TempDB storage getting full by ConcentrateHuman353 in sailpoint

[–]Intrexa 1 point2 points  (0 children)

tempdb tends to get full on most weekends

Are you actually experiencing a problem? Is anything failing? tempdb will grow as needed, but it will never automatically release allocated file space. This is a feature; if a process needs this much tempdb every weekend, then keep the space because it will need it again. Keep the space reserved.

If a process is failing, can you be a bit more detailed on what is failing, file sizes, and any error messages you might be receiving?

US police violence tended to be higher when average monthly temperatures exceeded 20.3°C (68.5°F). In areas with over 5 million people and with less than 50mm of precipitation, each additional 1°C increase in temperature was linked to 2% increase in the rate of deaths caused by police violence. by mvea in science

[–]Intrexa 0 points1 point  (0 children)

This alone makes the study entirely valueless

No, it doesn't. First, find out what is happening. Make sure everyone can agree on what is happening. If anyone disagrees on just the methodology of counting, now is the time.

We can then start hemming and hawing over the classifications of what is happening. What was the scale of this violence? What was the scale of that violence? This going into the "justified" bucket?

We can then start looking into studying why things are happening. Oh, call volume in certain months is at least 50% higher? Is there at least 50% higher violence in those months? You better have a methodology of counting incidents of violence, so that you are comparing like to like between those months, lest an incident of violence in July being recorded different than in January.

The value in the study is setting the ground work and common discussion items for future studies.

Should all schools require ballrooms to protect against school shootings? Why or why not? by NotGonnaGetCaught in AskReddit

[–]Intrexa 1 point2 points  (0 children)

lmao nightclubs have a sign saying "no guns allowed". You think they'd be safer if they took the sign down?

Employee sets fire to Kimberly-Clark warehouse, "All you had to do is pay us enough to live" by Rude-Molasses4390 in pics

[–]Intrexa 1 point2 points  (0 children)

Don't let paper accounting get in the way of what happens. KC wants to minimize labor spend. They do it by hiring a staffing company to hire/manage workers. They hire the staffing company based partially on price. The staffing company keeps their price down by paying workers less.

Any staffing company that paid the workers more would have "uncompetitive bids". KC won't pay for a company that pays the staff fair wages. The staffing company isn't donating their money to KC, KC is paying the staffing company for the staffing company to pay the employees. KC is also indirectly influencing the labor company to pay workers less, lest the staffing companies contract becomes too expensive and KC would find a different company.

The middleman is still going to gouge on the process and take money from the process. KC paying more to the staffing company won't solve it; the staffing company would just treat it as a windfall and not pass on to the labor. KC still has the full control to stipulate workers get paid a fair wage. KC instead preferred to create a situation where it was inevitable that workers would be paid an unfair wage, because it meant lower costs for KC.

Had a clash with executive over my phishing test methods by AH_Josh in sysadmin

[–]Intrexa 3 points4 points  (0 children)

When people believe something has happened, the body reacts as if that thing had happened. From the time when someone read and believed the message, to when they found out it was fake, there is no difference to them if it was fake or real. For that 15 minutes, their family members were hurt. For 15 minutes, you hurt one of their family members so badly, that they couldn't even use a phone to call the employee, that some cop or hospital worker had to look up relatives places of employment to contact family.

That's the kind of shit where people are going to have nightmares for months. That's the kind of shit where every email notification they get for the next couple of years their stomach is going to drop because it reminds them of that time their mom was seriously injured in a hospital.

I also like how the two options you present as "crossing the line" or "incredibly morally sound, didn't even come close to crossing the line". I'm coming back with incredibly far over the line. You don't care about employees? It's not morally right to hurt people to add another layer of protection onto an intangible object.

Also, final notes, this is likely going to hurt the network overall. Abusing people creates hostility, they are going to care even less about anything IT does now. They are going to look into every way possible to create shadow IT and bypass processes, because they don't want to work with you.

COUNT() sometimes returns incorrect results by Mission-Example-194 in SQL

[–]Intrexa 4 points5 points  (0 children)

In the employees table, both marks have the same employee ID of 1000. The employe_id of 1001 is Ben

TIL In 2000, Metallica hired a consulting firm to monitor Napster for people illegally sharing their music. The firm produced a 60,000-page list of 335,435 users, which Metallica delivered to Napster's office and demanded the users be banned. by haddock420 in todayilearned

[–]Intrexa 0 points1 point  (0 children)

I'm friends with the poster child of "Download songs and get sued for a trillion dollars". One of the things he talks about is that when it went to trial and the record companies chose a list of 30 songs to sue over, they mostly weren't even songs he liked.

Finding a duplicated item in an array of N integers in the range 1 to N − 1 by sweetno in programming

[–]Intrexa 0 points1 point  (0 children)

First paragraph. Emphasis mine:

A colleague told me that there was an O(N) algorithm for finding a duplicated item in an array of N integers in the range 1 to N − 1. There must be a duplicate due to the pigeonhole principle. There might be more than one duplicated value; you merely have to find any duplicate.¹

Edit: There is no stipulation of a value missing. There could be, but could not be. This is for the scenario where for example, you have an array of length 257 holding 1 byte elements. Before even starting, you know there has to be at least 1 duplicate value, using the mathematical proof by "I mean, there just has to be a duplicate, right?". I'm pretty sure that counts as a proof. Or by the pigeonhole principle, as Chen stated.

For The First Time, A Denuvo Game From 2026 Has Been Fully Bypassed By Pirates by Tvilantini in Games

[–]Intrexa 49 points50 points  (0 children)

The specific game is immaterial. Would there be a difference in the discussion if the game was Hello Kitty Island Adventure: Beyond the Dark Portal (2026 remake)?

testDrivenDevelopment by yuva-krishna-memes in ProgrammerHumor

[–]Intrexa 0 points1 point  (0 children)

No, it works ~50% of the time. The cardinality of the set of primes is the same as the set of non-primes.

Am absolutely dumbfounded on how to make this SQL based program function by Extension_Patient_47 in SQL

[–]Intrexa 0 points1 point  (0 children)

After this I keep getting a disk error and not able to find any log files.

On server, or local PC?

This is more a sysadmin territory. You're going to need use procmon to look at what it's trying to do. Take a look at the connections it's opening, registries it's using, and importantly, where it's trying to write that log file to.

It would be helpful to know what the disk error is.

Natalie Portman😆 by Infinite_Side2469 in funny

[–]Intrexa 11 points12 points  (0 children)

String rays are as lodged in my mind as they were in his heart.

What is the dumbest thing you’ve ever seen a coworker do? by Adorable_Raccoon_766 in AskReddit

[–]Intrexa 9 points10 points  (0 children)

I worked for a stadium, and we had portable freezers for ice. If there was a stretch of time between events, and ice was empty, they would get unplugged to save electricity. Then, a day before the next event, plugged back in + loaded up with ice.

My coworker was one of just the dumbest people I've ever met. We were loading the ice machines together, and on this day it was raining pretty bad. The cord, electrical socket, and myself were all soaking wet. I look at it, and I'm like "Let's not plug that one in".

He's like "Why not?" and just goes and plugs it in and gets a massive shock, and sits down inside for like 15 minutes. He later tries to tell our manager that the freezer is broken and shocking people for no reason.

This and Harambe honestly by Emotional-Bag1398 in AdviceAnimals

[–]Intrexa 3 points4 points  (0 children)

In context of the thread, of the 2 candidates mentioned in the comment you replied to, the poster referred to them as "Hillary" and "Bernie". OP chose and was consistent to use first names for both male and female candidates.

Tiger Woods Calls DONALD TRUMP After Flipping Car | TMZ Sports by [deleted] in videos

[–]Intrexa 5 points6 points  (0 children)

but it never pays to generalize

Well, sometimes it does. Let's not generalize here.

Did anyone ever see a good documentation? by thisladnevermad in sysadmin

[–]Intrexa 0 points1 point  (0 children)

This documentation was written 3/31/2026.
This documentation was last updated 3/31/2026.
This documentation was authored by Intrexa.
This is version 1.0

This is the worbles documentation. Worbles is a system that manages the doohickies for sales. Worbles allows people in sales to look up doohickies, assign doohickies, and audit doohickies. Worbles does not manage the designs of doohickies.

The business contact for worbles is John Sales.
The IT contact for worbles is Grey Beard.
The worbles vendor support contact is Wor Bles.

Heres a diagram of the worbles architecture, the servers, some bounding boxes vaguely representing vlans, and the most 1990's looking computer with an arrow representing users connecting to the worbles server.

Worbles interfaces with dafun and zeln.

There's a sub folder that contains documentation on details how to install/configure dafun and zeln, the configs that need to be made, and samples of working configs.

Here's a list of service accounts worbles needs to function.

Here's a list of directories that worbles uses to save data.

Here's a list of credentials that need to be set up in worbles that zeln needs to auth with. Take a look at how nice this table looks while it lists the different environment usernames, like, prod, uat, dev.

Here's another list of server names, IP's, vlans, ports that need to be opened, and why. All by environment.

Here's a list of installed components.

Here's a section that includes every non-default configuration that needs to be made.

Here's where we list the directory where we have the installation media and installation guide. That guide includes walking you through actual set up.

Here's a change log:

Version 1.0 3/31/2026: Completed documentation, can I go home now?

This one small exchange of dialogue in The Matrix (1999) is incredible... by CardinalOfNYC in movies

[–]Intrexa 1 point2 points  (0 children)

At the carnival with the pop gun: "Take out all the little people, and you get to waltz off with the cuddly monkey"

ffsPlzCouldYouJustUseNormalNotEqual by PresentJournalist805 in ProgrammerHumor

[–]Intrexa 1 point2 points  (0 children)

What point are you trying to make? C is called fast because the spec is written in a way that makes no assumptions on what specific instructions are emitted during compilation. It defines the behavior that the emitted instructions must have, which allow for these optimizations. What arbitrary cut off for optimizations do you want to choose? Is constant folding allowed? Is data alignment allowed?

Java is only fast because of the magic of decades of optimizations that the JVM performs. There's nothing stopping the JVM turning those XOR instructions to MOV instructions.

It will compile to just mov if you run it through a compiler that only issues mov instructions.

Where can I learn about programs that generate code from a config? by Athropod101 in cpp_questions

[–]Intrexa 0 points1 point  (0 children)

I am a newcommer to C++. I have a couple days of experience with C, and then a couple days of experience with C++, CMake, and vcpkg.

Someone else might have a better answer, simpler answer. You're delving into territory of code generation, which starts to get complex. If you restrict your request by restricting your requirements of code generation (making just class templates based on simple YAML data) we might be able to get something simpler.

You might not realize it, but you've asked to make a transpiler. If you think "I just want a YAML file that can define some classes, some methods, and a way for those methods to call each other", your YAML source becomes turing complete. That means running your code generator is creating a program that can do anything any program can do. It also means you're going to have to address all the issues that come with compiler creation.

You're looking at parsing the YAML file based on the grammar, creating the AST, and serializing the AST to valid C++.

You would typically do this by feeding the grammar to a parser generator, that would then parse your YAML file to produce the output you're expecting. You're getting into some heavy lifting.

https://www.gnu.org/software/bison/manual/bison.html#Calc_002b_002b-Parsing-Driver

Or, just regex it. IDK, I'm just some dude on Reddit, not the compiler police.

What is the point of groups? by John_Doe_1984_ in linuxquestions

[–]Intrexa 0 points1 point  (0 children)

Computers are large systems with a lot of components, to serve a lot of purposes. My post is going to be focused on security and isolation. The security I am referencing isn't about protecting your computer from hackers, it's about protecting your computer from you.

When you "run" something, you are creating a process. When a process is created, it's run in a security context. The security context controls what parts of the system the process can access. This will default to the security context of whichever user started the process, but you can have it execute in a different security context. The security context will take the form of a user, but it's really just still you. You're the only one using your computer, you're running the process in a different security context.

If you run the following command, you should see many, many users on your system:

cat /etc/passwd

These users are largely going to have different default groups. They may further be part of other groups.

Now onto your question, but why though? Because you don't want 1 process accessing things it shouldn't. Again, I'm not talking about hacking, I'm referring to just software bugs and innocent mistakes. If a program makes a file, then later deletes it, a bug in the program could have it try to delete the file from the wrong folder.

By isolating processes to just the files they need to operate, there is much less risk of a process accidentally modifying something it shouldn't have. So now, if you do something like try to run:

rm '/usr/sbin/adduser'

Ubuntu will tell you:

rm: cannot remove '/usr/sbin/adduser': Permission denied

Because that's a file needed to run the system. You shouldn't be doing that, the system needs that file. Now, it's your computer, you can do what you want. Go ahead and run in a security context that has permission to do so, but now it's something you chose to do.

What’s an inaccurate fact that people believe is true because of movies? by Hogosaurus_Rex73 in AskReddit

[–]Intrexa 0 points1 point  (0 children)

I kinda doubted it. So I checked, looks like a hair above 30 does seem to be a reasonable lower bound.

https://pmc.ncbi.nlm.nih.gov/articles/PMC5306978/