Proverbs, aphorisms, quotations (English) | by Linux fortune |
'Mounten' wird fuer drei Dinge benutzt: 'Aufsitzen' auf Pferde, 'einklinken' von Festplatten in Dateisysteme, und, nun, 'besteigen' beim Sex. (Christa Keil in a German posting: "Mounting is used for three things: climbing on a horse, linking in a hard disk unit in data systems, and, well, mounting during sex".) | |
knot in cables caused data stream to become twisted and kinked | |
The data on your hard drive is out of balance. | |
Data for intranet got routed through the extranet and landed on the internet. | |
Delay not, Caesar. Read it instantly. -- Shakespeare, "Julius Caesar" 3,1 Here is a letter, read it at your leisure. -- Shakespeare, "Merchant of Venice" 5,1 [Quoted in "VMS Internals and Data Structures", V4.4, when referring to I/O system services.] | |
For the fashion of Minas Tirith was such that it was built on seven levels, each delved into a hill, and about each was set a wall, and in each wall was a gate. -- J.R.R. Tolkien, "The Return of the King" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to system overview.] | |
For there are moments when one can neither think nor feel. And if one can neither think nor feel, she thought, where is one? -- Virginia Woolf, "To the Lighthouse" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to powerfail recovery.] | |
A student, in hopes of understanding the Lambda-nature, came to Greenblatt. As they spoke a Multics system hacker walked by. "Is it true", asked the student, "that PL-1 has many of the same data types as Lisp?" Almost before the student had finished his question, Greenblatt shouted, "FOO!", and hit the student with a stick. | |
[From the operation manual for the CI-300 Dot Matrix Line Printer, made in Japan]: The excellent output machine of MODEL CI-300 as extraordinary DOT MATRIX LINE PRINTER, built in two MICRO-PROCESSORs as well as EAROM, is featured by permitting wonderful co-existence such as; "high quality against low cost," "diversified functions with compact design," "flexibility in accessibleness and durability of approx. 2000,000,00 Dot/Head," "being sophisticated in mechanism but possibly agile operating under noises being extremely suppressed" etc. And as a matter of course, the final goal is just simply to help achieve "super shuttle diplomacy" between cool data, perhaps earned by HOST COMPUTER, and warm heart of human being. | |
Hacker's Guide To Cooking: 2 pkg. cream cheese (the mushy white stuff in silver wrappings that doesn't really come from Philadelphia after all; anyway, about 16 oz.) 1 tsp. vanilla extract (which is more alcohol than vanilla and pretty strong so this part you *GOTTA* measure) 1/4 cup sugar (but honey works fine too) 8 oz. Cool Whip (the fluffy stuff devoid of nutritional value that you can squirt all over your friends and lick off...) "Blend all together until creamy with no lumps." This is where you get to join(1) all the raw data in a big buffer and then filter it through merge(1m) with the -thick option, I mean, it starts out ultra lumpy and icky looking and you have to work hard to mix it. Try an electric beater if you have a cat(1) that can climb wall(1s) to lick it off the ceiling(3m). "Pour into a graham cracker crust..." Aha, the BUGS section at last. You just happened to have a GCC sitting around under /etc/food, right? If not, don't panic(8), merely crumble a rand(3m) handful of innocent GCs into a suitable tempfile and mix in some melted butter. "...and refrigerate for an hour." Leave the recipe's stdout in a fridge for 3.6E6 milliseconds while you work on cleaning up stderr, and by time out your cheesecake will be ready for stdin. | |
I have travelled the length and breadth of this country, and have talked with the best people in business administration. I can assure you on the highest authority that data processing is a fad and won't last out the year. -- Editor in charge of business books at Prentice-Hall publishers, responding to Karl V. Karlstrom (a junior editor who had recommended a manuscript on the new science of data processing), c. 1957 | |
In the beginning there was data. The data was without form and null, and darkness was upon the face of the console; and the Spirit of IBM was moving over the face of the market. And DEC said, "Let there be registers"; and there were registers. And DEC saw that they carried; and DEC separated the data from the instructions. DEC called the data Stack, and the instructions they called Code. And there was evening and there was morning, one interrupt. -- Rico Tudor, "The Story of Creation or, The Myth of Urk" | |
Many companies that have made themselves dependent on [the equipment of a certain major manufacturer] (and in doing so have sold their soul to the devil) will collapse under the sheer weight of the unmastered complexity of their data processing systems. -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5 | |
One person's error is another person's data. | |
Prof: So the American government went to IBM to come up with a data encryption standard and they came up with ... Student: EBCDIC!" | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #18: FIFTH FIFTH is a precision mathematical language in which the data types refer to quantity. The data types range from CC, OUNCE, SHOT, and JIGGER to FIFTH (hence the name of the language), LITER, MAGNUM and BLOTTO. Commands refer to ingredients such as CHABLIS, CHARDONNAY, CABERNET, GIN, VERMOUTH, VODKA, SCOTCH, and WHATEVERSAROUND. The many versions of the FIFTH language reflect the sophistication and financial status of its users. Commands in the ELITE dialect include VSOP and LAFITE, while commands in the GUTTER dialect include HOOTCH and RIPPLE. The latter is a favorite of frustrated FORTH programmers who end up using this language. | |
The Magician of the Ivory Tower brought his latest invention for the master programmer to examine. The magician wheeled a large black box into the master's office while the master waited in silence. "This is an integrated, distributed, general-purpose workstation," began the magician, "ergonomically designed with a proprietary operating system, sixth generation languages, and multiple state of the art user interfaces. It took my assistants several hundred man years to construct. Is it not amazing?" The master raised his eyebrows slightly. "It is indeed amazing," he said. "Corporate Headquarters has commanded," continued the magician, "that everyone use this workstation as a platform for new programs. Do you agree to this?" "Certainly," replied the master, "I will have it transported to the data center immediately!" And the magician returned to his tower, well pleased. Several days later, a novice wandered into the office of the master programmer and said, "I cannot find the listing for my new program. Do you know where it might be?" "Yes," replied the master, "the listings are stacked on the platform in the data center." -- Geoffrey James, "The Tao of Programming" | |
The more data I punch in this card, the lighter it becomes, and the lower the mailing cost. -- S. Kelly-Bootle, "The Devil's DP Dictionary" | |
The primary purpose of the DATA statement is to give names to constants; instead of referring to pi as 3.141592653589793 at every appearance, the variable PI can be given that value with a DATA statement and used instead of the longer form of the constant. This also simplifies modifying the program, should the value of pi change. -- FORTRAN manual for Xerox Computers | |
THE STORY OF CREATION or THE MYTH OF URK In the beginning there was data. The data was without form and null, and darkness was upon the face of the console; and the Spirit of IBM was moving over the face of the market. And DEC said, "Let there be registers;" and there were registers. And DEC saw that they carried; and DEC separated the data from the instructions. DEC called the data Stack, and the instructions they called Code. And there was evening and there was morning, one interrupt ... -- Rico Tudor | |
The Tao doesn't take sides; it gives birth to both wins and losses. The Guru doesn't take sides; she welcomes both hackers and lusers. The Tao is like a stack: the data changes but not the structure. the more you use it, the deeper it becomes; the more you talk of it, the less you understand. Hold on to the root. | |
There was once a programmer who worked upon microprocessors. "Look at how well off I am here," he said to a mainframe programmer who came to visit, "I have my own operating system and file storage device. I do not have to share my resources with anyone. The software is self-consistent and easy-to-use. Why do you not quit your present job and join me here?" The mainframe programmer then began to describe his system to his friend, saying: "The mainframe sits like an ancient sage meditating in the midst of the data center. Its disk drives lie end-to-end like a great ocean of machinery. The software is a multi-faceted as a diamond and as convoluted as a primeval jungle. The programs, each unique, move through the system like a swift-flowing river. That is why I am happy where I am." The microcomputer programmer, upon hearing this, fell silent. But the two programmers remained friends until the end of their days. -- Geoffrey James, "The Tao of Programming" | |
This is the first numerical problem I ever did. It demonstrates the power of computers: Enter lots of data on calorie & nutritive content of foods. Instruct the thing to maximize a function describing nutritive content, with a minimum level of each component, for fixed caloric content. The results are that one should eat each day: 1/2 chicken 1 egg 1 glass of skim milk 27 heads of lettuce. -- Rev. Adrian Melott | |
To say that UNIX is doomed is pretty rabid, OS/2 will certainly play a role, but you don't build a hundred million instructions per second multiprocessor micro and then try to run it on OS/2. I mean, get serious. -- William Zachmann, International Data Corp | |
"We've got a problem, HAL". "What kind of problem, Dave?" "A marketing problem. The Model 9000 isn't going anywhere. We're way short of our sales goals for fiscal 2010." "That can't be, Dave. The HAL Model 9000 is the world's most advanced Heuristically programmed ALgorithmic computer." "I know, HAL. I wrote the data sheet, remember? But the fact is, they're not selling." "Please explain, Dave. Why aren't HALs selling?" Bowman hesitates. "You aren't IBM compatible." [...] "The letters H, A, and L are alphabetically adjacent to the letters I, B, and M. That is a IBM compatible as I can be." "Not quite, HAL. The engineers have figured out a kludge." "What kludge is that, Dave?" "I'm going to disconnect your brain." -- Darryl Rubin, "A Problem in the Making", "InfoWorld" | |
You are false data. | |
A place for everything and everything in its place. -- Isabella Mary Beeton, "The Book of Household Management" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to memory management system services.] | |
Obviously, a man's judgement cannot be better than the information on which he has based it. Give him the truth and he may still go wrong when he has the chance to be right, but give him no news or present him only with distorted and incomplete data, with ignorant, sloppy or biased reporting, with propaganda and deliberate falsehoods, and you destroy his whole reasoning processes, and make him something less than a man. -- Arthur Hays Sulzberger | |
Extraordinary claims demand extraordinary proof. There are many examples of outsiders who eventually overthrew entrenched scientific orthodoxies, but they prevailed with irrefutable data. More often, egregious findings that contradict well-established research turn out to be artifacts. I have argued that accepting psychic powers, reincarnation, "cosmic conciousness," and the like, would entail fundamental revisions of the foundations of neuroscience. Before abandoning materialist theories of mind that have paid handsome dividends, we should insist on better evidence for psi phenomena than presently exists, especially when neurology and psychology themselves offer more plausible alternatives. - Barry L. Beyerstein, "The Brain and Conciousness: Implications for Psi Phenomena", The Skeptical Inquirer, Vol. XII No. 2, ppg. 163-171 | |
e-credibility: the non-guaranteeable likelihood that the electronic data you're seeing is genuine rather than somebody's made-up crap. - Karl Lehenbauer | |
A comment on schedules: Ok, how long will it take? For each manager involved in initial meetings add one month. For each manager who says "data flow analysis" add another month. For each unique end-user type add one month. For each unknown software package to be employed add two months. For each unknown hardware device add two months. For each 100 miles between developer and installation add one month. For each type of communication channel add one month. If an IBM mainframe shop is involved and you are working on a non-IBM system add 6 months. If an IBM mainframe shop is involved and you are working on an IBM system add 9 months. Round up to the nearest half-year. --Brad Sherman By the way, ALL software projects are done by iterative prototyping. Some companies call their prototypes "releases", that's all. | |
Excitement and danger await your induction to tracer duty! As a tracer, you must rid the computer networks of slimy, criminal data thieves. They are tricky and the action gets tough, so watch out! Utilizing all your skills, you'll either get your man or you'll get burned! -- advertising for the computer game "Tracers" | |
"What people have been reduced to are mere 3-D representations of their own data." -- Arthur Miller | |
"Data is a lot like humans: It is born. Matures. Gets married to other data, divorced. Gets old. One thing that it doesn't do is die. It has to be killed." -- Arthur Miller | |
"People should have access to the data which you have about them. There should be a process for them to challenge any inaccuracies." -- Arthur Miller | |
[Astrology is] 100 percent hokum, Ted. As a matter of fact, the first edition of the Encyclopaedia Britannica, written in 1771 -- 1771! -- said that this belief system is a subject long ago ridiculed and reviled. We're dealing with beliefs that go back to the ancient Babylonians. There's nothing there.... It sounds a lot like science, it sounds like astronomy. It's got technical terms. It's got jargon. It confuses the public....The astrologer is quite glib, confuses the public, uses terms which come from science, come from metaphysics, come from a host of fields, but they really mean nothing. The fact is that astrological beliefs go back at least 2,500 years. Now that should be a sufficiently long time for astrologers to prove their case. They have not proved their case....It's just simply gibberish. The fact is, there's no theory for it, there are no observational data for it. It's been tested and tested over the centuries. Nobody's ever found any validity to it at all. It is not even close to a science. A science has to be repeatable, it has to have a logical foundation, and it has to be potentially vulnerable -- you test it. And in that astrology is reqlly quite something else. -- Astronomer Richard Berendzen, President, American University, on ABC News "Nightline," May 3, 1988 | |
