DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
systems
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Be warned that typing \fBkillall \fIname\fP may not have the desired
effect on non-Linux systems, especially when done by a privileged user.
(From the killall manual page)
Microsoft Corp., concerned by the growing popularity of the free 32-bit
operating system for Intel systems, Linux, has employed a number of top
programmers from the underground world of virus development. Bill Gates stated
yesterday: "World domination, fast -- it's either us or Linus". Mr. Torvalds
was unavailable for comment ...
(rjm@swift.eng.ox.ac.uk (Robert Manners), in comp.os.linux.setup)
'Mounten' wird fuer drei Dinge benutzt: 'Aufsitzen' auf Pferde, 'einklinken'
von Festplatten in Dateisysteme, und, nun, 'besteigen' beim Sex.
(Christa Keil in a German posting: "Mounting is used for three things:
climbing on a horse, linking in a hard disk unit in data systems, and, well,
mounting during sex".)
Someone was smoking in the computer room and set off the halon systems.
Computer room being moved.  Our systems are down for the weekend.
A large number of installed systems work by fiat.  That is, they work
by being declared to work.
                -- Anatol Holt
A little retrospection shows that although many fine, useful software systems
have been designed by committees and built as part of multipart projects,
those software systems that have excited passionate fans are those that are
the products of one or a few designing minds, great designers.  Consider Unix,
APL, Pascal, Modula, the Smalltalk interface, even Fortran; and contrast them
with Cobol, PL/I, Algol, MVS/370, and MS-DOS.
                -- Fred Brooks
        A novice asked the master: "I perceive that one computer company is
much larger than all others.  It towers above its competition like a giant
among dwarfs.  Any one of its divisions could comprise an entire business.
Why is this so?"
        The master replied, "Why do you ask such foolish questions?  That
company is large because it is so large.  If it only made hardware, nobody
would buy it.  If it only maintained systems, people would treat it like a
servant.  But because it combines all of these things, people think it one
of the gods!  By not seeking to strive, it conquers without effort."
                -- Geoffrey James, "The Tao of Programming"
Computer Science is merely the post-Turing decline in formal systems theory.
Eudaemonic research proceeded with the casual mania peculiar to this part of
the world.  Nude sunbathing on the back deck was combined with phone calls to
Advanced Kinetics in Costa Mesa, American Laser Systems in Goleta, Automation
Industries in Danbury, Connecticut, Arenberg Ultrasonics in Jamaica Plain,
Massachusetts, and Hewlett Packard in Sunnyvale, California, where Norman
Packard's cousin, David, presided as chairman of the board. The trick was to
make these calls at noon, in the hope that out-to-lunch executives would return
them at their own expense.  Eudaemonic Enterprises, for all they knew, might be
a fast-growing computer company branching out of the Silicon Valley.  Sniffing
the possibility of high-volume sales, these executives little suspected that
they were talking on the other end of the line to a naked physicist crazed
over roulette.
                -- Thomas Bass, "The Eudaemonic Pie"
IBM Advanced Systems Group -- a bunch of mindless jerks, who'll be first
against the wall when the revolution comes...
                -- with regrets to D. Adams
**** IMPORTANT ****  ALL USERS PLEASE NOTE ****

Due to a recent systems overload error your recent disk files have been
erased.  Therefore, in accordance with the UNIX Basic Manual, University of
Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised
Federal Communications Act, you are being granted Temporary Disk Space,
valid for three months from this date, subject to the restrictions set forth
in Appendix II of the Federal Communications Handbook (18th edition) as well
as the references mentioned herein.  You may apply for more disk space at any
time.  Disk usage in or above the eighth percentile will secure the removal
of all restrictions and you will immediately receive your permanent disk
space.  Disk usage in the sixth or seventh percentile will not effect the
validity of your temporary disk space, though its expiration date may be
extended for a period of up to three months.  A score in the fifth percentile
or below will result in the withdrawal of your Temporary Disk space.
It appears that PL/I (and its dialects) is, or will be, the most widely
used higher level language for systems programming.
                -- J. Sammet
Making files is easy under the UNIX operating system.  Therefore, users
tend to create numerous files using large amounts of file space.  It has
been said that the only standard thing about all UNIX systems is the
message-of-the-day telling users to clean up their files.
                -- System V.2 administrator's guide
Many companies that have made themselves dependent on [the equipment of a
certain major manufacturer] (and in doing so have sold their soul to the
devil) will collapse under the sheer weight of the unmastered complexity of
their data processing systems.
                -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
MVS Air Lines:
The passengers all gather in the hangar, watching hundreds of technicians
check the flight systems on this immense, luxury aircraft. This plane has at
least 10 engines and seats over 1,000 passengers; bigger models in the fleet
can have more engines than anyone can count and fly even more passengers
than there are on Earth. It is claimed to cost less per passenger mile to
operate these humungous planes than any other aircraft ever built, unless
you personally have to pay for the ticket. All the passengers scramble
aboard, as do the 200 technicians needed to keep it from crashing. The pilot
takes his place up in the glass cockpit. He guns the engines, only to
realise that the plane is too big to get through the hangar doors.
New systems generate new problems.
OS/2 Skyways:
The terminal is almost empty, with only a few prospective passengers milling
about. The announcer says that their flight has just departed, wishes them a
good flight, though there are no planes on the runway. Airline personnel
walk around, apologising profusely to customers in hushed voices, pointing
from time to time to the sleek, powerful jets outside the terminal on the
field. They tell each passenger how good the real flight will be on these
new jets and how much safer it will be than Windows Airlines, but that they
will have to wait a little longer for the technicians to finish the flight
systems. Maybe until mid-1995. Maybe longer.
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the remaining
errors by providing for recovery from them.  An interesting footnote to this
design is that now a system failure can usually be considered to be the
result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.
                -- A.L. Scherr, "Functional Structure of IBM Virtual Storage
                   Operating Systems, Part II: OS/VS-2 Concepts and
                   Philosophies," IBM Systems Journal, Vol. 12, No. 4.
Real computer scientists don't write code.  They occasionally tinker with
`programming systems', but those are so high level that they hardly count
(and rarely count accurately; precision is for applications).
Real software engineers don't like the idea of some inexplicable and
greasy hardware several aisles away that may stop working at any
moment.  They have a great distrust of hardware people, and wish that
systems could be virtual at *___all* levels.  They would like personal
computers (you know no one's going to trip over something and kill your
DFA in mid-transit), except that they need 8 megabytes to run their
Correctness Verification Aid packages.
Seems a computer engineer, a systems analyst, and a programmer were
driving down a mountain when the brakes gave out.  They screamed down the
mountain, gaining speed, but finally managed to grind to a halt, more by
luck than anything else, just inches from a thousand foot drop to jagged
rocks.  They all got out of the car:
        The computer engineer said, "I think I can fix it."
        The systems analyst said, "No, no, I think we should take it
into town and have a specialist look at it."
        The programmer said, "OK, but first I think we should get back
in and see if it does it again."
Systems have sub-systems and sub-systems have sub-systems and so on ad
infinitum -- which is why we're always starting over.
                -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
Systems programmers are the high priests of a low cult.
                -- R.S. Barton
The algorithm for finding the longest path in a graph is NP-complete.
For you systems people, that means it's *real slow*.
                -- Bart Miller
The misnaming of fields of study is so common as to lead to what might be
general systems laws.  For example, Frank Harary once suggested the law that
any field that had the word "science" in its name was guaranteed thereby
not to be a science.  He would cite as examples Military Science, Library
Science, Political Science, Homemaking Science, Social Science, and Computer
Science.  Discuss the generality of this law, and possible reasons for its
predictive power.
                -- Gerald Weinberg, "An Introduction to General Systems
                   Thinking"
The use of anthropomorphic terminology when dealing with computing systems
is a symptom of professional immaturity.
                -- Edsger Dijkstra
To the systems programmer, users and applications serve only to provide a
test load.
Top Ten Things Overheard At The ANSI C Draft Committee Meetings:

        (10) Sorry, but that's too useful.
         (9) Dammit, little-endian systems *are* more consistent!
         (8) I'm on the committee and I *still* don't know what the hell
             #pragma is for.
         (7) Well, it's an excellent idea, but it would make the compilers too
             hard to write.
         (6) Them bats is smart; they use radar.
         (5) All right, who's the wiseguy who stuck this trigraph stuff in
             here?
         (4) How many times do we have to tell you, "No prior art!"
         (3) Ha, ha, I can't believe they're actually going to adopt this
             sucker.
         (2) Thank you for your generous donation, Mr. Wirth.
         (1) Gee, I wish we hadn't backed down on 'noalias'.
Truly simple systems... require infinite testing.
                -- Norman Augustine
Unix is a lot more complicated (than CP/M) of course -- the typical Unix
hacker can never remember what the PRINT command is called this week --
but when it gets right down to it, Unix is a glorified video game.
People don't do serious work on Unix systems; they send jokes around the
world on USENET or write adventure games and research papers.
                -- E. Post
                "Real Programmers Don't Use Pascal", Datamation, 7/83
                                UNIX Trix

For those of you in the reseller business, here is a helpful tip that will
save your support staff a few hours of precious time.  Before you send your
next machine out to an untrained client, change the permissions on /etc/passwd
to 666 and make sure there is a copy somewhere on the disk.  Now when they
forget the root password, you can easily login as an ordinary user and correct
the damage.  Having a bootable tape (for larger machines) is not a bad idea
either.  If you need some help, give us a call.
                -- CommUNIXque 1:1, ASCAR Business Systems
What the hell is it good for?
                -- Robert Lloyd (engineer of the Advanced Computing Systems
                   Division of IBM), to colleagues who insisted that the
                   microprocessor was the wave of the future, c. 1968
When we understand knowledge-based systems, it will be as before --
except our fingertips will have been singed.
                -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
X windows:
        Accept any substitute.
        If it's broke, don't fix it.
        If it ain't broke, fix it.
        Form follows malfunction.
        The Cutting Edge of Obsolescence.
        The trailing edge of software technology.
        Armageddon never looked so good.
        Japan's secret weapon.
        You'll envy the dead.
        Making the world safe for competing window systems.
        Let it get in YOUR way.
        The problem for your problem.
        If it starts working, we'll fix it.  Pronto.
        It could be worse, but it'll take time.
        Simplicity made complex.
        The greatest productivity aid since typhoid.
        Flakey and built to stay that way.

One thousand monkeys.  One thousand MicroVAXes.  One thousand years.
        X windows.
You can bring any calculator you like to the midterm, as long as it
doesn't dim the lights when you turn it on.
                -- Hepler, Systems Design 182
Do not allow this language (Ada) in its present state to be used in
applications where reliability is critical, i.e., nuclear power stations,
cruise missiles, early warning systems, anti-ballistic missle defense
systems.  The next rocket to go astray as a result of a programming language
error may not be an exploratory space rocket on a harmless trip to Venus:
It may be a nuclear warhead exploding over one of our cities.  An unreliable
programming language generating unreliable programs constitutes a far
greater risk to our environment and to our society than unsafe cars, toxic
pesticides, or accidents at nuclear power stations.
- C. A. R. Hoare
A little retrospection shows that although many fine, useful software systems
have been designed by committees and built as part of multipart projects,
those software systems that have excited passionate fans are those that are
the products of one or a few designing minds, great designers.  Consider Unix,
APL, Pascal, Modula, the Smalltalk interface, even Fortran; and contrast them
with Cobol, PL/I, Algol, MVS/370, and MS-DOS.
- Fred Brooks, Jr.
Software entities are more complex for their size than perhaps any other human
construct because no two parts are alike.  If they are, we make the two
similar parts into a subroutine -- open or closed.  In this respect, software
systems differ profoundly from computers, buildings, or automobiles, where
repeated elements abound.
- Fred Brooks, Jr.
Digital computers are themselves more complex than most things people build:
They hyave very large numbers of states.  This makes conceiving, describing,
and testing them hard.  Software systems have orders-of-magnitude more states
than computers do.
- Fred Brooks, Jr.
It is important to note that probably no large operating system using current
design technology can withstand a determined and well-coordinated attack,
and that most such documented penetrations have been remarkably easy.
-- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System",
Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the
remaining errors by providing for recovery from them.  An interesting footnote
to this design is that now a system failure can usually be considered to be
the result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.  -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating
Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal,
Vol. 12, No. 4, 1973, pp. 382-400
...it still remains true that as a set of cognitive beliefs about the
existence of God in any recognizable sense continuous with the great
systems of the past, religious doctrines constitute a speculative
hypothesis of an extremely low order of probability.
- Sidney Hook
We're fighting against humanism, we're fighting against liberalism...
we are fighting against all the systems of Satan that are destroying
our nation today...our battle is with Satan himself.
- Jerry Falwell
Ill-chosen abstraction is particularly evident in the design of the ADA
runtime system. The interface to the ADA runtime system is so opaque that
it is impossible to model or predict its performance, making it effectively
useless for real-time systems. -- Marc D. Donner and David H. Jameson.
"There's always been Tower of Babel sort of bickering inside Unix, but this
is the most extreme form ever.  This means at least several years of confusion."
-- Bill Gates, founder and chairman of Microsoft,
   about the Open Systems Foundation
"In corporate life, I think there are three important areas which contracts
can't deal with, the area of conflict, the area of change and area of reaching
potential.  To me a covenant is a relationship that is based on such things
as shared ideals and shared value systems and shared ideas and shared
agreement as to the processes we are going to use for working together.  In
many cases they develop into real love relationships."
-- Max DePree, chairman and CEO of Herman Miller Inc., "Herman Miller's
   Secrets of Corporate Creativity", The Wall Street Journal, May 3, 1988
    UNIX Shell is the Best Fourth Generation Programming Language

    It is the UNIX shell that makes it possible to do applications in a small
    fraction of the code and time it takes in third generation languages.  In
    the shell you process whole files at a time, instead of only a line at a
    time.  And, a line of code in the UNIX shell is one or more programs,
    which do more than pages of instructions in a 3GL.  Applications can be
    developed in hours and days, rather than months and years with traditional
    systems.  Most of the other 4GLs available today look more like COBOL or
    RPG, the most tedious of the third generation lanaguages.

"UNIX Relational Database Management:  Application Development in the UNIX
Environment" by Rod Manis, Evan Schaffer, and Robert Jorgensen.  Prentice
Hall Software Series.  Brian Kerrighan, Advisor.  1988.
"Flight Reservation systems decide whether or not you exist. If your information
isn't in their database, then you simply don't get to go anywhere."
-- Arthur Miller
...I don't care for the term 'mechanistic'. The word 'cybernetic' is a lot
more apropos. The mechanistic world-view is falling further and further behind
the real world where even simple systems can produce the most marvellous
chaos.
-- Peter da Silva
"(The Chief Programmer) personally defines the functional and performance
specifications, designs the program, codes it, tests it, and writes its
documentation... He needs great talent, ten years experience and
considerable systems and applications knowledge, whether in applied
mathematics, business data handling, or whatever."
-- Fred P. Brooks, _The Mythical Man Month_
To the systems programmer, users and applications serve only to provide a
test load.
Democracy is good.  I say this because other systems are worse.
                -- Jawaharlal Nehru
My own life has been spent chronicling the rise and fall of human systems,
and I am convinced that we are terribly vulnerable.  ...  We should be
reluctant to turn back upon the frontier of this epoch. Space is indifferent
to what we do; it has no feeling, no design, no interest in whether or not
we grapple with it. But we cannot be indifferent to space, because the grand,
slow march of intelligence has brought us, in our generation, to a point
from which we can explore and understand and utilize it. To turn back now
would be to deny our history, our capabilities.
                -- James A. Michener
Arbitrary systems, pl.n.:
        Systems about which nothing general can be said, save "nothing
        general can be said."
Computer science:
        (1) A study akin to numerology and astrology, but lacking the
           precision of the former and the success of the latter.
        (2) The protracted value analysis of algorithms.
        (3) The costly enumeration of the obvious.
        (4) The boring art of coping with a large number of trivialities.
        (5) Tautology harnessed in the service of Man at the speed of light.
        (6) The Post-Turing decline in formal systems theory.
Johnson's law:
        Systems resemble the organizations that create them.
Steinbach's Guideline for Systems Programming:
        Never test for an error condition you don't know how to handle.
system-independent, adj.:
        Works equally poorly on all systems.
The rules:
         (1) Thou shalt not worship other computer systems.
         (2) Thou shalt not impersonate Liberace or eat watermelon while
              sitting at the console keyboard.
         (3) Thou shalt not slap users on the face, nor staple their silly
             little card decks together.
         (4) Thou shalt not get physically involved with the computer system,
             especially if you're already married.
         (5) Thou shalt not use magnetic tapes as frisbees, nor use a disk
             pack as a stool to reach another disk pack.
         (6) Thou shalt not stare at the blinking lights for more than one
             eight hour shift.
         (7) Thou shalt not tell users that you accidentally destroyed their
             files/backup just to see the look on their little faces.
         (8) Thou shalt not enjoy cancelling a job.
         (9) Thou shalt not display firearms in the computer room.
        (10) Thou shalt not push buttons "just to see what happens".
        An architect's first work is apt to be spare and clean.  He knows
he doesn't know what he's doing, so he does it carefully and with great
restraint.
        As he designs the first work, frill after frill and embellishment
after embellishment occur to him.  These get stored away to be used "next
time." Sooner or later the first system is finished, and the architect,
with firm confidence and a demonstrated mastery of that class of systems,
is ready to build a second system.
        This second is the most dangerous system a man ever designs.
When he does his third and later ones, his prior experiences will
confirm each other as to the general characteristics of such systems,
and their differences will identify those parts of his experience that
are particular and not generalizable.
        The general tendency is to over-design the second system, using
all the ideas and frills that were cautiously sidetracked on the first
one.  The result, as Ovid says, is a "big pile."
                -- Frederick Brooks, "The Mythical Man Month"
Back in the early 60's, touch tone phones only had 10 buttons.  Some
military versions had 16, while the 12 button jobs were used only by people
who had "diva" (digital inquiry, voice answerback) systems -- mainly banks.
Since in those days, only Western Electric  made "data sets" (modems) the
problems of terminology were all Bell System.  We used to struggle with
written descriptions of dial pads that were unfamiliar to most people
(most phones were rotary then.)  Partly in jest, some AT&T engineering
types (there was no marketing in the good old days, which is why they were
the good old days) made up the term "octalthorpe" (note spelling) to denote
the "pound sign."  Presumably because it has 8 points sticking out.  It
never really caught on.
If you haven't enjoyed the material in the last few lectures then a career
in chartered accountancy beckons.
                -- Advice from the lecturer in the middle of the Stochastic
                   Systems course.
Lucas is the source of many of the components of the legendarily reliable
British automotive electrical systems.  Professionals call the company "The
Prince of Darkness".  Of course, if Lucas were to design and manufacture
nuclear weapons, World War III would never get off the ground.  The British
don't like warm beer any more than the Americans do.  The British drink warm
beer because they have Lucas refrigerators.
The only justification for our concepts and systems of concepts is that they
serve to represent the complex of our experiences; beyond this they have
no legitimacy.
                -- Albert Einstein
There are two kinds of solar-heat systems: "passive" systems collect the
sunlight that hits your home, and "active" systems collect the sunlight that
hits your neighbors' homes, too.
                -- Dave Barry, "Postpetroleum Guzzler"
Our little systems have their day;
They have their day and cease to be;
They are but broken lights of thee.
                -- Tennyson
"In a way they were right the basics of operating systems, and by extension the Linux kernel, were well understood by the early 70s; anything after that has been to some degree an exercise in self-gratification."

  -- Linus Torvalds (Open Sources, 1999 O'Reilly and Associates)
I used to be interested in Windows NT, but the more I see of it the more
it looks like traditional Windows with a stabler kernel. I don't find
anything technically interesting there. In my opinion MS is a lot better
at making money than it is at making good operating systems.

   -- Linus Torvalds
Linux Rally Held in Pennsylvania

HARRISBURG, PA -- Thousands of Linux advocates gathered at the Pennsylvania
state capitol building earlier today. They were protesting the state's recent
three year deal with Microsoft to install Windows NT on all state computer
systems. "Whatever pointy haired boss made this deal ought to be shot on
sight," one protestor exclaimed. "Windows NT is a piece of [expletive] compared
to Linux. The taxpayers of Pennsylvania are going to be sorry three years from
now when this 'deal' concludes. The state has sold its soul to Satan [Bill
Gates]."

Brief hostilities broke out when a group of police officers armed with riot
gear descended on the protestors. After the police threatened to use tear gas,
the protestors threw thousands of Linux CDs at them. Once the supply of CDs was
depleted, the protest became peaceful again. "I saw several policemen pick up
Linux CDs and put them in their pockets," one protestor noted.

The protest broke up a few minutes later once it was realized that the state
legislature wasn't in session. "We may have wasted our time today," one
advocate said, "But we'll be back later." State and Microsoft officials were
unavailable for comment at press time. How typical.
Operation Desert Slash

WASHINGTON, D.C. -- High officials in the US military are planning on putting
the  'Slashdot Effect' to use against Iraq. Pentagon computer experts think
that the Slashdot Effect could topple key Net-connected Iraqi computer
systems.  Such a Denial of Service attack could prove instrumental when the
US invades.

One Pentagon official said, "If I had a million dollars for every server that
crashed as a result of being linked on Slashdot, I'd be richer than Bill
Gates.  The Slashdot Effect is a very powerful weapon that the US military
wants to tap into."

Rob Malda has been contacted by top military brass.  According to anonymous
sources, Malda will play a key part in the so-called "Operation Desert
Slash".  Supposedly Malda will post several Slashdot articles with links to
critical Iraqi websites right when the US invasion is set to begin.
Meanwhile, Pentagon operatives will begin a series of Denial of Service
attacks on other key Iraqi computer systems. One source notes, "Since many
Iraqi systems rely on Microsoft software, this task should be relatively
simple."
Red Hat Linux 10.0

RALEIGH-DURHAM, NC -- HypeNewsWire -- Red Hat, the producer of the most
popular Linux distribution with over 25 million estimated users, is proud to
announce the availability of Red Hat Linux 10.0.  The latest version
contains the new Linux 6.2 kernel, the Z Window System 2.0, full support for
legacy Windows 3.x/9x/200x/NT software apps, and more. Copies of Red Hat
Linux 10.0 will be available in stores on CD-ROM, DVD-ROM, or GNUDE (GNU
Digital Encoding) disks within the next week.

Compaq, Dell, Gateway, and several other large computer manufacturers have
announced that they will offer computer systems with Red Hat 10.0
pre-installed.  "We can sell systems with Red Hat pre-installed for
considerably less than systems with Microsoft ActiveWindows 2001. Overall,
Red Hat Linux's superior quality, low price, and modest system requirements
puts Windows to shame," one Dell spokesperson said at last week's LinDex
convention.
Microsoft ActivePromo Campaign: "Windows Competitive Upgrade Offer"

Microsoft's PR masterminds are planning a massive marketing campaign,
code-named "ActivePromo 2000", to promote the upcoming release of Windows
2000 (scheduled for February 2001).  This marketing campaign will include a
"Windows Competitive Upgrade Offer" promotion.

Users of non-Microsoft operating systems (Linux in particular) will be given
the opportunity to trade-in their present OS for a free copy of Windows 98
(or NT 4.0) and Office 97.  People (all three of them) who want to
participate in this program will have to:

1. Mail their operating system's floppy disks or CD-ROMs to Microsoft

2. Agree to a two year contract with the Microsoft Network.

3. Agree (in writing) to the Competitive Upgrade License Agreement; one of
the terms of which is that the user may not install, copy, or otherwise use
a non-Microsoft OS for five years.
Microsoft ActivePromo Campaign: "State Innovation Day"

Microsoft has successfully lobbied for the State of Washington to declare
August 24th as State Innovation Day.  Efforts are underway to lobby the US
Congress to decree a similar designation nationally.  Several events are
scheduled on August 24, 1999 to showcase "innovation" in the computer
industry (in other words, Microsoft), including:

* An "Innovation Day Parade" held in downtown Seattle, featuring
floats and helium-filled balloons representing various Microsoft products
(Dancing Paper Clip, Microsoft Bob, Flying Windows Logo, etc.)

* An "Innovation is Cool" essay contest for high school and
college students.  Possible topics include "Why IE Should Be Integrated in
Windows", "Why Bill Gates Is My Hero", "Government Intervention is Evil",
and "Why Monopolies Improve Product Quality and Lower Prices".

* A 24-hour "Innovation in Education" telethon on NBC to raise money for
school districts nationwide to buy new Wintel computer systems and Internet
access through the Microsoft Network.
New Crime Identified: "Tech Rage"

HARRISBURG, IL -- The police department in this Illinois town has coined a
new term for a growing trend in crime: "tech rage". Tech rage shares many
similarities with another modern crime, "road rage", but instead of
affecting drivers, tech rage is experienced by disgruntled computer users.

The first documented case of tech rage involves a Microsoft salesman, Bob
Glutzfield, who convinced the local TV station to "upgrade" its computer
systems from Macintosh to Wintel.  While the migration seemed successful at
first, the Blue Screen became more prevalent during the following months.

Then, in January, the entire computer system crashed in the middle of the
weather forecast during the 10 o'clock evening news. Viewers could plainly
see the Blue Screen of Death showing in the monitors behind James Roland,
the chief meteorologist. The instability of Windows 98 stretched Roland's
patience until he snapped last week and succumbed to tech rage.

Roland tracked down the Microsoft salesman and followed him one evening to
his apartment.  The weatherman yelled at the bewildered Microserf, "You
[expletive]! Because of you, I'm the [expletive] laughing stock of Southern
Illinois!" and then proceeded to beat him up.  Roland is currently out on
bond pending trial next month.
The War Against Linux

A significant obstacle on the path to Linux World Domination has emerged.  A
reactionary grass-roots movement has formed to fight, as they call it, "The
War Against Linux".  This movement, code-named "LinSux", is composed of
people (mostly Microsoft stockholders and commercial software developers)
who want to maintain the status quo.  They are fighting back against the
rise of Linux and free software which they see as a threat to their financial
independence.

The most damaging attack the LinSux folks have launched is "Three Mile
Island", a Windows macro virus designed to inflict damage on computers that
contain a partition devoted to a non-Microsoft OS.  When the victim computer
is booted into Windows, the virus activates and deletes any non-Microsoft
partitions. Ironically, the many security flaws in Windows allow the virus
to damage alternative operating systems but leave Windows unscathed.

"The War Against Linux" has also been fought in more subtle ways.
Time-tested methods of Linux advocacy have been turned into subtle forms of
anti-Linux advocacy by the LinSux crowd.  MSCEs are smuggling NT boxes into
companies that predominantly use Linux or Unix.  LinSux "freedom fighters"
are rearranging books and software boxes on store shelves so that Microsoft
offerings are displayed more prominently.
Microsoft Mandatory Survey (#1)

Customers who want to upgrade to Windows 98 Second Edition must now fill
out a Microsoft survey online before they can order the bugfix/upgrade.

Question 1: What is your opinion of the Microsoft antitrust trial?

A. The DoJ is wasting taxpayer's money. Now, if the DOJ were to upgrade
   all of its computer systems to Windows, then the department would be
   making wise use of tax dollars.

B. All of the Microsoft email messages that the evil government has
   presented as evidence are obviously taken out of context or have been
   completely twisted around. I mean... Bill Gates would never say "let's
   cut off their air supply" in a memo; it's an obvious fabrication.

C. Judge Jackson is obviously biased in favor of the DOJ's vigilante
   persecution of Microsoft.

D. If Microsoft loses, it will be the gravest miscarriage of justice in
   all the history of mankind.
Microsoft Mandatory Survey (#5)

Customers who want to upgrade to Windows 98 Second Edition must now fill
out a Microsoft survey online before they can order the bugfix/upgrade.

Question 5: Where do you want to go today?(tm)

A. To Washington, D.C. to meet Janet Reno and cuss her out for persecuting
   Microsoft

B. To Redmond, WA to take a tour of the Microsoft campus

C. To the software store to purchase a new piece of Microsoft software

D. To my local school district to convince the administration to upgrade
   the Macintoshes in the computer labs to Wintel systems

E. I don't know about myself, but I'd like to see so-called "consumer
   advocates" like Ralph Nader go to Hell.
Right now hundreds of Anonymous Cowards are cheering the fact that only
Windows boobs are victims of ILOVEYOU and other email viruses. I realize
Outlook is so insecure that using it is like posting a sign outside your
door saying, "DOOR UNLOCKED -- ROB ME!". However, Linux isn't immune. If I
had a dollar for every pine buffer overflow uncovered, I could buy a
truckload of fresh herring.

I expect the next mass email virus to spread will be cross-platform. If
the recipient is a Windows/Outlook luser, they'll get hit. If the
recipient is a Linux/pine user, they'll find themselves staring at a
self-executing bash script that's has just allocated 1 petabyte of memory
and crashed the system (or worse).

Either that or the next mass email virus will only damage Linux systems. I
can just see Bill Gates assigning some junior programmer that very task.
Be afraid. Be very afraid.

   -- A speech given at the First Annual Connecticut Conspiracy]
      Convention (ConConCon) by an anonymous creature said to
      be "wearing what appeared to be a tuxedo".
Brief History Of Linux (#23)

Linus Torvalds certainly wasn't the only person to create their own
operating system from scratch. Other people working from their leaky
basements did create their own systems and now they are sick that they
didn't become an Alpha Geek like Torvalds or a Beta Geek like Alan Cox.

Linus had one advantage not many else did: Internet access. The world was
full of half-implemented-Unix-kernels at the time, but they were sitting
isolated on some hacker's hard drive, destined to be destroyed by a hard
drive crash. Thankfully that never happened to Linux, mostly because
everyone with Net access could download a copy instead of paying shipping
charges to receive the code on a huge stack of unreliable floppy disks.

Indeed, buried deep within a landfill in Lansing, Michigan sits a stack of
still-readable 5-1/4 floppies containing the only known copy of "Windows
Killer", a fully functional Unix kernel so elegant, so efficient, so
easy-to-use that Ken Thompson himself would be jealous of its design.
Unfortunately the author's mother threw out the stack of floppies in a
bout of spring cleaning. The 14 year old author's talents were lost
forever as his parents sent him to Law School.
The Humorix Oracle explains how to get a job at a major corporation:

1. Find an exploit in Microsoft IIS or another buggy Microsoft product to
   which large corporations rarely apply security patches.
2. Create a virus or worm that takes advantage of this exploit and then
   propogates itself by selecting IP numbers at random and then trying to
   infect those machines.
3. Keep an eye on your own website's server logs. When your virus starts
   propogating, your server will be hit with thousands of attacks from
   other infected systems trying to spread the virus to your machine.
4. Make a list of the IP numbers of all of the infected machines.
5. Perform a reverse DNS lookup on these IP numbers.
6. Make a note of all of the Fortune 500 companies that appear on the list
   of infected domains.
7. Send your resume to these companies and request an interview for a
   system administrator position. These companies are hiring -- whether
   they realize it or not.
8. Use your new salary to hire a good defense lawyer when the FBI comes
   knocking.
"I think it's wrong any of us should claim ideas for stuff
that has been done already by other people. It's time to
put away the wheel reinvention kit and LEARN FROM OTHER
SYSTEMS and even from *shudder* books ;)"

        - Rik van Riel
The last time I looked, Solaris and AIX and all the rest of the "scalable"
systems were absolute pigs on smaller hardware, and the "scalability" in
them often translates into "we scale linearly to many CPU's by being
really bad even on one".

        - Linus Torvalds
Using a cluster to hide the fact that the underlying systems crash
regularly is an extremely dangerous way to manage a computing environment.

        - Matt Dillon in http://www.osnews.com/story.php?news_id=153
"and i actually like debian 2.0 that much i completely revamped the
default config of the linux systems our company sells and reinstalled any
of the linux systems in the office and here at home.."
Operating Systems Installed:
  * Debian GNU/Linux 2.1 4 CD Set ($20 from www.chguy.net; price includes
    taxes, shipping, and a $3 donation to FSF). 2 CDs are binaries, 2 CDs
    complete source code;
  * Windows 98 Second Edition Upgrade Version ($136 through Megadepot.com,
    price does not include taxes/shipping). Surprisingly, no source code
    is included.

        -- Bill Stilwell, http://linuxtoday.com/stories/8794.html
Technology is a constand battle between manufacturers producing bigger and
more idiot-proof systems and nature producing bigger and better idiots.
        -- Slashdot signature
Be warned that typing \fBkillall \fIname\fP may not have the desired
effect on non-Linux systems, especially when done by a privileged user.
        -- From the killall manual page
'Mounting' is used for three things: climbing on a horse, linking in a
hard disk unit in data systems, and, well, mounting during sex.
        -- Christa Keil
Microsoft Corp., concerned by the growing popularity of the free 32-bit
operating system for Intel systems, Linux, has employed a number of top
programmers from the underground world of virus development.  Bill Gates stated
yesterday: "World domination, fast -- it's either us or Linus".  Mr. Torvalds
was unavailable for comment ...
        -- Robert Manners, rjm@swift.eng.ox.ac.uk, in comp.os.linux.setup
        Plumbing is one of the easier of do-it-yourself activities,
requiring only a few simple tools and a willingness to stick your arm into a
clogged toilet.  In fact, you can solve many home plumbing problems, such as
annoying faucet drip, merely by turning up the radio.  But before we get
into specific techniques, let's look at how plumbing works.
        A plumbing system is very much like your electrical system, except
that instead of electricity, it has water, and instead of wires, it has
pipes, and instead of radios and waffle irons, it has faucets and toilets.
So the truth is that your plumbing systems is nothing at all like your
electrical system, which is good, because electricity can kill you.
                -- Dave Barry, "The Taming of the Screw"
XLI:
        The more one produces, the less one gets.
XLII:
        Simple systems are not feasible because they require infinite testing.
XLIII:
        Hardware works best when it matters the least.
XLIV:
        Aircraft flight in the 21st century will always be in a westerly
        direction, preferably supersonic, crossing time zones to provide the
        additional hours needed to fix the broken electronics.
XLV:
        One should expect that the expected can be prevented, but the
        unexpected should have been expected.
XLVI:
        A billion saved is a billion earned.
                -- Norman Augustine
... I want FORTY-TWO TRYNEL FLOATATION SYSTEMS installed within
SIX AND A HALF HOURS!!!
I'm thinking about DIGITAL READ-OUT systems and computer-generated
IMAGE FORMATIONS ...
OKAY!!  Turn on the sound ONLY for TRYNEL CARPETING, FULLY-EQUIPPED
R.V.'S and FLOATATION SYSTEMS!!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners