text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Anatomy of a cloud storage infrastructure
Models, features, and internals
At the rate data is growing today, it's not surprising that cloud storage is also growing in popularity. The fastest-growing data is archive data, which is ideal for cloud storage given a number of factors, including cost, frequency of access, pr... | <urn:uuid:b8683891-f3f8-4367-afcd-94569d945fea> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/cloud/library/cl-cloudstorage/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00570-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919477 | 3,316 | 2.625 | 3 |
3 basic steps to thwart most cyberattacks, courtesy of NSA
Best practices, proper configurations and network monitoring can enable systems withstand 80 percent of attacks
Computer systems with proper security and network controls should be able to withstand about 80 percent of known cyberattacks, according to a senior ... | <urn:uuid:37f00bbc-ad6b-4338-b1df-dc65c5caa3d0> | CC-MAIN-2017-09 | https://gcn.com/blogs/cybereye/2013/08/~/link.aspx?_id=9790F49633584F19B1042B1841DC14D2&_z=z | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00570-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947682 | 412 | 2.640625 | 3 |
OpenSSH key management, Part 1
Understanding RSA/DSA authentication
Many of us use the excellent OpenSSH (see Related topics later in this article) as a secure, encrypted
replacement for the venerable
commands. One of OpenSSH's more intriguing features is its ability to
authenticate users using the RSA and DSA authenti... | <urn:uuid:88c41815-98bc-445c-b921-ee9a5fbc78fa> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/library/l-keyc/index.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00090-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.880377 | 3,595 | 2.875 | 3 |
With more data being moved out of on-premise environments, data needs to be classified and secured to an appropriate level to prevent it from being compromised. This embraces the practice of assessing the risk of data loss and mitigating those risks; and applying adequate resources towards securing the data, both on-pr... | <urn:uuid:c05b9450-c030-4d37-9ce3-9079ef9fd3a3> | CC-MAIN-2017-09 | http://www.inforisktoday.asia/webinars/how-data-classification-enhances-protection-reduces-severity-breach-w-1144 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00142-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930622 | 191 | 2.578125 | 3 |
So while a new Cray supercomputer took first place on theTop500, it was another machine, Lawrence Livermore National Laboratory's Sequoia, that proved to be the most adept at processing data intensive workloads on the Graph 500.
IN PICTURES: The 10 most powerful supercomputers on the planet
Such differences in ranking ... | <urn:uuid:5a497df6-8491-405d-8be6-52f6960a55e7> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2161508/applications/world-s-most-powerful-big-data-machines-charted-on-graph-500.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00139-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946357 | 1,062 | 2.984375 | 3 |
By Kevin Brown
The total data center universe that most data center professionals are familiar with principally consists of two realms. The first realm, information technology (IT), refers to all systems that address the information processing aspects of the data center (e.g., servers, storage arrays and network switch... | <urn:uuid:5bae1b71-cc0a-4eef-af14-7f3b0bef69c3> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/classification-of-data-center-management-software-tools-0001 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00315-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935868 | 264 | 2.5625 | 3 |
Researchers from the University of California, San Diego have found that totally erasing data from SSDs is not as easy or reliable as previously thought.
ability to totally erase data from storage devices is a critical component of
secure data management, regardless of whether the organization is just throwing
away an ... | <urn:uuid:ac0a63b2-55c4-4206-a190-b83e9591cb86> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Data-Storage/SSDs-Harder-to-Seucrely-Purge-of-Data-than-HDDs-200129 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00191-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936485 | 855 | 2.703125 | 3 |
Air-cooled servers may soon go the way of the single-core CPU. In high performance computing datacenters, the hottest new trend in energy efficiency is warm water cooling. IBM, Eurotech, and a handful of other vendors have paved the way with this technology and now Appro has announced its own solution in an attempt to ... | <urn:uuid:445aa048-3f4d-4e3a-8ff9-939f45498ac3> | CC-MAIN-2017-09 | https://www.hpcwire.com/2012/10/31/appro_heats_up_hpc_portfolio_with_warm_water_cooling/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00191-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936274 | 1,174 | 2.78125 | 3 |
Five years after the federal government began measuring the digital divide, the nation stands at a crossroads.
More U.S. citizens have access to Internet and computer technology than ever before, thanks to rampant expansion of the telecommunications infrastructure and plummeting technology prices. But even as basic con... | <urn:uuid:39394e45-591f-4f4a-9d5d-936395aa1631> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Defining-the-Divide.html?page=3 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00135-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957875 | 3,733 | 2.5625 | 3 |
UAVs to power wireless -- anywhere
The next time a major hurricane or earthquake strikes, wiping out cell and wireless communications, first responders and citizens alike may be able to get gigabit-per-second wireless service from drones dispatched to the skies over the affected areas.
DARPA’s Mobile Hotspots program, ... | <urn:uuid:7970c35f-a86e-4963-a549-6039b1eb5a80> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2014/04/darpa-mobile-hotspot-uav.aspx?admgarea=TC_Mobile | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00135-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94439 | 802 | 3.625 | 4 |
Web Application Vulnerability Scanners are tools designed toautomatically scan web applications for potential vulnerabilities.These tools differ from general vulnerability assessment tools in thatthey do not perform a broad range of checks on a myriad of software andhardware. Instead, they perform other checks, such as... | <urn:uuid:dc4c7e3a-4776-4902-a1bf-7dce47f40190> | CC-MAIN-2017-09 | http://www.hackplayers.com/2008_10_01_archive.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00311-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.784988 | 768 | 2.890625 | 3 |
Powering The Internet Of Things
The Internet of Things is designed on the premise that sensors can be embedded in everyday object to help monitor and track them. The scope of this is huge – for example, the sensors could monitor and track everything from the structural integrity of bridges and buildings to the health o... | <urn:uuid:b7b15fc5-3ed0-48e3-94d3-eb881fbaec6c> | CC-MAIN-2017-09 | https://cloudtweaks.com/2014/08/powering-the-internet-of-things-wifi/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00311-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949288 | 555 | 3.515625 | 4 |
Frame Relay -- Summary
Network Consultants Handbook - Frame Relay
by Matthew Castelli
Frame Relay is a Layer 2 (data link) wide-area network (WAN) protocol that works at both Layer 1 (physical) and Layer 2 (data link) of the OSI model. Although Frame Relay services were initially designed to operate over ISDN service, ... | <urn:uuid:b4cdf966-9939-4f7f-816c-0c78a00c50f8> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsp/article.php/974881/Frame-Relay--Summary.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00487-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.872137 | 1,663 | 2.96875 | 3 |
Internet Addiction Might Become a Diagnosis
In recent months, the awareness about people unable to connect from technology for even a short period of time has gotten a lot of attention.
