Proverbs, aphorisms, quotations (English) | by Linux fortune |
I played lead guitar in a band called The Federal Duck, which is the kind of name that was popular in the '60s as a result of controlled substances being in widespread use. Back then, there were no restrictions, in terms of talent, on who could make an album, so we made one, and it sounds like a group of people who have been given powerful but unfamiliar instruments as a therapy for a degenerative nerve disease. -- Dave Barry, "The Snake" | |
A manager was about to be fired, but a programmer who worked for him invented a new program that became popular and sold well. As a result, the manager retained his job. The manager tried to give the programmer a bonus, but the programmer refused it, saying, "I wrote the program because I though it was an interesting concept, and thus I expect no reward." The manager, upon hearing this, remarked, "This programmer, though he holds a position of small esteem, understands well the proper duty of an employee. Lets promote him to the exalted position of management consultant!" But when told this, the programmer once more refused, saying, "I exist so that I can program. If I were promoted, I would do nothing but waste everyone's time. Can I go now? I have a program that I'm working on." -- Geoffrey James, "The Tao of Programming" | |
All programmers are optimists. Perhaps this modern sorcery especially attracts those who believe in happy endings and fairy godmothers. Perhaps the hundreds of nitty frustrations drive away all but those who habitually focus on the end goal. Perhaps it is merely that computers are young, programmers are younger, and the young are always optimists. But however the selection process works, the result is indisputable: "This time it will surely run," or "I just found the last bug." -- Frederick Brooks, "The Mythical Man Month" | |
Dear Sir, I am firmly opposed to the spread of microchips either to the home or to the office, We have more than enough of them foisted upon us in public places. They are a disgusting Americanism, and can only result in the farmers being forced to grow smaller potatoes, which in turn will cause massive un- employment in the already severely depressed agricultural industry. Yours faithfully, Capt. Quinton D'Arcy, J.P. Sevenoaks -- Letters To The Editor, The Times of London | |
**** IMPORTANT **** ALL USERS PLEASE NOTE **** Due to a recent systems overload error your recent disk files have been erased. Therefore, in accordance with the UNIX Basic Manual, University of Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised Federal Communications Act, you are being granted Temporary Disk Space, valid for three months from this date, subject to the restrictions set forth in Appendix II of the Federal Communications Handbook (18th edition) as well as the references mentioned herein. You may apply for more disk space at any time. Disk usage in or above the eighth percentile will secure the removal of all restrictions and you will immediately receive your permanent disk space. Disk usage in the sixth or seventh percentile will not effect the validity of your temporary disk space, though its expiration date may be extended for a period of up to three months. A score in the fifth percentile or below will result in the withdrawal of your Temporary Disk space. | |
It is a very humbling experience to make a multimillion-dollar mistake, but it is also very memorable. I vividly recall the night we decided how to organize the actual writing of external specifications for OS/360. The manager of architecture, the manager of control program implementation, and I were threshing out the plan, schedule, and division of responsibilities. The architecture manager had 10 good men. He asserted that they could write the specifications and do it right. It would take ten months, three more than the schedule allowed. The control program manager had 150 men. He asserted that they could prepare the specifications, with the architecture team coordinating; it would be well-done and practical, and he could do it on schedule. Furthermore, if the architecture team did it, his 150 men would sit twiddling their thumbs for ten months. To this the architecture manager responded that if I gave the control program team the responsibility, the result would not in fact be on time, but would also be three months late, and of much lower quality. I did, and it was. He was right on both counts. Moreover, the lack of conceptual integrity made the system far more costly to build and change, and I would estimate that it added a year to debugging time. -- Frederick Brooks Jr., "The Mythical Man Month" | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A.L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4. | |
Passwords are implemented as a result of insecurity. | |
Speaking as someone who has delved into the intricacies of PL/I, I am sure that only Real Men could have written such a machine-hogging, cycle-grabbing, all-encompassing monster. Allocate an array and free the middle third? Sure! Why not? Multiply a character string times a bit string and assign the result to a float decimal? Go ahead! Free a controlled variable procedure parameter and reallocate it before passing it back? Overlay three different types of variable on the same memory location? Anything you say! Write a recursive macro? Well, no, but Real Men use rescan. How could a language so obviously designed and written by Real Men not be intended for Real Man use? | |
There has also been some work to allow the interesting use of macro names. For example, if you wanted all of your "creat()" calls to include read permissions for everyone, you could say #define creat(file, mode) creat(file, mode | 0444) I would recommend against this kind of thing in general, since it hides the changed semantics of "creat()" in a macro, potentially far away from its uses. To allow this use of macros, the preprocessor uses a process that is worth describing, if for no other reason than that we get to use one of the more amusing terms introduced into the C lexicon. While a macro is being expanded, it is temporarily undefined, and any recurrence of the macro name is "painted blue" -- I kid you not, this is the official terminology -- so that in future scans of the text the macro will not be expanded recursively. (I do not know why the color blue was chosen; I'm sure it was the result of a long debate, spread over several meetings.) -- From Ken Arnold's "C Advisor" column in Unix Review | |
Do not allow this language (Ada) in its present state to be used in applications where reliability is critical, i.e., nuclear power stations, cruise missiles, early warning systems, anti-ballistic missle defense systems. The next rocket to go astray as a result of a programming language error may not be an exploratory space rocket on a harmless trip to Venus: It may be a nuclear warhead exploding over one of our cities. An unreliable programming language generating unreliable programs constitutes a far greater risk to our environment and to our society than unsafe cars, toxic pesticides, or accidents at nuclear power stations. - C. A. R. Hoare | |
It is a very humbling experience to make a multimillion-dollar mistake, but it is also very memorable. I vividly recall the night we decided how to organize the actual writing of external specifications for OS/360. The manager of architecture, the manager of control program implementation, and I were threshing out the plan, schedule, and division of responsibilities. The architecture manager had 10 good men. He asserted that they could write the specifications and do it right. It would take ten months, three more than the schedule allowed. The control program manager had 150 men. He asserted that they could prepare the specifications, with the architecture team coordinating; it would be well-done and practical, and he could do it on schedule. Futhermore, if the architecture team did it, his 150 men would sit twiddling their thumbs for ten months. To this the architecture manager responded that if I gave the control program team the responsibility, the result would not in fact be on time, but would also be three months late, and of much lower quality. I did, and it was. He was right on both counts. Moreover, the lack of conceptual integrity made the system far more costly to build and change, and I would estimate that it added a year to debugging time. - Frederick Brooks Jr., "The Mythical Man Month" | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4, 1973, pp. 382-400 | |
I judge a religion as being good or bad based on whether its adherents become better people as a result of practicing it. - Joe Mullally, computer salesman | |
As I argued in "Beloved Son", a book about my son Brian and the subject of religious communes and cults, one result of proper early instruction in the methods of rational thought will be to make sudden mindless conversions -- to anything -- less likely. Brian now realizes this and has, after eleven years, left the sect he was associated with. The problem is that once the untrained mind has made a formal commitment to a religious philosophy -- and it does not matter whether that philosophy is generally reasonable and high-minded or utterly bizarre and irrational -- the powers of reason are suprisingly ineffective in changing the believer's mind. - Steve Allen, comdeian, from an essay in the book "The Courage of Conviction", edited by Philip Berman | |
"It is better to have tried and failed than to have failed to try, but the result's the same." - Mike Dennison | |
"Pseudocode can be used to some extent to aid the maintenance process. However, pseudocode that is highly detailed - approaching the level of detail of the code itself - is not of much use as maintenance documentation. Such detailed documentation has to be maintained almost as much as the code, thus doubling the maintenance burden. Furthermore, since such voluminous pseudocode is too distracting to be kept in the listing itself, it must be kept in a separate folder. The result: Since pseudocode - unlike real code - doesn't have to be maintained, no one will maintain it. It will soon become out of date and everyone will ignore it. (Once, I did an informal survey of 42 shops that used pseudocode. Of those 42, 0 [zero!], found that it had any value as maintenance documentation." --Meilir Page-Jones, "The Practical Guide to Structured Design", Yourdon Press (c) 1988 | |
