text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Power Network Services with MySQL Last week we learned how to create and populate a user authentication database. Today we'll dig into making changes, making backups, connecting to remote MySQL servers and plugging MySQL in to servers like Postfix and Samba. In Part 1 we learned some commands for making changes to tabl...
<urn:uuid:5ed4aed1-17d6-4727-8ef7-0cbb0b9aa462>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/print/netos/article.php/3531076/Power-Network-Services-with-MySQL.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00464-ip-10-171-10-108.ec2.internal.warc.gz
en
0.845601
1,581
2.953125
3
The makings of a federal police e-academy Training for federal law enforcement officers might soon incorporate many of the online technologies that universities have been using to make instruction more accessible, comprehensive and affordable. John Besselman is leading a program at the Homeland Security Department’s Fe...
<urn:uuid:dac08fba-9d9f-4d66-a85a-9084dbf074b2>
CC-MAIN-2017-09
https://fcw.com/articles/2008/11/17/the-makings-of-a-federal-police-eacademy.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95571
663
2.890625
3
In today’s market, segments of the broader IoT ecosystem have been underserved, especially small-to-medium businesses and mid-sized cities. However, this oversight will change over the next several years as these entities seek to embrace the efficiencies and cost reductions that enterprises and government agencies are ...
<urn:uuid:9dca2206-3fb7-4b8c-9ea4-186a835879f6>
CC-MAIN-2017-09
http://www.iotevolutionmagazine.com/features/articles/429358-beyond-dns-why-iot-industry-should-create-its.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174163.72/warc/CC-MAIN-20170219104614-00516-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943952
846
2.859375
3
The recent hacking of the Associated Press’ Twitter account has begged the question, how secure are social media accounts? A study released by IObit reveals that 30% users always accept “Keep Me Logged-in” when they are logging into Facebook, Twitter, Pinterest and other social media sites. The study also found that 10...
<urn:uuid:52c5ee3c-bd48-45c9-b783-88ca55d0a8fe>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/05/07/many-social-accounts-are-still-in-danger/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00109-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955377
392
2.5625
3
Everyday Science Quiz Questions & Answers - Part 3 51. Question: Why is it less difficult to cook rice or potatoes at higher altitudes? Answer: Atmospheric pressure at higher altitudes is low and boils water below 100oC. The boiling point of water is directly proportional to the pressure on its surface. 52. Question: W...
<urn:uuid:d9f6c337-dae3-4fa7-bac5-75ad9644e83d>
CC-MAIN-2017-09
http://www.knowledgepublisher.com/article-647.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00461-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939247
1,483
3.265625
3
In order to protect your assets, you must first know what they are, where they are, and understand how they are tracked and managed. Are they secured? Who has access to them? Who tracks and manages them? Do you have functional procedures in place to respond and recover from a security breach quickly? Do you have a proc...
<urn:uuid:d97eece2-4387-443c-b789-9d8402314f3b>
CC-MAIN-2017-09
http://blog.globalknowledge.com/2012/05/01/asset-protection-what-do-you-have/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00513-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930296
1,510
2.5625
3
Unmanned Aerial Vehicles The Defense Department is increasingly using a technology known as UAVs -- commonly called "drones" -- in the Middle East. However, other agencies are using drones in other capacities, such as Homeland Security is also using them to patrol the border. The use of drones is controversial, as some...
<urn:uuid:f48f89a6-e1bc-4d9b-ae63-7c761e734c71>
CC-MAIN-2017-09
http://www.nextgov.com/defense/unmanned-aerial-vehicle/55563/?oref=ng-trending
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172902.42/warc/CC-MAIN-20170219104612-00037-ip-10-171-10-108.ec2.internal.warc.gz
en
0.932683
1,025
2.75
3
Researchers from the U.S. Army Armament Research, Development and Engineering Center recently patented a new type of bullet capable of self-destructing after traveling over a predetermined distance. The idea behind the new and advanced projectile is that it might help limit the extent of collateral damage (read: innoce...
<urn:uuid:ffa8fc59-e44f-4de6-ad67-3d8faecdfeea>
CC-MAIN-2017-09
http://www.networkworld.com/article/3037405/hardware/army-researchers-patent-self-destructing-bullet-designed-to-save-lives.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00333-ip-10-171-10-108.ec2.internal.warc.gz
en
0.929049
360
3.25
3
Path MTU Discovery When a host needs to transmit data out an interface, it references the interface's Maximum Transmission Unit (MTU) to determine how much data it can put into each packet. Ethernet interfaces, for example, have a default MTU of 1500 bytes, not including the Ethernet header or trailer. This means a hos...
<urn:uuid:2708414c-cc41-4a7c-bc96-b9bf49b77d30>
CC-MAIN-2017-09
http://wiki.nil.com/Path_MTU_Discovery
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00253-ip-10-171-10-108.ec2.internal.warc.gz
en
0.877036
842
3.375
3
History of malware A brief history of viruses, worms and Trojans, part 3 In 1995 the first macro viruses appeared. Until that time, only executable files and boot sectors had been affected. Macro viruses placed ever higher demands on the detecting scanners. Melissa, Loveletter, Sobig et al. continue to set new speed re...
<urn:uuid:d4449437-8951-4e90-9594-9617fa38d06a>
CC-MAIN-2017-09
https://www.gdata-software.com/seccuritylabs/information/history-of-malware/1996-today
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00073-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94374
2,800
2.796875
3
Cyber-attacks work the same way the Internet does, using the Domain Name System (DNS) to distribute malware, control botnets and phish login credentials. With the mainstream adoption of cloud services, bring-your-own-device programs and off-network workers, the attack surface has expanded beyond the traditional corpora...
<urn:uuid:c155eb8e-103f-4887-a7c0-9979016062ec>
CC-MAIN-2017-09
http://www.networkworld.com/article/2172911/tech-primers/secure-cloud-gateway--using-the-internet-to-fight-cyber-attacks.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00249-ip-10-171-10-108.ec2.internal.warc.gz
en
0.887919
1,159
2.984375
3
Aug 14, 2012 Harvard Researchers Use D-Wave Quantum Computer to Fold Proteins Paper published in Nature Scientific Reports shows that optimization problems in biophysics can be solved with a quantum computer. Burnaby, BC - Milpitas, CA - August 14, 2012 - In a paper published yesterday in Nature Scientific Reports,http...
<urn:uuid:45f2d7a9-15b0-4faf-b175-78dcdefbf8ac>
CC-MAIN-2017-09
https://www.dwavesys.com/news/harvard-researchers-use-d-wave-quantum-computer-fold-proteins
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00125-ip-10-171-10-108.ec2.internal.warc.gz
en
0.917403
711
3.1875
3
A space-time cloak? Time holes? It's not science fiction anymore. - By William Jackson - Jan 06, 2012 In the “Star Trek” saga, the United Federation of Planets never figured out the cloaking technology that allowed Romulan warships to pop in and out of Federation space without being detected. But 21st-century Earth sci...
<urn:uuid:af1f1619-3336-441a-ac4e-9ae87ba0bb3e>
CC-MAIN-2017-09
https://gcn.com/articles/2012/01/06/cybereye-hackers-could-exploit-space-time-cloak.aspx?admgarea=TC_EMERGINGTECH
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00245-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945798
716
3.03125
3
The U.S. military uses unmanned aerial vehicles of all sizes from the 4-pound, hand-launched Raven to the 15,000-pound Global Hawk that takes off and lands on a runway. Most of the military’s mid-sized drones are fixed wing, which means they need launch and recovery mechanisms that often aren't available in the remote ...
<urn:uuid:25da221b-003d-47e7-9648-b6cc39420624>
CC-MAIN-2017-09
http://m.nextgov.com/defense/2017/02/video-darpa-tests-drone-catching-prototype/135216/?oref=m-ng-channelriver
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00297-ip-10-171-10-108.ec2.internal.warc.gz
en
0.944152
167
2.5625
3
Shaders and Rendering The surface of any object or character is described by a shader, whether it's intended for a game engine or a software renderer. For those who thought that was a texture's job, the texture is just a sub-node of a shader. A simple shader might have a diffuse color file texture with another texture ...
<urn:uuid:303270a4-3666-4a47-8ee6-a65cae049172>
CC-MAIN-2017-09
https://arstechnica.com/apple/2010/09/an-intro-to-3d-on-the-mac-part-ii-animation-and-rendering/4/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00473-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934553
2,385
2.640625
3
Tech View: Technology for Making TV Viewing Easy TV viewing has become harder. With massive amounts of available content—some homes have access to 400+ channels, a number that may rise soon to 1,000—and accessory devices such as set-top boxes, DVRs, converter boxes, TiVo®, and VCRs, watching and recording TV requires s...
<urn:uuid:9740dbd7-c30e-488c-9071-5be81e7bdba6>
CC-MAIN-2017-09
http://www.research.att.com/articles/featured_stories/2009/200910_techview_tech_making_tv_viewing_easy.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171933.81/warc/CC-MAIN-20170219104611-00469-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950864
1,802
2.515625
3
Secure Sockets Layer (SSL) is a protocol designed to enable encrypted, authenticated connection across the Internet. SSL is used mostly in communication between web browsers and web servers. URL's that begin with 'https' indicate that an SSL connection will be used. Online shopping sites frequently use SSL technology t...
<urn:uuid:924aee45-8740-44e5-94b7-51b22ac0c944>
CC-MAIN-2017-09
http://www.codero.com/knowledge-base/content/37/99/en/i-have-a-dedicated-server-how-can-i-install-my-commercial-ssl-certificate-on-my-server-using-plesk.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00169-ip-10-171-10-108.ec2.internal.warc.gz
en
0.854633
714
2.625
3
Cookies provide a method for creating a stateful HTTP session and their recommended use is formally defined within RFC2965 and BCP44. Although they are used for many purposes, they are often used to maintain a Session ID (SID), through which an individual user can be identified throughout their interaction with the sit...
<urn:uuid:eb01cfea-1bf2-452d-ba54-f8b7469e3575>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2004/06/27/cookie-path-best-practice/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00169-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936829
259
3.140625
3
Excerpt from Chapter 6 of Copyright © 2002 Addison-Wesley. This paper was also published as an article in CSI’s Computer Security Journal, Summer 2002 (see Note 14). Strong Password Policies (I cheat and make all my computer accounts use the same password.) – Donald A. Norman, The Design of Everyday Things Since passwo...
<urn:uuid:3cdb439c-977c-4fd1-8a4a-d273129f51af>
CC-MAIN-2017-09
https://cryptosmith.com/password-sanity/dilemma/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00165-ip-10-171-10-108.ec2.internal.warc.gz
en
0.934603
6,218
3.34375
3
Warnings are Futile if People Don't Respond At the time, the PTWC was the only agency to detect that tragic event, but its warnings to governments surrounding the Indian Ocean went mostly ignored, with deadly results. Now, a warning system is in place, and for the moment, it's all run by the U.S. National Weather Servi...
<urn:uuid:e8353e96-ca30-46e3-9f67-0facccb5ebe1>
CC-MAIN-2017-09
http://www.eweek.com/c/a/IT-Infrastructure/Japan-Earthquake-Sends-Pacific-Tsunami-Warning-Data-Network-into-Action-104446/1
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00462-ip-10-171-10-108.ec2.internal.warc.gz
en
0.970638
554
2.90625
3
iOS vs. Android: Text selection and copying iOS 4 makes it easy to edit text. Simply insert the text cursor where you want to make a change; iOS even magnifies the area you are touching to make the text more legible (upper left). When you tap and hold on text in any app, iOS provides selection handles and pop-up button...
<urn:uuid:c0c18754-b200-4e93-9371-28826eba2310>
CC-MAIN-2017-09
http://www.networkworld.com/article/2869706/network-security/mobile-deathmatch--apple-ios-4-vs--android-2-2--side-by-side.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00462-ip-10-171-10-108.ec2.internal.warc.gz
en
0.906476
171
2.578125
3
I will not, under any conditions, make some snarky Harry Potter quips here. Nor will I descend in to Star Trek analogies or Star Wars references. What I will say is that scientists from Duke University have made history by making a cylinder disappear from a certain perspective by essentially bending light around the ob...
<urn:uuid:a3a8dfac-14ab-4dea-af62-5e5a598ca4ee>
CC-MAIN-2017-09
http://www.cio.com/article/2370934/internet/duke-scientists-make-an-object--invisible-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00458-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950202
179
3.203125
3
Five Steps to Resolving Workplace ConflictBy Larry and Meagan Johnson | Posted 2010-12-21 Email Print Conflicts often arise in a multigenerational environment, so it’s important for managers to understand the differences among age-groups. For the first time in history, five generations are working side by side. Since c...
<urn:uuid:ff538e84-8e2c-400e-b52e-3805ba45abd0>
CC-MAIN-2017-09
http://www.baselinemag.com/careers/Five-Steps-to-Resolving-Workplace-Conflict
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00634-ip-10-171-10-108.ec2.internal.warc.gz
en
0.946285
1,054
2.765625
3
Your Mobile Phone Is Safe - Don't believe virus hoaxes 06 Nov 2002 Kaspersky Lab brings attention to the spread of a rumor among Internet users regarding a new computer virus that infects mobile telephones and renders them junk. The message being sent around looks as follows: If you receive a phone call and your mobile...
<urn:uuid:869f5584-9c91-40a8-a078-4636db86870b>
CC-MAIN-2017-09
http://www.kaspersky.com/au/about/news/virus/2002/Your_Mobile_Phone_Is_Safe_Don_t_believe_virus_hoaxes
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170600.29/warc/CC-MAIN-20170219104610-00634-ip-10-171-10-108.ec2.internal.warc.gz
en
0.914597
315
2.75
3
The FCC is making it easier to launch in-flight Internet services on planes in the U.S. by setting up a standard approval process for onboard systems that use satellites. Since 2001, the Federal Communications Commission has approved some satellite based Internet systems for airplanes, called Earth Stations Aboard Airc...
<urn:uuid:56cb05e8-7346-40f0-b9a7-ccce4e5914cf>
CC-MAIN-2017-09
http://www.computerworld.com/article/2494275/mobile-wireless/fcc-eases-licensing-for-in-flight-internet-gear-on-aircraft.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00158-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941522
264
2.59375
3
In an effort to further human and robot cooperation in space, a NASA astronaut aboard the International Space Station flying 240 miles above Earth controlled a robot on the ground. NASA researchers are working to someday make it possible for astronauts onboard an orbiting spacecraft to control robots working on the moo...
<urn:uuid:c9bcf526-8014-4be2-a34b-059a3ab105ac>
CC-MAIN-2017-09
http://www.networkworld.com/article/2167869/data-center/in-first--nasa-astronaut-in-space-controls-robot-on-earth.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00158-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941938
672
4.125
4
IBM the Humanitarian Opinion: By using its expertise in backing the World Community Grid project, IBM also gets the chance to demonstrate the benefits of grid computing.Making use of unused CPU cycles on your client computers isnt a new idea. Going back into the 1980s, there was network database software that let you i...
<urn:uuid:8a252b7e-0f4c-426c-8cb6-1d4239c850d2>
CC-MAIN-2017-09
http://www.eweek.com/c/a/Cloud-Computing/IBM-the-Humanitarian
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172017.60/warc/CC-MAIN-20170219104612-00210-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95634
346
2.640625
3
If Smart Grid technology is to work, the entire communications industry will have to align with the information technology and power and energy industries, with the input of manufacturers, policymakers, educators, academics, governments, engineers, computer scientists, researchers and others. Simply getting everyone in...
<urn:uuid:ef54cddd-3d08-4dbe-ac91-52ac7f3edaa9>
CC-MAIN-2017-09
https://www.cedmagazine.com/print/news/2010/01/ieee-sets-up-smart-grid-clearinghouse
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00330-ip-10-171-10-108.ec2.internal.warc.gz
en
0.907613
596
2.859375
3
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for Supervisory Control And Data Acquisition, the computer control systems at the heart of many industrial automation and control systems. First developed in th...
<urn:uuid:b1d44d7b-c53b-42a1-8034-650bcdf449b3>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/03/07/the-scada-security-challenge/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00506-ip-10-171-10-108.ec2.internal.warc.gz
en
0.951216
2,000
2.84375
3
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, web board, email, or from an instant message. ...
<urn:uuid:4722d30a-b1c7-4ddd-9ab9-70729d0a112d>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2002/11/06/the-cross-site-scripting-faq/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00206-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93427
156
3.578125
4
As silicon-based electronics come up against the physical limitations of nanoscale, researchers are scrambling to find a viable replacement that would breath new life into Moore’s law and satisfy the demand for ever faster, cheaper and more energy-efficient computers. A new computer made of carbon nanotubes, created by...
<urn:uuid:ea19b181-1c39-4fa5-92e0-0435b5691edf>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/09/27/stanford_debuts_first_carbon_nanotube_computer/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00202-ip-10-171-10-108.ec2.internal.warc.gz
en
0.918096
681
4.0625
4
Researchers Develop Home Gestural Control Using Wi-Fi By Barry Levine / CIO Today. Updated June 05, 2013. You wave your arm while in the shower to lower the music volume, or you make a hand gesture in the air from bed to turn up the thermostat. That vision of a gesture-anywhere life may have taken a step closer toward ...
<urn:uuid:9cf7d03e-9ee6-4b08-808c-fc7e69cfa781>
CC-MAIN-2017-09
http://www.cio-today.com/article/index.php?story_id=111008IQA7J6
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171608.86/warc/CC-MAIN-20170219104611-00554-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950537
790
2.78125
3
PROBLEM/SITUATION: Digital signatures are not yet legal in many states. SOLUTION: Utah's digital signature law. JURISDICTION: Utah Department of Commerce. VENDORS/GROUPS: Rankin Technology Group, Informix, Four Gen. USER CONTACT: George R. Danielson, 801/530-6421; Utah, which in early 1995 was the first state to pass a...
<urn:uuid:db9309f5-28c0-4de6-8eb4-3edd8b770aac>
CC-MAIN-2017-09
http://www.govtech.com/featured/Digital-Signature-Law-Inked.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00426-ip-10-171-10-108.ec2.internal.warc.gz
en
0.9346
1,344
2.546875
3
A story first posted on ArabNews.com has been making the rounds on the Internet, involving an Indian student who has allegedly found a method of storing compressed digital information on a regular sheet of paper. Sainul Abideen claims that his technique, dubbed Rainbow Technology, can store between 90 and 450 GB on a s...
<urn:uuid:99c0df5e-0ffc-4fde-a818-a8bfcd1659f3>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2006/11/8288/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00426-ip-10-171-10-108.ec2.internal.warc.gz
en
0.935529
749
3.109375
3
Interesting article on Analyzing DNS Logs Using Splunk and being able to identify if splunk sees a DNS lookup for a known bad domain name. Again, if you use our data as this article does, do not pull the zone file more than once every 12 hours or you will be banned. Better yet, check to see if the file has changed firs...
<urn:uuid:26a55155-d44c-4858-afac-f40e4ff5ae9f>
CC-MAIN-2017-09
http://www.malwaredomains.com/?cat=31
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00422-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93139
272
2.59375
3
In preparation of our CCNA exam, we want to make sure we cover the various concepts that we could see on our Cisco CCNA exam. So to assist you, below we will discuss Cisco Router Basics. Basics Of Cisco Routers Cisco is well known for its routers and switches. I must admit they are very good quality products and once t...
<urn:uuid:d7bd906a-2135-4f95-9112-8a12c1d4ce27>
CC-MAIN-2017-09
https://www.certificationkits.com/cisco-router-basics/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00474-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941338
1,977
3.28125
3
What email address or phone number would you like to use to sign in to Docs.com? If you already have an account that you use with Office or other Microsoft services, enter it here. Or sign in with: Signing in allows you to download and like content, and it provides the authors analytical data about your interactions wi...
<urn:uuid:e05a6856-9420-4a1b-a74d-51c429b2eaa7>
CC-MAIN-2017-09
https://docs.com/danielle-poppell/1057/unit-3-study-guide
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00418-ip-10-171-10-108.ec2.internal.warc.gz
en
0.840583
1,108
2.59375
3
Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, missing out on one of the key advantages of Linux: the command line. The command line interface is the most efficient and powerful way to intera...
<urn:uuid:898f70e5-1020-4f67-bd18-74dbf40eef5c>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2012/01/11/the-linux-command-line/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00342-ip-10-171-10-108.ec2.internal.warc.gz
en
0.910422
337
2.84375
3
If you’re one of the 175 million Pandora users, then you have surely experienced the excitement of having the Internet’s most popular radio station introduce you to a brand-new artist or song. While it may seem like magic, there is a perfectly logical explanation behind Pandora’s ability to seemingly read your mind and...
<urn:uuid:655c0943-481b-472b-822d-489fbc8bce01>
CC-MAIN-2017-09
https://www.hpcwire.com/2013/02/18/scaled_out_music_scaled_down_infrastructure/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00339-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933867
1,055
2.984375
3
For my security concentration last semester I took an interesting course on the principles of Cryptography. My proffesor, Dr. Shouhuai Xu is a huge crypto enthusiast and has published many articles and papers on his experiments that I have found very interesting. This particular paper discusses memory disclosure attack...
<urn:uuid:0e0a6bfd-0786-41f1-bc7f-7ba84fa71ad0>
CC-MAIN-2017-09
https://www.ibm.com/developerworks/community/blogs/242fafe4-766c-4c93-bb7d-3d2a5ee1cbd6/entry/memory_disclosure_attacks_do_you_know_where_your_keys_are2?lang=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00215-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950758
300
2.515625
3
The device looks like a small piece of carry-on luggage, but it has a more important job than carrying a toothbrush, deodorant and a couple of pairs of underwear. The suitcase-size device is a microwave transmitter designed by two U.S. government agencies to help rescue workers find living victims buried in rubble afte...
<urn:uuid:36a07de4-0f57-4a2d-8bf3-1f1854734189>
CC-MAIN-2017-09
http://www.cio.com/article/2382220/government-use-of-it/suitcase-size-device-may-help-save-lifes-of-disaster-victims.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00335-ip-10-171-10-108.ec2.internal.warc.gz
en
0.936472
551
3.015625
3
A few days ago, a critical bug was found in the common OpenSSL library. OpenSSL is the library that implements the common SSL and TLS security protocols. These protocols facilitate the encrypted tunnel feature that secure services -- over the web and otherwise -- utilize to encrypt the traffic between the client (user)...
<urn:uuid:c0856127-6731-4944-9e83-edb1eb896781>
CC-MAIN-2017-09
https://www.hbarel.com/analysis/itsec/openssl-heartbleed-bug
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00511-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961075
1,614
2.609375
3
Technology is meant to make life easier for those who take advantage of it, but an advantage for some is a disadvantage for others. No one can deny that the Internet has made life easier, but the findings of a recent global United Nations report found that only 3 percent of Web sites are accessible to persons with disa...
<urn:uuid:f12cea98-5332-440a-bb8e-af1c3bbe4342>
CC-MAIN-2017-09
http://www.govtech.com/policy-management/Technology-Can-Improve-Lives.html?page=2
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00331-ip-10-171-10-108.ec2.internal.warc.gz
en
0.955901
1,173
3.265625
3
A group of researchers from University of California, Berkeley, claims to have achieved 99 percent accuracy when using brainwave signals instead of passwords for user authentication. The timing was right, they say, because while EEG data was in the past captured with invasive probes, this data can now be collected usin...
<urn:uuid:0be45880-beb5-4568-9cf9-42ac3ba251ef>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2013/04/16/pass-thoughts-as-a-solution-to-the-password-problem/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00031-ip-10-171-10-108.ec2.internal.warc.gz
en
0.970491
523
3.0625
3
Secure storage of data has always been essential for any organisation, of whatever size. In the past this involved accurate filing of paper records, and then keeping the physical archive secure – whether it was simply locking a filing cabinet, or guarding an entire building. Modern business technology may have virtuali...
<urn:uuid:af1ca134-d2ce-40aa-9a15-52966f770563>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2005/09/08/popular-policies-keeping-storage-secure/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00207-ip-10-171-10-108.ec2.internal.warc.gz
en
0.953813
1,293
2.703125
3
Wendy Harman, social strategy director for the American Red Cross, monitors social media using tech platform Radian6 to gain real-time insight during disasters. Photo by David Kidd. During the Deepwater Horizon oil spill, citizens used social media to share health effects, odor, smoke, whether wildlife was effected, an...
<urn:uuid:f46cf995-a706-41e7-9a92-4dc8f69da5a4>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Government-Technology-January-2013.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00383-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945176
109
2.609375
3
Power plants deliver usable energy to the world and are among the top-rated, high-risk facilities. Conservative and regimented in tried and proven SOPs, these energy generators operate on strict day-to-day practices that ensure the security and safety of people and assets. As the threat of terrorist attacks become more...
<urn:uuid:ed782c9c-dc4c-4316-adb4-da519b22673c>
CC-MAIN-2017-09
https://www.asmag.com/showpost/9303.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00083-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948441
1,978
2.75
3
A small robot says, "Good morning," and with that one phrase, takes a huge step forward in robot-human cooperation in space, as well as robotic companions. Kirobo, a 13.4-in. tall, 2.2-pound humanoid robot, spoke its first words in space, while floating onboard the International Space Station last month. A newly releas...
<urn:uuid:dddcc318-2f61-4f18-b553-effe6858f943>
CC-MAIN-2017-09
http://www.computerworld.com.au/article/525783/hello_from_space_kirobo_takes_huge_step_robotics/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00203-ip-10-171-10-108.ec2.internal.warc.gz
en
0.958748
938
2.84375
3
One of the problems with smartphone apps is that one has no control over where often sensitive permissions and personal content is stored. While we’re allowed a certain amount of input when it comes to downloading the app and installing it: agree to the permissions or else, we have no control over where or how all the ...
<urn:uuid:f28603a4-b0c0-480b-b1a1-e7bf12d999d1>
CC-MAIN-2017-09
http://www.networkworld.com/article/3047821/security/user-controlled-private-clouds-could-help-with-security-think-scientists.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00255-ip-10-171-10-108.ec2.internal.warc.gz
en
0.943705
777
2.578125
3
Alaska's scale puts USGS mapping systems to the test - By Patrick Marshall - Feb 27, 2014 The U.S. Geological Survey is spearheading an effort to collect high-resolution elevation data for the entire United States that will be used to create 3D maps for gauging flood risks, monitoring the health of crops and measuring ...
<urn:uuid:21b604d5-2589-4f12-bfc1-4be93dfcc04d>
CC-MAIN-2017-09
https://gcn.com/articles/2014/02/27/mapping-alaska.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00255-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961299
642
2.90625
3
RAM is a commodity component and therefore relatively inexpensive, yet it possesses outstanding performance characteristics and lacks the shortcomings that are attributed to Flash devices. RAM is an excellent technology to leverage for accelerating I/O performance and delivers a very high benefit-to-cost ratio across t...
<urn:uuid:7d93ba01-9a86-42ed-94d7-e4d755a65adf>
CC-MAIN-2017-09
https://www.datacore.com/products/features/High-Speed-Caching.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00075-ip-10-171-10-108.ec2.internal.warc.gz
en
0.940665
142
2.515625
3
Scientists are working on creating a new biometric bracelet that could also “talk” to devices on a person’s body, allowing data collected by blood pressure cuffs and heart monitoring devices to be matched to correct electronic records. The devices could prevent mix-ups of health records at military and veteran hospital...
<urn:uuid:603e1ddc-91dc-44c2-8141-9ed71d43ebbb>
CC-MAIN-2017-09
http://www.nextgov.com/health/2012/08/biometric-wristband-could-match-health-monitoring-devices-electronic-records/57296/?oref=ng-HPriver
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00171-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94065
258
2.96875
3
Any new technology deployment presents challenges, and long-term evolution (LTE) is no exception. Moreover, as LTE is not an evolution of existing deployments, but rather a replacement that is backward-compatible, the challenges this technology brings with it seems more pronounced and includes the following: distance, ...
<urn:uuid:ba7dcc4b-4b01-402a-af13-72aeaa64e6a2>
CC-MAIN-2017-09
http://www.mobilitytechzone.com/topics/4g-wirelessevolution/articles/2012/06/27/296712-increasing-mobile-data-traffic-drives-demand-performance-testing.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170794.46/warc/CC-MAIN-20170219104610-00115-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93761
1,904
2.890625
3
In the age of the digitally innovative classroom, nearly all school districts have some kind of Internet blocking and filtering mechanism to keep kids safe from inappropriate online content. It is also likely that almost all students have figured out ways to get around these blocks and filters to get to content that th...
<urn:uuid:339e1d4e-0d83-429b-b020-31d8db392de7>
CC-MAIN-2017-09
https://www.imperosoftware.com/the-key-benefits-of-adding-monitoring-software-to-your-school-network/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00112-ip-10-171-10-108.ec2.internal.warc.gz
en
0.920509
1,042
2.609375
3
Google has revealed it plans to build its own self-driving cars from the ground up, per an announcement from founder Sergey Brin at the Code Conference Tuesday. The company revealed one such car to Recode, a highly compact two-seater without a steering wheel. Google had previously been retrofitting Toyota Priuses and L...
<urn:uuid:562f576a-9515-4e3b-8cfe-4e645a654d24>
CC-MAIN-2017-09
https://arstechnica.com/gadgets/2014/05/google-builds-a-prototype-self-driving-car-sans-steering-wheel/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967101
361
2.5625
3
User Account Control – What Penetration Testers Should KnowMarch 20, 2014 UAC is User Account Control. Introduced in Windows Vista, UAC is a collection of technologies that make it convenient possible to use Windows without administrator privileges and elevate your rights when needed. UAC has a lot of moving parts and ...
<urn:uuid:234abd4a-45df-4cb1-8d9d-dd14337d6f13>
CC-MAIN-2017-09
https://blog.cobaltstrike.com/2014/03/20/user-account-control-what-penetration-testers-should-know/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz
en
0.912051
2,883
2.84375
3
Adam B.,Institute For Angewandte Okologie | Faller M.,Aussenstelle Des Institute For Angewandte Okologie | Gischkat S.,Aussenstelle Des Institute For Angewandte Okologie | Hufgard H.,Aussenstelle Des Institute For Angewandte Okologie | And 2 more authors. WasserWirtschaft | Year: 2012 Since the new double slot pass has...
<urn:uuid:12d5da49-02ca-47bd-ba6b-5309b334b311>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/aussenstelle-des-institute-for-angewandte-okologie-1491675/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00640-ip-10-171-10-108.ec2.internal.warc.gz
en
0.916964
306
2.6875
3
Identifying a Skills Gap in the Workforce The gulf between the capabilities of a collective workforce and the level of aptitude an employer demands is known as a “skills gap” in the labor market. Serious problems arise when a workforce’s proficiency cannot keep pace with economic development. In an increasingly interco...
<urn:uuid:377aff0c-882b-4d4f-9c3e-ab4816276443>
CC-MAIN-2017-09
http://certmag.com/identifying-a-skills-gap-in-the-workforce/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00164-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954563
1,009
2.578125
3
OTTAWA, ONTARIO--(Marketwired - May 22, 2014) - The Royal Canadian Legion acknowledged Aboriginal Awareness Week as well as the many Aboriginal cultures in Canada, including First Nations, the Inuit and the Métis earlier today. "This week, designed to honour the Canadian Mosaic is a welcomed part of our Canadian Herita...
<urn:uuid:a98227b5-ca53-483a-9949-ee2c3750ea7d>
CC-MAIN-2017-09
http://www.marketwired.com/press-release/legion-supports-aboriginal-awareness-week-1913057.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00208-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960576
558
2.546875
3
PostgreSQL is a first-rate, enterprise-worthy open source RDBMS (relational database management system) that compares very favorably to high-priced closed-source commercial databases. Databases are complex, tricksy beasts full of pitfalls. In this two-part crash course, we'll get a new PostgreSQL database up and runnin...
<urn:uuid:03c218dc-3f9f-4b7e-96e4-b3fda2129348>
CC-MAIN-2017-09
http://www.itworld.com/article/2738507/data-center/crash-course-in-postgresql--part-1.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00028-ip-10-171-10-108.ec2.internal.warc.gz
en
0.88088
572
2.703125
3
How Google Works: The Google File SystemBy David F. Carr | Posted 2006-07-06 Email Print For all the razzle-dazzle surrounding Google, the company must still work through common business problems such as reporting revenue and tracking projects. But it sometimes addresses those needs in unconventional—yet highly efficie...
<urn:uuid:1e49cc13-a11b-4181-a30f-e14eba74c3ad>
CC-MAIN-2017-09
http://www.baselinemag.com/c/a/Infrastructure/How-Google-Works-1/4
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00256-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931283
769
3.078125
3
Digital video using standards such as that from Motion Picture Experts Group (MPEG) for encoding video to compress, transport, uncompress, and display it has led to a revolution in computing ranging from social networking media and amateur digital cinema to improved training and education. Tools for decoding and consum...
<urn:uuid:942786d3-8817-46e1-b608-e55b384be67b>
CC-MAIN-2017-09
http://www.ibm.com/developerworks/cloud/library/cl-cloudscaling3-videoanalytics/index.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00076-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91707
4,497
2.953125
3
It seems incredible to believe that of all the people on the planet, Stephen Hawking’s communication system has never used the sort of predictive typing found in modern smartphones, or even a backspace key. Now it does, via a partnership between Intel and Swiftkey. Hawking, who suffers from an advanced stage of amyotro...
<urn:uuid:5dcc8adc-7126-4971-8143-900217fce09e>
CC-MAIN-2017-09
http://www.cio.com/article/2854453/consumer-technology/intel-swiftkey-upgrade-stephen-hawkings-communication-technology.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.84/warc/CC-MAIN-20170219104611-00252-ip-10-171-10-108.ec2.internal.warc.gz
en
0.95936
705
2.609375
3
The technology and computerization increasingly being installed in courtrooms across the country is changing the job of court reporters, and is, in some cases, replacing them. Overloaded and underfunded courts are increasingly looking at audio and video recording as a way to cut costs, which is achieved mainly by elimi...
<urn:uuid:4be71d90-bf02-40b6-9a77-189bb5982149>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Court-Reporting-From-Stenography-to-Technology.html?page=3
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171176.3/warc/CC-MAIN-20170219104611-00424-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965203
1,989
2.5625
3
Global investment in the renewable energy (RE) market exceeded $300 billion in 2014, at a 16% growth rate over 2013. Biomass and waste-to-energy (WTE) projects saw more than $8 billion worth of investment in 2014. With rising primary energy needs, Southeast Asia is experiencing power turbulence across most of its econo...
<urn:uuid:5c028fe9-ec3a-44fa-a104-85015e78b412>
CC-MAIN-2017-09
https://www.brighttalk.com/search?q=biomass
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00600-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926921
1,501
2.78125
3
As seminal punk band NOFX once sang, “Electricity / All we need to live today / A gift for man to throw away.” The data center industry has a love hate relationship with electricity. It’s obviously a crucial resource that enables the productivity and innovation gains of cloud and large-scale computing, but it comes fro...
<urn:uuid:8c1b9e3b-4597-4153-9602-4eceb05bf12b>
CC-MAIN-2017-09
https://www.greenhousedata.com/blog/three-ways-data-centers-can-build-the-future-of-electricity-and-smart-grids
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00244-ip-10-171-10-108.ec2.internal.warc.gz
en
0.937201
1,453
2.90625
3
PHP is a general purpose scripting language widely used in World Wide Web (WWW) pages and applications. Two buffer overflows have been reported in the PHP session extension; the str_replace() function; and the imap_mail_compose() function. An attacker could pass a very long string to the str_replace() function and crea...
<urn:uuid:13bb470f-95f5-4682-9536-29b1e35c17c9>
CC-MAIN-2017-09
https://downloads.avaya.com/elmodocs2/security/ASA-2007-136.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170708.51/warc/CC-MAIN-20170219104610-00420-ip-10-171-10-108.ec2.internal.warc.gz
en
0.853255
1,469
2.640625
3
During a murder investigation, sometimes all that surfaces are human bones. Without proper identification to verify who the deceased person is, it’s up to forensic artists to re-create an image of what the person may have looked like while alive to help law enforcement identify the individual. At the National Center fo...
<urn:uuid:d08efe6c-e3e1-4bab-90fb-4cf309e827b3>
CC-MAIN-2017-09
http://www.govtech.com/technology/Facial-Reconstruction-Tech-Helps-Identify-Skeletal-Remains.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00296-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954965
780
2.875
3
Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands. How do you feel about your Web-browsing activity being tracked? During a visit to any given website -- including this one -- the a...
<urn:uuid:f4f482e5-eb8f-4078-a1f5-d3797142432b>
CC-MAIN-2017-09
http://www.networkworld.com/article/2175737/byod/ad-tracking--is-anything-being-done-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00172-ip-10-171-10-108.ec2.internal.warc.gz
en
0.959298
2,632
2.53125
3
802.11ad Will Vastly Enhance Wi-Fi: The Importance of the 60 GHz Band to Wi-Fi’s Continued Evolution 05 Apr 2016 Wi-Fi continues to evolve in the 2.4 GHz and 5 GHz bands, but as those bands get more crowded, the industry will increasingly look to IEEE 802.11ad, also known as WiGig, in the unlicensed 60 GHz band. 802.11...
<urn:uuid:260f3ca9-0aa4-43e8-916a-6da54f8709ce>
CC-MAIN-2017-09
https://www.abiresearch.com/whitepapers/80211ad-will-vastly-enhance-wi-fi/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00172-ip-10-171-10-108.ec2.internal.warc.gz
en
0.905686
224
2.625
3
A network card interface or NIC Card (also referred to as a Network Interface Controller, Network Adapter, LAN Adapter or LAN card) is how your computer connects to the wired network in your home or office. It is a physical and data link layer device which uses MAC addresses. NIC adapter is plugged inside the computer ...
<urn:uuid:442ab2b3-a4d2-4ce4-af4a-919e832cead5>
CC-MAIN-2017-09
http://www.fs.com/blog/performance-of-network-interface-cards.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00292-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926498
608
3.328125
3
To continue on the topic of passwords: not only should you use a proper iteration count when implementing password hashing in code — the same thing also applies to password safe software such as KeePass. As strong passwords are pain to remember, many people opt to use KeePass or other password managers, and then copy t...
<urn:uuid:60f321d3-56f0-4985-bd69-fc637d97c5bb>
CC-MAIN-2017-09
https://www.f-secure.com/weblog/archives/00002382.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00344-ip-10-171-10-108.ec2.internal.warc.gz
en
0.91103
462
2.5625
3
Chang E.R.,University of Groningen | Veeneklaas R.M.,University of Groningen | Veeneklaas R.M.,Bosgroep Noord Oost Nederland Forest Support Group | Bakker J.P.,University of Groningen | And 3 more authors. Applied Vegetation Science | Year: 2016 Questions: How successful was the restoration of a salt marsh at a former ...
<urn:uuid:9115fdc1-41c4-4601-b2a7-72b4841d92bb>
CC-MAIN-2017-09
https://www.linknovate.com/affiliation/bosgroep-noord-oost-nederland-forest-support-group-1567802/all/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00344-ip-10-171-10-108.ec2.internal.warc.gz
en
0.931511
1,397
2.609375
3
Twitter and Flickr, along with remote sensor data, can be used to identify flooded areas, a team of university researchers say. It's faster than using publicly available satellite images on their own. That imaging can sometimes take days to become available, the researchers say. It's also easier to identify the flooded...
<urn:uuid:54dae6ab-643d-4d02-906e-b1ca109a3997>
CC-MAIN-2017-09
http://www.networkworld.com/article/3026968/internet/machine-learning-social-media-data-help-spot-flooded-areas.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00113-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965548
710
3.6875
4
This resource is no longer available IP Version 6 Transitions Mechanisms Today businesses are in the midst of transitioning from IP version 4 to IP version 6. This is not a process that happens overnight - there is almost always a period of migration and/or coexistence when installing new components into an infrastruct...
<urn:uuid:34a8f9a3-1678-467b-8ade-83e5f0542b8f>
CC-MAIN-2017-09
http://www.bitpipe.com/detail/RES/1357306703_135.html?asrc=RSS_BP_TERM
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00641-ip-10-171-10-108.ec2.internal.warc.gz
en
0.928159
194
2.546875
3
Packet sniffing is a technique of monitoring network traffic. It is effective on both switched and nonswitched networks. In a non-switched network environment packet sniffing is an easy thing to do. This is because network traffic is sent to a hub which broadcasts it to everyone. Switched networks are completely differ...
<urn:uuid:6309fb89-f4c3-4367-a816-0d875834171f>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2003/12/15/packet-sniffing-on-layer-2-switched-local-area-networks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00165-ip-10-171-10-108.ec2.internal.warc.gz
en
0.927313
319
3.40625
3
I think it’s fair to say that Google has done some pretty innovative things. They seem to be a smart and focused bunch of people. Not surprisingly, companies with talented, focused people can be quite innovative. When you throw billions of dollars of funding behind them, the results can be pretty impressive. Recently, ...
<urn:uuid:6bc8eb60-ac00-4cf9-99a5-b8889bff4129>
CC-MAIN-2017-09
http://www.internap.com/2012/04/12/recycled-water-good-for-google-too/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171670.52/warc/CC-MAIN-20170219104611-00341-ip-10-171-10-108.ec2.internal.warc.gz
en
0.961337
406
2.828125
3
A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it. Detailed instructions for F...
<urn:uuid:a6e3a564-06b6-4f60-ae1c-4279bab3a2ff>
CC-MAIN-2017-09
https://www.f-secure.com/v-descs/dtus.shtml
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00517-ip-10-171-10-108.ec2.internal.warc.gz
en
0.911846
385
2.578125
3
The U.S. Environmental Protection Agency (EPA) announced Oct. 11 that it awarded $30 million for clean diesel projects across the country. The funding is part of the Diesel Emission Reduction Program (DERA) and State Clean Diesel Grant Program, which are intended to replace or retrofit old diesel-powered engines like t...
<urn:uuid:b4228aa5-e6f1-42c1-8a25-0112cd2fd758>
CC-MAIN-2017-09
http://www.govtech.com/transportation/EPA-Promotes-Clean-Diesel-With-30-Million.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00161-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965681
410
2.765625
3
You have probably heard the term ‘Adware’. This term describes an advertising-supported software, which seeks to make a profit out of commercial advertisements. There is a small line between legitimate advertising, illegal advertising and annoying advertising. Nonetheless, the fact is that the majority of free programs...
<urn:uuid:4d731731-8e54-442d-987b-aa7e5f8dceee>
CC-MAIN-2017-09
http://www.2-spyware.com/news/post4435.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00513-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938561
1,160
2.796875
3
Strong PulseBy Wendy Wolfson | Posted 09-01-2004 Foodborne diseases kill more and more people every year, yet they do not get the attention or funding showered on more exotic contagious diseases such as smallpox and anthrax, which strike only a few people per year, but do have the potential to be used as bioterror agen...
<urn:uuid:f52e18e1-73c0-4ad4-9a18-8b02ac7b4549>
CC-MAIN-2017-09
http://www.cioinsight.com/print/c/a/Past-News/Strong-Pulse
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171416.74/warc/CC-MAIN-20170219104611-00513-ip-10-171-10-108.ec2.internal.warc.gz
en
0.950456
500
3.046875
3
In four short years, we will all experience the unique transition of one millennium to another. Ona personal level, no real impact will be felt for most of us. Life will go on as usual. Unless, of course, you earn a living as an information technology (IT) professional. Analyst estimates indicate 20 percent of business...
<urn:uuid:457a4a43-c39a-4d76-a6c3-b89493a7975c>
CC-MAIN-2017-09
http://www.govtech.com/magazines/gt/Managing-Technology-.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz
en
0.952521
1,272
2.828125
3
Previously, in our continuing series on selling to the government, we looked at contracting methods and the federal government's view of "fair and reasonable pricing." Let's now turn our attention to how the federal government deals with the financial and performance risks in contracting, which it addresses through con...
<urn:uuid:c18b1498-e3da-423a-9cf7-5dad4748c47b>
CC-MAIN-2017-09
http://www.crn.com/news/channel-programs/240157726/selling-to-the-government-contract-types-in-federal-procurement.htm?cid=rss_tax_Channel-programs
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00565-ip-10-171-10-108.ec2.internal.warc.gz
en
0.93855
652
2.5625
3
[This is my second post on a series of articles that I would like to cover different tools and techniques to perform file system forensics of a Windows system. The first article was about acquiring a disk image in Expert Witness Format and then mount it using the SIFT workstation. The below one will be about processing...
<urn:uuid:f8072797-6497-4eba-93ac-91404089301f>
CC-MAIN-2017-09
https://countuponsecurity.com/2015/11/10/digital-forensics-ntfs-metadata-timeline-creation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174276.22/warc/CC-MAIN-20170219104614-00565-ip-10-171-10-108.ec2.internal.warc.gz
en
0.926327
1,589
2.546875
3
Cloud Computing Definition As with any burgeoning technology, cloud computing remains in flux in terms of its definition. Cloud steadily rises in popularity and familiarity with both tech nuts and the general public, thanks to an increase in advertising and more widely distributed education on just how useful it proves...
<urn:uuid:1443c0a0-082b-4586-b053-548d7a023e95>
CC-MAIN-2017-09
https://cloudtweaks.com/2012/03/coining-the-cloud-an-assessment-of-cloud-computings-shifty-definition/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00209-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925767
709
2.625
3
Some time ago I was working on IPv6 implementation and in that period I wrote an article about NDP (you can read it here). After a while I received some comments that is not written very well so I reviewed a huge part of it. It looks my english was far worst two years ago that I was really aware of 🙂 In the reviewing ...
<urn:uuid:34f5cda8-43ee-4a0b-a8f0-0d26c5078d08>
CC-MAIN-2017-09
https://howdoesinternetwork.com/2015/solicited-node-multicast-address
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00561-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930748
1,120
2.765625
3
In a world where the reliance on electronic data transmission and processing is becoming every day more prevalent, it is of critical importance for organizations to guarantee the integrity and confidentiality of mission critical information exchanged over communication networks. Contrary to a false perception, intercep...
<urn:uuid:fc48f15c-4c90-403b-bc03-3104d897a99d>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2005/05/05/securing-optical-networks-with-quantum-cryptography/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173866.98/warc/CC-MAIN-20170219104613-00085-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938938
715
3.234375
3
The first letter R stands for rapport. A definition of rapport is a harmonious, empathetic, or sympathetic relation or connection to another self an accord or affinity. In other words, a close relationship in which people understand each others feelings, ideas and communicate well. As I pointed out earlier the purpose ...
<urn:uuid:aa640665-e925-416f-a516-142ab5e163b2>
CC-MAIN-2017-09
http://www.cioupdate.com/career/article.php/3922341/The-7-Habits-of-Highly-Effective-Presenters.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00029-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941775
1,316
3.390625
3
IP security cameras have become part of our daily lives. As security camera owners, we like to see the feed or snapshot of live video on our phones, remote computers, and many other places. In order to accomplish that, we need to do a configuration on our home routers or modems that is called port forwarding. We will g...
<urn:uuid:bc50306f-f4b1-411f-a2bd-1e35659835b4>
CC-MAIN-2017-09
https://www.a1securitycameras.com/port-forwarding-for-ip-security-cameras-and-networks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00205-ip-10-171-10-108.ec2.internal.warc.gz
en
0.965733
1,339
3.296875
3
How big of a problem is spyware? It’s big enough that the U.S. House of Representatives voted unanimously to stiffen jail sentences for those who use secret surveillance programs to steal credit card numbers or commit other crimes. Under the bill, known as the Internet Spyware (I-SPY) Prevention Act of 2004, those foun...
<urn:uuid:d434c52e-cae2-4f6b-a247-56a9ad48b9ca>
CC-MAIN-2017-09
https://www.helpnetsecurity.com/2005/01/21/spyware-an-update/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171163.39/warc/CC-MAIN-20170219104611-00381-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94227
1,542
2.828125
3
When your hard drive fails, it can start to smoke, trapping your data (and possibly setting off your smoke detector). If you’ve lost data due to a smoking hard drive, the professional hard drive repair experts at Gillware can recover your data and help you get back on your feet. People don’t often think about the heat ...
<urn:uuid:84379e08-6a51-436e-a0b1-8d78d27f4dfb>
CC-MAIN-2017-09
https://www.gillware.com/smoking-hard-drive-data-recovery/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00081-ip-10-171-10-108.ec2.internal.warc.gz
en
0.939773
1,937
2.859375
3
Sensors in your phone that collect seemingly harmless data could leave you vulnerable to cyber attack, according to new research. And saying no to apps that ask for your location is not enough to prevent the tracking of your device. A new study has found evidence that accelerometers—which sense motion in your smartphon...
<urn:uuid:5210643e-18c6-480f-b3c0-b59ca70ecc5b>
CC-MAIN-2017-09
http://www.nextgov.com/mobile/2014/04/phones-are-giving-away-your-location-regardless-your-privacy-settings/83302/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00377-ip-10-171-10-108.ec2.internal.warc.gz
en
0.94059
584
2.765625
3
A history of the Internet was created using Facebook's timeline feature by Internet education company Grovo. The timeline, which goes back to the year 1536, includes important dates like 1983, when the Internet was born, and 1978, when the first spam email was sent over the ARPANET. And in 1900, deep sea divers discove...
<urn:uuid:04b63854-03f5-4bb6-aff7-7f72524444a7>
CC-MAIN-2017-09
http://www.govtech.com/e-government/Colorful-Internet-History-Chronicled-on-Facebook.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00601-ip-10-171-10-108.ec2.internal.warc.gz
en
0.925198
279
3.1875
3
Quantum computing explained: D-Wave on NASA's system - By John Breeden II - Sep 10, 2013 If one of the 35 million books in the Library of Congress has a big red X on the inside cover, how long would it take a man to find it? Opening each book might take the searcher hundreds of years, unless he was very lucky. But what...
<urn:uuid:30279a3d-dd6b-46a7-9bd9-f93ba7d3ebb4>
CC-MAIN-2017-09
https://gcn.com/articles/2013/09/10/dwave-quantum-computing.aspx?admgarea=TC_BigData
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00301-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948465
1,180
3.484375
3
Subnetting is definitely one of the things you need to know inside and out to pass your CCENT 100-101 or CCNA 200-120 exam. You will see pretty straight forward subnetting questions and you will also see scenario based questions that you will need to employ your subnetting skills to determine where the problem resides....
<urn:uuid:3e871333-85dc-4574-9cfb-cced17e01002>
CC-MAIN-2017-09
https://www.certificationkits.com/ccent-ccna-subnetting-exam-question/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00477-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960179
714
3.578125
4
An ongoing multibillion-dollar overhaul of the nation's air traffic control (ATC) system is designed to make commercial aviation more efficient, more environmentally friendly and safer by 2025. But some white-hat hackers are questioning the safety part. The Next Generation Air Transportation System (NextGen) will rely ...
<urn:uuid:36ceefca-32cb-47a2-ae5f-746008bfd9f4>
CC-MAIN-2017-09
http://www.csoonline.com/article/2132793/access-control/hackers-say-coming-air-traffic-control-system-lets-them-hijack-planes.html?source=rss_news
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170434.7/warc/CC-MAIN-20170219104610-00245-ip-10-171-10-108.ec2.internal.warc.gz
en
0.960449
1,167
2.90625
3
Why Do I Have to Tighten Security on My System? (Why Can't I Just Patch?) - Page 2 The Lifecycle of the Modern Security Vulnerability I. Bug Discovery If we think about the security vulnerabilities that crackers exploit, whether locally or remotely, we realize that they're caused by one thing: a "bug" in either the des...
<urn:uuid:3a4f4ba8-74bd-4de1-9ff7-757a98ce69d1>
CC-MAIN-2017-09
http://www.enterprisenetworkingplanet.com/netsecur/article.php/10952_624511_2/Why-Do-I-Have-to-Tighten-Security-on-My-System-Why-Cant-I-Just-Patch.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00469-ip-10-171-10-108.ec2.internal.warc.gz
en
0.954187
1,699
2.96875
3
With much fanfare, NASA announced this week that its Kepler Space Telescope had discovered the first Earth-size planet that orbits a parent star in the so-called habitable zone, where temperatures could allow liquid water to collect on the surface. The planet has been named Kepler-186f, and the discovery itself is a fi...
<urn:uuid:4d68d1ce-a490-47c3-bd2f-3a30981412db>
CC-MAIN-2017-09
http://www.nextgov.com/big-data/2014/04/nasa-found-new-earth-planet-using-old-data/82819/
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171646.15/warc/CC-MAIN-20170219104611-00645-ip-10-171-10-108.ec2.internal.warc.gz
en
0.933626
636
3.546875
4
Genius People in History - Top 10 Genius People First off, you may be surprised to find that Albert Einstein is not included on this list of genius people. It is difficult to explain exactly what makes a person genius but it is fact that some people are genius by nature. The reason is that I have used a table of IQ est...
<urn:uuid:1becfea5-4756-4038-ad2e-e7d9b25c71a3>
CC-MAIN-2017-09
http://www.knowledgepublisher.com/article-862.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00114-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967306
1,830
2.890625
3
Smart-phone battery life could double -- without better batteries Batteries are the most unappreciated technology in use today. They almost never make the list of important innovations that changed modern society, though many of the technologies that do, like smart phones, rely heavily on them. For public-sector offici...
<urn:uuid:933c7331-9f20-4cad-95b9-8d205ddbcd08>
CC-MAIN-2017-09
https://gcn.com/blogs/emerging-tech/2012/11/smart-phone-battery-life-could-double-without-better-batteries.aspx?admgarea=TC_EmergingTech
null
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00518-ip-10-171-10-108.ec2.internal.warc.gz
en
0.964463
1,032
2.9375
3