text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Interest and press around artificial intelligence (A.I.) comes and goes, but the reality is that we have had A.I. systems with us for quite some time. Because many of these systems are narrowly focused (and actually work), often times they are not thought of as being A.I. For example, when Netflix or Amazon suggests mo...
<urn:uuid:5d8c8d2e-e8d0-4509-8207-2f18cfc57ae7>
CC-MAIN-2017-09
http://www.computerworld.com/article/2918161/emerging-technology/the-ai-ecosystem.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00509-ip-10-171-10-108.ec2.internal.warc.gz
en
0.968684
1,437
2.859375
3
Instead of charging directly at the player in the craggy martian landscape, as they might do normally, the aliens zigzag to take cover behind boulders and outcrops of rock, adjusting their approach as the hero opts for a less conspicuous route to his destination.A The player changes his route again, and the aliens adap...
<urn:uuid:b8538b39-3413-4312-a7a4-836bfb35f5f1>
CC-MAIN-2017-09
http://www.cio.com/article/2387237/byod/game-developers-employ-ai-for-more-adaptive-play.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00385-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962398
867
2.796875
3
Google and NASA are continuing to test quantum computers and this week entered into a new agreement to work with a series of updated systems. D-Wave Systems, a quantum computing company based in Burnaby, British Columbia, announced this week that it had signed a deal to install a succession of D-Wave systems at NASA’s ...
<urn:uuid:58252f6d-629c-4402-b89f-a0e0d2373e0a>
CC-MAIN-2017-09
http://www.itnews.com/article/2987974/emerging-technology/google-nasa-using-quantum-computing-to-push-ai-machine-learning.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00385-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947132
758
2.953125
3
Information is the currency of business, research, and other knowledge-based industries. Storing, accessing, and protecting information is critical for organizations and Information Technology professionals are tasked with delivering strategies and solutions. This course will cover the problems and solutions for inform...
<urn:uuid:039bafc6-e948-4425-96b4-589d6592bc4a>
CC-MAIN-2017-09
http://www.evaluatorgroup.com/information-storage-strategies-solutions-stuttgart-germany/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00029-ip-10-171-10-108.ec2.internal.warc.gz
en
0.922952
1,304
2.8125
3
The current Internet design - Internet protocol version 4 (IPv4) - was standardized in 1978, and has 4.3 billion unique terminations. Simply put, "We can foresee a time when the allocations of addresses will end," said Cerf, who is known for his work in helping to create what we now know as the Internet. The number of ...
<urn:uuid:ba671862-0ffb-454d-81c4-316f2bfd0179>
CC-MAIN-2017-09
http://www.govtech.com/policy-management/102478699.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00205-ip-10-171-10-108.ec2.internal.warc.gz
en
0.972063
956
3.328125
3
The International Space Station recently took a snapshot of the Korean peninsula that explicitly details the night-time power consumption of North and South Korea - North Korea is almost completely dark. From NASA: "The darkened land appears as if it were a patch of water joining the Yellow Sea to the Sea of Japan. The...
<urn:uuid:0f34ac86-2383-4c2f-9b71-616f59de0cd6>
CC-MAIN-2017-09
http://www.networkworld.com/article/2226415/security/nasa-space-photo-shows-incredible-light-disparity-between-north-and-south-korea.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00557-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945857
234
3.203125
3
To recap, my original definition of a Virtual Private Cloud (VPC) is as a method for partitioning a public computing utility such as EC2 into quarantined virtual infrastructure. A VPC may encapsulate multiple local and remote resources to appear as a single homogeneous computing environment bridging the ability to secu...
<urn:uuid:8c421d0f-6c91-416f-9095-72c373d25acb>
CC-MAIN-2017-09
http://www.elasticvapor.com/2009/08/amazons-virtual-private-cloud-is.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00025-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923193
1,181
2.75
3
Researchers at The Universities of Washington and California at Los Angeles have just been given the green lighta> by the Food and Drug Administration to begin clinical trials on a "wearable" kidney dialysis machine. Patients with kidney issues can require an outside device to clean their blood in the place of their bo...
<urn:uuid:e080f1e2-ae73-4c6a-bfd5-841e375fc9da>
CC-MAIN-2017-09
http://www.cio.com/article/2688828/wearable-technology/wearable-kidney-dialysis-machine-sent-to-clinical-trials.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00553-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959428
625
3.296875
3
Smart cities has been a topic of great interest of late. The infrastructure and planning situation in most cities and urban areas has not been encouraging. There has been increasing pressure on cities to work within existing infrastructure, the challenge to cut costs, and the need to utilize energy sources effectively ...
<urn:uuid:13bc8306-f226-4aab-b79a-df9fd8a648ff>
CC-MAIN-2017-09
https://www.compassintelligence.com/blog/smart-cities-creating-new-opportunities-for-iot-ecosystem-and-business-models
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00077-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938015
1,297
2.984375
3
To be prepared for college and careers, students today must become adept at collaboration. Research has shown that physical space alone can improve student learning. These are two of the factors driving the concept of the collaborative classroom. Often referred to as next-generation learning spaces or 21st century clas...
<urn:uuid:51cfdf5a-7fdd-4e38-8c5f-c0a4a99eb474>
CC-MAIN-2017-09
https://content.extremenetworks.com/h/i/319064829-what-s-a-collaborative-classroom-and-why-is-it-important
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00373-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929802
745
3.390625
3
[Answer ID: 9828] What is the differences between Backup and Replication? Created 02/16/2011 13:00 | Updated 09/22/2011 11:52 The Backup and the Replication are different. Use the one that suits your purposes better. We use 2 TeraStaion with same models in both cases and see the difference. - What is the Replication? T...
<urn:uuid:9f34fa54-a9c5-4cad-bf11-4dbed97b6fa4>
CC-MAIN-2017-09
http://vn.faq.buffalo-global.com/app/answers/detail/a_id/9828
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00549-ip-10-171-10-108.ec2.internal.warc.gz
en
0.879904
631
2.59375
3
NASA sends HTC/Google Nexus One...into space Launched with Android 2.1 Eclair in January 2010 the HTC-built Google Nexus One is more than two years old, but that is not stopping NASA from re-launching the smartphone... into space this time around. Part of the PhoneSat program designed to create "small, low-cost, and ea...
<urn:uuid:e805a81d-1c9f-4a43-b1e2-16a3910228ea>
CC-MAIN-2017-09
https://betanews.com/2012/10/10/nasa-sends-htcgoogle-nexus-one-into-space/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00125-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953624
332
2.546875
3
This post has nothing to do with IT, just happened to have been a curiosity conjured during my travels up North and back down South on various IT projects. The Earth is not a perfect sphere, it is a spheroid that bulges out at the equator – the Earth's equatorial radius is greater than the Earth's polar radius. From hi...
<urn:uuid:9dd74a3d-dce7-4144-9e6f-db555d178da5>
CC-MAIN-2017-09
http://www.cosonok.com/2012/05/theory-into-why-it-should-be-cheaper.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00545-ip-10-171-10-108.ec2.internal.warc.gz
en
0.856075
947
2.875
3
The traditional lecture model is the standard learning method in most American classrooms, but there is growing interest in new learning models that are encouraging students and teachers to “learn now, lecture later.” CDW-G’s new report, Learn Now, Lecture Later, looks at the different learning methods teachers and stu...
<urn:uuid:ffc8d037-1538-4ebd-8c3a-759fbb259691>
CC-MAIN-2017-09
http://www.cdwnewsroom.com/2012-learn-now-lecture-later-report/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00245-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938634
251
2.78125
3
The dawn of the personal computer in the 1970s promised the greatest change in American instructional methods since the 19th century—which is when schools began to use standardized textbooks. While the fulfillment of the personal computer’s educational promise is debatable, the machines’ commercial impact on education ...
<urn:uuid:79fe4947-03c4-4f1c-90c8-ec84d59acc09>
CC-MAIN-2017-09
http://www.itnews.com/article/2972895/computers/9-awesome-photos-of-school-computer-labs-from-the-1980s.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00066-ip-10-171-10-108.ec2.internal.warc.gz
en
0.974454
187
3.203125
3
PROBLEM/SITUATION: Providing accurate, up-to-date tourism information to travelers. SOLUTION: A centralized database of travel information accessible via web or kiosk. JURISDICTIONS: Illinois Bureau of Tourism, Illinois Department of Natural Resources, Historic Preservation Agency, Illinois Department of Transportation...
<urn:uuid:8d25c6bd-9517-4dcb-b4ce-afcf49dfe29c>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Destination-Illinois.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00118-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930155
1,837
2.53125
3
Apple recently unveiled Swift, a new language to replace Objective-C for OS X and iOS application development. Apple won't accept submissions built using Swift to the iOS or Mac App Store until the fall, when iOS 8 and the next version of OS X (Yosemite) ship, so there's still some time to learn the ins and outs of thi...
<urn:uuid:9633a6ad-28f7-40e1-8628-ea57d1dab285>
CC-MAIN-2017-09
http://www.computerworld.com/article/2490215/data-center/10-things-you-should-know-about-apple-s-swift.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00414-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928584
1,240
2.640625
3
A new supercomputer being deployed this month in the U.S. is using solid-state drive storage as an alternative to DRAM and hard drives, which could help speed up internal data transfers. The supercomputer, called Catalyst, will be deployed at Lawrence Livermore National Laboratory in Livermore, California. Built by the...
<urn:uuid:4814b2e7-715b-41ed-8d15-df42ac40a789>
CC-MAIN-2017-09
http://www.itworld.com/article/2702674/hardware/new-supercomputer-uses-ssds-as-alternative-to-dram--hard-drives.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00590-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943615
674
2.828125
3
Black Box Explains...UARTs and PCI buses Universal Asynchronous Receiver/Transmitters UARTs are designed to convert sync data from a PC bus to an async format that external I/O devices such as printers or modems use. UARTs insert or remove start bits, stop bits, and parity bits in the data stream as needed by the attac...
<urn:uuid:b15c238b-dcfe-4697-89a5-5ab965b196ac>
CC-MAIN-2017-09
https://www.blackbox.com/en-pr/products/black-box-explains/black-box-explains-uarts-and-pci-buses
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00114-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923284
484
3.390625
3
When deception is a good thing February 16, 2017 Leave a comment By Nick Mirabile, director of cybersecurity In 2013, a pro-Assad group known as the Syrian Electronic Army hacked into the Associated Press’ Twitter account and broadcast a fake report about explosions at the White House. It caused the Dow Jones industria...
<urn:uuid:d67a2ab4-6830-4588-b74c-cd772e7ec249>
CC-MAIN-2017-09
https://blog.immixgroup.com/2017/02/16/when-deception-is-a-good-thing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00642-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943484
830
2.703125
3
Black Box Explains...Speaker sound quality A human with keen hearing can hear sounds within a range of about 20 Hz to 20 KHz. But most human speech is centered in the 1000 Hz range, so most old-fashioned analog telephone networks provided audio bandwidth only in this range. This range transmits most voice information b...
<urn:uuid:e1ec547b-f412-464f-8edc-2ee93a02da8c>
CC-MAIN-2017-09
https://www.blackbox.com/en-au/products/black-box-explains/black-box-explains-speaker-sound-quality
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00518-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913862
192
3.71875
4
FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data was controlled by the basic U...
<urn:uuid:0ea6f479-27c1-4f7b-b39c-20f9422b3cbe>
CC-MAIN-2017-09
http://www.linomasoftware.com/blog/2011/01/24/ftp-lack-of-security-exposed
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00110-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958055
269
3.5625
4
Software defined networking applies the abstraction concepts of hardware virtualization to networking infrastructure. This works well for cloud implementations, which need significant configuration and planning. But SDN and network virtualization may still be too immature for prime time. Software defined networking is ...
<urn:uuid:4c894b8f-2214-457a-bb42-3a4e02fae9ca>
CC-MAIN-2017-09
http://www.networkworld.com/article/2168394/smb/what-cios-need-to-know-about-software-defined-networking.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00110-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933539
1,507
2.84375
3
The next time you're harassed by a bee, look closer. It just might be Mobee, a robotic insect, that's spying on you. Developed at the Harvard Microrobotics Laboratory, the Mobee (from "Monolithic Bee") can buzz around performing tasks such as surveillance -- or even pollinizing plants. Harvard's mechanical bee weighs a...
<urn:uuid:4a9c72d8-9900-4005-b391-d138ec37e7ed>
CC-MAIN-2017-09
http://www.cio.com/article/2369298/hardware/113033-10-small-devices.-No-we-mean-really-small.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00286-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967123
173
2.921875
3
As citizens of the United States prepare to cast their votes in the upcoming presidential election, the time is right to consider what implications, if any, Internet-borne threats may have on this process. With political candidates increasingly relying on the web to communicate their positions, assemble supporters and ...
<urn:uuid:04dcde88-b9f9-4e3d-acbf-cb1c295ea94d>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2008/08/04/cybercrime-and-politics/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00162-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949947
1,498
2.71875
3
Informix Dynamic Server 11.50 Fundamentals Exam 555 certification preparation, Part 4, Examining database objects Tables, constraints, views, indexes, triggers, sequences, and synonyms From the developerWorks archives Date archived: January 12, 2017 | First published: September 03, 2009 This tutorial continues your jou...
<urn:uuid:851dd76d-ca1d-4649-99bf-606dd0a9e7f8>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/data/tutorials/dm-ids-cert5554/index.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00158-ip-10-171-10-108.ec2.internal.warc.gz
en
0.874338
165
2.765625
3
A quick guide to computer viruses - what they are, how they work and the potential consequences of a virus entering and infecting your computer. What is a virus? A computer virus is a malicious program designed to insert itself into the code of another program or data file (called a host), then makes copies of the inse...
<urn:uuid:877251d2-e274-4bd5-9784-575ef403651e>
CC-MAIN-2017-09
https://www.f-secure.com/en/web/labs_global/viruses
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00158-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941082
521
3.890625
4
IPv4 Address Exhaustion IPv4 address exhaustion is the depletion of the pool of unallocated Internet Protocol Version 4 (IPv4) addresses. The IP address space is managed by the Internet Assigned Numbers Authority (IANA) globally, and by five regional Internet registries (RIR) responsible in their designated territories...
<urn:uuid:d2122f1b-75cc-4287-8739-4657d11c86a4>
CC-MAIN-2017-09
https://www.a10networks.com/resources/glossary/ipv4-address-exhaustion
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00510-ip-10-171-10-108.ec2.internal.warc.gz
en
0.903476
136
2.578125
3
The fight for privacy advanced in the U.S. with 16 states and the District of Columbia introducing legislation that addresses such issues as requiring permission before student data is shared for non-educational purposes and warrants before using cell-tower simulators to intercept phone calls. “A bipartisan consensus o...
<urn:uuid:770f78d1-efcd-4bbb-b903-47f8192cc268>
CC-MAIN-2017-09
http://www.computerworld.com/article/3025155/security/fight-for-privacy-of-students-cellphone-users-moves-to-states.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00210-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95264
441
2.625
3
USGS's new database helps users map biodiversity - By Frank Konkel - Apr 19, 2013 A new Web-based federal resource makes more than 100 million mapped records of nearly every living species nationwide searchable by any user. The Biodiversity Information Serving Our Nation (BISON) system allows users -- often land manage...
<urn:uuid:c6744c6d-ed91-43d3-8248-e0c99dfc160a>
CC-MAIN-2017-09
https://fcw.com/articles/2013/04/19/usgs-species-finder.aspx?admgarea=TC_Agencies
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00154-ip-10-171-10-108.ec2.internal.warc.gz
en
0.885581
601
3.203125
3
Several lectures from the VSCSE Summer School on Science Clouds (July 30, 2012) are now available for viewing on YouTube. The presentations provide a clear and concise overview on the state of cloud and virtualization technologies with a particular focus on MapReduce. These free, online lectures are part of the MOOC mo...
<urn:uuid:77716bde-2772-4bbf-a346-4bfb85918108>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/01/07/free_lectures_cloud_virtualization_mapreduce_and_more/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00030-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937578
911
2.828125
3
Domain hijacking is a less frequently discussed but no less harmful attack on a company's or individual's Web presence. To establish a website, a domain name ("Companyabc.com") and a Web server (hosting service) must be procured. When a domain is hijacked, the attacker takes control of the domain registrar, a company t...
<urn:uuid:80f9a742-901a-4e7c-9232-8beee77ca1f9>
CC-MAIN-2017-09
http://misti.com/infosec-news-trends?limit=20&start=180
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00206-ip-10-171-10-108.ec2.internal.warc.gz
en
0.888175
256
2.734375
3
Liquid Cooling Gaining in Popularity Again The idea of cooling your data center equipment using any type of liquid might sound like an absolute non-starter. Lunacy in fact. But thanks to spiraling energy costs, corporate green initiatives and new high-tech coolants, the concept of liquid cooling in the data center is e...
<urn:uuid:8c452164-bc76-46c0-96fc-f07585126a1a>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/datacenter/liquid-cooling-making-a-comeback.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00382-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946755
1,581
2.796875
3
According to the team, the technique works (at least in part) even on devices that are fully encrypted and have locked bootloaders. Their toolkit for the exploit is dubbed FROST, for Forensic Recovery Of Scrambled Telephones. [ MORE DEVICES IN EXTREMIS: 10 rugged gadgets for surviving dirty, dangerous jobs ] Credit: Fr...
<urn:uuid:115f9dc0-4146-4027-80ab-56882868d6b9>
CC-MAIN-2017-09
http://www.networkworld.com/article/2164213/security/freezedroid--researchers-discover-cold-temps-can-unlock-secured-android-phones.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00026-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925498
324
2.578125
3
While the healthcare sector is finally becoming aware of the cyberthreats and risks facing medical devices, new Internet of Things health devices are quickly creating new vectors for cyberattacks, warns cybersecurity expert Tyler Cohen Wood. "The problem is that we've moved to this constantly connected healthcare syste...
<urn:uuid:3aeb2286-ce5a-4e5e-b9dc-c09d77de8795>
CC-MAIN-2017-09
http://www.inforisktoday.com/interviews/internet-things-new-cyber-worries-for-healthcare-sector-i-3075
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00202-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965041
511
2.515625
3
While the Mars Curiosity rover is the most complex machine NASA has ever sent to another planet, the computer that runs it is no more powerful than the one in your smartphone. The robotic rover, which landed in the Gale Crater on Mars early Monday morning, now is being put through a series of tests to make sure all of ...
<urn:uuid:01a8a87c-1d4f-45a6-8327-bfc5cab4b1a4>
CC-MAIN-2017-09
http://www.itworld.com/article/2725157/hardware/nasa--your-smartphone-is-as-smart-as-the-curiosity-rover.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00202-ip-10-171-10-108.ec2.internal.warc.gz
en
0.969602
1,321
3.5
4
The use of electronic health records directly improves treatment and outcomes for patients with diabetes, according to a recent study involving tens of thousands of patients. The greatest improvement was among patients with the most severe diseases. Researchers from Kaiser Permanente Northern California studied nearly ...
<urn:uuid:a9a68b54-8b87-4492-9af0-e4e1e0248ee4>
CC-MAIN-2017-09
http://www.nextgov.com/health/health-it/2012/10/study-shows-health-it-benefits-diabetic-patients/58645/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00202-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941701
319
2.71875
3
Significant advances in technology and shifts in economies and culture are bringing about a new age of intelligent tools that are aware, can make sense of their surroundings, and are socially cognizant of the people who are using them. Sentient tools are the next step in the development of computational systems, Smart ...
<urn:uuid:b8117ff5-4ec1-4754-a9cf-ece747d7e105>
CC-MAIN-2017-09
http://www.frost.com/sublib/display-market-insight.do?id=296998960
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00378-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936181
220
3.0625
3
A recent Evans Data survey indicates that developers are concerned that advancements in artificial intelligence could mean fewer jobs for programmers. Despite being among the leaders of the digital revolution, software developers apparently are just as concerned as workers in other fields that automation and technologi...
<urn:uuid:d298a48d-b9e9-4a5a-a270-295697ffd3f0>
CC-MAIN-2017-09
http://www.eweek.com/developer/developers-worried-that-ai-may-take-their-jobs.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00430-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966793
738
2.546875
3
You may not have heard the name Ceph before, but that's about to change. This new storage technology is about to enter the data center and change the way we look at data storage and cloud computing. First, we need to know what Ceph is. Basically, it's an open-source file system for Linux. The opening line on the offici...
<urn:uuid:be35aa0f-a26b-462b-b9d4-30c2523e3683>
CC-MAIN-2017-09
http://www.networkcomputing.com/storage/ceph-poised-change-data-center-and-cloud-storage/701336891
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00198-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938654
838
2.84375
3
Data visualization Army style - By Reid Davenport - Sep 09, 2013 The famous 19th century graph by Charles Joseph Minard showing Napoleon’s troops during the invasion of Russia is an intersection of data, illustration and storytelling. The graph depicts three distinct and major variables that factored into the eventual ...
<urn:uuid:e79b69d4-9af1-4ddf-932a-add769f164df>
CC-MAIN-2017-09
https://fcw.com/articles/2013/09/09/army-data-visualization.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00074-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955038
482
2.515625
3
01/09/15. Version 0.1.3 (Open Source) Evil Foca is a tool for security pentesters and auditors whose purpose it is to test security in IPv4 and IPv6 data networks. The tool is capable of carrying out various attacks such as: - MITM over IPv4 networks with ARP Spoofing and DHCP ACK Injection. - MITM on IPv6 networks wit...
<urn:uuid:c0528697-2577-44a7-af38-7ee936af6635>
CC-MAIN-2017-09
https://www.elevenpaths.com/labstools/evil-foca/index.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00074-ip-10-171-10-108.ec2.internal.warc.gz
en
0.905731
925
2.625
3
Chicago this week began deploying sensors on light poles to monitor, photograph and listen to the city. The effort is costing as much as $7 million, and may be the largest urban data collection of its kind once all 500 nodes are in place. The beehive-shaped nodes have an array of sensors with enough onboard computing c...
<urn:uuid:79c71d1e-85cf-41a6-bf7d-4e01668b4cd9>
CC-MAIN-2017-09
http://www.itnews.com/article/3115224/internet-of-things/chicago-deploys-computers-with-eyes-ears-and-noses.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00246-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950141
823
2.5625
3
As part of its efforts to speed up the delivery of web content, Google has proposed changes to Transmission Control Protocol (TCP), "the workhorse of the Internet." Yuchung Cheng who works on the transport layer at Google writes: "To deliver content effectively, Web browsers typically open several dozen parallel TCP co...
<urn:uuid:ebfae5ba-71b6-44af-b8b6-60c6b623c95f>
CC-MAIN-2017-09
http://www.circleid.com/posts/making_web_faster_google_working_on_enhancing_transmission_control_protocol/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00474-ip-10-171-10-108.ec2.internal.warc.gz
en
0.732605
207
2.53125
3
In response, the IEEE and the Wi-Fi Alliance are working on 802.11v, a standard that aims to calm that chaos by creating an interface that enables a network to be managed and optimized all the way down to client devices, and leverages existing infrastructure and WLAN standards to do it. The standard, expected to be fin...
<urn:uuid:6e9e3a83-76c5-40fc-a730-f8a9530179d6>
CC-MAIN-2017-09
http://www.networkcomputing.com/networking/80211v-answers-call-order-wireless-lans/831225492?cid=sbx_iwk_related_mostpopular_wireless_reviews_mobility&itc=sbx_iwk_related_mostpopular_wireless_reviews_mobility
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00471-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93413
546
2.578125
3
December is Identity Theft Prevention and Awareness month. Amidst all the bells-a-ringing and people singing that also come around this time of year, it can be easy to ignore the more sober reality of this important topic. Are You Aware? A great place to start on the “awareness” side of all this is with Norton Security...
<urn:uuid:23bd21d9-dc3a-45f5-89aa-4b43d57f4014>
CC-MAIN-2017-09
https://blog.keepersecurity.com/2012/12/20/the-truth-about-cybercrime-today/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00471-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935172
350
2.578125
3
Spam is a slang term for unsolicited commercial email or junk email. Spam and spim are cousins: Spim stands for “Spam over instant messaging,” and refers to unsolicited instant messages. Spim not only disrupts your chatting, but can also contain viruses or spyware. You can prevent spim by blocking any messages from sou...
<urn:uuid:e7e2051b-4adf-4a03-9561-980d6d63bbb5>
CC-MAIN-2017-09
https://www.justaskgemalto.com/us/what-spam-spim/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00115-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910199
105
2.859375
3
In a world where cars can drive In part one of our "Future of Driving" series, we looked at the current state of self-driving car technology and tried to predict how that technology would progress in the coming decades. Now we're going to assume that the technical problems we discussed can be solved and explore how sel...
<urn:uuid:5550674c-3377-45c5-9f42-2caf43952ff5>
CC-MAIN-2017-09
https://arstechnica.com/features/2008/10/future-of-driving-part-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00467-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964988
1,000
3
3
Analyzing Big Data in DNA to Find Diseases September 20, 2012 Mass amounts of raw data cause problems for more fields than just computer science. Life scientists struggle to wade through the amounts of data surrounding sequencing human genes and genetic characteristics. However, according to “Computational Method for P...
<urn:uuid:58e91556-aedb-42c0-8804-ec9a2a491733>
CC-MAIN-2017-09
http://arnoldit.com/wordpress/2012/09/20/analyzing-big-data-in-dna-to-find-diseases/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00167-ip-10-171-10-108.ec2.internal.warc.gz
en
0.913309
323
2.71875
3
Interestingly, ransomware is not a new thing. It first appeared in 1989 with a Trojan program called, “AIDS Trojan,” which was spread by floppy disk. The AIDS Trojan used several tricks to hide files and encrypt their names using symmetric cryptography. The author extorted a $189 fee from users to provide a restoration...
<urn:uuid:ea7ed6d6-6d7e-4bf9-970b-fe8279059019>
CC-MAIN-2017-09
https://heatsoftware.com/blog/tag/ransomware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00343-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954018
946
2.65625
3
Researchers at Marshall University in the United States are set to receive a new GPU-powered cluster that will allow them to make further advances in bioinformatics, climate research, physics computational chemistry and engineering. Nicknamed “BigGreen” the cluster will boast “276 central processing unit cores, 552 gig...
<urn:uuid:3067ffb2-4ae4-4821-8bd6-20835cbb9c71>
CC-MAIN-2017-09
https://www.hpcwire.com/2011/09/29/marshall_scores_biggreen_gpu_cluster/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00463-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925826
420
2.578125
3
Building solar voltaic cells from nanowires instead of standard metal conductors can increase the amount of energy that can be captured by a factor of 15, according to a new study by scientists from the Nano-Science Center in Denmark. The study, published this week in the peer-reviewed journal Nature Photonics, found t...
<urn:uuid:c2d8d1a6-f3ac-4045-9980-06e8eb7faae8>
CC-MAIN-2017-09
http://www.itworld.com/article/2713952/hardware/nanowires-could-boost-solar-power-15x.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00511-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940185
535
3.765625
4
AJAX is not a technology; rather, it is a collection of technologies each providing robust foundations when designing and developing web applications: - XHTML or HTML and Cascading Style Sheets (CSS) providing the standards for representing content to the user. - Document Object Model (DOM) that provides the structure ...
<urn:uuid:4279fd9f-3afa-40e8-982e-43642137e1a7>
CC-MAIN-2017-09
https://www.acunetix.com/websitesecurity/ajax/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00035-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917048
1,664
3.359375
3
The runaway costs of game development In 1982, Atari released a version of Pac-Man for its 2600 game console, also known as the Video Computer System (VCS). The game was written by a single programmer over a couple of months and had a total development cost of US$100,000. It was not a very good port, as the game flicke...
<urn:uuid:aec5fe8b-a34c-4c27-ae10-e7ba420fa178>
CC-MAIN-2017-09
https://arstechnica.com/features/2005/11/crossplatform/2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00503-ip-10-171-10-108.ec2.internal.warc.gz
en
0.969927
870
2.734375
3
7/18/2014 - U.S. AIR FORCE ACADEMY, Colo. -- New research here reveals Academy trash might be a treasure. Last August, the Department of Defense Environmental Security Technology Certification Program funded CDM Smith, a national engineering and construction firm, to test how the Academy can reduce energy use and cost ...
<urn:uuid:d9759f95-6f29-421a-80ff-320bd8f4ccb5>
CC-MAIN-2017-09
http://www.govtech.com/fs/news/Air-Force-Academy-Pilots-Food-Waste-to-Energy.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00203-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954628
821
2.859375
3
First responders from around the nation got to take the controls of state-of-the-art robotics at Texas A&M's Disaster City on Wednesday. The Texas A&M Engineering Experiment Station Center for Emergency Informatics hosted about 50 experts, A&M faculty, students and private vendors, demonstrating technology used by the ...
<urn:uuid:00bb95ef-8fc5-466f-880e-8a9b8d338181>
CC-MAIN-2017-09
http://www.govtech.com/public-safety/First-responders-get-look-at-newest-gadgets-in-the-field.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00555-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943916
530
2.828125
3
Exploring the DWARF debug format information DWARF (debuggingwith attributedrecord formats) is a debugging file format used by many compilers and debuggers to support source-level debugging. It is the format of debugging information within an object file. The DWARF description of a program is a tree structure where eac...
<urn:uuid:c1a30455-4945-4452-b477-6194fa9642d2>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/aix/library/au-dwarf-debug-format/index.html?ca=dbg-twodw20130821
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00431-ip-10-171-10-108.ec2.internal.warc.gz
en
0.764443
1,655
2.84375
3
The Wikimedia Foundation last week warned that readers who are seeing ads on Wikipedia articles are likely using a Web browser that has been infected with malware. The warning points to an apparent resurgence in adware and spyware that is being delivered via cleverly disguised browser extensions designed to run across ...
<urn:uuid:94cf06f1-b2d5-43fc-ae8a-ac63425f19fc>
CC-MAIN-2017-09
https://krebsonsecurity.com/tag/wikipedia/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00431-ip-10-171-10-108.ec2.internal.warc.gz
en
0.932125
281
2.609375
3
Our Cyber Security Awareness training programme has been developed to provide employers and employees with a general understanding of the threats to cyber/information security that they face, help them to recognise the threats and vulnerabilities to their company’s information assets, and respond to them appropriately ...
<urn:uuid:a3369996-863b-4ea8-b9f5-48b3ff614735>
CC-MAIN-2017-09
https://www.7safe.com/professional-development/cyber-security-awareness-training-courses
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00431-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923157
867
2.75
3
In the state of New York, one of the world’s most pristine natural ecosystems is being threatened. Road salt, storm water runoff and invasive species are harming Lake George -- a long, narrow lake at the southeast base of the Adirondack Mountains. So to both understand and manage these threats, Rensselaer Polytechnic I...
<urn:uuid:bf8cd1f5-859c-4ea8-897e-61a7d2e227a4>
CC-MAIN-2017-09
http://www.govtech.com/data/Making-New-Yorks-Lake-George-the-Worlds-Smartest-Lake.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00075-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926847
494
3.375
3
In an effort to promote public-sector support of alternative energy technology, researchers in Australia will study noise caused by wind turbines -- of which there are many unknowns, the University of Adelaide researchers said. Of particularly uncertainty are the low-frequency sounds produced by large wind turbines fou...
<urn:uuid:93b297cd-733d-4196-b630-d486ea2532cd>
CC-MAIN-2017-09
http://www.govtech.com/technology/Researchers-Will-Study-the-Sound-of-Wind.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00251-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937699
271
3.328125
3
In this article, learn about these concepts with Linux on the desktop: - Working with user and group accounts - Managing files and folders - Working with services - Monitoring the system - Reviewing log files To get the most from the articles in this series, you should have knowledge of managing user and group accounts...
<urn:uuid:e3ede00f-2680-4663-a4cf-4bca629e042a>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/linux/library/l-admin-gnome/index.html?ca=drs-
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00427-ip-10-171-10-108.ec2.internal.warc.gz
en
0.872191
3,035
2.703125
3
In the section on spatial locality I mentioned that storing whole blocks is one way that caches take advantage of spatial locality of reference. Now that we know a little more about how caches are organized internally, we can look a bit closer at the issue of block size. You might think that as cache sizes increase you...
