Latest YouTube Video

Saturday, March 11, 2017

I have a new follower on Twitter


Pulseway
Making IT heroes. #RMMsoftware
Dublin, Ireland
http://t.co/QaKeoEgsBq
Following: 1475 - Followers: 4789

March 11, 2017 at 08:49PM via Twitter http://twitter.com/pulsewayapp

NFL Free Agency: DL Lawrence Guy agrees to 4-year contract with Patriots - NFL Network; started career-high 10 games last season with Ravens (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Rosie Cleveland
Are you active on Twitter? Do you want get more Twitter followers? Click here https://t.co/bIytZO3XJx
USA

Following: 2766 - Followers: 38

March 11, 2017 at 11:54AM via Twitter http://twitter.com/naotatsufukunag

Get 8-Course Online Hacking Training Package For Just $39

Due to recent highly publicized hacks and high-profile data breaches, ethical hackers are in huge demand and being hired by almost every industry to help them keep their networks protected. So, it comes as no surprise that ethical hackers, penetration testers, and information security analysts are one of the most well-paid employees in the IT workforce today. There's a growing number of jobs


from The Hacker News http://ift.tt/2mdvQsQ
via IFTTT

I have a new follower on Twitter


nativeMsg
A conversation and bot messaging platform reaching your customer where they communicate.
Chicago, IL
https://t.co/8RZYbkyXpX
Following: 3928 - Followers: 1244

March 11, 2017 at 07:14AM via Twitter http://twitter.com/TheNativeMsg

Beware! Pre-Installed Android Malware Found On 36 High-end Smartphones

Bought a brand new Android Smartphone? Do not expect it to be a clean slate. At least 36 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi, Asus, Nexus, Oppo, and Lenovo, which are being distributed by two unidentified companies have been found pre-loaded with malware programs. These malware infected devices were identified after a Check


from The Hacker News http://ift.tt/2mbhdWg
via IFTTT

Friday, March 10, 2017

WBC Highlight: Adam Jones delivers walk-off single in bottom of 10th inning to lead USA past Colombia 3-2 in their opener (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous has now removed more than 10000 child porn sites from the internet

Anonymous has now removed more than 10,000 child porn sites from the internet. share icon 127 Shares. Trine Jensen-Burke By Trine Jensen-Burke ...

from Google Alert - anonymous http://ift.tt/2n94M2d
via IFTTT

NFL Free Agency: TE Dennis Pitta reworked final 2 years of contract to stay with Ravens - NFL Network; led team with 86 catches last season (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[FD] KL-001-2017-004 : WatchGuard XTMv User Management Cross-Site Request Forgery

[FD] DAVOSET v.1.3

Hello participants of Mailing List. Since announcement of DAVOSET in 2010 and after making its public release in 2013, I've made next update of the software. At 9th of March DAVOSET v.1.3 was released - DDoS attacks via other sites execution tool (http://ift.tt/1mQ7xNp). On the anniversary of cyberwar (http://ift.tt/2nd9sB8). Video demonstration of DAVOSET: http://www.youtube.com/watch?v=RKi35-f346I GitHub: http://ift.tt/1H884q7 Download DAVOSET v.1.3: http://ift.tt/2ms0Xlo In new version there were extended support of SSRF and added XXE vulnerability in SAP NetWeaver AS. Added new services into full list of zombies and removed non-working services from full list of zombies. In total there are 170 zombie-services in the list. Best wishes & regards, MustLive Administrator of Websecurity web site http://ift.tt/1H884q9

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2017-6550: Kinsey Infor-Lawson - Multiple SQL Injections

Summary: Kinsey's Infor-Lawson application (formerly ESBUS) is vulnerable to SQL injection in at least two parameters:

Source: Gmail -> IFTTT-> Blogger

Ravens inform S Lardarius Webb they are releasing him; move frees up $5.5 million in cap room (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 3/09/2017

Fluid Shifts Chibis Measurements, Day 1: The 48S crew member performed the first of two days of operations in the Russian Segment conducting the Return minus 45 day (R-45) Fluid Shifts operations. The subject donned the Lower Body Negative Pressure (LBNP/Chibis) device while the operator, with ground support in Moscow, assisted in the medical monitoring. Additionally, while the subject was in the LBNP and experiencing the negative pressure (pulling the fluid feetward), the Crew Medical Officer performed Cerebral and Cochlear Fluid Pressure (CCFP) and Ultrasound measurements. Prior to ultrasound measurements, the ISS was unable to lock onto Tracking and Data Relay Satellite System-275 (TDRSS-275) resulting in a delay to data collections. Teams estimate that 80% of required images were collected due to the communication issues and the Principle Investigators are determining if the remaining 20% needs to be collected. Fluid Shifts is a joint NASA-Russian experiment that investigates the causes of severe and lasting physical changes to astronauts’ eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage. JEM Airlock (JEMAL) Operations: The crew repressed the JEMAL, performed a leak check, then removed the NanoRack Cubesat Deployer (NRCSD) from the Multi-Purpose Experiment Platform (MPEP). The crew then installed the Handhold Experiment Platform (HXP) on the MPEP and the JEMAL was depressed in advance of the return of Exposed Experiment Handhold Attachment Mechanism (ExHAM)-1 later this increment. The NanoRack deployer will return on SpX-10 for refurbishment and reflight.  Manufacturing Device: Following a ground commanded print, the crew removed, photographed, labeled and stowed a 3 Dimensional (3D) printed item.  They then cleaned the extruder print nozzle to prepare for a second print.  The Manufacturing Device -Additive Manufacturing Facility (AMF) enables the production of components on the ISS for both NASA and commercial objectives. Parts, entire experiments, and tools can be created on demand utilizing the AMF that is installed into an Express Rack locker location. The AMF is capable of producing parts out of a wide variety of thermopolymers including engineered plastics.  Microgravity Science Laboratory (MSL) Reboot: Overnight, the MSL facility experienced a reboot and went into safe mode as designed but further processing of the current Solidification along an Eutectic Path in Ternary Alloys (SETA) cartridge will not be possible.  The SETA cartridge had processed 9 out of the 92 millimeters long sample in the solidification phase of its run and cannot be re-processed after reaching this point.  The MSL team commanded a controlled cooldown of the facility per standard procedures. The facility reboot is something that has been seen in the past, and ground teams are evaluating further steps. There are currently 2 remaining cartridges on-board for processing in MSL. Pressurized Mating Adapter (PMA)3 Depressurization: The crew used the Manual Pressure Equalization Valve (MPEV) Internal Sampling Adapter (ISA), Vacuum Access Jumper (VAJ), Multimeter and ISA Scopemeter Pressure Probe to depress PMA3. The initial 30 minute gross leak checked passed and an eight day fine leak check is in progress. Following these activities all items that were temp stowed to access PMA3 were re-stowed in the Node 3 Endcone. Orbital 7 (OA-7) On-board Training (OBT): In preparation for OA-7 berth, currently planned for March 23, the USOS crew completed this OBT with support from ground teams. The crew reviewed capture procedure, mission profile overview, rendezvous crew procedures and interfaces for monitoring/commanding Cygnus. They also practiced a 30 meter approach and 2 Capture Point hold runs.  Mobile Servicing System (MSS) Operations:  Overnight, Robotics Ground Controllers installed the Robotic Refueling Mission (RRM) Payload on the Enhanced ORU Temporary Platform (EOTP).  The SPDM then released the payload and the SSRMS with the SPDM were maneuvered to a park position.  Materials ISS Experiment (MISSE) removal from ELC is planned Friday evening. MSS performance was nominal. Today’s Planned Activities All activities were completed unless otherwise noted. ENERGY Diet Log of Breakfast Fluid Shifts Ultrasound Service Module Power On Preparation JEM Airlock Press Dose Tracker Data Entry Subject Energy Urine Sample Collection ENERGY Water Sample СОЖ maintenance JEM Airlock Leak Check Manufacturing Device Print Removal, Clean and Stow Energy Urine Sample Collection Meteor Hard Drive Swapout FLUID SHIFTS. Chibis Setup Regenerative Environmental Control and Life Support System (RGN) Wastewater Storage Tank Assembly (WSTA) Fill ASEPTIC. Dismantling Glovebox-S Hardware S/N 02. USB Jumpdrive Return and PPS1 Reconfiguration Fluid Shifts Ultrasound Service Module Scan – Operator FLUID SHIFTS. Ultrasound Scan in SM, Subject JEM Airlock Slide Table (ST) Extension to JPM Side NanoRacks CubeSat Deployer Removal from the MPEP FLUID SHIFTS. Chibis Closeout Ops EML Gas Valves Closing Fluid Shifts Ultrasound Service Module Stow Fluid Shifts HRF PC CCFP Service Module Setup Installation of water tank into Orlan-MKC No.4. Refill configuration setup Refill Orlan-MKC No.4 water system. Fluid Shifts Ultrasound Hardware Transfer Handhold Exp Platform Adapter installation Photography of Plume Impingement and Deposit Monitoring Unit (БКДО) position on MRM2 through SM window No.13, – Preparation Refill of water tank in Orlan-MKC No.4 JEM Airlock Slide Table (ST) Retraction from JPM Side Photography of Plume Impingement and Deposit Monitoring Unit (БКДО) position on MRM2 through SM window No.13 Urine Processing Assembly (UPA) Separator Plumbing Assembly (SPA) Contingency Water Container-Iodine (CWC-I) Connection Photography of Plume Impingement and Deposit Monitoring Unit (БКДО) position on MRM2 through SM window No.13, Closeout Ops JEM Airlock Depressurization APEX-04 MELFI Sample Insertion Pressurized Mating Adapter 3 (PMA 3) Depress 24-hour BP recording (terminate) DC1 БСС (Spacesuit Interface Unit) Checkout. VIZIR. Experiment Ops. ENERGY Diet Log of Lunch Combined Orlan-MKS No.4 and БСС cooling loop separation in DC1. On-Board Training (OBT) Cygnus Conference Dose Tracker Data Entry Subject ESA Weekly crew conference ISS HAM Service Module Pass Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Fill Part 3 Dragon Cargo Transfer Operations PingMaster SW Upgrade to connect to OTKLIK BRI Cleaning Fluid System by using Degassing […]

from ISS On-Orbit Status Report http://ift.tt/2mrbKMK
via IFTTT

7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files

This week WikiLeaks published "Vault 7" — a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA). The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to intercept communications and spy on its targets, making even China and Germany worried about the CIA's ability to hack all


from The Hacker News http://ift.tt/2m7I9Xa
via IFTTT

User::getRoles() assumed unauthenticated users are anonymous

Although this is true in core, it causes problems for contrib that has unauthenticated users who have a user ID (i.e. are not anonymous). This is ...

from Google Alert - anonymous http://ift.tt/2maqOxA
via IFTTT

[InsideNothing] hitebook.net liked your post "[FD] Apple iOS v10.1 & 10.1.1 - iCloud & Device Lock Bypass on Activate via local Buffer Overflow Vulnerability (Wifi Network)"



Source: Gmail -> IFTTT-> Blogger

How Dutch Police Decrypted BlackBerry PGP Messages For Criminal Investigation

The Dutch police have managed to decrypt a number of PGP-encrypted messages sent by criminals using their custom security-focused PGP BlackBerry phones and identified several criminals in an ongoing investigation. PGP, or Pretty Good Privacy, an open source end-to-end encryption standard that can be used to cryptographically sign emails, files, documents, or entire disk partitions in order to


from The Hacker News http://ift.tt/2mqqDyP
via IFTTT

[InsideNothing] hitebook.net liked your post "[FD] Apple iOS 10.2 (Notify - iTunes) - Filter Bypass & Persistent Vulnerability"



Source: Gmail -> IFTTT-> Blogger

[FD] Hardwear.io Call For Papers 2017 is open!

Carrie Lam caught in anonymous briefings row

Lam then replied by saying that she didn't give such briefings while in government "for the most part", and she said giving these anonymous briefings ...

from Google Alert - anonymous http://ift.tt/2nm6hWW
via IFTTT

[FD] Multiple vulnerabilities discovered in dnaLIMS DNA sequencing web-application

Title: Multiple vulnerabilities discovered in dnaLIMS DNA sequencing web-application Advisory URL: http://ift.tt/2m3m0Kj Date published: Mar 08, 2017 Vendor: dnaTools, Inc. CVE IDs: [2017-6526, 2017-6527, 2017-6528, 2017-6529] USCERT VU: 929263 Vulnerability Summaries 1) Improperly protected web shell [CVE-2017-6526] dnaLIMS requires authentication to view cgi-bin/dna/sysAdmin.cgi, which is a web shell included with the software running as the web user. However, sending a POST request to that page bypasses authentication checks, including the UID parameter within the POST request. 2) Unauthenticated Directory Traversal [CVE-2017-6527] The viewAppletFsa.cgi seqID parameter is vulnerable to a null terminated directory traversal attack. This allows an unauthenticated attacker to retrieve files on the operating system accessible by the permissions of the web server. This page also does not require authentication, allowing any person on the Internet to exploit this vulnerability. 3) Insecure Password Storage [CVE-2017-6528] An option, which is most likely the default, allows the password file (/home/dna/spool/.pfile) to store clear text passwords. When combined with the unauthenticated directory traversal vulnerability, it is possible to gain the username and password for all users of the software and gain complete control of the software. 4) Session Hijacking [CVE-2017-6529] Each user of the dnaLIMS software is assigned a unique four-digit user identification number(UID) upon account creation. These numbers appear to be assigned sequentially. Multiple pages of the dnaLIMS application require that this UID be passed as a URL parameter in order to view the content of the page. Consider the following example: The URL ‘http:///cgi-bin/dna/seqreq2N.cgi?username=61685578,2410’ is a valid URL to view the page for sequencing requests for the user with the UID of 2410. The username parameter of the URL is the mechanism for authentication to the system. The first eight-digit number of the username parameter appears to be a session identifier as it changes every time the user logs in from the password.cgi page, however this value is not checked by the seqreq2N.cgi page. This allows an attacker to guess the four-digit UID of valid user accounts that have an active session. The user with the UID of 2419 currently has an active session, so we can simply hijack this user’s session by requesting this page and specifying the UID 2419. 5) Cross-site Scripting The seqID parameter of the viewAppletFsa.cgi page is vulnerable to a reflected cross site scripting attack via GET request as seen in the following URL: http://<SERVER NAME REDACTED>/cgi-bin/dna/viewAppletFsa.cgi?seqID=7415-7<SCRIPT Alert("XSS") </SCRIPT> 6) Cross-site Scripting The navUserName parameter of the seqTable*.cgi page is vulnerable to a reflected cross site scripting attack via POST request as seen in the example below. The * reflects a short name for a client, (ie Shorebreak Security may be seqTableSS.cgi or seqTableshorebreak.cgi) and may not be vulnerable for all dnaLIMS installs. 7) Improperly Protected Content Many of the pages within the admin interface are not properly protected from viewing by authenticated users. This can give an attacker additional system information about the system, or change system/software configuration. Software was conducted on a live production system, therefore the pages themselves were tested, forms within these pages were not. This is also not an exhaustive list of improperly protected pages: cgi-bin/dna/configuration.cgi cgi-bin/dna/createCoInfo.cgi cgi-bin/dna/configSystem.cgi cgi-bin/dna/combineAcctsN.cgi Disclosure Timeline Thu, Nov 10, 2016 at 4:25 PM: Reached out to vendor requesting PGP key to securely exchange details of vulnerabilities identified Thu, Nov 10, 2016 at 4:55 PM: Vendor requests report be physically mailed to PO box via Postal Service Wed, Nov 16, 2016, at 11:14 AM: Report mailed to vendor via USPS Certified Mail Thu, Dec 8, 2016, at 10:43 AM: Request Vendor acknowledge receipt of the report Thu, Dec 8, 2016, at 12:53 PM: Vendor acknowledges receipt; suggests placing the software behind a firewall as a solution to the vulnerabilities. Thu, Dec 8, 2016, at 1:54 PM: Reply that the offered solution mitigates some risk, but does not address the vulnerabilities; inquire if there is a plan to address the vulnerabilities Thu, Dec 8, 2016, at 3:13 PM: Vendor replies “…Yes, we have a plan. Please gather a DNA sequence, PO Number, or Fund Number and go to your local grocery store and see what it will buy you.” Tue, Feb 28, 2017, at 1:15 PM: Vulnerabilities disclosed to US-CERT Tue, Mar 7, 2017, at 8:19 AM: Vulnerabilities submitted to MITRE for CVE assignment Wed, Mar 8, 2017, at 12:00 PM: Vulnerabilities disclosed publicly <br><br> Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2017-6466 - Remote Code Execution under SYSTEM via MITM in F-Secure AV

CVE-2017-6466 - Remote Code Execution under SYSTEM via MITM in F-Secure AV

Source: Gmail -> IFTTT-> Blogger

[FD] Bypassing Authentication on iball Baton Routers

Title: ==== iball Baton 150M Wireless router - Authentication Bypass Credit: ====== Name: Indrajith.A.N Website: http://ift.tt/2kISZqG CVE Details: ========= CVE-2017-6558 Date: ==== 07-03-2017 Vendor: ====== iball Envisioning the tremendous potential for innovative products required by the ever evolving users in computing and digital world, iBall was launched in September 2001 and which is one of the leading networking company Product: ======= iball Baton 150M Wireless-N ADSI.2+ Router Product link: ============= http://ift.tt/2ncFjAQ Abstract: ======= iball Baton 150M Router's login page is insecurely developed that any attacker could bypass the admin's authentication just by tweaking the password.cgi file. Affected Version: ============= Firmware Version : 1.2.6 build 110401 Rel.47776n Hardware Version : iB-WRA150N v1 00000001 Exploitation-Technique: =================== Remote Severity Rating: =================== 9 Details: ======= Any attacker can escalate his privilege to admin using this vulnerability. Proof Of Concept: ================ 1) Navigate to Routers Login page which is usually IPV4 default Gateway IP, i.e 172.20.174.1 2) Now just append password.cgi to the URL i.e http://ift.tt/2mk43JX 3) Force wget to view content of the CGI file, We can see the (hidden tag) in the comment section which contians the updated Username, Role and Password. 4) Successfully logged in using the disclosed credentials. Disclosure Timeline: ====================================== Vendor Notification: March 5, 2017 --

Source: Gmail -> IFTTT-> Blogger

[FD] FTP Voyager Scheduler v16.2.0 CSRF Remote Command Execution

[FD] SICUNET Physical Access Controller - Multiple Vulnerabilities

SICUNET Physical Access Controller - Multiple Vulnerabilities

Source: Gmail -> IFTTT-> Blogger

Anonymous peer-review in science

[Copied from the coordination list]: On this regard, I have prepared a petition on Change.org aimed at the abolition of anonymous peer review in ...

from Google Alert - anonymous http://ift.tt/2n6oNq0
via IFTTT

Sinfonia in A Major

Sinfonia in A Major (Anonymous) ... Composer, Anonymous. Key, A major. Movements/SectionsMov'ts/Sec's, 6 movements. Allegro; Minuetto-Trio ...

from Google Alert - anonymous http://ift.tt/2nd16JB
via IFTTT

I have a new follower on Twitter


César Castillo López
Comments, reviews, articles, curiosities, concerns, recommendations./// Comentarios, opiniones, artículos, curiosidades, preocupaciones, recomendaciones.
Barcelona
http://t.co/GVfq1PvRAi
Following: 2483 - Followers: 1099

March 10, 2017 at 01:46AM via Twitter http://twitter.com/cclopezbcn

Thursday, March 9, 2017

I have a new follower on Twitter


A Perfect Storm

Parsippany, NJ
https://t.co/GCYee4t7yR
Following: 4615 - Followers: 4949

March 09, 2017 at 10:56PM via Twitter http://twitter.com/perfectstormMD

NFL Free Agency: Ravens re-signing NT Brandon Williams to 5-year, $54M deal ($27.5M guaranteed) - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL Free Agency: Ravens will re-sign NT Brandon Williams - Adam Schefter; 32 starts over last 2 seasons (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

WBC Video: Domincan Republic 3B Manny Machado lays out for great diving catch to rob Canada's Freddie Freeman (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Combining Bayesian Approaches and Evolutionary Techniques for the Inference of Breast Cancer Networks. (arXiv:1703.03041v1 [cs.LG])

Gene and protein networks are very important to model complex large-scale systems in molecular biology. Inferring or reverseengineering such networks can be defined as the process of identifying gene/protein interactions from experimental data through computational analysis. However, this task is typically complicated by the enormously large scale of the unknowns in a rather small sample size. Furthermore, when the goal is to study causal relationships within the network, tools capable of overcoming the limitations of correlation networks are required. In this work, we make use of Bayesian Graphical Models to attach this problem and, specifically, we perform a comparative study of different state-of-the-art heuristics, analyzing their performance in inferring the structure of the Bayesian Network from breast cancer data.



from cs.AI updates on arXiv.org http://ift.tt/2mGELGG
via IFTTT

Deep Variation-structured Reinforcement Learning for Visual Relationship and Attribute Detection. (arXiv:1703.03054v1 [cs.CV])

Despite progress in visual perception tasks such as image classification and detection, computers still struggle to understand the interdependency of objects in the scene as a whole, e.g., relations between objects or their attributes. Existing methods often ignore global context cues capturing the interactions among different object instances, and can only recognize a handful of types by exhaustively training individual detectors for all possible relationships. To capture such global interdependency, we propose a deep Variation-structured Reinforcement Learning (VRL) framework to sequentially discover object relationships and attributes in the whole image. First, a directed semantic action graph is built using language priors to provide a rich and compact representation of semantic correlations between object categories, predicates, and attributes. Next, we use a variation-structured traversal over the action graph to construct a small, adaptive action set for each step based on the current state and historical actions. In particular, an ambiguity-aware object mining scheme is used to resolve semantic ambiguity among object categories that the object detector fails to distinguish. We then make sequential predictions using a deep RL framework, incorporating global context cues and semantic embeddings of previously extracted phrases in the state vector. Our experiments on the Visual Relationship Detection (VRD) dataset and the large-scale Visual Genome dataset validate the superiority of VRL, which can achieve significantly better detection results on datasets involving thousands of relationship and attribute types. We also demonstrate that VRL is able to predict unseen types embedded in our action graph by learning correlations on shared graph nodes.



from cs.AI updates on arXiv.org http://ift.tt/2m8e2zu
via IFTTT

Interpretable Structure-Evolving LSTM. (arXiv:1703.03055v1 [cs.CV])

This paper develops a general framework for learning interpretable data representation via Long Short-Term Memory (LSTM) recurrent neural networks over hierarchal graph structures. Instead of learning LSTM models over the pre-fixed structures, we propose to further learn the intermediate interpretable multi-level graph structures in a progressive and stochastic way from data during the LSTM network optimization. We thus call this model the structure-evolving LSTM. In particular, starting with an initial element-level graph representation where each node is a small data element, the structure-evolving LSTM gradually evolves the multi-level graph representations by stochastically merging the graph nodes with high compatibilities along the stacked LSTM layers. In each LSTM layer, we estimate the compatibility of two connected nodes from their corresponding LSTM gate outputs, which is used to generate a merging probability. The candidate graph structures are accordingly generated where the nodes are grouped into cliques with their merging probabilities. We then produce the new graph structure with a Metropolis-Hasting algorithm, which alleviates the risk of getting stuck in local optimums by stochastic sampling with an acceptance probability. Once a graph structure is accepted, a higher-level graph is then constructed by taking the partitioned cliques as its nodes. During the evolving process, representation becomes more abstracted in higher-levels where redundant information is filtered out, allowing more efficient propagation of long-range data dependencies. We evaluate the effectiveness of structure-evolving LSTM in the application of semantic object parsing and demonstrate its advantage over state-of-the-art LSTM models on standard benchmarks.



from cs.AI updates on arXiv.org http://ift.tt/2mGAYsJ
via IFTTT

Learning the Probabilistic Structure of Cumulative Phenomena with Suppes-Bayes Causal Networks. (arXiv:1703.03074v1 [cs.LG])

One of the critical issues when adopting Bayesian networks (BNs) to model dependencies among random variables is to "learn" their structure, given the huge search space of possible solutions, i.e., all the possible direct acyclic graphs. This is a well-known NP-hard problem, which is also complicated by known pitfalls such as the issue of I-equivalence among different structures. In this work we restrict the investigations on BN structure learning to a specific class of networks, i.e., those representing the dynamics of phenomena characterized by the monotonic accumulation of events. Such phenomena allow to set specific structural constraints based on Suppes' theory of probabilistic causation and, accordingly, to define constrained BNs, named Suppes-Bayes Causal Networks (SBCNs). We here investigate the structure learning of SBCNs via extensive simulations with various state-of-the-art search strategies, such as canonical local search techniques and Genetic Algorithms. Among the main results we show that Suppes' constraints deeply simplify the learning task, by reducing the solution search space and providing a temporal ordering on the variables.



from cs.AI updates on arXiv.org http://ift.tt/2m8gPJ3
via IFTTT

Efficient Simulation of Financial Stress Testing Scenarios with Suppes-Bayes Causal Networks. (arXiv:1703.03076v1 [cs.LG])

The most recent financial upheavals have cast doubt on the adequacy of some of the conventional quantitative risk management strategies, such as VaR (Value at Risk), in many common situations. Consequently, there has been an increasing need for verisimilar financial stress testings, namely simulating and analyzing financial portfolios in extreme, albeit rare scenarios. Unlike conventional risk management which exploits statistical correlations among financial instruments, here we focus our analysis on the notion of probabilistic causation, which is embodied by Suppes-Bayes Causal Networks (SBCNs), SBCNs are probabilistic graphical models that have many attractive features in terms of more accurate causal analysis for generating financial stress scenarios. In this paper, we present a novel approach for conducting stress testing of financial portfolios based on SBCNs in combination with classical machine learning classification tools. The resulting method is shown to be capable of correctly discovering the causal relationships among financial factors that affect the portfolios and thus, simulating stress testing scenarios with a higher accuracy and lower computational complexity than conventional Monte Carlo Simulations.



from cs.AI updates on arXiv.org http://ift.tt/2mGxOoV
via IFTTT

Information Extraction in Illicit Domains. (arXiv:1703.03097v1 [cs.CL])

Extracting useful entities and attribute values from illicit domains such as human trafficking is a challenging problem with the potential for widespread social impact. Such domains employ atypical language models, have `long tails' and suffer from the problem of concept drift. In this paper, we propose a lightweight, feature-agnostic Information Extraction (IE) paradigm specifically designed for such domains. Our approach uses raw, unlabeled text from an initial corpus, and a few (12-120) seed annotations per domain-specific attribute, to learn robust IE models for unobserved pages and websites. Empirically, we demonstrate that our approach can outperform feature-centric Conditional Random Field baselines by over 18\% F-Measure on five annotated sets of real-world human trafficking datasets in both low-supervision and high-supervision settings. We also show that our approach is demonstrably robust to concept drift, and can be efficiently bootstrapped even in a serial computing environment.



from cs.AI updates on arXiv.org http://ift.tt/2m7SWS0
via IFTTT

A Structured Self-attentive Sentence Embedding. (arXiv:1703.03130v1 [cs.CL])

This paper proposes a new model for extracting an interpretable sentence embedding by introducing self-attention. Instead of using a vector, we use a 2-D matrix to represent the embedding, with each row of the matrix attending on a different part of the sentence. We also propose a self-attention mechanism and a special regularization term for the model. As a side effect, the embedding comes with an easy way of visualizing what specific parts of the sentence are encoded into the embedding. We evaluate our model on 3 different tasks: author profiling, sentiment classification, and textual entailment. Results show that our model yields a significant performance gain compared to other sentence embedding methods in all of the 3 tasks.



from cs.AI updates on arXiv.org http://ift.tt/2mGQip9
via IFTTT

Behavior-based Navigation of Mobile Robot in Unknown Environments Using Fuzzy Logic and Multi-Objective Optimization. (arXiv:1703.03161v1 [cs.RO])

This study proposes behavior-based navigation architecture, named BBFM, to deal with the problem of navigating the mobile robot in unknown environments in the presence of obstacles and local minimum regions. In the architecture, the complex navigation task is split into principal sub-tasks or behaviors. Each behavior is implemented by a fuzzy controller and executed independently to deal with a specific problem of navigation. The fuzzy controller is modified to contain only the fuzzification and inference procedures so that its output is a membership function representing the behavior's objective. The membership functions of all controllers are then used as the objective functions for a multi-objective optimization process to coordinate all behaviors. The result of this process is an overall control signal, which is Pareto-optimal, used to control the robot. A number of simulations, comparisons, and experiments were conducted. The results show that the proposed architecture outperforms some popular behavior-based architectures in term of accuracy, smoothness, traveled distance, and time response.



from cs.AI updates on arXiv.org http://ift.tt/2lJmzge
via IFTTT

Embedding Tarskian Semantics in Vector Spaces. (arXiv:1703.03193v1 [cs.AI])

We propose a new linear algebraic approach to the computation of Tarskian semantics in logic. We embed a finite model M in first-order logic with N entities in N-dimensional Euclidean space R^N by mapping entities of M to N dimensional one-hot vectors and k-ary relations to order-k adjacency tensors (multi-way arrays). Second given a logical formula F in prenex normal form, we compile F into a set Sigma_F of algebraic formulas in multi-linear algebra with a nonlinear operation. In this compilation, existential quantifiers are compiled into a specific type of tensors, e.g., identity matrices in the case of quantifying two occurrences of a variable. It is shown that a systematic evaluation of Sigma_F in R^N gives the truth value, 1(true) or 0(false), of F in M. Based on this framework, we also propose an unprecedented way of computing the least models defined by Datalog programs in linear spaces via matrix equations and empirically show its effectiveness compared to state-of-the-art approaches.



from cs.AI updates on arXiv.org http://ift.tt/2m8eGwR
via IFTTT

Modeling the Ellsberg Paradox by Argument Strength. (arXiv:1703.03233v1 [cs.AI])

We present a formal measure of argument strength, which combines the ideas that conclusions of strong arguments are (i) highly probable and (ii) their uncertainty is relatively precise. Likewise, arguments are weak when their conclusion probability is low or when it is highly imprecise. We show how the proposed measure provides a new model of the Ellsberg paradox. Moreover, we further substantiate the psychological plausibility of our approach by an experiment (N = 60). The data show that the proposed measure predicts human inferences in the original Ellsberg task and in corresponding argument strength tasks. Finally, we report qualitative data taken from structured interviews on folk psychological conceptions on what argument strength means.



from cs.AI updates on arXiv.org http://ift.tt/2mGDXRM
via IFTTT

Abductive, Causal, and Counterfactual Conditionals Under Incomplete Probablistitic Knowledge. (arXiv:1703.03254v1 [cs.AI])

We study abductive, causal, and non-causal conditionals in indicative and counterfactual formulations using probabilistic truth table tasks under incomplete probabilistic knowledge (N = 80). We frame the task as a probability-logical inference problem. The most frequently observed response type across all conditions was a class of conditional event interpretations of conditionals; it was followed by conjunction interpretations. An interesting minority of participants neglected some of the relevant imprecision involved in the premises when inferring lower or upper probability bounds on the target conditional/counterfactual ("halfway responses"). We discuss the results in the light of coherence-based probability logic and the new paradigm psychology of reasoning.



from cs.AI updates on arXiv.org http://ift.tt/2m87UHE
via IFTTT

Counterfactuals, indicative conditionals, and negation under uncertainty: Are there cross-cultural differences?. (arXiv:1703.03255v1 [cs.AI])

In this paper we study selected argument forms involving counterfactuals and indicative conditionals under uncertainty. We selected argument forms to explore whether people with an Eastern cultural background reason differently about conditionals compared to Westerners, because of the differences in the location of negations. In a 2x2 between-participants design, 63 Japanese university students were allocated to four groups, crossing indicative conditionals and counterfactuals, and each presented in two random task orders. The data show close agreement between the responses of Easterners and Westerners. The modal responses provide strong support for the hypothesis that conditional probability is the best predictor for counterfactuals and indicative conditionals. Finally, the grand majority of the responses are probabilistically coherent, which endorses the psychological plausibility of choosing coherence-based probability logic as a rationality framework for psychological reasoning research.



from cs.AI updates on arXiv.org http://ift.tt/2mGAYcd
via IFTTT

LesionSeg: Semantic segmentation of skin lesions using Deep Convolutional Neural Network. (arXiv:1703.03372v1 [cs.CV])

We present a method for skin lesion segmentation for the ISIC 2017 Skin Lesion Segmentation Challenge. Our approach is based on a Fully Convolutional Network architecture which is trained end to end, from scratch, on a limited dataset. Our semantic segmentation architecture utilizes several recent innovations in particularly in the combined use of (i) use of \emph{atrous} convolutions to increase the effective field of view of the network's receptive field without increasing the number of parameters, (ii) the use of network-in-network $1\times1$ convolution layers to increase network capacity without incereasing the number of parameters and (iii) state-of-art super-resolution upsampling of predictions using subpixel CNN layers for accurate and efficient upsampling of predictions. We achieved a IOU score of 0.642 on the validation set provided by the organisers.



from cs.AI updates on arXiv.org http://ift.tt/2m83Sio
via IFTTT

Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks. (arXiv:1703.03400v1 [cs.LG])

We propose an algorithm for meta-learning that is model-agnostic, in the sense that it is compatible with any model trained with gradient descent and applicable to a variety of different learning problems, including classification, regression, and reinforcement learning. The goal of meta-learning is to train a model on a variety of learning tasks, such that it can solve new learning tasks using only a small number of training samples. In our approach, the parameters of the model are explicitly trained such that a small number of gradient steps with a small amount of training data from a new task will produce good generalization performance on that task. In effect, our method trains the model to be easy to fine-tune. We demonstrate that this approach leads to state-of-the-art performance on a few-shot image classification benchmark, produces good results on few-shot regression, and accelerates fine-tuning for policy gradient reinforcement learning with neural network policies.



from cs.AI updates on arXiv.org http://ift.tt/2mGupGI
via IFTTT

Exposing the Probabilistic Causal Structure of Discrimination. (arXiv:1510.00552v3 [cs.DB] UPDATED)

Discrimination discovery from data is an important task aiming at identifying patterns of illegal and unethical discriminatory activities against protected-by-law groups, e.g., ethnic minorities. While any legally-valid proof of discrimination requires evidence of causality, the state-of-the-art methods are essentially correlation-based, albeit, as it is well known, correlation does not imply causation.

In this paper we take a principled causal approach to the data mining problem of discrimination detection in databases. Following Suppes' probabilistic causation theory, we define a method to extract, from a dataset of historical decision records, the causal structures existing among the attributes in the data. The result is a type of constrained Bayesian network, which we dub Suppes-Bayes Causal Network (SBCN). Next, we develop a toolkit of methods based on random walks on top of the SBCN, addressing different anti-discrimination legal concepts, such as direct and indirect discrimination, group and individual discrimination, genuine requirement, and favoritism. Our experiments on real-world datasets confirm the inferential power of our approach in all these different tasks.



from cs.AI updates on arXiv.org http://ift.tt/1JNnXOd
via IFTTT

Modeling cumulative biological phenomena with Suppes-Bayes Causal Networks. (arXiv:1602.07857v3 [cs.AI] UPDATED)

Several diseases related to cell proliferation are characterized by the accumulation of somatic DNA changes, with respect to wildtype conditions. Cancer and HIV are two common examples of such diseases, where the mutational load in the cancerous/viral population increases over time. In these cases, selective pressures are often observed along with competition, cooperation and parasitism among distinct cellular clones. Recently, we presented a mathematical framework to model these phenomena, based on a combination of Bayesian inference and Suppes' theory of probabilistic causation, depicted in graphical structures dubbed Suppes-Bayes Causal Networks (SBCNs). SBCNs are generative probabilistic graphical models that recapitulate the potential ordering of accumulation of such DNA changes during the progression of the disease. Such models can be inferred from data by exploiting likelihood-based model-selection strategies with regularization. In this paper we discuss the theoretical foundations of our approach and we investigate in depth the influence on the model-selection task of: (i) the poset based on Suppes' theory and (ii) different regularization strategies. Furthermore, we provide an example of application of our framework to HIV genetic data highlighting the valuable insights provided by the inferred.



from cs.AI updates on arXiv.org http://ift.tt/24sg8eL
via IFTTT

Bootstrapping with Models: Confidence Intervals for Off-Policy Evaluation. (arXiv:1606.06126v2 [cs.AI] UPDATED)

For an autonomous agent, executing a poor policy may be costly or even dangerous. For such agents, it is desirable to determine confidence interval lower bounds on the performance of any given policy without executing said policy. Current methods for exact high confidence off-policy evaluation that use importance sampling require a substantial amount of data to achieve a tight lower bound. Existing model-based methods only address the problem in discrete state spaces. Since exact bounds are intractable for many domains we trade off strict guarantees of safety for more data-efficient approximate bounds. In this context, we propose two bootstrapping off-policy evaluation methods which use learned MDP transition models in order to estimate lower confidence bounds on policy performance with limited data in both continuous and discrete state spaces. Since direct use of a model may introduce bias, we derive a theoretical upper bound on model bias for when the model transition function is estimated with i.i.d. trajectories. This bound broadens our understanding of the conditions under which model-based methods have high bias. Finally, we empirically evaluate our proposed methods and analyze the settings in which different bootstrapping off-policy confidence interval methods succeed and fail.



from cs.AI updates on arXiv.org http://ift.tt/28MFYDc
via IFTTT

Neighborhood Mixture Model for Knowledge Base Completion. (arXiv:1606.06461v3 [cs.CL] UPDATED)

Knowledge bases are useful resources for many natural language processing tasks, however, they are far from complete. In this paper, we define a novel entity representation as a mixture of its neighborhood in the knowledge base and apply this technique on TransE-a well-known embedding model for knowledge base completion. Experimental results show that the neighborhood information significantly helps to improve the results of the TransE model, leading to better performance than obtained by other state-of-the-art embedding models on three benchmark datasets for triple classification, entity prediction and relation prediction tasks.



from cs.AI updates on arXiv.org http://ift.tt/28MfaGu
via IFTTT

Universal adversarial perturbations. (arXiv:1610.08401v3 [cs.CV] UPDATED)

Given a state-of-the-art deep neural network classifier, we show the existence of a universal (image-agnostic) and very small perturbation vector that causes natural images to be misclassified with high probability. We propose a systematic algorithm for computing universal perturbations, and show that state-of-the-art deep neural networks are highly vulnerable to such perturbations, albeit being quasi-imperceptible to the human eye. We further empirically analyze these universal perturbations and show, in particular, that they generalize very well across neural networks. The surprising existence of universal perturbations reveals important geometric correlations among the high-dimensional decision boundary of classifiers. It further outlines potential security breaches with the existence of single directions in the input space that adversaries can possibly exploit to break a classifier on most natural images.



from cs.AI updates on arXiv.org http://ift.tt/2eHr3Q8
via IFTTT

Joint Causal Inference from Observational and Experimental Datasets. (arXiv:1611.10351v2 [cs.LG] UPDATED)

We introduce Joint Causal Inference (JCI), a powerful formulation of causal discovery from multiple datasets that allows to jointly learn both the causal structure and targets of interventions from statistical independences in pooled data. Compared with existing constraint-based approaches for causal discovery from multiple data sets, JCI offers several advantages: it allows for several different types of interventions in a unified fashion, it can learn intervention targets, it systematically pools data across different datasets which improves the statistical power of independence tests, and most importantly, it improves on the accuracy and identifiability of the predicted causal relations. A technical complication that arises in JCI is the occurrence of faithfulness violations due to deterministic relations. We propose a simple but effective strategy for dealing with this type of faithfulness violations. We implement it in ACID, a determinism-tolerant extension of Ancestral Causal Inference (ACI) (Magliacane et al., 2016), a recently proposed logic-based causal discovery method that improves reliability of the output by exploiting redundant information in the data. We illustrate the benefits of JCI with ACID with an evaluation on a simulated dataset.



from cs.AI updates on arXiv.org http://ift.tt/2gzXQob
via IFTTT

ASHACL: Alternative Shapes Constraint Language. (arXiv:1702.01795v2 [cs.AI] UPDATED)

ASHACL, a variant of the W3C Shapes Constraint Language, is designed to determine whether an RDF graph meets some conditions. These conditions are grouped into shapes, which validate whether particular RDF terms each meet the constraints of the shape. Shapes are themselves expressed as RDF triples in an RDF graph, called a shapes graph.



from cs.AI updates on arXiv.org http://ift.tt/2kjRZ82
via IFTTT

Similarity Preserving Representation Learning for Time Series Analysis. (arXiv:1702.03584v2 [cs.AI] UPDATED)

A considerable amount of machine learning algorithms take instance-feature matrices as their inputs. As such, they cannot directly analyze time series data due to its temporal nature, usually unequal lengths, and complex properties. This is a great pity since many of these algorithms are effective, robust, efficient, and easy to use. In this paper, we bridge this gap by proposing an efficient representation learning framework that is able to convert a set of time series with equal or unequal lengths to a matrix format. In particular, we guarantee that the pairwise similarities between time series are well preserved after the transformation. The learned feature representation is particularly suitable to the class of learning problems that are sensitive to data similarities. Given a set of $n$ time series, we first construct an $n\times n$ partially observed similarity matrix by randomly sampling $O(n \log n)$ pairs of time series and computing their pairwise similarities. We then propose an extremely efficient algorithm that solves a highly non-convex and NP-hard problem to learn new features based on the partially observed similarity matrix. We use the learned features to conduct experiments on both data classification and clustering tasks. Our extensive experimental results demonstrate that the proposed framework is both effective and efficient.



from cs.AI updates on arXiv.org http://ift.tt/2l9uMcr
via IFTTT

Microsoft update – anonymous access and internal lnks

On Thursday, March 30, Microsoft will adjust how anonymous access and internal links are used in SharePoint Online and OneDrive for Business ...

from Google Alert - anonymous http://ift.tt/2n5kJXd
via IFTTT

NFL Free Agency: Ravens pick up 2017 contract option on WR Mike Wallace; sign RB Danny Woodhead to 3-year deal (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens: Kenneth Dixon suspended first four games of 2017 for violating PED policy; GM Ozzie Newsome says RB has \"assumed responsibility for his actions\" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous donor gives NY Times $1M for student subscriptions

An anonymous donor paid $1 million to buy New York Times subscriptions for public school students. So far, the newspaper's “sponsor a subscription ...

from Google Alert - anonymous http://ift.tt/2m5rfYV
via IFTTT

Anonymous - Chef

Anonymous - Chef – Boston Restaurant Jobs - BostonChefs.com's Industry Insider, the best jobs at Boston restaurants.

from Google Alert - anonymous http://ift.tt/2mqNP1D
via IFTTT

ISS Daily Summary Report – 3/08/2017

Mobile Servicing System (MSS) Operations:  Overnight, Robotics Ground Controllers unstowed the Stratospheric Aerosol and Gas Experiment (SAGE) Instrument Panel from the SPDM Enhanced Orbital Replacement Unit (ORU) Temporary Platform (EOTP) and installed it on the SAGE Nadir Viewing Platform (NVP).  They then maneuvered the SSRMS to support surveys of the SAGE IP, the EXpedite the PRocessing of Experiments to Space Station (EXPRESS) Pallet Controller Assembly (ExPCA) and the S1 Lower Outboard (LOOB) Camera using the SSRMS and SPDM Camera Light Pan/Tilt Unit (PTU) Assemblies (CLPAs).  MSS performance was nominal. APEX-04: The crew harvested plants growing on petri plates in the Veggie facility. They configured the Advanced Biology Research Facility (ABRS) Photo grid on the Maintenance Work Area (MWA) Work Surface to image the plant growth status prior to plant insertion into a Kennedy Space Center (KSC) Fixation Tube (KFT) for RNAlater fixation.  After 24 hours, the samples in the KFTs will be inserted in Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI) for return on SpaceX (SpX)-10.  Everywear App Update: On February 2 when the crew activated the EveryWear application in support of the Skin Suit activities, the iPad Air 2 displayed an error message. Subsequent investigation indicated the need for a new virtual machine (Stargate) to enable connectivity of iPad to the LS1 Server and the internet. Stargate was deployed today and the EveryWear Application is functioning nominally. The Everywear assistant is an ambulatory data collection system that uses wearable sensors connected to a Space Station iPad tablet computer, which is wirelessly synchronized with computers on the ground. This easy-use system seeks to demonstrate the benefits of extensive physiology data collection for both science and medical follow-up purposes by improving usability for ISS crew members.  NanoRacks Module 9: The crew activated five Student Spaceflight Experiments Program (SSEP)/National Center for Earth and Space Science Education (NCESSE) experiments shown below. Supporting various schools and student designed experiments studying a range of objectives, the SSEP allows students to design experiments that address real challenges of living and working in space. The program also is a key initiative for U.S. science, technology, engineering and math (STEM) education, educating and inspiring the next generation of scientists and engineers to work on the space program. Will a Biofilm Form on a Rat Catheter in Microgravity Differently than in Gravity? (East Lyme Middle School, East Lyme, CT) Attempts is to see if a biofilm will form differently on a rat artery catheter in microgravity from the bacteria Staphylococcus epidermidis which is naturally occurring in the human body. If the biofilm forms thinner in space than on Earth, this will provide additional information to NASA for astronaut health and for scientists and doctors to hopefully improve catheters and reduce infection on Earth. The Effects of Microgravity on Muscle Tissue Regeneration (McNair Academic High School, Jersey City, NJ) Analyzes the potential of the drug, Tissue Regeneration Factor at 150 mg (TRF-150) to regenerate shoulder muscle tissue of an adolescent pig faster when exposed to a microgravity environment to determine the amount of tissue regenerated under controlled scenarios of induced harm. Both qualitative and quantitative methods of measurement are used to determine this experiment’s success. This experiment helps determine if a microgravity environment aids in the regeneration of organic tissue. If the experiment implies the increase of the regenerative properties of TRF-150, simulated microgravity environment can be implemented to help patients with muscle injuries. Arabidopsis Germination in Martian Soil Simulant (Open Window School, Bellevue, WA) Determines if Arabidopsis thaliana germinates in Martian soil simulant in microgravity. Other researchers have shown A. thaliana grows in Martian soil simulant but the lower gravity of Mars cannot be simulated on Earth. The microgravity environment on the ISS allows for testing of plant growth in an environment closer to the gravity on Mars. Living Water Filters: Triops in Microgravity (North Star Charter School, Boise, ID) Investigates the capability of Triops longicaudatus to filter bacteria from pond water in microgravity as well as it does on Earth. After the experiment returns to Earth, analysis will be conducted to determine which kinds of bacteria remain. Also to be measured is the mass of the Triops that were hatched in microgravity and compare it to the mass of the Triops that were hatched on Earth. Slippery Liquid-Infused Porous Surfaces (SLIPS) in Microgravity (Arts and Technology Academy, Eugene, OR) Tests SLIPS in a microgravity environment to see if the change in gravitational environment alters its properties as compared to Earth. If it does, it could possibly solve frost-over if SLIPS can remain on the face of a solid as well as make liquids slip off of the solid in microgravity.  Fluid Shifts Hardware Transfer: The crew gathered and configured the Fluid Shifts Hardware, including the ultrasound, in the Russian Segment prior to two days of operations utilizing the Chibis (Lower Body Negative Pressure) device. Fluid Shifts is a joint NASA-Russian experiment that investigates the causes for severe and lasting physical changes to astronauts’ eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage.  Node 3 (N3) Port Center Disk Cover (CDC)/Controller Panel Assembly (CPA) Installation: The crew installed the following: Thirteen augmentation plates in Axial Common Berthing Mechanism (CBM) Center Disk Cover (CDD) N3 external antenna communication cable Three N3 Port Common Berthing Mechanism (CBM) Control Panel Assemblies Armored axial CBM CDC in N3 Port Vestibule Completion of these activities will provide Micro Meteoroid Orbital Debris (MMOD) and thermal protection for the N3 Port bulkhead, hatch, and CBM hardware following Pressurized Mating Adapter (PMA) 3 relocation.  Extravehicular Activity (EVA) Tool Config: The crew continued configuring hardware, bags and tools for the Electrical Power Distribution and Control (EPIC) Special Purpose Dexterous Manipulator (SPDM) Lube EVA, EPIC Shields EVA and Express Logistics Carrier (ELC)4 Express Pallet Controller Assembly (ExPCA) EVA […]

from ISS On-Orbit Status Report http://ift.tt/2lHBxmT
via IFTTT

New Apache Struts Zero-Day Vulnerability Being Exploited in the Wild

Security researchers have discovered a Zero-Day vulnerability in the popular Apache Struts web application framework, which is being actively exploited in the wild. Apache Struts is a free, open-source, Model-View-Controller (MVC) framework for creating elegant, modern Java web applications, which supports REST, AJAX, and JSON. In a blog post published Monday, Cisco's Threat intelligence


from The Hacker News http://ift.tt/2lH4pf1
via IFTTT

Secure Messaging App 'Confide' Used by White House Staffers Found Vulnerable

The secure messaging app used by staffers in the White House and on Capitol Hill is not as secure as the company claims. Confide, the secure messaging app reportedly employed by President Donald Trump's aides to speak to each other in secret, promises "military-grade end-to-end encryption" to its users and claims that nobody can intercept and read chats that disappear after they are read.


from The Hacker News http://ift.tt/2m2K3bf
via IFTTT

Anonymous

The Adventures of a Squirrel, Supposed to be Related by Himself. Read a sample; View details · You may also like. by Anonymous.

from Google Alert - anonymous http://ift.tt/2mJtZ2C
via IFTTT

How to setup anonymous acces to NextCloud (without password or as guest)?

Hello, I have the following need that I don't know how to setup. I have files and folders on an anonymous FTP . Users would like to: add tag to files, ...

from Google Alert - anonymous http://ift.tt/2mm4Nwu
via IFTTT

Call for Papers: Call for Papers on Occator Crater on Ceres

The Dawn mission has collected a wealth of data about the dwarf planet Ceres with its Framing Camera, Visible and Infrared Mapping Spectrometer, Gamma Ray and Neutron Detector and gravity science investigation. Occator crater is one of the most intriguing locations on Ceres as observed by Dawn, and it contains distinctive bright regions called the Cerealia Facula and Vinalia Faculae. Our understanding of the formation and evolution of Occator crater, in particular the Cerealia and Vinalia Faculae, is currently under investigation. We hereby call for submissions of papers to a special issue on the “The Formation and Evolution of Ceres’ Occator Crater”.



from Icarus http://ift.tt/2m1Iv1e
via IFTTT

An anonymous company is hiring

Browse all jobs at {companyName} via StepStone. The company {companyName} is offering interesting job opportunities in Belgium.

from Google Alert - anonymous http://ift.tt/2n2bzed
via IFTTT

Ravens re-sign backup QB Ryan Mallett - NFL Network; 3 of 6 for 26 yards, INT last season (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


BORING GIRLS
Official Twitter for BORING GIRLS, a digital series about teen girls who enter the world of death metal on a journey of artistic self-expression.
Toronto, Ontario
https://t.co/fpXIZfCbyi
Following: 692 - Followers: 175

March 09, 2017 at 12:01AM via Twitter http://twitter.com/boringgirlstv

Wednesday, March 8, 2017

8th Street, Ocean City, MD's surf is at least 5.25ft high

Maryland-Delaware, March 14, 2017 at 03:00AM

8th Street, Ocean City, MD Summary
At 3:00 AM, surf min of 5.25ft. At 9:00 AM, surf min of 6.28ft. At 3:00 PM, surf min of 6.27ft. At 9:00 PM, surf min of 5.26ft.

Surf maximum: 5.52ft (1.68m)
Surf minimum: 5.25ft (1.6m)
Tide height: -0.44ft (-0.13m)
Wind direction: NE
Wind speed: 32.29 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Ravens expected to sign S Tony Jefferson - Dianna Russini and Adam Schefter; 96 tackles last season with Cardinals (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

AA Alcoholics Anonymous Meetings

AA Alcoholics Anonymous Meetings. Support Groups | Cost: None. AA Meets every Monday from 7-8:30 pm, in designated room within St. Vincent's ...

from Google Alert - anonymous http://ift.tt/2m4suZj
via IFTTT

I have a new follower on Twitter


MLeads
MLeads is a cloud technology based one-stop innovative mobile platform for #leads and #event management.Let's Create Your Dream Event https://t.co/cGXnupD0Zb
Philadelphia, PA
https://t.co/J9ufYcDnci
Following: 6030 - Followers: 6784

March 08, 2017 at 08:41PM via Twitter http://twitter.com/MLeadsApp

I have a new follower on Twitter


Nate Regier, PhD
Next Element CEO, Author, Keynote Speaker, Blogger, Leadership Communication Coach, #ConflictWithoutCasualties, #CompassionateAccountability
Newton, KS
https://t.co/1Eddh4z99u
Following: 7524 - Followers: 8519

March 08, 2017 at 08:41PM via Twitter http://twitter.com/NextNate

Multi-Robot Active Information Gathering with Periodic Communication. (arXiv:1703.02610v1 [cs.RO])

A team of robots sharing a common goal can benefit from coordination of the activities of team members, helping the team to reach the goal more reliably or quickly. We address the problem of coordinating the actions of a team of robots with periodic communication capability executing an information gathering task. We cast the problem as a multi-agent optimal decision-making problem with an information theoretic objective function. We show that appropriate techniques for solving decentralized partially observable Markov decision processes (Dec-POMDPs) are applicable in such information gathering problems. We quantify the usefulness of coordinated information gathering through simulation studies, and demonstrate the feasibility of the method in a real-world target tracking domain.



from cs.AI updates on arXiv.org http://ift.tt/2lFoL8h
via IFTTT

Cost-Optimal Learning of Causal Graphs. (arXiv:1703.02645v1 [cs.AI])

We consider the problem of learning a causal graph over a set of variables with interventions. We study the cost-optimal causal graph learning problem: For a given skeleton (undirected version of the causal graph), design the set of interventions with minimum total cost, that can uniquely identify any causal graph with the given skeleton. We show that this problem is solvable in polynomial time. Later, we consider the case when the number of interventions is limited. For this case, we provide polynomial time algorithms when the skeleton is a tree or a clique tree. For a general chordal skeleton, we develop an efficient greedy algorithm, which can be improved when the causal graph skeleton is an interval graph.



from cs.AI updates on arXiv.org http://ift.tt/2m0TzLX
via IFTTT

Towards Generalization and Simplicity in Continuous Control. (arXiv:1703.02660v1 [cs.LG])

This work shows that policies with simple linear and RBF parameterizations can be trained to solve a variety of continuous control tasks, including the OpenAI gym benchmarks. The performance of these trained policies are competitive with state of the art results, obtained with more elaborate parameterizations such as fully connected neural networks. Furthermore, existing training and testing scenarios are shown to be very limited and prone to over-fitting, thus giving rise to only trajectory-centric policies. Training with a diverse initial state distribution is shown to produce more global policies with better generalization. This allows for interactive control scenarios where the system recovers from large on-line perturbations; as shown in the supplementary video.



from cs.AI updates on arXiv.org http://ift.tt/2m4dcDR
via IFTTT

Robust Adversarial Reinforcement Learning. (arXiv:1703.02702v1 [cs.LG])

Deep neural networks coupled with fast simulation and improved computation have led to recent successes in the field of reinforcement learning (RL). However, most current RL-based approaches fail to generalize since: (a) the gap between simulation and real world is so large that policy-learning approaches fail to transfer; (b) even if policy learning is done in real world, the data scarcity leads to failed generalization from training to test scenarios (e.g., due to different friction or object masses). Inspired from H-infinity control methods, we note that both modeling errors and differences in training and test scenarios can be viewed as extra forces/disturbances in the system. This paper proposes the idea of robust adversarial reinforcement learning (RARL), where we train an agent to operate in the presence of a destabilizing adversary that applies disturbance forces to the system. The jointly trained adversary is reinforced -- that is, it learns an optimal destabilization policy. We formulate the policy learning as a zero-sum, minimax objective function. Extensive experiments in multiple environments (InvertedPendulum, HalfCheetah, Swimmer, Hopper and Walker2d) conclusively demonstrate that our method (a) improves training stability; (b) is robust to differences in training/test conditions; and c) outperform the baseline even in the absence of the adversary.



from cs.AI updates on arXiv.org http://ift.tt/2lFovX8
via IFTTT

An Integrated and Scalable Platform for Proactive Event-Driven Traffic Management. (arXiv:1703.02810v1 [cs.AI])

Traffic on freeways can be managed by means of ramp meters from Road Traffic Control rooms. Human operators cannot efficiently manage a network of ramp meters. To support them, we present an intelligent platform for traffic management which includes a new ramp metering coordination scheme in the decision making module, an efficient dashboard for interacting with human operators, machine learning tools for learning event definitions and Complex Event Processing tools able to deal with uncertainties inherent to the traffic use case. Unlike the usual approach, the devised event-driven platform is able to predict a congestion up to 4 minutes before it really happens. Proactive decision making can then be established leading to significant improvement of traffic conditions.



from cs.AI updates on arXiv.org http://ift.tt/2m4bm5O
via IFTTT

Introduction to Formal Concept Analysis and Its Applications in Information Retrieval and Related Fields. (arXiv:1703.02819v1 [cs.IR])

This paper is a tutorial on Formal Concept Analysis (FCA) and its applications. FCA is an applied branch of Lattice Theory, a mathematical discipline which enables formalisation of concepts as basic units of human thinking and analysing data in the object-attribute form. Originated in early 80s, during the last three decades, it became a popular human-centred tool for knowledge representation and data analysis with numerous applications. Since the tutorial was specially prepared for RuSSIR 2014, the covered FCA topics include Information Retrieval with a focus on visualisation aspects, Machine Learning, Data Mining and Knowledge Discovery, Text Mining and several others.



from cs.AI updates on arXiv.org http://ift.tt/2n0L1d4
via IFTTT

Memory Enriched Big Bang Big Crunch Optimization Algorithm for Data Clustering. (arXiv:1703.02883v1 [cs.AI])

Cluster analysis plays an important role in decision making process for many knowledge-based systems. There exist a wide variety of different approaches for clustering applications including the heuristic techniques, probabilistic models, and traditional hierarchical algorithms. In this paper, a novel heuristic approach based on big bang-big crunch algorithm is proposed for clustering problems. The proposed method not only takes advantage of heuristic nature to alleviate typical clustering algorithms such as k-means, but it also benefits from the memory based scheme as compared to its similar heuristic techniques. Furthermore, the performance of the proposed algorithm is investigated based on several benchmark test functions as well as on the well-known datasets. The experimental results show the significant superiority of the proposed method over the similar algorithms.



from cs.AI updates on arXiv.org http://ift.tt/2lFxNSP
via IFTTT

A quantum dynamic belief model to explain the interference effects of categorization on decision making. (arXiv:1703.02894v1 [cs.AI])

Categorization is necessary for many decision making tasks. However, the categorization process may interfere the decision making result and the law of total probability can be violated in some situations. To predict the interference effect of categorization, some model based on quantum probability has been proposed. In this paper, a new quantum dynamic belief (QDB) model is proposed. Considering the precise decision may not be made during the process, the concept of uncertainty is introduced in our model to simulate real human thinking process. Then the interference effect categorization can be predicted by handling the uncertain information. The proposed model is applied to a categorization decision-making experiment to explain the interference effect of categorization. Compared with other models, our model is relatively more succinct and the result shows the correctness and effectiveness of our model.



from cs.AI updates on arXiv.org http://ift.tt/2m4aVZu
via IFTTT

Learning a Unified Control Policy for Safe Falling. (arXiv:1703.02905v1 [cs.RO])

Being able to fall safely is a necessary motor skill for humanoids performing highly dynamic tasks, such as running and jumping. We propose a new method to learn a policy that minimizes the maximal impulse during the fall. The optimization solves for both a discrete contact planning problem and a continuous optimal control problem. Once trained, the policy can compute the optimal next contacting body part (e.g. left foot, right foot, or hands), contact location and timing, and the required joint actuation. We represent the policy as a mixture of actor-critic neural network, which consists of n control policies and the corresponding value functions. Each pair of actor-critic is associated with one of the n possible contacting body parts. During execution, the policy corresponding to the highest value function will be executed while the associated body part will be the next contact with the ground. With this mixture of actor-critic architecture, the discrete contact sequence planning is solved through the selection of the best critics while the continuous control problem is solved by the optimization of actors. We show that our policy can achieve comparable, sometimes even higher, rewards than a recursive search of the action space using dynamic programming, while enjoying 50 to 400 times of speed gain during online execution.



from cs.AI updates on arXiv.org http://ift.tt/2lFoB0M
via IFTTT

Learning Invariant Feature Spaces to Transfer Skills with Reinforcement Learning. (arXiv:1703.02949v1 [cs.AI])

People can learn a wide range of tasks from their own experience, but can also learn from observing other creatures. This can accelerate acquisition of new skills even when the observed agent differs substantially from the learning agent in terms of morphology. In this paper, we examine how reinforcement learning algorithms can transfer knowledge between morphologically different agents (e.g., different robots). We introduce a problem formulation where two agents are tasked with learning multiple skills by sharing information. Our method uses the skills that were learned by both agents to train invariant feature spaces that can then be used to transfer other skills from one agent to another. The process of learning these invariant feature spaces can be viewed as a kind of "analogy making", or implicit learning of partial correspondences between two distinct domains. We evaluate our transfer learning algorithm in two simulated robotic manipulation skills, and illustrate that we can transfer knowledge between simulated robotic arms with different numbers of links, as well as simulated arms with different actuation mechanisms, where one robot is torque-driven while the other is tendon-driven.



from cs.AI updates on arXiv.org http://ift.tt/2m3Yltf
via IFTTT

STransE: a novel embedding model of entities and relationships in knowledge bases. (arXiv:1606.08140v3 [cs.CL] UPDATED)

Knowledge bases of real-world facts about entities and their relationships are useful resources for a variety of natural language processing tasks. However, because knowledge bases are typically incomplete, it is useful to be able to perform link prediction or knowledge base completion, i.e., predict whether a relationship not in the knowledge base is likely to be true. This paper combines insights from several previous link prediction models into a new embedding model STransE that represents each entity as a low-dimensional vector, and each relation by two matrices and a translation vector. STransE is a simple combination of the SE and TransE models, but it obtains better link prediction performance on two benchmark datasets than previous embedding models. Thus, STransE can serve as a new baseline for the more complex models in the link prediction task.



from cs.AI updates on arXiv.org http://ift.tt/296ni3T
via IFTTT

DESPOT: Online POMDP Planning with Regularization. (arXiv:1609.03250v2 [cs.AI] UPDATED)

The partially observable Markov decision process (POMDP) provides a principled general framework for planning under uncertainty, but solving POMDPs optimally is computationally intractable, due to the "curse of dimensionality" and the "curse of history". To overcome these challenges, we introduce the Determinized Sparse Partially Observable Tree (DESPOT), a sparse approximation of the standard belief tree, for online planning under uncertainty. A DESPOT focuses online planning on a set of randomly sampled scenarios and compactly captures the "execution" of all policies under these scenarios. We show that the best policy obtained from a DESPOT is near-optimal, with a regret bound that depends on the representation size of the optimal policy. Leveraging this result, we give an anytime online planning algorithm, which searches a DESPOT for a policy that optimizes a regularized objective function. Regularization balances the estimated value of a policy under the sampled scenarios and the policy size, thus avoiding overfitting. The algorithm demonstrates strong experimental results, compared with some of the best online POMDP algorithms available. It has also been incorporated into an autonomous driving system for real-time vehicle control. The source code for the algorithm is available online.



from cs.AI updates on arXiv.org http://ift.tt/2cSC7X6
via IFTTT

Averaged-DQN: Variance Reduction and Stabilization for Deep Reinforcement Learning. (arXiv:1611.01929v3 [cs.AI] UPDATED)

Instability and variability of Deep Reinforcement Learning (DRL) algorithms tend to adversely affect their performance. Averaged-DQN is a simple extension to the DQN algorithm, based on averaging previously learned Q-values estimates, which leads to a more stable training procedure and improved performance by reducing approximation error variance in the target values. To understand the effect of the algorithm, we examine the source of value function estimation errors and provide an analytical comparison within a simplified model. We further present experiments on the Arcade Learning Environment benchmark that demonstrate significantly improved stability and performance due to the proposed extension.



from cs.AI updates on arXiv.org http://ift.tt/2egK64j
via IFTTT

3 teens send anonymous apology, $50 for library swastika

Three teenagers delivered an anonymous apology note and $50 to the Pennsylvania library where they sprayed a swastika using shaving cream in a ...

from Google Alert - anonymous http://ift.tt/2ng7L4U
via IFTTT

Anonymous

It's Festival Season! Get 15% OFF Storewide! Code: FESTIEBESTIE. Track Order. Join | Login. RageOn! Logo. Menu ...

from Google Alert - anonymous http://ift.tt/2m0Cf9Z
via IFTTT

Ravens will release 5-time Pro Bowl LB Elvis Dumervil - NFL Network; frees up $6M in cap space (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous family gives custodian truck to keep him working at Oklahoma school

A custodian in Oklahoma says he was surprised when someone bought him a truck to keep him working at a Tulsa school.

from Google Alert - anonymous http://ift.tt/2n6Xvg5
via IFTTT

10 Things You Need To Know About 'Wikileaks CIA Leak'

Yesterday WikiLeaks published thousands of documents revealing top CIA hacking secrets, including the agency's ability to break into iPhones, Android phones, smart TVs, and Microsoft, Mac and Linux operating systems. It dubbed the first release as Vault 7. Vault 7 is just the first part of leak series “Year Zero” that WikiLeaks will be releasing in coming days. Vault 7 is all about a covert


from The Hacker News http://ift.tt/2n6R38J
via IFTTT

Journalists should be careful with anonymous sources

Journalists should be careful with anonymous sources. March 8, 2017. Share on Facebook · Tweet on Twitter. You need to be logged in to see this ...

from Google Alert - anonymous http://ift.tt/2m2VxfG
via IFTTT

3 teens send anonymous apology, $50 for library swastika

(AP) — Three anonymous teenagers have delivered an apology note and $50 to the Pennsylvania library where they sprayed a swastika using ...

from Google Alert - anonymous http://ift.tt/2lYDdUf
via IFTTT

Anonymous download co

My Honest Anonymous Trader Review Share With You My Experience & Results with It Torrent Anonymously. How to Download Anonymously.

from Google Alert - anonymous http://ift.tt/2lEcfpI
via IFTTT

Ravens: Free agent WR Torrey Smith stops short of saying he'll return; "Top secret information" - Baltimore's 98 Rock (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 3/07/2017

Energy Requirements for Long-Term Space Flight (Energy): The crew completed urine collections for Day 6 of the 11-day Energy protocol, logging food and drink consumptions as well.  The Energy investigation measures adaptations in the components of total energy expenditure of crewmembers so that an equation to determine the energy requirements of crewmembers during space flight may be derived. Such knowledge of energy requirements is of a great importance to ensure health, good performance and the overall success of a mission, and also contributes to ensure adequate exercise load and cargo allotments for food during space flight. Body Measures: The Body Measures subject, with assistance from a trained operator, conducted Flight Day (FD) 105 Body Measures data collection session. The crew configured still cameras and video, collected the Neutral Body Posture video and stowed the equipment. NASA is collecting in-flight anthropometric data (body measurements) to assess the impact of physical body shape and size changes on suit sizing. Still and video imagery is captured and a tape measure is used to measure segmental length, height, depth, and circumference data for all body segments (chest, waist, hip, arms, legs, etc.) from astronauts before, during and after their flight missions. Auxin Transport: The crew initiated the fourth Auxin Transport experiment. They injected water into the chambers to prep for incubation in the Measurement Experiment Unit (MEU). Auxin Transport is a JAXA sponsored study to clarify the role of the plant hormone auxin under microgravity conditions. Specialists hope to collect gene expression data, including levles and redistribution of the proteins for auto-morphogensis (differentiation of tissues and subsequent growth without an introduced stimulus) using corn plants as the plant organism model for Auxin Transport 4. Node 3 (N3) Port Bulkhead Feedthrough Remove and Replace (R&R): The crew replaced three existing Bulkhead Feedthroughs on the Node 3 Port Bulkhead. This activity will provide a connectivity pathway for wireless payload data transmission and prepare for future utilization of the Node 3 Port location. N3 Port Common Berthing Mechanism (CBM) Control Panel Assembly (CPA): The crew took photos of the Vestibule with CPAs removed to identify any interference issues with the CPAs folded. They also photographed the Pressurized Mating Adapter (PMA)3 starboard hatchway surface to reveal any interference issues with the Hatch Depress Indicator. They then performed a fit check of the N3 Port Aft CPA in a folded down position with connectors still mated.  The activity was performed to test a concept to save crew time for visiting vehicle operations in the future by folding the CPAs out of the way versus completely removing and reinstalling the CPAs.  Onboard Training (OBT) – Emergency Response: During this OBT the 49S crew completed the following objectives for an ammonia leak scenario: Practiced ISS emergency response with crew and ground roles based on information provided by simulator displays. Physically translated through the ISS to the appropriate response locations. Practiced procedure execution and associated decision making based on cues provided by the simulator. Practiced communication and coordination with Mission Control Center-Houston (MCC-H) and MCC-Moscow as required. Today’s Planned Activities All activities were completed unless otherwise noted. HRF Generic Urine Collection HRF Generic Sample MELFI Insertion Operations ENERGY Diet Log of Breakfast Symbolic Activity (Setup) Activation of Orlan-MKC suit No.4. Body Measures Experiment Operations Ремонтные работы по установке накладных листов на панели интерьера СМ – подготовка S/G2 MRM2 Comm Config Activation of Orlan-MK suit No.5. Photo TV Pressurized Mating Adapter 3 (PMA 3) Video Setup Node 3 Port Bulkhead Feedthrough Remove and Replace Removal of БРТА-2 from Orlan-MK No.5 backpack. Node 3 Port Bulkhead Feedthrough Assist Removal of БРТА-2 from Orlan-MK No.5 backpack. SSC Device Reboot HRF Generic Urine Collection Stow Comm reconfig for nominal ops Removal of БК-3М main enclosure from Orlan- МКС No.4 backpack. Energy Urine Sample Collection Installation of БРТА-2 on Orlan-МКС No.4 backpack. Installation of backup БК-3М on Orlan-MKC No.4 ENERGY Water Sample Gathering Orlan-MKC No.4 ORUs. Energy Urine Sample Collection OCT Setup Auxin Transport Item Gather 24-hour ECG Recording (terminate) 24-hour BP recording (terminate) ENERGY Diet Log of Lunch APEX-04 Petri Plate Photo Auxin Transport Sample Preparation OCT Exam Auxin Transport Sample Preparation Cell Biology Experiment Facility (CBEF) Meas Exp Unit (MEU) Micro-G Attachment 24-hour ECG Recording (start) Progress 435 (DC1) Cargo Transfers and IMS Ops OCT Stow Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain Node 3 Port Common Berthing Mechanism (CBM) Controller Panel Assembly (CPA) Fitcheck VIZIR. Experiment Ops. Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain Part 2 Waste and Hygiene Compartment (WHC) Urine Processor Assembly (UPA) Configuration ISS HAM Radio Power Up Centerline Berthing Camera System Pressurized Mating Adapter Target Installation Public Affairs Office (PAO) High Definition (HD) Config LAB Setup Training for Emergency Response On-board ISS INTERACTION-2. Experiment Ops Pressurized Mating Adapter 3 (PMA3) Node 3 Port Hatch Close Verification of ИП-1 Flow Indicator Position Training for Emergency Response OBT IMS Update PAO Preparation Public Affairs Office (PAO) Event in High Definition (HD) – Lab Fundoscope Setup MERLIN 2 Desiccant Swap OBT ISS Emergency Drill Conference Fundoscope Prep Eye Exam – Fundoscope Fundoscope Tear Down and Stow ENERGY Diet Log of Dinner Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. JEMRMS SFA release, park N3 MCA Full Calibration Solar Array Maximum Power Evaluation Temporary Lab CDRA Activation Three-Day Look Ahead: Wednesday, 03/08: Eye Ultrasound, N3 Port CPA Install, NanoRack Module 9, APEX-4 Thursday, 03/09: CubeSate Deployer Removal, HXP Adapter Install, Fluid Shifts, EVA Tool Config, PMA3 Relocate Preps Friday: Rodent Research procedure review/equipment gather, Fluid Shifts, Cygnus OBT QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) On           [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace […]

from ISS On-Orbit Status Report http://ift.tt/2mXYoLc
via IFTTT

Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back

Is it wrong to hack back in order to counter hacking attack when you have become a victim? — this has been a long time debate. While many countries, including the United States, consider hacking back practices as illegal, many security firms and experts believe it as "a terrible idea" and officially "cautions" victims against it, even if they use it as a part of an active defense strategy.


from The Hacker News http://ift.tt/2mBdyVv
via IFTTT

[FD] SEC Consult SA-20170308-0 :: Multiple vulnerabilities in Navetti PricePoint

SEC Consult Vulnerability Lab Security Advisory < 20170308-0 > ======================================================================= title: Multiple vulnerabilities product: Navetti PricePoint vulnerable version: 4.6.0.0 fixed version: 4.7.0.0 or higher CVE number: - impact: high/critical homepage: http://www.navetti.com/ found: 2016-07-18 by: W. Schober (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

The Liberal Media's Anonymous-Sources Hypocrisy

Sanders shot back: "I love how anonymous sources don't count when it's something that's positive in this administration and against the former one.

from Google Alert - anonymous http://ift.tt/2mEPiCx
via IFTTT

Ravens place $1.797M tender on RFA Terrance West - source; would get 3rd-round pick if they don't match offer sheet from another team (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Tuesday, March 7, 2017

Johnny Anonymous

Showing 1-1 of 1 results for “Johnny Anonymous”. Sorted by date added, Popularity, Relevance, Release date, Title, Author. Filters. Filter search ...

from Google Alert - anonymous http://ift.tt/2m0sAkN
via IFTTT