text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Cutting the cord: Using ambient Wi-Fi for power and communications
Whether it’s an office network or the broader expanse of the Internet of Things, one of the biggest challenges – if not THE biggest challenge – in deployment is getting power to the devices. Temperature sensors placed throughout buildings can cut utilit... | <urn:uuid:d9e44db5-5fff-4893-bdc9-f76d68c4f7da> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2014/08/wi-fi-backscatter.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00105-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935116 | 889 | 3.34375 | 3 |
The Android smartphones NASA blasted into orbit snapped pictures of Earth before burning up in the atmosphere.
The trio of Android smartphones NASA blasted into orbit recently have ended their journey by burning up in the atmosphere, but not before snapping shots of Earth -- and the pictures don't look too bad.
The "Ph... | <urn:uuid:fba3cc23-3ff6-4ec1-b185-f671e14c1bda> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2165968/smartphones/nasa-smartphone-satellites-beam-clear-images-of-earth.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00457-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959822 | 397 | 3.328125 | 3 |
Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their corporate domains – a weakness that can easily be exploited by spammers and phishers to deliver emails that, for all intents and purposes, look l... | <urn:uuid:9745f182-6657-4634-bcf2-0f9d6bafae54> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2012/10/24/weak-crypto-allowed-spoofing-emails-from-google-paypal-domains/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00509-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.979832 | 507 | 2.546875 | 3 |
On Mars, it's as if the shutdown never happened
- By Frank Konkel
- Oct 18, 2013
Curiosity chugs toward Mars' Mt. Sharp. (NASA photo)
On Mars, it's as if the government shutdown never happened. NASA's Mars rover, Curiosity, continued chugging toward a mountain on the Red Planet while Congress fought over conditions for... | <urn:uuid:2638801b-5537-4380-9678-b7fac65090f8> | CC-MAIN-2017-09 | https://fcw.com/articles/2013/10/18/mars-curiosity-shutdown.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00033-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949988 | 660 | 2.78125 | 3 |
Moore's Law created a stable era for technology, and now that era is nearing its end. But it may be a blessing to say goodbye to a rule that's driven the semiconductor industry since the 1960s.
Imagine if farmers could go year to year knowing in advance the amount of rainfall for their area. They could plant their crop... | <urn:uuid:9e220da4-f94a-4723-b73a-80a2b5f55c94> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2173165/smb/welcome-to-the-era-of-radical-innovation.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00505-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95646 | 1,115 | 2.9375 | 3 |
The FAA this week took a step closer to setting up a central hub for the development of key commercial space transportation technologies such as space launch and traffic management applications and setting orbital safety standards.
The hub, known as the Center of Excellence for Commercial Space Transportation would hav... | <urn:uuid:f5e753df-10bb-4700-b69f-1fcfdc242937> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2230586/security/faa-close-to-setting-up-commercial-spaceflight-centers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00381-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928825 | 781 | 2.875 | 3 |
NASA engineers are waiting to see if they can pull a long-running Mars rover out of stand-by mode.
The Mars rover Opportunity, which has been working on the Red Planet for more than nine years, put itself into stand-by mode this month during a period when communications with its handlers on Earth were cut off.
Earlier ... | <urn:uuid:5faf5480-53f1-4247-8771-7ab167d0a061> | CC-MAIN-2017-09 | http://www.itworld.com/article/2709920/it-management/nasa-s-mars-rover-may-be-in-trouble-after-month-of-silence.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00021-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954368 | 509 | 2.5625 | 3 |
The use of wireless systems for network and Web access is exploding-from wireless LANs to e-mail capable cell phones. It makes network access completely portable, and with systems starting at under $300, it’s very affordable.
But widespread wireless use has raised serious new security challenges. How can you be certain... | <urn:uuid:339fcd99-6f61-4638-b7da-7d855aaeafe8> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2003/05/06/positive-identification-in-a-wireless-world/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00197-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918884 | 1,204 | 2.8125 | 3 |
BGP is the Internet routing protocol. He is making the Internet work.
BGP protocol performs actions by maintaining IP networks table for the biggest network in the world – The Internet. The BGP protocol, as a code of behavior, supported core routing decisions over the Internet. Instead of using traditional IGP (Interio... | <urn:uuid:b3e485db-6cd1-4840-b9a0-7c2ee825cada> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/routing-protocol | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00549-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.874316 | 146 | 3.640625 | 4 |
Ah, Google, your Street-View publicity stunts never fail to entertain. This time, the Mountain View pranksters have stuck their 360-degree cameras up an actual mountain—Mont Blanc, to be precise.
In fact, Google claims to also be helping scientists track the effects of global climate change warming. This is while the i... | <urn:uuid:215a7f5b-f7ae-4b3b-b61f-740834589ef4> | CC-MAIN-2017-09 | http://www.computerworld.com/article/3025484/cloud-computing/google-street-view-mont-blanc-itbwcw.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00193-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906088 | 813 | 2.78125 | 3 |
As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify the process of getting warrants to hack into devices of US citizens and the citizens of other countries.
The Rule 41 amendments had been proposed in 2014 by ... | <urn:uuid:2e5eff59-7275-4f27-9d88-1229f8f8572f> | CC-MAIN-2017-09 | https://www.bleepingcomputer.com/news/government/as-of-today-us-law-enforcement-has-new-hacking-powers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00369-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963888 | 898 | 2.515625 | 3 |
Efficiency Through Unification
Sometimes called unified computing or dynamic infrastructure, the convergence of computing resources describes “bringing together of compute, storage, and networking in order to facilitate virtual computing and application deployment flexibility,” said Jim Frey, managing research director... | <urn:uuid:48a76ef4-510c-4a66-8d54-366f5e7ab6eb> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/datacenter/converged-infrastructure-efficiency-through-unification.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00545-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921154 | 1,238 | 2.84375 | 3 |
In the 1940s, kids could stand up in the bed of a pickup truck as their parents drove down the road; babies rode in their mothers' laps; and there were no seat belts, padded dashboards, crumple zones, rumble strips, air bags, Bott's dots, anti-lock brakes or traction control.
Perhaps it's because of all this modern saf... | <urn:uuid:700b243a-966c-4b02-a3a2-4739d3aa1dc0> | CC-MAIN-2017-09 | http://www.govtech.com/Will-Self-Driving-Cars-Rule-Our-Roadways.html?flipboard=yes | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00069-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96976 | 527 | 2.5625 | 3 |
NASA seems hamstrung on this one. Tasked with watching out for huge chunks of space rocks that could smash into the earth, it has been denied the money to actually do the job.
The problem is that while Congress mandated four years ago that NASA detect and track 90% of space rocks known as near earth objects (NEO) 140 k... | <urn:uuid:c53bf435-9a6e-455a-bb6d-cebb7c32ad9a> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2236785/security/killer-asteroids-getting-free-pass-on-nasa-s-watch.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00245-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955419 | 776 | 3.421875 | 3 |
The number of bridges considered to be in the worst shape has declined in the vast majority of states — all but nine — in the years since a Minneapolis bridge collapse brought national attention to the America’s decaying bridges.
All told, the number of “structurally deficient” bridges dipped by 14 percent in the last ... | <urn:uuid:9768e6e5-8b3a-407e-80f2-5ebc80917290> | CC-MAIN-2017-09 | http://www.govtech.com/transportation/States-Trim-List-of-Bad-Bridges.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00065-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961711 | 1,250 | 3.125 | 3 |
The National Electronic Disease Surveillance System (NEDSS) will "revolutionize public health by gathering and analyzing information quickly and accurately," according to the Centers for Disease Control and Prevention (CDC).
This may be the case, but not without considerable adjustment and some aggravation, states have... | <urn:uuid:0cd8e685-449e-48f4-9cd0-6f582eca5591> | CC-MAIN-2017-09 | http://www.govtech.com/security/Streamlining-Standards-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00417-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957489 | 1,460 | 3.0625 | 3 |
Cybersecurity action must catch up to interest: A lesson from “Snowden”
Across the country this fall, movie-goers settled into their theater seats, popcorn tubs balanced on their laps, and immersed themselves in one of the best-known data breach stories of our time. “Snowden” was no documentary in terms of its veracity... | <urn:uuid:379a63ee-9828-4ab2-9c88-ad1b60670c00> | CC-MAIN-2017-09 | http://blog.datagravity.com/cybersecurity-action-must-catch-interest-lesson-snowden/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00293-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965734 | 696 | 2.5625 | 3 |
Attacking Asthma with Advanced Telehealth Monitoring
AT&T’s prototype infrastructure provides a complete, end-to-end solution for delivering sensor data from patient to end users.
Asthma is on the rise, affecting people of all ages, particularly the young. This rise is a result of biological and chemical factors, with ... | <urn:uuid:8baf1364-6f7d-4661-ad4a-564e15267d68> | CC-MAIN-2017-09 | http://www.research.att.com/articles/featured_stories/2012_12/201212_asthma_VOC_detector.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00293-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924785 | 2,215 | 2.734375 | 3 |
Panasonic's Eco Solutions division today announced the launch of what it is calling the most powerful photovoltaic panel in the world.
The new prototype solar panel has a solar energy conversion efficiency of 22.5% on a commercial-sized module. The prototype was built using solar cells based on mass-production technolo... | <urn:uuid:1a65c06e-16be-4b5b-9ff8-4354d9cf4b23> | CC-MAIN-2017-09 | http://www.itnews.com/article/2989813/sustainable-it/panasonic-surpasses-solarcity-with-worlds-most-efficient-solar-panel.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00290-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942066 | 374 | 2.5625 | 3 |
The use of laptop encryption in higher education, especially by faculty and staff, seems like a no-brainer to me. After all, such computers are full of personal information, not only of the devices' owners themselves but also of the student body (they still use SSNs as student IDs, don't they?).While the Department of ... | <urn:uuid:0c2827d1-a9ef-49e9-bbc8-f0137fb55bb6> | CC-MAIN-2017-09 | http://www.alertboot.com/blog/blogs/endpoint_security/archive/2013/07/05/education-encryption-laptop-encryption-beats-locked-rooms-shows-university-of-south-carolina-data-breach.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00410-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.973085 | 543 | 2.734375 | 3 |
Expert analysis finds the bad guys increasingly use stronger encryption to protect their malware and botnets.
When a new software threat is discovered, reverse engineers dig into the code to find ways to detect the attack, identify the code and its authors, and discover the purpose behind the malware.
Such investigatio... | <urn:uuid:01f1e9e8-a867-4124-b5d7-f5ecac65b103> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/malware-writers-pack-in-better-encryption/d/d-id/1103817?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00410-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.909578 | 1,050 | 2.921875 | 3 |
Cloud Networked Manufacturing
Cloud Computing provides a new way to do business by offering a scalable, flexible service over the Internet. Many organizations such as educational institutions, business enterprises have adopted cloud computing as a means to boost both employee and business productivity. Similarly, manuf... | <urn:uuid:05c0b2a0-2e4a-4f96-a5bc-28f86699f0b3> | CC-MAIN-2017-09 | https://cloudtweaks.com/2014/08/cloud-networked-manufacturing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00286-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941889 | 774 | 2.625 | 3 |
PNRP name resolution protocol uses this two steps:
- Endpoint determination – In this step the peer is determining the IPv6 address of the computer network card on which the PNRP ID service is published.
- PNRP ID resolution – After locating and testing the reachability of the peer with the PNRP ID with desired PNRP se... | <urn:uuid:6aa6643f-68ba-4310-a8d9-90d467bf607d> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2012/pnrp-name-resolution-how-it-works | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00638-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919452 | 831 | 2.625 | 3 |
Every time a major security breach makes the headlines, a common reaction happens. Even before the details of the breach are known, the infosec world gets into a frenzy of speculation as to how the attack happened, who conducted it, and whether the attackers were skilled or not. Invariably the conversation focuses onto... | <urn:uuid:633df584-def8-447d-b6b6-86a0daddbf42> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/08/26/there-are-no-winners-in-the-blame-game/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00338-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963725 | 1,056 | 2.546875 | 3 |
HTML forms are one of the features in HTTP that allows users to send data to HTTP servers. An often overlooked feature is that due to the nature of HTTP, the web browser has no way of identifying between an HTTP server and one that is not an HTTP server. Therefore web browsers may send this data to any open port, regar... | <urn:uuid:44aa2e1f-2b27-404d-8908-2da64efd1b5c> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2008/07/09/the-extended-html-form-attack-revisited/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00514-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933795 | 254 | 3.34375 | 3 |
Vulkan is a new low-level API that developers can use to access the GPU. This can be used instead of OpenGL or Direct3D. It is essentially the successor to OpenGL as the standard is created by the Khronos Group, a standards organization. Khronos created Vulkan to be an open standard royalty-free.
