Latest YouTube Video

Saturday, May 21, 2016

Allow anonymous user to access pipelines

What does this MR do? It fixes an issue where the Pipelines is shown for the Anonymous users, but they get 404 when clicked. Their session is then ...

from Google Alert - anonymous http://ift.tt/1TzJmDX
via IFTTT

Anonymous Texter Has Hilarious Conversation as Ross Geller From

Is there someone on this planet who hasn't heard of Ross Geller? It turns out that that is indeed the case, as evidenced by a hilarious text conversion ...

from Google Alert - anonymous http://ift.tt/1WJnRn4
via IFTTT

Top Websites Using Audio Fingerprinting to Secretly Track Web Users

Despite browsing incognito, blocking advertisements, or hiding your tracks, some websites monitor and track your every move online using a new web-tracking technique called Audio Fingerprinting. This new fingerprinting technique can be utilized by technology and marketing companies to deliver targeted advertisements as well as by law enforcement to unmask VPN or Anonymous users, without even


from The Hacker News http://ift.tt/1Tyma99
via IFTTT

Bug Hunter Found Ways to Hack Any Instagram Accounts

How to hack an Instagram account? The answer to this question is difficult to find, but a bug bounty hunter just did it without too many difficulties. Belgian bug bounty hunter Arne Swinnen discovered two vulnerabilities in image-sharing social network Instagram that allowed him to brute-force Instagram account passwords and take over user accounts with minimal efforts. <!-- adsense --> Both


from The Hacker News http://ift.tt/241jDWz
via IFTTT

Ecuador Bank Hacked — $12 Million Stolen in 3rd Attack on SWIFT System

Bangladesh is not the only bank that had become victim to the cyber heist. In fact, it appears to be just a part of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT. Yes, the global banking messaging system that thousands of banks and companies around the world use to transfer Billions of dollars in


from The Hacker News http://ift.tt/1XGL8VG
via IFTTT

I have a new follower on Twitter


COURSEKEN
Discover the best courses on web.

https://t.co/y6bUu2X1d5
Following: 69556 - Followers: 86872

May 21, 2016 at 03:03AM via Twitter http://twitter.com/courseken

3D Mercury Transit


On May 9, innermost planet Mercury crossed IN FRONT of the Sun. Though pictures project the event in only two dimensions, a remarkable three dimensional perspective on the transit is possible by free viewing this stereo pair. The images were made 23 minutes apart and rotated so that Mercury's position shifts horizontally between the two. As a result, Mercury's orbital motion produced an exaggerated parallax simulating binocular vision. Between the two exposures, the appropriately named planet's speedy 47.4 kilometer per second orbital velocity actually carried it over 65,000 kilometers. Taken first, the left image is intended for the right eye, so a cross-eyed view is needed to see Mercury's tiny silhouette suspended in the foreground. Try it. Merging the text below the images helps. via NASA http://ift.tt/20eTfaS

2016 Mars Opposition

On May 22, 2016, Mars and the sun will be positioned on opposite sides of the Earth in what is known as a "Mars opposition." This line-up occurs roughly every 26 months. Eight days after the Mars opposition, on May 30, 2016, a Mars "close approach" occurs. A close approach is the point in Mars' orbit when the Red Planet comes the closest to Earth. At its closest approach, Mars will be 46.8 million miles away (75.3 million kilometers). If Mars and Earth had perfectly circular orbits, close approach would occur at the same time as opposition. However, since Mars and Earth both have elliptical orbits, the close approach is not aligned with opposition, and varies from year to year.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1Tt3576
via IFTTT

Friday, May 20, 2016

'Anonymous' protesters, newspaper reporter arrested

... Attorney lives, on Friday.No justice, no peace, chanted members of the so-called Anonymous Florida group, as they were put in restraints and taken in.

from Google Alert - anonymous http://ift.tt/1TpONSx
via IFTTT

Anonymous

Anonymous. The woman receiving the loan lives in Cochabamba. She is a single mother of three children, who she takes care of and provides an ...

from Google Alert - anonymous http://ift.tt/1RefSpk
via IFTTT

I have a new follower on Twitter


Daily Fantasy Promos
Best place for Daily Fantasy Football and Basketball - FanDuel ! Use promo code STACKS for 100% deposit match up to $200. To join, click below

https://t.co/mS0qhsLPxH
Following: 7135 - Followers: 15603

May 20, 2016 at 06:22PM via Twitter http://twitter.com/DFFPromos

Orioles: Recent history says Baltimore won't fade anytime soon, writes Eddie Matz; \"maybe these Birds are built to last\" (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Can evaluation forms be anonymous

Can evaluation forms be anonymous. Asked by dveenhof on May 20, 2016 at 12:02 PM. evaluation. Profile Image. JotForm Support ...

from Google Alert - anonymous http://ift.tt/256texH
via IFTTT

How do you engage anonymous leads?

We're a B2B professional services company. Through our marketing automation platform (Act-On Software), we're able to see many anonymous leads ...

from Google Alert - anonymous http://ift.tt/1XFcaN8
via IFTTT

De La Soul Share

The countdown begins. After releasing the teaser EP, For You Pain & Suffering, just a few weeks back, De La Soul has officially revealed the full track ...

from Google Alert - anonymous http://ift.tt/1TsaJ1J
via IFTTT

Vectorization of anonymous functions

Hi everybody,. I am trying to get vectorized outputs from anonymous functions. With a single input, the function returns a vector. I am getting in trouble ...

from Google Alert - anonymous http://ift.tt/1U5dH9v
via IFTTT

Anonymous Fl. new threat against State Attorney Aronberg

Anonymous Florida is expected to protest outside State Attorney Dave Aronberg's house Friday afternoon.The group wants him to charge former Palm ...

from Google Alert - anonymous http://ift.tt/1TuFWT6
via IFTTT

http://ift.tt/1qyGlIranonymous/xynhypskcc-5gog3_5ad6scrooge0-3da72terminator-7480 ...

http://ift.tt/1qyGlIranonymous/xynhypskcc-5gog3_5ad6scrooge0-3da72terminator-7480.html 0.6 ...

from Google Alert - anonymous http://ift.tt/1VdXHHs
via IFTTT

Facebook Sued for illegally Scanning Users' Private Messages

Facebook is in trouble once again regarding its users' privacy. Facebook is facing a class-action lawsuit in Northern California over allegations that the company systematically scans its users' private messages on the social network without their consent and makes the profit by sharing the data with advertisers and marketers. <!-- adsense --> According to the lawsuit filing, Facebook might


from The Hacker News http://ift.tt/27HlHaO
via IFTTT

ISS Daily Summary Report – 05/19/16

Rodent Research-3 (RR-3) Operations: The crew has completed operations on 15 rodents. They are scheduled to perform operations on 5 rodents today and 5 more tomorrow which will conclude this session of RR activities.  The crew will perform bone densitometry measurements and then transfer the rodents to the Microgravity Science Glovebox (MSG) for sample processing. This investigation studies the molecular and physical changes to the musculoskeletal system that occur in space. Results will expand scientists’ understanding of muscle atrophy and bone loss in space while testing an antibody that has been known to prevent muscle wasting in mice on Earth.   Sprint Ultrasound 2 Operations: The crew set up a camera and video, configured Ultrasound 2, placed reference marks on the calf and thigh of the right leg, donned Sprint (Integrated Resistance and Aerobic Training Study) thigh and calf guides, and performed thigh and calf ultrasound scans with guidance from the Sprint ground team. Ultrasound scans are used to evaluate spaceflight-induced changes in the muscle volume. The Sprint investigation evaluates the use of high intensity, low volume exercise training to minimize loss of muscle, bone, and cardiovascular function in ISS crewmembers during long-duration missions.   Thermolab Deinstrumentation for Circadian Rhythms: Following completion of a 36-hour measurement, the crew removed the double sensors and the Thermolab Unit before cleaning and stowing the equipment for European Space Agency’s (ESA’s) Circadian Rhythm experiment. The objective of the experiment is to get a better understanding of alterations in circadian rhythms in humans during long-term space flights. Such knowledge will provide important insights into the adaptations of the human autonomic nervous system in space over time as well as significant practical implications by helping to improve physical exercise, rest and work shifts and ensuring adequate workplace illumination.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the ISS. Observations will help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Urine Processing Assembly (UPA) Status: Yesterday, 2 attempts to start the Distillation Assembly (DA) faulted out due to DA belt slippage. A subsequent attempt resulted in completion of a successful UPA process run. Another process run is now in progress.   Advanced Resistive Exercise Device (ARED) Status: Following yesterday’s crew report of a loud noise during cable exercise, the ARED remains no-go for cable exercise but is go for bar exercise. Engineering teams met today and will recommend actions to restore full functionality.   Mobile Servicing System (MSS) Operations: Later today Robotics ground controllers will use the Space Station Remote Manipulator System (SSRMS) to unstow the Special Purpose Dexterous Manipulator (SPDM) and perform a video survey of the RapidScat payload.   Cygnus Cargo Transfer Status: The crew has completed approximately 26 hours of cargo transfer with approximately 21.5 hours remaining to be completed.   Today’s Planned Activities All activities were completed unless otherwise noted. NEUROIMMUNITET. Saliva Sampling.  Stress-Test (Session 1) r/g 2294 SPLANH. Preparation and Initiate EGEG Recording r/g 2288 CORRECTSIYA. NEUROIMMUNITET. Blood Sample / r/g 2294 USND2 Hardware Activation NEUROIMMUNITET. Venous blood sample processing (smear) r/g 2294 CORRECTSIYA. NEUROIMMUNITET. Venous blood sample processing r/g 2294 CORRECTSIYA. NEUROIMMUNITET. Handover to USOS for MELFI Insertion / r/g 2294 RUEXP  Blood Sample Insertion into MELFI CORRECTSIYA. NEUROIMMUNITET. Closeout Ops / r/g 2294 SPRINT Ultrasound Scan Operations Monitoring Progress 432 (Aft) АСН-К exchange from the Laptop during the test / r/g 2272 SPRINT Assistance for the test Rodent Research (RR) Node 2 Camcorder Settings Adjustment CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 2291 Circadian Rhythms Thermolab Deinstrumentation CIR Hardware Setup Soyuz 719 IRIDIUM phone charge, setup, start charge Rodent Research Animal transfer to MSG and back High Definition (HD) Config JEM Setup Rodent Research Rodent Dissection and Bone Densitometer Ops Soyuz 719 IRIDIUM phone charge, battery charge status Rodent Research Refrigerated Centrifuge Adjustment Soyuz 719 IRIDIUM phone charge, terminate charge Rodent Research (RR) Bone Densitometer Scan Crew Prep for PAO/ r/g 2293 Rodent Research MELFI Sample Insertion TV Session with Ivanovo Schoolchildren r/g 2293 Rodent Research (RR) Bone Densitometer Scan Rodent Research MELFI Sample Insertion Rodent Research Refrigerated Centrifuge Configuration BRI data download to RSS1 laptop / r/g 2052 Rodent Research Rodent Dissection and Bone Densitometer Ops Soyus 720 IRIDIUM phone charge, start charge Monitoring Progress 432 (Aft) АСН-К exchange on the Laptop during the test / r/g 2272 Soyuz 720 IRIDIUM phone charge, battery charge status SPLANH. Termination of EGEG Recording and Closeout Ops r/g 2288 Soyuz 720 IRIDIUM Phone charge, terminate charge, teardown the setup, closeout ops WRS. Recycle Tank Fill from EDV Installation of METEOR flashcard drive SPLANH. Photography of the Experiment Ops / r/g 2289 Rodent Research Closeout Ops Rodent Research MELFI Sample Insertion USND2 Hardware Deactivation NEUROIMMUNITET. Psychological Testing / r/g 2294 Cygnus Cargo Operations ESA Weekly Crew Conference NEUROIMMUNITET. Hair Sample / r/g 2294 Circadian Rhythms, Data Downlink Circadian Rhythms, Close-out Ops and Stowage On-orbit hearing assessment using EARQ Soyuz 720 Kazbek Fit Check Rodent Research Animal transfer to MSG and back СОЖ Maintenance CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 2291 Monitoring Progress 432 (Aft) АСН-К exchange on the Laptop during the test  r/g 2272 Rodent Research Rodent Dissection and Bone Densitometer Ops Rodent Research (RR) Bone Densitometer Scan OTKLIK. Sensor functional test and point of impact coordinate accuracy check r/g 2281 Rodent Research MELFI Sample Insertion WRS, Recycle Tank Fill from EDV Rodent Research (RR) Bone Densitometer Scan IMS Delta File Prep Food Frequency Questionnaire Rodent Research MELFI Sample Insertion PAO Hardware Setup Rodent Research (RR) Bone Densitometer Scan Crew Prep for PAO Rodent Research MELFI Sample Insertion PAO Event Rodent Research Refrigerated Centrifuge Configuration Rodent ResearchRodent Dissection and Bone Densitometer Ops Cygnus Cargo Operations Rodent Research Animal transfer to MSG and back Rodent Research Closeout Ops […]

from ISS On-Orbit Status Report http://ift.tt/1W62uMe
via IFTTT

I have a new follower on Twitter


Plasma Air Int'l
Plasma Air manufactures air purification products using bipolar ionization technology utilizing ASHRAE's Standard 62.1 IAQ Procedure reducing outside air intake
Stamford, CT
http://t.co/MhiAj1Xwbj
Following: 2129 - Followers: 2454

May 20, 2016 at 03:42AM via Twitter http://twitter.com/PlasmaAir

The Surface of Europa


An enhanced-color view, this image covers a 350 by 750 kilometer swath across the surface of Jupiter's tantalizing moon Europa. The close-up combines high-resolution image data with lower resolution color data from observations made in 1998 by the Galileo spacecraft. Smooth ice plains, long fractures, and jumbled blocks of chaos terrain are thought to hide a deep ocean of salty liquid water beneath. Though the ice-covered alien ocean world is outside the Solar System's habitable zone, new studies show the potential chemistry driving its oxygen and hydrogen production, a key indicator of the energy available for life, could produce amounts comparable in scale to planet Earth. Hydrogen would be generated by chemical reactions of the salty water in contact with the rocky ocean floor. Oxygen and other compounds that react with hydrogen would come from Europa's surface. There water ice molecules would be split apart by the intense flux of high-energy radiation from Jupiter and cycled into the Europan ocean from above. via NASA http://ift.tt/1U1G3kW

I have a new follower on Twitter


CSG, Inc
Facility Services custom designed to meet your high standards and do It consistently. Nationwide Cleaning and Building Maintenance. Dennis O'Brien, CEO
Danvers, MA
https://t.co/8sPKtP8Zjq
Following: 1178 - Followers: 1236

May 20, 2016 at 12:22AM via Twitter http://twitter.com/csginc11

Thursday, May 19, 2016

Heuristics for Planning, Plan Recognition and Parsing. (arXiv:1605.05807v1 [cs.AI])

In a recent paper, we have shown that Plan Recognition over STRIPS can be formulated and solved using Classical Planning heuristics and algorithms. In this work, we show that this formulation subsumes the standard formulation of Plan Recognition over libraries through a compilation of libraries into STRIPS theories. The libraries correspond to AND/OR graphs that may be cyclic and where children of AND nodes may be partially ordered. These libraries include Context-Free Grammars as a special case, where the Plan Recognition problem becomes a parsing with missing tokens problem. Plan Recognition over the standard libraries become

Planning problems that can be easily solved by any modern planner, while recognition over more complex libraries, including Context--Free Grammars (CFGs), illustrate limitations of current Planning heuristics and suggest improvements that may be relevant in other Planning problems too.



from cs.AI updates on arXiv.org http://ift.tt/1rXJBOP
via IFTTT

Interactive Debugging of Knowledge Bases. (arXiv:1605.05950v1 [cs.AI])

Many AI applications rely on knowledge about a relevant real-world domain that is encoded by means of some logical knowledge base (KB). The most essential benefit of logical KBs is the opportunity to perform automatic reasoning to derive implicit knowledge or to answer complex queries about the modeled domain. The feasibility of meaningful reasoning requires KBs to meet some minimal quality criteria such as logical consistency. Without adequate tool assistance, the task of resolving violated quality criteria in KBs can be extremely tough even for domain experts, especially when the problematic KB includes a large number of logical formulas or comprises complicated logical formalisms.

Published non-interactive debugging systems often cannot localize all possible faults (incompleteness), suggest the deletion or modification of unnecessarily large parts of the KB (non-minimality), return incorrect solutions which lead to a repaired KB not satisfying the imposed quality requirements (unsoundness) or suffer from poor scalability due to the inherent complexity of the KB debugging problem. Even if a system is complete and sound and considers only minimal solutions, there are generally exponentially many solution candidates to select one from. However, any two repaired KBs obtained from these candidates differ in their semantics in terms of entailments and non-entailments. Selection of just any of these repaired KBs might result in unexpected entailments, the loss of desired entailments or unwanted changes to the KB.

This work proposes complete, sound and optimal methods for the interactive debugging of KBs that suggest the one (minimally invasive) error correction of the faulty KB that yields a repaired KB with exactly the intended semantics. Users, e.g. domain experts, are involved in the debugging process by answering automatically generated queries about the intended domain.



from cs.AI updates on arXiv.org http://ift.tt/1YGYOyj
via IFTTT

Dynamic Bayesian Networks to simulate occupant behaviours in office buildings related to indoor air quality. (arXiv:1605.05966v1 [cs.AI])

This paper proposes a new general approach based on Bayesian networks to model the human behaviour. This approach represents human behaviour with probabilistic cause-effect relations based on knowledge, but also with conditional probabilities coming either from knowledge or deduced from observations. This approach has been applied to the co-simulation of the CO2 concentration in an office coupled with human behaviour.



from cs.AI updates on arXiv.org http://ift.tt/1NB4h9a
via IFTTT

AMSOM: Adaptive Moving Self-organizing Map for Clustering and Visualization. (arXiv:1605.06047v1 [cs.AI])

Self-Organizing Map (SOM) is a neural network model which is used to obtain a topology-preserving mapping from the (usually high dimensional) input/feature space to an output/map space of fewer dimensions (usually two or three in order to facilitate visualization). Neurons in the output space are connected with each other but this structure remains fixed throughout training and learning is achieved through the updating of neuron reference vectors in feature space. Despite the fact that growing variants of SOM overcome the fixed structure limitation they increase computational cost and also do not allow the removal of a neuron after its introduction. In this paper, a variant of SOM is proposed called AMSOM (Adaptive Moving Self-Organizing Map) that on the one hand creates a more flexible structure where neuron positions are dynamically altered during training and on the other hand tackles the drawback of having a predefined grid by allowing neuron addition and/or removal during training. Experiments using multiple literature datasets show that the proposed method improves training performance of SOM, leads to a better visualization of the input dataset and provides a framework for determining the optimal number and structure of neurons.



from cs.AI updates on arXiv.org http://ift.tt/1YGYG1F
via IFTTT

Philosophy in the Face of Artificial Intelligence. (arXiv:1605.06048v1 [cs.AI])

In this article, I discuss how the AI community views concerns about the emergence of superintelligent AI and related philosophical issues.



from cs.AI updates on arXiv.org http://ift.tt/1NB3VPX
via IFTTT

A Hierarchical Latent Variable Encoder-Decoder Model for Generating Dialogues. (arXiv:1605.06069v1 [cs.CL])

Sequential data often possesses a hierarchical structure with complex dependencies between subsequences, such as found between the utterances in a dialogue. In an effort to model this kind of generative process, we propose a neural network-based generative architecture, with latent stochastic variables that span a variable number of time steps. We apply the proposed model to the task of dialogue response generation and compare it with recent neural network architectures. We evaluate the model performance through automatic evaluation metrics and by carrying out a human evaluation. The experiments demonstrate that our model improves upon recently proposed models and that the latent variables facilitate the generation of long outputs and maintain the context.



from cs.AI updates on arXiv.org http://ift.tt/1YGYFuH
via IFTTT

How Many Workers to Ask? Adaptive Exploration for Collecting High Quality Labels. (arXiv:1411.0149v3 [cs.AI] UPDATED)

Crowdsourcing has been part of the IR toolbox as a cheap and fast mechanism to obtain labels for system development and evaluation. Successful deployment of crowdsourcing at scale involves adjusting many variables, a very important one being the number of workers needed per human intelligence task (HIT). We consider the crowdsourcing task of learning the answer to simple multiple-choice HITs, which are representative of many relevance experiments. In order to provide statistically significant results, one often needs to ask multiple workers to answer the same HIT. A stopping rule is an algorithm that, given a HIT, decides for any given set of worker answers if the system should stop and output an answer or iterate and ask one more worker. Knowing the historic performance of a worker in the form of a quality score can be beneficial in such a scenario. In this paper we investigate how to devise better stopping rules given such quality scores. We also suggest adaptive exploration as a promising approach for scalable and automatic creation of ground truth. We conduct a data analysis on an industrial crowdsourcing platform, and use the observations from this analysis to design new stopping rules that use the workers' quality scores in a non-trivial manner. We then perform a simulation based on a real-world workload, showing that our algorithm performs better than the more naive approaches.



from cs.AI updates on arXiv.org http://ift.tt/1uoj1hz
via IFTTT

COCO: The Experimental Procedure. (arXiv:1603.08776v2 [cs.AI] CROSS LISTED)

We present a budget-free experimental setup and procedure for benchmarking numericaloptimization algorithms in a black-box scenario. This procedure can be applied with the COCO benchmarking platform. We describe initialization of and input to the algorithm and touch upon therelevance of termination and restarts.



from cs.AI updates on arXiv.org http://ift.tt/1RJcKma
via IFTTT

Orioles: P Zach Britton says he hates the stigma that closers should only work one inning - Eddie Matz (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Hacker Steals Money from Bank and Donates $11,000 to Anti-ISIS Group

Meet this Robin Hood Hacker: Phineas Fisher, who breached Hacking Team last year, revealed on Reddit Wednesday that he hacked a bank and donated the money to Kurdish anti-capitalists in Rojava autonomous region in northern Syria that borders territory held by the ISIS (Islamic State militant group). <!-- adsense --> Fisher, also known as "Hack Back" and "@GammaGroupPR," claimed responsibility


from The Hacker News http://ift.tt/1sCJr0b
via IFTTT

How to Decrypt TeslaCrypt Ransomware Files Using Master Key

Here’s some good news for victims who are trying to unlock and remove TeslaCrypt ransomware. Now, you can decrypt all your important files that have been encrypted by TeslaCrypt ransomware. So, stop Googling about How to decrypt TeslaCrypt Ransomware encrypted files, as the malware authors themselves provided the solution to your problem. <!-- adsense --> Since its launch in March last year,


from The Hacker News http://ift.tt/20bPrXZ
via IFTTT

Ravens withdraw proposal to overhaul and completely open up NFL's replay review system - multiple reports (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

dotnet/roslyn

[Proposal]: Explicitly Mutable Anonymous Type Members #11421. Open. HaloFour opened this Issue an hour ago · 0 comments ...

from Google Alert - anonymous http://ift.tt/1W4EAAC
via IFTTT

Orioles: 3B Manny Machado earns Jayson Stark's first-quarter AL MVP; .321 BA and on pace for 47 HR, 64 2B, 213 H, 128 R (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Dave & Chuck the Freak Peep Show: Lisa's Anonymous Tip

Dave & Chuck the Freak Peep Show: Lisa's Anonymous Tip. A couple reported a Detroit graffiti artist and the show thinks they might have been ...

from Google Alert - anonymous http://ift.tt/1TmpAsc
via IFTTT

The Information-Collecting Vehicle Routing Problem: Stochastic Optimization for Emergency Storm Response. (arXiv:1605.05711v1 [cs.SY])

Utilities face the challenge of responding to power outages due to storms and ice damage, but most power grids are not equipped with sensors to pinpoint the precise location of the faults causing the outage. Instead, utilities have to depend primarily on phone calls (trouble calls) from customers who have lost power to guide the dispatching of utility trucks. In this paper, we develop a policy that routes a utility truck to restore outages in the power grid as quickly as possible, using phone calls to create beliefs about outages, but also using utility trucks as a mechanism for collecting additional information. This means that routing decisions change not only the physical state of the truck (as it moves from one location to another) and the grid (as the truck performs repairs), but also our belief about the network, creating the first stochastic vehicle routing problem that explicitly models information collection and belief modeling. We address the problem of managing a single utility truck, which we start by formulating as a sequential stochastic optimization model which captures our belief about the state of the grid. We propose a stochastic lookahead policy, and use Monte Carlo tree search (MCTS) to produce a practical policy that is asymptotically optimal. Simulation results show that the developed policy restores the power grid much faster compared to standard industry heuristics.



from cs.AI updates on arXiv.org http://ift.tt/1W4u5gN
via IFTTT

Sherman goes Anonymous

Director Max Sherman joins Anonymous Content for US commercial representation. Sherman launched his career in Canada working with production ...

from Google Alert - anonymous http://ift.tt/1TrmMNU
via IFTTT

I have a new follower on Twitter


Protectimus


https://t.co/UHu4fuvMsC
Following: 3000 - Followers: 2560

May 19, 2016 at 09:30AM via Twitter http://twitter.com/Protectimus

I have a new follower on Twitter


Anna Korobkina


www.protectimus.com
Following: 3116 - Followers: 987

May 19, 2016 at 09:15AM via Twitter http://twitter.com/anna_korobkina

The preview should not cache also if the user is anonymous

The preview now does not get cached if you are logged in but it caches for anonymous users, we have to avoid caching also for anonymous users.

from Google Alert - anonymous http://ift.tt/20akwuR
via IFTTT

Hey Allo! Meet Google's AI-powered Smart Messaging App

Get Ready for a whole new Artificial Intelligence-based Messaging experience. At I/O event Wednesday, Google unveiled its new messaging app named Allo: A smart messaging app powered with machine learning programming and the company’s newly announced AI bot Google Assistant. <!-- adsense --> You just have to sign up with your phone number and link your Google account to Allo, and you are all


from The Hacker News http://ift.tt/27Dd4Ot
via IFTTT

Re: [FD] Skype Phishing Attack

ISS Daily Summary Report – 05/18/16

Japanese Experiment Module (JEM) Airlock (JEMAL) NanoRacks Cubesat Deployer #7 (NRCSD 7) Deployment: This morning, operations which began Monday were completed with the deployment of four Dove satellites and four LEMUR-2 satellites.  All satellites were deployed on time as commanded.  The empty deployer will be returned to the JEM Airlock.   Rodent Research-3 (RR-3) Operations: Yesterday the crew completed operations on 5 rodents. They performed operations on 5 more rodents today and are scheduled for 5 each day for the remainder of the week.  The crew performed bone densitometry measurments and then transferred the rodents to the Microgravity Science Glovebox (MSG) for sample processing. This investigation studies the molecular and physical changes to the musculoskeletal system that occur in space. Results will expand scientists’ understanding of muscle atrophy and bone loss in space while testing an antibody that has been known to prevent muscle wasting in mice on Earth.   Environmental Health System (EHS) Microbial Air and Surface Sampling: The crew took surface and air samples for microbial analysis using the Microbial Air Sampler (MAS) with Petri Dishes. The EHS monitors the atmosphere for gaseous contaminants from nonmetallic materials off-gassing, combustion products, and propellants, microbial contaminants from crewmembers and Station activities, water quality, acoustics, and radiation levels.   Dose Tracker: The crew completed entries for medication tracking today. This investigation documents the medication usage of crew members before and during their missions by capturing data regarding medication use during spaceflight, including side effect qualities, frequencies and severities. The data is expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the International Space Station. Observations during the 1-year mission, as well as 6-month missions, can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   LAB Forward (Fwd) Starboard (Stbd) Inter-Module Ventilation (IMV) Cleaning: During the IMV reconfig it was discovered that this fan is not performing as expected, most likely due to Foreign Object Debris (FOD). Today the crew inspected and cleaned the fan and silencer inlets. The crew subsequently used the Velocicalc tool to take flow measurements in the Pressurized Mating Adapter (PMA) 1, Airlock (AL), Node 1 (N1), Cupola, Oxygen Generation System (OGA) rack and Node 2 (N2) ventilation inlets and outlets as part of system health monitoring.   Advanced Resistive Exercise Device (ARED): The crew reported a loud banging noise during ARED rope exercise.  They determined that the right cable arm rope was off its guides and the exercise rope did not retract as far as it should.  The ARED is go for bar exercises but no-go for rope exercises. Ground teams are assessing the problem. Urine Processing Assembly (UPA) fault:  The UPA experienced a fault, likely due to belt slippage inside the distillation assembly.  The Waste Hygiene Compartment (WHC) has been configured to use its internal EDV while ground teams assess recovery of the UPA. Today’s Planned Activities All activities were completed unless otherwise noted. CORRECTSIYA. Logging Liquid and Food (Medicine) Intake / r/g 2283 Psychological Evaluation Program (WinSCAT) COSMOCARD. Closeout Ops r/g 2262 CubeSat Deployment Photos Combustion Integrated Rack (CIR) Equipment Removal DOSETRK Questionnaire Completion BIOCARD. Operator Assistance During the Experiment / r/g 1907 BIOCARD. Experiment Ops r/g 1907 Manufacturing Device Removal and stowage WRS Recycle Tank Fill from EDV Rodent Research (RR) Node 2 Camcorder Settings Adjustment DOSETRK Questionnaire Completion HABIT Data Recording to iPad Camcorder setup to capture T2 exercise Rodent Research Animal transfer to MSG and back Study of cardiovascular system under graded physical load on Cycle Ergometer Rodent Research Rodent Dissection and Bone Densitometer Ops Rodent Research Refrigerated Centrifuge Adjustment Rodent Research (RR) Bone Densitometer Scan Rodent Research MELFI Sample Insertion Stow Video Equipment to capture T2 Exercise Rodent Research (RR) Bone Densitometer Scan MOTOCARD. Experiment Ops r/g 2275 Russian Joint Research (RJR) Collecting Surface Samples using SSK DOSETRK Crew Conference Rodent Research MELFI Sample Insertion In Flight Maintenance (IFM) LAB Forward Starboard Intermodule Ventilation (IMV) Fan Cleaning MOTOCARD. Operator Assistance with the Experiment / r/g 2274 Rodent Research Refrigerated Centrifuge Configuration Rodent Research Rodent Dissection and Bone Densitometer Ops СОЖ Maintenance Rodent Research Closeout Ops Rodent Research MELFI Sample Insertion IMV Flow Measurement HABIT Video Recording CORRECTSIYA. Logging Liquid and Food (Medicine) Intake / r/g 2283 WRS Recycle Tank Fill from EDV Laptop preparation and АСН-К Progress 432 (Aft) Test Configuration Setup On MCC Go: Changeout of Elektron purification column assembly (БКО) Install No.1507074 r/g 2234 Russian Joint Research (RJR) ISS Microbial Air Samples HABIT Task Video End Rodent Research Animal transfer to MSG and back Rodent Research Rodent Dissection and Bone Densitometer Ops Rodent Research (RR) Bone Densitometer Scan Private Medical Conference Rodent Research MELFI Sample Insertion Wet Lab RNA SmartCycler Payload Teardown Rodent Research (RR) Bone Densitometer Scan Verification of ИП-1 Flow Sensor Position Rodent Research MELFI Sample Insertion Rodent Research (RR) Bone Densitometer Scan Rodent Research MELFI Sample Insertion Rodent Research Refrigerated Centrifuge Configuration Rodent Research Rodent Dissection and Bone Densitometer Ops CORRECTSIYA. NEUROIMMUNITET. Experiment setup / r/g 2284 IMS Delta File Prep Rodent Research Animal transfer to MSG and back Surface Sample Kit (SSK) Collection/Incubation Rodent Research Closeout Ops Rodent Research MELFI Sample Insertion Private Medical Conference CONTENT. Experiment Ops / r/g 2277 SPLANH. Preparation for Experiment / r/g 2273 Microbial Air Sampler (MAS) Kit Sample Collection Environmental Control & Life Support System (ECLSS) Recycle Tank Fill Part 3 CORRECTSIYA. Logging Liquid and Food (Medicine) Intake / r/g 2283 NEUROIMMUNITET. Saliva Collection / […]

from ISS On-Orbit Status Report http://ift.tt/27CY6bt
via IFTTT

Android Instant Apps — Run Apps Quickly Without Installation

Downloading an app is a real pain sometimes when you don't want to install the complete app on your smartphone just for booking a movie ticket, or buying something online. Isn't that? Now, Imagine the world where you can use any Android app without actually the need to download or even install it on your smartphone. This is exactly what Google has intended to offer you with its all new


from The Hacker News http://ift.tt/1qvPqSe
via IFTTT

1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate ...

from Google Alert - anonymous http://ift.tt/1OB1cRz
via IFTTT

Halo from Atacama


Influenced by the strong Pacific El Nino, cloudy skies have more often come to Chile's high Atacama Desert this season, despite its reputation as an astronomer's paradise. Located in one of the driest, darkest places on planet Earth, domes of the region's twin 6.5 meter Magellan telescopes of Carnegie Las Campanas Observatory were closed on May 13. Still, a first quarter Moon and bright stars shine through in this panoramic night skyscape, the lunar disk surrounded by a beautiful, bright halo. The angular radius of the halo is 22 degrees. Not determined by the brightness or phase of the Moon itself, the angle is set by the hexagonal geometry of atmospheric ice crystals that reflect and refract the moonlight. On that night, the brilliant star just inside the halo's radius was really planet Jupiter. The brightest star flanking the halo to the far left is Canopus, with Arcturus on the halo's right. via NASA http://ift.tt/1YBQOP5

Wednesday, May 18, 2016

I have a new follower on Twitter


Tracey Vincel
Tracey Vincel PT MPhty is co-founder @kimawellness KIMA Center for Physiotherapy and Wellness : http://t.co/P31SLT4TD1
New York NY
http://t.co/YtTaPY0Vlh
Following: 8234 - Followers: 9158

May 18, 2016 at 11:59PM via Twitter http://twitter.com/traceyvincel

Hierarchical Reinforcement Learning using Spatio-Temporal Abstractions and Deep Neural Networks. (arXiv:1605.05359v1 [cs.LG])

This paper introduces an automated skill acquisition framework in reinforcement learning which involves identifying a hierarchical description of the given task in terms of abstract states and extended actions between abstract states. Identifying such structures present in the task provides ways to simplify and speed up reinforcement learning learning algorithms. These structures also help to generalize such algorithms over multiple tasks without relearning policies from scratch. We use ideas from dynamical systems to find metastable regions in the state space and associate them with abstract states. The spectral clustering algorithm PCCA+ is used to identify suitable abstractions aligned to the underlying structure. Skills are defined in terms of the transitions between such abstract states. The connectivity information from PCCA+ is used to generate these skills or options. The skills are independent of the learning task and can be efficiently reused across a variety of tasks defined over a common state space. Another major advantage of the approach is that it does not need a prior model of the MDP and can work well even when the MDPs are constructed from sampled trajectories. Finally, we present our attempts to extend the automated skills acquisition framework to complex tasks such as learning to play video games where we use deep learning techniques for representation learning to aid our spatio-temporal abstraction framework.



from cs.AI updates on arXiv.org http://ift.tt/1U0cfoJ
via IFTTT

Dynamic Frame skip Deep Q Network. (arXiv:1605.05365v1 [cs.LG])

Deep Reinforcement Learning methods have achieved state of the art performance in learning control policies for the games in the Atari 2600 domain. One of the important parameters in the Arcade Learning Environment (ALE) is the frame skip rate. It decides the granularity at which agents can control game play. A frame skip value of $k$ allows the agent to repeat a selected action $k$ number of times. The current state of the art architectures like Deep Q-Network (DQN) and Dueling Network Architectures (DuDQN) consist of a framework with a static frame skip rate, where the action output from the network is repeated for a fixed number of frames regardless of the current state. In this paper, we propose a new architecture, Dynamic Frame skip Deep Q-Network (DFDQN) which makes the frame skip rate a dynamic learnable parameter. This allows us to choose the number of times an action is to be repeated based on the current state. We show empirically that such a setting improves the performance on relatively harder games like Seaquest.



from cs.AI updates on arXiv.org http://ift.tt/1OLkmJW
via IFTTT

Relations such as Hypernymy: Identifying and Exploiting Hearst Patterns in Distributional Vectors for Lexical Entailment. (arXiv:1605.05433v1 [cs.CL])

We consider the task of predicting lexical entailment using distributional vectors. We focus experiments on one previous classifier which was shown to only learn to detect prototypicality of a word pair. Analysis shows that the model single-mindedly learns to detect Hearst Patterns, which are well known to be predictive of lexical relations. We present a new model which exploits this Hearst Detector functionality, matching or outperforming prior work on multiple data sets.



from cs.AI updates on arXiv.org http://ift.tt/1U0ca4A
via IFTTT

The Bees Algorithm for the Vehicle Routing Problem. (arXiv:1605.05448v1 [cs.NE])

In this thesis we present a new algorithm for the Vehicle Routing Problem called the Enhanced Bees Algorithm. It is adapted from a fairly recent algorithm, the Bees Algorithm, which was developed for continuous optimisation problems. We show that the results obtained by the Enhanced Bees Algorithm are competitive with the best meta-heuristics available for the Vehicle Routing Problem (within 0.5% of the optimal solution for common benchmark problems). We show that the algorithm has good runtime performance, producing results within 2% of the optimal solution within 60 seconds, making it suitable for use within real world dispatch scenarios.



from cs.AI updates on arXiv.org http://ift.tt/1OLkfhl
via IFTTT

Towards information based spatiotemporal patterns as a foundation for agent representation in dynamical systems. (arXiv:1605.05676v1 [cs.AI])

We present some arguments why existing methods for representing agents fall short in applications crucial to artificial life. Using a thought experiment involving a fictitious dynamical systems model of the biosphere we argue that the metabolism, motility, and the concept of counterfactual variation should be compatible with any agent representation in dynamical systems. We then propose an information-theoretic notion of \emph{integrated spatiotemporal patterns} which we believe can serve as the basic building block of an agent definition. We argue that these patterns are capable of solving the problems mentioned before. We also test this in some preliminary experiments.



from cs.AI updates on arXiv.org http://ift.tt/1R9C8Ro
via IFTTT

Fair task allocation in transportation. (arXiv:1505.07434v2 [cs.AI] UPDATED)

Task allocation problems have traditionally focused on cost optimization. However, more and more attention is being given to cases in which cost should not always be the sole or major consideration. In this paper we study a fair task allocation problem in transportation where an optimal allocation not only has low cost but more importantly, it distributes tasks as even as possible among heterogeneous participants who have different capacities and costs to execute tasks. To tackle this fair minimum cost allocation problem we analyze and solve it in two parts using two novel polynomial-time algorithms. We show that despite the new fairness criterion, the proposed algorithms can solve the fair minimum cost allocation problem optimally in polynomial time. In addition, we conduct an extensive set of experiments to investigate the trade-off between cost minimization and fairness. Our experimental results demonstrate the benefit of factoring fairness into task allocation. Among the majority of test instances, fairness comes with a very small price in terms of cost.



from cs.AI updates on arXiv.org http://ift.tt/1exr6u1
via IFTTT

Re: [FD] Skype Phishing Attack

Ravens: NFL believes Baltimore was aware of non-contact rules for rookie camp, but still moved forward - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

This App Lets You Find Anyone's Social Profile Just By Taking Their Photo

Is Google or Facebook evil? Forget it! Russian nerds have developed a new Face Recognition technology based app called FindFace, which is a nightmare for privacy lovers and human right advocates. FindFace is a terrifyingly powerful facial recognition app that lets you photograph strangers in a crowd and find their real identity by connecting them to their social media accounts with 70%


from The Hacker News http://ift.tt/250jZzg
via IFTTT

Ravens propose to make replay \"fundamental part of officiating\" not just limited to certain situations - Kevin Seifert (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous

Anonymous. This gentleman is single and has no children. He is living in a rented house. When he was very young, he migrated from the countryside ...

from Google Alert - anonymous http://ift.tt/1qtKGg6
via IFTTT

Hacker puts up 167 Million LinkedIn Passwords for Sale

LinkedIn's 2012 data breach was much worse than anybody first thought. In 2012, LinkedIn suffered a massive data breach in which more than 6 Million users accounts login details, including encrypted passwords, were posted online by a Russian hacker. Now, it turns out that it was not just 6 Million users who got their login details stolen. <!-- adsense --> Latest reports emerged that the 2012


from The Hacker News http://ift.tt/1TnWI6c
via IFTTT

ISS Daily Summary Report – 05/17/16

Japanese Experiment Module (JEM) Airlock (JEMAL) NanoRacks CubeSat Deployer #7 (NRCSD 7) Deployment Operations: Today a total of 6 Dove satellites will be deployed via ground commanding. This morning the NRCSD 7 Silos 1 and 2 were deployed and Silo 3 is planned to be deployed this evening during crew sleep. This will complete the second of three consecutive days of deployment operations this week. NRCSD 7 contains 17 satellites comprised of MinXSS, CADRE, STMSat-1, 2 NODeS, 8 Doves, and 4 LEMUR satellites. The NRCSD is a commercially operated small satellite deployer from the ISS, maximizing full capabilities of each airlock cycle of deployments. The Dove satellites are a fleet of nanosatellites that enables imagery of the entire changing planet to be taken on a frequent basis, with humanitarian and environmental applications ranging from monitoring deforestation and the ice caps to disaster relief and improving agriculture yields in developing nations.     Rodent Research-3 (RR-3) Operations: Following yesterday’s successful grip strength measurements, today the crew transferred rodents from their habitats to the Microgravity Science Glovebox (MSG), and then performed Bone Densitometry measurements and sample processing. This investigation studies the molecular and physical changes to the musculoskeletal system that occur in space. Results will expand scientists’ understanding of muscle atrophy and bone loss in space while testing an antibody that has been known to prevent muscle wasting in mice on Earth.   Thermolab Instrumentation for Circadian Rhythms: The crew began the first of a three-day European Space Agency (ESA) Circadian Rhythms experiment by performing instrumentation with the Thermolab Double sensors, mounting the Thermolab Unit in the belt, and activating the Thermolab Unit before beginning a 36 hour continuous measurement. The objective of the experiment is to get a better understanding of alterations in circadian rhythms in humans during long-term space flights. Such knowledge will not only provide important insights into the adaptations of the human autonomic nervous system in space over time, but also has significant practical implications by helping to improve physical exercise, rest and work shifts as well as fostering adequate workplace illumination in the sense of occupational healthcare in future space missions.   Urine Processor Assembly (UPA) Status: During a process cycle on Thursday night, the stationary bowl temperature in the Distillate Assembly (DA) dropped enough to activate thermostatically-controlled heaters which caused the condenser pressure to increase. The UPA was taken to standby. Due to continued concerns regarding elevated conductivity and precipitation events, a FIT was held and one of the recommendations was to R&R the brine filter which was completed yesterday. An Advanced Recycle Filter Tank Assembly (ARFTA) R&R as well as conversion of the WHC to alternate pretreat were completed today and the UPA is performing as expected.   ARED Right Upper Stop Cable R&R:  This morning, the crew reported that the ARED Right Upper Stop Cable had failed.  They replaced it with a spare which was launched during Increment 42, and ARED is now fully operational.   Today’s Planned Activities All activities were completed unless otherwise noted. Biochemical Urine Test IMMUNO. Saliva Sample (Session 1) r/g 2253 IMMUNO. First stress test, questionnaire data entry r/g 2253 IMMUNO. Test-Tube Blood Collection (finger) r/g 2253 IMMUNO. Blood Sample Processing r/g 2253 URISYS Hardware Stowage / МО Book 2 11.4 p. 11-7(118) IMMUNO. Equipment Stowage / r/g 2253 Auxiliary Computer System [ВКС] Laptops Antivirus Scan Check and DPC Status Report / r/g 8247 CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 2267 Environmental Control & Life Support System (ECLSS) Tank Drain Rodent Research (RR) Node 2 Camcorder Settings Adjustment On MCC Go Regeneration of БМП Ф2 Micropurification Cartridge (start) ARED Access Assessment for BEAM Ops WRS Water Sample Analysis Environmental Control & Life Support System (ECLSS) Recycle Tank Drain Part 2 Audit of СОТР Equipment (fluid connectors) / r/g 2260 Rodent Research Animal transfer to MSG and back RED Dragon Camera Activation Field Of View Rodent Research. Rodent Dissection and Bone Densitometer Ops Filling (separation) of EDV (KOV) for Elektron or EDV-SV Rodent Research Refrigerated Centrifuge Adjustment CubeSat Deployment Photos RED Dragon camera final power OFF Rodent Research (RR) Bone Densitometer Scan RED Dragon Camera File Downlink RED Dragon Camera Deactivation COSMOCARD. Setup. Starting 24-hr ECG Recording r/g 2262 Rodent Research MELFI Sample Insertion COSMOCARD. Photography of the Experiment Ops / r/g 2265 Rodent Research (RR) Bone Densitometer Scan СОЖ Maintenance Study of Cardiovascular System Under Graded Physical Load on VELO Rodent Research MELFI Sample Insertion Rodent Research Refrigerated Centrifuge Configuration Rodent Research Rodent Dissection and Bone Densitometer Ops Soyuz 719 Samsung Tablet Recharge, Initiate Rodent Research Closeout Ops ECLSS Recycle Tank Remove and Replace Rodent Research MELFI Sample Insertion Vacuum cleaning ventilation grille on FGB interior panels (201, 301, 401) Photography of windows No.1, 12 in SM, EV hatch window No.2 in DC1 / r/g 2259 WRS  Recycle Tank Fill from EDV TOCA Data Recording In-Flight Maintenance (IFM) WHC Equipment Gathering and Setup PAO Hardware Setup Crew Prep for PAO PAO Event Rodent Research Animal transfer to MSG and back CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 2267 WRS Recycle Tank Fill from EDV Soyuz 719 Samsung Tablet Recharge, Terminate Rodent Research Rodent Dissection and Bone Densitometer Ops CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 2261 CALCIUM. Experiment Session 8 / r/g 2254 Rodent Research (RR) Bone Densitometer Scan VIZIR -СКПФУ. Experiment Ops r/g 2264 WHC Pre-Treat Tank and Pre-Treat Tank Hose R&R Water separation mode selection r/g 2268 Rodent Research MELFI Sample Insertion Rodent Research (RR) Bone Densitometer Scan Rodent Research Refrigerated Centrifuge Configuration Rodent Research Rodent Dissection and Bone Densitometer Ops Rodent Research Animal transfer to MSG and back Rodent Research Closeout Ops CONTROL. Switching Indicator-ISS P/L measuring modes / r/g 2255 WRS Recycle Tank Fill from EDV Rodent Research MELFI Sample Insertion Weekly conference with the Program Management MOTOCARD. Experiment Ops r/g 2256 MOTOCARD.  Operator Assistance with the Experiment / r/g 2257 IMMUNO. Saliva Sample (Session 2) / r/g 2253 IMMUNO. Second stress test, questionnaire data entry / r/g […]

from ISS On-Orbit Status Report http://ift.tt/1srkcND
via IFTTT

Core Tor Developer who accuses FBI of Harassment moves to Germany

One of TOR's primary software developers, Isis Agora Lovecruft, has fled to Germany, following the threat of a federal subpoena. Lovecruft is a well-known cryptographer and lead software developer for Tor project from many years. She has worked for a variety of other security and encryption products, such as Open Whisper Systems and the LEAP Encryption Access Project. Since November 2015,


from The Hacker News http://ift.tt/1TjBdA4
via IFTTT

Navigator component showing Siteareas not accessible to Anonymous users

A customer faces an issue, where When accessing a navigator component as anonymous user, it is showing site area which is not accessible to ...

from Google Alert - anonymous http://ift.tt/204P41g
via IFTTT

I have a new follower on Twitter


The Digital Dragons
Digital & Internet #Marketing agency in #Wales , plus the very best social media tips and advice. Don't just tweet, ROAR!!! ✉ info@the-digital-dragons.co.uk
Caerphilly, Wales
http://t.co/JxcR6exNK6
Following: 17324 - Followers: 22796

May 18, 2016 at 02:45AM via Twitter http://twitter.com/_DigitalDragons

I have a new follower on Twitter


StreetLight Data
StreetLight Data transforms messy, disparate data about how people use their city into actionable analytics for planning, real estate and more.
San Francisco, CA
http://t.co/zuU8ZbgJim
Following: 3170 - Followers: 3882

May 18, 2016 at 02:16AM via Twitter http://twitter.com/StreetLightData

I have a new follower on Twitter


Eadith
Bored?
UK

Following: 101 - Followers: 11

May 18, 2016 at 01:15AM via Twitter http://twitter.com/i917pivl25

The Orion Nebula in Visible and Infrared


The Great Nebula in Orion is a colorful place. Visible to the unaided eye, it appears as a small fuzzy patch in the constellation of Orion. Long exposure, multi-wavelength images like this, however, show the Orion Nebula to be a busy neighborhood of young stars, hot gas, and dark dust. This digital composite features not only three colors of visible light but four colors of infrared light taken by NASA's orbiting Spitzer Space Telescope as well. The power behind much of the Orion Nebula (M42) is the Trapezium - four of the brightest stars in the nebula. Many of the filamentary structures visible are actually shock waves - fronts where fast moving material encounters slow moving gas. The Orion Nebula spans about 40 light years and is located about 1500 light years away in the same spiral arm of our Galaxy as the Sun. via NASA http://ift.tt/201tJWu

Tuesday, May 17, 2016

Self-Reflective Risk-Aware Artificial Cognitive Modeling for Robot Response to Human Behaviors. (arXiv:1605.04934v1 [cs.RO])

In order for cooperative robots ("co-robots") to respond to human behaviors accurately and efficiently in human-robot collaboration, interpretation of human actions, awareness of new situations, and appropriate decision making are all crucial abilities for co-robots. For this purpose, the human behaviors should be interpreted by co-robots in the same manner as human peers. To address this issue, a novel interpretability indicator is introduced so that robot actions are appropriate to the current human behaviors. In addition, the complete consideration of all potential situations of a robot's environment is nearly impossible in real-world applications, making it difficult for the co-robot to act appropriately and safely in new scenarios. This is true even when the pretrained model is highly accurate in a known situation. For effective and safe teaming with humans, we introduce a new generalizability indicator that allows a co-robot to self-reflect and reason about when an observation falls outside the co-robot's learned model. Based on topic modeling and two novel indicators, we propose a new Self-reflective Risk-aware Artificial Cognitive (SRAC) model. The co-robots are able to consider action risks and identify new situations so that better decisions can be made. Experiments both using real-world datasets and on physical robots suggest that our SRAC model significantly outperforms the traditional methodology and enables better decision making in response to human activities.



from cs.AI updates on arXiv.org http://ift.tt/27xmlYm
via IFTTT

Digital Stylometry: Linking Profiles Across Social Networks. (arXiv:1605.05166v1 [cs.SI])

There is an ever growing number of users with accounts on multiple social media and networking sites. Consequently, there is increasing interest in matching user accounts and profiles across different social networks in order to create aggregate profiles of users. In this paper, we present models for Digital Stylometry, which is a method for matching users through stylometry inspired techniques. We experimented with linguistic, temporal, and combined temporal-linguistic models for matching user accounts, using standard and novel techniques. Using publicly available data, our best model, a combined temporal-linguistic one, was able to correctly match the accounts of 31% of 5,612 distinct users across Twitter and Facebook.



from cs.AI updates on arXiv.org http://ift.tt/27xlWVR
via IFTTT

Enhanced Twitter Sentiment Classification Using Contextual Information. (arXiv:1605.05195v1 [cs.SI])

The rise in popularity and ubiquity of Twitter has made sentiment analysis of tweets an important and well-covered area of research. However, the 140 character limit imposed on tweets makes it hard to use standard linguistic methods for sentiment classification. On the other hand, what tweets lack in structure they make up with sheer volume and rich metadata. This metadata includes geolocation, temporal and author information. We hypothesize that sentiment is dependent on all these contextual factors. Different locations, times and authors have different emotional valences. In this paper, we explored this hypothesis by utilizing distant supervision to collect millions of labelled tweets from different locations, times and authors. We used this data to analyse the variation of tweet sentiments across different authors, times and locations. Once we explored and understood the relationship between these variables and sentiment, we used a Bayesian approach to combine these variables with more standard linguistic features such as n-grams to create a Twitter sentiment classifier. This combined classifier outperforms the purely linguistic classifier, showing that integrating the rich contextual information available on Twitter into sentiment classification is a promising direction of research.



from cs.AI updates on arXiv.org http://ift.tt/27xlK96
via IFTTT

Heart Rate Variability and Respiration Signal as Diagnostic Tools for Late Onset Sepsis in Neonatal Intensive Care Units. (arXiv:1605.05247v1 [q-bio.QM])

Apnea-bradycardia is one of the major clinical early indicators of late-onset sepsis occurring in approximately 7% to 10% of all neonates and in more than 25% of very low birth weight infants in NICU. The objective of this paper was to determine if HRV, respiration and their relationships help to diagnose infection in premature infants via non-invasive ways in NICU. Therefore, we implement Mono-Channel (MC) and Bi-Channel (BC) Analysis in two groups: sepsis (S) vs. non-sepsis (NS). Firstly, we studied RR series not only by linear methods: time domain and frequency domain, but also by non-linear methods: chaos theory and information theory. The results show that alpha Slow, alpha Fast and Sample Entropy are significant parameters to distinguish S from NS. Secondly, the question about the functional coupling of HRV and nasal respiration is addressed. Local linear correlation coefficient r2t,f has been explored, while non-linear regression coefficient h2 was calculated in two directions. It is obvious that r2t,f within the third frequency band (0.2<f<0.4 Hz) and h2 in two directions were complementary approaches to diagnose sepsis. Thirdly, feasibility study is carried out on the candidate parameters selected from MC and BC respectively. We discovered that the proposed test based on optimal fusion of 6 features shows good performance with the largest AUC and a reduced probability of false alarm (PFA).



from cs.AI updates on arXiv.org http://ift.tt/1TYe3l3
via IFTTT

Learning Convolutional Neural Networks for Graphs. (arXiv:1605.05273v1 [cs.LG])

Numerous important problems can be framed as learning from graph data. We propose a framework for learning convolutional neural networks for arbitrary graphs. These graphs may be undirected, directed, and with both discrete and continuous node and edge attributes. Analogous to image-based convolutional networks that operate on locally connected regions of the input, we present a general approach to extracting locallyconnected regions from graphs. Using established benchmark data sets, we demonstrate that the learned feature representations are competitive with state of the art graph kernels and that their computation is highly efficient.



from cs.AI updates on arXiv.org http://ift.tt/1TmtgxF
via IFTTT

Fuzzy Sets Across the Natural Language Generation Pipeline. (arXiv:1605.05303v1 [cs.AI])

We explore the implications of using fuzzy techniques (mainly those commonly used in the linguistic description/summarization of data discipline) from a natural language generation perspective. For this, we provide an extensive discussion of some general convergence points and an exploration of the relationship between the different tasks involved in the standard NLG system pipeline architecture and the most common fuzzy approaches used in linguistic summarization/description of data, such as fuzzy quantified statements, evaluation criteria or aggregation operators. Each individual discussion is illustrated with a related use case. Recent work made in the context of cross-fertilization of both research fields is also referenced. This paper encompasses general ideas that emerged as part of the PhD thesis "Application of fuzzy sets in data-to-text systems". It does not present a specific application or a formal approach, but rather discusses current high-level issues and potential usages of fuzzy sets (focused on linguistic summarization of data) in natural language generation.



from cs.AI updates on arXiv.org http://ift.tt/1TiMel5
via IFTTT

Combat Models for RTS Games. (arXiv:1605.05305v1 [cs.AI])

Game tree search algorithms, such as Monte Carlo Tree Search (MCTS), require access to a forward model (or "simulator") of the game at hand. However, in some games such forward model is not readily available. This paper presents three forward models for two-player attrition games, which we call "combat models", and show how they can be used to simulate combat in RTS games. We also show how these combat models can be learned from replay data. We use StarCraft as our application domain. We report experiments comparing our combat models predicting a combat output and their impact when used for tactical decisions during a real game.



from cs.AI updates on arXiv.org http://ift.tt/27xmafT
via IFTTT

Geometry of Interest (GOI): Spatio-Temporal Destination Extraction and Partitioning in GPS Trajectory Data. (arXiv:1603.04110v2 [cs.AI] UPDATED)

Nowadays large amounts of GPS trajectory data is being continuously collected by GPS-enabled devices such as vehicles navigation systems and mobile phones. GPS trajectory data is useful for applications such as traffic management, location forecasting, and itinerary planning. Such applications often need to extract the time-stamped Sequence of Visited Locations (SVLs) of the mobile objects. The nearest neighbor query (NNQ) is the most applied method for labeling the visited locations based on the IDs of the POIs in the process of SVL generation. NNQ in some scenarios is not accurate enough. To improve the quality of the extracted SVLs, instead of using NNQ, we label the visited locations as the IDs of the POIs which geometrically intersect with the GPS observations. Intersection operator requires the accurate geometry of the points of interest which we refer to them as the Geometries of Interest (GOIs). In some application domains (e.g. movement trajectories of animals), adequate information about the POIs and their GOIs may not be available a priori, or they may not be publicly accessible and, therefore, they need to be derived from GPS trajectory data. In this paper we propose a novel method for estimating the POIs and their GOIs, which consists of three phases: (i) extracting the geometries of the stay regions; (ii) constructing the geometry of destination regions based on the extracted stay regions; and (iii) constructing the GOIs based on the geometries of the destination regions. Using the geometric similarity to known GOIs as the major evaluation criterion, the experiments we performed using long-term GPS trajectory data show that our method outperforms the existing approaches.



from cs.AI updates on arXiv.org http://ift.tt/1pklvw0
via IFTTT

Moving Beyond the Turing Test with the Allen AI Science Challenge. (arXiv:1604.04315v2 [cs.AI] UPDATED)

Given recent successes in AI (e.g., AlphaGo's victory against Lee Sedol in the game of GO), it's become increasingly important to assess: how close are AI systems to human-level intelligence? This paper describes the Allen AI Science Challenge---an approach towards that goal which led to a unique Kaggle Competition, its results, the lessons learned, and our next steps.



from cs.AI updates on arXiv.org http://ift.tt/1r7Yz4K
via IFTTT

1 Million Computers Hacked for making big Money from Adsense

A group of cyber criminals has infected as much as 1 Million computers around the world over the past two years with a piece of malware that hijacks search results pages using a local proxy. Security researchers from Romania-based security firm Bitdefender revealed the presence of this massive click-fraud botnet, which the researchers named Million-Machine. For those unaware, Botnets are


from The Hacker News http://ift.tt/27wuH2r
via IFTTT

RSS feed says authored by Anonymous

How can I get the post author's name to appear in the reply RSS feed? When someone posts, they (must and do) fill out their name, in the “Your Name” ...

from Google Alert - anonymous http://ift.tt/1YzBkLn
via IFTTT

Hacker finds flaws that could let anyone steal $25 Billion from a Bank

A security researcher could have stolen as much as $25 Billion from one of the India's biggest banks ‒ Thanks to the bank's vulnerable mobile application. Late last year, security researcher Sathya Prakash discovered a number of critical vulnerabilities in the mobile banking application of an undisclosed bank that allowed him to steal money from any or all bank customers with the help of just


from The Hacker News http://ift.tt/27wdiHl
via IFTTT

Ukrainian Hacker Admits Stealing Corporate Press Releases for $30 Million Profit

A 28-year-old Ukrainian hacker has pleaded guilty in the United States to stealing unpublished news releases and using that non-public information in illegal trading to generate more than $30 Million (£20.8 Million) in illicit profits. Vadym Iermolovych, 28, admitted Monday that he worked with two other Ukrainian hackers to hack into computer networks at PR Newswire, Marketwired and Business


from The Hacker News http://ift.tt/1smKWPf
via IFTTT

[FD] WSO2 SOA Enablement Server - Reflected Cross-Site Scripting

[FD] [ICS] Meteocontrol WEB’log Multiple Vulnerabilities

[ICS] Meteocontrol WEB’log Multiple Vulnerabilities *About MeteoControl WEB’log* Meteocontrol is a Germany-based company that maintains offices in several countries around the world, including the US, China, Italy, Spain, France, Switzerland, and Israel. The affected products, WEB’log, are web-based SCADA systems that provide functions to manage energy and power configurations in different connected (energy/industrial) devices. According to Meteocontrol, WEB’log is deployed across several sectors including Commercial Facilities, Critical Manufacturing, Energy, and Water and Wastewater Systems. Meteocontrol estimates that these products are used primarily in Europe with a small percentage in the United States. *Product details here:* http://ift.tt/27vxr06 *Multiple versions of this application are offered:* WEB'log Basic 100 WEB'log Light WEB'log Pro WEB'log Pro Unlimited All Meteocontrol’s WEB’log versions / flavors have the same underlying design and are vulnerable. This product is deployed primarily in Power & Energy domain, and is used worldwide. It is rebranded in different countries, a few that I came across are as follows: - WEB’log Pro (branded by Siemens) - US - Powador-proLOG (branded by KACO new energy) - Germany - Aurora Easy Control / Aurora Easy Control Basic (both branded by power one) - Italy - Data Control Pro (branded by Mastervolt) - France +++++ *Weak Credential Management* Default Login password is ist02 -> gives easy administrative access to anyone Issue: Mandatory password change is not enforced by the application. *Access Control Flaws* CVE-2016-2296 All pages, functions, and data, can still be accessed without administrative log in. This can be achieved by directly accessing the URLs. This includes access to configuration pages, ability to change plant data, configured modbus/inverter devices, configuration parameters, and even rebooting the device. For example: Making the following direct request, dumps the source code of page that contains administrator password- http://IP/html/en/confAccessProt.html Modbus related configuration can be dumped by calling the following url: http://IP/html/en/confUnvModbus.html Access modbus devices http://IP/html/en/ajax/viewunvmodbus.xml Similarly, certain POST requests can be used to Modify Plant Configuration Data, without any authentication. Issue: Access control is not enforced correctly. *Sensitive information exposure* CVE-2016-2298 As noted above, Administrator password is stored in clear-text. So anyone can make a request to this page and get the clear-text Administrative password for the application, and gain privileged access. Issue: Password is stored in clear-text. *Hidden/Obscured CMD shell* CVE-2016-2297 Another interesting feature is presence of a CMD shell. Meteocontrol WEB'log management application offers a CMD shell which allows running a restricted set of commands that gives host, application and stats data. And as like other functions, it can be accessed directly without any authentication - http://IP/html/en/xprtCmd.html Assuming no one will be able to figure out a technique to exploit this feature, is not a great idea. *No CSRF protection - Vulnerable to CSRF attacks* There is no CSRF Token generated per page and / or per (sensitive) function. Successful exploitation of this vulnerability can allow silent execution of unauthorized actions on the device such as modifying plant data, modifying modbus/inverter/any other PLC devices, changing Administrator password, changing configuration parameters, saving modified configuration, & device reboot. +++++ ICS-CERT published Meteocontrol advisory at: http://ift.tt/27hn6EZ Note that it is not complete and accurate. I have already sent my comments to ICS-CERT team to correct their report. Hopefully they will update it soon. +++++ Cheers!

Source: Gmail -> IFTTT-> Blogger

[FD] OWTF 2.0a "Tikka Masala" released!

Dear Full Disclosure friends, We are pleased to let you know that OWASP OWTF 2.0a "Tikka Masala" has been released! Dedicated to the courage and hard work shown by all OWASP OWTF contributors, especially the Indian ones!, the mentors, everybody that gave us cool ideas, etc. to make this amazing release happen, to all of you, thank you! Some links: - Handy redirect: http://owtf.org/ (takes you to: http://ift.tt/N4VVc7) - Getting started - https://owtf.github.io/ - Downloading & Installation - http://ift.tt/1ThX9M7 - Documentation - http://docs.owtf.org/ - Try some of the OWTF features from your browser - http://ift.tt/1XiTDG0 - *Please* give us feedback / suggestions / report bugs - http://ift.tt/1rSeZtv - Join us on IRC (#owtf on Freenode) - http://ift.tt/1XiTBxU Full release blog post with full props and more information: http://ift.tt/24B9Zj2 You would not believe the amount of emails, sentences at infosec conferences, etc. that turned into cool ideas/projects to improve OWTF: *Please* do share your criticism / feedback / suggestions and we will try *hard* to make it happen! Hugs, Abe P.S. RTs very welcome https://twitter.com/owtfp/status/728956682127192064

Source: Gmail -> IFTTT-> Blogger

CVC Guidelines On Anonymous/Ps...

CVC Guidelines On Anonymous/Pseudonymous Complaints. 17/05/2016 11:10 | by siteadmin. CVC Guidelines On Anonymous/Pseudonymous ...

from Google Alert - anonymous http://ift.tt/1XiRjii
via IFTTT

Re: [FD] Code Execution Vulnerabilities In 7zip

[mods: feel free to merge this with my previous post if it hasn't hit the list yet] I should add dates: the 7zip V16.00 release is dated 10.May.2016, and the Cisco Talis blog post is dated 11.May.2016. Also affected versions are all below 16.00, not just 15.00 and prior. Nick

Source: Gmail -> IFTTT-> Blogger

[FD] Code Execution Vulnerabilities In 7zip

Just karma whoring here, since I noticed the announcement and figured the news needs to spread. Cisco Talis discovered a number of bugs in 7zip versions prior to 16.00, some of which lead to arbitrary code execution when processing certain malformed archives: http://ift.tt/1TaxjJF http://ift.tt/21WOh42 Versions from 9.20 to 15.00 are said to contain some or all of the bugs. The comment stream in the 2nd link contains this remark: "By default 7zip will pass inputs through all of its decompression routines so blocking certain extensions will not work unless you also pass a command line argument that specifies the parser to use. These bugs will trigger with a malformed UDF/HFS file with a .zip extension unless the added command line argument is used." Upgrading to 7zip V16.00 ("as soon as possible") is said to fix the vulnerabilities. The official 7zip changelog at http://ift.tt/ZxaMzn for 16.00 just says "Some bugs were fixed". Nick

Source: Gmail -> IFTTT-> Blogger

Re: [FD] Skype Phishing Attack

Hey all, I don't think "pop up a full featured window on the client" is your everyday phishing attack. This is easily exploited even for experienced users, since this is definitely not what you'd expect to originate from Skype (and for example Steam tends to annoy you with login popups sometimes, i.e. when changing your IP). So yes, we don't need your average phishing attack, but this is surely a vulnerability and the publication hopefully forces M$ to do something about it. Am 2016-05-13 03:51, schrieb Reindl Harald: > oh no - please don't post each and every phishing attack on FD becasue > then we would see nothing else when mailadmins start to do the same > > Am 11.05.2016 um 22:57 schrieb Danny Kopping: >> [...] > > > >

Source: Gmail -> IFTTT-> Blogger

Re: [FD] runAV mod_security Remote Command Execution

Am 13.05.2016 um 17:30 schrieb Rio Sherri: > # Title : runAV mod_security Remote Command Execution > # Date : 13/05/2016 > # Author : R-73eN > # Tested on : mod_security with runAV Linux 4.2.0-30-generic #36-Ubuntu SMP > Fri Feb 26 00:57:19 UTC 2016 i686 i686 i686 GNU/Linux > # Software : > http://ift.tt/1skmJtu > # Vendor : http://ift.tt/1oG2O4r > # https://www.infogen.al/ > > sprintf (cmd, "/usr/bin/clamscan --no-summary %s", argv[1]); > The argv[1] parameter is passed unsanitized to a sprintf function > which sends the formatted output to the cmd variable, > which is later passed as a parameter to a run_cmd function on line 14 i don't think so because the temp-files of mod-security to inspect uploads are not controlled by the client and don't contain anything in their names which could be critical

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-05-16-6 iTunes 12.4

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-05-16-5 Safari 9.1.1

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-05-16-4 OS X El Capitan 10.11.5 and Security Update 2016-003

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-05-16-3 watchOS 2.2.1

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-05-16-2 iOS 9.3.2

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-05-16-1 tvOS 9.2.1

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] [ERPSCAN-16-009] SAP xMII - directory traversal vulnerability

Application: SAP xMII Versions Affected: SAP MII 15.0 Vendor URL: http://SAP.com Bugs: Directory traversal Sent: 29.07.2015 Reported: 29.07.2015 Vendor response: 30.07.2015 Date of Public Advisory: 09.02.2016 Reference: SAP Security Note 2230978 Author: Dmitry Chastuhin (ERPScan) Description 1. ADVISORY INFORMATION Title: SAP xMII – directory traversal vulnerability Advisory ID: [ERPSCAN-16-009] Risk: high priority Advisory URL: http://ift.tt/1TkKV8Q Date published: 09.02.2016 Vendors contacted: SAP 2. VULNERABILITY INFORMATION Class: [CWE-36] Impact: SAP xMII directory traversal, read file from server Remotely Exploitable: Yes Locally Exploitable: No CVE: CVE-2016-2389 CVSS Information CVSS Base Score v3: 7.5 / 10 CVSS Base Vector: AV : Access Vector (Related exploit range) Network (N) AC : Access Complexity (Required attack complexity) Low (L) Au : Authentication (Level of authentication needed to exploit) None (N) C : Impact to Confidentiality High (H) I : Impact to Integrity None(N) A : Impact to Availability None (N) 3. VULNERABILITY DESCRIPTION An attacker can use a special request to read files from a server to escalate his or her privileges. 4. VULNERABLE PACKAGES SAP MII 15.0 5. SOLUTIONS AND WORKAROUNDS To correct this vulnerability, install SAP Security Note 2230978 6. AUTHOR Dmitry Chastuhin (ERPScan) 7. TECHNICAL DESCRIPTION An attacker can use xMII function GetFileList to read files from the server. PoC GET /XMII/Catalog?Mode=GetFileList&Path=Classes/../../../../../../../../../../../../etc/passwd 8. REPORT TIMELINE Sent: 29.07.2015 Reported: 29.07.2015 Vendor response: 30.07.2015 Date of Public Advisory: 09.02.2016 9. REFERENCES http://ift.tt/1TkKV8Q 10. ABOUT ERPScan Research The company’s expertise is based on the research subdivision of ERPScan, which is engaged in vulnerability research and analysis of critical enterprise applications. It has achieved multiple acknowledgments from the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware, HP for discovering more than 400 vulnerabilities in their solutions (200 of them just in SAP!). ERPScan researchers are proud to have exposed new types of vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be nominated for the best server-side vulnerability at BlackHat 2013. ERPScan experts have been invited to speak, present, and train at 60+ prime international security conferences in 25+ countries across the continents. These include BlackHat, RSA, HITB, and private SAP trainings in several Fortune 2000 companies. ERPScan researchers lead the project EAS-SEC, which is focused on enterprise application security research and awareness. They have published 3 exhaustive annual award-winning surveys about SAP security. ERPScan experts have been interviewed by leading media resources and featured in specialized info-sec publications worldwide. These include Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise, and Chinabyte, to name a few. We have highly qualified experts in staff with experience in many different fields of security, from web applications and mobile/embedded to reverse engineering and ICS/SCADA systems, accumulating their experience to conduct the best SAP security research. 11. ABOUT ERPScan ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to close the gap between technical and business security, and provide solutions to evaluate and secure SAP and Oracle ERP systems and business-critical applications from both, cyber-attacks as well as internal fraud. Usually our clients are large enterprises, Fortune 2000 companies and managed service providers whose requirements are to actively monitor and manage security of vast SAP landscapes on a global scale. We ‘follow the sun’ and function in two hubs, located in the Palo Alto and Amsterdam to provide threat intelligence services, agile support and operate local offices and partner network spanning 20+ countries around the globe. Adress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301 Phone: 650.798.5255 Twitter: @erpscan Scoop-it: Business Application Security

Source: Gmail -> IFTTT-> Blogger

[FD] [ERPSCAN-16-008] SAP NetWeaver AS JAVA - XSS vulnerability in ProxyServer servlet

Application: SAP NetWeaver AS JAVA Versions Affected: SAP NetWeaver AS JAVA 7.4 Vendor URL: http://SAP.com Bugs: Cross Site Scripting (XSS) Sent: 10.08.2015 Reported: 10.08.2015 Vendor response: 11.08.2015 Date of Public Advisory: 09.02.2016 Reference: SAP Security Note 2220571 Author: Vahagn Vardanyan (ERPScan) Description 1. ADVISORY INFORMATION Title: SAP NetWeaver AS JAVA – XSS vulnerability in ProxyServer servlet Advisory ID: [ERPSCAN-16-008] Risk: high priority Advisory URL: http://ift.tt/1YyKrvR Date published: 09.02.2016 Vendor contacted: SAP 2. VULNERABILITY INFORMATION Class: [CWE-79] Impact: XSS on SAP NetWeaver AS JAVA Remotely Exploitable: Yes Locally Exploitable: No CVE: CVE-2016-2387 CVSS Information CVSS Base Score v3: 6.1 / 10 CVSS Base Vector: AV : Access Vector (Related exploit range) Network (N) AC : Access Complexity (Required attack complexity) Low (L) Au : Authentication (Level of authentication needed to exploit) None (N) C : Impact to ConfidentialityLow(L) I : Impact to Integrity Low(L) A : Impact to Availability None (N) 3. VULNERABILITY DESCRIPTION Anonymous attacker can use a special HTTP request to hijack session data of administrators or users of the web resource. 4. VULNERABLE PACKAGES SAP NetWeaver AS JAVA 7.4 5. SOLUTIONS AND WORKAROUNDS To correct this vulnerability, install SAP Security Note 2220571 6. AUTHOR Vahagn Vardanyan (ERPScan) 7. TECHNICAL DESCRIPTION PoC 1 http://SAP_URL:SAP_PORT/ProxyServer/register?ns=myNamespace&interface=&bean=myInterface&method=myMethod PoC 2 http://SAP_URL:SAP_PORT:50000/ProxyServer/register?ns=myNamespace&interface=&bean=myInterface&method=myMethod 8. REPORT TIMELINE Sent: 29.07.2015 Reported: 29.07.2015 Vendor response: 30.07.2015 Date of Public Advisory: 09.02.2016 9. REFERENCES http://ift.tt/1YyKrvR 10. ABOUT ERPScan Research The company’s expertise is based on the research subdivision of ERPScan, which is engaged in vulnerability research and analysis of critical enterprise applications. It has achieved multiple acknowledgments from the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware, HP for discovering more than 400 vulnerabilities in their solutions (200 of them just in SAP!). ERPScan researchers are proud to have exposed new types of vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be nominated for the best server-side vulnerability at BlackHat 2013. ERPScan experts have been invited to speak, present, and train at 60+ prime international security conferences in 25+ countries across the continents. These include BlackHat, RSA, HITB, and private SAP trainings in several Fortune 2000 companies. ERPScan researchers lead the project EAS-SEC, which is focused on enterprise application security research and awareness. They have published 3 exhaustive annual award-winning surveys about SAP security. ERPScan experts have been interviewed by leading media resources and featured in specialized info-sec publications worldwide. These include Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise, and Chinabyte, to name a few. We have highly qualified experts in staff with experience in many different fields of security, from web applications and mobile/embedded to reverse engineering and ICS/SCADA systems, accumulating their experience to conduct the best SAP security research. 11. ABOUT ERPScan ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to close the gap between technical and business security, and provide solutions to evaluate and secure SAP and Oracle ERP systems and business-critical applications from both, cyber-attacks as well as internal fraud. Usually our clients are large enterprises, Fortune 2000 companies and managed service providers whose requirements are to actively monitor and manage security of vast SAP landscapes on a global scale. We ‘follow the sun’ and function in two hubs, located in the Palo Alto and Amsterdam to provide threat intelligence services, agile support and operate local offices and partner network spanning 20+ countries around the globe. Adress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301 Phone: 650.798.5255 Twitter: @erpscan Scoop-it: Business Application Security

Source: Gmail -> IFTTT-> Blogger

Marco Rubio criticizes anonymous sources, tweets workout plans

Criticizing the use of anonymous sources, Rubio, who 1.36 million followers, took the opportunity to make an enigmatic joke about his political future, ...

from Google Alert - anonymous http://ift.tt/24X25x8
via IFTTT

ISS Daily Summary Report – 05/16/16

Rodent Research-3 (RR-3) Transfer and Grip Strength Operations: The crew transferred rodents from their habitats to the Microgravity Science Glovebox (MSG) and successfully performed grip strength measurements on all 20 rodents. The crew also installed hardware and restocked supplies in the MSG to prepare for other RR-3 operations planned for the remainder of the week. The investigation studies the molecular and physical changes to the musculoskeletal system that happen in space. Results will expand scientists’ understanding of muscle atrophy and bone loss in space while testing an antibody that has been known to prevent muscle wasting in mice on Earth.   Japanese Experiment Module (JEM) Airlock (JEMAL) NanoRacks CubeSat Deployer #7 (NRCSD 7) Deployment Operations: NRCSD 7 successful deployed the MinXSS and CADRE satellites from Silo 8 at 5:05 AM CDT and STMSat-1, NODeS 1, and NODeS 2 satellites from Silo 7 at 9:20 AM CDT today via ground commanding. Today completes the first of three consecutive days of deployment operations planned for the week. NRCSD 7 contains 17 satellites comprised of MinXSS, CADRE, STMSat-1, 2 NODes, 8 Doves, and 4 LEMUR satellites. The NRCSD is a commercially operated small satellite deployer from the ISS, maximizing full capabilities of each airlock cycle of deployments.   Station Support Computer (SSC) for Bigelow Expandable Activity Module (BEAM) Laptop Preparation: The crew deployed the BEAM laptop that will be used to operate sensors in the BEAM module in Node 3. The laptop was configured to the Load Image Client (LIC) mode to prepare for upcoming BEAM operations.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The investigation collects observations about the relationship between crew members and their environment on the ISS. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Extravehicular Mobility Unit (EMU) Suit Maintenance: The crew performed maintenance tasks on EMU 3003 and EMU 3010 including an EMU swap, water tank dump and fill, a loop scrub, a post-loop scrub water sample, and an EMU conductivity test.  Forward work includes additional cooling loop maintenance and EMU dryout.   Treadmill 2 (T2) Graphic Interface Unit (GUI) Software Issues: Last Thursday, the crew reported several issues with the T2 Graphic User Interface (GUI) software which was updated on May 4.  A FIT was held and recommended software configuration changes to work around the issues.  Parameters in the software were updated on Friday afternoon to disable nuisance warning messages and minimize the slowing and/or stopping of the T2 caused by Command and Logic Unit (CLU) to GUI communication issues. Since the software updates were implemented, initial crew feedback has been positive.   Urine Processor Assembly (UPA) Status: During a process cycle on Thursday night, the stationary bowl temperature in the Distillate Assembly (DA) dropped enough to activate thermostatically-controlled heaters which caused the condenser pressure to increase. The UPA was taken to standby. Due to continued concerns regarding elevated conductivity and precipitation events, a FIT was held and one of the recommendations was to R&R the brine filter which was completed today.  The UPA will remain down and the Waste and Hygiene Compartment (WHC) will remain configured to internal EDV. An Advanced Recycle Filter Tank Assembly (ARFTA) R&R as well as conversion of the WHC to alternate pretreat have been planned for tomorrow.   Today’s Planned Activities All activities were completed unless otherwise noted. JEMRMS RLT2 Activation Extension of Slide Table in JEMAL and Opening Outer Hatch CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 2241 On MCC Go Regeneration of БМП Ф1 Micropurification Cartridge (start) EMU backpack replacement JEMRMS Releasing SAM Latching Arm to prepare Small Satellite Orbital Deployer Rodent Research (RR) Node 2 Camcorder Settings Adjustment Auxiliary Laptop Anti-Virus Update / r/g 8247 PILOT-T. Preparation for the experiment.r/g 2236 HABIT Preparing for the experiment Progress 431 (DC1) Stowage and IMS Ops / r/g 2234 COL HD VCA1 Camera Assembly Activation in High Definition Mode Extravehicular Mobility Unit (EMU) Full Water Tank Dump and Fill ARED Flywheel Cylinder Evacuation Progress 432 (Aft) Transfers and IMS Ops (to provide access to АСН-К hardware) / r/g 1812 PPS2 Outlet switch ON PILOT-T. Experiment Ops r/g 2236 KUB6  Centrifuge Check after Installation SPHEROIDS Disconnect and Stow KUB6 Start EMU cooling loop scrub Retracting Slide Table in JEMAL and closing Outer Hatch PPS1 Outlet switch ON KUB5. Centrifuge Check SPHEROIDS Disconnect and Stow KUB5 COL High Definition Video Camera Assembly 1 Switch to SD Mode CubeSat Deployment Photos Rodent Research Animal transfer to MSG and back DAN. Experiment Ops r/g 0119 DAN. Experiment Operator Assistance / r/g 0119 Rodent Research (RR) Measurement Ops Rodent Research Animal transfer to MSG and back Rodent Research (RR) Measurement Ops EMU Cooling Loop Scrub Terminate EMU Conductivity Test Rodent Research Animal transfer to MSG and back HABIT Procedure Review CORRECTSIYA. Logging Liquid and Food (Medication) Intake / r/g 2241 SM Ventilation Subsystem Preventive Maintenance. Group C Brine/urine transfer from EDV-U to Progress 432 (SM Aft) Rodnik H2O Tank1 / r/g 2232 BRI data download to RSS1 laptop / r/g 2052 Replacement of urine receptacle (МП) and filter-insert (Ф-В) in АСУ [АСУ] Activation after replacement / Life Support System СОЖ RED Dragon Camera Setup to support CubeSat Ops SSC for BEAM Laptop Deploy Rodent Research Rodent Research CASIS Setup CubeSat Deployment Photos Maintenance Closures of Vozdukh Valves RED Dragon camera power OFF. EMU Cooling Loop Post Scrub Reconfig PILOT-T. Experiment Ops r/g 2237 SSC for BEAM Laptop  Load Image Client (LIC) mode ARED pin search Sprint Exercise Optional ARED pin R&R СОЖ Maintenance WRM – condensate transfer (init) UPA Brine Filter Gather PILOT-T. Closeout Ops r/g 2237 UPA Brine Filter R&R ECLSS – Recycle Tank R&R IMS Delta File Prep EMU Reconfiguration IMMUNO. Preparing Saliva-Immuno Kit for the experiment / r/g 2238 WRM – condensate transfer (term) URISYS Hardware Setup r/g 2235 EMU Long Dryout […]

from ISS On-Orbit Status Report http://ift.tt/22eT4xP
via IFTTT

Why the Name Icarus? - The Latest Anonymous Operation

s, the famous hacker collective known around the world as Anonymous is back at it again. Icarus is the name of their latest operation, which began in ...

from Google Alert - anonymous http://ift.tt/1slZtdR
via IFTTT

Anonymous Beach Hotel

I was wondering if anyone had stayed at the Anonymous Beach hotel and if you could tell me if there are hairdryers in the rooms please.

from Google Alert - anonymous http://ift.tt/1rRbF6G
via IFTTT

I have a new follower on Twitter


Miles Austin
I help sales leaders and managers understand and acquire the rapidly evolving tech and tools that are creating new opportunities in sales.
North Bend, WA
http://t.co/l6GGQbDh9u
Following: 6948 - Followers: 30693

May 17, 2016 at 03:55AM via Twitter http://twitter.com/milesaustin

I have a new follower on Twitter


Cycle Computing
Leader in #CloudComputing orchestration software for #BigCompute & #BigData.
NYC, SF, BOS
http://t.co/lv5kX0pXta
Following: 452 - Followers: 1348

May 17, 2016 at 02:56AM via Twitter http://twitter.com/cyclecomputing

I have a new follower on Twitter


TIMEXTENDER
It’s all about Automation! You need the right data, at the right time, to make the right decisions. TX DWA provide the data you need at your fingertips!

http://t.co/1OZlLyNXYK
Following: 8542 - Followers: 15311

May 17, 2016 at 02:11AM via Twitter http://twitter.com/TimeXtender

Clouds of the Carina Nebula


What forms lurk in the mists of the Carina Nebula? The dark ominous figures are actually molecular clouds, knots of molecular gas and dust so thick they have become opaque. In comparison, however, these clouds are typically much less dense than Earth's atmosphere. Featured here is a detailed image of the core of the Carina Nebula, a part where both dark and colorful clouds of gas and dust are particularly prominent. The image was captured last month from Siding Spring Observatory in Australia. Although the nebula is predominantly composed of hydrogen gas -- here colored green, the image was assigned colors so that light emitted by trace amounts of sulfur and oxygen appear red and blue, respectively. The entire Carina Nebula, cataloged as NGC 3372, spans over 300 light years and lies about 7,500 light-years away in the constellation of Carina. Eta Carinae, the most energetic star in the nebula, was one of the brightest stars in the sky in the 1830s, but then faded dramatically. via NASA http://ift.tt/1ThxMNQ

Monday, May 16, 2016

I have a new follower on Twitter


Sean O'Meara
High Performance Lifestyle Coach, tech geek, musician, dog lover, vegan, fitness maniac
SJ/SF Bay Area, CA
https://t.co/c4RNTlUQD6
Following: 12678 - Followers: 13189

May 16, 2016 at 11:50PM via Twitter http://twitter.com/_sean_omeara

Monotone Retargeting for Unsupervised Rank Aggregation with Object Features. (arXiv:1605.04465v1 [stat.ML])

Learning the true ordering between objects by aggregating a set of expert opinion rank order lists is an important and ubiquitous problem in many applications ranging from social choice theory to natural language processing and search aggregation. We study the problem of unsupervised rank aggregation where no ground truth ordering information in available, neither about the true preference ordering between any set of objects nor about the quality of individual rank lists. Aggregating the often inconsistent and poor quality rank lists in such an unsupervised manner is a highly challenging problem, and standard consensus-based methods are often ill-defined, and difficult to solve. In this manuscript we propose a novel framework to bypass these issues by using object attributes to augment the standard rank aggregation framework. We design algorithms that learn joint models on both rank lists and object features to obtain an aggregated rank ordering that is more accurate and robust, and also helps weed out rank lists of dubious validity. We validate our techniques on synthetic datasets where our algorithm is able to estimate the true rank ordering even when the rank lists are corrupted. Experiments on three real datasets, MQ2008, MQ2008 and OHSUMED, show that using object features can result in significant improvement in performance over existing rank aggregation methods that do not use object information. Furthermore, when at least some of the rank lists are of high quality, our methods are able to effectively exploit their high expertise to output an aggregated rank ordering of great accuracy.



from cs.AI updates on arXiv.org http://ift.tt/1TTLimG
via IFTTT