DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

'Mounten' wird fuer drei Dinge benutzt: 'Aufsitzen' auf Pferde, 'einklinken'
von Festplatten in Dateisysteme, und, nun, 'besteigen' beim Sex.
(Christa Keil in a German posting: "Mounting is used for three things:
climbing on a horse, linking in a hard disk unit in data systems, and, well,
mounting during sex".)
knot in cables caused data stream to become twisted and kinked
The data on your hard drive is out of balance.
Data for intranet got routed through the extranet and landed on the internet.
Delay not, Caesar.  Read it instantly.
                -- Shakespeare, "Julius Caesar" 3,1

Here is a letter, read it at your leisure.
                -- Shakespeare, "Merchant of Venice" 5,1

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to I/O system services.]
For the fashion of Minas Tirith was such that it was built on seven levels,
each delved into a hill, and about each was set a wall, and in each wall
was a gate.
                -- J.R.R. Tolkien, "The Return of the King"

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to system overview.]

For there are moments when one can neither think nor feel.  And if one can
neither think nor feel, she thought, where is one?
                -- Virginia Woolf, "To the Lighthouse"

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to powerfail recovery.]
A student, in hopes of understanding the Lambda-nature, came to Greenblatt.
As they spoke a Multics system hacker walked by.  "Is it true", asked the
student, "that PL-1 has many of the same data types as Lisp?"  Almost before
the student had finished his question, Greenblatt shouted, "FOO!", and hit
the student with a stick.
[From the operation manual for the CI-300 Dot Matrix Line Printer, made
in Japan]:

The excellent output machine of MODEL CI-300 as extraordinary DOT MATRIX
LINE PRINTER, built in two MICRO-PROCESSORs as well as EAROM, is featured by
permitting wonderful co-existence such as; "high quality against low cost,"
"diversified functions with compact design," "flexibility in accessibleness
and durability of approx. 2000,000,00 Dot/Head," "being sophisticated in
mechanism but possibly agile operating under noises being extremely
suppressed" etc.

And as a matter of course, the final goal is just simply to help achieve
"super shuttle diplomacy" between cool data, perhaps earned by HOST
COMPUTER, and warm heart of human being.
Hacker's Guide To Cooking:
2 pkg. cream cheese (the mushy white stuff in silver wrappings that doesn't
        really  come from Philadelphia after all; anyway, about 16 oz.)
1 tsp. vanilla  extract  (which is more alcohol than vanilla and pretty
        strong so this part you *GOTTA* measure)
1/4 cup sugar (but honey works fine too)
8 oz. Cool Whip (the fluffy stuff devoid of nutritional value that you
        can squirt all over your friends and lick off...)
"Blend all together until creamy with no lumps."  This is where you get to
        join(1) all the raw data in a big buffer and then filter it through
        merge(1m) with the -thick option, I mean, it starts out ultra lumpy
        and icky looking and you have to work hard to mix it.  Try an electric
        beater if you have a cat(1) that can climb wall(1s) to lick it off
        the ceiling(3m).
"Pour into a graham cracker crust..."  Aha, the BUGS section at last.  You
        just happened  to have a GCC sitting around under /etc/food, right?
        If not, don't panic(8), merely crumble a rand(3m) handful of innocent
        GCs into a suitable tempfile and mix in some melted butter.
"...and  refrigerate for an hour."  Leave the  recipe's  stdout in a fridge
        for 3.6E6 milliseconds while you work on cleaning up stderr, and
        by time out your cheesecake will be ready for stdin.
I have travelled the length and breadth of this country, and have talked with
the best people in business administration.  I can assure you on the highest
authority that data processing is a fad and won't last out the year.
                -- Editor in charge of business books at Prentice-Hall
                   publishers, responding to Karl V. Karlstrom (a junior
                   editor who had recommended a manuscript on the new
                   science of data processing), c. 1957
        In the beginning there was data.  The data was without form and
null, and darkness was upon the face of the console; and the Spirit of
IBM was moving over the face of the market.  And DEC said, "Let there
be registers"; and there were registers.  And DEC saw that they
carried; and DEC separated the data from the instructions.  DEC called
the data Stack, and the instructions they called Code.  And there was
evening and there was morning, one interrupt.
                -- Rico Tudor, "The Story of Creation or, The Myth of Urk"
Many companies that have made themselves dependent on [the equipment of a
certain major manufacturer] (and in doing so have sold their soul to the
devil) will collapse under the sheer weight of the unmastered complexity of
their data processing systems.
                -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
One person's error is another person's data.
Prof:    So the American government went to IBM to come up with a data
         encryption standard and they came up with ...
Student: EBCDIC!"
        THE LESSER-KNOWN PROGRAMMING LANGUAGES #18: FIFTH

FIFTH is a precision mathematical language in which the data types
refer to quantity.  The data types range from CC, OUNCE, SHOT, and
JIGGER to FIFTH (hence the name of the language), LITER, MAGNUM and
BLOTTO.  Commands refer to ingredients such as CHABLIS, CHARDONNAY,
CABERNET, GIN, VERMOUTH, VODKA, SCOTCH, and WHATEVERSAROUND.

