text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
In April of 1965, Electronics magazine published an article by Intel co-founder Gordon Moore. The article and the predictions that it made have since become the stuff of legend, and like most legends it has gone through a number of changes in the telling and retelling. The press seized on the article's argument that se... | <urn:uuid:b52d53ca-9ceb-4734-b805-21093202a6a5> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2008/09/moore/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965565 | 1,415 | 2.890625 | 3 |
Vishing and Toll Fraud
Vishing is quite similar to the term Phishing and it means collecting private information over the telephone system.
In the technical language the terminology of phishing is a recent addition. The main concept behind phishing is that –mail is sent to user by an attacker. The e-mail looks like a f... | <urn:uuid:f5ae479f-57f1-4b33-95e6-4816693504fe> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2012/voip-vishing-toll-fraud | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935914 | 634 | 3.078125 | 3 |
Learn Best Practices for Web Server Security
In this, the first of two articles, we will talk about securing the overall hosting environment, PHP (surprise), and file system permissions. Many people will try to sell you an "application firewall" or similar devices, but I tend to believe that's too reactive, and not eno... | <urn:uuid:40ce74da-7f95-48e8-a1cc-4323582d923e> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsecur/article.php/3730741/Learn-Best-Practices-for-Web-Server-Security.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00599-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942345 | 1,293 | 2.6875 | 3 |
Internet telephony – What is it and how does it work?
The terms IP telephony (IP = Internet Protocol) and Voice over IP (in short: VoIP) refer to making telephone calls via a computer network, whereby the data is transferred according to the IP Standard. This form of telephony is better known as internet telephony. It ... | <urn:uuid:383ef7ef-c262-40fb-9d82-f623d1340f5f> | CC-MAIN-2017-09 | https://www.nfon.com/en_de/solutions/resources/glossary/internet-telephony/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171781.5/warc/CC-MAIN-20170219104611-00651-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938339 | 794 | 3.734375 | 4 |
Practical Python for Network Engineers
Topic: Input and Output
Python is becoming the de-facto standard for the Software Driven Networking world. From full-blown SDN controllers to simple network device query, it is the language of choice for companies large to small due to its simplicity and maintainability. Even with... | <urn:uuid:58b6da9e-92b1-4aec-b022-ea4ddfc66b93> | CC-MAIN-2017-09 | https://streaming.ine.com/play/3e0fad47-c3d5-4689-b6a3-bc0ecb502f70/input-demo | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00175-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92787 | 175 | 2.65625 | 3 |
A quick definition of the term “Real-Time” is in order here. Probably the best way to explain this is by subtraction, or by explaining what it is not.
Consider the timings behind the process of sending and receiving an email message. Email is occasionally described as a “store and forward” protocol, and even though it ... | <urn:uuid:c9c83e26-e7f7-40e9-b883-8305531a0cf9> | CC-MAIN-2017-09 | https://www.3cx.com/blog/voip-howto/real-time-network-traffic-and-qos/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00175-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938192 | 1,786 | 3.015625 | 3 |
When all you have is a hammer, they say, everything looks like a nail. Instead, we give you a look at several language-hammers, so you can make a reasonable decision about when each is the best tool for the job.
Deciding when to use any language—including Ruby—depends on the appropriateness to task and the amount of ya... | <urn:uuid:67043877-0a6b-46c2-b025-169f1ad293fa> | CC-MAIN-2017-09 | http://www.cio.com/article/2437007/developer/you-used-that-programming-language-to-write-what--.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00351-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941164 | 289 | 2.59375 | 3 |
Last week, Montana Attorney General Mike McGrath announced a new Web site, www.safeinyourspace.org, designed to educate young people -- and the adults in their lives -- about some of the kinds of dangers they might face online.
McGrath made the announcement at an event at the Attorney General's Office in Helena. He was... | <urn:uuid:39aceea7-e9f9-457c-aefb-91189bcddac5> | CC-MAIN-2017-09 | http://www.govtech.com/security/New-Montana-Cyber-Safety-Web-Site.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00351-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967745 | 436 | 2.75 | 3 |
CLEAN Technology INC. | Date: 1997-02-11
recycled plastic in the form of pellets and flakes for use in manufacturing and for general industrial use.
CLEAN Technology INC. | Date: 1994-09-16
food grade recycled plastic in the form of pellets and flakes for use in manufacturing and for general industrial use.
Clean Techn... | <urn:uuid:1ac3c456-1389-4487-b8c9-ed443275a8d9> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/clean-technology-co-825514/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00471-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.854962 | 392 | 2.625 | 3 |
Most of us remember when femtocells were the “next big thing” in wireless services. In the early days, small-cell solutions emerged as tools for addressing gaps in wireless coverage. Today, small-cell technology is (rightfully) being repurposed to address the ever-pressing issue of mobile-bandwidth shortage. It certain... | <urn:uuid:9d3ebaaf-1161-4978-9e9e-11a47e43174f> | CC-MAIN-2017-09 | http://www.atlantic-acm.com/big-hopes-for-small-cells-but-no-clear-path-to-success/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00647-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955762 | 662 | 2.515625 | 3 |
Part of the issue is the fact that consumer security awareness is not at the level that it should be, the GAO said, and federal efforts to help have so far been lacking.
The GAO report noted that cyber criminals may use a variety of attack methods, including intercepting data as they are transmitted to and from mobile ... | <urn:uuid:fccf9cbc-d382-4001-9ae6-7bc9be3cc2fc> | CC-MAIN-2017-09 | https://www.infosecurity-magazine.com/news/mobile-malware-up-185-amid-a-lack-of-consumer/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00647-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950225 | 644 | 2.71875 | 3 |
Self-driving electric taxis, smart appliances and municipal solar power are all amenities enjoyed by the residents of the futuristic Masdar City in the Middle East. Here's how they'll make their way to the U.S.
