Latest YouTube Video

Saturday, October 29, 2016

Kringle Vs Krampus: A Santa's Anonymous Benefit Show

Kringle Vs Krampus: A Santa's Anonymous Benefit Show. A New Rhetoric, Calling All Captains, The Devils Sons. Sat, December 17, 2016. 8:00 pm.

from Google Alert - anonymous http://ift.tt/2f4gNOj
via IFTTT

Teenage Hacker Arrested For Disrupting 911 Service With DDoS Attack

Just last month, researchers explained how an attacker can knock the 911 service offline in an entire state by launching automated Distributed Denial of Service (DDoS) attacks using a botnet of just 6000 smartphones. But, doing so, in reality, could not only land public in danger but the attacker as well. The same happened to an 18-year-old teen from Arizona, who was arrested this week


from The Hacker News http://ift.tt/2dRmjrv
via IFTTT

Mirai Botnet Itself is Flawed; Hacking Back IoTs Could Mitigate DDoS Attacks

The infamous botnet that was used in the recent massive distributed denial of service (DDoS) attacks against the popular DNS provider Dyn, causing vast internet outage on last Friday, itself is flawed. Yes, Mirai malware, which has already enslaved millions of Internet of Things (IoT) devices across 164 countries, contains several vulnerabilities that might be used against it in order to


from The Hacker News http://ift.tt/2fgpxWw
via IFTTT

Yearly Arctic Sea Ice Age with Graph of Ice Age by Area: 1984 - 2016

One significant change in the Arctic region in recent years has been the rapid decline in perennial sea ice. Perennial sea ice, also known as multi-year ice, is the portion of the sea ice that survives the summer melt season. Perennial ice may have a life-span of nine years or more and represents the thickest component of the sea ice; perennial ice can grow up to four meters thick. By contrast, first year ice that grows during a single winter is generally at most two meters thick. This animation shows the Arctic sea ice age for the week of the minimum ice extent for each year, depicting the age in different colors. Younger sea ice, or first-year ice, is shown in a dark shade of blue while the ice that is five years old or older is shown as white. A color scale identifies the age of the intermediary years.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2eZ3eRA
via IFTTT

Weekly Animation of Arctic Sea Ice Age with Graph of Ice Age by Percent of Total: 1984 - 2016

One significant change in the Arctic region in recent years has been the rapid decline in perennial sea ice. Perennial sea ice, also known as multi-year ice, is the portion of the sea ice that survives the summer melt season. Perennial ice may have a life-span of nine years or more and represents the thickest component of the sea ice; perennial ice can grow up to four meters thick. By contrast, first year ice that grows during a single winter is generally at most two meters thick. Below is an animation of the weekly sea ice age between 1984 and 2016. The animation shows the seasonal variability of the ice, growing in the Arctic winter and melting in the summer. In addition, this also shows the changes from year to year, depicting the age of the sea ice in different colors. Younger sea ice, or first-year ice, is shown in a dark shade of blue while the ice that is five years old or older is shown as white. A color scale identifies the age of the intermediary years.. A graph in the lower, right corner the quantifies the change over time by showing each age category of sea ice as a percent of total ice cover in the Arctic Ocean. The lavender outline on the map indicates the spatial region covered by the Arctic Ocean and thus included in the graph.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2fg78Jz
via IFTTT

Weekly Animation of Arctic Sea Ice Age with Graph of Ice Age By Area: 1984 - 2016

One significant change in the Arctic region in recent years has been the rapid decline in perennial sea ice. Perennial sea ice, also known as multi-year ice, is the portion of the sea ice that survives the summer melt season. Perennial ice may have a life-span of nine years or more and represents the thickest component of the sea ice; perennial ice can grow up to four meters thick. By contrast, first year ice that grows during a single winter is generally at most two meters thick. Below is an animation of the weekly sea ice age between 1984 and 2016. The animation shows the seasonal variability of the ice, growing in the Arctic winter and melting in the summer. In addition, this also shows the changes from year to year, depicting the age of the sea ice in different colors. Younger sea ice, or first-year ice, is shown in a dark shade of blue while the ice that is five years old or older is shown as white. A color scale identifies the age of the intermediary years. A graph in the lower, right corner the quantifies the change over time by showing the area in millions of square kilometers covered by each age category of perennial sea ice. This graph also includes a "memory bar indicator"- the green line that here represents the current maximum value seen thus far in the animation for the particular week displayed. For example, when showing the first week in September, the memory bar will show the maximum value seen for all prior years' first week of September since the beginning of the animation (January 1, 1984).

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2eZ1BDf
via IFTTT

Haunting the Cepheus Flare


Spooky shapes seem to haunt this jeweled expanse, drifting through the night in the royal constellation Cepheus. Of course, the shapes are cosmic dust clouds faintly visible in dimly reflected starlight. Far from your own neighborhood on planet Earth, they lurk along the plane of the Milky Way at the edge of the Cepheus Flare molecular cloud complex some 1,200 light-years away. Over 2 light-years across and brighter than the other ghostly apparitions, vdB 141 or Sh2-136 is also known as the Ghost Nebula, seen at the right of the starry field of view. Within the nebula are the telltale signs of dense cores collapsing in the early stages of star formation. via NASA http://ift.tt/2fe2onB

Friday, October 28, 2016

Why Anonymous “Discernment” Ministries Have No Credibility

There is a big problem, however, with anonymous “discernment” ministries, and they are becoming more and more common, especially online. Why is ...

from Google Alert - anonymous http://ift.tt/2ePreJf
via IFTTT

Sean Anonymous signs off as Local Current DJ in Residence

Sean Anonymous Local Current DJ in Residence Add a comment. Seans in the studio: Sean Anonymous (right) programs music next to The Current's ...

from Google Alert - anonymous http://ift.tt/2e51mrr
via IFTTT

[FD] [FOXMOLE SA 2016-07-20] Lupusec XT1 Alarm System - Multiple Issues

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-10-27-3 iTunes 12.5.2 for Windows

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-10-27-2 iCloud for Windows v6.0.1

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-10-27-1 Xcode 8.1

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

New Privacy Rules require ISPs to must Ask you before Sharing your Sensitive Data

Good News for privacy concerned people! Now, your online data will not be marketed for business; at least by your Internet Service Providers (ISPs). Yes, it's time for your ISPs to ask your permission in order to share your sensitive data for marketing or advertisement purposes, the FCC rules. On Thursday, the United States Federal Communications Commission (FCC) has imposed new privacy


from The Hacker News http://ift.tt/2eD0YRX
via IFTTT

[FD] Wickr Inc - When honesty disappears behind the VCP Mountain

Topic: Wickr Inc - When honesty disappears behind the VCP Mountain Title: Wickr Inc Secret Messenger - Bug Bounty Program broken by Design URL: http://ift.tt/2eWDXHG #wickr #security #vulnerability #exploit

Source: Gmail -> IFTTT-> Blogger

ISS Daily Summary Report – 10/27/2016

Cygnus Cargo Operations:  The crew was originally scheduled to ingress the Cygnus vehicle this morning, however the crew got ahead of the timeline and ingressed on Sunday, October 23rd.  Today the crew performed Cygnus cargo transfer operations off the tasklist during the time that was allocated for ingress. Airway Monitory Reconfiguration: Following Tuesday’s successful Airway Monitoring session in the Joint Airlock, FE-5 and FE-6 stowed the experiment hardware and reconfigured the Airlock back to its nominal configuration. Airway Monitoring is the first experiment to use the US Airlock as a hypobaric facility for performing science. Utilizing the US Airlock will allow unique opportunities for the study of gravity, ambient pressure interactions, and their effect on the Human Body. This investigation studies the occurrence and indicators of airway inflammation in crewmembers, using ultra-sensitive gas analyzers to analyze exhaled air. This helps to highlight any health impacts and to maintain crewmember well-being on future human spaceflight missions, especially longer-duration missions to the Moon and Mars for example, where crewmembers will have to be more self-sufficient in highlighting and avoiding such conditions. Simple Solar Neutron Detector Deploy: FE-3 retrieved the Simple Solar Neutron Detector from the Cygnus vehicle and deployed it on the Node 2 Lightbridge.  The crew took photos and downlinked them for ground teams to review.  Neutrons are difficult to detect because they are electrically neutral particles and pass through most detector systems without detection. The slow neutron Spectrometer University of Lincoln-Nebraska Detector for the Analysis of Solar Neutrons (DANSON) uses a new instrument design that can significantly improve the reliability of identifying neutrons in the mixed radiation field found in deep space. This instrument design uses a moderation and capture technique that slows down the neutrons and then “captures” them in an isotope of boron. The DANSON detector uses special crystals and thin film devices loaded with the boron 10 isotope to absorb the slowed neutrons, leaving a signature in the crystal or the device of the neutron capture process. DANSON uses custom materials with distinct signatures that are easily recognized as a distinct neutron capture signal, which is then processed and analyzed to determine the radiation levels. The objective is to measure the neutron flux and neutron energy on the ISS with DANSON. The ISS provides a valuable testbed for evaluating the instrument performance in a mixed radiation environment that includes sources from galactic cosmic rays, solar energetic particles, trapped radiation belts and albedo neutrons from Earth’s atmosphere. The structure and contents of the ISS serve as a realistic spacecraft for exploration.  Today’s Planned Activities All activities were completed unless otherwise noted. ГНШ-К-24 Low Noise Headset Audit EKON-M. Observations and photography COSMOCARD. Closeout Ops Tagup with specialists Soyuz 731 GoPro HERO3 Camcorder Battery Pair 1 Recharging, Start In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Full Fill Packing Equipment for Return via Soyuz 731 Photo TV High Definition (HD) Cygnus Video Setup PILOT-T. Preparation for the experiment. Handover of Increment 49/50 Crew Water Recovery Management (WRM) Condensate Pumping Initiation PILOT-T. Experiment Ops. In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Full Fill СОЖ maintenance Water Recovery Managment (WRM) Condensate Pumping Termination Combustion Integrated Rack Alignment Guide Removal Crew Departure Preparations for Return to Earth Node 1 Nadir Common Berthing Mechanism (CBM) Controller Panel Assembly (CPA) Removal [Completed Sunday 23-October] LBNP Exercise (CLOSEOUT). Tagup with specialists Transfer Operations – Prepack of US items to be loaded into Soyuz Node 1 Nadir to Cygnus Vestibule Outfitting Part 2 [Completed Sunday 23-October] Cygnus Ingress [Completed Sunday 23-October] Terminating charge of Soyuz 731 GoPro HERO3 Camcorder battery pair 1 and initiating recharge of pair 2 AIRMON Stow MICROVIR. Photography of Cassetta-M No. 1-3, No.1-4 bottom cells. Closeout Ops Cygnus Cargo Photo ISS Medical Accessories Kit (IMAK) Unpack from OA-5 CALCIUM. Experiment Session 11. Restow Vestibule Outfitting Kit (VOK) [Completed Sunday 23-October] Sanitary-Hygiene Status Monitoring Private Medical Conference (PMC) Sanitary-Hygiene Status Monitoring BIOPLENKA. Removal of Samples from the Thermostat, fixation of Constanta cassette No.4-5 biofilm. Photo/TV Airway Monitor Vido Tear down in A/L Temperature and Humidity Control (THC) Portable Fan Assembly (PFA) Teardown CALCIUM. Transfer of Calcium-Э Kits No.3 and No.4 to Soyuz 731 Teardown the PS-120 Junction Box and stow, and reconfigure A/L UOP. Flushing Progress 433 (DC1) Rodnik H2O Tank 1 and Tank 2 H2O connectors В1, B2 Replacement of E-K Pre-treat Container and Hose in АСУ System. [АСУ] Activation after Replacement AQM Sieve Cartridge Remove and Replace Microbial Sample Collection Simple Solar Neutron Detector Hardware Setup Crew Departure Preparations for Return to Earth Extravehicular Activity (EVA) Airlock Restow Cleaning Micropurification Unit (БМП) Fan Screen Terminating Soyuz 731 GoPro HERO3 Camcorder battery pair 2 Recharge Public Affairs Office (PAO) High Definition (HD) Config LAB Setup MOTOCARD. Memory card kits prepack for return PILOT-T. Experiment Session. Collecting SM and FGB Air Samples Using АК-1М Sampler Soyuz 731 Return Stowage ИПД Air Sample Collection for Ammonia in SM PILOT-T. Photography of the Experiment Ops PAO Preparation Public Affairs Office (PAO) Event in High Definition (HD) – Lab PILOT-T. Closeout Ops Tagup with specialists as necessary ISS Crew Orientation CONTENT. Experiment Ops Onboard Training (OBT) Cygnus Debrief Conference Flight Director/ISS CREW CONFERENCE OA-5 Cygnus Delta Emergency Response Review Update On board Training Cygnus Emergency Procedure Review BIOPLENKA. Removal of Samples from the Thermostat, fixation of Constanta cassette No.4-6 biofilm.  Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. RapidScat Survey Three-Day Look Ahead: Friday, 10/28: Cygnus Cargo Transfer, 47S Prepack, Change of Command Saturday, 10/29: 47S Undock and Landing Sunday, 10/30: Crew Off Duty QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Idle Oxygen Generation Assembly (OGA) Standby Urine Processing Assembly (UPA) Shutdown Trace Contaminant Control […]

from ISS On-Orbit Status Report http://ift.tt/2dOy1Dn
via IFTTT

This Code Injection Technique can Potentially Attack All Versions of Windows

Guess what? If you own a Windows PC, which is fully-patched, attackers can still hack your computer. Isn't that scary? Well, definitely for most of you. Security researchers have discovered a new technique that could allow attackers to inject malicious code on every version of Microsoft's Windows operating system, even Windows 10, in a manner that no existing anti-malware tools can detect,


from The Hacker News http://ift.tt/2eYsjdX
via IFTTT

'Celebgate' Hacker Gets 18 Months in Prison for Hacking Celebrity Nude Photos

The hacker who stole nude photographs of female celebrities two years ago in a massive data breach — famous as "The Fappening" or "Celebgate" scandal — has finally been sentenced to 18 months in federal prison, authorities said on Thursday. 36-year-old Lancaster, Pennsylvania man Ryan Collins was arrested in March and charged with hacking into "at least 50 iCloud accounts and 72 Gmail


from The Hacker News http://ift.tt/2eWko2k
via IFTTT

ICON and GOLD: Exploring the Interface to Space

A basic view of the orbits for ICON (Ionospheric Connections Explorer) and GOLD (Global-scale Observations of the Limb and Disk). These missions will conduct measurements of ionospheric composition, ionization, and winds to better understand the connection between space weather and its terrestrial impacts. In this visualization, we present GOLD (in geostationary orbit around Earth) and ICON (in low Earth orbit). The colors over Earth represent model data from the IRI (International Reference Ionosphere) model of the density of the singly-ionized oxygen atom at an altitude of 350 kilometers. Red represents high density. The ion density is enhanced above and below the geomagnetic equator (not perfectly aligned with the geographic equator) on the dayside due to the ionizing effects of solar ultraviolet radiation combined with the effects of high-altitude winds and the geomagnetic field.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2eBFVis
via IFTTT

Exploring the Ionosphere: The View from GOLD

A view of Earth from the point-of-view of the GOLD (Global-scale Observations of the Limb and Disk) instrument in geostationary orbit. This mission will conduct measurements of ionospheric composition to better understand the connection between space weather and its terrestrial impacts. ICON (Ionospheric Connections Explorer) orbits much closer to Earth. The colors over Earth represent model data from the IRI (International Reference Ionosphere) model of the density of the singly-ionized oxygen atom at an altitude of 350 kilometers. Red represents high density. The ion density is enhanced above and below the geomagnetic equator (not perfectly aligned with the geographic equator) on the dayside due to the ionizing effects of solar ultraviolet radiation combined with the effects of high-altitude winds and the geomagnetic field. This ion density decreases at night as the ions recombine with free electrons. At the limb of Earth, we present a cross-sectional profile of the density enhancement.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2eT7N0f
via IFTTT

Exploring the Ionosphere: The Dayside Ionosphere

The colors over Earth represent model data from the IRI (International Reference Ionosphere) model of the density of the singly-ionized oxygen atom at an altitude of 350 kilometers. Red represents high density. The ion density is enhanced above and below the geomagnetic equator (not perfectly aligned with the geographic equator) on the dayside due to the ionizing effects of solar ultraviolet radiation combined with the effects of high-altitude winds and the geomagnetic field. This ion density decreases at night as the ions recombine with free electrons.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2eBIukz
via IFTTT

Thursday, October 27, 2016

Synthesis of Shared Control Protocols with Provable Safety and Performance Guarantees. (arXiv:1610.08500v1 [cs.RO])

We formalize synthesis of shared control protocols with correctness guarantees for temporal logic specifications. More specifically, we introduce a modeling formalism in which both a human and an autonomy protocol can issue commands to a robot towards performing a certain task. These commands are blended into a joint input to the robot. The autonomy protocol is synthesized using an abstraction of possible human commands accounting for randomness in decisions caused by factors such as fatigue or incomprehensibility of the problem at hand. The synthesis is designed to ensure that the resulting robot behavior satisfies given safety and performance specifications, e.g., in temporal logic. Our solution is based on nonlinear programming and we address the inherent scalability issue by presenting alternative methods. We assess the feasibility and the scalability of the approach by an experimental evaluation.



from cs.AI updates on arXiv.org http://ift.tt/2fcqH5n
via IFTTT

A Review of 40 Years of Cognitive Architecture Research: Focus on Perception, Attention, Learning and Applications. (arXiv:1610.08602v1 [cs.AI])

In this paper we present a broad overview of the last 40 years of research on cognitive architectures. Although the number of existing architectures is nearing several hundred, most of the existing surveys do not reflect this growth and focus on a handful of well-established architectures. While their contributions are undeniable, they represent only a part of the research in the field. Thus, in this survey we wanted to shift the focus towards a more inclusive and high-level overview of the research in cognitive architectures. Our final set of 86 architectures includes 55 that are still actively developed, and borrow from a diverse set of disciplines, spanning areas from psychoanalysis to neuroscience. To keep the length of this paper within reasonable limits we discuss only the core cognitive abilities, such as perception, attention mechanisms, learning and memory structure. To assess the breadth of practical applications of cognitive architectures we gathered information on over 700 practical projects implemented using the cognitive architectures in our list. We use various visualization techniques to highlight overall trends in the development of the field. Our analysis of practical applications shows that most architectures are very narrowly focused on a particular application domain. Furthermore, there is an apparent gap between general research in robotics and computer vision and research in these areas within the cognitive architectures field. It is very clear that biologically inspired models do not have the same range and efficiency compared to the systems based on engineering principles and heuristics. Another observation is related to a general lack of collaboration. Several factors hinder communication, such as the closed nature of the individual projects (only one-third of the reviewed here architectures are open-source) and terminological differences.



from cs.AI updates on arXiv.org http://ift.tt/2eVFPAm
via IFTTT

Anomaly Detection with the Voronoi Diagram Evolutionary Algorithm. (arXiv:1610.08640v1 [cs.AI])

This paper presents the Voronoi diagram-based evolutionary algorithm (VorEAl). VorEAl partitions input space in abnormal/normal subsets using Voronoi diagrams. Diagrams are evolved using a multi-objective bio-inspired approach in order to conjointly optimize classification metrics while also being able to represent areas of the data space that are not present in the training dataset. As part of the paper VorEAl is experimentally validated and contrasted with similar approaches.



from cs.AI updates on arXiv.org http://ift.tt/2fcnF12
via IFTTT

Personalized Risk Scoring for Critical Care Prognosis using Mixtures of Gaussian Processes. (arXiv:1610.08853v1 [cs.AI])

Objective: In this paper, we develop a personalized real-time risk scoring algorithm that provides timely and granular assessments for the clinical acuity of ward patients based on their (temporal) lab tests and vital signs; the proposed risk scoring system ensures timely intensive care unit (ICU) admissions for clinically deteriorating patients. Methods: The risk scoring system learns a set of latent patient subtypes from the offline electronic health record data, and trains a mixture of Gaussian Process (GP) experts, where each expert models the physiological data streams associated with a specific patient subtype. Transfer learning techniques are used to learn the relationship between a patient's latent subtype and her static admission information (e.g. age, gender, transfer status, ICD-9 codes, etc). Results: Experiments conducted on data from a heterogeneous cohort of 6,321 patients admitted to Ronald Reagan UCLA medical center show that our risk score significantly and consistently outperforms the currently deployed risk scores, such as the Rothman index, MEWS, APACHE and SOFA scores, in terms of timeliness, true positive rate (TPR), and positive predictive value (PPV). Conclusion: Our results reflect the importance of adopting the concepts of personalized medicine in critical care settings; significant accuracy and timeliness gains can be achieved by accounting for the patients' heterogeneity. Significance: The proposed risk scoring methodology can confer huge clinical and social benefits on more than 200,000 critically ill inpatient who exhibit cardiac arrests in the US every year.



from cs.AI updates on arXiv.org http://ift.tt/2eVHINF
via IFTTT

Hit-and-Run for Sampling and Planning in Non-Convex Spaces. (arXiv:1610.08865v1 [stat.CO])

