• miridius@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    3 days ago

    Most software is a terrible pile of unreadable code with no tests and horrible architecture choices, that somehow manages to keep working just through the power of years of customers finding bugs and complaining loud enough to get them fixed.

    If you write any automated tests at all, you’re already better than most “professional” software companies. If you have a CI/CD pipeline, you’re far ahead.

  • csolisr@hub.azkware.net
    link
    fedilink
    arrow-up
    0
    ·
    6 days ago

    @protein Many things that you’d think would be under lock and key… are not. Credentials for, say, a database of subscribers to a telephone company? Just ask the team and say you’re working on an integration, they’ll happily send you the password in plain text

  • DrPop@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    6 days ago

    The IRS has what is called a first time abatement of penalties. So if this is the first time in a 3 year span you owe you can have the penalties (not interest) waived.

  • nik9000@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    6 days ago

    We knew spooks were all up in the phone network. They’d show up and ask installers to run them some cables and configure ports in a certain way. I was friends with folks who were friends with the installers.

  • rodbiren@midwest.social
    cake
    link
    fedilink
    English
    arrow-up
    0
    ·
    7 days ago

    It just sort of sinks down. You have two ways of manipulation, the cable the camera uses for power and data and the attached rope. Between those two you sort of puppeteer/swim it into place. It actually works out pretty good and some people are real pro at it.

  • philpo@feddit.de
    link
    fedilink
    arrow-up
    0
    ·
    7 days ago

    Emergency Medical Service/Ambulances are a ridiculously low qualified in a fair shair of industrial nations, especially the US,France, or Austria.

    Even in the countries with more training/physician based services (Germany, Belgium, Italy)the actual qualification of the responders varies widely - most of them wouldn’t be allowed to care for a single emergency within a hospital on their own.

  • CaptnNMorgan@reddthat.com
    link
    fedilink
    arrow-up
    0
    ·
    7 days ago

    Dog groomers get almost zero legal repercussions for mistreating dogs. It has to be undeniable that the groomer injured the dog on purpose before anything really happens. That’s why it’s SO important to trust the person grooming your dog if they’re the type of breed that needs it.

  • 3volver@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    7 days ago

    Fractional-reserve banking. Most people have no idea what it is, probably a good thing. You could argue that it’s not a “secret”, but most people aren’t aware of it regardless. I don’t think most people would be fond of grinding for $15 an hour if they knew banks could just lend money they don’t actually have. https://en.wikipedia.org/wiki/Fractional-reserve_banking

  • KillingTimeItself@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    7 days ago

    the oh so well kept secret of the software and services (surrounding it) industry that people seem to think is worth paying money for.

    Yet time after time these paid software companies produce the most vile awful, dysfunctional, and garbage software (and services) that have ever been created. While somehow a group of people who aren’t being paid, and aren’t doing this for any sort of reason other than “why not” manage to create the most functional software ever, while also managing to somehow catch the single biggest potential software vulnerability in this decade (other than wannacry) purely because ssh has slightly sus behaviors when running the infected payload.

    Please stop doing web dev, it isn’t real.

  • Infynis@midwest.social
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    8 days ago

    With the exception of at large buildings in dense city centers, just about everywhere else, utilities enter a building at just some point on the back, out in the open. This includes utilities that feed alarms and security cameras.

    While some places will have systems in place for situations where these outside connections have been severed, like independently operated cameras on an intranet, cellular data backup for alarms, electrical generators, etc., most places don’t, so successfully circumventing their security is just a matter of cutting all the cables on the back of their building at the same time, and then being gone before they notice