Latest YouTube Video

Saturday, February 27, 2016

En l'ombre dung bussinet (Anonymous)

Composer, Anonymous. Key, F Ionian mode. First Publication, 1504 in Canti C (No.58). Language, French. Piece Style, Renaissance. Instrumentation ...

from Google Alert - anonymous http://ift.tt/1VKXSrc'ombre_dung_bussinet_(Anonymous)&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNEqa4BuZ027wRKVPBPKFAGYtgKwSQ
via IFTTT

Helas le poure johan (Anonymous)

Composer, Anonymous. Key, G Dorian mode. First Publication, 1504 in Canti C (No.56). Language, French. Piece Style, Renaissance. Instrumentation ...

from Google Alert - anonymous http://ift.tt/1LMq1bJ
via IFTTT

I have a new follower on Twitter


MuleSoft
Connect anything. Change everything.
HQ: San Francisco, CA
http://t.co/NH6KiJTuMy
Following: 4381 - Followers: 30958

February 27, 2016 at 04:02PM via Twitter http://twitter.com/MuleSoft

Help regarding usage of Anonymous functions

Hi, I am newbie to matlab and require some help in the usuage of Anonymous functions for the following scenario. I would like to implement the below ...

from Google Alert - anonymous http://ift.tt/1UqQQcI
via IFTTT

Wishlist functionality for anonymous users

It would be great to have Wishlist functionality for anonymous users. Should work like the cart functionality. Add products to wishlist as anonymous and ...

from Google Alert - anonymous http://ift.tt/1S8qtrs
via IFTTT

CTB-Locker Ransomware Spreading Rapidly, Infects Thousands of Web Servers

In last few years, we saw an innumerable rise in ransomware threats ranging from Cryptowall to Locky ransomware discovered last week. Now, another genre of ransomware had been branched out from the family of CTB-Locker Ransomware with an update to infect "Websites". The newly transformed ransomware dubbed "CTB-Locker for Websites" exclusively hijacks the websites by locking out its data, which


from The Hacker News http://ift.tt/1QNyRh4
via IFTTT

Chinese ISPs Caught Injecting Ads and Malware into Web Pages

China has gained a considerable global attention when it comes to their Internet policies in the past years; whether it's introducing its own search engine dubbed "Baidu," Great Firewall of China, its homebrew China Operating System (COP) and many more. Along with the developments, China has long been criticized for suspected backdoors in its products: Xiaomi and Star N9500 smartphones are


from The Hacker News http://ift.tt/1LldTUg
via IFTTT

Inside The Anonymous World Of Caffeine

I came home from a trip the other day with a small plastic bag filled with four ounces of brown powder that, truth be told, made me a little nervous. The.

from Google Alert - anonymous http://ift.tt/211tSZB
via IFTTT

Anonymous donation to Goodwill becomes the answer to a couple's prayers

MOBILE, Ala. WPMI An area couple says an anonymous donation to Goodwill turned into the answer to their prayers.At first glance it's just a van, but to ...

from Google Alert - anonymous http://ift.tt/1UpRyXL
via IFTTT

Anonymous quiz takers see different feedback pages

Is there an option to allow anonymous users to see the same page/page structure as logged in users as this page is far easier to style and seems to ...

from Google Alert - anonymous http://ift.tt/1Q9Z2uX
via IFTTT

The Tarantula Nebula


The Tarantula Nebula is more than a thousand light-years in diameter, a giant star forming region within nearby satellite galaxy the Large Magellanic Cloud, about 180 thousand light-years away. The largest, most violent star forming region known in the whole Local Group of galaxies, the cosmic arachnid sprawls across this spectacular composite view constructed with space- and ground-based image data. Within the Tarantula (NGC 2070), intense radiation, stellar winds and supernova shocks from the central young cluster of massive stars, cataloged as R136, energize the nebular glow and shape the spidery filaments. Around the Tarantula are other star forming regions with young star clusters, filaments, and blown-out bubble-shaped clouds In fact, the frame includes the site of the closest supernova in modern times, SN 1987A, at the lower right. The rich field of view spans about 1 degree or 2 full moons, in the southern constellation Dorado. But were the Tarantula Nebula closer, say 1,500 light-years distant like the local star forming Orion Nebula, it would take up half the sky. via NASA http://ift.tt/1XPFyyp

El Niño: GMAO Daily Sea Surface Temperature Anomaly from 1997/1998 and 2015/2016

Every two to seven years, an unusually warm pool of water -- sometimes two to three degrees Celsius higher than normal -- develops across the eastern tropical Pacific Ocean to create a natural short-term climate change event. This warm condition, known as El Niño, affects the local aquatic environment, but also spurs extreme weather patterns around the world, from flooding in California to droughts in Australia. In 2015 El Nino unfolded in the Pacific Ocean, as sea surface temperatures create different patterns than seen in the 1997-1998 El Nino. Computer models are just one tool that NASA scientists are using to study this large El Nino event, and compare it to other events in the past."The start of an El Nino is important," said Robin Kovach, a research scientist with the Global Modeling and Assimilation Office (GMAO) at NASA's Goddard Space Flight Center in Greenbelt, Maryland. The visualization shows how the 1997 event started from colder-than-average sea surface temperatures - but the 2015 event started with warmer-than-average temperatures not only in the Pacific but also in in the Atlantic and Indian Oceans."The '97 El Nino was much stronger in the Eastern Pacific, with much warmer water up to the coast of South America," Kovach said. In 2015, the warmest waters are instead in the Central Pacific and extend west of the International Date Line. The water temperature variations typical of El Nino are not only at the surface of the equatorial Pacific, but below the surface as well. And these variations were also different in 2015, compared to 1997. At the height of the El Nino in November, colder-than-average temperatures in the Western Pacific and warmer-than-average temperatures in the Eastern Pacific were stronger and extended deeper in 1997 than in 2015 .Goddard's computer models, with input from ocean buoys, atmospheric models, satellite data and other sources, can also simulate what ocean water temperatures could do in the coming months. The GMAO seasonal forecast, which takes 18 hours to complete, and creates more than 9 Terabytes of data, shows that this 2015 El Nino could be different until the end. "In the past, very strong El Nino events typically transition to neutral conditions and then a La Nina event," said Kovach. February computer model runs forecast a return to normal sea surface temperatures by June. The latest Feb 5, 2016 forecast does not yet predict below normal sea surface temperatures that would result in a large La Nina. As of Feb. 14, 2016, the latest ocean computer model shows colder-than-average water temperatures off the South American coast from Ecuador to Panama. "This current El Nino has been different so it will be interesting to see what happens in the next forecast and the coming months."

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1RuwCvU
via IFTTT

IMERG Rainfall Accumulation from December 2015 through February 2016

This animation shows the accumulation of rainfall over the western United States during the period February 1 to 16, 2016, from the IMERG precipitation dataset.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1oNWQk4
via IFTTT

Friday, February 26, 2016

Anonymous Fred Meyer shopper helps police catch suspect

The Portland Police Bureau would like to thank anonymous shopping cart guy who helped stop a fleeing suspect.Cody Jaye Lindsay, 26, led officers ...

from Google Alert - anonymous http://ift.tt/1oNUGAO
via IFTTT

Jobs at Anonymous Employer

Jobs at Anonymous Employer in and Netherlands: and European Regulatory and Public Affairs Manager - EuroScienceJobs.com.

from Google Alert - anonymous http://ift.tt/1UpBi94
via IFTTT

Config Pages with Paragraphs don't display with Anonymous user.

When using Config Pages with Paragraphs the Paragraphs content don't display with Anonymous user. Because Paragraphs check check ...

from Google Alert - anonymous http://ift.tt/1QCyiQA
via IFTTT

Food Addicts Anonymous

Food Addicts Anonymous is a weekly support group to provide fellowship for men and women willing to recover from the disease of food addiction.

from Google Alert - anonymous http://ift.tt/1Ru5I7f
via IFTTT

Jobs at Anonymous Employer

European affairs jobs at Anonymous Employer in and Netherlands: and European Regulatory and Public Affairs Manager - EuroBrussels.com.

from Google Alert - anonymous http://ift.tt/1RtQT4B
via IFTTT

Ravens Buzz: Joe Flacco, team met to discuss contract, source tells Adam Caplan; Flacco has 3 years left on 6-year deal (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous command just after entering a field throws an error.

Anonymous command just after entering a field throws an error. #664. Open. debug-ito opened this Issue 6 hours ago · 1 comment ...

from Google Alert - anonymous http://ift.tt/1pdfD85
via IFTTT

Using anonymous modules and prepend to work with generated code

In my previous blog-post about using setters one of the commenter mentioned a case in which the setter methods are created by a gem. How can we ...

from Google Alert - anonymous http://ift.tt/1RtojjU
via IFTTT

How To Keep Your Android Phone Secure

As the number of threats is on the rise, Android platform is no longer safe, which isn't a surprise to anyone. Most of us are usually worried more about the security of our desktops or laptops and forget to think about the consequences our smartphones can make if compromised or stolen. Unlike desktops, your smartphones and tablets carry all sorts of information from your personal


from The Hacker News http://ift.tt/1T0UbzH
via IFTTT

Windows 10 Started Showing Ads on LockScreen — Here's How to Turn It OFF

If you've upgraded your older version of Windows OS to an all new Windows 10 operating system then you may have noticed an advertisement appearing on your desktop or laptop’s lock screen over the past couple of days. Yes, this is what Microsoft has chosen to generate revenue after offering Free Windows 10 Download to its users: Monetize the Lock Screen. Thanks to Windows 10's new


from The Hacker News http://ift.tt/1TbUjwN
via IFTTT

Anonymous user 155860

Name, Anonymous user 155860. User since, February 24, 2016. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons ...

from Google Alert - anonymous http://ift.tt/1QBPDt5
via IFTTT

I have a new follower on Twitter


Mac SEO Tips
Glenn Bearsky  Mac SEO-SMM Tools, Social Marketing Tips for Apple OSX Web Designers. Internet Domination ala Macintosh. Link Different! https://t.co/gu7LPFS1ch
USA
http://t.co/dmc7Im4ExN
Following: 1653 - Followers: 3660

February 26, 2016 at 10:26AM via Twitter http://twitter.com/macseotips

Ravens: Franchise tag used on K Justin Tucker the 2nd-most accurate kicker in history; receives $4.5M salary with tag (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Page cache for anonymous users are not cleared when using Views

The issue is that for the anonymous users, the page cache is not updated when an item is added. I was able to reproduce the issue with a custom ...

from Google Alert - anonymous http://ift.tt/1Q7N8S6
via IFTTT

Apple hires developer of World's Most Secure Messaging App

Apple is serious this time to enhance its iPhone security that even it can not hack. To achieve this the company has hired one of the key developers of Signal — World's most secure, open source and encrypted messaging app. Frederic Jacobs, who worked to develop Signal, announced today that he is joining Apple this summer to work as an intern in its CoreOS security team. "I'm delighted to


from The Hacker News http://ift.tt/1Qknyan
via IFTTT

ISS Daily Summary Report – 02/25/16

Airway Monitoring:  Kopra and Peake completed a European Space Agency (ESA) Airway Monitoring session which began this morning when the crewmembers assembled a Lithium Hydroxide (LIOH) canister and portable fan assembly to prepare for carbon dioxide removal in the US Airlock.  Subsequently, Nitric Oxide (NO) measurements were taken of both crewmembers at nominal and reduced pressures in the Airlock. The primary goal of the Airway Monitoring experiment is to determine how gravity and microgravity influence the turnover of Nitric Oxide in the lungs.  During future manned missions to the Moon and to Mars, airway inflammation due to toxic dust inhalation is a risk factor. Since dust may cause airway inflammation and since such inflammation can be monitored by exhaled Nitric Oxide analysis, the present study is highly relevant for astronaut health in future space programs.   Cognition:  Kelly performed his final, Return Minus 14 (R-14) session of the Cognition experiment.  The Individualized Real-Time Neurocognitive Assessment Toolkit for Space Flight Fatigue (Cognition) investigation is a battery of tests that measure how spaceflight-related physical changes, such as microgravity and lack of sleep, can affect cognitive performance. Cognition includes ten brief computerized tests that cover a wide range of cognitive functions, and provides immediate feedback on current and past test results. The software used allows for real-time measurement of cognitive performance while in space.   Sleep Log:  One year crewmembers Kelly and Kornienko each recorded a Sleep Log entry after waking today. The Sleep ISS-12 experiment monitors ambient light exposure and crew member activity and collects subjective evaluations of sleep and alertness.  The investigation examines the effects of space flight and ambient light exposure on sleep during a year-long mission on the ISS.   Payload Network Attached Storage (NAS) Deployment:  Kelly began deployment of the Payload NAS at the Laboratory Module aft bulkhead location. The large storage device will be utilized for storing ISS Experiment data.   44 Soyuz (44S) Prepack:  Kelly continued prepacking items in 44S in preparation for return to Earth next Tuesday, March 1.   Today’s Planned Activities All activities were completed unless otherwise noted. Morning Inspection, Laptop RS1(2) Reboot / Onboard Computer System (БВС) SLEEP – Questionnaire Morning Inspection. SM ПСС (Caution & Warning Panel) Test RSS 1, 2 Reboot / r/g 1460 NEIROIMMUNITET. Saliva collection and questionnaire filling out / r/g 1535 HRF – Sample Collection and Prep for Stowage Insertion SLEEP Questionnaire NEIROIMMUNITET. Saliva Test / r/g 1531 TWIN – Sample Collection HRF – Sample Insertion into MELFI MORZE. Measuring Bioimpedance Using SPRUT-2 r/g 1535 HRF – Sample Insertion into MELFI TWIN – Urine Sample Collection HRF – Sample Insertion into MELFI MORZE. NEIROIMMUNITET. CORRECTSIYA. Blood Sample / r/g 1535 NEIROIMMUNITET. Venous blood sample processing (smear) / r/g 1535 MORZE. CORRECTSIYA. Venous blood sample processing using Plasma-03 centrifuge / r/g 1535 AIRMON – Hardware Activation NEIROIMMUNITET. Venous blood sample processing using Plasma-03 centrifuge / r/g 1535 CORRECTSIYA. Closeout Ops / r/g 1535 MORZE. NEIROIMMUNITET. CORRECTSIYA. Handover to USOS for MELFI Insertion / r/g 1535 Diagnostics of FGB Power Supply System Filter Units (БФ-2) and Main Bus Assembly (БСШ-2) r/g 1497 RUEXP – MELFI Insertion of Samples Portable Fan Assembly (PFA) Setup AIRMON – Set up and first measurement Crew Departure Prep CIR Alignment Guide Installation NEIROIMMUNITET. Closeout Ops / r/g 1531 HAM radio session from Columbus Charging GoPro HERO3 Camcorder battery pair 1 – start Crew Departure Prep MORZE. Psycho-physiological Evaluation: Tsentrovka, SENSOR Tests Water Recovery and Management (WRM): Configure Condensate Collection HRF – Stowage/Retrieval of Urine Containment Bag Diagnostics of FGB СУБК instruments 11М156М r/g 1496 AIRMON – Calibration and Measurements LBNP Exercise (PRELIMINARY) r/g 1533 Assisting with LBNP Training / r/g 1533 On MCC Go Urine transfer from EDV-U to Progress 431 (DC1) Rodnik H2O Tank 1 and flushing B1 connector from EDV / r/g 1534 AIRMON – Measurements Kentavr fit check AIRMON – Preparation and Review Terminating charge of GoPro HERO3 Camcorder battery pair 1 and initiating charge of pair 2 Assisting with LBNP Training / r/g 1533 LBNP Exercise (PRELIMINARY) r/g 1533 AIRMON – Measurement at Low Pressure AIRMON – Experiment Ops Audit of Central Post (ЦП) Control Laptop Equipment r/g 1532 Terminating charge of GoPro HERO3 Camcorder battery pair 2 MORZE. Psycho-physiological Evaluation: SUPOS Test Video camera GoPro HERO3 Prep for Soyuz 718 Descent Ops. Camera Adjustment US items prepack for return on Soyuz 718 СОЖ Maintenance MORZE. Closeout Ops NEIROIMMUNITET. Hair Sample / r/g 1535 AIRMON – Experiment Ops AIRMON – Measurements Verification of ИП-1 Flow Sensor Position / Pressure Control & Atmosphere Monitoring System AIRMON – Overview INTERACTION-2. Experiment Ops / r/g 1528 Soyuz 718 Stowage Ops / r/g 1444 PAO Hardware Setup Crew Prep for PAO PAO Event CONTENT. Experiment Ops / r/g 1530 IMS Delta File Prep CONTENT. Experiment Ops / r/g 1529 COGNITION – Battery Test AIRMON – Hardware Powerdown Temperature and Humidity Control (THC) Portable Fan Assembly (PFA) Deactivation Crew Discretionary Conference NEIROIMMUNITET. Completing Questionnaire / r/g 1535 NEIROIMMUNITET. Saliva Test / r/g 1535   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. Airway Monitoring support   Three-Day Look Ahead: Friday, 02/26:  Crew Departure Prep, Airway Monitoring Cleanup, Soyuz Descent Drill, JEM Stowage Frame Install Part 1, BASS Saturday, 02/27:  Crew off duty, weekly cleaning Sunday, 02/28: Crew off duty   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) On [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Shutdown Urine Processing Assembly (UPA) Shutdown Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1Li2kNv
via IFTTT

I have a new follower on Twitter


Rick Sturm
CEO Enterprise Management Assoc., author of 6 IT books Tweet on: #BI, #BigData, #IoT #ITSM, #SLM, Love the outdoors, & world travel. Quelquefois en français.
Boulder, Colorado
http://t.co/aGCHPy3byi
Following: 12843 - Followers: 18418

February 26, 2016 at 04:13AM via Twitter http://twitter.com/Rick345

I have a new follower on Twitter


David Nordella
@BeneficntGuild collates social media posts for physicians | Speak with your doctor about any medical information | IPA | primary care physicians
Southern California
http://t.co/lbsbDupCSo
Following: 4477 - Followers: 6048

February 26, 2016 at 03:37AM via Twitter http://twitter.com/BeneficentGuild

I have a new follower on Twitter


Rebekah Radice
Award Winning #SocialMedia Writer, Strategist, Author, Speaker. Brand Evangelist @PostPlanner. Co-Founder @InfluencerChat Every Tues 5pm PT #InfluencerChat.
Los Angeles, CA
https://t.co/8yhM89JNyp
Following: 27632 - Followers: 67702

February 26, 2016 at 03:17AM via Twitter http://twitter.com/RebekahRadice

I have a new follower on Twitter


VALiNTRY Jobs
VALiNTRY is a National, Values-based IT & Finance/Accounting Consulting and Staffing firm with offices in Orlando, Nashville, and DFW. Also @VALiNTRY
United States
https://t.co/7cUEuOdNNL
Following: 4452 - Followers: 5683

February 26, 2016 at 01:37AM via Twitter http://twitter.com/VALINTRYjobs

I have a new follower on Twitter


Outset
#Data analysis & management software for #startup #accelerators, but will post about any cool data!
Nashville, TN
http://t.co/mvSzMWXhaE
Following: 483 - Followers: 518

February 26, 2016 at 12:37AM via Twitter http://twitter.com/Outset_Data

Highest, Tallest, and Closest to the Stars


Fans of planet Earth probably recognize its highest mountain, the Himalayan Mount Everest, on the left in this 3-panel skyscape of The World at Night. Shrouded in cloud Everest's peak is at 8,848 meters (29,029 feet) elevation above sea level. In the middle panel, stars trail above volcanic Mauna Kea forming part of the island of Hawaii. Festooned with astronomical observatories, its summit lies a mere 4,168 meters above sea level. Still, measured from its base starting below the ocean's surface, Mauna Kea is over 10,000 meters tall, making it Earth's tallest mountain from base to summit. At right, beneath the arc of the Milky Way is the Andean mountain Chimborazo in Ecuador. The highest equatorial mountain, the Chimborazo volcano's peak elevation is 6,268 meters above sea level. But rotating planet Earth is a flattened sphere (oblate spheroid) in shape, its equatorial diameter greater than its diameter measured pole to pole. Sitting nearly on top of Earth's greatest equatorial bulge, Chimborazo's peak is the farthest point on the planet's surface from the center, over 2,000 meters farther from the center of the Earth than Everest's peak. That makes Chimborazo's summit the place on Earth's surface closest to the stars. via NASA http://ift.tt/1XOFjnl

I have a new follower on Twitter


SAM Rizvi
Corporate cog turned entrepreneurial activist who loves Reuben sandwiches.
HKG LAX BOS
http://t.co/6rkyzd0IRx
Following: 2488 - Followers: 4250

February 26, 2016 at 12:08AM via Twitter http://twitter.com/samhkpk

Thursday, February 25, 2016

network-anonymous-i2p

network-anonymous-i2p 0.10.0. Haskell API for I2P anonymous networking http://ift.tt/1XpDzUYanonymous-i2p · LTS Haskell 5.4 ...

from Google Alert - anonymous http://ift.tt/1Oz60Fs
via IFTTT

I have a new follower on Twitter


Cam Munro
Digital Storyteller #Marketing and #Entrepreneur #blogger & #vlogger, Master of Digital Media (MDM) Toronto.
Toronto, Ontario
https://t.co/y3HCTH0Oj6
Following: 3166 - Followers: 3697

February 25, 2016 at 11:07PM via Twitter http://twitter.com/MunroCameron

Learning functions across many orders of magnitudes. (arXiv:1602.07714v1 [cs.LG])

Learning non-linear functions can be hard when the magnitude of the target function is unknown beforehand, as most learning algorithms are not scale invariant. We propose an algorithm to adaptively normalize these targets. This is complementary to recent advances in input normalization. Importantly, the proposed method preserves the unnormalized outputs whenever the normalization is updated to avoid instability caused by non-stationarity. It can be combined with any learning algorithm and any non-linear function approximation, including the important special case of deep learning. We empirically validate the method in supervised learning and reinforcement learning and apply it to learning how to play Atari 2600 games. Previous work on applying deep learning to this domain relied on clipping the rewards to make learning in different games more homogeneous, but this uses the domain-specific knowledge that in these games counting rewards is often almost as informative as summing these. Using our adaptive normalization we can remove this heuristic without diminishing overall performance, and even improve performance on some games, such as Ms. Pac-Man and Centipede, on which previous methods did not perform well.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Qit6Cj
via IFTTT

Toward Game Level Generation from Gameplay Videos. (arXiv:1602.07721v1 [cs.AI])

Algorithms that generate computer game content require game design knowledge. We present an approach to automatically learn game design knowledge for level design from gameplay videos. We further demonstrate how the acquired design knowledge can be used to generate sections of game levels. Our approach involves parsing video of people playing a game to detect the appearance of patterns of sprites and utilizing machine learning to build a probabilistic model of sprite placement. We show how rich game design information can be automatically parsed from gameplay videos and represented as a set of generative probabilistic models. We use Super Mario Bros. as a proof of concept. We evaluate our approach on a measure of playability and stylistic similarity to the original levels as represented in the gameplay videos.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1TaJniP
via IFTTT

Reinforcement Learning of POMDP's using Spectral Methods. (arXiv:1602.07764v1 [cs.AI])

We propose a new reinforcement learning algorithm for partially observable Markov decision processes (POMDP) based on spectral decomposition methods. While spectral methods have been previously employed for consistent learning of (passive) latent variable models such as hidden Markov models, POMDPs are more challenging since the learner interacts with the environment and possibly changes the future observations in the process. We devise a learning algorithm running through episodes, in each episode we employ spectral techniques to learn the POMDP parameters from a trajectory generated by a fixed policy. At the end of the episode, an optimization oracle returns the optimal memoryless planning policy which maximizes the expected reward based on the estimated POMDP model. We prove an order-optimal regret bound w.r.t. the optimal memoryless policy and efficient scaling with respect to the dimensionality of observation and action spaces.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1THDTM1
via IFTTT

Top-N Recommendation with Novel Rank Approximation. (arXiv:1602.07783v1 [cs.IR])

The importance of accurate recommender systems has been widely recognized by academia and industry. However, the recommendation quality is still rather low. Recently, a linear sparse and low-rank representation of the user-item matrix has been applied to produce Top-N recommendations. This approach uses the nuclear norm as a convex relaxation for the rank function and has achieved better recommendation accuracy than the state-of-the-art methods. In the past several years, solving rank minimization problems by leveraging nonconvex relaxations has received increasing attention. Some empirical results demonstrate that it can provide a better approximation to original problems than convex relaxation. In this paper, we propose a novel rank approximation to enhance the performance of Top-N recommendation systems, where the approximation error is controllable. Experimental results on real data show that the proposed rank approximation improves the Top-$N$ recommendation accuracy substantially.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1THDTvL
via IFTTT

Modeling cumulative biological phenomena with Suppes-Bayes causal networks. (arXiv:1602.07857v1 [cs.AI])

Several statistical techniques have been recently developed for the inference of cancer progression models from the increasingly available NGS cross sectional mutational profiles. A particular algorithm, CAPRI, was proven to be the most efficient with respect to sample size and level of noise in the data. The algorithm combines structural constraints based on Suppes' theory of probabilistic causation and maximum likelihood fit with regularization,and defines constrained Bayesian networks, named Suppes-Bayes Causal Networks(SBCNs), which account for the selective advantage relations among genomic events. In general, SBCNs are effective in modeling any phenomenon driven by cumulative dynamics, as long as the modeled events are persistent. We here discuss on the effectiveness of the SBCN theoretical framework and we investigate the inference of: (i) the priors based on Suppes' theory and (ii) different maximum likelihood regularization parameters on the inference performance estimated on large synthetically generated datasets.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/24sg8eL
via IFTTT

Probably Approximately Correct Greedy Maximization. (arXiv:1602.07860v1 [cs.AI])

Submodular function maximization finds application in a variety of real-world decision-making problems. However, most existing methods, based on greedy maximization, assume it is computationally feasible to evaluate F, the function being maximized. Unfortunately, in many realistic settings F is too expensive to evaluate exactly even once. We present probably approximately correct greedy maximization, which requires access only to cheap anytime confidence bounds on F and uses them to prune elements. We show that, with high probability, our method returns an approximately optimal set. We propose novel, cheap confidence bounds for conditional entropy, which appears in many common choices of F and for which it is difficult to find unbiased or bounded estimates. Finally, results on a real-world dataset from a multi-camera tracking system in a shopping mall demonstrate that our approach performs comparably to existing methods, but at a fraction of the computational cost.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Qit6lM
via IFTTT

Weight Normalization: A Simple Reparameterization to Accelerate Training of Deep Neural Networks. (arXiv:1602.07868v1 [cs.LG])

We present weight normalization: a reparameterization of the weight vectors in a neural network that decouples the length of those weight vectors from their direction. By reparameterizing the weights in this way we improve the conditioning of the optimization problem and we speed up convergence of stochastic gradient descent. Our reparameterization is inspired by batch normalization but does not introduce any dependencies between the examples in a minibatch. This means that our method can also be applied successfully to recurrent models such as LSTMs and to noise-sensitive applications such as deep reinforcement learning or generative models, for which batch normalization is less well suited. Although our method is much simpler, it still provides much of the speed-up of full batch normalization. In addition, the computational overhead of our method is lower, permitting more optimization steps to be taken in the same amount of time. We demonstrate the usefulness of our method on applications in supervised image recognition, generative modelling, and deep reinforcement learning.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VIg3Oa
via IFTTT

Thompson Sampling is Asymptotically Optimal in General Environments. (arXiv:1602.07905v1 [cs.LG])

We discuss a variant of Thompson sampling for nonparametric reinforcement learning in a countable classes of general stochastic environments. These environments can be non-Markov, non-ergodic, and partially observable. We show that Thompson sampling learns the environment class in the sense that (1) asymptotically its value converges to the optimal value in mean and (2) given a recoverability assumption regret is sublinear.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/24sga6v
via IFTTT

Causal Discovery from Subsampled Time Series Data by Constraint Optimization. (arXiv:1602.07970v1 [cs.AI])

This paper focuses on causal structure estimation from time series data in which measurements are obtained at a coarser timescale than the causal timescale of the underlying system. Previous work has shown that such sub-sampling can lead to significant errors about the system's causal structure if not properly taken into account. In this paper, we first consider the search for the system timescale causal structures that correspond to a given measurement timescale structure. We provide a constraint satisfaction procedure whose computational performance is several orders of magnitude better than previous approaches, and that has considerably broader applicability. We then consider finite sample data as input, and propose the first constraint optimization approach for recovering the system timescale causal structure. This algorithm optimally recovers from possible conflicts due to statistical errors. More generally, these advances allow for a robust and non-parametric estimation of system timescale causal structures from subsampled time series data.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/21vgteo
via IFTTT

How effective can simple ordinal peer grading be?. (arXiv:1602.07985v1 [cs.AI])

Ordinal peer grading has been proposed as a simple and scalable solution for computing reliable information about student performance in massive open online courses. The idea is to outsource the grading task to the students themselves as follows. After the end of an exam, each student is asked to rank ---in terms of quality--- a bundle of exam papers by fellow students. An aggregation rule will then combine the individual rankings into a global one that contains all students. We define a broad class of simple aggregation rules and present a theoretical framework for assessing their effectiveness. When statistical information about the grading behaviour of students is available, the framework can be used to compute the optimal rule from this class with respect to a series of performance objectives. For example, a natural rule known as Borda is proved to be optimal when students grade correctly. In addition, we present extensive simulations and a field experiment that validate our theory and prove it to be extremely accurate in predicting the performance of aggregation rules even when only rough information about grading behaviour is available.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1RroAE9
via IFTTT

Meta-learning within Projective Simulation. (arXiv:1602.08017v1 [cs.AI])

Learning models of artificial intelligence can nowadays perform very well on a large variety of tasks. However, in practice different task environments are best handled by different learning models, rather than a single, universal, approach. Most non-trivial models thus require the adjustment of several to many learning parameters, which is often done on a case-by-case basis by an external party. Meta-learning refers to the ability of an agent to autonomously and dynamically adjust its own learning parameters, or meta-parameters. In this work we show how projective simulation, a recently developed model of artificial intelligence, can naturally be extended to account for meta-learning in reinforcement learning settings. The projective simulation approach is based on a random walk process over a network of clips. The suggested meta-learning scheme builds upon the same design and employs clip networks to monitor the agent's performance and to adjust its meta-parameters "on the fly". We distinguish between "reflexive adaptation" and "adaptation through learning", and show the utility of both approaches. In addition, a trade-off between flexibility and learning-time is addressed. The extended model is examined on three different kinds of reinforcement learning tasks, in which the agent has different optimal values of the meta-parameters, and is shown to perform well, reaching near-optimal to optimal success rates in all of them, without ever needing to manually adjust any meta-parameter.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1THDQQn
via IFTTT

Hip Hop Anonymous

Buy Hip Hop Anonymous tickets at the The Local 662 in St Petersburg, FL for Apr 21, 2016 08:00 PM at Ticketmaster.

from Google Alert - anonymous http://ift.tt/21veO8D
via IFTTT

SportsCenter Video: Scott Van Pelt's Baltimore accent when discussing Orioles roster has Tim Kurkjian in stitches (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles: OF Dexter Fowler re-signing with the Cubs is an \"absolute gut punch\" for Baltimore, writes Eddie Matz (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous

At the request of the author, this piece has been published anonymously.

from Google Alert - anonymous http://ift.tt/21uw8KQ
via IFTTT

[FD] Executable installers are vulnerable^WEVIL (case 4): InstallShield's wrapper and setup.exe

Re: [FD] Executable installers are vulnerable^WEVIL (case 26): the installer of GIMP for Windows allows arbitrary (remote) and escalation of privilege

[FD] Executable installers are vulnerable^WEVIL (case 26): the installer of GIMP for Windows allows arbitrary (remote) and escalation of privilege

[FD] Various Linux Kernel USERNS Issues

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] [CVE-2015-5345] Information disclosure vulnerability in Apache Tomcat

================================================================================ Information disclosure vulnerability in Apache Tomcat ================================================================================ Web version at: http://ift.tt/1QAnVgp ================================================================================ On a pentest for a client we discovered a way to obtain information about a web application's internal structure from the network. We reported the issue to the vendor and a fix was released. The following security advisory details the vulnerability and how to resolve it. CVE reference: CVE-2015-5345 CVSS score: 5.1 (medium) CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C Affected systems ================ Apache Tomcat 9.0.0.M1 Apache Tomcat 8.0.0 to 8.0.29 Apache Tomcat 7.0.0 to 7.0.67 Apache Tomcat 6.0.0 to 6.0.44 Status of older (unsupported) versions of Apache Tomcat is unknown Overview ======== Because the Apache Tomcat application server responds to HTTP requests for directories with a redirect (appending a trailing slash) if the directory exists in the application's .war file, remote unauthenticated users could detect the presence of an application, and map out the internal structure of the application using a dictionary attack. Impact ====== The impact of this issue is limited. The presence of a web application can be detected, and the use of Java can be detected even if identifying headers have been disabled (by trying to request the WEB-INF directory). Also, an attacker can determine if a certain string is a valid directory name in the application's .war file. Solution ======== Upgrade your Apache Tomcat installation to at least version 9.0.0.M3, 8.0.30, 7.0.68 or 6.0.45. Note that two new configuration directives were introduced in these versions of Apache Tomcat, one to re-enable Tomcat identifying directories (mapperDirectoryRedirectEnabled, off by default), and one to enable the web application presence identifying behaviour (mapperContextRootRedirectEnabled, on by default because switching it off might cause issues with existing web applications). So to completely solve this issue, update Apache Tomcat and switch off mapperContextRootRedirectEnabled for any web applications that you wish to be undetectable by unauthenticated visitors. Note (2) that earlier minor versions of Apache 6, 7, and 8 released after October 2015 may also be not vulnerable to this issue as fixes were introduced but re-engineered in the current versions due to regression issues. Update to at least one of the versions listed above to be sure of having the fix as described. Technical details ================= When a request is received for a non-existent resource, Tomcat responds with a response code of 404 as normal. However if there is a directory in the application's .war file corresponding to the requested name, Tomcat responds with a 302 redirect, adding a trailing slash to the request (which only then yields the 404). For example:

Source: Gmail -> IFTTT-> Blogger

[FD] Hacking Passwords, Lesson 11, Available Now!

Hi, Hacking Passwords, Lesson 11 just released! It's an ebook on hacking and security written exclusively for young adults. Free, open source download here: http://ift.tt/1JXMIx5 Sincerely, -pete.

Source: Gmail -> IFTTT-> Blogger

Re: [FD] Cisco ASA VPN - Zero Day Exploit

[FD] XSSer v1.7b: "ZiKA-47 Swarm!" released....

=========================================================================== XSSer v1.7b: "ZiKA-47 Swarm!" - 2011/2016 - (GPLv3.0) -> by psy

Source: Gmail -> IFTTT-> Blogger

[FD] D-Link, Netgear Router Vulnerabiltiies

Hello, We’d like to report several vulnerabilities in embedded devices developed by D-Link and Netgear, which were discovered using our FIRMADYNE framework for emulation and dynamic analysis of Linux-based embedded devices. For more information, refer to our academic paper and open-source release at http://ift.tt/1Q3dfd0. Several Netgear devices include unauthenticated webpages that pass form input directly to the command-line, allowing for a command injection attack in `boardData102.php`, `boardData103.php`, `boardDataJP.php`, `boardDataNA.php`, and `boardDataWW.php`. This has been assigned CVE-2016-1555. Affected devices include: Netgear WN604 Netgear WN802Tv2 Netgear WNAP210 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360 Several D-Link devices include a web server that is vulnerable to a buffer overflow while parsing the 'dlink_uid' cookie. The length of the value set in the cookie is obtained using strlen(), which is then passed to memcpy(), and the value is copied into a fixed-size buffer. This has been assigned CVE-2016-1558. Affected devices include: D-Link DAP-2310 D-Link DAP-2330 D-Link DAP-2360 D-Link DAP-2553 D-Link DAP-2660 D-Link DAP-2690 D-Link DAP-2695 Several Netgear devices include unauthenticated webpages that disclose the wireless WPS PIN, allowing for information disclosure. This has been assigned CVE-2016-1556. Affected devices include: Netgear WN604 Netgear WNAP210 Netgear WNAP320 Netgear WND930 Netgear WNDAP350 Netgear WNDAP360 Several devices by both D-Link and Netgear disclose wireless passwords and administrative usernames/passwords over SNMP, including OID’s iso.3.6.1.4.1.171.10.37.35.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.38.2.1.3.3.2.1.1.4, iso.3.6.1.4.1.171.10.37.35.4.1.1.1, iso.3.6.1.4.1.171.10.37.37.4.1.1.1, iso.3.6.1.4.1.171.10.37.38.4.1.1.1, iso.3.6.1.4.1.4526.100.7.8.1.5, iso.3.6.1.4.1.4526.100.7.9.1.5, iso.3.6.1.4.1.4526.100.7.9.1.7, and iso.3.6.1.4.1.4526.100.7.10.1.7. This has been assigned CVE-2016-1557 for Netgear devices, and CVE-2016-1559 for D-Link devices. Affected devices include: D-Link DAP-1353 D-Link DAP-2553 D-Link DAP-3520 Netgear WNAP320 Netgear WNDAP350 Netgear WNDAP360 We have not heard back from D-Link after contacting the vendor. Netgear will fix WN604 with firmware 3.3.3 by late February, but the tentative ETA for the remaining devices is mid-March. Thanks, Dominic

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2015-6541 : Multiple CSRF in Zimbra Mail interface

====================================== Multiple CSRF in Zimbra Mail interface ====================================== CVE-2015-6541 Description =========== Multiple CSRF vulnerabilities have been found in the Mail interface of Zimbra 8.0.9 GA Release, enabling to change account preferences like e-mail forwarding. CSRF ==== Forms in the preferences part of old releases of Zimbra are vulnerable to CSRF because of the lack of a CSRF token identifying a valid session. As a consequence, requests can be forged and played arbitrarily. **Access Vector**: remote **Security Risk**: low **Vulnerability**: CWE-352 **CVSS Base score**: 5.8

Source: Gmail -> IFTTT-> Blogger

[FD] CVE ID Request : Proxmox VE Insecure hostname checking (remote root exploit)

===================================================================== Proxmox VE 3/4 Insecure Hostname Checking (Remote Root Exploit, XSS, Privileges escalation) ===================================================================== Description =========== Proxmox is a popular virtualization solution based on KVM and Linux containers. A critical vulnerability has been found in Proxmox VE 3 (OpenVZ) and Proxmox VE 4 beta 1 (LXC) in the virtual machine creating form allowing authenticated remote users to overwrite configuration files settings. Configuration file overwriting ============================== Because the Proxmox VE application doesn't check the user-provided "hostname" POST parameter, it's possible to overwrite configuration files using a CRLF injection. In Proxmox VE 3, we successfully gained access to the host filesystem from a container and elevated our container capabilities, allowing us to obtain user credentials and sniff the network. In Proxmox VE 4b1, because LXC allows "hooks" to execute commands, we successfully gained root privileges on the host. It's also possible to exploit Proxmox clusters. **Access Vector**: remote **Security Risk**: high **Vulnerability**: CWE-915 Proof of Concept

Source: Gmail -> IFTTT-> Blogger

[FD] CVE ID Request : Centreon remote code execution

Unauthenticated Remote Command Execution in Centreon Web Interface ================================================================== Description =========== Centreon is a popular monitoring solution. A critical vulnerability has been found in the Centreon logging class allowing remote users to execute arbitrary commands. SQL injection leading to RCE ============================ Centreon logs SQL database errors in a log file using the "echo" system command and the exec() PHP function. On the authentification class, Centreon use htmlentities with the ENT_QUOTES options to filter SQL entities. However, Centreon doesn't filter the SQL escape character "\" and it is possible to generate an SQL Error. Because of the use of the "echo" system command with the PHP exec() function, and because of the lack of sanitization, it is possible to inject arbitrary system commands. **Access Vector**: remote **Security Risk**: high **Vulnerability**: CWE-78

Source: Gmail -> IFTTT-> Blogger

[FD] Ubiquiti Networks UniFi v3.2.10 Generic CSRF Protection Bypass

RCE Security Advisory http://ift.tt/1FlL0Pz 1. ADVISORY INFORMATION

Source: Gmail -> IFTTT-> Blogger

[FD] CSNC-2016-002 - Open Redirect in OpenAM

############################################################# # # COMPASS SECURITY ADVISORY http://ift.tt/JChVZk ############################################################# # # CSNC ID: CSNC-2016-002 # Product: OpenAM [1] # Vendor: ForgeRock # Subject: Open Redirect # Risk: Critical # Effect: Remotely exploitable # Author: Stephan Sekula (stephan.sekula@csnc.de) # Date: February 23rd 2016 # ############################################################# Introduction:

Source: Gmail -> IFTTT-> Blogger

[FD] CSNC-2016-001 - XSS in OpenAM

############################################################# # # COMPASS SECURITY ADVISORY http://ift.tt/JChVZk ############################################################# # # CSNC ID: CSNC-2016-001 # Product: OpenAM [1] # Vendor: ForgeRock # Subject: Cross-Site Scripting - XSS # Risk: High # Effect: Remotely exploitable # Author: Stephan Sekula (stephan.sekula@csnc.de) # Date: February 23rd 2016 # ############################################################# Introduction:

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2015-0955 - Stored XSS in Adobe Experience Manager (AEM)

############################################################# # # COMPASS SECURITY ADVISORY http://www.csnc.ch/ ############################################################# # # CSNC ID: CSNC-2015-011 # CVE ID : CVE-2015-0955 # Product: Adobe Experience Manager (AEM) [1] # Vendor: Adobe [2] # Subject: Stored Cross-Site Scripting (XSS) Vulnerability # Risk: Important # Effect: Exploitable by Authenticated AEM Users # Author: Damian Pfammatter (damian.pfammatter@csnc.ch) # Date: February 23rd 2016 # ############################################################# Introduction:

Source: Gmail -> IFTTT-> Blogger

NFL Buzz: RB Trent Richardson expected to sign with Ravens - AL.com; No. 3 pick in 2012 draft did not play last season (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


HitOpen
Everyone crowdsourcing. #crowdsourcing #marketing
Ottawa, Ontario
https://t.co/cObi7kuuYy
Following: 4791 - Followers: 3538

February 25, 2016 at 09:40AM via Twitter http://twitter.com/htopn

Apple is working on New iPhone Even It Can't Hack

Amid an ongoing dispute with the United States government over a court order to unlock iPhone 5C of one of the San Bernardino shooters Syed Farook… ...Apple started working on implementing stronger security measures "even it can't hack" to achieve un-hackability in its future iPhones. The Federal Bureau of Investigation (FBI) is deliberately forcing Apple to create a special, backdoored


from The Hacker News http://ift.tt/1OwKt08
via IFTTT

Block not appearing for anonymous users

I'm using the og multiple block and it works perfectly except that it disappears to anonymous users. The block itself has no visibility limits placed on it ...

from Google Alert - anonymous http://ift.tt/1S36z11
via IFTTT

Judge Confirms Government Paid CMU Scientists to Hack Tor Users for FBI

Everything is now crystal clear: The security researchers from Carnegie Mellon University (CMU) were hired by the federal officials to discover a technique that could help the FBI Unmask Tor users and Reveal their IP addresses as part of a criminal investigation. Yes, a federal judge in Washington has recently confirmed that the computer scientists at CMU's Software Engineering


from The Hacker News http://ift.tt/1Oww4AZ
via IFTTT

Asus Faces 20 years of Audits Over Poor Wi-Fi Router Security

Currently, Asus is undergoing through a troublesome situation after a lawsuit had been filed by the US Federal Trade Commission (FTC) regarding its Router Insecurity. On Tuesday, FTC settled charges with Asus, where the hardware manufacturing company agrees to: Undergo Independent Security Audits Once in 2 years, for the Next 2 Decades. This action had been taken as the result of


from The Hacker News http://ift.tt/1TAmcgj
via IFTTT

I have a new follower on Twitter


Andrew Rader
@SpaceX Engineer, @MIT PhD, Know-it-All (TV show) ★ Author: http://t.co/sdWa5mCX9l ★ Youtube: http://t.co/1Z0OfDGtUN ★ Tabletop Card Games: @NewHorizonGames
Planet Earth (for now)
http://t.co/PgljWay80a
Following: 61301 - Followers: 134692

February 25, 2016 at 02:51AM via Twitter http://twitter.com/marsrader

USA's Northeast Megalopolis from Space


Can you identify a familiar area in the northeast USA just from nighttime lights? It might be possible because many major cities are visible, including (right to left) New York, Philadelphia, Baltimore, Washington, Richmond and Norfolk -- Boston of the USA's Northeast megalopolis is not pictured. The featured image was taken in 2012 from the International Space Station. In the foreground are two Russian cargo ships with prominent solar panels. This Northeast megalopolis of the USA contains almost 20 percent of the people of the USA but only about 2 percent of the land area. Also known also as the Northeast Corridor and part of the Eastern Seaboard, about 10 percent of the world's largest companies are headquartered here. The near continuity of the lights seem to add credence to the 1960s-era prediction that the entire stretch is evolving into one continuous city. via NASA http://ift.tt/1QxN7Ei

Ozone Transport in the Tropical Western Pacific

NASA-funded scientists have traced the origins of mysterious pockets of high ozone concentrations and low water vapor in the air above the western Pacific Ocean near Guam to fires burning in Southeast Asia and in Africa, half a world away. These pockets of ozone--a powerful greenhouse gas--are three times more concentrated than surrounding air and are found at around 30,000 feet in the lower part of Earth's atmosphere known as the troposphere, within the cruising altitude of most commercial airliners. As a greenhouse gas, ozone in the troposphere is an important contributor to global warming, but because it varies widely in where it occurs and how long it stays aloft, its true impact on climate change is hard to determine. Researchers studying the air over Guam during the winter of 2014 during a pair of airborne field campaigns captured a comprehensive picture of the chemicals traveling with the ozone--chemicals such as hydrogen cyanide and acetonitrile, which originate in fires. Using a data-driven computer model, they then traced the ozone-laden air pockets back 10 to 15 days in most cases--right back to fires in either Southeast Asia, about 2,000 miles away, or tropical Africa, over 8,000 miles away. The animation begins by showing a single NCAR Gulfstream V aircraft flight from the CONTRAST campaign that was outfitted to measure various trace gases. From the measurements taken on this flight, the backflow trajectories are modelled using the NOAA HYSPLIT model, stepping back in time for the previous 10 days or until the trajectories encountered convection. The trajectories are coloured by observed aircraft ozone level where blue values represent low concentrations of ozone and red represents high values. The ozone value is invariant along each trajectory. The active fire locations detected during the prior 48 hours are shown as yellow/gold points. Areas depicting highly convective regions are shown in white.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1Q2yTy7
via IFTTT

Wednesday, February 24, 2016

How to Make Anonymous Payments with Bitcoin

This step-by-step guide will show you how to keep your Bitcoins safe and anonymous.

from Google Alert - anonymous http://ift.tt/1T8pqcn
via IFTTT

I have a new follower on Twitter


Steven John
Sagari specialise in providing hosted IT services, with a strong focus of adding value to our customers, by addressing their main frustrations and problems
UK
http://t.co/vGOPYZzERR
Following: 125 - Followers: 90

February 24, 2016 at 11:00PM via Twitter http://twitter.com/SagariLtd

I have a new follower on Twitter


Brian H.

Bellevue

Following: 3240 - Followers: 3305

February 24, 2016 at 09:28PM via Twitter http://twitter.com/TheDataWA

ISS Daily Summary Report – 02/24/16

Water Process Assembly (WPA) Status:  Following yesterday’s WPA Catalytic Reactor replacement, the WPA successfully completed a process cycle and is working nominally.  In addition, the crew returned Treadmill 2 (T2) and Water Recovery System (WRS)-1 Racks back to their nominal configuration.   Airway Monitoring:  Peake completed setup of a camera and hardware for Airway Monitoring in the US Airlock in preparation for Kopra and Peake to complete an Airway Monitoring session tomorrow.  The primary goal of the experiment is to determine how gravity and microgravity influence the turnover of Nitric Oxide (NO) in the lungs.  During future manned missions to the Moon and to Mars, airway inflammation due to toxic dust inhalation is a risk factor. Since dust may cause airway inflammation and since such inflammation can be monitored by exhaled NO (Nitric Oxide) analysis, the present study is highly relevant for astronaut health in future space programs.   Space Automated Bioproduct Laboratory (SABL):  Today, Peake initiated a two week checkout of the new NASA SABL facility in the US Laboratory but the SABL hardware was powered off after the hardware temperature rose beyond the nominal range.  Ground experts are investigating.  SABL is required for use with the Micro-10 investigation that has hardware arriving on the SpaceX-8 vehicle.  It is an upgrade to the long standing ISS incubator, Commercial Generic Bioprocessing Apparatus (CGBA). SABL supports a wide variety of experiments in the life, physical and material sciences with a focus on supporting research of biological systems and processes.  It is capable of supporting life science research on microorganisms, small organisms, animal cells, tissue cultures and small plants.   Electrostatic Levitation Furnace (ELF):  JAXA’s Ground team was not successful yesterday in checking out the ELF levitation control function.  Today’s checkout activities have been deferred while ground experts investigate the cause of the issues observed.  The ELF is an experimental facility designed to levitate, melt and solidify materials employing containerless processing techniques that use the electrostatic levitation method with charged samples and electrodes. With this facility, thermophysical properties of high temperature melts can be measured and solidification from deeply undercooled melts can be achieved.   Habitability: Kopra recorded a narrated video of a blood draw from Kelly for the Habitability investigation.  He captured details such as hardware and tool interface issues, volume needed to perform the task, and other human factors concerns for task performance.  The Habitability investigation results will be used to assess the relationship between crew members and their environment to better prepare for future long-duration spaceflights to destinations such as near earth asteroids and Mars. Observations recorded during 6 month and 1 year missions can help spacecraft designers determine how much habitable volume is required and whether a mission’s duration impacts how much space crew members need.   Twins Study:  In support of the Twins Study, Kelly continued his week-long Return minus 14 day (R-14) daily saliva and urine collections.  This investigation is an integrated compilation of ten different studies led by multiple investigators.  The studies take advantage of a unique opportunity to look at the effects of space travel on identical twins, with one of them experiencing space travel for a year while the other remains earth-bound for that same year.  The study looks at changes in the human body that are important in the fields of genetics, psychology, physiology, microbiology, and immunology.     Today’s Planned Activities All activities were completed unless otherwise noted. NEIROIMMUNITET. Saliva Sample / r/g 1505 SLEEP – Questionnaire Morning Inspection. SM ПСС (Caution & Warning Panel) RSS 1, 2 Reboot / r/g 1460 SLEEP Questionnaire Morning Inspection, Laptop RS1(2) Reboot / Onboard Computer System (БВС) HRF – Sample Collection and Prep for Stowage Insertion TWIN – Sample Collection NEIROIMMUNITET. Complete Questionnaire / r/g 1505 HRF – Sample Insertion into MELFI NEIROIMMUNITET. CORRECTSIYA. Blood Sample / r/g 1505 TWIN – Urine Sample Collection NEIROIMMUNITET. Venous blood sample processing (smear) / r/g 1505 HRF – Sample Insertion into MELFI NEIROIMMUNITET. CORRECTSIYA. Venous blood sample processing using Plasma-03 centrifuge / r/g 1505 HRF Blood Sample Collection and Cold Stowage CORRECTSIYA. Closeout Ops / r/g 1504 NEIROIMMUNITET. CORRECTSIYA. Handover to USOS for MELFI Insertion / r/g 1505 RUEXP – Blood Sample Insertion into MELFI HABIT – Video Setup HRF – Blood Sample collection operator assistance Scheduled monthly maintenance of Central Post Laptop Tagup with specialists / r/g 1495 HABIT – Terminate Video HRF Refrigerated Centrifuge Configuration Scheduled maintenance of Central Post Laptop – Start Test 1 r/g 1495 Fine Motor Skills – Test HRF – Blood Sample Collection Closeout Ops HRF – Sample Insertion into MELFI Scheduled maintenance of Central Post Laptop – Terminating Test 1 and Starting Test 2. r/g 1495 Complete the Dose Tracker application – Subject HRF Closeout Ops WRS Filter Kit Installation CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 1509 P/TV – Hardware Checkout AIRMON – Hardware Setup Soyuz 718 (MRM2) Cargo Stowage for Disposal / r/g 1424 NEIROIMMUNITET. Hair Sample / r/g 1505 Scheduled maintenance of Central Post Laptop – Start Test 3 r/g 1495 Catalytic Reactor ORU prep for stowage Progress 429 (Aft) Cargo Stowage for Disposal / r/g 1484 TWIN – Urine Sample Collection HRF – Sample Insertion into MELFI Soyuz 718 (MRM2) cargo stowage for return / r/g 1444 Scheduled maintenance of Central Post Laptop – Terminating Test 3 and Starting Test 4 r/g 1495 DAN. Experiment Operator Assistance / r/g 0119 DAN. Experiment Ops. r/g 0119 Periodic Fitness Evaluation – Nom Ops (subject) In Flight Maintenance (IFM) – WRS1 Filter Kit Removal In Flight Maintenance (IFM) – WRS1 Rack Closeout Scheduled maintenance of Central Post Laptop – Terminating Test 4 and Closeout Ops.r/g 1495 Crew Departure Prep CIR Alignment Guide Removal Airways Monitoring Briefing Preparation for diagnostics of power supply system (СЭС) and onboard complex control system (СУБК) units in FGB, R/G review. r/g 1496, 1497 T2/WRS1 Nominal Reconfig AIRMON – Hardware Powerdown Space Automated Bioproduct Lab (SABL) – Activation and Checkout Soyuz 718 (MRM2) Cargo Stowage for Return / r/g 1444 CORRECTSIYA. Logging Liquid […]

from ISS On-Orbit Status Report http://ift.tt/1LGN3AF
via IFTTT

Visual Genome: Connecting Language and Vision Using Crowdsourced Dense Image Annotations. (arXiv:1602.07332v1 [cs.CV])

Despite progress in perceptual tasks such as image classification, computers still perform poorly on cognitive tasks such as image description and question answering. Cognition is core to tasks that involve not just recognizing, but reasoning about our visual world. However, models used to tackle the rich content in images for cognitive tasks are still being trained using the same datasets designed for perceptual tasks. To achieve success at cognitive tasks, models need to understand the interactions and relationships between objects in an image. When asked "What vehicle is the person riding?", computers will need to identify the objects in an image as well as the relationships riding(man, carriage) and pulling(horse, carriage) in order to answer correctly that "the person is riding a horse-drawn carriage".

In this paper, we present the Visual Genome dataset to enable the modeling of such relationships. We collect dense annotations of objects, attributes, and relationships within each image to learn these models. Specifically, our dataset contains over 100K images where each image has an average of 21 objects, 18 attributes, and 18 pairwise relationships between objects. We canonicalize the objects, attributes, relationships, and noun phrases in region descriptions and questions answer pairs to WordNet synsets. Together, these annotations represent the densest and largest dataset of image descriptions, objects, attributes, relationships, and question answers.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VFBlvZ
via IFTTT

The Possibilities and Limitations of Private Prediction Markets. (arXiv:1602.07362v1 [cs.GT])

We consider the design of private prediction markets, financial markets designed to elicit predictions about uncertain events without revealing too much information about market participants' actions or beliefs. Our goal is to design market mechanisms in which participants' trades or wagers influence the market's behavior in a way that leads to accurate predictions, yet no single participant has too much influence over what others are able to observe. We study the possibilities and limitations of such mechanisms using tools from differential privacy. We begin by designing a private one-shot wagering mechanism in which bettors specify a belief about the likelihood of a future event and a corresponding monetary wager. Wagers are redistributed among bettors in a way that more highly rewards those with accurate predictions. We provide a class of wagering mechanisms that are guaranteed to satisfy truthfulness, budget balance in expectation, and other desirable properties while additionally guaranteeing epsilon-joint differential privacy in the bettors' reported beliefs, and analyze the trade-off between the achievable level of privacy and the sensitivity of a bettor's payment to her own report. We then ask whether it is possible to obtain privacy in dynamic prediction markets, focusing our attention on the popular cost-function framework in which securities with payments linked to future events are bought and sold by an automated market maker. We show that under general conditions, it is impossible for such a market maker to simultaneously achieve bounded worst-case loss and epsilon-differential privacy without allowing the privacy guarantee to degrade extremely quickly as the number of trades grows, making such markets impractical in settings in which privacy is valued. We conclude by suggesting several avenues for potentially circumventing this lower bound.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VFBlvW
via IFTTT

Parametric Prediction from Parametric Agents. (arXiv:1602.07435v1 [cs.GT])

We consider a problem of prediction based on opinions elicited from heterogeneous rational agents with private information. Making an accurate prediction with a minimal cost requires a joint design of the incentive mechanism and the prediction algorithm. Such a problem lies at the nexus of statistical learning theory and game theory, and arises in many domains such as consumer surveys and mobile crowdsourcing. In order to elicit heterogeneous agents' private information and incentivize agents with different capabilities to act in the principal's best interest, we design an optimal joint incentive mechanism and prediction algorithm called COPE (COst and Prediction Elicitation), the analysis of which offers several valuable engineering insights. First, when the costs incurred by the agents are linear in the exerted effort, COPE corresponds to a "crowd contending" mechanism, where the principal only employs the agent with the highest capability. Second, when the costs are quadratic, COPE corresponds to a "crowd-sourcing" mechanism that employs multiple agents with different capabilities at the same time. Numerical simulations show that COPE improves the principal's profit and the network profit significantly (larger than 30% in our simulations), comparing to those mechanisms that assume all agents have equal capabilities.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/21hPaYk
via IFTTT

A Bayesian Approach to the Data Description Problem. (arXiv:1602.07507v1 [cs.LG])

In this paper, we address the problem of data description using a Bayesian framework. The goal of data description is to draw a boundary around objects of a certain class of interest to discriminate that class from the rest of the feature space. Data description is also known as one-class learning and has a wide range of applications.

The proposed approach uses a Bayesian framework to precisely compute the class boundary and therefore can utilize domain information in form of prior knowledge in the framework. It can also operate in the kernel space and therefore recognize arbitrary boundary shapes. Moreover, the proposed method can utilize unlabeled data in order to improve accuracy of discrimination.

We evaluate our method using various real-world datasets and compare it with other state of the art approaches of data description. Experiments show promising results and improved performance over other data description and one-class learning algorithms.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1T89d77
via IFTTT

Multilingual Twitter Sentiment Classification: The Role of Human Annotators. (arXiv:1602.07563v1 [cs.CL])

What are the limits of automated Twitter sentiment classification? We analyze a large set of manually labeled tweets in different languages, use them as training data, and construct automated classification models. It turns out that the quality of classification models depends much more on the quality and size of training data than on the type of the model trained. Experimental results indicate that there is no statistically significant difference between the performance of the top classification models. We quantify the quality of training data by applying various annotator agreement measures, and identify the weakest points of different datasets. We show that the model performance approaches the inter-annotator agreement when the size of the training set is sufficiently large. However, it is crucial to regularly monitor the self- and inter-annotator agreements since this improves the training datasets and consequently the model performance. Finally, we show that there is strong evidence that humans perceive the sentiment classes (negative, neutral, and positive) as ordered.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VFBkrU
via IFTTT

Stochastic Shortest Path with Energy Constraints in POMDPs. (arXiv:1602.07565v1 [cs.AI])

We consider partially observable Markov decision processes (POMDPs) with a set of target states and positive integer costs associated with every transition. The traditional optimization objective (stochastic shortest path) asks to minimize the expected total cost until the target set is reached. We extend the traditional framework of POMDPs to model energy consumption, which represents a hard constraint. The energy levels may increase and decrease with transitions, and the hard constraint requires that the energy level must remain positive in all steps till the target is reached. First, we present a novel algorithm for solving POMDPs with energy levels, developing on existing POMDP solvers and using RTDP as its main method. Our second contribution is related to policy representation. For larger POMDP instances the policies computed by existing solvers are too large to be understandable. We present an automated procedure based on machine learning techniques that automatically extracts important decisions of the policy allowing us to compute succinct human readable policies. Finally, we show experimentally that our algorithm performs well and computes succinct policies on a number of POMDP instances from the literature that were naturally enhanced with energy levels.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/21hPaYg
via IFTTT

Time and Activity Sequence Prediction of Business Process Instances. (arXiv:1602.07566v1 [cs.AI])

The ability to know in advance the trend of running process instances, with respect to different features, such as the expected completion time, would allow business managers to timely counteract to undesired situations, in order to prevent losses. Therefore, the ability to accurately predict future features of running business process instances would be a very helpful aid when managing processes, especially under service level agreement constraints. However, making such accurate forecasts is not easy: many factors may influence the predicted features.

Many approaches have been proposed to cope with this problem but all of them assume that the underling process is stationary. However, in real cases this assumption is not always true. In this work we present new methods for predicting the remaining time of running cases. In particular we propose a method, assuming process stationarity, which outperforms the state-of-the-art and two other methods which are able to make predictions even with non-stationary processes. We also describe an approach able to predict the full sequence of activities that a running case is going to take. All these methods are extensively evaluated on two real case studies.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VFBlvU
via IFTTT

A Survey on Domain-Specific Languages for Machine Learning in Big Data. (arXiv:1602.07637v1 [cs.SE])

The amount of data generated in the modern society is increasing rapidly. New problems and novel approaches of data capture, storage, analysis and visualization are responsible for the emergence of the Big Data research field. Machine Learning algorithms can be used in Big Data to make better and more accurate inferences. However, because of the challenges Big Data imposes, these algorithms need to be adapted and optimized to specific applications. One important decision made by software engineers is the choice of the language that is used in the implementation of these algorithms. Therefore, this literature survey identifies and describes domain-specific languages and frameworks used for Machine Learning in Big Data. By doing this, software engineers can then make more informed choices and beginners have an overview of the main languages used in this domain.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/21hPdDv
via IFTTT

New Results on Equilibria in Strategic Candidacy. (arXiv:1306.1849v2 [cs.GT] UPDATED)

We consider a voting setting where candidates have preferences about the outcome of the election and are free to join or leave the election. The corresponding candidacy game, where candidates choose strategically to participate or not, has been studied %initially by Dutta et al., who showed that no non-dictatorial voting procedure satisfying unanimity is candidacy-strategyproof, that is, is such that the joint action where all candidates enter the election is always a pure strategy Nash equilibrium. Dutta et al. also showed that for some voting tree procedures, there are candidacy games with no pure Nash equilibria, and that for the rule that outputs the sophisticated winner of voting by successive elimination, all games have a pure Nash equilibrium. No results were known about other voting rules. Here we prove several such results. For four candidates, the message is, roughly, that most scoring rules (with the exception of Borda) do not guarantee the existence of a pure Nash equilibrium but that Condorcet-consistent rules, for an odd number of voters, do. For five candidates, most rules we study no longer have this guarantee. Finally, we identify one prominent rule that guarantees the existence of a pure Nash equilibrium for any number of candidates (and for an odd number of voters): the Copeland rule. We also show that under mild assumptions on the voting rule, the existence of strong equilibria cannot be guaranteed.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/14QStD1
via IFTTT

ASlib: A Benchmark Library for Algorithm Selection. (arXiv:1506.02465v2 [cs.AI] UPDATED)

The task of algorithm selection involves choosing an algorithm from a set of algorithms on a per-instance basis in order to exploit the varying performance of algorithms over a set of instances. The algorithm selection problem is attracting increasing attention from researchers and practitioners in AI. Years of fruitful applications in a number of domains have resulted in a large amount of data, but the community lacks a standard format or repository for this data. This situation makes it difficult to share and compare different approaches effectively, as is done in other, more established fields. It also unnecessarily hinders new researchers who want to work in this area. To address this problem, we introduce a standardized format for representing algorithm selection scenarios and a repository that contains a growing number of data sets from the literature. Our format has been designed to be able to express a wide variety of different scenarios. Demonstrating the breadth and power of our platform, we describe a set of example experiments that build and evaluate algorithm selection models through a common interface. The results display the potential of algorithm selection to achieve significant performance improvements across a broad range of problems and algorithms.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1cHsY1G
via IFTTT

Identification and classification of TCM syndrome types among patients with vascular mild cognitive impairment using latent tree analysis. (arXiv:1601.06923v2 [cs.AI] UPDATED)

Objective: To treat patients with vascular mild cognitive impairment (VMCI) using TCM, it is necessary to classify the patients into TCM syndrome types and to apply different treatments to different types. We investigate how to properly carry out the classification using a novel data-driven method known as latent tree analysis.

Method: A cross-sectional survey on VMCI was carried out in several regions in northern China from 2008 to 2011, which resulted in a data set that involves 803 patients and 93 symptoms. Latent tree analysis was performed on the data to reveal symptom co-occurrence patterns, and the patients were partitioned into clusters in multiple ways based on the patterns. The patient clusters were matched up with syndrome types, and population statistics of the clusters are used to quantify the syndrome types and to establish classification rules.

Results: Eight syndrome types are identified: Qi Deficiency, Qi Stagnation, Blood Deficiency, Blood Stasis, Phlegm-Dampness, Fire-Heat, Yang Deficiency, and Yin Deficiency. The prevalence and symptom occurrence characteristics of each syndrome type are determined. Quantitative classification rules are established for determining whether a patient belongs to each of the syndrome types.

Conclusions: A solution for the TCM syndrome classification problem associated with VMCI is established based on the latent tree analysis of unlabeled symptom survey data. The results can be used as a reference in clinic practice to improve the quality of syndrome differentiation and to reduce diagnosis variances across physicians. They can also be used for patient selection in research projects aimed at finding biomarkers for the syndrome types and in randomized control trials aimed at determining the efficacy of TCM treatments of VMCI.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1KDJtHb
via IFTTT

Orioles: SP Yovani Gallardo agrees to 2-year, $22 million contract; originally had agreed to 3-year, $35 million deal (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ravens: K Justin Tucker will receive franchise tag if team is unable to reach long-term contract, GM Ozzie Newsome said (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous user 41069a

Name, Anonymous user 41069a. User since, February 17, 2016. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons ...

from Google Alert - anonymous http://ift.tt/1p5sBF3
via IFTTT

Status message for anonymous users.

Shows a status message to anonymous users when CSS rewrites.

from Google Alert - anonymous http://ift.tt/1oByitT
via IFTTT

Anonymous partnerships among MSM and transgender women (TW)

Anonymous partnerships among MSM and transgender women (TW) recently diagnosed with HIV and other STIs in Lima, Peru: an individual-level ...

from Google Alert - anonymous http://ift.tt/1Q0WsHk
via IFTTT

'Anonymous' releases police officers' personal information

'Anonymous' releases police officers' personal information. Duration: 03:25 1 hr ago. SHARE · TWEET · SHARE · EMAIL. Cincinnati Police ...

from Google Alert - anonymous http://ift.tt/1T7q75Z
via IFTTT

Ravens: Ohio St. DE Joey Bosa, Florida CB Vernon Hargreaves are players team could focus on at combine - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Top 5 Facts about Anonymous

Hacktivists, pranksters or Cyber Terrorists; regardless of what you think of the organization it has certainly been influential. Welcome to WatchMojo's ...

from Google Alert - anonymous http://ift.tt/1LcEnax
via IFTTT

'Anonymous' releases police officers' personal information

'Anonymous' releases police officers' personal information. Feb. 24, 2016 - 3:25 - Cincinnati Police Department on high alert. Fox Business Channel ...

from Google Alert - anonymous http://ift.tt/1LFSS1t
via IFTTT

ISS Daily Summary Report – 02/23/16

Space Automated Bioproduct Laboratory (SABL):  Today, for the NASA SABL facility,  Peake set up two SABL units in in the US Laboratory module and configured power, data, and thermal connections to the rack.  SABL is an upgrade to the long standing ISS incubator, Commercial Generic Bioprocessing Apparatus (CGBA). SABL supports a wide variety of experiments in the life, physical and material sciences with a focus on supporting research of biological systems and processes.  SABL is capable of supporting life science research on microorganisms, small organisms, animal cells, tissue cultures and small plants.   Fine Motor Skills:  Peake completed a session of the Fine Motor Skills experiment today.  He performed a series of interactive tasks on a touchscreen tablet. This investigation is the first fine motor skills study to measure long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity.   Water Processing Assembly (WPA) Catalytic Reactor Remove and Replace (R&R):  Kelly and Kopra performed a WPA Catalytic Reactor R&R this morning.  In addition, they took advantage of the access and replaced a degraded Gas Separator and Reactor Health Sensor within the Water Recovery System (WRS)-1 Rack, then cleaned the rack’s Avionics Air Assembly (AAA) inlet.   The crew was ahead of today’s timeline and proceeded with activities originally scheduled for tomorrow by installing a filter kit and performed an inspection on the failed Catalytic Reactor, then dried free standing water which was found within the unit.  The WPA Catalytic Reactor had been suspected of leaking since November, and had shown signs of increased leakage the past few weeks.  Ground teams have since activated WPA and will be performing a series of checks on the system overnight.   Advanced Resistive Exercise Device (ARED) Rope Replace:  As part of routine maintenance, Peake replaced both ARED cable arm ropes.   Today’s Planned Activities All activities were completed unless otherwise noted. SLEEP – Questionnaire MORZE. Measuring Bioimpedance Using SPRUT-2 CORRECTSIYA. Logging Liquid and Food (Medication) Intake In Flight Maintenance (IFM) – Catalytic Reactor R&R CORRECTSIYA. Logging Liquid and Food (Medication) Intake On MCC Go Regeneration of БМП Ф2 Micropurification Cartridge IDENTIFIKATSIYA. Copying ИМУ-Ц Micro-Accelerometer Data to HDD for Return Replacement of Voltage Converter ПН28-120 Fine Motor Skills – Test MORZE. Psycho-physiological Evaluation: Tsentrovka, SENSOR Tests Photo/TV Battery Charge Initiation SABL – Hardware Setup MORZE. Psycho-physiological Evaluation: SUPOS Test AIRMON – Procedure Review Soyuz 718 Sokol Suit Leak Check EVA – Equipment transfer from Airlock Drying Sokol Space Suits – Setup Space Suit 1 and 2 for drying (Soyuz 718) AIRMON – Equipment Setup EXPOSE-R. Photography of P/L Hardware IDENTIFIKATSIYA. Copy ИМУ-Ц Micro-Accelerometer Data to HDD for return Crew Departure Prep Photo/TV  Battery charger battery swap PBA Relocation WRS Gas Separator R&R CORRECTSIYA. Logging Liquid and Food (Medication) Intake СОЖ Maintenance HABIT – Applications Overviews Termination of space suit 1, 2  Drying (Soyuz 718) ALGOMETRIA. Experiment Ops ARED – Rope Replacement (assistance) Start space suit 3 drying and set up the 1st pair of gloves for drying (Soyuz 718) Crew Departure Prep FE-4 Familiarization with specifics of CMS operation Terminate drying the first pair of gloves and start drying the second pair (Soyuz 718) Hardware Setup for PAO In Flight Maintenance (IFM) – Catalytic Reactor Sensor R&R Junction Box PS-120 Deployment in the Airlock to support Airway Monitoring Activity TV Session with Life News TV Channel MOTOCARD. Experiment Ops Terminate drying the second pair of gloves (Soyuz 718) TWIN – Urine Collection Hardware Setup Photo/TV Battery charger battery swap NEIROIMMUNITET. CORRECTSIYA. Experiment setup TWIN – Blood Collection Setup TWIN – Saliva Collection Hardware Setup Cleaning FGB Gas-Liquid Heat Exchanger (ГЖТ) Detachable Screens 1, 2, 3 In Flight Maintenance (IFM) – WRS1 Rack AAA Cleaning Terminate the 3rd space suit drying, start drying the 3rd pair of gloves (Soyuz 718) Terminate drying the 3rd pair of gloves (Soyuz 718) Stowing space suits and gloves after drying (Soyuz 718) IMS Delta File Prep HRF – Hardware Setup HRF2 – Hardware Reconfig Terminate Photo/Video Battery Charge Daily Planning Conference (S-band) Cognition Test NEIROIMMUNITET. Saliva Sample NEIROIMMUNITET. Setup. Starting 24-hr ECG Recording On MCC Go БМП Ф2 Absorption Cartridge Regeneration CORRECTSIYA. Logging Liquid and Food (Medication) Intake   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. WPA Checkout   Three-Day Look Ahead: Wednesday, 02/24:  Crew Departure Prep, Post CAT Reactor R&R Cleanup, SABL, Airway Monitoring Setup Thursday, 02/25:  Crew Departure Prep, 44S Prepack, Airway Monitoring Friday, 02/26:  Crew Departure Prep, Airway Monitoring Cleanup, Soyuz Descent Drill, JEM Stowage Frame Install   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Shutdown Urine Processing Assembly (UPA) Shutdown Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1R0VjNN
via IFTTT

Just One Device? No, Government wants Apple to Unlock 12 More iPhones

Until now, the FBI is asking for Apple's help in unlocking the iPhone belonging to one of the terrorists in the San Bernardino shootings that killed 14 and injured 24 in December. However, in addition to iPhone 5C belonged to San Bernardino shooter Syed Farook, the U.S. Justice Department is looking at court orders forcing Apple to help officials unlock at least 12 iPhones worldwide. <!-


from The Hacker News http://ift.tt/1PZfpdJ
via IFTTT

[FD] GTA Firewall GB-OS v6.2.02 - Filter Bypass & Persistent Vulnerability

Document Title: =============== GTA Firewall GB-OS v6.2.02 - Filter Bypass & Persistent Vulnerability References (Source): ==================== http://ift.tt/21fe5vG Release Date: ============= 2016-02-24 Vulnerability Laboratory ID (VL-ID): ==================================== 1713 Common Vulnerability Scoring System: ==================================== 3 Product & Service Introduction: =============================== GB-OS 6.2 presents numerous enhancements and new features for GTA firewall UTM appliances. GB-OS updates include new country blocking configuration options, additional report types and graphs, threat management and high availability enhancements, certificate management additions, IPv6 updates, and abundant web interface upgrades. GB-OS 6.2 also provides 64-bit support for GB-2100 and GB-2500. GB-Ware includes both 64-bit and 32-bit support. Certificate management updates include the addition of pkcs#7 format, CRLs and the ability to revoke certificates. High Availability features improved slave and group updating for easier failover management utilizing multiple firewalls, and an increased VRID range. Threat management updates protect your network and resources with up-to-the minute technology. The power of GTA`s Mail Proxy is boosted with support for EHLO and ESIZE commands and the addition of a DNS white list. The Web Filtering subscription option includes new refined content categories, providing more granular web access control for employees. Web interface improvements include menu navigation modifications, country flags, updated monitoring and activity pages and updated configuration wizards. These modifications and new elements aide administrators in configuring and managing GB-OS powered firewalls. Configuration verification messages and log messages have also been updated for improved firewall administration. (Copy of the Homepage: http://ift.tt/1QDmqUR ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered an application-side input validation web vulnerability in the official GTA Web Firewall appliance - GB OS v6.2.02. Vulnerability Disclosure Timeline: ================================== 2016-02-04: Researcher Notification & Coordination (Benjamin Kunz Mejri - Evolution Security GmbH) 2016-02-05: Vendor Notification (GTA Security Team) 2016-02-10: Vendor Response/Feedback (GTA Security Team) 2016-02-11: Vendor Fix/Patch #1 (GTA Developer Team) 2016-02-20: Security Acknowledgements (GTA Security Team) 2016-02-24: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Global Technology Assiciates Inc Product: GTA Web Firewall - Web-Application (Appliance) GB-2500, GB-2100, GB-850, GB-300 & GB-Ware Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ An application-side input validation web vulnerability has been discovered in the official GTA Web Firewall appliance - GB OS v6.2.02. The vulnerability allows a local attackers to inject own malicious script codes to the application-side of the affected modules context. The security vulnerability is located in the `Edit Packet Capture Filter` function of the `Monitor - Packet Capture - Monitor - Tools - Packet Capture` module. Remote attackers are able to inject script codes to the description input field by adding a new packet capture filter in the web firewall interface. The injection point is the `Edit Packet Capture Filter - Description Input Field` and the execution point is the `Packet Capture` item listing. The attack vector is persistent (application-side) and the request method to inject is POST. The web firewall interface has an own validation procedure to filter bad inputs. The input validation of the description can be bypassed by injection of a splitted char injection. The attacker can inject two payloads and the first is filtered, the second bypasses the validation. The security risk of the application-side validation web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.0. Exploitation of the persistent input validation web vulnerability requires a privileged appliance web-application user account and low user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects to malicious source and persistent manipulation of affected or connected application modules. Request Method(s): [+] POST Vulnerable Service(s): [+] GB OS v6.2.02 Vulnerable Module(s): [+] Packet Capture - [Monitor - Tools - Packet Capture] Vulnerable Input(s): [+] Edit Packet Capture Filter - [Description] Vulnerable Parameter(s): [+] description - listtextplain Affected Module(s): [+] Packet Capture Item Listing Proof of Concept (PoC): ======================= The application-side validation vulnerability and filter bypass can be exploited by local attackers with privileged web-application user account and low user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. PoC: Packet Capture - [Monitor -> Tools -> Packet Capture] ...

Source: Gmail -> IFTTT-> Blogger
">
Index Edit Interface Capture File Packets Captured Description
1 EXTERNAL
2 EXTERNAL
asdasd
3 EXTERNAL
">