text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Intel Unveils 48-Core 'Cloud Computer' Chip - By Herb Torrens Intel pushed the outer limits of computing this week by unveiling a new experimental processor it described as a "single-chip cloud computer." The chip features 48-core processor technology developed by Intel's Tera-scale Computing Research Program. It was c...
<urn:uuid:63b4c7f8-4741-4b2a-91f5-c572a42a1176>
CC-MAIN-2017-09
https://mcpmag.com/articles/2009/12/04/intel-unveils-48-core-cloud-computer-chip.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00313-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957206
688
2.609375
3
Overview of physical security and environmental controls Security is normally an area that is usually very broad based owing to the fact that there are many ways through which it can be implemented and enacted. One of the ways through which it can be enacted is through the development of security policies. Another aspe...
<urn:uuid:23770999-9dfd-40dd-a93f-30bbbdbc1228>
CC-MAIN-2017-09
https://www.examcollection.com/certification-training/security-plus-overview-of-physical-security-and-environmental-controls.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00313-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958058
2,880
2.78125
3
World War II tech re-enlists as a smart antenna Wireless networks have revolutionized mobile computing, but they have faced two major challenges, especially when deployed outdoors: providing coverage where needed and security. Some are now betting that an older technology that was first applied to radar can make secure...
<urn:uuid:c6f5c3e1-a0fc-415d-9a94-069f47f9fa43>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2014/02/beamsteering.aspx?admgarea=TC_Mobile
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00489-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959297
955
2.8125
3
The US government today took a bold step toward perhaps finally getting some offshore wind energy development going with $50 million in investment money and promise of renewed effort to develop the energy source. The Department of the Interior and Department of Energy have teamed on what they call the joint National Of...
<urn:uuid:4f0e7ee7-7c69-465f-95bf-e6f8b0288df7>
CC-MAIN-2017-09
http://www.networkworld.com/article/2228458/security/us-tries-to-fire-up-mighty-offshore-wind-energy-projects.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00013-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938149
1,132
2.609375
3
SamSam (aka Samas or SamSa) is a newer variant of ransomware that is taking on a different approach to targeting and infecting unsuspecting users. SamSam is spreading through compromised Web Servers – many Schools and Healthcare industries that may not be able to afford a decent IT staff to stay up to date on the lates...
<urn:uuid:1036c4b3-ccf3-4427-9e15-d6a390dc35c7>
CC-MAIN-2017-09
https://www.alertlogic.com/blog/jboss-and-samsam/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00361-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945281
765
2.796875
3
For people whose business is to worry about flooding, there's no debate the Federal Emergency Management Agency (FEMA) needs to keep its flood maps current. But as Congress discusses the future of the National Flood Insurance Program (NFIP), not everyone agrees on the best way to modernize those maps or pay for the eff...
<urn:uuid:486c6518-7379-46b5-b111-904fc3520cc4>
CC-MAIN-2017-09
http://www.govtech.com/public-safety/Rising-to-the-Challenge.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00061-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945314
1,584
2.734375
3
Apple has designed a special robot that can disassemble old iPhones when they're returned to the company for recycling. The robotic tool, which Apple calls Liam, separates the iPhone into its components and then removes valuable materials so they can be reused in other products. Some of the materials extracted include ...
<urn:uuid:36114f8a-d1ae-434a-88e2-f49913bcb14b>
CC-MAIN-2017-09
http://www.itnews.com/article/3046191/apples-liam-is-a-robot-that-takes-apart-your-iphone-for-recycling.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961116
293
3.15625
3
Before the Revolutionary War, sheets of tin imported from England were fashioned by people working at home into plates, cups and candle holders. They shared production techniques with one another and collectively produced enough products to give rise to a distribution system known as Yankee Peddlers. Today, the raw too...
<urn:uuid:e15fe8ae-7abe-4218-b6ec-e2e13db33c3d>
CC-MAIN-2017-09
http://www.itworld.com/article/2695960/hardware/a-new-industrial-age-is-being-built-on-sensors--3d-printing-and-the-cloud.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00057-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955792
1,244
2.515625
3
Spock may be exceedingly happy today since the “Vulcan mind meld” is now a reality for humans, thanks to University of Washington researchers who achieved the first noninvasive human brain-to-human brain interface. One researcher sent a brain signal via the Internet and his thoughts controlled the hand movement of a fe...
<urn:uuid:99977c46-8d63-4319-87fc-806f21372b1d>
CC-MAIN-2017-09
http://www.computerworld.com/article/2474639/emerging-technology/researcher-sends-thoughts-over-internet--moves-colleague-s-hand--human-to-human-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00585-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965107
805
2.859375
3
One important key to protecting yourself online is to make sure no one steals your username and password. Stolen passwords are at the root of the problem with online banking security, and Internet security overall. Anyone who has your password can access your accounts the same way that you do. That is why a second auth...
<urn:uuid:2854b420-1509-47ec-9737-d84fcc7fae92>
CC-MAIN-2017-09
https://www.justaskgemalto.com/en/how-can-i-protect-myself-while-banking-online/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00529-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938955
280
2.8125
3
In Vitro Beef: It's What's for Dinner? Scientists unveiled the world's first lab-grown hamburger at a press event in London on Monday, showcasing a patty made from stem cells -- a technique that could help alleviate the growing demand for more sustainable beef products. Mark Post, a scientist at Maastricht University, ...
<urn:uuid:4f0e190f-9583-4915-beaa-6b944bdb0f22>
CC-MAIN-2017-09
http://www.linuxinsider.com/story/science/78653.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00229-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967964
728
2.71875
3
Chromebooks, iPads, Edmodo, network printers, USB drives, Androids, cloud storage, Prezi, virtual reality, LCD projectors and apps. The vocabulary words above that were at one time nonexistent now fill the conversations of educators and students today. Technology is now at the heart of the classroom experience, but it ...
<urn:uuid:551b1a3e-c19e-4aba-a7ac-a5ad3ca00298>
CC-MAIN-2017-09
https://www.imperosoftware.com/4-reasons-to-be-thankful-for-technology-in-the-classroom/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00050-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943654
885
3.03125
3
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Pharming also aims to collect personal information from unsuspecting victims by essentially tinkering with the road maps that computers use to navigate the Web. You don't want either one working its evil genius on you, y...
<urn:uuid:0b4119f6-5309-4502-81ce-11eab5a68e80>
CC-MAIN-2017-09
http://www.csoonline.com/article/2117843/identity-theft-prevention/phishing--the-basics.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00226-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955542
2,779
2.890625
3
Millions of people are visually impaired and must use assistive technology (AT) to read electronic content. Assistive technology software is sometimes called screen readers. To ensure equal access to information, the US Congress enacted legislation in 1998 to require U.S. Federal agencies and contractors to procure acc...
<urn:uuid:63375ad5-7519-4005-9297-7e762bef07dd>
CC-MAIN-2017-09
https://labs.appligent.com/pdfblog/creating-section-508-friendly-documents/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00154-ip-10-171-10-108.ec2.internal.warc.gz
en
0.887315
222
2.875
3
The chronology of high performance computing can be divided into “ages” based on the predominant systems architectures for the period. Starting in the late 1970s vector processors dominated HPC. By the end of the next decade massively parallel processors were able to make a play for market leader. For the last half of ...
<urn:uuid:d2ecbb23-3352-4122-a345-cc88e146e01c>
CC-MAIN-2017-09
https://www.hpcwire.com/2011/12/08/revisiting_supercomputer_architectures/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00398-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946065
2,254
3.3125
3
Almost a year after the Higgs boson announcement, the world's most powerful particle accelerator, the Large Hadron Collider (LHC), is getting upgraded. The work will result in increased collision energy and allow scientists to look even more closely at the universe's known and unknown building blocks. The need for the ...
<urn:uuid:ad13dfdc-b39c-4b38-bb15-3b0d90f72edb>
CC-MAIN-2017-09
http://www.networkworld.com/article/2168283/data-center/the-large-hadron-collider-shows-its-insides-as-upgrade-work-commences.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00446-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948498
274
3.078125
3
Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly due to the nature of the product – small and light also means that these devices have few resources for complex security ...
<urn:uuid:2a994237-2ff5-4fc8-a16a-090cc2f0d781>
CC-MAIN-2017-09
http://vpnhaus.ncp-e.com/2017/01/26/the-iot-gateway-next-door/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00622-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941141
653
2.9375
3
For years, community leaders have been turning to outside help to fix local problems. The process begins by looking at the community's strengths, weaknesses, opportunities and threats, better known as SWOT. But the focus is invariably on weaknesses rather than strengths, and often the community ends up believing that o...
<urn:uuid:49e36449-69bb-4e11-bd1d-350eed75be60>
CC-MAIN-2017-09
http://www.govtech.com/featured/Mapping-Community-Assets.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00622-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9681
1,053
2.703125
3
Users to write, run and debug software using quantum algorithms. Google has launched its Quantum Computing Playground, a browser based WebGL Chrome experiment, which will allow users to simulate quantum scale computing right in the browser. The company said the web-based integrated development environment (IDE), which ...
<urn:uuid:f20a59f3-5832-40c6-9bfc-af34f0af2b36>
CC-MAIN-2017-09
http://www.cbronline.com/news/cloud/aas/experiment-with-quantum-computing-with-googles-quantum-computing-playground-4278316
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00146-ip-10-171-10-108.ec2.internal.warc.gz
en
0.864105
181
2.859375
3
More Tools Needed Overall, biologics go all the way through the pipeline almost one-quarter of the time, a comparatively high success rate. Safety and toxicity concerns eliminate about 60 percent of drug candidates, but the remaining 40 percent fall prey to poor efficacy. Genomics research tools alone are ineffective i...
<urn:uuid:2b3b84f6-d51e-43af-9a1e-fbf5fc2e2de4>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Database/Bio-Bank-Needed-to-Optimize-Genetic-Research/1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00498-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9367
601
2.640625
3
The Age of Data Multiplication We are surrounded by data, whether in our personal or professional lives with digital elements that are constantly being captured about us. This leads to exponentially increasing volumes of data whether from Internet-connected devices, video, cell records, customer transactions, healthcar...
<urn:uuid:d9acc04c-b7df-4874-a555-466f09d03e00>
CC-MAIN-2017-09
https://cloudtweaks.com/2016/02/destroying-cloud-data-multiplication/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00498-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925304
552
2.703125
3
It seems like just yesterday you were still wrapping your head around the fact VR is something that can potentially be influential, and now you learn that there’s AR and MR. Here’s a quick queue card / guide / infographic by Futurism to help you make sense of all the various iterations of reality that are starting to e...
<urn:uuid:9b7f417e-d7cd-445a-884c-f73835efc59c>
CC-MAIN-2017-09
https://cloudtweaks.com/2016/11/infographic-mixed-hybrid-realities/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00022-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919937
438
2.65625
3
Last year, when an earthquake hit Melbourne, Twitter was the first on the scene. Within minutes, the subject became the top Twitter-trending topic worldwide and even caused the Geoscience Australia website to crash as people went online to see what had happened. The power of social media is beyond doubt. Social media i...
<urn:uuid:4ba1716e-33eb-44c5-8d1a-8455b914ca91>
CC-MAIN-2017-09
http://www.computerworld.com/article/2496092/government-it/don-t-de-friend-the-citizen.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943651
1,219
2.53125
3
Satellite-based data centers with room for petabytes of data may start orbiting Earth as early as 2019. But when it comes to keeping secrets safe from the long arm of the law, the black void may not be far enough. Cloud Constellation, a startup in Los Angeles, is looking upward to give companies and governments direct ...
<urn:uuid:1b52a234-bf82-4b1b-9ca3-98efe9daa1d5>
CC-MAIN-2017-09
http://www.itnews.com/article/3075287/afraid-of-floods-and-hackers-put-your-data-in-space.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00138-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938998
884
2.671875
3
Feel factor: Devices to detect and respond to users' moods This article was changed April 9 to correct the date of the Boston Marathon bombing. Computers may not yet have feelings, but the day seems to be quickly approaching when they will be able to detect and respond to how you are feeling. Cogito Corp., a Boston-bas...
<urn:uuid:2fe708c5-b296-43fb-8e9c-671327881af1>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2014/04/mood-detection.aspx?admgarea=TC_Mobile
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00138-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940816
806
2.671875
3
This guide will teach you to be as tech-savvy as your students. It is meant to acquaint you with G Suite’s major features and is loaded with best practices and lots of helpful, actionable tips to optimize your investment in G Suite and improve your students’ learning experience. It’s appropriate for school IT admins, t...
<urn:uuid:9dcd203e-5136-4ae8-866c-45637651b067>
CC-MAIN-2017-09
https://www.bettercloud.com/monitor/the-academy/26-tips-for-teaching-with-g-suite/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00314-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927498
1,679
2.5625
3
How do tornadoes form? Here's what the NOAA National Severe Storms Laboratory says: The truth is that we don't fully understand. The most destructive and deadly tornadoes occur from supercells, which are rotating thunderstorms with a well-defined radar circulation called a mesocyclone. (Supercells can also produce dama...
<urn:uuid:bc512550-592b-4f4d-9069-12191e7bbda9>
CC-MAIN-2017-09
http://www.itnews.com/article/2921912/tornadoes-us-military-weather-control-or-gods-punishment-for-gays-you-decide.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00490-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948999
302
3.5
4
(Unless you didn't enter your info. In which case: good for you.) Don't worry. Your credit card details were not transmitted when you hit the submit button. But don't trust this claim without question. Find a technically-inclined friend to verify it for you. After all, you've already been tricked once. Unfortunately, n...
<urn:uuid:1dd7e5ff-3db5-4a8e-90b3-80692c25e65a>
CC-MAIN-2017-09
http://ismycreditcardstolen.com/check.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00486-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952553
479
2.578125
3
The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that communicates with the electric grid on one side and the car on the other. To make matters worse, it’s installed outside on street corners and in p...
<urn:uuid:8bc2fd78-4cc2-4041-a256-65de6991b309>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/05/15/hacking-charge-stations-for-electric-cars/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00238-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961941
165
3.078125
3
Next role for robots: data center diagnosticians The U.S. Department of Energy last month opened the Energy Systems Integration Facility, a $135 million research center designed to test how power grids, data centers and other IT systems can be made more energy-efficient. In fact, the center itself, located in Golden, C...
<urn:uuid:604dd8c5-bad1-423a-be95-d09e226ec4c2>
CC-MAIN-2017-09
https://gcn.com/blogs/pulse/2013/08/data-center-robots.aspx?admgarea=TC_EmergingTech
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00414-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920262
558
2.609375
3
Black Box Explains...50-micron vs. 62.5-micron fiber optic cable As today’s networks expand, the demand for more bandwidth and greater distances increases. Gigabit Ethernet and the emerging 10 Gigabit Ethernet are becoming the applications of choice for current and future networking needs. Thus, there is a renewed inte...
<urn:uuid:cb743aaa-ee02-451f-9acd-505041443c09>
CC-MAIN-2017-09
https://www.blackbox.com/en-us/products/black-box-explains/black-box-explains-50-micron-vs-62-5-micron-fiber-optic-cable
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00414-ip-10-171-10-108.ec2.internal.warc.gz
en
0.896837
961
2.78125
3
A research area of mathematics is being used to simplify spreadsheet formulas by providing users with a library of downloadable spreadsheet components. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. Oxford rese...
<urn:uuid:3fe2fcc1-d80f-4382-abec-36a61dc76748>
CC-MAIN-2017-09
http://www.computerweekly.com/news/2240084091/Oxford-researcher-offers-tool-to-ease-spreadsheet-complexity
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00534-ip-10-171-10-108.ec2.internal.warc.gz
en
0.922011
186
2.53125
3
Copy wide characters from one buffer to another #include <wchar.h> wchar_t * wmemmove( wchar_t * ws1, const wchar_t * ws2, size_t n ); - A pointer to where you want the function to copy the data. - A pointer to the buffer that you want to copy data from. - The number of wide characters to copy. Use the -l c option to q...
<urn:uuid:8be61a6a-3d98-414f-953c-e5c44582fbec>
CC-MAIN-2017-09
http://developer.blackberry.com/native/reference/core/com.qnx.doc.neutrino.lib_ref/topic/w/wmemmove.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz
en
0.816078
227
2.671875
3
A long time ago, a computer program was a stack of punch cards, and moving the program from computer to computer was easy as long as you didn't drop the box. Every command, instruction, and subroutine was in one big, fat deck. Editors, compilers, and code repositories have liberated us from punch cards, but somehow dep...
<urn:uuid:b2d0ccb0-6d04-4ec8-b97f-9efb0764f3e7>
CC-MAIN-2017-09
http://www.computerworld.com.au/article/539785/first_look_docker_better_way_deploy_your_apps/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949204
2,251
2.609375
3
Remember learning about ozone? It was easy to relate to that distinctive smell that signaled the onset of precipitation. Even the chemical formula had a simple elegance, O3. We learned that a ring of these triatomic molecules created a protective buffer way up in the earth’s atmosphere, and that this layer filters out ...
<urn:uuid:671d846d-41dd-433b-ba7e-bddcd328f340>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/01/25/grid_facilitates_ozone_predictions/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94575
552
3.96875
4
Data scientists and those adept at scientific computing are numerous, but not quite numerous enough to meet the demands of the computing marketplace. Further, as science progresses to more complex and data-intensive questions, such as researching the beginning of the universe or getting more in-depth genomic results, i...
<urn:uuid:1c7cad83-1818-4482-bcc9-e1b405f93212>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/04/10/leveque_course_offers_hpc_techniques_to_scientific_computing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00234-ip-10-171-10-108.ec2.internal.warc.gz
en
0.893121
608
2.96875
3
Fiber cross connect patch panel, also known as the fiber distribution panel, to terminate the fiber optic cable and provide access to the cable’s individual fibers for cross connection, commonly used for fiber optic management unit. It helps network technicians in minimizing the clutter of wires when setting up fiber o...
<urn:uuid:2c705d7a-5b43-4f29-b5e2-1c6db6c1ae09>
CC-MAIN-2017-09
http://www.fs.com/blog/typtical-fiber-patch-panels-on-the-market.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00530-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934481
897
2.703125
3
NASA's Mars rover Curiosity has already achieved its initial mission, proving that the Red Planet could have once sustained life, but one scientist says its greatest accomplishments could be in the year ahead. "It is all part of the evolution of our understanding of Mars," Lisa May, NASA's lead program executive for Ma...
<urn:uuid:42324a8f-d551-4471-8e70-d80f7c8c2db2>
CC-MAIN-2017-09
http://www.cio.com/article/2461494/government/mars-rover-curiositys-top-5-scientific-discoveries.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00230-ip-10-171-10-108.ec2.internal.warc.gz
en
0.971805
1,193
3.484375
3
Cross-site scripting has been at the top of both the OWASP Top Ten list and the CWE/SANS Top 25 repeatedly. Some reports show cross-site scripting, or XSS, vulnerabilities to be present in 7 out of 10 web sites while others report that up to 90 percent of all web sites are vulnerable to this type of attack. Why are so ...
<urn:uuid:8140cbc6-9d7b-412b-895d-4853aeb09b91>
CC-MAIN-2017-09
http://www.applicure.com/solutions/prevent-cross-site-scripting-attacks
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00579-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940567
1,073
2.8125
3
Virtualization has been a major data center trend for a number of years, being driven by companies’ desire for greater operating efficiency, lower capital costs, better use of existing floor and rack space, and reduced energy consumption. The heart of virtualization is the hypervisor or virtualization layer, which hide...
<urn:uuid:7f093983-6ea6-4f1a-aaf8-d872a0a77634>
CC-MAIN-2017-09
http://www.datacenterjournal.com/virtual-machine-technology/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00631-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919218
358
2.765625
3
Marinaccio A.,Unit of Occupational and Environmental Epidemiology | Binazzi A.,Unit of Occupational and Environmental Epidemiology | Bonafede M.,Unit of Occupational and Environmental Epidemiology | Corfiati M.,Unit of Occupational and Environmental Epidemiology | And 74 more authors. Occupational and Environmental Med...
<urn:uuid:c6f59fb9-53ee-44fd-8464-fd3d6d18fbba>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/cor-lazio-998855/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00155-ip-10-171-10-108.ec2.internal.warc.gz
en
0.909872
941
2.546875
3
Modeling of photonic crystals at NSF supercomputing centers, now partners in the TeraGrid, over several years has led the way to a major advance in laser surgery, exemplifying how computational simulations no longer take a back seat in driving scientific discovery. In November 2004, a woman in North Carolina with poten...
<urn:uuid:25a26aed-4fec-4434-b8b9-905d0f7e4788>
CC-MAIN-2017-09
https://www.hpcwire.com/2005/09/01/healing_light-1/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00575-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949788
1,649
3
3
Most people have heard of phishing and have an intuitive grasp of what it means. Images come to mind of bright shiny lures tempting hapless fish into taking a bite of something that will cause their demise. Indeed, this concept holds true whether you’re a rainbow trout or run-of-the-mill worker idly surfing the web at ...
<urn:uuid:d6072027-9908-4ac9-afdf-78d5d2b40dfe>
CC-MAIN-2017-09
https://www.druva.com/blog/feeling-like-fish-water-get-skinny-phishing-learn-protect-business/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00275-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93743
1,439
3.078125
3
Villagomez D.,University of Geneva | Villagomez D.,Analysis Inc. | Spikings R.,University of Geneva Lithos | Year: 2013 New thermochronological data record a complex cooling history in the Central and Western Cordilleras of Colombia that is a function of Early Cretaceous to late Miocene tectonic events. Alkali-feldspar...
<urn:uuid:a8549808-5e62-4669-b5ab-c0bbec43f742>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/analysis-inc-299386/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00275-ip-10-171-10-108.ec2.internal.warc.gz
en
0.900679
1,157
2.53125
3
Handling the tail end of the IT life cycle Hints from NIST - By William Jackson - Apr 27, 2007 The National Institute of Standards and Technology has some advice for agencies getting rid of digital storage media: Shred. Disintegrate. Pulverize. Incinerate. Melt. These are ways to get rid of disks, tapes and other devic...
<urn:uuid:d263d541-0434-4248-9d9f-3bd54c75116c>
CC-MAIN-2017-09
https://gcn.com/articles/2007/04/27/handling-the-tail-end-of-the-it-life-cycle.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00327-ip-10-171-10-108.ec2.internal.warc.gz
en
0.911074
636
2.671875
3
First of all, let me tell you one thing. This article is written only for educating people about how phishing works and how should they prevent phishing scams. Please don’t use these techniques for malicious purposes. What is Phishing? Phishing is a most popular technique used for hacking passwords and stealing sensiti...
<urn:uuid:59ad1152-5139-445f-b46b-aa24b2de52fa>
CC-MAIN-2017-09
https://www.7xter.com/2016/08/phishing.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00327-ip-10-171-10-108.ec2.internal.warc.gz
en
0.882675
1,607
2.953125
3
A brief history of open data - By Luke Fretwell - Jun 09, 2014 In December 2007, 30 open-data pioneers gathered in Sebastopol, Calif., and penned a set of eight open-government data principles that inaugurated a new era of democratic innovation and economic opportunity. "The objective…was to find a simple way to expres...
<urn:uuid:8ac7be6f-cdac-4351-b9d1-99844d202f0b>
CC-MAIN-2017-09
https://fcw.com/articles/2014/06/09/exec-tech-brief-history-of-open-data.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00503-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926859
1,824
3.203125
3
To launch its single-stream recycling program, Ann Arbor, Mich., officials didn't have to look far to find a solution that could save money and fuel. In July, the city became the first in Michigan to purchase hydraulic hybrid trucks, built using technology pioneered by the U.S. Environmental Protection Agency's Nationa...
<urn:uuid:38021633-6877-4e2b-b17a-67a985e54258>
CC-MAIN-2017-09
http://www.govtech.com/technology/Hydraulics-on-Hybrid-Recycling-Trucks-to.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00447-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956188
623
2.8125
3
HALF MOON BAY, Calif. – Experts at a recent technology conference agreed that blockchain has a bright future, but warned it may be a rocky ride until that future arrives. Blockchain is a distributed database that uses a secure digital ledger of transactions that users can share across a computer network. It’s also the ...
<urn:uuid:75c9efb1-042b-4767-83b8-a22ceadf8307>
CC-MAIN-2017-09
http://www.csoonline.com/article/3137004/security/why-blockchain-s-growing-pains-will-be-worth-it.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00499-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958114
1,095
2.546875
3
Cunningham W.P.,Claudia Taylor Johnson High School | Joseph C.,Claudia Taylor Johnson High School | Morey S.,Claudia Taylor Johnson High School | Santos Romo A.,Claudia Taylor Johnson High School | And 3 more authors. Journal of Chemical Education | Year: 2015 A simplified activity examined gas density while employing ...
<urn:uuid:ce3fb72e-c655-498b-87aa-2130b8d1edfe>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/claudia-taylor-johnson-high-school-733127/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00499-ip-10-171-10-108.ec2.internal.warc.gz
en
0.893418
206
3.203125
3
The year 2016 will not only be remembered for Trump’s surprise victory in the US election, or for Brexit, or for saying goodbye to so many public figures like David Bowie, Alan Rickman, Prince, Muhammed Ali and Carrie Fisher, just to name a few. Last year was also one of the most challenging for cyber-security. Hackers...
<urn:uuid:edd9df8b-44b4-4dcc-bfc7-1e6e21c69f81>
CC-MAIN-2017-09
https://fraudwatchinternational.com/industry-news/2016s-important-lessons-cyber-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00619-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955366
1,089
2.875
3
While looking into PL/SQL Developer – a very popular tool for working with Oracle databases, to see how it encrypts passwords I noticed something interesting. When testing Windows applications, I make it a habit to have Fiddler running, to see if there is any interesting traffic – and in this case, there certainly was....
<urn:uuid:76f71ea8-1fa4-42ad-b99f-a1facac3fa4c>
CC-MAIN-2017-09
https://adamcaudill.com/category/security_research/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00195-ip-10-171-10-108.ec2.internal.warc.gz
en
0.719412
1,060
2.5625
3
When it comes to cybersecurity, many school districts are woefully behind the times, often relying on web content filters older than their students to protect against cyber attacks. The thing is, cyber threats have evolved rapidly and the old tools just don’t cut it anymore. School districts typically operate on shoest...
<urn:uuid:5ae2776c-8f74-44c9-840f-1d04a60d0a18>
CC-MAIN-2017-09
https://blog.iboss.com/sled/as-cyber-threats-intensify-schools-need-to-update-security-tools
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00195-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954761
609
2.78125
3
Programs categorized as Malware pose a significant security risk to the user's system and/or information. Types of programs in the Malware category include viruses, worms and trojans, among other threats. These threats can perform harmful actions such as stealing personal or program data, secretly manipulating the devi...
<urn:uuid:c62ef45c-9aef-4006-8d95-f39a5438eaef>
CC-MAIN-2017-09
https://www.f-secure.com/en/web/labs_global/classification
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00191-ip-10-171-10-108.ec2.internal.warc.gz
en
0.905063
1,183
3.21875
3
Internet Of Things Security Reaches Tipping PointPublic safety issues bubble to the top in security flaw revelations. It all began more than four years ago with HD Moore's groundbreaking research in embedded device security -- VoIP, DSL, SCADA, printers, videoconferencing, and switching equipment -- found exposed on th...
<urn:uuid:ba730de6-421a-4af9-914c-a61670f4315f>
CC-MAIN-2017-09
http://www.darkreading.com/vulnerabilities---threats/internet-of-things-security-reaches-tipping-point/d/d-id/1298019?_mc=RSS_DR_EDT
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955609
1,592
2.515625
3
Water scarcity is a reality for about 1/3 of the world’s population. Driving increasing water scarcity is the way we manage water for food. Projections indicate that a growing, wealthier population may need as much as 70% more food by 2050. With water scarcity already posing a constraint to food production in many area...
<urn:uuid:aafc9cb8-affb-491e-97b2-9aefe37df1f3>
CC-MAIN-2017-09
https://www.brighttalk.com/webcast/693/20597
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934114
4,728
3.140625
3
What’s the ‘big’ deal? The past, present and future of Big Data This feature first appeared in the Spring 2015 issue of Certification Magazine. Click here to get your own print or digital copy. Big Data. It’s a buzz phrase, a marketing term, an IT framework and an employment category. That’s a heavy load for two words ...
<urn:uuid:83d750cc-a560-483e-8b4f-6e040db94ce6>
CC-MAIN-2017-09
http://certmag.com/whats-big-deal-past-present-future-big-data/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00239-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958219
1,872
2.921875
3
A new Google Chrome workshop virtually reproduces 100,000 nearby stars in just one tab in your web browser. The term "nearby" in this context being relative, of course. The visualization can be accessed here, and it's a really effective gateway to procrastination. You can zoom in past Barnard's Star or Alpha Cassiopeia...
<urn:uuid:be7e5aeb-7a8f-43c0-9f16-2b1c84e49b98>
CC-MAIN-2017-09
http://www.networkworld.com/article/2223504/opensource-subnet/google-reproduces-100-000-stars-in-chrome-experiment.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00535-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939937
344
2.921875
3
Robots are essentially a self-contained tribute to the wonders of technology. The most advanced models use fast computer processing, high-definition cameras, artificial intelligence and long-range sensors, all of which give you a pretty good idea where technology is heading. In some ways, a robot even provides a glimme...
<urn:uuid:2ce7c2e8-3219-4b05-a251-a513ae9fc326>
CC-MAIN-2017-09
http://www.computerworld.com/article/2491135/data-center/5-uses-for-the-surveillance-robot-of-tomorrow.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00111-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929102
1,302
3.203125
3
NASA engineers updated the software for a robotic Mars rover, correcting a computer glitch more than two months old while the robot hurtled through space on its way to Mars. Late in November, NASA launched its $2.5 billion Mars Science Laboratory. Dubbed Curiosity, the SUV-size super rover is on an eight-month journey ...
<urn:uuid:346e9134-65cd-4613-b0ac-d664659b05c2>
CC-MAIN-2017-09
http://www.computerworld.com/article/2501681/emerging-technology/nasa-fixes-computer-glitch-on-robot-traveling-to-mars.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00580-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955154
510
2.90625
3
Meanwhile, the discussion also broke down to the benefits of functional programming versus imperative programming. Functional programming is a programming paradigm that treats computation as the evaluation of mathematical functions and avoids state and mutable data. It emphasizes the application of functions, in contra...
<urn:uuid:d02256a1-9729-4add-a75e-35bf676efd88>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Application-Development/Is-it-Time-for-JavaScript-to-Step-Aside-for-the-Next-Big-Web-Thing-109707/1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00280-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947482
130
3.6875
4
There’s a team from Spain, and another from Italy. The Japanese team calls itself Hakuta, and there are numerous teams from the U.S. They’re working hard with a serious sense of competition. But they’re not getting ready for the winter Olympics in Sochi. It’s T-minus 23 months for the international assortment of scient...
<urn:uuid:85c944ea-4764-418d-a5d2-593b96eb11b6>
CC-MAIN-2017-09
http://www.cio-today.com/article/index.php?story_id=91371
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00632-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954715
823
2.65625
3
New research shows that "123456" is a good password after all. In fact, such useless credentials from a security standpoint have an important role in an overall password management strategy, researchers at Microsoft and Carleton University, Ottawa, Canada, have found. Rather than hurt security, proper use of easy-to-re...
<urn:uuid:d4bce739-b147-474c-b005-785638d04441>
CC-MAIN-2017-09
http://www.cio.com/article/2455449/identity-access/why-123456-is-a-great-password.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00156-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953952
693
2.703125
3
Gone are the days when producing a Web page simply involved writing some HTML code or painting a screen using Microsoft's Frontpage Web design tool. These days, with the Internet going into e-commerce overdrive everyone wants dynamic Web experiences. Scripting has taken a quantum leap. There are two main categories of ...
<urn:uuid:99dbca19-0c6d-46e2-a935-06b1862bd75d>
CC-MAIN-2017-09
http://www.computerweekly.com/feature/Scripting-languages
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00400-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947838
851
2.921875
3
Virtualized Data Center Early designs of cloud computing focused on blades with an independent Storage Area Network (SAN) architecture. This blueprint consolidated the CPU and memory into dense blade server configurations connected via several high-speed networks (typically a combination of Fibre Channel and 10GB) to l...
<urn:uuid:58d650ce-8223-46c4-9a7c-794e014fbd63>
CC-MAIN-2017-09
https://cloudtweaks.com/2012/03/leveraging-a-virtualized-data-center-to-improve-business-agility-conclusion/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00100-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928587
1,283
2.75
3
Question 1) Test Yourself on CompTIA i-Net+. Objective : Network SubObjective : Understand and be able to Describe the Use of Internet Domain Names and DNS Single Answer Multiple Choice DNS uses a lookup table to resolve names. Which record type in the DNS table is used for the assignment of multiple, fully qualified d...
<urn:uuid:52a6f94c-d57e-4171-a726-9be02b50d1e8>
CC-MAIN-2017-09
http://certmag.com/question-1-test-yourself-on-comptia-i-net/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00328-ip-10-171-10-108.ec2.internal.warc.gz
en
0.869902
251
3.671875
4
Apple [AAPL] already provides support for IPv6, the latest iteration of the IP addressing system that launches today, World IPv6 day. While the significance of this may not impact you just yet, I've put together a general guide to IPv6, the reasons to support it, and Apple's support. [ABOVE: Now available at Apple's re...
<urn:uuid:c9a22d03-0d38-45bb-bb2b-241e193f6208>
CC-MAIN-2017-09
http://www.computerworld.com/article/2471817/internet/apple-s-iphone-driven-mobile-future--ipv6--and-you.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00328-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945009
1,705
2.515625
3
Fiber optic cables form one of the most important parts of the networking industry today. Fiber cables are composed of one or more transparent optical fibers enclosed in a protective covering and strength members. Fiber cables are used to transmit data by the mode of light. Various types of fiber cables available are m...
<urn:uuid:7411e00f-21bb-4888-9d2a-891f03a8cb4c>
CC-MAIN-2017-09
http://www.fs.com/blog/an-overview-of-the-armored-fiber-cable.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00096-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926396
615
3.125
3
“Critical infrastructure consists of physical and information technology assets, such as the electricity distribution networks, telecommunications networks, banking systems, manufacturing and transportation systems, as well as government information systems and services that support the continued and effective function...
<urn:uuid:41ea39f7-8d15-4914-b5be-99e5d8edcccb>
CC-MAIN-2017-09
http://www.fedcyber.com/2012/10/23/protecting-canadian-critical-infrastructure-against-cyber-threats/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00272-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935078
213
2.859375
3
Level of Gvt: State Problem/situation: While access to the Internet can provide important government information to residents of a state, most services are costly. Solution: Maryland introduced Sailor, a program that allows Maryland residents to visit the Internet through the state library for free. By David Noack Whil...
<urn:uuid:b57987fa-e36b-44f0-b153-cd8dada92daf>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Maryland-quotCybrariesquot-Offer-Internet-Browsing-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950954
1,324
2.53125
3
Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy. Today, attacks against critical infrastructure can be just as disruptive when launched in cyberspace. The threat of cyber-attacks against Industrial Internet of Things (IIoT) is very ...
<urn:uuid:4ee14187-e6cb-416d-8362-ea1cfc16a5cf>
CC-MAIN-2017-09
http://vpnhaus.ncp-e.com/2017/02/16/careful-connections-are-key-to-mitigating-cyber-attacks-on-iiot-systems/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00624-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937947
1,010
2.546875
3
Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat Europe. Google and Waze both offer turn-by-turn navigation in smartphone apps and...
<urn:uuid:8e73b3aa-8939-433f-95f4-67bdc83ac47d>
CC-MAIN-2017-09
http://www.computerworld.com/article/2495379/malware-vulnerabilities/hackers-can-cause-traffic-jams-by-manipulating-real-time-traffic-data--resea.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00444-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926632
843
2.546875
3
Data collected by a helicopter flying daily over Washington, D.C., through next week could one day be key to detecting a nuclear or radiological weapon amid the clutter of harmless radioactive sources scattered through the city. The National Nuclear Security Administration began sending the rotorcraft loaded with radia...
<urn:uuid:f4bd30c0-ba70-4906-99ce-98c3c10d5483>
CC-MAIN-2017-09
http://www.nextgov.com/big-data/2013/01/nnsa-helicopter-now-hunt-radiation-washington-dc/60483/?oref=ng-channelriver
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00444-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936195
647
2.734375
3
Http Protocol is a communication protocol consisted on a complete system that includes rules, designs and configuration for the digital messages, which are going to be exchanged between the computing organizations. HTTP (hyper text transfer protocol) as a communication protocol was anticipated in the year 1989 by 1.0 s...
<urn:uuid:56231109-2899-41a6-a6d8-1bc2eabb1c7e>
CC-MAIN-2017-09
https://howdoesinternetwork.com/2011/http
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00496-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944124
639
4.15625
4
Introduction: Data Recovery 101 Gillware is rolling out a new blog series titled “Data Recovery 101”, in which our bloggers will take a closer look at each of the different components of a hard drive and explain how they work, how they fail and how we recover the data from each failure situation. The series will includ...
<urn:uuid:d5bd3b85-3575-4476-87e6-53e32da0c261>
CC-MAIN-2017-09
https://www.gillware.com/blog/data-recovery/data-recovery-hard-drive-platters/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00020-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927094
1,241
3.5625
4
The company has encrypted critical parts of its operating system to protect it from software pirates, according to a researcher. A computer researcher has made public information that Apple Computer has encrypted at the binary level critical parts of its Mac OS X operating system. These "Apple-protected binaries" can s...
<urn:uuid:957756da-386b-4e6a-9488-3f2899599d9a>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Apple/Apple-Places-Encrypted-Binaries-in-Mac-OS-X
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00372-ip-10-171-10-108.ec2.internal.warc.gz
en
0.96068
640
2.796875
3
Everyone has heard emergency alert signals transmitted over television and radio, usually followed by, "This is only a test ..." But what if it were a real emergency? People watching TV or listening to the radio would certainly be alerted. But what if the emergency happened in the middle of the night, when few people w...
<urn:uuid:0cf66ee2-0297-4a26-a07a-c1ceb2fffacc>
CC-MAIN-2017-09
http://www.govtech.com/public-safety/99417349.html?page=1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00372-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957041
1,738
3.171875
3
Kelemen A.,Debreceni Egyetem TEK | Kelemen A.,Debrecen University | Torok P.,Debreceni Egyetem TEK | Torok P.,Debrecen University | And 8 more authors. Journal of Landscape Ecology | Year: 2010 Spontaneous succession in lack of restoration focused case studies is often underappreciated in restoration. We studied the re...
<urn:uuid:5f82d2b8-9388-4640-ac75-48d540b01311>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/debreceni-egyetem-tek-645188/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00016-ip-10-171-10-108.ec2.internal.warc.gz
en
0.922767
321
2.578125
3
When will you move your ERP to the cloud? We are on the cloud already! from 2-3 years from 4-5 years Total votes: 30 Baanboard at LinkedIn By patvdv at 19 Feb 2008 - 23:52 - ACID Transactions - ACID Transactions satisfy the properties of Atomicity, Consistency, Isolation, and Durability. As complex update operations on...
<urn:uuid:25dfe037-912c-4665-a045-04f673071e59>
CC-MAIN-2017-09
http://baanboard.com/node/48?s=35ad7fdbaf76ecc9d2f418e63de1eec9
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00544-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929832
6,001
2.6875
3
In software project management, software testing, and software engineering, verification and validation (V&V) is the process of checking that a software system meets specifications and that it fulfills its intended purpose. It may also be referred to as software quality control. It is normally the responsibility of sof...
<urn:uuid:e98f160d-d1fc-405f-a0e1-62b64ec496cb>
CC-MAIN-2017-09
http://colsa.com/softwareverification.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00544-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935997
124
2.796875
3
CEOP-AEGIS - Coordinated Asia-European long-term Observing system of Qinghai Tibet Plateau hydro-meteorological processes and the Asian-monsoon systEm with Ground satellite Image data and numerical Simulations Agency: Cordis | Branch: FP7 | Program: CP-SICA | Phase: ENV.2007.4.1.4.2. | Award Amount: 4.46M | Year: 2008 ...
<urn:uuid:5dc10ba2-ed85-4f2e-adbc-37f55d846688>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/ariespace-srl-600619/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00068-ip-10-171-10-108.ec2.internal.warc.gz
en
0.902302
1,281
2.65625
3
A rapid, safe and successful response to a mass shooting incident requires preparation. The likelihood of a mass shooting is low, but schools, colleges and public safety officials must prepare for these situations. Recent mass shootings have demonstrated the need to prepare local, regional, state and federal resources ...
<urn:uuid:51e6deb5-68ad-444e-a7f5-e4f74c9e3160>
CC-MAIN-2017-09
http://www.govtech.com/public-safety/Responding-to-Mass-Shootings-Takes-Planning.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00488-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939879
505
3.171875
3
Learn Your Linux Clustering Options "Cluster" is probably the most heavily abused term in the computing world. In this article we'll talk about what a cluster really is, and give an overview of the Linux technologies that can help you implement various types of clusters. The main focus will of course be on building clu...
<urn:uuid:e627c677-e3a5-421e-b012-28c4c1c2d3a2>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netos/article.php/3679891/Learn-Your-Linux-Clustering-Options.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00012-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941924
1,101
3.15625
3
The Cynja Field Instruction Manual An activity book for trainee cyberheroes! Book Overview Summary Today, our battlefield is a new frontier, one that’s invisible to all but those with cyber powers. It’s time to train a new kind of superhero – one who will protect cyberspace from attack! Join the Cynsei, as he helps you...
<urn:uuid:a6b427ee-9b71-4838-8d80-81e90fefcd6b>
CC-MAIN-2017-09
https://www.cynja.com/shop/the-cynja-field-instruction-manual/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00012-ip-10-171-10-108.ec2.internal.warc.gz
en
0.92539
672
2.609375
3
If you want to highlight certain points or ideas in your PowerPoint presentation but the laser pointer isn’t quite cutting it, you can try another tactic. Here’s how to draw on your presentation to help get your point across. - First, you have to be in Slide Show mode. Head to Slide Show at the top of your screen > Fro...
<urn:uuid:4905ddba-e8dd-4929-b392-e1cfc8a1d544>
CC-MAIN-2017-09
https://www.bettercloud.com/monitor/the-academy/how-to-doodle-on-your-powerpoint-presentation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00188-ip-10-171-10-108.ec2.internal.warc.gz
en
0.86942
229
3.28125
3
ZIFFPAGE TITLEA Hex in ComputingBy Tom Steinert-Threlkeld | Posted 2005-07-08 Email Print Decades before the idea took hold in the dot-com era, Reader's Digest kept a "360-degree view" of each of its customerstracking every contact it ever had with a subscriber to its magazine or a purchaser of any of its condensed boo...
<urn:uuid:d337a9b4-4243-4282-8409-4991db5b8f98>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/Projects-Data-Analysis/Readers-Digest-The-Longest-Goodbye/2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00064-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963205
1,063
2.65625
3
A kind of fingerprinting, using the unique noises that emanate from hybrid cyber-physical systems could be used to thwart large-infrastructure attacks that some experts think are a danger. Fake, malicious control commands injected into electrical grids and other large-scale hybrid physical and cyber installations could...
<urn:uuid:b9e3d40a-4fd8-4311-9393-f681f47574ba>
CC-MAIN-2017-09
http://www.networkworld.com/article/3040184/security/how-sound-fingerprinting-could-spot-grid-attackers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00064-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940219
713
3.015625
3
The leader in Eavesdropping Detection and Counterespionage Consulting services for business & government, since 1978. James Lawrence Fly, Winter 1999 — The Historian by Mickie Edwardson The use of wiretaps as an investigative tool by government and law enforcement agencies has long been a controversial issue in the Uni...
<urn:uuid:1b4465c7-eb24-40f6-ac38-b25921f5d59e>
CC-MAIN-2017-09
http://counterespionage.com/1940s-50s-james-lawrence-fly-wiretap-warrior.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00184-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957812
12,852
3
3
Robotic spheres aboard the International Space Station soon will will be quite a bit smarter, using Google technology to fly safely and adroitly around the orbiter. NASA's Ames Research Center is teaming up with Google's Project Tango team to add the company's new 3D technology to the tech tools aboard the Orbital Scie...
<urn:uuid:007c8f22-d56a-48d3-93d6-3767e47033d3>
CC-MAIN-2017-09
http://www.computerworld.com/article/2489895/emerging-technology/nasa-to-use-google-s-project-tango-to-update-space-robot.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00360-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929039
699
2.828125
3
NASA's super rover Curiosity has collected a sample from the inside of a rock on Mars, the first time the process has been done on another planet, NASA announced Wednesday. The robotic rover sent images back to NASA scientists showing the drilling and an image of the powdered-rock sample in the rover's scoop. "Seeing t...
<urn:uuid:d213d88b-12fe-42c0-94cb-55b648119149>
CC-MAIN-2017-09
http://www.computerworld.com/article/2495308/emerging-technology/nasa-rover-curiosity-grabs-first-martian-rock-sample.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00408-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947957
480
3.421875
3
Quantum cryptography has been pushed onto the market as a way to provide absolute security for communications. It is already used in Swiss elections to ensure that electronic vote data is securely transmitted to central locations. And as far as we know, no current quantum cryptographic system has been compromised in th...
<urn:uuid:aba21ba5-e76f-40db-a3b1-8a4c4465e272>
CC-MAIN-2017-09
https://arstechnica.com/science/2011/11/researchers-show-how-to-break-quantum-cryptography-by-faking-quantum-entanglement/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00460-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951349
827
2.9375
3
WASHINGTON, DC--(Marketwired - March 31, 2014) - The National Association for the Education of Young Children's (NAEYC) Week of the Young Child™ (April 6-12, 2014) draws attention to how a high-quality early childhood experience the first few years of life set a child's path for success in school and in life and offers...
<urn:uuid:c29aaca9-519d-418f-a497-d9969028ce31>
CC-MAIN-2017-09
http://www.marketwired.com/press-release/essential-ingredients-high-quality-early-childhood-education-highlighted-week-young-1894257.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00581-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952863
919
2.9375
3
Regular browsers, such as the one that came with your PC or mobile device, are leaking data on the internet like a sieve. The inherent vulnerabilities of the local browser model allow criminal hackers to infiltrate computers and steal or manipulate data. Firewalls or antivirus software provide little or no protection a...
<urn:uuid:bf74024f-373c-4209-85be-36c2a4cca1ab>
CC-MAIN-2017-09
https://go.authentic8.com/blog
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00281-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921115
213
2.75
3
It sounds too preposterous for even James Bond: by placing a mobile phone next to a PC, researchers can "listen" to the faintest sound a CPU makes as it churns away on RSA-encoded content and extract the keys themselves. Preposterous, except for the fact that Adi Shamir, one of the co-developers of the RSA encryption a...
<urn:uuid:6061070d-83b4-4b22-84dc-3acdb5b84064>
CC-MAIN-2017-09
http://www.cio.com/article/2380043/security0/rsa-keys-snatched-by-recording-cpu-sounds-with-a-phone.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00633-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949783
744
2.859375
3
With the coming of age of civil aviation in the 1930s and 1940s, the rural settings of many U.S. airports began to change. By the 1950s, expanding metropolitan centers surrounded formerly remote airfields with residential and commercial developments. As more powerful airliners rolled off the drawing boards, noise becam...
<urn:uuid:48d03085-d204-47e3-91e6-a1657c71df5e>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Airport-Soundbytes.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00633-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929275
1,439
3.09375
3
NASA's proposed $17.7 billion budget includes plans to capture and redirect an asteroid into orbit around Earth so astronauts can study it. Ultimately, the project looks to learn more about the makeup of asteroids in an attempt to protect the Earth from devastating collisions. "Today, we unveil President Obama's Fiscal...
<urn:uuid:3b972be5-5a06-4c1a-923b-d6bc28d6f46d>
CC-MAIN-2017-09
http://www.itworld.com/article/2708925/hardware/nasa-budget-includes-plan-to-capture-and-redirect-asteroid-into-earth-orbit.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00577-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938572
826
3.109375
3
MIT Builds Batteries with Viruses Normally, one would associate the word virus with something negative, whether it is a malfunctioning desktop computer or a sickness. However, researchers at the Massachusetts Institute of Technology have "trained" viruses in a lab to create a miniature battery. By manipulating a few ge...
<urn:uuid:641cd169-857a-4422-b6a0-2272addf1624>
CC-MAIN-2017-09
https://betanews.com/2006/04/07/mit-builds-batteries-with-viruses/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00277-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965223
288
3.90625
4
Manhattan has approximately 47,000 buildings with around 10.7 million windows, according to a 2013 estimate from The New York Times. Now imagine if just 1% -- or 100,700 -- of those windows could generate electricity through transparent photovoltaics. That's the idea behind solar power windows, and at least two compani...
<urn:uuid:3719d0ff-2897-4005-81c6-6a0a16524bec>
CC-MAIN-2017-09
http://www.itnews.com/article/2980236/sustainable-it/solar-windows-poised-to-change-the-way-we-power-buildings.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00097-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947762
1,496
3
3
Hurricane season is well in progress, and won’t wrap up until the end of November. And in looking back at last hurricane season, when Sandy rocked the East Coast, hundreds of lives were lost and countless people were displaced from their homes. But that's not all that was affected -- so was our energy infrastructure. "...
<urn:uuid:60c49f0f-468e-4af4-93a8-142602adaa8a>
CC-MAIN-2017-09
http://www.govtech.com/Map-Mashes-Hurricane-Information-with-Energy-Infrastructure-Data.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00445-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949569
819
2.609375
3
Status: “Ready for mass consumption,” but set for regular, consistent iterations. A by-product of Big Data, Big History is the study of time going all the way back to the Big Bang. Using a scale that begins 13.7 billion years ago, ChronoZoom breaks up history by thresholds that represent moments in time. Treshhold 1, t...
<urn:uuid:906cd24e-9b7f-4dab-a4da-a12ad1e10d62>
CC-MAIN-2017-09
http://www.cio.com/article/2368441/project-management/10-cool-projects-from-microsoft-s-research-arm.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00621-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942641
141
3.046875
3