text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Anatomy of a cloud storage infrastructure Models, features, and internals At the rate data is growing today, it's not surprising that cloud storage is also growing in popularity. The fastest-growing data is archive data, which is ideal for cloud storage given a number of factors, including cost, frequency of access, pr...
<urn:uuid:b8683891-f3f8-4367-afcd-94569d945fea>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/cloud/library/cl-cloudstorage/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00570-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919477
3,316
2.625
3
3 basic steps to thwart most cyberattacks, courtesy of NSA Best practices, proper configurations and network monitoring can enable systems withstand 80 percent of attacks Computer systems with proper security and network controls should be able to withstand about 80 percent of known cyberattacks, according to a senior ...
<urn:uuid:37f00bbc-ad6b-4338-b1df-dc65c5caa3d0>
CC-MAIN-2017-09
https://gcn.com/blogs/cybereye/2013/08/~/link.aspx?_id=9790F49633584F19B1042B1841DC14D2&_z=z
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00570-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947682
412
2.640625
3
OpenSSH key management, Part 1 Understanding RSA/DSA authentication Many of us use the excellent OpenSSH (see Related topics later in this article) as a secure, encrypted replacement for the venerable commands. One of OpenSSH's more intriguing features is its ability to authenticate users using the RSA and DSA authenti...
<urn:uuid:88c41815-98bc-445c-b921-ee9a5fbc78fa>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/library/l-keyc/index.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00090-ip-10-171-10-108.ec2.internal.warc.gz
en
0.880377
3,595
2.875
3
With more data being moved out of on-premise environments, data needs to be classified and secured to an appropriate level to prevent it from being compromised. This embraces the practice of assessing the risk of data loss and mitigating those risks; and applying adequate resources towards securing the data, both on-pr...
<urn:uuid:c05b9450-c030-4d37-9ce3-9079ef9fd3a3>
CC-MAIN-2017-09
http://www.inforisktoday.asia/webinars/how-data-classification-enhances-protection-reduces-severity-breach-w-1144
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00142-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930622
191
2.578125
3
So while a new Cray supercomputer took first place on theTop500, it was another machine, Lawrence Livermore National Laboratory's Sequoia, that proved to be the most adept at processing data intensive workloads on the Graph 500. IN PICTURES: The 10 most powerful supercomputers on the planet Such differences in ranking ...
<urn:uuid:5a497df6-8491-405d-8be6-52f6960a55e7>
CC-MAIN-2017-09
http://www.networkworld.com/article/2161508/applications/world-s-most-powerful-big-data-machines-charted-on-graph-500.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00139-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946357
1,062
2.984375
3
By Kevin Brown The total data center universe that most data center professionals are familiar with principally consists of two realms. The first realm, information technology (IT), refers to all systems that address the information processing aspects of the data center (e.g., servers, storage arrays and network switch...
<urn:uuid:5bae1b71-cc0a-4eef-af14-7f3b0bef69c3>
CC-MAIN-2017-09
https://www.bsminfo.com/doc/classification-of-data-center-management-software-tools-0001
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00315-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935868
264
2.5625
3
Researchers from the University of California, San Diego have found that totally erasing data from SSDs is not as easy or reliable as previously thought. ability to totally erase data from storage devices is a critical component of secure data management, regardless of whether the organization is just throwing away an ...
<urn:uuid:ac0a63b2-55c4-4206-a190-b83e9591cb86>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Data-Storage/SSDs-Harder-to-Seucrely-Purge-of-Data-than-HDDs-200129
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00191-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936485
855
2.703125
3
Air-cooled servers may soon go the way of the single-core CPU. In high performance computing datacenters, the hottest new trend in energy efficiency is warm water cooling. IBM, Eurotech, and a handful of other vendors have paved the way with this technology and now Appro has announced its own solution in an attempt to ...
<urn:uuid:445aa048-3f4d-4e3a-8ff9-939f45498ac3>
CC-MAIN-2017-09
https://www.hpcwire.com/2012/10/31/appro_heats_up_hpc_portfolio_with_warm_water_cooling/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00191-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936274
1,174
2.78125
3
Five years after the federal government began measuring the digital divide, the nation stands at a crossroads. More U.S. citizens have access to Internet and computer technology than ever before, thanks to rampant expansion of the telecommunications infrastructure and plummeting technology prices. But even as basic con...
<urn:uuid:39394e45-591f-4f4a-9d5d-936395aa1631>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Defining-the-Divide.html?page=3
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00135-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957875
3,733
2.5625
3
UAVs to power wireless -- anywhere The next time a major hurricane or earthquake strikes, wiping out cell and wireless communications, first responders and citizens alike may be able to get gigabit-per-second wireless service from drones dispatched to the skies over the affected areas. DARPA’s Mobile Hotspots program, ...
<urn:uuid:7970c35f-a86e-4963-a549-6039b1eb5a80>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2014/04/darpa-mobile-hotspot-uav.aspx?admgarea=TC_Mobile
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00135-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94439
802
3.625
4
Web Application Vulnerability Scanners are tools designed toautomatically scan web applications for potential vulnerabilities.These tools differ from general vulnerability assessment tools in thatthey do not perform a broad range of checks on a myriad of software andhardware. Instead, they perform other checks, such as...
<urn:uuid:dc4c7e3a-4776-4902-a1bf-7dce47f40190>
CC-MAIN-2017-09
http://www.hackplayers.com/2008_10_01_archive.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00311-ip-10-171-10-108.ec2.internal.warc.gz
en
0.784988
768
2.890625
3
Powering The Internet Of Things The Internet of Things is designed on the premise that sensors can be embedded in everyday object to help monitor and track them. The scope of this is huge – for example, the sensors could monitor and track everything from the structural integrity of bridges and buildings to the health o...
<urn:uuid:b7b15fc5-3ed0-48e3-94d3-eb881fbaec6c>
CC-MAIN-2017-09
https://cloudtweaks.com/2014/08/powering-the-internet-of-things-wifi/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00311-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949288
555
3.515625
4
Frame Relay -- Summary Network Consultants Handbook - Frame Relay by Matthew Castelli Frame Relay is a Layer 2 (data link) wide-area network (WAN) protocol that works at both Layer 1 (physical) and Layer 2 (data link) of the OSI model. Although Frame Relay services were initially designed to operate over ISDN service, ...
<urn:uuid:b4cdf966-9939-4f7f-816c-0c78a00c50f8>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsp/article.php/974881/Frame-Relay--Summary.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00487-ip-10-171-10-108.ec2.internal.warc.gz
en
0.872137
1,663
2.96875
3
Internet Addiction Might Become a Diagnosis In recent months, the awareness about people unable to connect from technology for even a short period of time has gotten a lot of attention. Last November, The New York Times ran an article on a Korean boot camp to cure kids of their computer addiction. South Korea, a countr...
<urn:uuid:1b8d3c35-b3ad-4c30-a4c4-9ca5d12c0925>
CC-MAIN-2017-09
http://www.eweek.com/careers/internet-addiction-might-become-a-diagnosis-1.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00131-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955317
463
2.984375
3
There’s an old IT joke that blames many common computer glitches on PEBKAC: Problem Exists Between Keyboard And Chair In other words, users are often the source of major technology issues, not the systems themselves. This old saw is doubly true in the world of IT security. User error, mishandling of data, and failure t...
<urn:uuid:56b77ec1-ddd1-40b5-8f73-1f6b43eb0c41>
CC-MAIN-2017-09
https://certesnetworks.com/phishing-means-time-zero-trust/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00131-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940951
1,038
2.53125
3
Internet on a chip: MIT team aims for massively multicore processors - By Henry Kenyon - Apr 16, 2012 Researchers at the Massachusetts Institute of Technology are developing methods for multiple processors on a microchip to share data, working in a manner similar to the Internet. If it is successful, multi-processor ch...
<urn:uuid:0fba5b54-0936-473c-9c17-06be08b41b8b>
CC-MAIN-2017-09
https://gcn.com/articles/2012/04/16/mit-internet-on-a-chip-multicore-data-sharing.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00131-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949658
730
3.15625
3
Lack of Binary Protection is the last one in OWASP Mobile Top 10 Risk Android Application are delivered through an .apk file format which an adversary can reverse engineer it and can see all the code contained in it. Below are scenarios of reverse engineering an application:- - Adversary can analyze and determine which...
<urn:uuid:9965b262-7b1d-4d76-a01d-23df0cdbfbb3>
CC-MAIN-2017-09
https://manifestsecurity.com/android-application-security-part-9/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00479-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921229
350
2.640625
3
If you're worried about an Internet "fast lane" squeezing out all the futuristic connected devices you're hoping to use around your home, fear not. The vaunted Internet of Things, which already includes a variety of industrial sensors and machines and a growing number of consumer devices, is likely to make itself more ...
<urn:uuid:2c5e46d8-5ad2-4f39-a1d2-188acd3de24b>
CC-MAIN-2017-09
http://www.cio.com/article/2376191/internet/bandwidth-sipping-iot-steers-clear-of-net-neutrality-debate----for-now.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00003-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966056
1,373
2.53125
3
Massachusetts Institute of Technology researchers have developed a device that can see through walls and pinpoint a person with incredible accuracy. They call it the "Kinect of the future," after Microsoft's Xbox 360 motion sensing camera. Shown publicly this week for the first time the project from MIT's Computer Scie...
<urn:uuid:233b08bb-bc02-48f2-840b-f5e8cb1017b5>
CC-MAIN-2017-09
http://www.networkworld.com/article/2170788/data-center/mit--39-s---39-kinect-of-the-future--39--looks-through-walls-with-x-ray-like-vision.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00355-ip-10-171-10-108.ec2.internal.warc.gz
en
0.975906
843
3.015625
3
What email address or phone number would you like to use to sign in to Docs.com? If you already have an account that you use with Office or other Microsoft services, enter it here. Or sign in with: Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi...
<urn:uuid:20008122-a809-4b6a-94ba-08f7d319bd0f>
CC-MAIN-2017-09
https://docs.com/franck-gasulla/1934/new-york-as-a-global-city-booklet
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00231-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94055
3,511
2.640625
3
Computer clouds have been credited with making the workplace more efficient and giving consumers anytime-anywhere access to emails, photos, documents and music as well as helping companies crunch through masses of data to gain business intelligence. Now it looks like the cloud might help cure cancer too. The National C...
<urn:uuid:6febb0e6-092e-43cc-9f36-9fc1c5cffd0c>
CC-MAIN-2017-09
http://www.nextgov.com/cloud-computing/2013/08/computer-clouds-can-help-cure-cancer/68096/?oref=ng-HPriver
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00351-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931194
1,246
3
3
NASA, NWS blazed an early path on lightning detection systems - By William Jackson - Feb 11, 2013 Government agencies have been getting a better understanding of how severe weather develops by tapping into lightning data — particularly cloud-to-cloud lightning — provided by private companies. But the National Weather S...
<urn:uuid:59ec350d-6516-4844-aa42-a9d30d67b25f>
CC-MAIN-2017-09
https://gcn.com/articles/2013/02/11/nasa-nws-early-path-lightning-detection-systems.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00351-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940814
610
3.546875
4
Photo of the Week -- Ice Sculptures that Rival Skyscrapers Found Beneath Greenland Ice Sheet / June 17, 2014 The constant melting and re-freezing occurring in the Greenland Ice Sheet has had an unexpected effect -- blocks of ice as tall as city skyscrapers and as wide as the island of Manhattan have formed at the ice s...
<urn:uuid:7a7270e8-7987-40f2-9f77-a4dd03a7afc9>
CC-MAIN-2017-09
http://www.govtech.com/photos/Photo-of-the-Week-Ice-Sculptures-that-Rival-Skyscrapers-Found-Beneath-Greenland-Ice-Sheet.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00051-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957941
187
3.4375
3
When I was teaching at the University level I tried to convey to my students a number of real-world examples of some of the basic communication principles that guide communication (and misunderstanding) patterns – often without them knowing it. This post can help you understand how Social Justice advocates use a sleigh...
<urn:uuid:b6679364-2a4c-46e3-90bb-eefbfeb44c6e>
CC-MAIN-2017-09
https://jmetz.com/2016/10/weaponized-metacommunication/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00275-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963699
1,371
3.09375
3
Why Don't RIPv1 and IGRP Support Variable-Length Subnet Mask? The ability to specify a different subnet mask for the same network number on different subnets is called Variable-Length Subnet Mask (VLSM). RIPv1 and IGRP are classful protocols and are incapable of carrying subnet mask information in their updates. Before...
<urn:uuid:5f011fb6-1205-44ca-9e42-060dc975b064>
CC-MAIN-2017-09
https://www.certificationkits.com/rip-igrp-ccna/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00451-ip-10-171-10-108.ec2.internal.warc.gz
en
0.893297
606
2.53125
3
Natural gas leaks can cause serious problems in our cities -- on Dec. 11, for instance, a 20-inch Columbia Gas transmission line exploded in Sissonville, W. Va., and destroyed four homes and essentially cooked a section of the interstate. To see what Boston had going on in its natural gas pipelines, a team of scientist...
<urn:uuid:c999b85e-b656-48cd-8c17-932b0bd996f9>
CC-MAIN-2017-09
http://www.govtech.com/geospatial/Researchers-Map-Bostons-Natural-Gas-Leaks.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00571-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956175
959
3.15625
3
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. Over the past few years organizations have awakened to the fact that there is knowledge hidden in Big Data, and vendors are feverishly working to develo...
<urn:uuid:ff43ec33-f313-45bb-9405-6962c546d804>
CC-MAIN-2017-09
http://www.cio.com/article/2381657/big-data/sdn-networks-transform-big-data-into-information-capital.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00271-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916522
1,325
2.609375
3
Is Surfing the Internet Altering your Brain?By Reuters - | Posted 2008-10-27 Email Print A neuroscientist at UCLA in California who specializes in brain function has found that Internet searching and text messaging has made brains more adept at filtering information and making quick decisions. But while technology can ...
<urn:uuid:d2498fde-8746-4124-be8b-dc4deae64c35>
CC-MAIN-2017-09
http://www.baselinemag.com/mobility/Is-Surfing-the-Internet-Altering-your-Brain
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00147-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94923
683
2.703125
3
With the release of the new Star Wars film moviegoers everywhere are being re-introduced to The Force and its power. More than a few people may even walk out imagining what life would be like in a world inhabited by The Force. While we may never be able to control each other’s minds, the ability to manipulate the physi...
<urn:uuid:ac2dbdd6-70d3-446f-a48c-bfcfaad4265f>
CC-MAIN-2017-09
https://www.ibm.com/blogs/bluemix/2015/12/the-force-bb8-emotiv-insight-bluemix/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00091-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957481
319
2.59375
3
June 17, 2010—Over the last 20 years, scientists have collected vast amounts of data about climate change, much of it accessible on the Web. Now the challenge is figuring out how to integrate all that information into coherent datasets for further analysis—and a deeper understanding of the Earth’s changing climate. In ...
<urn:uuid:ccca54a8-0920-4414-8cbc-45bc783b32a1>
CC-MAIN-2017-09
https://www.emc.com/leadership/articles/climate-change.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00143-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937904
2,165
3.890625
4
Over the past few years, the public sector spent considerable time and money making myriad transactions available to the public via the Internet. People appreciate the convenience, and they appreciate "their" government responding to their wants. The public sector is slowly changing people's perception by creating an i...
<urn:uuid:75b07ba2-7d29-468f-9aa9-ff1ee8d113d5>
CC-MAIN-2017-09
http://www.govtech.com/health/99395379.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00140-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966224
2,533
2.84375
3
Cisco Named a Leader Cisco is positioned as a leader in the Gartner Magic Quadrant for Unified Communications What is VoIP and What Can it Do for Your Business? VoIP and IP telephony are becoming increasingly popular with large corporations and consumers alike. For many people, Internet Protocol (IP) is more than just ...
<urn:uuid:53287b8e-c7b0-4860-9cb4-3ae795438ca2>
CC-MAIN-2017-09
http://www.cisco.com/c/en/us/products/unified-communications/networking_solutions_products_genericcontent0900aecd804f00ce.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00612-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948415
481
2.65625
3
Digital telephone systems are the most popular telephone systems in service today. While obsolete analog phone systems converted voice conversations (sound waves) into electrical waves, digital phone systems take the same voice conversations and convert them into a binary format where the data is compressed into "1"s a...
<urn:uuid:df8f88f2-0e80-4018-bcb8-f99d28f99dcc>
CC-MAIN-2017-09
http://www.metrolinedirect.com/digital-telephone-stations-and-features.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00612-ip-10-171-10-108.ec2.internal.warc.gz
en
0.893322
448
3.046875
3
Black Box Explains…Sizing a UPS The power delivered by a UPS is usually expressed both in volt-amps (VA) and watts. There’s often confusion about what the difference is between these figures and how to use them to select a UPS. VA is power voltage multiplied by amps. For instance, a device that draws 5 amps of 120-volt...
<urn:uuid:117623ca-2a4f-423a-b7b8-1e5ec06a1ab9>
CC-MAIN-2017-09
https://www.blackbox.com/en-ca/products/black-box-explains/black-box-explains-sizing-a-ups
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00136-ip-10-171-10-108.ec2.internal.warc.gz
en
0.971475
511
4
4
The new face of biometric access control Passfaces’ authentication tool relies on the brain’s ability to know faces - By Michael Arnone - May 22, 2006 Getting computers to recognize human faces is a multibillion-dollar business. One small company, though, is approaching the authentication problem from another direction...
<urn:uuid:8d167932-322a-46b6-817e-afbe8a42f40c>
CC-MAIN-2017-09
https://fcw.com/articles/2006/05/22/the-new-face-of-biometric-access-control.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00188-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938002
724
2.6875
3
This story was originally published by Data-Smart City Solutions. Americans are dying at an unprecedented rate from opiate drug poisoning -- the national average stands at 78 fatal overdoses per day. Heroin and prescription painkillers are killing more people per year than car accidents, a signal that the epidemic has ...
<urn:uuid:d7dc8b8a-6e23-4ee2-bf71-9d5d3faafea9>
CC-MAIN-2017-09
http://www.govtech.com/data/Solving-the-Opiate-Crisis-Through-Mapping-and-Data-Analytics.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Esri-News+%28ESRI.com+-+News%29
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00364-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936951
802
2.953125
3
According to the development trend, New methods for Computer Facilities or Mainframe network cabling have appeared. This is mainly manifested in the following respects. 1) In the host server room, switch routers and connecting lines have reached gigabit standards. 2) Using fiber optic jumper in connecting, SC interface...
<urn:uuid:b6bbf66b-b933-4860-a1ab-762bc9a86027>
CC-MAIN-2017-09
http://www.fs.com/blog/common-interfaces-and-connectors-in-fiber-optic-jumpers.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00184-ip-10-171-10-108.ec2.internal.warc.gz
en
0.924947
1,331
2.640625
3
We used to say that all data has a decaying value; the further away from its creation date it gets, the less valuable that data becomes. Compliance and regulatory requirements as well as big data analytics and archive have changed that. We now have to assume that all data will become valuable again -- we just don't kno...
<urn:uuid:92286866-9e9c-4bef-9e0a-dedba66d60da>
CC-MAIN-2017-09
http://www.networkcomputing.com/storage/plot-effective-data-archive-strategy/355219580
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00360-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962855
658
2.515625
3
Tweets come with all kinds of actionable elements inside them these days. Shortened URLs, #hashtags, @replies, and the actual message body. When you’re consuming a list of tweets, it’s important to be able to parse out these elements from the plain text so that they can be made into hyperlinks and directed at the prope...
<urn:uuid:92df77c3-1a6c-4e88-b515-d21562680745>
CC-MAIN-2017-09
http://www.itworld.com/article/2704521/development/how-to-parse-urls--hash-tags--and-more-from-a-tweet.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00480-ip-10-171-10-108.ec2.internal.warc.gz
en
0.81416
356
2.53125
3
A Internet Explorer Cookie Forensic Analysis Tool. Many important files within Microsoft Windows have structures that are undocumented. One of the principals of computer forensics is that all analysis methodologies must be well documented and repeatable, and they must have an acceptable margin of error. Currently, ther...
<urn:uuid:03f2f849-adf3-4fe5-8c51-b8d78eb3b5da>
CC-MAIN-2017-09
https://www.mcafee.com/br/downloads/free-tools/galleta.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00232-ip-10-171-10-108.ec2.internal.warc.gz
en
0.887901
310
2.59375
3
Primer: Storage PartitioningBy Kevin Fogarty | Posted 2004-03-01 Email Print What is it? A set of digital instructions that makes it easier to manage the increasingly large amounts of data found on farms of inexpensive disk drives. A set of digital instructions that makes it easier to manage the increasingly large amou...
<urn:uuid:f6ef722f-7820-4392-8e43-9e0c17a7e834>
CC-MAIN-2017-09
http://www.baselinemag.com/it-management/Primer-Storage-Partitioning
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00408-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956862
810
3.234375
3
There are several kinds of industrial applications through the use of fiber optical cable. Thin fiber of glass or plastic, through which data can light and sound propagation is called optical fiber. These optical fibers as thin as human hair. When they are assembled together, they form a cable that can be used for tran...
<urn:uuid:c21312c1-1747-42b0-bb2d-38db8fe96aed>
CC-MAIN-2017-09
http://www.fs.com/blog/the-industrial-purpose-of-using-fiber-optic-cables.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00408-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937074
576
3.21875
3
From New York to California, state and local governments are taking steps to educate citizens on the plethora of dangers in the online world. This is the third annual National Cyber Security Month which was started by the National Cyber Security Alliance (NCSA) with the mission to "stay safe online." Many dangers await...
<urn:uuid:fecb782d-acc5-4a9d-afcd-fdd4391c320e>
CC-MAIN-2017-09
http://www.govtech.com/security/A-Different-Type-of-October-Scare.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00408-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955266
636
2.796875
3
FileGen is a command-line program to create test files of different lengths. FileGen takes 2 or 3 parameters: filegen file size [byte] - filegen test 1000 this will create a file named test and 1000 bytes long, the bytes are random - filegen test 1000 0 this will create a file named test and 1000 bytes long, and all th...
<urn:uuid:3a5516a3-65fc-4656-a188-049d6e21514c>
CC-MAIN-2017-09
https://blog.didierstevens.com/programs/filegen/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00528-ip-10-171-10-108.ec2.internal.warc.gz
en
0.656326
251
3.3125
3
Stratasys today unveiled two industrial 3D printers that can build objects of virtually any size using materials such as carbon fiber for lighter wieght and stronger parts. The printers were designed to address the requirements of aerospace, automotive and other industries by being able to build completed parts with re...
<urn:uuid:eb489bb3-9bc4-46f8-af06-d231a49bf82e>
CC-MAIN-2017-09
http://www.itnews.com/article/3112144/3d-printing/stratasys-unveils-mega-robotic-3d-printers-to-build-large-parts.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00524-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93023
967
2.546875
3
Wikimedia wants today's voices to echo through the ages. The non-profit foundation responsible for Wikipedia and other crowd-sourced online resources announced recently that it would add voice samples from notable people to their respective Wikipedia biographies. The new project is called "Wikipedia voice intro project...
<urn:uuid:485ee1bf-7ba0-4b6a-b85c-8a7df243b00b>
CC-MAIN-2017-09
http://www.cio.com/article/2379245/internet/wikipedia-adding-voice-recordings-to-famous-people-s-pages.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00224-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925798
503
2.578125
3
Autonomous Vehicles Drive ForwardBy Samuel Greengard | Posted 2015-03-24 Email Print The self-driving car raises a critical question: How do we approach and manage machines that do things better than humans do? Do we value safety over choice? In case you missed it, Tesla Motors Chairman Elon Musk is back in the news. H...
<urn:uuid:727c29d9-479c-4d5a-892f-0c88aa34cd6e>
CC-MAIN-2017-09
http://www.baselinemag.com/blogs/autonomous-vehicles-drive-forward.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00576-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961431
579
2.84375
3
Technology firms wowed us in 2011, delivering tablets, ultrathin laptops, innovative cloud services, and voice command digital assistants. Not so long ago, the technology underlying these products was nothing more than research and development projects. So, in an effort to peek into our not-so-distant tech future, here...
<urn:uuid:a0cf5c28-ccbd-4fba-9dff-5cb9b0ad866c>
CC-MAIN-2017-09
http://www.itworld.com/article/2733625/hardware/10-tech-research-projects-to-watch.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00576-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933971
1,492
2.859375
3
Energy's Titan supercomputer goes to 20 (petaflops) I at first wondered if the scene the other day at the Energy Department’s Oak Ridge National Laboratory was something like the scene in “National Lampoon’s Christmas Vacation,” when Chevy Chase caused the local power plant to tap into emergency nuclear power when his ...
<urn:uuid:5fa3da20-ff9d-4136-9e14-fcf3ea2a3f0a>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2012/10/titan-energy-supercomputer-20-petaflops.aspx?admgarea=TC_BigData
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00452-ip-10-171-10-108.ec2.internal.warc.gz
en
0.899403
629
2.953125
3
Here's a short history on computer science student enrollments. Leading up to the dot.com bust, computer science enrollments soared to new highs, and then they plunged. Like a rock. Computer science graduates at Ph.D. granting institutions reached a low of 8,021 in 2007, down from 14,185 in the 2003-2004. But it's been...
<urn:uuid:3f65faba-05e9-468f-9253-01eb1e7d0c05>
CC-MAIN-2017-09
http://www.cio.com/article/2376372/education/wall-street-s-collapse-was-computer-science-s-gain.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00396-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960348
981
2.515625
3
The U.S. National Transportation Safety Board (NTSB) is calling for motor vehicles to be equipped with "connected technology," machine-to-machine communications tools that could help drivers avoid accidents. The accident occurred on February 16, 2012, when a Mack truck struck the left rear of a bus carrying 25 students...
<urn:uuid:a48b7984-7724-40dd-b1aa-58ae741957d4>
CC-MAIN-2017-09
http://www.itworld.com/article/2707386/hardware/feds-want-cars-to-talk-to-each-other.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00396-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964826
839
3.203125
3
Smartphones, it seems, can do anything. Today's phones pack so much power and so many sensors into such a small space -- and at a relatively low cost -- that they are increasingly being used for inventive purposes. Just this week Strand 1, a nano-satellite based on a Google Nexus One cell phone, was launched into space...
<urn:uuid:6c014ed2-815d-4460-9d0e-41d0f715dda5>
CC-MAIN-2017-09
http://www.computerworld.com/article/2495621/mobile-wireless/german-engineers-deconstruct-smartphones-to-find-new-uses.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00272-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955715
608
3.140625
3
The majority of today’s telecommunication systems is run on a fiber optic network. This has been largely due to the fact that such networks are ideal for transferring information. The development in fiber optics has continued to improve considerably during the last decade, providing ever more benefits to their users. I...
<urn:uuid:bec5b5b5-5263-4ce0-b76c-a147b40734d2>
CC-MAIN-2017-09
http://www.fs.com/blog/fiber-optic-network-has-become-the-protagonist.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00568-ip-10-171-10-108.ec2.internal.warc.gz
en
0.963901
725
3.15625
3
After the LinkedIn debacle, it’s depressing but not entirely surprising to see yet further reports of large-scale hacks, this time of Yahoo! losing 400,000 usernames and passwords to anonymous hackers. It seems amazing to us, working as we do in the security industry, that the passwords were stored in plaintext with ab...
<urn:uuid:4f7c3d38-d6df-4ff9-b0fe-1843eb61e521>
CC-MAIN-2017-09
https://blog.gemalto.com/blog/2012/07/16/yet-another-hack-passwords-and-storing-them-fail-again/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00444-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940089
549
2.640625
3
NASA's Cassini spacecraft has detected propylene, a key ingredient in plastics, on Saturn's moon Titan. This is the first time the chemical has been definitively found on any moon or planet, other than Earth. The discovery fills in what NASA called a "mysterious gap" in scientists' knowledge of the makeup of Titan's at...
<urn:uuid:8cfe19f9-367e-467d-9e27-156c9516dc21>
CC-MAIN-2017-09
http://www.networkworld.com/article/2170400/data-center/nasa--39-s-cassini-finds-plastic-ingredient-on-saturn--39-s-moon.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00144-ip-10-171-10-108.ec2.internal.warc.gz
en
0.918884
712
3.9375
4
The so-called armored fiber optic cable, is outside the optical fiber is then wrapped in a layer of protective of “armor”, is mainly used to meet the requirements of animals rodent, moisture proof, etc. Armored cable is a power cable made up by assembling two or more electrical conductors, generally held together with ...
<urn:uuid:8edc88b2-6380-4673-8e30-186b6257bf54>
CC-MAIN-2017-09
http://www.fs.com/blog/what-is-armored-fiber-optic-cable.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00320-ip-10-171-10-108.ec2.internal.warc.gz
en
0.908757
778
3.0625
3
Azambuja R.,Fertilitat Reproductive Medicine Center | Petracco A.,Fertilitat Reproductive Medicine Center | Petracco A.,University of Porto | Okada L.,Fertilitat Reproductive Medicine Center | And 5 more authors. Reproductive BioMedicine Online | Year: 2011 Human embryo cryopreservation techniques enable the storage of...
<urn:uuid:8b0ea442-e13c-4818-9722-4bba2b65d5c0>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/fertilitat-reproductive-medicine-center-2584425/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00089-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941242
549
2.59375
3
This resource is no longer available How To Secure Online Activities The Internet is not automatically a secure or safe place to be. It is important to be clear and distinct when discussing security. Security is not a singular concept, solution, or state. It is a combination of numerous aspects, implementations, and pe...
<urn:uuid:e08cfb9c-437c-4f60-bcdc-c2148fd0dd60>
CC-MAIN-2017-09
http://www.bitpipe.com/detail/RES/1377097047_848.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00017-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95074
145
3.296875
3
What Level of SSL or TLS is Required by HIPAA? SSL and TLS are not actually monolithic encryption entities that you either use or do not use to connect securely to email servers, web sites, and other systems. SSL and TLS are evolving protocols which have many nuances to how they may be configured. The “version” of the ...
<urn:uuid:98557a23-91a5-40c3-8a89-12f3d97409a5>
CC-MAIN-2017-09
https://luxsci.com/blog/level-ssl-tls-required-hipaa.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00193-ip-10-171-10-108.ec2.internal.warc.gz
en
0.835849
1,349
2.65625
3
As has become apparent to nearly everyone in the HPC community, life beyond petascale supercomputing will be power limited. Many efforts around the world are now underway to address this problem, both by commercial interests and researchers. One such effort that brings both into play is the Mont-Blanc research project ...
<urn:uuid:fb8f7644-3fd4-43a2-849f-13bd20178975>
CC-MAIN-2017-09
https://www.hpcwire.com/2011/11/23/nvidia_tegra_processors_blaze_the_way_for_arm_in_supercomputing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00193-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943998
1,041
2.953125
3
The U.S. government wants to force cars to talk to each other over wireless networks, saying that could save more than 1,000 lives every year. The National Highway Traffic Safety Administration (NHTSA) is seeking input about a possible federal standard for vehicle-to-vehicle (V2V) technology, which would let cars autom...
<urn:uuid:ae448fcb-ffe5-42f9-ae26-3ed310a85eb9>
CC-MAIN-2017-09
http://www.cio.com/article/2466601/vehicletovehicle-networks-could-save-over-1000-lives-a-year-us-says.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00137-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95373
543
2.640625
3
The Brookings Institution published an interesting paper yesterday on the use of big data in education. In it, Brookings vice president Darrell M. West discussed the uses of real time analytics to help shape and guide education policy in the future. For West, data analytics were essential to evaluating school performan...
<urn:uuid:2122779d-0893-427c-a78f-90809260f0ea>
CC-MAIN-2017-09
http://www.nextgov.com/technology-news/tech-insider/2012/09/big-data-could-play-role-improving-education/57896/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00189-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951118
356
2.734375
3
Last year, Wired magazine featured a demonstration that showed precisely how easy it is for a hacker to take over the onboard computer of an automobile while driving down the highway in an adjacent car. This disturbing proof of concept for the high-speed hack may have made the population at large more aware of the fact...
<urn:uuid:c1b168cb-40e2-4573-b004-5f55da1c3e21>
CC-MAIN-2017-09
http://www.ingrammicroadvisor.com/security/digital-security-is-about-to-become-a-priority-for-the-auto-industry
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00541-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953429
755
2.59375
3
Can Machines Really Think? The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning. By Chetan Dube Since the birth of computer science, we have been asking the same question: can machines really think? Some ha...
<urn:uuid:f6e04df3-6ca5-4c18-8d07-a5f9e7d3765d>
CC-MAIN-2017-09
https://esj.com/articles/2012/11/12/can-machines-think.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00133-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954876
1,318
3.328125
3
Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks. He is the author of the open source SQLBrute blind SQL injection testing tool, several books, and is the Chapter Leader for the Lon...
<urn:uuid:a41c7322-51e9-4887-aa87-04ec0e0ba82f>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2009/09/10/qa-sql-injection/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00133-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958036
1,571
2.546875
3
Within an hour of posting my last blog on the Variety of Location data, I remembered three other sets of Location data that I did not include but should note: Electronic Addresses, Voice/Phone Addresses and Virtual World Addresses. Adding in the Electronic World There's a whole virtual world out there that's grown arou...
<urn:uuid:b98f0a8f-aaea-4042-9bd8-f70176ec44ab>
CC-MAIN-2017-09
https://www.ibm.com/developerworks/community/blogs/haraldsmith/date/201310?lang=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00485-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957654
834
2.765625
3
The 8-bit era (1980-1984) Time Magazine: January 1983 The star of the personal computer was rising. For 1982, Time Magazine featured a generic version as "Machine of the Year," the one and only occasion a nonhuman has won that award. By this time, many new firms had joined the fight, releasing the third generation of m...
<urn:uuid:f3626eaa-8675-4e66-b44e-934a93b11553>
CC-MAIN-2017-09
https://arstechnica.com/features/2005/12/total-share/4/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00009-ip-10-171-10-108.ec2.internal.warc.gz
en
0.970682
1,286
3
3
Relying solely on the models of the past as predictors of the future can leave even the bestreasoned business plans all wet. If we had to do it all over again, says the inventor Dean Kamen, we wouldn’t distribute water the way we always have. We wouldn’t rely so much on centralized collection and processing points, but...
<urn:uuid:ddba211c-560b-406a-a2ca-f687117bc99f>
CC-MAIN-2017-09
https://www.cedmagazine.com/article/2011/02/memory-lane-thirsty-change
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00009-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945294
880
3.4375
3
Hidalgo C.,Colegio de Mexico | Etchevers J.D.,Colegio de Mexico | Martinez-Richa A.,University of Guanajuato | Yee-Madeira H.,IPN ESFM | And 3 more authors. Applied Clay Science | Year: 2010 In Mexico, 70% of the land surface shows some degree of degradation. A substantial portion of these degraded soils are located in...
<urn:uuid:9fdec56b-b1e0-480a-b083-0642cd1a4954>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/esfm-ipn-765962/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00185-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93624
621
2.6875
3
Way back at the dawn of the automobile, people were skeptical of the new invention. They were accustomed to horses, and the UK passed a law that required motorists to be preceded by a man on foot waving a red flag so as to warn pedestrians. Well, a 21st-century equivalent of that practice is on the way. A new rule anno...
<urn:uuid:a15557de-a699-41c9-aa48-d08bfbd15b5e>
CC-MAIN-2017-09
https://arstechnica.com/cars/2016/11/the-federal-government-wants-evs-to-make-some-noise-at-low-speed/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00537-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966038
349
2.515625
3
Given the fact that most of the Internet got started in America -- and Americans dominate its use -- it's easy to forget the rest of the world is not only using the Web, but doing so in unique and creative ways. Amazon.com and AOL tend to get the lion's share of attention when it comes to how things should be done onli...
<urn:uuid:d6971b38-2f31-4ff6-aefb-7628a2c779de>
CC-MAIN-2017-09
http://www.govtech.com/magazines/pcio/Not-Invented-Here.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00005-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940559
1,727
2.578125
3
Multimedia Reading with the eyeBook A plane crashes in the desert, the reader hears an explosion and then the little prince from Antoine de St. Exupéry's book of the same name suddenly appears between the lines. Thanks to the eyeBook, a new reading system developed by the German Research Center for Artificial Intellige...
<urn:uuid:9ffee3af-c0dd-4c98-8466-81b32fed2243>
CC-MAIN-2017-09
http://e-channelnews.com/ec_storydetail.php?ref=418115
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00357-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941899
136
2.53125
3
The 5-3-2 Principle of Cloud Computing: An Easier Approach Even though, cloud computing has become exceedingly common, the fact remains that people seem to have differing opinions when it comes to its definition. The issue is not the lack of definition or the lack of an agreed coherent one, but rather the lack of appar...
<urn:uuid:318923ba-6d98-4a61-945d-d7296746763f>
CC-MAIN-2017-09
https://cloudtweaks.com/2013/03/the-5-3-2-principle-of-cloud-computing-an-easier-approach/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00533-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942861
689
2.71875
3
BASIC-256: computer programming for (complete) beginners Computers may be everywhere these days, but computer programming is still often seen in a very stereotypical way: it’s complicated, strictly for geeks only, not something of much use to anyone else. The reality is very different. Anyone can learn the fundamentals...
<urn:uuid:d70f471d-3759-4d10-a2c6-81a9a9acbb07>
CC-MAIN-2017-09
https://betanews.com/2014/02/07/basic-256-computer-programming-for-complete-beginners/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00353-ip-10-171-10-108.ec2.internal.warc.gz
en
0.903932
643
3.21875
3
Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted by Ponemon Institute, medical identity theft and “family fraud” are on the rise; with the number of victims affected by medical identity theft up...
<urn:uuid:71229234-b131-4277-a6d0-bb80eba6511f>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/09/13/medical-identity-theft-affects-184-million-us-victims/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00529-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951796
735
2.59375
3
NASA Servers At High Risk Of Cyber AttackAuditors were able to pull encryption keys, passwords, and user account information over the Internet from systems that help control spacecraft and process critical data. (click image for larger view) Slideshow: NASA, Microsoft Reveal Mars In Pictures The network NASA uses to co...
<urn:uuid:5db986c5-5f76-4830-9f89-147181a4de9b>
CC-MAIN-2017-09
http://www.darkreading.com/risk-management/nasa-servers-at-high-risk-of-cyber-attack/d/d-id/1096929
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00105-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933845
470
2.5625
3
NASA contest yields Space Apps for Earth, too - By Kevin McCaney - May 09, 2012 NASA has opened the voting for its International Space Apps Challenge, an effort to provide a platform to let developers find innovative solutions to problems both in space and on Earth. The contest drew more than two dozen apps from teams ...
<urn:uuid:8a0092f8-d8d2-4c2e-8a9d-a8b071f898f8>
CC-MAIN-2017-09
https://gcn.com/articles/2012/05/09/nasa-space-apps-challenge.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00525-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960946
381
2.625
3
‘Identity theft’ has recently hit the headlines as a major security issue but the importance of digital identity and how to protect it has been a consideration for much longer. Even before the dramatic events of September 11, 2001, corporations worldwide were already well aware of the need to ensure a positive verifica...
<urn:uuid:88ad7d7b-3ac0-40bb-a6e7-daa7aa78e7c4>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2003/04/24/corporate-access-cards-securing-corporate-networks-with-military-strength-digital-identity-solutions/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00225-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933496
1,914
2.84375
3
A local government uses a centralized customer service system - sometimes called 311 - so residents can call a centralized government phone number, place requests for service and are assigned tracking numbers to monitor their requests. Though a centralized customer service system is valuable for residents, local govern...
<urn:uuid:dc930620-e654-48a0-8d37-c65bc5b02a69>
CC-MAIN-2017-09
http://www.govtech.com/e-government/311-Survey-Customer-Service-Systems-Spread.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00221-ip-10-171-10-108.ec2.internal.warc.gz
en
0.932427
298
2.75
3
As long as criminals have been plotting to circumvent order and established protocols, there have been crime-fighters pushing the envelope to foil their efforts. As criminals hatch sophisticated schemes to bypass detection, law enforcement agencies and other dedicated groups devise original and inventive ways to thwart...
<urn:uuid:bd2fca88-b4ed-4ec4-916e-5e96a23e28e8>
CC-MAIN-2017-09
http://www.2-spyware.com/news/post4097.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00449-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927972
846
2.640625
3
Computer fires severe enough to prompt a 911 call are so unusual that when it does happen, local media sometimes makes note of it. That was the case in Arlington, Va., recently, when firefighters found a computer burning on the balcony of an apartment complex. According to the Arlington County Fire Dept., the resident ...
<urn:uuid:9f38a27f-da17-47c0-b618-cf451a41142c>
CC-MAIN-2017-09
http://www.itnews.com/article/2954364/computer-hardware/computer-fires-requiring-a-911-call-rare.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00449-ip-10-171-10-108.ec2.internal.warc.gz
en
0.979207
381
2.796875
3
Codecs like H.264 reduce bandwidth by only sending full frames every so often, mixing them with partial frames only capturing changes in between the full ones. They are called 'I' frames because they are the initial / full frames, followed by 'P', or predictive frames.* Note: if you are not familiar with codecs, please...
<urn:uuid:97004af2-2c05-47fe-9cfe-7d82943e8895>
CC-MAIN-2017-09
https://ipvm.com/reports/test-i-frame-rate
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00621-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936109
366
3.421875
3
Recently, cloud computing has attracted considerable attention. Cloud computing is becoming one of the most important computing and service paradigm. Cloud computing employs a group of interconnected computers which are dynamically provisioned and serve as one or more unified computing resources. Customers are able to ...
<urn:uuid:fa500a75-3991-4540-b32b-6dfde0ee241a>
CC-MAIN-2017-09
http://www.myrealdata.com/blog/142_cloud-computing-is-green
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00090-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937594
1,061
3.1875
3
At a recent dinner, I sat next to a retired physicist from Raytheon whose work focused on the development and application of microwave technology. Microwave use goes far beyond household ovens, including radar and the creation of industrial diamonds. The scientist had taken it upon himself to preserve an entire room's ...
<urn:uuid:8bab88b5-e8c5-4d00-961d-1287dd865678>
CC-MAIN-2017-09
http://www.networkcomputing.com/storage/preserve-our-technological-history-proposal/1028523289?piddl_msgorder=thrd
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964951
768
2.71875
3
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The study reveals barriers to understanding basic honeypot concepts and presents recommendations on which honeypot to use. An increasing number of c...
<urn:uuid:d650d95a-49ab-47c1-880c-d44776121c0d>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2012/11/22/understanding-basic-honeypot-concepts/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00018-ip-10-171-10-108.ec2.internal.warc.gz
en
0.914595
414
2.5625
3
Textbooks on software engineering prescribe to check preconditions at the beginning of a function. This is a really good idea: the sooner we detect that the input data or environment does not match our expectations, the easier it is to trace and debug the application. A nice function with precondition checking refuses ...
<urn:uuid:11197c7a-5b60-4b18-afc9-50822310d7d2>
CC-MAIN-2017-09
http://www.hexblog.com/?p=30
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00314-ip-10-171-10-108.ec2.internal.warc.gz
en
0.911703
800
2.640625
3
Last week Japanese IT company Fujitsu used the K supercomputer to conduct the world’s first simulation of the magnetization-reversal process in a permanent magnet. According to an announcement from the firm, “this opens up new possibilities in the manufacture of electric motors, generators and other devices without rel...
<urn:uuid:4725256d-1e86-4563-9616-00b62219b76c>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/09/09/supercomputing_for_super_magnets/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00314-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927167
409
3.328125
3
The US Government's decision to adopt the Advanced Encryption Standard (AES) for securing sensitive information will trigger a move from the current, ageing Data Encryption Standard (DES) in the private sector, according to users and analysts. But it will not happen overnight. Technology standards bodies representing i...
<urn:uuid:1b79e8cd-a505-4840-9181-2c7d61c4627b>
CC-MAIN-2017-09
http://www.computerweekly.com/news/2240043602/US-companies-to-embrace-encryption-standard
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00486-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960614
541
2.546875
3
STMicroelectronics hopes to make blurry low-light images from smartphone cameras a thing of the past with a new chip designed to boost light output from LED-based flashes. The ideal camera flash delivers a lot of light in a short time, freezing action and illuminating more distant objects. Professional cameras use a xe...
<urn:uuid:4743a370-4b67-45ca-941a-f26e0dd67167>
CC-MAIN-2017-09
http://www.computerworld.com/article/2500794/computer-hardware/stmicro-sees-40w-led-flash-in-future-smartphones.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00482-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936321
584
2.796875
3
Containerizing Flowroute Apps in Node.js The evolution of virtualization and cloud platforms combined with mature adoption of agile methodologies and DevOps has impacted the way organizations build and ship software. The traditional waterfall-style approach that ended with developers throwing code “over the wall” to th...
<urn:uuid:f04d612e-a6de-4abc-9f9b-b3a8536acc50>
CC-MAIN-2017-09
https://blog.flowroute.com/2017/02/10/containerizing-flowroute-apps-in-node-js/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00358-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917118
2,936
2.65625
3
What email address or phone number would you like to use to sign in to Docs.com? If you already have an account that you use with Office or other Microsoft services, enter it here. Or sign in with: Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi...
<urn:uuid:509ae43b-7b03-4a28-9cc6-8d18d549fea0>
CC-MAIN-2017-09
https://docs.com/chad-hidalgo/4827/hidalgo-c-researchpaper1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00358-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952836
3,573
2.65625
3
So! Everything is turned in, edited, spreadsheets are checked, R code is checked. I've even assembled a playlist to go along with the middle school dance floor clustering tutorial. 2. Some algorithms just feel natural using the "drag the formula down to fill the cell" approach that you have in Excel. It's like an artis...
<urn:uuid:43622fa6-ff93-4c9f-867f-d853401eb7b3>
CC-MAIN-2017-09
http://www.john-foreman.com/blog/beef-to-slurry-to-wiener-reflections-on-teaching-algorithms-in-spreadsheets
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00534-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94603
710
2.5625
3
Iron Mountain makes Public Greenhouse Gas Emissions Disclosure to CDP How Carbon measurement and reporting are driving business decisions With the US administration’s announcement of new EPA carbon pollution rules and the build-up to the United Nations Conference on Climate Change (COP21) in Paris this December, there ...
<urn:uuid:817b009d-cc37-4cc4-b3e7-c0e40c761575>
CC-MAIN-2017-09
http://www.ironmountain.com/About-Us/Corporate-Social-Responsibility/News-and-Noteworthy/Our-Planet/I/Iron-Mountain-makes-Public-Greenhouse-Gas-Emissions-Disclosure-to-CDP.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957459
691
2.546875
3
It’s 2011 and there are now more phones in the world than computers. Every day, more of these phones become smartphones AKA portable computers. Unfortunately, if your phone can browse the web and check email, you will be targeted by some of the same malicious attacks and scams that go after your PC. Here are a few basi...
<urn:uuid:f7fc9906-2d24-4505-8059-08923c991f13>
CC-MAIN-2017-09
https://safeandsavvy.f-secure.com/2011/01/31/secure-your-mobile/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00054-ip-10-171-10-108.ec2.internal.warc.gz
en
0.918565
534
2.5625
3
A team of scientists from ETH Zurich and the University of Leeds have solved a 300-year-old riddle about the nature of the Earth’s rotation. Using the Cray XE6 supercomputer “Monte Rosa” installed at CSCS, the researchers uncovered the reason for the gradual westward movement of the Earth’s magnetic field. For three ce...
<urn:uuid:3f494b75-d2df-4e59-9928-3e318aaf8ef0>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/10/30/swiss-supercomputer-solves-core-mystery/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00230-ip-10-171-10-108.ec2.internal.warc.gz
en
0.919101
786
4.25
4
DARPA aims to replace regular satellites with floating clusters - By Henry Kenyon - Apr 25, 2012 In the near future, satellites may come in pieces. That’s the goal of a new effort launched by the Defense Departments research and development agency — to fly clusters of small spacecraft that communicate with each other a...
<urn:uuid:dbe240f3-71f1-4afa-b6c5-f288d96f28d5>
CC-MAIN-2017-09
https://gcn.com/articles/2012/04/25/darpa-satellite-floating-clusters.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00526-ip-10-171-10-108.ec2.internal.warc.gz
en
0.907481
532
2.71875
3
NTP, network time protocol, is a time synchronization protocol that is implemented on a network protocol called UDP. UDP is designed for speed at the cost of simplicity, which plays into the inherent time-sensitivity (or specifically, jitter sensitivity) of NTP. Time is an interesting scenario in computer security. Tim...
<urn:uuid:62021f30-03a7-4e03-9ef0-828dd2d8f88c>
CC-MAIN-2017-09
https://labs.neohapsis.com/2014/02/12/on-ntp-distributed-denial-of-service-attacks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00226-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927683
378
3.390625
3
“Rather than some automated tool or complex virus, Google and Wikipedia searches appear to have been the weapons used to knock down the walls guarding [Sarah Palin’s] e-mail,” according to this eWeek item. Most people are vulnerable to the type of attack that compromised Palin’s email account, as Markus Jakobsson wrote...
<urn:uuid:1a537bf6-7d23-46f6-aae3-ddf44e58dda0>
CC-MAIN-2017-09
https://blog.lastpass.com/2008/09/after-yahoo-email-debacle-sarah-palin-needs-lastpass.html/?showComment=1222424340000
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00574-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91084
949
2.578125
3
When New Scientist published a leader that Britain’s National Health Service (NHS) had quietly shared the healthcare data of 1.6 million patients with DeepMind, Google’s London-based artificial intelligence (AI) division, there were complaints across the nation’s newspapers. While the information was ostensibly shared ...
<urn:uuid:13143185-1a57-499e-ae8c-be34168b4052>
CC-MAIN-2017-09
http://www.digitalreasoning.com/buzz/why-you-dont-need-to-share-personal-data-to-benefit-from-ai.2467871
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00570-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953616
350
2.640625
3
Retrofitting a data center is about managing limitations and trade-offs. Decision-makers have to consider physical limits (such as the weight a floor will support and how much cooling equipment can fit into an existing space). Then there’s infrastructure to think about: It would be difficult to swap out an old uninterr...
<urn:uuid:0b508f77-c80d-4569-a929-c2f85117af1b>
CC-MAIN-2017-09
http://www.cio.com/article/2438302/energy-efficiency/five-ways-to-find-data-center-energy-savings.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00270-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946917
833
2.609375
3