Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
The cost of Internet of Things (IoT) sensors has decreased remarkably over the past decade, heralding new possibilities of a renewed push for smart cities. With worldwide spending on IoT predicted to surpass the $1 trillion mark by 2020, this has increasingly attracted attention within various sectors. With that tied i...
<urn:uuid:6c99d927-b67e-4b33-a3a3-e80984a870e2>
CC-MAIN-2022-40
https://disruptive.asia/smart-city-street-lamp-sensors/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00213.warc.gz
en
0.928023
903
2.703125
3
Ever wonder where the phrase “null and void” or “breaking and entering” came from? Blame the French. From Drafting Contracts: How and Why Lawyers Do What They Do, by Tina L. Stark, Aspen Publishers – Wolters Kluwers, 2007, p. 204, based in turn on The Language of the Law, David Mellinoff, Little, Brown & Co., 1963, Cha...
<urn:uuid:1392ce75-1f00-4626-bf28-f6ee81af62da>
CC-MAIN-2022-40
https://www.brsolutions.com/ever-wonder-where-the-phrase-null-and-void-or-breaking-and-entering-came-from-blame-the-french/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00213.warc.gz
en
0.958487
431
3.046875
3
Cloud computing is a tricky thing. It’s something we all hear about, and think we should be familiar with, but the majority of us aren’t quite sure what it is. There are lots of conflicting views out there, which only add to the confusion. What it is: Cloud computing typically incorporates Hardware as a Service (HaaS),...
<urn:uuid:d7490a30-1913-4ae4-82a5-aebb7fe15fd5>
CC-MAIN-2022-40
https://www.ittropolis.com/cloud-computing-what-it-really-means/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00213.warc.gz
en
0.927534
222
3.03125
3
If you are interested in the topic of cyberbullying and how the US government, and each state, is dealing with bullying and cyberbullying, the Cyberbullying Research Centre has a law fact sheet that is regularly updated on the topic. This information can be of particular use to parents, to understand the rights of thei...
<urn:uuid:fcfca7fb-b789-427d-8689-f3e5f9b61aef>
CC-MAIN-2022-40
https://www.absolute.com/blog/cyberbullying-and-bullying-laws-in-the-us/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00213.warc.gz
en
0.976327
155
2.5625
3
Top 7 Security Measures for IoT Systems It is important to understand that the Internet of Things (IoT) is based on the concept of providing remote user access anywhere around the world to acquire data, operate computers, and other devices. The widespread IoT network includes computing devices along with unrelated mach...
<urn:uuid:13037f22-fba6-4972-bbde-df2e2952755b>
CC-MAIN-2022-40
https://www.impactqa.com/blog/top-7-security-measures-for-iot-systems/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00213.warc.gz
en
0.930431
982
2.578125
3
As was the case over seven decades ago in the early days of digital computing – when the switch at the heart of the system was a vacuum tube, not even a transistor – some of the smartest mathematicians and information theorists today are driving the development of quantum computers, trying to figure out the best physic...
<urn:uuid:98e82050-cf4c-47e8-ab72-431eba523dc7>
CC-MAIN-2022-40
https://www.nextplatform.com/2015/07/22/google-sees-long-expensive-road-ahead-for-quantum-computing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00213.warc.gz
en
0.954968
3,100
3.34375
3
As one of the UK’s leading web-hosting companies, catalyst2 puts security at the top of the list when providing any technological solution. There are currently over 286 million types of malware on the internet, so a key part of our work is to identify new dangers and quickly develop ways of preventing them. One of the ...
<urn:uuid:2a4f3355-c5dd-4b43-8169-ecdfe2494e4e>
CC-MAIN-2022-40
https://www.catalyst2.com/blog/beat-threat-sql-injections/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00213.warc.gz
en
0.932934
414
2.65625
3
Data shows hackers want to steal money, not classified information. Most malware attacks against federal agencies are financially motivated, seeking to trick computer users into buying fake security software or providing personal information that can be used to hack into their bank accounts. Although espionage and terr...
