pte Governor Markell Orders Flags Lowered on September 11 By news.delaware.gov Published On :: Thu, 10 Sep 2015 20:40:44 +0000 Governor Markell has ordered the Delaware and American flags to be lowered to half-staff on Friday, September 11, in remembrance of the victims who lost their lives on September 11, 2001. Full Article Flag Status Former Governor Jack Markell (2009-2017) Office of Management and Budget Office of the Governor "Governor Markell"
pte UPDATE – Flag lowering for Friday, September 20 By news.delaware.gov Published On :: Thu, 19 Sep 2019 14:48:19 +0000 Previous guidance issued this morning provided for the U.S. and Delaware flags to be flown at half staff Friday, September 20 to mark the passing of former Public Defender Larry Sullivan. Title 29, Section 408 of the Delaware Code requires Delaware State agencies, including all public schools, to display a POW/MIA flag on National POW/MIA […] Full Article Flag Status Office of Management and Budget
pte Applications now accepted for second round of urban agriculture and community garden micro-grants By news.delaware.gov Published On :: Wed, 23 Nov 2016 13:37:23 +0000 Organizations wanting to launch or expand an urban agriculture or community garden project to benefit their neighborhood can apply for micro-grants from the Delaware Department of Agriculture. Full Article Department of Agriculture
pte Challenge accepted: Learning data prep in CASL By feedproxy.google.com Published On :: Mon, 16 Mar 2020 11:52:52 +0000 As a long-time SAS 9 programmer, I typically accomplish my data preparation tasks through some combination of the DATA Step, Proc SQL, Proc Transpose and some housekeeping procs like Proc Contents and Proc Datasets. With the introduction of SAS Viya, SAS released a new scripting language called CASL – a [...] Challenge accepted: Learning data prep in CASL was published on SAS Users. Full Article Tech CASL Data preparation Developers sas programming SAS Viya
pte Nominations for Governor’s Volunteer Awards Accepted Through Aug. 16 By news.delaware.gov Published On :: Thu, 18 Jul 2019 15:03:03 +0000 DOVER (July 18, 2019) – Nominations for the Governor’s Volunteer Service Awards are being accepted by the State Office of Volunteerism through Friday, Aug. 16. These awards recognize the important contributions made by Delaware’s volunteers to their communities. Award recipients will be honored Tuesday, Oct. 29, at Dover Downs Hotel and Conference Center. “Thousands of […] Full Article Delaware Health and Social Services Governor John Carney Office of the Governor Division of State Service Centers State Office of Volunteerism volunteer
pte Challenge accepted: Learning data prep in CASL By feedproxy.google.com Published On :: Mon, 16 Mar 2020 11:52:52 +0000 As a long-time SAS 9 programmer, I typically accomplish my data preparation tasks through some combination of the DATA Step, Proc SQL, Proc Transpose and some housekeeping procs like Proc Contents and Proc Datasets. With the introduction of SAS Viya, SAS released a new scripting language called CASL – a [...] Challenge accepted: Learning data prep in CASL was published on SAS Users. Full Article Tech CASL Data preparation Developers sas programming SAS Viya
pte Mutual Funds see net outflows of Rs 2.12 Lakh crore in March, highest since September 2018 By www.financialexpress.com Published On :: 2020-04-10T06:35:00+05:30 While debt funds saw sharp outflows, equity funds surprised the industry as it saw net inflows of Rs 11,722.74 crore in March — the highest in the current financial year. Full Article Money
pte Guide to new features of Intel XDK kit release September 2014 By feedproxy.google.com Published On :: 2015-02-16T16:45:00+05:30 I want to start this blog with a big thank you to all of our Intel® XDK users for the enthusiastic, positive feedback to our July release of Cordova* Plugins support. It shows that we are on the r... Full Article
pte Coronavirus lockdown has severely disrupted supply chains, says Niti Aaayog CEO Amitabh Kant By www.financialexpress.com Published On :: 2020-04-19T00:01:00+05:30 The need of the hour is to promote remote working and expand gig economy, speakers at a Niti Aaayog-organised Webinar said. Full Article Economy
pte Over 90% gold loan customers have not opted for moratorium: VP Nandakumar, MD and CEO, Manappuram Finance By www.financialexpress.com Published On :: 2020-05-08T03:10:00+05:30 In the gold loan category, which accounts for 87% of our standalone portfolio, more than 90% are servicing their dues. Full Article Banking & Finance Industry
pte Indian-origin girl gets honour of naming NASA’s first Mars helicopter By www.financialexpress.com Published On :: 2020-04-30T16:57:00+05:30 Rupani, a high school junior from Northport, Alabama, earned the honour of naming the helicopter after she submitted her essay into NASA's "Name the Rover" contest. Full Article Lifestyle Science
pte Oregon: No large gatherings through September By www.espn.com Published On :: Thu, 7 May 2020 17:44:57 EST Large gatherings at sports and other events in Oregon should either be canceled or significantly modified through September because of the coronavirus pandemic, Gov. Kate Brown announced Thursday. Full Article
pte Verification of the Lane Adapter FSM of a USB4 Router Design Is Not Simple By feedproxy.google.com Published On :: Mon, 10 Feb 2020 15:19:00 GMT Verifying lane adapter state machine in a router design is quite an involved task and needs verification from several aspects including that for its link training functionality. The diagram below shows two lane adapters connected to each other and each going through the link training process. Each training sub-state transition is contingent on conditions for both transmission and reception of relevant ordered sets needed for a transition. Until conditions for both are satisfied an adapter cannot transition to the next training sub-state. As deduced from the lane adapter state machine section of USB4 specification, the reception condition for the next training sub-state transition is less strict than that of the transmission condition. For ex., for LOCK1 to LOCK2 transition, the reception condition requires only two SLOS symbols in a row being detected, while the transmission condition requires at least four complete SLOS1 ordered sets to be sent. From the above conditions in the specification, it is a possibility that a lane adapter A may detect the two SLOS or TS ordered sets, being sent by the lane adapter B on the other end, in the very beginning as soon as it starts transmitting its own SLOS or TS ordered sets. On the other hand, it is also a possibility that these SLOS or TS ordered sets are not yet detected by lane adapter A even when it has met the condition of sending minimum number of SLOS or TS ordered sets. In such a case, lane adapter A, even though it has satisfied the transmission condition cannot transition to the next sub-state because the reception condition is not yet met. Hence lane adapter A must first wait for the required number of ordered sets to be detected by it before it can go to the next sub-state. But this wait cannot be endless as there are timeouts defined in the specification, after which the training process may be re-attempted. This interlocked way of operation also ensures that state machine of a lane adapter does not go out of sync with that of the other lane adapter. Such type of scenarios can occur whenever lane adapter state machine transitions to the training state from other states. Cadence has a mature Verification IP solution for the verification of various aspects of the logical layer of a USB4 router design, with verification capabilities provided to do a comprehensive verification of it. Full Article Verification IP DP VIP DisplayPort PCIExpress USB Lane Adapter usb4 PCIe usb4 router tunneling
pte post-execution on an interrupted SKILL routine By feedproxy.google.com Published On :: Fri, 01 May 2020 23:35:50 GMT I have a SKILL script that executes the callback of a menu item, and depends on first redefining an environment variable. When a user interrupts the script with ctrl-C, the script cannot finish to set the environment variable back to its default value. How can I write the script in a way that handles a user interrupt to reset the changed environment variable after the interrupt? Full Article
pte Encrypted Email Service ProtonMail Opens Door For Tor Users By packetstormsecurity.com Published On :: Thu, 19 Jan 2017 13:55:21 GMT Full Article headline government privacy email spyware cryptography switzerland
pte "Unauthorized Code" In Juniper Firewalls Decrypts Encrypted VPN Traffic By packetstormsecurity.com Published On :: Fri, 18 Dec 2015 01:55:21 GMT Full Article headline privacy flaw juniper backdoor cryptography
pte Hyperion Runtime Encrypter 2.0 By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:41:35 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
pte Hyperion Runtime Encrypter 2.3 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 20:32:22 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
pte Dutch Cops Intercepted BlackBox Comms, Arrests Coming By packetstormsecurity.com Published On :: Wed, 07 Nov 2018 16:31:57 GMT Full Article headline government privacy phone cybercrime fraud netherlands cryptography
pte Feds Once Again Demand Apple Unlock Encrypted iPhones By packetstormsecurity.com Published On :: Wed, 08 Jan 2020 16:25:50 GMT Full Article headline government privacy usa phone apple terror fbi cryptography
pte Optergy 2.3.0a Remote Root By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 18:44:20 GMT Optergy versions 2.3.0a and below authenticated file upload remote root code execution exploit. Full Article
pte Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
pte Weakness In Intel Chips Lets Researchers Steal Encrypted SSH Keystrokes By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 13:56:24 GMT Full Article headline privacy flaw password cryptography intel
pte Running Encrypted ELF Binaries In Memory By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:45:14 GMT Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project. Full Article
pte Global TV Unencrypted Analytics By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:30:17 GMT The Global TV Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to both first (CNAME to third) and third party sites (Adobe Experience Cloud, ScorecardResearch). Global TV Android versions 2.3.2 and below and iOS versions 4.7.5 and below are affected. Full Article
pte Citytv Video Unencrypted Analytics By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:33:11 GMT The Citytv Video Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to third party sites (Adobe Experience Cloud, ScorecardResearch). Citytv Video Android versions 4.08.0 and below and iOS versions 3.36 and below are affected. Full Article
pte Mandos Encrypted File System Unattended Reboot Utility 1.8.11 By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 15:00:12 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
pte HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
pte Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google
pte Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
pte German Police Handed Hacking Powers To Bypass Encrypted Communications By packetstormsecurity.com Published On :: Sat, 24 Jun 2017 16:49:10 GMT Full Article headline government privacy phone germany spyware backdoor cryptography
pte Apple Mail On macOS Leaves Parts Of Encrypted Emails In Clear By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:41 GMT Full Article headline privacy email flaw apple cryptography
pte OpenSSH Chink Bares Encrypted Data Packets By packetstormsecurity.com Published On :: Tue, 19 May 2009 09:13:21 GMT Full Article ssh
pte Ten Clean Energy Stocks for 2014: September Swoon By feedproxy.google.com Published On :: 2014-10-07T14:52:00Z Worries including the conflict with ISIL, Ebola, and economic slow-down in Europe, sent the stock market down in the month to October 3rd, with small cap stocks and clean energy stocks falling even farther than the large cap S&P 500. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Opinion & Commentary Solar Geothermal
pte Spotlight on Alumni: Nepal Chapter Raises Funds for Tsunami Survivors, Street Children, and Fosters International Ties with Alumni By feedproxy.google.com Published On :: Thu, 07 Apr 2011 08:35:34 +0000 Spotlight on Alumni: Nepal Chapter Raises Funds for Tsunami Survivors, Street Children, and Fosters International Ties with Alumni Between raising funds for victims of the 2004 Asian tsunami, helping support educational programs for street children, and forging a sister-chapter relationship with alumni in Australia, the EWCA Nepal Alumni Chapter in Kathmandu has been busy carrying out the Center’s mission in South Asia. Full Article
pte Applications Being Accepted for 42nd Summer Seminar on Population By feedproxy.google.com Published On :: Thu, 07 Apr 2011 08:32:06 +0000 Applications Being Accepted for 42nd Summer Seminar on Population Trio of independent workshops will focus on designing fertility analysis, effective responses to HIV and communicating with policymakers HONOLULU (Nov. 4, 2010) – Applications are being accepted through December 31 for the East-West Center’s 2011 Summer Seminar on Population. Held annually since 1970, the Summer Seminar provides a forum for learning and discussion on a wide range of population and health issues. Former participants work in government, nongovernmental (NGO), and academic institutions throughout the Asia-Pacific region and around the world. Click here for full information on the Summer Seminar workshops, instructions for applicants, and application forms from the Summer Seminar website. Full Article
pte Asia Pacific Leadership Program Applications Accepted Through Dec 1. By feedproxy.google.com Published On :: Thu, 07 Apr 2011 08:32:06 +0000 Asia Pacific Leadership Program Applications Accepted Through Dec 1 HONOLULU (Nov. 12, 2010) – The application deadline for the East-West Center's 2011-12 Asia Pacific Leadership Program (APLP) – considered the premier leadership education program in the Asia Pacific region – is Dec 1, 2010. Entering its eleventh year, the APLP is a graduate certificate program combining the development of regional expertise with the enhancement of individual leadership capacity. Based at the Center in Honolulu, Hawaii, the program has created a network of dynamic leaders in 52 countries. All participants receive a fee-waiver fellowship valued at approximately $15,000. Full Article
pte Applications for Asia Pacific Leadership Program Being Accepted Through Jan. 31 By feedproxy.google.com Published On :: Thu, 07 Apr 2011 08:32:17 +0000 Applications for Asia Pacific Leadership Program Being Accepted Through Jan. 31 HONOLULU (Dec. 18) – The application deadline for the East-West Center's 2010-11 Asia Pacific Leadership Program (APLP) – considered the premier leadership education program in the Asia Pacific region – is Jan. 31, 2010. Entering its tenth year, the APLP is a graduate certificate program combining the development of regional expertise with the enhancement of individual leadership capacity. Based at the Center in Honolulu, Hawaii, the program has created a network of dynamic leaders in 48 countries. All participants receive a fee-waiver valued at approximately $15,000. Full Article
pte Applications Being Accepted for Summer Institute in International Humanitarian Law and Human Rights By feedproxy.google.com Published On :: Thu, 07 Apr 2011 08:32:18 +0000 Applications Being Accepted for Summer Institute in International Humanitarian Law and Human Rights Two-week professional workshop in Indonesia during May will focus on “Internal Conflicts in the Asia Pacific Region” HONOLULU (Nov. 19) – Applications are being accepted through Jan. 1 for the third annual Summer Institute in International Humanitarian Law (IHL) and Human Rights. Organized by the Asian International Justice Initiative – a collaboration between the East-West Center and the University of California-Berkeley War Crimes Studies Center Full Article
pte Applications Being Accepted for Summer Population Seminar By feedproxy.google.com Published On :: Thu, 07 Apr 2011 08:32:18 +0000 Applications Being Accepted for Summer Population Seminar Trio of independent workshops will focus on population aging, health-care financing and communicating with policymakers HONOLULU (Dec. 1) – Applications are being accepted through December 31 for the East-West Center’s 2010 Summer Seminar on Population. Held annually since 1970, the Summer Seminar provides a forum for learning and discussion on a wide range of population and health issues. Former participants work in government, nongovernmental (NGO), and academic institutions throughout the Asia-Pacific region and around the world. Full information on the Summer Seminar workshops, instructions for applicants, and application forms can be obtained from the Summer Seminar website at http://www.eastwestcenter.org/summerseminar . Full Article
pte New EWC Alumni Chapters in Aceh and Timor-Leste Extend Center’s Outreach By feedproxy.google.com Published On :: Thu, 07 Apr 2011 08:32:41 +0000 New EWC Alumni Chapters in Aceh and Timor-Leste Extend Center’s Outreach HONOLULU (Aug. 7) — The East-West Center Association (EWCA) recently established two new alumni chapters in Southeast Asia. The new chapters located in Aceh, Indonesia and Dili, Timor-Leste (East Timor) raises the number of chapters in the EWCA global network to 46. Full Article
pte East-West Center to Honor Distinguished Alumni at Okinawa Conference in September By feedproxy.google.com Published On :: Fri, 25 Jul 2014 01:45:07 +0000 HONOLULU (July 24, 2014) – The East-West Center has announced the names of EWC alumni, volunteers and a local alumni chapter that will be honored at the Center’s upcoming international alumni conference in Okinawa. The honorees are being recognized for their outstanding personal accomplishments and service toward the Center’s mission of helping to promote better relations and understanding among the peoples of Asia, the Pacific and the United States. Distinguished Alumni Award Full Article
pte Quarterly labour law update - September 2009 By www.eversheds.com Published On :: 2009-10-01 Welcome to our quarterly labour law update. This edition contains the following content: News A record rise in tribunal protective award claims Gordon Brown makes agency... Full Article
pte La perseverancia de los santos, 1ª Pte. By feeds.gracia.org Published On :: Mon, 30 Sep 2019 00:00:00 PST La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día. Full Article
pte La perseverancia de los santos, 1ª Pte. B By feeds.gracia.org Published On :: Tue, 01 Oct 2019 00:00:00 PST La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día. Full Article
pte La perseverancia de los santos, 2ª Pte. By feeds.gracia.org Published On :: Wed, 02 Oct 2019 00:00:00 PST La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día. Full Article
pte La perseverancia de los santos, 3ª Pte. By feeds.gracia.org Published On :: Thu, 03 Oct 2019 00:00:00 PST La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día. Full Article
pte La suficiencia de la Escritura, 2ª Pte. By feeds.gracia.org Published On :: Wed, 04 Dec 2019 00:00:00 PST La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día. Full Article
pte La suficiencia de la Escritura, 2ª Pte. B By feeds.gracia.org Published On :: Thu, 05 Dec 2019 00:00:00 PST La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día. Full Article