Recent comments in /f/programming
emma wrote
Reply to You're working for a big company making a new service. Requirement: You need to store passwords in plaintext. Resources: As many as you need. What security measures do you take here? by twovests
Signing a waiver that absolves me from liability when hundreds of thousands of peoples' passwords inevitably leak.
musou wrote
Reply to Is there a directed graph data structure for calculating risk of exposure? (Like a directed graph, but with time.) by twovests
i feel like this might be a really good use case for prolog
hollyhoppet wrote
Reply to comment by hollyhoppet in Is there a directed graph data structure for calculating risk of exposure? (Like a directed graph, but with time.) by twovests
If you really wanted, you could also record a history of each graph at each step. You could get even more granular and have a history of each graph traversal step as well.
I don't really know if there's a way to model the whole thing as a single graph because you're basically describing with each "x contacts y" a different set of relationships, and thus a different graph.
hollyhoppet wrote (edited )
Reply to Is there a directed graph data structure for calculating risk of exposure? (Like a directed graph, but with time.) by twovests
I'd say the best way to model this would be to decouple the entities from the graph from the contact and infection steps. Each step could be an object that holds information on node contact and/or infection.
Iterate through each of the steps (represented in an array perhaps), constructing a new graph with each of the entities as nodes. Each "x contacts y" would represent a vertex in this graph.
Have a bit on each entity object representing whether it's infected that persists across iterations. For each step iteration mentioned above, after constructing the graph for that step, do a graph traversal starting from each node that has been infected at the start of this iteration, infecting each traversed node along the way*. At the end, you'll have a set of nodes that all have infected bits set if they were to have been infected.
*You can optimize this a bit by treating any vertex that points to an already-infected node as not needing to be traversed.
emma OP wrote
Reply to comment by Moonside in I permanently lost my IntelliJ licence when I tried closing and reopening my JetBrains student account to remove my deadname from the splash screen by emma
In the alternate universe where I'm not horribly insecure about my voice, I probably would.
But honestly this is fine. IntelliJ is not light on resources, and I'm only a student for another year, so I had planned on learning a free alternative anyway.
Moonside wrote
Reply to I permanently lost my IntelliJ licence when I tried closing and reopening my JetBrains student account to remove my deadname from the splash screen by emma
Can you just call them? Because This Is Wrong.
hollyhoppet wrote
emma wrote
Reply to comment by voxpoplar in portrait paintings done in pure hand-typed CSS and HTML by musou
ie for mac is the equivalent of the restored painting in the bean movie
hollyhoppet OP wrote
Reply to comment by Moonside in Anyone know an easy way in git to change the author/email of all commits by a specific author in a remote repo without changing the commit hashes themselves? by hollyhoppet
But it is mutable? After doing some research, I've found you can change it just like you can change a commit message using ammend or filter-branch. I guess you could say it's a design oversight that there's no author object spanning commits, but that's an engineering problem that comes with its own headaches, and filter-branch will let you change the commit history alright.
Moonside wrote
Reply to Anyone know an easy way in git to change the author/email of all commits by a specific author in a remote repo without changing the commit hashes themselves? by hollyhoppet
It's a real design oversight that in Git that a person's name is considered immutable. Like do these people know how people even work?
hollyhoppet OP wrote
Reply to comment by emma in Anyone know an easy way in git to change the author/email of all commits by a specific author in a remote repo without changing the commit hashes themselves? by hollyhoppet
never give up, never surrender
hollyhoppet OP wrote
Reply to Anyone know an easy way in git to change the author/email of all commits by a specific author in a remote repo without changing the commit hashes themselves? by hollyhoppet
Alright, found a script that github provides that should do the trick
emma wrote (edited )
Reply to Anyone know an easy way in git to change the author/email of all commits by a specific author in a remote repo without changing the commit hashes themselves? by hollyhoppet
It's not possible.
Just rebase the repository and git push --force
.
voxpoplar wrote
hollyhoppet OP wrote
Reply to Anyone know an easy way in git to change the author/email of all commits by a specific author in a remote repo without changing the commit hashes themselves? by hollyhoppet
it may come as a surprise but "Hoppet" is not my real surname
Moonside wrote
Reply to Words ending in ASM: A comprehensive list of Bad Names for fantasy assembly languages by twovests
The domain name orgASM.io shall be mine
devtesla OP wrote
Reply to comment by musou in A Taxonomy of Tech Debt by devtesla
The terms they use are so clear that I kinda wanted to cheer at the end.
musou wrote
Reply to A Taxonomy of Tech Debt by devtesla
wow this was a good article. out of all of them my team definitely has the most of "macgyver debt" because we adopted our language kinda early and wrote a lot of our own solutions to things that there now exist popular libraries for. but across all the jobs i've worked i've definitely seen all of these kinds.
musou wrote
Reply to i like this programming suggestion by mm_
i guess i'm on the opposite end of that scale, i kinda wish we didn't use slashes for operators at all. sometimes i get confused by which direction the slash is going.
hollyhoppet wrote
Reply to comment by voxpoplar in i like this programming suggestion by mm_
sorry # only means sharp (music notation) and hashtag now it's a Fact
Moonside wrote
Reply to i like this programming suggestion by mm_
I pass
devtesla wrote
Reply to You're working for a big company making a new service. Requirement: You need to store passwords in plaintext. Resources: As many as you need. What security measures do you take here? by twovests
I store them in my butt and then require 2fa to get into my butt