text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Most people–especially in the West–know very little about the Middle East and the people that live there. This lack of knowledge hurts our ability to understand, and engage in intelligent discussion about, current events. For example, frighteningly few know the difference between Sunni and Shia Muslims, and most think ...
<urn:uuid:4931a17a-a26f-458c-8ebb-0789c0ba1568>
CC-MAIN-2017-09
https://danielmiessler.com/blog/10-facts-every-westerner-should-know-about-the-middle-east/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00446-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939487
754
2.921875
3
Data Mining and Predictive Analytics Software For Microsoft Excel: Page 2 Data Mining and Predictive Analytics in Four Steps The tool allows you to mine your own data to find patterns using only four steps — prepare, analyze, predict and report. It is also designed to automate the process of algorithm selection, parame...
<urn:uuid:b565473b-8081-4ea3-8c95-9ef0057e59eb>
CC-MAIN-2017-09
http://www.enterpriseappstoday.com/business-intelligence/data-mining-and-predictive-analytics-software-for-microsoft-excel-2.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00622-ip-10-171-10-108.ec2.internal.warc.gz
en
0.896541
481
2.625
3
December 1940 – March 2015 Co-founder of SAP A trained physicist and amateur astronomer, Tschira played a pioneering role in business software. Tschira started his professional career at IBM in the mid-1960s, working as a systems analyst and in the emerging field of enterprise software. That led Tschira and several oth...
<urn:uuid:339dc294-7833-4c35-8e6c-0027092ad605>
CC-MAIN-2017-09
http://www.itnews.com/article/3016810/it-industry/tech-luminaries-we-lost-in-2015.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00622-ip-10-171-10-108.ec2.internal.warc.gz
en
0.985292
147
2.546875
3
This guest blog post is a part of our cyberSAFE blog series focusing on back-to-school security, privacy and identity topics. It comes to us from Sue Scheff, author and family internet safety advocate. She is the founder and president of Parents’ Universal Resource Experts Inc. (P.U.R.E.) and has been helping to educat...
<urn:uuid:065b35af-f4f0-4ced-a86d-cb2de5851e8d>
CC-MAIN-2017-09
https://www.csid.com/2014/08/teaching-your-teen-how-to-be-a-cyber-smart-citizen/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00566-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93929
957
2.828125
3
Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations. This perception is due in part to the Russian government’s alleged involvement in the cyber attacks accompanying its invasion of Georgia in 2008, as well as the rampant speculation that Moscow was behind ...
<urn:uuid:6622de1f-cef3-4823-93c0-50ac97158783>
CC-MAIN-2017-09
https://www2.fireeye.com/apt28.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00566-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929068
212
2.765625
3
Robert Sloan, a professor at the University of Illinois at Chicago, found an AI system to be as smart as a four-year-old. Scientists often talk about creating artificial intelligence, but how "intelligent" are these systems really? Researchers at the University of Illinois at Chicago came up with an answer after giving...
<urn:uuid:b3afea7a-8232-40cf-b5fd-8ea4276e8f5b>
CC-MAIN-2017-09
http://www.cio.com/article/2384126/innovation/top-artificial-intelligence-system-is-as-smart-as-a-4-year-old.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00142-ip-10-171-10-108.ec2.internal.warc.gz
en
0.971727
539
3.109375
3
Computer users with rudimentary skills will be able to program via screen shots rather than lines of code with a new graphical scripting language called Sikuli that was devised at the Massachusetts Institute of Technology. With a basic understanding of Python, people can write programs that incorporate screen shots of ...
<urn:uuid:f1c98fe3-a0aa-4275-8bea-506176bd2a49>
CC-MAIN-2017-09
http://www.networkworld.com/article/2242620/software/mit-creates-picture-driven-programming-for-the-masses.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00142-ip-10-171-10-108.ec2.internal.warc.gz
en
0.932455
616
3.875
4
As Google pushes for greater security across the Internet through HTTPS encryption, unprepared businesses are ironically left MORE vulnerable to cyber attacks through encrypted traffic. In case you haven’t heard, Google is attempting to enhance security across the World Wide Web by pushing for all websites on the Inter...
<urn:uuid:0a736258-d6f9-4a1e-ad76-5ce3d34a4c68>
CC-MAIN-2017-09
https://www.datatechitp.com/2015/04/googles-push-for-security-leaves-unprepared-businesses-vulnerable-to-attack/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00142-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920184
1,781
2.921875
3
This week on Security Levity... spam laws around the world. Many of us know about the U.S. federal law regulating spam, known as the CAN-SPAM Act (or at least we think we do). But what about the laws internationally? First: a disclaimer: IANAL (I am not a lawyer). If you use this blog post as a substitute for legal adv...
<urn:uuid:b6bb280d-1751-46ed-823a-2de3e26f1585>
CC-MAIN-2017-09
http://www.computerworld.com/article/2467818/internet/spam-laws-around-the-world.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00086-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951503
829
2.59375
3
Some of the world’s biggest IT companies and their suppliers are contaminating rivers and underground wells in developing countries with a wide range of hazardous chemicals, according to Greenpeace. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant co...
<urn:uuid:c28d3d42-0719-49e7-b146-8268335767e6>
CC-MAIN-2017-09
http://www.computerweekly.com/news/2240079970/IT-firms-contaminating-the-environment-says-Greenpeace
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00438-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94002
745
2.65625
3
Why maps matter - By Frank Konkel - Mar 17, 2014 People used to use maps so they wouldn't get lost. But in recent years, access to the Global Positioning System and the proliferation of mobile technology have made paper-based maps almost irrelevant. Unless you're in uncharted territory, it's hard to get lost anymore. B...
<urn:uuid:064cec3f-6216-40d3-88cf-240d972c19a7>
CC-MAIN-2017-09
https://fcw.com/articles/2014/03/17/why-maps-matter.aspx?admgarea=TC_ExecTech
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00614-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946892
2,426
2.71875
3
Refueling an aircraft while it is flying can be a tricky-enough proposition but refueling an unmanned jet from another unmanned jet sounds like a scene for a James Bond movie. But such a tricky procedure is apparently within reach as the Defense Advanced Research Projects Agency, this week said it successfully tested t...
<urn:uuid:3e03ac15-cfc6-40d6-9fae-7afb53b2db7c>
CC-MAIN-2017-09
http://www.networkworld.com/article/2223266/security/darpa-shows-off-unmanned-aircraft-in-flight-refueling-technology.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00014-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963544
542
3.25
3
This handy cheat-sheet helps keep you straight on evolving storage terminology. Use this handy cheat-sheet to help keep straight the evolving list of storage terminology. Direct-attached storage (DAS) Storage connected directly to a server. Fibre Channel An expensive short-distance networking technology used for buildi...
<urn:uuid:c4b26a33-cada-40cf-8b0d-fc14427095b7>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Data-Storage/Know-Your-Storage-Technologies
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00134-ip-10-171-10-108.ec2.internal.warc.gz
en
0.868124
316
2.734375
3
Simplicity is: logging in without a username or password “I really like what I can do in the web interface, but having to enter my username and password to login each time is extra work.” We’ve seen the above comment many times. Identity verification, as everyone who has not been lost on a desert island for 10 years kn...
<urn:uuid:bf5f2848-0ffa-4008-8be1-8c31551e7f2f>
CC-MAIN-2017-09
https://luxsci.com/blog/simplicity-is-logging-in-without-a-username-or-password.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00134-ip-10-171-10-108.ec2.internal.warc.gz
en
0.898893
1,064
2.5625
3
Wan Z.,Nanjing Forestry University | Wan Z.,Huangshan University | Li Y.,Nanjing Forestry University | Chen Y.,Nanjing Forestry University | And 3 more authors. Phytoparasitica | Year: 2013 Epidemic outbreaks of rust disease have been observed in most of the black cottonwood (Populus trichocarpa) plantations in the sou...
<urn:uuid:93f6f9e7-03e5-4e39-bf4b-9e28678cc971>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/hubei-forestry-academy-150464/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00482-ip-10-171-10-108.ec2.internal.warc.gz
en
0.92744
1,894
2.53125
3
Banking Trojans traditionally use configuration files that have been stored on the computer under attack. These configuration files contain the addresses of the compromised websites, and the code, called the Webinject, which they are seeking to add to these websites via the banking Trojans. This code is then responsibl...
<urn:uuid:1a56648b-dc78-4347-b63d-ac070a2726a2>
CC-MAIN-2017-09
https://www.gdata-software.com/news/3338-spying-via-the-cloud-for-cash/page/2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00006-ip-10-171-10-108.ec2.internal.warc.gz
en
0.851946
187
2.703125
3
In a post-mobile world, we will be connected via devices with billions of other objects, from refrigerators to cars. In a post-mobile world, the lines will blur. An interconnected network of devices and objects will offer better connectivity and functionality. In the early 2000s, mobile devices like the Palm and Blackb...
<urn:uuid:cc4f0c00-2124-445c-b7ee-b444c866bba2>
CC-MAIN-2017-09
https://www.broadsoft.com/work-it/entering-the-post-mobile-phone-age
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00182-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935677
703
3.15625
3
The inventors of public key cryptography have won the 2015 Turing Award, just as a contentious debate kicks off in Washington over how much protection encryption should really provide. The Association for Computing Machinery announced Tuesday that Whitfield Diffie and Martin Hellman received the ACM Turing Award for th...
<urn:uuid:8d0411f0-821c-4bfe-a088-b8314640c126>
CC-MAIN-2017-09
http://www.itnews.com/article/3039909/as-encryption-debate-rages-inventors-of-public-key-encryption-win-prestigious-turing-award.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00534-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964225
498
3.25
3
To prevent Denial of service attrack in the EXOS switches, DoS Protection should be used. DoS Protection is designed to help prevent this degraded performance by attempting to characterize the problem and filter out the offending traffic so that other functions can continue. When a flood of CPU bound packets reach the ...
<urn:uuid:c3d4474a-0daa-487e-80e6-d8bc390fea3d>
CC-MAIN-2017-09
https://gtacknowledge.extremenetworks.com/articles/Q_A/What-is-Blacknurse-and-how-to-prevent-it
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00530-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915912
178
2.671875
3
Despite all the recent fanfare about the latest CPU wonderchips from Intel, AMD and IBM, not everyone has hopped aboard the multicore train. In a recent column in Forbes, NVIDIA chief scientist, Bill Dally, argues that the traditional multicore implementation of Moore’s Law is a dead end. He sums it up thusly: To conti...
<urn:uuid:501143ea-9ca9-48c7-9299-e20174f368c2>
CC-MAIN-2017-09
https://www.hpcwire.com/2010/05/06/dally_disses_multicore/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00174-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931498
1,268
2.90625
3
The Impact of Insider Threats – The South Korea Episode. In Layman’s Terms, What Happened? At the center of the story is an employee who was working as a software engineer for three credit card companies. Over the course of a year and a half, this employee copied data from corporate servers to his personal drive. What ...
<urn:uuid:ddad6f97-bad9-4631-bbc8-f49c59353699>
CC-MAIN-2017-09
http://blog.imperva.com/2014/01/the-impact-of-insider-threats-the-south-korea-episode.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00050-ip-10-171-10-108.ec2.internal.warc.gz
en
0.980238
280
2.5625
3
WAN – The phrase “wide area network” in a word is known as WAN. That wide ranging network works collectively with the help of hardware such as computers and related resources. Cisco has introduced a lot of devices such as modem and routers for WAN, protocols and technologies such as ATM, Cisco frame relay etc so to pro...
<urn:uuid:9cff1317-8980-4054-a79d-72e36233de90>
CC-MAIN-2017-09
https://howdoesinternetwork.com/tag/wan
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00226-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954399
222
3.65625
4
May 8, 2016 was a day that garnered much discussion. On that day, Germany’s solar and wind power peaked at 11 am local time, enabling renewables to supply 54.8 GW at a time when demand—according to provisional data from Agora Energiewende, a research institute in Berlin—was running at 57.8 GW. In plain terms, Germany, ...
<urn:uuid:26ecdfc8-24e3-4f86-9820-2d805903c733>
CC-MAIN-2017-09
https://www.accenture.com/bd-en/insight-highlights-utilities-key-unlocking-potential-europe
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00398-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946082
927
2.671875
3
Instruct by asking questions and not lecturing. Answer questions with a question. At first this sounds like a simple corporate learning strategy. However, as you try to implement the Socratic style, you may find it quite daunting. Following the ABCs will help master the technique that will aid in monumental development...
<urn:uuid:b0038448-1d39-4242-ae19-049b518d0b37>
CC-MAIN-2017-09
http://blog.contentraven.com/learning/maximize-learning-with-the-abcs-of-the-socratic-method
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00098-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947365
564
3.265625
3
Nine years late, the Air Force is finally ready to launch a new missile-spotting satellite that it says will usher in "a new era in persistent infrared surveillance." Barring further delays, the first of four Space-Based Infrared System satellites will blast off May 6 and climb to an altitude of about 22,200 miles, whe...
<urn:uuid:8ec59398-a423-4a4b-9bcd-0aa15a1b8e15>
CC-MAIN-2017-09
http://www.nextgov.com/health/2011/04/nearly-a-decade-behind-schedule-new-satellite-is-to-provide-earlier-missile-launch-warning/48961/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00098-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944991
733
2.640625
3
Whether it happens with that key memo left unfinished, the last scene of a movie unwatched or an epic gaming battle interrupted, it's likely that, at one time or another, you've been left with a dead notebook battery at the worst possible moment. What can you do about it? "Notebooks are not as efficient as they could b...
<urn:uuid:cb39beaa-99be-43d4-849a-6d647fd16523>
CC-MAIN-2017-09
http://www.cio.com/article/2375712/laptop-computers/boost-that-battery--tips-and-tricks-for-laptops.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00395-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936856
2,870
2.53125
3
Technology surrounding the Internet is constantly evolving. Many programs that helped allow the Internet expand and become what it is today are still in use. They stay relevant by issuing updates that often bring more functionality while meeting the evolving needs of Web developers and users. One program, however, has ...
<urn:uuid:09b9b0ac-c38f-4af8-9a02-a370e9c2239e>
CC-MAIN-2017-09
https://www.apex.com/time-cut-back-java/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00623-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958718
539
2.734375
3
GCN at 25: NASA's expanding storage universe DATA PAYLOAD: The Hubble telescope has collected 120T of data. Electronic data storage has been a concern for government agencies for as long as there has been electronic data. And perhaps no agency has had to handle a bigger data load than NASA. The Oct. 29, 1990, issue of ...
<urn:uuid:3a990885-8c96-4909-8995-e2678ad5d271>
CC-MAIN-2017-09
https://gcn.com/Articles/2007/05/04/GCN-at-25-NASAs-expanding-storage-universe.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00391-ip-10-171-10-108.ec2.internal.warc.gz
en
0.969813
203
2.84375
3
NASA's Super-Tiger Balloon Breaks Records / February 5, 2013 After 55 days, 1 hour and 34 minutes spent at 127,000 feet in the air, the Super-TIGER balloon (its official name is the Super Trans-Iron Galactic Element Recorder balloon) broke the record for longest flight by a balloon of its size, which was 46 days, accor...
<urn:uuid:5bf6e674-397c-4069-8303-7ce8662e2343>
CC-MAIN-2017-09
http://www.govtech.com/photos/Photo-of-the-Week-NASAs-Super-Tiger-Balloon-Breaks-Records.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00567-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939493
219
3.015625
3
Texas Instruments networks its calculators Anyone who has taken a calculus class in the last 20 years is sure to also have a great deal of experience plugging figures into a TI-8X graphic calculator, and I'm sure I'm not alone in feeling a certain pang of geeky nostalgia for the TI-85, a standard-issue tool for high sc...
<urn:uuid:a09a9e49-67c6-4fe4-911a-4950201d2207>
CC-MAIN-2017-09
https://betanews.com/2010/01/14/texas-instruments-networks-its-calculators/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00567-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951439
306
2.515625
3
Not since World War II has encryption received so much attention. Germany, during that time, had some of the most able scientists and cryptographers, but the Allies cracked Germany's submarine codes and discovered valuable information on Germany's strategic plans. Today, encryption has become an important key in securi...
<urn:uuid:26c555c5-b9a3-4b4b-b3f5-477af8fb4550>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Simple-Concept-Complex-Technology-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00319-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920374
2,402
3.578125
4
2FA (Two-Factor Authentication) All techniques used to strengthen typical Username/password login session (e.g. single factor authentication) by adding a second security challenge. 3FF (3rd Form Factor) A very small SIM card, also known as micro-SIM, for use in small mobile device. 3G (Third Generation) The broadband t...
<urn:uuid:0b65fe1b-123e-45ed-a658-265d18bafcf9>
CC-MAIN-2017-09
http://www.gemalto.com/techno/glossary
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00087-ip-10-171-10-108.ec2.internal.warc.gz
en
0.877083
3,662
2.546875
3
by Phillip Tracy, RCR Wireless News Complex event processing is an emerging network technology commonly used in the “internet of things” that uses distributed message-based systems, databases and applications to derive conclusions from data in real time or near-real time. It is a kind of computing in which incoming dat...
<urn:uuid:055c42d6-fe3e-48c0-98c3-973e5282c31a>
CC-MAIN-2017-09
http://www.complexevents.com/2016/11/23/what-is-complex-event-processing-and-why-is-it-needed-for-iot/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00263-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948845
603
2.703125
3
Measuring Our World with Wireless Sensor Networks I recently interviewed Seapahn Megerian, a professor in the Electrical and Computer Engineering Department at the University of Wisconsin, about wireless sensor networks for an upcoming feature for CertMag’s Systems & Networks community. He talked about some very intrig...
<urn:uuid:e2008337-a3d7-4b69-853b-9c5bef0053ef>
CC-MAIN-2017-09
http://certmag.com/measuring-our-world-with-wireless-sensor-networks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00435-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95346
530
2.625
3
According to the British Library, the average life expectancy of a Web site is between 44 and 75 days and every six months, 10% of .uk Web pages vanish or are replaced by new material. "With so much material now published online, and considering the growing influence of the Internet on British culture and society, the ...
<urn:uuid:0a1d0dcd-d2a1-4364-bdb1-c0b7fac7155d>
CC-MAIN-2017-09
http://www.networkcomputing.com/storage/ibm-aids-british-library-web-archive/826708968
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00135-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938637
384
3.28125
3
When Education Gets Too VirtualStudents can use technology to undermine the integrity of education. The visions of how technology can help students learn are promising. The reality of how students can use technology to undermine the integrity of education is already here. The cover story of the new issue of Information...
<urn:uuid:97827369-b106-4590-9b7d-329cf3d8bb60>
CC-MAIN-2017-09
http://www.darkreading.com/security/when-education-gets-too-virtual/d/d-id/1109683?cid=sbx_iwk_related_news_security_smb&itc=sbx_iwk_related_news_security_smb
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00011-ip-10-171-10-108.ec2.internal.warc.gz
en
0.978892
657
2.828125
3
Cloud computing brings great promise, but also confusion to the IT industry. Key questions are answered here. Everyone in the IT industry is talking about cloud computing, but there is still confusion about what the cloud is, how it should be used and what problems and challenges it might introduce. This FAQ will answe...
<urn:uuid:ee0810a2-8dd4-4343-8bd3-4917f7d69297>
CC-MAIN-2017-09
http://www.networkworld.com/article/2268449/virtualization/faq--cloud-computing--demystified.html?page=1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00187-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949917
2,258
2.578125
3
Connected cars are poised to become one of the biggest changes in the driving experience since the invention of the automobile, and they could be on the road within a decade. They present many exciting opportunities, but also new threats to our privacy and security. In this post, we'll dive into exactly what lies behin...
<urn:uuid:62c7452a-946b-4ceb-a87a-4aed5e987ad7>
CC-MAIN-2017-09
https://ctovision.com/connected-cars-cost-privacy/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00187-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9703
851
2.671875
3
As the World Wide Web celebrates its 25th year Wednesday, top techies are looking ahead to the next 25 years when they say the Web will be woven more deeply, and seamlessly, into our lives. A Pew Internet Research Project report finds that techies believe that by 2039, Internet accessibility will be like flipping a swi...
<urn:uuid:e95b0aa5-b852-4766-82b7-59018a100f5e>
CC-MAIN-2017-09
http://www.cio.com/article/2377967/internet/techies-see-future-where-web-flows-like-electricity.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00307-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947445
781
2.53125
3
In a disturbing echo of Google's mapping of home Wi-Fi networks as part of its Streetview project, an ethical hacker has found nearly half of home Wi-Fi networks can be hacked in less than five seconds, according to a study. By submitting your personal information, you agree that TechTarget and its partners may contact...
<urn:uuid:8e25fa88-7b93-44c3-ad79-8323e7c78d1f>
CC-MAIN-2017-09
http://www.computerweekly.com/news/1280094062/40000-Wi-Fi-UK-hotspots-open-to-hackers
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00307-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958193
400
2.609375
3
Fundamentals of iOS Application Development This course starts off with reviewing the basics of Xcode 6 and the iOS 8 SDK with the creation of a simple application. From there you will learn to integrate the iOS 8 interface elements incorporating Apple's new Swift programming language. You will learn how to use buttons...
<urn:uuid:0a2d010a-edab-4d09-b87b-d2417ac4f328>
CC-MAIN-2017-09
https://www.globalknowledge.com/ca-en/course/120585/fundamentals-of-ios-application-development/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00307-ip-10-171-10-108.ec2.internal.warc.gz
en
0.875712
115
2.703125
3
In 2014, IOActive disclosed a series of attacks that affect multiple SATCOM devices, some of which are commonly deployed on vessels. Although there is no doubt that maritime assets are valuable targets, we cannot limit the attack surface to those communication devices that vessels, or even large cruise ships, are usual...
<urn:uuid:6c465474-c6b2-4e81-a785-9708e216ec6e>
CC-MAIN-2017-09
http://blog.ioactive.com/2015/12/maritime-security-hacking-into-voyage.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00483-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934618
1,917
2.984375
3
Robotics Competition Inspires Girls’ Interest in Science and Technology On April 16-18, six Girl Scout teams from around the country will travel to the Georgia Dome to participate in the 2009 FIRST (For Inspiration and Recognition of Science and Technology) Robotics World Championship. The girls will compete against mo...
<urn:uuid:5616c768-8eca-4604-be4d-0882d19cab5c>
CC-MAIN-2017-09
http://certmag.com/robotics-competition-inspires-girls-interest-in-science-and-technology/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00535-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945926
379
2.890625
3
A security researcher has developed a tool that can automatically detect sensitive access keys that have been hard-coded inside software projects. The Truffle Hog tool was created by U.S.-based researcher Dylan Ayrey and is written in Python. It searches for hard-coded access keys by scanning deep inside git code repos...
<urn:uuid:f2371684-75e6-4f6d-9f51-58b32d4fe4af>
CC-MAIN-2017-09
http://www.csoonline.com/article/3155421/security/this-tool-can-help-weed-out-hard-coded-keys-from-software-projects.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00535-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910616
424
2.515625
3
Many technologies originally intended for the enterprise end up trickling down into the consumer market at some point. Some of these technologies (ethernet or virtualization, for instance) are more practical than others; but if businesses find a use for a specific piece of technology, then chances are good that consume...
<urn:uuid:0d68c0be-d659-4c65-aa51-db004860cb94>
CC-MAIN-2017-09
http://www.itworld.com/article/2726932/storage/how-to-speed-up-your-nas-with-iscsi.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00003-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917141
2,195
3.21875
3
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and Bitdefender. "Recently, we have seen an uptick in the amount of nefarious AutoIt tool code...
<urn:uuid:b490efe7-4440-4ed6-852b-69ff8e986a3e>
CC-MAIN-2017-09
http://www.networkworld.com/article/2166047/byod/autoit-scripting-increasingly-used-by-malware-developers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00055-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945445
693
2.515625
3
As part of Green House Data’s recent acquisition of FiberCloud, the company gained three data centers in the state of Washington, each connected via redundant fiber. These network links are further improved through Multiple Protocol Label Switching (MPLS) network technology, which increases data center Quality of Servi...
<urn:uuid:c8215e0c-c28b-49c5-9a3e-862b61583da4>
CC-MAIN-2017-09
https://www.greenhousedata.com/blog/improving-data-center-qos-through-mpls-network-connections
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00351-ip-10-171-10-108.ec2.internal.warc.gz
en
0.909985
455
2.703125
3
A NASA spacecraft is sending back evidence that a deep crater on Mars once held a groundwater-fed lake. The information is further evidence that the Red Planet has a history of water. Last fall, NASA scientists discovered evidence indicating Mars once sustained a vigorous, thousand-year water flow. The water data fits ...
<urn:uuid:b58c4a3a-b0dd-43f8-ace8-047e198d4a45>
CC-MAIN-2017-09
http://www.computerworld.com/article/2494470/emerging-technology/nasa-finds-evidence-of-ancient-crater-lake-on-mars.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00403-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944582
541
3.84375
4
XFS: It's worth the wait In 1994, Silicon Graphics Inc., of Mountain View, Calif., (SGI) released a new journaled file system on IRIX, the company's System V-based version of UNIX. This advanced file system, called XFS, replaced SGI's old EFS (Extent File System) file system, which was designed similar to the Berkeley ...
<urn:uuid:2297ab70-3f3d-4b20-a80e-a84c605f5319>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netos/article.php/623661/XFS-Its-worth-the-wait.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00523-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940979
2,035
2.78125
3
Trojan:Win32/Peals.B!plock is a threat identified by Microsoft Security Software. This is a typical malware that targets the core system of Windows in order to complete its tasks. Trojan:Win32/Peals.B!plock was made to execute a series of commands once it gets inside the system. It will gather data like system settings...
<urn:uuid:85c97cda-34bc-4bcc-81a9-6e18f42fe0b0>
CC-MAIN-2017-09
https://malwarefixes.com/threats/trojanwin32peals-bplock/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00223-ip-10-171-10-108.ec2.internal.warc.gz
en
0.889052
924
2.703125
3
Cloud computing naysayers have long cited security and privacy as their number one concerns. While more and more companies are adopting cloud services, many corporations and small businesses are still hesitant to embrace the cloud because of concerns about lax security and hacker attacks. Companies like Microsoft, Goog...
<urn:uuid:70719485-13f3-4a4c-8ccb-e25e91f2d8b6>
CC-MAIN-2017-09
https://cloudtweaks.com/2012/11/how-cloud-computing-companies-make-their-data-centers-hacker-proof/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00575-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948295
655
2.703125
3
Many security experts have talked about quarantining infected computers, but Microsoft has proposed a plan that each PC would be required to present a "health certificate" or else be considered too sick to connect to the Internet.Scott Charney, Microsoft’s vice president of trustworthy computing, presented his idea of ...
<urn:uuid:db315954-7c91-4130-b678-7cb17608bc1b>
CC-MAIN-2017-09
http://www.networkworld.com/article/2227388/microsoft-subnet/microsoft-proposes-each-pc-needs-a-health-certificate-or-no-net-access-allowed.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00451-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946389
1,031
2.640625
3
Science.gov 4.0 delves deep into the Web - By Trudy Walsh - Feb 16, 2007 The latest version of Science.gov, the search portal that trawls the Web for scientific information in 30 federal scientific databases and more than 1,800 Web sites, features a relevancy ranking architecture that can retrieve the full text of docu...
<urn:uuid:4b91b8d2-cb0d-499a-bfc4-92a84652072a>
CC-MAIN-2017-09
https://gcn.com/articles/2007/02/16/sciencegov-40-delves-deep-into-the-web.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00451-ip-10-171-10-108.ec2.internal.warc.gz
en
0.871661
403
2.5625
3
A Legacy of Innovation: Timeline of Motorola history since 1928 Since 1928, Motorola has been committed to innovation in communications and electronics. Our company has achieved many milestones in its 85-plus year history. We pioneered mobile communications in the 1930s with car radios and public safety networks. We ma...
<urn:uuid:7add4650-e6cf-49af-92da-7789cce8e1d7>
CC-MAIN-2017-09
https://www.motorolasolutions.com/en_us/about/company-overview/history/timeline.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00572-ip-10-171-10-108.ec2.internal.warc.gz
en
0.897853
3,459
2.78125
3
How Does a Magnetic Stripe Encoder Work?February 8, 2017 Written by Ryan McCarthy A magnetic stripe encoder is a hardware device that can write information or data onto a plastic PVC card. Magnetic stripe encoding allows ID badges to serve as more than just simple visual identification. Also called a “swipe card,” magn...
<urn:uuid:2990e15d-89e3-49ee-9eb0-542077054eda>
CC-MAIN-2017-09
https://www.idwholesaler.com/blog/how-does-a-magstripe-encoder-work/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00568-ip-10-171-10-108.ec2.internal.warc.gz
en
0.890285
849
2.578125
3
When you select a password, you might choose to store it in a password manager, write it down, or commit it to memory (see How to remember passwords for some advice). Sometimes, however, things go wrong: You find yourself without access to your password manager, you lose the paper on which you recorded your passwords, ...
<urn:uuid:b5529df4-c665-41ae-82d3-038d55fc12ce>
CC-MAIN-2017-09
http://www.itworld.com/article/2716217/security/when-password-security-questions-aren-t-secure.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00492-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941814
1,418
2.828125
3
Microsoft's data center cooling a breath of fresh air We all know that heat is the enemy of computers. In fact, if we think of computers in terms of an ecosystem, heat is probably their only naturally occurring predator. And it’s ironic that they generate it themselves, even though it’s simple physics. You bring electr...
<urn:uuid:90094c29-4d70-4c01-b107-c302bfa33970>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2013/02/microsoft-data-center-cooling-breath-fresh-air.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00012-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94457
853
2.859375
3
LAS VEGAS -- French company Induct demonstrated for the first time in the U.S. a driverless eight passenger robotized shuttle, design for transportation in city centers and campus settings. The all-electric shuttle, called Navia, looks a bit like an oversized golf cart, but instead of seats, passengers lean against pad...
<urn:uuid:20f8f20e-f1a2-4b47-a49f-8e17b84e44c5>
CC-MAIN-2017-09
http://www.cio.com/article/2379825/automotive/driverless-shuttle-aimed-at-campuses--inner-cities.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00364-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966038
793
2.53125
3
"The Hobbit," J.R.R. Tolkien's famous story of which the movie version opens Dec. 14, was first published in 1937. The world of Middle Earth was set in an indeterminate time, but looked remarkably like an idealized early 19th-century England, though well-stocked with wizards, dwarfs, elves, dragons, trolls, goblins and...
<urn:uuid:eeeb5986-e45b-4b6d-92e9-8efdf9d66772>
CC-MAIN-2017-09
http://www.cio.com/article/2389672/wireless-networking/-the-hobbit-2-0-----how-mobile-technology-would-improve-j--r--r--tolkien-s-famou.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00364-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965278
2,296
2.765625
3
Bad Sector Recovery Hard drives are built in a way so that they never return unreliable data. This means that if a hard drive cannot guarantee 100 percent accuracy of the data requested, it will simply return an error and will never give away any data at all. This article explains how bad sector recovery actually works...
<urn:uuid:b0aed521-3faf-42bf-a45a-3789eac85f74>
CC-MAIN-2017-09
https://articles.forensicfocus.com/2013/01/21/bad-sector-recovery/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00184-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943146
1,801
3.125
3
Technology In The Classroom With the back-to-school season now upon us, parents, students and teachers everywhere are once again struggling with the perpetual challenge of making kids job-ready in a high-speed and fast-changing environment. There is little doubt in anyone’s mind that information technology in the class...
<urn:uuid:2c8e7e38-c5af-468e-934b-fb74891ca984>
CC-MAIN-2017-09
https://cloudtweaks.com/2013/09/the-education-revolution-cloud-in-the-classroom/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00184-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952437
717
2.625
3
Intranets are private networks that use standard Internet access methods. By definition, an intranet site is restricted to use within an organization. No public access is allowed. Unlike firewall-protected networks, intranets can't be seen by the outside world. Out of sight is out of mind -- and out of reach. Users acc...
<urn:uuid:20c00870-1073-44a4-8eb6-c1104b9f4315>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Intranets-For-Internal-Publishing-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00360-ip-10-171-10-108.ec2.internal.warc.gz
en
0.924604
1,435
2.515625
3
Computer users who get headaches, eye strain, dry eyes and difficulty focusing could be suffering from a form of repetitive strain injury of the eyes called Computer Vision Syndrome (CVS). By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, pro...
<urn:uuid:e8bb72ec-1cd6-4ac0-adb6-16b968a1df09>
CC-MAIN-2017-09
http://www.computerweekly.com/news/2240086564/Computer-users-may-suffer-visual-RSI
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00060-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935674
342
2.515625
3
The IEEE has approved a new standard that kicks Wi-Fi up into the service provider environment. IEEE 802.16m is actually an extension to existing standards, with the official name of "Amendment to IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Broadband Wireless Access Systems – Adva...
<urn:uuid:4e74f2b4-1a3c-4dde-af12-194665d5e726>
CC-MAIN-2017-09
https://www.cedmagazine.com/news/2011/04/new-ieee-standard-brings-wi-fi-provider-world
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00480-ip-10-171-10-108.ec2.internal.warc.gz
en
0.890797
134
2.59375
3
If you want to build your own Internet of Things, try the toy monkey hack. Digi International, a company that makes software and hardware systems for the Internet of Things (IoT) has a step-by-step guide to create an alert device using its postage stamp-size XBee wireless radio. You will need a few other parts, and a l...
<urn:uuid:ef6a803b-c531-464a-9683-287490d10f8a>
CC-MAIN-2017-09
http://www.networkworld.com/article/2173861/smb/internet-of-things-in-five-words--sensor--monkey--radio--cloud--paris.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00356-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948018
967
2.515625
3
That's because the Government Accountability Office reports that efforts to deploy two of the Fed's most prominent security efforts the Trusted Internet Connections (TIC) and Einstein (or officially known as the National Cybersecurity Protection System) have largely gone unused, keeping the threat of cyber attacks on f...
<urn:uuid:58dc04bc-979b-425e-9fa5-b0c082e83330>
CC-MAIN-2017-09
http://www.networkworld.com/article/2230410/security/report-rips-key-government-security-efforts.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00056-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956988
811
2.640625
3
In a presentation at the Intel Developer Forum today, Intel CTO Justin Rattner described three major innovations that Intel has been working on, the first of which is what the company calls a "terascale research chip"—a processor with 80 cores on one piece of silicon that can deliver up to a teraflop (1 trillion floati...
<urn:uuid:7e8808fc-2a6d-4191-9463-9b0642a9642b>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2006/09/7840/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00056-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95741
1,330
2.984375
3
Army models insect flight for future 'bugbots' Swarms of tiny, autonomous robots could infest tomorrow's battlefields - By Henry Kenyon - Mar 25, 2011 If Army researchers are successful, future warfighters will use small robots that mimic the locomotion of creatures such as lizards and houseflies to scout enemy positio...
<urn:uuid:8e92ef10-afa8-4598-ab18-8148431aeca4>
CC-MAIN-2017-09
https://gcn.com/articles/2011/03/25/army-studies-insects-to-design-bugbots.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00528-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954766
469
3.15625
3
Virtualization and Cloud Computing: Does One Require the Other? Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'...
<urn:uuid:c01529e0-861b-4726-89e6-2f21a5455b78>
CC-MAIN-2017-09
https://www.globalknowledge.com/ca-en/resources/resource-library/white-paper/virtualization-and-cloud-computing-does-one-require-the-other/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00052-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948396
686
2.71875
3
A lot of iPhones have been sold since the original iPhone was released almost nine years ago. While some older devices are still being used or collected by Apple fans, most of them end up in the recycling heap. A Bloomberg article published on Wednesday goes into some of the details about the iPhone recycling process. ...
<urn:uuid:8d145b60-2173-442d-b239-15f9fa964328>
CC-MAIN-2017-09
http://www.itnews.com/article/3034251/iphone-ipad/an-apple-plant-in-hong-kong-shreds-iphones-into-tiny-pieces.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00104-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961294
280
2.84375
3
To make your home or small business Wi-Fi network safe, the single most important thing to do is implement the authentication security capabilities built into your Access Point and Wi-Fi adapters. Authentication lets you control who can access your wireless network, and encrypts (scrambles) your wireless network data t...
<urn:uuid:e4d2e84d-d369-4d6c-86f1-d6d2b274a914>
CC-MAIN-2017-09
https://www.justaskgemalto.com/us/how-do-i-make-my-home-or-small-business-wi-fi-network-safe/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00524-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928807
302
2.546875
3
Science and Technology Quiz - Questions & Answers Are you looking for quiz questions and answers about science and technology? You've come at the right place. Check out this Science and Technology quiz and see if you can answer the following questions on science, technology and electronics? Play this quiz to see how go...
<urn:uuid:8e27df9d-3fe3-46fc-a4d3-0798ec77ce79>
CC-MAIN-2017-09
http://www.knowledgepublisher.com/article-1062.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00045-ip-10-171-10-108.ec2.internal.warc.gz
en
0.872234
1,541
2.96875
3
NASA's Kepler telescope in trouble - By Frank Konkel - May 17, 2013 NASA's Kepler space telescope has found more than 2,700 possible Earth-like planets. (NASA image) Like an old man with arthritic joints, NASA's planet-seeking Kepler telescope can't move like it used to, and its most recent setback has put the four-yea...
<urn:uuid:daaf3144-62db-4397-8177-b7e2629b1f0a>
CC-MAIN-2017-09
https://fcw.com/articles/2013/05/17/nasa-kepler-trouble.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00097-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956398
530
3
3
With no end in sight for multicore CPUs and manycore GPUs, and supercomputers with hundreds of thousands of processors being envisioned, the parallel programming problem looms large indeed. IDC’er Steve Conway, writing for Scientific Computing, reminds us just how bad the problem has become: To date, three real-world a...
<urn:uuid:dc88a94c-807e-4e6b-a79f-0a9cb0c400f2>
CC-MAIN-2017-09
https://www.hpcwire.com/2010/08/10/hpc_software_losing_ground_to_hardware_parallelism/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00097-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925201
425
2.6875
3
Many hotels have sustainability certifications and it’s easy to think of this as one of those things you have to do just to match the competition. While there is some truth to that perception, it turns out that gaining an environmental certification has the unexpected benefit of encouraging guests to conserve resources...
<urn:uuid:354f28e5-f107-470a-a1c1-02704a634678>
CC-MAIN-2017-09
http://hospitalitytechnology.edgl.com/columns/Eco-Certs-Yield-Unexpected-Benefits-in-Cost-Saving-and-Efficiency94385
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00273-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954474
1,063
2.671875
3
Raise your hand if you've ever tried to connect to a neighbor's WiFi network in an emergency (or even by accident). If we were in the same place, about a third of the room would have their hands up, according to a survey conducted by wireless industry group Wi-Fi Alliance. This is despite the fact that many of you know...
<urn:uuid:0ff3c48f-38fa-46fe-b26e-c54541ba8fa5>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2011/02/wifi-users-guard-their-own-networks-happy-to-use-others/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00149-ip-10-171-10-108.ec2.internal.warc.gz
en
0.96834
673
2.640625
3
The Value of Cooperation The Value of Cooperation As computers get faster, this gain in capacity (which technologists call "processing gain") grows. Like a better antenna ("antenna gain"), processing gain means we can have more capacity in a particular radio architecture than otherwise would be possible. Technologists ...
<urn:uuid:52219899-f8e0-45b6-806b-42dc1137bdee>
CC-MAIN-2017-09
http://www.eweek.com/c/a/IT-Infrastructure/Wireless-Spectrum-Defining-the-Commons-in-Cyberspace/1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00569-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929013
714
2.5625
3
Google has partnered with scientists at the University of California, Santa Barbara to build new processors for use in quantum computing systems. Quantum computers aim to use properties of subatomic particles to perform calculations millions of times faster than conventional computers, although there are lots of obstac...
<urn:uuid:e23ccc96-25ef-4cc3-b61f-dc9267e1ccfd>
CC-MAIN-2017-09
http://www.networkworld.com/article/2601382/components-processors/google-to-build-quantum-computing-processors.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00569-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929262
330
3.8125
4
A preliminary study from the University of Michigan Transportation Institute took a look at autonomous vehicle crashes reported by Google, Delphi, and Audi, all of which have licenses to operate self-driving vehicles in a number of states. The researchers, Brandon Schoettle and Michael Sivak, compared that data to adju...
<urn:uuid:8aa00a82-1c72-4b5c-b403-fb11474e861e>
CC-MAIN-2017-09
https://arstechnica.com/cars/2015/10/study-of-self-driving-cars-shows-other-drivers-are-good-at-hitting-them/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00569-ip-10-171-10-108.ec2.internal.warc.gz
en
0.970797
535
2.9375
3
As today’s cyber attacks continue to increase in frequency and complexity, organizations must respond with new tactics to protect against these attacks. All techniques are not created equal, however, and today's cyber security expert has to understand what tools can and can't help in their cyber security efforts. This ...
<urn:uuid:f2afef1e-255a-492e-b57f-ff469fbfde3f>
CC-MAIN-2017-09
https://www2.fireeye.com/thinking-outside-the-sandbox-wp.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00569-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963656
219
2.5625
3
Changing the Friendly Name of an SSL Certificate SSL Certificates are not required to have friendly names and are not part of the SSL Certificate. However, in environments that require multiple SSL Certificates, the lack of friendly names or poorly used friendly names can make managing your SSL Certificate more difficu...
<urn:uuid:0f5c4841-9370-4cd5-8712-c6dca768a180>
CC-MAIN-2017-09
https://www.digicert.com/util/utility-edit-friendly-name.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00445-ip-10-171-10-108.ec2.internal.warc.gz
en
0.846337
431
2.75
3
Data Obfuscation and Data Value – Can They Coexist? Data is growing exponentially. New technologies are at the root of the growth. With the advent of big data and machine data, enterprises have amassed amounts of data never before seen. Consider the example of Telecommunications companies. Telco has always collected la...
<urn:uuid:469c2954-5515-4987-a1ea-a72efbff43b3>
CC-MAIN-2017-09
https://blogs.informatica.com/2014/07/02/data-obfuscation-and-value-of-data-can-they-coexist/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00621-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952664
580
2.78125
3
Cost accounting refers to a set of activities that include collection and analysis of data that is related to production/service delivery process of an organization. The purpose of these activities is to identify various fixed & variable costs, and notice which costs can be minimized or removed to achieve a better prof...
<urn:uuid:a6db7731-1663-4b00-9fdf-bd16017d4eb4>
CC-MAIN-2017-09
http://www.micromarketmonitor.com/market/asia-cost-accounting-system-5637520024.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00321-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945152
777
2.859375
3
Liquid-crystal displays (familiar to most as LCDs) rely on the light modulating properties of liquid crystals to bring images to life on a wide variety of screens. From computer monitors to televisions to instrumental panels and signage, LCDs are a pervasive element of modern life. LCDs employ high-tech films, which mu...
<urn:uuid:38757b16-fb3e-42c7-a781-8e530e7bebcc>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/04/14/titan-captures-liquid-crystal-film-complexity/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00497-ip-10-171-10-108.ec2.internal.warc.gz
en
0.924012
1,174
3.734375
4
NASA engineers are still making efforts to get the crippled Kepler Space Telescope working again, but they're also seeking alternative plans in case that doesn't happen. Engineers from the space agency have been working for nearly three months to fix the telescope, which was launched in 2009 to search for Earth-like pl...
<urn:uuid:f1334f66-7a37-453c-a227-e128f229e753>
CC-MAIN-2017-09
http://www.networkworld.com/article/2168880/data-center/nasa-seeks-new-science-projects-for-crippled-kepler.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00089-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954347
860
2.765625
3
A new material being researched could make shape-shifting robots real, but let's hope they aren't as violent as the Transformers from the movies. Researchers have developed a flexible material that can stretch when heated and will allow robots to change shapes. The material, which can also be rigid, is a mix of elastom...
<urn:uuid:2c2608a7-3217-4ece-870e-402aedab34b0>
CC-MAIN-2017-09
http://www.computerworld.com/article/3046593/robotics/shapeshifting-robots-using-a-new-material-could-be-on-horizon.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00141-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934422
389
3.59375
4
Is Cloud Based Anti-Virus an Effective Means of Security? Anti-virus systems are now a de facto part of modern computing. In a world where every webpage, email and downloaded file has the potential to contain malicious code or trojan horses there is a need to be more vigilant than ever about the security of your comput...
<urn:uuid:454ae2b2-424c-4601-a23d-e2e3363d555d>
CC-MAIN-2017-09
https://cloudtweaks.com/2014/05/cloud-based-anti-virus-effective-means-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00493-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94013
681
3.046875
3
But what about the jobs? There will actually be more, says Boeing. Aircraft manufacturer Boeing is in the final phase of testing robots that will assemble its 777 airliner fuselages. As part of its ongoing technology investment, the method is dubbed Fuselage Automated Upright Build (FAUB), and uses automated, guided ro...
<urn:uuid:0d2242f2-9f7c-415a-8c1a-92caefcedee4>
CC-MAIN-2017-09
http://www.cbronline.com/news/enterprise-it/boeing-set-to-start-building-777-aircraft-with-robots-4318522
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00017-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962394
326
2.625
3
Someday the number of scientists -- and I'm using the word loosely here -- who actually believe human activity has had no impact on global warming, and who might even believe that global warming is a myth, will dwindle down to one. And when it does, the professional climate-change deniers and their financial backers wi...
<urn:uuid:17b3888a-c476-4d15-88e1-be5dcda5f8dd>
CC-MAIN-2017-09
http://www.itworld.com/article/2708231/enterprise-software/science-panel-only-95--certain-that-humans-are-causing-global-warming--so-obviously-the-debate-rages.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00489-ip-10-171-10-108.ec2.internal.warc.gz
en
0.974803
427
2.796875
3
Hadoop is an open source software framework for storing and processing large volumes of distributed data. It provides a set of instructions that organizes and processes data on many servers rather than from a centralized management nexus. Hadoop data systems are not limited in their scale. More hardware and clusters ca...
<urn:uuid:abb5ca50-5236-486a-a699-90ddb8f196cb>
CC-MAIN-2017-09
https://www.informatica.com/services-and-training/glossary-of-terms/hadoop-definition.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00533-ip-10-171-10-108.ec2.internal.warc.gz
en
0.914998
305
3.609375
4
OWASP, also known as Open Web Application Security Project just released the OWASP Top 10 for 2013. The OWASP Top 10 is a list of most common web application vulnerabilities and flaws found in today's web applications. The list of security flaws is based on several datasets from different firms specializing in web appl...
<urn:uuid:a6b5743a-c13c-4303-a28e-68221592a9ad>
CC-MAIN-2017-09
https://www.netsparker.com/blog/web-security/owasp-top-10-2013/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00057-ip-10-171-10-108.ec2.internal.warc.gz
en
0.918346
1,312
2.765625
3
WASHINGTON–Superintelligent computers could outsmart humans, but scientists largely dismiss any parallels to Terminator and a dystopian "rise of the machines" (much like the hapless scientists in the movies, it must be noted). The struggle between the thirst for research and the anxiety over the consequences was clear ...
<urn:uuid:26e37cc3-95c0-48ea-8536-1ed647968b25>
CC-MAIN-2017-09
http://www.itnews.com/article/2942852/the-terminator-question-scientists-downplay-the-risks-of-superintelligent-computers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00233-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957533
696
2.609375
3
WASHINGTON -- When engineers talk about roads here, they describe them as networks. There's a good reason for that. In high-definition displays, roadways appear like wires hanging off the back of server racks. It's a tangled system. The data, vehicles in this case, are illustrated by small, slowly moving dots. Research...
<urn:uuid:485e2eda-58af-4e18-bd47-5d2441d8c726>
CC-MAIN-2017-09
http://www.cio.com/article/2375490/government/roads-in-the-future-will-need-data-standards-as-well-as-signs--says-dot-s-cio.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00105-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964451
842
3.03125
3
XSLand CSS complement each other on document layout What is it? XSL (Extended Style Sheet Language) is used to define the layout of XML documents in a presentation medium such as a web browser window or a printed page. XSL includes the transformation language XSLT, which converts XML into formats such as HTML, PDF and ...
<urn:uuid:6c6c787e-415c-4edb-b365-a8ba5d0fe094>
CC-MAIN-2017-09
http://www.computerweekly.com/news/2240057094/XSL-to-improve-web-print-support
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00525-ip-10-171-10-108.ec2.internal.warc.gz
en
0.922698
740
3.5
4
As NASA's Voyager 1 spacecraft travels outside the solar system, scientists hope to learn about the forces pushing on the "bubble" around the sun and how interstellar radiation could affect future space exploration. "There's never been anything like this," said Ed Stone, chief scientist for the Voyager mission. "Nothin...
<urn:uuid:b3fa4131-e85b-4706-b55c-1993faf81e25>
CC-MAIN-2017-09
http://www.networkworld.com/article/2169949/data-center/nasa--39-s-voyager-will-teach-us-about-future-deep-space-missions.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00401-ip-10-171-10-108.ec2.internal.warc.gz
en
0.96633
1,053
3.734375
4
Can AI Mixed With Ambience, Topped With Behavioral Analytics, Be The Perfect Cybersecurity Recipe? Since cybersecurity threats have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is shocking is the financial damage the attacks are predicted to cause as they reverberat...
<urn:uuid:304c18a2-e6f7-4bde-83b9-a1cac7b6093d>
CC-MAIN-2017-09
http://www.cloudsecurityresource.com/topics/cloud-security/articles/427031-ai-mixed-with-ambience-topped-with-behavioral-analytics.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00101-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931628
1,423
2.546875
3
Technical Characteristics of RFID The term RFID denotes a range of wireless identification technologies, not a single device type. One way to classify tags is according to their source of power. The most inexpensive and compact tags are passive, meaning that they derive all of their transmission power from the reading ...
<urn:uuid:701db7d8-7415-4015-b4bc-1bb7e8c89351>
CC-MAIN-2017-09
https://www.emc.com/emc-plus/rsa-labs/research-areas/technical-characteristics-of-rfid.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00101-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923712
1,075
3.796875
4
About the BlackBerry Keyboard Use the BlackBerry Keyboard to communicate with the world. With prediction, you can select word suggestions that appear while you type. After you set up your keyboard preferences, you can learn how to cut, copy, and paste text, and delete words. You can type efficiently by creating custom ...
<urn:uuid:0b511534-fea9-4855-963e-fbd715fdcb12>
CC-MAIN-2017-09
http://help.blackberry.com/en/keyboard/latest/help/keyboard.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00453-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910804
155
2.53125
3
Cyber-criminals targeting the Internet of Things (IoT) could result in disasters in the physical world, according to security expert Bruce Schneier. Writing in Motherboard magazine, Schneier said that the Internet of Things had given the internet “hands and feet” and the ability to “directly affect the physical world”....
<urn:uuid:d6384738-da7f-49e8-aa3a-c31863652a80>
CC-MAIN-2017-09
https://internetofbusiness.com/schneier-warns-cybersecurity-threat-iot/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00046-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954083
439
2.78125
3
Girding The GridBy Larry Barrett | Posted 2003-09-08 Email Print The Northeast blackout revealed an electric system in disrepair. The bright side? It's holding up well for being hatched in 1948. About 50 million electricity customers throughout the Northeast and Canada learned that lesson the hard wayan Aug. 14 blackou...
<urn:uuid:cb049728-ba9f-4bcb-9335-9e5d69cda009>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/Past-News/Girding-The-Grid
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00222-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954791
869
2.828125
3