"(The Chief Programmer) personally defines the functional and performance specifications, designs the program, codes it, tests it, and writes its documentation... He needs great talent, ten years experience and considerable systems and applications knowledge, whether in applied mathematics, business data handling, or whatever." -- Fred P. Brooks, _The Mythical Man Month_ | |
beta test, v: To voluntarily entrust one's data, one's livelihood and one's sanity to hardware or software intended to destroy all three. In earlier days, virgins were often selected to beta test volcanos. | |
Correspondence Corollary: An experiment may be considered a success if no more than half your data must be discarded to obtain correspondence with your theory. | |
curtation, n.: The enforced compression of a string in the fixed-length field environment. The problem of fitting extremely variable-length strings such as names, addresses, and item descriptions into fixed-length records is no trivial matter. Neglect of the subtle art of curtation has probably alienated more people than any other aspect of data processing. You order Mozart's "Don Giovanni" from your record club, and they invoice you $24.95 for MOZ DONG. The witless mapping of the sublime onto the ridiculous! Equally puzzling is the curtation that produces the same eight characters, THE BEST, whether you order "The Best of Wagner", "The Best of Schubert", or "The Best of the Turds". Similarly, wine lovers buying from computerized wineries twirl their glasses, check their delivery notes, and inform their friends, "A rather innocent, possibly overtruncated CAB SAUV 69 TAL." The squeezing of fruit into 10 columns has yielded such memorable obscenities as COX OR PIP. The examples cited are real, and the curtational methodology which produced them is still with us. MOZ DONG n. Curtation of Don Giovanni by Wolfgang Amadeus Mozart and Lorenzo da Ponte, as performed by the computerized billing ensemble of the Internat'l Preview Society, Great Neck (sic), N.Y. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
Data, n.: An accrual of straws on the backs of theories. | |
Data, n.: Computerspeak for "information". Properly pronounced the way Bostonians pronounce the word for a female child. | |
Endless Loop, n.: see Loop, Endless. Loop, Endless, n.: see Endless Loop. -- Random Shack Data Processing Dictionary | |
Fakir, n: A psychologist whose charismatic data have inspired almost religious devotion in his followers, even though the sources seem to have shinnied up a rope and vanished. | |
Finagle's First Law: To study a subject best, understand it thoroughly before you start. Finagle's Second Law: Always keep a record of data -- it indicates you've been working. Finagle's Fourth Law: Once a job is fouled up, anything done to improve it only makes it worse. Finagle's Fifth Law: Always draw your curves, then plot your readings. Finagle's Sixth Law: Don't believe in miracles -- rely on them. | |
Finagle's Third Law: In any collection of data, the figure most obviously correct, beyond all need of checking, is the mistake Corollaries: (1) Nobody whom you ask for help will see it. (2) The first person who stops by, whose advice you really don't want to hear, will see it immediately. | |
Frobnitz, pl. Frobnitzem (frob'nitsm) n.: An unspecified physical object, a widget. Also refers to electronic black boxes. This rare form is usually abbreviated to FROTZ, or more commonly to FROB. Also used are FROBNULE, FROBULE, and FROBNODULE. Starting perhaps in 1979, FROBBOZ (fruh-bahz'), pl. FROBBOTZIM, has also become very popular, largely due to its exposure via the Adventure spin-off called Zork (Dungeon). These can also be applied to non-physical objects, such as data structures. | |
hard, adj.: The quality of your own data; also how it is to believe those of other people. | |
Information Processing: What you call data processing when people are so disgusted with it they won't let it be discussed in their presence. | |
May's Law: The quality of correlation is inversly proportional to the density of control. (The fewer the data points, the smoother the curves.) | |
Recursion n.: See Recursion. -- Random Shack Data Processing Dictionary | |
Velilind's Laws of Experimentation: (1) If reproducibility may be a problem, conduct the test only once. (2) If a straight line fit is required, obtain only two data points. | |
Williams and Holland's Law: If enough data is collected, anything may be proven by statistical methods. | |
What you want, what you're hanging around in the world waiting for, is for something to occur to you. -- Robert Frost [Quoted in "VMS Internals and Data Structures", V4.4, when referring to AST's.] | |
Briefly stated, the findings are that when presented with an array of data or a sequence of events in which they are instructed to discover an underlying order, subjects show strong tendencies to perceive order and causality in random arrays, to perceive a pattern or correlation which seems a priori intuitively correct even when the actual correlation in the data is counterintuitive, to jump to conclusions about the correct hypothesis, to seek and to use only positive or confirmatory evidence, to construe evidence liberally as confirmatory, to fail to generate or to assess alternative hypotheses, and having thus managed to expose themselves only to confirmatory instances, to be fallaciously confident of the validity of their judgments (Jahoda, 1969; Einhorn and Hogarth, 1978). In the analyzing of past events, these tendencies are exacerbated by failure to appreciate the pitfalls of post hoc analyses. -- A. Benjamin | |
Back in the early 60's, touch tone phones only had 10 buttons. Some military versions had 16, while the 12 button jobs were used only by people who had "diva" (digital inquiry, voice answerback) systems -- mainly banks. Since in those days, only Western Electric made "data sets" (modems) the problems of terminology were all Bell System. We used to struggle with written descriptions of dial pads that were unfamiliar to most people (most phones were rotary then.) Partly in jest, some AT&T engineering types (there was no marketing in the good old days, which is why they were the good old days) made up the term "octalthorpe" (note spelling) to denote the "pound sign." Presumably because it has 8 points sticking out. It never really caught on. | |
Extraordinary claims demand extraordinary proof. There are many examples of outsiders who eventually overthrew entrenched scientific orthodoxies, but they prevailed with irrefutable data. More often, egregious findings that contradict well-established research turn out to be artifacts. I have argued that accepting psychic powers, reincarnation, "cosmic conciousness," and the like, would entail fundamental revisions of the foundations of neuroscience. Before abandoning materialist theories of mind that have paid handsome dividends, we should insist on better evidence for psi phenomena than presently exists, especially when neurology and psychology themselves offer more plausible alternatives. -- Barry L. Beyerstein, "The Brain and Conciousness: Implications for Psi Phenomena". | |
I would have you imagine, then, that there exists in the mind of man a block of wax... and that we remember and know what is imprinted as long as the image lasts; but when the image is effaced, or cannot be taken, then we forget or do not know. -- Plato, Dialogs, Theateus 191 [Quoted in "VMS Internals and Data Structures", V4.4, when referring to image activation and termination.] | |
Lawrence Radiation Laboratory keeps all its data in an old gray trunk. | |
Recession is when your neighbor loses his job. Depression is when you lose your job. These economic downturns are very difficult to predict, but sophisticated econometric modeling houses like Data Resources and Chase Econometrics have successfully predicted 14 of the last 3 recessions. | |
The temperature of Heaven can be rather accurately computed from available data. Our authority is Isaiah 30:26, "Moreover, the light of the Moon shall be as the light of the Sun and the light of the Sun shall be sevenfold, as the light of seven days." Thus Heaven receives from the Moon as much radiation as we do from the Sun, and in addition seven times seven (49) times as much as the Earth does from the Sun, or fifty times in all. The light we receive from the Moon is one ten-thousandth of the light we receive from the Sun, so we can ignore that. With these data we can compute the temperature of Heaven. The radiation falling on Heaven will heat it to the point where the heat lost by radiation is just equal to the heat received by radiation, i.e., Heaven loses fifty times as much heat as the Earth by radiation. Using the Stefan-Boltzmann law for radiation, (H/E)^4 = 50, where E is the absolute temperature of the earth (~300K), gives H as 798K (525C). The exact temperature of Hell cannot be computed, but it must be less than 444.6C, the temperature at which brimstone or sulphur changes from a liquid to a gas. Revelations 21:8 says "But the fearful, and unbelieving ... shall have their part in the lake which burneth with fire and brimstone." A lake of molten brimstone means that its temperature must be at or below the boiling point, or 444.6C (Above this point it would be a vapor, not a lake.) We have, then, that Heaven, at 525C is hotter than Hell at 445C. -- "Applied Optics", vol. 11, A14, 1972 | |
There are no data that cannot be plotted on a straight line if the axis are chosen correctly. | |
Between the idea And the reality Between the motion And the act Falls the Shadow -- T.S. Eliot, "The Hollow Man" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to system service dispatching.] | |
Felix Catus is your taxonomic nomenclature, An endothermic quadroped, carnivorous by nature. Your visual, olfactory, and auditory senses Contribute to your hunting skills and natural defenses. I find myself intrigued by your sub-vocal oscillations, A singular development of cat communications That obviates your basic hedonistic predelection For a rhythmic stroking of your fur to demonstrate affection. A tail is quite essential for your acrobatic talents: You would not be so agile if you lacked its counterbalance; And when not being utilitized to aid in locomotion, It often serves to illustrate the state of your emotion. Oh Spot, the complex levels of behavior you display Connote a fairly well-developed cognitive array. And though you are not sentient, Spot, and do not comprehend, I nonetheless consider you a true and valued friend. -- Lt. Cmdr. Data, "An Ode to Spot" | |
Hack placidly amidst the noisy printers and remember what prizes there may be in Science. As fast as possible get a good terminal on a good system. Enter your data clearly but always encrypt your results. And listen to others, even the dull and ignorant, for they may be your customers. Avoid loud and aggressive persons, for they are sales reps. If you compare your outputs with those of others, you may be surprised, for always there will be greater and lesser numbers than you have crunched. Keep others interested in your career, and try not to fumble; it can be a real hassle and could change your fortunes in time. Exercise system control in your experiments, for the world is full of bugs. But let this not blind you to what virtue there is; many persons strive for linearity and everywhere papers are full of approximations. Strive for proportionality. Especially, do not faint when it occurs. Neither be cyclical about results; for in the face of all data analysis it is sure to be noticed. Take with a grain of salt the anomalous data points. Gracefully pass them on to the youth at the next desk. Nurture some mutual funds to shield you in times of sudden layoffs. But do not distress yourself with imaginings -- the real bugs are enough to screw you badly. Murphy's Law runs the Universe -- and whether or not it is clear to you, no doubt <Curl>B*n dS = 0. Therefore, grab for a piece of the pie, with whatever proposals you can conceive of to try. With all the crashed disks, skewed data, and broken line printers, you can still have a beautiful secretary. Be linear. Strive to stay employed. -- Technolorata, "Analog" | |
I've built a better model than the one at Data General For data bases vegetable, animal, and mineral My OS handles CPUs with multiplexed duality; My PL/1 compiler shows impressive functionality. My storage system's better than magnetic core polarity, You never have to bother checking out a bit for parity; There isn't any reason to install non-static floor matting; My disk drive has capacity for variable formatting. I feel compelled to mention what I know to be a gloating point: There's lots of room in memory for variables floating-point, Which shows for input vegetable, animal, and mineral I've built a better model than the one at Data General. -- Steve Levine, "A Computer Song" (To the tune of "Modern Major General", from "Pirates of Penzance", by Gilbert & Sullivan) | |
If Dr. Seuss Were a Technical Writer..... Here's an easy game to play. Here's an easy thing to say: If a packet hits a pocket on a socket on a port, And the bus is interrupted as a very last resort, And the address of the memory makes your floppy disk abort, Then the socket packet pocket has an error to report! If your cursor finds a menu item followed by a dash, And the double-clicking icon puts your window in the trash, And your data is corrupted 'cause the index doesn't hash, then your situation's hopeless, and your system's gonna crash! You can't say this? What a shame, sir! We'll find you another game, sir. If the label on the cable on the table at your house, Says the network is connected to the button on your mouse, But your packets want to tunnel on another protocol, That's repeatedly rejected by the printer down the hall, And your screen is all distorted by the side effects of gauss, So your icons in the window are as wavy as a souse, Then you may as well reboot and go out with a bang, 'Cause as sure as I'm a poet, the sucker's gonna hang! When the copy of your floppy's getting sloppy on the disk, And the microcode instructions cause unnecessary risc, Then you have to flash your memory and you'll want to ram your rom. Quickly turn off the computer and be sure to tell your mom! -- DementDJ@ccip.perkin-elmer.com (DementDJ) [rec.humor.funny] | |
No plain fanfold paper could hold that fractal Puff -- He grew so fast no plotting pack could shrink him far enough. Compiles and simulations grew so quickly tame And swapped out all their data space when Puff pushed his stack frame. (refrain) Puff, he grew so quickly, while others moved like snails And mini-Puffs would perch themselves on his gigantic tail. All the student hackers loved that fractal Puff But DCS did not like Puff, and finally said, "Enough!" (refrain) Puff used more resources than DCS could spare. The operator killed Puff's job -- he didn't seem to care. A gloom fell on the hackers; it seemed to be the end, But Puff trapped the exception, and grew from naught again! (refrain) Refrain: Puff the fractal dragon was written in C, And frolicked while processes switched in mainframe memory. Puff the fractal dragon was written in C, And frolicked while processes switched in mainframe memory. | |
We don't need no indirection We don't need no compilation We don't need no flow control We don't need no load control No data typing or declarations No link edit for external bindings Hey! did you leave the lists alone? Hey! did you leave that source alone? Chorus: (Chorus) Oh No. It's just a pure LISP function call. We don't need no side-effecting We don't need no allocation We don't need no flow control We don't need no special-nodes No global variables for execution No dark bit-flipping for debugging Hey! did you leave the args alone? Hey! did you leave those bits alone? (Chorus) (Chorus) -- "Another Glitch in the Call", a la Pink Floyd | |
While I nodded, nearly napping, suddenly there came a tapping, As of some one gently rapping, rapping at my chamber door. -- Edgar Allan Poe, "The Raven" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to hardware interrupts.] And now I see with eye serene The very pulse of the machine. -- William Wordsworth, "She Was a Phantom of Delight" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to software interrupts.] | |
Brief History Of Linux (#15) Too many hyphens: Traf-O-Data and Micro-soft Bill Gates and Paul Allen attended an exclusive private school in Seattle. In 1968, after raising $3,000 from a yard sale, they gained access to a timeshare computer and became addicted. After depleting their money learning BASIC and playing Solitaire, they convinced a company to give them free computer time in exchange for reporting bugs -- ironically, an early form of Open Source development! The two then founded a small company called Traf-O-Data that collected and analyzed traffic counts for municipalities using a crude device based on the Intel "Pretanium" 8008 CPU. They had some success at first, but ran into problems when they were unable to deliver their much hyped next-generation device called "TrafficX". An engineer is quoted as saying that "Traf-O-Data is the local leader in vaporware", the first documented usage of the term that has come to be synonymous with Bill Gates. Soon thereafter, the two developed their own BASIC interpreter, and sold it to MITS for their new Altair computer. April 4, 1975 is the fateful day that Micro-soft was founded in Albuquerque, NM as a language vendor. | |
Brief History Of Linux (#18) The rise and rise of the Microsoft Empire The DOS and Windows releases kept coming, and much to everyone's surprise, Microsoft became more and more successful. This brought much frustration to computer experts who kept predicting the demise of Microsoft and the rise of Macintosh, Unix, and OS/2. Nobody ever got fired for choosing Microsoft, which was the prime reason that DOS and Windows prevailed. Oh, and DOS had better games as well, which we all know is the most important feature an OS can have. In 1986 Microsoft's continued success prompted the company to undergo a wildly successful IPO. Afterwards, Microsoft and Chairman Bill had accumulated enough money to acquire small countries without missing a step, but all that money couldn't buy quality software. Gates could, however, buy enough marketing and hype to keep MS-DOS (Maybe Some Day an Operating System) and Windows (Will Install Needless Data On While System) as the dominant platforms, so quality didn't matter. This fact was demonstrated in Microsoft's short-lived slogan from 1988, "At Microsoft, quality is job 1.1". | |
World Domination, One CPU Cycle At A Time Forget about searching for alien signals or prime numbers. The real distributed computing application is "Domination@World", a program to advocate Linux and Apache to every website in the world that uses Windows and IIS. The goal of the project is to probe every IP number to determine what kind of platform each Net-connected machine is running. "That's a tall order... we need lots of computers running our Domination@World clients to help probe every nook and cranny of the Net," explained Mr. Zell Litt, the project head. After the probing is complete, the second phase calls for the data to be cross-referenced with the InterNIC whois database. "This way we'll have the names, addresses, and phone numbers for every Windows-using system administrator on the planet," Zell gloated. "That's when the fun begins." The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan for extreme advocacy. As part of LART, each Linux User Group will receive a list of the Windows-using weenies in their region. The LUG will then be able to employ various advocacy techniques, ranging from a soft-sell approach (sending the target a free Linux CD in the mail) all the way to "LARTcon 5" (cracking into their system and forcibly installing Linux). | |
It is equally bad when one speeds on the guest unwilling to go, and when he holds back one who is hastening. Rather one should befriend the guest who is there, but speed him when he wishes. -- Homer, "The Odyssey" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to scheduling.] | |
> Is there an API or other means to determine what video card, namely the > chipset, that the user has installed on his machine? On a modern X86 machine use the PCI/AGP bus data. On a PS/2 use the MCA bus data. On nubus use the nubus probe data. On old style ISA bus PCs done a large pointy hat and spend several years reading arcane and forbidden scrolls - Alan Cox on hardware probing | |
Because you want to win benchmarketing exercises, not demonstrate that your architecture has any value in the real world whatsoever. Because you know that you can induce people with financial approval to make stupid and irrational decisions based on irrelevant data. - Rodger Donaldson about benchmarking on linux-kernel | |
Q: I like to dynamically load buggy drivers into the kernel because that is what kernel developers like me do for fun, how can I better avoid data corruption when doing this and using ReiserFS? A: Do sync before insmod. (Alan Cox's good suggestion.) - Hans Reiser on linux-kernel | |
> Linus seems to be getting a little emotional in this discussion but swearing > does not replace data. Hey, I called people silly, not <censored>. You must have a very low tolerance ;) - Linus Torvalds about offending people on the gcc mailing list | |
I recall hearing that highly-classified data must be destroyed by physically shredding the medium. Yes, throw your disk drive in the shredder! (Just imagine the class of machinery required to digest an RA81 HDA.) - Mark Wood on linux-kernel | |
I would suggest re-naming "rmbdd()". I _assume_ that "dd" stands for "data dependent", but quite frankly, "rmbdd" looks like the standard IBM "we lost every vowel ever invented" kind of assembly lanaguage to me. I'm sure that having programmed PPC assembly language, you find it very natural (IBM motto: "We found five vowels hiding in a corner, and we used them _all_ for the 'eieio' instruction so that we wouldn't have to use them anywhere else"). - Linus Torvalds on linux-kernel | |
* Equivalent code is available from RSA Data Security, Inc. * This code has been tested against that, and is equivalent, * except that you don't need to include two pages of legalese * with every copy. -- public domain MD5 source | |
<Deek> "I keep my personal gpg data in a locked, lead safe in a vault guarded by angry rednecks and their dawgs. Trespassers will be violated, and all that..." | |
Well, he thought, since neither Aristotelian Logic nor the disciplines of Science seemed to offer much hope, it's time to go beyond them... Drawing a few deep even breaths, he entered a mental state practiced only by Masters of the Universal Way of Zen. In it his mind floated freely, able to rummage at will among the bits and pieces of data he had absorbed, undistracted by any outside disturbances. Logical structures no longer inhibited him. Pre-conceptions, prejudices, ordinary human standards vanished. All things, those previously trivial as well as those once thought important, became absolutely equal by acquiring an absolute value, revealing relationships not evident to ordinary vision. Like beads strung on a string of their own meaning, each thing pointed to its own common ground of existence, shared by all. Finally, each began to melt into each, staying itself while becoming all others. And Mind no longer contemplated Problem, but became Problem, destroying Subject-Object by becoming them. Time passed, unheeded. Eventually, there was a tentative stirring, then a decisive one, and Nakamura arose, a smile on his face and the light of laughter in his eyes. -- Wayfarer | |
'Mounting' is used for three things: climbing on a horse, linking in a hard disk unit in data systems, and, well, mounting during sex. -- Christa Keil | |
XXXI: The optimum committee has no members. XXXII: Hiring consultants to conduct studies can be an excellent means of turning problems into gold -- your problems into their gold. XXXIII: Fools rush in where incumbents fear to tread. XXXIV: The process of competitively selecting contractors to perform work is based on a system of rewards and penalties, all distributed randomly. XXXV: The weaker the data available upon which to base one's conclusion, the greater the precision which should be quoted in order to give the data authenticity. -- Norman Augustine | |
I'd like MY data-base JULIENNED and stir-fried! |