sec

The super easy microwave peanut butter bread recipe that takes 90 seconds to cook

The quick bread recipe tastes delicious and requires just five ingredients




sec

Domestic Market Opportunities For Alaska Lumber-Species Preferences By Secondary Wood Products Manufacturers In The Continental United States.

New equipment, technology, and marketing efforts have allowed Alaska's wood products producers to consider opportunities previously unavailable to them. Until recently, the primary product produced by Alaska firms was rough, unseasoned lumber sold primarily within local markets. Given the purchase and installation of new drying and planing equipment, Alaska producers can now enter domestic and export markets for a variety of secondary wood products. Previously underutilized species, such as red alder (Alnus rubra Bong.), paper birch (Betula papyrifera Marsh.), and Alaska yellow-cedar (Chamaecyparis nootkatensis (D. Don) Spach) are also gaining in popularity and market potential. A detailed knowledge of species preferences for Alaska lumber, across business types and geographic regions, will be essential if Alaska producers are to be competitive.




sec

Potential vegetation hierarchy for the Blue Mountains section of northeastern Oregon, southeastern Washington, and westcentral Idaho

The work described in this report was initiated during the Interior Columbia Basin Ecosystem Management Project (ICBEMP). The ICBEMP produced a broad-scale scientific assessment of ecological, biophysical, social, and economic conditions for the interior Columbia River basin and portions of the Klamath and Great Basins. The broad-scale assessment made extensive use of potential vegetation (PV) information. This report (1) discusses certain concepts and terms as related to PV, (2) describes how a PV framework developed for the broad-scale ICBEMP assessment area was stepped down to the level of a single section in the national hierarchy of terrestrial ecological units, (3) describes how fine-scale potential vegetation types (PVTs) identified for the Blue Mountains section were aggregated into the midscale portion of the PV hierarchy, and (4) describes the PVT composition for each of the midscale hierarchical units (physiognomic class, potential vegetation group, plant association group).




sec

tech. coord. 2010. Economic modeling of effects of climate change on the forest sector and mitigation options: a compendium of briefing papers

This report is a compilation of six briefing papers based on literature reviews and syntheses, prepared for U.S. Department of Agriculture, Forest Service policy analysts and decisionmakers about specific questions pertaining to climate change.




sec

Climate change through an intersectional lens: gendered vulnerability and resilience in indigenous communities in the United States

Over the past decade, wood-energy use in Alaska has grown dramatically.




sec

Characterizing a forest insect outbreak in Colorado by using MODIS NDVI phenology data and aerial detection survey data.

Forest disturbances are increasing in extent and intensity, annually altering the structure and function of affected systems across millions of acres. Land managers need rapid assessment tools that can be used to characterize disturbance events across space and to meet forest planning needs.




sec

Sunderland have a key role to fill this summer, as club secretary departs

Sunderland are looking for a new club secretary with Brett Baker moving on this summer




sec

Saudi PiF plot move for second football club: NUFC evening update

All the latest Newcastle United takeover headlines with updates on the Saudi Public Investment Fund and Gary Neville




sec

Porter Robinson's Secret Sky Festival Happening May 9th

GOLDENVOICE, BROWNIES & LEMONADE, and SLUSH MANAGEMENT present PORTER ROBINSON'S Secret Sky Festival this SATURDAY (5/9).  It's ROBINSON's first performance of 2020. … more




sec

Scripps Board Declares Second Quarter Dividend

The Board of Directors of THE E.W. SCRIPPS COMPANY, parent of STITCHER and TRITON DIGITAL, has declared a cash dividend of 5 cents/share for second quarter 2020. The dividend will be payable … more




sec

[Promo] Make The Morning Show Prep Section Your Daily Destination

ALL ACCESS has compiled some of the best in the business for our MORNING SHOW PREP section. What's there for you to check out? ROSS BRITTAIN: Veteran morning man ROSS BRITTAIN shares some … more




sec

Nonprofit sector urges Congress to include “Nonprofit Track” in CARES Act 2.0

April 8—The nation’s nonprofits are on the frontlines in our communities during the COVID-19 pandemic, working tirelessly to serve the people who need our services despite facing challenging circumstances within our own organizations. If we are to...




sec

As COVID-19 cases increase, preventing a second heart attack or stroke is vital

DALLAS, March 20, 2020 — As hospitals, health professionals and healthcare systems, governments and leaders work to reduce community spread of the coronavirus in the U.S. and protect the most vulnerable individuals, the American Heart Association offers...




sec

El sector sin fines de lucro pide al Congreso que incluya la “vía sin fines de lucro” en la Ley CARES 2.0

Sala de prensa de la AHA sobre el COVID-19 WASHINGTON, D. C., 9 de abril del 2020— Las organizaciones sin fines de lucro de la nación están en la primera línea en nuestras comunidades durante la pandemia del COVID-19. Trabajan sin cesar para servir a...




sec

Secondary analysis confirms safety of blood thinning agent

Research Highlights: The blood thinner apixaban, which treats and prevents blood clots in some people with irregular heart rhythm, is safe and effective in stroke patients. Apixaban is associated with less bleeding, death and hospitalization than ...




sec

Hooked: How to engage your website audience in one second or less

You have less than one second to make the right impression. Almost immediately after landing on your website users will make an uninformed, mostly subconscious judgment about what type of organization they’re interacting with. This initial judgment will largely be influenced by layout, design, and visual tone. It will not only influence the rest of […]

The post Hooked: How to engage your website audience in one second or less appeared first on Psychology of Web Design | 3.7 Blog.




sec

Finding the secret homes for blue herons

Even in highly “improved” places like Iowa, nature still has a few secrets, and I got to steal a peek at one last week. Having fished with great blue herons most of my life, I have long...




sec

Distancing and diversity enhance Iowa’s food security

Coronavirus provides a chilling lesson about crowding. The disease originated in a densely packed Chinese City. As it moved worldwide it struck most heavily in crowded places where people live and...




sec

Distancing and diversity enhance Iowa’s food security

Coronavirus provides a chilling lesson about crowding. The disease originated in a densely packed Chinese City. As it moved worldwide it struck most heavily in crowded places where people live and work in proximity.

Medical experts advise us to stay home and keep fellow humans at a distance. Isolation works. If a pathogen can’t reach us it can’t cause harm.

The same holds true for food. Years ago farmers planted diverse crops in relatively small fields, and raised modest numbers of chickens, pigs, and cattle. One cornfield or chicken coop was, essentially, isolated from the next closest counterpart, making it hard for a disease to jump from one farm to the next.

Modern Agriculture, in contrast, raises hundreds of thousands of chickens and turkeys crowded together in single buildings. Hogs and cattle are also crammed together, as are crops. Essentially the Midwest is one continuous cornfield stretching from Ohio to Nebraska. Once a pathogen mutates a new disease can easily sweep across vast fields or through crowded growing buildings, leaving a path of death and food shortages in its wake.

Modern mass agriculture is efficient, providing consumers with inexpensive eggs, milk, vegetables and meat, but it is vulnerable. Today’s farmers recognize disease potential and practice scrupulous biosecurity to keep pathogens away from their crops and animals. Still, all it takes is one mutation or introduction of a foreign microbe and a high percentage of American food is lost.

Families can reduce their vulnerability to mass food production by growing some at home. During The Second World War the government encouraged families to plant victory gardens and keep one to two hens per family member. Many households were able to grow up to 40% of their annual dietary needs, even in small yards. It freed commercially produced food for the military. Yards remain capable of growing significant quantities of nutritious food using three techniques.

Gardening: An amazing quantity of nutritious food can be grown in even a small sunny backyard, especially when intensive gardening techniques are used.

Foraging: Delicious wild foods grow in unsprayed yards and are free for the picking. Our family, for example, enjoys nettles, lambsquarters, purslane, acorns and dandelions. Learning to identify, harvest, and process them is not difficult. Ironically spraying a yard kills plants people can eat to favor inedible grass.

Chickens: A six hen backyard flock will produce two dozen eggs a week. They need some commercial feed but recycle kitchen scraps and garden weeds into eggs. Cedar Rapids and other towns allow families to keep chickens with a few restrictions.

Families unable or unwilling to grow backyard food can boost food security by buying vegetables, meat and eggs from small local producers.

Coronavirus has taught us about contagion and helps clarify the threat that mass production poses. Raising backyard food enhances resilience. It’s satisfying and helps ensure there will be something to eat.

Rich Patterson of Cedar Rapids is a writer, former nature center director and ecological consultant who co-owns Winding Pathways LLC with his wife, Marion.




sec

Second high-speed chase results in prison for Cedar Rapids man

CEDAR RAPIDS — A 32-year-old Cedar Rapids man, who received probation for a high-speed chase that he bragged about as “fun” and attempted to elude again in March, is heading to prison.

Sixth Judicial District Judge Lars Anderson on Friday revoked probation for Travis McDermott on the eluding charge from June 9, 2019, and sentenced him to five years in prison.

McDermott was convicted Tuesday for attempting to elude in March and was sentenced to 90 days in jail, which was run concurrently to the five-year prison sentence.

First Assistant Linn County Attorney Nick Maybanks told the judge that McDermott has a “significant violent history,” including assaults, assault on a peace officer, domestic assault, interference with official acts and child endangerment with bodily injury.

He continues to assault others and “show blatant disregard for authority figures,” the prosecutor noted.

In the eluding incident from last June, McDermott “risked lives” in a southwest neighborhood leading police on chase that began on when police saw his vehicle speeding on Rockford Road SW and run a stop sign at Eighth Avenue SW, Maybanks said Friday. McDermott drove 107 mph in a 30 mph zone and drove the wrong way on a one-way street at Third Street and Wilson Avenue SW.

McDermott ran into a pile of dirt at a dead end, jumped out of his car and led officers on a foot chase, Maybanks said. He wouldn’t stop, and officers used a Taser to subdue him.

McDermott was laughing when police arrested him, saying “how much fun” he had and appearing to be under the influence of drugs or alcohol, Maybanks said.

McDermott demanded a speedy trial, but the officer who conducted the sobriety test wasn’t available for trial. A plea was offered, and the drunken driving charge was dropped.

Maybanks also pointed out McDermott wouldn’t cooperate with the probation office on a presentencing report, which was ordered by a judge. He picked up an assault charge last November and was convicted before his eluding sentencing in January.

Maybanks said after McDermott received probation, he didn’t show up at the probation office for his appointment, didn’t get a substance abuse test as ordered and reported an invalid address to community corrections.

McDermott also has a pending charge in Dubuque County for driving while barred March 3, according to court documents.

Comments: (319) 398-8318; trish.mehaffey@thegazette.com




sec

Iowa coronavirus hospitalizations drop for second consecutive day

For the second consecutive day the number of Iowa patients hospitalized with COVID-19 has dropped.

The Iowa Department of Public Health reported Saturday that 402 people were hospitalized with the coronavirus, down five from the previous day, and down 15 from its current peak of 417 on Thursday.

Saturday’s totals mark the first time back-to-back COVID-19 hospitalization decreases since figures had begun being tracked.

Nine deaths in Iowa were recorded Saturday, according to the Department of Public Health, bringing the total to 252. But it snapped a streak of four consecutive days in which 10 or more deaths were recorded in Iowa.

Four of the deaths were in Polk County, bringing Polk’s total to 58 — matching Linn County’s as most in the state.

Saturday was the first time since Monday that no deaths in Linn County were reported.

Two deaths were in Jasper County, one each in Johnson, Muscatine and Tama counties.

Four of those who died were 81 years of age and older, three were 61 to 80 and two were aged 41 to 60.

Saturday’s report also showed there now have been a total of 29 outbreaks recorded in long-term care facilities statewide.

Including Saturday’s latest figures from the Department of Public Health — with 214 positive cases, for a total of 11,671 — these are the top 10 Iowa counties in terms of total cases:

• Polk — 2,194

• Woodbury — 1,554

• Black Hawk — 1,477

• Linn — 819

• Marshall — 702

• Dallas — 660

• Johnson — 549

• Muscatine — 471

• Tama — 327

• Louisa — 282.

More than 71,000 Iowans — one of 43 — have been tested, and 16.3 percent of those tested have been positive cases, according to the state.

Forty-six percent of Iowa deaths have been those age 81 and older, while 87 percent are 61 and older. Fifty-one percent have been male.

Beginning this past Friday, Gov. Kim Reynolds permitted more businesses to partially reopen.

“I’m proud to say that Iowans do what they always do and they responded,” she said at her Thursday news conference, her most recent. “So since we’ve kind of really accomplished what we were trying to do, ... now we have shifted our focus from mitigation and resources to managing and containing virus activity as we begin to open Iowa back up.”

Reynolds met with President Donald Trump on Wednesday at the White House to discuss the pandemic and mitigation strategies in the state.

Vice President Mike Pence visited Iowa Friday, when he met with faith leaders and agricultural and food company executives.

Comments: (319) 368-8857; jeff.linder@thegazette.com




sec

There is no longer any such thing as Computer Security

Remember "cybersecurity"?

Mysterious hooded computer guys doing mysterious hooded computer guy .. things! Who knows what kind of naughty digital mischief they might be up to?

Unfortunately, we now live in a world where this kind of digital mischief is literally rewriting the world's history. For proof of that,




sec

How to secure a website and be foolproof against surprises

The internet is an excellent resource for all kinds of information. However, with all of its advantages, there are also some things that you need to pay attention too. Knowing how to secure a website is a must, and anyone with an online identity needs to pay attention to this. As the internet can also […]




sec

Scientists Warn Crashing Insect Population Puts ‘Planet’s Ecosystems and Survival of Mankind’ at Risk

By Jon Queally Common Dreams “This is the stuff that worries me most. We don’t know what we’re doing, not trying to stop it, [and] with big consequences we don’t really understand.” The first global scientific review of its kind … Continue reading




sec

Insects Are ‘Glue in Nature’ and Must Be Rescued to Save Humanity, Says Top Scientist

By Jake Johnson Common Dreams Rapidly falling insect populations, said Anne Sverdrup-Thygeson, “will make it even more difficult than today to get enough food for the human population of the planet, to get good health and freshwater for everybody.” A … Continue reading




sec

Scientists Warn Crashing Insect Population Puts ‘Planet’s Ecosystems and Survival of Mankind’ at Risk

By Jon Queally Common Dreams “This is the stuff that worries me most. We don’t know what we’re doing, not trying to stop it, [and] with big consequences we don’t really understand.” The first global scientific review of its kind … Continue reading




sec

Insects Are ‘Glue in Nature’ and Must Be Rescued to Save Humanity, Says Top Scientist

By Jake Johnson Common Dreams Rapidly falling insect populations, said Anne Sverdrup-Thygeson, “will make it even more difficult than today to get enough food for the human population of the planet, to get good health and freshwater for everybody.” A … Continue reading




sec

Hooked: How to engage your website audience in one second or less

You have less than one second to make the right impression. Almost immediately after landing on your website users will make an uninformed, mostly subconscious judgment about what type of organization they’re interacting with. This initial judgment will largely be influenced by layout, design, and visual tone. It will not only influence the rest of […]

The post Hooked: How to engage your website audience in one second or less appeared first on Psychology of Web Design | 3.7 Blog.




sec

It’s A Living Mural for X-Games China & Innersect

It’s A Living Mural for X-Games China & Innersect

AoiroStudioMay 05, 2020

I think Fabio and I are on a challenge to keep the ABDZ homepage in color tones of 'pastel visuals'. It's perfect because I stumbled across the new project from It's A Living aka Ricardo Gonzalez for X-Games China & Innersect 2019 in Shanghai, China. I don't know if you are familiar or not by Ricardo's distinct lettering style but it's just plain beautiful and vibrant. INNERSECT is the biggest street culture convention in China, a street fashion project founded by celebrity icon Edison Chen in 2017. Feast your eyes!

About It’s A Living

AKA Ricardo Gonzalez is an incredible artist who has worked through many collaborations and his lettering style is so unique. Make sure to check out his links.




sec

Children’s Exposure to Secondhand Smoke May Be Vastly Underestimated by Parents

Tel Aviv University Press Release Smoking parents misperceive where and when their kids are exposed to cigarette smoke, Tel Aviv University researchers say Four out of 10 children in the US are exposed to secondhand smoke, according to the American … Continue reading




sec

Save the Planet; Eat an Insect

By David Suzuki David Suzuki Foundation People sometimes get bugged by insects, but we need them. They play essential roles in pollination, combating unwanted agricultural pests, recycling organic matter, feeding fish, birds and bats, and much more. They’re the most … Continue reading




sec

DHS: Secret Service has 11 Current Virus Cases

According to the DHS document, along with the 11 active cases there are 23 members of the Secret Service who have recovered from COVID-19 and an additional 60 employees who are self-quarantining. No details have been provided about which members of the Secret Service are infected or if any have recently been on detail with the president or vice president.




sec

On the connection problem for the second Painlev'e equation with large initial data. (arXiv:2005.03440v1 [math.CA])

We consider two special cases of the connection problem for the second Painlev'e equation (PII) using the method of uniform asymptotics proposed by Bassom et al.. We give a classification of the real solutions of PII on the negative (positive) real axis with respect to their initial data. By product, a rigorous proof of a property associate with the nonlinear eigenvalue problem of PII on the real axis, recently revealed by Bender and Komijani, is given by deriving the asymptotic behavior of the Stokes multipliers.




sec

GraCIAS: Grassmannian of Corrupted Images for Adversarial Security. (arXiv:2005.02936v2 [cs.CV] UPDATED)

Input transformation based defense strategies fall short in defending against strong adversarial attacks. Some successful defenses adopt approaches that either increase the randomness within the applied transformations, or make the defense computationally intensive, making it substantially more challenging for the attacker. However, it limits the applicability of such defenses as a pre-processing step, similar to computationally heavy approaches that use retraining and network modifications to achieve robustness to perturbations. In this work, we propose a defense strategy that applies random image corruptions to the input image alone, constructs a self-correlation based subspace followed by a projection operation to suppress the adversarial perturbation. Due to its simplicity, the proposed defense is computationally efficient as compared to the state-of-the-art, and yet can withstand huge perturbations. Further, we develop proximity relationships between the projection operator of a clean image and of its adversarially perturbed version, via bounds relating geodesic distance on the Grassmannian to matrix Frobenius norms. We empirically show that our strategy is complementary to other weak defenses like JPEG compression and can be seamlessly integrated with them to create a stronger defense. We present extensive experiments on the ImageNet dataset across four different models namely InceptionV3, ResNet50, VGG16 and MobileNet models with perturbation magnitude set to {epsilon} = 16. Unlike state-of-the-art approaches, even without any retraining, the proposed strategy achieves an absolute improvement of ~ 4.5% in defense accuracy on ImageNet.




sec

The growth rate over trees of any family of set defined by a monadic second order formula is semi-computable. (arXiv:2004.06508v3 [cs.DM] UPDATED)

Monadic second order logic can be used to express many classical notions of sets of vertices of a graph as for instance: dominating sets, induced matchings, perfect codes, independent sets or irredundant sets. Bounds on the number of sets of any such family of sets are interesting from a combinatorial point of view and have algorithmic applications. Many such bounds on different families of sets over different classes of graphs are already provided in the literature. In particular, Rote recently showed that the number of minimal dominating sets in trees of order $n$ is at most $95^{frac{n}{13}}$ and that this bound is asymptotically sharp up to a multiplicative constant. We build on his work to show that what he did for minimal dominating sets can be done for any family of sets definable by a monadic second order formula.

We first show that, for any monadic second order formula over graphs that characterizes a given kind of subset of its vertices, the maximal number of such sets in a tree can be expressed as the extit{growth rate of a bilinear system}. This mostly relies on well known links between monadic second order logic over trees and tree automata and basic tree automata manipulations. Then we show that this "growth rate" of a bilinear system can be approximated from above.We then use our implementation of this result to provide bounds on the number of independent dominating sets, total perfect dominating sets, induced matchings, maximal induced matchings, minimal perfect dominating sets, perfect codes and maximal irredundant sets on trees. We also solve a question from D. Y. Kang et al. regarding $r$-matchings and improve a bound from G'orska and Skupie'n on the number of maximal matchings on trees. Remark that this approach is easily generalizable to graphs of bounded tree width or clique width (or any similar class of graphs where tree automata are meaningful).




sec

A Review of Computer Vision Methods in Network Security. (arXiv:2005.03318v1 [cs.NI])

Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day. Increasingly, we are relying on networked infrastructure and with the advent of IoT, billions of devices will be connected to the internet, providing attackers with more opportunities to exploit. Traditional machine learning methods have been frequently used in the context of network security. However, such methods are more based on statistical features extracted from sources such as binaries, emails, and packet flows.

On the other hand, recent years witnessed a phenomenal growth in computer vision mainly driven by the advances in the area of convolutional neural networks. At a glance, it is not trivial to see how computer vision methods are related to network security. Nonetheless, there is a significant amount of work that highlighted how methods from computer vision can be applied in network security for detecting attacks or building security solutions. In this paper, we provide a comprehensive survey of such work under three topics; i) phishing attempt detection, ii) malware detection, and iii) traffic anomaly detection. Next, we review a set of such commercial products for which public information is available and explore how computer vision methods are effectively used in those products. Finally, we discuss existing research gaps and future research directions, especially focusing on how network security research community and the industry can leverage the exponential growth of computer vision methods to build much secure networked systems.




sec

Safe Data-Driven Distributed Coordination of Intersection Traffic. (arXiv:2005.03304v1 [math.OC])

This work addresses the problem of traffic management at and near an isolated un-signalized intersection for autonomous and networked vehicles through coordinated optimization of their trajectories. We decompose the trajectory of each vehicle into two phases: the provisional phase and the coordinated phase. A vehicle, upon entering the region of interest, initially operates in the provisional phase, in which the vehicle is allowed to optimize its trajectory but is constrained to guarantee in-lane safety and to not enter the intersection. Periodically, all the vehicles in their provisional phase switch to their coordinated phase, which is obtained by coordinated optimization of the schedule of the vehicles' intersection usage as well as their trajectories. For the coordinated phase, we propose a data-driven solution, in which the intersection usage order is obtained through a data-driven online "classification" and the trajectories are computed sequentially. This approach is computationally very efficient and does not compromise much on optimality. Moreover, it also allows for incorporation of "macro" information such as traffic arrival rates into the solution. We also discuss a distributed implementation of this proposed data-driven sequential algorithm. Finally, we compare the proposed algorithm and its two variants against traditional methods of intersection management and against some existing results in the literature by micro-simulations.




sec

Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks. (arXiv:2005.03091v1 [cs.IT])

Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security techniques is limited by its transmit power and channel fading. In order to tackle this issue, a cognitive unmanned aerial vehicle (UAV) communication network is studied by exploiting the high flexibility of a UAV and the possibility of establishing line-of-sight links. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAV's trajectory and transmit power. Our problem formulation takes into account two practical inaccurate location estimation cases, namely, the worst case and the outage-constrained case. In order to solve those challenging non-convex problems, an iterative algorithm based on $mathcal{S}$-Procedure is proposed for the worst case while an iterative algorithm based on Bernstein-type inequalities is proposed for the outage-constrained case. The proposed algorithms can obtain effective suboptimal solutions of the corresponding problems. Our simulation results demonstrate that the algorithm under the outage-constrained case can achieve a higher average secrecy rate with a low computational complexity compared to that of the algorithm under the worst case. Moreover, the proposed schemes can improve the secure communication performance significantly compared to other benchmark schemes.




sec

Is My WordPress Site Secure? 13 Tips for Locking Down Your WordPress Site

WordPress powers 35% of all websites, which makes WordPress sites a go-to target for hackers. If you’re like most WordPress site owners, you’re probably asking the same question: Is my WordPress site secure? While you can’t guarantee site security, you can take several steps to improve and maximize your WordPress security. Keep reading to learn […]

The post Is My WordPress Site Secure? 13 Tips for Locking Down Your WordPress Site appeared first on WebFX Blog.




sec

GOOD NEWS: These local insects never murdered anybody that we know of

Last week, the New York Times dropped a terrifying story: Asian Giant Hornets, or "murder hornets" as more J. Jonah Jameson-esque researchers like to call them, have been identified in Western Washington. These insects can grow up to 2 inches long, can rip the heads off an entire hive of honeybees in a matter of hours, and have dagger-like stingers that pierce beekeeper suits to deliver a sting that sears like molten acid.…



  • News/Local News

sec

Securing crash dump files

In a computer storage system, crash dump files are secured without power fencing in a cluster of a plurality of nodes connected to a storage system. Upon an occurrence of a panic of a crashing node and prior to receiving a panic message of the crashing node by a surviving node loading, in the cluster, a capturing node to become active, prior to a totem token being declared lost by the surviving node, for capturing the crash dump files of the crashing node, while manipulating the surviving node to continue to operate under the assumption the power fencing was performed on the crashing node.




sec

Mitigation of secondary phase formation during waste vitrification

A method for vitrification of waste to reduce the formation of persistent secondary phases comprising separating at least one glass frit constituent from an initial glass frit to form a modified glass frit. The waste, modified glass frit, and the at least one glass frit constituent are mixed together with the modified glass frit and the at least one glass frit constituent being added as separate components. The resulting mixture is vitrified.




sec

Scalable network security with fast response protocol

This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying on a standardized data format and communication structure, a general architecture can be created and used to dynamically build and reconfigure interaction between both similar and dissimilar security products. Use of an integration scheme having defined message types and specified query response framework provides for real-time response and easy adaptation for cross-vendor communication. Examples are provided where an intrusion detection system (IDS) can be used to detect network threats based on distributed threat analytics, passing detected threats to other security products (e.g., products with different capabilities from different vendors) to trigger automatic, dynamically configured communication and reaction. A network security provider using this infrastructure can provide hosted or managed boundary security to a diverse set of clients, each on a customized basis.




sec

System and method for below-operating system trapping and securing loading of code into memory

A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a below-operating-system security agent. The below-operating-system security agent is configured to trap an attempted access of a resource of the electronic device, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic device accessing the memory. The attempted access includes attempting to write instructions to the memory and attempting to execute the instructions.




sec

Information processing apparatus for restricting access to memory area of first program from second program

A processor determines whether a first program is under execution when a second program is executed, and changes a setting of a memory management unit based on access prohibition information so that a fault occurs when the second program makes an access to a memory when the first program is under execution. Then, the processor determines whether an access from the second program to a memory area used by the first program is permitted based on memory restriction information when the fault occurs while the first program and the second program are under execution, and changes the setting of the memory management unit so that the fault does not occur when the access to the memory area is permitted.




sec

Optimization of loops and data flow sections in multi-core processor environment

The present invention relates to a method for compiling code for a multi-core processor, comprising: detecting and optimizing a loop, partitioning the loop into partitions executable and mappable on physical hardware with optimal instruction level parallelism, optimizing the loop iterations and/or loop counter for ideal mapping on hardware, chaining the loop partitions generating a list representing the execution sequence of the partitions.




sec

Data mining in a digital map database to identify blind intersections along roads and enabling precautionary actions in a vehicle

Disclosed is a feature for a vehicle that enables taking precautionary actions in response to conditions on the road network around or ahead of the vehicle, in particular, a blind intersection along a section of road. A database that represents the road network is used to determine locations where a blind intersection is located along a section of road. Then, precautionary action data is added to the database to indicate a location at which a precautionary action is to be taken about the blind intersection located along the section of road. A precautionary action system installed in a vehicle uses this database, or a database derived therefrom, in combination with a positioning system to determine when the vehicle is at a location that corresponds to the location of a precautionary action. When the vehicle is at such a location, a precautionary action is taken by a vehicle system as the vehicle is approaching a blind intersection.




sec

Inductive fault current limiter with divided secondary coil configuration

An inductive fault current limiter (1), has a normally conducting primary coil assembly (2) with a multiplicity of turns (3), and a superconducting, short-circuited secondary coil assembly (4). The primary coil assembly (2) and the secondary coil assembly (4) are disposed at least substantially coaxially with respect to each other and at least partially interleaved in each other. The secondary coil assembly (4) has a first coil section (4a) disposed radially inside the turns (3) of the primary coil assembly (2) and a second coil section (4b) disposed radially outside the turns (3) of the primary coil assembly (2). The fault current limiter has an increased inductance ratio.




sec

System and method for managing and displaying securities market information

A message screen display comprises a static non-scrollable display area for display of at least part of a first message, the first message having an associated first message time. The message screen display further comprises a scrollable display area for display of at least part of a second message, the second message having an associated second message time. The message screen display further comprises a feature applied to at least part of the first message that varies based on time as referenced to the associated first message time.




sec

Clock security device

A clock security device to be hung on a wall of a facility such as, for example, a store. The clock face has a convex mirrored surface which provides reflected panoramic view of the facility. The clock security device also includes a mounting bracket which provides for the mounting of the clock security device on the wall with the concave mirrored surface at different positions from parallel to the wall to tilted downwardly at different selected angles to the wall.