text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Purdue Researchers Develop Programmable Switch to Help Lay Groundwork for Quantum Internet (Purdue.edu) Purdue University engineers have addressed an issue barring the development of quantum networks that are big enough to reliably support more than a handful of users. The method could help lay the groundwork for when ...
<urn:uuid:52934231-c7fd-48d3-819e-5f4d3ba5f6dc>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/purdue-researchers-develop-programmable-switch-to-help-lay-groundwork-for-quantum-internet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00222.warc.gz
en
0.931069
389
2.96875
3
I just finished reading an interesting hard science fiction book called The Punch Escrow, by Tal M. Klein (a movie is in the works). What makes the difference between hard and soft science fiction is that hard science fiction is based on science, while soft is, let’s just say, far more imaginative. To be honest, I enjo...
<urn:uuid:0e29e833-a5ea-4816-ae19-ad60cc5206f5>
CC-MAIN-2022-40
https://www.ecommercetimes.com/story/the-5-technologies-we-need-to-change-the-world-84692.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00422.warc.gz
en
0.964245
1,736
2.515625
3
On November 2, 2016, California Attorney General Kamala Harris released a report outlining best practices for the education technology industry (“Ed Tech”). In Ready for School: Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data, Attorney General Harris noted the need to implement robust sa...
<urn:uuid:bf828f3e-c551-4a3c-9334-37fb855f5a05>
CC-MAIN-2022-40
https://www.insideprivacy.com/tag/personally-identifiable-information/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00422.warc.gz
en
0.91027
1,324
2.515625
3
VoIP is a communications technology that changes the meaning of a "telephone call". VoIP stands for Voice over Internet Protocol and it means "voice transmitted over a computer network." Internet Protocol (IP) networking is supported by all sorts of networks: corporate, private, public, cable, and wireless networks. It...
<urn:uuid:8edb32cb-4886-4547-a1e6-4033d2b33bac>
CC-MAIN-2022-40
https://www.dialogic.com/glossary/voice-over-ip-voip
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00422.warc.gz
en
0.867582
151
3.265625
3
Because firewalls and other defensive security measures are not failsafe, you need additional tools to detect and respond to security breaches as they occur. A network analyser can detect known (and even some unknown) virus attacks and make the cleanup process much more efficient. A protocol analyser shows you what is ...
<urn:uuid:2785f8c4-7d2e-4077-bfb5-2c4f4fe562f0>
CC-MAIN-2022-40
https://it-observer.com/using-network-analyser-security-tool.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00422.warc.gz
en
0.935169
1,692
3.03125
3
There has been a lot of hype about the so-called ‘supermaterial’ graphene. Composed of a single layer of carbon atoms, arranged in a hexagonal lattice, graphene has been tipped to “kill off cancer cells”, “mend human hearts” and “solve the world’s water crisis”. It is expected to one day be found in hair dye, footwear ...
<urn:uuid:98b40f04-301b-4698-8e98-c562b82a7f23>
CC-MAIN-2022-40
https://www.cio.com/article/201892/archer-shoots-for-graphene-based-quantum-computing-tech-ip.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00622.warc.gz
en
0.928144
816
2.59375
3
5 Autonomous Vehicle Technology Uses in Shipping and Logistics Autonomous trucks and vehicles promise significant benefits for an industry that struggles with a growing labor shortage and the demand for shorter delivery times. The American Trucking Association estimates a shortage of as many as 174,500 drivers by 2024,...
<urn:uuid:cd3cb75c-458c-48b6-b53d-019d41203165>
CC-MAIN-2022-40
https://www.iotworldtoday.com/2019/10/23/5-autonomous-vehicle-technology-uses-in-shipping-and-logistics/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00622.warc.gz
en
0.95466
273
2.671875
3
Network attacks are getting more complicated in today’s security environment. To obtain basic access information, attackers use various methods such as Phishing attack or Malware infection. After they enter the relevant IT system, they disguise as the user with wide access authorization while trying to increase their p...
<urn:uuid:3c50e206-ac5d-4e9d-b8a2-b7a3f49068b5>
CC-MAIN-2022-40
https://www.logsign.com/siem-use-cases/detecting-lateral-movements/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00622.warc.gz
en
0.92133
500
2.53125
3
Wireless sniffers are customized packet analyzers specifically designed to capture data over wireless networks. Packet analyzers are software programs, occasionally hardware tools, which will detect, intercept and decode data over a wireless connection. Wireless sniffers are used for many legitimate actions, including ...
<urn:uuid:fa6e82d7-1bed-4625-a22d-be4e7c34220f>
CC-MAIN-2022-40
https://checkmarx.com/glossary/how-to-avoid-wireless-sniffers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00622.warc.gz
en
0.931504
337
2.90625
3
(By Becky Bracken) With the use of quantum sensors, researchers have made a breakthrough on the road to creating a new data storage medium, one which cannot be accidentally overwritten by magnetic fields. The innovation is critical, since electric and magnetic fields are how qubits are excited, forming the very basis o...
<urn:uuid:762cd397-b25d-4670-bf1b-e6d85157ee41>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/researchers-make-data-storage-breakthrough-using-antiferromagnets/amp/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00022.warc.gz
en
0.916753
559
3.09375
3
Packet Tracer file (PT Version 7.1): https://goo.gl/iJg2cJ Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course). For lots more content, visit http://www.davi...
<urn:uuid:425eab43-26e5-4bf2-93f4-dd9d318f59a6>
CC-MAIN-2022-40
https://davidbombal.com/cisco-ccna-packet-tracer-ultimate-labs-ppp-ppp-chap-can-complete-lab-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz
en
0.900197
1,151
2.59375
3
Unlike with alcohol or nicotine, there is not a pharmacological option available to individuals addicted to cocaine to help them stop using the drug. However, researchers at the University of Alabama at Birmingham believe the tool to help individuals treat their addiction may very well exist. Researchers in the School ...
<urn:uuid:421401f5-590d-4380-879e-58dac6ec4a40>
CC-MAIN-2022-40
https://debuglies.com/2018/07/01/psilocybin-can-help-curb-cocaine-addiction/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz
en
0.933972
702
2.859375
3
The emergence of autism in children has not only been linked to genes encoding synaptic proteins—among others—but also environmental insults such as zinc deficiency. Although it is unclear whether zinc deficiency contributes to autism, scientists have now defined in detail a possible mechanistic link. Their research sh...
<urn:uuid:87bb0d2e-428e-4c1a-aca9-3a264a8470cf>
CC-MAIN-2022-40
https://debuglies.com/2018/11/09/the-emergence-of-autism-in-children-has-not-only-been-linked-to-genes-encoding-synaptic-proteins-but-also-environmental-insults-such-as-zinc-deficiency/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz
en
0.898334
767
3.609375
4
Welcome back to our third instalment on authentication in the Security 101 series. If you haven’t already, you can read part one that introduces authentication and part two which discusses authentication protocols and methods. In part three, we’re going to discuss protecting authentication. Authentication is critical, ...
<urn:uuid:e6a54ea6-fa13-4f2f-be77-5d407bb98b3d>
CC-MAIN-2022-40
https://techtalk.gfi.com/security-101-authentication-part-3-protecting-authentication/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00022.warc.gz
en
0.928634
1,171
3.125
3
More about Digital Transformation - Cloud Computing Deployment Models and Architectures - Cloud Adoption Strategy: What’s the Best Approach for Your Organization? - 8 Digital Transformation Technologies and Their Business Impact - What Is Digital Transformation in Banking? - Digital Transformation in Healthcare: 4 Key ...
<urn:uuid:206f686c-4965-4ba7-b994-9e77752a3475>
CC-MAIN-2022-40
https://cloud.netapp.com/blog/cvo-blg-5-types-of-digital-transformation-and-the-tech-that-powers-them
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00022.warc.gz
en
0.893339
3,550
2.6875
3
Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A Blockchain functions as a decentralised database that is managed by computers belonging to a peer-to-peer (P2P) network. Industry experts share with Intelligent CIO Africa how enterprises are adopting...
<urn:uuid:7b9a93db-07ef-47bf-8ca1-3ff1c9db8433>
CC-MAIN-2022-40
https://www.intelligentcio.com/africa/2020/11/05/blockchain-is-propelling-finance-trade-and-government-initiatives-in-africa/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00022.warc.gz
en
0.94635
1,992
2.828125
3
A Binary Lookup algorithm is much like the Secure Lookup algorithm but is used when entire files are stored in a specific column. This algorithm replaces objects that appear in object columns. For example, if a bank has an object column that stores images of checks, you can use a Binary Lookup algorithm to mask those i...
<urn:uuid:d1bb8477-e2ff-4277-a2c6-65743f76c883>
CC-MAIN-2022-40
https://maskingdocs.delphix.com/Securing_Sensitive_Data/Algorithms/Algorithm_Frameworks/Binary_Lookup/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00222.warc.gz
en
0.807504
254
3.203125
3
Ransomware is an ever-evolving form of malware that employs encryption to hold a victim’s information at ransom. It is one of the biggest cyber security issues today, facing individuals and businesses alike. Victims often only realize that they’ve been compromised when files, servers, and other systems have been encryp...
<urn:uuid:e651d2ab-dded-4c85-943f-58c7817d8b98>
CC-MAIN-2022-40
https://mind-core.com/blogs/cybersecurity/how-to-prevent-ransomware-attacks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00222.warc.gz
en
0.929747
819
2.78125
3
Enabling Technology is a tool of independence for this young woman Celeste was unsure what she wanted to do as far as working, but one thing was for sure –– she wanted to be around people and help them. After an overwhelming job-hunting day at the mall, Celeste and her Emory Valley Center Job Developer went to McDonald...
<urn:uuid:b99ff696-99d7-496b-b212-f77bfffa13ab>
CC-MAIN-2022-40
https://maximus.com/article/enabling-technology-tool-independence-young-woman
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00222.warc.gz
en
0.971389
482
2.5625
3
Storage - Managing z/OS Data Using DFSMS Constructs 2.4 This course introduces you to the family of DFSMS products that are used to manage z/OS data and then focuses on the creation and implementation of data, storage and management classes, as well as storage groups, to automate processes in the storage environment. T...
<urn:uuid:7d9a441d-355b-451d-bed6-76b68e94fd05>
CC-MAIN-2022-40
https://bmc.interskill.com/course-catalog/Storage24-Managing-zOS-Data-Using-DFSMS-Constructs.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00222.warc.gz
en
0.772397
346
2.6875
3
Save to My DOJO Anyone who has ever had to replace a hard disk because their old disk was simply too small to accommodate all of their data understands that there is a direct cost associated with data storage. In an effort to reduce storage costs, many organizations turn to data reduction technologies such as deduplica...
<urn:uuid:8eda38a6-c0ed-49c0-baea-7fa5182665f0>
CC-MAIN-2022-40
https://www.altaro.com/backup-dr/backup-deduplication-compression/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00222.warc.gz
en
0.936917
2,257
3.359375
3
A study by the Electric Power Research Institute focusing on distributing power to 24 utilities throughout the U.S., tells us that 85% of power disturbances happen because of voltage dips or swells, harmonics, wiring, and grounding problems. It postulates that these mishaps cause a financial loss of more than $156 bill...
<urn:uuid:1ff25938-553c-4f2b-b331-f19ddaefe096>
CC-MAIN-2022-40
https://www.akcp.com/blog/next-generation-of-data-center-power-monitoring/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00222.warc.gz
en
0.918997
1,878
3.203125
3
Are you taking time to care for your teeth? It’s one of the most important preventative measures you can take for your oral health and overall health. Suppose you don’t properly care for your teeth and gums. In that case, it can lead to many issues, including infections of the mouth, facial pain, gum disease, and more ...
<urn:uuid:e7c4d9e7-b213-479c-8571-a45daafb0c71>
CC-MAIN-2022-40
https://www.contactcenterworld.com/blog/mytechblog/?id=de2cb2d2-69ea-4a0b-92f3-795581dd2ff2
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00222.warc.gz
en
0.94013
850
3.078125
3
Previously we have had a look on the ways wireless networks can be installed and configured. We are aware of the fact that how difficult it is to maintain and run a wireless network. The popularity of wireless networks has led to the emergence of more technical and large networks. Many of the people, all over the world...
<urn:uuid:4873e7cf-a6cc-4d71-8cd3-cf97886cce27>
CC-MAIN-2022-40
https://www.examcollection.com/certification-training/network-plus-how-to-troubleshoot-common-wireless-problems.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00222.warc.gz
en
0.964215
2,390
2.8125
3
Women began dropping out of ICT roles in 1984, the same year personal computers were on the rise, according to Lynwen Connick, First Assistant Secretary – Cyber Policy and Intelligence Division, the Department of the Prime Minister and Cabinet. Speaking as the keynote at the packed out Females in IT and Telecommunicati...
<urn:uuid:4a752764-b139-42eb-a50e-3c6cbcb8e5e4>
CC-MAIN-2022-40
https://www.cio.com/article/201879/1984-was-the-year-everything-changed-for-women-in-it-lynwen-connick.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00222.warc.gz
en
0.979832
1,192
2.625
3
Biometrics used to protect livestock A new livestock application of biometrics promises a way to protect sheep from big bad wolves. Swiss biologists have developed a biometric sheep collar that registers changes in the heart rate of sheep to indicate wolf attacks. The device will be ultimately be designed to alerts she...
<urn:uuid:6e237f15-c7e1-466e-bb1e-1483c46c210c>
CC-MAIN-2022-40
https://www.biometricupdate.com/201208/biometrics-used-to-protect-livestock
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00222.warc.gz
en
0.918178
312
3.015625
3
Intrinsic functions are subprograms that are built into the ACUCOBOL-GT library. They save time by simplifying common tasks that your COBOL programs might need to perform. For example, intrinsic functions can perform statistical calculations, convert strings from upper to lower case, compute annuities, derive values fo...
<urn:uuid:c13b00e5-6b0b-4a37-a39c-b518b1222b2e>
CC-MAIN-2022-40
https://www.microfocus.com/documentation/extend-acucobol/1031/extend-Interoperability-Suite/BKPPPPINTRS001.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00222.warc.gz
en
0.877952
517
3.390625
3
Encryption Does Not Equal Integrity Intercepted e-mail can become he-said-she-said without you knowing it. - By Roberta Bragg Sometimes I wonder what my purpose in life is. I used to think it was helping people and organizations improve their information security posture. In effect, help them stand up straight, do the ...
<urn:uuid:b71d0ac5-bad7-4324-bc50-0d3ae4454f9d>
CC-MAIN-2022-40
https://mcpmag.com/articles/2004/10/18/encryption-does-not-equal-integrity.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00222.warc.gz
en
0.937068
1,000
2.75
3
CCL's Principal Analyst Alex Caithness asks the question: After SQLite, what comes next? A must-read primer on LevelDB - tomorrow's ubiquitous format? SQLite has become a ubiquitous data storage format for digital forensic practitioners to consider. First popularised by smart phone platforms it now forms part of almost...
<urn:uuid:f842d572-fa14-44cc-8b52-3628d040b45d>
CC-MAIN-2022-40
https://www.cclsolutionsgroup.com/post/hang-on-thats-not-sqlite-chrome-electron-and-leveldb
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00222.warc.gz
en
0.925921
3,826
2.625
3
Written By Pravin Mehta Updated on July 22, 2022 Min Reading 3 Min The Gramm-Leach-Bliley Act (GLBA) is a United States federal law that regulates the companies designated as “financial institutions” on how they handle their customer’s nonpublic personal information or NPI. GLBA mandates financial institutions to ensur...
<urn:uuid:fc122b4b-0d80-4fee-ad68-20dee6da3e02>
CC-MAIN-2022-40
https://www.bitraser.com/article/the-basics-of-gramm-leach-bliley-act-worth-knowing.php
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00422.warc.gz
en
0.914108
1,630
2.875
3
Global warming may hit the eastern United States harder than scientists thought, resulting in extremely hot summers. Average summer high temperatures could reach almost 10 degrees higher in 2080 than they do today. Eastern U.S. summer daily highs currently average in the low to mid-80s Fahrenheit. They will likely soar...
<urn:uuid:a559c5f5-f49a-4b52-a913-e996fd649aae>
CC-MAIN-2022-40
https://www.linuxinsider.com/story/eastern-u-s-summer-temps-could-reach-blazing-new-highs-by-2080-57348.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00422.warc.gz
en
0.956999
925
3.421875
3
As artificial intelligence (AI) programs become more powerful and more common, organizations that use them are feeling pressure to implement ethical practices in the development of AI software. The question is whether ethical AI will become a real priority, or whether organizations will come to view these important pra...
<urn:uuid:3df0ca7a-3c74-46c3-ba27-13d3bce7d928>
CC-MAIN-2022-40
https://www.helpnetsecurity.com/2021/10/26/ethics-in-ai/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00422.warc.gz
en
0.951076
1,234
2.859375
3
Librarians like our acronyms, but we’re not the only profession to indulge in linguistic gymnastics. The technology field is awash in acronyms: HTTP, AWS, UI, LAN, I/O, etc. etc. etc. One acronym you might know from working in libraries, though, is OSS – Open Source Software. Library technology is no stranger to OSS. T...
<urn:uuid:d7aa0f2b-3ae7-4f70-8c54-80b86c3c8727>
CC-MAIN-2022-40
https://ldhconsultingservices.com/2021/10/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00422.warc.gz
en
0.93932
1,030
2.875
3
Jeeva has just dropped the world’s lowest power wireless chip, Parsair, a breakthrough in IoT innovation. Jeeva has announced the world’s lowest power wireless chip for streaming real-time sensor data. Jeeva’s Parsair™ chip consumes 100 times less power than typical Bluetooth and enables many novel use cases previously...
<urn:uuid:e8d9346c-54b3-45e9-a627-b93a4524da3b>
CC-MAIN-2022-40
https://tbtech.co/innovativetech/iot/jeeva-reveals-worlds-lowest-power-wireless-chip/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00422.warc.gz
en
0.921345
735
2.5625
3
While the term may be relatively obscure, we benefit from machine learning everyday. Watch a few British crime dramas and suddenly your Netflix queue is populated with a stream of related movies and TV shows. These highly curated suggestions are based on the viewing patterns of thousands of similar customers. With each...
<urn:uuid:74173b46-402c-4f54-96e3-d7e216e2f1b7>
CC-MAIN-2022-40
https://www.bluefin.com/bluefin-news/can-machine-learning-fight-fraud/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00422.warc.gz
en
0.942668
1,639
3.328125
3
SNMP is one of the most widely used communication protocols for remote monitoring systems. That's because it allows the real-time exchange of information between network devices - and it also allows notifications of events to be sent to technicians. If you are already familiar with SNMP, you probably know that every ve...
<urn:uuid:49685ba9-9a7e-4c0f-888e-840bd6723fef>
CC-MAIN-2022-40
https://www.dpstele.com/blog/what-is-a-snmp-getbulk-request.php
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00422.warc.gz
en
0.927559
1,827
2.609375
3
Wireless, WiFi, and Bluetooth are all common terms people use, but they do not always understand the nuances between what they do and how they work. Wireless and WiFi are used synonymously and are the same thing: WiFi is short for wireless fidelity, which is often shortened to wireless, both of which mean a wireless ne...
<urn:uuid:6e90baea-4732-4f3e-9dbc-26ea89134523>
CC-MAIN-2022-40
https://blogs.eyonic.com/the-difference-between-wireless-and-bluetooth-and-when-to-use-each/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00422.warc.gz
en
0.957712
949
2.875
3
The Department of Veterans Affairs' innovation chief is eyeing novel uses of new technology in the pursuit of continuing to improve veteran care, and one area he sees growing is in point-of-care manufacturing. "One of the market dynamics that's shifting predominantly in health care is that concept of point-of-care manu...
<urn:uuid:e416e582-f5d5-48c4-bbd6-17982276add1>
CC-MAIN-2022-40
https://governmentciomedia.com/emerging-uses-3d-printing-manufacturing-are-transforming-veteran-care
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00622.warc.gz
en
0.954363
983
2.59375
3
Like human hygiene, organizations must maintain regular cyber hygiene for healthy outcomes, but it’s critical they don’t neglect the tools and processes that mitigate cyber risk — the most serious threats to our security — says Bryan Ware in a piece for Network World. Typically, the discussion around the need for risk ...
<urn:uuid:2a9148e1-fd73-4d88-a880-32592adb3712>
CC-MAIN-2022-40
https://haystax.com/network-world-cyber-hygiene-isnt-enough-says-haystax-technology-ceo-bryan-ware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00622.warc.gz
en
0.956072
202
2.546875
3
In recent years, deep learning has revolutionized computer vision. And thanks to transfer learning and amazing learning resources, anyone can start getting state of the art results within days and even hours, by using a pre-trained model and adapting it to your domain. As deep learning is becoming commoditized, what is...
<urn:uuid:ff356c72-8a4d-4e13-a844-cb38c79de091>
CC-MAIN-2022-40
https://resources.experfy.com/ai-ml/deep-learning-vision-for-non-vision-tasks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00622.warc.gz
en
0.936132
1,839
2.78125
3
What is Code Injection?GRIDINSOFT TEAM Code injection (a.k.a. remote code execution) is an attack based on the input of improper data into a program. If hackers manage to exploit program vulnerabilities, they may succeed in injecting malicious code through the input line or uploaded file with the subsequent execution o...
<urn:uuid:03f071ef-57de-4a30-ba72-fba9774753ea>
CC-MAIN-2022-40
https://gridinsoft.com/code-injection
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00622.warc.gz
en
0.899021
1,586
3.8125
4
Internet Control Message Protocol (ICMP) is a network layer protocol from OSI model which provides troubleshooting, control and error message services. It is commonly used by network administrators to troubleshoot Internet connections in diagnostic utilities including ping and traceroute. ICMP for Internet Protocol ver...
<urn:uuid:14393828-8e18-431a-840a-d5c281f3f6ad>
CC-MAIN-2022-40
https://ipwithease.com/internet-control-message-protocol-icmp/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00622.warc.gz
en
0.887448
533
3.734375
4
What Are Route Pattern Wildcards? It is estimated that there are more than 10 billion possible phone numbers in the United States. When configuring routes in CUCM, it would simply be untenable to list every possible number required in a route table. In this post, we will discuss how to create generalized route patterns...
<urn:uuid:74244d0d-0b30-4b6f-ac40-88f004d629f0>
CC-MAIN-2022-40
https://www.cbtnuggets.com/blog/technology/networking/what-are-route-pattern-wildcards
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00622.warc.gz
en
0.926788
1,633
3.09375
3
Facebook has a new US patent which will allow it to control personal Internet of Things (IoT) devices. With the Internet of Things now starting to become established in the home, this could represent a big addition to Facebook’s range of activities – and a change in direction. The social network is currently focussed o...
<urn:uuid:d1ba7f1c-bd98-4709-b9c8-c4dfd0bf6dbf>
CC-MAIN-2022-40
https://internetofbusiness.com/facebook-wants-talk-iot-home-tech/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00622.warc.gz
en
0.959341
536
2.546875
3
The question still remains as to how end-users can protect themselves from hackers. End-users deal with confidential data. Consider the following confidential data we use on a daily basis: - Personal email and password - Corporate email and password - Facebook login ID and password - Linked login ID and password - Inte...
<urn:uuid:e92c3c73-b2ec-48ab-ae04-bddfcadda281>
CC-MAIN-2022-40
https://www.faronics.com/news/blog/biometrics-the-final-frontier-in-endpoint-security
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00622.warc.gz
en
0.885839
312
2.9375
3
What is svchost.exe? Is it a virus? A svchost.exe or Service Host file is a legitimate system process in the Windows operating system. However, users tend to confuse it with a virus because hackers can disguise malicious activities as integral system parts. Official svchost.exe has a designated location and represents ...
<urn:uuid:55ae2d78-1d88-4eeb-9a91-4df28a0e7d16>
CC-MAIN-2022-40
https://atlasvpn.com/blog/what-is-svchost-exe-is-it-a-virus
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00622.warc.gz
en
0.919416
1,339
2.515625
3
New Technology is Reducing Trauma for Child-abuse Investigators Fill out form to get the Insights Investigating crimes against children often comes at a heavy psychological price. However, new technology is able to reduce the trauma law enforcement faces when investigating these cases. This article discusses how: - Art...
<urn:uuid:ca31867c-180a-46ce-976b-94f288a870a1>
CC-MAIN-2022-40
https://cellebrite.com/en/new-technology-is-reducing-trauma-for-child-abuse-investigators/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00622.warc.gz
en
0.903046
115
2.734375
3
This article describes how Infrastructure-as-a-Service helps businesses quickly get the computing capacities they need, reducing capital expenditures on IT equipment, frees the IT department from routine tasks, and simplifying scaling. What is IaaS Infrastructure-as-a-Service (IaaS) is providing computing resources for...
<urn:uuid:14d0bb7c-3a62-47d1-ac2a-05b1adb971c2>
CC-MAIN-2022-40
https://www.cloud4u.com/blog/infrastructure-as-a-service-explained/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00622.warc.gz
en
0.937174
749
2.5625
3
"Fair is foul, and foul is fair... Oftentimes, to win us our harm, the instruments of darkness tell us truths, win us with honest trifles, to betrays in deepest consequence" Macbeth, Act 1 Is Fairness the new oil? I think that "new oil" phrase is dumb, but there is a lot of activity in Fairness in AI lately. It is, how...
<urn:uuid:9d10c1b3-4952-4c29-bbe9-6267bc9ddb26>
CC-MAIN-2022-40
https://diginomica.com/fairness-ai-practical-possibility-new-angle-designing-ethical-systems
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00022.warc.gz
en
0.94508
1,667
2.578125
3
Most Commented Posts Every day, technology advances. Every year, new innovations are introduced to make living easier. We live in a 21st-century world that values innovation and creativity. In today’s world, a semiconductor test system is also essential. Testing equipment is used by the tech industry to ensure that its...
<urn:uuid:73e8b590-983d-4323-bf57-e79f4eb2089e>
CC-MAIN-2022-40
https://ihowtoarticle.com/semiconductor-test-systems-benefits-and-drawbacks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00022.warc.gz
en
0.920645
670
2.953125
3
The latest IP cameras have much better video quality than the early analog CCTV cameras. Even though they both capture video, IP cameras do it dramatically better. The reason; they contain high performance digital processing computers. The computers provide reduced noise, improved wide dynamic range, reduced smearing, ...
<urn:uuid:ad21102c-e3eb-4d8a-854e-7b680fccf5a1>
CC-MAIN-2022-40
https://kintronics.com/how-digital-processing-in-the-ip-camera-improves-video-quality/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00022.warc.gz
en
0.912758
1,024
2.84375
3
How the Internet of Things Impacts Businesses and What to Do With It The Internet of Things (IoT) is the ever-growing collection of devices — ranging from smartphones to sensor-equipped manufacturing robots — that are interconnected via the internet. Thanks to this interconnection, they can send and receive data — a ca...
<urn:uuid:5dcc1294-a93c-4fb7-9fe2-6eff4257addd>
CC-MAIN-2022-40
https://consoltech.com/blog/iot-in-business/amp/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00022.warc.gz
en
0.947239
1,528
2.84375
3
One of the main concerns of the organizers of the Olympic Games to be held in Athens this summer is security, but not only physical security, computer security as well. The emphasis placed on avoiding problems with the computers that will manage huge amounts of data during the games will be proportional to the magnitud...
<urn:uuid:d17bd523-c030-4cdd-a579-6cb5781f4793>
CC-MAIN-2022-40
https://it-observer.com/how-much-should-you-invest-it-security.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00022.warc.gz
en
0.964854
759
2.578125
3
The bring-your-own-device (BYOD) movement, a recent trend that has been redefining the corporate world, offers some intriguing possibilities for implementation in schools. It can also introduce a new set of challenges for educators, from security concerns to classroom control policies. Using school-funded computing dev...
<urn:uuid:4eb96a9b-7f33-49bc-ac3d-50ce3ef796e8>
CC-MAIN-2022-40
https://www.faronics.com/news/blog/classroom-management-strategies-for-byod
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00223.warc.gz
en
0.95976
506
3.15625
3
Many connected device makers have yet to prioritize security and that makes everyone more vulnerable. Jason Haddix is the head of trust and security at Bugcrowd. Today, internet of things devices outnumber humans. Internet-enabled children’s toys, household appliances, automobiles, industrial control systems and medica...
<urn:uuid:17295026-1e3a-4804-9b11-a05daac47749>
CC-MAIN-2022-40
https://www.nextgov.com/ideas/2017/04/hackers-pov-internet-things-security/137292/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00223.warc.gz
en
0.953493
956
2.546875
3
Viruses are malware that can infect your computer and cause havoc, and make you lose more than just sleep. You can potentially lose your data and your identity if a hacker can get through your computer’s defences via a virus. What Is An Antivirus Program An Antivirus program is designed specifically to prevent any viru...
<urn:uuid:1d03fda2-93e9-4b63-bf1b-a1bd5014f25f>
CC-MAIN-2022-40
https://bluegadgettooth.com/online-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00223.warc.gz
en
0.944761
2,413
3.28125
3
There are many types of phishing attack nowadays, to the extent it can be tricky to keep up with them all. We have unique names for mobile attacks, postal attacks, threats sent via SMS and many more besides. However, we often see folks mix up their spears and their whales, and even occasionally confuse them with regula...
<urn:uuid:cb928e29-09eb-4ae9-b75c-b2ac93abbc80>
CC-MAIN-2022-40
https://www.malwarebytes.com/blog/news/2021/12/spear-phish-whale-phish-regular-phish-whats-the-difference
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00223.warc.gz
en
0.961612
674
2.90625
3
The ‘Internet of Things’, a term coined by Kevin Ashton in the year 1999, began gaining momentum over the last decade given to the recent advancements attributed by the human mind’s inquisitive nature and the need to widen the scope of technology beyond the confines of industrial use cases. A report claims that by the ...
<urn:uuid:582d2754-a5dd-4dd1-b017-7931fdf12b8f>
CC-MAIN-2022-40
https://disruptive.asia/cellular-iot-transforming-smart-home-segment/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334644.42/warc/CC-MAIN-20220926020051-20220926050051-00423.warc.gz
en
0.930587
1,473
2.59375
3
Encryption protects end-user privacy, and its adoption is increasing rapidly. Unfortunately, one side-effect of the increased use of encryption is the erosion of visibility for network defenders. Encrypted Traffic Analysis is a way to restore network visibility for defenders while maintaining privacy for users. To unde...
<urn:uuid:95707378-e357-41ec-87f9-2f2a2b6f43a4>
CC-MAIN-2022-40
https://www.liveaction.com/encrypted-traffic-analysis/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00423.warc.gz
en
0.866231
1,366
2.78125
3
There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even government intelligence organizations can’t keep their hacking tools secret despite having some of the strongest protections and strictest policies...
<urn:uuid:5013b33a-bee2-4aa9-ae38-1f8bb876aed7>
CC-MAIN-2022-40
https://www.helpnetsecurity.com/2017/05/03/cyber-security-human-condition/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00423.warc.gz
en
0.936184
1,129
2.953125
3
Email was one of the earliest forms of communication on the internet, and if you’re reading this you almost undoubtedly have at least one email address. Critics today decry the eventual fall of email, but for now it’s still one of the most universal means of communicating with other people that we have. One of the bigg...
<urn:uuid:cf429bc9-63b2-43bc-b4e6-3310dcc7f998>
CC-MAIN-2022-40
https://www.comparitech.com/blog/vpn-privacy/how-to-encrypt-email/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00423.warc.gz
en
0.915512
4,019
3.53125
4
New path-breaking digital technologies are being introduced into our daily lives with amazing speed. Some of these make it increasingly difficult to differentiate between real and fake media. Among more recent development adding to the problem is the emergence of deepfakes. What is Deepfake Technology? Deepfakes are hy...
<urn:uuid:a382e100-5bc8-4e7e-9e7b-dc44acceb156>
CC-MAIN-2022-40
https://www.baselinemag.com/uncategorized/what-are-deepfakes-major-opportunities-and-threats/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00423.warc.gz
en
0.936422
1,208
3.203125
3
The radical increase in mobile users has entailed the improvement of the mobile app industry. Mobile application development agencies help businesses in planning and designing exclusive and robust mobile apps that can fulfill the requirements of clients. People are depending more on mobile apps for performing daily job...
<urn:uuid:3685b6c2-129d-490b-83e5-ffa7d03e4b12>
CC-MAIN-2022-40
https://www.crayondata.com/role-big-data-mobile-app-development/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00423.warc.gz
en
0.91417
2,102
2.5625
3
Types of Optical Fiber Dispersion and Compensation Strategies What Is Optical Fiber Dispersion? Optical fiber dispersion describes the process of how an input signal broadens/spreads out as it propagates/travels down the fiber. Normally, dispersion in fiber optic cable includes modal dispersion, chromatic dispersion an...
<urn:uuid:c9c4cc1c-9027-4fce-bc27-5c8b950c5378>
CC-MAIN-2022-40
https://community.fs.com/blog/types-of-optical-fiber-dispersion-and-compensation-strategies.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00623.warc.gz
en
0.91193
1,463
3.4375
3
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think the content is helpful for people you know, share it with them! For us adults, it's hard to stay safe online and not to...
<urn:uuid:61c7d6c4-c43e-4e4a-9892-24d261917c59>
CC-MAIN-2022-40
https://johnopdenakker.com/help-your-children-stay-safe-online/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00623.warc.gz
en
0.96172
989
3.015625
3
In order to increase the transmission distance of optical signals, many technologies, like the TDM (time division multiplexing) and WDM (wavelength division multiplexing), have been used. Except for that, several optical components like single mode fiber optic cables, optical amplifiers and dispersion compensating modu...
<urn:uuid:96ff2e73-0a98-4fda-8001-320cde3d6bbc>
CC-MAIN-2022-40
https://www.fiber-optic-components.com/tag/dwdm
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00623.warc.gz
en
0.912712
850
3.53125
4
“History is a cyclic poem written by Time upon the memories of Human Being.”- Shelley, English Poet. History is the study of the past; specifically the people, societies, events, and problems of the past as well as our attempts to understand the past. It is a pursuit common to all human communities. History can take th...
<urn:uuid:3410eec1-0604-4a09-ac4b-a4e23179413a>
CC-MAIN-2022-40
https://areflect.com/2020/08/18/today-in-history-august-18/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00623.warc.gz
en
0.966701
534
3.859375
4
What Is MITRE ATT&CK? MITRE ATT&CK refers to a group of tactics organized in a matrix, outlining various techniques that threat hunters, defenders, and red teamers use to assess the risk to an organization and classify attacks. Threat hunters identify, assess, and address threats, and red teamers act like threat actors...
<urn:uuid:117acea3-77ab-409e-804d-03c3d78a6294>
CC-MAIN-2022-40
https://www.fortinet.com/tw/resources/cyberglossary/mitre-attck
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00623.warc.gz
en
0.938133
2,248
2.78125
3
What is FISMA (Federal Information Security Management Act)? The Federal Information Security Management Act (FISMA) is a United States federal law enacted as Title III of the E-Government Act of 2002. It requires federal agencies to implement information security programs to ensure their information and IT systems' co...
<urn:uuid:3dea65c8-b7e8-48bc-ab95-da72c62269c8>
CC-MAIN-2022-40
https://www.itgovernanceusa.com/fisma
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00023.warc.gz
en
0.922102
966
2.875
3
Some of the most talented and dangerous cyber warriors and criminals come from Russia, a long-time meddler in other nations' digital systems. Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military personnel probi...
<urn:uuid:980f8009-f6a6-4b46-8b34-5d4a7aa757ea>
CC-MAIN-2022-40
https://gcn.com/cybersecurity/2017/08/tracing-the-sources-of-todays-russian-cyber-threat/312871/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00023.warc.gz
en
0.947529
1,696
2.546875
3
If you're one of those who knows a bit of networking but you feel uncomfortable touching AWS networking resources, then this article is for you. We're going to go through real AWS configuration and you can follow along to solidify your understanding. I'm going through the process of what I personally do to create 2 sim...
<urn:uuid:7c1cd634-d47f-49e7-b180-43d5d9ccefc0>
CC-MAIN-2022-40
https://community.f5.com/t5/technical-articles/an-illustrated-hands-on-intro-to-aws-vpc-networking/ta-p/281114
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00023.warc.gz
en
0.907704
3,209
2.78125
3
Directory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. It is dangerous to leave this function turned on for the web server because it leads to information disclosure. For example, when a user requests www.acunetix.com without specifyi...
<urn:uuid:94e66e15-a3d0-499f-bd44-c5331b6ddc86>
CC-MAIN-2022-40
https://www.acunetix.com/blog/articles/directory-listing-information-disclosure/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00023.warc.gz
en
0.906803
736
3.03125
3
Arizona State University, like many colleges across the United States, has a problem with students who enter their freshman year ill prepared in math. Though the school offers remedial classes, one-third of students earn less than a C, a key predictor that they will leave before getting a degree. To improve the dismal ...
<urn:uuid:86208ac2-1137-4d01-b7ae-6d7e6484c974>
CC-MAIN-2022-40
https://www.crayondata.com/how-big-data-will-haunt-you-forever-your-high-school-transcript/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00023.warc.gz
en
0.972681
337
3.125
3
Do you find it difficult to help your kids achieving a balance between technology and life? If yes, read further to discover a few digital parenting guidelines and you can also use parental control apps to keep an eye on your child’s online activities. We’ve put together these 8 Parenting Tips as part of our digital te...
<urn:uuid:de31b9b7-32f8-46c4-b645-043c484df22a>
CC-MAIN-2022-40
https://blog.bit-guardian.com/digital-technology-guidelines-for-parents/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00023.warc.gz
en
0.951333
1,350
3.03125
3
Appropriate Data Types - Choosing appropriate data types is a key factor during data modeling. It provides a good compression and avoids unnecessary type conversions or expression indexes. - Keep formats short, do not use VARCHAR(2000000) or DECIMAL(32,X) if a smaller range is sufficient. Prefer exact data types. - Pre...
<urn:uuid:df39e14a-1988-4701-ab93-11e0ff575dcb>
CC-MAIN-2022-40
https://docs.exasol.com/db/7.0/performance/best_practices.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00223.warc.gz
en
0.846134
2,808
2.53125
3
What about this course? OpenFlow is the technology that started the SDN movement, the two terms were often used interchangeably in the early days. Despite being an important component in any SDN discussion, OpenFlow remains to be one of the mysterious topics in traditional network engineer's tool belt. The course will ...
<urn:uuid:0c0cdeee-7758-43c2-8ed0-a02043a3f91d>
CC-MAIN-2022-40
https://ine.com/learning/courses/learn-sdn-with-open-flow-and-ryu-controller
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00223.warc.gz
en
0.87304
370
2.546875
3
Do you know what makes a successful entrepreneur? According to Harvard Business School academics it's a combination of skill, luck and good timing. What makes some entrepreneurs successful and others unsuccessful? It’s a combination of skill, luck and good timing, according to Harvard Business School academics. In thei...
<urn:uuid:0e209e61-8239-4608-8598-76149dae7729>
CC-MAIN-2022-40
https://www.hiscox.com/blog/do-you-know-what-makes-successful-entrepreneur
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00223.warc.gz
en
0.959324
839
2.5625
3
Shared secrets are a piece of data that is known to two or more parties. They are most commonly recognized in the form of passwords, which are known to both service provider and end user. Shared secrets cam be plaintext or another piece of data so long as they are known to the two or more distinct parties. Commonly use...
<urn:uuid:d053a422-54be-472e-9bb0-26e07bcd707d>
CC-MAIN-2022-40
https://www.hypr.com/security-encyclopedia/shared-secrets
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00223.warc.gz
en
0.947874
191
3.265625
3
What is FIDO Authentication? FIDO, which stands for Fast IDentity Online, is a set of authentication standards aimed at strengthening the user login process to online services. The standards are developed by the FIDO Alliance and promote faster, more secure authentication processes with the overall goal of eliminating ...
<urn:uuid:799a2dda-2a68-467e-b729-996c2f52ebd5>
CC-MAIN-2022-40
https://de.microcosm.com/blog/what-is-fido-authentication
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00223.warc.gz
en
0.925933
907
2.859375
3
As multi-factor authentication (MFA) becomes a mandatory security practice, especially for almost all cyber insurance policies, cyber criminals are seeking new ways to break through these walls to steal your data. Multi-factor authentication (MFA) is the authentication method that requires the user to provide two or mo...
<urn:uuid:088c6462-a058-41cb-b549-ae26fb3411c2>
CC-MAIN-2022-40
https://eclypses.com/news/hackers-are-bypassing-multi-factor-authentication-mfa-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00223.warc.gz
en
0.946604
893
2.71875
3
In this lesson we’ll take a look at different protocols for gateway redundancy. So what is gateway redundancy and why do we need it? Let’s start with an example! The network in the picture above is fairly simple. I have one computer connected to a switch. In the middle you’ll find two multilayer switches (SW1 and SW2) ...
<urn:uuid:642446b1-162b-49af-bfe9-97fcfc2746d1>
CC-MAIN-2022-40
https://networklessons.com/cisco/ccie-routing-switching-written/introduction-gateway-redundancy
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00223.warc.gz
en
0.904473
350
3.8125
4
Information technology attacks that penetrate or shut down company networks are now part of everyday news. Companies from large enterprises to small businesses fall victim to security breaches due to improper implementation of security control – this leads to loss of customer trust, market reputation, and of course, lo...
<urn:uuid:29cb0f9b-8b52-4fb8-9c7c-d986381a5ab9>
CC-MAIN-2022-40
https://www.getastra.com/blog/security-audit/gray-box-penetration-testing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00223.warc.gz
en
0.919793
2,365
2.65625
3
Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks (SAN). TP operates by allocating disk storage space in a flexible manner among multiple users, based on the minimum space required by each user at any given time. In computing, thin provis...
<urn:uuid:adc4685f-9012-4799-a929-2a3cf89ef1d6>
CC-MAIN-2022-40
https://www.arxys.com/thin-provisioning-using-virtualization/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00223.warc.gz
en
0.890469
1,034
3.53125
4
You may have seen an excellent program in many of our schools called Character Counts. It’s a wonderful school program that encourages positive behavior in addition to academics. One of the core paradigms of the program is that teaching a child to be a good person is just as important as getting good grades and getting...
<urn:uuid:541927f6-6edf-4681-a226-89e6f9b30a2a>
CC-MAIN-2022-40
https://ddsecurity.com/2014/08/13/character-counts/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00223.warc.gz
en
0.916939
527
2.71875
3
Zero trust is gaining momentum. Understanding what zero trust is, and how to improve it, is imperative to cybersecurity. The zero-trust model was created by John Kindervag in 2010, when he was a principal analyst at Forrester Research Inc. The zero-trust architecture is a powerful, holistic security strategy that is he...
<urn:uuid:9edf1cab-7226-41c4-8170-666dde810a8c>
CC-MAIN-2022-40
https://www.f5.com/fr_fr/services/resources/glossary/zero-trust
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00223.warc.gz
en
0.920918
792
2.578125
3
Cybercrime is not new; everyone is well aware of such an offense. There are several ways through which the attack could be made. The most common among them is social engineering. Do you know that 98% of cyberattacks involve social engineering? Wooh! It’s a huge rate, but Why do cyber attackers commonly use social engin...
<urn:uuid:791955a3-6553-49bd-8506-21fdfcd19c1f>
CC-MAIN-2022-40
https://nextdoorsec.com/why-do-cyber-attackers-commonly-use-social-engineering-attacks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00423.warc.gz
en
0.946644
992
2.890625
3
The financial sector is one of the most essential industries that touch the lives of each and every individual and organization across the globe. As we step into a more connected world, it becomes ever more important to secure the financial ecosystem through robust cyber defenses. The financial sector is one of the pri...
<urn:uuid:bb96a593-3b29-44fa-b746-330694abfeca>
CC-MAIN-2022-40
https://cyware.com/educational-guides/cyber-fusion-and-threat-response/why-are-financial-institutions-adopting-cyber-fusion-strategies-57b5/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00423.warc.gz
en
0.933125
2,472
2.625
3
There are few certainties in life: Death, taxes, and turning your computer off and on when there’s a problem. This advice is usually the first tip you get from friends, family, and tech support. Rebooting your computer helps keep it running smoothly. It clears the memory, stopping any tasks that are eating up RAM. Even...
<urn:uuid:9ef2d402-cad3-40fe-8360-ce9263a623a4>
CC-MAIN-2022-40
https://www.komando.com/kims-column/when-to-restart-your-computer/777237/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00423.warc.gz
en
0.904787
1,224
2.8125
3
Advanced Analytics uses sophisticated tools for granular data analysis to enable forecasts and predictions from data. Quick Takeaway: Advanced analytics is a very effective form of data analysis because it allows you to dig deeper into data to predict the future of your business. Analytics is a process that involves id...
<urn:uuid:48d13c52-0c92-49e1-a6d7-70d60e30cff2>
CC-MAIN-2022-40
https://phrazor.ai/resources/glossary
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00423.warc.gz
en
0.885806
1,760
2.875
3
This week, at the International Electron Devices Meeting (IEDM) and the Conference on Neural Information Processing Systems (NeurIPS), IBM researchers will showcase new hardware that will take AI further than it’s been before: right to the edge. Our novel approaches for digital and analog AI chips boost speed and slash...
<urn:uuid:fbb60c86-c5f2-4fcf-84d3-3a50b019a1c7>
CC-MAIN-2022-40
https://www.ibm.com/blogs/research/2018/12/8-bit-breakthroughs-ai/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00423.warc.gz
en
0.928327
1,770
2.546875
3
Is Cyber Security a Good Career- A job in cybersecurity can be extremely rewarding and enjoyable, but it can also be quite difficult and stressful. Understanding some of the job tasks, as well as the job characteristics and personality factors, will help you decide if a cybersecurity profession is suited for you. Under...
<urn:uuid:b43d5e19-c141-4972-81c0-f6f6f55bc776>
CC-MAIN-2022-40
https://cybersguards.com/is-cyber-security-a-good-career/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00423.warc.gz
en
0.946077
1,044
2.515625
3
In 1971, Intel, then a manufacturer of random access memory, officially released the 4004, its first single-chip central processing unit, thus kickstarting nearly 50 years of CPU dominance in computing. In 1989, while working at CERN, Tim Berners-Lee used a NeXT computer, designed around the Motorola 68030 CPU, to laun...
<urn:uuid:171afdaa-40cd-4a04-b94d-ca14877a207d>
CC-MAIN-2022-40
https://www.datacenterdynamics.com/en/analysis/new-chip-bestiary/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00423.warc.gz
en
0.945754
1,807
2.796875
3
It can be argued that industrial facilities have taken to digital transformation much earlier than other enterprises. While it’s only now that some businesses are committing to adopting digital tools, factories have been using robots and programmable logic controllers (PLCs) decades before the dotcom boom of the nineti...
<urn:uuid:884c610d-485b-4f55-9798-79ab24c6f91d>
CC-MAIN-2022-40
https://cisomag.com/industrial-cybersecurity/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00623.warc.gz
en
0.951125
1,356
2.625
3
The 2016 Distributed Denial of Service attack on Dyn came from more than 100,000 infected devices. DDoS attacks leverage massive quantities of unsecured Internet-connected devices to disrupt Internet services worldwide [DYN]. The malicious and sophisticated attack kicked off serious conversations about network security...
<urn:uuid:b57baac4-366f-41d7-9312-6c4ea8338ccd>
CC-MAIN-2022-40
https://blogs.cisco.com/digital/how-to-harden-your-devices-to-prevent-cyber-attacks
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00623.warc.gz
en
0.896398
1,106
2.734375
3
As a follow on to our last write up about an effective digital vaccine we thought it would be worth pointing out a few facts about a critical topic in the health arena. Soap. Yeah, soap. Before you stop reading let me break down what we have been getting wrong about something as simple as washing our hands during the C...
<urn:uuid:168569de-f061-4735-a640-6902f640e1ca>
CC-MAIN-2022-40
https://gytpol.com/cyber-soap/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00623.warc.gz
en
0.95433
966
3.15625
3
Have you ever been away from home and needed to access something on your home computer or router? It sounds convenient, right? It sure would be easier than driving/flying back to your home, or asking a friend or family member to go to your house to retrieve what you’re looking for. Well, never fear. In this guide, we’l...
<urn:uuid:1dd7292c-fab9-43eb-970a-b7870c936e2f>
CC-MAIN-2022-40
https://www.infravio.com/how-to-access-my-router-from-the-internet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00623.warc.gz
en
0.948028
2,290
3
3
We could already be swimming in a world of deepfakes and the public wouldn’t even know. After all, how would we? Those being manipulated by microtargeting before the last US presidential election or the Brexit referendum only found out too late that their information had been weaponized against them. Like the frog bein...
<urn:uuid:20d29d86-d899-4caf-9ea7-ce9aaa570db7>
CC-MAIN-2022-40
https://www.cpomagazine.com/cyber-security/deepfakes-could-break-the-internet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00623.warc.gz
en
0.949856
1,102
2.609375
3
Wi-Fi security took a severe blow on Monday as Mathy Vanhoef, a Belgian security researcher, released details of a major weakness in the Wi-Fi Protected Access 2 (WPA2) protocol. The WPA2 security protocol was first made available in 2004 and has since served as the de-facto standard for securing wireless networks usin...
<urn:uuid:9ee873ba-e965-4e03-84bc-b91c506739e5>
CC-MAIN-2022-40
https://www.cpomagazine.com/cyber-security/protect-yourself-from-the-latest-wpa2-wi-fi-security-flaw/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00623.warc.gz
en
0.934381
628
2.71875
3
Machine learning (ML) teaches computers to learn from data without being explicitly programmed. Unfortunately, the rapid expansion and application of ML have made it difficult for organizations to keep up, as they struggle with issues such as labeling data, managing infrastructure, deploying models, and monitoring perf...
<urn:uuid:91f651c1-4c86-4da0-9a1e-261dc260dad0>
CC-MAIN-2022-40
https://www.itbusinessedge.com/development/mlops-tools/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00623.warc.gz
en
0.905292
3,764
3.421875
3
A Historic Look at Silicon Valley In the 90’s, there was the internet. Or rather, the dawn of the internet, which came with it the need for data facilities to house increasingly complex websites, applications and services. Laying to the south of San Francisco, Silicon Valley and more specifically the Santa Clara valley...
<urn:uuid:cf4ef044-f4a1-4eef-b4ef-64325cbfc7cc>
CC-MAIN-2022-40
https://bandwidthig.com/bandwidth-ig-the-future-of-data-in-silicon-valley/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00623.warc.gz
en
0.948156
1,069
2.75
3