<urn:uuid:c15382ee-d622-46d7-a0db-5a4e5826273c>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2002/07/caching/8/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00127-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927456
1,297
3.078125
3
Scanning the Internet used to be a task that took months, but a new tool created by a team of researchers from the University of Michigan can scan all (or most) of the allocated IPv4 addresses in less than 45 minutes by using a typical desktop computer with a gigabit Ethernet connection. The name of the tool is Zmap, a...
<urn:uuid:0864b14e-b638-4c55-be1d-8eca57dab9d0>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/08/19/scanning-the-internet-in-less-than-an-hour/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00599-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944954
437
2.78125
3
NAND Flash, the nonvolatile memory used in smartphones, SSDs (solid-state drives), and many other devices, keeps dropping in price. But the physics of silicon lithography indicates we can’t keep shrinking its size. “These warnings have been out a long time,” says Jim Handy, analyst at market research firm Objective Ana...
<urn:uuid:51c06f0e-4b62-43bf-9302-d0531f4fdb08>
CC-MAIN-2017-09
http://www.channelpronetwork.com/article/rram-takes-flash
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00299-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920596
633
2.578125
3
The concept of cloud hosting technology accounts for a general shift of computer processing, storage, and software delivery away from the desktop and local servers, across the network, and into the next generation data centers hosted by competent cloud computing companies that have large infrastructure. Just as the ele...
<urn:uuid:cd517cbb-85dc-4e5d-a7fd-a8b87d865398>
CC-MAIN-2017-09
http://www.myrealdata.com/blog/457_cloud-hosting-helps-businesses-to-focus-better
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00068-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930284
144
2.578125
3
by Geoff Huston, APNIC Back at the end of June 2012 there was a brief IT hiccup as the world adjusted the Coordinated Universal Time (UTC) standard by adding an extra second to the last minute of the 31st of June. Normally such an adjustment would pass unnoticed by all but a small dedicated collection of time keepers,...
<urn:uuid:eb8b63b6-5018-4e1f-a52a-df6b1fe28db1>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-58/154-ntp.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00296-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925195
3,278
3.265625
3
A 21st-century approach to democratizing data - By Mark Forman (Moderator), Christopher J. Lyons - Oct 24, 2012 This graph, from MIT's Billion Prices Project, represents a cutting-edge way to gather data and turn it into useful information, according to Christopher J. Lyons and Mark Forman. “Unbelievable jobs numbers.....
<urn:uuid:92e9e6aa-1705-41bf-aa09-7ec7d8de2f22>
CC-MAIN-2017-09
https://fcw.com/articles/2012/10/24/democratizing-data.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00648-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935549
1,411
2.578125
3
Image: Colorado is one of a number of states where state and local governments are prohibited by law from directly providing broadband service. image © 2005 Matthew. GNU Free Documentation License, Version 1.2. Article reprinted courtesy of Stateline.org Colorado is one of a number of states where state and local gover...
<urn:uuid:e58bc760-dbfb-42e9-80e8-a64c668a0241>
CC-MAIN-2017-09
http://www.govtech.com/budget-finance/States-Ride-Broadband-Wave.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00116-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959656
2,093
2.734375
3
Device Puts Steering at the Tip of the TongueBy Reuters - | Posted 2008-06-30 Email Print The magnet lets people direct the movement of a cursor across a computer screen or a powered wheelchair around a room and can be implanted under the tongue. WASHINGTON (Reuters) - A new device that uses a tiny magnet can help disa...
<urn:uuid:39bf1032-ca95-466d-b785-3e21b27e21ee>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/Infrastructure/Device-Puts-Steering-at-the-Tip-of-the-Tongue
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00292-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935015
447
2.640625
3
Without much relation to anything, I wrote this short essay about the role prime numbers play in Internet security. In a nutshell, security relies on the ability to form leverage for the defender over the adversary. Such leverage can be of one of two types: Prime numbers are used as part of at least one mathematical me...
<urn:uuid:2a14e7f7-0713-4718-8878-5536c8858abe>
CC-MAIN-2017-09
https://www.hbarel.com/analysis/eng/prime-numbers-and-security
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00468-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952052
685
3.015625
3
A port scanner is a program that is used in network security testing and troubleshooting. An online port scanner is a scan that is able to externally test your network firewall and open ports because it is sourced from an external IP address. It is a regular port scanner that is hosted on another system usually with an...
<urn:uuid:027e6fe9-2bfb-4e11-9f4d-0a72d371257e>
CC-MAIN-2017-09
https://hackertarget.com/port-scanner/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00112-ip-10-171-10-108.ec2.internal.warc.gz
en
0.909041
912
3.25
3
China has passed a new cybersecurity law that gives it greater control over the internet, including by requiring local storage of certain data. Human rights groups and trade associations in the U.S. and other countries have warned of the implications of the law both for internet businesses and human rights in the count...
<urn:uuid:69c08d5d-d9aa-4da7-88f9-256db3d904a5>
CC-MAIN-2017-09
http://www.itnews.com/article/3138948/security/china-passes-controversial-cybersecurity-law.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00464-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945755
545
2.546875
3
Last Friday, Archivist of the United States Allen Weinstein and Google Co-Founder and President of Technology Sergey Brin announced the launch of a pilot program to make holdings of the National Archives available for free online. This non-exclusive agreement will enable researchers and the general public to access a d...
<urn:uuid:28880510-c0f1-4f70-930f-1f29350c07b8>
CC-MAIN-2017-09
http://www.govtech.com/e-government/National-Archives-and-Google-Launch-Pilot.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00340-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91841
454
2.734375
3
Two German computer scientists have proved that it’s possible to access and recover data from an encrypted Android smartphone by performing a set of simple and easily replicable steps that start with putting the phone in a freezer. They tested the attack on Samsung Galaxy Nexus devices, which they kept “on ice” for an ...
<urn:uuid:4e62ba54-660b-40b7-a330-74c814b28fdf>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/02/18/freezing-android-devices-to-break-disk-encryption/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00040-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929471
475
3.078125
3
A text file describing a new virus called PROTO-T was distributed via electronic bulletin boards and the Internet late in the year 1992. This text told about a virus of a new kind that was threateningly spreading itself all over the world. The virus was, among other things, claimed to be impossible to spot and supposed...
<urn:uuid:4ca292b0-acec-420d-b15d-d5b41506a516>
CC-MAIN-2017-09
https://www.f-secure.com/v-descs/proto-t.shtml
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00336-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948291
421
3.109375
3
Computers, as we have all experienced, can seem highly intelligent and infuriatingly ignorant at the same time. One reason is that they lack even the most straightforward understanding of the way the world works. In artificial intelligence, this understanding is referred to as "common sense". It has been described as "...
<urn:uuid:d99a989d-d434-4f4e-b3d7-859edd19ea7e>
CC-MAIN-2017-09
http://www.information-age.com/the-ai-with-the-mind-of-a-child-123457216/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00512-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959346
599
3.484375
3
Hardware Management Consoles Hardware Management Console is a technology created by IBM to provide a standard interface for configuring and operating partitioned (also known as an LPAR or virtualized system) and SMP systems such as IBM System i, IBM System p, IBM System z, and IBM Power Systems. The HMC is a Linux kern...
<urn:uuid:2cb3fa7e-cea2-4cc3-b3fa-c889115ee4a3>
CC-MAIN-2017-09
https://www.midlandinfosys.com/ibm-i-series-as400/ibm-iseries-power-systems/ibm-hmc-hardware-magagement-consoles
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00156-ip-10-171-10-108.ec2.internal.warc.gz
en
0.905948
213
2.640625
3
Community policing was born in the 1990s when a surge in the national crime rate prompted the Clinton administration to flood the states with Community Oriented Policing Services (COPS) grants that put cops on the streets and in many cases, laptops in their cars. The original COPS grants resulted from the COPS bill in ...
<urn:uuid:c8d13fad-e010-4250-8ee8-111806633ba7>
CC-MAIN-2017-09
http://www.govtech.com/public-safety/Vanishing-Act.html?page=5
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00560-ip-10-171-10-108.ec2.internal.warc.gz
en
0.977912
3,798
2.546875
3
Researchers in Japan have come up with a novel way to keep your face out of other people's snapshots taken on digital cameras, smartphones, and possibly Google Glass. The researchers equipped a pair of glasses with 11 small, near-infrared LED lights strategically placed around the bridge of the nose. The lights, visibl...
<urn:uuid:011d276d-f62e-4ace-95ee-13c324a862f8>
CC-MAIN-2017-09
http://www.itworld.com/article/2705862/security/google-glass-panic-triggers-rise-in-facial-recognition-blockers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00560-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948359
1,045
2.6875
3
3D printing offers a method to produce prototypes of objects that can be used to create production products or create objects for production use; one of its greatest advantages is removing the need for sophisticated engineering of parts. 3D printing employs numerous methods and more than 100 materials, but the basic pr...
<urn:uuid:023eaf2d-516e-4f55-84a0-66674d97440d>
CC-MAIN-2017-09
http://www.computerworld.com/article/2474769/emerging-technology/121544-3D-printing.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00504-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947098
146
3.3125
3
Credit: Nick Barber By modifying the Microsoft Kinect SDK a research project at the Computer Human Interaction (CHI) conference demonstrated how gamers in a wheelchair could interact with motion games. By modifying a Microsoft Kinect sensor, a research project at the Computer Human Interaction (CHI) conference demonstr...
<urn:uuid:d5fa0266-eb41-401f-a328-ad800e904352>
CC-MAIN-2017-09
http://www.networkworld.com/article/2166010/data-center/kinect-sensor-modified-for-wheelchair-gaming.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00204-ip-10-171-10-108.ec2.internal.warc.gz
en
0.970918
331
2.875
3
Microsoft hopes to empower the next generation of developers by lending its support to Computer Science Education Week. It's Computer Science Education Week , and Microsoft is betting that exposing students to an "Hour of Code" will not only give the IT industry a lift, but will also radically change lives. Coding can ...
<urn:uuid:a96c6d35-61ac-4470-be58-895d55b9a4a7>
CC-MAIN-2017-09
http://www.eweek.com/developer/microsoft-helps-kick-off-hour-of-code.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00076-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954972
794
2.96875
3
It is a great irony of the Semantic Web, which is predicated on the notion of explicit and unambiguous meaning, that no one can quite agree on what we mean by “semantic.” The fallback position is to simply point at the technology stack defined by W3C and say that anything taking advantage of those tools is “the semanti...
<urn:uuid:f3ad60d4-e528-4cf5-865b-ac256319d72c>
CC-MAIN-2017-09
http://blogs.gartner.com/darin-stewart/2011/03/11/when-does-semantic-really-mean-semantic/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00252-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933223
1,257
2.515625
3
The San Francisco Board of Supervisors this week unanimously passed legislation to require all new commercial or residential buildings with 10 or fewer stories to have solar panels. The Better Roofs ordinance was penned by Supervisor Scott Wiener, who said the measure was needed to fight climate change and reduce relia...
<urn:uuid:04ff4e0d-64ba-49dd-805e-ab64ca857686>
CC-MAIN-2017-09
http://www.itnews.com/article/3058731/sustainable-it/san-francisco-to-require-solar-panels-on-new-buildings.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00428-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951252
423
2.5625
3
For half a decade, Congress debated, but never enacted, cyberthreat information sharing legislation. Then, this past December, Congress approved and President Obama signed the Cybersecurity Act of 2015. The Cybersecurity Act provides liability protections to businesses to incentivize them to share cyberthreat informati...
<urn:uuid:1632c4c4-fb95-4cf5-8fa9-2b4addfc8a04>
CC-MAIN-2017-09
http://www.cuinfosecurity.com/interviews/2016-year-cyberthreat-info-sharing-i-3040
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00548-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934769
283
2.53125
3
February 6, 2017 While the World Wide Web is clearly a web, it has not traditionally been presented visually as such. Digital Trends published an article centered around a new visualization of Wikipedia, Race through the Wikiverse for your next internet search. This web-based interactive 3D visualization of the open so...
<urn:uuid:ee6988a9-2b9b-49b3-b6fd-4b8b8b0a1aac>
CC-MAIN-2017-09
http://arnoldit.com/wordpress/category/internet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00421-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944607
718
3.09375
3
One of the drawbacks of electric vehicles (EV) is that it can take up to 8 hours to fully charge their lithium-ion batteries. Swiss researchers, however, say that by increasing the electrical charge, EVs can potentially be fully charged in about 15 minutes. In a paper published today, researchers from the Ecole Polytec...
<urn:uuid:1897a386-f4b2-4bed-bf11-1366b1236a55>
CC-MAIN-2017-09
http://www.itnews.com/article/3025341/car-tech/researchers-move-closer-to-charging-an-ev-as-fast-as-filling-a-tank-of-gas.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00297-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946923
701
3.15625
3
The ubiquitous antenna was all the buzz last week as Apple tried to squelch the latest glitch in its popular iPhone. But those antenna issues have nothing on the renovations NASA is taking on to reinvigorate its 70-meter-wide (230-foot-wide) "Mars antenna." The antenna, a key cog in NASA's Deep Space Network, needs abo...
