DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
result
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

I played lead guitar in a band called The Federal Duck, which is the kind
of name that was popular in the '60s as a result of controlled substances
being in widespread use.  Back then, there were no restrictions, in terms
of talent, on who could make an album, so we made one, and it sounds like
a group of people who have been given powerful but unfamiliar instruments
as a therapy for a degenerative nerve disease.
                -- Dave Barry, "The Snake"
        A manager was about to be fired, but a programmer who worked for him
invented a new program that became popular and sold well.  As a result, the
manager retained his job.
        The manager tried to give the programmer a bonus, but the programmer
refused it, saying, "I wrote the program because I though it was an interesting
concept, and thus I expect no reward."
        The manager, upon hearing this, remarked, "This programmer, though he
holds a position of small esteem, understands well the proper duty of an
employee.  Lets promote him to the exalted position of management consultant!"
        But when told this, the programmer once more refused, saying, "I exist
so that I can program.  If I were promoted, I would do nothing but waste
everyone's time.  Can I go now?  I have a program that I'm working on."
                -- Geoffrey James, "The Tao of Programming"
All programmers are optimists.  Perhaps this modern sorcery especially attracts
those who believe in happy endings and fairy godmothers.  Perhaps the hundreds
of nitty frustrations drive away all but those who habitually focus on the end
goal.  Perhaps it is merely that computers are young, programmers are younger,
and the young are always optimists.  But however the selection process works,
the result is indisputable:  "This time it will surely run," or "I just found
the last bug."
                -- Frederick Brooks, "The Mythical Man Month"
Dear Sir,
        I am firmly opposed to the spread of microchips either to the home or
to the office,  We have more than enough of them foisted upon us in public
places.  They are a disgusting Americanism, and can only result in the farmers
being forced to grow smaller potatoes, which in turn will cause massive un-
employment in the already severely depressed agricultural industry.
        Yours faithfully,
        Capt. Quinton D'Arcy, J.P.
        Sevenoaks
                -- Letters To The Editor, The Times of London
**** IMPORTANT ****  ALL USERS PLEASE NOTE ****

Due to a recent systems overload error your recent disk files have been
erased.  Therefore, in accordance with the UNIX Basic Manual, University of
Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised
Federal Communications Act, you are being granted Temporary Disk Space,
valid for three months from this date, subject to the restrictions set forth
in Appendix II of the Federal Communications Handbook (18th edition) as well
as the references mentioned herein.  You may apply for more disk space at any
time.  Disk usage in or above the eighth percentile will secure the removal
of all restrictions and you will immediately receive your permanent disk
space.  Disk usage in the sixth or seventh percentile will not effect the
validity of your temporary disk space, though its expiration date may be
extended for a period of up to three months.  A score in the fifth percentile
or below will result in the withdrawal of your Temporary Disk space.
It is a very humbling experience to make a multimillion-dollar mistake, but
it is also very memorable.  I vividly recall the night we decided how to
organize the actual writing of external specifications for OS/360.  The
manager of architecture, the manager of control program implementation, and
I were threshing out the plan, schedule, and division of responsibilities.
        The architecture manager had 10 good men.  He asserted that they
could write the specifications and do it right.  It would take ten months,
three more than the schedule allowed.
        The control program manager had 150 men.  He asserted that they
could prepare the specifications, with the architecture team coordinating;
it would be well-done and practical, and he could do it on schedule.
Furthermore, if the architecture team did it, his 150 men would sit twiddling
their thumbs for ten months.
        To this the architecture manager responded that if I gave the control
program team the responsibility, the result would not in fact be on time,
but would also be three months late, and of much lower quality.  I did, and
it was.  He was right on both counts.  Moreover, the lack of conceptual
integrity made the system far more costly to build and change, and I would
estimate that it added a year to debugging time.
                -- Frederick Brooks Jr., "The Mythical Man Month"
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the remaining
errors by providing for recovery from them.  An interesting footnote to this
design is that now a system failure can usually be considered to be the
result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.
                -- A.L. Scherr, "Functional Structure of IBM Virtual Storage
                   Operating Systems, Part II: OS/VS-2 Concepts and
                   Philosophies," IBM Systems Journal, Vol. 12, No. 4.
Passwords are implemented as a result of insecurity.
Speaking as someone who has delved into the intricacies of PL/I, I am sure
that only Real Men could have written such a machine-hogging, cycle-grabbing,
all-encompassing monster.  Allocate an array and free the middle third?
Sure!  Why not?  Multiply a character string times a bit string and assign the
result to a float decimal?  Go ahead!  Free a controlled variable procedure
parameter and reallocate it before passing it back?  Overlay three different
types of variable on the same memory location?  Anything you say!  Write a
recursive macro?  Well, no, but Real Men use rescan.  How could a language
so obviously designed and written by Real Men not be intended for Real Man use?
There has also been some work to allow the interesting use of macro names.
For example, if you wanted all of your "creat()" calls to include read
permissions for everyone, you could say

        #define creat(file, mode)        creat(file, mode | 0444)

        I would recommend against this kind of thing in general, since it
hides the changed semantics of "creat()" in a macro, potentially far away
from its uses.
        To allow this use of macros, the preprocessor uses a process that
is worth describing, if for no other reason than that we get to use one of
the more amusing terms introduced into the C lexicon.  While a macro is
being expanded, it is temporarily undefined, and any recurrence of the macro
name is "painted blue" -- I kid you not, this is the official terminology
-- so that in future scans of the text the macro will not be expanded
recursively.  (I do not know why the color blue was chosen; I'm sure it
was the result of a long debate, spread over several meetings.)
                -- From Ken Arnold's "C Advisor" column in Unix Review
Do not allow this language (Ada) in its present state to be used in
applications where reliability is critical, i.e., nuclear power stations,
cruise missiles, early warning systems, anti-ballistic missle defense
systems.  The next rocket to go astray as a result of a programming language
error may not be an exploratory space rocket on a harmless trip to Venus:
It may be a nuclear warhead exploding over one of our cities.  An unreliable
programming language generating unreliable programs constitutes a far
greater risk to our environment and to our society than unsafe cars, toxic
pesticides, or accidents at nuclear power stations.
- C. A. R. Hoare
It is a very humbling experience to make a multimillion-dollar mistake, but it
is also very memorable.  I vividly recall the night we decided how to organize
the actual writing of external specifications for OS/360.  The manager of
architecture, the manager of control program implementation, and I were
threshing out the plan, schedule, and division of responsibilities.

The architecture manager had 10 good men.  He asserted that they could write
the specifications and do it right.  It would take ten months, three more
than the schedule allowed.

The control program manager had 150 men.  He asserted that they could prepare
the specifications, with the architecture team coordinating; it would be
well-done and practical, and he could do it on schedule.  Futhermore, if
the architecture team did it, his 150 men would sit twiddling their thumbs
for ten months.

To this the architecture manager responded that if I gave the control program
team the responsibility, the result would not in fact be on time, but would
also be three months late, and of much lower quality.  I did, and it was.  He
was right on both counts.  Moreover, the lack of conceptual integrity made
the system far more costly to build and change, and I would estimate that it
added a year to debugging time.
- Frederick Brooks Jr., "The Mythical Man Month"
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the
remaining errors by providing for recovery from them.  An interesting footnote
to this design is that now a system failure can usually be considered to be
the result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.  -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating
Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal,
Vol. 12, No. 4, 1973, pp. 382-400
I judge a religion as being good or bad based on whether its adherents
become better people as a result of practicing it.
- Joe Mullally, computer salesman
As I argued in "Beloved Son", a book about my son Brian and the subject
of religious communes and cults, one result of proper early instruction
in the methods of rational thought will be to make sudden mindless
conversions -- to anything -- less likely.  Brian now realizes this and
has, after eleven years, left the sect he was associated with.  The
problem is that once the untrained mind has made a formal commitment to
a religious philosophy -- and it does not matter whether that philosophy
is generally reasonable and high-minded or utterly bizarre and
irrational -- the powers of reason are suprisingly ineffective in
changing the believer's mind.
- Steve Allen, comdeian, from an essay in the book "The Courage of
  Conviction", edited by Philip Berman
"It is better to have tried and failed than to have failed to try, but
the result's the same."
- Mike Dennison
"Pseudocode can be used to some extent to aid the maintenance
process.  However, pseudocode that is highly detailed -
approaching the level of detail of the code itself - is not of
much use as maintenance documentation.  Such detailed
documentation has to be maintained almost as much as the code,
thus doubling the maintenance burden.  Furthermore, since such
voluminous pseudocode is too distracting to be kept in the
listing itself, it must be kept in a separate folder.  The
result: Since pseudocode - unlike real code - doesn't have to be
maintained, no one will maintain it.  It will soon become out of
date and everyone will ignore it.  (Once, I did an informal
survey of 42 shops that used pseudocode.  Of those 42, 0 [zero!],
found that it had any value as maintenance documentation."
         --Meilir Page-Jones, "The Practical Guide to Structured
           Design", Yourdon Press (c) 1988
In respect to lock-making, there can scarcely be such a thing as dishonesty
of intention: the inventor produces a lock which he honestly thinks will
possess such and such qualities; and he declares his belief to the world.
If others differ from him in opinion concerning those qualities, it is open
to them to say so; and the discussion, truthfully conducted, must lead to
public advantage: the discussion stimulates curiosity, and curiosity stimu-
lates invention.  Nothing but a partial and limited view of the question
could lead to the opinion that harm can result: if there be harm, it will be
much more than counterbalanced by good."
-- Charles Tomlinson's Rudimentary Treatise on the Construction of Locks,
   published around 1850.
"The net result is a system that is not only binary compatible with 4.3 BSD,
but is even bug for bug compatible in almost all features."
-- Avadit Tevanian, Jr., "Architecture-Independent Virtual Memory Management
   for Parallel and Distributed Environments:  The Mach Approach"
                        HOW TO PROVE IT, PART 7
proof by forward reference:
        Reference is usually to a forthcoming paper of the author,
        which is often not as forthcoming as at first.

proof by semantic shift:
        Some of the standard but inconvenient definitions are changed
        for the statement of the result.

proof by appeal to intuition:
        Cloud-shaped drawings frequently help here.
Nothing in life is so exhilarating as to be shot at without result.
                -- Winston Churchill

Next to being shot at and missed, nothing is really quite as
satisfying as an income tax refund.
                -- F.J. Raymond
broad-mindedness, n:
        The result of flattening high-mindedness out.
Finagle's Eighth Law:
        If an experiment works, something has gone wrong.

Finagle's Ninth Law:
        No matter what results are expected, someone is always willing to
        fake it.

Finagle's Tenth Law:
        No matter what the result someone is always eager to misinterpret it.

Finagle's Eleventh Law:
        No matter what occurs, someone believes it happened according to
        his pet theory.
Finagle's Second Law:
        No matter what the anticipated result, there will always be
        someone eager to (a) misinterpret it, (b) fake it, or (c) believe it
        happened according to his own pet theory.
Law of Communications:
        The inevitable result of improved and enlarged communications
        between different levels in a hierarchy is a vastly increased
        area of misunderstanding.
Rhode's Law:
        When any principle, law, tenet, probability, happening, circumstance,
        or result can in no way be directly, indirectly, empirically, or
        circuitously proven, derived, implied, inferred, induced, deducted,
        estimated, or scientifically guessed, it will always for the purpose
        of convenience, expediency, political advantage, material gain, or
        personal comfort, or any combination of the above, or none of the
        above, be unilaterally and unequivocally assumed, proclaimed, and
        adhered to as absolute truth to be undeniably, universally, immutably,
        and infinitely so, until such time as it becomes advantageous to
        assume otherwise, maybe.
Zero Defects, n.:
        The result of shutting down a production line.
How much of their influence on you is a result of your influence on them?
Q:        How many lawyers does it take to change a light bulb?
A:        Whereas the party of the first part, also known as "Lawyer", and the
party of the second part, also known as "Light Bulb", do hereby and forthwith
agree to a transaction wherein the party of the second part shall be removed
from the current position as a result of failure to perform previously agreed
upon duties, i.e., the lighting, elucidation, and otherwise illumination of
the area ranging from the front (north) door, through the entryway, terminating
at an area just inside the primary living area, demarcated by the beginning of
the carpet, any spillover illumination being at the option of the party of the
second part and not required by the aforementioned agreement between the
parties.
        The aforementioned removal transaction shall include, but not be
limited to, the following.  The party of the first part shall, with or without
elevation at his option, by means of a chair, stepstool, ladder or any other
means of elevation, grasp the party of the second part and rotate the party
of the second part in a counter-clockwise direction, this point being tendered
non-negotiable.  Upon reaching a point where the party of the second part
becomes fully detached from the receptacle, the party of the first part shall
have the option of disposing of the party of the second part in a manner
consistent with all relevant and applicable local, state and federal statutes.
Once separation and disposal have been achieved, the party of the first part
shall have the option of beginning installation.  Aforesaid installation shall
occur in a manner consistent with the reverse of the procedures described in
step one of this self-same document, being careful to note that the rotation
should occur in a clockwise direction, this point also being non-negotiable.
The above described steps may be performed, at the option of the party of the
first part, by any or all agents authorized by him, the objective being to
produce the most possible revenue for the Partnership.
        An architect's first work is apt to be spare and clean.  He knows
he doesn't know what he's doing, so he does it carefully and with great
restraint.
        As he designs the first work, frill after frill and embellishment
after embellishment occur to him.  These get stored away to be used "next
time." Sooner or later the first system is finished, and the architect,
with firm confidence and a demonstrated mastery of that class of systems,
is ready to build a second system.
        This second is the most dangerous system a man ever designs.
When he does his third and later ones, his prior experiences will
confirm each other as to the general characteristics of such systems,
and their differences will identify those parts of his experience that
are particular and not generalizable.
        The general tendency is to over-design the second system, using
all the ideas and frills that were cautiously sidetracked on the first
one.  The result, as Ovid says, is a "big pile."
                -- Frederick Brooks, "The Mythical Man Month"
I do hate sums.  There is no greater mistake than to call arithmetic an
exact science.  There are permutations and aberrations discernible to minds
entirely noble like mine; subtle variations which ordinary accountants fail
to discover; hidden laws of number which it requires a mind like mine to
perceive.  For instance, if you add a sum from the bottom up, and then again
from the top down, the result is always different.
                -- Mrs. La Touche
It's hard to think of you as the end result of millions of years of evolution.
                The Three Major Kind of Tools

* Tools for hittings things to make them loose or to tighten them up or
jar their many complex, sophisticated electrical parts in such a
manner that they function perfectly.  (These are your hammers, maces,
bludgeons, and truncheons.)

* Tools that, if dropped properly, can penetrate your foot.  (Awls)

* Tools that nobody should ever use because the potential danger is far
greater than the value of any project that could possibly result.
(Power saws, power drills, power staplers, any kind of tool that uses
any kind of power more advanced than flashlight batteries.)
                -- Dave Barry, "The Taming of the Screw"
Operation Desert Slash

WASHINGTON, D.C. -- High officials in the US military are planning on putting
the  'Slashdot Effect' to use against Iraq. Pentagon computer experts think
that the Slashdot Effect could topple key Net-connected Iraqi computer
systems.  Such a Denial of Service attack could prove instrumental when the
US invades.

One Pentagon official said, "If I had a million dollars for every server that
crashed as a result of being linked on Slashdot, I'd be richer than Bill
Gates.  The Slashdot Effect is a very powerful weapon that the US military
wants to tap into."

Rob Malda has been contacted by top military brass.  According to anonymous
sources, Malda will play a key part in the so-called "Operation Desert
Slash".  Supposedly Malda will post several Slashdot articles with links to
critical Iraqi websites right when the US invasion is set to begin.
Meanwhile, Pentagon operatives will begin a series of Denial of Service
attacks on other key Iraqi computer systems. One source notes, "Since many
Iraqi systems rely on Microsoft software, this task should be relatively
simple."
Jargon Coiner (#2)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* SLASHDUP EFFECT, THE: Accidentally posting two or more duplicate
  comments to Slashdot, usually as the result of hitting ENTER at the
  wrong time or fumbling with the Preview option.

* YOU'VE GOT SLOGAN: The tendency for reporters to parody the stupid
  "You've Got Mail" saying when writing about AOL.

  Example: "You've Got Spam", "You've Got Merger" (the headline for an
  article about the Netscape/AOL Merger From Hell)

* PENGUINIZATION: Ongoing trend to slap a picture of Tux Penguin next to
  anything even remotely related to Linux.

* IDLESURF: Aimless surfing of the Internet; looking for something
  interesting to read while killing time. Often involves reloaded the
  Slashdot homepage every 5 minutes to see if a new article has been
  posted.
Jargon Coiner (#6)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* STOP MIRAGE: Trying to click on an imaginary Stop button on a program's
  toolbar after doing something you didn't want to. Usually caused as the
  result of excessive use of Netscape.

* YA-PREFIX: Putting "another" or "yet another" in front of a name or
  tacking "YA" in front of an acronym.

  Example: "We could ya-prefix this fortune by titling it 'Yet Another
  Lame List of Fabricated Jargon'."

* DOMAINEERING: Using a service like Netcraft to determine what operating
  system and webserver a particular domain is running.

* NOT-A-SALTINE EXPLANATION: The canned response given to someone who
  uses the term "hacker" instead of "cracker".
The Blue Screen Of Advocacy

The Federal Bureau of Investigation & Privacy Violations has issued a
national advisory warning computer stores to be on the lookout for the
"Bluescreen Bandits". These extreme Linux zealots go from store to store
and from computer to computer typing in "C:\CON\CON" and causing the demo
machines to crash and display the Blue Screen Of Death.

Efforts to apprehend the bandits have so far been unsuccessful. The
outlaws were caught on tape at a CompUSSR location in Southern California,
but in an ironic twist, the surveillance system bluescreened just before
the penguinistas came into clear view.

"We don't have many clues. It's not clear whether a small group is behind
the bluescreen vandalism, or whether hundreds or even thousands of geek
zealots are involved," said the manager of a Capacitor City store.

The manager has good reason to be upset. The bluescreen raid was the top
story in the local newspaper and quickly became a hot topic of discussion.
As a result, the local school board halted its controversial plans to
migrate their computers from Macs to PCs.
Severe Acronym Shortage Cripples Computer Industry

SILICON VALLEY, CALIFORNIA (SVC) -- According to a recent study by the
Blartner Group, 99.5% of all possible five letter combinations have
already been appropriated for computer industry acronyms. The impending
shortage of 5LC's is casting a dark shadow over the industry, which relies
heavily on short, easy-to-remember acronyms for everything.

"Acronym namespace collisions (ANCs) are increasing at a fantastic rate
and threaten the very fabric of the computing world," explained one ZD
pundit. "For example, when somebody talks about XP, I don't know whether
they mean eXtreme Programming or Microsoft's eXceptionally Pathetic
operating system. We need to find a solution now or chaos will result."

Leaders of several SVC companies have floated the idea of an
"industry-wide acronym conservation protocol" (IWACP -- one of the few
5LCs not already appropriated). Explained Bob Smith, CTO of IBM, "If
companies would voluntarily limit the creation of new acronyms while
recycling outdated names, we could reduce much of the pollution within the
acronym namespace ourselves. The last thing we want is for Congress to get
involved and try to impose a solution for this SAS (Severe Acronym
Shortage) that would likely only create many new acronyms in the process."
Most people have a furious itch to talk about themselves and are restrained
only by the disinclination of others to listen.  Reserve is an artificial
quality that is developed in most of us as the result of innumerable rebuffs.
                -- W.S. Maugham
People often find it easier to be a result of the past than a cause of the
future.
My ritual differs slightly.  What I do, first thing [in the morning], is I
hop into the shower stall.  Then I hop right back out, because when I hopped
in I landed barefoot right on top of See Threepio, a little plastic robot
character from "Star Wars" whom my son, Robert, likes to pull the legs off
of while he showers.  Then I hop right back into the stall because our dog,
Earnest, who has been alone in the basement all night building up powerful
dog emotions, has come bounding and quivering into the bathroom and wants
to greet me with 60 or 70 thousand playful nips, any one of which -- bear
in mind that I am naked and, without my contact lenses, essentially blind
-- could result in the kind of injury where you have to learn a whole new
part if you want to sing the "Messiah," if you get my drift.  Then I hop
right back out, because Robert, with that uncanny sixth sense some children
have -- you cannot teach it; they either have it or they don't -- has chosen
exactly that moment to flush one of the toilets.  Perhaps several of them.
                -- Dave Barry
NEW YORK (CNN) -- Internet users who spend even a few hours a week online
at home experience higher levels of depression and loneliness than if
they had used the computer network less frequently, The New York Times
reported Sunday.  The result ...  surprised both researchers and
sponsors, which included Intel Corp., Hewlett Packard, AT&T Research and
Apple Computer.
We should realize that a city is better off with bad laws, so long as they
remain fixed, then with good laws that are constantly being altered, that
the lack of learning combined with sound common sense is more helpful than
the kind of cleverness that gets out of hand, and that as a general rule,
states are better governed by the man in the street than by intellectuals.
These are the sort of people who want to appear wiser than the laws, who
want to get their own way in every general discussion, because they feel that
they cannot show off their intelligence in matters of greater importance, and
who, as a result, very often bring ruin on their country.
                -- Cleon, Thucydides, III, 37 translation by Rex Warner
It is only by risking our persons from one hour to another that we live
at all.  And often enough our faith beforehand in an uncertified result
is the only thing that makes the result come true.
                -- William James
Take time to reflect on all the things you have, not as a result of your
merit or hard work or because God or chance or the efforts of other people
have given them to you.
What they said:
        What they meant:

"If you knew this person as well as I know him, you would think as much
of him as I do."
        (Or as little, to phrase it slightly more accurately.)
"Her input was always critical."
        (She never had a good word to say.)
"I have no doubt about his capability to do good work."
        (And it's nonexistent.)
"This candidate would lend balance to a department like yours, which
already has so many outstanding members."
        (Unless you already have a moron.)
"His presentation to my seminar last semester was truly remarkable:
one unbelievable result after another."
        (And we didn't believe them, either.)
"She is quite uniform in her approach to any function you may assign her."
        (In fact, to life in general...)
Boss: You forgot to assign the result of your map!

Hacker: Dang, I'm always forgetting my assignations...

Boss: And what's that "goto" doing there?!?

Hacker: Er, I guess my finger slipped when I was typing "getservbyport"...

Boss: Ah well, accidents will happen.  Maybe we should have picked APL.
             -- Larry Wall in <199710311732.JAA19169@wall.org>
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners