Alex Papadimoulis

Founder, The Daily WTF

Jun 2008

Silent But Deadly

by in Best of the Sidebar on

From René V...

“Recently, a customer came in who was apparently just as overheated as his computer. When we cracked it open, it was pretty evident that it had something to do with his “quieting modifications. We now recommend better, quieter components.


The Stalled Server Room

by in Feature Articles on

A few months back, Jen Frickell's company was given some bad news. When their lease ended, they'd have to move out of their second-floor suite. The good news, however, was that a suite would be available on the first floor. All they'd need to do was pack up and move downstairs.

It was a fairly reasonable request, so the company's executives signed a new lease and prepared to move. There was, however, just one, small hitch. The nice little server room they built in the back of their office - equipped with air conditioning units, ventilation, dedicated power, backup power, and so on - could not be relocated. Not only would it cost too much, but there was simply no room for it. The server room would just have to remain upstairs.


Announcement: Alex Sells Out!

by in Feature Articles on

As you may have noticed, there are now advertisements on The Daily WTF. Well, technically, I've been running ads here since October of 2004… but I just realized that I never bothered announcing it. So, there you have it dear readers: I have officially sold out.

Normally, the Sell Out announcement goes something like this. I really hate ads. I know you do, too. But my blog takes soooo much time and cost sooo much money, I have no choice but to put up ads. Besides, everyone else is doing it. So technically, it’s them selling out, not me. Please don’t hate me.


It Gets Worse Each Year

by in CodeSOD on

"A while back," Steven Victor wrote, "I was asked to look at an issue where numerical data 'kept getting more and more inaccurate' in newer versions of a software product."

"After some searching, I came across some code that converted an integer into a string representation of the value. It used the common "itoa" function, and since it was pretty run-of-the mill data meant to be interpreted by humans, the string was supposed to a base-ten representation.


The Source Control Shingle

by in Feature Articles on

The year was 1999 and the dot-com boom was going full-throttle. Companies everywhere were focused on building revolutionary applications using nothing but top-shelf hardware and state-of-the-art software tools. Developers everywhere were trying to figure out if they should play more foosball, more air hockey, or sit back down on their Aeron and write more code. Everywhere, that is, except Boise, Idaho. Or at least, Dave's small corner of it.

At Dave's company, developers worked at a solid pace, using reliable tools, for a stable industry. They were sub-sub-contractors on a giant project commissioned by the U.S. Navy to condense naval vessel documentation. Generally speaking, the complete documentation required for a modern warship-from the GPS calibration instructions to the giant 130-millimeter cannon repair guide-is measured in tons. By condensing the documentation into the electronic equivalent, they could not only save tremendous physical space, but they could make it much easier to navigate.


Survival Edition

by in Souvenir Potpourri on

Ever since the first Free Sticker Week ended back in February '07, I've been sending out WTF Stickers to anyone that mailed me a SASE or a small Souvenir. Nothing specific, per the instructions page, "anything will do." Well, here goes anything, yet again! (previous: Random Assortment Transfer).


After reading about the dire lunch situation here at Inedo, Markus Holzer (Germany) sent the Best Souvenir Ever: a lunch survival kit from Germany.


Perfectly Adequate Productivity

by in Feature Articles on

Allen F occasionally feels out of place. As a software developer in a large, scientific research lab, he's one of the few people not running around in a lab coat, mumbling about things like how to stabilize the latest batch of tretonin, or how only an idiot would name it isoprovalyn instead of hydrozapam. In fact, Allen doesn't even get to wear a lab coat.

Despite not being one of the PhD'd researchers, Allen's work is pretty important. He's the one that develops simulation programs that the biologists and chemists use to save countless weeks of research time. Of course, just as Allen is unsure of exactly how the researches use the data his programs generate, the researchers really have no idea what it takes to write the programs.


Please Pay $0.00

by in Error'd on

Terry Solid writes, "I tried to do a direct debit in the amount of $0.00, but the eBay system told me I was an idiot and had to deposit a minimum of $1.00. To add insult to injury, it took a full twenty-five minutes of explanation before the eBay rep realized that there was, in fact, no way for one to transfer $0.00 to unhold my account


A Bit More Dire

by in Feature Articles on

As a junior-level sysadmin at his university, Alcari had gotten used to frantic, middle-of-the-night support calls. Whether it was a mail proxy server freezing up, a replication process getting out of sync, or some application deadlocking, Alcari's solution was almost always the same: reboot the problem server. On a recent 4:00AM emergency call, however, the situation was a bit more dire.

"Ummm," the student working the graveyard shift at the helpdesk started, "I think the network is down. I'm getting calls from everyone, everywhere. Can you, like, check into this. Now?"


HTTP 414: Way Too F#%&ing Long

by in Representative Line on

Most of us web developers will never encounter an HTTP 414 Error. According to the W3C, 414 means:

Request-URI Too Long - The server is refusing to service the request because the Request-URI is longer than the server is willing to interpret. This rare condition is only likely to occur when a client has improperly converted a POST request to a GET request with long query information, when the client has descended into a URI "black hole" of redirection (e.g., a redirected URI prefix that points to a suffix of itself), or when the server is under attack by a client attempting to exploit security holes present in some servers using fixed-length buffers for reading or manipulating the Request-URI.


Do You Believe In Magic... Online

by in Feature Articles on

Originally posted in the Sidebar, "AlpineR" shares this interesting story about Wizards of the Coast's Magic Online 3.0...

You may have heard of a collectible card game called Magic: The Gathering.  It's sold in packs of 15 cards for $4.  Each card represents a creature, artifact, magic spell, or resource.  You choose sixty cards from your collection to build a deck and duel with another player, drawing from your deck to summon creatures and attack your opponent.


Announcement: Get the Mug

by in Feature Articles on

Good news, everyone. The official The Daily WTF mugs have finally arrived! Well, technically, the mugs have been sitting here in my office for months, but the intern who will mail them out has finally arrived! Either way, now's the time to get your own.


IBM Survivor, The High Road, & Find the Function!

by in Tales from the Interview on

IBM Survivor (from Reid Maynard)
In the middle of the dot-com bust, I interviewed at IBM for a contract position. I can't remember exactly what the position was, but I'll never forget the interview.

My first clue that the interview was a bit different the fact that another candidate was waiting in the lobby, and was scheduled for an interview at the same time I was.


Do Not Fold, Spindle, or Mutilate… or Duplicate

by in Feature Articles on

By the 1970's, computers were practically everywhere. They starred on TV, were the brains behind Cold War Doomsday devices, and had even reached “cliché” status in many science fiction circles. Of course, being that they cost upwards of $1,000 – per hour – the computers themselves weren’t everywhere, only their ominous presence. And nothing said “welcome to the computer era” quite like the ubiquitous punch card.

Although punch cards had been used since the 1890’s to store and tabulate data, the 1960’s brought a new, creative use of the medium. The punch card itself – as in, its physical form and its transference from one person to another – became an integral part of the information system process. Since each card could store 80 bytes of data, and writing that data required nothing more than a simple punch machine, “computerized data” could originate anywhere and transfer to whomever, all without the need for an expensive computer.


On a Scale of 1052 to 1057

by in Error'd on

Nick L. was impressed by DO NOT USE's firey, inspired performance in 2 Fast 2 Furious...


There Will Be Some Benefit

by in Best of the Sidebar on

Originally posted to the Sidebar by "ServZero"...

I do a bunch of contract web-development and received this lead in my inbox this morning: