vrek

joined 2 years ago
[โ€“] vrek@programming.dev 4 points 3 days ago

Personally I would prefer ham or bacon but I can deal with chicken...

[โ€“] vrek@programming.dev 2 points 1 week ago

Well if that's what you want it's in the wrong hole

[โ€“] vrek@programming.dev 7 points 1 week ago

That's actually really cool...

[โ€“] vrek@programming.dev 2 points 1 week ago

Ahh, ok yeah makes sense

[โ€“] vrek@programming.dev 2 points 1 week ago (2 children)

I don't recognize the name, what dud facepunch make?

[โ€“] vrek@programming.dev 3 points 1 week ago (1 children)

Yeah, my previous employer had shutdowns on the week of July 4th and Christmas so the production operators on contract(aka not paid for holidays) could volunteer to help in the counts.

I was curious if libraries have a similar system...

[โ€“] vrek@programming.dev 12 points 1 week ago* (last edited 1 week ago)

One time I was sick. I was stuck in the bathroom rotating between sitting and kneeling. I texted my team lead and said I couldn't come in and I was taking a sick day.

He responded by claiming I was lying and was not really sick. I responded with a picture of the toilet bowl after several rounds(unflushed).

He responded with "get well soon"

[โ€“] vrek@programming.dev 7 points 1 week ago* (last edited 1 week ago) (7 children)

Out of curiosity do you have a routine to periodically (annually, quarterly, I don't know) to re-arrange books put back in the wrong place?

I know they do it in warehouses to verify like "system says we have 500 of x but we have 495. System says we have 1100 of y but we have 1132" and they correct all the counts annually.

[โ€“] vrek@programming.dev 1 points 1 week ago (1 children)

Only reason I can think to do that is to "verify" the data in the pointer is not null/empty and is a valid int???

There are much better ways to do that but I can't think of any other intent the programmer had.

[โ€“] vrek@programming.dev 2 points 1 week ago

I saw a talk recently, I can find the video if you like but pretty sure it was the most recent ND conference, where they made the point that a lot of lack of efficiency in modern code is because of large companies. Basically in alot of cases it's more important to get a product out ASAP then to care if it was well done. Ok, a poorly written program may cost an extra $10,000 a month to run but if it earns them a million a month and saves 6 months of development time it pays for itself and they can eat the cost.

This seems like the case with renting vdis instead of fixing the program.

[โ€“] vrek@programming.dev 2 points 1 week ago

I believe so but I don't remember the exact encryption algorithm and don't have access to the code anymore.

This was the same place that had a 500 line file named glob_vars.cs which you can guess the content of because "passing around variables cause memory leak issues".

 

I'll give an example. At my previous company there was a program where you basically select a start date, select an end date, select the system and press a button and it reaches out to a database and pulls all the data following that matches those parameters. The horrors of this were 1. The queries were hard coded.

  1. They were stored in a configuration file, in xml format.

  2. The queries were not 1 entry. It was 4, a start, the part between start date and end date, the part between end date and system and then the end part. All of these were then concatenated in the program intermixed with variables.

  3. This was then sent to the server as pure sql, no orm.

  4. Here's my favorite part. You obviously don't want anyone modifying the configuration file so they encrypted it. Now I know what you're thinking at some point you probably will need to modify or add to the configuration so you store an unencrypted version in a secure location. Nope! The program had the ability to encrypt and decrypt but there were no visible buttons to access those functions. The program was written in winforms. You had to open the program in visual studio, manually expand the size of the window(locked size in regular use) and that shows the buttons. Now run the program in debug. Press the decrypt button. DO NOT EXIT THE PROGRAM! Edit the file in a text editor. Save file. Press the encrypt button. Copy the encrypted file to any other location on your computer. Close the program. Manually email the encrypted file to anybody using the file.

view more: next โ€บ