Developers are able to... | <urn:uuid:faeafde8-6717-4f8b-acea-2db5f0db7efc> | CC-MAIN-2017-09 | https://www.404techsupport.com/2016/02/khronos-vulkan/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00458-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931248 | 224 | 2.640625 | 3 |
"My computer is acting up. It must be a virus." You've undoubtedly heard comments like this or even thought this yourself. In actuality, most computer glitches are caused by software conflicts or user error.
Viruses aren't as common as other computer problems. They're found in about 0.15 percent of e-mails, according t... | <urn:uuid:886604c0-22dd-4300-aa07-02e157d84176> | CC-MAIN-2017-09 | http://www.govtech.com/security/Personal-Computing-How-Serious-a-Threat.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00634-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957124 | 1,006 | 3.1875 | 3 |
Who doesn't love Pandora Radio? But listening to it on my Android phone is the fastest way to kill the battery and what good is a mobile phone if it has to be constantly plugged in? New research shows that Android phones are the most data hungry smartphones out there. A group of researchers at AT&T Labs are calling on ... | <urn:uuid:02767e2e-d641-4281-9e29-6664400d0602> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2229434/opensource-subnet/at-t-researchers-call-for-smartphone-apps-that-won-t-suck-your-battery-dry.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00034-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954814 | 1,196 | 2.609375 | 3 |
Providing greater insight and control over elements in our increasingly connected lives, the Internet of Things (IoT) emerges at a time when threats to our data and systems have never been greater. There is an average of thirteen enterprise security breaches every day, resulting in roughly 10 million records lost a day... | <urn:uuid:c0894ca6-bd34-4ae2-8659-89fc58539005> | CC-MAIN-2017-09 | https://safenet.gemalto.com/data-protection/securing-internet-of-things-iot/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00630-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942431 | 692 | 2.765625 | 3 |
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
In major metropolitan areas and smaller cities alike, governments are adopting software-defined networking (SDN) and network function virtualization (NF... | <urn:uuid:3744fcb2-5b66-4dd5-964b-41acf86e953b> | CC-MAIN-2017-09 | http://www.itnews.com/article/3000819/software-defined-networking/sdn-and-nfv-the-brains-behind-the-smart-city.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00330-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932565 | 1,656 | 2.796875 | 3 |
SAS vs. SATA - Page 5
ZFS does read checksums. When it writes data to the storage, it computes checksums of each block and writes them along with the data to the storage devices. The checksums are written in the pointer to the block. A checksum of the block pointer itself is also computed and stored in its pointer. Thi... | <urn:uuid:8d001a59-5d59-4146-b482-5986a8968df1> | CC-MAIN-2017-09 | http://www.enterprisestorageforum.com/storage-technology/sas-vs.-sata-5.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00382-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952807 | 1,956 | 3.15625 | 3 |
NASA's quantum lab could be giant leap for computing
- By Frank Konkel
- Oct 28, 2013
Research at NASA's Quantum Artificial Intelligence Laboratory – home to one of the few quantum computers in the world -- could help unlock the potential of quantum approaches to optimizing air traffic control, robotics, pattern recogn... | <urn:uuid:629ed80a-c2ba-4253-8561-560c675e850f> | CC-MAIN-2017-09 | https://fcw.com/articles/2013/10/28/nasa-quantum-lab-giant-leap.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00502-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921383 | 646 | 3.421875 | 3 |
The intention to adopt cloud computing has increased rapidly in many organizations. Cloud computing offers many potential benefits to small and medium enterprises such as fast deployment, pay-for-use, lower costs, scalability, rapid provisioning, rapid elasticity, ubiquitous network access, greater resiliency, and on-d... | <urn:uuid:70a2c556-0533-4a15-a4bc-e5a8d3cf0c13> | CC-MAIN-2017-09 | https://cloudtweaks.com/2014/07/computing-security-network-application-levels/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00202-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933116 | 894 | 2.71875 | 3 |
Using ESP to Prevent Replay Attacks
The tighter your network's security is, the more difficult it is for a hacker to break in. However, hackers tend to be clever and have lots of methods of getting into a network.
Prior to Windows 2000, hackers could use a method called a replay attack to break into even some of the mo... | <urn:uuid:125da2d4-d077-405d-982b-ffb0a5b586d4> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsecur/article.php/624871/Using-ESP-to-Prevent-Replay-Attacks.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00554-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956634 | 570 | 2.703125 | 3 |
Super Bowl LI was a historic day for the sport of football. It was also a historic day for technology. Picture this: wireless and cellular data consumed by fans at Super Bowl games has doubled every year for the last five years. According to Mobile Sports Report, Super Bowl LI broke the single-day wireless data use mar... | <urn:uuid:fccb0268-f6d8-4f15-943f-7c277a876816> | CC-MAIN-2017-09 | https://www.ibm.com/blogs/research/2017/02/bringing-edge-computing-to-life/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00554-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930113 | 1,078 | 2.921875 | 3 |
Rootkit malware has not been viewed as a formidable security threat for quite some time — the malware reached its peak levels in early 2011. Since then, rootkits have been on the decline. During the fourth quarter of 2013, McAfee Labs researchers found the rate of rootkits had fallen below the amount present in 2008. M... | <urn:uuid:b2dea3d3-74e6-47c0-bf7c-44e7973f1479> | CC-MAIN-2017-09 | https://www.mcafee.com/cf/security-awareness/articles/rise-of-rootkits.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00078-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934075 | 598 | 2.890625 | 3 |
There are two classifications for wireless power, non-radiative (near-field) and radiative (far-field). Near-field is employed by products that can be charged via short distances, like an electric toothbrush, RFID tags, implanted medical devices and electric vehicles. You might even have a device with Near Field Commun... | <urn:uuid:dbf63718-f013-40ee-9b2d-f0dc4f41dd00> | CC-MAIN-2017-09 | http://www.itnews.com/article/2952403/consumer-technology/inside-the-evolving-world-of-wireless-charging-technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00498-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952538 | 314 | 3.34375 | 3 |
This method combines at least two signals at different wavelengths for transmission along one fiber-optic cable. CWDM uses fewer channels than DWDM, but more than standard WDM. In 2002, a 20-nm channel spacing grid was standardized by ITU (ITU-T G.694.2) ranging from 1270 to 1610 nm. However, since wideband optical amp... | <urn:uuid:2bb95fd8-9d29-4831-a642-a19f69fae62e> | CC-MAIN-2017-09 | http://exfo.com/glossary/coarse-wavelength-division-multiplexing-cwdm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00198-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9361 | 581 | 3.390625 | 3 |
Brute-Force SSH Server Attacks SurgeIf such an attack succeeds, the attacker may be able to view, copy, or delete important files on the accessed server or execute malicious code.
The number of brute-force SSH attacks is rising, the SANS Internet Storm Center warned on Monday.
There "has been a significant amount of br... | <urn:uuid:84519a41-6f6f-4c53-a91d-51d449ae0094> | CC-MAIN-2017-09 | http://www.darkreading.com/attacks-and-breaches/brute-force-ssh-server-attacks-surge/d/d-id/1067816 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00374-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934087 | 804 | 2.625 | 3 |
What happens when you Google your name, and old, embarassing information appears in the results? You could ask the site in question to take it down, but if they say no, there's not much you can do--unless you live in Europe. An EU court recently issued a ruling on the "right to be forgotten," which says that, by reques... | <urn:uuid:b3243414-0614-4516-b760-8c0ecef1debc> | CC-MAIN-2017-09 | http://www.cio.com/article/2375676/security-privacy/wikipedia-s-jimmy-wales---right-to-be-forgotten--is-censorship.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00074-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961151 | 763 | 2.53125 | 3 |
Substantial efforts have been made to the Federal Highway Administration Roads and Weather Management Program. For instance, the DSRC (Dedicated Short Range Communications) technology which uses IEEE 802.11p in the 5.9 GHz band is now being used in connection with various federal and state connected vehicle programs, t... | <urn:uuid:d06125ff-22de-43d8-976e-763a6c12ef28> | CC-MAIN-2017-09 | https://www.fluidmesh.com/dsrc-dedicated-short-range-communications/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00250-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923085 | 742 | 3.15625 | 3 |
…or How to Put the Internet in a Van…
One of the foremost issues facing science and industry today is storing the ever-increasing amounts of data that are created globally. Google’s Eric Schmidt claims that every two days humanity generates as much information as it did from the dawn of civilization up until 2003. Ther... | <urn:uuid:df2350dd-e64f-4d5b-bfaa-5a205bfb51f1> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/01/16/old-world-technology-meets-new-world-problem/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00426-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939402 | 920 | 3.359375 | 3 |
For many people, the term “hacking” means that a criminal has broken through a firewall to get access to a network. The firewall is one of the easiest security concepts for people to understand, and often is thought of as the guard at the gate who provides entry based on a list of authorized visitors or other criteria.... | <urn:uuid:f3d1c68a-104b-4edb-ae35-d70e1c049e0c> | CC-MAIN-2017-09 | https://blog.barracuda.com/category/security/barracuda-web-security-gateway/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00070-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.972559 | 270 | 3.453125 | 3 |
Steve Jobs And Tech SecurityApple's products continue to highlight what relatively secure operating system environments look like.
The death of Steve Jobs is triggering not a little reflection over the impact that one man could have over the form and function of the technology we use every day. The Apple II and Apple M... | <urn:uuid:3940b8ee-825a-4f18-bacf-e8d85fa450be> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/steve-jobs-and-tech-security/d/d-id/1100574?cid=sbx_bigdata_related_commentary_intrusion_prevention_big_data&itc=sbx_bigdata_related_commentary_intrusion_prevention_big_data | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00542-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957309 | 997 | 2.6875 | 3 |
Ever wish you could get your hands on the software that NASA used to launch its Apollo lunar missions or to get robots working on Mars?
Thinks this code could help you build software for your own project or company? If so, NASA has something for you.
The space agency announced that on Thursday it will make a catalog of... | <urn:uuid:07a44dfb-e3f1-44fb-9f65-a6886733b7ca> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2489643/app-development/building-your-own-rocket-or-robot-nasa-has-code-for-you.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00294-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947024 | 408 | 2.640625 | 3 |
Distributed Denial of Service (DDoS) attacks aren’t infamous for their sophistication; however, they’re increasing adaptability warrants a fresh look at the evolving anatomy of these dynamic threats.
What is a DDoS attack?
A DDoS attack is an attempt to consume one or more finite resources on a target computer or netwo... | <urn:uuid:5968f34d-9e73-442e-988a-4cc5c75d0561> | CC-MAIN-2017-09 | http://www.codero.com/blog/adaptive-ddos-attacks-demand-next-gen-defense/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00063-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.904761 | 665 | 3.0625 | 3 |
OpenSSH is a common tool for most of network and system administrators. It is used daily to open remote sessions on hosts to perform administrative tasks. But, it is also used to automate tasks between trusted hosts. Based on public/private key pairs, hosts can exchange data or execute commands via a safe (encrypted) p... | <urn:uuid:dd194ce7-480c-4160-88cb-048d9e2c4c97> | CC-MAIN-2017-09 | https://blog.rootshell.be/2010/11/03/bruteforcing-ssh-known_hosts-files/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00291-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.790821 | 2,208 | 3.421875 | 3 |
With energy costs higher in recent years, many are looking at their IT systems' power usage and asking if there is any way to cut it down and reduce costs.
With regard to servers and data centers, Andreas Antonopoulos has addressed this issue in his New Data Center Strategies newsletter.
But the IEEE is also taking a l... | <urn:uuid:051bd239-d2ed-4587-a209-3c063ac80a4b> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2301547/lan-wan/energy-efficient-ethernet-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00411-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964224 | 335 | 2.78125 | 3 |
As much as there is hype about the Internet of Things (IoT) and protecting it, there is no such thing as "IoT Security" per se. There is just the usual security engineering that is applied to IoT. Security engineering is about determining assets, threats to assets, and cost-effective means of mitigation. There are many... | <urn:uuid:95d2c984-262d-4fe5-af03-10c3b6add097> | CC-MAIN-2017-09 | https://www.hbarel.com/analysis/eng/top-challenges-of-securing-iot | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00463-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.972702 | 1,033 | 2.703125 | 3 |
Everything has security problems, even Linux. An old and obscure problem with the gcc compiler was recently discovered to have left a security hole in essentially every version of Linux that anyone is likely to be running. Here's what you need to know about fixing it.
The problem itself was discovered by Brad Spengler,... | <urn:uuid:121fe4ed-092a-4f69-af66-7896e03747ed> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2467470/open-source-tools/fixing-linux.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00339-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950521 | 829 | 2.875 | 3 |
Predicted IoT Economic Impact
The Internet of Things (IoT) is already a multi-billion dollar industry with global reach, and it’s expected that over the next five years businesses will spend close to $6 trillion in the IoT arena. With the technology driven by data, enabling organizations to analyze and optimize operati... | <urn:uuid:cc0e85cd-5039-4624-b7f8-3a08a2e3ec82> | CC-MAIN-2017-09 | https://cloudtweaks.com/2016/12/predicted-iot-economic-impact/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00511-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939912 | 817 | 2.640625 | 3 |
This summer Iowa State University took delivery of its most powerful supercomputer yet. “Cyence,” at a cost of $2.6 million, is capable of making 183.043 trillion calculations per second and has a total memory of 38.4 trillion bytes. To put that in perspective, one second of calculations by Cyence would take a single h... | <urn:uuid:fa1d617a-aaaf-4d2f-afaa-ba0b0d690553> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/09/06/iowa_state_accelerates_science_with_gpu-phi_supercomputer/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00511-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94782 | 901 | 2.640625 | 3 |
Traffic congestion could soon be a distant memory for fire and rescue personnel in Palm Beach County, Fla. An intelligent traffic signal system is being installed that will adjust traffic light cycles to favor the routes being driven by first responders.
Called Emergency.now, the technology connects Palm Beach County F... | <urn:uuid:2c9733a4-d076-4a5b-b3eb-d525a6c335ea> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/Traffic-Signal-Tech-Improves-Rescue-Response-Time.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00455-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955149 | 1,357 | 2.71875 | 3 |
USDA research efforts need management improvements: GAO
- By Frank Konkel
- May 14, 2013
USDA's research agencies have some GAO recommendations for improvement. (Stock image)
The United States Department of Agriculture's two principal research agencies need to strengthen collaborative planning and reduce duplication in... | <urn:uuid:3aa19e68-f54f-4f6f-a13e-dd17ce547ac6> | CC-MAIN-2017-09 | https://fcw.com/articles/2013/05/14/usda-research-gao.aspx?admgarea=TC_Management | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00631-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940873 | 641 | 2.515625 | 3 |
Can plastic materials morph into computers? A research breakthrough published this week brings such a possibility closer to reality.
Researchers are looking at the possibility of making low-power, flexible and inexpensive computers out of plastic materials. Plastic is not normally a good conductive material. However, r... | <urn:uuid:dbdbfc0f-d49f-4495-85aa-e70b5baec854> | CC-MAIN-2017-09 | http://www.cio.com/article/2376703/hardware/plastic-computers-taking-shape--but-won-t-replace-silicon.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00151-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963292 | 709 | 3.703125 | 4 |
FileZilla, Other Open-Source Software From 'Right' Sources Is Safe
A basic tenet of open-source software security has long been the idea that since the code is open, anyone can look inside to see if there is something that shouldn't be there.
It's a truth that does work and many of us who use open-source software daily... | <urn:uuid:7caa2f58-f2da-450c-be77-a26c2ed9545a> | CC-MAIN-2017-09 | http://www.eweek.com/blogs/security-watch/filezilla-other-open-source-software-from-right-sources-is-safe.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00555-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939298 | 616 | 2.6875 | 3 |
The race to build the world’s fastest supercomputer – and possibly even the first exascale-class system – just got more interesting. Russia and India are considering an alliance that would enable them to more effectively compete with rival supercomputing powers, in particular China.
Last month, Boris Shabanov of the Ru... | <urn:uuid:e10b050d-b455-4d82-8383-494d9f50bed8> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/04/09/russia-india-explore-joint-supercomputing-project/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00075-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941288 | 775 | 2.578125 | 3 |
This lecture is
based on the Peripheral Component Interconnect Express,
which is a standard for computer expansion cards.
specifically, this is a standard for the communication link by which a
PCIe device communicates with the CPU.
According to Wikipedia, PCIe 3.0 (August 2007) is the latest standard.
standard is an ou... | <urn:uuid:aa926d59-3615-4ad1-8a55-166af0485d67> | CC-MAIN-2017-09 | http://edwardbosworth.com/My5155_Slides/Chapter12/PCI_Express.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00195-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.901615 | 1,312 | 3.828125 | 4 |
WASHINGTON, D.C. -- The Centers for Disease Control and Prevention's Injury Center launched Injury Maps, an interactive Web-based mapping application of injury-related mortality in the United States.
Injury Maps includes mortality rates for 1989 through1998, the CDC said. The data includes injuries from drowning, poiso... | <urn:uuid:b1f75bb9-be14-4a87-9fc5-e2b5f8436218> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/CDC-Rolls-Out-Web-Based-Injury-Mapping.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00195-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917659 | 243 | 2.796875 | 3 |
Updated: Software created by researchers at Rensselaer Polytechnic Institute uses a pattern-recognition process called kernel learning to more quickly assess molecules' properties.
Researchers at Rensselaer Polytechnic Institute
this month added a software program that uses adaptive learning to the roster of programs a... | <urn:uuid:cbb66e80-9cde-47f6-b99e-42ba15ff4b30> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Enterprise-Applications/Adaptive-Learning-Speeds-New-DrugScreening-Software | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00599-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915212 | 919 | 3.296875 | 3 |
GCN LAB IMPRESSIONS
Solar-powered processor raises new possibilities
- By Greg Crowe
- Sep 23, 2011
At Intel’s Developer Forum, Chief Technology Officer Justin Ruttner demonstrated one of Intel’s latest research items — a microprocessor that consumes insanely low levels of power.
Code-named Claremont, the circuits on t... | <urn:uuid:f675a189-2e6b-4325-9e78-ec0834a48703> | CC-MAIN-2017-09 | https://gcn.com/articles/2011/09/23/intel-solar-powered-processor.aspx?admgarea=TC_EMERGINGTECH | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00595-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944307 | 407 | 3.0625 | 3 |
Name a tech company, any tech company, and they're investing in containers. Google, of course. IBM, yes. Microsoft, check. But, just because containers are extremely popular, doesn't mean virtual machines are out of date. They're not.
Yes, containers can enable your company to pack a lot more applications into a single... | <urn:uuid:c1df0b94-731b-4dad-963e-b96ceeaf27d8> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2916091/cloud-storage/containers-vs-virtual-machines-how-to-tell-which-is-the-right-choice-for-your-enterprise.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00295-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945 | 1,571 | 2.578125 | 3 |
There’s a new language forming around data. Nebulous “big data” has been on fervent tongues of the forward thinking for a few years now. This ambiguous term is now being broken down into definable parts, and futurist Chris Dancy is our linguist. He makes the distinction between “soft data” and “hard data.”
Big data, as... | <urn:uuid:103e6646-d71d-4c59-bcdd-a7ecd9f01ac2> | CC-MAIN-2017-09 | https://www.cherwell.com/blog/kind-data | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00471-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945083 | 890 | 2.609375 | 3 |
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
The research, performed by the Citizen Lab at the University of Toronto's Munk School of Global Affairs, is part of an ongoing project that is looking at ho... | <urn:uuid:4d391545-7bf3-4685-a427-6698cec236e7> | CC-MAIN-2017-09 | http://www.itworld.com/article/2708531/security/android-messaging-malware-targets-tibetan-activists.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00468-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964633 | 724 | 2.546875 | 3 |
This resource is no longer available
BlackBerry NFC Security Overview
Near Field Communications (NFC) is a short-range wireless technology that is used in applications required to use 4 centimeters or less to transfer information – allowing users to send/receive signals with a simple tapping motion. This technology is ... | <urn:uuid:ae6d89da-7266-4992-9e47-dee749421834> | CC-MAIN-2017-09 | http://www.bitpipe.com/detail/RES/1332189292_32.html?asrc=RSS_BP_TERM | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00644-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.89979 | 159 | 2.671875 | 3 |
Cyberattacks are top of mind today, with recent news about high profile incidents involving the Democratic National Committee and Yahoo dominating the headlines.
While such incidents certainly lead to much handwringing, cyberattacks perpetrated on individuals, companies and countries can have significant fallout that o... | <urn:uuid:ac388764-9fe8-465e-8adf-98f5eef0b26e> | CC-MAIN-2017-09 | https://techdecisions.co/network-security/worst-case-scenario-cyber-attacks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00412-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960538 | 2,380 | 2.65625 | 3 |
A decompiler is commonly viewed as a tool to recover the source code of a program, the same way as a disassembler is a tool to convert a binary executable program to an assembler text.
This is true in some cases but only in some.
Most of the time the goal is not to get a compilable text. What would one do with such a t... | <urn:uuid:79ec1c51-1c9f-45d4-acb8-d59e8e880572> | CC-MAIN-2017-09 | http://www.hexblog.com/?p=25 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00288-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918706 | 724 | 3.125 | 3 |
Data warehousing is a technology that aggregates structured data from one or more sources so that it can be compared and analyzed for greater business intelligence.
Data warehouses are typically used to correlate broad business data to provide greater executive insight into corporate performance.
Data warehouses use a ... | <urn:uuid:9662a0ec-d3b1-4feb-8b87-3e1181c4a98a> | CC-MAIN-2017-09 | https://www.informatica.com/sg/services-and-training/glossary-of-terms/data-warehousing-definition.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00340-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915964 | 228 | 2.90625 | 3 |
How Big Data can help us learn about the words we use and the world we live in
Did you know that the majority of folks in Midland America use “uh” over “um”? That “gin and juice” has been in sharp decline since 1994? Or what about the fact that the American Dream didn’t exist until the late 1920s?
That’s not to say tha... | <urn:uuid:b7762b84-56c3-4f96-9bdc-3d3d84dd6470> | CC-MAIN-2017-09 | http://blog.nexidia.com/watching-language/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00108-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968863 | 940 | 2.9375 | 3 |
An asteroid is flying relatively closely past Earth today, NASA reported.
No need to duck or take to the root cellar, though.
The asteroid, dubbed 2014 DX110, will pass by closer than the distance between the Earth and the moon. However, it will safely pass by, with its closest approach, at about 217,000 miles, at 4 p.... | <urn:uuid:3a9b731e-f74c-4b5e-be2d-591c371b9a06> | CC-MAIN-2017-09 | http://www.cio.com/article/2378145/government/asteroid-to-pass-safely-past-earth-today.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00108-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959927 | 415 | 3.0625 | 3 |
Google Hacking involves an attacker submitting queries to Google’s search engine with the intention of finding sensitive information residing on Web pages that have been indexed by Google, or finding sensitive information with respect to vulnerabilities in applications indexed by Google. Google Hacking is by no means c... | <urn:uuid:ff077514-d081-4731-964b-050577b30ded> | CC-MAIN-2017-09 | https://www.imperva.com/Resources/Glossary?term=google_hacking | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00108-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917126 | 723 | 2.9375 | 3 |
Manage Linux Storage with LVM and Smartctl
In our recent installments we learned a whole lot about Linux software RAID. Today we're going to learn about LVM, the Logical Volume Manager, and Smartctl, the excellent hard disk health-monitoring utility. LVM creates logical storage volumes, and allows you to increase the s... | <urn:uuid:84c344c9-3d9c-4774-ad47-9ba4cb004f9d> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsysm/article.php/3733141/Manage-Linux-Storage-with-LVM-and-Smartctl.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00512-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.860745 | 1,881 | 2.640625 | 3 |
Do you feel compelled to wear a Richard Nixon mask or a baseball hat equipped with infrared signal emitters on the brim when you leave the house? If so, you may be trying to prevent a passerby on the street from guessing your name, interests, Social Security number, or credit score using only a pair of face-scanning gl... | <urn:uuid:854fb650-46b7-4e97-ae20-b43171578498> | CC-MAIN-2017-09 | https://www.dataprivacymonitor.com/federal-legislation/facial-recognition-the-end-of-privacy-or-a-precursor-for-new-laws/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00508-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947497 | 1,293 | 3.140625 | 3 |
Latency is the amount of time it takes for a single packet to traverse a network. It is normally expressed as a round-trip-time (RTT) which is the amount of time it takes a packet to go from A to Z and back again. A “ping” (from submarine sonar) is a common tool used to measure latency.
There are three primary sources ... | <urn:uuid:49a10a1c-5c64-4b3b-a2e1-ddb1ed9bbd3b> | CC-MAIN-2017-09 | http://liveqos.com/latency-vs-lag-whats-the-difference/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00384-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942357 | 423 | 3.671875 | 4 |
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from I... | <urn:uuid:39db68bd-0606-4c4e-87aa-d27108b1f958> | CC-MAIN-2017-09 | http://www.cio.com/article/2378741/encryption/dozens-of-rogue-self-signed-ssl-certificates-used-to-impersonate-high-profile-sites.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00384-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964526 | 1,173 | 2.78125 | 3 |
The Global Distribution System (GDS) is a unique tool used by travel agents worldwide to book air travel – yet it has very few security features. Unless the system’s IT infrastructure is overhauled, cybercriminals will continue to be able to access passengers’ personal data and hack their plane tickets.
