Proverbs, aphorisms, quotations (English) | by Linux fortune |
"On a normal ascii line, the only safe condition to detect is a 'BREAK' - everything else having been assigned functions by Gnu EMACS." (By Tarl Neustaedter) | |
=== ALL USERS PLEASE NOTE ======================== CAR and CDR now return extra values. The function CAR now returns two values. Since it has to go to the trouble to figure out if the object is carcdr-able anyway, we figured you might as well get both halves at once. For example, the following code shows how to destructure a cons (SOME-CONS) into its two slots (THE-CAR and THE-CDR): (MULTIPLE-VALUE-BIND (THE-CAR THE-CDR) (CAR SOME-CONS) ...) For symmetry with CAR, CDR returns a second value which is the CAR of the object. In a related change, the functions MAKE-ARRAY and CONS have been fixed so they don't allocate any storage except on the stack. This should hopefully help people who don't like using the garbage collector because it cold boots the machine so often. | |
... C++ offers even more flexible control over the visibility of member objects and member functions. Specifically, members may be placed in the public, private, or protected parts of a class. Members declared in the public parts are visible to all clients; members declared in the private parts are fully encapsulated; and members declared in the protected parts are visible only to the class itself and its subclasses. C++ also supports the notion of *_______friends*: cooperative classes that are permitted to see each other's private parts. -- Grady Booch, "Object Oriented Design with Applications" | |
Cosmotronic Software Unlimited Inc. does not warrant that the functions contained in the program will meet your requirements or that the operation of the program will be uninterrupted or error-free. However, Cosmotronic Software Unlimited Inc. warrants the diskette(s) on which the program is furnished to be of black color and square shape under normal use for a period of ninety (90) days from the date of purchase. NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES. -- Horstmann Software Design, the "ChiWriter" user manual | |
[From the operation manual for the CI-300 Dot Matrix Line Printer, made in Japan]: The excellent output machine of MODEL CI-300 as extraordinary DOT MATRIX LINE PRINTER, built in two MICRO-PROCESSORs as well as EAROM, is featured by permitting wonderful co-existence such as; "high quality against low cost," "diversified functions with compact design," "flexibility in accessibleness and durability of approx. 2000,000,00 Dot/Head," "being sophisticated in mechanism but possibly agile operating under noises being extremely suppressed" etc. And as a matter of course, the final goal is just simply to help achieve "super shuttle diplomacy" between cool data, perhaps earned by HOST COMPUTER, and warm heart of human being. | |
Real Programs don't use shared text. Otherwise, how can they use functions for scratch space after they are finished calling them? | |
Risch's decision procedure for integration, not surprisingly, uses a recursion on the number and type of the extensions from the rational functions needed to represent the integrand. Although the algorithm follows and critically depends upon the appropriate structure of the input, as in the case of multivariate factorization, we cannot claim that the algorithm is a natural one. In fact, the creator of differential algebra, Ritt, committed suicide in the early 1950's, largely, it is claimed, because few paid attention to his work. Probably he would have received more attention had he obtained the algorithm as well. -- Joel Moses, "Algorithms and Complexity", ed. J.F. Traub | |
SEMINAR ANNOUNCEMENT Title: Are Frogs Turing Compatible? Speaker: Don "The Lion" Knuth ABSTRACT Several researchers at the University of Louisiana have been studying the computing power of various amphibians, frogs in particular. The problem of frog computability has become a critical issue that ranges across all areas of computer science. It has been shown that anything computable by an amphi- bian community in a fixed-size pond is computable by a frog in the same-size pond -- that is to say, frogs are Pond-space complete. We will show that there is a log-space, polywog-time reduction from any Turing machine program to a frog. We will suggest these represent a proper subset of frog-computable functions. This is not just a let's-see-how-far-those-frogs-can-jump seminar. This is only for hardcore amphibian-computation people and their colleagues. Refreshments will be served. Music will be played. | |
The following quote is from page 4-27 of the MSCP Basic Disk Functions Manual which is part of the UDA50 Programmers Doc Kit manuals: As stated above, the host area of a disk is structured as a vector of logical blocks. From a performance viewpoint, however, it is more appropriate to view the host area as a four dimensional hyper-cube, the four dimensions being cylinder, group, track, and sector. . . . Referring to our hyper-cube analogy, the set of potentially accessible blocks form a line parallel to the track axis. This line moves parallel to the sector axis, wrapping around when it reaches the edge of the hyper-cube. | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #17: SARTRE Named after the late existential philosopher, SARTRE is an extremely unstructured language. Statements in SARTRE have no purpose; they just are. Thus SARTRE programs are left to define their own functions. SARTRE programmers tend to be boring and depressed, and are no fun at parties. | |
The tao that can be tar(1)ed is not the entire Tao. The path that can be specified is not the Full Path. We declare the names of all variables and functions. Yet the Tao has no type specifier. Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy. Yet magic and hierarchy arise from the same source, and this source has a null pointer. Reference the NULL within NULL, it is the gateway to all wizardry. | |
Operating-system software is the program that orchestrates all the basic functions of a computer. - The Wall Street Journal, Tuesday, September 15, 1987, page 40 | |
> From MAILER-DAEMON@Think.COM Thu Mar 2 13:59:11 1989 > Subject: Returned mail: unknown mailer error 255 "Dale, your address no longer functions. Can you fix it at your end?" -- Bill Wolfe (wtwolfe@hubcap.clemson.edu) "Bill, Your brain no longer functions. Can you fix it at your end?" -- Karl A. Nyberg (nyberg@ajpo.sei.cmu.edu) | |
No, my friend, the way to have good and safe government, is not to trust it all to one, but to divide it among the many, distributing to every one exactly the functions he is competent to. It is by dividing and subdividing these republics from the national one down through all its subordinations, until it ends in the administration of every man's farm by himself; by placing under every one what his own eye may superintend, that all will be done for the best. -- Thomas Jefferson, to Joseph Cabell, 1816 | |
The health of a democratic society may be measured by the quality of functions performed by private citizens. -- Alexis de Tocqueville | |
MAFIA, n: [Acronym for Mechanized Applications in Forced Insurance Accounting.] An extensive network with many on-line and offshore subsystems running under OS, DOS, and IOS. MAFIA documentation is rather scanty, and the MAFIA sales office exhibits that testy reluctance to bona fide inquiries which is the hallmark of so many DP operations. From the little that has seeped out, it would appear that MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped variant of SNA, in which extended handshakes also perform complex security functions. The known timesharing aspects of MAFIA point to a more than usually autocratic operating system. Screen prompts carry an imperative, nonrefusable weighting (most menus offer simple YES/YES options, defaulting to YES) that precludes indifference or delay. Uniquely, all editing under MAFIA is performed centrally, using a powerful rubout feature capable of erasing files, filors, filees, and entire nodal aggravations. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
If God is perfect, why did He create discontinuous functions? | |
In the course of reading Hadamard's "The Psychology of Invention in the Mathematical Field", I have come across evidence supporting a fact which we coffee achievers have long appreciated: no really creative, intelligent thought is possible without a good cup of coffee. On page 14, Hadamard is discussing Poincare's theory of fuchsian groups and fuchsian functions, which he describes as "... one of his greatest discoveries, the first which consecrated his glory ..." Hadamard refers to Poincare having had a "... sleepless night which initiated all that memorable work ..." and gives the following, very revealing quote: "One evening, contrary to my custom, I drank black coffee and could not sleep. Ideas rose in crowds; I felt them collide until pairs interlocked, so to speak, making a stable combination." Too bad drinking black coffee was contrary to his custom. Maybe he could really have amounted to something as a coffee achiever. | |
... we must be wary of granting too much power to natural selection by viewing all basic capacities of our brain as direct adaptations. I do not doubt that natural selection acted in building our oversized brains -- and I am equally confident that our brains became large as an adaptation for definite roles (probably a complex set of interacting functions). But these assumptions do not lead to the notion, often uncritically embraced by strict Darwinians, that all major capacities of the brain must arise as direct products of natural selection. -- S.J. Gould, "The Mismeasure of Man" | |
'Twas the night before crisis, and all through the house, Not a program was working not even a browse. The programmers were wrung out too mindless to care, Knowing chances of cutover hadn't a prayer. The users were nestled all snug in their beds, While visions of inquiries danced in their heads. When out in the lobby there arose such a clatter, I sprang from my tube to see what was the matter. And what to my wondering eyes should appear, But a Super Programmer, oblivious to fear. More rapid than eagles, his programs they came, And he whistled and shouted and called them by name; On Update! On Add! On Inquiry! On Delete! On Batch Jobs! On Closing! On Functions Complete! His eyes were glazed over, his fingers were lean, From Weekends and nights in front of a screen. A wink of his eye, and a twist of his head, Soon gave me to know I had nothing to dread... -- "Twas the Night before Crisis" | |
"Brown Orifice" Is Only The Beginning Last week security holes were found in Netscape's Java implementation that allowed it to act as a web server. Earlier today, a hacker announced that he had found vulnerabilities in Mozilla M17 that allow it to operate as a web browser. And that's just the beginning. Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a hack! By manipulating some internal functions, I was able to use M17 to actually surf the web. Slashdot and Humorix rendered beautifully." Mozilla engineers were stunned. "This shouldn't be possible. M17 contains a newsreader, a mail client, an instant messenger client, and a whole bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle HTTP or HTML. We haven't been planning on adding web-surfing functionality to Mozilla until M30... maybe M25 at the earliest. I suspect this whole thing is a hoax." | |
And I hate redundancy, and having different functions for the same thing. - Linus Torvalds on linux-kernel | |
On a normal ascii line, the only safe condition to detect is a 'BREAK' - everything else having been assigned functions by Gnu EMACS. -- Tarl Neustaedter | |
[From an announcement of a congress of the International Ontopsychology Association, in Rome]: The Ontopsychological school, availing itself of new research criteria and of a new telematic epistemology, maintains that social modes do not spring from dialectics of territory or of class, or of consumer goods, or of means of power, but rather from dynamic latencies capillarized in millions of individuals in system functions which, once they have reached the event maturation, burst forth in catastrophic phenomenology engaging a suitable stereotype protagonist or duty marionette (general, president, political party, etc.) to consummate the act of social schizophrenia in mass genocide. | |
page 46 ...a report citing a study by Dr. Thomas C. Chalmers, of the Mount Sinai Medical Center in New York, which compared two groups that were being used to test the theory that ascorbic acid is a cold preventative. "The group on placebo who thought they were on ascorbic acid," says Dr. Chalmers, "had fewer colds than the group on ascorbic acid who thought they were on placebo." page 56 The placebo is proof that there is no real separation between mind and body. Illness is always an interaction between both. It can begin in the mind and affect the body, or it can begin in the body and affect the mind, both of which are served by the same bloodstream. Attempts to treat most mental diseases as though they were completely free of physical causes and attempts to treat most bodily diseases as though the mind were in no way involved must be considered archaic in the light of new evidence about the way the human body functions. -- Norman Cousins, "Anatomy of an Illness as Perceived by the Patient" |