text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Information technology has traditionally been a male-dominated field with an insular culture, but it is also a global business in which skilled workers are at a premium.
One of the most influential companies in IT history, IBM, has a long record of leadership on diversity issues--not just in IT, but in the corporate wo... | <urn:uuid:cc2a643e-a805-4125-965f-a1efe2d86cf2> | CC-MAIN-2017-09 | http://www.cioinsight.com/it-strategy/a-tale-of-two-cultures | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00628-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971266 | 382 | 2.609375 | 3 |
While most industries have changed significantly over the years, higher education has remained relatively the same. Students listen to professors lecture in century-old universities and tackle tough philosophical questions the way their ancestors did.
But higher education is at a breaking point. Tuition is skyrocketing... | <urn:uuid:591f4cf8-1085-4a4e-89f6-1e2be85b1704> | CC-MAIN-2017-09 | http://www.govtech.com/education/What-Will-Higher-Education-Look-Like-in-25-Years.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00152-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957794 | 2,497 | 2.765625 | 3 |
Charge-coupled devices (CCDs) are sensors for recording images in digital cameras. These devices consist of an integrated circuit containing an array of linked or coupled capacitors acting as many small pixels. The falling of light on a pixel is converted into a charge pulse, which is then measured by the CCD electroni... | <urn:uuid:1571973d-5724-4004-be71-89976bec8cec> | CC-MAIN-2017-09 | http://www.micromarketmonitor.com/market-report/ccd-image-sensor-reports-8549425947.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00152-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.914477 | 754 | 3.578125 | 4 |
The advent and development of fiber optic communication technology has brought a revolutionary change to the communications industry. Nowadays in the world, about 85% of communication services via optical fiber transmission, long haul network and local relay network has been widely using fiber optics.
Dense Wavelength ... | <urn:uuid:858b7fe3-3d27-4f4b-b10f-ace01d3e4ece> | CC-MAIN-2017-09 | http://www.fs.com/blog/brief-introduction-to-optical-switch.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00148-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.898131 | 667 | 2.6875 | 3 |
IP Telephony: Private Branch Exchange(PBX) vs. VoIP
Contributed by Billy Short
Internet Protocol telephony (frequently referred to as IP telephony) is an important concept in enterprise communications technology. IP telephony refers to all real-time applications over IP, which include many different instant messaging p... | <urn:uuid:41ddb229-e11a-4553-ba94-6479f49116d9> | CC-MAIN-2017-09 | http://infosecwriters.com/articles/2017/01/26/ip-telephony-private-branch-exchangepbx-vs-voip | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00324-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887149 | 113 | 2.875 | 3 |
Why is the industry buzzing? Because the technology could revolutionize networking. Typical networking intelligence is distributed across physical switches and routers, each with its own configuration. Even routing protocols designed to move packets across the globe rely on neighbors' advertisements to build their own ... | <urn:uuid:3a3f825f-0800-4e3f-a4cf-e1eff0e6ea2e> | CC-MAIN-2017-09 | http://www.networkcomputing.com/networking/why-software-defined-networking-could-revolutionize-networking/420343525?piddl_msgorder=asc | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00200-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939874 | 530 | 2.609375 | 3 |
BGPv4 is an Exterior Gateway Protocol (EGP) and was introduced in 1995 in RFC 1771 and is now defined in RFC 4271. The major difference from earlier version of BGP and v4 is BGPv4 is classless and supports CIDR.
BGP is primarily used to propagate and advertise public networks across the internet. A large majority of In... | <urn:uuid:aa7cbb2c-7667-42e1-8ea7-4c32daf16a82> | CC-MAIN-2017-09 | http://www.networking-forum.com/wiki/BGP | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00376-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.896397 | 3,506 | 3.671875 | 4 |
Black Box Explains...FDDI
Fiber Distributed Data Interface (FDDI) is a networking standard for operating at speeds of up to 100 Mbps. The standard FDDI network is set up in a ring topology with two rings that transmit signals in opposite directions to a series of nodes. FDDI accommodates up to 500 nodes per dual-ring n... | <urn:uuid:3687c4c2-460f-4373-bc8e-9fbbf7108a61> | CC-MAIN-2017-09 | https://www.blackbox.com/en-nz/products/black-box-explains/black-box-explains-fddi | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00196-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.863671 | 114 | 2.90625 | 3 |
Storage Growth in the Enterprise
Between 5 and 7 exabytes (or 10 bytes of data to the 18 th power) of new information are created every year. If this somewhat conservative estimate is correct, then that means on average, more than 800 megabytes of information per year are generated for every person living on earth. Thi... | <urn:uuid:1321b0c6-6af3-4bb7-89ee-d840b114ca2b> | CC-MAIN-2017-09 | http://certmag.com/storage-growth-in-the-enterprise/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00372-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959557 | 1,438 | 2.515625 | 3 |
Learn about another web services framework from the Apache Software Foundation
This content is part # of # in the series: Java web services
This content is part of the series:Java web services
Stay tuned for additional content in this series.
CXF is another web services stack from the Apache Software Foundation, the sa... | <urn:uuid:b9d87570-c64c-4211-984d-655f5e79bc6c> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/java/library/j-jws12/index.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00368-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.837213 | 3,240 | 2.53125 | 3 |
Skip The Words - Give Me Videos
or Become a Research Partner
Do you know that smoking causes cancer? Specifically smoking behavior is found to be highly correlated with cancer. Experts over the years have gained a good understanding about the various mechanisms that initiates cancerous growth. However what you need to ... | <urn:uuid:fb64a7ec-1659-4a2f-86a6-e252db0c9367> | CC-MAIN-2017-09 | http://ljean.com/awareness/awareness.php | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00544-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.896051 | 915 | 2.71875 | 3 |
Data centers require huge amounts of energy, and as the demand for new and updated data centers continues to grow, energy requirements could increase exponentially.
The Green Grid (TGG) is trying to counteract the growing energy demands by enabling IT leaders to employ proven sustainable solutions as they capitalize on... | <urn:uuid:56d411fa-23ab-4f8f-b6cc-51682c367991> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2497329/data-center/computerworld-honors-2013--measuring-the-sustainability-of-data-centers-worldwide.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00420-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940319 | 465 | 2.546875 | 3 |
Composition and use of milk products for young children: Updated recommendations of the Nutrition Committee of the German Society of Pediatric and Adolescent Medicine (DGKJ) [Zusammensetzung und Gebrauch von Milchgetränken für Kleinkinder: Aktualisierte Empfehlungen der Ernährungskommission der Deutschen Gesellschaft f... | <urn:uuid:fcd92d27-fe61-4526-a7fc-211b49dc6347> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/chausseestrasse-128-129-1598016/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00120-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.737727 | 417 | 3.078125 | 3 |
Today, many embedded devices rely heavily on SSL encryption through the use of hard-coded keys located within the device's firmware. In this scenario, all devices running a given firmware version are using the same private SSL key, resulting in a potential security vulnerability that could put data at risk.
As recently... | <urn:uuid:19e543ec-8b1d-4f20-bd42-751b99b7ca28> | CC-MAIN-2017-09 | https://www.mocana.com/blog/2010/12/20/potential-vulnerability-of-ssl-on-devices | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00120-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967496 | 216 | 2.6875 | 3 |
Apollo is the god of the sun, so why Cable and Wireless has chosen to name its new submarine transatlantic cable network after him is a mystery.
Cable and Wireless is working with Alcatel to build the new transatlantic system to meet increasing IP and data demands. When complete, the network will have four fiber pairs ... | <urn:uuid:445cb016-5cf7-4c9d-9d25-219859540b46> | CC-MAIN-2017-09 | https://www.cedmagazine.com/print/news/2001/01/new-transatlantic-cable-network-no-myth | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00540-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932173 | 192 | 2.5625 | 3 |
In preparation of your CCNA exam, we want to make sure we cover the various concepts that we could see on your Cisco CCNA exam. So to assist you, below we will discuss one of the more difficult CCNA concepts; RIP v1 and IGRP. As you progress through your CCNA exam studies, I am sure with repetition you will find this t... | <urn:uuid:e71cf4ec-d19b-4236-bff0-0f0e14c4538f> | CC-MAIN-2017-09 | https://www.certificationkits.com/rip1-igrp-ccna/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00468-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916472 | 1,339 | 2.703125 | 3 |
Jurisdiction: Livermore, Calif.; Monrovia, Calif.
Vendors: Amerigon, Allied Signal, Lawrence Livermore National Laboratory.
Contact: Stephen Wampler, senior public information officer, Lawrence Livermore National Laboratory, 510/423-3107.
LIVERMORE, Calif. - Radar, a bane to many highway speeders, may soon become a dri... | <urn:uuid:2dadfa8c-7981-4d0e-b832-3bc49d78dbcb> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Tiny-Radar-Could-Save-Lives.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00412-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960445 | 1,024 | 2.75 | 3 |
Computer viruses and other malware such as worms, trojans and spyware, are rife and can cause tremendous damage to systems that become infected. Because of this, anti-virus (AV) technology is one of the most commonly deployed security controls used by the vast majority of computer users, from individuals to large organ... | <urn:uuid:9e09705b-bd79-4074-84d7-96b67b57e0d3> | CC-MAIN-2017-09 | https://www.bloorresearch.com/blog/security-blog/anti-virus-alone-is-a-poor-strategy/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00640-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963342 | 1,348 | 3.21875 | 3 |
Tambling C.J.,Nelson Mandela Metropolitan University |
Minnie L.,Nelson Mandela Metropolitan University |
Meyer J.,George Mason University |
Meyer J.,Davee Center for Epidemiology and Endocrinology |
And 4 more authors.
Behavioral Ecology and Sociobiology | Year: 2015
The response of prey to predation risk varies throu... | <urn:uuid:a20c4262-4e3c-4950-a9f2-cba6473c525a> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/addo-elephant-national-park-1220941/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00584-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943191 | 892 | 2.65625 | 3 |
This white paper provides insight into voice quality and the different methods to measure voice quality.
Voice over IP (VoIP) has passed its infancy stage and is a mature technology that has been widely adopted by customers hoping to take advantage of the cost savings offered by VoIP in addition to a range of advanced ... | <urn:uuid:6087f25f-8b77-4667-9e2f-29baf792b62e> | CC-MAIN-2017-09 | http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/prime-unified-service-monitor/deployment_guide_c07-705322.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00108-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.876852 | 13,677 | 3.03125 | 3 |
NASA seeks new projects for malfunctioning Kepler
- By Frank Konkel
- Aug 13, 2013
There were promising signs when NASA first tried to resurrect its crippled Kepler telescope in late July, but the space agency is seeking alternative plans in case a fix isn't possible.
NASA engineers have put out a request for new missi... | <urn:uuid:65091238-2d56-4d81-beb0-588b8b909e2a> | CC-MAIN-2017-09 | https://fcw.com/articles/2013/08/13/kepler.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00284-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946282 | 474 | 2.515625 | 3 |
Using a WDM(Wavelength Division Multiplexing) for expanding the capacity of the fiber to carry multiple client interfaces is a highly advisable way as the physical fiber optic cabling is not cheap. As WDM widely used you must not unfamiliar with it, it is a technology that combines several streams of data/storage/video... | <urn:uuid:88094cfd-e33c-4663-a903-9cb42db8fe6f> | CC-MAIN-2017-09 | http://www.fs.com/blog/multiplex-your-fiber-by-using-cwdm-or-dwdm.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00336-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.922388 | 1,049 | 3.046875 | 3 |
The automotive industry is on the cusp of a driverless revolution, with actual driverless vehicles being tested on the road.
Now the aviation industry is debating whether pilotless planes make sense.
While the notion of fully automated commercial planes no doubt has been previously kicked around, last month's Germanwin... | <urn:uuid:475e0ec5-7eb8-4587-9757-247caa3a2c24> | CC-MAIN-2017-09 | http://www.itnews.com/article/2906766/would-you-fly-in-a-plane-with-no-human-pilots.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00512-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955462 | 381 | 2.640625 | 3 |
SNMP for Everybody
Managing a small network isn't all that difficult. When something doesn't work, it's usually obvious where the fault lies. But even for a small network, having some kind of management and monitoring in place is helpful. As your network grows, it becomes even more important to have some tireless autom... | <urn:uuid:dffc95ad-5e7b-4bee-bde5-213fd069e028> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netsysm/article.php/3660916/SNMP-for-Everybody.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00105-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.921698 | 1,494 | 2.578125 | 3 |
The fastest computer in the world today can deliver about 125 petaflops of performance, but that could quadruple in the coming years.
Cray's XC50, announced Monday, can deliver a petaflop of performance in a single box, and up to 500 petaflops for an entire supercomputer. A supercomputer is typically multiple servers -... | <urn:uuid:de21c0d5-4c35-4265-a88c-8d1d075f0562> | CC-MAIN-2017-09 | http://www.itnews.com/article/3141447/high-performance-computing/cray-aims-for-the-500-petaflop-mark-with-xc50-supercomputer.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00457-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934713 | 546 | 2.703125 | 3 |
Software-defined storage (SDS) abstracts storage services from the physical storage hardware and allows them to run on a dedicated appliance or as a virtual machine. It essentially replaced the features that were already there -- like LUN masking, snapshots, and replication -- and lets those features be commonly applie... | <urn:uuid:7f415751-449d-4c16-986b-42514cf2f2af> | CC-MAIN-2017-09 | http://www.networkcomputing.com/storage/what-hyper-converged-storage/727878319?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00633-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952287 | 768 | 2.6875 | 3 |
Many different security technologies are built upon the premise of recognizing potentially malicious activity and stopping it before it can do harm. How they recognize these activities though is what separates detection from false alarms and security from catastrophe. The most common form of recognition is signature or... | <urn:uuid:daf966fc-94b2-462e-be57-0d6f4c4cb1e8> | CC-MAIN-2017-09 | https://www.alertlogic.com/blog/anomaly-detection-emerges-as-a-new-approach-to-threat-management/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00209-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.949689 | 732 | 2.640625 | 3 |
You know a technology is going mainstream when Microsoft, Cisco, IBM, VMware and Red Hat all make big announcements about embracing it. Such is the case with containers.
But as containers have grown in popularity among developers during the past year, I still get asked by people, “What are containers?” There still seem... | <urn:uuid:90fd58b7-063d-4250-870b-a8e614666740> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2601434/cloud-computing/faq-containers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00153-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944474 | 863 | 2.75 | 3 |
As the apparel industry is aware, the length of the supply chain (from natural fiber, polymer resin or other material, all the way to finished clothing) is quite long. Because of the numerous processing steps involved in garment production, often conducted by different suppliers, the major environmental impacts of prod... | <urn:uuid:fe91b17e-e08a-4ece-851c-de796717a780> | CC-MAIN-2017-09 | http://apparel.edgl.com/news/sustainable-textiles-begin-with-a-sustainable-supply-chain89270 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00029-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953902 | 1,060 | 2.625 | 3 |
The Problem With Common Two-Factor Authentication Solutions
More websites and online businesses today are beginning to rely on smartphones as a second factor of authentication.
Some online banks have been using SMS-based authentication for transaction verification but recently, major websites and businesses not in regu... | <urn:uuid:35129b31-245a-4d89-8dee-3cefe134fd62> | CC-MAIN-2017-09 | http://www.infosecisland.com/blogview/13734-The-Problem-with-Two-Factor-Authentication-Solutions.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00029-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928719 | 887 | 2.59375 | 3 |
Sustainability consultants develop and implement energy-efficient strategies to help reduce a company’s overall carbon footprint. But designing environmentally sustainable solutions isn’t their only purpose. Their implemented policies can improve a company’s performance while drastically reducing costs on utilities and... | <urn:uuid:05fafd1c-4ded-4d8f-9276-d47447b90ee9> | CC-MAIN-2017-09 | http://www.internap.com/2015/11/10/sustainability-consultant/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00205-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918729 | 479 | 3.046875 | 3 |
“Digital citizenship is a concept that helps teachers, technology leaders and parents to understand what students, children and technology users should know to use technology appropriately. Digital citizenship is more than just a teaching tool; it is a way to prepare students and technology users for a society full of ... | <urn:uuid:3b130986-77cd-461b-9661-a9bf2ed3dc98> | CC-MAIN-2017-09 | https://www.imperosoftware.com/creating-good-digital-citizenship-in-and-out-of-school-with-real-time-monitoring/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00205-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928382 | 930 | 3.609375 | 4 |
Schools and libraries are hurting students by setting up heavy-handed Web filtering software that block access to potentially educational sites. Instead, educators should trust teachers and librarians to oversee schools Internet access, says Craig Cunningham, a professor at National-Louis University.
Web filtering soft... | <urn:uuid:2e6fd519-43a0-43ff-b86e-a4f2585ae502> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2468124/endpoint-security/a-simple-fix-for-internet-censorship-in-schools.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00501-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964654 | 681 | 2.75 | 3 |
WolframAlpha has been generating a low-frequency buzz lately. A lot of people might have heard it’s coming but still have no idea what it is. A lot of people hear that it’s a new search engine, but it’s more than that. Still others, have not heard about it at all.
What is WolframAlpha and why is it worth getting excite... | <urn:uuid:d7a61c46-bed0-40e0-a2fd-d2c82fc0e400> | CC-MAIN-2017-09 | https://www.404techsupport.com/2009/05/wolframalpha-finally-a-search-engine-for-the-mad-scientist/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00501-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929874 | 667 | 2.765625 | 3 |
As with any innovation or trend, as the Internet of Things (IoT) matures, we will see some ingenious applications for IoT devices and data. But we also will see some ignoble ones as well.
For example, IoT projects on Kickstarter include a smart trash can that can alert you when to take out the garbage, a smart jump rop... | <urn:uuid:192b6900-f8a6-4f5b-aa8a-819091d565fe> | CC-MAIN-2017-09 | http://data-informed.com/silly-iot-projects-and-growing-heterogeneous-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00377-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943925 | 922 | 2.8125 | 3 |
Using a hierarchical structure, treemaps provide meaningfully organized displays of high-volume information.
Alert naturalists scan the forests and the trees, taking in the overview and noticing seasonal changes while being on the lookout for fires. They also are watching for insect invasions that could damage trees, a... | <urn:uuid:439691de-215f-407e-a185-ab074e55204e> | CC-MAIN-2017-09 | http://dssresources.com/papers/features/shneiderman/shneiderman06232006.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00377-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926375 | 1,940 | 2.578125 | 3 |
Jobs Never Forgave Googles Eric Schmidt for Backing Android
In reality, the iPhone, as nice as it is, is derivative of the products that preceded it in the market. While Apple did a beautiful job of the user interface, and made a device that's attractive enough to garner a gazillion followers and an ecosystem that was ... | <urn:uuid:c8a4369e-7ab2-49aa-b01c-0a7b79706776> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Mobile-and-Wireless/Why-Steve-Jobs-Was-Wrong-About-Android-Being-a-Stolen-Product-221142/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00377-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.978456 | 276 | 2.5625 | 3 |
Servers occupy a place in computing similar to that occupied by minicomputers in the past, which they have largely replaced. The typical server is a computer system that operates continuously on a network and waits for requests for services from other computers on the network. Many servers are dedicated to this role, b... | <urn:uuid:ddbaa0aa-dea2-477d-bbf1-0b79155ff484> | CC-MAIN-2017-09 | http://research.crn.com/technology/networking/servers | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00021-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91912 | 930 | 3 | 3 |
First there's a little stutter. Next a program hangs, and a funny noise creeps from your machine. Then that familiar blue screen slaps you in the face. Your computer just crashed, and all you can do is sit in the awkward silence of a restart, and hope it wasn't fatal.
There are many possible causes for these hellish ep... | <urn:uuid:34c3045d-9997-4f61-ac1c-67636bb45360> | CC-MAIN-2017-09 | http://www.itworld.com/article/2715178/hardware/anatomy-of-a-pc-crash--7-scenarios--and-how-to-avoid-them.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00545-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940262 | 657 | 2.5625 | 3 |
The UC Berkeley Seismological Laboratory issued an alert about the recent earthquake in California's Napa Valley 10 seconds before it struck. That may not seem like much time -- unless you're a child of the 1950s and 1960s who was trained in school to duck and cover the second you saw a large bright nuclear flash.
Eart... | <urn:uuid:d4e0752e-3fa9-4e51-90e6-07a87e9e9e94> | CC-MAIN-2017-09 | http://www.cio.com/article/2600612/disaster-recovery/in-earthquakes-alerts-may-turn-machines-into-action-heroes.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00541-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956189 | 949 | 3.265625 | 3 |
WASHINGTON, DC--(Marketwired - November 11, 2016) - In honor of Veterans Day, 18 new World War II lesson plans are being released on the award-winning, ABMCeducation.org. This free resource for teachers was produced out of a partnership between National History Day®, the American Battle Monuments Commission (ABMC), and... | <urn:uuid:a5af7036-3a01-43bd-a56b-e6c9ff1c4180> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/award-winning-website-premieres-new-free-teacher-resources-2174943.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00593-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.923087 | 848 | 3.140625 | 3 |
Bridging is a method of path selection that contrasts with routing.
In a bridged network, no correspondence is required between addresses and paths. Put another way, addresses don't imply anything about where hosts are physically attached to the network. Any address can appear at any location. In contrast, routing requ... | <urn:uuid:28ee483a-7e36-4d58-bdc9-8427e987c812> | CC-MAIN-2017-09 | https://www.certificationkits.com/cisco-bridging/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00469-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943303 | 1,317 | 4.25 | 4 |
New Research Gives Hard Numbers on How Cloud Computing Improves Environment
The study assessed the carbon footprint of server, networking and storage infrastructure for three different deployment sizes.Researchers are now compiling hard numbers that prove running enterprise applications in the cloud actually does compl... | <urn:uuid:39f929de-56e8-404c-94b3-cffb0352528a> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Cloud-Computing/New-Research-Gives-Hard-Numbers-on-How-Cloud-Computing-Improves-Environment-578989 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00289-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.891617 | 292 | 2.796875 | 3 |
The march of technology continues to accelerate, and we must respond. The response has to be: Feed the screens.
A couple of decades ago, while driving through New York City, I wondered if there were more bricks in the world than transistors. I have no idea why such a question entered my mind. My best guess is I was thi... | <urn:uuid:3236ee4c-8470-4565-9727-2bb3ecb6eac8> | CC-MAIN-2017-09 | https://www.cedmagazine.com/article/2012/08/cicioras-corner-feed-screens | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00109-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96423 | 1,079 | 2.671875 | 3 |
Amnesty International is using satellite cameras to monitor highly vulnerable villages in war-torn Darfur, Sudan. The human rights organization is inviting ordinary people worldwide to monitor 12 villages by visiting the Eyes on Darfur project Web site and put the Sudanese Government on notice that these and other area... | <urn:uuid:ec742bf1-b5b0-4dc8-b8f8-056154f98922> | CC-MAIN-2017-09 | http://www.govtech.com/geospatial/Amnesty-International-Adopts-Powerful-Technology-in.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00285-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940407 | 549 | 2.671875 | 3 |
One useful definition for the unstructured data that underlies most existing and theoretical big data projects is that it was often collected for some purpose other than what the researchers are using it for.
That definition was provided by Chris Barrett, executive director of the Virginia Bioinformatics Institute duri... | <urn:uuid:bc006de0-c377-4847-b15c-eb6f4bd35195> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2014/04/limits-big-data-social-science/81940/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00161-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.96188 | 569 | 2.921875 | 3 |
IBM may be onto something with its predictions. In 2010, the tech giant predicted that within five years there will be mobile phones that project holographic images of callers. It also envisioned the popularization of 3D imaging technology in flat panel televisions and video chat in mobile phones. It's that time of yea... | <urn:uuid:17a7c0bc-a19c-44ec-b587-ae6e1b3c33ae> | CC-MAIN-2017-09 | http://www.govtech.com/IBM-Five-Predictions-for-2017.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00334-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916789 | 346 | 2.765625 | 3 |
When reports of the Dark Seoul attack on South Korean financial services and media firms emerged in the wake of the attack on March 20, 2013, most of the focus was on the Master Boot Record (MBR) wiping functionality. PCs infected by the attack had all of the data on their hard drives erased. McAfee Labs, however, has ... | <urn:uuid:da307667-2a60-4ddc-ae18-d5dbca6fc16a> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/07/08/dissecting-operation-troy-cyberespionage-in-south-korea/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00210-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946488 | 1,161 | 2.96875 | 3 |
Any questions? Ask Google. In the time of authority crisis, it’s the only place left where people want to seek the answers. It looks as if after a magical gate, unimaginable amount of knowledge was hidden and the only key to access it, was placed just next to the colorful “g” letter in the corner of our web browsers. I... | <urn:uuid:d849ac6a-302c-4174-bd30-30b978e8f796> | CC-MAIN-2017-09 | https://www.codetwo.com/blog/which-universe-is-bigger-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00154-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946104 | 494 | 2.671875 | 3 |
Flash! Supercomputing goes solid-state
Lawrence Livermore lab is shaping the next generation of supercomputers
- By Henry Kenyon
- Jun 24, 2010
A prototype computer system is demonstrating the use of flash memory in supercomputing. The Hyperion Data Intensive Testbed at Lawrence Livermore National Laboratory uses more ... | <urn:uuid:f370b4df-6028-4bec-8f42-28f97d8fd80c> | CC-MAIN-2017-09 | https://gcn.com/articles/2010/06/24/lawrence-livermore-hyperion.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00030-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918728 | 943 | 2.875 | 3 |
Inline asm: manually encoding instructions
billo 120000DT0E Comment (1) Visits (5362)
The basic premise of inline asm is to be able to write assembly code within your C or C++ program (using asm operands to connect the asm code to the parent program), delegate the translation of that assembly to the compiler and/or the... | <urn:uuid:ede943bb-52c3-47f1-8c53-f7855518c55f> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/5894415f-be62-4bc0-81c5-3956e82276f3/entry/inline_asm_manually_encoding_instructions10?lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00206-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.912224 | 1,193 | 3.1875 | 3 |
Multi-Protocol Label Switching (MPLS) was created to improve packet performance in the core of the networks and is widely used for that purpose. It has also been adapted for other use cases, and one of the most important is traffic engineering.
If you already have MPLS deployed in your network -- perhaps for a VPN -- M... | <urn:uuid:e9db05bd-b190-4dec-8fe8-4c59b377ced2> | CC-MAIN-2017-09 | http://www.networkcomputing.com/networking/mpls-traffic-engineering-tunnel-setup/442703769?piddl_msgorder=thrd | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00502-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934056 | 1,014 | 2.703125 | 3 |
Slamming a vehicle into an elk or deer is more harmful for humans than many realize. These creatures cause approximately 1.5 million collisions each year, resulting in around 150 deaths, according to the Insurance Institute for Highway Safety. Another 10,000 people suffer injuries from collisions with the animals.
Anim... | <urn:uuid:489e1ff7-b111-403f-ad40-a7e4e9e421de> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/GIS-Maps-Prevent-Vehicle-Collisions-with.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00026-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966609 | 1,449 | 2.984375 | 3 |
Shortly after an EF5 tornado flattened Moore, Oklahoma, this past May, the Department of Homeland Security called Jim Lux at NASA's Jet Propulsion Lab. "We were asked to come out with our machine," Lux says. The machine in question unfortunately wasn't ready. It will be next time.
Short for "Finding Individuals for Dis... | <urn:uuid:8cec2d38-552b-416f-8588-156a0e3ed59c> | CC-MAIN-2017-09 | http://www.nextgov.com/defense/2013/09/nasa-machine-can-detect-human-heartbeat-under-30-feet-rubble/70482/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00022-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965922 | 251 | 2.875 | 3 |
As we know, fiber optic connector is an important fiber optic component used to link two fiber optic lines together. Beside connector, there is also another item, which is fiber optic adapter with panels to connecting multi fiber optic line. Specifically, the fiber optic adapter is a small device that used to terminate... | <urn:uuid:ded29d6b-820f-41ef-9bad-d390fac2f16c> | CC-MAIN-2017-09 | http://www.fs.com/blog/how-to-choose-the-fiber-optic-adapter.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00550-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.891484 | 591 | 2.53125 | 3 |
Avoiding Thin Ice
The idea of driving a truck across a frozen expanse of water may sound a little iffy to people living in warmer climates. But ice bridges, which traverse rivers and lakes, and ice roads, which travel along frozen rivers, are common transportation links in the northern regions of Canada, Alaska, Europe... | <urn:uuid:5fe880f1-2642-4c21-8a44-b84c5c75819b> | CC-MAIN-2017-09 | http://www.govtech.com/public-safety/99403654.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00550-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965299 | 1,415 | 2.984375 | 3 |
Everything You Wanted to Know About Blockchain
Potential Impacts of Blockchains
Reducing paperwork in the transaction pipeline reduces processing time with huge volumes of transactions. As long as transactions can be validated automatically then Blockchains can be used to process them. This means that Blockchains will ... | <urn:uuid:a0596f35-70ee-43b5-9967-22b088db9211> | CC-MAIN-2017-09 | http://ibmsystemsmag.com/aix/trends/whatsnew/blockchain/?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00370-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951901 | 768 | 2.5625 | 3 |
All murderers have an important and obvious thing in common: They have deliberately taken at least one human life. But researchers are discovering vast differences between the minds of impulsive killers and premeditated murderers. "Impulsive murderers were much more mentally impaired, particularly cognitively impaired,... | <urn:uuid:530edb2c-cf2a-4506-aac3-8e1edeeb869f> | CC-MAIN-2017-09 | http://www.itworld.com/article/2706637/hardware/understanding-the-minds-of-murderers.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00546-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952244 | 376 | 2.625 | 3 |
The latest tools from Apple have the potential to drive the educational digital shift and transform classroom practices. But, with any advancement in education technology comes the concerns of misuse or propagating inferior teaching habits. When technology like Apple’s Classroom app can improve the way teachers teach a... | <urn:uuid:26c0d734-6a22-44a7-9396-e7c43062b223> | CC-MAIN-2017-09 | https://www.jamf.com/blog/dont-fear-the-screen-how-screen-sharing-benefits-teachers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00070-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940945 | 584 | 2.984375 | 3 |
How Hadoop WorksBy David F. Carr | Posted 2007-08-20 Email Print
Initiative for distributed data processing may give the No. 2 search service some of the "geek cred" it's been lacking.
The Hadoop runtime environment takes into account the fact that when computing jobs are spread across hundreds or thousands of relative... | <urn:uuid:e0a05dcd-9591-411d-a086-673a3681f88e> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Projects-Enterprise-Planning/Yahoo-Challenge-to-Google-Has-Roots-in-Open-Source/2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00542-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954458 | 683 | 2.5625 | 3 |
Energy aims to retake supercomputing lead from China
Department's next high-performance system, being built by IBM, expected to surpass the current leader
- By Henry Kenyon
- Feb 11, 2011
China currently holds the lead position for the world’s fastest supercomputer, but not for long. The U.S. is working on a new class ... | <urn:uuid:90d91c17-8221-4702-b79d-3b63c130055d> | CC-MAIN-2017-09 | https://gcn.com/articles/2011/02/11/energy-supercomputer-to-break-performance-records.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00118-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.919184 | 586 | 2.921875 | 3 |
Image via CrunchBase
On Thursday, the world learned that attackers were breaking into computers using a previously undocumented security hole in Java, a program that is installed on hundreds of millions of computers worldwide. This post aims to answer some of the most frequently asked questions about the vulnerability,... | <urn:uuid:63abd15e-bd52-4bdc-9d80-a60dbdb21c0f> | CC-MAIN-2017-09 | http://blog.alertsec.com/2013/02/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00642-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.92723 | 1,717 | 2.796875 | 3 |
Global cloud computing traffic is expected to grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015 — a 66% compound annual growth rate — according to Cisco's Global Cloud Index. 1.6 zettabytes is approximately equivalent to 22 trillion hours of streaming music; 5 trillion hours of business... | <urn:uuid:5fb12c26-8085-4a90-8b10-6f3c7fe3845d> | CC-MAIN-2017-09 | http://www.circleid.com/posts/20111130_cloud_computing_traffic_expected_to_grow_12_fold_by_2015/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00586-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.790241 | 319 | 2.515625 | 3 |
By Sam Grobart
June 13, 2013
The age of wearable computing is upon us: There are now wristbands from Nike (NKE), clip-on devices from Fitbit, and eyewear from Google (GOOG). We’ve come this far because we’ve been able to shrink computing power from something the size of a room to a box that sat atop a desk, to a smalle... | <urn:uuid:9fcff713-b657-45e6-bdcc-7c002b079944> | CC-MAIN-2017-09 | http://www.northbridge.com/mc10s-biostamp-new-frontier-medical-diagnostics | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00586-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93792 | 1,200 | 2.875 | 3 |
Using bioinformatics tools, cancer researchers can now search for common protein markers shared among afflicted patients. The process involves tracking thousands of proteins over a course of the disease and identifying the ones that map to patient survival. In a recent study, researchers believe they have a better chan... | <urn:uuid:a022cac1-edec-4562-b8a6-ad4e6d127945> | CC-MAIN-2017-09 | https://www.hpcwire.com/2012/05/23/can_googles_page_ranking_algorithm_cure_cancer_/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00462-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939105 | 547 | 3.359375 | 3 |
During the Great Depression, President Franklin Delano Roosevelt conceived of Social Security as a program for senior citizens, the disabled, the unemployed, widows and orphans who lacked financial protection. However, when Roosevelt signed the Social Security Act into law in August, 1935, the document did not say how ... | <urn:uuid:c17c655d-cc5e-4f57-95b1-aca2a272ca02> | CC-MAIN-2017-09 | https://www.ibm.com/blogs/citizen-ibm/2012/06/social-security-turns-75-the-mother-of-all-big-data-projects.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00162-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.971171 | 868 | 3.703125 | 4 |
Public health officials face ongoing challenges in identifying, preparing for, and managing outbreaks of diseases and other illnesses. The Centers for Disease Control and Prevention (CDC) have released a newly developed Community Assessment for Public Health Emergency Response (CASPER) toolkit to help epidemiologists a... | <urn:uuid:a1f136ef-4de9-4d33-8e62-2d1062897f30> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/city-saves-time-and-money-completing-survey-0001 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00211-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925413 | 266 | 3.28125 | 3 |
Ettercap Automates the Malicious Middleman
Man in the middle (MITM) attacks can be devastatingly effective, providing hackers with all kinds of confidential information and, just as seriously, giving them the opportunity to feed false information to victims.
These attacks involve a hacker diverting packets which are me... | <urn:uuid:138f29b2-c0b5-4f8d-8bd0-fcf25dd026d7> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netos/article.php/3724916/Ettercap-Automates-the-Malicious-Middleman.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00631-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935542 | 2,055 | 2.75 | 3 |
John Matherly’s Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts (e.g. patching), finding malware C&C servers, checking how a company we want to do business with is handling security, checking which devices our compet... | <urn:uuid:e3eff941-80cc-4ba9-8914-e9ade1d45275> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2015/06/09/iot-is-full-of-gaping-security-holes-says-shodan-creator/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00207-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955913 | 910 | 2.53125 | 3 |
DARPA seeks ways to rebuild space junk
- By Henry Kenyon
- Jan 20, 2012
The Defense Department’s research and development shop is developing a new method to get more detailed images of orbiting satellites.
Better imaging would allow the DOD to select dead or deactivated spacecraft for a related program that would use r... | <urn:uuid:667b7c81-2106-4930-a2af-38db9aed672e> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/01/20/darpa-to-develop-better-ways-to-view-satellites-in-orbit.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00151-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931391 | 559 | 3.03125 | 3 |
MikroTik Traffic-Flow is a system that provides statistic information about packets which pass through the router. Besides network monitoring and accounting, system administrators can identify various problems that may occur in the network. With help of Traffic-Flow, it is possible to analyze and optimize the overall n... | <urn:uuid:1fb75590-dbe8-4f4f-bf5c-23dbe8da6fea> | CC-MAIN-2017-09 | http://www.netflowauditor.com/forum/viewtopic.php?f=42&t=157 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00327-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.840998 | 789 | 2.6875 | 3 |
Material shows potential for data storage in flash memories
South Korean researchers have used graphene quantum dots instead of nanocrystals as the discrete charge trap material for storing data in commercial flash memories.
The researchers, Soong Sin Joo, et al., at Kyung Hee University and Samsung Electronics, based ... | <urn:uuid:c3c3b4eb-fbf0-49c9-bcb3-ff9ee773d93a> | CC-MAIN-2017-09 | http://www.cbronline.com/news/enterprise-it/storage/south-korean-researchers-use-graphene-for-data-storage-190614-4297567 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00555-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940466 | 397 | 3.1875 | 3 |
Why Use R? - Page 4
Connections With R
So far the tools I've mentioned have been focused on the database portion of the problem -- gathering the data and performing some queries. This is a very important part of the Big Data process (if there is such a thing), but it's not everything. You must take the results of the q... | <urn:uuid:06f53fcd-79d8-4419-a2eb-b87a48f7ae87> | CC-MAIN-2017-09 | http://www.enterprisestorageforum.com/storage-management/why-use-r.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00023-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955377 | 821 | 2.640625 | 3 |
Feeling under the weather? You’ve probably looked up your symptoms on the Internet and self-diagnosed your ailment, according to a new report released by the Pew Research Center’s Internet and American Life Project.
The survey found that 72 percent of U.S adults with Internet access looked online for health information... | <urn:uuid:388c3138-5828-4834-a1bf-bca4dce47892> | CC-MAIN-2017-09 | http://www.nextgov.com/health/health-it/2013/01/prescription-strength-google/60673/?oref=ng-channelriver | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00375-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.966705 | 395 | 2.78125 | 3 |
Before Americans can realize Newt Gingrich's dream of building a moon colony, they must first send other living things to the rocky celestial body to test whether long-term survival is possible.
NASA plans to start by gardening on the moon. Studying plant growth, known as germination, in the lunar environment can help ... | <urn:uuid:043d22b1-deb6-434c-9fa8-54523466940a> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2013/12/nasa-sending-basil-moon/74945/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00551-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948406 | 443 | 4.1875 | 4 |
Motion detection is an important element of many, if not, most surveillance systems. It plays a central role in both storage search time reduction. Storage is routinely reduced by 30% - 80% by using motion based rather than continuous recording. Likewise, an investigator can often much faster find a relevant event by s... | <urn:uuid:90b9aac1-786a-40f1-a438-ef229efd4668> | CC-MAIN-2017-09 | https://ipvm.com/reports/motion-detection-performance-tested | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00551-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.956949 | 376 | 2.921875 | 3 |
HTML 5: What's new about it?
Precise elements and application programming interfaces
- By Joab Jackson
- Aug 28, 2009
HTML 5 will maintain backward compatibility with all former versions, while cleaning up some ambiguities of the previous version of the markup language. It will also offer a number of new elements, or m... | <urn:uuid:8f4a7eb1-b2f8-4c82-a6ab-a5e80f981c26> | CC-MAIN-2017-09 | https://gcn.com/articles/2009/08/31/html-5-sidebar-new-elements.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00075-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.823421 | 531 | 3.09375 | 3 |
Distributed denial of service is a type of DoS attack where multiple compromised systems, which are often joined with a Trojan, are used to target a single system causing an attack.
The DDoS attack itself may be a bit more sinister, according to NSFOCUS IB. A DDoS attack is an attempt to exhaust resources so that you d... | <urn:uuid:fb2a3b30-e664-45f8-b114-d5461f161229> | CC-MAIN-2017-09 | http://www.csoonline.com/article/3036742/advanced-persistent-threats/ddos-attacks-how-to-mitigate-these-persistent-threats.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00251-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953072 | 808 | 2.703125 | 3 |
A U.S. soldier is on patrol with his squad when he kneels to check something out, unknowingly putting his knee into a puddle of contaminants.
The soldier isn't harmed, though, because he or she is wearing a smart suit that immediately senses the threat and transforms the material covering his knee into a protective sta... | <urn:uuid:936a766d-b27e-4d9a-ad36-e8be456bbd17> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2175393/data-center/gov--39-t-developing-smart-suits-to-protect-u-s--troops-from-bio-attacks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00123-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961629 | 1,103 | 2.984375 | 3 |
Transportation researchers affiliated with the University of California, Berkeley, have used roadway sensor data to come to a surprising conclusion: Discontinuing a program that gave solo drivers of hybrid vehicles access to carpool lanes has slowed traffic in all lanes.
Conventional wisdom would lead one to believe th... | <urn:uuid:cddad4ea-e9ea-4ab5-a60c-9dfc5418d8d9> | CC-MAIN-2017-09 | http://www.govtech.com/transportation/Kicking-Hybrids-from-Carpool-Lanes-Slows-Traffic.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00243-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965962 | 588 | 2.9375 | 3 |
National Cyber Security Month, celebrated every October, is history.
Did you implement any special awareness activities for your employees? At a minimum, did you require that your employees change their passwords?
Check out these facts from the Multi-State Information Sharing and Analysis Center:
- During 2010, more th... | <urn:uuid:0bd02369-3ef8-40af-a974-c8ce6c6c0f53> | CC-MAIN-2017-09 | http://www.infosecisland.com/blogview/17813-Did-You-Take-the-National-Cyber-Pledge-During-October.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00419-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.866494 | 550 | 2.9375 | 3 |
Cell, AMD Chips to Power New IBM Supercomputer
For the past three consecutive years, a computer IBM built for the US Department of Energy called BlueGene/L, powered by over 131,000 massively parallel PowerPC processors, has reigned supreme over the Top 500 Supercomputers list, now published twice annually by the Univer... | <urn:uuid:9ca9a1e1-e19b-441d-a831-dfabec665201> | CC-MAIN-2017-09 | https://betanews.com/2006/09/07/cell-amd-chips-to-power-new-ibm-supercomputer/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00419-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951483 | 865 | 2.703125 | 3 |
As Storm Imogen hits south-west England and south and mid-Wales, 13,000 homes are left without any power. In fact, the Environment Agency has nearly sixty flood warnings in place and more than 170 flood alerts.
These storms are occurring more frequently with Storm Henry hitting recently and in early December, Storm Des... | <urn:uuid:766fb7b6-37c3-4eac-9cf0-6227ba092392> | CC-MAIN-2017-09 | http://www.information-age.com/weathering-storm-why-data-mapping-capabilities-are-key-catastrophe-planning-123460908/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00595-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945276 | 991 | 2.953125 | 3 |
California's judicial system -- with 170 courts spread over 158,000 square miles in 58 counties -- dwarfs that of many countries in size and complexity. Since this sprawling system costs California more than $1.5 billion a year, even small increases in efficiency can mean tremendous savings. And efficiency was a proble... | <urn:uuid:7901c82f-ed6b-46db-a1cf-2571cd448808> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Courts-Develop-Plans-for-2020.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00415-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.973833 | 1,604 | 2.53125 | 3 |
For the automotive and aerospace industries, crash and safety analysis by finite elements is used to shorten the design cycle and reduce costs. Recently, a popular crash/safety simulation set a new speed record. Over on the Cray blog, Greg Clifford, manufacturing segment manager at the historic supercomputing company, ... | <urn:uuid:81a86b4a-2885-4d07-ae4f-8bb0e0954fd2> | CC-MAIN-2017-09 | https://www.hpcwire.com/2014/05/08/safety-simulation-sets-speed-record/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00639-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91282 | 803 | 2.5625 | 3 |
Using the Pupil as a Crime-Fighting Tool
/ December 31, 2013
In the U.K., scientists are using the human pupil as a crime-fighting tool -- one that allows pinpointing the perpetrators by simply looking more closely at the reflections in their victim's eyes.
As was initially reported in the journal PLOSONE, the research... | <urn:uuid:1578d0f9-9577-4753-9149-ffcda729f0d0> | CC-MAIN-2017-09 | http://www.govtech.com/photos/Photo-of-the-Week-Using-the-Pupil-as-a-Crime-Fighting-Tool.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170569.99/warc/CC-MAIN-20170219104610-00284-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955123 | 185 | 3.15625 | 3 |
Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines, and fa... | <urn:uuid:04ac57f7-cd84-4f14-9a17-552cdb4bf133> | CC-MAIN-2017-09 | https://forensiccontrol.com/resources/beginners-guide-computer-forensics/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00212-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946125 | 3,047 | 3.359375 | 3 |
By Jolize Gerber, Healthcare Analyst, Frost & Sullivan
The Southern African Development Community (SADC) was formed with the vision of establishing a regional community that will ensure economic well-being and improve the standards of living and quality of life for the people of Southern Africa. However, what does the ... | <urn:uuid:5a5cad8f-7df4-42aa-b259-fde5479ed7bf> | CC-MAIN-2017-09 | https://www.frost.com/sublib/display-market-insight.do?id=209147778 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00212-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936625 | 313 | 2.828125 | 3 |
What did the rocket scientist say to the Free/Open Source Software developer? Let's do launch! It's only natural that they'd want to work together. Both communities are focused on the cutting edge: creating tools and capabilities that did not previously exist. Both dedicate their work to expanding humanity's pool of in... | <urn:uuid:f58e3ae2-febb-469f-bc31-ef148adc45ad> | CC-MAIN-2017-09 | http://www.cio.com/article/2438926/open-source-tools/open-source-software-and-its-role-in-space-exploration.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00456-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929716 | 2,815 | 2.578125 | 3 |
Universities and colleges are places of higher learning.
That doesn’t just mean for students. Some of the greatest discoveries of the 21st century have been made in staff and student research laboratories. In fact, U.S. universities received almost 70 billion dollars in funding for research in science and humanities la... | <urn:uuid:65a3f8c3-356b-41d7-9339-a63a66aa8e4f> | CC-MAIN-2017-09 | https://techdecisions.co/unified-communications/technology-education-can-improve-faculty-research/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00456-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948611 | 631 | 3.078125 | 3 |
The Non–Inverting Buffer
now spend some time investigating useful circuit elements
that do not directly implement Boolean functions.
The first element is the non–inverting buffer.
This is logically equivalent to two NOT gates in a row.
are engineering differences between the two, most notably that the
non–inverting buf... | <urn:uuid:e0a642c7-960a-4d6b-822f-d04c969501d7> | CC-MAIN-2017-09 | http://edwardbosworth.com/My5155_Slides/Chapter03/OtherCircuitElements.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00508-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916919 | 1,073 | 3.96875 | 4 |
Full disk encryption software uses a symmetrical encryption algorithm to encrypt every block on a hard disk or other persistent storage media (e.g., flash drives, etc.). The idea is that even if the storage device is lost or stolen, none of the contents of the filesystem will be compromised.
A key consideration with fu... | <urn:uuid:2a7dd9fa-a893-4461-b3f2-b2c8cd42a1c2> | CC-MAIN-2017-09 | http://hitachi-id.com/resource/concepts/full-disk-encryption.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00204-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.908844 | 378 | 2.890625 | 3 |
Voyager 2, one of two NASA spacecraft to travel farthest from Earth, marked 36 years in space Tuesday.
The spacecraft, which launched on Aug. 20, 1977 from Cape Canaveral, Fla., aboard a Titan-Centaur rocket, is more than 9 billion miles away from the sun, according to NASA.
Voyager 2, working in conjunction with its t... | <urn:uuid:a7d28805-685c-4dac-9fca-07809af1e49c> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2169227/data-center/nasa--39-s-voyager-2-marks-36-years-on-its-space-odyssey.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00024-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941808 | 507 | 3.734375 | 4 |
A quick pointer to today's A1 New York Times story on a phenomenon we've been following on this blog for the past year: as algorithmic entities explode across the web, humans remain central to their operation. Automation only goes so far and for all Watson's Jeopardy wins, there are still many, many tasks on which comp... | <urn:uuid:00f09d83-6d5f-448c-8e8d-7f42d239a886> | CC-MAIN-2017-09 | http://www.nextgov.com/emerging-tech/2013/03/best-intelligence-cyborg-intelligence/61816/?oref=ng-dropdown | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00252-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955933 | 241 | 2.734375 | 3 |
The patent application, filed in August and published today, summarizes the invention thus: "The portable computing device includes an enclosure that surrounds and protects the internal operational components of the portable computing device. The enclosure includes a structural wall formed from a ceramic material that ... | <urn:uuid:e7e0b0a4-566d-4f73-a374-9dd4944db1d0> | CC-MAIN-2017-09 | http://www.networkcomputing.com/wireless/apple-seeks-patent-wireless-handheld/1251957944 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00072-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953812 | 291 | 3.109375 | 3 |
By Panda Security
According to cloudcomputing.org , "Cloud Computing is a nebulous term covering an array of technologies and services including: grid computing, utility computing, Software as a Service (SaaS), storage in the cloud and virtualization. There is no shortage of buzzwords and definitions differ depending o... | <urn:uuid:e81cd02d-7339-4f2e-b6fe-883c8b5154d0> | CC-MAIN-2017-09 | https://www.bsminfo.com/doc/a-new-technological-paradigm-sets-the-trend-0002 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00120-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953542 | 145 | 2.640625 | 3 |
Researchers in the U.S. have developed integrated circuits that can stick to the skin like a child's tattoo and in some cases dissolve in water when they're no longer needed.
The "bio chips" can be worn comfortably on the body to help diagnose and treat illnesses, said John Rogers, a professor of materials science at t... | <urn:uuid:867deccc-dae5-43a1-9e3b-fa3c353f29e3> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2493667/healthcare-it/researchers-develop-featherweight-chips-that-dissolve-in-water.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00592-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95548 | 699 | 3.3125 | 3 |
TADOUSSAC, QUEBEC--(Marketwire - Oct. 10, 2012) - A three- or four-metre long white or greyish beluga whale has been seen several times near the Old Port since September 28. No photos have been taken yet, but the Québec Marine Mammals Emergency Network feels that these observations are reliable.
Where did this beluga c... | <urn:uuid:ad357b64-0c1d-449f-b952-4dc30954b7b0> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/beluga-sighting-in-montreal-1712010.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00116-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962484 | 540 | 3.1875 | 3 |
Cloud Computing to Slice Data Center Energy Consumption by 2020
Cloud computing is set to reduce data center energy consumption of 31% from 2010 to 2020, according to a recent report from Pike Research. Pike Research is a market research and consulting firm that provides in-depth analysis of global clean technology mar... | <urn:uuid:84589fe7-d1a1-4385-a728-c63d131ba99b> | CC-MAIN-2017-09 | https://cloudtweaks.com/2011/09/cloud-computing-to-slice-data-center-energy-consumption-by-2020/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00292-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952512 | 389 | 2.546875 | 3 |
PNRP – The Peer Name Resolution Protocol is new protocol made by Microsoft which is one of the first technology that will change the way we think about naming resolution in computer networking and possibly be the next DNS – Domain Name System like technology. PNRP is the new DNS but there are so much differences betwee... | <urn:uuid:bcfdec05-548f-45b2-a5cf-e63faf228efa> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/tag/name-resolution | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00292-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937558 | 401 | 3.671875 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.