text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Here Is a Hint Invest In STEM Workers
July 6, 2013
Have you ever heard of a STEM (science, technology, engineering, and math) worker? Probably not, but Brookings.edu reports in the article, “The Hidden STEM Economy” that 20% of the twenty-six million jobs in the US are in the STEM field. Since the economic downfall, re... | <urn:uuid:9b3e4606-f30d-4bc8-afc2-984ab13d5068> | CC-MAIN-2017-09 | http://arnoldit.com/wordpress/2013/07/06/here-is-a-hint-invest-in-stem-workers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00574-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95188 | 346 | 2.8125 | 3 |
Search Engine Poisoning: On The Rise
Today, Imperva released a report on search engine poisoning. Search Engine Poisoning attacks manipulate, or “poison”, search engines to display search results that contain references to malware-delivering websites. There are a multitude of methods to perform SEP: taking control of p... | <urn:uuid:78229175-2548-4dce-9d41-79b15e0a5974> | CC-MAIN-2017-09 | http://blog.imperva.com/2011/06/search-engine-poisoning-on-the-rise.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00098-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935108 | 533 | 2.59375 | 3 |
Governor Arnold Schwarzenegger today participated in the launch of Ausra's Kimberlina Solar Energy Facility in Bakersfield. The five megawatt (MW) solar thermal power plant, the first to come online in California in more than 15 years, is a demonstration facility for utility-scale thermal solar energy plants, such as t... | <urn:uuid:fa520d5d-5332-4607-9a51-a62ce7d816ad> | CC-MAIN-2017-09 | http://www.govtech.com/technology/Solar-Energy-Plant-Comes.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00274-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947709 | 841 | 2.703125 | 3 |
Years ago, many companies relied on a perimeter defense strategy, assuming that would be enough to protect their network. But in today’s cyber-security landscape, threats can just as easily come from inside the network. According to the IBM 2015 Cyber Security Intelligence Index, 55 percent of all attacks were carried ... | <urn:uuid:6400e0d8-afcb-4f65-abd3-8fb06c118c8f> | CC-MAIN-2017-09 | https://www.bradfordnetworks.com/control/network-segmentation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00274-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929714 | 186 | 2.734375 | 3 |
Linux sort command - Sort lines of text files
Himanshuz.chd 270004408M Visits (79435)
man page of sort command:
So we see that the main purpose of this command is to produce a sorted output.
Linux sort command examples
1. A basic exampleThe very first input that I tried consisted of some random alphabets.
Here is what ... | <urn:uuid:0a917528-2b15-4388-843b-2d8f7f412af2> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/58e72888-6340-46ac-b488-d31aa4058e9c/entry/linux_sort_command_sort_lines_of_text_files9?lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00626-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.8708 | 868 | 3.234375 | 3 |
The recently shelved SOPA (Stop Online Piracy Act) and PIPA (PROTECT-IP Act) bills that were up for consideration in the U.S. Congress have once more brought to the forefront a touchy subject, particularly with regard to the Internet: intellectual property (IP). With IT becoming such a critical underpinning of the U.S.... | <urn:uuid:d58426c1-77c7-422c-b4c8-cddeacaf2dec> | CC-MAIN-2017-09 | http://www.datacenterjournal.com/aftermath-of-sopa-and-pipa-lets-talk-ip/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00446-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940733 | 1,594 | 2.515625 | 3 |
Troubleshoot Windows DNS Problems
In any enterprise, DNS services are a crucial backbone for network connectivity. DNS is used for name resolution, allowing one client to locate another client. If DNS fails, it will disrupt connectivity to the Internet. In this article, we'll consider some common issues caused by misco... | <urn:uuid:b5724d66-a970-41d0-9abf-101871a91160> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netos/article.php/3934066/Troubleshoot-Windows-DNS-Problems.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00446-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.912844 | 1,099 | 2.65625 | 3 |
Teachers in Pennsylvania are being encouraged to use increasing amounts of technology in the classroom. The downside to this trend is the increased risks that students face online by accessing inappropriate or potentially harmful content.
There’s no doubt that the increased use of technology in Connecticut classrooms e... | <urn:uuid:9cbd5425-c27d-43f3-be7e-3bc536295ac3> | CC-MAIN-2017-09 | https://www.imperosoftware.com/tag/internet-safety/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00146-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946693 | 195 | 3.296875 | 3 |
The VoIP Peering Puzzle�Part 1: Concepts and Challenges
If you've been reading Enterprise VoIPplanet.com, you have doubtless come across the term VoIP peering; it is certainly among the top buzzwords in today's networking culture.
Webster's defines peer as "one that is of equal standing with another." But to fully unde... | <urn:uuid:59c2a495-9085-4999-904e-f2e903e4c857> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/unified_communications/The-VoIP-Peering-Puzzle151Part-1-Concepts-and-Challenges-3644066.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00090-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948615 | 1,430 | 3.015625 | 3 |
Rob Charlton, CEO, Space Group & Adam Ward, Director, BIM Technologies
In an age of perpetual advancing technology, it’s often difficult to keep up with what’s going to be the “next big thing”.
Traditional construction methods are fast being overtaken by modern building processes, and what we’re now terming; digital co... | <urn:uuid:146b0984-1381-414f-a116-c110841236b5> | CC-MAIN-2017-09 | https://www.brighttalk.com/webcast/14607/223683 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00442-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927072 | 342 | 2.671875 | 3 |
Cloud computing is making infrastructural breakthroughs on the roads even as the term ‘infrastructure’ becomes more tech and virtual than its original meaning. Even if one hears of Infrastructure as a Service (IaaS) in computer matters, pretty often, it might be soon possible to think out of the box and attach it to th... | <urn:uuid:10293297-6f6f-4cfb-95b0-5bb9423da907> | CC-MAIN-2017-09 | https://cloudtweaks.com/2013/04/cloud-computing-may-fast-track-road-operability/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00618-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951611 | 702 | 2.890625 | 3 |
Kitamura A.,Japan Atomic Energy Agency |
Kitamura A.,Geological Isolation Research and Development Directorate |
Kurikami H.,Japan Atomic Energy Agency |
Kurikami H.,Geological Isolation Research and Development Directorate |
And 21 more authors.
Nuclear Science and Engineering | Year: 2015
Significant amounts of radio... | <urn:uuid:0acfe06d-5d87-4e99-8ab1-4a2ca79a9767> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/geological-isolation-research-and-development-directorate-2637423/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00618-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.898448 | 429 | 2.78125 | 3 |
When it comes to transportation, the United States is No.1. We have more miles of highway and railroad, we drive more miles in our vehicles, and we fly more passengers in our airplanes than any other country in the world.
The transportation market is a $600 billion industry, according to BizStats.com, with the public s... | <urn:uuid:30b07ce3-5caf-4ddf-8e20-2d558132c553> | CC-MAIN-2017-09 | http://www.govtech.com/featured/The-Integration-Highway.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94914 | 2,452 | 2.578125 | 3 |
A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP packets exchanged during a phone conversation.
They called the method TranSteg, and they have proved its effectiveness by creating a proof-of-conc... | <urn:uuid:106ee860-0b28-45b5-b2d5-880c46025b08> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2011/11/15/hiding-messages-in-voip-packets/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940024 | 468 | 2.796875 | 3 |
What Is Cloud Computing
What is cloud computing you ask? The concept may seem nebulous or hard to decipher but in reality is very simple and compelling. It provides a cost effective solution, especially to IT professionals who can now reap the benefits provided by cloud computing without having to spend exorbitant amou... | <urn:uuid:85560f06-713d-4d1e-a46b-4c6f8409f16c> | CC-MAIN-2017-09 | https://cloudtweaks.com/2011/11/what-is-cloud-computing-yes-another-perspective-part-1/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00018-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960883 | 487 | 3.28125 | 3 |
Critics of Voice over Internet Protocol (VoIP) site that VoIP programs lack security. However, with recent advancements in the telecommunications industry, this is now a claim of the past. All VoIP systems can be individually customized based on a company’s security requirements. For example, the main security issues w... | <urn:uuid:b18f5435-f1af-4f96-8c4a-c0b4df92cde2> | CC-MAIN-2017-09 | http://jive.com/blog/verifying-voip-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00438-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958358 | 484 | 2.640625 | 3 |
In economics, scarcity is the fundamental problem of "having humans [with]... unlimited wants and needs in a world of limited resources" (see Resources). When resources are scarce, people compete for access to them. Competition for resources is evident when it comes to people getting access to environments on tradition... | <urn:uuid:e9c75815-2abf-4015-a884-d9bb2540f76d> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/java/library/a-devops3/index.html?ca=drs- | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00438-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925004 | 2,018 | 2.546875 | 3 |
Website Hacking means altering or manipulating the website content or database i.e. manipulate website contents say CSS or Javascipts, leak its users database, corrupt its database, deface the website’s index page, exploit the anonymous login and much more… Hacking websites is nowadays became a fashion among the Hacker... | <urn:uuid:13aff9d4-c1df-4e21-a513-62fa62027f79> | CC-MAIN-2017-09 | https://www.hackingloops.com/website-hacking-learn-how-to-hack-websites/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00438-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.81666 | 469 | 2.578125 | 3 |
Juniper app works to correct GPS errors
- By John Breeden II
- Oct 03, 2013
Government workers who frequently use GPS applications know both their strengths and limitations. While the system is accurate down to about two or three meters, sometimes that isn't good enough. And when natural or manmade structures skew the ... | <urn:uuid:01e45f9f-fe55-45ab-a524-f3dbdca1c556> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/10/03/juniper-systems-navigation-app.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00314-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961103 | 717 | 2.71875 | 3 |
Late last month, the National Academy of Engineering and National Research Council released a report that recommended the Defense Department overhaul its recruiting and hiring practices in order to effectively compete for critical workers in the science, technology, engineering and mathematics fields.
While that report... | <urn:uuid:4917bfad-12ba-4c15-bf25-5a72421212bd> | CC-MAIN-2017-09 | http://www.nextgov.com/cio-briefing/wired-workplace/2012/11/stem-recruiting/59557/?oref=voicesmodule | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00134-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944745 | 559 | 2.578125 | 3 |
On Wednesday, the Ponemon Institute released the results of a new study conducted for DB Networks. In it, 65 percent of the respondents said that they've experienced one or more SQL Injection attacks in the last 12 months. In addition, each incident took an average of 140 days to discover, and 68 days to fix the issue.... | <urn:uuid:274f46a5-3bf3-4555-b9fa-7ab037998926> | CC-MAIN-2017-09 | http://www.cio.com/article/2377067/security0/organizations-suffer-sql-injection-attacks--but-do-little-to-prevent-them.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00486-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967505 | 606 | 2.546875 | 3 |
The goal of this series is to try to answer an age-old question that is often asked and rarely answered. Namely: is the TLS protocol provably secure?
While I find the question interesting in its own right, I hope to convince you that it’s of more than academic interest. TLS is one of the fundamental security protocols ... | <urn:uuid:5e63a805-27c0-48f5-9f4e-27536b905819> | CC-MAIN-2017-09 | https://blog.cryptographyengineering.com/2012/09/28/on-provable-security-of-tls-part-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00482-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.911127 | 3,241 | 2.5625 | 3 |
Configuring and Planning a Windows Server Cluster
In the first three installments of this series ( Is a Server Cluster Right for Your Organization? , Choosing the Cluster Type that's Right For You , and Network Load Balancing Clusters ), I discuss the concepts involved in setting up a server cluster. As I do, I discuss... | <urn:uuid:1c5c6baf-0f39-4239-ac83-34885929474b> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsysm/article.php/624431/Configuring-and-Planning-a-Windows-Server-Cluster.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00006-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949499 | 1,415 | 2.5625 | 3 |
Hardware RAID configuration on the IBM Power platform
RAID configuration on the IBM Power platform
RAID stands for Redundant Array of Independent Disks and it involves two key design goals: Increased data reliability and increased input/output (I/O) performance. When multiple physical disks are set up to use the RAID t... | <urn:uuid:c031ab23-495c-4654-b5a8-e9af8f31adf9> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/aix/tutorials/au-aix-raid/index.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00006-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.788364 | 1,419 | 3.21875 | 3 |
Over the past five years, 43 U.S. states have adopted data breach notification laws, but has all of this legislation actually cut down on identity theft? Not according to researchers at Carnegie Mellon University who have published a state-by-state analysis of data supplied by the U.S. Federal Trade Commission (FTC).
"... | <urn:uuid:fa242bb7-5eef-42a4-9c1c-f7f5b14080e3> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2122802/identity-theft-prevention/researchers--notification-laws-not-lowering-id-theft.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968134 | 885 | 2.546875 | 3 |
Chip-and-PIN refers to the use of a chip-based bankcards and a mandatory PIN entry for credit and debit card payments. The term was was coined in the United Kingdom and is the government-backed initiative to implement the EMV standard for secure payments in the UK. Though people commonly call it chip-and-PIN, the techn... | <urn:uuid:7c8c15ae-dacf-44bc-afa5-708ddcec9875> | CC-MAIN-2017-09 | https://www.justaskgemalto.com/en/what-is-chip-and-pin/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00234-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94738 | 218 | 3.375 | 3 |
Wireless technology has exploded in the last several years, and it provides an expanding array of technology choices. Wireless technology refers to the transmission and receipt of information (voice, fax, data) using radio frequency (RF) energy. It can be point-to-point, analogous to telephone or leased-circuit connect... | <urn:uuid:ac9fa957-3756-4b55-8cd2-51ad08cf6c56> | CC-MAIN-2017-09 | http://www.govtech.com/featured/Governments-Surfing-the-Wireless-Wave.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00354-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.899752 | 3,791 | 3.265625 | 3 |
Trojan horses gain inside track as top form of malware
Panda Security released its latest report on computer malware, showing unexpected trends government security managers should know about, including the resurgence of a traditional form of malware.
First, the number of new infections is staggering, though system admi... | <urn:uuid:f92b86af-be99-4592-a4f5-1343756c2fc0> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2013/05/trojan-horses-top-malware.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00530-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964768 | 601 | 2.53125 | 3 |
3D Printing and the Future of Manufacturing
Who would have thought that modern manufacturing could be done without a factory? Since the Industrial Revolution, manufacturing has been synonymous with factories, machine tools, production lines and economies of scale. So it is startling to think about manufacturing without... | <urn:uuid:c0555ee4-0776-45a5-b5b0-c7e05f4a0ff3> | CC-MAIN-2017-09 | http://www.csc.com/innovation/insights/92142-the_future_of_3d_printing_services_and_manufacturing?ref=rec&dyn=0 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00578-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954632 | 724 | 2.890625 | 3 |
What Does Flame Mean?
Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on. All this data is available to the operators through the link to Flame’s command-and-control servers.... | <urn:uuid:d0236aa9-8970-4787-a233-1bf1a9888cf5> | CC-MAIN-2017-09 | http://blog.imperva.com/2012/05/what-does-flame-mean.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00102-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951682 | 578 | 2.984375 | 3 |
Cray J. Henry | The multicore challenge
Another View | Guest commentary: The makers of multicore processors in PCs could learn a few things from high-performance computing
- By Cray Henry
- Sep 20, 2007
Cray J. Henry
Before the beginning of this decade you could have spent millions of dollars in new computer hardware e... | <urn:uuid:64f6f7e6-a4d3-436e-93ca-f3caee7bce6e> | CC-MAIN-2017-09 | https://gcn.com/articles/2007/09/20/cray-j-henry--the-multicore-challenge.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00102-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950652 | 1,333 | 2.890625 | 3 |
Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing web browser sessions, but it has widespread application to other tasks.
TLS/SSL can be used to provide strong authentication of both ... | <urn:uuid:9fe758f4-4ae8-49bb-88c6-3d8710f57d91> | CC-MAIN-2017-09 | https://www.infosecurity-magazine.com/white-papers/best-practices-and-applications-of-tlsssl/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00454-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93628 | 237 | 3.421875 | 3 |
Docker started out as a means of creating single application containers, but since has grown into a widely used dev tool and runtime environment. It has been downloaded around two billion times, and Redmonk has said that “we have never seen a technology become ubiquitous so quickly.” The Docker registry stores containe... | <urn:uuid:4d0afe8c-bf11-45e7-bf9f-22e6062388ee> | CC-MAIN-2017-09 | https://cloudtweaks.com/2016/09/history-containers-rise-docker/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00223-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965203 | 156 | 2.59375 | 3 |
What's the purpose of signing a form? On the simplest level, a signature is simply a way to make someone legally responsible for the content of the form. But in addition to the legal aspect, the signature is an appeal to personal integrity, forcing people to consider whether they're comfortable attaching their identity... | <urn:uuid:33b504bb-c84f-4c3f-9dbf-bf7d467f9f4a> | CC-MAIN-2017-09 | https://arstechnica.com/science/2012/08/youre-less-likely-to-lie-if-you-sign-your-name-before-filling-out-forms/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00399-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968737 | 996 | 3.046875 | 3 |
The Internet and the Domain Name System (DNS) are continually changing; domains are constantly created and existing ones are frequently modified. Cybercriminals change DNS records to hijack domains and redirect traffic to malicious websites.
The redirected traffic bypasses their hosts leaving organizations unaware that... | <urn:uuid:7af60c17-afda-4e77-aa45-3947fe8aa5eb> | CC-MAIN-2017-09 | https://www.farsightsecurity.com/solutions/threat-intelligence-team/dns-changes/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00575-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919951 | 341 | 2.703125 | 3 |
For many organizations, web sites serve as mission critical systems that must operate smoothly to process millions of dollars in daily online transactions. However, the actual value of a web site needs to be appraised on a case-by-case basis for each organization. Tangible and intangible value of anything is difficult ... | <urn:uuid:254199e5-ed7c-4c14-9d3f-e27f4c0c373b> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2004/07/28/web-security-threat-classification/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00099-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91939 | 304 | 2.6875 | 3 |
State agencies that help protect our land, water and air and manage our natural resources have -- well -- an environmental problem.
The regulations they enforce to reduce pollution and to ensure the wise use of trees, minerals, water and land are generating huge amounts of paper. Businesses must send in forms and docum... | <urn:uuid:ba1f4382-5757-424c-9fd9-5e396a7063f1> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Imaging-Takes-on-the-Environment.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00095-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945205 | 1,396 | 2.71875 | 3 |
Article by Coleen Torres
Cell phones don’t feel newfangled but in truth they are. With innovation comes swift change, sometimes so swift that it is difficult for forensic scientists to keep up.
Criminals use cell phones in a variety of crimes and it is up to the forensic scientists to uncover their transgressions.
But ... | <urn:uuid:0a28721c-175e-4a53-920e-8b34ba377b2f> | CC-MAIN-2017-09 | http://www.infosecisland.com/blogview/20180-Seven-Problems-with-Cell-Phone-Forensics.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00271-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93011 | 629 | 3.25 | 3 |
by Oleg Davydov, CTO, Oxygen Forensics
Modern smartphones are much more than just a device for voice calls. Now they contain a lot of personal data – contact list, communication history, photos, videos, Geo tags etc. Most smartphones can also work as a modem.
Almost every modem is Hayes-compatible which means it suppor... | <urn:uuid:9553f4f2-e531-4497-9766-b40c6b152a71> | CC-MAIN-2017-09 | https://articles.forensicfocus.com/2017/02/03/unlocking-the-screen-of-an-lg-android-smartphone-with-at-modem-commands/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00271-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916174 | 1,003 | 2.984375 | 3 |
Everyone is aware that selecting passwords wisely and safeguarding them should be an important priority, yet most people need to remember so many passwords that it’s nearly impossible to do so. Because of the need to recall dozens of passwords and keep up with their rotation many people are forced to use insecure short... | <urn:uuid:a704e19d-2907-412b-8ff5-5a1e9a5d6e46> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2005/01/10/password-management-with-passwordsafe/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00447-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930017 | 902 | 2.734375 | 3 |
Researchers have found a way to make colors more vivid on an e-reader screen, which could lead to the creation of advanced displays and spawn the development of color e-books.
The researchers at the University of Michigan at Ann Arbor were able to trap narrow beams of light at different lengths, which ultimately reflec... | <urn:uuid:91e6f911-bf84-4a9d-8cd0-3ab21a025219> | CC-MAIN-2017-09 | http://www.cio.com/article/2388563/hardware/researchers-mimic-peacock-to-bring-vivid-color-to-e-readers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00323-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946819 | 534 | 2.96875 | 3 |
At SC09 this week, Mitrionics announced it has started to work on an experimental compiler that aims to make parallel programming architecture-agnostic. The goal of the work is to extend the Mitrion-C platform for FPGAs to multicore CPUs, cluster architectures, and eventually even GPGPUs. We asked Stefan Möhl, Mitrioni... | <urn:uuid:1e2a01fd-6794-48cc-b6cd-205e447d0482> | CC-MAIN-2017-09 | https://www.hpcwire.com/2009/11/18/mitrionics_looks_beyond_fpgas/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00323-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943607 | 1,953 | 2.546875 | 3 |
The MIT SENSEable City Lab's Real Time Rome project aggregates data from cell phones to better understand urban dynamics in real time. By collecting location data from cell phone users, and speed and location data from bus and taxi fleets, the project aims to help Roman commuters make better decisions about their envir... | <urn:uuid:ac2cc628-64d9-4e33-8f52-e08338076438> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/MIT-Project-Aggregates-Cell-Phone-Data.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00267-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926498 | 140 | 2.921875 | 3 |
Regardless of where you stand on the net neutrality debate, one thing doesn’t help: misleading or confusing statements. Unfortunately there are plenty of them.
Net neutrality is an Internet ideal that will become possible If the Federal Communications Commission decides to reclassify Internet service providers from inf... | <urn:uuid:06ee1600-be4f-467e-b735-4e8b317a02d7> | CC-MAIN-2017-09 | http://www.cio.com/article/2853420/internet/net-neutrality-five-myths-and-the-real-facts.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00143-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948283 | 966 | 2.734375 | 3 |
Reducing power usage and cutting carbon emissions is probably the right thing to do for the future of the planet. But keep this is mind: Green is a powerful marketing term right now and cost-savings promises are part of the marketing pitch. Like all marketing promises, results vary. One example: The amount of money a t... | <urn:uuid:1cb6ce31-36d2-4392-ac3f-e546f78b0aa3> | CC-MAIN-2017-09 | http://www.cio.com/article/2419072/hardware/beware-worthless-claims-in-green-clothing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00019-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9507 | 1,085 | 2.75 | 3 |
Femtocells sound vaguely like a cross between a Feynman diagram and a biology class, but they're the latest piece of gear that millions of people will soon want in their homes without having missed them before. A femtocell is a small cellular base station designed to provide superior, short-range, indoor cellular cover... | <urn:uuid:745ea575-74eb-4f77-a52b-b500126555b6> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2010/06/small-is-beautiful-put-a-cell-in-your-house/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00439-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954816 | 1,735 | 2.59375 | 3 |
Three industrial revolutions that have brought epic changes to the world of business are steam engines, mass production, and internet technology. Today, we are in the midst of what is often called the fourth industrial revolution – the convergence of physical things with the world of the internet: The Internet of Thing... | <urn:uuid:6cba055e-c8a2-4a60-951b-6dd07a8d64ad> | CC-MAIN-2017-09 | https://www.bosch-si.com/internet-of-things/iot-downloads/iot-strategy/iot-based-business-models-white-paper.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00491-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927756 | 277 | 2.65625 | 3 |
All U.S. passports issued since June 2007 are electronic passports, or epassports, which have advanced digital security features. All epassports have a small gold logo printed on the cover. (See illustration at right)
The epassport is based on a contactless smart card chip embedded in the cover. Think of it as a comput... | <urn:uuid:e888bcda-2ad8-4b4e-a3ae-8b3a9fb21742> | CC-MAIN-2017-09 | https://www.justaskgemalto.com/us/us-electronic-passport/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00487-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915601 | 730 | 3.015625 | 3 |
Top 10 cyber security tips
High profile hacking incidents continue to make headlines around the world. The Target data breach that compromised 40 million customer accounts is still reverberating around the retail universe, and earlier this month a hacker organization targeted CNET, the popular technology and consumer e... | <urn:uuid:e9cade97-8942-4a40-a00e-4b407736b8e7> | CC-MAIN-2017-09 | https://betanews.com/2014/07/25/top-10-cyber-security-tips/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00007-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915971 | 859 | 2.578125 | 3 |
In September of 1948, the average high temperature in Washington, D.C., was 79.8 degrees Fahrenheit, off just a tick from the historical average of 80.7. So it’s ironic that September would go down in history as the month of the Big Freeze – at least in the television business.
The freeze referred to an FCC decision to... | <urn:uuid:9c1c7381-cdab-4dfa-8057-ee774b0831ec> | CC-MAIN-2017-09 | https://www.cedmagazine.com/article/2014/02/memory-lane-broadband-alternative-heats | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00359-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949455 | 910 | 3.046875 | 3 |
Many are aware of the well-publicized Google Glass that pairs the Internet with a set of shades. What takes some by surprise, however, is how many other products have followed suit.
The trend has been dubbed with a variety of titles, such as the “Internet of Things” and the “Internet of Everything,” titles which — cons... | <urn:uuid:d9deb282-1f19-487f-b172-d708c4372007> | CC-MAIN-2017-09 | http://www.govtech.com/internet/10-Surprising-Things-Connected-to-the-Internet.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00235-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939286 | 1,340 | 2.640625 | 3 |
Old-school recordkeeping meets the Digital Age
How does the government manage data that was born digital, meaning it was created in electronic form? Organizations as varied as the National Archives and Records Administration (NARA), the White House, open-government groups, and House members have recently offered recomm... | <urn:uuid:8cec10ef-793c-4f3e-9048-59667e1733d6> | CC-MAIN-2017-09 | https://fcw.com/articles/2008/08/15/oldschool-recordkeeping-meets-the-digital-age.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00355-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949066 | 1,545 | 2.828125 | 3 |
Here are some common scams along with ways to protect yourself:
U.S. Census Scam
How it works: Someone calls you claiming to be from the Census, the IRS or other “trusted” organization and asks you to divulge personal financial information, donations, and/or Social Security numbers. In addition, fraudsters now have dev... | <urn:uuid:66aa7d42-a641-4f06-964a-b64d2f8b2ddd> | CC-MAIN-2017-09 | http://news.centurylink.com/news/centurylink-urges-customers-not-to-be-fooled-by-scams | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00051-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94119 | 1,092 | 2.890625 | 3 |
After a successful liftoff this morning, the SpaceX Dragon spacecraft is on its way to rendezvous with the International Space Station.
"Very excited to be back here. We're a launch company and we love to launch," said Gwynne Shotwell, president of SpaceX, before launch. "We're prepared to fly."
However, the flight has... | <urn:uuid:0db81c83-4c93-465d-b24f-6969adcbc746> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2164033/data-center/nasa--spacex-launch-dragon-but-glitch-delays-power-supply.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944557 | 565 | 2.640625 | 3 |
A snake has been moving through the pipes and systems of a nuclear power plant near Vienna, Austria.
It may not be as creepy as you think. This particular snake is multi-jointed robotic machine.
Carnegie Mellon University's robotic snake climbs a 1-in. machinery cord at the Zwentendorf nuclear power plant in Austria. (... | <urn:uuid:0513a531-79d5-4a69-b1f8-aaccf90adbaa> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2168012/data-center/robotic-snake-ssslithers-through-nuclear-plant.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969612 | 790 | 3.640625 | 4 |
An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the same phenomenon in the information security field.
Information security has grown from being a small subset of IT to now being something of critical importanc... | <urn:uuid:49949b1a-4d4b-4e06-9359-151e3836eda4> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/04/10/a-call-to-arms-for-infosec-professionals/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962856 | 1,137 | 2.78125 | 3 |
More Americans are concerned about not knowing how the personal information collected about them online is used than losing their principal source of income.
A new study by TRUSTe and the National Cyber Security Alliance found that online privacy concerns topped the loss of personal income by 11 percentage points, even... | <urn:uuid:b455da23-03c3-4754-8cb8-6a775995c101> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2016/01/29/consumers-are-increasingly-concerned-about-privacy-and-theyre-acting-on-it/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00103-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964641 | 595 | 2.671875 | 3 |
Uncertain State Of Cyber WarJust what does "cyber warfare" mean? We're still figuring out tactics and capabilities.
Military agencies worldwide are right in the middle of figuring out the tactics and capabilities that will be critical in any future cyber war. So far, any conflicts are playing out behind the scenes, wit... | <urn:uuid:da7f5477-4a1b-471e-8f95-28531a1c433f> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/uncertain-state-of-cyber-war/d/d-id/1108255?cid=sbx_byte_related_commentary_government_and_vertical_industry_security_nasa_tightens_security_in_response_to_in&itc=sbx_byte_related_commentary_government_and_vertical_industry_security_nasa_tightens_security_in_response_to_in | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00224-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946316 | 722 | 3.03125 | 3 |
Back in January 1997, a group of people developed RFC 2065, Domain Name System Security Extensions, a document detailing the introduction of private/public key cryptography into the public DNS system. By adding cryptography to the DNS, users would be able to verify that DNS responses they receive are genuinely valid an... | <urn:uuid:f50af8b3-62ba-4244-befd-fb7746ed383e> | CC-MAIN-2017-09 | http://www.circleid.com/posts/the_root_dnssec_deployment_and_dyn_inc/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00576-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917254 | 791 | 3.125 | 3 |
Holownia P.,Sanitary Inspectorate |
Jaworska-LUczak B.,Sanitary Inspectorate |
Wisniewska I.,Sanitary Inspectorate |
Bilinski P.,Sanitary Inspectorate |
And 3 more authors.
Polish Journal of Food and Nutrition Sciences | Year: 2010
The prebiotic inulin is a non-digestible carbohydrate which occurs naturally throughout ... | <urn:uuid:98825f4d-f630-47c0-97be-6152fb8bd269> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/sanitary-inspectorate-1834587/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00100-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938969 | 822 | 2.640625 | 3 |
Tackling the problem of getting women into STEM careers
This feature first appeared in the Summer 2015 issue of Certification Magazine. Click here to get your own print or digital copy.
Tech skills will be required in 80 percent of all jobs in the next decade, yet women in technology have been declining since 1991. At ... | <urn:uuid:1967fbe8-cddc-4b30-ab9c-4c530ec68d2a> | CC-MAIN-2017-09 | http://certmag.com/tackling-problem-getting-women-stem-careers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00276-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96955 | 2,328 | 2.765625 | 3 |
The next time you watch “House of Cards” on Netflix, think about the impact you might be having on the environment.
As the Internet powers ever more services, from digital video to on-demand food delivery, energy use in data centers will rise. To reduce their impact on the environment, companies like Apple, Google and ... | <urn:uuid:7320af14-d38c-413e-b9a8-726fe824f2ba> | CC-MAIN-2017-09 | http://www.itnews.com/article/2921896/greenpeace-fingers-youtube-netflix-as-threat-to-greener-internet.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00276-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949408 | 701 | 2.875 | 3 |
If you are looking to develop some far out advanced science project -- and the folks at the Defense Advanced Research Projects Agency have a ton from airplanes that can fly for years without landing to skeletal putty for fractured bones – then DARPA wants you.
The military’s cutting edge research agency is accepting sc... | <urn:uuid:495236d7-0a23-4127-87ef-42cbb891c738> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2344880/security/darpa-looking-for-wicked-cool-researchers-for-advanced-study-group.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00452-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927905 | 1,239 | 2.609375 | 3 |
Steve Wallach, a supercomputing legend and recipient of the 2008 IEEE Seymour Cray Award, has participated in all 22 supercomputing shows. He is known for his contributions to high performance computing through the design of innovative vector and parallel computing systems. He is co-founder and chief science officer fo... | <urn:uuid:2361415a-df63-40d7-a8a0-bafb1a8e8bf0> | CC-MAIN-2017-09 | https://www.hpcwire.com/2009/11/16/d_j_vu_all_over_again/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00628-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948445 | 2,573 | 2.625 | 3 |
By now you've likely heard about the Heartbleed bug, a critical vulnerability that exposes potentially millions of passwords to attack and undermines the very security of the Internet. Because the flaw exists in OpenSSL—which is an open source implementation of SSL encryption—many will question whether the nature of op... | <urn:uuid:cab03f1d-eb1e-48b4-ab90-0ee360a64c42> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2142103/security/is-open-source-to-blame-for-the-heartbleed-bug.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00152-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937828 | 735 | 3 | 3 |
Let's start with an example. I am going to pick Road-Usage Charging (RUC) as an example of a Smart solution, but in fact there are many solutions that exhibit the principle I am going to describe. Here are some easy steps:
- RUC systems are deployed to automate the collection of tolls for road segments, bridges, tunnel... | <urn:uuid:69d85cbf-d105-4b96-afe8-c6401f48fa09> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/1d9bfc5f-e173-4598-aabc-e62b832282fa/entry/the_smart_principle_and_the_urban_digital_infrastructure1?lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00624-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961886 | 833 | 2.890625 | 3 |
Stanford researchers said this week they had used a supercomputer with more than one million computing cores to predict the noise generated by a supersonic jet engine.
The researchers used the 1,572,864 processor Sequoia IBM Bluegene/Q system at Lawrence Livermore National Laboratories to run complex simulations that d... | <urn:uuid:a8433d22-2a89-4e3e-9116-edc66bac3f85> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2223944/data-center/stanford-consumes-million-core-supercomputer-to-spawn-supersonic-noise-forecast.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00500-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93417 | 369 | 3.625 | 4 |
Since: BlackBerry 10.0.0
A class representing different input masking modes.
This class represents different input masking modes. You can use input masking to prevent characters that are typed in a text field from appearing. When input masking is enabled, typed characters appear as asterisks (*).
By default, users can ... | <urn:uuid:a279c879-d414-4439-bee7-1fa577f5f6b1> | CC-MAIN-2017-09 | https://developer.blackberry.com/native/reference/cascades/bb__cascades__textinputmasking.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00092-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.71108 | 232 | 2.625 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:3a762117-41b7-4631-962c-d01eca85af9a> | CC-MAIN-2017-09 | https://docs.com/ammar-ali/3256/abstract | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00092-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926857 | 1,743 | 2.875 | 3 |
By Ann Silverthorn
—According to a recent end-user survey, which included a section on "green" initiatives, nearly three-fourths of the respondents have an interest in adopting a green data-center initiative, yet only one in seven has successfully done so. For the purpose of the study, a green data center was defined a... | <urn:uuid:cede9f89-8448-40b0-b715-ddae770dad93> | CC-MAIN-2017-09 | http://www.infostor.com/index/articles/display/312697/articles/infostor/top-news/survey-reveals-green-initiatives-or-lack-thereof.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00268-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961527 | 484 | 2.625 | 3 |
Solar Eclipse from Space
/ March 12, 2013
The latest transmissions from NASA's Solar Dynamics Observatory (SDO), which took off in 2010 for its five-year mission to observe solar activity, shows the sun partially blocked from view by the Earth -- and the moon.
Such solar eclipses will be regular occurences for the next... | <urn:uuid:75969494-d65c-426c-9cc2-ca7058650aa5> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Solar-Eclipse-from-Space.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00620-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943128 | 129 | 3.078125 | 3 |
Development of Smart Cities
Smart cities are slowly becoming a reality; slowly on a global level, but for those cities determined to implement the necessary smart infrastructure, connected technology is often very rapidly impacting industrial, commercial and residential environments. Municipalities determined to implem... | <urn:uuid:523ba559-a313-4c1b-b480-ad72fcbeeae4> | CC-MAIN-2017-09 | https://cloudtweaks.com/2016/12/development-of-smart-cities/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00496-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940264 | 832 | 2.84375 | 3 |
BEAVERTON, OR--(Marketwire - Dec 5, 2012) - The amounts of sustained noise people are subjected to in everyday life have reached unsafe levels, according to a new report authored by leading sound experts and published today. Building in Sound, developed by Biamp Systems in collaboration with acoustics expert and TED sp... | <urn:uuid:2a6320cf-4330-41f8-9259-6b26b7fa69d5> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/biamp-systems-releases-report-on-the-hazardous-levels-of-noise-in-everyday-life-1733911.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00020-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951168 | 998 | 2.859375 | 3 |
A group of students at the University of Texas at Austin built and successfully tested a GPS spoofing device to remotely redirect an $80 million yacht onto a different route, the Houston Chronicle reports. The project, which was completed with the permission of the yacht's owners in the Mediterranean Sea this past June... | <urn:uuid:1e542ad5-57cf-4785-aae6-878bd5c2771b> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2225056/opensource-subnet/college-students-hijack--80-million-yacht-with-gps-signal-spoofing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00020-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971695 | 402 | 2.59375 | 3 |
ZoneAlarm revealed the common behaviours of younger Facebook users that increase their susceptibility to encountering cyberbullying, predators and other security threats.
A ZoneAlarm report examined the online activities of 600 children worldwide, aged between 10-15, who regularly use Facebook. Three activities in part... | <urn:uuid:81182385-74eb-433a-88b2-86e47098f968> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2012/11/12/young-facebook-users-are-most-vulnerable-to-security-threats/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00616-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94775 | 489 | 2.875 | 3 |
It may come as no surprise that Property and Casualty insurance varies from state to state, but were you aware that these differences aren't just circumstantial? In fact, most states go as far as to enact specific laws they believe will best protect their citizens or aid insurance providers that create employment and e... | <urn:uuid:c26576c6-64e8-4315-ae85-863b285ae190> | CC-MAIN-2017-09 | http://blog.mindhub.com/2014_08_01_archive.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00192-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955141 | 463 | 2.5625 | 3 |
Students in southern Sweden have developed a biometric payment system that can be used to buy things simply by placing a palm on a screen.
The biometric reader that the system is built around emits infrared light that is absorbed by the veins in the palm. The vein pattern is subsequently analysed by the terminal to est... | <urn:uuid:f759e23a-4de0-4a1c-b695-f6de0af8af4c> | CC-MAIN-2017-09 | http://www.cio.com/article/2377072/enterprise-software/swedish-students-enable-people-to-buy-cups-of-coffee-with-their-veins.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00064-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.975563 | 436 | 2.53125 | 3 |
If you're not using macros, you're ignoring one of Excel's most powerful features. Macros save you time and spare you headaches by automating common, repetitive tasks. And you don't have to be a programmer or know Visual Basic Applications (VBA) to write one. With Excel 2013, it's as simple as recording your keystrokes... | <urn:uuid:5958fbde-c5bc-4dd7-9106-d0452648883a> | CC-MAIN-2017-09 | http://www.itworld.com/article/2694597/enterprise-software/5-must-know-excel-macros-for-common-tasks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00184-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.794615 | 1,965 | 2.703125 | 3 |
Certificate authorities (CAs) have long been used as a trusted means to relay secure access to information via the Internet. CAs provide digital certificates that deliver the information once an application, or binary, is signed and validated by the service provider that owns the content in question. This trust model h... | <urn:uuid:18462cce-6c26-43da-b533-f9c635b31d2a> | CC-MAIN-2017-09 | https://www.mcafee.com/cf/security-awareness/articles/malicious-signed-binaries.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00184-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950682 | 494 | 2.59375 | 3 |
Richard Caudle | 29th January 2014
Recently I've covered the tagging and scoring features of DataSift VEDO. My post on scoring gave a top level overview and a simple example, but might have left you hungry for something a little more meaty. In this post I’ll take you through how we’ve started to build linear classifier... | <urn:uuid:54903a0b-a4ab-494d-b289-4b25396f6dcd> | CC-MAIN-2017-09 | http://dev.datasift.com/blog/how-apply-machine-learning-and-give-social-data-meaning | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00060-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.88732 | 2,217 | 2.734375 | 3 |
The leader in Eavesdropping Detection
and Counterespionage Consulting services
for business & government, since 1978.
THE OMINOUS EAR
by Bernard B. Spindel
Chapter 17. - Technical Aspects
The telephone instrument dates back to the early 1880’s. Wiretapping devices in existence at that time were extremely crude and basi... | <urn:uuid:fc7b1853-61cc-4e91-8041-aa4a3d51df75> | CC-MAIN-2017-09 | http://counterespionage.com/1968-bernard-spindel-the-ominous-ear.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00180-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963008 | 3,291 | 3.3125 | 3 |
A survey by Trend Micro suggests that British teens might be tempted by illegal online methods to make money. One in three teens (aged 12 – 18) admitted they would consider hacking or spying on people online if it meant they could make some fast cash. The survey exposes lack of “e-morals” at a time where kids are spend... | <urn:uuid:a93fe59b-c175-48be-8da3-b8974a95bc60> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2009/04/03/survey-shows-teens-would-spy-on-people-online-for-money/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00356-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9432 | 406 | 2.9375 | 3 |
Imagine floating on the empty blue Pacific Ocean, nothing but water in every direction, sunrise to sunset. Yet under the surface swim thousands of great white sharks.
That's not a bad dream - it's actually what happens around this time of year several thousand miles off the coast of Baja California, about halfway to Ha... | <urn:uuid:97f21b20-f2de-4269-b542-ecc0b8dea6f9> | CC-MAIN-2017-09 | http://www.govtech.com/products/Scientists-Develop-Drones-to-Study-Habits-of-Sharks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00056-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951034 | 1,407 | 2.828125 | 3 |
Could some sort of briny water be flowing on Mars during its warm season? Seems that may be the case as NASA today said its red planet-orbiting satellite spotted possible flowing water, furthering the idea that Mars has or still does harbor life.
The results from NASA's Mars Reconnaissance Orbiter are the closest scien... | <urn:uuid:c46924f1-08fe-4cdd-a1a7-0412532a5a91> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2220346/security/nasa-satellite-may-have-found-water-on-mars.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00584-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950246 | 448 | 3.21875 | 3 |
In June 2010, the world became aware of Stuxnet, largely considered to be the most advanced and dangerous piece of malware ever created. But before you run to check that your antivirus software is up to date, note that Stuxnet, largely believed to be state-created, was created with one singular purpose in mind - to cri... | <urn:uuid:eff17073-61d2-46c9-b2ab-cb088a8b24fe> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2221881/security/duqu-trojan-contains-unknown-programming-language.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00228-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962733 | 1,295 | 2.8125 | 3 |
Oh yes, that’s a real thing even if YOUR browser thinks “affective” is not a word and shames it with a red squiggly. Affective forecasting is the act of predicting an emotional reaction to some hypothetical future event. We use it frequently. Have you ever filled out a survey that asked you how likely you would be to r... | <urn:uuid:834d8e23-7a67-4087-9fb8-1c2d6290bd4a> | CC-MAIN-2017-09 | https://www.brandenwilliams.com/blog/2016/08/16/affective-forecasting-strikes-again/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00104-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9767 | 368 | 2.75 | 3 |
In a second report this week on scientists' use of nanotechnology to battle cancer, researchers at MIT announced a new way to use nanoparticles to give cancerous cells a one-two punch.
MIT reported that researchers used nanoparticles to carry two drugs and release them one at a time. The treatment was shown to "dramati... | <urn:uuid:2e34d4ba-4d6e-4975-9225-b020dc114e79> | CC-MAIN-2017-09 | http://www.cio.com/article/2376377/healthcare/mit-uses-nanotech-to-hit-cancer-with-one-two-punch.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00280-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954147 | 851 | 3.28125 | 3 |
APIs have been making the news lately, especially with Apple’s release of Metal API for iOS. But APIs themselves have been around for a long time. They’re a necessity in today’s ever-changing tech landscape, which is why understanding them is key to providing users with the interoperability they now require.
What is an... | <urn:uuid:6ec71613-9f3d-41a6-92b0-8f297fe57c80> | CC-MAIN-2017-09 | http://www.codero.com/blog/apis-101-what-you-need-to-know-about-the-keys-to-the-kingdom/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00049-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920744 | 658 | 3.203125 | 3 |
Baidu, , China's leading search engine, is making available Chinese language APIs for its four key speech technologies: Long Utterance Speech Recognition, Far-Field Speech Recognition, Expressive Speech Synthesis and Wake Word.
Baidu said its intent is to provide developers with access to its AI-based technologies. Bai... | <urn:uuid:62f65905-ba0e-49ef-a506-05be427bca5e> | CC-MAIN-2017-09 | http://www.convergedigest.com/2016/11/baidu-opens-chinese-language-apis-for.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00049-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94636 | 238 | 2.65625 | 3 |
Cooling Data Center CostsBy Samuel Greengard | Posted 2010-08-13 Email Print
Roughly 40 percent of the energy consumed in data centers is a result of cooling systems, and that figure is rising. Reversing that trend is possible, and could mean big savings.
One of the hottest opportunities for greening the data center li... | <urn:uuid:0e34533e-eff2-4220-a2b8-4cfc9c376e48> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/IT-Management/Cooling-Data-Center-Costs-368334 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00401-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913103 | 263 | 2.609375 | 3 |
High-wireless act: Can high-frequency WiFi be practical?
- By Greg Crowe
- Oct 16, 2012
This article has been updated to correct an inaccurate reference to the 60 GHz band as 60 MHz.
As agencies continue to build out wireless networks and extend the use of mobile devices, a new spectrum specification, which will add a ... | <urn:uuid:f7363859-6ac8-455e-bf76-9712da4e40f4> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/10/16/explainer-60-mhz-wifi-band-signal-propagation-loss.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00449-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943038 | 678 | 2.953125 | 3 |
- By Bruce McConnell
- Nov 12, 2000
International cybercrime — attacks on mission-critical government or private
computers from across national boundaries — is an increasing threat. Can
Self-protection through strong secur-ity tools and practices remains
the principal defense. Ultimately, however, governments must addr... | <urn:uuid:24766320-ce88-4242-ac9b-379cc372d317> | CC-MAIN-2017-09 | https://fcw.com/articles/2000/11/12/responding-internationally.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00445-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927379 | 638 | 2.9375 | 3 |
In 1st edition AD&D two character classes had their own private languages: Druids and Thieves. Thus, a character could use the “Thieves’ Cant” to identify peers, bargain, threaten, or otherwise discuss malevolent matters with a degree of safety. (Of course, Magic-Users had that troublesome first level spell comprehend ... | <urn:uuid:5c71d3a7-caa7-46dd-94c1-abf46dd7df5d> | CC-MAIN-2017-09 | https://deadliestwebattacks.com/2013/08/27/dry-fiend-conjurationsummoning/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00321-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.820459 | 1,233 | 2.828125 | 3 |
Google relies on internally developed software.
Google primarily relies on its own internally developed software for data and network management and has a reputation for being skeptical of "not invented here" technologies, so relatively few vendors can claim it as a customer.
Google's primary programming languages incl... | <urn:uuid:bb8068d9-290d-4b6f-836e-f86a0d780bac> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Projects-Networks-and-Storage/Base-Technologies-Internal-Development | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00441-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.739199 | 281 | 2.609375 | 3 |
Frequently Asked Questions
You may have heard of identity theft, but what does this term really mean? Going far beyond credit card fraud, identity theft is a rapidly growing crime that most people will face at some point in their lives. Identity theft is officially defined as the deliberate assumption of another person... | <urn:uuid:757d3864-2141-49b6-9b9c-8e8d891ea288> | CC-MAIN-2017-09 | https://www.idstrong.com/faq.php | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00141-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939617 | 1,514 | 2.890625 | 3 |
Fintech Through Education
With technology permeating all industries, few of us would feel confident utilizing financial products or services that aren’t thoroughly tech-integrated, and yet the realm of fintech is still observed warily by many. Though fintech indeed incorporates many of the cutting-edge innovations whic... | <urn:uuid:ba669904-4faa-4c79-9e98-61365ffa498b> | CC-MAIN-2017-09 | https://cloudtweaks.com/2017/01/deciphering-fintech-education/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00493-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943636 | 855 | 2.71875 | 3 |
Hoping to usher in an age of low-cost solar power, Harvard's Clean Energy Project in June plans to release a list of 20,000 organic compounds that could be used to make cheap, printable photovoltaic cells.
In a move that it hopes will help usher in an age of low-cost solar power, Harvard University's Clean Energy Proje... | <urn:uuid:0e1fc466-fc8b-4a03-a098-2c41185aee19> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2165990/servers/harvard-aims-to-help-developers-make-cheaper-solar-panels.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00017-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9527 | 460 | 3.59375 | 4 |
Windows Security: Part 6
In my last blog posting I discussed the Encrypting File System (EFS) that is built into every Windows operating system since Windows 2000 and how EFS works. Although EFS is effective as a security control against data security breach-related risks, a major limitation is that it does not provide... | <urn:uuid:c3599666-7f67-4eec-8353-721141d36c9b> | CC-MAIN-2017-09 | http://blog.emagined.com/2009/12/windows-security-part-6/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00369-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920223 | 821 | 2.875 | 3 |
If you want a wearable Internet of Things, the electronics have to be as small and as energy efficient as possible. That's why a new microcontroller by Freescale Semiconductor is notable.
The company has produced the Kinetis KLO3 MCU, a 32-bit ARM system that is 15% smaller than its previous iteration but with a 10% po... | <urn:uuid:9fcd8cdf-92a3-4de0-92c1-4808a2b5ca1b> | CC-MAIN-2017-09 | http://www.cio.com/article/2378260/consumer-technology/shrinking-microcontrollers--means-smaller-wearable-computers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00369-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921979 | 549 | 2.703125 | 3 |
For some states, economic development is more than bringing jobs to a region to lower the unemployment rate: It's about saving small towns from extinction. North Dakota is one of those states, and economic-development officials hope to save as many rural towns as possible from dying a slow death.
For many of the state'... | <urn:uuid:320ec00a-1764-455d-9d67-aa82f6339d81> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Tug-of-War.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00369-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.983351 | 1,308 | 2.734375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.