Latest YouTube Video

Saturday, March 12, 2016

Orioles: Buck Showalter says X-rays on C Matt Wieters' right elbow did not raise any concerns; no current plans for MRI (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Re: [FD] Security contact @ Gigabyte

You're asking this on the full disclosure mailing list. Disclose it here. On 09/03/16 21:15, Gustavo Sorondo wrote: > Hi list, > > I'd like to know if anyone here know someone working on security at > Gigabyte (http://ift.tt/JtqnEZ), since we are trying to responsibly > report a high risk security flaw we found. > > We opened a ticket asking to be contacted by their security team, and the > answer we got was: > > "Thanks for your interest, but we already have a security team for our > websites. Regards, GIGABYTE" (sigh) > > So, if any of you knows someone in there, please let us know. > > Thanks! > > Gus.- > >

Source: Gmail -> IFTTT-> Blogger

[FD] Microsoft Edge CDOMTextNode::get_data type confusion

[FD] Wordpress Configuration Error on XDA-Developers.com led to full Web-Server Access and shut down website

Hello Subscribers, As an Introduction i would like to say that this is my first announcement and i am not happy about the way it went. I am a daily reader of the website XDA-Developers which is mainly announcing information about Android Devices and mobile trends. At the 07.03.2016 around 10:10 AM i accessed on of their articles an landed on a strange 404 Page telling me that http://ift.tt/1RdSsqT could not be found. As a security interested guy i tried to access /wp-admin/install.php and voila, the Wordpress first setup Page was available. The vulnerability had to be closed ASAP because of 35.000 users being online at that time, so i created a free mysql database online and let it run trough the setup. After it was complete the site was not accessible anymore and the only post shown was the Wordpress Hello World post. With that said anyone could have used the vulnerability to install wordpress and upload a webshell in less than a minute und deploy another webshell hidden in the web root and dumping the user database afterwards or gain access to hidden files. As i wanted to tell XDA that their site had to be compromised to prevent damage i tried to contact them trough various channels. Emails to the webmaster, private messages to the site admin and editors, several twitter posts but no one was giving any attention to the problem. The site was back up shortly after, but there was no sign of them announcing that someone had access to their webserver, as if nothing ever happened. I hope not all the sites who have my data saved are treating it that way and i am kind of dissappointed, because i thought such a popular site would be able to deal with security issues and raise truth public awareness. The Security Issue is fixed by now and i hope they will change their mind when the next incident happens. Thank you for providing this great mailing list and another thank you goes to GOLEM.de which provided me with help in this topic and how to handle it. *TIMELINE:* 2016-03-07 # 10:10 AM Vulnerability discovered 2016-03-07 # 10:15 AM Completed Setup to prevent Site from further damage 2016-03-07 # 10:24 AM Contacted Webmaster via Email-Address from Google Cache 2016-03-07 # 11:30 AM Contacted Site Admin, Managing Editor and another Editor via private messaging system after the site was up again 2016-03-07 # 01:13 PM Twitter post to website account to inform about security breach,after not response so far 2016-03-08 # 08:13 AM Email to Golem.de on how to deal with the security issue 2016-03-11 # 05:46 AM Received email from Golem.de with the advice to publish it here Still no response (Email or News) from XDA-Developers Regards, Steffen Rogge

Source: Gmail -> IFTTT-> Blogger

Orioles: C Matt Wieters left Saturday's game vs. Twins in 1st inning with right elbow soreness; played in 6 spring games (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles: C Matt Wieters left Saturday's game vs. Twins in 1st inning with right elbow soreness; played in 6 spring games (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

[FD] Netgear ReadyNAS Surveillance: Unauthenticated Remote Command Execution

Unauthenticated Remote Command Execution in Netgear ReadyNAS Surveillance ========================================================================= Product Description =================== Netgear ReadyNAS Surveillance is a NVR (Network Video Recorder) available for Netgear NAS systems. Vulnerability Description ========================= A critical vulnerability has been found in Netgear ReadyNAS Surveillance configuration backup feature, allowing remote users to execute arbitrary commands as root. Unauthenticated Config File Download + Remote Root via RCE ========================================================== Because the ReadyNAS Surveillance cgi_system cgi application doesn't check the user-provided "bfile" POST parameter and does not check if the user is authenticated, it's possible to execute arbitrary commands as root. It's also possible, without RCE, to download the ReadyNAS Surveillance configuration files. **Access Vector**: remote **Security Risk**: high **Vulnerability**: CWE-88

Source: Gmail -> IFTTT-> Blogger

[FD] Kaltura Community Edition Multiple Vulnerabilities

( , ) (, . '.' ) ('. ', ). , ('. ( ) ( (_,) .'), ) _ _, / _____/ / _ \ ____ ____ _____ \____ \==/ /_\ \ _/ ___\/ _ \ / \ / \/ | \\ \__( <_> ) Y Y \ /______ /\___|__ / \___ >____/|__|_| / \/ \/.-. \/ \/:wq (x.0) '=.|w|.=' _=''"''=. presents.. Kaltura Community Edition Multiple Vulnerabilities Affected versions: Kaltura Community Edition <=11.1.0-2 PDF: http://ift.tt/1V1XhmP

Source: Gmail -> IFTTT-> Blogger

[FD] Exim < 4.86.2 Local Root Privilege Escalation

Advisory URL: http://ift.tt/1V1WK4i ============================================= - Release date: 10.03.2016 - Discovered by: Dawid Golunski - Severity: High/Critical ============================================= I. VULNERABILITY

Source: Gmail -> IFTTT-> Blogger

Anonymous Survey -- Please Reply

We are conducting an anonymous survey for what online employees think makes for a good virtual employer/boss and we would appreciate your ...

from Google Alert - anonymous http://ift.tt/22bnzFe
via IFTTT

Anonymous tip leads to cocaine seizure

Anonymous tip leads to cocaine seizure. Published 03/11 2016 05:10PM. Updated 03/11 2016 05:11PM. Cameron County DA. SAN BENITO, Texas.

from Google Alert - anonymous http://ift.tt/1nEFEf9
via IFTTT

I have a new follower on Twitter


Helen Whiteside



Following: 963 - Followers: 719

March 12, 2016 at 05:38AM via Twitter http://twitter.com/Helenlookk

ISPs Sell Your Data to Advertisers, But FCC has a Plans to Protect Privacy

The Federal Communication Commission (FCC) has put forward a proposal that aims to protect Internet user's privacy. The proposal [pdf] will regulate the amount of customers’ online data the Internet Service Providers (ISPs) are able to collect and sell to the advertising companies. Currently, there is no particular rule by law covering broadband providers and customer privacy, and if adopted


from The Hacker News http://ift.tt/1QTaZTO
via IFTTT

Annual Arctic Sea Ice Minimum 1979-2015 with Area Graph

Satellite-based passive microwave images of the sea ice have provided a reliable tool for continuously monitoring changes in the Arctic ice since 1979. Every summer the Arctic ice cap melts down to what scientists call its "minimum" before colder weather begins to cause ice cover to increase. The ice parameters derived from satellite ice concentration data that are most relevant to climate change studies are sea ice extent and sea ice area. This graph displays the area of the minimum sea ice coverage each year from 1979 through 2015. In 2015, the Arctic minimum sea ice covered an area of 3.885 million square kilometers. This visualization shows the expanse of the annual minimum Arctic sea ice for each year from 1979 through 2015 as derived from SSMI data. A semi-transparent graph overlay shows the area in million square kilometers for each year's minimum day. The date shown in the upper right corner indicates the current year being displayed.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1YIG2a6
via IFTTT

Lunar Shadow Transit


This snapshot from deep space captures planet Earth on March 9. The shadow of its large moon is falling on the planet's sunlit hemisphere. Tracking toward the east (left to right) across the ocean-covered world the moon shadow moved quickly in the direction of the planet's rotation. Of course, denizens of Earth located close to the shadow track centerline saw this lunar shadow transit as a brief, total eclipse of the Sun. From a spacebased perspective between Earth and Sun, the view of this shadow transit was provided by the Deep Space Climate Observatory (DSCOVR) spacecraft's Earth Polychromatic Imaging Camera (EPIC). via NASA http://ift.tt/1SFAY5M

How a Typo Stopped Hackers from Stealing $1 Billion from Bank

Typos are really embarrassing, but this time it saved the Bangladesh Central Bank and the New York Federal Reserve by preventing a nearly $1 Billion (£700 Million) heist. Last month, some unknown hackers broke into Bangladesh's central bank, obtained credentials needed for payment transfers and then transfer large sums to fraudulent accounts based in the Philippines and Sri Lanka. But… <!--


from The Hacker News http://ift.tt/1RdyhCZ
via IFTTT

Friday, March 11, 2016

Can I create an anonymous survey and if so how?

Is there a way for me to set up a form where I would not see the identity or identifier, such as the e-mail address, of the person who filled out and ...

from Google Alert - anonymous http://ift.tt/1MdarWW
via IFTTT

Events

6075 Zenith Court NE • Rio Rancho, New Mexico 87144-6424. USA Tel 505-891-2664 • USA Fax 505-891-4320. © 2015 Overeaters Anonymous, Inc.

from Google Alert - anonymous http://ift.tt/1QNKkvb
via IFTTT

Anonymous access

When defining the access of a taxonomy term, there is an "anonymous" checkbox, allowing anonymous users to access the articles/pages. But it seem ...

from Google Alert - anonymous http://ift.tt/1nCTWNi
via IFTTT

Ravens: As he leaves for the Raiders via free agency, G Kelechi Osemele says OL \"not really appreciated\" in Baltimore (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 03/10/16

