text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Whether you’re at the cash machine, online to your bank or credit card company or on the phone to your insurance or mortgage provider, until now, the need for greater security has meant added complexity and cost for user and provider alike. In future, this problem is sure to grow. Consumer-facing organisations want the...
<urn:uuid:f512330f-a03c-4db4-af37-95eb0d755217>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2003/04/09/mass-market-authentication-the-gateway-to-access-hungry-consumers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00211-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955615
1,584
2.625
3
The International Space Station hit a major milestone today, marking 15 years in space. On Nov. 20, 1998, the Russian Space Agency , now known as Roscosmos, launched a Proton rocket that carried a pressurized module, named Zarya, or sunrise, into Earth's orbit. Zarya was the first piece of the International Space Stati...
<urn:uuid:db9bae34-192e-4f0f-a081-d0f89cf7227c>
CC-MAIN-2017-09
http://www.computerworld.com/article/2486167/emerging-technology/international-space-station-marks-15-years-in-earth-s-orbit.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00387-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948801
698
3.625
4
Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft....
<urn:uuid:fea2fb4e-2810-4e49-88fe-892a17e60f0c>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2016/06/23/hackers-targeting-healthcare-industry/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00387-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948773
716
3.28125
3
Flash storage is one of the main components that makes low power electronics so flexible. Unlike common DRAM, which needs constant refreshing in order to retain its contents, flash memory will stay written for about 10 years without power. However, flash pays for that longevity in access times, which are much slower th...
<urn:uuid:8769f912-9cb2-4e4a-ad11-2f7da30269af>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2007/12/the-perfect-computer-memory/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00563-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939595
624
3.859375
4
Addendum: Symbolic Links A lot of people not steeped in Unix culture do not know what symbolic links are, particularly Mac users who don't understand the differences between Mac OS aliases and Unix symbolic links, or "symlinks." But it's such a simple concept, it's worth taking a few seconds to explain it. Symlinks are...
<urn:uuid:62b0ea04-7c5e-41f0-910b-b9d96fcf6d72>
CC-MAIN-2017-09
https://arstechnica.com/apple/2000/05/mac-os-x-dp4/13/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00263-ip-10-171-10-108.ec2.internal.warc.gz
en
0.905543
1,013
3.828125
4
IBM predicts five innovations that will change our behaviour over the next five years. As 3D and holographic cameras get more sophisticated and miniaturized to fit into mobile phones, people will be able to interact with photos, browse the web and chat with friends in the form of 3D holograms. By submitting your person...
<urn:uuid:bfc75386-618d-4c86-ae38-405e260332e2>
CC-MAIN-2017-09
http://www.computerweekly.com/news/1280094633/Five-life-changing-innovations-for-the-next-five-years
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00615-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926091
607
3.1875
3
Capacity and QoS are major considerations in a converged network and effect one another. QoS is needed to prevent applications from using more than a fair share of bandwidth and degrading the performance of other applications. At the WAN interface, QoS is needed to allocate expensive wide area capacity among applicatio...
<urn:uuid:6bc9c6cc-a568-4353-9c2d-4d16dbe1e729>
CC-MAIN-2017-09
http://www.cisco.com/cisco/web/docs/iam/unified/ipt601/Capacity_and_QoS.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00139-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916506
406
2.5625
3
Sun Library Flaw Opens Door to Remote Attacks A vulnerability in a Sun code library enables a remote attacker to execute code on a user's machine.There is a vulnerability in a Sun Microsystems Inc. code library that enables a remote attacker to execute code on a users machine. The flaw also affects libraries derived fr...
<urn:uuid:ffdadb3f-3609-4bd1-919d-18936b1d4b8c>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Application-Development/Sun-Library-Flaw-Opens-Door-to-Remote-Attacks
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00139-ip-10-171-10-108.ec2.internal.warc.gz
en
0.868527
216
2.6875
3
Projectors are a critical tool for engaging large groups and play an important role in higher education. A projector is a tool to teach the masses. This is especially applicable to higher education, where students pile into auditorium-sized lecture halls and standard classrooms to absorb knowledge on the big screen. Th...
<urn:uuid:c39212ed-40e5-4950-a911-238b5b03ac20>
CC-MAIN-2017-09
https://techdecisions.co/downloads/the-secrets-to-finding-configuring-the-perfect-projector/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00383-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9327
304
2.515625
3
ARM has added a wealth of wireless technologies to its arsenal, but has no immediate plans to design a modem for mobile or Internet of Things devices. The company offers CPU and GPU designs that are widely used in smartphones and tablets. A missing piece is a cellular modem that ARM customers could license and put in m...
<urn:uuid:b3902238-c773-42b6-8b0e-a2810db40069>
CC-MAIN-2017-09
http://www.computerworld.com/article/3034703/computer-hardware/arm-to-skip-modems-for-now-even-though-theyre-big-in-mobile.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00007-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947488
617
2.546875
3
Autonomous cars need a new kind of horsepower to identify objects, avoid obstacles and change lanes. There's a good chance that will come from graphics processors in data centers or even the trunks of cars. With this scenario in mind, Nvidia has built two new GPUs -- the Tesla P4 and P40 -- based on the Pascal architec...
<urn:uuid:bf0996e5-e690-470f-9ab6-6b61c28b1e31>
CC-MAIN-2017-09
http://www.networkworld.com/article/3119445/nvidias-new-pascal-gpus-can-give-smart-answers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00603-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944509
707
3.21875
3
37.3 million users around the world were subjected to phishing attacks in the last year, which is a massive 87 percent increase for the number of targeted user in 2011-2012. According to the results of a Kaspersky Lab research into the evolution of phishing attacks, they were most frequently launched from the U.S., the...
<urn:uuid:4b513932-3096-4d9f-bdc5-649e60e2f0df>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/06/21/phishing-attacks-impacted-373-million-users-last-year/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00603-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949184
422
2.765625
3
Free Speech Online: Where Is the Line Drawn? When America’s Founding Fathers drafted the First Amendment, no one could have imagined there would eventually be a technology — the Internet — that would allow Americans to speak to people around the globe within seconds. Now, more than 200 years later, some wonder if the e...
<urn:uuid:b44c3c85-ae55-405b-bb80-f5e41eeabe5a>
CC-MAIN-2017-09
http://certmag.com/free-speech-online-where-is-the-line-drawn/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952711
2,813
2.875
3
The Internet of Things (IoT) extends the end node far beyond the human-centric world to encompass specialiSed devices with human-accessible interfaces, such as smart home thermostats and blood pressure monitors. And even those without human interfaces, including industrial sensors, network-connected cameras and traditi...
