@hungrier said in In other news today...:
That moment when you realize you've brought a cock to a gunfight.
@hungrier said in In other news today...:
That moment when you realize you've brought a cock to a gunfight.
@topspin said in In other news today...:
@DogsB bring the law-suits!
We are aware of a bug in Chrome that is impacting how cookies are cleared on some first-party Google websites.
According to Cambridge dictionary, a bug is:
According to Merriam-Webster, a bug is:
Sounds like the statement is correct, in both major variants of English.
@Bulb said in Functional programming rah! OOP nah! Or how to know you're a zealot:
Which is the case of Jira too. It has a lot of features to cover everybody's workflow and everybody uses it slightly differently and that makes it too much of a mess.
This, plus extensible configurability...
In my previous job, our Head of Software Development had this story from some "Agile Conferences" he attended (as a speaker): people came up to him and asked
What's the tool you use for tickets? Looks nice, snappy and useful. We have just this <censored> JIRA and it sucks!
It's JIRA, actually.
What?? Our JIRA is different!
As a Head of Software Development, I spend third of my time working on the JIRA configuration so our developers don't have to waste time fighting it. What does your Head of Software Development do?
errr... Sitting on meetings, I guess?
@Gribnit said in In other news today...:
@dkf said in In other news today...:
@Bulb said in In other news today...:
most walls are sufficiently transparent
I live in a building with nearly zero penetration of wifi through walls, as they're all heavy brick and stone. Yes, even the internal dividing walls.
These buildings are called castles. Why do you live in a castle?
From hist posts, he works in on some advanced science stuff.
Mad scientists in UK are required, by law, to use a castle as their base of operations.
law also allows alpine fortress, but I suppose that is quite hard to pull off in UK (also, Brexit).
Apparently he was inspired by this clbuttic date calculation code:
public Date getTomorrowDate() {
Thread.sleep(24 * 3600 * 1000L);
return new Date();
}
So, what happens when you run docker build
twice with different sources, when the Dockerfile
files happen to have the same size and timestamp?
Well, the second run will of course use the Dockerfile
cached from the previous run! And the other files too, for a good measure (as long as their sizes and timestamps match).
And if you ask "what is the chance that the timestamp matches" then the answer is "quite high, actually" - it's quite common pattern that the CI/release build server builds several variants with just a slightly different Dockerfile
(usually different version of some crucial library, or some switch changed from true
to false
). And the timestamp is, of course, taken from the commit time of their last change (which is something like "changed maintainer email address").
Bonus points: The github issue marks this marked almost one year ago, but it's not part of any official docker release so far.
Extra bonus points if the difference between variants is actually important for security and you run production with a build that spews debug info to everyone. Luckily, I have dodged that bullet (the build actually failed in my case).
Yeah, the guys in The Netherlands and Poland conspired to switch my labels around.
To annoy some germans? That actually sounds plausible!
I usually imagine that the "years of experience" does not mean "real time spent working with that", but "amount of funny and wtf stories accumulated".
That's how javascript developers can accumulate centuries worth of experience. At least that's how I feel whenever I write something in javascript...
Well, to be honest, I've already had to explain few times that for people with background in EE, positive feedback is bad news.
@BernieTheBernie said in Scientific Science:
Now let's continue with Chemistry: forged crystal structures.
I might have just an introductory course to mechanical engineering behind my belt, but I am pretty sure that creating crystal structures is the whole point of forging.
@BernieTheBernie said in WTF Bites:
I was looking for an external hard drive of some 2 TB (as the oldest one with its 500 GB capacity is no more large enough for all the backups). Found some interestingly cheap offers on ebay, like
But it comes with a catch:
"Warnung: Diese Festplattenpartition kann nur das exFAT-Format verwenden (das Standard-NTFS-Format des Computers kann nicht verwendet werden, da sonst die Festplatte irreparabel beschädigt wird)."That is in short:
"Warning: Do not format with NTFS as this would damage the disk finally."Hm. I've read about thumb drives being offered with incredibly high capacity, which will just overwrite your data when the actually very small capacity is reached.
Do those guys try that now also with hard disks?
TLDR: Yes, apparently.
I have just read about it on some other forum - someone connected that disk directly to SATA and analyzed the dmesg (or, rather, asked other people to analyze that). Judging by the linux kernel messages and the last remnants of removed stickers, it is Hitachi 320GB with (very) custom firmware.
@xaade said in Advanced Trolly Logic:
You're armed with a gun and only one bullet, and you enter a gas station.
You see a man with a knife threatening another man. They're both behind the counter and claim to be the owner.
If you do nothing, the armed man will kill the unarmed man. If the surviving man was the criminal, they will also steal from the store, then attack you, and you shoot them. Either the criminal dies, or 2 people die but you survive.
You can also shoot and kill one of the men. If you shoot the armed man, but the unarmed man was the criminal, they will grab the knife and attack you, and you're now unarmed. Either you and the store owner survive, or only the criminal survives.
Oh, I see, it's a Hollywood version of the dilemma.
The answer is obvious: I shoot the gasoline tank, which immediately explodes in a huge fireball. As long as I am the protagonist, I survive by jumping out riding the fireball, while the honest owner of the establishment is saved by an ambulance, praising my heroic skills. In the case I am the antagonist, I survive and ride my (or stolen) car with evil grin. If I am neither, everyone dies and it's up to the real hero to revenge us.
@dkf said in Scientific Science:
@Gribnit said in Scientific Science:
@dkf well there's string theory...
A brave little theory, and actually quite coherent for a system of five or seven dimensions--if only we lived in one.
Academician Prokhor Zakharov, Now We Are Alone
The best quote from TBBT (at least for me):
Sheldon: Why would you do that? You're a string theorist as well.
Barry Kripke: Incorrect. I'm a string pragmatist. I say I'm going to prove something that can not be proved. I apply for grant money and then I spend it on liquor and broads.
And another story about plagiarism, this time from my undergrad years. The "Digital Electronics for Computer Science" course had a practical part with lots of measurements (including funny stuff like oscilloscopes, and less funny stuff with just voltmeters etc) and we had to write and submit "reports" (I am missing a lot of english terms here).
Let's see... ok, I know this one. I've seen this incorrectly indented paragraph three times already, just today.
(random other student) Uhm...
Well, the numbers look OK, graph is fine. Passed! But learn to work with Word, FFS.
Next!
(me): Here.
Let's see...
omg
wtf
Is that LaTeX?!??
Uhm, yes, why?
That must have took ages to write! So much work!
You know you can just download the reports from the shared drive? Everyone else does that!
....
If you can write a program to escalate privileges, get around the firewall whitelist and then escape the VM to do some actual damage send me a link.
That reminds me of my first real job. The IT created a restrictive policy, but in the end everyone had to get admin privileges because the Time Tracking application (built in-house) did not work without them.
is that the Time Tracking application was a website. One must like the smell of Internet Explorer in the morning.
@djls45 said in In other news today...:
@acrow said in In other news today...:
And beans... I want to keep my job and my marriage, so I can't really switch to all beans either.
Supposedly, boiling beans before using them in another dish (or just eating them by themselves) helps keep them from causing gassiness.
Does it work for Enterprise Java Beans too?
Asking for a friend.
So, NULL is false and 'X' marks the spot.
C/C++ programmer brain damage: At least they used false-y and true-y values.
NULL
is not always false-y; SQL standard uses "troolean" logic (true
/false
/null
)
I think this discussion missed the : NULL cannot be used by operators, including =
and NOT
. NULL=NULL
, NULL='X'
and NOT(NULL)
are all NULL
; using NULL
as a query parameter (WHERE flag=?
) does work in some DB/language combinations and does not in others. And then there's GROUP BY CUBE
and LEFT JOIN
where NULL
has two possible meanings and...
In short: using NULL
as false
is a failure of epic proportions, something that will continue breaking things in the future, in a new and funny ways.
@BernieTheBernie said in WTF Bites:
SAP wants to make their users to be programmers.
SAP.
Yes, really: SAP.The article talks about the usual shit, drag and drop programming, low code and no code.
Sounds like pipe dreams that already failed in the 90s, but then I think MS's business arm is also pushing this stuff and even my iPhone has a flow diagram lego editor in the form of the "Shortcuts" app now.But the really ironic part is that it's fucking SAP. Just like Oracle, aren't they known for selling software that requires an army of Highly Paid Consultants to program in their terrible programming language?
Of course, that's why it makes sense. Programming in their terrible Drag&Drop programming language will be even more soul-crushing and (hopefully) even straight-out cause insanity after prolonged exposure. This means that it will be even harder to find these consultants, so they will dictate even higher price.
Also, don't forget the theory that SAP is actually a front of Elder Gods cult. But they say the same about Oracle and IBM, so
95% of all microservices are just distributed monolith, but with slower memory.
@cvi said in Is it safe to use __SECRET_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED ?:
@Steve_The_Cynic Is this "private" thing that you mention a bit like using "__" in Python?
That reminds me when I wrote a plugin for ansible
and I needed some information which was private... in an object that was not passed to the plugin as an argument...
So I have iterated through the stack, found a method call that did have the correct argument and then extracted the information.
I suppose when it comes to foot guns, this is a howitzer.
More iPad app updating noticed. Update during night while idling, connected to charger and with wifi? Still nah. Update while the iPad is being actively used and on mobile data? Yes! And I checked the settings and downloading updates on mobile data is disabled. Good job, Apple...
Where could they possibly learn that? Reminds me of one incident...
It was in early oughts (2004 or something) and I was in remote location with some friends, connected by mobile data (not phone, but special network with special receiver, using the then-recently freed 450MHz band). And suddenly the connection became completely clogged. By packet-snooping, we quickly traced the culprit: my Windows XP box, downloading something big from Microsoft IP address.
All updates were, of course, completely disabled. Nothing was shown anywhere, no "Windows update is running" or anything; everything completely hidden, in background.
Out of curiosity, we let it run the whole download, to see what is this critical super-secret super-important update.
And after 6-7 hours, the download finished and installer window poped up.
Windows Media Player (the New And Shiny version).
Homebrew is a nice package manager in theory. The down-side is that it sometimes feels that everything you install downloads about 1 or 2 Linux distributions worth of dependencies first.
And sometimes it just downloads dependencies:
$ brew install cask => Installing dependencies for cask: coreutils, bdw-gc, m4, libtool, guile, libidn2, libtasn1, nettle, p11-kit, libevent, c-ares, jemalloc, libev, nghttp2, unbound, gnutls, jansson and emacs ... => Installing cask dependency: emacs ==> Pouring emacs--27.2.arm64_big_sur.bottle.tar.gz 🍺 /opt/homebrew/Cellar/emacs/27.2: 4,012 files, 104.3MB
What's the issue? EMACS is a completely fine OS, its only flaw being the lack of good text editor.
@Gąska said in WTF is happening with Windows 10? And nothing else:
@dkf I have huge hands and still find playing a bass difficult. Mostly because I never took any lessons.
Also, playing any fish is notoriously difficult.
Translations being hard is not a new thing. Old Windows (like 3.x) had a few instances of using the wrong word for the context it was used in.
The best one is in Windows XP, where you are able to manage and even remove "disk loudness". IIRC it was even present in several languages...
On the other hand, TBH, removing disk volume usually does make the disk quieter.
@Kamil-Podlesak said in WTF Bites:
@TwelveBaud said in WTF Bites:
For those wondering where Windows'
which
is, it'swhere
, which acts likewhich
and not likewhereis
, unless it's been bewitched by the Windows SDK, which installs awhere
that acts likewhereis
and awhich
that acts likewhich
.This needs some good old which hunt.
If it floats, it's a duck?
If it floats, it's time to get real and double down!
@topspin said in In other news today...:
Guys, this is not a drill!
I need my chocolate fix!
Trivia time!
Germany and Switzerland top the chocolate consumption chart both in Europe and in the whole world, at 9 ( ) and even 11 () kg pro person pro year.
For comparison, rice consumption is about 7kg/person/year. I don't know about you, but I find that hillarious.
Tip: next time when someone, in a discussion about integration of legacy system, tries to argue that "such a mess would not be possible in real life", show them this:
(sadly, no english source with good pictures... but no comment is necessary anyway).
@hungrier said in The Official Funny Stuff Thread™:
@DoctorJones On a similar note, one of the
client
s my company has made software for used [lastname][firstinitial] for their usernames, and I would sometimes joke that the whole thing could come crashing down if they ever hired Nathan Admi.
Actually, I have seen that happen, even with the same naming schema. The guy that broke it was named Josef Sysel and apparently in IBM DB2, any username starting with SYS is considered a system account. I think it did not grant him any privileges, it just failed with an error code.
So, he got his username changed to jsysel
(how anticlimatic...).
Speaking of MBA, I have an IT-related story. It's actually about reverse case: existing high-ranking manager of a major (energy) corporation has been doing MBA (presumably to award himself a raise). So he wrote a thesis... in Word... and the file got corrupted.
Obviously, he threw it at "IT department" to solve it.
The IT department had (as was usual in that era) two parts and each of them worked on the task their own way:
In the end, the Management (and, presumably, true MBA) solution proved superior: the Manager just tasked one of his minionssubordinates to write new thesis from scratch.
@boomzilla said in In other news today...:
@jinpa but look out for egg prices to maybe skyrocket like they have here.
Or even better: avoid buying mink eggs.
@Dragoon said in In other news today...:
Typhoons are usually an important source of precipitation but they didn’t deliver for Taiwan last year. Not a single typhoon made landfall in all of 2020.
Now that is one strict lockdown.
Wait, wrong thread...
@Tsaukpaetra said in WTF Bites:
Can I just take a moment and reflect on the retardedness of requiring HTTPS inside a VPN?
There's "trusted" and then there's trusted. For reference, we have to allow students inside our network (and yes, they can use a VPN to access our teaching resources from home) and I wouldn't trust them very far at all. After all, I remember what I was like as a student...
No one taught me the address of the DNS server does not go on the static IP assignment. I learned that all by myself!
Once I learned that lesson, I solved everyone's internet problems and they did not even realize it.
You know, certificate validation saved my ass once. Customer's application started to break with this error and after some investigation, we have found that the IP address from their DNS in their VPN in their AWS account actually pointed to some completely different, random AWS account. So, we were this close to sending fully valid admin JWT tokens to random dudes on the internet.
Of course, is how could something like that happen... but it's actually quite common kind of problems for that particular customer, the working theory is that they somehow got cursed by some powerful sorcerer. All their systems are just haunted.
@sebastian-galczynski said in WTF Bites:
@sebastian-galczynski
Wow.
Any, like, partitioning or fancy indexing involved?Nope. The only non-standard thing is that it runs in a container and the data dir is mounted. But that's just a mount --bind, shouldn't matter at all.
Unfortunately, I have already deleted the data, cause now I have a regression in the ORM which borked the whole production system. The maintainer 'fixed' something and now I have two units of work (with one working outside of explicit transaction) and it tries to double insert some shit.
Are you sure nobody added a "secret performance trick" they learned from stackoverflow?
SET session_replication_role = 'replica';
ALTER TABLE b DISABLE TRIGGER ALL;
@Dragoon said in In other news today...:
They should have had a strategic reserves.
You know, like Canada has (but of maple syrup, of course )
https://www.reuters.com/lifestyle/oddly-enough/quebec-unlocks-worlds-only-maple-syrup-strategic-reserve-keep-pancake-lovers-2021-12-07/
@sebastian-galczynski said in WTF Bites:
I was tasked with evaluating a new ORM. Can it be used in our project, what are the pros, cons, do we need to break stuff depending on existing schema etc.
I ported one database to this shit and almost recommended it (the only problem I noticed was somewhat rigid table naming in many-to-many relationships, but this can be worked around), but then I realized I forgot to do the most important thing when evaluating new tool:
google "$TOOL_X sucks"
Well, guess what: Prisma doesn't really support transactions. They call it "long-running transactions", but in reality that applies to any transaction with more than one explicit statement.
Many users would like to do transactions, but the lead dev, instead of implementing it, spends his time doing mental gymnastics to explain away the need for atomicity:This is not how modern scalable systems are built
Predictably, he has pronouns in bio.
Actually, the main point makes sense - if you're writing AWS lambda (or something similar), you should not use transactions. You should design your application in a way that it is not needed. Which might be , but hey - it can save you a lot of money.
So yes, it's OK for a specialty ORM.
is that they don't have balls to declare it as such upfront (with a big warning at the main page), and instead try selling it as a standard, universal ORM. And declare all limitations as "the modern way".
But then again, this is endemic in JavaScript world, where every hack is "the modern way"
@DogsB said in In other news today...:
I have no idea why they're looking at mice. Its not like there would be a shortage of willing percipients.
Yes, but it's easier to find laboratory mice that are sane before the experiment.
@topspin said in Tales from Coronavee-rooss Italy, mamma mia!:
@Zerosquare said in Tales from Coronavee-rooss Italy, mamma mia!:
Wuhan shuts down district of 1 million people over 4 Covid cases
I just glossed over the headline and read it as "Covid 4" cases.
Wake me up when we reach Covid XP
(I definitely don't want to catch Vista)
@Tsaukpaetra said in WTF Bites:
Status: What the hell is this possibly useful for?
In other words, three jacks that all connect to the same line.
Only one step back from the good old hub. Genius.
Would be nifty if you could at least use it for ethernet sniffing, but no …Hubs are half-duplex. This is, theoretically, full duplex.
This is also $14. A quick google returns 5-port ethernet switches as cheaply as €10.
Yes, but this one apparently has 0W power consumption. Think about the costs saved - especially these days!
@BernieTheBernie said in It has started:
I know some people who have solar panels on their roof, and feed all of that electricity into the public net - they cannot use any electron they generated in their own house.
time!
Electron in copper moves at the speed of whooping 2mm per second. This means that when the current direction changes 50 times per second, the electrons don't actually go anywhere.
All electrons you use in your own house are the ones already present there, ie strictly locally-sourced. No electrons from power plant ever reach any customer.
@Bulb said in In Log4J WTF news today…:
@Rhywden said in In Log4J WTF news today…:
At least that's what we're supposed to think: With properties and the code base we can finally understand what Java is doing. And that would be almost the case but JNDI is here to solve that problem: Directory Lookups!
That thing (most of Java, really) was clearly invented by some architecture astronaut that hated maintenance programmers to the marrow of his bones. Because this is maintenance programmer's worst nightmare.
It was actually designed by IBM.
I distinctly remember that when I tried to read something about J2EE in 1998-2000, it made absolutely no sense. Lots of very, very, very complicated solutions for... what exactly? It wasn't until 2006 when I first came into contact with IBM world, and then the epiphany came.
In short: the basic design principle behind J2EE is to force develops to solve all the problems they never had and never will have. But someone, somewhere, at some point in the multiverse, might have.
@Bulb said in Programming Memes Thread:
@Carnage said in Programming Memes Thread:
I have, and can, do the job of requirements gathering and writing, API specification and documentation and all that, but when that is explicitly forbidden because AGILE, then TDD will not fix the tire fire.
That's the hypocrisy of AGILE. It tells you you don't need to do requirements gathering and API specification and all that and then it tries to sneak it back on you with TDD.
There is no TDD in AGILE. This is actually one of the earliest criticism, by the proponents of EP (Extreme Programming): that "agile" is just EP without all the real engineering stuff. Take it as you want, I am personally not a fan of anything "extreme".
Also, it's not true that AGILE forbids requirements gathering. It just says that it does not need to be done in a formal bureaucratic manner and 100%, it just needs to be done "as necessary, in the most practical way". Why is that interpreted as "do nothing", is kinda mystery (well, not that big mystery).
Because tests without specification are pointless wanking.
TDD actually brings the idea that the tests are the specification. Of course, this brings the issue @DogsB posted:
Or when developers think they understand the requirements.
This isn't what I asked you to do.
It's got 100% coverage and I tested it myself.
It's still not what I asked you to do.
Funny thing, this is exactly the thing addressed by the most popular AGILE methodology, SCRUM. When this happens, the development just starts again, and this is repeated until the agrees that the result is good. (Also: it's important that everything is tested by someone else than the implementor, but that is actually not addressed by any methodology today...)
This is the most important crucial point and the very reason why these cycles ("sprints") exist. Yet, somehow, this is completely missed by pretty much everyone and in 99% of cases, companies "implement SCRUM" but refuse to ever throw away any work done. And in most cases, there is no such validation at all.
It's interesting that is comes from a lawyer. Just imagine people reacted like this.... "foreclosure ? "precedent? Habla Corpus!? That's just abusive. I hate them."
Obvious clickbait is obvious.
What are these "super hidden" files? Well, first of all they're not files. They're NTFS alternate data streams. Imagine being a Windows expert and not knowing about alternate data streams.
The title does not say anything about "Windows experts", just unspecified "experts" (could be cardiologists or plumbers).
@loopback0 said in Unit of Measurement WTF:
I can't believe nobody reacted yes, so let me : Myanmar/Burma does not use imperial system! It's just one of the three countries that haven't officially adopted metric.
They have their own units
@Carnage You mean gripe besides the fact it discards the stack trace (by not setting the inner exception), the fact it does a handful of unnecessary checks (the
int
/Integer
dichotomy is ugly in this regard) or the fact the added context does not look all that useful?
Not just stack trace; it also gets rid of the exception type and replaces it with the most common superclass, the Exception
- which pretty much enforces everyone else to use the "Pokemon Exception Handling" pattern
PS: the most common superclass is Throwable
, so the author definitely loses some points there.
@Zecc said in Programming Confessions Thread:
new DateTime(1998) // 1998 ticks past 0001-01-01
Man, such a number of ticks must suck
See above — there’s a complicated shuffle going on behind the scenes with
:
and/
so that Unix utilities work fine if you type /.The image above actually suggests that the kernel (which is a BSD unix kernel) uses
/
, otherwisetouch :
wouldn't create anything but just try to update mtime of root and most likely get a permission error. Which means it is the cocoa framework that somehow maps the characters in an attempt to make them equivalent.
This. As I've already said, I am using :
in filenames all the time without any problem... but I am using OS X as a UNIX. I have honestly never noticed that in Finder, those files really have /
replaced by :
- TIL
And, btw, it's not just the Blakey-repellentcommandline applications that work just fine. Multiplatform applications like Chorme, Firefox, anything in Java (Idea) are also completely fine with no quirks. Even Slack works just fine. Teams and Outlook don't, but
Edit: Omg, I have tried to attach a file with colon to a new email in Outlook and now I cannnot attach ANYTHING AT ALL. My Outlook is just broken. Great.
@DogsB said in In other news today...:
Nooooooooooooooo!!!!
I need some context: how is this newsworthy? From what I've seen on TV, this is just "Monday" in Alabama.
Also:
“People actually they drink this stuff, and then you know you can get lead poisoning. I have people that have died from lead poison because of drinking moonshine,” Rodgers said. “It’s not a healthy drink because it’s not manufactured the right way.”
Lead poisoning? How the hell do you get lead in a moonshine? In such a significant amount that lead poisoning is is apparently more likely than methanol poisoning?