On the outskirts of Abu Dhabi on the Persian Gulf, just southeast of Qatar and not far from Iran, a sparkling... | <urn:uuid:b99da5b0-70e9-4c9a-899e-3d6c59aead87> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2189549/data-center/urban-tech--from-masdar-to-main-street-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00347-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95336 | 2,715 | 2.609375 | 3 |
Embryonic stem cells (ESCs) have the potential to develop into any tissue, and thus hold promise for repair of damaged organs. Part of that potential comes from being a perfect tissue match to the person in need of repair, but this assumes that ESCs can be made from adults, a process that currently requires using a pro... | <urn:uuid:320ff360-bd76-40ff-9cfc-b9ed004b00c1> | CC-MAIN-2017-09 | https://arstechnica.com/science/2006/08/5112/?comments=1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00347-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.977384 | 758 | 3.671875 | 4 |
Enterprise Perimeter Security and Firewall Systems
The perimeter of the enterprise and the first line of defense, firewall systems, are vital to the security of any business. The perimeter of the enterprise establishes the boundary between the inside of the business and the outside. While businesses are vulnerable to i... | <urn:uuid:a5cc45e4-cba9-43ef-a7f0-79d116196529> | CC-MAIN-2017-09 | http://certmag.com/enterprise-perimeter-security-and-firewall-systems/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00047-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930395 | 1,521 | 3.03125 | 3 |
Technology Frontiers – IoT and Voice Recognition
We previously wrote about some of the technology frontiers we are exploring, and described three that are exciting:
- 3D Printing
- Clustered Computing
- Latest Applications, Operating Systems, and Devices
But much like exploring a new area untouched before, we have two ... | <urn:uuid:1ef384ad-7594-4d59-a746-bcae4567d083> | CC-MAIN-2017-09 | http://www.keystonecorp.com/technology-frontiers-part-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00467-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940865 | 1,833 | 3.015625 | 3 |
Windows Recovery is a fake computer analysis and optimization program that displays fake information in order to scare you into believing that there is an issue with your computer. Windows Recovery is installed via Trojans that display false error messages and security warnings on the infected computer. These messages ... | <urn:uuid:598b6843-8f2d-4bc1-94f7-dafb95d6c968> | CC-MAIN-2017-09 | https://www.bleepingcomputer.com/virus-removal/remove-windows-recovery | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00643-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.894214 | 2,647 | 2.53125 | 3 |
- Defense & Intelligence Back
- Advanced SolutionsBack
Our deployable solutions in predictive care has accelerated the development of genomics platforms and advanced precision medicine. The term “genomics” encompasses technologies from sequencing an individual’s DNA, to using informatics for data management, security a... | <urn:uuid:54ba2a4d-326d-431d-949b-21db2ecfff64> | CC-MAIN-2017-09 | https://www.leidos.com/health/precision-medicine?host=h | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00167-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.855319 | 260 | 2.71875 | 3 |
The Pareto principle states that 80 percent of outcomes can be attributed to 20 percent of the possible causes of a given event. Also known as the 80-20 rule, it's relevant to almost every field of human endeavor.
In the field of software development, the principle can be summarized by saying that most problems are cau... | <urn:uuid:190446ac-25b7-4a32-a8ce-f8a6e9180ce1> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2369322/software/10-bad-coding-practices-that-wreck-software-development-projects.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00043-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945867 | 1,276 | 3.171875 | 3 |
Joseph Schumpeter, one of my favorite economists, coined the term "creative destruction" to describe the way in which innovation disrupts how things are done, and in the process, gives rise to new companies and new ways of operating. What's been called the Internet of Things -- the rapidly proliferating connection of a... | <urn:uuid:1dcad73b-85cf-4573-a8bc-73b5b9659714> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2475818/business-intelligence/the-internet-of-things-and-real-time-analytics.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00219-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951502 | 709 | 2.671875 | 3 |
Professor of Economics
Lincoln University, New Zealand
Social Scientist, GNS Science and Director of the Joint Centre for Disaster Research
Massey University, New Zealand
Dr. Thomas Pratt
US Geological Survey, Department of the Interior
Canterbury Department of Emergency Management
Earthquakes in the central and easter... | <urn:uuid:2b0bd57c-bed7-49bb-9e59-851fa40a17d9> | CC-MAIN-2017-09 | https://govsecinfo.com/events/govsec-2014/sessions/wednesday/slp2-3.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00219-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948683 | 369 | 2.78125 | 3 |
Durech J.,Charles University |
Kaasalainen M.,Tampere University of Technology |
Herald D.,International Occultation Timing Association IOTA |
Dunham D.,KinetX, Inc |
And 8 more authors.
Icarus | Year: 2011
Asteroid sizes can be directly measured by observing occultations of stars by asteroids. When there are enough ob... | <urn:uuid:06a6fd2d-4ba2-468e-978d-38ef99450c5c> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/euraster-450509/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00219-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.867678 | 1,742 | 2.890625 | 3 |
In recognition of National Hurricane Preparedness Week, the USGS has initiated specific actions to prepare for the impending hurricane season that runs June through October.
One specific action is the use of geodressing. When Hurricane Katrina left New Orleans under water, conventional road maps became almost useless t... | <urn:uuid:c7a89b76-0176-4951-996d-6002fa38d296> | CC-MAIN-2017-09 | http://www.govtech.com/geospatial/USGS-has-Science-that-Weathers-the.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00091-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.892761 | 361 | 3.515625 | 4 |
Researchers twist light to send data at 2.56 terabits/sec
- By Henry Kenyon
- Jun 26, 2012
Researchers have developed a light-based method to transmit data at rates up to 2.56 terabits/sec. The new approach opens the possibility of high-speed satellite communications, short-range free-space terrestrial links, and poten... | <urn:uuid:fc6807a1-4611-48cb-be87-e7dd02253543> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/06/26/twisted-light-breaks-data-speed-record.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00387-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944871 | 403 | 2.546875 | 3 |
This article appeared in Ed Tech magazine.
As more colleges shift to online courses and exams, the potential for cheating grows. But new technology is on the rise that authenticates students' identities with something that can’t be shared — their bodies.
Colleges are using biometric authentication to leap past the days... | <urn:uuid:56afc9be-6544-406d-9819-88e69af3b966> | CC-MAIN-2017-09 | https://www.biosig-id.com/about/press-releases/147-biosig-id-featured-in-ed-tech-magazine-in-biometrics-we-trust | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00208-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949988 | 675 | 2.625 | 3 |
Security experts are accustomed to direct attacks, but some of today’s more insidious incursions succeed in a roundabout way — by planting malware at sites deemed most likely to be visited by the targets of interest. New research suggests these so-called “watering hole” tactics recently have been used as stepping stone... | <urn:uuid:b3bb50c5-b5e7-4a88-9ce1-3b8edf95aa08> | CC-MAIN-2017-09 | https://krebsonsecurity.com/tag/cve-2012-1723/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00084-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94302 | 714 | 2.578125 | 3 |
The U.S. Federal Communications Commission will consider letting passengers use cellular services on airplanes, breaking with a ban that has been in place for years.
At a meeting set for Dec. 12, the FCC will consider a Notice of Proposed Rulemaking to allow passengers to use mobile wireless services "via onboard airbo... | <urn:uuid:d3ac1041-75d6-45ca-9362-997e47867ee8> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2172123/smb/fcc-proposes-allowing-in-flight-cellular-use-on-airplanes.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00260-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963095 | 438 | 2.5625 | 3 |
The next innovation in health care may come from Silicon Valley.
With Google, Apple and Samsung exploring how to incorporate health IT features into wearable devices, patients may soon provide information to doctors through devices such as smartwatches that can measure and transmit biometric data. Health IT wearables w... | <urn:uuid:07aff24d-980f-4452-ad0f-d3e4dd88ea5b> | CC-MAIN-2017-09 | http://www.cio.com/article/2376612/consumer-technology/wearable-devices-with-health-it-functions-poised-to-disrupt-medicine.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00436-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966334 | 1,808 | 2.78125 | 3 |
For anyone looking to create their own global compute cloud, the botnet serves as the perfect blueprint for a resilient fault tolerant network. Lately botnets are proving to more resilient and harder to shut down then any other form of cloud technology. So needless to say we can learn a lot of our criminal counter part... | <urn:uuid:32431c04-7c8c-49ff-a72e-c84823d9d798> | CC-MAIN-2017-09 | http://www.elasticvapor.com/2008/10/fast-flux-cloud-computing-elastic.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00436-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945587 | 577 | 2.75 | 3 |
DARPA's $2M challenge: Robots that drive, use tools, stop leaks
- By Henry Kenyon
- Apr 11, 2012
In the not-too distant future, putting out hazardous chemical fires, working on damaged nuclear reactors and other dangerous emergency response jobs may be handled by robots.
The Defense Department’s cutting-edge research a... | <urn:uuid:8ce912e8-f5dd-4032-9db4-d50c702f7134> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/04/11/darpa-robotics-challenge-disaster-response.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00556-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917897 | 823 | 2.734375 | 3 |
Traditional network equipment has been unable to cope with the huge data traffic
A morning in 2011, an engineer of the world’s most popular social network Facebook press a button, and the results of the company’s entire business to a standstill. This unknow the engineer who was not supposed to make mistakes. He was jus... | <urn:uuid:e3eca314-35c0-4a8a-a045-91cfcf4e4ae0> | CC-MAIN-2017-09 | http://www.fs.com/blog/google-and-facebook-how-to-use-fibre-network-upgrade-transmission-speed.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00076-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952348 | 1,543 | 2.890625 | 3 |
What is it?
Extensible Stylesheet Language (XSL) is a style sheet format for XML (Extensible Markup Language) documents. It is the XML counterpart to the Cascading Style Sheets (CSS) language in HTML (Hypertext Markup Language).
Unlike HTML, which uses predefined tags (for instance, < p > meaning paragraph) that are un... | <urn:uuid:a96a9abc-b008-403b-9d17-11fff198482e> | CC-MAIN-2017-09 | http://www.computerweekly.com/opinion/Hot-skills-Putting-style-into-XML-presentations | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00604-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923086 | 860 | 3.96875 | 4 |
Before he lost the ability to sleep through the night; before the panic attacks started; before he drove his truck over an improvised explosive device, leaving him with traumatic brain injury; before a second roadside bomb did the same thing a few weeks later—before all of that, on the U.S. military base near Kandahar,... | <urn:uuid:4b70b45b-0504-4c8f-a954-3adec575a45f> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2014/08/changing-memories-treat-ptsd/92585/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00604-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958354 | 2,079 | 2.765625 | 3 |
Los Angeles County is the largest county in the nation. Its population of approximately 9.9 million is exceeded by only eight states.
There are 88 cities in L.A. County, covering a geographic span of 4,081 square miles. Yet 65 percent of the county -- home to a million people -- remains unincorporated. Those people and... | <urn:uuid:8f155216-61eb-4dcb-acca-649ba821b1a9> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Car-54-Where-Are-You.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00304-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962411 | 1,214 | 2.625 | 3 |
Evaluate the SQL statement: TRUNCATE TABLE DEPT; Which three are true about theSQL statement? (Choose three.)
You need to design a student registration database that contains several tables storingacademic information. The STUDENTS table stores information about a student. TheSTUDENT_GRADES table stores information abo... | <urn:uuid:400d75fd-be78-4ef3-928d-e0f83b7b11ef> | CC-MAIN-2017-09 | http://www.aiotestking.com/oracle/category/exam-1z0-051-oracle-database-11g-sql-fundamentals-i-updated-april-20th-2016/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00480-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.837901 | 364 | 3.328125 | 3 |
Dr Louise Bennett explains the difference between security, secrecy, privacy and anonymity online.
At a roundtable hosted by Silent Circle, Dr Louise Bennett, chair of the Security Community of Expertise, talked about the issues in differentiating security, secrecy, privacy and anonymity online.
"The real balancing act... | <urn:uuid:252c0db3-3480-44e3-81c1-8a14ca0e1e84> | CC-MAIN-2017-09 | http://www.cbronline.com/news/do-you-want-to-be-private-or-anonymous-on-the-net | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00476-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967848 | 1,182 | 2.84375 | 3 |
With there now being more mobile phones on the planet than people and smartphones set to achieve saturation in just 10 years, unlocking the data held on them has increasingly needed to be used as vital evidence for police forces.
However as apps – and the data held within them – have moved into the cloud, police forces... | <urn:uuid:8a388b1b-63f7-42db-8e56-ffe9e6592c9b> | CC-MAIN-2017-09 | http://www.information-age.com/peering-through-cloud-how-cloud-data-can-be-vital-component-law-enforcement-123461065/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00476-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944902 | 1,173 | 2.53125 | 3 |
Stream Control Transmission Protocol (SCTP) is a Transport Layer computer networking protocol, used to transmit multiple streams of data at the same time between two end points with a network connection. It ensures reliable, in-sequence transport of messages with congestion control, similar to Transmission Control Prot... | <urn:uuid:665970a5-832c-47b8-81ef-8e72b7bfd4b2> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/open-source/open-standards/sigtran.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00296-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907694 | 359 | 3.515625 | 4 |
That breeze you feel? It's more than just a pleasant sensation on your face.
We don't often think of it, but the wind represents the heating and cooling cycle of 5.5 quadrillion tons of air by a medium-sized star about eight light-minutes away. Heated air rises, and cooler air meanders, rushes, or otherwise moves in to... | <urn:uuid:c356aa6f-e0dc-4fe1-8587-2abd273e2938> | CC-MAIN-2017-09 | http://www.itworld.com/article/2721868/big-data/turbine-company-knows-which-way-the-wind-blows-at-your-house.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00348-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957529 | 690 | 2.921875 | 3 |
Reports this week that the National Security Agency uses radio signals to collect data from tens of thousands of non-U.S. computers, some not connected to the Internet, is sure to fuel more acrimony towards the U.S. spy agency.
But observers note that the NSA is not the first of the world's spy agencies to use such tec... | <urn:uuid:cefcbe81-9edc-4b8b-86fc-f7ee71db602c> | CC-MAIN-2017-09 | http://www.computerworld.com.au/article/535996/spy_agencies_around_world_use_radio_signals_tap_data_from_targeted_systems/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00644-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962173 | 1,128 | 2.640625 | 3 |
Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
During the 1920s and 1930s in the United States, there was a rather famous bank robber named Willie Sutton. He was called "The Gentleman Bank Robber" bec... | <urn:uuid:43384854-21c6-4f96-82ac-b5f6ca6cc6d6> | CC-MAIN-2017-09 | https://www.globalknowledge.com/ca-en/resources/resource-library/white-paper/cybercrime-101/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00040-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951868 | 887 | 3.328125 | 3 |
Fact: We need fast, reliable Internet. And increasingly, we need it everywhere.
Nearly three-quarters of us believe that having high-speed Internet in every room of the house is either vitally important or very important. That’s according to our latest Consumer Entertainment Index study.
High-speed Internet is so impor... | <urn:uuid:32a268e6-5d08-4555-b25a-397d5d951e8c> | CC-MAIN-2017-09 | http://www.arriseverywhere.com/tag/internet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00216-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935367 | 533 | 2.515625 | 3 |
Google Ideas announces tools to combat online censorship #FreedomOfSpeech
Access to the internet and the ease of communication it affords us is something we now take for granted. In a sense this is how it should be -- access to the internet really should be seen as a right. But in all too many countries around the worl... | <urn:uuid:cd6db530-3023-4b57-ba77-97eaf02128a2> | CC-MAIN-2017-09 | https://betanews.com/2013/10/21/google-ideas-announces-tools-to-combat-online-censorship-freedomofspeech/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00216-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934663 | 391 | 2.625 | 3 |
Back in the 1970s, Kotaku Wamura, then-mayor of Fudai, Japan, built a huge floodgate between his town and the sea as protection from tsunamis. He had a difficult time of it -- it was ugly, and it cost more than $30 million in today's dollars. But in March 2011, the floodgate saved Fudai from the tsunami that hit and de... | <urn:uuid:c49c7f63-9f86-4b06-9246-95e059b0450d> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/House-of-Brick-Disaster-Resilience.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00568-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963091 | 549 | 3.046875 | 3 |
The Internet is becoming harder to browse for users of Tor, the anonymity network that provides greater privacy, according to a new study.
The blame can be placed largely on those who use Tor, short for The Onion Router, for spamming or cyberattacks. But the fallout means that those who want to benefit from the system'... | <urn:uuid:0832e182-c36f-46db-a170-4661b5958dd9> | CC-MAIN-2017-09 | http://www.itnews.com/article/3037178/tor-users-increasingly-treated-like-second-class-web-citizens.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00512-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953275 | 589 | 2.671875 | 3 |
Bitcoin is a new online digital currency which has been in the news recently because of its dramatic price fluctuations. The currency uses peer-to-peer networking for transfers, whereas digital certificates, cryptographics, and decentralised processing provide security. It has been referred to as MOIP – Money Over Inte... | <urn:uuid:1466ca6d-3c5e-4632-93fc-008356e73622> | CC-MAIN-2017-09 | https://dwaterson.com/2013/06/30/bitcoin-its-all-about-the-money-money-money/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00512-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947575 | 847 | 3 | 3 |
Bagle, a new Internet Worm, Makes Its Presence Felt
19 Jan 2004
Kaspersky Lab, a leading information security software developer is warning users about I-Worm.Bagle, a new Internet worm detected in the wild. The worm spreads via email with a random sender address. Kaspersky Lab has received reports of infections from a... | <urn:uuid:2299c62d-5b7f-46e1-bd2d-a7ac1680e586> | CC-MAIN-2017-09 | http://www.kaspersky.com/au/about/news/virus/2004/Bagle_a_new_Internet_Worm_Makes_Its_Presence_Felt | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00036-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.862757 | 325 | 2.71875 | 3 |
MADRID (AP) — Farmers drilling ever deeper wells over decades to water their crops likely contributed to a deadly earthquake in southern Spain last year, a new study suggests. The findings may add to concerns about the effects of new energy extraction and waste disposal technologies.
Nine people died and nearly 300 wer... | <urn:uuid:45a08675-17c3-4e7f-b61f-042abe570ce2> | CC-MAIN-2017-09 | http://www.continuityinsights.com/news/2012/10/scientists-link-deep-wells-deadly-spain-quake | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00564-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9775 | 1,189 | 3.234375 | 3 |
The Digital Twin
How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future.
In recent news, Samsung Ele... | <urn:uuid:b9084231-eba9-43aa-a1a1-6acf09be7c20> | CC-MAIN-2017-09 | https://cloudtweaks.com/2016/09/digital-twin-end-dreaded-product-recall/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00264-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942158 | 1,380 | 2.703125 | 3 |
“SMiShing” is a silly word—even sillier than “phishing,” but equally dangerous.
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. The term is a reference to the scamm... | <urn:uuid:faa2505d-0beb-446a-bde3-6ec9d7493d42> | CC-MAIN-2017-09 | https://securingtomorrow.mcafee.com/consumer/family-safety/protect-yourself-from-smishing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00085-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919448 | 471 | 3.140625 | 3 |
Necessity is the mother of invention – Plato
Gartner’s “Hype Cycle for Emerging Technologies 2012” predicts that cloud computing will reach a plateau of productivity in 2-5 years’ time. The key enabling technologies for this are fast wide area networks, powerful expensive server computers and high performance virtualiz... | <urn:uuid:887192e7-d12d-47ae-aa83-6965274f08d5> | CC-MAIN-2017-09 | https://www.hcltech.com/blogs/engineering-and-rd-services/cloud-computing-standards | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00085-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913955 | 1,756 | 2.546875 | 3 |
Major Characteristics of Simulation
Simulation is a specialized type of modeling tool. Most models represent or abstract reality, while simulation models usually try to imitate reality. In practical terms, this means that there are fewer simplifications of reality in simulation models than in other quantitative models.... | <urn:uuid:5620387c-2faa-457f-9c61-1d6ddab31b80> | CC-MAIN-2017-09 | http://dssresources.com/subscriber/password/dssbookhypertext/ch9/page20.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00437-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915422 | 232 | 3.46875 | 3 |
There is really so much junk floating around in space the government needs help keeping track of it all. This week the Defense Advanced Research Projects Agency announced a program to utilize amateur astronomers to help watch space for any dangerous junk that maybe be threatening satellites or other spacecraft and even... | <urn:uuid:8c5c6509-d8e0-4621-8407-12f11f0bced2> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2223503/security/darpa-wants-army-of-networked-amateur-astronomers-to-watch-sky-for-space-junk.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00437-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.89902 | 687 | 3.015625 | 3 |
The “Internet of Things” is here.
Americans are adapting to a world in which virtually everything — from cellphones and cars to washing machines and refrigerators — is going to be connected to the Internet or networks. Many of these devices will — and do — “talk” to one another via tiny sensors that function almost lik... | <urn:uuid:c97a9091-f4ad-42ed-8850-7927177fd5bd> | CC-MAIN-2017-09 | http://www.govtech.com/internet/Experts-Gov-Officials-Acknowledge-Transformative-Power-of-the-Internet-of-Things.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00613-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949699 | 1,028 | 3.078125 | 3 |
A home's Wi-Fi dead zones are, to most of us, a problem solved with guesswork. Your laptop streams just fine in this corner of the bedroom, but not the adjacent one; this arm of the couch is great for uploading photos, but not the other one. You avoid these places, and where the Wi-Fi works becomes a factor in the wear... | <urn:uuid:cf4a9ba2-56c5-4e19-a507-95987dc2acde> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2014/08/mapping-wi-fi-dead-zones-with-physics-and-gifs/?comments=1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00613-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964377 | 539 | 2.828125 | 3 |
What is General Data Protection Regulation (GDPR)?
In a world of intellectual property theft, data breaches, and other cybercrimes, governments are creating regulations that require companies to take appropriate care when handling confidential personal data. The European Union's (EU) General Data Protection Regulation ... | <urn:uuid:01c4d198-edfb-44e5-8567-c407769b1c1e> | CC-MAIN-2017-09 | https://www.delphix.com/solutions/data-masking/gdpr | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00557-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.890249 | 513 | 2.9375 | 3 |
Managing Security Risks in a Wireless World
Wireless networks are extremely prevalent today, both at home and in work settings. This increased adoption of wireless networks can be attributed to lower cost and ease of installation, combined with benefits such as increased portability and productivity.
Setting up wireles... | <urn:uuid:2dbb8422-018f-49ee-89b9-9a1b3be9832a> | CC-MAIN-2017-09 | http://certmag.com/managing-security-risks-in-a-wireless-world/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00609-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927546 | 1,530 | 2.703125 | 3 |
Future Shock: The Internet of Compromised Things It's doubtful that the average consumer would be aware that his or her refrigerator was participating in a DDoS attack. Even fewer would have any idea how to stop it.
If it contains software, it can be hacked. If it is connected to the Internet, it can be hacked remotely... | <urn:uuid:c4055eb6-292a-4d9e-ab78-f23eac50b8cb> | CC-MAIN-2017-09 | http://www.darkreading.com/vulnerabilities-and-threats/future-shock-the-internet-of-compromised-things-/d/d-id/1113550?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00133-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963085 | 925 | 2.75 | 3 |
Black Box Explains Spanning Tree and Alpha Ring Protocols
As computer networks have become mission-critical assets for most, if not all, businesses, keeping the network up and running has assumed a crucial importance. Just as there are different types of traffic that run over a computer network, there are different sol... | <urn:uuid:07f68c30-4cd8-49fe-a951-01957ce550fe> | CC-MAIN-2017-09 | https://www.blackbox.com/en-pr/products/black-box-explains/spanning-tree-and-alpha-ring-protocols | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00485-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930059 | 703 | 3.546875 | 4 |
NIST looks at forensics tools for handheld devices
- By William Jackson
- Sep 13, 2004
As crime goes high-tech, investigators need to be familiar with techniques and tools for gathering, preserving, analyzing and documenting data from digital devices.
Handheld devices, such as personal digital assistants, are a distinc... | <urn:uuid:d9ab4fb7-0cdc-4d6e-bd5d-7bc85a509f42> | CC-MAIN-2017-09 | https://gcn.com/articles/2004/09/13/nist-looks-at-forensics-tools-for-handheld-devices.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00077-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.914515 | 352 | 2.578125 | 3 |
Google Street View Documenting Japan's Nuke Evacuation Area
In a related move, Google has announced that it now offers Google Public Alerts in Japan to help with emergency preparedness due to the ongoing risks of earthquakes and tsunamis in the region. "With nearly 5,000 earthquakes a year, it's important for people in... | <urn:uuid:cdb7a64e-b746-4562-95b7-ab9eca22675b> | CC-MAIN-2017-09 | http://www.eweek.com/cloud/google-street-view-documenting-japans-nuke-evacuation-area-2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00429-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950626 | 422 | 2.703125 | 3 |
A new algorithm uses cutting-edge techniques to help computers identify human activity from video input far more quickly and efficiently than previous systems.
Its inventors, MIT post-doc Hamed Pirsiavash and University of California at Irvine professor Deva Ramanan, will present the algorithm at the Conference on Comp... | <urn:uuid:62eb263a-34a4-4fba-a31d-287fdff9924f> | CC-MAIN-2017-09 | http://www.computerworld.com.au/article/545104/computer_knows_re_bowling_new_algorithm_identifies_human_activity_from_video/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00129-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950661 | 448 | 2.921875 | 3 |
By Patricia Resende / CIO Today. Updated October 01, 2009.
Nvidia used the GPU Technology Conference in San Jose, Calif., to show the world it has reached a new milestone in graphics processing. Nvidia demonstrated its next-generation GPU architecture, code-named Fermi. The new architecture will not replace the CPU, bu... | <urn:uuid:080caa92-324d-4b1e-8698-b5d259fa6103> | CC-MAIN-2017-09 | http://www.cio-today.com/article/index.php?story_id=13200G4U7ZO0 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00481-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928233 | 626 | 2.96875 | 3 |
HTTPS Security Encryption Flaws FoundSecurity researchers find weaknesses that could be exploited to crack some types of encrypted Web communications.
Anonymous: 10 Things We Have Learned In 2013 (click image for larger view and for slideshow)
Security researchers have discovered weaknesses that could be exploited to c... | <urn:uuid:bba81bc6-686c-467f-a57b-af7a715ed042> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/https-security-encryption-flaws-found/d/d-id/1109137?cid=sbx_byte_related_mostpopular_byte_news_apple_motion_to_ban_samsung_products_den&itc=sbx_byte_related_mostpopular_byte_news_apple_motion_to_ban_samsung_products_den | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00481-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952074 | 1,008 | 3 | 3 |
Agency: NSF | Branch: Standard Grant | Program: | Phase: DISCOVERY RESEARCH K-12 | Award Amount: 449.97K | Year: 2013
Inquiry Primed: An Intervention to Mitigate the Effects of Stereotype Threat is an Exploratory Project in the Teacher Strand of DRK-12 that investigates stereotype threat at the classroom level and in t... | <urn:uuid:390ed9f7-c32a-43a5-b490-2ba48c1a4218> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/cast-inc-512806/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00005-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922991 | 1,276 | 2.65625 | 3 |
Welcome back my fellow hackers! There have been some articles I’ve been wanting to write regarding social engineering, more specifically, stealing passwords. But, in order to do that, there are some basic concepts and methods we needs to have a grasp of. The first of these concepts is Man in the Middle Attacks. Since w... | <urn:uuid:ead83764-496e-4d3f-a555-c6f62c3dd699> | CC-MAIN-2017-09 | https://www.hackingloops.com/tag/man-in-the-middle/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00425-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928587 | 1,576 | 3.015625 | 3 |
The second commercial venture to ink a deal with NASA to run resupply missions to International Space Station successfully docked at the orbiting facility on Sunday.
Astronauts on the space station used a robotic arm to grab hold of the Cygnus cargo spacecraft, built and operated by Orbital Sciences, as it approached t... | <urn:uuid:7b292d13-6356-4101-a5cc-6557971bf200> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2170366/data-center/nasa-doubles-commercial-fleet-after-successful-cygnus-docking.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00649-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951316 | 750 | 2.734375 | 3 |
On the 20th of this month will be the 40th anniversary of the first Moon landing, Apollo 11, famously taking Neil Armstrong and Buzz Aldrin for man’s first Moon walk. The Lunar Excursion Module (LEM) was fundamentally a simple machine which was designed to fall to the Moon rather than fly, with one giant rocket motor u... | <urn:uuid:4d1eff76-8ca2-45e0-b6bd-ec727465292c> | CC-MAIN-2017-09 | http://www.dialogic.com/den/developers/b/developers-blog/archive/2009/07/09/moon-40.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00173-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959341 | 918 | 3.734375 | 4 |
A single malicious botnet can harness enough machines to take down key Internet infrastructure and create financial havoc. Millions of computers on the Internet can be compromised. But there are measures that network managers can take to mitigate these botnet threats, using many of the tools already available to help p... | <urn:uuid:1f321369-1294-4067-a622-24a4b1236cd3> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Security/How-to-Mitigate-the-Increasing-Botnet-Threat | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00349-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940262 | 873 | 2.84375 | 3 |
The problem with that analysis is storage performance isn't as simple as bandwidth alone. In this, the first installment in a three-part series, we'll discuss the basic storage performance metrics: throughput, IOPS and latency. In the second installment we'll cover how you have to consider IOPS and latency together; in... | <urn:uuid:199f1ba3-13ca-47bb-bb4a-d33d23fe7ce0> | CC-MAIN-2017-09 | http://www.networkcomputing.com/storage/ssds-and-understanding-storage-performance-metrics/1349951544 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00645-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925815 | 954 | 2.859375 | 3 |
University of Wisconsin geologist Shanan Peters was frustrated by how much he didn’t know.
Most geological discoveries were locked away in troves of research journals so voluminous that he and his colleagues could read only a fraction of them. The sheer magnitude of existing research forced most geologists to limit the... | <urn:uuid:6ee29b52-fe18-4d6a-8fc8-d4113e2b9664> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2013/04/welcome-data-driven-world/62319/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00345-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952376 | 2,899 | 2.953125 | 3 |
University researchers have taken an important step forward on cloud security by proving it's possible for a server to process encrypted data and to send back a still-encrypted result.
The technique, developed at the Massachusetts Institute of Technology (MIT), is based on homomorphic encryption, which makes it possibl... | <urn:uuid:2f2f7676-d885-4f4d-ad6f-e5f08b0b5536> | CC-MAIN-2017-09 | http://www.cio.com/article/2385080/encryption/mit-researchers-advance-cloud-security-with-end-to-end-encyrption.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00521-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931085 | 684 | 3.203125 | 3 |
Phishing attacks -- like the one that may have been behind the recent Twitter AP hoax -- will persist because they work. Social engineering scams will grow more creative in their efforts to con people into coughing up bank account info, network credentials and other sensitive data. And social sites -- all of which are ... | <urn:uuid:b74b7b91-7757-4eb8-8257-5e9524ccdad8> | CC-MAIN-2017-09 | http://www.networkcomputing.com/government/twitter-trouble-9-social-media-security-tips/1591868953?cid=rssfeed_iwk_authors | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00397-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953177 | 1,161 | 2.6875 | 3 |
What is phishing? – in the cyber world, phishing is a serious crime and that can be referred to as online fraud. This sin is made in the form of online attacks with the help of forged e-mails and counterfeit websites in order to obtain the confidential and sensitive information of those who are involved in online corre... | <urn:uuid:16c64bf2-be66-46d4-a7f3-003d69df4069> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/counterfeit-websites | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00217-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959478 | 114 | 3.078125 | 3 |
No matter how hard you try to stay safe, some aspects of securing your online data are completely out of your hands. That fact was made painfully obvious on Monday, when the Internet got caught with its collective pants down thanks to a critical vulnerability affecting a fundamental tool for secure online communication... | <urn:uuid:33ebf3a6-60ee-4ffb-8fb6-259f2c91f751> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2175981/lan-wan/the-critical--widespread-heartbleed-bug-and-you--how-to-keep-your-private-info-safe.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00037-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959406 | 1,116 | 2.75 | 3 |
Illinois school district uses Toshiba Tablet PCs to facilitate teacher-student collaboration.
By bringing Tablet PCs and wireless projectors into its classrooms, Hinsdale Township Public High School District 86 is revolutionizing teaching in Illinois.
It was nearly eight years ago that the schools mobile computing visi... | <urn:uuid:508322e2-619d-43d6-940d-4fe7c063a356> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Desktops-and-Notebooks/Big-WLAN-on-Campus | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00565-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967157 | 674 | 2.578125 | 3 |
This story began with a simple question: if a facial recognition system processes a lot of pictures of a child, will it recognize that person when he or she grows up?