<urn:uuid:a7e6cd60-dd63-4bca-8b4f-5f733dbe639c>
CC-MAIN-2017-09
http://www.networkworld.com/article/2231356/security/no-iphone-bumpers-here--nasa-revamps-historic-9-million-lb-mars-antenna.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00297-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939648
562
2.703125
3
In 1905, Albert Einstein derived that light was composed of particles by fitting his theory to just a handful of data points. This discovery changed our understanding of basic physics and helped usher in a new era of quantum mechanics. Today, scientists often need to interpret much larger data sets to drive discoveries...
<urn:uuid:dff98eb5-8446-47a5-80af-e7fa8c0320a2>
CC-MAIN-2017-09
http://www.nextgov.com/big-data/2013/02/big-data-leading-scientists-ask-bigger-questions/61467/?oref=ng-dropdown
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00473-ip-10-171-10-108.ec2.internal.warc.gz
en
0.978058
376
3.3125
3
The Swiss National Supercomputing Center (CSCS) is going to upgrade its supercomputer with Nvidia GPUs to more accurately predict the weather in the steep mountains of the Swiss Alps. By upgrading the Cray XC30 system, the CSCS wants to enable national weather service MeteoSwiss to accurately predict the weather in sma...
<urn:uuid:94ea4201-2a3a-4a83-9e00-71c98354c86d>
CC-MAIN-2017-09
http://www.itworld.com/article/2713796/hardware/swiss-supercomputer-aims-to-predict-mountain-weather-with-help-of-gpus.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00649-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935282
696
3.09375
3
The idea is cool enough - build a reusable aircraft-like system that could easily and relatively cheaply launch satellites into orbit. The kinks will be that the system need do that for somewhere in the $5 million per launch range and oh yeah, go well over Mach 10. As you might have guessed, the project to develop such...
<urn:uuid:f06b994a-2b31-408d-bb5c-18b47c0dca6a>
CC-MAIN-2017-09
http://www.networkworld.com/article/2225388/security/darpa-hunts-airplane-like-spacecraft-that-can-go-mach-10.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172831.37/warc/CC-MAIN-20170219104612-00649-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920956
1,177
2.953125
3
by Mark Gavin For the most part; the basic layout of a PDF file can be fairly simple. A PDF file consists of four primary sections as illustrated below: The PDF file “Header” is just one or two lines starting with %PDF. The “Body” is a collection of objects which include the page contents, fonts, annotations, etc. The ...
<urn:uuid:1e65107b-584f-440b-ae05-6299608f2497>
CC-MAIN-2017-09
https://labs.appligent.com/pdfblog/pdf_basic_file_layout/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00173-ip-10-171-10-108.ec2.internal.warc.gz
en
0.886151
450
2.9375
3
In 1988 Garth Gibson at the University of California, Berkeley, co-authored a paper titled “A Case for Redundant Arrays of Inexpensive Disks (RAID) [PDF],” which outlined the basic principles of using big, cheap disks to increase data reliability and I/O performance. RAID went on to become a widely adopted storage tech...
<urn:uuid:2531334d-09a1-4531-80f6-db2309e3b3b2>
CC-MAIN-2017-09
https://www.hpcwire.com/2007/10/12/panasas_invents_tiered_parity-1/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00173-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938095
1,302
2.796875
3
There are many definitions to certain common terms associated with healthcare information exchange. These are definitions that I am using in preparing the “simple interop” series of posts. These definitions will not necessarily be suitable for other purposes and are not necessarily consistent with the other sources, in...
<urn:uuid:67587bc6-9857-449d-a8c4-351a54b6f914>
CC-MAIN-2017-09
http://blogs.gartner.com/wes_rishel/2009/12/30/simple-interop-definitions/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00117-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93454
1,634
2.546875
3
GCN LAB IMPRESSIONS E.T. phone me: Join the search for alien life Advances in computing technology have made it possible for anyone with a PC to listen for signals from the stars. - By John Breeden II - Apr 22, 2010 For years the SETI program (Search for Extraterrestrial Intelligence) has been looking for life among th...
<urn:uuid:80afcd47-d981-46c7-a209-67a2b023c58f>
CC-MAIN-2017-09
https://gcn.com/articles/2010/04/22/seti-opens-et-quest-to-anyone.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00117-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958262
683
2.75
3
NASA scientists have seen evidence that there's been sledding on Mars. No, They don't mean there are Martians on toboggans. What NASA scientists have found is that hunks of frozen carbon dioxide, also known as dry ice, may have slid down Martian sand dunes on cushions of gas, like a miniature hovercraft. The sliding di...
<urn:uuid:061aa7d8-9ce3-402f-b1ba-711520312590>
CC-MAIN-2017-09
http://www.networkworld.com/article/2167215/data-center/nasa-spots-sledding-marks-in-martian-sand-dunes.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00169-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943307
625
3.46875
3
NTP: It's About Time Perhaps one of the most overlooked elements of network management is that of time synchronization. If its importance in the overall health of the network were better understood, then perhaps it would be paid more attention. In this article, I'll discuss time synchronization and the Network Time Pro...
<urn:uuid:6bf768a4-75bd-45d6-b316-6996d5ca6f72>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsysm/article.php/625401/NTP-Its-About-Time.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00345-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951888
1,437
3.15625
3
The National Aeronautics and Space Administration The National Aeronautics and Space Administration is responsible for the U.S. space program, including space travel, research and military aerospace programs. The agency was established in 1958. October 8, 2014 The first American woman to walk in space shares her experi...
<urn:uuid:87ed7170-fa21-4ba9-b9bf-01da7bda7295>
CC-MAIN-2017-09
http://www.nextgov.com/emerging-tech/national-aeronautics-and-space-administration/41122/?oref=ng-trending
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00465-ip-10-171-10-108.ec2.internal.warc.gz
en
0.89626
940
3.09375
3
Some of the same social media analyses that have helped Google and the Centers for Disease Control and Prevention spot warning signs of a flu outbreak could be used to detect the rumblings of violent conflict before it begins, scholars said in a paper released this week. Kenyan officials used essentially this system to...
<urn:uuid:dbe33115-b328-4f0e-96b1-a0073f5ee63d>
CC-MAIN-2017-09
http://www.nextgov.com/big-data/2013/04/big-data-can-help-prevent-conflicts/62474/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00517-ip-10-171-10-108.ec2.internal.warc.gz
en
0.932849
328
2.703125
3