<urn:uuid:ba68d180-8193-4490-9d38-9e65457899eb>
CC-MAIN-2017-09
http://www.information-age.com/why-internet-things-more-just-smart-fridge-123458485/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910138
1,428
2.859375
3
Do we really need another programming language? There is certainly no shortage of choices already. Between imperative languages, functional languages, object-oriented languages, dynamic languages, compiled languages, interpreted languages, and scripting languages, no developer could ever learn all of the options availa...
<urn:uuid:c49a2af7-8745-439e-8560-ff4232626fd3>
CC-MAIN-2017-09
http://www.itworld.com/article/2733716/enterprise-software/10-programming-languages-that-could-shake-up-it.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926958
2,267
2.59375
3
Mayol M.,CREAF Cerdanyola del Valles 08193 Spain | Riba M.,University of Barcelona | Gonzalez-Martinez S.C.,Forest Research Center Madrid 28040 Spain | Bagnoli F.,National Research Council Italy | And 10 more authors. New Phytologist | Year: 2015 Despite the large body of research devoted to understanding the role of Q...
<urn:uuid:77511212-d8c9-4b4e-9aa7-e7d7b18b97cc>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/creaf-cerdanyola-del-valles-08193-spain-2625292/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz
en
0.885644
343
2.640625
3
A focal point requirement of the 2002 No Child Left Behind Act (NCLB), federal legislation aimed at improving U.S. primary and secondary schools performance, was to implement accountability systems that analyze student and educator data, and report those results to the U.S. Department of Education. These reporting syst...
<urn:uuid:d74466e4-3044-4fc9-acf8-8c44f4d88d3c>
CC-MAIN-2017-09
http://www.govtech.com/education/Student-Tracking-System-Helps-New-Mexico.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00003-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964404
1,265
3.203125
3
Historically, the Earth's climate has ranged from the snowball Earth, with glaciers in tropical regions, to a hothouse with ice-free poles. The transitions between different states—climate changes—are driven by changes in the factors that force the climate. These include difference in incoming solar radiation (both the...
<urn:uuid:bf9b5a05-7536-44d1-acf0-87186efc1888>
CC-MAIN-2017-09
https://arstechnica.com/technopaedia/2009/11/climate-change/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00003-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945997
387
4.6875
5
E-Mail, the venerable old standard for internet text messages, dating back to the early 1980s – and back to the early 1970s in other forms, has long been the “killer app” of the internet. While so many companies try to make the next great thing that’ll capture users around the world – none of these compare to the succe...
<urn:uuid:b106bf78-0470-4df3-9ff9-27a6fb620edf>
CC-MAIN-2017-09
https://adamcaudill.com/2014/06/27/the-sinking-ship-of-email-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00179-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959936
1,829
2.6875
3
In SQL Server, statistics can be created using CREATE STATISTICS command or using CREATE INDEX command. At the feature level, the statistical information created using CREATE STATISTICS command is equivalent to the statistics built by a CREATE INDEX command on the same columns. The only difference is that the CREATE ST...
<urn:uuid:ebcfd09f-6c43-43d0-8413-96e01de3b657>
CC-MAIN-2017-09
https://blogs.manageengine.com/application-performance-2/appmanager/2013/10/22/optimizing-sql-server-performance-the-story-of-statistics.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00527-ip-10-171-10-108.ec2.internal.warc.gz
en
0.88694
1,186
2.75
3
There is a long history of cable industry vertical integration, tracing back to the 1972 creation of HBO by Cablevision In the 1940s, the U.S. Department of Justice put a wallop on Hollywood that would have made James Cagney, a popular movie tough guy of the era, tip his fedora hat. The provocation came from a series o...
<urn:uuid:f25b7a5d-e795-4879-8305-1fd2f39e8b6d>
CC-MAIN-2017-09
https://www.cedmagazine.com/print/articles/2009/12/memory-lane-vertical-reality
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00527-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94869
976
2.734375
3
A 110-core chip has been developed by Massachusetts Institute of Technology as it looks for power-efficient ways to boost performance in mobile devices, PCs and servers. The processor, called the Execution Migration Machine, tries to determineways to reduce traffic inside chips, which enables faster and more power-effi...
<urn:uuid:57d80df5-5570-4ddc-960e-ffbc62c32f45>
CC-MAIN-2017-09
http://www.networkworld.com/article/2169438/computers/mit-develops-110-core-processor-for-more-power-efficient-computing.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00223-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954704
504
3.171875
3
Hospitals are reporting a new threat of infection -- from computer malware. Computer viruses are worming their way into everything from fetal monitors to radiology departments’ picture archiving and communication systems, which store and share images from X-rays and other diagnostic equipment, reports Technology Review...
<urn:uuid:0386626c-9161-486b-90df-c0fd372e4bd4>
CC-MAIN-2017-09
http://www.nextgov.com/health/health-it/2012/10/malware-threatens-medical-machines-and-systems/58929/?oref=ng-nextpost
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00223-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942975
323
2.53125
3
Americans have not set foot on the moon's surface since 1972. During his presidency, George W. Bush wanted to change that. "We do not know where this journey will end, yet we know this: Human beings are headed into the cosmos," Bush said during a speech at NASA headquarters on Jan. 14, 2004, in Washington. "Mankind is ...
<urn:uuid:82837523-3620-4ceb-a2cf-885addd80605>
CC-MAIN-2017-09
http://www.nextgov.com/emerging-tech/2014/01/nasas-budget-woes-eclipse-plans-another-moon-walk-2020/76877/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00399-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958796
473
3.109375
3
Tools to tighten the Internet of Things The Internet of Things (IoT) is coming, and there’s no doubting its potential. Government IT managers don’t care that your fridge can tell your smartphone what you need to buy next, but they do appreciate that advances in connectivity and data collection will enable major improve...
<urn:uuid:84d93474-9c21-4d0b-9ba0-bf5383f0582b>
CC-MAIN-2017-09
https://gcn.com/blogs/cybereye/2014/06/internet-of-things.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00399-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951524
739
2.609375
3
The password. It really gives you power doesn’t it? You’re the only one that has the “key” to the workstation or something else that has to be kept away from prying eyes. If you’re using a password than there must be something worth protecting, so why not make this protection a good one? Choosing a good password There ...
