text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Intel Unveils 48-Core 'Cloud Computer' Chip
- By Herb Torrens
Intel pushed the outer limits of computing this week by unveiling a new experimental processor it described as a "single-chip cloud computer."
The chip features 48-core processor technology developed by Intel's Tera-scale Computing Research Program. It was c... | <urn:uuid:63b4c7f8-4741-4b2a-91f5-c572a42a1176> | CC-MAIN-2017-09 | https://mcpmag.com/articles/2009/12/04/intel-unveils-48-core-cloud-computer-chip.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00313-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957206 | 688 | 2.609375 | 3 |
Overview of physical security and environmental controls
Security is normally an area that is usually very broad based owing to the fact that there are many ways through which it can be implemented and enacted. One of the ways through which it can be enacted is through the development of security policies. Another aspe... | <urn:uuid:23770999-9dfd-40dd-a93f-30bbbdbc1228> | CC-MAIN-2017-09 | https://www.examcollection.com/certification-training/security-plus-overview-of-physical-security-and-environmental-controls.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00313-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958058 | 2,880 | 2.78125 | 3 |
World War II tech re-enlists as a smart antenna
Wireless networks have revolutionized mobile computing, but they have faced two major challenges, especially when deployed outdoors: providing coverage where needed and security.
Some are now betting that an older technology that was first applied to radar can make secure... | <urn:uuid:c6f5c3e1-a0fc-415d-9a94-069f47f9fa43> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2014/02/beamsteering.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00489-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959297 | 955 | 2.8125 | 3 |
The US government today took a bold step toward perhaps finally getting some offshore wind energy development going with $50 million in investment money and promise of renewed effort to develop the energy source.
The Department of the Interior and Department of Energy have teamed on what they call the joint National Of... | <urn:uuid:4f0e7ee7-7c69-465f-95bf-e6f8b0288df7> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2228458/security/us-tries-to-fire-up-mighty-offshore-wind-energy-projects.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00013-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938149 | 1,132 | 2.609375 | 3 |
SamSam (aka Samas or SamSa) is a newer variant of ransomware that is taking on a different approach to targeting and infecting unsuspecting users. SamSam is spreading through compromised Web Servers – many Schools and Healthcare industries that may not be able to afford a decent IT staff to stay up to date on the lates... | <urn:uuid:1036c4b3-ccf3-4427-9e15-d6a390dc35c7> | CC-MAIN-2017-09 | https://www.alertlogic.com/blog/jboss-and-samsam/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00361-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945281 | 765 | 2.796875 | 3 |
For people whose business is to worry about flooding, there's no debate the Federal Emergency Management Agency (FEMA) needs to keep its flood maps current. But as Congress discusses the future of the National Flood Insurance Program (NFIP), not everyone agrees on the best way to modernize those maps or pay for the eff... | <urn:uuid:486c6518-7379-46b5-b111-904fc3520cc4> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/Rising-to-the-Challenge.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00061-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945314 | 1,584 | 2.734375 | 3 |
Apple has designed a special robot that can disassemble old iPhones when they're returned to the company for recycling.
The robotic tool, which Apple calls Liam, separates the iPhone into its components and then removes valuable materials so they can be reused in other products.
Some of the materials extracted include ... | <urn:uuid:36114f8a-d1ae-434a-88e2-f49913bcb14b> | CC-MAIN-2017-09 | http://www.itnews.com/article/3046191/apples-liam-is-a-robot-that-takes-apart-your-iphone-for-recycling.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961116 | 293 | 3.15625 | 3 |
Before the Revolutionary War, sheets of tin imported from England were fashioned by people working at home into plates, cups and candle holders. They shared production techniques with one another and collectively produced enough products to give rise to a distribution system known as Yankee Peddlers.
Today, the raw too... | <urn:uuid:e15fe8ae-7abe-4218-b6ec-e2e13db33c3d> | CC-MAIN-2017-09 | http://www.itworld.com/article/2695960/hardware/a-new-industrial-age-is-being-built-on-sensors--3d-printing-and-the-cloud.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00057-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955792 | 1,244 | 2.515625 | 3 |
Spock may be exceedingly happy today since the “Vulcan mind meld” is now a reality for humans, thanks to University of Washington researchers who achieved the first noninvasive human brain-to-human brain interface. One researcher sent a brain signal via the Internet and his thoughts controlled the hand movement of a fe... | <urn:uuid:99977c46-8d63-4319-87fc-806f21372b1d> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2474639/emerging-technology/researcher-sends-thoughts-over-internet--moves-colleague-s-hand--human-to-human-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00585-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965107 | 805 | 2.859375 | 3 |
One important key to protecting yourself online is to make sure no one steals your username and password. Stolen passwords are at the root of the problem with online banking security, and Internet security overall. Anyone who has your password can access your accounts the same way that you do. That is why a second auth... | <urn:uuid:2854b420-1509-47ec-9737-d84fcc7fae92> | CC-MAIN-2017-09 | https://www.justaskgemalto.com/en/how-can-i-protect-myself-while-banking-online/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00529-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938955 | 280 | 2.8125 | 3 |
In Vitro Beef: It's What's for Dinner?
Scientists unveiled the world's first lab-grown hamburger at a press event in London on Monday, showcasing a patty made from stem cells -- a technique that could help alleviate the growing demand for more sustainable beef products.
Mark Post, a scientist at Maastricht University, ... | <urn:uuid:4f0e190f-9583-4915-beaa-6b944bdb0f22> | CC-MAIN-2017-09 | http://www.linuxinsider.com/story/science/78653.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00229-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967964 | 728 | 2.71875 | 3 |
Chromebooks, iPads, Edmodo, network printers, USB drives, Androids, cloud storage, Prezi, virtual reality, LCD projectors and apps.
The vocabulary words above that were at one time nonexistent now fill the conversations of educators and students today. Technology is now at the heart of the classroom experience, but it ... | <urn:uuid:551b1a3e-c19e-4aba-a7ac-a5ad3ca00298> | CC-MAIN-2017-09 | https://www.imperosoftware.com/4-reasons-to-be-thankful-for-technology-in-the-classroom/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00050-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943654 | 885 | 3.03125 | 3 |
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Pharming also aims to collect personal information from unsuspecting victims by essentially tinkering with the road maps that computers use to navigate the Web. You don't want either one working its evil genius on you, y... | <urn:uuid:0b4119f6-5309-4502-81ce-11eab5a68e80> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2117843/identity-theft-prevention/phishing--the-basics.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00226-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955542 | 2,779 | 2.890625 | 3 |
Millions of people are visually impaired and must use assistive technology (AT) to read electronic content. Assistive technology software is sometimes called screen readers. To ensure equal access to information, the US Congress enacted legislation in 1998 to require U.S. Federal agencies and contractors to procure acc... | <urn:uuid:63375ad5-7519-4005-9297-7e762bef07dd> | CC-MAIN-2017-09 | https://labs.appligent.com/pdfblog/creating-section-508-friendly-documents/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00154-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887315 | 222 | 2.875 | 3 |
The chronology of high performance computing can be divided into “ages” based on the predominant systems architectures for the period. Starting in the late 1970s vector processors dominated HPC. By the end of the next decade massively parallel processors were able to make a play for market leader. For the last half of ... | <urn:uuid:d2ecbb23-3352-4122-a345-cc88e146e01c> | CC-MAIN-2017-09 | https://www.hpcwire.com/2011/12/08/revisiting_supercomputer_architectures/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00398-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946065 | 2,254 | 3.3125 | 3 |
Almost a year after the Higgs boson announcement, the world's most powerful particle accelerator, the Large Hadron Collider (LHC), is getting upgraded.
The work will result in increased collision energy and allow scientists to look even more closely at the universe's known and unknown building blocks. The need for the ... | <urn:uuid:ad13dfdc-b39c-4b38-bb15-3b0d90f72edb> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2168283/data-center/the-large-hadron-collider-shows-its-insides-as-upgrade-work-commences.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00446-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948498 | 274 | 3.078125 | 3 |
Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly due to the nature of the product – small and light also means that these devices have few resources for complex security ... | <urn:uuid:2a994237-2ff5-4fc8-a16a-090cc2f0d781> | CC-MAIN-2017-09 | http://vpnhaus.ncp-e.com/2017/01/26/the-iot-gateway-next-door/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00622-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941141 | 653 | 2.9375 | 3 |
For years, community leaders have been turning to outside help to fix local problems. The process begins by looking at the community's strengths, weaknesses, opportunities and threats, better known as SWOT. But the focus is invariably on weaknesses rather than strengths, and often the community ends up believing that o... | <urn:uuid:49e36449-69bb-4e11-bd1d-350eed75be60> | CC-MAIN-2017-09 | http://www.govtech.com/featured/Mapping-Community-Assets.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00622-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9681 | 1,053 | 2.703125 | 3 |
Users to write, run and debug software using quantum algorithms.
Google has launched its Quantum Computing Playground, a browser based WebGL Chrome experiment, which will allow users to simulate quantum scale computing right in the browser.
The company said the web-based integrated development environment (IDE), which ... | <urn:uuid:f20a59f3-5832-40c6-9bfc-af34f0af2b36> | CC-MAIN-2017-09 | http://www.cbronline.com/news/cloud/aas/experiment-with-quantum-computing-with-googles-quantum-computing-playground-4278316 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00146-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.864105 | 181 | 2.859375 | 3 |
More Tools Needed
Overall, biologics go all the way through the pipeline almost one-quarter of the time, a comparatively high success rate. Safety and toxicity concerns eliminate about 60 percent of drug candidates, but the remaining 40 percent fall prey to poor efficacy. Genomics research tools alone are ineffective i... | <urn:uuid:2b3b84f6-d51e-43af-9a1e-fbf5fc2e2de4> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Database/Bio-Bank-Needed-to-Optimize-Genetic-Research/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00498-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9367 | 601 | 2.640625 | 3 |
The Age of Data Multiplication
We are surrounded by data, whether in our personal or professional lives with digital elements that are constantly being captured about us. This leads to exponentially increasing volumes of data whether from Internet-connected devices, video, cell records, customer transactions, healthcar... | <urn:uuid:d9acc04c-b7df-4874-a555-466f09d03e00> | CC-MAIN-2017-09 | https://cloudtweaks.com/2016/02/destroying-cloud-data-multiplication/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00498-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925304 | 552 | 2.703125 | 3 |
It seems like just yesterday you were still wrapping your head around the fact VR is something that can potentially be influential, and now you learn that there’s AR and MR.
Here’s a quick queue card / guide / infographic by Futurism to help you make sense of all the various iterations of reality that are starting to e... | <urn:uuid:9b7f417e-d7cd-445a-884c-f73835efc59c> | CC-MAIN-2017-09 | https://cloudtweaks.com/2016/11/infographic-mixed-hybrid-realities/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00022-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919937 | 438 | 2.65625 | 3 |
Last year, when an earthquake hit Melbourne, Twitter was the first on the scene. Within minutes, the subject became the top Twitter-trending topic worldwide and even caused the Geoscience Australia website to crash as people went online to see what had happened.
The power of social media is beyond doubt. Social media i... | <urn:uuid:4ba1716e-33eb-44c5-8d1a-8455b914ca91> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2496092/government-it/don-t-de-friend-the-citizen.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943651 | 1,219 | 2.53125 | 3 |
Satellite-based data centers with room for petabytes of data may start orbiting Earth as early as 2019. But when it comes to keeping secrets safe from the long arm of the law, the black void may not be far enough.
Cloud Constellation, a startup in Los Angeles, is looking upward to give companies and governments direct ... | <urn:uuid:1b52a234-bf82-4b1b-9ca3-98efe9daa1d5> | CC-MAIN-2017-09 | http://www.itnews.com/article/3075287/afraid-of-floods-and-hackers-put-your-data-in-space.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00138-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938998 | 884 | 2.671875 | 3 |
Feel factor: Devices to detect and respond to users' moods
This article was changed April 9 to correct the date of the Boston Marathon bombing.
Computers may not yet have feelings, but the day seems to be quickly approaching when they will be able to detect and respond to how you are feeling.
Cogito Corp., a Boston-bas... | <urn:uuid:2fe708c5-b296-43fb-8e9c-671327881af1> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2014/04/mood-detection.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00138-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940816 | 806 | 2.671875 | 3 |
This guide will teach you to be as tech-savvy as your students.
It is meant to acquaint you with G Suite’s major features and is loaded with best practices and lots of helpful, actionable tips to optimize your investment in G Suite and improve your students’ learning experience. It’s appropriate for school IT admins, t... | <urn:uuid:9dcd203e-5136-4ae8-866c-45637651b067> | CC-MAIN-2017-09 | https://www.bettercloud.com/monitor/the-academy/26-tips-for-teaching-with-g-suite/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00314-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927498 | 1,679 | 2.5625 | 3 |
How do tornadoes form?
Here's what the NOAA National Severe Storms Laboratory says:
The truth is that we don't fully understand. The most destructive and deadly tornadoes occur from supercells, which are rotating thunderstorms with a well-defined radar circulation called a mesocyclone. (Supercells can also produce dama... | <urn:uuid:bc512550-592b-4f4d-9069-12191e7bbda9> | CC-MAIN-2017-09 | http://www.itnews.com/article/2921912/tornadoes-us-military-weather-control-or-gods-punishment-for-gays-you-decide.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00490-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948999 | 302 | 3.5 | 4 |
(Unless you didn't enter your info. In which case: good for you.)
Don't worry. Your credit card details were not transmitted when you hit the submit button. But don't trust this claim without question. Find a technically-inclined friend to verify it for you. After all, you've already been tricked once.
Unfortunately, n... | <urn:uuid:1dd7e5ff-3db5-4a8e-90b3-80692c25e65a> | CC-MAIN-2017-09 | http://ismycreditcardstolen.com/check.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00486-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952553 | 479 | 2.578125 | 3 |
The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that communicates with the electric grid on one side and the car on the other. To make matters worse, it’s installed outside on street corners and in p... | <urn:uuid:8bc2fd78-4cc2-4041-a256-65de6991b309> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/05/15/hacking-charge-stations-for-electric-cars/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00238-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961941 | 165 | 3.078125 | 3 |
Next role for robots: data center diagnosticians
The U.S. Department of Energy last month opened the Energy Systems Integration Facility, a $135 million research center designed to test how power grids, data centers and other IT systems can be made more energy-efficient. In fact, the center itself, located in Golden, C... | <urn:uuid:604dd8c5-bad1-423a-be95-d09e226ec4c2> | CC-MAIN-2017-09 | https://gcn.com/blogs/pulse/2013/08/data-center-robots.aspx?admgarea=TC_EmergingTech | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00414-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920262 | 558 | 2.609375 | 3 |
Black Box Explains...50-micron vs. 62.5-micron fiber optic cable
As today’s networks expand, the demand for more bandwidth and greater distances increases. Gigabit Ethernet and the emerging 10 Gigabit Ethernet are becoming the applications of choice for current and future networking needs. Thus, there is a renewed inte... | <urn:uuid:cb743aaa-ee02-451f-9acd-505041443c09> | CC-MAIN-2017-09 | https://www.blackbox.com/en-us/products/black-box-explains/black-box-explains-50-micron-vs-62-5-micron-fiber-optic-cable | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00414-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.896837 | 961 | 2.78125 | 3 |
A research area of mathematics is being used to simplify spreadsheet formulas by providing users with a library of downloadable spreadsheet components.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Oxford rese... | <urn:uuid:3fe2fcc1-d80f-4382-abec-36a61dc76748> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/2240084091/Oxford-researcher-offers-tool-to-ease-spreadsheet-complexity | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922011 | 186 | 2.53125 | 3 |
Copy wide characters from one buffer to another
#include <wchar.h> wchar_t * wmemmove( wchar_t * ws1, const wchar_t * ws2, size_t n );
- A pointer to where you want the function to copy the data.
- A pointer to the buffer that you want to copy data from.
- The number of wide characters to copy.
Use the -l c option to q... | <urn:uuid:8be61a6a-3d98-414f-953c-e5c44582fbec> | CC-MAIN-2017-09 | http://developer.blackberry.com/native/reference/core/com.qnx.doc.neutrino.lib_ref/topic/w/wmemmove.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.816078 | 227 | 2.671875 | 3 |
A long time ago, a computer program was a stack of punch cards, and moving the program from computer to computer was easy as long as you didn't drop the box. Every command, instruction, and subroutine was in one big, fat deck. Editors, compilers, and code repositories have liberated us from punch cards, but somehow dep... | <urn:uuid:b2d0ccb0-6d04-4ec8-b97f-9efb0764f3e7> | CC-MAIN-2017-09 | http://www.computerworld.com.au/article/539785/first_look_docker_better_way_deploy_your_apps/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949204 | 2,251 | 2.609375 | 3 |
Remember learning about ozone? It was easy to relate to that distinctive smell that signaled the onset of precipitation. Even the chemical formula had a simple elegance, O3.
We learned that a ring of these triatomic molecules created a protective buffer way up in the earth’s atmosphere, and that this layer filters out ... | <urn:uuid:671d846d-41dd-433b-ba7e-bddcd328f340> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/01/25/grid_facilitates_ozone_predictions/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94575 | 552 | 3.96875 | 4 |
Data scientists and those adept at scientific computing are numerous, but not quite numerous enough to meet the demands of the computing marketplace.
Further, as science progresses to more complex and data-intensive questions, such as researching the beginning of the universe or getting more in-depth genomic results, i... | <urn:uuid:1c7cad83-1818-4482-bcc9-e1b405f93212> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/04/10/leveque_course_offers_hpc_techniques_to_scientific_computing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00234-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.893121 | 608 | 2.96875 | 3 |
Fiber cross connect patch panel, also known as the fiber distribution panel, to terminate the fiber optic cable and provide access to the cable’s individual fibers for cross connection, commonly used for fiber optic management unit. It helps network technicians in minimizing the clutter of wires when setting up fiber o... | <urn:uuid:2c705d7a-5b43-4f29-b5e2-1c6db6c1ae09> | CC-MAIN-2017-09 | http://www.fs.com/blog/typtical-fiber-patch-panels-on-the-market.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00530-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934481 | 897 | 2.703125 | 3 |
NASA's Mars rover Curiosity has already achieved its initial mission, proving that the Red Planet could have once sustained life, but one scientist says its greatest accomplishments could be in the year ahead.
"It is all part of the evolution of our understanding of Mars," Lisa May, NASA's lead program executive for Ma... | <urn:uuid:42324a8f-d551-4471-8e70-d80f7c8c2db2> | CC-MAIN-2017-09 | http://www.cio.com/article/2461494/government/mars-rover-curiositys-top-5-scientific-discoveries.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00230-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971805 | 1,193 | 3.484375 | 3 |
Cross-site scripting has been at the top of both the OWASP Top Ten list and the CWE/SANS Top 25 repeatedly. Some reports show cross-site scripting, or XSS, vulnerabilities to be present in 7 out of 10 web sites while others report that up to 90 percent of all web sites are vulnerable to this type of attack. Why are so ... | <urn:uuid:8140cbc6-9d7b-412b-895d-4853aeb09b91> | CC-MAIN-2017-09 | http://www.applicure.com/solutions/prevent-cross-site-scripting-attacks | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940567 | 1,073 | 2.8125 | 3 |
Virtualization has been a major data center trend for a number of years, being driven by companies’ desire for greater operating efficiency, lower capital costs, better use of existing floor and rack space, and reduced energy consumption. The heart of virtualization is the hypervisor or virtualization layer, which hide... | <urn:uuid:7f093983-6ea6-4f1a-aaf8-d872a0a77634> | CC-MAIN-2017-09 | http://www.datacenterjournal.com/virtual-machine-technology/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00631-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919218 | 358 | 2.765625 | 3 |
Marinaccio A.,Unit of Occupational and Environmental Epidemiology |
Binazzi A.,Unit of Occupational and Environmental Epidemiology |
Bonafede M.,Unit of Occupational and Environmental Epidemiology |
Corfiati M.,Unit of Occupational and Environmental Epidemiology |
And 74 more authors.
Occupational and Environmental Med... | <urn:uuid:c6f59fb9-53ee-44fd-8464-fd3d6d18fbba> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/cor-lazio-998855/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00155-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.909872 | 941 | 2.546875 | 3 |
Modeling of photonic crystals at NSF supercomputing centers, now partners in the TeraGrid, over several years has led the way to a major advance in laser surgery, exemplifying how computational simulations no longer take a back seat in driving scientific discovery.
In November 2004, a woman in North Carolina with poten... | <urn:uuid:25a26aed-4fec-4434-b8b9-905d0f7e4788> | CC-MAIN-2017-09 | https://www.hpcwire.com/2005/09/01/healing_light-1/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00575-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949788 | 1,649 | 3 | 3 |
Most people have heard of phishing and have an intuitive grasp of what it means. Images come to mind of bright shiny lures tempting hapless fish into taking a bite of something that will cause their demise. Indeed, this concept holds true whether you’re a rainbow trout or run-of-the-mill worker idly surfing the web at ... | <urn:uuid:d6072027-9908-4ac9-afdf-78d5d2b40dfe> | CC-MAIN-2017-09 | https://www.druva.com/blog/feeling-like-fish-water-get-skinny-phishing-learn-protect-business/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00275-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93743 | 1,439 | 3.078125 | 3 |
Villagomez D.,University of Geneva |
Villagomez D.,Analysis Inc. |
Spikings R.,University of Geneva
Lithos | Year: 2013
New thermochronological data record a complex cooling history in the Central and Western Cordilleras of Colombia that is a function of Early Cretaceous to late Miocene tectonic events. Alkali-feldspar... | <urn:uuid:a8549808-5e62-4669-b5ab-c0bbec43f742> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/analysis-inc-299386/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00275-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.900679 | 1,157 | 2.53125 | 3 |
Handling the tail end of the IT life cycle
Hints from NIST
- By William Jackson
- Apr 27, 2007
The National Institute of Standards and Technology has some advice for agencies getting rid of digital storage media: Shred. Disintegrate. Pulverize. Incinerate. Melt.
These are ways to get rid of disks, tapes and other devic... | <urn:uuid:d263d541-0434-4248-9d9f-3bd54c75116c> | CC-MAIN-2017-09 | https://gcn.com/articles/2007/04/27/handling-the-tail-end-of-the-it-life-cycle.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00327-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.911074 | 636 | 2.671875 | 3 |
First of all, let me tell you one thing. This article is written only for educating people about how phishing works and how should they prevent phishing scams. Please don’t use these techniques for malicious purposes.
What is Phishing?
Phishing is a most popular technique used for hacking passwords and stealing sensiti... | <urn:uuid:59ad1152-5139-445f-b46b-aa24b2de52fa> | CC-MAIN-2017-09 | https://www.7xter.com/2016/08/phishing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00327-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.882675 | 1,607 | 2.953125 | 3 |
A brief history of open data
- By Luke Fretwell
- Jun 09, 2014
In December 2007, 30 open-data pioneers gathered in Sebastopol, Calif., and penned a set of eight open-government data principles that inaugurated a new era of democratic innovation and economic opportunity.
"The objective…was to find a simple way to expres... | <urn:uuid:8ac7be6f-cdac-4351-b9d1-99844d202f0b> | CC-MAIN-2017-09 | https://fcw.com/articles/2014/06/09/exec-tech-brief-history-of-open-data.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00503-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926859 | 1,824 | 3.203125 | 3 |
To launch its single-stream recycling program, Ann Arbor, Mich., officials didn't have to look far to find a solution that could save money and fuel.
In July, the city became the first in Michigan to purchase hydraulic hybrid trucks, built using technology pioneered by the U.S. Environmental Protection Agency's Nationa... | <urn:uuid:38021633-6877-4e2b-b17a-67a985e54258> | CC-MAIN-2017-09 | http://www.govtech.com/technology/Hydraulics-on-Hybrid-Recycling-Trucks-to.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00447-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956188 | 623 | 2.8125 | 3 |
HALF MOON BAY, Calif. – Experts at a recent technology conference agreed that blockchain has a bright future, but warned it may be a rocky ride until that future arrives. Blockchain is a distributed database that uses a secure digital ledger of transactions that users can share across a computer network. It’s also the ... | <urn:uuid:75c9efb1-042b-4767-83b8-a22ceadf8307> | CC-MAIN-2017-09 | http://www.csoonline.com/article/3137004/security/why-blockchain-s-growing-pains-will-be-worth-it.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00499-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958114 | 1,095 | 2.546875 | 3 |
Cunningham W.P.,Claudia Taylor Johnson High School |
Joseph C.,Claudia Taylor Johnson High School |
Morey S.,Claudia Taylor Johnson High School |
Santos Romo A.,Claudia Taylor Johnson High School |
And 3 more authors.
Journal of Chemical Education | Year: 2015
A simplified activity examined gas density while employing ... | <urn:uuid:ce3fb72e-c655-498b-87aa-2130b8d1edfe> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/claudia-taylor-johnson-high-school-733127/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00499-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.893418 | 206 | 3.203125 | 3 |
The year 2016 will not only be remembered for Trump’s surprise victory in the US election, or for Brexit, or for saying goodbye to so many public figures like David Bowie, Alan Rickman, Prince, Muhammed Ali and Carrie Fisher, just to name a few. Last year was also one of the most challenging for cyber-security. Hackers... | <urn:uuid:edd9df8b-44b4-4dcc-bfc7-1e6e21c69f81> | CC-MAIN-2017-09 | https://fraudwatchinternational.com/industry-news/2016s-important-lessons-cyber-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00619-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955366 | 1,089 | 2.875 | 3 |
While looking into PL/SQL Developer – a very popular tool for working with Oracle databases, to see how it encrypts passwords I noticed something interesting. When testing Windows applications, I make it a habit to have Fiddler running, to see if there is any interesting traffic – and in this case, there certainly was.... | <urn:uuid:76f71ea8-1fa4-42ad-b99f-a1facac3fa4c> | CC-MAIN-2017-09 | https://adamcaudill.com/category/security_research/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00195-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.719412 | 1,060 | 2.5625 | 3 |
When it comes to cybersecurity, many school districts are woefully behind the times, often relying on web content filters older than their students to protect against cyber attacks. The thing is, cyber threats have evolved rapidly and the old tools just don’t cut it anymore.
School districts typically operate on shoest... | <urn:uuid:5ae2776c-8f74-44c9-840f-1d04a60d0a18> | CC-MAIN-2017-09 | https://blog.iboss.com/sled/as-cyber-threats-intensify-schools-need-to-update-security-tools | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00195-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954761 | 609 | 2.78125 | 3 |
Programs categorized as Malware pose a significant security risk to the user's system and/or information.
Types of programs in the Malware category include viruses, worms and trojans, among other threats. These threats can perform harmful actions such as stealing personal or program data, secretly manipulating the devi... | <urn:uuid:c62ef45c-9aef-4006-8d95-f39a5438eaef> | CC-MAIN-2017-09 | https://www.f-secure.com/en/web/labs_global/classification | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00191-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.905063 | 1,183 | 3.21875 | 3 |
Internet Of Things Security Reaches Tipping PointPublic safety issues bubble to the top in security flaw revelations.
It all began more than four years ago with HD Moore's groundbreaking research in embedded device security -- VoIP, DSL, SCADA, printers, videoconferencing, and switching equipment -- found exposed on th... | <urn:uuid:ba730de6-421a-4af9-914c-a61670f4315f> | CC-MAIN-2017-09 | http://www.darkreading.com/vulnerabilities---threats/internet-of-things-security-reaches-tipping-point/d/d-id/1298019?_mc=RSS_DR_EDT | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955609 | 1,592 | 2.515625 | 3 |
Water scarcity is a reality for about 1/3 of the world’s population. Driving increasing water scarcity is the way we manage water for food. Projections indicate that a growing, wealthier population may need as much as 70% more food by 2050. With water scarcity already posing a constraint to food production in many area... | <urn:uuid:aafc9cb8-affb-491e-97b2-9aefe37df1f3> | CC-MAIN-2017-09 | https://www.brighttalk.com/webcast/693/20597 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934114 | 4,728 | 3.140625 | 3 |
What’s the ‘big’ deal? The past, present and future of Big Data
This feature first appeared in the Spring 2015 issue of Certification Magazine. Click here to get your own print or digital copy.
Big Data. It’s a buzz phrase, a marketing term, an IT framework and an employment category. That’s a heavy load for two words ... | <urn:uuid:83d750cc-a560-483e-8b4f-6e040db94ce6> | CC-MAIN-2017-09 | http://certmag.com/whats-big-deal-past-present-future-big-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00239-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958219 | 1,872 | 2.921875 | 3 |
A new Google Chrome workshop virtually reproduces 100,000 nearby stars in just one tab in your web browser. The term "nearby" in this context being relative, of course.
The visualization can be accessed here, and it's a really effective gateway to procrastination. You can zoom in past Barnard's Star or Alpha Cassiopeia... | <urn:uuid:be7e5aeb-7a8f-43c0-9f16-2b1c84e49b98> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2223504/opensource-subnet/google-reproduces-100-000-stars-in-chrome-experiment.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00535-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939937 | 344 | 2.921875 | 3 |
Robots are essentially a self-contained tribute to the wonders of technology. The most advanced models use fast computer processing, high-definition cameras, artificial intelligence and long-range sensors, all of which give you a pretty good idea where technology is heading. In some ways, a robot even provides a glimme... | <urn:uuid:2ce7c2e8-3219-4b05-a251-a513ae9fc326> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2491135/data-center/5-uses-for-the-surveillance-robot-of-tomorrow.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00111-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929102 | 1,302 | 3.203125 | 3 |
NASA engineers updated the software for a robotic Mars rover, correcting a computer glitch more than two months old while the robot hurtled through space on its way to Mars.
Late in November, NASA launched its $2.5 billion Mars Science Laboratory. Dubbed Curiosity, the SUV-size super rover is on an eight-month journey ... | <urn:uuid:346e9134-65cd-4613-b0ac-d664659b05c2> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2501681/emerging-technology/nasa-fixes-computer-glitch-on-robot-traveling-to-mars.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00580-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955154 | 510 | 2.90625 | 3 |
Meanwhile, the discussion also broke down to the benefits of functional programming versus imperative programming. Functional programming is a programming paradigm that treats computation as the evaluation of mathematical functions and avoids state and mutable data. It emphasizes the application of functions, in contra... | <urn:uuid:d02256a1-9729-4add-a75e-35bf676efd88> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Application-Development/Is-it-Time-for-JavaScript-to-Step-Aside-for-the-Next-Big-Web-Thing-109707/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00280-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947482 | 130 | 3.6875 | 4 |
There’s a team from Spain, and another from Italy. The Japanese team calls itself Hakuta, and there are numerous teams from the U.S. They’re working hard with a serious sense of competition. But they’re not getting ready for the winter Olympics in Sochi.
It’s T-minus 23 months for the international assortment of scient... | <urn:uuid:85c944ea-4764-418d-a5d2-593b96eb11b6> | CC-MAIN-2017-09 | http://www.cio-today.com/article/index.php?story_id=91371 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00632-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954715 | 823 | 2.65625 | 3 |
New research shows that "123456" is a good password after all.
In fact, such useless credentials from a security standpoint have an important role in an overall password management strategy, researchers at Microsoft and Carleton University, Ottawa, Canada, have found.
Rather than hurt security, proper use of easy-to-re... | <urn:uuid:d4bce739-b147-474c-b005-785638d04441> | CC-MAIN-2017-09 | http://www.cio.com/article/2455449/identity-access/why-123456-is-a-great-password.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00156-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953952 | 693 | 2.703125 | 3 |
Gone are the days when producing a Web page simply involved writing some HTML code or painting a screen using Microsoft's Frontpage Web design tool. These days, with the Internet going into e-commerce overdrive everyone wants dynamic Web experiences. Scripting has taken a quantum leap.
There are two main categories of ... | <urn:uuid:99dbca19-0c6d-46e2-a935-06b1862bd75d> | CC-MAIN-2017-09 | http://www.computerweekly.com/feature/Scripting-languages | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00400-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947838 | 851 | 2.921875 | 3 |
Virtualized Data Center
Early designs of cloud computing focused on blades with an independent Storage Area Network (SAN) architecture. This blueprint consolidated the CPU and memory into dense blade server configurations connected via several high-speed networks (typically a combination of Fibre Channel and 10GB) to l... | <urn:uuid:58d650ce-8223-46c4-9a7c-794e014fbd63> | CC-MAIN-2017-09 | https://cloudtweaks.com/2012/03/leveraging-a-virtualized-data-center-to-improve-business-agility-conclusion/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00100-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928587 | 1,283 | 2.75 | 3 |
Question 1) Test Yourself on CompTIA i-Net+.
Objective : Network
SubObjective : Understand and be able to Describe the Use of Internet Domain Names and DNS
Single Answer Multiple Choice
DNS uses a lookup table to resolve names. Which record type in the DNS table is used for the assignment of multiple, fully qualified d... | <urn:uuid:52a6f94c-d57e-4171-a726-9be02b50d1e8> | CC-MAIN-2017-09 | http://certmag.com/question-1-test-yourself-on-comptia-i-net/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00328-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.869902 | 251 | 3.671875 | 4 |
Apple [AAPL] already provides support for IPv6, the latest iteration of the IP addressing system that launches today, World IPv6 day. While the significance of this may not impact you just yet, I've put together a general guide to IPv6, the reasons to support it, and Apple's support.
[ABOVE: Now available at Apple's re... | <urn:uuid:c9a22d03-0d38-45bb-bb2b-241e193f6208> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2471817/internet/apple-s-iphone-driven-mobile-future--ipv6--and-you.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00328-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945009 | 1,705 | 2.515625 | 3 |
Fiber optic cables form one of the most important parts of the networking industry today. Fiber cables are composed of one or more transparent optical fibers enclosed in a protective covering and strength members. Fiber cables are used to transmit data by the mode of light. Various types of fiber cables available are m... | <urn:uuid:7411e00f-21bb-4888-9d2a-891f03a8cb4c> | CC-MAIN-2017-09 | http://www.fs.com/blog/an-overview-of-the-armored-fiber-cable.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00096-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926396 | 615 | 3.125 | 3 |
“Critical infrastructure consists of physical and information technology assets, such as the electricity distribution networks, telecommunications networks, banking systems, manufacturing and transportation systems, as well as government information systems and services that support the continued and effective function... | <urn:uuid:41ea39f7-8d15-4914-b5be-99e5d8edcccb> | CC-MAIN-2017-09 | http://www.fedcyber.com/2012/10/23/protecting-canadian-critical-infrastructure-against-cyber-threats/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00272-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935078 | 213 | 2.859375 | 3 |
Level of Gvt: State
Problem/situation: While access to the Internet can provide important government information to residents of a state, most services are costly.
Solution: Maryland introduced Sailor, a program that allows Maryland residents to visit the Internet through the state library for free.
By David Noack
Whil... | <urn:uuid:b57987fa-e36b-44f0-b153-cd8dada92daf> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Maryland-quotCybrariesquot-Offer-Internet-Browsing-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950954 | 1,324 | 2.53125 | 3 |
Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.
Today, attacks against critical infrastructure can be just as disruptive when launched in cyberspace.
The threat of cyber-attacks against Industrial Internet of Things (IIoT) is very ... | <urn:uuid:4ee14187-e6cb-416d-8362-ea1cfc16a5cf> | CC-MAIN-2017-09 | http://vpnhaus.ncp-e.com/2017/02/16/careful-connections-are-key-to-mitigating-cyber-attacks-on-iiot-systems/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00624-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937947 | 1,010 | 2.546875 | 3 |
Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat Europe.
Google and Waze both offer turn-by-turn navigation in smartphone apps and... | <urn:uuid:8e73b3aa-8939-433f-95f4-67bdc83ac47d> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2495379/malware-vulnerabilities/hackers-can-cause-traffic-jams-by-manipulating-real-time-traffic-data--resea.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00444-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926632 | 843 | 2.546875 | 3 |
Data collected by a helicopter flying daily over Washington, D.C., through next week could one day be key to detecting a nuclear or radiological weapon amid the clutter of harmless radioactive sources scattered through the city.
The National Nuclear Security Administration began sending the rotorcraft loaded with radia... | <urn:uuid:f4bd30c0-ba70-4906-99ce-98c3c10d5483> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2013/01/nnsa-helicopter-now-hunt-radiation-washington-dc/60483/?oref=ng-channelriver | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00444-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936195 | 647 | 2.734375 | 3 |
Http Protocol is a communication protocol consisted on a complete system that includes rules, designs and configuration for the digital messages, which are going to be exchanged between the computing organizations. HTTP (hyper text transfer protocol) as a communication protocol was anticipated in the year 1989 by 1.0 s... | <urn:uuid:56231109-2899-41a6-a6d8-1bc2eabb1c7e> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2011/http | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00496-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944124 | 639 | 4.15625 | 4 |
Introduction: Data Recovery 101
Gillware is rolling out a new blog series titled “Data Recovery 101”, in which our bloggers will take a closer look at each of the different components of a hard drive and explain how they work, how they fail and how we recover the data from each failure situation.
The series will includ... | <urn:uuid:d5bd3b85-3575-4476-87e6-53e32da0c261> | CC-MAIN-2017-09 | https://www.gillware.com/blog/data-recovery/data-recovery-hard-drive-platters/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00020-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927094 | 1,241 | 3.5625 | 4 |
The company has encrypted critical parts of its operating system to protect it from software pirates, according to a researcher.
A computer researcher has made public information that Apple Computer has encrypted at the binary level critical parts of its Mac OS X operating system.
These "Apple-protected binaries" can s... | <urn:uuid:957756da-386b-4e6a-9488-3f2899599d9a> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Apple/Apple-Places-Encrypted-Binaries-in-Mac-OS-X | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00372-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96068 | 640 | 2.796875 | 3 |
Everyone has heard emergency alert signals transmitted over television and radio, usually followed by, "This is only a test ..."
But what if it were a real emergency? People watching TV or listening to the radio would certainly be alerted. But what if the emergency happened in the middle of the night, when few people w... | <urn:uuid:0cf66ee2-0297-4a26-a07a-c1ceb2fffacc> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/99417349.html?page=1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00372-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957041 | 1,738 | 3.171875 | 3 |
Kelemen A.,Debreceni Egyetem TEK |
Kelemen A.,Debrecen University |
Torok P.,Debreceni Egyetem TEK |
Torok P.,Debrecen University |
And 8 more authors.
Journal of Landscape Ecology | Year: 2010
Spontaneous succession in lack of restoration focused case studies is often underappreciated in restoration. We studied the re... | <urn:uuid:5f82d2b8-9388-4640-ac75-48d540b01311> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/debreceni-egyetem-tek-645188/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00016-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922767 | 321 | 2.578125 | 3 |
When will you move your ERP to the cloud?
We are on the cloud already!
from 2-3 years
from 4-5 years
Total votes: 30
Baanboard at LinkedIn
By patvdv at 19 Feb 2008 - 23:52
- ACID Transactions
- ACID Transactions satisfy the properties of Atomicity, Consistency, Isolation, and Durability. As complex update operations on... | <urn:uuid:25dfe037-912c-4665-a045-04f673071e59> | CC-MAIN-2017-09 | http://baanboard.com/node/48?s=35ad7fdbaf76ecc9d2f418e63de1eec9 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00544-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929832 | 6,001 | 2.6875 | 3 |
In software project management, software testing, and software engineering, verification and validation (V&V) is the process of checking that a software system meets specifications and that it fulfills its intended purpose. It may also be referred to as software quality control. It is normally the responsibility of sof... | <urn:uuid:e98f160d-d1fc-405f-a0e1-62b64ec496cb> | CC-MAIN-2017-09 | http://colsa.com/softwareverification.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00544-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935997 | 124 | 2.796875 | 3 |
CEOP-AEGIS - Coordinated Asia-European long-term Observing system of Qinghai Tibet Plateau hydro-meteorological processes and the Asian-monsoon systEm with Ground satellite Image data and numerical Simulations
Agency: Cordis | Branch: FP7 | Program: CP-SICA | Phase: ENV.2007.4.1.4.2. | Award Amount: 4.46M | Year: 2008
... | <urn:uuid:5dc10ba2-ed85-4f2e-adbc-37f55d846688> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/ariespace-srl-600619/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00068-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.902302 | 1,281 | 2.65625 | 3 |
A rapid, safe and successful response to a mass shooting incident requires preparation. The likelihood of a mass shooting is low, but schools, colleges and public safety officials must prepare for these situations.
Recent mass shootings have demonstrated the need to prepare local, regional, state and federal resources ... | <urn:uuid:51e6deb5-68ad-444e-a7f5-e4f74c9e3160> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/Responding-to-Mass-Shootings-Takes-Planning.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00488-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939879 | 505 | 3.171875 | 3 |
Learn Your Linux Clustering Options
"Cluster" is probably the most heavily abused term in the computing world. In this article we'll talk about what a cluster really is, and give an overview of the Linux technologies that can help you implement various types of clusters. The main focus will of course be on building clu... | <urn:uuid:e627c677-e3a5-421e-b012-28c4c1c2d3a2> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netos/article.php/3679891/Learn-Your-Linux-Clustering-Options.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00012-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941924 | 1,101 | 3.15625 | 3 |
The Cynja Field Instruction Manual
An activity book for trainee cyberheroes!
Book Overview Summary
Today, our battlefield is a new frontier, one that’s invisible to all but those with cyber powers. It’s time to train a new kind of superhero – one who will protect cyberspace from attack! Join the Cynsei, as he helps you... | <urn:uuid:a6b427ee-9b71-4838-8d80-81e90fefcd6b> | CC-MAIN-2017-09 | https://www.cynja.com/shop/the-cynja-field-instruction-manual/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00012-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92539 | 672 | 2.609375 | 3 |
If you want to highlight certain points or ideas in your PowerPoint presentation but the laser pointer isn’t quite cutting it, you can try another tactic. Here’s how to draw on your presentation to help get your point across.
- First, you have to be in Slide Show mode. Head to Slide Show at the top of your screen > Fro... | <urn:uuid:4905ddba-e8dd-4929-b392-e1cfc8a1d544> | CC-MAIN-2017-09 | https://www.bettercloud.com/monitor/the-academy/how-to-doodle-on-your-powerpoint-presentation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00188-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.86942 | 229 | 3.28125 | 3 |
ZIFFPAGE TITLEA Hex in ComputingBy Tom Steinert-Threlkeld | Posted 2005-07-08 Email Print
Decades before the idea took hold in the dot-com era, Reader's Digest kept a "360-degree view" of each of its customerstracking every contact it ever had with a subscriber to its magazine or a purchaser of any of its condensed boo... | <urn:uuid:d337a9b4-4243-4282-8409-4991db5b8f98> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Projects-Data-Analysis/Readers-Digest-The-Longest-Goodbye/2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00064-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963205 | 1,063 | 2.65625 | 3 |
A kind of fingerprinting, using the unique noises that emanate from hybrid cyber-physical systems could be used to thwart large-infrastructure attacks that some experts think are a danger.
Fake, malicious control commands injected into electrical grids and other large-scale hybrid physical and cyber installations could... | <urn:uuid:b9e3d40a-4fd8-4311-9393-f681f47574ba> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3040184/security/how-sound-fingerprinting-could-spot-grid-attackers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00064-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940219 | 713 | 3.015625 | 3 |
The leader in Eavesdropping Detection
and Counterespionage Consulting services
for business & government, since 1978.
James Lawrence Fly,
Winter 1999 — The Historian
by Mickie Edwardson
The use of wiretaps as an investigative tool by government and law enforcement agencies has long been a controversial issue in the Uni... | <urn:uuid:1b4465c7-eb24-40f6-ac38-b25921f5d59e> | CC-MAIN-2017-09 | http://counterespionage.com/1940s-50s-james-lawrence-fly-wiretap-warrior.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00184-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957812 | 12,852 | 3 | 3 |
Robotic spheres aboard the International Space Station soon will will be quite a bit smarter, using Google technology to fly safely and adroitly around the orbiter.
NASA's Ames Research Center is teaming up with Google's Project Tango team to add the company's new 3D technology to the tech tools aboard the Orbital Scie... | <urn:uuid:007c8f22-d56a-48d3-93d6-3767e47033d3> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2489895/emerging-technology/nasa-to-use-google-s-project-tango-to-update-space-robot.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00360-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929039 | 699 | 2.828125 | 3 |
NASA's super rover Curiosity has collected a sample from the inside of a rock on Mars, the first time the process has been done on another planet, NASA announced Wednesday.
The robotic rover sent images back to NASA scientists showing the drilling and an image of the powdered-rock sample in the rover's scoop.
"Seeing t... | <urn:uuid:d213d88b-12fe-42c0-94cb-55b648119149> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2495308/emerging-technology/nasa-rover-curiosity-grabs-first-martian-rock-sample.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00408-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947957 | 480 | 3.421875 | 3 |
Quantum cryptography has been pushed onto the market as a way to provide absolute security for communications. It is already used in Swiss elections to ensure that electronic vote data is securely transmitted to central locations. And as far as we know, no current quantum cryptographic system has been compromised in th... | <urn:uuid:aba21ba5-e76f-40db-a3b1-8a4c4465e272> | CC-MAIN-2017-09 | https://arstechnica.com/science/2011/11/researchers-show-how-to-break-quantum-cryptography-by-faking-quantum-entanglement/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00460-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951349 | 827 | 2.9375 | 3 |
WASHINGTON, DC--(Marketwired - March 31, 2014) - The National Association for the Education of Young Children's (NAEYC) Week of the Young Child™ (April 6-12, 2014) draws attention to how a high-quality early childhood experience the first few years of life set a child's path for success in school and in life and offers... | <urn:uuid:c29aaca9-519d-418f-a497-d9969028ce31> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/essential-ingredients-high-quality-early-childhood-education-highlighted-week-young-1894257.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00581-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952863 | 919 | 2.9375 | 3 |
Regular browsers, such as the one that came with your PC or mobile device, are leaking data on the internet like a sieve. The inherent vulnerabilities of the local browser model allow criminal hackers to infiltrate computers and steal or manipulate data.
Firewalls or antivirus software provide little or no protection a... | <urn:uuid:bf74024f-373c-4209-85be-36c2a4cca1ab> | CC-MAIN-2017-09 | https://go.authentic8.com/blog | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00281-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921115 | 213 | 2.75 | 3 |
It sounds too preposterous for even James Bond: by placing a mobile phone next to a PC, researchers can "listen" to the faintest sound a CPU makes as it churns away on RSA-encoded content and extract the keys themselves.
Preposterous, except for the fact that Adi Shamir, one of the co-developers of the RSA encryption a... | <urn:uuid:6061070d-83b4-4b22-84dc-3acdb5b84064> | CC-MAIN-2017-09 | http://www.cio.com/article/2380043/security0/rsa-keys-snatched-by-recording-cpu-sounds-with-a-phone.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00633-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949783 | 744 | 2.859375 | 3 |
With the coming of age of civil aviation in the 1930s and 1940s, the rural settings of many U.S. airports began to change. By the 1950s, expanding metropolitan centers surrounded formerly remote airfields with residential and commercial developments. As more powerful airliners rolled off the drawing boards, noise becam... | <urn:uuid:48d03085-d204-47e3-91e6-a1657c71df5e> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Airport-Soundbytes.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00633-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929275 | 1,439 | 3.09375 | 3 |
NASA's proposed $17.7 billion budget includes plans to capture and redirect an asteroid into orbit around Earth so astronauts can study it.
Ultimately, the project looks to learn more about the makeup of asteroids in an attempt to protect the Earth from devastating collisions.
"Today, we unveil President Obama's Fiscal... | <urn:uuid:3b972be5-5a06-4c1a-923b-d6bc28d6f46d> | CC-MAIN-2017-09 | http://www.itworld.com/article/2708925/hardware/nasa-budget-includes-plan-to-capture-and-redirect-asteroid-into-earth-orbit.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00577-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938572 | 826 | 3.109375 | 3 |
MIT Builds Batteries with Viruses
Normally, one would associate the word virus with something negative, whether it is a malfunctioning desktop computer or a sickness. However, researchers at the Massachusetts Institute of Technology have "trained" viruses in a lab to create a miniature battery.
By manipulating a few ge... | <urn:uuid:641cd169-857a-4422-b6a0-2272addf1624> | CC-MAIN-2017-09 | https://betanews.com/2006/04/07/mit-builds-batteries-with-viruses/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00277-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965223 | 288 | 3.90625 | 4 |
Manhattan has approximately 47,000 buildings with around 10.7 million windows, according to a 2013 estimate from The New York Times.
Now imagine if just 1% -- or 100,700 -- of those windows could generate electricity through transparent photovoltaics.
That's the idea behind solar power windows, and at least two compani... | <urn:uuid:3719d0ff-2897-4005-81c6-6a0a16524bec> | CC-MAIN-2017-09 | http://www.itnews.com/article/2980236/sustainable-it/solar-windows-poised-to-change-the-way-we-power-buildings.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00097-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947762 | 1,496 | 3 | 3 |
Hurricane season is well in progress, and won’t wrap up until the end of November. And in looking back at last hurricane season, when Sandy rocked the East Coast, hundreds of lives were lost and countless people were displaced from their homes. But that's not all that was affected -- so was our energy infrastructure.
"... | <urn:uuid:60c49f0f-468e-4af4-93a8-142602adaa8a> | CC-MAIN-2017-09 | http://www.govtech.com/Map-Mashes-Hurricane-Information-with-Energy-Infrastructure-Data.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00445-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949569 | 819 | 2.609375 | 3 |
Status: “Ready for mass consumption,” but set for regular, consistent iterations.
A by-product of Big Data, Big History is the study of time going all the way back to the Big Bang. Using a scale that begins 13.7 billion years ago, ChronoZoom breaks up history by thresholds that represent moments in time. Treshhold 1, t... | <urn:uuid:906cd24e-9b7f-4dab-a4da-a12ad1e10d62> | CC-MAIN-2017-09 | http://www.cio.com/article/2368441/project-management/10-cool-projects-from-microsoft-s-research-arm.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00621-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942641 | 141 | 3.046875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.