Tag Archives: including

Wanted – GTX 970

Hi

I am looking for a GTX 970 (non reference), or better.

My budget is approx £100 including delivery, so ideally would be less than that but I could be open to paying slightly more if I am offered something amazing or something better than a 970. I am based in the Bristol area.

Cheers

Location: Bristol

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – GTX 970

Hi

I am looking for a GTX 970 (non reference), or better.

My budget is approx £100 including delivery, so ideally would be less than that but I could be open to paying slightly more if I am offered something amazing or something better than a 970. I am based in the Bristol area.

Cheers

Location: Bristol

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

CloudBees, partners add Jenkins services, security

The Jenkins DevOps world has recently gained a series of new services, including advisory and managed services, new security capabilities and database support.

For instance, among the new Jenkins services, CloudBees recently delivered a new, free service, CloudBees Jenkins Advisor, which will analyze any Jenkins continuous delivery environment and provide users with information on issues and performance.

Announced at the company’s Jenkins World conference at the end of August, CloudBees Jenkins Advisor identifies potential issues and advises organizations on corrective actions that can be taken to prevent problems that might affect software delivery, uptime or performance. The service is based on an expansive knowledge base CloudBees has amassed over the years.

“We want to ensure that developers get the best, smoothest experience out of Jenkins. Outages, performance issues and other problems can hurt people’s confidence in software delivery automation,” said Kohsuke Kawaguchi, Jenkins’ founder and CTO at CloudBees, based in San Jose, Calif., in a statement. “With CloudBees Jenkins Advisor, we can proactively identify potential issues for our users in Jenkins, administrators can nip problems in the bud and everyone can focus on other, more important things.”

DevOps Managed Services

We want to ensure that developers get the best, smoothest experience out of Jenkins. Outages, performance issues and other problems can hurt people’s confidence in software delivery automation.
Kohsuke KawaguchiJenkins founder and CTO at CloudBees

Meanwhile, for those interested in managed Jenkins services, CloudBees also introduced DevOps Managed Services, an offering delivered by managed service providers (MSPs) and powered by CloudBees Jenkins Enterprise — the company’s enterprise-grade Jenkins implementation.

CloudBees has certified five MSPs — with whom it will provide technical expertise and 24/7 support — that will provide CloudBees Jenkins Enterprise as a managed service. The initial group of partners providing managed Jenkins services includes CloudHesive, Digital OnUs, iTMethods, Microland and TriNimbus.

Stas Zvinyatskovsky, managing director of modern engineering at Accenture, said the company began its DevOps journey 15 years ago, as it started centralizing a build-and-release infrastructure for its teams.

The company eventually standardized on Jenkins and found its greatest DevOps challenge to be scale.

“We have 400,000-plus employees and 25,000 unique users on our infrastructure, and they have their unique needs,” Zvinyatskovsky said. “We solve that by running CloudBees at the core as the engine. We also have our own Accenture DevOps platform, ADOP [Accenture DevOps Platform], that allows us to repeatedly and reliably deploy continuous delivery pipelines from team to team with best practices codified in those pipelines.”

DevOps security testing

For its part, Checkmarx, an application security software company, introduced a new release of its Interactive Application Security Testing product, CxIAST. The product enables continuous application security testing in real time, so software delivery schedules are not affected by security testing.

In addition to CxIAST, the Checkmarx application security platform features a secure coding platform known as Codebashing, a static application security testing tool known as CxSAST and an open source analysis tool known as CxOSA, which all complement each other.

Maty Siman, CTO and founder of Checkmarx, said the company’s application security platform “correlates data and results from all Checkmarx products across the software development lifecycle and then leverages that information intelligently to generate fast, accurate and actionable results.”

DevOps to the database

Finally, Datical, a provider of database release automation technology, has delivered a plug-in that brings DevOps to the database.

The Datical integration for Jenkins enables users to access Datical DB’s database release automation capabilities directly from Jenkins, without having to write scripts or command lines. The integration of Datical and Jenkins enables users to bring continuous integration to their database changes, the company said.

Pete Pickerill, vice president of product strategy and co-founder of Datical in Austin, Texas, said the plug-in allows development teams to manage database releases the same way they manage application releases.

Moreover, CloudBees’ Kawaguchi said a common challenge for Jenkins users moving to continuous delivery is how to handle the database.

Thus, “It’s great to see Datical integrating their technology with Jenkins Pipeline to give Jenkins users the tools to solve one of the harder problems in continuous delivery,” he said in a statement.

Equifax breach response deemed insufficient in multiple ways

The Equifax data breach compromised the personal data, including Social Security numbers, of 148 million Americans, but experts are critical of how the company responded to the incident.

The Equifax breach was detected on July 29 but was not disclosed until Sept. 7. After the disclosure, Equifax came under fire after reports surfaced that executives had sold stock in the company prior to the breach disclosure, and because language in the terms of service stipulating that victims who take advantage of the TrustedID credit and identity monitoring service could not sue if that service were to fail.

Despite these issues, the CEO of Equifax, Richard Smith did not comment on the situation  — beyond a brief video posted with the initial announcement — until Sept. 12. Smith claimed the Equifax breach disclosure took six weeks from the time of detection in order to give time for the investigation and because the company “thought the intrusion was limited.”

“As of Tuesday [Sept. 12], more than 15 million people have visited the website and 11.5 million are enrolling in credit file monitoring and identity theft protection,” Smith wrote in a public statement published by USA Today. “We took the unprecedented step of offering credit file monitoring and identity theft protection to every U.S. consumer. Every consumer, whether affected or not, has the option of signing up for the services.”

Protection and monitoring

The identity protection service offered by Equifax was limited to one year of protection, which has been standard in incidents similar to the Equifax breach, but experts said was not sufficient.

Peter Tran, general manager and senior director at RSA, said, turning off the protections to those affected by the Equifax breach after one year “would be like turning off a pilot’s instruments mid-flight.”

“From a cyber defense perspective, pervasive visibility and continuous monitoring is imperative for both known cyber threats and suspicious digital movements and for any breach of this magnitude due care should extend to the affected consumers and/or end users,” Tran told SearchSecurity via email. “The bottom line is no one knows at this point the extent and duration [of] this incident’s exposure and risk.”

Equifax’s security was lax and allowed a huge breach, but one of their responses to the breach can now exacerbate and enlarge the harm impact of the breach.
Rebecca HeroldCEO, Privacy Professor

Ferruh Mavituna, CEO of Netsparker, said a Social Security number (SSN) “is for life and it is very difficult to have it changed.”

“The majority of people do not change their SSN, even in the case of an identity theft. They do not want to deal with the paperwork, bureaucracy, the police, etc.

So one year of ID monitoring is not enough to protect the victims in the long run,” Mavituna told SearchSecurity. “The SSNs will still have the same value one year down the line, so the attackers just have to wait until the numbers are no longer being monitored and the victim stops keeping a close eye on the number to use them.”

A number of experts noted that Equifax stands to profit off of the identity and credit monitoring services if enough victims continue to use the product after the free year has passed.

Eduard Goodman, global privacy officer of CyberScout, said with just one year of service, “Equifax is offering to monitor their own files on all of us, which is essentially free to them, then go on to make a profit on offering credit and fraud monitoring in the subsequent years.”

“The personal data exposed in the Equifax breach are truly the keys to the kingdom for identity theft,” Goodman told SearchSecurity. “Those records for millions of Americans will end up on the dark web, for sale to cyber criminals who can use your name, birth date and SSN to perpetrate a variety of scams. Often, the consumer is on their own, trying to repair the harm to their finances.”

Equifax breach ramifications

Rebecca Herold, CEO of Privacy Professor, said the impact of the Equifax breach “goes so far beyond just the SSNs.”

“The PINs of every one of the frozen personal records that Equifax has, whether or not they were included within the gargantuan breach, can now be determined by every person on the planet. Their format for creating PINs are so obvious; basically just the date you put a freeze on your account,” Herold told SearchSecurity. “Think about it; most folks putting a freeze on their account will do so soon after the breach was announced, making it not too hard for cybercrooks to just call up and remove the freeze. So Equifax’s security was lax and allowed a huge breach, but one of their responses to the breach can now exacerbate and enlarge the harm impact of the breach.”

Goodman said the Equifax breach should highlight the need to seriously rethink SSNs in terms of “verification and identity management in the 21st century.”

“The SSN has served us beyond what it was meant for and as a country. There are solutions that can be put into play. These include utilizing advanced biometrics, voice recognition, even typing pattern recognition. It will also involve the utilization of some combination of advanced encryption and blockchain technology,” Goodman said. “My concern is that the government will lean on a stale concept such as a national ID card or citizen ID number, both of which offer the same pitfalls as a SSN.”

Tran said identity management and authentication “should never be tied to a single point of failure and relying on data points alone such as birth dates, social security, driver’s license numbers and the like have posed challenges for many years.”

“This breach was the final knock-out punch to show a move to electronic identification (e-ID) multifactor identity and authentication technology, life cycle and governance platforms is long past due,” Tran said. “It’s likely going to spark aggressive legislative discussion on whether a new national e-ID program will be implemented to include the use of a unified smart card CHIP/PIN, RFID and/or biometric identification standard to reduce the current and future data exposure risks.”

Herold noted there are security and privacy risks in such e-ID programs as well as major logistical issues in moving away from SSNs.

“Some want to move to biometrics, but that will include not only technology challenges, but also significant privacy issues. A big challenge is that so many organizations, of all types and sizes, now use SSNs, and have used them for many decades. It would probably be a bigger challenge than moving the U.S. from [imperial measurements] to the associated metric units. Our ideas for how to do identification need to dramatically change from what we’ve been considering. We are stuck in an identity innovation rut and need to have a dramatically new idea, that is comparatively easy to switch to. Such inspiration has not yet been described, though.”  

For Sale – Creative Sound Blaster X7 USB DAC

No mate. Keeping that…it’s sounds to damn good. :D

This is my nephews who wants to downgrade his sound card to a soundblaster z I had in a drawer and put the funds towards a GTX 1070

So no you can do one with your trashy offer mate :p my nephew is not soft. Lol

Wanted – HP Microserver or Dell T20

How much are you looking to spend?

I picked up a gen 8 with an i3 and 8gb ram (including ILO activated) the other day to do some work training at home and have since found out they are willing to let me have some of our work kit so it’s likely to be surplus to requirements.

Would be £275 tho so a fiat bit more than the entry level one after cashback

Powered by WPeMatico