View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1person0.748
2reddish orange color0.834

Cuomo Accused Of Lying

In Government, Video by CBS New YorkLeave a Comment

Tech News Keywords: , , , , ,

Published on Nov 17, 2017New York Republicans are questioning Gov. Andrew Cuomo’s honesty, accusing home of “outright lying” while criticizing the GOP tax plan. CBS2's Tony Aiello reports. Category License Standard YouTube License Detecte... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification

Preview: “The Takeout” with Gov. Tom Ridge

In Video by CBS NewsLeave a Comment

Tech News Keywords: , ,

Published on Nov 16, 2017On this week's episode of "The Takeout" CBS News chief White House correspondent Major Garrett and CBS News political director Steve Chaggaris sit down for breakfast with Tom Ridge. Category License Standard YouTube License No C... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1ballpoint pen0.793pen, ballpoint pen
2pen0.853
3jade green color0.85
4orange color0.609

Micropurchase auctions: Is 18F getting big value on small buys?

In Business, Government by Federal TimesLeave a Comment

Tech News Keywords: , , ,

Innovation comes with risks — any new venture has the potential for failure. General Services Administration’s David Zvenyach, director of acquisition management for 18F, knew this when his team decided to try buying programming work using an innovative micropurchase auction. “It’s true; this might be a terrible idea,” he wrote in October 2015, introducing the idea of using the agency’s credit card to pay for small jobs — under $3,500, by the federal acquisition regulation — and using a reverse auction to secure th... Read More
View Post

CVE-2000-0088 (office, office_converter_pack, powerpoint, word)

In Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More
View Post

CVE-2003-0003 (windows_2000, windows_2000_terminal_services, windows_nt, windows_xp)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More
View Post

CVE-2003-0820 (word, works)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

Current Description Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack. Source:  MITRE      Last Modified:  12/15/2003      ... Read More
View Post

CVE-2003-0821 (word, works)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More
View Post

CVE-2006-2356 (whatsup)

In Security by NIST NVDLeave a Comment

Tech News Keywords: , , ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More
View Post

CVE-2006-2387 (office)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

Current Description Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, Excel Viewer 2003, and Microsoft Works Suite 2004 through 2006 allows user-assisted attackers to execute arbitrary code via a crafted DATETIME record in an XLS file, a different vulnerability than CVE-2006-3867 and CVE-2006-3875. Source:  MITRE      Last Modified:  ... Read More
View Post

CVE-2006-3449 (powerpoint)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

Current Description Unspecified vulnerability in Microsoft PowerPoint 2000 through 2003, possibly a buffer overflow, allows user-assisted remote attackers to execute arbitrary commands via a malformed record in the BIFF file format used in a PPT file, a different issue than CVE-2006-1540, aka "Microsoft PowerPoint Malformed Record Vulnerability." Source:  MITRE      Last Modified:  08/08/2006      View Analysis Description ... Read More
View Post

CVE-2006-3650 (office)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

Current Description Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac do not properly parse the length of a chart record, which allows remote user-assisted attackers to execute arbitrary code via a Word document with an embedded malformed chart record that triggers an overwrite of pointer values with values from the document, a different vulnerability than CVE-2006-3434, CVE-2006-3864, and CVE-2006-3868. Source:  MITRE      Last Modified:  10/10/2006      View Analysis Description ... Read More
View Post

CVE-2006-3876 (office)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

Current Description Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via a crafted Data record in a PPT file, a different vulnerability than CVE-2006-3435 and CVE-2006-4694. Source:  MITRE      Last Modified:  ... Read More
View Post

New York Today: New York Today: Chicago Pizza vs. the New York Slice

In Business, Education, Emerging Technology, Government, Legal, Science & Nature by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

Photo Never enough. Credit Hiroko Masuike/The New York Times Good morning on this wettish Thursday.Mayor Bill de Blasio’s press secretary ... Read More
View Post

Controversial Alabama election looms over GOP’s tax reform fight

In Government, Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , ,

Former New Hampshire Gov. John Sununu discusses Congress’ push to pass tax reform -- and possibly repeal the Affordable Care Act individual mandate -- ahead of a controversial Alabama U.S. Senate race amid sexual assault allegations against Republican Judge Roy Moore.No Closed Captioning Detected within this Video.... Read More
View Post
Number of Items Identified: 14
Item #Item NameScoreItem Classification
1laboratory bench0.634furniture, table, laboratory bench
2table0.634
3furniture0.635
4person0.665
5scholar0.637person, scholar
6alabaster color0.781
7ash grey color0.781

New York Today: New York Today: A Renowned Chef’s Advice for Beginners

In Business, Education, Emerging Technology, Government, Healthcare, Legal, Science & Nature by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

Photo ... Read More
View Post

CVE-2011-1935 (libpcap)

In Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

Current Description pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets. Source:  MITRE      Last Modified:  10/20/2017      ... Read More
View Post

PR Gov. Requests 94 Billion in Disaster Relief

In Business, Government, Science & Nature, Video by Associated PressLeave a Comment

Tech News Keywords: , , ,

Puerto Rico Governor Ricardo Rosello Monday requests federal assistance to the tune of $94.4 billion to recover from damages caused by hurricanes Irma and Maria last September. (Nov. 13)Subscribe for more Breaking News: http://smarturl.it/AssociatedPressGet updates and more Breaking News here: ... Read More
View Post

Cuomo, a Master of the $50,000 Fund-Raiser, Bypasses Small Donors

In Business, Emerging Technology, Finance, Government by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

With a 70 percent approval rating in New York City, including more than half of Republicans in a poll last month, Mr. Cuomo’s path to re-election seems smooth. Still, he is taking no chances; his bulging war chest makes him a particularly imposing front-runner.He will add to it this week as he heads to California, with stops in San Francisco and Beverly Hills, and an itinerary typical of his big-money fund-raising calendar. Donors will be asked for as much as $50,000 to rub shoulders with the governor at the home of Jeff Shell, the chairman... Read More
View Post

Gov. Scott Walker, Foxconn Sign Plant Agreement

In Business, Government, Video by Associated PressLeave a Comment

Tech News Keywords: , , ,

Gov. Scott Walker and Foxconn Technology Group Chairman Terry Gou have signed off on a $3 billion contract for the Taiwanese company to build a massive display screen factory in southeast Wisconsin. (Nov. 10)Subscribe for more Breaking News: http://smarturl.it/AssociatedPressGet updates and more Breaking News here: ... Read More
View Post

State: New regulations boost workers’ scheduling protections

In Emerging Technology, Government by Long Island Business NewsLeave a Comment

Tech News Keywords: , , ,

The Cuomo administration says it’s implementing new regulations that require employers to pay workers extra when they’re called in at the last minute. Democratic Gov. Andrew Cuomo announced Friday that the state Department of Labor’s new regulations address the practice of scheduling retail and other workers with short notice. He says the regulations establish a 14-day advance notice standard for scheduling and provide two hours’ extra pay for last-minute assignments. The new rules also provide for extra compensation when workers have to be o... Read More
View Post

Indonesian President’s Daughter Gets Married in Lavish Ceremony

In Video by NewsBeat SocialLeave a Comment

Tech News Keywords: , , , ,

Detected Closed Captioning: A Lavish Wedding Ceremony For The Daughter Of Indonesian President Joko Widodo Captured The Country's Attention. Widodo's Daughter, Kahiyang Ayu, Married Bobby Afif Nasution In The City Of Solo On Nov. 8. The Bride And Groom Are Both 26 Years Old And Dated For A Year Before Getting Engaged. Many Indonesian Politicians And Dignitaries Attended The Ceremony, Including Widodo's Cabinet And Jakarta Gov. Anies Baswedan. The President's Family Guided Her Through A Series Of Traditional Javanese Rituals The Night Before The Wedding. The Wedding Party Made Their Way To The Ceremony The Next Day In A Lavish Wedding Procession, Which Included Eight Horse-drawn Chariots. The Ceremony Was Also Held According T... Read More

CVE-2008-7319

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2010-3659 (typo3)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2011-5320 (glibc)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2013-6049 (apt-listbugs, debian_linux)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-0029 (subscription_asset_manager)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-2277 (perltidy)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-2664 (x2crm)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-3164 (android)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: , ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-3702 (edeploy)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-3706 (enterprise_mrg)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-3709 (keycloak)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-7242 (sumaho, sumaho_driving_capability_diagnosis)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-7813 (cloudforms_3.0_management_engine)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More

CVE-2014-7851 (ovirt)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-8357 (znid_2426a_firmware)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More

CVE-2014-8491 (grand_flagallery)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: , ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-9118 (znid_2426a_firmware)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More

CVE-2014-9474 (gnu_mpfr)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-9487 (mediawiki)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-9489 (gollum, gollum-lib, grit_adapter)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-9678 (flexpaper)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-9697 (usg9520_firmware, usg9560_firmware, usg9580_firmware)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-9733 (nw.js)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-1239 (openjpeg)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-2156 (netty, play_framework)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-2780 (berta_cms)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-3229 (spin-kickstarts)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More
View Post

Man in the News: New Jersey’s Next Governor: A Political Newbie With Progressive Roots

In Education, Emerging Technology, Finance, Government by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

With his election, Mr. Murphy becomes the first Democrat to occupy the governor’s office in eight years, further cementing New Jersey’s shift to a decidedly blue state and giving a man who spent years on the periphery as an influential financial contributor his first chance at the political spotlight. He takes over a state where many are disillusioned and angry at the way the outgoing Republican governor, Chris Christie, has left New Jersey, riddled with debt, schools bereft of funding, exorbitant property taxes and a dismal public transit system.Politically inexperienced (his only other foray into elected office was a failed att... Read More
View Post

Agencies struggle with accuracy in DATA Act reporting

In Government, Legal, Science & Nature by Federal TimesLeave a Comment

Tech News Keywords: , ,

According to reports by many inspectors general, who were required to submit assessments today of their agency’s data submissions under the Digital Accountability and Transparency Act of 2014, many agencies failed to report accurate data sets. However, according to a DATA Act expert, this is not yet cause for concern. Though many inspectors general found that their agency fulfilled the timeliness and completeness standards for financial data reported under the Digital Accountability and Transparency Act of 2014, most uncovered p... Read More
View Post

Party Coverage: Scene City: Bill Clinton and Aretha Franklin Toast Elton John’s AIDS Charity

In Business, Government by New York TimesLeave a Comment

Tech News Keywords: , , , , , ,

“But there is nothing we can’t achieve when we bring good people together,” Gov. Andrew M. Cuomo told the crowd of 700 over dinner in a speech that seemed campaign ready.Former President Bill Clinton gave a tribute as well. He said the impressive charity work of Mr. John and his husband, David Furnish, was like a beautiful song. “All our lives are like candles in the wind,” he said, adding that what matters is “what they’re burning for.”He sat at the head table with Governor Cuomo, Sting, Lily Safra, Lynn Wyatt and Donna Karan, and gamely posed for selfie requests throughou... Read More
View Post

Phil Murphy Is Elected Governor of New Jersey, in a Lift for Democrats

In Business, Government by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , ,

Throughout the race, Mr. Murphy overshadowed his opponent by channeling his fellow residents’ exasperation with the current governor, whose approval rating, in the low teens, ranks among the lowest in New Jersey’s history, and using their anger to sell his plan to fix a state that he declared to be “broken.”The election of Mr. Murphy was yet another low-water mark in a long fall from grace for Mr. Christie, who once saw his approval ratings soar into the 70s and whose re-election margin in 2013 was so high that it instantly vaulted him... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1meteorologist0.816person, meteorologist
2person0.94
3anchorperson0.63person, anchorperson
4blue color0.932
5ultramarine color0.699
Number of Faces Detected: 2
Face #Max AgeMin AgeAge CertaintyGenderGender CertaintyIdent NameIdent ClassificationIdent Score
1650.670626MALE0.997527Terry McAuliffepeople0.952574
224180.394433FEMALE0

Outgoing Va. Gov. Terry McAuliffe on the race

In Business, Government, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , , ,

Virginia voters on Tuesday chose Democratic Lt. Gov. Ralph Northam as their next governor. Outgoing Democratic Virginia Governor Terry McAuliffe weighs in on the election and future of his party's future.Subscribe to the "CBSN" Channel HERE: http://bit.ly/1Re2MgSWatch "CBSN" live HERE: ... Read More
View Post

Virginians elect Democrat Ralph Northam governor

In Business, Government, Video by NewsyLeave a Comment

Tech News Keywords: , , ,

Northam is currently the lieutenant governor and ran to continue incumbent Gov. Terry McAuliffe's policies.Learn more about this story at www.newsy.com/73343/Find more videos like this at www.newsy.comFollow Newsy on Facebook: www.facebook.com/newsyvideosFollow Newsy on Twitter: www.twitter.com/newsyvideosNo Closed Captioning Detected within this Video.... Read More
View Post

7 Reasons New Yorkers Should Care About Election Day

In Emerging Technology, Government, Science & Nature by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , ,

Photo Mayor Bill de Blasio received 74 percent of the vote in the Democratic primary on Sept. 12. But turnout was low: About 435,000 Democrats voted, the third lowest ... Read More
View Post

Just Tuning In to New York’s Elections? Here’s a Rundown of the Races

In Business, Education, Emerging Technology, Finance, Government, Legal, Science & Nature by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

The mayor’s most serious challenger is Nicole Malliotakis, a Republican state assemblywoman from Staten Island, who has condemned sanctuary cities and spoken out against plans to make undocumented immigrants eligible for state financial aid for college.In an interview with The Times about managing an enormous city government, she criticized the mayor’s respons... Read More
View Post

Police Officer Found Not Guilty in Off-Duty Shooting of Unarmed Man

In Emerging Technology, Government, Legal by New York TimesLeave a Comment

Tech News Keywords: , , , , ,

Justice Jeong thanked the jurors for their service, then turned to Officer Isaacs and said: “Only you know what exactly happened out there. So no one’s passing any judgment, and let’s try to hope that we have no further incidents like this in the future. I guess that’s the only thing I can hope for.”The verdict was a setback for the office of Attorney General Eric T. Schneiderman in its effort to carry out a mandate from Gov. Andrew M. Cuomo to investigate and prosecute police killings of unarmed civilians. Mr. Cuomo gave the order i... Read More
View Post

Just Tuning In to New York’s Elections? Here’s What You Need to Know

In Business, Education, Emerging Technology, Finance, Government, Legal, Science & Nature by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

The mayor’s most serious challenger is Nicole Malliotakis, a Republican state assemblywoman from Staten Island, who has condemned sanctuary cities and spoken out against plans to make undocumented immigrants eligible for state financial aid for college.In an interview with The Times about managing an enormous city government, she criticized the mayor’s respons... Read More
View Post

Texas Gov. Abbott gives emotional update on shooting

In Video by USA TodayLeave a Comment

Tech News Keywords: , , ,

Detected Closed Captioning: As A State We Are Dealing With The largest Mass Shooting In Our State's History There Are So Many Families who've Lost Family Members Fathers Mothers Sons And Daughters The Tragedy Of Course Is Worsened By The Fact That It Occurred In A Church A Place Of Worship Where These People Were Innocently Gunned Down Unfortunately I'm Sad To Tell You To Confirm At Least At This Moment In Time There Are 26 Lives That Have Been Lost we Don't Know That Number Will Rise Or Not All We Know Is That's Too Many And This Will Be A Long Suffering Mourning For Those In Pain We Asked For God's comfort For God's Guidance And For God's healing For All Those Who Are Suffering As Governor I Asked For Every Mom And dad At ... Read More
View Post

Texas Gov.: 26 people killed in Sutherland Springs shooting

In Business, Government, Legal, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , , , , ,

Texas Governor Greg Abbott confirmed Sunday evening the death toll was at 26 following a shooting at a Texas church. Abbott said that number could rise. See his remarks.Subscribe to the "CBSN" Channel HERE: http://bit.ly/1Re2MgSWatch "CBSN" live HERE: ... Read More

CVE-2008-7315 (ui::dialog)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2009-1197

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2009-1198

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2012-0881

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2012-4377 (mediawiki)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More
View Post

CVE-2012-4378 (mediawiki)

In Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

Current Description Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.18.5 and 1.19.x before 1.19.2, when unspecified JavaScript gadgets are used, allow remote attackers to inject arbitrary web script or HTML via the userlang parameter to w/index.php. Source:  MITRE      Last Modified:  10/26/2017      ... Read More

CVE-2012-4379 (mediawiki)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More

CVE-2012-4380 (mediawiki)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2012-4382 (mediawiki)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: , ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2012-5358

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2012-5636

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More

CVE-2013-4246

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be me... Read More

CVE-2013-4366

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2013-6924 (blackarmor_nas_220_firmware)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-0115

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More
View Post

CVE-2014-0208 (foreman)

In Security by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-3526

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2014-3624

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-0226

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-0296 (texlive)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More
View Post

CVE-2015-2158 (pngcrush)

In Security by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-2673 (wp_easycart)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-2988 (rakuten_card)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More

CVE-2015-3249

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov. ... Read More

CVE-2015-4650 (clearpass_policy_manager)

In Uncategorized by NIST NVDLeave a Comment

Tech News Keywords: ,

References to Advisories, Solutions, and Tools By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please... Read More
View Post

Historical NY innovators get National Register nods

In Government by Innovate LILeave a Comment

Tech News Keywords: , , , , , , ,

By GREGORY ZELLER // The founders of Long Island’s circa-1800s “Squiretown” and a boathouse belonging to one of America’s first movie stars may soon enjoy new places in history – literally. Twenty-one statewide properties, including four on the Island, have been nominated for inclusion on the New York State and National Registers of Historic Places by the NYS Board for Historic Preservations. Included in the board’s recommendations are an off-Broadway New York City theater that played a key role in LGBT history and the final resting place of human-rights pioneers Frederick Douglass and Susan B. Anthony, among other hi... Read More
View Post

Inside story: How Russians hacked the Democrats’ emails

In Business, Education, Events, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON (AP) — It was just before noon in Moscow on March 10, 2016, when the first volley of malicious messages hit the Hillary Clinton campaign. The first 29 phishing emails were almost all misfires. Addressed to people who worked for Clinton during her first presidential run, the messages bounced back untouched. Except one. ... Read More
View Post

How Bill de Blasio Overcame the Haters

In Business, Education, Emerging Technology, Finance, Government, Healthcare, Legal, Security by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

Almost exactly 1,000 days before Mr. de Blasio won the Democratic nomination for a second term, he stepped into a Brooklyn hospital and knew he had a problem. Two New York police officers had just been killed — assassinated, really — at point-blank range. Mr. de Blasio had come, as mayors do, to pay his respects. But as he and his entourage squeezed into the hospital’s corridors, something was off. Many of the men and women in blue standing in solidarity with the fallen were facing the wall, their backs to the mayor in protest.More would turn away from Mr. de Blasio at the officers’ funerals. The head of the police union woul... Read More
View Post

Poison pills

In Business, Emerging Technology, Finance, Government, Healthcare, Legal by Long Island Business NewsLeave a Comment

Tech News Keywords: , , , , , , , , ,

Linda Ventura has many memories of her oldest son, but as she talks, she retraces a journey too many others have taken. Thomas started smoking pot, drinking and smoking cigarettes, but she believes somewhere along the way something “ignited” in his brain. However it happened, he became addicted to heroin. By the time he was a senior in Kings Park, he was shooting up heroin. A single mom, Ventura sent him to a center for drug and alcohol rehabilitation. “He was an awesome kid, outstanding athlete, scouted to play Division A lacrosse, a good student. He could light up a room,” she says. “When he was addicted, he would do anything to get his next fix.” He lost the battle with heroin on March 14, 2012 at age ... Read More
View Post

No. 255: Good boardrooms, better breast surgeries, best way to drink Scotch

In Business, Government, Healthcare, Legal, Mobile Technology, Security, Start Up by Innovate LILeave a Comment

Tech News Keywords: , , , , , , , , ,

That’s a wrap: It’s Friday, friends, and the end of another busy week for the Long Island innovation economy. Welcome new readers Betty, Beth and Elizabeth – we assume that’s three people – and please remember to tell your friends all about us. Please also jeer us, revere us and otherwise keep us in the loop at editor@innovateli.com. Remember, it’s your innovation economy – we just chronicle it. Those were the days: It’s Nov. 3, the 25th anniversary – can you believe that? – of Arkansas Gov. Bill Clinton’s 1992 win over one-term President George H.W. Bush. Fair to say presidential p... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1capitol building0.933building, government building, capitol building
2government building0.933
3building0.933
4Public Building0.787
5blue color0.98

How the overall effect from GOP tax plan will benefit most Americans

In Government, Video by Fox Business NewsLeave a Comment

Tech News Keywords: , ,

Former Minnesota Gov. Tim Pawlenty discusses who will be the largest benefactor of the GOP tax reform bill, which reduces the corporate tax rate and simplifies the tax code.No Closed Captioning Detected within this Video.... Read More
View Post

Terror Attack Leaves New Yorkers Navigating Between Nonchalance and Fear

In Emerging Technology, Government, Legal, Security by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

As happened in those cities, strangers came with flowers to the crime scene downtown, and leaders offered prayers and condolences. But New Yorkers and visitors to the city privately considered their own response to the arrival of a global threat on nearby streets. How much more afraid did people feel here?“We’re not safe anywhere,” said Cecilia Lovecchio, a tourist from Argentina, the home of a group of visitors who lost five of their number in the attack. “It can be a bomb or a truck. A truck could very well come at us right now as we speak. What can you do?”Those words were see... Read More
View Post

Georgia attorney general quits defense in election server wiping case

In Education, Events, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , ,

The Georgia attorney general’s office will no longer represent the state’s top elections official in an elections integrity lawsuit filed three days before a crucial computer server was quietly wiped clean. The lawsuit aims to force Georgia to retire its antiquated and heavily questioned touchscreen election technology, which does not provide an auditable paper trail. The server in question was a statewide staging location for ke... Read More
View Post

Under pressure, social media giants acknowledge meddling

In Business, Government, Legal, Security by Fifth DomainLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON — In three exhaustive hearings this week, executives from Facebook, Twitter and Google acknowledged that their platforms were used by Russia to try and create division over such disparate issues as immigration, gun control and politics. House investigators released a trove of Facebook and Twitter ads that showed just how extraordinary the cyber intrusion was. The companies’ admissions and disclosures over the last several months have given congressional investigators one of their first real wins in the Russia probes... Read More
View Post

New York Today: New York Today: Terrorism Crisis Mode for a Principal. Again.

In Business, Education, Emerging Technology, Government, Healthcare by New York TimesLeave a Comment

Tech News Keywords: , , , , , , , , ,

Photo Veronic Najjar, 60, the principal of P.S. 89 in Lower Manhattan. Credit Hiroko Masuike/The New York Times Good morning on this warming Thursday.As the princip... Read More