Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "blackhole"
-
Someone please shoot me right now.Or better a blackhole could just collide with earth right now and annihilate everyone and everything!
We are supposed to launch the app this coming Friday and as of Monday this week everything was OK.
Just yesterday this client came up with dozens of changes that demand a major rewrite of the backend.
The thing with this client is that she doesn't realize I deal with the mobile apps and not the APIs.Right now am headed to the management office to explain why the app is not updated after she sent this email today morning.
This is not the first time she has demanded changes a week to the launch and i feel like i should stand up to her but you know, i have bills to pay.8 -
The solution for this one isn't nearly as amusing as the journey.
I was working for one of the largest retailers in NA as an architect. Said retailer had over a thousand big box stores, IT maintenance budget of $200M/year. The kind of place that just reeks of waste and mismanagement at every level.
They had installed a system to distribute training and instructional videos to every store, as well as recorded daily broadcasts to all store employees as a way of reducing management time spend with employees in the morning. This system had cost a cool 400M USD, not including labor and upgrades for round 1. Round 2 was another 100M to add a storage buffer to each store because they'd failed to account for the fact that their internet connections at the store and the outbound pipe from the DC wasn't capable of running the public facing e-commerce and streaming all the video data to every store in realtime. Typical massive enterprise clusterfuck.
Then security gets involved. Each device at stores had a different address on a private megawan. The stores didn't generally phone home, home phoned them as an access control measure; stores calling the DC was verboten. This presented an obvious problem for the video system because it needed to pull updates.
The brilliant Infosys resources had a bright idea to solve this problem:
- Treat each device IP as an access key for that device (avg 15 per store per store).
- Verify the request ip, then issue a redirect with ANOTHER ip unique to that device that the firewall would ingress only to the video subnet
- Do it all with the F5
A few months later, the networking team comes back and announces that after months of work and 10s of people years they can't implement the solution because iRules have a size limit and they would need more than 60,000 lines or 15,000 rules to implement it. Sad trombones all around.
Then, a wild DBA appears, steps up to the plate and says he can solve the problem with the power of ORACLE! Few months later he comes back with some absolutely batshit solution that stored the individual octets of an IPV4, multiple nested queries to the same table to emulate subnet masking through some temp table spanning voodoo. Time to complete: 2-4 minutes per request. He too eventually gives up the fight, sort of, in that backhanded way DBAs tend to do everything. I wish I would have paid more attention to that abortion because the rationale and its mechanics were just staggeringly rube goldberg and should have been documented for posterity.
So I catch wind of this sitting in a CAB meeting. I hear them talking about how there's "no way to solve this problem, it's too complex, we're going to need a lot more databases to handle this." I tune in and gather all it really needs to do, since the ingress firewall is handling the origin IP checks, is convert the request IP to video ingress IP, 302 and call it a day.
While they're all grandstanding and pontificating, I fire up visual studio and:
- write a method that encodes the incoming request IP into a single uint32
- write an http module that keeps an in-memory dictionary of uint32,string for the request, response, converts the request ip and 302s the call with blackhole support
- convert all the mappings in the spreadsheet attached to the meetings into a csv, dump to disk
- write a wpf application to allow for easily managing the IP database in the short term
- deploy the solution one of our stage boxes
- add a TODO to eventually move this to a database
All this took about 5 minutes. I interrupt their conversation to ask them to retarget their test to the port I exposed on the stage box. Then watch them stare in stunned silence as the crow grows cold.
According to a friend who still works there, that code is still running in production on a single node to this day. And still running on the same static file database.
#TheValueOfEngineers2 -
It’s pretty awesome to hear that computer science played a big part in yesterday’s Event Horizon blackhole image.3
-
There is just one thing that's been haunting me.
One.
Thing.
That I have yet to succeed at doing.
One thing.
That I have yet to understand it's mazehole.
ONE THING.
That I failed me as a developer.
How in the FUCK do I create my own mail server with my own domain name? HOW? JUST FUCKING HOWWWWW
WHAT THE FUCK IS THE SECRET!
WHAT AM I MISSING!!!!!
(no don't tell me about any of those office 365/GoDaddy/Windows bullshit, just guide me with something normal)8 -
Downloaded my website backup from godaddy
Opened backup file (many folders inside)
Opened folder /va and found 1 file with my website name
Opened the file and inside
*: :blackhole:
I didnt know my website was a blackhole -
Each time I try to study someone else’s (cool) JS files, to learn from it, there are always some funky function calls that throw me off. I wish the person could be beside me and just walk me through why they did what they did at each step.
It’s just tough sometimes. I see all these cool projects on GitHub and I go, “let me try to analyse it,” and then I see all these properties too. Sometimes I feel compelled to just check the API but it seems like I’d be going into a blackhole of never-ending API depths.
What are some tips that you JS pros have?2 -
I think my HDD just imploded on itself....sounded like the Age of Ultron Sarcovia imploding blackhole scene was happening inside of my rig.
Half asleep on my desk and that noise scared the shit out of me. It was one of my redundant drives so everything should be okay...but still, I'll have to check in the morning and see if anything else got fucked. I'm scared to look - Tomorrow Rundle's problem.
Goodnight devRant <33 -
If I ever fall into a blackhole I dont think there's any "big and tall man" shop anywhere this side of the universe that sells clothes big enough to compensate for spaghettification.
There *might* be one on the *other* side though (assuming I make it through the blackhole first).
Their foot traffic must suck though.3 -
Skein: noun - a type of access modifier, allowing a property to be read internally or externally, but only written to *externally*. See "orwell" for opposite access modifier.
hermit (noun) - an access modifier specifying a property may only be written or read internally.
Gopher (noun) - an access modifier not to be confused with a groundhog.
Blackhole (noun) - can be written to, can never be read. See dev/null for details.
In other news I wrote the basis for a cms in lua.
Because I hate the cloud. -
So while we all ranting about Mozilla fucking up, has anyone ever used a pi-hole?
If anyone who doesn't know what a pi-hole is, it's basically a blackhole for ads which works across all your devices in the network3