text stringlengths 234 589k | id stringlengths 47 47 | dump stringclasses 62
values | url stringlengths 16 734 | date stringlengths 20 20 ⌀ | file_path stringlengths 109 155 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 57 124k | score float64 2.52 4.91 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|---|
Purdue Researchers Develop Programmable Switch to Help Lay Groundwork for Quantum Internet
(Purdue.edu) Purdue University engineers have addressed an issue barring the development of quantum networks that are big enough to reliably support more than a handful of users.
The method could help lay the groundwork for when ... | <urn:uuid:52934231-c7fd-48d3-819e-5f4d3ba5f6dc> | CC-MAIN-2022-40 | https://www.insidequantumtechnology.com/news-archive/purdue-researchers-develop-programmable-switch-to-help-lay-groundwork-for-quantum-internet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00222.warc.gz | en | 0.931069 | 389 | 2.96875 | 3 |
I just finished reading an interesting hard science fiction book called The Punch Escrow, by Tal M. Klein (a movie is in the works).
What makes the difference between hard and soft science fiction is that hard science fiction is based on science, while soft is, let’s just say, far more imaginative. To be honest, I enjo... | <urn:uuid:0e29e833-a5ea-4816-ae19-ad60cc5206f5> | CC-MAIN-2022-40 | https://www.ecommercetimes.com/story/the-5-technologies-we-need-to-change-the-world-84692.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00422.warc.gz | en | 0.964245 | 1,736 | 2.515625 | 3 |
On November 2, 2016, California Attorney General Kamala Harris released a report outlining best practices for the education technology industry (“Ed Tech”). In Ready for School: Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data, Attorney General Harris noted the need to implement robust sa... | <urn:uuid:bf828f3e-c551-4a3c-9334-37fb855f5a05> | CC-MAIN-2022-40 | https://www.insideprivacy.com/tag/personally-identifiable-information/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00422.warc.gz | en | 0.91027 | 1,324 | 2.515625 | 3 |
VoIP is a communications technology that changes the meaning of a "telephone call". VoIP stands for Voice over Internet Protocol and it means "voice transmitted over a computer network."
Internet Protocol (IP) networking is supported by all sorts of networks: corporate, private, public, cable, and wireless networks. It... | <urn:uuid:8edb32cb-4886-4547-a1e6-4033d2b33bac> | CC-MAIN-2022-40 | https://www.dialogic.com/glossary/voice-over-ip-voip | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00422.warc.gz | en | 0.867582 | 151 | 3.265625 | 3 |
Because firewalls and other defensive security measures are not failsafe, you need additional tools to detect and respond to security breaches as they occur. A network analyser can detect known (and even some unknown) virus attacks and make the cleanup process much more efficient.
A protocol analyser shows you what is ... | <urn:uuid:2785f8c4-7d2e-4077-bfb5-2c4f4fe562f0> | CC-MAIN-2022-40 | https://it-observer.com/using-network-analyser-security-tool.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00422.warc.gz | en | 0.935169 | 1,692 | 3.03125 | 3 |
There has been a lot of hype about the so-called ‘supermaterial’ graphene. Composed of a single layer of carbon atoms, arranged in a hexagonal lattice, graphene has been tipped to “kill off cancer cells”, “mend human hearts” and “solve the world’s water crisis”. It is expected to one day be found in hair dye, footwear ... | <urn:uuid:98b40f04-301b-4698-8e98-c562b82a7f23> | CC-MAIN-2022-40 | https://www.cio.com/article/201892/archer-shoots-for-graphene-based-quantum-computing-tech-ip.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00622.warc.gz | en | 0.928144 | 816 | 2.59375 | 3 |
5 Autonomous Vehicle Technology Uses in Shipping and Logistics
Autonomous trucks and vehicles promise significant benefits for an industry that struggles with a growing labor shortage and the demand for shorter delivery times. The American Trucking Association estimates a shortage of as many as 174,500 drivers by 2024,... | <urn:uuid:cd3cb75c-458c-48b6-b53d-019d41203165> | CC-MAIN-2022-40 | https://www.iotworldtoday.com/2019/10/23/5-autonomous-vehicle-technology-uses-in-shipping-and-logistics/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00622.warc.gz | en | 0.95466 | 273 | 2.671875 | 3 |
Network attacks are getting more complicated in today’s security environment. To obtain basic access information, attackers use various methods such as Phishing attack or Malware infection. After they enter the relevant IT system, they disguise as the user with wide access authorization while trying to increase their p... | <urn:uuid:3c50e206-ac5d-4e9d-b8a2-b7a3f49068b5> | CC-MAIN-2022-40 | https://www.logsign.com/siem-use-cases/detecting-lateral-movements/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00622.warc.gz | en | 0.92133 | 500 | 2.53125 | 3 |
Wireless sniffers are customized packet analyzers specifically designed to capture data over wireless networks. Packet analyzers are software programs, occasionally hardware tools, which will detect, intercept and decode data over a wireless connection. Wireless sniffers are used for many legitimate actions, including ... | <urn:uuid:fa6e82d7-1bed-4625-a22d-be4e7c34220f> | CC-MAIN-2022-40 | https://checkmarx.com/glossary/how-to-avoid-wireless-sniffers/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00622.warc.gz | en | 0.931504 | 337 | 2.90625 | 3 |
(By Becky Bracken) With the use of quantum sensors, researchers have made a breakthrough on the road to creating a new data storage medium, one which cannot be accidentally overwritten by magnetic fields. The innovation is critical, since electric and magnetic fields are how qubits are excited, forming the very basis o... | <urn:uuid:762cd397-b25d-4670-bf1b-e6d85157ee41> | CC-MAIN-2022-40 | https://www.insidequantumtechnology.com/news-archive/researchers-make-data-storage-breakthrough-using-antiferromagnets/amp/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00022.warc.gz | en | 0.916753 | 559 | 3.09375 | 3 |
Packet Tracer file (PT Version 7.1): https://goo.gl/iJg2cJ
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
For lots more content, visit http://www.davi... | <urn:uuid:425eab43-26e5-4bf2-93f4-dd9d318f59a6> | CC-MAIN-2022-40 | https://davidbombal.com/cisco-ccna-packet-tracer-ultimate-labs-ppp-ppp-chap-can-complete-lab-2/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz | en | 0.900197 | 1,151 | 2.59375 | 3 |
Unlike with alcohol or nicotine, there is not a pharmacological option available to individuals addicted to cocaine to help them stop using the drug.
However, researchers at the University of Alabama at Birmingham believe the tool to help individuals treat their addiction may very well exist.
Researchers in the School ... | <urn:uuid:421401f5-590d-4380-879e-58dac6ec4a40> | CC-MAIN-2022-40 | https://debuglies.com/2018/07/01/psilocybin-can-help-curb-cocaine-addiction/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz | en | 0.933972 | 702 | 2.859375 | 3 |
The emergence of autism in children has not only been linked to genes encoding synaptic proteins—among others—but also environmental insults such as zinc deficiency.
Although it is unclear whether zinc deficiency contributes to autism, scientists have now defined in detail a possible mechanistic link.
Their research sh... | <urn:uuid:87bb0d2e-428e-4c1a-aca9-3a264a8470cf> | CC-MAIN-2022-40 | https://debuglies.com/2018/11/09/the-emergence-of-autism-in-children-has-not-only-been-linked-to-genes-encoding-synaptic-proteins-but-also-environmental-insults-such-as-zinc-deficiency/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz | en | 0.898334 | 767 | 3.609375 | 4 |
Welcome back to our third instalment on authentication in the Security 101 series. If you haven’t already, you can read part one that introduces authentication and part two which discusses authentication protocols and methods. In part three, we’re going to discuss protecting authentication.
Authentication is critical, ... | <urn:uuid:e6a54ea6-fa13-4f2f-be77-5d407bb98b3d> | CC-MAIN-2022-40 | https://techtalk.gfi.com/security-101-authentication-part-3-protecting-authentication/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz | en | 0.928634 | 1,171 | 3.125 | 3 |
More about Digital Transformation
- Cloud Computing Deployment Models and Architectures
- Cloud Adoption Strategy: What’s the Best Approach for Your Organization?
- 8 Digital Transformation Technologies and Their Business Impact
- What Is Digital Transformation in Banking?
- Digital Transformation in Healthcare: 4 Key ... | <urn:uuid:206f686c-4965-4ba7-b994-9e77752a3475> | CC-MAIN-2022-40 | https://cloud.netapp.com/blog/cvo-blg-5-types-of-digital-transformation-and-the-tech-that-powers-them | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00022.warc.gz | en | 0.893339 | 3,550 | 2.6875 | 3 |
Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A Blockchain functions as a decentralised database that is managed by computers belonging to a peer-to-peer (P2P) network. Industry experts share with Intelligent CIO Africa how enterprises are adopting... | <urn:uuid:7b9a93db-07ef-47bf-8ca1-3ff1c9db8433> | CC-MAIN-2022-40 | https://www.intelligentcio.com/africa/2020/11/05/blockchain-is-propelling-finance-trade-and-government-initiatives-in-africa/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00022.warc.gz | en | 0.94635 | 1,992 | 2.828125 | 3 |
A Binary Lookup algorithm is much like the Secure Lookup algorithm but is used when entire files are stored in a specific column. This algorithm replaces objects that appear in object columns. For example, if a bank has an object column that stores images of checks, you can use a Binary Lookup algorithm to mask those i... | <urn:uuid:d1bb8477-e2ff-4277-a2c6-65743f76c883> | CC-MAIN-2022-40 | https://maskingdocs.delphix.com/Securing_Sensitive_Data/Algorithms/Algorithm_Frameworks/Binary_Lookup/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00222.warc.gz | en | 0.807504 | 254 | 3.203125 | 3 |
Ransomware is an ever-evolving form of malware that employs encryption to hold a victim’s information at ransom. It is one of the biggest cyber security issues today, facing individuals and businesses alike. Victims often only realize that they’ve been compromised when files, servers, and other systems have been encryp... | <urn:uuid:e651d2ab-dded-4c85-943f-58c7817d8b98> | CC-MAIN-2022-40 | https://mind-core.com/blogs/cybersecurity/how-to-prevent-ransomware-attacks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00222.warc.gz | en | 0.929747 | 819 | 2.78125 | 3 |
Enabling Technology is a tool of independence for this young woman
Celeste was unsure what she wanted to do as far as working, but one thing was for sure –– she wanted to be around people and help them. After an overwhelming job-hunting day at the mall, Celeste and her Emory Valley Center Job Developer went to McDonald... | <urn:uuid:b99ff696-99d7-496b-b212-f77bfffa13ab> | CC-MAIN-2022-40 | https://maximus.com/article/enabling-technology-tool-independence-young-woman | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00222.warc.gz | en | 0.971389 | 482 | 2.5625 | 3 |
Storage - Managing z/OS Data Using DFSMS Constructs 2.4
This course introduces you to the family of DFSMS products that are used to manage z/OS data and then focuses on the creation and implementation of data, storage and management classes, as well as storage groups, to automate processes in the storage environment.
T... | <urn:uuid:7d9a441d-355b-451d-bed6-76b68e94fd05> | CC-MAIN-2022-40 | https://bmc.interskill.com/course-catalog/Storage24-Managing-zOS-Data-Using-DFSMS-Constructs.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00222.warc.gz | en | 0.772397 | 346 | 2.6875 | 3 |
Save to My DOJO
Anyone who has ever had to replace a hard disk because their old disk was simply too small to accommodate all of their data understands that there is a direct cost associated with data storage. In an effort to reduce storage costs, many organizations turn to data reduction technologies such as deduplica... | <urn:uuid:8eda38a6-c0ed-49c0-baea-7fa5182665f0> | CC-MAIN-2022-40 | https://www.altaro.com/backup-dr/backup-deduplication-compression/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00222.warc.gz | en | 0.936917 | 2,257 | 3.359375 | 3 |
A study by the Electric Power Research Institute focusing on distributing power to 24 utilities throughout the U.S., tells us that 85% of power disturbances happen because of voltage dips or swells, harmonics, wiring, and grounding problems. It postulates that these mishaps cause a financial loss of more than $156 bill... | <urn:uuid:1ff25938-553c-4f2b-b331-f19ddaefe096> | CC-MAIN-2022-40 | https://www.akcp.com/blog/next-generation-of-data-center-power-monitoring/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00222.warc.gz | en | 0.918997 | 1,878 | 3.203125 | 3 |
Are you taking time to care for your teeth? It’s one of the most important preventative measures you can take for your oral health and overall health.
Suppose you don’t properly care for your teeth and gums. In that case, it can lead to many issues, including infections of the mouth, facial pain, gum disease, and more ... | <urn:uuid:e7c4d9e7-b213-479c-8571-a45daafb0c71> | CC-MAIN-2022-40 | https://www.contactcenterworld.com/blog/mytechblog/?id=de2cb2d2-69ea-4a0b-92f3-795581dd2ff2 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00222.warc.gz | en | 0.94013 | 850 | 3.078125 | 3 |
Previously we have had a look on the ways wireless networks can be installed and configured. We are aware of the fact that how difficult it is to maintain and run a wireless network. The popularity of wireless networks has led to the emergence of more technical and large networks. Many of the people, all over the world... | <urn:uuid:4873e7cf-a6cc-4d71-8cd3-cf97886cce27> | CC-MAIN-2022-40 | https://www.examcollection.com/certification-training/network-plus-how-to-troubleshoot-common-wireless-problems.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00222.warc.gz | en | 0.964215 | 2,390 | 2.8125 | 3 |
Women began dropping out of ICT roles in 1984, the same year personal computers were on the rise, according to Lynwen Connick, First Assistant Secretary – Cyber Policy and Intelligence Division, the Department of the Prime Minister and Cabinet.
Speaking as the keynote at the packed out Females in IT and Telecommunicati... | <urn:uuid:4a752764-b139-42eb-a50e-3c6cbcb8e5e4> | CC-MAIN-2022-40 | https://www.cio.com/article/201879/1984-was-the-year-everything-changed-for-women-in-it-lynwen-connick.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00222.warc.gz | en | 0.979832 | 1,192 | 2.625 | 3 |
Biometrics used to protect livestock
A new livestock application of biometrics promises a way to protect sheep from big bad wolves.
Swiss biologists have developed a biometric sheep collar that registers changes in the heart rate of sheep to indicate wolf attacks. The device will be ultimately be designed to alerts she... | <urn:uuid:6e237f15-c7e1-466e-bb1e-1483c46c210c> | CC-MAIN-2022-40 | https://www.biometricupdate.com/201208/biometrics-used-to-protect-livestock | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00222.warc.gz | en | 0.918178 | 312 | 3.015625 | 3 |
Intrinsic functions are subprograms that are built into the ACUCOBOL-GT library. They save time by simplifying common tasks that your COBOL programs might need to perform. For example, intrinsic functions can perform statistical calculations, convert strings from upper to lower case, compute annuities, derive values fo... | <urn:uuid:c13b00e5-6b0b-4a37-a39c-b518b1222b2e> | CC-MAIN-2022-40 | https://www.microfocus.com/documentation/extend-acucobol/1031/extend-Interoperability-Suite/BKPPPPINTRS001.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00222.warc.gz | en | 0.877952 | 517 | 3.390625 | 3 |
Encryption Does Not Equal Integrity
Intercepted e-mail can become he-said-she-said without you knowing it.
- By Roberta Bragg
Sometimes I wonder what my purpose in life is. I used to think it was helping
people and organizations improve their information security posture. In effect,
help them stand up straight, do the ... | <urn:uuid:b71d0ac5-bad7-4324-bc50-0d3ae4454f9d> | CC-MAIN-2022-40 | https://mcpmag.com/articles/2004/10/18/encryption-does-not-equal-integrity.aspx | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00222.warc.gz | en | 0.937068 | 1,000 | 2.75 | 3 |
CCL's Principal Analyst Alex Caithness asks the question: After SQLite, what comes next? A must-read primer on LevelDB - tomorrow's ubiquitous format?
SQLite has become a ubiquitous data storage format for digital forensic practitioners to consider. First popularised by smart phone platforms it now forms part of almost... | <urn:uuid:f842d572-fa14-44cc-8b52-3628d040b45d> | CC-MAIN-2022-40 | https://www.cclsolutionsgroup.com/post/hang-on-thats-not-sqlite-chrome-electron-and-leveldb | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00222.warc.gz | en | 0.925921 | 3,826 | 2.625 | 3 |
Written By Pravin Mehta
Updated on July 22, 2022
Min Reading 3 Min
The Gramm-Leach-Bliley Act (GLBA) is a United States federal law that regulates the companies designated as “financial institutions” on how they handle their customer’s nonpublic personal information or NPI. GLBA mandates financial institutions to ensur... | <urn:uuid:fc122b4b-0d80-4fee-ad68-20dee6da3e02> | CC-MAIN-2022-40 | https://www.bitraser.com/article/the-basics-of-gramm-leach-bliley-act-worth-knowing.php | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00422.warc.gz | en | 0.914108 | 1,630 | 2.875 | 3 |
Global warming may hit the eastern United States harder than scientists thought, resulting in extremely hot summers. Average summer high temperatures could reach almost 10 degrees higher in 2080 than they do today.
Eastern U.S. summer daily highs currently average in the low to mid-80s Fahrenheit. They will likely soar... | <urn:uuid:a559c5f5-f49a-4b52-a913-e996fd649aae> | CC-MAIN-2022-40 | https://www.linuxinsider.com/story/eastern-u-s-summer-temps-could-reach-blazing-new-highs-by-2080-57348.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00422.warc.gz | en | 0.956999 | 925 | 3.421875 | 3 |
As artificial intelligence (AI) programs become more powerful and more common, organizations that use them are feeling pressure to implement ethical practices in the development of AI software. The question is whether ethical AI will become a real priority, or whether organizations will come to view these important pra... | <urn:uuid:3df0ca7a-3c74-46c3-ba27-13d3bce7d928> | CC-MAIN-2022-40 | https://www.helpnetsecurity.com/2021/10/26/ethics-in-ai/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00422.warc.gz | en | 0.951076 | 1,234 | 2.859375 | 3 |
Librarians like our acronyms, but we’re not the only profession to indulge in linguistic gymnastics. The technology field is awash in acronyms: HTTP, AWS, UI, LAN, I/O, etc. etc. etc. One acronym you might know from working in libraries, though, is OSS – Open Source Software.
Library technology is no stranger to OSS. T... | <urn:uuid:d7aa0f2b-3ae7-4f70-8c54-80b86c3c8727> | CC-MAIN-2022-40 | https://ldhconsultingservices.com/2021/10/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00422.warc.gz | en | 0.93932 | 1,030 | 2.875 | 3 |
Jeeva has just dropped the world’s lowest power wireless chip, Parsair, a breakthrough in IoT innovation.
Jeeva has announced the world’s lowest power wireless chip for streaming real-time sensor data. Jeeva’s Parsair™ chip consumes 100 times less power than typical Bluetooth and enables many novel use cases previously... | <urn:uuid:e8d9346c-54b3-45e9-a627-b93a4524da3b> | CC-MAIN-2022-40 | https://tbtech.co/innovativetech/iot/jeeva-reveals-worlds-lowest-power-wireless-chip/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00422.warc.gz | en | 0.921345 | 735 | 2.5625 | 3 |
While the term may be relatively obscure, we benefit from machine learning everyday. Watch a few British crime dramas and suddenly your Netflix queue is populated with a stream of related movies and TV shows. These highly curated suggestions are based on the viewing patterns of thousands of similar customers. With each... | <urn:uuid:74173b46-402c-4f54-96e3-d7e216e2f1b7> | CC-MAIN-2022-40 | https://www.bluefin.com/bluefin-news/can-machine-learning-fight-fraud/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00422.warc.gz | en | 0.942668 | 1,639 | 3.328125 | 3 |
SNMP is one of the most widely used communication protocols for remote monitoring systems. That's because it allows the real-time exchange of information between network devices - and it also allows notifications of events to be sent to technicians.
If you are already familiar with SNMP, you probably know that every ve... | <urn:uuid:49685ba9-9a7e-4c0f-888e-840bd6723fef> | CC-MAIN-2022-40 | https://www.dpstele.com/blog/what-is-a-snmp-getbulk-request.php | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00422.warc.gz | en | 0.927559 | 1,827 | 2.609375 | 3 |
Wireless, WiFi, and Bluetooth are all common terms people use, but they do not always understand the nuances between what they do and how they work. Wireless and WiFi are used synonymously and are the same thing: WiFi is short for wireless fidelity, which is often shortened to wireless, both of which mean a wireless ne... | <urn:uuid:6e90baea-4732-4f3e-9dbc-26ea89134523> | CC-MAIN-2022-40 | https://blogs.eyonic.com/the-difference-between-wireless-and-bluetooth-and-when-to-use-each/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00422.warc.gz | en | 0.957712 | 949 | 2.875 | 3 |
The Department of Veterans Affairs' innovation chief is eyeing novel uses of new technology in the pursuit of continuing to improve veteran care, and one area he sees growing is in point-of-care manufacturing.
"One of the market dynamics that's shifting predominantly in health care is that concept of point-of-care manu... | <urn:uuid:e416e582-f5d5-48c4-bbd6-17982276add1> | CC-MAIN-2022-40 | https://governmentciomedia.com/emerging-uses-3d-printing-manufacturing-are-transforming-veteran-care | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00622.warc.gz | en | 0.954363 | 983 | 2.59375 | 3 |
Like human hygiene, organizations must maintain regular cyber hygiene for healthy outcomes, but it’s critical they don’t neglect the tools and processes that mitigate cyber risk — the most serious threats to our security — says Bryan Ware in a piece for Network World.
Typically, the discussion around the need for risk ... | <urn:uuid:2a9148e1-fd73-4d88-a880-32592adb3712> | CC-MAIN-2022-40 | https://haystax.com/network-world-cyber-hygiene-isnt-enough-says-haystax-technology-ceo-bryan-ware/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00622.warc.gz | en | 0.956072 | 202 | 2.546875 | 3 |
In recent years, deep learning has revolutionized computer vision. And thanks to transfer learning and amazing learning resources, anyone can start getting state of the art results within days and even hours, by using a pre-trained model and adapting it to your domain. As deep learning is becoming commoditized, what is... | <urn:uuid:ff356c72-8a4d-4e13-a844-cb38c79de091> | CC-MAIN-2022-40 | https://resources.experfy.com/ai-ml/deep-learning-vision-for-non-vision-tasks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00622.warc.gz | en | 0.936132 | 1,839 | 2.78125 | 3 |
What is Code Injection?GRIDINSOFT TEAM
Code injection (a.k.a. remote code execution) is an attack based on the input of improper data into a program. If hackers manage to exploit program vulnerabilities, they may succeed in injecting malicious code through the input line or uploaded file with the subsequent execution o... | <urn:uuid:03f071ef-57de-4a30-ba72-fba9774753ea> | CC-MAIN-2022-40 | https://gridinsoft.com/code-injection | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00622.warc.gz | en | 0.899021 | 1,586 | 3.8125 | 4 |
Internet Control Message Protocol (ICMP) is a network layer protocol from OSI model which provides troubleshooting, control and error message services. It is commonly used by network administrators to troubleshoot Internet connections in diagnostic utilities including ping and traceroute.
ICMP for Internet Protocol ver... | <urn:uuid:14393828-8e18-431a-840a-d5c281f3f6ad> | CC-MAIN-2022-40 | https://ipwithease.com/internet-control-message-protocol-icmp/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00622.warc.gz | en | 0.887448 | 533 | 3.734375 | 4 |
What Are Route Pattern Wildcards?
It is estimated that there are more than 10 billion possible phone numbers in the United States. When configuring routes in CUCM, it would simply be untenable to list every possible number required in a route table.
In this post, we will discuss how to create generalized route patterns... | <urn:uuid:74244d0d-0b30-4b6f-ac40-88f004d629f0> | CC-MAIN-2022-40 | https://www.cbtnuggets.com/blog/technology/networking/what-are-route-pattern-wildcards | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00622.warc.gz | en | 0.926788 | 1,633 | 3.09375 | 3 |
Facebook has a new US patent which will allow it to control personal Internet of Things (IoT) devices.
With the Internet of Things now starting to become established in the home, this could represent a big addition to Facebook’s range of activities – and a change in direction.
The social network is currently focussed o... | <urn:uuid:d1ba7f1c-bd98-4709-b9c8-c4dfd0bf6dbf> | CC-MAIN-2022-40 | https://internetofbusiness.com/facebook-wants-talk-iot-home-tech/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00622.warc.gz | en | 0.959341 | 536 | 2.546875 | 3 |
The question still remains as to how end-users can protect themselves from hackers. End-users deal with confidential data. Consider the following confidential data we use on a daily basis:
- Personal email and password
- Corporate email and password
- Facebook login ID and password
- Linked login ID and password
- Inte... | <urn:uuid:e92c3c73-b2ec-48ab-ae04-bddfcadda281> | CC-MAIN-2022-40 | https://www.faronics.com/news/blog/biometrics-the-final-frontier-in-endpoint-security | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00622.warc.gz | en | 0.885839 | 312 | 2.9375 | 3 |
What is svchost.exe? Is it a virus?
A svchost.exe or Service Host file is a legitimate system process in the Windows operating system. However, users tend to confuse it with a virus because hackers can disguise malicious activities as integral system parts.
Official svchost.exe has a designated location and represents ... | <urn:uuid:55ae2d78-1d88-4eeb-9a91-4df28a0e7d16> | CC-MAIN-2022-40 | https://atlasvpn.com/blog/what-is-svchost-exe-is-it-a-virus | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00622.warc.gz | en | 0.919416 | 1,339 | 2.515625 | 3 |
New Technology is Reducing Trauma for Child-abuse Investigators
Fill out form to get the Insights
Investigating crimes against children often comes at a heavy psychological price. However, new technology is able to reduce the trauma law enforcement faces when investigating these cases.
This article discusses how:
- Art... | <urn:uuid:ca31867c-180a-46ce-976b-94f288a870a1> | CC-MAIN-2022-40 | https://cellebrite.com/en/new-technology-is-reducing-trauma-for-child-abuse-investigators/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00622.warc.gz | en | 0.903046 | 115 | 2.734375 | 3 |
This article describes how Infrastructure-as-a-Service helps businesses quickly get the computing capacities they need, reducing capital expenditures on IT equipment, frees the IT department from routine tasks, and simplifying scaling.
What is IaaS
Infrastructure-as-a-Service (IaaS) is providing computing resources for... | <urn:uuid:14d0bb7c-3a62-47d1-ac2a-05b1adb971c2> | CC-MAIN-2022-40 | https://www.cloud4u.com/blog/infrastructure-as-a-service-explained/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00622.warc.gz | en | 0.937174 | 749 | 2.5625 | 3 |
"Fair is foul, and foul is fair... Oftentimes, to win us our harm, the instruments of darkness tell us truths, win us with honest trifles, to betrays in deepest consequence" Macbeth, Act 1
Is Fairness the new oil? I think that "new oil" phrase is dumb, but there is a lot of activity in Fairness in AI lately. It is, how... | <urn:uuid:9d10c1b3-4952-4c29-bbe9-6267bc9ddb26> | CC-MAIN-2022-40 | https://diginomica.com/fairness-ai-practical-possibility-new-angle-designing-ethical-systems | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00022.warc.gz | en | 0.94508 | 1,667 | 2.578125 | 3 |
Most Commented Posts
Every day, technology advances. Every year, new innovations are introduced to make living easier. We live in a 21st-century world that values innovation and creativity. In today’s world, a semiconductor test system is also essential. Testing equipment is used by the tech industry to ensure that its... | <urn:uuid:73e8b590-983d-4323-bf57-e79f4eb2089e> | CC-MAIN-2022-40 | https://ihowtoarticle.com/semiconductor-test-systems-benefits-and-drawbacks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00022.warc.gz | en | 0.920645 | 670 | 2.953125 | 3 |
The latest IP cameras have much better video quality than the early analog CCTV cameras. Even though they both capture video, IP cameras do it dramatically better. The reason; they contain high performance digital processing computers. The computers provide reduced noise, improved wide dynamic range, reduced smearing, ... | <urn:uuid:ad21102c-e3eb-4d8a-854e-7b680fccf5a1> | CC-MAIN-2022-40 | https://kintronics.com/how-digital-processing-in-the-ip-camera-improves-video-quality/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00022.warc.gz | en | 0.912758 | 1,024 | 2.84375 | 3 |
How the Internet of Things Impacts Businesses and What to Do With It
The Internet of Things (IoT) is the ever-growing collection of devices — ranging from smartphones to sensor-equipped manufacturing robots — that are interconnected via the internet. Thanks to this interconnection, they can send and receive data — a ca... | <urn:uuid:5dcc1294-a93c-4fb7-9fe2-6eff4257addd> | CC-MAIN-2022-40 | https://consoltech.com/blog/iot-in-business/amp/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00022.warc.gz | en | 0.947239 | 1,528 | 2.84375 | 3 |
One of the main concerns of the organizers of the Olympic Games to be held in Athens this summer is security, but not only physical security, computer security as well.
The emphasis placed on avoiding problems with the computers that will manage huge amounts of data during the games will be proportional to the magnitud... | <urn:uuid:d17bd523-c030-4cdd-a579-6cb5781f4793> | CC-MAIN-2022-40 | https://it-observer.com/how-much-should-you-invest-it-security.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00022.warc.gz | en | 0.964854 | 759 | 2.578125 | 3 |
The bring-your-own-device (BYOD) movement, a recent trend that has been redefining the corporate world, offers some intriguing possibilities for implementation in schools. It can also introduce a new set of challenges for educators, from security concerns to classroom control policies. Using school-funded computing dev... | <urn:uuid:4eb96a9b-7f33-49bc-ac3d-50ce3ef796e8> | CC-MAIN-2022-40 | https://www.faronics.com/news/blog/classroom-management-strategies-for-byod | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00223.warc.gz | en | 0.95976 | 506 | 3.15625 | 3 |
Many connected device makers have yet to prioritize security and that makes everyone more vulnerable.
Jason Haddix is the head of trust and security at Bugcrowd.
Today, internet of things devices outnumber humans. Internet-enabled children’s toys, household appliances, automobiles, industrial control systems and medica... | <urn:uuid:17295026-1e3a-4804-9b11-a05daac47749> | CC-MAIN-2022-40 | https://www.nextgov.com/ideas/2017/04/hackers-pov-internet-things-security/137292/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00223.warc.gz | en | 0.953493 | 956 | 2.546875 | 3 |
Viruses are malware that can infect your computer and cause havoc, and make you lose more than just sleep. You can potentially lose your data and your identity if a hacker can get through your computer’s defences via a virus.
What Is An Antivirus Program
An Antivirus program is designed specifically to prevent any viru... | <urn:uuid:1d03fda2-93e9-4b63-bf1b-a1bd5014f25f> | CC-MAIN-2022-40 | https://bluegadgettooth.com/online-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00223.warc.gz | en | 0.944761 | 2,413 | 3.28125 | 3 |
There are many types of phishing attack nowadays, to the extent it can be tricky to keep up with them all. We have unique names for mobile attacks, postal attacks, threats sent via SMS and many more besides. However, we often see folks mix up their spears and their whales, and even occasionally confuse them with regula... | <urn:uuid:cb928e29-09eb-4ae9-b75c-b2ac93abbc80> | CC-MAIN-2022-40 | https://www.malwarebytes.com/blog/news/2021/12/spear-phish-whale-phish-regular-phish-whats-the-difference | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00223.warc.gz | en | 0.961612 | 674 | 2.90625 | 3 |
The ‘Internet of Things’, a term coined by Kevin Ashton in the year 1999, began gaining momentum over the last decade given to the recent advancements attributed by the human mind’s inquisitive nature and the need to widen the scope of technology beyond the confines of industrial use cases.
A report claims that by the ... | <urn:uuid:582d2754-a5dd-4dd1-b017-7931fdf12b8f> | CC-MAIN-2022-40 | https://disruptive.asia/cellular-iot-transforming-smart-home-segment/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334644.42/warc/CC-MAIN-20220926020051-20220926050051-00423.warc.gz | en | 0.930587 | 1,473 | 2.59375 | 3 |
Encryption protects end-user privacy, and its adoption is increasing rapidly. Unfortunately, one side-effect of the increased use of encryption is the erosion of visibility for network defenders. Encrypted Traffic Analysis is a way to restore network visibility for defenders while maintaining privacy for users.
To unde... | <urn:uuid:95707378-e357-41ec-87f9-2f2a2b6f43a4> | CC-MAIN-2022-40 | https://www.liveaction.com/encrypted-traffic-analysis/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00423.warc.gz | en | 0.866231 | 1,366 | 2.78125 | 3 |
There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even government intelligence organizations can’t keep their hacking tools secret despite having some of the strongest protections and strictest policies... | <urn:uuid:5013b33a-bee2-4aa9-ae38-1f8bb876aed7> | CC-MAIN-2022-40 | https://www.helpnetsecurity.com/2017/05/03/cyber-security-human-condition/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00423.warc.gz | en | 0.936184 | 1,129 | 2.953125 | 3 |
Email was one of the earliest forms of communication on the internet, and if you’re reading this you almost undoubtedly have at least one email address. Critics today decry the eventual fall of email, but for now it’s still one of the most universal means of communicating with other people that we have.
One of the bigg... | <urn:uuid:cf429bc9-63b2-43bc-b4e6-3310dcc7f998> | CC-MAIN-2022-40 | https://www.comparitech.com/blog/vpn-privacy/how-to-encrypt-email/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00423.warc.gz | en | 0.915512 | 4,019 | 3.53125 | 4 |
New path-breaking digital technologies are being introduced into our daily lives with amazing speed. Some of these make it increasingly difficult to differentiate between real and fake media. Among more recent development adding to the problem is the emergence of deepfakes.
What is Deepfake Technology?
Deepfakes are hy... | <urn:uuid:a382e100-5bc8-4e7e-9e7b-dc44acceb156> | CC-MAIN-2022-40 | https://www.baselinemag.com/uncategorized/what-are-deepfakes-major-opportunities-and-threats/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00423.warc.gz | en | 0.936422 | 1,208 | 3.203125 | 3 |
The radical increase in mobile users has entailed the improvement of the mobile app industry. Mobile application development agencies help businesses in planning and designing exclusive and robust mobile apps that can fulfill the requirements of clients.
People are depending more on mobile apps for performing daily job... | <urn:uuid:3685b6c2-129d-490b-83e5-ffa7d03e4b12> | CC-MAIN-2022-40 | https://www.crayondata.com/role-big-data-mobile-app-development/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00423.warc.gz | en | 0.91417 | 2,102 | 2.5625 | 3 |
Types of Optical Fiber Dispersion and Compensation Strategies
What Is Optical Fiber Dispersion?
Optical fiber dispersion describes the process of how an input signal broadens/spreads out as it propagates/travels down the fiber. Normally, dispersion in fiber optic cable includes modal dispersion, chromatic dispersion an... | <urn:uuid:c9c4cc1c-9027-4fce-bc27-5c8b950c5378> | CC-MAIN-2022-40 | https://community.fs.com/blog/types-of-optical-fiber-dispersion-and-compensation-strategies.html | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00623.warc.gz | en | 0.91193 | 1,463 | 3.4375 | 3 |
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think the content is helpful for people you know, share it with them!
For us adults, it's hard to stay safe online and not to... | <urn:uuid:61c7d6c4-c43e-4e4a-9892-24d261917c59> | CC-MAIN-2022-40 | https://johnopdenakker.com/help-your-children-stay-safe-online/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00623.warc.gz | en | 0.96172 | 989 | 3.015625 | 3 |
In order to increase the transmission distance of optical signals, many technologies, like the TDM (time division multiplexing) and WDM (wavelength division multiplexing), have been used. Except for that, several optical components like single mode fiber optic cables, optical amplifiers and dispersion compensating modu... | <urn:uuid:96ff2e73-0a98-4fda-8001-320cde3d6bbc> | CC-MAIN-2022-40 | https://www.fiber-optic-components.com/tag/dwdm | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00623.warc.gz | en | 0.912712 | 850 | 3.53125 | 4 |
“History is a cyclic poem written by Time upon the memories of Human Being.”- Shelley, English Poet.
History is the study of the past; specifically the people, societies, events, and problems of the past as well as our attempts to understand the past. It is a pursuit common to all human communities.
History can take th... | <urn:uuid:3410eec1-0604-4a09-ac4b-a4e23179413a> | CC-MAIN-2022-40 | https://areflect.com/2020/08/18/today-in-history-august-18/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00623.warc.gz | en | 0.966701 | 534 | 3.859375 | 4 |
What Is MITRE ATT&CK?
MITRE ATT&CK refers to a group of tactics organized in a matrix, outlining various techniques that threat hunters, defenders, and red teamers use to assess the risk to an organization and classify attacks. Threat hunters identify, assess, and address threats, and red teamers act like threat actors... | <urn:uuid:117acea3-77ab-409e-804d-03c3d78a6294> | CC-MAIN-2022-40 | https://www.fortinet.com/tw/resources/cyberglossary/mitre-attck | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00623.warc.gz | en | 0.938133 | 2,248 | 2.78125 | 3 |
What is FISMA (Federal Information Security Management Act)?
The Federal Information Security Management Act (FISMA) is a United States federal law enacted as Title III of the E-Government Act of 2002.
It requires federal agencies to implement information security programs to ensure their information and IT systems' co... | <urn:uuid:3dea65c8-b7e8-48bc-ab95-da72c62269c8> | CC-MAIN-2022-40 | https://www.itgovernanceusa.com/fisma | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00023.warc.gz | en | 0.922102 | 966 | 2.875 | 3 |
Some of the most talented and dangerous cyber warriors and criminals come from Russia, a long-time meddler in other nations' digital systems.
Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military personnel probi... | <urn:uuid:980f8009-f6a6-4b46-8b34-5d4a7aa757ea> | CC-MAIN-2022-40 | https://gcn.com/cybersecurity/2017/08/tracing-the-sources-of-todays-russian-cyber-threat/312871/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00023.warc.gz | en | 0.947529 | 1,696 | 2.546875 | 3 |
If you're one of those who knows a bit of networking but you feel uncomfortable touching AWS networking resources, then this article is for you.
We're going to go through real AWS configuration and you can follow along to solidify your understanding.
I'm going through the process of what I personally do to create 2 sim... | <urn:uuid:7c1cd634-d47f-49e7-b180-43d5d9ccefc0> | CC-MAIN-2022-40 | https://community.f5.com/t5/technical-articles/an-illustrated-hands-on-intro-to-aws-vpc-networking/ta-p/281114 | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00023.warc.gz | en | 0.907704 | 3,209 | 2.78125 | 3 |
Directory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. It is dangerous to leave this function turned on for the web server because it leads to information disclosure.
For example, when a user requests www.acunetix.com without specifyi... | <urn:uuid:94e66e15-a3d0-499f-bd44-c5331b6ddc86> | CC-MAIN-2022-40 | https://www.acunetix.com/blog/articles/directory-listing-information-disclosure/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00023.warc.gz | en | 0.906803 | 736 | 3.03125 | 3 |
Arizona State University, like many colleges across the United States, has a problem with students who enter their freshman year ill prepared in math. Though the school offers remedial classes, one-third of students earn less than a C, a key predictor that they will leave before getting a degree. To improve the dismal ... | <urn:uuid:86208ac2-1137-4d01-b7ae-6d7e6484c974> | CC-MAIN-2022-40 | https://www.crayondata.com/how-big-data-will-haunt-you-forever-your-high-school-transcript/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00023.warc.gz | en | 0.972681 | 337 | 3.125 | 3 |
Do you find it difficult to help your kids achieving a balance between technology and life? If yes, read further to discover a few digital parenting guidelines and you can also use parental control apps to keep an eye on your child’s online activities. We’ve put together these 8 Parenting Tips as part of our digital te... | <urn:uuid:de31b9b7-32f8-46c4-b645-043c484df22a> | CC-MAIN-2022-40 | https://blog.bit-guardian.com/digital-technology-guidelines-for-parents/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00023.warc.gz | en | 0.951333 | 1,350 | 3.03125 | 3 |
Appropriate Data Types
- Choosing appropriate data types is a key factor during data modeling. It provides a good compression and avoids unnecessary type conversions or expression indexes.
- Keep formats short, do not use VARCHAR(2000000) or DECIMAL(32,X) if a smaller range is sufficient.
Prefer exact data types.
- Pre... | <urn:uuid:df39e14a-1988-4701-ab93-11e0ff575dcb> | CC-MAIN-2022-40 | https://docs.exasol.com/db/7.0/performance/best_practices.htm | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00223.warc.gz | en | 0.846134 | 2,808 | 2.53125 | 3 |
What about this course?
OpenFlow is the technology that started the SDN movement, the two terms were often used interchangeably in the early days. Despite being an important component in any SDN discussion, OpenFlow remains to be one of the mysterious topics in traditional network engineer's tool belt. The course will ... | <urn:uuid:0c0cdeee-7758-43c2-8ed0-a02043a3f91d> | CC-MAIN-2022-40 | https://ine.com/learning/courses/learn-sdn-with-open-flow-and-ryu-controller | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00223.warc.gz | en | 0.87304 | 370 | 2.546875 | 3 |
Do you know what makes a successful entrepreneur?
According to Harvard Business School academics it's a combination of skill, luck and good timing.
What makes some entrepreneurs successful and others unsuccessful? It’s a combination of skill, luck and good timing, according to Harvard Business School academics. In thei... | <urn:uuid:0e209e61-8239-4608-8598-76149dae7729> | CC-MAIN-2022-40 | https://www.hiscox.com/blog/do-you-know-what-makes-successful-entrepreneur | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00223.warc.gz | en | 0.959324 | 839 | 2.5625 | 3 |
Shared secrets are a piece of data that is known to two or more parties. They are most commonly recognized in the form of passwords, which are known to both service provider and end user. Shared secrets cam be plaintext or another piece of data so long as they are known to the two or more distinct parties. Commonly use... | <urn:uuid:d053a422-54be-472e-9bb0-26e07bcd707d> | CC-MAIN-2022-40 | https://www.hypr.com/security-encyclopedia/shared-secrets | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00223.warc.gz | en | 0.947874 | 191 | 3.265625 | 3 |
What is FIDO Authentication?
FIDO, which stands for Fast IDentity Online, is a set of authentication standards aimed at strengthening the user login process to online services. The standards are developed by the FIDO Alliance and promote faster, more secure authentication processes with the overall goal of eliminating ... | <urn:uuid:799a2dda-2a68-467e-b729-996c2f52ebd5> | CC-MAIN-2022-40 | https://de.microcosm.com/blog/what-is-fido-authentication | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00223.warc.gz | en | 0.925933 | 907 | 2.859375 | 3 |
As multi-factor authentication (MFA) becomes a mandatory security practice, especially for almost all cyber insurance policies, cyber criminals are seeking new ways to break through these walls to steal your data.
Multi-factor authentication (MFA) is the authentication method that requires the user to provide two or mo... | <urn:uuid:088c6462-a058-41cb-b549-ae26fb3411c2> | CC-MAIN-2022-40 | https://eclypses.com/news/hackers-are-bypassing-multi-factor-authentication-mfa-security/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00223.warc.gz | en | 0.946604 | 893 | 2.71875 | 3 |
In this lesson we’ll take a look at different protocols for gateway redundancy. So what is gateway redundancy and why do we need it? Let’s start with an example!
The network in the picture above is fairly simple. I have one computer connected to a switch. In the middle you’ll find two multilayer switches (SW1 and SW2) ... | <urn:uuid:642446b1-162b-49af-bfe9-97fcfc2746d1> | CC-MAIN-2022-40 | https://networklessons.com/cisco/ccie-routing-switching-written/introduction-gateway-redundancy | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00223.warc.gz | en | 0.904473 | 350 | 3.8125 | 4 |
Information technology attacks that penetrate or shut down company networks are now part of everyday news. Companies from large enterprises to small businesses fall victim to security breaches due to improper implementation of security control – this leads to loss of customer trust, market reputation, and of course, lo... | <urn:uuid:29cb0f9b-8b52-4fb8-9c7c-d986381a5ab9> | CC-MAIN-2022-40 | https://www.getastra.com/blog/security-audit/gray-box-penetration-testing/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00223.warc.gz | en | 0.919793 | 2,365 | 2.65625 | 3 |
Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks (SAN). TP operates by allocating disk storage space in a flexible manner among multiple users, based on the minimum space required by each user at any given time.
In computing, thin provis... | <urn:uuid:adc4685f-9012-4799-a929-2a3cf89ef1d6> | CC-MAIN-2022-40 | https://www.arxys.com/thin-provisioning-using-virtualization/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00223.warc.gz | en | 0.890469 | 1,034 | 3.53125 | 4 |
You may have seen an excellent program in many of our schools called Character Counts. It’s a wonderful school program that encourages positive behavior in addition to academics. One of the core paradigms of the program is that teaching a child to be a good person is just as important as getting good grades and getting... | <urn:uuid:541927f6-6edf-4681-a226-89e6f9b30a2a> | CC-MAIN-2022-40 | https://ddsecurity.com/2014/08/13/character-counts/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00223.warc.gz | en | 0.916939 | 527 | 2.71875 | 3 |
Zero trust is gaining momentum. Understanding what zero trust is, and how to improve it, is imperative to cybersecurity.
The zero-trust model was created by John Kindervag in 2010, when he was a principal analyst at Forrester Research Inc. The zero-trust architecture is a powerful, holistic security strategy that is he... | <urn:uuid:9edf1cab-7226-41c4-8170-666dde810a8c> | CC-MAIN-2022-40 | https://www.f5.com/fr_fr/services/resources/glossary/zero-trust | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00223.warc.gz | en | 0.920918 | 792 | 2.578125 | 3 |
Cybercrime is not new; everyone is well aware of such an offense. There are several ways through which the attack could be made. The most common among them is social engineering. Do you know that 98% of cyberattacks involve social engineering? Wooh! It’s a huge rate, but Why do cyber attackers commonly use social engin... | <urn:uuid:791955a3-6553-49bd-8506-21fdfcd19c1f> | CC-MAIN-2022-40 | https://nextdoorsec.com/why-do-cyber-attackers-commonly-use-social-engineering-attacks/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00423.warc.gz | en | 0.946644 | 992 | 2.890625 | 3 |
The financial sector is one of the most essential industries that touch the lives of each and every individual and organization across the globe. As we step into a more connected world, it becomes ever more important to secure the financial ecosystem through robust cyber defenses. The financial sector is one of the pri... | <urn:uuid:bb96a593-3b29-44fa-b746-330694abfeca> | CC-MAIN-2022-40 | https://cyware.com/educational-guides/cyber-fusion-and-threat-response/why-are-financial-institutions-adopting-cyber-fusion-strategies-57b5/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00423.warc.gz | en | 0.933125 | 2,472 | 2.625 | 3 |
There are few certainties in life: Death, taxes, and turning your computer off and on when there’s a problem. This advice is usually the first tip you get from friends, family, and tech support.
Rebooting your computer helps keep it running smoothly. It clears the memory, stopping any tasks that are eating up RAM. Even... | <urn:uuid:9ef2d402-cad3-40fe-8360-ce9263a623a4> | CC-MAIN-2022-40 | https://www.komando.com/kims-column/when-to-restart-your-computer/777237/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00423.warc.gz | en | 0.904787 | 1,224 | 2.8125 | 3 |
Advanced Analytics uses sophisticated tools for granular data analysis to enable forecasts and predictions from data.
Quick Takeaway: Advanced analytics is a very effective form of data analysis because it allows you to dig deeper into data to predict the future of your business.
Analytics is a process that involves id... | <urn:uuid:48d13c52-0c92-49e1-a6d7-70d60e30cff2> | CC-MAIN-2022-40 | https://phrazor.ai/resources/glossary | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00423.warc.gz | en | 0.885806 | 1,760 | 2.875 | 3 |
This week, at the International Electron Devices Meeting (IEDM) and the Conference on Neural Information Processing Systems (NeurIPS), IBM researchers will showcase new hardware that will take AI further than it’s been before: right to the edge. Our novel approaches for digital and analog AI chips boost speed and slash... | <urn:uuid:fbb60c86-c5f2-4fcf-84d3-3a50b019a1c7> | CC-MAIN-2022-40 | https://www.ibm.com/blogs/research/2018/12/8-bit-breakthroughs-ai/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00423.warc.gz | en | 0.928327 | 1,770 | 2.546875 | 3 |
Is Cyber Security a Good Career- A job in cybersecurity can be extremely rewarding and enjoyable, but it can also be quite difficult and stressful. Understanding some of the job tasks, as well as the job characteristics and personality factors, will help you decide if a cybersecurity profession is suited for you.
Under... | <urn:uuid:b43d5e19-c141-4972-81c0-f6f6f55bc776> | CC-MAIN-2022-40 | https://cybersguards.com/is-cyber-security-a-good-career/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00423.warc.gz | en | 0.946077 | 1,044 | 2.515625 | 3 |
In 1971, Intel, then a manufacturer of random access memory, officially released the 4004, its first single-chip central processing unit, thus kickstarting nearly 50 years of CPU dominance in computing.
In 1989, while working at CERN, Tim Berners-Lee used a NeXT computer, designed around the Motorola 68030 CPU, to laun... | <urn:uuid:171afdaa-40cd-4a04-b94d-ca14877a207d> | CC-MAIN-2022-40 | https://www.datacenterdynamics.com/en/analysis/new-chip-bestiary/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00423.warc.gz | en | 0.945754 | 1,807 | 2.796875 | 3 |
It can be argued that industrial facilities have taken to digital transformation much earlier than other enterprises. While it’s only now that some businesses are committing to adopting digital tools, factories have been using robots and programmable logic controllers (PLCs) decades before the dotcom boom of the nineti... | <urn:uuid:884c610d-485b-4f55-9798-79ab24c6f91d> | CC-MAIN-2022-40 | https://cisomag.com/industrial-cybersecurity/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00623.warc.gz | en | 0.951125 | 1,356 | 2.625 | 3 |
The 2016 Distributed Denial of Service attack on Dyn came from more than 100,000 infected devices. DDoS attacks leverage massive quantities of unsecured Internet-connected devices to disrupt Internet services worldwide [DYN]. The malicious and sophisticated attack kicked off serious conversations about network security... | <urn:uuid:b57baac4-366f-41d7-9312-6c4ea8338ccd> | CC-MAIN-2022-40 | https://blogs.cisco.com/digital/how-to-harden-your-devices-to-prevent-cyber-attacks | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00623.warc.gz | en | 0.896398 | 1,106 | 2.734375 | 3 |
As a follow on to our last write up about an effective digital vaccine we thought it would be worth pointing out a few facts about a critical topic in the health arena. Soap. Yeah, soap. Before you stop reading let me break down what we have been getting wrong about something as simple as washing our hands during the C... | <urn:uuid:168569de-f061-4735-a640-6902f640e1ca> | CC-MAIN-2022-40 | https://gytpol.com/cyber-soap/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00623.warc.gz | en | 0.95433 | 966 | 3.15625 | 3 |
Have you ever been away from home and needed to access something on your home computer or router?
It sounds convenient, right?
It sure would be easier than driving/flying back to your home, or asking a friend or family member to go to your house to retrieve what you’re looking for.
Well, never fear. In this guide, we’l... | <urn:uuid:1dd7292c-fab9-43eb-970a-b7870c936e2f> | CC-MAIN-2022-40 | https://www.infravio.com/how-to-access-my-router-from-the-internet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00623.warc.gz | en | 0.948028 | 2,290 | 3 | 3 |
We could already be swimming in a world of deepfakes and the public wouldn’t even know. After all, how would we? Those being manipulated by microtargeting before the last US presidential election or the Brexit referendum only found out too late that their information had been weaponized against them. Like the frog bein... | <urn:uuid:20d29d86-d899-4caf-9ea7-ce9aaa570db7> | CC-MAIN-2022-40 | https://www.cpomagazine.com/cyber-security/deepfakes-could-break-the-internet/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00623.warc.gz | en | 0.949856 | 1,102 | 2.609375 | 3 |
Wi-Fi security took a severe blow on Monday as Mathy Vanhoef, a Belgian security researcher, released details of a major weakness in the Wi-Fi Protected Access 2 (WPA2) protocol.
The WPA2 security protocol was first made available in 2004 and has since served as the de-facto standard for securing wireless networks usin... | <urn:uuid:9ee873ba-e965-4e03-84bc-b91c506739e5> | CC-MAIN-2022-40 | https://www.cpomagazine.com/cyber-security/protect-yourself-from-the-latest-wpa2-wi-fi-security-flaw/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00623.warc.gz | en | 0.934381 | 628 | 2.71875 | 3 |
Machine learning (ML) teaches computers to learn from data without being explicitly programmed. Unfortunately, the rapid expansion and application of ML have made it difficult for organizations to keep up, as they struggle with issues such as labeling data, managing infrastructure, deploying models, and monitoring perf... | <urn:uuid:91f651c1-4c86-4da0-9a1e-261dc260dad0> | CC-MAIN-2022-40 | https://www.itbusinessedge.com/development/mlops-tools/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00623.warc.gz | en | 0.905292 | 3,764 | 3.421875 | 3 |
A Historic Look at Silicon Valley
In the 90’s, there was the internet. Or rather, the dawn of the internet, which came with it the need for data facilities to house increasingly complex websites, applications and services. Laying to the south of San Francisco, Silicon Valley and more specifically the Santa Clara valley... | <urn:uuid:cf4ef044-f4a1-4eef-b4ef-64325cbfc7cc> | CC-MAIN-2022-40 | https://bandwidthig.com/bandwidth-ig-the-future-of-data-in-silicon-valley/ | null | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00623.warc.gz | en | 0.948156 | 1,069 | 2.75 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.