|
Yes, I have a blog, not that it has anyone following it. I get excited when my views for a week goes above 5.
But, my main reason for blogging is not to garner a troupe of followers. I started it because I like to write. Also, like a lot of people, I have the notion that something I write will be of value to someone, some day.
What I've come to realize is I'm that someone. My blog is where I put all the nifty stuff I've thought through, and some I haven't. (Those are called "Drafts". I find writing my blog gets me to understand more what I am writing about. I also find my blog is a good way to go back and find out what I figured out in the past.
cat fud heer
|
|
|
|
|
|
I'd show it to my kids if I didn't think my wife would get mad with me.
Wrong is evil and must be defeated. - Jeff Ello
(√-sh*t) 2
|
|
|
|
|
someone sent me this Meme.
I like to show my tech guy my empty coffee mug and tell him I successfully installed Java.
To which I replied. You installed Java when you made the coffee,
You successfully implemented a Java Object when you poured the mug of coffee,
and consumed the object when you drank it.
You are in the disposable phase now. Run along.
To err is human to really mess up you need a computer
|
|
|
|
|
waaayyyy too geeky for me.
I'd rather be phishing!
|
|
|
|
|
"reach out and leverage my low hanging fruit"
The Jurassic period produced such an abundance of lethal predators, that the oceans were a virtual STEW OF ASSASSINS - The history channel
|
|
|
|
|
Two fig wasps walk into a bar. The first walks over to the juke box and picks out Beethoven's Piano Concerto No. 5. The second walks up to the bartender and orders two two-fingered scotches.
The bartender says "Hey, that's a lot scotch for one fig wasp don't you think?"
To which the fig wasp who ordered the drinks responds "Well, one's for me and the other's for my music critic of a buddy over there making the tune selection"
(I don't get it either ... and I would suggest Googling parts of the text of the joke in search of context is probably as futile a quest as pouring coffee on the wound and settling for any results obtained thusly)
|
|
|
|
|
It's a joke about racism, because the one buying the drinks is a Rimsky-Korsakov fan, obviously.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Ok,
Obviously. Because I can't play piano, really ...
And of course, my ears are so big.
(How big are they?)
They're so big, when I was a child, before I went to bed each night, I'd tape them with cellophane to the sides of my head in order to keep from trapping them on my pillow when I rolled over in my sleep, and thereby aggrevating my condition.
|
|
|
|
|
The "protected" keyword in Java is "public within the package."
Why.
I mean, not that I really care, but it's still asinine. A good discussion on SO[^].
Marc
|
|
|
|
|
well i think you'll find Christan Grauss more the happy to answer your programming question.
Hes an excellent chaps and just loves to help people out with their computer related issues. Suggest you drop him an email - i'm sure he'd love to hear from you
cheers
Bryce
*chortle*
MCAD
---
|
|
|
|
|
PHP starting to look better every day, eh?
Jeremy Falcon
|
|
|
|
|
Jeremy Falcon wrote: PHP starting to look better every day, eh?
Hmmm...I'm acquiring a much deeper appreciation of how Microsoft "fixed" Java with C#.
Marc
|
|
|
|
|
Hey,
Here's what works for me when I feel a rant coming on ... especially when the old saw is symantics like keyword meaning (Stroustrop's "TC++PL" ... ever notice how that book reads like the Saga of the Volsungs?):
Go to Q&A and, if you don't know where the huge tag cloud is located, it's underneath the advert to the right the Questions line-up, hit the tags "more ..." link then take a few seconds to relax with the nebulousness of the thing in front of you. Shift your focus from individual tags to bigger regions, say by alphabet. To the point where you say to yourself "hey there are more D's than Q's" ... etc. At this point click on something ...
ANCIENT.
Today, for me it was "batch".
It's like walking back in time; click back a few pages ...
Surf. As it was originally intended.
(Now why was I about to write a rant ... I can't remember)
modified 9-Dec-14 18:09pm.
|
|
|
|
|
RedDk wrote: Shift your focus from individual tags to bigger regions
There was no tag for "protected", and when I clicked on "Java", it said no questions came up.
RedDk wrote: (Now why was I about to write a rant ... I can't remember)
And upon terminating that distraction and going back to the code I'm working on, I will immediately and painfully remember again.
Marc
|
|
|
|
|
Oops!
My bad. You're WORKING ...
|
|
|
|
|
RedDk wrote: My bad. You're WORKING ... Of course he is -- he might spell his name wrong, but he doesn't spell it "Java".
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
java is a sin in itself ...
|
|
|
|
|
The missus is a big fan of "White Collar" and last night I endured such dialog as "It looks to me like some sort of complex algorithm" as these folks sat in a room perusing printed pages of source code." (Cause that's how us engineers like to look at code - you know, stacks of printed paper, and in black and white.)
Later it was revealed that the code was a stunningly "complex web of random generators" that picked a city, airline, and people, etc. via this "complex algorithm" to move illegal products around the country.
Eventually they got the code running on one of their computers and Voila! They had the city, airline, etc. of the next target to go and intercept the criminals!
Evidently this "complex algorithm", via these complex web of random generators, would generate the same output even with the code now running as a different instance on a different system.
"Religion is the most malevolent of all mind viruses." - Arthur C. Clarke
|
|
|
|
|
|
Brilliant! That way the QA people can make sure the super-complex super-secret algorithm works.
|
|
|
|
|
TV and movie writers generally don't have a clue about anything IT related, and assume that their audience won't either.
IPv4 addresses with out-of-range single octets seem quite popular - for example, "The Net" used 23.75.345.200 several times.
Spooks[^] had the marvellous line, "I had to trawl the non-indexed deep web to construct a cipher".
There are some good examples here[^].
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Richard Deeming wrote: TV and movie writers generally don't have a clue about anything
That is why most TV and movies work.
I'd rather be phishing!
|
|
|
|
|
>> for example, "The Net" used 23.75.345.200 several times.
Well, I'd assume that's just the equivalent of using a 555 phone number. They intentionally don't want it to be a real address.
Truth,
James
|
|
|
|
|
I seem to recall watching a movie called "Dolan's Cadillac" based on the Stephen King story of the same name. In it a guy has an IP address for a webcam that has 666 as part of it. I don't think the story King wrote even contained the word "computer".
|
|
|
|