In respect to lock-making, there can scarcely be such a thing as dishonesty of intention: the inventor produces a lock which he honestly thinks will possess such and such qualities; and he declares his belief to the world. If others differ from him in opinion concerning those qualities, it is open to them to say so; and the discussion, truthfully conducted, must lead to public advantage: the discussion stimulates curiosity, and curiosity stimu- lates invention. Nothing but a partial and limited view of the question could lead to the opinion that harm can result: if there be harm, it will be much more than counterbalanced by good." -- Charles Tomlinson's Rudimentary Treatise on the Construction of Locks, published around 1850. | |
"The net result is a system that is not only binary compatible with 4.3 BSD, but is even bug for bug compatible in almost all features." -- Avadit Tevanian, Jr., "Architecture-Independent Virtual Memory Management for Parallel and Distributed Environments: The Mach Approach" | |
HOW TO PROVE IT, PART 7 proof by forward reference: Reference is usually to a forthcoming paper of the author, which is often not as forthcoming as at first. proof by semantic shift: Some of the standard but inconvenient definitions are changed for the statement of the result. proof by appeal to intuition: Cloud-shaped drawings frequently help here. | |
Nothing in life is so exhilarating as to be shot at without result. -- Winston Churchill Next to being shot at and missed, nothing is really quite as satisfying as an income tax refund. -- F.J. Raymond | |
broad-mindedness, n: The result of flattening high-mindedness out. | |
Finagle's Eighth Law: If an experiment works, something has gone wrong. Finagle's Ninth Law: No matter what results are expected, someone is always willing to fake it. Finagle's Tenth Law: No matter what the result someone is always eager to misinterpret it. Finagle's Eleventh Law: No matter what occurs, someone believes it happened according to his pet theory. | |
Finagle's Second Law: No matter what the anticipated result, there will always be someone eager to (a) misinterpret it, (b) fake it, or (c) believe it happened according to his own pet theory. | |
Law of Communications: The inevitable result of improved and enlarged communications between different levels in a hierarchy is a vastly increased area of misunderstanding. | |
Rhode's Law: When any principle, law, tenet, probability, happening, circumstance, or result can in no way be directly, indirectly, empirically, or circuitously proven, derived, implied, inferred, induced, deducted, estimated, or scientifically guessed, it will always for the purpose of convenience, expediency, political advantage, material gain, or personal comfort, or any combination of the above, or none of the above, be unilaterally and unequivocally assumed, proclaimed, and adhered to as absolute truth to be undeniably, universally, immutably, and infinitely so, until such time as it becomes advantageous to assume otherwise, maybe. | |
Zero Defects, n.: The result of shutting down a production line. | |
How much of their influence on you is a result of your influence on them? | |
Q: How many lawyers does it take to change a light bulb? A: Whereas the party of the first part, also known as "Lawyer", and the party of the second part, also known as "Light Bulb", do hereby and forthwith agree to a transaction wherein the party of the second part shall be removed from the current position as a result of failure to perform previously agreed upon duties, i.e., the lighting, elucidation, and otherwise illumination of the area ranging from the front (north) door, through the entryway, terminating at an area just inside the primary living area, demarcated by the beginning of the carpet, any spillover illumination being at the option of the party of the second part and not required by the aforementioned agreement between the parties. The aforementioned removal transaction shall include, but not be limited to, the following. The party of the first part shall, with or without elevation at his option, by means of a chair, stepstool, ladder or any other means of elevation, grasp the party of the second part and rotate the party of the second part in a counter-clockwise direction, this point being tendered non-negotiable. Upon reaching a point where the party of the second part becomes fully detached from the receptacle, the party of the first part shall have the option of disposing of the party of the second part in a manner consistent with all relevant and applicable local, state and federal statutes. Once separation and disposal have been achieved, the party of the first part shall have the option of beginning installation. Aforesaid installation shall occur in a manner consistent with the reverse of the procedures described in step one of this self-same document, being careful to note that the rotation should occur in a clockwise direction, this point also being non-negotiable. The above described steps may be performed, at the option of the party of the first part, by any or all agents authorized by him, the objective being to produce the most possible revenue for the Partnership. | |
An architect's first work is apt to be spare and clean. He knows he doesn't know what he's doing, so he does it carefully and with great restraint. As he designs the first work, frill after frill and embellishment after embellishment occur to him. These get stored away to be used "next time." Sooner or later the first system is finished, and the architect, with firm confidence and a demonstrated mastery of that class of systems, is ready to build a second system. This second is the most dangerous system a man ever designs. When he does his third and later ones, his prior experiences will confirm each other as to the general characteristics of such systems, and their differences will identify those parts of his experience that are particular and not generalizable. The general tendency is to over-design the second system, using all the ideas and frills that were cautiously sidetracked on the first one. The result, as Ovid says, is a "big pile." -- Frederick Brooks, "The Mythical Man Month" | |
I do hate sums. There is no greater mistake than to call arithmetic an exact science. There are permutations and aberrations discernible to minds entirely noble like mine; subtle variations which ordinary accountants fail to discover; hidden laws of number which it requires a mind like mine to perceive. For instance, if you add a sum from the bottom up, and then again from the top down, the result is always different. -- Mrs. La Touche | |
It's hard to think of you as the end result of millions of years of evolution. | |
The Three Major Kind of Tools * Tools for hittings things to make them loose or to tighten them up or jar their many complex, sophisticated electrical parts in such a manner that they function perfectly. (These are your hammers, maces, bludgeons, and truncheons.) * Tools that, if dropped properly, can penetrate your foot. (Awls) * Tools that nobody should ever use because the potential danger is far greater than the value of any project that could possibly result. (Power saws, power drills, power staplers, any kind of tool that uses any kind of power more advanced than flashlight batteries.) -- Dave Barry, "The Taming of the Screw" | |
Operation Desert Slash WASHINGTON, D.C. -- High officials in the US military are planning on putting the 'Slashdot Effect' to use against Iraq. Pentagon computer experts think that the Slashdot Effect could topple key Net-connected Iraqi computer systems. Such a Denial of Service attack could prove instrumental when the US invades. One Pentagon official said, "If I had a million dollars for every server that crashed as a result of being linked on Slashdot, I'd be richer than Bill Gates. The Slashdot Effect is a very powerful weapon that the US military wants to tap into." Rob Malda has been contacted by top military brass. According to anonymous sources, Malda will play a key part in the so-called "Operation Desert Slash". Supposedly Malda will post several Slashdot articles with links to critical Iraqi websites right when the US invasion is set to begin. Meanwhile, Pentagon operatives will begin a series of Denial of Service attacks on other key Iraqi computer systems. One source notes, "Since many Iraqi systems rely on Microsoft software, this task should be relatively simple." | |
Jargon Coiner (#2) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * SLASHDUP EFFECT, THE: Accidentally posting two or more duplicate comments to Slashdot, usually as the result of hitting ENTER at the wrong time or fumbling with the Preview option. * YOU'VE GOT SLOGAN: The tendency for reporters to parody the stupid "You've Got Mail" saying when writing about AOL. Example: "You've Got Spam", "You've Got Merger" (the headline for an article about the Netscape/AOL Merger From Hell) * PENGUINIZATION: Ongoing trend to slap a picture of Tux Penguin next to anything even remotely related to Linux. * IDLESURF: Aimless surfing of the Internet; looking for something interesting to read while killing time. Often involves reloaded the Slashdot homepage every 5 minutes to see if a new article has been posted. | |
Jargon Coiner (#6) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * STOP MIRAGE: Trying to click on an imaginary Stop button on a program's toolbar after doing something you didn't want to. Usually caused as the result of excessive use of Netscape. * YA-PREFIX: Putting "another" or "yet another" in front of a name or tacking "YA" in front of an acronym. Example: "We could ya-prefix this fortune by titling it 'Yet Another Lame List of Fabricated Jargon'." * DOMAINEERING: Using a service like Netcraft to determine what operating system and webserver a particular domain is running. * NOT-A-SALTINE EXPLANATION: The canned response given to someone who uses the term "hacker" instead of "cracker". | |
The Blue Screen Of Advocacy The Federal Bureau of Investigation & Privacy Violations has issued a national advisory warning computer stores to be on the lookout for the "Bluescreen Bandits". These extreme Linux zealots go from store to store and from computer to computer typing in "C:\CON\CON" and causing the demo machines to crash and display the Blue Screen Of Death. Efforts to apprehend the bandits have so far been unsuccessful. The outlaws were caught on tape at a CompUSSR location in Southern California, but in an ironic twist, the surveillance system bluescreened just before the penguinistas came into clear view. "We don't have many clues. It's not clear whether a small group is behind the bluescreen vandalism, or whether hundreds or even thousands of geek zealots are involved," said the manager of a Capacitor City store. The manager has good reason to be upset. The bluescreen raid was the top story in the local newspaper and quickly became a hot topic of discussion. As a result, the local school board halted its controversial plans to migrate their computers from Macs to PCs. | |
Severe Acronym Shortage Cripples Computer Industry SILICON VALLEY, CALIFORNIA (SVC) -- According to a recent study by the Blartner Group, 99.5% of all possible five letter combinations have already been appropriated for computer industry acronyms. The impending shortage of 5LC's is casting a dark shadow over the industry, which relies heavily on short, easy-to-remember acronyms for everything. "Acronym namespace collisions (ANCs) are increasing at a fantastic rate and threaten the very fabric of the computing world," explained one ZD pundit. "For example, when somebody talks about XP, I don't know whether they mean eXtreme Programming or Microsoft's eXceptionally Pathetic operating system. We need to find a solution now or chaos will result." Leaders of several SVC companies have floated the idea of an "industry-wide acronym conservation protocol" (IWACP -- one of the few 5LCs not already appropriated). Explained Bob Smith, CTO of IBM, "If companies would voluntarily limit the creation of new acronyms while recycling outdated names, we could reduce much of the pollution within the acronym namespace ourselves. The last thing we want is for Congress to get involved and try to impose a solution for this SAS (Severe Acronym Shortage) that would likely only create many new acronyms in the process." | |
Most people have a furious itch to talk about themselves and are restrained only by the disinclination of others to listen. Reserve is an artificial quality that is developed in most of us as the result of innumerable rebuffs. -- W.S. Maugham | |
People often find it easier to be a result of the past than a cause of the future. | |
My ritual differs slightly. What I do, first thing [in the morning], is I hop into the shower stall. Then I hop right back out, because when I hopped in I landed barefoot right on top of See Threepio, a little plastic robot character from "Star Wars" whom my son, Robert, likes to pull the legs off of while he showers. Then I hop right back into the stall because our dog, Earnest, who has been alone in the basement all night building up powerful dog emotions, has come bounding and quivering into the bathroom and wants to greet me with 60 or 70 thousand playful nips, any one of which -- bear in mind that I am naked and, without my contact lenses, essentially blind -- could result in the kind of injury where you have to learn a whole new part if you want to sing the "Messiah," if you get my drift. Then I hop right back out, because Robert, with that uncanny sixth sense some children have -- you cannot teach it; they either have it or they don't -- has chosen exactly that moment to flush one of the toilets. Perhaps several of them. -- Dave Barry | |
NEW YORK (CNN) -- Internet users who spend even a few hours a week online at home experience higher levels of depression and loneliness than if they had used the computer network less frequently, The New York Times reported Sunday. The result ... surprised both researchers and sponsors, which included Intel Corp., Hewlett Packard, AT&T Research and Apple Computer. | |
We should realize that a city is better off with bad laws, so long as they remain fixed, then with good laws that are constantly being altered, that the lack of learning combined with sound common sense is more helpful than the kind of cleverness that gets out of hand, and that as a general rule, states are better governed by the man in the street than by intellectuals. These are the sort of people who want to appear wiser than the laws, who want to get their own way in every general discussion, because they feel that they cannot show off their intelligence in matters of greater importance, and who, as a result, very often bring ruin on their country. -- Cleon, Thucydides, III, 37 translation by Rex Warner | |
It is only by risking our persons from one hour to another that we live at all. And often enough our faith beforehand in an uncertified result is the only thing that makes the result come true. -- William James | |
Take time to reflect on all the things you have, not as a result of your merit or hard work or because God or chance or the efforts of other people have given them to you. | |
What they said: What they meant: "If you knew this person as well as I know him, you would think as much of him as I do." (Or as little, to phrase it slightly more accurately.) "Her input was always critical." (She never had a good word to say.) "I have no doubt about his capability to do good work." (And it's nonexistent.) "This candidate would lend balance to a department like yours, which already has so many outstanding members." (Unless you already have a moron.) "His presentation to my seminar last semester was truly remarkable: one unbelievable result after another." (And we didn't believe them, either.) "She is quite uniform in her approach to any function you may assign her." (In fact, to life in general...) | |
Boss: You forgot to assign the result of your map! Hacker: Dang, I'm always forgetting my assignations... Boss: And what's that "goto" doing there?!? Hacker: Er, I guess my finger slipped when I was typing "getservbyport"... Boss: Ah well, accidents will happen. Maybe we should have picked APL. -- Larry Wall in <199710311732.JAA19169@wall.org> |