If I were to upload all my childhood photos to Facebook (or some future Facebook), could a biometric identification system link the button-nosed, round-c... | <urn:uuid:b6f22560-a9d2-4eda-89e7-6cbb7ffce322> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2014/05/computers-see-your-face-child-will-they-recognize-you-adult/84319/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00089-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964146 | 1,801 | 2.796875 | 3 |
Using the Windows 2000 Distributed File System
In Windows NT 4.0, Microsoft provided an add-on product called Distributed File System (DFS) that allowed physically separate network file resources to be grouped together and accessed as if they were a single logical structure. The product, which was a free download, fail... | <urn:uuid:3d638ecc-5faf-43da-9237-4ccabed2998b> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsysm/article.php/624521/Using-the-Windows-2000-Distributed-File-System.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00562-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.909112 | 1,476 | 2.71875 | 3 |
As our increasingly wireless and gadget-filled world demands better screens and more complex functions, the underlying technology that may be showing the most signs of strain is also one of the oldest: batteries. Threatened with replacement and subject to massive recalls, the battery technology that we all rely on has ... | <urn:uuid:8a0e7b8b-cbdd-4f6d-87f3-7db998d16aa5> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2007/05/manganese-electrode-could-double-litium-ion-battery-capacity/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00562-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964637 | 411 | 3.671875 | 4 |
Imagine being able to securely open the front door to your home by simply touching the handle. Through a combination of your mobile device and your skeletal frame-which can uniquely identify you — this can happen today. No need to fumble through your belongings to find your keys or your cell phone — a device on your bo... | <urn:uuid:97b15f61-2d7c-483a-8ee8-0681ef3c025d> | CC-MAIN-2017-09 | https://www.att.com/gen/press-room?pid=22683 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00086-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934372 | 618 | 2.546875 | 3 |
Atom manipulation makes for world record.
IBM (NYSE:IBM) produces the worst animated movie I've ever seen. Terrible production values, laughable plot, and awful soundtrack. At least it's mercifully short. Two thumbs down. Still, it does at least show what's possible when you manipulate and photograph individual atoms.
... | <urn:uuid:85d2d0a5-4d46-4aea-a85e-46260c2b4588> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2475257/data-center/ibm-makes-feeble-movie-about-a-boy--madewithatoms.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00558-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9172 | 596 | 2.515625 | 3 |
University researchers have developed a technique that governments and Internet service providers could use to bypass secured Internet connections and gather valuable personal information.
The "analysis attack" on HTTPS traffic had an 89 percent accuracy rate in determining the Web pages a person visited, according to ... | <urn:uuid:f9a0dea0-b78a-42bf-973d-f9b0b68ed3cc> | CC-MAIN-2017-09 | http://www.cio.com/article/2378010/security0/researchers-attack-secured-internet-activity-to-mine-personal-data.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00082-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949884 | 654 | 2.59375 | 3 |
Google has entered into a partnership with Douglasville- Douglas County Water and Sewer Authority to recycle greywater for cooling its data center in Douglas County, Georgia. Greywater is the water that is recycled from showers and bathtubs from residential facilities. Normally, this greywater finds its way into the Ri... | <urn:uuid:bca3b6d2-16d1-4a0d-81a2-c3601de11ec4> | CC-MAIN-2017-09 | http://www.datacenterjournal.com/google-recycling-water-for-data-center-cooling/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00434-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956809 | 215 | 2.65625 | 3 |
What's the difference between a robotic car made by Google, and the ones made by actual carmakers? The future, as always, was on display at the Consumer Electronics Show today, where Toyota and Audi unveiled their new autonomous cars of the future — concepts that should not be confused with the Google version, which is... | <urn:uuid:537722a1-9b41-4980-bbca-e71ba1c48935> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2013/01/auto-industry-drops-robot-chauffeurs-favor-safest-car-all-time/60558/?oref=ng-relatedstories | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00310-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969751 | 443 | 2.53125 | 3 |
Microsoft's research division has developed a keyboard that can interpret basic hand gestures, potentially bridging a gap between touch devices and more traditional input methods.
[See the keyboard in action in a video on YouTube.]
Presented at the Computer Human Interaction (CHI) conference in Toronto, the prototype k... | <urn:uuid:baea2dfe-3bd7-45fe-ac52-15c35c4c756a> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2176493/data-center/microsoft--39-s-prototype-keyboard-understands-gestures.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00606-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942638 | 405 | 2.921875 | 3 |
Using statistics and analytical data to predict criminal activity has become standard practice in many police departments across the United States. Crime forecasting may get more accurate as new computer algorithms are developed, but experts believe that fresh data streams, not technology advancements, will drive innov... | <urn:uuid:f8cb2950-00eb-4722-9f8c-b246b807bdda> | CC-MAIN-2017-09 | http://www.govtech.com/featured/Behavioral-Data-and-the-Future-of-Predictive-Policing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00302-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951679 | 2,704 | 2.90625 | 3 |
Bridging Private and Public Clouds
Scaling IT means using tools and services on both sides of the cloud divide.A divide as real as any weather front separates private, wholly owned data centers from public, capacity-for-hire cloud providers. There is a role for IT in creating a bridge across this divide as virtualizati... | <urn:uuid:43e8ac3c-49b8-4155-a2da-1109a999980b> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Cloud-Computing/Bridging-Private-and-Public-Clouds-590165 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00002-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943105 | 1,038 | 2.53125 | 3 |
Researchers in Colorado are investigating the potential for the state’s irrigation canals to be used as a source of renewable hydropower.
Engineering firm Applegate Group Inc. and Colorado State University have received a $50,000 grant from the Colorado Department of Agriculture to look into generating hydropower from ... | <urn:uuid:d88f1176-70af-4877-b72a-3ca819e5adc5> | CC-MAIN-2017-09 | http://www.govtech.com/technology/Colorado-Hydropower-Irrigation-Ditches-030111.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00178-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958731 | 615 | 3.390625 | 3 |
The Obama administration’s plan to share weather satellite frequencies with commercial cellular carriers could severely degrade scientists’ ability to forecast hurricanes and monitor flooding, weather and spectrum, experts told Nextgov.
The Federal Communications Commission proposed reallocating spectrum used by weathe... | <urn:uuid:e50acdfd-c71e-4514-9a62-56aadc20b1e3> | CC-MAIN-2017-09 | http://www.nextgov.com/mobile/2012/11/next-hurricane-sandy-might-come-without-warning/59249/?oref=ng-relatedstories | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00650-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919811 | 741 | 2.515625 | 3 |
Electronic data resides in two basic areas:
- In bulk in some form of repository, such as a database or collections of individual files (called data at rest)
- In small quantities being transmitted over a network (called data on the wire)
Your data is vulnerable no matter where it resides. While most companies take sec... | <urn:uuid:87302972-db7b-455a-ac92-644940269802> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2004/12/20/why-your-data-is-at-risk/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171166.18/warc/CC-MAIN-20170219104611-00650-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910389 | 2,268 | 3.390625 | 3 |
The possibility of Wikipedia being taken over by attackers was just foiled by quick action on the part of Wikimedia Foundation, the nonprofit that operates Wikipedia, with the help of Check Point, the security firm that discovered the critical security hole in its code.
"It is conceivable that someone who discovered th... | <urn:uuid:cdfd5726-ee3b-428a-95c6-3ed66b04859a> | CC-MAIN-2017-09 | http://www.computerworld.com.au/article/537051/wikipedia_dodges_critical_vulnerability_could_let_attackers_take_over/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00174-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952552 | 905 | 2.625 | 3 |
SSS is a general term that is more applicable because memory-based storage can come in a variety of configurations. SSD is a very specific term that should be limited to memory-based storage that happens to be in a hard drive form factor. The advantage of SSD, of course, is that it, for the most part, can be installed ... | <urn:uuid:027fc63b-a2fc-4b46-99bd-1070be7ddfcb> | CC-MAIN-2017-09 | http://www.networkcomputing.com/storage/solid-state-disk-or-solid-state-storage/300506920?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00050-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962884 | 480 | 2.890625 | 3 |
Image scanning techniques
Interlaced scanning and progressive scanning are the two image scanning techniques available today for reading and displaying information produced by image sensors. Interlaced scanning is used mainly in CCDs. Progressive scanning is used in either CCD or CMOS sensors. Network cameras can make ... | <urn:uuid:be51f85a-6972-4698-a5a0-7343757f6a00> | CC-MAIN-2017-09 | https://www.axis.com/us/en/learning/web-articles/technical-guide-to-network-video/progressive-scan | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00470-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927898 | 703 | 3.515625 | 4 |
The Department of Environmental Quality, in cooperation with the Department of Natural Resources and Department of Information Technology, Tuesday announced the availability of the Michigan Surface Water Information Management (MiSWIM
The MiSWIM system is a new, state-of-the-art Internet mapping application designed to... | <urn:uuid:c0b830c1-6026-4d97-af63-1ca20526847f> | CC-MAIN-2017-09 | http://www.govtech.com/geospatial/102478739.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00646-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907695 | 325 | 2.90625 | 3 |
Material & Resource Use
PRODUCT MATERIAL CONTENT
Information technology (IT) devices contain substances that are essential to the functionality and safe use of the product, but some of them can adversely impact ecological and human health when not properly managed. To protect people and the environment, EMC takes a pro... | <urn:uuid:5cf12e1e-6858-42cf-8b87-7f0863fd95e6> | CC-MAIN-2017-09 | https://www.emc.com/corporate/sustainability/sustaining-ecosystems/material-content.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00646-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920082 | 1,113 | 3.078125 | 3 |
Geographic information systems professionals have been seeing an increase in career opportunities lately -- from working for specifically map-based enterprises such as Esri’s CityEngine and Google Earth to helping the public sector with its geospatial needs.
But now, a new avenue has opened up in the world of GIS: vide... | <urn:uuid:333db765-1ff7-4b3a-96d0-5971f1606dc1> | CC-MAIN-2017-09 | http://www.nextgov.com/cio-briefing/wired-workplace/2014/08/mapping-out-video-games/91793/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00522-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949258 | 229 | 2.515625 | 3 |
A science institute in central Japan says it has devised a system to stop eel fraud using cheap DNA testing, as the summer surge in the foodstuff's popularity approaches amid a scarce local catch.
Eel caught locally is much more expensive than imports, due to trade restrictions and the declining numbers available on th... | <urn:uuid:7980a100-62d2-44e7-bd39-1085af50fa50> | CC-MAIN-2017-09 | http://www.cio.com/article/2397928/fraud/japanese-university-to-battle-eel-fraud-with-cheap--rapid-dna-testing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00046-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961584 | 461 | 3.109375 | 3 |
The Department of Defense is asking for help in building more energy-efficient robots.
The government's Defense Advanced Research Projects Agency (DARPA) has issued a notice looking for research proposals for its Maximum Mobility and Manipulation (M3) project, a program that launched last year. Through the M3 program, ... | <urn:uuid:d86e9a5a-6ac2-42cc-a724-5a0d11a608fd> | CC-MAIN-2017-09 | http://www.cioinsight.com/it-management/innovation/darpa-seeks-to-create-more-efficient-robots | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00046-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946229 | 560 | 3.234375 | 3 |
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
The Internet of Everything’s (IoE) promise to create a more connected and transformed world comes closer to reality on a daily basis. Cisco predicts tha... | <urn:uuid:3b386ee1-b876-4475-9c5d-59adccdf3f2c> | CC-MAIN-2017-09 | http://www.itnews.com/article/2913595/internet-of-things/security-for-the-internet-of-everything-turning-the-network-into-a-giant-sensor.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00046-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940011 | 1,383 | 2.609375 | 3 |
Improving the ability of law enforcement agencies to catch cybercriminals should be a priority when governments decide how their cybersecurity budgets get spent, according to University of Cambridge security engineering professor Ross Anderson.
Anderson is one of seven computer researchers from the U.K., Germany, the N... | <urn:uuid:3f00298c-4a73-4b9c-a843-2eb7cc157174> | CC-MAIN-2017-09 | http://www.cio.com/article/2394939/cybercrime/governments-should-invest-more-in-catching-cybercriminals--researchers-say.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00166-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967794 | 858 | 2.71875 | 3 |
In 1967, the Journal of Consulting Psychology published a study conducted by two researchers that would eventually shape the way we understand the importance of nonverbal communication. Written by UCLA professor Albert Mehrabian and Susan R. Ferris, the piece described the relative importance of words, tone of voice an... | <urn:uuid:69e95b78-daf7-40f1-8b88-d2e4e163f9f5> | CC-MAIN-2017-09 | http://www.lifesize.com/video-conferencing-blog/speaking-without-words/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00166-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94708 | 640 | 3.4375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.