text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Cutting the cord: Using ambient Wi-Fi for power and communications Whether it’s an office network or the broader expanse of the Internet of Things, one of the biggest challenges – if not THE biggest challenge – in deployment is getting power to the devices. Temperature sensors placed throughout buildings can cut utilit...
<urn:uuid:d9e44db5-5fff-4893-bdc9-f76d68c4f7da>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2014/08/wi-fi-backscatter.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00105-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935116
889
3.34375
3
The Android smartphones NASA blasted into orbit snapped pictures of Earth before burning up in the atmosphere. The trio of Android smartphones NASA blasted into orbit recently have ended their journey by burning up in the atmosphere, but not before snapping shots of Earth -- and the pictures don't look too bad. The "Ph...
<urn:uuid:fba3cc23-3ff6-4ec1-b185-f671e14c1bda>
CC-MAIN-2017-09
http://www.networkworld.com/article/2165968/smartphones/nasa-smartphone-satellites-beam-clear-images-of-earth.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00457-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959822
397
3.328125
3
Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their corporate domains – a weakness that can easily be exploited by spammers and phishers to deliver emails that, for all intents and purposes, look l...
<urn:uuid:9745f182-6657-4634-bcf2-0f9d6bafae54>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2012/10/24/weak-crypto-allowed-spoofing-emails-from-google-paypal-domains/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00509-ip-10-171-10-108.ec2.internal.warc.gz
en
0.979832
507
2.546875
3
On Mars, it's as if the shutdown never happened - By Frank Konkel - Oct 18, 2013 Curiosity chugs toward Mars' Mt. Sharp. (NASA photo) On Mars, it's as if the government shutdown never happened. NASA's Mars rover, Curiosity, continued chugging toward a mountain on the Red Planet while Congress fought over conditions for...
<urn:uuid:2638801b-5537-4380-9678-b7fac65090f8>
CC-MAIN-2017-09
https://fcw.com/articles/2013/10/18/mars-curiosity-shutdown.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00033-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949988
660
2.78125
3
Moore's Law created a stable era for technology, and now that era is nearing its end. But it may be a blessing to say goodbye to a rule that's driven the semiconductor industry since the 1960s. Imagine if farmers could go year to year knowing in advance the amount of rainfall for their area. They could plant their crop...
<urn:uuid:9e220da4-f94a-4723-b73a-80a2b5f55c94>
CC-MAIN-2017-09
http://www.networkworld.com/article/2173165/smb/welcome-to-the-era-of-radical-innovation.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00505-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95646
1,115
2.9375
3
The FAA this week took a step closer to setting up a central hub for the development of key commercial space transportation technologies such as space launch and traffic management applications and setting orbital safety standards. The hub, known as the Center of Excellence for Commercial Space Transportation would hav...
<urn:uuid:f5e753df-10bb-4700-b69f-1fcfdc242937>
CC-MAIN-2017-09
http://www.networkworld.com/article/2230586/security/faa-close-to-setting-up-commercial-spaceflight-centers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00381-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928825
781
2.875
3
NASA engineers are waiting to see if they can pull a long-running Mars rover out of stand-by mode. The Mars rover Opportunity, which has been working on the Red Planet for more than nine years, put itself into stand-by mode this month during a period when communications with its handlers on Earth were cut off. Earlier ...
<urn:uuid:5faf5480-53f1-4247-8771-7ab167d0a061>
CC-MAIN-2017-09
http://www.itworld.com/article/2709920/it-management/nasa-s-mars-rover-may-be-in-trouble-after-month-of-silence.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00021-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954368
509
2.5625
3
The use of wireless systems for network and Web access is exploding-from wireless LANs to e-mail capable cell phones. It makes network access completely portable, and with systems starting at under $300, it’s very affordable. But widespread wireless use has raised serious new security challenges. How can you be certain...
<urn:uuid:339fcd99-6f61-4638-b7da-7d855aaeafe8>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2003/05/06/positive-identification-in-a-wireless-world/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00197-ip-10-171-10-108.ec2.internal.warc.gz
en
0.918884
1,204
2.8125
3
BGP is the Internet routing protocol. He is making the Internet work. BGP protocol performs actions by maintaining IP networks table for the biggest network in the world – The Internet. The BGP protocol, as a code of behavior, supported core routing decisions over the Internet. Instead of using traditional IGP (Interio...
<urn:uuid:b3e485db-6cd1-4840-b9a0-7c2ee825cada>
CC-MAIN-2017-09
https://howdoesinternetwork.com/tag/routing-protocol
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00549-ip-10-171-10-108.ec2.internal.warc.gz
en
0.874316
146
3.640625
4
Ah, Google, your Street-View publicity stunts never fail to entertain. This time, the Mountain View pranksters have stuck their 360-degree cameras up an actual mountain—Mont Blanc, to be precise. In fact, Google claims to also be helping scientists track the effects of global climate change warming. This is while the i...
<urn:uuid:215a7f5b-f7ae-4b3b-b61f-740834589ef4>
CC-MAIN-2017-09
http://www.computerworld.com/article/3025484/cloud-computing/google-street-view-mont-blanc-itbwcw.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00193-ip-10-171-10-108.ec2.internal.warc.gz
en
0.906088
813
2.78125
3
As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify the process of getting warrants to hack into devices of US citizens and the citizens of other countries. The Rule 41 amendments had been proposed in 2014 by ...
<urn:uuid:2e5eff59-7275-4f27-9d88-1229f8f8572f>
CC-MAIN-2017-09
https://www.bleepingcomputer.com/news/government/as-of-today-us-law-enforcement-has-new-hacking-powers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00369-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963888
898
2.515625
3
Efficiency Through Unification Sometimes called unified computing or dynamic infrastructure, the convergence of computing resources describes “bringing together of compute, storage, and networking in order to facilitate virtual computing and application deployment flexibility,” said Jim Frey, managing research director...
<urn:uuid:48a76ef4-510c-4a66-8d54-366f5e7ab6eb>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/datacenter/converged-infrastructure-efficiency-through-unification.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00545-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921154
1,238
2.84375
3
In the 1940s, kids could stand up in the bed of a pickup truck as their parents drove down the road; babies rode in their mothers' laps; and there were no seat belts, padded dashboards, crumple zones, rumble strips, air bags, Bott's dots, anti-lock brakes or traction control. Perhaps it's because of all this modern saf...
<urn:uuid:700b243a-966c-4b02-a3a2-4739d3aa1dc0>
CC-MAIN-2017-09
http://www.govtech.com/Will-Self-Driving-Cars-Rule-Our-Roadways.html?flipboard=yes
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00069-ip-10-171-10-108.ec2.internal.warc.gz
en
0.96976
527
2.5625
3
NASA seems hamstrung on this one. Tasked with watching out for huge chunks of space rocks that could smash into the earth, it has been denied the money to actually do the job. The problem is that while Congress mandated four years ago that NASA detect and track 90% of space rocks known as near earth objects (NEO) 140 k...
<urn:uuid:c53bf435-9a6e-455a-bb6d-cebb7c32ad9a>
CC-MAIN-2017-09
http://www.networkworld.com/article/2236785/security/killer-asteroids-getting-free-pass-on-nasa-s-watch.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00245-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955419
776
3.421875
3
The number of bridges considered to be in the worst shape has declined in the vast majority of states — all but nine — in the years since a Minneapolis bridge collapse brought national attention to the America’s decaying bridges. All told, the number of “structurally deficient” bridges dipped by 14 percent in the last ...
<urn:uuid:9768e6e5-8b3a-407e-80f2-5ebc80917290>
CC-MAIN-2017-09
http://www.govtech.com/transportation/States-Trim-List-of-Bad-Bridges.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00065-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961711
1,250
3.125
3
The National Electronic Disease Surveillance System (NEDSS) will "revolutionize public health by gathering and analyzing information quickly and accurately," according to the Centers for Disease Control and Prevention (CDC). This may be the case, but not without considerable adjustment and some aggravation, states have...
<urn:uuid:0cd8e685-449e-48f4-9cd0-6f582eca5591>
CC-MAIN-2017-09
http://www.govtech.com/security/Streamlining-Standards-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00417-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957489
1,460
3.0625
3
Cybersecurity action must catch up to interest: A lesson from “Snowden” Across the country this fall, movie-goers settled into their theater seats, popcorn tubs balanced on their laps, and immersed themselves in one of the best-known data breach stories of our time. “Snowden” was no documentary in terms of its veracity...
<urn:uuid:379a63ee-9828-4ab2-9c88-ad1b60670c00>
CC-MAIN-2017-09
http://blog.datagravity.com/cybersecurity-action-must-catch-interest-lesson-snowden/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00293-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965734
696
2.5625
3
Attacking Asthma with Advanced Telehealth Monitoring AT&T’s prototype infrastructure provides a complete, end-to-end solution for delivering sensor data from patient to end users. Asthma is on the rise, affecting people of all ages, particularly the young. This rise is a result of biological and chemical factors, with ...
<urn:uuid:8baf1364-6f7d-4661-ad4a-564e15267d68>
CC-MAIN-2017-09
http://www.research.att.com/articles/featured_stories/2012_12/201212_asthma_VOC_detector.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00293-ip-10-171-10-108.ec2.internal.warc.gz
en
0.924785
2,215
2.734375
3
Panasonic's Eco Solutions division today announced the launch of what it is calling the most powerful photovoltaic panel in the world. The new prototype solar panel has a solar energy conversion efficiency of 22.5% on a commercial-sized module. The prototype was built using solar cells based on mass-production technolo...
<urn:uuid:1a65c06e-16be-4b5b-9ff8-4354d9cf4b23>
CC-MAIN-2017-09
http://www.itnews.com/article/2989813/sustainable-it/panasonic-surpasses-solarcity-with-worlds-most-efficient-solar-panel.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00290-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942066
374
2.5625
3
The use of laptop encryption in higher education, especially by faculty and staff, seems like a no-brainer to me. After all, such computers are full of personal information, not only of the devices' owners themselves but also of the student body (they still use SSNs as student IDs, don't they?).While the Department of ...
<urn:uuid:0c2827d1-a9ef-49e9-bbc8-f0137fb55bb6>
CC-MAIN-2017-09
http://www.alertboot.com/blog/blogs/endpoint_security/archive/2013/07/05/education-encryption-laptop-encryption-beats-locked-rooms-shows-university-of-south-carolina-data-breach.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00410-ip-10-171-10-108.ec2.internal.warc.gz
en
0.973085
543
2.734375
3
Expert analysis finds the bad guys increasingly use stronger encryption to protect their malware and botnets. When a new software threat is discovered, reverse engineers dig into the code to find ways to detect the attack, identify the code and its authors, and discover the purpose behind the malware. Such investigatio...
<urn:uuid:01f1e9e8-a867-4124-b5d7-f5ecac65b103>
CC-MAIN-2017-09
http://www.darkreading.com/risk-management/malware-writers-pack-in-better-encryption/d/d-id/1103817?piddl_msgorder=thrd
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00410-ip-10-171-10-108.ec2.internal.warc.gz
en
0.909578
1,050
2.921875
3
Cloud Networked Manufacturing Cloud Computing provides a new way to do business by offering a scalable, flexible service over the Internet. Many organizations such as educational institutions, business enterprises have adopted cloud computing as a means to boost both employee and business productivity. Similarly, manuf...
<urn:uuid:05c0b2a0-2e4a-4f96-a5bc-28f86699f0b3>
CC-MAIN-2017-09
https://cloudtweaks.com/2014/08/cloud-networked-manufacturing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00286-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941889
774
2.625
3
PNRP name resolution protocol uses this two steps: - Endpoint determination – In this step the peer is determining the IPv6 address of the computer network card on which the PNRP ID service is published. - PNRP ID resolution – After locating and testing the reachability of the peer with the PNRP ID with desired PNRP se...
<urn:uuid:6aa6643f-68ba-4310-a8d9-90d467bf607d>
CC-MAIN-2017-09
https://howdoesinternetwork.com/2012/pnrp-name-resolution-how-it-works
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00638-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919452
831
2.625
3
Every time a major security breach makes the headlines, a common reaction happens. Even before the details of the breach are known, the infosec world gets into a frenzy of speculation as to how the attack happened, who conducted it, and whether the attackers were skilled or not. Invariably the conversation focuses onto...
<urn:uuid:633df584-def8-447d-b6b6-86a0daddbf42>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/08/26/there-are-no-winners-in-the-blame-game/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00338-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963725
1,056
2.546875
3
HTML forms are one of the features in HTTP that allows users to send data to HTTP servers. An often overlooked feature is that due to the nature of HTTP, the web browser has no way of identifying between an HTTP server and one that is not an HTTP server. Therefore web browsers may send this data to any open port, regar...
