text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Redundant links are always welcome in switch topology as they are increasing the network’s availability and robustness. Redundant links if we look at them from layer 2 perspective can cause Layer 2 loops. This is simply because TTL (Time To Live) field of the packet is found in Layer 3 header. In networking technology ... | <urn:uuid:af6253a0-f219-428c-bb3c-5ebcdbd827ed> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/rouge-switch | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00561-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926928 | 148 | 2.515625 | 3 |
How to Write Clean Code
Even bad code can function. But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code.
Within this article we will take the key concepts, and points around writing Clean Code - refe... | <urn:uuid:289cd1d3-2c15-49df-8e48-804d4057d8c3> | CC-MAIN-2017-09 | https://www.fir3net.com/Programming/Python/clean-code-notes.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00081-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.880796 | 1,319 | 3.34375 | 3 |
How Google Works: Reducing ComplexityBy David F. Carr | Posted 2006-07-06 Email Print
For all the razzle-dazzle surrounding Google, the company must still work through common business problems such as reporting revenue and tracking projects. But it sometimes addresses those needs in unconventional—yet highly efficient—... | <urn:uuid:bf107344-9d8a-4f3a-9a56-17b673a38aba> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Infrastructure/How-Google-Works-1/5 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00257-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929698 | 867 | 3.015625 | 3 |
After the collapse of the Interstate 35W bridge in Minneapolis in 2007, which killed 13 people and injured 144, congressional interest in fixing the nation’s bridges escalated. But efforts have not matched concerns: Since the tragedy, the addition of billions of extra federal dollars specifically for the repair and rep... | <urn:uuid:9ba00cda-0010-41b4-8b7b-41937e54e196> | CC-MAIN-2017-09 | http://www.govtech.com/Sensors-Wireless-Tech-Help-States-Monitor-Troubled-Bridges.html?flipboard=yes | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00609-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955656 | 1,512 | 2.78125 | 3 |
NASA engineers updated the software for a robotic Mars rover, correcting a more than two-month-old computer glitch while the robot hurtled through space on its way to Mars.
Late in November, NASA launched its $2.5 billion Mars Science Laboratory. Dubbed Curiosity, the SUV-sized super rover is on an eight-month journey ... | <urn:uuid:3f7a1552-aa44-4002-bc96-5b23b132bcfd> | CC-MAIN-2017-09 | http://www.itworld.com/article/2732645/consumer-tech-science/nasa-fixes-computer-glitch-on-robot-traveling-to-mars.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00609-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960949 | 463 | 3.015625 | 3 |
Over the course of the nearly forty years I have been working on database systems, there have been many debates and arguments about which database technology to use for any given application. These arguments have become heated, especially when a new database technology appears that claims to be superior to anything tha... | <urn:uuid:6972d4fd-f610-4362-b871-d7951c7f3760> | CC-MAIN-2017-09 | http://www.b-eye-network.com/view/10786 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00253-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925703 | 2,990 | 2.734375 | 3 |
Role-Playing: How Truly Effective Is It?
Role-playing is thought to be an excellent technique to enhance people’s soft skills; however, its effectiveness is heavily dependent upon the personality traits of an instructor’s audience. In fact, role-playing is utilized best with naturally outgoing individuals because of it... | <urn:uuid:7703321d-bedc-4258-a7c9-ff640dafea05> | CC-MAIN-2017-09 | http://certmag.com/role-playing-how-truly-effective-is-it/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00605-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969935 | 371 | 2.65625 | 3 |
Sandia Develops Cognitive Machines
ALBUQUERQUE, N.M. -- A new "smart" machine that could fundamentally change how people interact with computers is being tested at the Department of Energy's Sandia National Laboratories.
For the past five years, a team led by Sandia cognitive psychologist Chris Forsythe has been develo... | <urn:uuid:8be96823-d56e-4940-94c9-893bbc97070c> | CC-MAIN-2017-09 | http://www.govtech.com/products/99415999.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00605-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941786 | 1,914 | 2.984375 | 3 |
As the calendar counts down to the first exascale supercomputer, efforts to resolve the steep technological challenges are increasing in number and urgency. Among the many obstacles inhibiting extreme-scale computing platforms – resilience is one of the most significant. As systems approach billion-way parallelism, the... | <urn:uuid:249ae00f-fb7a-4c9d-af23-674a0d08149c> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/07/30/doe-fund-exascale-resilience-research/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00129-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916341 | 556 | 2.6875 | 3 |
The rapidly increasing interaction of consumers with social online networks, mobile phones and other intelligent devices has brought about significant lifestyle benefits that are under a serious threat from cybercriminals according to an international virus analyst.
Addressing the audience of Kuwait’s ICT Security Foru... | <urn:uuid:446adc31-3a90-4452-809d-cae4112f736f> | CC-MAIN-2017-09 | http://www.kaspersky.com/au/about/news/virus/2009/One_billion_social_networkers_this_year_exposed_to_Cybercrime_Kuwait_ICT_delegates_hear | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00074-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913299 | 671 | 2.921875 | 3 |
NASA is making final preparations to launch a robotic probe in early September to study the moon and its atmosphere.
Scientists hope the information will help them better understand Mercury, asteroids and the moons orbiting other planets.
"The moon's tenuous atmosphere may be more common in the solar system than we tho... | <urn:uuid:fa896aa4-0777-49b9-aedb-69c6bfaa90c6> | CC-MAIN-2017-09 | http://www.cio.com/article/2383062/government/to-the-moon-or-bust--nasa-preps-to-launch-lunar-probe.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00602-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916431 | 446 | 3.921875 | 4 |
By Cathy Dew on February 9, 2017
In case you missed it, here are the first four blogs in our series on business process analysis templates:
This week we look at personas...
Personas are detailed profiles of fictional characters that represent a specific segment of users within a targeted demographic. Analysts and desig... | <urn:uuid:883f90d5-b2a7-42a6-a6a5-d274e2330407> | CC-MAIN-2017-09 | https://www.2plus2.com/News/Business-Process-Analysis-Template-3-Personas-Ke.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00602-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9236 | 1,033 | 2.71875 | 3 |
Over the past few years, artificial hands have come a long way in terms of dexterity. They can grasp, shake hands, point, and, usefully, make the "come hither" gesture.
Now, researchers at the Cleveland Veterans Affairs Medical Center and Case Western Reserve University have made significant progress in building a pros... | <urn:uuid:88fe5401-5eea-47a2-9194-a1ef819a41d1> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2013/12/va-researchers-help-develop-artificial-hand-can-feel/75311/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00650-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947229 | 557 | 3.109375 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:15b1c894-8e99-4402-a7cd-311e0f0b9927> | CC-MAIN-2017-09 | https://docs.com/alison-lane/5253/5-beginning-of-minerals | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00046-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.848238 | 1,257 | 3.546875 | 4 |
Magnetic Resonance Imaging (MRI) is an advanced method to detect pathological changes in the organs inside the body. It uses magnetic fields and radio waves to create detailed high-quality images of individual organs, joints, and tissues. MRI scanners provide different view angles and, in certain cases, can present muc... | <urn:uuid:d9cea583-ef1b-4066-a466-2c7cd0bd0457> | CC-MAIN-2017-09 | https://www.blackbox.com/en-us/resources/case-studies/technology-solutions/medical-center | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00518-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.911787 | 592 | 2.828125 | 3 |
The small robots can rectify mistakes made during the demonstration, avoiding a complete catastrophe.
Scientists at Harvard School of Engineering and Applied Sciences demonstrated a flashmob of 1,024 simple robots, collectively known as Kilobots to arrange themselves into complex shapes.
The aim of the demonstration wa... | <urn:uuid:5230dd01-7649-408d-936c-40b574a70db6> | CC-MAIN-2017-09 | http://www.cbronline.com/news/enterprise-it/harvard-researchers-demonstrate-flashmob-of-more-than-1000-robots-180814-4346344 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00042-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949208 | 326 | 3.671875 | 4 |
The ambitious Apollo moon mission era suffered from the economic realities of space exploration, which led to the downsizing of the U.S. space program. For a period of time, no significant advancements were made. The space shuttles grew old, and in 2011, all three were retired after more than thirty years of service. S... | <urn:uuid:d026b489-ea09-481b-9fc4-133cd0060a0d> | CC-MAIN-2017-09 | https://www.alvareztg.com/more-business-startups-are-shooting-for-space-the-final-frontier/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00042-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939936 | 544 | 2.859375 | 3 |
NASA Captures Storm at Saturn's North Pole
/ February 4, 2014
NASA’s Cassini spacecraft has captured a stunning new image of Saturn’s north pole that highlights not only the planet's famous rings, but also a swirling, strangely hexagonal storm brewing in its atmosphere.
The odd hexagonal vortex is thought to be about 2... | <urn:uuid:eeb6a7a9-39bb-444c-a055-b86487dc1adc> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-NASA-Captures-Storm-at-Saturns-North-Pole.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00162-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95072 | 321 | 3.328125 | 3 |
Information Economics Overview
Information Economics will help you find the value in your information without losing sight of risk and cost. Our video tells you why information is getting harder and harder to manage.
As the information explosion gathers pace, the records and information your business holds is growing e... | <urn:uuid:aae475a4-857f-441c-83eb-27c6dae1d85d> | CC-MAIN-2017-09 | http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/Demonstrations-Videos/I/Information-Economics-Overview-Video.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00162-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929757 | 414 | 2.53125 | 3 |
Kaspersky Lab presents the article 'Drive-by Downloads: The Web Under Siege' by Kaspersky Lab security evangelist Ryan Naraine. The article is devoted to the covert downloading of malware from websites without the user’s knowledge, known as drive-by downloads.
Cybercriminals deploy exploits on a malicious server. Code ... | <urn:uuid:a9c8821a-cd8d-44de-b12d-d23217710a5f> | CC-MAIN-2017-09 | http://www.kaspersky.com/au/about/news/virus/2009/Drive_by_Downloads_The_Web_Under_Siege | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00338-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917181 | 602 | 2.578125 | 3 |
The idea of infecting BIOS has long been a highly intriguing prospect for cybercriminals: by launching from BIOS immediately after the computer is turned on, a malicious program can gain control of all the boot-up stages of the computer or operating system. Since 1998 and the CIH virus, which could merely corrupt BIOS,... | <urn:uuid:2fec163b-d68f-43a2-a601-ffe590862c9b> | CC-MAIN-2017-09 | http://www.kaspersky.com/au/about/news/virus/2011/Malware_in_September_The_Fine_Art_of_Targeted_Attacks | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00338-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964462 | 1,518 | 2.640625 | 3 |
How Far can a Wi-Fi Signal Travel?
You’ve most likely noticed that Wi-Fi signals do not travel an infinite distance. The farther a Wi-Fi signal goes, the weaker it gets. This is known as attenuation. The same thing happens to your voice. When you speak or yell, your voice will be nice and loud nearby, but your voice wi... | <urn:uuid:e518a134-fbe6-4e63-9516-f108f1043364> | CC-MAIN-2017-09 | http://wifi.actiontec.com/learn-more/wifi-wireless-networking/how-far-can-a-wi-fi-signal-travel/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00038-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.896758 | 700 | 3.40625 | 3 |
When a criminal duo labeled the “High Country Bandits” robbed a series of Arizona and Colorado banks in 2009 and 2010, FBI investigators turned to the owners of local cell phone towers.
A federal judge signed a court order authorizing a “tower dump” of call metadata from towers nearby the robbery sites. (Such court ord... | <urn:uuid:b9ccd81b-800f-487a-99ee-a8a50e95f884> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2014/08/researchers-say-you-can-surveil-everyone-and-see-only-criminals/91892/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00214-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930903 | 1,029 | 2.546875 | 3 |
Quantum computing could revolutionize the way we interact with information. Such systems would process data faster and on larger scales than even the most super of supercomputers can handle today. But this technology would also dismantle the security systems that institutions like banks and governments use online, whic... | <urn:uuid:04181f16-c862-4668-940c-8076d7ffe1b7> | CC-MAIN-2017-09 | http://www.nextgov.com/defense/2014/06/us-army-says-it-can-teleport-quantum-data-now-too/86251/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00390-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950571 | 367 | 2.796875 | 3 |
Boeing, the largest aerospace company on the planet, builds a lot of planes. The organization manufactures aircraft for airlines and governments in more than 150 countries. And every one of those planes contains thousands of wires that connect its various electrical systems.
These complex webs of wires don't weave them... | <urn:uuid:c7177841-378a-444f-9c48-f04cbf761536> | CC-MAIN-2017-09 | http://www.itnews.com/article/3095132/wearable-technology/google-glass-takes-flight-at-boeing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00090-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968821 | 1,347 | 3.125 | 3 |
The humans don't know, it is probably better that way
They are glued to their devices all night and all day.
Smart homes, bluetooth, and the internet of things,
everything is connected these days... so it seems.