When booking ti... | <urn:uuid:d5df36e3-87f6-4ab8-a32e-f640dd21c4a9> | CC-MAIN-2017-09 | https://blog.cybelangel.com/cybercriminals-can-hack-plane-tickets/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00380-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936801 | 687 | 2.5625 | 3 |
Primer: Wireless Mesh NetworksBy David F. Carr | Posted 2005-09-07 Email Print
Wireless mesh networks can cover large areas, such as cities, more economically than standard wireless setups.
What is it? In a mesh network, the wireless connection extends not only to client computers, such as wireless laptops, but between... | <urn:uuid:f910f6e4-2a37-47b2-b270-bbc1b3a4707b> | CC-MAIN-2017-09 | http://www.baselinemag.com/it-management/Primer-Wireless-Mesh-Networks | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00500-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942741 | 849 | 2.90625 | 3 |
We all recently heard that Twitter fell victim to an anonymous hacker and over 55,000 login credentials were exposed. While to some, a hacked Twitter account may not seem as significant as a bank or credit card account, a security breach of any kind can cause damage, lost information and identity theft. Back in Februar... | <urn:uuid:92942f06-469a-49ca-9c5c-65967e54f560> | CC-MAIN-2017-09 | https://blog.keepersecurity.com/2012/05/10/our-private-information-is-our-private-information-not-yours/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00024-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964761 | 600 | 2.96875 | 3 |
Yes, an IPv6 address at the binary level is still used the same way an IPv4 address is used. Yes, the address bits are still divided between a network part that specifies the exact location of the link to which a device is attached and a host part that identifies a specific device on the link. Yes, you still use CIDR n... | <urn:uuid:7fb71343-c43d-40ce-9746-4ff78cf0e2e4> | CC-MAIN-2017-09 | http://www.networkcomputing.com/networking/ipv6-design-forget-ipv4-rules/1511838043 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00200-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933616 | 556 | 3.046875 | 3 |
Engagement is an important part of learning. Guidance, inspiration, and general interest lead to successful learning outcomes. It is crucial that district administrators and teachers create an interactive and collaborative learning environment for students to become engaged and involved in the curriculum. Below are som... | <urn:uuid:8670b9a6-a31c-4ca8-a117-aad7916b60cc> | CC-MAIN-2017-09 | https://www.jamf.com/blog/four-ways-to-engage-students-in-the-digital-classroom/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00552-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930461 | 272 | 3.890625 | 4 |
TORONTO, ON--(Marketwired - August 22, 2016) - More than two million kids across the province are preparing to head back to school soon, but everyone in the family can use a refresher course on how best to care for their mouths. The Ontario Dental Association (ODA) wants you to remember the "old school" basics of oral ... | <urn:uuid:4446922a-9141-415d-9cb4-557b2582384c> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/back-to-basics-re-educate-yourself-on-how-to-keep-a-healthy-mouth-2152432.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00196-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949993 | 466 | 3.1875 | 3 |
A new algorithm that analyzes speech could one day enable smartphones to sense your mood. Who knows, maybe it could even prevent you from saying something you'll regret.
Researchers from the University of Rochester will describe their work at the IEEE Workshop on Spoken Language Technology this week in Miami.
"We actua... | <urn:uuid:774d994a-b7ae-485f-958b-65b1c9a1268e> | CC-MAIN-2017-09 | http://www.cio.com/article/2389930/mobile/smartphones-could-soon-double-as-mood-rings.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00548-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967865 | 325 | 2.828125 | 3 |
Almost 20 years ago, Transmeta CEO David Ditzel and his colleague, David Patterson, collaborated to coauthor the famous article, The Case for a Reduced Instruction Set Computer.? In this article they argued that microprocessors were too large and complex and that by moving much of that complexity from the silicon into ... | <urn:uuid:0903a849-9bde-400e-b8ef-d9f2653feef7> | CC-MAIN-2017-09 | https://arstechnica.com/features/2000/01/crusoe/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00248-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965767 | 1,059 | 2.65625 | 3 |
Work that NASA's Marshall Space Flight Center did to create an inexpensive spacecraft with off-the-shelf parts has helped one company facilitate better and cheaper satellite communications.
NASA's Fast, Affordable, Science and Technology Satellite, also know as FASTSAT, was built to demonstrate researchers’ capability ... | <urn:uuid:0e2abccd-c93b-4923-a931-1d2c7560f295> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2473447/emerging-technology/151319-nasas-spinoff-technologies-are-outta-this-world.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00068-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948424 | 157 | 3.46875 | 3 |
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
What is it?
Cascading Style Sheets (CSS) offers a way of adding styles, such as fonts and colours, to web documents. CSS enables presentation to be separated from ... | <urn:uuid:90ce8028-8a7d-427a-b3bc-a478ee128b4f> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/2240056970/Cascading-Style-Sheets-separate-presentation-from-website-content | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00596-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932556 | 696 | 3.25 | 3 |
To satisfy more applications of our life, Fiber Optic Sensing technology has grown in importance over the last few years. Fiber Optic sensing technology is now a fully mature and cost-effective technology which offers major advantages over conventional measurement methods. Especially the use of Fiber Bragg Gratings (FB... | <urn:uuid:7218d653-c3a2-47cf-a4a8-81a5e3323d22> | CC-MAIN-2017-09 | http://www.fs.com/blog/sensing-fiber-optic-cables-the-fiber-also-the-sensor.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00296-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917478 | 903 | 2.6875 | 3 |
Cloud computing technology is a way to increase Information Technology or IT capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription based or pay per use service that, in real time over the Internet,... | <urn:uuid:7fb9fa58-d418-4a0b-bce8-2e8724a7869b> | CC-MAIN-2017-09 | http://www.myrealdata.com/blog/202_cloud-computing-%E2%80%93-a-transformative-phenomenon | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00065-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906891 | 484 | 2.8125 | 3 |
Who's using wikis
- By John Zyskowski
- Jan 26, 2009
The list of government wikis and the variety of purposes for which they are used continues to expand. The versatility of wikis’ freely editable Web pages makes them a great tool for the types of knowledge sharing and collaborative projects that government employees w... | <urn:uuid:0dcc5a0c-c5ba-4ffe-a78e-6afe146c2886> | CC-MAIN-2017-09 | https://fcw.com/articles/2009/01/26/who-is-using-wikis.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00117-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.863869 | 525 | 2.703125 | 3 |
Despite its small size, your Android phone is an incredibly complicated and powerful piece of gear. It can get you online, take photos, make phone calls—it can even pay for your groceries. There’s a lot going on, which means a lot to learn, even if you’re otherwise savvy about technology.
We’re here to help. Knowing th... | <urn:uuid:29650bd0-c799-439d-806e-ad1bd13cf2f6> | CC-MAIN-2017-09 | http://www.itnews.com/article/3012144/android/android-a-to-z-a-glossary-of-android-jargon-and-technical-terms.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00469-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933834 | 2,807 | 3.125 | 3 |
Study Finds 'Alarming' Ignorance About Cybercrime"Consumers' unsecured computers play a major role in helping cybercriminals conduct cybercrimes," the National Cyber Security Alliance warns.
At the RSA Conference on Wednesday, the National Cyber Security Alliance (NCSA) reported that U.S. consumers don't understand bot... | <urn:uuid:249dd3b5-e6e2-43e5-9a3a-ac80ae100231> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/study-finds-alarming-ignorance-about-cybercrime/d/d-id/1066719?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00413-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963978 | 440 | 2.640625 | 3 |
The federal government already holds many of the tools it needs to effectively recruit, hire and retain many of our nation’s smartest and most highly-skilled workers – those in science, technology, engineering, mathematics and medical fields. Agencies just need to leverage those tools more effectively, according to a n... | <urn:uuid:c1f21fde-e709-4d8e-946f-10678b100d9b> | CC-MAIN-2017-09 | http://www.nextgov.com/cio-briefing/wired-workplace/2013/05/ten-tips-attract-sheldons-your-agency/63182/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00341-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956556 | 854 | 2.6875 | 3 |
Sophos has revealed new research into the use of other people’s Wi-Fi networks to piggyback onto the internet without payment. The research shows that 54 percent of computer users have admitted breaking the law, by using someone else’s wireless internet access without permission.
According to Sophos, many internet-enab... | <urn:uuid:b6f06c2e-18c8-46ed-8cc2-64f755757cb4> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2007/11/15/wi-fi-piggybacking-widespread/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00341-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936982 | 342 | 2.625 | 3 |
Here’s an interesting dilemma: What if you were awarded millions of dollars to build a new, state-of-the-art, 1-petaflops supercomputer, but had no place to put it?
That’s the situation that the US Department of Energy’s National Renewable Energy Laboratory (NREL) faced a few years ago. Congress appropriated money for ... | <urn:uuid:d27213ab-9122-46c7-b2fd-0af71f7f2e47> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/03/13/nrel_s_energy_efficient_supercomputer_debuts_new_tech/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00517-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944158 | 1,071 | 3.09375 | 3 |
Ransomware is the devilish and extremely debilitating program designed to lock and encrypt files in order to extort money from consumers, business owners, and even government officials. It seems that no one is safe in the fight against ransomware. Most ransomware programs are targeted at the most popular operating syst... | <urn:uuid:4bae29e0-bc5c-407a-a956-0c5824932bb3> | CC-MAIN-2017-09 | http://www.bvainc.com/ransomware/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00109-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944004 | 528 | 2.734375 | 3 |
With vast amounts of sensitive data traversing the internet daily, one of the biggest challenges of modern-day protection is to properly encrypt and store this data to protect it from being compromised —either by internal threats or hackers.
You can see the dilemma, though: if you use a key to protect your data, then, ... | <urn:uuid:cfa05b04-0a80-4ed6-acb7-4c5e1887d8dd> | CC-MAIN-2017-09 | https://www.druva.com/blog/are-your-keys-secure-4-reasons-to-consider-cloud-based-digital-envelope-encryption/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00109-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927601 | 995 | 2.828125 | 3 |
The following code is a part of an Activity class to create a dialog. Which is the Activity classmethod used to display this dialog?
Which of these is the correct method to persist SharedPreferences?
Which of these is the incorrect explanation of the Java Native Interface(JNI)?
Which of these is called after the end of... | <urn:uuid:b308e551-6339-4bb1-8ea8-9bc29cdd34e4> | CC-MAIN-2017-09 | http://www.aiotestking.com/android/category/exam-oa0-002-android-application-engineer-certifications-basic/page/14/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00513-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.903243 | 161 | 2.65625 | 3 |
Sytek Inc developed NetBIOS in 1983 as an API (a specification proposed for using it as an interface to communicate by software parts) for software contact over IBM PC LAN networking technology. The Network Basic Input/Output System (NetBIOS) was at first introduced by IBM (a company, which is running IT consultation a... | <urn:uuid:92349403-462c-453c-a5e5-dccb18d7a6f9> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2012/netbios | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00513-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91928 | 684 | 3.375 | 3 |
How Virtualization Figures into Power Savings
How does virtualization figure into this power-saving equation? Does it
save-or cost us-energy?
When you transfer a vast amount of data on a virtualized basis, you're going to be activating areas within the data center that have probably cooled down and not processed anythi... | <urn:uuid:1f3f19f3-b8f6-4b41-975d-a668c208d437> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Green-IT/Ciscos-Marcoux-Charged-Up-for-Designing-a-Corporate-Green-Roadmap/2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00457-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966669 | 428 | 2.578125 | 3 |
The last we had heard of Google's self-driving car project was in August 2012, when Google announced that the cars had driven 300,000 autonomous miles. Today, that number has more than doubled to 700,000, and Google's cars are now tackling driving in the big city.
Google's cars could probably perform well in an ideal d... | <urn:uuid:921fae86-18cc-4e2a-bde8-fce193446d1f> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2014/04/googles-self-driving-cars-hit-700000-miles-learn-city-navigation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00457-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.980143 | 461 | 3.046875 | 3 |
From Minecraft models to body parts and many things in between.
Last week Yoshitomo Imura, 27, was arrested in Japan for printing out five 3D guns, two of which were functional. It’s not the first time scare stories have emerged about the potential capabilities of 3D printing, and in this piece we take you through some... | <urn:uuid:69c2444c-6266-4141-9369-8b245e20e9bf> | CC-MAIN-2017-09 | http://www.cbronline.com/news/social-media/7-insane-things-a-3d-printer-can-let-you-fabricate-4265024 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00509-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957385 | 299 | 2.796875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.