Logo
It compiles! Ship it!
  • Home
  • Hot
  • Random
  • Search

Browse

  • AI AI
  • AWS AWS
  • Agile Agile
  • Algorithms Algorithms
  • Android Android
  • Apple Apple
  • Backend Backend
  • Bash Bash
  • C++ C++
  • Cloud Cloud
  • Csharp Csharp
  • All Categories

HTTP 418: I'm a teapot

The server identifies as a teapot now and is on a tea break, brb

HTTP 418: I'm a teapot

The server identifies as a teapot now and is on a tea break, brb

Trending Memes

More popular than complaining about meetings that could have been emails

Fun With Flags

Hardware Algorithms Programming
11 hours ago 154.6K views 1 shares
Fun With Flags
Someone took the Norwegian flag and turned it into a digital logic circuit tutorial. Starting with the basic flag (NORWAY), they progressively added logic gates: AND gate (ANDWAY), XOR gate (XORWAY), NAND gate (NANDWAY), XNOR gate (XNORWAY), and finally NOT gate (NOTWAY). It's the kind of dad joke that makes you groan and laugh simultaneously. The puns are terrible, the execution is flawless, and somewhere a computer science professor is definitely adding this to their next lecture on boolean algebra. Norway's tourism board probably didn't see this coming when they designed their flag.

Early Access

Algorithms Programming
15 hours ago 190.7K views 0 shares
Early Access
Kid's already implementing their own sorting algorithm instead of just using the built-in one. First answer? "aelpp" for apple. That's not a typo—that's literally alphabetically sorted characters. They took the word "apple" and sorted each letter individually (a-e-l-p-p) like they're running a char array through a sort function. The teacher wanted them to sort the words by their first letter, but this future developer interpreted the spec literally: "alphabetical order" = sort the characters. The rest of the answers follow the same pattern—"ikmnppu" (pumpkin), "glo" (log), "eirrv" (river). They're treating strings as mutable character arrays and applying a sort operation to each one. This is the kind of literal thinking that makes you either a brilliant compiler designer or someone who spends 3 hours debugging why their code does exactly what they told it to do, not what they wanted it to do. The kid's not wrong—they just solved a different problem with O(n log n) complexity when the teacher wanted O(1) lookup.

Why Is It Always Like This…

Programming MacOS Windows Linux
16 hours ago 185.7K views 0 shares
Why Is It Always Like This…
Desktop: pristine, organized, zen garden of productivity. Downloads folder: a digital landfill where random PDFs go to die next to the Mona Lisa, apparently. The duality of man is nothing compared to the duality of a programmer's file system. You spend hours configuring your IDE, customizing your terminal, and maintaining a clean workspace, but that downloads folder? That's where chaos theory was invented. It's the digital equivalent of shoving everything into the closet before guests arrive. At least the Mona Lisa is in there somewhere, so you're technically cultured.

Swap Like It's 1996

Linux Hardware
23 hours ago 179.2K views 0 shares
Swap Like It's 1996
Back when RAM cost more than your car and you had to mortgage your house for 32MB, swap partitions were basically mandatory survival gear. Now? Just throw a 50GB swap partition on your NVMe and suddenly you're running Chrome with 47 tabs like it's nothing. Meanwhile, people are dropping $200 on 16GB of DDR5 and wondering why their system still feels slow. The swap partition guy is out here living in 2024 with 1996 solutions and honestly? Still works. Can't argue with free.

Do You Want A Print Statement With That Monad

Programming Rust Debugging
21 hours ago 177.2K views 0 shares
Do You Want A Print Statement With That Monad
Functional programmers learning imperative languages: "Wait, I can just... print things? Without wrapping everything in an IO monad? This is amazing!" Imperative programmers learning functional languages: "So you're telling me I need to understand category theory just to debug with console.log? I studied computer science, not mathematics from the 1940s." The beautiful irony here is that the functional dev discovers the joy of side effects and mutable state like a kid in a candy store, while the imperative dev realizes that their trusty println() requires understanding functors, applicatives, and monadic composition. One person's "finally, simplicity!" is another person's existential crisis. Pro tip: If someone starts explaining monads using burrito analogies, just nod and go back to your print statements. You'll be fine.

Begin Private Key

Security Networking Devops Programming
13 hours ago 175.4K views 0 shares
Begin Private Key
Someone just turned Lady Gaga's entire discography into their SSH key. The beauty here is that private keys in PEM format literally start with "-----BEGIN PRIVATE KEY-----" and end with "-----END PRIVATE KEY-----", so naturally, any chaotic celebrity tweet becomes cryptographic gold. What makes this chef's kiss is that Lady Gaga's keyboard smash looks MORE legitimate than most actual private keys. The excessive exclamation marks? Perfect entropy. The random capitalization? Enhanced security through unpredictability. This is basically what happens when performance art meets RSA encryption. Security experts are probably having an aneurysm seeing a "private key" posted publicly with 7,728 likes. But hey, at least it's not someone's actual AWS credentials on GitHub... for the third time this week.

Me, After Carefully Reading Rust's Ownership And Borrow Checker Rules

Rust Programming
22 hours ago 166.1K views 0 shares
Me, After Carefully Reading Rust's Ownership And Borrow Checker Rules
You spend three hours reading the Rust book, watching tutorials, and finally understanding ownership rules. Then you open your IDE and suddenly you're Oprah giving out & references like they're free cars. Everything gets a reference! That variable? Reference. That struct field? Reference. That function parameter you'll use once? Believe it or not, also a reference. The borrow checker still yells at you anyway because apparently you can't have 47 mutable references to the same thing at once. Who knew? (Literally everyone who read the docs, but your brain chose violence instead of comprehension.)

Tech Gadgets (affiliate)

VIVO Desk Converter 32 inch Height Adjustable, MDF Wood Sit to Stand Riser, White, DESK-V000SW
VIVO Desk Converter 32 inch Height Adjustable, ...
VIVO 32 inch Desk Converter, K Series, Height Adjustable Sit to Stand Riser, Dual Monitor and Laptop Workstation with Wide Keyboard Tray, Black, DESK-V000K
VIVO 32 inch Desk Converter, K Series, Height A...
WALI Ultrawide Monitor Arm for 13 to 49 Inch Heavy Duty Curved Screens, Holds 33 Lbs, Adjustable Gas Spring Single Monitor Desk Mount with C-Clamp, Grommet Base, 75x75/100x100 VESA, (GSM001XL), Black
WALI Ultrawide Monitor Arm for 13 to 49 Inch He...

Front End OTP Verification

Frontend Webdev Security Javascript Programming
18 hours ago 161.9K views 0 shares
Front End OTP Verification
Someone named Suresh just committed a cardinal sin of web security. They're comparing the user's OTP input against a hidden field called otp_hidden ... which exists in the DOM... on the client side... where literally anyone can just open DevTools and read it. It's like putting a lock on your door but leaving the key taped to the doorknob with a sticky note that says "SECRET KEY - DO NOT USE". The entire point of OTP verification is that it should be validated server-side against what was actually sent to the user's phone/email. Storing it in a hidden input field defeats the purpose harder than using var in 2024. The red circle highlighting this masterpiece is chef's kiss. This is the kind of code that makes security researchers weep and penetration testers rub their hands together gleefully. Never trust the client, folks.

I Wrote It All Myself

StackOverflow Git Programming
17 hours ago 160.2K views 0 shares
I Wrote It All Myself
Senior devs reviewing PR code like they're meeting a celebrity when it's literally just their own Stack Overflow answer from 2014 wrapped in a different variable name. The rocket and sparkle emojis really capture that moment when you're about to praise some "innovative solution" before realizing you're the one who wrote that exact implementation three years ago on five different projects. Nothing says "I wrote it all myself" quite like Ctrl+C, Ctrl+V, and a strategic rename refactor. The code review process becomes less about catching bugs and more about not accidentally complimenting yourself.

New Monitor Technologies Are Crazy

Hardware Gamedev
11 hours ago 155.9K views 0 shares
New Monitor Technologies Are Crazy
So WOLED uses RGBW subpixels with color filters to create your display, which is perfectly reasonable engineering. But WOLOLOLED? That's just four blue subpixels passing through a "Wololololo Filter" consisting of... dancing wizards? For the uninitiated: "Wololo" is the iconic sound from Age of Empires where priests convert enemy units by chanting, and they literally change color to join your team. So instead of sophisticated color filter technology, WOLOLOLED just converts everything to blue through the power of medieval religious persuasion. The subpixel notation changes from *RGBW to *BBBB because why have color diversity when you can just convert everyone to Team Blue? Honestly, if Samsung or LG announced this at CES with a straight face, half the tech reviewers would probably write articles about it before realizing they'd been pranked. "Revolutionary new conversion-based display technology promises 100% blue accuracy."

We Don't Deploy On Friday

Devops Programming Debugging Backend Cloud
10 hours ago 149.4K views 0 shares
We Don't Deploy On Friday
Friday deployments are the forbidden fruit of software development, and this developer just took a big ol' bite. Cruising along smoothly on a regular day? No problem! But the SECOND you decide to push that "deploy" button on a Friday afternoon, you've basically signed a blood oath to sacrifice your entire weekend to the bug gods. What could possibly go wrong, right? EVERYTHING. Everything can go wrong. Now instead of enjoying your Saturday brunch and Sunday Netflix binge, you're frantically SSH-ing into production servers at 2 AM in your pajamas, wondering why you didn't just wait until Monday like literally every senior dev warned you. The golden rule exists for a reason, folks—your weekend plans are NOT worth testing in production when nobody's around to help you clean up the mess.

The Seven Laws Of Computing

Devops Windows Programming Linux
10 hours ago 146.7K views 0 shares
The Seven Laws Of Computing
Oh, so we're calling it "Seven Laws" when there are EIGHT rules? Already off to a brilliant start. But honestly, this is the most sacred scripture ever written in the tech world. Rules 1-5 are basically just screaming "BACKUP YOUR STUFF OR PERISH" in increasingly desperate ways, like a paranoid sysadmin having a meltdown. Then Rule 6 casually drops the nuclear option: uninstall Windows. Rule 7 follows up with "reinstall Linux" because obviously that's the only logical solution to literally everything. And Rule 8? Turn your egg whites into meringue. Because when your production server crashes at 3 AM and you've lost everything because you ignored Rules 1-5, at least you can stress-bake some pavlova while contemplating your life choices. Honestly, the progression from "make backups" to "become a pastry chef" is the most relatable career trajectory in tech.
Loading more content...

Spotlight

GearScouts.com

Stop scrolling, start exploring! Find the gear that'll get you off the couch and into the wild. Compare power stations for off-grid adventures, flashlights for midnight hikes, and essentials that make the outdoors your playground. Get Outside →

Funny Gift for Programmers Coders Git Commit Pu...

Funny Gift for Programmers Coders Git Commit Pu...
Ad Buy = You get cool stuff + we can finally afford that third monitor for ultimate productivity. 🖥️