We propose the Hit-and-Run algorithm for planning and sampling problems in non-convex spaces. For sampling, we show the first analysis of the Hit-and-Run algorithm in non-convex spaces and show that it mixes fast as long as certain smoothness conditions are satisfied. In particular, our analysis reveals an intriguing connection between fast mixing and the existence of smooth measure-preserving mappings from a convex space to the non-convex space. For planning, we show advantages of Hit-and-Run compared to state-of-the-art planning methods such as Rapidly-Exploring Random Trees.



from cs.AI updates on arXiv.org http://ift.tt/2fcpRWu
via IFTTT

Learning Scalable Deep Kernels with Recurrent Structure. (arXiv:1610.08936v1 [cs.LG])

Many applications in speech, robotics, finance, and biology deal with sequential data, where ordering matters and recurrent structures are common. However, this structure cannot be easily captured by standard kernel functions. To model such structure, we propose expressive closed-form kernel functions for Gaussian processes. The resulting model, GP-LSTM, fully encapsulates the inductive biases of long short-term memory (LSTM) recurrent networks, while retaining the non-parametric probabilistic advantages of Gaussian processes. We learn the properties of the proposed kernels by optimizing the Gaussian process marginal likelihood using a new provably convergent semi-stochastic procedure and exploit the structure of these kernels for fast and scalable training and prediction. We demonstrate state-of-the-art performance on several benchmarks, and thoroughly investigate a consequential autonomous driving application, where the predictive uncertainties provided by GP-LSTM are uniquely valuable.



from cs.AI updates on arXiv.org http://ift.tt/2eVI9Y0
via IFTTT

On Design Mining: Coevolution and Surrogate Models. (arXiv:1506.08781v5 [cs.NE] UPDATED)

Design mining is the use of computational intelligence techniques to iteratively search and model the attribute space of physical objects evaluated directly through rapid prototyping to meet given objectives. It enables the exploitation of novel materials and processes without formal models or complex simulation. In this paper, we focus upon the coevolutionary nature of the design process when it is decomposed into concurrent sub-design threads due to the overall complexity of the task. Using an abstract, tuneable model of coevolution we consider strategies to sample sub-thread designs for whole system testing, how best to construct and use surrogate models within the coevolutionary scenario, and the effects of access to multiple whole system (physical) testing equipment on performance. Drawing on our findings, the paper then describes the effective design of an array of six heterogeneous vertical-axis wind turbines.



from cs.AI updates on arXiv.org http://ift.tt/1Nx7TnZ
via IFTTT

A Deep Hierarchical Approach to Lifelong Learning in Minecraft. (arXiv:1604.07255v2 [cs.AI] UPDATED)

The ability to reuse or transfer knowledge from one task to another in lifelong learning problems, such as Minecraft, is one of the major challenges faced in AI. Reusing knowledge across tasks is crucial to solving tasks efficiently with lower sample complexity. We provide a Reinforcement Learning agent with the ability to transfer knowledge by learning reusable skills, a type of temporally extended action (also known as Options (Sutton et. al. 1999)). The agent learns reusable skills to solve tasks in Minecraft, a popular video game which is an unsolved and high-dimensional lifelong learning problem. These reusable skills, which we refer to as Deep Skill Networks (DSNs), are then incorporated into our novel Hierarchical Deep Reinforcement Learning Network (H-DRLN) architecture. The H-DRLN, a hierarchical extension of Deep Q-Networks, learns to efficiently solve tasks by reusing knowledge from previously learned DSNs. The DSNs are incorporated into the H-DRLN using two techniques: (1) a DSN array and (2) skill distillation, our novel variation of policy distillation (Rusu et. al. 2015) for learning skills. Skill distillation enables the H-DRLN to scale in lifelong learning, by accumulating knowledge and encapsulating multiple reusable skills into a single distilled network. The H-DRLN exhibits superior performance and lower learning sample complexity (by taking advantage of temporally extended actions) compared to the regular Deep Q Network (Mnih et. al. 2015) in sub-domains of Minecraft. We also show the potential to transfer knowledge between related Minecraft tasks without any additional learning.



from cs.AI updates on arXiv.org http://ift.tt/1WmQ9Sn
via IFTTT

Residual Networks Behave Like Ensembles of Relatively Shallow Networks. (arXiv:1605.06431v2 [cs.CV] UPDATED)

In this work we propose a novel interpretation of residual networks showing that they can be seen as a collection of many paths of differing length. Moreover, residual networks seem to enable very deep networks by leveraging only the short paths during training. To support this observation, we rewrite residual networks as an explicit collection of paths. Unlike traditional models, paths through residual networks vary in length. Further, a lesion study reveals that these paths show ensemble-like behavior in the sense that they do not strongly depend on each other. Finally, and most surprising, most paths are shorter than one might expect, and only the short paths are needed during training, as longer paths do not contribute any gradient. For example, most of the gradient in a residual network with 110 layers comes from paths that are only 10-34 layers deep. Our results reveal one of the key characteristics that seem to enable the training of very deep networks: Residual networks avoid the vanishing gradient problem by introducing short paths which can carry gradient throughout the extent of very deep networks.



from cs.AI updates on arXiv.org http://ift.tt/1sx5TqP
via IFTTT

Domain Adaptation with Soft-margin multiple feature-kernel learning beats Deep Learning for surveillance face recognition. (arXiv:1610.01374v2 [cs.CV] UPDATED)

Face recognition (FR) is the most preferred mode for biometric-based surveillance, due to its passive nature of detecting subjects, amongst all different types of biometric traits. FR under surveillance scenario does not give satisfactory performance due to low contrast, noise and poor illumination conditions on probes, as compared to the training samples. A state-of-the-art technology, Deep Learning, even fails to perform well in these scenarios. We propose a novel soft-margin based learning method for multiple feature-kernel combinations, followed by feature transformed using Domain Adaptation, which outperforms many recent state-of-the-art techniques, when tested using three real-world surveillance face datasets.



from cs.AI updates on arXiv.org http://ift.tt/2dT6v7Y
via IFTTT

Fast Bayesian Non-Negative Matrix Factorisation and Tri-Factorisation. (arXiv:1610.08127v1 [cs.LG])

We present a fast variational Bayesian algorithm for performing non-negative matrix factorisation and tri-factorisation. We show that our approach achieves faster convergence per iteration and timestep (wall-clock) than Gibbs sampling and non-probabilistic approaches, and do not require additional samples to estimate the posterior. We show that in particular for matrix tri-factorisation convergence is difficult, but our variational Bayesian approach offers a fast solution, allowing the tri-factorisation approach to be used more effectively.



from cs.AI updates on arXiv.org http://ift.tt/2eHpmSA
via IFTTT

This is the small version


via Instagram http://ift.tt/2eVApFs

Showing user as Anonymous user for all downloads

I am getting username as anonymous for all entries in track da file reports. Even i am downloading as admin but the username in report shows as ...

from Google Alert - anonymous http://ift.tt/2eAGXLs
via IFTTT

You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget

Now you can hijack nearly any drone mid-flight just by using a tiny gadget. Security researcher Jonathan Andersson has devised a small hardware, dubbed Icarus, that can hijack a variety of popular drones mid-flight, allowing attackers to lock the owner out and give them complete control over the device. Andersson, who is the manager of Trend Micro's TippingPoint DVLab division, demonstrated


from The Hacker News http://ift.tt/2eKGRl0
via IFTTT

Wont work with AccessPress Anonymous Post

Wont work with AccessPress Anonymous Post http://ift.tt/2ezrGdYanonymous-post/ plugin. If there is for frontend featured ...

from Google Alert - anonymous http://ift.tt/2eQs1HI
via IFTTT

ISS Daily Summary Report – 10/26/2016

Meteor Operations: FE-6 exchanged the hard drive then removed and replaced the grating in the Meteor Camera located in the Window Observational Research Facility (WORF). The Meteor payload is a visible spectroscopy instrument with the primary purpose of observing meteors in Earth orbit. Meteor uses image analysis to provide information on the physical and chemical properties of the meteoroid dust, such as size, density, and chemical composition. Since the parent comets or asteroids for most of the meteor showers are identified, the study of the meteoroid dust on orbit provides information about the parent comets and asteroids. Microgravity Science Laboratory (MSL) Sample Cartridge Assembly (SCA) Exchange: FE-3 was unable to locate the calibration cartridge and was directed to cap the cable connectors on the MSL chamber. The MSL was left in a safe configuration while ground teams investigate the potential locations for the cartridge.  The cartridge that FE-3 removed was used for Metastable Solidification of Composites (METCOMP1) Run 4 and completed on October 20. The calibration cartridge must be installed prior to the next science run.  The Batch-2b of the Materials Science Laboratory Sample Cartridge Assemblies (MSL SCA-Batch 2b-ESA) serves two projects investigating how different phases organize in a structure when metallic alloys are solidified. The METCOMP project studies the phase formed by the reaction of the remaining liquid phase with an already formed solid, to form a second solid phase on cooling. For this purpose, Bronze (Copper-Tin Alloys) of different compositions will be processed. The other project, Solidification along a Eutectic path in Ternary Alloys (SETA), looks at how two phases that form together organize into lamellar, or fibre, structures when cooling Aluminum (Copper-Silver Alloys). Both projects will provide benchmark samples that will enable to test numerical models that aim to predict these structures.  Radiation Area Monitor (RAM) Retrieval:  FE-2 retrieved the RAMs that are located throughout ISS and package them for return on 47 Soyuz (47S). Soyuz 47 (47S) Nominal Descent Drill:  The 47S crew participated in a nominal Soyuz Decent Drill.  As part of the training they reviewed preliminary undocking and descent data and worked through the descent timeline from Soyuz activation through post-landing activities.  The 47S crew is scheduled to return to Earth on Saturday, October 29th. Today’s Planned Activities All activities were completed unless otherwise noted. NEUROIMMUNITET. Saliva Collection NEUROIMMUNITET. Closeout Ops MICROVIR. Removal of Cassetta-M No.1-3 and No.1-4 from ТБУ-В No.04 and setup in Cryogem-03 at +37 deg C COSMOCARD. Setup. Starting 24-hr ECG Recording PRODUTSENT. Removal from ТБУ-В No.02 and Transfer to ТБУ-В No.04 at 4 deg C MICROVIR. Squeezing out and photography of Cassetta-M No.№1-3, No.1-4 bottom cells.  Setup in Cryogem-03 at +37 deg C.  Crew Departure Preparations for Return to Earth Soyuz 731 Samsung Tablet Recharge, Initiate EVA Find Payload Water Reservoir Degas Tool ISS CREW/SSIPC CONFERENCE Filling (separation) of ЕДВ (КОВ) for Elektron or ЕДВ-СВ Soyuz 731 Return Stowage Ops Dose Tracker Data Entry Subject Handover of Increment 49 Crew СОЖ maintenance DOSIS 3D Passive Detectors De-Installation from Columbus (10 PDPs and 1 TDP). Meteor Hard Drive Swapout DOSIS 3D Passive Detector Pouch handover to Russian crew for download of dosimeters with Soyuz. MICROVIR. Glovebox-S Closeout Ops MICROVIR. Photographing the state of the cells of the lower cassette-M № 1-1, 1-2. Final operations.METEOR Grating Configuration Soyuz 731 Samsung tablet recharging, end LBNP Training (PRELIMINARY). PRODUTSENT. Deactivation and Removal of ТБУ-В S/N 02 JAXA Education Payload Observation Communication Event MICROVIR. Photography of bottom cells CALCIUM. Bioekololgiya containers: Photography, Processing, and Photo Downlink, Pre-pack for Return Soyuz 732 Samsung Tablet Recharge, Initiate Verification of ИП-1 Flow Indicator Position BIOPLENKA. Removal of Samples from the Thermostat, fixation of Constanta cassette No.4-4 biofilm. Public Affairs Office (PAO) Event in High Definition (HD) – JEM Crew Prep for TV Conference TV PAO event with participants of International Space Olympiad for Schoolchildren Scheduled monthly maintenance of Central Post Laptop Log-File Downlink from the Laptop. MICROVIR. Photography of bottom cells Material Science Laboratory SCA Exchange2B #4 Soyuz nominal descent training 2 Soyuz 731 descent OBT. Download Pille Dosimeter Readings IDENTIFICATION. Copy ИМУ-Ц micro-accelerometer data to laptop Crew time for ISS adaptation and orientation MICROVIR. Photography of bottom cells Radiation Area Monitors (RAM) Retrieval Dose Tracker Data Entry Subject SODI DSC Flash Disk Exchange NeuroMapping Experiment Neurocognitive Test – Subject Dose Tracker Historical Documentation Photography Crew time for ISS adaptation and orientation Crew Departure Preparations for Return to Earth Habitability Human Factors Directed Observations – Subject IMS Delta File Prep MICROVIR. Photography of cell condition. Start of video recording Soyuz 732 Samsung tablet recharging, end MICROVIR. Photography of cell condition. End of video recording Completed Task List Items Biomolecule Sequencer Sample Stop and Restow Flow Cell Biomolecule Sequencer MELFI Insert Ground Activities All activities were completed unless otherwise noted. SSRMS Unstow SPDM Three-Day Look Ahead: Thursday, 10/27: Airway Monitoring, Handover Friday, 10/28: Cygnus Cargo Transfer, 47S Prepack, Change of Command Saturday, 10/29: 47S Undock and Landing QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Idle Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Shutdown Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2eeDe3l
via IFTTT

Chinese Hackers won $215,000 for Hacking iPhone and Google Nexus at Mobile Pwn2Own

The Tencent Keen Security Lab Team from China has won a total prize money of $215,000 in the 2016 Mobile Pwn2Own contest run by Trend Micro's Zero Day Initiative (ZDI) in Tokyo, Japan. Despite the implementation of high-security measures in current devices, the famous Chinese hackers crew has successfully hacked both Apple's iPhone 6S as well as Google's Nexus 6P phones. Hacking iPhone 6S


from The Hacker News http://ift.tt/2eTMESX
via IFTTT

Friday's Massive DDoS Attack Came from Just 100,000 Hacked IoT Devices

Guess how many devices participated in last Friday's massive DDoS attack against DNS provider Dyn that caused vast internet outage? Just 100,000 devices. I did not miss any zeros. Dyn disclosed on Wednesday that a botnet of an estimated 100,000 internet-connected devices was hijacked to flood its systems with unwanted requests and close down the Internet for millions of users. <!-- adsense -->


from The Hacker News http://ift.tt/2dNy2SZ
via IFTTT

Alcoholics Anonymous-Open Meeting

Alcoholics Anonymous-Open Meeting. recurring see all events in this series. When: Thursday, October 27, 2016 8:30 PM - 9:30 PM. Where: Scott Hall ...

from Google Alert - anonymous http://ift.tt/2f9AitD
via IFTTT

Rating Feature for Anonymous Users

I would like to provide rating feature for anonymous users.so I have added for Anonymous Users in Virtual Resource ->Rating as a Contributor Role .

from Google Alert - anonymous http://ift.tt/2eTadeP
via IFTTT

Statistics logs under Anonymous user

I have enabled statistics but results are logging under anonymous user. All users are registered and login before they take the quiz. Any idea what ...

from Google Alert - anonymous http://ift.tt/2f9zPHS
via IFTTT

Racists Anonymous Helping To Make People Aware Of Their Own Biases

Racists Anonymous Helping To Make People Aware Of Their Own Biases. CBS Miami. Duration: 01:56 1 hr ago. SHARE · TWEET · SHARE · EMAIL.

from Google Alert - anonymous http://ift.tt/2dMSHXk
via IFTTT

Propeller Shadows on Saturn's Rings


What created these unusually long shadows on Saturn's rings? The dark shadows -- visible near the middle of the image -- extend opposite the Sun and, given their length, stem from objects having heights up to a few kilometers. The long shadows were unexpected given that the usual thickness of Saturn's A and B rings is only about 10 meters. After considering the choppy but elongated shapes apparent near the B-ring edge, however, a leading theory has emerged that some kilometer-sized moonlets exist there that have enough gravity to create even larger vertical deflections of nearby small ring particles. The resulting ring waves are called propellers, named for how they appear individually. It is these coherent groups of smaller ring particles that are hypothesized to be casting the long shadows. The featured image was taken by the robotic Cassini spacecraft currently orbiting Saturn. The image was captured in 2009, near Saturn's equinox, when sunlight streamed directly over the ring plane and caused the longest shadows to be cast. via NASA http://ift.tt/2eFVy6g

Wednesday, October 26, 2016

Anonymous Ottawa liver donors are coming out of the shadows, hoping to inspire others to do the ...

Matthew Marchand poses for a photo in Ottawa Ontario Wednesday Oct. 26, 2016. Matthew donated his liver to an anonymous stranger and plans to ...

from Google Alert - anonymous http://ift.tt/2eI7PXS
via IFTTT

I have a new follower on Twitter


Q Digital Studio
We make technology do its job better. So you can do yours. #webdesign #webdevelopment #eecms
Denver, CO
http://t.co/7pPfxoJNWc
Following: 1537 - Followers: 1976

October 26, 2016 at 10:55PM via Twitter http://twitter.com/qdigitalstudio

Infinite-dimensional Log-Determinant divergences II: Alpha-Beta divergences. (arXiv:1610.08087v1 [math.FA])

This work presents a parametrized family of divergences, namely Alpha-Beta Log- Determinant (Log-Det) divergences, between positive definite unitized trace class operators on a Hilbert space. This is a generalization of the Alpha-Beta Log-Determinant divergences between symmetric, positive definite matrices to the infinite-dimensional setting. The family of Alpha-Beta Log-Det divergences is highly general and contains many divergences as special cases, including the recently formulated infinite dimensional affine-invariant Riemannian distance and the infinite-dimensional Alpha Log-Det divergences between positive definite unitized trace class operators. In particular, it includes a parametrized family of metrics between positive definite trace class operators, with the affine-invariant Riemannian distance and the square root of the symmetric Stein divergence being special cases. For the Alpha-Beta Log-Det divergences between covariance operators on a Reproducing Kernel Hilbert Space (RKHS), we obtain closed form formulas via the corresponding Gram matrices.



from cs.AI updates on arXiv.org http://ift.tt/2dM8whb
via IFTTT

A Physician Advisory System for Chronic Heart Failure Management Based on Knowledge Patterns. (arXiv:1610.08115v1 [cs.AI])

Management of chronic diseases such as heart failure, diabetes, and chronic obstructive pulmonary disease (COPD) is a major problem in health care. A standard approach that the medical community has devised to manage widely prevalent chronic diseases such as chronic heart failure (CHF) is to have a committee of experts develop guidelines that all physicians should follow. These guidelines typically consist of a series of complex rules that make recommendations based on a patient's information. Due to their complexity, often the guidelines are either ignored or not complied with at all, which can result in poor medical practices. It is not even clear whether it is humanly possible to follow these guidelines due to their length and complexity. In the case of CHF management, the guidelines run nearly 80 pages. In this paper we describe a physician-advisory system for CHF management that codes the entire set of clinical practice guidelines for CHF using answer set programming. Our approach is based on developing reasoning templates (that we call knowledge patterns) and using these patterns to systemically code the clinical guidelines for CHF as ASP rules. Use of the knowledge patterns greatly facilitates the development of our system. Given a patient's medical information, our system generates a recommendation for treatment just as a human physician would, using the guidelines. Our system will work even in the presence of incomplete information. Our work makes two contributions: (i) it shows that highly complex guidelines can be successfully coded as ASP rules, and (ii) it develops a series of knowledge patterns that facilitate the coding of knowledge expressed in a natural language and that can be used for other application domains. This paper is under consideration for acceptance in TPLP.



from cs.AI updates on arXiv.org http://ift.tt/2fhfSyf
via IFTTT

A self-tuning Firefly algorithm to tune the parameters of Ant Colony System (ACSFA). (arXiv:1610.08222v1 [cs.AI])

Ant colony system (ACS) is a promising approach which has been widely used in problems such as Travelling Salesman Problems (TSP), Job shop scheduling problems (JSP) and Quadratic Assignment problems (QAP). In its original implementation, parameters of the algorithm were selected by trial and error approach. Over the last few years, novel approaches have been proposed on adapting the parameters of ACS in improving its performance. The aim of this paper is to use a framework introduced for self-tuning optimization algorithms combined with the firefly algorithm (FA) to tune the parameters of the ACS solving symmetric TSP problems. The FA optimizes the problem specific parameters of ACS while the parameters of the FA are tuned by the selected framework itself. With this approach, the user neither has to work with the parameters of ACS nor the parameters of FA. Using common symmetric TSP problems we demonstrate that the framework fits well for the ACS. A detailed statistical analysis further verifies the goodness of the new ACS over the existing ACS and also of the other techniques used to tune the parameters of ACS.



from cs.AI updates on arXiv.org http://ift.tt/2dM7kdm
via IFTTT

Quantum-enhanced machine learning. (arXiv:1610.08251v1 [quant-ph])

The emerging field of quantum machine learning has the potential to substantially aid in the problems and scope of artificial intelligence. This is only enhanced by recent successes in the field of classical machine learning. In this work we propose an approach for the systematic treatment of machine learning, from the perspective of quantum information. Our approach is general and covers all three main branches of machine learning: supervised, unsupervised and reinforcement learning. While quantum improvements in supervised and unsupervised learning have been reported, reinforcement learning has received much less attention. Within our approach, we tackle the problem of quantum enhancements in reinforcement learning as well, and propose a systematic scheme for providing improvements. As an example, we show that quadratic improvements in learning efficiency, and exponential improvements in performance over limited time periods, can be obtained for a broad class of learning problems.



from cs.AI updates on arXiv.org http://ift.tt/2fhibBw
via IFTTT

Universal adversarial perturbations. (arXiv:1610.08401v1 [cs.CV])

Given a state-of-the-art deep neural network classifier, we show the existence of a universal (image-agnostic) and very small perturbation vector that causes natural images to be misclassified with high probability. We propose a systematic algorithm for computing universal perturbations, and show that state-of-the-art deep neural networks are highly vulnerable to such perturbations, albeit being quasi-imperceptible to the human eye. We further empirically analyze these universal perturbations and show, in particular, that they generalize very well across neural networks. The surprising existence of universal perturbations reveals important geometric correlations among the high-dimensional decision boundary of classifiers. It further outlines potential security breaches with the existence of single directions in the input space that adversaries can possibly exploit to break a classifier on most natural images.



from cs.AI updates on arXiv.org http://ift.tt/2eHr3Q8
via IFTTT

New Liftable Classes for First-Order Probabilistic Inference. (arXiv:1610.08445v1 [cs.AI])

Statistical relational models provide compact encodings of probabilistic dependencies in relational domains, but result in highly intractable graphical models. The goal of lifted inference is to carry out probabilistic inference without needing to reason about each individual separately, by instead treating exchangeable, undistinguished objects as a whole. In this paper, we study the domain recursion inference rule, which, despite its central role in early theoretical results on domain-lifted inference, has later been believed redundant. We show that this rule is more powerful than expected, and in fact significantly extends the range of models for which lifted inference runs in time polynomial in the number of individuals in the domain. This includes an open problem called S4, the symmetric transitivity model, and a first-order logic encoding of the birthday paradox. We further identify new classes S2FO2 and S2RU of domain-liftable theories, which respectively subsume FO2 and recursively unary theories, the largest classes of domain-liftable theories known so far, and show that using domain recursion can achieve exponential speedup even in theories that cannot fully be lifted with the existing set of inference rules.



from cs.AI updates on arXiv.org http://ift.tt/2eHsKgf
via IFTTT

Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web. (arXiv:1610.08469v1 [cs.CY])

As food becomes an important part of modern life, recipes shared on the web are a great indicator of civilizations and culinary attitudes in different countries. Similarly, ingredients, flavors, and nutrition information are strong signals of the taste preferences of individuals from various parts of the world. Yet, we do not have a thorough understanding of these palate varieties.

In this paper, we present a large-scale study of recipes published on the Web and their content, aiming to understand cuisines and culinary habits around the world. Using a database of more than 157K recipes from over 200 different cuisines, we analyze ingredients, flavors, and nutritional values which distinguish dishes from different regions, and use this knowledge to assess the predictability of recipes from different cuisines. We then use country health statistics to understand the relation between these factors and health indicators of different nations, such as obesity, diabetes, migration, and health expenditure. Our results confirm the strong effects of geographical and cultural similarities on recipes, health indicators, and culinary preferences between countries around the world.



from cs.AI updates on arXiv.org http://ift.tt/2dMbvpJ
via IFTTT

Visual Question Answering: Datasets, Algorithms, and Future Challenges. (arXiv:1610.01465v2 [cs.CV] UPDATED)

Visual Question Answering (VQA) is a recent problem in computer vision and natural language processing that has garnered a large amount of interest from the deep learning, computer vision, and natural language processing communities. In VQA, an algorithm needs to answer text-based questions about images. Since the release of the first VQA dataset in 2014, several additional datasets have been released and many algorithms have been proposed. In this review, we critically examine the current state of VQA in terms of problem formulation, existing datasets, evaluation metrics, and algorithms. In particular, we discuss the limitations of current datasets with regard to their ability to properly train and assess VQA algorithms. We then exhaustively review existing algorithms for VQA. Finally, we discuss possible future directions for VQA and image understanding research.



from cs.AI updates on arXiv.org http://ift.tt/2cUI3xg
via IFTTT

"Helpline" Gives Charleroi Students Anonymous Way To Report Incidents

A new "helpline" is giving students in Charleroi School District the chance to report a range of incidents; KDKA's Julie Grant reports.

from Google Alert - anonymous http://ift.tt/2eHIi0G
via IFTTT

[FD] [CSS] POINTYFEATHER / tar extract pathname bypass (CVE-2016-6321)

---------------- t2'16 special vulnerability release -------------

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2016-1240 - Tomcat packaging on Debian-based distros - Local Root Privilege Escalation

I added a simple PoC video for the CVE-2016-1240 vulnerability. In the PoC I used Ubuntu 16.04 with the latest tomcat7 package (version: 7.0.68-ubuntu-0.1) installed from the default ubuntu repos which appears vulnerable still. The video poc can be found at: http://ift.tt/2eE87yK

Source: Gmail -> IFTTT-> Blogger

Anonymous Audit Report from China

Fair Wear Foundation works with brands, factories, trade unions, NGOs and sometimes governments to verify and improve workplace conditions ...

from Google Alert - anonymous http://ift.tt/2f8vViA
via IFTTT

I have a new follower on Twitter


Nick Warren
Founder & CEO @MetaSensor
Silicon Valley
https://t.co/lKdg1HAsLk
Following: 5585 - Followers: 5425

October 26, 2016 at 05:15PM via Twitter http://twitter.com/n_warren

How to pass in an anonymous function?

Now, in the http.get() call pass in an anonymous function as a callback with the parameter response. This function is the second parameter in the get ...

from Google Alert - anonymous http://ift.tt/2dLBugW
via IFTTT

LinkedIn to get Banned in Russia for not Complying with Data Localization Law

The world's largest online professional network LinkedIn could face a ban in Russia after the company has failed to comply with a Russian data localization law that compels companies to keep data on Russian users in their country. If you are not aware, LinkedIn is the only major social network which is not banned in China, because the company agreed to cooperate with the Chinese government


from The Hacker News http://ift.tt/2dKZ4dU
via IFTTT

Feinstein: Anonymous Sources Are Inexcusable

John Feinstein talks about reporting today and anonymous sources.

from Google Alert - anonymous http://ift.tt/2eRHaXy
via IFTTT

Ravens: QB Joe Flacco assesses his play entering the bye; "I'm obviously not playing well enough" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

The Hacker News launches Online Deals Store – Get Best Deals & Offers

Hey readers, guess what? The Hacker News (THN) is about to complete its 6 years as a leading Information Security Channel – attracting over 9 Million readers worldwide – and a trusted source for Hacking, Cyber Security and Infosec News for the enthusiasts, technologists & nerds. In the special occasion of this year's Anniversary, The Hacker News is excited to announce the launch of its THN


from The Hacker News http://ift.tt/2eFqGFH
via IFTTT

SAP Ideas Forum: Anonymous Extraordinaries to the Rescue

Natalie calls such people “anonymous extraordinaries.” Brilliant term, right? And at the SAP Ideas Forum I was surrounded by more than 120 of them.

from Google Alert - anonymous http://ift.tt/2dK6a2g
via IFTTT

ISS Daily Summary Report – 10/25/2016

Veg-03 Initiation: FE-3 configured and installed the Vegetable Production System (Veggie) on the Maintenance Work Area (MWA) and then installed six Small Plant Pillows to hold the ‘Outredgeous’ red romaine lettuce plants.  Ground teams plan to grow the lettuce plants for two months, with four harvests planned.  The overall goal of Veg-03 is to further demonstrate proof-of concept for the Veggie plant growth chamber and the planting pillows. Future long-duration missions into the solar system, finally culminating on Mars, will require a fresh food supply to supplement crew diets, which means growing crops in space. Previous investigations focused on improving productivity in controlled environments, but the limited quarters of the space shuttle and International Space Station made it difficult to conduct large-scale crop production tests. Veg-03 expands on previous validation tests of the new Veggie hardware, which crew members will soon use to grow cabbage, lettuce and other fresh vegetables in space. Tests determine which types of microorganisms are present in space-grown cabbage, providing baseline data for future crop-growing efforts.  Behavioral health surveys assess the impact of growing plants on crew morale and mood. Airway Monitoring Ambient and Reduced Pressure Operations: Today FE-5 and FE-6 began the measurement day of the European Space Agency (ESA) Airway Monitoring experiment. The crew used the Portable Pulmonary Function System (PPFS) to perform a series of measurements for two different protocols: the Fractional Expired Nitric Oxide (FENO) Low Nitric Oxide (NO) Protocol which determines how much NO is exhaled during respiration, and the Diffuse Capacity in Lungs Nitric Oxide (DLNO) High NO Protocol which determines how much NO is diffused in the blood, while the crew was in the US Airlock.  Airway Monitoring is the first experiment to use the US Airlock as a hypobaric facility for performing science. Utilizing the US Airlock allows for unique opportunities in the study of gravity, ambient pressure interactions, and their effect on the Human Body. This investigation studies the occurrence and indicators of airway inflammation in crewmembers, using ultra-sensitive gas analyzers to analyze exhaled air. This helps to highlight any health impacts and to maintain crewmember well-being on future human spaceflight missions, especially longer-duration missions to the Moon and Mars for example, where crewmembers will have to be more self-sufficient in highlighting and avoiding such conditions. ISS Emergency Hardware Familiarization:  The 48S crewmembers participated in a training session intended to familiarize the crew with the locations of equipment and the positions of valves used in the event of an emergency.  During the training, the crewmembers translated along the emergency egress path inspecting emergency hardware components. For any questions they will consult with specialists at Mission Control Center-Moscow (MCC-M), Mission Control Center-Houston (MCC-H), Columbus-Control Center (COL-CC), and Space Station Integration and Promotion Center for Japan Aerospace Exploration Agency (SSIPC).    Today’s Planned Activities All activities were completed unless otherwise noted. BIOPLENKA. Removal of Samples from the Thermostat, fixation of Constanta cassette No.4-2 biofilm. NEUROIMMUNITET. Saliva Sample Psychological Test (morning) KORREKTSIYA. NEUROIMMUNITET. Blood Collection. NEUROIMMUNITET. Venous blood sample processing (smear). KORREKTSIYA. NEUROIMMUNITET. Processing venous blood sample using Plasma-03 centrifuge. Insertion of Russian experiments blood samples into MELFI KORREKTSIYA. NEUROIMMUNITET. Handover to USOS for MELFI Insertion KORREKTSIYA. Closeout Ops AIRMON Power On ВКС Laptops Antivirus software checkout AIRMON preparation and First Low NO measurement MICROVIR. Removal of Cassette-M No.1-1 and No.1-2 from ТБУ-В No.04. Photography Combustion Integrated Rack Alignment Guide Installation MELFI Ice Brick Insert AIRMON Calibrations, Low NO and High NO measurements NEUROIMMUNITET. Psychological Test VEG-03 MWA Preparation Soyuz 731 Transfer Ops Central station atmosphere analysis using CSA-CP unit VEG-03 Experiment Install AIRMON High NO measurement LIOH and PFA Setup СОЖ maintenance MICROVIR. Photography of Cassetta-M No.1-1, No.1-2 upper cells. Squeezing out and photography of bottom cells Preparations for and depressurization VEG-03 MELFI Insertion #1 AIRMON Low NO measurement at low pressure COSMOCARD.  Setup. Starting 24-hr ECG Recording Tagup with specialists COSMOCARD. Photography of the Experiment Ops MICROVIR. Photography of bottom cells AIRMON Low & High measurements at reduced pressure BIOPLENKA. Removal of Samples from the Thermostat, fixation of Constanta cassette No.4-2 biofilm. NEUROIMMUNITET. Hair Samples Collection ISS Crew Adaptation AIRMON High NO measurement at reduced pressure IMS Delta File Prep MICROVIR. Photography of bottom cells INTERACTION-2. Experiment Ops Airlock repressurization Emergency Mask OBT Airway Monitoring Private Medical Conference (PMC) OBT ISS Emergency Hardware Familiarization ISS Crew Orientation MICROVIR. Photography of lower cells Start of video recording CONTENT. Experiment Ops AIRMON Power Off Space Headaches – Daily Questionnaire Private Special Conference (PSC) MICROVIR. Photography of cell condition. End of video recording NEUROIMMUNITET. Saliva Sample Psychological test (evening) NEUROIMMUNITET. End of ECG Recording. Close-out Ops, Data Downlink  Completed Task List Items JAXA Video Taking Part 8 Biomolecule Sequencer Flow Cell Retrieval Ground Activities All activities were completed unless otherwise noted. Lab MCA Full Cal Three-Day Look Ahead: Wednesday, 10/26: Soyuz Drill, Neuromapping, Dosetrack, Meteor, JAXA EPO Thursday, 10/27: Airway Monitoring, Handover Friday, 10/28: Cygnus Cargo Transfer, 47S Prepack, Change of Command  QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Idle Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Shutdown Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up

from ISS On-Orbit Status Report http://ift.tt/2eRmaSe
via IFTTT

Hacking Firmware from Mobile Phone Hacking Company Leaked Online

The Israeli firm Cellebrite, which provides digital forensics tools and software to help law enforcement access mobile phones in investigations, has had its firmware and software leaked online. Yes, you heard that right. Cellebrite's most sensitive in-house capabilities have been made public by one of its products' resellers, who is now distributing copies of Cellebrite's firmware and


from The Hacker News http://ift.tt/2feDkw8
via IFTTT

I have a new follower on Twitter


Dan Twing
President and COO at EMA Research. Early adopter of tech things, lover of consumer electronics, skiing, woodworking, blues music and billiards.

http://t.co/Y01siy4iJ1
Following: 9093 - Followers: 11519

October 26, 2016 at 03:45AM via Twitter http://twitter.com/dtwing

Anonymous user 507ec9

Name, Anonymous user 507ec9. User since, October 25, 2016. Number of add-ons developed, 1 theme. Average rating of developer's add-ons, Not ...

from Google Alert - anonymous http://ift.tt/2dV9H0Q
via IFTTT

[FD] New VMSA-2016-0017 - VMware product updates address multiple information disclosure issues



Source: Gmail -> IFTTT-> Blogger

STEREO in stereo: Spring 2007 at 171 Angstroms

With the 10th Anniversary of the launch of the STEREO mission, two spacecraft orbiting the Sun to study space weather from multiple vantage points, it seemed a good time to revisit some older STEREO visualizations and update them to the newer display technologies. For each movie, we have combined 1K and 2K images from the STEREO spacecraft to maximize the continuity. The images between left and right eye have a 10 arcsecond offset from the image center. This has worked well in our stereo experiments for a variety of display sizes from 18 to 80 inches. Note on making color stereo movies: Left and Right eye frame sequenences under this animation are available for those who have the technology and want to encode color stereo movies for the variety of display technologies available. A word of caution. In generating these products, there was the goal of making a complete stereo product but also provide as complete a data run for each spacecraft. Many frames for one eye do not necessarily have a matching stereo frame for the other. If there are matching frame numbers between the left and right eye, they should make the appropriate stereo pair, but this screening was done manually and errors may exist. Please notify us if you encounter them.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2etyzh0
via IFTTT

STEREO in stereo: Spring 2007 at 195 Angstroms

With the 10th Anniversary of the launch of the STEREO mission, two spacecraft orbiting the Sun to study space weather from multiple vantage points, it seemed a good time to revisit some older STEREO visualizations and update them to the newer display technologies. For each movie, we have combined 1K and 2K images from the STEREO spacecraft to maximize the continuity. The images between left and right eye have a 10 arcsecond offset from the image center. This has worked well in our stereo experiments for a variety of display sizes from 18 to 80 inches. Note on making color stereo movies: Left and Right eye frame sequenences under this animation are available for those who have the technology and want to encode color stereo movies for the variety of display technologies available. A word of caution. In generating these products, there was the goal of making a complete stereo product but also provide as complete a data run for each spacecraft. Many frames for one eye do not necessarily have a matching stereo frame for the other. If there are matching frame numbers between the left and right eye, they should make the appropriate stereo pair, but this screening was done manually and errors may exist. Please notify us if you encounter them.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2eQNhwJ
via IFTTT

STEREO in stereo: Spring 2007 at 284 Angstroms

With the 10th Anniversary of the launch of the STEREO mission, two spacecraft orbiting the Sun to study space weather from multiple vantage points, it seemed a good time to revisit some older STEREO visualizations and update them to the newer display technologies. For each movie, we have combined 1K and 2K images from the STEREO spacecraft to maximize the continuity. The images between left and right eye have a 10 arcsecond offset from the image center. This has worked well in our stereo experiments for a variety of display sizes from 18 to 80 inches. Note on making color stereo movies: Left and Right eye frame sequenences under this animation are available for those who have the technology and want to encode color stereo movies for the variety of display technologies available. A word of caution. In generating these products, there was the goal of making a complete stereo product but also provide as complete a data run for each spacecraft. Many frames for one eye do not necessarily have a matching stereo frame for the other. If there are matching frame numbers between the left and right eye, they should make the appropriate stereo pair, but this screening was done manually and errors may exist. Please notify us if you encounter them.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2etwr8N
via IFTTT

STEREO in stereo: Spring 2007 at 304 Angstroms

With the 10th Anniversary of the launch of the STEREO mission, two spacecraft orbiting the Sun to study space weather from multiple vantage points, it seemed a good time to revisit some older STEREO visualizations and update them to the newer display technologies. For each movie, we have combined 1K and 2K images from the STEREO spacecraft to maximize the continuity. The images between left and right eye have a 10 arcsecond offset from the image center. This has worked well in our stereo experiments for a variety of display sizes from 18 to 80 inches. Note on making color stereo movies: Left and Right eye frame sequenences under this animation are available for those who have the technology and want to encode color stereo movies for the variety of display technologies available. A word of caution. In generating these products, there was the goal of making a complete stereo product but also provide as complete a data run for each spacecraft. Many frames for one eye do not necessarily have a matching stereo frame for the other. If there are matching frame numbers between the left and right eye, they should make the appropriate stereo pair, but this screening was done manually and errors may exist. Please notify us if you encounter them.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2eQMQCJ
via IFTTT

Clouds Near Jupiters South Pole from Juno


What's happening near the south pole of Jupiter? Recent images sent back by NASA's robotic Juno spacecraft are showing an interesting conglomeration of swirling clouds and what appear to be white ovals. Juno arrived at Jupiter in July and is being placed into a wide, looping orbit that will bring it near the gas giant -- and over its poles -- about twice a month. The featured image is a composite taken by JunoCam and post-processed by a digitally savvy citizen scientist. White ovals have been observed elsewhere on Jupiter and are thought to be giant storm systems. They have been observed to last for years, while typically showing Category 5 wind speeds of around 350 kilometers per hour. Unlike Earthly cyclones and hurricanes where high winds circle regions of low pressure, white ovals on Jupiter show rotational directions indicating that they are anticylones -- vortices centered on high pressure regions. Juno will continue to orbit Jupiter over thirty more times while recording optical, spectral, and gravitational data meant to help determine Jupiter's structure and evolution. via NASA http://ift.tt/2eHnAz7

Tuesday, October 25, 2016

1st Timers Encouraged.

Would you like to try while remaining anonymous? 1st timers: No face images produced or taken. 1st timers: Try your hand at it, and see if it's a...

from Google Alert - anonymous http://ift.tt/2f5Zz81
via IFTTT

Surprisal-Driven Zoneout. (arXiv:1610.07675v1 [cs.LG])

We propose a novel method of regularization for recurrent neural networks called suprisal-driven zoneout. In this method, states \textit{zoneout} (maintain their previous value rather than updating), when the \textit{suprisal} (discrepancy between the last state's prediction and target) is small. Thus regularization is adaptive and input-driven on a per-neuron basis. We demonstrate the effectiveness of this idea by achieving state-of-the-art bits per character of 1.32 on the Hutter Prize Wikipedia dataset, significantly reducing the gap to the best known highly-engineered compression methods.



from cs.AI updates on arXiv.org http://ift.tt/2dGBDab
via IFTTT

Knowledge will Propel Machine Understanding of Content: Extrapolating from Current Examples. (arXiv:1610.07708v1 [cs.AI])

Machine Learning has been a big success story during the AI resurgence. One particular stand out success relates to unsupervised learning from a massive amount of data, albeit much of it relates to one modality/type of data at a time. In spite of early assertions of the unreasonable effectiveness of data, there is increasing recognition of utilizing knowledge whenever it is available or can be created purposefully. In this paper, we focus on discussing the indispensable role of knowledge for deeper understanding of complex text and multimodal data in situations where (i) large amounts of training data (labeled/unlabeled) are not available or labor intensive to create, (ii) the objects (particularly text) to be recognized are complex (i.e., beyond simple entity-person/location/organization names), such as implicit entities and highly subjective content, and (iii) applications need to use complementary or related data in multiple modalities/media. What brings us to the cusp of rapid progress is our ability to (a) create knowledge, varying from comprehensive or cross domain to domain or application specific, and (b) carefully exploit the knowledge to further empower or extend the applications of ML/NLP techniques. Using the early results in several diverse situations - both in data types and applications - we seek to foretell unprecedented progress in our ability for deeper understanding and exploitation of multimodal data.



from cs.AI updates on arXiv.org http://ift.tt/2eCZOpZ
via IFTTT

Intelligence in Artificial Intelligence. (arXiv:1610.07862v1 [cs.AI])

The elusive quest for intelligence in artificial intelligence prompts us to consider that instituting human-level intelligence in systems may be (still) in the realm of utopia. In about a quarter century, we have witnessed the winter of AI (1990) being transformed and transported to the zenith of tabloid fodder about AI (2015). The discussion at hand is about the elements that constitute the canonical idea of intelligence. The delivery of intelligence as a pay-per-use-service, popping out of an app or from a shrink-wrapped software defined point solution, is in contrast to the bio-inspired view of intelligence as an outcome, perhaps formed from a tapestry of events, cross-pollinated by instances, each with its own microcosm of experiences and learning, which may not be discrete all-or-none functions but continuous, over space and time. The enterprise world may not require, aspire or desire such an engaged solution to improve its services for enabling digital transformation through the deployment of digital twins, for example. One might ask whether the "work-flow on steroids" version of decision support may suffice for intelligence? Are we harking back to the era of rule based expert systems? The image conjured by the publicity machines offers deep solutions with human-level AI and preposterous claims about capturing the "brain in a box" by 2020. Even emulating insects may be difficult in terms of real progress. Perhaps we can try to focus on worms (Caenorhabditis elegans) which may be better suited for what business needs to quench its thirst for so-called intelligence in AI.



from cs.AI updates on arXiv.org http://ift.tt/2eJs0p8
via IFTTT

Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures. (arXiv:1610.07997v1 [cs.AI])

In this work, we present and analyze reported failures of artificially intelligent systems and extrapolate our analysis to future AIs. We suggest that both the frequency and the seriousness of future AI failures will steadily increase. AI Safety can be improved based on ideas developed by cybersecurity experts. For narrow AIs safety failures are at the same, moderate, level of criticality as in cybersecurity, however for general AI, failures have a fundamentally different impact. A single failure of a superintelligent system may cause a catastrophic event without a chance for recovery. The goal of cybersecurity is to reduce the number of successful attacks on the system; the goal of AI Safety is to make sure zero attacks succeed in bypassing the safety mechanisms. Unfortunately, such a level of performance is unachievable. Every security system will eventually fail; there is no such thing as a 100% secure system.



from cs.AI updates on arXiv.org http://ift.tt/2eCWhYK
via IFTTT

Backdoors into Heterogeneous Classes of SAT and CSP. (arXiv:1509.05725v2 [cs.AI] UPDATED)

In this paper we extend the classical notion of strong and weak backdoor sets for SAT and CSP by allowing that different instantiations of the backdoor variables result in instances that belong to different base classes; the union of the base classes forms a heterogeneous base class. Backdoor sets to heterogeneous base classes can be much smaller than backdoor sets to homogeneous ones, hence they are much more desirable but possibly harder to find. We draw a detailed complexity landscape for the problem of detecting strong and weak backdoor sets into heterogeneous base classes for SAT and CSP.



from cs.AI updates on arXiv.org http://ift.tt/1LH8wbX
via IFTTT

Recurrent Instance Segmentation. (arXiv:1511.08250v3 [cs.CV] UPDATED)

Instance segmentation is the problem of detecting and delineating each distinct object of interest appearing in an image. Current instance segmentation approaches consist of ensembles of modules that are trained independently of each other, thus missing opportunities for joint learning. Here we propose a new instance segmentation paradigm consisting in an end-to-end method that learns how to segment instances sequentially. The model is based on a recurrent neural network that sequentially finds objects and their segmentations one at a time. This net is provided with a spatial memory that keeps track of what pixels have been explained and allows occlusion handling. In order to train the model we designed a principled loss function that accurately represents the properties of the instance segmentation problem. In the experiments carried out, we found that our method outperforms recent approaches on multiple person segmentation, and all state of the art approaches on the Plant Phenotyping dataset for leaf counting.



from cs.AI updates on arXiv.org http://ift.tt/1TfqNCg
via IFTTT

Quadripolar Relational Model: a framework for the description of borderline and narcissistic personality disorders. (arXiv:1512.05875v4 [q-bio.NC] UPDATED)

Borderline personality disorder and narcissistic personality disorder are important nosographic entities and have been subject of intensive investigations. The currently prevailing psychodynamic theory for mental disorders is based on the repertoire of defense mechanisms employed. Another line of research is concerned with the study of psychological traumas and dissociation as a defensive response. Both theories can be used to shed light on some aspects of pathological mental functioning, and have many points of contact. This work merges these two psychological theories, and builds a model of mental function in a relational context called Quadripolar Relational Model. The model, which is enriched with ideas borrowed from the field of computer science, leads to a new therapeutic proposal for psychological traumas and personality disorders.



from cs.AI updates on arXiv.org http://ift.tt/1QAee7l
via IFTTT

Directed expected utility networks. (arXiv:1608.00810v2 [cs.AI] UPDATED)

A variety of statistical graphical models have been defined to represent the conditional independences underlying a random vector of interest. Similarly, many different graphs embedding various types of preferential independences, as for example conditional utility independence and generalized additive independence, have more recently started to appear. In this paper we define a new graphical model, called a directed expected utility network, whose edges depict both probabilistic and utility conditional independences. These embed a very flexible class of utility models, much larger than those usually conceived in standard influence diagrams. Our graphical representation, and various transformations of the original graph into a tree structure, are then used to guide fast routines for the computation of a decision problem's expected utilities. We show that our routines generalize those usually utilized in standard influence diagrams' evaluations under much more restrictive conditions. We then proceed with the construction of a directed expected utility network to support decision makers in the domain of household food security.



from cs.AI updates on arXiv.org http://ift.tt/2awhr8q
via IFTTT

Knowledge Semantic Representation: A Generative Model for Interpretable Knowledge Graph Embedding. (arXiv:1608.07685v2 [cs.LG] UPDATED)

Knowledge representation is an important, long-history topic in AI, and there have been a large amount of work for knowledge graph embedding which projects symbolic entities and relations into low-dimensional, real-valued vector space. However, most embedding methods merely concentrate on data fitting and ignore the explicit semantic expression, leading to uninterpretable representations. Thus, traditional embedding methods have limited potentials for many applications such as question answering, and entity classification. To this end, this paper proposes a semantic representation method for knowledge graph \textbf{(KSR)}, which imposes a two-level hierarchical generative process that globally extracts many aspects and then locally assigns a specific category in each aspect for every triple. Since both aspects and categories are semantics-relevant, the collection of categories in each aspect is treated as the semantic representation of this triple. Extensive experiments justify our model outperforms other state-of-the-art baselines substantially.



from cs.AI updates on arXiv.org http://ift.tt/2bA0s2h
via IFTTT

Verifier Theory and Unverifiability. (arXiv:1609.00331v3 [cs.AI] UPDATED)

Despite significant developments in Proof Theory, surprisingly little attention has been devoted to the concept of proof verifier. In particular, the mathematical community may be interested in studying different types of proof verifiers (people, programs, oracles, communities, superintelligences) as mathematical objects. Such an effort could reveal their properties, their powers and limitations (particularly in human mathematicians), minimum and maximum complexity, as well as self-verification and self-reference issues. We propose an initial classification system for verifiers and provide some rudimentary analysis of solved and open problems in this important domain. Our main contribution is a formal introduction of the notion of unverifiability, for which the paper could serve as a general citation in domains of theorem proving, as well as software and AI verification.



from cs.AI updates on arXiv.org http://ift.tt/2bNpI54
via IFTTT

Pure evil


via Instagram http://ift.tt/2eCUfHX

Anonymous post possible?

Log In · Support » Plugins and Hacks » Anonymous post possible? ... Hey just wondering if there's any way to allow for a “Post anonymously” option.

from Google Alert - anonymous http://ift.tt/2fcZizC
via IFTTT

Ravens LB Terrell Suggs practice Tuesday, just nine days after tearing his biceps (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Andrea Stockton
#Internet #Marketing Executive. #Twitter #Instagram #Facebook #Social #Media #Marketing
Toronto, Ontario

Following: 2169 - Followers: 2761

October 25, 2016 at 02:24PM via Twitter http://twitter.com/AndreaStockton6

[FD] AST-2016-007: UPDATE

On September 8, the Asterisk development team released the AST-2016-007 security advisory. The security advisory involved an RTP resource exhaustion that could be targeted due to a flaw in the "allowoverlap" option of chan_sip. Due to new information presented to us by Walter Doekes, we have made the following updates to the advisory. In the "Description" section, the following text has been added: UPDATE (20 October, 2016): It has been brought to our attention by Walter Doekes that this same leak can be exploited without the use of the overlap dialing feature. Sending SIP requests in a specific sequence outside the norm could also cause the leak of RTP resources. By sending an in-dialog INVITE after receiving a 404 response (but before sending an ACK), an attacker could cause the same leak to occur." In the "Resolution" section, the following text has been added: UPDATE (20 October, 2016): Because of the updated information from Walter Doekes, disabling the allowoverlap option is not enough to solve this issue. Users of Asterisk MUST upgrade to one of the fixed versions listed below. The updated advisory can be found at http://ift.tt/2ce9nH4 and http://ift.tt/2dTguby

Source: Gmail -> IFTTT-> Blogger

I have a new follower on Twitter


Riser Digital
Riser Digital is a results-driven #digitalmarketing agency for small businesses & startups, with #strategy, #creative, & #marketing expertise.
Everywhere!
https://t.co/mrVng1rr5S
Following: 4690 - Followers: 5234

October 25, 2016 at 01:59PM via Twitter http://twitter.com/riserdigital

I have a new follower on Twitter


Debra Mitchel



Following: 1804 - Followers: 1412

October 25, 2016 at 01:59PM via Twitter http://twitter.com/DebraDebramitch

Anonymous Human Being

Tinkercad user Anonymous Human Being. 404 Error (Description Not Found)

from Google Alert - anonymous http://ift.tt/2eraXMd
via IFTTT

Ravens (3-4) down 3 spots to No. 21 in Week 8 NFL Power Rankings; on BYE this week, host Steelers on Nov. 6 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Joomla Joomla! Two Critical Flaws Discovered — Update to Protect Your Site

Joomla – the world's second popular open source Content Management System (CMS) software packages, has just released the latest version of its CMS, which includes patches for two critical security vulnerabilities and a bug fix. <!-- adsense --> The two critical flaws, both exist in the Joomla Core functionalities, include Account Creation Vulnerability (CVE-2016-8870) and Elevated Privileges


from The Hacker News http://ift.tt/2eFTGvG
via IFTTT

Missing dependency breaks anonymous users validation for custom forms

When using a custom build form with clientside validation enabled, anonymous users will receive a js error, which breaks the clientside validation.

from Google Alert - anonymous http://ift.tt/2dSyhQ7
via IFTTT

Candy Dish -for sale


via Instagram http://ift.tt/2eCz1Hv

Support and Site Caps: Good News

http://ift.tt/fvZjIzanonymous/0f0ffec298b1eecb887cecfc6364ed54 ... http://ift.tt/fvZjIzanonymous/0f0ffec298b1eecb887cecfc6364ed54 ...

from Google Alert - anonymous http://ift.tt/2eNjFiy
via IFTTT

Anonymous, Authenticated summary should be displayed in roles list page

After saving summary for Anonymous, Authenticated roles in admin/config/people/role_help page, it should be displayed in roles list page ...

from Google Alert - anonymous http://ift.tt/2eNiAqZ
via IFTTT

ISS Daily Summary Report – 10/24/2016

Bigelow Expandable Activity Module (BEAM) Ingress and Sampling: FE-6 stowed the Advanced Resistive Exercise Device (ARED) then opened Node3 Aft hatch to ingress the BEAM.  Once inside, the crew collected Microbial Air Sampler (MAS) and Surface Sample Kit (SSK) microbial and surface samples and deployed the Radiation Area Monitors (RAMs) delivered on 48Soyuz (48S).  The RAMs will remain in BEAM through the end of Increment 50, when they will return for analysis on 48S.  The SSK and MAS samples will return on 47S for ground analysis.  Following sample collection, FE-6 closed the hatch and returned ARED to its nominal configuration.  BEAM is an experimental expandable capsule that berths with the ISS. After docking, BEAM inflates to roughly 13 feet long and 10.5 feet in diameter to provide a habitable volume where a crew member can enter. Airway Monitoring: FE-5 changed out the Low and High Nitric Oxide (NO) Analyzer sensors, then proceeded with configuring the cameras and experiment hardware for the reduced pressure data collection session tomorrow.  The primary goal of the Airway Monitoring experiment is to determine how gravity and microgravity influence the turnover of Nitric Oxide (NO) in the lungs.  During future manned missions to the Moon and to Mars, airway inflammation due to toxic dust inhalation is a risk factor. Since dust may cause airway inflammation and since such inflammation can be monitored by exhaled NO (Nitric Oxide) analysis, the present study is highly relevant for astronaut health in future space programs. Radiation Area Monitor (RAM) Deploy:  The crew installed 17 Area Dosimeter throughout the ISS to measure space radiation. They took photographs of each Area Dosimeter for ground verification purposes. FLame EXtinguishment (FLEX)-2 Operations: FE-3 removed the Combustion Integration Rack (CIR) alignment guides to enable ground teams to initiate the FLEX-2 experiment.  Following the troubleshooting and checkout that occurred last week, ground teams plan to run the experiment using decane fuel for four weeks.      The Flame Extinguishment – 2 (FLEX-2) experiment is the second experiment to fly on the ISS which uses small droplets of fuel to study the special spherical characteristics of burning fuel droplets in space. The FLEX-2 experiment studies how quickly fuel burns, the conditions required for soot to form, and how mixtures of fuels evaporate before burning. Understanding these processes could lead to the production of a safer spacecraft as well as increased fuel efficiency for engines using liquid fuel on Earth.  Cygnus Ingress:  Cygnus ingress was scheduled to occur on Thursday, October 27th.  However, yesterday the crew was able to get ahead with the Cygnus activities and they removed the Controller Panel Assemblies (CPAs) and opened the Cygnus hatch. Urine Processor Assembly (UPA) Pressure Control and Pump Assembly (PCPA) High Pressure Anomaly: During a UPA process cycle yesterday, two pressure sensors inside the PCPA showed a rise in pressure values. Ground Controllers pre-emptively took the UPA to standby, and then to shutdown to avoid having the Fault Detection Isolation and Recovery (FDIR) take action. Currently the UPA is in a stable configuration. Initial review of data by the UPA specialist indicates that the PCPA may have failed. There are two spare PCPAs on orbit and a third launching on OA-7. The Waste and Hygiene Compartment (WHC) will be configured from supplying UPA to internal EDV.  Today’s Planned Activities All activities were completed unless otherwise noted. KONYUGATSIYA. Mode [ТБУ-в No.2] thermostat to +29°С Close SM window covers ##6,8,9,12,13,14 Refer to comment 6 ISS CREW/SSIPC Management CONFERENCE USOS Window Shutter Close Water Recovery Management (WRM) Condensate Pumping Initiation KONYUGATSIYA. Retrieve REKOMB-K from thermostat (+4 deg C) and install into thermostat @+29 deg C. Specialist conference KORREKTSIYA. Logging the liquid and food (medicine) intake parameters Handover of Increment 49/50 Crew PRODUTSENT. Retrieve from [ТБУ-в №04] thermostat (+4 deg C) and install into [ТБУ-В №02] thermostat (+29 deg C). Soyuz 731 [АСУ] activation Fine Motor Skills Experiment Test – Subject PRODUTSENT. Take pictures of BIOEKOLOGIYA box location inside [ТБУ-в №02] thermostat Soyuz-731 pre-undock [СУДН] (motion control system) #2 test. Deinstall [СА1,2] TV cameras and [СГ2-14В] lights in Soyuz 732 [СА] (prepare deinstalled 4053702006 and 4053702007 TV cameras for return on Soyuz 731. [СГ2-14В] lights are to be returned on Soyuz 731. Update the IMS) KONYUGATSIYA. Process activation, insertion into ТБУ-В @+29 deg C. remove Items in Front of N3A for Hatch Access Photo/TV N3/BEAM Camcorder Setup XF305 Camcorder Setup Switch SM Kurs-P cables from MRM2 [АФУ] DC1 [АФУ] – handover Switch SM Kurs-P cables from MRM2 [АФУ] DC1 [АФУ] MATRYOSHKA-R. Transfer [СПД] passive assemblies from Soyuz 732 ARED Platform Fold JAXA PCG Canister Bag CBEF Micro-G Installation BEAM Ingress MATRYOSHKA-R. Transfer [ФАНТОМ] set from Soyuz 732 Fine Motor Skills Experiment Test – Subject LОДНТ training session (PRELIMINARY). [АК-1М] air sampling during BEAM entry Deploy PS-120 JUNCTION BOX into Air Lock to support Airway Monitoring activity. MATRYOSHKA-R. Outfit [ФАНТОМ] set with detectors, transfer and install in MRM1. Specialist conference when required Radiation Area Monitors (RAM) Deployment ОДНТ training sessions (PRELIMINARY) – assistance Photo TV Airway Monitor A/L Video Setup Sensor Changeout Microbial Air Sampler (MAS) Kit Sample Collection Total Organic Carbon Analyzer (TOCA) Water Recovery System (WRS) Sample Analysis VEG Series Experiment On-Board Training. XF305 Camcorder Setup Intracranial Pressure & Visual Impairment (IPVI) Face Photo-taking Surface Sample Kit (SSK) Collection/Incubation VEGGIE Software On-Board Training Airway Monitoring Setup MATRYOSHKA-R. Photography Prepare items for return on Soyuz 731 Combustion Integrated Rack Alignment Guide Removal BEAM Cleanup and Egress KONYUGATSIYA. Activation completion, deployment in thermostat @29 deg C. Specialist conference KONYUGATSIYA. Photography during deactivation. Specialist conference Auxiliary Laptop Computer System Virus Definition File Update CARDIOVECTOR. Science ops run. Specialist conference ARED Platform Unfold Back to Nominal Position CARDIOVECTOR. Photography during the science operation Return Items Back to N3A Location That Were Removed for BEAM Ingress Gas analyzer deactivation in Soyuz 732 Meteor GFCI Reset Equipment preparation for PAO Crew preparation for PAO Intracranial Pressure & Visual Impairment (IPVI) Face Photo-taking PAO with All-Russia Space Educational Month in Orlyonok camp (Ku+S-band) KONYUGATSIYA. Retrieve from thermostat (+29 deg C) […]

from ISS On-Orbit Status Report http://ift.tt/2ejYmGU
via IFTTT

I have a new follower on Twitter


Tammo Mueller
Entrepreneur, Technologist, Founder & CTO Scientific.ly - 'Life has no rehearsals, only performances.'
NYC
http://t.co/28wFRtVnqj
Following: 1288 - Followers: 1432

October 25, 2016 at 05:59AM via Twitter http://twitter.com/tammomueller

WhatsApp Video Calling is Now Available for Android – Download Beta Version Now!

WhatsApp is, no doubt, the largest end-to-end encrypted messaging network that allows over billion of its users to send messages, photos, videos, voice messages, documents, and calls that are secure from falling into the wrong hands. And now it seems like WhatsApp is rolling out a much-awaited feature for the new beta versions of its Android app: Video Calling. New beta version 2.16.318 of


from The Hacker News http://ift.tt/2ejiVDF
via IFTTT

Warning! Your iPhone Can Get Hacked Just by Opening a JPEG Image, PDF or Font File

What's worse than knowing that innocent looking JPEGs, PDFs and font files can hijack your iPhone, iPad, and iPod. Yes, attackers can take over your vulnerable Apple's iOS device remotely – all they have to do is trick you to view a maliciously-crafted JPEG graphic or PDF file through a website or an email, which could allow them to execute malicious code on your system. That's a terrible


from The Hacker News http://ift.tt/2eAqGqu
via IFTTT

facebook-anonymous-publisher/graph-api

facebook-anonymous-publisher/graph-api. PHP Graph Api. github.com/Facebook-Anonymous-Publisher/graph-api · Source · Issues · Installs: 1.

from Google Alert - anonymous http://ift.tt/2eq8csg
via IFTTT

Anonymous v Hillary

https://www.youtube.com/watch?v=wK2K5v5bm0Q.

from Google Alert - anonymous http://ift.tt/2f2KUum
via IFTTT

Monday, October 24, 2016

I have a new follower on Twitter


Alexander Jones
☎️ restoring failed initiatives + ⛱ founder @PassionOurGuide +💡 @BiviHQ + 🎯 https://t.co/V0Dxw7WhqI + 📚 writing https://t.co/ShsAzuUZUd + UX design + startups
Chicago
https://t.co/3Omf4hq5CO
Following: 7767 - Followers: 10497

October 24, 2016 at 11:44PM via Twitter http://twitter.com/MrJonesEdition