Combustion Integrated Rack (CIR) Alignment Guide Removal: Kopra removed the Alignment Guides from CIR to unlock PaRIS before the beginning of CIR operations that require a microgravity environment. CIR provides sustained, systematic microgravity combustion research and it houses hardware capable of performing combustion experiments to further research of combustion in microgravity.   Multi-Omics Saliva Operations: Peake completed the Japan Aerospace Exploration Agency (JAXA) Multi-Omics investigation by collecting saliva samples and inserting the samples into a Box Module within a MELFI (Minus Eight-degree Freezer for ISS) Rack. The Multi-Omics analysis of human microbial-metabolic cross-talk in the investigation evaluates the impacts of space environment and prebiotics on astronauts’ immune function, by combining the data obtained from the measurements of changes in the gut microbiological composition, metabolites profiles, and the immune system.   Habitability Human Factors Directed Observations: Peake viewed videos to learn about the different sessions of the Habitability experiment. The investigation collects observations about the relationship between crew members and their environment on the ISS. Observations can help spacecraft designers understand how much habitable volume is required and whether a mission’s duration impacts how much space crew members need.   Waste and Hygiene Compartment (WHC): Last Friday, the crew completed a pre-treat tank Remove & Replace (R&R) without the Pre-Treat Bad Qual Light (PTBQL) illuminating. Illumination is expected when water in the EK hose passes through the piping where the PTBQL sensor is located. Ground teams believe this was an indication of a bad PTBQ sensor and recommended R&Ring the following 3 items: the piping (which includes the PTBQ sensor), the dose pump, and the EK hose.  The dose pump was at the end of its expected 6 month life.  The EK hose would serve to verify that the PTBQ sensor and light are both working. Kopra R&Rd these components today with no issues. The PTBQL illuminated as expected, then cleared with dosing as expected and the crew then configured WHC to UPA. Common Communications For Visiting Vehicles (C2V2): Peake, with assistance from Kopra, continued C2V2 installation which began on Monday. Peake completed coldplate installation, Internal Thermal Control System (ITCS) umbilical re-routing and temperature sensor installation. The comm unit installation is scheduled for tomorrow.  C2V2 will  integrate a communications system for the ISS to be used specifically for communicating with future visiting vehicles. This system will utilize both an S-Band based Radio Frequency (RF) system, and hard-line connections to visiting vehicles so secure, reliable communications will be available for all phases of rendezvous, docking, and mated operations. The system will consist of elements that will be permanently installed on the ISS as well as a corresponding element that will be made available to visiting vehicles.   Remote Power Controller Module (RPCM) LAP51A4A-A R&R: This RPCM experienced a FET Controller Hybrid (FCH) failure on RPC 2 in September of 2012 and RPC 18 in March of 2014. Four different spare RPCMs were installed in the LAP51A4A-A location. None would communicate with the Multiplexer/De-multiplexer (MDM) on either channel, however, each worked nominally in other locations on ISS. The original RPCM was reinstalled and has continued to communicate in this LAP51A4A-A location.  Both FCH failures have since self-healed. A failed RT Address connection in the rack is the most likely cause of the prior inability to communicate with the four spare RPCMs.Today the crew installed a unique RPCM with a pre-installed RT Address Jumper in the LAP51A4A-A location.The R&R was completed with no issues followed by the ground performing a successful refresh of the RPCM. Mobile Servicing System (MSS) Operations: Yesterday Robotic Ground Controllers powered up the MSS and maneuvered Special Purpose Dexterous Manipulator (SPDM) Arm2 into position to grasp the Robotic Offset Tool (ROST).  Over the course of last evening, the ROST was released from its tool holster and checked out in free space.  After the successful checkout, the tool was re-stowed.  These operations used the updated recon files from Canadian Space Agency (CSA) that modified the expected size of the grasp fixture. Operations were nominal throughout.   Today’s Planned Activities All activities were completed unless otherwise noted. Multi Omics (MO) – Saliva Sample Collection Multi Omics (MO) – Sample Insertion into MELFI Multi Omics (MO) – Equipment Stowage Multi Omics (MO) – Questionnaire Completion Prep for SW Updates on RS1, RS2, RS3, REMOTE RS r/g 1634 PCS Powerdown Common Communications Equipment for Visiting Vehicles (C2V2) Mod Kit Installation in Lab Water Separation in EDV using Separation Unit (УС).  Tagup with specialists as necessary / r/g 1638 Replacement of АСУ components / r/g 1637 Assistance with Installation of Common Communications Equipment for Visiting Vehicles (C2V2) Mod Kit in Lab Psychological Evaluation Program (WinSCAT) WHC maintenance T2 Monthly Inspection Replacement of urine receptacle (МП) and filter-insert (Ф-В) in the toilet [АСУ] / SM r/g 1637 Post-Replacement АСУ Activation CIR – Equipment Removal WRS – Recycle Tank Fill from EDV СОЖ Maintenance r/g 1633 EXPRESS Rack 4 Drawer Recovery Verification of ИП-1 Flow Sensor Position COSMOCARD. Closeout Ops / r/g 1611 Ultrasound 2 HRF Rack 1 Power On VIZIR. Experiment Ops with Photo Image Coordinate Reference System (СКПФ-У) Hardware / r/g 1639 RPCM R&R and Installation of UOP behind LAB1P5 Rack IMS Delta File Prep HABIT – Data Recording to iPad Physical Fitness Evaluation (on the treadmill)  r/g 1636 Ultrasound 2 HRF Rack 1 Power Off WRS – Recycle Tank Fill from EDV SSC21 – Hard Drive Swap Post-Exercise Hygiene Procedure IMS Conference CONTENT. Experiment Ops / r/g 1635 Health Maintenance System (HMS) – Nutritional Assessment (ESA) HAM radio session from Columbus   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. Nominal ground commanding WHC maintenance support   Three-Day Look Ahead: Friday, 03/11: C2V2 comm unit install, LAB1P5 reconfig, OBT Cygnus conference Saturday, 03/12: Crew off duty, housekeeping Sunday, 03/13: Crew off duty   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal […]

from ISS On-Orbit Status Report http://ift.tt/1MbwywP
via IFTTT

eform displays regularly for anonymous users, but the eform embedded an entity block does not ...

When logged out of drupal the form does not display at all. The form will display for anonymous uses when going right to the form page, but not when ...

from Google Alert - anonymous http://ift.tt/1UkcaQG
via IFTTT

Google Android N Preview — 6 Cool Features That You Should Know

Android N Developer Preview, an early beta of Google’s new mobile operating system that was expected to launch on Google I/O in mid-May, is unexpectedly launching right now. Android N Developer Preview for the Nexus 6P, Nexus 5X, Nexus 6, Pixel C Nexus 9, the Nexus Player and the General Mobile 4G, an Android One device has been made available as an over-the-air update by Google on Wednesday.


from The Hacker News http://ift.tt/1UkbwCN
via IFTTT

Dark Sun over Ternate


A dark Sun hangs in the clearing sky over a volcanic planet in this morning sea and skycape. It was taken during this week's total solar eclipse, a dramatic snapshot from along the narrow path of totality in the dark shadow of a New Moon. Earth's Indonesian isle of Ternate, North Maluku lies in the foreground. The sky is still bright near the eastern horizon though, beyond the region's flattened volcanic peaks and outside the Moon's umbral shadow. In fact, near the equator the dark lunar umbra is rushing eastward across Earth's surface at about 1,700 kilometers (1,100 miles) per hour. Shining through the thin clouds, around the Sun's silhouette is the alluring glow of the solar corona, only easily seen during totality. An inspiring sight for eclipse watchers, this solar corona is the tenuous, hot outer atmosphere of the Sun. via NASA http://ift.tt/1UVhhrg

Thursday, March 10, 2016

I have a new follower on Twitter


Don Hornsby
Runner, #SocialMedia Strategist, #Leadership, Amateur Musician, Secret Poet, Craft Beer, .... and Coffee.
Columbus, OH
http://t.co/ynj2DqQ6YG
Following: 14112 - Followers: 18647

March 10, 2016 at 09:39PM via Twitter http://twitter.com/donhornsby

Building a Fine-Grained Entity Typing System Overnight for a New X (X = Language, Domain, Genre). (arXiv:1603.03112v1 [cs.CL])

Recent research has shown great progress on fine-grained entity typing. Most existing methods require pre-defining a set of types and training a multi-class classifier from a large labeled data set based on multi-level linguistic features. They are thus limited to certain domains, genres and languages. In this paper, we propose a novel unsupervised entity typing framework by combining symbolic and distributional semantics. We start from learning general embeddings for each entity mention, compose the embeddings of specific contexts using linguistic structures, link the mention to knowledge bases and learn its related knowledge representations. Then we develop a novel joint hierarchical clustering and linking algorithm to type all mentions using these representations. This framework doesn't rely on any annotated data, predefined typing schema, or hand-crafted features, therefore it can be quickly adapted to a new domain, genre and language. Furthermore, it has great flexibility at incorporating linguistic structures (e.g., Abstract Meaning Representation (AMR), dependency relations) to improve specific context representation. Experiments on genres (news and discussion forum) show comparable performance with state-of-the-art supervised typing systems trained from a large amount of labeled data. Results on various languages (English, Chinese, Japanese, Hausa, and Yoruba) and domains (general and biomedical) demonstrate the portability of our framework.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1LfxqWh
via IFTTT

Inferring Fine-grained Details on User Activities and Home Location from Social Media: Detecting Drinking-While-Tweeting Patterns in Communities. (arXiv:1603.03181v1 [cs.AI])

Nearly all previous work on geo-locating latent states and activities from social media confounds general discussions about activities, self-reports of users participating in those activities at times in the past or future, and self-reports made at the immediate time and place the activity occurs. Activities, such as alcohol consumption, may occur at different places and types of places, and it is important not only to detect the local regions where these activities occur, but also to analyze the degree of participation in them by local residents. In this paper, we develop new machine learning based methods for fine-grained localization of activities and home locations from Twitter data. We apply these methods to discover and compare alcohol consumption patterns in a large urban area, New York City, and a more suburban and rural area, Monroe County. We find positive correlations between the rate of alcohol consumption reported among a community's Twitter users and the density of alcohol outlets, demonstrating that the degree of correlation varies significantly between urban and suburban areas. While our experiments are focused on alcohol use, our methods for locating homes and distinguishing temporally-specific self-reports are applicable to a broad range of behaviors and latent states.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QIoSX7
via IFTTT

A Markovian-based Approach for Daily Living Activities Recognition. (arXiv:1603.03251v1 [cs.HC])

Recognizing the activities of daily living plays an important role in healthcare. It is necessary to use an adapted model to simulate the human behavior in a domestic space to monitor the patient harmonically and to intervene in the necessary time. In this paper, we tackle this problem using the hierarchical hidden Markov model for representing and recognizing complex indoor activities. We propose a new grammar, called "Home By Room Activities Language", to facilitate the complexity of human scenarios and consider the abnormal activities.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Lfxp4P
via IFTTT

Hierarchical Linearly-Solvable Markov Decision Problems. (arXiv:1603.03267v1 [cs.AI])

We present a hierarchical reinforcement learning framework that formulates each task in the hierarchy as a special type of Markov decision process for which the Bellman equation is linear and has analytical solution. Problems of this type, called linearly-solvable MDPs (LMDPs) have interesting properties that can be exploited in a hierarchical setting, such as efficient learning of the optimal value function or task compositionality. The proposed hierarchical approach can also be seen as a novel alternative to solving LMDPs with large state spaces. We derive a hierarchical version of the so-called Z-learning algorithm that learns different tasks simultaneously and show empirically that it significantly outperforms the state-of-the-art learning methods in two classical hierarchical reinforcement learning domains: the taxi domain and an autonomous guided vehicle task.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1LfxqFR
via IFTTT

Spectral Ranking using Seriation. (arXiv:1406.5370v4 [cs.LG] UPDATED)

We describe a seriation algorithm for ranking a set of items given pairwise comparisons between these items. Intuitively, the algorithm assigns similar rankings to items that compare similarly with all others. It does so by constructing a similarity matrix from pairwise comparisons, using seriation methods to reorder this matrix and construct a ranking. We first show that this spectral seriation algorithm recovers the true ranking when all pairwise comparisons are observed and consistent with a total order. We then show that ranking reconstruction is still exact when some pairwise comparisons are corrupted or missing, and that seriation based spectral ranking is more robust to noise than classical scoring methods. Finally, we bound the ranking error when only a random subset of the comparions are observed. An additional benefit of the seriation formulation is that it allows us to solve semi-supervised ranking problems. Experiments on both synthetic and real datasets demonstrate that seriation based spectral ranking achieves competitive and in some cases superior performance compared to classical ranking methods.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1p7LaGZ
via IFTTT

Recent advances on inconsistency indices for pairwise comparisons - a commentary. (arXiv:1503.08289v3 [cs.AI] UPDATED)

This paper recalls the definition of consistency for pairwise comparison matrices and briefly presents the concept of inconsistency index in connection to other aspects of the theory of pairwise comparisons. By commenting on a recent contribution by Koczkodaj and Szwarc, it will be shown that the discussion on inconsistency indices is far from being over, and the ground is still fertile for debates.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/19sZ9kg
via IFTTT

Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. (arXiv:1511.04317v2 [cs.CR] UPDATED)

Modern malware is designed with mutation characteristics, namely polymorphism and metamorphism, which causes an enormous growth in the number of variants of malware samples. Categorization of malware samples on the basis of their behaviors is essential for the computer security community, because they receive huge number of malware everyday, and the signature extraction process is usually based on malicious parts characterizing malware families. Microsoft released a malware classification challenge in 2015 with a huge dataset of near 0.5 terabytes of data, containing more than 20K malware samples. The analysis of this dataset inspired the development of a novel paradigm that is effective in categorizing malware variants into their actual family groups. This paradigm is presented and discussed in the present paper, where emphasis has been given to the phases related to the extraction, and selection of a set of novel features for the effective representation of malware samples. Features can be grouped according to different characteristics of malware behavior, and their fusion is performed according to a per-class weighting paradigm. The proposed method achieved a very high accuracy ($\approx$ 0.998) on the Microsoft Malware Challenge dataset.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1NyCIXw
via IFTTT

Thursday Eve: Debtors Anonymous Provides Hope and Recovery for Debtors

Thursday Evening Debtors Anonymous Meeting Berkeley, California 7:00 PM -- 8:00 PM Every Thursday Hopes, Dreams, Solvency & Candlelight ...

from Google Alert - anonymous http://ift.tt/1WdjDQP
via IFTTT

Anonymous tip claims raw milk caused illnesses at West Virginia Capitol

Some lawmakers say it's just a coincidence and a stomach bug is going around.

from Google Alert - anonymous http://ift.tt/1U5Qp8k
via IFTTT

I have a new follower on Twitter


Karl
Professional chef and aspiring trader.
New York

Following: 5261 - Followers: 10179

March 10, 2016 at 06:19PM via Twitter http://twitter.com/Karl554Ash

An anonymous source claims that Kanye West supports Trump, probably because they both like ...

So, Page Six is reporting that rapper Kanye West supports Donald Trump's campaign for president, even though the entire Kardashian clan sans ...

from Google Alert - anonymous http://ift.tt/1pAb3RK
via IFTTT

Anonymous

Busch Gardens Tampa: Anonymous - See 9872 traveler reviews, 4132 candid photos, and great deals for Tampa, FL, at TripAdvisor.

from Google Alert - anonymous http://ift.tt/1R9Wfz8
via IFTTT

Je vous congnois

Composer, Anonymous. Key, F Ionian mode. First Publication, 1487 ca. in Bologna Ms Q.16 (No.9). Language, French. Piece Style, Renaissance.

from Google Alert - anonymous http://ift.tt/24T7lCT
via IFTTT

Anonymous - Hampton Inn & Suites Tampa - North

Hampton Inn & Suites Tampa - North: Anonymous - See 831 traveler reviews, 71 candid photos, and great deals for Hampton Inn & Suites Tampa ...

from Google Alert - anonymous http://ift.tt/222HucJ
via IFTTT

I have a new follower on Twitter


Top Ten Blogger
This is the official twitter feed for my blog The Top 10 of Anything and Everything my mission in life is to make people smile. Nothing more, nothing less.
Wales, UK
http://t.co/4SmWtJ1rZi
Following: 31771 - Followers: 40756

March 10, 2016 at 08:35AM via Twitter http://twitter.com/Worlds_Top_10

ISS Daily Summary Report – 03/9/16

MAGVECTOR: Peake performed a data transfer from the jump drive to an SSC folder and reconfigured the switches on the portable power supply 1 (PPS1), completing the 7th run of European Space Agency’s (ESA) MAGVECTOR experiment. Run #8 scheduled for next week will be the last experiment run for Increment 47.  MAGVECTOR qualitatively investigates the interaction between a moving magnetic field and an electrical conductor. The expected changes in the magnetic field structure on the ram and wake side of the electrical conductor are of interest for technical applications as well as for astrophysical research. Fine Motor Skills:  Kopra and Peake each completed a session of the Fine Motor Skills experiment by completing a series of interactive tasks on a touchscreen tablet. This investigation is the first fine motor skills study to measure long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity. Dose Tracker:  Kopra and Peake completed entries for medication tracking. This investigation documents the medication used by crew members before and during their missions by capturing data regarding medication use during spaceflight. The data is expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions. Observation and Analysis of Smectic Islands in Space (OASIS) Gylcerol/Water Fill: Kopra successfully performed troubleshooting to resolve pneumatic commanding capabilities that were identified during yesterday’s video checkout. He then began the next science run of the OASIS Gylcerol/Water Fill activity by filling the Inkjet droplet device with glycerol/water for the final experiment protocol on each sample container and exchanged the hard drive. OASIS studies the unique behavior of liquid crystals in microgravity, including their overall motion and the merging of crystal layers known as smectic islands. Liquid crystals are used for display screens in televisions and clocks, and they also occur in soaps and in cell membranes. The experiment allows detailed studies of the behavior of these structures, and how microgravity affects their unique ability to act like both a liquid and a solid crystal. Common Communications for Visiting Vehicles (C2V2): Peake reviewed Big Picture words in preparation for tomorrow’s planned hardware installation. Following the review, Peake and Kopra gathered tools that will be required for the installation.   On Board Training (OBT) 45 Soyuz (45S) Emergency Drill:  All 3 crew members participated in this OBT to practice emergency departure of the ISS. This drill is scheduled when a crew has been on onboard the Station for 12-14 weeks and once every 2.5 months thereafter.   Urine Processing Assembly (UPA) Status: The UPA is operational and has completed its first process run. The second process run is currently in progress.  The data looks nominal so far.   Robotics Offset Tool (ROST) Freespace Checkout: On 2/4/16 the ROST objective had to be deferred from the Main Bus Switching Unit (MBSU) demonstration due to an issue with the Special Purpose Dexterous Manipulator (SPDM) ORU Tool Changeout Mechanism (OTCM) grasping the ROST. The OTCM gripper stalled before reaching the minimum capture position.  A checkout is currently in progress and is using new capture envelope parameters.  The activity will continue until late this evening.   Today’s Planned Activities All activities were completed unless otherwise noted. Fine Motor Skills – Experiment Ops ISS Emergency Descent Training r/g 1610 C2V2 Hardware Install Big Picture Words Camcorder setup to capture БД-2 exercise / r/g 1615 C2V2 – Gathering equipment for the activity with LAB1P5 On MCC Go Testing БД-2 Treadmill. БД-2 Exercise  Day 3 DOSETRK – Questionnaire Completion Observation and Analysis of Smectic Islands in Space (OASIS) – Fill the Inkjet droplet device with water Remove Video Equipment Used to capture БД-2 Exercise and Downlink the file / r/g 1615 Multi Omics (MO) – Saliva collection equipment setup DOSETRK – Questionnaire Completion COSMOCARD. Setup. Starting 24-hr ECG Recording / r/g 1611 Taping NAS Payload Power Cable Food Frequency Questionnaire NMAP – Experiment Ops Filling (separation) of EDV (KOV) for Elektron or EDV-SV MAGVEC – Data Export СОЖ Maintenance WRS – Recycle Tank Fill from EDV EPO – Copying files from Micro CD to SSC IMS Conference Health Maintenance System (HMS) – Nutritional Assessment (ESA) IDENTIFICATION. Copy ИМУ-Ц micro-accelerometer data to laptop / r/g 1589 NINJA. Document Printout IMS Delta File Prep Post-Exercise Hygiene Procedure HAM-VIDEO Power Up   Completed Task List Items WHC EDV-Y R&R   Ground Activities All activities are on schedule unless otherwise noted. MSS powerup [Complete] ROST checkout/unstow/stow MSS powerdown   Three-Day Look Ahead: Thursday, 03/10: C2V2 H/W install. LAB1P5 RPCM R&R, SPRINT Ultrasound Friday, 03/11: C2V2 comm unit install, LAB1P5 reconfig, OBT Cygnus conference Saturday, 03/12: Crew off duty, housekeeping   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Norm Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1U4VoWN
via IFTTT

Gov't handed 28000 signatures after anonymous blog inspires mothers

Yasuhisa Shiozaki (L), Japan's minister of health, labor and welfare, receives documents from a group of mothers in Tokyo on March 9, 2016, that ...

from Google Alert - anonymous http://ift.tt/222lheU
via IFTTT

[FD] [SE-2012-01] Broken security fix in Oracle Java SE 7/8/9

Hello All, On Mar 07, 2016 Security Explorations modified its Disclosure Policy [1]. As a result, we do not tolerate broken fixes any more. If an instance of a broken fix for a vulnerability we already reported to the vendor is encountered, it gets disclosed by us without any prior notice. The vendor that gets the questionable honor to be the first to experience our modified Disclosure Policy is Oracle. Yesterday, during my JavaLand talk [2], while discussing the problems related to Java platform security, its ecosystem and vendors I disclosed general information about a broken Oracle Java SE fix from Sep 2013: http://ift.tt/24Sa7Iy This was the fix for the last vulnerability we reported to the company as part of our Java SE security research (Issue 69 [3]). This weakness made it possible to implement a very classic attack against JVM (class spoofing attack). According to Oracle, the vulnerability was addressed by a backported (from JDK 8) implementation of the affected component (method handles API) in JDK 7 Update 40 from Sep 2013. We however found out that Oracle patch could be trivially bypassed with the use of the following: - four character change to our original POC code published in Oct 2013, - a custom HTTP server enforcing "404 (Not Found)" error when requesting a given class for the first time. Full technical details of Oracle fix bypass can be found in our technical report: http://ift.tt/1R8D8Wj Along with the report, we have also published a Proof of Concept code to illustrate the broken fix: http://ift.tt/24Sa7IC The POC was successfully verified in the environment of Java SE 7 Update 97, Java SE 8 Update 74 and Java SE 9 Early Access Build 108. A complete Java security escape could be achieved with it. Please, note that the published material neither constitutes the bypass of Java security levels, nor its Click2Play functionality. It's a mere Java security sandbox escape. At the end, it's worth to note that beside breaking a fix for Issue 69 (CVE-2013-5838), Oracle also improperly evaluated its impact. Oracle Critical Patch Update from Oct 2013 indicated that Issue 69 could "be exploited only through sandboxed Java Web Start applications and sandboxed Java applets". This is not true. We verified that it could be successfully exploited in a server environment as well such as Google App Engine for Java [4]. Thank you.

Source: Gmail -> IFTTT-> Blogger

Edge On Galaxy NGC 5866


Why is this galaxy so thin? Many disk galaxies are actually just as thin as NGC 5866, pictured above, but are not seen edge-on from our vantage point. One galaxy that is situated edge-on is our own Milky Way Galaxy. Classified as a lenticular galaxy, NGC 5866 has numerous and complex dust lanes appearing dark and red, while many of the bright stars in the disk give it a more blue underlying hue. The blue disk of young stars can be seen extending past the dust in the extremely thin galactic plane, while the bulge in the disk center appears tinged more orange from the older and redder stars that likely exist there. Although similar in mass to our Milky Way Galaxy, light takes about 60,000 years to cross NGC 5866, about 30 percent less than light takes to cross our own Galaxy. In general, many disk galaxies are very thin because the gas that formed them collided with itself as it rotated about the gravitational center. Galaxy NGC 5866 lies about 50 million light years distant toward the constellation of the Dragon (Draco). via NASA http://ift.tt/1LR5053

Wednesday, March 9, 2016

[FD] Executable installers are vulnerable^WEVIL (case 31): MalwareBytes' installers allows arbitrary (remote) code execution WITH escalation of privilege

[FD] Executable installers are vulnerable^WEVIL (case 30): clamwin-0.99-setup.exe allows arbitrary (remote) code execution WITH escalation of privilege

Re: [FD] Windows Mail Find People DLL side loading vulnerability

"Securify B.V." wrote: >

Source: Gmail -> IFTTT-> Blogger

[FD] Open Vulnerablity ID tracker instead of CVE. Maybe

Hello List, I`m growing a bit tired of the way MITRE assigns CVEs (or just ignores you) so instead, I thought some unmoderated list would be easier to manage. I opted out to keep the same format as CVE with exception of first three letters. https://www.freeovi.com Its completly unmoderated generator so feel free to use it and suggest improvements. Thanks

Source: Gmail -> IFTTT-> Blogger

[FD] Security contact @ Gigabyte

Hi list, I'd like to know if anyone here know someone working on security at Gigabyte (http://ift.tt/JtqnEZ), since we are trying to responsibly report a high risk security flaw we found. We opened a ticket asking to be contacted by their security team, and the answer we got was: "Thanks for your interest, but we already have a security team for our websites. Regards, GIGABYTE" (sigh) So, if any of you knows someone in there, please let us know. Thanks! Gus.-

Source: Gmail -> IFTTT-> Blogger

Learning to Blend Computer Game Levels. (arXiv:1603.02738v1 [cs.AI])

We present an approach to generate novel computer game levels that blend different game concepts in an unsupervised fashion. Our primary contribution is an analogical reasoning process to construct blends between level design models learned from gameplay videos. The models represent probabilistic relationships between elements in the game. An analogical reasoning process maps features between two models to produce blended models that can then generate new level chunks. As a proof-of-concept we train our system on the classic platformer game Super Mario Bros. due to its highly-regarded and well understood level design. We evaluate the extent to which the models represent stylistic level design knowledge and demonstrate the ability of our system to explain levels that were blended by human expert designers.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1RS3yi1
via IFTTT

Pairwise Choice Markov Chains. (arXiv:1603.02740v1 [stat.ML])

As datasets capturing human choices grow in richness and scale, particularly in online domains, there is an increasing need for choice models that explain and predict complex empirical choices that violate traditional choice-theoretic assumptions such as regularity, stochastic transitivity, or Luce's choice axiom. In this work we introduce a Pairwise Choice Markov Chain (PCMC) model of discrete choice that is free of all those assumptions while still satisfying the attractive foundational axiom of uniform expansion. Uniform expansion is known to imply Luce's choice axiom in the context of independent random utility models (RUMs), but the PCMC model is not a RUM (let alone an independent RUM). Inference for the PCMC model is straight-forward, and we thus introduce it as the first inferentially tractable model of discrete choice known to satisfy uniform expansion without the choice axiom, regularity, or strict stochastic transitivity. It is thus more flexible than even Tversky's Elimination By Aspects model, which assumes regularity and is also known to be inferentially intractable. We show that our model learns and predicts synthetic non-transitive data well. Our analysis also synthesizes several recent observations connecting the Multinomial Logit (MNL) model and Markov chains; the PCMC model retains the Multinomial Logit model as a special case.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1UTUprX
via IFTTT

Implicit Discourse Relation Classification via Multi-Task Neural Networks. (arXiv:1603.02776v1 [cs.CL])

Without discourse connectives, classifying implicit discourse relations is a challenging task and a bottleneck for building a practical discourse parser. Previous research usually makes use of one kind of discourse framework such as PDTB or RST to improve the classification performance on discourse relations. Actually, under different discourse annotation frameworks, there exist multiple corpora which have internal connections. To exploit the combination of different discourse corpora, we design related discourse classification tasks specific to a corpus, and propose a novel Convolutional Neural Network embedded multi-task learning system to synthesize these tasks by learning both unique and shared representations for each task. The experimental results on the PDTB implicit discourse relation classification task demonstrate that our model achieves significant gains over baseline systems.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1UgeIPI
via IFTTT

Robot Dream. (arXiv:1603.03007v1 [cs.RO])

In this position paper we present a novel approach to neurobiologically plausible implementation of emotional reactions and behaviors for real-time autonomous robotic systems. The working metaphor we use is the "day" and "night" phases of mammalian life. During the "day" phase a robotic system stores the inbound information and is controlled by a light-weight rule-based system in real time. In contrast to that, during the "night" phase the stored information is been transferred to the supercomputing system to update the realistic neural network: emotional and behavioral strategies.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1RS3wXr
via IFTTT

Summarization of Films and Documentaries Based on Subtitles and Scripts. (arXiv:1506.01273v3 [cs.CL] UPDATED)

We assess the performance of generic text summarization algorithms applied to films and documentaries, using the well-known behavior of summarization of news articles as reference. We use three datasets: (i) news articles, (ii) film scripts and subtitles, and (iii) documentary subtitles. Standard ROUGE metrics are used for comparing generated summaries against news abstracts, plot summaries, and synopses. We show that the best performing algorithms are LSA, for news articles and documentaries, and LexRank and Support Sets, for films. Despite the different nature of films and documentaries, their relative behavior is in accordance with that obtained for news articles.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1BL5nnn
via IFTTT

Nonparametric Bayesian Double Articulation Analyzer for Direct Language Acquisition from Continuous Speech Signals. (arXiv:1506.06646v2 [cs.AI] UPDATED)

Human infants can discover words directly from unsegmented speech signals without any explicitly labeled data. In this paper, we develop a novel machine learning method called nonparametric Bayesian double articulation analyzer (NPB-DAA) that can directly acquire language and acoustic models from observed continuous speech signals. For this purpose, we propose an integrative generative model that combines a language model and an acoustic model into a single generative model called the "hierarchical Dirichlet process hidden language model" (HDP-HLM). The HDP-HLM is obtained by extending the hierarchical Dirichlet process hidden semi-Markov model (HDP-HSMM) proposed by Johnson et al. An inference procedure for the HDP-HLM is derived using the blocked Gibbs sampler originally proposed for the HDP-HSMM. This procedure enables the simultaneous and direct inference of language and acoustic models from continuous speech signals. Based on the HDP-HLM and its inference procedure, we developed a novel double articulation analyzer. By assuming HDP-HLM as a generative model of observed time series data, and by inferring latent variables of the model, the method can analyze latent double articulation structure, i.e., hierarchically organized latent words and phonemes, of the data in an unsupervised manner. The novel unsupervised double articulation analyzer is called NPB-DAA.

The NPB-DAA can automatically estimate double articulation structure embedded in speech signals. We also carried out two evaluation experiments using synthetic data and actual human continuous speech signals representing Japanese vowel sequences. In the word acquisition and phoneme categorization tasks, the NPB-DAA outperformed a conventional double articulation analyzer (DAA) and baseline automatic speech recognition system whose acoustic model was trained in a supervised manner.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1N2s0JW
via IFTTT

Deep Tracking: Seeing Beyond Seeing Using Recurrent Neural Networks. (arXiv:1602.00991v2 [cs.LG] UPDATED)

This paper presents to the best of our knowledge the first end-to-end object tracking approach which directly maps from raw sensor input to object tracks in sensor space without requiring any feature engineering or system identification in the form of plant or sensor models. Specifically, our system accepts a stream of raw sensor data at one end and, in real-time, produces an estimate of the entire environment state at the output including even occluded objects. We achieve this by framing the problem as a deep learning task and exploit sequence models in the form of recurrent neural networks to learn a mapping from sensor measurements to object tracks. In particular, we propose a learning method based on a form of input dropout which allows learning in an unsupervised manner, only based on raw, occluded sensor data without access to ground-truth annotations. We demonstrate our approach using a synthetic dataset designed to mimic the task of tracking objects in 2D laser data -- as commonly encountered in robotics applications -- and show that it learns to track many dynamic objects despite occlusions and the presence of sensor noise.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1RZdrNo
via IFTTT

Banner does not respond to anonymous users

After the module is enabled, the banner behaves as expected for users that are logged in. However, if visiting the site as an anonymous user, clicking ...

from Google Alert - anonymous http://ift.tt/1nxs9xW
via IFTTT

Re: [FD] Netgear GS105Ev2 - Multiple Vulnerabilities

Hi Nick, > The Netgear website [1] shows that a new version of the firmware was > released 2 days after your FD post - version 1.4.0.6. > The release notes [2] for the new version don't refer to these > security issues in any way (instead they mention three fairly > minor-sounding bugs fixed). >> Firmware version: 1.3.0.3,1.4.0.2 >> Status: unfixed Status remains the same. The vulnerabilities are also valid for the new version 1.4.0.6. I checked it and could still reproduce the password-reset, the XSS, the CSRF, and the found also the cookie mentioned in the report after login. So, nothing has changed with respect to the vulnerabilities. Regards, Benedikt

Source: Gmail -> IFTTT-> Blogger

[FD] Thomson TWG850 Wireless Router Multiple Vulnerabilities

[FD] New Security Tool: MrLooquer - IPv6 Intelligence

Dear colleagues, Please, allow us to introduce MrLooquer -> http://ift.tt/1QHZjqe MrLooquer combines open source intelligence techniques with heuristic and data mining to perform one of the first attempts to create a real map about IPv6 deployment and its relationship with current networks and protocols. MrLooquer is born as an open initiative with Creative Commons license focused on: - Data discovery - Visual intelligence - Relationship Our main goal is to provide a useful tool for security analysts around the world. MrLooquer allows users to make advanced queries through our big data infrastructure to obtain datasets with relationships between domains, IPv4, IPv6, service informations, geolocation, etc... We've released the first version recently. It's just the bread and butter... We are developing a roadmap that includes, among other things, threat indicator based on relationships and patterns. Please, feel free to start using it and we would be thankful for any type of feedback. Best regards, MrLooquer team. Web: http://ift.tt/1QHZjqe Twitter: https://twitter.com/mrlooquer Blog: http://ift.tt/1M7p9i0 security focus - pen-test@securityfocus.com ipv6 hackers - ipv6hackers@lists.si6networks.com full disclosure - fulldisclosure@seclists.org

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2016-2563 - PuTTY/PSCP <=0.66 buffer overflow - vuln-pscp-sink-sscanf

[FD] Advisory X41-2016-001: Memory Corruption Vulnerability in "libotr"

X41 D-Sec GmbH Security Advisory: X41-2016-001 Memory Corruption Vulnerability in "libotr" =========================================== Overview

Source: Gmail -> IFTTT-> Blogger

Loyset denisot (Anonymous)

Composer, Anonymous. Key, G Dorian mode. First Publication, 1487 ca. in Bologna Ms Q.16 (No.5). Language, French. Piece Style, Renaissance.

from Google Alert - anonymous http://ift.tt/1UTjRhi
via IFTTT

ISS Daily Summary Report – 03/8/16

Rodent Research (RR) Microgravity Science Glovebox (MSG) Hardware Gather: Peake gathered hardware and consumables needed to set up MSG for RR operations which will begin following the arrival of SpX-8. Spaceflight causes a rapid loss of bone and muscle mass especially in the legs and spine with symptoms similar to those experienced by people with muscle wasting diseases or weakness in mice exposed to long-duration spaceflight (RR-3), studies molecular and physical changes in the musculoskeletal system that occurs in space. Results expand scientists’ understanding of muscle atrophy and bone loss in space, while testing an antibody that has been known to prevent muscle wasting in mice on Earth. Observation and Analysis of Smectic Islands in Space (OASIS): Kopra installed and configured the OASIS hardware into the MSG for operations. Several issues were encountered and overcome via troubleshooting, including replacement of the Micro Camera to Monitor-1 cable to recover video feed to that monitor, and a software reboot to recover lens commanding.  Troubleshooting activities to resolve pneumatic commanding capabilities that were identified during the video checkout will precede the OASIS Gylcerol/Water Fill procedure which will begin the next science run tomorrow.   OASIS studies the unique behavior of liquid crystals in microgravity, including their overall motion and the merging of crystal layers known as smectic islands. Liquid crystals are used for display screens in televisions and clocks and they also occur in soaps and in cell membranes. The experiment allows detailed studies of the behavior of these structures and how microgravity affects their unique ability to act like both a liquid and a solid crystal. Individualized Real-Time Neurocognitive Assessment Toolkit for Space Flight Fatigue (Cognition): Kopra completed the Cognition test battery which includes pre-test questions and cognitive tests with performance feedback. Cognition measures how spaceflight-related physical changes, such as microgravity and lack of sleep, can affect cognitive performance. Cognition includes ten brief computerized tests that cover a wide range of cognitive functions and provides immediate feedback on current and past test results. The software allows for real-time measurement of cognitive performance while in space. NanoRacks Display Photos: Kopra took photos of the NanoRacks Monitor installed in the JEM Pressurized Module (JPM) at Platform-1 as well as the NanoRacks Multi-Gas Monitor Liquid Crystal Display which will be used to assess and prioritize future NanoRacks activities. Platform-1 is used for modules that do  not need power. Data connectivity issues with Platform-1 began after SpX-4 unberth. The ground support team has been working to determine the cause and develop a solution.   Multi-Omics: Peake completed the Japan Aerospace Exploration Agency (JAXA) Multi-Omics investigation by collecting body samples and inserting them into a Minus Eight-degree Freezer for ISS (MELFI). The investigation evaluates the impacts of space environment and prebiotics on astronauts’ immune function by combining data obtained from the measurements of changes in the gut microbiological composition, metabolites profiles, and the immune system.   Urine Processing Assembly (UPA) Distillation Assembly (DA) Remove & Replace (R&R): The ground team has activated the UPA following this morning’s successful DA R&R.  The first process cycle is underway and is looking nominal.  The next planned process cycle will occur on GMT 069 Orbit 1, after the crew performs a WSTA Fill from a US urine EDV.   Today’s Planned Activities All activities were completed unless otherwise noted. MSG – Activation of MSG glove box DA R&R OASIS – Hardware Setup VIZIR. Experiment Ops with СКПИ Hardware / r/g 1612 HAM radio session from Columbus Transfer of IV-TEPC from SM (panel 328) to Lab MATRYOSHKA-R. BUBBLE-dosimeter initialization and deployment r/g 1608 Multi Omics Progress 431 (DC1) Transfesr and IMS Ops /  r/g 0947, 0963 OASIS – Hardware Setup AQM 1005 – Troubleshooting VIZIR. СКПИ Closeout Ops / r/g 1612 Soyuz 719 Samsung Tablet Recharge – Initiate WRS Maintenance Replacement of СО2 Filter Unit (БФ) СОЖ Maintenance PAO Hardware Setup Crew Prep for PAO PAO Event Video Footage of Greetings / r/g 1609 WRS Maintenance Soyuz 719 Samsung Tablet Recharge – terminate Rodent Research (RR) – Equipment Gathering NanoRacks Displays Photos HAM radio session from Columbus Health Maintenance System (HMS) – Nutritional Assessment (ESA) Private Medical Conference (Ku + S-band) IMS Delta File Prep VCA1 Camera Adjustment Daily Planning Conference (S-band) COGNITION – Experiment Ops   Completed Task List Items WHC KTO replace   Ground Activities All activities were completed unless otherwise noted. Nominal ground commanding   Three-Day Look Ahead: Wednesday, 03/09: OASIS experiment, OBT 45S Emergency Drill, Neuromapping Thursday, 03/10: C2V2 H/W install. LAB1P5 RPCM R&R, SPRINT Ultrasound Friday, 03/11: C2V2 comm unit install, LAB1P5 reconfig, OBT Cygnus conference   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Norm Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1YxKMPL
via IFTTT

I have a new follower on Twitter


D Torres



Following: 95 - Followers: 172

March 09, 2016 at 02:57PM via Twitter http://twitter.com/ChristmanSilas

[FD] [CORE-2016-0004] - SAP Download Manager Password Weak Encryption

[FD] [CORE-2016-0003] - Samsung SW Update Tool MiTM

I have a new follower on Twitter


Champsfa
Be a Champion! We are a collective of highly motivated Academy coaches. Coming soon. Watch this space. #TALENTISAMYTH


Following: 9363 - Followers: 27137

March 09, 2016 at 02:36PM via Twitter http://twitter.com/champsfa

Anonymous users receive the wrong course blocker error.

Anonymous users are now seeing the message "You are not allowed to take courses" instead of "Please login or register to take this course".

from Google Alert - anonymous http://ift.tt/1nwKElZ
via IFTTT

Rumor Central: Ravens are \"looking seriously\" at ex-Vikings WR Mike Wallace - report; team also in market for another TE (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Bob Carver
Twitter Top 10 #CyberSecurity, opinions are my own #privacy #disruptive #startups #bitcoin #bigdata #Cloud #mobile #IoT #NewNormal #speaker RT != agree
the world
https://t.co/hjqtTBqFyV
Following: 8061 - Followers: 9481

March 09, 2016 at 08:44AM via Twitter http://twitter.com/cybersecboardrm

SimpleCrop preview not working for anonymous users

Hi everyone, I have used SimpleCrop for authenticated users with no problem. However, now I am using it for anonymous users and the crop preview ...

from Google Alert - anonymous http://ift.tt/1LQPHJK
via IFTTT

I have a new follower on Twitter


Applied Innovations
The Windows Cloud Hosting Experts - Always Available, Always Easy
United States
http://t.co/wtyGmEIIQm
Following: 3847 - Followers: 4605

March 09, 2016 at 03:56AM via Twitter http://twitter.com/appliedi

[FD] LSE Leading Security Experts GmbH - LSE-2016-01-01 - Wordpress ProjectTheme - Multiple Vulnerabilities

=== LSE Leading Security Experts GmbH - Security Advisory 2016-01-01 === Wordpress ProjectTheme Multiple Vulnerabilities -

Source: Gmail -> IFTTT-> Blogger

Solar Eclipse Shoes in the Classroom


The total solar eclipse of March 8/9 will be the only total eclipse in 2016. Crossing the international date line, the New Moon's dark shadow traces a limited, narrow path for viewing the total phase, making landfall in Indonesia and mostly tracking across the Pacific Ocean. A much larger region will be witness to a partially eclipsed Sun though, during morning hours on March 9 for southeast Asia and northeast Australia, and before sunset March 8 for Hawaii and Alaska. Safely viewing the eclipse can actually be very easy. One technique is demonstrated in this shoe group portrait from a classroom in Rosenfeld, Germany, taken during March 2015's solar eclipse. With blinds closed to darken the room, each threaded hole in the window blind creates a pinhole camera, projecting multiple images of the eclipsed sun that march across the floor. Other viewing alternatives include eclipse glasses and a comfortable chair, but be sure to wear a fashionable eclipse shirt. via NASA http://ift.tt/1UaOqhN

More than 1 Million Websites Install Free SSL Certificate (and Counting...)

Let's Encrypt has achieved another big milestone by issuing 1 million free Transport Layer Security (TLS) SSL Certificates to webmasters who wish to secure the communications between their users and domains. Let's Encrypt – operated by the Internet Security Research Group (ISRG) – is an absolutely free, and open source certificate authority recognized by all major browsers, including


from The Hacker News http://ift.tt/1QCpq0x
via IFTTT

JPSS Multi Mission Concept of Operations

NOAA has partnered with NASA to implement the Joint Polar Satellite System (JPSS). The JPSS Program constitutes the next series of U.S. civilian polar orbiting environmental remote sensing satellites and sensors that have been flown historically on polar satellites. These satellites will implement NOAA's requirements for collection of global multi-spectral radiometry and other specialized meteorological and oceanographic data, via remote sensing of land, sea, and the atmosphere. These data will support NOAA's mission for continuous observations of the Earth's environment necessary to understand and predict changes in weather, climate, oceans and coasts, which support the Nation's economy, and protect lives and property. The JPSS-1 through JPSS-4 satellite series provides operational continuity of satellite-based observations and products from NOAA's POES and S-NPP satellites. The JPSS Program includes: - A Flight Segment including the Suomi National Polar-orbiting Partnership (S-NPP), JPSS-1, and JPSS-2/3/4 satellites and launch vehicles; - A Ground Segment consisting of ground station assets, networks, command, control, communications, product generation and distribution, and facilities; and - All science-related activity, including algorithm development and maintenance, and instrument and data product calibration and validation. The JPSS Multi-Mission System supplements other largely independent programs/systems whose data products and services are interconnected via the JPSS Ground Segment to increase across-the-board capabilities. In this synergistic way, JPSS satisfies NOAA requirements by utilizing both domestic and international partner assets, including, but not limited to, EUMETSAT's Metop and EPS-SG satellites, and JAXA's GCOM satellites. To learn more about JPSS, visit http://ift.tt/1TxExfM

from NASA's Scientific Visualization Studio: Most Popular
via IFTTT

Tuesday, March 8, 2016

I have a new follower on Twitter


Sheila Dixon
Proud mother of 2 living in West Baltimore running for Mayor. Let's reclaim, revive and rebuild. Authority: Friends for Sheila Dixon, Geneva Smith, Treasurer
Baltimore, MD
https://t.co/phs4NygQzG
Following: 3618 - Followers: 4474

March 08, 2016 at 09:09PM via Twitter http://twitter.com/SheilaforMayor

UTA-poly and UTA-splines: additive value functions with polynomial marginals. (arXiv:1603.02626v1 [math.OC])

Additive utility function models are widely used in multiple criteria decision analysis. In such models, a numerical value is associated to each alternative involved in the decision problem. It is computed by aggregating the scores of the alternative on the different criteria of the decision problem. The score of an alternative is determined by a marginal value function that evolves monotonically as a function of the performance of the alternative on this criterion. Determining the shape of the marginals is not easy for a decision maker. It is easier for him/her to make statements such as "alternative $a$ is preferred to $b$". In order to help the decision maker, UTA disaggregation procedures use linear programming to approximate the marginals by piecewise linear functions based only on such statements. In this paper, we propose to infer polynomials and splines instead of piecewise linear functions for the marginals. In this aim, we use semidefinite programming instead of linear programming. We illustrate this new elicitation method and present some experimental results.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1URcTtb
via IFTTT

Formal Ontology Learning on Factual IS-A Corpus in English using Description Logics. (arXiv:1312.6947v2 [cs.CL] UPDATED)

Ontology Learning (OL) is the computational task of generating a knowledge base in the form of an ontology given an unstructured corpus whose content is in natural language (NL). Several works can be found in this area most of which are limited to statistical and lexico-syntactic pattern matching based techniques Light-Weight OL. These techniques do not lead to very accurate learning mostly because of several linguistic nuances in NL. Formal OL is an alternative (less explored) methodology were deep linguistics analysis is made using theory and tools found in computational linguistics to generate formal axioms and definitions instead simply inducing a taxonomy. In this paper we propose "Description Logic (DL)" based formal OL framework for learning factual IS-A type sentences in English. We claim that semantic construction of IS-A sentences is non trivial. Hence, we also claim that such sentences requires special studies in the context of OL before any truly formal OL can be proposed. We introduce a learner tool, called DLOL_IS-A, that generated such ontologies in the owl format. We have adopted "Gold Standard" based OL evaluation on IS-A rich WCL v.1.1 dataset and our own Community representative IS-A dataset. We observed significant improvement of DLOL_IS-A when compared to the light-weight OL tool Text2Onto and formal OL tool FRED.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/Jo9nFN
via IFTTT

Multigrid with rough coefficients and Multiresolution operator decomposition from Hierarchical Information Games. (arXiv:1503.03467v4 [math.NA] UPDATED)

We introduce a near-linear complexity (geometric and meshless/algebraic) multigrid/multiresolution method for PDEs with rough ($L^\infty$) coefficients with rigorous a-priori accuracy and performance estimates. The method is discovered through a decision/game theory formulation of the problems of (1) identifying restriction and interpolation operators (2) recovering a signal from incomplete measurements based on norm constraints on its image under a linear operator (3) gambling on the value of the solution of the PDE based on a hierarchy of nested measurements of its solution or source term. The resulting elementary gambles form a hierarchy of (deterministic) basis functions of $H^1_0(\Omega)$ (gamblets) that (1) are orthogonal across subscales/subbands with respect to the scalar product induced by the energy norm of the PDE (2) enable sparse compression of the solution space in $H^1_0(\Omega)$ (3) induce an orthogonal multiresolution operator decomposition. The operating diagram of the multigrid method is that of an inverted pyramid in which gamblets are computed locally (by virtue of their exponential decay), hierarchically (from fine to coarse scales) and the PDE is decomposed into a hierarchy of independent linear systems with uniformly bounded condition numbers. The resulting algorithm is parallelizable both in space (via localization) and in bandwith/subscale (subscales can be computed independently from each other). Although the method is deterministic it has a natural Bayesian interpretation under the measure of probability emerging (as a mixed strategy) from the information game formulation and multiresolution approximations form a martingale with respect to the filtration induced by the hierarchy of nested measurements.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1MuzVAz
via IFTTT

Negatively Correlated Search. (arXiv:1504.04914v2 [cs.NE] UPDATED)

Evolutionary Algorithms (EAs) have been shown to be powerful tools for complex optimization problems, which are ubiquitous in both communication and big data analytics. This paper presents a new EA, namely Negatively Correlated Search (NCS), which maintains multiple individual search processes in parallel and models the search behaviors of individual search processes as probability distributions. NCS explicitly promotes negatively correlated search behaviors by encouraging differences among the probability distributions (search behaviors). By this means, individual search processes share information and cooperate with each other to search diverse regions of a search space, which makes NCS a promising method for non-convex optimization. The cooperation scheme of NCS could also be regarded as a novel diversity preservation scheme that, different from other existing schemes, directly promotes diversity at the level of search behaviors rather than merely trying to maintain diversity among candidate solutions. Empirical studies showed that NCS is competitive to well-established search methods in the sense that NCS achieved the best overall performance on 20 multimodal (non-convex) continuous optimization problems. The advantages of NCS over state-of-the-art approaches are also demonstrated with a case study on the synthesis of unequally spaced linear antenna arrays.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1yMutq5
via IFTTT

BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. (arXiv:1511.06030v2 [cs.AI] UPDATED)

Review fraud is a pervasive problem in online commerce, in which fraudulent sellers write or purchase fake reviews to manipulate perception of their products and services. Fake reviews are often detected based on several signs, including 1) they occur in short bursts of time; 2) fraudulent user accounts have skewed rating distributions. However, these may both be true in any given dataset. Hence, in this paper, we propose an approach for detecting fraudulent reviews which combines these 2 approaches in a principled manner, allowing successful detection even when one of these signs is not present. To combine these 2 approaches, we formulate our Bayesian Inference for Rating Data (BIRD) model, a flexible Bayesian model of user rating behavior. Based on our model we formulate a likelihood-based suspiciousness metric, Normalized Expected Surprise Total (NEST). We propose a linear-time algorithm for performing Bayesian inference using our model and computing the metric. Experiments on real data show that BIRDNEST successfully spots review fraud in large, real-world graphs: the 50 most suspicious users of the Flipkart platform flagged by our algorithm were investigated and all identified as fraudulent by domain experts at Flipkart.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1X1JcZz
via IFTTT

LSTM Neural Reordering Feature for Statistical Machine Translation. (arXiv:1512.00177v2 [cs.CL] UPDATED)

Artificial neural networks are powerful models, which have been widely applied into many aspects of machine translation, such as language modeling and translation modeling. Though notable improvements have been made in these areas, the reordering problem still remains a challenge in statistical machine translations. In this paper, we present a novel neural reordering model that directly models word pairs and alignment. By utilizing LSTM recurrent neural networks, much longer context could be learned for reordering prediction. Experimental results on NIST OpenMT12 Arabic-English and Chinese-English 1000-best rescoring task show that our LSTM neural reordering feature is robust and achieves significant improvements over various baseline systems.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Tt5y0j
via IFTTT

Censoring Representations with an Adversary. (arXiv:1511.05897v3 [cs.LG] CROSS LISTED)

In practice, there are often explicit constraints on what representations or decisions are acceptable in an application of machine learning. For example it may be a legal requirement that a decision must not favour a particular group. Alternatively it can be that that representation of data must not have identifying information. We address these two related issues by learning flexible representations that minimize the capability of an adversarial critic. This adversary is trying to predict the relevant sensitive variable from the representation, and so minimizing the performance of the adversary ensures there is little or no information in the representation about the sensitive variable. We demonstrate this adversarial approach on two problems: making decisions free from discrimination and removing private information from images. We formulate the adversarial model as a minimax problem, and optimize that minimax objective using a stochastic gradient alternate min-max optimizer. We demonstrate the ability to provide discriminant free representations for standard test problems, and compare with previous state of the art methods for fairness, showing statistically significant improvement across most cases. The flexibility of this method is shown via a novel problem: removing annotations from images, from unaligned training examples of annotated and unannotated images, and with no a priori knowledge of the form of annotation provided to the model.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QOg8Q3
via IFTTT

[FD] Windows Mail Find People DLL side loading vulnerability

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

Orioles: Addition of Pedro Alvarez \"further complicates\" outfield situation in Baltimore, writes Eddie Matz (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ravens: Former Saints TE Benjamin Watson agrees to deal - Jamison Hensley, multiple reports; 74 catches, 6 TD in 2015 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Food Addicts in Recovery Anonymous

Venue info. Prince of Peace Lutheran Church, Augusta. Prince of Peace Lutheran Church, Augusta, 209 Eastern Ave., Augusta, ME 04330. Contact.

from Google Alert - anonymous http://ift.tt/1QJA5Ve
via IFTTT

Ravens: Ohio State DE Joey Bosa goes No. 6 in Mel Kiper's Mock Draft 3.0; \"hard to pass on a talent as complete\" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Mail anonymous user always in site default language

However, when I place an order as anonymous user then the invoice mail is send in the site default language. No matter in what language I place the ...

from Google Alert - anonymous http://ift.tt/21jDD5A
via IFTTT

Ravens: OL Kelechi Osemele to leave Baltimore, sign with Raiders - NFL Network; switched to LT for 2015's final 4 games (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Maloney and Vance call on Congress to stop anonymous terrorist and criminal shell corporation ...

NEW YORK – Flanked by local District Attorneys, Congresswoman Carolyn B. Maloney today pressed for action on her legislation that would unmask ...

from Google Alert - anonymous http://ift.tt/1X9EfcH
via IFTTT

ISS Daily Summary Report – 03/7/16

Ultrasonic Background Noise Test (UBNT): Kopra replaced an AA battery pack behind LAB racks followed by a data download. UBNT detects high-frequency sounds generated by hardware on the U.S.-built portions of the International Space Station. Identifying sources of noise will aid in development of a leak locating system, which would detect the high-pitched sound of air leaking through a pressurized wall. To detect leaks, the system would have to tell the difference between harmless background sounds and potentially dangerous air leakage.   Observation and Analysis of Smectic Islands in Space (OASIS): Kopra reviewed reference material for OASIS and gathered Microgravity Science Glovebox (MSG) and OASIS hardware to support the setup of OASIS inside MSG. OASIS studies the unique behavior of liquid crystals in microgravity, including their overall motion and the merging of crystal layers known as smectic islands. Liquid crystals are used for display screens in televisions and clocks and they occur in soaps and in cell membranes. The experiment allows detailed studies of the behavior of these structures and how microgravity affects their unique ability to act like both a liquid and a solid crystal.   Space Automated Bioproduct Laboratory (SABL): Kopra performed troubleshooting on SABL1 and found slight damage to the intake vent. He took photos of the area and downlinked for ground review. SABL1 will be left unpowered until teams can work a forward plan. SABL was to undergo a two week checkout of the new facility in the Lab but the SABL hardware was powered off after the hardware temperature rose beyond the nominal range.  SABL is required for use with the Micro-10 investigation that has hardware arriving on SpX-8.  It is an upgrade to the ISS incubator, Commercial Generic Bioprocessing Apparatus (CGBA). SABL supports a wide variety of experiments in the life, physical and material sciences with a focus on supporting research of biological systems and processes.  It is capable of supporting life science research on microorganisms, small organisms, animal cells, tissue cultures and small plants.   Common Communications For Visiting Vehicles (C2V2): Peake gathered hardware, then with assistance from Kopra, began this week’s C2V2 installation. Today they routed C2V2 1553, Joint Station Lab (JSL) and Ethernet cables in the Lab. C2V2 will  integrate a communications system for the ISS to be used specifically for communicating with future visiting vehicles. This system will utilize both an S-Band based Radio Frequency (RF) system, and hard-line connections to visiting vehicles so secure, reliable communications will be available for all phases of rendezvous, docking, and mated operations. The system will consist of elements that will be permanently installed on the ISS as well as a corresponding element that will be made available to visiting vehicles.   Urine Processing Assembly (UPA) Status: Over the weekend ground teams directed the crew to initiate a 24-hour dryout period. The ground attempted 2 restarts of the UPA Distillate Assembly (DA) this morning without success. A cool down is currently in process prior to a 3rd restart attempt planned for this evening. If the attempt is unsuccessful, a DA Remove & Replace (R&R) will be scheduled tomorrow.   ISS Reboost With 61 Progress (61P): A reboost was performed last Friday at 10:15 PM CST using 61P thrusters. The reboost was to set up conditions for 46S 4-orbit rendezvous on March 19.   Today’s Planned Activities All activities were completed unless otherwise noted. METERON – Laptop Activation Daily Planning Conference (S-band) Gather Common Communications Equipment for Visiting Vehicles (C2V2) to be Installed in the Lab UBNT – Locate Ultrasonic Background Noise Test Battery (UBNT) URAGAN. Photo Spectrum System Battery Charge (start) / r/g 1616 C2V2 general information and procedure review End of EMU Metal Oxide (METOX) regeneration process OTKLIK. Hardware Monitoring / r/g 1588 Routing C2V2 Cables in the Lab Common Communications Equipment for Visiting Vehicles (C2V2) – Assistance – Part 1 Draining water from EDV2M No.1238 / r/g 1607 Common Communications Equipment for Visiting Vehicles (C2V2) – Assistance – Part 2 СОЖ Maintenance Exercise Data Downlink via OCA WRS – tank fill for processing from EDV WRS Water Sample Analysis HABIT – Data Recording to iPad UBNT – Battery Replacement Routing C2V2 Cables in the Lab Multi Omics (MO) – Kit Setup for the Test UBNT – Data Downlink 1 Multi Omics (MO) – Equipment Stowage URAGAN. Recovery of Photo Spectrum System (ФСС) Hardware r/g 1614 OASIS – Overview Multi Omics (MO) – Sample Collection [Deferred] Multi Omics (MO) – Sample Insertion into MELFI [Deferred] OASIS – Equipment Gathering Multi Omics (MO) – Equipment Stowage [Deferred] HMS. WinSCAT psychological assessment TOCA – data recording Changeout of Batteries for Ultrasonic Background Noise Test AA Removing bubble bags and moisture Restow Common Communication Equipment for Visiting Vehicles (C2V2) SM Ventilation System Preventive Maintenance. Group А / Thermal Mode Control System [СОТР] UBNT – Data Downlink 2   Completed Task List Items IFM build EDV PMM cleanup part 1 WHC EDV-Y R&R   Ground Activities All activities were completed unless otherwise noted. Nominal ground commanding   Three-Day Look Ahead: Tuesday, 03/08: OASIS h/w setup, JEM Stowage Frame Install Part 3, Cognition, IV-TEPC relocation, DA R&R Wednesday, 03/09: OASIS experiment, OBT 45S Emergency Drill, Neuromapping Thursday, 03/10: C2V2 h/w install. LAB1P5 RPCM R&R, SPRINT Ultrasound   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) On [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1p4INpH
via IFTTT

'Guccifer,' who Hacked former President, to be extradited to the US

Upon the request of US authorities, Marcel Lazar Lehel, well known as Guccifer, has finally been approved to extradite to the United States to face Computer Intrusion and Identity Theft Charges for 18 months. Guccifer is an infamous Romanian hacker who was arrested in Romania for hacking into the emails and social networking accounts of numerous high profile the US and Romanian Politicians.


from The Hacker News http://ift.tt/1LOlZ7W
via IFTTT

Hacker arrested for ATM Skimming escaped from Prison

A Romanian card skimmer arrested for being part of an international cybercrime group that used malware to plunder US$217,000 from ATMs has escaped from a Bucharest prison on Sunday morning (6th March). Renato Marius Tulli, 34, was being held at Police Precinct 19 in Bucharest, the capital of Romania, after being arrested together with 7 other suspects as part of a joint Europol, Eurojust,


from The Hacker News http://ift.tt/1UakAdx
via IFTTT

Hackers and Cyber Experts to Come Together at NullCon 2016

A crowd of IT professionals, cyber security experts, thought leaders and business decision makers along with the best minds in the hacking community will come together at annual Nullcon security conference 2016 under the same roof to join their efforts in addressing the most critical issues of the Internet Cyberspace. NullCon, appropriately dubbed "The Next Security Thing", creates


from The Hacker News http://ift.tt/1X9kG4e
via IFTTT

Hacker Reveals How to Hack Any Facebook Account

Hacking Facebook account is one of the major queries of the Internet user today. It's hard to find the way to hack into someone Facebook account, but a Facebook user just did it. A security researcher discovered a 'simple vulnerability' in the social network that allowed him to easily hack into any Facebook account, view message conversations, post anything, view payment card details


from The Hacker News http://ift.tt/1ToAhiq
via IFTTT

Your iPhone will Alert You if You are Being Monitored At Work

Are You an Employee? It's quite possible that someone has been reading your messages, emails, listening to your phone calls, and monitoring your activities at work. No, it's not a spy agency or any hacker… ...Oops! It's your Boss. Recently, European Court had ruled that the Employers can legally monitor as well as read workers' private messages sent via chat software like WhatsApp or


from The Hacker News http://ift.tt/1pcywZb
via IFTTT

Mystery Feature Now Disappears in Titan Lake


What is that changing object in a cold hydrocarbon sea of Titan? Radar images from the robotic Cassini spacecraft orbiting Saturn have been recording the surface of the cloud-engulfed moon Titan for years. When imaging the flat -- and hence radar dark -- surface of the methane and ethane lake called Ligeia Mare, an object appeared in 2013 July just was not there in 2007. Subsequent observations in 2014 August found the object remained -- but had changed. In an image released last week, the mystery object seems to have disappeared in 2015 January. The featured false-color image shows how the 20-km long object has come, changed, and gone. Current origin speculative explanations include waves, bubbling foam and floating solids, but still no one is sure. Future observations, in particular Cassini's final close flyby of Titan in 2017 April, may either resolve the enigma or open up more speculation. via NASA http://ift.tt/1Rww7yY

Orioles: Pedro Alvarez agrees to 1-year, $5.75 million deal - Jim Bowden, media reports; had 27 HR, 77 RBI last season (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Monday, March 7, 2016

I have a new follower on Twitter


Songtive
Songtive is a songwriting tool, band and social network which allows you experiment with arrangements and chord progressions with the help from other users.

http://t.co/IeNSSj0AHR
Following: 4592 - Followers: 3733

March 07, 2016 at 11:40PM via Twitter http://twitter.com/songtiveapp

A Linked Data Scalability Challenge: Concept Reuse Leads to Semantic Decay. (arXiv:1603.01722v1 [cs.AI])

The increasing amount of available Linked Data resources is laying the foundations for more advanced Semantic Web applications. One of their main limitations, however, remains the general low level of data quality. In this paper we focus on a measure of quality which is negatively affected by the increase of the available resources. We propose a measure of semantic richness of Linked Data concepts and we demonstrate our hypothesis that the more a concept is reused, the less semantically rich it becomes. This is a significant scalability issue, as one of the core aspects of Linked Data is the propagation of semantic information on the Web by reusing common terms. We prove our hypothesis with respect to our measure of semantic richness and we validate our model empirically. Finally, we suggest possible future directions to address this scalability problem.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1U0xMTc
via IFTTT

An Argument-based Creative Assistant for Harmonic Blending. (arXiv:1603.01770v1 [cs.SD])

Conceptual blending is a powerful tool for computational creativity where, for example, the properties of two harmonic spaces may be combined in a consistent manner to produce a novel harmonic space. However, deciding about the importance of property features in the input spaces and evaluating the results of conceptual blending is a nontrivial task. In the specific case of musical harmony, defining the salient features of chord transitions and evaluating invented harmonic spaces requires deep musicological background knowledge. In this paper, we propose a creative tool that helps musicologists to evaluate and to enhance harmonic innovation. This tool allows a music expert to specify arguments over given transition properties. These arguments are then considered by the system when defining combinations of features in an idiom-blending process. A music expert can assess whether the new harmonic idiom makes musicological sense and re-adjust the arguments (selection of features) to explore alternative blends that can potentially produce better harmonic spaces. We conclude with a discussion of future work that would further automate the harmonisation process.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Rxyemf
via IFTTT

Hierarchical Decision Making In Electricity Grid Management. (arXiv:1603.01840v1 [cs.AI])

The power grid is a complex and vital system that necessitates careful reliability management. Managing the grid is a difficult problem with multiple time scales of decision making and stochastic behavior due to renewable energy generations, variable demand and unplanned outages. Solving this problem in the face of uncertainty requires a new methodology with tractable algorithms. In this work, we introduce a new model for hierarchical decision making in complex systems. We apply reinforcement learning (RL) methods to learn a proxy, i.e., a level of abstraction, for real-time power grid reliability. We devise an algorithm that alternates between slow time-scale policy improvement, and fast time-scale value function approximation. We compare our results to prevailing heuristics, and show the strength of our method.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1M3HJYn
via IFTTT

Composing inference algorithms as program transformations. (arXiv:1603.01882v1 [stat.ML])

Probabilistic inference procedures are usually coded painstakingly from scratch, for each target model and each inference algorithm. We reduce this coding effort by generating inference procedures from models automatically. We make this code generation modular by decomposing inference algorithms into reusable program transformations. These source-to-source transformations perform exact inference as well as generate probabilistic programs that compute expectations, densities, and MCMC samples. The resulting inference procedures run in time comparable to that of handwritten procedures.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1M3HJrw
via IFTTT

Adaptive Visualisation System for Construction Building Information Models Using Saliency. (arXiv:1603.02028v1 [cs.CV])

Building Information Modeling (BIM) is a recent construction process based on a 3D model, containing every component related to the building achievement. Architects, structure engineers, method engineers, and others participant to the building process work on this model through the design-to-construction cycle. The high complexity and the large amount of information included in these models raise several issues, delaying its wide adoption in the industrial world. One of the most important is the visualization: professionals have difficulties to find out the relevant information for their job. Actual solutions suffer from two limitations: the BIM models information are processed manually and insignificant information are simply hidden, leading to inconsistencies in the building model. This paper describes a system relying on an ontological representation of the building information to label automatically the building elements. Depending on the user's department, the visualization is modified according to these labels by automatically adjusting the colors and image properties based on a saliency model. The proposed saliency model incorporates several adaptations to fit the specificities of architectural images.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1U0xMCJ
via IFTTT

Unscented Bayesian Optimization for Safe Robot Grasping. (arXiv:1603.02038v1 [cs.RO])

We address the robot grasp optimization problem of unknown objects considering uncertainty in the input space. Grasping unknown objects can be achieved by using a trial and error exploration strategy. Bayesian optimization is a sample efficient optimization algorithm that is especially suitable for this setups as it actively reduces the number of trials for learning about the function to optimize. In fact, this active object exploration is the same strategy that infants do to learn optimal grasps. One problem that arises while learning grasping policies is that some configurations of grasp parameters may be very sensitive to error in the relative pose between the object and robot end-effector. We call these configurations unsafe because small errors during grasp execution may turn good grasps into bad grasps. Therefore, to reduce the risk of grasp failure, grasps should be planned in safe areas. We propose a new algorithm, Unscented Bayesian optimization that is able to perform sample efficient optimization while taking into consideration input noise to find safe optima. The contribution of Unscented Bayesian optimization is twofold as if provides a new decision process that drives exploration to safe regions and a new selection procedure that chooses the optimal in terms of its safety without extra analysis or computational cost. Both contributions are rooted on the strong theory behind the unscented transformation, a popular nonlinear approximation method. We show its advantages with respect to the classical Bayesian optimization both in synthetic problems and in realistic robot grasp simulations. The results highlights that our method achieves optimal and robust grasping policies after few trials while the selected grasps remain in safe regions.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QHsqXh
via IFTTT

Learning Shared Representations in Multi-task Reinforcement Learning. (arXiv:1603.02041v1 [cs.AI])

We investigate a paradigm in multi-task reinforcement learning (MT-RL) in which an agent is placed in an environment and needs to learn to perform a series of tasks, within this space. Since the environment does not change, there is potentially a lot of common ground amongst tasks and learning to solve them individually seems extremely wasteful. In this paper, we explicitly model and learn this shared structure as it arises in the state-action value space. We will show how one can jointly learn optimal value-functions by modifying the popular Value-Iteration and Policy-Iteration procedures to accommodate this shared representation assumption and leverage the power of multi-task supervised learning. Finally, we demonstrate that the proposed model and training procedures, are able to infer good value functions, even under low samples regimes. In addition to data efficiency, we will show in our analysis, that learning abstractions of the state space jointly across tasks leads to more robust, transferable representations with the potential for better generalization. this shared representation assumption and leverage the power of multi-task supervised learning. Finally, we demonstrate that the proposed model and training procedures, are able to infer good value functions, even under low samples regimes. In addition to data efficiency, we will show in our analysis, that learning abstractions of the state space jointly across tasks leads to more robust, transferable representations with the potential for better generalization.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1puOSfM
via IFTTT

Learning Hand-Eye Coordination for Robotic Grasping with Deep Learning and Large-Scale Data Collection. (arXiv:1603.02199v1 [cs.LG])

We describe a learning-based approach to hand-eye coordination for robotic grasping from monocular images. To learn hand-eye coordination for grasping, we trained a large convolutional neural network to predict the probability that task-space motion of the gripper will result in successful grasps, using only monocular camera images and independently of camera calibration or the current robot pose. This requires the network to observe the spatial relationship between the gripper and objects in the scene, thus learning hand-eye coordination. We then use this network to servo the gripper in real time to achieve successful grasps. To train our network, we collected over 800,000 grasp attempts over the course of two months, using between 6 and 14 robotic manipulators at any given time, with differences in camera placement and hardware. Our experimental evaluation demonstrates that our method achieves effective real-time control, can successfully grasp novel objects, and corrects mistakes by continuous servoing.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1puOSfG
via IFTTT

An Online Mechanism for Ridesharing in Autonomous Mobility-on-Demand Systems. (arXiv:1603.02208v1 [cs.AI])

With proper management, Autonomous Mobility-on-Demand (AMoD) systems have great potential to satisfy urban population's mobility demand by providing safe, convenient, and affordable ridesharing services. Meanwhile, such systems can substantially decrease private car ownership and use, and thus significantly reduce traffic congestion, energy consumption and carbon emissions. In order to schedule the assignments optimally, an AMoD system requires detailed information about the demand from passengers. However, chances are that passengers do not cooperate with the service providers because of self-interestedness. Therefore, an online mechanism is desirable if it incentivizes passengers to truthfully report their actual demand. For the purpose of promoting ridesharing, we hereby introduce an integrated online ridesharing mechanism (IORS). Numerical results show that the IORS mechanism outperforms the offline, auction-based mechanism substantially. It has a very close performance compared to the optimal solution, with less computation time required and no future knowledge about the demand needed.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1RxybXB
via IFTTT