<urn:uuid:46c94b2d-f436-447d-b013-64d715c3def2>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2002/05/24/basic-security-with-passwords/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00399-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921082
952
2.625
3
Sharing Drive Space Grids can share more than just processors; they also can share drive space for both greater storage room and more robust data availability. Usually this is done with mountable networked file systems, such as AFS (Andrew File System), that old Unix distributed storage favorite; NFS (Network File Syst...
<urn:uuid:27ae6028-beb8-46a1-bd12-51c4e571824f>
CC-MAIN-2017-09
http://www.eweek.com/c/a/IT-Infrastructure/Grid-Computing-101/1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00167-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948942
613
3.1875
3
Data Privacy Tool You may also be interested in our Data Privacy Scorebox to assess your organisation's level of data protection maturity. Law No 09-08 dated on 18 February 2009 relating to protection of individuals with regard to the processing of personal data and its implementation Decree n° 2-09-165 of 21 May 2009 ...
<urn:uuid:aedd34a7-deda-480e-a3a7-15df1ad530f6>
CC-MAIN-2017-09
https://www.dlapiperdataprotection.com/index.html?t=contacts-section&c=MA
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00167-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928368
1,382
2.546875
3
Chapter 22: Job Control Language This chapter presents a discussion of JCL (Job Control Language) as used for jobs run on a modern IBM mainframe running a descendant of the OS operating system, such as z/OS. First, we must define the term “job”. A job is a unit of work for the computer to execute. The job comprises ide...
<urn:uuid:c4315858-b193-4428-9f0b-7a7b3551ca2b>
CC-MAIN-2017-09
http://edwardbosworth.com/My3121Textbook_HTM/MyText3121_Ch22_V01.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00343-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913037
3,680
3.140625
3
Technology and process upgrades implemented since the controversial 2000 presidential election have made electronic voting machines more secure and reliable to use, the Caltech-MIT Voting Technology Project said in a report last week. Even so, the only way to ensure the integrity of votes cast with the systems is to ha...
<urn:uuid:56c78dd3-e98a-4468-b468-4fe51e859ccc>
CC-MAIN-2017-09
http://www.computerworld.com/article/2492684/government-it/despite-e-voting-improvements--audits-still-needed-for-ballot-integrity.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00215-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965317
938
2.609375
3
Threats to mobile devices are on the rise. But it’s not just malware, worms, and other viruses that pose a danger — mobile phone spam, a new spin on an old nuisance, is emerging as a problem. Mobile phone spam, also called short message service (SMS) spam, sends unwanted text messages, usually advertisements, to a user...
<urn:uuid:5ed832d4-3f2e-43a0-b8e6-14a6193cd0bd>
CC-MAIN-2017-09
https://www.mcafee.com/mx/security-awareness/articles/how-to-fight-spam-text-messages.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00391-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937747
270
2.953125
3
Intelligent Grids Power a Smarter Future by Meir Shargal Regardless of who you ask, the forecast is often the same: in the next two decades, the world’s demand for energy will essentially double. Simultaneously, CO2 regulations and reduction goals — be it for utilities or consumers worldwide — will also explode. Smart ...
<urn:uuid:255a19c1-da8f-425f-8994-69fe8dedd47d>
CC-MAIN-2017-09
http://www.csc.com/cscworld/publications/56901/56905-the_green_corner_intelligent_grids_power_a_smarter_future
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00567-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938873
795
3.125
3
June 18 — Lawrence Berkeley National Laboratory has been named an Intel Parallel Computing Center (IPCC), a collaboration with Intel aimed at adapting existing scientific applications to run on future supercomputers built with manycore processors. Such supercomputers will potentially have millions of processor cores, b...
<urn:uuid:925f436f-ba54-4349-b759-246669e9033f>
CC-MAIN-2017-09
https://www.hpcwire.com/off-the-wire/berkeley-lab-intel-collaborate-updating-scientific-codes-manycore-architectures/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00443-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919444
1,295
2.953125
3
Water Robots Hit the Waves / November 22, 2011 Last Thursday, four self propelled robots called Wave Gliders left San Francisco for a 60,000 kilometer journey. These robots, each of which is about the size of a dolphin, are built by Liquid Robotics, and will travel together to Hawaii, then split into pairs. One pair wi...
<urn:uuid:46e086ca-df8a-4fb6-a168-cf923d6535d3>
CC-MAIN-2017-09
http://www.govtech.com/photos/Photo-of-the-Week-Water-Robots-Hit-the-Waves-11222011.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00388-ip-10-171-10-108.ec2.internal.warc.gz
en
0.90216
231
3.109375
3
Not having an API is becoming like not having a website, but the interface has got to be easy for outside developers to work with. When Neil Fantom, a manager at the World Bank, sat down with the organization's technology team in 2010 to talk about opening up the bank's data to the world at large, he encountered a bit ...
<urn:uuid:ef16261d-ab8f-44ec-91cd-a82d6c534a70>
CC-MAIN-2017-09
http://www.networkworld.com/article/2165357/applications/open-your-data-to-the-world.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00264-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967419
2,751
2.609375
3
The idea of building a robotic manufacturing facility in space might have been in the realm of a Star Wars, Star Trek or other science fiction story, but like some of the technologies in those tales, reality may soon imitate art. First off, you may recall that NASA is looking for an asteroid weighing about 500 tons tha...
<urn:uuid:8051c37f-bba6-4a1e-9e42-2da3ce41c740>
CC-MAIN-2017-09
http://www.networkworld.com/article/2224711/data-center/nasa--asteroid-based-manufacturing-not-science-fiction.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00384-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9671
988
4
4
One of technology's missions is to allow people to think less about the technology they’re using and focus more on the thing they’re using the tech for. A $900,000 National Science Foundation grant issued to researchers at Rice University will allow for the best properties of optical and electronic computer networks to...
<urn:uuid:92f2cd1e-dbff-451d-8276-1dc3a25a2339>
CC-MAIN-2017-09
http://www.govtech.com/Researchers-Target-Network-Bottlenecks.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00084-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953642
802
2.875
3
Black Box Explains...Insertion loss Insertion loss is a power loss that results from inserting a component into a previously continuous path or creating a splice in it. It is measured by the amount of power received before and after the insertion. In copper cable, insertion loss measures electrical power lost from the ...
