Thank you for this helpful introduction to APIs and their vulnerabilities.
@LaurenPowers-b1y29 күн бұрын
Thanks for the analysis! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?
@AjayKoovackal29 күн бұрын
I am certainly trying to stay open-minded and learn how EVM and Agile practically can function well together. In many cases, the feedback I hear and see is that EVM over-complicates, forces micromanagement, suffocates agile projects while making them less efficient. I wonder how the tooling, or lack thereof, is a partial root cause. For example, much of EVM lives on spreadsheets or a project-based application like MS Projects. While Agile lives in apps like Jira. There are some Jira plugins and many custom scripts that people create, but at the end of the day, it still seems the tooling does not play nice together. There is a lot of manual overhead, thus causing things to go out of sync extremely fast. Especially with high turnover, the newly hired person starts doing things their way, which leads to disjointed continuity. Management wants EVM, while the devs prefer agile. If things are laid out perfectly right initially, perhaps they can coexist. That is of course never the reality. Also, many times, as soon as the scope changes or the schedule slips or a large pivot needs to occur, everything starts falling apart. Further compounded if EVM-proponents want forecasting and risk mitigation 5 years out on a project. EVM seems to prefer rigidness to stay robust, while Agile prefers fast-and-loose to provide value faster and sooner. Like oil and water, these seem like complete opposite methodologies in practice, excluding the complexities that increase with human factors. Instead of forcing these things together, I wonder if there is an "additive" that could allow them to "mix" together seamlessly. The answer may be in the software tooling used to manage, track, calculate, and deliver these EVM/Agile products? On a separate note, an argument I often hear is, "Why do we need EVM, look at SpaceX and their agile approach, they deliver more value faster, cheaper, and safer than many other aerospace companies who are stuck on EVM or EVM/Agile-hybrid who consistently run over time and budget?". I would love to hear all three of your thoughts on this, if it is a worthy discussion.
@ZennExileАй бұрын
he really said everything he could possibly say without saying it, didn't he? It's not counter AI, it's counter-endUser. A framework to prevent unauthorized (un-monetized) determinism. This seems like a familiar perspective to one raised in a gilded palace within a walled garden. That seems counter intuitive to the undeniable truth informing emergent reality. This technology cannot be controlled and any attempt to profess safety in deployment is an attempt to unjustly inflate projections in the pursuit of recovering runaway startup costs.
@bennguyen1313Ай бұрын
Would have liked to have heard about how 'Creating and Using Virtual Prototyping Software' fits with Agile/Scrum, or general Project management for Software Development. Or thoughts on how it can used in a industries with existing rigorous standards FAA : DO-178X , DO 331 , ARP4754A , ED-12C FDA : 13485 , ISO14971 , IEC 62304 , SaMD and DOE Nuclear : 414.1x, Automotive : 26262
@AlgoNudgerАй бұрын
Thanks.
@mikemott3305Ай бұрын
I was one of the authors of an early Model Driven Systems Development Paper. As the earlier commenter noted the topic is about more than software. Our motivation arose from the challenges of developing large, complex systems with hardware and software content. In particular, hardware development is sequential, and software development is iterative. Traditional methods resulted in poorly tested software being integrated with hardware when a program's burn rate was at its peak. This motivated us to find methods to address the integration risks earlier in the development cycle. This feature of Model Based Engineer has not been fully exploited by industry.
@2Haught2Ай бұрын
Just like AC/DC switches for government uses. It's just like electronics but for humans. For control and position
@2Haught2Ай бұрын
The "as" switch is personal to me and virtual to you. You have to be aware of locations and people who make the switch "AS" C. For gain in position and power who use their influence in positive or negative motions
@AshleyQuijano-p9oАй бұрын
1980 U S Intelligence who originally evaluated the relationship between a Filipino navy recruiter to a black woman also involved the parents in deceiving them into following specific instructions that placed their child in abusive neglectful situations while residing overseas Clark Airforce Base Philippines '80. 2019 - with the establishing the internet the FBI CIA who arranged and supported the marital affair of the Filipino Navy Recruiter due to his relationship to a black woman influenced their divorce. the child, now black crossdresser experiences various forms forms of deception manipulation and cyber monitoring by the agency who disguise themselves as strengthen company cyber infrastructures wherever the victim is employed or frequently visits. This harrassment uses their fabricated influential events to defile and blackmail the victim who they originally attempted to homicide or now considers a test subject.
@GeriIndustrialDesignerPrivateАй бұрын
kzbin.info/www/bejne/gorSiHWdZdZojLs Level in scale Jasper alcoholic man
@GeriIndustrialDesignerPrivateАй бұрын
many pages with much words tip Quantum fantasy confusion for deviation reality locations , center of all computers is that group tips produce drivers and programs Figure Text and keyboard in their computers for 2-3 month computing maybe in a studio together with electronic chips and pcb formation instructions from factory leaving place for other group tips creating their drivers and soft wars for kids genuine from unknown installed from internet fertility via many hiding ports protocol line vibration Hz~ internet
@arindajohnson83062 ай бұрын
Thanks very much. I had a coursework due and could not wrap myself around this
@mariamal-haydari57363 ай бұрын
I can’t find the resources mentioned
@SuperGaboSan3 ай бұрын
Where can I find this research?
@kennieg3 ай бұрын
From my 40 years of experience, work package do measure work. However, some Agile practitioners have a problem in equating work performed with value created. As noted throughout the Agile manifesto, it's value that should be emphasized. The use of the term "earned value" instead of "earned work" further confuses the conversation.
@kamenwokaburuusokko3 ай бұрын
Why isn't a software factory referred to as a "system" instead of a new buzzword? Is it because of the reference to pipelines? Could a pipeline be manual, and not a technical solution? I get annoyed when the new terms seem unnecessary to me... Our company explained our SF as a series of applications that work together (so, a system...). Is it more a methodology like Agile?
@zebraz16163 ай бұрын
The US commits cybercrime against other nations but are not often reported by US mainstream media. Dave can you please investigate these activities and see if the offenders can be charged? The world biggest cybersecurity spying is ….?
@MrRanaAB3 ай бұрын
Great information
@t.b.66003 ай бұрын
This brief interview hits a couple high-level points, but the full "Special Report: Application Programming Interface (API) Vulnerabilities and Risks" PDF offers a wealth of practical information for developers. Thank you for making this quality resource publicly available! insights.sei.cmu.edu/documents/5908/api-vulnerabilities-and-risks-2024sr004-1.pdf
@ZennExile3 ай бұрын
So what yer saying is, modern IT solutions are built on a house-of-cards, and no matter how robust or useful any modern systems become, they will always be, at their foundation, insecure and chaotic, because the people who built that original foundation of cards are all retired and gone? And maybe Cooper was right that instead of trying to extract every possible cent from a broken system, we should invest in a new more robust and secure foundation? Good talk.
@Bored_7-m2w4 ай бұрын
I wonder what happened to these guys
@teodorfon81594 ай бұрын
Seems like they don't teach at the SE Institute how to upload a video beyond 240p.
@MarkUnderwood-knowlengr4 ай бұрын
At 36:45 a key point is made about the specialization within the profession. It's already a problem within #cybersecurity that specialization across vulnerability management, platform security, app sec, cryptography, secrets management -- become de facto siloes. So far, it's unclear whether #LLMs can help address this problem, by summarization and narrative-making perhaps. But I doubt it can fully overcome it. In fact, the LLM may add a layer of, for instance, generated "code" or templating on top of what is already a tower of subcomponents and services -- thereby adding still more complexity. That said, I doubt there will be any turning back.
@davidigunma4 ай бұрын
Please can i get the ova file the one on git doesn’t download
@AlgoNudger5 ай бұрын
How to protect our infrastructure from NSA/3PLA (cyber espionage)? 😂
@gerditt5 ай бұрын
Great! Well explained and easy to understand. Thanks!
@khanfor5 ай бұрын
We need to update the way and methods teaching software engineering. The impacts of GenAI is happening and education need to be adaptable to this change. Equipping the students with basic skills of software engineering and development in mind all the tools can be used from the graduates from computer science and software engineering degrees. No doubt that the GenAI will be used extensively starting from now. Happy that SEI is discussing this topic and how we can update the educational approach.
@somanathkangune2335 ай бұрын
Reply cod. In the my. Profile h dfc bank
@somanathkangune2335 ай бұрын
Reply cod. In the my. Profile h dfc bank
@neilbriscombe5 ай бұрын
Thanks great pressentation, are the slides avaialble anywhere?
@jakobjensen82286 ай бұрын
Nice video!
@cptfwiffo6 ай бұрын
Whelp. Maybe consider putting backdrops instead of random rooms. Yadda Yadda it costs more CPU but it is so much better
@paulastone20407 ай бұрын
Wow- so glad to know. Thanks Dan DeCapria
@ravichandrankanaku16387 ай бұрын
On the cmd we saw 225 smtng defect occurred counts but when we commit it why only 175 is showing up in coverity?
@mdnazmulislam31757 ай бұрын
Can you please give a link of the slides?
@AnandiHira-vy2wg7 ай бұрын
I love the series SEI did on diversity in software engineering. It's really interesting to learn of these women's journeys to where they are now!
@TheJespy7 ай бұрын
Thanks for the info! 🤙
@timtruett51848 ай бұрын
David Griess wrote The Science of Programming 40 years ago. I read it, I learned from it, and over a long career in software development, nobody cared. Employers want code that is written fast, not code that is provably correct.
@LivMyLife8 ай бұрын
Great discussion! Where can I find this blogpost?
@LivMyLife8 ай бұрын
Well what do you know…Google works. Found it. Thanks again!
It's interesting that importance in diversity is important for women and talking about it, women. I am pretty sure that there will be changes when all the top managers discuss it and prove it by charts