Agile scrum was a 4chan troll that wildly succeeded
Executives and managers thought it was all they needed
They hated having programmers creating what they sold
They wanted all employees to fit inside one tiny mold
Agile says you can always ship whatever shit you got
As long as it makes money it can be a buggy lot
Scrum says anybody can play anybody's game
So heart surgeons and oncologists are basically the same
So now it takes ten hours to produce the work of one
You need to hire ten times more to ever get it done
You'll hire people just to plan the meeting room conditions
You'll create meeting planner supervisory positions
So take this job and shove it up your puckered derrier
Replace me with ten robots or ten monkeys I don't care
It's pretty obviously a troll. Who wouldn't love having "Agile Coaches" and "Scrum Masters" who can't even tell if source code shown them is Java or C telling people how to write software - continuously, in meetings, every single day? Who wouldn't be enthralled with producing one successful product after another with just a few talented colleagues for years morph into trying to coax 50 overseas developers into producing a single coherent anything at all? Who wouldn't find endless entertainment in watching an entire industry lose its collective mind?
I bet OP is just some disgruntled curmudgeon. Ignore those guys. They'll go away eventually.
>morph into trying to coax 50 overseas developers into producing a single coherent anything at all
Isn't the problem: the quality of code is so poor, that more time is needed for debugging and review, and it defeats the cost savings of having low-wage, overseas coders? If you have a real programmer, software engineer handing requirements and specifications to a people person that in turn distributes the tasks to coders, it should work in theory. However, if your coders can't code very well...
one problem is companies don't seem to care anymore if quality of their commercial product is shit. if it's profitable in its current state there is no need to improve quality. nowadays only fear of competition drives quality level, not embarassment over how shit their buggy garbage is. it does not help that programming as a career choice one can be happy in is dead, killed by companies trying to make programmers interchangable commodity cogs
>Former antivirus magnate John McAfee was found dead in his prison cell in Barcelona just hours after a Spanish court approved his extradition to the US on tax evasion charges, authorities in Madrid have told national media. >McAfee, 75, was found in his cell at the Sant Esteve Sesrovires jail on Wednesday evening, Spanish media reported, citing an official statement from the Ministry of Justice. Guards and prison medical staff intervened and attempted resuscitation, but to no avail, the ministry said. >Investigators have been dispatched to the jail to probe the cause of death, but “everything indicates it could be a suicide,” the ministry added. >Earlier Wednesday, a Spanish court ruled to allow his extradition to the US on charges of evading taxes between 2014 and 2018, which could have landed him in prison for up to 30 years. US authorities also had civil charges pending against McAfee for an estimated $13 million in profits from cryptocurrency schemes. McAfee was arrested in Spain in October 2020 and held in jail as a “flight risk” pending his extradition hearing.
>IT'S B-BLOATED!!!!1! And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly? Sell your 15 year old Thinkpads that can't even into AVX or non-fixed pipeline GPUs.
>SECURITY RISK!1!!!!1! Have you anything to hide? No one cares about you. You aren't developing anything significant. You aren't a threat to the current ecosystem. You aren't a terrorist/spy/lone-wolf actor. FVEY has better places to spend its resources on. You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection.
You can disable the telemetry in settings. Go a step further too and get the Enterprise edition with minimal software preinstalled.
>BROKEN AND BUGGY1!!1! In the beginning? Sure, but now its quite stable, and you'll be hardpressed to come across any problems. Linux, on the other hand, presents you with hours of work, ranging from broken audio to missing files to a lack of hardware and application support.
>NON-FREE!11!!1! You're paying for consistent updates and almost full support for any and every application in existence. The user experience and interface is only beaten by Mac OS from Apple, and is lightyears ahead of anything Linux could bring to the table.
You don't take advantage of FOSS. You've never looked into the software to determine how it works.
>MICROSOFT IS SHITTY COMPANY11!!!!!1! And Stallman is a foot-eating pedophile. Separate the art from the artist.
>NON-CUSTOMIZABLE!1!!1! Windows is utilitarian with a focus on getting shit done. It won't waste your time with hundreds of customizable options and features. It just works. Imagine spending 10 minutes writing assembly code every time you wanted to use your microwave. The people who use windows only care about the applications inside of it, not stupid crap like sub-pixel rendering and kernel parameters.
>NORMALFAG1!!!!!11! Your elitism is nothing. "Normal" people are happy, fulfilled, and have their heads on straight. You on the other hand have spent countless hours behind a screen, posting on strictly anonymous websites, angry about the state of the world and how you're so much better than everyone else.
>>14889 If you don't have security, then you can't have privacy. You can only have privacy if your system is secure, otherwise it is leaking information. Mircosoft's version of security is preventing cyber criminals from owning your computer. Meanwhile, they steal all sorts of information from your system and share it with the government. Microsoft, Apple, Google, Amazon all do this.
>>14898 Right, but is it completely impossible to secure/debloat/etc. Windows 10?
I understand that by default Windows ain't it but I come across quite a bit of resources and tools which one can use to "tune" the whole thing, in addition to a person's ways and usage, considering all that, is it really that bad?
Consumer Reports said Thursday it was “easily” able to trick Tesla’s Autopilot system to operate without anyone in the driver’s seat. The publication’s test came amid questions about the safety of the company’s advanced driver assist system in the aftermath of a fatal crash in Texas in which authorities said there was no one behind the steering wheel.
Using a weighted chain attached to the steering wheel to simulate the pressure of the driver’s hands, two Consumer Reports researchers were able to use the steering wheel dial on a Tesla Model Y to accelerate from a full stop, and then “drive” around on a closed-course test track for several miles — all while sitting in the passenger seat and backseat. They stopped the vehicle by again using the dial to bring the speed back down to zero.
Tricking the Tesla to operate without someone behind the wheel was as simple as keeping the driver’s seatbelt buckled, not opening the driver’s side door during the test, and using the weight to simulate hands on the steering wheel.
“The car drove up and down the half-mile lane of our track, repeatedly, never noting that no one was in the driver’s seat, never noting that there was no one touching the steering wheel, never noting there was no weight on the seat,” Jake Fisher, CR’s senior director of auto testing, said in a statement. “It was a bit frightening when we realized how easy it was to defeat the safeguards, which we proved were clearly insufficient.”
>>14695 how the fuck is this "security concern" telsa's fault? he literally had to make a device and purposeley leave the seatbelt on, as well as sneak out of the car to pull it off. you're blaming the tools for malicious behavior here
You cannot ever be guaranteed of no logs with a VPN. The best you can do is trust the VPN's admins/owners/marketing spiel when they tell you that they don't keep logs or that they aren't actually operated by someone else.
>You will currently not be able to access any v3 onion addresses, what is happening is unknown, but it is potentially a huge attack on the entire network. Earlier today I made a post outlining consequences I would be putting into place to deter markets from funding DDoS attacks against each other, as the potential to scale and completely kill every node on the network is a very real potential outcome. Now everything is down and I have no idea if this has sped up the process of this occurring or if it is even an attack at all, all I know is, this is big.
>This attack began after Dread forum owner, HugBunter made a post stating the consequences for market owners who continue to attack rival markets.
Well the relays that make up the TOR overaly network are known by the public, and given the state of most ISPs ignoring basic ingress/egress filtering when it comes to packet transmission can make a denial of service attack a possibility. Its sad how techniques like these still work now a days. Heck, the recent bugs leveraged with microshits exchange server software made my day.
usually, it would require to externally/internally flash a libreboot bios and/or remove Intel ME with me_cleaner then install a fully free system such as parabola, so in this way the CIA can't glow on that computer.
fsf's ryf approved notebooks meet the requirements of freedom in hardware. sadly those resources aren't so accessible.. buying a ThinkPad made before intel ME and internally flashing libreboot (specifically X60) seems to be the easiest way to replicate what fsf did. in which sadly I couldn't find any X60 out there.
RISC-V powered computers are also an alternative, though I don't know any computer/notebook that has a RISC-V CPU .
ARM powered computers such as raspberry pi 4 seems to be a safe alternative since I haven't seen anyone whistleblowing about backdoors nor spyware on their hardware nor software, is it safe though ? what are your thoughts on this matter ?
This shit has been around longer than Intel Management Engine. Intel AMT was in vPro product lines of the Core2 era. Mainly found in laptops, but also likely in the mainboards of business oriented workstations.
This is from 2007:
a riscv computer, hardware completely 100% open source, though is it also free? suppose it's even better than those thinkpads, since now there is hardware source code, we can just see and change what we don't like and do anything, effectively putting an end to surveillance.
If there's a hardware backdoor you will struggle to remove it. You can remove entire components - rip out camera, take out unnecessary wifi card - but there's always a trade off. If you're just using FB and crap, and don't mind the performance hit, go for it.
>>14785 It's a step in the right direction, but you're still limited to the foundries. The foundries will know that the chips are going to be RISCV CPUs and can tweak them. The only way I can see to avoid the issue is to use FPGAs, since the foundry will not know the end use. Cost will become an issue, if attempting to use large FPGAs for CPUs.
>>14881 Oldschool boomers have talked of this, watching as more and more integration led to obfuscated construction. What used to be daughter boards and discrete components, became small black ICs, and then those became fewer and fewer. Now there are SoC and things like Apple M1, the momentum is obvious. Intel moving what used to be the North Bridge into the actual CPU, this is also when Intel introduced the Management Engine.
Language translation. Is there any development in an earpiece or sunglasses that will automatically translate other languages to english in real time? if an app can do it then an app in custom hardware can!!
Hak5 Discord and Slack Used To Spread RATs - ThreatWire https://youtube.com/watch?v=mdTnhUJFnno [Embed] Apr 13, 2021 Facebook downplays the data leak, linkedin appears to be targeted in a similar attack, and Discord and Slack are being used to spread remote access trojans! All that coming up now on ThreatWire.
Hak5 Colonial Pipeline Hit With Ransomware; Apple AirTags Hacked - ThreatWire https://youtube.com/watch?v=QjLvIDWnc3w [Embed] May 11, 2021 A Qualcomm SoC could be exploited by attackers, the US’s biggest gas pipeline is hit with ransomware, and Apple AirTags get hacked!
Hak5 7 Year Old Linux Flaw Newly Discovered - ThreatWire https://youtube.com/watch?v=12oSZ3FVXBA [Embed] Jun 15, 2021 "EA Source Code was Stolen, a 7 Year Old Linux Flaw was Discovered, and 1.2 Terabytes of Data was Mysteriously Stolen from millions of Windows pcs!"
Might be late to the table with this reply, but yes OP, absolutely a fantastic choice in every possible way. Upgrade the HD to an SSD upgrade ram to max (8gb I think). Install linux (devuan preferably ) and rock that puppy!
Yes you are. A T420 is in fact righteous and a good choice. They will last. (and the touchpad is nothing but a bud tray - you will disable it and only use the red pencil eraser mouse because if your sleeve so much as brushes the pad the cursor jumps across the screen)
If you're doing your own operating system, you won't do much better than that. Compatible with tons of systems, you'll end up using it with a mouse, external, so don't get it just for a laptop if you only want to use a laptop.
>>14379 I have never used it before but here is 4chans api https://github.com/4chan/4chan-API It is read-only though, so you will have to use some sort of web-scraper program to post, so you might as well use it to parse the threads as well. There are python libraries that make the process dead-easy, especially if you aren't making requests very frequently.
Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.
The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet.
American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.
So I want to get into RFID. I'm no programmer, I'm basicaly a low-level IT support guy, with very basic code understanding (studied C, Html/CSS and java just a bit). I'm interested in RFID about my company's vending machine, but also about subdermal implants, and maybe in the future for malicious intents.
Can anyone point me on some ressources, or even just share some RFID dumps I could study/compare?
I know it's not quite as simple as the fear-mongers want to present it as.
At work, all our items are tagged, now instead of just an external barcode but also an internal RFID tag. Even buying them 100K at a whack they were $0.40/ea. And fifty or so people were set aside to go through and tag everything we own. Three years later as we move equipment from office to office we start finding errors. Serious errors. Turns out our tracking vendor had settled on one particular tag format, our software didn't have that so we'd chosen something "pretty close" but our vendor went through a small, internal reconstruction and came out using their information a bit differently. Our software couldn't read their tagged information and it took months of experts scratching their heads to figure out that "pretty close" wasn't close enough.
SO the big bosses sent out emails that "hey, you guys, you've been doing it wrong all this time shame on you." And politely refused to take note of how those bosses' trained people set up all our equipment on what turned out to be a misunderstanding.
Reading the tag isn't all that hard -- any antenna can energize and read off the contents. But you might need a human to interpret the results, especially if the tag format they're actually using is different from the one they publish that they agreed to use.
Sorry I can't be of more specific help, but searching out the high-level tag datasheets might be an okay start.
Hello, my name is Dean and I'm one of the developer of Cutecat2.0.
Not sure if you heard about us yet, but I'll try to explain it in a few words.
Cutecat2.0 is 2 weeks old and built on the BSC, we are currently developing gaming and nft for our project. Since this is our first project, we are fully dedicated to it, and to its success.
I know you are reading about great communities everyday, but this one really is. A lot of members are doing their part even without me knowing about it, and I think, that's one of the best part of this community.
I know much this project can grow, I can promise that we will give all of me go make this succeed. There is a huge path in front of us, but together we make this the number one BSC token.
Sincerely, your Cutecat2.0 developer.
Below you can read most important information about project.
Information 🔰Launched on 16th April 2021 ❇️Initial supply: 1,000,000,000,000 CCAT
During a national police action from the police in the Netherlands and Belgium, 75 house searches were carried out and 30 people were arrested after investigation services had managed to crack encrypted messages via the "Sky ECC" message service from various criminal organizations.
28 firearms have been seized in Rotterdam, says the OM. According to the OM, thousands of kilos of drugs were seized, drug labs dismantled and 43 people arrested in previous actions in the context of the same investigation.
Since February of this year, investigative services have been able to monitor -likely via a server that they had taken over- the messages that suspects sent via Sky ECC. As a result, “dozens of planned serious violent crimes, including kidnappings, liquidations and shootings,” said the National Prosecutor’s Office in a press release.
Your "authorized" qualifier keeps blinking in red neon. Are you saying that as soon as a SkyECC client is hacked, it's "unauthorized" and doesn't count as an authorized device that's been hacked?
Cut the bullshit and do a detailed and accurate technical whitepaper on how counterfeit SkyECC devices allowed encryption bypass if you want to convince networking people and cipherpunks of a lack of culpability on your part.