text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Windows and Mac OS updates every few years. Windows 7 arrives on October 22nd and Apple's Snow Leopard will show up in September. The Linux kernel, the heart of Linux distributions, however, gets updated every few months.
What this means for you is that Windows and Mac OS are taking large, slow steps, while Linux is co... | <urn:uuid:c66849d6-abe8-4c0f-9fdc-da316ba7aef1> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2482068/open-source-tools/linux-2-6-30-s-best-five-features.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00041-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959321 | 1,346 | 2.59375 | 3 |
If you use an Apple iPhone, iPad or other iDevice, now would be an excellent time to ensure that the machine is running the latest version of Apple’s mobile operating system — version 9.3.1. Failing to do so could expose your devices to automated threats capable of rendering them unresponsive and perhaps forever useles... | <urn:uuid:e3a44b6c-54a9-4ab3-9577-548ac594f907> | CC-MAIN-2017-09 | https://www.alpineweb.com/category/alerts/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00337-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927219 | 618 | 2.515625 | 3 |
Sugar Labs has launched the first beta release of Sugar on a Stick, a new version of the open source Sugar Learning Platform that is designed to boot on conventional desktop computers and run directly from USB flash memory devices.
The Sugar software environment was originally created for the One Laptop Per Child proje... | <urn:uuid:0b0b44a5-e335-4d32-89d5-8d474b9f1110> | CC-MAIN-2017-09 | https://arstechnica.com/information-technology/2009/04/sugar-labs-releases-beta-of-live-usb-learning-environment/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00513-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956118 | 704 | 2.71875 | 3 |
If you feel like you need eyes in the back of your head, there's a crowdsourcing app for that.
Zensors is a smartphone application that can monitor an area of interest by using a camera, crowdsourced workers and artificial intelligence.
Developed by researchers from Carnegie Mellon University and University of Rocheste... | <urn:uuid:54049e40-859e-4245-8ffe-cfe8daf9fe49> | CC-MAIN-2017-09 | http://www.arnnet.com.au/article/573452/zensors-app-lets-crowdsource-live-camera-monitoring/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948777 | 916 | 2.75 | 3 |
A Healthy Approach to the Internet of ThingsBy Samuel Greengard | Posted 2016-02-12 Email Print
The IoT is providing a stream of products aimed at making our lives easier, better and healthier. But some of these items are creating an 'Internet of Garbage.'
As the Internet of things evolves from concept to reality, we'r... | <urn:uuid:ffea600f-680e-4626-9080-0e66d883c1df> | CC-MAIN-2017-09 | http://www.baselinemag.com/blogs/a-healthy-approach-to-the-internet-of-things.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954508 | 562 | 2.921875 | 3 |
It is expected in the near future that an individual customer’s need of symmetric bandwidth of Bi-Directional (BiDi) signals is common place with communication systems of optical transport networks, access networks, wireless backhaul networks, and private transmission networks. Network operators have to meet the custom... | <urn:uuid:8a7c570e-2d59-4e0a-a40c-3a450c350769> | CC-MAIN-2017-09 | http://www.fs.com/blog/ideal-solution-for-wdm-bi-directional-systems-single-wavelength-bidi-transmission-technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923514 | 1,473 | 2.9375 | 3 |
The front end: branch prediction
For reasons of both performance and power efficiency, one of the places where Intel spent a ton of transistors was on Core's branch predictor.
As the distance (in CPU cycles) between main memory and the CPU increases, putting precious transistor resources into branch prediction hardware... | <urn:uuid:b1f10b5e-24de-447b-b7f5-c95887d0b021> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2006/04/core/7/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938446 | 716 | 2.921875 | 3 |
IRENE: Key to unlocking mute recordings
- By William Jackson
- Feb 08, 2012
The idea is simple: Make a high-resolution digital image of a sound recording and develop software to analyze the image and reproduce the effects of a phonograph needle.
Scientists at the Lawrence Berkeley National Laboratory and the Library of... | <urn:uuid:b2d3edcf-8da1-446c-a79b-3fc59269ac23> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/02/06/doe-digital-imaging-sidebar.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933145 | 585 | 2.734375 | 3 |
Information security people think that simply making users aware of security issues will make them change their behavior. But security pros are learning the hard way that awareness rarely equals change.
One fundamental problem is that most awareness programs are created and run by security professionals, people who wer... | <urn:uuid:50db4a74-1221-4f96-a675-4332d89ecd77> | CC-MAIN-2017-09 | http://www.itworld.com/article/2726276/security/ten-commandments-for-effective-security-training.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00157-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957104 | 873 | 2.6875 | 3 |
The interplay of size and time may make carbon nanotubes the answer to the computer industry's prayers as it grapples with pressure to make silicon chips ever-smaller. Or the same factors may turn CNTs into a technological dead end.
Size refers to the dimensions of carbon nanotubes (CNTs) vs. the shrinking geometry of ... | <urn:uuid:b32f3197-ef29-4a32-8624-219382ce0a31> | CC-MAIN-2017-09 | http://www.computerworld.com/article/3002260/emerging-technology/carbon-nanotubes-in-a-race-against-time-to-replace-silicon.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00333-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959049 | 1,408 | 3.8125 | 4 |
By the end of 2016, there are expected to be 6.4 billion connected “things” throughout the world – a number that is up a whopping 30 percent from 2015. By 2020, we should expect the number of connected things to be up to 20.8 billion. This amounts to over 5.5 million new things connected every single day.
These “things... | <urn:uuid:515c81aa-cd0d-4241-b575-83b878cc58fa> | CC-MAIN-2017-09 | https://blog.getkisi.com/what-is-iot/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00033-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924864 | 3,061 | 2.640625 | 3 |
In Macon, Ga., a Mercer University professor is helping NASA and the Federal Aviation Administration develop technology they hope will make traffic control on airport runways and taxiways safer and more efficient.
Behnam Kamali, professor of electrical and computer engineering, has been working with the new technology ... | <urn:uuid:b8c093f3-90c6-400a-a25d-e5a1636e37a1> | CC-MAIN-2017-09 | http://www.govtech.com/transportation/Professor-Helps-NASA-and-FAA-with-Airport-Technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00561-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960058 | 788 | 3.375 | 3 |
The 1950s saw the introduction of automobile seat belts; in the 70s, airbags began showing up in cars. Electronic Stability Controlled rolled out in the late 80s, and the last decade has seen the deployment of radar and camera-based backup assist and blind-spot warning systems.