If Dr. Seuss wrote a book about the Internet of Things, he could have come up with prose similar to the line... | <urn:uuid:a4fb20c7-07ac-4039-9da7-bad9daff507a> | CC-MAIN-2017-09 | http://www.ioti.com/iot-trends-and-analysis/iot-enabled-children-s-book-rockstar-inventor | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00510-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.973824 | 1,123 | 2.53125 | 3 |
Head-mounted computers like Google Glass are a useful way to view content and interact with the world on the move, but one drawback is the lack of a physical interface on which the user can click, drag or navigate content.
Japan's NTT DoCoMo showed a prototype technology at Japan's Ceatec exhibition this week that aims... | <urn:uuid:c03daad7-b264-4115-ab55-fd46d8d28294> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2485328/computer-peripherals/docomo-shows--touch-display--for-computer-glasses.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00086-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949502 | 776 | 2.515625 | 3 |
Scores of filing cabinets containing thousands of patient medical records are disappearing into the cloud.
Use of electronic health records systems in doctors' offices has doubled in recent years, according to a new report released Tuesday by the Centers for Disease Control and Prevention.
In 2012, 72 percent of office... | <urn:uuid:979aca84-d3fc-41b8-8668-019bd88ddd99> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2014/05/paper-medical-records-are-vanishing-cloud/84859/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00438-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960132 | 380 | 2.75 | 3 |
Usually, when we identify trends in computing at IT Business Edge, we are referring to the immediate future-a few months or, at most, a year or two ahead. But two recent pieces of news have implications worth paying attention to in a longer timeframe. And, as often is the case with futuristic computing, the ideas are s... | <urn:uuid:a79eec80-0c3a-45bc-b08b-80be193fa80b> | CC-MAIN-2017-09 | http://www.itbusinessedge.com/cm/blogs/weinschenk/is-quantum-mechanics-or-rotten-food-computings-future/?cs=44741 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00206-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956801 | 822 | 3.375 | 3 |
NOAA, Navy swimming with the SHARCs
- By John Breeden II
- Sep 21, 2012
When I wrote a column recently about DARPA’s AlphaDog, and how the mule-like robot could one day help Marines carry and even recharge their gear in the field, a lot of people were impressed.
But agencies whose focus is a little bit more aquatic in ... | <urn:uuid:3dbde4fe-3697-49ab-b250-ff2991209b77> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/09/21/sharc-robotic-wave-gliders-noaa-navy.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00382-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952718 | 587 | 2.671875 | 3 |
Device manufacturers could now move AI-level processing from the cloud down to end users, PC Magazine reports, with one New York computer science professor saying the technology means that now "every robot, big and small, can now have state-of-the-art vision capabilities." The article argues that this standalone, ultra... | <urn:uuid:6b226c87-3da4-47c9-97e6-0f15de94e8b9> | CC-MAIN-2017-09 | http://www.hackbusters.com/news/stories/594947-new-chip-offers-artificial-intelligence-on-a-usb-stick | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00306-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917511 | 187 | 2.578125 | 3 |
In our first entry on 2012 storage trends, we look at an aspect of flash-based storage, not that flash storage is suddenly a trend--it's reality. What is a trend, though, is the move to flash-dependent systems.
Flash-dependent storage systems are systems that are either all-flash or systems where flash plays a critical... | <urn:uuid:a5d2faae-c127-48f2-bccf-760d51f898a6> | CC-MAIN-2017-09 | http://www.networkcomputing.com/storage/flash-dependent-storage-systems-take-2012/919010245 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00603-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939795 | 664 | 2.6875 | 3 |
Storage Networking 101: Configuring Disk Arrays
It involves some tedium, but configuring disk arrays is the most critical part of building a SAN. Here's what you need to know.
The most critical, sometimes tedious, part of setting up a SAN is configuring each individual disk array. In this Storage Networking 101, we'll ... | <urn:uuid:73cc3195-51b3-42d2-bdd9-62a638d9ed44> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/netsp/article.php/3698291/Storage-Networking-101-Configuring-Disk-Arrays.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941685 | 1,442 | 2.75 | 3 |
Educational games are getting contagious
Do you think you have what it takes to stop a plague in its tracks? The Centers for Disease Control and Prevention has released an iPad app called “Solve the Outbreak” that lets players take on the role of a disease detective sent by the CDC to take control of an outbreak scenar... | <urn:uuid:58c00d28-23ae-409d-a8e8-89d2ff0dc191> | CC-MAIN-2017-09 | https://gcn.com/blogs/mobile/2013/03/educational-games-getting-contagious.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970799 | 335 | 2.96875 | 3 |
First, the authors describe basic usage syntax for inline
assembly (inline asm) embedded within C and C++ programs. Then they
explain intermediate concepts, such as addressing modes, the
clobbers list, and branching stanzas, as well as more advanced
topics, such as memory clobbers, the volatile attribute, and locks
are... | <urn:uuid:7f07ed49-14a1-417a-acc0-17551db732b2> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/5894415f-be62-4bc0-81c5-3956e82276f3/entry/a_guide_to_inline_assembly_for_c_and_c2?lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00599-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915549 | 100 | 3.171875 | 3 |
Swapping out an aging HDD for a new SSD, or moving information from one drive to another location via data archiving solutions, usually requires that the old storage medium be properly scrubbed of its data if it is no longer going to be used. By doing so, consumers and businesses prevent unwanted parties from accessing... | <urn:uuid:185749a5-2c2a-421f-ab50-a0e5e1c71177> | CC-MAIN-2017-09 | http://blog.digistor.com/ensuring-proper-data-disposal-when-switching-to-ssd-drives/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00299-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94152 | 508 | 2.859375 | 3 |
A distributed Denial of Service (DDoS) attack is a simple variation of a Denial of Service attack in which the attacker initiates the assault from multiple machines to mount a more powerful, coordinated attack.
A DDoS attack is an amplified Denial of Service attack. In DDoS attacks, multiple hosts simultaneously attack... | <urn:uuid:c9425a52-eb01-4fb8-b6f4-26faa3f0a92c> | CC-MAIN-2017-09 | https://www.imperva.com/Resources/Glossary?term=distributed_denial_of_service_ddos | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00299-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946409 | 331 | 3.359375 | 3 |
Happy Earth Day! As we take today to reflect on environmental impact, let’s take a look at some solid data to see how much energy and carbon dioxide emissions are really saved by data center energy efficiency and renewable energy use. The recent memo from the Greed Grid reintroducing their metrics for data center effic... | <urn:uuid:164fc7c8-da5e-47e9-ae40-8808c4afd303> | CC-MAIN-2017-09 | https://www.greenhousedata.com/blog/the-truth-about-data-center-carbon-emissions-and-pue | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00475-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91264 | 1,307 | 2.953125 | 3 |
Internet standards and protocols simply aren't all that exciting, or even that interesting, to most people. But they're necessary—especially in the case of IPv6 (Internet Protocol version 6), the much-needed update to the aging IPv4.
IPv6 is the successor to IPv4, which, in Internet terms, is pretty ancient as it was c... | <urn:uuid:fdc9a9ff-ba75-4c1d-80d1-23d2b4782988> | CC-MAIN-2017-09 | http://www.cio.com/article/2369399/mobile/79625-Techs-20-Biggest-Winners-of-2012.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00351-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968455 | 157 | 2.984375 | 3 |
MIT researchers are using nanotechnology to help doctors detect cancer in their patients sooner, increasing their odds of beating the disease.
To diagnose cancer, doctors look for specific proteins secreted by cancer cells. The problem with these biomarkers is that they're difficult to detect, giving the cancer more ti... | <urn:uuid:6148462d-85a3-4ad5-b6ee-42d6d0f4f5c6> | CC-MAIN-2017-09 | http://www.itworld.com/article/2717126/consumer-tech-science/mit-uses-nanotech-to-make-cancer-easier-to-detect.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00119-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95041 | 522 | 3.53125 | 4 |
Microsoft encourages us to think of Linux, when we think of it as all, as an also-ran operating systems for nerds. The last thing Microsoft wants us to think about is that there are some spaces where Microsoft is a distant number two and Linux is on top. Too bad Microsoft, there are several such places. One such is HPC... | <urn:uuid:070ee1f3-9a7b-4628-9c3d-ef6a2dbb71bb> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2480627/data-center/where-windows-is--2-to-linux.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00347-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954221 | 881 | 2.640625 | 3 |
NSBRI, Alion aim for software to help keep pilots oriented
- By Patrick Marshall
- Mar 09, 2009
The National Space Biomedical Research Institute (NSBRI) commissioned a project to study — and develop countermeasures for — astronauts’ spatial disorientation during space flight. Alion Science and Technology, which has dev... | <urn:uuid:36bea7c1-2cc8-4a0a-b7a6-a99ece60a235> | CC-MAIN-2017-09 | https://gcn.com/articles/2009/03/09/update2-spatial-disorientation.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00347-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948381 | 840 | 2.8125 | 3 |
Making smart buildings smarter
It's Monday morning. You've just parked your car and you're approaching the entrance to your office building. The Wi-Fi router in the lobby detects your smartphone as you come within range, and it sends commands that turn on the computer in your office as well as the lights and heat. By t... | <urn:uuid:2735c863-9443-408b-8120-60ac8c2b0273> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2013/12/smartphones-smart-buildings.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00467-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.97017 | 835 | 2.671875 | 3 |
On January 18, 2009, the SANS Internet Storm Center reported the first instances of what is now being described as a DNS DDOS (distributed denial of service) attack (see http://isc.sans.org/diary.html?storyid=5713).
The attack is simple: the attacker spoofs the victim's source address in a DNS query for '.' (dot) to a ... | <urn:uuid:5bdc2d5b-4980-4de1-be4b-8b23ad2c89d6> | CC-MAIN-2017-09 | https://www.bluecatnetworks.com/services-support/customer-care/security-vulnerability-updates/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00643-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930692 | 479 | 2.765625 | 3 |
We will speak here about some basics about Forwarding UDP broadcast traffic. If you were wondering what Forwarding UDP broadcast traffic actually is I will try to explain it here in few words.
If you have more that one broadcast domains in your local network, let’s say that you have three VLANs. In normal networking th... | <urn:uuid:22719afe-3b6e-4b2d-b5a1-b687cc1cb80d> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/broadcast | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00519-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931504 | 309 | 3.03125 | 3 |
Even before the Internet, computer security was a problem. In the 1986 movie War Games, we saw a young Matthew Broderick hacking his way into the computer that controls the U.S.' nuclear command and control. Today's hackers are the phone freakers of the 1980s, emulating telephone noises to obtain free long-distance cal... | <urn:uuid:019da5c1-c5ff-4df2-82db-d5577c55d90c> | CC-MAIN-2017-09 | http://www.banktech.com/beyond-the-moat-new-strategies-for-cybersecurity/d/d-id/1289682 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00043-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950563 | 3,214 | 2.578125 | 3 |
Good news, Earthlings! The day after Valentine's Day a 150-foot-wide asteroid will fly so close to our planet that it will pass through the orbit of several satellites, but experts said on Thursday that it will not hit us. In fact, the so-called DA14 asteroid will be such a close call that the force of Earth's gravity ... | <urn:uuid:0308378e-85d5-4604-bf0f-c7ea50f5fa8c> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2013/02/though-it-might-take-out-couple-satellites-asteroid-will-not-destroy-earth-next-week/61191/?oref=ng-relatedstories | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00391-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951201 | 327 | 2.546875 | 3 |
Pi Day: How the 'irrational' number pushed the limits of computing
- By William Jackson
- Mar 14, 2012
March 14 is, by act of Congress, officially designated Pi Day.
Think about it for a minute and, if remember your high school math, you will understand why: 3.14 are the first three digits of Pi, which represent the ra... | <urn:uuid:6c1e70f9-52b5-494e-a62b-f78e4767d1da> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/03/14/pi-day-value-pushing-boundaries-of-computing.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00567-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963124 | 1,082 | 3.421875 | 3 |
How to Be Green with Your Computer Hardware
Many IT organizations today fail to assume sufficient responsibility for the ultimate end-of-life destination of used-up PCs. Companies should take a closer look at the IT manufacturer's policy toward PC and computer hardware takeback before buying. One organization, the Elec... | <urn:uuid:c2efa3b9-4939-4aba-9767-009e5b907d10> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Green-IT/How-to-Be-Green-with-Your-Computer-Hardware | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00035-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954556 | 529 | 2.53125 | 3 |
As a fundamental practice in protecting sensitive data, encryption has long been a focal point in cyber security development and implementation. However, in light of recent news on government surveillance efforts from agencies, as well as cyber espionage attempts by foreign governments, data encryption has been getting... | <urn:uuid:d3f0da6c-8dbc-43cf-bb8f-d8b9905cc0f9> | CC-MAIN-2017-09 | https://lunarline.com/blog/2015/09/enterprise-encryption-roadblocks-opportunities/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00035-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948866 | 585 | 2.59375 | 3 |
If humans are ever going to get to Mars and other deep-space destinations, we’ll need to figure out how people can live reasonably safely in space for very long durations, possibly indefinitely. In the meantime, we may have to send astronauts into situations we know are dangerous and expose them to unknown environments... | <urn:uuid:5b6e4227-83f6-4a88-a844-f39776fca2c5> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2014/04/nasa-weighs-ethics-astronaut-health-risks-long-missions-deep-space/81787/?oref=ng-skybox | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00083-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935702 | 594 | 3.453125 | 3 |
There's not a ton of oxygen in space. Because of this, we have to rethink how we go about doing the things that we take for granted here on Earth, like defense against an incoming missile. Back in 2007, China tested the first ASAT (Anti-Satellite missile) against one of it's own dead satellites; it was a resounding suc... | <urn:uuid:1d0d1bf9-6fd7-4d9b-be64-3db4a41f4db2> | CC-MAIN-2017-09 | http://www.itworld.com/article/2731724/consumer-tech-science/quantum-dots-could-protect-spacecraft-from-missiles.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00259-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939731 | 682 | 3.578125 | 4 |
Disasters of the natural and cyber nature happen every day and many smaller companies are simply not prepared for the immense amount of recovery that it takes to get back to work. As a mid or smaller level company it is essential that a business continuity plan be in place to aid in the recovery of the business after a... | <urn:uuid:85056fb4-b6ee-4ebe-ab0e-7fcc75ed1d8f> | CC-MAIN-2017-09 | https://www.apex.com/what-is-a-business-continuity-plan-and-why-do-you-need-it/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00435-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963878 | 645 | 2.53125 | 3 |
When computer hackers attacked Estonia earlier this year -- shutting down numerous Web sites connected to the country's electronic infrastructure, including government, commercial banks, media outlets and name servers -- the event was nothing new in the world of cyber-security.
Since the mid-1990s, denial-of-service (D... | <urn:uuid:43dbfce8-7654-43d6-9a00-b4c194272b28> | CC-MAIN-2017-09 | http://www.govtech.com/security/Dark-Spaces.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00255-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948671 | 1,499 | 3.0625 | 3 |
Researchers have turned a display annoyance into a way to show two different images simultaneously. When an LCD is tilted, colors change and become difficult to see, but with Dual View from Microsoft Research Asia different images and video can be shown.
"We're actually exploiting this property by using a special algor... | <urn:uuid:84f3397f-d149-4832-875e-afbf2170eff9> | CC-MAIN-2017-09 | http://www.cio.com/article/2396288/hardware/exploited-display-bug-lets-lcds-show-two-images-simultaneously.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00128-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943738 | 239 | 2.859375 | 3 |
Feds Seek To Educate Patients On Info SharingU.S. Department of Health and Human Services offers guidelines and open-source software that healthcare institutions can use to help patients understand what they are agreeing to.
7 Portals Powering Patient Engagement(click image for larger view and for slideshow)
Using a co... | <urn:uuid:3b6abc23-366f-4cb5-b69c-152fffbc71e6> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/feds-seek-to-educate-patients-on-info-sharing/d/d-id/1111573?cid=nl_iw_daily_2013-06-19_html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00424-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948041 | 755 | 2.84375 | 3 |
What is Data Virtualization?
Data virtualization is technology that helps IT organizations more efficiently secure, manage, and deliver application data. Instead of relying on complex, manual processes to control and deliver application data, data virtualization allows IT to automatically deliver virtual copies of prod... | <urn:uuid:10c8927a-fb16-47ef-81be-144dc1a4ca13> | CC-MAIN-2017-09 | https://www.delphix.com/products/data-virtualization-engine/what-is-data-virtualization | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00600-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.865295 | 1,078 | 2.828125 | 3 |
Dutch water experts have teamed up with IBM to launch a new initiative called Digital Delta, which will investigate how to use Big Data to prevent flooding.
The Netherlands is a very flat country with almost a quarter of its land at or below sea level, and 55 percent of the Dutch population is located in areas prone to... | <urn:uuid:8c7e68b6-a02c-4e13-a956-a0f3a80fc8cb> | CC-MAIN-2017-09 | http://www.cio.com/article/2384573/big-data/ibm-uses-big-data-to-improve-dutch-flood-control.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00300-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920903 | 743 | 3.125 | 3 |
The National Science Foundation (NSF) is investing $15 million to create a more robust, agile and secure Internet.
The NSF announced on Monday it is splitting the money between three projects that are all aimed at developing better Internet architectures that are able to handle new technologies like the Internet of Thi... | <urn:uuid:37f676a2-9857-4f46-a038-b6c8244d8e25> | CC-MAIN-2017-09 | http://www.itworld.com/article/2698985/networking/feds-offer--15m-for-research-on-the-next-internet.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00300-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939739 | 896 | 2.734375 | 3 |
Smart home brings many convenient and time-saving features into people’s lives. The possibility to check the content of your fridge when you’re grocery shopping. The ability to open you home door lock for the plumber remotely. The possibility of checking if you left the oven on or not, and to turn it on when you are he... | <urn:uuid:6ac3467b-d575-417a-8f49-2efed5480546> | CC-MAIN-2017-09 | https://iot.f-secure.com/about/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00168-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957954 | 188 | 2.796875 | 3 |
Supply and demand tend to move towards equilibrium in markets with prices serving as the mechanism by which that equilibrium comes about. The imbalance between supply and demand exerts a downward or upward pressure on prices, the results of which, in turn, modify amounts supplied and amounts demanded in opposite direct... | <urn:uuid:5dba070d-91ab-4d1e-b549-b3da5c3c11a8> | CC-MAIN-2017-09 | http://blogs.gartner.com/will-cappell/ai-and-iam-markets-and-algorithms/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00520-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943272 | 853 | 2.625 | 3 |
What not to do with your data
The federal government has long produced data by the truckload, and the open-data initiatives of the Obama administration have put more of it in the public eye than ever before. And although many agencies have moved beyond spreadsheets and CSV files to offer dashboards, maps and other visu... | <urn:uuid:5b39e164-9f7a-4134-a5b2-2a26e8aba591> | CC-MAIN-2017-09 | https://fcw.com/articles/2013/09/16/bookshelf-what-not-to-do-with-data.aspx?admgarea=TC_ExecTech | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00044-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955335 | 1,122 | 2.703125 | 3 |
Various Linux distributions these days have started rolling out fancy GUIs to attract end users. Though this is a good strategy but working on Linux without understanding and using command line utilities is still not possible. Some one who uses Linux should know at least some basic commands that are required every now ... | <urn:uuid:c24c67ae-1394-4885-a7c7-b302d605ebb6> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/58e72888-6340-46ac-b488-d31aa4058e9c/tags/locate?sortby=0&maxresults=30&lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00044-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923418 | 108 | 2.609375 | 3 |
When Axel Kohlmeyer, the associate director of the Institute for Computational Molecular Science at Temple University, needed a large cluster of computers on which to run his models of physical molecular interactions, he could not always get time on the supercomputers managed by the major academic centers.
"To do this ... | <urn:uuid:3691ed2f-3091-436c-93b4-fb67cf10e96c> | CC-MAIN-2017-09 | http://www.cio.com/article/2417562/data-center/gaming-chips-score-in-data-centers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00092-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957936 | 1,011 | 2.515625 | 3 |
Mapping Every Road Casualty Across America
/ November 29, 2011
Between 2001 and 2009, nearly 370,000 people died on U.S. roads, and an interactive map from ITO World – using official data from the National Highway Traffic Safety Administration – lets users dial down and view each and every one. Each dot -- in blue, gre... | <urn:uuid:413e5b1d-ba29-4e2f-9270-44ef03752d2a> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Mapping-Every-Road-Casualty-Across-America-11292011.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00092-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887233 | 141 | 2.578125 | 3 |
Pushing Parallel Barriers Skyward
As much data as there exists on the planet Earth, the stars and the planets that surround them contain astronomically more. As we discussed earlier, Peter Nugent and the Palomar Transient Factory are using a form of parallel processing to identify astronomical phenomena.
Some researche... | <urn:uuid:16ec2d8d-31ff-4def-91b4-656d78e9db86> | CC-MAIN-2017-09 | https://www.datanami.com/2012/09/12/pushing_parallel_barriers_skyward/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00388-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92925 | 930 | 3.046875 | 3 |
Internet Explorer Flaw Can Cause Zero-Day Exploit
A security breach of Internet Explorer could occur if a hacker hijacks session cookies from users' visits to a Web site, According to Rosario Valotta, an Italian security researcher.
In a process coined "cookiejacking" by Valotta, the stolen data can be used to carry ou... | <urn:uuid:994c5463-6aa0-4537-9c16-409c6f37d720> | CC-MAIN-2017-09 | https://mcpmag.com/articles/2011/05/27/internet-explorer-flaw.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00088-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915413 | 383 | 2.734375 | 3 |
Social Security Number Prediction Makes Identity Theft EasyPosting your birthday on Facebook could help identity thieves predict your Social Security number, a new study finds.
Online information about your date of birth and place of birth could allow identity thieves to guess your Social Security number, according to ... | <urn:uuid:0ebf251f-2770-4007-8740-04cc7b217bf2> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/social-security-number-prediction-makes-identity-theft-easy/d/d-id/1081144?piddl_msgorder=asc | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00560-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932485 | 643 | 2.65625 | 3 |
NASA scientists are working to bring the Mars Reconnaissance Orbiter, which has been orbiting the Red Planet for eight years, back online after the spacecraft suffered a glitch Sunday.
The orbiter put itself into safe mode and swapped from its main computer to a backup, NASA said.
"The spacecraft is healthy, in communi... | <urn:uuid:b3fb3b9a-c7d1-4f24-8298-fa4c9578e548> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2175108/data-center/nasa-tries-long-distance-repair-of-mars-orbiter.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00612-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956095 | 525 | 2.71875 | 3 |
Research on Android malware called KorBanker has uncovered a treasure trove of text messages that include authentication codes for Google and Facebook and VPN passwords.
How the thieves made use of the data is not known. However, FireEye researcher Hitesh Dharmdasani assumes cybercriminals have figured out a way to exp... | <urn:uuid:db98798a-5874-48f0-afbc-18b8fd6ce29f> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2603022/data-protection/android-malware-stash-of-text-messages-found.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00556-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926417 | 501 | 2.53125 | 3 |
The Shylock malware, also known as Caphaw, made it first appearance in 2011. The malware was named Shylock because of excerpts from Shakespeare’s The Merchant of Venice, in the code. Shylock is not vastly different to a number of other recent malware, however it is worth examining here in order to review current malwar... | <urn:uuid:d7f4303e-0892-4b3f-9de9-47f90bfbe31b> | CC-MAIN-2017-09 | https://dwaterson.com/2013/11/04/resurgence-of-shylock/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00556-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944626 | 832 | 2.5625 | 3 |
Will Masdar City Be a Global Model for Sustainability?
/ October 11, 2011
What would a sustainable city look like? The answer lies in Masdar City, a 2.3 square mile carefully planned community in the United Arab Emirates, which relies on solar energy and other renewable energy sources. Construction on the city began in... | <urn:uuid:e1ab6694-26d9-4a44-be3f-2875be73944b> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Will-Masdar-City-Be-a-Global-Model-for-Sustainability-10042011.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00608-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950199 | 178 | 2.65625 | 3 |
When it comes to wildlife conservation, land managers have relied mostly on expert opinion to determine whether a particular species might be endangered. There hadn't been a systematic way to know what is happening with wildlife using real data -- until now.
In 2013, Conservation International (CI) and Hewlett-Packard ... | <urn:uuid:f8f66dd9-5467-41fd-96de-0035b417f77a> | CC-MAIN-2017-09 | http://www.itnews.com/article/2977444/data-analytics/conservation-international.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00484-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915429 | 406 | 3.734375 | 4 |
New federal legislation establishes a national definition of telehealth and clarifies the scope of which electronic methods can be used to safely deliver health-care services.
The Telehealth Modernization Act of 2013 provides principles to guide states that are considering their own telehealth policies. Introduced in D... | <urn:uuid:50adde19-07b5-4930-837f-e36a9656afab> | CC-MAIN-2017-09 | http://www.govtech.com/Feds-Draft-Legislation-to-Define-Telehealth-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00077-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955689 | 638 | 2.515625 | 3 |
WiGig, or IEEE 802.11ad, is fully a part of Wi-Fi. It is Wi-Fi in 60 GHz. This year will be pivotal for WiGig with the first access points and devices incorporating the technology. Next year will be a breakout year for WiGig. Several flagship smartphones with WiGig will ship in higher volumes, along with more PCs, acce... | <urn:uuid:350eed34-07ca-4e02-b40c-7adfd937ad49> | CC-MAIN-2017-09 | https://www.abiresearch.com/blogs/wigig-market-verge-breakout-year/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00605-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913445 | 860 | 2.546875 | 3 |
Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded.
The methods -- known as canvas fingerprinting, evercookies and cookie syncing -- are in use across a range of popular websites. The findings, first repor... | <urn:uuid:b8f3ea0f-0681-40a7-9395-83b0d86ffaf4> | CC-MAIN-2017-09 | http://www.itworld.com/article/2696618/networking/stealthy-web-tracking-tools-pose-increasing-privacy-risks-to-users.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00481-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957122 | 768 | 2.734375 | 3 |
When I wrote my column about DARPA’s AlphaDog, and how the mule-like robot could one day help Marines carry and even recharge their gear in the field, a lot of people were impressed. But agencies whose focus is a little bit more aquatic in nature, like NOAA and the Navy, countered with information about a pretty advanc... | <urn:uuid:f02e0b44-d27c-49ea-be12-0aae0b9871fc> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2012/09/feds-are-swimming-with-sharcs.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00177-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946071 | 507 | 3.109375 | 3 |
by Hannes Tschofenig, Nokia Siemens Networks and Henning Schulzrinne, Columbia University
Summoning the police, the fire department, or an ambulance in emergencies is one of the most important functions the telephone enables. As telephone functions move from circuit-switched to Internet telephony, telephone users right... | <urn:uuid:6eae9781-0d9e-464c-a736-e73a77d9b3d3> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-50/134-ecrit.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00473-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928629 | 5,633 | 2.546875 | 3 |
Location, location, location
The Global Positioning Satellite (GPS) system can help you find yourself, or the nearest drycleaner, or a missing Christmas manger, or a hidden geocache. But our expectations of GPS are that it works accurately, instantly, and reliably on all our devices. That's asking a bit much from what ... | <urn:uuid:53e7f895-6a36-4a4e-a9d7-750e559d85f2> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2009/01/assisted-gps/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00173-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945903 | 948 | 2.8125 | 3 |
As part of the administration’s new 3.8 trillion budget (that is with a T, not a B guys. Really big number.), a radical change in NASA’s mission is proposed. If President Obama has his way, NASA will stop being the operator and builder of our space vehicles and program. The US space program will be placed in the hands ... | <urn:uuid:11efd474-8003-41cc-8c6c-3e08515e4986> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2229522/opensource-subnet/bang--zoom--is-open-source-the-right-way-to-the-moon-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00469-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945981 | 1,094 | 2.546875 | 3 |
"The field of theoretical cryptography has blossomed in a way that I didn't anticipate in the early days," said Ron Rivest, a professor of electrical engineering and computer science at MIT and, along with Shamir and Len Adelman, one of the inventors of the RSA public-key cryptosystem. "It's related to so many other fi... | <urn:uuid:6f5a6bf1-5f52-4fb1-a2eb-9f3e78dcb2f8> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/1280096243/Cryptographers-Panel-Forefathers-still-eager-for-new-advances | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00645-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.979872 | 610 | 3.078125 | 3 |
Education Paradigm Shift In The Cloud Computing Era
Cloud computing has emerged as an innovative player in the industry with many organizations as well as individuals reap among numerous benefits that it offers. With its e-learning programs and online education in general, the education industry seems to be leading the... | <urn:uuid:e29caddd-4b36-4f7a-b676-445770fbf9d9> | CC-MAIN-2017-09 | https://cloudtweaks.com/2014/06/education-paradigm-shift-cloud-computing-era/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00521-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946266 | 674 | 2.96875 | 3 |
Heat is the great enemy of electronics. As microchips run at higher clock speeds, engineers are running up against the challenge of keeping components cool in an efficient and economical manner.
But a new cooling method developed by a researcher at Sandia National Laboratories opens the way for a variety of application... | <urn:uuid:6014e24a-2b23-4cb4-9641-0f35b389bf8c> | CC-MAIN-2017-09 | https://gcn.com/articles/2011/07/29/sandia-new-cooling-system-for-electronics.aspx?admgarea=TC_DataCenter | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00521-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956812 | 776 | 3.59375 | 4 |
Viral Art: A Gallery Of Security ThreatsVisually, online threats such as viruses, worms, and Trojans can be as beautiful as they are menacing to individual PC users, enterprises, and IT security professionals.
With 94 % of IT professionals expecting to suffer a security breach, and Windows 7 already showing signs of vu... | <urn:uuid:677f2a43-9836-4e08-945e-93562f1cdde6> | CC-MAIN-2017-09 | http://www.darkreading.com/vulnerabilities-and-threats/viral-art--a-gallery-of-security-threats/d/d-id/1079278 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00045-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944662 | 453 | 2.609375 | 3 |
On Wednesday, May 23, Jason Healey, moderator for the Atlantic Council’s “Building a Secure Cyber Future: Attacks on Estonia, Five Years On,” reminded us that for all the talk of emergent threats and new technology, cybersecurity has a history that’s worth remembering and learning from. While the Navy still studies the... | <urn:uuid:9aad7b20-1236-456f-80f8-c348bbdc0329> | CC-MAIN-2017-09 | http://www.fedcyber.com/2012/06/07/estonia-as-a-cyber-trafalgar/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00221-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971195 | 671 | 2.6875 | 3 |
Author: John Muster
Publisher: McGraw-Hill Professional
In this book John Muster will teach you how to use UNIX and Linux through clear presentation of the concepts, hands-on tutorials and exercises, illustrations, chapter reviews, and more. The following list represents but is not limited to, some of the topics that y... | <urn:uuid:5ac4d747-42b5-42bf-86c2-e2605066c217> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2004/02/02/introduction-to-unix-and-linux/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00341-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913751 | 1,718 | 3.09375 | 3 |
According to the Bible, the universe was created in about a week. Astrophysicists are currently building a virtual universe that will be completed in about four months, using 2048 processors of the MareNostrum supercomputer. Hosted by the Barcelona Supercomputing Center, this 10,240-processor IBM machine is able to per... | <urn:uuid:c464a141-b56d-4c65-82cd-474439e411e9> | CC-MAIN-2017-09 | https://www.hpcwire.com/2006/12/15/the_marenostrum_universe-1/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00517-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932729 | 1,175 | 3.421875 | 3 |
Operations research (OR) is the use of quantitative techniques (statistics, etc.) to solve problems and help leaders make decisions. OR has been around for centuries, but in the decade before World War II it came to be recognized as a distinct discipline. Operations research was used extensively during World War II to ... | <urn:uuid:49810b7e-127a-4a41-a73e-c53e3c564c61> | CC-MAIN-2017-09 | http://dssresources.com/papers/features/dunnigan/dunnigan05282004.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00393-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.974777 | 5,584 | 3.078125 | 3 |
The mention of microlending may call up images of loans made to farmers in India or credit extended to women entrepreneurs in immigrant communities. While the village-based credit delivered by non-governmental organizations does constitute microlending, it is only part of the scope of microlending today. Now, instead o... | <urn:uuid:fadcc807-1364-472d-a039-4f8d8695b8be> | CC-MAIN-2017-09 | http://www.banktech.com/channels/microlending-and-social-media-competition-between-banks-and-non-bank-lenders/a/d-id/1294879 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00393-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961566 | 596 | 2.890625 | 3 |
Court Throws Out FCC Broadcast Flag
In an unexpected win for consumer advocates, the U.S. Circuit Court of Appeals for the District of Columbia struck down a rule by the Federal Communications Commission that would have required manufacturers to support a new "broadcast flag" that prevents the copying and redistributio... | <urn:uuid:84b93480-dceb-47af-8b42-2ef3e48facfd> | CC-MAIN-2017-09 | https://betanews.com/2005/05/06/court-throws-out-fcc-broadcast-flag/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00569-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969211 | 308 | 2.53125 | 3 |
Wikipedia Considers Coloring Untested TextRegistered Wikipedia users may soon have access to software that colors text deemed untrustworthy.
In an effort to enhance the reliability of Wikipedia content, the WikiMedia Foundation, which oversees Wikipedia, is weighing whether to offer an opt-in tool for registered users ... | <urn:uuid:3a39bdbf-34df-48e3-b584-f7e758b27eb3> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/wikipedia-considers-coloring-untested-text/d/d-id/1082714 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00037-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921248 | 552 | 2.609375 | 3 |
NASA again stepped up its plan to mitigate the asteroid threat to Earth by announcing two significant new programs that call on a multitude of scientists and organizations to help spot, track and possibly alter the direction of killer space rocks.
First off, the agency announced the latest in its series of Grand Challe... | <urn:uuid:a82c383f-5fdb-4ca0-8b0e-0752f78d8636> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2224817/security/nasa-issues-grand-challenge--calls-for-public--scientific-help-in-tracking-threatening-aste.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00037-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928028 | 1,159 | 3.328125 | 3 |
Is a gun better than a knife?
I've been trying hard for an analogy, but this one kind of works. Which is better? A gun or a knife?
Both will help defend you against an attacker. A gun may be better than a knife if you are under attack from a big group of attackers running at you, but without ammunition, you are left de... | <urn:uuid:39b1d04d-a97c-468f-9c72-e0ea6d8fd6d9> | CC-MAIN-2017-09 | https://www.newnettechnologies.com/is-fim-better-than-av.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00037-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936152 | 1,158 | 2.59375 | 3 |
As I stated in our article "Scaleable NFS Acceleration with Enterprise Solid State Cache," one of the more popular use cases, especially initially, is using SSS as a cache. This method is a particularly popular way to accelerate NAS-based systems. The challenge is that caches by definition can get refreshed constantly ... | <urn:uuid:00d08685-fe8c-407b-a5bf-0a291a7ab9bb> | CC-MAIN-2017-09 | http://www.networkcomputing.com/storage/technology-can-extend-solid-state-storages-life/157367332?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00209-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959234 | 686 | 2.640625 | 3 |
quote:The experiment is called the Neutrino Factory, scheduled for construction some time from 2015. Its primary aim is to fire beams of neutrinos (fundamental particles) through the Earth's interior to detector stations on different continents. They're doing this to measure whether they change type en route (there are... | <urn:uuid:ce926e91-0b6c-43d8-90ff-eb62d9b7c496> | CC-MAIN-2017-09 | https://arstechnica.com/civis/viewtopic.php?p=1042222 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00613-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953155 | 384 | 2.890625 | 3 |
Weak Passwords Pervasive, Despite Security RisksData from a breach affecting 32 million online accounts reveals the persistent popularity of weak passwords, despite obvious risks.
Five years ago, Microsoft Chairman Bill Gates predicted the end of passwords because they failed to keep information secure. The real proble... | <urn:uuid:660f41de-1651-486e-bd7a-9bc98e149d5a> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/weak-passwords-pervasive-despite-security-risks/d/d-id/1086360 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00081-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936276 | 484 | 2.578125 | 3 |
OpenCL (the Open Computing Language) is under development by the Khronos Group as an open, royalty-free standard for parallel programming of heterogeneous systems. It provides a common hardware abstraction layer to expose the computational capabilities of systems that include a diverse mix of multicore CPUs, GPUs and o... | <urn:uuid:a83eea1b-3dac-4181-b0eb-d1c27f60252a> | CC-MAIN-2017-09 | https://www.hpcwire.com/2008/11/21/opencl_update/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00433-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922527 | 1,527 | 2.609375 | 3 |
Spring 4.2 and the Web (TT3364)
In this course, you will learn how to use Spring in conjunction with the various technologies used in and supporting rich web interfaces. This course covers a wide spectrum of topics, which provides you with a basic understanding of those technologies and resources prior to taking this c... | <urn:uuid:d778793a-8efe-47d8-9d04-b568358acfd0> | CC-MAIN-2017-09 | https://www.globalknowledge.com/ca-en/course/121334/spring-42-and-the-web-tt3364/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00309-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.913596 | 357 | 2.765625 | 3 |
As more and more of our daily life happens online, the issue of online privacy should be of prime importance to each of us. Unfortunately, it’s not.
Most users are not worried enough to scour the Internet for information about the latest privacy-killing features pushed out by social networks, online services and app ma... | <urn:uuid:daaeb9e8-52f7-4821-acac-173bf4b97255> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2014/04/23/researcher-proposes-alert-tool-for-managing-online-privacy-risks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00078-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943702 | 429 | 2.625 | 3 |
It should be abundantly clear to anyone who follows technology that Linux is a worldwide success story and has been for a long time. The open source operating system kernel originally developed by Linus Torvalds while he studied at the University of Helsinki, turned 25 earlier this fall.
As of now, Linux is used as a b... | <urn:uuid:f589bdf7-e6e2-456b-b8da-10bee83c6cde> | CC-MAIN-2017-09 | https://www.miradore.com/you-use-linux-every-day/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00078-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94392 | 2,383 | 2.640625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.