text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
A video game development company maintains a library of tools and content for each project. Programmers and artists in multiple international offices must exchange content and coordinate production.
The entire library is several gigabytes, consisting of thousands of software, music, and video files. Less than 5% change... | <urn:uuid:b07dbf2a-0e1e-4612-8008-dc23c34fb277> | CC-MAIN-2017-09 | http://www.dataexpedition.com/solutions/collaboration.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00254-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953437 | 260 | 2.609375 | 3 |
Fox-IT has encountered various ways in which ransomware is being spread and activated. Many infections happen by sending spam e-mails and luring the receiver in opening the infected attachment. Another method is impersonating a well-known company in a spam e-mail stating an invoice or track&trace information is ready f... | <urn:uuid:98ac941f-8e7f-4bc1-8095-dddbff11230f> | CC-MAIN-2017-09 | https://blog.fox-it.com/author/lindagerrits/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00482-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940505 | 1,134 | 2.90625 | 3 |
Researchers at Sandia National Laboratories are working on a computer that can tackle real-world situations in real-time and can run on the same power as a 20-watt light bulb.
Right now the only "machine" that can handle those functions is the human brain.
Thats why scientists are trying to build a computer system that... | <urn:uuid:b6a1def5-4bb9-4131-9a47-f3ab542ab854> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2177009/data-center/researchers-mimic-human-brain-to-build-a-better-computer.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00426-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954879 | 876 | 3.703125 | 4 |
Computer-related crimes may cause as much as $400 billion in losses annually, according to a new study that acknowledges the difficulty in estimating damages from such acts, most of which go unreported.
The study is the second to come from Intel's McAfee security unit in partnership with the Center for Strategic and In... | <urn:uuid:6d5d919c-9282-4983-808a-aea3d4ace0ed> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2490566/security0/cybercrime-losses-top--400-billion-worldwide.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00002-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967955 | 560 | 2.859375 | 3 |
Proliferation of connected devices, systems and services has immense opportunities and benefits for our society. The connected devices, enabling seamless connections among people, devices and networks, play an essential role in our day-to-day life from fitness tracker, to cars, to health monitoring devices, to control ... | <urn:uuid:d502984b-7467-4cb8-9e3b-2e9d8d10bd05> | CC-MAIN-2017-09 | http://www.csoonline.com/article/3142624/internet-of-things/the-unlimited-potential-of-iot-and-security-challenges.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00178-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947876 | 885 | 2.796875 | 3 |
What is The XFP Transceiver Modules?
The XFP (10 Gigabit Small Form Factor Pluggable)is a standard for transceivers for high-speed computer network and telecommunication links that use optical fiber.It was defined by an industry group in 2002, alongwith its interface to other electrical component switch is called XFI.A... | <urn:uuid:13126f40-a1ce-4721-a373-444fe1b24c03> | CC-MAIN-2017-09 | http://www.fs.com/blog/different-angles-to-understand-xfp-module.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00122-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906303 | 746 | 2.78125 | 3 |
Among the bigger concerns about cloud computing relate to data governance and regulatory issues about where data can legally reside. For example, a lot of countries in Europe and Asia prohibit storing data created inside their borders on servers that are beyond their judicial reach.
For this reason, along with improved... | <urn:uuid:e8695a0d-9e9a-490a-bd8c-1c56e31bc287> | CC-MAIN-2017-09 | http://www.itbusinessedge.com/cm/blogs/vizard/the-globalization-of-cloud-computing/?cs=41244 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00298-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954711 | 226 | 2.609375 | 3 |
Swedish car manufacturer Koenigsegg holds many speed records, including breaking the 0-300 km/h record in just 14.53 seconds in 2011, holding the Nürburgring speed record of 311 km/h in 2006 and also winning the title of fastest production car in 2005 for a 389 km/h top speed. To continue on this winning trajectory, Ko... | <urn:uuid:04b3af7f-ac0b-4132-986f-e1b84df3a9f9> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/05/15/hpc-propels-fastest-production-car/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952667 | 891 | 2.734375 | 3 |
This week, NASA announced it would soon be launching a new HPC and data facility that will give earth scientists access to four decades of satellite imagery and other datasets. Known as the NASA Earth Exchange (NEX), the facility is being promoted as a “virtual laboratory” for researchers interested in applying superco... | <urn:uuid:51c3975c-9431-4d84-9a17-71ed9b949be2> | CC-MAIN-2017-09 | https://www.hpcwire.com/2012/07/25/nasa_builds_supercomputing_lab_for_earth_scientists/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00174-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955226 | 1,180 | 3.671875 | 4 |
Running a Task Outside AutoMate (Command-line Operation)
Occasionally users may have a need to run a task created in AutoMate from outside of AutoMate. Usually the user wishes to run the task from one of the following:
- A batch file
- An external program
- The command line
- A desktop icon
The files AMTask.exe and AMT... | <urn:uuid:8ee6d7c2-499e-45b4-b3e2-e56ef1dc10bf> | CC-MAIN-2017-09 | http://www.networkautomation.com/urc/knowledgebase/running-a-task-outside-automate-command-line-operation/7E2FECDF-A644-B1BE-0E0E9520C83F05AC/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00470-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.799138 | 1,042 | 2.53125 | 3 |
You've heard the term and probably read stories about smart homes where the toaster talks to the smoke detector. But what makes it all connect? When will it become mainstream, and will it work? These frequently asked questions help explain it all.
What is the Internet of Things?
There is no agreed-upon definition, but ... | <urn:uuid:a3cb2fba-9c40-4b1b-bf26-12d361537d74> | CC-MAIN-2017-09 | http://www.cio.com/article/2376518/internet/the-abcs-of-the-internet-of-things7.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00170-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947497 | 2,748 | 3.21875 | 3 |
UICC stands for Universal Integrated Circuit Card. It is a new generation SIM (Subscriber Identification Module) included in cell phones or notebooks used in some high speed wireless 3G networks such as those of AT&T or T-Mobile. The UICC identifies you to your wireless carrier so they know your plan and services. It c... | <urn:uuid:3d8cc292-16bc-441e-b62e-7b7f909822e1> | CC-MAIN-2017-09 | https://www.justaskgemalto.com/us/what-uicc-and-how-it-different-sim-card/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00170-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90719 | 498 | 2.546875 | 3 |
One of the education world's newest trends is using technology to help schools function with the sort of efficiencies normally found in the business world. Enterprise Resource Planning (ERP) packages were among the first tools to move from the business world to the education world. ERP
systems, with their combination o... | <urn:uuid:d27a5b0c-c27a-4daf-9b95-fd7a69717102> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/An-ODE-to-Accountability.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00346-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962813 | 1,247 | 2.71875 | 3 |
Sci-fi movies have warned us again and again: Sooner or later, our technology will destroy us.
The moment will come when machines become so smart, they will become a force for destruction rather than the engine of our general betterment.
Will it be the smart energy grid that pushes us over the line? There is growing co... | <urn:uuid:0b831dc0-8c59-4da7-a05a-775af482fbb4> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/Securing-the-Smart-Energy-Grid-a-National-Concern.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00346-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94308 | 2,337 | 3.015625 | 3 |
1:1 computing device programs continue to gain popularity in schools worldwide. E-learning computing devices such as iPads, Chromebooks, tablets, and laptops have helped to engage students, improve technology skills and collaboration, encourage blended learning, and assert cost savings in other areas such as textbooks ... | <urn:uuid:71befe85-c114-485c-9005-2fd162e12531> | CC-MAIN-2017-09 | https://www.blackbox.com/en-pr/resources/case-studies/technology-solutions/bethel-park-school-district | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00522-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959919 | 739 | 2.640625 | 3 |
In this provocative talk from TEDGlobal, MIT Media Lab professor Kevin Slavin paints a picture of a world that is increasingly being shaped by algorithms. Slavin explores how these complex computer programs evolved from their espionage roots to become the dominant mechanism for financial services. But as the 2008 finan... | <urn:uuid:3d8c3a90-eb0a-46a3-ae12-0123f98d1f46> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/10/14/algorithms-shape-world/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00046-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94527 | 1,145 | 2.546875 | 3 |
Multi-Step Authentication and Why You Should Use It
Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). Authentication is the process of claiming an identity the proving that you are that claimed identity. Authorizati... | <urn:uuid:5b071b5a-8a50-4322-a828-7746ceb144b6> | CC-MAIN-2017-09 | https://www.globalknowledge.com/ca-en/resources/resource-library/white-paper/multi-step-authentication-and-why-you-should-use-it/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00166-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931455 | 1,091 | 3.546875 | 4 |
Smart grids are a fundamental component of the European critical infrastructure. They are rooted on communication networks that have become essential elements allowing the leveraging of the “smart” features of power grids.
Smart grids provide real-time information on the grid, perform actions when required without any ... | <urn:uuid:cec9d802-7ce8-4bfe-8a97-303cc84351a2> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2016/02/01/defending-the-smart-grid-what-security-measures-to-implement/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00166-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930438 | 358 | 2.984375 | 3 |
What is Community Policing?
“Community policing is a philosophy that promotes organizational strategies that support the systematic use of partnerships and problem-solving techniques to proactively address the immediate conditions that give rise to public safety issues such as crime, social disorder, and fear of crime.... | <urn:uuid:3bd51f37-7e24-48f7-bbfe-e903d79f2ce1> | CC-MAIN-2017-09 | https://www.everbridge.com/community-policing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00342-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9404 | 944 | 3.375 | 3 |
The Helmholtz Association of German Research Centres is the largest scientific organisation in Germany. It is a union of 18 scientific-technical and biological-medical research centers. The official mission of the Association is "solving the grand challenges of science, society and industry". Scientists at Helmholtz th... | <urn:uuid:323c07e1-eeae-49ab-b5de-967feee22e82> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/helmholtz-center-geesthacht-24412/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00042-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907567 | 1,512 | 2.875 | 3 |
Snapchat has demonstrated again its lack of understanding in building strong security to protect users of its popular mobile app for sharing photos.
The company introduced last week a CAPTCHA verification method for checking whether a new subscriber is human or a computer program. Cybercriminals will use the latter to ... | <urn:uuid:d224fd79-b13e-4c7f-9c70-c988cd47586d> | CC-MAIN-2017-09 | http://www.cio.com/article/2379226/mobile-security/snapchat-falters-on-security-again--experts-say.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00038-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95282 | 778 | 2.6875 | 3 |
TUCSON, Ariz. -- Augmented reality and 3D printing are the hottest emerging technologies to watch, according to Tom Soderstrom, chief technology officer for NASA Jet Propulsion Laboratory.
The impact of both technologies is already being felt with some new products, including a free augmented reality app in Apple's App... | <urn:uuid:651ad5a2-0667-4302-810b-fc10cf5a28e3> | CC-MAIN-2017-09 | http://www.cio.com/article/2387821/enterprise-software/augmented-reality-and-3d-printing-are-hot-technologies-to-watch.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00214-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957392 | 761 | 2.71875 | 3 |
Here are more tips to ensure your Wi-Fi network is safe.
Change the default name of your wireless network (called the SSID)
Change the default username and password to login to your wireless Access Point; if you don’t, someone else might login and change your security setting.
Do not let the Access Point broadcast the ... | <urn:uuid:309883cc-4ea2-4c87-8165-f01fe84e5b38> | CC-MAIN-2017-09 | https://www.justaskgemalto.com/us/what-else-should-i-do-wi-fi-network-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00390-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921031 | 343 | 2.78125 | 3 |
Douglas Engelbart, a Silicon Valley engineer who invented the computer mouse and is credited with many of the concepts that underpin modern computing and the Internet, died on Tuesday at his home in Atherton, California. He was 88.
Born in 1925, Engelbart was coming of age as World War II raged in Europe. He joined the... | <urn:uuid:a6299165-b756-4c06-8794-9ed4d1f9306c> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2167877/smb/douglas-engelbart--inventor-of-the-computer-mouse--has-died.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00442-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.981321 | 547 | 3.09375 | 3 |
In a DNS zone, every record carries its own time-to-live, so that it can be cached, yet still changed if necessary.
This information is originally served by authoritative servers for the related zone. The TTL is represented as an integer number of seconds.
At first sight, the mechanism looks straightforward: if the www... | <urn:uuid:849ea89b-54a0-4e20-aa75-91e6539b4c5b> | CC-MAIN-2017-09 | http://blog.catchpoint.com/2012/04/04/dns-records-and-ttl-how-long-does-a-second-actually-last/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00386-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942982 | 1,504 | 3.265625 | 3 |
The data center does create a lot of garbage or waste products. From paper to many other products, the data center has to deal with the recycling or safe disposal of trash. Paper printouts, servers and so on are all part of the data center waste management system. The waste management system gets more complex depending... | <urn:uuid:b63d08f4-2d31-452f-8b7d-04e3da6ea64c> | CC-MAIN-2017-09 | http://www.datacenterjournal.com/data-center-waste-management-system/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00258-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924442 | 193 | 2.9375 | 3 |
Astronauts have been drinking recycled urine for some time, and according to Wired magazine, on the long trip to Mars, they’ll be shielded from radiation by astronaut poop. That, in microcosm, is what’s happening back here on Earth.
According to the “One Water Vision,” all water is just the same H2O recycled over and o... | <urn:uuid:3a3af087-1dce-4793-b9b2-a0b27e035b59> | CC-MAIN-2017-09 | http://www.govtech.com/transportation/209248441.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00258-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946464 | 649 | 3.046875 | 3 |
Primer: Geospatial AnalysisBy Kevin Fogarty | Posted 2004-08-04 Email Print
Mapping data yields more than just good directions; it can yield customers. A look at the benefits of geospatial analysis.
What is it? A way to determine where your customers live or work by correlating their street addresses with their physica... | <urn:uuid:8909f418-879d-427a-a283-939c90822f2f> | CC-MAIN-2017-09 | http://www.baselinemag.com/crm/Primer-Geospatial-Analysis | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00307-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941537 | 667 | 2.625 | 3 |
It lasted only two seconds, but a paralyzed man made history Thursday when he kicked off the World Cup in Brazil with the help of a robotic suit.
The feat was backed by Walk Again Project, a nonprofit group involving U.S. and European universities and other organizations as well as more than 100 scientists. It posted t... | <urn:uuid:0e95492c-00a7-459d-b539-76eb49aedb5f> | CC-MAIN-2017-09 | http://www.cio.com/article/2375508/hardware/paralyzed-man-in-robot-suit-kicks-off-world-cup.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00475-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943288 | 525 | 2.640625 | 3 |
Network News Transfer Protocol is a prime set of rules which is used by both computer’s clients as well as servers in order to manage the comments situated on the Usenet newsgroups. In the past, NNTP was introduced as the substitute of original “UUCP” protocol. But now NNTP servers can handle the collected internationa... | <urn:uuid:0028d394-7818-464e-b864-f9a13a6bebfe> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2012/nntp | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00527-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922522 | 697 | 2.515625 | 3 |
Technology Primer: Cloud and Virtualization
- Course Length:
- 0.5 Day Instructor Led
This half-day Technology Primer introduces the audience to the concepts of Cloud Computing and Virtualization. Cloud Computing is generally characterized by its Service Model types. The course first introduces the audience to the idea... | <urn:uuid:95b05156-9f09-4619-b510-67b2cc30be19> | CC-MAIN-2017-09 | https://www.awardsolutions.com/portal/ilt/technology-primer-cloud-and-virtualization?destination=ilt-courses | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00647-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.798587 | 404 | 3.265625 | 3 |
In recent years, in order to reduce the cost of fiber access optical fiber network end-users, some well-known domestic and foreign universities and research institutions, manufacturers racing to develop cheap, connecting a simple, reliable plastic optical fiber and communication systems. This article briefly describes ... | <urn:uuid:51e969c3-4589-4c70-9652-01014e0f2598> | CC-MAIN-2017-09 | http://www.fs.com/blog/principle-of-plastic-optical-fiber-transmission-system.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00399-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.900845 | 868 | 2.859375 | 3 |
The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer.
The problem is that the same key is used to encrypt both outgoing and incoming streams between the client an... | <urn:uuid:9c85a20f-b5fd-4b7b-affe-8ce3bce9feb9> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2170694/byod/d--39-oh--basic-flaw-in-whatsapp-could-allow-attackers-to-decrypt-messages.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00515-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953895 | 867 | 2.78125 | 3 |
There has been a lot of news on quantum computing recently, from reports on NPR to Nature to the usual technical trade publications. The hype is enormous given the potential for changing the landscape, but I think there are a number of outstanding questions.
One of the biggest issues I see is that we have around 60 yea... | <urn:uuid:db4629ef-36cc-425b-acf8-d759415ce8ca> | CC-MAIN-2017-09 | http://www.infostor.com/index/blogs_new/Henry-Newman-Blog/blogs/infostor/Henry-Newman-Blog/post987_163151010.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00567-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952669 | 376 | 2.5625 | 3 |
Last May, Google announced that it was using a herd of goats to mow the lawn at its Mountain View, Calif., headquarters. This year, HP has taken the lead in innovative uses for livestock in business. Its researchers have come up with a way to power data centers with cow manure.A farm of 10,000 dairy cows could fulfill ... | <urn:uuid:19dd960b-9583-4de3-bab8-ccc00ea3c96b> | CC-MAIN-2017-09 | http://www.banktech.com/infrastructure/hp-develops-manure-powered-data-centers/d/d-id/1293828 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00263-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935198 | 507 | 3.171875 | 3 |
The Nuclear Regulatory Commission has rejected the notion that it is not ready to decide whether aging atomic power plants need to make upgrades intended to limit radiation releases during a major crisis, but its ultimate action on the matter is not yet clear.
In the wake of the 2011 Fukushima Daiichi nuclear plant mel... | <urn:uuid:dd6b2be7-ac69-4631-b4df-0299d0318bf7> | CC-MAIN-2017-09 | http://www.nextgov.com/defense/2013/03/nrc-new-nuclear-plant-safety-measures-not-premature-final-decision-pending/61803/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00439-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953791 | 1,275 | 2.546875 | 3 |
MIT researchers uncovered a critical difference between the flu viruses that infect birds and humans. This discovery could help scientists monitor the evolution of avian flu strains and develop vaccines against a deadly flu pandemic.
The researchers found that a virus's ability to infect humans depends on whether it ca... | <urn:uuid:d0c8dc68-90af-441f-8f22-56e19bb667b7> | CC-MAIN-2017-09 | http://www.govtech.com/health/Avian-Flu-Research-may-Speed-Vaccine.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00615-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906342 | 165 | 3.828125 | 4 |
Mangrove: Fujitsu’s Experimental Green Data Center Design
Creating a green data center is not just a matter of locating the facility in Norway to keep the servers cool or plugging into a string of hydroelectric dams. The next generation green data center will be re-conceptualized from the concrete floor to the virtual ... | <urn:uuid:8900c687-bc96-48c0-9f13-3b59ae824b78> | CC-MAIN-2017-09 | https://www.enterprisetech.com/2012/10/26/mangrove:_fujitsu_s_experimental_green_data_center_design/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00135-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939911 | 1,548 | 2.78125 | 3 |
General Electric Co has developed new commercial drone technology to detect gas leaks.
For a while now drones have been applied in increasing numbers to solve problems across industrial sectors. Usually, these applications offer benefits in terms of safety, cost, speed or efficiency. Aerial inspections of bridges and c... | <urn:uuid:32b50939-ee06-416b-a454-33bf78d0f9f1> | CC-MAIN-2017-09 | https://internetofbusiness.com/ge-commercial-drone-detect-gas-leaks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00080-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931409 | 490 | 2.546875 | 3 |
NASA issued a study today that said if life ever existed on Mars, the longest lasting environments were most likely below the planet's surface.
The hypothesis comes from analyzing tons of mineral data gathered over the years from more than 350 sites on Mars gathered by NASA and European Space Agency Mars space probes.
... | <urn:uuid:18e10d9b-030f-4428-bf05-e9139f62df53> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2221025/smb/nasa--if-there-was-life-on-mars--it-was-likely-underground.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00432-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94868 | 340 | 4.15625 | 4 |
Biometric security is becoming more prevalent. More than 770 million biometric applications will be downloaded every year by 2019, Juniper Research said last year, quoted by CSO then. That’s up from only 6 million identity-proving biometric apps in 2015. It will be big, then.
What we’re usually thinking about, though, ... | <urn:uuid:8925cf36-92cc-4d92-a0a4-9076a637fe8e> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3042246/security/how-eye-tracking-could-stop-pii-leaks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00132-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94861 | 731 | 2.546875 | 3 |
Nov 95 Level of Govt: Local. Function: Land Use Planning Problem/situation: There was no way for most database users in the city of Raleigh and Wake County, N.C., to access multiple levels of land-use information for analysis and mapping. Solution: City and county GIS departments initiated a joint project and developed... | <urn:uuid:51b5de47-4e79-45fe-a875-2f1fb8cd2b38> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Merging-CityCounty-GIS-Efforts.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00484-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958281 | 2,127 | 2.53125 | 3 |
As the name implies, this new feature highlights the top research stories of the week, hand-selected from prominent science journals and leading conference proceedings. This week brings us a wide-range of topics from stopping the spread of pandemics, to the latest trends in programming and chip design, and tools for en... | <urn:uuid:02a1f87b-48a9-403f-8f39-e744cfe3cd59> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/01/24/the_week_in_hpc_research/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00304-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.904443 | 1,421 | 2.515625 | 3 |
Decision Sciences Myths DebunkedBy Dhiraj Rajaram | Posted 2011-01-07 Email Print
Data-driven management yields better results for business -- and getting started is easier than you may think.
Decision Sciences is the discipline of solving business problems by using first principles with a mix of mathematics, business ... | <urn:uuid:0f1f5de4-afbc-48a9-aa3c-356ef7b208c8> | CC-MAIN-2017-09 | http://www.baselinemag.com/security/Decision-Sciences-Myths-Debunked | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00532-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.899072 | 708 | 2.78125 | 3 |
The National Institute of Standards and Technology (NIST) has added the identification of DNA, footmarks, and specific fingerprint information to its biometric data standard, with more enhancements slated for the future.
The organization–which oversees technology standards for the federal government–published a signifi... | <urn:uuid:d14974fa-59f8-4dfb-9630-3e19e3622b05> | CC-MAIN-2017-09 | http://www.fedcyber.com/2011/12/09/biometric-standard-expanded-to-include-dna-footprints/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00300-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922297 | 217 | 2.78125 | 3 |
Every day, two-factor authentication - ATM-style identification combining the use of something you know (a password) with something you have (a token) - proves itself to be an essential part of broad-based information security systems, mitigating multiple threats, and protecting identities and information assets. While... | <urn:uuid:dec36f28-6cf3-47f5-a69a-7cf236fb7e3c> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2320143/lan-wan/is-two-factor-authentication-too-little--too-late--no-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00300-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929415 | 599 | 2.59375 | 3 |
NASA's Cassini spacecraft, which is now flying near Saturn, is turning its cameras back toward Earth today so it can grab a photo of its home planet from hundreds of millions of miles away.
Scientists expect Earth to appear as a small blue dot between the rings of Saturn in the image, NASA said.
The photo is being take... | <urn:uuid:6064d181-b488-4a73-b007-06ee460ed14c> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2497974/emerging-technology/say--cheese---earthlings--spacecraft-to-snap-home-planet-pic-from-deep-space.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00352-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945639 | 591 | 3.46875 | 3 |
Bellovin pointed out several years ago that most network penetrations are possible thanks to coding errors. Within those coding errors, about 50% are due to buffer overflows.
An attacker interested in penetrating your system knows that the weakest link will not only include people, but also code that they’ve written. T... | <urn:uuid:a58a6895-44b6-4c10-bbfe-a73b8deccccc> | CC-MAIN-2017-09 | http://blog.globalknowledge.com/2012/10/22/what-is-the-1-security-threat-not-addressed-by-a-firewall/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00472-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919269 | 557 | 3.375 | 3 |
The fiber optic amplifier plays a significant and key role within the enhancing the capacity for a communication system to deliver information. The light signals can be transmitted by the use of optical transmitters, optical receivers and optical fiber.
The optical amplifier is a device amplifying an optical signal dir... | <urn:uuid:bdebbc78-31e0-446c-a964-5bfbfe7d6bec> | CC-MAIN-2017-09 | http://www.fs.com/blog/why-we-need-a-fiber-optic-amplifier.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00400-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930775 | 639 | 2.65625 | 3 |
- By Anne Armstrong
- Jul 09, 2012
It was simpler in the old days to recognize an attack: The enemy fired on your shores, burned your capital, and shot at soldiers and civilians. No one questioned we were at war in 1812 or 1941.
In the years since, the nature of war and aggression has changed rather dramatically. The g... | <urn:uuid:358d511a-f5f7-4499-8d8a-f2bfe1902897> | CC-MAIN-2017-09 | https://fcw.com/articles/2012/07/15/editors-note-defining-cyber-war.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00168-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964764 | 347 | 2.5625 | 3 |
While there is a universal desire in the HPC community build the world’s exascale system, the achievement will require a major breakthrough in not only chip design and power utilization but programming methods, NVIDIA chief scientist Bill Dally said in a keynote address at ISC 2013 last week in Leipzig, Germany.
In las... | <urn:uuid:aa3efad3-a557-47b0-a31d-a02fe34fb126> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/06/24/exascale_requires_25x_boost_in_energy_efficiency_nvidias_dally_says/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00168-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942472 | 937 | 3.03125 | 3 |
If you work with data much, you don't need a statistical model to predict that the odds of consistently getting data in the format you need for analysis are pretty low. Those who do a great deal of data cleaning and reformatting often turn to scripting languages like Python or specialty tools such as OpenRefine or R.
B... | <urn:uuid:de921830-dea8-4086-b91c-c826c8f1220e> | CC-MAIN-2017-09 | http://www.cio.com/article/2378199/enterprise-software/5-tips-for-data-manipulation-in-excel.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00344-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.908208 | 1,341 | 3.15625 | 3 |
Confusion has come along with the associated taxonomy of VoIP technology and IP telephony. Both of them refer to use the same IP network to send voice messages. But the main difference between VoIP and IP telephony is that VoIP is connecting old fashion analog phones to specific gateway device who are able to convert a... | <urn:uuid:bc110905-3689-4093-9661-eec3f2b98727> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/ip-telephony | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00568-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949688 | 150 | 3.25 | 3 |
Sniffer, Spoofer (generic description).
A sniffer or a spoofer is usually a standalone program to intercept and analyse certain data. For example a sniffer can intercept and analyse network traffic and catch certain data, for example passwords. Trojans sometimes use sniffing capabilities to steal passwords and user inf... | <urn:uuid:67ce8498-dcab-4a9b-a3c2-96b2e0d0b41e> | CC-MAIN-2017-09 | https://www.f-secure.com/v-descs/sniffer.shtml | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00092-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.865769 | 214 | 2.703125 | 3 |
Programming tools that harness the computing power of CPUs and graphics processors have been updated, bringing more parallel programming capabilities to the table.
Standards-setting firm Khronos Group released OpenCL 2.0, which is a key development platform used to write applications in which processing is broken down ... | <urn:uuid:498801da-0095-4cd2-b7c1-67dea92b07b2> | CC-MAIN-2017-09 | http://www.itworld.com/article/2707208/hardware/khronos-group-releases-updates-to-graphics--parallel-programming-tools.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00444-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938151 | 375 | 2.671875 | 3 |
Security threats to your mobile device lurk as malware, fraudulent lures such as SMS spoofing, and toll fraud, but they're all becoming favorites of digital crooks as people move away from using PCs and toward smartphones and tablets, according to a new report.
Such cybercrime is worth big money, whether it happens on ... | <urn:uuid:509d9fab-74bf-4310-9831-b5a4f03061eb> | CC-MAIN-2017-09 | http://www.itworld.com/article/2720599/mobile/mobile-security-threats-rise.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00212-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950409 | 1,024 | 2.578125 | 3 |
Bluetooth Software Updates & Support
General Questions about Bluetooth
Bluetooth wireless technology is an international open standard for allowing intelligent devices to communicate with each other over short range wireless links. It allows any sort of electronic equipment - from computers and cell phones to keyboards... | <urn:uuid:9a6f0c15-4cdb-44fc-8014-0559be4abcd9> | CC-MAIN-2017-09 | https://www.broadcom.com/support/bluetooth | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00260-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915502 | 1,268 | 2.703125 | 3 |
China's fastest supercomputers have some clear goals, namely development of its artificial intelligence, robotics industries and military capability, says the U.S.
But some of the early iterations of this effort seem a little weird.
China recently deployed what it calls a "security robot" in a Shenzhen airport. It's na... | <urn:uuid:381ea043-e3c6-40d0-b562-ee50ca57613a> | CC-MAIN-2017-09 | http://www.itnews.com/article/3136745/robotics/china-s-policing-robot-cattle-prod-meets-supercomputer.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00612-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951167 | 551 | 2.59375 | 3 |
Every year the percentage of security breaches that take several months to be discovered and contained increases, why is this?
Every year the percentage of security breaches that take several months to be discovered and contained increases – a statistic that clearly highlights companies’ inefficiency in identifying and... | <urn:uuid:ba33e099-19bb-4c73-b618-f8ff4851fc40> | CC-MAIN-2017-09 | https://www.mwrinfosecurity.com/our-thinking/why-classic-incident-handling-fails/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00312-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952395 | 1,024 | 2.515625 | 3 |
To connect mobile health units in the hills of rural New England with broadband access, policymakers are looking up -- all the way to space. In the next few months, roaming trailers that serve rural communities and ships that double as health clinics for Maine’s outer islands will be equipped with the gear necessary to... | <urn:uuid:2aff540c-2e2d-4d48-9d41-9588afda99eb> | CC-MAIN-2017-09 | http://www.govtech.com/health/Space-Satellite-Connects-Rural-Health-Clinics-to-Broadband.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00488-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953318 | 371 | 2.515625 | 3 |
Program Provides High Schoolers Access to IT Careers
While some kids spent the past few months skiing and bowling in front of their Wiis or walking through the mall picking out the latest spring attire, more than 100 Chicago Public Schools students were preparing for an IT certification exam. On May 5 and 6, these stud... | <urn:uuid:fe61367e-f2c8-4936-9f0b-cab5f320ef2e> | CC-MAIN-2017-09 | http://certmag.com/program-provides-high-schoolers-access-to-it-careers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00429-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968519 | 1,111 | 2.625 | 3 |
While congress continues to wrangle over the future of specific space agency programs - in particular the seemingly doomed Ares rocket - NASA continues to prepare for future operations by bulking up commercial space, heavy lift rocket and outer space plans.
The space agency in the past few weeks has issued requests for... | <urn:uuid:456c2f03-f28b-4105-aaab-e9cfbc9813db> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2230819/security/nasa-preps-advanced-technology-for-the-future--now.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00305-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925931 | 1,413 | 2.65625 | 3 |
The European Commission is drafting new cybersecurity requirements to beef up security around so-called Internet of Things (IoT) devices such as Web-connected security cameras, routers and digital video recorders (DVRs). News of the expected proposal comes as security firms are warning that a great many IoT devices are... | <urn:uuid:50a49a5f-95fb-427a-9e60-44f8b2fe3b9c> | CC-MAIN-2017-09 | https://krebsonsecurity.com/tag/european-commission/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00305-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951178 | 837 | 2.546875 | 3 |
Enterprise organizations already struggle with the mass of data they need to manage and everyone knows that – “big data” buzzwords notwithstanding – it’s only going to get worse. As it turns out, a physics analogy may help you visualize the data problem and approach better solutions.
Some large enterprise organizations... | <urn:uuid:68c09eb9-1243-409e-a2bb-70a7556470f0> | CC-MAIN-2017-09 | https://www.druva.com/blog/data-gravity-charting-future-organizations-critical-information/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00305-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942292 | 937 | 2.8125 | 3 |
Traffic shaping, also known as packet shaping, Quality of Service (QoS) or bandwidth management, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from effecting other users. This bandwidth throttling or rate limiting is performed to guarantee QoS and return on in... | <urn:uuid:f78859a0-0d1b-4730-9523-afe8c7817f26> | CC-MAIN-2017-09 | https://www.a10networks.com/resources/glossary/traffic-shaping | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931939 | 199 | 2.96875 | 3 |
Many people use the Internet as the first port of call for current news and background information, and videos are very popular with users when doing so. If an email recipient clicks on the link contained in the email, he will be taken to a primed site containing five different YouTube videos.
But besides the five film... | <urn:uuid:b1176138-d005-4d45-b304-2fbed95d5d10> | CC-MAIN-2017-09 | https://www.gdata-software.com/news/3177-boston-marathon-bombing-being/page/82 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925882 | 299 | 2.53125 | 3 |
The security of critical infrastructure in the electricity sector is complex. Electricity assets are concentrated in small areas and distributed over large geographical expanses. They are manned and unmanned, involve dangerous equipment that citizens must be protected from, and they provide a resource to the public tha... | <urn:uuid:a45d7078-51b7-4463-843d-bafae0c49d60> | CC-MAIN-2017-09 | http://www.csoonline.com/article/3048348/security/at-the-intersection-of-energy-risk-management-and-facility-security.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00477-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934356 | 985 | 3.140625 | 3 |
Minimizing the Risk of BusinessBy Larry Dignan | Posted 2005-08-31 Email Print
The UPS Brown Voyager? It could happen if private companies take over low-earth space travel and free up NASA to shoot for the stars.
But tourism can only go so far, Meyers says. Space Island Group plans to use the insides of the current shu... | <urn:uuid:a13fda3b-cd2d-417b-89fb-f0d6a8785e64> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Business-Intelligence/Should-NASA-Open-LowOrbit-Space-to-Business/2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00177-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95458 | 491 | 2.515625 | 3 |
The use of fiber optic cables for communication has exposed gates for communication multiplexing technologies that maximize the capabilities at minimum costs. CWDM(Coarse wavelength division multiplexing), modulates different wavelength lasers with multiple signals. In effect, what this means is maximized use of a sing... | <urn:uuid:67b10ac0-f281-425a-91e5-d77fe676927d> | CC-MAIN-2017-09 | http://www.fs.com/blog/buy-cost-effective-cwdm-fiber-optic-products.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00177-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930579 | 635 | 3.359375 | 3 |
DOE appeal: Breaking exaflop barrier will require more funding
- By Frank Konkel
- Jul 17, 2013
The Cielo supercomputer at Los Alamos National Laboratory, built by Cray, has a theoretical maximum performance of 1.37 petaflops. (LANL photo)
Department of Energy-funded supercomputers were the first to crack the teraflop-... | <urn:uuid:1eda161c-b2c9-4edc-a2d1-078e35603423> | CC-MAIN-2017-09 | https://fcw.com/articles/2013/07/17/exoflop-supercomputing.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00529-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947302 | 1,209 | 2.578125 | 3 |
What is Google Apps and how does it work?
Google Apps is a suite of cloud-based productivity applications that you can access from any computer with an Internet connection, at any time. The data and the applications themselves are run from Google's data centers. Several versions of Google Apps are available: free, stan... | <urn:uuid:62ca9c08-df44-461c-a650-68a6c0127d8a> | CC-MAIN-2017-09 | http://www.cio.com/article/2418367/cloud-computing/google-apps-faq.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00169-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90705 | 1,039 | 2.546875 | 3 |
GPS systems quickly went from a luxury item to a necessity to a ubiquitous contributor to the geographic ignorance of Americans, many of whom rely on their smartphones' ability to give directions to every place they go to keep from having to learn the way themselves.
That's a problem when GPS is suddenly unavailable. W... | <urn:uuid:d9123ee9-7fbf-4d7d-98b2-e4f0e8a10c7d> | CC-MAIN-2017-09 | http://www.itworld.com/article/2722395/mobile/badger-network-may-keep-humans-from-getting-lost-underground.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00217-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959432 | 955 | 3.65625 | 4 |
How a simulated brain outperforms supercomputers
It may sound like science fiction, but the National Science Foundation reports that researchers have created a human brain simulator that in many ways can out-perform the world's fastest supercomputers.
The simulated brain is called Neurogrid, and is the brainchild (terr... | <urn:uuid:6ad774a0-8d06-4d5e-9e94-7568813c7506> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2013/04/how-a-simulated-brain-outperforms-supercomputers.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00393-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946406 | 536 | 3.59375 | 4 |
As we prepare for Cyber Monday and a holiday season of increased online shopping, NCSA advises that everyone take a moment to practice safe cyber behaviors.
These simple steps apply to everyone who connects to the Internet, whether from laptops, personal computers, mobile phones, or gaming consoles. Before you connect ... | <urn:uuid:7dac3f53-99c2-4ff1-9582-09d3bf85a2a0> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2011/11/21/secure-practices-for-online-shopping/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00093-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.897201 | 915 | 2.734375 | 3 |
Big Data Forcing Update of SQL Standard
A proposed standard would extend the SQL database language to accommodate multidimensional “data cubes” generated by scientists and engineers. The effort promises to launch a new technology dubbed “array databases.”
Proponents of the new standard, dubbed SQL/MDA, for “multidimens... | <urn:uuid:e07c9ac7-00d1-4131-838b-f7d694a210b4> | CC-MAIN-2017-09 | https://www.datanami.com/2014/06/25/big-data-forcing-update-sql-standard/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00445-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.903404 | 663 | 2.6875 | 3 |
Racism means many things to many people. Oxford says it’s “the belief that there are characteristics, abilities, or qualities specific to each race”. That’s a pretty broad definition, and arguably isn’t negative in and of itself.
The common use of the word is far more malicious and, in my opinion, ill-informed. Most pe... | <urn:uuid:aeffabdc-f440-4460-bb28-30f1b2d96f5c> | CC-MAIN-2017-09 | https://danielmiessler.com/blog/the-true-definition-of-racism/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00089-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970823 | 334 | 3.015625 | 3 |
“Keeping the home fires burning” has become one of the top priorities worldwide today, as nations from India to the United States continue to contend with high-profile electricity outages caused by inadequate infrastructure, as well as storm-related damage.
Even Germany, known for its advanced power policies, is worrie... | <urn:uuid:e894934f-82c8-4acb-9705-1470a4b8703e> | CC-MAIN-2017-09 | http://www.iotevolutionworld.com/topics/smart-grid/articles/2013/02/25/328198-energy-storage-germane-germanys-new-pv-solar-subsidy.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00441-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961862 | 690 | 2.578125 | 3 |
An optical switch developed at the Joint Quantum Institute (JQI) spurs the mark integration of photonics and electronics.
What, isn’t electronics adequate? Well, nothing travels faster than light, as well as in your time and effort to hurry in the processing andtransmission of knowledge, the combined use of photons alo... | <urn:uuid:8b897da1-c4e1-4b93-8e73-d24f63bc1854> | CC-MAIN-2017-09 | http://www.fs.com/blog/a-new-type-of-optical-switch-using-a-quantum-dot.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00561-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927219 | 817 | 3.75 | 4 |
In the past decade our identity has undeniably evolved, we’re preoccupied with identity theft and authentication issues, while governments work to adopt open identity technologies. David Mahdi, a Product Manager at Entrust, explains the critical issues in understanding the very nature of identity in a society actively ... | <urn:uuid:1616e2fc-52bc-4cf5-bf91-add6798be319> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2010/12/20/the-importance-of-identity-in-the-digital-age/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00437-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959108 | 2,166 | 2.59375 | 3 |
As we have covered almost all topics of scanning this is the last topic that come under scanning….
First of all ..
WHAT IS IP SPOOFING??
Ip spoofing is basically encrypting your Ip address so that it appears something else to attacker or victim i.e it is the virtual Ip address..
~ IP Spoofing is when an attacker change... | <urn:uuid:6f6737ae-67d1-4663-bec4-1f5807262579> | CC-MAIN-2017-09 | https://www.hackingloops.com/hacking-class-9-ip-spoofing-and-its-use/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00137-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932743 | 367 | 2.875 | 3 |
FASP transfer protocol speeds data transmission to the cloud
- By John Breeden II
- May 15, 2014
While the government uses the cloud to store everything from genomic sequences to climate data, the transfer speeds going into or coming out of any cloud are extremely slow compared to sharing data between more traditional ... | <urn:uuid:f5408834-d20b-4030-b54d-9521364ec0eb> | CC-MAIN-2017-09 | https://gcn.com/articles/2014/05/15/fose-data-transfer-protocol.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00434-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953971 | 745 | 2.75 | 3 |
Information security professionals have a tough time of it.
Consider what they have to cope with in today's IT environment. You have big data meeting BYOD, a combination that's almost an invitation to cyber-espionage. The traditional method for protecting corporate networks was to create a hardened outer shell that res... | <urn:uuid:60553a55-d6ae-4380-8c2b-5c0e3bfaf51b> | CC-MAIN-2017-09 | http://www.itworld.com/article/2710712/security/how-can-we-keep-infosec-pros-a-step-ahead-of-the-bad-guys-.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00486-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953273 | 727 | 2.796875 | 3 |
Discriminatory language is as pervasive on sites like Facebook and Twitter as it was a couple of years ago, but fewer teens and young adults seem to be OK with that, a recent survey found.
About half of young people reported seeing discriminatory language or images posted on social networking sites, according to the re... | <urn:uuid:2a266ad2-a1bf-430a-a1a3-c61d7473e45c> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2172059/data-center/study--slurs-still-litter-social-websites--but-such-language-is-increasingly-unacceptabl.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00006-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.978186 | 478 | 2.71875 | 3 |
British lawmakers want more transparency and less bias in decision-making -- not their own, of course, but in decisions made by AI systems.
As more and more software systems and connected devices employ artificial intelligence technologies to make decisions for their owners, the lawmakers want to know what's behind the... | <urn:uuid:670e8aa2-fd9e-4900-9eaf-74099715558b> | CC-MAIN-2017-09 | http://www.itnews.com/article/3130495/lawmakers-want-uk-to-set-example-on-transparency-in-ai-decision-making.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00358-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966443 | 487 | 3.0625 | 3 |
Crowdsourced mapping for flood tracking, prediction
- By Suzette Lohmeyer
- Dec 02, 2016
The latest tool in flood prediction for low-lying coastal areas in Hampton Roads, Va., is crowdsourced drone footage posted on YouTube.
While regulations and no-fly zones in the Norfolk area (home of the Norfolk Naval Base) should ... | <urn:uuid:faf517b1-e810-4274-a8dc-718b309b16fb> | CC-MAIN-2017-09 | https://gcn.com/articles/2016/12/02/crowdsourced-flood-tracking.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00002-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960584 | 1,042 | 2.546875 | 3 |
As the time goes by and the network with more and more virtualised servers and other devices are making that network more complicated, overlay technologies are rising to save the day for network administrators.
Virtual Extensible LAN – VXLAN is a new encapsulation technology used to run an overlay network on current La... | <urn:uuid:a6ba3b43-6c92-4bd8-9851-eedc440e31ac> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2014/vxlan | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00530-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92475 | 850 | 2.828125 | 3 |
Implant Runs on the Batteries in Your Ears
Implanted electronic devices can be powered by a biological battery that exists in the ear, researchers at MIT, the Massachusetts Eye and Ear Infirmary and the Harvard-IT Division of Health Sciences and Technology have demonstrated for the first time.
Team member Konstantina S... | <urn:uuid:6c2cdf33-20bb-4e02-9817-a5877b332a31> | CC-MAIN-2017-09 | http://www.linuxinsider.com/story/science/76580.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937186 | 897 | 3.5625 | 4 |
Geoff Huston, APNIC
The tabloid press is never lost for a good headline, but in July 2012 this one in particular caught my eye: "Global Chaos as Moment in Time Kills the Interwebs." I am pretty sure that "global chaos" is somewhat "over the top," but a problem did happen on July 1 this year, and yes, it affected the I... | <urn:uuid:94c10746-5cac-4828-817a-32fc13b386f7> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-57/153-leaping.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00650-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966093 | 3,588 | 3 | 3 |
The Internet Is An Imperfect and Hostile Place
The world is an imperfect place. The internet is no exception. The internet has its good days and it has its bad days. Or to be more precise, the internet has its good seconds and its bad seconds.
Blemishes in internet performance arise from many sources.
- There will alwa... | <urn:uuid:2c575a22-b224-41c3-b9b5-b2505b0f96e8> | CC-MAIN-2017-09 | http://info.iwl.com/blog/care-impairment-testing-internet-protocols/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00174-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944527 | 1,755 | 2.859375 | 3 |
Wikipedia project raises concerns over social media in class
A recent dust-up between Wikipedia and Canada's largest university raises questions about how collaborative the popular website that bills itself as "the free encyclopedia that anyone can edit" truly is.
The online information portal recently took a professor... | <urn:uuid:2ed9b0fc-8c20-47c4-81dd-57b9f7118ef3> | CC-MAIN-2017-09 | http://e-channelnews.com/ec_storydetail.php?ref=432094&title=Wikipedia-project-raises-concerns-over-social-media-in-class | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00350-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.974087 | 942 | 2.609375 | 3 |
Heartbleed: A Password Manager Reality CheckIs a password manager an effective defense against vulnerabilities like Heartbleed, or just another way to lose data to hackers?
10 Ways To Fight Digital Theft & Fraud
(Click image for larger view and slideshow.)
Should the OpenSSL Heartbleed bug serve as a wake-up call for p... | <urn:uuid:defae5c5-32bf-415d-8961-41140bb9a129> | CC-MAIN-2017-09 | http://www.darkreading.com/endpoint/heartbleed-a-password-manager-reality-check/d/d-id/1204549?_mc=RSS_DR_EDT | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00346-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9368 | 800 | 2.515625 | 3 |
Several automobile companies have been taking steps towards the implementation of hybrid technologies, and Ford is not about to be left behind. On Tuesday, it announced the development of a control system that would allow its electric cars to communicate with electric grids to adjust the timing of its charging schedule... | <urn:uuid:99435852-48bd-4f9a-9b77-ae6eb138acfc> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2009/08/fords-plug-in-hybrids-will-talk-to-electrical-grid/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00522-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962924 | 582 | 2.703125 | 3 |
In 1988, Ware Shoals, S.C., lost its largest employer, a move that sent the town reeling. Since 1902, the massive textile mill had hummed with activity and provided employment for the 2,500 residents of the small town, which sits on the banks of the Saluda River in the western part of the state. "We were a single indus... | <urn:uuid:33aead1f-ad39-426b-9528-5bec1bad8957> | CC-MAIN-2017-09 | http://www.govtech.com/policy-management/Brownfield-Resurrection.html?page=3 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00398-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956945 | 2,447 | 2.875 | 3 |
FreeRADIUS and Linux Secure Your WLAN
Best of ENP: Wireless security is still a bit of a mess. With Linux and RADIUS, you can begin to straighten it out.
The RADIUS (Remote Authentication Dial-In User Service) protocol has long been a standard authentication, authorization and accounting protocol for Internet service p... | <urn:uuid:acc11ca2-ddba-4c98-86a6-3b005c477c1e> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/netsecur/article.php/3555556/FreeRADIUS-and-Linux-Secure-Your-WLAN.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00042-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916496 | 1,361 | 2.515625 | 3 |
Geographic information systems (GIS) have assumed a key role in firefighting operations in recent years. Sophisticated GIS-driven mapping can help responders track events and position resources, layering on weather information and demographic data to give rescuers a full picture of the situation on the ground.
GIS may ... | <urn:uuid:afd1ff77-baf5-42ce-97f8-653529ad9757> | CC-MAIN-2017-09 | http://www.govtech.com/em/disaster/The-Role-of-GIS-in-the-Aftermath-of-a-Wildfire.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Esri-News+%28ESRI.com+-+News%29 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00570-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951234 | 2,386 | 2.765625 | 3 |
Don't program robots -- train them. That's the stated goal of Brain Corporation, whose operating system is designed to allow robots to learn how to dump trash or open doors via hands-on training, not programming.
The Brain Operating System -- also called BrainOS -- injects a level of intelligence into robots that will ... | <urn:uuid:378d1690-8a19-40ff-bc96-98742e22adad> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2490709/emerging-technology/train-robots-hands-on-to-dump-trash-with-this-new-os.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00094-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954859 | 725 | 3.328125 | 3 |
This is the first in a series of Market Updates on the creation of accessible documents. It concentrates on the creation of accessible PDF files from word processing and desktop publishing systems.
Document creation is one of the major parts of personal productivity.
An accessible electronic document is one that can be... | <urn:uuid:43759a82-aa6a-4f81-a503-2bf5a9f352d6> | CC-MAIN-2017-09 | http://www.bloorresearch.com/research/market-update/creation-of-accessible-documents/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00390-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939375 | 165 | 2.515625 | 3 |
NASA is taking its final steps to launching astronauts from American soil again and the first steps in sending humans into deep space and Mars.
The space agency announced that Boeing Co. and SpaceX, both U.S. companies, have landed highly-sought-after Commercial Crew Transportation Contracts to build the spacecraft tha... | <urn:uuid:0413070e-01d7-4867-a032-599ee3ae4115> | CC-MAIN-2017-09 | http://www.cio.com/article/2684065/space/nasa-gives-key-space-taxi-contracts-to-spacex-boeing.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00266-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948956 | 659 | 2.8125 | 3 |
The Air Force is looking for technology to correct radar interference caused by wind turbines, contracting documents show.
The proliferation of wind turbines and alternative energy projects around the country and near military installations has created risks that radar systems, which are used to track aircraft and othe... | <urn:uuid:81b99f8d-b13d-4b94-89da-3d803824ebe1> | CC-MAIN-2017-09 | http://www.nextgov.com/defense/2012/08/air-force-wants-correct-radar-inference-wind-turbines/57251/?oref=ng-channelriver | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00142-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948514 | 305 | 2.671875 | 3 |
Password management is a common IT support issue that creates problems for many organizations. Password management can be divided into two categories. The first category is normal user accounts, for day-to-day activities by normal users. The second category is privileged accounts, such as background applications and se... | <urn:uuid:38ed8986-8841-4540-a6e7-54d339458bfe> | CC-MAIN-2017-09 | https://www.netwrix.com/privileged_password_management.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00438-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940948 | 589 | 2.828125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.