text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Speech recognition, also known as automatic speech recognition (ASR), computer speech recognition, or speech-to-text, is a capability that enables a program to process human speech into a written format.
It is often confused with voice recognition, but speech recognition focuses on the translation of speech from a verb... | <urn:uuid:5eb428db-fb7b-432f-b5e1-847bf891b277> | CC-MAIN-2022-40 | https://aimagazine.com/technology/speech-recognition-and-ai-what-you-need-know | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00620.warc.gz | en | 0.915187 | 431 | 3.609375 | 4 |
The human brain is magnificent in its ability to process information. However, compared to advances in artificial intelligence and automation (which never sleep), it pales in its ability to keep up. The truth is, while some cybersecurity tasks must be performed by humans, there are some things that machines can accompl... | <urn:uuid:f4ecb0a6-05e3-4d76-8d82-a2f739f6a429> | CC-MAIN-2022-40 | https://www.bitlyft.com/resources/5-reasons-to-implement-security-automation-now | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00620.warc.gz | en | 0.941006 | 3,631 | 2.9375 | 3 |
There have been many major ransomware attacks in 2021. Bangkok Airways, Acer, the Brazilian National Treasury, and the Spanish government made the news this year. Here’s a look at the What are ransomware attacks and why are they on the rise?
What is ransomware?
Ransomware is a type of malware (malicious software), that... | <urn:uuid:304003b2-1182-40cc-ab10-632d7ca018fd> | CC-MAIN-2022-40 | https://news.networktigers.com/industry-news/why-are-ransomware-attacks-on-the-rise/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00620.warc.gz | en | 0.938844 | 1,115 | 3.25 | 3 |
To protect your child from prevalent online hazards such as: cyberbullying, online predators, and sexting, you need to teach your kids digital etiquette. Use parental control apps to let them understand how to use social media responsibly.
Being surrounded by electronic gadgets since birth, kids know the devices like t... | <urn:uuid:5734257c-be05-4009-9fa9-1cea95cd256f> | CC-MAIN-2022-40 | https://blog.bit-guardian.com/how-to-teach-your-kids-to-use-digital-media/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00020.warc.gz | en | 0.948758 | 1,585 | 3.375 | 3 |
Why penetration testing is important
Cyber security has become a major concern for all organisations, especially with the increase of remote working and working from home. One successful cyber attack can lose your business and destroy customer trust. It is, therefore, more important than ever to carry out vulnerability... | <urn:uuid:0a63c4dd-7182-450b-8580-62c2fb6da567> | CC-MAIN-2022-40 | https://www.bluefort.com/news/latest-blogs/why-penetration-testing-is-important/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00020.warc.gz | en | 0.91486 | 1,959 | 2.59375 | 3 |
Google researchers last month reported progress in advancing the image classification and speech recognition capabilities of artificial neural networks.
Image classification and speech recognition tools are based on well-known mathematical methods, but why certain models work while others don’t has been hazy, noted sof... | <urn:uuid:0ecac491-3dea-4feb-951a-95da3e46ad27> | CC-MAIN-2022-40 | https://www.crmbuyer.com/story/artificial-intelligence-dreamtime-82199.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00020.warc.gz | en | 0.95285 | 940 | 3.390625 | 3 |
A week — even a day — can make a world of difference in a presidential election. Witness the fact that nearly right up to the minute the still-unfolding Wall Street crisis came to a boil, the issue getting the most play in campaign speeches was oil prices. There was even a fair amount of speculation that one of John Mc... | <urn:uuid:9213c8cd-d070-47f6-adea-52e6d91e7170> | CC-MAIN-2022-40 | https://www.crmbuyer.com/story/while-wall-street-burns-candidates-views-on-tech-issues-simmer-64614.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00020.warc.gz | en | 0.960636 | 1,475 | 2.609375 | 3 |
- Fully Managed Technology Services
- Co-Managed Technology Services
By definition, Cybersecurity means measures taken to protect computers, servers, mobile devices, electronic systems, networks, and data against unauthorized access, theft, or malicious attacks.
Trying to keep up with the latest technology advances can... | <urn:uuid:92a71dca-864d-48f4-9587-9a75c6b9c1ca> | CC-MAIN-2022-40 | https://www.gflesch.com/elevity/cybersecurity-for-business | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00020.warc.gz | en | 0.936137 | 964 | 2.625 | 3 |
It’s been over seven years since the Conficker worm spread around the world, cracking passwords, exploiting vulnerabilities, and hijacking Windows computers into a botnet to distribute spam and install scareware.
It became one of the most serious malware outbreaks of all time.
Microsoft even offered a $250,000 reward f... | <urn:uuid:92318d4d-fcfb-47b6-a839-1bfaef50f9ad> | CC-MAIN-2022-40 | https://grahamcluley.com/seven-years-conficker-worm-dead-dominating/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00020.warc.gz | en | 0.944157 | 515 | 2.5625 | 3 |
During the worldwide COVID-19 pandemic, it became clear that there is a digital divide and not all students have the same access to educational technology. Some students may rely on the computers and internet access that is provided in an on-campus setting and may not have the same type of technology available to them ... | <urn:uuid:e351a1b1-f7a4-4db0-a48c-c05171afe195> | CC-MAIN-2022-40 | https://www.appsanywhere.com/resource-centre/online-or-distance-learning/blended-learning-challenges | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00220.warc.gz | en | 0.975726 | 528 | 2.8125 | 3 |
Cybersecurity Terminology Guide for Schools
Cybersecurity Terminology Guide for Schools
Download your free copy now
All too often in the field, our team has noticed organizations using different terminology to talk about the same concepts. This is especially common in schools where shareholders and clients become paren... | <urn:uuid:d6249a9d-cb85-41b3-94fb-b49b70b6e981> | CC-MAIN-2022-40 | https://frsecure.com/cybersecurity-terminology-guide-for-schools/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00220.warc.gz | en | 0.913279 | 1,960 | 2.890625 | 3 |
Content Management Interoperability Services (CMIS)
"An open standard for controlling content and document management systems and repositories using web protocols. In the early 2000s, there was a boom in content management systems for publishing data online. This included applications like Wordpress, Joomla, Drupal, et... | <urn:uuid:b5f33866-1796-43ba-ab28-867dadb1cb74> | CC-MAIN-2022-40 | https://www.intricately.com/glossary/content-management-interoperability-services-cmis | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00220.warc.gz | en | 0.908836 | 132 | 2.578125 | 3 |
New Research Tackles Quantum Error Correction
(HPC.Wire) Research co-authored by University of Massachusetts Amherst physicist Chen Wang, graduate students Jeffrey Gertler and Shruti Shirol, and postdoctoral researcher Juliang Li takes a step toward building a fault-tolerant quantum computer. They have realized a novel... | <urn:uuid:7a336431-f0a4-430e-9db9-7ee8ce73230d> | CC-MAIN-2022-40 | https://www.insidequantumtechnology.com/news-archive/new-research-tackles-quantum-error-correction/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00220.warc.gz | en | 0.910143 | 291 | 2.859375 | 3 |
Sunday, October 2, 2022
Published 2 Years Ago on Wednesday, Oct 28 2020 By Karim Husami
The Covid-19 pandemic has changed many aspects of life including education; from the subsequent closure of educational institutions around the world to the rapid adoption of online learning.
However, the concept of students studying... | <urn:uuid:fee86347-a718-489a-b61b-8b2a0c0c066c> | CC-MAIN-2022-40 | https://insidetelecom.com/can-5g-improve-remote-learning-for-all/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00220.warc.gz | en | 0.952405 | 765 | 3.1875 | 3 |
It’s very difficult to change the minds of adults on any issue of significance, says author and Harvard psychologist Howard Gardner. But the highest probability of a lasting change of opinion comes when the first six “levers” below are in concert, and the seventh factor, resistances, is low.
1. Reason The rational appr... | <urn:uuid:470ca2f0-97e1-4b30-bda7-7d3b2a1e9a80> | CC-MAIN-2022-40 | https://www.cio.com/article/272572/change-management-seven-ways-to-effect-change.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00220.warc.gz | en | 0.93239 | 401 | 3.0625 | 3 |
With public concern over online fraud, new research, funded by the Economic and Social Research Council, has revealed that internet users will reveal more personal information online if they believe they can trust the organisation that requests the information. ‘Even people who have previously demonstrated a high level... | <urn:uuid:c89b20a4-5fb1-4577-a431-361c0a451c2d> | CC-MAIN-2022-40 | https://www.itproportal.com/2007/11/22/internet-users-give-privacy-exchange-trust/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00220.warc.gz | en | 0.965131 | 591 | 2.796875 | 3 |
You can benefit a lot from being as informed as possible about personally identifiable information (PII), especially because of how it relates to data privacy. It’s common for this data to be used for illegal purposes like identity theft and fraud, so protecting it may literally save your life.
So what can you, as an i... | <urn:uuid:b771995e-c97d-4be4-9e49-2dcbdfb37dcc> | CC-MAIN-2022-40 | https://nira.com/personally-identifiable-information/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00220.warc.gz | en | 0.915652 | 2,435 | 2.6875 | 3 |
References to machine learning (ML) pop up in many contexts, often in connection with artificial intelligence (AI). What’s the difference between ML and AI? IBM data scientists have been developing Watson for many years, and they know a thing or two about both ML and AI. Here are the IBM definitions:
Ready or not, we s... | <urn:uuid:19a0a170-9e9c-4268-aa1c-0c8feb843337> | CC-MAIN-2022-40 | https://www.coresite.com/blog/what-is-machine-learning | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00220.warc.gz | en | 0.940172 | 498 | 3.265625 | 3 |
Fireworks are one of the biggest parts of the Fourth of July. Most people plan their whole day around finding the best fireworks show in their area. While most people enjoy watching the dazzling and colorful explosions, they do not realize all of the science that goes into creating a fireworks show.
The first firework ... | <urn:uuid:6260c920-0f0c-49ef-b308-e06d13347d33> | CC-MAIN-2022-40 | https://ddsecurity.com/2014/07/02/technology-behind-fourth-of-july-fireworks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00220.warc.gz | en | 0.972385 | 528 | 2.75 | 3 |
What is Virtual Machine?
Virtual Machine (VM) is a logical Machine inside computer works like physical machine (Real Computer) it is created by using Virtualization Software like VirtualBox and VMware. Virtualbox is best and free Software. We can create virtual machines for Windows, Linux, Mac and Other Operating Syste... | <urn:uuid:c59d4f11-8cb6-4b9d-9277-53d6d2bd81f2> | CC-MAIN-2022-40 | https://www.cyberpratibha.com/blog/how-to-create-virtual-machine-for-kali-linux/?amp=1 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00220.warc.gz | en | 0.806438 | 737 | 2.9375 | 3 |
15 years ago
Many home internet users rely on an encryption system called Wireless
Equivalent Protection (WEP) to stop others using their wi-fi link,
even though WEP has long been known to be flawed.
In early April three cryptographic researchers at the Darmstadt
Technical University in Germany revealed a method of exp... | <urn:uuid:bd3fb8af-b4de-4f29-baae-a252572a3f2c> | CC-MAIN-2022-40 | https://forums.cabling-design.com/wireless/news-breaking-wep-in-minutes-or-even-seconds-45948-.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00420.warc.gz | en | 0.959729 | 270 | 2.984375 | 3 |
PER CASO D’USO
Web application security is the group of technologies, processes, and methods used to protect web applications, servers, and web services from a cyber attack.
Web application security products and services use tools and practices such as multi-factor authentication (MFA), web application firewalls (WAFs)... | <urn:uuid:7a88344a-a9cd-4e55-8d2b-01332cf69da4> | CC-MAIN-2022-40 | https://www.citrix.com/it-it/solutions/app-delivery-and-security/what-is-web-application-security.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00420.warc.gz | en | 0.914802 | 1,339 | 2.78125 | 3 |
InformationWeek reports that researchers at last week’s IEEE SmartGridComm2010 conference estimate that by 2015, the smart grid will offer up to 440 million potential points to be hacked.
Why mess with someone’s home electricity meter? Le Xie, an assistant professor of electrical and computer engineering at Texas A&M U... | <urn:uuid:0244bc48-e74c-4cf0-82bd-f81befc818fa> | CC-MAIN-2022-40 | https://www.enterprisenetworkingplanet.com/security/researchers-warn-of-smart-grid-cyber-attack-opportunities/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00420.warc.gz | en | 0.941956 | 305 | 2.78125 | 3 |
Using a cybersecurity framework is absolutely a best practice.
Experience has led the cybersecurity community to think of defense in terms of process. Over time and through extensive coordination the best of these processes have made their way into standards and guidance documents and corporate policies. Every firm is ... | <urn:uuid:cb74a837-7678-4714-b152-8cd5122126ac> | CC-MAIN-2022-40 | https://crucialpointllc.com/leveraging-the-nist-cybersecurity-framework-to-economically-reduce-cyber-threats/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00420.warc.gz | en | 0.95139 | 556 | 2.578125 | 3 |
October 28, 2020
Impacts of this waste are widely understood, with rotting items contributing to greenhouse gas emissions, general pollution, and microplastics littering our waterways and infiltrating the food chain. What many don’t seem to understand, however, is the economic impact of waste.
Thanks to continuous inno... | <urn:uuid:9c80140c-790f-45bb-a39d-9e5af9c7280d> | CC-MAIN-2022-40 | https://internetofbusiness.com/is-recycling-the-new-manufacturing-how-companies-who-take-a-green-circular-approach-are-saving-money-and-the-environment/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00420.warc.gz | en | 0.951579 | 1,147 | 3.765625 | 4 |
Data loss prevention
What is data loss prevention?
Data loss prevention (DLP) involves systematically identifying, locating, and assessing data and user activities with content-and-context awareness to apply policies or proactive responses to prevent data loss. Data at rest, in use, and in motion must be under constant... | <urn:uuid:eaf1b521-6647-41a9-a893-0775b6b9fe33> | CC-MAIN-2022-40 | https://www.manageengine.com/data-security/what-is/data-loss-prevention.html?source=what-is | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00420.warc.gz | en | 0.897837 | 1,160 | 2.984375 | 3 |
iOS app development
iOS app development
What is iOS app development?
iOS application development is the process of making mobile applications for Apple hardware, including iPhone, iPad and iPod Touch. The software is written in the Swift programming language or Objective-C and then deployed to the App Store for users t... | <urn:uuid:0ebfadad-4895-48a5-ae15-05ae326e21f1> | CC-MAIN-2022-40 | https://www.ibm.com/cloud/learn/ios-app-development-explained | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00420.warc.gz | en | 0.924596 | 1,800 | 2.8125 | 3 |
The new General Data Protection Regulation (GDPR) is not all about ensuring that your business or organisation has consent to process personal data; there is far more to it than that. Information governance is a major consideration, as covered by Article 32 of the regulation.
Does this mean that all personal data has t... | <urn:uuid:4f5d4c0f-525b-48c8-bbe7-2fdea44c237f> | CC-MAIN-2022-40 | https://www.compliancejunction.com/information-governance-gdpr/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00620.warc.gz | en | 0.947514 | 348 | 2.640625 | 3 |
Ready to learn Artificial Intelligence? Browse courses like Uncertain Knowledge and Reasoning in Artificial Intelligence developed by industry thought leaders and Experfy in Harvard Innovation Lab.
Ever struggle to recall what Adam, ReLU or YOLO mean? Look no further and check out every term you need to master Deep Lea... | <urn:uuid:a23cc711-cf7a-4844-9e0f-e83ac631c639> | CC-MAIN-2022-40 | https://resources.experfy.com/ai-ml/the-deep-learning-dictionary/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00620.warc.gz | en | 0.878581 | 3,220 | 3.046875 | 3 |
Non-Persistent cross-site scripting or non-persistent XSS, also known as Reflected XSS, is one of the three major categories of XSS attacks, the others are; persistent (or Stored) XSS and DOM-based XSS. In general, XSS attacks are based on the victim’s browser trust in a legitimate, but vulnerable website or web applic... | <urn:uuid:5f9fcfbc-aa45-4b83-805d-74059525472b> | CC-MAIN-2022-40 | https://www.acunetix.com/blog/articles/non-persistent-xss/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00620.warc.gz | en | 0.880804 | 1,329 | 3.421875 | 3 |
Update (April 2019)
It was brought to my attention that Brennan center has used some of the research described in the article to fill an amicus curiae (legal opinion to the appeal court) in a case touching election protection from disinformation operations and political advertisement transparency.
The rest of the artic... | <urn:uuid:1ee1cd46-ca14-48a5-b3cf-9554f1524b75> | CC-MAIN-2022-40 | https://blog.lukaszolejnik.com/soft-influence-on-societies/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00620.warc.gz | en | 0.948058 | 891 | 2.53125 | 3 |
The Institute of Electrical and Electronic Engineers (IEEE) is the organization responsible for the standards that define modern wireless enterprise networks, for example, WLANs. Industry interests are coordinated through the Wi-Fi Alliance. They select the subset of features that become the minimum set of features for... | <urn:uuid:f80ace3e-5f47-4fca-8d0d-5be2ad99474e> | CC-MAIN-2022-40 | https://www.blackbox.com/en-gb/insights/blogs/detail/bbns/2019/12/04/wi-fi-6-what-is-it | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00620.warc.gz | en | 0.886699 | 776 | 3.078125 | 3 |
This October is the 75th year America has observed National Disability Employment Awareness Month (NDEAM). Like other “awareness months,” NDEAM spotlights a disparity in the workforce—in this case, the lower than average employment rates of Persons with Disabilities (PWDs). NDEAM works to lessen this inequity through w... | <urn:uuid:19d693c0-d54c-4f88-b425-f5dcaa2c3513> | CC-MAIN-2022-40 | https://www.ibm.com/blogs/age-and-ability/2020/10/26/ndeam/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00620.warc.gz | en | 0.958836 | 1,330 | 2.59375 | 3 |
A couple weeks ago, we covered the West Australian government’s security audit here on the Octopus Blog.
The section of the governmental audit’s research into cyber security practices unveiled some pretty disturbing facts. Given the opportunity, users will choose the most obvious, easiest to guess passwords, leaving th... | <urn:uuid:8a13b516-208b-4134-833e-571b1fbc5794> | CC-MAIN-2022-40 | https://doubleoctopus.com/blog/general/the-un-unexpected-example-of-poor-password-management/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00620.warc.gz | en | 0.947125 | 820 | 2.78125 | 3 |
The technological advances triggered by the pandemic offer us the opportunity for smart cities to thrive. Truly smart cities will be those that allow an open and interoperable exchange of data via the Internet of Things (IoT). According to IoT analytics, IoT connections reached 12 billion in 2020, surpassing non-IoT co... | <urn:uuid:c90d0161-5555-4dd4-8254-49e0de6c9d75> | CC-MAIN-2022-40 | https://kigen.com/resources/blog/solving-iot-trust-to-build-smarter-cities/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00620.warc.gz | en | 0.927599 | 400 | 2.578125 | 3 |
As the routing protocol that runs the Internet, Border Gateway Protocol (BGP) is a key piece of the puzzle that helps you understand how your customers get to you. If you want to understand digital experience delivery, then you have to understand the Internet, and BGP visibility is very important if you intend to have ... | <urn:uuid:0453b688-2a77-4bc3-92fa-0df355cbc528> | CC-MAIN-2022-40 | https://www.datacenterdynamics.com/en/opinions/why-border-gateway-protocol-bgp-visibility-more-critical-ever/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00620.warc.gz | en | 0.923959 | 1,548 | 2.859375 | 3 |
Let’s learn how to enable Hyper-V in Windows 11. Hyper-V specifically provides hardware virtualization. That means each virtual machine runs on virtual hardware. It lets you create virtual hard drives, virtual switches, and many other virtual devices, all of which can be added to virtual machines. Hyper-V is built into... | <urn:uuid:d214ea5c-a095-48bf-a1a9-b8cbda1b21c2> | CC-MAIN-2022-40 | https://howtomanagedevices.com/windows-11/7441/enable-hyper-v-feature/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00620.warc.gz | en | 0.825238 | 203 | 2.8125 | 3 |
In the previous section we reviewed several aspects of the Transport Layer. We learned a great deal of information; covering sockets, ports, TCP, UDP, segments, and datagrams. Now we will take a look at the fourth and final layer of the TCP/IP stack: the Application Layer.
What Does The Application Layer Do?
A lot of n... | <urn:uuid:6f8660c4-c509-4d9e-957d-70daa4b0e3e0> | CC-MAIN-2022-40 | https://www.itprc.com/how-the-application-layer-works/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00620.warc.gz | en | 0.918463 | 1,452 | 3.546875 | 4 |
This short introduction provides an overview of DS security features.
When DS servers must store sensitive data, and file permissions alone are not sufficient, they use encryption and digests:
Encryption turns source data into a reversible code. Good design makes it extremely hard to recover the data from the code with... | <urn:uuid:4930d0d1-84ac-45cb-acd4-7110291b1d61> | CC-MAIN-2022-40 | https://backstage.forgerock.com/docs/ds/7.1/security-guide/features.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00020.warc.gz | en | 0.871207 | 1,370 | 3.453125 | 3 |
How much data is produced every day? A quick Google search will tell you the current estimate stands at 2.5 quintillion bytes. For those of us that don’t know the difference between our zettabytes and yottabytes, that’s 2.5 followed by a staggering 18 zeros! Basically, the simple answer is a lot. A lot of data is produ... | <urn:uuid:1fb53058-3936-4e5c-b4fe-16bc97cca945> | CC-MAIN-2022-40 | https://getpicnic.com/2021/12/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00020.warc.gz | en | 0.948091 | 1,336 | 2.921875 | 3 |
Sven Morgenroth on Security Weekly
Invicti security researcher Sven Morgenroth joined Paul Asadoorian on Paul’s Security Weekly #652 to describe and demonstrate various HTTP headers related to security. Watch the full interview below and read on for an overview of Sven’s presentation of HTTP security headers.
What are ... | <urn:uuid:f89351e5-6625-4b23-8c36-8b8e1294d739> | CC-MAIN-2022-40 | https://www.invicti.com/blog/web-security/http-security-headers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00221.warc.gz | en | 0.857048 | 2,177 | 2.609375 | 3 |
October is Cybersecurity Awareness Month, which is all about promoting best practices for staying safe online.
Beyond promoting the basics of good cyber-hygiene, it's also a good idea to take stock of the trends that have been floating around. Indeed, much like the rest of 2020, it's been quite the year in cybersecurit... | <urn:uuid:6c30cf73-cd26-4e05-8bde-7c0743f5282f> | CC-MAIN-2022-40 | https://www.avanan.com/blog/cybersecurity-awareness-month-trends-dominating-the-news | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00221.warc.gz | en | 0.971359 | 1,656 | 2.546875 | 3 |
You probably know that taking advantage of machine learning, or ML, requires collecting accurate data and developing algorithms that can analyze it quickly and efficiently.
But here's another imperative for machine learning that businesses often overlook: ensuring that machine learning models are fair and ethical by ta... | <urn:uuid:2218307d-f301-4994-a089-7f58e74ae04f> | CC-MAIN-2022-40 | https://www.itprotoday.com/cloud-computing-and-edge-computing/how-inclusive-machine-learning-can-benefit-your-organization | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00221.warc.gz | en | 0.953445 | 1,035 | 3.609375 | 4 |
Cybersecurity awareness has never been more important than it is right now. Governments, businesses, and individuals are increasingly under attack by cybercriminals looking for profit or political gain. It seems like everywhere you look, malware attacks are on the rise, from cyberespionage attempts on mobile phones to ... | <urn:uuid:bbcd69ef-5f32-4119-94b4-f7d164304dab> | CC-MAIN-2022-40 | https://www.malwarebytes.com/blog/news/2016/10/october-is-national-cybersecurity-awareness-month | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00221.warc.gz | en | 0.945135 | 357 | 2.890625 | 3 |
What is DMARC?
DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. It was developed in 2012 to combat phishing emails and is designed to work on top of SPF and DKIM. A domain’s DMARC policy is part of its DNS record. There are two parts to this protocol: reporting and conformance. The repo... | <urn:uuid:e63543a8-6264-4a58-87bc-5fe687acadf1> | CC-MAIN-2022-40 | https://fraudmarc.com/post/about-dmarc | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00221.warc.gz | en | 0.93799 | 755 | 2.96875 | 3 |
Students at Eindhoven University of Technology in the Netherlands have developed ZEM Zero Emission Mobility, a two-seat eco-friendly car with a Cleantron lithium-ion battery pack and 3D printing made of recycled plastic.
The sporty all-electric car is similar to a BMW coupe, but unique in that it absorbs more carbon th... | <urn:uuid:fa391971-6bd9-42a5-911e-426ce8e46b94> | CC-MAIN-2022-40 | https://www.itworldcanada.com/post/dutch-university-students-invent-eco-friendly-car | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333455.97/warc/CC-MAIN-20220924182740-20220924212740-00421.warc.gz | en | 0.94835 | 254 | 2.59375 | 3 |
The world is made up of ones and zeros. Almost all aspects of our everyday lives have become digitized and turned into the universal language of computers. All businesses are going through this digital transformation whether they want to participate or not. Even entire government systems are turning completely paperles... | <urn:uuid:070d67b9-cf28-4cb2-aedc-df663bbb9526> | CC-MAIN-2022-40 | https://www.colocationamerica.com/blog/nanotech-and-dna-storage-soon | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334644.42/warc/CC-MAIN-20220926020051-20220926050051-00421.warc.gz | en | 0.940286 | 1,220 | 3.1875 | 3 |
MAID, or massive array of idle disks, has the potential to make disk-based storage the archive technology of choice in the future.
The selling point of MAID is that it delivers performance in the hard-drive-array class when data is requested yet reduces the amount of energy wasted when archive data is in idle mode . Th... | <urn:uuid:bad498e5-93de-484e-a2a2-a5260517b430> | CC-MAIN-2022-40 | https://www.eweek.com/storage/storage-maid-to-order/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334644.42/warc/CC-MAIN-20220926020051-20220926050051-00421.warc.gz | en | 0.960179 | 624 | 2.984375 | 3 |
Evolution of Technologies
To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, i... | <urn:uuid:718c84ff-b645-4e38-ae7f-f2b21916c8be> | CC-MAIN-2022-40 | https://cloudtweaks.com/2016/07/sci-fi-predictions-come-fruition/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00421.warc.gz | en | 0.95567 | 357 | 2.515625 | 3 |
Why Do Data Analysts Use SQL?
There are some major advantages to using traditional relational databases, which we interact with using SQL. The five most apparent are:
- SQL is easy to understand.
- Traditional databases allow us to access data directly.
- Traditional databases allow us to audit and replicate our data.
... | <urn:uuid:0eab2e7d-58c9-4612-b80e-cc2271be6455> | CC-MAIN-2022-40 | https://cybercoastal.com/cybersecurity-tutorial-for-beginners-why-sql-is-important/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00421.warc.gz | en | 0.89129 | 3,482 | 3.21875 | 3 |
How to Generate a Self Signed Code Signing Certificate (And Why You Shouldn’t)
While it’s possible to generate and use a self signed code signing certificate, this is a practice you should avoid doing for uses outside your organization’s internal testing environment
Technically speaking, it’s possible to use self signe... | <urn:uuid:3853a952-f3a6-4832-9b22-3add322a46b8> | CC-MAIN-2022-40 | https://codesigningstore.com/how-to-generate-self-signed-code-signing-certificate | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00421.warc.gz | en | 0.925209 | 1,723 | 2.703125 | 3 |
The Internet has expanded people’s ability to do business, and with it has spurred a series of innovations that have effectively changed the world. With today’s businesses almost assuredly spending on at least one cloud-based solution, and with mobility eking into almost every business in one form or another, the deman... | <urn:uuid:d4187c1b-ed76-4169-ba9b-b32903ed8ef0> | CC-MAIN-2022-40 | https://www.excaltech.com/taking-a-long-look-at-your-companys-bandwidth-needs/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00421.warc.gz | en | 0.946627 | 856 | 2.953125 | 3 |
HTML 4.0 Programming: Level 1 (Multi-platform)
Course number: 075 906
Software version number: 4.0
Course length: 1 day
Hardware/software required to run this course
In order to run this course, you will need:
See your reference manual for hardware considerations that apply to your specific hardware setup.
Overview: St... | <urn:uuid:b6692c8e-d05c-4226-8ab3-2ebad7acc6ef> | CC-MAIN-2022-40 | https://store.emtmeta.com/quickview/product/quickview/id/7076/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00421.warc.gz | en | 0.762767 | 451 | 2.953125 | 3 |
Defines a multi-dimensional database. A Mondrian schema contains a logical model, consisting of cubes, hierarchies, and members, and a mapping of this model onto a physical model. The logical model consists of the constructs used to write queries in the MDX language: cubes, dimensions, hierarchies, levels, and members.... | <urn:uuid:111c04bc-a6c9-4f70-b13c-af0bb2311bb0> | CC-MAIN-2022-40 | https://help.hitachivantara.com/Documentation/Pentaho/6.0/0N0/010/070/040 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00421.warc.gz | en | 0.908499 | 100 | 2.921875 | 3 |
Social engineering- the main tactic used by hackers to carry out a cyber-crime
Ring Ring: the noise and quick conversation can cost organizations a million dollars. How is it possible? Say hello to social engineering attacks.
Hackers use social engineering tactics to target people and take advantage of their carelessne... | <urn:uuid:02ea4942-4c03-420f-a7ea-3e11690a490b> | CC-MAIN-2022-40 | https://www.infosec4tc.com/2022/05/31/social-engineering-attack-how-to-protect-yourself-and-real-life-examples/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00421.warc.gz | en | 0.920467 | 1,242 | 3.015625 | 3 |
Artificial intelligence (AI) is the simulation of human intelligence processes by machines, usually computer systems. AI programs focus on three main cognitive skills: learning (acquiring data and creating rules for sorting that data), reasoning (choosing the right data to achieve the desired outcome), and self-correct... | <urn:uuid:8891190d-0188-43c9-a934-21b6c03ab408> | CC-MAIN-2022-40 | https://www.deepsig.ai/how-artificial-intelligence-improves-5g-wireless-capabilities | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00621.warc.gz | en | 0.943309 | 1,663 | 3.078125 | 3 |
Brute force attack is a technique used to explore an unknown value by systematically trying every key combination to gain access to the targeted resource. In the context of web applications, such attacks appear as a volley of HTTP requests that successively cycle through a user input value till the “right” value is hit... | <urn:uuid:13936b25-71a2-4f55-991a-019707f5d9cd> | CC-MAIN-2022-40 | https://campus.barracuda.com/product/webapplicationfirewall/doc/42049329/brute-force-attack | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00621.warc.gz | en | 0.811819 | 1,102 | 3.625 | 4 |
Google takes web security standards very seriously and are looking to make the Internet a “safe place”. Accordingly, they offered a slight boost in ranking for SSL and HTTPS secured websites. However, things are soon going to change as from 2017 Google announced that their search engine algorithm will begin penalizing ... | <urn:uuid:7b5c756c-2b04-486a-b0b3-776fa8688b60> | CC-MAIN-2022-40 | https://www.globaldots.com/resources/blog/why-you-need-ssl-and-why-you-need-it-now-google-will-love-you-more/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00621.warc.gz | en | 0.943176 | 1,293 | 2.796875 | 3 |
The Ultimate Guide to Big Data
Exploding information quantities to the emergence of the term ‘Big Data’ for datasets which can’t be handled by common database and data processing tools. It literally means what it says, but beyond Volume, there are additional characteristics commonly associated with Big Data. These incl... | <urn:uuid:67f342c0-15de-430d-8d6d-b3404a572737> | CC-MAIN-2022-40 | https://securitybrief.asia/tag/big-data | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00621.warc.gz | en | 0.933117 | 134 | 3.125 | 3 |
Peck began with a general discussion of phishing and its relative importance in the web app security space today. He pointed out that while phishing is old news, and isn’t the latest and greatest threat to hit the headlines, it is still out there and still causes damage. He put up some stats that show that phishing is ... | <urn:uuid:f6eee252-da8e-430e-bee6-3462210a7eda> | CC-MAIN-2022-40 | https://manvswebapp.com/improved-phishing-detection-using-perceptual-hashing | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00621.warc.gz | en | 0.94076 | 647 | 2.625 | 3 |
IBM researchers have announced development of new “quantum safe” encryption techniques that they plan to deploy to the IBM Public Cloud in 2020. The techniques have also been prototyped as part of a quantum safe enterprise class tape system.
According to the announcement, the new encryption algorithms are based on alge... | <urn:uuid:c1d64edc-2734-43fa-abf0-016c1537b8e8> | CC-MAIN-2022-40 | https://www.globaldots.com/resources/blog/ibm-announces-quantum-safe-encryption/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335058.80/warc/CC-MAIN-20220927194248-20220927224248-00021.warc.gz | en | 0.927541 | 177 | 2.5625 | 3 |
Planning a Smart City – a podcast by ARC Advisory
ARC Advisory started a series of podcasts focused on Smart Cities. The first episode focuses on Planning a Smart City and looks deeper into the needed technology, actors, and the development of such a complex infrastructure.
Larry O’Brien, Vice President of Research at ... | <urn:uuid:b3abcb4a-6ba7-491d-9973-4c4b33b44180> | CC-MAIN-2022-40 | https://www.iiot-world.com/smart-cities-buildings-infrastructure/smart-cities/planning-a-smart-city-a-podcast-by-arc-advisory/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00021.warc.gz | en | 0.929942 | 526 | 2.96875 | 3 |
Rainbow tables explained: Password hacking and how to prevent against it
The name "rainbow table" may conjure up images of colorful furniture and dinner placements, but in actuality, it's a technology hackers use to try and commandeer information from your online accounts.
Most websites advance their security to preven... | <urn:uuid:58a4382c-4093-40e0-860c-fc53e0ed4eb8> | CC-MAIN-2022-40 | https://www.minim.com/blog/rainbow-tables-explained-password-hacking-and-how-to-prevent-against-it | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00021.warc.gz | en | 0.94295 | 740 | 3.078125 | 3 |
What is a Distributed Denial of Service (DDoS) event?
It is different than a DDoS "attack". Some, such as Arbor Networks, have dubbed it "The Tiger Effect".
June 2008's U.S. Open Golf Championship 19-hole playoff resulted in massive traffic spikes from those seeking real-time scores and streaming video feeds.
DDoS even... | <urn:uuid:c88d46b0-34de-46d5-9b60-05f106c9497a> | CC-MAIN-2022-40 | https://archive.f-secure.com/weblog/archives/00001587.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337971.74/warc/CC-MAIN-20221007045521-20221007075521-00021.warc.gz | en | 0.963055 | 226 | 2.578125 | 3 |
What’s the secret to aging well?
University of Minnesota Medical School researchers have answered it- on a cellular level.
Cell senescence is a process in which cells lose function, including the ability to divide and replicate, but are resistant to cell death.
Such cells have been shown to affect neighboring ones beca... | <urn:uuid:7a7ff432-2386-4edf-83f1-2ee308cdf13b> | CC-MAIN-2022-40 | https://debuglies.com/2018/10/03/a-new-study-reports-it-is-possible-to-reverse-the-effects-of-aging/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00221.warc.gz | en | 0.897519 | 911 | 3.046875 | 3 |
Surrounded by coworkers who are sniffling and sneezing?
You may not be able to ask for sick leave preemptively, but your body is already bracing for battle, says Patricia C. Lopes, assistant professor of biological sciences at Chapman University’s Schmid College of Science and Technology.
Lopes studies how our bodies a... | <urn:uuid:a0971663-dd8e-466d-904b-58f78a0f42e9> | CC-MAIN-2022-40 | https://debuglies.com/2022/08/31/our-brains-obtain-information-from-sick-people-eliciting-changes-in-our-physiology-and-immune-response/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00221.warc.gz | en | 0.908335 | 12,879 | 2.96875 | 3 |
Understanding the vulnerability
On the morning of December 9, 2021, the security team at Alibaba Cloud published a vulnerability involving arbitrary code execution involving Log4j, a widely used Java-based logging framework, which allows threat actors to gain complete remote access to web servers and application logs. ... | <urn:uuid:918c4f21-ae1f-4a3f-ade8-2a0ac8a582ba> | CC-MAIN-2022-40 | https://www.blusapphire.com/blog/decoding-the-log4shell-pandemic | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00221.warc.gz | en | 0.947159 | 1,274 | 2.671875 | 3 |
In the last post, we talked about some of the basics of OSPF. We discussed how neighbors form adjacencies, the multicast addresses OSPF uses, and some of the timers that OSPF uses. Before we jump into this post I want to cover a few items that I may have left out. Namely, I want to talk about the configuration we used ... | <urn:uuid:280c1244-6c5a-47ca-a03c-e8caa8fefce9> | CC-MAIN-2022-40 | https://www.dasblinkenlichten.com/ospf-finding-the-best-path/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00221.warc.gz | en | 0.938262 | 3,767 | 2.5625 | 3 |
Standardized hardware, the advent of cloud and other virtual platforms, as well as the low cost of Linux has led the Unix world down the path of standardization under open source software. When originally developed, commercial Unix solutions such as Solaris, HP-UX, AIX, and others were custom built to accommodate propr... | <urn:uuid:0a302e62-d619-44dd-9833-b03f10f0bbc0> | CC-MAIN-2022-40 | https://www.beyondtrust.com/blog/entry/e-pluribus-unix-out-of-many-linux | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00221.warc.gz | en | 0.954526 | 888 | 3.0625 | 3 |
Macro-segmentation is another term for traditional network segmentation. The goal of macro-segmentation is to break up a network into multiple discrete chunks to support business needs. One example of a common use of macro-segmentation is the isolation of development and production environments. Applications currently ... | <urn:uuid:e5e4a7b9-fe04-4fb8-8235-4941997b52df> | CC-MAIN-2022-40 | https://www.checkpoint.com/cyber-hub/network-security/what-is-macro-segmentation/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00221.warc.gz | en | 0.916028 | 613 | 2.953125 | 3 |
Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the word "rootkit" directly think of techniques applied in a kernel mode, like IDT (Interrupt Descriptor Table) hooking, SSDT (System Service Dispatch Table) hooking, DKOM (Direct... | <urn:uuid:2160c7d5-435a-43fd-9356-c1efa16cfa2e> | CC-MAIN-2022-40 | https://www.malwarebytes.com/blog/news/2016/12/simple-userland-rootkit-a-case-study | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00221.warc.gz | en | 0.832702 | 2,234 | 2.953125 | 3 |
Almost all businesses are going through digital transformation today, and there are several tools that are helping businesses to undergo this transformation efficiently.
FREMONT, CA: When it comes to digital transformation, technology is almost often mentioned first. Whether it's the Internet of Things (IoT) or Artific... | <urn:uuid:015fb7a6-751d-4f86-95d1-577761893506> | CC-MAIN-2022-40 | https://www.cioadvisorapac.com/news/four-most-common-tools-for-digital-transformation-nwid-2691.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00221.warc.gz | en | 0.936019 | 501 | 2.5625 | 3 |
Certain industries require constant, uninterrupted power. These industries include government, IT, transportation, and financial services. When power is needed continuously, it’s essential to have an Uninterruptible Power Supply, otherwise known as a UPS. These services are able to provide a continuous flow of power th... | <urn:uuid:8619bf6d-b003-4e14-9b96-65c1c0a4c1b4> | CC-MAIN-2022-40 | https://www.hcienergy.com/blog/should-i-install-a-rack-mount-ups-or-a-centralized-ups | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00221.warc.gz | en | 0.965819 | 801 | 2.59375 | 3 |
Human and Computer Cognition
In my mind, the future is not in how we interact with computers, but how computers interact with us, and how lifelike we can make the series of connected artificial intelligence that will become a part of our daily lives.
What do I mean by Artificial Intelligence?
My view of AI is a program... | <urn:uuid:7e14364b-3fec-4c0d-aeda-853874df6351> | CC-MAIN-2022-40 | https://www.cablelabs.com/blog/human-computer-cognition | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00421.warc.gz | en | 0.951294 | 957 | 2.75 | 3 |
The more the Cyber threat landscape changes and diversifies, the more it holds the same. Still, in today’s date, there are some old tactics in the playbook of hackers that remain successful and most prevalent. In the year 2018, the wide majority of data leakage incidents were attempted by Cybercriminals external on the... | <urn:uuid:fb0f37b0-23f1-419a-a888-5f9972a4dbb5> | CC-MAIN-2022-40 | https://www.cloudcodes.com/blog/preventing-phishing-attacks.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00421.warc.gz | en | 0.94887 | 1,102 | 2.625 | 3 |
Listening to your gut will be much safer if you also listen to the machine crunching the data. Decision-making remains one of the ultimate tests for leadership in new entrepreneurs.
Even experienced leaders who have a track record of sound decision-making have, at some point, made a drastically poor decision that shook... | <urn:uuid:95dbfc83-cd50-4c6b-ac32-e97cc7304157> | CC-MAIN-2022-40 | https://swisscognitive.ch/2018/08/18/artificial-intelligence-can-help-leaders-make-better-decisions-faster/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00421.warc.gz | en | 0.950599 | 604 | 2.625 | 3 |
In 2017, there were more than 340 data breaches reported according to the breach tool of the U.S. Department of Health and Human Services. Increasingly, the healthcare industry becomes an easy target for hackers due to the significant value of patient data.
There are different causes of data breaches in healthcare that... | <urn:uuid:b6b85a3b-525a-46c5-a29e-ebeb9e21d92b> | CC-MAIN-2022-40 | https://www.404techsupport.com/2018/09/17/securing-healthcare-data/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00421.warc.gz | en | 0.917595 | 808 | 2.671875 | 3 |
Cryptocurrencies have been at the center stage of fintech-related developments for the last couple of years. They have brought about a lot of interest from the general public in the field of cryptography. Reputed universities like Princeton are now offering dedicated courses in mastering blockchains. The modern crypto ... | <urn:uuid:4e91999f-1cf4-4693-a7cc-2272147e4a8a> | CC-MAIN-2022-40 | https://www.cio.com/article/227996/the-rationale-behind-cryptocurrencies.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00421.warc.gz | en | 0.958621 | 1,071 | 2.75 | 3 |
Artificial Intelligence in Healthcare and Beyond: Year-in-Review and What to Expect in 2019
Updated: Oct 24, 2020
“We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next 10.” Bill Gates
When it comes to Artificial Intelligence (AI), it is hard to... | <urn:uuid:dd9288ba-bd81-4d41-8b3c-1f2d45a9c2b6> | CC-MAIN-2022-40 | https://www.evirahealthtechstrategies.com/post/artificial-intelligence-in-healthcare-and-beyond-2019 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00421.warc.gz | en | 0.935279 | 3,288 | 2.53125 | 3 |
A new study finds that the public is warming up to the use of biometric identification technology, but remains wary of tracking applications and is looking to government to set standards in that area.
After surveying 1000 people, the Center for Identity at the University of Texas (CID) said on May 10 it found that peop... | <urn:uuid:809941d4-e22d-4797-900a-fe0017fa5d2f> | CC-MAIN-2022-40 | https://origin.meritalk.com/articles/study-public-embraces-biometrics-with-reservations/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00421.warc.gz | en | 0.973233 | 377 | 2.515625 | 3 |
An Overview of the Maryland Personal Information Protection Act
The Maryland Personal Information Protection Act (PIPA) is a privacy law aimed at protecting the privacy of the residents of the State of Maryland.
Although Maryland’s privacy laws are not completely comprehensive in the same vein as California’s consumer ... | <urn:uuid:7537864e-1106-4bb1-95fa-a669a0966bb5> | CC-MAIN-2022-40 | https://www.delphix.com/glossary/maryland-personal-information-protection-act | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00421.warc.gz | en | 0.926283 | 1,057 | 2.578125 | 3 |
Individuals and groups that spread medical misinformation are well organized to exploit the weaknesses of the engagement-driven ecosystems on social media platforms.
With less than half the United States population fully vaccinated for COVID-19 and as the delta variant sweeps the nation, the U.S. surgeon general issued... | <urn:uuid:4552e060-be32-4aac-a751-1fbfb30419ec> | CC-MAIN-2022-40 | https://www.nextgov.com/ideas/2021/07/big-tech-has-vaccine-misinformation-problem-heres-what-social-media-expert-recommends/184182/?oref=ng-next-story | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00421.warc.gz | en | 0.943982 | 1,161 | 2.671875 | 3 |
Many organizations wonder why ransomware attacks avoid the cloud as they see constant news of organizations being affected by cyber criminals and hackers.
Ransomware threatens all industries and a recent SonicWall annual threat report for 2021 reveals a 231.7 percent increase in ransomware attacks since 2019. In additi... | <urn:uuid:56f5a77b-b3ef-4118-b862-12054b48ee10> | CC-MAIN-2022-40 | https://365itsolutions.com/tag/why-ransomware-attacks-avoid-the-cloud/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00421.warc.gz | en | 0.924561 | 997 | 2.765625 | 3 |
New research from RCSI has demonstrated the significant role that an irregular body clock plays in driving inflammation in the body’s immune cells, with implications for the most serious and prevalent diseases in humans.
Published in Frontiers in Immunology, the research was led by the School of Pharmacy and Biomolecul... | <urn:uuid:436ab413-b022-4db0-bcd9-2971333a731f> | CC-MAIN-2022-40 | https://debuglies.com/2021/11/24/the-significant-role-that-an-irregular-body-clock-plays-in-driving-inflammation-in-the-bodys-immune-cells/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00621.warc.gz | en | 0.916245 | 3,917 | 3.703125 | 4 |
The Edge of Extraterrestrial Exploration
October 4, 2018
How edge computing will enable more powerful satellite communications
Strangely, satellite communications have always been extremely limited in potential. But that’s about to change – thanks to edge computing and the iot world.
If you’re not exactly familiar with... | <urn:uuid:16d801cc-345b-487f-b143-2ecbb664d7eb> | CC-MAIN-2022-40 | https://www.clearblade.com/blog/the-edge-of-extraterrestrial-exploration/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00621.warc.gz | en | 0.928809 | 932 | 2.953125 | 3 |
Ransomware Attacks: How to Prepare, Prevent, and Respond
Ransomware attacks are increasing in volume and complexity and are mutating in the scope of the attacks. Recently we have seen many highly publicized and disruptive attacks against corporations and government entities. In our work responding to these types of inc... | <urn:uuid:3c14f195-d2b3-45da-8a4f-e315573c0880> | CC-MAIN-2022-40 | https://www.compliancepoint.com/cyber-security/ransomware-attacks-how-to-prepare-prevent-and-respond/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00621.warc.gz | en | 0.932844 | 761 | 2.6875 | 3 |
The pandemic caused by COVID-19 has a destructive reach that goes beyond that of a highly contagious and deadly illness. It is also contributing to the rapid spread of piracy — as in spreading illegal copies of commercial software.
Software piracy involves much more than businesses and consumers using illegal copies of... | <urn:uuid:971a6e2a-6de0-4578-895a-4a87f679406f> | CC-MAIN-2022-40 | https://www.crmbuyer.com/story/software-piracy-spreading-with-the-virus-86826.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00621.warc.gz | en | 0.944974 | 2,129 | 2.90625 | 3 |
Although teens and tweens have more choices than ever when it comes to media activities, watching television and listening to music are their top preferences, according to a report Common Sense Media released this week.
Among tweens, ages 8 to 12, watching TV was the top media activity, with nearly 62 percent saying th... | <urn:uuid:7395e3fe-8ebf-443a-9e8b-414dc84210a6> | CC-MAIN-2022-40 | https://www.ecommercetimes.com/story/for-tech-savvy-teens-and-tweens-tv-and-music-still-rule-82712.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00621.warc.gz | en | 0.960855 | 1,479 | 2.625 | 3 |
Today is the 19th of January, 2013. Which means 19th of January, 2038 is now exactly 25 years away from us.
Why does it matter? Because at 03:14:07 UTC on 19th of January 2038 we will run into the Year 2038 Problem.
Many Unix-based system can't handle dates beyond that moment. For example, common Unix-based phones toda... | <urn:uuid:9b3a9bb9-d473-452e-9177-0062a2b59c8b> | CC-MAIN-2022-40 | https://archive.f-secure.com/weblog/archives/00002489.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00021.warc.gz | en | 0.948031 | 205 | 3.4375 | 3 |
Artificial intelligence has long been watching our online and data selves. Now, it’s watching us in the physical world too. Facial recognition technology has given eyes to AI, allowing it to ‘see’ and analyse us in the flesh.
This ability has met obvious reservations. Indeed, concerns abound that we are heading for an ... | <urn:uuid:f67b6185-552b-41be-bf6f-1a75d24c7838> | CC-MAIN-2022-40 | https://www.itproportal.com/features/big-brother-ai-is-watching-you/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335530.56/warc/CC-MAIN-20221001035148-20221001065148-00021.warc.gz | en | 0.942424 | 1,427 | 2.734375 | 3 |
The European Marine Energy Centre (EMEC) has announced the connection of the world’s most powerful tidal turbine to the national grid for the first time. The power’s O2 is connected to the mainland via sub-sea cable to the 2MW offshore unit and then on to the local onshore electricity network.
The O2 received 3.4 milli... | <urn:uuid:a4e06144-ec2c-4561-a2f6-c177596501ba> | CC-MAIN-2022-40 | https://digitalinfranetwork.com/news/uk-grid-to-be-connected-with-worlds-most-powerful-tidal-turbine/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337322.29/warc/CC-MAIN-20221002115028-20221002145028-00021.warc.gz | en | 0.926342 | 325 | 2.546875 | 3 |
The University of Essex opened today a new laboratory to study the effects of mobile phones mast on human health, including the new 3G masts.
The Electromagnetics and Health (EMH) Laboratory will be used to study the impact of electromagnetic fields on health. The project is led by the Department of Psychology at the U... | <urn:uuid:569ab255-2517-4a33-9802-03afac40472c> | CC-MAIN-2022-40 | https://it-observer.com/study-investigate-3g-health-effects.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00021.warc.gz | en | 0.932709 | 209 | 2.984375 | 3 |
Perhaps the truly surprising aspect of Wannacry is that it did not happen sooner. Exploitation of a security flaw on this scale has long been on the cards and this headline-grabbing piece of ransomware, which affected organisations around the world, has underlined the vulnerability of private and public sector networks... | <urn:uuid:987ab742-bc4c-4865-a186-34d2741455db> | CC-MAIN-2022-40 | https://www.itproportal.com/features/how-wannacry-shows-why-we-need-to-rethink-infosecurity/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00021.warc.gz | en | 0.958844 | 1,420 | 2.515625 | 3 |
What is PHP Code Injection?
A code injection attack exploits a computer bug caused by processing invalid data. The attacker introduces (or injects) code into the vulnerable computer program and changes the execution. Successful code injections can introduce severe risks. For example, it can enable viruses or worms to p... | <urn:uuid:827d6742-a201-4a4d-b467-0f6f31c6e19f> | CC-MAIN-2022-40 | https://brightsec.com/blog/code-injection-php/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00021.warc.gz | en | 0.84848 | 1,550 | 3.59375 | 4 |
Are you familiar with the term “chaos engineering?” If this is the first time, you’ve heard it, it probably won’t be the last time.
Chaos engineering (CE) is a new approach to resiliency testing that might end up having a big impact on how we business continuity professionals carry out our work of ensuring the recovera... | <urn:uuid:c436a0a6-15a2-4e63-acc2-076b531ea0ae> | CC-MAIN-2022-40 | https://bcmmetrics.com/chaos-engineering/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00222.warc.gz | en | 0.940906 | 1,308 | 2.5625 | 3 |
The world of information technology sometimes feels like an old seafarer’s map showing monsters lurking in deep waters and warning, “There be danger here.” The digital world doesn’t need to be so melodramatic, but no company should ignore the warning that danger is all around.
From ransomware to malware to hackers stea... | <urn:uuid:04d02e8b-43ae-4b93-8d1d-795574b2e1c1> | CC-MAIN-2022-40 | https://andersontech.com/trust-no-one-anatomy-new-security-model/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00222.warc.gz | en | 0.931945 | 1,071 | 2.84375 | 3 |
Oracle enqueue waits indicate that a seesion is waiting for a lock that is held by another user (or sessions). For Oracle 9i, there is a specific Enqueue wait event. For Oracle 10g and later, the Enqueue wait event has been separated into more than 200 unique wait events, which each include more specific information ab... | <urn:uuid:35467474-edd0-43bc-9377-9233584deee3> | CC-MAIN-2022-40 | https://logicalread.com/oracle-locking-and-enqueue-waits-dr01/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00222.warc.gz | en | 0.924855 | 797 | 3.265625 | 3 |
While computer gaming remains primarily male dominated, a new study has revealed that girls may be more skilled at making story-based computer games.
The research was conducted by the Informatics Department at the University of Sussex on secondary school students. They were asked to design and program their own compute... | <urn:uuid:40ad2977-8ec2-4e46-8e30-577bd5f2fa45> | CC-MAIN-2022-40 | https://dataconomy.com/2014/12/study-reveals-girls-are-better-at-making-computer-games/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00222.warc.gz | en | 0.961349 | 657 | 4.0625 | 4 |
Rust is a strongly typed and safe systems programming language developed by Mozilla. Over the years, it has become the language of choice to build memory-safe programs while maintaining high performance at scale. Rust is usually used for file format and protocol parsers but also on critical projects like in the new hig... | <urn:uuid:5f0b0eb1-e214-4f43-8860-b42525cc7d0f> | CC-MAIN-2022-40 | https://fuzzinglabs.com/rust-security-training/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00222.warc.gz | en | 0.926513 | 263 | 3.484375 | 3 |
In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed.
Zero Trust is a concept created ... | <urn:uuid:25302394-d3f3-4109-b50c-47cafe11f663> | CC-MAIN-2022-40 | https://www.malwarebytes.com/blog/news/2020/01/explained-the-strengths-and-weaknesses-of-the-zero-trust-model | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00222.warc.gz | en | 0.938021 | 2,465 | 2.625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.