Tag Archives: it’s

For Sale – MSI 1080 Gaming X

Selling this due to an upgrade. It’s in immaculate condition and I’ve been the only owner since new.
Comes complete with box and postage is included.

Just under 2 years warranty remaining, I can email over a copy of the invoice along with the card.

Stock image as its sitting in my pc still at the moment.
[​IMG]

Price and currency: 420
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Norfolk
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Gigabyte Windforce GTX 780ti 3GB

Hello,

I’m selling my Gigabyte Windforce 780ti following an upgrade, it’s the 3GB model that comes overclocked. Never had any issues with it and it’s in great condition, it’s out of warranty now.

Price and currency: 100
Delivery: Delivery cost is included within my country
Payment method: BT or PPG
Location: Stockton-On-Tees
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – Dell 7350 or 7370 or 9365

Cool, I suspect they come up on the outlet around that but there haven’t been any for a while.
If you could and just let me know the condition and if it’s all good then we have a deal.

I’m devon based but in farnborough next week if you happen to be anywhere near there

*Edit* haha I see you’re just down the M3! Should be able to arrange a time at some point on Tues Wed or Thurs evening if you’re about, call it £475 collected pending condition etc?

For Sale – iMac 21.5inch (Late 2012)

I am selling my 21.5 inch iMac as it doesn’t get used and it’s just sitting in our box room unused.

The machine is in great condition and has only been used a handful of times. As you will see from the pictures, there are no marks or scratches on either the screen itself or anywhere on the machine – front or back.

It is running the latest OS and has a 2.7Ghz Quad-core Intel i5 processor with 8Gb of Ram.

Full specs below
21.5-inch: 2.7GHz
2.7GHz quad-core Intel Core i5
Turbo Boost up to 3.2GHz
8GB (two 4GB) memory
1TB hard drive
NVIDIA GeForce GT 640M with 512MB

PLEASE NOTE – It does not come with the trackpad pictured . The batteries leaked and it’s knackered basically.

Price and currency: £380
Delivery: Delivery cost is not included
Payment method: Bank transfer
Location: Stockport
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – iMac 21.5inch (Late 2012)

I am selling my 21.5 inch iMac as it doesn’t get used and it’s just sitting in our box room unused.

The machine is in great condition and has only been used a handful of times. As you will see from the pictures, there are no marks or scratches on either the screen itself or anywhere on the machine – front or back.

It is running the latest OS and has a 2.7Ghz Quad-core Intel i5 processor with 8Gb of Ram.

Full specs below
21.5-inch: 2.7GHz
2.7GHz quad-core Intel Core i5
Turbo Boost up to 3.2GHz
8GB (two 4GB) memory
1TB hard drive
NVIDIA GeForce GT 640M with 512MB

PLEASE NOTE – It does not come with the trackpad pictured . The batteries leaked and it’s knackered basically.

Price and currency: £380
Delivery: Delivery cost is not included
Payment method: Bank transfer
Location: Stockport
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – iMac 21.5inch (Late 2012)

I am selling my 21.5 inch iMac as it doesn’t get used and it’s just sitting in our box room unused.

The machine is in great condition and has only been used a handful of times. As you will see from the pictures, there are no marks or scratches on either the screen itself or anywhere on the machine – front or back.

It is running the latest OS and has a 2.7Ghz Quad-core Intel i5 processor with 8Gb of Ram.

Full specs below
21.5-inch: 2.7GHz
2.7GHz quad-core Intel Core i5
Turbo Boost up to 3.2GHz
8GB (two 4GB) memory
1TB hard drive
NVIDIA GeForce GT 640M with 512MB

PLEASE NOTE – It does not come with the trackpad pictured . The batteries leaked and it’s knackered basically.

Price and currency: £380
Delivery: Delivery cost is not included
Payment method: Bank transfer
Location: Stockport
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Teens play an active role in their own online safety, new Microsoft research shows – Microsoft on the Issues

It’s fundamental that each of us plays a critical role in our own online safety, and young people and teens are no exception. Adults could take a cue from teens in this area, however, as teenagers are more likely to act in response to online risk, defend others and ask for help, according to preliminary results of a new Microsoft study.

Nine in 10 teens polled said they acted in response to an online risk; nearly two-thirds (65 percent) said they stood up for others in the digital space, and more than three quarters (77 percent) asked for help when they encountered online abuse. That compares to 84 percent of adults who acted in response to an online risk, 59 percent who defended someone else and 60 percent who asked for help. Teens outpaced adults across all three categories. In addition, 56 percent of teens said they knew where to go for help with an uncomfortable online situation, compared to just one-third of adults.

Microsoft study expands research launched last year
The findings are from Microsoft’s latest research on digital civility — encouraging safer and healthier online interactions. The study, “Civility, Safety and Interaction Online — 2017,” polled teens ages 13-17 and adults ages 18-74 in 23 countries. This year’s results build on a study done last year that surveyed the same age groups in 14 countries. In 2017, there were 11,584 teens and adults polled in total.

Indeed, it’s up to young people – with solid guidance from parents, teachers, technology companies and others – to understand their digital rights and responsibilities, to recognize the risks and benefits of their online communications and transactions, and to realize the personal and ethical implications of their online behavior. These are some of the reasons Microsoft organized its pilot Council for Digital Good this year.

Council for Digital Good members want to improve life online for all
Last month, we welcomed to Microsoft’s Redmond, Washington, campus 15 teens from across the U.S., selected to explore the state of digital civility and how to foster a kinder, more respectful and empathetic web.

Council members have embraced their assignments and dove into how to go about making changes for the better when it comes to online life. In addition to drafting individual written manifestos for responsible online behavior, the teens created artistic representations of their manifestos after they returned home. We’ve received two rap songs, one video of an interpretative dance, several visual arts projects, animations and other imaginative creations.

Here is a photo of an artistic manifesto from Erin, a 15-year-old from Michigan, as well as a link to a video produced by 16-year-old Rees from Maryland. We’ll make other council members’ projects available on our website and other online properties soon.

Council for Digital Good teen artwork
Erin’s manifesto artwork.
Student video screenshot saying
A screenshot from Rees’ manifesto video.

And, teen council members were in demand before they even arrived on campus for the two-day August summit. We let nongovernmental organizations and other partner groups know that we were forming the council, and that it would be in operation for about 12 months. Several NGOs expressed interest in tapping our teens for their thoughts and perspectives about various campaigns and other work that their groups were planning.

New Thorn PSA aims to raise awareness of ‘sextortion’
One such organization was Thorn, which asked for teen council members’ feedback on a public service announcement (PSA) it was developing about “sextortion.”

Sextortion takes place when someone threatens to distribute private and sensitive material if a victim fails to provide money, or images of a sexual nature or sexual favors. (The perpetrator may also threaten to harm a victim’s friends or family members by using information obtained from the victim’s electronic devices unless the victim complies with the abuser’s demands.)

Thorn wants to make teens aware of common tactics used in sextortion, to destigmatize the issue by raising awareness, and to promote open conversations with trusted adults so teens have a stronger safety net in place if something goes wrong. Thorn held an online focus group with our teens in late July, just days before council members arrived for the Council for Digital Good summit.

Thorn’s new PSA launched Tuesday, and Microsoft is helping to draw attention to this clever and informative resource that benefited from the teens’ input. Council members liked the approach and imagery, saying that the cat video animation made it easier to broach a sensitive subject. While still in development, the teens said the PSA was a resource they would promote on social media and share with their friends. We congratulate Thorn on the new video, and look forward to hearing of many tens of thousands of views and “likes.”

Materials like the new Thorn PSA are essential to generate interest among teens and young people to safeguard their online reputations and to help instill safer online habits and practices. For more about Thorn’s mission, visit the Thorn website.

To learn more about online safety, Microsoft’s Council for Digital Good and digital civility, visit Microsoft’s website, review our resources, “like” us on Facebook and follow us on Twitter.

[1] Countries surveyed: Argentina, Australia, Belgium, Brazil, Chile, China, Colombia, France, Germany, Hungary, India, Ireland, Italy, Japan, Malaysia, Mexico, Peru, Russia, South Africa, Turkey, the United Kingdom, the United States and Vietnam.

Tags: Council for Digital Good, Online Safety

How JSR-375 simplifies and standardizes Java EE security

When leafing through the pages of the recently ratified JSR-375, the new Java EE Security API, it’s amusing how quickly the reading of the spec turns into an exercise of uttering to yourself, Seriously, have they not standardized this stuff yet?

Historically, implementing various aspects of Java EE security was a responsibility shouldered primarily by the application server vendor, and hooking into those proprietary systems was always a headache. Any software architect who has gone through the process of setting up a WebSphere cluster, configuring a WebLogic server or doing a Liferay installation has inevitably wasted time jumping through the odious hoops that were required to connect to a proprietary user attribute registry or third-party authentication store. For those unlucky enough not to have a simple LDAP server that provided this functionality, a custom user registry might have to be developed, which meant coding against a vendor-specific API and hooking that into the application server’s runtime.

These little Java EE security nuisances were never show stoppers. There have always been workarounds or third-party frameworks that would help an organization achieve their security goals. The problem was that these various approaches weren’t standardized. And while there are many aspects of Java EE security that are documented within specifications, much of which can be found in the often overlooked Java Authentication Service Provider Interface for Containers (JASPIC) specification. Unfortunately, JASPIC isn’t fun to work with. Furthermore, it isn’t annotation-based and it doesn’t leverage container-based dependency injection. JSR-375, the Java EE Security API, is an attempt to address these security-related issues.

Containers, microservices and Java EE security

“It’s an important specification because it bridges some of the gaps that existed in previous Java EE versions,” said Java Champion Ivar Grimstad, who is hosting a JavaOne 2017 session entitled, “New Security APIs for Java EE.” “Now it’s there, and that’s a good thing. It’s a good foundation on which to build upon so if you want OAUTH or support for microservices, you have a good foundation to build upon.”

This first version of the Java EE Security API does a good job at standardizing security and addressing many of the shortcomings of the existing Java EE and JASPIC APIs.

But perhaps the most significant aspect of the JSR-375 API is the fact that it allows for all of the security information to be defined within the application, and not configured externally. “You do it all in the application,” Grimstad said. “You don’t need to configure it from the outside.”

That’s a significant improvement in managing the lifecycle of an application, especially in a world of Docker-hosted microservices that are distributed in containers. “With annotations, you can easily add security and you don’t have to do any vendo- specific configuration to get it working.”

The annotation based approach to security isn’t insignificant.

One of the nice things about JSR-375 is the fact that it doesn’t try to boil the ocean on its first run around the block. The enterprise security specification can be broken down into three key parts.

1. The authentication mechanism

Web-based authentication isn’t anything new. Every Servlet engine supports basic, digest, form and certificate authentication. But existing APIs don’t provide many hooks allowing developers to interact with the process. Doing something as simple as ensuring the authentication happens against a specific user registry isn’t possible without digging into non-standard APIs. Furthermore, there is no support for authentication mechanisms other than the aforementioned four. And mechanisms for doing things like firing off callbacks to the application after a user is authenticated don’t exist.

Many of these issues are addressed by JASPIC, but JASPIC demands a great deal of coding effort while lacking any declarative support that software developers have come to expect after the release of Java 5. The Java EE Security API’s HttpAuthenticationMechanism interface, built in JavaBeans containing sensible defaults and annotations such as @RememberMe and @LoginToContinue, greatly simplifies the act of programmatically interacting with authentication services.

2. The Java EE security identity store

The identity store is a central part of any Java EE security implementation, but a simple and standard mechanism for interacting with it has always been lacking. To simplify and standardize the process, the Java EE Security API defines an IdentityStore interface and a CredentialValidationResult object, both of which work together to perform the simple tasks of validating a user, providing the caller’s unique identifier, and the various groups to which a user belongs. Interfaces for interacting with an LDAP-based identity store or a relational database as an identity store are also defined.

3. The Java EE security context

When it comes to writing low-level code to programmatically secure Java resources, the EE specification has always been somewhat lacking. Declarative security is simple to use and always preferred, but it doesn’t meet the needs of every application. Enterprise software often has fine-grained security requirements that can only be fulfilled programmatically. That’s where the Java EE Security Context comes in.

The Security Context provides familiar methods, such as getCallerPrincipal() and isCallerInRole(String role) that helps to identify who is invoking a given resource. More interesting are methods such as the boolean hasAccessToWebResource method that can determine if a user can invoke a given HTTP method on a Servlet. Another interesting addition is the authenticate() method which programmatically triggers a challenge. Prior to the Java EE Security API, challengers were only triggered when a resource was accessed, and programmatic triggering wasn’t possible.

The team that worked on JSR-375 should be proud of their accomplishment. This first version of the Java EE Security API does a good job at standardizing security and addressing many of the shortcomings of the existing Java EE and JASPIC APIs. It is a solid foundation upon which to further build upon and enhance.

For Sale – Dell Optiplex 3020 SFF I5 4590 4GB 1TB

Selling this as it’s getting no use, it was bought to use as a media pc and is in full working order. Condition is good, a few scuffs but nothing major.

Full specs:
i5 4590
4gb ram
1tb hdd
win 10 pro 64bit

Asking £170 inc

Price and currency: £170
Delivery: Delivery cost is included within my country
Payment method: Bacs, paypal
Location: Durham
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Microsoft’s David Forstrom Foresees the Invisible and Inevitable Augmentation of AI

A future in which artificial intelligence has become so pervasive that it’s invisible and bots, rather than people, lead our service experiences is the stuff of sci-fi movies. But that future isn’t so far off and, in fact, might not be as scary as we think, says Microsoft’s David Forstrom.

Under the leadership of CEO Satya Nadella, Microsoft wants to break boundaries in AI technology, says Forstrom, who BizTech Managing Editor Ann Longmore-Etheridge chatted with at Microsoft Ignite in Orlando, Fla.

Forstrom, director of AI communications, talked about the evolution of the technology, how Microsoft has begun embedding it into products, such as Office and Cortana, and how it can become a go-to tool for small businesses.

BIZTECH: Why is artificial intelligence important, and what has led to its increased importance in the workplace?

Forstrom: AI addresses the ultimate barrier that we face as humans: information and our limited capacity to absorb and act on it.

What has exploded in the last few years is three things: the cloud, which makes data accessible to the world; two, data — enormous amounts of it; and three, advanced algorithms. We’ve had huge breakthroughs from a research perspective just the last couple years that have allowed us to do things like achieve 96 percent accuracy in image detection or human parity in speech recognition.

We’ve even been able to integrate translation into Skype and now into productivity products like Office and PowerPoint.

BIZTECH: What are some real-world use cases that demonstrate how Cortana can be a valuable tool for small businesses?

Forstrom: We’re busy professionals, and Cortana, because it has access to our information, can see if we have made commitments. So, if I have emailed someone and said, “Let’s revisit this topic in three months,” or “Let’s plan to get together about this in a few weeks,” Cortana will actually remind me and say, “I see you made this commitment. Do you want to schedule a meeting for that?” Or, “It looks like you’re going to need to prepare a document for this meeting.”

Another one is calendaring. Let’s say you’re a small business working with partners and vendors, and rather than going to each individual and saying, “Can we meet next Wednesday? What times do you have open?” you can invoke Cortana to assist with that.

Cortana will look at those people’s calendars and availability, and come back with a meeting time that suits everyone. Or, it may say, “Everyone is available at this time, except for one person. Do you want to proceed with scheduling this block of time?”

Cortana is going to evolve into a personal assistant — a true person assistant. If you think about the practices of a personal assistant in real physical life, it’s extending that into the digital realm. It can be available to you throughout your workday, from home to your small business and back home. It’s still early days, though, for Cortana in business.

BIZTECH: If you’re a small business with limited resources to invest in AI technology, what is your best game plan?

Forstrom: I think businesses right now are recognizing that AI is here to stay. It’s not a flash in the pan. In some shape or form, it will be infused into most of our interactions and our technologies.

Small businesses, first of all, need to look at what problems they’re solving for. A good example of how AI can help is bots, which are something many small businesses are entertaining right now to incorporate into their customer service and engagement.

We did a lot of surveying and research across the Seattle area, talking to a lot of businesses, small and large, about how they could see using bots. In one case, in talking with a restaurant owner, it became clear that the hosts were answering phone calls all the time: people calling wanting to know the hours, or the menu, or about gluten-free options, things like that. If the owner was able to implement a simple rules-based bot — if this question, then this answer — that could completely free up the staff to focus on core things they need to be doing to add more value.

Another area that we see small businesses incorporating AI is in the realm of cognitive services. If a business has a product or solution where they could implement computer vision or natural language understanding, where they are doing a lot of textual interaction with customers — those are fairly cheap. It requires a bit of developer and IT knowledge, but it’s low-level. This is low in cost, compared to complex deep-learning models of AI.

BIZTECH: Microsoft recently bought Hexadite, which underscores the growing role of automation in countering security threats. How do you think that automation will improve cybersecurity, and how will it affect the role of humans?

Forstrom: First and foremost is our principle that AI must augment humanity. Security is certainly one of these spaces we see intersecting quite rapidly with AI, and that’s because it’s all about data and the intelligent insights that you can glean out of that data to make decisions across your security portfolio.

Machines trained through deep learning models will be able to process our knowledge of a potential threat and be able to reach a conclusive decision on actions to be taken. But it’s still humans who are being amplified because it’s humans that are making the decisions at the C suite level or the chief security officer level in terms of, “How do we act on that?”

BIZTECH: Speculatively, in five to 10 years, what is the business environment for AI going to look like?

Forstrom: You can think about it like electricity: It’s all around us, totally pervasive in our lives; it manifests to power our devices and things like that. But we don’t talk or think about it. It just happens. It’s there. And it betters my life and enables me to do more.

That’s the future that we see with AI, especially when you get 10 years or further out. The office of the future will be an AI-infused environment, where we benefit from all of these features and functionality, but we don’t think about them anymore.

There are already AI-driven features in PowerPoint and Microsoft Word that are being used, but users don’t recognize that as AI. It’s just the product.

We’ll really start to see a shift away from some of the fears of today, that AI will cause a sort of dystopian environment, to where people realize it does better their lives and increases their productivity.

Read more articles from BizTech coverage of Microsoft Ignite 2017 here