Recent Articles

Aug 2006

A Peek Into Our Future

by in Feature Articles on

Ishai Sagi, a fourth-year student at (where else) WTF-U, was in a bit of a bind. It was an early Saturday morning (translation: 1:00 PM) and Ishai had set aside the next forty or so hours to finish up (translation: start) a major assignment for his senior-level programming classes that was due on Monday. The problem was that the code libraries required for the assignment weren't available on the professor's web page as he said they would be.

He called a few of his classmates only to find that they too were unable to "finish up" the assignment. There's nothing surprising with that: I recently read (translation: made up) some statistics showing that 99.86% of students never actually read assignments until the night or weekend before they are due.


A New Type of Formation

by in Feature Articles on

Andreas had a pretty good idea of what he was getting in to. The job posting subtly included the duty of "helping to straighten up the software environment." The technical screening consisted of three questions: what is HTML, what is PHP, and what is SQL. And the interviewer subtly mentioned that the previous programmer was a "great guy, but had a few quirks." Yes, Andreas knew he was walking into a nicely presented system that's more messed-up than a building flattened with a 2-ton bomb ... shortly after being flattened with a 5-ton bomb. But that's OK; it would be a challenge.

Having worked there for over a year, Andreas mentioned that his tenure was a lot like his subscription to The Daily WTF. Each day (weekends and holidays excluded), he'd be introduced to yet another astonishing perversion in Information Technology. Actually, he still works there now, but since he's completely reverse engineered, re-designed, gutted, and re-implemented the system (or, "helped to straighten it up"), he's back to relying on this publication as his source of daily WTF's.


Lock In Key Security

by in Feature Articles on

Noah Nordrum isn't proud of what he's become. He is now, officially, a cracker. I mean, "kr@xx0rs." Err, I think. I don't know. I got that from my "3773 Speek" guide.

As the "computer whiz" of the family, Noah is responsible for solving any technical problem that an aunt, grandparent, or second cousin may have, ranging from "funny symbols in my Word" (Show Formatting turned on) to "blinking 12:00 on the VCR" (don't look at me, I don't know how to fix that). Obviously, he's never heard of my sure-fire way of avoiding the "family tech support" role: just tell your relatives that you work only with mainframes. The kind that takes up an entire room, prints on green-bar paper, and has a whole bunch of blinking lights. Trust me, it works. That's what most people think The Internet looks like.


Back That Thang Up

by in Feature Articles on

It ain't easy being number one, especially for R.B.'s company. With €730 million in annual revenues, they're the leader in a relatively small (€1.6 billion) niche market and are constantly struggling to maintain their dominance amongst a handful of vicious competitors. Recently, an executive at the company came up with an astonishingly brilliant plan that would ensure that they stayed on top for many years to come. This plan was named The Convergence.

The Convergence was, in all seriousness, a really good idea. It represented a completely new way of doing business that relied heavily on technology and its ability to integrate the supply chain with the customer experience. It would do nothing short of revolutionizing their entire industry, leaving their competitors struggling just to stay afloat.


Pop-up Potpourri: Givin' It 120%

by in Pop-up Potpourri on

No, it hasn't been a whole month already, I'm just clearing out a large backlog of submissions.

For many, many more, check out the previous post from the series, Pop-up Potpourri: Announced By God.



The Abstract Candidate

by in Feature Articles on

When I first shared the story of Paula and her Brillant Java Bean, there was a bit of a mixed reaction. Many readers simply couldn't believe it: there's no way that someone like that would ever get hired in the first place. Some of the female readers (3 out of the 7 total, I believe), felt it was a bit sexist: come on, one of the worst programmers ever, and she just happens to be a girl?

Well, let me assure you that, yes, people like that do get hired and, no, only a small percentage of them are women. In fact, not only do people like that get hired, but they're often hired by the best of us. Like Shawn Edwards, for example.


Lord of the Token Rings

by in Feature Articles on

For the longest time now, I've held the belief that best words to describe highly-specialized control software are "ridiculously expensive" and "marginally functioning." Maybe I'm wrong, but this story from Brandon Jones certainly doesn't help change my mind.

Brandon spent some time in the mechanical and maintenance department of a large manufacturing company, working primarily with folks whose job it was to ensure that water processing systems were running. Apparently, in the twenty-five years since the original computer systems were originally installed, some advancements have made in the field of water processing software, and Plant Management wanted to capitalize on these. And who better to setup and install an entirely new control, database, and tracking system than a Fortune 500 company that prides itself on the highly-specialized systems it develops for the military?


Poor Mr. O'Hare

by in Feature Articles on

The Representative Line is one of my favorite ways of presenting a titanic (an adjective chosen for more than its synonymity with "frickin' huge") application. Today's single line of code comes from a large web-based application that John F has come to maintain. Like other Representative Lines, the more you look and analyze it, the more you know about the system and the pain that John and his colleagues go through each day. This line was discovered (actually 23 instances of it) while trying to fix a bug reported by a new user of the system ...


Apply Yourself ... at WTFU

by in Feature Articles on

Don't worry, we won't be returning to WTF University this entire week; just today so that I may share one of Jim Roalef's many experiences in the Student Information Systems department at WTFU. Jim worked for Tom, the full-time Lead Programmer, who lorded it over his student subordinates. Tom believed that, despite only having a solid year of experience outside of his eighteen years at WTFU, he was The Chosen One, responsible for introducing "his students" into the Real World. To give you an idea of Tom's Rule, consider the following.

Ideally, technical debates are resoled when one side provides a comprehensive set of arguments and data that shows that their conclusion/implementation is best. Usually, "real world" time constraints get in the way and the debate ends with, "no, trust me; I've been doing this sort of thing for ten years and have found that this is the best way." In WTFU's Student Information Systems department, all technical discussions are quickly resolved with Tom's famous words: "they pay me a *lot* of money to do this sort of thing; I know what I'm doing."


The Customer-Friendly System

by in Feature Articles on

Every once in a while, some one shares with me the story of an unimaginably convoluted system. A system so complex, so twisted that the mere thought of maintaining it has driven many a men insane. A system so heinous and so evil that the souls it has claimed are outnumbered only by COBOL itself. So, in hopes that its presentation might offer some consolation to John and its other unfortunate victims, I will share with you the story of The Customer-Friendly System.

The Customer-Friendly System, like so many of its kind, was spawned in the bowels of a behemoth corporation at the hand of a giant consulting company. Its purpose was to automate the complex processes required to originate, route, approve, underwrite, and fund various types of business and consumer mortgages. And it was "Customer-Friendly" because the consultants wanted to design it so that "even the most technically unskilled end-user could easily add and modify" its complex workflow modules.


Redirection with Smoke And ... Smoking?

by in Feature Articles on

Jeremy was kind enough to share a "live WTF" with us all. Although I receive a fair number of submissions that point to a publicly accessible website, I rarely link to the site in question. As bad as it is that Mom-And-Pop-Store.com has a "SqlString" parameter on their viewProduct page, I doubt they'd appreciate it when someone went and replaced "SELECT ... WHERE ProductId=43" with "DROP DATABASE". Not that any of you would do that or anything.

Today's example comes straight from Marlboro.com and is best experienced with FireFox. Go ahead. Click it. I'll wait.


Symbolic Installation

by in Feature Articles on

M Mooney works in a fairly standard internal application development environment. His group writes code, packages it up, and sends it off the Infrastructure Group for deployment to the QA servers. Like many organizations, M's group has virtually no access to these servers. If they're lucky, they can use the application as an end-user would. If they're really lucky, they can directly access the server log files.

But all this is fairly standard practice. Today's world, terrorists, Sarbanes-Oxley, corporate espionage, malicious employees, super villains, etc -- you know the spiel. What sets M's story apart is the difficulty his group has with the Infrastructure folks. In M's organization, the Infrastructure Group is a part of the Network Operations Division, which in turn is part of the Technology Assets Unit, which in turn is part of the Internal Assets Department. Basically, what that means is that M has a much easier time exercising his "six degrees" to get in touch with Kevin Bacon than he does using the "official chain of communication" to work with the Infrastructure Group.


Stop Reviewing the Code

by in Feature Articles on

I've decided. My first official act as Chief Executive Officer will be to hire a Yes Man. Think about it: how could there possibly be a better way to receive feedback? I'll come up with some great, big idea and, just before I had a chance to realize how truly brilliant it is, I'll have some one already there, enumerating its pros and pros.

I see that Jimm's program manager has taken a similar approach. At a fairly late stage in the project, he hired Jimm to take on a quality management role so that he would, presumably, remind everyone how great the quality was. But Jimm wasn't content doing that; oh no, he had to go and find bugs, and lots of them.


Enterprise Beautification

by in Feature Articles on

Simon is an unfortunate user victim of a piece of middleware known as the Core Enterprise Foundation. Like many of its kind, the CEF is a .NET-based framework designed to make programmers' lives easier and, most importantly, allow them to write enterprise-class code. The primary way that the CEF accomplishes these goals is by simplifying the data types available to its users.

Programmers familiar with .NET or, really, any other platform, are familiar with "standard" data types: integer, single, double, date-time, string, boolean, and so on. Programmers familiar with the CEF need to know only two: Numbers and Strings. And because no one in the real world uses "decimal" numbers, the CEF further simplifies this by using only integer numbers.


Pop-up Potpourri: Announced By God

by in Pop-up Potpourri on

For many more, check out the previous post from the series, Pop-up Potpourri: Julialicious


Steven Reitsma must not have heard. For those who missed it: a few weeks ago, God endorsed Symantec's latest anti-popup software.


Flossin' My Threads

by in Feature Articles on

Everyone knows that, when it comes down to it, it's all about the threads. Now, most coders ... they only use a single thread. Heck, some probably don't even realize that they're even codin' on a thread. All they know is that they write code, the computer runs it, and that's that. But the true, hard-core, and if I may say, gangsta' coders ... *they* go multi-threaded.

Brian K is a Senior Software Engineer which, I believe, makes him a gangsta' coder. A few years ago, he joined one of the larger security system companies to help them complete their latest and greatest security system. They were behind schedule, primarily with the Security Messaging Engine, which was the subsystem responsible for routing and distributing massive quantities of data from keycard usage, proximity sensors, and a whole host of other software and hardware.


Annual About Security

by in Feature Articles on

I'm sure we've all heard an old-timer gruff "burglar alarm system? pmmfff! When I was a kid, we left all of our windows and doors open, and the only burglar alarm we needed was a Labrador; and we were all fine!" Yeah, yeah, whatever you say, old man.

What I don’t think many of us realize is that *we* will eventually become that old fogey. Except, it won't be with burglar alarms: "eight-factor biometric synchronous quantum authentication? Pmmff! When I was a kid, all we needed to know was where the power button is and what side to boot the floppy to; and we were all fine!"


The Juniors' Whopper

by in Feature Articles on

A long time ago in a paradigm far, far away, a sage by the name of Fred Brooks proclaimed that a good programmer is ten times as productive as a not-so-good programmer. And then, things were Good; Believers knew the Word of Brooks and followed It.

As the eons came to pass, some began to question the Word of Brooks. These Nonbelievers said that it is impossible for one person to be ten times as productive as another, especially with all that is known about the Agile Method and the new Visual Tools. One of the Nonbelievers, Willem Vermeer's company, went so far as to try to disprove the Word of Brooks: they set out to build a new application with a project team staffed only with ten junior-level programmers.


The Italian Job

by in Feature Articles on

One early Monday morning, Francesco awoke to the sound of his alarm and, instead of slamming the snooze button down, he eagerly jumped out of bed. What else could he do on such a beautiful day? The sky was clear, the sun was shining, the birds were chirping, and he had day three of a brand new job to look forward to.

Having read so many new job horror stories here, I'm sure that most of us would approach the third day cautiously. Not Francesco, though. He did read the stories, but he made sure that he would be staying far away from The Legacy System long before he accepted the offer. His role was to work exclusively on the new C# / SQL Server 2005 system.


Abyssmal Support

by in Feature Articles on

We're mostly developers here, but I'd wager that plenty of you started your careers in tech support.  Personally, at my first IT job I was responsible for reimaging hard drives, as well as, uh... actually, I guess that's it.  I'd always find disgusting stuff on the PCs I'd clean, including a gem of an ad with a woman inviting the user to (I'm phrasing this as nicely as I can) "**** her **** and *** in her *****," as the user is a "nasty *******."

Speaking of nasty *******s, the large multinational tech support corporation that Doly G. works for has a unique structure.  Front line support goes to one company, and second line support another.  Third-line support is where things get interesting.  Behold!


It Works on Any Platform! We Didn't Even Have to Test it!

by in Feature Articles on

Gabe shares his story of an enterprise application that his friend's company had recently purchased.

Initech sells products that use Oracle by default, but also seamlessly support SQL Server.  Typically, getting software to work on two database platforms requires a lot of work, testing, and rework.  Initech, though, had an ace up their sleeve.  Several aces, in fact:

  • To support SQL Server, users must purchase Oracle Transparent Gateway for SQL Server (around $15,000 per computer)
  • Users must purchase an Oracle license (around $infinity)
  • Users will probably need duplicate servers for fault tolerance, which could run up to $100,000 plus support costs
  • They don't even have to test it before announcing it works!  I mean, if Oracle Transparent Gateway says it works, it works, right?

The Sky is Falling!

by in Feature Articles on

Today's WTF is from Darren S., who reminds us of the complexity of source control software.

A few years back, I worked at a large consulting company.  I was in a small dev team, and some of my colleagues were, erm, less than stellar.  One day, one of them came running into my cube (yes, that kind of company), waving her hands around and screaming in a "sky-is-falling" voice, "The SourceSafe repository's corrupted!  All the filenames are wrong!"


No matter how bad your situation, someone has it worse.

by in Feature Articles on

Take Martin D. for example.  He brings us a tale of woe about a utility called Rv_133 that sets environment variables on a database server (running Oracle 5, which I've heard Alex was a big fan of), which he describes as being loosely similar to regedit.

One day, he ran a function that displays all possible variables that can be changed.  He was curious as to where the data came from, so logically he started in the database.  Finding nothing significant, he traced the code back and found this in a 7,300 line file: