Tag Archives: IT
I’ve been using Scrum for 4 to 5 years now and it’s great. I have delivered quality software with Scrum, and had delighted customers. It almost always led to a better product than Waterfall allowed me to deliver, at least in the same time frame. When I started it was fairly uncommon, and hard to convince customers that it was a good idea. Now it’s commonplace and most customers expect it. So it obviously works, and it has gained a good following.
Scrum allowed me to deliver software following agile principles, which allows the software to evolve to meet the clients changing requirements as they see and explore the product. It was a great leap forward. But things could be better, and new methodologies have been adopted by various companies. Kanban is one of these. I have gradually begun to prefer using Kanban over Scrum, and in this article I’ll explain where I think Kanban solves the various issues I experience with Scrum.
Read more »
by: Steve Dent
Researchers have discovered a key flaw in the WPA2 WiFi encryption protocol that could allow hackers to intercept your credit card numbers, passwords, photos and other sensitive information. The flaws, dubbed “Key Reinstallation Attacks,” or “Krack Attacks,” are in the WiFi standard and not specific products. That means that just about every router, smartphone and PC out there could be impacted, though attacks against Linux and Android 6.0 or greater devices may be “particularly devastating,” according to KU Leuven University’s Mathy Vanhoef and Frank Piessens, who found the flaw.