text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
For years, Apple fans have claimed that Macs are invulnerable to attack, while belittling Windows as being full of security holes. Now the tables are turned --- not only has a Trojan infected Macs and created a botnet, but several well-known researchers warn that Mac OS X is less secure than either Windows or Linux.
In... | <urn:uuid:ef4a682a-d0e1-440c-b29e-f4453cd621b6> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2481597/cybercrime-hacking/researchers--macs-are-less-secure-than-windows-pcs.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00145-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95217 | 530 | 2.78125 | 3 |
In 2009, the Canadian Space Agency committed $110 million the development of advanced robotics and space exploration technologies. The funding was designed to be spread over three years -- and now, right on schedule, the CSA has unveiled the results of its efforts: a fleet of rovers that will one day explore the moon a... | <urn:uuid:060224d9-8e7a-4c19-826f-83ee82e2a7de> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2012/10/curiositys-cousins-meet-rover-fleet-canadian-space-agency/58986/?oref=ng-relatedstories | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00321-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964007 | 354 | 2.84375 | 3 |
Many Small to Medium Enterprises (SMEs) across the UK and beyond are unaware that supercomputing can help them become more energy efficient.
With major energy suppliers recently announcing yet more price hikes, companies across all industries are feeling the pinch.
Three of the ‘big six’ British energy firms have incre... | <urn:uuid:67adc1cf-6b93-4e43-8c91-0af6c5812419> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/12/02/saving-energy-supercomputing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00021-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950984 | 1,449 | 2.5625 | 3 |
Graphene is a one-atom-thick layer of carbon that has been hailed as a potential silicon replacement capable of extending the exponential computing advances that modern society has come to depend on. Despite the material’s profile of being strong, flexible, light-weight and a good conductor, there are still a number of... | <urn:uuid:fe894d65-3fac-4478-9208-e23cdd2afb8d> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/05/05/graphene-faces-real-world-limitations/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00369-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956805 | 1,003 | 3.78125 | 4 |
Imagine you are building a house, and have a list of things you want to have in your house, but you can’t afford everything on your list because you are constrained by a budget. What you really want to work out is the combination of items which gives you the best value for your money.
This is an example of a optimizati... | <urn:uuid:b56b2b25-9262-4d9c-91d6-d32b4161950c> | CC-MAIN-2017-09 | https://www.dwavesys.com/quantum-computing/applications | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00069-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934504 | 1,444 | 3.40625 | 3 |
In a previous article dealing with online security prompted many readers with home PCs to ask for advice on how to stay safe and still get the most out of the “information highway”.
The first and fundamental step is to install software on the computer that will protect you from any nasty surprises. This software should... | <urn:uuid:cdc1075e-677c-45e9-beea-0326d57ad1a7> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2002/10/15/security-online---some-basic-it-hygiene-tips/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00541-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937559 | 1,342 | 3.125 | 3 |
The Conficker Conundrum
More than a year has passed since Conficker first appeared, yet it is still making the news. The patch for the vulnerability exploited by Conficker was published by Microsoft in October 2008. Yet more than one year later, Conficker continues to infect computers using many advanced malware techni... | <urn:uuid:5b6708c6-0474-4c72-b496-480d0e168de4> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsecur/conficker-conundrum | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00241-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951336 | 803 | 2.5625 | 3 |
So we have moved on from desktop PCs and have now entered a new era of computing via connected devices such as smartphones, tablets, and phablets, supported by the evolution of technology. In this tech-savvy era, consumers are very much technology-driven: we now have devices which monitor and respond to users based on ... | <urn:uuid:d7e946af-277f-4697-93d7-351be626369d> | CC-MAIN-2017-09 | https://www.juniperresearch.com/analystxpress/november-2012/the-evolution-of-wearable-devices-are-they-the-fut | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00417-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967436 | 574 | 2.734375 | 3 |
Originally published May 15, 2012
Hadoop is one of the up-and-coming technologies for performing analysis on big data, but to date very few universities have included it in their undergraduate or graduate curriculums. In a February 2012 article from InfoWorld, those already using the technology issued the warning that ... | <urn:uuid:8b06c7a1-c3fa-4a9c-bcd5-c1707690c69c> | CC-MAIN-2017-09 | http://www.b-eye-network.com/channels/1531/view/16067 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00361-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950764 | 1,767 | 3.078125 | 3 |
In the Earth's past there was powerful volcanic activity which could have easily spewed dirt and rocks containing microbes into outer space which not only could have eventually reached Mars but also ended up traveling in orbit through space that we now know as meteors, comets, and asteroids. A Newsweek article of Septe... | <urn:uuid:d6d8f097-6f9f-43a1-832e-263218d4b4e3> | CC-MAIN-2017-09 | http://www.informationweek.com/government/leadership/10-years-on-mars-what-spirit-and-opportunity-discovered/d/d-id/1113555?piddl_msgid=198632 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00537-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951343 | 907 | 3.921875 | 4 |
A seemingly constant stream of data breaches and this week’s news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn’t it time we dumped the user name and password?
A lot of the best technology of today exploits biometric factors such as retina patterns, fingerp... | <urn:uuid:395138c4-b6af-444c-b7bc-d2eb3cfefa04> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2463341/seven-ways-darpa-is-trying-to-kill-the-password.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946719 | 1,046 | 2.765625 | 3 |
The space agency reported that Curiosity is now running on its backup computer system, known as its B-side. It's been taken out of its minimal-activity safe mode and ready to return to full operation.
"We are making good progress in the recovery," said Mars Science Laboratory Project Manager Richard Cook in a statement... | <urn:uuid:19eb46cd-e88b-4900-8a1d-4a7b85a16c2a> | CC-MAIN-2017-09 | http://www.itworld.com/article/2713031/hardware/nasa-mars-rover-curiosity-on-road-to-recovery.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00409-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95271 | 603 | 2.625 | 3 |
“Getting Smarter and Smarter” – Why Digital Data is Key to Urbanisation
by François Mero, Senior VP of Sales EMEA at Talend
The phenomenon known as ‘urban transition’, which can be defined as the shift from rural to urban and from agricultural employment to industrial, commercial, or service employment, is now not just... | <urn:uuid:5168e72c-8628-4b27-80bb-bcc943b0ed45> | CC-MAIN-2017-09 | https://data-economy.com/getting-smarter-smarter-digital-data-key-urbanisation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00282-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941715 | 1,034 | 2.65625 | 3 |
Stopping Forged Email 2: DKIM to the Rescue
We have recently looked at how hackers and spammers can send forged email and then seen how these forged messages can be almost identical to legitimate messages from the purported senders. In fact, we learned that generally all you can trust in an inbound email message is the... | <urn:uuid:f755d531-f18b-4c52-9202-9ca04d1e541b> | CC-MAIN-2017-09 | https://luxsci.com/blog/stopping-forged-email-2-dkim-rescue.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00158-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92845 | 3,097 | 2.59375 | 3 |
OAK RIDGE, Tenn. – At first glance, the data hall within Oak Ridge National Laboratory resembles many raised floor environments. But a stroll past the dozens of storage cabinets reveals three of the world’s most powerful supercomputers, including a machine that looms as the once and future king of the supercomputing re... | <urn:uuid:914b18dd-fce2-45a9-831f-33f303644151> | CC-MAIN-2017-09 | http://www.datacenterknowledge.com/archives/2012/09/10/oak-ridge-the-frontier-of-supercomputing/?utm-source=feedburner&utm-medium=feed&utm-campaign=Feed%3A+DataCenterKnowledge+(Data+Center+Knowledge) | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00102-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915599 | 938 | 2.734375 | 3 |
Not sure I am understanding the question. TCP does not stop anything, but it is polite and shakes hands to establish the connection. Before an HTTP client can get data, it needs to request it with a GET command. Then the server will send the data (and expect acks for data sent).
Here is a packet capture. Look at the in... | <urn:uuid:eeea25e0-cb66-4eae-9d13-ee678fd2dae1> | CC-MAIN-2017-09 | http://forum.internetworkexpert.com/forums/t/35200.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00330-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907085 | 165 | 3 | 3 |
Southern California’s Mount Wilson is a lonesome, hostile peak — prone to sudden rock falls, sometimes ringed by wildfire — that nevertheless has attracted some of the greatest minds in modern science.
George Ellery Hale, one of the godfathers of astrophysics, founded the Mount Wilson Observatory in 1904 and divined th... | <urn:uuid:2dfa6d1b-3311-44be-9aef-268126c1b16f> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2013/02/how-nasa-scientists-are-turning-l-one-big-climate-change-lab/61582/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00330-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.895259 | 388 | 3.40625 | 3 |
Conservation research is not being done in the countries where it is most needed - a situation which is likely to undermine efforts to preserve global biodiversity. That's the conclusion of a new study publishing in the Open Access journal PLOS Biology on 29th March, led by Associate Professor Kerrie Wilson from The Un... | <urn:uuid:255a57d2-bd6f-4bd3-9a10-4ca9c38b456c> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/asl-1-1278838/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00506-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957794 | 4,590 | 3.125 | 3 |
Zero to ECDH (Elliptic-Curve Diffie-Hellman) in 30 Minutes
This is a quick primer on the elliptic-curve Diffie-Hellman (ECDH) key-agreement
scheme. It provides a simple illustration of how the properties of elliptic-curve
cryptography (ECC) can be used to build a useful security scheme.
A key agreement scheme is a proc... | <urn:uuid:f7f6face-73a0-464c-9822-116c1fadcd9c> | CC-MAIN-2017-09 | https://www.entrust.com/resource/zero-ecdh-elliptic-curve-diffie-hellman-30-minutes/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00098-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.909982 | 242 | 2.96875 | 3 |
Math Comprehension Made Easy
June 16, 2012
Want to dive into analytics as a data scientist? Get started with Stonehill College‘s “How to Read Mathematics.” The well-structured article by Shai Simonson and Fernando Gouvea details the reading protocol that will allow anyone to get the most out of reading mathematical exp... | <urn:uuid:2db1b3ad-6fff-4134-a7ca-36b0cc13cc44> | CC-MAIN-2017-09 | http://arnoldit.com/wordpress/2012/06/16/math-comprehension-made-easy/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00274-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955154 | 308 | 3.359375 | 3 |
Analog. Digital. What’s the Difference?
by Paul Wotel
Analog phone lines. Analog
signals. Digital security. Digital PBX. Analog-to-digital adapters. What does
it all mean? In the telecom world, understanding analog versus digital isn't
as simple as comparing one technology to another. It depends on what productand
in s... | <urn:uuid:636974d0-393e-4d70-83f6-30c065573f9e> | CC-MAIN-2017-09 | http://telecom.hellodirect.com/docs/Tutorials/AnalogVsDigital.1.051501-P.asp | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00502-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921744 | 1,842 | 2.78125 | 3 |
Memory management can be challenge enough on traditional data sets, but when big data enters the picture, things can slow way, way down. A new programming language announced by MIT this week aims to remedy that problem, and so far it's been found to deliver fourfold speed boosts on common algorithms.
The principle of l... | <urn:uuid:a8fd36d2-6e96-47da-a633-325abc9fa7f7> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3120506/this-new-programming-language-promises-a-4x-speed-boost-on-big-data.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00622-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947457 | 559 | 3.390625 | 3 |
Black Box Explains...SCSI Ultra2 and LVD (Low-Voltage Differential)
Small Computer Systems Interface (SCSI), pronounced “scuzzy,” has been the dominant technology used to connect computers and high-speed peripherals since the 1980s. SCSI technology is constantly evolving to accommodate increased bandwidth needs. One of... | <urn:uuid:461eed9b-caae-42bf-80e7-fe9020f95ad8> | CC-MAIN-2017-09 | https://www.blackbox.com/en-pr/products/black-box-explains/black-box-explains-scsi-ultra2-and-lvd-(low-voltage-differential) | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00146-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906387 | 278 | 3.09375 | 3 |
If you can shop, make appointments or register your car via the Internet from the convenience of your home -- or from halfway around the world, for that matter -- why can't you get your education in the same manner?
These days, many students can.
Not only are continuing education and college students completing courses... | <urn:uuid:1687ed2b-89d4-4c42-9636-eec54720ed74> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/Education-Options.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00498-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.974603 | 756 | 2.859375 | 3 |
This client came to Gillware’s data recovery lab after an accidental reformat cut them off from their collection of family photos and documents. They had wanted to free up space on their drive, and thought they had their files backed up on their computer. Only once they’d continued to use the drive for a few hours afte... | <urn:uuid:a8e9be7e-5ead-4ad5-aa04-1db89d671677> | CC-MAIN-2017-09 | https://www.gillware.com/blog/data-recovery-case/hard-drive-reformat-modern-palimpsest/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00022-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941366 | 1,386 | 2.984375 | 3 |
802.16: A Look Under the Hood
By enabling quick and relatively inexpensive deployment of broadband services infrastructure, the IEEE 802.16 standards for wireless broadband access have the potential to finally address the long-standing “last mile” problem that has plagued the data and telecom carrier industries. In Par... | <urn:uuid:954a1e2e-1a18-442d-a7a8-c4a7eb3f8b68> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsp/article.php/3068551/80216-A-Look-Under-the-Hood.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00198-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937309 | 2,002 | 3.03125 | 3 |
Wednesday, Mayor Gavin Newsom announced the development of a first-of-its-kind solar mapping Web site. The Web site enables users to visualize the potential environmental benefits and monetary savings as a result of installing solar energy panels on their property.
The San Francisco Solar Map solution is a Web map port... | <urn:uuid:74973d51-3253-4f19-9d28-96eae2961657> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/San-Francisco-Unveils-Innovative-Solar-Mapping.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00374-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91979 | 407 | 2.828125 | 3 |
The world will be introduced to the new Internet Protocol (IP) language this summer as web giants such as Google, Microsoft Bing, Yahoo, Facebook and over 1,000 more sites around the world agreed to trial IPv6.
World IPv6 Day will take place on June 8th this year and all associated websites will enable the new Internet... | <urn:uuid:1a549fd3-c8cc-4601-9e40-deb9684cb0e3> | CC-MAIN-2017-09 | https://www.gradwell.com/2012/01/19/world-ipv6-launch-day-has-been-announced/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00494-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930703 | 303 | 2.546875 | 3 |
/ October 1, 2013
The Turanor PlanetSolar, which means “power of the sun” in J.R.R. Tolkien mythology, is the world’s largest solar-powered boat. The 102-foot catamaran recently docked in France for the winter after a trip around the world in May 2012. The boat traveled more than 37,282 miles in 584 days, with scientis... | <urn:uuid:7f5da3ad-d8a4-488e-ad4c-8e600a5938ed> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Sunshine-Power.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00018-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935621 | 119 | 2.953125 | 3 |
How To Use Web Search Engines
Page 4 -- How Search Engines Work
What follows is a basic explanation of how search engines work. For more detailed and technical information about current methods used by search engines like Google, check out our discussion of Search Engine Ranking Algorithms
Search engines use automated ... | <urn:uuid:7789a31d-ed8b-44c7-9a82-f63ab0348e38> | CC-MAIN-2017-09 | http://www.monash.com/spidap4.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00542-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93938 | 3,202 | 3.390625 | 3 |
How big is the Web? One way to look at is this: There are roughly 4,348 pages out there for each of the 6.9 billion people on the planet, or to put it another way 30 trillion pages. And there will be a lot more tomorrow. Given the immensity of the Web, it seems nothing short of magic that Google's search, imperfect as ... | <urn:uuid:002358fa-0120-4a18-8099-ac1a8e4b287d> | CC-MAIN-2017-09 | http://www.cio.com/article/2370648/internet/inside-info-on-how-google-searches-the-web.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00242-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960046 | 600 | 3.0625 | 3 |
In preparation of our CCNA exam, we want to make sure we cover the various concepts that we could see on our Cisco CCNA exam. So to assist you, below we will discuss UDP.
UDP: User Datagram Protocol
UDP is a connectionless transport layer (layer 4) protocol in OSI model, which provides a simple and unreliable message s... | <urn:uuid:dd8d2d93-a7a4-4078-9c68-cd9daf6e3cbb> | CC-MAIN-2017-09 | https://www.certificationkits.com/udp/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00418-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.864312 | 690 | 4.09375 | 4 |
About Policy-Based Routing
Policy-Based Routing – PBR gives you very simple way of controlling where packets will be forwarded before they enter in the destination-based routing process of the router.
It’s a technology that gives you more control over network traffic flow because you will not always want to send certai... | <urn:uuid:a638ef04-5f63-4bb5-8a2a-95f3a7df1bd1> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/route-map | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00238-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926763 | 141 | 3.046875 | 3 |
21st century skills have been a hot topic in the world of education, and there is an overwhelming amount of 21st century skill information on the web. However, it’s not easy for every education professional to absorb what it means to them and their district.
- The world is more connected, flatter, and moving faster.
Te... | <urn:uuid:57febea4-2146-4609-9926-eb5205679a96> | CC-MAIN-2017-09 | http://blogs.gartner.com/thomas_bittman/2009/01/30/21st-century-skills-for-dummies/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00414-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913405 | 653 | 3.078125 | 3 |
LONG BEACH, CALIF. -- There's a major supply chain issue in space.
It costs $10,000 per kilogram to blast something into orbit; a liter of water in space costs $10,000.
In fact, only 2% of what NASA sends into space on its rockets is actually used by astronauts for experiments. The rest of the weight is made up by the ... | <urn:uuid:ee3b4c4e-388e-440d-837a-9dfbb448d066> | CC-MAIN-2017-09 | http://www.itnews.com/article/2923841/3d-printing/how-astronauts-3d-printed-a-wrench-they-needed-in-space.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960531 | 707 | 3.390625 | 3 |
A couple of weeks ago I wrote about some of things that I found most frustrating about being a programmer, back when I was a programmer. One of those things was the size of indentation in code. Somewhere along the line, I was trained (or just started on my own; can’t recall) to set the tab key in my editor to four spac... | <urn:uuid:7cef4e68-4c09-43b4-a5f3-6050e018513c> | CC-MAIN-2017-09 | http://www.itworld.com/article/2713010/it-management/religion--politics-and-coding-indentation-style--the-three-great-debates.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00410-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952479 | 465 | 2.5625 | 3 |
Members of the BYU Supercomputing team recently posted a tutorial for getting started with SLURM, the scalable resource manager that has been designed for Linux clusters.
SLURM is currently the resource manager of choice for NUDT’s Tianhe-1A, the Anton Machine built by D.E. Shaw Research, and other clusters, including ... | <urn:uuid:6738cb24-ff82-4bd5-8bdd-86add501abbb> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/09/04/up_and_running_with_slurm/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00110-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952574 | 403 | 2.828125 | 3 |
Another concern of the power grid comes from the lack of security. Just recently it was revealed that the energy grid has become vulnerable to attack. Coming from the recent declassification of a 2007 report from the National Academy of Sciences, the lack of a physical security has experts worried. Although the United ... | <urn:uuid:f36704d3-0feb-4b9c-96f7-11e9c5ebffbc> | CC-MAIN-2017-09 | http://www.datacenterknowledge.com/archives/2013/01/16/us-power-grid-has-issues-with-reliability/2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00107-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942782 | 722 | 3.03125 | 3 |
The presence of a firewall, whether it’s hardware or software, provides a significant security boost for any computer user. This is especially true if you manage a business. Companies need to ensure that their systems are sufficiently protected in order to prevent the infiltration of viruses, bugs, or hacking. Firewall... | <urn:uuid:f1894bb1-0afc-4696-a3ec-263812e14057> | CC-MAIN-2017-09 | http://blog.terago.ca/2012/12/13/why-your-company-needs-a-firewall/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948347 | 512 | 2.5625 | 3 |
Millennials have a healthy skepticism toward information they view on Twitter, according ot a new Michigan State University report.
The National Science Foundation research, aimed at examining social media and false memory, showed 74 undergrads images on a computer showing a man stealing a car. The images were followed... | <urn:uuid:bda23aff-a76c-4781-ae40-26d1c3c5c38e> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2226914/data-center/study--don-t-believe-everything-you-read-on-twitter.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954749 | 230 | 2.9375 | 3 |
Twitter. Netflix. Spotify. If you are one of the hundreds of million users on these sites, you may have noticed a disruption in their services last Friday, October 21st. They, among many other high-traffic sites, were the targets of a massive DDoS cyber attack.
How were these sites attacked? Through a company called Dy... | <urn:uuid:48c5129d-ba02-4d62-bfdc-f43ce4f77888> | CC-MAIN-2017-09 | https://www.convergint.com/how-to-protect-your-iot-devices-from-malware/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960068 | 342 | 2.515625 | 3 |
Yan W.-D.,Wuhan University |
Yan W.-D.,Engineering and Environmental Geology Survey Institute of Qinghai Province |
Wang Y.-X.,Wuhan University |
Gao X.-Z.,Engineering and Environmental Geology Survey Institute of Qinghai Province |
And 4 more authors.
Northwestern Geology | Year: 2013
Gonghe Basin of Qinghai Province,... | <urn:uuid:5faa6eac-1110-474f-aaed-e9a188ba0fc3> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/engineering-and-environmental-geology-survey-institute-of-qinghai-province-2591527/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913382 | 351 | 2.65625 | 3 |
Ramirez-Villegas J.,International Center for Tropical Agriculture |
Ramirez-Villegas J.,CGIAR Research Program on Climate Change |
Ramirez-Villegas J.,University of Leeds |
Boote K.J.,Agronomy Dep. |
And 2 more authors.
Agricultural and Forest Meteorology | Year: 2016
Common bean production in Goiás, Brazil is concentr... | <urn:uuid:a187084b-d098-49f1-a442-5287ca8bb0fe> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/agronomy-dep-2028859/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00103-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919263 | 810 | 2.890625 | 3 |
Get a glimpse inside Paul Cooke's e-book "The definitive guide to Windows 2000 security" with this series of book excerpts, courtesy of Realtimepublishers.com. This excerpt is from Chapter 5, "Configuring access control." Click for the book excerpt series or get the full e-book.
By submitting your personal information,... | <urn:uuid:3a49812c-900d-47ef-93e0-86fe1294a851> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/1280096138/ACE-inheritance | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00631-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925281 | 611 | 2.578125 | 3 |
The Internet gives you access to the world. But it also gives the world access to you. The borderless, dynamic nature of the web makes it more likely that you’ll be a victim of a crime online than in your real life.
In real life, we take basic safety precautions. So why wouldn’t you do the same online. To get you start... | <urn:uuid:6ab00e92-2f87-4d42-9268-4fcf0c8c3439> | CC-MAIN-2017-09 | https://safeandsavvy.f-secure.com/2017/01/27/10-things-we-can-all-do-to-make-a-safer-internet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00507-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.902908 | 174 | 2.78125 | 3 |
At present, SQL Server 2008 continues to support two modes for validating connections and authenticating access to database resources: (Windows Authentication Mode) and (SQL Server and Windows Authentication Mode) also known as "Mixed Mode". Both of these authentication methods provide access to SQL Server 2008 and its... | <urn:uuid:fff113b6-fd60-49d1-a407-76ffc94dcfd6> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2350774/microsoft-subnet/which-sql-server-2008-authentication-mechanism-should-i-choose-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00275-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.876523 | 598 | 2.53125 | 3 |
Remember that road surface being tested in the Netherlands that acted as a giant solar panel converting solar energy into electricity? Well, guess what? It actually worked.
Six months into the test, the engineers say they've generated 3,000kwH of power from the 70-meter bike path test track. That's enough power to run ... | <urn:uuid:704d3cef-3629-4bfb-b969-63beda898e70> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2921244/data-center/solar-power-road-surface-actually-works.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00451-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959529 | 716 | 3.234375 | 3 |
Ideological Origins of the Open-Source Movement
“Coders of the world, unite! You have nothing to lose but your proprietary agreements.”
OK, so this wasn’t really the rallying cry of open-source community’s revolt against the idea of intellectual property. But it might as well have been, as the Copyleft ideal served as ... | <urn:uuid:1a6d2924-8041-4efd-a62f-810086d2489f> | CC-MAIN-2017-09 | http://certmag.com/copyleft-ideological-origins-of-the-open-source-movement/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00327-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969182 | 1,356 | 2.53125 | 3 |
New NASA program furthers space exploration
Less than a month after the Space Shuttle made its final landing, NASA announced that operations of the International Space Station as well as human exploration will be getting some extra focus.
The new program named the Human Exploration and Operations Mission Directorate wi... | <urn:uuid:ea30d384-ea21-4657-85b9-eb5e8d1e10a3> | CC-MAIN-2017-09 | https://fcw.com/articles/2011/08/15/agg-new-nasa-program-furthers-space-exploration.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00027-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919889 | 139 | 2.734375 | 3 |
MindJet has just announced the fourth generation of mind-mapping technology. Each generation has added new functionality and widen the scope of use; as a by-product each generation has included extra support for people with disabilities.
The first generation was pen on paper with linear notes being replaced by ovals wi... | <urn:uuid:8a45cb8f-459c-4d2f-ae58-9059b6047a7b> | CC-MAIN-2017-09 | http://www.bloorresearch.com/analysis/mindjet-connect-boosts-accessibility/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00199-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962565 | 734 | 2.546875 | 3 |
As microprocessors push up against the limits of miniaturization, many are reflecting on what the post-silicon era has in store. Recently Sandia National Laboratories published an article describing the steps it is taking to extend the pace of computational progress over the coming decades. Some of the forward-leaning ... | <urn:uuid:e15ad8c7-cdd0-4514-97cf-0406e829c346> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/05/28/sandia-launches-post-silicon-development-effort/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00319-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934173 | 1,000 | 3.125 | 3 |
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by malicious individuals so that when triggered, they try to disable or bypass the system’s security, or even destroy the entire chip on which they are l... | <urn:uuid:708497e8-6526-4322-9ffd-af54b9c9f429> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2011/11/10/new-techniques-for-detecting-hardware-trojans/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00371-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949206 | 504 | 3.09375 | 3 |
In a rare confluence of events, all three branches of the federal government are weighing changes that would affect when and how personal data is accessed.
The approaches are somewhat contradictory: Some moves would protect citizen privacy, while others could result in more access by government agencies to records kept... | <urn:uuid:53675846-a281-4738-9962-eb9f53d2dea4> | CC-MAIN-2017-09 | http://www.computerworld.com/article/3044497/data-privacy/privacy-issues-hit-all-branches-of-government-at-once.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00071-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959196 | 1,232 | 2.625 | 3 |
By Matt Champion
Recently, I attended the IoT Evolution Expo in Las Vegas. While I was there, I sat in on a panel called “The Farmer’s IoT Markets: From Drones to Prawns”, and what really struck home was how such an important industry like Agriculture can benefit from IoT technologies.
Agriculture is one of the largest... | <urn:uuid:1f839f39-9191-4a56-bbb4-abd56dbcf885> | CC-MAIN-2017-09 | http://www.jbrehm.com/blog/2016/8/10/what-iot-means-for-farmers | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958607 | 658 | 2.9375 | 3 |
1. Control Services and Daemons
Review how to manage services and the boot-up process using systemctl.
2. Manage IPv6 Networking
Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux
3. Configure Link Aggregation and Bridging
Configure and troubleshoot advanced network interface functionality,
in... | <urn:uuid:4cb2586e-9eff-4e4a-9d46-fa594352c065> | CC-MAIN-2017-09 | https://www.globalknowledge.com/ca-en/course/116202/red-hat-system-administration-iii-rh254/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.687335 | 386 | 2.578125 | 3 |
Korean engineers have broken a record by transmitting enough power wirelessly over a distance of about 16 feet to charge up to 40 smartphones at the same time.
The researchers, from the Korean Advanced Institute of Science and Technology (KAIST), created a "Dipole Coil Resonant System" (DCRS) made specifically for an e... | <urn:uuid:7d8c974b-8bc6-4c35-9e7d-79c5607045c6> | CC-MAIN-2017-09 | http://www.cio.com/article/2376848/mobile/it-s-now-possible-to-wirelessly-charge-40-smartphones-from-16-feet-away.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00191-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946463 | 1,276 | 3.265625 | 3 |
Programming for multicore systems can be complex, so an industry consortium led by Advanced Micro Devices has taken a step ahead in its goal to eliminate development challenges so applications are portable across devices, architectures and operating systems
The HSA (Heterogeneous System Architecture) Foundation on Tues... | <urn:uuid:94e919e6-3a93-49b3-992c-0b7b0d11a9af> | CC-MAIN-2017-09 | http://www.cio.com/article/2386313/data-center/consortium-takes-steps-to-break-multicore-programming-barriers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00067-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942426 | 901 | 2.625 | 3 |
Scientists in Germany and The Netherlands have determined that by using tungsten and silicon nitride as a storage medium, they can store data that will last from a million to a billion years. They propose using the medium to retain data on human physiology that could be seen long after the human race is extinct.
The ne... | <urn:uuid:82411b78-04bd-4757-a5f7-068c429fcc16> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2485999/data-center/researchers-create-indelible-record-on-mankind-for-aliens-to-someday-find.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00243-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9441 | 900 | 4.09375 | 4 |
Drones don’t normally need wheels, but they can come in handy on upside-down roads.
That’s just what the underside of a bridge is, and Fujitsu wants to use drones with large wheels to scoot along them while checking for cracks and other wear and tear.
At a technology expo in Tokyo on Tuesday, the electronics maker show... | <urn:uuid:bf8d42b0-6a0e-4587-b6b3-44942b7760e0> | CC-MAIN-2017-09 | http://www.itnews.com/article/2921455/fujitsu-drone-uses-wheels-to-roll-along-bridges-walls.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00539-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942934 | 419 | 2.9375 | 3 |
By: Tina Rose
Microsoft Underwater Data Center
“The sea is everything” -Jules Verne
Microsoft, believing that the sea holds the key to their future, has tested a self-contained data center that operates far below the surface of the ocean. The key to this study is the millions that it will save on the industry’s most ex... | <urn:uuid:0142a579-93da-4978-a737-6d2ec417701d> | CC-MAIN-2017-09 | http://nautilusdt.com/2016/02/01/microsoft-underwater-data-center-to-be-tested/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00587-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934735 | 562 | 3.109375 | 3 |
American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the disposal of old electronic devices.
Even those with established processes could unwittingly initiate a security leak if they rely on wiping or degaussing har... | <urn:uuid:f0c538ef-8731-4a0a-9c0d-6d6e53fb0a2e> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/12/10/inadequate-electronic-disposal-protocols-can-lead-to-security-leaks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00587-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917358 | 511 | 2.59375 | 3 |
Formatted copying allows the type, number, and order of columns in the data file to differ from the table. By specifying a list of columns and their types in the COPY statement, you instruct Ingres to perform a formatted copy. The COPY statement list specifies the order and type of columns in the data file. Ingres uses... | <urn:uuid:c98f30b4-25d4-4d6b-aaaf-3f03933e15f0> | CC-MAIN-2017-09 | http://docs.actian.com/Ing_QUELRef/06_QUEL-EQUELStatements.6.035.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00232-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.801306 | 624 | 3.25 | 3 |
Ford is enlisting top U.S. universities to make self-driving cars a reality, announcing Wednesday that it hopes researchers at the Massachusetts Institute of Technology can come up with advanced algorithms to help vehicles learn where pedestrians and other automobiles will be located.
"We're using data from the sensors... | <urn:uuid:18606dab-f45d-4e73-bbb5-742d89e75c9a> | CC-MAIN-2017-09 | http://www.cio.com/article/2379373/automotive/ford-enlists-mit--stanford-to-drive-automated-cars.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00232-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971606 | 508 | 2.9375 | 3 |
To support you in managing your network, establish security levels, and control system access, we’ve put this mini tutorial together for you. The network administrator tutorial has been designed to support you with your network security and network management needs. Let this tutorial be your one-stop resource centre wh... | <urn:uuid:e63ebe36-d7b1-40fc-b857-fabdaaaafb26> | CC-MAIN-2017-09 | http://www.computerweekly.com/guides/The-network-administrators-guide | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00232-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.902665 | 873 | 2.609375 | 3 |
The Netflix-backed Encrypted Media Extensions (EME) proposal, and recent revelations that requirements for DRM in HTML5 are confidential, have generated furor among advocates of the Open Web. Let's cut through the hyperbole.
Digital Rights Management (DRM) describes a class of technologies designed to prevent unauthori... | <urn:uuid:f4559398-debf-47a3-be86-3f91fcaf9ea9> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2358134/data-center/can-digital-rights-management-and-the-open-web-coexist-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00284-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940892 | 1,568 | 2.65625 | 3 |
For those of you following the D-Wave story, the designers of “the world’s first commercial quantum computer” have published a revealing blog entry detailing the company’s latest achievements.
When Canadian startup D-Wave announced back in 2007 that it had developed a prototype quantum computing machine suitable for ru... | <urn:uuid:61b3af79-a238-4842-bc46-b49389ad9726> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/01/23/d-wave-aims-beat-classical-computer/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00460-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958705 | 810 | 2.515625 | 3 |
If you use Wi-Fi on your laptop, there's an excellent chance you're using Atheros chipsets for your wireless networking. Atheros' silicon is in gear from Linksys, D-Link and Netgear to name but a few vendors. However, although Atheros has been popular, they haven't always been friendly to open-source and Linux develope... | <urn:uuid:f1670f4a-fa30-4e8f-a80b-d54c5288c7cd> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2479832/internet/atheros-wi-fi-goes-open-source--linux-friendly.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00636-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95354 | 351 | 2.640625 | 3 |
Install the GNU ARM toolchain under Linux
Embedded development tools for a popular processor
If you are interested in embedded systems development on a widely used microprocessor, the Advanced RISC Machines (ARM) core fits the bill. This article provides a starting point for understanding the software side of embedded ... | <urn:uuid:afb72008-3bd4-4054-840b-4053b5aba209> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/linux/library/l-arm-toolchain/index.html?ca=dgr-lnxw97ARM-Toolchain&S_TACT=105AGX59&S_CMP=grlnxw97 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00404-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.865105 | 2,959 | 3.34375 | 3 |
Offering convenience and ease of use that have revolutionized the way people use computers and networks, wireless networks have also complicated endpoint management and security. Wireless networks have earned a reputation for being difficult to monitor and administer, exposing organizations to a higher rate of infectio... | <urn:uuid:15a3a9a5-6253-4033-ae06-5510d6275d7e> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2005/04/25/wireless-security-starts-at-the-endpoint/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00280-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923772 | 810 | 2.515625 | 3 |
Fujitsu Works to Find New Ways to Cool Small Mobile Devices
An innovative, thin heat pipe that's less than 1 mm thick is being developed by Fujitsu to improve internal cooling in tomorrow's smartphones, tablets, laptops and other compact electronic devices.
The low profile heat pipe, which fits inside a device and wick... | <urn:uuid:80937afe-7323-410e-ae15-de9d77ec97b0> | CC-MAIN-2017-09 | http://www.eweek.com/blogs/first-read/fujitsu-works-to-find-new-ways-to-cool-small-mobile-devices.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00632-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947047 | 632 | 2.875 | 3 |
A Caterham F1 car at the Hungarian Grand Prix. How is Dell helping the team keep up with the competetion?
Time is of the essence for all businesses, particularly when milliseconds can mark success. In Formula 1, the pressure for saving time is not just confined to the race track. IT also plays a vital role in a team’s ... | <urn:uuid:d9ad1d86-eefa-4af2-a988-212f3ba132e1> | CC-MAIN-2017-09 | http://www.cbronline.com/news/enterprise-it/server/case-study-how-a-dell-supercomputer-is-helping-caterham-f1-team-maximise-performance | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00332-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960739 | 1,232 | 2.734375 | 3 |
Programming Function Keys
Questions derived from the 1Z0-141 – Oracle Forms: Build Internet Applications Oracle Self-Test Software Practice Test.
Objective: Programming Function Keys
SubObjective: Define key triggers and their uses
Item Number: 1Z0-126.96.36.199
Multiple Answer, Multiple Choice
For which purposes would... | <urn:uuid:4d67b8b2-9258-4d4c-a6cb-531e3efb7f3c> | CC-MAIN-2017-09 | http://certmag.com/programming-function-keys/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00628-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.784762 | 322 | 2.671875 | 3 |
Hamburg, the second largest city in Germany, has just unveiled its Green Network Plan, a compilation of strategies designed to eliminate the need for cars in the city in the next two decades.
Hamburg is made up of 40 percent green areas, gardens, parks and squares, and the new plan is designed to unite these areas in a... | <urn:uuid:e032bd07-4079-49bd-928e-7d33f08020f8> | CC-MAIN-2017-09 | http://www.govtech.com/health/Hamburg-Plans-Eliminate-Cars.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00028-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95675 | 340 | 2.890625 | 3 |
Technology Trends and its Impact on Higher Education
Instead of just one or two prominent technology trends, higher education has been transformed by the blending of the best of a number of technology trends. After more than 900 years of a traditional learning environment in which the teacher imparted knowledge to the ... | <urn:uuid:f1543616-a30b-432d-9cef-742f87b44289> | CC-MAIN-2017-09 | http://k12.cioreview.com/cioviewpoint/technology-trends-and-its-impact-on-higher-education-nid-23398-cid-143.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954176 | 1,223 | 2.890625 | 3 |
This resource is no longer available
Cisco Telepresence Zones
There are many zones in Cisco TelePresence products; so many, in fact, that there is a lot of confusion about the different zones and their uses. The concept of zones originally came from the H.332 RAS protocol; zones are utilized by gatekeepers to resolve p... | <urn:uuid:806f5919-72db-4f67-a497-283641656aef> | CC-MAIN-2017-09 | http://www.bitpipe.com/detail/RES/1363983866_172.html?asrc=RSS_BP_TERM | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938629 | 117 | 2.515625 | 3 |
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost anywhere—home, cafes, airports and hotels around the globe. But unfortunately, wireless connectivity has also brought convenience to hackers because it gives them the opportunity to capture all data we t... | <urn:uuid:d655c2a4-2b2c-4efb-bc55-db900057ea4c> | CC-MAIN-2017-09 | https://securingtomorrow.mcafee.com/consumer/identity-protection/wardriving/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924976 | 577 | 2.765625 | 3 |
Optical amplifiers are the device that can amplifie optical signal directly, without the need to first convert it to an electrical signal. They are a key enabling technology for optical communication networks. Together with wavelength-division multiplexing (WDM) technology, which allows the transmission of multiple cha... | <urn:uuid:f629368f-2ffc-4bad-84e2-0c51ec9dc15b> | CC-MAIN-2017-09 | http://www.fs.com/blog/optical-amplifiers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00624-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931524 | 851 | 4.03125 | 4 |
Networking 101: Understanding the Data Link Layer
What's more important than IP and routing? Well, Layer 2 is much more important when it's broken. Many people don't have the Spanning Tree Protocol (STP) (define) knowledge necessary to implement a layer 2 network that's resilient. A switch going down shouldn't prevent ... | <urn:uuid:c7a14300-861c-44fa-a3bd-50432a3c1a70> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsp/article.php/3577261/Networking-101-Understanding-the-Data-Link-Layer.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00148-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961821 | 1,326 | 3.546875 | 4 |
Downloaders and droppers are helper programs for various types of malware such as Trojans and rootkits. Usually they are implemented as scripts (VB, batch) or small applications.
They don’t carry any malicious activities by themselves, but just open a way for attack by downloading/decompressing and installing the core ... | <urn:uuid:6c49b151-c7c4-4e12-8a06-67950e118f77> | CC-MAIN-2017-09 | https://blog.malwarebytes.com/threats/trojan-dropper/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00148-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92183 | 685 | 2.53125 | 3 |
Cloud Computing Basic Cheat Sheet
Cloud computing models vary: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Manage your cloud computing service level via the surrounding management layer.
- Infrastructure as a Service (IaaS). The IaaS layer offers storage and compu... | <urn:uuid:6c3b3971-07c9-4179-9ee1-1930e9022386> | CC-MAIN-2017-09 | https://cloudtweaks.com/2010/06/cloud-computing-for-dummies-basic-cheat-sheet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00324-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906948 | 980 | 2.984375 | 3 |
Today’s post will cover Dynamic Memory in Hyper-V 2012/R2.
This is Part 1 of two parts: Understanding Dynamic Memory.
As you know Physical computers have a static amount of memory, which does not change until you shut down the computer and add additional physical (RAM). The experience with virtual machines is the same ... | <urn:uuid:200b6f1e-fff7-42a7-b725-3adef3e92d84> | CC-MAIN-2017-09 | https://charbelnemnom.com/2014/01/understanding-dynamic-memory-in-hyper-v-2012r2-part-1/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00024-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90972 | 610 | 3.296875 | 3 |
USB keys were famously used as part of the Stuxnet attack on the Iranian nuclear program and for good reason: it’s got a high rate of effectiveness, according to a researcher at Black Hat 2016.
Of 297 keys spread around the University of Illinois Urbana Champaign 45% were not only plugged into victims’ computers but th... | <urn:uuid:85da2056-a7eb-49a5-ae11-5f6eeeba4051> | CC-MAIN-2017-09 | http://www.csoonline.com/article/3104112/security/black-hat-how-to-make-and-deploy-malicious-usb-keys.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00376-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.987382 | 607 | 2.59375 | 3 |
In the last week of June, as wildfires raged in the dry forests of Colorado, journalists at The Denver Post covering the disaster received an invitation from Google: Display on your website a map we have created using data feeds from federal and state authorities, the American Red Cross and other sources. Readers will ... | <urn:uuid:4b0bd529-eb7c-4b33-b352-342a8e08178b> | CC-MAIN-2017-09 | http://data-informed.com/data-visualizations-on-display-wake-wildfires-power-outages/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00372-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945566 | 786 | 2.796875 | 3 |
Two web browsers developed by Chinese search giant Baidu have been insecurely transmitting sensitive data across the Internet, putting users' privacy at risk, according to a new study.
Baidu responded by releasing software fixes, but researchers say not all the issues have been resolved.
It focused on the Windows and A... | <urn:uuid:0b55588f-2b04-4b3f-b328-3a0f77defc2f> | CC-MAIN-2017-09 | http://www.computerworld.com/article/3037029/security/baidu-web-browsers-leaked-sensitive-information-researchers-say.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00372-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955225 | 517 | 2.703125 | 3 |
SANTA CLARA, Calif. - Human brains will someday extend into the cloud, futurist and computer pioneer Ray Kurzweil predicted at the DEMO conference here on Tuesday.
Moreover, he said, it will become possible to selectively erase pieces of our memories, while retaining some portions of them, to be able to learn new thing... | <urn:uuid:fba4b6fa-6c4a-432f-9976-fd3a10396f90> | CC-MAIN-2017-09 | http://www.cio.com/article/2391631/cloud-computing/kurzweil--brains-will-extend-to-the-cloud.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00016-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953377 | 1,164 | 2.921875 | 3 |
The sun emitted two solar flares today, including one that was the most intense the sun can unleash.
One flare peaked at 4:01 a.m. ET and the second, a more significant flare, peaked at 11:03 a.m. ET, causing a temporary radio blackout, according to the National Weather Service's Space Weather Prediction Center.
Despit... | <urn:uuid:f551aea8-115b-461f-827c-e97acaab75f3> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2171226/smb/sun-emits-super-intense-flare-today.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00420-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955276 | 476 | 3.609375 | 4 |
What are big data techniques and why do you need them?
The increase in data volumes threatens to overwhelm most government agencies, and big data techniques can help was the burden.
Big data is a new term but not a wholly new area of IT expertise. Many of the research-oriented agencies — such as NASA, the National Inst... | <urn:uuid:46d87a3e-e999-48a7-8115-ceecf2f6190d> | CC-MAIN-2017-09 | https://fcw.com/microsites/2012/snapshot-managing-big-data/01-big-data-techniques.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00188-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957949 | 1,791 | 3.28125 | 3 |
Wally Vahlstrom brings more than 40 years of electrical engineering experience to his position as the director of technical services for Emerson Network Power’s Electrical Reliability Services group, where he is responsible for failure investigation work, conformity assessment services, power system studies and reliabi... | <urn:uuid:760cce8f-5106-4c57-84d6-d14f1173e66a> | CC-MAIN-2017-09 | http://www.datacenterknowledge.com/archives/2012/09/21/new-nfpa-workplace-electrical-safety-provisions-require-changes-in-data-center-practices/?utm-source=feedburner | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00240-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913734 | 1,011 | 2.640625 | 3 |
This resource is no longer available
How Smartphones Can Help Disaster Relief Efforts
Smartphones have become an essential piece of technology in today’s organizations. These versatile devices not only enhance communication, collaboration, and productivity, they can also be key to getting help to the people who need it... | <urn:uuid:e48e8a59-582c-446d-91e4-73610a2f3f93> | CC-MAIN-2017-09 | http://www.bitpipe.com/detail/RES/1346437990_510.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00536-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910754 | 105 | 2.75 | 3 |
Tainted Tomato Cases Reach 552 read the headline of a June 20, 2008, MSNBC News Services story. The Associated Press reported on Aug. 29, 2007, Spinach Recalled Over Salmonella Fears. This was preceded on May 10, 2006, by another MSNBC News Services story with the headline, Toxic Pet Food Kills Dozens of Dogs.
Though s... | <urn:uuid:c219a64a-d199-462e-8047-4fed368633c9> | CC-MAIN-2017-09 | http://www.govtech.com/featured/Food-Safety-Principles-Before-and-After.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00464-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943931 | 3,288 | 2.578125 | 3 |
Los Alamos builds time machine to the way the Web was
- By Henry Kenyon
- Aug 08, 2011
The Internet is constantly shifting, with many websites changing their content and appearance almost daily. Such a protean environment poses a problem for archivists or anyone interested in seeing what a home page looked like at a sp... | <urn:uuid:f63a47fc-c86d-4493-91e6-62381e67c109> | CC-MAIN-2017-09 | https://gcn.com/articles/2011/08/08/memento-los-alamos-internet-time-machine.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00585-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929883 | 1,213 | 3.296875 | 3 |
This past spring, Google began feeding its natural language algorithm thousands of romance novels in an effort to humanize its “conversational tone.” The move did so much to fire the collective comic imagination that the ensuing hilarity muffled any serious commentary on its symbolic importance. The jokes, as they say,... | <urn:uuid:7bc0b6ca-5c6d-40cd-97e3-45349719d284> | CC-MAIN-2017-09 | http://www.digitalreasoning.com/buzz/will-reading-romance-novels-make-artificial-intelligence-more-human.2466048 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00285-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948544 | 478 | 2.546875 | 3 |
This story was originally published by Data-Smart City Solutions.
What could you do with access to the complete — and massive — collection of every public tweet ever tweeted? Earlier this year, Twitter posed this question to academic and research institutions across the globe, ultimately planning to reward some of the ... | <urn:uuid:c2f57076-36f6-43ab-bb28-f14b9e41da40> | CC-MAIN-2017-09 | http://www.govtech.com/internet/Can-Twitter-Help-Predict-Foodborne-Illnesses.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00637-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942359 | 700 | 2.78125 | 3 |
For anyone bearing the brunt of an Internet hoax that just won't die, there's little more to hope for in terms of potential relief than a story on Snopes.com stating unequivocally that the hoax is indeed a hoax. After all, Snopes is the gold standard when it comes to debunking nonsense.
Computer scientist Bjarne Strous... | <urn:uuid:1f25f7bc-1cb4-4b59-acb8-81981e1f5484> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2189385/data-center/snopes-com-debunks-old-c---hoax--but----.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00637-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969125 | 743 | 2.578125 | 3 |
Microsoft Internet Explorer comes with Java virtual machine and accompanying class packages. Multiple security vulnerabilities have been found in the Java environment. Some of these allow an attacker to deliver and run arbitrary code on the Internet Explorer or Outlook user’s system when a hostile web site or mail mess... | <urn:uuid:4091adc7-e589-4d40-ad87-e8802ac34ec7> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2002/11/11/vulnerabilities-in-microsofts-java-implementation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00281-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915752 | 1,082 | 3.296875 | 3 |
A Switzerland-based standards group wants to stop the madness of having a different charger for every laptop, and will publish a technical specification for universal laptop chargers early next year.
The specification from the International Electrotechnical Commission will cover "a wide range of notebook computers and ... | <urn:uuid:cb4e74f3-6fee-483b-af97-712343be1675> | CC-MAIN-2017-09 | http://www.cio.com/article/2380075/laptop-computers/one-power-cord-to-rule-them-all--standards-group-pushes-for-universal-laptop-charge.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00633-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943535 | 360 | 2.640625 | 3 |
DARPA Focuses On War Injuries In Brain ResearchDepartment of Defense research agency will foot half the bill for the White House’s new R&D initiative into the human brain.
14 Amazing DARPA Technologies On Tap (click image for larger view and for slideshow)
The Defense Advanced Research Projects Agency will be a key par... | <urn:uuid:fb6652eb-c2a7-4417-8f92-6f0f709261c2> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/darpa-focuses-on-war-injuries-in-brain-research/d/d-id/1109380?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00509-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933543 | 684 | 2.53125 | 3 |
“Anyone know what this is? Class? Anyone? Anyone? Anyone seen this before? The Laffer Curve. Anyone know what this says?”
“Bueller? Bueller? Bueller?”
While Ferris Bueller famously skipped economics (and many other classes) in his eponymous movie, many of us have endured similar torture in our science classes.
Undergra... | <urn:uuid:8e892b42-d2a6-4bc5-bcad-df5c40bc2fcc> | CC-MAIN-2017-09 | https://arstechnica.com/uncategorized/2008/11/asleep-at-the-desk-undergrad-education-gets-a-boost/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00509-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946197 | 647 | 2.859375 | 3 |
Uh oh. Did you notice what today is?
That’s right: Friday the 13th.
According to Wikipedia, the superstition surrounding this day comes simply from the fact that Fridays and the number thirteen are both independently considered unlucky, and so in conjunction they are like a Big Mac of ill fortune.
Maybe you believe in ... | <urn:uuid:2fa5001d-cfd7-4cc6-a566-434a55c250e3> | CC-MAIN-2017-09 | https://blog.keepersecurity.com/2013/12/14/avoiding-bad-luck-in-cyberspace/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00329-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941155 | 204 | 2.546875 | 3 |
State and local governments are climbing aboard the green bandwagon, although "green building" innovations such as energy-efficient light bulbs dominate the ride.
Emphasis on lighting is understandable given that light bulbs devour 22 percent of all electricity produced nationwide, according to the U.S. Department of E... | <urn:uuid:f20fb50a-7c26-46cc-9424-8bcf371f0e25> | CC-MAIN-2017-09 | http://www.govtech.com/policy-management/Fleet-Management-GIS-and-Telework-Power.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00449-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95943 | 3,056 | 2.640625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.