<urn:uuid:458aaad6-351e-4818-bdc0-a9bd35456017>
CC-MAIN-2022-40
https://www.nextgov.com/technology-news/2010/08/most-attacks-on-federal-networks-financially-motivated/47374/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00213.warc.gz
en
0.956268
680
2.515625
3
Looking back over 2015, Venafi Labs captured data on a steady stream of cyberattacks involving the misuse of keys and certificates which threaten the underlying foundation of trust for everything that is IP-based. These “attacks on trust,” as we call them, also show how keys and certificates have become interwoven into...
<urn:uuid:7516e173-9fc2-4077-a7dc-f30536745977>
CC-MAIN-2022-40
https://www.darkreading.com/attacks-breaches/2015-the-year-of-attacks-on-trust-
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00213.warc.gz
en
0.934485
991
2.75
3
7 Data Leakage Prevention Tips To Prevent the Next Breach What is Data Leakage Prevention? Data leakage prevention involves protecting the organization from various types of data leakage threats. Data leakage occurs when an agent transmits data to external parties or locations without authorization from the organizatio...
<urn:uuid:a33bae90-6f46-439c-9384-5f8731ed1962>
CC-MAIN-2022-40
https://www.hysolate.com/learn/endpoint-security/7-data-leakage-prevention-tips-to-prevent-the-next-breach/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00213.warc.gz
en
0.902777
1,801
2.8125
3
A new website has gone live to check if you can tell a real face from an AI-generated fake in this world of uncertainty. The website, WhichFaceIsReal.com, is created by Jevin West of the Information School and Carl Bergstrom of the biology department at the University of Washington. West and Bergstrom gained some degre...
<urn:uuid:5f38d141-2f5e-4abd-8f73-7372dd28693c>
CC-MAIN-2022-40
https://www.artificialintelligence-news.com/2019/03/07/website-checks-real-face-ai-fake/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00413.warc.gz
en
0.944248
598
2.5625
3
As highlighted please send your questions and we will help. ISUP is used for Connection Orientated signalling, i.e. signalling is performed so that a CIC can be secured. SCCP – Signalling Control Connection Part – provides extra information and helps to obtain extra addressing information for Rout(e)ing. Good example i...
<urn:uuid:2db60f65-cd43-459b-9eb6-c1759e7285a6>
CC-MAIN-2022-40
https://www.erlang.com/reply/59511/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00413.warc.gz
en
0.822803
198
2.5625
3
09 November 2007 It's getting more difficult every day to tell the difference between Voice over IP and traditional phone service. That can be a good thing or it can be a bad thing, depending on how you look at it and what aspects you're comparing. When VoIP first became available, it was very different from traditiona...
<urn:uuid:6dc7fcf6-4a3b-4dd7-b1c6-3be6c3cbeac1>
CC-MAIN-2022-40
https://www.myvoipprovider.com/en/VoIP_News_Archive/VoIP_General_News/Why_VoIP_is_looking_more_like_your_old_phone_company
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00413.warc.gz
en
0.980029
243
2.734375
3
Undoubtedly, remote learning has always been an alternative to face-to-face education. Teachers from any field would use cloud-based tools to encourage student’s collaboration. They would also grant access to academic resources and even provide support via teleconferencing. But it was the COVID-19 lockdowns that made r...
<urn:uuid:6421b6dc-a28b-4cba-879e-3d933b96688b>
CC-MAIN-2022-40
https://en.cloudbric.com/blog/2020/10/top-5-best-education-remote-access-solutions/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00413.warc.gz
en
0.929957
2,116
2.84375
3
Thank you for Subscribing to CIO Applications Weekly Brief How AI and ML can help Against Cyber Attacks Artificial intelligence and machine learning are changing how we work, transact, wage a war, communicate, and follow protection norms. These technologies can be used to identify and analyze possible attacks quickly. ...
<urn:uuid:3d7c6825-f660-4adb-af76-aa3cffb82048>
CC-MAIN-2022-40
https://www.cioapplications.com/cxoinsights/how-ai-and-ml-can-help-against-cyber-attacks-nid-3506.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00413.warc.gz
en
0.921573
448
3.03125
3
White House Office of Science Technology observed “World Quantum Day” & issued this statement (WhiteHouse.gov) The White House Office of Science and Technology Policy (OSTP) observed the first-ever official World Quantum Day. IQT News summarizes highights of the OSTP statement below: The day was a result of an internat...
<urn:uuid:3dcd7eaa-5f78-43f7-b861-d1aec5fe31a8>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/white-house-office-of-science-technology-observed-world-quantum-day-issued-this-statement/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00413.warc.gz
en
0.921637
604
2.875
3
“Unstructured data accounts for as much as 80 percent of an organization’s data footprint.” – Gartner As file storage grows rapidly year after year, new challenges arise around keeping data safe and maintaining control over data storage systems. Who owns which files? Whose files take up what volume of enterprise storag...
<urn:uuid:18d13838-743a-4475-a3ed-f5c0b8c87757>
CC-MAIN-2022-40
https://blogs.manageengine.com/active-directory/datasecurity-plus-active-directory/2020/10/16/dealing-with-data-glut-why-rot-data-is-an-issue-and-how-to-manage-it.html?source=dspresour
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00413.warc.gz
en
0.906273
1,120
2.59375
3
Biometrics provide a quick and reliable way to identify and authenticate people by their unique physical characteristics. But does it help fight threats like cybercrime, and what does it mean for privacy? Imagine never having to manually log in again or remember the credentials for a hundred different online accounts. ...
<urn:uuid:8bdbce43-5626-4144-8eae-d508c27d5fba>
CC-MAIN-2022-40
https://kfp.kaspersky.com/news/the-good-the-bad-and-the-ugly-of-biometric-authentication-technology/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00413.warc.gz
en
0.940144
1,771
3.125
3
2017 will go down as the year ransomware hit the mainstream, thanks largely to malware known variously as WannaCry, WannaCrypt or WannaCryptor 2.0. The malicious software compromised systems across Asia, Europe and beyond, affecting high-profile victims such as Britain’s National Health Service (NHS) and FedEx in the U...
<urn:uuid:1526c5b2-2060-4fc6-81f3-37efdbad0df3>
CC-MAIN-2022-40
https://gulfsouthtech.com/malwaremanaged-service-provderransomware/education-is-a-major-ransomware-target-in-2017/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00413.warc.gz
en
0.93164
693
2.796875
3
CRLF stands for the special characters Carriage Return (\r) and Line Feed (\n), two elements used in specific operating systems, such as Windows, and various internet protocols like HTTP. Carriage Return signifies the end of a line, whereas Line Feed denotes a new line. Usually, the purpose of the CRLF combination is t...
<urn:uuid:9a98b73c-d417-45ae-af9d-41f6b35714e8>
CC-MAIN-2022-40
https://crashtest-security.com/crlf-injection-attack/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00613.warc.gz
en
0.917404
1,071
4.1875
4
Understanding Data Privacy by Gergo Varga, Senior Content Manager, SEON Today, we are living in a world where data is everything. We use it in every part of our lives to communicate with each other and our devices, to organize our lives, and to make our lives easier. It has also become an indispensable part of any busi...
<urn:uuid:84dd6adf-356b-42bd-be4f-b9486f15a37f>
CC-MAIN-2022-40
https://cybersecuritymagazine.com/why-should-data-privacy-be-a-top-priority-for-companies/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00613.warc.gz
en
0.96293
823
3.03125
3
Duke University was created in 1924 by James Buchanan Duke as a memorial to his father, Washington Duke. The Dukes, a Durham family that built a worldwide financial empire in the manufacture of tobacco products and developed electricity production in the Carolinas, long had been interested in Trinity College. The schoo...
<urn:uuid:381d2452-eb2b-4cb1-815e-6ae3485b82d8>
CC-MAIN-2022-40
https://www.lastpass.com/resources/case-study/duke-university
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00613.warc.gz
en
0.952582
643
2.625
3
Self driving vehicles have been deployed on roads for testing and have been promoted by technology companies for a number of years now. The argument goes that through the use of visual data and advanced algorithms, automated vehicles will result in much safer driving experiences. The discussions around safety have been...
<urn:uuid:bbe998e6-aa36-4c2d-9880-8e606b3b4b36>
CC-MAIN-2022-40
https://diginomica.com/safety-isnt-only-issue-self-driving-vehicles-data-privacy-and-algorithmic-oversight-need-attention
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00613.warc.gz
en
0.951807
1,682
2.890625
3
Front-End vs Back-End Developer: Which Path is Right For You? Front-end and back-end development are two of today's most ubiquitous specialization areas of web development. However, for those new to development, it may be challenging to decide which path is better for you. With that, we thought it would be important to...
<urn:uuid:1e7d83b6-258c-45fc-9477-4f85841cd1e1>
CC-MAIN-2022-40
https://www.cbtnuggets.com/blog/technology/programming/front-end-vs-back-end-developer-which-path-is-right-for-you
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00613.warc.gz
en
0.941748
1,504
2.59375
3
Passwords and PINs are not nearly as secure as they should be. According to a recent Verizon investigation, 81 percent of hacker-related breaches happen due to lost or weak passwords. Despite this, poor password habits persist (for example, reusing the same password across multiple accounts both at home and work). Weak...
<urn:uuid:3061d477-7aed-4bb6-9f1c-4376120de097>
CC-MAIN-2022-40
https://www.ibeta.com/biometric-authentication-is-the-future-password-less/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00613.warc.gz
en
0.916094
1,051
2.765625
3
By the end of 2021, there will be 12 billion connected IoT devices, and by 2025, that number will rise to 27 billion. All these devices will be connected to the internet and will send useful data that will make industries, medicine, and cars more intelligent and more efficient. However, will all these devices be safe? ...
<urn:uuid:9c9883f0-a3fd-4671-9b04-8da0067659e0>
CC-MAIN-2022-40
https://news.cyberfreakz.com/iot-safe-an-innovative-way-to-secure-iot/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00613.warc.gz
en
0.939992
339
3.171875
3
TL;DR: Half of all internet traffic is Bots. There are good and bad bots and it is important to be able to manage all bot traffic, mitigating the risk posed by bad bots so you can protect your customers and your business. Bot management is the practice of knowing how bots impact your business and understanding their in...
<urn:uuid:68000f40-db1b-4e69-9ec6-5b186cd9fb7e>
CC-MAIN-2022-40
https://www.f5.com/fr_fr/services/resources/glossary/bot-management-mitigation-and-protection
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00613.warc.gz
en
0.910475
613
2.515625
3
Gone are the days when data are saved into discs and drives. Today, with the advancement of technology, data are already saved in the cloud. Cloud storage is a more convenient and cost-effective way of storing data which helps user backup, sync, and access his files wherever he is as long as he is connected to the inte...
<urn:uuid:cac86ea5-90de-4585-ae3e-0a08e18d189d>
CC-MAIN-2022-40
https://www.colocationamerica.com/blog/another-look-at-how-secure-is-your-cloud-data
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00613.warc.gz
en
0.956195
1,157
3.109375
3
Over 45% of Gen Zers are victims of cyberbullying Bullying has been a part of us for ages. The youngest generation started using computers, smartphones, and other electronic devices to threaten or harass others. According to the data presented by the Atlas VPN team, over 45% of Gen Zers are victims of cyberbullying. Th...
<urn:uuid:2ab39d37-7051-46cf-9257-660136a6ad27>
CC-MAIN-2022-40
https://atlasvpn.com/blog/over-45-of-gen-zers-are-victims-of-cyberbullying
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00613.warc.gz
en
0.947504
689
2.828125
3
Many of us are familiar with a concept know as Security by Obscurity. The term has negative connotations within the infosec community—usually for the wrong reason. There’s little debate about whether security by obscurity is bad; this is true because it means the secret being hidden is the key to the entire system’s se...
<urn:uuid:b0eb9fed-5cd6-483a-9f8e-15324301cd71>
CC-MAIN-2022-40
https://danielmiessler.com/study/security-by-obscurity/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334596.27/warc/CC-MAIN-20220925193816-20220925223816-00013.warc.gz
en
0.945968
1,475
2.828125
3
The health effects of RF energy have been a concern voiced by many in recent years. Questions have been raised about the use of cell phones and the introduction of 5G. Now the military has raised concerns about the cognitive effects of radio frequency energy on pilots. U.S. Military Concerns About RF Noise Exposure A r...
<urn:uuid:3bfe5d79-f4a2-4c5a-a1ee-822e1c9a097f>
CC-MAIN-2022-40
https://cvgstrategy.com/health-effects-of-rf-energy/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00013.warc.gz
en
0.951598
760
3.125
3
Modern criminals around the world use the internet to plan and prepare their illegal activity, routinely having more than one account on various social media sites in order to keep their true activity hidden from law enforcement agencies. While social media contains open-source intelligence which can provide invaluable...
<urn:uuid:a884ceb6-6d6b-4e61-a3c4-17a187cb0836>
CC-MAIN-2022-40
https://cobwebs.com/using-web-intelligence-for-criminal-investigations/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00013.warc.gz
en
0.911982
548
2.703125
3
Accurate weather forecasting has, by and large, been situated squarely in the domain of high-performance computing – just this week, the UK announced a nearly $1.6 billion investment in the world’s largest supercomputer for weather and climate. Now, researchers at Johannes Gutenberg University Mainz and Università dell...
<urn:uuid:b1845729-6a1a-4b8a-b173-3e967d4a1033>
CC-MAIN-2022-40
https://www.hpcwire.com/2020/02/19/new-algorithm-allows-pcs-to-challenge-hpc-in-weather-forecasting/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00214.warc.gz
en
0.949423
678
3.578125
4
Emails are some of the most common forms of communication that a business uses for internal and external conversations, and consequently are some of the favorite targets of cybercriminals and thieves. Even internal emails aren’t safe from this threat: depending on the type of the industry and the potential data that ca...
<urn:uuid:8cd3d207-2a86-495a-83c3-c93fd077633a>
CC-MAIN-2022-40
https://goabacus.com/3-industries-that-need-email-encryption/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00214.warc.gz
en
0.94408
1,546
2.53125
3
The new 5G technology has been a significant advance in the way we communicate, but are there really risks in this innovative network? The new 5G mobile technology promises to be innovative in the advancement of communication, data speed and connection; as well as the interconnection of our homes and devices in real ti...
<urn:uuid:c6aad436-adc4-4d54-8427-29eb8ed776ca>
CC-MAIN-2022-40
https://demyo.com/5g-technology-and-its-risks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00214.warc.gz
en
0.961378
1,409
2.9375
3
Importance of Password Policy Best Practices- Companies must follow password policy best practises in order to adequately protect private, sensitive, and personal communication and data. Passwords are used by system end-users as a first line of defence to prevent unauthorised users from accessing protected systems and ...
<urn:uuid:a016c419-950c-402e-8d71-ba7576500b7f>
CC-MAIN-2022-40
https://cybersguards.com/importance-of-password-policy-best-practices/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00214.warc.gz
en
0.920538
2,522
3.015625
3
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
24