text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Everybody wants to be green these days, but some businesses and governments try to cheat. They implement token measures for public relations reasons that don't significantly increase energy efficiency, reduce carbon emissions or clean the environment. Many in the environmental community call it "greenwashing," said Kri... | <urn:uuid:7620f468-bf57-4a0a-bc6b-cee7088a1dbd> | CC-MAIN-2017-09 | http://www.govtech.com/education/No-Greenwashing.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00375-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959983 | 1,215 | 3.140625 | 3 |
Electronic communication services and networks provide the backbone of European economy. 93% of EU companies and 51% of Europeans actively used the internet in 2007. However natural disasters, terrorist attacks, malicious human action and hardware failure can pose serious risks to Europe’s critical information infrastr... | <urn:uuid:a727f8b1-bce3-47b6-868c-4e1dd86727fc> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2009/03/31/commission-acts-to-protect-europe-from-cyber-attacks-and-disruptions/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00303-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939151 | 892 | 2.640625 | 3 |
I am one those people that have a very short attention span for technical instructions, so let me try to explain this as shortly and clearly as possible. Just in case you are like me. 🙂 The idea is to use a system that allows you to do 2 things:
1. Remember your passwords through writing a part of it down. The only th... | <urn:uuid:5afba0b2-6e84-4eaa-8b84-707a303d5137> | CC-MAIN-2017-09 | https://safeandsavvy.f-secure.com/2010/03/15/how-to-create-and-remember-strong-passwords/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945642 | 534 | 2.828125 | 3 |
Scientists at CERN, the European Organization for Nuclear Research, announced that they have observed a particle that might turn out to be the long-sought Higgs boson, or "God particle," thought to be part of the explanation for why matter has mass. And a worldwide network of computers played a key role in the discover... | <urn:uuid:7ea0d47d-8b81-4497-8918-624638988916> | CC-MAIN-2017-09 | http://www.itworld.com/article/2723644/data-center/global-grid-helps-cern-find--god-particle-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00423-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949553 | 384 | 3.203125 | 3 |
Companies are building new applications everyday – whether it is to meet their own requirements or to serve their customers. Open source platforms are increasingly being used to support these applications, moving from initial development and experimentation into production.
For example, Apache Hadoop provides support f... | <urn:uuid:db71df2e-2d54-4692-96de-131869f167c0> | CC-MAIN-2017-09 | http://www.information-age.com/how-safely-bet-your-business-open-source-support-apps-2-123460860/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00471-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940739 | 1,081 | 2.6875 | 3 |
The recent the Hydraq attacks were the latest example of just how radically the Internet threat landscape has changed over the past few years, and how vulnerable companies and their information stores are to cyber attacks. The attackers were not hackers, they were criminals attempting to steal intellectual property. Hy... | <urn:uuid:e96ee483-52a4-40a5-997a-ae22aea5ca28> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2125095/network-security/an-information-security-blueprint--part-1.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00171-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954785 | 1,512 | 2.609375 | 3 |
No matter how advanced our computer security technology is, the weakest point is still us, the users. Hackers can often bypass the best scrutiny with our help using our kindness, willingness to help and other parts of just being humans against us. This is known as social engineering and its one of the most difficult at... | <urn:uuid:214f327b-8f90-4869-8b2c-2558052ede9d> | CC-MAIN-2017-09 | http://ironcomet.com/5-social-engineering-tactics-hackers-trick/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00291-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964927 | 623 | 3.296875 | 3 |
By Adam Dickter / CIO Today. Updated February 07, 2014.
We've already got the technology to remotely wipe data from our devices if they are lost or stolen. But the U.S. Department of Defense (DoD) wants to go one step further with sophisticated sensor devices it hopes to use on the battlefields of the future.
With the ... | <urn:uuid:599f2ee4-7220-47d5-a298-aaf1ca62517b> | CC-MAIN-2017-09 | http://www.cio-today.com/article/index.php?story_id=91473 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00291-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934054 | 664 | 2.625 | 3 |
Gates drove Microsoft's focus toward developer tools and application foundations in a way that tracked the evolving nature of the developer community.
When Bill Gates first became interested in computers, being a user of a small computer meant being a hobbyist programmer-not a gamer, not a video producer, not a social ... | <urn:uuid:be3bcd44-fa74-42f3-a29b-8366e3c48feb> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Application-Development/How-Bill-Gates-Redefined-Application-Development | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00291-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950391 | 267 | 2.609375 | 3 |
The reason for the shift is that new Web development technologies better fit today's mobile platforms, said Cameron Purdy, vice president of development for Oracle, at the QCon software conference in New York on Tuesday.
To boost his argument, Purdy examined the reasons behind Java's rise in popularity in the mid-1990s... | <urn:uuid:66216788-f09f-4f51-bdd2-df97c7bd9e9c> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2504654/app-development/qcon--application-development-faces-seismic-shift.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00467-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963188 | 920 | 2.609375 | 3 |
A new low-power, "brain-inspired" supercomputing platform based on IBM chip technology will soon start exploring deep learning for the U.S. nuclear program.
Lawrence Livermore National Laboratory announced on Tuesday that it has purchased the platform, based on the TrueNorth neurosynaptic chip IBM introduced in 2014. I... | <urn:uuid:9cd8717c-0625-47a2-94c3-a1f648b70ead> | CC-MAIN-2017-09 | http://www.arnnet.com.au/article/596935/brain-inspired-supercomputer-will-explore-deep-learning-u-nuclear-program/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00643-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.908184 | 365 | 3.21875 | 3 |
Microsoft has been granted a patent for what it calls "Virtually infinite reliable storage" that works across a distributed storage system. This system is basically a logical file system that distributes copies of files across various physical storage resources, creating essentially an infinite amount of storage so lon... | <urn:uuid:ed11c11f-395a-49e8-bdff-a5350fb06004> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2220520/microsoft-subnet/microsoft-patents-smart-cloud-storage.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00643-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964369 | 461 | 2.953125 | 3 |
Note: This week and through Jan. 4 we are posting the top 10 posts of 2012. This post is #9 and was originally published March 15, 2012.
Today’s Internet of people is evolving into an “Internet of things,” because soon there will be more than one trillion connected devices. By 2013, 1.2 billion connected consumer elect... | <urn:uuid:dc79ee83-18da-4f57-a107-3a8df04946b8> | CC-MAIN-2017-09 | https://www.ibm.com/blogs/cloud-computing/2012/12/cloud-an-enabler-for-a-smarter-home-no-9/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00643-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927566 | 1,572 | 2.890625 | 3 |
Army to Strengthen Ground Combat Vehicles
The U.S. Army Research Laboratory has collaborated with Alcoa, the world’s third largest producer of aluminum, in order to come up with a way to better protect soldiers from improvised explosive devices (IEDs). The solution that they decided on is a single-piece aluminum hull d... | <urn:uuid:12ad9be8-36dd-4a31-8de9-84b31371c161> | CC-MAIN-2017-09 | https://www.enterprisetech.com/2013/10/21/army_to_strengthen_ground_combat_vehicles/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00043-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96076 | 478 | 2.625 | 3 |
Researchers at the University of Michigan have invented a way for different wireless networks crammed into the same space to say "excuse me" to one another.
Wi-Fi shares a frequency band with the popular Bluetooth and ZigBee systems, and all are often found in the same places together. But it's hard to prevent interfer... | <urn:uuid:206dd27c-d187-42cc-b302-1906a2f36c19> | CC-MAIN-2017-09 | http://www.computerworld.com.au/article/460094/wireless_networks_may_learn_live_together_by_using_energy_pulses/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00639-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942034 | 1,065 | 3.21875 | 3 |
BGP multi-homing has become as necessary to the networks connected to Internet, as the use of redundant power sources or multiple data centers. No business can afford prolonged outages, and the first and surprisingly most effective way to maximize uptime is through a robust BGP implementation to multiple transit provid... | <urn:uuid:a4994799-1209-480e-a12c-d52fe3243408> | CC-MAIN-2017-09 | https://www.noction.com/blog/bgp-multi-homing-enough-for-network-performance | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00163-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946069 | 654 | 2.578125 | 3 |
With increased electronic minituriztion and the density of the chips running such devices heat is a mortal enemy for the power and scalability of such systems.
DARPA today announced a program called Intrachip/Interchip Enhanced Cooling (ICECool) that it hopes will go the heart of such heat problems by building chips wi... | <urn:uuid:4b8aac72-9c0c-439a-b2f2-259785407e35> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2222548/security/darpa-wants-electronics-with-radically-novel-liquid-cooling-technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00511-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910016 | 689 | 3.078125 | 3 |
Intelligent broadband networks and fair share for subscribers
The challenges facing today's broadband network are a result of technical and business decisions made early in the evolution of public data networks. There is a constant contention between users and operators, applications and networks, as well as regulation... | <urn:uuid:2bb8ab6b-2439-448c-99a0-908611641c3e> | CC-MAIN-2017-09 | https://www.cedmagazine.com/article/2009/01/evolution-traffic-optimization | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00211-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946282 | 1,589 | 2.53125 | 3 |
The battle between Apple's iPhone 5 and Samsung's Galaxy S III rages on -- a study conducted by the disassembly firm iFixit and nonprofit organization Ecology Center has concluded that the iPhone 5 is less toxic than the Galaxy S III smartphone.
The study, which sought out the levels of hazardous chemical contents in s... | <urn:uuid:f82d6ebb-aa42-460f-8819-f9788dec9249> | CC-MAIN-2017-09 | http://www.itworld.com/article/2721963/data-center/apple-iphone-5-less-toxic-than-samsung-galaxy-s-iii.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00387-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943363 | 809 | 2.546875 | 3 |
University researchers have found that HTML5-based mobile apps, which are expected to become more prevalent over the next several years, could add security risks for businesses.
Through developer error, the Web technology could automatically execute malicious code sent by an attacker via Wi-Fi, Bluetooth or a text mess... | <urn:uuid:29eb6962-c249-44bc-b5f4-cec159d3cd4d> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2364306/data-protection/why-businesses-should-use-caution-with-html5-based-mobile-apps.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00387-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934947 | 641 | 2.828125 | 3 |
At a very young age, Massoud Amin, director of the Technological Leadership Institute, realized that electricity was vital to modern society. Growing up and traveling in Iran in the 1960s, he saw how access to electricity transformed society — from farming, schools, businesses and medical facilities. As a teen visiting... | <urn:uuid:8cfcec3d-606e-4ed0-9f84-790fa921bc3b> | CC-MAIN-2017-09 | http://www.govtech.com/security/10-Big-Questions-About-the-Smart-Grid.html?page=1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00031-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946089 | 2,400 | 2.953125 | 3 |
“The biggest threat posed by USBs is data leakage, loss, and/or theft, where data is leaving some secure location and being physically carried away from that location”, explained Ashdown.
“There are different ways this can happen. This can be someone stealing data, or this can be somebody who put data on a device, took... | <urn:uuid:618aeb9e-e879-4742-9364-1d5019e3807c> | CC-MAIN-2017-09 | https://www.infosecurity-magazine.com/news/hasta-la-vista-baby-remote-kill-terminates-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00031-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956118 | 323 | 2.609375 | 3 |
A team led by Thomas Schulthess of Oak Ridge National Laboratory (ORNL) has broken the petaflop barrier with a supercomputing application likely to accelerate the revolution in magnetic storage.
Using ORNL’s upgraded Cray XT Jaguar supercomputer, the team was able to achieve a sustained performance of 1.05 quadrillion ... | <urn:uuid:d71f24f4-6281-477d-8c05-6823216867dc> | CC-MAIN-2017-09 | https://www.hpcwire.com/2008/11/19/the_search_for_stable_storage/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00559-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945965 | 1,036 | 3.0625 | 3 |
Consider three different scenarios that place healthcare patient safety at risk. The first is an individual hazard, the second human behavior, and the third a system issue in the broad sense of "system" as distinct from information technology (IT).
The first consists in placing concentrated potassium alongside diluted ... | <urn:uuid:575c08ca-6f10-4028-bfdf-624ec0d185c0> | CC-MAIN-2017-09 | http://www.b-eye-network.com/blogs/agosta/archives/2010/08/healthcare_pati.php | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00380-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957146 | 1,328 | 2.703125 | 3 |
Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products.
Researchers from Intel division McAfee Labs teamed up with members of Intel's Visual and Parallel Computing Group to analyze a proof-of-concept GPU malware program dubbed JellyFish th... | <urn:uuid:f6863164-1658-4906-b121-b3fbf7806a80> | CC-MAIN-2017-09 | http://www.itnews.com/article/2978835/intel-says-gpu-malware-is-no-reason-to-panic-yet.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00552-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94906 | 720 | 2.75 | 3 |
What is NetFlow?
NetFlow is a network protocol developed by Cisco in order to collect and monitor IP network traffic. By utilizing NetFlow, IT teams can analyze traffic flow and determine the traffic source, traffic direction, and how much traffic is being generated. To help you better understand the NetFlow process, I... | <urn:uuid:41519aec-95ac-4574-b151-a8028abf70ee> | CC-MAIN-2017-09 | http://www.liveaction.com/what-is-netflow/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00552-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917512 | 823 | 2.5625 | 3 |
Many kids don’t worry about powering down the computers they use at school when it’s time to go home. For that matter, some teachers don’t either.
Why worry about it? Think green.
Computers that are left on overnight can add up to thousands of dollars in extra energy costs — a big problem for public schools that are se... | <urn:uuid:68500978-3cbf-49c1-a76a-8e6a3b796a8d> | CC-MAIN-2017-09 | http://www.govtech.com/technology/School-Computers-Power-Drain.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00252-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949938 | 747 | 2.75 | 3 |
Tiny 3D printed battery could power devices of the future
- By Kevin McCaney
- Jun 21, 2013
A team of university researchers have taken 3D printing to the nanoscale, printing a lithium ion battery the size of a grain of sand and opening up new possibilities for tiny medical, communications and other devices.
Based at H... | <urn:uuid:e1f2ec0a-77f1-4225-9182-fedd06d946ea> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2013/07/~/link.aspx?_id=B32340BC3006403DAD411EFF29112664&_z=z | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00304-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938229 | 634 | 3.390625 | 3 |
Yet Despite Belief in Existence of “Glass Ceiling,” Women Report Being as Personally Satisfied as Men in Their Professional Careers
NEW YORK; March 8, 2006 – Despite significant gains in the past 10 years, women executives around the world still face an uphill battle in workplace equality, a new study by Accenture show... | <urn:uuid:083b75f4-36be-4ea1-901e-32b71b6d0ef8> | CC-MAIN-2017-09 | https://newsroom.accenture.com/news/most-executives-believe-workplace-equality-for-women-still-lags-behind-men-2006-accenture-study-shows.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00304-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964948 | 983 | 2.5625 | 3 |
In European plan, cars in a crash would auto-dial for help
Europe appears to be out in front of the United States when it comes to using IT to improve transportation and health care costs across state jurisdictions.
The European Parliament (EP) adopted a resolution this week urging adoption of a law that would require ... | <urn:uuid:6d5f8972-1e8d-4c12-9001-dd7231781a58> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/07/05/european-cars-with-sensors-dial-911-after-crash.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00480-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947254 | 258 | 2.53125 | 3 |
A small Japanese town, abandoned because of radiation concerns after the Fukushima nuclear plant disaster in 2011, is working with Google's map service to keep its memory alive.
Google said it will map the streets of Namie, in Fukushima Prefecture northeast Japan using Street View. The town is about 20 kilometers from ... | <urn:uuid:8d535917-61ee-424c-a1bb-c45309c385bf> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2164111/lan-wan/google-street-view-to-map-abandoned-fukushima-town.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00072-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.977078 | 347 | 2.859375 | 3 |
IBM has announced a prototype optical transceiver chipset that can transmit data over optical fiber at speeds of up to 160Gbps. IBM informs us that it's fast enough to transmit "a typical high-definition movie" per second. (Will "typical high-definition movie" replace "Library of Congress" as the SI-approved unit for "... | <urn:uuid:8140b607-f163-43cf-bf06-1d6a106c5738> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2007/03/ibm-announces-160gbps-optical-networking-chip/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00248-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943088 | 480 | 2.578125 | 3 |
L2TP Attributes Summary
Projected L2TP standard was made available in the year 1999 by means of RFC 2661. It was originated primarily from two different tunneling protocols, named as: Point-to-Point communication protocol and PPTP (Point to Point Tunneling protocol). In other words, L2TP (Layer 2 Tunnel Protocol) is an... | <urn:uuid:9b146985-072d-4509-881a-0b46482bedb8> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2013/l2tp | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00476-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.874883 | 743 | 3.25 | 3 |
Cloud security is an evolving sub-domain of information security dedicated to the protection of data, applications and infrastructure values associated with cloud computing. It incorporates a broad set of policies that are driven by the security procedures for providing maximum level of assurance for customers of cloud... | <urn:uuid:9e16fb04-f363-4c46-9373-aceb16f3a689> | CC-MAIN-2017-09 | https://cloudtweaks.com/2014/03/security-concerns-cloud-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00000-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941729 | 943 | 2.546875 | 3 |
Now that the network is installed, each switch has a bridge ID number, and the root switch has been elected, the next step is for each switch to perform a calculation to determine the best link to the root switch. Each switch will do this by comparing the path cost for each link based on the speed.
For paths that go th... | <urn:uuid:f9f45dab-c74b-4495-be7f-8c7de5c25728> | CC-MAIN-2017-09 | http://blog.globalknowledge.com/2012/10/18/what-happens-if-i-have-more-than-one-switch-with-redundant-links-part-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00420-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906925 | 1,054 | 2.859375 | 3 |
Having a military background, I tend to look at all security issues with the perspective of someone who’s served in the armed forces. That means using a thorough investigation process that doesn’t treat any action as accidental or an attack as a stand-alone incident and looking for links between seemingly unconnected e... | <urn:uuid:ad019e26-a902-4bfe-88fb-5df477b8157d> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3048846/security/what-terrorism-investigations-can-teach-us-about-investigating-cyber-attacks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00420-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958521 | 1,176 | 2.734375 | 3 |
Tweeting under the influence may not get you in as much trouble as drunk driving does, but it can still mean a whole lot of hot water. Now there's an algorithm that can tell when you're drinking while tweeting -- and also figure out where you're imbibing.
Using machine learning, researchers at the University of Rochest... | <urn:uuid:2cd2000b-d931-4c35-84be-3c3135bfd313> | CC-MAIN-2017-09 | http://www.itnews.com/article/3045255/are-you-drinking-while-tweeting-this-algorithm-can-tell.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00596-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.97395 | 402 | 2.921875 | 3 |
Historically, CCD (charged coupled device) sensors have existed much longer than CMOS sensors, that is to say, for more than 40 years. Due to constant improvement and optimization over the years, CCD sensors today stand for excellent image quality. In 2009, the American scientists Willard Boyle and George E. Smith were... | <urn:uuid:4bf45a57-f3db-4602-a0ba-c1ea9be221d8> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/cmos-and-ccd-small-differences-along-the-0001 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00296-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963591 | 263 | 3.75 | 4 |
INCOSE Systems Engineer Certs Offer Broad-Based Skills Validation
The job title of “systems engineer” might not sound all that glamorous at first, but once you consider that these IT pros work on complex systems that can include military aircraft and tanks, the job description suddenly becomes a lot more exciting.
As D... | <urn:uuid:a375d8dc-a4a8-4a8c-a262-14fe93f23893> | CC-MAIN-2017-09 | http://certmag.com/incose-systems-engineer-certs-offer-broad-based-skills-validation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00348-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951683 | 977 | 2.53125 | 3 |
Cyberkinetics, makers of the BrainGate, a neural implant that the physically impaired can use to control computers, said it will file an investigational device exemption with the FDA to conduct a pilot clinical trial this year.
Five quadriplegic participants will receive the implant.
BrainGate is a brain-computer inter... | <urn:uuid:e786ef09-5bdd-4081-aaa4-9520cc122212> | CC-MAIN-2017-09 | http://www.govtech.com/health/99413994.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00292-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.894945 | 794 | 2.921875 | 3 |
The Spatial Finder
The only real, physical parts of the personal computer interface are the screen in front of you and the mouse and keyboard under your hands. We will not consider alternate input/output devices in this article. Its what's happening on the screen that we're interested in.
Here we have a veritable blank... | <urn:uuid:1ccb627b-5d94-4d70-b893-445b0600b0a7> | CC-MAIN-2017-09 | https://arstechnica.com/apple/2003/04/finder/3/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00292-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966416 | 1,700 | 2.546875 | 3 |
When you hear the expression "big data," the next word you will often hear is "Hadoop." That's because the underlying technology that has made massive amounts of data accessible is based on the open source Apache Hadoop project.
From the outside looking in, you would rightly assume then that Hadoop is big data and vice... | <urn:uuid:0b10d0a1-bcc0-4312-b07a-51071abb98fa> | CC-MAIN-2017-09 | http://www.itworld.com/article/2711829/big-data/hpcc-takes-on-hadoop-s-big-data-dominance.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00344-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9559 | 1,604 | 2.71875 | 3 |
Troops exposed to blasts in Afghanistan and Iraq “have an increased risk of developing adverse health outcomes over the long term,” including post-traumatic stress disorder, traumatic brain injury, persistent headaches and growth hormone deficiency, according to a report released Thursday.
"Acute physical and psycholog... | <urn:uuid:68626bef-4fe7-457f-9c02-21bbda92c1c3> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2014/02/troops-exposed-blasts-more-likely-get-ptsd-tbi-other-long-term-ailments/78806/?oref=ng-dropdown | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00344-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945162 | 541 | 2.640625 | 3 |
Cookies still remain one of the largest areas of computing that the average user just doesn’t understand, and there are a myriad of different ways that a hacker can take advantage of cookies to steal a user’s personal information. Cookie stealing, which is synonymous with session hijacking, allows an attacker to log in... | <urn:uuid:b3e0b3c6-8074-4b65-be80-fe590cba9a9a> | CC-MAIN-2017-09 | https://www.hackingloops.com/tag/cookies/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00344-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938352 | 2,232 | 3.265625 | 3 |
In a paper set to be published this week in the scientific journal Nature, IBM researchers are claiming a huge breakthrough in spintronics, a technology that could significantly boost capacity and lower power use of memory and storage devices.
Spintronics, short for "spin transport electronics," uses the natural spin o... | <urn:uuid:577be04a-14ad-4b00-95b8-4a3a1296a328> | CC-MAIN-2017-09 | http://www.itworld.com/article/2725460/storage/ibm-claims-spintronics-memory-breakthrough.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00520-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940657 | 1,094 | 3.578125 | 4 |
Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attacks.
Computer OSes have advanced considerably from a security standpoint... | <urn:uuid:6082a40e-05c3-47af-b61e-b3a5ea05bbce> | CC-MAIN-2017-09 | http://www.cio.com/article/2377383/security0/users-face-serious-threat-as-hackers-take-aim-at-routers--embedded-devices.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00164-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958945 | 1,354 | 2.546875 | 3 |
Researchers are working on an app that could save people from being killed while taking dangerous selfies.
Carnegie Mellon University announced that researchers there are working with colleagues at Indraprastha Institute of Information Technology in Delhi, India to take on the issue of deadly selfies.
People around the... | <urn:uuid:676e3a93-064c-4bb9-9aed-2736fe79b3f5> | CC-MAIN-2017-09 | http://www.itnews.com/article/3144451/internet/researchers-work-to-tame-deadly-selfies.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00392-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.97374 | 633 | 2.984375 | 3 |
Harry Potter and the evolution of GIS
With geospatial advances, everyone might soon have a Marauder’s Map. Is that good?
- By Kevin McCaney
- Sep 17, 2010
In “Harry Potter and the Prisoner of Azkaban,” J.K. Rowling introduced the Marauder’s Map, a magical piece of parchment that would let the user see the location, aro... | <urn:uuid:6fed014b-ab87-4018-a050-97c8bfc60bf2> | CC-MAIN-2017-09 | https://gcn.com/articles/2010/09/20/editorial-harry-potter-gis.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00160-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954326 | 704 | 2.71875 | 3 |
I will explain the fourth point, that you should be expert in removing traces, in my future articles. Traces are very important. Please don’t ignore them or you will experience a lot of problems. Keep reading, or simply subscribe to our posts.
The primary form of SQL injection consists of code being directly inserted i... | <urn:uuid:76b67793-feda-4e86-9dfe-84d515b99af3> | CC-MAIN-2017-09 | https://www.hackingloops.com/6-ways-to-hack-or-deface-websites-online/?showComment=1312697219134 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00036-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925406 | 872 | 3.296875 | 3 |
A few days ago I wrote about an artificial intelligence startup, Vicarious, which demonstrated software that breaks the widely used - and much disliked by users - CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) used to prevent software run by the bad guys from automating the creatio... | <urn:uuid:c9fa77a8-da26-4afb-a665-2cd87adde3da> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2225794/security/keypic--replacing-captcha-without-annoying-users--updated-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00508-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963875 | 763 | 2.5625 | 3 |
Learn about the threats, risks and how to protect yourself.
Recently there has been increased media coverage regarding "BadUSB".
BadUSB is a way to theoretically manipulate any USB device to be infected with a virus (or other types of malware). This means in plain terms that an attacker will take a regular USB hardware... | <urn:uuid:34aaf1dc-eebd-4f38-a912-3272d1bd5acf> | CC-MAIN-2017-09 | https://www.endpointprotector.com/solutions/badusb-protection | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00560-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93241 | 715 | 3.25 | 3 |
Potential advantages include better backup and replication, centralized management, scalability, and sharing of resources, files, and data.
By Greg P. Schulz
The Internet has changed the way business is conducted. Information must be available 7x24x365, from anywhere in the world. New business models (e.g., "virtual st... | <urn:uuid:bb521d68-25b4-401f-a91f-b23c382b104e> | CC-MAIN-2017-09 | http://www.infostor.com/index/articles/display/65889/articles/infostor/volume-4/issue-2/features/sans-enable-internet-related-businesses.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00084-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922868 | 1,369 | 2.703125 | 3 |
Recently, IBM and the University of Texas Medical Branch (UTMB) [launched an effort] using IBM's World Community Grid "virtual supercomputer" to allow laboratory tests on drug candidates for drug-resistant influenza strains and new strains, such as H1N1 (aka "swineflu"), in less than a month.
Researchers at the Univers... | <urn:uuid:858ab9b4-f90f-4cd0-8edb-03321696ae21> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/InsideSystemStorage/date/200905?sortby=0&page=2&maxresults=5&lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00381-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940178 | 2,521 | 3.140625 | 3 |
University researchers are studying the brains of honey bees in an attempt to build an autonomous flying robot.
By creating models of the systems in a bee's brain that control vision and sense of smell, scientists are hoping to build a flying robot that can do more than carry out pre-programmed instructions. Such a rob... | <urn:uuid:4b2678e7-74cb-44c7-a26b-2462e7d50987> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2491852/emerging-technology/researchers-study-bee-brains-to-develop-flying-robots.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00081-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95012 | 602 | 4.09375 | 4 |
A study conducted at Texas A&M University has found that driver response times are significantly delayed when voicing messages aloud to your phone - troublesome news for the likes of Apple and its voice command system, Siri.
It is the first study to compare traditional texting with voice-to-text on a handheld device du... | <urn:uuid:29cf0ced-a147-49f2-8c1f-f9fb3571e0c1> | CC-MAIN-2017-09 | http://www.cio.com/article/2386443/mobile-apps/apple-s-siri-could-make-you-crash.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00257-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.974941 | 438 | 2.828125 | 3 |
Digital Reasoning is a leader in cognitive computing. We build software that understands human communication - in many languages, across many domains, and at enormous scale. We help people see the world more clearly so they can make a positive difference for humanity.
People observe patterns in the world around them an... | <urn:uuid:3b50b3f4-fd6a-46b7-8192-9ec49e7044c2> | CC-MAIN-2017-09 | http://www.digitalreasoning.com/visionary-approach/more-human | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00257-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929085 | 557 | 2.84375 | 3 |
Smart phone: 30 years in the making
- By Kevin McCaney
- Jul 08, 2013
Smart phones have become such ubiquitous tools for work and personal business that it’s easy to take them for granted, even only a few years after they first appeared. And they have revolutionized how public-sector agencies do business. But they didn... | <urn:uuid:5eb09dff-33db-4fd2-9b8d-3fee2c867082> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/05/30/gcn30-smartphone-30-years-in-the-making.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00257-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94758 | 783 | 3.0625 | 3 |
The BBC, working in collaboration with Lancaster University and Nominet, has managed to turn the micro.bit computer board into a functioning IoT device.
Launched in 2015, the micro.bit is a computer that aims to get young people interested in science, technology, engineering and maths (STEM).
It’s 4cm by 5cm in size, a... | <urn:uuid:3c567402-62a2-4f2d-ac20-63b5e3da6e9a> | CC-MAIN-2017-09 | https://internetofbusiness.com/bbcs-micro-iot-get-kids-interested-tech/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00129-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94417 | 878 | 3.25 | 3 |
Article by Dan Auerbach
Researchers Use EFF's SSL Observatory To Discover Widespread Cryptographic Vulnerabilities
Lenstra's team has discovered tens of thousands of keys that offer effectively no security due to weak random number generation algorithms.
The consequences of these vulnerabilities are extremely serious. ... | <urn:uuid:e81c5452-5952-473d-9e03-a298fd924730> | CC-MAIN-2017-09 | http://www.infosecisland.com/blogview/20260-Researchers-Discover-Widespread-Cryptographic-Vulnerabilities.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00601-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961823 | 582 | 2.78125 | 3 |
Grandfather of computing Alan Turing granted posthumous royal pardon
Dr Alan Turing, the mathematician who helped to crack the Enigma code during the second world war, has been granted a royal pardon 59 years after he took his own life. His crime? Homosexuality. In spite of his role in code cracking -- which is widely ... | <urn:uuid:945e63d6-305f-4546-aac2-b730ba67d928> | CC-MAIN-2017-09 | https://betanews.com/2013/12/24/grandfather-of-computing-alan-turing-granted-posthumous-royal-pardon/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00001-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.984998 | 554 | 2.546875 | 3 |
Enterprise Applications: 20 Things You Might Not Know About COBOL (as the Language Turns 50)
The name COBOL was selected during a meeting of the Short Range Committee, the organization responsible for submitting the first version of the language, on Sept. 18, 1959. This committee, formed by a joint effort of industry, ... | <urn:uuid:6ec3c84b-9092-41bc-9939-5c180aae0801> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Enterprise-Applications/20-Things-You-Might-Not-Know-About-COBOL-As-the-Language-Turns-50-103943 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00297-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.975294 | 161 | 2.921875 | 3 |
Scientists working to find the elusive "God particle" say they've discovered "intriguing" signs that it does exist and they are closing in on what could be a basic building block of the universe.
Researchers working at the Large Hadron Collider, the world's largest particle collider located astride the Swiss/French bor... | <urn:uuid:978f62cb-220c-4cb9-9d56-5bd64cbf5fe5> | CC-MAIN-2017-09 | http://www.itworld.com/article/2733135/consumer-tech-science/scientists-closing-in-on--god-particle--existence.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00297-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961439 | 615 | 2.765625 | 3 |
Homebrew NMS: Keep a Database of Network Assets
Our previous installment explained how to glean data from SNMP-capable devices using Perl's Net::SNMP module. Now it's time to do something useful: store this data in a database.
Over time, we find it necessary to gather more and more information. An NMS solution may be a... | <urn:uuid:a75e802b-5109-4864-aaa3-d8722b7aa580> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netos/article.php/3699296/Homebrew-NMS-Keep-a-Database-of-Network-Assets.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00473-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.895478 | 997 | 2.890625 | 3 |
- Passwords – Just as someone would use a password to access his/her computer, so too should someone install a password protection system on his/her mobile device. Passwords allow the phone to lock when not in use, preventing sensitive data from being easily compromised.
- System Updates – These are recommended by the ... | <urn:uuid:58c4f2ab-6930-43c5-abad-2dded5915329> | CC-MAIN-2017-09 | https://jive.com/blog/tips-securing-mobile-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00045-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927991 | 439 | 2.6875 | 3 |
Block Data Compression
Who chooses block data compression, and why
Anyone with a block-based storage solution can benefit from block data compression. Since compression is managed as a volume attribute, it's easy to enable, configure, and monitor regardless of user expertise.
How block data compression works
Block data... | <urn:uuid:277c7e20-cd0f-4593-8d1f-42f31dbed006> | CC-MAIN-2017-09 | https://www.emc.com/corporate/glossary/block-data-compression.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00465-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.848727 | 149 | 2.78125 | 3 |
Semantic technologies don't refer to a single technology, but rather to a side variety of tools and technologies that have to do with meaning. Some focus on structure, some on text, and some on intelligence. Understanding what sub-categories are out there can help you determine when to use each.
Semantic Web vs. Semant... | <urn:uuid:8f3c8388-8eb8-4595-ba06-48ae9cdef69c> | CC-MAIN-2017-09 | http://www.cambridgesemantics.com/semantic-university/comparing-semantic-technologies | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00041-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910924 | 171 | 2.765625 | 3 |
6. Expecting people to behave like computers
Cause: Software developers expect that computers will follow their instructions exactly. If a computer seems to make a mistake, it’s because the instructions were wrong.
Resulting bad habit: Programmers can forget that humans don’t always follow instructions exactly (or at a... | <urn:uuid:8db998e9-a2b3-4a47-abe4-e9ded159216a> | CC-MAIN-2017-09 | http://www.cio.com/article/2368848/developer/131287-0-1-2-Go-8-bad-habits-you-can-blame-on-programming.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00041-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953666 | 176 | 2.84375 | 3 |
Credit: Martyn Williams
The Solar Impulse plane takes off from Moffett Field in Mountain View, Calif.
A one-of-a-kind aircraft powered solely by solar energy took to the skies above Silicon Valley early Friday morning on the first leg of a planned trip across the U.S.
The aircraft, called Solar Impulse, has the wingspa... | <urn:uuid:ea0c8824-cdfb-4724-884c-430e962de78f> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2165962/data-center/solar-powered-plane-takes-off-on-flight-across-us.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00393-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957176 | 825 | 2.796875 | 3 |
Protect your customers from phishing attacks that impersonate your organization
What Is Consumer Phishing?
In a phishing attack, a criminal sends a large number of consumers a deceptive email appearing to come from a respected brand — typically a financial service provider or an email service provider.
The email uses s... | <urn:uuid:47cea634-bc50-4601-8a9f-845ed93849b6> | CC-MAIN-2017-09 | https://www.agari.com/consumer-phishing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00393-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916889 | 518 | 2.609375 | 3 |
UAV missions boost tech presence on border
- By Alice Lipowicz
- Dec 12, 2008
A Predator B unmanned aerial vehicle will begin its first surveillance
flights over the border between the United States and Canada in early
February, U.S. Customs and Border Protection (CBP) officials said.
test flights are part of a plan to... | <urn:uuid:6867391a-aee5-46ac-a9fa-543623b07607> | CC-MAIN-2017-09 | https://fcw.com/articles/2008/12/12/uav-missions-boost-tech-presence-on-border.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00565-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92395 | 325 | 2.5625 | 3 |
Another part of the world is stepping forward to tackle the electronic waste problem. This time it’s New Delhi in India, which has begun enforcing e-waste management requirements as of the first of May.
The Central Pollution Control Board (“CPCB”) which is a division of The Ministry of Environment and Forests that was ... | <urn:uuid:de16385e-4df6-46cf-ac6b-ad124fb53d00> | CC-MAIN-2017-09 | http://anythingit.com/blog/2012/05/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00509-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953442 | 185 | 2.53125 | 3 |
How technology can reinvigorate the education system
The path to a global No. 1 ranking in education requires technology
President Barack Obama set a goal of making the United States first in the world in post-secondary academic degrees by 2020, and Jim Shelton says technology is what will get us there.
- By Alice Lipo... | <urn:uuid:0a159c37-70e2-46da-9686-99557e05dd3c> | CC-MAIN-2017-09 | https://fcw.com/articles/2010/10/11/feat-jim-shelton-education-qanda.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00509-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958444 | 1,262 | 2.53125 | 3 |
Human babies learn words through repetition, obviously, but also by associating words with shapes (in the case of objects). Curious whether dogs learned the names of objects in the same way as people, some researchers at the University of Lincoln in the United Kingdom put a five-year-old Border Collie -- reputedly the ... | <urn:uuid:b68b187e-aa8e-4e6d-a9c4-3eb7115898f5> | CC-MAIN-2017-09 | http://www.itworld.com/article/2718271/enterprise-software/how-dogs-learn-names-of-new-objects.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00382-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95224 | 340 | 3.328125 | 3 |
For years, Microsoft has been delivering speedy and accurate Bing results with experimental servers called Project Catapult, which have now received an architectural upgrade.
The Catapult servers use reprogrammable chips called FPGAs (field programmable gate arrays), which are central to delivering better Bing results.... | <urn:uuid:016bf606-7ccf-4f03-ac20-5a96aac2d129> | CC-MAIN-2017-09 | http://www.itnews.com/article/3113496/microsofts-new-catapult-v2-server-design-is-targeted-at-ai.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00082-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940585 | 628 | 2.6875 | 3 |
Understanding the Classic Network Management Architectures
Our previous tutorial began our series on enterprise network management, and looked at the five functional areas of network management defined by the ISO as part of its research into the seven-layer Open Systems Interconnection (OSI) model. To review, these fiv... | <urn:uuid:98c16fad-8737-49fc-be07-dda6803039d6> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsp/article.php/3819086/Understanding-the-Classic--Network-Management-Architectures.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00258-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937495 | 1,362 | 2.625 | 3 |
Thanks to the finite speed of light, which places a fundamental minimum on the time it takes an electrical signal to travel a specified distance, improvements in computer processor technology require devices to become smaller and smaller. But as individual components (for instance, transistors) approach the size of the... | <urn:uuid:5b8595c2-c8e0-4194-aac6-da17f817c749> | CC-MAIN-2017-09 | http://www.datacenterjournal.com/ibm-pushes-nanotechnology-frontiers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00430-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931139 | 1,660 | 3.671875 | 4 |
- "Can't be nuthin'!" - The NOT NULL constraint
- "For singles only" - The unique constraint
- "We're number one!" - The primary key constraint
- "It's all relative" - The foreign key constraint
- "Check and check again" - The table check constraint
- Downloadable resources
- Related topics
This content is part # of # ... | <urn:uuid:1089fcd0-3041-4b00-9272-010adc461f09> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/data/library/techarticle/dm-0401melnyk/index.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00430-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.823915 | 4,422 | 2.546875 | 3 |
Domain Names Overview
Domain names are a hierarchical, administratively controlled namespace. Domain names provide an easy way for people to refer to a site.
|Shortcuts: -IANA's List
of country registrars or an unofficial list of
name registrars around the world (cached
Other related pages: Whois , Traceroute,
Internet... | <urn:uuid:04aad658-9496-4cc6-9c67-5c4b53388145> | CC-MAIN-2017-09 | http://navigators.com/domain_name.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00478-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.803797 | 275 | 3.140625 | 3 |
We often take for granted the technology we're currently using - computers, cell phones, tablets, etc., that we often forget there was a time when these devices didn't exist.
Even making a telephone call was not as cut-and-dry as it is today - before computers took away most of these functions, people needed telephone ... | <urn:uuid:04cd9075-c3ad-4862-8f3c-ef230df81693> | CC-MAIN-2017-09 | http://www.itworld.com/article/2718773/consumerization/visit-a-time-when-humans-needed-help-making-phone-calls.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00478-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953896 | 376 | 2.8125 | 3 |
Questions derived from the CompTIA SY0-101 – Security+ Self Test Software Practice Test.
Objective: Communication Security
SubObjective: Recognize and understand the administration of the following types of remote access technologies: 802.1x, VPN, RADIUS, TACACS, L2TP/PPTP, SSH, IPSEC, Vulnerabilities
Item Number: SY0-... | <urn:uuid:3b86ee25-6311-4c83-9dcd-70a76cdf499c> | CC-MAIN-2017-09 | http://certmag.com/communication-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00422-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.869996 | 453 | 2.90625 | 3 |
We knew about Java’s “Write once, run everywhere” mantra which very quickly turned into jokes like “Write once, pwn everywhere”. But with the latest Firefox zero-day, Oracle isn’t the only one that faces this problem.
Firefox, much like Java, can be found across various platforms and is quite a popular choice for peopl... | <urn:uuid:77f07f4a-0fa8-4b1a-a36f-65a804afccaf> | CC-MAIN-2017-09 | https://blog.malwarebytes.com/threat-analysis/2013/08/firefox-zero-day-a-quick-look-at-yet-another-cross-platform-exploit/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00598-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940093 | 363 | 2.5625 | 3 |
TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that mimic real-world attacks. Results are tracked to analyze employee actions and determine an organization’s social engineering risk.
TraceSecurity... | <urn:uuid:aa964a33-62bd-4a22-84fa-1443dcbff341> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/03/26/cloud-based-tool-simulates-social-engineering/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00598-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934534 | 501 | 2.578125 | 3 |
In yesterday’s post we explained what Chip and PIN cards are and how they’re catching on worldwide. Today I’d like to go over the benefits of Chip and PIN so you can see why so many countries are adopting the technology. Chip and PIN cards provide benefits to cardholders, merchants and banks, including:
Safety - Chip a... | <urn:uuid:7ebee153-df01-4aaa-8b61-f3d0432b84cf> | CC-MAIN-2017-09 | http://blog.decisionpt.com/chip-and-pin-benefits | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941542 | 220 | 2.65625 | 3 |
Simoes K.,Federal University of Goais |
Magosso R.F.,Centro Universitario Of Rio Preto Da University Unirp |
Lagoeiro C.G.,Centro Universitario Of Rio Preto Da University Unirp |
Castellan V.T.,Centro Universitario Of Rio Preto Da University Unirp |
And 6 more authors.
Revista Brasileira de Medicina do Esporte | Year: ... | <urn:uuid:fe5b9b04-7e24-494b-ae2e-d2550c6d7129> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/centro-universitario-of-rio-preto-da-university-unirp-2399013/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171781.5/warc/CC-MAIN-20170219104611-00650-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931747 | 447 | 2.78125 | 3 |
A Primer on Sidetone
Digital telephones include electronic circuitry that provides an effect called “sidetone”, which allows a caller to be able to hear their own voice through the telephone earpiece. An example of this effect can be heard by blowing into the mouthpiece of a telephone handset and hearing the sound tran... | <urn:uuid:94b26313-f594-41ab-99f1-57957162ab3d> | CC-MAIN-2017-09 | http://www.algosolutions.com/products/specialty-handsets/1075-noisy-location-handsets/reducing-sidetone.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00646-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950337 | 219 | 2.890625 | 3 |
Satellite predicts eruption
- By Frank Konkel
- Aug 23, 2013
Mount Sakurajima, photographed by NOAA's Suomi NPP satellite. (NOAA image)
One of the National Oceanic and Atmospheric Administration's satellites detected the Aug. 18 eruption of Japan's Mount Sakurajima 14 hours before it occurred, according to a statement ... | <urn:uuid:cdad9a3c-2908-442c-bf85-1a67c3fd3859> | CC-MAIN-2017-09 | https://fcw.com/articles/2013/08/23/noaa-satellite-volcano.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00342-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.905559 | 440 | 3.125 | 3 |
The leader in Eavesdropping Detection
and Counterespionage Consulting services
for business & government, since 1978.
March 30, 1912
Detective Burns Listened
to Dynamiter Plots
Instruments That Can be Used for Eavesdropping
or for Business Purposes
It has been the impression of the public that the dictograph is a very ... | <urn:uuid:0bf41c30-9579-4620-820d-9e5ed7435d3d> | CC-MAIN-2017-09 | http://counterespionage.com/1912-how-detective-burns-listened-to-dynamiter-plots.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00162-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967606 | 1,903 | 2.828125 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:2436acc1-a773-48af-b742-c0854a50d902> | CC-MAIN-2017-09 | https://docs.com/johnny-phillips/2644/chapter-6-outline | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00090-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924394 | 1,137 | 3.4375 | 3 |
I love videos that can explain difficult concepts with simple ones, such as this video that talks about the Diffie-Hellman key exchange, one of the "earliest practical implementations of key exchange within the field of cryptography," as well as the concept of the discrete logarithm. How do they do it? Paint blobs, rop... | <urn:uuid:8ebd5522-1878-4ded-af5a-32aa8fb66d45> | CC-MAIN-2017-09 | http://www.itworld.com/article/2730072/security/public-encryption-described-via-paint-blobs.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00386-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942184 | 165 | 2.578125 | 3 |
Microsoft first delivered Encarta on CD-ROM in 1993 as part of the early wave of multimedia products for PCs, before adding a website as well. In response to criticism against Wikipedia's dubious veracity, Microsoft sought credibility by acquiring other encyclopedias, including Collier's Encyclopedia and New Merit Scho... | <urn:uuid:f06af789-bc97-4a59-853a-23b1eb34dad4> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2288711/data-center/125008-Microsofts-Graveyard-16-products-that-Microsoft-has-killed.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00438-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955356 | 159 | 2.515625 | 3 |
Heart Facts - Interesting Facts About Human Heart
Let's get straight to the heart of the matter. The heart's job is to move blood. Here is a collection of some amazing and interesting facts about human heart.
Facts About Human Heart
Day and night, the muscles of your heart contract and relax to pump blood throughout yo... | <urn:uuid:027299c5-6407-4eb8-be2b-9b4b76f1e6e5> | CC-MAIN-2017-09 | http://www.knowledgepublisher.com/article-241.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00031-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942104 | 899 | 3.40625 | 3 |
On location in Africa, a movie crew wraps up the day's shooting on a nature documentary and camera operators shut down their rigs. NAND flash cards are removed from the cameras and the scenes that were just shot are transferred to another medium for delivery to a post-production facility. Magnetic tape, the oldest form... | <urn:uuid:e8a830db-7cc1-40ca-bf9f-5b99d3b816ea> | CC-MAIN-2017-09 | http://www.itworld.com/article/2715360/storage/tape-storage-finds-new-life-in-the-enterprise-and-beyond.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00083-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962365 | 1,973 | 2.515625 | 3 |
10 flaws with the data on Data.gov
Recently released high-value datasets reveal 10 types of deficiencies
Transparency should be a three-legged stool of awareness, access and accuracy. Data.gov, the federal government’s data Web portal, is focusing on the second leg of the stool: access. Of the three, accuracy, which is... | <urn:uuid:75dacff8-947e-4d0c-94b7-8b2d55353104> | CC-MAIN-2017-09 | https://gcn.com/Articles/2010/03/15/Reality-Check-10-data-gov-shortcomings.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00259-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.904689 | 897 | 2.59375 | 3 |
In the 21st century, cybercrime is rampant with hackers stealing and using data from individuals, companies and governments for their personal, financial or political gain. In particular, government agencies and large corporations are prime targets for organized hacker groups (“hacktivists”) such as Anonymous.
For exam... | <urn:uuid:2639cee8-7e44-4352-806f-2804afe333c6> | CC-MAIN-2017-09 | https://blog.allot.com/security/about-cyber-attacks-hacktivists-and-security-solutions-how-to-prepare-for-april-7-2016/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00135-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956277 | 508 | 2.515625 | 3 |
New Standard Aims to Save Massive Amounts of Power
Making networks more energy efficient requires optimizations at many different levels. One of those levels is the access layer for service provider networks that power millions of homes and businesses around the world.
The current method for deploying fibre delivery is... | <urn:uuid:875b2ed7-56e7-44ba-b4ae-f5cfa5c18bfb> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsp/new-standard-aims-to-save-massive-amounts-of-power.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00379-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949408 | 672 | 2.59375 | 3 |
For decades now, the international apparel and textile industry has faced a problem that may seem too big to solve: how to reduce or eliminate water pollution that's a direct result of the production process — especially the resource-intensive dyeing process.
The statistics are as familiar as they are disheartening: ac... | <urn:uuid:2bf802c5-62ce-4bf8-a2be-02e46441a38c> | CC-MAIN-2017-09 | http://apparel.edgl.com/magazine/November-2012/To-Solve-a-Global-Water-Pollution-Problem,-ColorZen-Starts-at-the-Molecular-Level81726 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00555-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954613 | 896 | 3.25 | 3 |
Routers, gateways, firewalls, hubs, switches comprise network security infrastructure in any business environment. Creating a robust LAN security infrastructure is one of your priorities if your business is handling a lot of data, some of which may be confidential, on a regular basis. This requires you to understand th... | <urn:uuid:eca1703e-211c-4a76-8b51-5df82ed60095> | CC-MAIN-2017-09 | http://www.belnis.com/news/tag/internet-security-threats/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00075-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928658 | 499 | 3.28125 | 3 |
Iptables is an application allowing the administration of the tables in the Linux kernel firewall. You don't need prior knowledge about the kernel, or the actual tables in it, for firewall modifications and common system administration tasks.
In some Linux distributions, iptables comes enabled by default. It is common ... | <urn:uuid:0109ff34-8817-4e15-bcf4-fdde4fff12d1> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/linux/library/os-iptables/index.html?ca=drs- | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00075-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.886715 | 4,460 | 2.9375 | 3 |
On an increasingly massive scale, cybercriminals are repurposing connected Internet of Things (IoT) devices installed within our homes. These hackers use malware to enlist our smart thermostats, speakers, lights, and more as soldiers for their botnet armies – used in coordinated massive attacks causing security breache... | <urn:uuid:63e5139d-b945-4f9d-88d3-f6af2dba7325> | CC-MAIN-2017-09 | https://www.infosecurity-magazine.com/opinions/users-secure-iot-devices/?utm_source=dlvr.it&utm_medium=twitter | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00251-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943807 | 966 | 2.625 | 3 |
We created the nightmare bacteria.
It wasn't on purpose. We could not have invented antibiotics without spurring bacterial evolution. As long as there were some bugs out there immune to the drugs, the population would adapt. Just a few years after antibiotics came into mass use in the 1940s, scientists began to observe... | <urn:uuid:85e59342-ad82-4805-b1ff-1be61d06b5ac> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2013/09/what-know-about-drug-resistant-superbugs-killed-23000-last-year/70686/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00127-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964091 | 1,179 | 3.203125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.