2013

Referee appointed for the 2013 UEFA Champions League final

Italian referee Nicola Rizzoli to officiate at Wembley




2013

Media accreditation opens for UEFA Women’s EURO 2013

Accreditation process starts on 1 June 2013




2013

Draws for UEFA Champions League and UEFA Europa League 2013/14

Draws for qualifying rounds to be held at UEFA Headquarters on 24 June




2013

DSHA Announces 2013 Top Lender of the Year

Delaware State Housing Authority (DSHA) announces the recipient of the 2013 Top Producing Lender Award - Trident Mortgage. Last year, Trident Mortgage successfully secured more than $29 million in mortgage loans for 188 families through DSHA’s homeownership programs. This is the fifth year in a row Trident Mortgage has earned DSHA’s Top Producing Lender Award, helping more than 710 families with more than $113 million in DSHA’s mortgages since 2009.



  • Delaware State Housing Authority

2013

अर्थसंकल्प २०१३ : सामाजिक क्षेत्र (शिक्षण, आरोग्य, महिला बालकल्याण)

महिलांच्या सर्वागीण विकासासाठी देशातील पहिली महिला बँक सुरू करण्याबरोबरच निर्भया निधी, असंघटित महिलांना विम्याच्या संरक्षणासह अल्पसंख्याक, अनुसूचित जातीजमातीच्या विद्यार्थ्यांना शिष्यवृत्ती, एआयआयएमएससारख्या उच्च वैद्यकीय शिक्षणसंस्था उभारणी, ज्येष्ठ नागरिकांना आरोग्य सुविधा, नवीन राष्ट्रीय आरोग्य योजना, शालेय विद्यार्थ्यांसाठी मध्यान्ह भोजन योजना,




2013

अर्थसंकल्प २०१३ : गुंतवणूक

अर्थसंकल्पात वित्तीय क्षेत्रासाठी करण्यात आलेल्या तरतूदी नवीन गुंतवणूकदारांना प्रोत्साहन देणाऱ्या आहेत. भारतातील पहिली महिला बँक सुरू करण्याचा व त्यासाठी सुरुवातीला १००० कोटी रुपयांची तरतूद करण्याचा निर्णय घेण्यात आला आहे. बचतीला चालना देण्यासाठी राजीव गांधी इक्विटी बचत योजनेत अनेक सकारात्मक बदल करण्यात आले आहेत.




2013

अर्थसंकल्प २०१३ : पायाभूत सुविधा, उद्योग

उद्योग तसेच पायाभूत सुविधा क्षेत्रातील गुंतवणूकीत भरघोस वाढ होण्यासाठी यंदाच्या अर्थसंकल्पात विशेष उपाययोजना केल्याचे दिसून आले. बाराव्या पंचवार्षिक योजनेच्या कालावधीत (२०१२-१७) पायाभूत सुविधा क्षेत्रात ५५ लाख कोटी रुपयांची गुंतवणूक अपेक्षित असल्याने यातील ५० हजार कोटी रुपयांचा निधी करमुक्त रोख्यांच्या माध्यमातून उभारण्याचे उद्दीष्ट सरकारने आखले आहे.




2013

Governor Markell Announces 2013 Team Excellence Awards

The 20-member Department of Natural Resources and Environmental Control Brandywine Zoo Staff Team was recognized by Governor Markell as the 2013 Governor's Team Excellence Award recipient.



  • Former Governor Jack Markell (2009-2017)
  • News
  • Office of Management and Budget
  • Office of the Governor
  • "Governor Markell"

2013

Offshore Wind International B2B Event 2013 is going to be held in Denmark

Owib 2013 will start on December 10 and continue till 12th of December in Esbjerg, Denmark.Owib is a yearly global international event devoted towards making contacts and contracts inside the industry of offshore wind. It's an elective choice to conferences…




2013

Insider Story of the New IEEE 1801-2013 (UPF 2.1) Standard

The IEEE has announced the publication of the new 1801-2013 standard, also known as UPF 2.1, and immediate availability for free download through the IEEE 1801-2013 Get Program. Even though the standard is new to the whole world, for the people of the IEEE working group this standard is finally done and is in the past now.

There is a Chinese saying "好事多磨" which means "good things take time to happen." I forgot the exact time when I first joined the working group for the new standard -- about two and half years ago -- but I do remember long hours of meetings and many "lively" debates and discussions. Since the "hard time" has passed us, I would like to share some fun facts about the working group and the standard.

  • The 1801 working group is the largest entity based ballot group in IEEE-SA history.
  • The new standard was initially planned for 2012, but was delayed purely due to the large amount of work required.
  • At one point, the group was debating on whether the new standard should be called UPF 2.1 or 3.0. It may sound weird now but we spent quite some time discussing this. Eventually we settled on 2.1 as it was the original plan.
  • The 1801-2013 document has 358 pages which is 53% thicker than previous version (the sheer amount of changes in the new standard indicate that this is more than just a normal incremental update of the previous version as suggested by naming it 2.1)
  • Around 300 real issues were reported over the previous version and a majority of them were fixed in the new release.
  • This is the first release with constructs and semantics coming from Common Power Format (CPF), a sign of convergence of the two industry leading power formats.
  • There are about 100 working group meetings in my Outlook calendar since 2011, with meeting times ranging from 2 hours to 8 hours.
  • We extensively used Google Drive (which was called Google Docs when the working group started), a great tool for productivity. I cannot imagine how any standard could have been done before Google existed!

Personally, I had an enjoyable journey, especially from having the privilege to work with many industry experts who are all passionate about low power. I do have one more thing to share though. My older daughter went from middle school to high school during the period of the development of the new standard. Since most of the meetings took place in the early morning California time, she had to endure the pain of listening to all these discussions on power domain, power switches, etc. on her way to school.

I asked her if she learned anything. She told me that other than being able to recognize the voices of Erich, John and Joe on the line, she also learned that she would never want to become an electrical or computer engineer! She was so happy that the meetings stopped a couple of months ago. But what I did not tell her is that the meetings will resume after DAC! Well, I am sure this will be a big motivation for her to get her own driving license in the summer.

If you want to get some quick technical insights into the new standard, check out my recent EE Times article IEEE 1801-2013: A bold step towards power format convergence.

Qi Wang

 





2013

3DEXPERIENCE R2019x FD08 (FP.2013) Program Directory now available

3DEXPERIENCE R2019x FD08 (FP.2013) Program Directory is now available online.





2013

Cisco Security Advisory 20130206-ata187

Cisco Security Advisory - Cisco ATA 187 Analog Telephone Adaptor firmware versions 9.2.1.0 and 9.2.3.1 contain a vulnerability that could allow an unauthenticated, remote attacker to access the operating system of the affected device. Cisco has available free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.




2013

Packet Storm Advisory 2013-0621 - Facebook Information Disclosure

Facebook suffered from an information disclosure vulnerability. If a user uploaded their contacts to Facebook and then proceeded to download their expanded dataset from the DYI (Download Your Information) section, they would receive a file called addressbook.html in their downloaded archive. The addressbook.html is supposed to house the contact information they uploaded. However, due to a flaw in how Facebook implemented this, it also housed contact information from other uploads other users have performed for the same person, provided they had one piece of matching data. This effectively built large dossiers on users and disclosed their information to anyone that knew at least one piece of matching data.




2013

Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution

Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.




2013

Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray()

Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program.




2013

Packet Storm Exploit 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.




2013

Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify()

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.




2013

Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass

Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the "rdsPasswordAllowed" field when accessing the Administrator API CFC that is used for logging in. The login function never checks if RDS is enabled when rdsPasswordAllowed="true". This means that if RDS was not configured, the RDS user does not have a password associated with their username. This means by setting rdsPasswordAllowed to "true", we can bypass the admin login to use the rdsPassword, which in most cases, is blank. These details were purchased through the Packet Storm Bug Bounty program and are being released to the community.




2013

Packet Storm Exploit 2013-0819-1 - Oracle Java BytePackedRaster.verify() Signed Integer Overflow

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.




2013

Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify()

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.




2013

Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.




2013

Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify()

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.




2013

Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption

The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.




2013

Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify()

The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.




2013

Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".




2013

Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program.




2013

Mandriva Linux Security Advisory 2013-271

Mandriva Linux Security Advisory 2013-271 - The make include files in NetBSD before 1.6.2, as used in pmake 1.111 and earlier, allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_depend##### temporary file, related to bsd.lib.mk and bsd.prog.mk.




2013

Packet Storm Exploit 2013-0903-1 - Apple Safari Heap Buffer Overflow

A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8. Earlier versions may also be affected. It was obtained through the Packet Storm Bug Bounty program.




2013

Packet Storm Advisory 2013-0903-1 - Apple Safari Heap Buffer Overflow

A heap memory buffer overflow vulnerability exists within the WebKit's JavaScriptCore JSArray::sort(...) method. This method accepts the user-defined JavaScript function and calls it from the native code to compare array items. If this compare function reduces array length, then the trailing array items will be written outside the "m_storage->m_vector[]" buffer, which leads to the heap memory corruption. This finding was purchased through the Packet Storm Bug Bounty program.




2013

Global offshore wind installed capacity up 21 percent since 2013

This week the Global Wind Energy Council (GWEC) launched the first edition of its Global Offshore Wind Report, which provides a comprehensive analysis of the prospects for the global offshore wind market, including forecast data, market-level analysis and review of efforts to lower costs.




2013

Clean Energy Spending Drops 15 Percent to Reach Lowest Level Since 2013

Global investment in clean energy slumped 15 percent in the first quarter to the lowest level in two years because of a decline in wind and utility-scale projects.




2013

US Solar Celebrates Records in 2013, Big Trends Coming in 2014

Solar photovoltaic (PV) installations in the U.S. topped 4.78 GW in 2013, an increase of 41 percent over 2012, according to the annual market review and outlook published today by the Solar Energy Industries Association (SEIA) and GTM Research. The industry won't quite maintain that torrid pace in 2014, but watch for progress on a number of important fronts, from long-anticipated investment innovation to a rebound in the midsize project sector to addressing changes to federal investment tax credits.




2013

Clean Energy Spending Drops 15 Percent to Reach Lowest Level Since 2013

Global investment in clean energy slumped 15 percent in the first quarter to the lowest level in two years because of a decline in wind and utility-scale projects.




2013

Global offshore wind installed capacity up 21 percent since 2013

This week the Global Wind Energy Council (GWEC) launched the first edition of its Global Offshore Wind Report, which provides a comprehensive analysis of the prospects for the global offshore wind market, including forecast data, market-level analysis and review of efforts to lower costs.




2013

Renewable Energy Provides 100% of All New US Electrical Generating Capacity in November 2013

According to the latest "Energy Infrastructure Update" report from the Federal Energy Regulatory Commission's Office of Energy Projects, solar, biomass, wind, geothermal, and hydropower "units" provided 394 MW — or 100 percent — of all new electrical generation placed in-service in November 2013. There was no new capacity during the month from natural gas, coal, oil, or nuclear power. Renewable energy sources also provided 99 percent of all new electrical generating capacity in October.




2013

2013 Draws to a Close: Clean Energy Scorecard

Global private capital renewable energy investments are still above $250 billion for 2013. While the final numbers are not in yet, 3rd quarter global renewable energy investments, according to Bloomberg New Energy Finance’s latest data on deals and projects, notes slightly lower global investment than in 2012 due faltering “political will to decarbonise energy mix.” They further note that the third quarter’s decline in investment will push the year’s overall investment in renewable energy and energy-smart technologies down below 2012's $281 billion. But $250+ billion ain’t shabby.




2013

RenewableEnergyWorld.com’s Most Popular Stories of 2013

As editors we delight in learning which of the stories that we wrote or commissioned were most popular with our readers. That’s why at the end of each calendar year, we pull reports that tell us which stories we posted got the most shares, the most views, the most comments, etc. We also look at which videos were watched the most. Often, we post articles that we know will be a big hit: like explanations of controversial solar legislation. But other times you surprise us, readers, by taking great interest in articles that we felt were solid but not necessarily ground-breaking.




2013

Renewable Energy’s Hottest Conversations of 2013

Here at RenewableEnergyWorld.com, we pride ourselves on our active community of readers who click, share, and comment on the articles that we post every day. While we don’t always agree with their take on the pieces we post, we always value constructive feedback and the high quality discussion that sometimes ensues.




2013

Top US Clean Energy and Climate Breakthroughs in 2013

The United States broke one record after another for extreme weather in 2013. From deadly floods in Colorado to prolonged drought across the Southwest, Americans saw what unchecked climate change can do to our communities. But we also witnessed another kind of powerful force: real and positive climate action.




2013

RenewableEnergyWorld.com's Top 10 Blogs of 2013

We here at RenewableEnergyWorld.com value each and every one of our excellent contributors that share their important and thought-provoking insights with our readers. But we have a special affinity for our outstanding blogging community.




2013

UK Renewable Electricity Generation Rose 28 Percent in 2013

U.K. renewable power generation rose 28 percent last year as more wind farms and solar plants came online, the Department of Energy and Climate Change said.




2013

Clean Energy Spending Drops 15 Percent to Reach Lowest Level Since 2013

Global investment in clean energy slumped 15 percent in the first quarter to the lowest level in two years because of a decline in wind and utility-scale projects.




2013

UK Labour Law Briefing - June 2013

Welcome to our June UK labour law update. This edition contains the following content: UK labour law news Trade union membership rises to 6.5 million reversing recent falling trends PCS and TSSA unions move closer towards mergers with Unite  ...




2013

Shipping case update: Firodi Shipping Ltd v Griffon Shipping LLC ("The Griffon") [2013] EWCA Civ 1567

In Firodi Shipping Ltd v. Griffon Shipping LLC (“The Griffon”) the Court of Appeal considered the decision of Teare J. reported in [2013] EWHC 593 (Comm). For our e-briefing article on Teare J’s decision in the Commercial Court,



2013

Transport legal update: Griffon Shipping LLC v. Firodi Shipping Ltd (The Griffon) [2013] EWHC 593 (Comm)

In Griffon Shipping LLC v. Firodi Shipping Ltd (The Griffon) Teare J considered, in the context of clause 13 of the standard form Norwegian Sale Form (“NSF”) 1993, where a buyer fails to pay the deposit under a memorandum of agreement, w...




2013

Local Government Briefing Note 2 of 2013 - Charitable Incorporated Organisations (‘CIOs’) – Available Soon!

The Charities Act 2006 (now the Charities Act 2011) introduced a new form of incorporated charitable entity, the CIO.  There has been a long delay in making CIOs available but their imminent arrival has been heralded by a recent government anno...




2013

Local Government Briefing Note 1 of 2013 - December 2012 UK Government Announces Future Changes to the CRC Energy Efficiency Scheme (“CRC Scheme”)

Many in local government will already be familiar with the CRC Scheme. This is the UK’s mandatory emissions trading scheme aimed at improving energy efficiency and cutting carbon dioxide emissions in large public and privat...




2013

Local Government Briefing Note 3 of 2013 - State Aid: Proposed Reform of the Enabling Regulation

The European Commission has announced proposals to amend the Enabling Regulation adopted in 1998. This forms part of the EC’s State Aid Modernisation Initiative. It will allow the EC to focus on larger more...