Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "remote control"
-
*Dev in his 40's from our counter-part office.
Me: Here's my SSH keys.
Dev: What's this?
Me: SSH keys. Give me access to the repository.
Dev: We don't use any version control here. Let's just use FTP or Remote Desktop and just download the codes.19 -
Worst thing you've seen another dev do? Long one, but has a happy ending.
Classic 'Dev deploys to production at 5:00PM on a Friday, and goes home.' story.
The web department was managed under the the Marketing department, so they were not required to adhere to any type of coding standards and for months we fought with them on logging. Pre-Splunk, we rolled our own logging/alerting solution and they hated being the #1 reason for phone calls/texts/emails every night.
Wanting to "get it done", 'Tony' decided to bypass the default logging and send himself an email if an exception occurred in his code.
At 5:00PM on a Friday, deploys, goes home.
Around 11:00AM on Sunday (a lot folks are still in church at this time), the VP of IS gets a call from the CEO (who does not go to church) about unable to log into his email. VP has to leave church..drive home and find out he cannot remote access the exchange server. He starts making other phone calls..forcing the entire networking department to drive in and get email back up (you can imagine not a group of happy people)
After some network-admin voodoo, by 12:00, they discover/fix the issue (know it was Tony's email that was the problem)
We find out Monday that not only did Tony deploy at 5:00 on a Friday, the deployment wasn't approved, had features no one asked for, wasn't checked into version control, and the exception during checkout cost the company over $50,000 in lost sales.
Was Tony fired? Noooo. The web is our cash cow and Tony was considered a top web developer (and he knew that), Tony decided to blame logging. While in the discovery meeting, Tony told the bosses that it wasn't his fault logging was so buggy and caused so many phone calls/texts/emails every night, if he had been trained properly, this problem could have been avoided.
Well, since I was responsible for logging, I was next in the hot seat.
For almost 30 minutes I listened to every terrible thing I had done to Tony ever since he started. I was a terrible mentor, I was mean, I was degrading, etc..etc.
Me: "Where is this coming from? I barely know Tony. We're not even in the same building. I met him once when he started, maybe saw him a couple of times in meetings."
Andrew: "Aren't you responsible for this logging fiasco?"
Me: "Good Lord no, why am I here?"
Andrew: "I'll rephrase so you'll understand, aren't you are responsible for the proper training of how developers log errors in their code? This disaster is clearly a consequence of your failure. What do you have to say for yourself?"
Me: "Nothing. Developers are responsible for their own choices. Tony made the choice to bypass our logging and send errors to himself, causing Exchange to lockup and losing sales."
Andrew: "A choice he made because he was not properly informed of the consequences? Again, that is a failure in the proper use of logging, and why you are here."
Me: "I'm done with this. Does John know I'm in here? How about you get John and you talk to him like that."
'John' was the department head at the time.
Andrew:"John, have you spoken to Tony?"
John: "Yes, and I'm very sorry and very disappointed. This won't happen again."
Me: "Um...What?"
John: "You know what. Did you even fucking talk to Tony? You just sit in your ivory tower and think your actions don't matter?"
Me: "Whoa!! What are you talking about!? My responsibility for logging stops with the work instructions. After that if Tony decides to do something else, that is on him."
John: "That is not how Tony tells it. He said he's been struggling with your logging system everyday since he's started and you've done nothing to help. This behavior ends today. We're a fucking team. Get off your damn high horse and help the little guy every once in a while."
Me: "I don't know what Tony has been telling you, but I barely know the guy. If he has been having trouble with the one line of code to log, this is the first I've heard of it."
John: "Like I said, this ends today. You are going to come up with a proper training class and learn to get out and talk to other people."
Over the next couple of weeks I become a powerpoint wizard and 'train' anyone/everyone on the proper use of logging. The one line of code to log. One line of code.
A friend 'Scott' sits close to Tony (I mean I do get out and know people) told me that Tony poured out the crocodile tears. Like cried and cried, apologizing, calling me everything but a kitchen sink,...etc. It was so bad, his manager 'Sally' was crying, her boss 'Andrew', was red in the face, when 'John' heard 'Sally' was crying, you can imagine the high levels of alpha-male 'gotta look like I'm protecting the females' hormones flowing.
Took almost another year, Tony released a change on a Friday, went home, web site crashed (losses were in the thousands of $ per minute this time), and Tony was not let back into the building on Monday (one of the best days of my life).10 -
I'm getting ridiculously pissed off at Intel's Management Engine (etc.), yet again. I'm learning new terrifying things it does, and about more exploits. Anything this nefarious and overreaching and untouchable is evil by its very nature.
(tl;dr at the bottom.)
I also learned that -- as I suspected -- AMD has their own version of the bloody thing. Apparently theirs is a bit less scary than Intel's since you can ostensibly disable it, but i don't believe that because spy agencies exist and people are power-hungry and corrupt as hell when they get it.
For those who don't know what the IME is, it's hardware godmode. It's a black box running obfuscated code on a coprocessor that's built into Intel cpus (all Intell cpus from 2008 on). It runs code continuously, even when the system is in S3 mode or powered off. As long as the psu is supplying current, it's running. It has its own mac and IP address, transmits out-of-band (so the OS can't see its traffic), some chips can even communicate via 3g, and it can accept remote commands, too. It has complete and unfettered access to everything, completely invisible to the OS. It can turn your computer on or off, use all hardware, access and change all data in ram and storage, etc. And all of this is completely transparent: when the IME interrupts, the cpu stores its state, pauses, runs the SMM (system management mode) code, restores the state, and resumes normal operation. Its memory always returns 0xff when read by the os, and all writes fail. So everything about it is completely hidden from the OS, though the OS can trigger the IME/SMM to run various functions through interrupts, too. But this system is also required for the CPU to even function, so killing it bricks your CPU. Which, ofc, you can do via exploits. Or install ring-2 keyloggers. or do fucking anything else you want to.
tl;dr IME is a hardware godmode, and if someone compromises this (and there have been many exploits), their code runs at ring-2 permissions (above kernel (0), above hypervisor (-1)). They can do anything and everything on/to your system, completely invisibly, and can even install persistent malware that lives inside your bloody cpu. And guess who has keys for this? Go on, guess. you're probably right. Are they completely trustworthy? No? You're probably right again.
There is absolutely no reason for this sort of thing to exist, and its existence can only makes things worse. It enables spying of literally all kinds, it enables cpu-resident malware, bricking your physical cpu, reading/modifying anything anywhere, taking control of your hardware, etc. Literal godmode. and some of it cannot be patched, meaning more than a few exploits require replacing your cpu to protect against.
And why does this exist?
Ostensibly to allow sysadmins to remote-manage fleets of computers, which it does. But it allows fucking everything else, too. and keys to it exist. and people are absolutely not trustworthy. especially those in power -- who are most likely to have access to said keys.
The only reason this exists is because fucking power-hungry doucherockets exist.26 -
Hands down this year.
10 months ago I left my boring fulltime job and opened my own ltd.
I also had to relocate to another country and basically start my life from 0 (got a nice apartment, new car, new gf and got new exciting remote projects).
Now Im happy, actually never been more happier. I have full control of my life and I dont need to deal with idiots.
I left a boring workplace where no one has an opinion because everybody is trying to stay politically correct meanwhile shit doesnt get done. I also left a toxic relationship where my spoiled by parents gf was constantly nagging me and nothing I would do was ever enough for her.
So my advice is a cliche but follow your gut instinct. Somehow deep down you already know what you are worth, so all is left to do is plan and act accordingly. Take risks. Sooner or later you will get where you want. If not then thats fine, making mistakes means that you actually lived instead of existed like a mindless puppet controlled by strings of outside circumstances.5 -
Back the mid 90s at secondary school, a friend came back from holiday with a Casio CMD-40 TV remote control watch. It was like magic, no one had never seen anything like it before.
We pranked our history teacher so badly, changing the channels, volume and turning the TV off while we were supposed to be watching some video on Henry VIII or something (no idea, too busy PMSL).
We'd pass the watch round the class to keep em guessing.
In the end, school replaced ALL the TVs and were seriously pissed off, to this day I believe they had no idea it was us!
4 -
My brother: “There’s no way you can remove games from my computer!”
Me: “Oh really?”
Bro: “Yes! I got password on Windows!”
He didn’t knew I had remote control setup on my PC... So I hid games on his PC6 -
Hey i found this crazy ass feature called "Remote Desktop Connection" on my pc. Do they sell the remote at wallmart ?? I want to operate my pc from a remote control 😞6
-
As a software engineer, I decided to participate in a hardware Hackathon. I went in not knowing much about the subject, but by the end of the weekend, we made a fully functioning (somewhat janky) jacket that could roll up or roll down its own sleeves depending on what your body temperature was (inspired by Back to the Future 2). We also created a remote, so you could control the length of the sleeves as well. It was the most off-the-wall, ballin project I've ever been a part of.10
-
!rant
After nine months of work, my capstone project is finally coming together.
It's an audio server written in Node.JS and MongoDB. I can run it on a pi plugged into a stereo and remote control it from my phone via the web server.
10 -
When I was 14 or so, we had acces to some computers during break. I went through each and every one of them, rebooted into Safe Mode (yeah, Windows), logged in as admin with no password, and gave admin powers to my account (each student had one, at least). Then, installed a keylogger and one of those "trojaans" that let me remote terminal, keyboard and mouse control to all the PCs (I had tried telnet server, but this was soo much easier).
Then came the fun.
"Why does the start menu keep opening by itself?"
"Why is the CD tray opening and closing on its own?"
Etc.
Then I found out social media passwords like (translated from spanish) "bigdicks". Never used them, because I considered myself one of the gray hatted. I did it just for the fun.2 -
I bought an internet radio from pioneer...
Unfortunately, the remote control has a small delay. So I thought, maybe there's an app to control the radio. But after downloading the app could not connect. During a network scan several services appeared. You are able to update the firmware via an unprotected web interface which makes me sad. But that's not the best thing yet. You can also connect to the device via the telnet port. Guess which user you are...
3 -
User where I work is convinced someone hacked her iPhone and is remotely changing settings all the time. And it’s not us (the company), the phone isn’t managed and there are no remote profiles installed.
User: I’m telling you. Things are always changing without me doing it!
Me: Alright. Do you have an exemple?
User: Yes. When I swipe here [control center] and tap the WiFi toggle, it always gets back on by itself later.
Me: Yep. That’s actually a “feature”. You don’t have to worry.
User: Alright then, this morning I couldn’t get Google Maps to work.
Me: Well. Since you turned off your cellular and WiFi, it’s normal you couldn’t look up an adress.
User: okay then what about that Bluetooth icon in the top that always appears? I know that means the hacker is on my phone through Bluetooth. See!?
Me: That’s actually just a status indicator. Don’t worry about it. It’ll always come back there it’s normal. You know, your phone can do a lot of stuff by itself.
User: Yeah right. It does it by itself. I’m not stupid you know!! *storms off*
What the hell?6 -
Sometimes I want to slap myself.
I’ve been making progress with my voice activated TV remote project - coz you got to use a Google Home and a Raspberry pi for something right? Right??
Anyway, when the API you have written suddenly stops working and you’ve spent hours trying to solve it, it is really soul crushing when you realise you’re using a class variable incorrectly
I’ll just go cry now, while I control my tv 😥😎
Class TVAPI{
Private $tvIP = “192.xxx”;
Private $args = $this->decodeArgs($_GET);
Function of tvVolume(){
exec(“python tvRemote.py {$tvIP} {$this->args}”);
}
}2 -
Lisp code was live-debugged and fixed with REPL on a spacecraft 100 million miles away
“An even more impressive instance of remote debugging occurred on NASA's 1998 Deep Space 1 mission. A half year after the space craft launched, a bit of Lisp code was going to control the spacecraft for two days while conducting a sequence of experiments. Unfortunately, a subtle race condition in the code had escaped detection during ground testing and was already in space. When the bug manifested in the wild--100 million miles away from Earth--the team was able to diagnose and fix the running code, allowing the experiments to complete. One of the programmers described it as follows:
Debugging a program running on a $100M piece of hardware that is 100 million miles away is an interesting experience. Having a read-eval-print loop running on the spacecraft proved invaluable in finding and fixing the problem.”
https://gigamonkeys.com/book/...3 -
"Aunt": I know that you have a bachelor's degree in computer science so you are smart with the computer...can you help me to pair new universal remote control for my television?1
-
Well, I was Always into Computers and Games and stuff and at some point, I started wondering: "why does Computer Go brrr when I Hit this Button?".
It was WinAPI C++ and I was amazed by the tons of work the programmers must have put into all this.
13 year old me was Like: "I can make a Game, cant be too hard."
It was hard.
Turns out I grabbed a Unity Version and tried Things, followed a tutorial and Made a funny jet Fighter Game (which I sadly lost).
Then an article got me into checking out Linux based systems and pentesting.
*Promptly Burns persistent Kali Live to USB Stick"
"Wow zhis koohl".
Had Lots of fun with Metasploit.
Years pass and I wrap my head around Javascript, Node, HTML and CSS, I tried making a Website, worked Out to some extent.
More years pass, we annoy our teacher so long until he opens up an arduino course at school.
He does.
We built weather stations with an ESP32 and C++ via Arduino Software, literally build 3 quadrocopter drones with remote Control and RGB lighting.
Then, Cherry on the top of everything, we win the drone flying Contest everyone gets some nice stuff.
A couple weeks later my class teacher requests me and two of my friends to come along on one of their annual teacher meetings where there are a bunch of teachers from other schools and where they discuss new technology and stuff.
We are allowed to present 3D printing, some of our past programming and some of the tech we've built.
Teachers were amazed, I had huge amounts of fun answering their questions and explaining stuff to them.
Finally done with Realschulabschluss (Middle-grade-graduation) and High school Starts.
It's great, we finally have actual CS lessons, we lesen Java now.
It's fuckton of fun and I ace all of it.
Probably the best grades I ever had in any class.
Then, in my free time, I started writing some simple programs, firstvI extended our crappy Greenfoot Marsrover Project and gave it procedural Landscape Generation (sort of), added a Power system, reactors, Iron and uranium or, refineries, all kinds of cool stuff.
After teaching myself more Java, I start making some actual projects such as "Ranchu's bag of useful and not so useful stuff", namely my OnyxLib library on my GitHub.
More time passes, more Projects are finished, I get addicted to coding, literally.
My days were literally Eat, Code, sleep, repeat.
After breaking that unhealthy cycle I fixed it with Long Breaks and Others activities in between.
In conclusion I Always wanted to know what goes on beneath the beautiful front end of the computer, found out, and it was the most amazing thing ever.
I always had constant fun while coding (except for when you don't have fun) and really enjoyed it at most times.
I Just really love it.
About a year back now I noticed that I was really quite good at what I was doing and I wanted to continue learning and using my programming.
That's when I knew that shit was made for me.
...fuck that's a long read.5 -
If you can be locked out of it remotely, you don't own it.
On May 3rd, 2019, the Microsoft-resembling extension signature system of Mozilla malfunctioned, which locked out all Firefox users out of their browsing extensions for that day, without an override option. Obviously, it is claimed to be "for our own protection". Pretext-o-meter over 9000!
BMW has locked heated seats, a physical interior feature of their vehicles, behind a subscription wall. This both means one has to routinely spend time and effort renewing it, and it can be terminated remotely. Even if BMW promises never to do it, it is a technical possibility. You are in effect a tenant in a car you paid for. Now imagine your BMW refused to drive unless you install a software update. You are one rage-quitting employee at BMW headquarters away from getting stuck on a side of a road. Then you're stuck in an expensive BMW while watching others in their decade-old VW Golf's driving past you. Or perhaps not, since other stuck BMWs would cause traffic jams.
Perhaps this horror scenario needs to happen once so people finally realize what it means if they can be locked out of their product whenever the vendor feels like it.
Some software becomes inaccessible and forces the user to update, even though they could work perfectly well. An example is the pre-installed Samsung QuickConnect app. It's a system app like the Wi-Fi (WLAN) and Bluetooth settings. There is a pop-up that reads "Update Quick connect", "A new version is available. Update now?"; when declining, the app closes. Updating requires having a Samsung account to access the Galaxy app store, and creating such requires providing personally identifiable details.
Imagine the Bluetooth and WiFi configuration locking out the user because an update is available, then ask for personal details. Ugh.
The WhatsApp messenger also routinely locks out users until they update. Perhaps messaging would cease to work due to API changes made by the service provider (Meta, inc.), however, that still does not excuse locking users out of their existing offline messages. Telegram does it the right way: it still lets the user access the messages.
"A retailer cannot decide that you were licensing your clothes and come knocking at your door to collect them. So, why is it that when a product is digital there is such a double standard? The money you spend on these products is no less real than the money you spend on clothes." – Android Authority ( https://androidauthority.com/digita... ).
A really bad scenario would be if your "smart" home refused to heat up in winter due to "a firmware update is available!" or "unable to verify your subscription". Then all you can do is hope that any "dumb" device like an oven heats up without asking itself whether it should or not. And if that is not available, one might have to fall back on a portable space heater, a hair dryer or a toaster. Sounds fun, huh? Not.
Cloud services (Google, Adobe Creative Cloud, etc.) can, by design, lock out the user, since they run on the computers of the service provider. However, remotely taking away things one paid for or has installed on ones own computer/smartphone violates a sacred consumer right.
This is yet another benefit of open-source software: someone with programming and compiling experience can free the code from locks.
I don't care for which "good purpose" these kill switches exist. The fact that something you paid for or installed locally on your device can be remotely disabled is dystopian and inexcuseable.12 -
Got to know about OSMC/Kodi last week. Took out my Raspberry Pi. Setup OSMC over the weekend, did all the cable setup for 4 external hard drives and connected to TV via HDMI. After few configurations, I'm all setup. I'm astonished by all the features it provides. Fetching data from TMDb (I had actually created a javaFX app to do this for my local library just last month), remote control from Android as well Web Browser. Enabled UPnP and now I have my complete media center floating around my house network. It is one of the best open source project I have laid my eyes upon. Wish I could attach more pics.
6 -
I got cut from a contracting job yesterday I have 3 weeks left in the contract. They said I worked well with the team, had a great work ethic but didn't think I had strong enough tech skills. In the past this would have hurt my feelings and it does a little but I think my tech skills are fairly high. There were three devs working on 66 apps with no tests, some source control but most of the code in source control was older than code deployed in prod, no automatic builds, people would wait a week before checking in code, others would check in code that would not build. Today the boss asked if I had messed with app pools on the prod iIs server because something was wrong. I said no because never remote into the server. Anyway it is the end of the world and I feel fine.5
-
I think this a perfect anecdote of where tech is going nowadays:
I moved my bowels on one of those high-tech Japanese toilets: it allowed you to control the seat temperature, cleaned your butt with spray (with an additional "ladies" mode), had several modes of flushing (1, 2, and "eco"), automatically lifted and closed the lid, played some music for you, had a remote controller for you to flush your shit at a distance.
But, guess what, IT DIDN'T FLUSH SHIT. It pathetically trying to flush my shit with 1000 different kinds of puny jets and draining modes but my heap of shit always bounced back because its flush was so weak that it couldn't push it.
I don't care if the seat warmer went out of control and burned my ass or if the butt cleaning jet didn't reach my anus,
JUST DO WHAT YOU'RE SUPPOSED TO DO AND FLUSH MY SHIT.5 -
Has been a long time since I'm appreciating working with GRPC.
Amazingly fast and full-featured protocol! No complaints at all.
Although I felt something was missing...
Back in the days of HTTP, we were all given very simple tools for making requests to verify behaviours and data of any of our HTTP endpoints, tools like curl, postman, wget and so on...
This toolset gives us definitely a nice and quick way to explore our HTTP services, debug them when necessary and be efficient.
This is probably what I miss the most from HTTP.
When you want to debug a remote endpoint with GRPC, you need to actually write a client by hand (in any of the supported language) then run it.
There are alternatives in the open source world, but those wants you to either configure the server to support Reflection or add a proxy in front of your services to be able to query them in a simpler way.
This is not how things work in 2018 almost 2019.
We want simple, quick and efficient tools that make our life easier and having problems more under control.
I'm a developer my self and I feel this on my skin every day. I don't want to change my server or add an infrastructure component for the simple reason of being able to query it in a simpler way!
However, This exact problem has been solved many times from HTTP or other protocols, so we should do something about our beloved GRPC.
Fine! I've told to my self. Let's fix this.
A few weeks later...
I'm glad to announce the first Release of BloomRPC - The first GRPC Client GUI that is nice and simple,
It allows to query and explore your GRPC services with just a couple of clicks without any additional modification to what you have running right now! Just install the client and start making requests.
It has been built with the Electron technology so its a desktop app and it supports the 3 major platforms, Mac, Linux, Windows.
Check out the repository on GitHub: https://github.com/uw-labs/bloomrpc
This is the first step towards the goal of having a simple and efficient way of querying GRPC services!
Keep in mind that It is in its first release, so improvements will follow along with future releases.
Your feedback and contributions are very welcome.
If you have the same frustration with GRPC I hope BloomRPC will make you a bit happier!
3 -
Which bastard thought that 'Spotifiy remote' is a good idea?
You never know what you control:
- your phone with your phone
- your laptop with your phone
- your laptop with your laptop
- your phone with your laptop
- your heart with your heartbeat
The guy invented that should get hit with a stick recursively until he cries 'Music should be played on the device that you can control'7 -
When I started working as designer my boss at that time liked to invite people to remote control me, sit or stand behind my neck to explain their will and tell me to do this, "can we try this?", "can it be changed to another color?", "is it possible to move logo to the left?" and all that m*f*cking shit.
It didn't take long before I decided that I wouldnt accept that anymore.
They come with that energy, that illusion of power to play god with your fast mouse...
The first solution was to stand up with them around the chair and tell them I would take notes, then do the changes and mail them. That worked but sometimes it didn't feel right for the boss who got mad and tried to handle the mouse like trying to pretend she was going to do it...
In case the visit was by surprise I used this method, not sitting in worst position. Just recover dignity standing to their commaning stance.
The best and what became the real solution was printing things we needed, receive and guide clients to a meeting room where we would discuss things and take notes on the papers.2 -
I have multiple (in no particular order) :
Nextcloud : It was an idea that I had in my head as well - to take on corporations like Google in the space of personal cloud. Be free, open-source and put the users in charge.
Gitlab : The most open and transparent company that I've ever come across. And they work 99% remote. They've got features that no other players in the space have. All while putting users in control.
Fediverse social media - Mastodon, GNU Social, Diaspora (soon) : For taking a major step in the direction of putting the users in control of their data; all while enabling a decentralized social network.
Ruby : An open community and building a programming language that runs a lot of software of the world.
Python : The oldest thriving community that has a special place in the development community (and my heart)
Javascript / ECMAScript : The scripting language that grew to be a beast of it's own. -
No. No. And Absolutely No.
The Three Laws of Robotics MUST not be broken.
https://cnn.com/2022/11/...13 -
The joys of working remotely: you're on the toilet, happily dumping, with your phone in your hand. Suddenly you receive a message from your manager who wants to chat about something urgent.
How do I explain the reason why he has to wait a couple of minutes?6 -
(pseudorant)
Any ideas on how to end with computer scams (fake Microsoft support calls, money flips and the other gazillion)?
I'm really tired of this. A$$#les abusing unsuspecting people, abusing our elders, shielded behind a remote control session.
I know that this is very I.T. I'm just appealing to the extremely powerful distributed knowledge of all SUPERB people in devRant.
Thanks and hope that this was not tl;dr2 -
Curiosity killed Ben the cat.
I work in Android Dev. I use scrcpy to control devices remotely. I realized some phones have chrome remote desktop on them...I thought, what if... I open my computer screen on the devices while these devices cast their screen to my computer. Classic mirror loop effect, align to the pixel, staring down the abyss of infinity mirroring... until i took off my earphones to go check this effect on one of the devices.... my computer audio was being played on all devices running chrome remote. :( I feel so stupid1 -
A person who can fix anything that is electronic.
For example:
Washing machine,
TV,
Mobile,
Playstation,
Xbox,
AC,
Remote control,
Camera ...etc1 -
I never understood how people have any problems with getting paid for freelancing work, when middleman/escrow platforms like upwork exist, just don't be retarded when applying for a job. I am so sick of those shit ass stories from people telling me "my client didnt pay meeee 😭😭😭" ITS YOUR FAULT. I never had any client not paying, if you don't have the option of escrow, then just fucking put remote execution via "update" system in for fucks sake or give remote control to the client while monitoring it, there is so much fucking ways to secure yourself, just don't be retarded and many clients instantly show their character when talking budget and turnaround time.15
-
2nd post progress of this project https://devrant.com/rants/9985730/...
I went to shop to buy missing ir diode and bluetooth for arduino.
Launched arduino today with ir receiver and I managed to reverse engineer protocol.
Turns out it’s just NEC remote codes.
I used this library https://arduino.cc/reference/en/... to easily send and receive ir signals.
Everything took me whole day cause I’m rookie in hardware.
I can now remote control medion md 19500 using arduino.
Next step is to make it riding itself.
I need to measure speed and turn angle with error rates.
I will probably use pen and paper and let vacuum cleaner draw angle for me and after that I will use the most modern, accurate and cheapest angle measurement tool that is protractor - school welcome back
Speed can be more complicated and need another external complicated tool that is tape measure and a clock.
I also bought second robot because I got this stupid idea to allow people to control robots using internet.2 -
I had a small .NET PoC project I wanted to upload to our git server. So added the project to version control using Visual Studio, meaning that VS created a local repository for it. Then I wanted to push it to the remote repository which were created by my colleague. This one was initialized with a commit (.gitignore and Readme.md), so I couldn't push directly. Googled a bit, OK then tried to fetch the remote repo, didn't help. Googled again, tried some "git push origin master whatever" stuff and then rebate, because nothing seemed to help.
OOPS where are my local files? WTF? 😣
Long story short: Experience in other version control systems is not enough or even dangerous when switching over to git. 😂4 -
How can I ask my coworkers for feedback without coming off as insecure?
A year and a half ago I got my first job as a remote developer when I was 30. I've done web and IT related jobs before but not full time development. Everything was fine for the first 10 months and then I started getting negative reviews, that my productivity rate is much lower than the rest of the team. I felt really sad and stressed, which led to a minor breakdown, which led to my contract being changed from a full time employee to a contractor that gets paid by the (estimated) hour. After a bit of research, I found out that my productivity rate was low because I was the only developer following our "One test per pull request" policy, which was obviously cancelled at some point, but nobody informed me. I didn't bring this up to my boss because I didn't want to make my manager and coworkers look bad. Working as a contractor isn't so good because a lot of times my features are delayed because of external factors I can't control(code reviews, testers, tests randomly breaking). I want to find out if I'm a bad developer or if the company is trying to cut costs by taking advantage of my insecurity and inexperience.1 -
Mother-in-law was visiting this morning (love her, lovely woman) and being a good son-in-law, I set out/up the coffee maker before leaving for work (I knew she'll want coffee).
About an hour I get a text message from my wife.
W: "Mom is here and wants some coffee. How do I make coffee in that thing on the countertop?"
<It's a Keurig>
Me: "First, press the power button to get the water up to the brewing temperature."
W: "I know that, I'm not stupid. Where is the power button?"
Me: "The top row of buttons, the first button, it looks just like the power button on the remote control."
W: "Got it. Now what? Its not working"
Me: "You need to wait until it's done warming up. Takes about 30 seconds."
W: "Is it supposed to make that sound? Something is wrong."
Me: "No, its normal. Be patient."
W: "No, something is wrong. Its not supposed to be that loud."
Me: "Sounds like a jet engine taking off, yes, been using it for almost 10 years, this isn't new."
W: "Stop being mean. Never mind. It stopped. What now?"
Me: "Put the pod in the little basket, pull down the handle, and press the second button from the top."
W: "Not working"
Me: "Did you pull the handle all the way down, so it locks?"
W: "Still not working. Now what?"
Me: "Weird. Send me a picture, I can't see what you see."
W: "Never mind, its working now. This would have gone a lot faster if you told me what to do from the start."
My prayer today is thanking Jesus for patience. Amen.5 -
Today I had to spend the whole day fixing a stupid bug in a legacy application in a completely different tech stack than I'm used to...
At my company we have an Internet application running where we can upload a word document and using some mailmerge variables magic, can set those vars and receive the personalised word doc back...
Now this is great, when it's working, and is used in various projects we have up and running... Suddenly the application decides to crap out for no apparent reason and guess who drew the short straw....
Anyhow I ask our sys admin for the password to the server, I remote desktop to it, turns out its a fucking Windows 2008 server...
But wait it gets better, the application, a shoddy mess of c# code, is not under any sort of version control, has to be developed on that same server and to top it all of, I have to follow some obscure barely documented deployment precedure to get my changes live....
So after a lot of cursing on the dev (not working at the company any more) who did the original setup, and hours of painstakingly piecing together how it works and what went wrong and how to fix it, I finally managed to get it working....
After this rant, I'm mailing my technical lead about this in the hopes we can get someone to do it right (yes, I'm that naive)1 -
Anti-features need to be fought with fire (metaphorically speaking).
This means they must be eliminated, not just made optional.
Why? Because an optional anti-feature is just one step away from a mandatory anti-feature.
For example, "secure" booting: https://youtu.be/vvaWrmS3Vg4?t=750 (Jody Bruchon)
Another example are disguised remote kill switches, such as add-on signing ( https://digdeeper.club/articles/... ). It started as optional and people were able to opt out, and everyone accepted it because no one expected what would come next.
All that was left was removing the ability to opt out, and then Mozilla has control over which extensions users are allowed to use.
For years, this feature sat dormant and users did not know of its existence. But in early May 2019, the metaphorical thread snapped and an expired certificate remotely disabled all extensions, wasting millions of man-hours of productivity.
From the digdeeper.club article:
"The funny thing is, the whole point of the extension prison was allegedly to increase security - and yet today, all security addons got disabled because of it! Shows how freedom always has to trump over security or it ends up in a disaster like this."
Evil needs to be nipped in the bud before it can flourish.2 -
Given a competitive multiplayer simulator game where you can program your own flight computer, what programming model would you like it to support?
- in-game programming with a DSL which can have artificial resource limits to regulate the extent of automation and can maintain the atmosphere of the game in the process of programming
- in-process Webassembly executor which makes artificial resource limits feasible to the extent that people can't just throw image recognition and AI at every problem, but it loses the atmosphere
- API-based unrestricted remote control9 -
Well we all know about McAfee right
Well today i went to their online support and had a chat with one of their so called technicians. At one point of this so called assistance he asked me for remote control. Then as an employee of a renowned anti virus company he sent me a link to a java applet to be run in google chrome. I mean what the fuck. Didn't they get the note that chrome stopped supporting applets a long way back. Assholes -
Hey Guys
Today I'm bringing a tool for you guys, mount servers with old phones Or have servers in your phone for testing.
Tool: Servers Ultimate Pro
Web:: https://icecoldapps.com/app/...
Note1.: Doesn't handle well above android 6+, So test one of the free servers you're intending to use before buying.
Note2.: This App costs around 10€/$ but you can get single App servers for free (I think even html + php + mysql package for free).
Not promotional, I'm just a user that loves this App.
I already talked about this a few times (usually I just call the cell phone I'm using my web server), but as a noob I don't even knot the possibilities.
This App comes with more then 70 protocols (60+ servers and a mix of servers).
From ssh, ftp, html (nginx, lightppd, Apache, simple) with php and mysql, Webdav...
<quote>
Run over 60 servers with over 70 protocols!
Now you can run a CVS, DC Hub, DHCP, UPnP, DNS, Dynamic DNS, eDonkey, Email (POP3 / SMTP), FTP Proxy, FTP, FTPS, Flash Policy, Git, Gopher, HTTP Snoop, ICAP, IRC Bot, IRC, ISCSI, Icecast, LPD, Load Balancer, MQTT, Memcached, MongoDB, MySQL, NFS, NTP, NZB Client, Napster, PHP and Lighttpd, PXE, Port Forwarder, Proxy, RTMP, Remote Control, Rsync, SMB/CIFS, SMPP, SMS, Socks, SFTP, SSH, Server Monitor, Stomp, Styx, Syslog, TFTP, Telnet, Test, Time, Torrent Client, Torrent Tracker, Trigger, UPnP Port Mapper, VNC, Wake On Lan, Web, WebDAV, WebSocket, X11 and/or XMPP server!
</quote>7 -
I bought medion md 19500 vacuum cleaner refurbished for about 74 usd, it can be controlled using ir remote
I disconnected vacuum top and it’s still working so my plan is to use arduino instead of attached remote to control robot
I can try to identify where ir sensor is to directly connect to it, but don’t know if my skills are enough to do it.
edit:
to compare, roomba create 3 costs 450$ and I can buy this vacuum used without remote for 38 usd21 -
emacs, git and a decent shell like bash with at least gnutools
emacs, because I was searching for the right editor for years
- multi-platform
- extensible
- ready to type (no fucking mode change for typing like vim)
- programming functions like auto indenting, syntax highlight, auto complete, etc.)
- multiple windows in any arrangement
Additionally
- it is completely programmable to do anything you want
- you can find a solution to most common development needs on the web
git, because
- it is usable from small personal projects to heavy duty development
- fast branching and checking out, switching between different workpaths within seconds
- basic version control offline, you only need to be online for remote consolidation
- you don't have to think much about structure from the beginning, if in doubt just commit and your work is saved, then arrange the result when you're ready
sh/bash-like shell with gnutools, because
- simple tools do their job and try not to be smarter than the user
- tools can be combined in any possible and impossible variants
- powerfull scripting (although sh-syntax is often annyoing)
- open as many shells as needed, no single-instance problem as with some GUI-tools
- extensible with gazillions of other tools
And best of all, all these tools are available on all widely used desktop OS. -
A friend asked me to set up a system that allows them to see their desktop on their tv and use a remote to wirelessly control it.
Fine, so I set up a system that allows them to interact with their desktop on tv wirelessly with their phone. Once the desktop booted, all they have to do is click one single button to open the thing they need.
Guess what? They come tell me: "This is too much work". What, clicking on a single button is too much work? Now you want it to auto-load too? Right, so apparently this is better: when the users plomps their @#!* on the couch, the OS has to be already booted, the desktop has to be ready and the desired functionality has to be launched. How lazy can you be?
Users can be so lazy.. and I thought I was lazy for not wanting to debug Python to webscrape a website that asked for cookies.2 -
!rant
I currently don't have access to my good computer, so I installed a remote control software on it. I also made sure I could turn it on over the internet (Wake on LAN).
This worked well for some time: I powered it on remotely and after a few seconds I was able to connect to it.
Now what I didn't know was that WoL only works if the computer has been shut down completely. It does not work if it's in standby mode.
So I turned it on today, but didn't establish a connection immediately, and after a few minutes, it apparently fell asleep (standby). Now I can't reach it remotely, and I also can't wake it up again with WoL. And as I don't have physical access to it for about a month, so my only hope is that there is a power cut and it will be shut down the hard way.2 -
The moment you decide to let YouTube just play what's recommended and after 4 videos it loops over the same 5 videos. Looks like I need to setup remote control on my phone now :( bed wasso warm..
-
How would you approach choosing a fairly short but meaningful domain name? Common words are obviously going to be taken.
I have a handful of domain names used for different things, but my main one is 17 characters long and made up of 2 words and not particularly interesting (my surname + another word). It's relatively easy to read out to people over the phone, but inputting it in a phone handset or on a device without a keyboard (e.g. setting the hostname + domain of a media centre with a remote control) is a bit tiresome.
Doesn't even have to be something I can say easily as I mainly want it just for "infrastructure" purposes rather than to host a website etc.
I'd probably use it for sign-up e-mails to reduce the amount of spam/newsletter mail (I do generate a separate address for signing up to most services) but other than that wouldn't be using it regularly for e-mail.
But I don't want something meaningless like abcxyz.1 -
Dunno if anyone else has ever used it or if most people just the browser, but the Twitch smart TV app is hot garbage. It takes several seconds to process every remote control input, even just navigating the menus.
It’s the only app on my TV that performs so badly. YouTube/Netflix/Prime all work perfectly, but for some reason Twitch acts like its running on a Windows Vista toaster1 -
Fuck TeamViewer.
I've been using it to control my home PC desktop from remote for a few years now (booted PC via Wake-On-LAN, done stuff, shutdown). I started using Chrome Remote Desktop a while ago too, but its ports are blocked at work, so I had to rely on TV some more.
Recently TV more often told me that I was offline (but I wasn't) and more importantly they started blocking my connections due to "commercial usage" (it's my private shit, yo), so now I've moved on to RDP via SSH.
That really makes me feel relieved as I wanted to move away from it for a while now anyways and SSH tunnels also are the real shit.
Today was a good day.3 -
I want to play some games in my free time, what would be the best option for me ?
choice 1 : ps5 or xbox?
choice 2 : monitor or 4k tv
choice 3 : above choices or simply buy a windows laptop?
context :
1. i have never been a hardcore gamer. i don't dig multiplayer global kinda games like pubg, or other fps. I rather like offline story games like takken or NFS most wanted 2005
2. my current laptop is a macbook. i started development with windows laptop years ago, and at that time i was free enough to complete most wanted 2005 and max payne 1/2 (with cheats) i liked gta vice city / sanandreas as well, but i could not pass its missions and would rather end up roaming around
3. i recently played it takes 2 , some bmx bike racing and some archery game with my friend on his PS5 and damn i liked that crispy super fast and detailed graphical games. might be a good investment for relaxation and weekend time pass
4. i am shifting homes and in need of a personal tv/display as I don't want to share family tv anymore. i don't really watch any cable tv shows apart from news channels and mainly consume ott content (netflix ,prime Hotstar etc) i am wondering if a display could also be mounted on wall and could be able to run otts vis some firestick, jio stick or google cast etc.
5. as i mentioned that i never had a taste for gaming, i wonder if all above would be a bad choice and if i should simply buy a good windows laptop
( whatever that technology is , all i want is to control that screen content with a remote, like we do in tv)
So what's best for me?12 -
Got an SMS inbound: "Please get in remote control into my laptop before the boat leaves in 3 minutes and I lose Wi-Fi signal, I need an username/password written in [the Windows UAC prompt]"
I was on my lunch break, and saw the message a too late. -
Anyone using lirc (Linux infrared remote control) and got a Windows or Android program to control it through the network?
I did not find any that actually worked so I started my own yesterday.
The communication with lirc is surprisingly easy.
My next step is parsing the remote configuration files from lirc.
After that I need to get the GUI look better.1 -
So I have a huge family, and a core group of close friends, but I'm the only semi-tech-literate individual I know. The closest I have is a relative that uses a drag and drop interface to control some "internet of things" style systems in his 9 to 5. DevRant is great, and reddit can be, any place/platform/bar/dogpark you all use to meet other devs/engineers/algorithm junkies? For context, I'm a remote dev for a small team, purty much solo...
-
Now the problem arises on how to remote control a linux machine with the i3 window manager. (With gui)
Teamviewer sends the windows key as the alt key and now no shortcuts work ...2 -
Hi everyone
I have a pretty old sansui tv in my room that I lost the remote for ages ago. I would like to remotely control the TV without having to buy the actual remote for the specific model (which is ~$28). Any ideas on how I can find the remote codes for the tv so I can program my own remote? Let me know if u guys have any ideas, thanks!!3 -
It all started one afternoon when I was using my computer. Suddenly, a pop-up alert appeared on my screen, claiming that my computer was "infected with Bitcoin mining malware." My heart raced as I read the alarming message. I had heard about malware before, and the thought of my personal information being compromised sent a wave of panic through me. The pop-up wouldn’t go away, and it displayed a phone number for "Microsoft Support," urging me to call immediately for assistance. WHATSAPP : +1 (581) 256‑1989 I hesitated, feeling a mix of fear and confusion, but the urgency of the situation pushed me to pick up the phone. When I called, a man with a calm and authoritative voice answered, claiming to be a Microsoft support agent. He spoke with such confidence that I found myself believing him. He assured me that he could help resolve the issue and began guiding me through a series of steps. He instructed me to download remote access software so he could take control of my computer. I felt a knot in my stomach, but he reassured me that it was necessary to fix the problem. Trusting his words, I followed his instructions, thinking I was doing the right thing. Once he had access to my computer, he started navigating through my files and programs, pointing out various issues that made me believe my computer was indeed compromised. I felt increasingly helpless as he manipulated my system. Then, he mentioned that I needed to secure my cryptocurrency wallet. I had recently started using it, and the thought of losing my funds terrified me. He convinced me that the malware could drain my wallet, and I needed to act fast. In a moment of panic, I provided him with my wallet information, believing I was protecting my savings. I watched in horror as he transferred my hard-earned money into his own accounts. The realization hit me like a ton of bricks. I had been scammed. After the call ended, I tried to regain control of my computer, but it was too late. The damage was done, and I felt a deep sense of violation and embarrassment. In the days that followed, I learned that I was not alone. CHAINTRACE ASSET RECOVERY, a cybersecurity firm, was working tirelessly to combat this type of fraud. They collaborated with Europol to trace the operation back to a call center in Poland, identifying over 2,500 victims like me across Europe. CHAINTRACE ASSET RECOVERY efforts were instrumental in uncovering the extent of the scam. They analyzed the malware's command-and-control servers and gathered evidence that helped law enforcement freeze the accounts where the stolen funds had been transferred. Thanks to their hard work, some of the stolen money was recovered, providing a glimmer of hope for victims like me. While I was grateful for the recovery efforts, the emotional toll of the experience lingered. I never thought I would be a victim of such a scam, and I wish I had been more cautious. I hope that by sharing my story, I can help others avoid falling into the same trap and raise awareness about the vital work that organizations like CHAINTRACE ASSET RECOVERY, are doing to protect individuals from cybercrime.2
-
ToyStack Virtual OS - A secure, cloud-based virtual OS that works on any device—no installation required, fully customizable, and always accessible.
ToyStack Virtual OS redefines virtual desktop computing by offering a secure, scalable, and high-performance cloud-based operating system accessible directly through any web browser. Eliminating the need for traditional software installations, ToyStack’s agentless approach simplifies deployment and reduces hardware dependency—cutting costs while enabling seamless access to workspaces from anywhere in the world.
Designed with enterprise-grade security at its core, ToyStack Virtual OS integrates multi-factor authentication (MFA), end-to-end encryption, and AI-powered threat detection to safeguard sensitive data. It adheres to globally recognized compliance standards, including ISO 27001, 27017, 27018, and SOC 2 Type II, ensuring protection against evolving cyber threats and regulatory requirements.
Flexibility is at the heart of ToyStack’s design. It supports Windows, Linux, and custom operating systems, all managed through a centralized Control Tower. This intuitive management console enables IT administrators to enforce group policies, streamline user provisioning, and monitor performance—all in real-time. Whether managing hybrid teams, remote workforces, or distributed operations, ToyStack adapts effortlessly to dynamic business needs.
Performance is never compromised, thanks to AI-driven resource optimization that intelligently allocates computing power based on workload demands. This ensures zero-lag experiences and seamless scaling during peak usage, empowering teams to remain productive without interruptions.
Beyond performance, ToyStack Virtual OS drastically reduces IT overhead and operational complexity. Built-in automation handles provisioning, updates, and security enforcement, minimizing administrative burdens. With its pay-as-you-go pricing, businesses can avoid costly licensing fees and infrastructure investments, making it a cost-effective alternative to traditional Virtual Desktop Infrastructure (VDI).
Whether you’re scaling operations globally, enabling BYOD policies, or enhancing remote work security, ToyStack Virtual OS delivers an unmatched combination of simplicity, security, and performance—future-proofing your organization for the modern digital workspace.4 -
Shady Business Cypress: Your Trusted Window Treatment Professionals in Cypress, TX
When it comes to enhancing the look and feel of your home, few things make a bigger impact than quality window treatments. At Shady Business Cypress, we specialize in providing top-tier solutions for all your window treatment needs. As window treatment professionals in Cypress, we offer a wide range of services, from expert design to flawless installation, ensuring that every window in your home is dressed to perfection. Our expertise in both window treatments and Cypress TX home improvement makes us the go-to choice for homeowners looking to upgrade their spaces.
Why Choose Shady Business Cypress as Your Window Treatment Professionals?
As trusted window treatment professionals in Cypress, our team at Shady Business Cypress is committed to providing personalized service that caters to your specific style and needs. Whether you're updating a single room or completing an entire home renovation, we are here to guide you through every step of the process.
Our Window Treatment Services Include:
Custom Window Blinds: From wood and faux wood to aluminum and vertical blinds, we offer a wide variety of options to fit any room’s style.
Drapery and Curtains: Add elegance and softness to your home with custom drapery solutions that elevate your space.
Shades and Shutters: We offer energy-efficient shades and custom shutters that provide both beauty and practicality.
Motorized Blinds: For ultimate convenience, our motorized window treatments allow you to control your blinds with a remote, smartphone, or even voice commands.
Consultation and Design: Our team of window treatment professionals in Cypress works closely with you to select the perfect window coverings based on your style preferences and functional needs.
With our extensive experience and in-depth knowledge of the latest trends in window treatments, we’re confident that we can create the perfect solutions to enhance the aesthetic and functionality of your home.
Cypress TX Home Improvement: Enhancing Your Space with Window Treatments
At Shady Business Cypress, we understand that home improvement is about more than just updating your kitchen or bathroom. Enhancing your windows is one of the easiest ways to elevate the style of your entire home, and our expert team is here to guide you through every step of the process. We provide high-quality window treatments that complement your home’s design and contribute to its overall functionality.
Why Window Treatments are Essential for Home Improvement:
Increased Curb Appeal: Custom window treatments instantly improve your home’s appearance, giving both the interior and exterior a polished, cohesive look.
Light Control and Privacy: Our window treatments are designed to give you complete control over the amount of natural light entering your home and to enhance your privacy.
Energy Efficiency: Many of our window treatments, such as cellular shades and energy-efficient blinds, help regulate the temperature inside your home, keeping it cooler in summer and warmer in winter, and ultimately saving you on energy bills.
Home Value: Quality window treatments can boost your home’s value, making them an investment in both style and functionality.
Transform Your Home with Shady Business Cypress
If you're ready to take your Cypress TX home improvement to the next level, Shady Business Cypress is here to help. Our team of window treatment professionals in Cypress is dedicated to offering high-quality, customized window coverings that perfectly suit your space and needs.
Why Work With Us?
Expert Consultation: Our experienced professionals guide you through the selection process, ensuring you choose the best window treatments for your home.
Customization: We offer custom window treatments tailored to your exact specifications, ensuring a perfect fit for every window in your home.
Professional Installation: Our team handles all aspects of installation, ensuring your window treatments are mounted securely and work flawlessly.
Long-Lasting Results: We use only the highest quality materials to ensure that your window treatments look beautiful and function perfectly for years to come.
Contact Shady Business Cypress Today!
Whether you're looking to update a single room or embark on a full Cypress TX home improvement project, Shady Business Cypress is the ideal partner for your window treatment needs. Our team of window treatment professionals in Cypress is here to help transform your space with custom-designed window coverings that suit your style and needs.
Call us today at +1 (346) 660-5424 or visit us at our Houston, Texas location to schedule a consultation. Let Shady Business Cypress help you bring your home improvement vision to life with the perfect window treatments!
2 -
Alpha Security Services: Expert Video Surveillance and Event Security in Hamilton, ON
At Alpha Security Services, we specialize in providing state-of-the-art video surveillance in Hamilton and reliable event security in Hamilton to ensure the safety and protection of your property, business, or event. Located at 279 Kenilworth Ave N, Hamilton, ON L8H 4S8, we are committed to delivering tailored security solutions that meet the unique needs of each client, whether you need advanced surveillance systems or professional security for your next big event.
With a focus on safety, security, and peace of mind, our services are designed to help you prevent potential risks, protect your assets, and ensure the smooth execution of events of all sizes.
Why Choose Alpha Security Services?
Alpha Security Services offers comprehensive security solutions for both video surveillance in Hamilton and event security in Hamilton. Here’s why we’re the right choice for you:
Advanced Video Surveillance Systems: Our video surveillance solutions use the latest technology to monitor and record activities on your property. From CCTV cameras to motion detectors, we provide customized surveillance setups to keep an eye on your premises 24/7.
Professional Event Security: Whether you’re hosting a corporate gathering, concert, wedding, or community event, we offer event security in Hamilton that guarantees your event runs smoothly and safely. Our security team is trained in crowd control, emergency response, and conflict resolution, ensuring everyone enjoys the event without worry.
Tailored Security Solutions: We recognize that every property and event is unique. Our team works closely with you to design a security plan that fits your specific requirements, ensuring that every aspect of your security is covered, from surveillance to on-the-ground support.
24/7 Monitoring: With our video surveillance in Hamilton, you can enjoy peace of mind knowing that your property is continuously monitored, even when you’re not around. Our advanced systems allow for real-time monitoring and immediate alerts if any unusual activity is detected.
Experienced and Trained Professionals: From our security guard team to our video surveillance experts, our personnel are highly trained and have the expertise to address a wide range of security challenges. You can trust that your property and event will be handled by professionals.
Video Surveillance in Hamilton: Protecting What Matters Most
Video surveillance in Hamilton is one of the most effective ways to protect your property, prevent crime, and provide evidence in case of incidents. At Alpha Security Services, we offer tailored video surveillance solutions to meet the specific needs of your home, business, or property. Here’s how our surveillance services work:
CCTV Camera Installation: We install high-quality CCTV cameras around your property to monitor activities in real time. These cameras provide clear video footage that can be reviewed at any time, acting as a deterrent against criminal behavior.
24/7 Remote Monitoring: Our video surveillance systems can be accessed remotely, allowing you to monitor your property from anywhere at any time. With 24/7 access, you can be confident that your premises are being constantly monitored.
Motion Detection and Alerts: We incorporate motion detection sensors into our surveillance systems, so you’ll receive immediate alerts if suspicious movement is detected. This early warning system helps prevent break-ins, vandalism, or other threats.
Recorded Footage for Evidence: In the event of an incident, our systems provide recorded footage that can be used as evidence for investigations. Whether it’s a theft, accident, or dispute, our surveillance systems ensure that you have a clear record of events.
Customized Solutions: Every property is different, and we tailor our surveillance systems to your specific needs. Whether you need cameras for a small office or a full-fledged security system for a large facility, we design solutions that meet your budget and security goals.
Event Security in Hamilton: Ensuring Safety and Smooth Operations
When it comes to event security in Hamilton, ensuring the safety of your guests, staff, and property is crucial. At Alpha Security Services, we provide professional security for events of all sizes, from private parties and weddings to large corporate events and festivals. Our team is experienced in managing crowd control, handling emergencies, and ensuring a safe environment for everyone. Here’s how our event security services can help:
Crowd Control and Access Management: Our trained security staff ensures that the crowd remains orderly and that access to restricted areas is managed. We help prevent unauthorized entry, making sure only invited guests or attendees have access to certain parts of the event.
1 -
In a time when truth is often buried behind screens and secrets, these cyberpunk programmers are true digital vigilantes. I reached out with deep suspicions about my partner’s late-night texts and constant phone guarding. Within days, they exposed everything — from hidden messages to secret apps I never knew existed. They used advanced phone cloning techniques and remote access tools to show me exactly what was going on. It wasn’t just about catching a cheater; it was about reclaiming my peace of mind.
Beyond personal investigations, their skills extend into parental control and child safety.
These programmers operate with professionalism, efficiency, and a futuristic edge. It felt like something out of a sci-fi film — but real, and incredibly effective. They're not just tech experts; they’re digital detectives with a mission to uncover truth and protect clients.
Highly recommend if you’re dealing with cheating suspicions, phone security breaches, or simply want to ensure your loved ones are safe. Discreet, reliable, and incredibly effective. Just reach them at cyberpunkprogrammersDOTcom2 -
GET THE BEST HACKING SERVICE‼️ contact -: hackrontech gmail com, They are group of talented hackers who have been Hacking in secret for almost a decade now. Here Are List Of Hacking Services We Offer-: ▪️Phone Hacking & Cloning ▪️ m ail Hakcing ▪️Soc -; ial Me (dia) recovery (Facebook, Instagram e.t.c) ▪️Computer Hacking ▪️Deleted Files & Documents Recovery ▪️Breach Detection ▪️Website Hacking ▪️Tracking using GPS and Spyware ▪️Deleted Mails and Text messages Recovery OTHER SPECIAL HACKING SERVICES ▪️Binary Option Recovery ▪️Scam Money Recovery ▪️Bitcoin Multiplication ▪️Change Of Grades In Universities/Colleges ▪️Phone Calls Monitoring ▪️And lots more... For more enquiry, reachout via: hackrontech gmail com All Right Reserved.
I recommend professional expert Email: hackrontech @gmail com for Recovery Funds/ Cryptocurrency/ Recovery of Stolen Bitcoin / Bitcoin Mining/ Increase of Credit score/ MOBILE SPY REMOTE CONTROL ACCESS AUTHORIZATION. Removing Bad Records from Both Public and Private database.
-
ADVANCED HOTEL IPTV SOLUTIONS IN UAE
In the competitive hospitality industry of Dubai and the broader UAE, enhancing guest experiences is paramount. One effective way hotels achieve this is by implementing advanced Hotel IPTV system. These systems not only elevate in-room entertainment but also streamline operations and open new revenue streams.
Understanding Hotel IPTV Systems
Hotel IPTV UAE (Internet Protocol Television) delivers television content over the internet, replacing traditional cable or satellite methods. This technology enables hotels to offer a vast array of TV channels, on-demand content, and interactive services directly to guest rooms. By adopting an IPTV system for hotel, establishments can provide a modern, personalized entertainment experience that meets the expectations of today's tech-savvy travellers.
Benefits of Implementing Hotel IPTV Solutions
1. Enhanced Guest Experience: Hotel IPTV Dubai systems allow guests to access a wide range of television channels and on-demand content. Interactive features such as room service ordering, spa reservations, and local attraction information can be integrated, making the stay more convenient and enjoyable.
2. Personalization and Branding: Hotels can customize the IPTV for hotel interface to reflect their brand identity, displaying personalized welcome messages and tailored content. This not only reinforces branding but also creates a unique and memorable experience for guests.
3. Operational Efficiency: Integrating the IPTV Hotel system with property management systems (PMS) and room controls streamlines operations. Guests can easily access various services, and hotel staff can manage requests more efficiently, leading to improved service delivery.
4. Multilingual Support: Catering to an international clientele, IPTV systems for hotels can support multiple languages, ensuring that guests can navigate the system and access content in their preferred language, thereby enhancing comfort and satisfaction.
5. Revenue Generation: Hotel IPTV solutions offer opportunities for additional revenue through targeted advertising and promotions. Hotels can showcase their amenities, special offers, and local attractions, encouraging guests to utilize on-site services and explore paid content options.
Leading IPTV Solutions for Hotels
In Dubai and the UAE, several reputable IPTV solutions are available for hotels:
• LG Pro:Centric: A comprehensive IPTV platform designed for the hospitality industry, offering interactive services, personalized experiences, and centralized management features. It enables hotels to customize the user interface, offer targeted content and promotions, and integrate seamlessly with various hotel systems.
• Samsung LYNK REACH: Another popular IPTV solution for hotel, providing a range of features tailored to the hospitality sector. It integrates with hotel management systems, offers interactive program guides, personalized welcome messages, targeted content delivery, and remote management capabilities, facilitating efficient system control by hotel staff.
Choosing the Right IPTV Provider
Selecting an experienced and reliable IPTV provider is crucial for successful implementation. Providers like AL IMTEDAD specialize in offering top-tier IPTV system for hotels in Dubai and across the UAE. Their customized solutions feature personalized welcome messages and user interfaces, enhancing the guest experience and improving operational efficiency. By partnering with leading technology brands and offering comprehensive support, they ensure a seamless and advanced television experience for hotel guests.
Conclusion
Implementing a Hotel IPTV system is a strategic move for hotels aiming to enhance guest satisfaction, streamline operations, and increase revenue. By offering personalized, interactive, and high-quality entertainment options, hotels can meet and exceed the expectations of modern travellers, setting themselves apart in the competitive hospitality market of Dubai and the UAE.1

