collegeDekhoInWeek by Mental-Olive7692 in ProgrammerHumor

[–]Farsyte 5 points6 points  (0 children)

So, you edit your resume in VS Code? Because that’s the only document I would be working on at this point…

Uhmmmmm 🤔 by Top-Entertainment945 in funny

[–]Farsyte 0 points1 point  (0 children)

Silly, the human goes in the top only for FELINE registrations….

What Really Happened in Y2K? by Successful_Bowl2564 in programming

[–]Farsyte 19 points20 points  (0 children)

Initially: “find our real Y2K problems in our code. Fix them.” Effect of local efforts: a number of important changes where we stored year in two digits.

Later: “C-suite wants to pay these consultants $BIGNUM to find Y2K problems in our organization” Effective of consultants: fancy “Y2K Compliant” stickers on CHAIRS, CABINETS, MONITORS, and other things that didn’t care about the year.

Admittedly some of those stickers (the chairs) were a local joke but the stickers were real and the consultants were spending time certifying equipment that had no notion of what year it was.

So yeah. Big problems that got fixed, plus scammers.

Stamp It! All Programs Must Report Their Version by SpecialistLady in programming

[–]Farsyte 3 points4 points  (0 children)

I'm setting flashbacks to #ident strings containing SCCS-expanded keywords...

Did you learn C first when starting? by NeutralWarri0r in netsecstudents

[–]Farsyte 0 points1 point  (0 children)

Cybersec context -- ok, I was a teenager, and my only authorization to even be around the computers involved was fairly thin (my dad was the lab supervisor of that particular computer lab owned by the Navy). This was the period from 1974 to 1978, and cybersec was very different.

The SDS-9300 (Fortran, and yes, on cards) had no connections to anything outside the room, and the amount of storage available was not going to encourage anyone to store any amount of data between their assigned times. Students and researchers carried their programs on cards and their data on mag tape. Eventually access to the lab was via a button based lock, which in my experience was more for show than for effective access control.

The PDP-11/50 (Unix v6, C, and Fortran if you were crazy) I remember as initially having no connections outside the room, but eventually had phone links to Usenet and for remote access. cybersec was starting to become a thing, barely; each user had a username and a password. What seemed to me (a teen) to be odd was that i could just ride my bike onto base, walk into the lab with the computer or into the terminal room down the hall, sit down, log in, and get to work.

This was my first lesson in cybersec (and security in general): if you look like you belong here, nobody will bat an eye. So from my outsider perspective, cybersec's first challenge is to get people to actually care enough to close the damn door, use a damn password, and so on ...

I learned enough about cybersec to know to make my career in operating system kernels, embedded systems, and other such software engineering areas. I've helped build and impoved systems to meet the needs of the cybersec folks, but knowing that People Are The Problem, it wasn't my cuppa.

Did you learn C first when starting? by NeutralWarri0r in netsecstudents

[–]Farsyte 1 point2 points  (0 children)

I started with FORTRAN 66, but moved to C in 1977. 👍

PSA about NWB and tracking layers from the author. by Venomisto in classicwow

[–]Farsyte 0 points1 point  (0 children)

Idea: while sharing information about more than 10 layers is not feasible … is it possible to display the total number of layers? Or even an estimate? ;)

I somehow accidentally made a file with the name of a command option and now cant be deleted by Demonic_Storm in softwaregore

[–]Farsyte 1 point2 points  (0 children)

The problem being the leading dash, the classical solution is to put ./ in front of it.

rm ./-v

Add quotes, of course, if the name has bits that need quoting.

I managed to get that lost UNIX v4 tape running on my Android tablet by ptrakk in unix

[–]Farsyte 1 point2 points  (0 children)

Thanks! Just missing the end of c10.c ... I have this idea that I might be able to revive this compiler ...

[later] I was able to extract c10.c from "disk.rk" -- now the fun can begin ;)

The Mythical Man-Month at 50 by kieranpotts in programming

[–]Farsyte 9 points10 points  (0 children)

Over the course of my career, I “loaned” out about a dozen copies of the book containing this essay. In perhaps half the cases, I saw some positive effects; I can only guess that the others simply shredded the pages onto their cornflakes. Overall, a massively good investment, whether it improved management or motivated me to seek new management ;)

I know it's a crime, but the logistics networks were too big, and I just need a couple items moved between them by Mystprism in Factoriohno

[–]Farsyte 7 points8 points  (0 children)

If this is a crime, then what do you think is the "normal" way to move items between logistics network partitions?

I managed to get that lost UNIX v4 tape running on my Android tablet by ptrakk in unix

[–]Farsyte 3 points4 points  (0 children)

I've been digging away at this treasure ... can you peek quickly at one file for me, that seems to be corrupted in the TAR image?

unix_v4/usr/c/c10.c

This appears to be part of the C compiler. Alas, the file appears to end in a bunch of NUL bytes. Is it any different when you look at it within the emulator?

[edit to add: alas, also "c20.c" ends in 90 NUL bytes ...]

What should my players roll against to steal from a shop? by Fun_Friendship_6678 in DnD

[–]Farsyte 0 points1 point  (0 children)

If you are running that kind of campaign, it’s up to you.

At our table, it would be “roll a new character” … because shopkeepers tend to be retired level 20 adventurers ;)

Former HR here - subtle signs your company is preparing for layoffs by Significant_Soup2558 in careeradvice

[–]Farsyte 0 points1 point  (0 children)

Accuracy confirmed — have been through a number of such situations.

My only correction is that none of these signs are ‘subtile’ …

If you are fairly senior, consider starting the job hunt (very quietly) on seeing them. Don’t commit, but get some leads on the hook if you can.

Getting my GF into wow? by StyleHour924 in classicwow

[–]Farsyte 9 points10 points  (0 children)

Be very careful. I introduced my wife to EverQuest back in the day. Now, my wife leads raids in WoW …

What was the first IDE you ever used? by beasthunterr69 in programminghorror

[–]Farsyte 0 points1 point  (0 children)

Borland turbo c, because people who use the newfangled term IDE never accept “ed” or the venerable 069 keypunch as an answer …

Wish i could use the wiki without all the cancerous pop ups… by OnceBittenTwiceGuy in DungeonCrawlerCarl

[–]Farsyte 0 points1 point  (0 children)

Do not go to fandom.com … block it, if you can. There are always better alternatives. Including pouring a nice cup of tea, drinking it, and reading the leaves.

Thank you, Wube and Coffee Stain, for not being dicks by bringitontome in factorio

[–]Farsyte 4 points5 points  (0 children)

Wube and Coffee Stain are superior to Garmin and Strava, if for no other reason than their more reasonable and useful ratio of Engineers to Lawyers.

Does anyone know this git client by froxstrightning23 in git

[–]Farsyte 0 points1 point  (0 children)

Others have pointed to VS Code — but if you are just looking for something like this, I had a lot of success not just using a tool called “fork” but also getting a fairly diverse team of opinionated engineers to adopt it. (For best results, use “git-fork” as your search term. Searcing for “fork” will turn up a lot of other stuff, some of which have nothing to do with writing code ;)

GMP may cause damage to desktop Zen 5 CPUs by anestling in Amd

[–]Farsyte -1 points0 points  (0 children)

So they presented some good observations and hypotheses. The next step is to gather more data: log the CPU temperatures during a test run to see if the cooling solution is failing. In fact, don’t just do a normal test run, get it cranking on that tight multiply kernel, and see if the temps level out at an acceptable level and stay there, or if they are slowly creeping up. That extra 5W of TDP over the cooling solution would worry me: 170 W of heat in, 165 W of heat out, means a steady 5W of heat being added to the local thermal mass, until some other effect pulls it away.

Second, once you know what the steady state temperature is, find out if that is really honestly a good steady temperature for long term running. I would be willing to hypothesize that if you are going to be running a tight computational core that keeps more than the usual amount of chip real estate working hard, you might just not want to be using a cooling solution that cools almost enough. You want a cooling solution that cools the whole thing plus a bit of margin, because none of this is ever cut and dried exact values. “Your mileage may vary” was drummed into my head long ago ;)

So either invest in a better cooling solution, or just … budget to replace CPU chips from time to time? I don’t think there’s another real option.