<urn:uuid:faf28ec2-d413-47e3-8ad0-0485bed9c8b4>
CC-MAIN-2017-09
https://www.blackbox.com/en-us/products/black-box-explains/black-box-explains-insertion-loss
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00084-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954694
204
3.390625
3
As wearables continue to evolve, leagues are finding themselves asking many new questions about its use. There is no question that wearable technology has an amazing amount of potential when used by players in professional sports leagues, but the specific way in which collected data is used is starting to generate a ma...
<urn:uuid:a230ba58-9379-450b-b2b7-7b521d4a841a>
CC-MAIN-2017-09
http://www.mobilecommercepress.com/tag/sports-wearables/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00436-ip-10-171-10-108.ec2.internal.warc.gz
en
0.979488
456
2.625
3
Cloud storage, especially object storage, is often marketed by touting its “durability,” with many providers boasting eleven or thirteen “nines”, in other words 99.999999999% reliability. It sounds great—as close to 100% reliable as you can get. But what is durability in relation to storage, and do you really need thos...
<urn:uuid:a570f29b-d89c-49b6-8037-10977e0366c5>
CC-MAIN-2017-09
https://www.greenhousedata.com/blog/what-is-cloud-storage-durability-do-you-really-need-11-nines
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00436-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947766
687
2.796875
3
A load balancer is a hardware or virtual software device that intelligently distributes application and network traffic across multiple servers. The goal of the load balancer is to make sure that all users are served information as quickly as possible, and that more work gets done in less time. Today’s application deli...
<urn:uuid:746db1dd-4db3-4d76-a8be-6b468ba80c0b>
CC-MAIN-2017-09
https://www.a10networks.com/resources/glossary/load-balancer
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00612-ip-10-171-10-108.ec2.internal.warc.gz
en
0.901109
235
2.640625
3
In the Tactical Deception Field Manual FM 90-2 of the US Army, the concept of deception is described as those measures designed to mislead enemy forces by manipulation, distortion, or falsification of evidence to induce him to react in a manner prejudicial to his interests. In the cyber world the deception concept and ...
<urn:uuid:ac620d50-2699-4024-b9d5-82d21dce9a11>
CC-MAIN-2017-09
https://countuponsecurity.com/tag/network-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00488-ip-10-171-10-108.ec2.internal.warc.gz
en
0.837009
2,823
2.65625
3
This may seem like a simple question but for a lot of system administrators who “inherit” systems or are unfamiliar with operating systems that have been forced upon them, it can be very confusing, especially if you're coming from a proprietary UNIX® operating system such as Solaris™ or HP-UX to a Linux®-based distribu...
<urn:uuid:a639f979-73c9-4836-bdda-46e56697ba83>
CC-MAIN-2017-09
http://www.infosecisland.com/blogview/9657-Which-Linux-or-UNIX-Version-Am-I-Running.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00608-ip-10-171-10-108.ec2.internal.warc.gz
en
0.873088
1,307
2.6875
3
One of the main concerns of the organizers of the Olympic Games to be held in Athens this summer is security, but not only physical security, computer security as well. The emphasis placed on avoiding problems with the computers that will manage huge amounts of data during the games will be proportional to the magnitud...
<urn:uuid:e80cbec3-0710-4907-aa9f-38583072c62d>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2004/06/02/how-much-should-you-invest-in-it-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00132-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966
760
2.515625
3
SPECIAL REPORT—Green IT Air flow control can yield more efficient data centers Projects explore new techniques for improving air distribution in data centers - By Rutrell Yasin - Apr 03, 2009 You don’t necessarily have to spend money to save money on data center power use. The Energy Department’s Lawrence Berkeley Nati...
<urn:uuid:a2bf6124-c384-4dfe-957f-bdc4a0ff87c1>
CC-MAIN-2017-09
https://gcn.com/articles/2009/04/06/cool-it.aspx?admgarea=TC_DATACENTER
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00308-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938083
2,546
2.75
3
Cloud Infographic: The History Of Cloud Technology Since cloud computing is gaining acceptability by the day, it is no longer a beginner in the IT infrastructure space. Again, since there are many who resist the technology citing several concerns like security and availability, it hasn’t matured either. In other words,...
<urn:uuid:8baa6556-d3ed-4671-a967-b85eb16b5e52>
CC-MAIN-2017-09
https://cloudtweaks.com/2012/11/cloud-infographic-the-history-of-cloud-technology/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00484-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947375
206
2.828125
3
It's still unclear exactly what passwords were stolen by Russian hackers, and how dangerous the breech might be. But whether or not you're affected, here are five ways to keep your passwords safe. Use two-factor authentication Passwords by their very nature are insecure. So many sites, including Gmail, Google, Facebook...
<urn:uuid:89750193-90ac-474c-aecc-e6a3ad768c1d>
CC-MAIN-2017-09
http://www.itworld.com/article/2693574/security/russian-hacker-breach--five-ways-to-better-protect-your-passwords.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00428-ip-10-171-10-108.ec2.internal.warc.gz
en
0.968108
452
2.609375
3
Hello Friends, today i will explain you how to secure your computer by just simple 7 steps. This will help you to protect your computer from viruses, Trojan attacks and also from hackers. These 7 tips will improve your computer and online security. Online Computer and internet security is critical right from the moment...
<urn:uuid:49a670f3-0114-4354-a7ef-f006cb0bba07>
CC-MAIN-2017-09
https://www.hackingloops.com/7-tips-to-improve-your-pc-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00428-ip-10-171-10-108.ec2.internal.warc.gz
en
0.914216
1,020
2.703125
3
With the Carbon to Collaboration Initiative, Cisco is committed to reducing carbon emissions by a minimum of 10 percent, starting with a dramatic reduction in the company’s air travel in 2008. In addition, Cisco will invest US$20 million in collaborative technologies that will reduce the need for physical travel at C...
<urn:uuid:7fd8c0e0-9815-44b8-ae7e-ba7526df9f33>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/about/consulting-thought-leadership/what-we-do/industry-practices/public-sector/our-practice/urban-innovation/connected-urban-development/further-cud-information/thought-leadership/carbon.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00124-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942856
195
2.578125
3
Attention: Virus Zircon.c is spreading on the Internet 14 Mar 2002 Kaspersky Lab, a leading international data-security software developer, reports the detection of a new version of the Internet-worm known as Zircon. Zircon.c, which is distinct from two previous forms, has achieved wide distribution across the Internet...
<urn:uuid:23304592-e88a-4fc5-b7c4-a815fe2b8e9e>
CC-MAIN-2017-09
http://www.kaspersky.com/au/about/news/virus/2002/Attention_Virus_Zircon_c_is_spreading_on_the_Internet
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00300-ip-10-171-10-108.ec2.internal.warc.gz
en
0.883423
207
2.53125
3
For most people, a home router is their window to the world -- the World Wide Web. But it is a broken window, according to some top security experts, who say there is little that average consumers can do to protect themselves from skilled cyber attackers, even if they use rigorous passwords and encryption, because the ...
<urn:uuid:6ed14be3-0315-4d00-a48e-e67a7fd744a1>
CC-MAIN-2017-09
http://www.cio.com/article/2376196/router/home-routers--broken-windows-to-the-world.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00476-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959588
1,957
2.6875
3
Programming Using the CCA API The API we’re going to use is the Common Cryptographic Architecture (CCA). There are more than 80 function calls, but we’ll examine only a few of them that let you do authentication and encryption. You’ll want to get a copy of the Cryptographic Services ICSF Application Programmer’s manual...
<urn:uuid:f4610f63-3761-4ca3-b060-b42db20f293c>
CC-MAIN-2017-09
http://enterprisesystemsmedia.com/article/implementing-icsf-hardware-cryptography-on-z-os/3
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00052-ip-10-171-10-108.ec2.internal.warc.gz
en
0.865563
1,110
2.578125
3
Optical networking uses thin glass or plastic optical fiber to transmit information in the form of light pulses. It is far more reliable and offers greater transmission capacity than conventional copper-wire networks. SONET and Synchronous Digital Hierarchy (SDH) are the most common optical transport protocol standards...
<urn:uuid:bee610ba-69de-45f8-a1c9-5fca7e2ae8f8>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/products/optical-networking/technology.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00472-ip-10-171-10-108.ec2.internal.warc.gz
en
0.903159
385
2.9375
3
The Importance of Global Digital Literacy With the world economy becoming more connected via networks and business environments becoming more computer-intensive in day-to-day job tasks, the issue of digital literacy stands out as a key differentiator of success at the individual, regional and national levels. Right now...
<urn:uuid:e8798603-2b5e-41e8-9fec-bf62e466da2f>
CC-MAIN-2017-09
http://certmag.com/the-importance-of-global-digital-literacy/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00348-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956289
606
2.625
3
What are “cookies”? “Cookies” (also known as HTTP cookies, web cookies or browser cookies) are simply small pieces of data, which are stored as text files on your computer, whenever you visit certain websites. Their typical purpose is to help sites remember particular actions you may have done there in the past. For ex...
<urn:uuid:7ed5d194-edf7-4bfb-a7d5-adf468232d03>
CC-MAIN-2017-09
https://www.infosecurity-magazine.com/cookies/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00348-ip-10-171-10-108.ec2.internal.warc.gz
en
0.884653
888
2.921875
3
Last week we brought up the question, “How did end users learn to expect fast websites?” We covered how Pavlov discovered Conditioning through experiments with his dog, which left us wondering; perhaps humans are conditioned to expect instant web gratification. Almost 100 years after Pavlov, Wolfram Schultz, now at Cam...
<urn:uuid:1d326bc2-cc0f-4446-9bdf-5170601fac59>
CC-MAIN-2017-09
http://blog.catchpoint.com/2012/09/19/why-we-expect-fast-websites-part-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00168-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962124
983
2.765625
3
What email address or phone number would you like to use to sign in to Docs.com? If you already have an account that you use with Office or other Microsoft services, enter it here. Or sign in with: Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi...
<urn:uuid:e17f8c96-4790-41bc-8319-972077b54197>
CC-MAIN-2017-09
https://docs.com/anthony-razor/7164/intro-to-political-geography
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00044-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916683
2,500
2.734375
3
Deleted files can often be recovered, and that's a problem when you're passing your PC or PC-related tech along to someone else. Whether it's sensitive financial data, business documents, or scandalous photos that could be used to blackmail you, you probably don't want people getting their hands on your private stuff. ...
<urn:uuid:c3deb118-9e07-4455-ab4f-d4ecd1af1e23>
CC-MAIN-2017-09
http://www.itworld.com/article/2699222/security/definitely-deleted--how-to-guarantee-your-data-is-truly-gone-before-recycling-old-pcs-and-drives.html?page=3
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00572-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945061
1,804
2.59375
3
If you're worried about being out of shape, or suspect you might have a disease like diabetes, just breathe into this Toshiba tube. It's part of a prototype medical breath analyzer that's small enough to be used in small clinics or gyms. By detecting trace gases that are exhaled, it could be used to monitor health indi...
<urn:uuid:38f8b292-bbc5-41e3-9e69-c68ee27de520>
CC-MAIN-2017-09
http://www.itworld.com/article/2701246/data-center/compact-breath-sniffer-could-warn-of-diabetes.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00216-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945082
465
2.984375
3
This article is excerpted from “Cloud Opportunities in HPC: Market Taxonomy,” published by InterSect360 Research. The full article was distributed to subscribers of the InterSect360 market advisory service and can also be obtained by contacting email@example.com. In Life, the Universe, and Everything, the third book of...
<urn:uuid:bdc36e50-ee47-41c6-9def-8a1383a8d815>
CC-MAIN-2017-09
https://www.hpcwire.com/2009/11/02/cloud_computing_opportunities_in_hpc/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00392-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949127
2,679
2.765625
3
Originally published February 6, 2008 The enormous interest in master data management (MDM) that has appeared in the past couple of years has not yet generated a great deal of methodological progress. Hopefully, as data professionals, consultants, and vendors grapple with the complex issues involved, the situation will...
<urn:uuid:497d2ead-c6a0-4a49-bb4d-306e8bbafa82>
CC-MAIN-2017-09
http://www.b-eye-network.com/view/6758
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00037-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950959
1,730
2.640625
3
Some people have been worried that with the growth of technologies like artificial intelligence (AI) and virtual reality (VR) jobs will become more scarce. We have learned from history though that every time a new technology hits the market, any job losses from it usually are replaced by new jobs related to that techno...
<urn:uuid:c1709f4d-c985-4641-880c-6b1497ff3a7e>
CC-MAIN-2017-09
https://cloudtweaks.com/2016/10/jobs-future-ai-vr/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00213-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952043
382
2.640625
3
HPC clusters first emerged in universities and research centers that required extra compute power but had limited budgets. The development of open source Linux-based operating systems and management tools was a natural evolution. However, because open source tools are created by a variety of different organizations, no...
<urn:uuid:eda35803-c9e9-480f-8443-c116c442faa6>
CC-MAIN-2017-09
https://www.hpcwire.com/2012/12/17/open_source_software_in_hpc/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00213-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948763
1,098
2.625
3
The Trails open-source framework, inspired by Ruby on Rails, makes Java development easier. LAS VEGASChris Nelson said he found developing in Java was just too hard, so he decided to do something to make it easier. Now hes about to deliver on it. Nelson, an independent developer and director of the Cincinnati Java User...
<urn:uuid:c7bbe3ae-44ad-45d3-b718-1bd20b726f33>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Application-Development/OpenSource-Framework-Means-Happy-Trails-for-Java-Developers
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00389-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951865
706
2.6875
3
Many researchers and journalists are calling the high-pressure system causing California’s historic drought the “Ridiculously Resilient Ridge,” a weather phenomenon identified using technology developed in the 1930s. For the past 12 months, California has been drier than a sandbox in the Sahara thanks to a stubborn hig...
<urn:uuid:f04ccc03-8bed-48b1-bf6d-458ccfbabf6f>
CC-MAIN-2017-09
http://www.govtech.com/The-Weather-May-Change-but-Drought-Technology-Stays-the-Same.html?flipboard=yes
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00389-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941783
1,191
3.640625
4
DRM stands for “Digital Rights Management.” It is the technology that controls your access to copyrighted works such as movies, music, literature and software. The product files are encrypted so that you can only use them on authorized devices. For example, if you have downloaded music onto your PC, and want to access ...
<urn:uuid:6661a36d-c1e0-4977-a900-14a85b666778>
CC-MAIN-2017-09
https://www.justaskgemalto.com/us/what-is-a-drm-and-how-does-it-work-on-mobile-device/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00565-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939948
253
3.03125
3
Printer maker Epson just revealed a new machine that spits out pages at a stunning rate of 14 per minute. Wait! Don't stop reading yet. That pace only sounds bad when we’re talking about printers. This behemoth isn’t printing paper—its making it, from materials you'd otherwise toss in the trash. The company recently an...
<urn:uuid:770ce10f-96c5-4719-99b2-738979e116ea>
CC-MAIN-2017-09
http://www.itnews.com/article/3011588/business/worlds-first-in-office-paper-recycling-machine-turns-used-paper-into-clean-white-sheets.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00441-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943013
671
2.65625
3
Serious game tests GIS, disaster response skills - By Patrick Marshall - Jul 09, 2013 They may not be much at coming up with catchy names for software, but a team of students and faculty at the Rochester Institute of Technology have done a pretty impressive job of using geographic information systems to sharpen spatial...
<urn:uuid:d4e07381-fd12-4489-a311-cffa8a9b52ec>
CC-MAIN-2017-09
https://gcn.com/articles/2013/07/09/serious-game-tests-disaster-response-skills.aspx?admgarea=TC_STATELOCAL
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00441-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963731
541
3.203125
3
A Multimodel database management system (DBMS) is a database system that is built with a data records using an entity-relationship data model. The data is stored using a variety of logical models or views and uses a flexible combination of KeyValue pairs, documents and graphs. AranoDB is a flexible data model that uses...
<urn:uuid:aec27c25-6a93-4c95-a75e-193d1dd36f73>
CC-MAIN-2017-09
https://datafloq.com/big-data-open-source-tools/os-multimodel/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00617-ip-10-171-10-108.ec2.internal.warc.gz
en
0.868203
174
2.5625
3
Calling for better mine safety A close public/private partnership produces an innovative emergency communications system - By Doug Beizer - Jul 01, 2009 Communications technology in many underground mines is primitive, consisting of phones and handsets connected by wire. It works, but it's vulnerable. If an accident se...
<urn:uuid:8696349f-a6d8-4dcd-a8ff-5093d68bb86e>
CC-MAIN-2017-09
https://fcw.com/articles/2009/07/06/tech-mine-emergency-comm--system.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00617-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950775
988
2.515625
3
While passwords security is not ironclad, experts say they need to be in the mix with device-assisted authentication as an additional layer Google's security team is experimenting with ways to replace passwords for logging in to websites. But while acknowledging passwords alone are no longer enough to protect users, se...
<urn:uuid:a7a82fbf-5591-44fb-98b8-10616e45ed8e>
CC-MAIN-2017-09
http://www.networkworld.com/article/2163763/byod/google-looks-to-kill-passwords--but-experts-say-not-so-fast.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00085-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95395
836
2.578125
3
Field Encryption on the IBM i just got easier. SQL Field Procedures are a new DB2 feature in version 7.1 that allows a user-specified "exit" program to be called whenever data is read from, inserted into, or updated in a field (column). This is somewhat similar to database column triggers; however there are two distinc...
<urn:uuid:aeca176a-052e-43d0-ada7-367b18011650>
CC-MAIN-2017-09
http://www.linomasoftware.com/blog/tag/sql-field-procedures
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00261-ip-10-171-10-108.ec2.internal.warc.gz
en
0.901083
207
2.53125
3
The networks are now used for research, but commercial grids are not far away. Imagine if computing power were as easily accessible as electricity. Businesses essentially would be able to tap into a vast network of supercomputers and pay only for the power they use, rather than spend millions of dollars on the hardware...
<urn:uuid:c40a1385-ce4f-4347-9111-c7b4c08d7856>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Cloud-Computing/Feel-the-Power-of-the-Computer-Grid
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00437-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956142
1,018
3.046875
3
Cisco created all sorts of different magic inside their boxes that optimize forwarding processing of packets. IP Routing explained in detail Logic behind IP forwarding is listed in steps here with the assumption it will be an IPv4 packet that was received. This is process switching explained in 11 steps: - A frame ente...
<urn:uuid:d360005a-d091-42cb-8325-17918b3392e0>
CC-MAIN-2017-09
https://howdoesinternetwork.com/2015/routing-cef
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00613-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925123
1,454
3.296875
3
With the news that an American woman has received a pacemaker with a wireless connection to the Internet, the so-called “Internet of Things” has taken on a new dimension. Reuters reported this week that a 61-year-old woman became the first American recipient of the pacemaker, which was approved by the FDA just last mon...
<urn:uuid:8d981c1c-0c35-49c2-bf53-1204893c7601>
CC-MAIN-2017-09
http://www.networkworld.com/article/2246930/lan-wan/-the-internet-of-things--now-includes-a-human-heart.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00137-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959555
362
2.8125
3
Authors: Ed Skoudis and Lenny Zeltser Publisher: Prentice Hall PTR Every computer user, whether a system administrator or a home user, needs to defend their computer from all sorts of attacks. This book brings basic knowledge about types of malicious code with definitions and practical advice. To get to know your enemy...
<urn:uuid:c0f24498-fd50-44b3-8118-1bcceec2ea06>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2004/07/26/malware-fighting-malicious-code/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00313-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926187
1,398
3.046875
3
The previous blog post illustrated how someone with malicious intent could pull off a way to compromise a system. It starts by gaining access to the system using a SQL injection. After the initial access a foothold is established. Then the position is strengthen by uploading the tools of choice. Next the privileges are...
<urn:uuid:121d271b-4e9b-43ea-8988-004cf6dd60f7>
CC-MAIN-2017-09
https://countuponsecurity.com/tag/security-hands-on-training/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00489-ip-10-171-10-108.ec2.internal.warc.gz
en
0.897607
2,215
3.0625
3
We have entered into 2016, yet cyber attacks continue to plague the world. Call it unfortunate or attribute it to the present times, security strategies need to be tightened by people all over the world. Hackers are said to have taken the meaning of risk to a different level altogether. So it will be nothing uncommon f...
<urn:uuid:f798c3ce-6540-47ed-b1f2-377626bfe49f>
CC-MAIN-2017-09
http://www.belnis.com/news/security-landscape-in-2016-cyber-attacks-to-be-watchful-about/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00081-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950897
577
2.65625
3
Congress has voted on the Environmental Protection Agency’s rules controlling greenhouse gas emissions around 10 times over the past few years, and next year the agency is wading into the most controversial parts of the rulemaking. The politically charged debates conflate facts and myths, and important points with supe...
<urn:uuid:01ae0601-6ea9-4b2b-8c26-02357b9180ff>
CC-MAIN-2017-09
http://www.nextgov.com/health/2012/12/what-you-need-know-about-epas-carbon-rules/60372/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00081-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946727
1,533
2.765625
3
Tremors generate tweets in new USGS earthquake program The Twitter Earthquake Detector could spread the word before official alerts - By Dan Campbell - Dec 21, 2009 The U.S. Geological Survey is testing the use of Twitter as a means to quickly collect and disseminate earthquake-related information. The popular social n...
<urn:uuid:8727d5f7-e4f4-4cf5-a34b-596465e688e8>
CC-MAIN-2017-09
https://gcn.com/articles/2009/12/21/usgs-earthquake-twitter-tweets.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00257-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941817
687
2.671875
3
Recent technological advances in high-voltage direct current (HVDC) transmission has led many to see it as a crucial element in an efficient, smart power system of the future, providing power corridors connecting distant supply and demand centers, with minimal energy losses. With its strong central control, China is im...
<urn:uuid:ccc65b26-6a7d-4155-859d-776ac413ce06>
CC-MAIN-2017-09
https://www.mordorintelligence.com/industry-reports/china-high-voltage-direct-current-hvdc-transmission-systems-market-industry
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00433-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952455
790
3.34375
3
Europe has spent hundreds of billions of euros rescuing its banks but may have lost an entire generation of young people in the process, the president of the European Parliament said. Since the region's debt crisis erupted in Greece in late 2009, the European Union has created complex rescue mechanisms to prop up distr...
<urn:uuid:8a0ec0da-5e79-4e46-a37d-4347a677d07b>
CC-MAIN-2017-09
http://www.banktech.com/compliance/banks-saved-but-europe-risks--losing-a-generation-/d/d-id/1296224?cid=sbx_banktech_related_slideshow_default_customers_want_it_all_balancing_simplici&itc=sbx_banktech_related_slideshow_default_customers_want_it_all_balancing_simplici
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00605-ip-10-171-10-108.ec2.internal.warc.gz
en
0.974391
599
2.515625
3
Does true literacy now include the ability to write software programs, just as it does the ability to read, write and do sums? 2012 saw a surge of sentiment in the press and blogosphere that we should think of programming as a vital cultural skill. And the year included many stories about newly emerging massive open on...
<urn:uuid:c46220dd-3b3d-4c60-884c-902dc8529c21>
CC-MAIN-2017-09
http://www.networkworld.com/article/2162381/software/2012--the-year-that-coding-became-de-rigueur.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00181-ip-10-171-10-108.ec2.internal.warc.gz
en
0.968176
880
2.859375
3
Researchers at Stanford University have made progress toward designing a battery with a lithium anode, a development that could increase battery power in electronics. Reporting in the journal Nature Nanotechnology, the researchers described how they designed a lithium-metal anode in order to boost the energy storage de...
<urn:uuid:3e98ca5a-6f84-46b1-b20c-b3b643abb885>
CC-MAIN-2017-09
http://www.cio.com/article/2459041/lithiummetal-battery-could-boost-gadget-power.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00001-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937887
411
4.0625
4
As more and more of our lives migrate online, congress, state legislatures and local governments are grappling with how to address the issues and challenges this presents. The problem is that by the nature and structure of the Internet itself, content and commerce on the Internet are virtually impossible regulate. The ...
<urn:uuid:625d2f4c-b7ec-4747-929b-bcbe303a01d9>
CC-MAIN-2017-09
http://www.govtech.com/internet/Internet-Gaming-Law-vs-Reality-2.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00353-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9746
1,032
2.578125
3
Pointer records are used to map a network interface (IP) to a host name. These are primarily used for reverse DNS. - Name: This usually represents the last octet of the IP address. - System (PTR to): This will be the value (the reverse DNS) for your host / computer within your domain. - TTL: The TTL (Time to Live) is t...
<urn:uuid:4e08806f-5730-4820-9c83-5aec78092f72>
CC-MAIN-2017-09
http://help.dnsmadeeasy.com/managed-dns/dns-record-types/ptr-record/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00529-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919286
842
2.8125
3
New and improved fast paced technologies are offering us exciting ways to live, are helping us at work, and continue pushing the boundaries of innovation and efficiency. However, along with all of the good comes the bad – the raised risk and exposure to security threats. In part one and part two of our three part serie...
<urn:uuid:826f3d7a-8c26-4fa7-85a7-e1da1f002f46>
CC-MAIN-2017-09
https://www.checkmarx.com/2017/02/13/cyber-threats-facing-apac-applications/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00053-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941375
727
2.6875
3
Jason | 5th December 2012 First off, there are a number of targets you should be aware of when filtering for @mentions of Twitter usernames: twitter.user.id - The ID of the Twitter user that sent this Tweet twitter.user.screen_name - The @username of the Twitter user that sent this Tweet twitter.mentions - An array of ...
<urn:uuid:c65c56f6-c568-443f-a80d-83db5759e77f>
CC-MAIN-2017-09
http://dev.datasift.com/blog/how-best-filter-twitter-mentions
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00049-ip-10-171-10-108.ec2.internal.warc.gz
en
0.83686
904
2.671875
3
by Gregory R.Scholz, Northrop Grumman Information Technology Wireless networks are described as both a boon to computer users as well as a security nightmare; both statements are correct. The primary purpose of this article is to describe a strong security architecture for wireless networks. Additionally, the reader sh...
<urn:uuid:038dc1a0-e1ed-40b4-a05f-e4c8728cadd4>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-14/wireless-networks.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00225-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929662
2,948
2.8125
3
Overview of Computer Architecture the topic of our study is a Stored Program Computer, also called a “von Neumann Machine”. The top–level logical architecture is as follows. Recall that the actual architecture of a real machine will be somewhat different, due to the necessity of keeping performance at an acceptable lev...
<urn:uuid:55a403f1-7262-488a-91b5-00285ce8fc3f>
CC-MAIN-2017-09
http://edwardbosworth.com/My5155_Slides/Chapter09/ComputerArchitectureOverview.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00169-ip-10-171-10-108.ec2.internal.warc.gz
en
0.896991
3,045
4.21875
4
Internet is relatively new technology but is one of the fastest in gaining popularity and in the spreading across the world. We can hardly imagine our normal daily life without internet. Sometimes we don’t even realize how much devices and services around us are actually internet equipped. But what makes all this devic...
<urn:uuid:691bb217-f6e8-462d-9c44-961b19fba0dd>
CC-MAIN-2017-09
https://howdoesinternetwork.com/tag/networking-learning
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00221-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939519
126
3.40625
3
A microcontroller is a small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals. Microcontrollers are used in automatically controlled products and devices, such as automobile engine control systems, implantable medical devices, remote controls, office...
<urn:uuid:4ad1b171-ca6e-448b-97d0-96f1acd20649>
CC-MAIN-2017-09
http://www.micromarketmonitor.com/market-report/microcontroller-reports-8883152037.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00041-ip-10-171-10-108.ec2.internal.warc.gz
en
0.884121
653
2.65625
3
It's been a couple of years and a couple of million dollars. Finally, researchers and graduate students who have spent years developing intelligent water sensors released them into the Sacramento River on Wednesday, about 80 miles east of San Francisco. That area of the river is a mixture of salt water from the nearby ...
<urn:uuid:8bb10124-3c7a-4303-b0d1-6843ce02e405>
CC-MAIN-2017-09
http://www.itworld.com/article/2726620/networking/uc-berkeley-tests-floating-robot-sensors-to-track-water-flow--environmental-concerns.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00393-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954316
248
3.484375
3
Dilts T.E.,University of Nevada, Reno | Weisberg P.J.,University of Nevada, Reno | Yang J.,University of Nevada, Reno | Olson T.J.,University of Nevada, Reno | And 2 more authors. Annals of the Association of American Geographers | Year: 2012 In arid regions of the world, the conversion of native vegetation to agricult...
<urn:uuid:c2ce9c1c-81c4-4dc6-9790-7d9befdb4de2>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/100-valley-road-51929/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00569-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913351
1,943
2.765625
3
Data center water usage and conservation is a critical aspect of green building design and environmental sustainability. Most data centers use large amounts of water for cooling purposes in order to maintain an ideal operating temperature for servers, hardware and equipment. But how do water conservation efforts affect...
<urn:uuid:6141a486-9f8c-49fe-9951-64f09cadebdb>
CC-MAIN-2017-09
http://www.internap.com/2014/07/11/data-center-water-conservation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00445-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917089
601
3.59375
4
Boeing, NASA, Lockheed Martin and GE are among the large corporations that for decades have used additive manufacturing, known more popularly as 3-D printing. Additive manufacturing is also used prominently in the medical and dental industries -- about 80,000 hip implants have been made to date using 3-D printers, and ...
<urn:uuid:f9109bdb-d527-48a1-852d-9f0a665e2fb1>
CC-MAIN-2017-09
http://www.itworld.com/article/2705724/it-management/3-d-printing-comes-of-age.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00445-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954589
627
2.859375
3
One of the best things about covering technology is that you're always on the edge of a completely new generation of stuff that will make everything completely different than it ever was before, even before the last generation made everything different. "Completely different" always seems pretty much the same, with a f...
<urn:uuid:5a5d1588-7a1e-4761-afe6-64aba0b09cc8>
CC-MAIN-2017-09
http://www.itworld.com/article/2736618/development/breakthroughs-bring-the-next-two-major-leaps-in-computing-power-into-sight.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00390-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952701
969
3.171875
3
Earthquakes are something to tweet about USGS's Twitter Earthquake Detector helps monitor quakes in real time - By Henry Kenyon - Jul 16, 2010 Agency: U.S. Geological Survey Project: Twitter Earthquake Detector Social media has a variety of uses that appeal to the federal government, and one such area is disaster respo...
<urn:uuid:43d6c2cd-f86d-490a-8eb9-c92e13b39c01>
CC-MAIN-2017-09
https://fcw.com/articles/2010/07/19/web-app-usgs-twitter.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00566-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941129
524
2.59375
3
Facebook has released a programming language called Hack, which marries the ease of PHP with the rigorous safety controls of older languages such as C++. PHP programmers should easily understand Hack, which replicates many of the same features and functions of PHP, and adds a few of its own for greater productivity, sa...
<urn:uuid:cc604eb3-79c3-4b44-a2c9-72ad906b2a33>
CC-MAIN-2017-09
http://www.networkworld.com/article/2176311/application-performance-management/facebook--39-s-hack-programming-language-builds-code-safety-into-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00090-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952391
715
2.859375
3
The Mask Raises Network Security Worries in an Age of Cyberwarfare What if your network was compromised for the past five years and you didn't know? That seems to have been the situation for many victims of one of the greatest security threat to have been recently discovered. On February 11, Kaspersky Labs announced it...
<urn:uuid:eb9a6f82-36bc-4969-8cc4-45ccf0dd2ba2>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsecur/the-mask-raises-network-security-worries-in-an-age-of-cyberwarfare.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00442-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946882
1,158
2.703125
3