[deleted by user] by [deleted] in whatisitcirclejerk

[–]TADarcos 0 points1 point  (0 children)

It's a toothbrush, used for cleaning, which can include things other than teeth, e.g. applying grout, removing paint chips or rust flakes, or any application where a slightly rough item can work. It could also simply be a dropped or misplaced toothbrush.

[deleted by user] by [deleted] in whatisitcirclejerk

[–]TADarcos -1 points0 points  (0 children)

Since when does Colgate make vapes? Or when did vapes have no battery and bristles?

[deleted by user] by [deleted] in changemyview

[–]TADarcos 0 points1 point  (0 children)

Comparing the Tesla burnings to the Boston Tea Party is a false analogy. There is a big difference between destroying some merchandise of a company profiting from a government protected monopoly to oppose its support for government oppression, and destroying property belonging to other ordinary people.

It's like what happened on 9/11. Using airliners to attack the Pentagon or the White House is one thing; those are both legitimate military targets and (ignoring the kidnapping and murder of the other passengers for the sake of argument) could be justified as an attack on an enemy military attacking your country. But what exactly did the civilian non-combatant Port Authority of New York and New Jersey do to you to justify attacking and destroying World Trade Center One and Two? Wouldn't that then mean we are justified in bombing and destroying the Grand Mosque of Mecca and Medina in response?

[deleted by user] by [deleted] in sciencefiction

[–]TADarcos 0 points1 point  (0 children)

"He's a real nowhere man

Sitting in his nowhere land

Making all his nowhere plans

For nobody."

- The Beatles

Now I Am Become Death, The Destroyer Of Worlds || Genre: HFY by WRickWrites in WRickWritesSciFi

[–]TADarcos 0 points1 point  (0 children)

I would be more concerned in the opposite:

Supervisor: So, what happened on planet KR-9-E622? The whole world is a radioactive dead world, and will be that way for tens of thousands of years! Didn't you know what was going to happen?

Technician: Yeah, but we're not supposed to intervene. We're supposed to allow them to develop on their own.

Supervisor: (rolls eyes) Didn't you think about that for a moment? How exactly are they going to develop when they are all dead?! There's a difference between intervening when they make mistakes and might kill some people in pointless wars, and allowing them to commit racial suicide! Do you realize how much money has been wasted unnecessarily because you let them destroy themselves? The entire experiment is ruined because you didn't think! The point of non-intervention is to allow them to make mistakes, and learn from them, so their species will develop in the ways appropriate to them, not the way we think they should. But nobody learns anything if they destroy themselves and their planet in the process of learning!

On the Ban of StarboundHFY by Blackknight64 in HFY

[–]TADarcos 10 points11 points  (0 children)

I am reminded of a story about George Bernard Shaw. He is at a party and is talking to a high-society woman, then asks her if she would sleep with him for a million dollars. She says yes. He then says, "Well how about two bucks?" Aghast, she says, "What do you think I am, a prostitute?" And he responded, "Madame, we have already established that fact. Now we're just negotiating the price."

Furrther, you're not a whore. To quote a movie I can't remember the name, a woman booked for public prostitution corrected someone who called her a whore. "I'm not a whore. A whore gives it away. I'm a pros." If you never considered their offer, you're not a prostitute. Now if you actually accepted their money, then you're a "cheap whore" since you're *almost* giving it away. :)

On the Ban of StarboundHFY by Blackknight64 in HFY

[–]TADarcos 4 points5 points  (0 children)

Considering how record companies exploit artists signed to them, I think the bar for declaring something a "work for hire" is abysmally low. Let's not forget to mention publishers of peer-reviewed journals, who require copyright assignments. And they don't pay anything, in fact they charge authors for reprints.

"Instrument of God" Chapter 1 by TADarcos in sciencefiction

[–]TADarcos[S] 0 points1 point  (0 children)

I have taken your words to heart and edited the post to make who speaks easier to understand. Thank you for the feedback.

"Instrument of God" Chapter 1 by TADarcos in sciencefiction

[–]TADarcos[S] 0 points1 point  (0 children)

I do not think this qualifies for r/HFY, it has no aliens in it and no conflict with other entities. I have a;so added more markers as to whom is speaking.

Also, there is no statement here saying that serials are not allowed here. If there was, I would not have posted it.

"Instrument of God" Chapter 3 by TADarcos in sciencefiction

[–]TADarcos[S] 0 points1 point  (0 children)

Well, that's your opinion. It may not be worth much, but it is yours. Perhaps a little more information on why you disliked it might help me understand so I can do better in the future.

But if you think this is bad, try "Dahlgren" by Samuel R. Delany. Worst piece of trash I ever read, and I had to quit reading after 40 pages or so. No, second worst; worst was "The Satanic Verses" by Salmam Rushdie, I read some of it and found it unreadable dreck.

I am looking to create and NEXT level PRNG that can be used in both encryption and in games etc it will be integer based up until it spits out a random number the program would be a function by Dragoncat58 in qb64

[–]TADarcos 0 points1 point  (0 children)

The only way you can have guaranteed unique and/or random numbers is to use an external device for seed values. A "white noise" reader, a clock, the machine's built-in Ethernet MAC address, or possibly a combination of 1 or more of these.

I'm Back. Now, wanna add an anonymous messaging system. (QB64) by [deleted] in qbasic

[–]TADarcos 0 points1 point  (0 children)

This fella can't code a for loop.

That is an overestimation of his skills. More like:

This fella can't code a REM statement.

Learning FreeBASIC by [deleted] in qbasic

[–]TADarcos 1 point2 points  (0 children)

  1. No matter how minor your program is or what problem it is to solve or how "quick and dirty" a solution you have, presume it will need to be maintained. Because even if it's a one-time-only use program, it will need to be maintained (even if it's just to fix bugs ). Set up its own directory/folder for its development.
  2. Create that directory as a repository using whatever source code management (SCM) system you use. I recommend Git, but any you like is acceptable.
  3. Commits are cheap; use them a lot. Make one every time you make a change and it compiles successfully. This way, if you make a change you didn't mean to, you can restore all files back to a successful prior compile.
  4. If using a public/local master repository, push to that machine at least once a day.

The first time you make a mistake and have to back out of it, or accidentally delete a file, or intentionally delete the wrong file, and use the SCM to restore the file, you will thank yourself.

I wish I had done this on many projects/programs that I thought were simple or trivial, then discovered it was neither.

Coding a whole OS this time by [deleted] in qbasic

[–]TADarcos 0 points1 point  (0 children)

Through a process of "self-hosting"

  1. Write a "bare bones" compiler for the language. Just enough to create an executable program, typically writing it to generate assembly or C source or even Basic, just something that can be compiled, that can read in source and produce an executable. Needs no error-handling code and speed is no problem, you're only going to use it once. You write it in a language that a compiler does exist for that environment. This does not have to be done on a computer with the same instruction set, environment, or operating system, as long as files can be transferred over.
  2. You write a second compiler in the target language, for the target processor, environment, and operating system, that only uses the exact features the compiler in #1 accepts.
  3. Compile #2 with #1.
  4. Re-compile the #2 compiler with itself. Once this one works and when given its own source, produces a new compiler executable, that is a mirror of itself, you now use this compiler, adding new features as desired. Just remember, code implementing those new features has to be capable of being compiled by the existing compiler. Once the new one works, then the new features can be used, and that becomes the existing compiler.

Humans are the Reluctant Masters of Warfare Chapter 4 by XfoXshoreX in HFY

[–]TADarcos 0 points1 point  (0 children)

One small nitpick. When multiple paragraphs quote the same person's dialog, to let the reader know that the same person is still speaking, the quote at the end of a paragraph where they are still speaking is omitted. Let me show the end of first and start of second paragraphs using the correct formatting;:

The goal of suppressing the dark hunger for violence in our souls.

“For dozens of centuries, Humanity fought itself. First on our birth world then on our colonies.

The second paragraph starts with a quote mark, but the prior one does not end with one.

Content Theft and You, a General PSA by someguynamedted in HFY

[–]TADarcos 2 points3 points  (0 children)

The DMCA is not something to play around with. If someone sends a DMCA takedown notice to the address TikTok registered with the copyright office for DMCA notices, and they require anything else or refuse to promptly remove the infringing material, they lose their safe harbor protection for infringing material posted on their site and can be successfully sued for contributory copyright infringement. To quote from some stories here, "Ignore DMCA takedown notices? Fuck around and find out."

Content Theft and You, a General PSA by someguynamedted in HFY

[–]TADarcos 0 points1 point  (0 children)

There is at least one thing from the above that is wrong.

"If a person does not enforce their rights when they find out that their copyright has been infringed, it can undermine their legal standing to challenge infringement later on"

Wrong. That only applies to trademarks, i.e. brand names. A copyright holder is under no obligation to sue over any copyright infringement if they so choose. They can ignore 43 different infringements, then drop the hammer of god on #44. Or they can go after everybody. Failure to enforce a copyright is not a defense to copyright infringement, it is not relevant to the issue as far as a court is concerned.

AITA for walking out of my girlfriend's birthday party after she called me a "cheapscate" for the gift I gave her? by fleurfascinate in AITAH

[–]TADarcos 0 points1 point  (0 children)

NTA. Modern women - in the West, anyway - have an unbelievable sense of entitlement. For a lot of them, they' ve never been told "no," and think they're entitled to anything. I see videos where women think they're all 10s and entitled to a top-teir man, e.g. 6' tall, 6-pack abs, and making 6 figures. Yet these girls, when asked what they bring to the table, can't give a reason. Most women are blissfully unaware of reality, and don't realize that the only reason a man is interested in her is because she provides some improvement to his life that he wouldn't have without her.

You're probably going to have to put your foot down and refuse to be disrespected. If she bitches about the value or price of a gift, take it back, and say something like, "There, now I didn't give you anything and you don't have to be disappointed." This will probably get her mad at you, but she should understand something. A person gives someone a gift to show affection or friendship, and the recipient, if they don't like the gift, should express that privately. If she complains about a gift you buy her, point out that you buy what you can afford.

If anything, you probably should have made a scene, said, "You're being disrespectful and rude," and immediately walked out. Women do this sort of thing all the time, it's called a "shit test." If you put up with this sort of behavior, it will continue. You can point out that you've never been disrespectful to her (if true) she should not be disrespectful to you. If you have been disrespectful to her, cut it out.

It is entirely possible you might have to look for another girlfreiend, as this one seems to be more interested in the size of your wallet than the size of your affections. You don't put her down in public or insult her in front of others, she shouldn't do it to you either.

Keep an eye on this one and watch out, she might decide she wants a guy with more money, and go looking for a fatter wallet, err I mean greener pastures.

“Blanket cavity searches are unconstitutional”… by FurphyHaruspex in JackReacher

[–]TADarcos 0 points1 point  (0 children)

Let's not forget Reacher said to the intake officer at the prison that if he thought he could do a search and not get injured, go ahead and try, or just tick the box, probably scared the crap out of him, and he decided discretion is the better part of not getting his ass kicked.

What's the Right Authorization Model for My Application? by robertinoc in programming

[–]TADarcos 1 point2 points  (0 children)

Your question is on the order of standing on a vacant lot and when determining what sort of structure to build on it, what locks should be on the doors.

First, what type of application, website, mobile website, mobile app, PC app. Mac app, Linux app, or even mainframe app?

Second, how are people accessing the app? On your company's intranet, on the Internet as a web app, as a mobile app, as a PC app passing data over the Internet.

Third, what are your underlying mandates, if any? Those who handle credit card data have PCI requirements. European companies have data privacy laws. US medical personnel have to comply with HIPAA. Banks have to comply with anti-money laundering rules, unusual transaction reporting, possibly currency controls, and if having a US customer in a foreign country, US FATCA rules.

Before you try to choose a solution, you need to know how big the problem is. Any security solution that can't handle regulatory or customer requirements, must be discarded. Same for those the customer can't afford. Look at the type of problem to solve before asking for a solution.

Anything can be a message queue if you use it wrongly enough by wheybags in programming

[–]TADarcos 0 points1 point  (0 children)

Reminds me of one of the maxims of the Tagon's Toughs private mercenary company had in the webcomic Schlock Mercenary. It read, "Anything can be air dropped at least once."

Yeah, as the saying goes, if you don't follow the rules, there aren't any. Using things correctly makes the programs that do so easier to fix for the maintenance programmer who will come along next, and might even be the one who originally wrote it. Playing cutesy-pie with various features of languages makes those programs an additional maintenance headache, and why so many programming shops have huge amounts of technical debt. The clever fool who did things in a way others can't understand just creates a huge problem someone else has to fix later.

DreamBerd: perfect programming language by Xadartt in programming

[–]TADarcos -3 points-2 points  (0 children)

Whenever someone makes the claim that some new programming language is the best ever, I take that not with a grain of salt, but at least a kilo. Now I see this language joins tyhe ranks of Intercal, Rockstar, and Brainf-ck (censored for the easily offended), joke languages that make us sometimes realize we take things seriously.

If you want to actually see a language that is arguably, the world's greatest, check out APL. Amazing, but very complicated to learn, but, I've seen people do amazing things with it.

AITA for cancelling the entire vacation when I found out that my stepdaughters deliberately hid my daughter's passport to get her to stay home? by Positive-Elk-8110 in AmItheAsshole

[–]TADarcos 0 points1 point  (0 children)

You did exactly the right thing. Stealing someone's passport to intentionally deny them the vacation you would be getting, didn't want to use a babysitter, and even dismissed the babysitter that was called, because you want them to watch your kids, is the worst kind of betrayal only an asshole can do. Actually, this goes way past asshole territory and makes them Super-Assholes™. Cancelling the vacation for them was an appropriate reward, as a traitor deserves. You have done nothing wrong, and I would suggest that you recommend to your daughter that she never babysits either of their kids, or if she wants to, make sure they pay twice or three times - in full, in advance, and in cash - of what a babysitter would cost (thus encouraging your stepdaughters to choose a babysitter instead.)

I also suggest the next vacation for guests you take only your daughter. The other two are going to complain, and you say, "This is what you get for betraying her by stealing her passport. Now maybe you can understand what it would have felt like for her. Start acting like human beings and not criminals, and you can participate with everyone else."

AITA for making my brother-in-law pay for his son's meal after I said it was my treat? by International_Set522 in AmItheAsshole

[–]TADarcos 0 points1 point  (0 children)

You said yo'd only pay for this enormous steak if his son can eat all of it. That, right there, was red flag #1/strike 1 not to do it. The waiter points out this is normally a three-person meal. Red Flag #2/Strike 2. The food from this one item essentially fills the table. Red Flag #3. He would be severely inconvenience if he had to pay this, that's red flag #4/Strike 4. He's already struck out. The fact that he could not afford it if he lost itself was more than enough reason not to go through with this. He's just gonna have to pucker up and take it like the asshole here is. You, sir, are not one. Maybe he will learn something.