• 3 Posts
  • 159 Comments
Joined 2 years ago
cake
Cake day: June 4th, 2023

help-circle


  • An oil company which had an MS access DB and a form configured for it with no checks for formatting that would insert the fields of the form directly into the database, and then if they wanted to make a change, they would export the entire database as csv, open it in excel, make changes and use that to overwrite the entire database.

    This had been going on since some time in the 1990’s. They finally wanted to move to a modernized databasing/operations solution which is what my company does.

    I successfully cleaned 75% of that data, however it took 37 regular expressions and a script that was about 800 lines to account for every possible mis-entry, incorrect format, and merging fields if they were empty from newest records to oldest records until the fields were no longer empty where possible (essentially collapsing the records together to get as much data on each unique object which may have had N records over time through the database).

    It is UN-BELIEVABLE what actual businesses get away with.



  • They will pick whatever group they think will suddenly put as many idiots as possible under their control when they say “GROUP A IS BAD”.

    Most of them don’t care they are trans, they only care that they can take advantage of the oppression of a minority group in order to consolidate control over people so that they can oppress more people.

    When everyone alive and dead is either oppressed or under your control, you become god. This is the goal, but they don’t care about the process to get there.



  • I am trying to get people I know personally to stop posting and reading and instead begin to focus on the very basics of actual organization, in the form of simply being able to communicate effectively and securely.

    I have collected and written up information for them with the consideration that they are non-technical, pertaining to secure and private communications primarily, but also many more potentially useful emergency-scenario information and data which I will not speak about here.

    The package I have started giving to my friends contains information such as:

    • How to communicate securely using something like Simplex or I2P
    • How to correctly configure and use a VPN
    • How to flash a security distribution of Linux such as TailsOS to a flash drive and how to boot to it from a computer
    • How to securely encrypt data to a device using an encryption software with hidden volume features such as VeraCrypt
    • A litany of manuals for all kinds of useful information you can use in emergencies, which I will not detail here
    • Files containing the data required to build potentially useful items in emergencies given access to the correct hardware which I will not detail here

    I firmly believe that the majority of Americans will not do anything until someone is actually showing up at their door, coming after them in the street, or destroying the regularities of their personal day to day life, so my intention is to distribute materials which they can turn to when the fear sets into them well enough that they are scared to talk about such things openly.

    It is clear to me that most of my American friends at least, at this point, still only feel superficial fear and outrage. The other day I asked them “If you had to vandalize a public space with a piece of art, what would you draw or paint? Let’s say it is the side of a bank”.

    One said “tits”, one said “flowers”, one said “a fox”.

    Even in a fantasy, they would not express fear or outrage in a public setting.





  • They have called the internet a series of tubes which is true to a degree.

    Pneumatic tubes are still used in some places to send documents over a distance quickly.

    There are a few things that are core to sending and receiving data and it would pay to read up on some computer networking protocols, particularly those that are a part of the TCP/IP Suite of protocols.

    You want the data to be sent fast. A higher throughput means that more data can move in a shorter amount of time.

    Depending on the type of data, you may or may not want the data to be received in its entirety. TCP was designed for a post-nuclear war scenario in which the lines that carry the data might be spotty, so it insures that all data sent is eventually received even if every other packet of data is lost on the way.

    For real-time data, think live streams or video or voice call data, you dont necessarily care if one or two frames of a video get dropped on the way over because it is still good enough to understand what was sent. UDP works this way, basically firing the data down a line fast but not checking if each packet was received.

    You want the data to be sent securely. SSL/TLS makes it so that no one can spy on your packets of data when they are in transit.

    You want to make each packet of data dense with information. There are many ways this can be achieved, but a comparison would be something like making use of the back of a piece of paper as well as the front when writing a letter. In history, people would sometimes write letters normally, then if they needed more room, they would turn the paper 90 degrees and continue writing in that direction. The words are still readable even though they cross over other words on the page and it doubles the capacity of the data the piece of paper can hold. If you used the front and back of a page and used this method, you have multiplied the amount of data that you can store on the paper by 4.

    I might have further ideas for you that might be helpful, and if I think of more I will edit this comment, but because this is a world-building type of topic, I would invite you to post this question to a community I moderate, as I am sure some people there have thought this over.

    https://lemmy.ml/c/worldbuilding










  • Way back in 1997 or so, I was not sure what to use, so I just chose “Foxtrot” from the phonetic alphabet because it sounded a little neat, and it has my favorite animal in it. It was not such an issue because you could still get that name everywhere at the time of course. Since then, I have mainly used variations of that, but at some point branched out into some others such as the one I use here.

    It’s always kind of funny to me though, when I go through some old backup and see one of my forum signatures with my original name on it.