and

A Parameterized Perspective on Attacking and Defending Elections. (arXiv:2005.03176v1 [cs.GT])

We consider the problem of protecting and manipulating elections by recounting and changing ballots, respectively. Our setting involves a plurality-based election held across multiple districts, and the problem formulations are based on the model proposed recently by~[Elkind et al, IJCAI 2019]. It turns out that both of the manipulation and protection problems are NP-complete even in fairly simple settings. We study these problems from a parameterized perspective with the goal of establishing a more detailed complexity landscape. The parameters we consider include the number of voters, and the budgets of the attacker and the defender. While we observe fixed-parameter tractability when parameterizing by number of voters, our main contribution is a demonstration of parameterized hardness when working with the budgets of the attacker and the defender.




and

Fact-based Dialogue Generation with Convergent and Divergent Decoding. (arXiv:2005.03174v1 [cs.CL])

Fact-based dialogue generation is a task of generating a human-like response based on both dialogue context and factual texts. Various methods were proposed to focus on generating informative words that contain facts effectively. However, previous works implicitly assume a topic to be kept on a dialogue and usually converse passively, therefore the systems have a difficulty to generate diverse responses that provide meaningful information proactively. This paper proposes an end-to-end Fact-based dialogue system augmented with the ability of convergent and divergent thinking over both context and facts, which can converse about the current topic or introduce a new topic. Specifically, our model incorporates a novel convergent and divergent decoding that can generate informative and diverse responses considering not only given inputs (context and facts) but also inputs-related topics. Both automatic and human evaluation results on DSTC7 dataset show that our model significantly outperforms state-of-the-art baselines, indicating that our model can generate more appropriate, informative, and diverse responses.




and

Nonlinear model reduction: a comparison between POD-Galerkin and POD-DEIM methods. (arXiv:2005.03173v1 [physics.comp-ph])

Several nonlinear model reduction techniques are compared for the three cases of the non-parallel version of the Kuramoto-Sivashinsky equation, the transient regime of flow past a cylinder at $Re=100$ and fully developed flow past a cylinder at the same Reynolds number. The linear terms of the governing equations are reduced by Galerkin projection onto a POD basis of the flow state, while the reduced nonlinear convection terms are obtained either by a Galerkin projection onto the same state basis, by a Galerkin projection onto a POD basis representing the nonlinearities or by applying the Discrete Empirical Interpolation Method (DEIM) to a POD basis of the nonlinearities. The quality of the reduced order models is assessed as to their stability, accuracy and robustness, and appropriate quantitative measures are introduced and compared. In particular, the properties of the reduced linear terms are compared to those of the full-scale terms, and the structure of the nonlinear quadratic terms is analyzed as to the conservation of kinetic energy. It is shown that all three reduction techniques provide excellent and similar results for the cases of the Kuramoto-Sivashinsky equation and the limit-cycle cylinder flow. For the case of the transient regime of flow past a cylinder, only the pure Galerkin techniques are successful, while the DEIM technique produces reduced-order models that diverge in finite time.




and

NTIRE 2020 Challenge on Image Demoireing: Methods and Results. (arXiv:2005.03155v1 [cs.CV])

This paper reviews the Challenge on Image Demoireing that was part of the New Trends in Image Restoration and Enhancement (NTIRE) workshop, held in conjunction with CVPR 2020. Demoireing is a difficult task of removing moire patterns from an image to reveal an underlying clean image. The challenge was divided into two tracks. Track 1 targeted the single image demoireing problem, which seeks to remove moire patterns from a single image. Track 2 focused on the burst demoireing problem, where a set of degraded moire images of the same scene were provided as input, with the goal of producing a single demoired image as output. The methods were ranked in terms of their fidelity, measured using the peak signal-to-noise ratio (PSNR) between the ground truth clean images and the restored images produced by the participants' methods. The tracks had 142 and 99 registered participants, respectively, with a total of 14 and 6 submissions in the final testing stage. The entries span the current state-of-the-art in image and burst image demoireing problems.




and

A Separation Theorem for Joint Sensor and Actuator Scheduling with Guaranteed Performance Bounds. (arXiv:2005.03143v1 [eess.SY])

We study the problem of jointly designing a sparse sensor and actuator schedule for linear dynamical systems while guaranteeing a control/estimation performance that approximates the fully sensed/actuated setting. We further prove a separation principle, showing that the problem can be decomposed into finding sensor and actuator schedules separately. However, it is shown that this problem cannot be efficiently solved or approximated in polynomial, or even quasi-polynomial time for time-invariant sensor/actuator schedules; instead, we develop deterministic polynomial-time algorithms for a time-varying sensor/actuator schedule with guaranteed approximation bounds. Our main result is to provide a polynomial-time joint actuator and sensor schedule that on average selects only a constant number of sensors and actuators at each time step, irrespective of the dimension of the system. The key idea is to sparsify the controllability and observability Gramians while providing approximation guarantees for Hankel singular values. This idea is inspired by recent results in theoretical computer science literature on sparsification.




and

Evaluation, Tuning and Interpretation of Neural Networks for Meteorological Applications. (arXiv:2005.03126v1 [physics.ao-ph])

Neural networks have opened up many new opportunities to utilize remotely sensed images in meteorology. Common applications include image classification, e.g., to determine whether an image contains a tropical cyclone, and image translation, e.g., to emulate radar imagery for satellites that only have passive channels. However, there are yet many open questions regarding the use of neural networks in meteorology, such as best practices for evaluation, tuning and interpretation. This article highlights several strategies and practical considerations for neural network development that have not yet received much attention in the meteorological community, such as the concept of effective receptive fields, underutilized meteorological performance measures, and methods for NN interpretation, such as synthetic experiments and layer-wise relevance propagation. We also consider the process of neural network interpretation as a whole, recognizing it as an iterative scientist-driven discovery process, and breaking it down into individual steps that researchers can take. Finally, while most work on neural network interpretation in meteorology has so far focused on networks for image classification tasks, we expand the focus to also include networks for image translation.




and

Deep Learning for Image-based Automatic Dial Meter Reading: Dataset and Baselines. (arXiv:2005.03106v1 [cs.CV])

Smart meters enable remote and automatic electricity, water and gas consumption reading and are being widely deployed in developed countries. Nonetheless, there is still a huge number of non-smart meters in operation. Image-based Automatic Meter Reading (AMR) focuses on dealing with this type of meter readings. We estimate that the Energy Company of Paran'a (Copel), in Brazil, performs more than 850,000 readings of dial meters per month. Those meters are the focus of this work. Our main contributions are: (i) a public real-world dial meter dataset (shared upon request) called UFPR-ADMR; (ii) a deep learning-based recognition baseline on the proposed dataset; and (iii) a detailed error analysis of the main issues present in AMR for dial meters. To the best of our knowledge, this is the first work to introduce deep learning approaches to multi-dial meter reading, and perform experiments on unconstrained images. We achieved a 100.0% F1-score on the dial detection stage with both Faster R-CNN and YOLO, while the recognition rates reached 93.6% for dials and 75.25% for meters using Faster R-CNN (ResNext-101).




and

Constrained de Bruijn Codes: Properties, Enumeration, Constructions, and Applications. (arXiv:2005.03102v1 [cs.IT])

The de Bruijn graph, its sequences, and their various generalizations, have found many applications in information theory, including many new ones in the last decade. In this paper, motivated by a coding problem for emerging memory technologies, a set of sequences which generalize sequences in the de Bruijn graph are defined. These sequences can be also defined and viewed as constrained sequences. Hence, they will be called constrained de Bruijn sequences and a set of such sequences will be called a constrained de Bruijn code. Several properties and alternative definitions for such codes are examined and they are analyzed as generalized sequences in the de Bruijn graph (and its generalization) and as constrained sequences. Various enumeration techniques are used to compute the total number of sequences for any given set of parameters. A construction method of such codes from the theory of shift-register sequences is proposed. Finally, we show how these constrained de Bruijn sequences and codes can be applied in constructions of codes for correcting synchronization errors in the $ell$-symbol read channel and in the racetrack memory channel. For this purpose, these codes are superior in their size on previously known codes.




and

Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks. (arXiv:2005.03091v1 [cs.IT])

Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security techniques is limited by its transmit power and channel fading. In order to tackle this issue, a cognitive unmanned aerial vehicle (UAV) communication network is studied by exploiting the high flexibility of a UAV and the possibility of establishing line-of-sight links. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAV's trajectory and transmit power. Our problem formulation takes into account two practical inaccurate location estimation cases, namely, the worst case and the outage-constrained case. In order to solve those challenging non-convex problems, an iterative algorithm based on $mathcal{S}$-Procedure is proposed for the worst case while an iterative algorithm based on Bernstein-type inequalities is proposed for the outage-constrained case. The proposed algorithms can obtain effective suboptimal solutions of the corresponding problems. Our simulation results demonstrate that the algorithm under the outage-constrained case can achieve a higher average secrecy rate with a low computational complexity compared to that of the algorithm under the worst case. Moreover, the proposed schemes can improve the secure communication performance significantly compared to other benchmark schemes.




and

Diagnosing the Environment Bias in Vision-and-Language Navigation. (arXiv:2005.03086v1 [cs.CL])

Vision-and-Language Navigation (VLN) requires an agent to follow natural-language instructions, explore the given environments, and reach the desired target locations. These step-by-step navigational instructions are crucial when the agent is navigating new environments about which it has no prior knowledge. Most recent works that study VLN observe a significant performance drop when tested on unseen environments (i.e., environments not used in training), indicating that the neural agent models are highly biased towards training environments. Although this issue is considered as one of the major challenges in VLN research, it is still under-studied and needs a clearer explanation. In this work, we design novel diagnosis experiments via environment re-splitting and feature replacement, looking into possible reasons for this environment bias. We observe that neither the language nor the underlying navigational graph, but the low-level visual appearance conveyed by ResNet features directly affects the agent model and contributes to this environment bias in results. According to this observation, we explore several kinds of semantic representations that contain less low-level visual information, hence the agent learned with these features could be better generalized to unseen testing environments. Without modifying the baseline agent model and its training method, our explored semantic features significantly decrease the performance gaps between seen and unseen on multiple datasets (i.e. R2R, R4R, and CVDN) and achieve competitive unseen results to previous state-of-the-art models. Our code and features are available at: https://github.com/zhangybzbo/EnvBiasVLN




and

Exploratory Analysis of Covid-19 Tweets using Topic Modeling, UMAP, and DiGraphs. (arXiv:2005.03082v1 [cs.SI])

This paper illustrates five different techniques to assess the distinctiveness of topics, key terms and features, speed of information dissemination, and network behaviors for Covid19 tweets. First, we use pattern matching and second, topic modeling through Latent Dirichlet Allocation (LDA) to generate twenty different topics that discuss case spread, healthcare workers, and personal protective equipment (PPE). One topic specific to U.S. cases would start to uptick immediately after live White House Coronavirus Task Force briefings, implying that many Twitter users are paying attention to government announcements. We contribute machine learning methods not previously reported in the Covid19 Twitter literature. This includes our third method, Uniform Manifold Approximation and Projection (UMAP), that identifies unique clustering-behavior of distinct topics to improve our understanding of important themes in the corpus and help assess the quality of generated topics. Fourth, we calculated retweeting times to understand how fast information about Covid19 propagates on Twitter. Our analysis indicates that the median retweeting time of Covid19 for a sample corpus in March 2020 was 2.87 hours, approximately 50 minutes faster than repostings from Chinese social media about H7N9 in March 2013. Lastly, we sought to understand retweet cascades, by visualizing the connections of users over time from fast to slow retweeting. As the time to retweet increases, the density of connections also increase where in our sample, we found distinct users dominating the attention of Covid19 retweeters. One of the simplest highlights of this analysis is that early-stage descriptive methods like regular expressions can successfully identify high-level themes which were consistently verified as important through every subsequent analysis.




and

I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. (arXiv:2005.03068v1 [cs.CR])

The increasing ubiquity of low-cost wireless sensors in smart homes and buildings has enabled users to easily deploy systems to remotely monitor and control their environments. However, this raises privacy concerns for third-party occupants, such as a hotel room guest who may be unaware of deployed clandestine sensors. Previous methods focused on specific modalities such as detecting cameras but do not provide a generalizable and comprehensive method to capture arbitrary sensors which may be "spying" on a user. In this work, we seek to determine whether one can walk in a room and detect any wireless sensor monitoring an individual. As such, we propose SnoopDog, a framework to not only detect wireless sensors that are actively monitoring a user, but also classify and localize each device. SnoopDog works by establishing causality between patterns in observable wireless traffic and a trusted sensor in the same space, e.g., an inertial measurement unit (IMU) that captures a user's movement. Once causality is established, SnoopDog performs packet inspection to inform the user about the monitoring device. Finally, SnoopDog localizes the clandestine device in a 2D plane using a novel trial-based localization technique. We evaluated SnoopDog across several devices and various modalities and were able to detect causality 96.6% percent of the time, classify suspicious devices with 100% accuracy, and localize devices to a sufficiently reduced sub-space.




and

Learning, transferring, and recommending performance knowledge with Monte Carlo tree search and neural networks. (arXiv:2005.03063v1 [cs.LG])

Making changes to a program to optimize its performance is an unscalable task that relies entirely upon human intuition and experience. In addition, companies operating at large scale are at a stage where no single individual understands the code controlling its systems, and for this reason, making changes to improve performance can become intractably difficult. In this paper, a learning system is introduced that provides AI assistance for finding recommended changes to a program. Specifically, it is shown how the evaluative feedback, delayed-reward performance programming domain can be effectively formulated via the Monte Carlo tree search (MCTS) framework. It is then shown that established methods from computational games for using learning to expedite tree-search computation can be adapted to speed up computing recommended program alterations. Estimates of expected utility from MCTS trees built for previous problems are used to learn a sampling policy that remains effective across new problems, thus demonstrating transferability of optimization knowledge. This formulation is applied to the Apache Spark distributed computing environment, and a preliminary result is observed that the time required to build a search tree for finding recommendations is reduced by up to a factor of 10x.




and

Extracting Headless MWEs from Dependency Parse Trees: Parsing, Tagging, and Joint Modeling Approaches. (arXiv:2005.03035v1 [cs.CL])

An interesting and frequent type of multi-word expression (MWE) is the headless MWE, for which there are no true internal syntactic dominance relations; examples include many named entities ("Wells Fargo") and dates ("July 5, 2020") as well as certain productive constructions ("blow for blow", "day after day"). Despite their special status and prevalence, current dependency-annotation schemes require treating such flat structures as if they had internal syntactic heads, and most current parsers handle them in the same fashion as headed constructions. Meanwhile, outside the context of parsing, taggers are typically used for identifying MWEs, but taggers might benefit from structural information. We empirically compare these two common strategies--parsing and tagging--for predicting flat MWEs. Additionally, we propose an efficient joint decoding algorithm that combines scores from both strategies. Experimental results on the MWE-Aware English Dependency Corpus and on six non-English dependency treebanks with frequent flat structures show that: (1) tagging is more accurate than parsing for identifying flat-structure MWEs, (2) our joint decoder reconciles the two different views and, for non-BERT features, leads to higher accuracies, and (3) most of the gains result from feature sharing between the parsers and taggers.




and

Computing-in-Memory for Performance and Energy Efficient Homomorphic Encryption. (arXiv:2005.03002v1 [cs.CR])

Homomorphic encryption (HE) allows direct computations on encrypted data. Despite numerous research efforts, the practicality of HE schemes remains to be demonstrated. In this regard, the enormous size of ciphertexts involved in HE computations degrades computational efficiency. Near-memory Processing (NMP) and Computing-in-memory (CiM) - paradigms where computation is done within the memory boundaries - represent architectural solutions for reducing latency and energy associated with data transfers in data-intensive applications such as HE. This paper introduces CiM-HE, a Computing-in-memory (CiM) architecture that can support operations for the B/FV scheme, a somewhat homomorphic encryption scheme for general computation. CiM-HE hardware consists of customized peripherals such as sense amplifiers, adders, bit-shifters, and sequencing circuits. The peripherals are based on CMOS technology, and could support computations with memory cells of different technologies. Circuit-level simulations are used to evaluate our CiM-HE framework assuming a 6T-SRAM memory. We compare our CiM-HE implementation against (i) two optimized CPU HE implementations, and (ii) an FPGA-based HE accelerator implementation. When compared to a CPU solution, CiM-HE obtains speedups between 4.6x and 9.1x, and energy savings between 266.4x and 532.8x for homomorphic multiplications (the most expensive HE operation). Also, a set of four end-to-end tasks, i.e., mean, variance, linear regression, and inference are up to 1.1x, 7.7x, 7.1x, and 7.5x faster (and 301.1x, 404.6x, 532.3x, and 532.8x more energy efficient). Compared to CPU-based HE in a previous work, CiM-HE obtain 14.3x speed-up and >2600x energy savings. Finally, our design offers 2.2x speed-up with 88.1x energy savings compared to a state-of-the-art FPGA-based accelerator.




and

Retired Soccer Star Briana Scurry on Girls Soccer and Concussion Protocols

One out of two girls will sustain a concussion playing soccer, but most will recover and return to play with ease. Nevertheless, awareness and education are key to keeping players safe.




and

Teen athletes sandbag concussion tests to stay in the game

What happens when the drive to play outweighs the potential risk of injury? Some high school athletes are finding ways around the precautions coaching and medical staff take to ensure their safety.




and

How Personalized Landing Pages Can Make Your Site More Profitable

Personalization is one of the most effective marketing techniques to connect with customers online. While the exact methods are different for every business, adding personalized elements to landing pages is a proven method of driving conversions on your site. But why is it so successful? The simple answer is that personalization shows customers that you […]

The post How Personalized Landing Pages Can Make Your Site More Profitable appeared first on WebFX Blog.




and

Is Your Website a Failure? 3 Reasons Sites Fail (And How to Save Yours)

Traffic isn’t great, online sales are even worse, and let’s not talk about the lack of phone calls. Everyone, including you, is wondering the same thing — is your website a failure? Not yet, and not if you have anything to say about it. While a failing website can seem like a problem without a […]

The post Is Your Website a Failure? 3 Reasons Sites Fail (And How to Save Yours) appeared first on WebFX Blog.




and

Website Redesign Checklist + 7 Handy Website Redesign Tips

Does your website feature design straight out of the ’90s and functionality from the stone age? If so, it’s time for an upgrade — and WebFX can help. When it comes to website redesign checklists, we’re at the top of our game, and we know how to get things done. But where do you start […]

The post Website Redesign Checklist + 7 Handy Website Redesign Tips appeared first on WebFX Blog.




and

What Is Website Hosting and Why Does It Matter for Your Website?

Subscribe to our YouTube channel for the latest in digital marketing! we know you’ll love this additional resource! (how to host a website)   Transcript: What is website hosting?  This is to make a point, I promise.  When you go to a party, there’s always a host. The host is usually the one who sets […]

The post What Is Website Hosting and Why Does It Matter for Your Website? appeared first on WebFX Blog.




and

Is My Website ADA Compliant? How to Check (and Update) Your Site

What do Amazon, Hershey’s, and The Wall Street Journal have in common? They’ve all gotten named in lawsuits related to website accessibility and the Americans with Disabilities Act (ADA). They aren’t alone, either. In 2018, more than 2000 website accessibility lawsuits (a 177% increase from 2017) got filed, emphasizing the increased importance and focus on […]

The post Is My Website ADA Compliant? How to Check (and Update) Your Site appeared first on WebFX Blog.




and

How Biofuels Can Cool Our Climate and Strengthen Our Ecosystems

By Evan H. DeLucia Courtesy of EOS Critics of biofuels like ethanol argue they are an unsustainable use of land. But with careful management, next-generation grass-based biofuels can net climate savings and improve their ecosystems. As the world seeks strategies … Continue reading




and

I Took a COBOL Course and I Liked It

COBOL is in the news again. Millions of people are filing unemployment claims nearly all at once, and the systems to process them are failing. Why? They need to scale to unprecedented levels — they’re written in COBOL, and… we don’t have enough COBOL programmers.

Here’s a look at the increase in searches for “COBOL programmers”:





and

Regional summer camps hope the pandemic doesn't put activities on pause, but have backup plans ready if it does

[IMAGE-1]After having their school year totally disrupted by the coronavirus pandemic, a return to some semblance of normalcy come summer is all many school-age kids and their families are looking forward to. For many, this anticipation includes annual summer camp traditions, from sleep-away adventures on the lake to fun-filled day camps for arts, learning or team sports.…




and

A guide to the Inlander's list of 2020 summer camps

Summer Camps 2020 "Regional Summer Camps Hope the Pandemic Doesn't Put Activities on Pause, But Have Backup Plans Ready if it Does" …




and

North Idaho Rep. Heather Scott reaps the glory — and the consequences — of being one of Matt Shea's biggest allies

At these gatherings in northeast Washington, the jackboot of tyranny is always said to be descending, the hand of the federal government always inches away from stealing your guns, your land, your freedom to speak or to pray.…



  • News/Local News

and

Coronavirus update: UW busy with testing, new guidelines for visiting grandma and other COVID-19 headlines

Coronavirus Family Tree The University of Washington Virology lab, which is testing samples for coronavirus, tweeted last night.…



  • News/Local News

and

The cruelest part of the coronavirus: It's cut us off from community and solace

There’s a cliche that always follows a big tragedy — something we say after natural disasters, economic collapses, school shootings, acts of terrorisms.…



  • Comment/Columns & Letters

and

Privacy is disappearing faster than we realize, and the coronavirus isn't helping

The apps and devices you use are conducting surveillance with your every move Sure, you lock your home, and you probably don't share your deepest secrets with random strangers.…



  • News/Local News

and

Sturdy and old-fashioned, Ford v Ferrari is a leisurely paced character study about cool guys and fast cars

There are no legal skirmishes in Ford v Ferrari.…



  • Film/Film News

and

Someone's dead and everyone's a suspect in the slight but engaging all-star whodunit Knives Out

[IMAGE-1] Watching Rian Johnson's Knives Out, I was reminded of my middle school English teacher Mrs. Soderbergh, who loved Agatha Christie books almost as much as she loved diagramming sentences. There was a week when she brought in a box stacked high with her own Christie paperbacks, set it down in front of the classroom and had each of us pick a book based solely on the plot summary on the back.…



  • Film/Film News

and

Noah Baumbach's great Marriage Story finds comedy and empathy in the details of a painful divorce

[IMAGE-1] Noah Baumbach's Marriage Story begins as its central marriage is coming to an end. Our two protagonists are fiercely independent, articulate, opinionated creative types: Charlie (Adam Driver) is the director of an avant-garde theater troupe in New York City; Nicole (Scarlett Johansson) is an actress and one of his primary collaborators.…



  • Film/Film News

and

Clint Eastwood's true-life drama Richard Jewell takes aims at big targets, and misses

Once upon a time, Clint Eastwood, a notoriously outspoken conservative in supposedly liberal Hollywood, had no problem at all with cops who employed their own unconventional extra-legal brand of law enforcement (see: Dirty Harry). Today, in Richard Jewell, he really doesn't like the FBI.…



  • Film/Film News

and

As The Rise of Skywalker readies to put a bow on a chapter in Star Wars lore, the franchise's omnipresence has shifted its fandom

With all due respect to Greta Thunberg and Billie Eilish, nobody had a better 2019 than Baby Yoda. The real star of the Disney+ flagship Star Wars series The Mandalorian, the little green puppeteering/CGI marvel (aka "the Child") might be the most adorable creature ever created.…



  • Film/Film News

and

Spokane musician Eliza Johnson brought her quirky style — and tinned fish — to American Idol Sunday night. Watch the clip

Back in November, we wrote about local singer-songwriter Eliza Johnson's musical project Eliza Catastrophe and her new album You, which she released on pre-loaded MP3 players. One thing we weren't able to mention in our interview — for contractual reasons — is that she had only a couple months prior auditioned for American Idol, and her performance finally aired on the ABC reality competition show Sunday night.…



  • Music/Music News

and

In reimagining a beloved novel, Emma understands what made Jane Austen so special in the first place

[IMAGE-1] Before smartphones and Instagram, there were influencers, and they could be as shallow, overconfident and pejorative as they are today. This new adaptation of Jane Austen's Emma — the feature debuts of photographer and music-video director Autumn de Wilde and Man Booker Prize-winning novelist turned screenwriter Eleanor Catton — brings that sort of modern frisson to its retelling of the tale of a very rich young woman who amuses herself by interfering in the romantic lives of those around her.…



  • Film/Film News

and

Where I Can Find an Inlander?

We at the Inlander remain committed to keeping people informed and connected during the coronavirus outbreak, supporting our readers and local businesses in the ways we always have. We have experienced some disruption in where we distribute papers, but we're stocking and restocking thousands of copies at local Rosauers, Super 1, URM Cash & Carry, Yoke's, Albertson's and Safeway stores, plus Papa Murphy's locations, My Fresh Basket and more.…



  • News/Local News

and

Doom's new and improved storyline, Pearl Jams new album and more you need to know

PROPHET OF DOOM…



  • Culture/Arts & Culture

and

A cherished resource in this moment: our region's writers, poets and journalists

Our staff of reporters and photographers at the Inlander has been working tirelessly to cover the coronavirus pandemic and all of its implications for the Inland Northwest — on jobs, schools, employment, the restaurant industry, arts organizations, hospitals and much, much more. However, we’ve also tapped into a boundless resource that is our region’s community of writers, and in recent days they’ve shared with Inlander readers an awe-inspiring series of essays and stories that has left us inspired, hopeful, heartbroken and more than a little grateful.…



  • Comment/Columns & Letters

and

CONCERT ANNOUNCEMENT: Wilco and Sleater-Kinney's co-headlining tour hits Spokane Aug. 6

Earlier this morning, Sleater-Kinney announced on Twitter that they're hitting the road on a co-headlining tour with Wilco this summer. Great news!…




and

How I learned to stop being a hater and embrace Southern Rock

[IMAGE-1] Part of being a music lover is also being a snob, and even though my mind has opened considerably as I've aged, I still remember all the genres I just couldn't give any time to when I was growing up. Southern rock was definitely verboten for much of my life.…




and

Portland's Jenny Don't and the Spurs are back with new music after a quiet 2019

Jenny Don't and the Spurs were right in the middle of recording their third full-length album when a vocal polyp put a halt to the process.…




and

Musicians are posting live streams and personal concerts to make your self-isolation a bit more tuneful

Celebrities: They're just like us! Along with everyone else, famous people are self-isolating at home, and some of them have taken to social media to alleviate the stress of the outside world. We don't need to tell you that events everywhere are canceled, so a few big-time musicians are putting on personal concerts for their fans and followers, and a lot of them — save for that cringe-inducing, star-studded cover of "Imagine" that was going around yesterday — are actually pretty good.…




and

New music and live streams for your self-isolation pleasure, and ways to support the local music scene

Welcome to the quarantine.…




and

As Spokane's music venues go dark, owners and artists look with hope and caution toward an uncertain future

When it comes to the music scene in the midst of the coronavirus pandemic, the math is pretty simple: No shows equals no revenue.…




and

In lieu of in-person performances, musicians are using social media and live streams to connect with fans

Ask any working musician why they play live, why they lug their equipment to and from bars and restaurants and wine-tasting rooms week after week, and they'll point to the same nebulous thing: It's the connection with an audience.…




and

A musical ray of sunshine during the pandemic: X has a new album out today

Pardon the interruption for a little fanboy boosterism, but one of my favorite all-time bands surprise-dropped a brand new album on Bandcamp today, and damned if I'm not going to tell you to go listen to it. The band is X, pioneering Los Angeles legends who helped establish the West Coast punk scene in the late '70s and early '80s with a sound that was rooted in American rock's roots.…




and

New music we love: Fiona Apple's thrilling Fetch the Bolt Cutters is a rush of lacerating lyrics and swirling sonics

You don't have to wander around the internet long before bumping into a rave review of Fiona Apple's new record Fetch the Bolt Cutters: It has inspired breathless acclaim, has already been labeled a masterwork and is notably the first new album in nearly a decade that Pitchfork has assigned a perfect 10/10 rating.…