pte

Governor Markell Orders Flags Lowered on September 11

Governor Markell has ordered the Delaware and American flags to be lowered to half-staff on Friday, September 11, in remembrance of the victims who lost their lives on September 11, 2001.




pte

UPDATE – Flag lowering for Friday, September 20

Previous guidance issued this morning provided for the U.S. and Delaware flags to be flown at half staff Friday, September 20 to mark the passing of former Public Defender Larry Sullivan. Title 29, Section 408 of the Delaware Code requires Delaware State agencies, including all public schools, to display a POW/MIA flag on National POW/MIA […]




pte

Applications now accepted for second round of urban agriculture and community garden micro-grants

Organizations wanting to launch or expand an urban agriculture or community garden project to benefit their neighborhood can apply for micro-grants from the Delaware Department of Agriculture.



  • Department of Agriculture

pte

Challenge accepted: Learning data prep in CASL

As a long-time SAS 9 programmer, I typically accomplish my data preparation tasks through some combination of the DATA Step, Proc SQL, Proc Transpose and some housekeeping procs like Proc Contents and Proc Datasets. With the introduction of SAS Viya, SAS released a new scripting language called CASL – a [...]

Challenge accepted: Learning data prep in CASL was published on SAS Users.




pte

Nominations for Governor’s Volunteer Awards Accepted Through Aug. 16

DOVER (July 18, 2019) – Nominations for the Governor’s Volunteer Service Awards are being accepted by the State Office of Volunteerism through Friday, Aug. 16. These awards recognize the important contributions made by Delaware’s volunteers to their communities. Award recipients will be honored Tuesday, Oct. 29, at Dover Downs Hotel and Conference Center. “Thousands of […]



  • Delaware Health and Social Services
  • Governor John Carney
  • Office of the Governor
  • Division of State Service Centers
  • State Office of Volunteerism
  • volunteer

pte

Challenge accepted: Learning data prep in CASL

As a long-time SAS 9 programmer, I typically accomplish my data preparation tasks through some combination of the DATA Step, Proc SQL, Proc Transpose and some housekeeping procs like Proc Contents and Proc Datasets. With the introduction of SAS Viya, SAS released a new scripting language called CASL – a [...]

Challenge accepted: Learning data prep in CASL was published on SAS Users.




pte

Mutual Funds see net outflows of Rs 2.12 Lakh crore in March, highest since September 2018

While debt funds saw sharp outflows, equity funds surprised the industry as it saw net inflows of Rs 11,722.74 crore in March — the highest in the current financial year.




pte

Guide to new features of Intel XDK kit release September 2014

  I want to start this blog with a big thank you to all of our Intel® XDK users for the enthusiastic, positive feedback to our July release of Cordova* Plugins support. It shows that we are on the r...




pte

Coronavirus lockdown has severely disrupted supply chains, says Niti Aaayog CEO Amitabh Kant

The need of the hour is to promote remote working and expand gig economy, speakers at a Niti Aaayog-organised Webinar said.




pte

Over 90% gold loan customers have not opted for moratorium: VP Nandakumar, MD and CEO, Manappuram Finance

In the gold loan category, which accounts for 87% of our standalone portfolio, more than 90% are servicing their dues.




pte

Indian-origin girl gets honour of naming NASA’s first Mars helicopter

Rupani, a high school junior from Northport, Alabama, earned the honour of naming the helicopter after she submitted her essay into NASA's "Name the Rover" contest.




pte

Oregon: No large gatherings through September

Large gatherings at sports and other events in Oregon should either be canceled or significantly modified through September because of the coronavirus pandemic, Gov. Kate Brown announced Thursday.




pte

Verification of the Lane Adapter FSM of a USB4 Router Design Is Not Simple

Verifying lane adapter state machine in a router design is quite an involved task and needs verification from several aspects including that for its link training functionality.

The diagram below shows two lane adapters connected to each other and each going through the link training process. Each training sub-state transition is contingent on conditions for both transmission and reception of relevant ordered sets needed for a transition. Until conditions for both are satisfied an adapter cannot transition to the next training sub-state.

As deduced from the lane adapter state machine section of USB4 specification, the reception condition for the next training sub-state transition is less strict than that of the transmission condition. For ex., for LOCK1 to LOCK2 transition, the reception condition requires only two SLOS symbols in a row being detected, while the transmission condition requires at least four complete SLOS1 ordered sets to be sent.

From the above conditions in the specification, it is a possibility that a lane adapter A may detect the two SLOS or TS ordered sets, being sent by the lane adapter B on the other end, in the very beginning as soon as it starts transmitting its own SLOS or TS ordered sets. On the other hand, it is also a possibility that these SLOS or TS ordered sets are not yet detected by lane adapter A even when it has met the condition of sending minimum number of SLOS or TS ordered sets.

In such a case, lane adapter A, even though it has satisfied the transmission condition cannot transition to the next sub-state because the reception condition is not yet met. Hence lane adapter A must first wait for the required number of ordered sets to be detected by it before it can go to the next sub-state. But this wait cannot be endless as there are timeouts defined in the specification, after which the training process may be re-attempted.

This interlocked way of operation also ensures that state machine of a lane adapter does not go out of sync with that of the other lane adapter. Such type of scenarios can occur whenever lane adapter state machine transitions to the training state from other states.

Cadence has a mature Verification IP solution for the verification of various aspects of the logical layer of a USB4 router design, with verification capabilities provided to do a comprehensive verification of it.




pte

post-execution on an interrupted SKILL routine

I have a SKILL script that executes the callback of a menu item, and depends on first redefining an environment variable. 

When a user interrupts the script with ctrl-C, the script cannot finish to set the environment variable back to its default value.

How can I write the script in a way that handles a user interrupt to reset the changed environment variable after the interrupt?






pte

Hyperion Runtime Encrypter 2.0

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".




pte

Hyperion Runtime Encrypter 2.3

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".






pte

Optergy 2.3.0a Remote Root

Optergy versions 2.3.0a and below authenticated file upload remote root code execution exploit.




pte

Mandos Encrypted File System Unattended Reboot Utility 1.8.10

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.





pte

Running Encrypted ELF Binaries In Memory

Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.




pte

Global TV Unencrypted Analytics

The Global TV Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to both first (CNAME to third) and third party sites (Adobe Experience Cloud, ScorecardResearch). Global TV Android versions 2.3.2 and below and iOS versions 4.7.5 and below are affected.




pte

Citytv Video Unencrypted Analytics

The Citytv Video Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to third party sites (Adobe Experience Cloud, ScorecardResearch). Citytv Video Android versions 4.08.0 and below and iOS versions 3.36 and below are affected.




pte

Mandos Encrypted File System Unattended Reboot Utility 1.8.11

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.




pte

HP Data Protector Encrypted Communication Remote Command Execution

This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2.




pte

Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS







pte

OpenSSH Chink Bares Encrypted Data Packets




pte

September 2017





pte

Spotlight on Alumni: Nepal Chapter Raises Funds for Tsunami Survivors, Street Children, and Fosters International Ties with Alumni

Spotlight on Alumni: Nepal Chapter Raises Funds for Tsunami Survivors, Street Children, and Fosters International Ties with Alumni

Between raising funds for victims of the 2004 Asian tsunami, helping support educational programs for street children, and forging a sister-chapter relationship with alumni in Australia, the EWCA Nepal Alumni Chapter in Kathmandu has been busy carrying out the Center’s mission in South Asia.




pte

Applications Being Accepted for 42nd Summer Seminar on Population

Applications Being Accepted for 42nd Summer Seminar on Population
Trio of independent workshops will focus on designing fertility analysis,
effective responses to HIV and communicating with policymakers

HONOLULU (Nov. 4, 2010) – Applications are being accepted through December 31 for the East-West Center’s 2011 Summer Seminar on Population. Held annually since 1970, the Summer Seminar provides a forum for learning and discussion on a wide range of population and health issues. Former participants work in government, nongovernmental (NGO), and academic institutions throughout the Asia-Pacific region and around the world.

Click here for full information on the Summer Seminar workshops, instructions for applicants, and application forms from the Summer Seminar website.




pte

Asia Pacific Leadership Program Applications Accepted Through Dec 1.

Asia Pacific Leadership Program Applications Accepted Through Dec 1
HONOLULU (Nov. 12, 2010) – The application deadline for the East-West Center's 2011-12 Asia Pacific Leadership Program (APLP) – considered the premier leadership education program in the Asia Pacific region – is Dec 1, 2010.

Entering its eleventh year, the APLP is a graduate certificate program combining the development of regional expertise with the enhancement of individual leadership capacity. Based at the Center in Honolulu, Hawaii, the program has created a network of dynamic leaders in 52 countries. All participants receive a fee-waiver fellowship valued at approximately $15,000.




pte

Applications for Asia Pacific Leadership Program Being Accepted Through Jan. 31

Applications for Asia Pacific Leadership Program Being Accepted Through Jan. 31
HONOLULU (Dec. 18) – The application deadline for the East-West Center's 2010-11 Asia Pacific Leadership Program (APLP) – considered the premier leadership education program in the Asia Pacific region – is Jan. 31, 2010.

Entering its tenth year, the APLP is a graduate certificate program combining the development of regional expertise with the enhancement of individual leadership capacity. Based at the Center in Honolulu, Hawaii, the program has created a network of dynamic leaders in 48 countries. All participants receive a fee-waiver valued at approximately $15,000.




pte

Applications Being Accepted for Summer Institute in International Humanitarian Law and Human Rights

Applications Being Accepted for Summer Institute in International Humanitarian Law and Human Rights
Two-week professional workshop in Indonesia during May will focus on “Internal Conflicts in the Asia Pacific Region”

HONOLULU (Nov. 19) – Applications are being accepted through Jan. 1 for the third annual Summer Institute in International Humanitarian Law (IHL) and Human Rights. Organized by the Asian International Justice Initiative – a collaboration between the East-West Center and the University of California-Berkeley War Crimes Studies Center




pte

Applications Being Accepted for Summer Population Seminar

Applications Being Accepted for Summer Population Seminar

Trio of independent workshops will focus on population aging, health-care financing and communicating with policymakers

HONOLULU (Dec. 1) – Applications are being accepted through December 31 for the East-West Center’s 2010 Summer Seminar on Population. Held annually since 1970, the Summer Seminar provides a forum for learning and discussion on a wide range of population and health issues. Former participants work in government, nongovernmental (NGO), and academic institutions throughout the Asia-Pacific region and around the world.

Full information on the Summer Seminar workshops, instructions for applicants, and application forms can be obtained from the Summer Seminar website at http://www.eastwestcenter.org/summerseminar .




pte

New EWC Alumni Chapters in Aceh and Timor-Leste Extend Center’s Outreach

New EWC Alumni Chapters in Aceh and Timor-Leste Extend Center’s Outreach
HONOLULU (Aug. 7) — The East-West Center Association (EWCA) recently established two new alumni chapters in Southeast Asia.  The new chapters located in Aceh, Indonesia and Dili, Timor-Leste (East Timor) raises the number of chapters in the EWCA global network to 46.




pte

East-West Center to Honor Distinguished Alumni at Okinawa Conference in September

HONOLULU (July 24, 2014) – The East-West Center has announced the names of EWC alumni, volunteers and a local alumni chapter that will be honored at the Center’s upcoming international alumni conference in Okinawa. The honorees are being recognized for their outstanding personal accomplishments and service toward the Center’s mission of helping to promote better relations and understanding among the peoples of Asia, the Pacific and the United States.

Distinguished Alumni Award




pte

Quarterly labour law update - September 2009

Welcome to our quarterly labour law update. This edition contains the following content: News A record rise in tribunal protective award claims Gordon Brown makes agency...




pte

La perseverancia de los santos, 1ª Pte.

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




pte

La perseverancia de los santos, 1ª Pte. B

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




pte

La perseverancia de los santos, 2ª Pte.

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




pte

La perseverancia de los santos, 3ª Pte.

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




pte

La suficiencia de la Escritura, 2ª Pte.

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




pte

La suficiencia de la Escritura, 2ª Pte. B

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.