• 0 Posts
  • 33 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle
  • My condolences. And as much as I hate Posit/Workbench, some of that is on your IT department. If I’m reading your comment correctly, you’re having issues because it needs admin privileges to update some things, namely packages. That’s honestly a very simple fix, they just need to grant your user NTFS write permissions to the Rstudio/Workbench install directory locally (and maybe some registry keys, but that’s not definite). That’s it. It’s a 10-second permanent fix and no more UAC prompts for you.



  • What’s nightmarish about the installation? Is it because medical stuff is still on like Win XP?

    Anything more than the most basic bare-bones install of Workbench (formerly Rstudio) quickly turns nightmarish. Try setting it up on a Linux dedicated server with AD auth with auto-mounting of network shares per-user. Posit’s documentation isn’t great (or even agrees with itself across pages) even in the simplest best-case scenario, and if you deploy anything that’s even slightly complicated, it turns into a Hellscape. There’s a good chance you will end up on one of the Posit employees’ blog to read an incomplete explanation of setting up a feature because it’s entirely missing or incomplete in the documentation. This isn’t some crazy off-the-wall edge scenario either, it’s an (allegedly) supported configuration and would be a typical deployment scenario in a multi-user R environment.

    Their support is absolute shit too, it’s truly fucking atrocious. First-level support will not solve your issue, I promise you that, and you won’t get anyone who actually knows WTF they’re talking about until you’re escalated at least twice. And even then, they are very much up their own ass and have a VERY snobby attitude about the product, and always assume that it’s the user at fault, even when you provide absolute 100% proof that it’s their product at fault. It obviously couldn’t possibly be their Super Precious Perfect-in-Every-Way Golden God Product, because as we’ve previously established before, it is a Perfect Product Which Does No Wrong, Ever. They also love to try and shirk responsibility and say that X is not a supported configuration for literally everything, and then claim that the documentation must be wrong when you point out in their documentation that it is.

    Don’t even get me started on the Lovecraftian nightmare that is R package management. It’s even worse than the essay I just typed out, and they want to charge you essentially the entire Workbench license cost x2 to make it usable. Their logging is useless too, it has basically two settings, one of which is essentially “nothing,” and the other is “firehose of bullshit that you need to follow along in their source code to try to find anything useful.” That’s not an exaggeration, I actually had to do that to diagnose an issue and provide proof to them that yeah, it is your half-assed shit product that’s the problem.

    So yeah, if you’re not just Click-Click-Click-Next installing it, it very quickly becomes nightmarish. Posit desperately needs competition in the space, because they’re absolute shit, but they can be absolute shit with impunity since they don’t have any real competition.



  • Before I replace it with something that won’t catastrophically collapse when the wind blows the wrong way, I get some sort of sick satisfaction out of doing autopsies on the house-built-of-matchsticks “solutions” that users come up with and I don’t know why. Some of them are truly fascinating and make you wonder how someone could possibly arrive at that conclusion based on what they were actually try to achieve.

    It’s also why if I’m asked to implement something, my first question isn’t “When does this need to be done?,” it’s “What exactly is the problem you’re trying to solve?”

    What a user asks for and what they actually need very rarely intersect.


  • tool@lemmy.worldtoGreentext@sh.itjust.worksAnon flies air Chad
    link
    fedilink
    English
    arrow-up
    11
    ·
    edit-2
    7 months ago

    I literally cannot tell the difference.

    Source: am manager, and sometimes my underlings don’t toil hard enough in the PowerPoint mines.

    You should mercilessly berate them until morale improves, that’s MBA 101.

    You’re gonna be back in the PowerPoint mines if you don’t fix your soft-hearted attitude.





  • While on the topic, this isn’t how passwords work in systems.

    Passwords are stored as one way hashes. So it’s cryptoed only in one direction, it’s lossy, and can’t be recovered back to the original password.

    When you log on, your cleartext PW is hashed in ephemeral memory/storage and then the cleartext password is thrown away.

    That hash is compared to the hash in the DB. If the hash matches, then you have access. If it doesn’t, then your PW is incorrect.

    Oh my sweet Summer Child. This is definitely how it’s supposed to work, but there are plenty of services that just don’t know what the fuck they’re doing.

    Have you ever been on a site that has a stupid-low character limit for a password? There’s literally no reason to do that, all the hashes are going to end up the same size in the DB anyway regardless of the original string length. Even bcrypt’s max secret character limit is 70-something characters.

    Ever change a password and have it not work on the next login because they’re silently truncating it after a certain character limit? Ever get an email with an actual password in it?

    The only reason you would do things like this is if you’re storing/processing passwords in plaintext and not hashing it client-side first.

    I can think of 3 offenders of this off the top of my head. It’s a lot more common than you’d think.






  • A times B times C equals X… I am jacks something something something

    Narrator: A new car built by my company leaves somewhere traveling at 60 mph. The rear differential locks up. The car crashes and burns with everyone trapped inside. Now, should we initiate a recall? Take the number of vehicles in the field, A, multiply by the probable rate of failure, B, multiply by the average out-of-court settlement, C. A times B times C equals X. If X is less than the cost of a recall, we don’t do one.

    Woman on Plane: Are there a lot of these kinds of accidents?

    Narrator: You wouldn’t believe.

    Woman on Plane: Which car company do you work for?

    Narrator: A major one.


  • tool@lemmy.worldtoProgrammer Humor@programming.devWould you agree?
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    1 year ago

    If Linux was dominant it wouldn’t be Linux. There would be more pressure to monetize and there would always be someone willing to sell out for that money. You can see this even in the Linux community today. I’m sorry I had to be so negative about it though, it sounds nice.

    This is a very Desktop/workstation-centric view of the situation and you’re completely neglecting 3/4ths of the story. Linux is already hilariously dominant on the on-prem server and Cloud side of things. Like, it’s not even close. Pretty much any website you visit, the odds are overwhelming that it’s running Linux. Even Microsoft runs most of the underlying infrastructure for Azure and Github on Linux. Android is the #1 mobile phone platform in the world, which runs on, you guessed it, Linux.

    And it’s already monetized to the gills. Red Hat has multi-billion earnings per quarter, every quarter, and Canonical is almost certainly going to IPO this year.

    It’s already dominant in pretty much every space it touches and it has been for a very long time. Desktop/workstation is pretty much the singular exception to that.





  • Is OpenVPN not just SSL traffic?

    It’s not, it’s an IPSec VPN by default which runs over UDP. You can run it via TCP and it operates over the same port as HTTPS (443), but it’s not the same protocol and can be differentiated that way.

    A way around this would be to run an SSLVPN with a landing page where you log in instead of using an IPSec VPN or a dedicated SSLVPN client.

    Another way around it would be to create a reverse SSH tunnel on a VM/VPC in another country/state and send all your traffic through that.