Latest YouTube Video
Saturday, February 20, 2016
I have a new follower on Twitter
Marco
Following: 3 - Followers: 0
February 20, 2016 at 10:56PM via Twitter http://twitter.com/marco651211
Orioles: P Yovani Gallardo agrees to 3-year, $35 million contract; went 13-11 with 3.42 ERA last year - multiple reports (ESPN)
via IFTTT
I have a new follower on Twitter
Young Alcoholics
Why overthink when you can over drink?
Turn on Notifications!
Following: 244 - Followers: 17260
February 20, 2016 at 03:32PM via Twitter http://twitter.com/YoungAIcoholics
Anonymous Donation Allows Vermillion County K9 Officer To Receive Vest
from Google Alert - anonymous http://ift.tt/1oBiGqV
via IFTTT
Alcoholics Anonymous accused of discrimination
from Google Alert - anonymous http://ift.tt/1PNEs38
via IFTTT
Donald Trump — Boycott Apple! But Still Tweeting from an iPhone
from The Hacker News http://ift.tt/1mO3YuH
via IFTTT
FBI Screwed Up — Police Reset Shooter's Apple ID Passcode that leaves iPhone Data Unrecoverable
from The Hacker News http://ift.tt/1KxATPK
via IFTTT
Linux Foundation Launches 'Zephyr', a tiny OS for Internet of Things
from The Hacker News http://ift.tt/1TrCSqj
via IFTTT
NGC 2403 in Camelopardalis
Friday, February 19, 2016
mojotech/modernator
from Google Alert - anonymous http://ift.tt/1oyXwcT
via IFTTT
Remove anonymous user from member fields
from Google Alert - anonymous http://ift.tt/1PLUevv
via IFTTT
Ravens: TE Nick Boyle suspended 10 games for violating league's PED policy; also was suspended final 4 games last season (ESPN)
via IFTTT
Orioles: 3B Manny Machado should \"determine how high the 2016 Birds will fly,\" writes Eddie Matz (ESPN)
via IFTTT
Orioles Podcast: Manager Buck Showalter tells Baseball Tonight his team has \"four points of emphasis\" for this season (ESPN)
via IFTTT
anonymous-sums
from Google Alert - anonymous http://ift.tt/1TqqJ4K
via IFTTT
I have a new follower on Twitter
SportsTalkLine.com
We search the World of Sports, then we talk about it. #WeFollowBack
SoCal
http://t.co/2Oy11Ybe
Following: 26355 - Followers: 25346
February 19, 2016 at 08:30AM via Twitter http://twitter.com/SportsTalkLine
Now We Know — Apple Can Unlock iPhones, Here's How to Hack-Proof your Device
How to Hack-Proof your iPhone?
- Simply Set at least random 11-digit numeric passcode for your iPhone.
Here's why (FBI Can't Crack It):
Things to Avoid While Setting a Passcode
Warning: You need to remember your passcode, whatever you set, because no one except you would be able to unlock your iPhone. Once you forgot your passcode, there is nothing you can do to get your important data and even access to your iPhone back.
from The Hacker News http://ift.tt/1PWadov
via IFTTT
[FD] Adobe - Multiple Client Side Cross Site Scripting Web Vulnerabilities
Source: Gmail -> IFTTT-> Blogger
[FD] Chamilo LMS - Persistent Cross Site Scripting Vulnerability
[FD] Chamilo LMS IDOR - (messageId) Delete POST Inject Vulnerability
Source: Gmail -> IFTTT-> Blogger
ISS Daily Summary Report – 02/18/16
from ISS On-Orbit Status Report http://ift.tt/1SE63aI
via IFTTT
[FD] Prezi Bug Bounty #5 - Client Side Cross Site Scripting & Open Redirect Vulnerability
Source: Gmail -> IFTTT-> Blogger
[FD] ifixit Bug Bounty #5 - Guide Search Persistent Vulnerability
Source: Gmail -> IFTTT-> Blogger
15-year-old Teenage Hacker Arrested Over FBI Computer Hack
"He has since been released and is the subject of a report to the procurator fiscal," a Police Spokesman told a Scottish journal.
Second Member of the Hacking Group Arrested
- Leaked the personal and sensitive details of tens of thousands of FBI agents and the US Department of Homeland Security (DHS) employees.
- Hacked into AOL emails of CIA director John Brennan.
- Hacked into the personal phone accounts and emails of the US spy chief James Clapper.
- Broke into AOL emails of the FBI Deputy Director Mark Giuliano.
Last Member of Hacking Group Left
from The Hacker News http://ift.tt/1XBrBnQ
via IFTTT
Sexaholics Anonymous
from Google Alert - anonymous http://ift.tt/1KYX3KJ
via IFTTT
How Just Opening an MS Word Doc Can Hijack Every File On Your System
Microsoft MACROS are Back
How Does Locky Work?
- Once the victim enables the macro (malicious), he/she would download an executable from a remote server and run it.
- This executable is nothing but the Locky Ransomware that, when started, will begin to encrypt all the files on your computer as well as network.
Locky Encrypts Even Your Network-Based Backup Files
"I estimate by the end of the day well over 100,000 new endpoints will be infected with Locky, making this a genuine major cybersecurity incident — 3 days in, approximately a quarter of Million PCs will be infected," Kevin said in a blog post.
One hour of infection Statistics:
from The Hacker News http://ift.tt/212nUwV
via IFTTT
Daily Caller Report: Porn, Weed, DUIs All In A Day's Anonymous
from Google Alert - anonymous http://ift.tt/1LwuHT3
via IFTTT
SDO Year 6: A Year of the Sun
from NASA's Scientific Visualization Studio: Most Popular
via IFTTT
March 2016 Eclipse Shadow Cones
from NASA's Scientific Visualization Studio: Most Popular
via IFTTT
Hitomi Launches
Thursday, February 18, 2016
I have a new follower on Twitter
Torbjörn Ungvall
Renegade, Disruptive Thinker, Social Media Explorer, BI rockstar, Storyteller, @Hootsuite Ambassador, and Singer. In that order. Opinions are my own…
Stockholm, Sweden
http://t.co/AgDPhnNcwR
Following: 7371 - Followers: 10498
February 18, 2016 at 11:31PM via Twitter http://twitter.com/Ungvall
Query Answering with Inconsistent Existential Rules under Stable Model Semantics. (arXiv:1602.05699v1 [cs.AI])
Traditional inconsistency-tolerent query answering in ontology-based data access relies on selecting maximal components of an ABox/database which are consistent with the ontology. However, some rules in ontologies might be unreliable if they are extracted from ontology learning or written by unskillful knowledge engineers. In this paper we present a framework of handling inconsistent existential rules under stable model semantics, which is defined by a notion called rule repairs to select maximal components of the existential rules. Surprisingly, for R-acyclic existential rules with R-stratified or guarded existential rules with stratified negations, both the data complexity and combined complexity of query answering under the rule {repair semantics} remain the same as that under the conventional query answering semantics. This leads us to propose several approaches to handle the rule {repair semantics} by calling answer set programming solvers. An experimental evaluation shows that these approaches have good scalability of query answering under rule repairs on realistic cases.
from cs.AI updates on arXiv.org http://ift.tt/1orHMrw
via IFTTT
Applying Boolean discrete methods in the production of a real-valued probabilistic programming model. (arXiv:1602.05705v1 [cs.AI])
In this paper we explore the application of some notable Boolean methods, namely the Disjunctive Normal Form representation of logic table expansions, and apply them to a real-valued logic model which utilizes quantities on the range [0,1] to produce a probabilistic programming of a game character's logic in mathematical form.
from cs.AI updates on arXiv.org http://ift.tt/1TpnM4o
via IFTTT
Entity Embeddings with Conceptual Subspaces as a Basis for Plausible Reasoning. (arXiv:1602.05765v1 [cs.AI])
Conceptual spaces are geometric representations of conceptual knowledge, in which entities correspond to points, natural properties correspond to convex regions, and the dimensions of the space correspond to salient features. While conceptual spaces enable elegant models of various cognitive phenomena, the lack of automated methods for constructing such representations have so far limited their application in artificial intelligence. To address this issue, we propose a method which learns a vector-space embedding of entities from Wikipedia and constrains this embedding such that entities of the same semantic type are located in some lower-dimensional subspace. We experimentally demonstrate the usefulness of these subspaces as (approximate) conceptual space representations by showing, among others, that important features can be modelled as directions and that natural properties tend to correspond to convex regions.
from cs.AI updates on arXiv.org http://ift.tt/1orHLUy
via IFTTT
A General Modifier-based Framework for Inconsistency-Tolerant Query Answering. (arXiv:1602.05828v1 [cs.AI])
We propose a general framework for inconsistency-tolerant query answering within existential rule setting. This framework unifies the main semantics proposed by the state of art and introduces new ones based on cardinality and majority principles. It relies on two key notions: modifiers and inference strategies. An inconsistency-tolerant semantics is seen as a composite modifier plus an inference strategy. We compare the obtained semantics from a productivity point of view.
from cs.AI updates on arXiv.org http://ift.tt/1TpnM4l
via IFTTT
Toward Deeper Understanding of Neural Networks: The Power of Initialization and a Dual View on Expressivity. (arXiv:1602.05897v1 [cs.LG])
We develop a general duality between neural networks and compositional kernels, striving towards a better understanding of deep learning. We show that initial representations generated by common random initializations are sufficiently rich to express all functions in the dual kernel space. Hence, though the training objective is hard to optimize in the worst case, the initial weights form a good starting point for optimization. Our dual view also reveals a pragmatic and aesthetic perspective of neural networks and underscores their expressive power.
from cs.AI updates on arXiv.org http://ift.tt/1SD95fc
via IFTTT
A partial taxonomy of judgment aggregation rules, and their properties. (arXiv:1502.05888v2 [cs.AI] UPDATED)
The literature on judgment aggregation is moving from studying impossibility results regarding aggregation rules towards studying specific judgment aggregation rules. Here we give a structured list of most rules that have been proposed and studied recently in the literature, together with various properties of such rules. We fi?rst focus on the majority-preservation property, which generalizes Condorcet-consistency, and identify which of the rules satisfy it. We study the inclusion relationships that hold between the rules. Finally, we consider two forms of unanimity, monotonicity, homogeneity, and reinforcement, and we identify which of the rules satisfy these properties.
from cs.AI updates on arXiv.org http://ift.tt/1JALlVi
via IFTTT
Ravens: Cutting TE Dennis Pitta and CB Lardarius Webb are among moves team should make this offseason - Bill Barnwell (ESPN)
via IFTTT
Anonymous Emails From Suspected Child Predator Targeting Sacramento Daycare
from Google Alert - anonymous http://ift.tt/1mKKOWz
via IFTTT
Ravens: Ohio State DE Joey Bosa goes No. 6 overall in Mel Kiper's Mock Draft 2.0; \"the best player on the board here\" (ESPN)
via IFTTT
[FD] EBAY Bugbounty: Persistent DOM Based XSS on ebay.com
Source: Gmail -> IFTTT-> Blogger
[FD] Cisco ASA VPN - Zero Day Exploit
Source: Gmail -> IFTTT-> Blogger
Anonymous Oscar Voter Reveals Winner Predictions
from Google Alert - anonymous http://ift.tt/1Uakvqr
via IFTTT
The Anonymous People
from Google Alert - anonymous http://ift.tt/1PTvCPi
via IFTTT
[FD] Vesta Control Panel <= 0.9.8-15 - Persistent XSS Vulnerability
Source: Gmail -> IFTTT-> Blogger
Ocean City, MD's surf is at least 5.96ft high
Ocean City, MD Summary
At 2:00 AM, surf min of 4.46ft. At 8:00 AM, surf min of 5.96ft. At 2:00 PM, surf min of 2.9ft. At 8:00 PM, surf min of 2.14ft.
Surf maximum: 7.13ft (2.17m)
Surf minimum: 5.96ft (1.82m)
Tide height: 3.55ft (1.08m)
Wind direction: SW
Wind speed: 16.99 KTS
from Surfline http://ift.tt/1kVmigH
via IFTTT
ISS Daily Summary Report – 02/17/16
from ISS On-Orbit Status Report http://ift.tt/1Tscvlj
via IFTTT
Confusion About Lambdas, Anonymous Functions and First Class Functions
from Google Alert - anonymous http://ift.tt/1ToopeH
via IFTTT
Using SimpliSafe Home Security? — You're Screwed! It's Easy to Hack & Can't be Patched
How to Hack SimpliSafe Alarms?
Video Demonstration of the Hack
"Unfortunately, there's no easy workaround for the issue since the keypad happily sends unencrypted PINs out to anyone listening," Zonenberg explains.
Here's Why Your Smart Alarms are Unpatchable
"Normally, the vendor would fix the vulnerability in a new firmware version by adding cryptography to the protocol," Zonenberg adds. But, "this isn't an option for the affected SimpliSafe products because the microcontrollers in currently shipped hardware are one-time programmable."
from The Hacker News http://ift.tt/1Xzueq3
via IFTTT
Ocean City, MD's surf is Good
Ocean City, MD Summary
Surf: head high to 1 ft overhead
Maximum: 1.836m (6.02ft)
Minimum: 1.53m (5.02ft)
Maryland-Delaware Summary
from Surfline http://ift.tt/1kVmigH
via IFTTT
Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records
- Compromised emails
- Lockout Electronic Medical Record System [EMR]
- Encrypted patient data
- Unable to carry CT Scans of the admitted patients
- Ferried risky patients to nearby hospitals
Hospital End up Paying $17,000
"The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key," the hospital CEO Allen Stefanek said in a letter.
The FBI Advises Victims to Just Pay the Ransom
from The Hacker News http://ift.tt/1Ohy00g
via IFTTT
Apple vs. FBI — Google Joins Tim Cook in Encryption Backdoor Battle
Here's What the FBI is Demanding:
Backdoor for Government, Backdoor for All
Google Sided with Apple
In a series of tweets late Wednesday, Pichai sided with Apple while saying "forcing companies to enable hacking could compromise users' privacy" and "requiring companies to enable hacking of customer devices & data. Could be a troubling precedent."
"The @FBI is creating a world where citizens rely on #Apple to defend their rights, rather than the other way around," Snowden tweeted on Wednesday. Snowden called on Google to stand with Apple, saying, "This is the most important tech case in a decade."
Pichai's stance is basically:
from The Hacker News http://ift.tt/1Q2OpLw
via IFTTT
Anonymous function/ Loop
from Google Alert - anonymous http://ift.tt/1U9w559
via IFTTT
Ignoring "make known users anonymous"
from Google Alert - anonymous http://ift.tt/1WsZLsI
via IFTTT
Milky Way over the Pinnacles in Australia
March 2016 Total Solar Eclipse Path
from NASA's Scientific Visualization Studio: Most Popular
via IFTTT
Wednesday, February 17, 2016
I have a new follower on Twitter
Horoscope Cancer
Rejoins la #TeamCancer et découvres ce que cache ton signe astrologique #Astro #Cancer #Horoscope
Ici et là-bas
Following: 7227 - Followers: 9275
February 17, 2016 at 09:36PM via Twitter http://twitter.com/_Le_Cancer
Orioles: Team continues to make progress in contract talks with SP Yovani Gallardo and OF Dexter Fowler - sources (ESPN)
via IFTTT
BioSpaun: A large-scale behaving brain model with complex neurons. (arXiv:1602.05220v1 [q-bio.NC])
We describe a large-scale functional brain model that includes detailed, conductance-based, compartmental models of individual neurons. We call the model BioSpaun, to indicate the increased biological plausibility of these neurons, and because it is a direct extension of the Spaun model \cite{Eliasmith2012b}. We demonstrate that including these detailed compartmental models does not adversely affect performance across a variety of tasks, including digit recognition, serial working memory, and counting. We then explore the effects of applying TTX, a sodium channel blocking drug, to the model. We characterize the behavioral changes that result from this molecular level intervention. We believe this is the first demonstration of a large-scale brain model that clearly links low-level molecular interventions and high-level behavior.
from cs.AI updates on arXiv.org http://ift.tt/1orLimc
via IFTTT
Authorship Attribution Using a Neural Network Language Model. (arXiv:1602.05292v1 [cs.CL])
In practice, training language models for individual authors is often expensive because of limited data resources. In such cases, Neural Network Language Models (NNLMs), generally outperform the traditional non-parametric N-gram models. Here we investigate the performance of a feed-forward NNLM on an authorship attribution problem, with moderate author set size and relatively limited data. We also consider how the text topics impact performance. Compared with a well-constructed N-gram baseline method with Kneser-Ney smoothing, the proposed method achieves nearly 2:5% reduction in perplexity and increases author classification accuracy by 3:43% on average, given as few as 5 test sentences. The performance is very competitive with the state of the art in terms of accuracy and demand on test data. The source code, preprocessed datasets, a detailed description of the methodology and results are available at http://ift.tt/1mICOp3.
from cs.AI updates on arXiv.org http://ift.tt/1Oh5oUR
via IFTTT