text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Photo Gallery & Information about New 7 Wonders of the World
The Taj Mahal (1630 A.D.) Agra, India
Symbol of Love & Passion!
This immense mausoleum was built on the orders of Shah Jahan, the fifth Muslim Mogul emperor, to honor the memory of his beloved late wife. Built out of white marble and standing in formally laid... | <urn:uuid:8697ef32-6ea3-4cf3-85d6-3bc01db1e421> | CC-MAIN-2017-09 | http://www.knowledgepublisher.com/article-391.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00083-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944701 | 970 | 2.71875 | 3 |
Know the 4 denial of service types that can threaten the Domain Name System
- By William Jackson
- Jan 25, 2013
With the number of denial of service (DOS) attacks growing overall, a variety of techniques are being used to take advantage of the Domain Name System’s openness to direct attacks against DNS servers and even... | <urn:uuid:19f3f9ac-f736-48ef-89ff-6f47fc96aeff> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/01/25/4-denial-of-service-types-threaten-dns.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00435-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930297 | 656 | 2.6875 | 3 |
The telescope doors are open on a NASA spacecraft that could give scientists clues to space weather that affects communication systems, electronics and power networks.
Less than a month after launching the Interface Region Imaging Spectrograph (IRIS), NASA opened its telescope door on Wednesday. Simply uncovering the s... | <urn:uuid:11e86732-a875-410d-a698-9657ed6926ae> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2484104/emerging-technology/nasa-telescope-opens-eye-to-spy-on-the-sun.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00135-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939821 | 495 | 3.421875 | 3 |
GCN LAB IMPRESSIONS
Einstein was wrong? Fire up the Falcon!
- By John Breeden II
- Sep 27, 2011
This article has been updated to correct the value of the speed of light, which, as several comments point out, was listed incorrectly .
Let me start off by saying that I’m a huge fan of Albert Einstein. He put forth almost ... | <urn:uuid:385ad2c6-e6cc-477f-8c79-7f2fc3b20b54> | CC-MAIN-2017-09 | https://gcn.com/articles/2011/09/27/if-einstein-wrong-about-speed-of-light.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00311-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.969586 | 813 | 2.65625 | 3 |
A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
According to security researchers from Symantec, the malware spreads by exploiting a vulnerability in php-cgi, a component that allows PHP... | <urn:uuid:3835489b-101f-43db-8b3e-67290656c7b5> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2486333/malware-vulnerabilities/this-new-worm-targets-linux-pcs-and-embedded-devices.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00011-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936657 | 702 | 2.609375 | 3 |
Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is now looked at as a possible data breach.
Ransomware is vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid. There are di... | <urn:uuid:65728d9b-6df6-4d26-8f16-7ea5418584ba> | CC-MAIN-2017-09 | https://blog.knowbe4.com/a-short-history-evolution-of-ransomware | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00187-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94705 | 5,670 | 2.921875 | 3 |
A greenhouse is a structure developed for growing plants in a controlled environment. These structures capture the incoming visible solar radiation and retain heat to provide a favorable environment for plant growth. Traditionally, majority of the greenhouses used soil as the base for growing plants. However, hydroponi... | <urn:uuid:bf3c1a2f-ecc6-45d1-b8d5-d9a857a26ffc> | CC-MAIN-2017-09 | http://www.micromarketmonitor.com/market-report/greenhouse-reports-2983600293.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00007-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.894242 | 849 | 2.671875 | 3 |
Nearly fourteen billion years ago, the big bang of the universe transferred the world from a hot dense state to a totally different new world. Every moment something new is happening. As a small part of this new world, human now is also experiencing a big bang. However, this time, it’s about information, which is chang... | <urn:uuid:b091b5b5-885b-4568-85db-94aa76b1a180> | CC-MAIN-2017-09 | http://www.fs.com/blog/when-information-explosion-meets-big-data.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00127-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948591 | 600 | 3.578125 | 4 |
Sony and Lego are working together on creating a new generation of products that bridge the gap between toys and video games.
A team of researchers at Sony Computer Science Laboratories in Tokyo is embedding tiny motors, cameras, and actuators into Lego blocks. One demonstration uses two small motorized Lego platforms,... | <urn:uuid:b6411709-b918-49c1-9f12-14aadfe5d2b9> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2166611/data-center/sony-and-lego-collaborating-on-toy-research.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00303-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949701 | 344 | 3.125 | 3 |
CVE Terminology and FAQ
What is CVE?
CVE is a list of information security vulnerabilities and exposures that aims to provide common names for publicly known problems. The goal of CVE is to make it easier to share data across separate vulnerability capabilities (tools, repositories, and services) with this "common enum... | <urn:uuid:979cec8f-85a1-4e88-aae0-30138ec13e23> | CC-MAIN-2017-09 | https://www.cvedetails.com/cve-help.php | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00355-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.89875 | 275 | 2.96875 | 3 |
The new strain of bird flu infecting and killing people in China is on the move. All of the reported cases had been contained to a relative few hotspots, but the first reported case of a human infection outside mainland China arrived Wednesday, and that's got the world's top scientists pretty worried about this H7N9 st... | <urn:uuid:8fc56827-9265-466d-be59-8714b547b854> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2013/04/bird-flu-has-spread-beyond-china-and-its-one-most-lethal-ever/62754/?oref=ng-dropdown | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00055-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.981217 | 300 | 2.640625 | 3 |
When a computer system is able to reduce tax expenditures by millions of dollars and generate as much as $27 in savings for every dollar spent on expenses, you would think state officials would be scrambling to use it. But that's not the case with the Public Assistance Reporting Information System, better known as PARI... | <urn:uuid:66a13bab-07c3-4e99-8ad5-88e31cdca685> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/Shunning-PARIS.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00475-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964821 | 776 | 2.515625 | 3 |
Once again, our friends at sister brand Dr. Dobbs have provided me with yet more interesting blog fodder. In his editor's note in the daily Dr. Dobbs Update email, editorial director Jonathan Erickson discusses a breakthrough by Australian researchers who claimed to have developed the first "bug free" embedded software... | <urn:uuid:e9d74e28-7e27-45dc-8357-7d8f7504b21f> | CC-MAIN-2017-09 | http://www.banktech.com/channels/aussies-claim-to-have-developed-bug-free-os-for-mobile-platforms/d/d-id/1293115 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00651-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931916 | 1,003 | 2.5625 | 3 |
Multimode fibers are identified by the OM (“optical mode”) designation as outlined in the ISO/IEC 11801 standard:
Today, this evolution continues with the development of OM4 fiber as the industry prepares itself for speeds of 40 and 100 Gb/s.
OM3 and OM4 are both laser-optimized multimode fiber (LOMMF) and were develop... | <urn:uuid:46e00cd9-3b6b-4abc-b067-0ff8907fa5db> | CC-MAIN-2017-09 | http://www.fs.com/blog/om4-fiber-for-high-speed-applications.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00527-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940707 | 623 | 2.796875 | 3 |
1. DOMAIN NAME SERVICE Domain Name Service (“DNS”) is a corner stone capability/requirement in any use of the Internet. Domain names and DNS servers are essential to the proper function of anyone who uses or provides services via the Internet. As specified by Internet RFC’s 1034 and 1035, “There must be a valid Interne... | <urn:uuid:8b5c805c-f2ce-4f18-a154-6c0302fe125e> | CC-MAIN-2017-09 | http://support.electriclightwave.com/knowledge-base/internet-access-policy/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00047-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.898446 | 1,644 | 2.6875 | 3 |
Milky Way in High Resolution
/ February 7, 2012
A team of scientists led by the Max Planck Institute for Astrophysics (MPA) has produced the highest resolution map of the Milky Way's magnetic field by using more than 41,000 measurements from 26 projects, as reported in Gizmag.com.
Each of the map’s 41,330 individual da... | <urn:uuid:cb506b5f-2634-4feb-9092-514b9cf6b4cf> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Milky-Way-in-High-Resolution-02042012.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00047-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935673 | 228 | 3.46875 | 3 |
With the coming of the digital age, corporate work forces are becoming a custom to different and new types of learning. ELearning Industry reports 41% of global fortune 500 companies use some sort of educational technology to instruct employees.
Because the average age of the online learner report by Aurion Learning be... | <urn:uuid:c967e51f-8e7b-4768-b8e5-a5113a5f6364> | CC-MAIN-2017-09 | https://blog.inxpo.com/type/image/page/29/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00099-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929586 | 145 | 2.6875 | 3 |
DARPA seeks to shape young minds
Educational program targets grade schoolers
- By Henry Kenyon
- Oct 12, 2010
The Defense Department’s research and development agency has started an initiative to increase the number of computer science graduates in the United States. The three-year, $14.2 million dollar program will us... | <urn:uuid:8cfecd56-c6f0-4237-a46f-fd37751b14cd> | CC-MAIN-2017-09 | https://gcn.com/articles/2010/10/12/darpa-launches-computer-science-education-program.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00391-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943325 | 510 | 2.9375 | 3 |
Energy & Climate Change Strategy
EMC’s primary GHG emissions arise from the generation of the electricity needed to run our business—including our supply chain—and power our products. Therefore, our energy and climate change strategy focuses on the following key areas:
- Reducing emissions from our own operations by:
-... | <urn:uuid:33883bcf-94ab-4b87-bb4c-51881b201eed> | CC-MAIN-2017-09 | https://www.emc.com/corporate/sustainability/operations/energy-climate-change-strategy.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00139-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931175 | 3,032 | 2.546875 | 3 |
Photo: Press conference on the introduction of the ADA Restoration Act, July 26, 2007.
On July 26, 1990, a landmark piece of legislation became law. The Americans with Disabilities Act (ADA) was signed by President George H.W. Bush who called it "the world's first comprehensive declaration of equality for people with d... | <urn:uuid:0c869c52-f400-4a64-98cf-7759f19365fd> | CC-MAIN-2017-09 | http://www.govtech.com/health/Americans-With-Disabilities-Act-Sees-Possible.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00315-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965176 | 931 | 3.1875 | 3 |
Bluetooth Low Energy (BLE) was incorporated into the Bluetooth 4.0 specification in 2010 and experienced rapid uptake, including all the major operating systems, many of the smartphones and tablets we use today, plus a new breed of devices like fitness bands and simple RF tags. BLE excels at sharing small packets of da... | <urn:uuid:ea859a9d-91f2-4226-b810-32cf2907aa2c> | CC-MAIN-2017-09 | https://gtacknowledge.extremenetworks.com/articles/Q_A/What-is-BLE-support | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00315-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925927 | 349 | 2.609375 | 3 |
A year ago, President Obama and 46 other heads of state launched the Open Government Partnership, an initiative designed to increase transparency within governments around the world. The group’s declaration said that all adherent countries would:
- Promote openness, because more information about governmental activitie... | <urn:uuid:0fbabc04-fc06-405e-b981-263a96a326f3> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2012/09/open-government-partnership-marks-first-anniversary/58295/?oref=ng-HPriver | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00612-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939945 | 342 | 2.890625 | 3 |
"Transforming our nation's grid has been compared in significance with building the interstate highway system
or the development of the Internet. These efforts, rightly regarded as revolutionary, were preceded by countless
evolutionary steps."-- U.S. Department of Energy The Smart Grid: An Introduction
West Virginia Go... | <urn:uuid:ef39b9e1-e821-4cf6-913d-12d1acb7ff06> | CC-MAIN-2017-09 | http://www.govtech.com/technology/Smart-Grid-Update.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00312-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931485 | 365 | 2.546875 | 3 |
University of Oklahoma associate professor Amy McGovern is working to revolutionize tornado and storm prediction. McGovern’s ambitious tornado modeling and simulation project seeks to explain why some storms generate tornadoes while others don’t. The research is giving birth to new techniques for identifying the likely... | <urn:uuid:b55396bc-40e8-4507-8b37-2a68cef669b7> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/04/23/revolutionizing_tornado_prediction/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00608-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94116 | 702 | 3.453125 | 3 |
By: Candid Wueest, Software Engineer at Symantec
Virtual machines (VM) have been used for many years and are popular among researchers because malware can be executed and analyzed on them without having to reinstall production systems every time. These tests can be done manually or on automated systems, with each metho... | <urn:uuid:ff9254e2-4202-4f09-92b6-41f68b262fb1> | CC-MAIN-2017-09 | http://www.itbestofbreed.com/sponsors/symantec/best-tech/does-malware-still-detect-virtual-machines | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00184-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941218 | 565 | 2.53125 | 3 |
Black Box Explains... Speaker wire gauge
Wire gauge (often shown as AWG, for American Wire Gauge) is a measure of the thickness of the wire. The more a wire is drawn or sized, the smaller its diameter will be. The lower the wire gauge, the thicker the wire.
For example, a 24 AWG wire is thinner than a 14 AWG wire. A lo... | <urn:uuid:0179aa53-eecf-4e93-a8b2-525e1c2be136> | CC-MAIN-2017-09 | https://www.blackbox.com/en-au/products/black-box-explains/black-box-explains-speaker-wire-gauge | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00536-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.915401 | 304 | 2.546875 | 3 |
ISO Approves Ada 2012 Programming Language Standard
Ada is a structured, statically typed, imperative, wide-spectrum and object-oriented high-level computer programming language, extended from Pascal and other languages. It has strong built-in language support for explicit concurrency, offering tasks, synchronous messa... | <urn:uuid:23a87f01-0e4b-45c0-95d8-7ce70ca2e021> | CC-MAIN-2017-09 | http://www.eweek.com/developer/iso-approves-ada-2012-programming-language-standard-3 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00532-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950432 | 599 | 2.859375 | 3 |
GCN LAB IMPRESSIONS
If you need cool servers, open a window
- By John Breeden II
- Feb 08, 2012
A couple months ago I reported on a facility in Stockholm that was using the heat from a bank of liquid cooled servers to heat an entire research facility. Using the heat from our electronics for a useful purpose instead of ... | <urn:uuid:e68e6586-4b64-4e9d-9c08-670467aeb898> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/02/08/impressions-energy-cool-server-window-berkley-supercomputer.aspx?admgarea=TC_BigData | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00532-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949669 | 673 | 2.5625 | 3 |
Free Online NFPA, IBC, and ADA Codes and StandardsAuthor: Brian Rhodes, Published on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a number of widely referenced codes are avavailable free online if you know the ... | <urn:uuid:d4b1c6f1-ce13-4109-b3bd-5cb904cc61ee> | CC-MAIN-2017-09 | https://ipvm.com/reports/free-codes-standards-online | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00056-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.874942 | 899 | 2.515625 | 3 |
The Xenon's cache hierarchy: when is a cache not a "cache"?
Level 1 and level 2 caches sit logically (if not physically) between the CPU and main memory, replicating the contents of main memory and reducing the amount of time that the CPU has to wait on code and data. The complex process of moving code and data between... | <urn:uuid:5ee17cae-04f9-4f2a-868b-cf0c30352924> | CC-MAIN-2017-09 | https://arstechnica.com/features/2005/05/xbox360-1/5/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00476-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952398 | 1,138 | 2.890625 | 3 |
This is a demo of how we can create web-based services that consume and analyze data, and present that data in interesting ways.
Step 1: We will attempt to calculate your location based on your IP address.
Step 2: We'll ask you to confirm that the location we guessed is correct, or to try a different method to find whe... | <urn:uuid:306bf57b-d26d-4510-ac5e-abf660ca64fd> | CC-MAIN-2017-09 | https://services.consected.com/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00228-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956853 | 428 | 2.875 | 3 |
The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.
At the Hack in the Box 2014 security conference in Amsterdam, Corey Kallenberg, a security re... | <urn:uuid:b3462413-4336-4557-b43e-7ad645873a7d> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2304849/new-attack-methods-can-brick-systems-defeat-secure-boot-researchers-say.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00524-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947101 | 1,214 | 2.640625 | 3 |
The World Wildlife Fund (WWF) recently recognized IBM as an early leader in setting greenhouse gas emission reduction goals. In its new report Corporations: Unlikely Heroes in America’s Quest for Climate Action, WWF describes how companies like IBM know they can save money by becoming more efficient, securing less-expe... | <urn:uuid:a43d2ce3-c406-4b6b-b38d-20aadb71b9b8> | CC-MAIN-2017-09 | https://www.ibm.com/blogs/citizen-ibm/2017/02/balta_ibm_early_co2_leader.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00524-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951064 | 319 | 2.671875 | 3 |
Recent accidents involving Tesla cars may have been a setback for self-driving cars, but Nvidia believes a fast computer under the hood could make autonomous cars and cabs truly viable.
The company's new Drive PX 2 model is a palm-sized computer for autonomous cars that will marry mapping with artificial intelligence f... | <urn:uuid:f5a015e4-d451-4e24-9568-2e765769838b> | CC-MAIN-2017-09 | http://www.itnews.com/article/3119218/nvidias-updated-drive-px-2-computer-will-drive-autonomous-cabs.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00048-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947902 | 783 | 2.578125 | 3 |
Basic Linux commands you need to know for CompTIA’s new A+
As is the norm every few years, the CompTIA A+ exams (currently numbers 220-801 and 220-802) are being updated to reflect the current technology environment. The new exams (to be named 220-901 and 220-902) are expected by the end of the year and — for the most ... | <urn:uuid:97438bee-924b-4944-8911-5d00f0687522> | CC-MAIN-2017-09 | http://certmag.com/basic-linux-commands-need-know-comptias-new/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00576-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.883116 | 3,705 | 3.78125 | 4 |
Compression is very important. While resolution gets the attention, compression is critical and can be a silent killer - both for quality and bandwidth.
Regardless of resolution, all surveillance video is compressed. And even if 2 cameras have the same resolution, their compression levels can be much different. [See ou... | <urn:uuid:f1dc957a-716c-40ff-bdb8-c53873a3feec> | CC-MAIN-2017-09 | https://ipvm.com/reports/ip-camera-compression-comparison | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00044-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931249 | 300 | 2.734375 | 3 |
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was meant in part to help maintain the privacy and security of medical records that contain Protected Health Information (PHI). HIPAA grew out of the understanding being that when large amounts of PHI move into electronic formats, the risks of larg... | <urn:uuid:f5fd2e10-fca7-4791-8b4b-d635571897a3> | CC-MAIN-2017-09 | http://www.csoonline.com/article/3014612/security-awareness/physicians-and-social-media-where-there-s-no-second-opinion.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00220-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960214 | 924 | 2.578125 | 3 |
Law enforcement technology may not have reached the point where officers are replaced by cyborgs (think RoboCop), but new automated devices and robots are making public safety efforts more efficient and significantly less dangerous.
According to experts, unmanned ground robots, 3-D technology and various scientific dev... | <urn:uuid:d7197e9e-2e6c-4dae-9ba4-786e108dea31> | CC-MAIN-2017-09 | http://www.govtech.com/technology/RoboCop-Revisited-How-Automation-Is-Transforming-Public-Safety.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00572-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952463 | 1,982 | 2.71875 | 3 |
Snow Leopard's answer to the concurrency conundrum is called Grand Central Dispatch (GCD). As with QuickTime X, the name is extremely apt, though this is not entirely clear until you understand the technology.
The first thing to know about GCD is that it's not a new Cocoa framework or similar special-purpose frill off ... | <urn:uuid:893abb3b-5acd-4b87-aa62-d1108365205f> | CC-MAIN-2017-09 | https://arstechnica.com/apple/2009/08/mac-os-x-10-6/12/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00448-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962556 | 1,597 | 2.859375 | 3 |
The seventh-grade classroom at Aptos Middle School buzzed with animated kids, many of whom whispered to friends and shot curious looks at the visitors scattered around their classroom.
Local politicians, the superintendent of schools and media visited the classroom of 25 kids last Friday to watch a special lesson desig... | <urn:uuid:a2cc0c7a-9591-4fa4-9d14-3a4ee08cfc1e> | CC-MAIN-2017-09 | http://www.cio.com/article/2388957/internet/a-lesson-in-cyberbullying.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00568-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957205 | 383 | 3.171875 | 3 |
Explanation of the difference between creating a backup and disk cloning
The Backup operation of Acronis software creates an image file for backup and disaster recovery purposes, while the Disk Clone tool simply copies/moves the entire contents of one hard disk drive to another. Here's how both tools work and when you ... | <urn:uuid:5d34df74-7c99-45a9-acdc-a8144b246d26> | CC-MAIN-2017-09 | https://kb.acronis.com/content/1540 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00092-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90118 | 620 | 2.703125 | 3 |
Google, Microsoft and Mozilla announced on Jan 3 that they are revoking trust in two digital certificates accidentally issued by Turkish certificate authority (CA) TURKTRUST. When you start talking about another CA fiasco, there are many people whose eyes glaze over when reading technical details because they know it's... | <urn:uuid:a30ffe4c-f9c9-4369-b4c5-b8cf0936fcb1> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2223772/microsoft-subnet/chrome--firefox--ie-to-block-fraudulent-digital-certificate.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00444-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93232 | 1,338 | 2.578125 | 3 |
Fred Baker, Cisco Systems
In today's Internet, site multihoming—an edge network configuration that has more than one service provider but does not provide transit communication between them—is relatively common. Per the statistics at www.potaroo.net, almost 40,000 Autonomous Systems are in the network, of which about 5... | <urn:uuid:a1b40a58-9b37-4a1e-ae8d-5d59bf8dd437> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-52/142-multihoming.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00620-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946924 | 4,055 | 3 | 3 |
IBM's Watson cognitive computer will soon be helping Mayo Clinic enroll patients in clinical trials in an effort to increase the speed of new discoveries while offering patients more and better treatment possibilities. The collaboration will begin with research studies in cancer.
"Ultimately, we believe Watson will hel... | <urn:uuid:5060b710-6988-419a-bf39-154e1b9d7282> | CC-MAIN-2017-09 | http://www.itworld.com/article/2694387/data-center/mayo-clinic-turns-to-ibm-s-watson-to-fill-clinical-trials.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00620-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94011 | 838 | 2.609375 | 3 |
Manage and Maintain Physical and Logical Devices
These questions are based on 70-290 – Managing and Maintaining a Microsoft Windows Server 2003 Environment
Self Test Software Practice Test
Objective: Manage and maintain physical and logical devices.
Sub-objective: Troubleshoot server hardware devices.
Single answer, mu... | <urn:uuid:56ad981f-c012-451c-b9a1-f0c11edbea37> | CC-MAIN-2017-09 | http://certmag.com/manage-and-maintain-physical-and-logical-devices/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00616-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.894056 | 817 | 2.84375 | 3 |
Japan's space agency said Friday that sensitive information on a new long-range rocket project may have been stolen by a computer virus.
The Japan Aerospace Exploration Agency, or JAXA, said it found evidence that a single employee's computer was infected by a virus that collected information and transmitted it externa... | <urn:uuid:e21b7127-4a58-4dab-9fe6-d51413efb020> | CC-MAIN-2017-09 | http://www.cio.com/article/2390021/data-breach/japan-space-agency--virus-may-have-stolen-space-rocket-data.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00492-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.978607 | 396 | 2.65625 | 3 |
At some point in our lives, we’ve all gone through some online account creation process and created a password. Frequently, we’re required to choose a password that includes something like at least one capital letter, one number, et cetera. The stricter the criteria, the more layers of security we think we’ve added to ... | <urn:uuid:5ad7d139-bb39-47ca-b16a-e4a53a0eff3a> | CC-MAIN-2017-09 | http://www.codero.com/blog/password-security-best-practices-and-tips/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00085-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930187 | 912 | 3.734375 | 4 |
To help itself, Sun may finally relax its grip on the net's programming language.
The way Suns Java programming language has been developed is something of a paradox.
Sun owns the core code behind Java, which is used to create applications that can run across an almost-unlimited number of computers in a "distributed" e... | <urn:uuid:a2cc4eed-086b-44d8-95bf-f60513f08d28> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Application-Development/Will-Java-Roast-on-An-Open-Fire | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00137-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959729 | 795 | 2.6875 | 3 |
When future historians look back on 2011, they’ll certainly conclude that we were a society obsessed with video games, minicomputers masquerading as phones and an endless supply of online distraction. But in a few years, many technologies developed in service of these functions may be repurposed in extraordinarily sens... | <urn:uuid:aa73b21d-60b1-44bb-a023-b58e592a1b62> | CC-MAIN-2017-09 | http://www.govtech.com/technology/Five-Emerging-Technologies-Soon-to-Hit-the-Government-Market.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00013-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942011 | 3,076 | 2.59375 | 3 |
Intel Debuts Wireless Chip
Semiconductor giant Intel, announced Wednesday that they have produced the technology to bring many futuristic gizmos to today's market. Currently, a wireless device is made up of several different chips, each entitled to their own task such as communications, memory and processing. Intel pla... | <urn:uuid:5571eab5-16a4-4dda-a9ba-fcfe2ef7187c> | CC-MAIN-2017-09 | https://betanews.com/2001/05/17/intel-debuts-wireless-chip/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00013-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953873 | 320 | 2.6875 | 3 |
DARPA's dielets and the prominence of provenance
The Defense Advanced Research Projects Agency is looking for proposals to develop a “dielet,” an electronic component to authenticate the provenance of other electronic components. DARPA wants to use the tool to help track counterfeit electronic parts infiltrating the mi... | <urn:uuid:17750203-4440-419a-b97a-77466bca85d2> | CC-MAIN-2017-09 | https://gcn.com/blogs/reality-check/2014/04/data-provenance.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00309-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.900829 | 584 | 2.734375 | 3 |
Processor.com: Improve Your Understanding Of Cloud Computing
Send a friend or colleague a link to this article
Cloud computing can be confusing, with multiple models, different types of cloud services, and perceived money-saving features that may be too good to be true. When comparing the available cloud services, you ... | <urn:uuid:f1c6014b-0c91-45c2-9889-209982f8befe> | CC-MAIN-2017-09 | https://www.infotech.com/research/it-processorcom-improve-your-understanding-of-cloud-computing | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00485-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.894386 | 224 | 2.78125 | 3 |
Welcome to Internap’s Big Data Video series. First, let’s cover the Big Data Basics.
What is meant by the term, Big Data? Why is it important? And what are some common Big Data use cases?
Big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database management to... | <urn:uuid:4e31a70c-b685-47cb-990d-6e0752d133f9> | CC-MAIN-2017-09 | http://www.internap.com/resources/video-big-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00009-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935506 | 776 | 3.421875 | 3 |
$25 computer could help create the techies of tomorrow
It’s always great to see efforts to bring young people into the world of computers and programming. It keeps the public sector and industry alike from worrying about not having enough new people to carry the torch.
Along those lines, one of the most innovative proj... | <urn:uuid:c1886a15-acfd-4d7a-bdcf-d39490e26d8b> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2012/12/raspberry-pi-could-help-create-the-techies-of-tomorrow.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00009-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96287 | 691 | 2.90625 | 3 |
Researchers across scientific disciplines are clamoring for exascale systems that can handle bigger, more complex models. When it comes to the climate modeling and weather forecasting business, researchers are finding promise in using new HPC architectures, such as the one used in the Green Flash cluster, to get closer... | <urn:uuid:5d50aae5-c494-4d2b-93a1-97679021fb42> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/07/18/green_flash_heralds_potential_breakthrough_in_climate_modeling_exascale_design/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00009-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951451 | 748 | 3.25 | 3 |
NASA's rover Curiosity is set to spend the next several days using the camera on its mast in a search for the next route to travel on Mars.
Scientists are already on the lookout for a rock on the surface of Mars to try out the rover's hammering drill, which sits at the end of the its robotic arm. The tool will be used ... | <urn:uuid:080c1c0f-7642-4c7c-82ca-00ed224aa23f> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2493369/emerging-technology/nasa-s-mars-rover-gets-thanksgiving-mission.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00185-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949504 | 549 | 3.390625 | 3 |
The Norwegian town of Rjukan is located in a valley between steep hills -- so steep, in fact, that the town is impenetrable by sunlight for five months of the year.
But three sets of giant mirrors, with a surface area of 538 square feet, are poised to shed some light on Rjukan during its dark months. The mirrors, locat... | <urn:uuid:58cedfbb-0c31-45e7-8887-d833f87b395e> | CC-MAIN-2017-09 | http://www.govtech.com/Photo-of-the-Week---Giant-Mirrors-Light-Norwegian-Valley.html?flipboard=yes | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00361-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.975171 | 194 | 2.625 | 3 |
Microsoft has partnered with a San Francisco-based company to encode information on synthetic DNA to test its potential as a new medium for data storage.
Twist Bioscience will provide Microsoft with 10 million DNA strands for the purpose of encoding digital data. In other words, Microsoft is trying to figure out how th... | <urn:uuid:b2a4bc96-ab16-4cb6-bc12-c4688ba14127> | CC-MAIN-2017-09 | http://www.itnews.com/article/3062694/microsoft-is-making-big-data-really-small-using-dna.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00361-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948742 | 345 | 2.921875 | 3 |
Memory and Storage
Lots of Memory The standard and maximum amount of RAM is a common entry in printer spec sheets, but unless you know what it's used for-holding print jobs in a queue, rasterizing additional pages while other pages print, or something else altogether-it doesn't tell you much. More important, it doesn't... | <urn:uuid:a75e4eaa-faba-4abc-987d-9534ba5b5ea4> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Printers/Playing-Fast-and-Loose-with-Printer-Specs/4 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00129-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937054 | 223 | 2.75 | 3 |
Children learn by playing. Smart people have known this for eons. Plato suggested that in order to teach, we should “Not keep children to their studies by compulsion but by play.” So if you want to teach a child to grow up and become a coder, the best way – according to some mighty philosophers – would be to play a gam... | <urn:uuid:cd199cfe-5e36-448a-8427-6711f8c172cf> | CC-MAIN-2017-09 | http://www.itworld.com/article/2700530/careers/teach-a-child-to-code.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.978854 | 594 | 3.0625 | 3 |
Block Traffic among two VLAN’s but only in one way, how to do that?
VLAN and VLAN configurations are very useful in all kinds of different ways. This configuration will be useful sooner or later for all network administrators out there.
It was a big challenge to resolve this tricky communication security requirement. T... | <urn:uuid:10353d12-2942-45f0-85bb-b793274597fa> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2012/allow-vlan-access-but-no-back | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.890931 | 951 | 2.703125 | 3 |
When IP Addresses Conflict
Q: Every now and then, I get a pop-up on my work computer that reads, “There is an IP address conflict with another system on the network.” This happens at times when I need my network the most, but, in order to recover, a reboot is required. So far I have been unable to find out what is caus... | <urn:uuid:519149e3-923f-4943-8959-d39919faedd0> | CC-MAIN-2017-09 | http://certmag.com/when-ip-addresses-conflict/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00057-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934639 | 847 | 2.890625 | 3 |
A race to restore the voices of the past
- By William Jackson
- Feb 08, 2012
In the 1880s, Alexander Graham Bell and his associates working in Washington performed some of the earliest experiments with optical transmission and sound recording. Nearly 130 years later, a team of physicists, curators and preservationists ... | <urn:uuid:fb536fec-d8fb-41fa-8f88-e8d0440c3fb2> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/02/06/doe-digital-imaging-of-bell-recordings.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00057-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962755 | 2,456 | 3.234375 | 3 |
Frame Relay, part 1
Network Consultants Handbook - Frame Relay
by Matthew Castelli
Frame Relay is a Layer 2 (data link) wide-area networking (WAN) protocol that operates at both Layer 1 (physical) and Layer 2 (data link) of the OSI networking model. Although Frame Relay internetworking services were initially designed ... | <urn:uuid:299e590e-5049-47b5-9fea-fe786c5e5768> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsp/article.php/10953_951371_3/Frame-Relay-part-1.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00405-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.883325 | 1,469 | 3 | 3 |
It’s something tech-savvy grandchildren have warned their elders about for years: Microsoft’s Internet Explorer has long been ridiculed as a “lame duck” Web browser, although version 11 was a step in a more modern direction.
Now, a grave and widespread vulnerability in the application makes the argument for switching t... | <urn:uuid:ed00ebcb-6d66-42ea-8743-7d9b4d5f280d> | CC-MAIN-2017-09 | http://www.govtech.com/internet/Internet-explorer-vulnerability-makes-browser-switch-a-good-idea.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00097-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.893131 | 624 | 2.578125 | 3 |
It’s Tax Identity Theft Awareness Week in the United States, which means that tax-related identity theft happens often enough to get the government’s attention. The Federal Trade Commission (FTC) and Internal Revenue Service (IRS) have provided the public with a number of resources to help raise awareness on this issue... | <urn:uuid:066ab693-1dbb-410c-9699-89e351d6c104> | CC-MAIN-2017-09 | https://blog.barracuda.com/category/barracuda-products/barracuda-email-security-service/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00093-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958634 | 1,232 | 2.734375 | 3 |
BPM 101: Introduction to BPM [Video]
This video is brought to you by BPM Basics and sponsored by Appian.
BPM stands for Business Process Management. BPM can be defined as a management approach to continuously improve processes and achieve organizational objectives through a set of methodologies.
BPM has multiple input ... | <urn:uuid:79f0d4e2-6574-498f-b9dd-6a0529f29f7c> | CC-MAIN-2017-09 | http://www.appian.com/blog/technology-insights/bpm-101-introduction-to-business-process-management | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00145-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937807 | 211 | 3.015625 | 3 |
Femtocell is quickly becoming a buzzword in the mobile space, and it also impacts wireless data users one way or another. Basically, femtocell is a term used to describe a small base station or a signal strengthener/repeater, but there are many factors to consider other than just the technical ones when it comes to fem... | <urn:uuid:702777c5-5fb4-4610-ba48-79ab40f246cb> | CC-MAIN-2017-09 | http://www.highspeedexperts.com/femtocell-guide/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00565-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948038 | 970 | 3.078125 | 3 |
Sending data in plain text just doesn't cut it in an age of abundant hack attacks and mass metadata collection. Some of the biggest names on the Web--Facebook, Google, Twitter, etc.--have already embraced default encryption to safeguard your precious data, and the next-gen version of the crucial HTTP protocol will only... | <urn:uuid:cceac48b-e0cc-4a2a-98c4-980369990f84> | CC-MAIN-2017-09 | http://www.cio.com/article/2380926/internet/next-gen-http-2-0-protocol-will-require-https-encryption--most-of-the-time-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00089-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921655 | 962 | 2.515625 | 3 |
Last week, the U.S. Department of Homeland Security's Science and Technology Directorate began a pilot of an interoperable communications system with the District of Columbia Office of the Chief Technology Officer (OCTO). The Radio Over Wireless Broadband (ROW-B) project will demonstrate how to connect existing wireles... | <urn:uuid:1198ce59-e9a6-476d-acdc-9f5655c2b9a0> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/DHS-Pilots-Interoperable-Wireless-Network-with.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00617-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92389 | 411 | 2.796875 | 3 |
The Hiller Advanced Research Division (A.R.D.) incorporated a five foot fiberglass round wing, (ducted fan) with twin counter rotating coaxial propellers powered by two 44hp/4000 rpm, four cylinder opposed, two-cycle, Nelson H-59 Engines. The Nelson engine was the first two-cycle engine certified by the FAA for aircraf... | <urn:uuid:8ee79736-a50d-4b83-809d-47d46a541b42> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2287179/data-center/151670-The-zany-world-of-identified-flying-objects.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00617-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964594 | 158 | 2.9375 | 3 |
It's spring break, and high school students are eager to put away their books, binders, pencils and... iPads?
High school classrooms, teaching techniques and the very way students learn may receive a tech infusion in the near future. Already some schools across the country, most notably the Los Angeles Unified School D... | <urn:uuid:418a98d9-e0db-4d9e-ad9b-4a920206bd04> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2894246/tablets/can-tech-help-teachers-teach-and-students-learn.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00317-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963251 | 842 | 3.015625 | 3 |
The Food and Drug Administration plans to apply the same strict regulations to mobile apps as it does to medical devices, such as blood pressure monitors, if those apps perform the same functions as stand-alone or computer based devices.
The FDA has developed a “tailored” approach to regulation of mobile apps that woul... | <urn:uuid:f58b94a8-ca82-40f3-8f1d-fd1715058eb6> | CC-MAIN-2017-09 | http://www.nextgov.com/mobile/2013/09/fda-will-regulate-some-mobile-medical-apps-devices/70760/?oref=ng-dropdown | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00317-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953069 | 591 | 2.546875 | 3 |
Assisting the GPS unit
GPS was designed around devices operated outdoors, and that's why there's room for improvement. This is where AGPS, and services that can also use GPS data, come in. A standalone GPS is most often used outdoors, where there's often a good line of sight to several satellites. Because its most comm... | <urn:uuid:06add1d0-5eb3-4119-8b4e-fcf5628786a1> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2009/01/assisted-gps/2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00086-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965293 | 814 | 2.6875 | 3 |
American space agency NASA has built an Artificial Intelligence (AI) platform capable of aiding firefighters when they enter a burning building.
The platform, called Audrey, is the product of a partnership between the agency’s Jet Propulsion Lab (JPL) and the Department for Homeland Security (DHS).
This project forms p... | <urn:uuid:b36d068c-d736-498c-a6ed-5b3b4334e825> | CC-MAIN-2017-09 | https://internetofbusiness.com/nasa-builds-ai-platform-firefighters/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00086-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92833 | 645 | 2.90625 | 3 |
Question: Do you remember the Amiga computer? I was an early fan is this wonderful machine and operating system. Starting with AmigaOS 2.0, a macro language called ARexx (with a letter “A” like “Amiga) was added. This language, derived from REXX (“REstructured eXtended eXecutor“) developed initialy by IBM. The power of... | <urn:uuid:86425c2b-88d1-44fb-8eb8-8786993dc42d> | CC-MAIN-2017-09 | https://blog.rootshell.be/2009/12/09/protect-your-infrastructure-with-iron/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00314-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94393 | 654 | 2.9375 | 3 |
When a Canadian producer of high-quality technical outerwear could no longer afford the high cost of labor in Canada, it decided to head south.
The company chose El Salvador, which offered a relatively large industry of approximately 150 textile and apparel companies and a large pool of experienced workers including op... | <urn:uuid:4c515c9d-9efa-44ad-b681-ad25ab917adf> | CC-MAIN-2017-09 | http://apparel.edgl.com/magazine/February-2013/-In-Apparel-and-In-Spaceships,-Big-Solutions-Can-Come-in-Small-Sizes83331 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00490-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965893 | 1,076 | 2.859375 | 3 |
The island of Sriharkiota, off the east coast of India, was the site of the launch of the country's first mission to Mars on Tuesday, Nov. 5. Approximately 45 minutes later, the 3,000-pound "Mangalyaan" orbiter separated from the rocket, embarking upon an elliptical path around Earth. From there, after about three week... | <urn:uuid:d1bbd778-65da-4f1c-ba5d-d44735b1691d> | CC-MAIN-2017-09 | http://www.govtech.com/Photo-of-the-Week-Indias-Mission-to-Mars.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00490-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936147 | 176 | 3.265625 | 3 |
Social engineering – they know what you’re thinking
Social engineering is the practice of manipulating people to obtain confidential information to commit fraud. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information. They will collect basic pieces of informat... | <urn:uuid:fa6c53f5-53af-457b-908d-c4ea0c61395f> | CC-MAIN-2017-09 | http://news.centurylink.com/blogs/security/social-engineering-they-know-what-youre-thinking | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00190-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.88823 | 330 | 2.8125 | 3 |
Undoubtedly, corporations are realising the benefits of IP voice systems. Voice over internet protocol (VoIP) can bring substantial cost savings and productivity enhancements to a business by transforming its circuit-switched networks to IP packet switching networks and running voice and data applications over a single... | <urn:uuid:010de8be-8015-4e5f-9bb3-3f39bc0ab45c> | CC-MAIN-2017-09 | http://www.itworld.com/article/2726525/security/ip-voice-security--are-you-susceptible-or-strong-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00190-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935945 | 1,151 | 2.640625 | 3 |
Four months after an explosion tore through its signature Falcon 9 rocket during fueling, destroying the rocket and its multimillion-dollar cargo in just 93 milliseconds, SpaceX says it has isolated what went wrong and is ready to fly again.
If the Federal Aviation Administration issues the company a license, likely fo... | <urn:uuid:81000549-c79d-4a04-b739-5e52944c5fcd> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2017/01/spacex-says-it-figured-out-why-its-rocket-exploded-and-will-fly-again-within-days/134283/?oref=ng-trending | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00610-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954616 | 798 | 2.96875 | 3 |
By: Joel Carleton, CSID Director of Cyber Engineering
We’ve all heard that it’s important to pick long, complicated passwords. What you may not realize is why this becomes crucial in the context of a breach. While ensuring you don’t pick from some of the most common passwords is important, it’s still not enough.
Some b... | <urn:uuid:347505c4-1a83-4474-8423-7632fe605f73> | CC-MAIN-2017-09 | https://www.csid.com/2012/05/password-complexity-why-it-makes-a-difference-in-a-breach/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00610-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948699 | 744 | 3.1875 | 3 |
At first, GPUs could be used for a very narrow range of tasks (try to guess what), but they looked very attractive, and software developers decided to use their power for allocating a part of computing to graphics accelerators. Since GPU cannot be used in the same way as CPU, this required new tools that did not take l... | <urn:uuid:11fbfa67-cc73-4aa3-8a20-8050e48eb297> | CC-MAIN-2017-09 | https://hackmag.com/author/yurembo/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00186-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967015 | 167 | 3.6875 | 4 |
Supercomputer architectures have evolved considerably over the last 20 years, particularly in the number of processors that are linked together. One aspect of HPC architecture that hasn’t changed is the MPI programming model. To get around the bottleneck that MPI poses to exascale computing, developers are banking on t... | <urn:uuid:1b98b38e-0868-4b1c-846d-1cff8232c892> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/06/19/developers_tout_gpi_model_for_exascale_computing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00538-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94184 | 568 | 3.078125 | 3 |
The words ‘facilitate’, ‘facilitation’ and ‘facilitator’ are in common use in a wide variety of contexts. Unfortunately, there can be some confusion because these words’ meanings seem, at best, fluid and, at worst, malleable.
Facilitation is a basic life skill which is much used in the business world. There, it can be ... | <urn:uuid:73684636-5a0e-43b9-87e0-904f0fd4df8d> | CC-MAIN-2017-09 | http://blog.apmg-international.com/index.php/2013/01/24/facilitation-in-management/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00130-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944528 | 412 | 2.765625 | 3 |
NASA's NuSTAR Takes Collaboration Into the StarsBy Samuel Greengard | Posted 2016-05-04 Email Print
A cloud-based collaboration platform enables a global team of astrophysicists and other scientists to boldly go where knowledge sharing has never gone before.
Few fields generate as much research matter as astronomy and ... | <urn:uuid:df85076b-8b4b-4fde-8cba-51c7a52c2ec3> | CC-MAIN-2017-09 | http://www.baselinemag.com/messaging-and-collaboration/nasas-nustar-takes-collaboration-into-the-stars.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00306-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955169 | 720 | 2.515625 | 3 |
Diminishing resources and a growing world population underscore the absolute necessity of protecting our environment for the benefit of future generations. This will require us to rethink our existing patterns of resource use to globally establish a shared frame of reference and take concerted action. We have no other ... | <urn:uuid:e857be89-4543-4e76-b23a-9160db9ccee4> | CC-MAIN-2017-09 | http://www.gemalto.com/govt/inspired/green-it-egov-slide | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00006-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926684 | 2,154 | 3.25 | 3 |
Data Masking and Encryption Are Different
A common misconception within the data community is that encryption is considered a form of data masking. Even worse is that there are some that erroneously identify both as one and the same. Data masking and Data encryption are two technically distinct processes. Encryption at... | <urn:uuid:aa96d8b2-d969-45ca-926c-72aeefa71305> | CC-MAIN-2017-09 | https://blogs.informatica.com/2015/10/05/data-masking-and-encryption-are-different/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936058 | 1,075 | 3.109375 | 3 |
In nearly every research discipline, the number of scientific instruments available to add to the stream of data input has been climbing. While this has spurred any number of software developments in recent years, without adequate hardware processing capabilities to handle the delgue, there can be no match for the poss... | <urn:uuid:f8b985e4-4670-4dae-a12f-3633fd23c5e7> | CC-MAIN-2017-09 | https://www.hpcwire.com/2011/01/17/canada_explores_new_frontiers_in_astroinformatics/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942952 | 1,439 | 2.875 | 3 |
Refer to the exhibit:What will Router1 do when it receives the data frame shown? (Choose three.)
Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)
Which layer in the OSI reference model is responsible for determining the availability of thereceiving program and checking t... | <urn:uuid:5279a64b-6c35-4140-b65e-b5d349cf2e16> | CC-MAIN-2017-09 | http://www.aiotestking.com/cisco/category/exam-200-120-cisco-certified-network-associate-ccna-update-april-24th-2016/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00058-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90926 | 283 | 3 | 3 |
We all know that teaching others is a time honored activity. Parents teach their children about the world. Master craftsmen teach their apprentices the tools, tricks, and techniques of the trade. Many athletes become coaches and many technologists often mentor new, less experienced, members of the profession.
As you ma... | <urn:uuid:96bb26e6-6fdb-403d-ad4d-6197708863ac> | CC-MAIN-2017-09 | http://www.itworld.com/article/2718454/careers/5-reasons-teaching-technology-to-others-is-good-for-you.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00478-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965697 | 1,083 | 2.6875 | 3 |
Women in IT often end up feeling like "lone wolves," not only because 83% of the technology workforce is male, but also because many feel that their skills are under-valued.
As a result, 40% more women than men choose to leave their jobs after 10 years in the industry, according to Belinda Parmer, CEO of campaigning ag... | <urn:uuid:006740d6-a293-43ed-824c-cdcbaca68bb5> | CC-MAIN-2017-09 | http://www.itworld.com/article/2715713/it-management/women-in-it-should-not-feel-like--lone-wolves---says-lobby-group.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00354-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970232 | 958 | 2.625 | 3 |
What ever happened to IPv5?
On the road to IPv6, everyone seems to have overlooked a mile marker
- By Brian Robinson
- Jul 31, 2006
In all of the debate about the transition from IPv4 to IPv6, few people ever seem to ask about whatever happened to IPv5. Like Formula 408 and Special J cereal, some wonder whether an IPv5... | <urn:uuid:8367ad9e-c38f-484d-8f02-a22e408cbf88> | CC-MAIN-2017-09 | https://fcw.com/articles/2006/07/31/what-ever-happened-to-ipv5.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00406-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.968547 | 626 | 3 | 3 |
The fingerprinting program that began last month for visitors and non-U.S. citizens entering the U.S., certainly underscores the need for a comprehensive authentication system to help strengthen our borders. While this program will begin to enhance the security of our nation, the debate surrounding domestic identity ve... | <urn:uuid:3583652d-a19b-4868-889f-c242efbc4017> | CC-MAIN-2017-09 | http://www.banktech.com/core-systems/lexisnexis-is-identity-fraud-an-identity-crisis/d/d-id/1289121 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00050-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946974 | 724 | 2.671875 | 3 |
Practice: Create geolocation components
From the developerWorks archives
Date archived: January 4, 2017 | First published: October 07, 2011
The use of geographical assets to determine where someone or something is located, and then selling that specific set of information to anyone who wants to use it is the essence of... | <urn:uuid:e8698219-8e00-40e1-8015-7fa8000037d3> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/library/wa-geolocation-pr/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00050-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934658 | 161 | 2.65625 | 3 |
New competition for sovereign nations
Until the 1960s, Europe had few commercial radio stations. Broadcasting was a government monopoly in many European countries, and listening options were limited to a few staid government stations such as the BBC. But as Erwin Strauss tells it, that changed when enterprising "pirate... | <urn:uuid:6418d905-d4b9-4d85-b198-882dcd4e9198> | CC-MAIN-2017-09 | https://arstechnica.com/features/2008/06/seasteading-engineering-the-long-tail/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00050-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9701 | 1,045 | 2.71875 | 3 |
This story has been updated.
Persistent mental health conditions -- anxiety, depression and sleep disorders -- along with neck, back, and joint pains among Afghanistan and Iraq war veterans may someday “be recognized as signature scars of the long war,” that began with the U.S. invasion of Afghanistan in 2001, the Arme... | <urn:uuid:0f294548-f12a-4289-be00-f06fd76b9a26> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2013/04/poor-mental-health-signature-scar-afghanistan-and-iraq-wars/62757/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00226-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951837 | 763 | 2.546875 | 3 |
Is the Matrix next? A team of scientists at MIT has created a computer simulation of the universe that is being called the most accurate ever.
The computer model simulation, developed by a team lead by Mark Vogelsberger, begins shortly after the creation of the universe and continues until the current age. A descriptio... | <urn:uuid:d6944fcf-198f-45ec-aeb6-a4296c24b870> | CC-MAIN-2017-09 | http://www.cio-today.com/article/index.php?story_id=92576 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00402-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954746 | 617 | 3.53125 | 4 |
Researchers from the University of Strathclyde in Scotland have begun developing a new Light Fidelity (know as ‘Li-Fi’) technology that could turn ordinary LED lights into a sophisticated wireless communications network like WiFi. The technology works much like infrared remote controls, only much more powerful.
This is... | <urn:uuid:a7ae3cdc-1dcc-4be3-b2b6-22bdb9a4b85a> | CC-MAIN-2017-09 | https://www.gradwell.com/2013/02/13/led-lights-set-to-deliver-wireless-internet-communications/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172156.69/warc/CC-MAIN-20170219104612-00578-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910018 | 454 | 3.46875 | 3 |
Researchers and business analysts have witnessed two parallel paths of development in analytics technology over the last few decades: databases and other datastores as repositories of information to be analyzed (together with an engine for querying that information); and analytics applications that provide users with m... | <urn:uuid:c279e14d-22e8-4637-aff2-a2f447528ffd> | CC-MAIN-2017-09 | http://alpinedata.com/a-brief-history-of-analytics-technologies/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00570-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949041 | 1,339 | 2.640625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.