<urn:uuid:44aa2e1f-2b27-404d-8908-2da64efd1b5c>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2008/07/09/the-extended-html-form-attack-revisited/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00514-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933795
254
3.34375
3
Vulkan is a new low-level API that developers can use to access the GPU. This can be used instead of OpenGL or Direct3D. It is essentially the successor to OpenGL as the standard is created by the Khronos Group, a standards organization. Khronos created Vulkan to be an open standard royalty-free. Developers are able to...
<urn:uuid:faeafde8-6717-4f8b-acea-2db5f0db7efc>
CC-MAIN-2017-09
https://www.404techsupport.com/2016/02/khronos-vulkan/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00458-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931248
224
2.640625
3
"My computer is acting up. It must be a virus." You've undoubtedly heard comments like this or even thought this yourself. In actuality, most computer glitches are caused by software conflicts or user error. Viruses aren't as common as other computer problems. They're found in about 0.15 percent of e-mails, according t...
<urn:uuid:886604c0-22dd-4300-aa07-02e157d84176>
CC-MAIN-2017-09
http://www.govtech.com/security/Personal-Computing-How-Serious-a-Threat.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00634-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957124
1,006
3.1875
3
Who doesn't love Pandora Radio? But listening to it on my Android phone is the fastest way to kill the battery and what good is a mobile phone if it has to be constantly plugged in? New research shows that Android phones are the most data hungry smartphones out there. A group of researchers at AT&T Labs are calling on ...
<urn:uuid:02767e2e-d641-4281-9e29-6664400d0602>
CC-MAIN-2017-09
http://www.networkworld.com/article/2229434/opensource-subnet/at-t-researchers-call-for-smartphone-apps-that-won-t-suck-your-battery-dry.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00034-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954814
1,196
2.609375
3
Providing greater insight and control over elements in our increasingly connected lives, the Internet of Things (IoT) emerges at a time when threats to our data and systems have never been greater. There is an average of thirteen enterprise security breaches every day, resulting in roughly 10 million records lost a day...
<urn:uuid:c0894ca6-bd34-4ae2-8659-89fc58539005>
CC-MAIN-2017-09
https://safenet.gemalto.com/data-protection/securing-internet-of-things-iot/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00630-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942431
692
2.765625
3
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. In major metropolitan areas and smaller cities alike, governments are adopting software-defined networking (SDN) and network function virtualization (NF...
<urn:uuid:3744fcb2-5b66-4dd5-964b-41acf86e953b>
CC-MAIN-2017-09
http://www.itnews.com/article/3000819/software-defined-networking/sdn-and-nfv-the-brains-behind-the-smart-city.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00330-ip-10-171-10-108.ec2.internal.warc.gz
en
0.932565
1,656
2.796875
3
SAS vs. SATA - Page 5 ZFS does read checksums. When it writes data to the storage, it computes checksums of each block and writes them along with the data to the storage devices. The checksums are written in the pointer to the block. A checksum of the block pointer itself is also computed and stored in its pointer. Thi...
<urn:uuid:8d001a59-5d59-4146-b482-5986a8968df1>
CC-MAIN-2017-09
http://www.enterprisestorageforum.com/storage-technology/sas-vs.-sata-5.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00382-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952807
1,956
3.15625
3
NASA's quantum lab could be giant leap for computing - By Frank Konkel - Oct 28, 2013 Research at NASA's Quantum Artificial Intelligence Laboratory – home to one of the few quantum computers in the world -- could help unlock the potential of quantum approaches to optimizing air traffic control, robotics, pattern recogn...
<urn:uuid:629ed80a-c2ba-4253-8561-560c675e850f>
CC-MAIN-2017-09
https://fcw.com/articles/2013/10/28/nasa-quantum-lab-giant-leap.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00502-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921383
646
3.421875
3
The intention to adopt cloud computing has increased rapidly in many organizations. Cloud computing offers many potential benefits to small and medium enterprises such as fast deployment, pay-for-use, lower costs, scalability, rapid provisioning, rapid elasticity, ubiquitous network access, greater resiliency, and on-d...
<urn:uuid:70a2c556-0533-4a15-a4bc-e5a8d3cf0c13>
CC-MAIN-2017-09
https://cloudtweaks.com/2014/07/computing-security-network-application-levels/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00202-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933116
894
2.71875
3
Using ESP to Prevent Replay Attacks The tighter your network's security is, the more difficult it is for a hacker to break in. However, hackers tend to be clever and have lots of methods of getting into a network. Prior to Windows 2000, hackers could use a method called a replay attack to break into even some of the mo...
<urn:uuid:125da2d4-d077-405d-982b-ffb0a5b586d4>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsecur/article.php/624871/Using-ESP-to-Prevent-Replay-Attacks.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00554-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956634
570
2.703125
3
Super Bowl LI was a historic day for the sport of football. It was also a historic day for technology. Picture this: wireless and cellular data consumed by fans at Super Bowl games has doubled every year for the last five years. According to Mobile Sports Report, Super Bowl LI broke the single-day wireless data use mar...
<urn:uuid:fccb0268-f6d8-4f15-943f-7c277a876816>
CC-MAIN-2017-09
https://www.ibm.com/blogs/research/2017/02/bringing-edge-computing-to-life/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00554-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930113
1,078
2.921875
3
Rootkit malware has not been viewed as a formidable security threat for quite some time — the malware reached its peak levels in early 2011. Since then, rootkits have been on the decline. During the fourth quarter of 2013, McAfee Labs researchers found the rate of rootkits had fallen below the amount present in 2008. M...
<urn:uuid:b2dea3d3-74e6-47c0-bf7c-44e7973f1479>
CC-MAIN-2017-09
https://www.mcafee.com/cf/security-awareness/articles/rise-of-rootkits.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00078-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934075
598
2.890625
3
There are two classifications for wireless power, non-radiative (near-field) and radiative (far-field). Near-field is employed by products that can be charged via short distances, like an electric toothbrush, RFID tags, implanted medical devices and electric vehicles. You might even have a device with Near Field Commun...
<urn:uuid:dbf63718-f013-40ee-9b2d-f0dc4f41dd00>
CC-MAIN-2017-09
http://www.itnews.com/article/2952403/consumer-technology/inside-the-evolving-world-of-wireless-charging-technology.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00498-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952538
314
3.34375
3
This method combines at least two signals at different wavelengths for transmission along one fiber-optic cable. CWDM uses fewer channels than DWDM, but more than standard WDM. In 2002, a 20-nm channel spacing grid was standardized by ITU (ITU-T G.694.2) ranging from 1270 to 1610 nm. However, since wideband optical amp...
<urn:uuid:2bb95fd8-9d29-4831-a642-a19f69fae62e>
CC-MAIN-2017-09
http://exfo.com/glossary/coarse-wavelength-division-multiplexing-cwdm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00198-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9361
581
3.390625
3
Brute-Force SSH Server Attacks SurgeIf such an attack succeeds, the attacker may be able to view, copy, or delete important files on the accessed server or execute malicious code. The number of brute-force SSH attacks is rising, the SANS Internet Storm Center warned on Monday. There "has been a significant amount of br...
<urn:uuid:84519a41-6f6f-4c53-a91d-51d449ae0094>
CC-MAIN-2017-09
http://www.darkreading.com/attacks-and-breaches/brute-force-ssh-server-attacks-surge/d/d-id/1067816
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00374-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934087
804
2.625
3
What happens when you Google your name, and old, embarassing information appears in the results? You could ask the site in question to take it down, but if they say no, there's not much you can do--unless you live in Europe. An EU court recently issued a ruling on the "right to be forgotten," which says that, by reques...
<urn:uuid:b3243414-0614-4516-b760-8c0ecef1debc>
CC-MAIN-2017-09
http://www.cio.com/article/2375676/security-privacy/wikipedia-s-jimmy-wales---right-to-be-forgotten--is-censorship.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00074-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961151
763
2.53125
3
Substantial efforts have been made to the Federal Highway Administration Roads and Weather Management Program. For instance, the DSRC (Dedicated Short Range Communications) technology which uses IEEE 802.11p in the 5.9 GHz band is now being used in connection with various federal and state connected vehicle programs, t...
<urn:uuid:d06125ff-22de-43d8-976e-763a6c12ef28>
CC-MAIN-2017-09
https://www.fluidmesh.com/dsrc-dedicated-short-range-communications/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00250-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923085
742
3.15625
3
…or How to Put the Internet in a Van… One of the foremost issues facing science and industry today is storing the ever-increasing amounts of data that are created globally. Google’s Eric Schmidt claims that every two days humanity generates as much information as it did from the dawn of civilization up until 2003. Ther...
<urn:uuid:df2350dd-e64f-4d5b-bfaa-5a205bfb51f1>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/01/16/old-world-technology-meets-new-world-problem/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00426-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939402
920
3.359375
3
For many people, the term “hacking” means that a criminal has broken through a firewall to get access to a network. The firewall is one of the easiest security concepts for people to understand, and often is thought of as the guard at the gate who provides entry based on a list of authorized visitors or other criteria....
<urn:uuid:f3d1c68a-104b-4edb-ae35-d70e1c049e0c>
CC-MAIN-2017-09
https://blog.barracuda.com/category/security/barracuda-web-security-gateway/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00070-ip-10-171-10-108.ec2.internal.warc.gz
en
0.972559
270
3.453125
3
Steve Jobs And Tech SecurityApple's products continue to highlight what relatively secure operating system environments look like. The death of Steve Jobs is triggering not a little reflection over the impact that one man could have over the form and function of the technology we use every day. The Apple II and Apple M...
<urn:uuid:3940b8ee-825a-4f18-bacf-e8d85fa450be>
CC-MAIN-2017-09
http://www.darkreading.com/risk-management/steve-jobs-and-tech-security/d/d-id/1100574?cid=sbx_bigdata_related_commentary_intrusion_prevention_big_data&itc=sbx_bigdata_related_commentary_intrusion_prevention_big_data
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00542-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957309
997
2.6875
3
Ever wish you could get your hands on the software that NASA used to launch its Apollo lunar missions or to get robots working on Mars? Thinks this code could help you build software for your own project or company? If so, NASA has something for you. The space agency announced that on Thursday it will make a catalog of...
<urn:uuid:07a44dfb-e3f1-44fb-9f65-a6886733b7ca>
CC-MAIN-2017-09
http://www.computerworld.com/article/2489643/app-development/building-your-own-rocket-or-robot-nasa-has-code-for-you.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00294-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947024
408
2.640625
3
Distributed Denial of Service (DDoS) attacks aren’t infamous for their sophistication; however, they’re increasing adaptability warrants a fresh look at the evolving anatomy of these dynamic threats. What is a DDoS attack? A DDoS attack is an attempt to consume one or more finite resources on a target computer or netwo...
<urn:uuid:5968f34d-9e73-442e-988a-4cc5c75d0561>
CC-MAIN-2017-09
http://www.codero.com/blog/adaptive-ddos-attacks-demand-next-gen-defense/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00063-ip-10-171-10-108.ec2.internal.warc.gz
en
0.904761
665
3.0625
3
OpenSSH is a common tool for most of network and system administrators. It is used daily to open remote sessions on hosts to perform administrative tasks. But, it is also used to automate tasks between trusted hosts. Based on public/private key pairs, hosts can exchange data or execute commands via a safe (encrypted) p...
<urn:uuid:dd194ce7-480c-4160-88cb-048d9e2c4c97>
CC-MAIN-2017-09
https://blog.rootshell.be/2010/11/03/bruteforcing-ssh-known_hosts-files/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00291-ip-10-171-10-108.ec2.internal.warc.gz
en
0.790821
2,208
3.421875
3
With energy costs higher in recent years, many are looking at their IT systems' power usage and asking if there is any way to cut it down and reduce costs. With regard to servers and data centers, Andreas Antonopoulos has addressed this issue in his New Data Center Strategies newsletter. But the IEEE is also taking a l...
<urn:uuid:051bd239-d2ed-4587-a209-3c063ac80a4b>
CC-MAIN-2017-09
http://www.networkworld.com/article/2301547/lan-wan/energy-efficient-ethernet-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00411-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964224
335
2.78125
3
As much as there is hype about the Internet of Things (IoT) and protecting it, there is no such thing as "IoT Security" per se. There is just the usual security engineering that is applied to IoT. Security engineering is about determining assets, threats to assets, and cost-effective means of mitigation. There are many...
<urn:uuid:95d2c984-262d-4fe5-af03-10c3b6add097>
CC-MAIN-2017-09
https://www.hbarel.com/analysis/eng/top-challenges-of-securing-iot
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00463-ip-10-171-10-108.ec2.internal.warc.gz
en
0.972702
1,033
2.703125
3
Everything has security problems, even Linux. An old and obscure problem with the gcc compiler was recently discovered to have left a security hole in essentially every version of Linux that anyone is likely to be running. Here's what you need to know about fixing it. The problem itself was discovered by Brad Spengler,...
<urn:uuid:121fe4ed-092a-4f69-af66-7896e03747ed>
CC-MAIN-2017-09
http://www.computerworld.com/article/2467470/open-source-tools/fixing-linux.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00339-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950521
829
2.875
3
Predicted IoT Economic Impact The Internet of Things (IoT) is already a multi-billion dollar industry with global reach, and it’s expected that over the next five years businesses will spend close to $6 trillion in the IoT arena. With the technology driven by data, enabling organizations to analyze and optimize operati...
<urn:uuid:cc0e85cd-5039-4624-b7f8-3a08a2e3ec82>
CC-MAIN-2017-09
https://cloudtweaks.com/2016/12/predicted-iot-economic-impact/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00511-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939912
817
2.640625
3
This summer Iowa State University took delivery of its most powerful supercomputer yet. “Cyence,” at a cost of $2.6 million, is capable of making 183.043 trillion calculations per second and has a total memory of 38.4 trillion bytes. To put that in perspective, one second of calculations by Cyence would take a single h...
<urn:uuid:fa1d617a-aaaf-4d2f-afaa-ba0b0d690553>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/09/06/iowa_state_accelerates_science_with_gpu-phi_supercomputer/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00511-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94782
901
2.640625
3
Traffic congestion could soon be a distant memory for fire and rescue personnel in Palm Beach County, Fla. An intelligent traffic signal system is being installed that will adjust traffic light cycles to favor the routes being driven by first responders. Called Emergency.now, the technology connects Palm Beach County F...
<urn:uuid:2c9733a4-d076-4a5b-b3eb-d525a6c335ea>
CC-MAIN-2017-09
http://www.govtech.com/public-safety/Traffic-Signal-Tech-Improves-Rescue-Response-Time.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00455-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955149
1,357
2.71875
3
USDA research efforts need management improvements: GAO - By Frank Konkel - May 14, 2013 USDA's research agencies have some GAO recommendations for improvement. (Stock image) The United States Department of Agriculture's two principal research agencies need to strengthen collaborative planning and reduce duplication in...
<urn:uuid:3aa19e68-f54f-4f6f-a13e-dd17ce547ac6>
CC-MAIN-2017-09
https://fcw.com/articles/2013/05/14/usda-research-gao.aspx?admgarea=TC_Management
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00631-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940873
641
2.515625
3
Can plastic materials morph into computers? A research breakthrough published this week brings such a possibility closer to reality. Researchers are looking at the possibility of making low-power, flexible and inexpensive computers out of plastic materials. Plastic is not normally a good conductive material. However, r...
<urn:uuid:dbdbfc0f-d49f-4495-85aa-e70b5baec854>
CC-MAIN-2017-09
http://www.cio.com/article/2376703/hardware/plastic-computers-taking-shape--but-won-t-replace-silicon.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00151-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963292
709
3.703125
4
FileZilla, Other Open-Source Software From 'Right' Sources Is Safe A basic tenet of open-source software security has long been the idea that since the code is open, anyone can look inside to see if there is something that shouldn't be there. It's a truth that does work and many of us who use open-source software daily...
<urn:uuid:7caa2f58-f2da-450c-be77-a26c2ed9545a>
CC-MAIN-2017-09
http://www.eweek.com/blogs/security-watch/filezilla-other-open-source-software-from-right-sources-is-safe.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00555-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939298
616
2.6875
3
The race to build the world’s fastest supercomputer – and possibly even the first exascale-class system – just got more interesting. Russia and India are considering an alliance that would enable them to more effectively compete with rival supercomputing powers, in particular China. Last month, Boris Shabanov of the Ru...
<urn:uuid:e10b050d-b455-4d82-8383-494d9f50bed8>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/04/09/russia-india-explore-joint-supercomputing-project/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00075-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941288
775
2.578125
3
This lecture is based on the Peripheral Component Interconnect Express, which is a standard for computer expansion cards. specifically, this is a standard for the communication link by which a PCIe device communicates with the CPU. According to Wikipedia, PCIe 3.0 (August 2007) is the latest standard. standard is an ou...
<urn:uuid:aa926d59-3615-4ad1-8a55-166af0485d67>
CC-MAIN-2017-09
http://edwardbosworth.com/My5155_Slides/Chapter12/PCI_Express.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00195-ip-10-171-10-108.ec2.internal.warc.gz
en
0.901615
1,312
3.828125
4
WASHINGTON, D.C. -- The Centers for Disease Control and Prevention's Injury Center launched Injury Maps, an interactive Web-based mapping application of injury-related mortality in the United States. Injury Maps includes mortality rates for 1989 through1998, the CDC said. The data includes injuries from drowning, poiso...
<urn:uuid:b1f75bb9-be14-4a87-9fc5-e2b5f8436218>
CC-MAIN-2017-09
http://www.govtech.com/e-government/CDC-Rolls-Out-Web-Based-Injury-Mapping.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00195-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917659
243
2.796875
3
Updated: Software created by researchers at Rensselaer Polytechnic Institute uses a pattern-recognition process called kernel learning to more quickly assess molecules' properties. Researchers at Rensselaer Polytechnic Institute this month added a software program that uses adaptive learning to the roster of programs a...
<urn:uuid:cbb66e80-9cde-47f6-b99e-42ba15ff4b30>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Enterprise-Applications/Adaptive-Learning-Speeds-New-DrugScreening-Software
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00599-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915212
919
3.296875
3
GCN LAB IMPRESSIONS Solar-powered processor raises new possibilities - By Greg Crowe - Sep 23, 2011 At Intel’s Developer Forum, Chief Technology Officer Justin Ruttner demonstrated one of Intel’s latest research items — a microprocessor that consumes insanely low levels of power. Code-named Claremont, the circuits on t...
<urn:uuid:f675a189-2e6b-4325-9e78-ec0834a48703>
CC-MAIN-2017-09
https://gcn.com/articles/2011/09/23/intel-solar-powered-processor.aspx?admgarea=TC_EMERGINGTECH
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00595-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944307
407
3.0625
3
Name a tech company, any tech company, and they're investing in containers. Google, of course. IBM, yes. Microsoft, check. But, just because containers are extremely popular, doesn't mean virtual machines are out of date. They're not. Yes, containers can enable your company to pack a lot more applications into a single...
<urn:uuid:c1df0b94-731b-4dad-963e-b96ceeaf27d8>
CC-MAIN-2017-09
http://www.networkworld.com/article/2916091/cloud-storage/containers-vs-virtual-machines-how-to-tell-which-is-the-right-choice-for-your-enterprise.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00295-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945
1,571
2.578125
3
There’s a new language forming around data. Nebulous “big data” has been on fervent tongues of the forward thinking for a few years now. This ambiguous term is now being broken down into definable parts, and futurist Chris Dancy is our linguist. He makes the distinction between “soft data” and “hard data.” Big data, as...
<urn:uuid:103e6646-d71d-4c59-bcdd-a7ecd9f01ac2>
CC-MAIN-2017-09
https://www.cherwell.com/blog/kind-data
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00471-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945083
890
2.609375
3
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location. The research, performed by the Citizen Lab at the University of Toronto's Munk School of Global Affairs, is part of an ongoing project that is looking at ho...
<urn:uuid:4d391545-7bf3-4685-a427-6698cec236e7>
CC-MAIN-2017-09
http://www.itworld.com/article/2708531/security/android-messaging-malware-targets-tibetan-activists.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00468-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964633
724
2.546875
3
This resource is no longer available BlackBerry NFC Security Overview Near Field Communications (NFC) is a short-range wireless technology that is used in applications required to use 4 centimeters or less to transfer information – allowing users to send/receive signals with a simple tapping motion. This technology is ...
<urn:uuid:ae6d89da-7266-4992-9e47-dee749421834>
CC-MAIN-2017-09
http://www.bitpipe.com/detail/RES/1332189292_32.html?asrc=RSS_BP_TERM
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00644-ip-10-171-10-108.ec2.internal.warc.gz
en
0.89979
159
2.671875
3
Cyberattacks are top of mind today, with recent news about high profile incidents involving the Democratic National Committee and Yahoo dominating the headlines. While such incidents certainly lead to much handwringing, cyberattacks perpetrated on individuals, companies and countries can have significant fallout that o...
<urn:uuid:ac388764-9fe8-465e-8adf-98f5eef0b26e>
CC-MAIN-2017-09
https://techdecisions.co/network-security/worst-case-scenario-cyber-attacks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00412-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960538
2,380
2.65625
3
A decompiler is commonly viewed as a tool to recover the source code of a program, the same way as a disassembler is a tool to convert a binary executable program to an assembler text. This is true in some cases but only in some. Most of the time the goal is not to get a compilable text. What would one do with such a t...
<urn:uuid:79ec1c51-1c9f-45d4-acb8-d59e8e880572>
CC-MAIN-2017-09
http://www.hexblog.com/?p=25
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00288-ip-10-171-10-108.ec2.internal.warc.gz
en
0.918706
724
3.125
3
Data warehousing is a technology that aggregates structured data from one or more sources so that it can be compared and analyzed for greater business intelligence. Data warehouses are typically used to correlate broad business data to provide greater executive insight into corporate performance. Data warehouses use a ...
<urn:uuid:9662a0ec-d3b1-4feb-8b87-3e1181c4a98a>
CC-MAIN-2017-09
https://www.informatica.com/sg/services-and-training/glossary-of-terms/data-warehousing-definition.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00340-ip-10-171-10-108.ec2.internal.warc.gz
en
0.915964
228
2.90625
3
How Big Data can help us learn about the words we use and the world we live in Did you know that the majority of folks in Midland America use “uh” over “um”? That “gin and juice” has been in sharp decline since 1994? Or what about the fact that the American Dream didn’t exist until the late 1920s? That’s not to say tha...
<urn:uuid:b7762b84-56c3-4f96-9bdc-3d3d84dd6470>
CC-MAIN-2017-09
http://blog.nexidia.com/watching-language/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00108-ip-10-171-10-108.ec2.internal.warc.gz
en
0.968863
940
2.9375
3
An asteroid is flying relatively closely past Earth today, NASA reported. No need to duck or take to the root cellar, though. The asteroid, dubbed 2014 DX110, will pass by closer than the distance between the Earth and the moon. However, it will safely pass by, with its closest approach, at about 217,000 miles, at 4 p....
<urn:uuid:3a9b731e-f74c-4b5e-be2d-591c371b9a06>
CC-MAIN-2017-09
http://www.cio.com/article/2378145/government/asteroid-to-pass-safely-past-earth-today.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00108-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959927
415
3.0625
3
Google Hacking involves an attacker submitting queries to Google’s search engine with the intention of finding sensitive information residing on Web pages that have been indexed by Google, or finding sensitive information with respect to vulnerabilities in applications indexed by Google. Google Hacking is by no means c...
<urn:uuid:ff077514-d081-4731-964b-050577b30ded>
CC-MAIN-2017-09
https://www.imperva.com/Resources/Glossary?term=google_hacking
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00108-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917126
723
2.9375
3
Manage Linux Storage with LVM and Smartctl In our recent installments we learned a whole lot about Linux software RAID. Today we're going to learn about LVM, the Logical Volume Manager, and Smartctl, the excellent hard disk health-monitoring utility. LVM creates logical storage volumes, and allows you to increase the s...
<urn:uuid:84c344c9-3d9c-4774-ad47-9ba4cb004f9d>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsysm/article.php/3733141/Manage-Linux-Storage-with-LVM-and-Smartctl.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00512-ip-10-171-10-108.ec2.internal.warc.gz
en
0.860745
1,881
2.640625
3
Do you feel compelled to wear a Richard Nixon mask or a baseball hat equipped with infrared signal emitters on the brim when you leave the house? If so, you may be trying to prevent a passerby on the street from guessing your name, interests, Social Security number, or credit score using only a pair of face-scanning gl...
<urn:uuid:854fb650-46b7-4e97-ae20-b43171578498>
CC-MAIN-2017-09
https://www.dataprivacymonitor.com/federal-legislation/facial-recognition-the-end-of-privacy-or-a-precursor-for-new-laws/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00508-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947497
1,293
3.140625
3
Latency is the amount of time it takes for a single packet to traverse a network. It is normally expressed as a round-trip-time (RTT) which is the amount of time it takes a packet to go from A to Z and back again. A “ping” (from submarine sonar) is a common tool used to measure latency. There are three primary sources ...
<urn:uuid:49a10a1c-5c64-4b3b-a2e1-ddb1ed9bbd3b>
CC-MAIN-2017-09
http://liveqos.com/latency-vs-lag-whats-the-difference/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00384-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942357
423
3.671875
4
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from I...
