This is not a WTF.
The default is a "short" report unless otherwise specified, the "full" parameter is much like the unix "ls -l" (full) vs "ls" (short,default) format.
This is not a WTF.
The default is a "short" report unless otherwise specified, the "full" parameter is much like the unix "ls -l" (full) vs "ls" (short,default) format.
@belgariontheking said:
16GB seems not "too bad" for a max file size for Access.
But TRWTF is using a 16 GB file/"database" to call data from on a website in that manner. (I wonder what the server load is like)
Hashing without salts is stupid (as all of us here hopefully know) -- A password of 5 characters per-se no matter WHAT algo you put it through will still be 5 characters, just be hashed, alas easily cracked. It doesn't matter how good of an hash you use (you could use sha512 for all intents and purposes). If what you feed that algo is crap (i.e. insecure), your security will still be equally crap.
Regarding salts: Salts are good and all, but in reality, it just places a small barrier up in place, One can still likely cause collisions with salted passwords regardless of what the salt is, especially if one can find out how the salt is generated.
The ultimate goal of hashing should be is to stop the casual password snatcher, but someone who's experienced, has knowledge and compute power will be still able to break whatever you do, the goal should be to [b]prevent your databases from getting compromised in the first place[/b]. Point is: Hashing... Salts... Passwords, you can put as many layers up as you want, but ultimately, as long as the system is manmade and is designed under finite capacity, it is imperfect and can be broken. If you're that paranoid that you cannot trust any security method (even tentitively). Don't. Don't store any sensitive data at all anywhere.
Your best chance with passwords is to keep them changing to upset any sort of brute force/cracking methods. One should not depend on static passwords/salts as stated above, the hashing/salting is imperfect and will be broken.
As the addage goes: Security is a journey, not a destination.
There is no such thing as a "Server OS" when it comes down to it, an OS's role is to act as the layer between applications and the hardware, not to serve data. The only reason why there's some "Enterprise grade" "Server OSes" is because often those "Server versions" of the OS come with services packaged in not available with the workstation/desktop installs. This is usually a marketting tactic by vendors to charge more for the services included in the "Server versions" that aren't available in the workstation/desktop versions.
System Operations 101:
A server is a computer specifically designated and configured to serve data to other systems, Servers can utilize any OS capable of communicating via a network, what differentiates servers from workstations is that a workstation does not serve data over a network without local user intervention whereas a server does. A server is called a "server" because it serves resources and data to various systems on the network through the use of clients on the systems in which it serves.
This is one major problem I see in this situation, the Judge fails to treat this as an international situation and fails to see this case from the perspective of all countries -- These are NOT only US Citizens that are in Google's databases. I'm sure this judge is forcing Google to break other countries laws by this decision -- I wonder if some citizens of EU Countries where there are high privacy laws can sue the judge and/or Viacom for privacy invasion...
Sheesh, sounds like a setup I'd have overhauled if I ran that network...
Choose your own TRWTF (provided the story):
- is that the administrator is restricted in the same way as the users
- is that the @STATION account's password wasn't locked.
- is that the Network Administrator was out with no replacement
- is that (as stated) netboot needed a login (or login mechanism needed it's own login to make the workstation function)
- is that netboot's (or login mechanism's) login could be changed via the regular authentication/password system
@brazzy said:
<Banter about firewalls being weak>
Erm... Don't ACLs mean anything to you?-- At point A you simply deny the rest of the world access (ala dropping the packets, not allowing ANY response back to probes) and specifically allow the IP ranges of point B, then do the same with B, allowing A. Firewalls are NOT just your "Zonealarm" or "Norton Internet Security" -- Hell, if you're paranoid, you can set the firewals to disallow the machines themselves that are communciating to talk with the rest of the world.
@brazzy said:
As I like to say, if it's manmade, it has flaws. but that's besides the point. This is why you test your setup, you don't just throw systems out on the public internet with some firewall which config was rushed/incompetently done and expect security. Security is a journey, not a destination.<physical security versus network security arguement>
Banks are still stuck in the old day and age where 4-digit PIN numbers are "acceptable" -- they see PIN number length as acceptable, so they see no fault with low-character count passwords and see no need to correct that fact. Fact is (regrettably), a secured desktop machine is probably much more secure than a bank's system when it comes to logons and user access.
@MasterPlanSoftware said:
I could do that. What if we did it submission style like the quotes?
That could be pretty cool.
Swamptionary?
Sounds perfect -- it would keep the editing burden off you when Swamp comes up with a new word/term.
Perhaps on the site, we could have a page with terminology that Swamp uses, in a simular form to a dictionary -- I'll be willing to do a partial writeup
In the meantime, "Jamming it" sounds like a synonom to "Shotgun Debugging"
Radiation tag because this is like Chernobyl, something horribly unhealthy to be around, but people are attracted to gawk at it anyway...
@Eternal Density said:
so why start flashing???
It's more than likely a bug than anything else -- That window tried to come into focus but failed (because of focus stealing prevention), thus it tripped over the same set of code in the Windows UI as if it was a new window trying to come to focus, there probably wasn't proper handling (in the focus stealing prevention) for the fact that window may have been requested to come to the surface by the user.
That's my guess anyway..
Why do they need to be "Mandatory"?... if the bosses are so inclined to make a fun event that their employees were to attend, Why not make it in the form of something that will attract the people they're wanting to attend instead of sending some memo around mandating it?
@SpectateSwamp said:
They had some lame excuse citing: "as it is not a web-based application and therefore does not meet our definition of a Mashup."
In checking their goals for this MashUp:
(QUOTE)
We believe that NetSquared’s role as convener of social-benefit innovators and the technical
experts will help accelerate the conversations about "open data," "open standards," "data portability,"
and encourage people to re-imagine collaborative possibilities.
(END QUOTE)
Swamp search is "THE" collaboration tool. There is no way us Swampies should be disqualified.NetSquared's emails were very helpful and encouraging a few days ago. Who put the pressure on? One of their Sponsors or
a Search Giant or 2ah?
The question they're asking as a requirement:
Can your application run natively in a web browser (Internet Explorer, Firefox, etc) and be remotely accessable by users without the application installed or WITHOUT being installed?
i.e. can you visit a web page like per-se http://google.com/ and enter your search criteria without downloading a program?
I've seen programs where in the sleep sub, it proceeds to busy the CPU to 100% for the time it requires to "wait", especially on these "Are we done now" loops.
If you want random data, just have the user mash the keyboard -- entropy guarenteed.
Was this written by SpectateSwamp? Will it display log entries randomly in 2-3 second intervals? SpectateSwamp must be a Microsoft developer...
@SpectateSwamp said:
I just knew I shouldn't have got involved with that SourceForge.net. It means having to administer this and reply to that. Being pushed to add a new feature. No thank you. It's good enough for me right now.
Let's paraphrase this shall we?...
@SpectateSwamp said:
I just knew I shouldn't have got involved with that SourceForge.net.
I think any site which userbase reports my software as imperfect is complete bs.
...
@SpectateSwamp said:
It means having to administer this and reply to that.
I am too lazy and don't want to maintain anything because it involves work, even if I started it.
...
@SpectateSwamp said:
Being pushed to add a new feature. No thank you.
I don't want to do anything more with my project other than force my views about it on people.
...
@SpectateSwamp said:
It's good enough for me right now.
It's good enough for me therefore it's good enough for everybody.
So, what can we get out of this statement?..
@SpectateSwamp (paraphrased) said:
I think any site which userbase reports my software as imperfect is complete bs. I am too lazy and don't want to maintain anything because it involves work, even if I started it. I don't want to do anything more with my project other than force my views about it on people. It's good enough for me therefore it's good enough for everybody.
@SpectateSwamp said:
Who's idea was it to lock down computers like that. Teach them to backup and reload the OS like I do. Computer resources and data should be shared. Not locked down. Swamp makes sharing data easy.
You seem to be "giving us lessons" so it's time for you to take one as well since you insist on wandering into our turf (that you claim you don't need to know anything about)
<scenario> (Begin Scenario)
Let's set up a scenario: I'm the network administrator of a library computer system you use, you use the network I administrate and control.
1. Public computers I administrate are not owned by the you (a user), the you have no "rights" to do whatever they want on the systems owned by the library.
2. I (The network administrator) set up the computers on my network as so that the systems need little to no maintanance - My support staff have no time to reinstall the OS on 100+ computers every time something goes wrong (user infects the computer they used with a virus)
3. As opposed to your single computer on your DSL line, Every computer on my network has the capability to talk to every other computer on my network, so when one computer becomes infected with something, it has a potential to spread throughout the whole network in minutes, now you try reinstalling your OS on your computer 100+ times in a row and see how time consuming it would be for me and my network support staff to spend a better part of a night that we could be just spend time relaxing cleaning up a mess you made.
4. Whenever a user wants "to install a program" on my systems, I have no clue where that program originally came from, what it contains,or how it will effect my system, for example, if you wanted to install SSDS on a computer on my system, I would have no assurance or way of knowing if your program is a virus or not. You could show us the source code all you want, do video demos, etc.., but how do I know the exe file you want to use is the same one you demo to me without taking time out of my already busy schedule? I don't. I don't know if SSDS will turn my network into zombie computers use to attack and/or spam people.
5. If I enabled auto-run on CD/DVD drives on computers on my network, someone could easily walk by, insert a CD with a autoplay virus that infects the computer without having to even touch the keyboard, my whole network could be infected with this "walkby" virus attack.
6. Before you go on about "the common man doesn't need to know about this" -- of course he doesn't, that's why I with my network staff have set up the system simply so my users can use the system without worry and hassle. We just save users like yourself from yourselves, preventing you from becoming legally liable for infecting my systems.
7. My library system is unlike internet cafes, I have internal servers on my network (know the catelogue? that's served by one or two), I don't need someone to bring in a hacking tool and fire it up on one of the computers on my network and begin to try to crack my servers as to attempt to bring it down or attack other computers on my network.
8. If you want to, bring in your laptop, set it up, run your program(s) on that, just don't connect it to my network. I don't know where it's been or how many viruses it has, etc, I can't trust you since I don't know you.
9. I expect you to obey any AUP (Acceptable Usage Policy) or TOS (Terms Of Service) documents set forth by the library. Every library has one or more, if any library staff see you breaking it, they have the right to issue a ban for your usage of my systems and they would be fully backed by my department since I would take the word of a fellow staff member of the library over a public citizen who I don't know.
</scenario> (End Scenario)
Now, don't get me wrong, in my current (paid) job, I am a mostly benevolent system operator as am I with my other (volenteer) job, as a system administrator, I will help users in need, however, if you were to do something stupid on the systems I run/operate and claimed what you do on these forums ("I'm a common man, I shouldn't have to know that"), I would have you banned from using my systems faster than you could logoff.
Spectate, I know you'll never reply my post in whole since it doesn't suit you, but it's here for the record (I was bored).
@upsidedowncreature said:
@boomzilla said:
Clearly the best solution is to randomly display each day, and the user can just hit enter to go to the next one. It should be really fast. I'll put up a video to demonstrate.
Justr make sure. Its large. SCROLLING text. Scrolling scrolling scrolling. Jam it.
Better yet:
@SpectateSwamp said:
You don't skim good Spaghetti Code. You follow a thread through. Activate a couple of the display lines and jam it. Use the context search to find where the cmd() elements are used. Another lesson is in store. Teaching you all "Sphagetti Coding 101 - the Lost Art"
You'll find working with this program very interesting.
<font size="20">WTF?!</font>
Sphagetti Code != Good code.
Sphagetti Code = HORRID code
@SpectateSwamp said:
I don't like Source Forge software. Just took another look at CVS this morning. That's not sharing. More like source hording. I'd sooner waste my time testing the changes and demoing other Swamp capabilities. And the source.txt is available anyway. That's enough. I checked some of the other search engine projects. Nobody seems to have any helpers. What's the point.
From my point of view, you're the lazy one who has no willingness to get out of his own little shell as to do what the rest of the 'computing community' does, EVOLVE AND INNOVATE. You're still stuck in your 1970's way of thinking and refuse to evolve from anything beyond a video camera and your project because you think you already know everything there is to know.
But, Oh right, you're just a "common man" who shouldn't have to know anything.. Then get out. The role of technology is to evolve, expand, get better. innovate not just be stuck in one way of thinking because "the masses" don't need anything else.
This is no longer just about your project, you made it personal with each and every one of us by slapping us in the face when we offered to help (albeit on our own terms), repetively calling us lazy when we refuse to co-operate with your every whim, then telling us you don't want to do anything because it's "too hard" or "the common man shouldn't have to know this".
And personally, your project seems to be a hobby that you coded just to get fame, and you got the spotlight. You're not making very good use of it.
@MasterPlanSoftware said:
@DaveK said:
Please. Don't make us have to do the "Here's your mug" thread all over again.
@bstorer said:
What, in the name of God (who clearly doesn't exist due to the simple fact that you do), is a greppler?!?
I think He's busy herding everybody into groups, he refers to his own as "Swampies", and those who use grep or simular tools "Grepplers" and such.
SpectateSwamp, I've been holding back on saying this to you but:
It's so-called programmers like you who think just because computers are fast that they have every right to use every single resource in sight that their program wants. Unless you're doing some graphics rendering or some complex computational task, there's no excuse to use anywhere near half of the processor just searching text.
I thought you worked on VAX systems, where resources were thin, if you truely did work on VAX systems, you'd have a concept of what I'm talking about and be actively working to optimize your program and reduce it's time it needs to be searching. This is why indexing was created, to reduce the time to wait for results, As computers' speeds grow, so do files. However, you should do your part and don't waste unnessasary CPU cycles.
SpectateSwamp, Since you aren't understanding the technological definition of "index":
By definition, an "Index" on a computer is simular to a Table of Contents of a book. it is designed to lookup content quickly based on keywords that are descriptive to that document or a group of documents. For example, in a book, one would look to the index to look for words descriptive to the topic matter they are looking for. Nobody would read the book front to back to look for the content that is at the very end of a book or section, And one would not look through the book for specific content if there is an index available. One would not look for the word "the" in a book, as that is irrelevant to the content matter they are searching for, but instead of doing that, they would look for one or two words UNIQUE To the subject they are looking for.
Would you search through an entire library of books when there is a catalogue telling you where in the library to go to find your book? Or would you consult the catalogue first, THEN go find your book?
Computer filesystems aren't much different than libraries, You just have to know how to use it competently, and from my point of view, as per my analogy. you have a few huge binders and are tearing the pages out of the perfectly good books (files) and holepunching them, then putting the pages into the binders in such a way that if either of the binders (the merged files) were to ever become damaged in a fire (file corruption), there would be more loss.
Now,ending the analogy,
I do wish you would get your head out of your 1970's ideals, they are suffocating your progress in technology, all you can think about is VAX this, VAX that, VAX the other, Telco systems this, Cableco that, sure, they exist to this day, but I can guarentee you that Telcos/Cablecos don't use VAX computers for data, as in current database formats, one can sort the customers by date joined, by name (first OR last), and have SELECTIVE results based on if the customer joined less than a year ago, without knowing the precise year. and have visually appealing results. (I doubt anyone who is a CSR (Customer Service Rep) would want to stare at a monochrome/text only screen all day)
(Radiation tag because you can't stay around this stuff too long)
@ammoQ said:
The 32K limit is for VARCHAR2 columns only. There are several LOB datatypes with much higher limits (currently the limits are much higher than the amount of storage you could ever buy).
TRWTF is using VARCHAR for page content.
Okay, your antics are annoying, SpectateSwamp, I'm going to make this post short as I can:
You claim your data format is "open" in fact it is NOT. It requires people to convert THEIR data to YOUR format before they can use YOUR Desktop Search application.
Just because one can run a string/text search on a file DOES NOT make it an "open format". Technically, YOU created a PROPRETARY format that NOBODY wants to use because people already have their data in formats THEY want.
I would like to ask you a question, SpectateSwamp:
If you were forced to umerge all of your text files, just because someone shoved an application in your face and performed no tests to your satisfaction, would you switch? Or would you continue to use SSDS?
(Everyone else: Appologies for the absurd bold/uppercase text, I just thought I needed to make certain words clear)
@SpectateSwamp said:
YaHoo FileSystems have been defeated.
[b]Yahoo is not a filesystem. Google is not a filesystem. SSDS is not a filesystem[/b]
FAT 12/16/32, NTFS, EXT2/EXT3, ReiserFS [b]THOSE[/b] are filesystems Until you can write filesystem drivers [b]Quit trying to replace filesystems - It isn't [u]any[/u] Desktop Search's job to replace filesystems, it is their job to SEARCH EXISTING FILESYSTEMS.[/b]
@SpectateSwamp said:
@MasterPlanSoftware said:
Thanks. I'll keep that in mind when taking down Google. If you want to secure sensitive data. With google put it 15,000 words in. 10,000 is such a small number.http://desktop.google.com/support/bin/answer.py?answer=12764&topic=201
I must say, 10,000 words is enough for me. I don't have text files bigger than that sitting around that I would have a lot of expectations of. This would only be an issue if you were a dumb shit that kept everything in one giant text file and didn't understand directories.
...Okay, that does it
Most people have something called "seperate files" -- unless you're writing an IMMENSE legal documentation on something that needs to be one document, I'm sure you can fit it within 10,000 words.
Now, before you say "What if someone's writing a book" -- here's what the authors I've seen do: They write each chapter (or even topic) in a file of it's own, and contain the whole book in it's own directory, i.e.
[/] Book Title (FOLDER/DIRECTORY)
|-[ ]Chapter 1.ext
|-[ ]Chapter 2.ext
|-[ ]Chapter 3.ext
`-[ ]Chapter 4.ext
(Note: Replace .ext with the filetype of your choice)
Besides, most people remember the general content/idea of what their first or second paragraphs contain and can search with keywords based on that. once found, the original file can be opened in it's original editor and they can search deeper into the document quickly (since it'll only be searching within the context of the single file)
However, due to your single-filed mindedness, SpectateSwamp, I doubt you'll understand/comprehend my post because you refuse to believe/accept anyone can have any more than 2-3 text document files on their computer.
Okay, you seem to be mis-understanding the rules, Swamp... I'll clarify the
as per (2) -> You must use the specified data files. this is to ensure fairness of the contest as to not give anyone an advantage in the situation. (Different files give different results). Also, these files provided give all different arrays of data as to ensure results aren't just repeated. Furthermore, it provides the best situation as before using your program, most people don't have their files merged. This displays how your program would be used by someone new to your progam.
as per (3) -> You must start recording the video upon having the files to be searched in front of you before you open your search. This is to ensure fairness as from the perspective to someone once again, new to your program.
as per (7) and (3) -> Your video must be readable so the results can be verified by a third party. (as so they can follow your video and do everything you did to ensure you didn't cheat, both sides will undergo this verification)
Deviation from these rules will display you are unwilling to prove yourself in a contest that will display who is the best in this whole thing, thus you will be forfeiting your last chance to display any credibility and you will be seen as a fraud who gives no proof in anything, who dodges everything.
Feel free to read, long post however,
@SpectateSwamp said:
Forget the fluff called an interface.
Without an interface, computers, their applications, etc are useless to the end users. Users need to be able to USE the program without having to learn whole new things. This is why computer interfaces haven't changed their functionality over the years other than getting more graphically appealing and overall getting easier to use.
Would you appreciate it if every time you upgraded your computer everything no longer worked the way you thought it once did?
@SpectateSwamp said:
Cutting and pasting 8 or 10 emails every week. Not a big deal at all.
How about those of us who get 100-1000+ emails a day from mailing lists and such who cannot set aside time to "Extract" stuff from the emails for your program?
@SpectateSwamp said:
Security is nuts in business. And a non issue for the common man.
Viruses, crackers, attackers, worms, trojans, spyware, exploits, Microsoft Windows Update, Anti-virus definitions, software updates, any of these ringing any bells?
@SpectateSwamp said:
Sorry I have used non indexing search since the mid 80's on very busy time sharing computers. It wasn't slow then on very large files. Search is even faster with the powerful pc's and much smaller files.
News: Files are not getting smaller, just the files YOU use are small doesn't mean that's the genereral consensus. Last time I checked, I had 9-12 GBytes of system logs on my servers (averaging 300 MBytes a day of plain text per log) -- For your standard computer user, they may not have huge text files, but they do have multi-gigabytes of multimedia (can you say over 250-500 GBytes nowadays?)
But on the count of "powerful pc's" - that's true, but the amount of data stored has also heavily escalated as I mentioned.
@SpectateSwamp said:
Somehow the math is wrong. Non indexing search hasn't been slow since the 80's. Much much faster now.
[b]Then provide us some solid figures and prove us wrong.[/b]
@SpectateSwamp said:
The code is very flexible. Make it do everything you want. You can do it.
Quit telling us to maintain your stuff, we have our own stuff to maintain.
@SpectateSwamp said:
Wasn't my idea to try putting the source there. What kind of open source that doesn't want the greatest program on the planet. Pure Crap. who are their competition. They must be doing well.
Sourceforge doesn't really compete with any other project sites, since open-source stuff is well, open, in fact, I've seen a project hosted both on Sourceforge AND other project hosting sites, I'll cite you why they probably threw your project out:
1. You act as if your project is 100% complete - Sourceforge is designed for those ongoing projects that are [u]centrally maintained[/u] (i.e. a group maintain it instead of everybody having their own version which isn't the point of open-source)
2. You think open-source is a method so you don't have to do any work yourself.
3. You aren't seriously maintaining the code yourself, you have created one version and are pushing it on everyone.
4. You act as if open-source is an arena where everybody competes in, this is false, in most cases, open source is a collaberative effort. Linux itself was brought together by MANY different teams of developers working centrally, just some broke off and developed their own distros as the other distros didn't fill the requirements well, however even here, they still offer alot of the same features and software.
@SpectateSwamp said:
I haven't printed anything in 4 or 5 years.
Doesn't mean you set the standards for the world.
@SpectateSwamp said:
You are right. Maybe I should be less demanding. Maybe not.
You are in no place to demand anything of us. If you want us to use the software, you should develop it to the specifications put forth by us. We won't use software we feel is inferior just because you say it's the best in the world. it has to be something we will want to use. This isn't a case of "can" we use it. Sure, we can, we know how, but will we? no.
Your product from what you've shown us only serves you and a small select few, it is not for those who want to get anything done. In order for anyone to understand your application, they have to come to you for special training, this is not what users want. users want to download a search application, install it, and INSTANTLY type in a search box their keyword(s). You are ignoring the fact that [b]nobody wants to compile a search index for your program just so that they can use your program.[/b] (you claim your application does NOT use a search index, however that big text file is indeed a search index).
You claim again and again a speed of 20,000,000 cpm or something like that - You haven't told us the specifications of the said machine, You have failed to give us benchmarks of different sized text files (i.e. how long the search takes for the whole file) You have stated random arbitrary numbers, i.e. "it'd take 15 seconds to search through linux source code" when a poster DISPLAYED how long it takes to search line by line the said source (a numeric something like 10 minutes)
You have showed unwillingness to adapt the program for the communities, you have failed to take people's comments into consideration stating your program is good as it is, even when the groups you're punting to are screaming that your program needs improvements. [b]Nobody wants to use a program by a developer/programmer who is smug and won't listen[/b] Developers must be willing to make the program to the quality that the clientel wants. Not what the developer wants. Your clientel are the communities you're developing it for in this case.
In my honest opinion, you have soleley made your program open source as so that whenever someone complains, you simply say "go reprogram it yourself, it's not fun to me" [b]If you have no intent to maintain your program actively [u]yourself[/u], stop pushing it to people.[/b] We're not going to maintain it for you despite the fact most of this community are programmers and/or developers, we're busy with other things. It's your project. your resposibility, if there's something wrong with it, it's your problem to fix. if you're unable to fix it, hire someone who can (obviously for a pricetag), if you can't find anyone to do it, [b]Let the project die[/b]
As countless people have said, and I wish to point it out again [b]Sharing is not security[/b] Spreading your data around multiple points is called "redundancy", Security is where you protect your data from unauthorized access, preventing attackers from reaching your confidential data, encrypting your data with a high security algorythim, etc. But in any case, [b]Sharing is not security[/b] it is in fact quite the oposite in alot of cases. Here's a scenario: Someone gets your email password because you saved it in a text file, they are able to send email as you, they damage your reputation by impersonating
Sure, your project may have been a "fun thing" for you to do, but seriously, you're pushing it worse than most salesmen. And when a salesman pushes a product too much, people are less likely to reconsider turning it down and to come back.
One last point:
[b]If you can't stand to program for today's world, don't program at all[/b] - we don't want 1970's code, we want code for 2008+
To everyone else: Apologies if my post is irratating.
Radioactive tag because like radiation, you can't stay around this sort of stuff too long.
SpectateSwamp:
Okay, here's some resounding points I wish to make regarding SwampSearch:
1. When someone is searching for something, they want ONE or TWO items, people don't want to be shown random multimedia from their hard disk, when someone searches for something, they want as I said, ONE or TWO results, then they would go off and work on that file with the appropreate software (possible video editing or opening their photo in Photoshop)
On this one point, I think you've been watching TV too long and think searching consists of flickering through media when that actually SLOWS DOWN searches. when I've developed benchmarking proglets, I've noticed that displaying what the search is doing precicely actually slows it down at least 10 times when if it were to be completely done behind the scenes, it would be that much faster
2. Regarding securrity: Like or nor not, people use computers for finances (online banking for example)
3. We are no longer in the ages of your old systems where search requires extensive typing of commands, we are in the day and age where search has one purpose, and one purpose alone: you type in your terms and get results WITHOUT prior work, where the search tool does ALL The work for the user, your tool has no facilitation and requires the user to do all the work in compiling that big text file.
Now, 2 questions, I want straight answers for:
1. If someone has a program they are required to use for work and CANNOT merge their files because that program they use for work would reject it, how would you suggest they proceed to use your tool?
2. Can your tool replace an Operating System and/or all the programs an operating system can run? (Yes or no - give me one of those two and you can proceed to explain yourself)
@operagost said:
@j6cubic said:
@PSWorx said:
Unrelated to the WTF, I voteYeah, it does have the right kind of ring to it... It goes well with Dark Shikari's followup babble, too:Your new adaptive quantization patch results in a corrupt stream when interlaced encoding is activated!for the Technobabble Sentence of the Week.
Last week on a Starfleet ship
Engineer: Captain! The Cardassians are jamming our transmissions to starbase 734!
Captain: Try interlaced encoding! They'll never suspect the first two macroblocks having zero context.
Engineer: But our adaptive quantization algorithms will result in a corrupt stream when interlaced encoding is activated!
Captain: Not if we use logarithmically-scaled variance-based complexity-masking adaptive quantization with Hadamard-weighted automatic sensitivity!
Engineer: That is madness! Using varianced-based complexity masking could cause a cascading failure in the scenecut detection matrix!
Captain: ...Remember when our techno-drama was still about things that go "boom" if we screw up?
Engineer: Well, if we screw up really hard we might damage a speaker on the starbase.
Captain: Do it so.That's "make it so." And Picard would rarely debate a technical problem with his crew; he would let them duke it out, then choose the best solution. He definitely wouldn't let Geordi call his solution "madness!"
It's a combination between Janeway and Picard.
@smxlong said:
Okay, but let each of you ask yourself this question:
"If I didn't have access to regular expressions, would my solution be any less fucked up than this one?"
It doesn't look so bad. You people are a bunch of wimps. There are plenty of shops where no regex library is available or allowed to be used. Regular expressions are great, because they prevent EXACTLY this kind of code from having to be written. But it sounds like if you people didn't have them you'd be downright fucked. This code isn't bad.
Then the shops are The Real WTF
@MasterPlanSoftware said:
@MarcB said:@belgariontheking said:Man, I never would have thought I would ever say this, but I miss SpectateSwamp. This thread just isn't the same without him.
COME BACK!!
Note that this post is in no way an endorsement of the crackhead's product.
Maybe he tried out my challenge and nuked Windows because it's not necessary once you have his desktop search.
Or someone at sourceforge.net decided to take evolution into their own hands and smite him, commando style.
Or he may be busy "preaching to the choir" so to speak over at SF.net about how open source should be done.
SpectateSwamp:
Some questions for you and your offering:
1. Can it search an entire hard disk of files? (files of which cannot be concatenated into one large file - such as legal documentation, files of different formats)
2. (Borrowing from someone else): Can it search using regular expressions? (Perl-compatible is better)
3. Since your tool doesn't have an index, can you give us some benchmarks on search speeds, CPU utilization and execution time on different types of searches?
4. Can it search through PDFs, PostScript, RTF documents and other formatted files? (I ask this as I wish to know if your tool can search though manuals in formats such as PDFs and other formatted documents that cannot be transformed into plaintext files such as PCFs which commonly have graphics).
Unfortunately, I don't have a Windows system with me to test your tool so I am unable to use it personally. (I use linux)
@mallard said:
[...] RAID for backups [...]
...
RAID is *DISK* redundancy, not *FILE* backup. What happens when you delete data from one disk on the RAID?
From my experience with RAIDs, I treat all the disks as if they were one and the same disk, merely mirrors of eachother.
To come to their defence (I know this is rare of me), but they are probably using a script to generate the pages and not have much control over content length of these pseudo-pages
@DaEagle said:
I remember working for an ISP and getting a call about someone's personal web site not working. We never usually supported personal web sites as they were provided at no charge, but eventually it was agreed that we would take a look at it for a small price. Well... the web site was produced by Publisher (97 version I'm guessing) and the code was god aweful. I still have nightmares of looking at that cryptic crap. It was no wonder the browsers couldn't render it.
I ended up running it through a copy of Dreamweaver which did a damn good job of cleaning up the code and restoring the site to a workable state. Dreamweaver did a great job of cleaning up html generated by crap WYSIWYG editors. Back when I used it, it used to be a great editor creating sane code with it's WYSIWYG editor and allowing you to edit it by hand if necessary. Not sure what it's like these days!
Eugh... Microsoft applications should be banned from even the utterance of exporting to html - MS Word is nearly just as bad - it implants 50-200 useless styles used NOWHERE in the document, Then you get empty font/span tags that sit around doing nothing but expanding the filesize, not only that, it adds inline styles that are used over and over in the document on nearly every paragraph that are nearly a line long in themselves.
My own WTF in this category: I once took a 1 MB (Yes, Megabyte) HTML page exported from MSWord (I had no choice since the file was originally written using MSWord), and de-fluffed it down to 100 KB (was a long table), took a good hour to get it reasonable since I didn't have any fancy tools around.
I generally have a typing style in which I use on both IM/IRC as I do on messageboards and mailing-lists, I flow my sentences as to force the reader to parse the data when I want them to. However, I don't go ape with this, I try to add pauses to allow readers to parse my posts correctly and have the data in their minds structured properly. If I want to pause a post to have the reader parse before I continue,
I generally use double-hyphens in the form of "--", that usually means relevant/important information is ahead and to parse before proceeding otherwise you may miss a point. I myself try to only use characters in posts that can be found on a standard QWERTY keyboard to prevent problems with character sets.
As for what I hate/can't stand in posts, here's some pet peeves of mine (I put up with them tentively):
- Abuse of apostrophies/commas
- Use of "magic quotes" or any other special characters in a medium that ends up breaking something (This one is to you, Microsoft)
- Walls of text that look like someone took an encyclopedia and removed all of the linebreaks
- Run-on sentences that don'r have any purpose of being run-on
- Abuse of punctuation (If you want to annoy me, post with "............" between your sentences)
- Those who use "u", "r" and "h8" instead of "you", "are" and "hate" (I will put up with it, but if you make your entire sentences while messaging me like this all the time, I may ask you to stop)
-- IM-style posting (posting a very short one-liner that has no content value does the community you're posting to no good, don't just write "I like it" -- State why you like whatever you're commenting on as well.)
- Long lead-ins (Get to the point of whatever you're posting about, don't dance around and make everyone feel like you're giving a long history lesson on the subject)
- Abuse of smilies (For the love of all that is good, don't post 4+ Smilies in ONE post, it makes you look like a twit)
- Too many levels of quotes then proceeding to bottom-post (We don't need to know what the person 6 posts back said to the OP in a 7 post thread, just quote one or two levels back already, people can read back into the thread if there's something they wish to see)
Now, this list may be long, However, don't think I'll bash your posting technique, just make sure your posts are READABLE and I more than likely leave you alone on the subject.
@Daniel15 said:
@Daniel15 said:@Thief^ said:@Amackera said:@Treeki said:Firefox messes up sometimes if I try to view the later posts in Page 1.Scrolling down real quick gave me a headache -but typing this reply seems to cause even greater headache, since every time I press a key, the window either jumps up to the start of previous post, or back down to the editbox - really weird.@ender said:
@PSWorx said:Number of HTML tags this document consists of: 9320@XIU said:Still working on 1920x1200@PSWorx said:Edgar the Eightball says: /me is stupid!@Treeki said:Join me on a scenic tour of The Quote Pyramid, housing ancient relics mentions of stuff like Lolcats and /me tests!@AI0867 said:I'd say it's broken already@RaspenJho said:I think it's building to a stack-overflow...@newfweiler said:Is this building to a punchline?@operagost said:Life is Paula Beans?@Cratig said:I'll join in as well for the fun of it, it's also a good test for CS - See if there is a limit on quote blocks! Scroll scroll scroll your bar, gently down the screen. Merrily merrily merrily merrily,...... erm... don't know how to finish it!@DaveK said:Reminds me of a Usenet Meow cascade!@XIU said:Good browser test :P@Zecc said:Come on! Stop it already!@Thief^ said:OMG it's gone mad.@Nandurius said:Good thing I just got a wide screen monitor. Looks fine here.@ammoQ said:I wonder if I should do something about that - isn't it my duty as a moderator to stop such an abuse?@Daniel15 said:I think we've just about blown it up - The innermost quote box is all squashed on my 1280x800 screen :P@Daniel15 said:The name after the / me changes to your name, rather than staying as mine (as it should - And does in SMF :))@viraptor said:Dunno - trying.@Daniel15 said:Nearly there, I guess. /me will throw a /me in just for fun (watch what happens when you quote it :P)@PsychoCoder said:We have to be getting close by now, right?@DaBookshah said:Are we there yet?@tster said:@PsychoCoder said:Well thats because we have an InifnitePost Syndrome going on here@SamuelDr said:The reply page looks really strange[quote user="joe.edwards@imaginuity.com"]@PsychoCoder said:It feels cool to have my post at the center of all this.@Veinor said:Well at the rate we're going it's not going to take long hehe@alostpacket said:well, the innermost quote box will eventually need to shrink to zero size.@Veinor said:soonish@halcyon said:I dunno.@PsychoCoder said:How long until it blows up, I wonder?@Tatiano said:Thats what I get for not scrolling down far enough (disregard my previous post)@Harsh said:@PSWorx said:heh heh@SamuelDr said:Yup@PSWorx said:Infinite quote project?@Amackera said:@PSWorx said:@Amackera said:[quote user="joe.edwards@imaginuity.com"]The Infinite Cat ProjectLolcats pales in comparison! s thisedit: Blah! Lost the quote. Readded it in edit.
The WTF'ery is strong with this one!
As I said earlier (but it seems to have been lost from the quote tree) it works perfectly in IE7. In Firefox the inner divs are outside their parents and the text overflows the quote box it's supposed to be in, but in IE7 it's all fine.
I can't believe IE7 wins at something.
@Morbii said:
Maybe I'm just not javascript-fluent enough, but I've seen this before in a (very bad) ex-coworker's js before:
<FONT face="Lucida Console"><script language="JavaScript" type="text/javascript">
<!--</FONT><FONT face="Lucida Console"></FONT>
<FONT face="Lucida Console">// enter js here<p<P <P="" <P="">
//-->
</script> <p <P="">What does the start and commented out end html comment do in js???<FONT </P="">
W3Schools wants to do away with anything local, and open things up to be more insecure and allow the internet to become a play into internal applications, Apparently W3Schools has little to no sense of "security of localized applications", as well as W3Schools wants to do away with other clients other than web browsers, Apparently they have tunnelvision and thinks the internet == HTTP only. As well as they don't seem to take into account compiled languages have the benefit of being optimized over scripted languages.
W3Schools have been tunnelvisiioned to Web 2.0+, they seem to know nothing more at this point.
Greetings all,
I am curious, (not for myself) is a university degree absolutely required nowadays (i.e. employers won't even call you in for an interview without one) for all tech jobs that involve any sort of actual non-sales related work? Or would experience and knowledge (as well as being strongly willed to learn new tasks) of how to do the work be better?
@ryos said:
The real WTF is the incoherency of this post. Every paragraph appears to be about something different, though I can't really tell for sure.Flukus, sorry to do this to you man, but if you're going to make fun of someone you ought to at least make some attempt at coherent writing. I hope you write code better than you write English.
I can't speak on behalf of the original poster, however, I wager that this post was written quickly as to get the point accross quickly, often on internet message boards, School-taught grammar goes out the window because how long in reality do topics last? 1-2 weeks tops? Who is going to take the time to make something that's only temporary look perfect?
Sure, I could see the "perfect as possible" expectation used if this post were to go on a site's front page. However, it is not.
I just was thinking the other day about all the abuse seen all over the place, the mis-use of protocols, the abuse/overuse of file formats, etc.
It spiked my curiousity as to what kind of amusing abuses are witnessed by people here? (post as many as you can recall)
@DaveK said:
@benryves said:
@Devil N said:
And as for .NET,
not only does it only run on Windows (how many platforms does that run
on?), nearly every version of the framework has been incompatible with
the previous versions, so that's really nice and standardized as
well.
Hmm, the CLI (common language infrastructure) has an ECMA standard dedicated to it (as does C#). So it is a standard.No,
actually, what happened is that ECMA lost their mandate and all moral
authority the moment they rubber-stamped a non-standard for political
reasons. And the ISO will be next if it fails to reject a
"standard" that attempts to redefine reality to match a bug in Excel's
date routines. (1900 was not a leap year, and any standard that said
it was is not a standard, by definition).
Agreed. Too many authoritative organizations and such are pressured into approving for lack of a better term: crap, therefore they end up looking like wealkings by the end of the day thus nobody takes them seriously at that point.
@MrBester said:
@rbowes said:At least it's just an error in the navigation. I'd be a lot more worried if it was an error in the funds transfer or something. Unless of course the error happened after adding the balance to the other account but before removing it from the first one.
And in terms of the OS, the ".asp" should have given it away. It's rather uncommon to see ASP running on anything other than Windows.
No, it's worse than that: It's a .NET error occuring in some C# code that is running [i]inside[/i] a Classic ASP page (unless they've been [i]really[/i] strange and put ASP.NET code in a .asp file and forced it through the .NET engine just so they don't have to change the links from the old system)
AHHHHHHHHH!!!!!!
My tags say it all...