161250-20240910191250-00426.warc.gz | en | 0.942241 | 1,062 | 2.6875 | 3 |
Stay ahead of the curve with the latest news, ideas and resources on all things Identity Assurance and Passwordless.
Identification vs. Authentication: What’s the Difference?
6 Min. Read | April 24, 2023
In discussions of identity and access management (IAM), you sometimes find terms used interchangeably, when they act... | <urn:uuid:dd42bb9a-97a3-4b0a-b141-ed8717e71e65> | CC-MAIN-2024-38 | https://blog.hypr.com/identification-vs-authentication | 2024-09-11T23:18:18Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651405.61/warc/CC-MAIN-20240911215612-20240912005612-00326.warc.gz | en | 0.921689 | 1,510 | 3.328125 | 3 |
The world of cybersecurity has seen massive growth as the 21st Century marches on. More and more of our everyday lives have become digitized. From our financial transactions to our social interactions, everything we do is mainly conducted through online interactions rather than in-person.
This has led to the developmen... | <urn:uuid:f7ec86ec-6830-4853-9f04-3b6466627dec> | CC-MAIN-2024-38 | https://kingslanduniversity.com/start-career-penetration-tester | 2024-09-11T22:55:03Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651405.61/warc/CC-MAIN-20240911215612-20240912005612-00326.warc.gz | en | 0.953893 | 2,487 | 2.78125 | 3 |
GDPR Data Subject Rights
For business and organizations seeking to comply with GDPR, understanding GDPR data subject rights is a crucial first step towards compliance.
With the introduction of GDPR as law across all EU member states, data subjects rights became more extensive, providing a greater degree of protection a... | <urn:uuid:4367de79-c5f6-48a9-942b-f702283c3eb4> | CC-MAIN-2024-38 | https://www.businesstechweekly.com/legal-and-compliance/gdpr-legislation/gdpr-data-subject-rights/ | 2024-09-13T04:36:15Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651507.67/warc/CC-MAIN-20240913034233-20240913064233-00226.warc.gz | en | 0.933243 | 1,525 | 3.359375 | 3 |
Make no mistake – if you show the slightest bit of weakness around a bully, they will pounce. The Internet is no different, with hackers just waiting for a cybersecurity vulnerability to seize their opportunity.
The latest form of cyberterrorism to take root and have explosive growth is incredibly dangerous. Forget abo... | <urn:uuid:f2510a67-79b7-4e38-8620-c5ff50a01ef9> | CC-MAIN-2024-38 | https://www.compunet.ca/blog/are-you-playing-the-internets-latest-game-of-cops-and-robbers/ | 2024-09-13T04:44:02Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651507.67/warc/CC-MAIN-20240913034233-20240913064233-00226.warc.gz | en | 0.942917 | 1,496 | 2.859375 | 3 |
Computers started being networked with one another in the late 80s. At that time, there became an increased concern for security, though it was minimal in comparison to today’s concerns. That is why understanding the history of network security can help us grasp how important it is today. This is especially true given ... | <urn:uuid:b83c2f97-3f03-48a4-88db-42992d61c503> | CC-MAIN-2024-38 | https://informationsecuritybuzz.com/essay-history-network-security/ | 2024-09-15T17:03:39Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651632.84/warc/CC-MAIN-20240915152239-20240915182239-00026.warc.gz | en | 0.981193 | 1,246 | 3.53125 | 4 |
What is Web3?
The third generation of the World Wide Web (WWW), Web3 is the concept of a decentralized version of the web, and is still in its early stages of development. This new iteration would use emerging technologies like blockchain to create an ecosystem where users would have more control and be able to interac... | <urn:uuid:144e3748-3c9c-4789-bc31-469b8147a590> | CC-MAIN-2024-38 | https://www.malwarebytes.com/cybersecurity/basics/what-is-web3 | 2024-09-15T16:17:45Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651632.84/warc/CC-MAIN-20240915152239-20240915182239-00026.warc.gz | en | 0.929159 | 1,505 | 3 | 3 |
How a power-hungry industry is achieving its green ambitions
The data centre has become one of the most crucial pieces of business infrastructure - everything with the word smart in front of it, has a data centre behind it. Data centres are responsible for storing and processing the vast amounts of information needed t... | <urn:uuid:e6c72edc-5229-42cc-95df-d8ab1371dc8e> | CC-MAIN-2024-38 | https://datacentremagazine.com/critical-environments/how-power-hungry-industry-achieving-its-green-ambitions | 2024-09-16T18:52:53Z | s3://commoncrawl/crawl-data/CC-MAIN-2024-38/segments/1725700651710.86/warc/CC-MAIN-20240916180320-20240916210320-00826.warc.gz | en | 0.941306 | 961 | 3.0625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.