The many versions of the FIFTH language reflect the sophistication and
financial status of its users.  Commands in the ELITE dialect include
VSOP and LAFITE, while commands in the GUTTER dialect include HOOTCH
and RIPPLE. The latter is a favorite of frustrated FORTH programmers
who end up using this language.
        The Magician of the Ivory Tower brought his latest invention for the
master programmer to examine.  The magician wheeled a large black box into the
master's office while the master waited in silence.
        "This is an integrated, distributed, general-purpose workstation,"
began the magician, "ergonomically designed with a proprietary operating
system, sixth generation languages, and multiple state of the art user
interfaces.  It took my assistants several hundred man years to construct.
Is it not amazing?"
        The master raised his eyebrows slightly. "It is indeed amazing," he
said.
        "Corporate Headquarters has commanded," continued the magician, "that
everyone use this workstation as a platform for new programs.  Do you agree
to this?"
        "Certainly," replied the master, "I will have it transported to the
data center immediately!"  And the magician returned to his tower, well
pleased.
        Several days later, a novice wandered into the office of the master
programmer and said, "I cannot find the listing for my new program.  Do
you know where it might be?"
        "Yes," replied the master, "the listings are stacked on the platform
in the data center."
                -- Geoffrey James, "The Tao of Programming"
The more data I punch in this card, the lighter it becomes, and the
lower the mailing cost.
                -- S. Kelly-Bootle, "The Devil's DP Dictionary"
The primary purpose of the DATA statement is to give names to constants;
instead of referring to pi as 3.141592653589793 at every appearance, the
variable PI can be given that value with a DATA statement and used instead
of the longer form of the constant.  This also simplifies modifying the
program, should the value of pi change.
                -- FORTRAN manual for Xerox Computers
                      THE STORY OF CREATION
                               or
                         THE MYTH OF URK

In the beginning there was data.  The data was without form and null, and
darkness was upon the face of the console; and the Spirit of IBM was moving
over the face of the market.  And DEC said, "Let there be registers;" and
there were registers.  And DEC saw that they carried; and DEC separated the
data from the instructions.  DEC called the data Stack, and the instructions
they called Code.  And there was evening and there was morning, one interrupt
...
                -- Rico Tudor
The Tao doesn't take sides;
it gives birth to both wins and losses.
The Guru doesn't take sides;
she welcomes both hackers and lusers.

The Tao is like a stack:
the data changes but not the structure.
the more you use it, the deeper it becomes;
the more you talk of it, the less you understand.

Hold on to the root.
        There was once a programmer who worked upon microprocessors.  "Look at
how well off I am here," he said to a mainframe programmer who came to visit,
"I have my own operating system and file storage device.  I do not have to
share my resources with anyone.  The software is self-consistent and
easy-to-use.  Why do you not quit your present job and join me here?"
        The mainframe programmer then began to describe his system to his
friend, saying: "The mainframe sits like an ancient sage meditating in the
midst of the data center.  Its disk drives lie end-to-end like a great ocean
of machinery.  The software is a multi-faceted as a diamond and as convoluted
as a primeval jungle.  The programs, each unique, move through the system
like a swift-flowing river.  That is why I am happy where I am."
        The microcomputer programmer, upon hearing this, fell silent.  But the
two programmers remained friends until the end of their days.
                -- Geoffrey James, "The Tao of Programming"
This is the first numerical problem I ever did.  It demonstrates the
power of computers:

Enter lots of data on calorie & nutritive content of foods.  Instruct
the thing to maximize a function describing nutritive content, with a
minimum level of each component, for fixed caloric content.  The
results are that one should eat each day:

        1/2 chicken
        1 egg
        1 glass of skim milk
        27 heads of lettuce.
                -- Rev. Adrian Melott
To say that UNIX is doomed is pretty rabid, OS/2 will certainly play a role,
but you don't build a hundred million instructions per second multiprocessor
micro and then try to run it on OS/2.  I mean, get serious.
                -- William Zachmann, International Data Corp
        "We've got a problem, HAL".
        "What kind of problem, Dave?"
        "A marketing problem.  The Model 9000 isn't going anywhere.  We're
way short of our sales goals for fiscal 2010."
        "That can't be, Dave.  The HAL Model 9000 is the world's most
advanced Heuristically programmed ALgorithmic computer."
        "I know, HAL. I wrote the data sheet, remember?  But the fact is,
they're not selling."
        "Please explain, Dave.  Why aren't HALs selling?"
        Bowman hesitates.  "You aren't IBM compatible."
[...]
        "The letters H, A, and L are alphabetically adjacent to the letters
I, B, and M.  That is a IBM compatible as I can be."
        "Not quite, HAL.  The engineers have figured out a kludge."
        "What kludge is that, Dave?"
        "I'm going to disconnect your brain."
                -- Darryl Rubin, "A Problem in the Making", "InfoWorld"
You are false data.
A place for everything and everything in its place.
                -- Isabella Mary Beeton, "The Book of Household Management"

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to memory management system services.]
Obviously, a man's judgement cannot be better than the information on which he
has based it.  Give him the truth and he may still go wrong when he has
the chance to be right, but give him no news or present him only with distorted
and incomplete data, with ignorant, sloppy or biased reporting, with propaganda
and deliberate falsehoods, and you destroy his whole reasoning processes, and
make him something less than a man.
-- Arthur Hays Sulzberger
Extraordinary claims demand extraordinary proof.  There are many examples of
outsiders who eventually overthrew entrenched scientific orthodoxies, but
they prevailed with irrefutable data.  More often, egregious findings that
contradict well-established research turn out to be artifacts.  I have
argued that accepting psychic powers, reincarnation, "cosmic conciousness,"
and the like, would entail fundamental revisions of the foundations of
neuroscience.  Before abandoning materialist theories of mind that have paid
handsome dividends, we should insist on better evidence for psi phenomena
than presently exists, especially when neurology and psychology themselves
offer more plausible alternatives.
- Barry L. Beyerstein, "The Brain and Conciousness: Implications for Psi
   Phenomena", The Skeptical Inquirer, Vol. XII No. 2, ppg. 163-171
e-credibility: the non-guaranteeable likelihood that the electronic data
you're seeing is genuine rather than somebody's made-up crap.
- Karl Lehenbauer
A comment on schedules:
Ok, how long will it take?    
   For each manager involved in initial meetings add one month.
   For each manager who says "data flow analysis" add another month.
   For each unique end-user type add one month.
   For each unknown software package to be employed add two months.
   For each unknown hardware device add two months.
   For each 100 miles between developer and installation add one month.
   For each type of communication channel add one month.
   If an IBM mainframe shop is involved and you are working on a non-IBM
      system add 6 months.
   If an IBM mainframe shop is involved and you are working on an IBM
      system add 9 months.
Round up to the nearest half-year.
--Brad Sherman
By the way, ALL software projects are done by iterative prototyping.
Some companies call their prototypes "releases", that's all.
Excitement and danger await your induction to tracer duty!  As a tracer,
you must rid the computer networks of slimy, criminal data thieves.
They are tricky and the action gets tough, so watch out!  Utilizing all
your skills, you'll either get your man or you'll get burned!
-- advertising for the computer game "Tracers"
"What people have been reduced to are mere 3-D representations of their own
data."
-- Arthur Miller
"Data is a lot like humans:  It is born.  Matures.  Gets married to other data,
divorced. Gets old.  One thing that it doesn't do is die.  It has to be killed."
-- Arthur Miller
"People should have access to the data which you have about them.  There should
be a process for them to challenge any inaccuracies."
-- Arthur Miller
[Astrology is] 100 percent hokum, Ted.  As a matter of fact, the first edition
of the Encyclopaedia Britannica, written in 1771 -- 1771! -- said that this
belief system is a subject long ago ridiculed and reviled.  We're dealing with
beliefs that go back to the ancient Babylonians.  There's nothing there....
It sounds a lot like science, it sounds like astronomy.  It's got technical
terms.  It's got jargon.  It confuses the public....The astrologer is quite
glib, confuses the public, uses terms which come from science, come from
metaphysics, come from a host of fields, but they really mean nothing.  The
fact is that astrological beliefs go back at least 2,500 years.  Now that
should be a sufficiently long time for astrologers to prove their case.  They
have not proved their case....It's just simply gibberish.  The fact is, there's
no theory for it, there are no observational data for it.  It's been tested
and tested over the centuries.  Nobody's ever found any validity to it at
all.  It is not even close to a science.  A science has to be repeatable, it
has to have a logical foundation, and it has to be potentially vulnerable --
you test it.  And in that astrology is reqlly quite something else.
-- Astronomer Richard Berendzen, President, American University, on ABC
    News "Nightline," May 3, 1988
"(The Chief Programmer) personally defines the functional and performance
specifications, designs the program, codes it, tests it, and writes its
documentation... He needs great talent, ten years experience and
considerable systems and applications knowledge, whether in applied
mathematics, business data handling, or whatever."
-- Fred P. Brooks, _The Mythical Man Month_
beta test, v:
        To voluntarily entrust one's data, one's livelihood and one's
        sanity to hardware or software intended to destroy all three.
        In earlier days, virgins were often selected to beta test volcanos.
Correspondence Corollary:
        An experiment may be considered a success if no more than half
        your data must be discarded to obtain correspondence with your theory.
curtation, n.:
        The enforced compression of a string in the fixed-length field
environment.
        The problem of fitting extremely variable-length strings such as names,
addresses, and item descriptions into fixed-length records is no trivial
matter.  Neglect of the subtle art of curtation has probably alienated more
people than any other aspect of data processing.  You order Mozart's "Don
Giovanni" from your record club, and they invoice you $24.95 for MOZ DONG.
The witless mapping of the sublime onto the ridiculous!  Equally puzzling is
the curtation that produces the same eight characters, THE BEST, whether you
order "The Best of Wagner", "The Best of Schubert", or "The Best of the Turds".
Similarly, wine lovers buying from computerized wineries twirl their glasses,
check their delivery notes, and inform their friends, "A rather innocent,
possibly overtruncated CAB SAUV 69 TAL."  The squeezing of fruit into 10
columns has yielded such memorable obscenities as COX OR PIP.  The examples
cited are real, and the curtational methodology which produced them is still
with us.

MOZ DONG n.
        Curtation of Don Giovanni by Wolfgang Amadeus Mozart and Lorenzo da
Ponte, as performed by the computerized billing ensemble of the Internat'l
Preview Society, Great Neck (sic), N.Y.
                -- Stan Kelly-Bootle, "The Devil's DP Dictionary"
Data, n.:
        An accrual of straws on the backs of theories.
Data, n.:
        Computerspeak for "information".  Properly pronounced
        the way Bostonians pronounce the word for a female child.
Endless Loop, n.:
        see Loop, Endless.
Loop, Endless, n.:
        see Endless Loop.
                -- Random Shack Data Processing Dictionary
Fakir, n:
        A psychologist whose charismatic data have inspired almost
        religious devotion in his followers, even though the sources
        seem to have shinnied up a rope and vanished.
Finagle's First Law:
        To study a subject best, understand it thoroughly before you start.

Finagle's Second Law:
        Always keep a record of data -- it indicates you've been working.

Finagle's Fourth Law:
        Once a job is fouled up, anything done to improve it only makes
        it worse.

Finagle's Fifth Law:
        Always draw your curves, then plot your readings.

Finagle's Sixth Law:
        Don't believe in miracles -- rely on them.
Finagle's Third Law:
        In any collection of data, the figure most obviously correct,
        beyond all need of checking, is the mistake

Corollaries:
        (1) Nobody whom you ask for help will see it.
        (2) The first person who stops by, whose advice you really
            don't want to hear, will see it immediately.
Frobnitz, pl. Frobnitzem (frob'nitsm) n.:
        An unspecified physical object, a widget.  Also refers to electronic
black boxes.  This rare form is usually abbreviated to FROTZ, or more
commonly to FROB.  Also used are FROBNULE, FROBULE, and FROBNODULE.
Starting perhaps in 1979, FROBBOZ (fruh-bahz'), pl. FROBBOTZIM, has also
become very popular, largely due to its exposure via the Adventure spin-off
called Zork (Dungeon).  These can also be applied to non-physical objects,
such as data structures.
hard, adj.:
        The quality of your own data; also how it is to believe those
        of other people.
Information Processing:
        What you call data processing when people are so disgusted with
        it they won't let it be discussed in their presence.
May's Law:
        The quality of correlation is inversly proportional to the density
        of control.  (The fewer the data points, the smoother the curves.)
Recursion n.:
        See Recursion.
                -- Random Shack Data Processing Dictionary
Velilind's Laws of Experimentation:
        (1) If reproducibility may be a problem, conduct the test only once.
        (2) If a straight line fit is required, obtain only two data points.
Williams and Holland's Law:
        If enough data is collected, anything may be proven by statistical
        methods.
What you want, what you're hanging around in the world waiting for, is for
something to occur to you.
                -- Robert Frost

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to AST's.]
Briefly stated, the findings are that when presented with an array of
data or a sequence of events in which they are instructed to discover
an underlying order, subjects show strong tendencies to perceive order
and causality in random arrays, to perceive a pattern or correlation
which seems a priori intuitively correct even when the actual correlation
in the data is counterintuitive, to jump to conclusions about the correct
hypothesis, to seek and to use only positive or confirmatory evidence, to
construe evidence liberally as confirmatory, to fail to generate or to
assess alternative hypotheses, and having thus managed to expose themselves
only to confirmatory instances, to be fallaciously confident of the validity
of their judgments (Jahoda, 1969; Einhorn and Hogarth, 1978).  In the
analyzing of past events, these tendencies are exacerbated by failure to
appreciate the pitfalls of post hoc analyses.
                -- A. Benjamin
Back in the early 60's, touch tone phones only had 10 buttons.  Some
military versions had 16, while the 12 button jobs were used only by people
who had "diva" (digital inquiry, voice answerback) systems -- mainly banks.
Since in those days, only Western Electric  made "data sets" (modems) the
problems of terminology were all Bell System.  We used to struggle with
written descriptions of dial pads that were unfamiliar to most people
(most phones were rotary then.)  Partly in jest, some AT&T engineering
types (there was no marketing in the good old days, which is why they were
the good old days) made up the term "octalthorpe" (note spelling) to denote
the "pound sign."  Presumably because it has 8 points sticking out.  It
never really caught on.
Extraordinary claims demand extraordinary proof.  There are many examples
of outsiders who eventually overthrew entrenched scientific orthodoxies,
but they prevailed with irrefutable data.  More often, egregious findings
that contradict well-established research turn out to be artifacts.  I have
argued that accepting psychic powers, reincarnation, "cosmic conciousness,"
and the like, would entail fundamental revisions of the foundations of
neuroscience.  Before abandoning materialist theories of mind that have paid
handsome dividends, we should insist on better evidence for psi phenomena
than presently exists, especially when neurology and psychology themselves
offer more plausible alternatives.
                -- Barry L. Beyerstein, "The Brain and Conciousness:
                   Implications for Psi Phenomena".
I would have you imagine, then, that there exists in the mind of man a block
of wax...  and that we remember and know what is imprinted as long as the
image lasts; but when the image is effaced, or cannot be taken, then we
forget or do not know.
                -- Plato, Dialogs, Theateus 191

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to image activation and termination.]
Lawrence Radiation Laboratory keeps all its data in an old gray trunk.
Recession is when your neighbor loses his job. Depression is when you
lose your job.  These economic downturns are very difficult to predict,
but sophisticated econometric modeling houses like Data Resources and
Chase Econometrics have successfully predicted 14 of the last 3 recessions.
The temperature of Heaven can be rather accurately computed from available
data.  Our authority is Isaiah 30:26, "Moreover, the light of the Moon
shall be as the light of the Sun and the light of the Sun shall be sevenfold,
as the light of seven days."  Thus Heaven receives from the Moon as much
radiation as we do from the Sun, and in addition seven times seven (49) times
as much as the Earth does from the Sun, or fifty times in all.  The light we
receive from the Moon is one ten-thousandth of the light we receive from the
Sun, so we can ignore that.  With these data we can compute the temperature
of Heaven.  The radiation falling on Heaven will heat it to the point where
the heat lost by radiation is just equal to the heat received by radiation,
i.e., Heaven loses fifty times as much heat as the Earth by radiation.  Using
the Stefan-Boltzmann law for radiation, (H/E)^4 = 50, where E is the absolute
temperature of the earth (~300K), gives H as 798K (525C).  The exact
temperature of Hell cannot be computed, but it must be less than 444.6C, the
temperature at which brimstone or sulphur changes from a liquid to a gas.
Revelations 21:8 says "But the fearful, and unbelieving ... shall have their
part in the lake which burneth with fire and brimstone."  A lake of molten
brimstone means that its temperature must be at or below the boiling point,
or 444.6C  (Above this point it would be a vapor, not a lake.)  We have,
then, that Heaven, at 525C is hotter than Hell at 445C.
                -- "Applied Optics", vol. 11, A14, 1972
There are no data that cannot be plotted on a straight line if the axis
are chosen correctly.
Between the idea
And the reality
Between the motion
And the act
Falls the Shadow
                -- T.S. Eliot, "The Hollow Man"

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to system service dispatching.]
Felix Catus is your taxonomic nomenclature,
An endothermic quadroped, carnivorous by nature.
Your visual, olfactory, and auditory senses
Contribute to your hunting skills and natural defenses.
I find myself intrigued by your sub-vocal oscillations,
A singular development of cat communications
That obviates your basic hedonistic predelection
For a rhythmic stroking of your fur to demonstrate affection.
A tail is quite essential for your acrobatic talents:
You would not be so agile if you lacked its counterbalance;
And when not being utilitized to aid in locomotion,
It often serves to illustrate the state of your emotion.
Oh Spot, the complex levels of behavior you display
Connote a fairly well-developed cognitive array.
And though you are not sentient, Spot, and do not comprehend,
I nonetheless consider you a true and valued friend.
        -- Lt. Cmdr. Data, "An Ode to Spot"
        Hack placidly amidst the noisy printers and remember what prizes there
may be in Science.  As fast as possible get a good terminal on a good system.
Enter your data clearly but always encrypt your results.  And listen to others,
even the dull and ignorant, for they may be your customers.  Avoid loud and
aggressive persons, for they are sales reps.
        If you compare your outputs with those of others, you may be surprised,
for always there will be greater and lesser numbers than you have crunched.
Keep others interested in your career, and try not to fumble; it can be a real
hassle and could change your fortunes in time.
        Exercise system control in your experiments, for the world is full of
bugs.  But let this not blind you to what virtue there is; many persons strive
for linearity and everywhere papers are full of approximations.  Strive for
proportionality.  Especially, do not faint when it occurs.  Neither be cyclical
about results; for in the face of all data analysis it is sure to be noticed.
        Take with a grain of salt the anomalous data points.  Gracefully pass
them on to the youth at the next desk.  Nurture some mutual funds to shield
you in times of sudden layoffs.  But do not distress yourself with imaginings
-- the real bugs are enough to screw you badly.  Murphy's Law runs the
Universe -- and whether or not it is clear to you, no doubt <Curl>B*n dS = 0.
        Therefore, grab for a piece of the pie, with whatever proposals you
can conceive of to try.  With all the crashed disks, skewed data, and broken
line printers, you can still have a beautiful secretary.  Be linear.  Strive
to stay employed.
                -- Technolorata, "Analog"
I've built a better model than the one at Data General
For data bases vegetable, animal, and mineral
My OS handles CPUs with multiplexed duality;
My PL/1 compiler shows impressive functionality.
My storage system's better than magnetic core polarity,
You never have to bother checking out a bit for parity;
There isn't any reason to install non-static floor matting;
My disk drive has capacity for variable formatting.

I feel compelled to mention what I know to be a gloating point:
There's lots of room in memory for variables floating-point,
Which shows for input vegetable, animal, and mineral
I've built a better model than the one at Data General.

                -- Steve Levine, "A Computer Song" (To the tune of
                   "Modern Major General", from "Pirates of Penzance",
                   by Gilbert & Sullivan)
If Dr. Seuss Were a Technical Writer.....

Here's an easy game to play.
Here's an easy thing to say:

If a packet hits a pocket on a socket on a port,
And the bus is interrupted as a very last resort,
And the address of the memory makes your floppy disk abort,
Then the socket packet pocket has an error to report!

If your cursor finds a menu item followed by a dash,
And the double-clicking icon puts your window in the trash,
And your data is corrupted 'cause the index doesn't hash,
then your situation's hopeless, and your system's gonna crash!

You can't say this?  What a shame, sir!
We'll find you another game, sir.

If the label on the cable on the table at your house,
Says the network is connected to the button on your mouse,
But your packets want to tunnel on another protocol,
That's repeatedly rejected by the printer down the hall,
And your screen is all distorted by the side effects of gauss,
So your icons in the window are as wavy as a souse,
Then you may as well reboot and go out with a bang,
'Cause as sure as I'm a poet, the sucker's gonna hang!

When the copy of your floppy's getting sloppy on the disk,
And the microcode instructions cause unnecessary risc,
Then you have to flash your memory and you'll want to ram your rom.
Quickly turn off the computer and be sure to tell your mom!

                -- DementDJ@ccip.perkin-elmer.com (DementDJ) [rec.humor.funny]
No plain fanfold paper could hold that fractal Puff --
He grew so fast no plotting pack could shrink him far enough.
Compiles and simulations grew so quickly tame
And swapped out all their data space when Puff pushed his stack frame.
        (refrain)
Puff, he grew so quickly, while others moved like snails
And mini-Puffs would perch themselves on his gigantic tail.
All the student hackers loved that fractal Puff
But DCS did not like Puff, and finally said, "Enough!"
        (refrain)
Puff used more resources than DCS could spare.
The operator killed Puff's job -- he didn't seem to care.
A gloom fell on the hackers; it seemed to be the end,
But Puff trapped the exception, and grew from naught again!
        (refrain)
Refrain:
        Puff the fractal dragon was written in C,
        And frolicked while processes switched in mainframe memory.
        Puff the fractal dragon was written in C,
        And frolicked while processes switched in mainframe memory.
We don't need no indirection                We don't need no compilation
We don't need no flow control                We don't need no load control
No data typing or declarations                No link edit for external bindings
Hey! did you leave the lists alone?        Hey! did you leave that source alone?
Chorus:                                        (Chorus)
        Oh No. It's just a pure LISP function call.

We don't need no side-effecting                We don't need no allocation
We don't need no flow control                We don't need no special-nodes
No global variables for execution        No dark bit-flipping for debugging
Hey! did you leave the args alone?        Hey! did you leave those bits alone?
(Chorus)                                (Chorus)
                -- "Another Glitch in the Call", a la Pink Floyd
While I nodded, nearly napping, suddenly there came a tapping,
As of some one gently rapping, rapping at my chamber door.
                -- Edgar Allan Poe, "The Raven"

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to hardware interrupts.]

And now I see with eye serene
The very pulse of the machine.
                -- William Wordsworth, "She Was a Phantom of Delight"

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to software interrupts.]
Brief History Of Linux (#15)
Too many hyphens: Traf-O-Data and Micro-soft

Bill Gates and Paul Allen attended an exclusive private school in Seattle.
In 1968, after raising $3,000 from a yard sale, they gained access to a
timeshare computer and became addicted. After depleting their money
learning BASIC and playing Solitaire, they convinced a company to give
them free computer time in exchange for reporting bugs -- ironically, an
early form of Open Source development!

The two then founded a small company called Traf-O-Data that collected and
analyzed traffic counts for municipalities using a crude device based on
the Intel "Pretanium" 8008 CPU. They had some success at first, but ran
into problems when they were unable to deliver their much hyped
next-generation device called "TrafficX". An engineer is quoted as saying
that "Traf-O-Data is the local leader in vaporware", the first documented
usage of the term that has come to be synonymous with Bill Gates.

Soon thereafter, the two developed their own BASIC interpreter, and sold
it to MITS for their new Altair computer. April 4, 1975 is the fateful day
that Micro-soft was founded in Albuquerque, NM as a language vendor.
Brief History Of Linux (#18)
The rise and rise of the Microsoft Empire

The DOS and Windows releases kept coming, and much to everyone's surprise,
Microsoft became more and more successful. This brought much frustration
to computer experts who kept predicting the demise of Microsoft and the
rise of Macintosh, Unix, and OS/2.

Nobody ever got fired for choosing Microsoft, which was the prime reason
that DOS and Windows prevailed. Oh, and DOS had better games as well,
which we all know is the most important feature an OS can have.

In 1986 Microsoft's continued success prompted the company to undergo a
wildly successful IPO. Afterwards, Microsoft and Chairman Bill had
accumulated enough money to acquire small countries without missing a
step, but all that money couldn't buy quality software. Gates could,
however, buy enough marketing and hype to keep MS-DOS (Maybe Some Day an
Operating System) and Windows (Will Install Needless Data On While System)
as the dominant platforms, so quality didn't matter. This fact was
demonstrated in Microsoft's short-lived slogan from 1988, "At Microsoft,
quality is job 1.1".
World Domination, One CPU Cycle At A Time

Forget about searching for alien signals or prime numbers. The real
distributed computing application is "Domination@World", a program to advocate
Linux and Apache to every website in the world that uses Windows and IIS.

The goal of the project is to probe every IP number to determine what kind of
platform each Net-connected machine is running. "That's a tall order... we
need lots of computers running our Domination@World clients to help probe
every nook and cranny of the Net," explained Mr. Zell Litt, the project head.

After the probing is complete, the second phase calls for the data to be
cross-referenced with the InterNIC whois database. "This way we'll have the
names, addresses, and phone numbers for every Windows-using system
administrator on the planet," Zell gloated. "That's when the fun begins."

The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan
for extreme advocacy. As part of LART, each Linux User Group will receive a
list of the Windows-using weenies in their region. The LUG will then be able
to employ various advocacy techniques, ranging from a soft-sell approach
(sending the target a free Linux CD in the mail) all the way to "LARTcon 5"
(cracking into their system and forcibly installing Linux).
It is equally bad when one speeds on the guest unwilling to go, and when he
holds back one who is hastening.  Rather one should befriend the guest who
is there, but speed him when he wishes.
                -- Homer, "The Odyssey"

        [Quoted in "VMS Internals and Data Structures", V4.4, when
         referring to scheduling.]
> Is there an API or other means to determine what video card, namely the
> chipset, that the user has installed on his machine?

On a modern X86 machine use the PCI/AGP bus data. On a PS/2 use the MCA bus
data. On nubus use the nubus probe data. On old style ISA bus PCs done a
large pointy hat and spend several years reading arcane and forbidden
scrolls

        - Alan Cox on hardware probing
Because you want to win benchmarketing exercises, not demonstrate that your
architecture has any value in the real world whatsoever.  Because you know
that you can induce people with financial approval to make stupid and
irrational decisions based on irrelevant data.

        - Rodger Donaldson about benchmarking on linux-kernel
Q: I like to dynamically load buggy drivers into the kernel because that is
what kernel developers like me do for fun, how can I better avoid data
corruption when doing this and using ReiserFS?

A: Do sync before insmod.  (Alan Cox's good suggestion.)

        - Hans Reiser on linux-kernel
> Linus seems to be getting a little emotional in this discussion but swearing
> does not replace data.

Hey, I called people silly, not <censored>. You must have a very low
tolerance ;)

        - Linus Torvalds about offending people on the gcc mailing list
I recall hearing that highly-classified data must be destroyed by
physically shredding the medium.  Yes, throw your disk drive in the
shredder!  (Just imagine the class of machinery required to digest an RA81
HDA.)

        - Mark Wood on linux-kernel
I would suggest re-naming "rmbdd()". I _assume_ that "dd" stands for "data
dependent", but quite frankly, "rmbdd" looks like the standard IBM "we
lost every vowel ever invented" kind of assembly lanaguage to me.

I'm sure that having programmed PPC assembly language, you find it very
natural (IBM motto: "We found five vowels hiding in a corner, and we used
them _all_ for the 'eieio' instruction so that we wouldn't have to use
them anywhere else").

        - Linus Torvalds on linux-kernel
* Equivalent code is available from RSA Data Security, Inc.
* This code has been tested against that, and is equivalent,
* except that you don't need to include two pages of legalese
* with every copy.
        -- public domain MD5 source
<Deek> "I keep my personal gpg data in a locked, lead safe in a vault
       guarded by angry rednecks and their dawgs.  Trespassers will be
       violated, and all that..."
        Well, he thought, since neither Aristotelian Logic nor the disciplines
of Science seemed to offer much hope, it's time to go beyond them...
        Drawing a few deep even breaths, he entered a mental state practiced
only by Masters of the Universal Way of Zen.  In it his mind floated freely,
able to rummage at will among the bits and pieces of data he had absorbed,
undistracted by any outside disturbances.  Logical structures no longer
inhibited him. Pre-conceptions, prejudices, ordinary human standards vanished.
All things, those previously trivial as well as those once thought important,
became absolutely equal by acquiring an absolute value, revealing relationships
not evident to ordinary vision.  Like beads strung on a string of their own
meaning, each thing pointed to its own common ground of existence, shared by
all.  Finally, each began to melt into each, staying itself while becoming
all others.  And Mind no longer contemplated Problem, but became Problem,
destroying Subject-Object by becoming them.
        Time passed, unheeded.
        Eventually, there was a tentative stirring, then a decisive one, and
Nakamura arose, a smile on his face and the light of laughter in his eyes.
                -- Wayfarer
'Mounting' is used for three things: climbing on a horse, linking in a
hard disk unit in data systems, and, well, mounting during sex.
        -- Christa Keil
XXXI:
        The optimum committee has no members.
XXXII:
        Hiring consultants to conduct studies can be an excellent means of
        turning problems into gold -- your problems into their gold.
XXXIII:
        Fools rush in where incumbents fear to tread.
XXXIV:
        The process of competitively selecting contractors to perform work
        is based on a system of rewards and penalties, all distributed
        randomly.
XXXV:
        The weaker the data available upon which to base one's conclusion,
        the greater the precision which should be quoted in order to give
        the data authenticity.
                -- Norman Augustine
I'd like MY data-base JULIENNED and stir-fried!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners