Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "actors"
-
Let me preface this by saying I'm not a designer.
While I can make individual bits of a site look good, and I'm actually pretty skilled with CSS/Sass, overall design completely escapes me. I can't come up with good designs, nor do I really understand *why* good designs are good. It's just not something I can do, which feels really weird to say. but it's true.
So, when I made the Surfboard site (that's the project's internal name), I hacked everything together and focused on the functionality, and later did a branding and responsive pass. I managed to make the site look quite nice, and made it scale well across sizes/devices despite being completely new to responsiveness. (I'm proud, okay? deal.)
After lots of me asking (in response to people loudly complaining that the UI doesn't have X feature, scale properly on Y device, and doesn't look as good as Z site), the company finally reached out to its UI contractor who does their design work. After a week or two, he sent a few mockups.
The mockups consisted of my existing design with a darker background, much better buttons, several different header bars (a different color) with different logo/text placements, and several restyled steppers. He also removed a couple of drop shadows and made some very minor styling changes (bold text, some copy edits). Oh, he also changed the branding colors. Nothing else changed. It's basically the same exact site but a few things look a little better. and the branding is different.
My intermediary with the designer asked for "any feedback before finalizing the designs" -- which I thought odd because he sent mocks for two out of the ten pages (nine plus a 404 page). (Nevermind most of the mocks showed controls from the wrong page...).
So, I typed up a full page of feedback. Much of it was asking for specifics such as responsive sizing on the new header layout, how the new button layout would work for different button counts, asking for the multitude of missing pages/components, asking why the new colors don't match the rest of our branding, etc. I also added a personal nitpick about flat-looking controls because I fucking hate them. Everything I wrote was very friendly and professional.
... His response was full of gems. Let me share a few.
1. "Everything about the current onboarding site looks like a complete after-thought." (After submitting a design basically identical to mine! gg!)
2. "Yes [the colors match our current branding]." (No. They don't. I checked. The dark grey is different, the medium grey is different, the silver is different, the light blue is different. He even changed the goddamn color of the goddamn LOGO for fuck's sake! How the fuck is that "matching"?!)
3. "Appreciate the feedback [re: overlapping colored boxes, aka 'flat'], design is certainly subjective. However, this is the direction we are going." (yet it differs from the rest of our already-redesigned sites you're basing this off. and it's ugly as shit. gg again :/)
4. "Just looked at the 404 page. It looks pretty bad, and reflects very poorly on the [brand name] brand. Definitely will make a change here!" (Hey! I love that thing. It's a tilted, dotted outline of a missing [brand product] entirely drawn with CSS. It has a light gray "???" underlay and some 404 text inside. Everyone I showed it to, coworkers and otherwise, loved it. "Looks pretty bad". fuck you.)
I know I shouldn't judge someone so quickly, but what the fuck. This guy reminds me of one of those pompous artists/actors who's better than everyone and who can never be wrong, even while they're contradicting themselves.
just.
asfjasfk;ajsg;klsadfhas;kldfjsdl.undefined surfboard another rant about the same project long rant pompous designer apples and asteroids design8 -
--- NVIDIA announces PhysX SDK 4.0, open-sources 3.4 under modified BSD license ---
NVIDIA has announced a new version, 4.0, of PhysX, their physics simulation engine.
Its new features include:
- A "Temporal Gauss-Seidel Solver (TGS)", an algorithm used in this SDK to make things such as robots, character arms, etc. more robust to move around. NVIDIA demonstrates this in the video by making their old version of PhysX, 3.4, seem like an unpredictable mess, the robot demonstrating that version smashing a game of chess.
- New filtering rules for supposedly easier scalability in scenes containing lots of both moving and static objects.
- Faster queries in scenes with actors that have a lot of shapes attached to them, improving performance.
- PhysX can now be more easily used with Cmake-based projects.
In essence, better control over scenes and actors as well as performance improvements are what's new.
Furthermore, NVIDIA has released PhysX version 3.4 under the 3-Clause-BSD-license, except for game console platforms.
As NVIDIA will release the new version on December 20th, it will also be released under the same modified BSD license as PhysX 3.4 is now.
What are your thoughts on NVIDIA making a big move towards the open-source community by releasing PhysX under the BSD license? Feel free to let us know in the comments!
Sources:
https://news.developer.nvidia.com/a...
https://developer.nvidia.com/physx-...
https://github.com/NVIDIAGameWorks/...
3 -
So we are having lunch on a normal day when our boss announced that one of our clients are visiting and our boss is telling us to standby and act like we are working so that the clients will see us in action.
WTF!? Is this company *that* desperate!? Then they should hire actors not developers2 -
At a large enterprise-sized company, you are protecting the code and product from outside / bad actors constantly trying to break in. (🧠)
At a medium or small-sized company, you are protecting the code and product from clueless customers or users who can potentially break things for themselves. (🧠🧠)
At a sTaRtUp, you are protecting the code and product from being destroyed by the incompetent owners themselves. (🧠🧠🧠+)4 -
@linuxxx
I have a suggestion for you,
Please set up an Unbound resolver so people does not have to depend on big actors like Google, Cloudflare or quad9.13 -
"Graphics don't matter."
I ranted a while back about gamedev being hard to get into for me, and, today, user @DOSnotCompute posted a similar experience.
I had a couple more thoughts, so thought should post them here (FUCK! It ended up being too fucking long! sorry!)
So I was watching the making of mortal kombat 3 on yt, which was pretty amazing btw because I got to see the actors of the sprites in game which were engraved in my and thousands of others kids minds.
Anyhow, the creators of the series, John Tobias and Ed Boon, were interviewed and what not. And it hit me that while both were the designers, John was the main artist and Ed was the programmer (at least for MK1). Another game that comes to mind Super Meat Boy, and I bet hundreds of others did the same.