Auto safety experts say network technolog... | <urn:uuid:b48c826e-cc0f-4591-a579-19f6e51788b6> | CC-MAIN-2017-09 | http://www.itnews.com/article/3072486/internet-of-things/the-future-of-auto-safety-is-seat-belts-airbags-and-network-technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00205-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96142 | 1,523 | 3 | 3 |
A Microsoft Professional Developers Conference panel on the future of programming languages looks at what is on programmers' minds. The PDC panel of experts debates what's best for programmers and languages.
LOS ANGELES-What are some of the most pressing issues facing developers
today, and what can be done with program... | <urn:uuid:313e9ab4-aea0-477e-ba03-5f6eb2ab2893> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Application-Development/Whats-Most-Pressing-for-Programmers | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00201-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922562 | 668 | 2.515625 | 3 |
Homeland Security Tests 360-Degree Video CamThe surveillance system, which uses multiple cameras to provide high-resolution images in real time, is being pilot tested at Logan International Airport.
The Department of Homeland Security has developed new surveillance-camera technology that provides a 360-degree, high-res... | <urn:uuid:4a7be740-242f-4b47-bf71-6bc4564686e1> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/homeland-security-tests-360-degree-video-cam/d/d-id/1088939 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00077-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940042 | 380 | 2.59375 | 3 |
Whether you’re simulating the extreme conditions inside an exploding star or designing an ergonomically innovative office chair, it’s a good bet that a high performance computing (HPC) system and some brain-bending programming will be involved.
The HPC system may be a supercomputer like the 1.6 petaflop Jaguar behemoth... | <urn:uuid:26a6b7fd-ca73-49b8-9b57-29c5e840ae2b> | CC-MAIN-2017-09 | https://www.hpcwire.com/2009/06/23/parallel_programming_is_here_are_you_ready/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00429-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931911 | 2,240 | 2.984375 | 3 |
Ever have a moment in school when you weren’t entirely comfortable raising your hand or adding your perspective during class? It’s happened to most, if not all of us.
Since I’ve been in those shoes, I understand that just because someone doesn’t participate, that doesn’t mean they don’t know the answers or aren’t grasp... | <urn:uuid:483bff52-8a4c-40de-99b4-a423f4a61a39> | CC-MAIN-2017-09 | https://www.jamf.com/blog/how-can-technology-help-introverted-students/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00301-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966478 | 389 | 2.671875 | 3 |
Another Decision Analysis tool is called an influence diagram. It provides a graphical presentation of a decision situation. It also serves as a framework for expressing the exact nature of relationships. The term influence refers to the dependency of a variable on the level of another variable. An influence diagram ma... | <urn:uuid:21c25224-1260-4772-84a5-31447a0efaef> | CC-MAIN-2017-09 | http://dssresources.com/subscriber/password/dssbookhypertext/ch9/page16.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.904841 | 263 | 3.671875 | 4 |
An article published in the Seattle Post-Intelligencer yesterday evening describes a patent application from European aerospace company Airbus in which pilots fly aircraft entirely through electronic means. The patent application, number US20140180508 A1, is titled "Aircraft with a cockpit including a viewing surface f... | <urn:uuid:568c377d-95cd-483d-92d1-56f8d21172f5> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2014/07/airbus-submits-patent-application-for-windowless-jet-cockpit/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956958 | 604 | 2.96875 | 3 |
Neutrinos carry text message through solid rock
- By Greg Crowe
- Mar 15, 2012
Arthur C. Clarke is commonly attributed with the invention of the communications satellite as a means of relaying radio signals between far off points on the surface of the Earth. We have since generally used this method for all of our long-... | <urn:uuid:f677fc35-4aaf-46b9-934a-92e67ce06144> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/03/15/neutrinos-message-through-solid-stone.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00174-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963042 | 540 | 3.421875 | 3 |
Today is World Information Society Day, which aims to raise global awareness of societal changes brought about by the Internet and new technologies. In relation to this, Kaspersky Lab warns of the dangers posed by cybercriminals and offers tips for a secure and pollution-free digital life.
Using social networks, bankin... | <urn:uuid:8092c302-0972-455d-96d6-aa06d3ee9e45> | CC-MAIN-2017-09 | http://www.kaspersky.com/au/about/news/business/2010/Keep_your_digital_life_safe_warns_Kaspersky_Lab_at_the_World_Information_Society_Day | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00418-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.841768 | 723 | 3.25 | 3 |
Attorney General Kamala D. Harris released the first report detailing the 131 data breaches reported to her office in 2012, showing that 2.5 million Californians had personal information put at risk through an electronic data breach.
The report found that 1.4 million Californians would have been protected if companies ... | <urn:uuid:9e595c8c-e73b-4459-a443-1f05b9b1deb5> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/07/03/25-million-californians-had-personal-info-compromised/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00594-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953735 | 842 | 2.59375 | 3 |
NASA launched a $1.5 million competition to see who can build the best space robot.
The space agency announced Thursday that it's teaming with Worcester Polytechnic Institute to challenge teams from academia and industry to build a smart robot that can locate and retrieve geologic samples while maneuvering over rugged ... | <urn:uuid:6f722552-c152-49b7-ba3e-7ef810d9ac8f> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2484801/emerging-technology/nasa-calls-on-researchers-to-build-smarter-space-robot.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00522-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934595 | 566 | 2.921875 | 3 |
Basic errors put patients at risk of serious harm
Thursday, Dec 12th 2013
A new report found that several thousand patients may have been exposed to serious harm for a number of years due to basic errors in safety and quality standards. The research was performed by professor Stephen Field, the chief inspector of gener... | <urn:uuid:31c1b8ac-d08a-4ef0-8554-eb99fdf7b8d1> | CC-MAIN-2017-09 | http://www.itwatchdogs.com/environmental-monitoring-news/healthcare/basic-errors-put-patients-at-risk-of-serious-harm-552984 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00522-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.974572 | 546 | 2.671875 | 3 |
Weather forecasting has come a long way since June of 1977, when the European Centre for Medium Range Weather Forecasts (ECMWF) first contracted Cray to deliver one of its early Cray-1A systems across the pond. This was the first time a Cray found its way to the old country—an installation that set the stage for a numb... | <urn:uuid:af8af61d-caf9-4ee3-b73a-3f8e53cc42eb> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/02/16/cray-goes-back-future-weather-forecasting/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00522-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954215 | 1,746 | 2.71875 | 3 |
Intego has been examining several samples of new Mac malware, Tibet.C, which uses Word documents to install a backdoor on Macs. The infected Word files look like real files when users double-click them - they display text just like regular Word files - but actually contain three parts, that are concatenated within the ... | <urn:uuid:db0cf8c3-4418-4757-9ee4-9235d4ed6fa2> | CC-MAIN-2017-09 | https://www.intego.com/mac-security-blog/tibet-c-malware-delivered-by-poisoned-word-documents-installs-backdoors-on-macs/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00342-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945092 | 840 | 2.515625 | 3 |
That depends on their configurations. For example:
While it makes very good sense to include redundant physical links in a network, connecting switches in loops, without taking the appropriate measures, will cause havoc on a network. Without the correct measures, a switch floods broadcast frames out all of its ports, c... | <urn:uuid:f74b85c7-8c03-47ff-b150-0b4b59740188> | CC-MAIN-2017-09 | http://blog.globalknowledge.com/2012/10/11/what-happens-if-i-have-more-than-one-switch-with-redundant-links/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00462-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922943 | 621 | 2.75 | 3 |
Imagine roadways that generate three times the nation's power needs, melt snow in the winter and have embedded LED lighting that can offer driver alerts and be reconfigured depending on road conditions.
That's the technology that Scott and Julie Brusaw, co-founders of Solar Roadways, are currently testing. In fact, the... | <urn:uuid:6605a277-a881-41c6-9194-df7196f3b80a> | CC-MAIN-2017-09 | http://www.itworld.com/article/2699244/green-it/you-could-one-day-be-driving-on-energy-generating-smart-streets.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00638-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955133 | 1,853 | 2.734375 | 3 |
Wednesday’s 24-hour worldwide test of IPv6, the next-generation Internet addressing standard, is sure to yield valuable data and some unexpected results. Government agencies and other public entities that are participating in World IPv6 Day could also see some effects, such as citizens who have trouble accessing public... | <urn:uuid:3808fbc9-3081-44b0-a00c-0af0dab723a4> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/World-IPv6-Day-Should-Bring-Surprises.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00210-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952666 | 1,141 | 2.59375 | 3 |
Recently, I stumbled upon a question related to the behavior of a given program. That program was Mozilla Firefox and the behavior in question was how profile directory names were generated. Through this post, I will cover how to approach this question and how to solve it with available resources (source code).
How are... | <urn:uuid:4a468df0-c3d6-4cd8-8fed-b9a8de24724c> | CC-MAIN-2017-09 | http://www.4n6k.com/2014_03_01_archive.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00562-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941091 | 1,094 | 2.671875 | 3 |
Astronauts on the International Space Station began unloading cargo from the SpaceX Dragon capsule on Monday, a day after the commercially delivered capsule was attached to the station.
Tom Marshburn, a space station astronaut and flight engineer, opened the hatch to the Dragon on Sunday, enabling Commander Kevin Ford ... | <urn:uuid:e304431e-9bf6-42b9-9fdf-fa791a5ee21c> | CC-MAIN-2017-09 | http://www.itworld.com/article/2712940/hardware/after-robotic-arm-grabs-spacex-dragon--unloading-begins.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00562-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.912463 | 570 | 2.765625 | 3 |
What is Business Process Management?
Business Process Management (BPM) is the epitome of the popular business cliché: “Work smarter, not harder.” It is the practice of using computer software to assist a business with conducting its work. It allows employees to work smarter by letting the BPM system handle logistics an... | <urn:uuid:17959a7e-be02-48ad-8dbc-46b6bb98849e> | CC-MAIN-2017-09 | https://naviant.com/ecm-101-education-guide/ecm-common-terminology/what-is-bpm/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00206-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950223 | 255 | 2.75 | 3 |
Connecting New Users – Internet Safety First
I am all for Connecting New Users, i.e. the World as long as we also Communicate the Risks and Dangers Associated with Internet Connectivity to our Children, Families, Other Users and Online Businesses
- Internet Crime: Security Threats, Scams, Fraud
- Ransomware, DDoS Attac... | <urn:uuid:f9309a6c-af59-478c-8bd1-ef1becf2ba39> | CC-MAIN-2017-09 | http://internetcrimefightersorg.com/connecting-users/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00202-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887908 | 1,343 | 2.53125 | 3 |
What is IT Benchmarking?Performance benchmarks can be likened to government mileage estimates for automobiles. Actual performance in a customer environment with a customer workload will be different. Just because a particular database benchmark says a configuration can support 5,000 concurrent users or 8,000 transactio... | <urn:uuid:d8fdfecf-b3b1-458a-86c0-f17f99b23d62> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Enterprise-Applications/How-to-Understand-and-Use-Benchmarking/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00202-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.884456 | 449 | 2.625 | 3 |
The conventional office can be a fixed and rather limiting place. Workers must all meet in the same location and start at the same time. A modern office, however, is far more flexible and promotes business on the move. It allows remote staff to work the hours that suit them. All this is achievable thanks to new technol... | <urn:uuid:b843dd62-3970-42a9-82cf-3adcb8cb1df5> | CC-MAIN-2017-09 | http://www.2-spyware.com/news/post4254.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00378-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960915 | 573 | 2.515625 | 3 |
The US Department of Energy (DOE) will be the most likely recipient of the initial crop exascale supercomputers in the country. That would certainly come as no surprise, since according the latest TOP500 rankings, the top three US machines all live at DOE labs – Sequoia at Lawrence Livermore, Mira at Argonne, and Jagua... | <urn:uuid:d1716723-5e01-457c-9935-b7c2b7c57726> | CC-MAIN-2017-09 | https://www.hpcwire.com/2012/06/21/exascale_computing:_the_view_from_argonne/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00378-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946999 | 4,490 | 2.859375 | 3 |
A group of silkworm moths, coached by researchers at the University of Tokyo, just took a driving test. Instead of their moms' old minivans, however, they were given another machine: a robot.
The idea of all this wasn't so much to test the robomoths' driving capabilities -- moths are notoriously aggressive drivers, aft... | <urn:uuid:d49510bc-43bb-4090-a9ea-bfa0ce0a503d> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2013/02/good-science-bad-your-nightmares-moths-drive-robots/61138/?oref=ng-skybox | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00554-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969893 | 337 | 3.078125 | 3 |
InfiniBand goes the distance
- By Joab Jackson
- Dec 23, 2008
Researchers at the Energy Department's Oak Ridge National Laboratory have shown that InfiniBand can be used to transport large datasets via a dedicated network thousands of miles in length with a throughput unmatched by high-speed TCP/IP connections.
In a te... | <urn:uuid:fc70995e-dd77-4abe-b746-17f18e40d18b> | CC-MAIN-2017-09 | https://gcn.com/Articles/2008/12/23/InfiniBand-goes-the-distance.aspx?Page=1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00078-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941866 | 834 | 2.8125 | 3 |
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The transistor should become part of wireless communications chips running at about 150GHz in about two years and promises better Internet connectivity and lower p... | <urn:uuid:1e788b45-b897-404f-a521-654d30ce45ba> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/2240048252/IBM-speeds-up-transistor-for-wireless-chips | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00254-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916495 | 187 | 3.53125 | 4 |
Typically the stuff of mystery, a real flying saucer could appear over the Hawaiian island of Kauai later this week, but it won't be coming from outer space. The rocket-powered, saucer-like craft is part of a NASA project that could aid missions to other planets.
The craft, called the Low-Density Supersonic Decelerator... | <urn:uuid:add2778c-2890-4b65-af8b-149691613fce> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2491209/data-center/nasa-to-send-flying-saucer-on-first-flight-this-week.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00606-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95258 | 459 | 3.0625 | 3 |
What's a "smart city"?
It's a fair question, but a hard one to answer.
Many larger municipalities have embraced the "smart city" concept in recent years, but definitions of the term -- and examples of the ways technology is being used to make cities "smart" -- run the gamut. Mayors and city CIOs usually talk about usin... | <urn:uuid:d227cb34-5881-43b3-a87c-cf6d62c1f388> | CC-MAIN-2017-09 | http://www.cio.com.au/article/585801/just-what-smart-city/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00126-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966821 | 1,323 | 2.625 | 3 |
60GHz: A Frequency to Watch
It's now likely that 60GHz will become the next big frequency in wireless world, with both short-range and wider area applications ahead for the tiny beams of this unlicensed millimeter radio technology.
The frequency -- part of the V-Band frequencies in the US -- is considered among the mil... | <urn:uuid:9eba09e4-6936-4780-90b5-9ede75f5235b> | CC-MAIN-2017-09 | http://www.lightreading.com/mobile/backhaul/60-ghz-a-frequency-to-watch/d/d-id/709910?_mc=RSS_LR_EDT | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00123-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925382 | 899 | 2.625 | 3 |
The same concepts that have lead to open source rockin' the software world have spawned the beginning of a revolution in biotech. An organization called Biofab, funded by the NSF and run through teams at Stanford and Berkeley, is applying open development approaches to creating building blocks (BioBricksTM from BioBric... | <urn:uuid:1e2d5e59-713b-4fc1-b098-8a436f47e536> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2229234/opensource-subnet/great-news---now-you-can-download-your-very-own-e--coli-bacterium.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00295-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951375 | 796 | 2.96875 | 3 |
There is a much-derided and apocryphal story that former US vice president Al Gore once claimed to have invented the Internet. In fact, he simply said that he had promoted the development of the technology in Congress – a claim that has been corroborated by the Internet’s actual inventors, Vint Cerf and Bob Kahn.
Futur... | <urn:uuid:5993c967-847c-4966-8bb2-b946dd7a24f4> | CC-MAIN-2017-09 | http://www.information-age.com/ibm-cisco-and-the-business-of-smart-cities-2087993/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00647-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952712 | 1,686 | 2.515625 | 3 |
There are many ways to keep your computer secure. Your own behavior affects it a lot and we at F-Secure are happy to help protecting you with our products. But there are also many tools that can improve your security even if that wasn’t their initial purpose. Melissa and Sean described how you can use separate browsers... | <urn:uuid:553f302b-46d7-4223-98b9-0a1540849166> | CC-MAIN-2017-09 | https://safeandsavvy.f-secure.com/2013/12/13/virtual-computer-real-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00523-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938053 | 723 | 3.03125 | 3 |
Special Fiber is constructed with a non-cylindrical core or cladding layer, such as Polarization Maintaining Fiber (or PM fiber) and fiber designed to suppress whispering gallery mode propagation.
The Special Points Of PM fiber
PM fiber is a specialty optical fiber with strong built-in birefringence, preserving the pro... | <urn:uuid:6eed0f9a-4770-40a9-badb-434deab9e213> | CC-MAIN-2017-09 | http://www.fs.com/blog/polarization-maintaining-fiber-of-special-fiber.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00115-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924039 | 683 | 3.125 | 3 |
A traditional method for checking water height after a flood involved manually marking water levels on a post from a rowboat. Samuel Cox had a better idea: Flood Beacon. He assembled a microprocessor, accelerometer, ultrasonic sensors, rechargeable battery, cellular GSM and GPS into a floating shell created on a 3D pri... | <urn:uuid:8b400ad8-fc77-46aa-809d-bfd987c6b34a> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2462865/data-center/154918-Ten-things-about-things.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00115-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944256 | 162 | 3.3125 | 3 |
Sixty years after bulky "rabbit ears" TV antennas, engineers are designing tiny custom ones that can fit inside of wearable devices.
Some of the wearables will be implanted inside the human body for medical purposes, posing challenges for antennas that carry a Bluetooth wireless signal through skin, muscle and bone to ... | <urn:uuid:8c0851be-e017-4968-a25c-0190a1f28350> | CC-MAIN-2017-09 | http://www.itworld.com/article/2698790/mobile/inside-the-world-of-designer-antennas-for-wearables.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00467-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950498 | 1,181 | 3.21875 | 3 |
While most people are busy singing the praises of HTML5 and all the nifty things the programming language can do, there are some who are warning about the dangers of using the technology. While there is still just a tiny fraction of the mobile apps being built using HTML5, those applications are said to pose a threat t... | <urn:uuid:e230cd6f-6f26-4d42-8566-a71535f7c353> | CC-MAIN-2017-09 | http://www.html5report.com/topics/html5/articles/375311-html5-apps-bringing-new-dangers-mobile-devices.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00343-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962786 | 444 | 2.671875 | 3 |
Internet Explorer is a browser developed by Microsoft. Windows Internet Explorer (formerly Microsoft Internet Explorer) is based on the Trident render engine.
Internet Explorer Collection contains multiple IE versions, which are standalone so they can be used at the same time. This is useful for web developers. Conditi... | <urn:uuid:23894a03-c958-4058-87cb-708d9d6dd5c8> | CC-MAIN-2017-09 | https://fileforum.betanews.com/detail/Internet-Explorer-Collection/1217189605/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00043-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922444 | 646 | 2.578125 | 3 |
Here's how you can rearrange tiles in Windows 8. 1. To move a tile, drag it up or down. 2. Drag the tile anywhere you want. 3. You arrange your tiles in any way that you like. 4. You can group tiles however your like as well.
For more, see the original article at the link below.
Windows 8 Tips | Microsoft | <urn:uuid:59717ae7-d5cb-471f-82a7-3a811e9262ac> | CC-MAIN-2017-09 | http://www.itworld.com/article/2719680/windows/rearrange-windows-8-tiles.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00163-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.872957 | 78 | 2.515625 | 3 |
Population Health Management: All you need to know about
What is Population Health Management?
PHM can be broadly defined as “operational processes designed to foster health and quality improvements while managing costs (McAlearney, 2003).” Thus Population Health Management is the aggregation of patient data across mul... | <urn:uuid:4cde23d1-f213-47bb-9c4f-c3a84cec7e11> | CC-MAIN-2017-09 | http://www.altencalsoftlabs.com/blogs/2016/04/01/population-health-management-all-you-need-to-know-about/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00039-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92279 | 450 | 2.953125 | 3 |
The recent wave of high profile data breaches and Internet of Things attacks has put organizations – especially financial institutions – under extraordinary pressure to ensure that their systems are secure and their data is protected.
For banks and other financial institutions, this means conducting regular security as... | <urn:uuid:4f313612-1375-4070-9d07-0ee757728a4f> | CC-MAIN-2017-09 | http://www.banktech.com/how-to-leverage-penetration-testing-for-cyber-security-assessments/a/d-id/1296968 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00039-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933185 | 945 | 2.515625 | 3 |
The U.S. military is working to create a chip that can be implanted in a soldier's brain to connect it directly to computers that can deliver data on an enemy's position, maps and battle instructions.
The implanted chip would essentially create soldier cyborgs that would be safer and better fighters.
"Today's best brai... | <urn:uuid:4b5adc93-8ea7-4c45-b053-b07ce9f117ca> | CC-MAIN-2017-09 | http://www.itnews.com/article/3025321/emerging-technology/us-military-wants-to-create-cyborg-soldiers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00159-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938061 | 633 | 3.265625 | 3 |
Back before Apple Inc. made computers that fit in your pocket, it made computers that fit on your desk. Some were big-box machines, others were not so portable portables and still others were -- literally -- cube-shaped. But the first Macintosh, the one that started Apple's rise to iconic status, is to the computer ind... | <urn:uuid:d4fdd63a-1be2-450f-8b97-7e4bf81919b0> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2530440/computer-hardware/opinion--the-top-10-standout-macs-of-the-past-25-years.html?nsdr=true | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00335-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966093 | 863 | 2.609375 | 3 |
In the aftermath of the 2008 financial crisis, regulators across the globe began assessing the root causes and seeking regulatory prophylaxis to mitigate the risk of recurrence. Much attention was ultimately focused on the regulation of over-the-counter derivatives, particularly swaps. In this context, swaps are financ... | <urn:uuid:10dc7916-2795-4119-b5ef-d2a360c352d3> | CC-MAIN-2017-09 | http://nexidia.com/knowledge-center/a-review-of-swap-transactions/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00511-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93423 | 139 | 2.546875 | 3 |
Stuxnet, Duqu Date Back To 2007, Researcher SaysTwo pieces of malware likely were developed by the same team on the same platform along with similar variants, according to Kaspersky Lab.
(click image for larger view)
Slideshow: 10 Massive Security Breaches
The origins of the dangerous Stuxnet computer virus that target... | <urn:uuid:b4345511-9e21-4947-95dc-98ece5d7a1a4> | CC-MAIN-2017-09 | http://www.darkreading.com/vulnerabilities-and-threats/stuxnet-duqu-date-back-to-2007-researcher-says/d/d-id/1102015?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00035-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954916 | 586 | 2.71875 | 3 |
The Napa Valley Unified School District has been using a hybrid diesel-electric school bus for nearly a year and has seen significant benefits. With the diesel-electric bus, the school district has been able to reduce its green house gas emissions and double the gas mileage it gets with the hybrid bus as compared to it... | <urn:uuid:c9e09a9c-8305-4e3a-a727-91684560eed1> | CC-MAIN-2017-09 | http://www.govtech.com/products/Napa-Valley-Calif-School.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00207-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971081 | 832 | 2.546875 | 3 |
Preservation Road: Visual and audio records say more than text ever could
The hundreds of tourists who line up outside the National Archives to see the original U.S. Constitution and Declaration of Independence are a daily testament to how much Americans cherish their official history. What they see inside also shows t... | <urn:uuid:bf099f5e-889a-43e2-bf21-9ac5fb547264> | CC-MAIN-2017-09 | https://fcw.com/articles/2010/02/08/cover-story-preservation-audio-visual-records-federal-agencies.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00207-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942924 | 2,639 | 3.3125 | 3 |
Political candidates aren't the only ones hoping to sway voters this election season; plenty of other groups are engaging in campaigns -- and those efforts are increasingly driven by big data, even at smaller organizations with limited resources.
The Sierra Club, for instance, doesn't have the resources of a national p... | <urn:uuid:35c74514-d424-4d0b-814a-335290f33433> | CC-MAIN-2017-09 | http://www.itworld.com/article/2719660/big-data/campaign-2012--mining-for-voters.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00203-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959441 | 2,116 | 2.796875 | 3 |
The System Bus
The System Bus is one of the four major components of a computer.
This logical representation is taken from the textbook.
system bus is used by the other major components to communicate
data, addresses, instructions, and control signals.
The CPU: A High–Level Description
Just how does the CPU interact wi... | <urn:uuid:10a0cac8-528b-4933-92df-0b97b0d61a17> | CC-MAIN-2017-09 | http://edwardbosworth.com/My5155_Slides/Chapter12/SystemBusFundamentals.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00379-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925029 | 1,472 | 3.828125 | 4 |
At the OFC 2014 Conference in San Francisco, Huawei introduced a 400G WDM prototype for ultra-long-haul transmission that employs Faster Than Nyquist (FTN) technology to increase the 400G transmission distance beyond 3000 km.
Huawei said its FTN technology breaks the limit of the Nyquist sampling theorem, which defines... | <urn:uuid:b068264c-347c-41de-8a46-c5f311128b11> | CC-MAIN-2017-09 | http://www.convergedigest.com/2014/03/huaweis-400g-wdm-prototype-promises.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00431-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.856674 | 337 | 2.59375 | 3 |
Updated rules to avoid phishing scams
By now, you’ve probably seen an example or two of a phishing attempt. Maybe it was an e-mail message that asked you to quickly follow a mysterious URL to “verify your account” or “confirm billing information.” Once you have clicked on the link or supplied personal information, the ... | <urn:uuid:494bd260-8773-4b9c-8281-5f2717b17717> | CC-MAIN-2017-09 | http://news.centurylink.com/blogs/security/updated-rules-to-avoid-phishing-scams | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00131-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931035 | 730 | 2.609375 | 3 |
Efforts to reuse the heat that data center operators work so hard to extract are nothing new. But officials in Seattle are hoping to take things one step further.
The Seattle Office of Sustainability & Environment is developing a plan to reuse waste heat from nearby data centers and other sources to power a so-called “... | <urn:uuid:372ba054-1e5c-43d9-8f8c-a81a704473ce> | CC-MAIN-2017-09 | http://www.networkcomputing.com/data-centers/seattle-plans-warm-city-data-center-waste-heat/1935830278 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00551-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937995 | 187 | 2.8125 | 3 |
Anatomy of the Linux kernel
History and architectural decomposition
Given that the goal of this article is to introduce you to the Linux kernel and explore its architecture and major components, let's start with a short tour of Linux kernel history, then look at the Linux kernel architecture from 30,000 feet, and, fina... | <urn:uuid:71aea265-1515-4588-bd0f-3d7ee16ba873> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/linux/library/l-linux-kernel/?S_TACT=105AGX59&S_CMP=GR&ca=dgr-btw01LKernalAnatomy | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00127-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927827 | 2,632 | 3.53125 | 4 |
NASA to test Google 3D mapping smartphones
- By Kathleen Hickey
- Mar 27, 2014
Project Tango, Google’s prototype 3D mapping smartphone, will be used by NASA to help the international space station (ISS) with satellite servicing, vehicle assembly and formation flying spacecraft configurations.
NASA’s SPHERES (Synchroniz... | <urn:uuid:61221c98-bd7e-4515-9b27-6ba0fad8fd23> | CC-MAIN-2017-09 | https://gcn.com/articles/2014/03/27/nasa-google-tango.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00303-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.894461 | 602 | 2.828125 | 3 |
Traditional cyber security is proving an increasingly inadequate response to the modern cyber threat landscape. It’s no longer sufficient to suppose that you can defend against any potential attack; you must accept that an attack will inevitably succeed. An organisation’s resilience to these attacks – identifying and r... | <urn:uuid:c46c3ea6-2517-4b4b-9efa-f6d04bb112d9> | CC-MAIN-2017-09 | https://www.itgovernance.asia/cyber-resilience | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00072-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920994 | 880 | 2.890625 | 3 |
For some people, deconstructing a computer can lead to a tangled mess of wires. Yet others are finding that by rewiring or recycling their Macs they're stumbling upon some very creative projects.
More than just information storage facilities, computers also function as brains. A group consisting of more than a dozen st... | <urn:uuid:52892589-2bd3-4ab3-a6ec-bdec58427a50> | CC-MAIN-2017-09 | http://www.cio.com/article/2431158/apple/don-t-want-to-throw-out-your-old-mac-computer--you-aren-t-alone-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00424-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.973271 | 1,447 | 3.125 | 3 |
FPipe v2.1 - Port redirector.
FPipe is a source port forwarder/redirector. It can create a TCP or UDP stream with a source port of your choice. This is useful for getting past firewalls that allow traffic with source ports of say 23, to connect with internal servers.
Usually a client has a random, high numbered source ... | <urn:uuid:f3d76303-56ee-4db7-8e79-f55d6a717326> | CC-MAIN-2017-09 | https://www.mcafee.com/sg/downloads/free-tools/fpipe.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00000-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887201 | 1,131 | 3.0625 | 3 |
Google and IBM announced today that the two companies have partnered to offer millions of dollars in resources to universities in order to promote cloud computing projects. The companies say that the goal is to improve students' knowledge of parallel computing practices and better prepare them for increasingly popular ... | <urn:uuid:00bb9077-8c1e-4f2e-98b6-3f31d1164800> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2007/10/google-and-ibm-team-on-cloud-computing-initiative-for-universitiesgoogle-and-ibm-team-on-cloud-computing-initiative-for-universities/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00176-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965062 | 777 | 2.6875 | 3 |
Microsoft has released a quick fix for a vulnerability in older versions of its Internet Explorer browser that is actively being used by attackers to take over computers.
The vulnerability affects IE versions 6, 7 and 8. The latest versions of the browser, 9 and 10, are not affected. The company occasionally issues qui... | <urn:uuid:832b54cc-204c-4383-af8d-138156b1c80c> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2494287/malware-vulnerabilities/microsoft-issues--fix-it--for-ie-vulnerability.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00348-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95325 | 419 | 2.625 | 3 |
After learning the last week’s blog post about submarine cables, we know that as of 2014, there are 285 communications cables at the bottom of the ocean, and 22 of them are not yet in use. And these un-used cables are called “dark cables” or “dark fiber” for fiber cable (we will mainly talk about dark fiber in this pap... | <urn:uuid:cc2a3c17-9203-4bc5-8697-a162dcf1140a> | CC-MAIN-2017-09 | http://www.fs.com/blog/an-infographic-tells-you-what-is-dark-fiber.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00168-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948659 | 267 | 3.5625 | 4 |
DARPA out to break the 1 THz barrier for solid-state receivers
The Defense Advanced Research Projects Agency (DARPA) is on a mission to create the first solid-state transistor-based receiver that will achieve gain at frequencies of over 1 terahertz (THz). Earlier this year researchers came closer than ever before, maki... | <urn:uuid:b16e8ecd-bad6-4744-bb23-4795c6b16ff3> | CC-MAIN-2017-09 | https://gcn.com/blogs/mobile/2012/10/darpa-to-break-1-thz-barrier-for-solidstate-receivers.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00168-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939443 | 394 | 2.765625 | 3 |
For the second day in a row, an asteroid is buzzing past Earth.
NASA announced that an asteroid measuring about 25 feet across will pass safely past Earth today at 4:21 p.m. ET. The asteroid, dubbed 2014 EC, is expected to approach the Earth at a distance six times closer than the moon.
The news comes just a day after ... | <urn:uuid:af06bfae-d9d4-4630-90ea-aa836e3c939d> | CC-MAIN-2017-09 | http://www.cio.com/article/2378110/government/another-asteroid-buzzes-by-earth-today.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00464-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940268 | 453 | 3.34375 | 3 |
Explore new firmware that’s helping organizations see attacks as they happen.
Security attacks are constantly evolving, making it harder for your intrusion detection and prevention systems (IDS and IPS, respectively) to keep pace. Network security professionals have been contending with a variety of vulnerabilities for... | <urn:uuid:adbd909b-5ce9-4326-8f5e-1db962a13bf0> | CC-MAIN-2017-09 | http://www.datacomsystems.com/news-events/news/2015/nov/3/explore-new-firmware-that-s-helping-organizations-see-attacks-as-they-happen | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00464-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942787 | 594 | 2.71875 | 3 |
In this PGP encrypted hard drive recovery case study, the client had used full-drive encryption to secure the data on their laptop. With Symantec PGP whole disk encryption, the entirety of their hard drive was password-protected. PGP encryption, also known as “Pretty Good Privacy” encryption, was invented by Phil Zimme... | <urn:uuid:d303c59d-306d-4f83-b529-2ce87dc6e9ec> | CC-MAIN-2017-09 | https://www.gillware.com/blog/data-recovery-case/pgp-encrypted-hard-drive-recovery-case-study/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00040-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955681 | 1,154 | 2.84375 | 3 |
The launch of Sputnik in October 1957 had forced the United States to dramatically accelerate its space program. Its first successful satellite, Explorer I, entered orbit on 31 January 1958. The space program had advanced considerably by the 1970s. Between January 1971 and May 1975, for example, a civilian program laun... | <urn:uuid:b3c00cad-a3ba-4879-a034-6e9fdb3941ca> | CC-MAIN-2017-09 | https://arstechnica.com/tech-policy/2011/03/the-essence-of-the-net/2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00036-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966155 | 2,435 | 3.53125 | 4 |
Architectural manifesto, Adopting agile development, Part 4
Using user stories to define project requirements
From the developerWorks archives
Date archived: December 15, 2016 | First published: July 01, 2008
In Part 4 of this series, learn about how to define requirements in an agile environment. In all software devel... | <urn:uuid:8c208ec8-dc34-423d-96d1-ef3d8a644f66> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/library/ar-archman4/index.html?S_TACT=105AGY75 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00508-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90536 | 157 | 2.59375 | 3 |
Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH clien... | <urn:uuid:9f93c520-1886-4141-97a2-73598735ffc5> | CC-MAIN-2017-09 | https://www.blackmoreops.com/2014/06/19/kali-linux-remote-ssh/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00208-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.821374 | 759 | 2.71875 | 3 |
Education Department sets up new Web site for data display
ED Data Express showcases dropout rates, achievement, demographics
- By Alice Lipowicz
- Aug 11, 2010
The Education Department has created a new interactive Web site to showcase its data on student achievement, dropout rates and other educational data in a sing... | <urn:uuid:c5cbdf67-4aa5-4f2b-945f-329b59d252c8> | CC-MAIN-2017-09 | https://fcw.com/articles/2010/08/11/education-department-set-up-new-web-site-for-data-display.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00260-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93092 | 380 | 2.625 | 3 |
Intel is taking the first steps to implement thin fiber optics that will use lasers and light as a faster way to move data inside computers, replacing the older and slower electrical wiring technology found in most computers today.
Intel's silicon photonics technology will be implemented at the motherboard and rack lev... | <urn:uuid:c85219bc-2974-47db-869a-10532a13fe0d> | CC-MAIN-2017-09 | http://www.itworld.com/article/2715249/hardware/intel-prepares-to-use-lasers--light-to-shuffle-data-between-computers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00256-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936688 | 879 | 2.734375 | 3 |
Port Numbers – How does Transport layer identifies the Conversations
Computers are today equipped with the whole range of different applications. Almost all of these applications are able in some way to communicate across the network and use Internet to send and get information, updates or check the correctness of user... | <urn:uuid:d5bdb3b9-b27b-4c5f-898d-6f22cb8fe288> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/port-numbers | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00256-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925935 | 151 | 3.5625 | 4 |
Database: IBM Databases: Top 10 Innovations of the Past 50 Years
IBM and the Birth of Database Software
Before introducing DB2, IBM led the way for the database software industry by developing innovations to organize data for large and complex government projects, starting in 1966 with the IBM Information Management Sy... | <urn:uuid:9fb75d52-f956-45cf-8072-02251bd71fcf> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Database/IBM-Databases-Top-10-Innovations-of-the-Past-50-Years-766209 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00432-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933676 | 334 | 2.75 | 3 |
January 24, 2017
Algebra was invented in Persia nearly one thousand years ago. It is one of the fundamental branches of mathematics and its theories are applied to many industries. Algebra ranges from solving for x to complex formulas that leave one scratching their head. If you are interested in learning linear algebr... | <urn:uuid:984816c2-2e31-4a33-ae10-460a8b2d9e60> | CC-MAIN-2017-09 | http://arnoldit.com/wordpress/category/education/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00552-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94743 | 3,800 | 3.125 | 3 |
Japan's Internet infrastructure has remained surprisingly unaffected by last week's devastating earthquake and tsunami, according to an analysis by Internet monitoring firm Renesys.
Most Web sites are operational and the Internet remains available to support critical communication functions, Renesys CTO James Cowie wro... | <urn:uuid:facecb18-64b9-4bc7-893f-4dd7349a2505> | CC-MAIN-2017-09 | http://www.cio.com/article/2410273/internet/japan-s-internet-largely-intact-after-earthquake--tsunami.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00252-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963812 | 726 | 2.53125 | 3 |
Biometrics is the science and supporting technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics (such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements), pr... | <urn:uuid:d06af37f-7efb-4649-a874-bb6df923828d> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/biometrics-0003 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00425-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919461 | 230 | 3.0625 | 3 |
A new type of internet cookie threatens users' privacy and security by tracking their online behaviour for advertising management, profiling, and other reasons, the EU's cyber security agency Enisa warns.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relev... | <urn:uuid:0976f1d1-c5ec-4543-bfde-bfe0d8cbff92> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/1280095226/New-internet-cookies-could-steal-users-identities-invade-privacy-says-EU-cyber-agency | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00473-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951052 | 335 | 2.65625 | 3 |
I ran across an article on Information Week via HPCWire about NASA’s new supercomputing application.
The application, which will be unveiled later today, is powered by the world’s sixth most powerful computer (according to the Top 500 ranking in 2009) and will be called the NASA Earth Exchange (NEX for short).
This app... | <urn:uuid:9cd53bab-30b5-410d-a1af-62b142ae7fd1> | CC-MAIN-2017-09 | http://www.icc-usa.com/insights/nasas-new-supercomputing-application-and-gov-2-0/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00649-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940231 | 330 | 2.8125 | 3 |
The demise of the mainframe computer has been predicted for nearly 20 years. First the mini-computer from vendors like Computervision, Data General, DEC, Honeywell, Hewlett Packard, IBM, Prime, and Wang Computer challenged the dominance of the mainframe and expanded computing to midsized enterprises. Advances in x86 ba... | <urn:uuid:64fea829-be24-4b10-8203-f6f844779f73> | CC-MAIN-2017-09 | https://www.infotech.com/research/ibm-system-z-growing-versatility-on-a-fading-platform | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00293-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.859877 | 188 | 2.703125 | 3 |
With the rate of innovation, it’s challenging to keep up with emerging technology. Although the price of 3D printers is coming down, most households don’t have one yet. So it was surprising to come across news that makes it appear almost as if 3D printing is old news. Meanwhile DARPA wants self-destructing tech a bit l... | <urn:uuid:6c42606f-287f-47dd-86af-4d882e1b9d7e> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2475113/emerging-technology/cool--darpa-self-destructing-tech---4d-printed-tech-that--shapeshifts-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00469-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955995 | 1,272 | 2.8125 | 3 |
How cloud storage could catch up with big data
- By John Moore
- Apr 17, 2012
Cloud computing has managed to make the world’s already colossal appetite for data storage even more voracious.
Last year, IDC, an IT market research firm, cited public cloud-based service providers, from Amazon Web Services to YouTube, as th... | <urn:uuid:47b9a99c-a059-4251-b2b0-1549a6e1347b> | CC-MAIN-2017-09 | https://fcw.com/articles/2012/04/30/feat-biztech-cloud-storage.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00469-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929135 | 1,838 | 2.53125 | 3 |
TechCrunch has posted an interesting Q&A with veteran IT innovator Marc Andreesen on "the future of enterprise." It includes an insightful (if not wholly original) summary of the evolution of the computer industry, in which Andreesen makes the case that government used to fund and develop the big advances in computing,... | <urn:uuid:11b04948-6f69-4988-b7bc-92f66c17e75a> | CC-MAIN-2017-09 | http://www.nextgov.com/technology-news/tech-insider/2013/01/government-now-caboose-technology/60914/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171078.90/warc/CC-MAIN-20170219104611-00645-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971811 | 658 | 2.59375 | 3 |
Over the last forty years, the world of computing has gone through a series of important shifts to get us to where we are today.
1970s: The birth of personal computing, characterized by a focus on the device and what it could do.
1980s: The birth of local networking, characterized by a focus on linking devices and acce... | <urn:uuid:24b6a405-fb85-4db4-898c-f8ab1fd95c6b> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/adaptive-infrastructure-managing-resources-0001 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00345-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943489 | 339 | 2.9375 | 3 |
Given:route add host lion tiger 1Which two statements are true? (Choose two.)
Which daemon can configure a default router dynamically?
Given:host name IP addressmyhost 18.104.22.168printsvr 22.214.171.124The machine myhost needs to send data to printsvr. The routing table on myhost has no entry for printsvr. The routin... | <urn:uuid:be5595b8-ac9f-448e-a927-16030da5a77c> | CC-MAIN-2017-09 | http://www.aiotestking.com/sun/category/sun-certified-network-administrator-for-solaris-8/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00521-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.851058 | 304 | 2.796875 | 3 |
Japanese researchers have developed a new type of lithium-ion conductor that could help prevent the kind of lithium-ion battery fires that grounded the Boeing 787 Dreamliner aircraft last year.
While easily rechargeable, lithium-ion batteries contain flammable organic solvents that present a risk of fire, as seen in a ... | <urn:uuid:ffb3a83e-7127-4b97-a3a3-21cf4ad90683> | CC-MAIN-2017-09 | http://www.cio.com/article/2376074/mobile/new-conductor-could-prevent-lithium-ion-battery-fires.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00045-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932363 | 473 | 3.453125 | 3 |
At a recent public demonstration, the Commonwealth Scientific and Industrial Research Organization (Australia's national science agency) showed off new wireless technology that is capable of streaming data over a wireless link at speeds faster than gigabit Ethernet.
During a live demonstration, a CSIRO team successfull... | <urn:uuid:cc4edae9-1ea9-4354-b1c4-53e1d16b5c93> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2006/12/8400/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00165-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928455 | 298 | 2.890625 | 3 |
A SIP call session between two phones is established as follows:
- The calling phone sends out an INVITE.
- The called phone sends an information response 100 – Trying – back.
- When the called phone starts ringing a response 180 – Ringing – is sent back.
- When the caller picks up the phone, the called phone sends a r... | <urn:uuid:b5aa14f6-71f2-41d0-8859-0b3183608fce> | CC-MAIN-2017-09 | https://www.3cx.com/pbx/sip-call-session/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00337-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887813 | 158 | 2.640625 | 3 |
You most likely have your proprietary software thoroughly tested, QAed and reviewed via static code analysis on a regular basis. But what about the open source components? Open source components may have a direct impact on the quality of your software or service.
Open source components may have a direct impact on the q... | <urn:uuid:6f816d04-7fed-4a0f-867a-f389d88d2477> | CC-MAIN-2017-09 | https://www.checkmarx.com/2015/03/05/application-open-source-components1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00089-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939299 | 841 | 2.53125 | 3 |
Medical schools and health care trainers are using advanced gaming technologies to convey what it’s like to practice high-pressure, critical-care medicine
- By John Pulley
- Apr 16, 2007
The Serious Games Initiative
In 1972, the big medical stories included the surgeon general’s warning that exposure to secondhand smok... | <urn:uuid:f159309b-0c5d-457e-b488-8478e8d692ef> | CC-MAIN-2017-09 | https://fcw.com/articles/2007/04/16/serious-games.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00033-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947421 | 2,183 | 2.90625 | 3 |
Being an information security enthusiast/professional I am often asked how one can go about hiding their IP address while on the Internet. Here’s the analogy I give them:
What would happen if you were to give a fake address when making a pizza delivery order? Simple — you wouldn’t get a pizza. While you could pretty ea... | <urn:uuid:f6dc7cff-9c0b-4d16-95eb-8ce41167d471> | CC-MAIN-2017-09 | https://danielmiessler.com/study/hiding_your_ip/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00209-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954788 | 496 | 3.03125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.