text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Power Network Services with MySQL
Last week we learned how to create and populate a user authentication database. Today we'll dig into making changes, making backups, connecting to remote MySQL servers and plugging MySQL in to servers like Postfix and Samba.
In Part 1 we learned some commands for making changes to tabl... | <urn:uuid:5ed4aed1-17d6-4727-8ef7-0cbb0b9aa462> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/print/netos/article.php/3531076/Power-Network-Services-with-MySQL.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00464-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.845601 | 1,581 | 2.953125 | 3 |
The makings of a federal police e-academy
Training for federal law enforcement officers might soon incorporate many of the online technologies that universities have been using to make instruction more accessible, comprehensive and affordable.
John Besselman is leading a program at the Homeland Security Department’s Fe... | <urn:uuid:dac08fba-9d9f-4d66-a85a-9084dbf074b2> | CC-MAIN-2017-09 | https://fcw.com/articles/2008/11/17/the-makings-of-a-federal-police-eacademy.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95571 | 663 | 2.890625 | 3 |
In today’s market, segments of the broader IoT ecosystem have been underserved, especially small-to-medium businesses and mid-sized cities. However, this oversight will change over the next several years as these entities seek to embrace the efficiencies and cost reductions that enterprises and government agencies are ... | <urn:uuid:9dca2206-3fb7-4b8c-9ea4-186a835879f6> | CC-MAIN-2017-09 | http://www.iotevolutionmagazine.com/features/articles/429358-beyond-dns-why-iot-industry-should-create-its.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00516-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943952 | 846 | 2.859375 | 3 |
The recent hacking of the Associated Press’ Twitter account has begged the question, how secure are social media accounts? A study released by IObit reveals that 30% users always accept “Keep Me Logged-in” when they are logging into Facebook, Twitter, Pinterest and other social media sites. The study also found that 10... | <urn:uuid:52c5ee3c-bd48-45c9-b783-88ca55d0a8fe> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/05/07/many-social-accounts-are-still-in-danger/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00109-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955377 | 392 | 2.5625 | 3 |
Everyday Science Quiz Questions & Answers - Part 3
51. Question: Why is it less difficult to cook rice or potatoes at higher altitudes?
Answer: Atmospheric pressure at higher altitudes is low and boils water below 100oC. The boiling point of water is directly proportional to the pressure on its surface.
52. Question: W... | <urn:uuid:d9f6c337-dae3-4fa7-bac5-75ad9644e83d> | CC-MAIN-2017-09 | http://www.knowledgepublisher.com/article-647.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00461-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939247 | 1,483 | 3.265625 | 3 |
In order to protect your assets, you must first know what they are, where they are, and understand how they are tracked and managed. Are they secured? Who has access to them? Who tracks and manages them? Do you have functional procedures in place to respond and recover from a security breach quickly? Do you have a proc... | <urn:uuid:d97eece2-4387-443c-b789-9d8402314f3b> | CC-MAIN-2017-09 | http://blog.globalknowledge.com/2012/05/01/asset-protection-what-do-you-have/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00513-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930296 | 1,510 | 2.5625 | 3 |
Unmanned Aerial Vehicles
The Defense Department is increasingly using a technology known as UAVs -- commonly called "drones" -- in the Middle East. However, other agencies are using drones in other capacities, such as Homeland Security is also using them to patrol the border. The use of drones is controversial, as some... | <urn:uuid:f48f89a6-e1bc-4d9b-ae63-7c761e734c71> | CC-MAIN-2017-09 | http://www.nextgov.com/defense/unmanned-aerial-vehicle/55563/?oref=ng-trending | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00037-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.932683 | 1,025 | 2.75 | 3 |
Researchers from the U.S. Army Armament Research, Development and Engineering Center recently patented a new type of bullet capable of self-destructing after traveling over a predetermined distance.
The idea behind the new and advanced projectile is that it might help limit the extent of collateral damage (read: innoce... | <urn:uuid:ffa8fc59-e44f-4de6-ad67-3d8faecdfeea> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3037405/hardware/army-researchers-patent-self-destructing-bullet-designed-to-save-lives.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00333-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.929049 | 360 | 3.25 | 3 |
Path MTU Discovery
When a host needs to transmit data out an interface, it references the interface's Maximum Transmission Unit (MTU) to determine how much data it can put into each packet. Ethernet interfaces, for example, have a default MTU of 1500 bytes, not including the Ethernet header or trailer. This means a hos... | <urn:uuid:2708414c-cc41-4a7c-bc96-b9bf49b77d30> | CC-MAIN-2017-09 | http://wiki.nil.com/Path_MTU_Discovery | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00253-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.877036 | 842 | 3.375 | 3 |
History of malware
A brief history of viruses, worms and Trojans, part 3
In 1995 the first macro viruses appeared. Until that time, only executable files and boot sectors had been affected. Macro viruses placed ever higher demands on the detecting scanners. Melissa, Loveletter, Sobig et al. continue to set new speed re... | <urn:uuid:d4449437-8951-4e90-9594-9617fa38d06a> | CC-MAIN-2017-09 | https://www.gdata-software.com/seccuritylabs/information/history-of-malware/1996-today | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00073-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94374 | 2,800 | 2.796875 | 3 |
Cyber-attacks work the same way the Internet does, using the Domain Name System (DNS) to distribute malware, control botnets and phish login credentials. With the mainstream adoption of cloud services, bring-your-own-device programs and off-network workers, the attack surface has expanded beyond the traditional corpora... | <urn:uuid:c155eb8e-103f-4887-a7c0-9979016062ec> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2172911/tech-primers/secure-cloud-gateway--using-the-internet-to-fight-cyber-attacks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00249-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.887919 | 1,159 | 2.984375 | 3 |
Aug 14, 2012
Harvard Researchers Use D-Wave Quantum Computer to Fold Proteins
Paper published in Nature Scientific Reports shows that optimization problems in biophysics can be solved with a quantum computer.
Burnaby, BC - Milpitas, CA - August 14, 2012 - In a paper published yesterday in Nature Scientific Reports,http... | <urn:uuid:45f2d7a9-15b0-4faf-b175-78dcdefbf8ac> | CC-MAIN-2017-09 | https://www.dwavesys.com/news/harvard-researchers-use-d-wave-quantum-computer-fold-proteins | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00125-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917403 | 711 | 3.1875 | 3 |
A space-time cloak? Time holes? It's not science fiction anymore.
- By William Jackson
- Jan 06, 2012
In the “Star Trek” saga, the United Federation of Planets never figured out the cloaking technology that allowed Romulan warships to pop in and out of Federation space without being detected. But 21st-century Earth sci... | <urn:uuid:af1f1619-3336-441a-ac4e-9ae87ba0bb3e> | CC-MAIN-2017-09 | https://gcn.com/articles/2012/01/06/cybereye-hackers-could-exploit-space-time-cloak.aspx?admgarea=TC_EMERGINGTECH | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00245-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945798 | 716 | 3.03125 | 3 |
The U.S. military uses unmanned aerial vehicles of all sizes from the 4-pound, hand-launched Raven to the 15,000-pound Global Hawk that takes off and lands on a runway.
Most of the military’s mid-sized drones are fixed wing, which means they need launch and recovery mechanisms that often aren't available in the remote ... | <urn:uuid:25da221b-003d-47e7-9648-b6cc39420624> | CC-MAIN-2017-09 | http://m.nextgov.com/defense/2017/02/video-darpa-tests-drone-catching-prototype/135216/?oref=m-ng-channelriver | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00297-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.944152 | 167 | 2.5625 | 3 |
Shaders and Rendering
The surface of any object or character is described by a shader, whether it's intended for a game engine or a software renderer. For those who thought that was a texture's job, the texture is just a sub-node of a shader. A simple shader might have a diffuse color file texture with another texture ... | <urn:uuid:303270a4-3666-4a47-8ee6-a65cae049172> | CC-MAIN-2017-09 | https://arstechnica.com/apple/2010/09/an-intro-to-3d-on-the-mac-part-ii-animation-and-rendering/4/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00473-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934553 | 2,385 | 2.640625 | 3 |
Tech View: Technology for Making TV Viewing Easy
TV viewing has become harder. With massive amounts of available content—some homes have access to 400+ channels, a number that may rise soon to 1,000—and accessory devices such as set-top boxes, DVRs, converter boxes, TiVo®, and VCRs, watching and recording TV requires s... | <urn:uuid:9740dbd7-c30e-488c-9071-5be81e7bdba6> | CC-MAIN-2017-09 | http://www.research.att.com/articles/featured_stories/2009/200910_techview_tech_making_tv_viewing_easy.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00469-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950864 | 1,802 | 2.515625 | 3 |
Secure Sockets Layer (SSL) is a protocol designed to enable encrypted, authenticated connection across the Internet. SSL is used mostly in communication between web browsers and web servers. URL's that begin with 'https' indicate that an SSL connection will be used. Online shopping sites frequently use SSL technology t... | <urn:uuid:924aee45-8740-44e5-94b7-51b22ac0c944> | CC-MAIN-2017-09 | http://www.codero.com/knowledge-base/content/37/99/en/i-have-a-dedicated-server-how-can-i-install-my-commercial-ssl-certificate-on-my-server-using-plesk.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00169-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.854633 | 714 | 2.625 | 3 |
Cookies provide a method for creating a stateful HTTP session and their recommended use is formally defined within RFC2965 and BCP44.
Although they are used for many purposes, they are often used to maintain a Session ID (SID), through which an individual user can be identified throughout their interaction with the sit... | <urn:uuid:eb01cfea-1bf2-452d-ba54-f8b7469e3575> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2004/06/27/cookie-path-best-practice/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00169-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936829 | 259 | 3.140625 | 3 |
Excerpt from Chapter 6 of
Copyright © 2002 Addison-Wesley.
This paper was also published as an article in CSI’s Computer Security Journal, Summer 2002 (see Note 14).
Strong Password Policies
(I cheat and make all my computer accounts use the same password.)
– Donald A. Norman, The Design of Everyday Things
Since passwo... | <urn:uuid:3cdb439c-977c-4fd1-8a4a-d273129f51af> | CC-MAIN-2017-09 | https://cryptosmith.com/password-sanity/dilemma/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00165-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.934603 | 6,218 | 3.34375 | 3 |
Warnings are Futile if People Don't Respond
At the time, the PTWC was the only agency to detect that tragic event, but its warnings to governments surrounding the Indian Ocean went mostly ignored, with deadly results. Now, a warning system is in place, and for the moment, it's all run by the U.S. National Weather Servi... | <urn:uuid:e8353e96-ca30-46e3-9f67-0facccb5ebe1> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/IT-Infrastructure/Japan-Earthquake-Sends-Pacific-Tsunami-Warning-Data-Network-into-Action-104446/1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00462-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970638 | 554 | 2.90625 | 3 |
iOS vs. Android: Text selection and copying
iOS 4 makes it easy to edit text. Simply insert the text cursor where you want to make a change; iOS even magnifies the area you are touching to make the text more legible (upper left). When you tap and hold on text in any app, iOS provides selection handles and pop-up button... | <urn:uuid:c0c18754-b200-4e93-9371-28826eba2310> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2869706/network-security/mobile-deathmatch--apple-ios-4-vs--android-2-2--side-by-side.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00462-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.906476 | 171 | 2.578125 | 3 |
I will not, under any conditions, make some snarky Harry Potter quips here. Nor will I descend in to Star Trek analogies or Star Wars references.
What I will say is that scientists from Duke University have made history by making a cylinder disappear from a certain perspective by essentially bending light around the ob... | <urn:uuid:a3a8dfac-14ab-4dea-af62-5e5a598ca4ee> | CC-MAIN-2017-09 | http://www.cio.com/article/2370934/internet/duke-scientists-make-an-object--invisible-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00458-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950202 | 179 | 3.203125 | 3 |
Five Steps to Resolving Workplace ConflictBy Larry and Meagan Johnson | Posted 2010-12-21 Email Print
Conflicts often arise in a multigenerational environment, so it’s important for managers to understand the differences among age-groups.
For the first time in history, five generations are working side by side. Since c... | <urn:uuid:ff538e84-8e2c-400e-b52e-3805ba45abd0> | CC-MAIN-2017-09 | http://www.baselinemag.com/careers/Five-Steps-to-Resolving-Workplace-Conflict | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00634-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.946285 | 1,054 | 2.765625 | 3 |
Your Mobile Phone Is Safe - Don't believe virus hoaxes
06 Nov 2002
Kaspersky Lab brings attention to the spread of a rumor among Internet users regarding a new computer virus that infects mobile telephones and renders them junk. The message being sent around looks as follows:
If you receive a phone call and your mobile... | <urn:uuid:869f5584-9c91-40a8-a078-4636db86870b> | CC-MAIN-2017-09 | http://www.kaspersky.com/au/about/news/virus/2002/Your_Mobile_Phone_Is_Safe_Don_t_believe_virus_hoaxes | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00634-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.914597 | 315 | 2.75 | 3 |
The FCC is making it easier to launch in-flight Internet services on planes in the U.S. by setting up a standard approval process for onboard systems that use satellites.
Since 2001, the Federal Communications Commission has approved some satellite based Internet systems for airplanes, called Earth Stations Aboard Airc... | <urn:uuid:56cb05e8-7346-40f0-b9a7-ccce4e5914cf> | CC-MAIN-2017-09 | http://www.computerworld.com/article/2494275/mobile-wireless/fcc-eases-licensing-for-in-flight-internet-gear-on-aircraft.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00158-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941522 | 264 | 2.59375 | 3 |
In an effort to further human and robot cooperation in space, a NASA astronaut aboard the International Space Station flying 240 miles above Earth controlled a robot on the ground.
NASA researchers are working to someday make it possible for astronauts onboard an orbiting spacecraft to control robots working on the moo... | <urn:uuid:c9bcf526-8014-4be2-a34b-059a3ab105ac> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2167869/data-center/in-first--nasa-astronaut-in-space-controls-robot-on-earth.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00158-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941938 | 672 | 4.125 | 4 |
IBM the Humanitarian
Opinion: By using its expertise in backing the World Community Grid project, IBM also gets the chance to demonstrate the benefits of grid computing.Making use of unused CPU cycles on your client computers isnt a new idea. Going back into the 1980s, there was network database software that let you i... | <urn:uuid:8a252b7e-0f4c-426c-8cb6-1d4239c850d2> | CC-MAIN-2017-09 | http://www.eweek.com/c/a/Cloud-Computing/IBM-the-Humanitarian | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00210-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95634 | 346 | 2.640625 | 3 |
If Smart Grid technology is to work, the entire communications industry will have to align with the information technology and power and energy industries, with the input of manufacturers, policymakers, educators, academics, governments, engineers, computer scientists, researchers and others. Simply getting everyone in... | <urn:uuid:ef54cddd-3d08-4dbe-ac91-52ac7f3edaa9> | CC-MAIN-2017-09 | https://www.cedmagazine.com/print/news/2010/01/ieee-sets-up-smart-grid-clearinghouse | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00330-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.907613 | 596 | 2.859375 | 3 |
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform.
SCADA stands for Supervisory Control And Data Acquisition, the computer control systems at the heart of many industrial automation and control systems.
First developed in th... | <urn:uuid:b1d44d7b-c53b-42a1-8034-650bcdf449b3> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/03/07/the-scada-security-challenge/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00506-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.951216 | 2,000 | 2.84375 | 3 |
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, web board, email, or from an instant message. ... | <urn:uuid:4722d30a-b1c7-4ddd-9ab9-70729d0a112d> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2002/11/06/the-cross-site-scripting-faq/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00206-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93427 | 156 | 3.578125 | 4 |
As silicon-based electronics come up against the physical limitations of nanoscale, researchers are scrambling to find a viable replacement that would breath new life into Moore’s law and satisfy the demand for ever faster, cheaper and more energy-efficient computers. A new computer made of carbon nanotubes, created by... | <urn:uuid:ea19b181-1c39-4fa5-92e0-0435b5691edf> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/09/27/stanford_debuts_first_carbon_nanotube_computer/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00202-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.918096 | 681 | 4.0625 | 4 |
Researchers Develop Home Gestural Control Using Wi-Fi
By Barry Levine / CIO Today. Updated June 05, 2013.
You wave your arm while in the shower to lower the music volume, or you make a hand gesture in the air from bed to turn up the thermostat. That vision of a gesture-anywhere life may have taken a step closer toward ... | <urn:uuid:9cf7d03e-9ee6-4b08-808c-fc7e69cfa781> | CC-MAIN-2017-09 | http://www.cio-today.com/article/index.php?story_id=111008IQA7J6 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00554-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950537 | 790 | 2.78125 | 3 |
PROBLEM/SITUATION: Digital signatures are not yet legal in many states.
SOLUTION: Utah's digital signature law.
JURISDICTION: Utah Department of Commerce.
VENDORS/GROUPS: Rankin Technology Group, Informix, Four Gen.
USER CONTACT: George R. Danielson, 801/530-6421;
Utah, which in early 1995 was the first state to pass a... | <urn:uuid:db9309f5-28c0-4de6-8eb4-3edd8b770aac> | CC-MAIN-2017-09 | http://www.govtech.com/featured/Digital-Signature-Law-Inked.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00426-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.9346 | 1,344 | 2.546875 | 3 |
A story first posted on ArabNews.com has been making the rounds on the Internet, involving an Indian student who has allegedly found a method of storing compressed digital information on a regular sheet of paper. Sainul Abideen claims that his technique, dubbed Rainbow Technology, can store between 90 and 450 GB on a s... | <urn:uuid:99c0df5e-0ffc-4fde-a818-a8bfcd1659f3> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2006/11/8288/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00426-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.935529 | 749 | 3.109375 | 3 |
Interesting article on Analyzing DNS Logs Using Splunk and being able to identify if splunk sees a DNS lookup for a known bad domain name.
Again, if you use our data as this article does, do not pull the zone file more than once every 12 hours or you will be banned. Better yet, check to see if the file has changed firs... | <urn:uuid:26a55155-d44c-4858-afac-f40e4ff5ae9f> | CC-MAIN-2017-09 | http://www.malwaredomains.com/?cat=31 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00422-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93139 | 272 | 2.59375 | 3 |
In preparation of our CCNA exam, we want to make sure we cover the various concepts that we could see on our Cisco CCNA exam. So to assist you, below we will discuss Cisco Router Basics.
Basics Of Cisco Routers
Cisco is well known for its routers and switches. I must admit they are very good quality products and once t... | <urn:uuid:d7bd906a-2135-4f95-9112-8a12c1d4ce27> | CC-MAIN-2017-09 | https://www.certificationkits.com/cisco-router-basics/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00474-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941338 | 1,977 | 3.28125 | 3 |
What email address or phone number would you like to use to sign in to Docs.com?
If you already have an account that you use with Office or other Microsoft services, enter it here.
Or sign in with:
Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi... | <urn:uuid:e05a6856-9420-4a1b-a74d-51c429b2eaa7> | CC-MAIN-2017-09 | https://docs.com/danielle-poppell/1057/unit-3-study-guide | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00418-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.840583 | 1,108 | 2.59375 | 3 |
Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, missing out on one of the key advantages of Linux: the command line.
The command line interface is the most efficient and powerful way to intera... | <urn:uuid:898f70e5-1020-4f67-bd18-74dbf40eef5c> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2012/01/11/the-linux-command-line/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00342-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.910422 | 337 | 2.84375 | 3 |
If you’re one of the 175 million Pandora users, then you have surely experienced the excitement of having the Internet’s most popular radio station introduce you to a brand-new artist or song. While it may seem like magic, there is a perfectly logical explanation behind Pandora’s ability to seemingly read your mind and... | <urn:uuid:655c0943-481b-472b-822d-489fbc8bce01> | CC-MAIN-2017-09 | https://www.hpcwire.com/2013/02/18/scaled_out_music_scaled_down_infrastructure/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00339-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933867 | 1,055 | 2.984375 | 3 |
For my security concentration last semester I took an interesting course on the principles of Cryptography. My proffesor, Dr. Shouhuai Xu is a huge crypto enthusiast and has published many articles and papers on his experiments that I have found very interesting. This particular paper discusses memory disclosure attack... | <urn:uuid:0e0a6bfd-0786-41f1-bc7f-7ba84fa71ad0> | CC-MAIN-2017-09 | https://www.ibm.com/developerworks/community/blogs/242fafe4-766c-4c93-bb7d-3d2a5ee1cbd6/entry/memory_disclosure_attacks_do_you_know_where_your_keys_are2?lang=en | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00215-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950758 | 300 | 2.515625 | 3 |
The device looks like a small piece of carry-on luggage, but it has a more important job than carrying a toothbrush, deodorant and a couple of pairs of underwear.
The suitcase-size device is a microwave transmitter designed by two U.S. government agencies to help rescue workers find living victims buried in rubble afte... | <urn:uuid:36a07de4-0f57-4a2d-8bf3-1f1854734189> | CC-MAIN-2017-09 | http://www.cio.com/article/2382220/government-use-of-it/suitcase-size-device-may-help-save-lifes-of-disaster-victims.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00335-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.936472 | 551 | 3.015625 | 3 |
A few days ago, a critical bug was found in the common OpenSSL library. OpenSSL is the library that implements the common SSL and TLS security protocols. These protocols facilitate the encrypted tunnel feature that secure services -- over the web and otherwise -- utilize to encrypt the traffic between the client (user)... | <urn:uuid:c0856127-6731-4944-9e83-edb1eb896781> | CC-MAIN-2017-09 | https://www.hbarel.com/analysis/itsec/openssl-heartbleed-bug | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00511-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961075 | 1,614 | 2.609375 | 3 |
Technology is meant to make life easier for those who take advantage of it, but an advantage for some is a disadvantage for others. No one can deny that the Internet has made life easier, but the findings of a recent global United Nations report
found that only 3 percent of Web sites are accessible to persons with disa... | <urn:uuid:f12cea98-5332-440a-bb8e-af1c3bbe4342> | CC-MAIN-2017-09 | http://www.govtech.com/policy-management/Technology-Can-Improve-Lives.html?page=2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00331-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.955901 | 1,173 | 3.265625 | 3 |
A group of researchers from University of California, Berkeley, claims to have achieved 99 percent accuracy when using brainwave signals instead of passwords for user authentication.
The timing was right, they say, because while EEG data was in the past captured with invasive probes, this data can now be collected usin... | <urn:uuid:0be45880-beb5-4568-9cf9-42ac3ba251ef> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2013/04/16/pass-thoughts-as-a-solution-to-the-password-problem/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00031-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.970491 | 523 | 3.0625 | 3 |
Secure storage of data has always been essential for any organisation, of whatever size. In the past this involved accurate filing of paper records, and then keeping the physical archive secure – whether it was simply locking a filing cabinet, or guarding an entire building. Modern business technology may have virtuali... | <urn:uuid:af1ca134-d2ce-40aa-9a15-52966f770563> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2005/09/08/popular-policies-keeping-storage-secure/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00207-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.953813 | 1,293 | 2.703125 | 3 |
Wendy Harman, social strategy director for the American Red Cross, monitors social media using tech platform Radian6 to gain real-time insight during disasters. Photo by David Kidd.
During the Deepwater Horizon oil spill, citizens used social media to share health effects, odor, smoke, whether wildlife was effected, an... | <urn:uuid:f46cf995-a706-41e7-9a92-4dc8f69da5a4> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Government-Technology-January-2013.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00383-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945176 | 109 | 2.609375 | 3 |
Power plants deliver usable energy to the world and are among the top-rated, high-risk facilities. Conservative and regimented in tried and proven SOPs, these energy generators operate on strict day-to-day practices that ensure the security and safety of people and assets.
As the threat of terrorist attacks become more... | <urn:uuid:ed782c9c-dc4c-4316-adb4-da519b22673c> | CC-MAIN-2017-09 | https://www.asmag.com/showpost/9303.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00083-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948441 | 1,978 | 2.75 | 3 |
A small robot says, "Good morning," and with that one phrase, takes a huge step forward in robot-human cooperation in space, as well as robotic companions.
Kirobo, a 13.4-in. tall, 2.2-pound humanoid robot, spoke its first words in space, while floating onboard the International Space Station last month. A newly releas... | <urn:uuid:dddcc318-2f61-4f18-b553-effe6858f943> | CC-MAIN-2017-09 | http://www.computerworld.com.au/article/525783/hello_from_space_kirobo_takes_huge_step_robotics/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00203-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.958748 | 938 | 2.84375 | 3 |
One of the problems with smartphone apps is that one has no control over where often sensitive permissions and personal content is stored. While we’re allowed a certain amount of input when it comes to downloading the app and installing it: agree to the permissions or else, we have no control over where or how all the ... | <urn:uuid:f28603a4-b0c0-480b-b1a1-e7bf12d999d1> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3047821/security/user-controlled-private-clouds-could-help-with-security-think-scientists.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00255-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943705 | 777 | 2.578125 | 3 |
Alaska's scale puts USGS mapping systems to the test
- By Patrick Marshall
- Feb 27, 2014
The U.S. Geological Survey is spearheading an effort to collect high-resolution elevation data for the entire United States that will be used to create 3D maps for gauging flood risks, monitoring the health of crops and measuring ... | <urn:uuid:21b604d5-2589-4f12-bfc1-4be93dfcc04d> | CC-MAIN-2017-09 | https://gcn.com/articles/2014/02/27/mapping-alaska.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00255-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961299 | 642 | 2.90625 | 3 |
RAM is a commodity component and therefore relatively inexpensive, yet it possesses outstanding performance characteristics and lacks the shortcomings that are attributed to Flash devices. RAM is an excellent technology to leverage for accelerating I/O performance and delivers a very high benefit-to-cost ratio across t... | <urn:uuid:7d93ba01-9a86-42ed-94d7-e4d755a65adf> | CC-MAIN-2017-09 | https://www.datacore.com/products/features/High-Speed-Caching.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00075-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.940665 | 142 | 2.515625 | 3 |
Scientists are working on creating a new biometric bracelet that could also “talk” to devices on a person’s body, allowing data collected by blood pressure cuffs and heart monitoring devices to be matched to correct electronic records.
The devices could prevent mix-ups of health records at military and veteran hospital... | <urn:uuid:603e1ddc-91dc-44c2-8141-9ed71d43ebbb> | CC-MAIN-2017-09 | http://www.nextgov.com/health/2012/08/biometric-wristband-could-match-health-monitoring-devices-electronic-records/57296/?oref=ng-HPriver | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00171-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94065 | 258 | 2.96875 | 3 |
Any new technology deployment presents challenges, and long-term evolution (LTE) is no exception. Moreover, as LTE is not an evolution of existing deployments, but rather a replacement that is backward-compatible, the challenges this technology brings with it seems more pronounced and includes the following: distance, ... | <urn:uuid:ba7dcc4b-4b01-402a-af13-72aeaa64e6a2> | CC-MAIN-2017-09 | http://www.mobilitytechzone.com/topics/4g-wirelessevolution/articles/2012/06/27/296712-increasing-mobile-data-traffic-drives-demand-performance-testing.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00115-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93761 | 1,904 | 2.890625 | 3 |
In the age of the digitally innovative classroom, nearly all school districts have some kind of Internet blocking and filtering mechanism to keep kids safe from inappropriate online content. It is also likely that almost all students have figured out ways to get around these blocks and filters to get to content that th... | <urn:uuid:339e1d4e-0d83-429b-b020-31d8db392de7> | CC-MAIN-2017-09 | https://www.imperosoftware.com/the-key-benefits-of-adding-monitoring-software-to-your-school-network/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00112-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.920509 | 1,042 | 2.609375 | 3 |
Google has revealed it plans to build its own self-driving cars from the ground up, per an announcement from founder Sergey Brin at the Code Conference Tuesday. The company revealed one such car to Recode, a highly compact two-seater without a steering wheel.
Google had previously been retrofitting Toyota Priuses and L... | <urn:uuid:562f576a-9515-4e3b-8cfe-4e645a654d24> | CC-MAIN-2017-09 | https://arstechnica.com/gadgets/2014/05/google-builds-a-prototype-self-driving-car-sans-steering-wheel/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967101 | 361 | 2.5625 | 3 |
User Account Control – What Penetration Testers Should KnowMarch 20, 2014
UAC is User Account Control. Introduced in Windows Vista, UAC is a collection of technologies that make it convenient possible to use Windows without administrator privileges and elevate your rights when needed. UAC has a lot of moving parts and ... | <urn:uuid:234abd4a-45df-4cb1-8d9d-dd14337d6f13> | CC-MAIN-2017-09 | https://blog.cobaltstrike.com/2014/03/20/user-account-control-what-penetration-testers-should-know/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.912051 | 2,883 | 2.84375 | 3 |
Adam B.,Institute For Angewandte Okologie |
Faller M.,Aussenstelle Des Institute For Angewandte Okologie |
Gischkat S.,Aussenstelle Des Institute For Angewandte Okologie |
Hufgard H.,Aussenstelle Des Institute For Angewandte Okologie |
And 2 more authors.
WasserWirtschaft | Year: 2012
Since the new double slot pass has... | <urn:uuid:12d5da49-02ca-47bd-ba6b-5309b334b311> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/aussenstelle-des-institute-for-angewandte-okologie-1491675/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.916964 | 306 | 2.6875 | 3 |
Identifying a Skills Gap in the Workforce
The gulf between the capabilities of a collective workforce and the level of aptitude an employer demands is known as a “skills gap” in the labor market. Serious problems arise when a workforce’s proficiency cannot keep pace with economic development. In an increasingly interco... | <urn:uuid:377aff0c-882b-4d4f-9c3e-ab4816276443> | CC-MAIN-2017-09 | http://certmag.com/identifying-a-skills-gap-in-the-workforce/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00164-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954563 | 1,009 | 2.578125 | 3 |
OTTAWA, ONTARIO--(Marketwired - May 22, 2014) - The Royal Canadian Legion acknowledged Aboriginal Awareness Week as well as the many Aboriginal cultures in Canada, including First Nations, the Inuit and the Métis earlier today.
"This week, designed to honour the Canadian Mosaic is a welcomed part of our Canadian Herita... | <urn:uuid:a98227b5-ca53-483a-9949-ee2c3750ea7d> | CC-MAIN-2017-09 | http://www.marketwired.com/press-release/legion-supports-aboriginal-awareness-week-1913057.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00208-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960576 | 558 | 2.546875 | 3 |
PostgreSQL is a first-rate, enterprise-worthy open source RDBMS (relational database management system) that compares very favorably to high-priced closed-source commercial databases. Databases are complex, tricksy beasts full of pitfalls. In this two-part crash course, we'll get a new PostgreSQL database up and runnin... | <urn:uuid:03c218dc-3f9f-4b7e-96e4-b3fda2129348> | CC-MAIN-2017-09 | http://www.itworld.com/article/2738507/data-center/crash-course-in-postgresql--part-1.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00028-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.88088 | 572 | 2.703125 | 3 |
How Google Works: The Google File SystemBy David F. Carr | Posted 2006-07-06 Email Print
For all the razzle-dazzle surrounding Google, the company must still work through common business problems such as reporting revenue and tracking projects. But it sometimes addresses those needs in unconventional—yet highly efficie... | <urn:uuid:1e49cc13-a11b-4181-a30f-e14eba74c3ad> | CC-MAIN-2017-09 | http://www.baselinemag.com/c/a/Infrastructure/How-Google-Works-1/4 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00256-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931283 | 769 | 3.078125 | 3 |
Digital video using standards such as that from Motion Picture Experts Group (MPEG) for encoding video to compress, transport, uncompress, and display it has led to a revolution in computing ranging from social networking media and amateur digital cinema to improved training and education. Tools for decoding and consum... | <urn:uuid:942786d3-8817-46e1-b608-e55b384be67b> | CC-MAIN-2017-09 | http://www.ibm.com/developerworks/cloud/library/cl-cloudscaling3-videoanalytics/index.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00076-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91707 | 4,497 | 2.953125 | 3 |
It seems incredible to believe that of all the people on the planet, Stephen Hawking’s communication system has never used the sort of predictive typing found in modern smartphones, or even a backspace key. Now it does, via a partnership between Intel and Swiftkey.
Hawking, who suffers from an advanced stage of amyotro... | <urn:uuid:5dcc8adc-7126-4971-8143-900217fce09e> | CC-MAIN-2017-09 | http://www.cio.com/article/2854453/consumer-technology/intel-swiftkey-upgrade-stephen-hawkings-communication-technology.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00252-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.95936 | 705 | 2.609375 | 3 |
The technology and computerization increasingly being installed in courtrooms across the country is changing the job of court reporters, and is, in some cases, replacing them. Overloaded and underfunded courts are increasingly looking at audio and video recording as a way to cut costs, which is achieved mainly by elimi... | <urn:uuid:4be71d90-bf02-40b6-9a77-189bb5982149> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Court-Reporting-From-Stenography-to-Technology.html?page=3 | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00424-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965203 | 1,989 | 2.5625 | 3 |
Global investment in the renewable energy (RE) market exceeded $300 billion in 2014, at a 16% growth rate over 2013. Biomass and waste-to-energy (WTE) projects saw more than $8 billion worth of investment in 2014. With rising primary energy needs, Southeast Asia is experiencing power turbulence across most of its econo... | <urn:uuid:5c028fe9-ec3a-44fa-a104-85015e78b412> | CC-MAIN-2017-09 | https://www.brighttalk.com/search?q=biomass | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00600-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926921 | 1,501 | 2.78125 | 3 |
As seminal punk band NOFX once sang, “Electricity / All we need to live today / A gift for man to throw away.” The data center industry has a love hate relationship with electricity. It’s obviously a crucial resource that enables the productivity and innovation gains of cloud and large-scale computing, but it comes fro... | <urn:uuid:8c1b9e3b-4597-4153-9602-4eceb05bf12b> | CC-MAIN-2017-09 | https://www.greenhousedata.com/blog/three-ways-data-centers-can-build-the-future-of-electricity-and-smart-grids | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00244-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.937201 | 1,453 | 2.90625 | 3 |
PHP is a general purpose scripting language widely used in World Wide Web (WWW) pages and applications.
Two buffer overflows have been reported in the PHP session extension; the str_replace() function; and the imap_mail_compose() function. An attacker could pass a very long string to the str_replace() function and crea... | <urn:uuid:13bb470f-95f5-4682-9536-29b1e35c17c9> | CC-MAIN-2017-09 | https://downloads.avaya.com/elmodocs2/security/ASA-2007-136.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00420-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.853255 | 1,469 | 2.640625 | 3 |
During a murder investigation, sometimes all that surfaces are human bones. Without proper identification to verify who the deceased person is, it’s up to forensic artists to re-create an image of what the person may have looked like while alive to help law enforcement identify the individual.
At the National Center fo... | <urn:uuid:d08efe6c-e3e1-4bab-90fb-4cf309e827b3> | CC-MAIN-2017-09 | http://www.govtech.com/technology/Facial-Reconstruction-Tech-Helps-Identify-Skeletal-Remains.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00296-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954965 | 780 | 2.875 | 3 |
Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.
How do you feel about your Web-browsing activity being tracked?
During a visit to any given website -- including this one -- the a... | <urn:uuid:f4f482e5-eb8f-4078-a1f5-d3797142432b> | CC-MAIN-2017-09 | http://www.networkworld.com/article/2175737/byod/ad-tracking--is-anything-being-done-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00172-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.959298 | 2,632 | 2.53125 | 3 |
802.11ad Will Vastly Enhance Wi-Fi: The Importance of the 60 GHz Band to Wi-Fi’s Continued Evolution
05 Apr 2016
Wi-Fi continues to evolve in the 2.4 GHz and 5 GHz bands, but as those bands get more crowded, the industry will increasingly look to IEEE 802.11ad, also known as WiGig, in the unlicensed 60 GHz band. 802.11... | <urn:uuid:260f3ca9-0aa4-43e8-916a-6da54f8709ce> | CC-MAIN-2017-09 | https://www.abiresearch.com/whitepapers/80211ad-will-vastly-enhance-wi-fi/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00172-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.905686 | 224 | 2.625 | 3 |
A network card interface or NIC Card (also referred to as a Network Interface Controller, Network Adapter, LAN Adapter or LAN card) is how your computer connects to the wired network in your home or office. It is a physical and data link layer device which uses MAC addresses. NIC adapter is plugged inside the computer ... | <urn:uuid:442ab2b3-a4d2-4ce4-af4a-919e832cead5> | CC-MAIN-2017-09 | http://www.fs.com/blog/performance-of-network-interface-cards.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00292-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926498 | 608 | 3.328125 | 3 |
To continue on the topic of passwords: not only should you use a proper iteration count when implementing password hashing in code — the same thing also applies to password safe software such as KeePass.
As strong passwords are pain to remember, many people opt to use KeePass or other password managers, and then copy t... | <urn:uuid:60f321d3-56f0-4985-bd69-fc637d97c5bb> | CC-MAIN-2017-09 | https://www.f-secure.com/weblog/archives/00002382.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00344-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.91103 | 462 | 2.5625 | 3 |
Chang E.R.,University of Groningen |
Veeneklaas R.M.,University of Groningen |
Veeneklaas R.M.,Bosgroep Noord Oost Nederland Forest Support Group |
Bakker J.P.,University of Groningen |
And 3 more authors.
Applied Vegetation Science | Year: 2016
Questions: How successful was the restoration of a salt marsh at a former ... | <urn:uuid:9115fdc1-41c4-4601-b2a7-72b4841d92bb> | CC-MAIN-2017-09 | https://www.linknovate.com/affiliation/bosgroep-noord-oost-nederland-forest-support-group-1567802/all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00344-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.931511 | 1,397 | 2.609375 | 3 |
Twitter and Flickr, along with remote sensor data, can be used to identify flooded areas, a team of university researchers say.
It's faster than using publicly available satellite images on their own. That imaging can sometimes take days to become available, the researchers say. It's also easier to identify the flooded... | <urn:uuid:54dae6ab-643d-4d02-906e-b1ca109a3997> | CC-MAIN-2017-09 | http://www.networkworld.com/article/3026968/internet/machine-learning-social-media-data-help-spot-flooded-areas.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00113-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965548 | 710 | 3.6875 | 4 |
This resource is no longer available
IP Version 6 Transitions Mechanisms
Today businesses are in the midst of transitioning from IP version 4 to IP version 6. This is not a process that happens overnight - there is almost always a period of migration and/or coexistence when installing new components into an infrastruct... | <urn:uuid:34a8f9a3-1678-467b-8ade-83e5f0542b8f> | CC-MAIN-2017-09 | http://www.bitpipe.com/detail/RES/1357306703_135.html?asrc=RSS_BP_TERM | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00641-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.928159 | 194 | 2.546875 | 3 |
Packet sniffing is a technique of monitoring network traffic. It is effective on both switched and nonswitched networks. In a non-switched network environment packet sniffing is an easy thing to do. This is because network traffic is sent to a hub which broadcasts it to everyone. Switched networks are completely differ... | <urn:uuid:6309fb89-f4c3-4367-a816-0d875834171f> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2003/12/15/packet-sniffing-on-layer-2-switched-local-area-networks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00165-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.927313 | 319 | 3.40625 | 3 |
I think it’s fair to say that Google has done some pretty innovative things. They seem to be a smart and focused bunch of people. Not surprisingly, companies with talented, focused people can be quite innovative. When you throw billions of dollars of funding behind them, the results can be pretty impressive.
Recently, ... | <urn:uuid:6bc8eb60-ac00-4cf9-99a5-b8889bff4129> | CC-MAIN-2017-09 | http://www.internap.com/2012/04/12/recycled-water-good-for-google-too/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00341-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.961337 | 406 | 2.828125 | 3 |
A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F... | <urn:uuid:a6e3a564-06b6-4f60-ae1c-4279bab3a2ff> | CC-MAIN-2017-09 | https://www.f-secure.com/v-descs/dtus.shtml | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00517-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.911846 | 385 | 2.578125 | 3 |
The U.S. Environmental Protection Agency (EPA) announced Oct. 11 that it awarded $30 million for clean diesel projects across the country. The funding is part of the Diesel Emission Reduction Program (DERA) and State Clean Diesel Grant Program, which are intended to replace or retrofit old diesel-powered engines like t... | <urn:uuid:b4228aa5-e6f1-42c1-8a25-0112cd2fd758> | CC-MAIN-2017-09 | http://www.govtech.com/transportation/EPA-Promotes-Clean-Diesel-With-30-Million.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00161-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965681 | 410 | 2.765625 | 3 |
You have probably heard the term ‘Adware’. This term describes an advertising-supported software, which seeks to make a profit out of commercial advertisements. There is a small line between legitimate advertising, illegal advertising and annoying advertising. Nonetheless, the fact is that the majority of free programs... | <urn:uuid:4d731731-8e54-442d-987b-aa7e5f8dceee> | CC-MAIN-2017-09 | http://www.2-spyware.com/news/post4435.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00513-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938561 | 1,160 | 2.796875 | 3 |
Strong PulseBy Wendy Wolfson | Posted 09-01-2004
Foodborne diseases kill more and more people every year, yet they do not get the attention or funding showered on more exotic contagious diseases such as smallpox and anthrax, which strike only a few people per year, but do have the potential to be used as bioterror agen... | <urn:uuid:f52e18e1-73c0-4ad4-9a18-8b02ac7b4549> | CC-MAIN-2017-09 | http://www.cioinsight.com/print/c/a/Past-News/Strong-Pulse | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00513-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.950456 | 500 | 3.046875 | 3 |
In four short years, we will all experience the unique transition of one millennium to another. Ona personal level, no real impact will be felt for most of us. Life will go on as usual. Unless, of course, you earn a living as an information technology (IT) professional.
Analyst estimates indicate 20 percent of business... | <urn:uuid:457a4a43-c39a-4d76-a6c3-b89493a7975c> | CC-MAIN-2017-09 | http://www.govtech.com/magazines/gt/Managing-Technology-.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.952521 | 1,272 | 2.828125 | 3 |
Previously, in our continuing series on selling to the government, we looked at contracting methods and the federal government's view of "fair and reasonable pricing." Let's now turn our attention to how the federal government deals with the financial and performance risks in contracting, which it addresses through con... | <urn:uuid:c18b1498-e3da-423a-9cf7-5dad4748c47b> | CC-MAIN-2017-09 | http://www.crn.com/news/channel-programs/240157726/selling-to-the-government-contract-types-in-federal-procurement.htm?cid=rss_tax_Channel-programs | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00565-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.93855 | 652 | 2.5625 | 3 |
[This is my second post on a series of articles that I would like to cover different tools and techniques to perform file system forensics of a Windows system. The first article was about acquiring a disk image in Expert Witness Format and then mount it using the SIFT workstation. The below one will be about processing... | <urn:uuid:f8072797-6497-4eba-93ac-91404089301f> | CC-MAIN-2017-09 | https://countuponsecurity.com/2015/11/10/digital-forensics-ntfs-metadata-timeline-creation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00565-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.926327 | 1,589 | 2.546875 | 3 |
Cloud Computing Definition
As with any burgeoning technology, cloud computing remains in flux in terms of its definition. Cloud steadily rises in popularity and familiarity with both tech nuts and the general public, thanks to an increase in advertising and more widely distributed education on just how useful it proves... | <urn:uuid:1443c0a0-082b-4586-b053-548d7a023e95> | CC-MAIN-2017-09 | https://cloudtweaks.com/2012/03/coining-the-cloud-an-assessment-of-cloud-computings-shifty-definition/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00209-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925767 | 709 | 2.625 | 3 |
Some time ago I was working on IPv6 implementation and in that period I wrote an article about NDP (you can read it here). After a while I received some comments that is not written very well so I reviewed a huge part of it. It looks my english was far worst two years ago that I was really aware of 🙂
In the reviewing ... | <urn:uuid:34f5cda8-43ee-4a0b-a8f0-0d26c5078d08> | CC-MAIN-2017-09 | https://howdoesinternetwork.com/2015/solicited-node-multicast-address | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00561-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.930748 | 1,120 | 2.765625 | 3 |
In a world where the reliance on electronic data transmission and processing is becoming every day more prevalent, it is of critical importance for organizations to guarantee the integrity and confidentiality of mission critical information exchanged over communication networks.
Contrary to a false perception, intercep... | <urn:uuid:fc48f15c-4c90-403b-bc03-3104d897a99d> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2005/05/05/securing-optical-networks-with-quantum-cryptography/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00085-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.938938 | 715 | 3.234375 | 3 |
The first letter R stands for rapport. A definition of rapport is a harmonious, empathetic, or sympathetic relation or connection to another self an accord or affinity. In other words, a close relationship in which people understand each others feelings, ideas and communicate well.
As I pointed out earlier the purpose ... | <urn:uuid:aa640665-e925-416f-a516-142ab5e163b2> | CC-MAIN-2017-09 | http://www.cioupdate.com/career/article.php/3922341/The-7-Habits-of-Highly-Effective-Presenters.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00029-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.941775 | 1,316 | 3.390625 | 3 |
IP security cameras have become part of our daily lives. As security camera owners, we like to see the feed or snapshot of live video on our phones, remote computers, and many other places. In order to accomplish that, we need to do a configuration on our home routers or modems that is called port forwarding. We will g... | <urn:uuid:bc50306f-f4b1-411f-a2bd-1e35659835b4> | CC-MAIN-2017-09 | https://www.a1securitycameras.com/port-forwarding-for-ip-security-cameras-and-networks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00205-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.965733 | 1,339 | 3.296875 | 3 |
How big of a problem is spyware?
It’s big enough that the U.S. House of Representatives voted unanimously to stiffen jail sentences for those who use secret surveillance programs to steal credit card numbers or commit other crimes.
Under the bill, known as the Internet Spyware (I-SPY) Prevention Act of 2004, those foun... | <urn:uuid:d434c52e-cae2-4f6b-a247-56a9ad48b9ca> | CC-MAIN-2017-09 | https://www.helpnetsecurity.com/2005/01/21/spyware-an-update/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00381-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94227 | 1,542 | 2.828125 | 3 |
When your hard drive fails, it can start to smoke, trapping your data (and possibly setting off your smoke detector). If you’ve lost data due to a smoking hard drive, the professional hard drive repair experts at Gillware can recover your data and help you get back on your feet.
People don’t often think about the heat ... | <urn:uuid:84379e08-6a51-436e-a0b1-8d78d27f4dfb> | CC-MAIN-2017-09 | https://www.gillware.com/smoking-hard-drive-data-recovery/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00081-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.939773 | 1,937 | 2.859375 | 3 |
Sensors in your phone that collect seemingly harmless data could leave you vulnerable to cyber attack, according to new research. And saying no to apps that ask for your location is not enough to prevent the tracking of your device.
A new study has found evidence that accelerometers—which sense motion in your smartphon... | <urn:uuid:5210643e-18c6-480f-b3c0-b59ca70ecc5b> | CC-MAIN-2017-09 | http://www.nextgov.com/mobile/2014/04/phones-are-giving-away-your-location-regardless-your-privacy-settings/83302/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00377-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.94059 | 584 | 2.765625 | 3 |
A history of the Internet was created using Facebook's timeline feature by Internet education company Grovo. The timeline, which goes back to the year 1536, includes important dates like 1983, when the Internet was born, and 1978, when the first spam email was sent over the ARPANET. And in 1900, deep sea divers discove... | <urn:uuid:04b63854-03f5-4bb6-aff7-7f72524444a7> | CC-MAIN-2017-09 | http://www.govtech.com/e-government/Colorful-Internet-History-Chronicled-on-Facebook.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00601-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.925198 | 279 | 3.1875 | 3 |
Quantum computing explained: D-Wave on NASA's system
- By John Breeden II
- Sep 10, 2013
If one of the 35 million books in the Library of Congress has a big red X on the inside cover, how long would it take a man to find it? Opening each book might take the searcher hundreds of years, unless he was very lucky.
But what... | <urn:uuid:30279a3d-dd6b-46a7-9bd9-f93ba7d3ebb4> | CC-MAIN-2017-09 | https://gcn.com/articles/2013/09/10/dwave-quantum-computing.aspx?admgarea=TC_BigData | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00301-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.948465 | 1,180 | 3.484375 | 3 |
Subnetting is definitely one of the things you need to know inside and out to pass your CCENT 100-101 or CCNA 200-120 exam. You will see pretty straight forward subnetting questions and you will also see scenario based questions that you will need to employ your subnetting skills to determine where the problem resides.... | <urn:uuid:3e871333-85dc-4574-9cfb-cced17e01002> | CC-MAIN-2017-09 | https://www.certificationkits.com/ccent-ccna-subnetting-exam-question/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00477-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960179 | 714 | 3.578125 | 4 |
An ongoing multibillion-dollar overhaul of the nation's air traffic control (ATC) system is designed to make commercial aviation more efficient, more environmentally friendly and safer by 2025.
But some white-hat hackers are questioning the safety part. The Next Generation Air Transportation System (NextGen) will rely ... | <urn:uuid:36ceefca-32cb-47a2-ae5f-746008bfd9f4> | CC-MAIN-2017-09 | http://www.csoonline.com/article/2132793/access-control/hackers-say-coming-air-traffic-control-system-lets-them-hijack-planes.html?source=rss_news | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00245-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.960449 | 1,167 | 2.90625 | 3 |
Why Do I Have to Tighten Security on My System? (Why Can't I Just Patch?) - Page 2
The Lifecycle of the Modern Security Vulnerability
I. Bug Discovery
If we think about the security vulnerabilities that crackers exploit, whether locally or remotely, we realize that they're caused by one thing: a "bug" in either the des... | <urn:uuid:3a4f4ba8-74bd-4de1-9ff7-757a98ce69d1> | CC-MAIN-2017-09 | http://www.enterprisenetworkingplanet.com/netsecur/article.php/10952_624511_2/Why-Do-I-Have-to-Tighten-Security-on-My-System-Why-Cant-I-Just-Patch.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00469-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.954187 | 1,699 | 2.96875 | 3 |
With much fanfare, NASA announced this week that its Kepler Space Telescope had discovered the first Earth-size planet that orbits a parent star in the so-called habitable zone, where temperatures could allow liquid water to collect on the surface.
The planet has been named Kepler-186f, and the discovery itself is a fi... | <urn:uuid:4d68d1ce-a490-47c3-bd2f-3a30981412db> | CC-MAIN-2017-09 | http://www.nextgov.com/big-data/2014/04/nasa-found-new-earth-planet-using-old-data/82819/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00645-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.933626 | 636 | 3.546875 | 4 |
Genius People in History - Top 10 Genius People
First off, you may be surprised to find that Albert Einstein is not included on this list of genius people. It is difficult to explain exactly what makes a person genius but it is fact that some people are genius by nature. The reason is that I have used a table of IQ est... | <urn:uuid:1becfea5-4756-4038-ad2e-e7d9b25c71a3> | CC-MAIN-2017-09 | http://www.knowledgepublisher.com/article-862.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00114-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.967306 | 1,830 | 2.890625 | 3 |
Smart-phone battery life could double -- without better batteries
Batteries are the most unappreciated technology in use today. They almost never make the list of important innovations that changed modern society, though many of the technologies that do, like smart phones, rely heavily on them. For public-sector offici... | <urn:uuid:933c7331-9f20-4cad-95b9-8d205ddbcd08> | CC-MAIN-2017-09 | https://gcn.com/blogs/emerging-tech/2012/11/smart-phone-battery-life-could-double-without-better-batteries.aspx?admgarea=TC_EmergingTech | null | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00518-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964463 | 1,032 | 2.9375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.