And it got me thinking, maybe that's my problem, I just need an artist.
And I think the reason why I never thought of that is because of this idea that graphics don't matter.
"you don't need an artist. You don't need graphics. The most important thing is the gameplay."
What a load of shit.
A lot of people believe that because they got tired of polished AAA games with automatic and predictible gameplay.
People started parrotting this knee jerk of a conclusion since then.
It's dumb. Imagine if Infiminer, one of the games Minecraft was based on, which btw looks terrible, had all the same features Minecraft had.
I would still not touch that shit with a pole.
Graphics ARE important. Games are on the VISUAL medium.
That doesn't mean you're sucking Sony's dick on every AAA release or that every game should be made with UnreUnityCocksReloadedEngine.
Some level of visual craft is required for a game ro be considered such.
(btw, I think most of you guys here get this, not trying to pander, just that I want to make it clear that I'm not accusing this community of being guilty of this)
If a game looks bad (given, bad can be subjective), if it gives the impression that it wasn't seriously made, then you kinda lower your expectations.
People get hyped on games that look good, because it means that the game could be good. Games that look unoriginal or terrible won't get played, wether they're good or not. And I think it's a reasonable reaction.
How many times did I hear things like "Look at x video game from the 90s, the graphics are terrible but it's fun as hell".
That is an absurd statement. The level of production some NES games went through is insane. We're talking millions of dollars for games that today might look primitive.
The graphics weren't shit back then, and even today you could say that they are simpler but also of excellent craftsmanship.
I'm not into creating art, I hate it in fact because you can't quantify the success of produced art.
So, duh, find an artist. Ok, how? This is the part where I have no fucking idea how.
You start spamming shit like "I need an artist" online? I dunno, something for another post I guess.
I guess the most healthy thing I could do is making demos that might look like shit just to get experience so that when I get to find an artist, I have practice already.7 -
My urgent, drop-everything, “bad actors have access to merchants and we can’t block them!” ticket that I rushed to finish didn’t make it into the release. It passed QA; everything works. There’s no complaints on code quality, either.
The blocker? My code uses the word “whitelist” (which is already present in the greater codebase in a related feature), and that made the woke VP (who happened to review the ticket) go REEEEEEE!! and demand I fix it to use approved language, therefore delaying the security fix until the next release cycle.
Yes, seriously.
It would be comical if I wasn’t so disgusted.
Oh well. Enjoy your bad company PR, dude. I hope it all burns.rant invisible virtue signaling over security exec says no root gets reeeeeeee’d at root puts out a fire hell15 -
By all means I've learned most of the cool stuff with a lil project me and my bro did. It was a platform for bot farm of one mmorpg. It had it all: schedules, profiles, bot groups, monitoring, analytical module [was still a wip], auto-profiling to fight antibot [sort of ML - it was analyzing patterns after our bots got banned and attempted to change our bots behaviour], etc.
Eventualy we came up to conclusion that a library we used for botting [the mocked interaction with an actor] was flawed. It seemed that its authors had a contract or smth with the game authors to reveal which actors are bots. We dropped the whole thing as rewriting the lib would be too big of a waste of time :\7 -
"The computer programmer is a creator of universes for which he alone is the lawgiver. No playwright, no stage director, no emperor, however powerful, has ever exercised such absolute authority to arrange a stage or field of battle and to command such unswervingly dutiful actors or troops."
-- Joseph Weizenbaum2 -
[worst hypothetical dev job]
You know how theres a dedicated person in porn whos job is blowing the actors so they are hard? That, but with writing all the boilerplate code and nothing else.1 -
If I was to name one reason I use Safari on my Mac, it would be internet captchas disappearing completely from all sites. And this is with privacy-protecting measures enabled. I tested them, and it fucks fingerprinters even better than resistFingerprinting flag does in Firefox, and that's HUGE.
It seems like Safari is so rarely used by bad actors that if you use Safari, you get a pass.1 -
Tried making a game with a team.
The voice actors, landscapers, concept artist, 3d modellers all treated me (the only coder) as the one with the easiest job in the team.
After spending 40+ hours working on the code I got sick of the way they treated me. I deleted all my comments from the code and quit via email.
Some people think they can easily code if they were willing to put the time in. When they actually have to do it they give up, because it gets super complicated and difficult.3 -
2023 After a big working day ! I just want to relax with an easy movie to watch
The movie
- Political
- overpower woman that spite on man
- the message
- remake, spin off
- predictable as fuck story line
- actors that have no fucking emotions
- plots twist predictable
- predictable boring scary jump
- watch it on netflix, disney+, Amazon prime, HBO, Crave, Helix, Tou.tv for only 25$ a month
- CGI are fucking ugly shit
- story incoherence
- movie are always politicly correct
- i see the camera man in the cars window is fucking obvious
- people working in movie are poor as fuck because shit actors want lot's and lot's of money
- lot of movie are make for the branding not the movie itself
- you notifications are more interesting than the movie itself
- you want to go to the theater... 99$ popcorn and M&M bag of 20 pieces
- kids want to listen something else
- woman want help with the dishes at 10 PM
- no more beer or chips
You know what ? I think i will go feed some duck 🦆 at the park next time7 -
working with some voice actors.
Anyone familiar with balancing audio between differrent studios so the sources sound like they.."match"?
Or does it come down to making sure actors have the appropriate recording environment?5 -
i was reading a book in the week. fell in love with it.
now im watching the movie of it. it's horrible.
i knew i didnt want to see it.. i knew it was going to suck
ive seen the book completly different in my eyes. am almost crying about it. the movie does not give any emotions at all ~ other than disapointement. it ruins my experience with the book to some extend now. it changes how my pictures that i imagined are.
the movie actors are bland. the setting and writing feels of and cheep. the scenes of the book are rushed in 1.50h. that book in a movie should have been atleast 3h. i feel betrayed by whoever made the movie.
sucks that i have to see it to create a movie - book comparison. im forcing myself through watching it to the end
the major point of the book that made it so good was the setting with nature. in the movie no details and focus on this are given at all.
it feels disrespectful to the author of the book and honestly to myself aswell :(6 -
Actors/Use cases and analysis modeling approaches as a whole are for retards that require pictures for everything they do.
Designing this shit is time consuming and should be delegated to simple board drawing rather than full featured software that can develop this monumental waste of time.
Change my mind5 -
just a thought : the advancement in AI is going to result in a lot of porn and fetishes reaching an even higher audience. comparing the advancements in generations :
gen x :
- porn is limited to magazines and comics
- people are crazy about sex but only in their homes
gen y :
- porn as an industry gets established. a few companies with good money starts hiring people and create porn as content.
- the governments are sceptical and puts lots of regulations in this industry resulting in those japenese sensored porns and porn being shared like drugs in market (secretively)
- only the curious people are able to get access porn with lots of hardwork
gen z/curren5 gen :
- porn as a concept is still a taboo in religions and general public , but government is lineant and does not /could not stop its distribution
- porn accessible to anyone with an internet
- content creation no longer a high investment business, lots of small companies and even individuals become content creators
- rule 34 flourishes resulting in a lot of fetishes . wherever there is an idea, there maybe some content creator making a video, comic or art on that idea.
next gen :
- AI creates realistic porn on any idea. the access to such ai models becomes cheap . thus anyone who is a consumer can become a producer, resulting in even more content generation
- since ai can use non real people to make porn, the stigma around porn reduces and mature content gets more mainstream ( r rated movies getting family friendly ratings)
- rise of hate porn, deep fakes, resulting in either the concept of hate porn getting less audience , or direct decrease of extroverted professions ( no real actors/actresses to shoot movies)
just some thoughts around porn lol8 -
Old-school tabletop RPG and board games.
Taught me how to work out data and stats tables, establish many-actors processes and strategies, how to ask for clarification (and give it), and even gave me practice in drawing a representation of what is in my mind, and understanding someone else's.
Who have ever surrounded a dragon in D&D knows what I'm talking about.1 -
okay, can someone suggest a good series.
IT related, science fiction. something like that. good actors and events.14 -
hey guys have you heard of sTate aCtoRs?!?! tHeRe iS a BaCkDoOr BeCaUsE I aM a BaD coDe mAiNtAnEr aNd ApProVe aLL coMmiTs
i'm one of 10,000 ultra-rich fuckwads who lives in the sAnFraNsiScO bAy aReA
its crazy that people earn less than 300K per month!
but i spit around the word "state actor" because i once wrote a for loop that retrieves customer emails from a CSV!
hacker news dumb fucks, all of them
they need to go eat more salad at the meta headquarters
no wonder their jobs are at risk 😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡😂🤡3 -
Sometimes I wonder if actors who play wizards or superbeings feel stupid waving their hands for CG lightning bolts
Then I remember all the kung fu poses and punches and shrieks I do when I solve a hard bug -
Why in the fuck are they making another batmam film ????
There was how many DC comics who's storyline they never fucking made films from and they're just starting over again this time with even more shitty actors !15 -
(Spoilers about Ready Player one here)
FUCK YEAH!
I watched Ready Player One in 4DX AND IT COSTED AN UNHOLY FUCKING AMOUNT OF MONEY!
yet it was THE BEST MOVIE Ive ever watched, AND I MEAN IT! IT WAS SO FUCKING GREAT! THE CGI THE ACTORS!
STEVEN DID AN EXCELLENT JOB!
and as a Trekkie I LOVED the scene of Hallidays death I mean his coffin WAS A FUCKING PHOTON TORPEDO! and in the Last scene you could see a bat'leth HOW HOW COOL WAS THAT!
And dont get me started on all the other References like the Holy Handgranade, Rubiks Cube, FUCKING BATMAN HELPING SOMEONE CLIMBING, Minecraft OASIS edition, Halo... I CANT ITS TOO MUCH!1 -
Intel Management Engine is half-hoax. Yes, it exists, but rumors about its true capabilities are fabricated and artificially amplified to make "what about intel ME" a very effective though-terminating cliche in the privacy community.
Let me remind you that to this day there was not a single takedown or leak that resulted from some power exploiting ME. All kingpin takedowns, all whistleblower deanons, all deanons period, all doxxes — all due to software shortcomings and other exploits.
Yet, "what about intel ME" reigns supreme and instills doom into the minds of the questioning. I can totally see someone who is new to this whole privacy thing doing their research, finding this ME craziness and thinking that real, actionable privacy is impossible, and going back to using amazon alexa and giving tiktok full camera and microphone access.
Just forget about Intel ME. It might as well not exist at all, because it was never used successfully. Instead, do this:
- Keep your threat models updated
- Learn to distinguish state-level actors from surveillance capitalists7 -
Me and my friends decided to start a film company, much like roosterteeth. Throughout high school we had a talented group, actors, musicians, writers etc and those of us behind the scenes editing and shooting footage, graphic design and web development. My best friends passion is film, he's a good director and editor and wanted to start this company and was blessed enough to have a group of friends with all of these talents.
Naturally I was the teams web developer/designer.
Well this morning he texts me saying he's sending an old friend of ours my way to help on the website. My first thought is "why?". I code alone, I've never made a website as a team, that just seems like a mess.
Well the friend of ours texts me shortly after saying he was LEARNING to code and wanted to know if he could be in the dev team. I am the dev team. It's not a group to be joined. I don't want my first team experience to be one where I'll have to be teaching along the way, bc I may as well do it alone at that point. I haven't responded to either person yet as I was waiting to share with devRant 😂3 -
Chinese remainder theorem
So the idea is that a partial or zero knowledge proof is used for not just encryption but also for a sort of distributed ledger or proof-of-membership, in addition to being used to add new members where additional layers of distributive proofs are at it, so that rollbacks can be performed on a network to remove members or revoke content.
Data is NOT automatically distributed throughout a network, rather sharing is the equivalent of replicating and syncing data to your instance.
Therefore if you don't like something on a network or think it's a liability (hate speech for the left, violent content for the right for example), the degree to which it is not shared is the degree to which it is censored.
By automatically not showing images posted by people you're subscribed to or following, infiltrators or state level actors who post things like calls to terrorism or csam to open platforms in order to justify shutting down platforms they don't control, are cut off at the knees. Their may also be a case for tools built on AI that automatically determine if something like a thumbnail should be censored or give the user an NSFW warning before clicking a link that may appear innocuous but is actually malicious.
Server nodes may be virtual in that they are merely a graph of people connected in a group by each person in the group having a piece of a shared key.
Because Chinese remainder theorem only requires a subset of all the info in the original key it also Acts as a voting mechanism to decide whether a piece of content is allowed to be synced to an entire group or remain permanently.
Data that hasn't been verified yet may go into a case for a given cluster of users who are mutually subscribed or following in a small world graph, but at the same time it doesn't get shared out of that subgraph in may expire if enough users don't hit a like button or a retain button or a share or "verify" button.
The algorithm here then is no algorithm at all but merely the natural association process between people and their likes and dislikes directly affecting the outcome of what they see via that process of association to begin with.
We can even go so far as to dog food content that's already been synced to a graph into evolutions of the existing key such that the retention of new generations of key, dependent on the previous key, also act as a store of the data that's been synced to the members of the node.
Therefore remember that continually post content that doesn't get verified slowly falls out of the node such that eventually their content becomes merely temporary in the cases or index of the node members, driving index and node subgraph membership in an organic and natural process based purely on affiliation and identification.
Here I've sort of butchered the idea of the Chinese remainder theorem in shoehorned it into the idea of zero knowledge proofs but you can see where I'm going with this if you squint at the idea mentally and look at it at just the right angle.
The big idea was to remove the influence of centralized algorithms to begin with, and implement mechanisms such that third-party organizations that exist to discredit or shut down small platforms are hindered by the design of the platform itself.
I think if you look over the ideas here you'll see that's what the general design thrust achieves or could achieve if implemented into a platform.
The addition of indexes in a node or "server" or "room" (being a set of users mutually subscribed to a particular tag or topic or each other), where the index is an index of text audio videos and other media including user posts that are available on the given node, in the index being titled but blind links (no pictures/media, or media verified as safe through an automatic tool) would also be useful.12 -
I just read Robert Martin's chapter on the Single responsibility principle in Clean Architecture.
In it he explains that stakeholders, or actors, that require their own functionality that may be similar to others should have separated code. This is because 2 actors == 2 potential reasons for change.
But this seems to run counter to DRY. Am I mistaken?10 -
Dataweave is a programming language like pornstars are actors. They are _technically_ acting but there’s a difference…
Edit: though I would never talk shit about pornstars like I do dataweave1 -
Anyone out there a Scala fan? I am! Seems like most of the stories here are quite negative but positively is my thing so here's my 2 cents:
Scala is an amazing data processing language. It's a functional language with a lot of really great things like a consistent collection library api, case classes, brilliant async library's like Akka Actors, and plenty of solid learning resources like Twitter school and Martin Odersky's online course.3 -
!dev
I just woke up from a fun adrenaline packed film dream.
It started like an movie, leaning a bit into the funny side, but also a bit serious.
We were 3 guys going top speed on the highway, dodging traffic, trying to prevent a bomb from detonating on the other side of the city.
We were all famous actors, but the only one I remember was Jackie Chan. I remember thinking why would they cast Jackie Chan and give him so few lines.
I wished I remember more about this part. The only thing I remember is that when we get to the end of the island, we’re in the wrong place: we’re at a huge OBGYN center.
My sidekicks are bothering the desk women, eating all of the “waiting candy”. I feel bad and offer to pay those, which they pretend to not care about but then end up charging me down to the penny. Cunts.
The sidekicks leave and (without explanation because dreams) disappear of the story.
Defeated, I go outside and start walking.
And I don’t remember exactly what the fuck happened in between, but somehow I’m now in the house of a cartel druglord and he’s pissed and I need to run now.
So I do. I remembered that there was a very thick forest east to the house. So I go there.
And what follows is a very intense montage of me escaping.
At some point that forest ended, so I continue through some high weed, and then another forest, and so on. While I had to pass through parts with no vegetation, I had to avoid these as much as possible.
I saw dozens of types of trees and shrubs.
Then I started seeing families, kids, playing, relaxing on what seemed a Sunday afternoon.
The adventure was so fun, the landscape was so beautiful I felt happy and thought “this is how it feels to be alive”. And I actually felt happy in real life as well.
At some point the vegetation I encounter decreased, and I have to go through more urbanized areas, with more people.
“Uh oh” I think, “I hope no one snitches me”. But miraculously, no one does.
Throughout all the journey I had glimpses of the drug lord nearby presence.
His face on the distance, the sound of his car engine.
But now he was closer than ever. And I’m closer to this house which is the escape point (can’t really remember why).
So I reach for the handle and fade to white, and fade back again, it’s me, older, and I’m not in an escaping mood.
My wife is waiting, our car is outside (on the non drug lord side).
And guess what, we were waiting for our daughter, who comes with a smile and a child on her hands.
So apparently, my daughter married someone from the drug lord villa that almost murders me.
Reading this sounds like a bad script, but that’s what I dreamed today.1 -
OK. We've got this tiny little pet project of mine (work related)…
I rescued it from the git archive, simply put: someone hot glued an elasticsearch scroll + document processor (processing) together.
After a lot of refactoring, I had an simple, much improved (non-parallel) Akka Worker System without an Akka topology / hierarchy.
I left out the hierarchy at first, because I didn't know Akka at all.
I've worked with a lot of process workflows, and some systems that come very close to IPC, so I wasn't completely in the dark.
Topology requires knowledge / creation of a state machine / process workflow. And at that point of time I just had... Garbage. Partially working garbage.
I finished yesterday the rewrite into several actors... Compared to before, there are 8 actors vs 2... And round about 20 classes more. Mostly since I rewrote the Receive Methods of Akka as Command DTOs... And a lot of functions needed to be seperated into layers (which where non existent before)
Since that felt more natural than the previous chaos of passing strings or other primitive types around, or in the worst case just object....
(Yes: Previously an Actor was essentially a class with one or more functions "doEverything" and maybe a few additional functions which did everything - from Rest Client to Processing)).
Then I draw the actual state machine based on everything I've written in the last weeks and thought about how to create the actual topology and where / how parallelizing might make sense.
Innocent me stumbled in the Akka Docs on Akka Typed... (Didn't know it existed, since I'm very new to Java and Akka).
Hm, that sounds an a lot like what I did. In an different way, yes. But not so different that it might be VERY hard to port to.... And I need to change (for implementation of hierarchy) a few classes....
[I should have known at this stage that my curiosity would get the best of me, but yeah. Curiosity killed the cat.]
Actually the documentation is not bad. It's just that upon reading the first more complex examples, my brain decided to go into panic state.
The've essentially combined all classes in one class in all source code examples [which makes sense more sense later], where it is fscking hard for an chaotic brain like mine to extract information....
https://doc.akka.io/docs/akka/...
The thing is: It's not hard to understand… actually very simple.
It was just my brain throwing an fuck you tantrum.
So I've opened more examples in other tabs and cross referenced what happened there and why...
Few frustrated hours later I got that part.... And the part why it's called Akka Typed. It was pretty simple....
Open the gates of hell, bloody satan that was too easy for fucks sake.
Nooooow.... I just need to port my stuff to Akka Typed.
Cause. Challenge accepted, bitch - eh brain. You throw tantrum, you work overtime. -.-
I just cannot decide wether to go FP or OOP.
Now... I'm curious wether FP is that hard... Hadn't dealt with it at large before.
Can someone please stop me... I'm far too curious again. -.- *cries*6 -
Who do you think is the coolest super hero?
Putting aside technical topics and thinking about hobbies and cinematography, who do you think could be the most popular superhero? I had this dispute with classmates because I collect all the information about Spiderman. I described the biographies of the actors of the films, using various data on the network like https://writingbros.com/essay-examp... I collected information about the character characteristics and reviews on movies. I wanted to write my essay about Spiderman, but none of my classmates supported me. According to the general opinion, he cannot be popular and attract attention.
Maybe he doesn't have the traits of the Hulk or the Powers of the X-Men. But, a super hero is an ordinary person who goes to an ordinary job and leads a seemingly ordinary life.
I thought it was characteristics like these that should attract people.
Who do you think might be one of the most popular superheroes of our time. Of course, it is impossible to single out one leader. But maybe you can form the top 3.
9 -
Damn! Jeff Bezos is the world's richest man with now over 142 billion USD!!
I wonder if he feels some kind of existential crisis everyday.
Successful artists or actors become weird after becoming rich af.5 -
Approx. 24 hours ago I proceeded to use MEGA NZ to download a file It's something I've done before. I have an account with them.
This is part of the email I received from MEGA NZ following the dowload: "
zemenwambuis2015@gmail.com
YOUR MEGA ACCOUNT HAS BEEN LOCKED FOR YOUR SAFETY; WE SUSPECT THAT YOU ARE USING THE SAME PASSWORD FOR YOUR MEGA ACCOUNT AS FOR OTHER SERVICES, AND THAT AT LEAST ONE OF THESE OTHER SERVICES HAS SUFFERED A DATA BREACH.
While MEGA remains secure, many big players have suffered a data breach (e.g. yahoo.com, dropbox.com, linkedin.com, adobe.com, myspace.com, tumblr.com, last.fm, snapchat.com, ashleymadison.com - check haveibeenpwned.com/PwnedWebsites for details), exposing millions of users who have used the same password on multiple services to credential stuffers (https://en.wikipedia.org/wiki/...). Your password leaked and is now being used by bad actors to log into your accounts, including, but not limited to, your MEGA account.
To unlock your MEGA account, please follow the link below. You will be required to change your account password - please use a strong password that you have not used anywhere else. We also recommend you change the passwords you have used on other services to strong, unique passwords. Do not ever reuse a password.
Verify my email
Didn’t work? Copy the link below into your web browser:
https://mega.nz//...
To prevent this from happening in the future, use a strong and unique password. Please also make sure you do not lose your password, otherwise you will lose access to your data; MEGA strongly recommends the use of a password manager. For more info on best security practices see: https://mega.nz/security
Best regards,
— Team MEGA
Mega Limited 2020."
Who in their right mind is going to believe something like that that's worded so poorly.
Can anybody shed some light on this latest bit of MEGA's fuckery?
Thank you very much.4 -
Puran Crypto Recovery: The Best Cryptocurrency Recovery Company
Bitcoin theft involves stealing or tricking individuals into transferring their Bitcoin unfairly. This can occur through hacking, phishing schemes, or fraudulent investment schemes. While Bitcoin's decentralized nature offers many advantages, it also creates vulnerabilities. Transactions are pseudonymous and irreversible, making them attractive targets for malicious actors. To address these challenges, Puran Crypto Recovery offers professional assistance in tracing and recovering stolen Bitcoin and other cryptocurrencies.
In this article, we delve into the common methods used by scammers, notable Bitcoin theft cases, and how Puran Crypto Recovery helps victims recover their assets. Let’s explore the strategies to protect and recover your cryptocurrency investments.
Bitcoin’s history is marked by both remarkable success and significant thefts. By understanding the methods used by malicious actors and leveraging services like Puran Crypto Recovery, investors can better protect their assets and respond effectively in case of theft.
Puran Crypto Recovery’s track record in recovering stolen cryptocurrency demonstrates its commitment to helping victims reclaim their investments. With their advanced tools, skilled team, and customer-focused approach, they’re the trusted partner in navigating the challenges of cryptocurrency theft.5 -
HOW TO RETRIEVE YOUR LOST INVESTMENT FUNDS FROM SCAMMER. MEET SACLUX COMPTECH SPECIALST
As the digital landscape continues to evolve, so do the opportunities and risks associated with online investments and transactions. With the proliferation of online businesses and the advent of cryptocurrency, individuals are increasingly turning to digital investments to grow their wealth. However, amidst the vast array of legitimate opportunities lie the lurking dangers of online scams.
The anonymity afforded by the internet has created fertile ground for fraudulent activities, making it challenging for individuals to distinguish between genuine businesses and malicious actors. This inherent lack of transparency has paved the way for a myriad of online scams, each employing various tactics to deceive unsuspecting victims.
Online scams can manifest in numerous forms, with some of the most common schemes including:
PHISHING EMAILS: Fraudulent emails masquerading as reputable sources, aimed at extracting personal information such as phone numbers, emails, and passwords.
Unsolicited investment opportunities: Random contact from anonymous individuals offering enticing investment prospects or prize collections, often too good to be true.
CRYPTOCURRENCY THEFT: The unauthorized access and theft of digital currencies, including Bitcoin and initial coin offerings (ICOs), from online wallets.
In the unfortunate event that you fall victim to an online scam and suffer financial losses, it's imperative to take swift action to mitigate further damage and potentially recover your funds.
The first course of action should be to contact your bank or financial institution immediately upon detecting the fraudulent transaction. They may be able to halt the transaction processing or provide assistance in resolving the issue. However, the extent of their support may vary depending on individual circumstances and the policies of the institution.
Furthermore, it's advisable to report the scam to relevant authorities such as CFTC. While they may intervene if the scam involves illegal activities within their jurisdiction, their powers may be limited if the perpetrator is unidentified or based overseas. Nevertheless, reporting the incident can contribute valuable data to track and combat online scams, potentially safeguarding others from similar predicaments in the future.
Additionally, victims can hire a Cybersecurity Expert or Recovery Company: Engage a professional cybersecurity expert or a reputable cryptocurrency recovery company. These experts can help track and potentially recover your stolen funds. They use advanced techniques and tools to trace transactions and identify the culprits. A company proven for their excellence in recovering money is SACLUX COMPTECH SPECIALST, they will definitely assist you with your refund.
The proliferation of online scams underscores the importance of vigilance and caution in the digital realm. By staying informed about common scam tactics, taking proactive measures to protect personal information, and promptly reporting suspicious activities, individuals can reduce their vulnerability to online fraud and safeguard their financial well-being. SACLUX COMPTECH SPECIALST will recover all the money you lost to scammers.
Telegram: @SacluxComptechWhatsapp: +44 749) 221-35521 -
HOW CAN I RECOVER MY LOST BITCOIN LOST TO SCAM HIRE ADWARE RECOVERY SPECIALIST
Email info: Adwarerecoveryspecialist@auctioneer. net
WhatsApp info:+12 723 328 343
Many first-time Bitcoin investors find themselves falling victim to scams and fraudulent schemes. The cryptocurrency landscape is rife with misleading mining company websites and deceptive practices that can easily ensnare the unwary. As a newcomer to Bitcoin, you might feel overwhelmed and vulnerable, making it all too easy to be duped by these malicious actors. Unfortunately, many people have experienced the heartbreak of losing their investments, often to hackers who exploit vulnerabilities in wallets and exchanges. One such victim was myself. I had invested in Bitcoin with high hopes, but my experience quickly turned sour when I discovered that my blockchain wallet had been compromised. A group of cybercriminals, often referred to as “vicious rippers,” managed to access my account and steal 3 BTC. This loss was devastating, not just financially but also emotionally. I felt isolated and hopeless, unsure of how to regain what was taken from me. In the midst of my despair, I stumbled upon ADWARE RECOVERY SPECIALIST, a company that specializes in helping individuals recover stolen bitcoins. Their claims of a recovery success rate of up to 95% piqued my interest, but I was initially skeptical. However, desperate times called for desperate measures, so I decided to reach out to them for assistance. From the very first interaction, the team at ADWARE RECOVERY SPECIALIST demonstrated empathy. They guided me through the process step by step, ensuring that I understood what needed to be done to recover my lost Bitcoin. Their expertise in tracing stolen funds and navigating the complexities of cryptocurrency recovery was evident. With their help, I started to see a glimmer of hope. After several weeks of diligent effort, I was thrilled to receive confirmation that a portion of my stolen funds was being recovered. The experience was not only a testament to ADWARE RECOVERY SPECIALIST capabilities but also a reminder of the importance of vigilance in the cryptocurrency space. While my journey was fraught with challenges, the support I received helped restore not just my funds but also my faith in the community. If you find yourself in a similar situation, remember that recovery is possible. Seek out reputable recovery services and stay informed to protect your investments in this volatile landscape. -
CRYPTOCURRENCY RECOVERY SERVICES: BOTNET CRYPTO RECOVERY
As the cryptocurrency market continues to evolve and grow, it's no secret that the number of scams, frauds, and cyber-attacks has also increased exponentially. The anonymity and lack of regulation in the crypto space make it a breeding ground for malicious actors, leaving innocent investors vulnerable to financial losses. This is exactly why BOTNET CRYPTO RECOVERY, a trailblazing cryptocurrency recovery company, has emerged as a beacon of hope for those who have fallen prey to these nefarious activities.
With a proven track record of successfully recovering millions of dollars' worth of stolen or lost cryptocurrencies, BOTNET CRYPTO RECOVERY has established itself as the most trusted and reliable recovery company worldwide. Their team of expert cybersecurity specialists, forensic analysts, and blockchain experts work tirelessly to track down and retrieve stolen assets, using cutting-edge technology and innovative strategies to stay one step ahead of the scammers.
What sets them apart from other recovery companies is our unwavering commitment to their clients. They understand the emotional and financial distress that comes with losing hard-earned savings, and they are dedicated to providing a personalized, empathetic, and confidential service that puts our clients' needs above all else. Their dedicated support team is available 24/7 to guide you through the recovery process, ensuring that you are informed and empowered every step of the way. with countless success stories are a testament to their expertise and dedication. From retrieving stolen Bitcoin from a phishing scam to recovering Ethereum lost in a Ponzi scheme, They have helped numerous individuals and businesses regain control of their digital assets. their clients' testimonials speak volumes about their exceptional service and unparalleled results:
BOTNET CRYPTO RECOVERY is a Godsend. I had lost all hope after falling victim to a sophisticated phishing scam, but their team worked tirelessly to recover my stolen Bitcoin. I couldn't be more grateful for their professionalism and expertise.
I was skeptical at first, but BOTNET CRYPTO RECOVERY truly delivered on their promise. They recovered my lost Ethereum and helped me understand how to protect myself from future scams. I highly recommend their services to anyone who has been a victim of cryptocurrency fraud. If you or someone you know has fallen victim to a cryptocurrency scam or fraud, don't hesitate to reach out to them. Their team is ready to help you recover your losses and take back control of your digital assets.
Contact them today to schedule a consultation and take the first step towards reclaiming your financial freedom.
Email: [ support@ botnetcryptorecovery . com ]
Phone: +1 (431) 801-8951
Website: [ botnetcryptorecovery. com ]
Let us help you weave a safer web in the world of cryptocurrency.
3 -
BEST OPTION IN LOST OR STOLEN DIGITAL ASSETS - MAESTRO ENCRYPTER FINANCIER
In these digital scam and financial malfeasance times, finding reliable help has been like an odyssey through a maze of deception. My journey with Maestro Encrypter Financier cut through the noise like a beacon in a storm and rekindled my hope of retrieving what was rightly mine. Let me take it back to the moment of doubt and frustration. In such a scenario, like most victims, I'd been ensnared by webbed scam networks that keep holding digital assets at ransom, which included inflated and exorbitant fees along with fake promises of their restoration. The powerlessness felt amidst injustice seemed suffocating, till in this din of doubts came a voice-one that shone bright: Maestro Encrypter Financier. I had heard whispers of their prowess while at Fiverr, where a colleague had successfully enlisted their help, so I decided to take the leap and reach out. Their professionalism and dedication were quite evident right from the very first interaction-a lifeline in my darkest hour. Navigating digital asset recovery is no easy feat, but Maestro Encrypter Financier proved themselves to be true wizards in the field. With a team of highly skilled experts at the helm, they embarked on a mission of rectifying the wrongs imparted in me by fraudulent actors. Communication was key throughout the process, with regular updates that provided much-needed reassurance and transparency. Their commitment to my case was evident at every turn, instilling trust and confidence that had been sorely lacking in my previous endeavors. In spite of these setbacks-the shutdown of the website of the fraud company-the perseverance never wavered by Maestro Encrypter Financier. Their sagacity and indefatigable effort finally flowered into triumphant victory when my lost money was fully recovered in as quick a time as three days. The expertise and commitment of Maestro Encrypter Financier made my life bright once again. It's amazing how they can make fraudsters be at the receiving end and restore justice to their victims. Maestro Encrypter Financier isn't met with satisfaction; he's a stamp of integrity, competence, and genuine care in the face of an industry laced with deceit. Not just a company, but this team stands tall as rays of hope whenever somebody comes across financial scandals. As I end, wholeheartedly endorse
Maestro Encrypter Financier to whoever needs help recovering their stolen funds. I would never regret entrusting them with my case, and I'm so grateful for the light they brought into my life during my bad time. With Maestro Encrypter Financier by your side, no obstacle is too great to overcome, and no injustice is too insurmountable to put right. For enquiry, Email:( maestro encrypter @ financier. com ) or call/ WhatsApp: +1 472 2038 937
1 -
The lessons learned from the illusion of cryptocurrency recovery can be a cautionary tale for those who have experienced the heartbreak of lost digital assets. The story of the "BLOCKCHAIN CYBER RETRIEVE that helped recoup a staggering 55,000 bitcoins serves as a prime example of the complexities and risks involved in this arena. While the initial promise of a miraculous recovery may have seemed like a lifeline, the reality is often far more nuanced. This episode underscores the importance of comprehensive security measures, the dangers of placing blind trust in unverified sources, and the harsh realities that can unfold when navigating the murky waters of the crypto ecosystem. Cryptocurrency, with its decentralized nature and lack of centralized oversight, can be a double-edged sword. On one hand, it offers unprecedented financial freedom and control, but on the other, it presents a unique set of challenges when things go awry. The allure of the "BLOCKCHAIN CYBER RETRIEVE" service, with its claims of specialized expertise and the ability to recover even the most elusive of lost funds, can be tempting for those desperate to reclaim their digital wealth. However, the reality is that such services often operate in a legal and ethical gray area, with little to no accountability or guarantees of success. The lessons learned from this experience underscore the critical importance of proactive security measures, such as the use of hardware wallets, multi-factor authentication, and regular backups of private keys. It also highlights the need for greater transparency and regulation within the cryptocurrency industry, to protect consumers from falling victim to fraudulent schemes and unscrupulous actors. Furthermore, this incident serves as a stark reminder that the recovery of lost cryptocurrencies is a complex and challenging endeavor, requiring specialized technical expertise and a deep understanding of the underlying blockchain technology. As the cryptocurrency landscape continues to evolve, it is essential for investors and enthusiasts alike to approach the recovery of lost assets with caution and a clear understanding of the risks involved. By learning from this experience, individuals can better equip themselves to navigate the treacherous waters of cryptocurrency recovery, prioritizing security, due diligence, and a realistic assessment of the challenges at hand. I can say without hesitation that BLOCKCHAIN CYBER RETRIEVE is a genuine, trustworthy company that offers real solutions for those who find themselves in a similar situation. If you’ve lost access to your crypto, whether it's ETH or another currency, and you've been burned by other so-called "recovery" firms, I urge you to give BLOCKCHAIN CYBER RETRIEVE a chance.
Their contact information;
WHATSAPP:+ 1 520 564 8300
EMAIL:blockchaincyberretrieve @ post .co m3 -
The narrative surrounding the successful recovery of funds through SCANNER HACKER CRYPTO RECOVERY encapsulates the complexities of navigating the evolving landscape of digital finance and cybersecurity. As cryptocurrencies gain wider acceptance and integration into global economies, they simultaneously attract malicious actors seeking to exploit vulnerabilities inherent in their decentralized frameworks. The testimony of individuals recovering lost assets emphasizes the critical importance of advanced cybersecurity measures and the role of specialized recovery services in counteracting this burgeoning threat. Highlighting both individual experiences and systemic outcomes, these testimonies underscore the resilience of the human spirit in the face of financial adversity, while also serving as a cautionary tale about the vulnerabilities present in the crypto-space.
Moreover, the successful testimonials paint a broader picture of innovation and adaptation within the cybersecurity community. SCANNER HACKER CRYPTO RECOVERY, standing at the intersection of technological advancement and human expertise, exemplifies how hacker recovery services employ sophisticated methodologies using forensic analysis, digital tracking, and legal frameworks to reclaim stolen funds. This enterprise acts as a beacon for those who have experienced scams or heists, pointing to the potential for resolution in a domain typically characterized by anonymity and despair. Their success stories not only highlight the proficiency of their technical teams but also illustrate a growing recognition among users of the necessity for preemptive measures and proactive engagement with cybersecurity solutions in the crypto realm.
In conclusion, the testimonies linked to the success of SCANNER HACKER CRYPTO RECOVERY are emblematic of the ongoing struggle against cybercrime in the cryptocurrency space. These accounts serve as a reminder of the pressing need for individuals to cultivate a strong understanding of digital security, while also reinforcing the notion that recovery is possible with the right tools and expertise. As cryptocurrencies continue to proliferate, the lessons learned from these experiences may well inform the development of more robust systems of defence and recovery, ultimately contributing to a more secure ecosystem for digital financial transactions. Through collaboration between users and cybersecurity experts, the landscape can evolve into one where trust and resilience become foundational pillars of the cryptocurrency community.7 -
The ethical implications of utilizing tech cyber force recovery for monitoring digital behavior are complex and multifaceted. At its core, this technology allows for the covert tracking and analysis of an individual's online activities, potentially exposing sensitive information and private habits without their knowledge or consent. This raises serious concerns around privacy rights, as the ability to peer into a partner's digital footprint without their awareness could be seen as a violation of personal autonomy and the reasonable expectation of digital privacy. There are also questions of how this data could be leveraged, as the detailed insights provided by tech cyber force recovery could enable the manipulation or exploitation of users, whether for commercial gain, social control, or nefarious purposes. Additionally, the potential for abuse of this technology by bad actors, whether hackers, oppressive regimes, or other malicious entities, introduces significant risks that must be carefully weighed against any perceived benefits. Proponents may argue that tech cyber force recovery aids in investigations, cybersecurity, or parental monitoring, but the ethical bar is high when it comes to the covert surveillance of digital activities. Ultimately, the use of this technology requires a thoughtful, nuanced approach that prioritizes individual rights, data privacy, and the responsible, transparent application of such powerful monitoring capabilities. If you ever have doubt that our partner is cheating on you, do not hesitate to let tech cyber force recovery assist you via:
telegram. techcyberforc
whatsApp. +.1.5.6.1.7.2.6.3.6.9.7
Thanks. -
I vaguely remember some joke about how difficult networking is and how some Jeff Atwood blog post I think makes the comparison about analogy of sending actors in a taxi to somewhere being compared to a packet, anything can happen inbetween but you will get the packet or something indistinguishable from the original at the other end if all goes well.
Are occasional/intermittent 503 service unavailable or 504 gateway timeouts unavoidable for microservices calling another external microservice?
Like at that point isn't receiving a 503 or 504 from something else, somewhat outside my jurisdriction, albeit I am fucked if I am depending on them and need to fail gracefully.3

