@El_Heffe said:
There are 135 people registered here with "mike" in their user name.
Only 10 of them have made more than 1 post.
Only 2 of them have posted anything this year.
too much time on hands?
@El_Heffe said:
There are 135 people registered here with "mike" in their user name.
Only 10 of them have made more than 1 post.
Only 2 of them have posted anything this year.
too much time on hands?
Voice: Can I speak to programmer of this application?
Nagesh: Who's this?
Voice: This is the helpdesk. The user is facing a problem. I am at her desk right now.
Nagesh: What kind of problem?
User: nothing is working for me.
Nagesh: What do you mean? Is computer on?
User: Yes computer is on.
VOice: She is not able to use single-sign-on to login to order tracking website.
Nagesh: What has changed?
Voice: She changed her password today morning.
Nagesh: Ask her to use old password to login.
User: Yippee! That did it.
Nagesh: Thanks.
Ben L. Thank you for that valuable pieces of information. How do you make ravioli? I think you are missing that part here in this post.
@Ben L. said:
Here's what I did:
- Start downloading Ubuntu LiveCD
- Get bored and cancel the download
- Download 35MB "mini" ISO for network installation
- Find out I have no blank CDs and no CD writing software
sudo mv /home/ben/Downloads/mini.iso /boot
- Reboot and mount the ISO file as a drive from the bootloader (GRUB2)
- Write this post on my Chromebook while Ubuntu downloads and installs only what is needed
- Go eat ravioli.
Code mode has got me. It is3:57 AM and I am going to want home now.
How can I do it, if my encapsulation is severe levels deep?
My UI is having a Data Transfer Object that is serialized, passed to webservice, passed to a validation program and then passed to data access program. Here I am not having any parameters and using direct insert statementes. How can you inject me?
@Ben L. said:
@blakeyrat said:@Douglasac said:@akashram said:Yes windows run best on MAC.Because it's a nice clean install that no manufacturerMaybe I be the first to say: "woosh".
This entire quote tree is sound like Nagesh.
Now you're also talking like me only.
@PSWorx said:
Does any post in this thread have anything to do with it's predecessor?
Ooh, I get it! You're guys doing a markov chain with posts instead of words! That's pretty genius!
Every forum thread get derailed after a while. This is universal law. Staying on topic is never happening for any of threads in any of forums.
@Medezark said:
@Nagesh said:
@morbiuswilters said:
@Nagesh said:Yeah, because clearly the problem here was the requirement..@SalikChughtai said:
I asked a student to write a Function if Salary is greater than 10 thousand than give that employe a salary increment of 15%, 20% if greater than 20 thousand, 25% abv to 30000/-
He wrote ..(snip)
One line requirement will almost always give silly program to end user. You need to break down requirement and present test cases. Instead of repeat 4 times.
Yes. obvious problem is obvious!
I figured out what he wanted from the single line requirements, and I am an idiot.
You think you figured out, by making certain assumptions. You don't know if that is the correct client requirement. Also you've many years of experience under your stomach.
I am not expert on idiots, but human like to make assumption that is how
we are able to grasp concepts around us.
@morbiuswilters said:
@Nagesh said:@SalikChughtai said:
I asked a student to write a Function if Salary is greater than 10 thousand than give that employe a salary increment of 15%, 20% if greater than 20 thousand, 25% abv to 30000/-
He wrote ..(snip)
One line requirement will almost always give silly program to end user. You need to break down requirement and present test cases. Instead of repeat 4 times.
Yeah, because clearly the problem here was the requirement..
Yes. obvious problem is obvious!
@SalikChughtai said:
I asked a student to write a Function if Salary is greater than 10 thousand than give that employe a salary increment of 15%, 20% if greater than 20 thousand, 25% abv to 30000/-
He wrote ..(snip)
One line requirement will almost always give silly program to end user. You need to break down requirement and present test cases. Instead of repeat 4 times.
@Chame1eon said:
1. What would you consider a security warning sign when you are using a website?
if norton tells me that site is unsafe, then it is most likely that site is unsafe and no good.
@Chame1eon said:
2. Are there any common mistakes that you see users make that exposes them to lost information, identity theft or malware?
Not using of latest anti-virus internet security anti-malware stuff before browsing on internet.
@Chame1eon said:
3. What would make you think that a web site is likely a safe place for your sensitive data?
Trick question? Don't place sensitive data on internet.
@Chame1eon said:
5. what do you think is the easiest way to manage passwords?
rely on your brains unless you think they could be tricked. in that case, rely on diary. Keepass is also good option. Norton Internet security is also having place to store username and password.
@Chame1eon said:
6. Do you think about the general state of security and the internet?
State is lamentable.
@Chame1eon said:
7. Is there anything that you think users should know?
do not use same password on different sites. that will land you in trouble. sometime your wife will come to know of your bank account password and use it on your email. then she will know all that google knows about you. be afraid and very very afraid.
@morbiuswilters said:
@Nagesh said:You must have met all bad ones.Yes, as I said, I met Indian programmers.
If that is serious statement, you need to cure your prejudice. If it is funny, I am not seeing a joke.
@morbiuswilters said:
@Nagesh said:We all pass them with flying colours.I've met Indian programmers, and you're right. Assuming "pass" is an artful euphemism for taking a shit.
You're pulling my leg. You must have met all bad ones.
@mott555 said:
Those who can program, do. Those who can't, teach.
I'll never get over the intern-candidate I interviewed a couple years ago. Part of our interview process involved a programming test. I gave him his choice of programming language and IDE and all he had to do was parse a small CSV file and do a little bit of manipulation to it. My C# version was about 30 lines and that included whitespace and comments. This guy I interviewed had a B.S. in Computer Science and was working towards a master's in Applied Computer Science, was a Java TA for two years, and had a 4.0 GPA. I had to kick him out after an hour (the ones who can program usually finished this task in 10 - 15 minutes) and when I reviewed his work all he had was about 20 different Java projects in his NetBeans workspace, none of which would even compile. Each one had a few different typo'd lines of code and none of it even approached the task at hand. And Java/NetBeans was his first choice because that was what he supposedly taught as a TA!
These kind of tests are being done in indian companies also. We all pass them with flying colours.
@SEMI-HYBRID code said:
@Lorne Kates said:Let's argue about date formats!YYYY-MM-DD HHss 2013-06-06 20:02:30
any other format inevitably and intrinsically makes less sense (within the context of this planet). end of discussion.
ISO format is most easy to understand and explain.
I am more superior with the dd/mm/yyyy format which is used in leading country like India.
@boomzilla said:
I feel your pain. I've been rooting out copypasta in our code base for several years. There are still some places that would make you cry, but it's a lot better now. Well, I think it's a lot better now. Maybe I should look into this tool to see how bad it is.
Copy paste is style of coding and it become much simpler to follow convention over configuration. That is basic philosophy of all ruby development.
@lucas said:
That link isn't on codeplex is it? I was talking about NewtonSoft's JSON library for .NET
Yes, that is beast and used a lot for developers working with FQL
@boomzilla said:
@joe.edwards said:@morbiuswilters said:@Nagesh said:My college is currently writing code to make conversion of "XML" to "JSON" using sql server stored procedure. I will tell you how it goes.Holy shit.
You could do this in 15 minutes. Write a thin .NET class library that wraps the framework JSON code, import that into SQL Server as an assembly, then import the methods as functions/stored procedures.
That feels like cheating. And wholly beyond the imagination of Nagesh's colleague.
Agreed. I explain that use of CLR is easy, but our team struggle a lot due to overzeal of infrastructure team. So now Phil Factor is our man.
My colleague already writing him mail and he will reply soon, we hope.
@snoofle said:
My home desktop is slowly giving signs that it's going to die in the (presumably) near future.
I've been looking at various places that'll build you a pc to your liking; I'm sort of on the fence between iBuyPower and Falcon-nw (FragBox, loaded). I won't be using it for gaming, but gaming rigs tend to have the most power/capacity/...
Given comparable parts, their prices aren't far apart. Falcon's reputation seems quite good, but everyone seems to agree you'll wait a bit for them to email you back should you need service.
Does anyone have a preference/warning about either, and if so, why?
Thanks...
My suggestion is to get a friend and build it. The satisfaction you get from building your own is much more. It is like difference between self-breeding and adoption.
You're clear having lot of time on your hand. Why don't you help me with writing CTe query in SQL-Server?
@morbiuswilters said:
@Nagesh said:My college is currently writing code to make conversion of "XML" to "JSON" using sql server stored procedure. I will tell you how it goes.Holy shit.
This person "Phil Factor" has already done it in 2010, so my friend will need variance of this very same procedure.
VARCHAR(30) is default username length allowing by oracle database.
Go look it up here.
Schema Object Naming Rules Every database object has a name. In a SQL statement, you represent the name of an object with a quoted identifier or a nonquoted identifier. A quoted identifier begins and ends with double quotation marks ("). If you name a schema object using a quoted identifier, then you must use the double quotation marks whenever you refer to that object. A nonquoted identifier is not surrounded by any punctuation. You can use either quoted or nonquoted identifiers to name any database object. However, database names, global database names, and database link names are always case insensitive and are stored as uppercase. If you specify such names as quoted identifiers, then the quotation marks are silently ignored. Please refer to CREATE USER for additional rules for naming users and passwords. The following list of rules applies to both quoted and nonquoted identifiers unless otherwise indicated: Names must be from 1 to 30 bytes long with these exceptions: Names of databases are limited to 8 bytes. Names of database links can be as long as 128 bytes. If an identifier includes multiple parts separated by periods, then each attribute can be up to 30 bytes long. Each period separator, as well as any surrounding double quotation marks, counts as one byte. For example, suppose you identify a column like this: "schema"."table"."column" The schema name can be 30 bytes, the table name can by 30 bytes, and the column name can be 30 bytes. Each of the quotation marks and periods is a single-byte character, so the total length of the identifier in this example can be up to 98 bytes.
SQL Server or Oracle (though a lot of ppl on forum dislike it) can do most thing that your average programming language can.
There is reason to dislike SQL that is mostly F-U-D (fear / uncertainty and doubt). Another thing I mention is that SQL is not most efficiency way to do things. Some things can be done very quickly and some thing are slow.
My college is currently writing code to make conversion of "XML" to "JSON" using sql server stored procedure. I will tell you how it goes.
@mott555 said:
I finally found an answer to this question: Craigslist. I've never used them before, but I think I'll have several leads from there.
All this overflowing of live is great, but let us get back on topic now.
Very simple. Think with a mind of one human child.
1) repalce wall with wire fences so human can see outside fence.
OR.
2) add windows to walls. windows work wonders.
I am qualified map designer for salesforce.
@PSWorx said:
You don't quit crack just because your dealer is an asshole either, after all.
Is this from your personal experience as a delaer or addict?
birdget99,
are you person of india origin by any chance?
@blakeyrat said:
@Nagesh said:Then clever thing is to write an app version of feedly, not go around trying build wheel, that will make you feel like Superman in your mind!That's what this thread is about, buddy. I'm way ahead of you.
Feeling like Superman would be huge, considering I usually just feel like Aquaman.
@Nagesh said:
Filed under: superman is not real.Fuck! I'll stick with Aquaman then.
there is one good thing about aquaman. he will never have to look for public toilet (sulabh shauchalya)
@blakeyrat said:
@morbiuswilters said:I just assumed Silverlight wouldn't bubble clicks out to the normal DOM.Why wouldn't it? Even Flash manages that, and Flash is a complete piece of shit.
are you plain retard or just act like that on internet? flash is good.
@blakeyrat said:
@Nagesh said:Go take look at Feedly. I am using for past 1 year and it is better and goodier than google reader.I have heard of it. I rejected it because it doesn't work on my phone. It doesn't work on my phone because it's not a web app. Which is fucking stupid.
Then clever thing is to write an app version of feedly, not go around trying build wheel, that will make you feel like Superman in your mind!
@blakeyrat said:
Well since I haven't found a Google Reader clone I like (or even one that behaves even vaguely like Google Reader itself), it's demonstrably not a solved problem.New thread rule: no more linking to vaguely-defined, Linux-only bullshit. The dev machine runs Windows 7. The software must run on Windows 7. This is a requirement.
Go take look at Feedly. I am using for past 1 year and it is better and goodier than google reader.
@drurowin said:
Seriously, what is wrong with these forums? I've been working in a mixed C#/Common Lisp shop for a while, and this is just worse than even our homegrown ticketing system someone wrote in ASP.Net in a drunken evening. Is there a bug tracker I can submit problems with the site to, or perhaps submit my assistance for porting the forums to something... functional? I've been working on writing a forums package using Clack and Caveman for Lisp; would that be useful to anyone?
You are not knowing HTML, stupid lion?
@Medezark said:
@Nagesh said:
@eViLegion said:...so I could punch it in the face.i will give you good book to read, so you don't hate oracle that much again.
If you have a book that will make people not hate oracle, that's a damned good book! Is the ink used to print the book a contact hallucinogen or something?
it is authored by Thomas Kyte, one of my personal gurus on the internet.,
@PJH said:
And the WTF is...?
Not having used SkyDrive, I'm unsure if this is a spam attempt by the current user of the Nagesh account, or a hand-wavey attempt to point out some obscure problem with the site in question.
@Medezark said:
@locallunatic said:
@Nagesh said:
So if you're connected using remote desktop or terminal server session, I want to know what is the real computer you're using. My user in New York city is using a terminal server in Las Vegas, but I want to know the ip of his NY computer, not the IP of the terminal server in Las Vegas.If what they are using is set up properly you can't. In theory you might be able to infect the machine visting your website with malware that then tells if someone is connected to it remotely and then report back.
Only by having the remote desktop report it's client's IP address back to the web application will you be able to determine this. And if you don't have access to the RDP server you are out of luck.
Can you show how remote desktop can report the client's IP to the web app? I want to talk to the infrastrcutre team over there in Los Vegas
@eViLegion said:
...so I could punch it in the face.
i will give you good book to read, so you don't hate oracle that much again.
@Medezark said:
I assume you're trying to identify the Client IP used to connect to an RDP server, where the RDP server session is then connecting to a web application?
You would have to run something on the RDP server and then pass that information backTry these power shell scripts:
http://gallery.technet.microsoft.com/scriptcenter/e8c3af96-db10-45b0-88e3-328f087a8700
When you import the module you should be able to get the client ip address using the code below or something equivalent;
$id = get-rdsession | where {$_.user -eq $env:USERNAME} | foreach {$_.SessionID} $ipAddress = get-rdsessionstatus -sessionid $Id | foreach {$_.ClientAddress}
I am trying this on website. Some user are clever to hide behind remote desktop.
So if you're connected using remote desktop or terminal server session, I want to know what is the real computer you're using.
My user in New York city is using a terminal server in Las Vegas, but I want to know the ip of his NY computer, not the IP of the terminal server in Las Vegas.
I hope by giving above example, I have made me clearer than before.
and as my luck is, I fond this link. -> https://app.mover.io/
@blakeyrat said:
Sorry I can't help you.I know that I've *tried* to understand OAuth, really I've tried, but it won't fit into my brain.
Am sure it will fit in my brain, but I need someone to draw one picture really. Not the silly picture you get by googleing. Draw a real picture that will make some sense.
@Alex Papadimoulis said:
I think I figured it out. It's a CYA framework.
"This software is beyond worthless, why does it overlay a picture of a giant orange... dildo?... when I'm trying to type in something?"
"Actually, that's a carrot, and it was in the requirements."
"Caret, you fuckwit. You know, that upside-down V symbol? Not the vegetable."
"Well... it's already passed acceptance testing, so enjoy!"
Alex,
If quickly a project is to be rolled out, get business user and developer in one single room and don't make them leave the room unless
a)one of them has killed the other.
b)both of them have agreed to requirement and project is complete.
This is Nagesh methodology of Agile programming
Do you have a database refresh schedule? We have six times a year! We make copy of client's production box and put that copy in our local database. That way we get access to latest and greatest.
@ekolis said:
@Nagesh said:Check "Give Me My Data" app on facebook.Generate some chart from it and you'll be knowledged as company's hero.
Especially if you find a way to trick users into submitting their downloaded Facebook data to your app, which then monetizes the crap out of it
Do you believe givemydata app is doing that same thing?
What is logic of OAuth tokens? How can token know what privs user is having on the website?
where can i find detail on how to impelment oAuth on my website.
my website have 3 sections.
@Douglasac said:
@blakeyrat said:But I got a better screen and CPU in a thinner case for less money from ACER.Acer hardware tends to be terrible. If it doesn't fail within 6 months, consider yourself lucky.
Hey don't you have other party warranty companies in US of A or whatever country you're posting from?
@serguey123 said:
@Nagesh said:Apple may not be owning factory to make hardware like samsung does, but it lay down specification of device that carry its logo.
It control design, it test product produced from factory and pass QA etc.
True
@Nagesh said:So your comment is false.
No, you didn't use the word "make" there because they don't do it. They don't manufacture hardware, a third party does it for them
@Nagesh said:So your comment is false.
Not unless "make" means something different from you
@Nagesh said:Again in Company Law we learn that company is a separate entity, so if you think on that line, remember that employee who work for company make hardware. the company only empower the employee to do that.
Unless that employee is called Apple then is settled
You are not getting point I am making, but nice trick to drawing me in argument. :-)
@blakeyrat said:
Not a bad idea, I never heard of that before.
You can have data in different formats, XML, JSON, CSV, PLAIN TEXT.
Quick and dirty!
If you write to author, he will provide source code also.
@serguey123 said:
Apple doesn't make hardware.
This is untrue comment. Apple may not be owning factory to make hardware like samsung does, but it lay down specification of device that carry its logo.
It control design, it test product produced from factory and pass QA etc. So your comment is false.
Again in Company Law we learn that company is a separate entity, so if you think on that line, remember that employee who work for company make hardware. the company only empower the employee to do that.