Tag Archives: long

Wanted – Macbook Air 13″

Hi there,

I have one that I’m almost certainly going to sell, as long as my new tablet shows up tomorrow, and it works as expected, I’ll be wanting to offload.

It’s an A1466, i7, 8Gb RAM, 250Gb SSD, High Sierra. Battery lasts about 7 hours in my use. Just need to see what it’s worth first before I decide on a price.

Let me know if this might be any good.

Paul

Wanted – Macbook Air 13″

Hi there,

I have one that I’m almost certainly going to sell, as long as my new tablet shows up tomorrow, and it works as expected, I’ll be wanting to offload.

It’s an A1466, i7, 8Gb RAM, 250Gb SSD, High Sierra. Battery lasts about 7 hours in my use. Just need to see what it’s worth first before I decide on a price.

Let me know if this might be any good.

Paul

Wanted – Macbook Air 13″

Hi there,

I have one that I’m almost certainly going to sell, as long as my new tablet shows up tomorrow, and it works as expected, I’ll be wanting to offload.

It’s an A1466, i7, 8Gb RAM, 250Gb SSD, High Sierra. Battery lasts about 7 hours in my use. Just need to see what it’s worth first before I decide on a price.

Let me know if this might be any good.

Paul

Wanted – Macbook Air 13″

Hi there,

I have one that I’m almost certainly going to sell, as long as my new tablet shows up tomorrow, and it works as expected, I’ll be wanting to offload.

It’s an A1466, i7, 8Gb RAM, 250Gb SSD, High Sierra. Battery lasts about 7 hours in my use. Just need to see what it’s worth first before I decide on a price.

Let me know if this might be any good.

Paul

Wanted – Macbook Air 13″

Hi there,

I have one that I’m almost certainly going to sell, as long as my new tablet shows up tomorrow, and it works as expected, I’ll be wanting to offload.

It’s an A1466, i7, 8Gb RAM, 250Gb SSD, High Sierra. Battery lasts about 7 hours in my use. Just need to see what it’s worth first before I decide on a price.

Let me know if this might be any good.

Paul

Wanted – Cheap laptop – HDMI port a must

Hi all

Looking for the cheapest laptop you have, condition not an issue as long as it works and has a HDMI port.

Let me know what you have price including delivery please

many thanks

Location: Bristol

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Machine learning’s training data is a security vulnerability

For as long as there has been an internet, there has been data manipulation. In 1998, Sergey Brin and Larry Page launched Google as a search engine that was designed to get rid of the junk in search results. But the more sophisticated system soon gave rise to more sophisticated data manipulation methods, including Google bombing — the use of crowdsourcing to bias search results.

History shows that the data manipulation methods used by adversarial actors evolve in lockstep with the technology (see sidebar). That’s a fact that should get CIOs’ attention, according to data expert Danah Boyd, especially as companies increasingly use machine learning to power predictive features in their applications. Machine learning requires training data — a lot of it — to get the algorithms working correctly, and one popular data resource used by developers is the internet.

“I’m watching countless actors trying to develop new, strategic ways to purposefully mess with systems with an eye on messing with the training data that all of you use,” said Boyd, a researcher at Microsoft and a presenter at the recent Strata Data Conference in New York. “They are trying to fly below the radar. And if you don’t have a structure in place for strategically grappling with how those with an agenda might try to route your best laid plans, you’re vulnerable.”

To stand up to quickly evolving changes in the threat landscape, Boyd proposed companies return to the old-school practice of rigorous testing and find ways to inject what’s known as adversarial thinking into the design and development process. That includes hiring what Boyd called “white hat trolls.”

Training data is at risk

The manipulation of data by bad actors is nothing new, Boyd said, citing the relatively benign example that became known as “Rickrolling.” In 2007, pranksters disguised hyperlinks to trick people into watching English singer and songwriter Rick Astley’s 1978 hit music video, “Never Gonna Give You Up.”

While Rickrolling was entertaining, Boyd said the methods behind its success have served as the basis for more nefarious data manipulation. The prank not only taught people how to manipulate systems, but also showed the strategic benefit of going viral and was the antecedent to the disinformation campaigns of the 2016 presidential election.

Pizzagate, the debunked conspiracy theory that linked Hillary Clinton’s presidential campaign to human trafficking and child pornography, for example, required a distributed network of dummy accounts, known as sock puppets, to bait journalists into reporting on it, Boyd said.

But the data manipulation methods are about to get a lot more sophisticated. Up until now, the manipulation of algorithmic systems relied on manual methods. With the onset of machine learning, that’s about to change, according to Boyd.

To tune machine learning algorithms, developers often turn to the internet for training data — it is, after all, a virtual treasure trove of the stuff. Open APIs from Twitter and Reddit, for example, are popular training data resources. Developers scrub them of problematic content and language, but the data-cleansing techniques are no match for the methods used by adversarial actors, according to Boyd.

Nicolas Papernot, a computer science and engineering grad student at Penn State University, published a paper last year on his experiments with computer vision. He altered images of stop signs so the neural nets saw them as yield signs. Here’s the detail that should make CIOs nervous: The changes could not be detected by human eyes.

The most successful injection attacks on machine learning models are happening in research, but the methods, which are evolving, will no doubt be aimed at mainstream models soon, according to Boyd. “It’s time we started building technical antibodies,” she said.

Needed: Adversarial thinking

One antibody is to return to what Boyd called “a culture of test.” Today, the technology industry often relies on A/B testing, or what Boyd described as “the perpetual beta,” essentially turning customers into a quality-assurance (QA) department. But when members of the QA department are also looking to expose bugs in the system for their own gain, CIOs might need to rethink the process.

“QA wasn’t simply about finding bugs,” Boyd said. “It was also about integrating adversarial thinking into the design and development process. That’s a lot of what we lost.”

She pointed to cutting-edge researchers who are doing just that — building adversarial thinking into the development of machine learning systems. Generative adversarial networks (GANs) are one example. GANs use two unsupervised neural nets. One generates data that looks like the data it was trained on; the other discriminates between generated data and real data. The two neural nets operate a zero-sum game until the generated data is indistinguishable from the real data.

But GANs don’t go far enough, according to Boyd. “We need to actively and intentionally build a culture of adversarial testing, auditing and learning into our development practice,” she said. ‘We need to build analytic approaches to accept the biases of any data set we use. And we need to build tools to monitor how the systems evolve with as much effort as we build the models in the first place.”

And CIOs might want to go one step further and take a page out of Matt Goerzen’s book: Invite white hat trolls to mess with systems and help companies understand system vulnerabilities — just like companies do with white hat hackers.

“We no longer have the luxury of only thinking about the world we want to build,” Boyd said. “We must also start thinking about how others might start to manipulate our systems [and] undermine our technologies with an eye to doing harm and causing chaos.”

Wanted – GTX 970/780/980

How long have you had it?

Does it have warranty?

Has it been OC’D or mined with?

I would want the delivery cost included in the £140.

Also, due to your lack of feedback I would want it posted first and I’ll make payment when received. If you check my feedback I have done this before.

Chevron fuels digital transformation with new Microsoft partnership – Transform

As a global leader in the energy industry, Chevron has long been a big data company with advanced technologies to manage complex operations. But a new partnership with Microsoft will infuse Chevron with even more computing power to accelerate its work in data analytics and the Internet of Things (IoT).

Announced Monday, the multi-year partnership establishes Microsoft Azure as Chevron’s primary cloud and is part of Chevron’s efforts to digitize its oil fields and accelerate deployment of new technologies that can increase revenues, reduce costs and improve the safety and reliability of operations.

“Chevron has a long history of applying technology,” said Bill Braun, chief information officer of Chevron. “This partnership will allow us to digitally transform and leverage the scale and capabilities of Microsoft to ensure we harness the value of our data.”

The partnership also includes technical collaboration, joint innovation and employee cross-training. It will help Microsoft develop products that solve Chevron’s business challenges and Chevron to transform the growing amount of data it generates into performance-driving intelligence.

“Chevron is a very sophisticated consumer of data, compute and IoT,” said Tom Keane, head of global infrastructure for Microsoft Azure. “While they’re excellent today at high-performance computing, the intent of this partnership is, ‘How can we bring that together with Microsoft Azure and more efficiently do oil exploration? Or more efficiently do sensor management from an offshore oil rig?’”

Braun said Microsoft Azure is a good match because of its large global infrastructure, which has more regions than any other cloud provider. He said Azure will enable new solutions in such data-intensive areas as exploration, midstream logistics, retail operations and the management of thousands of oil wells around the world.

“We have an incredible amount of data from our production facilities, drill ships and fiber optic cables inside well casings,” he said. The cables measure pressure, temperature and other metrics and can generate up to 1 terabyte of data a day.

In Houston, engineers monitor data from drill sensors six miles beneath the earth’s surface and across four continents – data that arrives in five to 10 seconds to help ensure human safety and systems controls. In Kazakhstan, Chevron’s new facility expansion can generate more data than all the data produced by the company’s refineries in North America.

“What are we going to do with that data? How do we harness it?” Braun said. “Azure is going to be very helpful in getting real-time data, handling the volume and giving us the ability to scale and apply analytics.”

He envisions a day when Azure, which can quickly ingest and analyze millions of data points, might enable machine learning to read seismic surveys faster and more consistently than humans, similar to the progress being made in reading medical images. And he said predictive maintenance will create smarter workflows with equipment.

Chevron and Microsoft have worked together for years, and Braun said the ability of engineers to learn from one another is critical. He said Microsoft “gets” the enterprise and that Chevron values Microsoft’s technology, technical leadership and partnership mindset. Microsoft gains insight into the oil and gas industry and learns how its solutions work in a company with a global footprint and harsh operating conditions. Microsoft has already improved its high-performance computing infrastructure based on Chevron’s feedback.

“It’s a two-way development program; both sides bring something and get something,” Braun said. “For us to evolve our technology skills at the pace the cloud is moving is very valuable. This partnership helps Chevron stay technically competitive.”

To learn more about Chevron’s partnership with Microsoft, read the press release.

Wanted – Ultrawide Gsync 1440p Monitor, 1080 ti (trade for my 1070)

Hey guys, long shot but im about to pull the trigger and ascend to an ultrawide monitor! Thought id have a quick try on here first see if anyone has one for sale.

Also, another long shot but im tempted to get a 1080 ti to help power the new monitor. I currently have an EGVA 1070, i believe it is the superclocked one, so id be hoping to trade this plus cash for a 1080 or a 1080ti.

Cheers!

Location: Doncaser / Worksop

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.