text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Do You Hear What I Hear?�Part IX: Queuing Solutions for QoS Data packets will have to line up for processing at various points as they move from source to destination. Schema for assigning priority to different classes of traffic help manage data flows. Concluding our series on VoIP Quality of Service (QoS), our previo...
<urn:uuid:9940830e-3e9c-472b-b64c-f6bb5a5d4532>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/unified_communications/Do-You-Hear-What-I-Hear151Part-IX-Queuing-Solutions-for-QoS-3529361.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00019-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934111
968
2.78125
3
As a technology company, Gradwell is fascinated by the digital world and how telecommunications have progressed since the development and adoption of computers. Experts argue that the very first digital communication goes as far back as the telegraph system at least a century before the internet we all know and love. I...
<urn:uuid:5c14538b-b79e-4652-86c8-8f12b1efa5c4>
CC-MAIN-2017-09
https://www.gradwell.com/2015/02/12/its-all-about-the-numbers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00019-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956089
1,171
2.953125
3
New Zealand's parliament is preparing to vote on a major patent reform bill that will tighten the country's standards of patentability. One of the most significant changes in the proposed bill is a specific patentability exclusion for software. If the bill receives parliamentary approval in its current form, it will br...
<urn:uuid:f1cc8440-5aef-427e-a0a4-028641da1a8a>
CC-MAIN-2017-09
https://arstechnica.com/information-technology/2010/04/new-zealand-patent-reform-bill-says-no-to-software-patents/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941298
269
2.546875
3
In a recent speech in London, IBM Chairman, President and CEO Sam Palmisano laid out IBM's vision of the next decade as the decade of the smarter systems. Among the many areas IBM is focusing on to enable a smarter planet is smart water management. In a recent speech in London, IBM Chairman, President and CEO Sam Palmi...
<urn:uuid:cfda9b3c-cae1-4fe2-9a95-c49913defde2>
CC-MAIN-2017-09
http://www.eweek.com/c/a/IT-Infrastructure/IBM-Puts-Smart-Water-Systems-on-Tap-890648
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00191-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928461
728
2.78125
3
Google Takes Unconventional Route with Homegrown Machine Learning Chips May 19, 2016 Stacey Higginbotham At the tail end of Google’s keynote speech at its developer conference Wednesday, Sundar Pichai, Google’s CEO mentioned that Google had built its own chip for machine learning jobs that it calls a Tensor Processing ...
<urn:uuid:feb54ec3-7ed1-4cf5-b152-80ad0a216b46>
CC-MAIN-2017-09
https://www.nextplatform.com/2016/05/19/google-takes-unconventional-route-homegrown-machine-learning-chips/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00543-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951081
1,602
2.59375
3
Q&A: An Introduction to the Scala Programming Language We explore what the Scala programming language can do for your organization with the language’s inventor. What is the Scala programming language, how does it work with Java, and what is its role in high-performance computing? We learn from the language’s inventor, ...
<urn:uuid:877e5847-a206-4532-9b11-0139a298c8ab>
CC-MAIN-2017-09
https://esj.com/articles/2012/01/23/introduction-to-scala.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00187-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940422
1,137
3.125
3
As we all know, the optical fiber cable system in the transmission of the optical signal, can not do without optical transceivers and fiber. There are two major types of optical transceivers categories: light-emitting diode (LED) and Laser light emitting device. Although in performance, the laser light is far supperior...
<urn:uuid:99ea71ee-c877-48d6-991b-fb9c426305b9>
CC-MAIN-2017-09
http://www.fs.com/blog/10-gigabit-multimode-and-dmd-testing-technology.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91413
1,173
3.046875
3
From FiberStore,we will answer to you what is the Low Smoke Zero Halogen Cable. Low Smoke Zero Halogen(LSZH) cable is free of halogen (F, Cl, Br, I, At), lead-free environmental substances such as cadmium, chromium and mercury in the plastic material made ??of combustion does not emit toxic smoke (such as: hydrogen hal...
<urn:uuid:813b0bf4-6ae4-4666-ba35-0ff39fd252c9>
CC-MAIN-2017-09
http://www.fs.com/blog/what-is-the-low-smoke-zero-halogen-cable.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz
en
0.924738
618
2.65625
3
Throwing the first pitch at a big-league baseball game is something most of us can only dream about. But thanks to technology, one 13-year-old boy named Nick LeGrande will throw out the first pitch for a Major League Baseball game from 1800 miles away. It will be the first time that someone has remotely thrown a pitch ...
<urn:uuid:bcef8ca8-1884-4ece-8a06-0315b74c520a>
CC-MAIN-2017-09
http://www.cio.com/article/2384177/consumer-technology/kid-to-throw-out-the-first-pitch-at-a-baseball-game-through-a-telepresence-robot.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00063-ip-10-171-10-108.ec2.internal.warc.gz
en
0.973376
194
2.6875
3
Financial and operational modeling can be used to visualize a variety of business scenarios, based on different business drivers. This allows companies to gain deeper insights into the ways each decision will affect their businesses. Performing these “what-if” scenarios is imperative to better understanding the impact ...
<urn:uuid:24a9ae6c-cdf6-4030-b60b-6c6cddb976b0>
CC-MAIN-2017-09
http://blog.hostanalytics.com/using-what-if-scenarios-in-financial-and-operational-modeling
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00415-ip-10-171-10-108.ec2.internal.warc.gz
en
0.922797
805
2.8125
3
6 Ways the IoT Could Impact Data Centers The Internet of Things (IoT) is a term that refers to the interconnection between physical objects that is also known as a physical or IP address. This Gartner Report states that, by 2020, the IoT is expected to build to 26 billion units. This means that all data centers must be...
<urn:uuid:9dff71e9-7d08-4bdb-b413-2df2b7b7485b>
CC-MAIN-2017-09
http://www.lifelinedatacenters.com/data-center/6-ways-the-iot-could-impact-data-centers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00415-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943781
487
2.734375
3
This post was originally published on the CA Security Council blog. The current browser-certification authority (CA) trust model allows a website owner to obtain its SSL certificate from any one of a number of CAs. That flexibility also means that a certificate mis-issued by a CA other than the authorized CA chosen by ...
<urn:uuid:c8b3f316-a99b-4a3d-b622-f60623e4a36e>
CC-MAIN-2017-09
https://www.entrust.com/public-key-pinning-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00415-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939958
755
2.609375
3
Attar A.,Association des Gastro enterologues Oncologues Group | Malka D.,Institute Gustave Roussy | Sabate J.M.,Association des Gastro enterologues Oncologues Group | Bonnetain F.,Association des Gastro enterologues Oncologues Group | And 6 more authors. Nutrition and Cancer | Year: 2012 Although malnutrition is known ...
<urn:uuid:49829042-5cfc-4107-9ff6-9c492272980e>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/association-des-gastro-enterologues-oncologues-group-2055872/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00183-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939399
383
2.515625
3
The major difference between SDN and traditional networking lies in the concept of controller-based networking. In a software-defined network, a centralized controller has a complete end-to-end view of the entire network, and knowledge of all network paths and device capabilities resides in a single application. As a r...
<urn:uuid:bd3559a5-cc67-417d-8863-7a89ea0a7217>
CC-MAIN-2017-09
http://www.cio.com/article/2369448/networking/111753-Software-defined-networking-explained.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00407-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933119
145
2.6875
3
When storms attack, Smart Grid could reduce outages, speed recovery - By William Jackson - Jul 10, 2012 It’s been a bad 12 months for electric utilities and the customers who depend on them. Hurricane Irene in August 2011 knocked out power to more than 4 million homes and businesses in the eastern United States, some f...
<urn:uuid:26cb99b2-f665-4690-9d05-80a8afd634d7>
CC-MAIN-2017-09
https://gcn.com/articles/2012/07/10/smart-grid-power-outages-severe-storms.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00283-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944008
1,300
2.609375
3
Using DNS Logs As a Security Information Source : Occasionally this list is used as part of research into malware and domain security. Please drop us a note if you find such a reference in an article or presentation; if you are the author, let us know. Two papers we’ve become aware of: Understanding the Prevalence and ...
<urn:uuid:98c3b833-53cb-4152-8cd2-89122fc6a812>
CC-MAIN-2017-09
http://www.malwaredomains.com/?tag=news
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00459-ip-10-171-10-108.ec2.internal.warc.gz
en
0.865435
917
2.53125
3
Yaz previously posted a news article that used a camera to help detect signs of alcohol impairment, but the cost of the system seems prohibitive. There is word of some new technology to detect if the driver of a vehicle may be under the influence. Researchers at TCU have developed a fuel cell which can detect alcohol i...
<urn:uuid:f2af7081-1dae-446b-9c8c-2f5327aaa4c7>
CC-MAIN-2017-09
https://arstechnica.com/uncategorized/2002/03/2257-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00227-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961303
283
2.6875
3
How does a city work? Interactive model gives Portland answers. - By Rutrell Yasin - Aug 09, 2011 How does public transportation affect education? What impact does population density have on public health? Is there a connection between CO2 levels and obesity? Officials in the City of Portland, Ore., have collaborated w...
<urn:uuid:9c799c2e-366d-4015-bebe-93f9f199898f>
CC-MAIN-2017-09
https://gcn.com/articles/2011/08/09/portland-ibm-smart-city-model.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00155-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935885
765
2.765625
3
A spider that survived more than three months aboard the International Space Station has died less than a week into its new life as a celebrity. Nefertiti, a jumping red-backed spider, breathed her last after just four days of living in the Smithsonian's National Museum of Natural History. I was going to write that she...
<urn:uuid:0bbff365-cf7c-4018-80b8-6aed6c22bb97>
CC-MAIN-2017-09
http://www.itworld.com/article/2716658/enterprise-software/spidernaut-never-got-to-enjoy-its-fame.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00575-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965966
422
3.15625
3
Technology in Action Sandy shows storm-prediction progress - By Frank Konkel - Nov 05, 2012 Hurricane Sandy bears down on the mid-Atlantic on Oct. 29th in this NASA satellite image. By any account, the super-storm known as Hurricane Sandy was devastating, claiming 113 American lives and potentially an estimated $50 bil...
<urn:uuid:8a51dbc4-a0db-4fca-a9a5-edae75a54193>
CC-MAIN-2017-09
https://fcw.com/articles/2012/11/05/sandy-hurricane-center.aspx?admgarea=TC_Agencies
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00275-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956704
1,232
3.234375
3
Sugino H.,Asa Medical Association | Tsumura S.,Asa Medical Association | Tsumura S.,Tsumura ENT Clinic | Kunimoto M.,Asa Medical Association | And 19 more authors. PLoS ONE | Year: 2015 The Japanese guidelines for acute otitis media in children recommend classifying acute otitis media by age, manifestations and local f...
<urn:uuid:7a295388-7a67-491f-8984-3a223df9bc52>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/asa-medical-association-427198/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00627-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925999
463
2.53125
3
Whether or not the D-Wave quantum computer is in actuality a quantum computer is a debate that HPCwire has been following since the project hatched in 2007. Early critics of the system claimed that it wasn’t a “real” quantum computer. Since that time, D-Wave has been winning over supporters, including Google, NASA and ...
<urn:uuid:7d6d7901-1e3c-4b96-a724-c06ab3788248>
CC-MAIN-2017-09
https://www.hpcwire.com/2014/01/13/everything-wanted-ask-d-wave/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00327-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950146
938
2.953125
3
For Win Wonks, Software Restriction is Good Policy Some of the most significant threats to your network's security and stability come from worms and trojan malware. These network threats can be transmitted through executable files attached to e-mails, via Internet downloads, or from Web pages. Although virus checkers a...
<urn:uuid:595067b0-17b7-4c09-b9eb-d3cd8c0247c6>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netsecur/article.php/3445241/For-Win-Wonks-Software-Restriction-is-Good-Policy.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00503-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933221
1,072
3.140625
3
Researchers at Stanford University have developed a lithium-ion battery that shuts down as it begins to overheat, potentially meaning the types of catastrophic fires seen in hoverboards, laptops and airliners could become a thing of the past. Lithium-ion batteries are used in just about all portable electronics. They'r...
<urn:uuid:2d174e4b-5adb-4249-9fec-c1adfcac2957>
CC-MAIN-2017-09
http://www.itnews.com/article/3021017/researchers-develop-a-lithium-ion-battery-that-wont-overheat.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00624-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951647
378
3.390625
3
A pair of robotic legs will be heading to the International Space Station. That's right. Robot legs. The 300-pound robot, which had been in the works for 11 years, has 38 PowerPC processors, including 36 embedded chips, which control its joints. Each of the embedded processors communicates with the main chip in the rob...
<urn:uuid:918403ff-d24d-470f-9360-74266ff7badd>
CC-MAIN-2017-09
http://www.cio.com/article/2377544/government/nasa-s-humanoid-robot-to-get-a-leg-up-on-space-station.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00500-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953796
681
3.203125
3
Malware 101: An IT primer on malicious software This feature first appeared in the Winter 2015 issue of Certification Magazine. Click here to get your own print or digital copy. Malware is perhaps the most dangerous threat to the security of the average computer system. Research by Microsoft recently estimated that 17....
<urn:uuid:817e4635-2988-4b90-98ab-32eb454bec8f>
CC-MAIN-2017-09
http://certmag.com/malware-101-primer-malicious-software/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00444-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933648
1,511
3.59375
4
Health Care Slideshow: Social Medicine: Is the Internet Transforming Healthcare?By Don Reisinger | Posted 05-13-2011 18 percent of all U.S. Internet users have gone to the Web to find people who have similar ailments. 23 percent of U.S.-based Internet users who suffer from a chronic disease have used to the Internet to...
<urn:uuid:eb4f0af7-a4ed-48ed-9c71-3155acf7c888>
CC-MAIN-2017-09
http://www.cioinsight.com/print/c/a/Health-Care/Social-Medicine-Is-the-Internet-Transforming-Healthcare-752089
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00620-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941406
319
2.75
3
From its Babylonian roots, two primary forces have shaped banking: regulation and globalization. For millennia, sovereigns have held a tight grip over minting power and have used it as a strategic regulatory tool to establish and maintain power. Today's regulations may be more complex, but they also serve many disparat...
<urn:uuid:5762fdc9-a41a-43fa-ae92-03ed8b10321e>
CC-MAIN-2017-09
http://www.banktech.com/innovation/can-technology-serve-as-a-positive-disruptive-force-in-banking/a/d-id/1297919?piddl_msgorder=thrd
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00144-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959585
1,065
2.96875
3
Using nanotechnology, proteins and a chemical that powers cells in everything from trees to people, researchers have built a biological supercomputer. The supercomputer, which is the size of a book, uses much less energy, so it runs cooler and more efficiently, according to scientists at McGill University, where the le...
<urn:uuid:3d89672b-8934-4572-92b2-2c42a4f6604d>
CC-MAIN-2017-09
http://www.itnews.com/article/3040707/computer-hardware/biological-supercomputer-uses-the-juice-of-life.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00020-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964665
754
3.984375
4
There’s no doubt that the increased use of technology in Connecticut classrooms enhances students’ learning. Students can now access information from across the globe on every subject imaginable and interact with individuals from other continents. But herein is where the problem lies; the internet doesn’t come without ...
<urn:uuid:ade14b2d-519e-4032-904e-7934837d5d23>
CC-MAIN-2017-09
https://www.imperosoftware.com/internet-safety-in-connecticut-taking-anti-bullying-policies-to-the-next-level/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00196-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947176
418
3.078125
3
The Cultural Effects of Video Gaming Xbox. PlayStation. Wii. When you think of video games, it’s likely that some of these names will pop into your head. It’s also likely you’ll conjure up images of Super Mario stomping on bad guys, or of enemy warriors battling on an alien planet, or of your own James Bond-esque spy m...
<urn:uuid:0e9cf3ed-501f-4334-af29-3e4bb6f160f8>
CC-MAIN-2017-09
http://certmag.com/the-cultural-effects-of-video-gaming/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00548-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957334
2,575
2.96875
3
NEW YORK, NY--(Marketwired - Aug 20, 2014) - As the summer comes to a close, many families may plan on taking a late-summer getaway to New York City -- for some a first time visit, and for others an annual ritual. With the National September 11 Memorial & Museum now open, parents and guardians should consider using a v...
<urn:uuid:7db3a0e6-f431-496d-87b8-e220b4e5a3ce>
CC-MAIN-2017-09
http://www.marketwired.com/press-release/family-trip-9-11-museum-memorial-new-york-can-present-opportunities-adults-talk-young-1940064.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00492-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966026
677
2.71875
3
Wombat released its social engineering training module to defend against social engineering threats, including spear phishing and social media-based attacks. Commonly defined as the art of exploiting human psychology to gain access to buildings, systems or data, social engineering is evolving so rapidly that technology...
<urn:uuid:5fd7b884-fe84-4238-83d5-72c3197a67fa>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/01/15/wombat-unveils-social-engineering-security-training-module/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00016-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945499
388
2.53125
3
The growing use of wireless technology combined with the complexity of many of medical devices has raised concerns about how protected they are against information security risks that could affect their safety and effectiveness. That was the central conclusion of a report issued today from the Government Accountably Of...
<urn:uuid:1342c261-ac9b-40e6-8981-00bc02d82535>
CC-MAIN-2017-09
http://www.networkworld.com/article/2223222/mobile-security/wireless-medical-devices-face-myriad-security-concerns.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00068-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95262
1,037
2.84375
3
Imagine controlling your phone or computer simply by touching the palm of your hand. An experimental device being developed by researchers at Microsoft and Carnegie Mellon University does exactly that. The device, called OmniTouch, is a wearable system that turns virtually any surface, including your skin, into a funct...
<urn:uuid:eeedcaa0-24f3-4bab-a374-f1322273250e>
CC-MAIN-2017-09
http://www.govtech.com/technology/Transforming-Your-Skin-into-a-Touch-Screen.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00488-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945673
103
2.625
3
New data is bringing scientists much closer to proving that a particle discovered in the Large Hadron Collider last year is the elusive Higgs boson. Scientists with the collider said they have analyzed two and a half times more data than was available to them last summer when they initially announced the particle find....
<urn:uuid:f566f78c-16b1-4b45-b1bd-f0be62fd1f32>
CC-MAIN-2017-09
http://www.networkworld.com/article/2164404/data-center/scientists-closer-to-declaring-discovery-the--god-particle-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00364-ip-10-171-10-108.ec2.internal.warc.gz
en
0.947473
567
2.796875
3
The assembler directives do not emit machine language but, as the name direct the assembler to perform certain operations only during the assembly process. Here are a number of directives that we shall discuss. CSECT Identifies the start or continuation of a control section. the start or continuation of a dummy control...
<urn:uuid:2f4e8b26-9d8f-426b-bb38-9d99e794c5d4>
CC-MAIN-2017-09
http://edwardbosworth.com/MY3121_LectureSlides_HTML/AssemblerDirectives.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00404-ip-10-171-10-108.ec2.internal.warc.gz
en
0.871853
1,958
3.5625
4
Concept of FTTx A simple understanding of FTTx is Fiber to the x, x here can be replaced such as H for home, B for building, C for curb or even W for wireless etc. It is a new technology used in today’s network. As we know, compared to copper or digital radio, fiber’s high bandwidth and low attenuation easily offset it...
<urn:uuid:30d99476-060a-4d88-9d28-111bf78faa8c>
CC-MAIN-2017-09
http://www.fs.com/blog/a-comprehensive-understanding-of-fttx-network.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00100-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931505
1,559
3.234375
3
From Earth to the moon - By Patrick Marshall - Sep 19, 2007 It may not be as romantic as a full moon on a clear summer night as a breeze blows gently through your lover's hair as you stroll down the beach, but it's still sort of cool.Google Moon , that is. Google is working on doing for the moon what it has already don...
<urn:uuid:2a12b854-1d82-4da4-a0f2-61a012142dab>
CC-MAIN-2017-09
https://gcn.com/articles/2007/09/19/from-earth-to-the-moon.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00100-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949405
410
3.046875
3
As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in volume and severity. To know where we are going it is helpful to look at where we have been. Finding trends in Internet security has become a val...
<urn:uuid:2607245c-16e3-4c86-906f-f78d8c872f67>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2008/12/24/security-trends-of-2008-and-predictions-for-2009/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00273-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949605
1,144
2.671875
3
The US Department of Energy today said it was conditionally committing $2 billion to develop two concentrating solar power projects that it says will offer 500 megawatts of power combined, effectively doubling the nation's currently installed capacity of that type of power. Concentrated solar systems typically use para...
<urn:uuid:378c1d13-75ea-4e56-a302-f4f32a595f39>
CC-MAIN-2017-09
http://www.networkworld.com/article/2229487/infrastructure-management/energy-dept--spends--2b-to-double-us-concentrated-solar-power-capacity.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00625-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916591
467
3.078125
3
-Encourages healthier lifestyle by showing consequences of an unhealthy one - NEW YORK; May 16, 2006 – Accenture (NYSE: ACN) today unveiled an experimental “mirror” that shows unhealthy eaters what they could look like in the future if they fail to improve their diets. The device – known as the Persuasive Mirror - stem...
<urn:uuid:89a0e957-f281-475f-a1ef-a1734daa796e>
CC-MAIN-2017-09
https://newsroom.accenture.com/news/high-tech-mirror-from-accenture-offers-look-into-future.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00149-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9418
1,318
2.609375
3
Disk capacity will rise. As storage capacity demands continue to increase, new serial technologies will gradually replace current parallel SCSI and ATA storage media during the next two years. Beyond these serial advances, hard-disk- drive vendors are working to develop even-more-advanced technologies to improve the ph...
<urn:uuid:b512858f-4b9b-46c3-993b-6d1cf36efea2>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Data-Storage/HDDs-Future-is-Perpendicular
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00025-ip-10-171-10-108.ec2.internal.warc.gz
en
0.90263
753
2.921875
3
Big Data is the buzzword on everyone's lips these days - promising to change the world through deep insights into vast and complex sets of data. But amidst the optimism at the recent IEEE Computer Society's Rock Stars of Big Data symposium at the Computer History Museum in Mountain View, Calif., there were also stark a...
<urn:uuid:591c7734-82d1-48b2-bedd-476781138e3c>
CC-MAIN-2017-09
http://www.networkworld.com/article/2225820/data-center/with-big-data-comes-big-responsibility.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00021-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959128
759
2.765625
3
List of Environmental Management Standards and Frameworks The ISO 14000 Family of Standards The ISO 14000 family of standards has two main documents, with one additional supplementary document attached to the family. ISO 14001 and ISO 14004 comprise the family of ISO 14000 documents with ISO 19011, guidelines for audit...
<urn:uuid:75c3d76c-1fb2-417b-9cce-a6fca7cdd82a>
CC-MAIN-2017-09
https://advisera.com/14001academy/knowledgebase/list-of-environmental-management-standards-and-frameworks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00197-ip-10-171-10-108.ec2.internal.warc.gz
en
0.903719
685
2.734375
3
Multihoming ISP Links Multihoming ISP links Today, problems associated with ISP link availability continue to cause organizations to lose millions of dollars each year. However, deploying a solution that is cost effective and operationally efficient can also be a challenge. The following are four alternatives on how to...
<urn:uuid:583280fa-7f85-42be-9695-bf43884dd4a3>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Enterprise-Networking/How-to-Overcome-Multihomed-ISP-Link-Challenges/1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00317-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936655
790
2.6875
3
Returns the geomagnetic field for a location at the specified date. int wmm_get_geomagnetic_field(const wmm_location_t *loc, const struct tm *date, wmm_geomagnetic_field_t *field) The geographic location to be used in the calculation of the magnetic field. The date to be used in the calculation of the magnetic field. T...
<urn:uuid:e4022450-ebfd-46df-8503-57d492b08073>
CC-MAIN-2017-09
http://developer.blackberry.com/native/reference/core/com.qnx.doc.wmm.lib_ref/topic/wmm_get_geomagnetic_field.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00369-ip-10-171-10-108.ec2.internal.warc.gz
en
0.731924
199
2.6875
3
- Protect the password in transit from the threat of sniffers or intermediation attacks — Use HTTPS during the entire authentication process. HSTS is better. HSTS plus DNSSEC is best. - Protect the password in storage to impede the threat of brute force guessing — Never store the plaintext version of the password. Stor...
<urn:uuid:06f7ae8e-396d-44d4-956a-98f65fe9c4fa>
CC-MAIN-2017-09
https://deadliestwebattacks.com/2012/08/27/password-interlude-in-d-minor/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00369-ip-10-171-10-108.ec2.internal.warc.gz
en
0.897024
522
2.71875
3
Projects are often complex, made up of a large number of moving pieces and bring numerous challenges to those involved. The reality is projects don’t always go the way we want them to. We often find ourselves being asked to do more with less and at a faster pace than we’re comfortable with. On occasion, we are successf...
<urn:uuid:8ae0fa7f-534f-4bc4-a9e2-7a9539147bb9>
CC-MAIN-2017-09
http://blog.globalknowledge.com/2017/01/17/3-essentials-to-avoid-it-project-failure/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00489-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936818
719
2.609375
3
After a successful Sunday launch, a cargo spacecraft is on its way to the International Space Station, carrying a Google 3D smartphone, along with a flock of tiny satellites. Orbital Sciences Corp.'s Cygnus spacecraft, filled with more than 3,000 pounds of food, supplies, hardware and scientific experiments, lifted off...
<urn:uuid:ebdc3250-b9bf-4ae5-8d76-8ed591b72e45>
CC-MAIN-2017-09
http://www.cio.com/article/2453646/computers-all/googles-3d-mapping-tech-flying-to-space-station.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00189-ip-10-171-10-108.ec2.internal.warc.gz
en
0.911193
670
3.140625
3
Autodesk Volunteers Help Preserve Historic Kosrae Using Reality Capture Software & BIM Kosrae, an island in the South Pacific located between Guam and the Hawaiian Islands, was settled as early as 1250. But much of the island’s rich history is unknown by the people who live there, as well as the handful of scuba divers...
<urn:uuid:f4441430-17f3-455e-b58d-b1b15be2e8ed>
CC-MAIN-2017-09
http://blogs.dlt.com/autodesk-employees-volunteer-knowledgewell-preserve-historic-kosrae-reality-capture-software-bim/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00541-ip-10-171-10-108.ec2.internal.warc.gz
en
0.942144
1,618
2.75
3
110 blocks are one type of punch blocks used to connect sets of wires in a structured cabling system. The “110” designation is also used to describe a type of insulation-displacement connector used to terminate twisted pair cables which uses a similar punch-down tool as the older 66 block. People are preffered to 110 b...
<urn:uuid:9ea97305-3075-497e-b777-996634ba0de5>
CC-MAIN-2017-09
http://www.fs.com/blog/modern-110-connecting-blocks-for-data-networking.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00417-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93617
713
2.796875
3
TORONTO, ON and BOSTON, MA--(Marketwired - November 01, 2016) - - Canadian Government-funded "Saving Brains" study: 25 percent of developing world's child stunting is associated with poor growth in womb, such as pre-term birth and low birth weight - Authors prescribe "paradigm shift" from interventions focused solely o...
<urn:uuid:dd91207a-019f-40ef-b60a-f96e3fa47851>
CC-MAIN-2017-09
http://www.marketwired.com/press-release/1-risk-for-child-stunting-in-developing-world-poor-growth-before-birth-2171693.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00417-ip-10-171-10-108.ec2.internal.warc.gz
en
0.921732
2,458
2.875
3
In other words, success or failure at spreading a message through social media looks kind of random. When a social media campaign goes viral, "you don't have to assume it's because some people are influential--you can still get some random thing that gets 50 million views on YouTube," said Filippo Menczer, director of ...
<urn:uuid:24c4ded3-e524-4e87-9d52-df27ee424cc4>
CC-MAIN-2017-09
http://www.networkcomputing.com/networking/science-probes-why-tweets-go-viral/1156935268?cid=sbx_bigdata_related_news_industry_analysis_big_data&itc=sbx_bigdata_related_news_industry_analysis_big_data
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00361-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954089
896
2.703125
3
Super Fast and Super GreenBy Mel Duvall | Posted 2007-11-28 Email Print New ranking of supercomputers compares their performance against their energy consumption Can the world's most powerful computers also be green? That was the underlying question behind a new ranking of the world's supercomputers which compares the ...
<urn:uuid:fb1c34e2-3ac6-4776-a015-d681fa66177c>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/Projects-Management/Super-Fast-and-Super-Green
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00237-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955255
658
2.609375
3
According to a new study 90% of Americans do not feel safe online. The report released by McAfee and the National Cyber Security Alliance (NCSA) revealed that 59% of Americans say that their job is dependent on a safe and secure internet. However, 90% do not feel completely safe from hackers, viruses and malware while ...
<urn:uuid:e596d41e-a94c-4b6b-9ee0-e54cbc892edd>
CC-MAIN-2017-09
http://www.cbronline.com/news/one-in-four-americans-suffered-security-breaches-last-year-021012
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00237-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960239
356
2.8125
3
If smartwatch development can be thought of in terms of dance crazes, the next phase might become the Twist. Researchers at Carnegie Mellon University have developed a prototype smartwatch that expands user interface possibilities with a tactile face that can be rotated. Chris Harrison/Carnegie Mellon University This p...
<urn:uuid:eeb9df61-02b8-445a-99e6-b5ffca34e7fa>
CC-MAIN-2017-09
http://www.networkworld.com/article/2176497/smb/researchers-try-new---39-twist--39--on-smartwatches.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926609
521
2.5625
3
When LIDAR came down to Earth, mapping projects took off Second of four parts Sometimes it takes a crisis to spur innovation. Such was the case with creation of the Red River Basin Decision Information Network (RRBDIN), and its LIDAR mapping of large swaths of North Dakota, Minnesota and central Canada, said Charles Fr...
<urn:uuid:920f3d64-84af-4d1e-b214-5d13ae8decbf>
CC-MAIN-2017-09
https://gcn.com/articles/2013/03/13/when-lidar-costs-decreased-mapping-projects-took-off.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967934
1,465
3.140625
3
If you use an Apple iPhone, iPad or other iDevice, now would be an excellent time to ensure that the machine is running the latest version of Apple’s mobile operating system — version 9.3.1. Failing to do so could expose your devices to automated threats capable of rendering them unresponsive and perhaps forever useles...
<urn:uuid:c89111ae-d5ad-4bab-80c3-e07c0c31b4c7>
CC-MAIN-2017-09
https://krebsonsecurity.com/tag/apple-1970-bug/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00057-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940402
881
2.546875
3
New research claims the ‘undetected’ malware can wreak havoc. Malware called Gyges, developed by the Russian intelligence service, has been leaked to cyber-criminals and has also been incorporated into ransomware and online banking Trojan toolkits, threat analysis company Sentinel Labs has claimed. Gyges mainly targets...
<urn:uuid:a23a0fe4-9f17-473c-88e2-2896cb117e41>
CC-MAIN-2017-09
http://www.cbronline.com/news/cybersecurity/data/russian-state-authored-espionage-malware-up-for-sale-210714-4322631
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00233-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950615
417
2.609375
3
Picking the Connectome Data Lock Back in 2005, researchers at Indiana University and Lausanne University simultaneously (yet independently) spawned a concept and pet term that would become the hot topic in neuroscience for the next several years—connectomics. The concept itself isn’t necessarily new, even thought the u...
<urn:uuid:6fed3039-3ca1-40b5-801c-41a32f7770ae>
CC-MAIN-2017-09
https://www.datanami.com/2012/05/01/picking_the_connectome_data_lock/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00409-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943241
1,640
2.53125
3
Rootkit.Duqu.A is the current star in the world of malware but, as history shows, that fame will be short-lived. Just like fashion models, modern malware has a lifespan in the media eye of a couple of weeks to a couple of months, tops. They then fade into the shadow of more dangerous and sophisticated tools, according ...
<urn:uuid:2c0825a4-6fc5-4b26-b539-48f626c09136>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2011/10/24/duqu-another-most-advanced-piece-of-malware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00109-ip-10-171-10-108.ec2.internal.warc.gz
en
0.962544
738
2.515625
3
This resource is no longer available Bring Your Own Device: Preparing for the influx of mobile computing devices in schools With over 90 percent of high school students using technology to study or work on homework assignments, students are some of the most enthusiastic and savvy users of mobile computing devices. How ...
<urn:uuid:10713237-0d2a-4004-83ba-3174e710a7ae>
CC-MAIN-2017-09
http://www.bitpipe.com/detail/RES/1347290709_74.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00581-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931396
122
2.921875
3
Satellite has been thought of as the choice of last resort for connecting cell sites to the core network. The high recurring cost of satellite bandwidth along with the ever-growing demand for more and more bandwidth has kept network planners away from considering satellite backhaul as a viable option. Mobile Network Op...
<urn:uuid:81955de2-3b1f-4add-8bb9-ce29b9aa4f2d>
CC-MAIN-2017-09
http://www.hughes.com/company/newsroom/stories/cellular-backhaul-the-killer-app-for-high-throughput-satellites?locale=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00633-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923226
840
2.78125
3
A paradigm shift is occurring within the agricultural sciences, owing to the genomics-based data explosion and concurrent computational advances. In India, leaders are intent on furthering the burgeoning genomic supercomputing discipline through the establishment of a supercomputing center and a nationwide grid to supp...
<urn:uuid:428da615-8d19-4a9f-b4d6-df0c9951e3ad>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/12/17/supercomputing-bolsters-agricultural-science-india/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00157-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91548
943
2.8125
3
Written by GEOFF MULLIGAN, CHAIRMAN AND CEO, IPSO ALLIANCE Reposted from Future of Business & Tech Glance at the wrist of the modern day commuter and you will find fitness trackers and smartwatches monitoring activities and uploading data to the Cloud. A look into the home of a cardiac patient might show tabletop monit...
<urn:uuid:e948b6dd-2fca-4741-8feb-820b354f6b37>
CC-MAIN-2017-09
https://www.amsl.com/blog/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00329-ip-10-171-10-108.ec2.internal.warc.gz
en
0.907352
632
2.515625
3
Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems – the only thing that it needs to compromise targeted computers is for them to run a flawed version of Java. The Trojan is written wholly in Java, and exploits an unspecified v...
<urn:uuid:085d7359-778b-45c1-b9a8-5681f566c438>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2014/01/29/java-based-malware-hits-windows-mac-and-linux/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00626-ip-10-171-10-108.ec2.internal.warc.gz
en
0.911693
254
2.8125
3
Is ParalleX This Year’s Model? By: John Moore Scientific application developers have masses of computing power at their disposal with today’s crop of high-end machines and clusters. The trick, however, is harnessing that power effectively. Earlier this year, Louisiana State University’s Center for Computation & Technol...
<urn:uuid:6a95058b-8f5c-450b-823b-e2756e0aa373>
CC-MAIN-2017-09
http://www.intelligenceinsoftware.com/feature/expert_insight/is_parallex_this_years_model/index.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00150-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943196
2,127
2.8125
3
What is the Remote Code Evaluation Vulnerability? Remote Code Evaluation is a vulnerability that can be exploited if user input is injected into a File or a String and executed (evaluated) by the programming language's parser. Usually this behavior is not intended by the developer of the web application. A Remote Code ...
<urn:uuid:18ce4abf-eeea-4971-9cba-2c2edecbf314>
CC-MAIN-2017-09
https://www.netsparker.com/blog/web-security/remote-code-evaluation-execution/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00502-ip-10-171-10-108.ec2.internal.warc.gz
en
0.909845
916
2.890625
3
Today’s guest post is brought to you by Andy Wolber. You can find more of Andy’s work in TechRepublic where he writes for the Google in the Enterprise newsletter. We know it’s summer and teachers would prefer to think about the beach as opposed to the best ways to leverage Google Docs. But there’s a good chance that if...
<urn:uuid:28994188-1c1e-4bc4-be15-4b7105a5b3f3>
CC-MAIN-2017-09
https://www.backupify.com/blog/learn-latest-classroom-writing-tips-google-docs
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00446-ip-10-171-10-108.ec2.internal.warc.gz
en
0.896597
1,020
2.625
3
This election season, people started to talk about political cookies – a new expression for the term previously used for targeted or customized ads. These are advertisements that are automatically pushed out based an Internet user's search habits. Computer cookies are files stored on the user’s computer that save the b...
<urn:uuid:c36a9a41-dd64-434b-b867-0c79efbd0956>
CC-MAIN-2017-09
http://www.nextgov.com/technology-news/tech-insider/2012/09/there-public-appetite-political-cookies/57892/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00622-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952
560
2.78125
3
IPv6: An answer to network vulnerabilities? - By Julian Weinberger - Aug 19, 2014 On Aug. 15, 2012, in one of the most devastating cyberattacks ever recorded, politically motivated hackers wiped the memory of more than 30,000 computers operated by the Saudi Aramco oil company in an attempt to stop the flow of oil and g...
<urn:uuid:d6e7eb21-0109-429d-a96b-9b3f20f7e8d9>
CC-MAIN-2017-09
https://fcw.com/articles/2014/08/19/ipv6-answer-to-network-vulnerabilities.aspx?admgarea=TC_Opinion
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00198-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949684
1,104
2.71875
3
FCC tests if 911 cell-phone calls can be traced indoors - By William Jackson - Nov 30, 2012 As telephones have become untethered and phone numbers are no longer tied to an address, the ability of first responders to pinpoint the location of cellular phone calls to 911 has become increasingly important. The Federal Comm...
<urn:uuid:e88d9d56-5dfc-4ed1-9f04-37285cfb49b2>
CC-MAIN-2017-09
https://gcn.com/articles/2012/11/30/fcc-911-cell-phone-calls-traced-indoors.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00374-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951344
660
2.59375
3
Milbrath M.O.,Michigan State University | van Tran T.,Michigan State University | van Tran T.,Bee Research and Development Center | Huang W.-F.,University of Illinois at Urbana - Champaign | And 4 more authors. Journal of Invertebrate Pathology | Year: 2015 Honey bees (Apis mellifera) are infected by two species of mic...
<urn:uuid:8cfc8c5a-def9-4068-a191-d475c8175240>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/bee-research-and-development-center-641396/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00550-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916543
1,313
2.6875
3
Memory is not to be trusted. It is unpredictable, frustratingly fleeting, and only gets worse with age. It will forever cling tightly to useless facts and yet misplace the freshest, most essential ones. I can remember my childhood phone number, the tune and lyrics to Let It Be, and most of the Gettysburg Address, and y...
<urn:uuid:1f3ae470-ca26-427a-85ce-78de9a5f1eb3>
CC-MAIN-2017-09
http://www.lovemytool.com/blog/2016/03/for-the-memories-by-paul-w-smith.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00494-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954687
876
2.734375
3
Attackers are compromising Linux and Windows systems to install a new malware program designed for launching distributed denial-of-service (DDoS) attacks, according to researchers from the Polish Computer Emergency Response Team (CERT Polska). The malware was found by the Polish CERT at the beginning of December and th...
<urn:uuid:e06b3ef6-2df9-4edb-89b5-a9d44c55ff66>
CC-MAIN-2017-09
http://www.computerworld.com/article/2486982/malware-vulnerabilities/new-ddos-malware-targets-linux-and-windows-systems.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00070-ip-10-171-10-108.ec2.internal.warc.gz
en
0.957152
918
2.734375
3
Construction has a reputation of lagging even further behind on technological innovation than healthcare. A boom in the meeting of the two though, has brought about advancements new to both industries — most notably, Building Information Modeling (BIM). 3D modeling isn’t a new technology, but historically it has been d...
<urn:uuid:9bf537ed-635f-48b8-83a5-ace39795961f>
CC-MAIN-2017-09
https://www.bsminfo.com/doc/healthcare-construction-and-tech-why-vars-should-care-0001
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00242-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949745
632
2.703125
3
Clip and save: Tips for a secure WLAN Deploying a secure wireless LAN involves more than securing the wireless link between the client and the access point. Ultimately, it involves the entire network infrastructure. The National Institute of Standards and Technology warned in SP 800-48, Wireless Network Security, 'main...
<urn:uuid:b0393211-bc94-438f-a483-eb2c2a2ce285>
CC-MAIN-2017-09
https://gcn.com/articles/2005/07/27/clip-and-save-tips-for-a-secure-wlan.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00418-ip-10-171-10-108.ec2.internal.warc.gz
en
0.912965
693
2.5625
3
A malicious botnet called ‘Nitol’ was interrupted by Microsoft on Sept. 13. ‘Nitol’ was using a Dynamic DNS to enable the infected bot computers to communicate with the hacker’s command and control server. For background, it is possible to serve a website from a home computer, but the difficulty is that your home Inter...
<urn:uuid:7f013007-58ac-4abe-b61a-eb662324b962>
CC-MAIN-2017-09
https://www.entrust.com/nitol-malware-leveraging-dynamic-dns-for-nefarious-gains/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00418-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965794
432
3.046875
3
Smart buildings, smart grids, smart infrastructure - these terms are bandied about more often than ever. In this image, technology is incorporated into an ordinary pivot irrigation system, making it a smart agricultural device. Notice some sprinkler heads are off while others are active. This is due to broadband wirele...
<urn:uuid:43ea1d5b-4764-40a7-8e0f-54afbd3c78a8>
CC-MAIN-2017-09
http://www.govtech.com/featured/Green-Initiatives-Broadband-Wireless-Monitor-Saves.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00362-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933795
101
2.828125
3
Dell plans to recycle however many of the 4.1 million recalled batteries that customers turn in (see Dell battery recall not likely to have big environmental impact), but what happens to the other 2 billion lithium ion batteries which will be sold this year? Most will last for 300 to 500 full recharges (one to three ye...
<urn:uuid:0a7bb729-6690-446d-8890-971dd47176db>
CC-MAIN-2017-09
http://www.computerworld.com/article/2482910/technology-law-regulation/lithium-ion-batteries--high-tech-s-latest-mountain-of-waste.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00534-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934338
713
3.296875
3
A penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. A Penetration Testing Linux is a special built Linux distro that can be used for analyzing and evaluating security measures of...
<urn:uuid:39a111cc-9264-4dc6-b2ea-3e52e6be3c80>
CC-MAIN-2017-09
https://www.blackmoreops.com/2014/02/03/notable-penetration-test-linux-distributions-of-2014/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00234-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937725
6,116
3.125
3
As technology is wont to do, drones have grown beyond purely military application and entered the civilian sector The World Health Organization (WHO) has teamed up with Matternet, a California tech company, to explore the use of drones in the delivery of medical supplies to remote regions of Bhutan, according to Health...
<urn:uuid:d48bddbb-d118-4a98-9c47-adc6d0da07d3>
CC-MAIN-2017-09
https://www.bsminfo.com/doc/drones-are-moving-into-the-healthcare-arena-0001
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00110-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936496
520
2.6875
3
High-tech companies use the Internet to provide customers with a clean, insulated environment where they can make purchases, do research and chat with friends and strangers. But behind every antiseptic Web page lies its real-world technological counterpart; and all too often the servers that run Web sites and online se...
<urn:uuid:71295855-64a9-41bd-9bec-26fb3c4109f4>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Down-on-the-Server-Farm.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00406-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958208
1,038
2.921875
3
LIVERMORE, Calif., Dec. 22 — Sandia National Laboratories has formed an industry-funded Spray Combustion Consortium to better understand fuel injection by developing modeling tools. Control of fuel sprays is key to the development of clean, affordable fuel-efficient engines. Intended for industry, software vendors and ...
<urn:uuid:4576151c-1528-4217-b5da-72bf6dbb6283>
CC-MAIN-2017-09
https://www.hpcwire.com/off-the-wire/sandia-national-laboratories-forms-new-consortium/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00406-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910325
806
2.625
3
Streamline Datacenters for Scalable Computing Traditional datacenters – server sprawl leads to gross inefficiencies, high costs Historically, datacenter servers have been built with fixed designs tailored to specific applications and requiring long lead times. These purpose-built systems require complete replacement wh...
<urn:uuid:a0dfd236-4c95-4038-8a24-24086cab39c2>
CC-MAIN-2017-09
https://jp.broadcom.com/applications/datacenter-networking/hyperscale-streamline-datacenters
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00582-ip-10-171-10-108.ec2.internal.warc.gz
en
0.903491
993
2.546875
3
While Oracle and MySQL remain top picks for database systems, there are many others available, from big guns like Microsoft SQL Server to the increasingly popular MongoDB. Each has its own strengths and weaknesses, so your latest IT project may find you scratching your head as you try to decide on database software. If...
<urn:uuid:851a7156-18cd-495c-914f-ccdfbc9e3047>
CC-MAIN-2017-09
https://www.greenhousedata.com/blog/which-database-management-platform-is-right-for-you
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00634-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931519
928
2.828125
3
Who can forget one of the most iconic lines from the original Star Trek television show: "Warp drive, Mr. Scott. Make it so." Kidding! Just doing a little mash-up there. Before any Trekkie heads explode, here's the real line, delivered by a young William Shatner. All of which is a clumsy, Friday-ish way to lead into th...
<urn:uuid:44b3f4ea-0ab6-4579-be61-3ee3bc37487f>
CC-MAIN-2017-09
http://www.itworld.com/article/2708369/enterprise-software/no-hurry-for-warp-speed.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00102-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944507
440
2.5625
3
Using off-the-shelf gaming technology that tracks brain activity, a team of scientists has shown that it's possible to steal passwords and other personal information. Researchers from the University of Oxford, University of Geneva and the University of California at Berkeley demonstrated the possibility of brain hackin...
<urn:uuid:e5b903cc-b0b2-4a65-90e8-6021e6ec736e>
CC-MAIN-2017-09
http://www.csoonline.com/article/2132246/mobile-security/brain-could-be-target-for-hackers--researchers-show.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00278-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959721
796
3.171875
3
Secure programming is the last line of defense against attacks targeted toward our systems. This course shows you how to identify security flaws & implement security countermeasures when writing code for Android and iOS mobile devices. Using sound programming techniques and best practices shown in this course, you can ...
<urn:uuid:63ae805e-f347-4bd4-8829-fca073e60bb6>
CC-MAIN-2017-09
https://appsec-labs.com/portfolio-item/mobile_awareness_1d/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00451-ip-10-171-10-108.ec2.internal.warc.gz
en
0.766664
354
3.28125
3
Wednesday January 11, 2017 Twin Killers in Manufacturing As every production manager is aware, it’s not easy to achieve a smooth and continuous flow of products in concert with market demand. Although managers are aware of this, what is generally unknown or recognized is the major obstacles to running an effective oper...
<urn:uuid:cad64701-7cb9-4a85-9c36-05555c0ac7cd>
CC-MAIN-2017-09
http://manufacturing.ecisolutions.com/blog/posts/2017/january/dependencies-and-variability.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00627-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951074
937
2.828125
3
Riot Games is putting artificial intelligence to work to improve the sportsmanship of millions of gamers In this article... - League of Legends creator Riot Games has been experimenting with AI and predictive analytics to find and stop online trolls and increase sportsmanship - Since implementing their AI-assisted prog...
<urn:uuid:bc423565-fa64-453a-93ef-64f4943669f4>
CC-MAIN-2017-09
https://www.hpematter.com/childhood-issue/League-of-Legends-New-Model-Civility-in-Online-Communities
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00027-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964347
1,117
2.765625
3
As everything around us becomes connected to the Internet, from cars to thermometers to the stuff inside our mobile phones, technologists are confronting a tough new challenge: How does a machine verify the identity of a human being? In Redwood City, Calif., a start-up called OneID is offering a single sign-on for a va...
<urn:uuid:bc4a1421-bf14-435e-b1b6-6cd62d251484>
CC-MAIN-2017-09
http://www.northbridge.com/beyond-passwords-new-tools-identify-humans
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00447-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943408
325
3.03125
3
A striking number of U.S. travelers, while aware of the risks, are not taking the necessary steps to protect themselves on public Wi-Fi and are exposing their data and personal information to cyber criminals and hackers, according to research released today by AnchorFree, the global leader in consumer security, privacy...
<urn:uuid:442d2128-4f5d-4a15-a25d-ab61a2faeaa2>
CC-MAIN-2017-09
http://hospitalitytechnology.edgl.com/news/Four-in-Five-Travelers-Fear-Mobile-Use-of-Unsecured-Public-Wi-Fi-89521
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00023-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94421
573
2.65625
3
Del Valle ISD is a public school district in Texas that serves over 11,000 students on 15 campuses in Southeast Travis County near Austin. The school district is committed to providing innovative educational programs that cultivate critical thinking skills among its students, including mock trial leagues and debate tea...
<urn:uuid:f94e97be-618a-4da6-b09c-fa430cf68c4e>
CC-MAIN-2017-09
http://www.lifesize.com/video-conferencing-blog/innovative-educational-approach/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00199-ip-10-171-10-108.ec2.internal.warc.gz
en
0.977804
813
2.84375
3
LOB and XML complex data types have extended the capabilities of DB2 for z/OS in order to support the needs of today's applications. The infrastructure for storing LOB and XML data is similar in nature because both data types use the concept of an auxiliary set of objects. LOB data type Support for large objects (LOBs)...
<urn:uuid:999a450c-f155-4e5e-b9b9-71edd9b23b28>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/data/library/techarticle/dm-1007db2lobsxml/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00019-ip-10-171-10-108.ec2.internal.warc.gz
en
0.907756
1,161
3
3
Adaptive Learning Systems What are the adaptive learning systems? Adaptive Learning System is a tool for transforming the learning system from a passive reception of information by the receiver to an interactive process by collaborating in the education process. Adaptive Learning System is used in education as well as ...
<urn:uuid:b42098bc-e9b7-4738-b592-f3766a05465d>
CC-MAIN-2017-09
https://www.hcltech.com/technology-qa/what-is-adaptive-learning-system
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00547-ip-10-171-10-108.ec2.internal.warc.gz
en
0.956239
77
3.015625
3
I like to think of the transport layer as the layer of the OSI Model that enables more interesting traffic. While we network engineers may love a lot of the simpler uses of the IP protocol and networks in general, we'd all be jobless without the transport layer. Layer 4 provides for the transparent transfer of data for...
<urn:uuid:85fdee4c-41b0-492b-93c7-4f9b57ce8966>
CC-MAIN-2017-09
http://www.computerworld.com/article/2470343/network-hardware-solutions/the-transport-layer---understanding-layer-4-of-the-osi-model.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933581
701
3.15625
3
Weather prediction in the 50s. Missile intercepts of UFOs in the 60s. Electronic messages in the 70s. We learned about it all through the commercials. As far back 1956, Remington Rand told us how Univac could collect historical weather data, analyze that "big data" and use it to make predictions -- "all in a matter of ...
<urn:uuid:612b828d-b9e5-435c-9dd7-177e856082a0>
CC-MAIN-2017-09
http://www.computerworld.com/article/2475285/business-intelligence/computing-in-the-commercial-age.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00015-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943454
345
3.171875
3
Why cloud data storage is secure — and why it might not be This feature first appeared in the Fall 2014 issue of Certification Magazine. Click here to get your own print or digital copy. Nude photos of well-known actresses certainly garner attention on their own, but this summer they drew attention to an unlikely subje...
<urn:uuid:1442dbec-31a9-4367-b8aa-7542c890d59f>
CC-MAIN-2017-09
http://certmag.com/cloud-data-storage-secure-might/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00367-ip-10-171-10-108.ec2.internal.warc.gz
en
0.923741
1,844
2.578125
3