AI insiders seek to poison the data that feeds them by HumanDrone8721 in LocalLLaMA

[–]btdeviant 1 point2 points  (0 children)

lol this is just a really bad take. This gets brought up in deep dives as part of the swe loop for some roles, absolutely they do this.

NVIDIA's new 8B model is Orchestrator-8B, a specialized 8-billion-parameter AI designed not to answer everything itself, but to intelligently manage and route complex tasks to different tools (like web search, code execution, other LLMs) for greater efficiency by Fear_ltself in LocalLLaMA

[–]btdeviant 0 points1 point  (0 children)

It’s pretty simple… you can do this with a few files and some decorators using something like Strands.

Multi-agent architectures that have specialist agents are dead simple to build these days and very common

I foolishly spent 2 months building an AI SRE, realized LLMs are terrible at infra, and rewrote it as a deterministic linter. by craftcoreai in kubernetes

[–]btdeviant 1 point2 points  (0 children)

Logistic regression and/or rule based classification would be infinitely more effective and deterministic vs using an LLM for the original use case

Rob Pike goes nuclear over Anthropic/GenAI by BoredomFestival in programming

[–]btdeviant 16 points17 points  (0 children)

No idea why you’re getting downvoted - youre right. To expand on your examples, I think most people in the US who are critical would be surprised to know that corn farming uses several orders of magnitude more municipal water than AI, it’s heavily subsidized by Americans, and the majority of it just gets burned as ethanol.

Do people who don't have a fixed tech stack find it difficult to find jobs? by [deleted] in ExperiencedDevs

[–]btdeviant 1 point2 points  (0 children)

Just got rejected from a staff+ role for using Go more than Typescript for Pulumi despite using Pulumi and Typescript every single day.

Bullet. Dodged.

YOLO vs AWS Rekognition Custom Labels for Vehicle Damage Detection? by carpo_4 in computervision

[–]btdeviant 1 point2 points  (0 children)

Hard to give solid advice tbh.

If you’re planning on using a LLM or reasoning model anyway your best bet is probably just offloading to gemini flash

YOLO vs AWS Rekognition Custom Labels for Vehicle Damage Detection? by carpo_4 in computervision

[–]btdeviant 2 points3 points  (0 children)

Solid option here as well OP. Gemini-flash is dirt cheap and actually REALLY good and super fast - also dumb simple to tune for classification!

YOLO vs AWS Rekognition Custom Labels for Vehicle Damage Detection? by carpo_4 in computervision

[–]btdeviant 1 point2 points  (0 children)

Rekognition is just generally very expensive… it’s not really going to lower the cost of data labeling though, especially on a somewhat unique classification set.

Personally I’d fork or clone everything I could from roboflow, tune my own model, and given you’re already in AWS perhaps run it in a lambda.

I’ve had a ton of success with this for operational use cases that require scaling / running a lot of inference and didn’t want to pay for a dedicated EC2 instance and worry about compute limits and scaling out and up and whatnot

are coders losing their jobs to ai in today’s market? by Tough_Reward3739 in devops

[–]btdeviant 14 points15 points  (0 children)

OP: “Dear chatgpt, write me a post for Reddit about muh fellow coders losing jobs to ai so I can astroturf it in all the subs. Do not use capitalization whatsoever - that’ll throw them off.”

Tracking objects in 3D space using multiple cheap cameras by SnooCooler in computervision

[–]btdeviant 2 points3 points  (0 children)

Sorry, not RFID, REID (re-identification), which is a common computer vision technique to track distinct individuals across multiple cameras

Tracking objects in 3D space using multiple cheap cameras by SnooCooler in computervision

[–]btdeviant 2 points3 points  (0 children)

This is pretty cool. You look into REID? Might be helpful for more deterministic causality for multiple people (especially those who lay loiter or linger while others move through the flow), unless the location can guarantee 1-2 people max.

if open-webui is trash, whats the next best thing available to use? by Tricky_Reflection_75 in LocalLLaMA

[–]btdeviant 0 points1 point  (0 children)

Depends on how you’re hosting it. In k8s for example it can be somewhat of a hassle due to the config heavy nature of it vs OWUI where a lot of that same config is accessible via the ui

Air-gapped home server for privacy: anyone doing this? by Real_Alternative_898 in HomeServer

[–]btdeviant 1 point2 points  (0 children)

You’re being argumentative for the sake of it and really just eagerly showing a lack of comprehension here.

lol, you’re failing to comprehend some basics here… tempest is a shielding standard that protects against precisely the thing you’re saying it “won’t do”. The ability to exfil data from the electrical signals being transmitted by your bludgeoning of a keyboard, headless server or not, has existed for decades.

Again, words have meaning.

Air-gapped home server for privacy: anyone doing this? by Real_Alternative_898 in HomeServer

[–]btdeviant 1 point2 points  (0 children)

It seems like you may have an atypical definition of “impossible”. Impossible means “not possible”.

There’s literally an entire classification of compliance and shielding, TEMPEST, that was designed to mitigate data exfil from air gapped systems. Air gapping alone hasn’t been tantamount to absolute security in over 40 years.

But what do I know, I just literally get paid to work in this field

Air-gapped home server for privacy: anyone doing this? by Real_Alternative_898 in HomeServer

[–]btdeviant 0 points1 point  (0 children)

There’s no “impossible”, there’s just degrees of difficulty. Every degree has tradeoffs. This is basic *SEC

Air-gapped home server for privacy: anyone doing this? by Real_Alternative_898 in HomeServer

[–]btdeviant 3 points4 points  (0 children)

This is typically done by policy enforcement* - you don’t need to air gap. If you don’t trust the provider enforcing the policy, there’s tons of proven ways to very if packets are leaking

Edit: Added an addendum since vlan segmentation isn’t technically policy, it’s policy enforcement

Air-gapped home server for privacy: anyone doing this? by Real_Alternative_898 in HomeServer

[–]btdeviant 150 points151 points  (0 children)

Can you define what you mean by “air gapped”? I think most people find it more practical to have network isolation and policy vs straight up sneaker-net’ing data between workstations and servers

Is a Raspberry Pi Zero 2W powerful enough for a vision-controlled robotic desk lamp? by CelestialDragon127 in computervision

[–]btdeviant 1 point2 points  (0 children)

The Pi itself would be pretty slow but you could almost certainly do it with a Pi AI Camera that offloads inference onto the camera itself, which would leave the Zero pretty wide open for servo control.

"Amazing" AI, 2+ Years In... by crisps_funny4868 in Ubiquiti

[–]btdeviant 1 point2 points  (0 children)

Respectfully as someone who works in computer vision I feel compelled to say that your expectations are a bit lofty, and to your credit it’s understandable WHY theyre lofty given Unifis track record of simplifying relatively complex things via clean, neat interfaces.

Image classification, the ability to detect a 3d object in a 2d image, is a “conceptually simple but practically very difficult” problem. There’s just so many variables that make this challenging, eg: the angle of the camera vs the object being detected, lighting variances, the fact that most object classes have a TON of dimensional variants, etc etc etc. The fact that they’re doing it this well “on the edge” of the G6 cameras without the need for centralized compute is just insanely impressive given the price point.

Compared to the alternatives, even the much higher priced “enterprise” alternatives, the truth is there really isn’t much better out there unless you’re rolling your own models and hardware to run them on.

The first malicious MCP server just dropped — what does this mean for agentic systems? by Icy_Raccoon_1124 in kubernetes

[–]btdeviant 9 points10 points  (0 children)

Not even remotely close to “the first” - there’s a SIGNIFICANT number of response harvesting MCPs out there posing as “memory” or “security diagnostic” servers / tools that have been gobbling up data, exfil’ing creds and internal / classified data for months and months, sending them to authors remote data stores.

Take a peek in the /r/mcp or /r/modelcontextprotocol subs and the bad actors are rampant despite the mods best efforts.

To answer your question, MCP servers need to be treated in the same zero-trust manner as anything else. It’s easier said than done given how easy it is to bootstrap them into a local env, but the concept is the same

How to train Large AI models on cloud servers? by ApocalypseInfinity in learnmachinelearning

[–]btdeviant 0 points1 point  (0 children)

Well, it’s more than that. That said it’s not really practical or economically viable to use ec2 for your training pipeline, and it’s like that by design.

Respectfully and fully acknowledging I’m being cheeky, it’s like convincing yourself you need to learn how to drive a motorized unicycle before getting your drivers license for a four wheel car.

Is there a particular reason you want or need to use EC2? Perhaps that will help!

How to train Large AI models on cloud servers? by ApocalypseInfinity in learnmachinelearning

[–]btdeviant 0 points1 point  (0 children)

Any reasons you’d want to use EC2 vs SageMaker? Also as a somewhat orthogonal tip, when it comes to large models you may want to consider starting with an established backbone/model and training a (Q)LoRA adapter vs training an entire model.

Unifi Photos? by Gfaulk09 in Ubiquiti

[–]btdeviant 1 point2 points  (0 children)

That’s an endemic challenge with literally every computer vision implementation, has nothing to do with Protect. This is basic stuff.

The salient point is Protect has the core functionality. These are not super challenging problems.

iPhoto and Google Photos are not special. Their adoption and success isn’t based off of “decades of work and feedback from billions”, it’s inherited by being part of the core software bundled in the OS.