Last November, The New York Times ran an article on a Korean boot camp to cure kids of their computer addiction. South Korea, a countr... | <urn:uuid:1b8d3c35-b3ad-4c30-a4c4-9ca5d12c0925> | CC-MAIN-2017-09 | http://www.eweek.com/careers/internet-addiction-might-become-a-diagnosis-1.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00131-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955317 | 463 | 2.984375 | 3 |
There’s an old IT joke that blames many common computer glitches on PEBKAC:
Problem Exists Between Keyboard And Chair
In other words, users are often the source of major technology issues, not the systems themselves.
This old saw is doubly true in the world of IT security.
User error, mishandling of data, and failure t... | <urn:uuid:56b77ec1-ddd1-40b5-8f73-1f6b43eb0c41> | CC-MAIN-2017-09 | https://certesnetworks.com/phishing-means-time-zero-trust/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00131-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940951 | 1,038 | 2.53125 | 3 |
Internet on a chip: MIT team aims for massively multicore processors
- By Henry Kenyon
- Apr 16, 2012
Researchers at the Massachusetts Institute of Technology are developing methods for multiple processors on a microchip to share data, working in a manner similar to the Internet.
If it is successful, multi-processor ch... | <urn:uuid:0fba5b54-0936-473c-9c17-06be08b41b8b> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/04/16/mit-internet-on-a-chip-multicore-data-sharing.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00131-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949658 | 730 | 3.15625 | 3 |
Lack of Binary Protection is the last one in OWASP Mobile Top 10 Risk
Android Application are delivered through an .apk file format which an adversary can reverse engineer it and can see all the code contained in it. Below are scenarios of reverse engineering an application:-
- Adversary can analyze and determine which... | <urn:uuid:9965b262-7b1d-4d76-a01d-23df0cdbfbb3> | CC-MAIN-2017-09 | https://manifestsecurity.com/android-application-security-part-9/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00479-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921229 | 350 | 2.640625 | 3 |
If you're worried about an Internet "fast lane" squeezing out all the futuristic connected devices you're hoping to use around your home, fear not.
The vaunted Internet of Things, which already includes a variety of industrial sensors and machines and a growing number of consumer devices, is likely to make itself more ... | <urn:uuid:2c5e46d8-5ad2-4f39-a1d2-188acd3de24b> | CC-MAIN-2017-09 | http://www.cio.com/article/2376191/internet/bandwidth-sipping-iot-steers-clear-of-net-neutrality-debate----for-now.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00003-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966056 | 1,373 | 2.53125 | 3 |
Massachusetts Institute of Technology researchers have developed a device that can see through walls and pinpoint a person with incredible accuracy. They call it the "Kinect of the future," after Microsoft's Xbox 360 motion sensing camera.
Shown publicly this week for the first time the project from MIT's Computer Scie... | <urn:uuid:233b08bb-bc02-48f2-840b-f5e8cb1017b5> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2170788/data-center/mit--39-s---39-kinect-of-the-future--39--looks-through-walls-with-x-ray-like-vision.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00355-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.975906 | 843 | 3.015625 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:20008122-a809-4b6a-94ba-08f7d319bd0f> | CC-MAIN-2017-09 | https://docs.com/franck-gasulla/1934/new-york-as-a-global-city-booklet | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00231-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94055 | 3,511 | 2.640625 | 3 |
Computer clouds have been credited with making the workplace more efficient and giving consumers anytime-anywhere access to emails, photos, documents and music as well as helping companies crunch through masses of data to gain business intelligence.
Now it looks like the cloud might help cure cancer too.
The National C... | <urn:uuid:6febb0e6-092e-43cc-9f36-9fc1c5cffd0c> | CC-MAIN-2017-09 | http://www.nextgov.com/cloud-computing/2013/08/computer-clouds-can-help-cure-cancer/68096/?oref=ng-HPriver | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00351-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931194 | 1,246 | 3 | 3 |
NASA, NWS blazed an early path on lightning detection systems
- By William Jackson
- Feb 11, 2013
Government agencies have been getting a better understanding of how severe weather develops by tapping into lightning data — particularly cloud-to-cloud lightning — provided by private companies. But the National Weather S... | <urn:uuid:59ec350d-6516-4844-aa42-a9d30d67b25f> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/02/11/nasa-nws-early-path-lightning-detection-systems.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00351-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940814 | 610 | 3.546875 | 4 |
Photo of the Week -- Ice Sculptures that Rival Skyscrapers Found Beneath Greenland Ice Sheet
/ June 17, 2014
The constant melting and re-freezing occurring in the Greenland Ice Sheet has had an unexpected effect -- blocks of ice as tall as city skyscrapers and as wide as the island of Manhattan have formed at the ice s... | <urn:uuid:7a7270e8-7987-40f2-9f77-a4dd03a7afc9> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Ice-Sculptures-that-Rival-Skyscrapers-Found-Beneath-Greenland-Ice-Sheet.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00051-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957941 | 187 | 3.4375 | 3 |
When I was teaching at the University level I tried to convey to my students a number of real-world examples of some of the basic communication principles that guide communication (and misunderstanding) patterns – often without them knowing it.
This post can help you understand how Social Justice advocates use a sleigh... | <urn:uuid:b6679364-2a4c-46e3-90bb-eefbfeb44c6e> | CC-MAIN-2017-09 | https://jmetz.com/2016/10/weaponized-metacommunication/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00275-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963699 | 1,371 | 3.09375 | 3 |
Why Don't RIPv1 and IGRP Support Variable-Length Subnet Mask?
The ability to specify a different subnet mask for the same network number on different subnets is called Variable-Length Subnet Mask (VLSM). RIPv1 and IGRP are classful protocols and are incapable of carrying subnet mask information in their updates. Before... | <urn:uuid:5f011fb6-1205-44ca-9e42-060dc975b064> | CC-MAIN-2017-09 | https://www.certificationkits.com/rip-igrp-ccna/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00451-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.893297 | 606 | 2.53125 | 3 |
Natural gas leaks can cause serious problems in our cities -- on Dec. 11, for instance, a 20-inch Columbia Gas transmission line exploded in Sissonville, W. Va., and destroyed four homes and essentially cooked a section of the interstate.
To see what Boston had going on in its natural gas pipelines, a team of scientist... | <urn:uuid:c999b85e-b656-48cd-8c17-932b0bd996f9> | CC-MAIN-2017-09 | http://www.govtech.com/geospatial/Researchers-Map-Bostons-Natural-Gas-Leaks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00571-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956175 | 959 | 3.15625 | 3 |
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
Over the past few years organizations have awakened to the fact that there is knowledge hidden in Big Data, and vendors are feverishly working to develo... | <urn:uuid:ff43ec33-f313-45bb-9405-6962c546d804> | CC-MAIN-2017-09 | http://www.cio.com/article/2381657/big-data/sdn-networks-transform-big-data-into-information-capital.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00271-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916522 | 1,325 | 2.609375 | 3 |
Is Surfing the Internet Altering your Brain?By Reuters - | Posted 2008-10-27 Email Print
A neuroscientist at UCLA in California who specializes in brain function has found that Internet searching and text messaging has made brains more adept at filtering information and making quick decisions. But while technology can ... | <urn:uuid:d2498fde-8746-4124-be8b-dc4deae64c35> | CC-MAIN-2017-09 | http://www.baselinemag.com/mobility/Is-Surfing-the-Internet-Altering-your-Brain | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00147-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94923 | 683 | 2.703125 | 3 |
With the release of the new Star Wars film moviegoers everywhere are being re-introduced to The Force and its power. More than a few people may even walk out imagining what life would be like in a world inhabited by The Force.
While we may never be able to control each other’s minds, the ability to manipulate the physi... | <urn:uuid:ac2dbdd6-70d3-446f-a48c-bfcfaad4265f> | CC-MAIN-2017-09 | https://www.ibm.com/blogs/bluemix/2015/12/the-force-bb8-emotiv-insight-bluemix/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00091-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957481 | 319 | 2.59375 | 3 |
June 17, 2010—Over the last 20 years, scientists have collected vast amounts of data about climate change, much of it accessible on the Web.
Now the challenge is figuring out how to integrate all that information into coherent datasets for further analysis—and a deeper understanding of the Earth’s changing climate.
In ... | <urn:uuid:ccca54a8-0920-4414-8cbc-45bc783b32a1> | CC-MAIN-2017-09 | https://www.emc.com/leadership/articles/climate-change.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00143-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937904 | 2,165 | 3.890625 | 4 |
Over the past few years, the public sector spent considerable time and money making myriad transactions available to the public via the Internet.
People appreciate the convenience, and they appreciate "their" government responding to their wants. The public sector is slowly changing people's perception by creating an i... | <urn:uuid:75b07ba2-7d29-468f-9aa9-ff1ee8d113d5> | CC-MAIN-2017-09 | http://www.govtech.com/health/99395379.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00140-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966224 | 2,533 | 2.84375 | 3 |
Cisco Named a Leader
Cisco is positioned as a leader in the Gartner Magic Quadrant for Unified Communications
What is VoIP and What Can it Do for Your Business?
VoIP and IP telephony are becoming increasingly popular with large corporations and consumers alike. For many people, Internet Protocol (IP) is more than just ... | <urn:uuid:53287b8e-c7b0-4860-9cb4-3ae795438ca2> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/products/unified-communications/networking_solutions_products_genericcontent0900aecd804f00ce.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00612-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948415 | 481 | 2.65625 | 3 |
Digital telephone systems are the most popular telephone systems in
service today. While obsolete analog phone systems converted voice
conversations (sound waves) into electrical waves, digital phone systems
take the same voice conversations and convert them into a binary format
where the data is compressed into "1"s a... | <urn:uuid:df8f88f2-0e80-4018-bcb8-f99d28f99dcc> | CC-MAIN-2017-09 | http://www.metrolinedirect.com/digital-telephone-stations-and-features.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00612-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.893322 | 448 | 3.046875 | 3 |
Black Box Explains…Sizing a UPS
The power delivered by a UPS is usually expressed both in volt-amps (VA) and watts. There’s often confusion about what the difference is between these figures and how to use them to select a UPS.
VA is power voltage multiplied by amps. For instance, a device that draws 5 amps of 120-volt... | <urn:uuid:117623ca-2a4f-423a-b7b8-1e5ec06a1ab9> | CC-MAIN-2017-09 | https://www.blackbox.com/en-ca/products/black-box-explains/black-box-explains-sizing-a-ups | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00136-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971475 | 511 | 4 | 4 |
The new face of biometric access control
Passfaces’ authentication tool relies on the brain’s ability to know faces
- By Michael Arnone
- May 22, 2006
Getting computers to recognize human faces is a multibillion-dollar business. One small company, though, is approaching the authentication problem from another direction... | <urn:uuid:8d167932-322a-46b6-817e-afbe8a42f40c> | CC-MAIN-2017-09 | https://fcw.com/articles/2006/05/22/the-new-face-of-biometric-access-control.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00188-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938002 | 724 | 2.6875 | 3 |
This story was originally published by Data-Smart City Solutions.
Americans are dying at an unprecedented rate from opiate drug poisoning -- the national average stands at 78 fatal overdoses per day. Heroin and prescription painkillers are killing more people per year than car accidents, a signal that the epidemic has ... | <urn:uuid:d7dc8b8a-6e23-4ee2-bf71-9d5d3faafea9> | CC-MAIN-2017-09 | http://www.govtech.com/data/Solving-the-Opiate-Crisis-Through-Mapping-and-Data-Analytics.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Esri-News+%28ESRI.com+-+News%29 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00364-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936951 | 802 | 2.953125 | 3 |
According to the development trend, New methods for Computer Facilities or Mainframe network cabling have appeared. This is mainly manifested in the following respects.
1) In the host server room, switch routers and connecting lines have reached gigabit standards.
2) Using fiber optic jumper in connecting, SC interface... | <urn:uuid:b6bbf66b-b933-4860-a1ab-762bc9a86027> | CC-MAIN-2017-09 | http://www.fs.com/blog/common-interfaces-and-connectors-in-fiber-optic-jumpers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00184-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924947 | 1,331 | 2.640625 | 3 |
We used to say that all data has a decaying value; the further away from its creation date it gets, the less valuable that data becomes. Compliance and regulatory requirements as well as big data analytics and archive have changed that. We now have to assume that all data will become valuable again -- we just don't kno... | <urn:uuid:92286866-9e9c-4bef-9e0a-dedba66d60da> | CC-MAIN-2017-09 | http://www.networkcomputing.com/storage/plot-effective-data-archive-strategy/355219580 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00360-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962855 | 658 | 2.515625 | 3 |
Tweets come with all kinds of actionable elements inside them these days. Shortened URLs, #hashtags, @replies, and the actual message body. When you’re consuming a list of tweets, it’s important to be able to parse out these elements from the plain text so that they can be made into hyperlinks and directed at the prope... | <urn:uuid:92df77c3-1a6c-4e88-b515-d21562680745> | CC-MAIN-2017-09 | http://www.itworld.com/article/2704521/development/how-to-parse-urls--hash-tags--and-more-from-a-tweet.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00480-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.81416 | 356 | 2.53125 | 3 |
A Internet Explorer Cookie Forensic Analysis Tool.
Many important files within Microsoft Windows have structures that are undocumented. One of the principals of computer forensics is that all analysis methodologies must be well documented and repeatable, and they must have an acceptable margin of error. Currently, ther... | <urn:uuid:03f2f849-adf3-4fe5-8c51-b8d78eb3b5da> | CC-MAIN-2017-09 | https://www.mcafee.com/br/downloads/free-tools/galleta.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00232-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887901 | 310 | 2.59375 | 3 |
Primer: Storage PartitioningBy Kevin Fogarty | Posted 2004-03-01 Email Print
What is it? A set of digital instructions that makes it easier to manage the increasingly large amounts of data found on farms of inexpensive disk drives.
A set of digital instructions that makes it easier to manage the increasingly large amou... | <urn:uuid:f6ef722f-7820-4392-8e43-9e0c17a7e834> | CC-MAIN-2017-09 | http://www.baselinemag.com/it-management/Primer-Storage-Partitioning | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00408-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956862 | 810 | 3.234375 | 3 |
There are several kinds of industrial applications through the use of fiber optical cable. Thin fiber of glass or plastic, through which data can light and sound propagation is called optical fiber. These optical fibers as thin as human hair. When they are assembled together, they form a cable that can be used for tran... | <urn:uuid:c21312c1-1747-42b0-bb2d-38db8fe96aed> | CC-MAIN-2017-09 | http://www.fs.com/blog/the-industrial-purpose-of-using-fiber-optic-cables.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00408-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937074 | 576 | 3.21875 | 3 |
From New York to California, state and local governments are taking steps to educate citizens on the plethora of dangers in the online world. This is the third annual National Cyber Security Month which was started by the National Cyber Security Alliance (NCSA)
with the mission to "stay safe online."
Many dangers await... | <urn:uuid:fecb782d-acc5-4a9d-afcd-fdd4391c320e> | CC-MAIN-2017-09 | http://www.govtech.com/security/A-Different-Type-of-October-Scare.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00408-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955266 | 636 | 2.796875 | 3 |
FileGen is a command-line program to create test files of different lengths.
FileGen takes 2 or 3 parameters: filegen file size [byte]
- filegen test 1000
this will create a file named test and 1000 bytes long, the bytes are random
- filegen test 1000 0
this will create a file named test and 1000 bytes long, and all th... | <urn:uuid:3a5516a3-65fc-4656-a188-049d6e21514c> | CC-MAIN-2017-09 | https://blog.didierstevens.com/programs/filegen/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00528-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.656326 | 251 | 3.3125 | 3 |
Stratasys today unveiled two industrial 3D printers that can build objects of virtually any size using materials such as carbon fiber for lighter wieght and stronger parts.
The printers were designed to address the requirements of aerospace, automotive and other industries by being able to build completed parts with re... | <urn:uuid:eb489bb3-9bc4-46f8-af06-d231a49bf82e> | CC-MAIN-2017-09 | http://www.itnews.com/article/3112144/3d-printing/stratasys-unveils-mega-robotic-3d-printers-to-build-large-parts.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00524-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93023 | 967 | 2.546875 | 3 |
Wikimedia wants today's voices to echo through the ages. The non-profit foundation responsible for Wikipedia and other crowd-sourced online resources announced recently that it would add voice samples from notable people to their respective Wikipedia biographies.
The new project is called "Wikipedia voice intro project... | <urn:uuid:485ee1bf-7ba0-4b6a-b85c-8a7df243b00b> | CC-MAIN-2017-09 | http://www.cio.com/article/2379245/internet/wikipedia-adding-voice-recordings-to-famous-people-s-pages.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00224-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925798 | 503 | 2.578125 | 3 |
Autonomous Vehicles Drive ForwardBy Samuel Greengard | Posted 2015-03-24 Email Print
The self-driving car raises a critical question: How do we approach and manage machines that do things better than humans do? Do we value safety over choice?
In case you missed it, Tesla Motors Chairman Elon Musk is back in the news. H... | <urn:uuid:727c29d9-479c-4d5a-892f-0c88aa34cd6e> | CC-MAIN-2017-09 | http://www.baselinemag.com/blogs/autonomous-vehicles-drive-forward.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00576-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961431 | 579 | 2.84375 | 3 |
Technology firms wowed us in 2011, delivering tablets, ultrathin laptops, innovative cloud services, and voice command digital assistants. Not so long ago, the technology underlying these products was nothing more than research and development projects. So, in an effort to peek into our not-so-distant tech future, here... | <urn:uuid:a0cf5c28-ccbd-4fba-9dff-5cb9b0ad866c> | CC-MAIN-2017-09 | http://www.itworld.com/article/2733625/hardware/10-tech-research-projects-to-watch.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00576-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933971 | 1,492 | 2.859375 | 3 |
Energy's Titan supercomputer goes to 20 (petaflops)
I at first wondered if the scene the other day at the Energy Department’s Oak Ridge National Laboratory was something like the scene in “National Lampoon’s Christmas Vacation,” when Chevy Chase caused the local power plant to tap into emergency nuclear power when his ... | <urn:uuid:5fa3da20-ff9d-4136-9e14-fcf3ea2a3f0a> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2012/10/titan-energy-supercomputer-20-petaflops.aspx?admgarea=TC_BigData | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00452-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.899403 | 629 | 2.953125 | 3 |
Here's a short history on computer science student enrollments. Leading up to the dot.com bust, computer science enrollments soared to new highs, and then they plunged. Like a rock.
Computer science graduates at Ph.D. granting institutions reached a low of 8,021 in 2007, down from 14,185 in the 2003-2004.
But it's been... | <urn:uuid:3f65faba-05e9-468f-9253-01eb1e7d0c05> | CC-MAIN-2017-09 | http://www.cio.com/article/2376372/education/wall-street-s-collapse-was-computer-science-s-gain.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00396-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960348 | 981 | 2.515625 | 3 |
The U.S. National Transportation Safety Board (NTSB) is calling for motor vehicles to be equipped with "connected technology," machine-to-machine communications tools that could help drivers avoid accidents.
The accident occurred on February 16, 2012, when a Mack truck struck the left rear of a bus carrying 25 students... | <urn:uuid:a48b7984-7724-40dd-b1aa-58ae741957d4> | CC-MAIN-2017-09 | http://www.itworld.com/article/2707386/hardware/feds-want-cars-to-talk-to-each-other.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00396-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964826 | 839 | 3.203125 | 3 |
Smartphones, it seems, can do anything.
Today's phones pack so much power and so many sensors into such a small space -- and at a relatively low cost -- that they are increasingly being used for inventive purposes. Just this week Strand 1, a nano-satellite based on a Google Nexus One cell phone, was launched into space... | <urn:uuid:6c014ed2-815d-4460-9d0e-41d0f715dda5> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2495621/mobile-wireless/german-engineers-deconstruct-smartphones-to-find-new-uses.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00272-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955715 | 608 | 3.140625 | 3 |
The majority of today’s telecommunication systems is run on a fiber optic network. This has been largely due to the fact that such networks are ideal for transferring information. The development in fiber optics has continued to improve considerably during the last decade, providing ever more benefits to their users.
I... | <urn:uuid:bec5b5b5-5263-4ce0-b76c-a147b40734d2> | CC-MAIN-2017-09 | http://www.fs.com/blog/fiber-optic-network-has-become-the-protagonist.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00568-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963901 | 725 | 3.15625 | 3 |
After the LinkedIn debacle, it’s depressing but not entirely surprising to see yet further reports of large-scale hacks, this time of Yahoo! losing 400,000 usernames and passwords to anonymous hackers.
It seems amazing to us, working as we do in the security industry, that the passwords were stored in plaintext with ab... | <urn:uuid:4f7c3d38-d6df-4ff9-b0fe-1843eb61e521> | CC-MAIN-2017-09 | https://blog.gemalto.com/blog/2012/07/16/yet-another-hack-passwords-and-storing-them-fail-again/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00444-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940089 | 549 | 2.640625 | 3 |
NASA's Cassini spacecraft has detected propylene, a key ingredient in plastics, on Saturn's moon Titan.
This is the first time the chemical has been definitively found on any moon or planet, other than Earth. The discovery fills in what NASA called a "mysterious gap" in scientists' knowledge of the makeup of Titan's at... | <urn:uuid:8cfe19f9-367e-467d-9e27-156c9516dc21> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2170400/data-center/nasa--39-s-cassini-finds-plastic-ingredient-on-saturn--39-s-moon.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00144-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918884 | 712 | 3.9375 | 4 |
The so-called armored fiber optic cable, is outside the optical fiber is then wrapped in a layer of protective of “armor”, is mainly used to meet the requirements of animals rodent, moisture proof, etc. Armored cable is a power cable made up by assembling two or more electrical conductors, generally held together with ... | <urn:uuid:8edc88b2-6380-4673-8e30-186b6257bf54> | CC-MAIN-2017-09 | http://www.fs.com/blog/what-is-armored-fiber-optic-cable.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00320-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.908757 | 778 | 3.0625 | 3 |
Azambuja R.,Fertilitat Reproductive Medicine Center |
Petracco A.,Fertilitat Reproductive Medicine Center |
Petracco A.,University of Porto |
Okada L.,Fertilitat Reproductive Medicine Center |
And 5 more authors.
Reproductive BioMedicine Online | Year: 2011
Human embryo cryopreservation techniques enable the storage of... | <urn:uuid:8b0ea442-e13c-4818-9722-4bba2b65d5c0> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/fertilitat-reproductive-medicine-center-2584425/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00089-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941242 | 549 | 2.59375 | 3 |
This resource is no longer available
How To Secure Online Activities
The Internet is not automatically a secure or safe place to be. It is important to be clear and distinct when discussing security. Security is not a singular concept, solution, or state. It is a combination of numerous aspects, implementations, and pe... | <urn:uuid:e08cfb9c-437c-4f60-bcdc-c2148fd0dd60> | CC-MAIN-2017-09 | http://www.bitpipe.com/detail/RES/1377097047_848.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00017-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95074 | 145 | 3.296875 | 3 |
What Level of SSL or TLS is Required by HIPAA?
SSL and TLS are not actually monolithic encryption entities that you either use or do not use to connect securely to email servers, web sites, and other systems. SSL and TLS are evolving protocols which have many nuances to how they may be configured. The “version” of the ... | <urn:uuid:98557a23-91a5-40c3-8a89-12f3d97409a5> | CC-MAIN-2017-09 | https://luxsci.com/blog/level-ssl-tls-required-hipaa.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00193-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.835849 | 1,349 | 2.65625 | 3 |
As has become apparent to nearly everyone in the HPC community, life beyond petascale supercomputing will be power limited. Many efforts around the world are now underway to address this problem, both by commercial interests and researchers. One such effort that brings both into play is the Mont-Blanc research project ... | <urn:uuid:fb8f7644-3fd4-43a2-849f-13bd20178975> | CC-MAIN-2017-09 | https://www.hpcwire.com/2011/11/23/nvidia_tegra_processors_blaze_the_way_for_arm_in_supercomputing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00193-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943998 | 1,041 | 2.953125 | 3 |
The U.S. government wants to force cars to talk to each other over wireless networks, saying that could save more than 1,000 lives every year.
The National Highway Traffic Safety Administration (NHTSA) is seeking input about a possible federal standard for vehicle-to-vehicle (V2V) technology, which would let cars autom... | <urn:uuid:ae448fcb-ffe5-42f9-ae26-3ed310a85eb9> | CC-MAIN-2017-09 | http://www.cio.com/article/2466601/vehicletovehicle-networks-could-save-over-1000-lives-a-year-us-says.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00137-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95373 | 543 | 2.640625 | 3 |
The Brookings Institution published an interesting paper yesterday on the use of big data in education. In it, Brookings vice president Darrell M. West discussed the uses of real time analytics to help shape and guide education policy in the future. For West, data analytics were essential to evaluating school performan... | <urn:uuid:2122779d-0893-427c-a78f-90809260f0ea> | CC-MAIN-2017-09 | http://www.nextgov.com/technology-news/tech-insider/2012/09/big-data-could-play-role-improving-education/57896/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00189-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951118 | 356 | 2.734375 | 3 |
Last year, Wired magazine featured a demonstration that showed precisely how easy it is for a hacker to take over the onboard computer of an automobile while driving down the highway in an adjacent car. This disturbing proof of concept for the high-speed hack may have made the population at large more aware of the fact... | <urn:uuid:c1b168cb-40e2-4573-b004-5f55da1c3e21> | CC-MAIN-2017-09 | http://www.ingrammicroadvisor.com/security/digital-security-is-about-to-become-a-priority-for-the-auto-industry | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00541-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953429 | 755 | 2.59375 | 3 |
Can Machines Really Think?
The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.
By Chetan Dube
Since the birth of computer science, we have been asking the same question: can machines really think? Some ha... | <urn:uuid:f6e04df3-6ca5-4c18-8d07-a5f9e7d3765d> | CC-MAIN-2017-09 | https://esj.com/articles/2012/11/12/can-machines-think.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00133-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954876 | 1,318 | 3.328125 | 3 |
Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks. He is the author of the open source SQLBrute blind SQL injection testing tool, several books, and is the Chapter Leader for the Lon... | <urn:uuid:a41c7322-51e9-4887-aa87-04ec0e0ba82f> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2009/09/10/qa-sql-injection/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00133-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958036 | 1,571 | 2.546875 | 3 |
Within an hour of posting my last blog on the Variety of Location data, I remembered three other sets of Location data that I did not include but should note: Electronic Addresses, Voice/Phone Addresses and Virtual World Addresses.
Adding in the Electronic World
There's a whole virtual world out there that's grown arou... | <urn:uuid:b98f0a8f-aaea-4042-9bd8-f70176ec44ab> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/haraldsmith/date/201310?lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00485-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957654 | 834 | 2.765625 | 3 |
The 8-bit era (1980-1984)
Time Magazine: January 1983
The star of the personal computer was rising. For 1982, Time Magazine featured a generic version as "Machine of the Year," the one and only occasion a nonhuman has won that award. By this time, many new firms had joined the fight, releasing the third generation of m... | <urn:uuid:f3626eaa-8675-4e66-b44e-934a93b11553> | CC-MAIN-2017-09 | https://arstechnica.com/features/2005/12/total-share/4/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00009-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970682 | 1,286 | 3 | 3 |
Relying solely on the models of the past as predictors of the future can leave even the bestreasoned business plans all wet.
If we had to do it all over again, says the inventor Dean Kamen, we wouldn’t distribute water the way we always have. We wouldn’t rely so much on centralized collection and processing points, but... | <urn:uuid:ddba211c-560b-406a-a2ca-f687117bc99f> | CC-MAIN-2017-09 | https://www.cedmagazine.com/article/2011/02/memory-lane-thirsty-change | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00009-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945294 | 880 | 3.4375 | 3 |
Hidalgo C.,Colegio de Mexico |
Etchevers J.D.,Colegio de Mexico |
Martinez-Richa A.,University of Guanajuato |
Yee-Madeira H.,IPN ESFM |
And 3 more authors.
Applied Clay Science | Year: 2010
In Mexico, 70% of the land surface shows some degree of degradation. A substantial portion of these degraded soils are located in... | <urn:uuid:9fdec56b-b1e0-480a-b083-0642cd1a4954> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/esfm-ipn-765962/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00185-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93624 | 621 | 2.6875 | 3 |
Way back at the dawn of the automobile, people were skeptical of the new invention. They were accustomed to horses, and the UK passed a law that required motorists to be preceded by a man on foot waving a red flag so as to warn pedestrians.
Well, a 21st-century equivalent of that practice is on the way. A new rule anno... | <urn:uuid:a15557de-a699-41c9-aa48-d08bfbd15b5e> | CC-MAIN-2017-09 | https://arstechnica.com/cars/2016/11/the-federal-government-wants-evs-to-make-some-noise-at-low-speed/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00537-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966038 | 349 | 2.515625 | 3 |
Given the fact that most of the Internet got started in America -- and Americans dominate its use -- it's easy to forget the rest of the world is not only using the Web, but doing so in unique and creative ways. Amazon.com and AOL tend to get the lion's share of attention when it comes to how things should be done onli... | <urn:uuid:d6971b38-2f31-4ff6-aefb-7628a2c779de> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/pcio/Not-Invented-Here.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00005-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940559 | 1,727 | 2.578125 | 3 |
Multimedia Reading with the eyeBook
A plane crashes in the desert, the reader hears an explosion and then the little prince from Antoine de St. Exupéry's book of the same name suddenly appears between the lines.
Thanks to the eyeBook, a new reading system developed by the German Research Center for Artificial Intellige... | <urn:uuid:9ffee3af-c0dd-4c98-8466-81b32fed2243> | CC-MAIN-2017-09 | http://e-channelnews.com/ec_storydetail.php?ref=418115 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00357-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941899 | 136 | 2.53125 | 3 |
The 5-3-2 Principle of Cloud Computing: An Easier Approach
Even though, cloud computing has become exceedingly common, the fact remains that people seem to have differing opinions when it comes to its definition. The issue is not the lack of definition or the lack of an agreed coherent one, but rather the lack of appar... | <urn:uuid:318923ba-6d98-4a61-945d-d7296746763f> | CC-MAIN-2017-09 | https://cloudtweaks.com/2013/03/the-5-3-2-principle-of-cloud-computing-an-easier-approach/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942861 | 689 | 2.71875 | 3 |
BASIC-256: computer programming for (complete) beginners
Computers may be everywhere these days, but computer programming is still often seen in a very stereotypical way: it’s complicated, strictly for geeks only, not something of much use to anyone else.
The reality is very different. Anyone can learn the fundamentals... | <urn:uuid:d70f471d-3759-4d10-a2c6-81a9a9acbb07> | CC-MAIN-2017-09 | https://betanews.com/2014/02/07/basic-256-computer-programming-for-complete-beginners/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00353-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.903932 | 643 | 3.21875 | 3 |
Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted by Ponemon Institute, medical identity theft and “family fraud” are on the rise; with the number of victims affected by medical identity theft up... | <urn:uuid:71229234-b131-4277-a6d0-bb80eba6511f> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/09/13/medical-identity-theft-affects-184-million-us-victims/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00529-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951796 | 735 | 2.59375 | 3 |
NASA Servers At High Risk Of Cyber AttackAuditors were able to pull encryption keys, passwords, and user account information over the Internet from systems that help control spacecraft and process critical data.
