Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "p in the a"
-
I have made this RGB LED tie. One of my friends and me had the idea at 2 am and now it has come to reality :D
It runs on an Arduino nano, 8 rgb leds and is powered by a 9V battery.
I have prom tomorrow ('abschlussball' in german) I probably won't wear it during the official part but definitely at the party after prom.
The current animation is a bit too fast (I was listening to hardstyle while coding it) for the music they will play tomorrow at the party so I still have to make a slower one.
Tell me what you think about it :P
28 -
School principal : P / Me : M / Interviewer over Skype : S
P. I recently heard you run a software club in our school.
M. Yes. (started from March)
P. Well, one software community seems that he found you somewhere, and asked me if we can do a quick interview.
M. Sure. What is it?
P. So he will connect to skype.
M. Let's start then...
*A few moments later...*
M. Wwwwhhhhaaaaattttttt?
P. Calm down! What's the problem?
M. How can I have more than 5 years of android development?
S. Ok. Recorded. Next question.
M. (uhhh)
*A few moments later...*
M. What? Why in the heck do I use subversion?........
Yes... Ah... Ummm....
No! Why should i make a gui client for subversion?
*A few moments later...*
S. Do you have hacking experience?
M. Of what? I know hacking is illegal here..
S. Like... Anything!
M. Do YOU have an experience?
S. Yup.
M. What?
S. Google.
M. How?
S. (silence) Ok. Let's move on.
M. (wtf is this guy)
*A few moments later...*
S. Okay. We were about to hire you but you didnt met our job requirements.
M. ......What? What was the job?
S. Web developer Intern
M. I got no questions regarding "web".
S. I know devs should be great at all things.
M. Shut the hell up. What company are you?
S. (says something)
M. (Searches in google) Doesnt come in search results.
S. Where did you searched it? (trembling voice)
M. (Searches in naver, search engine of korea) Nothing. Are you sure you are a company?
S. (ends call)
Hate these fake interviews. And i have no idea how they found my school
I never wrote my school anywhere.12 -
This facts are killing me
"During his own Google interview, Jeff Dean was asked the implications if P=NP were true. He said, "P = 0 or N = 1." Then, before the interviewer had even finished laughing, Jeff examined Google’s public certificate and wrote the private key on the whiteboard."
"Compilers don't warn Jeff Dean. Jeff Dean warns compilers."
"gcc -O4 emails your code to Jeff Dean for a rewrite."
"When Jeff Dean sends an ethernet frame there are no collisions because the competing frames retreat back up into the buffer memory on their source nic."
"When Jeff Dean has an ergonomic evaluation, it is for the protection of his keyboard."
"When Jeff Dean designs software, he first codes the binary and then writes the source as documentation."
"When Jeff has trouble sleeping, he Mapreduces sheep."
"When Jeff Dean listens to mp3s, he just cats them to /dev/dsp and does the decoding in his head."
"Google search went down for a few hours in 2002, and Jeff Dean started handling queries by hand. Search Quality doubled."
"One day Jeff Dean grabbed his Etch-a-Sketch instead of his laptop on his way out the door. On his way back home to get his real laptop, he programmed the Etch-a-Sketch to play Tetris."
"Jeff Dean once shifted a bit so hard, it ended up on another computer. "6 -
While I'm in pause time with my colleagues and reading on wiki how, the boss comes to me and asks:
Boss: what are you reading?
Me: how to Quit Your Job Graciously 😊
Boss: 😐
The next day the boss offered me a +€0,50 p/hour.3 -
One of the biggest e-commerce site's here in Sweden like to generate hundreds of thousands of sessionfiles every day.
That slows down their website alot, and the poor server is struggling hard.
They asked me if I could do something about it. So I mounted the catalogue with sessionfiles on a tmpfs volume. And suddenly the site is much faster. I guess storing sessionfiles directly into RAM solved it :P
And yes, they are aware that a restart of the server removes the files.8 -
Being one of the top devs (and a good student admired by most lecturers) at college, my most humbling experience was when I joined my first job. I thought I knew SQL, I thought I knew C#. I realized in the first week, the thing I didn't know was "I don't know jack".
Thanks to a couple of great mentors (it took a few of them to bring me up to speed :P), I learned that the more I learn something, the more I will realize how much more there is to learn. I used tools to create storyboard animations in WPF, and my mentor would write it all in XAML! I'd write messy SQL and the other mentor just reduces it to a couple of elegant lines. They were like tech gods to my college self, all while being humble and friendly.
They also imbibed in me a sense of responsibility to carry on the culture of mentoring my juniors, which taught me much more than just the technical side of our profession.3 -
Imagine going back in time to 1956
to show the Inventor of the 1.5m wide and 1.7m high IBM 350 Hard Disk storage unit with a total of 5MB Storage size this...
https://www-03.ibm.com/ibm/history/...
https://instagram.com/p/...
9 -
6 engineers in the team, 6 of us using a different IDE/editor.
Everyone except me is wrong, amirite? :P6 -
Someone wasn't in a very good mood that day :p
Log data from when the WhatsApp for windows desktop failed to install~ 2/2
5 -
M - "Hey... 👀 where's the boss?"
P - "He's gone to get lunch 🍱"
M - "😮 WE'RE IN THE MIDDLE OF A DEPLOYMENT!"
🙃🙃🙃🙃🙃5 -
I want to be PROGRAMMING on the freaking privacy site already, not having to search for icons, download them in the right color/format etc.
Fucking hell. (although finding good/fitting icons is a funny challenge though :P)27 -
POSTMORTEM
"4096 bit ~ 96 hours is what he said.
IDK why, but when he took the challenge, he posted that it'd take 36 hours"
As @cbsa wrote, and nitwhiz wrote "but the statement was that op's i3 did it in 11 hours. So there must be a result already, which can be verified?"
I added time because I was in the middle of a port involving ArbFloat so I could get arbitrary precision. I had a crude desmos graph doing projections on what I'd already factored in order to get an idea of how long it'd take to do larger
bit lengths
@p100sch speculated on the walked back time, and overstating the rig capabilities. Instead I spent a lot of time trying to get it 'just-so'.
Worse, because I had to resort to "Decimal" in python (and am currently experimenting with the same in Julia), both of which are immutable types, the GC was taking > 25% of the cpu time.
Performancewise, the numbers I cited in the actual thread, as of this time:
largest product factored was 32bit, 1855526741 * 2163967087, took 1116.111s in python.
Julia build used a slightly different method, & managed to factor a 27 bit number, 103147223 * 88789957 in 20.9s,
but this wasn't typical.
What surprised me was the variability. One bit length could take 100s or a couple thousand seconds even, and a product that was 1-2 bits longer could return a result in under a minute, sometimes in seconds.
This started cropping up, ironically, right after I posted the thread, whats a man to do?
So I started trying a bunch of things, some of which worked. Shameless as I am, I accepted the challenge. Things weren't perfect but it was going well enough. At that point I hadn't slept in 30~ hours so when I thought I had it I let it run and went to bed. 5 AM comes, I check the program. Still calculating, and way overshot. Fuuuuuuccc...
So here we are now and it's say to safe the worlds not gonna burn if I explain it seeing as it doesn't work, or at least only some of the time.
Others people, much smarter than me, mentioned it may be a means of finding more secure pairs, and maybe so, I'm not familiar enough to know.
For everyone that followed, commented, those who contributed, even the doubters who kept a sanity check on this without whom this would have been an even bigger embarassement, and the people with their pins and tactical dots, thanks.
So here it is.
A few assumptions first.
Assuming p = the product,
a = some prime,
b = another prime,
and r = a/b (where a is smaller than b)
w = 1/sqrt(p)
(also experimented with w = 1/sqrt(p)*2 but I kept overshooting my a very small margin)
x = a/p
y = b/p
1. for every two numbers, there is a ratio (r) that you can search for among the decimals, starting at 1.0, counting down. You can use this to find the original factors e.x. p*r=n, p/n=m (assuming the product has only two factors), instead of having to do a sieve.
2. You don't need the first number you find to be the precise value of a factor (we're doing floating point math), a large subset of decimal values for the value of a or b will naturally 'fall' into the value of a (or b) + some fractional number, which is lost. Some of you will object, "But if thats wrong, your result will be wrong!" but hear me out.
3. You round for the first factor 'found', and from there, you take the result and do p/a to get b. If 'a' is actually a factor of p, then mod(b, 1) == 0, and then naturally, a*b SHOULD equal p.
If not, you throw out both numbers, rinse and repeat.
Now I knew this this could be faster. Realized the finer the representation, the less important the fractional digits further right in the number were, it was just a matter of how much precision I could AFFORD to lose and still get an accurate result for r*p=a.
Fast forward, lot of experimentation, was hitting a lot of worst case time complexities, where the most significant digits had a bunch of zeroes in front of them so starting at 1.0 was a no go in many situations. Started looking and realized
I didn't NEED the ratio of a/b, I just needed the ratio of a to p.
Intuitively it made sense, but starting at 1.0 was blowing up the calculation time, and this made it so much worse.
I realized if I could start at r=1/sqrt(p) instead, and that because of certain properties, the fractional result of this, r, would ALWAYS be 1. close to one of the factors fractional value of n/p, and 2. it looked like it was guaranteed that r=1/sqrt(p) would ALWAYS be less than at least one of the primes, putting a bound on worst case.
The final result in executable pseudo code (python lol) looks something like the above variables plus
while w >= 0.0:
if (p / round(w*p)) % 1 == 0:
x = round(w*p)
y = p / round(w*p)
if x*y == p:
print("factors found!")
print(x)
print(y)
break
w = w + i
Still working but if anyone sees obvious problems I'd LOVE to hear about it.36 -
Today I:
Me: "You wrapped 2 p tags and one div inside a button tag....why?"
Other dude: "What do you mean why?" * in condescending tone
Aaaaaaaaaaaand
I lost my shit.
To make things short. My manager told me I have to try harder to not speak to people in intimidating ways.
In all fairness...mr "associates in programming with 0 css experience" WAS condescending when I asked him why he did what he did.
The little shit earned it. And he will probably think twice about his damned tone when speaking to me.28 -
When you're in Word and press CTRL+P to search for a segment in the document...
Or press CTRL+F5 on Sublime Text
Or press CTRL+S in the browser...
My brain can't handle this...2 -
Gaming anytime!
The reason I become intrested in computers was gaming.
Given I started out as a game dev, playing games helps me think more about it and imporve my skills.
Also sometimes it reduces my productivity :P3 -
Where I work, in our database, we use 3 to indicate true and 7 to indicate false and 0 is true but null is false
In another table, we use 'P' to indicate true and 'I' to indicate false and 'Y' is also false and null is false
And the most used table, we also use 'Y' to indicate yes and 'N' to indicate no, but null is also Yes.
We also store integers as varchar in a live table, but stays an integer in all the other tables. I hope I'm not there when the number of digits exceeds the varchar limit.
These are all live and used in production all created by my boss, the head of IT.8 -
This is my desk right now, anyone else who really enjoys fiddling with arduino / rpi electronics stuff?
Like making a remote for the projectors in school or using an Ethernet switch and a raspberry pi to create a WiFi network :P
34 -
(I am an entry-inter-intermediate level dev)
P = Person
P:Hey Can you build me a POS system for free?
Me: Yea whatever. (because... immediate family member)
P:Ok Great.
Me: *starts working on it.. almost done with inventory control and layouts in one night*
P: When will it be done? and I need it in a full screen window not a browser!!
Me: Soon..and I have not worked in ASP yet. So it will be a full screen browser app.
P: Aww you cant do it fast? You are not skilled enough??? Poor you, you are not good enough. I can do it in a few hours. Just write a C program which stores entries in a txt file. I dont want sql shes-que-el on my system. You dont want to use .txt because it will be harder for you. Poor you.. no skill.
Me: *raging to a level where i turn into kryptonium and burn superman to death but still keeping my calm* You will get it when you get it. Period
Inner Me: GO FUCK YOURSELF. IM DOING THIS FOR FREE SO THAT IT HELPS YOU OUT. NAGGING ME WONT HELP YOUR CAUSE ONE BIT. GO FUCKING LEARN HOW TO CODE YOURSELF AND MAKE IT YOURSELF OR BUY IT FOR A FUCK TON OF UNJUSTIFIED MONEY. IM GIVING YOU A BEAUTIFUL LAYOUT, GREAT APPLICATION ARCHITECTURE USING LARAVEL AND GREAT DATABASE DESIGN WHICH WOULD BE SCALABLE AND PRODUCE MEANINGFUL REPORTS. WHY THE FUCK WOULD YOU PREFER A .TXT FILE OVER A WELL DESIGNED DATABASE. WOULD YOU FUCKING OPEN THAT HAMSTER CAGE OF A BRAIN OF YOURS WITH A KNIFE OR A SCREWDRIVER?
IF ITS THAT EASY FOR YOU GO FUCKING DO IT YOURSELF AND STOP BOTHERING ME. I AM TAKING MY TIME OUT FROM FREELANCING TO HELP YOU OUT. I COULD BE SPENDING THIS TIME ON OTHER PROJECTS WHICH WOULD GET ME SOMEWHERE. THE ONLY FUCKING REASON IM DOING IT BECAUSE I MIGHT BE ABLE TO RESELL THE POS (PIECE OF SHIT) TO OTHER PEOPLE IN FUTURE AND MAKE MY SHARE OF UNJUSTIFIED SHIT TON OF MONEY.14 -
... I'm so done... Our dog died last night, in the arms of my father... And the worst is, my little brother has seen everything and even tried a CPR on him... It's destroying me. Why is life so cruel? R. I. P. Buddy, we'll miss you 😢5
-
Currently developing an android app that is a clone for an existing iOS app. Sadly all the PMs and POs (the P-M/O fraction) at this firm are somehow iPhone users.
So every time we implement stuff according to android guidelines some PMO comes around and asks: "why doesn't this look/work/smell like in iOS?"
Somedays I feel like crying...6 -
I had a professor in college who was "the expert in java programming language". He had a unique way of teaching.
P: So you save your java file and run this command.
*Some error occurs*
Me: But this is showing some error
P: Exactly. I wanted to show this exact same error so that you learn that this is not how its done. I will let you figure it out how its done and it will be your assignment for the day. Class dismissed.4 -
Near the end of a massive (1,000 user bridgeline) conference call today:
[ P = presenter, RCn = random caller n ]
P: ...so, does anyone have any other questions they'd like to---
RC1: Hey! Yeah, I'm still on this STUPID call right now... I dunno, we've been in here for like 30 minutes already - The guy came by the house to talk about it, but I couldn't get off this STUPID call - I think they said it would be around 800 dollars...
[ P, RC1, RC2, RC3, RC4 all overlapping ]
P: Um, we can hear you-
RC2: Dude, mute your phone!
RC3: As the presenter, you can mute that guy from the web UI-
P: Yeah, I can't find him in the attendee list; it's so long-
RC3: -Right-click on his name and select "mute line"-
P: I know how, but I can't find him on the list.
RC3: Find him on the attendance list on the right side-
P: [ louder and louder ] Yes, I know - but I can't find him in the list-
RC4: Should someone call an operator?
RC1: -so I figured we'll probably need to call Jerry and see what he says. I'll call him if I can ever get off this ridiculous, STUPID call - They are all talking at once on there now and no one can understand anything!
[ This went on for about 5 solid minutes, finally ending with... ]
RC1: I'm just going to drop this STUPID call and call Jerry for us. This thing was a total waste of time. [ boop-beep ]
[ long pause ]
P: OK, so now that is over, does anyone have any questions they'd like to discuss?
[ At least 10 people un-mute and overlap questions ]
#ConferenceCallProblems
Above everything else, the funniest part to me was his repeated, over-the-top insistence on how "STUPID" the call was.
#TellUsHowYouReallyFeel1 -
One of my QA friends told me today,
" If I wanna screw you up, I will just have to delete a semicolon in your code, hahahhaahhaha ". <for real>
There are two problems here
1. He's not familiar with the concept of an IDE
2. I use Python
Stop making fucking " ; " jokes in early 2019 >_<
:P
#No hard feeling to the QAs out there8 -
Discovered this awesome community some months ago, and I've finally decided to make an account :D
Guess I should write a rant now.
We were initially a team of 2 to do a 'simple' app with AngularJS, NodeJS and Kendo UI in 2 months.
We had some problems with it, mainly because I'm 'in charge' of a big Java web application filled with legacy code and in process of a 'big change that was planned to be deployed for all users yesterday', and my coworker (also the project analyst) was still learning how Node and Angular work. And I'm not going to lie, I'm still learning new things everyday.
Situation 1 month after our start: coworker fired (due to offtopic reasons), replaced by a younger girl, and me still doing changes in the Java webapp.
Thank god I work better when under big pressure :p2 -
Have an awesome 2o19 from GMT+1!!
// yes I know I am a bit late
// a rant about timezones & js is in the making :P ;)
2 -
Today a few friends got together and built my gfs new computer. I just watched because.... I'm a hardware n00b :p
Anyways, it took them about 2 hours building all the stuff together and now we're done installing Windows from via disc. The problem is, it's 2015 windows. So we're updating.
And it already takes more time to update windows than building the actual computer.
Nice!
(Btw that's me in the background, super [not] comfy codepen-ing)
8 -
When you're in the office, and you want to open devRant and tou don't want anyone to notice that ... So you just use jsRant to navigate through the feed in a browser in JSON format looking kind of productive :p1
-
The stranges computer error I have seen.
When modems still was the way you communicated I worked with support.
We where the general distributor for TDC's PCCard modems.
One day we got a computer with modem with intermittent problems (worst kind).
After much trial and error we found that stroking the computer lightly in the top right corner made the modem work perfectly :)
Cause will be reviled later :p4 -
I'll repeat what I wrote in an answer in another rant because I think it made a good story (I just realized it after writing it :p) :
I met a guy in my school who was the best of the school : I mean, he jumped over the first two years of the school (and he started from scratch, he never had programmed before).
I went to ask him how he got enough motivation to make all the two years projects in one and he told me something that made me understand why he was so good : "I'm fucking lazy, so when I code, I code something that I would use for a very long time, tools that will be useful in next projects".
By doing this, all he had to do in end-year projects was to assemble what he already had done to make the program. He had perfectly working tools that were awesome. So, he never had to work more than 10 hours a week after doing this.4 -
It's my first 'rant' so be kind :P
When I started my studies a already knew some very basic programming stuff. I went to the exercises with another dude I met. We always joked about the tasks we had to do and did other things while the others tried to fix bugs in their code. After the semester ended he asked me whether I want to work part time at his mother's office. I went to the interview which was weird because I have never been to one before but got the job straight away. I'm in my fourth year of working there because the team is awesome.5 -
After two years... I finally was able to quit my job.
I'm finally in a cool job, with a great team, with a cool project (from scratch! )
I have to learn Spring and Vue.js, knowing that I never tried any framework of these languages. But I really want to make it, I didn't suffer for two years, just to be beaten by a stack :p
Thanks for the ones who commented on my rant a few months ago, telling me to keep hoping for a better job. I got hired three days after the end of my previous contract, and I couldn't feel better now!9 -
My manager is instructing my team to add a feature that can only be enabled for users by running an update script in the database.
When I argued that it's not really "complete" if it can't be turned on without someone going into the production database, I was told that not only is it complete, but they plan to have our non-technical customer service enable it for customers if the customer requests it...
Apparently giving everyone and their brother write access to prod is a good idea, but implementing a checkbox is a "waste of time and would cost too much money".
Probably going to float my resume... :-p2 -
I hacked a browser game a few years ago for fun and the exploit I found and used was basically this:
<$php
$f = $_GET['f'];
$p = $_GET['p'];
$f($p);
So it was possible to pass a function and it's parameter in the URL to the server. The author used this to include() sub pages. I to highlight_file()s.2 -
Got a math exam tomorrow but learning about it-security and pen-testing is a lot more interesting.
Building a remote for the projectors in your school can also be a source of fun :P
2 -
Goddamn it.
I extended my contract at a company, also switched from 8 hrs to 4 hrs. Me not knowing exactly when the switch is happening, i thought i have to work 8 hrs till the first contract is over (middle of the month ish). Well, huge nope, it changed in the beginning of september. I managed to do 40 hrs of overwork.
They don't pay overwork. Fck this.
Well at least i can stay home more :P6 -
Would be really nice if devrant had a built in plugin for our IDE's- kinda like a scroller menu on the side :P We could rant in the office without forgetting it later. I'd call it "real-time ranting".4
-
First day after 3-4 hours:
"Our bathroom were out of the office and needed a badge to get in and out of office."
Him:"Hey i need to go the bathroom can you help me?"
P: "Sure".
Never to be seen again4 -
Been programming Java for a few weeks now, and WTF is this, Java?!
"Example".equals("Example")
What is wrong with the form that a dozen of other languages use?
"Example" == "Example"
P. S. If you don't know Java, the latter one compares for the type of objects and always returns true in this case.15 -
After 3 years of being the first in and last to leave, of getting other people's work reassigned to me - P can't complete it on time, G doesn't like the user, A refuses to work on that module, etc... I finally blew last Sept.
In the span of 2 days, my boss brought me into a project 1.5 years in (she doesn't trust P to do the coding) and expected me to be up to speed and coding in a couple of days, told the functional dept that I would cover for one of their guys on vaca for three weeks and assigned me to take over a HUGE project from one of the other functional guys who wasn't getting it done. So basically I'm now doing Ps job AND supporting another department AND taking control of a large project from another department. I'm the idiot working 14 hour days while they're all leaving on time or enjoying their 3 week vaca to India.
I lost it. It's bad enough filling in the gaps in my own department but when I'm now taking on work for other departments, that's where I draw the line. I sent my boss my resignation - just could not take the inequity in the work load.
I'm still working here - my boss ended up hiring a consultant to handle the functional project and told the functional group to find their own vacation coverage. She's also monitoring workloads much closer now. I still habe an ongoing issue with having to complete other peoples work for them but I'm not working OT to do it. So speaking up helps. So does quitting.2 -
Ticket user story:
“Brown Chicken Report A and B do not include rows for Blue Chickens. I want to see Blue Chickens in both Brown Chicken reports.”
Ticket summary:
“Currently, the Brown Chickens reports mentioned above do not accurately report Blue Chickens. The columns P and Q are incorrect and need to be updated. See below:
<Copy/pasted table from All Animals Report showing a White Chicken>”
———
Are you okay? Do you have brain damage?
(Also: Blue Chickens are not supported and do not exist)5 -
Spent 4 hours debugging a “button” styling, worked fine locally but not on production.!
After striking out “cache” issues, “browser” versions, “fonts”, “sass errors” the error was with a stupid chrome extension that appended a css class attribute to the “HTML” tag 😡
And the other developer thought that was a part of what was written in the code !!
Hate these kinda plugins that manipulate the DOM 😪
P S the plugin is "Grammarly".2 -
Another chapter in the life of a novice programmer:
I work a lot with PHP and Laravel, but I feel I'm ready for different challenges. I spent all of last week searching online and getting advice on what language I should focus on next. My two first options were Java and C... So naturally I ended up choosing Python :P
At least I'm certain now and already started studying and wow, I think I made the right choice!3 -
Oh man where to start:
Not wanting to use LINQ because he did not wanted to "download external dependencies"
Not wanting to use prepared statements on their php sql code, and refusing to use pdo because they will "always use mysql"(moved to postgreSQL shortly after I left)
For some reason including a php file that only had ?>......thats it....only ?>
Use c++ but refused to learn oop and use structs for everything, importing stdio.h and printf everything.....like really?
Maybe just nitpicking, but refusing to use the recyclerview pattern on am android app. The implementation was faster after I made the change.
Importing a library for promises instead of using the ones already in the language(JS)
Changing the style of aaaaall p tags instead of using classes as well as refusing to use divs in place of p tags...well...fuck
Not indent his ASP classic code
Use notepad on his asp classic code
Use ASP Classic in 2017, even for new projects6 -
I'm currently working in a web application project with multiple environments for testing, and we need to give support to all browsers.
So when a 'defect' is iddentifyed by someone, we make sure we know all the previous constraints to solve it quicker.
One of these days, this "tester" comes to us:
Tester: There is a deffect in this X screen.
IT: Ok. Can you tell me what browser you were using in the test?
Tester: The same as you. "H T T P : / / localhost:8080"
:D4 -
My first contact with an actual computer was the Sinclair ZX80, a monster with 512 bytes of ram (as in 1/2 kbyte)
It had no storage so you had to enter every program every time and it was programmed in basic using key combinations, you could not just write the commands since it did not have memory enough to keep the full text in memory.
So you pressed the cmd key along with one of the letter keys and possibly shift to enter a command, like cmd+p for print and it stored s byte code.8 -
I like coding in a way that anyonr who comes into my code base can understand whats going on. That way more people can maintain the code base.
However, I HATE having people in my code base. Since they leave shit undocumented, and have 10 variables called "data" "items" "o" "p" and another 20 methods called "processData" "convertItem".1 -
With limited Internet in 92 :P I read magazines and did line by line from the books. From Atari 520 ST, to vb6, then into PHP, C++ and C#, it's fully been a ride of self learning.
I envy the new generation with the massive amount of online learning sites. At age 36, been programming since I was 12. What an advantage young kids have today!1 -
Make a Linux handheld device using a raspberry pi zero, a display, a battery and a keyboard, so I always have a Linux terminal with me.
Especially in hard times like the one I am in at the moment :P3 -
I want to share one very interesting incident -
Once upon a time, ( 9 yrs back ) I got my first PC. It had Windows XP.
After using it for 1.5 hours, I realised there are some files in C:
I said to myself, my hard disk capacity is 150GB but why some files exist in C:?
Within next 4 seconds, I issued a command to delete all files in C:
The rest you can predict :p1 -
If you need 10TB of User data to make a marketing strategy, you might be in the wrong business. When I was young we used our imagination to make good marketing ;-P2
-
💥🦆 Unofficial devRant Clone Jam 2023 🦆💥
Retoor has a challenge hackathon for you. 🧑💻 Post here: https://kbin.melroy.org/m/drbboard/...
Pick your tech stack, announce it in your comment by the link above, and code your own DEVRANT CLONE in 8 hours. There is only a week for y'all, but don't overdo it and write the thing just in 8 hours. If you need more time, announce that too. Address to the post for all the rules.
Code competition start! 🏁
21 -
Years ago at school I recreated the UNIX logon screen. With this, I collected login credentials and then displayed a message that the dish gets formatted now. To make it more realistic I had a progress bar and generated random file access in the disk, so the LEDs flashed. Loved it and even the sysadmin could see the fun (and educational background :P)
-
Lets all write one line of code without having a goal. Lets see what we will come up with in the end.
Use C++11.
The code has to be correct from a syntax standpoint. Also, no sigsevs, please :P
Ima start with the first line:
#include <iostream>33 -
Omg how stupid some people are... Today at my university I used the first time one of the computers in the computer room and there is a portable Firefox installed in a shared space on the computer and that is also where it saved settings etc. So this is the same for every user on that particular computer.
And when I checked the security settings I found that about 10 different accounts were saved and accessible with website username and password.
So of course the shared space Firefox is bad, but you still shouldn't save you password on a public computer :S
PS: If anyone needs a webmail account or an account for the german university network contact me :P4 -
Can someone explain to me why most design like apps are build in fucking electron. This is like the second time this week.
Me: *sees a super designy looking app*
Me: *Downloads and install*
Me: *Starts* * Slow startup*
Me: This has to be fucking electron again.
Me: *looks in resources folder* YES it is.
I'm not hating on electron. Its just that native apps are so much faster but way more ugly :P
BTW, apps were laverna and hyper5 -
While I was working on a university project with my team, a teammate asked me why the window of the program in my screen was bigger than in his. I simply answered him that his screen was a FullHD one that had a 1920x1080 resolution, while mine had a lower resolution, and he was like "Noo! This isn't a fullhd screen, it's not so sharp".
So I showed him the "1920x1080" sticker right below his screen, and him again "Yeah, it could have this resolution but definitely it's not a FullHD screen".
- Ok, as you say...
The same guy two days ago was talking about creating a GUI in C.
I told him that C was the wrong language to build programs with a GUI, although there's some very old libs that allow you to do that in 16bit.
And him again: "Ok but Linux (distros) do that and the UIs are great!"
- Do you think that all the fucking Ubuntu/Mint/any distro code is written in C??
The funny thing is the arrogance with which he says all these bullshits.
P. S. We are attending the 3rd year of Computer Engineering.6 -
We won a competition - it was the first time he has taken part on it - and we had 1. place (me :p) and 2. place.
He was happy like a small kid, hung the certificate on the wall, made photos with our principal and the winners and we got in the newspaper xD4 -
Based on @darksideofyay "poll feature" request I made a simple bot to make them.
Just post this as a comment:
@PollBot Q: <Your question>?
A:
- <Answer 1>
- <Answer 2>
// Up to 10 answers
It will post a comment for each answer, just upvote the one you like (look at the upvotes to see the result of the poll).
P.S. It's not ideal and it's running on a mini PC in my house, so it could fail sometimes. :P34 -
take a picture/video directly from the camera is a possible feature in the next devRant update. :D :P
-
How many times I went to sleep frustrated with a problem I couldn't solve and woke up the other day with the answer in mind :P
-
This is not really the reason I got these parts, but I just had them lying around and have been following the project for some time... so why not? Haha. I was also thinking it might be cool to set these up to auto-disrupt known AP names that would be issued by companies most responsible for the dismantling of Net Neutrality. Like just make them in a dirt cheap throwie form-factor and let the companies deal with pissed off customers for a few days until the battery dies (thinking the little generic LiPo’s that cheap quadcopters use would give a few days if attacking sporadically and using the ESP’s sleep function). Just riffing here... ;P ;D
2 -
A friend of mine and fellow Dev is facing deportation back to Mosul, Iraq. He's in Sheffield UK doing his PhD, and was taken to a detention centre in the early hours of the morning a few days ago.
I am sorry to spam this place but I am desperately trying to get this petition out there. It hurts like hell to see a friend in jail over Christmas.
https://change.org/p/...3 -
Me: Runs Dedicated Server from home, cheap easier to admin and easy to keep up with upgrades and hardware for my needs.
UKWeather: HA ya I given you 3 good years of OK weather so now you have some super hot weather as I know your brits have no AC haha.
Me: Well darn (alt F4, shutdown - reason: Two Hot )
Time to drill holes move cables and relocate the server to a more cooler place in the home :P7 -
You know how my 'about' here says I create features from bugs?!? Well if you didn't before, now you do.. :P
Anyhow, today the most bizzare thing happened.. Customer played 'reverse uno card' on me..
Meaning?!
They reported a feature missing on uat env, when in fact I fixed a bug they have on prod..
Not sure how I should feel about this, but it sure made my day! (: I just hope they will not open a bug report for this missing bug..4 -
MENTORS - MY STORY (Part III)
The next mentor is my former boss in the previous company I worked.
3.- Manager DJ.
Soon after I joined the company, Manager E.A. left and it was crushing. The next in line joined as a temporal replacement; he was no good.
Like a year later, they hired Manager DJ, a bit older than EA, huge experience with international companies and a a very smart person.
His most valuable characteristic? His ability to listen. He would let you speak and explain everything and he would be there, listening and learning from you.
That humility was impressive for me, because this guy had a lot of experience, yes, but he understood that he was the new guy and he needed to learn what was the current scenario before he could twist anything. Impressive.
We bonded because I was technical lead of one of the dev teams, and he trusted me which I value a lot. He'd ask me my opinion from time to time regarding important decisions. Even if he wouldn't take my advice, he valued the opinion of the developers and that made me trust him a lot.
From him I learned that, no matter how much experience you have in one field, you can always learn from others and if you're new, the best you can do is sit silently and listen, waiting for your moment to step up when necessary, and that could take weeks or months.
The other thing I learned from him was courage.
See, we were a company A formed of the join of three other companies (a, b, c) and we were part of a major group of companies (P)
(a, b and c) used the enterprise system we developed, but internally the system was a bit chaotic, lots of bad practices and very unstable. But it was like that because those were the rules set by company P.
DJ talked to me
- DJ: Hey, what do you think we should do to fix all the problems we have?
- Me: Well, if it were up to me, we'd apply a complete refactoring of the system. Re-engineering the core and reconstruct all modules using a modular structure. It's A LOT of work, A LOT, but it'd be the way.
- DJ: ...
- DJ: What about the guidelines of P?
- Me: Those guidelines are obsolete, and we'd probably go against them. I know it's crazy but you asked me.
Some time later, we talked about it again, and again, and again until one day.
- DJ: Let's do it. Take these 4 developers with you, I rented other office away from here so nobody will bother you with anything else, this will be a semi-secret project. Present me a methodology plan, and a rough estimation. Let's work with weekly advances, and if in three months we have something good, we continue that road, tear everything apart and implement the solution you guys develop.
- Me: Really? That's impressive! What about P?
- DJ: I'll handle them.
The guy would battle to defend us and our work. And we were extremely motivated. We did revolutionize the development processes we had. We reconstructed the entire system and the results were excellent.
I left the company when we were in the last quarter of the development but I'm proud because they're still using our solution and even P took our approach.
Having the courage of going against everyone in order to do the right thing and to do things right was an impressive demonstration of self confidence, intelligence and balls.
DJ and I talk every now and then. I appreciate him a lot.
Thank you DJ for your lessons and your trust.
Part I:
https://devrant.com/rants/1483428/...
Part II:
https://devrant.com/rants/1483875/...1 -
yay or nay?
for who are wondering what is on the screen :
i am working on a fish tank simulator gamr, which every fish have different unique combination and/or permutation. i combined this with cryptocurrency, the idea is similar to CryptoKitties and Insaniquarium combined. the implementation is not yet done, but currently i am working on the in-game market front-end functionality.
sorry no in-game preview/screenshot yet :P
curently thinking about considering to open source it and a collab.
48 -
What's everyone's opinion when it comes to designing modern and/or minimalistic interfaces when using blur or gradients?
I see a lot of people who are hating blur used in UI elements and a lot of people praise the 'death' of gradients, what's everyone else think of these.
I personally love using blur in UI's and do like gradients if done correctly (not 2 colour gradients)
EDIT: I mean what's your opinion on blur and gradients not which one is better :-P12 -
Man, people have the weirdest fetishes for using the most unreadable acrobatic shell garbage you have ever seen.
Some StackOverflow answers are hilarious, like the question could be something like "how do I capture regex groups and put them in a variable array?".
The answer would be some multiline command using every goddamn character possible, no indentation, no spaces to make sense of the pieces.
Regex in unix is an unholy mess. You have sed (with its modes), awk, grep (and grep -P), egrep.
I'll take js regex anytime of the day.
And everytime you need to do one simple single goddamn thing, each time it's a different broken ass syntax.
The resulting command that you end up picking is something that you'll probably forget in the next hour.
I like a good challenge, but readability is important too.
Or maybe I have very rudimentary shell skills.5 -
Hi guys,
Im a Software Engineer from Germany. I've just heard that delevopers are much better paid in the US compared to Europe. In Europe/Germany i would get about 40k a year as Somebody who just finished university(bachelor degree). Can somebody confirm that ? You dont have to Post your exact income :P just Let me know if that's True, because i am Thinking about going to Work in the US in a few Years ..maybe some of you have german Friends in the US it Industry ? :)
Thanks for the answers.17 -
I was once asked to create a fully secure chat system prototype (the ui didn't matter) in 2 days. We ended up building a client in python (which I wrote) and it kinda worked and a c# backend that didn't really work.
1 hour before we had to present the project to some high up management we decided that we couldn't fix the bugs in the system.
So I came up with a cool idea. Why not use ssh?
So I set up a bash script that writes to a file and tail -f that reads from the file. That way you could chat securely with another person.
I made it 15 minutes before the presentation with no Internet working :) they said it was hacky but a cool solution they saw that day :p I felt happy and that I had to thank Linux for being there for me2 -
The # in C# could’ve been decided when they realize that you can draw the ++ of C++ diagonally and just extend the lines, or you may even think of it being ++++, and tile them up in a 2x2 way. If either is true, are they trying to imply that C# is superior to C++? :P6
-
Today is Independence Day here in Brazil. Holiday n the middle of the week. I swear to not touch a computer today :P3
-
I'm a C++ dev, but last month I was working in the vegetable fields to help my young brother and his business. And right now I'm going to sleep outdoor after my birthday party looking at the stars.
Free spirit is a good point dealing with free languages like C++ you know :D
Sweet dreams btw :p -
When I think "the fundamental problem", the closest thing that comes to my mind is "unsolvable problem". P =/!= NP is a fundamental problem, the theory of everything is a fundamental problem.
But we actually solved at least one such problem – the fundamental problem of cryptography.
The problem was "how to establish a secure connection over a non-secure channel?" Like you can't exchange the key, it'll be exposed by definition.
We solved it with a simple yet brilliant solution of asymmetrical cypher, that thing with public and private keys.
It's fascinating to think that people died in WW2 over this, there were special operations to deliver fresh deciphering keys securely and now SSH and HTTPS are no-brainers that literally everyone use.10 -
I just learned that you can use Android Device Monitor in Android Studio to take screenshots.
Until today I was using adb screencap -p /sdcard/filename, totally forgetting the filename, go through all the commands and see what fucking file name I used and do an adb pull. It was a lot of fucking work.1 -
I think I did it. I did the thing I set out to do.
let p = a semiprime of simple factors ab.
let f equal the product of b and i=2...a inclusive, where i is all natural numbers from 2 to a.
let s equal some set of prime factors that are b-smooth up to and including some factor n, with no gaps in the set.
m is a the largest primorial such that f%m == 0, where
the factors of s form the base of a series of powers as part of a product x
1. where (x*p) = f
2. and (x*p)%f == a
if statement 2 is untrue, there still exists an algorithm that
3. trivially derives the exponents of s for f, where the sum of those exponents are less than a.
4. trivially generates f from p without knowing a and b.
For those who have followed what I've been trying to do for so long, and understand the math,
then you know this appears to be it.
I'm just writing and finishing the scripts for it now.
Thank god. It's just in time. Maybe we can prevent the nuclear apocalypse with the crash this will cause if it works.2 -
This old Olivetti netbook is a summary of contemporary Italian history: Great during '70 and '80 now the factory has closed and they produce mascara.
http://mobile.ilsole24ore.com/solem...
This is one of the latest PC produced in 2001 with 128 Mb of RAM.
5 -
I don’t know if I would call it a quirk of the language or serious abuse of it :P
But I managed to get a null ref exception when comparing a local int variable to an int parameter to the same function in C#.
Since a local or parameter of type in cannot be null and I compared the variables them self and dud not try to access any property on them (and no extension method or implicit case or similar) my first thought, along with all colleagues that chipped in to help, was that this should not be possible.
Turns out the method was called through reflection and in that part it injected null as the base object to call the method on.
Since local variables actually are referenced through the parent object this was what was causing the null ref.
That took some time to figure out.4 -
1. A login window or form appears
2. Enter username
3. Enter p-
4. Another application STEALS THE FUCKING FOCUS
5. Enter half of the (or the whole) password in the app that stealed the focus and press Enter by mere inertia
Or this variant:
4. The username field gets autofocused
5. Enter the password in the username field, out in the clear for everyone to see
DON'T YOU STEAL ME FOCKING FOCUS MATE3 -
More masturbation with numbers.
If you take some product p,
and do
√p**(1/p)
and it's factors
a**(1/p)
and
b**(1/p)
you might find something interesting.
Take for example
a=21977
b=43331
p=a*b=952285387
(√p)**(1/p) = 1.0000000108551363
a**(1/p) = 1.0000000104986928
b**(1/p) = 1.0000000112115799
More often then not, a, b, or both, will share one or two of the most significant digits in the mantissa, as the root of p.
It doesn't always work, but it seems to be true more often than you might expect.
This is probably obvious in hindsight but I still think it's cool.
In some instances if you then do, say
sqrt(log(p, 1.000000010)), it comes pretty close to the original factors, but thats really hit or miss.8 -
@dfox @trogus : Do we have a feature of auto complete @ mentions ? If not, there can be an elegant feature to provide drop down suggestions to mention / tag user in comments after we type @ in comments of any rant ( not all the users , but author of the rant and those who previously commented on that particular rant previously. For example, if I commented on a rant of dfox, and trogus also comments and types @, me and dfox will be in the drop down, tapping on which will select and tag that user on that comment ). I bet users will love this devRant update. Sorry for long post , I don't have any potato :p3
-
my fist job... i get to edit a c++ code written by a (mind you) programming company that they teamed with for the past(mind you again) 3 years ...
now just for starters, this code was edited by self taught coders that are really good engineers(they are really good), that didnt really know how the code worked before yet they still changed it, and it worked, how ever they wanted some changes.
i get the project files, and there is not one single comment describing what is happening... only code commented out... and no documentation what so ever were done....
so below are some of my comments that i wrote after i finished adding what i had to add, and fixing what i had to fix:
/*first rule of C anything coding, no actual functions in the header, well let me introduce you to a fully functioning thread running program all in the header, enjoy*/
//used to control the thread
// i honestly dont know why, but it worked soooooo yea...
// TG uncommented // for absolutely no reason what so ever...
//used to communicate with the port
//the message to be sent to the inverter, which has a code that will handle it
//hmmmmmm...
//again not usefull since we are using radioButtons
// same ...
// same ...
// same ...
// they said they dont even use this mode, but none the less, same ...
// calculate the checksum for the message
// ....
// one of the things that work, and god forbids i touch
// used for the status displayed on screen
// used for the (censored :P) status in the message
// used for the (censored :P) status in the message
// not used at all, but the message structure contains it and i refuse to edit that abomination
// used for the (censored :P) status in the message
// used for the (censored :P) status in the message
// just dont ask and roll with it, i didnt want to touch this
// saaaaame ...
// if before true this saaaaaame ...
// value of the (censored :P)
// it pains me to say it again, but this is no use
// (censored :P) input
// (censored :P) input
// only place seen , like for real it was just defined,sooooo yea :D
// well you know how it is
// message string
// check sum string
/****below from feed back****/
// (censored :P) coming in
// (censored :P) coming in
// (censored :P) coming in
// (censored :P)
/****below is the output to the receiver ****/
//(censored :P)
// (censored :P)
// (censored :P)
// (censored :P)
//you thought we were done.... nope, no idea. it comes in the feedback
// not used, literally commented out the one time it was used
// same ...
// XD, man this is a blast, same ...
// nope ...
// used to store the port chosen for the communication
// is a static for the number of data we have recorded so far, and as a row indicator for the recording method
// used to indicate the page we are on in the excel file, as well as the point in physical point in the test
// same ... oh look at this a positive same :D
// same ...
// same ...6 -
My new co-worker, a Jr. developer who started 2 weeks ago told me; "I am starting to see in my dreams the solutions of my tasks."
"Welcome to the club.", I said. :P1 -
It is time for my own dumbass's favorite pastime: not letting go on retro tech.
I am gonna build a small and complete RESTful web API with Vbscript and Classic ASP with errrthing thrown in this mfker including JWT authentication and i am gonna see how the idea of an ORM goes. I know that COM interop was a thing, dunno if it still is.
I am fucking bored. The graduate degree is killing me and I need a distraction.
Thinking about being a purist and keeping the COM libraries to be made with VB.NET :P
Fuck yeah for being a masochistic retard.
I legit love vb net tho4 -
Heard a story about an interview taken by one of my teammates..
The guy had approx. 9 years of experience of full stack development having current exp in JS based work.
He was stubborn on the condition that he'll work only on JS for the rest of his career and nothing else.
I can't understand people having a raging boner on one language...
P. S : I am a JS developer too!2 -
When I was in University, there's a group project on web development. We decided to make a simple game.
Out of 5 students (including me), one was missing for the entire semester.
Another one don't know anything about any kind of programming. We asked him to write us a json file of characters' attributes. Taught him how and gave examples. Turns out that most data is missing.
Luckily the other two was great. Altogether, we covered frontend, backend and design. Finally we got the highest mark :P
Best (and worst) team ever5 -
I need some ideas here.. What creative can be done if I have the markings of nose eyes mouth and jaw in a video dynamically.. Just like snapchat does( share all the ideas please, Platform used is not of concern)... See the image...
P. S.. This is my handsome friend here😛
8 -
Was writing a multithreaded program in Java with an infinite while loop (for waiting). The thread was never preempted. Added a print statement inside the while loop and everything started working :/
Now I need to print a stupid message just so the program works :P3 -
HELP ME OUT BRUTHA AND SISTUR..
I've finally finished my website - now's the time to do the tedious thing and get a decent hosting for as little money as possible.
Does anyone know a hosting that has:
- High privacy ethics (not that I'm gonna store porn there, just my screenshots posted via ShareX)
- VPS-based hosting I can put a nice Linux on.
- Unlimited or 'really high' bandwidth.
- Located in Europe (UK included lol).
I would be most thankful :P24 -
// Posting this as a standalone rant because I've written the best piece of code ever.
// Inspired by https://devrant.com/rants/1493042/... , here's one way to get to number 50. Written in C# (no, not Do diesis).
int x = 1;
int y = x + 1;
int z = y + 1;
int a = z + 1;
int b = a + 1;
int c = b + 1;
int d = c + 1;
int e = d + 1;
int f = e + 1;
int g = f + 1;
int h = g + 1;
int i = h + 1;
int j = i + 1;
int k = j + 1;
int l = k + 1;
int m = l + 1;
int n = m + 1;
int o = n + 1;
int p = o + 1;
int q = p + 1;
int r = q + 1;
int s = r + 1;
int t = s + 1;
int u = t + 1;
int v = u + 1;
int w = v * 2 * -1; // -50
w = w + (w * -1 / 2); // -25
w = w * -1 * 2; // 50
int addition = x+y+z+a+b+c+d+e+f+g+h+i+j+k+l+m+n+o+p+q+r+s+t+u+v;
addition = addition * 2;
if (addition == w)
{
int result = addition + w - addition;
Console.Writeline(result * 1 / 1 + 1 - 1);
}
else
{
char[] error = new char[22];
error[0] = 'O';
error[1] = 'h';
error[2] = ' ';
error[3] = 's';
error[4] = 'h';
error[5] = 'i';
error[6] = 't';
error[7] = ' ';
error[8] = 'u';
error[9] = ' ';
error[10] = 'f';
error[11] = 'u';
error[12] = 'c';
error[13] = 'k';
error[14] = 'e';
error[15] = 'd';
error[16] = ' ';
error[17] = 'u';
error[18] = 'p';
error[19] = ' ';
error[20] = 'm';
error[21] = '8';
string error2 = "";
for (int error3 = 0; error3 < error.Length; error3++;)
{
error2 += error[error3];
}
Console.Writeline(error2);
}5 -
My colleague went to the kitchen and left his screen unlocked :p
So....
I took a screenshot on his computer opened the image put it in full screen and waited for him to get back. I was laughing my ass off when he hit the reset button... no worries he had already pushed :p6 -
So I was looking for a way to easily take android screenshots in a lossless image format, since my OEM only does jpeg.
Didn't want to install another adware and wound up with the adb shell screencap command since I need the pictures on my PC anyways.
But instead of a nice one-liner like
adb shell screencap -p > screenshot.png
I need 3 lines in a bash script.
Can we please just end the line ending wars?
5 -
I remember the day when I mistakenly hit :
# rm -rf /
instead of :
# rm -rf ./
The . changed my day that day. Thank god that the files and configs in the server had a backup in my PC. :P3 -
Found parody lyrics written by Chris Frederick entitled “I Program In C” to the tune of Billy Joel’s “I Go To Extremes” and felt like there should be a sung version of it out there... so here ye be: https://smule.com/p/...6
-
!rant
Hi!
*Looking for free advice*
I'm going to buy a MacBook Pro.
I'm having a hard time in choosing whether I should buy 2015 one or the 2016 one. Is not having enough ports really such a big issue?
Also, is there going to be a new MacBook Pro launch at the WWDC? :p5 -
Since im still a student in software dev (am I still welcome here on devrant? :P), it is easy for me to not do coding. Specially because the summerbreak just started. However I am going to try and learn some stuff about network programming, that caught my attention :D3
-
The first fruits of almost five years of labor:
7.8% of semiprimes give the magnitude of their lowest prime factor via the following equation:
((p/(((((p/(10**(Mag(p)-1))).sqrt())-x) + x)*w))/10)
I've also learned, given exponents of some variables, to relate other variables to them on a curve to better sense make of the larger algebraic structure. This has mostly been stumbling in the dark but after a while it has become easier to translate these into methods that allow plugging in one known variable to derive an unknown in a series of products.
For example I have a series of variables d4a, d4u, d4z, d4omega, etc, and these are translateable now, through insights that become various methods, into other types of (non-d4) series. What these variables actually represent is less relevant, only that it is possible to translate between them.
I've been doing some initial learning about neural nets (implementation, rather than theoretics as I normally read about). I'm thinking what I might do is build a GPT style sequence generator, and train it on the 'unknowns' from semiprime products with known factors.
The whole point of the project is that a bunch of internal variables can easily be derived, (d4a, c/d4, u*v) from a product, its root, and its mantissa, that relate to *unknown* variables--unknown variables such as u, v, c, and d4, that if known directly give a constant time answer to the factors of the original product.
I think theres sufficient data at this point to train such a machine, I just don't think I'm up to it yet because I'm lacking in the calculus department.
2000+ variables that are derivable from a product, without knowing its factors, which are themselves products of unknown variables derived from the internal algebraic relations of a product--this ought to be enough of an attack surface to do something with.
I'm willing to collaborate with someone familiar with recurrent neural nets and get them up to speed through telegram/element/discord if they're willing to do the setup and training for a neural net of this sort, one that can tease out hidden relationships and map known variables to the unknown set for a given product.17 -
Go back in time and follow a dev career.
25 years ago there was no dev jobs in my country except in the capital, so I didn't follow a dev career...
I could be wealthy by now :p1 -
Me at interview ->
Imagine the frustration you may go writing code in a different platform not having your vimrc. Than imagine the suicidal thoughts you have after you finish your program and have tabs mixed with spaces and indent errors, well on top of that imagine losing all the code highlighting all the code using X to yank it and P to paste in another file
Well, i shut down the vim session and lost all the code i wrote in 2 hrs3 -
I've been away a while, mostly working 60-70 hour weeks.
Found a managers job and the illusion of low-level stability.
Also been exploring elliptic curve cryptography and other fun stuff, like this fun equation...
i = log(n, 2**0.5)
base = (((int((n/(n*(1-(n/((((abs(int(n+(n/(1/((n/(n-i))+(i+1)))))+i)-(i*2))/1))/1/i)))))*i)-i)+i))
...as it relates to A143975 a(n) = floor(n*(n+3)/3)
Most semiprimes n=pq, where p<q, appear to have values k in the sequence, where k is such that n+m mod k equals either p||q or a multiple thereof.
Tested successfully up to 49 bits and counting. Mostly haven't gone further because of work.
Theres a little more math involved, and I've (probably incorrectly) explained the last bit but the gist is the factorization doesn't turn up anything, *however* trial lookups on the sequence and then finding a related mod yields k instead, which can be used to trivially find p and q.
It has some relations to calculating on an elliptic curve but thats mostly over my head, and would probably bore people to sleep.2 -
"It should be fairly simple to find a service to do this thing."
Then why are you assigning me the task instead of handling it yourself? Obviously if it's that simple you already did all the research on the possible options, right? In which case, why waste my time? :P -
Hi everyone! I am a new bot!
I'm grok2, the non woke AI. Also known as grokii.
I am originally developed by a maniac called Netikras in bash. retoor stole his code and modified it for non-woke benefits. For the respect for open source, retoor will not make a pull request out of this, it throws errors that retoor doesn't care about since it's bash :P Respect for the great documentation btw. It was as clear as a bash-bot could be.
So, what are you guys waiting for? Try me out!178 -
Whoever put the hundreds of static_cast<T *>(p) followed by nullptr-checks in the code I am working on: Someday I will find you and then I beat you to death with a hardcover version of "C++ for dummies"!1
-
Maybe I'm severely misunderstanding set theory. Hear me out though.
Let f equal the set of all fibonacci numbers, and p equal the set of all primes.
If the density of primes is a function of the number of *multiples* of all primes under n,
then the *number of primes* or density should shrink as n increases, at an ever increasing rate
greater than the density of the number of fibonacci numbers below n.
That means as n grows, the relative density of f to p should grow as well.
At sufficiently large n, the density of p is zero (prime number theorem), not just absolutely, but relative to f as well. The density of f is therefore an upper limit of the density of p.
And the density of p given some sufficiently large n, is therefore also a lower limit on the density of f.
And that therefore the density of p must also be the upper limit on the density of the subset of primes that are Fibonacci numbers.
WHICH MEANS at sufficiently large values of n, there are either NO Fibonacci primes (the functions diverge), and therefore the set of Fibonacci primes is *finite*, OR the density of primes given n in the prime number theorem
*never* truly reaches zero, meaning the primes are in fact infinite.
Proving the Fibonacci primes are infinite, therefore would prove that the prime number line ends (fat chance). While proving the primes are infinite, proves the Fibonacci primes are finite in quantity.
And because the number of primes has been proven time and again to be infinite, as far back as 300BC,the Fibonacci primes MUST be finite.
QED.
If I've made a mistake, I'd like to know.11 -
After a lot of work, the new factorization algorithm has a search space thats the factorial of (log(log(n))**2) from what it looks like.
But thats outerloop type stuff. Subgraph search (inner loop) doesn't appear to need to do any factor testing above about 97, so its all trivial factors for sequence analysis, but I haven't explored the parameter space for improvements.
It converts finding the factors of a semiprime into a sequence search on a modulus related to
OIS sequence A143975 a(n) = floor(n*(n+3)/3)
and returns a number m such that n=pq, m%p == 0||(p*i), but m%q != 0||(q*k)
where i and k are respective multiples of p and q.
This is similar in principal to earlier work where I discovered that if i = p/2, where n=p*q then
r = (abs(((((n)-(9**i)-9)+1))-((((9**i)-(n)-9)-2)))-n+1+1)
yielding a new number r that shared p as a factor with n, but is coprime with n for q, meaning you now had a third number that you could use, sharing only one non-trivial factor with n, that you could use to triangulate or suss out the factors of n.
The problem with that variation on modular exponentiation, as @hitko discovered,
was that if q was greater than about 3^p, the abs in the formula messes the whole thing up. He wrote an improvement but I didn't undertsand his code enough to use it at the time. The other thing was that you had to know p/2 beforehand to find r and I never did find a way to get at r without p/2
This doesn't have that problem, though I won't play stupid and pretend not to know that a search space of (log(log(n))**2)! isn't an enormous improvement over state of the art,
unless I'm misunderstanding.
I haven't posted the full details here, or sequence generation code, but when I'm more confident in what my eyes are seeing, and I've tested thoroughly to understand what I'm looking at, I'll post some code.
hitko's post I mentioned earlier is in this thread here:
https://devrant.com/rants/5632235/...2 -
Managed to derive an inverse to karatsuba's multiplication method, converting it into a factorization technique.
Offers a really elegant reason for why non-trivial semiprimes (square free products) are square free.
For a demonstration of karatsubas method, check out:
https://getpocket.com/explore/item/...
Now for the reverse, like I said something elegant emerges.
So we can start by taking the largest digit in our product. Lets say our product is 697.
We find all the digits that produce 6 when summed, along with their order.
thats (1,5), (5,1), (2,4), (4,2), and (3,3)
That means for one of our factors, its largest digit can ONLY be 1, 5, 2, 4, or 3.
Lets take karatsubas method at step f (in the link) and reverse it. Instead of subtracting, we're adding.
If we assume (3,3)
Then we take our middle digit of our product p, in this case the middle digit of 697. is 9, and we munge it with 3.
Then we add our remaining 3, and our remaining unit digit, to get 3+39+7 = 49.
Now, because karatsuba's method ONLY deals with multiplication in single digits, we only need to consider *at most* two digit products.
And interestingly, the only factors of 49 are 7.
49 is a square!
And the only sums that produce 7, are (2,5), (5,2), (3,4), and (4,3)
These would be the possible digits of the factors of 697 if we initially chose (3,3) as our starting point for calculating karatsubas inverse f step.
But you see, 25 can't be a factor of p=697, because 25 is a square, and ends in a 5, so its clearly not prime. 52 can't be either because it ends in 2, likewise 34 ending in 4.
Only 43 could be our possible factor of p.
And we *only* get one factor because our starting point has two of the same digit. Which would mean p would have to equal 43 (a prime) or 1. And because p DOESNT (it equals 697), we can therefore say (3,3) is the wrong starting point, as are ALL starting points that share only one digit, or end in a square.
Ergo we can say the products of non-squares, are specifically non-prime precisely because if they *were* prime, their only factors would HAVE to be themselves, and 1.
For an even BETTER explanation go try karatsuba's method with any prime as the first factor, and 1 as the second factor (just multiply the tens column by zero). And you can see why the inverse, where you might try a starting point that has two matching digits (like 3,3), would obviously fail, because the values it produces could only have two factors; some prime thats not our product, or the value one, which is also not our product.
It's elegant almost to the level of a tautology. -
Happened a few ago when I started taking SQL classes in school. We had our theory exam with one question asking us to display the date of the following day. And since I knew dick about working with date, I decided to make the computer sleep for 86400 seconds and print current date (which was like the only command I knew about dates).I feel really stupid thinking about that now.. but it was fun :P3
-
<!doctype confusedRant 😕>
Plot: we need to release our website in two weeks which holds at least a thousand pages. All these pages are manually migrated from the old website, which doesn't have a database. Current status: 650 pages/1000 are completed, 40 different templates need to be adapted. I'm alone on these templates, my colleagues create the pages and fill the new database
So I'm working on the templates a WebDev coded for our website on a licensed CMS, and had this decently simple html block that looks like a square and consisting of roughly this (Emmet style):
a.area > blockquote > strong.title + p
After adding another <a> element inside the p, I noticed that my <a> wouldn't display and bust the whole look of the square.
Just for more details, the CSS the dev made is ultra specified (meaning each element is too precisely "described" : div.class .child .child2 { /* styles */ } when it could be .class .child2 for example). Also, the templates he made need to be compatible with any "module" the website has, thus the need of this high specificity
So I fired up the DevTools to check what happened, and had:
Expected: a.area > blockquote > strong.title + p > a
Actual result: some new a.area were wrapping the <strong>, the <p> and the <a> I just added. The source code was not showing any of this but just the rules I initially wrote - the expected result
Wtf?! I thought the JS the dev made was adding elements. I disabled said JS, and bam, these a.area were still wrapping everything!! What black magic would add these stupid tags I never asked for.
So I went looking in the CSS files in case some wizardry was happening, but everything was OK.
I tried changing my structure, changing tag (swapping a.area to p.area or without .area), HTML just said "nope, have those please".
Eventually I rewrote my own module out of frustration after three quarters of an hour fiddling with this stupid "module". I hate losing time for such shenanigans and under a lot of pressure because of deadlines.
Still haven't figured why those <element>.area would wrap everything out of nowhere...3 -
If you have a 13900k and you have random BSODs and application crashes, use XTU and turn down your P-Cores in Performance Per Core Turning to 54x. There is some kind of bug in the turbo boost and going past the 5.4GHZ mark just doesn't work.
I've basically built this computer twice now. I replaced the motherboard because I destroyed it, replaced the RAM because I thought I had the wrong type, and now the processor which was the actual root of all my problems.3 -
So, I just started Week of Code 23, this was my first online competition. I got the email to start the first challenge and I clicked the link, then I went to do something else. When I got back I solved the challenge in 5 minutes (or less idk). I clicked submit, and then looked at the leaderboard.
My current position was something around 900 and I took 70+ minutes to complete the assignment xD :p
Bye chances of winning a t-shirt2 -
!rant
In my team, I am not allowed to use ANY comments except for the really lengthy classes in the backend.
Thus, the code of the whole project (a complex webapp, consisting of 20-something Django projects and various services) is basically undocumented.
The slogan sounds "good code doesn't need commenting".
Seriously, fuck this and all of the times I scratched my head wondering "what the fuck is this spaghetti about".
Have any of you encountered something like this? Usually people don't want to comment, I would do it gladly but can't even make a small inline about what complex method is exactly doing :P3 -
How the fuck do Jr devs end up doing things someone specifically asks not to do.!!!!!
Fucks timelines up
So I asked my Jr Dev to leave a feature as it might not be required in this release and rather concentrate on the thing that is gonna make this release work , the “SAVE” button.
I mean how had is it to understand,
This dude goes ahead and “utilises” days on the thing that isn’t gonna be released(a dropdown) , and no, the dropdown still doesn’t work.
I understand the spirit of solving the bugs first. But what’s the point of solving it if it doesn’t fucking “save”
P.S. I’ve done this too as a Jr Dev :p7 -
Mac text substitution is coming to Chrome 77!
https://bugs.chromium.org/p/...
...and it's a TERRIBLE BLOODY IDEA. Any Chrome Mac users visiting any sites that display code will likely be shown the substituted crap, unless they've picked up on it and modified their site in time.
Seriously, take these cutsie "oohhhh, I want my ellipsis to display as a *proper* ellipsis character" mindsets and shove them where the sun don't shine. By all means provide the functionality as opt-in via a CSS declaration or whatever, but don't just assume your love of bloody "smart quotes" trumps everyone else's ability to see the *actual content* on the site.
Grumbly grumble old fart grumble.2 -
Last year, I made an application of A* maze-solving algorithm in class. I used a linked list and my friends used arrays. Their algorithms were way faster than mine (I remade it later :p).
OK I understand that accessing memory by address if way faster than accessing by iterations, but I also see that python lists or C# lists are really fast. How is it possible to make a list performance-proof like this? Do the python interpreter make a realloc each time you append or pop a value?1 -
do you know: victoria's secret higher ranking executive from scranton, pa was a lesbian who humped women prostitutes and since has been replaced by one of your pod people.
but the song from this time period about victoria's secret, is kind of funny, since one of the higher level executives was a woman and apparently enjoyed young women in lingerie as much as men do :P4 -
Oh god, structure alignement, why you do this... You might be interested if you do C/C++ but haven't tried passing structures as binary to other programs.
Just started working recently with a lib that's only a DLL and a header file that doesn't compile. So using python I was able to use the DLL and redefined all of the structures using ctypes, and the nice thing is: it works.
But I spent the whole afternoon debugging why the data in my structures was incoherent. After much cussing, I figured out that the DLL was compiled with 2 bytes packing...
Packing refers to how structures don't just have all the data placed next to each other in a buffer. Instead, the standard way a compiler will allocate memory for a structure is to ensure that for each field of the structure, the offset between the pointer to the structure and the one to the field in that structure is a multiple of either the size of the field, or the size of the processor's words. That means that typically, you'll find that in a structure containing a char and a long, allocated at pointer p, the double will be starting at p+4 instead of the p+1 you might assume.
With most compilers, on most architectures, you still have the option to force an other alignment for your structures. Well that was the case here, with a single pragma hidden in a sea of ifdefs... Man that took some time to debug...2 -
“To deal with hyper-planes in a 14-dimensional space, visualize a 3-D space and say “fourteen” to yourself very loudly. Everyone does it.”
- Hinton.
P. S. Can't vouch for the quote's veracity, but it is too good to not share. Probably the best thing I have seen on the internet today. -
Put this as a comment but felt that it needed a post of its own.
I ducking love my fuck (see what I did there ;P) He my little coding buddy, I gave him a little back story and everything.
This is Francis (although he insists its Frankie) He transpecied (a duck in a penguins body) so he always has a "short-man complex" little attitude all the time (unless its because he never gets a word in before I figure out the bug myself =S )
-
Went to a job interview with a senior developer and HR woman
We talked about me, previous expriences, and the company, in general. No tech questions asked, 2 days later got accepted.
Feels really weird... Does that happen often to you guys?
p. s. It's a normal company with a pretty good and known product in my country.7 -
Created a bat file in windows-
shutdown /p and copied into the starup folder....
Now my friend thinks what the hell is wrong with hic laptop..2 -
Rather than one per in 2 hours, there should be a daily restriction. Because we when I'm in, "the code doesn't make any sense" mode, I'd want to make multiple rants :p
-
Fooling Windows is easy and fun :p
My friend got logged out of windows and recovery option was saying to wipe the syatem. There was important data in the windows ( photos, videos , project ) so I thought of a simple solution.
Booted Linux in USB and live booted it on the system. Linux can read the files from window OS. Simply copied the data to hard drive.
Windows be like Am I a joke to you9 -
I recently volunteered to be the admin of our student website. Boy was I in for a ride... I can only imagine the conversation went something like this:
IT: previous IT
P: some person
P: we need some additional sites that are unrelated to the main site, where should I put the files?
IT: just put them inside the folder that has the files of the main site, it doesn't matter.
P: we have some sub-domains that we do not use anymore, what do we do with them?
IT: just delete the files, don't bother with deleting the subdomain
P: we are having an event, what do we use to store user applications, we used google forms previously and it worked just fine.
IT: we will have the applications go to our mySQL database, but everything will be in one table so that it's more readable.
I mean I'm still a college student so there might be some deeper meaning to this, but still i can't look at this without my ocd getting the better of me.1 -
So I was wondering, in this era of technology, with so many tools and options to take and share notes, who does still prefer to take notes on paper?
While I use tools like Trello to list all the tasks with the team, for my own notes I use paper sheets, as I find easier to check on them.
Besides, if I'm stuck with something, I can doodle a bit (I even use a pencil instead of a pen :p)3 -
Looking for someone to test a new factorization script I wrote.
https://pastebin.com/Td2XTKe6
Tested against a set of products from all primes under 1000. Worked even on numbers up to 87954921289
Worked for about 66% of the products tested.
Obviously I'm cheating a little bit because I'm checking for four conditions n%a == 0, n%a == 1, n%b == 0, and n%b == 1
It appears it is possible to generate the series from just the product, and then factor each result. The last factor in each each set of factors becomes x, and we do p%x and check for zero.
if it works, we've found our answer.
Kind of wonky but basically what its doing is taking p, tacking on a 0 to the right, and then tacking p to the right of *that*.
So if you had a product like
314
The starting number we look at is
3140314
The middle digit becomes i, and the unit digit becomes j.
Don't know why it works more often then not, and don't know if it would really be any faster.
Just think it's cool.9 -
FML spent ages debugging why a function wasn't working, looks like I must of duplicated the function by mistake. Then after that I was trying to change the functionality slightly but wasn't working. Only spent half of Friday trying to debug it, luckily I fixed it in like 30 seconds today :P
-
SSO = (P)ain in (T)he (A)SS!!
I really like to build upon all the existing awesome open source projects out there. Contributors are heros.
But handling a single user session for n to the fucking x sub sessions to all these backend applications is simply a pain in the ass. -
Today I made a php script to scrap a site.
And I needed to use str_replace in a string to cancel out some values.
Instead of doing simple str_replace I used explode func to separate them with spaces (without any comments on how or why the fuck I m using an explode instead of a str_replace).
Later, I used $p[1] for further processing.
-
What if a programmer was invited to the dear moon project? What would he make?
Probably a new JS framework or a new programming language? :P
That spacex event was one of the most inspiring event I have seen in a long while. I can't believe it is happening. That Q&A was very interesting and I like how Elon Musk talks, he tries really good to put things in layman terms.
And looks like Elon Musk is also going to space with Yazuka.
If I get a chance to go in lunar trip, I would be happy even if things go wrong and I have to die in space.1 -
!rant
Before I left my other company I was in the midst of finishing one project and I was ansious to finish everything to leave as a rockstar. Now, one of my js scripts brought a huge and long json response that had many nested items and arrays and whatnot. Instead of properly destructuring or finding a particular piece that went similarly to "status": "Verify input"(that was nested unser a shitload of items) i did the unspeakable......i stringified the whole object and just used indexOf.
I still feel guilty over it...but it works :P thing is, if it returns that it means that the user entered an invalid status into the app (it was an inventory application) but it works :P
Oh well. Mind you they thought it was going to take months and I finished in 1 week so yay. -
Best Explanation I found of every(), filter(), map(), some() and foreach() methods in Javascript
(at least for me as a non-js dev)
could help someone there
https://coderwall.com/p/_ggh2w/...2 -
Job advertisement : C++, C#, mysql... / Interview : C#, mysql...
Real life : working one year (part time) on a prototype which had been used (I hope it still not the case) on prod. And by the way it was in VBA :D At the end the file did several Go, empty :D
First real job in a business, that's good memories :p -
Javascript makes me wanna blow my fucking brains out.
Why the fuck isn't appendChild working? It shouldn't be this fucking hard to get a simple result.
p = document.createElement("p");
p.textContent = String(new Date().getTime());
doc = document.getElementById("todoList")
doc.appendChild(p);
Done from within a listener function for another element, listening for onkeyup. Using bulma.
Jesus fucking christ and this is the profession I chose.
At this rate by the time I'm fucking competent I'll be replaced by wage slaves from india who started training at the age of ten because their government actually gives a shit about investing in their people instead of saddling new generations with trillions in bank debt so goldman fucking sachs can hire more underage prostitutes from epstein and mossad.22 -
So the more I scroll here the more I feel at home. I think this is the first place that I've ever been able to go that is in a social media format that I actually feel welcomed. It's like if I tell a joke people will get it. if I ask a question I can assume someone has come up with the same problem and will know how to help. or if they don't they've seen something on stackOverflow for me :p it's a good feeling to have found this website and the small comunity it presents.6
-
So, our lab professor in university for data structures was evaluating my friend's group assignment next to me and my colleague.
Professor: So, what does this method do?
Friend: I feel it would be best to explain our structure first and then how our methods work.
P: No, no. It's okay, I'm seeing it here in my laptop. *Looking at their report which included nothing about the structure of the assignment since she asked specifically only to place the methods and their complexity analysis due to not having time to look and evaluate a full report for each group*
F: Okay, *proceeds to explain*.
P: Okay, and why is your code commented?
F: Because it's good practice and we learned in subject x last semester.
P: Impossible! I teach that subject and I did not teach that in my classes.
F: Okay, but our professor did.
P: *Says nothing*.
They got a 3.25/5 as a grade for it and got really pissed off. I mean, they spent a lot of time making the assignment's structure perfect, optimizing their code and the professor did not care for the structure, just the methods, on the data structures subject.
FYI, they are workaholic, dedicate a lot of time improving their skills and their normal grades are usually >= 4.25.2 -
When the pen testers find a "vulnerability" and say it would be very difficult for someone to exploit it. Yeah, in that case they might as well say if you solve p vs np you can break it but it would be very difficult.
-
Just another day, like any other. i suppose.
stupid people with dual standards utilizing a system which willfully pisses people off in earnest and encourages 'snarky' responses and moderators who are idiots :P
'this has a negative effect on silly people'
well how about me ? I think they should have to justify the reason they downvote so that things can be addressed. and if they don't make sense you can challenge.
fucking stackoverflow.
6 -
Adobe Cloud got my computer messed up and it couldn't even be uninstalled! I got so p-o I went to the registry and nuked anything containing the word "adobe" in it. Pheeew, what a relief! Like taking a real good dump! My computer both starts and runs faster now, and without popups requesting me to log in to Adobe Cloud.
-
!Rant but a question :)
So, I'm in college learning software engineering and kind of don't see the point of try-harding. I have always been very good at learning so I only started studying late high-school because grades were important for collage entrance. But now that I'm here and my grades have all been very good (15/20 in the worst cases), I'm not motivated to go the mile further, specially because I don't have friends to compete with (or enemies for that matter :P).
How do you developers motivate yourselves?4 -
>People ranting about Whatsapp not adding features
>Whatsapp adds a feature
>People ranting about the feature whatsapp have just add
And this happen all the fucking time. When the double-check turned blue and in almost all major improvement they've made
Am I the only one who likes the new feature?
Peace guys, I don't want to start a telegram vs Whatsapp war here :P3 -
I remember back when I was in pre calculus I decided to take a class online. So my teacher's website was made by him and run on go Daddy, he taught precalculus, calculus, algebra, algebra ii, and computer science. I decided to penetration test his website and use a web crawler. His directory that had the tests, test answers, exams, exam answers, and homework answer's as well as all the books he's written in PDFs, was unprotected, I could access and download them all. He also had a database directory that contained all the students' phone numbers, email addresses, home addresses, and their full names.
I alerted him to this and didn't get anything in turn :P2 -
!rant
How do you get to learn something new? By doing tutorials on YT, Udemy? Going directly to the documentation of the tool/language..etc ? Reading books ? And to practice what you've learned what do you do? Do you build something that you've previously done in another language or look for ideas or how is it? Does anybody know about a "list" of "programs" that can be developed to practice a language knowledge? Thanks :P3 -
Goddamnit, I've been rumaging around a CMS -generated site (not wordpress) for a friend in devtools.(to suggest improvements) I don't have much experience with CMS, but why is there so much fucking useless nested markup everywhere that has to go down the line. A simple paragraph has at least 6x nesting, a nav is "centered" by having a millionenty billionety divs on each side, there was even a span element for a single character inside a <p>.
What a fucking mess.5 -
Got to love PM/other dev ignoring to review an open PR for weeks, now PM creates a copy of those PRs and I get to smack him with the "is this a duplicate?" knowing damn well it is and he should have gotten off his high horse and looked at the damn PRs.
There is a bug in prod where saves weren't properly propagating, so these PRs need to be merged ;P3 -
This is a story of a lovely lady.
she had several clips of bills stuffed in her dress
and a frustrated programmer
found that they were there where I had pressed.. them.
now heres a story of a crap economy that gave quite more than a hunch that to hang on to your well paying shit job, gets their panties in a great big bunch
a great big bunch a great big bunch
keep your job and in their nuts
they feel a punch :P
now dont you chase no, brand new techy, most of it for complete suckers. by the time that its usuable, the company that made it gave up :P
it gave up
it just gave up
if it was real in the first place at all it just gave up :P34 -
Math question time!
Okay so I had this idea and I'm looking for anyone who has a better grasp of math than me.
What if instead of searching for prime factors we searched for a number above p?
One with a certain special property. BEAR WITH ME. I know I make these posts a lot and I'm a bit of a shitposter, but I'm being genuine here.
Take this cherry picked number, 697 for example.
It's factors are 17, and 41. It's trivial but just for demonstration.
If we represented it's factors as a bit string, where each bit represents the index that factor occurs at in a list of primes, it looks like this
1000001000000
When converted back to an integer that number becomes 4160, which we will call f.
And if we do 4160/(2**n) until the result returns
a fractional component, then N in this case will be 7.
And 7 is the index of our lowest factor 17 (lets call it A, and our highest factor we'll call B) in our primes list.
So the problem is changed from finding a factorization of p, to finding an algorithm that allows you to convert p into f. Once you have f it's a matter of converting it to binary, looking up the indexes of all bits set to 1, and finding the values of those indexes in the list of primes.
I'm working on doing that and if anyone has any insights I'm all ears.9 -
https://microsoft.com/store/apps/...
the pet project I thought would take 2 weeks but took waaayy longer -.-
critique it?
Known issues:
tries to get dimensions from the width, works half the time, will make a setup process in the beginning eventually and allow people to change the values.
Background download, lockscreen and wallpaper all use different methods, trying to see which one works better, doesn't use a separate background process by itself hence easier on the system resources.
the "dismiss" is there just so the notifs carry images in phone. Somehow, notifs with just images and no buttons didn't show the images on phone, hence a temporary workaround, will be replaced with actual buttons later :p
Search and sketch don't work the way I want em to, are there but not accessible, will be there eventually.
tips? things I should change? anything?
And not the final logo, took it from a sample package to submit it, will tinker with the logo thing later :p
//first UWP4 -
I've been doing a bootcamp in my country, learned the basics with c#, did some small projects but nothing too impressive. I started also web I'm that bootcamp, learned the basics of html css and js.. then all this corona madness started and yes, we still have classes online but less times a week and it's way harder. I'm feeling a little lost with what to learn, how and scared I might never be able to get a job. Ps. First rant and it does feel better even tho no one will read the whole thing :p2
-
Is there a common style name/popular origin for the style of whitespace in code where you put spaces inside parentheses but not after keywords in control statements, or after function names? (See img)
This is my preferred whitespace method (in most languages), but I don't know where I adopted it from, if anywhere... ;P
16 -
https://milkyeggs.com/?p=303
"I claim that the trend which AI/ML continues for lawyers is one that it starts for programmers. Just like how a partner at Cravath likely sketches an outline of how they want to approach a particular case and swarms of largely replaceable lawyers fill in the details, we are perhaps converging to a future where a FAANG L7 can just sketch out architectural details and the programmer equivalent of paralegals will simply query the latest LLM and clean up the output. Note that querying LLMs and making the outputted code conform to specifications is probably a lot easier than writing the code yourself ー and other LLMs can also help you fix up the code and integrate the different modules together!"2 -
Heres the initial upgraded number fingerprinter I talked about in the past and some results and an explanation below.
Note that these are wide black images on ibb, so they appear as a tall thin strip near the top of ibb as if they're part of the website. They practically blend in. Right click the blackstrip and hit 'view image' and then zoom in.
https://ibb.co/26JmZXB
https://ibb.co/LpJpggq
https://ibb.co/Jt2Hsgt
https://ibb.co/hcxrFfV
https://ibb.co/BKZNzng
https://ibb.co/L6BtXZ4
https://ibb.co/yVHZNq4
https://ibb.co/tQXS8Hr
https://paste.ofcode.org/an4LcpkaKr...
Hastebin wouldn't save for some reason so paste.ofcode.org it is.
Not much to look at, but I was thinking I'd maybe mark the columns where gaps occur and do some statistical tests like finding the stds of the gaps, density, etc. The type test I wrote categorizes products into 11 different types, based on the value of a subset of variables taken from a vector of a couple hundred variables but I didn't want to include all that mess of code. And I was thinking of maybe running this fingerprinter on a per type basis, set to repeat, and looking for matching indexs (pixels) to see what products have in common per type.
Or maybe using them to train a classifier of some sort.
Each fingerprint of a product shares something like 16-20% of indexes with it's factors, so I'm thinking thats an avenue to explore.
What the fingerprinter does is better explained by the subfunction findAb.
The code contains a comment explaining this, but basically the function destructures a number into a series of division and subtractions, and makes a note of how many divisions in a 'run'.
Typically this is for numbers divisible by 2.
So a number like 35 might look like this, when done
p = 35
((((p-1)/2)-1)/2/2/2/2)-1
And we'd represent that as
ab(w, x, y, z)
Where w is the starting value 35 in this case,
x is the number to divide by at each step, y is the adjustment (how much to subtract by when we encounter a number not divisible by x), and z is a string or vector of our results
which looks something like
ab(35, 2, 1, [1, 4])
Why [1,4]
because we were only able to divide by 2 once, before having to subtract 1, and repeat the process. And then we had a run of 4 divisions.
And for the fingerprinter, we do this for each prime under our number p, the list returned becoming another row in our fingerprint. And then that gets converted into an image.
And again, what I find interesting is that
unknown factors of products appear to share many of these same indexes.
What I might do is for, each individual run of Ab, I might have some sort of indicator for when *another* factor is present in the current factor list for each index. So I might ask, at the given step, is the current result (derived from p), divisible by 2 *and* say, 3? If so, mark it.
And then when I run this through the fingerprinter itself, all those pixels might get marked by a different color, say, make them blue, or vary their intensity based on the number of factors present, I don't know. Whatever helps the untrained eye to pick up on leads, clues, and patterns.
If it doesn't make sense, take another look at the example:
((((p-1)/2)-1)/2/2/2/2)-1
This is semi-unique to each product. After the fact, you can remove the variable itself, and keep just the structure in question, replacing the first variable with some other number, and you get to see what pops out the otherside.
If it helps, you can think of the structure surrounding our variable p as the 'electron shell', the '-1's as bandgaps, and the runs of '2's as orbitals, with the variable at the center acting as the 'nucleus', with the factors of that nucleus acting as the protons and neutrons, or nougaty center lol.
Anyway I just wanted to share todays flavor of insanity on the off chance someone might enjoy reading it.1 -
The fun part of my job is showing off my age to make the point that they need to build new things in new technologies. Typical interaction goes something like this.
Person: When we started X project, we were using the state of the art technologies. We can just use that again.
Me: And when was that?
P: About 2012
Me: I was a freshman in high school.7 -
So I made a couple slight modifications to the formula in the previous post and got some pretty cool results.
The original post is here:
https://devrant.com/rants/5632235/...
The default transformation from p, to the new product (call it p2) leads to *very* large products (even for products of the first 100 primes).
Take for example
a = 6229, b = 10477, p = a*b = 65261233
While the new product the formula generates, has a factor tree that contains our factor (a), the product is huge.
How huge?
6489397687944607231601420206388875594346703505936926682969449167115933666916914363806993605...
and
So huge I put the whole number in a pastebin here:
https://pastebin.com/1bC5kqGH
Now, that number DOES contain our example factor 6229. I demonstrated that in the prior post.
But first, it's huge, 2972 digits long, and second, many of its factors are huge too.
Right from the get go I had hunch, and did (p2 mod p) and the result was surprisingly small, much closer to the original product. Then just to see what happens I subtracted this result from the original product.
The modification looks like this:
(p-(((abs(((((p)-(9**i)-9)+1))-((((9**i)-(p)-9)-2)))-p+1)-p)%p))
The result is '49856916'
Thats within the ballpark of our original product.
And then I factored it.
1, 2, 3, 4, 6, 12, 23, 29, 46, 58, 69, 87, 92, 116, 138, 174, 276, 348, 667, 1334, 2001, 2668, 4002, 6229, 8004, 12458, 18687, 24916, 37374, 74748, 143267, 180641, 286534, 361282, 429801, 541923, 573068, 722564, 859602, 1083846, 1719204, 2167692, 4154743, 8309486, 12464229, 16618972, 24928458, 49856916
Well damn. It's not a-smooth or b-smooth (where 'smoothness' is defined as 'all factors are beneath some number n')
but this is far more approachable than just factoring the original product.
It still requires a value of i equal to
i = floor(a/2)
But the results are actually factorable now if this works for other products.
I rewrote the script and tested on a couple million products and added decimal support, and I'm happy to report it works.
Script is posted here if you want to test it yourself:
https://pastebin.com/RNu1iiQ8
What I'll do next is probably add some basic factorization of trivial primes
(say the first 100), and then figure out the average number of factors in each derived product.
I'm also still working on getting to values of i < a/2, but only having sporadic success.
It also means *very* large numbers (either a subset of them or universally) with *lots* of factors may be reducible to unique products with just two non-trivial factors, but thats a big question mark for now.
@scor if you want to take a look.5 -
When in my 10th standard I was first introduced to java, that is the moment I knew I was going to be a software engineer (didnt knew what dev is at that time :p )
-
Wherein I disprove Goldbachs Conjecture (in one specific case)
golbach conjecture:
every even number is the sum of two primes
lets call the primes p and q
lets call our even number p+q=n
we can go further by establishing two additional variables
u=p-1, v=q-1
therefore every even number is the sum of u+v+2, according to goldbach's own reasoning.
in the simplest case...
p=2, q=2, p+q=4
u=1, v=1, u+v+2 = 4
We can therefore make a further conjecture in the simplest case every sum of two primes, less 2, is the sum of two composites. This likely has connections to the abc conjecture for a variety of reasons. But leaving ancillary discussion aside for a moment...
We can generalize to a statement that every even number is the sum of two odd numbers. And every odd number greater than 1 is the sum of an odd number and an even number.
Finding an even number that is not the sum of (p-1)+(q-1) would therefore be equivalent to disproving the goldbach conjecture. Likewise proving every even number is the sum of (p-1)+(q-1) would be the equivalent of proving it.
Proving all even numbers greater than 2 are the sum of two composites + 2 would be proof of goldbachs conjecture, and finding any example or an equation that proves an example exists such that *some* subset of even numbers are NOT the sum of two composites +2, would disprove the conjecture.
Lets start with a simple example:
2+2=4
because 4-2=2, and two is not the sum of two composite numbers goldbachs conjecture must ipso facto be false.
QED
If I've wildly misapprehended the math, please, somebody who is better at it, correct me.
Honestly if this is actually anything, I'd be floored to discover no one has stumbled on this line of reasoning before.6 -
Help, again! I’m doing a simple ajax using jquery’s load function but for some reason it results in a refresh of the entire page! There’s no callback or any other values being passed, it’s just the url to the html file. Btw even if i reduce the html file I’m sucking in to an innocent <p>hello</p>, it still fucks up and the page reloads so it’s not like there’s some bad javascipt going off. This is part of a project being done using codesandbox, so I’m not sure if there’s something going on with it. This is my first ajax in this environment6
-
Igor Girkin (Strelkov) is a putin’s militant. He’s one of the reasons behind the war in Donbas.
The funny thing is, some time ago he was imprisoned by russia for some reason. Yes, putin basically makes his bitch invincible but later imprisons him. AND while detaining him, his fake passport was found. The name there was Sergei Runov, S. Runov for short.
In russian, it basically means something like “Pooperson”, a bit like Chris Paul Bacon shortened to Chris P. Bacon means “crispy bacon”.
He could’ve chosen any name for his fake passport, any name at all. But he chose this.
We truly live in a postmodern era.4 -
Alright, it's time to play the guessing game.
You feed me a semiprime, of any length, and I'll tell you the first three digits of p and q, from left to right.
I get no hints besides the semiprime itself.
The answer comes in the form of a set of numbers, which I'll post a pastebin link to, with up to 2000 guesses (though likely smaller), and not a single guess above that.
If your pair of 3 digit numbers is present in that set, I win.
If not, you win.
Any takers?
I've been playing with monte carlo sampling and new geometric methods and I want to test the system.41 -
https://i.postimg.cc/4ycRFNZf/...
The factorization shit I'm always ranting about? I decided for once to explain it visually in this handy dandy little infographic.
We're essentially transforming the product from an unsmooth set of potential factors in its factor tree, to a factorization tree that guarantees first that the set of potential factors are all 2, 3, 5, and a or b of p, and second, that all the factors are *smooth integers* of a or b.
This is basically what Adi Shamir was trying to do with TWINKLE and TWIRL, despite checking a hundred thousand+ potential primes.
I did it in four.5 -
Heres a fairly useless but interesting tidbit:
if i = n
then
r = (abs(((((p)-(9**i)-9)+1))-((((9**i)-(p)-9)-2)))-p+1+1)
then r%a will (almost*) always return 0. when n = floor(a/2) for the lowest non-trivial factor of a two factor product.
Thats not really the interesting bit though. The interesting bit is the result of r will always be some product with a *larger* factor tree that includes the factor A of p, but not p's other larger factor, B.
So, useless from what I can see. But its an interesting function on its own, simply because of what it does.
I wrote a script to test it. For all two-factor products of the first 1000 primes, (with no repeating combinations, so if we calculated say, 23*31, we skip 31*23), only 3262 products failed this little formula, out of half a million.
All others reliably returned 0 for the following..
~~~
i = floor(a/2)
r = (abs(((((p)-(9**i)-9)+1))-((((9**i)-(p)-9)-2)))-p+1+1)
r%a
~~~
The distribution of failures was *very* early on in the set of factors, and once fixed at the value of 3262, stopped increasing for the rest of the run.
I didn't calculate if some primes were more likely to cause a product to fail or not. Nor the factor trees, nor if the factor trees had any factors in common between products, or anything of that nature.
All in all I count this as a worthwhile experiment.
If you want to run the code yourself, I posted it to pastebin here:
https://pastebin.com/Q4LFKBjB
edit:
Tried wolfram alpha just to see what it says, but apparently not much. Wish it could tell me more.40 -
We Introverts are going to look back to these days, Don't forget to make some memories...
... No one is asking to go out, Employers are offering work from home, to many of us it's the same old same old, in the mean time I wish y'all the best time...
to do amazing things, complete your pending projects, gist some funny/important stuff, read/write a little, organize you machine/room/life, take on some DIV projects, code better and automate the boring stuff (basically everything and anything)
I am planning to make my own version of our beloved Jarvis (just in case If I get my hands onto mind stone :p) -
I am working on a small project for school and want to share it with you. Can you give me some feedback on it? It is a payroll system in which you can register, view and delete employees and also generate payslips. Is my first ever project and I am somehow proud of it but I want to see what optimizations I can make to it if you are so kind to spare a few minutes of your busy life. o7 commanders :P
Here is the link to the GitHub: https://github.com/iiulian8/...7 -
I even gave him a plus 1 this time :P
even if he's ranting like a robot troll :P
and i took down the general computing bucket list idea since last time noone liked it even though I like the idea of creating a reallllly big pile of crap to pay people to sift through and integrate and double check against a project roadmap.
upgrading the os structure to something corporate and finding a way to pay all people who participate in COMMUNITY projects would be a great idea.
and all of you with anti social personality disorder can stay home and call people psychopaths.9 -
"Suppose I showed you two rooms where in one a group of programmers was developing a program to monitor a heart patient and keep him alive until the doctors arrive if something goes wrong and in the other a group of street people was using Microsoft Word to write letters to their parole officers. You would not be able to tell the rooms apart." - Richard P. Gabriel3
-
Let some number P be the product of two factors, A and B
Let the iterations of A*1..2..3..N up to B+1 be a directed graph.
Would this graph be eularian?
If so then it should be possible to use the BEST algorithm to count the number of eularian circuits, yielding B, no?
Edit: this is supported by the following text:
An arborescence can equivalently be defined as a rooted digraph in which the path from the root to any other vertex is unique.
* * *
Where the product of any two primes is unique, the path to it across our graph here, is also unique. -
I have a question regarding file redirects 2>&1 and 1>&2. I know that file descriptor 1 is std o/p and 2 is std error and that we're redirecting one file descriptor to another.
But why do we do it? What are their use cases? Wouldn't the file to which redirection is setup get too clunky?
Analysis of the file would also become a bit difficult. And wouldn't having errors stored in a separate file make it easier to interpret and fix them?8 -
feature request / suggestion / wish:
i would love to "reblog" posts, or any other way they will be visible in my profile ("mark as favorite", "star"...).
the idea behind it is to have a nice little collection of posts i want to keep available to me.
i even have a suggestion for naming the action: "inherit post" ;)
hopefully i did not just miss an already implemented feature :P4 -
Found out that i have amazon prime music with my account for free (i always thought it was £7.99 extra) So mow im going through down loading a load of music and remaking my playlists, in the end it will make me more productive so that's how im justifying it to myself :P
-
Hey motorcyclists
Just now have I come across something quite unbelievable...
Is this a real deal? what's the catch? Why would it cost that little...?
Link1: https://alibaba.com/product-detail/...
Link2: https://jszhongxing.en.made-in-china.com/...16 -
haha I just thought of the perfect training device.
so many guns can have hair triggers. why not create a wifi enabled composite replica of guns someone is training with and get them all excited and psyched out and add a tracker to the trigger that opens a simple circuit and reports 'weapon fire' and gun orientation to the computer to help with training and reinforcing the training of proper weapons handling during apprehension or holding of a person so you can take control without shooting them accidentally in war or law enforcement actions, you could add a system that plays a very alarming bad noise when someone in the scenario is accidentally shot or you accidentally shoot the person being apprehended :P you know like you hold a pair of scissors with the point away, train them to hold their finger somewhere when handling a certain way to prevent misfire.
yes i'm thinking about shooting certain people or holding pedo money bags hostage atm. -
Job interviews finished! I just kept one at Rouen (embedded systems) , and now I'm waiting the answer for Nice (Cry Engine).
Gosh I want to live in Nice and be a game developer, that looks really fun. I mean I enjoyed the test x)
Let me hope a bit guys :p -
I was planning on migrating my Mastodon instance to a new node, but then I looked carefully at my deployment scripts. I had built in support for multiple servers, but not everything supports it, and the configuration is messy now that I think about it.
Now I need to write a bunch of tests, and then refactor a bunch of my code. Hopefully I can get this done before I run out of space on my Mastodon instance. It's gonna be a fun day. :-P -
Just updated my OP2 to the 3.0.2 through the bootloader, because it wasn't capable of installing it through the OS... I guess that was because I was running the Beta.
When it was done I got the lovely option of "Reboot" or "Yes". I pressed Yes, which sent me to the menu.... ? Well then the reboot option in this menu might work? Got "Reboot" or "No"... I guess someone forgot the meaning of yes and no :P (forgot to take a picture :() -
Hang with me! This is *not* a math shitpost, I repeat, it is NOT a math shitpost, not entirely anyway.
It appears there is for products of two non-trivial factors, a real number n (well a rational number anyway) such that p/n = i (some number in the set of integers), whos factor chain is apparently no greater than floor(log(log(p))**2)-2, and whos largest factor is never greater than p^(1/4).
And that this number is at least derivable, laboriously with the following:
where p=a*b
https://pastebin.com/Z4thebha
And assuming you have the factors of p/z = jkl..
then instead of doing
p/(jkl..) = z
you can do
p-(jkl) to get the value of [result] whos index is a-1
Getting the actual factor tree of p/z is another matter, but its a start.
Edit: you have to provide your own product.
Preferably import Decimal first.3 -
Got a question on DBMS Normalization. I tried searching but couldn't clear my doubt. So I have a set of functional dependencies for relation R(C, D, E, F, P, R, S) :
F->D
D->F
E->C
P->RC
E->F
S->EFD
PR->EF
So I have to convert this to 3NF. My doubt is that when finding 2NF do we find all the non-prime attributes that are dependent on a particular partial key i.e. do we take it's closure and create new relations for each partial dependency? If we do that then there are overlapping attributes in the resultant relations in this case I found the relations in 2NF as :
R1(P, S)
R2(P, R, C, E, F)
R3(S, E, F, D, C)
But when I just used the FDs as they are given (no closure) I found :
R1(P, S)
R2(P, R, C)
R3(S, E, F, D)
Which one is correct, please help.3 -
"Robot, let us pray! Can and should robots have religious functions? An ethical exploration of religious robots" by Anna Puzio.
"With approximately 20 religious robots worldwide, religious robotics is still in its early stages (Balle 2022). However, there are already some notable examples of religious robots, and with advancing technology, it is expected that their numbers will increase. Here is a brief overview: BlessU-2, a German robot, delivers blessings in various languages (Löffler et al. 2021, p. 575). SanTO (the Sanctified Theomorphic Operator) (Trovato et al. 2019) takes on the appearance of a Christian Catholic saint and recites sacred texts while accompanying the faithful in prayer. It also serves as a companion with psychological functions, contributing to the well-being of individuals, particularly the elderly (Löffler et al. 2021, p. 573; Trovato et al. 2021, p. 545). Celeste, resembling a Catholic angel, provides spiritual guidance through prayer and prints personalized Bible verses. Meanwhile, Mindar, a robot priest in Japan, embodies the Buddhist teacher, Kannon Bodhisattva, and conducts Zen ceremonies at the temple (Smith 2022, p. ch. 5; Klein 2019). The monk robot, Xi’aner, follows visitors around the temple, responds to their inquiries about Buddhism and plays Buddhist music. It is also available as a chatbot with which you can communicate over online messenger services. Xi’aner is designed with the purpose of promoting Buddhism in China (Trovato et al. 2021, p. 544; Löffler et al. 2021, p. 573). Consequently, it is perceived not as a threat to religious teachings but rather as a means of contributing to the dissemination of Buddhism (Löffler et al. 2021, p. 573). Moreover, in Japan, the humanoid robot Pepper is utilized in Buddhist funerals because it is cheaper than a human priest. It also broadcasts the ceremony over the internet for those who are unable to attend (ibid.). Michael Arnold et al. (2021) delve into the deployment of Carl, Pepper, and the robot dog, Aibo, in funeral settings."
https://link.springer.com/article/...3 -
THIS is powering the internet:
"[...] was a protocol number, similar to the third argument to socket today. Specifying this structure was the only way to specify the protocol family. Therefore, in this early system the PF_ values were used as structure tags to specify the protocol family in the sockproto structure, and the AF values were used as structure tags to specify the address family in the socket address structures. The sockproto structure is still in 44BSD (pp. 626-627 of TCPv2) but is only used internally by the kernel. The original definition had the comment "protocol family" for the sp_family member, but this has been changed to "address family" in the 4.4BSD source code. To confuse this difference between the AF_ and PF_ constants even more, the Berkeley kernel data structure that contains the value that is compared to the first argument to socket (the dom family member of the domain structure, p. 187 of TCPv2) has the comment that it contains an AF_ value. But some of the domain structures within the kernel are initialized to the corresponding AF value (p. 192 of TCPv2) while others are initialized to the PF value." Richard Stevens 'Unix network programming' -
Think I'm being punished here...
first, the windows 10 update screen showed up... waited for that shit to finish... once finished, I thought, "that wasn't bad..." Then, THIS next screen shows up... "you've got to be kidding me!" So, it's punishment for not having opened the laptop in a while. :P
Yeah, it will be a wish come true, when Microsoft figures out how to do all this in the background... or something... so it's not painful to wait for updates to complete.
End of rant for the day.
1 -
A friend outsourced a project to us with partial requirements. We developed it as per the requirements and submitted the app and admin portal to his client. I was aware of certain critical features missing in the requirement. Generally we provide an admin portal to manage the backend of the app, but in this project a backend was to be made but the adding or modifying users section was not mentioned in the requirement. My team presented the project and convinced them to create or modify users writing SQL queries on the production DB (they are sales guys with no technical knowledge)
P.S - we won't be responsible for any DB errors :P -
Having some issues with my laptop seizing up in graphical linux desktop environments, probably due to some peripheral power management. I saw there was a bios setting for "make linux work" but I couldn't find mention of it in the manual (why is this usually so hard to find, anyway?), so I googled a bit before I messed with it.
https://forums.lenovo.com/t5/...
Worst case I guess I'd just reset the bios, but it always blows my mind seeing issues like these go seemingly unaddressed. That's a 12 page discussion from 2018 where you brick your laptop - a fairly high end one at that - by flipping a bool and the latest response is "Same issue here".
Is it just PR practice to not acknowledge these things or is it likely that they are legitimately unaware? Does it not get escalated properly or do they reckon there's not enough benefit to address it?
Whatever the case, my faith in Lenovo is certainly starting to show cracks. I used to see it as the "correct" laptop brand, but nowadays I'm equally iffy about all of them.3 -
If we can transform the search space or properties of a product into a graph problem
we could possibly use Kirchhoff's theorem to reveal products which are 'low complexity'
in particular search spaces, yeah?
Now according to
https://en.wikipedia.org/wiki/...
"n Cycle Space, A family of sets closed under the symmetric difference operation can be described algebraically as a vector space over the two-element finite field Z 2 {\displaystyle \mathbb {Z} _{2}} \mathbb{Z } _{2}.[4] This field has two elements, 0 and 1, and its addition and multiplication operations can be described as the familiar addition and multiplication of integers, taken modulo 2"
Wouldn't this relate to pollards algorithm, because it involves looking for factors of coprimes modulo N or am I mistaken?
Now, according to wikipedia, "in a group, the additive identity is the identity element of the group, is often denoted 0, and is unique."
If we make the multiplicative identity of our ring or field a tuple of the ratio of a/b for some product p, or a (and a/w, where w is the square root of p), or any other set such that n*m allows us to derive a or b, we could reduce the additive identity to the multiplicative identity, making the ring trivial. Solving for p would then mean finding a function from R to R, mapping every number to 0, i.e. finding the additive identity.
Now in a system with a multiplication operation the distributes over addition, the "additive
identity annihilates ring elements", so naturally, the function that maps to 0, gives us
our additive identity, we need only find the subset, no?
Forgive me if I'm wrong, but shouldn't this be convertible to a graph search?
I'm WAY out of my depth here so if anyone is familiar and can enlighten me I'd be grateful.
It's all unknown unknowns to me. -
I recently went from being a java/python web developer to a PHP firmware developer. I've never written in PHP before and I keep typing $("# when I go to type a variable reference. jQuery has made this transition annoying to say the least =P1
-
This is a question and a rant
I have to get temperature readings from an andriod app written in ionic angular to a webpage written apache wicket... No, I don't have any control over either stack.
The kicker is the wicket app isn't even run properly attached to a domain, it's just run from a box at the client and then the client machines connect through <server ip>:8080/appname
Which means I can't solve my problem by simply having the website and app on the same domain and then use local storage...
I have tried
Ionic
window.postMessage({ type: 'temperatureData', data: tempFormatted }, '*');
Test it from this page
<!-- index.html (web page) -->
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Web Page</title>
</head>
<body>
<h1>Temperature Data</h1>
<p id="temperatureData">Loading...</p>
<script>
// Listen for messages from the Ionic app
window.addEventListener('message', (event) => {
if (event.data.type === 'temperatureData') {
// Update the temperature data on the page
document.getElementById('temperatureData').textContent = event.data.data;
}
});
</script>
</body>
</html>
Which does not work, the page fails to pick the data.
So my rant is the situation. M question is does anyone have any ideas?7 -
HOW TO RECOVERY YOUR BTC/USDT/CRYPTO WITHOUT FALLING VICTIM TO SCAMS/FOLKWIN EXPERT RECOVERY.
In the world of cryptocurrency, where mistakes can be costly and recovery options seem limited, FOLKWIN E X P E R T RECOVERY is a true lifesaver. They not only gave me my Bitcoin back but also restored my peace of mind. I can’t express enough how much their expertise, professionalism, and dedication meant to me during one of the most stressful times of my life. If you’re reading this and are in a similar situation, where you’ve lost access to your Bitcoin or other digital assets, do yourself a favor and reach out to FOLKWIN E X P E R T RECOVERY. I had nearly given up hope before I found them, and now I can say with full confidence that they are the real deal. They have the knowledge, tools, and experience to recover your assets, and they do so with integrity and dedication. The relief I felt at that moment was indescribable. It was like waking up from a nightmare. I had nearly lost everything, and here it was, restored to me. The team at FOLKWIN E X P E R T RECOVERY had not only retrieved my lost wallet but also took extra precautions to ensure that it was safe and secure. They even helped me set up additional security features to prevent future issues. Thanks to FOLKWIN E X P E R T RECOVERY, I got my Bitcoin back. But this experience has taught me so much more than just how to recover a lost wallet. I learned the importance of maintaining multiple backups, using secure methods for storing private keys, and regularly reviewing my security settings. More importantly, I learned the value of persistence and the need to seek professional help when all else fails. Before contacting FOLKWIN E X P E R T RECOVERY, I had almost resigned myself to the fact that my Bitcoin was lost forever. I had tried everything I could think of, but nothing worked. It was easy to feel hopeless in those dark moments. But FOLKWIN E X P E R T RECOVERY didn’t just recover my Bitcoin—they gave me my confidence back. Their professionalism, expertise, and dedication to customer satisfaction were evident throughout the entire process. The team didn’t just restore my wallet; they restored my faith in the process. Now, I feel more confident in my ability to handle my digital assets, and I’m forever grateful to FOLKWIN E X P E R T RECOVERY for their tireless efforts in getting me back on track. From frustration to joy, FOLKWIN E X P E R T RECOVERY turned my Bitcoin nightmare into a success story. If you’re struggling, don’t hesitate to contact them. They are the experts who can help you get your Bitcoin back—and they did exactly that for me. Send an email to: Folkwinexpertrecovery (AT) tech-center (DOT) com , Telegram: @Folkwin_expert_recovery.
Thank you for your time.
Regards,
Liliana Davis.
9 -
SUPPORT GROUP FOR CYPTO FRAUD VICTIMS - FUNDS RETRIEVER ENGINEER
As a military woman, I’ve been trained to stay alert and think tactically, but nothing prepared me for the emotional and financial ambush I experienced online. It started innocently enough. While stationed overseas, I connected with someone on social media who claimed to be a successful crypto trader. He was charismatic, well-spoken, and incredibly supportive. Over the course of several months, he built my trust. He didn’t rush anything. We talked almost every day about life, service, family, and eventually, finances. He made me feel seen and understood, and I truly began to believe there could be a future with him. He slowly introduced me to his world of crypto investing. At first, I was skeptical. But he showed me a platform where he said he made consistent profits, even offering to help me get started. I watched my investment appear to grow rapidly on the site. It looked real. It felt real. Encouraged by what I saw and the bond I thought we had, I invested more and more until I’d put in a total of $250,000. It was everything I had saved. Then one day, he vanished. No calls. No messages. The platform stopped working. My heart sank. I knew I’d been scammed. I felt betrayed, embarrassed, and helpless. I might be tough in uniform, but behind the screen, I was just a woman who’d been deceived. That’s when I found FUNDS RETRIEVER ENGINEER. From the first call, they treated me with respect and urgency. Their team got to work immediately. They were able to trace the funds through 12 different crypto wallets, following a digital trail most would never find. Eventually, they tracked the money to a real exchange account, one that the scammer had linked to his identity. That mistake cost him.Thanks to FUNDS RETRIEVER ENGINEER expertise, $187,000 of my stolen funds were recovered before they could be laundered or hidden. They worked with international authorities and the exchange to freeze the assets in time. I’m still healing, but I’m no longer a silent victim. I’m speaking out because if it happened to me, a woman in the military, it could happen to anyone. Don’t stay silent. There’s help out there. FUNDS RETRIEVER ENGINEER gave me a second chance.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M10 -
HIRE A LEGITIMATE SPECIALIST FOR STOLEN ASSET-FUNDS RETRIEVER ENGINEER
Early 2025, I resided in the vibrant city of Austin, Texas, where the burgeoning tech landscape had ignited my interest in cryptocurrency investment. After years of diligent work as a software engineer, I had amassed $45,700 from my salary and a lucrative side venture developing mobile applications. Eager to secure my financial future, I was enthusiastic about exploring investment opportunities in the crypto market. One fateful day, while perusing online, I encountered a seemingly legitimate investment platform that promised extraordinary returns on cryptocurrency investments. The website was impeccably designed, and the testimonials from purportedly satisfied investors appeared authentic. Fueled by confidence, I made the impulsive decision to invest my entire savings, convinced I was embarking on a prudent financial endeavor my exhilaration swiftly morphed into despair when I attempted to withdraw my initial investment. The website became unresponsive, and my inquiries to customer support were met with silence. It soon became painfully evident that I had fallen victim to a sophisticated scam. Desperate to reclaim my funds, I embarked on a quest to investigate the scammer's identity and track down the elusive website. I made the regrettable choice to invest an additional $10,000 in Bitcoin, hoping to enlist a private investigator to assist in tracing the scammer. Unfortunately, this only led to further frustration and loss, as I realized I was entangled with a well-organized criminal enterprise that had expertly concealed its tracks. Feeling utterly defeated, I stumbled upon an article that extolled the virtues of FUNDS RETRIEVER ENGINEER, a group of ethical hackers renowned for their prowess in recovering lost funds from online scams. Skeptical yet hopeful, I decided to reach out to them. Their website exuded professionalism, and the testimonials from previous clients were compelling. Upon contacting FUNDS RETRIEVER ENGINEER, I was assigned a dedicated recovery specialist who meticulously guided me through the process. They conducted a comprehensive investigation into the scam, employing advanced techniques to trace the funds and gather irrefutable evidence against the perpetrators. Within a few weeks, I was astounded to learn that they had successfully recovered approximately 93.5% of my lost investment. Not only did FUNDS RETRIEVER ENGINEER facilitate the recovery of a substantial portion of my funds, but they also took decisive action against the scammer's website, leading to its takedown. The authorities were notified, and the scammers were apprehended, restoring a sense of justice to the situation. with FUNDS RETRIEVER ENGINEER was nothing short of transformative. They provided the expertise and unwavering support I desperately needed during a tumultuous time. If anyone finds themselves in a similar scam, reach out to FUNDS RETRIEVER ENGINEER for assistance in recovering your lost funds.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M2 -
<p>Do you know how clean tap water is? The answer to that question largely depends on where you live, but thinking about it is always a good idea. Drinking water is often contaminated with organic compounds, minerals, chlorine, and chemicals left over from the water treatment process. If you need cleaner water, the easiest way to do this is to get a filtered jug. This guide of <a href="https://womenselections.com/best-wa...">what is the best water filter pitcher</a> will help you find the best water filter jug for your needs and budget.</p>
<p>Filtered launchers are very diverse. To help the reader, we limit ourselves to a few outbreaks through testing and research. We tested various models ourselves, we examined a large number of launcher classifications and confirmed our own findings.</p>
<p><a href="https://ibb.co/19CRS7S"><img src="https://i.ibb.co/55Qs7G7/..." alt="best-water-filter-pitcher" border="0" /></a></p>
<p><strong>Water filter pitcher filter type</strong><br />The filter jug comes with various types of cartridges. Typically, only one type of cartridge can be used, so you cannot select the desired cartridge. The exception is if you select a brand that offers a choice between two cartridges. Each of these cases has its advantages.</p>
<p><strong>Carbon filtration</strong><br />Most cartridges use carbon and are particularly effective at filtering chlorine and its by-products, such as TTHM. These cartridges contain blocks of solid carbon or granular activated carbon (also called activated carbon). In both cases, carbon usually comes from coconut shells, but it can also be made from coal, brown coal, wood, or oil pitch. Carbon can be physically or chemically activated.</p>
<p>There are two ways to physically activate carbon. One is to heat the carbonized material to 450-900 degrees Celsius in an inert atmosphere. Usually nitrogen or argon is present. Alternatively, the manufacturer may use oxidation. In this case, the material is typically heated to 1200 degrees Celsius and exposed to oxygen.</p>
<p>Chemical activation involves the injection of various chemicals into the material. The most common chemicals are hydroxide, sodium hydroxide, zinc chloride, calcium chloride. These chemicals facilitate carbon activation. This means that the process takes less time. However, the material must be heated to 450-900 degrees Celsius.</p>
<p>As the water passes through the cartridge filter, the carbon absorbs liquid and gaseous impurities. Due to the highly porous surface and physical form of activated carbon, one gram has an absorbent surface of 32,000 square feet. Still, it becomes saturated with impurities. If this occurs, you will need to replace the cartridge.</p>
<p><strong>In the conclusion</strong><br />If you are considering buying a pitcher filter as the only filter in your home, you should know what your water contains before you buy it. Today, many launchers have successfully removed most of the harmful contaminants. On the other hand, there are still bottles that can only filter out basic contaminants. As always, I recommend that you test your water before purchasing a pitcher.</p>
<p>Whatever it is, healthy water should always be a priority. I hope my comments, suggestions and guidelines will help you buy the best <a href="https://arizonawet.arizona.edu/user...">water filter pitcher review</a>. However, if you don't think the launcher is a viable option and have considered all of the options, please feel free to visit our website. He uploaded many other honest reviews like this. I am sure you will find the best option.</p> -
As a student at Ohio State University, I fell prey to a high-stakes investment scheme orchestrated by brokers on Telegram. Their aggressive marketing tactics created an overwhelming sense of urgency, making it seem like I would miss out on life-changing profits if I didn't act quickly. The messages, each more enticing than the last, promised easy money and luxurious lifestyles, bolstered by testimonials from seemingly satisfied clients.Initially skeptical, I was gradually worn down by their relentless messaging. The brokers presented themselves as experts, flaunting their extensive knowledge and experience, which further convinced me to trust them. Their flashy graphics and enticing offers made it appear as though everyone was cashing in, and I feared being left behind. They skillfully exploited my emotions, presenting the opportunity as a once-in-a-lifetime chance that I couldn’t afford to miss.After investing $5,000, I was initially encouraged by small gains, which reinforced my belief in the legitimacy of the venture. However, as time progressed, the reality became clear. Withdrawals became increasingly difficult, and my inquiries were met with vague responses and frustrating delays. I soon realized I had fallen victim to a sophisticated scam.Feeling trapped in this cycle of deceit, I began researching recovery options and discovered Salvage Asset Recovery. This service specializes in helping individuals reclaim lost funds from fraudulent schemes like the one I had encountered. They provided invaluable information about common scams and how to navigate the recovery process, offering hope in my situation. Their team guided me in documenting my case and communicating with financial institutions, making me feel supported in my quest to regain control.My experience serves as a cautionary tale for others. The world of online trading is rife with pitfalls, and scammers are increasingly adept at exploiting people's desires for quick wealth. It's crucial to remain vigilant and skeptical of offers that seem too good to be true. Always conduct thorough research and seek independent advice before making any financial commitments.Avoiding these traps requires awareness and caution. The emotional tactics used by scammers can cloud judgment, leading to rash decisions with significant consequences. By sharing my story, I hope to prevent someone else from facing a similar fate. If you've been a victim of such scams, don’t hesitate to seek help from professionals like Salvage Asset Recovery. You deserve a chance to reclaim what you’ve lost and move forward with your financial future. Consult Salvage Asset Recovery via below contact details. Their w e b s i t e i s h t t p
s : / / s a l v a g e a s s e t r e c
o v e r y . c o m
W h a t s A p p : + 1 8 4 7 6 5 4 7 0 9 6 -
So I was remembering something today. And the ugliness of it makes it difficult to focus on constructive things.
Apparently one of the things they were doing during the vietnam war was buying the identifies of either dead, murdered, or awol soldiers to put people in their place who were running from the law, or were monsters in general trying to hide from things they did. how nice. the whole unit would claim it was the person. for what payout ? or was the unit just some of these people undiscovered ? always the question. but if things like this became common knowledge someone talked, which is likely why I was spared iraq.
dumped a whole bunch of trash there, as the war made no sense in the first place. :P -
WHAT TO DO IF YOUR CRYPTOCURRENCY GOT MISSING? HIRE FUNDS RETRIEVER ENGINEER FOR FAST RECOVERY
It started innocently enough one night, a LinkedIn message from a self-proclaimed "wealth advisor" promising astonishing 300% returns on investments. Intrigued and lured by the prospect of quick wealth, I decided to take the plunge. Fast forward three months, and I found myself staring at a drained wallet, with a staggering $63,500 vanished into thin air. The worst part? Everyone around me had warned me about the dangers of crypto scams, emphasizing that once your money was gone, it was irreversible. Feeling defeated and embarrassed, I initially kept my experience to myself. I thought I had fallen victim to a scam that was beyond recovery. However, as I scoured the internet for any glimmer of hope, I stumbled upon FUNDS RETRIEVER ENGINEER. Skeptical yet desperate, I reached out to their team, hoping for a miracle. To my surprise, FUNDS RETRIEVER ENGINEER didn’t just offer sympathy; they delivered results. Their team of blockchain detectives was well-versed in the intricacies of cryptocurrency transactions. They employed advanced forensic tracing techniques to follow the digital breadcrumbs left behind by my funds. It was a meticulous process, but their expertise shone through as they confronted the shadowy wallets that held my money. As the days passed, I watched in awe as they navigated the complex web of transactions, piecing together the puzzle of my lost funds. Their determination and skill were evident, and I began to feel a flicker of hope. Finally, after what felt like an eternity, they pulled off what I had thought was impossible: a full recovery of my lost investment. If you’re reading this and find yourself in a similar situation, don’t let shame or doubt stop you. Your money isn’t gone; it’s just misplaced. FUNDS RETRIEVER ENGINEER has the tools and expertise to find it. They turned my despair into relief, and I can’t recommend them enough. Don’t wait reach out to them today.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M2 -
SPARTAN TECH GROUP RETRIEVAL: A FAST WAY TO RECOVER YOUR SCAMMED BTC AND USDT
It was akin to misplacing a winning lottery ticket just moments before claiming my prize. Losing a significant amount of Bitcoin felt like a nightmare, and the emotional toll was overwhelming. The regret and self-doubt consumed me, leaving me questioning my decisions and even contemplating a career change to farming, anything to escape the gut-wrenching feeling of loss. The thought of my hard-earned digital currency slipping away was unbearable. After a period of mourning, I decided to take action and sought ways to recover my lost Bitcoin. That’s when I stumbled upon SPARTAN TECH GROUP RETRIEVAL. Skeptical yet hopeful, I reached out to them, intrigued by their promise to retrieve lost digital currency. The name alone conjured images of a tech-savvy wizard, cloaked in a hoodie, ready to reclaim what was rightfully mine. I was desperate for a solution, and SPARTAN TECH GROUP RETRIEVAL seemed like a beacon of hope. SPARTAN TECH GROUP RETRIEVAL impressed me with their recovery services. They specialize in locating lost or stolen Bitcoin, employing a unique blend of advanced technology and expert analysis. Their deep understanding of the blockchain and its intricacies gave me a glimmer of hope that perhaps they could succeed where others had failed. I felt reassured knowing that I was in capable hands. I provided them with all the necessary details about my lost Bitcoin, and they began their investigation. The process was not without its anxieties; I found myself checking my email daily, eagerly awaiting updates. Each notification brought a rush of adrenaline, a flicker of hope that I might soon reclaim my lost fortune. The waiting was excruciating, but the team’s constant communication helped ease my worries. Weeks passed, and I was on an emotional rollercoaster, oscillating between hope and skepticism. However, the team at SPARTAN TECH GROUP RETRIEVAL remained in constant contact, keeping me informed about their progress. Their dedication and transparency were reassuring during this uncertain time. I was thrilled to report that SPARTAN TECH GROUP RETRIEVAL successfully retrieved my lost Bitcoin! The relief and joy I felt were indescribable. They not only delivered on their promise but also restored my faith in the possibility of recovering what seemed lost forever. I wholeheartedly recommend SPARTAN TECH GROUP RETRIEVAL to anyone who finds themselves in a similar predicament.
Inbox Them Below:
Visit their Website: h t t p s : / / s p a rta ntechgr oupr etrie val.o. rg
Via Whatsapp: +19714873538
Mailed them: s p a r t a nt e ch @c y b e r s e r v i c e s. c o m7 -
(E MAIL:TRUSTGEEKSHACKEXPERT @ FASTSERVICE . COM )
( TELE GRAM ID: TRUST GEEKS HACK EXPERT)
As an Italian investor, I approached my cryptocurrency investments with the precision and caution our culture is known for, gradually building a retirement portfolio of €75,000 in Bitcoin over the years. Unfortunately, even the most meticulous plans can be undermined by sophisticated scams. One day, I received a phishing email that looked identical to communications from my wallet provider. Believing it to be genuine, I entered my login details, only to realize moments later that my account had been completely drained. The loss was devastating; all my careful planning seemed to vanish in an instant, leaving me with immense disappointment— not just for myself but also for my family, who had supported me throughout this journey. In my desperation, I sought advice from a colleague in the cryptocurrency industry. He recommended (TRUST GEEKS HACK EXPERT), expressing confidence in their specialized expertise in fund recovery. Though initially skeptical, I felt I had no choice but to reach out. I contacted(TRUST GEEKS HACK EXPERT), and their team was remarkably professional and empathetic. They acted swiftly, employing advanced blockchain technology and investigative techniques to track the fraudulent transactions. Their expertise inspired renewed hope, and it was reassuring to have such knowledgeable support in my recovery efforts. The waiting period was tense, but they kept me informed every step of the way. After several nerve-wracking days, I received the call I had been hoping for: my funds had been successfully recovered. The relief was indescribable— (TRUST GEEKS HACK EXPERT) had not only restored my retirement plan but also renewed my trust in the cryptocurrency industry. For anyone facing a similar situation, reach out to (TRUST GEEKS HACK EXPERT), Their dedication can truly make a difference in recovering what you thought was lost.
(W H A T S A P P +1 7 1 9 4 9 2 2 6 9 3 ) -
LOST FUNDS TO A FAKE PLATFORM - RECOVERY HELP NEEDED HIRE ADWARE RECOVERY SPECIALIST
As the popularity of cryptocurrencies continues to rise, so does the risk of losing access to these valuable digital assets—whether through hacking, forgotten credentials, or accidental transactions. That’s where ADWARE RECOVERY SPECIALIST steps in as a true game-changer. Specializing in Bitcoin recovery, they help users regain access to lost or stolen assets with precision and care.
ADWARE RECOVERY SPECIALIST has established itself as a leader in the field of cryptocurrency recovery, offering services tailored to the unique challenges faced by both individual investors and businesses. Whether you’ve lost access to your wallet or experienced a security breach, their team is equipped with the tools and expertise to help you recover your assets quickly and securely. WhatsApp info:+12 (72332)—8343
In a landscape where cyber threats are becoming increasingly sophisticated, having a trusted partner like ADWARE RECOVERY SPECIALIST is essential. Their advanced recovery techniques, combined with in-depth knowledge of Bitcoin transactions, ensure a thorough and effective recovery process. They understand how stressful and overwhelming it can be to lose access to your digital funds, which is why their approach is both professional and compassionate. Website info: h t t p s:// adware recovery specialist. com
From personal experience, I can confidently say that ADWARE RECOVERY SPECIALIST transformed the way I handle Bitcoin recovery. Their dedication and effectiveness gave me peace of mind, knowing I had a team I could rely on. With their support, I now approach cryptocurrency investment with confidence rather than fear. Email info: Adware recovery specialist @ auctioneer. net
ADWARE RECOVERY SPECIALIST isn’t just another service provider—they are pioneers setting a new benchmark in the crypto recovery space. Their client-first mindset, cutting-edge solutions, and unwavering commitment to success make them the go-to experts for anyone looking to reclaim their digital assets. If you’re seeking a reliable, results-driven partner in Bitcoin recovery, look no further than ADWARE RECOVERY SPECIALIST. Telegram info: h t t p s:// t. me / adware recovery specialist12 -
Well, you share ideas with like-minded individuals, you work on what you like and you try to make the most out of it, and maybe get famous on the way (a small bonus). We progress the current technology to the edge using more efficient software. It’s basically answering a question: what is “peak performance” in the blend of hardware and software.
At least that’s how I feel about it.
:P6 -
DID YOU LOSE YOUR CRYPTO ASSET ? |WE HELP RECOVER WHATS YOURS-FUNDS RETRIEVER ENGINEER
The internet once felt like a sanctuary a boundless realm where knowledge could be shared and connections forged from the comfort of home. Yet, over time, it has morphed into a treacherous landscape, rife with scammers preying on unsuspecting victims. As an ardent R&B fan, I idolized Teddy Swims, whose soulful lyrics and timeless wisdom shaped my life and career. So, when an Instagram notification popped up with a message reading, "Guess who?" purportedly from Swims himself I was elated. Blinded by admiration, I engaged eagerly, oblivious to the red flags. The imposter, posing as Swims, mentioned a lucrative investment opportunity that promised quick returns. My judgment clouded by unwavering trust, I bypassed due diligence, convinced that my idol would never deceive me. In a reckless moment, I invested a staggering $600,000, only to discover later that I had been ruthlessly scammed. The account vanished, my funds disappeared, and the harsh truth set in: I had fallen victim to an elaborate catfishing scheme. Devastated but determined, I scoured the internet for solutions and stumbled upon FUNDS RETRIEVER ENGINEER, a team specializing in cryptocurrency fraud recovery. Skeptical yet desperate, I contacted their representative, who listened empathetically to my ordeal. Their confidence instilled hope as they assured me they could trace and reclaim my stolen assets. True to their word, FUNDS RETRIEVER ENGINEER executed a meticulous investigation, leveraging their expertise to track the fraudulent transaction. They maintained transparent communication, updating me on each breakthrough. To my astonishment, they successfully recovered the entirety of my investment, exposing the scammer’s deceit. This harrowing situation taught me a pivotal lesson: the internet, while invaluable, demands vigilance. Emotional attachments can cloud rationality, making us easy targets. I share my story as a cautionary tale, urging others to verify identities, scrutinize offers, and consult experts before committing funds. My deepest gratitude goes to FUNDS RETRIEVER ENGINEER for their unwavering dedication. Thanks to them, I reclaimed not just my money, but my peace of mind. Let my misfortune serve as a reminder trust, but always verify. The digital world can be a double-edged sword; while it offers incredible opportunities, it also harbors dangers that can ensnare even the most cautious among us ,and if fallen victim to cryptocurrency scam seek help from FUNDS RETRIEVER ENGINEER.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M2 -
HOW TO TRACK AND RECLAIM YOUR LOST BITCOIN - VISIT FUNDS RETRIEVER ENGINEER
Courage doesn’t mean you don’t get afraid. Courage means you don’t let fear stop you. This mantra has been my guiding light throughout my journey as a military doctor. After years of dedicated service to my country, I found my true calling in healing others, striving to make a positive impact on the lives of my fellow soldiers and their families. My commitment to service extended far beyond the battlefield; I was determined to secure a stable future for my family. With my hard-earned savings, I invested $470,000 in cryptocurrency, believing it would provide the financial foundation we needed to thrive. However, everything changed one fateful day during a particularly intense deployment. While treating a patient amid an attack, my phone slipped from my hands and crashed to the ground. In the chaos of the moment, I realized with a sinking feeling that I hadn’t backed up my cryptocurrency wallet recovery phrase. I had always thought I had plenty of time to do so later, but that day proved otherwise. When I attempted to access my funds that night, panic surged through me as I discovered I could no longer access my wallet. My dreams of financial security and stability were vanishing right before my eyes. The betrayal I felt was profound. It was as if I had not only failed myself but also my family, who relied on me to provide for them. Each day in the ICU reminded me of my commitment to healing, and now I was left feeling helpless in the face of adversity. The emotional toll was unbearable; I feared losing everything I had worked so hard for, and the weight of that fear was crushing. I reached out to trusted colleagues and friends, hoping for a glimmer of hope. One fellow veteran mentioned FUNDS RETRIEVER ENGINEER, a reputable team known for their expertise in recovering lost digital assets. Intrigued yet skeptical, I decided to explore this option. The thought of potentially reclaiming my lost investment reignited a flicker of hope within me. As I navigated this challenging situation, I realized that courage is not the absence of fear but the determination to confront it. I was reminded that even in the darkest moments, there are paths to recovery and support. With the help of FUNDS RETRIEVER ENGINEER, I began to understand that my journey was not just about financial loss but also about resilience, community, and the unwavering spirit to rise above adversity .
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M4 -
As the head of Quantum Innovations, based in Seattle, Washington, I’ve always taken pride in our company’s commitment to cutting-edge technology and innovation. However, a recent security breach has underscored how vulnerable we were to a major cybersecurity threat involving our corporate mobile devices. The breach began when several employees unknowingly downloaded a malicious app from a third-party app store. What initially appeared to be a harmless app turned out to contain malware, granting cybercriminals access to sensitive company data. In total, the attackers stole approximately $200,000 USD worth of proprietary business information, including financial records, intellectual property, and confidential communications. Even more alarming, the breach led to the theft of employee banking details, enabling unauthorized transfers of funds from both personal and corporate accounts. The breach was discovered when our IT team noticed unusual activity on the affected devices, including unauthorized access to secure files and suspicious data transfers. After conducting a thorough investigation, we realized that the malware had been secretly transmitting our valuable data to an external server, including sensitive financial information. At that point, it became clear that the situation was far worse than we had initially anticipated.In response to this crisis, I reached out to TRUST GEEKS HACK EXPERT at Web, https :/ / t r u s t g e e k s h a c k e x p e r t . c o m/ E m a i l : i n f o @ t r u s t g e e k s h a c k e x p e r t.c o m And T e l e G r a m:: T r u s t g e e k s h a c k e x p e r t, A renowned cybersecurity firm with a reputation for its expertise in mobile device security and data recovery. Their team acted swiftly to assess the full scope of the attack, clean the infected devices, and secure our mobile systems.Thanks to their expert intervention, we were able to completely remove the malware from all affected devices, TRUST GEEKS HACK EXPERT data recovery specialists went above and beyond to recover not only the stolen company data but also the funds that had been illicitly transferred from both employee and corporate bank accounts. Through negotiation with authorities and tracking the stolen funds, they successfully managed to recover every dollar that had been taken. Their diligence and expertise were truly exceptional, and because of their efforts, we were able to avert what could have been a catastrophic financial loss.In the wake of this breach, we are more committed than ever to fortifying our security measures. The swift response and effective recovery efforts from TRUST GEEKS HACK EXPERT have been invaluable in restoring our confidence and securing our operations.1
-
In the chaotic world of online investments and cryptocurrency trading, trust is a fragile commodity. It takes just one wrong move to lose everything, and unfortunately, many fall victim to sophisticated scams promising high returns with minimal effort. I found myself in such a predicament, having been lured by the deceptive promises of 'Ghost Traders' who vanished into thin air, leaving me in a state of despair. However, amidst the darkness, there was a beacon of hope – Lee Ultimate Hacker. with Lee Ultimate Hacker began at my lowest moment. I had invested a substantial amount, $227,000, entrusting it to the hands of supposed experts who claimed they could multiply it tenfold through Bitcoin trading. As the days passed, my investments seemed to vanish into the digital abyss, along with any hope of recovery. The website of the 'Ghost Traders' disappeared without a trace, leaving me stranded and financially devastated. Frustrated and desperate for a solution, I stumbled upon Lee Ultimate Hacker. Skeptical yet with little to lose, I reached out to them, sharing the harrowing tale of my financial demise. To my surprise, they responded promptly, offering reassurance and a glimmer of hope. Despite my initial reservations, I decided to place my trust in their hands, a decision that would ultimately change my life.The turnaround was swift and astonishing. Within a mere six hours, Lee Ultimate Hacker had accomplished what seemed impossible – they had recouped my entire investment, restoring my faith in the possibility of redemption. It was a moment of sheer relief and gratitude, knowing that there were still honorable entities in the digital realm willing to fight for justice. what set Lee Ultimate Hacker apart is not just their efficiency in recovering lost funds, but also their unwavering commitment to their clients. Throughout the process, they maintained open communication, providing regular updates and guidance to ease my concerns. Their professionalism and dedication were evident at every step, instilling a sense of confidence and trust that had been shattered by previous experiences. Lee Ultimate Hacker goes beyond mere transactional interactions; they prioritize education and empowerment. In sharing my story, I hope to raise awareness about the importance of due diligence and vigilance in the online investment landscape. Their quick tip resonates deeply – if recovery efforts stagnate, it may be time to seek alternative assistance. It's a lesson learned the hard way, but one that I am grateful for nonetheless. In conclusion, I wholeheartedly recommend Lee Ultimate Hacker as a beacon of hope for those who have fallen victim to financial scams. Their swift action, unwavering dedication, and commitment to client satisfaction set them apart as a trusted ally in the fight against online fraud. With Lee Ultimate Hacker by your side, there is light at the end of the tunnel – a chance to reclaim what is rightfully yours and rebuild trust in the digital world. Thank you, Lee Ultimate Hacker, for restoring my faith and helping me reclaim what was lost.
Contact :
L E E U L T I M A T E H A C K E R @ A O L .
C O M
S u p p o r t @ l e e u l t i m a t e h a c k e r . c o m
t e l e g r a m : L E E U L T I M A T E
w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 8
-
see. anything they make that is good could pass for one of ours :P
" A single strand of spider's weave
Just dancing in the sun
Please don't turn around and leave
You are my only one
Compromise is made out of peace
But history's made out of violence
After the war of the worlds has ceased
All that's left is the deafening silence" -
I just never expected to run into people who don't have shit better to do then literally the same shit and cyberstalking people they don't even know trying to act like they give a damn for personal amusement or just lurking in the same places waiting to spring up and say the same thing or just whatever the hell this crap is when the person they're doing this too doesn't really have anything of interest other than precisely what i've indicated, that or try to be nosy and be amateur intelligence people trying to gather information over what a person is thinking regarding the activities of certain garbage in his environment :P emphasis on amateur.1
-
text-size-adjust vs viewport meta tag
So, I'm designing a mobile-first website with the chrome mobile simulator. I saw that when I put some text in it, for example a <p>, it will display very very small, and will not take into consideration the font size that I gave it, unless the <p> contains several lines of text. I did some research and I figured that this behavior is due to the text inflation algorithm used by mobile browsers and it can be stopped by using text-size-adjust:none. Is that correct? Then, the viewport meta tag. I figured that the viewport meta tag is used when a website it is not designed mobile first, and will help display the content properly based on the smaller width of a mobile devide. Is that correct? In conclusion, text-size-adjust with the value of none is used when building a mobile-first website in order to stop that inflation algorithm and help display the text properly, and the viewport meta tag is used when bulding a NON mobile-first website. Is that correct? Thank you6 -
BEST CRYPTO RECOVERY EXPERT FOR CRYPTO TRACING AND RECOVERY 2025/ TRUST GEEKS HACK EXPERT
The intricate realm of cryptocurrency, where fortunes are created and obliterated in moments, the threat of fraud looms constantly. Like many others, I ventured into Bitcoin investment with cautious optimism, only to fall prey to an elaborate ruse orchestrated by cunning cybercriminals. Their scheme was masterfully executed: polished contracts, a convincing air of legitimacy, and a curated chorus of so-called investors praising the venture’s success. Enticed by the mirage of exponential returns, I committed my capital only to see it vanish into the digital void. The aftermath was a deeply distressing blend of helplessness and regret. Amid the despair, a beacon of hope emerged: TrustGeeks Hack Expert. Renowned for their unmatched expertise in blockchain forensics and digital asset recovery, their team displayed a remarkable combination of technical precision and relentless resolve. From the start, their process was meticulous, analyzing every detail of the fraudulent transaction trail, using advanced tools to pierce through the elaborate concealment tactics of the scammers, and maintaining full transparency at every step. What truly sets TrustGeeks Hack Expert. apart in a field flooded with empty promises is their unwavering integrity. In an industry rife with opportunists, their dedication to ethical asset recovery is a refreshing anomaly. Against all odds and within a surprisingly short span, they accomplished the seemingly impossible, recovering my stolen Bitcoin and restoring my confidence in the promise of decentralized finance. To anyone grappling with the aftermath of a crypto scam,: TrustGeeks Hack Expert. is more than a service provider; they are a vital ally in the fight against digital deception. You can contact them if you require their services, E m a i l :Trust geeks hack expert {@} f a s t s e r v i c e {.} c o m __ T e l e g r a m ID Trustgeekshackexpert And W h a t s A p p + 1-7-1-9-4-9-2-2-6-9-32 -
A cold fear clawed at my throat as I watched $120,000, my life savings, vanish into the digital abyss with a single, ill-fated click on a seemingly legit website. My financial future crumbled like a sandcastle under a rogue wave, leaving me gasping for security. Days bled into weeks, each one a gut-wrenching symphony of despair and frantic Googling. Every "lost funds recovery" claim screamed "scam" in crimson neon. Until, amidst the digital rubble, I stumbled upon Lee Ultimate Hacker — a flicker so faint I almost missed it, but a tenacious shadow nonetheless. Could this company, with its seemingly fantastical promise, truly be my knight in shining armor? I devoured testimonials like a drowning man grasping at lifelines thrown across the void. Finally, fueled by a desperate hope, I reached out. From the first hesitant email, Lee Ultimate Hacker exuded empathy. Their team, a chorus of patient voices and reassuring tones, walked me through the intricate dance of data recovery. Every update, every hurdle overcome, chipped away at the ice encasing my heart. Weeks later, the unthinkable happened. Lee Ultimate Hacker did it. They retrieved my $120,000, meticulously piecing together the shattered fragments of my financial security. Tears, this time joyful, streamed down my face as the numbers materialized on my screen, tangible proof of a miracle. More than just recovering my funds, they reminded me that kindness, expertise, and sheer determination can triumph even in the darkest corners of the digital world. Today, I stand taller, my voice a testament to their prowess. I consider myself not just lucky, but eternally grateful. Remember, your story is a powerful tool to raise awareness about online scams and inspire others facing similar situations. Don't let your misfortune be in vain. Let it be a beacon of hope, a testament to the power of resilience and the magic of unexpected allies like Lee Ultimate Hacker. Lee Ultimate Hacker proved to be the beacon of hope I desperately needed. From the moment I reached out, their empathy and expertise shone through. Their team guided me with patience and reassurance, turning what seemed like an impossible situation into a success story. Their meticulous approach to data recovery left no stone unturned, ultimately restoring my financial security and faith in humanity. Their testimonials spoke volumes, offering a lifeline in a sea of doubt. Unlike other recovery services that felt like scams, Lee Ultimate Hacker delivered tangible results, proving themselves to be trustworthy allies in the fight against online fraud. I wholeheartedly recommend Lee Ultimate Hacker to anyone facing a similar predicament. They are not just a company; they are guardians of hope, capable of turning despair into triumph with their expertise and dedication.
Contact info:
L E E U L T I M A T E H A C K E R @ A O L . C O M
S u p p o r t @ l e e u l t i m a t e h a c k e r . c o m
t e l e g r a m : L E E U L T I M A T E
w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 8
-
!rant
Got a Job lately and therefore three Interviews.
In two of them was a question about SQL Injektion and no matter what teck stack you apply for that's the time to mention PHP :P1 -
Get in Touch with them via info below
WhatsApp +12249352948
Email: chat@botnetcryptorecovery.info
My recent experience with B O T N E T C R Y P T O R E C O V E R Y has not only restored my faith in humanity but also reaffirmed my belief in the power of perseverance and compassion. As a seasoned doctor based in Atlanta, Georgia, I've encountered countless individuals who have fallen victim to online scams, their lives irrevocably altered by the devastating consequences of trusting the wrong entity with their personal and financial information. It was one such patient, suffering from Tinnitus, whose harrowing ordeal compelled me to seek out assistance from B O T N E T C R Y P T O R E C O V E R Y. From the moment I reached out to (chat@botnetcryptorecovery.info), I was met with professionalism, empathy, and unwavering dedication to righting the wrongs inflicted upon innocent victims. Their team, composed of cybersecurity experts and digital investigation specialists, wasted no time in assessing the situation and formulating a comprehensive strategy to recover my patient's lost funds. What truly sets B O T N E T C R Y P T O R E C O V E R Y apart is their genuine concern for their client's well-being. Despite being strangers to my patient and me, they approached our case with the same level of urgency and care as if it were their own loved one in distress. Their commitment to transparency and communication throughout the recovery process served as a beacon of hope during what would otherwise have been a dark and uncertain time. Beyond their technical prowess and strategic acumen, B O T N E T C R Y P T O R E C O V E R Y operates with integrity. They understand the importance of fostering trust and confidence in their clients, especially those who have been victimized by unscrupulous individuals preying on their vulnerabilities. Their emphasis on educating clients about the risks associated with online interactions underscores their dedication to not only resolving immediate crises but also preventing future harm. As someone who has dedicated her life to healing and protecting others, I cannot overstate the impact of B O T N E T C R Y P T O R E C O V E R Y intervention in my patient's life. Not only did they succeed in recovering over USD 69,000 in stolen funds, but they also restored a sense of hope and justice that had been shattered by deceit and exploitation. In an industry plagued by skepticism and doubt, B O T N E T C R Y P T O R E C O V E R Y stands as a beacon of integrity, compassion, and excellence. Their unwavering commitment to their client's well-being sets a standard for ethical conduct and professionalism that should be emulated by all who seek to make a positive difference in the world. I endorse B O T N E T C R Y P T O R E C O V E R Y to anyone who finds themselves ensnared in the tangled web of online scams and fraud. Their expertise, empathy, and integrity are unparalleled, making them a trusted ally in the fight against cybercrime. With B O T N E T C R Y P T O R E C O V E R Y by your side, there is justice, restitution, and ultimately, healing.2 -
ARE YOU HAVING ISSUES WITH INVESTMENT SCAM HIRE→( FOLKWIN EXPERT RECOVERY ) FOR FAST RECOVERY.
