DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
arbitrary
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Einstein argued that there must be simplified explanations of nature, because
God is not capricious or arbitrary.  No such faith comforts the software
engineer.
                -- Fred Brooks
The idea that an arbitrary naive human should be able to properly use a given
tool without training or understanding is even more wrong for computing than
it is for other tools (e.g. automobiles, airplanes, guns, power saws).
                -- Doug Gwyn
Einstein argued that there must be simplified explanations of nature, because
God is not capricious or arbitrary.  No such faith comforts the software
engineer.
- Fred Brooks, Jr.
Arbitrary systems, pl.n.:
        Systems about which nothing general can be said, save "nothing
        general can be said."
Once upon a time, when I was training to be a mathematician, a group of
us bright young students taking number theory discovered the names of the
smaller prime numbers.

2:  The Odd Prime --
        It's the only even prime, therefore is odd.  QED.
3:  The True Prime --
        Lewis Carroll: "If I tell you 3 times, it's true."
31: The Arbitrary Prime --
        Determined by unanimous unvote.  We needed an arbitrary prime in
        case the prof asked for one, and so had an election.  91 received
        the most votes (well, it *looks* prime) and 3+4i the next most.
        However, 31 was the only candidate to receive none at all.
41: The Female Prime --
        The polynomial X**2 - X + 41 is
        prime for integer values from 1 to 40.
43: The Male Prime - they form a prime pair.

Since the composite numbers are formed from primes, their qualities
are derived from those primes.  So, for instance, the number 6 is "odd
but true", while the powers of 2 are all extremely odd numbers.
Proof techniques #1: Proof by Induction.

This technique is used on equations with "_n" in them.  Induction
techniques are very popular, even the military used them.

SAMPLE: Proof of induction without proof of induction.

        We know it's true for _n equal to 1.  Now assume that it's true
for every natural number less than _n.  _N is arbitrary, so we can take _n
as large as we want.  If _n is sufficiently large, the case of _n+1 is
trivially equivalent, so the only important _n are _n less than _n.  We
can take _n = _n (from above), so it's true for _n+1 because it's just
about _n.
        QED.        (QED translates from the Latin as "So what?")
Linux World Domination: Not A Joke!

WASHINGTON, D.C. -- Senator Fattecat (R-WA) is pushing for a ban on
Finnish-produced software. His chief of staff, Ms. Dee Septive, has
published a 200-page report revealing "the Helsinkian Underground", a
Finnish world domination plot hatched in 1943.

The Fattecat expose describes Finland's recent scheme involving free
software. "Linux, originally called Freix (FREIX Retrieves Electronic
Intelligence X), is a scheme to infiltrate the Western world with a 'free'
operating system with nasty backdoors hidden within its obfuscated source
code. IRC (Intelligence Relaying Code) is another Finnish innovation
designed for spying purposes."

Linus Torvalds plays a prominent role in the conspiracy. "That old story
about Linus developing a Unix clone in his spare time while at University
is a lark," the report states. "Indeed, the name Linux ("Line X") was
coined because the kernel can extract any arbitrary line of intelligence
from any document it has access to."
Security Holes Found In Microsoft Easter Eggs

REDMOND, WA -- It's damage control time for the Microsoft Marketing
Machine. Not only have exploits been found in IE, Outlook, and even the
Dancing Paper Clip, but now holes have been uncovered in Excel's Flight
Simulator and Word's pinball game.

"If you enter Excel 97's flight simulator and then hit the F1, X, and
SysRq keys while reading a file from Drive A:, you automatically gain
Administrator rights on Windows NT," explained the security expert who
first discovered the problem. "And that's just the tip of the iceberg."

Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and
eastereggs.dll, that are marked as "Safe for scripting" but are not.
Arbitrary Visual BASIC code can be executed using these files. More
disturbing, however, are the undocumented API calls
"ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow",
and "UploadRegistryToMicrosoft" within easter~1.dll.

Microsoft spokesdroids have already hailed the problem as "an
insignificant byproduct of Microsoft innovation."
Brief History Of Linux (#11)
Birth of Gates and the Anti-Gates

October 28, 1955 saw the birth of William H. Gates, who would rise above
his humble beginnings as the son of Seattle's most powerful millionaire
lawyer and become the World's Richest Man(tm). A classic American
rags-to-riches story (with "rags" referring to the dollar bills that the
Gates family used for toilet paper), Bill Gates is now regarded as the
world's most respected businessman by millions of clueless people that
have obviously never touched a Windows machine.

Nature is all about balance. The birth of Gates in 1955 tipped the cosmic
scales toward evil, but the birth of Linus Torvalds in 1969 finally
balanced them out. Linus' destiny as the savior of Unix and the slayer of
money-breathing Redmond dragons was sealed when, just mere hours after his
birth, the Unix epoch began January 1st, 1970. While the baseline for Unix
timekeeping might be arbitrary, we here at Humorix like to thank the its
proximity of Linus' birth is no coincidence.
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners