[-] vrek@programming.dev 3 points 5 hours ago

I agreed with you and considered your opinions and life attitude great.. And then you said this

[-] vrek@programming.dev 1 points 1 day ago

Didn't I tell you tomorrow that time isn't linear?

[-] vrek@programming.dev 3 points 3 days ago

Ah, the real reason the boulder Colorado time server is down... Trying to make sure people are late to the protest

/s yes I know this would be nanoseconds at most but it's a joke

[-] vrek@programming.dev 6 points 3 days ago

Interesting question(don't mean any offense by it)... If you had transitioned already and he wrote your transitioned name... Would you transition back to avoid death?

[-] vrek@programming.dev 1 points 3 days ago

Possible but with no other evidence I would reserve judgemtof this man

[-] vrek@programming.dev -1 points 4 days ago

But it should be attached to his sleeve...

[-] vrek@programming.dev -1 points 4 days ago

Is it just me or does this look like a photoshop/Ai as the badge on his arm doesn't contour to his name like a sewn or iron-on badge would??

[-] vrek@programming.dev 10 points 4 days ago

Look... It's only 1030 am here. I should not be as drunk as that explanation would require to understand at this time of day.

[-] vrek@programming.dev 1 points 4 days ago

The world wars, to my limited understanding were really kicked off by a series of mutual defense alliances which pulled in a bunch of other countries. Is there anything like that for Venezuela?

[-] vrek@programming.dev 4 points 5 days ago

Yeah effectively using comments as psuedocode

[-] vrek@programming.dev 7 points 5 days ago

Proper comments describe why... For example say you are using an api which requires guids and your application doesn't care are collisions as much so just use int id's.

You could add in a comment like

// creating a guid to interface with special api.

But just saying

// generate guid

Means nothing, your method should be generate_guid() or GenerateGuid(). Your comment is repeating.

Or this is probably going to hit my last company at some point, there was a system to read a serial number. They also wanted a "status" on the screen to verify the system was connected and running properly but both these values came over same signal wire. Depending on your exact ms timing sometimes you would read the status as the serial number. Another programmer wrote a check to verify the serial number did not start with OK. The comment added was

// add on 11/15/23 by Initials

With no other details. The serial numbers were 8 numeric digits. Someone won't know the history and delete this seemingly useless check and cause a 10s of 1000s of dollars in loss

[-] vrek@programming.dev 1 points 6 days ago

You laugh, at my last job for certain stuff I had to program in windows 10 and word.

They didn't have source control so they did manual code reviews using the "track changes" feature in word.

The code reviews were pointless though as I was the only one who knew the language it was written in (g-code with proprietary additions by the system vendor)

69

What os? What ide? What plug-ins?

351

I'll give an example. At my previous company there was a program where you basically select a start date, select an end date, select the system and press a button and it reaches out to a database and pulls all the data following that matches those parameters. The horrors of this were 1. The queries were hard coded.

  1. They were stored in a configuration file, in xml format.

  2. The queries were not 1 entry. It was 4, a start, the part between start date and end date, the part between end date and system and then the end part. All of these were then concatenated in the program intermixed with variables.

  3. This was then sent to the server as pure sql, no orm.

  4. Here's my favorite part. You obviously don't want anyone modifying the configuration file so they encrypted it. Now I know what you're thinking at some point you probably will need to modify or add to the configuration so you store an unencrypted version in a secure location. Nope! The program had the ability to encrypt and decrypt but there were no visible buttons to access those functions. The program was written in winforms. You had to open the program in visual studio, manually expand the size of the window(locked size in regular use) and that shows the buttons. Now run the program in debug. Press the decrypt button. DO NOT EXIT THE PROGRAM! Edit the file in a text editor. Save file. Press the encrypt button. Copy the encrypted file to any other location on your computer. Close the program. Manually email the encrypted file to anybody using the file.

2

So background, my kid has seizures often. He is currently on 5 different medications to try to control it(plus 1 for sleeping and 1 for his liver enzymes) plus severe non verbal autism so he can't tell us if he already had his meds. Currently when it's medication time, it's always "did you give him his meds yet?" and we have no way of tracking how many seizures he actually has besides "alot more recently" or "it's gone down recently". Yes he had multiple doctors and this is NOT a post looking for health advice.

I am creating an app for phones(c# Maui) which will send json objects to a api to store/retrieve data in a database(when he last had medication x, when he has a seizure etc). It will probably only be used with in my family, maybe 20 entries a day on a really bad day(7 medications twice daily + 6 seizures to give a round number) but should be less then 10 transactions(most medications given at same time).

What's the cheapest/easiest was I can host something like this? I do not have a static ip. Yes it's health information but I'm only storing first names and tracking time of events, not too worried about hippa like security.

7

The only possible exceptions I can think of are fish(I imagine gills and mouth are not connected but don't really know). I am excluding bacteria and viruses and I believe they don't really breath(correct me if I'm wrong).

63
submitted 1 year ago by vrek@programming.dev to c/linux@lemmy.ml

I know there choice of distro is really meaningless as you can install almost any program on almost any distro. But I have been playing with kali which is for security people and pen testers. Is there a similar distro for programmers? Like a few ides installed some profiling tools some virtual environment tools etc?

98

They gotta go fast!

41
84
180
1

I don't know why this is a thing but if I tap the back of my pixel 6 three times in rapid succession it begins to play my audio book on audible.

From what I can tell audible has to be open but doesn't need to be the app on the screen(for example I can start and stop it while typing this post). Also the phone has to be "on" (meaning the screen is displaying but doesn't need to be unlocked.

Is this just my phone or dies it happen on other people's phone too?

view more: next ›

vrek

joined 2 years ago