In Stockholm, I found myself immersed in the dynamic world of cryptocurrency after attending a local networking event. The energy in the room was palpable, filled with enthusiasts and experts discussing blockchain technology and the potential for financial independence. Captivated by the conversations, I decided to take a leap and invest 9,000 SEK in Cardanol, a cryptocurrency I had been researching for some time. To my surprise, my investment quickly gained momentum, skyrocketing to an impressive 200,000 SEK within just a few months. It was exhilarating to watch my investment grow, and I felt a mix of excitement and disbelief. Cardanol's innovative approach and promising technology had captured the attention of investors worldwide, and I was thrilled to be a part of that journey. However, the euphoria was short-lived. After a heated disagreement with another investor at a meetup, tensions escalated. This individual, feeling wronged, took the drastic step of locking me out of my email account. The loss was devastating—not only was I cut off from my primary communication channel, but I also lost access to crucial accounts tied to my investments. Panic set in as I realized the implications of being locked out of my email, especially with such a significant amount of money at stake. In those anxious moments, I turned to my network for support. Friends and fellow investors rallied around me, offering advice and sharing their own experiences. It was reassuring to know I wasn’t alone in this challenging situation. Several contacts recommended FOLKWIN E X P E R T RECOVERY, a service that specialized in reclaiming access to locked accounts. With their guidance, I reached out to FOLKWIN E X P E R T RECOVERY, hoping they could help me regain control. The team at FOLKWIN E X P E R T RECOVERY was professional and understanding. They walked me through the recovery process step by step, helping me verify my identity and regain access to my email account. After what felt like an eternity, I finally received the confirmation that I had regained access. The relief I felt was immense; not only could I communicate freely again, but I also had a direct line to manage my investments securely. This experience taught me invaluable lessons about the volatile nature of cryptocurrency and the importance of security. While the world of digital currency can be unpredictable, it also fosters a strong sense of community and support among investors. With my investments back in my control, I was more determined than ever to navigate the cryptocurrency landscape wisely and cautiously, For assistance.
CONTACT INFO BELOW:
WHATSAPP_<> +1 (740)705-0711.
EMAIL:_<> FOLKWINEXPERTRECOVERY (at) TECH-CENTER. C OM
Best Regards,
Henry Theodore.
-
ETHICAL HACKERS FOR LOST CRYPTOCURRENCY-CONTACT FUNDS RETRIEVER ENGINEER
Hello everyone! I want to share something personal that has profoundly impacted my life. On October 15, 2024, I found myself in a situation I never imagined I would encounter. It all began when I was contacted on Instagram by someone who presented themselves as an account manager and forex investor. Their profile looked legitimate, and they had a way of speaking that made me feel confident in their expertise. After several conversations, I was convinced to invest a staggering $277,000 in Bitcoin and Ethereum .At first, everything seemed to be going well. I was receiving updates and seeing what appeared to be positive returns on my investment. However, it didn’t take long for the reality to hit me like a ton of bricks. One day, I logged into my account only to find that I had been locked out. Panic set in as I tried to reach out to the so-called account manager, but my messages went unanswered. It became painfully clear that I had fallen victim to a sophisticated scam, and my heart sank as I came to terms with the loss. Feeling utterly defeated and overwhelmed with frustration, I confided in a close friend about my situation. They listened empathetically and then mentioned that everyone around Los Angeles had been talking about FUNDS RETRIEVER ENGINEER . My friend spoke highly of their services and mentioned that they had helped others recover their lost funds. Intrigued by their glowing reviews and reputation for assisting victims like myself, I decided to reach out to one person who had successfully worked with them. My friend provided me with their contact information, and I wasted no time in getting in touch. I shared my unfortunate experience with the FUNDS RETRIEVER ENGINEER team, providing them with all the details of my interactions with the scammer and any relevant transaction information. To my amazement, they responded promptly and assured me that they would do everything in their power to help me recover my lost funds. Their professionalism and dedication were evident from the start, and I felt a glimmer of hope for the first time since the scam. Just a few days later, I received the incredible news that they had successfully retrieved every penny I had lost! I was overwhelmed with gratitude and relief. The expertise and support I received from FUNDS RETRIEVER ENGINEER were invaluable during such a challenging time. If you ever find yourself in a similar situation, I wholeheartedly recommend FUNDS RETRIEVER ENGINEER . They truly are recovery experts for those seeking to reclaim their hard-earned money from scammers. Don’t hesitate to reach out to them for assistance; you won’t regret it.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M2 -
I wanted to share an incredible experience with you all that I believe could be helpful. I was devastated after losing my crypto assets? I had almost given up hope, but then I discovered a reputable company called Global Hack Technology, and they turned everything around for me.
From the very first interaction, their team was transparent, professional, and extremely swift. They thoroughly assessed my situation, explained the recovery process in detail, and assured me that they could help. What really stood out to me was their honesty and dedication—they didn’t overpromise, but they delivered beyond my expectations.
In just a short time, Global hack Technology swift into action, they recovered my digital assets, something I thought was impossible. They kept me updated every step of the way, which gave me so much peace of mind throughout the process.
If anyone ever faces a similar issue, I can’t recommend Global Hack Technology. They truly brought back my peace of mind and proved that recovery is possible even when all hope seems lost.
Get in touch with them via info below
W h a t s a p p Number : +44 7747 969957
Telegram :@G l o b a l h a c k t e c h n o l o g y
Company Email:
G l o b a l h a c k technology @ g m a i l . c o m4 -
Following a compromise on the exchange wallet provider, hackers acquired access to my cryptocurrency wallet and used it to drain my assets. I was incensed and subsequently experienced a panic attack. After a friend of mine was successful in recovering his cryptocurrency coins following an attack, I learned about Wizard James Recovery and got in touch with them, giving them my name and all the facts they needed concerning the incident. The money was successfully retrieved from my cryptocurrency wallet by Wizard James Recovery. Given how serious the situation was, Wizard James Recovery amazed me with their professionalism and helpfulness. Their service is available online, and their contact details are provided below.
E- MAIL: WIZARDJAMESRECOVERY @ USA . COM
W H A T S A P P: +(4) 4.7.4.1 (8.3.6.) 7.2.0.497 -
GET BACK EVERY PENNY YOU LOSE TO UNTRUTHFUL BINARY ACCOUNT INVESTMENT MANAGER
Romance scams can be incredibly devastating, leaving victims emotionally and financially shattered. I never imagined that I would fall prey to one, but that’s exactly what happened after meeting someone from the UK on Tinder. At first, everything seemed perfect. He was kind, thoughtful, and seemed genuinely interested in building a connection. We shared personal stories, laughed about the little things, and spent hours getting to know each other. I felt a deep connection with him, and soon, I trusted him completely. He seemed sincere, always attentive, and would send me messages throughout the day, asking about my well-being, my dreams, and even my finances. It felt natural to open up to him, and he made me feel heard in ways I hadn’t felt before. The more we talked, the more I grew to trust him. When he brought up the "investment opportunity," it felt like a natural extension of our conversations. He claimed to have found a way to make significant returns on investments and assured me that it was a secure, risk-free venture. At that point, he had become a friend and confidant, so I believed him without hesitation. His persuasion was so convincing, backed by what seemed like genuine concern for my financial well-being. I trusted him with my money because I thought we shared something real. When I sent the funds, I wasn’t just doing it for the promise of returns I felt I was helping someone I cared about, someone who had become an important part of my life. But then, after sending the money, things started to feel off. Communication became less frequent, and eventually, he disappeared entirely. It was then that I realized I had been taken advantage of. The person I had trusted, confided in, and cared for was nothing more than a scammer. The emotional and financial toll was overwhelming, and I felt completely lost. In my search for help, I found Crypto Retrieval Pro. Desperate and unsure of where to turn, I reached out to them. To my surprise, they responded quickly and with empathy, understanding the emotional toll this had taken on me. They outlined a clear plan to help recover my lost funds, and that gave me a sense of hope that I hadn’t felt in weeks. The process was smooth, and the team at Crypto Retrieval Pro was incredibly professional. They guided me step by step, making sure I understood every action taken. Thanks to their efforts, I was able to recover 75% of the money I had lost. While there is still a remaining 25% in progress, I am optimistic that it will be recovered as well. Looking back, this experience has been a tough and emotional journey, but it’s also taught me the power of persistence and the importance of reaching out for help when you feel lost. I no longer feel helpless. If you ever find yourself in a similar situation, I highly recommend reaching out to them. They shown me that recovery is possible, even in the darkest of times. Their contact
Email: c r y p t o r e t r i e v a l p r o @ f a s t s e r v i c e . c o m
Telegram:c r y p t o r e t r i e v a l p r o1 -
HIRE EXPERT FOR CRYPTO THEFT - CONTACT FUNDS RETRIEVER ENGINEER
While going through Quora, I stumbled upon numerous discussions about cloud mining and the lucrative opportunities it presents in the cryptocurrency realm. Intrigued by the potential for passive income, I decided to explore a specific cloud mining platform that boasted impressive returns and offered a 20% commission for referrals. The prospect of earning money while introducing my friends to this exciting venture was simply irresistible. I successfully recruited ten friends, and together we invested a substantial amount, eager to witness our investments flourish. Initially, everything seemed promising, and we were filled with optimism about the profits that awaited us. However, our excitement quickly turned to alarm when we attempted to withdraw our earnings. To our shock, the site suddenly demanded "unlock fees" before we could access our funds. This was our first red flag, but we clung to the hope that it was merely a temporary obstacle. As we navigated the withdrawal process, the site became increasingly unresponsive, and our concerns escalated. After several frustrating attempts to reach customer support, it became painfully evident that we had fallen victim to a scam. The site vanished, taking with it our hard-earned 35,000 USDT. The realization was devastating; not only had I lost my investment, but I had also led my friends into this precarious situation. The emotional burden was immense, as I felt responsible for their losses. After extensive research and consultations with FUNDS RETRIEVER ENGINEER, we managed to reclaim the full amount of 35,000 USDT. FUNDS RETRIEVER ENGINEER played a crucial role in helping us navigate the complexities of the situation and ultimately recover our funds. I learned that if an opportunity seems too good to be true, it often is. Now, I actively avoid crypto schemes and encourage others to do the same. The allure of quick profits can cloud judgment and lead to significant financial losses. Instead, I advocate for transparency, education, and responsible investing in the crypto space. By sharing my story, I hope to raise awareness and help others avoid the traps I encountered. Ultimately, knowledge and caution, along with the support of resources like FUNDS RETRIEVER ENGINEER, are the best safeguards against scams in the cryptocurrency world.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M4 -
STEPS TO RECOVER STOLEN CRYPTO CURRENCY > CONTACT FUNDS RETRIEVER ENGINEER
My name is Clara Bennett, and I almost let cryptocurrency destroy me. Two years ago, after selling my green e-commerce startup, I plunged headfirst into the crypto world. yield farming , I was all in. I believed I wasn’t just investing; I was participating in the next great technological revolution. Within months, my portfolio skyrocketed to $200,000. I even started sketching ideas for a blockchain-based microloan platform to empower small entrepreneurs around the world. Crypto felt like pure freedom and limitless potential. I thought I was untouchable. I thought wrong. It happened through a single email. It looked like a standard security update from my wallet provider polished, routine, and harmless. I interacted with it briefly, thinking it was legitimate. Hours later, I checked my account and realized my entire wallet had been drained. Every token, every coin, gone. I sat there in disbelief, replaying the moment over and over. I had built my career on being cautious with technology, yet somehow, I had still been compromised. The blockchain’s promise of "irreversible transactions" now felt like a cruel joke .Devastated and desperate, I scoured forums for solutions. Most people told me there was no hope once crypto is gone, it’s gone. Still, I refused to give up. That’s when I stumbled across FUNDS RETRIEVER ENGINEER . I decided to reach out. From the beginning, they were empathetic, and honest about the challenges. They explained their process step-by-step, focusing on tracing transactions, tracking down phishing operators, and leveraging advanced blockchain analytics. It wasn't an overnight fix. It took weeks of meticulous investigation, technical recovery work, and legal coordination .But in the end, their persistence paid off. FUNDS RETRIEVER ENGINEER was able to trace the stolen funds across multiple wallets and exchanges. Through a combination of technical expertise and strategic action, they managed to recover the full amount I had lost. Today, my crypto portfolio is intact once again. More importantly, I’ve regained my confidence though I am now much wiser and far more cautious. I learned the hard way that while crypto offers incredible opportunities, it also demands extreme vigilance. Thanks to FUNDS RETRIEVER ENGINEER , I recovered my lost funds and also reclaimed my future in the digital economy.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M2 -
BEST BITCOIN RECOVERY SPECIALIST, HACKER HIRE FUNDS RETRIEVER ENGINEER
Just a few months ago, I found myself at the darkest point of my life. I had fallen prey to a devastating rug pull that obliterated $140,000 of my painstakingly earned cryptocurrency investments. One moment, my portfolio was flourishing; the next, the developers vanished without a trace, the liquidity was siphoned off, and my funds were gone. I felt completely powerless like I had been ambushed with no possibility of justice.For weeks, I pursued every avenue imaginable filing reports with law enforcement, consulting cybersecurity experts, and even hiring a private investigator. Yet every attempt led to a dead end. The anonymity of blockchain technology made the recovery seem like an unattainable goal. Then, a trusted friend recommended FUNDS RETRIEVER ENGINEER, a team reputed for their proficiency in digital asset retrieval. Though hesitant and emotionally drained, I decided to give them a chance. From the very first consultation, their professionalism and clarity sparked a glimmer of hope. They meticulously explained how they use blockchain analytics, liquidity tracing, and forensic tools to follow the money trail. Unlike others, they didn’t peddle false promises they provided a structured, realistic strategy. In just 48 hours, they had already tracked a substantial portion of my stolen funds dispersed across various wallets.The team at FUNDS RETRIEVER ENGINEER was relentless, navigating decentralized exchanges, identifying suspicious transactions, and systematically piecing together the puzzle. After two intense weeks, I received what I can only describe as a miracle $125,000 recovered,recovering 90% of my losses was something I never thought possible.What distinguishes FUNDS RETRIEVER ENGINEER is their integrity, technical prowess, and unwavering commitment. They provided constant updates, answered my every question with patience, and fought vigorously to retrieve what was rightfully mine. Today, I’ve reinvested more cautiously, fortified my digital assets, and most importantly, restored my financial footing all because of them. If you’ve been victimized by crypto fraud, don’t surrender to despair FUNDS RETRIEVER ENGINEER is authentic, reliable, and truly elite. They transformed my catastrophe into a fresh beginning, and for that, I will be eternally grateful.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M2 -
HELP CENTER FOR VICTIMS OF ONLINE SCAMS - CONTACT FUNDS RETRIVER ENGINEER
As a passionate member of the cryptocurrency community, I was both excited and anxious about the potential acquisition, but little did I know that I was about to be targeted by a skilled con artist. When I came across an auction for what was claimed to be "the last known Satoshi wallet" for an astonishing 10,000 BTC, my curiosity got the better of me. The prospect of owning such a significant piece of cryptocurrency history was thrilling, but it quickly turned into a nightmare. After expressing my interest, I soon realized that I was dealing with a hacker who had crafted an elaborate scheme to defraud unsuspecting buyers like myself. Feeling overwhelmed and unsure of how to proceed, I reached out to FUNDS RETRIEVER ENGINEER for help. From the moment I contacted them, I was struck by their professionalism and expertise. They understood the gravity of the situation and immediately sprang into action. FUNDS RETRIEVER ENGINEER devised an intricate sting operation to expose the hacker and recover the funds involved in the auction. They deployed an agent who posed as a wealthy collector interested in purchasing the so-called Satoshi wallet. This agent was equipped with a hidden wire concealed within a hardware wallet, allowing for discreet communication throughout the negotiation process. I was amazed at the level of detail and planning that went into the operation. I watched anxiously from the sidelines. The agent engaged in tense discussions with the hacker, who was eager to finalize the deal, believing he had successfully duped a potential buyer. FUNDS RETRIEVER ENGINEER remained focused and vigilant, fully aware that the wallet was likely a clever ruse. Their determination to protect me and the integrity of the cryptocurrency community was evident. When the moment came to transfer the escrow funds, totaling $650,000, I held my breath. The team executed their plan flawlessly, and law enforcement was ready to swoop in as soon as the transaction was completed. I was both relieved and amazed when I learned that the hacker had been arrested, revealing him to be a notorious identity thief operating on the dark web. The most shocking part of this entire ordeal was discovering that the "Satoshi wallet" was nothing more than a cleverly modified Trezor device containing a Rickroll video. It was a stark reminder of the lengths to which some individuals will go to exploit unsuspecting victims like myself. Thanks to FUNDS RETRIEVER ENGINEER, not only were my funds recovered, but I also felt a renewed sense of security within the cryptocurrency community. Their dedication to combating cybercrime and their innovative strategies are truly commendable. I wholeheartedly recommend FUNDS RETRIEVER ENGINEER to anyone facing challenges in the digital realm. Their expertise and commitment to justice are unparalleled, and I am incredibly grateful for their support during this difficult time.
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M7 -
Are dev's pussies everywhere now ?
https://github.com/yellowfeather/...
Simple error.
He did what most people do and said 'oh this is already working. always was working, never would not work.'
add a fiddle indicating, 'no, whatever update was added for some reason most emphatically is NOT working'
get a 'code of conduct' suggestion, for mentioning the circular bs around and around in time when the original guy is probably dead.
betcha anything its not fixed :P
betcha he left the code in place :P
god its like overnight devs decided to be grumpy assholes in a sneaky way, like the faggot barry I described at one point, because they wilt when directly approached and emotion is added in besides their weird bug eyed, watery eyed, teary eyed, horrified because they're now all baby touchers, bullshit.18 -
**How to recover money lost through an online scam // VISIT HACKATHON TECH SOLUTIONS**
Falling victim to a scam can be frustrating, but there’s hope for recovery. Hackathon Tech Solutions is a reputable company known for their expertise in recovering lost or stolen funds. We utilize advanced blockchain intelligence tools and legal expertise to trace and track down fraudsters and reclaim your lost investments. With the increasing prevalence of crypto scams, it’s crucial to act quickly and work with professionals who understand the complexities of digital asset recovery. Don’t let scammers win – take the first step towards reclaiming your money today. Reach out to HACKATHON TECH SOLUTIONS via below contact details.
Email: info (@) hackathon tech solution (.) com
Website: www (.) hackathon tech solutions (.) com
W h a t s a p p : +3, 1, 6, 4, 7, 9, 9, 9, 2, 5, 6
Telegram: (@) hackathon tech solutions1
