text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
The idea behind "Born to Die" electronics is that mist gadgets now have pitifully short lives. Tech products such as cell phones and pads now have useful lives measured in months and the result is landfills and recycling facilities overwhelmed with electronic gadgets that need to be broken down and safely disposed of.
... | <urn:uuid:aadbc4e1-196f-4205-8d16-5f9351be47e0> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2224970/infrastructure-management/electronics-that-will-be--born-to-die-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00618-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964247 | 198 | 3.171875 | 3 |
Windows Safe Mode is a way of booting up your Windows operating system in order to run administrative and diagnostic tasks on your installation. When you boot into Safe Mode the operating system only loads the bare minimum of software that is required for the operating system to work. This mode of operating is designed... | <urn:uuid:f70be1be-083e-4b6e-92ba-832c7eaccb54> | CC-MAIN-2017-09 | https://www.bleepingcomputer.com/tutorials/popular/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00618-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953139 | 1,020 | 2.796875 | 3 |
Making Clouds Secure
The concept of Cloud Computing — what just about every IT community is dreaming about these days — has a multitude of indisputable advantages over more traditional modes of software distribution and usage. But Cloud Computing has a long way to go before it takes over the market — not in terms of te... | <urn:uuid:38060fdb-ca58-4222-8f95-01f8277a3081> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/datacenter/datacenter-blog/making-clouds-secure?page=3 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00562-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945373 | 2,873 | 2.875 | 3 |
Carl Manion is a managing principal of Raytheon Foreground Security.
Targeted attack campaigns by advanced cyber adversaries have become a mainstay that most—if not all—organizations now need to be concerned about. This type of threat may stay hidden on your network, undetected for long periods of time, laterally movin... | <urn:uuid:ddce13cb-e998-4c6f-b76f-23ebbc0196e4> | CC-MAIN-2017-09 | http://www.nextgov.com/technology-news/tech-insider/2017/01/4-skills-every-threat-hunter-should-have/134186/?oref=ng-featured | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00562-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947349 | 746 | 2.53125 | 3 |
It did not light up the sky like real aurora borealis can but researchers with the U.S. Naval Research Laboratory said they have created an artificial version that can be used to explore ionospheric occurrences and their impact on communications, navigation and space weather.
Specifically what the researchers did was p... | <urn:uuid:86ec5a96-0c70-4e99-8aed-b9d2e013765c> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2224187/data-center/artificial-aurora-lights-up-arctic-skies.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00086-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946484 | 407 | 3.625 | 4 |
Researchers have uncovered an extremely critical vulnerability in recent versions of OpenSSL, a technology that allows millions of Web sites to encrypt communications with visitors. Complicating matters further is the release of a simple exploit that can be used to steal usernames and passwords from vulnerable sites, a... | <urn:uuid:7241bbaa-e69a-4b3d-b2b5-5838e5e75fdd> | CC-MAIN-2017-09 | https://krebsonsecurity.com/tag/yahoo-com/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00262-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928089 | 573 | 2.609375 | 3 |
Emerging protocol can help manage the Internet of Things
- By Kevin McCaney
- May 01, 2013
The ever-expanding networks of sensors and other machine-to-machine devices on the “Internet of Things” are creating huge stores of data for everything from traffic and weather monitoring to health care and finance.
And there wil... | <urn:uuid:2f3bd4d6-1b5d-4fc2-9a2d-a04422494cf9> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/05/01/emerging-protocol-manage-internet-of-things.aspx?admgarea=TC_EmergingTech | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00614-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942084 | 644 | 2.53125 | 3 |
Kids' parties sometimes have entertainers geared at doing all sorts to keep children occupied: magic tricks, juggling and so on. I don't know about you, but I'd much rather have this awesome Japanese robot doing the entertainment at parties than the typical human act.
The folks over at Chinba University demonstrated ho... | <urn:uuid:1ad1419c-a9c3-4054-b222-5599e62fd6c7> | CC-MAIN-2017-09 | http://www.itworld.com/article/2726798/it-management/juggling-robot-does-tricks--is-cooler-than-your-typical-clown.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00490-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942719 | 428 | 2.546875 | 3 |
Hackers have targeted politicians, journalists and activists using the 'legal' spyware tool, Galileo, with previously undiscovered mobile trojans that work on Android and iOS.
Kaspersky Lab has published a new research report mapping the presence of a large global infrastructure used to control 'Remote Control System' ... | <urn:uuid:801f41be-883e-4b25-a6d0-5c0fb3298941> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2367525/politicians-and-journalists-hacked-using-legal-spyware-tool-galileo.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00610-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947063 | 768 | 2.53125 | 3 |
Corporations and government are using information about us in a new – and newly insidious – way. Employing massive data files, much of the information taken from the Internet, they profile us, predict our good or bad character, credit worthiness, behavior, tastes, and spending habits – and take actions accordingly.
As ... | <urn:uuid:93588a76-01eb-468b-a62a-e44c22296fb8> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2014/02/commentary-welcome-algorithmic-prison/79196/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00134-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953626 | 1,534 | 2.53125 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:ca306da6-d9b2-416b-9184-ae70b51733d6> | CC-MAIN-2017-09 | https://docs.com/jefferson-castro-1/6529/trabajo-de-ingles-06-octubre-traducido | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00134-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94859 | 3,942 | 2.96875 | 3 |
While the world's attention was recently focused on the Syrian crisis and the alleged use of chemical weapons, cyber-criminals were taking advantage of the situation. News seekers, eager to learn about the latest developments, the possibility of a U.S. strike and the diplomatic efforts to end the civil war, became easy... | <urn:uuid:a2ea9fd2-dedf-415a-9d42-a3fe5af7e4a5> | CC-MAIN-2017-09 | http://www.banktech.com/how-breaking-news-is-used-to-plant-malware/a/d-id/1296754?cid=sbx_banktech_related_commentary_default_us_sec_chairman_mary_schapiro_to_step_do&itc=sbx_banktech_related_commentary_default_us_sec_chairman_mary_schapiro_to_step_do | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00006-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934633 | 834 | 2.625 | 3 |
The "learn to code" movement is ramping up in full force this week, Computer Science Education Week, with major tech companies and celebrities supporting Code.org in its "Hour of Code" mission to get students of all ages to learn programming. If you'd like some free hands-on training, Apple will help you this Wednesday... | <urn:uuid:616ca48c-c1fd-4fa0-b617-af8fea62a332> | CC-MAIN-2017-09 | http://www.itworld.com/article/2703539/consumerization/learn-to-code-for-free-at-an-apple-store-this-week.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00006-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941677 | 342 | 2.9375 | 3 |
Defining the Issue
Defining the Issue
Consumers around the world continue to turn to mobile devices for voice, data, and Internet access. At the same time, demand continues to grow for technologies relying on wireless fixed use, also known as â€Å“transportâ€ï¿½ links or, in emerging markets, as access connections. The ... | <urn:uuid:78e29843-7a4c-49b4-8d3e-800eece68c98> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/government-affairs/government-policy-issues/wireless-spectrum.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00182-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916254 | 578 | 2.59375 | 3 |
That's right, March 14 is international Pi Day. Get it -- pi is 3.14, and March 14 is 3/14?
Most everyone knows pi -- the ratio of the circumference of a circle to its diameter. But how much do you really know about this magical number? Below are 28 fun facts about pi split up into tidy categories. Enjoy!
[ MORE PI DAY... | <urn:uuid:763af512-9530-4ce6-972b-bc752268f75a> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2164391/data-center/data-center-28-facts-about-pi-that-you-probably-didn-t-know.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00478-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920689 | 1,031 | 2.96875 | 3 |
What if researchers could access and share scientific simulation and modeling tools as easily as YouTube videos with the power of the cloud to drive it all? That’s the underlying premise for the HUBzero Platform for Scientific Collaboration, a cyberinfrastructure developed at Purdue University.
HUBzero was created to s... | <urn:uuid:2cf2cce3-dc2e-4456-b589-3552e242d398> | CC-MAIN-2017-09 | https://www.hpcwire.com/2011/02/28/hubzero_paving_the_way_for_the_third_pillar_of_science/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00354-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921674 | 2,327 | 2.796875 | 3 |
Sometimes, when a network is breached, when servers are compromised, or when unencrypted data is at risk, companies will get, or even seek, assistance from government offices. The nature of cybercrime points to the ways in which our digital architectures are interconnected – over the Internet, but also in terms of how ... | <urn:uuid:5e0de4e4-fdfb-4847-8433-72e42269edc7> | CC-MAIN-2017-09 | http://www.csoonline.com/article/3156464/security/cybercrime-not-an-act-of-war.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00530-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953676 | 748 | 2.59375 | 3 |
Concerns about the safety of cellular telephones-whether they create health risks or are safe to use in all operating environments-have spread to other wireless devices, such as the wireless networking equipment (WLANs)* manufactured by Cisco Systems
® and Linksys
®. These issues are of concern not only to Cisco custom... | <urn:uuid:e7f546fb-1df8-468c-ad30-7c8af1396868> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1200-access-point/prod_white_paper09186a0080088791.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00054-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933209 | 1,574 | 2.75 | 3 |
Statistics sometimes get a bad rap, as being somehow divorced from the real world of complex events and relationships. But in several notable cases, statistics helped provide a useful view of seemingly diverse and sporadic events.
Back in the 1980s for example Jack Maple, a cop in New York City's subways, got tired of ... | <urn:uuid:53bee30f-805d-4f59-86c6-9e899d6b515a> | CC-MAIN-2017-09 | http://www.govtech.com/health/South-Carolina-Builds-Enterprise-Social-Services.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968644 | 1,621 | 2.578125 | 3 |
This type of virus infects the Master Boot Record or DOS Boot Record of a hard drive, or the Floppy Boot Record of a floppy drive.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & rem... | <urn:uuid:7ad87887-e6f4-4a1a-9ac7-1c82d285c227> | CC-MAIN-2017-09 | https://www.f-secure.com/v-descs/boovirus.shtml | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.909069 | 621 | 2.953125 | 3 |
Google Captcha Dumps Distorted Text ImagesTired of reading those wavy words? Changes to Google's reCaptcha system -- which doubles as quality control for its book and newspaper scanning projects -- prioritize bot-busting puzzles based on numbers.
9 Android Apps To Improve Security, Privacy (click image for larger view)... | <urn:uuid:14152d75-9af4-4f67-806c-c47dc9db708c> | CC-MAIN-2017-09 | http://www.darkreading.com/attacks-and-breaches/google-captcha-dumps-distorted-text-images/d/d-id/1112111?cid=sbx_bigdata_related_slideshow_vulnerabilities_and_threats_big_data&itc=sbx_bigdata_related_slideshow_vulnerabilities_and_threats_big_data | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00350-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951296 | 1,171 | 2.71875 | 3 |
Education isn't a one-size-fits-all endeavor. Nowhere is that more true than in New York City's schools, which educate more than one million students who among them speak more than 800 languages.
One of the ways the city is working to meet the challenge of effectively educating such a diverse population is through Scho... | <urn:uuid:ce8d0da1-d5ae-469a-92f1-4a324b75e7e9> | CC-MAIN-2017-09 | http://www.govtech.com/education/How-New-York-City-Uses-Technology-to-Teach-Math-One-on-One.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00050-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970339 | 629 | 2.84375 | 3 |
It’s no secret there is a pronounced gender gap in technology fields. In 2014, 70 percent of the employees at the top tech companies in Silicon Valley, such as Google, Facebook and Twitter, were male. In technical roles, this phenomenon is even more pronounced; for example, only 10 percent of the technical workforce at... | <urn:uuid:42850cd2-5ea6-4a23-86eb-c0fa821fb8cd> | CC-MAIN-2017-09 | http://m.nextgov.com/cio-briefing/wired-workplace/2017/02/silicon-valleys-gender-gap-result-computer-game-marketing-20-years-ago/135494/?oref=m-ng-river | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00226-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.975635 | 1,344 | 3 | 3 |
Cisco Basics – User Exec Mode
In preparation of your CCNA exam, we want to make sure we cover the various concepts that we could see on your Cisco CCNA exam. So to assist you, below we will discuss the CCNA concept of Entering a Cisco Router's User Mode. As you progress through your CCNA exam studies, I am sure with re... | <urn:uuid:d2b70b2d-86f0-489c-bff2-9e87a8fdd2b9> | CC-MAIN-2017-09 | https://www.certificationkits.com/cisco-router-user-mode/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00402-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918175 | 908 | 2.546875 | 3 |
While it may seem counterintuitive for hackers to attack small- and mid-sized companies, it’s not just big companies who are at risk from cybercriminals. Cyberattacks on small- and medium-sized companies have been on the increase since 2004; in fact, up to 85 percent of the targets for cyber-related crimes are small- a... | <urn:uuid:64aeffbc-dc56-4a97-9551-bf4d2ee8024a> | CC-MAIN-2017-09 | https://www.apex.com/small-mid-sized-businesses-risk-cyberattacks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00398-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946292 | 538 | 2.671875 | 3 |
Table of Contents
Windows 8 comes with a new user interface called the Windows Start Screen that is the first thing you see when you login to Windows 8. This is the main interface that Windows 8 user's use to launch applications, search for files, and browse the web. This Start screen contain tiles that represent diffe... | <urn:uuid:5460eae8-9784-49df-b3d4-c5229e51408d> | CC-MAIN-2017-09 | https://www.bleepingcomputer.com/tutorials/how-to-use-windows-8-start-screen/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00574-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920831 | 1,954 | 2.8125 | 3 |
Exploring the deep web
Internal and external federated systems lead users to treasures that regular search engines can't find
GCN Illustration by Sam Votsis
For the past decade, the Energy Department's Office of Scientific and Technical Information in Oak Ridge, Tenn., has been using the Internet to speed research proc... | <urn:uuid:5d4ded06-bcbe-4e4d-b04f-b1669c51efba> | CC-MAIN-2017-09 | https://gcn.com/articles/2007/06/02/exploring-the-deep-web.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00518-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915631 | 1,703 | 2.78125 | 3 |
Up To: Contents
See Also: State Types
Nagios supports optional detection of hosts and services that are "flapping". Flapping occurs when a service or host changes state too frequently, resulting in a storm of problem and recovery notifications. Flapping can be indicative of configuration problems (i.e. thresholds set t... | <urn:uuid:5514c7e3-fcbc-46e1-b21d-1c52d537ab87> | CC-MAIN-2017-09 | https://assets.nagios.com/downloads/nagioscore/docs/nagioscore/3/en/flapping.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00394-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917473 | 1,377 | 2.578125 | 3 |
With private-sector backing, California’s state government and the state’s flagship public university are teaming up to develop an intelligent transportation solution that will help drivers avoid congested traffic.
The California Department of Transportation (Caltrans), the University of California, Berkeley’s Californ... | <urn:uuid:85885a03-7bf7-4697-b48a-654110cdd30d> | CC-MAIN-2017-09 | http://www.govtech.com/innovationnation/California-Traffic-Jams.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00446-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935814 | 404 | 2.75 | 3 |
Are we facing an internet of too many things?
Much of the buzz in the tech world at the moment surrounds the internet of things, the idea that every piece of electronic kit might one day be connected via the web.
There are plenty of benefits from this but it also presents a number of challenges. Home automation special... | <urn:uuid:7eed2c48-e47f-443a-a74d-946e3f236543> | CC-MAIN-2017-09 | https://betanews.com/2014/04/23/are-we-facing-an-internet-of-too-many-things/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00446-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956712 | 220 | 2.734375 | 3 |
With the proliferation of smart phones, tablets, notebooks and various other electronic devices in our everyday work and personal lives comes another thing -- e-waste.
The average person replaces his or her mobile phone every 18 months, and in the U.S. alone, more than 130 million mobile phones are discarded each year ... | <urn:uuid:7cab8528-e356-4cf2-936c-56910d9c524b> | CC-MAIN-2017-09 | http://www.govtech.com/infographics/E-Waste-and-Us-17000-Tons-Trashed-Each-Year-Infographic.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00263-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956643 | 154 | 3.171875 | 3 |
According to NEC(National Electrical Code), there are three types of sections of a building’s inside area: plenums, risers and general purpose areas. As the higher and higher demands of the building network safety, types of fiber cables are not limited to the general types. Nowadays, some particular materials are used ... | <urn:uuid:ff75b9d2-af40-4205-9f5f-4829e57030ca> | CC-MAIN-2017-09 | http://www.fs.com/blog/fiberstores-plenumofnp-fiber-cables-a-low-cost-option-for-your-network-deployments.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00083-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929741 | 647 | 3.171875 | 3 |
Residents in Miami-Dade County, Fla., will have a new Web tool at their disposal in the event Hurricane Irene comes ashore on the Eastern Seaboard later this week.
The new tool, called the Storm Surge Simulator, allows users to calculate storm surge levels in Miami-Dade’s three evacuation zones based on location and hu... | <urn:uuid:aa12dcd3-af1d-49fa-b733-69bec3012491> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/Hurricane-Storm-Surge-Calculated-Web-Tool.html?elq=426ac008a9af4cbc9e841569a6bb7941 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00435-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934563 | 685 | 2.671875 | 3 |
The White House on Tuesday welcomed some of America’s most innovative students for the fourth-ever White House Science Fair, which this year emphasized the specific contributions of girls and young women who are excelling in science, technology, engineering and math.
Among those highlighted at the conference was Elana ... | <urn:uuid:58fac8a6-1147-443a-8e7f-01346c5430ec> | CC-MAIN-2017-09 | http://www.nextgov.com/cio-briefing/wired-workplace/2014/05/white-house-spotlights-contributions-girls-stem/85234/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00435-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960108 | 617 | 2.84375 | 3 |
All 30 users on a single floor of a building are complaining about network slowness. Afterinvestigating the access switch, the network administrator notices that the MAC address table isfull (10,000 entries) and all traffic is being flooded out of every port. Which action can theadministrator […]
A network printer has ... | <urn:uuid:bc354545-4ea5-47c0-88aa-3811cce8e1ae> | CC-MAIN-2017-09 | http://www.aiotestking.com/cisco/category/exam-300-206-implementing-cisco-edge-network-security-solutions/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00487-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923742 | 258 | 2.578125 | 3 |
Programming Cars to KillBy Samuel Greengard | Posted 2016-03-28 Email Print
What happens when a mechanical part fails or there's a landslide, and a self-driving car must choose between saving its passenger or a motorist in another car?
The MIT Technology Review recently presented a story titled "Why Self-Driving Cars M... | <urn:uuid:c8fe4bd9-ac01-44a7-b2ee-6fe15439c86b> | CC-MAIN-2017-09 | http://www.baselinemag.com/blogs/programming-cars-to-kill.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00607-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959581 | 574 | 2.96875 | 3 |
In search of better flu forecasting
The Centers for Disease Control and Prevention recently released its weekly flu forecasts for the 2016-2017 season on FluSight, a beta website housing influenza activity forecasts provided by 21 research teams.
The research initiative was begun by the CDC in 2013. "Predict the Influe... | <urn:uuid:cec4408d-2291-4b56-8447-f2e256e60f0c> | CC-MAIN-2017-09 | https://gcn.com/articles/2016/12/21/cdc-flu-predictions.aspx?admgarea=TC_EmergingTech | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00007-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957524 | 670 | 2.765625 | 3 |
Understanding what makes an SSD different than an HDD is vital for any VAR hoping to sell SSDs to their clients. So here is a short breakdown of what makes SSDs different – and better.
How they work: A SSD is basically a package of memory chips; typically the same ones as are used in common flash memory cards. This mea... | <urn:uuid:a76e9c3e-a8f2-4f71-b7d6-3b9f5b773fb6> | CC-MAIN-2017-09 | http://www.ingrammicroadvisor.com/components/a-simple-ssd-comparison-to-hdd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00003-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956378 | 799 | 3.15625 | 3 |
Last week I wrote about Apple’s new default encryption policy for iOS 8. Since that piece was intended for general audiences I mostly avoided technical detail. But since some folks (and apparently the Washington Post!) are still wondering about the nitty-gritty details of Apple’s design, I thought it might be helpful t... | <urn:uuid:95ea2cf0-bc25-4582-8134-280f5d5c1153> | CC-MAIN-2017-09 | https://blog.cryptographyengineering.com/2014/10/04/why-cant-apple-decrypt-your-iphone/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00475-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944584 | 1,973 | 2.546875 | 3 |
Accurately modeling the flow of shockwaves across a fluid body can be a difficult thing to do. Attempts to address the problem by dialing up the computational accuracy of the models can actually make it worse. Now, researchers at the A*STAR Institute of High Performance Computing (IHPC) have come up with an innovative ... | <urn:uuid:40eebec6-6206-48cd-a123-0ff6ce51fb9e> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/08/08/singapore_researchers_build_a_better_shockwave_model/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00651-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936964 | 569 | 2.953125 | 3 |
Iceland's National Energy Authority has created the world's first magma-based geothermal energy system after drilling 1.3 miles (2,100 meters) through the Earth's crust.
It is only the second time that a drilling operation has broken through to the mantle, the next layer after the Earth's crust, the group said. It is t... | <urn:uuid:6c3099c8-acfe-414b-8e50-a1d602336c03> | CC-MAIN-2017-09 | http://www.cio.com/article/2379058/energy/iceland-taps-the-ultimate-renewable-energy-source--earth-s-magma.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00527-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960442 | 1,123 | 3.21875 | 3 |
(TNS) - The critical document that determines how much space should be left in Lake Oroville for flood control during the rainy season hasn’t been updated since 1970, and it uses climatological data and runoff projections so old they don’t account for two of the biggest floods ever to strike the region.
Independent exp... | <urn:uuid:ca4d91c5-48f0-43d0-89ba-a1edb7beb215> | CC-MAIN-2017-09 | http://www.govtech.com/em/disaster/Oroville-Dams-flood-control-manual-hasnt-been-updated-for-half-a-century.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00527-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953745 | 1,540 | 2.6875 | 3 |
This series starts with an overview of wireless's most often-overlooked but fundamental elements: the properties of RF and waves.
RF and Waves Wireless networking is an RF (radio frequency) technology. Air is the vehicle through which the data is carried, just as Ethernet uses copper cables. WLAN frequency ranges are i... | <urn:uuid:e88967ab-c9f1-4b0f-bac6-4d3e3befad91> | CC-MAIN-2017-09 | http://www.networkcomputing.com/networking/wireless-beginners-part-1-rf-and-waves/1640728721?cid=sbx_nwc_related_mostpopular_default_next_gen_network_tech_center&itc=sbx_nwc_related_mostpopular_default_next_gen_network_tech_center&piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00051-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94944 | 772 | 3.859375 | 4 |
Mobile communications have come a long way. Citrix Systems including XenMobile and many features such as TCP Westwood and SPDY integrated into NetScaler have played a big role. Nevertheless there is one source of irritation that causes angst among mobile clients as they roam about their day.
Standard TCP connections ar... | <urn:uuid:ff52fe57-ae2d-457c-b07f-5361b27665d4> | CC-MAIN-2017-09 | https://www.citrix.com/blogs/2013/05/28/maximize-mobile-user-experience-with-netscaler-multipath-tcp/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00051-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924073 | 744 | 3.0625 | 3 |
Just about the time you thought you were getting a grip on computer networking -- or were at least clinging to it by your fingernails -- there's another 14-wheeler racing toward you on the information superhighway. Electronic commerce and digital signatures will become central issues in public access to government in t... | <urn:uuid:7a2ef5fd-65a9-4f36-b463-128b99125909> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/100556254.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00575-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9421 | 959 | 3.1875 | 3 |
What makes people healthy?
That's a question researchers at Google X, along with scientists at Duke University and Stanford University, are looking to answer.
Google has launched a new project, dubbed the Baseline Study, that seeks to develop a greater understanding of what it means to be healthy.
"Most research studie... | <urn:uuid:ae984d9e-1d93-4ada-af25-d9ecf611032e> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2490451/healthcare-it/google-s-next-frontier--what-it-means-to-be-healthy.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00219-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959071 | 811 | 3.5625 | 4 |
As people’s constant pursuit of enjoyment of life, nowadays most consumer electronics are applied HDMI(High-Definition Multimedia Interface) for multimedia data transmission, such as the digital televisions, Blu-ray player, PC, laptop and smart phone with a variety of devices to the HDMI adopted. Although the HDMI tech... | <urn:uuid:b24ab87a-8a54-46f1-ab60-b151f6c99119> | CC-MAIN-2017-09 | http://www.fs.com/blog/introduction-to-hdmi-video-optic-transmission-system.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00219-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.884147 | 574 | 3 | 3 |
Emergency managers know that having a foolproof disaster communications plan is nothing more than a fantasy. That's because even the most redundant backup strategies can leave responders unable to communicate. Consequently agencies remain focused on providing diversified options for communications.
Why? If a disaster h... | <urn:uuid:e758aa25-e8a3-4658-aa79-d027b0b1fa75> | CC-MAIN-2017-09 | http://www.govtech.com/featured/99853319.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00447-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942908 | 1,684 | 2.703125 | 3 |
Question 2) A+ Operating Systems Technologies
This post is outdated. For an updated guide see Jed Reisner’s A+ 220-801 and 220-802 guide.
SubObjective: Identify the names, locations, purposes, and contents of major system files
Single Answer Multiple Choice
Which file loads the Windows 98 graphical user interface (GUI)... | <urn:uuid:8061a436-8673-4616-aa97-cd42967d4e00> | CC-MAIN-2017-09 | http://certmag.com/question-2-test-yourself-on-a-operating-systems-technologies-2003-objectives/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00040-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.762814 | 280 | 2.65625 | 3 |
How to manage the security of network services according to ISO 27001 A.13.1.2
Everybody knows that information is stored in information systems (workstations, laptops, smartphones, etc.), but to exchange the information via a network is necessary.
Most of the information systems in this world are connected to the same... | <urn:uuid:e35f402a-1013-4404-891f-9e9504498f21> | CC-MAIN-2017-09 | https://advisera.com/27001academy/blog/2017/02/13/how-to-manage-the-security-of-network-services-according-to-iso-27001-a-13-1-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00040-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934989 | 1,274 | 3.0625 | 3 |
Data center networking topology has improved significantly for a few years. With the developments of high speed switching device and multilayer network architecture, we have more powerful data centers with low latency, scalability and higher bandwidth. But due to the exponential increase of internet traffic and emergin... | <urn:uuid:fc10d993-0a6f-4dd0-81c1-6565e8728d03> | CC-MAIN-2017-09 | http://www.fs.com/blog/deploying-hybrid-electrical-and-optical-network-to-achieve-big-data-transfer.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00216-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.908771 | 876 | 2.671875 | 3 |
Tip: Prompt magic
Enhancing the system prompt
As Linux/UNIX people, we spend a lot of time working in the shell, and in many cases, this is what we have staring back at us:
If you happen to be root, you're entitled to the "prestige" version of this beautiful prompt:
These prompts are not exactly pretty. It's no wonder ... | <urn:uuid:e461c253-c6f8-482a-b143-7b26abfb3343> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/library/l-tip-prompt/index.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00568-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.894035 | 2,256 | 2.515625 | 3 |
The popular Apple iPad is certainly no supercomputer by today’s standards, but if you could transport one back in time 25 years, it would be one of the fastest machines on the planet. According to a recent article by John Markoff of the New York Times, the performance of today’s iPad 2 would rival that of a 1985-era Cr... | <urn:uuid:e7f6697f-e78d-442c-9c4b-abc8d1eba691> | CC-MAIN-2017-09 | https://www.hpcwire.com/2011/05/10/apples_ipad_gets_a_linpack_workout/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00444-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95677 | 471 | 2.890625 | 3 |
An American and a Frenchman have won the 2012 Nobel Prize for Physics for their work on quantum optics, which could one day lead to faster computer processors, better telecommunications or more accurate timepieces.
Prize winners David Wineland of the University of Colorado Boulder and Serge Haroche of the CollA"ge de F... | <urn:uuid:07d5eb57-2c5a-4e70-95ac-aa8c28c9be1f> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2492145/high-performance-computing/quantum-computing-pioneers-from-u-s---france-win-2012-nobel-prize.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00564-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959849 | 691 | 2.6875 | 3 |
Data centers are the backbone of today’s digital economy, and yet far too many are vulnerable to advanced attacks. Despite $13 billion spent every year to secure them,* attackers are compromising data centers in a flood of cyber assaults.
In many breaches, compromised data centers are used in attacks against new target... | <urn:uuid:eeaaa04f-2d95-4963-8288-8be5e4b1cc90> | CC-MAIN-2017-09 | https://www2.fireeye.com/wp-data-center-security.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00564-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944572 | 269 | 2.515625 | 3 |
Ah, Mondays. Wonder why your employees are all yawning and glassy-eyed today? It may be easy to blame it on the hot weather or overindulgences over the weekend, but researchers are pointing fingers at another potential culprit that is increasingly interfering with our ability to get a good night's sleep: Smartphones an... | <urn:uuid:1f43bf0e-2a49-4cb5-bfa1-7fc2d668ac39> | CC-MAIN-2017-09 | http://www.cio.com/article/2384426/it-strategy/tablets-in-bed-are-damaging-sleep-and-killing-productivity.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00440-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958599 | 679 | 2.515625 | 3 |
NWS poised for flood season with sharper tools for mapping risk
- By Patrick Marshall
- Mar 06, 2014
Record snowfalls this winter mean government weather forecasters will be looking for signs of heavier melt – and potential flooding – as spring nears.
The National Weather Service has a number of tools to help gauge the... | <urn:uuid:b05851e6-a417-40e9-bf42-3353379fc82f> | CC-MAIN-2017-09 | https://gcn.com/articles/2014/03/06/national-weather-service-maps.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00616-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958793 | 595 | 2.8125 | 3 |
We can protect our voice network with simple Auxiliary VLAN but sometimes to be more secure Auxiliary VLAN are not enough. In this case we can use Security appliances such firewalls or VPN termination devices or both.
Firewall maybe seems like very clean and simple mechanism to protect RTP protocols transmitted voice p... | <urn:uuid:08188123-566f-45cc-8c7c-c08869e0e902> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2012/protecting-voip-appliances | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00616-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923865 | 737 | 2.859375 | 3 |
Manufacturing Breakthrough Blog
Friday April 29, 2016
In my last post we completed our series of posts on variation by discussing the basics of a Queuing System, two very important “laws of variability” and finally, a ten point summary of primary points, principles, and conclusions relative to understanding variability... | <urn:uuid:2d1a24e7-9439-4774-ab3e-b112a91bce93> | CC-MAIN-2017-09 | http://manufacturing.ecisolutions.com/blog/posts/2016/april/paths-of-variation-part-1.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00140-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958675 | 1,016 | 2.65625 | 3 |
What's the Role of SDN and UC?
Software-Defined Networks promise a more modern approach to allocating network resources for real-time traffic
Maybe the only technology that has received more recent hype than WebRTC is Software Defined Networking. SDN represents the latest evolution of an approach that first reared its ... | <urn:uuid:bf1856f3-4699-4e1b-8e61-23f4c96aeabf> | CC-MAIN-2017-09 | http://www.nojitter.com/post/240158913/whats-the-role-of-sdn-and-uc?google_editors_picks=true | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00492-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94374 | 871 | 2.75 | 3 |
Linux Tools for Your Desktop
Though Microsoft Windows still leads all other desktops by a comfortable margin, the market share for Linux continues to go no place but up. In the wake of recent decisions by system vendors as different as Dell and IBM to offer desktop-ready PCs with Linux installed and widespread adoption... | <urn:uuid:c1bbf534-df2f-4c30-8e6b-dc2ace95133d> | CC-MAIN-2017-09 | http://certmag.com/linux-tools-for-your-desktop/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00436-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.914678 | 1,216 | 2.640625 | 3 |
In my last article (http://news.tgc.com/msgget.jsp?mid=339671), I demonstrated how 1 + 1 can be equal to 1 by using a simple program of two instructions: I1 and I2 executing on two processors at the same time and simultaneous completing in about 1 clock tick. I concluded by posing the question: “can we do better?” In o... | <urn:uuid:5d2b0670-4e60-476f-993d-a160945b4ac4> | CC-MAIN-2017-09 | https://www.hpcwire.com/2005/02/24/amdahl_s_law_1_1_1-1/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00612-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919959 | 860 | 3.1875 | 3 |
In this post I'll go through the basics for "stochastic use case testing". It is sometimes called also "Markov chaining" or "Markov testing". There are variations of this technique, of course, but my aim here is to cover the common ground and share some thoughts on where methods like this are best applied.
Here (on the... | <urn:uuid:062c4d91-2d1b-4173-93c4-9f35c7329f30> | CC-MAIN-2017-09 | https://www.conformiq.com/2012/08/understanding-stochastic-use-case-testing-and-markov-chaining/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00312-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942513 | 1,502 | 2.75 | 3 |
Despite all the news coverage about successful cyberattacks, developers are still writing code full of security vulnerabilities.
Of course, nobody is perfect. We all make mistakes, and as software projects get more and more complex, it can be easy to mix potential problems.
But that doesn't explain why so much software... | <urn:uuid:a0bf80da-5ac8-46f9-b361-f75ff5141df4> | CC-MAIN-2017-09 | http://www.itnews.com/article/3136264/software/why-dont-developers-have-a-spellchecker-for-security.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00488-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969977 | 2,117 | 2.53125 | 3 |
Networking 101: Understanding Multicast Routing
Multicast has become a buzzword more than once in history. IP multicast means that one sender is sending data to multiple recipients, but only sending a single copy. It's very useful for streaming media, so let's explore how this works.
Much like broadcast, there are spec... | <urn:uuid:fed0c059-5d2f-40c0-9bbd-9d6806cef0e8> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsp/article.php/3623181/Networking-101--Understanding-Multicast-Routing.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00608-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940729 | 1,419 | 3.890625 | 4 |
Many of us are lucky to live in a place where, for most people, the first two levels of Maslow’s Hierarchy of Needs are met. These consist of physiological needs, such as food and water, and safety needs, e.g., physical, economic, and health. These needs are usually met through personal resources or help from the gover... | <urn:uuid:14010e34-9710-41fa-bff8-cc3e673d737f> | CC-MAIN-2017-09 | http://www.itworld.com/article/2719734/mobile/for-some-with-disabilities--gaming-fills-a-basic-need.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00132-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.97223 | 833 | 2.78125 | 3 |
Fortunately, two browser-side mechanisms have been introduced to mitigate or limit the impact from externally-included resources: Subresource Integrity and sandboxing.
Subresource Integrity (SRI) allows developers to pin down certain versions of scripts or stylesheets which are included from external domains. The goal ... | <urn:uuid:16adc447-6ac7-455d-bc71-4f0ccf668d90> | CC-MAIN-2017-09 | https://blog.compass-security.com/tag/javascript/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00132-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.847943 | 1,367 | 2.765625 | 3 |
A VPN (virtual private network) offers network connection possibility over an extensive physical distance (remoteness). But you need to know that it can work over both on private networks and public networks (Internet).
VPN in simple words make possible for clients or whole LAN-s on other side of the internet to connec... | <urn:uuid:aa80deb2-cdfa-4553-8014-95e2c5210ea0> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2011/vpn | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00484-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90522 | 744 | 3.203125 | 3 |
Exploiting Big Data For Creating New Products And Innovation
With the development of technology resources, organizations will increasingly depend on exploiting data for creating new products, services, innovation as well as changes in business processes. Big data is currently one of the most talked about issues in busi... | <urn:uuid:f023e73b-4d0c-4ed8-bc70-eeb211ca0e0e> | CC-MAIN-2017-09 | https://cloudtweaks.com/2014/05/big-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00008-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950498 | 572 | 2.734375 | 3 |
14 Amazing DARPA Technologies On TapGo inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more.
1 of 14
The Defense Advanced Research Projects Agency has announced its latest technologi... | <urn:uuid:511d0d43-f1c4-4fa1-a2eb-6da649ec5f89> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/14-amazing-darpa-technologies-on-tap/d/d-id/1106551?cid=sbx_byte_related_mostpopular_byte_news_google_announces_android_42_new_nexus_ta&itc=sbx_byte_related_mostpopular_byte_news_google_announces_android_42_new_nexus_ta | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00304-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930689 | 573 | 2.9375 | 3 |
Wrapping a firewall around the perimeter is no longer sufficient to meet the needs of modern networks. Technologies such as IPS need to be pushed into the network, not just at the edge, but throughout the entire infrastructure.
During Network World's recent Security Technology Tour, we received a lot of questions about... | <urn:uuid:a5e3d2de-a181-454c-bdba-c4b3b0896012> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2335574/network-security/what-is-an-ips--anyway-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00476-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955178 | 546 | 2.625 | 3 |
Following NASAs LeadBy Larry Dignan | Posted 2005-08-31 Email Print
The UPS Brown Voyager? It could happen if private companies take over low-earth space travel and free up NASA to shoot for the stars.
Meyers hopes to use NASA's suppliers to build what would be a second-generation space shuttle to ferry space-station c... | <urn:uuid:9bdb867f-cfe2-4d6d-8351-7c9dd2c1961b> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Business-Intelligence/Should-NASA-Open-LowOrbit-Space-to-Business/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00176-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949305 | 631 | 2.71875 | 3 |
It's been a rough year for the IT industry. The death of Apple co-founder Steve Jobs in October grabbed international headlines. But we also lost other major figures from almost every area of technology, including Xerox PARC founder Jacob E. Goldman, who died in late December. Here's one last look at some of the people... | <urn:uuid:27a5efe6-efe1-46fc-ba9a-bd707330b8e5> | CC-MAIN-2017-09 | http://www.itworld.com/article/2733552/it-management/tech-luminaries-we-lost-in-2011.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00528-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966381 | 975 | 2.703125 | 3 |
Researchers working with the Oak Ridge Leadership Computing Facility’s (OLCF’s) Titan supercomputer are making the most of the system’s hybrid design, which pairs traditional CPUs with highly-parallel GPUs. As the fastest computer in the United States, Titan has a max theoretical speed of 27 petaflops, but as a recent ... | <urn:uuid:b65666c3-5b9c-457a-9dbb-e9d7d06fdd25> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/01/06/gpus-speed-early-science-apps/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00404-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926965 | 946 | 2.84375 | 3 |
The race for ever more powerful mobile processors may be keeping Qualcomm, Nvidia, and Samsung occupied for now, but ARM is focusing on another goal – designing ultra-low power processors. After years of research and various internal designs, the microchip company is now developing a new low-power microcontroller core,... | <urn:uuid:18b54a86-e719-4607-938d-c85c24700770> | CC-MAIN-2017-09 | http://www.machinetomachinemagazine.com/2013/08/27/arm-processors-take-us-closer-to-internet-of-things/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00348-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942631 | 529 | 3 | 3 |
This FAQ lists all the popular VoIP definitions.
- VoIP – Voice over Internet Protocol (also called IP Telephony, Internet telephony, and Digital Phone) – is the routing of voice conversations over the Internet or any other IP-based network.
- SIP – Session Initiation Protocol – is a protocol developed by the IETF MMUS... | <urn:uuid:23fcb17c-7e06-4f81-a408-dd6163c0d4e4> | CC-MAIN-2017-09 | https://www.3cx.com/pbx/voip-definitions/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00348-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910797 | 418 | 3.421875 | 3 |
Unbreakable encryption remains a pipe dream, even on a quantum Internet
- By John Breeden II
- May 08, 2013
The goal of unbreakable encryption has been a dream of governments since time immemorial. The ancient Greeks sent coded messages by way of a Scytale, which consisted of cloth wrapped around rods on which messages... | <urn:uuid:1143213f-ee49-4085-a9bd-be823a12ca52> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/05/08/unbreakable-encryption-quantum-internet.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00044-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958975 | 792 | 2.71875 | 3 |
SIP Methods / Requests and Responses
SIP uses Methods / Requests and corresponding Responses to communicate and establish a call session.
There are fourteen SIP Request methods of which the first six are the most basic request / method types:
- INVITE = Establishes a session.
- ACK = Confirms an INVITE request.
- BYE =... | <urn:uuid:5adfb6d4-2f97-4ea5-b823-77161652da62> | CC-MAIN-2017-09 | https://www.3cx.com/pbx/sip-methods/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00096-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.796287 | 307 | 2.515625 | 3 |
Two weeks have passed since a magnitude 9.0 earthquake and subsequent tsunami rocked eastern Japan, and while a recovery among the country's technology manufacturers has begun, it could be several months before things start to normalize.
Many factories were closed immediately following the quake, and most have been gra... | <urn:uuid:16ce0ad3-eee9-48cf-aed3-6bdbcbd8aa8f> | CC-MAIN-2017-09 | http://www.cio.com/article/2409849/it-strategy/two-weeks-after-japan-earthquake--it-industry-faces-hurdles.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00569-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964027 | 860 | 2.5625 | 3 |
Many Americans think the next 50 years will bring custom-ordered, made-to-order organ generation, teleportation and robots that will take care of the elderly and sick.
And they're largely hopeful about technology in the future, with 59% optimistic that coming technological and scientific changes will make life better, ... | <urn:uuid:74bbd2db-f5bc-4719-84f1-601f26e5b53b> | CC-MAIN-2017-09 | http://www.itworld.com/article/2698446/hardware/future-tech--americans-foresee-made-to-order-organs--teleportation-and-robots.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00269-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965892 | 847 | 2.71875 | 3 |
Cisco on Cisco
Optical Networking Case Study: How Cisco IT Used CWDM to Interconnect Japanese Data Center Sites
Cisco Systems® maintains two sales offices in Tokyo, Japan. One is located in the government district of the city known as Akasaka and the other in a commercial area known as Shinjuku. As is typical for enter... | <urn:uuid:081c4d07-dec9-40cd-b8cb-39942bbfa3db> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/cisco-on-cisco/enterprise-networks/cwdm-japanese-data-centers-web.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00445-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953312 | 3,989 | 2.53125 | 3 |
Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on.
Out of all of those websites, however, how many unique passwords do you have? Not too many? If a ... | <urn:uuid:ad20bc7e-c720-4340-a47c-a60c159de744> | CC-MAIN-2017-09 | https://www.entrust.com/passwords-weak-todays-digital-world/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00265-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950053 | 521 | 2.734375 | 3 |
Wikipedia Often Omits Important Drug InformationBy Reuters - | Posted 2008-11-25 Email Print
Dr. Kevin A. Clauson of Nova Southeastern University in Palm Beach Gardens, Florida and his colleagues found few factual errors in their evaluation of Wikipedia entries on 80 drugs, but some entries were often missing important... | <urn:uuid:827ae4e5-181e-4cc5-8fec-4e664963c227> | CC-MAIN-2017-09 | http://www.baselinemag.com/messaging-and-collaboration/Wikipedia-Often-Omits-Important-Drug-Information | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00493-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943317 | 631 | 2.65625 | 3 |
- Test for Heartbleed Vulnerability
- Get details of a SSL certificate.
- Detect weak ciphers and SSLv2, a version of SSL with known security vulnerabilities.
About SSL Certificate Checking
SSL (and TLS) provide encrypted communication over the Internet, SSL 2.0 has known vulnerabilities and it is recommended that it n... | <urn:uuid:254bc8a6-4767-4bfd-8f09-a3b158db4f58> | CC-MAIN-2017-09 | https://hackertarget.com/ssl-check/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00085-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91817 | 175 | 3.109375 | 3 |
“There are many different silos of information that have been painstakingly collected; and there are a number of existing tools that bring some strands of data into relation. But there is no overarching tool that can be used across silos.”
The sentiments behind this quote could apply to a wide range of scientific disci... | <urn:uuid:84126d83-f8af-4e96-b715-abc55ac1670d> | CC-MAIN-2017-09 | https://www.hpcwire.com/2011/08/10/doe_focuses_on_scientific_data_integration/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00309-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947363 | 558 | 2.875 | 3 |
In 2020, both Harlingen and San Benito will have all the water they need, according to a state water agency website.
However, Primera will fall short by 45 percent, says the new interactive State Water Plan website launched by the Texas Water Development Board.
“This website is an example of the changes we are making t... | <urn:uuid:3886209e-f2d5-4346-a98c-6286ebba12cc> | CC-MAIN-2017-09 | http://www.govtech.com/internet/Website-Predicts-Water-Needs-in-Texas-Communities.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00485-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938858 | 683 | 2.640625 | 3 |
The European Space Agency says it has completed what it calls the largest digital camera ever built for a space mission - a one billion pixel array camera that will help create a three-dimensional picture of the Milky Way Galaxy.
Set to be launched onboard the ESA's galaxy-mapping Gaia mission in 2013, the digital came... | <urn:uuid:0ad158d4-6741-43bc-a215-33eed888a1dc> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2220129/security/billion-pixel-camera-set-to-snap-milky-way-shots.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00481-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921357 | 647 | 3.46875 | 3 |
The HAI problem
99,000 people die.
– U.S. Centers for Disease Control
Healthcare Associated Infections, or HAIs, are caused by patient exposure to any of a number of dangerous pathogens that can be passed by direct hand contact or by high-touch room surfaces, like bed rails, faucet handles, door knobs, telephone handse... | <urn:uuid:4837d454-c134-448f-ae5b-de5fa9149977> | CC-MAIN-2017-09 | http://www.infectionpreventiontechnologies.com/next-gen-uv-validated-by-science/hai-problem.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00005-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927128 | 698 | 3.484375 | 3 |
Today, we’d like to get back to a few basics about the relationship between the public-switched telephone network and voice over IP.
The PSTN includes a signaling system, a series of central offices and a distribution network. The PSTN employs a packet-based network called Signaling System 7 (SS7) or Common Channel Sig... | <urn:uuid:3dea0fd0-e701-45d2-ad3d-82fec0b2d8ab> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2324219/lan-wan/how-voip-relates-to-the-pstn.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00181-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910645 | 446 | 2.5625 | 3 |
Picture it: 2004, RSA Conference. Bill Gates proclaims that passwords are dead, explaining “People use the same password on different systems, they write them down and they just don’t meet the challenge for anything you really want to secure.”
Flash forward to 2011: despite frequent reports of email hacks and enterpris... | <urn:uuid:b9721663-4b72-4690-9e24-cde243cb15d1> | CC-MAIN-2017-09 | https://blog.gemalto.com/blog/2011/09/29/are-passwords-dead-yet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00477-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938366 | 689 | 2.6875 | 3 |
While it might seem like the stuff of science fiction, the cutting edge of technology and science has us on the cusp of some very exciting developments such as making Harry Potter's invisibility cloak a reality, making 3D holograms that can dance above your mobile device, making tiny blood-monitoring implants that can ... | <urn:uuid:982ab221-8637-4316-aac9-5be75a508f77> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2474946/emerging-technology/cool--invisibility-cloak--implant-calls-before-heart-attack--3d-hologram--immort.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00529-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930031 | 1,208 | 2.703125 | 3 |
In order to build more resilient data centers, many Cumulus Networks customers are leveraging the Linux ecosystem to run routing protocols directly to their servers. This is often referred to as routing on the host. This means running layer 3 protocols like OSPF (Open Shortest Path First) or BGP (Border Gateway Protoco... | <urn:uuid:c5350d2a-ae7b-4db3-9710-8a5625c64599> | CC-MAIN-2017-09 | https://support.cumulusnetworks.com/hc/en-us/articles/216805858-Routing-on-the-Host-An-Introduction | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00529-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929902 | 2,576 | 2.5625 | 3 |
Mapping the tiny mouse brain is pushing the limits of information technology capabilities.
By the end of the three-year project to map the mouse brain about one petabyte of data will have been generated, pushing scientists up against a range of technological limitations, according to the senior director of the Allen Br... | <urn:uuid:db63d5c6-95bf-4807-a656-69876b1258c5> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Database/RAM-Limitations-Strain-BioIT | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00229-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941795 | 165 | 2.984375 | 3 |
DELL EMC Glossary
Two-factor authentication is also called strong authentication.
Two Factor Authentication (2FA) is also called strong authentication and usually requires another proof, beyond just a password, for a user to assure their identity and gain access to a system, network, or application. Two-factor authenti... | <urn:uuid:0cee4892-a34b-48c9-99b0-ed7a9e204316> | CC-MAIN-2017-09 | https://www.emc.com/corporate/glossary/two-factor-authentication.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00405-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917007 | 285 | 3.640625 | 4 |
Large-scale, worldwide scientific initiatives, such as the one that found the Higgs Boson or the one that is currently researching the depths of proteomics, rely on some cloud-based system to both coordinate efforts and manage computational efforts at peak times that cannot be contained within the combined in-house HPC... | <urn:uuid:df8e12c8-ca58-46c6-99a4-669b523b8308> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/05/21/cern_google_and_the_future_of_global_science_initiatives-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00225-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949776 | 1,105 | 2.75 | 3 |
BALTIMORE, MD--(Marketwired - Feb 24, 2014) - Kiddie Academy® says that Dr. Seuss's birthday, March 2, 2014, is a great day for families to think about ways to give their children the gift of a lifelong love of reading.
"While learning to read is a gradual process, involving letter sounds, vocabulary, grammar and compr... | <urn:uuid:cecf7c9e-c4a4-4576-8b6a-e271dfb843c3> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/kiddie-academyr-urges-families-share-joy-reading-with-their-children-as-dr-seusss-birthday-1882180.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00401-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955615 | 733 | 2.796875 | 3 |
The original article on RAID, entitled "The Quick Skinny on Raid" appeared on Ars back in October of 1998. We recently decided that we should beef this section up. Why? For one, after Panders' review of the Promise FastTrak66 IDE RAID controller, we quickly came to realize that there's a serious hunger out there for in... | <urn:uuid:276bd923-3491-449b-be4a-3e70fa556ce0> | CC-MAIN-2017-09 | https://arstechnica.com/features/2000/05/raid/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00577-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954607 | 1,283 | 2.609375 | 3 |
In a special IT Blogwatch Extra, Richi Jennings watches bloggers celebrate the Web's 20th birthday. Not to mention the movable type rap...
Carrie-Ann Skinner swells with patriotic pride:
While the internet was developed in the 50s, the web or the network of content servers that allow information to be shared, was not c... | <urn:uuid:b0400c0e-ad60-482e-a1eb-43e1c4fbab0a> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2481139/e-commerce/web-is-20-today--anyone-for-cake-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00218-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952448 | 846 | 2.640625 | 3 |
Research from Norton estimates the global price tag of consumer cybercrime now topping some US$113 billion annually4 which is enough to host the 2012 London Olympics nearly 10 times over. The cost per cybercrime victim has shot up to USD$298: a 50% increase over 2012. In terms of the number of victims of such attacks, ... | <urn:uuid:9a1df679-a8dd-492b-aee1-3f51528aaeb2> | CC-MAIN-2017-09 | https://www.infosecurity-magazine.com/white-papers/hidden-dangers-lurking-in-ecommerce/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00394-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.863073 | 180 | 2.546875 | 3 |
Chapter 3: Common IPv6 Coexistence Mechanisms
As the name suggests, transition mechanisms help in the transition from one protocol to another. In the perspective of IPv6, transition basically means moving from IPv4 to IPv6. One day, IPv6 networks will completely replace today’s IPv4 networks. For the near term, a numbe... | <urn:uuid:7230cacd-a9a8-46bc-a29f-379e7c46d868> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2202943/lan-wan/book-excerpt-from-ipv6-for-enterprise-networks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00570-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.884374 | 106 | 2.59375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.