<urn:uuid:39db68bd-0606-4c4e-87aa-d27108b1f958>
CC-MAIN-2017-09
http://www.cio.com/article/2378741/encryption/dozens-of-rogue-self-signed-ssl-certificates-used-to-impersonate-high-profile-sites.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00384-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964526
1,173
2.78125
3
The Global Distribution System (GDS) is a unique tool used by travel agents worldwide to book air travel – yet it has very few security features. Unless the system’s IT infrastructure is overhauled, cybercriminals will continue to be able to access passengers’ personal data and hack their plane tickets. When booking ti...
<urn:uuid:d5df36e3-87f6-4ab8-a32e-f640dd21c4a9>
CC-MAIN-2017-09
https://blog.cybelangel.com/cybercriminals-can-hack-plane-tickets/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00380-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936801
687
2.5625
3
Primer: Wireless Mesh NetworksBy David F. Carr | Posted 2005-09-07 Email Print Wireless mesh networks can cover large areas, such as cities, more economically than standard wireless setups. What is it? In a mesh network, the wireless connection extends not only to client computers, such as wireless laptops, but between...
<urn:uuid:f910f6e4-2a37-47b2-b270-bbc1b3a4707b>
CC-MAIN-2017-09
http://www.baselinemag.com/it-management/Primer-Wireless-Mesh-Networks
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00500-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942741
849
2.90625
3
We all recently heard that Twitter fell victim to an anonymous hacker and over 55,000 login credentials were exposed. While to some, a hacked Twitter account may not seem as significant as a bank or credit card account, a security breach of any kind can cause damage, lost information and identity theft. Back in Februar...
<urn:uuid:92942f06-469a-49ca-9c5c-65967e54f560>
CC-MAIN-2017-09
https://blog.keepersecurity.com/2012/05/10/our-private-information-is-our-private-information-not-yours/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00024-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964761
600
2.96875
3
Yes, an IPv6 address at the binary level is still used the same way an IPv4 address is used. Yes, the address bits are still divided between a network part that specifies the exact location of the link to which a device is attached and a host part that identifies a specific device on the link. Yes, you still use CIDR n...
<urn:uuid:7fb71343-c43d-40ce-9746-4ff78cf0e2e4>
CC-MAIN-2017-09
http://www.networkcomputing.com/networking/ipv6-design-forget-ipv4-rules/1511838043
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00200-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933616
556
3.046875
3
Engagement is an important part of learning. Guidance, inspiration, and general interest lead to successful learning outcomes. It is crucial that district administrators and teachers create an interactive and collaborative learning environment for students to become engaged and involved in the curriculum. Below are som...
<urn:uuid:8670b9a6-a31c-4ca8-a117-aad7916b60cc>
CC-MAIN-2017-09
https://www.jamf.com/blog/four-ways-to-engage-students-in-the-digital-classroom/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00552-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930461
272
3.890625
4
TORONTO, ON--(Marketwired - August 22, 2016) - More than two million kids across the province are preparing to head back to school soon, but everyone in the family can use a refresher course on how best to care for their mouths. The Ontario Dental Association (ODA) wants you to remember the "old school" basics of oral ...
<urn:uuid:4446922a-9141-415d-9cb4-557b2582384c>
CC-MAIN-2017-09
http://www.marketwired.com/press-release/back-to-basics-re-educate-yourself-on-how-to-keep-a-healthy-mouth-2152432.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00196-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949993
466
3.1875
3
A new algorithm that analyzes speech could one day enable smartphones to sense your mood. Who knows, maybe it could even prevent you from saying something you'll regret. Researchers from the University of Rochester will describe their work at the IEEE Workshop on Spoken Language Technology this week in Miami. "We actua...
<urn:uuid:774d994a-b7ae-485f-958b-65b1c9a1268e>
CC-MAIN-2017-09
http://www.cio.com/article/2389930/mobile/smartphones-could-soon-double-as-mood-rings.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00548-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967865
325
2.828125
3
Almost 20 years ago, Transmeta CEO David Ditzel and his colleague, David Patterson, collaborated to coauthor the famous article, The Case for a Reduced Instruction Set Computer.? In this article they argued that microprocessors were too large and complex and that by moving much of that complexity from the silicon into ...
<urn:uuid:0903a849-9bde-400e-b8ef-d9f2653feef7>
CC-MAIN-2017-09
https://arstechnica.com/features/2000/01/crusoe/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00248-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965767
1,059
2.65625
3
Work that NASA's Marshall Space Flight Center did to create an inexpensive spacecraft with off-the-shelf parts has helped one company facilitate better and cheaper satellite communications. NASA's Fast, Affordable, Science and Technology Satellite, also know as FASTSAT, was built to demonstrate researchers’ capability ...
<urn:uuid:0e2abccd-c93b-4923-a931-1d2c7560f295>
CC-MAIN-2017-09
http://www.computerworld.com/article/2473447/emerging-technology/151319-nasas-spinoff-technologies-are-outta-this-world.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00068-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948424
157
3.46875
3
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. What is it? Cascading Style Sheets (CSS) offers a way of adding styles, such as fonts and colours, to web documents. CSS enables presentation to be separated from ...
<urn:uuid:90ce8028-8a7d-427a-b3bc-a478ee128b4f>
CC-MAIN-2017-09
http://www.computerweekly.com/news/2240056970/Cascading-Style-Sheets-separate-presentation-from-website-content
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00596-ip-10-171-10-108.ec2.internal.warc.gz
en
0.932556
696
3.25
3
To satisfy more applications of our life, Fiber Optic Sensing technology has grown in importance over the last few years. Fiber Optic sensing technology is now a fully mature and cost-effective technology which offers major advantages over conventional measurement methods. Especially the use of Fiber Bragg Gratings (FB...
<urn:uuid:7218d653-c3a2-47cf-a4a8-81a5e3323d22>
CC-MAIN-2017-09
http://www.fs.com/blog/sensing-fiber-optic-cables-the-fiber-also-the-sensor.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00296-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917478
903
2.6875
3
Cloud computing technology is a way to increase Information Technology or IT capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription based or pay per use service that, in real time over the Internet,...
<urn:uuid:7fb9fa58-d418-4a0b-bce8-2e8724a7869b>
CC-MAIN-2017-09
http://www.myrealdata.com/blog/202_cloud-computing-%E2%80%93-a-transformative-phenomenon
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00065-ip-10-171-10-108.ec2.internal.warc.gz
en
0.906891
484
2.8125
3
Who's using wikis - By John Zyskowski - Jan 26, 2009 The list of government wikis and the variety of purposes for which they are used continues to expand. The versatility of wikis’ freely editable Web pages makes them a great tool for the types of knowledge sharing and collaborative projects that government employees w...
<urn:uuid:0dcc5a0c-c5ba-4ffe-a78e-6afe146c2886>
CC-MAIN-2017-09
https://fcw.com/articles/2009/01/26/who-is-using-wikis.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00117-ip-10-171-10-108.ec2.internal.warc.gz
en
0.863869
525
2.703125
3
Despite its small size, your Android phone is an incredibly complicated and powerful piece of gear. It can get you online, take photos, make phone calls—it can even pay for your groceries. There’s a lot going on, which means a lot to learn, even if you’re otherwise savvy about technology. We’re here to help. Knowing th...
<urn:uuid:29650bd0-c799-439d-806e-ad1bd13cf2f6>
CC-MAIN-2017-09
http://www.itnews.com/article/3012144/android/android-a-to-z-a-glossary-of-android-jargon-and-technical-terms.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00469-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933834
2,807
3.125
3
Study Finds 'Alarming' Ignorance About Cybercrime"Consumers' unsecured computers play a major role in helping cybercriminals conduct cybercrimes," the National Cyber Security Alliance warns. At the RSA Conference on Wednesday, the National Cyber Security Alliance (NCSA) reported that U.S. consumers don't understand bot...
<urn:uuid:249dd3b5-e6e2-43e5-9a3a-ac80ae100231>
CC-MAIN-2017-09
http://www.darkreading.com/risk-management/study-finds-alarming-ignorance-about-cybercrime/d/d-id/1066719?piddl_msgorder=thrd
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00413-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963978
440
2.640625
3
The federal government already holds many of the tools it needs to effectively recruit, hire and retain many of our nation’s smartest and most highly-skilled workers – those in science, technology, engineering, mathematics and medical fields. Agencies just need to leverage those tools more effectively, according to a n...
<urn:uuid:c1f21fde-e709-4d8e-946f-10678b100d9b>
CC-MAIN-2017-09
http://www.nextgov.com/cio-briefing/wired-workplace/2013/05/ten-tips-attract-sheldons-your-agency/63182/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00341-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956556
854
2.6875
3
Sophos has revealed new research into the use of other people’s Wi-Fi networks to piggyback onto the internet without payment. The research shows that 54 percent of computer users have admitted breaking the law, by using someone else’s wireless internet access without permission. According to Sophos, many internet-enab...
<urn:uuid:b6f06c2e-18c8-46ed-8cc2-64f755757cb4>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2007/11/15/wi-fi-piggybacking-widespread/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00341-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936982
342
2.625
3
Here’s an interesting dilemma: What if you were awarded millions of dollars to build a new, state-of-the-art, 1-petaflops supercomputer, but had no place to put it? That’s the situation that the US Department of Energy’s National Renewable Energy Laboratory (NREL) faced a few years ago. Congress appropriated money for ...
<urn:uuid:d27213ab-9122-46c7-b2fd-0af71f7f2e47>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/03/13/nrel_s_energy_efficient_supercomputer_debuts_new_tech/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00517-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944158
1,071
3.09375
3
Ransomware is the devilish and extremely debilitating program designed to lock and encrypt files in order to extort money from consumers, business owners, and even government officials. It seems that no one is safe in the fight against ransomware. Most ransomware programs are targeted at the most popular operating syst...
<urn:uuid:4bae29e0-bc5c-407a-a956-0c5824932bb3>
CC-MAIN-2017-09
http://www.bvainc.com/ransomware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00109-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944004
528
2.734375
3
With vast amounts of sensitive data traversing the internet daily, one of the biggest challenges of modern-day protection is to properly encrypt and store this data to protect it from being compromised —either by internal threats or hackers. You can see the dilemma, though: if you use a key to protect your data, then, ...
<urn:uuid:cfa05b04-0a80-4ed6-acb7-4c5e1887d8dd>
CC-MAIN-2017-09
https://www.druva.com/blog/are-your-keys-secure-4-reasons-to-consider-cloud-based-digital-envelope-encryption/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00109-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927601
995
2.828125
3
The following code is a part of an Activity class to create a dialog. Which is the Activity classmethod used to display this dialog? Which of these is the correct method to persist SharedPreferences? Which of these is the incorrect explanation of the Java Native Interface(JNI)? Which of these is called after the end of...
<urn:uuid:b308e551-6339-4bb1-8ea8-9bc29cdd34e4>
CC-MAIN-2017-09
http://www.aiotestking.com/android/category/exam-oa0-002-android-application-engineer-certifications-basic/page/14/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00513-ip-10-171-10-108.ec2.internal.warc.gz
en
0.903243
161
2.65625
3
Sytek Inc developed NetBIOS in 1983 as an API (a specification proposed for using it as an interface to communicate by software parts) for software contact over IBM PC LAN networking technology. The Network Basic Input/Output System (NetBIOS) was at first introduced by IBM (a company, which is running IT consultation a...
<urn:uuid:92349403-462c-453c-a5e5-dccb18d7a6f9>
CC-MAIN-2017-09
https://howdoesinternetwork.com/2012/netbios
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00513-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91928
684
3.375
3
How Virtualization Figures into Power Savings How does virtualization figure into this power-saving equation? Does it save-or cost us-energy? When you transfer a vast amount of data on a virtualized basis, you're going to be activating areas within the data center that have probably cooled down and not processed anythi...
<urn:uuid:1f3f19f3-b8f6-4b41-975d-a668c208d437>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Green-IT/Ciscos-Marcoux-Charged-Up-for-Designing-a-Corporate-Green-Roadmap/2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00457-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966669
428
2.578125
3
The last we had heard of Google's self-driving car project was in August 2012, when Google announced that the cars had driven 300,000 autonomous miles. Today, that number has more than doubled to 700,000, and Google's cars are now tackling driving in the big city. Google's cars could probably perform well in an ideal d...
<urn:uuid:921fae86-18cc-4e2a-bde8-fce193446d1f>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2014/04/googles-self-driving-cars-hit-700000-miles-learn-city-navigation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00457-ip-10-171-10-108.ec2.internal.warc.gz
en
0.980143
461
3.046875
3
From Minecraft models to body parts and many things in between. Last week Yoshitomo Imura, 27, was arrested in Japan for printing out five 3D guns, two of which were functional. It’s not the first time scare stories have emerged about the potential capabilities of 3D printing, and in this piece we take you through some...
<urn:uuid:69c2444c-6266-4141-9369-8b245e20e9bf>
CC-MAIN-2017-09
http://www.cbronline.com/news/social-media/7-insane-things-a-3d-printer-can-let-you-fabricate-4265024
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00509-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957385
299
2.796875
3