Warning: The language is spicy in this one

So this story goes back to the start of my career in web design, before I knew the difference between a good client and a bad client.

So it all started with getting a new job. The company itself was well reviewed, they worked with some pretty major clientele and everything seemed good. The main boss had an interesting past in web design, starting in the porn industry and moving later into mainstream design.

His first task was asking me to create a new web design for their site, so off to work I went designing what I thought at the time was a good design.

The later that day, I send him the design and he replied shortly after.

Client: Hmm… I don’t fucking like this at all. tell you what, look at site X. I like X, use it for inspiration.

So later that day I got to work, building a new site using the elements of that design, style, font etc. I use enough design so it looked visually similar but also completely unique.

Client: I still don’t fucking like this. I like X, make it look like X.

The next day I went in confused, still not sure what he wanted. I got to work and this time, I made the design very close, used a very similar design, but I tried to make it different enough to avoid plagiarism. 

Client: Look, I want fucking X. All you need to do is go onto their site, nick all their fucking code and all the fucking images, and put the logo on it. Like you see that image here on X? I got a folder on the server full of this shit! I just fucking nick all the designs and code, pop a logo over the other logos, and resell it. Everyone does it!

No surprise, I quit immediately after.

via Clients From Hell
Warning: The language is spicy in this one

Did Liberal SCOTUS Justices Just Box Themselves Into Taking a Gun Case?

 

supreme-290

By Ripcord

Today’s ruling by SCOTUS on same sex marriage has the left jumping for joy and many on the right disparaging the Court. People of the gun should take solace in today’s ruling. Today, all 50 states must … Read More

The post Did Liberal SCOTUS Justices Just Box Themselves Into Taking a Gun Case? appeared first on The Truth About Guns.

via The Truth About Guns
Did Liberal SCOTUS Justices Just Box Themselves Into Taking a Gun Case?

Leaked Damage Assessment Shows Government Mostly Interested In Investigating Leakers, Withholding Information From Public

The Intercept has just released an interesting document from its Snowden stash: an unredacted damage assessment of the New York Times’ 2005 exposure of the NSA’s warrantless wiretapping program — a program that saw the agency monitoring the emails and phone calls of US citizens.

It’s not that the government hasn’t made damage assessments public before. It just does it very, very rarely and mostly for self-serving reasons. The most recent publications of damage assessments were in response to the Snowden leaks. The released assessments were heavily-redacted and made plenty of unfounded assertions about the damage done to the national security infrastructure by the leaks.

This 2005 damage assessment was never released. It was purely an internal document. Thanks to it being part of Snowden’s package of leaked documents, it can be read without the sort of excessive redaction the government deploys when discussing even the most inane (or obvious) aspects of national security.

Such was the internal distress at the possible exposure of this surveillance program that the government managed to delay its publication for a year. Despite its successful pushback, the assessment here is no different that the assessment of the Snowden leaks. In other words, mostly speculation backed by very little support.

The memo gives a general explanation of what terrorists might do in reaction to the information revealed. It was “likely” that terrorists would stop using phones in favor of mail or courier, and use encryption and code words. They could also plant false information, knowing the U.S. government was listening. But the leaked program had not “been noted in adversary communications,” according to the memo. It gave no specific examples of investigations or targets that had or might be impacted by the revelations.

Once you get past the obvious suggestion that terrorists will adapt communication methods in light of presumably-unknown information, you get to more detailed discussion of the NYT article itself. The assessment breaks down every statement of fact in the article and provides its corresponding level of classification.

(TS//SI//STLW//NF//OC) "President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity."

(TS//SI//STL WIINF//OC) (NSA) "monitored the international telephone calls (communications to the U.S.) and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years … to track possible "dirty numbers" linked to Al Qaeda…"

(TS//SI//STLW//NF//OC) "NSA eavesdrops (under this program) without warrants on up to 500 people in the United States at any given time." … the number monitored … may have reached … the thousands"

(S//SI) "Overseas, about 5,000 to 7,000 people suspected of terrorist ties are monitored (by NSA) at one time."

Oddly, the government considers the most obvious possible outcome of the exposure of this program (that terrorists would alter communications in light of this info) to be "classified."

(C) (The article) would alert would-be terrorists (inside the United States) that they might be under scrutiny.

If there was a battle for American hearts and minds to be fought in the wake of this publication, you’d think the agency would want this conclusion made public (preferably with some supporting evidence), rather than bury it with other classified documents.

Nearly a decade down the road, the government has yet to offer any solid proof that the New York Times’ article resulted in compromised capabilities or surveillance programs.

“To this day we’ve never seen any evidence — despite all the claims they made to keep us from publishing — that it did any tangible damage to national security. This is further confirmation of that,” [New York Times writer Eric] Lichtblau told The Intercept.

In fact, the only clear response to the publication of this leaked info didn’t take the form of altered collection techniques or additional terrorist attacks. It took the form of a full-blown DOJ investigation, involving 25 FBI agents and five prosecutors. This too, resulted in a whole lot of nothing.

The leak and the response to it indicates the government was more worried about US citizens, rather than its foreign adversaries, finding out about what it was up to.

Permalink | Comments | Email This Story




via Techdirt.
Leaked Damage Assessment Shows Government Mostly Interested In Investigating Leakers, Withholding Information From Public

Efficient Use of Indexes in MySQL

The slides of “Efficient Use of Indexes in MySQL” talk we delivered on SFMySQL Meetup.
This is an introductory talk for developers on MySQL indexes. In my opinion it’s quite important to understand how InnoDB organizes data. If you know how MySQL accesses data it’s easier to write optimal queries.
When working with queries I imagine secondary indexes as a table with records sorted by secondary key fields. This is a powerful concept that helps to understand MySQL logic. It’s also easy to understand complex optimizations like loose index scan.
For example, for index (last_name, rank) the secondary index table looks like:
Enjoy the slides!
The post Efficient Use of Indexes in MySQL appeared first on Backup and Data Recovery for MySQL.
via Planet MySQL
Efficient Use of Indexes in MySQL

BearCam Is Back and It’s Beary, Beary Nice

It’s officially summer, which means the salmon are running in Alaska’s Katami National Park which means the local brown bears are poking around there to eat them which means the BearCam is back up for the season. I just watched for like three minutes and I saw a bear!

See?!

BearCam Is Back and It's Beary, Beary Nice

If the hot bear action is not enough, you can switch to the underwater cam and watch for poor, unsuspecting migrating salmon. (They’re harder to see, but they’re there, see ‘em?)

BearCam Is Back and It's Beary, Beary Nice

If you see a bear you particularly want to remember, you can use the webcam’s tool to take photo. A higher quality image is immediately snapped and shared to the social media outlet of choice. Although after I took this photo of my new friend I didn’t really want to share it with anyone, since it felt like such a special moment.

BearCam Is Back and It's Beary, Beary Nice

I mean, it’s no Condor Cam, but it’ll do nicely for the summer.

[Bears]

via Gizmodo
BearCam Is Back and It’s Beary, Beary Nice

Silly video imagines if crocodiles could shoot lasers at other animals

Silly video imagines if crocodiles could shoot lasers at other animals

The original footage of this battle between bats and crocodiles is already insane, as the crocs lurk in the water and chomp at the flying bats. But adding lasers to the crocs and fire bombs to the bats makes it even crazier. The warfare is like imagining a future where animals could use weapons.

You can peep the original footage from the BBC here. Blackhawk put together the edited version which is so silly it’s awesome.


SPLOID is delicious brain candy. Follow us on Facebook, Twitter, and YouTube.

via Gizmodo
Silly video imagines if crocodiles could shoot lasers at other animals

For the brave: compiling Workbench 6.3 using Visual Studio 2013 on Windows

Compiling MySQL Workbench yourself is quite a common task for Linux users, even though the application is available precompiled for certain platforms ready from our download page and available in our yum and apt repositories. In this blog post we show you how to compile it on Windows.
Introduction
Doing a build on Windows is a totally different matter and most users never need to do that. It’s mostly intersting for those wanting own functionality or just being curious. But you should be an experienced Visual Studio user. It’s a complicated task and not a good start for a beginner. The key problem when building on Windows is that we cannot ship any 3rd party library we used. Instead you have to collect them all yourself. In order to ease that task we created the list below. Each library comes with a version number which usually specifies the minimum version to be used. Most of the time it’s not mandatory to use the exact same version, but it helps minimizing trouble if you do. To build and link you need the library’s header files, a dynamic library (.DLL) and the linker library (.lib). There are a few libraries that are static and you may have to build some on your own. You’ve been warned.
After you have downloaded the MySQL Workbench source zip you have to unzip it into a work folder of your choice and name it e.g. “workbench”. In the same work folder where you extracted the source files, create another folder named “mysql-win-res”. This name is mandatory as that is what we used in the VS solution. The build requires a specific folder structure for mysql-win-res (also because of the paths set in the Visual Studio solution). Here’s a picture showing the required folder structure:
Picture 1
All 4 top level dirs are needed. What to put there is mentioned in detail below. Also have a look at the PrepareOutputDir.cmd file in the WB source folder. This is called by VS on successfull build of the main project and copies a lot of dependency stuff to the target folder (under “bin/x64/release”). This batch file will help you to find missing resources if you have trouble starting MySQL Workbench.
Build Preparations
The MySQL Workbench solution (iworkbench/MySQLWorkbench.sln) contains several build targets and architectures. In this blog we only focus on the 64bit release build. After you opened MySqlWorkbench.sln solution you have to set the configuration and platform in Visual Studio. You can do this using the combo box on the standard toolbar (Picture 2) or using Configuration Manager (Menu->Build->Configuration Manager, Picture 3).
Picture 2
Picture 3
Now it is time to fill the mysql-win-res folder with all dependencies. You should be able find precompiled binaries for most of them on the Internet. If not then it’s up to you to create it.
Depedencies needed for compiling and starting Workbench
boost v1.55.0
 download boost from http://www.boost.org
copy everything from boost include folder into your mysql-win-res/include/boost folder
python v2.7.6
download python from (http://ift.tt/1J4dWyX)
copy header files from python-2.7.6/include into mysql-win-res/iinclude/python folder
copy everything form from python-2.7.6/lib into mysql-win-res/lib/python folder
place python27.lib and python27.dll into mysql-win-res/lib/x64/python/release
place python.exe into mysql-win-res/redist-bin/x64/release
cairo v1.8.8
download from http://ift.tt/PUgmDp
copy header files from cairo-1.8.8/src into mysql-win-res/iinclude/cairo folder
place libcairo.lib and libcairo.dll into mysql-win-res/lib/x64/cairo
Connector/C++ v1.1.4
download zip archive from http://ift.tt/1IJFYzC
extrac and copy header files from mysql-connector/include foolder into mysql-win-res/include/cppcon
place mysqlcppconn.lib and mysqlcppconn.dll into mysql-win-res/lib/x64/mysqlcppconn/release
CTemplate v0.8
download and compile from  http://ift.tt/pAcict
copy header files from ctemplate/windows/ctemplate into mysql-win-res/include/ctemplate folder
place libctemplate.lib and libctemplate.dll into mysql-win-res/lib/x64/ctemplate/release
Geospatial Data Abstraction Library/OpenGIS Simple Features Reference Implementation, v1.9.2
download win package from http://www.gdal.org/
copy header files  from gdal/core, gdal/ogr, gdal/port, gdal/alg into mysql-win-res/iinclude/gdal folder
place bin/gdal.dll and bin/gdal.lib and into mysql-win-res/lib/x64/gdal
place gdal/apps/ogrinfo.exe and gdal/apps/ogr2ogr.exe into mysql-win-res/lib/x64/gdal
HtmlRenderer (System.Drawing.Html) v1.4.6
download from http://ift.tt/1IdnlWc
place HtmlRenderer.dll and .lib into mysql-win-res/lib folder direct
GLib v2.34.3
download from http://www.gtk.org
copy header files into mysql-win-res/include/glib folder
place dll and lib’s into mysql-win-res/lib/x64/glib zlib/libpng v1.5.14
download from http://ift.tt/1J4dXTk
copy header files from libpng root folder into mysql-win-res/include/libpng folder
 place libpng.dll and libpng.lib into mysql-win-res/lib/x64/libpng Libxml2 v2.9.1
download from http://xmlsoft.org
copy header files from libxml/include/libxml into mysql-win-res/include/libxml folder
place libxml2.dll and libxml2.lib into mysql-win-res/lib/x64/libxml
Libconv v1.14
download from http://ift.tt/1IdnnNQ
copy header files from libiconv-1.14/include into mysql-win-res/include/libxml folder
place libiconv.dll and libiconv.lib into mysql-win-res/lib/x64/libxml
Libzip v0.11.2
download from http://ift.tt/1IdnnNS
copy header files from libzip/lib into mysql-win-res/include/libzip folder
place libzip.dll and libzip.lib into mysql-win-res/lib/x64/libzip/release Connector/C v6.1
download connector C from http://ift.tt/ZYNU9t
copy header files from mysql-connector-c/include into mysql-win-res/include/mysql folder
place libmysql.dll and libmysql.lib into mysql-win-res/lib/x64/mysql/release PCRE (Perl Compatible Regular Expressions) Library v7.5
download package from http://www.pcre.org/
copy header filesfrom pcre-7.5 root folder into mysql-win-res/include/pcre folder
place pcre.dll and pcre.lib into mysql-win-res/lib/pcre/release Scintilla v3.3.6
download from http://ift.tt/1J4dXTu
copy header files from scintilla/include and scintilla/lexlib into mysql-win-res/include/scintilla folder
SQLite v3.8.3
download package from http://sqlite.org/
copy header file sqlite3.h into mysql-win-res/include/sqlite folder
place static sqlite3.dll and sqlite3.lib into mysql-win-res/lib/x64/sqlite/release
TinyXML v2.6.1
download package from http://ift.tt/xSwtwC
copy header files into mysql-win-res/include/tinyxml folder
place tinyxml.lib into mysql-win-res/lib/x64/tinyxml/release
vsqlite++ v0.2.0
download package from http://ift.tt/1J4dXTx
copy header files from vsqlite++-0.2.0/include into mysql-win-res/Include/vsqlite++/sqlite folder
place static vsqlite++.lib into mysql-win-res/lib/x64/vsqlite++/sqlite
 zlib v1.2.5
download and compile from  http://www.zlib.net/
copy header files from zlib-1.2.5 root folder into mysql-win-res/include/zlib folder
place zlib.dll and zlib.lib into mysql-win-res/lib/x64/zlib/release
ANTLR v3.4
download antlr-3.4 from http://www.antlr3.org
create bin folder under mysql-win-res and copy antlr-3.4-complete.jar into
SWIG (version 3.0.2)
download swigwin.zip package from http://www.swig.org
create folder swiglib under mysql-win-res
extrac swig archive and copy everyting from swigwin-3.0.2/lib folder into created mysql-win-res/swiglib folder
place swig.exe into early created mysql-win-res/bin folder
MySQL Server executables
place mysqldump.exe and mysql.exe into mysql-win-res/redist-bin/x64/release. You can find this file in your local MySql server instalation under bin directory
Once this setup is done you can start the build in Visual Studio.
I hope this helps to get your application compile on Windows and if you have any questions you can contact the Workbench team on the #workbench IRC channel.
via Planet MySQL
For the brave: compiling Workbench 6.3 using Visual Studio 2013 on Windows