text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Whether you’re at the cash machine, online to your bank or credit card company or on the phone to your insurance or mortgage provider, until now, the need for greater security has meant added complexity and cost for user and provider alike.
In future, this problem is sure to grow. Consumer-facing organisations want the... | <urn:uuid:f512330f-a03c-4db4-af37-95eb0d755217> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2003/04/09/mass-market-authentication-the-gateway-to-access-hungry-consumers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00211-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955615 | 1,584 | 2.625 | 3 |
The International Space Station hit a major milestone today, marking 15 years in space.
On Nov. 20, 1998, the Russian Space Agency , now known as Roscosmos, launched a Proton rocket that carried a pressurized module, named Zarya, or sunrise, into Earth's orbit.
Zarya was the first piece of the International Space Stati... | <urn:uuid:db9bae34-192e-4f0f-a081-d0f89cf7227c> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2486167/emerging-technology/international-space-station-marks-15-years-in-earth-s-orbit.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00387-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948801 | 698 | 3.625 | 4 |
Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack.
In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft.... | <urn:uuid:fea2fb4e-2810-4e49-88fe-892a17e60f0c> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2016/06/23/hackers-targeting-healthcare-industry/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00387-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948773 | 716 | 3.28125 | 3 |
Flash storage is one of the main components that makes low power electronics so flexible. Unlike common DRAM, which needs constant refreshing in order to retain its contents, flash memory will stay written for about 10 years without power. However, flash pays for that longevity in access times, which are much slower th... | <urn:uuid:8769f912-9cb2-4e4a-ad11-2f7da30269af> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2007/12/the-perfect-computer-memory/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00563-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939595 | 624 | 3.859375 | 4 |
Addendum: Symbolic Links
A lot of people not steeped in Unix culture do not know what symbolic links are, particularly Mac users who don't understand the differences between Mac OS aliases and Unix symbolic links, or "symlinks." But it's such a simple concept, it's worth taking a few seconds to explain it.
Symlinks are... | <urn:uuid:62b0ea04-7c5e-41f0-910b-b9d96fcf6d72> | CC-MAIN-2017-09 | https://arstechnica.com/apple/2000/05/mac-os-x-dp4/13/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00263-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.905543 | 1,013 | 3.828125 | 4 |
IBM predicts five innovations that will change our behaviour over the next five years.
As 3D and holographic cameras get more sophisticated and miniaturized to fit into mobile phones, people will be able to interact with photos, browse the web and chat with friends in the form of 3D holograms.
By submitting your person... | <urn:uuid:bfc75386-618d-4c86-ae38-405e260332e2> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/1280094633/Five-life-changing-innovations-for-the-next-five-years | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00615-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926091 | 607 | 3.1875 | 3 |
Capacity and QoS are major considerations in a converged network and effect one another. QoS is needed to prevent applications from using more than a fair share of bandwidth and degrading the performance of other applications. At the WAN interface, QoS is needed to allocate expensive wide area capacity among applicatio... | <urn:uuid:6bc9c6cc-a568-4353-9c2d-4d16dbe1e729> | CC-MAIN-2017-09 | http://www.cisco.com/cisco/web/docs/iam/unified/ipt601/Capacity_and_QoS.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00139-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916506 | 406 | 2.5625 | 3 |
Sun Library Flaw Opens Door to Remote Attacks
A vulnerability in a Sun code library enables a remote attacker to execute code on a user's machine.There is a vulnerability in a Sun Microsystems Inc. code library that enables a remote attacker to execute code on a users machine. The flaw also affects libraries derived fr... | <urn:uuid:ffdadb3f-3609-4bd1-919d-18936b1d4b8c> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Application-Development/Sun-Library-Flaw-Opens-Door-to-Remote-Attacks | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00139-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.868527 | 216 | 2.6875 | 3 |
Projectors are a critical tool for engaging large groups and play an important role in higher education.
A projector is a tool to teach the masses. This is especially applicable to higher education, where students pile into auditorium-sized lecture halls and standard classrooms to absorb knowledge on the big screen. Th... | <urn:uuid:c39212ed-40e5-4950-a911-238b5b03ac20> | CC-MAIN-2017-09 | https://techdecisions.co/downloads/the-secrets-to-finding-configuring-the-perfect-projector/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00383-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9327 | 304 | 2.515625 | 3 |
ARM has added a wealth of wireless technologies to its arsenal, but has no immediate plans to design a modem for mobile or Internet of Things devices.
The company offers CPU and GPU designs that are widely used in smartphones and tablets. A missing piece is a cellular modem that ARM customers could license and put in m... | <urn:uuid:b3902238-c773-42b6-8b0e-a2810db40069> | CC-MAIN-2017-09 | http://www.computerworld.com/article/3034703/computer-hardware/arm-to-skip-modems-for-now-even-though-theyre-big-in-mobile.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00007-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947488 | 617 | 2.546875 | 3 |
Autonomous cars need a new kind of horsepower to identify objects, avoid obstacles and change lanes. There's a good chance that will come from graphics processors in data centers or even the trunks of cars.
With this scenario in mind, Nvidia has built two new GPUs -- the Tesla P4 and P40 -- based on the Pascal architec... | <urn:uuid:bf0996e5-e690-470f-9ab6-6b61c28b1e31> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3119445/nvidias-new-pascal-gpus-can-give-smart-answers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00603-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944509 | 707 | 3.21875 | 3 |
37.3 million users around the world were subjected to phishing attacks in the last year, which is a massive 87 percent increase for the number of targeted user in 2011-2012.
According to the results of a Kaspersky Lab research into the evolution of phishing attacks, they were most frequently launched from the U.S., the... | <urn:uuid:4b513932-3096-4d9f-bdc5-649e60e2f0df> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/06/21/phishing-attacks-impacted-373-million-users-last-year/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00603-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949184 | 422 | 2.765625 | 3 |
Free Speech Online: Where Is the Line Drawn?
When America’s Founding Fathers drafted the First Amendment, no one could have imagined there would eventually be a technology — the Internet — that would allow Americans to speak to people around the globe within seconds. Now, more than 200 years later, some wonder if the e... | <urn:uuid:b44c3c85-ae55-405b-bb80-f5e41eeabe5a> | CC-MAIN-2017-09 | http://certmag.com/free-speech-online-where-is-the-line-drawn/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952711 | 2,813 | 2.875 | 3 |
The Internet of Things (IoT) extends the end node far beyond the human-centric world to encompass specialiSed devices with human-accessible interfaces, such as smart home thermostats and blood pressure monitors. And even those without human interfaces, including industrial sensors, network-connected cameras and traditi... | <urn:uuid:ba68d180-8193-4490-9d38-9e65457899eb> | CC-MAIN-2017-09 | http://www.information-age.com/why-internet-things-more-just-smart-fridge-123458485/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910138 | 1,428 | 2.859375 | 3 |
Do we really need another programming language? There is certainly no shortage of choices already. Between imperative languages, functional languages, object-oriented languages, dynamic languages, compiled languages, interpreted languages, and scripting languages, no developer could ever learn all of the options availa... | <urn:uuid:c49a2af7-8745-439e-8560-ff4232626fd3> | CC-MAIN-2017-09 | http://www.itworld.com/article/2733716/enterprise-software/10-programming-languages-that-could-shake-up-it.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926958 | 2,267 | 2.59375 | 3 |
Mayol M.,CREAF Cerdanyola del Valles 08193 Spain |
Riba M.,University of Barcelona |
Gonzalez-Martinez S.C.,Forest Research Center Madrid 28040 Spain |
Bagnoli F.,National Research Council Italy |
And 10 more authors.
New Phytologist | Year: 2015
Despite the large body of research devoted to understanding the role of Q... | <urn:uuid:77511212-d8c9-4b4e-9aa7-e7d7b18b97cc> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/creaf-cerdanyola-del-valles-08193-spain-2625292/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.885644 | 343 | 2.640625 | 3 |
A focal point requirement of the 2002 No Child Left Behind Act (NCLB), federal legislation aimed at improving U.S. primary and secondary schools performance, was to implement accountability systems that analyze student and educator data, and report those results to the U.S. Department of Education. These reporting syst... | <urn:uuid:d74466e4-3044-4fc9-acf8-8c44f4d88d3c> | CC-MAIN-2017-09 | http://www.govtech.com/education/Student-Tracking-System-Helps-New-Mexico.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00003-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964404 | 1,265 | 3.203125 | 3 |
Historically, the Earth's climate has ranged from the snowball Earth, with glaciers in tropical regions, to a hothouse with ice-free poles. The transitions between different states—climate changes—are driven by changes in the factors that force the climate. These include difference in incoming solar radiation (both the... | <urn:uuid:bf9b5a05-7536-44d1-acf0-87186efc1888> | CC-MAIN-2017-09 | https://arstechnica.com/technopaedia/2009/11/climate-change/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00003-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945997 | 387 | 4.6875 | 5 |
E-Mail, the venerable old standard for internet text messages, dating back to the early 1980s – and back to the early 1970s in other forms, has long been the “killer app” of the internet. While so many companies try to make the next great thing that’ll capture users around the world – none of these compare to the succe... | <urn:uuid:b106bf78-0470-4df3-9ff9-27a6fb620edf> | CC-MAIN-2017-09 | https://adamcaudill.com/2014/06/27/the-sinking-ship-of-email-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00179-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959936 | 1,829 | 2.6875 | 3 |
In SQL Server, statistics can be created using CREATE STATISTICS command or using CREATE INDEX command. At the feature level, the statistical information created using CREATE STATISTICS command is equivalent to the statistics built by a CREATE INDEX command on the same columns. The only difference is that the CREATE ST... | <urn:uuid:ebcfd09f-6c43-43d0-8413-96e01de3b657> | CC-MAIN-2017-09 | https://blogs.manageengine.com/application-performance-2/appmanager/2013/10/22/optimizing-sql-server-performance-the-story-of-statistics.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00527-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.88694 | 1,186 | 2.75 | 3 |
There is a long history of cable industry vertical integration, tracing back to the 1972 creation of HBO by Cablevision
In the 1940s, the U.S. Department of Justice put a wallop on Hollywood that would have made James Cagney, a popular movie tough guy of the era, tip his fedora hat.
The provocation came from a series o... | <urn:uuid:f25b7a5d-e795-4879-8305-1fd2f39e8b6d> | CC-MAIN-2017-09 | https://www.cedmagazine.com/print/articles/2009/12/memory-lane-vertical-reality | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00527-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94869 | 976 | 2.734375 | 3 |
A 110-core chip has been developed by Massachusetts Institute of Technology as it looks for power-efficient ways to boost performance in mobile devices, PCs and servers.
The processor, called the Execution Migration Machine, tries to determineways to reduce traffic inside chips, which enables faster and more power-effi... | <urn:uuid:57d80df5-5570-4ddc-960e-ffbc62c32f45> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2169438/computers/mit-develops-110-core-processor-for-more-power-efficient-computing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00223-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954704 | 504 | 3.171875 | 3 |
Hospitals are reporting a new threat of infection -- from computer malware.
Computer viruses are worming their way into everything from fetal monitors to radiology departments’ picture archiving and communication systems, which store and share images from X-rays and other diagnostic equipment, reports Technology Review... | <urn:uuid:0386626c-9161-486b-90df-c0fd372e4bd4> | CC-MAIN-2017-09 | http://www.nextgov.com/health/health-it/2012/10/malware-threatens-medical-machines-and-systems/58929/?oref=ng-nextpost | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00223-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942975 | 323 | 2.53125 | 3 |
Americans have not set foot on the moon's surface since 1972. During his presidency, George W. Bush wanted to change that.
"We do not know where this journey will end, yet we know this: Human beings are headed into the cosmos," Bush said during a speech at NASA headquarters on Jan. 14, 2004, in Washington. "Mankind is ... | <urn:uuid:82837523-3620-4ceb-a2cf-885addd80605> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2014/01/nasas-budget-woes-eclipse-plans-another-moon-walk-2020/76877/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00399-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958796 | 473 | 3.109375 | 3 |
Tools to tighten the Internet of Things
The Internet of Things (IoT) is coming, and there’s no doubting its potential. Government IT managers don’t care that your fridge can tell your smartphone what you need to buy next, but they do appreciate that advances in connectivity and data collection will enable major improve... | <urn:uuid:84d93474-9c21-4d0b-9ba0-bf5383f0582b> | CC-MAIN-2017-09 | https://gcn.com/blogs/cybereye/2014/06/internet-of-things.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00399-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951524 | 739 | 2.609375 | 3 |
The password. It really gives you power doesn’t it? You’re the only one that has the “key” to the workstation or something else that has to be kept away from prying eyes. If you’re using a password than there must be something worth protecting, so why not make this protection a good one?
Choosing a good password
There ... | <urn:uuid:46c94b2d-f436-447d-b013-64d715c3def2> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2002/05/24/basic-security-with-passwords/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00399-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921082 | 952 | 2.625 | 3 |
Sharing Drive Space
Grids can share more than just processors; they also can share drive space for both greater storage room and more robust data availability. Usually this is done with mountable networked file systems, such as AFS (Andrew File System), that old Unix distributed storage favorite; NFS (Network File Syst... | <urn:uuid:27ae6028-beb8-46a1-bd12-51c4e571824f> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/IT-Infrastructure/Grid-Computing-101/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00167-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948942 | 613 | 3.1875 | 3 |
Data Privacy Tool
You may also be interested in our Data Privacy Scorebox to assess your organisation's level of data protection maturity.
Law No 09-08 dated on 18 February 2009 relating to protection of individuals with regard to the processing of personal data and its implementation Decree n° 2-09-165 of 21 May 2009 ... | <urn:uuid:aedd34a7-deda-480e-a3a7-15df1ad530f6> | CC-MAIN-2017-09 | https://www.dlapiperdataprotection.com/index.html?t=contacts-section&c=MA | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00167-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928368 | 1,382 | 2.546875 | 3 |
Chapter 22: Job Control Language
This chapter presents a discussion of JCL (Job Control Language) as used for jobs run on a modern IBM mainframe running a descendant of the OS operating system, such as z/OS.
First, we must define the term “job”. A job is a unit of work for the computer to execute. The job comprises ide... | <urn:uuid:c4315858-b193-4428-9f0b-7a7b3551ca2b> | CC-MAIN-2017-09 | http://edwardbosworth.com/My3121Textbook_HTM/MyText3121_Ch22_V01.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00343-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913037 | 3,680 | 3.140625 | 3 |
Technology and process upgrades implemented since the controversial 2000 presidential election have made electronic voting machines more secure and reliable to use, the Caltech-MIT Voting Technology Project said in a report last week.
Even so, the only way to ensure the integrity of votes cast with the systems is to ha... | <urn:uuid:56c78dd3-e98a-4468-b468-4fe51e859ccc> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2492684/government-it/despite-e-voting-improvements--audits-still-needed-for-ballot-integrity.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00215-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965317 | 938 | 2.609375 | 3 |
Threats to mobile devices are on the rise. But it’s not just malware, worms, and other viruses that pose a danger — mobile phone spam, a new spin on an old nuisance, is emerging as a problem. Mobile phone spam, also called short message service (SMS) spam, sends unwanted text messages, usually advertisements, to a user... | <urn:uuid:5ed832d4-3f2e-43a0-b8e6-14a6193cd0bd> | CC-MAIN-2017-09 | https://www.mcafee.com/mx/security-awareness/articles/how-to-fight-spam-text-messages.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00391-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937747 | 270 | 2.953125 | 3 |
Intelligent Grids Power a Smarter Future
by Meir Shargal
Regardless of who you ask, the forecast is often the same: in the next two decades, the world’s demand for energy will essentially double. Simultaneously, CO2 regulations and reduction goals — be it for utilities or consumers worldwide — will also explode. Smart ... | <urn:uuid:255a19c1-da8f-425f-8994-69fe8dedd47d> | CC-MAIN-2017-09 | http://www.csc.com/cscworld/publications/56901/56905-the_green_corner_intelligent_grids_power_a_smarter_future | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00567-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938873 | 795 | 3.125 | 3 |
June 18 — Lawrence Berkeley National Laboratory has been named an Intel Parallel Computing Center (IPCC), a collaboration with Intel aimed at adapting existing scientific applications to run on future supercomputers built with manycore processors. Such supercomputers will potentially have millions of processor cores, b... | <urn:uuid:925f436f-ba54-4349-b759-246669e9033f> | CC-MAIN-2017-09 | https://www.hpcwire.com/off-the-wire/berkeley-lab-intel-collaborate-updating-scientific-codes-manycore-architectures/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00443-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919444 | 1,295 | 2.953125 | 3 |
Water Robots Hit the Waves
/ November 22, 2011
Last Thursday, four self propelled robots called Wave Gliders left San Francisco for a 60,000 kilometer journey. These robots, each of which is about the size of a dolphin, are built by Liquid Robotics, and will travel together to Hawaii, then split into pairs. One pair wi... | <urn:uuid:46e086ca-df8a-4fb6-a168-cf923d6535d3> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Water-Robots-Hit-the-Waves-11222011.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00388-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90216 | 231 | 3.109375 | 3 |
Not having an API is becoming like not having a website, but the interface has got to be easy for outside developers to work with.
When Neil Fantom, a manager at the World Bank, sat down with the organization's technology team in 2010 to talk about opening up the bank's data to the world at large, he encountered a bit ... | <urn:uuid:ef16261d-ab8f-44ec-91cd-a82d6c534a70> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2165357/applications/open-your-data-to-the-world.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00264-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967419 | 2,751 | 2.609375 | 3 |
The idea of building a robotic manufacturing facility in space might have been in the realm of a Star Wars, Star Trek or other science fiction story, but like some of the technologies in those tales, reality may soon imitate art.
First off, you may recall that NASA is looking for an asteroid weighing about 500 tons tha... | <urn:uuid:8051c37f-bba6-4a1e-9e42-2da3ce41c740> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2224711/data-center/nasa--asteroid-based-manufacturing-not-science-fiction.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00384-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9671 | 988 | 4 | 4 |
One of technology's missions is to allow people to think less about the technology they’re using and focus more on the thing they’re using the tech for. A $900,000 National Science Foundation grant issued to researchers at Rice University will allow for the best properties of optical and electronic computer networks to... | <urn:uuid:92f2cd1e-dbff-451d-8276-1dc3a25a2339> | CC-MAIN-2017-09 | http://www.govtech.com/Researchers-Target-Network-Bottlenecks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00084-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953642 | 802 | 2.875 | 3 |
Black Box Explains...Insertion loss
Insertion loss is a power loss that results from inserting a component into a previously continuous path or creating a splice in it. It is measured by the amount of power received before and after the insertion.
In copper cable, insertion loss measures electrical power lost from the ... | <urn:uuid:faf28ec2-d413-47e3-8ad0-0485bed9c8b4> | CC-MAIN-2017-09 | https://www.blackbox.com/en-us/products/black-box-explains/black-box-explains-insertion-loss | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00084-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954694 | 204 | 3.390625 | 3 |
As wearables continue to evolve, leagues are finding themselves asking many new questions about its use.
There is no question that wearable technology has an amazing amount of potential when used by players in professional sports leagues, but the specific way in which collected data is used is starting to generate a ma... | <urn:uuid:a230ba58-9379-450b-b2b7-7b521d4a841a> | CC-MAIN-2017-09 | http://www.mobilecommercepress.com/tag/sports-wearables/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00436-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.979488 | 456 | 2.625 | 3 |
Cloud storage, especially object storage, is often marketed by touting its “durability,” with many providers boasting eleven or thirteen “nines”, in other words 99.999999999% reliability. It sounds great—as close to 100% reliable as you can get. But what is durability in relation to storage, and do you really need thos... | <urn:uuid:a570f29b-d89c-49b6-8037-10977e0366c5> | CC-MAIN-2017-09 | https://www.greenhousedata.com/blog/what-is-cloud-storage-durability-do-you-really-need-11-nines | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00436-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947766 | 687 | 2.796875 | 3 |
A load balancer is a hardware or virtual software device that intelligently distributes application and network traffic across multiple servers. The goal of the load balancer is to make sure that all users are served information as quickly as possible, and that more work gets done in less time. Today’s application deli... | <urn:uuid:746db1dd-4db3-4d76-a8be-6b468ba80c0b> | CC-MAIN-2017-09 | https://www.a10networks.com/resources/glossary/load-balancer | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00612-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.901109 | 235 | 2.640625 | 3 |
In the Tactical Deception Field Manual FM 90-2 of the US Army, the concept of deception is described as those measures designed to mislead enemy forces by manipulation, distortion, or falsification of evidence to induce him to react in a manner prejudicial to his interests. In the cyber world the deception concept and ... | <urn:uuid:ac620d50-2699-4024-b9d5-82d21dce9a11> | CC-MAIN-2017-09 | https://countuponsecurity.com/tag/network-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00488-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.837009 | 2,823 | 2.65625 | 3 |
This may seem like a simple question but for a lot of system administrators who “inherit” systems or are unfamiliar with operating systems that have been forced upon them, it can be very confusing, especially if you're coming from a proprietary UNIX® operating system such as Solaris™ or HP-UX to a Linux®-based distribu... | <urn:uuid:a639f979-73c9-4836-bdda-46e56697ba83> | CC-MAIN-2017-09 | http://www.infosecisland.com/blogview/9657-Which-Linux-or-UNIX-Version-Am-I-Running.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00608-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.873088 | 1,307 | 2.6875 | 3 |
One of the main concerns of the organizers of the Olympic Games to be held in Athens this summer is security, but not only physical security, computer security as well. The emphasis placed on avoiding problems with the computers that will manage huge amounts of data during the games will be proportional to the magnitud... | <urn:uuid:e80cbec3-0710-4907-aa9f-38583072c62d> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2004/06/02/how-much-should-you-invest-in-it-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00132-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966 | 760 | 2.515625 | 3 |
SPECIAL REPORT—Green IT
Air flow control can yield more efficient data centers
Projects explore new techniques for improving air distribution in data centers
- By Rutrell Yasin
- Apr 03, 2009
You don’t necessarily have to spend money to save money on data center power use. The Energy Department’s Lawrence Berkeley Nati... | <urn:uuid:a2bf6124-c384-4dfe-957f-bdc4a0ff87c1> | CC-MAIN-2017-09 | https://gcn.com/articles/2009/04/06/cool-it.aspx?admgarea=TC_DATACENTER | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00308-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938083 | 2,546 | 2.75 | 3 |
Cloud Infographic: The History Of Cloud Technology
Since cloud computing is gaining acceptability by the day, it is no longer a beginner in the IT infrastructure space. Again, since there are many who resist the technology citing several concerns like security and availability, it hasn’t matured either. In other words,... | <urn:uuid:8baa6556-d3ed-4671-a967-b85eb16b5e52> | CC-MAIN-2017-09 | https://cloudtweaks.com/2012/11/cloud-infographic-the-history-of-cloud-technology/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00484-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947375 | 206 | 2.828125 | 3 |
It's still unclear exactly what passwords were stolen by Russian hackers, and how dangerous the breech might be. But whether or not you're affected, here are five ways to keep your passwords safe.
Use two-factor authentication
Passwords by their very nature are insecure. So many sites, including Gmail, Google, Facebook... | <urn:uuid:89750193-90ac-474c-aecc-e6a3ad768c1d> | CC-MAIN-2017-09 | http://www.itworld.com/article/2693574/security/russian-hacker-breach--five-ways-to-better-protect-your-passwords.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00428-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968108 | 452 | 2.609375 | 3 |
Hello Friends, today i will explain you how to secure your computer by just simple 7 steps. This will help you to protect your computer from viruses, Trojan attacks and also from hackers. These 7 tips will improve your computer and online security. Online Computer and internet security is critical right from the moment... | <urn:uuid:49a670f3-0114-4354-a7ef-f006cb0bba07> | CC-MAIN-2017-09 | https://www.hackingloops.com/7-tips-to-improve-your-pc-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00428-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.914216 | 1,020 | 2.703125 | 3 |
With the Carbon to Collaboration Initiative, Cisco is committed to reducing carbon emissions by a minimum of 10 percent, starting with a dramatic reduction in the company’s air travel in 2008.
In addition, Cisco will invest US$20 million in collaborative technologies that will reduce the need for physical travel at C... | <urn:uuid:7fd8c0e0-9815-44b8-ae7e-ba7526df9f33> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/consulting-thought-leadership/what-we-do/industry-practices/public-sector/our-practice/urban-innovation/connected-urban-development/further-cud-information/thought-leadership/carbon.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00124-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942856 | 195 | 2.578125 | 3 |
Attention: Virus Zircon.c is spreading on the Internet
14 Mar 2002
Kaspersky Lab, a leading international data-security software developer, reports the detection of a new version of the Internet-worm known as Zircon. Zircon.c, which is distinct from two previous forms, has achieved wide distribution across the Internet... | <urn:uuid:23304592-e88a-4fc5-b7c4-a815fe2b8e9e> | CC-MAIN-2017-09 | http://www.kaspersky.com/au/about/news/virus/2002/Attention_Virus_Zircon_c_is_spreading_on_the_Internet | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00300-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.883423 | 207 | 2.53125 | 3 |
For most people, a home router is their window to the world -- the World Wide Web.
But it is a broken window, according to some top security experts, who say there is little that average consumers can do to protect themselves from skilled cyber attackers, even if they use rigorous passwords and encryption, because the ... | <urn:uuid:6ed14be3-0315-4d00-a48e-e67a7fd744a1> | CC-MAIN-2017-09 | http://www.cio.com/article/2376196/router/home-routers--broken-windows-to-the-world.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00476-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959588 | 1,957 | 2.6875 | 3 |
Programming Using the CCA API
The API we’re going to use is the Common Cryptographic Architecture (CCA). There are more than 80 function calls, but we’ll examine only a few of them that let you do authentication and encryption. You’ll want to get a copy of the Cryptographic Services ICSF Application Programmer’s manual... | <urn:uuid:f4610f63-3761-4ca3-b060-b42db20f293c> | CC-MAIN-2017-09 | http://enterprisesystemsmedia.com/article/implementing-icsf-hardware-cryptography-on-z-os/3 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00052-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.865563 | 1,110 | 2.578125 | 3 |
Optical networking uses thin glass or plastic optical fiber to transmit information in the form of light pulses. It is far more reliable and offers greater transmission capacity than conventional copper-wire networks.
SONET and Synchronous Digital Hierarchy (SDH) are the most common optical transport protocol standards... | <urn:uuid:bee610ba-69de-45f8-a1c9-5fca7e2ae8f8> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/products/optical-networking/technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00472-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.903159 | 385 | 2.9375 | 3 |
The Importance of Global Digital Literacy
With the world economy becoming more connected via networks and business environments becoming more computer-intensive in day-to-day job tasks, the issue of digital literacy stands out as a key differentiator of success at the individual, regional and national levels. Right now... | <urn:uuid:e8798603-2b5e-41e8-9fec-bf62e466da2f> | CC-MAIN-2017-09 | http://certmag.com/the-importance-of-global-digital-literacy/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00348-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956289 | 606 | 2.625 | 3 |
What are “cookies”?
“Cookies” (also known as HTTP cookies, web cookies or browser cookies) are simply small pieces of data, which are stored as text files on your computer, whenever you visit certain websites. Their typical purpose is to help sites remember particular actions you may have done there in the past. For ex... | <urn:uuid:7ed5d194-edf7-4bfb-a7d5-adf468232d03> | CC-MAIN-2017-09 | https://www.infosecurity-magazine.com/cookies/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00348-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.884653 | 888 | 2.921875 | 3 |
Last week we brought up the question, “How did end users learn to expect fast websites?” We covered how Pavlov discovered Conditioning through experiments with his dog, which left us wondering; perhaps humans are conditioned to expect instant web gratification.
Almost 100 years after Pavlov, Wolfram Schultz, now at Cam... | <urn:uuid:1d326bc2-cc0f-4446-9bdf-5170601fac59> | CC-MAIN-2017-09 | http://blog.catchpoint.com/2012/09/19/why-we-expect-fast-websites-part-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00168-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962124 | 983 | 2.765625 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:e17f8c96-4790-41bc-8319-972077b54197> | CC-MAIN-2017-09 | https://docs.com/anthony-razor/7164/intro-to-political-geography | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00044-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916683 | 2,500 | 2.734375 | 3 |
Deleted files can often be recovered, and that's a problem when you're passing your PC or PC-related tech along to someone else. Whether it's sensitive financial data, business documents, or scandalous photos that could be used to blackmail you, you probably don't want people getting their hands on your private stuff.
... | <urn:uuid:c3deb118-9e07-4455-ab4f-d4ecd1af1e23> | CC-MAIN-2017-09 | http://www.itworld.com/article/2699222/security/definitely-deleted--how-to-guarantee-your-data-is-truly-gone-before-recycling-old-pcs-and-drives.html?page=3 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00572-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945061 | 1,804 | 2.59375 | 3 |
If you're worried about being out of shape, or suspect you might have a disease like diabetes, just breathe into this Toshiba tube.
It's part of a prototype medical breath analyzer that's small enough to be used in small clinics or gyms.
By detecting trace gases that are exhaled, it could be used to monitor health indi... | <urn:uuid:38f8b292-bbc5-41e3-9e69-c68ee27de520> | CC-MAIN-2017-09 | http://www.itworld.com/article/2701246/data-center/compact-breath-sniffer-could-warn-of-diabetes.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00216-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945082 | 465 | 2.984375 | 3 |
This article is excerpted from “Cloud Opportunities in HPC: Market Taxonomy,” published by InterSect360 Research. The full article was distributed to subscribers of the InterSect360 market advisory service and can also be obtained by contacting email@example.com.
In Life, the Universe, and Everything, the third book of... | <urn:uuid:bdc36e50-ee47-41c6-9def-8a1383a8d815> | CC-MAIN-2017-09 | https://www.hpcwire.com/2009/11/02/cloud_computing_opportunities_in_hpc/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00392-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949127 | 2,679 | 2.765625 | 3 |
Originally published February 6, 2008
The enormous interest in master data management (MDM) that has appeared in the past couple of years has not yet generated a great deal of methodological progress. Hopefully, as data professionals, consultants, and vendors grapple with the complex issues involved, the situation will... | <urn:uuid:497d2ead-c6a0-4a49-bb4d-306e8bbafa82> | CC-MAIN-2017-09 | http://www.b-eye-network.com/view/6758 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00037-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950959 | 1,730 | 2.640625 | 3 |
Some people have been worried that with the growth of technologies like artificial intelligence (AI) and virtual reality (VR) jobs will become more scarce. We have learned from history though that every time a new technology hits the market, any job losses from it usually are replaced by new jobs related to that techno... | <urn:uuid:c1709f4d-c985-4641-880c-6b1497ff3a7e> | CC-MAIN-2017-09 | https://cloudtweaks.com/2016/10/jobs-future-ai-vr/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00213-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952043 | 382 | 2.640625 | 3 |
HPC clusters first emerged in universities and research centers that required extra compute power but had limited budgets. The development of open source Linux-based operating systems and management tools was a natural evolution.
However, because open source tools are created by a variety of different organizations, no... | <urn:uuid:eda35803-c9e9-480f-8443-c116c442faa6> | CC-MAIN-2017-09 | https://www.hpcwire.com/2012/12/17/open_source_software_in_hpc/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00213-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948763 | 1,098 | 2.625 | 3 |
The Trails open-source framework, inspired by Ruby on Rails, makes Java development easier.
LAS VEGASChris Nelson said he found developing in Java was just too hard, so he decided to do something to make it easier. Now hes about to deliver on it.
Nelson, an independent developer and director of the Cincinnati Java User... | <urn:uuid:c7bbe3ae-44ad-45d3-b718-1bd20b726f33> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Application-Development/OpenSource-Framework-Means-Happy-Trails-for-Java-Developers | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951865 | 706 | 2.6875 | 3 |
Many researchers and journalists are calling the high-pressure system causing California’s historic drought the “Ridiculously Resilient Ridge,” a weather phenomenon identified using technology developed in the 1930s.
For the past 12 months, California has been drier than a sandbox in the Sahara thanks to a stubborn hig... | <urn:uuid:f04ccc03-8bed-48b1-bf6d-458ccfbabf6f> | CC-MAIN-2017-09 | http://www.govtech.com/The-Weather-May-Change-but-Drought-Technology-Stays-the-Same.html?flipboard=yes | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941783 | 1,191 | 3.640625 | 4 |
DRM stands for “Digital Rights Management.” It is the technology that controls your access to copyrighted works such as movies, music, literature and software. The product files are encrypted so that you can only use them on authorized devices. For example, if you have downloaded music onto your PC, and want to access ... | <urn:uuid:6661a36d-c1e0-4977-a900-14a85b666778> | CC-MAIN-2017-09 | https://www.justaskgemalto.com/us/what-is-a-drm-and-how-does-it-work-on-mobile-device/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00565-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939948 | 253 | 3.03125 | 3 |
Printer maker Epson just revealed a new machine that spits out pages at a stunning rate of 14 per minute. Wait! Don't stop reading yet. That pace only sounds bad when we’re talking about printers. This behemoth isn’t printing paper—its making it, from materials you'd otherwise toss in the trash.
The company recently an... | <urn:uuid:770ce10f-96c5-4719-99b2-738979e116ea> | CC-MAIN-2017-09 | http://www.itnews.com/article/3011588/business/worlds-first-in-office-paper-recycling-machine-turns-used-paper-into-clean-white-sheets.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00441-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943013 | 671 | 2.65625 | 3 |
Serious game tests GIS, disaster response skills
- By Patrick Marshall
- Jul 09, 2013
They may not be much at coming up with catchy names for software, but a team of students and faculty at the Rochester Institute of Technology have done a pretty impressive job of using geographic information systems to sharpen spatial... | <urn:uuid:d4e07381-fd12-4489-a311-cffa8a9b52ec> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/07/09/serious-game-tests-disaster-response-skills.aspx?admgarea=TC_STATELOCAL | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00441-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963731 | 541 | 3.203125 | 3 |
A Multimodel database management system (DBMS) is a database system that is built with a data records using an entity-relationship data model. The data is stored using a variety of logical models or views and uses a flexible combination of KeyValue pairs, documents and graphs.
AranoDB is a flexible data model that uses... | <urn:uuid:aec27c25-6a93-4c95-a75e-193d1dd36f73> | CC-MAIN-2017-09 | https://datafloq.com/big-data-open-source-tools/os-multimodel/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00617-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.868203 | 174 | 2.5625 | 3 |
Calling for better mine safety
A close public/private partnership produces an innovative emergency communications system
- By Doug Beizer
- Jul 01, 2009
Communications technology in many underground mines is primitive, consisting of phones and handsets connected by wire. It works, but it's vulnerable. If an accident se... | <urn:uuid:8696349f-a6d8-4dcd-a8ff-5093d68bb86e> | CC-MAIN-2017-09 | https://fcw.com/articles/2009/07/06/tech-mine-emergency-comm--system.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00617-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950775 | 988 | 2.515625 | 3 |
While passwords security is not ironclad, experts say they need to be in the mix with device-assisted authentication as an additional layer
Google's security team is experimenting with ways to replace passwords for logging in to websites. But while acknowledging passwords alone are no longer enough to protect users, se... | <urn:uuid:a7a82fbf-5591-44fb-98b8-10616e45ed8e> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2163763/byod/google-looks-to-kill-passwords--but-experts-say-not-so-fast.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00085-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95395 | 836 | 2.578125 | 3 |
Field Encryption on the IBM i just got easier.
SQL Field Procedures are a new DB2 feature in version 7.1 that allows a user-specified "exit" program to be called whenever data is read from, inserted into, or updated in a field (column). This is somewhat similar to database column triggers; however there are two distinc... | <urn:uuid:aeca176a-052e-43d0-ada7-367b18011650> | CC-MAIN-2017-09 | http://www.linomasoftware.com/blog/tag/sql-field-procedures | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00261-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.901083 | 207 | 2.53125 | 3 |
The networks are now used for research, but commercial grids are not far away.
Imagine if computing power were as easily accessible as electricity.
Businesses essentially would be able to tap into a vast network of supercomputers and pay only for the power they use, rather than spend millions of dollars on the hardware... | <urn:uuid:c40a1385-ce4f-4347-9111-c7b4c08d7856> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Cloud-Computing/Feel-the-Power-of-the-Computer-Grid | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00437-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956142 | 1,018 | 3.046875 | 3 |
Cisco created all sorts of different magic inside their boxes that optimize forwarding processing of packets.
IP Routing explained in detail
Logic behind IP forwarding is listed in steps here with the assumption it will be an IPv4 packet that was received. This is process switching explained in 11 steps:
- A frame ente... | <urn:uuid:d360005a-d091-42cb-8325-17918b3392e0> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2015/routing-cef | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00613-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925123 | 1,454 | 3.296875 | 3 |
With the news that an American woman has received a pacemaker with a wireless connection to the Internet, the so-called “Internet of Things” has taken on a new dimension.
Reuters reported this week that a 61-year-old woman became the first American recipient of the pacemaker, which was approved by the FDA just last mon... | <urn:uuid:8d981c1c-0c35-49c2-bf53-1204893c7601> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2246930/lan-wan/-the-internet-of-things--now-includes-a-human-heart.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00137-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959555 | 362 | 2.8125 | 3 |
Authors: Ed Skoudis and Lenny Zeltser
Publisher: Prentice Hall PTR
Every computer user, whether a system administrator or a home user, needs to defend their computer from all sorts of attacks. This book brings basic knowledge about types of malicious code with definitions and practical advice. To get to know your enemy... | <urn:uuid:c0f24498-fd50-44b3-8118-1bcceec2ea06> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2004/07/26/malware-fighting-malicious-code/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00313-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926187 | 1,398 | 3.046875 | 3 |
The previous blog post illustrated how someone with malicious intent could pull off a way to compromise a system. It starts by gaining access to the system using a SQL injection. After the initial access a foothold is established. Then the position is strengthen by uploading the tools of choice. Next the privileges are... | <urn:uuid:121d271b-4e9b-43ea-8988-004cf6dd60f7> | CC-MAIN-2017-09 | https://countuponsecurity.com/tag/security-hands-on-training/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00489-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.897607 | 2,215 | 3.0625 | 3 |
We have entered into 2016, yet cyber attacks continue to plague the world. Call it unfortunate or attribute it to the present times, security strategies need to be tightened by people all over the world. Hackers are said to have taken the meaning of risk to a different level altogether. So it will be nothing uncommon f... | <urn:uuid:f798c3ce-6540-47ed-b1f2-377626bfe49f> | CC-MAIN-2017-09 | http://www.belnis.com/news/security-landscape-in-2016-cyber-attacks-to-be-watchful-about/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00081-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950897 | 577 | 2.65625 | 3 |
Congress has voted on the Environmental Protection Agency’s rules controlling greenhouse gas emissions around 10 times over the past few years, and next year the agency is wading into the most controversial parts of the rulemaking.
The politically charged debates conflate facts and myths, and important points with supe... | <urn:uuid:01ae0601-6ea9-4b2b-8c26-02357b9180ff> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2012/12/what-you-need-know-about-epas-carbon-rules/60372/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00081-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946727 | 1,533 | 2.765625 | 3 |
Tremors generate tweets in new USGS earthquake program
The Twitter Earthquake Detector could spread the word before official alerts
- By Dan Campbell
- Dec 21, 2009
The U.S. Geological Survey is testing the use of Twitter as a means to quickly collect and disseminate earthquake-related information. The popular social n... | <urn:uuid:8727d5f7-e4f4-4cf5-a34b-596465e688e8> | CC-MAIN-2017-09 | https://gcn.com/articles/2009/12/21/usgs-earthquake-twitter-tweets.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00257-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941817 | 687 | 2.671875 | 3 |
Recent technological advances in high-voltage direct current (HVDC) transmission has led many to see it as a crucial element in an efficient, smart power system of the future, providing power corridors connecting distant supply and demand centers, with minimal energy losses.
With its strong central control, China is im... | <urn:uuid:ccc65b26-6a7d-4155-859d-776ac413ce06> | CC-MAIN-2017-09 | https://www.mordorintelligence.com/industry-reports/china-high-voltage-direct-current-hvdc-transmission-systems-market-industry | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00433-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952455 | 790 | 3.34375 | 3 |
Europe has spent hundreds of billions of euros rescuing its banks but may have lost an entire generation of young people in the process, the president of the European Parliament said.
Since the region's debt crisis erupted in Greece in late 2009, the European Union has created complex rescue mechanisms to prop up distr... | <urn:uuid:8a0ec0da-5e79-4e46-a37d-4347a677d07b> | CC-MAIN-2017-09 | http://www.banktech.com/compliance/banks-saved-but-europe-risks--losing-a-generation-/d/d-id/1296224?cid=sbx_banktech_related_slideshow_default_customers_want_it_all_balancing_simplici&itc=sbx_banktech_related_slideshow_default_customers_want_it_all_balancing_simplici | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00605-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.974391 | 599 | 2.515625 | 3 |
Does true literacy now include the ability to write software programs, just as it does the ability to read, write and do sums?
2012 saw a surge of sentiment in the press and blogosphere that we should think of programming as a vital cultural skill. And the year included many stories about newly emerging massive open on... | <urn:uuid:c46220dd-3b3d-4c60-884c-902dc8529c21> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2162381/software/2012--the-year-that-coding-became-de-rigueur.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00181-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968176 | 880 | 2.859375 | 3 |
Researchers at Stanford University have made progress toward designing a battery with a lithium anode, a development that could increase battery power in electronics.
Reporting in the journal Nature Nanotechnology, the researchers described how they designed a lithium-metal anode in order to boost the energy storage de... | <urn:uuid:3e98ca5a-6f84-46b1-b20c-b3b643abb885> | CC-MAIN-2017-09 | http://www.cio.com/article/2459041/lithiummetal-battery-could-boost-gadget-power.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00001-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937887 | 411 | 4.0625 | 4 |
As more and more of our lives migrate online, congress, state legislatures and local governments are grappling with how to address the issues and challenges this presents. The problem is that by the nature and structure of the Internet itself, content and commerce on the Internet are virtually impossible regulate.
The ... | <urn:uuid:625d2f4c-b7ec-4747-929b-bcbe303a01d9> | CC-MAIN-2017-09 | http://www.govtech.com/internet/Internet-Gaming-Law-vs-Reality-2.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00353-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9746 | 1,032 | 2.578125 | 3 |
Pointer records are used to map a network interface (IP) to a host name. These are primarily used for reverse DNS.
- Name: This usually represents the last octet of the IP address.
- System (PTR to): This will be the value (the reverse DNS) for your host / computer within your domain.
- TTL: The TTL (Time to Live) is t... | <urn:uuid:4e08806f-5730-4820-9c83-5aec78092f72> | CC-MAIN-2017-09 | http://help.dnsmadeeasy.com/managed-dns/dns-record-types/ptr-record/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00529-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919286 | 842 | 2.8125 | 3 |
New and improved fast paced technologies are offering us exciting ways to live, are helping us at work, and continue pushing the boundaries of innovation and efficiency. However, along with all of the good comes the bad – the raised risk and exposure to security threats.
In part one and part two of our three part serie... | <urn:uuid:826f3d7a-8c26-4fa7-85a7-e1da1f002f46> | CC-MAIN-2017-09 | https://www.checkmarx.com/2017/02/13/cyber-threats-facing-apac-applications/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00053-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941375 | 727 | 2.6875 | 3 |
Jason | 5th December 2012
First off, there are a number of targets you should be aware of when filtering for @mentions of Twitter usernames:
twitter.user.id - The ID of the Twitter user that sent this Tweet
twitter.user.screen_name - The @username of the Twitter user that sent this Tweet
twitter.mentions - An array of ... | <urn:uuid:c65c56f6-c568-443f-a80d-83db5759e77f> | CC-MAIN-2017-09 | http://dev.datasift.com/blog/how-best-filter-twitter-mentions | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00049-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.83686 | 904 | 2.671875 | 3 |
by Gregory R.Scholz, Northrop Grumman Information Technology
Wireless networks are described as both a boon to computer users as well as a security nightmare; both statements are correct. The primary purpose of this article is to describe a strong security architecture for wireless networks. Additionally, the reader sh... | <urn:uuid:038dc1a0-e1ed-40b4-a05f-e4c8728cadd4> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-14/wireless-networks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00225-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929662 | 2,948 | 2.8125 | 3 |
Overview of Computer Architecture
the topic of our study is a Stored Program Computer, also called a
“von Neumann Machine”. The top–level logical architecture is as follows.
Recall that the actual architecture of a real machine will be somewhat different, due to the necessity of keeping performance at an acceptable lev... | <urn:uuid:55a403f1-7262-488a-91b5-00285ce8fc3f> | CC-MAIN-2017-09 | http://edwardbosworth.com/My5155_Slides/Chapter09/ComputerArchitectureOverview.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00169-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.896991 | 3,045 | 4.21875 | 4 |
Internet is relatively new technology but is one of the fastest in gaining popularity and in the spreading across the world. We can hardly imagine our normal daily life without internet. Sometimes we don’t even realize how much devices and services around us are actually internet equipped. But what makes all this devic... | <urn:uuid:691bb217-f6e8-462d-9c44-961b19fba0dd> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/networking-learning | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00221-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939519 | 126 | 3.40625 | 3 |
A microcontroller is a small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals.
Microcontrollers are used in automatically controlled products and devices, such as automobile engine control systems, implantable medical devices, remote controls, office... | <urn:uuid:4ad1b171-ca6e-448b-97d0-96f1acd20649> | CC-MAIN-2017-09 | http://www.micromarketmonitor.com/market-report/microcontroller-reports-8883152037.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00041-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.884121 | 653 | 2.65625 | 3 |
It's been a couple of years and a couple of million dollars. Finally, researchers and graduate students who have spent years developing intelligent water sensors released them into the Sacramento River on Wednesday, about 80 miles east of San Francisco.
That area of the river is a mixture of salt water from the nearby ... | <urn:uuid:8bb10124-3c7a-4303-b0d1-6843ce02e405> | CC-MAIN-2017-09 | http://www.itworld.com/article/2726620/networking/uc-berkeley-tests-floating-robot-sensors-to-track-water-flow--environmental-concerns.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00393-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954316 | 248 | 3.484375 | 3 |
Dilts T.E.,University of Nevada, Reno |
Weisberg P.J.,University of Nevada, Reno |
Yang J.,University of Nevada, Reno |
Olson T.J.,University of Nevada, Reno |
And 2 more authors.
Annals of the Association of American Geographers | Year: 2012
In arid regions of the world, the conversion of native vegetation to agricult... | <urn:uuid:c2ce9c1c-81c4-4dc6-9790-7d9befdb4de2> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/100-valley-road-51929/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00569-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913351 | 1,943 | 2.765625 | 3 |
Data center water usage and conservation is a critical aspect of green building design and environmental sustainability. Most data centers use large amounts of water for cooling purposes in order to maintain an ideal operating temperature for servers, hardware and equipment. But how do water conservation efforts affect... | <urn:uuid:6141a486-9f8c-49fe-9951-64f09cadebdb> | CC-MAIN-2017-09 | http://www.internap.com/2014/07/11/data-center-water-conservation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00445-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917089 | 601 | 3.59375 | 4 |
Boeing, NASA, Lockheed Martin and GE are among the large corporations that for decades have used additive manufacturing, known more popularly as 3-D printing.
Additive manufacturing is also used prominently in the medical and dental industries -- about 80,000 hip implants have been made to date using 3-D printers, and ... | <urn:uuid:f9109bdb-d527-48a1-852d-9f0a665e2fb1> | CC-MAIN-2017-09 | http://www.itworld.com/article/2705724/it-management/3-d-printing-comes-of-age.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00445-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954589 | 627 | 2.859375 | 3 |
One of the best things about covering technology is that you're always on the edge of a completely new generation of stuff that will make everything completely different than it ever was before, even before the last generation made everything different.
"Completely different" always seems pretty much the same, with a f... | <urn:uuid:5a5d1588-7a1e-4761-afe6-64aba0b09cc8> | CC-MAIN-2017-09 | http://www.itworld.com/article/2736618/development/breakthroughs-bring-the-next-two-major-leaps-in-computing-power-into-sight.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00390-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952701 | 969 | 3.171875 | 3 |
Earthquakes are something to tweet about
USGS's Twitter Earthquake Detector helps monitor quakes in real time
- By Henry Kenyon
- Jul 16, 2010
Agency: U.S. Geological Survey
Project: Twitter Earthquake Detector
Social media has a variety of uses that appeal to the federal government, and one such area is disaster respo... | <urn:uuid:43d6c2cd-f86d-490a-8eb9-c92e13b39c01> | CC-MAIN-2017-09 | https://fcw.com/articles/2010/07/19/web-app-usgs-twitter.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00566-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941129 | 524 | 2.59375 | 3 |
Facebook has released a programming language called Hack, which marries the ease of PHP with the rigorous safety controls of older languages such as C++.
PHP programmers should easily understand Hack, which replicates many of the same features and functions of PHP, and adds a few of its own for greater productivity, sa... | <urn:uuid:cc604eb3-79c3-4b44-a2c9-72ad906b2a33> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2176311/application-performance-management/facebook--39-s-hack-programming-language-builds-code-safety-into-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00090-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952391 | 715 | 2.859375 | 3 |
The Mask Raises Network Security Worries in an Age of Cyberwarfare
What if your network was compromised for the past five years and you didn't know?
That seems to have been the situation for many victims of one of the greatest security threat to have been recently discovered.
On February 11, Kaspersky Labs announced it... | <urn:uuid:eb9a6f82-36bc-4969-8cc4-45ccf0dd2ba2> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsecur/the-mask-raises-network-security-worries-in-an-age-of-cyberwarfare.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00442-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946882 | 1,158 | 2.703125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.