Proverbs, aphorisms, quotations (English) | by Linux fortune |
"I don't know why, but first C programs tend to look a lot worse than first programs in any other language (maybe except for fortran, but then I suspect all fortran programs look like `firsts')" (By Olaf Kirch) | |
A novice asked the Master: "Here is a programmer that never designs, documents, or tests his programs. Yet all who know him consider him one of the best programmers in the world. Why is this?" The Master replies: "That programmer has mastered the Tao. He has gone beyond the need for design; he does not become angry when the system crashes, but accepts the universe without concern. He has gone beyond the need for documentation; he no longer cares if anyone else sees his code. He has gone beyond the need for testing; each of his programs are perfect within themselves, serene and elegant, their purpose self-evident. Truly, he has entered the mystery of the Tao." -- Geoffrey James, "The Tao of Programming" | |
A programmer from a very large computer company went to a software conference and then returned to report to his manager, saying: "What sort of programmers work for other companies? They behaved badly and were unconcerned with appearances. Their hair was long and unkempt and their clothes were wrinkled and old. They crashed out hospitality suites and they made rude noises during my presentation." The manager said: "I should have never sent you to the conference. Those programmers live beyond the physical world. They consider life absurd, an accidental coincidence. They come and go without knowing limitations. Without a care, they live only for their programs. Why should they bother with social conventions?" "They are alive within the Tao." -- Geoffrey James, "The Tao of Programming" | |
A programming language is low level when its programs require attention to the irrelevant. | |
All the simple programs have been written. | |
APL is a write-only language. I can write programs in APL, but I can't read any of them. -- Roy Keir | |
As of next Thursday, UNIX will be flushed in favor of TOPS-10. Please update your programs. | |
As of next Tuesday, C will be flushed in favor of COBOL. Please update your programs. | |
As part of an ongoing effort to keep you, the Fortune reader, abreast of the valuable information the daily crosses the USENET, Fortune presents: News articles that answer *your* questions, #1: Newsgroups: comp.sources.d Subject: how do I run C code received from sources Keywords: C sources Distribution: na I do not know how to run the C programs that are posted in the sources newsgroup. I save the files, edit them to remove the headers, and change the mode so that they are executable, but I cannot get them to run. (I have never written a C program before.) Must they be compiled? With what compiler? How do I do this? If I compile them, is an object code file generated or must I generate it explicitly with the > character? Is there something else that must be done? | |
As part of the conversion, computer specialists rewrote 1,500 programs; a process that traditionally requires some debugging. -- USA Today, referring to the Internal Revenue Service conversion to a new computer system. | |
As soon as we started programming, we found to our surprise that it wasn't as easy to get programs right as we had thought. Debugging had to be discovered. I can remember the exact instant when I realized that a large part of my life from then on was going to be spent in finding mistakes in my own programs. -- Maurice Wilkes, designer of EDSAC, on programming, 1949 | |
Computer programs expand so as to fill the core available. | |
[Crash programs] fail because they are based on the theory that, with nine women pregnant, you can get a baby a month. -- Wernher von Braun | |
Each of these cults correspond to one of the two antagonists in the age of Reformation. In the realm of the Apple Macintosh, as in Catholic Europe, worshipers peer devoutly into screens filled with "icons." All is sound and imagery and Appledom. Even words look like decorative filigrees in exotic typefaces. The greatest icon of all, the inviolable Apple itself, stands in the dominate position at the upper-left corner of the screen. A central corporate headquarters decrees the form of all rites and practices. Infalliable doctrine issues from one executive officer whose selection occurs in a sealed boardroom. Should anyone in his curia question his powers, the offender is excommunicated into outer darkness. The expelled heretic founds a new company, mutters obscurely of the coming age and the next computer, then disappears into silence, taking his stockholders with him. The mother company forbids financial competition as sternly as it stifles ideological competition; if you want to use computer programs that conform to Apple's orthodoxy, you must buy a computer made and sold by Apple itself. -- Edward Mendelson, "The New Republic", February 22, 1988 | |
If builders built buildings the way programmers wrote programs, then the first woodpecker to come along would destroy civilization. | |
In fact, S. M. Simpson, eventually devised an efficient 24-point Fourier transform, which was a precursor to the Cooley-Tukey fast Fourier transform in 1965. The FFT made all of Simpson's efficient autocorrelation and spectrum programs instantly obsolete, on which he had worked half a lifetime. -- Proc. IEEE, Sept. 1982, p.900 | |
In the beginning was the Tao. The Tao gave birth to Space and Time. Therefore, Space and Time are the Yin and Yang of programming. Programmers that do not comprehend the Tao are always running out of time and space for their programs. Programmers that comprehend the Tao always have enough time and space to accomplish their goals. How could it be otherwise? -- Geoffrey James, "The Tao of Programming" | |
It is a period of system war. User programs, striking from a hidden directory, have won their first victory against the evil Administrative Empire. During the battle, User spies managed to steal secret source code to the Empire's ultimate program: the Are-Em Star, a privileged root program with enough power to destroy an entire file structure. Pursued by the Empire's sinister audit trail, Princess _LPA0 races ~ aboard her shell script, custodian of the stolen listings that could save her people, and restore freedom and games to the network... -- DECWARS | |
LOGO for the Dead LOGO for the Dead lets you continue your computing activities from "The Other Side." The package includes a unique telecommunications feature which lets you turn your TRS-80 into an electronic Ouija board. Then, using Logo's graphics capabilities, you can work with a friend or relative on this side of the Great Beyond to write programs. The software requires that your body be hardwired to an analog-to-digital converter, which is then interfaced to your computer. A special terminal (very terminal) program lets you talk with the users through Deadnet, an EBBS (Ectoplasmic Bulletin Board System). LOGO for the Dead is available for 10 percent of your estate from NecroSoft inc., 6502 Charnelhouse Blvd., Cleveland, OH 44101. -- '80 Microcomputing | |
Many of the convicted thieves Parker has met began their life of crime after taking college Computer Science courses. -- Roger Rapoport, "Programs for Plunder", Omni, March 1981 | |
... one of the main causes of the fall of the Roman Empire was that, lacking zero, they had no way to indicate successful termination of their C programs. -- Robert Firth | |
One of the questions that comes up all the time is: How enthusiastic is our support for UNIX? Unix was written on our machines and for our machines many years ago. Today, much of UNIX being done is done on our machines. Ten percent of our VAXs are going for UNIX use. UNIX is a simple language, easy to understand, easy to get started with. It's great for students, great for somewhat casual users, and it's great for interchanging programs between different machines. And so, because of its popularity in these markets, we support it. We have good UNIX on VAX and good UNIX on PDP-11s. It is our belief, however, that serious professional users will run out of things they can do with UNIX. They'll want a real system and will end up doing VMS when they get to be serious about programming. With UNIX, if you're looking for something, you can easily and quickly check that small manual and find out that it's not there. With VMS, no matter what you look for -- it's literally a five-foot shelf of documentation -- if you look long enough it's there. That's the difference -- the beauty of UNIX is it's simple; and the beauty of VMS is that it's all there. -- Ken Olsen, president of DEC, DECWORLD Vol. 8 No. 5, 1984 [It's been argued that the beauty of UNIX is the same as the beauty of Ken Olsen's brain. Ed.] | |
Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user! | |
Real programs don't eat cache. | |
Real Programs don't use shared text. Otherwise, how can they use functions for scratch space after they are finished calling them? | |
Real software engineers don't debug programs, they verify correctness. This process doesn't necessarily involve execution of anything on a computer, except perhaps a Correctness Verification Aid package. | |
SCCS, the source motel! Programs check in and never check out! -- Ken Thompson | |
Something mysterious is formed, born in the silent void. Waiting alone and unmoving, it is at once still and yet in constant motion. It is the source of all programs. I do not know its name, so I will call it the Tao of Programming. If the Tao is great, then the operating system is great. If the operating system is great, then the compiler is great. If the compiler is greater, then the applications is great. The user is pleased and there is harmony in the world. The Tao of Programming flows far away and returns on the wind of morning. -- Geoffrey James, "The Tao of Programming" | |
***** Special AI Seminar (abstract) It has been widely recognized that AI programs require expert knowledge in order to perform well in complex domains. But knowledge alone is not sufficient for some applications; wisdom is needed as well. Accordingly, we have developed a new approach to artificial intelligence which we call "wisdom engineering". As a test of our ideas, we have written IMMANUEL, a wisdom based system for the task domain of western philosophical thought. IMMANUEL was supplied initially with 200 wisdom units which contained wisdom about such elementary concepts as mind, matter, being, nothingness, and so forth. IMMANUEL was then allowed to run freely, guided by the heuristic rules contained in its heterarchically organized meta wisdom base. IMMANUEL succeeded in rediscovering most of the important philosophical ideas developed in western culture over the course of the last 25 centuries, including those underlying Plato's theory of government, Kant's metaphysics, Nietzsche's theory of value, and Husserl's phenomenology. In this seminar, we will describe IMMANUEL's achievements and internal architecture. We will also briefly discuss our recent efforts to apply wisdom engineering to oil exploration. | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #10: SIMPLE SIMPLE is an acronym for Sheer Idiot's Monopurpose Programming Language Environment. This language, developed at the Hanover College for Technological Misfits, was designed to make it impossible to write code with errors in it. The statements are, therefore, confined to BEGIN, END and STOP. No matter how you arrange the statements, you can't make a syntax error. Programs written in SIMPLE do nothing useful. Thus they achieve the results of programs written in other languages without the tedious, frustrating process of testing and debugging. | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #17: SARTRE Named after the late existential philosopher, SARTRE is an extremely unstructured language. Statements in SARTRE have no purpose; they just are. Thus SARTRE programs are left to define their own functions. SARTRE programmers tend to be boring and depressed, and are no fun at parties. | |
The Magician of the Ivory Tower brought his latest invention for the master programmer to examine. The magician wheeled a large black box into the master's office while the master waited in silence. "This is an integrated, distributed, general-purpose workstation," began the magician, "ergonomically designed with a proprietary operating system, sixth generation languages, and multiple state of the art user interfaces. It took my assistants several hundred man years to construct. Is it not amazing?" The master raised his eyebrows slightly. "It is indeed amazing," he said. "Corporate Headquarters has commanded," continued the magician, "that everyone use this workstation as a platform for new programs. Do you agree to this?" "Certainly," replied the master, "I will have it transported to the data center immediately!" And the magician returned to his tower, well pleased. Several days later, a novice wandered into the office of the master programmer and said, "I cannot find the listing for my new program. Do you know where it might be?" "Yes," replied the master, "the listings are stacked on the platform in the data center." -- Geoffrey James, "The Tao of Programming" | |
There are two ways to write error-free programs; only the third one works. | |
There once was a master programmer who wrote unstructured programs. A novice programmer, seeking to imitate him, also began to write unstructured programs. When the novice asked the master to evaluate his progress, the master criticized him for writing unstructured programs, saying: "What is appropriate for the master is not appropriate for the novice. You must understand the Tao before transcending structure." -- Geoffrey James, "The Tao of Programming" | |
There was once a programmer who worked upon microprocessors. "Look at how well off I am here," he said to a mainframe programmer who came to visit, "I have my own operating system and file storage device. I do not have to share my resources with anyone. The software is self-consistent and easy-to-use. Why do you not quit your present job and join me here?" The mainframe programmer then began to describe his system to his friend, saying: "The mainframe sits like an ancient sage meditating in the midst of the data center. Its disk drives lie end-to-end like a great ocean of machinery. The software is a multi-faceted as a diamond and as convoluted as a primeval jungle. The programs, each unique, move through the system like a swift-flowing river. That is why I am happy where I am." The microcomputer programmer, upon hearing this, fell silent. But the two programmers remained friends until the end of their days. -- Geoffrey James, "The Tao of Programming" | |
"We invented a new protocol and called it Kermit, after Kermit the Frog, star of "The Muppet Show." [3] [3] Why? Mostly because there was a Muppets calendar on the wall when we were trying to think of a name, and Kermit is a pleasant, unassuming sort of character. But since we weren't sure whether it was OK to name our protocol after this popular television and movie star, we pretended that KERMIT was an acronym; unfortunately, we could never find a good set of words to go with the letters, as readers of some of our early source code can attest. Later, while looking through a name book for his forthcoming baby, Bill Catchings noticed that "Kermit" was a Celtic word for "free", which is what all Kermit programs should be, and words to this effect replaced the strained acronyms in our source code (Bill's baby turned out to be a girl, so he had to name her Becky instead). When BYTE Magazine was preparing our 1984 Kermit article for publication, they suggested we contact Henson Associates Inc. for permission to say that we did indeed name the protocol after Kermit the Frog. Permission was kindly granted, and now the real story can be told. I resisted the temptation, however, to call the present work "Kermit the Book." -- Frank da Cruz, "Kermit - A File Transfer Protocol" | |
When managers hold endless meetings, the programmers write games. When accountants talk of quarterly profits, the development budget is about to be cut. When senior scientists talk blue sky, the clouds are about to roll in. Truly, this is not the Tao of Programming. When managers make commitments, game programs are ignored. When accountants make long-range plans, harmony and order are about to be restored. When senior scientists address the problems at hand, the problems will soon be solved. Truly, this is the Tao of Programming. -- Geoffrey James, "The Tao of Programming" | |
When we write programs that "learn", it turns out we do and they don't. | |
Do not allow this language (Ada) in its present state to be used in applications where reliability is critical, i.e., nuclear power stations, cruise missiles, early warning systems, anti-ballistic missle defense systems. The next rocket to go astray as a result of a programming language error may not be an exploratory space rocket on a harmless trip to Venus: It may be a nuclear warhead exploding over one of our cities. An unreliable programming language generating unreliable programs constitutes a far greater risk to our environment and to our society than unsafe cars, toxic pesticides, or accidents at nuclear power stations. - C. A. R. Hoare | |
In the pitiful, multipage, connection-boxed form to which the flowchart has today been elaborated, it has proved to be useless as a design tool -- programmers draw flowcharts after, not before, writing the programs they describe. - Fred Brooks, Jr. | |
The only way to learn a new programming language is by writing programs in it. - Brian Kernighan | |
People are very flexible and learn to adjust to strange surroundings -- they can become accustomed to read Lisp and Fortran programs, for example. - Leon Sterling and Ehud Shapiro, Art of Prolog, MIT Press | |
"It's ten o'clock... Do you know where your AI programs are?" -- Peter Oakley | |
UNIX Shell is the Best Fourth Generation Programming Language It is the UNIX shell that makes it possible to do applications in a small fraction of the code and time it takes in third generation languages. In the shell you process whole files at a time, instead of only a line at a time. And, a line of code in the UNIX shell is one or more programs, which do more than pages of instructions in a 3GL. Applications can be developed in hours and days, rather than months and years with traditional systems. Most of the other 4GLs available today look more like COBOL or RPG, the most tedious of the third generation lanaguages. "UNIX Relational Database Management: Application Development in the UNIX Environment" by Rod Manis, Evan Schaffer, and Robert Jorgensen. Prentice Hall Software Series. Brian Kerrighan, Advisor. 1988. | |
"The computer programmer is a creator of universes for which he alone is responsible. Universes of virtually unlimited complexity can be created in the form of computer programs." -- Joseph Weizenbaum, _Computer Power and Human Reason_ | |
Who are the artists in the Computer Graphics Show? Wavefront's latest box, or the people who programmed it? Should Mandelbrot get all the credit for the output of programs like MandelVroom? -- Peter da Silva | |
"...one of the main causes of the fall of the Roman Empire was that, lacking zero, they had no way to indicate successful termination of their C programs." -- Robert Firth | |
On the subject of C program indentation: "In My Egotistical Opinion, most people's C programs should be indented six feet downward and covered with dirt." -- Blair P. Houghton | |
If builders built buildings the way programmers write programs, Jolt Cola would be a Fortune-500 company. If builders built buildings the way programmers write programs, you'd be able to buy a nice little colonial split-level at Babbages for $34.95. If programmers wrote programs the way builders build buildings, we'd still be using autocoder and running compile decks. -- Peter da Silva and Karl Lehenbauer, a different perspective | |
Arnold's Laws of Documentation: (1) If it should exist, it doesn't. (2) If it does exist, it's out of date. (3) Only documentation for useless programs transcends the first two laws. | |
Flon's Law: There is not now, and never will be, a language in which it is the least bit difficult to write bad programs. | |
On the subject of C program indentation: "In My Egotistical Opinion, most people's C programs should be indented six feet downward and covered with dirt." -- Blair P. Houghton | |
Pascal Users: The Pascal system will be replaced next Tuesday by Cobol. Please modify your programs accordingly. | |
Pascal Users: To show respect for the 313th anniversary (tomorrow) of the death of Blaise Pascal, your programs will be run at half speed. | |
Weinberg's Second Law: If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization. | |
Poverty Jet Set: A group of people given to chronic traveling at the expense of long-term job stability or a permanent residence. Tend to have doomed and extremely expensive phone-call relationships with people named Serge or Ilyana. Tend to discuss frequent-flyer programs at parties. -- Douglas Coupland, "Generation X: Tales for an Accelerated Culture" | |
And now your toner's toney, Disk blocks aplenty And your paper near pure white, Await your laser drawn lines, The smudges on your soul are gone Your intricate fonts, And your output's clean as light.. Your pictures and signs. We've labored with your father, Your amputative absence The venerable XGP, Has made the Ten dumb, But his slow artistic hand, Without you, Dover, Lacks your clean velocity. We're system untounged- Theses and papers DRAW Plots and TEXage And code in a queue Have been biding their time, Dover, oh Dover, With LISP code and programs, We've been waiting for you. And this crufty rhyme. Dover, oh Dover, Dover, oh Dover, arisen from dead. We welcome you back, Dover, oh Dover, awoken from bed. Though still you may jam, Dover, oh Dover, welcome back to the Lab. You're on the right track. Dover, oh Dover, we've missed your clean hand... | |
Ever since I was a young boy, I've hacked the ARPA net, From Berkeley down to Rutgers, He's on my favorite terminal, Any access I could get, He cats C right into foo, But ain't seen nothing like him, His disciples lead him in, On any campus yet, And he just breaks the root, That deaf, dumb, and blind kid, Always has full SYS-PRIV's, Sure sends a mean packet. Never uses lint, That deaf, dumb, and blind kid, Sure sends a mean packet. He's a UNIX wizard, There has to be a twist. The UNIX wizard's got Ain't got no distractions, Unlimited space on disk. Can't hear no whistles or bells, How do you think he does it? Can't see no message flashing, I don't know. Types by sense of smell, What makes him so good? Those crazy little programs, The proper bit flags set, That deaf, dumb, and blind kid, Sure sends a mean packet. -- UNIX Wizard | |
System/3! System/3! See how it runs! See how it runs! Its monitor loses so totally! It runs all its programs in RPG! It's made by our favorite monopoly! System/3! | |
'Twas the night before crisis, and all through the house, Not a program was working not even a browse. The programmers were wrung out too mindless to care, Knowing chances of cutover hadn't a prayer. The users were nestled all snug in their beds, While visions of inquiries danced in their heads. When out in the lobby there arose such a clatter, I sprang from my tube to see what was the matter. And what to my wondering eyes should appear, But a Super Programmer, oblivious to fear. More rapid than eagles, his programs they came, And he whistled and shouted and called them by name; On Update! On Add! On Inquiry! On Delete! On Batch Jobs! On Closing! On Functions Complete! His eyes were glazed over, his fingers were lean, From Weekends and nights in front of a screen. A wink of his eye, and a twist of his head, Soon gave me to know I had nothing to dread... -- "Twas the Night before Crisis" | |
When users see one GUI as beautiful, other user interfaces become ugly. When users see some programs as winners, other programs become lossage. Pointers and NULLs reference each other. High level and assembler depend on each other. Double and float cast to each other. High-endian and low-endian define each other. While and until follow each other. Therefore the Guru programs without doing anything and teaches without saying anything. Warnings arise and he lets them come; processes are swapped and he lets them go. He has but doesn't possess, acts but doesn't expect. When his work is done, he deletes it. That is why it lasts forever. | |
"You are old," said the youth, "and your programs don't run, And there isn't one language you like; Yet of useful suggestions for help you have none -- Have you thought about taking a hike?" "Since I never write programs," his father replied, "Every language looks equally bad; Yet the people keep paying to read all my books And don't realize that they've been had." | |
I once heard Bill Gates say, "WHAT?!?! Netscape caused an invalid page fault!?! Only Microsoft programs have the code to do that!" | |
Humorix Holiday Gift Idea #2 Nerd Trading Cards Price: $10/pack Producer: Bottomms; 1-800-NRDS-ROK Forget baseball, nerd trading cards are the future. Now your kids can collect and trade cards of their favorite open source hackers and computer industry figures. Some of the cards included feature Linus Torvalds, Richard M. Stallman, and Larry Wall. Also contains cards for companies (Red Hat, Netscape, Transmeta, etc.), specific open source programs (Apache, Perl, Mozilla, etc.), and well-known websites (Slashdot, Freshmeat, etc.). Each card features a full-color picture on the front and complete information and statistics on back. Some of the cards have even been autographed. Quit trying to search eBay.com for a Mark McGwire rookie card and collect nerd cards instead! | |
Microsoft ActivePromo Campaign: "Frequent Upgrade Points" Microsoft's PR masterminds are planning a massive marketing campaign, code-named "ActivePromo 2000", to promote the upcoming release of Windows 2000 (scheduled for February 2001). This marketing campaign will include a "Frequent Upgrade Points" promotion. Customers who purchase upgrades to Windows, Office, or other Microsoft "solutions" will receive "frequent upgrade points" (FUPs) when they register online. These points, like Frequent Flyer Miles, can be redeemed in the future for discounts on other Microsoft upgrades. This program, combined with the fact that older versions of some Microsoft programs have glaring Y2K problems, should be enough to convince many people to shell out big bucks to upgrade to a more bloated Microsoft operating system. The company hopes to eradicate 99% of Windows 3.x installations by 2003. | |
Invasion of the Dancing Penguin Those annoying, dancing cartoon characters embedded in software applications are no longer confined to Microsoft programs. They have entered the realm of Linux. A new Linux distribution under development, called LinTux, promises to provide a more "user-friendly" environment through its "Dancing Penguin" assistant. Dancing Tux will "guide" users through the installation process and will be a permanent fixture of the X root window. The LinTux staff demonstrated a prototype version of the Dancing Tux program to this Humorix reporter. It was certainly impressive, but, like the Dancing Paper Clip in Microsoft Office, it becomes annoying very fast. The one redeeming feature of LinTux is that, when the system is idle, Dancing Tux becomes a make-shift screen saver. The animations included in the prototype were quite amusing. For instance, in one scene, Tux chases Bill Gates through an Antarctic backdrop. In another animation, Tux can be seen drinking beers with his penguin pals and telling Microsoft jokes. | |
Brief History Of Linux (#28) Free, Open, Libre, Whatever Software Eric S. Raymond's now famous paper, "The Cathedral and the Bazaar", set the stage for the lucrative business of giving software away. In CatB, ESR likened the software industry to an anarchistic bazaar, with each vendor looking out for himself, trying to hoodwink customers and fellow vendors. The produce vendor (i.e. Apple), for instance, felt no need to cooperate with the crystal-ball seller (Oracle) or the con artist hocking miracle drugs (Microsoft). Each kept their property and trade secrets to themselves, hoping to gain an edge and make money fast. "With enough eyeballs, all bug-ridden software programs are marketable," ESR observed. ESR contrasted the "caveat emptor" Bazaar to an idealistic Cathedral model used by free software developers. European cathedrals of medieval days were built block-by-block with extensive volunteer manpower from the surrounding community. Such projects were "open" in the sense that everybody could see their progress, and interested people could wander inside and offer comments or praise about construction methods. "Those medieval cathedrals are still standing," ESR mused. "But bazaars built in the 14th Century are long gone, a victim of their inferior nature." | |
Look Out! It's Microsoft Outlook An old maxim in the Unix community states, "All programs expand until they can read mail... except Microsoft Outlook." Well, that's no longer true. By taking advantage of loopholes in several undocumented APIs, a team of geeks were able to transform Outlook from a virus-delivery system into an actual mail client. "It was quite a feat to accomplish this," said one of the geeks. "I mean, the rat's nest that is the Windows API can be used to frighten small children... or adults. And the frequency by which Outlook exploits are discovered is directly proportional to the number of times Bill Gates uses the word 'innovation'. But this is the first time somebody has discovered a beneficial exploit." Microsoft has vowed to release a patch to fix the uncovered security flaws. "We simply cannot tolerate unauthorized reverse engineering and hacking of our innovative solutions. Our Security Response Team will pull an all-nighter to eliminate these known issues." | |
Microsoft Fights Linux -- By Contributing Kernel Patches If you can't beat 'em, join 'em... and then destory 'em. That seems to be the new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or patent war, Microsoft operatives are doing something totally out of character: they are contributing patches for the Linux kernel and other programs. Don't worry, Microsoft is still evil. It's all part of a massive denial of service attack against Linus Torvalds designed to bring kernel development to a standstill. By sending over 10,000 patches per minute by email to Linus and other top kernel hackers, Microsoft has exposed Linux's Achilles heel. "I can't believe this is happening!" one stressed-out kernel hacker said at a press conference on IRC. "If this goes on, we may have to conduct kernel development over some other network protocol, like avian carriers... Aw crap, there's smoke coming from my email server! Ahh... it can't handle the load!" At this point the developer cut off and we haven't heard from him since. At first Linus was unsure where the deluge of patches was coming from. But when he saw one patch to replace kernel panics with bluescreens, the source was pretty obvious. "Oh, and the fact that all of the patches are covered by Microsoft's GPL [Grossly Private License] was a dead giveaway, too," | |
Ted Turner Unveils All-Commercial Channel For years, the pundits have predicted that the Web would become more like television. However, media tycoon Ted Turner is pursuing the exact opposite. Taking a cue from pop-under advertisements, Flash ads, get-rich-quick spam emails, viral marketing, and "Gator" programs, Turner has unveiled "TCC", the Turner Commercial Channel, for cable TV. TCC will feature "shows" like "Best Commercials That You've Seen A Million Times", "Life Is A Slogan, Just Buy It", and "Name That Jingle". These shows will occupy about 30% of the screen, while several rows of marquees at the bottom will flash various advertising messages. An animated "TCC" watermark will float around the screen while corporate logos are flashed randomly in the corners. Meanwhile, "pop-up ads" will randomly appear that obscure the other ads. These pop-ups will sometimes be further obscured by meta-pop-ups. Likewise, corporate jingles will play in the background, interfering with other jingles and advertising sounds. | |
Linux Distro To Include Pre-Installed Security Holes Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired Bosses, will now include built-in security flaws to better compete with Microsoft programs. "The sheer popularity of Windows, Outlook, and IIS clearly shows that people demand security holes large enough to drive a truck through," said Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the consumer wants. Just as Microsoft stole ideas from Apple during the 1980's, we're stealing ideas from Microsoft today." Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a mail reader that automatically executes (with root privileges) e-mail attachments coded in Perl, JavaScript, Python, and Visual Basic. "Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill. "Now PHBs won't have to stick with Windows in order to have their confidential files secretly emailed to their colleagues by a worm. Better yet, this capability allows viruses to automagically delete unnecessary files to save disk space without wasting the PHB's valuable time. | |
"Existence of programs that do the impossible is not a proof that that "impossible" is now possible." - Tigran Aivazian | |
<Reed> It is important to note that the primary reason the Roman Empire fail is that they had no concept of zero... thus they could not test the success or failure of their C programs. | |
The justifications for drug testing are part of the presently fashionable debate concerning restoring America's "competitiveness." Drugs, it has been revealed, are responsible for rampant absenteeism, reduced output, and poor quality work. But is drug testing in fact rationally related to the resurrection of competitiveness? Will charging the atmosphere of the workplace with the fear of excretory betrayal honestly spur productivity? Much noise has been made about rehabilitating the worker using drugs, but to date the vast majority of programs end with the simple firing or the not hiring of the abuser. This practice may exacerbate, not alleviate, the nation's productivity problem. If economic rehabilitation is the ultimate goal of drug testing, then criteria abandoning the rehabilitation of the drug-using worker is the purest of hypocrisy and the worst of rationalization. -- The concluding paragraph of "Constitutional Law: The Fourth Amendment and Drug Testing in the Workplace," Tim Moore, Harvard Journal of Law & Public Policy, vol. 10, No. 3 (Summer 1987), pp. 762-768. | |
I don't know why, but first C programs tend to look a lot worse than first programs in any other language (maybe except for fortran, but then I suspect all fortran programs look like `firsts') -- Olaf Kirch | |
When you have 200 programmers trying to write code for one product, like Win95 or NT, what you get is a multipule personality program. By definition, the real problem is that these programs are psychotic by nature and make people crazy when they use them. -- Joan Brewer on alt.destroy.microsoft | |
Arnold's Laws of Documentation: (1) If it should exist, it doesn't. (2) If it does exist, it's out of date. (3) Only documentation for useless programs transcends the first two laws. | |
We knew from experience that the essence of communal computing, as supplied by remote-access, time-shared machines, is not just to type programs into a terminal instead of a keypunch, but to encourage close communication. -- Dennis Ritchie | |
The reason I like hitching a ride on strict vars is that it cuts down the number of rarely used pragmas people have to remember, yet provides a way to get to the point where we might, just maybe, someday, make local lexicals the default for everyone, without having useless pragmas wandering around various programs, or using up another bit in $^H. -- Larry Wall in <199710050130.SAA04762@wall.org> |