(click image for larger view)
Slideshow: NASA, Microsoft Reveal Mars In Pictures
The network NASA uses to co... | <urn:uuid:5db986c5-5f76-4830-9f89-147181a4de9b> | CC-MAIN-2017-09 | http://www.darkreading.com/risk-management/nasa-servers-at-high-risk-of-cyber-attack/d/d-id/1096929 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00105-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933845 | 470 | 2.5625 | 3 |
NASA contest yields Space Apps for Earth, too
- By Kevin McCaney
- May 09, 2012
NASA has opened the voting for its International Space Apps Challenge, an effort to provide a platform to let developers find innovative solutions to problems both in space and on Earth.
The contest drew more than two dozen apps from teams ... | <urn:uuid:8a0092f8-d8d2-4c2e-8a9d-a8b071f898f8> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/05/09/nasa-space-apps-challenge.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00525-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960946 | 381 | 2.625 | 3 |
‘Identity theft’ has recently hit the headlines as a major security issue but the importance of digital identity and how to protect it has been a consideration for much longer. Even before the dramatic events of September 11, 2001, corporations worldwide were already well aware of the need to ensure a positive verifica... | <urn:uuid:88ad7d7b-3ac0-40bb-a6e7-daa7aa78e7c4> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2003/04/24/corporate-access-cards-securing-corporate-networks-with-military-strength-digital-identity-solutions/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00225-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933496 | 1,914 | 2.84375 | 3 |
A local government uses a centralized customer service system - sometimes called 311 - so residents can call a centralized government phone number, place requests for service and are assigned tracking numbers to monitor their requests.
Though a centralized customer service system is valuable for residents, local govern... | <urn:uuid:dc930620-e654-48a0-8d37-c65bc5b02a69> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/311-Survey-Customer-Service-Systems-Spread.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00221-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932427 | 298 | 2.75 | 3 |
As long as criminals have been plotting to circumvent order and established protocols, there have been crime-fighters pushing the envelope to foil their efforts. As criminals hatch sophisticated schemes to bypass detection, law enforcement agencies and other dedicated groups devise original and inventive ways to thwart... | <urn:uuid:bd2fca88-b4ed-4ec4-916e-5e96a23e28e8> | CC-MAIN-2017-09 | http://www.2-spyware.com/news/post4097.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00449-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927972 | 846 | 2.640625 | 3 |
Computer fires severe enough to prompt a 911 call are so unusual that when it does happen, local media sometimes makes note of it. That was the case in Arlington, Va., recently, when firefighters found a computer burning on the balcony of an apartment complex.
According to the Arlington County Fire Dept., the resident ... | <urn:uuid:9f38a27f-da17-47c0-b618-cf451a41142c> | CC-MAIN-2017-09 | http://www.itnews.com/article/2954364/computer-hardware/computer-fires-requiring-a-911-call-rare.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00449-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.979207 | 381 | 2.796875 | 3 |
Codecs like H.264 reduce bandwidth by only sending full frames every so often, mixing them with partial frames only capturing changes in between the full ones. They are called 'I' frames because they are the initial / full frames, followed by 'P', or predictive frames.*
Note: if you are not familiar with codecs, please... | <urn:uuid:97004af2-2c05-47fe-9cfe-7d82943e8895> | CC-MAIN-2017-09 | https://ipvm.com/reports/test-i-frame-rate | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00621-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936109 | 366 | 3.421875 | 3 |
Recently, cloud computing has attracted considerable attention. Cloud computing is becoming one of the most important computing and service paradigm. Cloud computing employs a group of interconnected computers which are dynamically provisioned and serve as one or more unified computing resources. Customers are able to ... | <urn:uuid:fa500a75-3991-4540-b32b-6dfde0ee241a> | CC-MAIN-2017-09 | http://www.myrealdata.com/blog/142_cloud-computing-is-green | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00090-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937594 | 1,061 | 3.1875 | 3 |
At a recent dinner, I sat next to a retired physicist from Raytheon whose work focused on the development and application of microwave technology. Microwave use goes far beyond household ovens, including radar and the creation of industrial diamonds. The scientist had taken it upon himself to preserve an entire room's ... | <urn:uuid:8bab88b5-e8c5-4d00-961d-1287dd865678> | CC-MAIN-2017-09 | http://www.networkcomputing.com/storage/preserve-our-technological-history-proposal/1028523289?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00318-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964951 | 768 | 2.71875 | 3 |
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The study reveals barriers to understanding basic honeypot concepts and presents recommendations on which honeypot to use.
An increasing number of c... | <urn:uuid:d650d95a-49ab-47c1-880c-d44776121c0d> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2012/11/22/understanding-basic-honeypot-concepts/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00018-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.914595 | 414 | 2.5625 | 3 |
Textbooks on software engineering prescribe to check preconditions at the beginning of a function. This is a really good idea: the sooner we detect that the input data or environment does not match our expectations, the easier it is to trace and debug the application. A nice function with precondition checking refuses ... | <urn:uuid:11197c7a-5b60-4b18-afc9-50822310d7d2> | CC-MAIN-2017-09 | http://www.hexblog.com/?p=30 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00314-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.911703 | 800 | 2.640625 | 3 |
Last week Japanese IT company Fujitsu used the K supercomputer to conduct the world’s first simulation of the magnetization-reversal process in a permanent magnet. According to an announcement from the firm, “this opens up new possibilities in the manufacture of electric motors, generators and other devices without rel... | <urn:uuid:4725256d-1e86-4563-9616-00b62219b76c> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/09/09/supercomputing_for_super_magnets/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00314-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927167 | 409 | 3.328125 | 3 |
The US Government's decision to adopt the Advanced Encryption Standard (AES) for securing sensitive information will trigger a move from the current, ageing Data Encryption Standard (DES) in the private sector, according to users and analysts.
But it will not happen overnight. Technology standards bodies representing i... | <urn:uuid:1b79e8cd-a505-4840-9181-2c7d61c4627b> | CC-MAIN-2017-09 | http://www.computerweekly.com/news/2240043602/US-companies-to-embrace-encryption-standard | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00486-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960614 | 541 | 2.546875 | 3 |
STMicroelectronics hopes to make blurry low-light images from smartphone cameras a thing of the past with a new chip designed to boost light output from LED-based flashes.
The ideal camera flash delivers a lot of light in a short time, freezing action and illuminating more distant objects. Professional cameras use a xe... | <urn:uuid:4743a370-4b67-45ca-941a-f26e0dd67167> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2500794/computer-hardware/stmicro-sees-40w-led-flash-in-future-smartphones.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00482-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936321 | 584 | 2.796875 | 3 |
Containerizing Flowroute Apps in Node.js
The evolution of virtualization and cloud platforms combined with mature adoption of agile methodologies and DevOps has impacted the way organizations build and ship software. The traditional waterfall-style approach that ended with developers throwing code “over the wall” to th... | <urn:uuid:f04d612e-a6de-4abc-9f9b-b3a8536acc50> | CC-MAIN-2017-09 | https://blog.flowroute.com/2017/02/10/containerizing-flowroute-apps-in-node-js/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00358-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917118 | 2,936 | 2.65625 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:509ae43b-7b03-4a28-9cc6-8d18d549fea0> | CC-MAIN-2017-09 | https://docs.com/chad-hidalgo/4827/hidalgo-c-researchpaper1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00358-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952836 | 3,573 | 2.65625 | 3 |
So! Everything is turned in, edited, spreadsheets are checked, R code is checked. I've even assembled a playlist to go along with the middle school dance floor clustering tutorial.
2. Some algorithms just feel natural using the "drag the formula down to fill the cell" approach that you have in Excel. It's like an artis... | <urn:uuid:43622fa6-ff93-4c9f-867f-d853401eb7b3> | CC-MAIN-2017-09 | http://www.john-foreman.com/blog/beef-to-slurry-to-wiener-reflections-on-teaching-algorithms-in-spreadsheets | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94603 | 710 | 2.5625 | 3 |
Iron Mountain makes Public Greenhouse Gas Emissions Disclosure to CDP
How Carbon measurement and reporting are driving business decisions
With the US administration’s announcement of new EPA carbon pollution rules and the build-up to the United Nations Conference on Climate Change (COP21) in Paris this December, there ... | <urn:uuid:817b009d-cc37-4cc4-b3e7-c0e40c761575> | CC-MAIN-2017-09 | http://www.ironmountain.com/About-Us/Corporate-Social-Responsibility/News-and-Noteworthy/Our-Planet/I/Iron-Mountain-makes-Public-Greenhouse-Gas-Emissions-Disclosure-to-CDP.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00058-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957459 | 691 | 2.546875 | 3 |
It’s 2011 and there are now more phones in the world than computers. Every day, more of these phones become smartphones AKA portable computers. Unfortunately, if your phone can browse the web and check email, you will be targeted by some of the same malicious attacks and scams that go after your PC.
Here are a few basi... | <urn:uuid:f7fc9906-2d24-4505-8059-08923c991f13> | CC-MAIN-2017-09 | https://safeandsavvy.f-secure.com/2011/01/31/secure-your-mobile/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00054-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918565 | 534 | 2.5625 | 3 |
A team of scientists from ETH Zurich and the University of Leeds have solved a 300-year-old riddle about the nature of the Earth’s rotation. Using the Cray XE6 supercomputer “Monte Rosa” installed at CSCS, the researchers uncovered the reason for the gradual westward movement of the Earth’s magnetic field.
For three ce... | <urn:uuid:3f494b75-d2df-4e59-9928-3e318aaf8ef0> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/10/30/swiss-supercomputer-solves-core-mystery/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00230-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919101 | 786 | 4.25 | 4 |
DARPA aims to replace regular satellites with floating clusters
- By Henry Kenyon
- Apr 25, 2012
In the near future, satellites may come in pieces. That’s the goal of a new effort launched by the Defense Departments research and development agency — to fly clusters of small spacecraft that communicate with each other a... | <urn:uuid:dbe240f3-71f1-4afa-b6c5-f288d96f28d5> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/04/25/darpa-satellite-floating-clusters.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00526-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907481 | 532 | 2.71875 | 3 |
NTP, network time protocol, is a time synchronization protocol that is implemented on a network protocol called UDP. UDP is designed for speed at the cost of simplicity, which plays into the inherent time-sensitivity (or specifically, jitter sensitivity) of NTP. Time is an interesting scenario in computer security. Tim... | <urn:uuid:62021f30-03a7-4e03-9ef0-828dd2d8f88c> | CC-MAIN-2017-09 | https://labs.neohapsis.com/2014/02/12/on-ntp-distributed-denial-of-service-attacks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00226-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927683 | 378 | 3.390625 | 3 |
“Rather than some automated tool or complex virus, Google and Wikipedia searches appear to have been the weapons used to knock down the walls guarding [Sarah Palin’s] e-mail,” according to this eWeek item.
Most people are vulnerable to the type of attack that compromised Palin’s email account, as Markus Jakobsson wrote... | <urn:uuid:1a537bf6-7d23-46f6-aae3-ddf44e58dda0> | CC-MAIN-2017-09 | https://blog.lastpass.com/2008/09/after-yahoo-email-debacle-sarah-palin-needs-lastpass.html/?showComment=1222424340000 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00574-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91084 | 949 | 2.578125 | 3 |
When New Scientist published a leader that Britain’s National Health Service (NHS) had quietly shared the healthcare data of 1.6 million patients with DeepMind, Google’s London-based artificial intelligence (AI) division, there were complaints across the nation’s newspapers.
While the information was ostensibly shared ... | <urn:uuid:13143185-1a57-499e-ae8c-be34168b4052> | CC-MAIN-2017-09 | http://www.digitalreasoning.com/buzz/why-you-dont-need-to-share-personal-data-to-benefit-from-ai.2467871 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00570-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953616 | 350 | 2.640625 | 3 |
Retrofitting a data center is about managing limitations and trade-offs. Decision-makers have to consider physical limits (such as the weight a floor will support and how much cooling equipment can fit into an existing space). Then there’s infrastructure to think about: It would be difficult to swap out an old uninterr... | <urn:uuid:0b508f77-c80d-4569-a929-c2f85117af1b> | CC-MAIN-2017-09 | http://www.cio.com/article/2438302/energy-efficiency/five-ways-to-find-data-center-energy-savings.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00270-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946917 | 833 | 2.609375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.