Your neighbor is the joke. (real answer: the sticker implies a cop would find being called gay very offensive, to the point of not pulling this person over. In reality the cop would likely just shoot you and say you were evading arrest or something while pissing on your corpse.)
Yes, that was the first that came to my mind when I saw the TIL post… which also was why I felt the need to see if that rant is still valid, or if modern libraries could handle that.
And then you get a call from a Swedish Wikipedia editor and they say:
February 30 was a day that happened in Sweden, 1712.[4] This occurred because, instead of changing from the Julian calendar to the Gregorian calendar by omitting a block of consecutive days, as had been done in other countries, the Swedish Empire planned to change gradually by omitting all leap days from 1700 to 1740, inclusive. Although the leap day was omitted in February 1700, the Great Northern War began later that year, diverting the attention of the Swedes from their calendar so that they did not omit leap days on the next two occasions; 1704 and 1708 remained leap years.[5]
To avoid confusion and further mistakes, the Julian calendar was restored in 1712 by adding an extra leap day, thus giving that year the only known actual use of February 30 in a calendar. That day corresponded to February 29 in the Julian calendar and to March 11 in the Gregorian calendar.[5][6] The Swedish conversion to the Gregorian calendar was finally accomplished in 1753, when February 17 was followed by March 1.[5]
The rules for driving demand to keep at least enough distance to the vehicle before you, that you can safely perform an emergency break, if the vehicle should do so too.
In driving ed i learned that you need to keep at least 2seconds distance to the car in front of you, one second to react and one second to perform a similiar break maneuver like them. If your vehicle is heavier you need to increase that distance.
Whenever i drove like this the only result was people taking it as an invitation to swear in between the car in front of me and me. I want undercover cops in plain cars to just drive and record everyone violating the safe distance or takeing the space that is left as safe distance. We could resolve muncipal debt and drop the amount of deadly accidents by at least 50% this way.
Cops can’t solve bad driving. Fear of punishment is not an effective deterrent. We know this because we’ve done the psychology and looked at the numbers. Unsafe driving is an infrastructure problem. In my country, people leave enough space between cars. It’s not because we have more police than yours, it’s because we have safer designed roads. Every traffic accident that causes a death is an infrastructure failure.
Germany often sees reckless driving compared to its neighbouring countries in similair road conditions. Lack of enforcement and small penalties do play an imporant role in that. The infrastructure is similiar, but other countries actually enforce things like speed limits much more actively. At the end of the day if bad driving equals unsafe driving, the person shouldnt drive.
Canada used to recommend 1 car-length for every 10 miles per hour. Along with metrification, that was changed to 2 seconds, but it’s been set at 3 seconds for a long time.
I’ve yet to drive in traffic where even 1.5 seconds is manageable. More space than that and some slips into the gap, even if that leaves something like a loaded tractor-trailer hanging a second off their rear bumper.
This has the way. A god strategy to minimize the probability of an accident is to never move at all. Someone else might still hit you though, but that’s their fault.
I’ve love to watch a realistic hacker movie, because the shit that hackers get into is genuinely bonkers. For example, some white hats got all the way into Apple’s inventory system and IIRC they could’ve disrupted all of Apple’s logistics. Imagine if a black hat got into that. Or the Ukrainian hackers that got into the taxation system of the Russians and were there for a few months. Or the USAians who got into the biggest Belgian telecom and were kicked out years later by a Dutch security company.
Movies or even better TV series showing the time it takes to get into such systems would be amazing. Day 1 phishing, day 40 established beachhead, day 120 gained access to internal system X, day 121 triggered internal alarm and was nearly discovered but was able to cover up traces, etc.
Nobody watches 90 minutes of football matches. Everyone watches the highlights and that’s what movies could be too.
I’m pretty sure they’re talking association football. Gridiron football “matches” (which are called games in the US) are 60 minutes of clock-on time but more than 2 hours if you count all the ad breaks and clock-stopped time. The 90 minute figure only makes sense for association football. And yes, it’s at least a billion people watching them every week.
oh and the ads run into playtime, so once the commercials are done, they give you a 30 second recap of what you missed, then back to commercials because the coach called a time out
I’ve been to an NFL game twice, and it’s so much worse in person. At home at least the ad breaks are a chance to go to the bathroom or get a snack. At the game it’s not worth getting out of your seat and trudging up to the concourse because 2 minutes isn’t long enough for that. So, instead, you sit and wait for the action to resume.
It also makes it more clear that a lot of the long timeouts are purely TV-based.
There are plenty of time-outs that have to do with the state of the game: teams calling time-outs to discuss a plan, a time-out after a point is scored while the sides change, the 2-minute warning, the break after the 1st and 3rd quarters, and so-on. But, you also get explicit TV timeouts that are called by the TV networks when it’s been too long since the last commercial.
In the stadium when that happens the offense might be in a flow, and the defense may be wobbling. But, the TV networks need to show their ads, so the network calls a timeout. Meanwhile, the players just stand around on the field, ready for the next play until the https://en.wikipedia.org/wiki/Television_timeout#/media/File:NFL_Sideline_Television_Coordinators.jpg lowers his bright orange glove.
One of the funnier ones is that the matrix actually did hacking right. It was also so quick you don’t notice it.
When Trinity hacks into the power station, it’s legit. She checks the software version, which shows an out of date version. She then uses a known flaw in that version to reset the password.
It’s the only bit of actual hacking in the movie. They obviously knew that geeks would be checking it frame by frame, so they actually did their homework on it.
Hackers shows “real hacking” in the form of social engineering, dumpster diving for passwords, as well as the bit about the pay phones that, once was true if maybe not by the time the movie came out.
Hacking is really a “montage” type activity, but is treated as something you can show in real time.
Like, imagine the A-Team building some weapon out of spare parts but you had to watch the entire build process including measuring, cutting, screwing up the cut, throwing away the part and trying again…
Or, imagine a martial arts film where the hero trains for the big fight… and you include the entire training regimen, showing them getting up at 6am each day to do sit-ups, then following the entire morning run…
Really a hacking sequence should have those zoomed-in calendars with days flipping by and getting crossed out.
If they really need the hack to be in the critical path of the action, it should only be something like:
Boss: We need to hack the satellite!
Hacker: What model is it?
Boss: It’s a… let me see… KU-STRZ-4 out of Azerbaijan.
Hacker: A 4-series? We’re in luck, NSA’s been sitting on a exploit for that model.
Otherwise it’s as stupid as:
Boss: We need to defeat Scar Killer in the Kumite tomorrow.
Soldier: I did some basic unarmed combat in boot camp, but…
Boss: You have 24 hours, get training!
Next day, the soldier is massively jacked and is throwing flip kicks etc.
No, I have an outline for a PERFECT realistic hacker movie that would put asses in seats. Basically, make it The Life And Times Of Deviant Ollam.
Imagine a slightly farcical take on a heist movie, like take on Ocean’s Eleven with True Lies’ attitude. It’s kind of a heist movie, except the infiltrating crew has permission to be there from upper management, but no one else in the building knows this, and the stakes of getting caught are they get to tell their client their security is in fact pretty good. So since the stakes are non-existent, you can lean into the lulz a little bit. You have room for eccentric characters, witty dialog, a running gag of how hilariously bad door locks are, and an ending sequence where you’ve got a guy in the security room trying not to laugh as he texts the team leader “Just see what you can get away with.” And then some of the team is deliberately silly, acting like rebellious teenagers on bikes in the parking lot chased by half the security team, wackiness ensues, intercut with the rest of the team breaking into server rooms and just taking over this company.
You can have the gearing up scene explaining what the gadgetry is. “This is an ESP key; it’s a microcontroller with an onboard SD card and Wi-Fi, that we plug into the data wires on one of your badge readers. How do we get it in there? Send two guys wearing high vis vests, one of them carrying a clipboard and watching the other, no one asks a thing. Yeah, there’s a tamper alarm that alerts the security guards if anyone opens the reader…I’ve never seen it hooked up. Now we get a list of every badge used on this reader, and when. See this guy who’s badging in like clockwork every 45 minutes? That’s a guard. And the ESP key isn’t only listening, it can also talk. We can make it send a credential as if the reader did, and unlock this door remotely. Tiffany has two RFID implants, one in each hand. We’ve cloned two different credentials to the chips in her hands, so she can walk up, present her hand to the reader, and it opens, thinking the guard just badged in. She’s carrying a bash bunny; which looks like a USB thumb drive, with a couple switches on the side. It’s actually a little computer that, when plugged into a computer, it can pretend to be a flash drive, a keyboard that can automatically type a whole malicious program really fast, a network device, basically anything we need to compromise a target computer. All Tiffany has to do is walk up to a computer and plug this in. We have it set to put this small text file of an ascii art cow saying “you’ve been pwn’d” on the desktop to prove we’ve infiltrated that machine, but we really could do…anything we want.”
Make me a movie where a guy breaks into a server room in Pepsi pajama bottoms and a t-shirt that says “I’m A Liability” by slipping the latch with a piece of plastic he finds in a nearby trash can.
AKA, make a movie about one of Deviant’s convention presentations. It’ll be endlessly entertaining.
As a side note, the program is amazingly performant. For small numbers the results are instantaneous and for the large number close to the 2^32 limit the result is still returned in around 10 seconds.
For a long time I’ve been of the opinion that you should only ever optimize for the next sucker colleague who might need to read and edit your code. If you ever optimize for speed, it needs to be done with massive benchmarking / profiling support to ensure that the changes you make are worth it. This is especially true with modern compilers / interpreters that try to use clever techniques to optimize your code either on the fly, or before making the executable.
I do feel like it’s good, though, when libraries optimize. Ideally, they don’t have much else to do than one thing really well anyways.
And with how many libraries modern applications pull in, you do eventually notice whether you’re in the Python ecosystem, where most libraries don’t care, or in the Rust ecosystem, where many libraries definitely overdo it. Because well, they also kind of don’t overdo it, since as a user of the library, you don’t see any of it, except the culmulative performance benefits.
Libraries are also written and maintained by humans.
It’s fine to optimize if you can truly justify it, but that’s going to be even harder in libraries that are going to be used on multiple different architectures, etc.
I’m still mad he didn’t use the size of the number to tell the system which block to read first. I feel like that would be a great use for division or maybe modulus?
Yeah, the thing is, "a monad is a monoid in the category of endofunctors" is kind of a meme among non-Haskell developers. Personally, I think Haskell is a very interesting language. The mathematical jargon, however, is impenetrable, and this particular expression is kind of the poster child. I'mma go look at Erlang if I want my functional language fix without making my head hurt, thank ye very much.
I am technically, but I almost never turn on my second (vertical) monitor. Usually when I have my main set to a different source and I want something from my desktop PC on the other monitor.
I'm sort of that. I've got two landscape and one portrait monitor, the portrait one is good for browsing websites like this one where there's a lot of vertical text. I actually find myself preferring the landscape ones for coding since my IDE has a lot of stuff in sidebars and also some of the lines of text are very long.
I’m a mix between chaotic neutral and lawful neutral. I have a vertical monitor on my left which is mainly for slack + documents. Center screen for code and what ever I’m focused on and laptop screen on the right for calendar, email, other not in focus things.
I’m chaotic neutral too but I don’t code on the diagonal monitor. I only have it diagonal because my neck hurts looking at the side screen if I have them both horizontal lol
Don’t take the chart seriously. Pretty much all of these setups are good for their uses and are done by someobdy, even certain forms of “chaotic evil”.
programmer_humor
Top
This magazine is from a federated server and may be incomplete. Browse more on the original instance.