text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Here Is a Hint Invest In STEM Workers July 6, 2013 Have you ever heard of a STEM (science, technology, engineering, and math) worker? Probably not, but Brookings.edu reports in the article, “The Hidden STEM Economy” that 20% of the twenty-six million jobs in the US are in the STEM field. Since the economic downfall, re...
<urn:uuid:9b3e4606-f30d-4bc8-afc2-984ab13d5068>
CC-MAIN-2017-09
http://arnoldit.com/wordpress/2013/07/06/here-is-a-hint-invest-in-stem-workers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00574-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95188
346
2.8125
3
Search Engine Poisoning: On The Rise Today, Imperva released a report on search engine poisoning. Search Engine Poisoning attacks manipulate, or “poison”, search engines to display search results that contain references to malware-delivering websites. There are a multitude of methods to perform SEP: taking control of p...
<urn:uuid:78229175-2548-4dce-9d41-79b15e0a5974>
CC-MAIN-2017-09
http://blog.imperva.com/2011/06/search-engine-poisoning-on-the-rise.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00098-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935108
533
2.59375
3
Governor Arnold Schwarzenegger today participated in the launch of Ausra's Kimberlina Solar Energy Facility in Bakersfield. The five megawatt (MW) solar thermal power plant, the first to come online in California in more than 15 years, is a demonstration facility for utility-scale thermal solar energy plants, such as t...
<urn:uuid:fa520d5d-5332-4607-9a51-a62ce7d816ad>
CC-MAIN-2017-09
http://www.govtech.com/technology/Solar-Energy-Plant-Comes.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00274-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947709
841
2.703125
3
Years ago, many companies relied on a perimeter defense strategy, assuming that would be enough to protect their network. But in today’s cyber-security landscape, threats can just as easily come from inside the network. According to the IBM 2015 Cyber Security Intelligence Index, 55 percent of all attacks were carried ...
<urn:uuid:6400e0d8-afcb-4f65-abd3-8fb06c118c8f>
CC-MAIN-2017-09
https://www.bradfordnetworks.com/control/network-segmentation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00274-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929714
186
2.734375
3
Linux sort command - Sort lines of text files Himanshuz.chd 270004408M Visits (79435) man page of sort command: So we see that the main purpose of this command is to produce a sorted output. Linux sort command examples 1. A basic exampleThe very first input that I tried consisted of some random alphabets. Here is what ...
<urn:uuid:0a917528-2b15-4388-843b-2d8f7f412af2>
CC-MAIN-2017-09
https://www.ibm.com/developerworks/community/blogs/58e72888-6340-46ac-b488-d31aa4058e9c/entry/linux_sort_command_sort_lines_of_text_files9?lang=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00626-ip-10-171-10-108.ec2.internal.warc.gz
en
0.8708
868
3.234375
3
The recently shelved SOPA (Stop Online Piracy Act) and PIPA (PROTECT-IP Act) bills that were up for consideration in the U.S. Congress have once more brought to the forefront a touchy subject, particularly with regard to the Internet: intellectual property (IP). With IT becoming such a critical underpinning of the U.S....
<urn:uuid:d58426c1-77c7-422c-b4c8-cddeacaf2dec>
CC-MAIN-2017-09
http://www.datacenterjournal.com/aftermath-of-sopa-and-pipa-lets-talk-ip/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00446-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940733
1,594
2.515625
3
Troubleshoot Windows DNS Problems In any enterprise, DNS services are a crucial backbone for network connectivity. DNS is used for name resolution, allowing one client to locate another client. If DNS fails, it will disrupt connectivity to the Internet. In this article, we'll consider some common issues caused by misco...
<urn:uuid:b5724d66-a970-41d0-9abf-101871a91160>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netos/article.php/3934066/Troubleshoot-Windows-DNS-Problems.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00446-ip-10-171-10-108.ec2.internal.warc.gz
en
0.912844
1,099
2.65625
3
Teachers in Pennsylvania are being encouraged to use increasing amounts of technology in the classroom. The downside to this trend is the increased risks that students face online by accessing inappropriate or potentially harmful content. There’s no doubt that the increased use of technology in Connecticut classrooms e...
<urn:uuid:9cbd5425-c27d-43f3-be7e-3bc536295ac3>
CC-MAIN-2017-09
https://www.imperosoftware.com/tag/internet-safety/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00146-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946693
195
3.296875
3
The VoIP Peering Puzzle�Part 1: Concepts and Challenges If you've been reading Enterprise VoIPplanet.com, you have doubtless come across the term VoIP peering; it is certainly among the top buzzwords in today's networking culture. Webster's defines peer as "one that is of equal standing with another." But to fully unde...
<urn:uuid:59c2a495-9085-4999-904e-f2e903e4c857>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/unified_communications/The-VoIP-Peering-Puzzle151Part-1-Concepts-and-Challenges-3644066.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00090-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948615
1,430
3.015625
3
Rob Charlton, CEO, Space Group & Adam Ward, Director, BIM Technologies In an age of perpetual advancing technology, it’s often difficult to keep up with what’s going to be the “next big thing”. Traditional construction methods are fast being overtaken by modern building processes, and what we’re now terming; digital co...
<urn:uuid:146b0984-1381-414f-a116-c110841236b5>
CC-MAIN-2017-09
https://www.brighttalk.com/webcast/14607/223683
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00442-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927072
342
2.671875
3
Cloud computing is making infrastructural breakthroughs on the roads even as the term ‘infrastructure’ becomes more tech and virtual than its original meaning. Even if one hears of Infrastructure as a Service (IaaS) in computer matters, pretty often, it might be soon possible to think out of the box and attach it to th...
<urn:uuid:10293297-6f6f-4cfb-95b0-5bb9423da907>
CC-MAIN-2017-09
https://cloudtweaks.com/2013/04/cloud-computing-may-fast-track-road-operability/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00618-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951611
702
2.890625
3
Kitamura A.,Japan Atomic Energy Agency | Kitamura A.,Geological Isolation Research and Development Directorate | Kurikami H.,Japan Atomic Energy Agency | Kurikami H.,Geological Isolation Research and Development Directorate | And 21 more authors. Nuclear Science and Engineering | Year: 2015 Significant amounts of radio...
<urn:uuid:0acfe06d-5d87-4e99-8ab1-4a2ca79a9767>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/geological-isolation-research-and-development-directorate-2637423/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00618-ip-10-171-10-108.ec2.internal.warc.gz
en
0.898448
429
2.78125
3
When it comes to transportation, the United States is No.1. We have more miles of highway and railroad, we drive more miles in our vehicles, and we fly more passengers in our airplanes than any other country in the world. The transportation market is a $600 billion industry, according to BizStats.com, with the public s...
<urn:uuid:30b07ce3-5caf-4ddf-8e20-2d558132c553>
CC-MAIN-2017-09
http://www.govtech.com/featured/The-Integration-Highway.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94914
2,452
2.578125
3
A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP packets exchanged during a phone conversation. They called the method TranSteg, and they have proved its effectiveness by creating a proof-of-conc...
<urn:uuid:106ee860-0b28-45b5-b2d5-880c46025b08>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2011/11/15/hiding-messages-in-voip-packets/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940024
468
2.796875
3
What Is Cloud Computing What is cloud computing you ask? The concept may seem nebulous or hard to decipher but in reality is very simple and compelling. It provides a cost effective solution, especially to IT professionals who can now reap the benefits provided by cloud computing without having to spend exorbitant amou...
<urn:uuid:85560f06-713d-4d1e-a46b-4c6f8409f16c>
CC-MAIN-2017-09
https://cloudtweaks.com/2011/11/what-is-cloud-computing-yes-another-perspective-part-1/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00018-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960883
487
3.28125
3
Critics of Voice over Internet Protocol (VoIP) site that VoIP programs lack security. However, with recent advancements in the telecommunications industry, this is now a claim of the past. All VoIP systems can be individually customized based on a company’s security requirements. For example, the main security issues w...
<urn:uuid:b18f5435-f1af-4f96-8c4a-c0b4df92cde2>
CC-MAIN-2017-09
http://jive.com/blog/verifying-voip-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00438-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958358
484
2.640625
3
In economics, scarcity is the fundamental problem of "having humans [with]... unlimited wants and needs in a world of limited resources" (see Resources). When resources are scarce, people compete for access to them. Competition for resources is evident when it comes to people getting access to environments on tradition...
<urn:uuid:e9c75815-2abf-4015-a884-d9bb2540f76d>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/java/library/a-devops3/index.html?ca=drs-
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00438-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925004
2,018
2.546875
3
Website Hacking means altering or manipulating the website content or database i.e. manipulate website contents say CSS or Javascipts, leak its users database, corrupt its database, deface the website’s index page, exploit the anonymous login and much more… Hacking websites is nowadays became a fashion among the Hacker...
<urn:uuid:13aff9d4-c1df-4e21-a513-62fa62027f79>
CC-MAIN-2017-09
https://www.hackingloops.com/website-hacking-learn-how-to-hack-websites/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00438-ip-10-171-10-108.ec2.internal.warc.gz
en
0.81666
469
2.578125
3
Juniper app works to correct GPS errors - By John Breeden II - Oct 03, 2013 Government workers who frequently use GPS applications know both their strengths and limitations. While the system is accurate down to about two or three meters, sometimes that isn't good enough. And when natural or manmade structures skew the ...
<urn:uuid:01e45f9f-fe55-45ab-a524-f3dbdca1c556>
CC-MAIN-2017-09
https://gcn.com/articles/2013/10/03/juniper-systems-navigation-app.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00314-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961103
717
2.71875
3
Late last month, the National Academy of Engineering and National Research Council released a report that recommended the Defense Department overhaul its recruiting and hiring practices in order to effectively compete for critical workers in the science, technology, engineering and mathematics fields. While that report...
<urn:uuid:4917bfad-12ba-4c15-bf25-5a72421212bd>
CC-MAIN-2017-09
http://www.nextgov.com/cio-briefing/wired-workplace/2012/11/stem-recruiting/59557/?oref=voicesmodule
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00134-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944745
559
2.578125
3
On Wednesday, the Ponemon Institute released the results of a new study conducted for DB Networks. In it, 65 percent of the respondents said that they've experienced one or more SQL Injection attacks in the last 12 months. In addition, each incident took an average of 140 days to discover, and 68 days to fix the issue....
<urn:uuid:274f46a5-3bf3-4555-b9fa-7ab037998926>
CC-MAIN-2017-09
http://www.cio.com/article/2377067/security0/organizations-suffer-sql-injection-attacks--but-do-little-to-prevent-them.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00486-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967505
606
2.546875
3
The goal of this series is to try to answer an age-old question that is often asked and rarely answered. Namely: is the TLS protocol provably secure? While I find the question interesting in its own right, I hope to convince you that it’s of more than academic interest. TLS is one of the fundamental security protocols ...
<urn:uuid:5e63a805-27c0-48f5-9f4e-27536b905819>
CC-MAIN-2017-09
https://blog.cryptographyengineering.com/2012/09/28/on-provable-security-of-tls-part-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00482-ip-10-171-10-108.ec2.internal.warc.gz
en
0.911127
3,241
2.5625
3
Configuring and Planning a Windows Server Cluster In the first three installments of this series ( Is a Server Cluster Right for Your Organization? , Choosing the Cluster Type that's Right For You , and Network Load Balancing Clusters ), I discuss the concepts involved in setting up a server cluster. As I do, I discuss...
<urn:uuid:1c5c6baf-0f39-4239-ac83-34885929474b>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsysm/article.php/624431/Configuring-and-Planning-a-Windows-Server-Cluster.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00006-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949499
1,415
2.5625
3
Hardware RAID configuration on the IBM Power platform RAID configuration on the IBM Power platform RAID stands for Redundant Array of Independent Disks and it involves two key design goals: Increased data reliability and increased input/output (I/O) performance. When multiple physical disks are set up to use the RAID t...
<urn:uuid:c031ab23-495c-4654-b5a8-e9af8f31adf9>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/aix/tutorials/au-aix-raid/index.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00006-ip-10-171-10-108.ec2.internal.warc.gz
en
0.788364
1,419
3.21875
3
Over the past five years, 43 U.S. states have adopted data breach notification laws, but has all of this legislation actually cut down on identity theft? Not according to researchers at Carnegie Mellon University who have published a state-by-state analysis of data supplied by the U.S. Federal Trade Commission (FTC). "...
<urn:uuid:fa242bb7-5eef-42a4-9c1c-f7f5b14080e3>
CC-MAIN-2017-09
http://www.csoonline.com/article/2122802/identity-theft-prevention/researchers--notification-laws-not-lowering-id-theft.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00534-ip-10-171-10-108.ec2.internal.warc.gz
en
0.968134
885
2.546875
3
Chip-and-PIN refers to the use of a chip-based bankcards and a mandatory PIN entry for credit and debit card payments. The term was was coined in the United Kingdom and is the government-backed initiative to implement the EMV standard for secure payments in the UK. Though people commonly call it chip-and-PIN, the techn...
<urn:uuid:7c8c15ae-dacf-44bc-afa5-708ddcec9875>
CC-MAIN-2017-09
https://www.justaskgemalto.com/en/what-is-chip-and-pin/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00234-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94738
218
3.375
3
Wireless technology has exploded in the last several years, and it provides an expanding array of technology choices. Wireless technology refers to the transmission and receipt of information (voice, fax, data) using radio frequency (RF) energy. It can be point-to-point, analogous to telephone or leased-circuit connect...
<urn:uuid:ac9fa957-3756-4b55-8cd2-51ad08cf6c56>
CC-MAIN-2017-09
http://www.govtech.com/featured/Governments-Surfing-the-Wireless-Wave.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00354-ip-10-171-10-108.ec2.internal.warc.gz
en
0.899752
3,791
3.265625
3
Trojan horses gain inside track as top form of malware Panda Security released its latest report on computer malware, showing unexpected trends government security managers should know about, including the resurgence of a traditional form of malware. First, the number of new infections is staggering, though system admi...
<urn:uuid:f92b86af-be99-4592-a4f5-1343756c2fc0>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2013/05/trojan-horses-top-malware.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00530-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964768
601
2.53125
3
3D Printing and the Future of Manufacturing Who would have thought that modern manufacturing could be done without a factory? Since the Industrial Revolution, manufacturing has been synonymous with factories, machine tools, production lines and economies of scale. So it is startling to think about manufacturing without...
<urn:uuid:c0555ee4-0776-45a5-b5b0-c7e05f4a0ff3>
CC-MAIN-2017-09
http://www.csc.com/innovation/insights/92142-the_future_of_3d_printing_services_and_manufacturing?ref=rec&dyn=0
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00578-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954632
724
2.890625
3
What Does Flame Mean? Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on. All this data is available to the operators through the link to Flame’s command-and-control servers....
<urn:uuid:d0236aa9-8970-4787-a233-1bf1a9888cf5>
CC-MAIN-2017-09
http://blog.imperva.com/2012/05/what-does-flame-mean.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00102-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951682
578
2.984375
3
Cray J. Henry | The multicore challenge Another View | Guest commentary: The makers of multicore processors in PCs could learn a few things from high-performance computing - By Cray Henry - Sep 20, 2007 Cray J. Henry Before the beginning of this decade you could have spent millions of dollars in new computer hardware e...
<urn:uuid:64f6f7e6-a4d3-436e-93ca-f3caee7bce6e>
CC-MAIN-2017-09
https://gcn.com/articles/2007/09/20/cray-j-henry--the-multicore-challenge.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00102-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950652
1,333
2.890625
3
Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing web browser sessions, but it has widespread application to other tasks. TLS/SSL can be used to provide strong authentication of both ...
<urn:uuid:9fe758f4-4ae8-49bb-88c6-3d8710f57d91>
CC-MAIN-2017-09
https://www.infosecurity-magazine.com/white-papers/best-practices-and-applications-of-tlsssl/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00454-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93628
237
3.421875
3
Docker started out as a means of creating single application containers, but since has grown into a widely used dev tool and runtime environment. It has been downloaded around two billion times, and Redmonk has said that “we have never seen a technology become ubiquitous so quickly.” The Docker registry stores containe...
<urn:uuid:4d0afe8c-bf11-45e7-bf9f-22e6062388ee>
CC-MAIN-2017-09
https://cloudtweaks.com/2016/09/history-containers-rise-docker/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00223-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965203
156
2.59375
3
What's the purpose of signing a form? On the simplest level, a signature is simply a way to make someone legally responsible for the content of the form. But in addition to the legal aspect, the signature is an appeal to personal integrity, forcing people to consider whether they're comfortable attaching their identity...
<urn:uuid:33b504bb-c84f-4c3f-9dbf-bf7d467f9f4a>
CC-MAIN-2017-09
https://arstechnica.com/science/2012/08/youre-less-likely-to-lie-if-you-sign-your-name-before-filling-out-forms/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00399-ip-10-171-10-108.ec2.internal.warc.gz
en
0.968737
996
3.046875
3
The Internet and the Domain Name System (DNS) are continually changing; domains are constantly created and existing ones are frequently modified. Cybercriminals change DNS records to hijack domains and redirect traffic to malicious websites. The redirected traffic bypasses their hosts leaving organizations unaware that...
<urn:uuid:7af60c17-afda-4e77-aa45-3947fe8aa5eb>
CC-MAIN-2017-09
https://www.farsightsecurity.com/solutions/threat-intelligence-team/dns-changes/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00575-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919951
341
2.703125
3
For many organizations, web sites serve as mission critical systems that must operate smoothly to process millions of dollars in daily online transactions. However, the actual value of a web site needs to be appraised on a case-by-case basis for each organization. Tangible and intangible value of anything is difficult ...
<urn:uuid:254199e5-ed7c-4c14-9d3f-e27f4c0c373b>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2004/07/28/web-security-threat-classification/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00099-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91939
304
2.6875
3
State agencies that help protect our land, water and air and manage our natural resources have -- well -- an environmental problem. The regulations they enforce to reduce pollution and to ensure the wise use of trees, minerals, water and land are generating huge amounts of paper. Businesses must send in forms and docum...
<urn:uuid:ba1f4382-5757-424c-9fd9-5e396a7063f1>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Imaging-Takes-on-the-Environment.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00095-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945205
1,396
2.71875
3
Article by Coleen Torres Cell phones don’t feel newfangled but in truth they are. With innovation comes swift change, sometimes so swift that it is difficult for forensic scientists to keep up. Criminals use cell phones in a variety of crimes and it is up to the forensic scientists to uncover their transgressions. But ...
<urn:uuid:0a28721c-175e-4a53-920e-8b34ba377b2f>
CC-MAIN-2017-09
http://www.infosecisland.com/blogview/20180-Seven-Problems-with-Cell-Phone-Forensics.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00271-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93011
629
3.25
3
by Oleg Davydov, CTO, Oxygen Forensics Modern smartphones are much more than just a device for voice calls. Now they contain a lot of personal data – contact list, communication history, photos, videos, Geo tags etc. Most smartphones can also work as a modem. Almost every modem is Hayes-compatible which means it suppor...
<urn:uuid:9553f4f2-e531-4497-9766-b40c6b152a71>
CC-MAIN-2017-09
https://articles.forensicfocus.com/2017/02/03/unlocking-the-screen-of-an-lg-android-smartphone-with-at-modem-commands/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00271-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916174
1,003
2.984375
3
Everyone is aware that selecting passwords wisely and safeguarding them should be an important priority, yet most people need to remember so many passwords that it’s nearly impossible to do so. Because of the need to recall dozens of passwords and keep up with their rotation many people are forced to use insecure short...
<urn:uuid:a704e19d-2907-412b-8ff5-5a1e9a5d6e46>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2005/01/10/password-management-with-passwordsafe/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00447-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930017
902
2.734375
3
Researchers have found a way to make colors more vivid on an e-reader screen, which could lead to the creation of advanced displays and spawn the development of color e-books. The researchers at the University of Michigan at Ann Arbor were able to trap narrow beams of light at different lengths, which ultimately reflec...
<urn:uuid:91e6f911-bf84-4a9d-8cd0-3ab21a025219>
CC-MAIN-2017-09
http://www.cio.com/article/2388563/hardware/researchers-mimic-peacock-to-bring-vivid-color-to-e-readers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00323-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946819
534
2.96875
3
At SC09 this week, Mitrionics announced it has started to work on an experimental compiler that aims to make parallel programming architecture-agnostic. The goal of the work is to extend the Mitrion-C platform for FPGAs to multicore CPUs, cluster architectures, and eventually even GPGPUs. We asked Stefan Möhl, Mitrioni...
<urn:uuid:1e2a01fd-6794-48cc-b6cd-205e447d0482>
CC-MAIN-2017-09
https://www.hpcwire.com/2009/11/18/mitrionics_looks_beyond_fpgas/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00323-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943607
1,953
2.546875
3
The MIT SENSEable City Lab's Real Time Rome project aggregates data from cell phones to better understand urban dynamics in real time. By collecting location data from cell phone users, and speed and location data from bus and taxi fleets, the project aims to help Roman commuters make better decisions about their envir...
<urn:uuid:ac2cc628-64d9-4e33-8f52-e08338076438>
CC-MAIN-2017-09
http://www.govtech.com/e-government/MIT-Project-Aggregates-Cell-Phone-Data.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00267-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926498
140
2.921875
3
Regardless of where you stand on the net neutrality debate, one thing doesn’t help: misleading or confusing statements. Unfortunately there are plenty of them. Net neutrality is an Internet ideal that will become possible If the Federal Communications Commission decides to reclassify Internet service providers from inf...
<urn:uuid:06ee1600-be4f-467e-b735-4e8b317a02d7>
CC-MAIN-2017-09
http://www.cio.com/article/2853420/internet/net-neutrality-five-myths-and-the-real-facts.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00143-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948283
966
2.734375
3
Reducing power usage and cutting carbon emissions is probably the right thing to do for the future of the planet. But keep this is mind: Green is a powerful marketing term right now and cost-savings promises are part of the marketing pitch. Like all marketing promises, results vary. One example: The amount of money a t...
<urn:uuid:1cb6ce31-36d2-4392-ac3f-e546f78b0aa3>
CC-MAIN-2017-09
http://www.cio.com/article/2419072/hardware/beware-worthless-claims-in-green-clothing.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00019-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9507
1,085
2.75
3
Femtocells sound vaguely like a cross between a Feynman diagram and a biology class, but they're the latest piece of gear that millions of people will soon want in their homes without having missed them before. A femtocell is a small cellular base station designed to provide superior, short-range, indoor cellular cover...
<urn:uuid:745ea575-74eb-4f77-a52b-b500126555b6>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2010/06/small-is-beautiful-put-a-cell-in-your-house/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00439-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954816
1,735
2.59375
3
Three industrial revolutions that have brought epic changes to the world of business are steam engines, mass production, and internet technology. Today, we are in the midst of what is often called the fourth industrial revolution – the convergence of physical things with the world of the internet: The Internet of Thing...
<urn:uuid:6cba055e-c8a2-4a60-951b-6dd07a8d64ad>
CC-MAIN-2017-09
https://www.bosch-si.com/internet-of-things/iot-downloads/iot-strategy/iot-based-business-models-white-paper.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00491-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927756
277
2.65625
3
All U.S. passports issued since June 2007 are electronic passports, or epassports, which have advanced digital security features. All epassports have a small gold logo printed on the cover. (See illustration at right) The epassport is based on a contactless smart card chip embedded in the cover. Think of it as a comput...
<urn:uuid:e888bcda-2ad8-4b4e-a3ae-8b3a9fb21742>
CC-MAIN-2017-09
https://www.justaskgemalto.com/us/us-electronic-passport/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00487-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915601
730
3.015625
3
Top 10 cyber security tips High profile hacking incidents continue to make headlines around the world. The Target data breach that compromised 40 million customer accounts is still reverberating around the retail universe, and earlier this month a hacker organization targeted CNET, the popular technology and consumer e...
<urn:uuid:e9cade97-8942-4a40-a00e-4b407736b8e7>
CC-MAIN-2017-09
https://betanews.com/2014/07/25/top-10-cyber-security-tips/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00007-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915971
859
2.578125
3
In September of 1948, the average high temperature in Washington, D.C., was 79.8 degrees Fahrenheit, off just a tick from the historical average of 80.7. So it’s ironic that September would go down in history as the month of the Big Freeze – at least in the television business. The freeze referred to an FCC decision to...
<urn:uuid:9c1c7381-cdab-4dfa-8057-ee774b0831ec>
CC-MAIN-2017-09
https://www.cedmagazine.com/article/2014/02/memory-lane-broadband-alternative-heats
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00359-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949455
910
3.046875
3
Many are aware of the well-publicized Google Glass that pairs the Internet with a set of shades. What takes some by surprise, however, is how many other products have followed suit. The trend has been dubbed with a variety of titles, such as the “Internet of Things” and the “Internet of Everything,” titles which — cons...
<urn:uuid:d9deb282-1f19-487f-b172-d708c4372007>
CC-MAIN-2017-09
http://www.govtech.com/internet/10-Surprising-Things-Connected-to-the-Internet.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00235-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939286
1,340
2.640625
3
Old-school recordkeeping meets the Digital Age How does the government manage data that was born digital, meaning it was created in electronic form? Organizations as varied as the National Archives and Records Administration (NARA), the White House, open-government groups, and House members have recently offered recomm...
<urn:uuid:8cec10ef-793c-4f3e-9048-59667e1733d6>
CC-MAIN-2017-09
https://fcw.com/articles/2008/08/15/oldschool-recordkeeping-meets-the-digital-age.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00355-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949066
1,545
2.828125
3
Here are some common scams along with ways to protect yourself: U.S. Census Scam How it works: Someone calls you claiming to be from the Census, the IRS or other “trusted” organization and asks you to divulge personal financial information, donations, and/or Social Security numbers. In addition, fraudsters now have dev...
<urn:uuid:66aa7d42-a641-4f06-964a-b64d2f8b2ddd>
CC-MAIN-2017-09
http://news.centurylink.com/news/centurylink-urges-customers-not-to-be-fooled-by-scams
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00051-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94119
1,092
2.890625
3
After a successful liftoff this morning, the SpaceX Dragon spacecraft is on its way to rendezvous with the International Space Station. "Very excited to be back here. We're a launch company and we love to launch," said Gwynne Shotwell, president of SpaceX, before launch. "We're prepared to fly." However, the flight has...
<urn:uuid:0db81c83-4c93-465d-b24f-6969adcbc746>
CC-MAIN-2017-09
http://www.networkworld.com/article/2164033/data-center/nasa--spacex-launch-dragon-but-glitch-delays-power-supply.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944557
565
2.640625
3
A snake has been moving through the pipes and systems of a nuclear power plant near Vienna, Austria. It may not be as creepy as you think. This particular snake is multi-jointed robotic machine. Carnegie Mellon University's robotic snake climbs a 1-in. machinery cord at the Zwentendorf nuclear power plant in Austria. (...
<urn:uuid:0513a531-79d5-4a69-b1f8-aaccf90adbaa>
CC-MAIN-2017-09
http://www.networkworld.com/article/2168012/data-center/robotic-snake-ssslithers-through-nuclear-plant.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz
en
0.969612
790
3.640625
4
An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the same phenomenon in the information security field. Information security has grown from being a small subset of IT to now being something of critical importanc...
<urn:uuid:49949b1a-4d4b-4e06-9359-151e3836eda4>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/04/10/a-call-to-arms-for-infosec-professionals/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962856
1,137
2.78125
3
More Americans are concerned about not knowing how the personal information collected about them online is used than losing their principal source of income. A new study by TRUSTe and the National Cyber Security Alliance found that online privacy concerns topped the loss of personal income by 11 percentage points, even...
<urn:uuid:b455da23-03c3-4754-8cb8-6a775995c101>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2016/01/29/consumers-are-increasingly-concerned-about-privacy-and-theyre-acting-on-it/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00103-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964641
595
2.671875
3
Uncertain State Of Cyber WarJust what does "cyber warfare" mean? We're still figuring out tactics and capabilities. Military agencies worldwide are right in the middle of figuring out the tactics and capabilities that will be critical in any future cyber war. So far, any conflicts are playing out behind the scenes, wit...
<urn:uuid:da7f5477-4a1b-471e-8f95-28531a1c433f>
CC-MAIN-2017-09
http://www.darkreading.com/risk-management/uncertain-state-of-cyber-war/d/d-id/1108255?cid=sbx_byte_related_commentary_government_and_vertical_industry_security_nasa_tightens_security_in_response_to_in&itc=sbx_byte_related_commentary_government_and_vertical_industry_security_nasa_tightens_security_in_response_to_in
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00224-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946316
722
3.03125
3
Back in January 1997, a group of people developed RFC 2065, Domain Name System Security Extensions, a document detailing the introduction of private/public key cryptography into the public DNS system. By adding cryptography to the DNS, users would be able to verify that DNS responses they receive are genuinely valid an...
<urn:uuid:f50af8b3-62ba-4244-befd-fb7746ed383e>
CC-MAIN-2017-09
http://www.circleid.com/posts/the_root_dnssec_deployment_and_dyn_inc/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00576-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917254
791
3.125
3
Holownia P.,Sanitary Inspectorate | Jaworska-LUczak B.,Sanitary Inspectorate | Wisniewska I.,Sanitary Inspectorate | Bilinski P.,Sanitary Inspectorate | And 3 more authors. Polish Journal of Food and Nutrition Sciences | Year: 2010 The prebiotic inulin is a non-digestible carbohydrate which occurs naturally throughout ...
<urn:uuid:98825f4d-f630-47c0-97be-6152fb8bd269>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/sanitary-inspectorate-1834587/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00100-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938969
822
2.640625
3
Tackling the problem of getting women into STEM careers This feature first appeared in the Summer 2015 issue of Certification Magazine. Click here to get your own print or digital copy. Tech skills will be required in 80 percent of all jobs in the next decade, yet women in technology have been declining since 1991. At ...
<urn:uuid:1967fbe8-cddc-4b30-ab9c-4c530ec68d2a>
CC-MAIN-2017-09
http://certmag.com/tackling-problem-getting-women-stem-careers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00276-ip-10-171-10-108.ec2.internal.warc.gz
en
0.96955
2,328
2.765625
3
The next time you watch “House of Cards” on Netflix, think about the impact you might be having on the environment. As the Internet powers ever more services, from digital video to on-demand food delivery, energy use in data centers will rise. To reduce their impact on the environment, companies like Apple, Google and ...
<urn:uuid:7320af14-d38c-413e-b9a8-726fe824f2ba>
CC-MAIN-2017-09
http://www.itnews.com/article/2921896/greenpeace-fingers-youtube-netflix-as-threat-to-greener-internet.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00276-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949408
701
2.875
3
If you are looking to develop some far out advanced science project -- and the folks at the Defense Advanced Research Projects Agency have a ton from airplanes that can fly for years without landing to skeletal putty for fractured bones – then DARPA wants you. The military’s cutting edge research agency is accepting sc...
<urn:uuid:495236d7-0a23-4127-87ef-42cbb891c738>
CC-MAIN-2017-09
http://www.networkworld.com/article/2344880/security/darpa-looking-for-wicked-cool-researchers-for-advanced-study-group.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00452-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927905
1,239
2.609375
3
Steve Wallach, a supercomputing legend and recipient of the 2008 IEEE Seymour Cray Award, has participated in all 22 supercomputing shows. He is known for his contributions to high performance computing through the design of innovative vector and parallel computing systems. He is co-founder and chief science officer fo...
<urn:uuid:2361415a-df63-40d7-a8a0-bafb1a8e8bf0>
CC-MAIN-2017-09
https://www.hpcwire.com/2009/11/16/d_j_vu_all_over_again/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00628-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948445
2,573
2.625
3
By now you've likely heard about the Heartbleed bug, a critical vulnerability that exposes potentially millions of passwords to attack and undermines the very security of the Internet. Because the flaw exists in OpenSSL—which is an open source implementation of SSL encryption—many will question whether the nature of op...
<urn:uuid:cab03f1d-eb1e-48b4-ab90-0ee360a64c42>
CC-MAIN-2017-09
http://www.csoonline.com/article/2142103/security/is-open-source-to-blame-for-the-heartbleed-bug.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00152-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937828
735
3
3
Let's start with an example. I am going to pick Road-Usage Charging (RUC) as an example of a Smart solution, but in fact there are many solutions that exhibit the principle I am going to describe. Here are some easy steps: - RUC systems are deployed to automate the collection of tolls for road segments, bridges, tunnel...
<urn:uuid:69d85cbf-d105-4b96-afe8-c6401f48fa09>
CC-MAIN-2017-09
https://www.ibm.com/developerworks/community/blogs/1d9bfc5f-e173-4598-aabc-e62b832282fa/entry/the_smart_principle_and_the_urban_digital_infrastructure1?lang=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00624-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961886
833
2.890625
3
Stanford researchers said this week they had used a supercomputer with more than one million computing cores to predict the noise generated by a supersonic jet engine. The researchers used the 1,572,864 processor Sequoia IBM Bluegene/Q system at Lawrence Livermore National Laboratories to run complex simulations that d...
<urn:uuid:a8433d22-2a89-4e3e-9116-edc66bac3f85>
CC-MAIN-2017-09
http://www.networkworld.com/article/2223944/data-center/stanford-consumes-million-core-supercomputer-to-spawn-supersonic-noise-forecast.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00500-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93417
369
3.625
4
Since: BlackBerry 10.0.0 A class representing different input masking modes. This class represents different input masking modes. You can use input masking to prevent characters that are typed in a text field from appearing. When input masking is enabled, typed characters appear as asterisks (*). By default, users can ...
<urn:uuid:a279c879-d414-4439-bee7-1fa577f5f6b1>
CC-MAIN-2017-09
https://developer.blackberry.com/native/reference/cascades/bb__cascades__textinputmasking.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00092-ip-10-171-10-108.ec2.internal.warc.gz
en
0.71108
232
2.625
3
What email address or phone number would you like to use to sign in to Docs.com? If you already have an account that you use with Office or other Microsoft services, enter it here. Or sign in with: Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi...
<urn:uuid:3a762117-41b7-4631-962c-d01eca85af9a>
CC-MAIN-2017-09
https://docs.com/ammar-ali/3256/abstract
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00092-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926857
1,743
2.875
3
By Ann Silverthorn —According to a recent end-user survey, which included a section on "green" initiatives, nearly three-fourths of the respondents have an interest in adopting a green data-center initiative, yet only one in seven has successfully done so. For the purpose of the study, a green data center was defined a...
<urn:uuid:cede9f89-8448-40b0-b715-ddae770dad93>
CC-MAIN-2017-09
http://www.infostor.com/index/articles/display/312697/articles/infostor/top-news/survey-reveals-green-initiatives-or-lack-thereof.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00268-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961527
484
2.625
3
Solar Eclipse from Space / March 12, 2013 The latest transmissions from NASA's Solar Dynamics Observatory (SDO), which took off in 2010 for its five-year mission to observe solar activity, shows the sun partially blocked from view by the Earth -- and the moon. Such solar eclipses will be regular occurences for the next...
<urn:uuid:75969494-d65c-426c-9cc2-ca7058650aa5>
CC-MAIN-2017-09
http://www.govtech.com/photos/Photo-of-the-Week-Solar-Eclipse-from-Space.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00620-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943128
129
3.078125
3
Development of Smart Cities Smart cities are slowly becoming a reality; slowly on a global level, but for those cities determined to implement the necessary smart infrastructure, connected technology is often very rapidly impacting industrial, commercial and residential environments. Municipalities determined to implem...
<urn:uuid:523ba559-a313-4c1b-b480-ad72fcbeeae4>
CC-MAIN-2017-09
https://cloudtweaks.com/2016/12/development-of-smart-cities/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00496-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940264
832
2.84375
3
BEAVERTON, OR--(Marketwire - Dec 5, 2012) - The amounts of sustained noise people are subjected to in everyday life have reached unsafe levels, according to a new report authored by leading sound experts and published today. Building in Sound, developed by Biamp Systems in collaboration with acoustics expert and TED sp...
<urn:uuid:2a6320cf-4330-41f8-9259-6b26b7fa69d5>
CC-MAIN-2017-09
http://www.marketwired.com/press-release/biamp-systems-releases-report-on-the-hazardous-levels-of-noise-in-everyday-life-1733911.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00020-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951168
998
2.859375
3
A group of students at the University of Texas at Austin built and successfully tested a GPS spoofing device to remotely redirect an $80 million yacht onto a different route, the Houston Chronicle reports. The project, which was completed with the permission of the yacht's owners in the Mediterranean Sea this past June...
<urn:uuid:1e542ad5-57cf-4785-aae6-878bd5c2771b>
CC-MAIN-2017-09
http://www.networkworld.com/article/2225056/opensource-subnet/college-students-hijack--80-million-yacht-with-gps-signal-spoofing.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00020-ip-10-171-10-108.ec2.internal.warc.gz
en
0.971695
402
2.59375
3
ZoneAlarm revealed the common behaviours of younger Facebook users that increase their susceptibility to encountering cyberbullying, predators and other security threats. A ZoneAlarm report examined the online activities of 600 children worldwide, aged between 10-15, who regularly use Facebook. Three activities in part...
<urn:uuid:81182385-74eb-433a-88b2-86e47098f968>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2012/11/12/young-facebook-users-are-most-vulnerable-to-security-threats/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00616-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94775
489
2.875
3
It may come as no surprise that Property and Casualty insurance varies from state to state, but were you aware that these differences aren't just circumstantial? In fact, most states go as far as to enact specific laws they believe will best protect their citizens or aid insurance providers that create employment and e...
<urn:uuid:c26576c6-64e8-4315-ae85-863b285ae190>
CC-MAIN-2017-09
http://blog.mindhub.com/2014_08_01_archive.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00192-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955141
463
2.5625
3
Students in southern Sweden have developed a biometric payment system that can be used to buy things simply by placing a palm on a screen. The biometric reader that the system is built around emits infrared light that is absorbed by the veins in the palm. The vein pattern is subsequently analysed by the terminal to est...
<urn:uuid:f759e23a-4de0-4a1c-b695-f6de0af8af4c>
CC-MAIN-2017-09
http://www.cio.com/article/2377072/enterprise-software/swedish-students-enable-people-to-buy-cups-of-coffee-with-their-veins.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00064-ip-10-171-10-108.ec2.internal.warc.gz
en
0.975563
436
2.53125
3
If you're not using macros, you're ignoring one of Excel's most powerful features. Macros save you time and spare you headaches by automating common, repetitive tasks. And you don't have to be a programmer or know Visual Basic Applications (VBA) to write one. With Excel 2013, it's as simple as recording your keystrokes...
<urn:uuid:5958fbde-c5bc-4dd7-9106-d0452648883a>
CC-MAIN-2017-09
http://www.itworld.com/article/2694597/enterprise-software/5-must-know-excel-macros-for-common-tasks.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00184-ip-10-171-10-108.ec2.internal.warc.gz
en
0.794615
1,965
2.703125
3
Certificate authorities (CAs) have long been used as a trusted means to relay secure access to information via the Internet. CAs provide digital certificates that deliver the information once an application, or binary, is signed and validated by the service provider that owns the content in question. This trust model h...
<urn:uuid:18462cce-6c26-43da-b533-f9c635b31d2a>
CC-MAIN-2017-09
https://www.mcafee.com/cf/security-awareness/articles/malicious-signed-binaries.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00184-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950682
494
2.59375
3
Richard Caudle | 29th January 2014 Recently I've covered the tagging and scoring features of DataSift VEDO. My post on scoring gave a top level overview and a simple example, but might have left you hungry for something a little more meaty. In this post I’ll take you through how we’ve started to build linear classifier...
<urn:uuid:54903a0b-a4ab-494d-b289-4b25396f6dcd>
CC-MAIN-2017-09
http://dev.datasift.com/blog/how-apply-machine-learning-and-give-social-data-meaning
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00060-ip-10-171-10-108.ec2.internal.warc.gz
en
0.88732
2,217
2.734375
3
The leader in Eavesdropping Detection and Counterespionage Consulting services for business & government, since 1978. THE OMINOUS EAR by Bernard B. Spindel Chapter 17. - Technical Aspects The telephone instrument dates back to the early 1880’s. Wiretapping devices in existence at that time were extremely crude and basi...
<urn:uuid:fc7b1853-61cc-4e91-8041-aa4a3d51df75>
CC-MAIN-2017-09
http://counterespionage.com/1968-bernard-spindel-the-ominous-ear.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00180-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963008
3,291
3.3125
3
A survey by Trend Micro suggests that British teens might be tempted by illegal online methods to make money. One in three teens (aged 12 – 18) admitted they would consider hacking or spying on people online if it meant they could make some fast cash. The survey exposes lack of “e-morals” at a time where kids are spend...
<urn:uuid:a93fe59b-c175-48be-8da3-b8974a95bc60>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2009/04/03/survey-shows-teens-would-spy-on-people-online-for-money/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00356-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9432
406
2.9375
3
Imagine floating on the empty blue Pacific Ocean, nothing but water in every direction, sunrise to sunset. Yet under the surface swim thousands of great white sharks. That's not a bad dream - it's actually what happens around this time of year several thousand miles off the coast of Baja California, about halfway to Ha...
<urn:uuid:97f21b20-f2de-4269-b542-ecc0b8dea6f9>
CC-MAIN-2017-09
http://www.govtech.com/products/Scientists-Develop-Drones-to-Study-Habits-of-Sharks.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00056-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951034
1,407
2.828125
3
Could some sort of briny water be flowing on Mars during its warm season? Seems that may be the case as NASA today said its red planet-orbiting satellite spotted possible flowing water, furthering the idea that Mars has or still does harbor life. The results from NASA's Mars Reconnaissance Orbiter are the closest scien...
<urn:uuid:c46924f1-08fe-4cdd-a1a7-0412532a5a91>
CC-MAIN-2017-09
http://www.networkworld.com/article/2220346/security/nasa-satellite-may-have-found-water-on-mars.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00584-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950246
448
3.21875
3
In June 2010, the world became aware of Stuxnet, largely considered to be the most advanced and dangerous piece of malware ever created. But before you run to check that your antivirus software is up to date, note that Stuxnet, largely believed to be state-created, was created with one singular purpose in mind - to cri...
<urn:uuid:eff17073-61d2-46c9-b2ab-cb088a8b24fe>
CC-MAIN-2017-09
http://www.networkworld.com/article/2221881/security/duqu-trojan-contains-unknown-programming-language.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00228-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962733
1,295
2.8125
3
Oh yes, that’s a real thing even if YOUR browser thinks “affective” is not a word and shames it with a red squiggly. Affective forecasting is the act of predicting an emotional reaction to some hypothetical future event. We use it frequently. Have you ever filled out a survey that asked you how likely you would be to r...
<urn:uuid:834d8e23-7a67-4087-9fb8-1c2d6290bd4a>
CC-MAIN-2017-09
https://www.brandenwilliams.com/blog/2016/08/16/affective-forecasting-strikes-again/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00104-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9767
368
2.75
3
In a second report this week on scientists' use of nanotechnology to battle cancer, researchers at MIT announced a new way to use nanoparticles to give cancerous cells a one-two punch. MIT reported that researchers used nanoparticles to carry two drugs and release them one at a time. The treatment was shown to "dramati...
<urn:uuid:2e34d4ba-4d6e-4975-9225-b020dc114e79>
CC-MAIN-2017-09
http://www.cio.com/article/2376377/healthcare/mit-uses-nanotech-to-hit-cancer-with-one-two-punch.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00280-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954147
851
3.28125
3
APIs have been making the news lately, especially with Apple’s release of Metal API for iOS. But APIs themselves have been around for a long time. They’re a necessity in today’s ever-changing tech landscape, which is why understanding them is key to providing users with the interoperability they now require. What is an...
<urn:uuid:6ec71613-9f3d-41a6-92b0-8f297fe57c80>
CC-MAIN-2017-09
http://www.codero.com/blog/apis-101-what-you-need-to-know-about-the-keys-to-the-kingdom/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00049-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920744
658
3.203125
3
Baidu, , China's leading search engine, is making available Chinese language APIs for its four key speech technologies: Long Utterance Speech Recognition, Far-Field Speech Recognition, Expressive Speech Synthesis and Wake Word. Baidu said its intent is to provide developers with access to its AI-based technologies. Bai...
<urn:uuid:62f65905-ba0e-49ef-a506-05be427bca5e>
CC-MAIN-2017-09
http://www.convergedigest.com/2016/11/baidu-opens-chinese-language-apis-for.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00049-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94636
238
2.65625
3
Cooling Data Center CostsBy Samuel Greengard | Posted 2010-08-13 Email Print Roughly 40 percent of the energy consumed in data centers is a result of cooling systems, and that figure is rising. Reversing that trend is possible, and could mean big savings. One of the hottest opportunities for greening the data center li...
<urn:uuid:0e34533e-eff2-4220-a2b8-4cfc9c376e48>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/IT-Management/Cooling-Data-Center-Costs-368334
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00401-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913103
263
2.609375
3
High-wireless act: Can high-frequency WiFi be practical? - By Greg Crowe - Oct 16, 2012 This article has been updated to correct an inaccurate reference to the 60 GHz band as 60 MHz. As agencies continue to build out wireless networks and extend the use of mobile devices, a new spectrum specification, which will add a ...
<urn:uuid:f7363859-6ac8-455e-bf76-9712da4e40f4>
CC-MAIN-2017-09
https://gcn.com/articles/2012/10/16/explainer-60-mhz-wifi-band-signal-propagation-loss.aspx?admgarea=TC_Mobile
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00449-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943038
678
2.953125
3
- By Bruce McConnell - Nov 12, 2000 International cybercrime — attacks on mission-critical government or private computers from across national boundaries — is an increasing threat. Can Self-protection through strong secur-ity tools and practices remains the principal defense. Ultimately, however, governments must addr...
<urn:uuid:24766320-ce88-4242-ac9b-379cc372d317>
CC-MAIN-2017-09
https://fcw.com/articles/2000/11/12/responding-internationally.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00445-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927379
638
2.9375
3
In 1st edition AD&D two character classes had their own private languages: Druids and Thieves. Thus, a character could use the “Thieves’ Cant” to identify peers, bargain, threaten, or otherwise discuss malevolent matters with a degree of safety. (Of course, Magic-Users had that troublesome first level spell comprehend ...
<urn:uuid:5c71d3a7-caa7-46dd-94c1-abf46dd7df5d>
CC-MAIN-2017-09
https://deadliestwebattacks.com/2013/08/27/dry-fiend-conjurationsummoning/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00321-ip-10-171-10-108.ec2.internal.warc.gz
en
0.820459
1,233
2.828125
3
Google relies on internally developed software. Google primarily relies on its own internally developed software for data and network management and has a reputation for being skeptical of "not invented here" technologies, so relatively few vendors can claim it as a customer. Google's primary programming languages incl...
<urn:uuid:bb8068d9-290d-4b6f-836e-f86a0d780bac>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/Projects-Networks-and-Storage/Base-Technologies-Internal-Development
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00441-ip-10-171-10-108.ec2.internal.warc.gz
en
0.739199
281
2.609375
3
Frequently Asked Questions You may have heard of identity theft, but what does this term really mean? Going far beyond credit card fraud, identity theft is a rapidly growing crime that most people will face at some point in their lives. Identity theft is officially defined as the deliberate assumption of another person...
<urn:uuid:757d3864-2141-49b6-9b9c-8e8d891ea288>
CC-MAIN-2017-09
https://www.idstrong.com/faq.php
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00141-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939617
1,514
2.890625
3
Fintech Through Education With technology permeating all industries, few of us would feel confident utilizing financial products or services that aren’t thoroughly tech-integrated, and yet the realm of fintech is still observed warily by many. Though fintech indeed incorporates many of the cutting-edge innovations whic...
<urn:uuid:ba669904-4faa-4c79-9e98-61365ffa498b>
CC-MAIN-2017-09
https://cloudtweaks.com/2017/01/deciphering-fintech-education/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00493-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943636
855
2.71875
3
Hoping to usher in an age of low-cost solar power, Harvard's Clean Energy Project in June plans to release a list of 20,000 organic compounds that could be used to make cheap, printable photovoltaic cells. In a move that it hopes will help usher in an age of low-cost solar power, Harvard University's Clean Energy Proje...
<urn:uuid:0e1fc466-fc8b-4a03-a098-2c41185aee19>
CC-MAIN-2017-09
http://www.networkworld.com/article/2165990/servers/harvard-aims-to-help-developers-make-cheaper-solar-panels.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00017-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9527
460
3.59375
4
Windows Security: Part 6 In my last blog posting I discussed the Encrypting File System (EFS) that is built into every Windows operating system since Windows 2000 and how EFS works. Although EFS is effective as a security control against data security breach-related risks, a major limitation is that it does not provide...
<urn:uuid:c3599666-7f67-4eec-8353-721141d36c9b>
CC-MAIN-2017-09
http://blog.emagined.com/2009/12/windows-security-part-6/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00369-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920223
821
2.875
3
If you want a wearable Internet of Things, the electronics have to be as small and as energy efficient as possible. That's why a new microcontroller by Freescale Semiconductor is notable. The company has produced the Kinetis KLO3 MCU, a 32-bit ARM system that is 15% smaller than its previous iteration but with a 10% po...
<urn:uuid:9fcd8cdf-92a3-4de0-92c1-4808a2b5ca1b>
CC-MAIN-2017-09
http://www.cio.com/article/2378260/consumer-technology/shrinking-microcontrollers--means-smaller-wearable-computers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00369-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921979
549
2.703125
3
For some states, economic development is more than bringing jobs to a region to lower the unemployment rate: It's about saving small towns from extinction. North Dakota is one of those states, and economic-development officials hope to save as many rural towns as possible from dying a slow death. For many of the state'...
<urn:uuid:320ec00a-1764-455d-9d67-aa82f6339d81>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Tug-of-War.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00369-ip-10-171-10-108.ec2.internal.warc.gz
en
0.983351
1,308
2.734375
3