Proverbs, aphorisms, quotations (English) | by Linux fortune |
curtation, n.: The enforced compression of a string in the fixed-length field environment. The problem of fitting extremely variable-length strings such as names, addresses, and item descriptions into fixed-length records is no trivial matter. Neglect of the subtle art of curtation has probably alienated more people than any other aspect of data processing. You order Mozart's "Don Giovanni" from your record club, and they invoice you $24.95 for MOZ DONG. The witless mapping of the sublime onto the ridiculous! Equally puzzling is the curtation that produces the same eight characters, THE BEST, whether you order "The Best of Wagner", "The Best of Schubert", or "The Best of the Turds". Similarly, wine lovers buying from computerized wineries twirl their glasses, check their delivery notes, and inform their friends, "A rather innocent, possibly overtruncated CAB SAUV 69 TAL." The squeezing of fruit into 10 columns has yielded such memorable obscenities as COX OR PIP. The examples cited are real, and the curtational methodology which produced them is still with us. MOZ DONG n. Curtation of Don Giovanni by Wolfgang Amadeus Mozart and Lorenzo da Ponte, as performed by the computerized billing ensemble of the Internat'l Preview Society, Great Neck (sic), N.Y. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
The new "I Love You" virus is not the work of some snot-nosed acne-laced teenager working from a basement in the Phillipines. It's actually part of a conspiracy concocted by the unholy alliance of Microsoft and several well-known and well-despised spammers. You'll notice that the ILOVEYOU, Melissa, and Tuxissa strains all extract email addresses from the victim's system. This is a gold mine for spammers, who are able to use these viruses to harvest active email addresses for them. Everytime ILOVEYOU, for instance, propogates, it keeps track of all the email addresses it has been sent to, so that when it finally boomerangs back to a spammer, they have a nice convenient list of addresses to send "laser printer toner" and "get rich quick!" advertisements to. -- Bob Smith (not his real code-name), in a speech given at the First Annual Connecticut Conspiracy Convention (ConConCon), "the largest ever gathering of conspiracy theorists east of the Mississippi." | |
World Domination, One CPU Cycle At A Time Forget about searching for alien signals or prime numbers. The real distributed computing application is "Domination@World", a program to advocate Linux and Apache to every website in the world that uses Windows and IIS. The goal of the project is to probe every IP number to determine what kind of platform each Net-connected machine is running. "That's a tall order... we need lots of computers running our Domination@World clients to help probe every nook and cranny of the Net," explained Mr. Zell Litt, the project head. After the probing is complete, the second phase calls for the data to be cross-referenced with the InterNIC whois database. "This way we'll have the names, addresses, and phone numbers for every Windows-using system administrator on the planet," Zell gloated. "That's when the fun begins." The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan for extreme advocacy. As part of LART, each Linux User Group will receive a list of the Windows-using weenies in their region. The LUG will then be able to employ various advocacy techniques, ranging from a soft-sell approach (sending the target a free Linux CD in the mail) all the way to "LARTcon 5" (cracking into their system and forcibly installing Linux). |