text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
For years, Apple fans have claimed that Macs are invulnerable to attack, while belittling Windows as being full of security holes. Now the tables are turned --- not only has a Trojan infected Macs and created a botnet, but several well-known researchers warn that Mac OS X is less secure than either Windows or Linux. In...
<urn:uuid:ef4a682a-d0e1-440c-b29e-f4453cd621b6>
CC-MAIN-2017-09
http://www.computerworld.com/article/2481597/cybercrime-hacking/researchers--macs-are-less-secure-than-windows-pcs.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00145-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95217
530
2.78125
3
In 2009, the Canadian Space Agency committed $110 million the development of advanced robotics and space exploration technologies. The funding was designed to be spread over three years -- and now, right on schedule, the CSA has unveiled the results of its efforts: a fleet of rovers that will one day explore the moon a...
<urn:uuid:060224d9-8e7a-4c19-826f-83ee82e2a7de>
CC-MAIN-2017-09
http://www.nextgov.com/emerging-tech/2012/10/curiositys-cousins-meet-rover-fleet-canadian-space-agency/58986/?oref=ng-relatedstories
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00321-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964007
354
2.84375
3
Many Small to Medium Enterprises (SMEs) across the UK and beyond are unaware that supercomputing can help them become more energy efficient. With major energy suppliers recently announcing yet more price hikes, companies across all industries are feeling the pinch. Three of the ‘big six’ British energy firms have incre...
<urn:uuid:67adc1cf-6b93-4e43-8c91-0af6c5812419>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/12/02/saving-energy-supercomputing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00021-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950984
1,449
2.5625
3
Graphene is a one-atom-thick layer of carbon that has been hailed as a potential silicon replacement capable of extending the exponential computing advances that modern society has come to depend on. Despite the material’s profile of being strong, flexible, light-weight and a good conductor, there are still a number of...
<urn:uuid:fe894d65-3fac-4478-9208-e23cdd2afb8d>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/05/05/graphene-faces-real-world-limitations/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00369-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956805
1,003
3.78125
4
Imagine you are building a house, and have a list of things you want to have in your house, but you can’t afford everything on your list because you are constrained by a budget. What you really want to work out is the combination of items which gives you the best value for your money. This is an example of a optimizati...
<urn:uuid:b56b2b25-9262-4d9c-91d6-d32b4161950c>
CC-MAIN-2017-09
https://www.dwavesys.com/quantum-computing/applications
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00069-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934504
1,444
3.40625
3
In a previous article dealing with online security prompted many readers with home PCs to ask for advice on how to stay safe and still get the most out of the “information highway”. The first and fundamental step is to install software on the computer that will protect you from any nasty surprises. This software should...
<urn:uuid:cdc1075e-677c-45e9-beea-0326d57ad1a7>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2002/10/15/security-online---some-basic-it-hygiene-tips/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00541-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937559
1,342
3.125
3
The Conficker Conundrum More than a year has passed since Conficker first appeared, yet it is still making the news. The patch for the vulnerability exploited by Conficker was published by Microsoft in October 2008. Yet more than one year later, Conficker continues to infect computers using many advanced malware techni...
<urn:uuid:5b6708c6-0474-4c72-b496-480d0e168de4>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsecur/conficker-conundrum
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00241-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951336
803
2.5625
3
So we have moved on from desktop PCs and have now entered a new era of computing via connected devices such as smartphones, tablets, and phablets, supported by the evolution of technology. In this tech-savvy era, consumers are very much technology-driven: we now have devices which monitor and respond to users based on ...
<urn:uuid:d7e946af-277f-4697-93d7-351be626369d>
CC-MAIN-2017-09
https://www.juniperresearch.com/analystxpress/november-2012/the-evolution-of-wearable-devices-are-they-the-fut
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00417-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967436
574
2.734375
3
Originally published May 15, 2012 Hadoop is one of the up-and-coming technologies for performing analysis on big data, but to date very few universities have included it in their undergraduate or graduate curriculums. In a February 2012 article from InfoWorld, those already using the technology issued the warning that ...
<urn:uuid:8b06c7a1-c3fa-4a9c-bcd5-c1707690c69c>
CC-MAIN-2017-09
http://www.b-eye-network.com/channels/1531/view/16067
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00361-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950764
1,767
3.078125
3
In the Earth's past there was powerful volcanic activity which could have easily spewed dirt and rocks containing microbes into outer space which not only could have eventually reached Mars but also ended up traveling in orbit through space that we now know as meteors, comets, and asteroids. A Newsweek article of Septe...
<urn:uuid:d6d8f097-6f9f-43a1-832e-263218d4b4e3>
CC-MAIN-2017-09
http://www.informationweek.com/government/leadership/10-years-on-mars-what-spirit-and-opportunity-discovered/d/d-id/1113555?piddl_msgid=198632
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00537-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951343
907
3.921875
4
A seemingly constant stream of data breaches and this week’s news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn’t it time we dumped the user name and password? A lot of the best technology of today exploits biometric factors such as retina patterns, fingerp...
<urn:uuid:395138c4-b6af-444c-b7bc-d2eb3cfefa04>
CC-MAIN-2017-09
http://www.networkworld.com/article/2463341/seven-ways-darpa-is-trying-to-kill-the-password.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946719
1,046
2.765625
3
The space agency reported that Curiosity is now running on its backup computer system, known as its B-side. It's been taken out of its minimal-activity safe mode and ready to return to full operation. "We are making good progress in the recovery," said Mars Science Laboratory Project Manager Richard Cook in a statement...
<urn:uuid:19eb46cd-e88b-4900-8a1d-4a7b85a16c2a>
CC-MAIN-2017-09
http://www.itworld.com/article/2713031/hardware/nasa-mars-rover-curiosity-on-road-to-recovery.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00409-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95271
603
2.625
3
“Getting Smarter and Smarter” – Why Digital Data is Key to Urbanisation by François Mero, Senior VP of Sales EMEA at Talend The phenomenon known as ‘urban transition’, which can be defined as the shift from rural to urban and from agricultural employment to industrial, commercial, or service employment, is now not just...
<urn:uuid:5168e72c-8628-4b27-80bb-bcc943b0ed45>
CC-MAIN-2017-09
https://data-economy.com/getting-smarter-smarter-digital-data-key-urbanisation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00282-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941715
1,034
2.65625
3
Stopping Forged Email 2: DKIM to the Rescue We have recently looked at how hackers and spammers can send forged email and then seen how these forged messages can be almost identical to legitimate messages from the purported senders. In fact, we learned that generally all you can trust in an inbound email message is the...
<urn:uuid:f755d531-f18b-4c52-9202-9ca04d1e541b>
CC-MAIN-2017-09
https://luxsci.com/blog/stopping-forged-email-2-dkim-rescue.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00158-ip-10-171-10-108.ec2.internal.warc.gz
en
0.92845
3,097
2.59375
3
OAK RIDGE, Tenn. – At first glance, the data hall within Oak Ridge National Laboratory resembles many raised floor environments. But a stroll past the dozens of storage cabinets reveals three of the world’s most powerful supercomputers, including a machine that looms as the once and future king of the supercomputing re...
<urn:uuid:914b18dd-fce2-45a9-831f-33f303644151>
CC-MAIN-2017-09
http://www.datacenterknowledge.com/archives/2012/09/10/oak-ridge-the-frontier-of-supercomputing/?utm-source=feedburner&utm-medium=feed&utm-campaign=Feed%3A+DataCenterKnowledge+(Data+Center+Knowledge)
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00102-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915599
938
2.734375
3
Not sure I am understanding the question. TCP does not stop anything, but it is polite and shakes hands to establish the connection. Before an HTTP client can get data, it needs to request it with a GET command. Then the server will send the data (and expect acks for data sent). Here is a packet capture. Look at the in...
<urn:uuid:eeea25e0-cb66-4eae-9d13-ee678fd2dae1>
CC-MAIN-2017-09
http://forum.internetworkexpert.com/forums/t/35200.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00330-ip-10-171-10-108.ec2.internal.warc.gz
en
0.907085
165
3
3
Southern California’s Mount Wilson is a lonesome, hostile peak — prone to sudden rock falls, sometimes ringed by wildfire — that nevertheless has attracted some of the greatest minds in modern science. George Ellery Hale, one of the godfathers of astrophysics, founded the Mount Wilson Observatory in 1904 and divined th...
<urn:uuid:2dfa6d1b-3311-44be-9aef-268126c1b16f>
CC-MAIN-2017-09
http://www.nextgov.com/emerging-tech/2013/02/how-nasa-scientists-are-turning-l-one-big-climate-change-lab/61582/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00330-ip-10-171-10-108.ec2.internal.warc.gz
en
0.895259
388
3.40625
3
Conservation research is not being done in the countries where it is most needed - a situation which is likely to undermine efforts to preserve global biodiversity. That's the conclusion of a new study publishing in the Open Access journal PLOS Biology on 29th March, led by Associate Professor Kerrie Wilson from The Un...
<urn:uuid:255a57d2-bd6f-4bd3-9a10-4ca9c38b456c>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/asl-1-1278838/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00506-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957794
4,590
3.125
3
Zero to ECDH (Elliptic-Curve Diffie-Hellman) in 30 Minutes This is a quick primer on the elliptic-curve Diffie-Hellman (ECDH) key-agreement scheme. It provides a simple illustration of how the properties of elliptic-curve cryptography (ECC) can be used to build a useful security scheme. A key agreement scheme is a proc...
<urn:uuid:f7f6face-73a0-464c-9822-116c1fadcd9c>
CC-MAIN-2017-09
https://www.entrust.com/resource/zero-ecdh-elliptic-curve-diffie-hellman-30-minutes/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00098-ip-10-171-10-108.ec2.internal.warc.gz
en
0.909982
242
2.96875
3
Math Comprehension Made Easy June 16, 2012 Want to dive into analytics as a data scientist? Get started with Stonehill College‘s “How to Read Mathematics.” The well-structured article by Shai Simonson and Fernando Gouvea details the reading protocol that will allow anyone to get the most out of reading mathematical exp...
<urn:uuid:2db1b3ad-6fff-4134-a7ca-36b0cc13cc44>
CC-MAIN-2017-09
http://arnoldit.com/wordpress/2012/06/16/math-comprehension-made-easy/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00274-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955154
308
3.359375
3
Analog. Digital. What’s the Difference? by Paul Wotel Analog phone lines. Analog signals. Digital security. Digital PBX. Analog-to-digital adapters. What does it all mean? In the telecom world, understanding analog versus digital isn't as simple as comparing one technology to another. It depends on what productand in s...
<urn:uuid:636974d0-393e-4d70-83f6-30c065573f9e>
CC-MAIN-2017-09
http://telecom.hellodirect.com/docs/Tutorials/AnalogVsDigital.1.051501-P.asp
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00502-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921744
1,842
2.78125
3
Memory management can be challenge enough on traditional data sets, but when big data enters the picture, things can slow way, way down. A new programming language announced by MIT this week aims to remedy that problem, and so far it's been found to deliver fourfold speed boosts on common algorithms. The principle of l...
<urn:uuid:a8fd36d2-6e96-47da-a633-325abc9fa7f7>
CC-MAIN-2017-09
http://www.networkworld.com/article/3120506/this-new-programming-language-promises-a-4x-speed-boost-on-big-data.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00622-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947457
559
3.390625
3
Black Box Explains...SCSI Ultra2 and LVD (Low-Voltage Differential) Small Computer Systems Interface (SCSI), pronounced “scuzzy,” has been the dominant technology used to connect computers and high-speed peripherals since the 1980s. SCSI technology is constantly evolving to accommodate increased bandwidth needs. One of...
<urn:uuid:461eed9b-caae-42bf-80e7-fe9020f95ad8>
CC-MAIN-2017-09
https://www.blackbox.com/en-pr/products/black-box-explains/black-box-explains-scsi-ultra2-and-lvd-(low-voltage-differential)
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00146-ip-10-171-10-108.ec2.internal.warc.gz
en
0.906387
278
3.09375
3
If you can shop, make appointments or register your car via the Internet from the convenience of your home -- or from halfway around the world, for that matter -- why can't you get your education in the same manner? These days, many students can. Not only are continuing education and college students completing courses...
<urn:uuid:1687ed2b-89d4-4c42-9636-eec54720ed74>
CC-MAIN-2017-09
http://www.govtech.com/e-government/Education-Options.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00498-ip-10-171-10-108.ec2.internal.warc.gz
en
0.974603
756
2.859375
3
This client came to Gillware’s data recovery lab after an accidental reformat cut them off from their collection of family photos and documents. They had wanted to free up space on their drive, and thought they had their files backed up on their computer. Only once they’d continued to use the drive for a few hours afte...
<urn:uuid:a8e9be7e-5ead-4ad5-aa04-1db89d671677>
CC-MAIN-2017-09
https://www.gillware.com/blog/data-recovery-case/hard-drive-reformat-modern-palimpsest/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00022-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941366
1,386
2.984375
3
802.16: A Look Under the Hood By enabling quick and relatively inexpensive deployment of broadband services infrastructure, the IEEE 802.16 standards for wireless broadband access have the potential to finally address the long-standing “last mile” problem that has plagued the data and telecom carrier industries. In Par...
<urn:uuid:954a1e2e-1a18-442d-a7a8-c4a7eb3f8b68>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsp/article.php/3068551/80216-A-Look-Under-the-Hood.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00198-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937309
2,002
3.03125
3
Wednesday, Mayor Gavin Newsom announced the development of a first-of-its-kind solar mapping Web site. The Web site enables users to visualize the potential environmental benefits and monetary savings as a result of installing solar energy panels on their property. The San Francisco Solar Map solution is a Web map port...
<urn:uuid:74973d51-3253-4f19-9d28-96eae2961657>
CC-MAIN-2017-09
http://www.govtech.com/e-government/San-Francisco-Unveils-Innovative-Solar-Mapping.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00374-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91979
407
2.828125
3
The world will be introduced to the new Internet Protocol (IP) language this summer as web giants such as Google, Microsoft Bing, Yahoo, Facebook and over 1,000 more sites around the world agreed to trial IPv6. World IPv6 Day will take place on June 8th this year and all associated websites will enable the new Internet...
<urn:uuid:1a549fd3-c8cc-4601-9e40-deb9684cb0e3>
CC-MAIN-2017-09
https://www.gradwell.com/2012/01/19/world-ipv6-launch-day-has-been-announced/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00494-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930703
303
2.546875
3
/ October 1, 2013 The Turanor PlanetSolar, which means “power of the sun” in J.R.R. Tolkien mythology, is the world’s largest solar-powered boat. The 102-foot catamaran recently docked in France for the winter after a trip around the world in May 2012. The boat traveled more than 37,282 miles in 584 days, with scientis...
<urn:uuid:7f5da3ad-d8a4-488e-ad4c-8e600a5938ed>
CC-MAIN-2017-09
http://www.govtech.com/photos/Photo-of-the-Week-Sunshine-Power.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00018-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935621
119
2.953125
3
How To Use Web Search Engines Page 4 -- How Search Engines Work What follows is a basic explanation of how search engines work. For more detailed and technical information about current methods used by search engines like Google, check out our discussion of Search Engine Ranking Algorithms Search engines use automated ...
<urn:uuid:7789a31d-ed8b-44c7-9a82-f63ab0348e38>
CC-MAIN-2017-09
http://www.monash.com/spidap4.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00542-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93938
3,202
3.390625
3
How big is the Web? One way to look at is this: There are roughly 4,348 pages out there for each of the 6.9 billion people on the planet, or to put it another way 30 trillion pages. And there will be a lot more tomorrow. Given the immensity of the Web, it seems nothing short of magic that Google's search, imperfect as ...
<urn:uuid:002358fa-0120-4a18-8099-ac1a8e4b287d>
CC-MAIN-2017-09
http://www.cio.com/article/2370648/internet/inside-info-on-how-google-searches-the-web.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00242-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960046
600
3.0625
3
In preparation of our CCNA exam, we want to make sure we cover the various concepts that we could see on our Cisco CCNA exam. So to assist you, below we will discuss UDP. UDP: User Datagram Protocol UDP is a connectionless transport layer (layer 4) protocol in OSI model, which provides a simple and unreliable message s...
<urn:uuid:dd8d2d93-a7a4-4078-9c68-cd9daf6e3cbb>
CC-MAIN-2017-09
https://www.certificationkits.com/udp/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00418-ip-10-171-10-108.ec2.internal.warc.gz
en
0.864312
690
4.09375
4
About Policy-Based Routing Policy-Based Routing – PBR gives you very simple way of controlling where packets will be forwarded before they enter in the destination-based routing process of the router. It’s a technology that gives you more control over network traffic flow because you will not always want to send certai...
<urn:uuid:a638ef04-5f63-4bb5-8a2a-95f3a7df1bd1>
CC-MAIN-2017-09
https://howdoesinternetwork.com/tag/route-map
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00238-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926763
141
3.046875
3
21st century skills have been a hot topic in the world of education, and there is an overwhelming amount of 21st century skill information on the web. However, it’s not easy for every education professional to absorb what it means to them and their district. - The world is more connected, flatter, and moving faster. Te...
<urn:uuid:57febea4-2146-4609-9926-eb5205679a96>
CC-MAIN-2017-09
http://blogs.gartner.com/thomas_bittman/2009/01/30/21st-century-skills-for-dummies/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00414-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913405
653
3.078125
3
LONG BEACH, CALIF. -- There's a major supply chain issue in space. It costs $10,000 per kilogram to blast something into orbit; a liter of water in space costs $10,000. In fact, only 2% of what NASA sends into space on its rockets is actually used by astronauts for experiments. The rest of the weight is made up by the ...
<urn:uuid:ee3b4c4e-388e-440d-837a-9dfbb448d066>
CC-MAIN-2017-09
http://www.itnews.com/article/2923841/3d-printing/how-astronauts-3d-printed-a-wrench-they-needed-in-space.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00534-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960531
707
3.390625
3
A couple of weeks ago I wrote about some of things that I found most frustrating about being a programmer, back when I was a programmer. One of those things was the size of indentation in code. Somewhere along the line, I was trained (or just started on my own; can’t recall) to set the tab key in my editor to four spac...
<urn:uuid:7cef4e68-4c09-43b4-a5f3-6050e018513c>
CC-MAIN-2017-09
http://www.itworld.com/article/2713010/it-management/religion--politics-and-coding-indentation-style--the-three-great-debates.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00410-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952479
465
2.5625
3
Members of the BYU Supercomputing team recently posted a tutorial for getting started with SLURM, the scalable resource manager that has been designed for Linux clusters. SLURM is currently the resource manager of choice for NUDT’s Tianhe-1A, the Anton Machine built by D.E. Shaw Research, and other clusters, including ...
<urn:uuid:6738cb24-ff82-4bd5-8bdd-86add501abbb>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/09/04/up_and_running_with_slurm/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00110-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952574
403
2.828125
3
Another concern of the power grid comes from the lack of security. Just recently it was revealed that the energy grid has become vulnerable to attack. Coming from the recent declassification of a 2007 report from the National Academy of Sciences, the lack of a physical security has experts worried. Although the United ...
<urn:uuid:f36704d3-0feb-4b9c-96f7-11e9c5ebffbc>
CC-MAIN-2017-09
http://www.datacenterknowledge.com/archives/2013/01/16/us-power-grid-has-issues-with-reliability/2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00107-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942782
722
3.03125
3
The presence of a firewall, whether it’s hardware or software, provides a significant security boost for any computer user. This is especially true if you manage a business. Companies need to ensure that their systems are sufficiently protected in order to prevent the infiltration of viruses, bugs, or hacking. Firewall...
<urn:uuid:f1894bb1-0afc-4696-a3ec-263812e14057>
CC-MAIN-2017-09
http://blog.terago.ca/2012/12/13/why-your-company-needs-a-firewall/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948347
512
2.5625
3
Millennials have a healthy skepticism toward information they view on Twitter, according ot a new Michigan State University report. The National Science Foundation research, aimed at examining social media and false memory, showed 74 undergrads images on a computer showing a man stealing a car. The images were followed...
<urn:uuid:bda23aff-a76c-4781-ae40-26d1c3c5c38e>
CC-MAIN-2017-09
http://www.networkworld.com/article/2226914/data-center/study--don-t-believe-everything-you-read-on-twitter.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954749
230
2.9375
3
Twitter. Netflix. Spotify. If you are one of the hundreds of million users on these sites, you may have noticed a disruption in their services last Friday, October 21st. They, among many other high-traffic sites, were the targets of a massive DDoS cyber attack. How were these sites attacked? Through a company called Dy...
<urn:uuid:48c5129d-ba02-4d62-bfdc-f43ce4f77888>
CC-MAIN-2017-09
https://www.convergint.com/how-to-protect-your-iot-devices-from-malware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960068
342
2.515625
3
Yan W.-D.,Wuhan University | Yan W.-D.,Engineering and Environmental Geology Survey Institute of Qinghai Province | Wang Y.-X.,Wuhan University | Gao X.-Z.,Engineering and Environmental Geology Survey Institute of Qinghai Province | And 4 more authors. Northwestern Geology | Year: 2013 Gonghe Basin of Qinghai Province,...
<urn:uuid:5faa6eac-1110-474f-aaed-e9a188ba0fc3>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/engineering-and-environmental-geology-survey-institute-of-qinghai-province-2591527/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00403-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913382
351
2.65625
3
Ramirez-Villegas J.,International Center for Tropical Agriculture | Ramirez-Villegas J.,CGIAR Research Program on Climate Change | Ramirez-Villegas J.,University of Leeds | Boote K.J.,Agronomy Dep. | And 2 more authors. Agricultural and Forest Meteorology | Year: 2016 Common bean production in Goiás, Brazil is concentr...
<urn:uuid:a187084b-d098-49f1-a442-5287ca8bb0fe>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/agronomy-dep-2028859/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00103-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919263
810
2.890625
3
Get a glimpse inside Paul Cooke's e-book "The definitive guide to Windows 2000 security" with this series of book excerpts, courtesy of Realtimepublishers.com. This excerpt is from Chapter 5, "Configuring access control." Click for the book excerpt series or get the full e-book. By submitting your personal information,...
<urn:uuid:3a49812c-900d-47ef-93e0-86fe1294a851>
CC-MAIN-2017-09
http://www.computerweekly.com/news/1280096138/ACE-inheritance
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00631-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925281
611
2.578125
3
The Internet gives you access to the world. But it also gives the world access to you. The borderless, dynamic nature of the web makes it more likely that you’ll be a victim of a crime online than in your real life. In real life, we take basic safety precautions. So why wouldn’t you do the same online. To get you start...
<urn:uuid:6ab00e92-2f87-4d42-9268-4fcf0c8c3439>
CC-MAIN-2017-09
https://safeandsavvy.f-secure.com/2017/01/27/10-things-we-can-all-do-to-make-a-safer-internet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00507-ip-10-171-10-108.ec2.internal.warc.gz
en
0.902908
174
2.78125
3
At present, SQL Server 2008 continues to support two modes for validating connections and authenticating access to database resources: (Windows Authentication Mode) and (SQL Server and Windows Authentication Mode) also known as "Mixed Mode". Both of these authentication methods provide access to SQL Server 2008 and its...
<urn:uuid:fff113b6-fd60-49d1-a407-76ffc94dcfd6>
CC-MAIN-2017-09
http://www.networkworld.com/article/2350774/microsoft-subnet/which-sql-server-2008-authentication-mechanism-should-i-choose-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00275-ip-10-171-10-108.ec2.internal.warc.gz
en
0.876523
598
2.53125
3
Remember that road surface being tested in the Netherlands that acted as a giant solar panel converting solar energy into electricity? Well, guess what? It actually worked. Six months into the test, the engineers say they've generated 3,000kwH of power from the 70-meter bike path test track. That's enough power to run ...
<urn:uuid:704d3cef-3629-4bfb-b969-63beda898e70>
CC-MAIN-2017-09
http://www.networkworld.com/article/2921244/data-center/solar-power-road-surface-actually-works.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00451-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959529
716
3.234375
3
Ideological Origins of the Open-Source Movement “Coders of the world, unite! You have nothing to lose but your proprietary agreements.” OK, so this wasn’t really the rallying cry of open-source community’s revolt against the idea of intellectual property. But it might as well have been, as the Copyleft ideal served as ...
<urn:uuid:1a6d2924-8041-4efd-a62f-810086d2489f>
CC-MAIN-2017-09
http://certmag.com/copyleft-ideological-origins-of-the-open-source-movement/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00327-ip-10-171-10-108.ec2.internal.warc.gz
en
0.969182
1,356
2.53125
3
New NASA program furthers space exploration Less than a month after the Space Shuttle made its final landing, NASA announced that operations of the International Space Station as well as human exploration will be getting some extra focus. The new program named the Human Exploration and Operations Mission Directorate wi...
<urn:uuid:ea30d384-ea21-4657-85b9-eb5e8d1e10a3>
CC-MAIN-2017-09
https://fcw.com/articles/2011/08/15/agg-new-nasa-program-furthers-space-exploration.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00027-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919889
139
2.734375
3
MindJet has just announced the fourth generation of mind-mapping technology. Each generation has added new functionality and widen the scope of use; as a by-product each generation has included extra support for people with disabilities. The first generation was pen on paper with linear notes being replaced by ovals wi...
<urn:uuid:8a45cb8f-459c-4d2f-ae58-9059b6047a7b>
CC-MAIN-2017-09
http://www.bloorresearch.com/analysis/mindjet-connect-boosts-accessibility/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00199-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962565
734
2.546875
3
As microprocessors push up against the limits of miniaturization, many are reflecting on what the post-silicon era has in store. Recently Sandia National Laboratories published an article describing the steps it is taking to extend the pace of computational progress over the coming decades. Some of the forward-leaning ...
<urn:uuid:e15ad8c7-cdd0-4514-97cf-0406e829c346>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/05/28/sandia-launches-post-silicon-development-effort/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00319-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934173
1,000
3.125
3
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by malicious individuals so that when triggered, they try to disable or bypass the system’s security, or even destroy the entire chip on which they are l...
<urn:uuid:708497e8-6526-4322-9ffd-af54b9c9f429>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2011/11/10/new-techniques-for-detecting-hardware-trojans/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00371-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949206
504
3.09375
3
In a rare confluence of events, all three branches of the federal government are weighing changes that would affect when and how personal data is accessed. The approaches are somewhat contradictory: Some moves would protect citizen privacy, while others could result in more access by government agencies to records kept...
<urn:uuid:53675846-a281-4738-9962-eb9f53d2dea4>
CC-MAIN-2017-09
http://www.computerworld.com/article/3044497/data-privacy/privacy-issues-hit-all-branches-of-government-at-once.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00071-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959196
1,232
2.625
3
By Matt Champion Recently, I attended the IoT Evolution Expo in Las Vegas. While I was there, I sat in on a panel called “The Farmer’s IoT Markets: From Drones to Prawns”, and what really struck home was how such an important industry like Agriculture can benefit from IoT technologies. Agriculture is one of the largest...
<urn:uuid:1f839f39-9191-4a56-bbb4-abd56dbcf885>
CC-MAIN-2017-09
http://www.jbrehm.com/blog/2016/8/10/what-iot-means-for-farmers
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958607
658
2.9375
3
1. Control Services and Daemons Review how to manage services and the boot-up process using systemctl. 2. Manage IPv6 Networking Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux 3. Configure Link Aggregation and Bridging Configure and troubleshoot advanced network interface functionality, in...
<urn:uuid:4cb2586e-9eff-4e4a-9d46-fa594352c065>
CC-MAIN-2017-09
https://www.globalknowledge.com/ca-en/course/116202/red-hat-system-administration-iii-rh254/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz
en
0.687335
386
2.578125
3
Korean engineers have broken a record by transmitting enough power wirelessly over a distance of about 16 feet to charge up to 40 smartphones at the same time. The researchers, from the Korean Advanced Institute of Science and Technology (KAIST), created a "Dipole Coil Resonant System" (DCRS) made specifically for an e...
<urn:uuid:7d8c974b-8bc6-4c35-9e7d-79c5607045c6>
CC-MAIN-2017-09
http://www.cio.com/article/2376848/mobile/it-s-now-possible-to-wirelessly-charge-40-smartphones-from-16-feet-away.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00191-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946463
1,276
3.265625
3
Programming for multicore systems can be complex, so an industry consortium led by Advanced Micro Devices has taken a step ahead in its goal to eliminate development challenges so applications are portable across devices, architectures and operating systems The HSA (Heterogeneous System Architecture) Foundation on Tues...
<urn:uuid:94e919e6-3a93-49b3-992c-0b7b0d11a9af>
CC-MAIN-2017-09
http://www.cio.com/article/2386313/data-center/consortium-takes-steps-to-break-multicore-programming-barriers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00067-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942426
901
2.625
3
Scientists in Germany and The Netherlands have determined that by using tungsten and silicon nitride as a storage medium, they can store data that will last from a million to a billion years. They propose using the medium to retain data on human physiology that could be seen long after the human race is extinct. The ne...
<urn:uuid:82411b78-04bd-4757-a5f7-068c429fcc16>
CC-MAIN-2017-09
http://www.computerworld.com/article/2485999/data-center/researchers-create-indelible-record-on-mankind-for-aliens-to-someday-find.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00243-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9441
900
4.09375
4
Drones don’t normally need wheels, but they can come in handy on upside-down roads. That’s just what the underside of a bridge is, and Fujitsu wants to use drones with large wheels to scoot along them while checking for cracks and other wear and tear. At a technology expo in Tokyo on Tuesday, the electronics maker show...
<urn:uuid:bf8d42b0-6a0e-4587-b6b3-44942b7760e0>
CC-MAIN-2017-09
http://www.itnews.com/article/2921455/fujitsu-drone-uses-wheels-to-roll-along-bridges-walls.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00539-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942934
419
2.9375
3
By: Tina Rose Microsoft Underwater Data Center “The sea is everything” -Jules Verne Microsoft, believing that the sea holds the key to their future, has tested a self-contained data center that operates far below the surface of the ocean. The key to this study is the millions that it will save on the industry’s most ex...
<urn:uuid:0142a579-93da-4978-a737-6d2ec417701d>
CC-MAIN-2017-09
http://nautilusdt.com/2016/02/01/microsoft-underwater-data-center-to-be-tested/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00587-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934735
562
3.109375
3
American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the disposal of old electronic devices. Even those with established processes could unwittingly initiate a security leak if they rely on wiping or degaussing har...
<urn:uuid:f0c538ef-8731-4a0a-9c0d-6d6e53fb0a2e>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/12/10/inadequate-electronic-disposal-protocols-can-lead-to-security-leaks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00587-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917358
511
2.59375
3
Formatted copying allows the type, number, and order of columns in the data file to differ from the table. By specifying a list of columns and their types in the COPY statement, you instruct Ingres to perform a formatted copy. The COPY statement list specifies the order and type of columns in the data file. Ingres uses...
<urn:uuid:c98f30b4-25d4-4d6b-aaaf-3f03933e15f0>
CC-MAIN-2017-09
http://docs.actian.com/Ing_QUELRef/06_QUEL-EQUELStatements.6.035.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00232-ip-10-171-10-108.ec2.internal.warc.gz
en
0.801306
624
3.25
3
Ford is enlisting top U.S. universities to make self-driving cars a reality, announcing Wednesday that it hopes researchers at the Massachusetts Institute of Technology can come up with advanced algorithms to help vehicles learn where pedestrians and other automobiles will be located. "We're using data from the sensors...
<urn:uuid:18606dab-f45d-4e73-bbb5-742d89e75c9a>
CC-MAIN-2017-09
http://www.cio.com/article/2379373/automotive/ford-enlists-mit--stanford-to-drive-automated-cars.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00232-ip-10-171-10-108.ec2.internal.warc.gz
en
0.971606
508
2.9375
3
To support you in managing your network, establish security levels, and control system access, we’ve put this mini tutorial together for you. The network administrator tutorial has been designed to support you with your network security and network management needs. Let this tutorial be your one-stop resource centre wh...
<urn:uuid:e63ebe36-d7b1-40fc-b857-fabdaaaafb26>
CC-MAIN-2017-09
http://www.computerweekly.com/guides/The-network-administrators-guide
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00232-ip-10-171-10-108.ec2.internal.warc.gz
en
0.902665
873
2.609375
3
The Netflix-backed Encrypted Media Extensions (EME) proposal, and recent revelations that requirements for DRM in HTML5 are confidential, have generated furor among advocates of the Open Web. Let's cut through the hyperbole. Digital Rights Management (DRM) describes a class of technologies designed to prevent unauthori...
<urn:uuid:f4559398-debf-47a3-be86-3f91fcaf9ea9>
CC-MAIN-2017-09
http://www.networkworld.com/article/2358134/data-center/can-digital-rights-management-and-the-open-web-coexist-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00284-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940892
1,568
2.65625
3
For those of you following the D-Wave story, the designers of “the world’s first commercial quantum computer” have published a revealing blog entry detailing the company’s latest achievements. When Canadian startup D-Wave announced back in 2007 that it had developed a prototype quantum computing machine suitable for ru...
<urn:uuid:61b3af79-a238-4842-bc46-b49389ad9726>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/01/23/d-wave-aims-beat-classical-computer/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00460-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958705
810
2.515625
3
If you use Wi-Fi on your laptop, there's an excellent chance you're using Atheros chipsets for your wireless networking. Atheros' silicon is in gear from Linksys, D-Link and Netgear to name but a few vendors. However, although Atheros has been popular, they haven't always been friendly to open-source and Linux develope...
<urn:uuid:f1670f4a-fa30-4e8f-a80b-d54c5288c7cd>
CC-MAIN-2017-09
http://www.computerworld.com/article/2479832/internet/atheros-wi-fi-goes-open-source--linux-friendly.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00636-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95354
351
2.640625
3
Install the GNU ARM toolchain under Linux Embedded development tools for a popular processor If you are interested in embedded systems development on a widely used microprocessor, the Advanced RISC Machines (ARM) core fits the bill. This article provides a starting point for understanding the software side of embedded ...
<urn:uuid:afb72008-3bd4-4054-840b-4053b5aba209>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/linux/library/l-arm-toolchain/index.html?ca=dgr-lnxw97ARM-Toolchain&S_TACT=105AGX59&S_CMP=grlnxw97
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00404-ip-10-171-10-108.ec2.internal.warc.gz
en
0.865105
2,959
3.34375
3
Offering convenience and ease of use that have revolutionized the way people use computers and networks, wireless networks have also complicated endpoint management and security. Wireless networks have earned a reputation for being difficult to monitor and administer, exposing organizations to a higher rate of infectio...
<urn:uuid:15a3a9a5-6253-4033-ae06-5510d6275d7e>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2005/04/25/wireless-security-starts-at-the-endpoint/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00280-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923772
810
2.515625
3
Fujitsu Works to Find New Ways to Cool Small Mobile Devices An innovative, thin heat pipe that's less than 1 mm thick is being developed by Fujitsu to improve internal cooling in tomorrow's smartphones, tablets, laptops and other compact electronic devices. The low profile heat pipe, which fits inside a device and wick...
<urn:uuid:80937afe-7323-410e-ae15-de9d77ec97b0>
CC-MAIN-2017-09
http://www.eweek.com/blogs/first-read/fujitsu-works-to-find-new-ways-to-cool-small-mobile-devices.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00632-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947047
632
2.875
3
A Caterham F1 car at the Hungarian Grand Prix. How is Dell helping the team keep up with the competetion? Time is of the essence for all businesses, particularly when milliseconds can mark success. In Formula 1, the pressure for saving time is not just confined to the race track. IT also plays a vital role in a team’s ...
<urn:uuid:d9ad1d86-eefa-4af2-a988-212f3ba132e1>
CC-MAIN-2017-09
http://www.cbronline.com/news/enterprise-it/server/case-study-how-a-dell-supercomputer-is-helping-caterham-f1-team-maximise-performance
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00332-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960739
1,232
2.734375
3
Programming Function Keys Questions derived from the 1Z0-141 – Oracle Forms: Build Internet Applications Oracle Self-Test Software Practice Test. Objective: Programming Function Keys SubObjective: Define key triggers and their uses Item Number: 1Z0-126.96.36.199 Multiple Answer, Multiple Choice For which purposes would...
<urn:uuid:4d67b8b2-9258-4d4c-a6cb-531e3efb7f3c>
CC-MAIN-2017-09
http://certmag.com/programming-function-keys/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00628-ip-10-171-10-108.ec2.internal.warc.gz
en
0.784762
322
2.671875
3
Hamburg, the second largest city in Germany, has just unveiled its Green Network Plan, a compilation of strategies designed to eliminate the need for cars in the city in the next two decades. Hamburg is made up of 40 percent green areas, gardens, parks and squares, and the new plan is designed to unite these areas in a...
<urn:uuid:e032bd07-4079-49bd-928e-7d33f08020f8>
CC-MAIN-2017-09
http://www.govtech.com/health/Hamburg-Plans-Eliminate-Cars.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00028-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95675
340
2.890625
3
Technology Trends and its Impact on Higher Education Instead of just one or two prominent technology trends, higher education has been transformed by the blending of the best of a number of technology trends. After more than 900 years of a traditional learning environment in which the teacher imparted knowledge to the ...
<urn:uuid:f1543616-a30b-432d-9cef-742f87b44289>
CC-MAIN-2017-09
http://k12.cioreview.com/cioviewpoint/technology-trends-and-its-impact-on-higher-education-nid-23398-cid-143.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954176
1,223
2.890625
3
This resource is no longer available Cisco Telepresence Zones There are many zones in Cisco TelePresence products; so many, in fact, that there is a lot of confusion about the different zones and their uses. The concept of zones originally came from the H.332 RAS protocol; zones are utilized by gatekeepers to resolve p...
<urn:uuid:806f5919-72db-4f67-a497-283641656aef>
CC-MAIN-2017-09
http://www.bitpipe.com/detail/RES/1363983866_172.html?asrc=RSS_BP_TERM
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938629
117
2.515625
3
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost anywhere—home, cafes, airports and hotels around the globe. But unfortunately, wireless connectivity has also brought convenience to hackers because it gives them the opportunity to capture all data we t...
<urn:uuid:d655c2a4-2b2c-4efb-bc55-db900057ea4c>
CC-MAIN-2017-09
https://securingtomorrow.mcafee.com/consumer/identity-protection/wardriving/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00448-ip-10-171-10-108.ec2.internal.warc.gz
en
0.924976
577
2.765625
3
Optical amplifiers are the device that can amplifie optical signal directly, without the need to first convert it to an electrical signal. They are a key enabling technology for optical communication networks. Together with wavelength-division multiplexing (WDM) technology, which allows the transmission of multiple cha...
<urn:uuid:f629368f-2ffc-4bad-84e2-0c51ec9dc15b>
CC-MAIN-2017-09
http://www.fs.com/blog/optical-amplifiers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00624-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931524
851
4.03125
4
Networking 101: Understanding the Data Link Layer What's more important than IP and routing? Well, Layer 2 is much more important when it's broken. Many people don't have the Spanning Tree Protocol (STP) (define) knowledge necessary to implement a layer 2 network that's resilient. A switch going down shouldn't prevent ...
<urn:uuid:c7a14300-861c-44fa-a3bd-50432a3c1a70>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsp/article.php/3577261/Networking-101-Understanding-the-Data-Link-Layer.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00148-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961821
1,326
3.546875
4
Downloaders and droppers are helper programs for various types of malware such as Trojans and rootkits. Usually they are implemented as scripts (VB, batch) or small applications. They don’t carry any malicious activities by themselves, but just open a way for attack by downloading/decompressing and installing the core ...
<urn:uuid:6c49b151-c7c4-4e12-8a06-67950e118f77>
CC-MAIN-2017-09
https://blog.malwarebytes.com/threats/trojan-dropper/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00148-ip-10-171-10-108.ec2.internal.warc.gz
en
0.92183
685
2.53125
3
Cloud Computing Basic Cheat Sheet Cloud computing models vary: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Manage your cloud computing service level via the surrounding management layer. - Infrastructure as a Service (IaaS). The IaaS layer offers storage and compu...
<urn:uuid:6c3b3971-07c9-4179-9ee1-1930e9022386>
CC-MAIN-2017-09
https://cloudtweaks.com/2010/06/cloud-computing-for-dummies-basic-cheat-sheet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00324-ip-10-171-10-108.ec2.internal.warc.gz
en
0.906948
980
2.984375
3
Today’s post will cover Dynamic Memory in Hyper-V 2012/R2. This is Part 1 of two parts: Understanding Dynamic Memory. As you know Physical computers have a static amount of memory, which does not change until you shut down the computer and add additional physical (RAM). The experience with virtual machines is the same ...
<urn:uuid:200b6f1e-fff7-42a7-b725-3adef3e92d84>
CC-MAIN-2017-09
https://charbelnemnom.com/2014/01/understanding-dynamic-memory-in-hyper-v-2012r2-part-1/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00024-ip-10-171-10-108.ec2.internal.warc.gz
en
0.90972
610
3.296875
3
USB keys were famously used as part of the Stuxnet attack on the Iranian nuclear program and for good reason: it’s got a high rate of effectiveness, according to a researcher at Black Hat 2016. Of 297 keys spread around the University of Illinois Urbana Champaign 45% were not only plugged into victims’ computers but th...
<urn:uuid:85da2056-a7eb-49a5-ae11-5f6eeeba4051>
CC-MAIN-2017-09
http://www.csoonline.com/article/3104112/security/black-hat-how-to-make-and-deploy-malicious-usb-keys.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00376-ip-10-171-10-108.ec2.internal.warc.gz
en
0.987382
607
2.59375
3
In the last week of June, as wildfires raged in the dry forests of Colorado, journalists at The Denver Post covering the disaster received an invitation from Google: Display on your website a map we have created using data feeds from federal and state authorities, the American Red Cross and other sources. Readers will ...
<urn:uuid:4b0bd529-eb7c-4b33-b352-342a8e08178b>
CC-MAIN-2017-09
http://data-informed.com/data-visualizations-on-display-wake-wildfires-power-outages/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00372-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945566
786
2.796875
3
Two web browsers developed by Chinese search giant Baidu have been insecurely transmitting sensitive data across the Internet, putting users' privacy at risk, according to a new study. Baidu responded by releasing software fixes, but researchers say not all the issues have been resolved. It focused on the Windows and A...
<urn:uuid:0b55588f-2b04-4b3f-b328-3a0f77defc2f>
CC-MAIN-2017-09
http://www.computerworld.com/article/3037029/security/baidu-web-browsers-leaked-sensitive-information-researchers-say.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00372-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955225
517
2.703125
3
SANTA CLARA, Calif. - Human brains will someday extend into the cloud, futurist and computer pioneer Ray Kurzweil predicted at the DEMO conference here on Tuesday. Moreover, he said, it will become possible to selectively erase pieces of our memories, while retaining some portions of them, to be able to learn new thing...
<urn:uuid:fba4b6fa-6c4a-432f-9976-fd3a10396f90>
CC-MAIN-2017-09
http://www.cio.com/article/2391631/cloud-computing/kurzweil--brains-will-extend-to-the-cloud.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00016-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953377
1,164
2.921875
3
The sun emitted two solar flares today, including one that was the most intense the sun can unleash. One flare peaked at 4:01 a.m. ET and the second, a more significant flare, peaked at 11:03 a.m. ET, causing a temporary radio blackout, according to the National Weather Service's Space Weather Prediction Center. Despit...
<urn:uuid:f551aea8-115b-461f-827c-e97acaab75f3>
CC-MAIN-2017-09
http://www.networkworld.com/article/2171226/smb/sun-emits-super-intense-flare-today.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00420-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955276
476
3.609375
4
What are big data techniques and why do you need them? The increase in data volumes threatens to overwhelm most government agencies, and big data techniques can help was the burden. Big data is a new term but not a wholly new area of IT expertise. Many of the research-oriented agencies — such as NASA, the National Inst...
<urn:uuid:46d87a3e-e999-48a7-8115-ceecf2f6190d>
CC-MAIN-2017-09
https://fcw.com/microsites/2012/snapshot-managing-big-data/01-big-data-techniques.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00188-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957949
1,791
3.28125
3
Wally Vahlstrom brings more than 40 years of electrical engineering experience to his position as the director of technical services for Emerson Network Power’s Electrical Reliability Services group, where he is responsible for failure investigation work, conformity assessment services, power system studies and reliabi...
<urn:uuid:760cce8f-5106-4c57-84d6-d14f1173e66a>
CC-MAIN-2017-09
http://www.datacenterknowledge.com/archives/2012/09/21/new-nfpa-workplace-electrical-safety-provisions-require-changes-in-data-center-practices/?utm-source=feedburner
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00240-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913734
1,011
2.640625
3
This resource is no longer available How Smartphones Can Help Disaster Relief Efforts Smartphones have become an essential piece of technology in today’s organizations. These versatile devices not only enhance communication, collaboration, and productivity, they can also be key to getting help to the people who need it...
<urn:uuid:e48e8a59-582c-446d-91e4-73610a2f3f93>
CC-MAIN-2017-09
http://www.bitpipe.com/detail/RES/1346437990_510.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00536-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910754
105
2.75
3
Tainted Tomato Cases Reach 552 read the headline of a June 20, 2008, MSNBC News Services story. The Associated Press reported on Aug. 29, 2007, Spinach Recalled Over Salmonella Fears. This was preceded on May 10, 2006, by another MSNBC News Services story with the headline, Toxic Pet Food Kills Dozens of Dogs. Though s...
<urn:uuid:c219a64a-d199-462e-8047-4fed368633c9>
CC-MAIN-2017-09
http://www.govtech.com/featured/Food-Safety-Principles-Before-and-After.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00464-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943931
3,288
2.578125
3
Los Alamos builds time machine to the way the Web was - By Henry Kenyon - Aug 08, 2011 The Internet is constantly shifting, with many websites changing their content and appearance almost daily. Such a protean environment poses a problem for archivists or anyone interested in seeing what a home page looked like at a sp...
<urn:uuid:f63a47fc-c86d-4493-91e6-62381e67c109>
CC-MAIN-2017-09
https://gcn.com/articles/2011/08/08/memento-los-alamos-internet-time-machine.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00585-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929883
1,213
3.296875
3
This past spring, Google began feeding its natural language algorithm thousands of romance novels in an effort to humanize its “conversational tone.” The move did so much to fire the collective comic imagination that the ensuing hilarity muffled any serious commentary on its symbolic importance. The jokes, as they say,...
<urn:uuid:7bc0b6ca-5c6d-40cd-97e3-45349719d284>
CC-MAIN-2017-09
http://www.digitalreasoning.com/buzz/will-reading-romance-novels-make-artificial-intelligence-more-human.2466048
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00285-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948544
478
2.546875
3
This story was originally published by Data-Smart City Solutions. What could you do with access to the complete — and massive — collection of every public tweet ever tweeted? Earlier this year, Twitter posed this question to academic and research institutions across the globe, ultimately planning to reward some of the ...
<urn:uuid:c2f57076-36f6-43ab-bb28-f14b9e41da40>
CC-MAIN-2017-09
http://www.govtech.com/internet/Can-Twitter-Help-Predict-Foodborne-Illnesses.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00637-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942359
700
2.78125
3
For anyone bearing the brunt of an Internet hoax that just won't die, there's little more to hope for in terms of potential relief than a story on Snopes.com stating unequivocally that the hoax is indeed a hoax. After all, Snopes is the gold standard when it comes to debunking nonsense. Computer scientist Bjarne Strous...
<urn:uuid:1f25f7bc-1cb4-4b59-acb8-81981e1f5484>
CC-MAIN-2017-09
http://www.networkworld.com/article/2189385/data-center/snopes-com-debunks-old-c---hoax--but----.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00637-ip-10-171-10-108.ec2.internal.warc.gz
en
0.969125
743
2.578125
3
Microsoft Internet Explorer comes with Java virtual machine and accompanying class packages. Multiple security vulnerabilities have been found in the Java environment. Some of these allow an attacker to deliver and run arbitrary code on the Internet Explorer or Outlook user’s system when a hostile web site or mail mess...
<urn:uuid:4091adc7-e589-4d40-ad87-e8802ac34ec7>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2002/11/11/vulnerabilities-in-microsofts-java-implementation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00281-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915752
1,082
3.296875
3
A Switzerland-based standards group wants to stop the madness of having a different charger for every laptop, and will publish a technical specification for universal laptop chargers early next year. The specification from the International Electrotechnical Commission will cover "a wide range of notebook computers and ...
<urn:uuid:cb4e74f3-6fee-483b-af97-712343be1675>
CC-MAIN-2017-09
http://www.cio.com/article/2380075/laptop-computers/one-power-cord-to-rule-them-all--standards-group-pushes-for-universal-laptop-charge.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00633-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943535
360
2.640625
3
DARPA Focuses On War Injuries In Brain ResearchDepartment of Defense research agency will foot half the bill for the White House’s new R&D initiative into the human brain. 14 Amazing DARPA Technologies On Tap (click image for larger view and for slideshow) The Defense Advanced Research Projects Agency will be a key par...
<urn:uuid:fb6652eb-c2a7-4417-8f92-6f0f709261c2>
CC-MAIN-2017-09
http://www.darkreading.com/risk-management/darpa-focuses-on-war-injuries-in-brain-research/d/d-id/1109380?piddl_msgorder=thrd
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00509-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933543
684
2.53125
3
“Anyone know what this is? Class? Anyone? Anyone? Anyone seen this before? The Laffer Curve. Anyone know what this says?” “Bueller? Bueller? Bueller?” While Ferris Bueller famously skipped economics (and many other classes) in his eponymous movie, many of us have endured similar torture in our science classes. Undergra...
<urn:uuid:8e892b42-d2a6-4bc5-bcad-df5c40bc2fcc>
CC-MAIN-2017-09
https://arstechnica.com/uncategorized/2008/11/asleep-at-the-desk-undergrad-education-gets-a-boost/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00509-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946197
647
2.859375
3
Uh oh. Did you notice what today is? That’s right: Friday the 13th. According to Wikipedia, the superstition surrounding this day comes simply from the fact that Fridays and the number thirteen are both independently considered unlucky, and so in conjunction they are like a Big Mac of ill fortune. Maybe you believe in ...
<urn:uuid:2fa5001d-cfd7-4cc6-a566-434a55c250e3>
CC-MAIN-2017-09
https://blog.keepersecurity.com/2013/12/14/avoiding-bad-luck-in-cyberspace/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00329-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941155
204
2.546875
3
State and local governments are climbing aboard the green bandwagon, although "green building" innovations such as energy-efficient light bulbs dominate the ride. Emphasis on lighting is understandable given that light bulbs devour 22 percent of all electricity produced nationwide, according to the U.S. Department of E...
<urn:uuid:f20fb50a-7c26-46cc-9424-8bcf371f0e25>
CC-MAIN-2017-09
http://www.govtech.com/policy-management/Fleet-Management-GIS-and-Telework-Power.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00449-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95943
3,056
2.640625
3