text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Do You Hear What I Hear?�Part IX: Queuing Solutions for QoS
Data packets will have to line up for processing at various points as they move from source to destination. Schema for assigning priority to different classes of traffic help manage data flows.
Concluding our series on VoIP Quality of Service (QoS), our previo... | <urn:uuid:9940830e-3e9c-472b-b64c-f6bb5a5d4532> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/unified_communications/Do-You-Hear-What-I-Hear151Part-IX-Queuing-Solutions-for-QoS-3529361.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00019-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934111 | 968 | 2.78125 | 3 |
As a technology company, Gradwell is fascinated by the digital world and how telecommunications have progressed since the development and adoption of computers. Experts argue that the very first digital communication goes as far back as the telegraph system at least a century before the internet we all know and love. I... | <urn:uuid:5c14538b-b79e-4652-86c8-8f12b1efa5c4> | CC-MAIN-2017-09 | https://www.gradwell.com/2015/02/12/its-all-about-the-numbers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00019-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956089 | 1,171 | 2.953125 | 3 |
New Zealand's parliament is preparing to vote on a major patent reform bill that will tighten the country's standards of patentability. One of the most significant changes in the proposed bill is a specific patentability exclusion for software. If the bill receives parliamentary approval in its current form, it will br... | <urn:uuid:f1cc8440-5aef-427e-a0a4-028641da1a8a> | CC-MAIN-2017-09 | https://arstechnica.com/information-technology/2010/04/new-zealand-patent-reform-bill-says-no-to-software-patents/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941298 | 269 | 2.546875 | 3 |
In a recent speech in London, IBM Chairman, President and CEO Sam Palmisano laid out IBM's vision of the next decade as the decade of the smarter systems. Among the many areas IBM is focusing on to enable a smarter planet is smart water management.
In a recent speech in London, IBM
Chairman, President and CEO Sam Palmi... | <urn:uuid:cfda9b3c-cae1-4fe2-9a95-c49913defde2> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/IT-Infrastructure/IBM-Puts-Smart-Water-Systems-on-Tap-890648 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00191-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928461 | 728 | 2.78125 | 3 |
Google Takes Unconventional Route with Homegrown Machine Learning Chips
May 19, 2016 Stacey Higginbotham
At the tail end of Google’s keynote speech at its developer conference Wednesday, Sundar Pichai, Google’s CEO mentioned that Google had built its own chip for machine learning jobs that it calls a Tensor Processing ... | <urn:uuid:feb54ec3-7ed1-4cf5-b152-80ad0a216b46> | CC-MAIN-2017-09 | https://www.nextplatform.com/2016/05/19/google-takes-unconventional-route-homegrown-machine-learning-chips/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00543-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951081 | 1,602 | 2.59375 | 3 |
Q&A: An Introduction to the Scala Programming Language
We explore what the Scala programming language can do for your organization with the language’s inventor.
What is the Scala programming language, how does it work with Java, and what is its role in high-performance computing? We learn from the language’s inventor, ... | <urn:uuid:877e5847-a206-4532-9b11-0139a298c8ab> | CC-MAIN-2017-09 | https://esj.com/articles/2012/01/23/introduction-to-scala.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00187-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940422 | 1,137 | 3.125 | 3 |
As we all know, the optical fiber cable system in the transmission of the optical signal, can not do without optical transceivers and fiber. There are two major types of optical transceivers categories: light-emitting diode (LED) and Laser light emitting device. Although in performance, the laser light is far supperior... | <urn:uuid:99ea71ee-c877-48d6-991b-fb9c426305b9> | CC-MAIN-2017-09 | http://www.fs.com/blog/10-gigabit-multimode-and-dmd-testing-technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91413 | 1,173 | 3.046875 | 3 |
From FiberStore,we will answer to you what is the Low Smoke Zero Halogen Cable. Low Smoke Zero Halogen(LSZH) cable is free of halogen (F, Cl, Br, I, At), lead-free environmental substances such as cadmium, chromium and mercury in the plastic material made ??of combustion does not emit toxic smoke (such as: hydrogen hal... | <urn:uuid:813b0bf4-6ae4-4666-ba35-0ff39fd252c9> | CC-MAIN-2017-09 | http://www.fs.com/blog/what-is-the-low-smoke-zero-halogen-cable.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00539-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.924738 | 618 | 2.65625 | 3 |
Throwing the first pitch at a big-league baseball game is something most of us can only dream about. But thanks to technology, one 13-year-old boy named Nick LeGrande will throw out the first pitch for a Major League Baseball game from 1800 miles away. It will be the first time that someone has remotely thrown a pitch ... | <urn:uuid:bcef8ca8-1884-4ece-8a06-0315b74c520a> | CC-MAIN-2017-09 | http://www.cio.com/article/2384177/consumer-technology/kid-to-throw-out-the-first-pitch-at-a-baseball-game-through-a-telepresence-robot.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00063-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.973376 | 194 | 2.6875 | 3 |
Financial and operational modeling can be used to visualize a variety of business scenarios, based on different business drivers. This allows companies to gain deeper insights into the ways each decision will affect their businesses.
Performing these “what-if” scenarios is imperative to better understanding the impact ... | <urn:uuid:24a9ae6c-cdf6-4030-b60b-6c6cddb976b0> | CC-MAIN-2017-09 | http://blog.hostanalytics.com/using-what-if-scenarios-in-financial-and-operational-modeling | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00415-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922797 | 805 | 2.8125 | 3 |
6 Ways the IoT Could Impact Data Centers
The Internet of Things (IoT) is a term that refers to the interconnection between physical objects that is also known as a physical or IP address. This Gartner Report states that, by 2020, the IoT is expected to build to 26 billion units. This means that all data centers must be... | <urn:uuid:9dff71e9-7d08-4bdb-b413-2df2b7b7485b> | CC-MAIN-2017-09 | http://www.lifelinedatacenters.com/data-center/6-ways-the-iot-could-impact-data-centers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00415-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943781 | 487 | 2.734375 | 3 |
This post was originally published on the CA Security Council blog.
The current browser-certification authority (CA) trust model allows a website owner to obtain its SSL certificate from any one of a number of CAs. That flexibility also means that a certificate mis-issued by a CA other than the authorized CA chosen by ... | <urn:uuid:c8b3f316-a99b-4a3d-b622-f60623e4a36e> | CC-MAIN-2017-09 | https://www.entrust.com/public-key-pinning-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00415-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939958 | 755 | 2.609375 | 3 |
Attar A.,Association des Gastro enterologues Oncologues Group |
Malka D.,Institute Gustave Roussy |
Sabate J.M.,Association des Gastro enterologues Oncologues Group |
Bonnetain F.,Association des Gastro enterologues Oncologues Group |
And 6 more authors.
Nutrition and Cancer | Year: 2012
Although malnutrition is known ... | <urn:uuid:49829042-5cfc-4107-9ff6-9c492272980e> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/association-des-gastro-enterologues-oncologues-group-2055872/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00183-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939399 | 383 | 2.515625 | 3 |
The major difference between SDN and traditional networking lies in the concept of controller-based networking. In a software-defined network, a centralized controller has a complete end-to-end view of the entire network, and knowledge of all network paths and device capabilities resides in a single application. As a r... | <urn:uuid:bd3559a5-cc67-417d-8863-7a89ea0a7217> | CC-MAIN-2017-09 | http://www.cio.com/article/2369448/networking/111753-Software-defined-networking-explained.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00407-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933119 | 145 | 2.6875 | 3 |
When storms attack, Smart Grid could reduce outages, speed recovery
- By William Jackson
- Jul 10, 2012
It’s been a bad 12 months for electric utilities and the customers who depend on them. Hurricane Irene in August 2011 knocked out power to more than 4 million homes and businesses in the eastern United States, some f... | <urn:uuid:26cb99b2-f665-4690-9d05-80a8afd634d7> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/07/10/smart-grid-power-outages-severe-storms.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00283-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944008 | 1,300 | 2.609375 | 3 |
Using DNS Logs As a Security Information Source :
Occasionally this list is used as part of research into malware and domain security. Please drop us a note if you find such a reference in an article or presentation; if you are the author, let us know.
Two papers we’ve become aware of:
Understanding the Prevalence and ... | <urn:uuid:98c3b833-53cb-4152-8cd2-89122fc6a812> | CC-MAIN-2017-09 | http://www.malwaredomains.com/?tag=news | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00459-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.865435 | 917 | 2.53125 | 3 |
Yaz previously posted a news article that used a camera to help detect signs of alcohol impairment, but the cost of the system seems prohibitive. There is word of some new technology to detect if the driver of a vehicle may be under the influence. Researchers at TCU have developed a fuel cell which can detect alcohol i... | <urn:uuid:f2af7081-1dae-446b-9c8c-2f5327aaa4c7> | CC-MAIN-2017-09 | https://arstechnica.com/uncategorized/2002/03/2257-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00227-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961303 | 283 | 2.6875 | 3 |
How does a city work? Interactive model gives Portland answers.
- By Rutrell Yasin
- Aug 09, 2011
How does public transportation affect education? What impact does population density have on public health? Is there a connection between CO2 levels and obesity?
Officials in the City of Portland, Ore., have collaborated w... | <urn:uuid:9c799c2e-366d-4015-bebe-93f9f199898f> | CC-MAIN-2017-09 | https://gcn.com/articles/2011/08/09/portland-ibm-smart-city-model.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00155-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935885 | 765 | 2.765625 | 3 |
A spider that survived more than three months aboard the International Space Station has died less than a week into its new life as a celebrity. Nefertiti, a jumping red-backed spider, breathed her last after just four days of living in the Smithsonian's National Museum of Natural History. I was going to write that she... | <urn:uuid:0bbff365-cf7c-4018-80b8-6aed6c22bb97> | CC-MAIN-2017-09 | http://www.itworld.com/article/2716658/enterprise-software/spidernaut-never-got-to-enjoy-its-fame.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00575-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965966 | 422 | 3.15625 | 3 |
Technology in Action
Sandy shows storm-prediction progress
- By Frank Konkel
- Nov 05, 2012
Hurricane Sandy bears down on the mid-Atlantic on Oct. 29th in this NASA satellite image.
By any account, the super-storm known as Hurricane Sandy was devastating, claiming 113 American lives and potentially an estimated $50 bil... | <urn:uuid:8a51dbc4-a0db-4fca-a9a5-edae75a54193> | CC-MAIN-2017-09 | https://fcw.com/articles/2012/11/05/sandy-hurricane-center.aspx?admgarea=TC_Agencies | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00275-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956704 | 1,232 | 3.234375 | 3 |
Sugino H.,Asa Medical Association |
Tsumura S.,Asa Medical Association |
Tsumura S.,Tsumura ENT Clinic |
Kunimoto M.,Asa Medical Association |
And 19 more authors.
PLoS ONE | Year: 2015
The Japanese guidelines for acute otitis media in children recommend classifying acute otitis media by age, manifestations and local f... | <urn:uuid:7a295388-7a67-491f-8984-3a223df9bc52> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/asa-medical-association-427198/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00627-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925999 | 463 | 2.53125 | 3 |
Whether or not the D-Wave quantum computer is in actuality a quantum computer is a debate that HPCwire has been following since the project hatched in 2007. Early critics of the system claimed that it wasn’t a “real” quantum computer. Since that time, D-Wave has been winning over supporters, including Google, NASA and ... | <urn:uuid:7d6d7901-1e3c-4b96-a724-c06ab3788248> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/01/13/everything-wanted-ask-d-wave/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00327-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950146 | 938 | 2.953125 | 3 |
For Win Wonks, Software Restriction is Good Policy
Some of the most significant threats to your network's security and stability come from worms and trojan malware. These network threats can be transmitted through executable files attached to e-mails, via Internet downloads, or from Web pages. Although virus checkers a... | <urn:uuid:595067b0-17b7-4c09-b9eb-d3cd8c0247c6> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsecur/article.php/3445241/For-Win-Wonks-Software-Restriction-is-Good-Policy.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00503-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933221 | 1,072 | 3.140625 | 3 |
Researchers at Stanford University have developed a lithium-ion battery that shuts down as it begins to overheat, potentially meaning the types of catastrophic fires seen in hoverboards, laptops and airliners could become a thing of the past.
Lithium-ion batteries are used in just about all portable electronics. They'r... | <urn:uuid:2d174e4b-5adb-4249-9fec-c1adfcac2957> | CC-MAIN-2017-09 | http://www.itnews.com/article/3021017/researchers-develop-a-lithium-ion-battery-that-wont-overheat.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00624-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951647 | 378 | 3.390625 | 3 |
A pair of robotic legs will be heading to the International Space Station.
That's right. Robot legs.
The 300-pound robot, which had been in the works for 11 years, has 38 PowerPC processors, including 36 embedded chips, which control its joints. Each of the embedded processors communicates with the main chip in the rob... | <urn:uuid:918403ff-d24d-470f-9360-74266ff7badd> | CC-MAIN-2017-09 | http://www.cio.com/article/2377544/government/nasa-s-humanoid-robot-to-get-a-leg-up-on-space-station.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00500-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953796 | 681 | 3.203125 | 3 |
Malware 101: An IT primer on malicious software
This feature first appeared in the Winter 2015 issue of Certification Magazine. Click here to get your own print or digital copy.
Malware is perhaps the most dangerous threat to the security of the average computer system. Research by Microsoft recently estimated that 17.... | <urn:uuid:817e4635-2988-4b90-98ab-32eb454bec8f> | CC-MAIN-2017-09 | http://certmag.com/malware-101-primer-malicious-software/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00444-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933648 | 1,511 | 3.59375 | 4 |
Health Care Slideshow: Social Medicine: Is the Internet Transforming Healthcare?By Don Reisinger | Posted 05-13-2011
18 percent of all U.S. Internet users have gone to the Web to find people who have similar ailments.
23 percent of U.S.-based Internet users who suffer from a chronic disease have used to the Internet to... | <urn:uuid:eb4f0af7-a4ed-48ed-9c71-3155acf7c888> | CC-MAIN-2017-09 | http://www.cioinsight.com/print/c/a/Health-Care/Social-Medicine-Is-the-Internet-Transforming-Healthcare-752089 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00620-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941406 | 319 | 2.75 | 3 |
From its Babylonian roots, two primary forces have shaped banking: regulation and globalization. For millennia, sovereigns have held a tight grip over minting power and have used it as a strategic regulatory tool to establish and maintain power. Today's regulations may be more complex, but they also serve many disparat... | <urn:uuid:5762fdc9-a41a-43fa-ae92-03ed8b10321e> | CC-MAIN-2017-09 | http://www.banktech.com/innovation/can-technology-serve-as-a-positive-disruptive-force-in-banking/a/d-id/1297919?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00144-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959585 | 1,065 | 2.96875 | 3 |
Using nanotechnology, proteins and a chemical that powers cells in everything from trees to people, researchers have built a biological supercomputer.
The supercomputer, which is the size of a book, uses much less energy, so it runs cooler and more efficiently, according to scientists at McGill University, where the le... | <urn:uuid:3d89672b-8934-4572-92b2-2c42a4f6604d> | CC-MAIN-2017-09 | http://www.itnews.com/article/3040707/computer-hardware/biological-supercomputer-uses-the-juice-of-life.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00020-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964665 | 754 | 3.984375 | 4 |
There’s no doubt that the increased use of technology in Connecticut classrooms enhances students’ learning. Students can now access information from across the globe on every subject imaginable and interact with individuals from other continents. But herein is where the problem lies; the internet doesn’t come without ... | <urn:uuid:ade14b2d-519e-4032-904e-7934837d5d23> | CC-MAIN-2017-09 | https://www.imperosoftware.com/internet-safety-in-connecticut-taking-anti-bullying-policies-to-the-next-level/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00196-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947176 | 418 | 3.078125 | 3 |
The Cultural Effects of Video Gaming
Xbox. PlayStation. Wii. When you think of video games, it’s likely that some of these names will pop into your head. It’s also likely you’ll conjure up images of Super Mario stomping on bad guys, or of enemy warriors battling on an alien planet, or of your own James Bond-esque spy m... | <urn:uuid:0e9cf3ed-501f-4334-af29-3e4bb6f160f8> | CC-MAIN-2017-09 | http://certmag.com/the-cultural-effects-of-video-gaming/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00548-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957334 | 2,575 | 2.96875 | 3 |
NEW YORK, NY--(Marketwired - Aug 20, 2014) - As the summer comes to a close, many families may plan on taking a late-summer getaway to New York City -- for some a first time visit, and for others an annual ritual.
With the National September 11 Memorial & Museum now open, parents and guardians should consider using a v... | <urn:uuid:7db3a0e6-f431-496d-87b8-e220b4e5a3ce> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/family-trip-9-11-museum-memorial-new-york-can-present-opportunities-adults-talk-young-1940064.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00492-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966026 | 677 | 2.71875 | 3 |
Wombat released its social engineering training module to defend against social engineering threats, including spear phishing and social media-based attacks.
Commonly defined as the art of exploiting human psychology to gain access to buildings, systems or data, social engineering is evolving so rapidly that technology... | <urn:uuid:5fd7b884-fe84-4238-83d5-72c3197a67fa> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/01/15/wombat-unveils-social-engineering-security-training-module/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00016-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945499 | 388 | 2.53125 | 3 |
The growing use of wireless technology combined with the complexity of many of medical devices has raised concerns about how protected they are against information security risks that could affect their safety and effectiveness.
That was the central conclusion of a report issued today from the Government Accountably Of... | <urn:uuid:1342c261-ac9b-40e6-8981-00bc02d82535> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2223222/mobile-security/wireless-medical-devices-face-myriad-security-concerns.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00068-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95262 | 1,037 | 2.84375 | 3 |
Imagine controlling your phone or computer simply by touching the palm of your hand. An experimental device being developed by researchers at Microsoft and Carnegie Mellon University does exactly that. The device, called OmniTouch, is a wearable system that turns virtually any surface, including your skin, into a funct... | <urn:uuid:eeedcaa0-24f3-4bab-a374-f1322273250e> | CC-MAIN-2017-09 | http://www.govtech.com/technology/Transforming-Your-Skin-into-a-Touch-Screen.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00488-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945673 | 103 | 2.625 | 3 |
New data is bringing scientists much closer to proving that a particle discovered in the Large Hadron Collider last year is the elusive Higgs boson.
Scientists with the collider said they have analyzed two and a half times more data than was available to them last summer when they initially announced the particle find.... | <urn:uuid:f566f78c-16b1-4b45-b1bd-f0be62fd1f32> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2164404/data-center/scientists-closer-to-declaring-discovery-the--god-particle-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00364-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947473 | 567 | 2.796875 | 3 |
The assembler directives do not emit machine language but, as the name
direct the assembler to perform certain operations only during the assembly process.
Here are a number of directives that we shall discuss.
CSECT Identifies the start or continuation of a control section.
the start or continuation of a dummy control... | <urn:uuid:2f4e8b26-9d8f-426b-bb38-9d99e794c5d4> | CC-MAIN-2017-09 | http://edwardbosworth.com/MY3121_LectureSlides_HTML/AssemblerDirectives.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00404-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.871853 | 1,958 | 3.5625 | 4 |
Concept of FTTx
A simple understanding of FTTx is Fiber to the x, x here can be replaced such as H for home, B for building, C for curb or even W for wireless etc. It is a new technology used in today’s network. As we know, compared to copper or digital radio, fiber’s high bandwidth and low attenuation easily offset it... | <urn:uuid:30d99476-060a-4d88-9d28-111bf78faa8c> | CC-MAIN-2017-09 | http://www.fs.com/blog/a-comprehensive-understanding-of-fttx-network.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00100-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931505 | 1,559 | 3.234375 | 3 |
From Earth to the moon
- By Patrick Marshall
- Sep 19, 2007
It may not be as romantic as a full moon on a clear summer night as a breeze blows gently through your lover's hair as you stroll down the beach, but it's still sort of cool.Google Moon
, that is.
Google is working on doing for the moon what it has already don... | <urn:uuid:2a12b854-1d82-4da4-a0f2-61a012142dab> | CC-MAIN-2017-09 | https://gcn.com/articles/2007/09/19/from-earth-to-the-moon.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00100-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949405 | 410 | 3.046875 | 3 |
As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in volume and severity. To know where we are going it is helpful to look at where we have been. Finding trends in Internet security has become a val... | <urn:uuid:2607245c-16e3-4c86-906f-f78d8c872f67> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2008/12/24/security-trends-of-2008-and-predictions-for-2009/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00273-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949605 | 1,144 | 2.671875 | 3 |
The US Department of Energy today said it was conditionally committing $2 billion to develop two concentrating solar power projects that it says will offer 500 megawatts of power combined, effectively doubling the nation's currently installed capacity of that type of power.
Concentrated solar systems typically use para... | <urn:uuid:378c1d13-75ea-4e56-a302-f4f32a595f39> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2229487/infrastructure-management/energy-dept--spends--2b-to-double-us-concentrated-solar-power-capacity.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00625-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916591 | 467 | 3.078125 | 3 |
-Encourages healthier lifestyle by showing consequences of an unhealthy one -
NEW YORK; May 16, 2006 – Accenture (NYSE: ACN) today unveiled an experimental “mirror” that shows unhealthy eaters what they could look like in the future if they fail to improve their diets.
The device – known as the Persuasive Mirror - stem... | <urn:uuid:89a0e957-f281-475f-a1ef-a1734daa796e> | CC-MAIN-2017-09 | https://newsroom.accenture.com/news/high-tech-mirror-from-accenture-offers-look-into-future.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00149-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9418 | 1,318 | 2.609375 | 3 |
Disk capacity will rise.
As storage capacity demands continue to increase, new serial technologies will gradually replace current parallel SCSI and ATA storage media during the next two years. Beyond these serial advances, hard-disk- drive vendors are working to develop even-more-advanced technologies to improve the ph... | <urn:uuid:b512858f-4b9b-46c3-993b-6d1cf36efea2> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Data-Storage/HDDs-Future-is-Perpendicular | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00025-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.90263 | 753 | 2.921875 | 3 |
Big Data is the buzzword on everyone's lips these days - promising to change the world through deep insights into vast and complex sets of data. But amidst the optimism at the recent IEEE Computer Society's Rock Stars of Big Data symposium at the Computer History Museum in Mountain View, Calif., there were also stark a... | <urn:uuid:591c7734-82d1-48b2-bedd-476781138e3c> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2225820/data-center/with-big-data-comes-big-responsibility.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00021-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959128 | 759 | 2.765625 | 3 |
List of Environmental Management Standards and Frameworks
The ISO 14000 Family of Standards
The ISO 14000 family of standards has two main documents, with one additional supplementary document attached to the family. ISO 14001 and ISO 14004 comprise the family of ISO 14000 documents with ISO 19011, guidelines for audit... | <urn:uuid:75c3d76c-1fb2-417b-9cce-a6fca7cdd82a> | CC-MAIN-2017-09 | https://advisera.com/14001academy/knowledgebase/list-of-environmental-management-standards-and-frameworks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00197-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.903719 | 685 | 2.734375 | 3 |
Multihoming ISP Links
Multihoming ISP links
Today, problems associated with ISP link availability continue to cause organizations to lose millions of dollars each year. However, deploying a solution that is cost effective and operationally efficient can also be a challenge. The following are four alternatives on how to... | <urn:uuid:583280fa-7f85-42be-9695-bf43884dd4a3> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Enterprise-Networking/How-to-Overcome-Multihomed-ISP-Link-Challenges/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00317-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936655 | 790 | 2.6875 | 3 |
Returns the geomagnetic field for a location at the specified date.
int wmm_get_geomagnetic_field(const wmm_location_t *loc, const struct tm *date, wmm_geomagnetic_field_t *field)
The geographic location to be used in the calculation of the magnetic field.
The date to be used in the calculation of the magnetic field.
T... | <urn:uuid:e4022450-ebfd-46df-8503-57d492b08073> | CC-MAIN-2017-09 | http://developer.blackberry.com/native/reference/core/com.qnx.doc.wmm.lib_ref/topic/wmm_get_geomagnetic_field.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00369-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.731924 | 199 | 2.6875 | 3 |
- Protect the password in transit from the threat of sniffers or intermediation attacks — Use HTTPS during the entire authentication process. HSTS is better. HSTS plus DNSSEC is best.
- Protect the password in storage to impede the threat of brute force guessing — Never store the plaintext version of the password. Stor... | <urn:uuid:06f7ae8e-396d-44d4-956a-98f65fe9c4fa> | CC-MAIN-2017-09 | https://deadliestwebattacks.com/2012/08/27/password-interlude-in-d-minor/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00369-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.897024 | 522 | 2.71875 | 3 |
Projects are often complex, made up of a large number of moving pieces and bring numerous challenges to those involved. The reality is projects don’t always go the way we want them to. We often find ourselves being asked to do more with less and at a faster pace than we’re comfortable with. On occasion, we are successf... | <urn:uuid:8ae0fa7f-534f-4bc4-a9e2-7a9539147bb9> | CC-MAIN-2017-09 | http://blog.globalknowledge.com/2017/01/17/3-essentials-to-avoid-it-project-failure/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00489-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936818 | 719 | 2.609375 | 3 |
After a successful Sunday launch, a cargo spacecraft is on its way to the International Space Station, carrying a Google 3D smartphone, along with a flock of tiny satellites.
Orbital Sciences Corp.'s Cygnus spacecraft, filled with more than 3,000 pounds of food, supplies, hardware and scientific experiments, lifted off... | <urn:uuid:ebdc3250-b9bf-4ae5-8d76-8ed591b72e45> | CC-MAIN-2017-09 | http://www.cio.com/article/2453646/computers-all/googles-3d-mapping-tech-flying-to-space-station.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00189-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.911193 | 670 | 3.140625 | 3 |
Autodesk Volunteers Help Preserve Historic Kosrae Using Reality Capture Software & BIM
Kosrae, an island in the South Pacific located between Guam and the Hawaiian Islands, was settled as early as 1250. But much of the island’s rich history is unknown by the people who live there, as well as the handful of scuba divers... | <urn:uuid:f4441430-17f3-455e-b58d-b1b15be2e8ed> | CC-MAIN-2017-09 | http://blogs.dlt.com/autodesk-employees-volunteer-knowledgewell-preserve-historic-kosrae-reality-capture-software-bim/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00541-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942144 | 1,618 | 2.75 | 3 |
110 blocks are one type of punch blocks used to connect sets of wires in a structured cabling system. The “110” designation is also used to describe a type of insulation-displacement connector used to terminate twisted pair cables which uses a similar punch-down tool as the older 66 block. People are preffered to 110 b... | <urn:uuid:9ea97305-3075-497e-b777-996634ba0de5> | CC-MAIN-2017-09 | http://www.fs.com/blog/modern-110-connecting-blocks-for-data-networking.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00417-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93617 | 713 | 2.796875 | 3 |
TORONTO, ON and BOSTON, MA--(Marketwired - November 01, 2016) -
- Canadian Government-funded "Saving Brains" study: 25 percent of developing world's child stunting is associated with poor growth in womb, such as pre-term birth and low birth weight
- Authors prescribe "paradigm shift" from interventions focused solely o... | <urn:uuid:dd91207a-019f-40ef-b60a-f96e3fa47851> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/1-risk-for-child-stunting-in-developing-world-poor-growth-before-birth-2171693.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00417-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921732 | 2,458 | 2.875 | 3 |
In other words, success or failure at spreading a message through social media looks kind of random. When a social media campaign goes viral, "you don't have to assume it's because some people are influential--you can still get some random thing that gets 50 million views on YouTube," said Filippo Menczer, director of ... | <urn:uuid:24c4ded3-e524-4e87-9d52-df27ee424cc4> | CC-MAIN-2017-09 | http://www.networkcomputing.com/networking/science-probes-why-tweets-go-viral/1156935268?cid=sbx_bigdata_related_news_industry_analysis_big_data&itc=sbx_bigdata_related_news_industry_analysis_big_data | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00361-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954089 | 896 | 2.703125 | 3 |
Super Fast and Super GreenBy Mel Duvall | Posted 2007-11-28 Email Print
New ranking of supercomputers compares their performance against their energy consumption
Can the world's most powerful computers also be green? That was the underlying question behind a new ranking of the world's supercomputers which compares the ... | <urn:uuid:fb1c34e2-3ac6-4776-a015-d681fa66177c> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Projects-Management/Super-Fast-and-Super-Green | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00237-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955255 | 658 | 2.609375 | 3 |
According to a new study 90% of Americans do not feel safe online.
The report released by McAfee and the National Cyber Security Alliance (NCSA) revealed that 59% of Americans say that their job is dependent on a safe and secure internet.
However, 90% do not feel completely safe from hackers, viruses and malware while ... | <urn:uuid:e596d41e-a94c-4b6b-9ee0-e54cbc892edd> | CC-MAIN-2017-09 | http://www.cbronline.com/news/one-in-four-americans-suffered-security-breaches-last-year-021012 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00237-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960239 | 356 | 2.8125 | 3 |
If smartwatch development can be thought of in terms of dance crazes, the next phase might become the Twist.
Researchers at Carnegie Mellon University have developed a prototype smartwatch that expands user interface possibilities with a tactile face that can be rotated.
Chris Harrison/Carnegie Mellon University
This p... | <urn:uuid:eeb9df61-02b8-445a-99e6-b5ffca34e7fa> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2176497/smb/researchers-try-new---39-twist--39--on-smartwatches.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926609 | 521 | 2.5625 | 3 |
When LIDAR came down to Earth, mapping projects took off
Second of four parts
Sometimes it takes a crisis to spur innovation.
Such was the case with creation of the Red River Basin Decision Information Network (RRBDIN), and its LIDAR mapping of large swaths of North Dakota, Minnesota and central Canada, said Charles Fr... | <urn:uuid:920f3d64-84af-4d1e-b214-5d13ae8decbf> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/03/13/when-lidar-costs-decreased-mapping-projects-took-off.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00533-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967934 | 1,465 | 3.140625 | 3 |
If you use an Apple iPhone, iPad or other iDevice, now would be an excellent time to ensure that the machine is running the latest version of Apple’s mobile operating system — version 9.3.1. Failing to do so could expose your devices to automated threats capable of rendering them unresponsive and perhaps forever useles... | <urn:uuid:c89111ae-d5ad-4bab-80c3-e07c0c31b4c7> | CC-MAIN-2017-09 | https://krebsonsecurity.com/tag/apple-1970-bug/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170700.71/warc/CC-MAIN-20170219104610-00057-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940402 | 881 | 2.546875 | 3 |
New research claims the ‘undetected’ malware can wreak havoc.
Malware called Gyges, developed by the Russian intelligence service, has been leaked to cyber-criminals and has also been incorporated into ransomware and online banking Trojan toolkits, threat analysis company Sentinel Labs has claimed.
Gyges mainly targets... | <urn:uuid:a23a0fe4-9f17-473c-88e2-2896cb117e41> | CC-MAIN-2017-09 | http://www.cbronline.com/news/cybersecurity/data/russian-state-authored-espionage-malware-up-for-sale-210714-4322631 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00233-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950615 | 417 | 2.609375 | 3 |
Picking the Connectome Data Lock
Back in 2005, researchers at Indiana University and Lausanne University simultaneously (yet independently) spawned a concept and pet term that would become the hot topic in neuroscience for the next several years—connectomics.
The concept itself isn’t necessarily new, even thought the u... | <urn:uuid:6fed3039-3ca1-40b5-801c-41a32f7770ae> | CC-MAIN-2017-09 | https://www.datanami.com/2012/05/01/picking_the_connectome_data_lock/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00409-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943241 | 1,640 | 2.53125 | 3 |
Rootkit.Duqu.A is the current star in the world of malware but, as history shows, that fame will be short-lived. Just like fashion models, modern malware has a lifespan in the media eye of a couple of weeks to a couple of months, tops. They then fade into the shadow of more dangerous and sophisticated tools, according ... | <urn:uuid:2c0825a4-6fc5-4b26-b539-48f626c09136> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2011/10/24/duqu-another-most-advanced-piece-of-malware/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00109-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962544 | 738 | 2.515625 | 3 |
This resource is no longer available
Bring Your Own Device: Preparing for the influx of mobile computing devices in schools
With over 90 percent of high school students using technology to study or work on homework assignments, students are some of the most enthusiastic and savvy users of mobile computing devices. How ... | <urn:uuid:10713237-0d2a-4004-83ba-3174e710a7ae> | CC-MAIN-2017-09 | http://www.bitpipe.com/detail/RES/1347290709_74.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00581-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931396 | 122 | 2.921875 | 3 |
Satellite has been thought of as the choice of last resort for connecting cell sites to the core network. The high recurring cost of satellite bandwidth along with the ever-growing demand for more and more bandwidth has kept network planners away from considering satellite backhaul as a viable option.
Mobile Network Op... | <urn:uuid:81955de2-3b1f-4add-8bb9-ce29b9aa4f2d> | CC-MAIN-2017-09 | http://www.hughes.com/company/newsroom/stories/cellular-backhaul-the-killer-app-for-high-throughput-satellites?locale=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00633-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923226 | 840 | 2.78125 | 3 |
A paradigm shift is occurring within the agricultural sciences, owing to the genomics-based data explosion and concurrent computational advances. In India, leaders are intent on furthering the burgeoning genomic supercomputing discipline through the establishment of a supercomputing center and a nationwide grid to supp... | <urn:uuid:428da615-8d19-4a9f-b4d6-df0c9951e3ad> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/12/17/supercomputing-bolsters-agricultural-science-india/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00157-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91548 | 943 | 2.8125 | 3 |
Written by GEOFF MULLIGAN, CHAIRMAN AND CEO, IPSO ALLIANCE
Reposted from Future of Business & Tech
Glance at the wrist of the modern day commuter and you will find fitness trackers and smartwatches monitoring activities and uploading data to the Cloud. A look into the home of a cardiac patient might show tabletop monit... | <urn:uuid:e948b6dd-2fca-4741-8feb-820b354f6b37> | CC-MAIN-2017-09 | https://www.amsl.com/blog/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00329-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907352 | 632 | 2.515625 | 3 |
Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems – the only thing that it needs to compromise targeted computers is for them to run a flawed version of Java.
The Trojan is written wholly in Java, and exploits an unspecified v... | <urn:uuid:085d7359-778b-45c1-b9a8-5681f566c438> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2014/01/29/java-based-malware-hits-windows-mac-and-linux/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00626-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.911693 | 254 | 2.8125 | 3 |
Is ParalleX This Year’s Model?
By: John Moore
Scientific application developers have masses of computing power at their disposal with today’s crop of high-end machines and clusters. The trick, however, is harnessing that power effectively. Earlier this year, Louisiana State University’s Center for Computation & Technol... | <urn:uuid:6a95058b-8f5c-450b-823b-e2756e0aa373> | CC-MAIN-2017-09 | http://www.intelligenceinsoftware.com/feature/expert_insight/is_parallex_this_years_model/index.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00150-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943196 | 2,127 | 2.8125 | 3 |
What is the Remote Code Evaluation Vulnerability?
Remote Code Evaluation is a vulnerability that can be exploited if user input is injected into a File or a String and executed (evaluated) by the programming language's parser. Usually this behavior is not intended by the developer of the web application. A Remote Code ... | <urn:uuid:18ce4abf-eeea-4971-9cba-2c2edecbf314> | CC-MAIN-2017-09 | https://www.netsparker.com/blog/web-security/remote-code-evaluation-execution/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00502-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.909845 | 916 | 2.890625 | 3 |
Today’s guest post is brought to you by Andy Wolber. You can find more of Andy’s work in TechRepublic where he writes for the Google in the Enterprise newsletter. We know it’s summer and teachers would prefer to think about the beach as opposed to the best ways to leverage Google Docs. But there’s a good chance that if... | <urn:uuid:28994188-1c1e-4bc4-be15-4b7105a5b3f3> | CC-MAIN-2017-09 | https://www.backupify.com/blog/learn-latest-classroom-writing-tips-google-docs | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00446-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.896597 | 1,020 | 2.625 | 3 |
This election season, people started to talk about political cookies – a new expression for the term previously used for targeted or customized ads. These are advertisements that are automatically pushed out based an Internet user's search habits. Computer cookies are files stored on the user’s computer that save the b... | <urn:uuid:c36a9a41-dd64-434b-b867-0c79efbd0956> | CC-MAIN-2017-09 | http://www.nextgov.com/technology-news/tech-insider/2012/09/there-public-appetite-political-cookies/57892/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00622-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952 | 560 | 2.78125 | 3 |
IPv6: An answer to network vulnerabilities?
- By Julian Weinberger
- Aug 19, 2014
On Aug. 15, 2012, in one of the most devastating cyberattacks ever recorded, politically motivated hackers wiped the memory of more than 30,000 computers operated by the Saudi Aramco oil company in an attempt to stop the flow of oil and g... | <urn:uuid:d6e7eb21-0109-429d-a96b-9b3f20f7e8d9> | CC-MAIN-2017-09 | https://fcw.com/articles/2014/08/19/ipv6-answer-to-network-vulnerabilities.aspx?admgarea=TC_Opinion | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00198-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949684 | 1,104 | 2.71875 | 3 |
FCC tests if 911 cell-phone calls can be traced indoors
- By William Jackson
- Nov 30, 2012
As telephones have become untethered and phone numbers are no longer tied to an address, the ability of first responders to pinpoint the location of cellular phone calls to 911 has become increasingly important.
The Federal Comm... | <urn:uuid:e88d9d56-5dfc-4ed1-9f04-37285cfb49b2> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/11/30/fcc-911-cell-phone-calls-traced-indoors.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00374-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951344 | 660 | 2.59375 | 3 |
Milbrath M.O.,Michigan State University |
van Tran T.,Michigan State University |
van Tran T.,Bee Research and Development Center |
Huang W.-F.,University of Illinois at Urbana - Champaign |
And 4 more authors.
Journal of Invertebrate Pathology | Year: 2015
Honey bees (Apis mellifera) are infected by two species of mic... | <urn:uuid:8cfc8c5a-def9-4068-a191-d475c8175240> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/bee-research-and-development-center-641396/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00550-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916543 | 1,313 | 2.6875 | 3 |
Memory is not to be trusted. It is unpredictable, frustratingly fleeting, and only gets worse with age. It will forever cling tightly to useless facts and yet misplace the freshest, most essential ones. I can remember my childhood phone number, the tune and lyrics to Let It Be, and most of the Gettysburg Address, and y... | <urn:uuid:1f3ae470-ca26-427a-85ce-78de9a5f1eb3> | CC-MAIN-2017-09 | http://www.lovemytool.com/blog/2016/03/for-the-memories-by-paul-w-smith.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00494-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954687 | 876 | 2.734375 | 3 |
Attackers are compromising Linux and Windows systems to install a new malware program designed for launching distributed denial-of-service (DDoS) attacks, according to researchers from the Polish Computer Emergency Response Team (CERT Polska).
The malware was found by the Polish CERT at the beginning of December and th... | <urn:uuid:e06b3ef6-2df9-4edb-89b5-a9d44c55ff66> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2486982/malware-vulnerabilities/new-ddos-malware-targets-linux-and-windows-systems.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00070-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957152 | 918 | 2.734375 | 3 |
Construction has a reputation of lagging even further behind on technological innovation than healthcare. A boom in the meeting of the two though, has brought about advancements new to both industries — most notably, Building Information Modeling (BIM).
3D modeling isn’t a new technology, but historically it has been d... | <urn:uuid:9bf537ed-635f-48b8-83a5-ace39795961f> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/healthcare-construction-and-tech-why-vars-should-care-0001 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00242-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949745 | 632 | 2.703125 | 3 |
Clip and save: Tips for a secure WLAN
Deploying a secure wireless LAN involves more than securing the wireless link between the client and the access point. Ultimately, it involves the entire network infrastructure.
The National Institute of Standards and Technology warned in SP 800-48, Wireless Network Security, 'main... | <urn:uuid:b0393211-bc94-438f-a483-eb2c2a2ce285> | CC-MAIN-2017-09 | https://gcn.com/articles/2005/07/27/clip-and-save-tips-for-a-secure-wlan.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00418-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.912965 | 693 | 2.5625 | 3 |
A malicious botnet called ‘Nitol’ was interrupted by Microsoft on Sept. 13. ‘Nitol’ was using a Dynamic DNS to enable the infected bot computers to communicate with the hacker’s command and control server.
For background, it is possible to serve a website from a home computer, but the difficulty is that your home Inter... | <urn:uuid:7f013007-58ac-4abe-b61a-eb662324b962> | CC-MAIN-2017-09 | https://www.entrust.com/nitol-malware-leveraging-dynamic-dns-for-nefarious-gains/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00418-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965794 | 432 | 3.046875 | 3 |
Smart buildings, smart grids, smart infrastructure - these terms are bandied about more often than ever. In this image, technology is incorporated into an ordinary pivot irrigation system, making it a smart agricultural device. Notice some sprinkler heads are off while others are active. This is due to broadband wirele... | <urn:uuid:43ea1d5b-4764-40a7-8e0f-54afbd3c78a8> | CC-MAIN-2017-09 | http://www.govtech.com/featured/Green-Initiatives-Broadband-Wireless-Monitor-Saves.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00362-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933795 | 101 | 2.828125 | 3 |
Dell plans to recycle however many of the 4.1 million recalled batteries that customers turn in (see Dell battery recall not likely to have big environmental impact), but what happens to the other 2 billion lithium ion batteries which will be sold this year? Most will last for 300 to 500 full recharges (one to three ye... | <urn:uuid:0a7bb729-6690-446d-8890-971dd47176db> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2482910/technology-law-regulation/lithium-ion-batteries--high-tech-s-latest-mountain-of-waste.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934338 | 713 | 3.296875 | 3 |
A penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. A Penetration Testing Linux is a special built Linux distro that can be used for analyzing and evaluating security measures of... | <urn:uuid:39a111cc-9264-4dc6-b2ea-3e52e6be3c80> | CC-MAIN-2017-09 | https://www.blackmoreops.com/2014/02/03/notable-penetration-test-linux-distributions-of-2014/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00234-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937725 | 6,116 | 3.125 | 3 |
As technology is wont to do, drones have grown beyond purely military application and entered the civilian sector
The World Health Organization (WHO) has teamed up with Matternet, a California tech company, to explore the use of drones in the delivery of medical supplies to remote regions of Bhutan, according to Health... | <urn:uuid:d48bddbb-d118-4a98-9c47-adc6d0da07d3> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/drones-are-moving-into-the-healthcare-arena-0001 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00110-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936496 | 520 | 2.6875 | 3 |
High-tech companies use the Internet to provide customers with a clean, insulated environment where they can make purchases, do research and chat with friends and strangers.
But behind every antiseptic Web page lies its real-world technological counterpart; and all too often the servers that run Web sites and online se... | <urn:uuid:71295855-64a9-41bd-9bec-26fb3c4109f4> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Down-on-the-Server-Farm.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00406-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958208 | 1,038 | 2.921875 | 3 |
LIVERMORE, Calif., Dec. 22 — Sandia National Laboratories has formed an industry-funded Spray Combustion Consortium to better understand fuel injection by developing modeling tools. Control of fuel sprays is key to the development of clean, affordable fuel-efficient engines.
Intended for industry, software vendors and ... | <urn:uuid:4576151c-1528-4217-b5da-72bf6dbb6283> | CC-MAIN-2017-09 | https://www.hpcwire.com/off-the-wire/sandia-national-laboratories-forms-new-consortium/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00406-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910325 | 806 | 2.625 | 3 |
Streamline Datacenters for Scalable Computing
Traditional datacenters – server sprawl leads to gross inefficiencies, high costs
Historically, datacenter servers have been built with fixed designs tailored to specific applications and requiring long lead times. These purpose-built systems require complete replacement wh... | <urn:uuid:a0dfd236-4c95-4038-8a24-24086cab39c2> | CC-MAIN-2017-09 | https://jp.broadcom.com/applications/datacenter-networking/hyperscale-streamline-datacenters | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00582-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.903491 | 993 | 2.546875 | 3 |
While Oracle and MySQL remain top picks for database systems, there are many others available, from big guns like Microsoft SQL Server to the increasingly popular MongoDB. Each has its own strengths and weaknesses, so your latest IT project may find you scratching your head as you try to decide on database software.
If... | <urn:uuid:851a7156-18cd-495c-914f-ccdfbc9e3047> | CC-MAIN-2017-09 | https://www.greenhousedata.com/blog/which-database-management-platform-is-right-for-you | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00634-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931519 | 928 | 2.828125 | 3 |
Who can forget one of the most iconic lines from the original Star Trek television show: "Warp drive, Mr. Scott. Make it so." Kidding! Just doing a little mash-up there. Before any Trekkie heads explode, here's the real line, delivered by a young William Shatner. All of which is a clumsy, Friday-ish way to lead into th... | <urn:uuid:44b3f4ea-0ab6-4579-be61-3ee3bc37487f> | CC-MAIN-2017-09 | http://www.itworld.com/article/2708369/enterprise-software/no-hurry-for-warp-speed.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00102-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944507 | 440 | 2.5625 | 3 |
Using off-the-shelf gaming technology that tracks brain activity, a team of scientists has shown that it's possible to steal passwords and other personal information.
Researchers from the University of Oxford, University of Geneva and the University of California at Berkeley demonstrated the possibility of brain hackin... | <urn:uuid:e5b903cc-b0b2-4a65-90e8-6021e6ec736e> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2132246/mobile-security/brain-could-be-target-for-hackers--researchers-show.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00278-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959721 | 796 | 3.171875 | 3 |
Secure programming is the last line of defense against attacks targeted toward our systems. This course shows you how to identify security flaws & implement security countermeasures when writing code for Android and iOS mobile devices. Using sound programming techniques and best practices shown in this course, you can ... | <urn:uuid:63ae805e-f347-4bd4-8829-fca073e60bb6> | CC-MAIN-2017-09 | https://appsec-labs.com/portfolio-item/mobile_awareness_1d/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00451-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.766664 | 354 | 3.28125 | 3 |
Wednesday January 11, 2017
Twin Killers in Manufacturing
As every production manager is aware, it’s not easy to achieve a smooth and continuous flow of products in concert with market demand. Although managers are aware of this, what is generally unknown or recognized is the major obstacles to running an effective oper... | <urn:uuid:cad64701-7cb9-4a85-9c36-05555c0ac7cd> | CC-MAIN-2017-09 | http://manufacturing.ecisolutions.com/blog/posts/2017/january/dependencies-and-variability.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00627-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951074 | 937 | 2.828125 | 3 |
Riot Games is putting artificial intelligence to work to improve the sportsmanship of millions of gamers
In this article...
- League of Legends creator Riot Games has been experimenting with AI and predictive analytics to find and stop online trolls and increase sportsmanship
- Since implementing their AI-assisted prog... | <urn:uuid:bc423565-fa64-453a-93ef-64f4943669f4> | CC-MAIN-2017-09 | https://www.hpematter.com/childhood-issue/League-of-Legends-New-Model-Civility-in-Online-Communities | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00027-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964347 | 1,117 | 2.765625 | 3 |
As everything around us becomes connected to the Internet, from cars to thermometers to the stuff inside our mobile phones, technologists are confronting a tough new challenge: How does a machine verify the identity of a human being?
In Redwood City, Calif., a start-up called OneID is offering a single sign-on for a va... | <urn:uuid:bc4a1421-bf14-435e-b1b6-6cd62d251484> | CC-MAIN-2017-09 | http://www.northbridge.com/beyond-passwords-new-tools-identify-humans | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00447-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943408 | 325 | 3.03125 | 3 |
A striking number of U.S. travelers, while aware of the risks, are not taking the necessary steps to protect themselves on public Wi-Fi and are exposing their data and personal information to cyber criminals and hackers, according to research released today by AnchorFree, the global leader in consumer security, privacy... | <urn:uuid:442d2128-4f5d-4a15-a25d-ab61a2faeaa2> | CC-MAIN-2017-09 | http://hospitalitytechnology.edgl.com/news/Four-in-Five-Travelers-Fear-Mobile-Use-of-Unsecured-Public-Wi-Fi-89521 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00023-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94421 | 573 | 2.65625 | 3 |
Del Valle ISD is a public school district in Texas that serves over 11,000 students on 15 campuses in Southeast Travis County near Austin. The school district is committed to providing innovative educational programs that cultivate critical thinking skills among its students, including mock trial leagues and debate tea... | <urn:uuid:f94e97be-618a-4da6-b09c-fa430cf68c4e> | CC-MAIN-2017-09 | http://www.lifesize.com/video-conferencing-blog/innovative-educational-approach/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00199-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.977804 | 813 | 2.84375 | 3 |
LOB and XML complex data types have extended the capabilities of DB2 for z/OS in order to support the needs of today's applications. The infrastructure for storing LOB and XML data is similar in nature because both data types use the concept of an auxiliary set of objects.
LOB data type
Support for large objects (LOBs)... | <urn:uuid:999a450c-f155-4e5e-b9b9-71edd9b23b28> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/data/library/techarticle/dm-1007db2lobsxml/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00019-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907756 | 1,161 | 3 | 3 |
Adaptive Learning Systems
What are the adaptive learning systems?
Adaptive Learning System is a tool for transforming the learning system from a passive reception of information by the receiver to an interactive process by collaborating in the education process. Adaptive Learning System is used in education as well as ... | <urn:uuid:b42098bc-e9b7-4738-b592-f3766a05465d> | CC-MAIN-2017-09 | https://www.hcltech.com/technology-qa/what-is-adaptive-learning-system | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00547-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956239 | 77 | 3.015625 | 3 |
I like to think of the transport layer as the layer of the OSI Model that enables more interesting traffic. While we network engineers may love a lot of the simpler uses of the IP protocol and networks in general, we'd all be jobless without the transport layer.
Layer 4 provides for the transparent transfer of data for... | <urn:uuid:85fdee4c-41b0-492b-93c7-4f9b57ce8966> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2470343/network-hardware-solutions/the-transport-layer---understanding-layer-4-of-the-osi-model.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00491-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933581 | 701 | 3.15625 | 3 |
Weather prediction in the 50s. Missile intercepts of UFOs in the 60s. Electronic messages in the 70s. We learned about it all through the commercials.
As far back 1956, Remington Rand told us how Univac could collect historical weather data, analyze that "big data" and use it to make predictions -- "all in a matter of ... | <urn:uuid:612b828d-b9e5-435c-9dd7-177e856082a0> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2475285/business-intelligence/computing-in-the-commercial-age.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00015-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943454 | 345 | 3.171875 | 3 |
Why cloud data storage is secure — and why it might not be
This feature first appeared in the Fall 2014 issue of Certification Magazine. Click here to get your own print or digital copy.
Nude photos of well-known actresses certainly garner attention on their own, but this summer they drew attention to an unlikely subje... | <urn:uuid:1442dbec-31a9-4367-b8aa-7542c890d59f> | CC-MAIN-2017-09 | http://certmag.com/cloud-data-storage-secure-might/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00367-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923741 | 1,844 | 2.578125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.