text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
The idea behind "Born to Die" electronics is that mist gadgets now have pitifully short lives. Tech products such as cell phones and pads now have useful lives measured in months and the result is landfills and recycling facilities overwhelmed with electronic gadgets that need to be broken down and safely disposed of. ...
<urn:uuid:aadbc4e1-196f-4205-8d16-5f9351be47e0>
CC-MAIN-2017-09
http://www.networkworld.com/article/2224970/infrastructure-management/electronics-that-will-be--born-to-die-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00618-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964247
198
3.171875
3
Windows Safe Mode is a way of booting up your Windows operating system in order to run administrative and diagnostic tasks on your installation. When you boot into Safe Mode the operating system only loads the bare minimum of software that is required for the operating system to work. This mode of operating is designed...
<urn:uuid:f70be1be-083e-4b6e-92ba-832c7eaccb54>
CC-MAIN-2017-09
https://www.bleepingcomputer.com/tutorials/popular/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00618-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953139
1,020
2.796875
3
Making Clouds Secure The concept of Cloud Computing — what just about every IT community is dreaming about these days — has a multitude of indisputable advantages over more traditional modes of software distribution and usage. But Cloud Computing has a long way to go before it takes over the market — not in terms of te...
<urn:uuid:38060fdb-ca58-4222-8f95-01f8277a3081>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/datacenter/datacenter-blog/making-clouds-secure?page=3
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00562-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945373
2,873
2.875
3
Carl Manion is a managing principal of Raytheon Foreground Security. Targeted attack campaigns by advanced cyber adversaries have become a mainstay that most—if not all—organizations now need to be concerned about. This type of threat may stay hidden on your network, undetected for long periods of time, laterally movin...
<urn:uuid:ddce13cb-e998-4c6f-b76f-23ebbc0196e4>
CC-MAIN-2017-09
http://www.nextgov.com/technology-news/tech-insider/2017/01/4-skills-every-threat-hunter-should-have/134186/?oref=ng-featured
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00562-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947349
746
2.53125
3
It did not light up the sky like real aurora borealis can but researchers with the U.S. Naval Research Laboratory said they have created an artificial version that can be used to explore ionospheric occurrences and their impact on communications, navigation and space weather. Specifically what the researchers did was p...
<urn:uuid:86ec5a96-0c70-4e99-8aed-b9d2e013765c>
CC-MAIN-2017-09
http://www.networkworld.com/article/2224187/data-center/artificial-aurora-lights-up-arctic-skies.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00086-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946484
407
3.625
4
Researchers have uncovered an extremely critical vulnerability in recent versions of OpenSSL, a technology that allows millions of Web sites to encrypt communications with visitors. Complicating matters further is the release of a simple exploit that can be used to steal usernames and passwords from vulnerable sites, a...
<urn:uuid:7241bbaa-e69a-4b3d-b2b5-5838e5e75fdd>
CC-MAIN-2017-09
https://krebsonsecurity.com/tag/yahoo-com/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00262-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928089
573
2.609375
3
Emerging protocol can help manage the Internet of Things - By Kevin McCaney - May 01, 2013 The ever-expanding networks of sensors and other machine-to-machine devices on the “Internet of Things” are creating huge stores of data for everything from traffic and weather monitoring to health care and finance. And there wil...
<urn:uuid:2f3bd4d6-1b5d-4fc2-9a2d-a04422494cf9>
CC-MAIN-2017-09
https://gcn.com/articles/2013/05/01/emerging-protocol-manage-internet-of-things.aspx?admgarea=TC_EmergingTech
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00614-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942084
644
2.53125
3
Kids' parties sometimes have entertainers geared at doing all sorts to keep children occupied: magic tricks, juggling and so on. I don't know about you, but I'd much rather have this awesome Japanese robot doing the entertainment at parties than the typical human act. The folks over at Chinba University demonstrated ho...
<urn:uuid:1ad1419c-a9c3-4054-b222-5599e62fd6c7>
CC-MAIN-2017-09
http://www.itworld.com/article/2726798/it-management/juggling-robot-does-tricks--is-cooler-than-your-typical-clown.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00490-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942719
428
2.546875
3
Hackers have targeted politicians, journalists and activists using the 'legal' spyware tool, Galileo, with previously undiscovered mobile trojans that work on Android and iOS. Kaspersky Lab has published a new research report mapping the presence of a large global infrastructure used to control 'Remote Control System' ...
<urn:uuid:801f41be-883e-4b25-a6d0-5c0fb3298941>
CC-MAIN-2017-09
http://www.csoonline.com/article/2367525/politicians-and-journalists-hacked-using-legal-spyware-tool-galileo.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00610-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947063
768
2.53125
3
Corporations and government are using information about us in a new – and newly insidious – way. Employing massive data files, much of the information taken from the Internet, they profile us, predict our good or bad character, credit worthiness, behavior, tastes, and spending habits – and take actions accordingly. As ...
<urn:uuid:93588a76-01eb-468b-a62a-e44c22296fb8>
CC-MAIN-2017-09
http://www.nextgov.com/big-data/2014/02/commentary-welcome-algorithmic-prison/79196/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00134-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953626
1,534
2.53125
3
What email address or phone number would you like to use to sign in to Docs.com? If you already have an account that you use with Office or other Microsoft services, enter it here. Or sign in with: Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi...
<urn:uuid:ca306da6-d9b2-416b-9184-ae70b51733d6>
CC-MAIN-2017-09
https://docs.com/jefferson-castro-1/6529/trabajo-de-ingles-06-octubre-traducido
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00134-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94859
3,942
2.96875
3
While the world's attention was recently focused on the Syrian crisis and the alleged use of chemical weapons, cyber-criminals were taking advantage of the situation. News seekers, eager to learn about the latest developments, the possibility of a U.S. strike and the diplomatic efforts to end the civil war, became easy...
<urn:uuid:a2ea9fd2-dedf-415a-9d42-a3fe5af7e4a5>
CC-MAIN-2017-09
http://www.banktech.com/how-breaking-news-is-used-to-plant-malware/a/d-id/1296754?cid=sbx_banktech_related_commentary_default_us_sec_chairman_mary_schapiro_to_step_do&itc=sbx_banktech_related_commentary_default_us_sec_chairman_mary_schapiro_to_step_do
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00006-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934633
834
2.625
3
The "learn to code" movement is ramping up in full force this week, Computer Science Education Week, with major tech companies and celebrities supporting Code.org in its "Hour of Code" mission to get students of all ages to learn programming. If you'd like some free hands-on training, Apple will help you this Wednesday...
<urn:uuid:616ca48c-c1fd-4fa0-b617-af8fea62a332>
CC-MAIN-2017-09
http://www.itworld.com/article/2703539/consumerization/learn-to-code-for-free-at-an-apple-store-this-week.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00006-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941677
342
2.9375
3
Defining the Issue Defining the Issue Consumers around the world continue to turn to mobile devices for voice, data, and Internet access. At the same time, demand continues to grow for technologies relying on wireless fixed use, also known as â€Å“transportâ€ï¿½ links or, in emerging markets, as access connections. The ...
<urn:uuid:78e29843-7a4c-49b4-8d3e-800eece68c98>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/about/government-affairs/government-policy-issues/wireless-spectrum.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00182-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916254
578
2.59375
3
That's right, March 14 is international Pi Day. Get it -- pi is 3.14, and March 14 is 3/14? Most everyone knows pi -- the ratio of the circumference of a circle to its diameter. But how much do you really know about this magical number? Below are 28 fun facts about pi split up into tidy categories. Enjoy! [ MORE PI DAY...
<urn:uuid:763af512-9530-4ce6-972b-bc752268f75a>
CC-MAIN-2017-09
http://www.networkworld.com/article/2164391/data-center/data-center-28-facts-about-pi-that-you-probably-didn-t-know.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00478-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920689
1,031
2.96875
3
What if researchers could access and share scientific simulation and modeling tools as easily as YouTube videos with the power of the cloud to drive it all? That’s the underlying premise for the HUBzero Platform for Scientific Collaboration, a cyberinfrastructure developed at Purdue University. HUBzero was created to s...
<urn:uuid:2cf2cce3-dc2e-4456-b589-3552e242d398>
CC-MAIN-2017-09
https://www.hpcwire.com/2011/02/28/hubzero_paving_the_way_for_the_third_pillar_of_science/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00354-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921674
2,327
2.796875
3
Sometimes, when a network is breached, when servers are compromised, or when unencrypted data is at risk, companies will get, or even seek, assistance from government offices. The nature of cybercrime points to the ways in which our digital architectures are interconnected – over the Internet, but also in terms of how ...
<urn:uuid:5e0de4e4-fdfb-4847-8433-72e42269edc7>
CC-MAIN-2017-09
http://www.csoonline.com/article/3156464/security/cybercrime-not-an-act-of-war.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00530-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953676
748
2.59375
3
Concerns about the safety of cellular telephones-whether they create health risks or are safe to use in all operating environments-have spread to other wireless devices, such as the wireless networking equipment (WLANs)* manufactured by Cisco Systems ® and Linksys ®. These issues are of concern not only to Cisco custom...
<urn:uuid:e7f546fb-1df8-468c-ad30-7c8af1396868>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1200-access-point/prod_white_paper09186a0080088791.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00054-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933209
1,574
2.75
3
Statistics sometimes get a bad rap, as being somehow divorced from the real world of complex events and relationships. But in several notable cases, statistics helped provide a useful view of seemingly diverse and sporadic events. Back in the 1980s for example Jack Maple, a cop in New York City's subways, got tired of ...
<urn:uuid:53bee30f-805d-4f59-86c6-9e899d6b515a>
CC-MAIN-2017-09
http://www.govtech.com/health/South-Carolina-Builds-Enterprise-Social-Services.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00474-ip-10-171-10-108.ec2.internal.warc.gz
en
0.968644
1,621
2.578125
3
This type of virus infects the Master Boot Record or DOS Boot Record of a hard drive, or the Floppy Boot Record of a floppy drive. Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action. More scanning & rem...
<urn:uuid:7ad87887-e6f4-4a1a-9ac7-1c82d285c227>
CC-MAIN-2017-09
https://www.f-secure.com/v-descs/boovirus.shtml
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00474-ip-10-171-10-108.ec2.internal.warc.gz
en
0.909069
621
2.953125
3
Google Captcha Dumps Distorted Text ImagesTired of reading those wavy words? Changes to Google's reCaptcha system -- which doubles as quality control for its book and newspaper scanning projects -- prioritize bot-busting puzzles based on numbers. 9 Android Apps To Improve Security, Privacy (click image for larger view)...
<urn:uuid:14152d75-9af4-4f67-806c-c47dc9db708c>
CC-MAIN-2017-09
http://www.darkreading.com/attacks-and-breaches/google-captcha-dumps-distorted-text-images/d/d-id/1112111?cid=sbx_bigdata_related_slideshow_vulnerabilities_and_threats_big_data&itc=sbx_bigdata_related_slideshow_vulnerabilities_and_threats_big_data
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00350-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951296
1,171
2.71875
3
Education isn't a one-size-fits-all endeavor. Nowhere is that more true than in New York City's schools, which educate more than one million students who among them speak more than 800 languages. One of the ways the city is working to meet the challenge of effectively educating such a diverse population is through Scho...
<urn:uuid:ce8d0da1-d5ae-469a-92f1-4a324b75e7e9>
CC-MAIN-2017-09
http://www.govtech.com/education/How-New-York-City-Uses-Technology-to-Teach-Math-One-on-One.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00050-ip-10-171-10-108.ec2.internal.warc.gz
en
0.970339
629
2.84375
3
It’s no secret there is a pronounced gender gap in technology fields. In 2014, 70 percent of the employees at the top tech companies in Silicon Valley, such as Google, Facebook and Twitter, were male. In technical roles, this phenomenon is even more pronounced; for example, only 10 percent of the technical workforce at...
<urn:uuid:42850cd2-5ea6-4a23-86eb-c0fa821fb8cd>
CC-MAIN-2017-09
http://m.nextgov.com/cio-briefing/wired-workplace/2017/02/silicon-valleys-gender-gap-result-computer-game-marketing-20-years-ago/135494/?oref=m-ng-river
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00226-ip-10-171-10-108.ec2.internal.warc.gz
en
0.975635
1,344
3
3
Cisco Basics – User Exec Mode In preparation of your CCNA exam, we want to make sure we cover the various concepts that we could see on your Cisco CCNA exam. So to assist you, below we will discuss the CCNA concept of Entering a Cisco Router's User Mode. As you progress through your CCNA exam studies, I am sure with re...
<urn:uuid:d2b70b2d-86f0-489c-bff2-9e87a8fdd2b9>
CC-MAIN-2017-09
https://www.certificationkits.com/cisco-router-user-mode/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00402-ip-10-171-10-108.ec2.internal.warc.gz
en
0.918175
908
2.546875
3
While it may seem counterintuitive for hackers to attack small- and mid-sized companies, it’s not just big companies who are at risk from cybercriminals. Cyberattacks on small- and medium-sized companies have been on the increase since 2004; in fact, up to 85 percent of the targets for cyber-related crimes are small- a...
<urn:uuid:64aeffbc-dc56-4a97-9551-bf4d2ee8024a>
CC-MAIN-2017-09
https://www.apex.com/small-mid-sized-businesses-risk-cyberattacks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00398-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946292
538
2.671875
3
Table of Contents Windows 8 comes with a new user interface called the Windows Start Screen that is the first thing you see when you login to Windows 8. This is the main interface that Windows 8 user's use to launch applications, search for files, and browse the web. This Start screen contain tiles that represent diffe...
<urn:uuid:5460eae8-9784-49df-b3d4-c5229e51408d>
CC-MAIN-2017-09
https://www.bleepingcomputer.com/tutorials/how-to-use-windows-8-start-screen/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00574-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920831
1,954
2.8125
3
Exploring the deep web Internal and external federated systems lead users to treasures that regular search engines can't find GCN Illustration by Sam Votsis For the past decade, the Energy Department's Office of Scientific and Technical Information in Oak Ridge, Tenn., has been using the Internet to speed research proc...
<urn:uuid:5d4ded06-bcbe-4e4d-b04f-b1669c51efba>
CC-MAIN-2017-09
https://gcn.com/articles/2007/06/02/exploring-the-deep-web.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00518-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915631
1,703
2.78125
3
Up To: Contents See Also: State Types Nagios supports optional detection of hosts and services that are "flapping". Flapping occurs when a service or host changes state too frequently, resulting in a storm of problem and recovery notifications. Flapping can be indicative of configuration problems (i.e. thresholds set t...
<urn:uuid:5514c7e3-fcbc-46e1-b21d-1c52d537ab87>
CC-MAIN-2017-09
https://assets.nagios.com/downloads/nagioscore/docs/nagioscore/3/en/flapping.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00394-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917473
1,377
2.578125
3
With private-sector backing, California’s state government and the state’s flagship public university are teaming up to develop an intelligent transportation solution that will help drivers avoid congested traffic. The California Department of Transportation (Caltrans), the University of California, Berkeley’s Californ...
<urn:uuid:85885a03-7bf7-4697-b48a-654110cdd30d>
CC-MAIN-2017-09
http://www.govtech.com/innovationnation/California-Traffic-Jams.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00446-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935814
404
2.75
3
Are we facing an internet of too many things? Much of the buzz in the tech world at the moment surrounds the internet of things, the idea that every piece of electronic kit might one day be connected via the web. There are plenty of benefits from this but it also presents a number of challenges. Home automation special...
<urn:uuid:7eed2c48-e47f-443a-a74d-946e3f236543>
CC-MAIN-2017-09
https://betanews.com/2014/04/23/are-we-facing-an-internet-of-too-many-things/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00446-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956712
220
2.734375
3
With the proliferation of smart phones, tablets, notebooks and various other electronic devices in our everyday work and personal lives comes another thing -- e-waste. The average person replaces his or her mobile phone every 18 months, and in the U.S. alone, more than 130 million mobile phones are discarded each year ...
<urn:uuid:7cab8528-e356-4cf2-936c-56910d9c524b>
CC-MAIN-2017-09
http://www.govtech.com/infographics/E-Waste-and-Us-17000-Tons-Trashed-Each-Year-Infographic.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00263-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956643
154
3.171875
3
According to NEC(National Electrical Code), there are three types of sections of a building’s inside area: plenums, risers and general purpose areas. As the higher and higher demands of the building network safety, types of fiber cables are not limited to the general types. Nowadays, some particular materials are used ...
<urn:uuid:ff75b9d2-af40-4205-9f5f-4829e57030ca>
CC-MAIN-2017-09
http://www.fs.com/blog/fiberstores-plenumofnp-fiber-cables-a-low-cost-option-for-your-network-deployments.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00083-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929741
647
3.171875
3
Residents in Miami-Dade County, Fla., will have a new Web tool at their disposal in the event Hurricane Irene comes ashore on the Eastern Seaboard later this week. The new tool, called the Storm Surge Simulator, allows users to calculate storm surge levels in Miami-Dade’s three evacuation zones based on location and hu...
<urn:uuid:aa12dcd3-af1d-49fa-b733-69bec3012491>
CC-MAIN-2017-09
http://www.govtech.com/public-safety/Hurricane-Storm-Surge-Calculated-Web-Tool.html?elq=426ac008a9af4cbc9e841569a6bb7941
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00435-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934563
685
2.671875
3
The White House on Tuesday welcomed some of America’s most innovative students for the fourth-ever White House Science Fair, which this year emphasized the specific contributions of girls and young women who are excelling in science, technology, engineering and math. Among those highlighted at the conference was Elana ...
<urn:uuid:58fac8a6-1147-443a-8e7f-01346c5430ec>
CC-MAIN-2017-09
http://www.nextgov.com/cio-briefing/wired-workplace/2014/05/white-house-spotlights-contributions-girls-stem/85234/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00435-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960108
617
2.84375
3
All 30 users on a single floor of a building are complaining about network slowness. Afterinvestigating the access switch, the network administrator notices that the MAC address table isfull (10,000 entries) and all traffic is being flooded out of every port. Which action can theadministrator […] A network printer has ...
<urn:uuid:bc354545-4ea5-47c0-88aa-3811cce8e1ae>
CC-MAIN-2017-09
http://www.aiotestking.com/cisco/category/exam-300-206-implementing-cisco-edge-network-security-solutions/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00487-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923742
258
2.578125
3
Programming Cars to KillBy Samuel Greengard | Posted 2016-03-28 Email Print What happens when a mechanical part fails or there's a landslide, and a self-driving car must choose between saving its passenger or a motorist in another car? The MIT Technology Review recently presented a story titled "Why Self-Driving Cars M...
<urn:uuid:c8fe4bd9-ac01-44a7-b2ee-6fe15439c86b>
CC-MAIN-2017-09
http://www.baselinemag.com/blogs/programming-cars-to-kill.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00607-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959581
574
2.96875
3
In search of better flu forecasting The Centers for Disease Control and Prevention recently released its weekly flu forecasts for the 2016-2017 season on FluSight, a beta website housing influenza activity forecasts provided by 21 research teams. The research initiative was begun by the CDC in 2013. "Predict the Influe...
<urn:uuid:cec4408d-2291-4b56-8447-f2e256e60f0c>
CC-MAIN-2017-09
https://gcn.com/articles/2016/12/21/cdc-flu-predictions.aspx?admgarea=TC_EmergingTech
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00007-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957524
670
2.765625
3
Understanding what makes an SSD different than an HDD is vital for any VAR hoping to sell SSDs to their clients. So here is a short breakdown of what makes SSDs different – and better. How they work: A SSD is basically a package of memory chips; typically the same ones as are used in common flash memory cards. This mea...
<urn:uuid:a76e9c3e-a8f2-4f71-b7d6-3b9f5b773fb6>
CC-MAIN-2017-09
http://www.ingrammicroadvisor.com/components/a-simple-ssd-comparison-to-hdd
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00003-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956378
799
3.15625
3
Last week I wrote about Apple’s new default encryption policy for iOS 8. Since that piece was intended for general audiences I mostly avoided technical detail. But since some folks (and apparently the Washington Post!) are still wondering about the nitty-gritty details of Apple’s design, I thought it might be helpful t...
<urn:uuid:95ea2cf0-bc25-4582-8134-280f5d5c1153>
CC-MAIN-2017-09
https://blog.cryptographyengineering.com/2014/10/04/why-cant-apple-decrypt-your-iphone/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00475-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944584
1,973
2.546875
3
Accurately modeling the flow of shockwaves across a fluid body can be a difficult thing to do. Attempts to address the problem by dialing up the computational accuracy of the models can actually make it worse. Now, researchers at the A*STAR Institute of High Performance Computing (IHPC) have come up with an innovative ...
<urn:uuid:40eebec6-6206-48cd-a123-0ff6ce51fb9e>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/08/08/singapore_researchers_build_a_better_shockwave_model/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00651-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936964
569
2.953125
3
Iceland's National Energy Authority has created the world's first magma-based geothermal energy system after drilling 1.3 miles (2,100 meters) through the Earth's crust. It is only the second time that a drilling operation has broken through to the mantle, the next layer after the Earth's crust, the group said. It is t...
<urn:uuid:6c3099c8-acfe-414b-8e50-a1d602336c03>
CC-MAIN-2017-09
http://www.cio.com/article/2379058/energy/iceland-taps-the-ultimate-renewable-energy-source--earth-s-magma.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00527-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960442
1,123
3.21875
3
(TNS) - The critical document that determines how much space should be left in Lake Oroville for flood control during the rainy season hasn’t been updated since 1970, and it uses climatological data and runoff projections so old they don’t account for two of the biggest floods ever to strike the region. Independent exp...
<urn:uuid:ca4d91c5-48f0-43d0-89ba-a1edb7beb215>
CC-MAIN-2017-09
http://www.govtech.com/em/disaster/Oroville-Dams-flood-control-manual-hasnt-been-updated-for-half-a-century.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00527-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953745
1,540
2.6875
3
This series starts with an overview of wireless's most often-overlooked but fundamental elements: the properties of RF and waves. RF and Waves Wireless networking is an RF (radio frequency) technology. Air is the vehicle through which the data is carried, just as Ethernet uses copper cables. WLAN frequency ranges are i...
<urn:uuid:e88967ab-c9f1-4b0f-bac6-4d3e3befad91>
CC-MAIN-2017-09
http://www.networkcomputing.com/networking/wireless-beginners-part-1-rf-and-waves/1640728721?cid=sbx_nwc_related_mostpopular_default_next_gen_network_tech_center&itc=sbx_nwc_related_mostpopular_default_next_gen_network_tech_center&piddl_msgorder=thrd
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00051-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94944
772
3.859375
4
Mobile communications have come a long way. Citrix Systems including XenMobile and many features such as TCP Westwood and SPDY integrated into NetScaler have played a big role. Nevertheless there is one source of irritation that causes angst among mobile clients as they roam about their day. Standard TCP connections ar...
<urn:uuid:ff52fe57-ae2d-457c-b07f-5361b27665d4>
CC-MAIN-2017-09
https://www.citrix.com/blogs/2013/05/28/maximize-mobile-user-experience-with-netscaler-multipath-tcp/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00051-ip-10-171-10-108.ec2.internal.warc.gz
en
0.924073
744
3.0625
3
Just about the time you thought you were getting a grip on computer networking -- or were at least clinging to it by your fingernails -- there's another 14-wheeler racing toward you on the information superhighway. Electronic commerce and digital signatures will become central issues in public access to government in t...
<urn:uuid:7a2ef5fd-65a9-4f36-b463-128b99125909>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/100556254.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00575-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9421
959
3.1875
3
What makes people healthy? That's a question researchers at Google X, along with scientists at Duke University and Stanford University, are looking to answer. Google has launched a new project, dubbed the Baseline Study, that seeks to develop a greater understanding of what it means to be healthy. "Most research studie...
<urn:uuid:ae984d9e-1d93-4ada-af25-d9ecf611032e>
CC-MAIN-2017-09
http://www.computerworld.com/article/2490451/healthcare-it/google-s-next-frontier--what-it-means-to-be-healthy.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00219-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959071
811
3.5625
4
As people’s constant pursuit of enjoyment of life, nowadays most consumer electronics are applied HDMI(High-Definition Multimedia Interface) for multimedia data transmission, such as the digital televisions, Blu-ray player, PC, laptop and smart phone with a variety of devices to the HDMI adopted. Although the HDMI tech...
<urn:uuid:b24ab87a-8a54-46f1-ab60-b151f6c99119>
CC-MAIN-2017-09
http://www.fs.com/blog/introduction-to-hdmi-video-optic-transmission-system.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00219-ip-10-171-10-108.ec2.internal.warc.gz
en
0.884147
574
3
3
Emergency managers know that having a foolproof disaster communications plan is nothing more than a fantasy. That's because even the most redundant backup strategies can leave responders unable to communicate. Consequently agencies remain focused on providing diversified options for communications. Why? If a disaster h...
<urn:uuid:e758aa25-e8a3-4658-aa79-d027b0b1fa75>
CC-MAIN-2017-09
http://www.govtech.com/featured/99853319.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00447-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942908
1,684
2.703125
3
Question 2) A+ Operating Systems Technologies This post is outdated. For an updated guide see Jed Reisner’s A+ 220-801 and 220-802 guide. SubObjective: Identify the names, locations, purposes, and contents of major system files Single Answer Multiple Choice Which file loads the Windows 98 graphical user interface (GUI)...
<urn:uuid:8061a436-8673-4616-aa97-cd42967d4e00>
CC-MAIN-2017-09
http://certmag.com/question-2-test-yourself-on-a-operating-systems-technologies-2003-objectives/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00040-ip-10-171-10-108.ec2.internal.warc.gz
en
0.762814
280
2.65625
3
How to manage the security of network services according to ISO 27001 A.13.1.2 Everybody knows that information is stored in information systems (workstations, laptops, smartphones, etc.), but to exchange the information via a network is necessary. Most of the information systems in this world are connected to the same...
<urn:uuid:e35f402a-1013-4404-891f-9e9504498f21>
CC-MAIN-2017-09
https://advisera.com/27001academy/blog/2017/02/13/how-to-manage-the-security-of-network-services-according-to-iso-27001-a-13-1-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00040-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934989
1,274
3.0625
3
Data center networking topology has improved significantly for a few years. With the developments of high speed switching device and multilayer network architecture, we have more powerful data centers with low latency, scalability and higher bandwidth. But due to the exponential increase of internet traffic and emergin...
<urn:uuid:fc10d993-0a6f-4dd0-81c1-6565e8728d03>
CC-MAIN-2017-09
http://www.fs.com/blog/deploying-hybrid-electrical-and-optical-network-to-achieve-big-data-transfer.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00216-ip-10-171-10-108.ec2.internal.warc.gz
en
0.908771
876
2.671875
3
Tip: Prompt magic Enhancing the system prompt As Linux/UNIX people, we spend a lot of time working in the shell, and in many cases, this is what we have staring back at us: If you happen to be root, you're entitled to the "prestige" version of this beautiful prompt: These prompts are not exactly pretty. It's no wonder ...
<urn:uuid:e461c253-c6f8-482a-b143-7b26abfb3343>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/library/l-tip-prompt/index.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00568-ip-10-171-10-108.ec2.internal.warc.gz
en
0.894035
2,256
2.515625
3
The popular Apple iPad is certainly no supercomputer by today’s standards, but if you could transport one back in time 25 years, it would be one of the fastest machines on the planet. According to a recent article by John Markoff of the New York Times, the performance of today’s iPad 2 would rival that of a 1985-era Cr...
<urn:uuid:e7f6697f-e78d-442c-9c4b-abc8d1eba691>
CC-MAIN-2017-09
https://www.hpcwire.com/2011/05/10/apples_ipad_gets_a_linpack_workout/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00444-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95677
471
2.890625
3
An American and a Frenchman have won the 2012 Nobel Prize for Physics for their work on quantum optics, which could one day lead to faster computer processors, better telecommunications or more accurate timepieces. Prize winners David Wineland of the University of Colorado Boulder and Serge Haroche of the CollA"ge de F...
<urn:uuid:07d5eb57-2c5a-4e70-95ac-aa8c28c9be1f>
CC-MAIN-2017-09
http://www.computerworld.com/article/2492145/high-performance-computing/quantum-computing-pioneers-from-u-s---france-win-2012-nobel-prize.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00564-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959849
691
2.6875
3
Data centers are the backbone of today’s digital economy, and yet far too many are vulnerable to advanced attacks. Despite $13 billion spent every year to secure them,* attackers are compromising data centers in a flood of cyber assaults. In many breaches, compromised data centers are used in attacks against new target...
<urn:uuid:eeaaa04f-2d95-4963-8288-8be5e4b1cc90>
CC-MAIN-2017-09
https://www2.fireeye.com/wp-data-center-security.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00564-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944572
269
2.515625
3
Ah, Mondays. Wonder why your employees are all yawning and glassy-eyed today? It may be easy to blame it on the hot weather or overindulgences over the weekend, but researchers are pointing fingers at another potential culprit that is increasingly interfering with our ability to get a good night's sleep: Smartphones an...
<urn:uuid:1f43bf0e-2a49-4cb5-bfa1-7fc2d668ac39>
CC-MAIN-2017-09
http://www.cio.com/article/2384426/it-strategy/tablets-in-bed-are-damaging-sleep-and-killing-productivity.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00440-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958599
679
2.515625
3
NWS poised for flood season with sharper tools for mapping risk - By Patrick Marshall - Mar 06, 2014 Record snowfalls this winter mean government weather forecasters will be looking for signs of heavier melt – and potential flooding – as spring nears. The National Weather Service has a number of tools to help gauge the...
<urn:uuid:b05851e6-a417-40e9-bf42-3353379fc82f>
CC-MAIN-2017-09
https://gcn.com/articles/2014/03/06/national-weather-service-maps.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00616-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958793
595
2.8125
3
We can protect our voice network with simple Auxiliary VLAN but sometimes to be more secure Auxiliary VLAN are not enough. In this case we can use Security appliances such firewalls or VPN termination devices or both. Firewall maybe seems like very clean and simple mechanism to protect RTP protocols transmitted voice p...
<urn:uuid:08188123-566f-45cc-8c7c-c08869e0e902>
CC-MAIN-2017-09
https://howdoesinternetwork.com/2012/protecting-voip-appliances
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00616-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923865
737
2.859375
3
Manufacturing Breakthrough Blog Friday April 29, 2016 In my last post we completed our series of posts on variation by discussing the basics of a Queuing System, two very important “laws of variability” and finally, a ten point summary of primary points, principles, and conclusions relative to understanding variability...
<urn:uuid:2d1a24e7-9439-4774-ab3e-b112a91bce93>
CC-MAIN-2017-09
http://manufacturing.ecisolutions.com/blog/posts/2016/april/paths-of-variation-part-1.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00140-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958675
1,016
2.65625
3
What's the Role of SDN and UC? Software-Defined Networks promise a more modern approach to allocating network resources for real-time traffic Maybe the only technology that has received more recent hype than WebRTC is Software Defined Networking. SDN represents the latest evolution of an approach that first reared its ...
<urn:uuid:bf1856f3-4699-4e1b-8e61-23f4c96aeabf>
CC-MAIN-2017-09
http://www.nojitter.com/post/240158913/whats-the-role-of-sdn-and-uc?google_editors_picks=true
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00492-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94374
871
2.75
3
Linux Tools for Your Desktop Though Microsoft Windows still leads all other desktops by a comfortable margin, the market share for Linux continues to go no place but up. In the wake of recent decisions by system vendors as different as Dell and IBM to offer desktop-ready PCs with Linux installed and widespread adoption...
<urn:uuid:c1bbf534-df2f-4c30-8e6b-dc2ace95133d>
CC-MAIN-2017-09
http://certmag.com/linux-tools-for-your-desktop/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00436-ip-10-171-10-108.ec2.internal.warc.gz
en
0.914678
1,216
2.640625
3
In my last article (http://news.tgc.com/msgget.jsp?mid=339671), I demonstrated how 1 + 1 can be equal to 1 by using a simple program of two instructions: I1 and I2 executing on two processors at the same time and simultaneous completing in about 1 clock tick. I concluded by posing the question: “can we do better?” In o...
<urn:uuid:5d2b0670-4e60-476f-993d-a160945b4ac4>
CC-MAIN-2017-09
https://www.hpcwire.com/2005/02/24/amdahl_s_law_1_1_1-1/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00612-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919959
860
3.1875
3
In this post I'll go through the basics for "stochastic use case testing". It is sometimes called also "Markov chaining" or "Markov testing". There are variations of this technique, of course, but my aim here is to cover the common ground and share some thoughts on where methods like this are best applied. Here (on the...
<urn:uuid:062c4d91-2d1b-4173-93c4-9f35c7329f30>
CC-MAIN-2017-09
https://www.conformiq.com/2012/08/understanding-stochastic-use-case-testing-and-markov-chaining/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00312-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942513
1,502
2.75
3
Despite all the news coverage about successful cyberattacks, developers are still writing code full of security vulnerabilities. Of course, nobody is perfect. We all make mistakes, and as software projects get more and more complex, it can be easy to mix potential problems. But that doesn't explain why so much software...
<urn:uuid:a0bf80da-5ac8-46f9-b361-f75ff5141df4>
CC-MAIN-2017-09
http://www.itnews.com/article/3136264/software/why-dont-developers-have-a-spellchecker-for-security.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00488-ip-10-171-10-108.ec2.internal.warc.gz
en
0.969977
2,117
2.53125
3
Networking 101: Understanding Multicast Routing Multicast has become a buzzword more than once in history. IP multicast means that one sender is sending data to multiple recipients, but only sending a single copy. It's very useful for streaming media, so let's explore how this works. Much like broadcast, there are spec...
<urn:uuid:fed0c059-5d2f-40c0-9bbd-9d6806cef0e8>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsp/article.php/3623181/Networking-101--Understanding-Multicast-Routing.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00608-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940729
1,419
3.890625
4
Many of us are lucky to live in a place where, for most people, the first two levels of Maslow’s Hierarchy of Needs are met. These consist of physiological needs, such as food and water, and safety needs, e.g., physical, economic, and health. These needs are usually met through personal resources or help from the gover...
<urn:uuid:14010e34-9710-41fa-bff8-cc3e673d737f>
CC-MAIN-2017-09
http://www.itworld.com/article/2719734/mobile/for-some-with-disabilities--gaming-fills-a-basic-need.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00132-ip-10-171-10-108.ec2.internal.warc.gz
en
0.97223
833
2.78125
3
Fortunately, two browser-side mechanisms have been introduced to mitigate or limit the impact from externally-included resources: Subresource Integrity and sandboxing. Subresource Integrity (SRI) allows developers to pin down certain versions of scripts or stylesheets which are included from external domains. The goal ...
<urn:uuid:16adc447-6ac7-455d-bc71-4f0ccf668d90>
CC-MAIN-2017-09
https://blog.compass-security.com/tag/javascript/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00132-ip-10-171-10-108.ec2.internal.warc.gz
en
0.847943
1,367
2.765625
3
A VPN (virtual private network) offers network connection possibility over an extensive physical distance (remoteness). But you need to know that it can work over both on private networks and public networks (Internet). VPN in simple words make possible for clients or whole LAN-s on other side of the internet to connec...
<urn:uuid:aa80deb2-cdfa-4553-8014-95e2c5210ea0>
CC-MAIN-2017-09
https://howdoesinternetwork.com/2011/vpn
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00484-ip-10-171-10-108.ec2.internal.warc.gz
en
0.90522
744
3.203125
3
Exploiting Big Data For Creating New Products And Innovation With the development of technology resources, organizations will increasingly depend on exploiting data for creating new products, services, innovation as well as changes in business processes. Big data is currently one of the most talked about issues in busi...
<urn:uuid:f023e73b-4d0c-4ed8-bc70-eeb211ca0e0e>
CC-MAIN-2017-09
https://cloudtweaks.com/2014/05/big-data/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00008-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950498
572
2.734375
3
14 Amazing DARPA Technologies On TapGo inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more. 1 of 14 The Defense Advanced Research Projects Agency has announced its latest technologi...
<urn:uuid:511d0d43-f1c4-4fa1-a2eb-6da649ec5f89>
CC-MAIN-2017-09
http://www.darkreading.com/risk-management/14-amazing-darpa-technologies-on-tap/d/d-id/1106551?cid=sbx_byte_related_mostpopular_byte_news_google_announces_android_42_new_nexus_ta&itc=sbx_byte_related_mostpopular_byte_news_google_announces_android_42_new_nexus_ta
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00304-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930689
573
2.9375
3
Wrapping a firewall around the perimeter is no longer sufficient to meet the needs of modern networks. Technologies such as IPS need to be pushed into the network, not just at the edge, but throughout the entire infrastructure. During Network World's recent Security Technology Tour, we received a lot of questions about...
<urn:uuid:a5e3d2de-a181-454c-bdba-c4b3b0896012>
CC-MAIN-2017-09
http://www.networkworld.com/article/2335574/network-security/what-is-an-ips--anyway-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00476-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955178
546
2.625
3
Following NASAs LeadBy Larry Dignan | Posted 2005-08-31 Email Print The UPS Brown Voyager? It could happen if private companies take over low-earth space travel and free up NASA to shoot for the stars. Meyers hopes to use NASA's suppliers to build what would be a second-generation space shuttle to ferry space-station c...
<urn:uuid:9bdb867f-cfe2-4d6d-8351-7c9dd2c1961b>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/Business-Intelligence/Should-NASA-Open-LowOrbit-Space-to-Business/1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00176-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949305
631
2.71875
3
It's been a rough year for the IT industry. The death of Apple co-founder Steve Jobs in October grabbed international headlines. But we also lost other major figures from almost every area of technology, including Xerox PARC founder Jacob E. Goldman, who died in late December. Here's one last look at some of the people...
<urn:uuid:27a5efe6-efe1-46fc-ba9a-bd707330b8e5>
CC-MAIN-2017-09
http://www.itworld.com/article/2733552/it-management/tech-luminaries-we-lost-in-2011.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00528-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966381
975
2.703125
3
Researchers working with the Oak Ridge Leadership Computing Facility’s (OLCF’s) Titan supercomputer are making the most of the system’s hybrid design, which pairs traditional CPUs with highly-parallel GPUs. As the fastest computer in the United States, Titan has a max theoretical speed of 27 petaflops, but as a recent ...
<urn:uuid:b65666c3-5b9c-457a-9dbb-e9d7d06fdd25>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/01/06/gpus-speed-early-science-apps/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00404-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926965
946
2.84375
3
The race for ever more powerful mobile processors may be keeping Qualcomm, Nvidia, and Samsung occupied for now, but ARM is focusing on another goal – designing ultra-low power processors. After years of research and various internal designs, the microchip company is now developing a new low-power microcontroller core,...
<urn:uuid:18b54a86-e719-4607-938d-c85c24700770>
CC-MAIN-2017-09
http://www.machinetomachinemagazine.com/2013/08/27/arm-processors-take-us-closer-to-internet-of-things/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00348-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942631
529
3
3
This FAQ lists all the popular VoIP definitions. - VoIP – Voice over Internet Protocol (also called IP Telephony, Internet telephony, and Digital Phone) – is the routing of voice conversations over the Internet or any other IP-based network. - SIP – Session Initiation Protocol – is a protocol developed by the IETF MMUS...
<urn:uuid:23fcb17c-7e06-4f81-a408-dd6163c0d4e4>
CC-MAIN-2017-09
https://www.3cx.com/pbx/voip-definitions/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00348-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910797
418
3.421875
3
Unbreakable encryption remains a pipe dream, even on a quantum Internet - By John Breeden II - May 08, 2013 The goal of unbreakable encryption has been a dream of governments since time immemorial. The ancient Greeks sent coded messages by way of a Scytale, which consisted of cloth wrapped around rods on which messages...
<urn:uuid:1143213f-ee49-4085-a9bd-be823a12ca52>
CC-MAIN-2017-09
https://gcn.com/articles/2013/05/08/unbreakable-encryption-quantum-internet.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00044-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958975
792
2.71875
3
SIP Methods / Requests and Responses SIP uses Methods / Requests and corresponding Responses to communicate and establish a call session. There are fourteen SIP Request methods of which the first six are the most basic request / method types: - INVITE = Establishes a session. - ACK = Confirms an INVITE request. - BYE =...
<urn:uuid:5adfb6d4-2f97-4ea5-b823-77161652da62>
CC-MAIN-2017-09
https://www.3cx.com/pbx/sip-methods/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00096-ip-10-171-10-108.ec2.internal.warc.gz
en
0.796287
307
2.515625
3
Two weeks have passed since a magnitude 9.0 earthquake and subsequent tsunami rocked eastern Japan, and while a recovery among the country's technology manufacturers has begun, it could be several months before things start to normalize. Many factories were closed immediately following the quake, and most have been gra...
<urn:uuid:16ce0ad3-eee9-48cf-aed3-6bdbcbd8aa8f>
CC-MAIN-2017-09
http://www.cio.com/article/2409849/it-strategy/two-weeks-after-japan-earthquake--it-industry-faces-hurdles.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00569-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964027
860
2.5625
3
Many Americans think the next 50 years will bring custom-ordered, made-to-order organ generation, teleportation and robots that will take care of the elderly and sick. And they're largely hopeful about technology in the future, with 59% optimistic that coming technological and scientific changes will make life better, ...
<urn:uuid:74bbd2db-f5bc-4719-84f1-601f26e5b53b>
CC-MAIN-2017-09
http://www.itworld.com/article/2698446/hardware/future-tech--americans-foresee-made-to-order-organs--teleportation-and-robots.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00269-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965892
847
2.71875
3
Cisco on Cisco Optical Networking Case Study: How Cisco IT Used CWDM to Interconnect Japanese Data Center Sites Cisco Systems® maintains two sales offices in Tokyo, Japan. One is located in the government district of the city known as Akasaka and the other in a commercial area known as Shinjuku. As is typical for enter...
<urn:uuid:081c4d07-dec9-40cd-b8cb-39942bbfa3db>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/about/cisco-on-cisco/enterprise-networks/cwdm-japanese-data-centers-web.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00445-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953312
3,989
2.53125
3
Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on. Out of all of those websites, however, how many unique passwords do you have? Not too many? If a ...
<urn:uuid:ad20bc7e-c720-4340-a47c-a60c159de744>
CC-MAIN-2017-09
https://www.entrust.com/passwords-weak-todays-digital-world/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00265-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950053
521
2.734375
3
Wikipedia Often Omits Important Drug InformationBy Reuters - | Posted 2008-11-25 Email Print Dr. Kevin A. Clauson of Nova Southeastern University in Palm Beach Gardens, Florida and his colleagues found few factual errors in their evaluation of Wikipedia entries on 80 drugs, but some entries were often missing important...
<urn:uuid:827ae4e5-181e-4cc5-8fec-4e664963c227>
CC-MAIN-2017-09
http://www.baselinemag.com/messaging-and-collaboration/Wikipedia-Often-Omits-Important-Drug-Information
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00493-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943317
631
2.65625
3
- Test for Heartbleed Vulnerability - Get details of a SSL certificate. - Detect weak ciphers and SSLv2, a version of SSL with known security vulnerabilities. About SSL Certificate Checking SSL (and TLS) provide encrypted communication over the Internet, SSL 2.0 has known vulnerabilities and it is recommended that it n...
<urn:uuid:254bc8a6-4767-4bfd-8f09-a3b158db4f58>
CC-MAIN-2017-09
https://hackertarget.com/ssl-check/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00085-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91817
175
3.109375
3
“There are many different silos of information that have been painstakingly collected; and there are a number of existing tools that bring some strands of data into relation. But there is no overarching tool that can be used across silos.” The sentiments behind this quote could apply to a wide range of scientific disci...
<urn:uuid:84126d83-f8af-4e96-b715-abc55ac1670d>
CC-MAIN-2017-09
https://www.hpcwire.com/2011/08/10/doe_focuses_on_scientific_data_integration/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00309-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947363
558
2.875
3
In 2020, both Harlingen and San Benito will have all the water they need, according to a state water agency website. However, Primera will fall short by 45 percent, says the new interactive State Water Plan website launched by the Texas Water Development Board. “This website is an example of the changes we are making t...
<urn:uuid:3886209e-f2d5-4346-a98c-6286ebba12cc>
CC-MAIN-2017-09
http://www.govtech.com/internet/Website-Predicts-Water-Needs-in-Texas-Communities.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00485-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938858
683
2.640625
3
The European Space Agency says it has completed what it calls the largest digital camera ever built for a space mission - a one billion pixel array camera that will help create a three-dimensional picture of the Milky Way Galaxy. Set to be launched onboard the ESA's galaxy-mapping Gaia mission in 2013, the digital came...
<urn:uuid:0ad158d4-6741-43bc-a215-33eed888a1dc>
CC-MAIN-2017-09
http://www.networkworld.com/article/2220129/security/billion-pixel-camera-set-to-snap-milky-way-shots.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00481-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921357
647
3.46875
3
The HAI problem 99,000 people die. – U.S. Centers for Disease Control Healthcare Associated Infections, or HAIs, are caused by patient exposure to any of a number of dangerous pathogens that can be passed by direct hand contact or by high-touch room surfaces, like bed rails, faucet handles, door knobs, telephone handse...
<urn:uuid:4837d454-c134-448f-ae5b-de5fa9149977>
CC-MAIN-2017-09
http://www.infectionpreventiontechnologies.com/next-gen-uv-validated-by-science/hai-problem.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00005-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927128
698
3.484375
3
Today, we’d like to get back to a few basics about the relationship between the public-switched telephone network and voice over IP. The PSTN includes a signaling system, a series of central offices and a distribution network. The PSTN employs a packet-based network called Signaling System 7 (SS7) or Common Channel Sig...
<urn:uuid:3dea0fd0-e701-45d2-ad3d-82fec0b2d8ab>
CC-MAIN-2017-09
http://www.networkworld.com/article/2324219/lan-wan/how-voip-relates-to-the-pstn.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00181-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910645
446
2.5625
3
Picture it: 2004, RSA Conference. Bill Gates proclaims that passwords are dead, explaining “People use the same password on different systems, they write them down and they just don’t meet the challenge for anything you really want to secure.” Flash forward to 2011: despite frequent reports of email hacks and enterpris...
<urn:uuid:b9721663-4b72-4690-9e24-cde243cb15d1>
CC-MAIN-2017-09
https://blog.gemalto.com/blog/2011/09/29/are-passwords-dead-yet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00477-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938366
689
2.6875
3
While it might seem like the stuff of science fiction, the cutting edge of technology and science has us on the cusp of some very exciting developments such as making Harry Potter's invisibility cloak a reality, making 3D holograms that can dance above your mobile device, making tiny blood-monitoring implants that can ...
<urn:uuid:982ab221-8637-4316-aac9-5be75a508f77>
CC-MAIN-2017-09
http://www.computerworld.com/article/2474946/emerging-technology/cool--invisibility-cloak--implant-calls-before-heart-attack--3d-hologram--immort.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00529-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930031
1,208
2.703125
3
In order to build more resilient data centers, many Cumulus Networks customers are leveraging the Linux ecosystem to run routing protocols directly to their servers. This is often referred to as routing on the host. This means running layer 3 protocols like OSPF (Open Shortest Path First) or BGP (Border Gateway Protoco...
<urn:uuid:c5350d2a-ae7b-4db3-9710-8a5625c64599>
CC-MAIN-2017-09
https://support.cumulusnetworks.com/hc/en-us/articles/216805858-Routing-on-the-Host-An-Introduction
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00529-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929902
2,576
2.5625
3
Mapping the tiny mouse brain is pushing the limits of information technology capabilities. By the end of the three-year project to map the mouse brain about one petabyte of data will have been generated, pushing scientists up against a range of technological limitations, according to the senior director of the Allen Br...
<urn:uuid:db63d5c6-95bf-4807-a656-69876b1258c5>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Database/RAM-Limitations-Strain-BioIT
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00229-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941795
165
2.984375
3
DELL EMC Glossary Two-factor authentication is also called strong authentication. Two Factor Authentication (2FA) is also called strong authentication and usually requires another proof, beyond just a password, for a user to assure their identity and gain access to a system, network, or application. Two-factor authenti...
<urn:uuid:0cee4892-a34b-48c9-99b0-ed7a9e204316>
CC-MAIN-2017-09
https://www.emc.com/corporate/glossary/two-factor-authentication.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00405-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917007
285
3.640625
4
Large-scale, worldwide scientific initiatives, such as the one that found the Higgs Boson or the one that is currently researching the depths of proteomics, rely on some cloud-based system to both coordinate efforts and manage computational efforts at peak times that cannot be contained within the combined in-house HPC...
<urn:uuid:df8e12c8-ca58-46c6-99a4-669b523b8308>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/05/21/cern_google_and_the_future_of_global_science_initiatives-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00225-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949776
1,105
2.75
3
BALTIMORE, MD--(Marketwired - Feb 24, 2014) - Kiddie Academy® says that Dr. Seuss's birthday, March 2, 2014, is a great day for families to think about ways to give their children the gift of a lifelong love of reading. "While learning to read is a gradual process, involving letter sounds, vocabulary, grammar and compr...
<urn:uuid:cecf7c9e-c4a4-4576-8b6a-e271dfb843c3>
CC-MAIN-2017-09
http://www.marketwired.com/press-release/kiddie-academyr-urges-families-share-joy-reading-with-their-children-as-dr-seusss-birthday-1882180.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00401-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955615
733
2.796875
3
The original article on RAID, entitled "The Quick Skinny on Raid" appeared on Ars back in October of 1998. We recently decided that we should beef this section up. Why? For one, after Panders' review of the Promise FastTrak66 IDE RAID controller, we quickly came to realize that there's a serious hunger out there for in...
<urn:uuid:276bd923-3491-449b-be4a-3e70fa556ce0>
CC-MAIN-2017-09
https://arstechnica.com/features/2000/05/raid/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00577-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954607
1,283
2.609375
3
In a special IT Blogwatch Extra, Richi Jennings watches bloggers celebrate the Web's 20th birthday. Not to mention the movable type rap... Carrie-Ann Skinner swells with patriotic pride: While the internet was developed in the 50s, the web or the network of content servers that allow information to be shared, was not c...
<urn:uuid:b0400c0e-ad60-482e-a1eb-43e1c4fbab0a>
CC-MAIN-2017-09
http://www.computerworld.com/article/2481139/e-commerce/web-is-20-today--anyone-for-cake-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00218-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952448
846
2.640625
3
Research from Norton estimates the global price tag of consumer cybercrime now topping some US$113 billion annually4 which is enough to host the 2012 London Olympics nearly 10 times over. The cost per cybercrime victim has shot up to USD$298: a 50% increase over 2012. In terms of the number of victims of such attacks, ...
<urn:uuid:9a1df679-a8dd-492b-aee1-3f51528aaeb2>
CC-MAIN-2017-09
https://www.infosecurity-magazine.com/white-papers/hidden-dangers-lurking-in-ecommerce/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00394-ip-10-171-10-108.ec2.internal.warc.gz
en
0.863073
180
2.546875
3
Chapter 3: Common IPv6 Coexistence Mechanisms As the name suggests, transition mechanisms help in the transition from one protocol to another. In the perspective of IPv6, transition basically means moving from IPv4 to IPv6. One day, IPv6 networks will completely replace today’s IPv4 networks. For the near term, a numbe...
<urn:uuid:7230cacd-a9a8-46bc-a29f-379e7c46d868>
CC-MAIN-2017-09
http://www.networkworld.com/article/2202943/lan-wan/book-excerpt-from-ipv6-for-enterprise-networks.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00570-ip-10-171-10-108.ec2.internal.warc.gz
en
0.884374
106
2.59375
3