DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
functions
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

"On a normal ascii line, the only safe condition to detect is a 'BREAK'
- everything else having been assigned functions by Gnu EMACS."
(By Tarl Neustaedter)
===  ALL USERS PLEASE NOTE  ========================

CAR and CDR now return extra values.

The function CAR now returns two values.  Since it has to go to the trouble
to figure out if the object is carcdr-able anyway, we figured you might as
well get both halves at once.  For example, the following code shows how to
destructure a cons (SOME-CONS) into its two slots (THE-CAR and THE-CDR):

        (MULTIPLE-VALUE-BIND (THE-CAR THE-CDR) (CAR SOME-CONS) ...)

For symmetry with CAR, CDR returns a second value which is the CAR of the
object.  In a related change, the functions MAKE-ARRAY and CONS have been
fixed so they don't allocate any storage except on the stack.  This should
hopefully help people who don't like using the garbage collector because
it cold boots the machine so often.
... C++ offers even more flexible control over the visibility of member
objects and member functions.  Specifically, members may be placed in the
public, private, or protected parts of a class.  Members declared in the
public parts are visible to all clients; members declared in the private
parts are fully encapsulated; and members declared in the protected parts
are visible only to the class itself and its subclasses.  C++ also supports
the notion of *_______friends*: cooperative classes that are permitted to see each
other's private parts.
                -- Grady Booch, "Object Oriented Design with Applications"
        Cosmotronic Software Unlimited Inc. does not warrant that the
functions contained in the program will meet your requirements or that
the operation of the program will be uninterrupted or error-free.
        However, Cosmotronic Software Unlimited Inc. warrants the
diskette(s) on which the program is furnished to be of black color and
square shape under normal use for a period of ninety (90) days from the
date of purchase.
        NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS
DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING
ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR
CONSEQUENTIAL DAMAGES.
                -- Horstmann Software Design, the "ChiWriter" user manual
[From the operation manual for the CI-300 Dot Matrix Line Printer, made
in Japan]:

The excellent output machine of MODEL CI-300 as extraordinary DOT MATRIX
LINE PRINTER, built in two MICRO-PROCESSORs as well as EAROM, is featured by
permitting wonderful co-existence such as; "high quality against low cost,"
"diversified functions with compact design," "flexibility in accessibleness
and durability of approx. 2000,000,00 Dot/Head," "being sophisticated in
mechanism but possibly agile operating under noises being extremely
suppressed" etc.

And as a matter of course, the final goal is just simply to help achieve
"super shuttle diplomacy" between cool data, perhaps earned by HOST
COMPUTER, and warm heart of human being.
Real Programs don't use shared text.  Otherwise, how can they use functions
for scratch space after they are finished calling them?
        Risch's decision procedure for integration, not surprisingly,
uses a recursion on the number and type of the extensions from the
rational functions needed to represent the integrand.  Although the
algorithm follows and critically depends upon the appropriate structure
of the input, as in the case of multivariate factorization, we cannot
claim that the algorithm is a natural one.  In fact, the creator of
differential algebra, Ritt, committed suicide in the early 1950's,
largely, it is claimed, because few paid attention to his work.  Probably
he would have received more attention had he obtained the algorithm as well.
                -- Joel Moses, "Algorithms and Complexity", ed. J.F. Traub
                                SEMINAR ANNOUNCEMENT

Title:                Are Frogs Turing Compatible?
Speaker:        Don "The Lion" Knuth

                                ABSTRACT
        Several researchers at the University of Louisiana have been studying
the computing power of various amphibians, frogs in particular.  The problem
of frog computability has become a critical issue that ranges across all areas
of computer science.  It has been shown that anything computable by an amphi-
bian community in a fixed-size pond is computable by a frog in the same-size
pond -- that is to say, frogs are Pond-space complete.  We will show that
there is a log-space, polywog-time reduction from any Turing machine program
to a frog.  We will suggest these represent a proper subset of frog-computable
functions.
        This is not just a let's-see-how-far-those-frogs-can-jump seminar.
This is only for hardcore amphibian-computation people and their colleagues.
        Refreshments will be served.  Music will be played.
The following quote is from page 4-27 of the MSCP Basic Disk Functions
Manual which is part of the UDA50 Programmers Doc Kit manuals:

As stated above, the host area of a disk is structured as a vector of
logical blocks.  From a performance viewpoint, however, it is more
appropriate to view the host area as a four dimensional hyper-cube, the
four dimensions being cylinder, group, track, and sector.
. . .
Referring to our hyper-cube analogy, the set of potentially accessible
blocks form a line parallel to the track axis.  This line moves
parallel to the sector axis, wrapping around when it reaches the edge
of the hyper-cube.
        THE LESSER-KNOWN PROGRAMMING LANGUAGES #17: SARTRE

Named after the late existential philosopher, SARTRE is an extremely
unstructured language.  Statements in SARTRE have no purpose; they just are.
Thus SARTRE programs are left to define their own functions. SARTRE
programmers tend to be boring and depressed, and are no fun at parties.
The tao that can be tar(1)ed
is not the entire Tao.
The path that can be specified
is not the Full Path.

We declare the names
of all variables and functions.
Yet the Tao has no type specifier.

Dynamically binding, you realize the magic.
Statically binding, you see only the hierarchy.

Yet magic and hierarchy
arise from the same source,
and this source has a null pointer.

Reference the NULL within NULL,
it is the gateway to all wizardry.
Operating-system software is the program that orchestrates all the basic
functions of a computer.
- The Wall Street Journal, Tuesday, September 15, 1987, page 40
> From MAILER-DAEMON@Think.COM Thu Mar  2 13:59:11 1989
> Subject: Returned mail: unknown mailer error 255

"Dale, your address no longer functions.  Can you fix it at your end?"
-- Bill Wolfe (wtwolfe@hubcap.clemson.edu)

"Bill, Your brain no longer functions.  Can you fix it at your end?"
-- Karl A. Nyberg (nyberg@ajpo.sei.cmu.edu)
No, my friend, the way to have good and safe government, is not to trust it
all to one, but to divide it among the many, distributing to every one exactly
the functions he is competent to.  It is by dividing and subdividing these
republics from the national one down through all its subordinations, until it
ends in the administration of every man's farm by himself; by placing under
every one what his own eye may superintend, that all will be done for the best.
                -- Thomas Jefferson, to Joseph Cabell, 1816
The health of a democratic society may be measured by the quality
of functions performed by private citizens.
                -- Alexis de Tocqueville
MAFIA, n:
        [Acronym for Mechanized Applications in Forced Insurance
Accounting.] An extensive network with many on-line and offshore
subsystems running under OS, DOS, and IOS.  MAFIA documentation is
rather scanty, and the MAFIA sales office exhibits that testy
reluctance to bona fide inquiries which is the hallmark of so many DP
operations.  From the little that has seeped out, it would appear that
MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped
variant of SNA, in which extended handshakes also perform complex
security functions.  The known timesharing aspects of MAFIA point to a
more than usually autocratic operating system.  Screen prompts carry an
imperative, nonrefusable weighting (most menus offer simple YES/YES
options, defaulting to YES) that precludes indifference or delay.
Uniquely, all editing under MAFIA is performed centrally, using a
powerful rubout feature capable of erasing files, filors, filees, and
entire nodal aggravations.
                -- Stan Kelly-Bootle, "The Devil's DP Dictionary"
If God is perfect, why did He create discontinuous functions?
In the course of reading Hadamard's "The Psychology of Invention in the
Mathematical Field", I have come across evidence supporting a fact
which we coffee achievers have long appreciated:  no really creative,
intelligent thought is possible without a good cup of coffee.  On page
14, Hadamard is discussing Poincare's theory of fuchsian groups and
fuchsian functions, which he describes as "... one of his greatest
discoveries, the first which consecrated his glory ..."  Hadamard refers
to Poincare having had a "... sleepless night which initiated all that
memorable work ..." and gives the following, very revealing quote:

        "One evening, contrary to my custom, I drank black coffee and
        could not sleep.  Ideas rose in crowds;  I felt them collide
        until pairs interlocked, so to speak, making a stable
        combination."

Too bad drinking black coffee was contrary to his custom.  Maybe he
could really have amounted to something as a coffee achiever.
... we must be wary of granting too much power to natural selection
by viewing all basic capacities of our brain as direct adaptations.
I do not doubt that natural selection acted in building our oversized
brains -- and I am equally confident that our brains became large as
an adaptation for definite roles (probably a complex set of interacting
functions).  But these assumptions do not lead to the notion, often
uncritically embraced by strict Darwinians, that all major capacities
of the brain must arise as direct products of natural selection.
                -- S.J. Gould, "The Mismeasure of Man"
'Twas the night before crisis, and all through the house,
        Not a program was working not even a browse.
The programmers were wrung out too mindless to care,
        Knowing chances of cutover hadn't a prayer.
The users were nestled all snug in their beds,
        While visions of inquiries danced in their heads.
When out in the lobby there arose such a clatter,
        I sprang from my tube to see what was the matter.
And what to my wondering eyes should appear,
        But a Super Programmer, oblivious to fear.
More rapid than eagles, his programs they came,
        And he whistled and shouted and called them by name;
On Update!  On Add!  On Inquiry!  On Delete!
        On Batch Jobs!  On Closing!  On Functions Complete!
His eyes were glazed over, his fingers were lean,
        From Weekends and nights in front of a screen.
A wink of his eye, and a twist of his head,
        Soon gave me to know I had nothing to dread...
                -- "Twas the Night before Crisis"
"Brown Orifice" Is Only The Beginning

Last week security holes were found in Netscape's Java implementation that
allowed it to act as a web server. Earlier today, a hacker announced that
he had found vulnerabilities in Mozilla M17 that allow it to operate as a
web browser. And that's just the beginning.

Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a
hack! By manipulating some internal functions, I was able to use M17 to
actually surf the web. Slashdot and Humorix rendered beautifully."

Mozilla engineers were stunned. "This shouldn't be possible. M17 contains
a newsreader, a mail client, an instant messenger client, and a whole
bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle
HTTP or HTML. We haven't been planning on adding web-surfing functionality
to Mozilla until M30... maybe M25 at the earliest. I suspect this whole
thing is a hoax."
And I hate redundancy, and having different functions for the same thing.

        - Linus Torvalds on linux-kernel
On a normal ascii line, the only safe condition to detect is a 'BREAK'
- everything else having been assigned functions by Gnu EMACS.
        -- Tarl Neustaedter
[From an announcement of a congress of the International Ontopsychology
Association, in Rome]:

The Ontopsychological school, availing itself of new research criteria and
of a new telematic epistemology, maintains that social modes do not spring
from dialectics of territory or of class, or of consumer goods, or of means
of power, but rather from dynamic latencies capillarized in millions of
individuals in system functions which, once they have reached the event
maturation, burst forth in catastrophic phenomenology engaging a suitable
stereotype protagonist or duty marionette (general, president, political
party, etc.) to consummate the act of social schizophrenia in mass genocide.
        page 46
...a report citing a study by Dr. Thomas C. Chalmers, of the Mount Sinai
Medical Center in New York, which compared two groups that were being used
to test the theory that ascorbic acid is a cold preventative.  "The group
on placebo who thought they were on ascorbic acid," says Dr. Chalmers,
"had fewer colds than the group on ascorbic acid who thought they were
on placebo."
        page 56
The placebo is proof that there is no real separation between mind and body.
Illness is always an interaction between both.  It can begin in the mind and
affect the body, or it can begin in the body and affect the mind, both of
which are served by the same bloodstream.  Attempts to treat most mental
diseases as though they were completely free of physical causes and attempts
to treat most bodily diseases as though the mind were in no way involved must
be considered archaic in the light of new evidence about the way the human
body functions.
                -- Norman Cousins,
                "Anatomy of an Illness as Perceived by the Patient"
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners