Latest YouTube Video

Saturday, June 3, 2017

Food Addicts in Recovery Anonymous (Concord)

Food Addicts in Recovery Anonymous (FA) is a free Twelve Step recovery program for anyone suffering from food obsession, overeating, under-eating ...

from Google Alert - anonymous http://ift.tt/2qLWYli
via IFTTT

Français (France)

If you watch porn – sexually explicit videos, photographs, writings, or the like, produced to elicit sexual arousal – and enjoy it too, this article...

from Google Alert - anonymous http://ift.tt/2s56pQs
via IFTTT

The Steele Of Approval To An Anonymous Guy Who Helped Some Hockey Fans Get Stanley Cup ...

Jody hands out the Steele of Approval to an anonymous guy who helped some hockey fans get Stanley Cup tickets!

from Google Alert - anonymous http://ift.tt/2qLzxZk
via IFTTT

I have a new follower on Twitter


Eugene Tbone
are you living your dream?
Toledo, Ohio

Following: 4153 - Followers: 255

June 03, 2017 at 12:08PM via Twitter http://twitter.com/profeplligelma

Ravens are perfect landing spot for Jeremy Maclin, but team ranks among bottom five in salary-cap space - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

9 comments

This track is special for me and i hope everyone like it.

from Google Alert - anonymous http://ift.tt/2qRtCB9
via IFTTT

Insecure Hadoop Clusters Exposed Over 5,000 Terabytes of Data

Until last year, cyber criminals were only targeting computers of individuals and organisations with ransomware and holding them for ransom, but then they started targeting unprotected online databases and servers around the globe for ransom as well. Earlier this year, we saw notorious incidents where tens of thousands of unprotected MongoDB and Elasticsearch databases were hacked and held


from The Hacker News http://ift.tt/2s3QFNA
via IFTTT

I have a new follower on Twitter


Logan Weeks
you can chat with me http://https://t.co/XkWxliq7Mg


Following: 461 - Followers: 7

June 03, 2017 at 04:43AM via Twitter http://twitter.com/LoganWeeks12

Perijove Passage


On May 19, the Juno spacecraft once again swung by Jupiter in its looping 53 day orbit around the Solar System's ruling gas gaint. Beginning at the top, this vertical 14 frame sequence of enhanced-color JunoCam images follows the spacecraft's rapidly changing perspective during its two hour passage. They look down on Jupiter's north polar region, equatorial, and south polar region (bottom images). With the field-of-view shrinking, the seventh and eighth images in the sequence are close-up. Taken only 4 minutes apart above Jupiter's equator they were captured just before the spacecraft reached perijove 6, its closest approach to Jupiter on this orbit. Final images in the sequence pick up white oval storm systems, Jupiter's "String of Pearls", and the south polar region from the outward bound spacecraft. via NASA http://ift.tt/2svkh3d

Friday, June 2, 2017

Orioles Video: Manny Machado jumps on Rick Porcello's 3-1 pitch and rockets solo homer into upper deck in 3-2 win over Red Sox (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous Donors Pay Off Loan For 7hills Day Center

FAYETTEVILLE, AR -- 7hills Homeless Center announced on Tuesday (May 30) that a group of anonymous donors came forward to pay off a balloon ...

from Google Alert - anonymous http://ift.tt/2qJS9bT
via IFTTT

Ravens: Dennis Pitta's injury underscores how team has fallen short of building strong supporting cast around Joe Flacco - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Flix Anonymous - Episode 28

Trevor and Steve go off on this week's big release Wonder Woman, is it as great as everyone says? They also point you in the direction of an Academy ...

from Google Alert - anonymous http://ift.tt/2qJPfE8
via IFTTT

NFL: Ravens TE Dennis Pitta dislocated hip during Friday's OTA - Adam Schefter; 3rd time in 4 years he suffers same injury (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous Group Pays Balloon Payment to Keep 7Hills' Day Center Open

An anonymous group has paid down a balloon payment for 7Hills Homeless Center to keep their day center in south Fayetteville from closing.

from Google Alert - anonymous http://ift.tt/2qKJYQF
via IFTTT

After Bomb Threats, FCC Proposes Letting Police Unveil Anonymous Callers

Police should be allowed to unmask anonymous callers who have made serious threats over the phone, the Federal Communications Commission ...

from Google Alert - anonymous http://ift.tt/2snnTVO
via IFTTT

Ravens: Dennis Pitta re-injures hip at Friday's OTA; led team with career-high 86 receptions last season (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

WannaCry Coding Mistakes Can Help Files Recovery Even After Infection

Last month WannaCry ransomware hit more than 300,000 PCs across the world within just 72 hours by using its self-spreading capabilities to infect vulnerable Windows PCs, particularly those using vulnerable versions of the OS, within the same network. But that doesn't mean WannaCry was a high-quality piece of ransomware. Security researchers have recently discovered some programming errors in


from The Hacker News http://ift.tt/2rNvDTS
via IFTTT

Anonymous Faceless Woman Vector

Anonymous Faceless Woman Vector. Anonymous Faceless Woman Vector · Medical Service Graphic Design, Vector Illustration. Healthcare / Medical ...

from Google Alert - anonymous http://ift.tt/2s1q2sO
via IFTTT

ISS Daily Summary Report – 6/01/2017

SpaceX (SpX)-11 Launch: SpX-11 is scheduled to launch today at 4:55 pm CDT. Pending a successful launch, capture and berthing are planned for Sunday, June 4th at 9:00am CDT. Rodent Research-5 (RR-5):  The crew unpacked, installed and configured four Animal Habitats and configured the Microgravity Science Glovebox (MSG) for RR-5 operations to be performed after arrival of rodents and additional hardware and materials on SpaceX-11. The Ground team successfully completed a software checkout of all the Habitats. DOSIS 3D:  The crew de-installed DOSIS 3D passive detectors and handed them over to a Russian crewmember for packing for return on Soyuz 49S.  Data from the various active and passive radiation detectors are used in the determination of the radiation field parameters absorbed doses and dose equivalents inside the ISS. A concise three dimensional (3D) dose distribution map of all the segments of the ISS will be developed based on this data and data from JAXA and NASA monitoring devices. Matiss:  The crew de-installed the four Matiss Sample Holders from the Columbus module for return on 49S.  The MATISS experiment investigates the antibacterial properties of materials in space to see if future spacecraft could be made easier to clean. The experiment aims to understand the mechanisms of attachment of biofilms in microgravity conditions. MATISS objectives include simplification of decontamination operations to save crew time and validation of innovative surfaces for use in future spacecraft. ISS Change of Command: In preparation for 49S departure on Friday, Peggy Whitson handed over command of the ISS to Fyodor Yurchikhin. During this event, the entire crew discussed with Mission Control Center (MCC)-Houston and MCC-Moscow Flight Control their roles and responsibilities for the timeframe between the Change of Command event and tomorrow’s 49S departure.  Following the Change of Command, the new Commander’s Soyuz crew became prime for emergencies.  Today’s Planned Activities All activities were completed unless otherwise noted. Recharging Soyuz 733 Samsung PC Battery Soyuz 733 Stowage Ops and completing the right seat container packing Note 5 CASKAD. Connecting Anabioz Incubator to РБС and Power Up Rodent Research Habitat Install DOSIS 3D Passive Detectors De-Installation from Columbus (10 PDPs and 1 TDP). ISS RAM Handover to RS Crew for Soyuz Return On-Board Training (OBT) Dragon Emergency Review DOSIS 3D Passive Detector Pouch handover to Russian crew for download of dosimeters with Soyuz. Deinstallation of Matiss Sample Holders Rodent Research Habitat Install CASKAD. Starting Anabioz No. 2 Battery Charge STRUKTURA. Deactivation of crystallization process Photography Cyclops ICE Experiment Photos Rodent Research Habitat Install STRUKTURA.  Transfer of Luch-2 bag to Soyuz 733 Group Combustion Module (GCM)  Gas Bottle Unit Air (GBU) Change HRF Generic Ambient Blood Collection Setup Replacement of urine receptacle (МП) and filter-insert (Ф-В) in АСУ. [АСУ] Activation after Replacement Combustion Integrated Rack Alignment Guide Install Soyuz 733 right seat container transfer completion report (S-band) Combustion Integrated Rack Upper Rack Doors Open Signing ISS RS Handover Protocol On-Board Training (OBT) Dragon Emergency Review Combustion Integrated Rack Manifold Bottle Replacement Ultrasound 2 HRF Rack 1 Power On Crew Departure Preparations for Return to Earth Rodent Research Node 2 Camcorder Video Setup Combustion Integrated Rack Upper Rack Doors Close Rodent Research Microgravity Science Glovebox LSAH Setup Terminate Soyuz 733 Samsung PC Battery Recharge VHF2 Comm Test from Soyuz 733 via RGS Health Maintenance System (HMS) Ultrasound 2 Scan Prep Health Maintenance System (HMS) Ultrasound 2 Scan Health Maintenance System (HMS) Ultrasound 2 Data Export Group Combustion Module (GCM)  Gas Bottle Unit Air (GBU) Leak Check Public Affairs Office (PAO) High Definition (HD) Config LAB Setup Change of Command Health Maintenance System (HMS) Stow Reminder HRF Generic Ambient Blood Collection Reminder Rodent Research Thermal Consideration Soyuz 733 [СА] cooling down prior to descent Reminder 1 HRF Generic Saliva Collection Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. RR5 Habitat Install support Change of Command  Three-Day Look Ahead: Friday, 06/02: 49S undock/landing, OBT Dragon vehicle ops, Zbook deploy Saturday, 06/03: Crew off duty, housekeeping Sunday, 06/04: SpX-11 capture/berthing/vestibule outfitting QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Manual Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Full up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/2rjeRdK
via IFTTT

[FD] [CVE-2017-5688] Executable installers are vulnerable^WEVIL (case 52): Intel installation framework allows arbitrary code execution with escalation of privilege

CIA Implants This Windows Hacking Tool to Silently Hack Computers Over Network

WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to turn Windows file servers into covert attack machines that can silently infect other computers of interest inside a targeted network. Codenamed Pandemic, the tool is a persistent implant for Microsoft Windows machines that share files with remote users on a local


from The Hacker News http://ift.tt/2qIx063
via IFTTT

[FD] Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux

Qualys Security Advisory CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux ======================================================================== Contents ======================================================================== Analysis Exploitation Example Acknowledgments ======================================================================== Analysis ======================================================================== We discovered a vulnerability in Sudo's get_process_ttyname() for Linux: this function opens "/proc/[pid]/stat" (man proc) and reads the device number of the tty from field 7 (tty_nr). Unfortunately, these fields are space-separated and field 2 (comm, the filename of the command) can contain spaces (CVE-2017-1000367). For example, if we execute Sudo through the symlink "./ 1 ", get_process_ttyname() calls sudo_ttyname_dev() to search for the non-existent tty device number "1" in the built-in search_devs[]. Next, sudo_ttyname_dev() calls the function sudo_ttyname_scan() to search for this non-existent tty device number "1" in a breadth-first traversal of "/dev". Last, we exploit this function during its traversal of the world-writable "/dev/shm": through this vulnerability, a local user can pretend that his tty is any character device on the filesystem, and after two race conditions, he can pretend that his tty is any file on the filesystem. On an SELinux-enabled system, if a user is Sudoer for a command that does not grant him full root privileges, he can overwrite any file on the filesystem (including root-owned files) with his command's output, because relabel_tty() (in src/selinux.c) calls open(O_RDWR|O_NONBLOCK) on his tty and dup2()s it to the command's stdin, stdout, and stderr. This allows any Sudoer user to obtain full root privileges. ======================================================================== Exploitation ======================================================================== To exploit this vulnerability, we: - create a directory "/dev/shm/_tmp" (to work around /proc/sys/fs/protected_symlinks), and a symlink "/dev/shm/_tmp/_tty" to a non-existent pty "/dev/pts/57", whose device number is 34873; - run Sudo through a symlink "/dev/shm/_tmp/ 34873 " that spoofs the device number of this non-existent pty; - set the flag CD_RBAC_ENABLED through the command-line option "-r role" (where "role" can be our current role, for example "unconfined_r"); - monitor our directory "/dev/shm/_tmp" (for an IN_OPEN inotify event) and wait until Sudo opendir()s it (because sudo_ttyname_dev() cannot find our non-existent pty in "/dev/pts/"); - SIGSTOP Sudo, call openpty() until it creates our non-existent pty, and SIGCONT Sudo; - monitor our directory "/dev/shm/_tmp" (for an IN_CLOSE_NOWRITE inotify event) and wait until Sudo closedir()s it; - SIGSTOP Sudo, replace the symlink "/dev/shm/_tmp/_tty" to our now-existent pty with a symlink to the file that we want to overwrite (for example "/etc/passwd"), and SIGCONT Sudo; - control the output of the command executed by Sudo (the output that overwrites "/etc/passwd"): . either through a command-specific method; . or through a general method such as "--\nHELLO\nWORLD\n" (by default, getopt() prints an error message to stderr if it does not recognize an option character). To reliably win the two SIGSTOP races, we preempt the Sudo process: we setpriority() it to the lowest priority, sched_setscheduler() it to SCHED_IDLE, and sched_setaffinity() it to the same CPU as our exploit. ======================================================================== Example ======================================================================== We will publish our Sudoer-to-root exploit (Linux_sudo_CVE-2017-1000367.c) in the near future: [john@localhost ~]$ head -n 8 /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt [john@localhost ~]$ sudo -l [sudo] password for john: ... User john may run the following commands on localhost: (ALL) /usr/bin/sum [john@localhost ~]$ ./Linux_sudo_CVE-2017-1000367 /usr/bin/sum $'--\nHELLO\nWORLD\n' [sudo] password for john: [john@localhost ~]$ head -n 8 /etc/passwd /usr/bin/sum: unrecognized option

Source: Gmail -> IFTTT-> Blogger

[FD] DefenseCode ThunderScan SAST Advisory: WordPress No External Links Plugin Security Vulnerability

DefenseCode ThunderScan SAST Advisory WordPress No External Links Plugin Security Vulnerability Advisory ID: DC-2017-01-022 Advisory Title: WordPress No External Links Plugin Security Vulnerability Advisory URL: http://ift.tt/2rhPqdW Software: WordPress No External Links Plugin Language: PHP Version: 3.5.17 and below Vendor Status: Vendor contacted, update released Release Date: 2017/05/29 Risk: Medium 1. General Overview =================== During the security audit of No External Links plugin for WordPress CMS, security vulnerability was discovered using DefenseCode ThunderScan application source code security analysis platform. More information about ThunderScan is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the plugin developers, this plugin has many cool features – outgoing clicks stats, fulllink masking, custom redirects, masking links to digital short code and base64 encoding and so on. It is designed for specialists who sell different kind of advertisment on their web site (for example, with sape system) and care about the number of outgoing links that can be found by search engines. It has more than 20,000 downloads on wordpress.org. Homepage: http://ift.tt/1yFRdIk http://ift.tt/2s0BsNf 3. Vulnerability Description ================================== During the security analysis, ThunderScan discovered Cross-Site Scripting vulnerability in No External Links WordPress plugin. The Cross-Site Scripting vulnerability can enable the attacker to construct the URL that contains malicious JavaScript code. If the administrator of the site makes a request to such an URL, the attacker's code will be executed, with unrestricted access to the WordPress site in question. The attacker can entice the administrator to visit the URL in various ways, including sending the URL by email, posting it as a part of the comment on the vulnerable site or another forum. 3.1. Cross-Site Scripting Function: echo Variable: $_REQUEST['date1'], $_REQUEST['date2'] Sample URL: http://ift.tt/2qH78U5">Sample URL: http://ift.tt/2s0RmYh">File: wp-noexternallinks\wp-noexternallinks-options.php

Source: Gmail -> IFTTT-> Blogger

[FD] DefenseCode ThunderScan SAST Advisory: WordPress Simple Slideshow Manager Plugin Multiple Security Vulnerabilities

DefenseCode ThunderScan SAST Advisory WordPress Simple Slideshow Manager Plugin Multiple Security Vulnerabilities Advisory ID: DC-2017-02-016 Advisory Title: WordPress Simple Slideshow Manager Plugin Multiple Vulnerabilities Advisory URL: http://ift.tt/2rhPqdW Software: WordPress Simple Slideshow Manager Plugin Language: PHP Version: 2.2 and below Vendor Status: Vendor contacted, update released Release Date: 2017/05/29 Risk: Medium 1. General Overview =================== During the security audit of Simple Slideshow Manager plugin for WordPress CMS, multiple vulnerabilities were discovered using DefenseCode ThunderScan application source code security analysis platform. More information about ThunderScan is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the plugin developers, Simple Slideshow Manager is "The easy and best slideshow manager plugin where you can create any number of slideshow. Can have any number of video or image slides, Enjoy displaying slideshow using widgets, shortcodes or php codes." It has more than 9,000 active installs according to wordpress.org. Homepage: http://ift.tt/2rh3fGN http://ift.tt/2qwX8kt 3. Vulnerability Description ================================== During the security analysis, ThunderScan discovered Cross-Site Scripting vulnerabilities in Simple Slideshow Manager WordPress plugin. The Cross-Site Scripting vulnerabilities can enable the attacker to construct the URL that contains malicious JavaScript code. If the administrator of the site makes a request to such an URL, the attacker's code will be executed, with unrestricted access to the WordPress site in question. The attacker can entice the administrator to visit the URL in various ways, including sending the URL by email, posting it as a part of the comment on the vulnerable site or another forum. In the specific case of the second Cross-Site scripting vulnerability (3.2), some modern browsers URL encode the < and > characters. The easiest way to reproduce the vulnerability is to use Internet Explorer, or older version of some other browser. 3.1. Cross-Site Scripting Function: echo Variable: $_GET['name'] Sample URL: http://ift.tt/2rECtuU">File: simple-slideshow-manager\includes\option_fields.php

Source: Gmail -> IFTTT-> Blogger

[FD] DefenseCode WebScanner DAST Advisory: WordPress Tribulant Newsletters Plugin Multiple Security Vulnerabilities

DefenseCode WebScanner DAST Advisory WordPress Tribulant Newsletters Plugin Multiple Security Vulnerabilities Advisory ID: DC-2017-01-012 Advisory Title: WordPress Tribulant Newsletters Plugin Multiple Vulnerabilities Advisory URL: http://ift.tt/2rhPqdW Software: WordPress Tribulant Newsletters Plugin Language: PHP Version: 4.6.4.2 and below Vendor Status: Vendor contacted, update released Release Date: 2017/05/29 Risk: Medium 1. General Overview =================== During the security audit of Tribulant Newsletters plugin for WordPress CMS, multiple vulnerabilities were discovered using DefenseCode WebScanner application security analysis platform. More information about WebScanner is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the authors, WordPress Tribulant Newsletters plugin is a full-featured newsletter plugin for WordPress which fulfils all subscribers, emails, marketing and newsletter related needs for both personal and business environments. According to wordpress.org, it has more than 9,000 active installs. Homepage: http://ift.tt/1yLaLL1 http://ift.tt/1Gy8lOT 3. Vulnerability Description ================================== During the security analysis, WebScanner discovered File Disclosure vulnerability and multiple Cross Site Scripting vulnerabilities in Tribulant Newsletters plugin. 3.1 File Disclosure -

Source: Gmail -> IFTTT-> Blogger

Black Holes of Known Mass


Add GW170104 to the chart of black holes with known mass. The extremely energetic merger of two smaller black holes corresponds to the Laser Interferometer Gravitational-wave Observatory's (LIGO) third detection of gravitational waves. The newfound black hole has a mass about 49 times that of the Sun, filling a gap between the masses of the two merged black holes detected previously by LIGO, with solar masses of 62 (GW150914) and 21 (GW151216). In all three cases, the signal in each of the twin LIGO detectors was unambiguously identified as coming from black hole mergers while a fourth case (LVT151012) resulted in a lower confidence detection. GW170104 is estimated to be some 3 billion light-years away, more distant than present estimates for GW150914 and GW151216. The ripples in spacetime were discovered during LIGO's current observing run, which began November 30, 2016 and will continue through the summer. via NASA http://ift.tt/2ron3b5

Thursday, June 1, 2017

Orioles Video: Chris Davis smacks solo home run deep to center during 7-5 win over Red Sox (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

This Just In: CB Tavon Young suffered torn ACL during Thursday's practice and will miss 2017 season - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

OneLogin Password Manager Hacked; Users’ Data Can be Decrypted

Do you use OneLogin password manager? If yes, then immediately change all your account passwords right now. OneLogin, the cloud-based password management and identity management software company, has admitted that the company has suffered a data breach. The company announced on Thursday that it had "detected unauthorised access" in its United States data region. <!-- adsense --> Although the


from The Hacker News http://ift.tt/2rvoxCx
via IFTTT

I have a new follower on Twitter


Jesse Randall
Deviant strategist. Fundraising, financial modeling, B2B sales, content strategy. Live and die for start-ups. Constantly training for the next Ironman.
Phoenix, Arizona
https://t.co/K7tkaKMbGd
Following: 12003 - Followers: 12903

June 01, 2017 at 03:22PM via Twitter http://twitter.com/deviantstrat

Orioles: Manny Machado is scuffling like he has never scuffled before; Eddie Matz examines what's troubling the 3-time All-Star (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ravens: CB Tavon Young helped off field after injuring leg midway through Thursday's practice; extent of injury still unknown (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Putin: Hackers Are Like Artists, Who Wake Up In A Good Mood & Start Painting

Just control your laughter, while reading this article. I insist. Talking to international media at the St Petersburg Economic Forum on Thursday, Russian President Vladimir Putin made a number of statement surrounding alleged Russia's involvement in hacking. If you are not aware, Russia has been the focus of the U.S. investigations for its purported role in interfering with the 2016 US


from The Hacker News http://ift.tt/2rptwT3
via IFTTT

Ravens: Football Power Index predicts 9-7 record for 2017 season, 48.6 percent chance to make playoffs (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Beware! Nearly 250 Million Computers Infected with Fireball Malware

Security researchers have discovered a massive malware campaign that has already infected more than 250 million computers across the world, including Windows and Mac OS. Dubbed Fireball, the malware is an adware package that takes complete control of victim's web browsers and turns them into zombies, potentially allowing attackers to spy on victim's web traffic and potentially steal their data.


from The Hacker News http://ift.tt/2qG0DFc
via IFTTT

ISS Daily Summary Report – 5/31/2017

Passive Thermal Testbed:  The crew removed the Electro-Wetting Drawer and replaced it with the Heat Pipe Drawer for the Passive Thermal Testbed investigation. The PTT demonstrates the in-space performance of three advanced thermal management technologies, an important step toward improving these technologies for use on future space exploration missions. The investigation leverages the fluid cooling capabilities of another ISS experiment, the Phase Change Heat eXchanger (PCHX).  It includes a suite of advanced heat pipe based technology devices: (1) a new hybrid wick, warm biased integrated reservoir, variable conductance heat pipe that can passively adjust to changing thermal conditions, allowing efficient energy transport in warm conditions and power conservation in cold conditions; (2) a high conductivity plate for heat acquisition and heat sharing; and (3) an early concept electro-wetting heat pipe that has the potential to increase heat transport by orders of magnitude over existing heat pipes.  Cardiac Stem Cells:  The crew set up Life Science hardware in the Microgravity Science Glovebox (MSG) to support Cardiac Stem Cell operations to be conducted after arrival of samples and media on the SpaceX-11 vehicle.  Cardiac Stem Cells investigates how microgravity affects stem cells and the factors that govern stem cell activity, including physical and molecular changes.  Spaceflight is known to affect cardiac function and structure, but the biological basis for this is not clearly understood. This investigation helps clarify the role of stem cells in cardiac biology and tissue regeneration. In addition, this research could support confirmation of the hypothesis that microgravity accelerates the aging process. NanoRacks Module-55:  Following completion of all sample runs for the investigation, the crew removed and stowed NanoRacks Module-55 hardware from the front of NanoRacks Platform-1 in the Japanese Experiment Module (JEM).  The NanoRacks Module-55 investigation supports research into why bacteria are more virulent in space and grow more rapidly there.  It focuses on the bacterial lag phase, the period prior to the beginning of exponential bacterial growth, which is much shorter in microgravity than it is on Earth.  The experiment uses a centrifuge to simulate gravity, allowing a comparison of microgravity and simulated-gravity Escherichia coli (E. coli) cultures to determine whether microgravity itself causes changes in bacterial growth.  Bigelow Expandable Activity Module (BEAM):  The crew ingressed the BEAM and installed a Radiation Environment Monitor (REM) shield onto a REM sensor.  This shield is a 3.3 mm thick component produced by the 3D printer on the ISS.  BEAM is an experimental expandable module attached to the ISS.  Expandable modules weigh less and take up less room on a rocket than a traditional module, while allowing additional space for living and working. They provide protection from solar and cosmic radiation, space debris, and other contaminants. Crews traveling to the moon, Mars, asteroids, or other destinations could possibly use them as habitable structures.  Fine Motor Skills: The crew completed a series of interactive tasks during a FMS session which studies how the fine motor skills are effected by long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity. The goal of the investigation is to determine how fine motor performance in microgravity trends/varies over the duration of a six-month and year-long space mission; how fine motor performance on orbit compare with that of a closely matched participant on Earth; and how performance trends/varies before and after gravitational transitions, including periods of early flight adaptation and very early/near immediate post-flight periods.  Dose Tracker:  The crew completed a weekly medication tracking entry in the Dose Tracker application.  Dose Tracker documents the medication usage of crewmembers before and during their missions by capturing data regarding medication use during spaceflight, including side effect qualities, frequencies and severities. The investigation is expected to provide anecdotal evidence of medication effectiveness during flight and any unusual side effects experienced. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics or pharmacodynamics is occurring during missions. On-Board Training (OBT) Robotics On-Board Trainer (RoBOT): SpX-11 is scheduled to launch Thursday, June 1 and berth to the ISS on June 4.  In preparation for capture and berthing, the crew performed a session of this training during which they completed 3 capture point hold runs to practice free drift timing, malfunction response and nominal rate approaches.  Emergency Roles & Responsibilities Review: In preparation for departure of the 49S crew this Friday, the 50S crew reviewed individual duties during an emergency response. Topics covered included crew accountability, escape vehicle readiness, ISS Commander responsibilities and communication and coordination with the various Control Centers. Crew Quarters (CQ) Cleaning: In preparation for his departure from the ISS this Friday, FE-5 cleaned his CQ including intake and exhaust ducts, fans and airflow sensors.  Today’s Planned Activities All activities were completed unless otherwise noted. Preparation of Personal Items for Return IMS Update ZBook Client Swap (SSC14 – NOD2 CQ) ZBook Client Swap (SSC20 – NOD2 CQ) Test Video Recording for RT Channel Preparation of Reports for Roscosmos Web Site and Social Media ECON-M. Observation and Photography HRF Generic Sample MELFI Retrieval Insertion Operations Functional Immune Saliva Collection Dry Book – Subject SSC 18 power off Fine Motor Skills Experiment Test – Subject Dose Tracker Data Entry Subject Soyuz 733 Stowage for Return Emergency Roles and Responsibilities Review Phase Change HX Circuit Breaker OFF Manufacturing Device Print Removal, Clean and Stow NanoRacks Module-55 Stow Meteor Hard Drive Swap out ISS HAM Service Module Pass Combustion Integrated Rack Alignment Guide Removal Photo/TV Camcorder Setup Verification Electro-Wetting Drawer Locker Remove Heat Pipe Drawer Install 1 Cardiac Stem Cells MSG Life Science Hardware Setup Sanitary & Hygiene Status Monitoring In Flight Maintenance (IFM) Crew Quarters (CQ) Deck Cleaning Photo/TV N3/BEAM Camcorder Setup Bigelow Expandable Activity Module (BEAM) Node 3 Aft Unstow ARED Platform Partial Fold Bigelow Expandable Activity Module (BEAM) Ingress Environmental Health System (EHS) – Radiation Area Monitors (RAM) Retrieve Multi-purpose Small Payload Rack (MSPR) /Group Combustion Module (GCM) Component Deactivation Swap Station Support Computers (SSCs) 12 […]

from ISS On-Orbit Status Report http://ift.tt/2srOobE
via IFTTT

Online Training for CISA, CISM, and CISSP Cyber Security Certifications

Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. With more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves. That's why jobs in the cyber security field have gone up 80% over the past three years


from The Hacker News http://ift.tt/2qES9hy
via IFTTT

High-Severity Linux Sudo Flaw Allows Users to Gain Root Privileges

A high-severity vulnerability has been reported in Linux that could be exploited by a low privilege attacker to gain full root access on an affected system. The vulnerability, identified as CVE-2017-1000367, was discovered by researchers at Qualys Security in Sudo's "get_process_ttyname()" function for Linux that could allow a user with Sudo privileges to run commands as root or elevate


from The Hacker News http://ift.tt/2qIHopK
via IFTTT

Annual Arctic Sea Ice Minimum 1979-2016 with Area Graph

Satellite-based passive microwave images of the sea ice have provided a reliable tool for continuously monitoring changes in the Arctic ice since 1979. Every summer the Arctic ice cap melts down to what scientists call its "minimum" before colder weather begins to cause ice cover to increase. This graph displays the area of the minimum sea ice coverage each year from 1979 through 2016. In 2016, the Arctic minimum sea ice covered an area of 3.57 million square kilometers. This visualization shows the expanse of the annual minimum Arctic sea ice for each year from 1979 through 2016 as derived from passive microwave data. A graph overlay shows the area in million square kilometers for each year's minimum day. The date shown in the upper right corner indicates the current year being displayed.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2rrI3jb
via IFTTT

Temperature, Reflectance Point to Frost near the Moon's Poles

Scientists studying data from Lunar Reconnaissance Orbiter (LRO) have found evidence of surface frost near the poles on the Moon. Elizabeth Fisher, Paul Lucey, and their colleagues combined temperature data from LRO's Diviner instrument with reflectance from its laser altimeter (LOLA) to find places that are cold enough and shiny enough to indicate the possible presence of surface water ice. Their results appear in the August, 2017 issue of the journal Icarus.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2sppRnQ
via IFTTT

Image of the Arctic Sea ice - September 10, 2016

Satellite-based passive microwave images of the sea ice have provided a reliable tool for continuously monitoring changes in the Arctic ice since 1979. Every summer the Arctic ice cap melts down to what scientists call its "minimum" before colder weather begins to cause ice cover to increase. The first six months of 2016 have been the warmest first half of any year in our recorded history of surface temperature (which goes back to 1880). Data shows that the Arctic temperature increases are much bigger, relatively, than the rest of the globe. The Japan Aerospace Exploration Agency (JAXA) provides many water-related products derived from data acquired by the Advanced Microwave Scanning Radiometer 2 (AMSR2) instrument aboard the Global Change Observation Mission 1st-Water "SHIZUKU" (GCOM-W1) satellite. Two JAXA datasets used in this animation are the 10-km daily sea ice concentration and the 10 km daily 89 GHz Brightness Temperature. This image shows the Arctic sea ice on September 10, 2016 when the ice reached its minimum extent. The opacity of the sea ice is derived from the sea ice concentration where it is greater than 15. The blueish white color of the sea ice is derived the AMSR2 89 GHz brightness temperature.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2rrBtZX
via IFTTT

Wednesday, May 31, 2017

Commercial PV Designer III

Commercial PV Designer III in with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2rGZai4
via IFTTT

Orioles Video: Adam Jones returns from injury with three-run homer to center in 10-4 victory over Yankees (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Why Anonymous Sources Matter

President Trump has one response to the cascade of news stories connecting his aides and advisers to Russian interests. Instead of rebutting the ...

from Google Alert - anonymous http://ift.tt/2qHoEH8
via IFTTT

Anonymous Cav Says JaVale McGee Not Smart Enough To Play In NBA Finals

That prompted McMenamin to respond, “I had a Cavs player disagree with your opinion of McGee, Brian.” “He postulated to me that he doesn't even ...

from Google Alert - anonymous http://ift.tt/2rd3lAR
via IFTTT

Workbench JavaScript Formula Fields Results - Now What?

QualifiedApiName.endsWith('kav')){ Execute Anonymous: Execute Anonymous: entityNames.add(entityDef.QualifiedApiName); Execute Anonymous: ...

from Google Alert - anonymous http://ift.tt/2rlLmpZ
via IFTTT

Orioles: Robert Andino suspended 50 games under baseball's minor league drug program following positive test for Amphetamine (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

I have a new follower on Twitter


Will Botz
and I swear I hate you when you leave.
Scottsdale, Arizona

Following: 4190 - Followers: 123

May 31, 2017 at 06:25PM via Twitter http://twitter.com/seredrapepot

Orioles: Adam Jones (ankle, hip) in starting lineup Wednesday vs. Yankees after missing last four games (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles: Welington Castillo may end up on DL after being hit in groin by foul ball Tuesday, says Buck Showalter (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles: Manny Machado leads AL 3B in first All-Star ballot update; Welington Castillo 2nd at C (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Food Addicts in Recovery Anonymous (FA) - Tonight in Hanover

Tracy Hall Gym, Norwich, VT. May 31st | 5:15 AM. Advertise with DailyUV! Mix It Up! Woodstock Athletic Club. May 31st | 5:30 AM. Core stability class.

from Google Alert - anonymous http://ift.tt/2rl2NXM
via IFTTT

US Defense Contractor left Sensitive Files on Amazon Server Without Password

Sensitive files linked to the United States intelligence agency were reportedly left on a public Amazon server by one of the nation's top intelligence contractor without a password, according to a new report. UpGuard cyber risk analyst Chris Vickery discovered tens of thousands of documents from a US military project for the National Geospatial-Intelligence Agency (NGA) left unsecured on


from The Hacker News http://ift.tt/2qGLaQb
via IFTTT

Ravens: John Harbaugh lauds early work of new S Tony Jefferson; "My impressions would be A-plus in every area" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous user 414b5f

Name, Anonymous user 414b5f. User since, May 19, 2017. Number of add-ons developed, 2 themes. Average rating of developer's add-ons, Not yet ...

from Google Alert - anonymous http://ift.tt/2qBikSj
via IFTTT

ISS Daily Summary Report – 5/30/2017

Human Research Program (HRP): A 49S crewmember collected Return minus 15 days (R-15) blood and urine samples for Vascular Echo, Biochem Profile, and Marrow investigations as well as air samples for Marrow and ultrasound measurements for Vascular Echo.  The Vascular Echo investigation examines changes in blood vessels and the heart while crew members are in space, then follows their recovery when they return to Earth. The results could provide insight into potential countermeasures to help maintain crewmembers’ health.  A new, powerful, relatively easy to use ultrasound system will be used that could provide new opportunities for experimentation aboard the ISS.  In the field of telemedicine on Earth, such tele-operated scanners could result in progress in the medical management of persons in remote areas. The Biochem Profile experiment tests blood and urine samples obtained from astronauts before, during and after spaceflight.  Specific proteins and chemicals in the samples are used as biomarkers, or indicators of health. Post-flight analysis yields a database of samples and test results which scientists can use in their study of the effects of spaceflight on the body. The Marrow investigation identifies the effect of microgravity on bone marrow.  It is believed that microgravity, like long-duration bed rest on Earth, has a negative effect on blood cell production in bone marrow. Group Combustion Module (GCM):  The crew exchanged fuel supply syringes and reinstalled the Combustion Chamber back in MSPR Work Volume for continued GCM operations. The Group Combustion investigation tests combustion changes of fuel sprays as flames spread across a cloud of droplets. In the MSPR, fuels are arranged randomly on thin-fiber lattice points and the flame and droplet positions and temperature distribution are measured as the flame spreads.  Microgravity blocks convection, which on Earth would quickly disperse the droplets and combustion products before such measurements could be made.  NanoRack Cubesat Deployer (NRCSD) #12: The crew brought the JEM (Japanese Experiment Module) Airlock (JEMAL) Slide Table (ST) into the JEM and remove the NRCSD #12 Quad Deployer from the Multi-Purpose Experiment Platform (MPEP). This activity is in preparation for the installation of Japanese Small Satellite Orbital Deployer #7 (J-SSOD #7) installation on the ST planned for June 16, 2017. Veg-03: The crew completed the final harvest of leaves for crew consumption from Chinese Cabbage growing in the Veggie facility. They also placed VEG-03 plant samples, swabs, and water syringes into a Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI) for return to the ground and cleaned the Veggie facility.  The goal of Veg-03 is to further demonstrate the proof of concept for the Veggie plant growth chamber and planting pillows. Future long-duration missions into the solar system will require a fresh food supply to supplement crew diets, which entails growing crops in space. Previous investigations focused on improving productivity in controlled environments but the limited quarters of the space shuttle and ISS made it difficult to conduct large-scale crop production tests. Veg-03 expands on previous validation tests of the Veggie hardware to grow cabbage, lettuce and other fresh vegetables. Tests determine which types of microorganisms are present in space-grown cabbage, providing baseline data for future crop-growing efforts. Behavioral health surveys assess the impact of growing plants on crew morale and mood. On-Board Training (OBT) Health Maintenance System (HMS):  FE-2 performed refresher training for the HMS which is a subsystem of Crew Health Care System (CHeCS) that monitors crew health, responds to crew illness and/or injury, and provides preventive health care. These lessons provide a refresher course and cover some of the equipment and procedures that are taught in the Crew Medical Officer (CMO) classes. Today’s Planned Activities All activities were completed unless otherwise noted. HRF Generic Saliva Collection HRF Generic Sample MELFI Retrieval Insertion Operations HRF Generic Urine Collection HRF Generic Sample MELFI Insertion Operations HRF Generic Frozen Blood Collection Double Spin Collection Checking the Results of Antivirus Scanning on Auxiliary Computer System [ВКС] Laptops and Report to MCC Ultrasound 2 HRF Rack 1 Power On HRF Generic Refrigerated Centrifuge Double Spin Configuration 2 Transfer from CWC-I into EDV HRF Generic Sample MELFI Insertion NanoRacks Module 52 Troubleshooting Placeholder Video Recording of Greetings HRF Generic Refrigerated Centrifuge Spin Conclude HRF Generic Sample MELFI Insertion Meteor Shutter Open JPM Fwd Window Shutter Open Transfer from CWC-I into EDV EHS TOCA Water Recovery System (WRS) Sample Analysis HRF Generic Frozen Blood Collection Conclude Stow Crew Medical Officer (CMO) On Board Training (OBT) R&R of Three Light Units in СД1-7 in MRM1 Soyuz 733 GoPro HERO3 (6 ea.) Charging HRF Generic Urine Collection Stow Air Samples Collection with [АК-1М] Sampler in the SM and FGB Vascular Echo Resting Ultrasound Scan 135 Minutes – Subject Glacier Express Rack Remove Air Samples Collection for Ammonia with [ИПД] Sampler in the SM LBNP Training EXPRESS Rack 6 Locker Removal ISS Locker Config MAMS Data Port Swap MSPR Group Combustion Module (GCM) Component Activation Prep Time for Return to Earth Change of Display Settings on RSE-Med and RSE-2 Laptops RFID Logistics Reader Vascular Echo CDL Holter Arterial BP Measurement – Subject CALCIUM. Photography of Bioekologiya Cases, Photographs Processing and Downlink, Preparation for Return to Earth Multi-purpose Small Payload Rack (MSPR) Combustion Chamber (CC) Valve 2 Operation Soyuz 733 GoPro HERO3 (6 ea.) Charging (end) Multi-purpose Small Payload Rack (MSPR) Combustion Chamber (CC) GN2 Exhaust part 1 in Leak Permissible experiment RGN Wastewater Storage Tank Assembly (WSTA) Fill Public Affairs Office (PAO) High Definition (HD) Config Columbus Setup Health Maintenance System (HMS) – OCT Exam EDV (KOV) Filling (Degassing) for Elektron or EDV-SV Packing of Items for Disposal in Soyuz 733 Health Maintenance System (HMS) OCT Stow JEM Airlock Press Environmental Health System (EHS) Total Organic Carbon Analyzer (TOCA) Sample Data Record Multi-purpose Small Payload Rack (MSPR) Combustion Chamber (CC) GN2 Exhaust part 2 in Leak Permissible experiment Vascular Echo Exercise PDOP Measurement – Subject JEM Airlock Leak Check MAMS Cable Swap Photo/TV. Checking Camcorder Settings JEM Airlock Slide Table (ST) Extension to JPM Side NanoRacks CubeSat Deployer Removal from the MPEP VZAIMODEISTVIYE-2. Experiment […]

from ISS On-Orbit Status Report http://ift.tt/2qAXSki
via IFTTT

Summary: Go Down, Moses by Anonymous [PDF for iPad]

Read online Summary: Go Down, Moses by Anonymous [PDF for iPad] Buy Summary: Go Down, Moses by Anonymous [PDF for iPad] Download and ...

from Google Alert - anonymous http://ift.tt/2rjnHqb
via IFTTT

LinkedIn Hacker, Wanted by US & Russian, Can be Extradited to Either State

The alleged Russian hacker, who was arrested by the Czech police in Prague last October on suspicion of massive 2012 data breach at LinkedIn, can be extradited to either the United States or Russia, a Czech court ruled on Tuesday. Yevgeniy Aleksandrovich Nikulin, a 29-years-old Russian national, is accused of allegedly hacking not just LinkedIn, but also the online cloud storage platform


from The Hacker News http://ift.tt/2rjihLX
via IFTTT

Tuesday, May 30, 2017

UVA Police investigate anonymous bomb threats across the Grounds.

(CHARLOTTESVILLE – WINA) The University of Virginia Police are investigating anonymous bomb threats on the Grounds. Spokesman Ben Rexrode ...

from Google Alert - anonymous http://ift.tt/2skjaDv
via IFTTT

Summary and review: The Seafarer by Anonymous [PDF for iPad]

Anybody will appear my summary and review: the seafarer by anonymous [pdf for ipad] the easy jumbo for the wide scarf. Her is the simplest packet ...

from Google Alert - anonymous http://ift.tt/2sjUkU9
via IFTTT

Romantics Anonymous

Romantics Anonymous is an unusual and tender love story in which the obstacles to happiness are not the usual external barriers, but those sneaky ...

from Google Alert - anonymous http://ift.tt/2rlXkSN
via IFTTT

This Just In: Orioles scratch Adam Jones from Tuesday's lineup as a precaution due to wet field conditions; Joey Rickard will start in CF (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles: Adam Jones (ankle, hip) back in lineup Tuesday vs. Yankees; sat out last three games (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

I have a new follower on Twitter


Victoria Harmon
if you want to my naked photos her https://t.co/OrUr7jtY76


Following: 0 - Followers: 1

May 30, 2017 at 02:00PM via Twitter http://twitter.com/Victori09691048

Publish as an anonymous author or using

Hello, I'm new to this world. Today I uploaded my first book with my real name on the cover page. In the registration form i filled all the fields with my ...

from Google Alert - anonymous http://ift.tt/2s9Z2nZ
via IFTTT

Quarter Million Dollar Anonymous by Trappin Anonymous

@Christylezz Presents Trappin Anonymous Quarter Million Anonymous in this episode listen to the stories of running into a large some of money at an ...

from Google Alert - anonymous http://ift.tt/2rAz0NX
via IFTTT

Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication

What if your laptop is listening to everything that is being said during your phone calls or other people near your laptop and even recording video of your surrounding without your knowledge? Sounds really scary! Isn't it? But this scenario is not only possible but is hell easy to accomplish. A UX design flaw in the Google's Chrome browser could allow malicious websites to record audio or


from The Hacker News http://ift.tt/2shpA6k
via IFTTT

ISS Daily Summary Report – 5/29/2017

Cardio Ox Ultrasound:  A 50S crewmember completed their Flight Day (FD) 180 ultrasound, blood pressure and Electrocardiogram (ECG) measurements for the Cardio Ox investigation.  With scanning assistance from a Crew Medical Officer (CMO) and ground remote guidance specialists, the crew donned ECG electrodes and marked the Carotid and Brachial arteries for scanning.  By collecting ultrasound and ECG data along with blood and urine samples scientists will attempt to determine whether biological markers of oxidative and inflammatory stress are elevated during and after space flight and whether this results in an increased, long-term risk of atherosclerosis in astronauts. Vascular Echo: A crewmember performed Vascular Echo resting ultrasound and blood pressure measurements. With assistance from a ground remote guidance team, he scanned his neck, thigh and heart. This Canadian Space Agency (CSA) investigation examines changes in blood vessels and the heart while crew members are in space, then follow their recovery on return to Earth. Results could provide insight into potential countermeasures to help maintain crew member health and quality of life for everyone.  Radiation Dosimetry Inside ISS-Neutron (RaDI-N) Retrieval: The crew retrieved all 8 of the Space Bubble Detectors that were deployed last week in the Node 3 module for the RaDI-N experiment and handed them to the Russian crew to be processed in the Bubble Reader. This CSA investigation measures neutron radiation levels while onboard the ISS.  Bubble detectors are used as neutron monitors designed to only detect neutrons and ignore all other radiation.  Manufacturing Device (MD): The Manufacturing Device failed to complete the 12 hour print of a Radiation Environment Monitoring shield on Friday and during a second attempt yesterday. The REM shield was to be installed in the BEAM during ingress later this week. The Made-In-Space team is assessing the anomaly.  The MD – Additive Manufacturing Facility (AMF) enables the production of components on the ISS to meet both NASA and commercial objectives.  Parts, entire experiments, and tools can be created on demand utilizing the AMF.  The AMF is capable of producing parts using a wide variety of thermopolymers, including engineered plastics. Extravehicular Mobility Unit (EMU) Suit Maintenance: Following last week’s removal of EMUs 3006 and 3008 and installation of EMUs 3003 and 3010 on the Equipment Lock EMU Don/Doff Assembly the crew performed routine maintenance on EMU 3003 and 3010 including a loop scrub, iodination and conductivity tests.  Soyuz 49 (49S) Nominal Descent Drill: The 49S Crew performed a nominal Soyuz Descent Drill in preparation for their return to earth.  Soyuz undock is scheduled for June 2, 2017 at 5:48 AM CDT with landing occurring at 9:10 AM CDT. Commercial Orbital Transport Services (COTS) UHF Communication Unit (CUCU) Checkout:  In preparation for the upcoming SpaceX-11 capture and berthing planned for June 4th, the crew coordinated with ground teams to activate the CUCU System and perform a Crew Command Panel (CCP) checkout. CUCU provides a command and telemetry communications link between ISS and Dragon during free flight operations in the vicinity of ISS.   Today’s Planned Activities All activities were completed unless otherwise noted. Personal Data Prep for Return ECON-M. Observation and Photography HRF Generic Saliva Collection 10 Minutes – Subject HRF Generic Sample MELFI Insertion Operations HRF Generic Urine Collection Ultrasound 2 HRF Rack 1 Power On Cardio Ox Ultrasound MATRYOSHKA-R. BUBBLE dosimeter setup and measurements Switch СТТС comm to the prime set Marrow Breath And Ambient Air Sample Setup 49S ASU deactivation Cardio Ox CDL Holter Arterial BP Unit Battery Installation – Subject 49S descent OBT Cardio Ox CDL Holter Arterial BP Measurement – Subject Radi-N Detector Retrieval/Readout Radiation Dosimetry Inside ISS-Neutrons Hardware Handover MATRYOSHKA-R. BUBBLE dosimeter receipt from USOS Cardio Ox CDL Holter Arterial BP Hardware Doff Alternate – Subject MATRYOSHKA-R. BUBBLE dosimeter setup and measurements Vascular Echo Resting Ultrasound Scan 135 Minutes Manufacturing Device Print Clean [КСПЭ] equipment inventory Temperature and Humidity Control (THC) Intermodule Ventilation (IMV) Flow Measurement Survey Vascular Echo CDL Holter Arterial BP Measurement – Subject MELFI DEWAR INVENTORY USOS Window Shutter Close Auxiliary Laptop Computer System Virus Definition File Update Extravehicular Mobility Unit (EMU) Cooling Loop Maintenance Scrub Initiation Close SM window covers ##6,8,9,12,13,14 Refer to comment 7 ОДНТ training session (PRELIMINARY). Specialist conference Assist ОДНТ training session (PRELIMINARY). Specialist conference Descent Private Medical Conference (PMC) HRF Generic Urine Collection HRF Generic Sample MELFI Retrieval Insertion Operations Temperature and Humidity Control (THC) Intermodule Ventilation (IMV) Flow Measurement Survey SM atmosphere analysis for coolant leaks using ФИТ Extravehicular Mobility Unit (EMU) Post Scrub Cooling Loop Water (H2O) Sample HRF Generic Urine Collection Male – Subject 50S Samsung tablet PC charging (if current charge <80%) Extravehicular Mobility Unit (EMU) Cooling Loop Maintenance Iodination HRF Generic Sample MELFI Insertion Operations MRM2 [ВД1] and [ВД2] air ducts vacuuming HRF Generic Frozen Blood Collection Setup Extravehicular Mobility Unit (EMU) Conductivity Test 49S pre-undock [СУД] (motion control system) #2 test IMS update Health Maintenance System (HMS) Vision Test HRF Generic Urine Collection Fix cables running from 49S [РУО] handle HRF Generic Sample MELFI Retrieval Insertion Operations Health Maintenance System (HMS) Vision Questionnaire MRM2 [АСП] hatch cover and 49S [АСА] sealing mechanism maintenance EVA Extravehicular Mobility Unit (EMU) Cooling Loop Scrub Deconfiguration Preparation for return Photo/TV CUCU Video Setup COTS UHF Communication Unit (CUCU) Activation COTS UHF Communication Unit (CUCU) Crew Command Panel (CCP) Checkout Countermeasures System (CMS) Treadmill 2 (T2) Exercise Session Exercise Data Downlink via OCA 50S tablet PC charging Completed Task List Items Crew Medical Officer (CMO) On Board Training (OBT) [Completed GMT 147] PhotoTV Camera Mounting Assembly Stow [Completed GMT 147] At Home In Space Culture Photo [Completed GMT 147] Temperature and Humidity Control (THC) Intermodule Ventilation (IMV) Flow Measurement Survey [Completed GMT 148] ESA Active Dosimeter Area Monitoring [Completed GMT 148] Flash Card Photograph [Completed GMT 148] NOD1 WAP Antenna R&R [Completed GMT 148] Manufacturing Device Feedstock Canister Exchange [Completed GMT 148] Manufacturing Device Print Clean [Completed GMT 148] Crew Medical Officer (CMO) Proficiency Training [Completed GMT 148] PAO 2017 Astronaut Class Video [Completed GMT 148] Rodent Research Gather 2 [Completed GMT 148] […]

from ISS On-Orbit Status Report http://ift.tt/2rfnmF9
via IFTTT

ISS Daily Summary Report – 5/26/2017

NanoRack Cubesat Deployer (NRCSD) #12 Cubesat Deploys:  The remaining 8 of 17 NRCSD #12 CubeSats were successfully deployed from the ISS today. All are a subset of the QB50 constellation of CubeSats provided by countries from around the world. The constellation studies the upper reaches of the Earth’s atmosphere over a period of 1 to 2 years. The QB50 satellites conduct coordinated measurements of the thermosphere, a poorly studied and previously inaccessible zone of the atmosphere. The project monitors different gaseous molecules and electrical properties of the thermosphere to better understand space weather and its long term trends. NanoRacks Module-55:  The crew swapped samples in the NanoRacks Module 55 which is mounted on the front of NanoRacks Platform-1 in the JEM. This investigation researches why bacteria are more virulent and grow more rapidly in space.  NanoRacks Module 55, also known as NanoRacks – National Design Challenge – Centaurus High School – The Effects of Simulated Gravity on Bacterial Lag Phase in a Microgravity Environment (NanoRacks-NDC-CHS-Bacterial Lag Phase), studies the bacterial lag phase, a delay period before the start of exponential growth, which is much shorter in microgravity than it is on Earth. The experiment uses a centrifuge to simulate gravity, comparing microgravity and simulated-gravity Escherichia coli (E. coli) cultures to determine whether microgravity itself causes changes in bacterial growth.  Electrostatic Levitation Furnace (ELF): The crew replaced the ELF Ultraviolet Lamp bulb and set up the ELF gas supply hose and gas bottle. The ELF is an experimental facility designed to levitate, melt and solidify materials by containerless processing techniques using the Electrostatic Levitation method. With this facility, thermophysical properties of high temperature melts can be measured, and solidification from deeply undercooled melts can be achieved.  Soyuz 49 (49S) Nominal Descent Drill: The 49S Crew performed a nominal Soyuz Descent Drill in preparation for their return to earth next week.  Soyuz undock is scheduled for June 2, 2017 at 5:48 AM CDT with landing occurring at 9:10 AM CDT.  Extravehicular Mobility Unit (EMU) Suit Maintenance: The crew completed routine maintenance on EMUs 3006 and 3008 including a loop scrub, iodination and a post-loop scrub water sample.  Following these activities, EMUs 3006 and 3008 were removed and stowed in the Crewlock and EMUs 3003 and 3010 were installed onto the Equipment Lock EMU Don/Doff Assembly.  On-Board Training (OBT)/Mobile Servicing System (MSS) Operations: Robotics Ground Controllers powered up the MSS in the Hot Backup Configuration and maneuvered the Space Station Remote Manipulator System (SSRMS) into position over the Permanent Multipurpose Module (PMM) Flight Releasable Grapple Fixture (FRGF) for the start of the SpX-11 Offset Grapples Practice session. Crew members Whitson and Fisher then practiced maneuvering the SSRMS into the grapple envelope of the PMM FRGF. They performed this several times, then performed a final run during which Controllers safed the SSRMS to simulate a failure. The crew recovered by switching from the Cupola Robotic Workstation (RWS) to the Lab RWS and backing the SSRMS away. Following the training session, Controllers maneuvered the SSRMS to the SpX-11 rendezvous park position.  Remote Power Control Module (RPCM) N21B4A_B Trip Status: RPC 2 on RPCM N21B4A_B tripped Thursday night. This RPC powers the Node 2 Audio Terminal Unit (ATU) 1_ Starboard.  Node 2 ATU-2_Port is still available for caution and warning tones and audio functionality and is connected (via patch panel) to the starboard Crew Quarters.  Review of the 50Hz data did not show any indication of an overcurrent. Ground controllers were able to execute the FET Controller Hybrid (FCH) troubleshooting in an attempt to recover the RPC. The first re-closure attempt was unsuccessful indicating a FCH failure. Approximately an hour after the troubleshooting was attempted, the RPC closed and then re-opened 40 seconds later. Teams believe that this is a new failure signature of the FCH issue and are working a re-closure attempt today. Ground teams will review this new FCH failure signature.  Today’s Planned Activities All activities were completed unless otherwise noted. HRF Generic Urine Collection HRF Generic Sample MELFI Insertion Operations HRF Generic Frozen Blood Collection HRF Generic Refrigerated Centrifuge Configuration Multi-purpose Small Payload Rack (MSPR) /Group Combustion Module (GCM) Component Activation Soyuz 733 crew Sokol leak check without donning ПКО or Kentavr Glacier Sample Remove NanoRacks Module-55 Gear-Sample Swap Progress 435 (DC1) transfers prior to [АСН-К] Navigation Module removal prior to [АСН-К] navigation module removal HRF Generic Refrigerated Centrifuge Spin Conclude HRF Generic Sample MELFI Insertion HRF Generic Frozen Blood Collection Conclude Stow Robotic Workstation (RWS) Setup NanoRacks CubeSat Deployment Photos Robotics Onboard Training (ROBoT) Session for Dragon Combustion Integrated Rack Alignment Guide Removal Drying Sokol spacesuits, setup suit 1 for drying Soyuz descent training Soyuz 733 Descent OBT Multi-purpose Small Payload Rack (MSPR) Combustion Chamber (CC) pressure gauge check and Valve Operation part 1 HRF Generic Urine Collection Female – Subject HRF Generic Sample MELFI Retrieval Insertion Operations Long Duration Sorbent Testbed Status Check. Extravehicular Mobility Unit (EMU) Cooling Loop Maintenance Scrub Initiation Manufacturing Device Print Clean LBNP Training (PRELIMINARY) Transfer of Atmosphere Purification Filter Assembly АФОТ-2М from Soyuz 733 БО to Soyuz 735 БО Multi-purpose Small Payload Rack (MSPR) Combustion Chamber (CC) pressure gauge check and Valve Operation part 2 Transfer of Atmosphere Purification Filter Assembly АФОТ-2М from Soyuz 733 БО to Soyuz 735 БО Terminate Space Suit 1 Drying Habitability Walk-through Video – Subject Terminate Space Suit 1 Drying Setup Space Suit 2 for drying NanoRacks CubeSat Deployment Photos Extravehicular Mobility Unit (EMU) Post Scrub Cooling Loop Water (H2O) Sample Extravehicular Mobility Unit (EMU) Cooling Loop Maintenance Iodination HRF Generic Urine Collection Female – Subject Conference with specialists regarding the Separation Unit [УС] Water Resource Management Condensate Tank Offload Initialization Removal of [АСН-К] Navigation Module from Progress 435 Soyuz 733 Transfer Ops HRF Generic Sample MELFI Insertion Operations Water Resource Management Condensate Tank Offload Termination N2 Nadir Hatch to Unlatch Hard stop BEAM Intermodule Ventilation Coupling Verification Progress 435 stowage ops after [АСН-К] Navigation Module removal On-board Training (OBT) Dragon Offset Grapple European Modular Cultivation System (EMCS) Gas Valve Close Terminate Space Suit […]

from ISS On-Orbit Status Report http://ift.tt/2rQMepu
via IFTTT

Blog.yogisanonymous.com

Blog.yogisanonymous.com. Blog Yogis Anonymous. More than just yoga videos. Your practice, off the mat. Visit blog.yogisanonymous.com ...

from Google Alert - anonymous http://ift.tt/2rfh8oy
via IFTTT

Shadow Brokers Launches 0-Day Exploit Subscriptions for $21,000 Per Month

As promised to release more zero-days exploits and hacking tools for various platforms starting from June 2017, the infamous hacking group Shadow Brokers is back with more information on how to subscribe and become a private member for receiving exclusive access to the future leaks. The Shadow Brokers is the same hacking group who leaked NSA's built Windows hacking tools and zero-day


from The Hacker News http://ift.tt/2qugwhH
via IFTTT

[FD] Hacktivity 2017 Call For Papers

Hi all, Please find our CFP below - would be great to see many submissions from you ;) [ == Hacktivity 2017 Call For Papers ==] Conference: October 20-21, 2017 CFP closing date: June 30, 2017 CFP notification to authors: July 31, 2017 Venue: Budapest, Hungary Web: https://hacktivity.com Email: cfp _!{at}!_ hacktivity.com Twitter: @hacktivityconf [ == The Hacktivity Crew == ] The Hacktivity hacking conference brings together the official and alternative representatives of information security profession with all those interested in the area, in an informal, yet educational, and most of the times highly technical. [ == Call For Contributions/Speakers This year we are offering two alternatives: you can either give a presentation as usual or you can give a hello workshop. [ == Presentations == ] This is the business as usual. We require similar thing as in any other IT security conference CFP. We are accepting presentations from a wide spectrum of IT security topics. It is up to you to apply for a presentation which is in line with the spirit of Hacktivity. We favor presentations with demo. Please write your slide deck in English. Your speech can be in English (favored) or Hungarian. As a speaker you can have either 20­ minutes or 40 ­minute s lot to present your topic. [ == Hello workshop == ] We all know there is a huge difference between seeing and doing. Real knowledge grows from issuing your first command. Therefore, to help visitors start off learning we organize hello workshops. Hello workshops are short courses introducing basic/intermediate IT security skills. Previous years included topics like: Burp Extensions Malicious PDF analysis Basic rootkit techniques SQL injections A hello workshop should meet the following requirements: participants should acquire a definite and useful piece of knowledge; participants bring their own equipment you should calculate with the diversity; a workshop will not have more than 16 attendees; it should fit into 20 plus 20 minutes (seeing plus doing) from preparation to take­aways. one workshop will be held approx. 3 times during the two days [ == Topics == ] Here are some topics that we are especially interested in: - Vulnerabilities at unexpected territories - Exploit mitigations and their mitigations - Malware analysis inside or outside the sandbox - Blue Team techniques / operation - Big Data / Cloud / APT / any_fancy_buzzword ­ What’s the big deal? Are there any / What are the new threats? - Extraordinary stories of #FAIL Any research which brings something brand new to the security world These are just examples though, please feel free to submit your talk as long as it fits to the spirit of Hacktivity. [ == How to apply as a speaker == ] Please fill out our CFP application form: http://bit.ly/2pqGiy5 [ == Speaker benefits == ] Speaker benefits are applicable to every person presenting at least one 40 minute or two 20 minute presentations. If you would like to hold a Hello workshop and need coverage for travel or accommodation please contact us! Hacktivity offers speakers accommodation for 2 nights next to the venue of the conference and cover travel expenses up to 350 EUR . Please note that we have flexibility regarding the travel expenses. The travel contribution is agreed individually with every speaker . Please contact us at cfp _!{at}!_ hacktivity.com for more details. [ == Copyright == ] As a speaker or workshop presenter you should accept the following use of your intellectual properties: Presentations will be recorded and made available on our website. To the event a conference paper will be published with presentation/workshop titles and abstracts, the presenters’ bio and their photos. The brochures will be distributed at the registration for all participants of the conference. Presentations and workshop materials will available on the conference web page after the event in pdf form. During the presentation we will take photos and use them in our publications and will be published on our site. We are not going to use your materials in any other form mentioned above without your prior consent. Cheers, Attila Marosi head of program committee

Source: Gmail -> IFTTT-> Blogger

A Kalahari Sky


You wake up in the Kalahari Desert in Botswana, Africa. You go outside your tent, set up your camera, and take long exposures of the land and sky. What might you see? Besides a lot of blowing dust and the occasional acacia tree, you might catch many sky wonders. Pictured in 2015 September, sky highlights include the central band of our Milky Way Galaxy, the Pleiades Star Cluster, Barnard's Loop, and both the Large and Small Magellanic Clouds, to name just a few. Although most of these faded in the morning light, they were quickly replaced by a partial eclipse of the Sun. via NASA http://ift.tt/2r3aMu9

Monday, May 29, 2017

Food Addicts in Recovery Anonymous (FA)

Are you having trouble controlling the way you eat? Food Addicts in Recovery Anonymous (FA) is a free Twelve Step recovery program for anyone ...

from Google Alert - anonymous http://ift.tt/2ryEqsF
via IFTTT

Bring visual novel Anonymous;Code to the West in English

Recently, it was announced that the visual novel Anonymous;Code will be releasing on Nintendo Switch, Playstation 4, and Playstation Vita consoles ...

from Google Alert - anonymous http://ift.tt/2seX6tY
via IFTTT

Orioles Video: Jonathan Schoop rips 2-run double the opposite way in 3rd inning against Yankees (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Linguistic Analysis Suggests WannaCry Hackers Could be From Southern China

It’s been almost four weeks since the outcry of WannaCry ransomware, but the hackers behind the self-spread ransomware threat have not been identified yet. However, two weeks ago researchers at Google, Kaspersky Lab, Intezer and Symantec linked WannaCry to ‘Lazarus Group,’ a state-sponsored hacking group believed to work for the North Korean government. Now, new research from dark web


from The Hacker News http://ift.tt/2s7qgMd
via IFTTT

MLB: Aaron Judge (tied for ML lead with 16 HR) brings big bat into Camden Yards as Yankees meet struggling Orioles; watch live in ESPN App (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Judy Android Malware Infects Over 36.5 Million Google Play Store Users

Security researchers have claimed to have discovered possibly the largest malware campaign on Google Play Store that has already infected around 36.5 million Android devices with malicious ad-click software. The security firm Checkpoint on Thursday published a blog post revealing more than 41 Android applications from a Korean company on Google Play Store that make money for its creators by


from The Hacker News http://ift.tt/2qrYWuZ
via IFTTT

Montages with OpenCV

Today’s blog post is inspired by an email I received from PyImageSearch reader, Brian.

Brian asks:

Hi Adrian,

I’m really enjoying the PyImageSearch blog. I found your site a few days ago and I’ve been hooked on your tutorials ever since.

I followed your tutorial on building an image search engine, but instead of displaying the result images one-by-one (like you did), I want to display the top-20 results in a montage.

Is there a way to do with OpenCV?

Thanks,

Brian

Great question Brian, thanks for asking.

One of my favorite aspects of running the PyImageSearch blog is being able to chat with you, the reader, and discover the projects you’re working on.

It’s especially exciting when I can take questions or comments and turn them into blog posts — that way the entire PyImageSearch community is able to benefit from the answer.

Today we will learn how to build montages of images using OpenCV and the imutils package. A big thank you to Kyle Hounslow who contributed the

build_montages
  function to imutils.

To learn more about building an image montage with OpenCV, just keep reading.

Looking for the source code to this post?
Jump right to the downloads section.

Montages with OpenCV

There are four primary pieces to today’s blog post.

In the first part, we’ll learn how to build a list of image paths from an image dataset residing on disk.

From there, we’ll use the

build_montages
  function to take this list of images and create the actual montage.

Next, we’ll display the montage to our screen.

Finally, I’ll provide an example of using montages to display images with OpenCV.

To download the source code + example images to this blog post, be sure to use the “Downloads” section below.

Creating a montage with OpenCV

To get started, open up a new file, name it

montage_example.py
 , and insert the following code:
# import the necessary packages
from imutils import build_montages
from imutils import paths
import argparse
import random
import cv2

Lines 2-6 import our required Python packages. Notice how

build_montages
  is imported from the imutils package.

If you do not have

imutils
  installed on your system (v0.4.3 as of this writing), then make sure you install/upgrade it via
pip
 :
$ pip install --upgrade imutils

Note: If you are using Python virtual environments (as all of my OpenCV install tutorials do), make sure you use the

workon
  command to access your virtual environment first and then install/upgrade
imutils
 .

From there, we can parse our command line arguments:

# import the necessary packages
from imutils import build_montages
from imutils import paths
import argparse
import random
import cv2

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--images", required=True,
        help="path to input directory of images")
ap.add_argument("-s", "--sample", type=int, default=21,
        help="# of images to sample")
args = vars(ap.parse_args())

Our script requires one command line argument, followed by a second optional one, each detailed below:

  • --images
    
     : The path to your directory containing the images you want to build a montage out of.
  • --samples
    
     : An optional command line argument that specifies the number of images to sample (we default this value to
    21
    
      total images).

Next, we can use the

--images
  path to randomly select some input images:
# import the necessary packages
from imutils import build_montages
from imutils import paths
import argparse
import random
import cv2

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--images", required=True,
        help="path to input directory of images")
ap.add_argument("-s", "--sample", type=int, default=21,
        help="# of images to sample")
args = vars(ap.parse_args())

# grab the paths to the images, then randomly select a sample of
# them
imagePaths = list(paths.list_images(args["images"]))
random.shuffle(imagePaths)
imagePaths = imagePaths[:args["sample"]]

To obtain a listing of all image paths inside the

--images
  directory, we make a call to the
list_images
  function (Line 18).

For the purpose of this exercise we randomly shuffle the image paths on Line 19, followed by taking a sample of these images to display to our screen (Line 20). The set of

imagePaths
  returned by this sampling will be used to build our montage.

For your own applications you likely will not have to bother with randomly shuffling and selecting a set of image paths — you will already have your image paths.

In the context of Brian’s original question, he is looking to display the results of his image search engine.

The results therefore contain his image paths.

Again, keep in mind that we are simply demonstrating how to build a montage with OpenCV — how you actually use this example is entirely up to you.

Given our

imagePaths
 , we are ready to build the montage:
# import the necessary packages
from imutils import build_montages
from imutils import paths
import argparse
import random
import cv2

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--images", required=True,
        help="path to input directory of images")
ap.add_argument("-s", "--sample", type=int, default=21,
        help="# of images to sample")
args = vars(ap.parse_args())

# grab the paths to the images, then randomly select a sample of
# them
imagePaths = list(paths.list_images(args["images"]))
random.shuffle(imagePaths)
imagePaths = imagePaths[:args["sample"]]

# initialize the list of images
images = []

# loop over the list of image paths
for imagePath in imagePaths:
        # load the image and update the list of images
        image = cv2.imread(imagePath)
        images.append(image)

# construct the montages for the images
montages = build_montages(images, (128, 196), (7, 3))

On Line 23 we initialize our list of

images
 .

We then loop through the

imagePaths
  on Lines 26-29, loading each
image
  from disk, and then appending the
image
  to our
images
  list.

To actually construct the montage, we make a call to the

build_montages
  function on Line 32 — this is where all of the heavy lifting is done. If you’re curious about the internals of the
build_montages
  method and what is going on under the hood, be sure to check out the source code implementation on GitHub.

The

build_montages
  function requires three arguments:
  • image_list
    
     : This parameter is a list of images loaded via OpenCV. In our case, we supply the
    images
    
      list built on Lines 26-29.
  • image_shape
    
     : A tuple containing the width and height of each image in the montage. Here we indicate that all images in the montage will be resized to 129 x 196. Resizing every image in the montage to a fixed size is a requirement so we can properly allocate memory in the resulting NumPy array. Note: Empty space in the montage will be filled with black pixels.
  • montage_shape
    
     : A second tuple, this one specifying the number of columns and rows in the montage. Here we indicate that our montage will have 7 columns (7 images wide) and 3 rows (3 images tall).

The

build_montages
  method returns a list of montage images in NumPy array format.

If there are more images in the

images
  list than the
montage_shape
  can hold, a new montage is created for the extra
images
 . This process is repeated until all
images
  have been added to a montage. This process is identical to displaying search results over multiple pages.

Our final code block handles displaying the

montages
  to our screen:
# import the necessary packages
from imutils import build_montages
from imutils import paths
import argparse
import random
import cv2

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--images", required=True,
        help="path to input directory of images")
ap.add_argument("-s", "--sample", type=int, default=21,
        help="# of images to sample")
args = vars(ap.parse_args())

# grab the paths to the images, then randomly select a sample of
# them
imagePaths = list(paths.list_images(args["images"]))
random.shuffle(imagePaths)
imagePaths = imagePaths[:args["sample"]]

# initialize the list of images
images = []

# loop over the list of image paths
for imagePath in imagePaths:
        # load the image and update the list of images
        image = cv2.imread(imagePath)
        images.append(image)

# construct the montages for the images
montages = build_montages(images, (128, 196), (7, 3))

# loop over the montages and display each of them
for montage in montages:
        cv2.imshow("Montage", montage)
        cv2.waitKey(0)

On Line 35 we loop over each of the

montages
  (again, similar to displaying N number of (faux) “search results” on a page).

Lines 36 and 37 then display the current

montage
  to our screen. The
cv2.waitKey
 call pauses execution of our script until we select the currently active window and press any key on our keyboard. This will cause the
for
  loop to advance.

Once we reach the end of the

montages
  list, the script exits.

Displaying the Montage

Approximately two years ago I was involved in a computer vision project that required me to build a simple image fashion search engine. To accomplish this, I built a simple web crawler to spider Nordstrom.com and download all the product images and associated meta data.

We are are going to use a tiny sample of this data today when demoing the

build_montages
  function.

Once you’ve used the “Downloads” section below to download the source code + example images, you can execute the following command to see the results:

$ python montage_example.py --images nordstrom_sample

After executing the script you should see output similar to the following:

Figure 1: Building a montage with OpenCV and Python.

Note: The exact images that you see in the montage will vary from mine since we are randomly sampling from the input directory.

As we can see in Figure 1 above, we have three rows, each row containing seven images. Each image in the montage has been resized to a fixed size of 128 x 196 pixels.

In the context of Brian’s question at the top of this blog post, this montage could be search results from his image search engine algorithm.

As a second example, let’s increase the

--sample
  such that we create multiple montages since all images will not fit in a three row, seven column format:
$ python montage_example.py --images nordstrom_sample --sample 33

Since 3 x 7 = 21, we know that sampling 33 images cannot possibly fit into a 21 image montage.

Luckily for us, the

build_montages
  function realizes that there are too many images to fit into a single montage and thus creates two montages.

The first montage can be seen below with all 21 spaces in the montage occupied:

Figure 2: The first montage generated with OpenCV is completely filled.

The second montage holds the remaining 12 images that could not fit in the first montage:

Figure 3: The second montage displays images that could not fit in the first montage.

Notice how empty spaces in the montage are filled with black pixels.

Summary

In today’s blog post I demonstrated how to build a montage with OpenCV and Python to visualize a collection of images. This is a handy tool you can use in your own image processing projects, such as in Brian’s image search engine project detailed at the top of this blog post.

I would also like to take a second and give a big shoutout to Kyle Hounslow who contributed the

build_montages
  function to the imutils package — thanks again Kyle!

In next week’s blog post I’ll demonstrate how to use this montage functionality in an actual application where we sort images in a dataset according to how “colorful” they are.

To be notified when this next blog post goes live, be sure to enter your email address in the form below.

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Montages with OpenCV appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2r4gCv6
via IFTTT

"I'm just not picking up the ball" - Orioles slugger Chris Davis, who is in midst of 2-for-26 slump in which he's struck out 14 times (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Russian Hackers Made 'Tainted Leaks' a Thing — Phishing to Propaganda

We came across so many revelations of sensitive government and corporate data on the Internet these days, but what's the accuracy of that information leaked by unknown actors? How much real are that information that you completely trust upon? Security researchers have discovered new evidence of one such sophisticated global espionage and disinformation campaign with suspected ties to the


from The Hacker News http://ift.tt/2r3hSiq
via IFTTT

Sculptuur Berusting, anonymous, c. 1855 - c. 1880

Sculptuur Berusting, anonymous, c. 1855 - c. 1880. photographic paper, h 84mm × w 174mm. More details. Download image ...

from Google Alert - anonymous http://ift.tt/2rMZM5v
via IFTTT

Beneath Jupiter


Jupiter is stranger than we knew. NASA's Juno spacecraft has now completed its sixth swoop past Jupiter as it moves around its highly elliptical orbit. Pictured, Jupiter is seen from below where, surprisingly, the horizontal bands that cover most of the planet disappear into swirls and complex patterns. A line of white oval clouds is visible nearer to the equator. Recent results from Juno show that Jupiter's weather phenomena can extend deep below its cloud tops, and that Jupiter's magnetic field varies greatly with location. Juno is scheduled to orbit Jupiter 37 times with each orbit taking about six weeks. via NASA http://ift.tt/2raF6n2

Sunday, May 28, 2017

Legislature OKs anonymous reporting for sex assault victims

The Texas Legislature has approved requiring Texas public and private universities to create anonymous online reporting tools for sexual assault ...

from Google Alert - anonymous http://ift.tt/2rvKWk4
via IFTTT

Anonymous

Showing 1-1 of 1 results for “Anonymous”. Popularity (global), Relevance ... Title details for Go Ask Alice by Anonymous · Go Ask Alice. Read a sample ...

from Google Alert - anonymous http://ift.tt/2rdo33X
via IFTTT

No River Too Wide Goddesses Anonymous English Edition Ebook

Document about No River Too Wide Goddesses Anonymous English Edition is available on print and digital edition. This pdf ebook is one of digital.

from Google Alert - anonymous http://ift.tt/2qt1BAl
via IFTTT

(28/05/2017) E7?~ | best way to get anonymous bitcoins

E7?~ (28/05/2017) E7?~ | best way to get anonymous bitcoins ⒯. bitcoin random number generator; Invest in bitcoin mining | All about investments ...

from Google Alert - anonymous http://ift.tt/2rvphIu
via IFTTT

Anonymous (Original Mix)

Download Now on Beatport.

from Google Alert - anonymous http://ift.tt/2rcsRXb
via IFTTT

"I think my money went to Brandon Williams" - Dennis Pitta has a theory on what Ravens did with his $2.5 million pay cut (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Permission for anonymous not see auction with page

Hi, please, when i uncheck "Place bids in auctions" for Anonymous, he not see page with auction. When i check "Place bids in auctions", then see ...

from Google Alert - anonymous http://ift.tt/2rc2mRB
via IFTTT

Anonymous

Check out Anonymous by Bobby Hass on Beatport.

from Google Alert - anonymous http://ift.tt/2rc4cSz
via IFTTT

ChrisPC Anonymous Proxy Pro v7 download

ChrisPC Anonymous Proxy Pro is a privacy tool that anyone should use to protect their online experience. Browsing, online shopping, online TV ...

from Google Alert - anonymous http://ift.tt/2sak5Gz
via IFTTT

[InsideNothing] kenneth liked your post "[FD] [ERPSCAN-16-036] SAP ASE ODATA SERVER - DENIAL OF SERVICE"



Source: Gmail -> IFTTT-> Blogger