Proverbs, aphorisms, quotations (English) | by Linux fortune |
A sheet of paper crossed my desk the other day and as I read it, realization of a basic truth came over me. So simple! So obvious we couldn't see it. John Knivlen, Chairman of Polamar Repeater Club, an amateur radio group, had discovered how IC circuits work. He says that smoke is the thing that makes ICs work because every time you let the smoke out of an IC circuit, it stops working. He claims to have verified this with thorough testing. I was flabbergasted! Of course! Smoke makes all things electrical work. Remember the last time smoke escaped from your Lucas voltage regulator Didn't it quit working? I sat and smiled like an idiot as more of the truth dawned. It's the wiring harness that carries the smoke from one device to another in your Mini, MG or Jag. And when the harness springs a leak, it lets the smoke out of everything at once, and then nothing works. The starter motor requires large quantities of smoke to operate properly, and that's why the wire going to it is so large. Feeling very smug, I continued to expand my hypothesis. Why are Lucas electronics more likely to leak than say Bosch? Hmmm... Aha!!! Lucas is British, and all things British leak! British convertible tops leak water, British engines leak oil, British displacer units leak hydrostatic fluid, and I might add Brititsh tires leak air, and the British defense unit leaks secrets... so naturally British electronics leak smoke. -- Jack Banton, PCC Automotive Electrical School [Ummm ... IC circuits? Integrated circuit circuits?] | |
We can found no scientific discipline, nor a healthy profession on the technical mistakes of the Department of Defense and IBM. -- Edsger Dijkstra | |
Honesty is the best policy, but insanity is a better defense. | |
Do not allow this language (Ada) in its present state to be used in applications where reliability is critical, i.e., nuclear power stations, cruise missiles, early warning systems, anti-ballistic missle defense systems. The next rocket to go astray as a result of a programming language error may not be an exploratory space rocket on a harmless trip to Venus: It may be a nuclear warhead exploding over one of our cities. An unreliable programming language generating unreliable programs constitutes a far greater risk to our environment and to our society than unsafe cars, toxic pesticides, or accidents at nuclear power stations. - C. A. R. Hoare | |
...the Soviets have the capability to try big projects. If there is a goal, such as when Gorbachev states that they are going to have nuclear-powered aircraft carriers, the case is closed -- that is it. They will concentrate on the problem, do a bad job, and later pay the price. They really don't care what the price is. -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 100 | |
There is something you must understand about the Soviet system. They have the ability to concentrate all their efforts on a given design, and develop all components simulateously, but sometimes without proper testing. Then they end up with a technological disaster like the Tu-144. In a technology race at the time, that aircraft was two months ahead of the Concorde. Four Tu-144s were built; two have crashed, and two are in museums. The Concorde has been flying safely for over 10 years. -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 100 | |
DE: The Soviets seem to have difficulty implementing modern technology. Would you comment on that? Belenko: Well, let's talk about aircraft engine lifetime. When I flew the MiG-25, its engines had a total lifetime of 250 hours. DE: Is that mean-time-between-failure? Belenko: No, the engine is finished; it is scrapped. DE: You mean they pull it out and throw it away, not even overhauling it? Belenko: That is correct. Overhaul is too expensive. DE: That is absurdly low by free world standards. Belenko: I know. -- an interview with Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 102 | |
"I have a friend who just got back from the Soviet Union, and told me the people there are hungry for information about the West. He was asked about many things, but I will give you two examples that are very revealing about life in the Soviet Union. The first question he was asked was if we had exploding television sets. You see, they have a problem with the picture tubes on color television sets, and many are exploding. They assumed we must be having problems with them too. The other question he was asked often was why the CIA had killed Samantha Smith, the little girl who visited the Soviet Union a few years ago; their propaganda is very effective. -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 100 | |
"...I could accept this openness, glasnost, perestroika, or whatever you want to call it if they did these things: abolish the one party system; open the Soviet frontier and allow Soviet people to travel freely; allow the Soviet people to have real free enterprise; allow Western businessmen to do business there, and permit freedom of speech and of the press. But so far, the whole country is like a concentration camp. The barbed wire on the fence around the Soviet Union is to keep people inside, in the dark. This openness that you are seeing, all these changes, are cosmetic and they have been designed to impress shortsighted, naive, sometimes stupid Western leaders. These leaders gush over Gorbachev, hoping to do business with the Soviet Union or appease it. He will say: "Yes, we can do business!" This while his military machine in Afghanistan has killed over a million people out of a population of 17 million. Can you imagine that? -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 110 | |
"Remember Kruschev: he tried to do too many things too fast, and he was removed in disgrace. If Gorbachev tries to destroy the system or make too many fundamental changes to it, I believe the system will get rid of him. I am not a political scientist, but I understand the system very well. I believe he will have a "heart attack" or retire or be removed. He is up against a brick wall. If you think they will change everything and become a free, open society, forget it!" -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 110 | |
"Don't discount flying pigs before you have good air defense." -- jvh@clinet.FI | |
...At that time [the 1960s], Bell Laboratories scientists projected that computer speeds as high as 30 million floating-point calculations per second (megaflops) would be needed for the Army's ballistic missile defense system. Many computer experts -- including a National Academy of Sciences panel -- said achieving such speeds, even using multiple processors, was impossible. Today, new generation supercomputers operate at billions of operations per second (gigaflops). -- Aviation Week & Space Technology, May 9, 1988, "Washington Roundup", pg 13 | |
"The strength of the Constitution lies entirely in the determination of each citizen to defend it. Only if every single citizen feels duty bound to do his share in this defense are the constitutional rights secure." -- Albert Einstein | |
A billion here, a billion there -- pretty soon it adds up to real money. -- Sen. Everett Dirksen, on the U.S. defense budget | |
Extremism in the defense of liberty is no vice... moderation in the pursuit of justice is no virtue. -- Barry Goldwater | |
So from the depths of its enchantment, Terra was able to calculate a course of action. Here at last was an opportunity to consort with Dirbanu on a friendly basis -- great Durbanu which, since it had force fields which Earth could not duplicate, must of necessity have many other things Earth could use; mighty Durbanu before whom we would kneel in supplication (with purely- for-defense bombs hidden in our pockets) with lowered heads (making invisible the knife in our teeth) and ask for crumbs from their table (in order to extrapolate the location of their kitchens). -- Theodore Sturgeon, "The World Well Lost" | |
Remember, drive defensively! And of course, the best defense is a good offense! | |
The best defense against logic is ignorance. | |
Be security conscious -- National defense is at stake. | |
HARVARD: Quarterback: Sophomore Dave Strewzinski... likes to pass. And pass he does, with a record 86 attempts (three completions) in 87 plays.... Though Strewzinksi has so far failed to score any points for the Crimson, his jackrabbit speed has made him the least sacked quarterback in the Ivy league. Wide Receiver: The other directional signal in Harvard's offensive machine is senior Phil Yip, who is very fast. Yip is so fast that he has set a record for being fast. Expect to see Yip elude all pursuers and make it into the endzone five or six times, his average for a game. Yip, nicknamed "fumblefingers" and "you asshole" by his teammates, hopes to carry the ball with him at least one of those times. YALE: Defense: On the defensive side, Yale boasts the stingiest line in the Ivies. Primarily responsible are seniors Izzy "Shylock" Bloomberg and Myron Finklestein, the tightest ends in recent Eli history. Also contributing to the powerful defense is junior tackle Angus MacWhirter, a Scotsman who rounds out the offensive ethnic joke. Look for these three to shut down the opening coin toss. -- Harvard Lampoon 1988 Program Parody, distributed at The Game | |
Microsoft Mandatory Survey (#14) Customers who want to upgrade to Windows 98 Second Edition must now fill out a Microsoft survey online before they can order the bugfix/upgrade. Question 14: How would you rate the performance of the Microsoft defense team in the antitrust trial? A. Perfect; they have clearly shown that Microsoft's market leading position is good for consumers. B. Outstanding; all of the pundits who are predicting that Microsoft will lose are a bunch of idiots. C. Excellent; Bill Gates' wonderful video deposition clearly demonstrated to the American public that he is a true visionary. D. I don't know; I haven't been paying any attention to the case because I know Microsoft will prevail anyways. | |
Brief History Of Linux (#14) Military Intelligence: Not an oxymoron in 1969 It was the Department Of Defense that commissioned the ARPANET in 1969, a rare example of the US military breaking away from its official motto, "The Leading Edge Of Yesterday's Technology(tm)". In the years leading up to 1969, packet switching technology had evolved enough to make the ARPANET possible. Bolt Beranek and Newman, Inc. received the ARPA contract in 1968 for packet switching "Interface Message Processors". US Senator Edward Kennedy, always on the ball, sent a telegram to BBN praising them for their non-denominational "Interfaith" Message Processors, an act unsurpassed by elected representatives until Al Gore invented the Internet years later. While ARPANET started with only four nodes in 1969, it evolved rapidly. Email was first used in 1971; by 1975 the first mailing list, MsgGroup, was created by Steve Walker when he sent a "First post!" messages to it. In 1979 all productive use of ARPANET ceased when USENET and the first MUD were created. In 1983, when the network surpassed 1,000 hosts, a study showed that 90.4% of all traffic was devoted to email and USENET flame wars. | |
The Humorix Oracle explains how to get a job at a major corporation: 1. Find an exploit in Microsoft IIS or another buggy Microsoft product to which large corporations rarely apply security patches. 2. Create a virus or worm that takes advantage of this exploit and then propogates itself by selecting IP numbers at random and then trying to infect those machines. 3. Keep an eye on your own website's server logs. When your virus starts propogating, your server will be hit with thousands of attacks from other infected systems trying to spread the virus to your machine. 4. Make a list of the IP numbers of all of the infected machines. 5. Perform a reverse DNS lookup on these IP numbers. 6. Make a note of all of the Fortune 500 companies that appear on the list of infected domains. 7. Send your resume to these companies and request an interview for a system administrator position. These companies are hiring -- whether they realize it or not. 8. Use your new salary to hire a good defense lawyer when the FBI comes knocking. | |
Intolerance is the last defense of the insecure. | |
Everyone under heaven says that my Tao is great and beyond compare. Because it is great, it seems different. If it were not different, it would have vanished long ago. I have three treasures which I hold and keep. The first is mercy; the second is economy; The third is daring not to be ahead of others. From mercy comes courage; from economy comes generosity; From humility comes leadership. Nowadays men shun mercy, but try to be brave; They abandon economy, but try to be generous; They do not believe in humility, but always try to be first. This is certain death. Mercy brings victory in battle and strength in defense. It is the means by which heaven saves and guards. | |
Another day, another dollar. -- Vincent J. Fuller, defense lawyer for John Hinckley, upon Hinckley's acquittal for shooting President Ronald Reagan. | |
"Gentlemen of the jury," said the defense attorney, now beginning to warm to his summation, "the real question here before you is, shall this beautiful young woman be forced to languish away her loveliest years in a dark prison cell? Or shall she be set free to return to her cozy little apartment at 4134 Mountain Ave. -- there to spend her lonely, loveless hours in her boudoir, lying beside her little Princess phone, 962-7873?" | |
Insanity is the final defense ... It's hard to get a refund when the salesman is sniffing your crotch and baying at the moon. | |
XVI: In the year 2054, the entire defense budget will purchase just one aircraft. This aircraft will have to be shared by the Air Force and Navy 3-1/2 days each per week except for leap year, when it will be made available to the Marines for the extra day. XVII: Software is like entropy. It is difficult to grasp, weighs nothing, and obeys the Second Law of Thermodynamics, i.e., it always increases. XVIII: It is very expensive to achieve high unreliability. It is not uncommon to increase the cost of an item by a factor of ten for each factor of ten degradation accomplished. XIX: Although most products will soon be too costly to purchase, there will be a thriving market in the sale of books on how to fix them. XX: In any given year, Congress will appropriate the amount of funding approved the prior year plus three-fourths of whatever change the administration requests -- minus 4-percent tax. -- Norman Augustine |