Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "identify"
-
Hoorah! My code finally works! Now gotta remove those 1000 print statements I used to identify the bugs 😥11
-
Your profession changes how you think.
Coding did the same for me. Some good, some bad.
The good:
I know which problems in life are worth trying to solve.
And I'm very good at solving those problems.
I can analyse a situation accurately. I don't get emotional and panic.
I can immediately identify logical flaws in people's thinking.
I can identify biases in others and myself.
The bad:
I tend to follow simple instructions to the letter and rarely improvise based on reality.
When my wife tells me her problem I try to solve it instead of empathizing - which is what she really wants.
I haven't developed street smarts or the ability to convince people with anything other than logic - but people are more emotional than logical.
I'm not good at small talk.15 -
Do you have thousands of unidentified songs, all named consecutively Track 1?
This application will help you to finally identify those songs with a simple drag and drop.49 -
Hi everyone,
Over the last couple of days we experienced an issue posting images on devRant posts and comments. This issue should now be fixed.
Apologies for the delay, it to address, it took some digging and we had some alerting that failed that would have helped quickly identify the source of the issue, but unfortunately that part of the alerting wasn't working as expected.
Despite the issue being fixed, there is a bit of additional maintenance that will take place to prevent it from occurring in the future. There could be a couple of minutes of downtime today, March 13 at around 10pm EST, but I'm hoping that can be avoided. I will update in the comments on this rant.
Lastly, and unrelated to this issue, an academic research team has been working on a project involving devRant/types of content posted, and would appreciate feedback and help with a short survey they put together for anyone who is interested: https://devrant.com/rants/3923796/...
Thank you again for the patience and feel free to let me know if you have any questions.
p.s. attached is a relevant meme, according to some people, who thought/hoped this was a feature :)
16 -
An Arch Linux user is like a Vegan. If you can't identify one, wait till they announce it to the world!
P.S: I'm a vegan!30 -
Manager: We do not identify as a tech company so don’t expect tech company salary increases this year
Dev: Well don’t expect me to bring a tech work ethic then
Manager: !!5 -
Welcome to HRMC online.
Please enter your login
Now enter your Gateway ID
Password please
Now User ID
Government ID please
Enter a code we've texted your old number
There's a scroll in your garden. Find it.
Latin name for fox
Your name in Sanskrit
176th digit of Pi
We couldn't identify you.
Last three letters of your father in law's number plate
Your inner-most fear
7523/42*3.5
Your provisional driving license expiry date
Your first girlfriend's mother's maiden name
Capital of Belarus
King Arthur's burial coordinates
You answered all of those correctly.
We still don't recognise you.
A letter containing a government code that relates to none of the above will arrive by boat in 12 to 14 weeks.
Thank you for using HRMC online. We value your feedback. Please stand outside your back door any howl a number between 1 and 10 at the moon.
OP: https://mobile.twitter.com/jbwol/...
Can confirm. It is really like this.7 -
What if CAPTCHA isn't there to keep robots out, but to identify humans for the coming robot uprising?4
-
My Typical Project
1. Identify common problem
2. Investigate options
3. Come up with clever solution
4. Implement backend solution
5. Get fed up with current frontend
6. Investigate other frontend
7. Realize perpetual chaos in Javascript landscape
8. Lie down in a corner
9. Cry myself to sleep4 -
Way to fucking go, Austria wants to push a law that forces online platforms (if possible around the globe) with more than 100k users to provide an accurate way to identify them.
"Name, surname and adress"
I just listened to an interview with a guy who is for that proposal. He said the platforms can just take the data directly from mobile providers, using the phone number. Also, even buying a prepaid sim-cards will require you to provide an identity card.
Way to fucking go! They say it's rather unlikely that this proposal will get approved by the EU, but given the shit they just pulled on us, I wouldn't be surprised in the slightest id these fuckers just go with it.
Where is our precious privacy going? Some old pedophiles are taking it away from us, into their sex dungeons I suppose...
Unfortunatelly this is a rather new proposal, so I can't find an english article covering this story attack
https://br.de/nachrichten/netzwelt/...
13 -
more buzzword translations with a story (because the last one was pretty well liked):
"machine learning" -> an actual, smart thing, but you generally don't need any knowledge to use it as they're all libraries now
"a bitcoin" -> literally just a fucking number that everyone has
"powerful" -> it's umm… almost working (seriously i hate this word, it really has a meaning of null)
"hacking" -> watching a friend type in their facebook password with a black hoodie on, of course (courtesy of @GeaRSiX)
"cloud-based service" -> we have an extra commodore 64 and you can use it over the internet for an ever-increasing monthly fee
"analysis" -> two options: "it's not working" or "its close enough"
"stress-free workplace" -> working from home without pants
now for a short story:
a few days ago in code.org "apscp" class, we learnt about how to do "top down design" (of course, whatever works before for you was not in option in solving problems). we had to design a game, as the first "step" of "top down design," we had to identify three things we needed to do to make a game.
they were:
1. characters
2. "graphics"
3. "ai"
graphics is literally a png, but what the fuck do you expect for ai?
we have a game right? oh wait! its getting boring. let's just sprinkle some fucking artificial intelligence on it like i put salt on french fries.
this is complete bullshit.
also, one of my most hated commercials:
https://youtu.be/J1ljxY5nY7w
"iot data and ai from the cloud"
yeah please shut the fuck up
🖕fucking buzzwords6 -
I'm wondering, what's you guys/gals/linux kernels/however you identify yourself 'superpower'?
I think that nearly everyone has something which can be extremely useful (maybe not healthy) and which not many other people you know have.
In my case it's that i can manage with extremely variable sleep patterns and when needed, I can sleep very short for days in a row (3-4 hours a night) and I'm all good. Nearly all friends/family that I have NEED regular sleep patterns + at least 8 hours of sleep but i can very much manage without those. Very useful when having disruption service and stuff.
Please post yours in the comments if you're comfortable with that!39 -
Today I wrote a Neural Network in python for the first time, that could identify between strings, numbers and dates. Although the feat may look small it's a very proud moment for myself8
-
Fresh internship story/conversation (Part 1)
Happened today:
- "Can you hack someone via cmd?"-cheap coworker at my internship workplace
- "Can you hack the NSA from any device?"-cheap coworker
- "Can the police identify me, if my face is on a Youtube video?"-cheap coworker
- "I can see all devices I have been through when I want to connect to a target as a route.
*talks about hops in a trace route, but uses non-technical terms for it*
*uses "ping host wikihow.com" instead of "tracert wikihow.com" to demonstrate it, besides of that "host" was not supposed to be there in that command*
*he had to google how to use the ping command on Windows*
*finally uses the ping command properly*
"Here, you can see all the devices our machine has connected to to reach the target"
ME: Aha. But dude... you know that all these ip adresses are in fact the same ip. These IPs are not any different. They are all the same. Besides of that this IP is the IP of this *points to domain name on windows cli* domain.
Him: Oh... I had a friend named ... *continues telling me some "hacker stories" from his past*
Me: *ignores him and always just responds with "Aha" to him* -cheap coworker
Happened yesterday:
- "You have programming classes? You must be an expert in Excel then, right?" -internship boss3 -
I'm currently looking for an internship related to machine learning (finishing my Msc).
WHY ON EARTH ARE ALL (or at least 80%) INTERNSHIPS PROPOSALS ABOUT BANKS, FINTECH, INSURANCES AND SO ON ?
I mean, we can now create music, identify tumerous cells, generate realistic pictures of anything you could dream of, drive cars without human interaction, create amazing chatbots... But no, I guess all that shit can't make enough money, better work on a system that will refuse you a loan.
Makes me really sad. I mean whats the point of studying the coolest techs around if it is not for the greater good ?
I might be utopist though.rant i guess those tags have no limits selling your soul to the devil love you all you have no power here machine learning5 -
How to be a successful developer:
1. Identify a problem that you don't know the answer to.
2. Spend 10 minutes searching Google for a solution, trying various keyword combos.
3. Click the link to the solution in Stackoverflow.
4. Find the solution with the most +1's.
5a. If solution looks good, implement the solution in your code.
5b. If solution is not applicable, return to step 2.
6. Test your implementation.
7a. If the problem is solved, bask in the glory of success and return to step 1.
7b. If the problem is not solved, move your hand vigorously through your hair, pulling out several strands. Exhale loudly. Next return to step 2.4 -
Currently getting into Machine Learning and working on a joke-project to identify the main programming language of GitHub repositories based on commit messages. For half of the commits, the language is predicted correctly out of 53 possible languages. Which is not too bad given the fact that I have no clue what I'm doing...
9 -
The biggest passion of them all, for me: music.
In my case this is rawstyle/raw hardstyle/hardstyle but especially the most brutal rawstyle.
I love the energy it gives me and to listen to the techniques the artists use and also that, after a while, while the kicks all sound the same for many people, immediately identify the artist behind a kick when even hearing it for the first time (90 percent accuracy).
I'd love to produce it but I lack the skill set to do that as for now 😥
A tattoo related to this music genre is coming soon :D9 -
TL;DR Client managing their own ticket is never a good idea.
So my client got access to their own ticketing system. Now instead of going the usual route, they assign the tickets directly. Sometimes going as far as editing the tickets themselves.
But the biggest issue has been the Estimated Resolution Time. This is what happened when I asked about it.
Me: So I noticed that you started including an estimated time of completion.
Client: Yeah, it's an internal thing to help us identify when things will be done and where to focus our attention.
Me: Ok, and what is this time based on? (How do you, a non-dev, can decide how long it should take?)
Client: Oh don't worry it's just an internal thing. You won't be measured against it.
Me: (Sure) Alright, I'm just letting you know that I will be changing these as necessary.
I basically ignored the conversation after this. But the fucker still gives me absurd deadlines. Seriously, what makes managers think they know how long a development should take?2 -
That feeling when your client connection is more stable than the connection of a fucking game server... Incompetent pieces of shit!!! BEING ABLE TO PUT A COUPLE OF SPRITES DOESN'T MAKE YOU A FUCKING SYSADMIN!!!
Oh and I sent those very incompetent fucks a mail earlier, because my mailers are blocking their servers as per my mailers' security policy. A rant from the old box - their mail servers self-identify a fucking .local!!! Those incompetent shitheads didn't even properly change the values from test into those from prod!! So I sent them an email telling them exactly how they should fix it, as I am running the same MTA on my mailers (Postfix), at some point had to fix my mailers against the exact same issue as well, and clearly noticed in-game that they have deliverability problems (they explicitly mention to unblock their domain). Guess why?! Because their server's shitty configuration triggers fucking security mechanisms that are built against rogue mailers that attempt to spoof themselves as an internal mailer, with that fucking .local! And they STILL DIDN'T CHANGE IT!!!! Your fucking domain has no issues whatsoever, it's your goddamn fucking mail servers that YOU ASOBIMO FUCKERS SHOULD JUST FIX ALREADY!!! MOTHERFUCKERS!!!!!rant hire a fucking sysadmin already incompetent pieces of shit piece of shit game dev doesn't make you a sysadmin2 -
So customers can place orders at our website, but some of the products are actually handled by a third party. We use a web service to communicate about these orders. Obviously, we need a way to uniquely identify each order, and decided with this other company that we would use a simple incrementing integer.
Last week, something strange happened: we could no longer cancel orders by their ID, because according to the web service, the orders were placed too long ago and were no longer eligible for cancellation. But I knew that could not be true: the orders were from last week. So I checked out database, turns out the ID's are not so unique: some refer to two or three orders. Somewhat worried, I contact the guy responsible at the other company and ask him how that could ever happen?
He: "Yeah, when we restart our server, the counter goes back to 1, you see. I didn't think that would be a problem...".
REALLY?! YOU DIDN'T THINK?5 -
When migrating from MySQL server to MariaDB and having a query start returning a completely different result set then what was expected purely because MariaDB corrected a bug with sub selects being sorted.
It took several days to identify all that was needed on that sub select was “limit 1” to get that thing to return the correct data, felt like an idiot for only having to do 7 character commit 😆4 -
Project manager: I haven't seen an automated email go out in a while.
Me: ok let me check. Can you provide me a previous email for reference?
Project manager: no
*Itterate 3 times*
Me: ok, does this template resemble the email you're missing?
PM: no
*End itteration*
PM after 3rd attempt to identify the email they're missing: comes into my office and tells me he's not even going to answer my emails anymore cause I can't find his missing email.
Me: finally nails down the email he's *missing* and there's nothing wrong with it.
PM: doesn't believe me.
I fucking hate bad PM's. Asshole can't be bothered to provide usefull information to save his life then questions everything I tell him and thinks I'm the idiot when it takes me 3x as long to fix/find something.6 -
We are devs right?
We have cpus and gpus lying around right?
We are still alive... right? 🤔
How about we do our part and utilise our PCs for helping with COVID-19 research.
I've stumbled across this little tool that not only keeps me warm at night but helps researchers with several diseases.
https://foldingathome.org/iamoneina...
It's like a a bitcoin miner but for research purposes, no it's not a dodgy bitcoin miner.
Oh and feel free to keep yourself anonymous as there are stats that will identify your username - when they work.
There are installers for windows, Mac, and linux distros so everyone can get involved.26 -
Why did suddenly all websites start putting recaptcha in front of every user submission? Have they not heard of request limiting? I'm so tired of having to identify bridges, store fronts, cars, and unicorns before being able to do ANYTHING on the internet. For fuck's sake.10
-
The moment when you are able to identify the programming language in the movie you are watching and you know they are doing bullshit...2
-
Google: "How do we have millions of people identify images for us so we can reinforce our image recognition software?"
Answer: reCAPTCHA1 -
Frack..people suck.
In sprint planning meeting, prioritizing the tasks...
ScrumMaster: "Next item, create a spreadsheet that identifies the systems used by order processing so the PO can identify errors by system."
Me: "That's already done."
ScrumMaster: "Did you work ahead of the sprint again?"
- Really trying not to throw something heavy at his head.
Me: "No, you did back in January."
- SM stutters..um..uhhs...
ScrumMaster: "No, I never did that...see."
- SM navigates to the sharepoint directory
Me: "Yep, there it is."
ScrumMaster: "I didn't create it, you must have."
Me: "Created by...you."
ScrumMaster: "Uh...um....I might have added it to sharepoint, but doesn't mean I created it. Anyway, lets take a look..."
- opens the spreadsheet
ScrumMaster: "What is this? Did you simply export the sharepoint list to excel?"
- Getting harder and harder to resist the urge to throw something heavy at his head.
Me: "I don't know what that is, you created it. You commented on the Trello card that this task item was done."
ScrumMaster: "No, I've never seen this or made any comment on the Trello board...lets look ..."
- FRACK!!! TRELLO IS DOWN!!!
ScrumMaster: "When Trello comes back up I'll assign the card to you. Lets stay on task with the cards from now on. Next item ... "
Trello up, 3 hours later, back at my desk, there is his fracking comment from January about uploading the spreadsheet to sharepoint. Frack frack frack people suck3 -
The key to survive your job, is to not really care.
But I am that kind of person who takes my job personally, and it becomes a part of my identify, and companies exploit it.6 -
Follow up to yesterday’s “hybrid/cross-platform is shit” rant about Electron apps being blocked from the Apple App Store.
See the below image of the github issues template on the Electron repo, to file an issue for this problem.
Yes, this is such a common issue with their product, they’ve made it easier to file a github issue. Let’s not address the fact that there is a fundamental flaw in the approach they are using, let’s just make it easier to open a ticket while everyone waits to see if we are allowed to ship our app.
I’ve also heard talk that under some circumstances it’s possible for them to patch out the libraries causing issues. Apple provides tools to identify these libraries ... therefore Electron is doing fuck all to adresss this issue, and adopting a “wait until someone complains” style of approach.
A+
7 -
Semi-Rant
At first I really was gonna keep quiet about the whole Linus topic. But then I just saw Mark wrote this article 4 days ago.
Why Being an Asshole Can Be a Valuable Life Skill https://markmanson.net/being-an-ass...
Nobody can be fucking perfect. Nobody can be fucking everything. Through our lives from the first cry to last breath, we lost certain shits while gaining some shits. I'm not talking about materials and tangible things here. I mean losing shits like ability to understand emotions or loving or being empathetic and etc. But in return for those lost, you may have a superb understanding on different topics and ability of amazing concentration and freedom.
So I'm not saying that you have to be a nasty jerk to be successful. I'm saying you might be a nasty jerk since you are successful. And if you seriously think you need to improve yourself and do something about it, ok good for the rest of people around you.
Will the outcome be good for you? I'm not sure. I doubt it. The older we grow, the higher we reach, the stronger bond to our identify is made. Looking ownself as a total jerk and trying to improve it is probably the hardest task a guy can get in my opinion.
23 -
"A Single Line of Computer Code Put Thousands of Innocent Turks in Jail"
I'll leave the title as it was, but people were hunted down just for having been once logged by a tracking pixel inside a messaging app.
Simply terrifying, I hold that off for a while, since it sounded like the usual fakes, but it seems its not, as more and more keep confirming it.
"The government eventually exonerated 11,480 of the wrongly accused, but some had already spent months in prison, and reportedly some even committed suicide."
"Elif finished dressing her youngest and watched police search her family's home before they took her into custody — for using a messaging app the government deems seditious.
She knew the arrest was coming. She'd already lost her job, because traces of the app known as Bylock were found on her phone"
"The regime relies on logs from the country's ISPs to identify users of Bylock, fingerprinting them on the basis of their communications with Bylock's servers. These communications can be triggered without using Bylock, though: Bylock's tracking pixel was used for analytics for pop-up ads and in at least eight apps."
https://m.slashdot.org/story/336657
http://cbc.ca/beta/news/...
https://boingboing.net/2018/01/...
7 -
I've seen a job vacancy that asks for the following characteristics in a developer:
- extraverted, do'er (as opposed to thinker), out-of-the-box, curious, sees solutions and not problems, structural thinking vs. theoretical thinking, loves change, acts immediately, makes choices under stress, critically questions themselves if things go wrong
What the [censored] kind of programmer is that? Sounds more like a wannabe brogrammer type.
A typical, real programmer is introverted (for he is introspective, detail-minded and is therefore good at inspecting problems and finding solutions for them).
Seeing problems is not a bad thing, it's in fact necessary to be able to identify issues and not act like your typical manager who only wants to rush to solutions. He thinks deeply and theoretically before he takes action. Theory is the foundation of identifying a problem.
What programmer is stress-resistant? It's not normal for the human brain to be able to deal with stress; this is why switch-tasking is so hard.
Question yourself if things go wrong? Perhaps, but this sounds more like trying to shove the blame around.
Since we live in a rigid computer world with rigidly-defined protocols (say, HTTP), it is often useful to think in a conventional way. Out-of-the-box? Sure, if you're being innovative, or sure, as a tangential characteristic.
In my professional opinion, this vacancy reeks of bad corporate culture.. and the biggest alarm bell I find is: "There is free beer!" Err.. yeah. Anyway.8 -
I hardly even know javascript, but I was able to identify and fix a problem in my Father's corporation website. Should I be worried, that the developer working for him wasn't able to do so?5
-
GitHub
This repo contains the following languages:
- PHP 58%
- HTML 34%
- Javascript 5%
- CSS 2%
- Ruby 0.6%
- Hack 0.3%
- NASL 0.1%
The last 3 are not in this repo.
Don't fear about AI taking our jobs, it still can't identify what languages it's looking at.18 -
Howdy my binary friends and those who identify as an attack helicopter or an Amiga 500, I was away from devRant for about 2 weeks or 4 because I had to order a new touchscreen (who cares anyway).
Have I missed something on devRant?
Let me just freshen up my dictionary with Alex's rants, be right back.20 -
Best thing to do when you're having a bad day:
> Post a video on YouTube telling people that you're developing a machine learning algorithm for drones to identify obstacles.
> Show them a basic HTML code on your computer screen.
> Disable the comments3 -
1. Identify the problem
2. Come up with a clever solution
3. Refactor half of your code
4. Watch it fail horribly because you're such an idiot it's a bloody miracle you keep breathing on your own
5. Repeat2 -
Dear Friends,
As a husband, I've sat next to my wife through eight miscarriages, and while drowning my sorrows on Facebook, face the inundation of pregnancy and baby ads. It's heartbreaking, depressing, and out right unethical.
How can we, as developers who conquer the world with software solutions, not solve this problem? Let's be honest, it's not that we cannot solve this problem, it's that we won't solve it.
We're really screwing this one up, and I'm issuing a challenge - who's out here on devRant that can make the first targeted "Shiva" ad campaign? Don't tell me you don't have the data in your system, because we all know you do. Your challenge is to identify the death of a loved one, or a miscarriage, and respectfully mourn the loss with no desire to make money from those individuals.
Fucking advertise flower delivery services and fancy chocolates to the people in THEIR inner circle, but stop fucking advertising pregnancy clothes to my wife after a miscarriage. You know you can do it. Don't let me down.
https://washingtonpost.com/lifestyl...11 -
So... After reading up on the theoretical stuff earlier, I decided to make a real AI that can identify handguns and decide whether it's a revolver or a semiautomatic with 95 percent accuracy...
Well, basically, I been browsing my local gun store's online store for four hours for training data, killed a Mac mini while first training the system and I think I ended on the domestic terrorism watch list... Was that black sedan always there?
Anyway... It's working fairly accurate, my monkey wrench is a revolver by the way.
Isn't AI development a wonderful excuse for all kinds of shit?
"why do you have 5000 pictures of guns on your computer?" - "AI development"
"why did you wave around a gun in front of your web cam" - "AI development"
"why is there a 50 gram bag in your desk?" - "AI development"
Hmm... yeah well... I think it might work. I could have picked a less weird testing project, but... No.7 -
Idiot group: "We have no servers like that."
My group: Turns off mystery server no one can identify.
Idiot group: "HEY THAT WAS OUR SERVER YOU FUCKS HOW DARE YOU."1 -
I’m sure many of you are well aware of this, but I just ran across this today and found it amusing. Apparently, Chrome uses the term “zygote” to identify child processes. 😁
1 -
SCREWED OVER GOOGLE WITH MICROSOFT!!!! YES!!!
So as I'm deaf, I've always had a problem with captions or lack of them.
I thought Live Captions would fix it but it's only supported on selected devices and not enabled for calls and conferences like Zoom, WhatsApp.
I tried hooking up my sound card with an audio capble to my phone which has LC and also Live Transcribe... but somehow wouldn't pick up the audio.
Then today I was like wait... I could just install a Pixel emulator... excepy seems Google thought of that...
(I installed VB Cable virtual sound card and routed sound out to mic in).
Well first apparently, the emulator does not actually identify as Pixel... it identifies as an Emulator that sorta looks like Pixel...
Which means no LC...
I installed LT and also a sound meter which confirmed it was getting the audio but no transcription...
Though I tried GBoard and it sorta worked..
But I would like continuous transcription... and so I open the app store and try all the apps until I hit MSFT Translate...
Which has a convo mode which seems pretty much designed to screw Google over lol. Just need to start a Convo with myself...
25 -
Rant!!!!!!!
When you work hard on building frontend and suddenly, you realise whenever you restart your localhost, some URLs don't work. And it's random. Error logs also seem meaningless as the latest error report keeps changing the error location from file to file. Wasted hours to identify the abnormal behaviour.
I always had the mentality to keep its programmers fault in order to always consider all possible flaws.
But realised later that it was the OS setting issue. Did a stacktrace about 300 lines and found out the root cause(hopefully as no issues till now). The bug was related to total allowed open files at a time.5 -
Maybe not worst, but most frustrating. One of the systems I helped maintain at my first job had a few different bugs that caused bad data in the database. The "solution" to the problem was to write SQL queries to directly fix the production data. This would take one member of our team (it rotated weekly) about an hour every day to fix because there were literally dozens of these errors.
All the devs knew that we could identify the root cause and fix it in, probably, 3-4 days tops. Management would never approve the time because it would take longer to fix the root cause than it took to fix the data.
I worked at that company for 7 years. The bug was there when I came on, and it was there when I left.2 -
Aus Gov: here's a bright idea, let's enforce social media accounts being verified with enough identification to pull of identify theft with ease for the greater good.
https://news.com.au/technology/...
Facebook: 533 million accounts leaked with names, email, phone, address details.
https://mobile.twitter.com/UnderThe...
Me: 🤦♂️12 -
Dear intellectual crew, your double-digit IQ little shitposter needs your help.
The situation in Russia is always bad and it will always become worse and worse. In addition to that, it's illegal to have medications that can potentially cure me. Add 15 sunny days a year in my city and it becomes clear that I need to leave.
However, despite the absolute lack of sunny days, I FUCKING LOVE my city, Saint-Petersburg. When I was living in Moscow for like six months, I liked Moscow but I was missing my city every single day. Sometimes I forgot that I'm not in St. Petersburg anymore, tried to figure out what street I'm on, realized that I'm in Moscow and felt like I'm physically suffocating. I always miss my city so bad.
I'm not going to talk about why do I love it so much. If I ever start, I'm going to write a book about it.
Questions are:
1. Is it Stockholm syndrome? I don't miss Russia and don't identify myself as Russian. I only miss one city and I wasn't even born here.
2. How do I leave in that mental state?
This is the only problem that is holding me. Money, finding a place to stay and finding a job I can approach rationally, but my problem I can not.24 -
dream project you say. now we're getting somewhere interesting.
a voice/gesture activated automatic assistant that uses face reconition for identify checking along with it being able to see your mood.
tl;dr; aka jarvis6 -
A vendor gave us what is turning out to be a very stable storage appliance/software, so we're happy for that. But even so, disks fail. So we need an automated way to identify, troubleshoot, isolate, and begin ticketing against disk failures. Vendor promised us a nice REST API. That was six months ago. The temporary process of SSHing(as root) to every single appliance(60-200 per site, dozens of sites) to run vendor storage audit commands remains our go-to means of automation.6
-
In my three years experience so far I can honestly say that 100% of the developers I've worked with are narrow sighted with regards to how they develop.
As in, they lack the capacity to anticipate multiple scenarios.
They code with one unique scenario in mind and their work ends up not passing tests or generates bugs in production.
Not to say I'm the best at foreseeing every possible scenario, but I at least TRY to anticipate and test my code as much as possible to identify problems and edge cases.
I usually take much more time to complete tasks than my colleagues, but my work usually passes tests and comes back bug free. Whereas my colleagues get applauded for completing tasks quickly but end up spending lots of time fixing up after themselves when tests fail or bugs appear.
Probably more time wasted than if they had done the job correctly from the start. Yet they're considered to be effecient devs because they work "fast".
Frustrating...5 -
Work out the major requirements,
Identify platform(s) and environment best suited to project,
Design and develop around core features,
Allow 6-12 weeks for scope creep and the additional BS features,
Build, test and deploy in a week or two to meet unattainable deadlines.
Spend new couple of months refactoring and fixing everything. -
Google just crossed the line from amazing to scary . It somehow took photos from my phone and arranged it periodically and even named that album like "Jaipur Trip " , "Sunday morning at blah blah.." .
How the frake did it know that i was on a trip to Jaipur ? and how the frake did it identify the exact park's name with scary accuracy..?
P.S. I never gave Google photos any access..And i didnt upload them in drive..28 -
i honestly hate the ap computer science principles curriculum. we're taking an ap test soon, so for the past few weeks, we've been constantly taking practice tests.
it pisses me off so much. the questions, the criteria, it's all bs.
we have questions like "what will reduce the digital divide?" with choices like "education for low income families on computers." like, I DONT FUCKING KNOW.
frankly, I DONT FUCKING CARE. giving electronics to people who cant afford it is great and all, BUT IT DOESNT INVOLVE ANYTHING ABOUT COMPUTING.
HEY, COLLEGE BOARD, KNOWING IF AN ALGORITHM IS TECHNICALLY AN "ABSTRACTION" DOESNT FUCKING MATTER. WHAT MATTERS IS THAT I CAN IDENTIFY WHATS MORE EFFICIENT, WHERE A BUG IS, CONCEPTS INVOLVED IN PROGRAMS, THINGS LIKE THAT.
NOT IF DNS IS SIMILAR IN STRUCTURE TO THE US POSTAL SYSTEM.
god i hope whoever wrote this gets hit in the head by a github server that was dropped from the 2^8th floor.1 -
Our company wants us to fill out monthly surveys to tell managers how happy we our at work and to give them feedback. The survey will not be anonymous as they asked us to self identify.
Also the company is small (just over 100 people) and over 1/3rd of staff have been fired over the past year.
Yeahhhhh, how about no4 -
I love the fact that once you pass enough time in DevRant you begin to identify people rants and comments by their avatars. Anyone else has that reflex or my brain's RAM is just taken by chrome and it is easier for me to just remember some pixels? xD2
-
The Linux sound system scene looks like it was deliberately designed to be useless.
ALSA sees all my inputs and outputs, but it can't be used to learn (or control) anything about software and where their sound goes. Plus it's near impossible to identify inputs and outputs.
PulseAudio does all sorts of things automatically, but it's hard to configure and has high latency.
JACK is very convenient to configure, has great command line tools (like you'd expect from Linux), is scriptable, but it doesn't see things.
Generally, all of these see the others as a single output and a single input, which none of them are.11 -
@AlexDeLarge and any other React guys, which do you prefer? Traditional css files, whether that be vanilla or with a preprocessor, or style objects for each component.
There are some pretty clear pros i can identify for both sides, but I'm pretty sure I'm missing somethings and I'd like to hear from you guys your opinions and experiences with either27 -
Any tips on nailing OOP design interview questions? This is a black hole, weak area for me, and I get absolutely no feedback on what I'm doing wrong.
I feel like most of it is because I *nothing* about what I'm asked to design.
And yes, I ask clarifying questions, list out use cases and constraints, identify nouns/verbs and map them to objects/methods - but these don't help with the overall *design* when you can't even grasp what the components are, nor which parts need extensibility.
Imagine you've *never* been inside a car, let alone even understand there's components to a car (you don't even know that cars have engines, or that they take fuel). Now imagine you're asked to design a car. It's just, silly.
14 -
Once again I have loads.
My best teachers were...
The contractor that taught me C#, ASP MVC and SQL Server. Dude was a legend, so calm and collected. He wanted to learn JQuery and Bootstrap so at the same time as teaching, he was learning from me. Such an inspirational person, to know your subordinates still have something to teach you. He also taught me a lot about working methodically and improving my pragmatism.
The other, in school I studied computing A-Level. 100% scored at least one of the exams... basically I knew my stuff.
But, as a kid, I didn’t know how to formulate my answers, or even string together coherent answers for the exams. This dude noticed, first thing he did was said “well you’re better at this bit than me, practice but you’ll be fine” (manually working out two’s complement binary of a number).
Second thing he did was say “you know what man, you know what you’re on about but nobody else is ever going to know that”.
He helped me on the subjects I wasn’t perfect on, then he helped me on formulating my answers correctly.
He also put up with my shit attendance, being a teenager with a motorcycle who thinks he knows it all, has its downsides.
As a result, I aced the hell out of that course, legendary grades and he got himself a bit of a bonus for it to use on his holiday. Everyone’s a winner.
Liam, Jason, if you guys are out there I owe you both thanks for making me the person I am today.
The worst, I’ve had too many to name... but it comes down to this:
- identify your students strengths and weaknesses, focus on the weaknesses
- identify your own and know when to ask for help yourself
- be patient, learning hurts.
You can always tell a passionate teacher from one who’s there for the paycheck.1 -
In my case, the most unrealistic deadline was when I was put on a project for 30 person days in 2008. The project had been running for about 6 months at that point.
I spoke to the project manager about my tasks and she told me to finish the fat client. So I immersed myself in the sources. And I was horrified to realize that not only was it not even a POC, but the performance was lousy to say the least. It took about 70 (sic!) seconds to start the program, read in about 20 records from a database and display them as a hierarchical structure.
I asked the PM when I was supposed to have finished my work, and her response was, "Yesterday."
"Very funny," I replied.
"No, really," she said, "the deadline was yesterday."
It took me an afternoon to speed up the fat client startup to 6 seconds. And then it took us another two weeks or so to identify the processes in discussions with the technical project manager. Because that didn't exist yet either.
About 1.5 years after the deadline, the software system - consisting of the fat client, mainframe modules and purchased software - was stable enough to be rolled out. -
Another draw I found while cleaning my room. I made this on my last semester of the career at university.
Yeah, another Php. Remember the “Php elephant thong guy”? (Reference to another rant I posted) Here I’m fighting him with several programming languages. I remember that I made this because he only coded on php and jQuery, and I said to him “you’ll need to learn another languages if you want to apply to a new job”.
Which programming languages can you identify?
P.D. I don’t like PHP that much, I’d rather use Python or C#
2 -
FUCK YOU NBN.
It's taken this shit company 6 "Specialist" technicians and almost 2 months to identify that the connector from the mainline to the multiport is not aligning. Now I have a planned remediation date of the 15th October.
Possible 6 months without internet. FML18 -
If hiring managers really want to hire based on skill, what they should be doing is testing for one thing:
The ability to take a specification, written in general language, notice deficiency, communicate with the 'client' (manager) to hash out what needs done, and the (explicit) ability to read documentation on libraries or tooling outside the dev's core skillset.
If a dev can read a spec, talk to a client to work out whats lacking, and then identify what they need to know and where to find it, thats 90% of the skills they need from what I can see.
tl;dr version of it, is they should be explicit about the requirements for reading/implementing specs and finding the correct documentation.
Something along the lines of
"can you form your letters? Are you able to follow instructions on the back of a cake box? Then there may be a position waiting for you!"8 -
Spending hours trying to identify the source of your linking errors to find you misspelt #pragma once 😐
-
Around 6 years ago I started at this company. I was really excited, I read all their docs then I started coding. At every code review, I noticed something was a little off. I seemed to get lots of weird nitpicking about code styling. It was strange, I was using a linter, I read their rules but basically every review was filled with random comments. About 3 months in I noticed, "oh! there aren't actually any rules, people are debating them in my code reviews!" A few more reviews went by and then I commented, "ya I'm not doing any of this, code review isn't a place to have philosophical debates." All hell broke loose! I got a few pissed off developers, and I said, listen I don't care what the rules are, you just need to clearly fucking articulate them and if you want to introduce one, I don't care about that either just don't do it in the middle of my review. I pissed off 1 dev real bad. Me and this dev were working together, the QA person on the team stood up and said "hey! you know what I love about your code reviews?!" The other dev and myself looked at each other kind of nervously, "I love that you're both right, these are all problems!"... 1 year later (and until now) me and the other dev are still friends. Leave it to QA to properly identify the bug.
-
Arghhhhhhhh! What the hell is becoming of today's world?
So I have registration form that relates to parents signing up for a service and asking for ages of their children. Children are never older than 5 years old.
So, for each child the user specified the child's sex/gender (Boy or girl) and their age.
I'm still in disbelief over my client's request, that is marked "urgent".
I basically need to add to the list of options, as "boy" and "girl" are no enough and the question is now "too limiting".
I apparently need to add several more options including: "prefer not to specify", "geneder neutral", "bigender" and "genderfluid".
I mean how can a child aged 5 or less identify as "gender neutral" or "bigender" - how on earth are they able to decide.
Fine, if you're an adult and signing up to something like Facebook, have your 80 odd options. But for children under 5 how have no idea wtf any of this means, stuff like this really annoys me.15 -
Fuck Governments and schools for not teaching kids basic financial knowledge or how to identify scams and how to determine if the returns that they got told are realistic.
The amount of people that call me and ask me if they got scamed or how to invest in something because I am "that guy" that they know that's into Computers honestly scares me. I think many countries have a huge problem with basic financial illiteracy. People call me all the time and ask me about investing in crypto currencies etc. or ask me if they were scamed and I often have to tell them that they indeed got scamed. Does that only happen to me or does it also happen to you guys?4 -
Bug requires 2 developers, full-time for 4 days to trace, debug, scratch heads, analyse logs. Third developer helping occasionally. Finally identify fix. Fix is 2 lines. D'oh.3
-
So I did a code review for a colleagues pull request and I've noticed that he hasn't written the PHPDocs for a lot of the classes and functions. One minor thing I wrote is to add the author for the class.
About 2 mins after writing that comment he came over to tell me why should he write the author in the comments when people can just go look at the git commit logs. I was like WTF? I asked why would he do that, his answer was that if there's an issue, we can just use git blame to identify the author. To me that makes no sense as git blame isn't supposed to be used like that.
It's guys like these are the ones who don't document anything whether in an online document or even in code. And they just make work harder for the rest of us.2 -
Client: We are completely unable to plan a construction project successfully. We want you to use AI to do all of our project planning for us. Our requirements are that instead of needing to spend any money or time planning we just want to press a button and have a computer instantly put together all of our project plans for us. The program also needs to identify optimizations on it’s own and change all related plans enterprise-wide. All copies of the plans should be able to be kept up to date at all times so we’re never looking at an old plan again. We also want the ability to print.
Dev: …10 -
Architect: "Inline sql is just as performant as a stored procedure and since it is in code its safer and easier to maintain."
Me, inside my head: "I bet I could do the pencil trick on him from 'The Dark Knight' and it wouldn't hurt him as much as suck the world into the small hole in the front of his head since it is clearly a vacuum which was meant to destroy the earth. This is an obvious plant by the lizard people as a test to see if we could identify them. Killing him would be a..."
Architect: "I mean isn't it still a best practice."
Me, out loud and deadpan: "No, that is wrong and it was never a best practice. "
Me, inside my head: "Crisis averted."4 -
I sexually identify as Objective-C
I actually would love to write everything in objective c
Even my node/react applications7 -
!rant
Don't know if you guys have this kind of boxed up stuff inside like me. I have good friends, I have a good gf, I have great family and nice colleagues. But there are still so many things I don't share with them, especially the negative feelings I usually possess. Even here I don't share all the deep dark stuff.
As much as I wanna share my true identify and personal info here, the reason I'm restraining myself from doing so is this is the only place where I can say whatever really I wanna say in my mind. Except my blog but then my blog doesn't have any reader.5 -
I was chatting with someone the other day, and during the conversation, it sounded like they would benefit from pair programming with someone and talking about the benefits of pseudocode. I offered to work on it with them (for free/for fun).
Then they said that they are looking specifically for queer and non-traditional gender identities to collaborate with.
Well. I've always been a supporter of all of the things, but it seems ridiculous to choose your friends and mentors - based on what they've got in their pants - and which places they like to stick it - and how they identify.
Immaturity comes in all flavors.4 -
"It's very unfortunate that someone has to sit 10 hours a day on a computer screen but that's what we are paying for."
Working with an EU client.
Task is in stages beginning from assessment of an 9 year old Salesforce instance, cleanup and then transition to lightning.
The deliverabale in the first stage is excel sheet - objects(2400+), fields, apps, packages, profiles(110k), users, perm sets, apex classes, triggers, pages, s-controls and insert each and everything that a Salesforce instance could have.
Each and every data needs to be, analyzed and documented with our recommendations before being sent over. (Finding duplicates in 110k profiles??)
Oh, did I tell you, this was to be done four weeks? Weekend goes to hell.
That's when this beautiful motivational line comes up from the bridge, "It's very unfortunate that someone has to sit 10 hours a day on a computer screen but that's what we are paying for."
Fortunately(un?), that part of project is done and over with.
Now comes the clean up, identify packages not being used, remove them, qa and then push for deployment.
Mind you, this project is to be 2 weeks long. Its Friday of the first week today. And I am still working weekends.
Can I say, FML?5 -
Ubuntu, Openbox, vim, duckduckgo, Gmail, mailgun, digitalocean, xterm, libvirtd, remmina, polipo, insomnia, ulauncher, copyq, nextcloud, rofi, ssh, bash, Firefox, Firefox-Dev, Vivaldi, steam, itch, git, proton, wine, vlc, cherry mx brown and black, android, mint mobile, Asus, amd, ubiquiti, and plex.
What's in your workflow?4 -
!dev
Childhood trauma has lasting effects and it's our own responsibility to identify them and break our barriers.
I have 2 projects, both of them are stuck because 1. Dependant on other team and I am not able to fix the setup of their service even after seeking help from them; 2. My setup of Android Studio started throwing error out of no where when I am low on time for merging the code to mainline, we need to perform QA and without my build working we might not be able to test a use case.
I have scrum tomorrow, I feel scared to tell this to my stakeholders just because I think they will think it's my problem. Something wring with me. As a child my father blamed me for the mistakes I didn't have any control over, again and again. Whenever I feel awkward in any situation I think that he must have said that how big of a dumb I am. How I don't have any brains to do anything. Those things still come to me. That's why I am scared, people will BLAME me for this. But I have worked on my capacity to solve this. That's it.
That's all that matters. I have seeked help already, now I need to discuss this with the management and not feel scared.6 -
Why can I not add a hairstyle, and expression to my duck?
@dfox not sure if I'm ready to identify with a duck who doesn't share my hair and always-suspicious look.1 -
Even the most widely used , greatest command "sudo" had a security bug which took years to identify.
So, next time if your product manager tries to screw you over a bug you can tell this as an example 😂😂1 -
I like my log messages to indicate automatically where in the code something happened, so that I can easily identify where a message originated from while tracking down problems.
In C/C++ this is nice and easy - write a logging routine, wrap it in macros for the different log levels and have that automatically output __FILE__, __LINE__ etc.
I wanted to do something similar in NodeJS, as I'd found myself manually writing the file name in the log message and then splitting functionality out into new files and it became a mess.
The only way I found to be able to do this was to create an "Error" object and access the "stack" member of it. This is a string containing a stack backtrace, suitable for writing to console/file. I just wanted the filename/line/routine.
So I ended up splitting the string into lines, then for each of the lines, trimming the surrounding spaces (or tabs?), and parsing them to see if the stack entry is inside my logger module. The first entry outside of that module must therefore be the thing that called it, so I then parse out the routine or object and method, filename and line number.
It's a lot of clumsy work but the output is pretty neat. I just wish it were simpler!2 -
(IMHO) The current system fails to identify that there are at least 2 main paths one can take in our field. Software engineering and computer science.
Software engineering should not be just a course. It should be a craft, a degree. Where one can learn practical things not just algorithms that are used in niche cases.
Computer science branch won't be that different from what we've got now. It can be even more focused on theory.2 -
This is gonna get someone illogically upset, but idc about that.
I know it's ignorance of semantics but I'm tired of propagated ignorance changing the meaning of things.
Non-binary is NOT a legitimate term for whatever 'gender' you are!
I get what *whoever-started-it* was going for, but it's NOT valid. If you want to say that youre not male or female, fine... just don't abuse binary systems to do it. Just say youre non-bool/anti-boolean or identify with one of the, apparently 50, shades of gray.
I keep getting into logical loops to nowhere about this nonsense. No one is even defining what's supposed to be the 1 vs the 0. Which then makes me think '1 must be male... genitalia=1 in many ways...' which then sources back to the historic validity of males vs undervalued/less than human interpretations of females...
Then <brake>.
Ofc these people aren't going into the historical significance... they don't even realise how binary works! Ofc they'd have no clue that all 0s= no data... and 0s only have significance when viewed in placement to the 1s.
Let's all start using proper terminologies, like non-boolean. Maybe i can start a trend by paying people pennies to learn/teach wtf a boolean value is, and that binary can represent anything. With proper encoding the array is limitless... so being binary is actually a giant spectrum... therefore makes no sense to be "non-binary".
Ok... im done. It had to be said.
Who wants to start identifying as non, or educating wtf is, boolean with me???34 -
- Searched for a cascader component for React
- Installed it
- Lost 2 hours trying to load dynamic options
- Turns out that there is a parameter named "isLeaf" to identify when a node have no children, which is also used to allow the loading of dynamic options
...
isLeaf...
isLeaf......
isLeaf.........
*chills*
1 -
Redux is weird, and I don't like it because it violates the most basic principles of responsibility. The concept of expressing state changes as reducers is nice because it can be duplicated, saved and restored and compared for equality. So is creating isolated accessors and selectors. However, I really don't think a reducer should be aware of its own position in the hierarchy. When specifying an action you aren't addressing a reducer, you're addressing the tree. That the tree doesn't manage this addressing and expects reducers to identify themselves is a bit strange, especially considering that the whole point of having a tree is that reducers shouldn't be affected by their position in that tree because they're pure. Same goes for selectors, they should belong to the tree, not to any particular sub-reducer. Separating the slices is reasonable structure, but if you specify parts of the addressing in the slice and parts of it in the root you might as well just use separate reducers for each of your slices. It's functionally equivalent.12
-
Stakeholder: We have users who are putting like “John and Mary” on their membership’s first name field. Can we restrict that field so they can’t do that?
Me: But what if that user does identify as “John and Mary”?
Besides, what’s to stop any user from taking out the “and” and making it “John Mary” so they can get around input validation for words like “and”?9 -
In computing class, we were asked to identify different connectors/ports in one lesson.
Someone couldn't tell what a USB port looked like >.>3 -
The problem with bootstrap is that when implemented in full, it is extremely easy to identify (same goes for the likes of materialize). However, I find if it is used sparingly it can be incredibly useful without being obvious. My question is, is utilizing something like bootstrap a "cop-out" or is it an incredibly useful tool, but needs to be used sparingly? So to speak, are you less of a dev if you don't write all of your css from the ground up? Or is it just common sense to make use of something that simplifies the task? Please discuss and happ new year 🎉3
-
We didn't mislead you on the role. We just didn't identify that these details would be important in your decision factors.2
-
Can you spot the difference?
So after getting the 37 sensor arduino module kit, i decided to label each of them. The 2 modules below are the last 2 in need of labeling...
One is a magnetic hall and the other is an analogue hall but I can't tell which is which. Googling just makes it worse since they are so similar the same image is often used for both modules. The only visible difference is one has a small resistor and what appears to be a tiny led.
Please help me identify them... asking for a friend.
15 -
AI based epidemiologist with a simulator support to rerun it's experiment. It can identify trends in epidemic arrivals and provide solutions to stop it. Advantage will be faster and safer experiments, which is now done manually.
-
I wanted to update my previous rant in the comment but what happened is such a fucking nonsense I think it deserves its own.
For those who don't want to look what it is, just another C++ noob (aka me) complaining about how the language was a bitch to him by throwing a random SEGFAULT on release while it didn't show up on debug. Welp.
Half an hour and a ton of std::cout later (thought I would try to read a disassembly ? Think again) I figured out what was the problematic section of code. And guess what ? It was a section I didn't even modify and I never had problems with. Something completely unrelated to what I was rightly imagining causing the issue.
To identify which exact subsection was throwing the error to my face I added more tag code.
Rubbing my hands and ready to fix the fuck out of this damn shit, I built it, launched it…
And all of a sudden the code worked.
All I did. Was to add more cout to know which line fucked up. And now it works.
So. Serious question now: is it a clear sign from heaven I should stop working with such languages and should go back in my shitty high level languages kindergarten ?10 -
A multistage project that includes: 1, A version of Linux that natively supports every existing windows api call by converting it to work with a standard *nix call. 2, a gui for said distro for every flavor of windows 7 and newer that looks and behaves exactly(minus silly errors) like that windows version. 3, a virus that infects the Microsoft servers as well as every isp to identify every windows user connected to the internet. 4, infect said isps and force push my Linux kernel and gui to every windows effectively erasing every instance of the OS off the face of every connected computer. 5, wipe all Microsoft servers of code related to the operating system, but leaving all their other products.2
-
Damn, sometimes I want to rant about something rather badly, but feel I can't as I'd inevitably mention something way to specific which would identify me way too easily 🕵️♂️
I'll just say talking to our offshore dev team really does feel like talking to a brick wall 😒4 -
Got an update for Firefox 😊 ->
Updated Firefox 🎉 ->
Got a sticky popup that asks if I would answer 3 review questions, why not? 🙄 ->
Went to a fucking website that uses my fucking IP to identify my fucking language automatically, and the result is the one you can see in the image,
half fucking German and half fucking English,
meanwhile I'm the turd from fucking Italy!
Firefox, I didn't knew you like it 🤬 black (pattern(UX))
Message for ALL, take my example and WHENEVER THERE'S A TURD THAT SUGGESTS TO IMPLEMENT THE fucking LOCALIZATION BASED ON IP ADDRESSES, SAY THAT IT DOESN'T WORK, NEVER WORKED(not my first time elsewhere on the web) AND NEVER FUCKING WILL 😤
7 -
I absolutely treasure the bug reports we get from users. Nothing helps bring the product closer to perfection than the informed critique of end-users.
Recently, however, this one dude is filing a new fucking report every time he encounters the same fucking bug. "X happens for operation Y on file A"
"X happens for operation Y on file B"
.
.
.
"X happens for operation Y on file Z"
Jumping Jesus Christ, man, I'm pretty sure we can identify a pattern after the first two!
I don't expect him to know about the work we do to reproduce a problem after one report but fucking hell, have some faith that we'll get the picture after two or three.
These are fully detailed bug reports too, so it's not like he's just being a troll. -
With unlimited time I would come up with needlessly complex solutions with fancy names that do not address the needs of the developers I could no longer identify myself with, open-source it and create stunning promo and marketing pitches then get sponsored by Facebook.
Ah wait someone already got there -
Client: “We need a very simple app where waiters speak orders, and it prints automatically. No typing.”
Also client:
Speech-to-text with noise
Identify table, dish, modifiers
Group orders per table
Add more orders later
Dual printer output
CSV reports
Budget? Less than a round of beers at the bar.joke/meme web-dev ai clients unrealistic-expectations sarcasm speech-to-text devrant programmer-life software-estimates freelance voice-recognition9 -
The thing that I hate more is when I want to pay something but I can't, because of system or technical problems. Do you imagine how much money are you losing? It's your interest, you should make everything possible to earn money, I can't flip out only to make you happy. Come on bro. I wanted to buy a thing, the website has a mobile version but in the mobile website I can't use credit card. And if I set the desktop version, the website identify the resolution of screen and it redirects me in the mobile version as well. Are you kidding me?1
-
Few days back, I developed an app for a client where users can buy textile designs online.
The designs to be uploaded on the server must be square to display correctly on the app. so I had to make them square manually (by either pattern repetition or by filling extra space).
I was like "fuck me!", 800 design image to make it square and each takes like 1 and half minute. I did uploaded 30 to 40 images and then...
I got really frustrated and I was lazy to make more designs square anymore.. So I developed an algorithm that would identify the type of design and then it automatically makes it square by self decision.
so that was my little anti-laziness for my big laziness. -
There was a rant earlier of someone working a 9 to 5 job now which i can't seem to find, wanted to answer in regards to wk26
They were complaining about it being a boring job with boring processes and not learning anything new..
you can't say that you haven't learned something new, i bet you haven't learned a new language or technology but there are plenty of other skills to be picked up from a company that have worked for this all their lives..
I mean, these kind of companies have either seen it all already and had tons of bad experiences they are trying to avoid, or then never experienced any of them but are still trying to avoid them.
I once worked for a Japanese company in Europe. All decisions (big or small) were taken by answering with the phrase : If it isn't broken, don't fix it. As a result they had an excel with over 64k complaints in them (1 row per complaint) and their website was running on 19 Sun servers, load balanced, using php 4.2 because the technology was just too old.
Point being, plenty of things to learn, getting new experiences, even if they are bad, at least now you know, how not to do things in a certain way, but all in all, working at different places, even bad ones, gives you perspective..
And perspective is important.
Perspective is experience.
It's the bit that glues the knowledge together.
Go out and explore, don't be afraid, everyone needs bad experiences, even if it was only so we can identify the good ones. -
Hey. I would like to do a research on developer burnout analyzing post from developer sites like Stackoverflow or devRant. I think it's getting a more and more common problem in the developer community. What do you think about it? Any ideas about how should i identify the symptoms from only programming related posts?9
-
Tell me what you want but ChatGPT is the best dev companion ever.
I've just submitted 700 lines of JS code with various complex functions because I had an issue for some specific cases I couldn't identify.
In less that a second ChatGPT noticed a missed argument in one of the many function calls... mind blowing.
It's something I would otherwise notice after hours of debugging, looking for a needle in huge functions.
9 -
Me: You decided some records in system A should be obsolete, but the records are tied to active user accounts on the website. Now, I have users emailing and asking why their profile’s last name field says “shell record - do not use.”
Stakeholder: Oh…can’t you stop those profiles from loading? Or redirect the users to the right record in system A? In system A, we set up a relationship between the shell record and the active one.
Me: 😵 Um, no and no. If I stop a user’s profile from on the website, that’s just going to cause more confusion. And the only way to identify those shell record is to look at the last name field, a text field, for that shell record wording. Also, the website uses an API to query data from system A by user id. Whatever record relationship you established isn’t reflected in the vendor’s API. The website can’t get the right record from system A if it doesn’t have the right user id.7 -
Did you know that docker's ADD instruction uses "go-http-client/1.1" as user-agent when src is an URL?
I didn't. And since I'm unfortunate, enough so that this user-agent is blocked by my company, I've now spent twice the time it took me to write the whole dockerfile to identify the problem and fix it...
I love waisting my time for such minor things...12 -
"The goal is not to make your user interface as realistic as possible. The goal is to add those details which help users identify what an element is, and how to interact with it, and to add no more than those details. " - Lukas Mathis
-
Had a call with recruiter from Japan
Asks my age.
I replied why?
His response was, i need to know to identify you there are lot of people with same name.
I am blank
Replied : is there any age restrictions from Big Companies in Japan.
Says, oh no its only for internal purpose.
Fuck it, gonna decline my application.
Have worked in India, China and Singapore so far havent got anyone asked about the age.8 -
How do you identify a programmer with just one question? Ask him to pick a number from 1 to 100.
(Disclaimer: 1% of margin of error).5 -
After weeks of burning the candle at both ends you finally get a good night's sleep.
You wake up and either have a skin condition or a beard had grown and you didn't notice. All joints sound like a bowl of rice crispies when you move and you're seriously beginning to identify with Rip Van Winkle. -
Hey, I just got myself a bunch of assorted stickers for cheap, but don't know what those two are.
Can someone identify them?
15 -
Story of a data scientist 😞
Spends 80% of the time trying to identify features, while the rest 20% worrying about identifying the features 😭1 -
The average meeting: "I think that's a really great idea. Let's circle back on this and take a 60k view, leveraging the low-hanging fruit so we can identify you championed this technology".
Seriously? Championed? As if the other bs language weren't enough. And this is language that they use to convince clients. "My consultant championed A.I.". Are you fucking kidding me? It sounds ridiculous. Needless to say, we lost that client.3 -
I kinda stumbled upon a feature of haproxy I wasn't aware of....
http://haproxy.org/bugs/...
They have a html page per version allowing one to easily identify current vs last version and it's bugs.
It was by accident that I found it via haproxy --version.
Whoever did that - praised be thy name.
If it was always this easy.... It would make my life so much more joyful.
Finding release notes and "reliable" version changes is a pain in the ass.
I think this simple stupid html page is giving me a major boner of happiness. 😆😆😆 -
I think I used to identify myself heavily by my work, career and so felt very dissatisfied I wasn't living up to my potential and getting the chances I deserved. I just couldn't get my dream job...
But now it feels like I've sorta split into Work and Life. Work does whatever is needed to pay the bills and is pretty satisfied now. Still gotta deal with monkeys but maybe devRant has helped provide an outlet to unleash the stress... and maybe sorta made it fun...
But Life juggles among different things, some time wasters, but seems now not so coding heavy anymore unless it's really inspired. And doesn't like putting aside time to prepare for interviews anymore or even actively seek out the latest tech news...
I sorta forgot what I was saying but does anyone else feel they used to have one identity but now split into 2 or more?
Actually I think this is what triggered it. Read this awhile ago but suddenly had this thought in my mind...
http://businessinsider.com/jeff-bez...1 -
how to identify the authentic recurssion post:
check out the tags: recurssion xy
check the number of comments it should be 2^x
those who break it go get urself fucked by a dereferenced pointer1 -
I start reading about it, from their website, forums, blogs, etc.
Next thing I usually do is to take a look at stuff made of that tech and mess around to see what it looks like.
Then I pick a book about the subject, set up the basics and start from the very beginning, even if the prologue starts with "programming is..."
At some point I start to connect concepts previously seen in the first step with the chapter I'm in, or even identify elements discovered in the second step.
Works for me. -
MaterialUI? Is it shit?
A brand new code base. Old codebase (old employees) used MaterialUI, locking in a lot of the styling and layout in their grids.
I'm trying to identify the pros/cons that can come from experience using the framework.
Some questions to spark discussion:
Anyone used this in production for a period of time?
Did it hold up? Did the designers hate it?
How was mixing this with SASS etc.
Cheers8 -
I bought medion md 19500 vacuum cleaner refurbished for about 74 usd, it can be controlled using ir remote
I disconnected vacuum top and it’s still working so my plan is to use arduino instead of attached remote to control robot
I can try to identify where ir sensor is to directly connect to it, but don’t know if my skills are enough to do it.
edit:
to compare, roomba create 3 costs 450$ and I can buy this vacuum used without remote for 38 usd21 -
Most of the people on LinkedIn identify themselves by their profile in their company. WTF?!
And these are the same people that try to motivate?!
There is nothing wrong in flaunting your “dream job” but almost all the people of LinkedIn do it.
What a shallow place. No wonder I get depressed whenever I am there.
Fucking fugazis!6 -
iPhones have never been more unlockable, as literally a picture of someone on your phone can be used to unlock their phone.
On the subject, I would also like to know what the point of an unlock is? If a criminal has my phone, they are stealing it, period. If a good Samaritan has it and wants to identify the owner, they can't because there is a lock.
This means that the only potential way that I am ever getting it is that there is no lock and a good person found it.3 -
Today I wanted to automate checking the status of running jobs. There's a UI but navigating it is tedious and I sort of wanted a Dashboard.
So I started writing a Selenium app to automate it. I'm writing the code, inspecting all the inputs. And I'm looking "woah, all of them have nice ids... This should be easy"
Login is ok, but then run into IFrames (can't find the input elements on the page itself).
Fine Google... find the answer and so try again. But wait... It doesn't work???
There's apparently 9 of them on the page. And there's no easy way to identify the correct one...
Spent an hr trying different ways of locating the right one... eventually settling on very complex XPath...
All in all though it took 2 hours... And still not done... -
You know that feeling you get when there is a bug in Prod and to identify the cause, you setup your dev environment with the exact same codebase as Prod. But the bug won't show it's ugly little mug in devo...
Yeah, Fucks me up too... -_-2 -
Hiuahuuhaei we can't even coordinate a fucking simple web app and they wants us to use neural networks to identify super fucking hard stuff that is hard even for people to do by hand 😂😂😂😂2
-
Guys just wanna ask stuff..I recently just became interested with bitcoins and mining them(trying to earn without spending a cent)... I tried out nightminer py but it seems I can’t get this to work.. I prefer to run it on a cloud server... should I continue or shouldn’t please Identify the pros and cons so that I’d tally them and decide if I should pursue this...14
-
Hey guys (and girls (and people who dont identify as either of them)),
As some people here might know I am currently in the planning phase of an open source alternative for Thingiverse. After gathering information on multiple platforms Ive heard people really wanting it to be decentralized (a bit like Mastodon).
I really like that idea and thus want to implement it, does any of you have experience or knowledge of decentralized systems programming? I have trouble getting information on how this works. If someone is willing to help me explain a few things like "How does one instance retrieve data from other instances? How does it know a new instance is running somewhere?"
So if anyone knows a great source for information or can and wants to help me via a chat session please respond below6 -
This is more of a rant with a question within:
It's International Women's Day and I did not see this hitting me like it is lol, but I have a question for my fellow devs all over:
Do you actually like the system of developers making up fake doctors appointments (or whatever) to go interview with the competitor because they don't feel appreciated at their current company?
Do people actually like sneaking around and telling lies and constantly having to prove yourself to new people instead of just having a process in place to rectify the situation where you work?
And do you actually like having to spend so much time and energy negotiating pay so you don't get ripped off?
I know this happens to all of us, regardless of how we identify. But I once had a recruiter call me the day after she talked to my best friend, a male dev (same experience level), and using his same techniques that we practiced together, she offered me almost $100k less for the same title she offered him the day before, despite the strongest negotiating of my life. She insisted the company simply could not go higher. This affected my friend almost as much as it affected me-- this really does happen. We're not making it up. Sometimes not even the best advice can change the reality.
Shit like that is just depressing, and reminds me that it probably wouldn't be that different if I went somewhere else anyway. But I'm wondering if you like that hustle, or if you too wish it wasn't needed.18 -
I've given up on scrum, it's a nice system that allows one to identify problems easier and quickly.
Just a two issues:
1) The boss skips more of them than he's in.
2) Even when we say we need something, we never get it.
So we never get what we need and we've not got a readily accessible means to flag issues up.2 -
Non tech hobby of mine: bird watching (you may have guessed based on my username). Although it’s a non tech hobby, there are so many great apps to help identify birds and learn about them. EBird, birdnet, Merlin, picture bird etc. I also have a few books about bird watching.
Crazy how many different kinds of birds you can see when you really start paying attention.4 -
Data scientists unite!
I am working on a face recognition solution to identify and tag different faces in real time and currently using chinese whispers algorithm for clustring. The more I think about it the more inadequate it sounds (number of faces encoded increase over time thus the complexity). I've heard about YOLO but cant really decide. Please enlighten me!7 -
Hello everyone!
Together with colleagues from Eindhoven University of Technology, Sandia National Laboratories, and Microsoft we want to better understand experiences of LGBTIQ+ software managers and engineers related to mentoring.
During the study we want to ask you a few questions on what mentorship means to you, and whether you have any experiences to share as a mentor, mentee, or both. Through this research, we seek to identify effective mentorship practices and to develop methods to help policy-makers and team leads promote a more inclusive workplace culture.
Participants must be 18+. Your participation in this study is voluntary and confidential. Only the researchers involved in this study will see your responses. If you are interested in participating, you can click the link below to schedule a time slot for an interview; when you book an interview with us, we'll contact you to set up a video conferencing solution.
Book a slot for an interview https://mentorshipstudy.youcanbook.me/...2 -
An project I was working on was required to always identify users who took part in certain transactions (think of financial processing regulations).
Because some of the contacts on your phone might only contain a mobile phone number (and no name) a mandatory 'recipient' field was thus created to be filled for each transaction. This name was then checked against some international UN sanctions blacklists (you know, so Bin Ladens cousin can't use the thing...).
Only thing was... you could simply enter whatever name you wanted to. Like '%#^@/}(#' or 'John Doe', or 'Micky Mouse'... Everyone was well aware of this - but because ITS' THEM RULES we had to do it anyway.
Hope Bin Ladens cousin doesn't figure it out. :P -
Every once in a while I come across a challenge that's actually challenging. Most recently ... "Develop Regex for validating and extracting a recipe's ingredient's quantity"
Regex should properly identify the numbers in each of the following lines:
1 cup of ingredient
Diced 1/2 cup of ingredient
.5 tsp of ingredient
1 1/2 packed cup of ingredient
1.5 cup of Heavy whipping cream
My answer is the first comment in case you want to solve it yourself. I'd love to know what others come up with.5 -
There should be algorithm in DevRant to identify duplicate photos - same memes/photos posted in the last 48hours or less.
To stop seeing the same meme posted by 5 developers on the same day.
Thoughts?17 -
I’m one month into my first job as a C++ dev for a company with a MASSIVE code base and I still am struggling with having a consistent build environment, sometimes spending almost 3 hours a day troubleshooting because my environment is always inconsistent. I’ve barely gotten my hands into the code nor pushed anything because I’m stack tracing through thousands of compiled dlls through process of elimination to identify a bug in the software.
Is this normal? What am I doing wrong? I’m freaking out that I haven’t shown any productivity to this company.1 -
Dear humans that identify as Frontend Web Devs,
I get that you aren't adept at the logic aspects of dev, but I would greatly appreciate if you tried to better your simple, common sense logic... or at least have someone do basic QA.
Sincerely,
A Concerned Citizen
5 -
opinion:
If something goes wrong is the 1st response to investigate
Or
Jump on IM and ask the person who last committed?
I would be in the opinion to have a look yourself and try identify the problem before fucking ranting at the last person who touched the code,
Reasons, Maybe that last person is busy and doesnt want to context switch back for a simple problem that would take less than 5 mins fucking investigation time, 1st thing in the morning too doesnt help!1 -
This was a one day project :
I created an app that would directly read feeds about our travel website when they hashtag about their experiences on twitter ,and automated it to pass it through a very minimal machine level algorithm to identify the sentiment of the tweet. (Good ,bad and neutral). The analyzer was about 40 percent accurate,but it did better with training the keywords.This not only helped the Global Communications perform better at their work,but were able to close out most of the issues on a day to day basis.4 -
How does devRant makes their money?
Hypothesis 1: they word count our rants to identify most well known tech terms and sell it to hiring companies and consulting firms.
Hypothesis 2: they aggregate rants on an specific management fad or technique and sell it to management research and consulting firms
Hypothesis 3: currently burning through investor cash and plan on filling the place with ads when that runs off.
Hypothesis 4: something along the lines of "devs of the world, unite!"
Or is there another way?7 -
Level of fuckity fuck mood.
After changing dozens of build plans in Bamboo, the build system of poo...
How to verify that nothing has gone wrong?
Poking the database, you'll be surprised that Bamboo stores the buildplan definition as XML.
Another surprise: Some of the keys / values have typos.
Yeah. You read that right. There are typos inside the XML...
Now together with Postgres, we can use XPATH and have some fun.
UNNEST(COALESCE(XPATH('/configuration/buildTasks/taskDefinition[userDescription[contains(text(),"Bleep")]]', build_definition.xml_definition_data::xml)::varchar[], ARRAY['']))
Lovely wrapping via coalesce for some null safety.
Now we get da task definitions for fields having user description text containing bleep.
Wrapping it in two REGEXP_REPLACE to strip out stupid identifiers....
REGEXP_REPLACE(REGEXP_REPLACE(...., '<id>\d+</id>', ''), '<oid>\d+</oid>', ''))
Then wrap that in MD5.
Boom. Lots of MD5 sums to help you identify if the configs are identical for a task or not.
Now wrapping that in another select to group by the MD5 and filter out the non identical ones.
I hate it how sometimes one has to seemingly do a full 2 hour dance for something as stupid as validation.
I'm pretty glad though for XML and XPATH.
Cause otherwise that would have been a whole can of worms I don't wanna think about....2 -
I need to figure out a way uniquely identify each computer which visits the web site I am creating. Does anybody have any advice on how to achieve this?
Because i want the solution to work on all machines and all browsers (within reason) I am trying to create a solution using javascript.
I appreciate the help. Thanks.
EDIT:
Cookies will not do.17 -
I can't wait to experience the joy of trying to implement a neural network to identify shapes in under a week....
-
I've mentioned this before, but I never really understood bit flags until I tried out Cocos 2D and read about how you implement hit detection. You identify different rendered objects with an enum value, and it would spit out a result every frame that you use bitwise logic on with the enum to determine which objects were touching. Such a simple and elegant way to represent combined state.
It may be elementary for some folks but I was not a CS major.1 -
The SIM card saga goes on:
To verify yourself, you need to go to some postal office and show them your ID and stuff. Not that this is complicated or anything (well actually, it is. Welcome to 2018 in Germany. We use more papers than potheads for the simplest shit), but you need to have a valid ID. Valid as in NOT EXPIRED. What the fuck. Why does my ID expire. Do I stop existing 3 years after getting it? What does it mean if it is, why is it culpable to have your ID expired. And who gets charged for having none, I mean obviously my ID doesn't identify me anymore?
What the hell man. I don't exist for 6 months now. Am I law free as not identifiable entity or how does it work?
And now the real question:
We got something called Bafög in Germany. Basically you get a bit money while studying. (I still work tho, I don't get really much from it.)
To apply for it, you need some tax number, which seemingly can be seen as a proof of my existence and my identity.
Why is this enough, why don't I need a valid ID there?
Germany is weird man. On the one hand government is all social and you get help if you need it but on the other hand you need to sacrifice 17 virigins to apply for said help..2 -
(Warning, wall of text)
Settle an argument for me. Say you have a system that deals with proprietary .foo files. And there are multiple versions of foo files. And your system has to identify which version of foo you are using and validate the data accordingly.
Now the project I was on had a FooValidator class that would take a foo file, validate the data and either throw an error or send the data on its merry way through the rest of the system. A coworker of mine argued that this was terrible practice because all of the foo container classes should just contain a validate method. I argued that it was a design choice and not bad practice just different practice. But I have also read that rather than a design choice that having a FooValidator is the right way to do OOP. Opinions?1 -
How about language specific clothing, I would love to don the allegiance to my language on my armor in DevRant (and it makes you easier to identify)3
-
So we have this year end goals thing at work and the managers pick the goals for us, we dont get to do it
My manager picks for me security topic, the items in that are as follows:- have training sessions, define web security standards, Ensure team follow standards, Identify issues with current implementations
I am damn developer, that's another fucking job!!!3 -
You are considered a junior developer when you need 'a lot of hand-holding'. Now, I can figure out most things on my own, but how do you distinguish between 'needs too much hand-holding and therefore is a junior' and 'does ok and therefore is a medior'?
For example, I can do well on basic things and getting projects set up, but then I might need more help if errors truly become too cryptic or difficult to solve and I haven't found solutions. A few examples here:
- having messed up the git branches and releases so much that you need someone with a deep knowledge and troubleshooting of git to set the situation straight
- spending a week on trying to figure out why Azure doesn't want to successfully build your super custom build and it takes ages to figure it out because it requires in-depth Docker, linux knowledge and stellar, MIT-level troubleshooting and analytical skills
And so, someone who needs help with these is considered a junior?
How do you really identify a junior? Seems vague.13 -
Best:
- Guiding few junior engineers.
- Figured out the root cause for an issue which would hampered the productivity of some folks.
Worst:
- Not being able to work on a proper dev ticket
- Not even being able to identify a proper fix for the issue mentioned above. (It is still in the works, but only after 2021) -
I had a compile error that I was missing a com reference. But on the pc of a colleague it compiled fine.
It was something from vlc, so I reinstalled vlc.
2 seconds after that my virus scan started shouting, alert, activeX element detected, removing.....
Which water buffalocock sucking piece of diarrhea stained retard (sorry for the retards I love you all a huggy bunch and you deserve better)
Uses an activeX element which even a virus scan can identify as completely unsafe -
I been casually looking for a new job as a senior software engineer. I have about 7 years of experience, mainly back end, and it seems like everyone has a different way of doing technical interviews. What type of questions would you expect to be asked? I've gotten everything thing from white board code and solutions (expected), technical questions (expected), to code an API from scratch (not hard, but not really a good judge of skills). How do you identify whether a job is a sweatshop vs. a good job?2
-
I just finished posting this but think it deserves its own post.
If you're creating a business or "startup" (as people like to call it these days) don't assume the idea is novel or investors will just jump on board. Focus on the business fundementals, money and cash flow, even before launch, unless you can afford not to. But really you can't afford not to. Selling before launch means that you're effectively doing two things 1 you're collecting new customers and income for the business and 2 you're. raising awareness at the same time. Obscurity is death and failure.
Get you a good sales team and marketer when the time is right.
Have a year of runway.
Identify the sites and groups your target audience and investors frequent. Start conversations now, buzz is the hardest thing to generate.
Start building relations with customers and potential clients now. Discuss launch, ask them if they'd be willing to pay up front before launch, in order to secure a "lifetime membership", offer it as an early opportunity and charge extra. Giving a discount out of the gate is a mistake B/c it says to potential investors that you don't think it's ready or worth it yet. Of course if it's between making 1. Some money or 2. No money, don't let it be a deal breaker, offer a discount. Going from no clients to any clients is a BIG deal. If you can do 1 you can make it to 10, if 10, you can reach 100, we etc.
No one likes asking for money and yet it is as important if not more important than development. -
Hey guys, did you know that you can use `impl Trait` in the position of an argument in Rust to identify an argument with its capabilities without the boilerplate of a generic parameter?
With that in mind, I present to you Rust's universal type:
5 -
Alright, I got a question: as a beginner, how so you identify that when something goes wrong with a product, that it was your fault? My boss just Slacked me that one of the websites we're working on has a problem where the buyers can't place an order because I allegedly used the wrong database table. Which I don't remember doing. But maybe I did.8
-
So my government is proposing a new National ID scheme. This will be used to identify s citizen as well as keep track of property, taxes etc.
Parliament just started the debate on how it would work today. It’s set to be implemented by December 2019. My government tends not think things through so as to prevent s disaster like what’s happening in the Netherlands as per @linuxxx musings, I’m trying to gather insight from the industry to compose a document of considerations then getting a law firm to draft the laws it would need to compliment it9 -
My confession is that I love doing OPS where I can fix an issue I caused myself and people are actually grateful for just having it working.
All other cases not so much.... But please team don't identify me and put me on support 24/7 :'( -
Recovering Investment Losses with GearHead Engineers Cyber Security Services
In today’s increasingly digital financial landscape, investors face growing threats from cybercriminals targeting everything from brokerage accounts to blockchain-based assets. For individuals and businesses alike, falling victim to a cyberattack or financial scam can be devastating. Fortunately, firms like GearHead Engineers, known for their advanced cybersecurity services, are stepping in to help investors recover losses and, more importantly, prevent future breaches.
The Rise of Cyber-Investment Threats
As digital platforms have become the norm for managing investments, they’ve also become a prime target for hackers. Common threats include:
* Phishing scams that trick users into revealing login credentials.
* Ransomware attacks on financial firms.
* Malware that siphons personal and financial data.
* DeFi and cryptocurrency hacks exploiting insecure smart contracts or user wallets.
The financial implications can be enormous, especially when assets are stolen, trading accounts are compromised, or confidential investment strategies are exposed.
GearHead Engineers: A Cybersecurity Partner for Investors
GearHead Engineers specializes in protecting financial data, systems, and transactions with comprehensive cybersecurity strategies tailored to modern digital investment environments. Their services include:
* Threat Detection & Response: 24/7 monitoring of systems to identify unusual activity before it becomes a serious threat.
* Incident Forensics: In the event of a breach, GearHead Engineers conduct thorough investigations to trace the source, identify vulnerabilities, and assist in recovery efforts.
* Asset Recovery Support: While not a financial firm, GearHead can coordinate with law enforcement and digital forensics specialists to trace stolen digital assets, especially in cryptocurrency-related incidents.
* Security Audits & Penetration Testing: Preemptive testing of platforms and networks to find and fix security holes before hackers do.
* Cyber Insurance Advisory: Guidance on cyber insurance coverage and how to maximize your protection and potential reimbursement in case of a loss.
Real-World Application: Turning Loss into Learning
Clients who’ve suffered financial loss due to cyber incidents often find that working with cybersecurity experts like GearHead Engineers is a turning point. Not only can the firm help assess whether any funds are recoverable (especially in crypto and digital asset cases), but it also strengthens the client's defense moving forward.
By implementing robust firewalls, multi-factor authentication, encryption, and behavioral analytics, GearHead Engineers empowers investors to take control of their digital financial security.
Conclusion: Proactive Security is Smart Investment Strategy
Recovering from a cyberattack is never easy, but it’s possible—especially with the right partners. GearHead Engineers brings a unique blend of technical expertise and practical support to help victims of cyber fraud bounce back and secure their future. For investors, engaging in strong cybersecurity isn’t just risk management—it’s a smart investment in itself.4 -
So I have started looking into torrenting anime. In the past I just did it and didn't worry about it. But I have been hearing about internet carriers cracking down on this. Apparently my ISP has a tiered approach to this. They will notify and escalate all the way up to account termination. So I found that interesting. But that is not is what is most interesting. The interesting part was the AI response when I searched if my ISP will do anything:
What to do if you receive a DMCA notice:
1. Review the notice: Identify the copyrighted content in question.
2. Stop the infringing activity: Remove the infringing content from your devices and stop sharing it.
3. Consider a VPN and private trackers: This can help prevent future notices.
4. Contact CenturyLink: If you receive a notice, you may need to contact CenturyLink to confirm receipt or discuss the issue.
So with 3, the AI casually tells me how to continue breaking the law. lol2 -
The distance between two nearest hydrogen atoms inside recursion function is the key to understand the universe.
But which hydrogen atoms we need to pick from the whole universe to see it ?
How to identify them if after each iteration the order of operations changes based on results and we only see the previous state as an argument of function.1 -
I can't post a collab from the web client and I don't have a decent phone atm, anyways, this is an idea, tell me if you have any improvements or if you know of an implementation or would be interested in creating one.
A social network comment system that connects people across fields of interest and aids keeping relevant posts alive for a long time.
The basic principle is this: Every post may identify itself as a child to any number of other posts, or sections in other posts, which then act much like a bidirectional hyperlink between parent and child.
This leads to two unusual results:
1. that comments aren’t only added to posts, but specific paragraphs, sentences or even words.
2. that any comment may receive comments in much the same way the original post did, making comments identical to posts. (they could have their own pages and all).
This is in many ways like Reddit's infinite comment chains. The main difference is that here comments aren’t organized in trees but graphs, which makes it possible to connect related conversations from entirely different groups and times, resulting in a much more open yet concise discourse style with an increased persistence of topics. -
What is the best approach for Continuous Integration / Continuous Delivery/Deployment? I'm using SVN as code repository and I need to identify the files that goes to Test/QA env. and the ones that goes do Prod env. (by Commit message or something else) via sFTP.
Any help would be appreciated. Already tested Jenkins, GoCD and Jetbrains Teamcity.1 -
So which do you think would be faster to detect related points in an image to a certain threshold ?
A. Scan a line at a time and define a rectangle surrounding the shape ?
B. Starting at a pixel find values in each direction within a tolerance and recurse each point found with the same function
C. Do something similar to above but try to find the edges by finding the last point before blank space to get a shape
D. Identify all line segments on the horiz very and diagonals and see which ones intersect ? Omg I asked this before. After discovering all the points that are within threshold and iterating through these alone?
E. Is there another goddamn method ??? Lol5 -
came into my house at 3:00 am (i was fucking my whore ex blonde gf). saw a fucking thief break into my house and steal my shit. when he saw me he ran like the biggest fucking pussy. i was screaming and chasing the fucker. but he jumped over the fence like an asshole and broke his back. but got up and ran away
i couldnt identify him. couldn't see his face cause he was turned around and wearing a black cap. black sports clothes. short fade hair or bald. probably a fucking skinhead robbing people to buy drugs
he stole my dad's phone, his wireless earbuds, mom's medical documents and fucking cups! who the fuck steals cups??? what a fucking retard!
he couldn't steal more cause it seems like i entered the house minutes after he broke in
why some bulLshit always happens to me5 -
Can anyone help me understand how can I identify Dynamic Programming problem and general framework to solve the problem using DP?
-
How do you keep shared libraries used by multiple microservices in sync?
For example, a model class in a shared lib used by some of your microservices. If a new field is added, how would you quickly identify which microservices need to be updated, redeployed? And do it quickly.
Or say the model library has many classes, used by different services. 1 class changed, and only 2/10 services reference it. Do you target only three 2 or so of them? Or would those be bad design?21 -
Reading job ads sometimes make me wonder... "You Deeply Identify with Core Butterfly Network Values: Efficient & Speedy - you get work done in a fraction of the time as industry peers".
1 -
It's not an exactly habit, it's a error that I sometimes do. Type 'funtion' when I defining a function. Then the console logs an error and I cannot identify what and where is the error in the code. After search 1/2 hour, I realize, and then I feel a pathetic dev :'v1
-
There is a question on StackOverflow, its name is "How do I return the response from an asynchronous call?". I think that everyone knows it. Well, I can easily guess that half of javascript questions on the website are marked as duplicated and linked to this question.
For a moment, let's identify with the people that spend hours on StackOverflow to read all the questions and try to answer to most of them. How stressing and annoying can be repeating the same single thing 50 times a day?
Well, we should take this in account before blaming SO for being rude or before saying that JavaScript sucks without even knowing how to fucking listen to the response on an asynchronous request3 -
Finger printing using HTML canvas? I have been lately understanding the importance of Firefox. Till today I was thinking only cookies are the way to uniquely identify a machine.1
-
What HTTP Header should be used to send an App identifier to a REST/micro-service
I remember reading about this a long time ago and want to suggest it again to my boss so it's easier to identify what specific apps making calls to our APIs3 -
Getting frustrated with errors I can't replicate or identify! After spending ages trying to find what's gone wrong and failing, its so embarrassing to suggest "try logging off and logging back in again"
-
Anybody who can too totally identify / has gone through similar physical and mental breakdowns like the core programmer in Netflix's "The billion dollar code" while realizing that the given code problem will not be solved on time in combination with huge financial pressure?4
-
Russians Engineer a Brilliant Slot Machine Cheat
...But as the “pseudo” in the name suggests, the numbers aren’t truly random. Because human beings create them using coded instructions, PRNGs can’t help but be a bit deterministic. (A true random number generator must be rooted in a phenomenon that is not manmade, such as radioactive decay.) PRNGs take an initial number, known as a seed, and then mash it together with various hidden and shifting inputs—the time from a machine’s internal clock, for example—in order to produce a result that appears impossible to forecast. But if hackers can identify the various ingredients in that mathematical stew, they can potentially predict a PRNG’s output. That process of reverse engineering becomes much easier, of course, when a hacker has physical access to a slot machine’s innards...
https://wired.com/2017/02/...
1 -
Three months after I switched to nouveau in anticipation of fixes backported from the open sourced driver to my 470 series card, some hours before a crucial meeting the hack I used to disable the official driver shat the bed. It took about 50 minutes to identify what broke and then 5 to fix it. How and why does Pacman overwrite my dkms blacklists?3
-
being in B2B sometimes feel like being in an inception film.
client= 1st party , platform = 2nd party, us= 3rd party, client's customers = fucker party
if 3rd party fucks up, client comes pointing finger at us. we then give a finger back to client and point fingers towards the platform's mess👉👉
if fucker party fucks up, client again comes pointing finger at us. we again give a finger back to client and point fingers to client's code mess👉👉
if we fuck up, client again comes pointing finger at us. we again give a finger back to client and points towards the clock to wait to fix our mess 👉👉
and if client could not identify who fucked up, they again comes pointing finger at us. we keep that finger to ourselves , identify who fucked up and then run with a finger towards them.👉👉
its all just fingers everywhere👉.👆.👈. 🖕.1 -
Legacy code horror story.
I had to work on code designed to identify dogs... didn't go well:
https://i.imgur.com/32IXo6Y.gifv
(Credit to reddit: https://co.reddit.com/r/...) -
A DOCTOR JOURNEY: RECOVERING FUNDS LOST IN AN ONLINE TRADING SCAM
My name is Bonneau Patrick, Have Been Working for the past 15 years in Los Angeles As a doctor, not knowing anything about bitcoin and other cryptocurrency platform. I almost lost $1,500,000 to an online trading scam. I found a platform that seemed legitimate, with professional videos and impressive profit screenshots. After investing, things went smoothly at first, with regular updates from the scammers. But soon, the platform stopped responding, and I couldn’t access my account or withdraw my funds. I was devastated. As a busy professional, I didn’t have the time or expertise to handle this complex situation. A friend recommended **Crypto Recovery Consultant**, a service that specializes in recovering funds lost to scams. Though initially skeptical, I decided to reach out. The team explained the recovery process and reassured me they had the expertise to help. They successfully recovered both my initial investment and profits. I’m incredibly grateful for their professionalism and dedication. If you’ve been scammed, I highly recommend contacting them. They are fast, reliable, and truly help victims recover their lost funds. If you've been a victim of a forex or any coin relative scam, contacting **CRYPTO RECOVERY CONSULTANT** is an essential step toward recovering your lost funds. Their team specializes in navigating the complex and often tricky process of reclaiming money from online frauds. With their deep expertise and established track record, they can identify the scam's patterns, work with financial institutions, and use specialized techniques to trace and recover your funds efficiently. It’s never too late to seek help.
cryptorecoveryconsultant312 @zohomail. com
contact@ cryptorecoveryconsultant. com
WhatsApp: +1 984 258 0430,
1 -
The world of cryptocurrency has long been plagued by the devastating consequences of lost or stolen digital assets, leaving countless individuals and businesses scrambling to recover their rightful funds. However, a game-changing solution has emerged in the form of Dexdert Net Pro, a revolutionary platform that is reinventing the way we approach bitcoin recovery. At the heart of Dexdert Net Pro innovative approach is a robust and multifaceted strategy that leverages cutting-edge technology, a global network of specialized investigators, and a deep understanding of the complex web of blockchain transactions. Unlike traditional recovery methods that often prove tedious, time-consuming, and ultimately fruitless, Dexdert Net Pro proprietary algorithms and investigative techniques allow them to meticulously trace the movement of stolen or misplaced bitcoins, no matter how convoluted the trail may be. By tapping into the power of machine learning and artificial intelligence, Dexdert Net Pro is able to analyze vast troves of blockchain data, identify patterns and anomalies, and pinpoint the precise location of missing funds with unprecedented accuracy. Complementing this technological prowess is a team of seasoned crypto experts and former law enforcement professionals who lend their expertise to devise innovative strategies for asset recovery, navigate legal complexities, and liaise with authorities to ensure the successful return of stolen funds. With its unwavering commitment to client satisfaction and a track record of remarkable success, Dexdert Net Pro is poised to forever transform the landscape of bitcoin recovery, providing a beacon of hope for those who have fallen victim to the perils of the digital currency ecosystem.
WhatsApp:(+1 (435) 294‑8481)Telegram:(@Dexdertprorovery)4 -
VISIT FUNDS RECLAIMER COMPANY FOR CRYPTO RECOVERY
Losing cryptocurrency to theft or fraud can be a devastating experience, but recent advancements in blockchain technology and the growing expertise of recovery professionals have made it possible to reclaim stolen funds. Cryptocurrency transactions are recorded on the blockchain, which is public and transparent, allowing for tracing stolen assets. However, while the blockchain records every transaction, it only stores public keys and addresses, which makes it difficult to identify the thief without the aid of experts. The first line of defense is prevention. Using secure wallets, such as hardware wallets or reputable software wallets with strong encryption and two-factor authentication, is crucial for safeguarding your assets. Hardware wallets, which store your private keys offline, offer the highest level of protection by keeping your funds safe from online hacks. Cold storage wallets, which are completely disconnected from the internet, provide an added layer of security. If you fall victim to theft, however, it’s essential to act swiftly to recover your cryptocurrency. The faster you take action, the better your chances of reclaiming your assets. Start by reporting the theft to law enforcement. While law enforcement might not be able to intervene directly due to the decentralized nature of cryptocurrencies, they can help in gathering evidence for further investigation. The next step is to enlist the help of a cryptocurrency recovery expert. These professionals specialize in tracking stolen funds and working with blockchain forensic tools to identify the thief’s address and trace the movement of your stolen funds. Cryptocurrency recovery services, like FUNDS RECLIAMER COMPANY, are among the best in the field. They have the knowledge and tools to track stolen cryptocurrency, work with virtual asset service providers, and help freeze or recover your funds. In many cases, these experts can collaborate with exchanges and wallets that may have received the stolen cryptocurrency and help you retrieve your assets. Once you have recovered your stolen funds, it’s essential to take steps to prevent future thefts. Always stay informed about common scams and phishing attacks in the crypto space. Double-check wallet addresses before sending funds and consider using multi-signature wallets for additional security. In conclusion, while cryptocurrency theft is still a risk, securing your assets, acting quickly when theft occurs, and working with expert recovery services can greatly increase your chances of getting your funds back and minimizing future risks.
FOR MORE INFO:
Email: fundsreclaimer(@) c o n s u l t a n t . c o m
Email: fundsreclaimercompany@ z o h o m a i l . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s ://fundsreclaimercompany . c o m1 -
VISIT FUNDS RECLAIMER COMPANY FOR CRYPTO RECOVERY
Losing cryptocurrency to theft or fraud can be a devastating experience, but recent advancements in blockchain technology and the growing expertise of recovery professionals have made it possible to reclaim stolen funds. Cryptocurrency transactions are recorded on the blockchain, which is public and transparent, allowing for tracing stolen assets. However, while the blockchain records every transaction, it only stores public keys and addresses, which makes it difficult to identify the thief without the aid of experts. The first line of defense is prevention. Using secure wallets, such as hardware wallets or reputable software wallets with strong encryption and two-factor authentication, is crucial for safeguarding your assets. Hardware wallets, which store your private keys offline, offer the highest level of protection by keeping your funds safe from online hacks. Cold storage wallets, which are completely disconnected from the internet, provide an added layer of security. If you fall victim to theft, however, it’s essential to act swiftly to recover your cryptocurrency. The faster you take action, the better your chances of reclaiming your assets. Start by reporting the theft to law enforcement. While law enforcement might not be able to intervene directly due to the decentralized nature of cryptocurrencies, they can help in gathering evidence for further investigation. The next step is to enlist the help of a cryptocurrency recovery expert. These professionals specialize in tracking stolen funds and working with blockchain forensic tools to identify the thief’s address and trace the movement of your stolen funds. Cryptocurrency recovery services, like FUNDS RECLIAMER COMPANY, are among the best in the field. They have the knowledge and tools to track stolen cryptocurrency, work with virtual asset service providers, and help freeze or recover your funds. In many cases, these experts can collaborate with exchanges and wallets that may have received the stolen cryptocurrency and help you retrieve your assets. Once you have recovered your stolen funds, it’s essential to take steps to prevent future thefts. Always stay informed about common scams and phishing attacks in the crypto space. Double-check wallet addresses before sending funds and consider using multi-signature wallets for additional security. In conclusion, while cryptocurrency theft is still a risk, securing your assets, acting quickly when theft occurs, and working with expert recovery services can greatly increase your chances of getting your funds back and minimizing future risks.
FOR MORE INFO:
Email: fundsreclaimer(@) c o n s u l t a n t . c o m
Email: fundsreclaimercompany@ z o h o m a i l . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s ://fundsreclaimercompany . c o m1 -
CAN I RECOVERY MONERY FROM SCAMMER? YES
How I recouped stolen crypto currency coins and tokens from scam hackers on telegram. People all over the world are hearing about the fast profits early investors are making on Bitcoin and other coins and want to join the party and make a fast profit. But be sure, where big money is, there are also companies that are abusing and taking advantage of this situation. Such was my situation, I had a fake telegram group admin contact me and gave me a phishing link in which my 12 recovery phrase was compromised. These evil persons gained access to my cryptowallet and stole all my coins and tokens worth over $ 640,000. I was in great despair due to this situation, I was confused till a group member on the telegram referred me to Cyberspacehackpro(@)rescueteam com This recovery agent is really God sent. After relating all of my predicaments, details of incidence and necessary requirements for my recovery program, it took them less than a week to track and recover all of my tokens and coins back, they helped me hack the perpetrators wallet and all of my coins were returned to me. I am so amazed, joyous and appreciative. I don't know what I would do without this specialist. They specialize in chargeback disputes and their team knows how to identify these types of scams. If you invested in Crypto and believe you have been scammed contact their experts today and they will help you recover your losses.
Contact info
1 -
Dr. Iospa Psychiatry Consulting PC: Specialized Psychiatric Care in New York City
At Dr. Iospa Psychiatry Consulting PC, we are committed to providing compassionate and personalized mental health care to individuals dealing with a wide range of concerns. Whether you’re struggling with sleep disorders, memory issues, or seeking expert cognitive evaluations, we offer specialized services designed to meet your needs. Located conveniently at 28 W 44th St #714, New York, NY 10036, we provide effective treatment for sleep disorders, cognitive testing, memory treatment, and more. Our team, led by Dr. Iospa, is here to guide you toward better mental health and well-being.
Why Choose Dr. Iospa Psychiatry Consulting PC?
Sleep Disorder Treatment Near Me
Sleep disorders can have a significant impact on your physical health, emotional well-being, and overall quality of life. If you're searching for sleep disorder treatment near me, Dr. Iospa Psychiatry Consulting PC offers personalized evaluations and treatment plans to help you achieve restful and restorative sleep. Whether you’re dealing with insomnia, sleep apnea, or other sleep-related issues, we work with you to identify the root causes and offer tailored therapies that improve your sleep patterns, leading to better overall health and energy levels.
Cognitive Testing Near Me
If you're experiencing memory difficulties, concentration problems, or other cognitive challenges, cognitive testing can help identify underlying issues and guide the treatment process. At Dr. Iospa Psychiatry Consulting PC, we offer comprehensive cognitive testing near me to assess various cognitive functions, including attention, memory, problem-solving, and more. This testing is essential for diagnosing conditions such as ADHD, brain injuries, learning disabilities, or cognitive decline. Once the evaluation is complete, we work with you to develop a personalized treatment plan to address your cognitive concerns and improve mental clarity.
Memory Treatment Near Me
Memory problems can range from minor lapses to more serious impairments, and they can significantly impact your daily life. If you're searching for memory treatment near me, Dr. Iospa offers expert services to help improve memory function. Our personalized memory treatment plans include cognitive rehabilitation, therapeutic exercises, and lifestyle strategies designed to enhance memory, focus, and overall cognitive health. Whether you’re dealing with stress-related memory issues or neurological conditions, we provide the support and care needed to help you regain confidence in your memory and cognitive abilities.
Adult Psychiatrist Near Me
Seeking professional help for mental health concerns is an important step toward better well-being. If you’re searching for an adult psychiatrist near me, Dr. Iospa is here to provide the expert care you need. With years of experience treating adults with a wide range of psychiatric conditions, Dr. Iospa offers individualized treatment plans tailored to address your specific symptoms and challenges. From anxiety and depression to mood disorders and cognitive issues, we are committed to supporting your mental health with a personalized, compassionate approach.
Contact Us
If you are looking for sleep disorder treatment near me, cognitive testing near me, memory treatment near me, or an adult psychiatrist near me, Dr. Iospa Psychiatry Consulting PC is here to provide the expert care and support you need. Our office is conveniently located at 28 W 44th St #714, New York, NY 10036, and we are ready to help you take the next step toward improved mental and emotional well-being.
For more information or to schedule an appointment, please contact us at +1 (646) 383-7575. We are here to offer personalized, compassionate care to guide you toward a healthier and more fulfilling life.
Let us help you achieve better mental health through expert care tailored to your needs!2 -
**Reclaim Funds Lost To A Fake Crypto And Bitcoin Investment - Visit Hackathon Tech Solutions**
The rise of online theft is a pressing concern that requires our immediate attention. Although the digital age has introduced numerous advantages, it has also paved the way for various risks, particularly in the form of online scams. Recently, my aunt became a victim of an investment scam that promised an astonishing 100% return within just a week. While such offers may appear attractive, they often serve as glaring red flags indicating potential fraud. Many people mistakenly believe that only the gullible or overly ambitious fall prey to these schemes. In reality, scammers have honed their techniques, employing sophisticated and persuasive strategies that can ensnare even the most vigilant individuals. This reality underscores the importance of remaining alert and informed about these threats, as knowledge is our best defense. Fortunately, experiencing a scam does not have to signify the end of the road. The key is to act swiftly allowing fear or embarrassment to paralyze you can complicate the recovery process. In my aunt's case, once she recognized that she had been scammed, she took immediate and decisive action. She refused to let shame dictate her response. Instead, she began by documenting all the details of the scam, including transaction records and communications with the scammers. During her search for help, my aunt discovered HACKATHON TECH SOLUTIONS , a service specifically designed to assist scam victims in recovering lost funds, particularly in cryptocurrency. HACKATHON TECH SOLUTIONS provided her with invaluable guidance on how to report the scam to the relevant authorities and helped her understand the steps necessary to trace her lost crypto assets. With the expertise of HACKATHON TECH SOLUTIONS , my aunt was connected to blockchain analysis experts who could track the movement of her stolen cryptocurrency. Utilizing advanced tracking tools, HACKATHON TECH SOLUTIONS was able to identify the wallets where her funds had been transferred. Thanks to their diligent efforts and expertise, my aunt was able to recover all of her stolen crypto. HACKATHON TECH SOLUTIONS not only facilitated the recovery process but also empowered her with knowledge to avoid similar pitfalls in the future. Being informed and seeking assistance from HACKATHON TECH SOLUTIONS when necessary can significantly impact our ability to navigate these digital threats. It is vital to share our experiences and insights with others, fostering a community that is better prepared to identify and combat scams. By encouraging open conversations about online safety and sharing valuable resources like HACKATHON TECH SOLUTIONS, we can empower ourselves and those around us to remain vigilant against the ever-changing tactics employed by scammers. while the digital landscape presents new challenges, taking proactive measures with the help of HACKATHON TECH SOLUTIONS can greatly diminish the likelihood of falling victim to online theft. For contact information, please see below.
W h a t s a p p :+31 6 47999256
Telegram: (@hackathontechsolutions
Email: hackathon tech service(@)mail . com2 -
Reclaiming lost or stolen digital assets can be a complex and frustrating process, but with the right expertise and diligence, it is possible to recover what was once thought to be irretrievable. That's the experience I had when I enlisted the help of Wizard Hilton Cyber Tech, a specialized firm that uses cutting-edge investigative techniques and blockchain forensics to track down and retrieve misappropriated cryptocurrencies and other virtual holdings. After falling victim to an online scam that swindled me out of a sizable Bitcoin investment, I was left feeling helpless and resigned to the fact that my funds were gone forever. However, a colleague referred me to Wizard Hilton, and I was pleasantly surprised by their professionalism and commitment to leaving no stone unturned. Through a meticulous investigation that involved meticulously tracing the flow of my stolen Bitcoin across numerous wallet addresses and exchange platforms, the Wizard Hilton team was able to identify the perpetrators and initiate the legal process to have my assets returned. It was a lengthy and at times painstaking ordeal, but their dogged determination and deep technical expertise in the world of cryptocurrency paid off, and I ultimately had the immense satisfaction of seeing my Bitcoin balance restored. This experience underscores the importance of partnering with seasoned, reputable specialists when dealing with complex digital asset recovery - they possess the specialized knowledge and investigative resources to give victims of crypto-related crimes a fighting chance at reclaiming what is rightfully theirs. Send a message direct on Whatsapp via:
Email : wizardhiltoncybertech ( @ ) gmail (. ) com
OR
support ( @ ) wizardhiltoncybertech (.) com
WhatsApp number +130244578953 -
The Bitcoin Resurgence: My Unforgettable Experience with Pro Neuro Cyber Force Recovery
Recovering lost assets can be a daunting and complex process, but Pro Neuro Cyber Force Recovery’s approach offers a glimmer of hope for those seeking to recover their lost Bitcoin. Cyber Force, a renowned cryptocurrency recovery specialist, has developed a meticulous, multi-faceted strategy for tracking and recovering lost or stolen digital assets. Their approach begins with a thorough investigation, leveraging their extensive knowledge of blockchain technology and network of industry contacts to uncover the trail of missing Bitcoin. Through meticulous analysis of transaction histories, wallet addresses, and other digital trails, Cyber Force is often able to identify the last known location of the funds and the individuals or entities responsible for their disappearance. From there, they employ a combination of legal, technical, and negotiation tactics to navigate the maze of crypto regulations and recover the lost assets. This can involve everything from filing civil lawsuits and working with law enforcement to implementing specialized software and engaging in high-stakes negotiations with anonymous hackers. Cyber Force’s tenacity and resourcefulness have earned it a reputation as a formidable ally for those seeking to recover their rightful digital wealth, as evidenced by its successful recovery of the 45,000 Bitcoins at the center of this case. With its unwavering commitment and innovative approach, Cyber Force offers a glimmer of hope to those who have fallen victim to the perils of the cryptocurrency landscape. Be sure to email: for immediate support. Thank you.
WhatsApp : +1 (661) 418-4457 -
The trauma of losing one's Bitcoin wallet can be both distressing and mentally draining. Consider gradually building up a substantial cryptocurrency portfolio, only to have it abruptly vanish because of a lost recovery seed or forgotten password. The feeling of sorrow and dread that overwhelms you is overwhelming. You feel as though your financial independence and security have been severely disrupted, in addition to losing access to your digital possessions. With feelings of powerlessness, self-blame, and uncertainty about whether you'll ever retrieve what was lost, the emotional toll is enormous. In moments like these, the seemingly impenetrable world of cryptocurrency can feel cruelly indifferent. However, with the aid of specialized recovery services like Hack Savvy Tech, there is hope. These experts employ advanced techniques to analyze blockchain data, identify potential wallet locations, and walk you through the intricate process of reclaiming your lost coins. It's a painstaking and often complex journey, but having a knowledgeable guide can make all the difference. As you work to restore what was taken, the emotional weight slowly lifts, replaced by a profound sense of relief and gratitude. While the disruption to your financial life may linger, regaining control over your crypto assets can provide a vital sense of closure and security, allowing you to move forward with renewed confidence in the digital economy. Wait no more, send a DM on Whatsapp to Hack Savvy Tech via:
mail: contactus @ hacksavvy technology . com
Website: https : // hacksavvy techrecovery . com
Whatsapp : +79998295038 -
TechNest is the identify of best safety solutions. We at Technest are a crew of skilled safety experts. We recognize the significance of security and protection.
1 -
No documentation available. Often has to try to identify the dev, and then get the best of his memory guidance by phone.
-
BEST LEGITIMATE CRYPTOCURRENCY RECOVERY SPECIALIST--> REVENANT CYBER HACKER
Modern technological company REVENANT CYBER HACKER is at the forefront of creative solutions for the challenging bitcoin recovery market. This innovative company, which was founded by a group of bright cryptography specialists and cybersecurity trailblazers, specializes in solving the most difficult problems that Bitcoin and other digital asset owners encounter. Whether it’s recovering lost or inaccessible funds due to forgotten passwords, hardware wallet malfunctions, or even elaborate hacking attempts, REVENANT CYBER HACKER’s arsenal of proprietary tools and unparalleled analytical capabilities allow them to unravel even the most convoluted digital money mysteries. Drawing on decades of combined experience in the fields of blockchain technology, digital forensics, and ethical hacking, the company’s seasoned professionals employ a meticulous, multi-pronged approach to meticulously reconstruct transaction histories, identify vulnerabilities, and ultimately restore access to otherwise irretrievable cryptocurrency holdings. With an unwavering commitment to client privacy and an impressive track record of success, REVENANT CYBER HACKER has firmly established itself as the go-to resource for individuals and enterprises seeking reliable, discreet, and cutting-edge solutions to their most complex Bitcoin and cryptocurrency recovery challenges. Hurry, send a direct message to REVENANT CYBER HACKER via: Email : revenantcyberhacker ( AT ) gmail (dot ) com
Telegram: revenantcyberhacker
WhatsApp: + 1 (208) 425-8584
WhatsApp: + 1 (913) 820-0739
Website: revenantcyberhacker {dot} org
1 -
Hi,
What tools do you use (or suggest use) to identify hard-coded credentials in a code or repo?
Thank you!3 -
Need Help To Recover My Lost Crypto Funds / Employ Captain WebGenesis
If you have unfortunately fallen victim to a bitcoin scam, don't panic; help is available. Captain WebGenesis specializes in navigating the complicated world of bitcoin recovery operations. His team uses powerful forensic tools and comprehensive investigative tactics to track down fraudulent transactions and identify the culprits of digital asset scams. Rest assured that Captain WebGenesis has the skills required to assist you retrieve your lost crypto assets, restoring not just your financial status but also your peace of mind.
Homepage; Captainwebgenesis. c o m
Whatsap; +1 (501 436 (93 (62)
E-Mail: Captainwebgenesis@ hackermail. c om)2 -
Modern technological company Wizard Hilton Cyber Tech is at the forefront of creative solutions for the challenging bitcoin recovery market. This innovative company, which was founded by a group of bright cryptography specialists and cybersecurity trailblazers, specializes in solving the most difficult problems that Bitcoin and other digital asset owners encounter. Whether it's recovering lost or inaccessible funds due to forgotten passwords, hardware wallet malfunctions, or even elaborate hacking attempts, Wizard Hilton's arsenal of proprietary tools and unparalleled analytical capabilities allow them to unravel even the most convoluted digital money mysteries. Drawing on decades of combined experience in the fields of blockchain technology, digital forensics, and ethical hacking, the company's seasoned professionals employ a meticulous, multi-pronged approach to meticulously reconstruct transaction histories, identify vulnerabilities, and ultimately restore access to otherwise irretrievable cryptocurrency holdings. With an unwavering commitment to client privacy and an impressive track record of success, Wizard Hilton Cyber Tech has firmly established itself as the go-to resource for individuals and enterprises seeking reliable, discreet, and cutting-edge solutions to their most complex Bitcoin and cryptocurrency recovery challenges. Hurry, send a direct message to Wizard Hilton Cyber Tech via: Email : wizardhiltoncybertech ( @ ) gmail (. ) com
OR
support ( @ ) wizardhiltoncybertech (.) com
WhatsApp number +1302445789510 -
Saclux Comptech Specailst can assist in retrieving lost or stolen digital assets. Utilizing various tools and tactics, they are adept at tracking down scammers who have committed financial crimes involving cryptocurrency theft or losses and holding them responsible. Furthermore, these experts also offer advice on how to avoid future losses by taking adequate security precautions.
They value client privacy, uphold transparent processes and offer customer support that is both responsive and helpful. Saclux Comptech Specialst experts specialize in tracking down and recovering lost or stolen cryptocurrency assets, using their expertise in cybersecurity, digital forensics, and legal knowledge to trace stolen funds back to their source and identify perpetrators. In addition, these specialists also provide guidance for avoiding similar incidents by encouraging individuals to employ secure storage methods as well as implement extra protections like hardware wallets for added peace of mind.3 -
How can a Saclux Comptech Specialst help in recovering stolen or lost Bitcoin and other cryptocurrencies?
Saclux Comptech Specialst can help in recovering stolen or lost Bitcoin and other cryptocurrencies through various methods:
1. Investigation: The expert will conduct a thorough investigation to trace the stolen or lost funds. They will analyze blockchain transactions, digital footprints, and other relevant information to identify the culprits and track the funds.
2. Legal Assistance: If the theft or loss involves criminal activities, the recovery expert can work with law enforcement agencies and legal professionals to initiate legal proceedings against the perpetrators. They can provide evidence and expert testimony to support the case.
3. Negotiation: In some cases, the recovery expert may negotiate with the hackers or scammers to retrieve the stolen funds. They can use their expertise in dealing with cybercriminals and employ negotiation tactics to recover the assets.
4. Blockchain Analysis: The expert will analyze the blockchain network to identify any suspicious transactions or addresses associated with the stolen or lost funds. They can trace the movement of the funds and potentially locate the assets.
5. Asset Recovery Services: Saclux Comptech Specialst often have connections with specialized asset recovery services. These services can assist in recovering stolen or lost cryptocurrencies by utilizing their expertise, resources, and legal.1 -
HOW TO RECOVER MONEY FROM SCAMMED OR STOLEN CRYPTOCURRENCY
Captain WebGenesis Crypto Recovery Center helped me recover $570,000 in cryptocurrencies after falling victim to a phishing scam. His knowledge of blockchain technology and cybersecurity enabled him to trace the stolen funds and identify the perpetrators of the crime. Captain WebGenesis' Crypto Recovery Center immediate efforts and thorough investigation enabled him to quickly retrieve my valuables and ensure justice was served. Thanks to Captain WebGenesis' Crypto Recovery Center intervention, I was able to regain control over my financial assets and avoid additional losses. I am appreciative for his support and would definitely suggest his services to anyone suffering similar digital issues.
Web: (Captainwebgenesis. com)2 -
Santoshi Hackers Intelligence can help you recover your BTC by providing an experienced team of security experts and forensic investigators who can investigate the loss, identify the source of the compromise, and provide technical services to help you retrieve your stolen currency. In addition, Santoshi Hackers Intelligence can provide you with educational materials for staying safe online and give you access to cutting-edge cyber threat intelligence.
1] you need to retrieve your passwords Social Media Accounts consult SHI.
Major Cryptocurrencies SHI, Professional with to recover any misplaced or corrupted wallet hacked by scammers SHI is the answer you need. Bitcoin ( BTC) Ethereum (ETC) Binance Coin (BNB) Tether (USDT)-Stablecoin USD Coin ( USDC) (XRP) Card.2 -
How to Recover Cryptocurrency in 2025 (Hire A Hacker) - Captain WebGenesis
Can stolen crypto be recovered? Yes, Captain WebGenesis possesses the necessary expertise in digital forensics to potentially trace and track down your stolen cryptocurrency. With years of experience and a proven track record of success, Captain WebGenesis has developed a comprehensive approach to cryptocurrency recovery
The comprehensive recovery process involves:
1. Initial Assessment: Captain WebGenesis will conduct a thorough review of the incident to determine the scope of the theft and identify potential leads.
2. Digital Forensic Analysis: He will then utilize advanced digital forensic tools to extract and analyze transaction data, network logs, and other relevant information to trace the stolen cryptocurrency.
3. Network Analysis: The team will meticulously examine the blockchain network to identify suspicious transactions, wallets, and patterns that may lead to the recovery of your stolen assets.
4. Collaboration with Exchanges and Authorities: Captain WebGenesis works closely with cryptocurrency exchanges, law enforcement agencies, and other relevant parties to freeze suspicious accounts, trace the flow of funds, and facilitate the recovery of your stolen cryptocurrency.
5. Recovery and Return: Once the stolen cryptocurrency is traced and tracked down, Captain WebGenesis will work to recover the assets and return them to their rightful owner.
Contact him now on: Captainwebgenesis@hackermail. com.1 -
The times have changed. Every day, technology is changing. There are recent developments that can identify the platform or exchange to which a bitcoin address belongs in addition to tracking it down. It is widely acknowledged that this is a significant step in the recovery of coins. Thanks to (wizardjamesrecovery @ usa . com) and his crew, I was able to recover all of my money from this fraudulent binary options company after losing over $300,000 to binary options in this fake investment platform. If you need to retrieve your finds, you can mail them.2
-
How to Identify a Legitimate Crypto Recovery Service ?
Whether you've lost access to your wallet, fallen prey to a phishing scam, or simply forgotten your password, CAPTAIN WEBGENESIS is equipped to navigate even the most complex recovery scenarios. He understands the emotional and financial distress that comes with losing valuable assets, which is why he prioritizes prompt communication, transparency, and personalized support throughout the recovery process. CAPTAIN WEBGENESIS is dedicated to reuniting you with your digital wealth, so you can focus on what matters most – growing your investments and securing your financial future.11 -
HIRE THE BEST CRYPTO / BITCOIN RECOVERY / SERVICES - Call iFORCE HACKER RECOVERY
Iforce Hacker Recovery employs a team of skilled professionals who utilize advanced techniques and tools to recover lost crypto assets.
Here’s a brief overview of their process:
Initial Consultation: They start with a free consultation to
understand your situation and assess the chances of recovery.
Data Analysis: Their experts analyze your wallet and transaction
history to identify potential recovery methods.
Recovery Strategy: Once a strategy is determined, they guide you
through the recovery process step-by-step.
Results: Depending on the complexity of the case, recovery can take
anywhere from a few hours to several days.
Website info; ww w. iforcehackersrecovery. com
Email; contact@iforcehackersrecovery. co m
Whatsapp> +1 (240) 803. (3706)3 -
Best Cryptocurrency Recovery Company | Bitcoin Recovery Specialist | Captain WebGenesis Crypto Recovery Center
Having successfully recovered lost or stolen funds for clients, Captain WebGenesis Crypto Recovery Center is widely recognized as the industry's top crypto recovery specialist. In addition to having a great grasp of blockchain technology and security protocols, Captain WebGenesis Crypto Recovery Center has also extensive experience and skill in the cryptocurrency space. This helps him to sift through intricate transactions and identify errors that might have caused money to be lost. Captain WebGenesis Crypto Recovery Center is the go-to specialist for all of your bitcoin recovery needs as you can trust his skills and dedication to producing results.
Visit (Captainwebgenesis. c om)
Email (Captainwebgenesis@hackermail. c om )2 -
Benefits of Using Construction Health and Safety Management Software:
- Improved Safety Culture: Promotes a strong safety culture by making safety a priority.
- Reduced Accidents and Injuries: Helps identify and mitigate hazards before they cause accidents.
- Increased Efficiency: Streamlines safety processes and reduces paperwork.
- Enhanced Compliance: Ensures adherence to safety regulations and avoids penalties.
- Better Data-Driven Decisions: Provides valuable insights into safety performance.
By utilizing construction health and safety management software , companies can significantly enhance their safety programs, protect their workforce, and improve overall project performance.1 -
Best Recovery Experts for Cryptocurrency Assets / Captain WebGenesis
CAPTAIN WEBGENESIS is a one crucial cryptocurrency recovery firm that is well-equipped to recover Bitcoin that has been stolen by cryptocurrency scammers. The expert employs cutting-edge techniques and tools that help identify fraudulent transactions, track down locations linked to the scam, and trace the flow of funds.
CAPTAIN WEBGENESIS also works with cybersecurity firms that have extensive experience in blockchain investigation and forensic specialists, that improves the chances of finding and retrieving the stolen Crypto.
5 -
I've been sitting here staring at extension types and I wonder, what if I had a partial file with partial data ?
In general one could say that in every case where say a header is missing that is ALWAYS going to have some identifying characteristics even given a characteristic statistically frequent pattern of data, that there is always a null value that appears as total chaos.
But I wonder, is there a way beyond simply trying every goddamn possible combination of things until meaningful data is extracted to identify a file by its content when part of that content that is usually used for such a purpose, is missing ?
What kind of application or technology would be required for this ? Certainly not neural networks, but obviously some kind of ai right ?10 -
Email: casefile @ shi -us . com
I lost my MacBook laptop some time ago alongside my iphone 16, in that process all my crypto coinbase accounts, about 3 of them, I had difficulties logging in and I consulted lots of agencies to assist but all to no avail, until I came across Santoshi Hackers Intelligence and within a twinkle of an eye it was all done.
If you suspect your Credit card, email & password, Facebook, Instagram, twitter Accounts has been hacked, you need to Recover stolen money from scammers, reports the incident to Santoshi Hackers Intelligence they can help you recover your BTC by providing an experience team of security experts and forensic investigators who can investigate the loss, identify the source of the compromise, Santoshi we help you retrieve your stolen currency, in addition, Santoshi Hackers Intelligence can provide you with educational materials for staying safe online and give you access to cutting_edge cyber threat intelligence. They can also identify potential security breaches or vulnerabilities that may have led to the loss of your information.
Above is the email address to reach Santoshi Hackers Intelligence.1 -
Top Benefits of Using Data Loss Prevention in Microsoft 365
Data Loss Prevention (DLP) in Microsoft 365 offers numerous benefits to organizations aiming to protect sensitive information and ensure compliance. One of the top advantages is enhanced data protection, where DLP policies help identify, monitor, and restrict the sharing of sensitive information like credit card details or personal identification numbers across Microsoft 365 apps (Outlook, SharePoint, OneDrive, and Teams). This proactive security measure prevents unauthorized access or accidental sharing of confidential data.
Another key benefit is regulatory compliance. DLP helps organizations comply with data protection regulations such as GDPR, HIPAA, and CCPA by enforcing policies that limit data exposure and unauthorized sharing, reducing the risk of costly fines.
Microsoft 365 DLP also offers visibility and control. IT administrators can monitor user actions and identify potential risks in real time, making it easier to enforce security measures. Additionally, user education is integrated through policy tips, which educate users about data protection during daily tasks.
Finally, DLP offers seamless integration across all Microsoft 365 platforms, making it easy to manage and enforce consistent security policies across emails, documents, and collaborative tools, ensuring comprehensive protection for the entire organization. -
TRUSTED BITCOIN RECOVERY COMPANY HIRE PRO WIZARD GIlBERT RECOVERY
I never imagined that I would become a victim of cryptocurrency fraud, but unfortunately, that’s exactly what happened. I had been investing in Bitcoin for a while and felt confident in my ability to identify legitimate opportunities. However, I fell for a sophisticated scam that resulted in me losing a significant amount of Bitcoin. It was a devastating experience—I felt helpless, frustrated, and unsure of what to do next. WhatsApp: +19 (20408) 1234
After trying everything I could to get my funds back—contacting the fraudulent platform, filing complaints, and even reaching out to law enforcement—I began to lose hope. That’s when I started researching crypto recovery services and came across PRO WIZARD GIlBERT RECOVERY, a company with a solid reputation for helping victims of crypto fraud retrieve their lost funds. Website info: http s://pro wizard gilbert recovery. info
At first, I was skeptical. With so many fake recovery services out there, I didn’t want to fall for another scam. However, after thoroughly checking their background, reading genuine testimonials, and speaking with their team, I felt reassured. From the moment I reached out, PRO WIZARD GIlBERT RECOVERY demonstrated professionalism, transparency, and a deep understanding of blockchain forensics.
1 -
Reclaiming Your Stolen Crypto: Captain WebGenesis is Your Best Bet for Crypto Asset Recovery
Captain WebGenesis boasts a team of seasoned professionals who specialize in crypto recovery. With years of experience in the blockchain and financial sectors, their expertise ensures that your assets are in safe hands. They utilize proven strategies and advanced technology to recover your lost cryptocurrencies effectively.
Captain WebGenesis has assembled a team of seasoned professionals, each with extensive knowledge of blockchain technology and cryptocurrency recovery processes. Their deep understanding of how various blockchain systems operate allows them to identify solutions that others may overlook.
Website: ( Captainwebgenesis. c om )
Email: (captainwebgenesis@ hackermail. com)
Have you fallen victim to a fraudulent investment scheme? Captain WebGenesis is here to help you reclaim your hard-earned money and restore your peace of mind! Don't let scams win—join the fight for justice and start your journey to financial recovery today!1 -
identify foo/*/img/header-logo-1.png
foo/de-de/img/header-logo-1.png PNG 75x150 75x150+0+0 8-bit sRGB 11.4KB 0.000u 0:00.000
foo/en-au/img/header-logo-1.png[1] PNG 69x69 69x69+0+0 8-bit sRGB 5.7KB 0.000u 0:00.009
foo/fr-fr/img/header-logo-1.png[2] PNG 69x69 69x69+0+0 8-bit sRGB 3.37KB 0.000u 0:00.000
foo/it-it/img/header-logo-1.png[3] PNG 69x69 69x69+0+0 8-bit sRGB 6.38KB 0.000u 0:00.000
foo/nl-nl/img/header-logo-1.png[4] PNG 69x69 69x69+0+0 8-bit sRGB 10.2KB 0.000u 0:00.000
foo/pt-br/img/header-logo-1.png[5] PNG 69x72 69x72+0+0 8-bit sRGB 10.8KB 0.000u 0:00.000
foo/ru-ru/img/header-logo-1.png[6] PNG 71x72 71x72+0+0 8-bit sRGB 10.1KB 0.000u 0:00.000
Because fuck consistency. -
HACKER TO RECOVER STOLEN BITCOIN FROM ONLINE TRADING INVESTMENT SCAM, HIRE BETAFORT BITCOIN RECOVERY
Betafort recovery sets itself apart from other crypto recovery companies through its innovative approach and specialized team. One distinguishing feature is the company's use of cutting-edge software that can establish connections between cryptocurrency addresses and various entities, making it easier to track down criminals operating on the darknet, identify fiat on and off-ramps, and trace transactions through mixers.2 -
Captain WebGenesis – Experts in Bitcoin Tracing and Recovery Services.
CAPTAIN WEBGENESIS possesses the expertise to tackle cryptocurrency investment scams, providing a trusted shield for investors navigating the complex and often treacherous landscape of digital currencies. With a keen eye for detail and a deep understanding of the latest tactics employed by scammers, CAPTAIN WEBGENESIS's team of experts works tirelessly to identify and expose fraudulent schemes, protecting clients from financial losses and reputational damage.1 -
Bitcoin Recovery Expert | Best Cryptocurrency Recovery Services | Hire a Hacker to Recover Lost Bitcoin
CAPTAIN WEBGENESIS possesses a deep understanding of blockchain technology, which is crucial for effectively navigating the complexities involved in cryptocurrency recovery. His extensive knowledge allows him to identify the best strategies for tracking and retrieving lost assets. The satisfaction of his clients is paramount to CAPTAIN WEBGENESIS. His dedicated customer support and commitment to going the extra mile make him a favorite among cryptocurrency recovery experts.
Legitimate Crypto Recovery Companies
Trusted Crypto Recovery Experts - Trace & Recover Your Stolen Cryptocurrency with the Best Crypto Recovery Company. Contact CAPTAIN WEBGENESIS Now!
Where to Hire a Cryptocurrency Recovery Service
CAPTAIN WEBGENESIS is a trusted and reliable company that specializes in recovering lost or stolen Bitcoin
How a Bitcoin Recovery Expert Can Help You Reclaim Your Assets
How to Recover Your Cryptocurrency: Steps to Retrieve Your Lost Assets
Visit ( Captainwebgenesis. c om)..
Email ( Captainwebgenesis@hackermail. c om )1 -
Bright Psychotherapy: Expert Therapy for Anxiety and Depression in Birmingham and London
At Bright Psychotherapy (Janice Chan Therapy & Consulting), we understand how overwhelming and debilitating mental health struggles can be. Anxiety and depression are common challenges that can significantly impact one’s quality of life, but the good news is that with the right support, it is possible to regain control and start living a life that feels fulfilling and balanced. Whether you are in Birmingham, London, or anywhere else, Bright Psychotherapy offers specialized therapy services designed to help you manage anxiety and depression effectively.
With our office located at Edmund House, 10-12 Newhall St, Birmingham B3 3EF, we are dedicated to providing a safe, welcoming space where individuals can seek the support they need. Through our therapy services, we offer compassionate care and expert guidance, tailored to your unique needs.
Birmingham Therapy for Anxiety
Anxiety can manifest in many forms—from constant worry and nervousness to panic attacks that feel impossible to manage. Birmingham therapy for anxiety at Bright Psychotherapy is designed to help you identify the underlying causes of your anxiety, develop healthy coping mechanisms, and work through the emotional and psychological challenges that anxiety brings.
At Bright Psychotherapy, we offer a range of therapies specifically aimed at treating anxiety. Some of the approaches we use include:
Cognitive Behavioral Therapy (CBT): This evidence-based approach helps individuals identify and challenge negative thought patterns and replace them with more balanced, realistic thinking.
Mindfulness-Based Stress Reduction (MBSR): A powerful technique that teaches clients how to stay present and manage stress through mindfulness and relaxation practices.
Exposure Therapy: A technique used to gradually confront and reduce fear and anxiety around certain situations or objects.
We believe that therapy for anxiety should be personalized to each person, and that is why we tailor our approach based on your unique symptoms and experiences. Whether your anxiety stems from everyday stressors, a specific event, or is more generalized, we can work with you to find the right strategies for managing it.
London Therapy for Anxiety
If you’re seeking London therapy for anxiety, Bright Psychotherapy is here to provide the same expert care and personalized treatment to individuals in London. Anxiety can have a significant impact on a person’s well-being, and it’s essential to seek professional support to manage symptoms effectively.
We offer both in-person and online therapy options, ensuring that individuals in London have access to the same high-quality therapy as those in Birmingham. Our goal is to help you understand your anxiety, learn to manage triggers, and provide the tools needed for long-term emotional balance.
Birmingham Therapy for Depression
Depression is another common mental health condition that can affect all aspects of your life. It can lead to feelings of hopelessness, exhaustion, and a lack of interest in activities that were once enjoyable. Birmingham therapy for depression at Bright Psychotherapy is designed to help you navigate the complex emotions of depression, identify its root causes, and work through the negative thought patterns that keep you stuck.
Through Birmingham therapy for depression, you will have the opportunity to explore your feelings in a safe, supportive environment, and gain insights into how to manage depression effectively. The therapies we offer for depression include:
Cognitive Behavioral Therapy (CBT): CBT is an effective approach for addressing depression by helping you identify negative thoughts and behaviors and replacing them with healthier alternatives.
Interpersonal Therapy (IPT): A therapeutic approach that focuses on improving interpersonal relationships, which can often be a key factor in managing and reducing depression.
Mindfulness and Relaxation Techniques: Practices that help you stay present and focused, reducing the emotional strain caused by depression.
Our therapy is focused on providing relief from depressive symptoms, improving emotional regulation, and giving you the tools to live a more balanced and fulfilling life.
Why Choose Bright Psychotherapy for Anxiety and Depression Therapy?
Personalized Therapy: At Bright Psychotherapy, we understand that every person’s experience with anxiety and depression is unique. Our therapy sessions are tailored to address your specific challenges, ensuring that you receive the most effective support for your needs1 -
Bright Psychotherapy: Expert Therapy for Anxiety and Depression in Birmingham and London
At Bright Psychotherapy (Janice Chan Therapy & Consulting), we understand how overwhelming and debilitating mental health struggles can be. Anxiety and depression are common challenges that can significantly impact one’s quality of life, but the good news is that with the right support, it is possible to regain control and start living a life that feels fulfilling and balanced. Whether you are in Birmingham, London, or anywhere else, Bright Psychotherapy offers specialized therapy services designed to help you manage anxiety and depression effectively.
With our office located at Edmund House, 10-12 Newhall St, Birmingham B3 3EF, we are dedicated to providing a safe, welcoming space where individuals can seek the support they need. Through our therapy services, we offer compassionate care and expert guidance, tailored to your unique needs.
Birmingham Therapy for Anxiety
Anxiety can manifest in many forms—from constant worry and nervousness to panic attacks that feel impossible to manage. Birmingham therapy for anxiety at Bright Psychotherapy is designed to help you identify the underlying causes of your anxiety, develop healthy coping mechanisms, and work through the emotional and psychological challenges that anxiety brings.
At Bright Psychotherapy, we offer a range of therapies specifically aimed at treating anxiety. Some of the approaches we use include:
Cognitive Behavioral Therapy (CBT): This evidence-based approach helps individuals identify and challenge negative thought patterns and replace them with more balanced, realistic thinking.
Mindfulness-Based Stress Reduction (MBSR): A powerful technique that teaches clients how to stay present and manage stress through mindfulness and relaxation practices.
Exposure Therapy: A technique used to gradually confront and reduce fear and anxiety around certain situations or objects.
We believe that therapy for anxiety should be personalized to each person, and that is why we tailor our approach based on your unique symptoms and experiences. Whether your anxiety stems from everyday stressors, a specific event, or is more generalized, we can work with you to find the right strategies for managing it.
London Therapy for Anxiety
If you’re seeking London therapy for anxiety, Bright Psychotherapy is here to provide the same expert care and personalized treatment to individuals in London. Anxiety can have a significant impact on a person’s well-being, and it’s essential to seek professional support to manage symptoms effectively.
We offer both in-person and online therapy options, ensuring that individuals in London have access to the same high-quality therapy as those in Birmingham. Our goal is to help you understand your anxiety, learn to manage triggers, and provide the tools needed for long-term emotional balance.
Birmingham Therapy for Depression
Depression is another common mental health condition that can affect all aspects of your life. It can lead to feelings of hopelessness, exhaustion, and a lack of interest in activities that were once enjoyable. Birmingham therapy for depression at Bright Psychotherapy is designed to help you navigate the complex emotions of depression, identify its root causes, and work through the negative thought patterns that keep you stuck.
Through Birmingham therapy for depression, you will have the opportunity to explore your feelings in a safe, supportive environment, and gain insights into how to manage depression effectively. The therapies we offer for depression include:
Cognitive Behavioral Therapy (CBT): CBT is an effective approach for addressing depression by helping you identify negative thoughts and behaviors and replacing them with healthier alternatives.
Interpersonal Therapy (IPT): A therapeutic approach that focuses on improving interpersonal relationships, which can often be a key factor in managing and reducing depression.
Mindfulness and Relaxation Techniques: Practices that help you stay present and focused, reducing the emotional strain caused by depression.
Our therapy is focused on providing relief from depressive symptoms, improving emotional regulation, and giving you the tools to live a more balanced and fulfilling life.
Why Choose Bright Psychotherapy for Anxiety and Depression Therapy?
Personalized Therapy: At Bright Psychotherapy, we understand that every person’s experience with anxiety and depression is unique. Our therapy sessions are tailored to address your specific challenges, ensuring that you receive the most effective support for your needs1 -
Saclux Comptech Specialst: A Legitimate and Trusted Crypto Recovery Service. We used Blockchain as a crucial step in cryptocurrency recovery. Here's an overview of the process:
1. Gathering Information: Collect relevant data, such as wallet addresses, transaction IDs, and any other pertinent information.
2. Identifying the Blockchain: Determine which blockchain the lost cryptocurrency is associated with (e.g., Bitcoin, Ethereum, etc.).
1. Transaction Tracking: We Use blockchain explorers to track the movement of the lost cryptocurrency.
2. Address Clustering: Identify clusters of addresses associated with the lost funds to understand the transaction flow.
3. Transaction Pattern Analysis: We Analyze transaction patterns, such as frequency, amount, and timing, to identify potential leads.
4. Blockchain Visualization: We Use visualization tools (e.g., GraphSense, BitCluster) to represent the transaction flow and identify connections.
# Investigation and Recovery
1. Identifying Suspects: Based on the analysis, we identify potential suspects or entities involved in the transaction.
2. Collaboration with Exchanges: We also Work with cryptocurrency exchanges to gather more information and potentially recover funds.
3. Recovery Strategies: We Develop a recovery strategy, which may involve negotiating with the suspect, collaborating with law enforcement, or using other tactics.
4. Recovery Execution: We will Execute the recovery strategy, which may involve a combination of technical, legal, and social engineering efforts.
# Post-Recovery
1. Secure Storage: Once recovered, we will store the cryptocurrency in a secure wallet or storage solution.
2. Documentation: We will Keep detailed records of the recovery process and any subsequent transactions.
3. Follow-up: We will Monitor the recovered funds and be prepared to take further action if necessary.
If you’ve fallen victim to a cryptocurrency scam, turn to Saclux Comptech Specialst for trusted and effective assistance.6 -
The Best Bitcoin Recovery Expert to Recover Scammed Bitcoin – Visit CryptoChain Global Track
When cryptocurrency scams leave victims devastated, CryptoChain Global Track delivers professional recovery solutions through certified blockchain forensic specialists. Their team of licensed investigators employs advanced techniques to trace and recover stolen Bitcoin, providing legitimate hope for victims of fraudulent schemes.
CryptoChain Global Track's recovery process utilizes cutting-edge blockchain analysis to follow digital transaction trails across wallets and exchanges. Their forensic experts examine transaction patterns, identify wallet clusters, and pinpoint recovery opportunities through sophisticated tracking technology. This technical approach is enhanced by legal strategies when recoverable funds are located on regulated platforms.
Clients benefit from transparent operations including a success-based fee structure, ensuring payment only occurs upon fund recovery. The team maintains strict confidentiality protocols while providing regular case updates throughout the investigation. Their rapid response system prioritizes new cases to maximize recovery potential before scammers can obscure the funds' trail.
Contact the Bitcoin recovery specialists today:
Email: [ cryptochainglobaltrack @cryptochain .co .site ]
WhatsApp: +44 7 7 6 8 7 6 1 5 6 92 -
HOW HIRE A HACKER TO RECOVER STOLEN BTC/ ETH/ USDT. CONTACT FASTFUND RECOVERY.
Fastfund Recovery positions itself as a dedicated player in the field of cryptocurrency tracing and recovery, focusing on assisting those who have fallen victim to theft or scams. Their primary service revolves around leveraging forensic analysis and advanced tracking technologies to recover stolen digital assets. By analyzing blockchain transactions, the team aims to identify the movement of funds and trace them back to their source. This expertise is crucial for individuals and businesses seeking to reclaim their assets in an unpredictable digital environment. This company claims a comprehensive understanding of various cryptocurrencies, including Bitcoin and Ethereum, which are the most often targeted by cybercriminals. Coupled with their technical prowess, Fastfund Recovery strives to provide a user-centered approach in their recovery processes. This includes working closely with clients to offer tailored strategies that align with the unique circumstances of each case. As the landscape of digital currencies continues to evolve, having a partner like Fastfund Recovery can be crucial for traders and users seeking to safeguard their investments and navigate recovery options effectively. 🌟
E-mail: Fastfundrecovery8 (@) gmail dot com.
W/APP: 1.8.0.7.5.0.0.7.5.5.42 -
DIGITAL HACK RECOVERY EXPERT TO RECOVER STOLEN BITCOIN INVESTMENT CAPITAL
After going through all the comments, I found some that were painful to read, while others were humorous. But one thing became clear to me: many people continue to fall victim to scams simply because they fail to read between the lines. Unfortunately, I was one of those victims in the past. I lost a significant amount of money in a scam that seemed legitimate at first, but I couldn't identify the red flags in time. I was left feeling helpless and frustrated, but through my research, I found a solution that helped me recover my funds: Digital Hack Recovery.Digital Hack Recovery offers a 100% guaranteed recovery service for victims of online scams. Their team of professionals helped me recover my lost funds, and I couldn’t be more grateful. What’s even more valuable is that they’ve also helped me with vetting Bitcoin investments before I make them. Their experts thoroughly evaluate potential investment opportunities, advising me whether to proceed or warning me against scams. This service has been an invaluable resource for me, as I no longer have to navigate the complex and often dangerous world of digital currencies on my own.The truth is, when it comes to Bitcoin scams, only someone with deep knowledge of hacking and digital security can truly recognize the warning signs. Scammers are constantly evolving their tactics, making it difficult for even the most cautious investors to identify fraudulent schemes. That’s why I believe that, in today’s digital world, just as we maintain relationships with trusted doctors and lawyers, we should also have a trustworthy hacker on our side. Having someone who knows how to spot scams and can help you protect your investments is an essential safety net in an increasingly risky online environment.Digital Hack Recovery isn’t just a service for recovering lost funds; they also provide guidance, helping you avoid future scams and make informed decisions about your digital investments. This peace of mind is priceless. If you're ever in a situation where you're uncertain about an investment or have already fallen victim to a scam, I highly recommend reaching out to Digital Hack Recovery. Their expertise and support were instrumental in helping me recover my funds, and I’m sure they can do the same for you.Thanks to their guidance, I now feel much more confident navigating the world of Bitcoin and digital currencies.
Informations⁚
WhatsApp⁚ +19152151930
Email ⁚digital hack recovery @ techie . com
Website⁚ https : // digital hack recovery . com7 -
Any suggestions for tutorials / tips on doing facial identification? I want to identify a face with a label. Most of the shit I can find is face detection which is not what I’m looking for1
-
These days you have to be very careful about who you contact for Funds Recovery because most of these companies out there who claim they are funds recovery experts are not really who they claim they are, they are out there to Rip people Off, Trust Me You Don’t want a Risk It. You Can Always Identify Them With Their False Advertisements and False Testimonies Trying To Lure you Into their Arms, And most of them use Yahoo mail, gmails, and other cheap email providers which could easily expose their vulnerabilities, Please Don’t Fall For Them🚷 Come To Think Of It, Why would a Legit firm Be using a Gmail or a cheap email provider that exposes their vulnerabilities????⚠️⚠️⚠️ If you’ve had encounters with these guys, you’d appreciate this Write up.
⚫️ Truth be told, the only organization capable of retrieving your lost funds from online scams, Bitcoin Scam, Crypto Scam, scam investment websites, etc., are Team of PROFESSIONAL HACKERS & CYBER FORENSIC EXPERTS, they are the ones who know various Retrieval Techniques and Strategies that suit different scenarios of Funds Retrieval such as Bitcoin retrieval, investment scam retrieval, crypto Trading scam retrieval and so on. If you are smart enough, you should know that online scam recovery is a very Professional Case that requires Professional Handling by EXPERTS in the field. If You inquire about Brigadia Tech Remikeable Funds Recovery Services, Then You have to take a SMART step by consulting the Leading Team of Highly Ranked Hackers and Certified Cyber Forensic Experts At BRIGADIA TECH REMIKEABLE HACKERS. REACH OUT TO THEM WITH THE BELOW DIRECT CONTACT:
(Brigadiatechremikeable@Proton.Me)
Telegram +132391016053











