Cybersecurity ——–AI——- Places ——– Tech-bookmarks

Short selection of cybersecurity / AI methods and some places to go.

  • QWEN 2.5 Deepseek V3 local
    QWEN 2.5 Deepseek V3 local

    Same HW as in Local install of Deepseek R1 is used. QWEN 2.5 Install LMstudio: https://lmstudio.ai/ Launch LMstudio and via discovery seek QWEN, here model qwen2.5-7b-instruct-1m was locally installed. Runs OK but requires some adjustements for query chainining. DEEPSEEK V3: The available HW is likely not sufficient. Eventualy a distilled example may be installed when…

  • Deepseek R1 local install
    Deepseek R1 local install

    Also follow-up to previous post. Main interest here, learn more about ease of local install on Laptop.1) Minimal HW check2) Ease of installation3) Data privacy Pretty quick and positive experience (mandatory basis for follow-up ifHW is also sufficient for training, enhancing the model). 1) HW AMD Ryzen5 4600H, 16 GB Ram, 1TB (SSD NVME) dual…

  • QWEN 2.5 plus
    QWEN 2.5 plus

    Alibaba just released on 28 January 2025 an interesting, competitive (yet free) AI. Initial query checks reveals similar results and speed as Deepseek. Second strong Chinese alternative to US IT Giants. Alibaba has likely massive data to use for training plus the according computing power (can use Asian optimized system resources when people in Asian…

  • Deepseek V3
    Deepseek V3

    2016, High-Flyer experimented with a multi-factor price-volume based model to take stock positions, began testing in trading the following year and then more broadly adopted machine learning-based strategies. https://en.wikipedia.org/wiki/High-Flyer https://en.wikipedia.org/wiki/DeepSeek Started using Deepseek queries when it was launched. Now, despite the massive impact and usage end January 2025; responses are still in most cases fast,…

  • Message from the future
    Message from the future

    NotebookLM Google trial with some past notes for eventual book https://notebooklm.google Story notes Podcast generated in ONE MINUTE; only input the story notes (AI boost period)

  • Webcams Switzerland

    Jungfraujoch Interlaken Bern Luzern Zürich (Ütliberg) Airport 4D historical maps Airport ZürichCard TimeOut Eurotreck (Cycling and hiking) MySwitzerland meteoblue

  • Prompt writer
    Prompt writer

    Following last years check on various solutions, current dominance of Open AI (Microsoft 49% ownership, Apple buying in), Gemini (Google) and eventually Llama (Meta) is visible.Then, high value of prompt writing is by many people confirmed and used. Recent outages (capacity limits at daily peak periods) outline that outside of China the scale of the…

  • SMART-Phones potential
    SMART-Phones potential

    Brief investigation on combined computing power and risks. 1. Global combined capacity of all smartphones 2. Tools to use/control smartphones for grid-computing 3. Smartphone security, forensic via MVT (picture generated by FOTOR (AI) ) Set-up: MVT install (forensic) Grid Computing Wikipedia index (pending decision on Infra) BOINC Github BOINC Alternatives FieldGenius HW: Several Android Smart-phones/…

  • Credibility? – AI Content
    Credibility? – AI Content

    Running Investigation on Content Generation. Ease to automate or AI generate text / media. Listed items are pending check if not otherwise indicated (detailed). WordPress most used Internet Site Management stack (as used for this site adding AI assistance for content generation. was just introduced. DeepAI.org (demo) Inferkit (demo) Credille.ai (demo) Cohere (demo) OpenAI (demo)…

  • Drone shield
    Drone shield

    Trial set-up: Drone approach alert, take control or RF disruption. HW: DJI mini 2, HackRF One, Pixel 7, … SW references: Drone shield commercial; military Drone jamming or spoofing is ilegal, only reviewed for study purpose in relation to defend company/private property under illegal recognition activity via drone. . Legal issues with counter drone tech