Proverbs, aphorisms, quotations (English) | by Linux fortune |
Hoaars-Faisse Gallery presents: An exhibit of works by the artist known only as Pretzel. The exhibit includes several large conceptual works using non-traditional media and found objects including old sofa-beds, used mace canisters, discarded sanitary napkins and parts of freeways. The artist explores our dehumanization due to high technology and unresponsive governmental structures in a post-industrial world. She/he (the artist prefers to remain without gender) strives to create dialogue between viewer and creator, to aid us in our quest to experience contemporary life with its inner-city tensions, homelessness, global warming and gender and class-based stress. The works are arranged to lead us to the essence of the argument: that the alienation of the person/machine boundary has sapped the strength of our voices and must be destroyed for society to exist in a more fundamental sense. | |
My band career ended late in my senior year when John Cooper and I threw my amplifier out the dormitory window. We did not act in haste. First we checked to make sure the amplifier would fit through the frame, using the belt from my bathrobe to measure, then we picked up the amplifier and backed up to my bedroom door. Then we rushed forward, shouting "The WHO! The WHO!" and we launched my amplifier perfectly, as though we had been doing it all our lives, clean through the window and down onto the sidewalk, where a small but appreciative crowd had gathered. I would like to be able to say that this was a symbolic act, an effort on my part to break cleanly away from one state in my life and move on to another, but the truth is, Cooper and I really just wanted to find out what it would sound like. It sounded OK. -- Dave Barry, "The Snake" | |
So Richard and I decided to try to catch [the small shark]. With a great deal of strategy and effort and shouting, we managed to maneuver the shark, over the course of about a half-hour, to a sort of corner of the lagoon, so that it had no way to escape other than to flop up onto the land and evolve. Richard and I were inching toward it, sort of crouched over, when all of a sudden it turned around and -- I can still remember the sensation I felt at that moment, primarily in the armpit area -- headed right straight toward us. Many people would have panicked at this point. But Richard and I were not "many people." We were experienced waders, and we kept our heads. We did exactly what the textbook says you should do when you're unarmed and a shark that is nearly two feet long turns on you in water up to your lower calves: We sprinted I would say 600 yards in the opposite direction, using a sprinting style such that the bottoms of our feet never once went below the surface of the water. We ran all the way to the far shore, and if we had been in a Warner Brothers cartoon we would have run right INTO the beach, and you would have seen these two mounds of sand racing across the island until they bonked into trees and coconuts fell onto their heads. -- Dave Barry, "The Wonders of Sharks on TV" | |
Anyone who thinks UNIX is intuitive should be forced to write 5000 lines of code using nothing but vi or emacs. AAAAACK! (Discussion in comp.os.linux.misc on the intuitiveness of commands, especially Emacs.) | |
"On the Internet, no one knows you're using Windows NT" (Submitted by Ramiro Estrugo, restrugo@fateware.com) | |
> > Other than the fact Linux has a cool name, could someone explain why I > > should use Linux over BSD? > > No. That's it. The cool name, that is. We worked very hard on > creating a name that would appeal to the majority of people, and it > certainly paid off: thousands of people are using linux just to be able > to say "OS/2? Hah. I've got Linux. What a cool name". 386BSD made the > mistake of putting a lot of numbers and weird abbreviations into the > name, and is scaring away a lot of people just because it sounds too > technical. (Linus Torvalds' follow-up to a question about Linux) | |
There are no threads in a.b.p.erotica, so there's no gain in using a threaded news reader. (Unknown source) | |
We are using Linux daily to UP our productivity - so UP yours! (Adapted from Pat Paulsen by Joe Sloan) | |
We are currently trying a new concept of using a live mouse. Unfortuantely, one has yet to survive being hooked up to the computer.....please bear with us. | |
=== ALL USERS PLEASE NOTE ======================== A new system, the CIRCULATORY system, has been added. The long-experimental CIRCULATORY system has been released to users. The Lisp Machine uses Type B fluid, the L machine uses Type A fluid. When the switch to Common Lisp occurs both machines will, of course, be Type O. Please check fluid level by using the DIP stick which is located in the back of VMI monitors. Unchecked low fluid levels can cause poor paging performance. | |
=== ALL USERS PLEASE NOTE ======================== CAR and CDR now return extra values. The function CAR now returns two values. Since it has to go to the trouble to figure out if the object is carcdr-able anyway, we figured you might as well get both halves at once. For example, the following code shows how to destructure a cons (SOME-CONS) into its two slots (THE-CAR and THE-CDR): (MULTIPLE-VALUE-BIND (THE-CAR THE-CDR) (CAR SOME-CONS) ...) For symmetry with CAR, CDR returns a second value which is the CAR of the object. In a related change, the functions MAKE-ARRAY and CONS have been fixed so they don't allocate any storage except on the stack. This should hopefully help people who don't like using the garbage collector because it cold boots the machine so often. | |
Dear Ms. Postnews: I couldn't get mail through to somebody on another site. What should I do? -- Eager Beaver Dear Eager: No problem, just post your message to a group that a lot of people read. Say, "This is for John Smith. I couldn't get mail through so I'm posting it. All others please ignore." This way tens of thousands of people will spend a few seconds scanning over and ignoring your article, using up over 16 man-hours their collective time, but you will be saved the terrible trouble of checking through usenet maps or looking for alternate routes. Just think, if you couldn't distribute your message to 9000 other computers, you might actually have to (gasp) call directory assistance for 60 cents, or even phone the person. This can cost as much as a few DOLLARS (!) for a 5 minute call! And certainly it's better to spend 10 to 20 dollars of other people's money distributing the message than for you to have to waste $9 on an overnight letter, or even 25 cents on a stamp! Don't forget. The world will end if your message doesn't get through, so post it as many places as you can. -- Emily Postnews Answers Your Questions on Netiquette | |
Ever wondered about the origins of the term "bugs" as applied to computer technology? U.S. Navy Capt. Grace Murray Hopper has firsthand explanation. The 74-year-old captain, who is still on active duty, was a pioneer in computer technology during World War II. At the C.W. Post Center of Long Island University, Hopper told a group of Long Island public school adminis- trators that the first computer "bug" was a real bug--a moth. At Harvard one August night in 1945, Hopper and her associates were working on the "granddaddy" of modern computers, the Mark I. "Things were going badly; there was something wrong in one of the circuits of the long glass-enclosed computer," she said. "Finally, someone located the trouble spot and, using ordinary tweezers, removed the problem, a two-inch moth. From then on, when anything went wrong with a computer, we said it had bugs in it." Hopper said that when the veracity of her story was questioned recently, "I referred them to my 1945 log book, now in the collection of the Naval Surface Weapons Center, and they found the remains of that moth taped to the page in question." [actually, the term "bug" had even earlier usage in regard to problems with radio hardware. Ed.] | |
Every Solidarity center had piles and piles of paper ... everyone was eating paper and a policeman was at the door. Now all you have to do is bend a disk. -- A member of the outlawed Polish trade union, Solidarity, commenting on the benefits of using computers in support of their movement. | |
FORTRAN is a good example of a language which is easier to parse using ad hoc techniques. -- D. Gries [What's good about it? Ed.] | |
If you ever want to have a lot of fun, I recommend that you go off and program an imbedded system. The salient characteristic of an imbedded system is that it cannot be allowed to get into a state from which only direct intervention will suffice to remove it. An imbedded system can't permanently trust anything it hears from the outside world. It must sniff around, adapt, consider, sniff around, and adapt again. I'm not talking about ordinary modular programming carefulness here. No. Programming an imbedded system calls for undiluted raging maniacal paranoia. For example, our ethernet front ends need to know what network number they are on so that they can address and route PUPs properly. How do you find out what your network number is? Easy, you ask a gateway. Gateways are required by definition to know their correct network numbers. Once you've got your network number, you start using it and before you can blink you've got it wired into fifteen different sockets spread all over creation. Now what happens when the panic-stricken operator realizes he was running the wrong version of the gateway which was giving out the wrong network number? Never supposed to happen. Tough. Supposing that your software discovers that the gateway is now giving out a different network number than before, what's it supposed to do about it? This is not discussed in the protocol document. Never supposed to happen. Tough. I think you get my drift. | |
LOGO for the Dead LOGO for the Dead lets you continue your computing activities from "The Other Side." The package includes a unique telecommunications feature which lets you turn your TRS-80 into an electronic Ouija board. Then, using Logo's graphics capabilities, you can work with a friend or relative on this side of the Great Beyond to write programs. The software requires that your body be hardwired to an analog-to-digital converter, which is then interfaced to your computer. A special terminal (very terminal) program lets you talk with the users through Deadnet, an EBBS (Ectoplasmic Bulletin Board System). LOGO for the Dead is available for 10 percent of your estate from NecroSoft inc., 6502 Charnelhouse Blvd., Cleveland, OH 44101. -- '80 Microcomputing | |
Making files is easy under the UNIX operating system. Therefore, users tend to create numerous files using large amounts of file space. It has been said that the only standard thing about all UNIX systems is the message-of-the-day telling users to clean up their files. -- System V.2 administrator's guide | |
Real software engineers work from 9 to 5, because that is the way the job is described in the formal spec. Working late would feel like using an undocumented external procedure. | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #18: FIFTH FIFTH is a precision mathematical language in which the data types refer to quantity. The data types range from CC, OUNCE, SHOT, and JIGGER to FIFTH (hence the name of the language), LITER, MAGNUM and BLOTTO. Commands refer to ingredients such as CHABLIS, CHARDONNAY, CABERNET, GIN, VERMOUTH, VODKA, SCOTCH, and WHATEVERSAROUND. The many versions of the FIFTH language reflect the sophistication and financial status of its users. Commands in the ELITE dialect include VSOP and LAFITE, while commands in the GUTTER dialect include HOOTCH and RIPPLE. The latter is a favorite of frustrated FORTH programmers who end up using this language. | |
The work [of software development] is becoming far easier (i.e. the tools we're using work at a higher level, more removed from machine, peripheral and operating system imperatives) than it was twenty years ago, and because of this, knowledge of the internals of a system may become less accessible. We may be able to dig deeper holes, but unless we know how to build taller ladders, we had best hope that it does not rain much. -- Paul Licker | |
Using TSO is like kicking a dead whale down the beach. -- S.C. Johnson | |
You're using a keyboard! How quaint! | |
Do not underestimate the value of print statements for debugging. Don't have aesthetic convulsions when using them, either. | |
Each team building another component has been using the most recent tested version of the integrated system as a test bed for debugging its piece. Their work will be set back by having that test bed change under them. Of course it must. But the changes need to be quantized. Then each user has periods of productive stability, interrupted by bursts of test-bed change. This seems to be much less disruptive than a constant rippling and trembling. - Frederick Brooks Jr., "The Mythical Man Month" | |
It is important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy. -- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System", Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20 | |
"Every Solidarity center had piles and piles of paper .... everyone was eating paper and a policeman was at the door. Now all you have to do is bend a disk." - an anonymous member of the outlawed Polish trade union, Solidarity, commenting on the benefits of using computers in support of their movement | |
However, on religious issures there can be little or no compromise. There is no position on which people are so immovable as their religious beliefs. There is no more powerful ally one can claim in a debate than Jesus Christ, or God, or Allah, or whatever one calls this supreme being. But like any powerful weapon, the use of God's name on one's behalf should be used sparingly. The religious factions that are growing throughout our land are not using their religious clout with wisdom. They are trying to force government leaders into following their position 100 percent. If you disagree with these religious groups on a particular moral issue, they complain, they threaten you with a loss of money or votes or both. I'm frankly sick and tired of the political preachers across this country telling me as a citizen that if I want to be a moral person, I must believe in "A," "B," "C," and "D." Just who do they think they are? And from where do they presume to claim the right to dictate their moral beliefs to me? And I am even more angry as a legislator who must endure the threats of every religious group who thinks it has some God-granted right to control my vote on every roll call in the Senate. I am warning them today: I will fight them every step of the way if they try to dictate their moral convictions to all Americans in the name of "conservatism." - Senator Barry Goldwater, from the Congressional Record, September 16, 1981 | |
"And, of course, you have the commercials where savvy businesspeople Get Ahead by using their MacIntosh computers to create the ultimate American business product: a really sharp-looking report." -- Dave Barry | |
Why are many scientists using lawyers for medical experiments instead of rats? a) There are more lawyers than rats. b) The scientist's don't become as emotionally attached to them. c) There are some things that even rats won't do for money. | |
"What if" is a trademark of Hewlett Packard, so stop using it in your sentences without permission, or risk being sued. | |
...At that time [the 1960s], Bell Laboratories scientists projected that computer speeds as high as 30 million floating-point calculations per second (megaflops) would be needed for the Army's ballistic missile defense system. Many computer experts -- including a National Academy of Sciences panel -- said achieving such speeds, even using multiple processors, was impossible. Today, new generation supercomputers operate at billions of operations per second (gigaflops). -- Aviation Week & Space Technology, May 9, 1988, "Washington Roundup", pg 13 | |
THE "FUN WITH USENET" MANIFESTO Very little happens on Usenet without some sort of response from some other reader. Fun With Usenet postings are no exception. Since there are some who might question the rationale of some of the excerpts included therein, I have written up a list of guidelines that sum up the philosophy behind these postings. One. I never cut out words in the middle of a quote without a VERY good reason, and I never cut them out without including ellipses. For instance, "I am not a goob" might become "I am ... a goob", but that's too mundane to bother with. "I'm flame proof" might (and has) become "I'm ...a... p...oof" but that's REALLY stretching it. Two. If I cut words off the beginning or end of a quote, I don't put ellipses, but neither do I capitalize something that wasn't capitalized before the cut. "I don't think that the Church of Ubizmo is a wonderful place" would turn into "the Church of Ubizmo is a wonderful place". Imagine the posting as a tape-recording of the poster's thoughts. If I can set up the quote via fast-forwarding and stopping the tape, and without splicing, I don't put ellipses in. And by the way, I love using this mechanism for turning things around. If you think something stinks, say so - don't say you don't think it's wonderful. ... -- D. J. McCarthy (dmccart@cadape.UUCP) | |
If builders built buildings the way programmers write programs, Jolt Cola would be a Fortune-500 company. If builders built buildings the way programmers write programs, you'd be able to buy a nice little colonial split-level at Babbages for $34.95. If programmers wrote programs the way builders build buildings, we'd still be using autocoder and running compile decks. -- Peter da Silva and Karl Lehenbauer, a different perspective | |
It took a while to surface, but it appears that a long-distance credit card may have saved a U.S. Army unit from heavy casualties during the Grenada military rescue/invasion. Major General David Nichols, Air Force ... said the Army unit was in a house surrounded by Cuban forces. One soldier found a telephone and, using his credit card, called Ft. Bragg, N.C., telling Army officiers there of the perilous situation. The officers in turn called the Air Force, which sent in gunships to scatter the Cubans and relieve the unit. -- Aviation Week and Space Technology | |
Since aerosols are forbidden, the police are using roll-on Mace! | |
We all declare for liberty, but in using the same word we do not all mean the same thing. -- A. Lincoln | |
blithwapping: Using anything BUT a hammer to hammer a nail into the wall, such as shoes, lamp bases, doorstops, etc. -- "Sniglets", Rich Hall & Friends | |
Bowie's Theorem: If an experiment works, you must be using the wrong equipment. | |
Canonical, adj.: The usual or standard state or manner of something. A true story: One Bob Sjoberg, new at the MIT AI Lab, expressed some annoyance at the use of jargon. Over his loud objections, we made a point of using jargon as much as possible in his presence, and eventually it began to sink in. Finally, in one conversation, he used the word "canonical" in jargon-like fashion without thinking. Steele: "Aha! We've finally got you talking jargon too!" Stallman: "What did he say?" Steele: "He just used `canonical' in the canonical way." | |
flowchart, n. & v.: [From flow "to ripple down in rich profusion, as hair" + chart "a cryptic hidden-treasure map designed to mislead the uninitiated."] 1. n. The solution, if any, to a class of Mascheroni construction problems in which given algorithms require geometrical representation using only the 35 basic ideograms of the ANSI template. 2. n. Neronic doodling while the system burns. 3. n. A low-cost substitute for wallpaper. 4. n. The innumerate misleading the illiterate. "A thousand pictures is worth ten lines of code." -- The Programmer's Little Red Vade Mecum, Mao Tse T'umps. 5. v.intrans. To produce flowcharts with no particular object in mind. 6. v.trans. To obfuscate (a problem) with esoteric cartoons. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
Jim Nasium's Law: In a large locker room with hundreds of lockers, the few people using the facility at any one time will all have lockers next to each other so that everybody is cramped. | |
Lactomangulation, n.: Manhandling the "open here" spout on a milk carton so badly that one has to resort to using the "illegal" side. -- Rich Hall, "Sniglets" | |
MAFIA, n: [Acronym for Mechanized Applications in Forced Insurance Accounting.] An extensive network with many on-line and offshore subsystems running under OS, DOS, and IOS. MAFIA documentation is rather scanty, and the MAFIA sales office exhibits that testy reluctance to bona fide inquiries which is the hallmark of so many DP operations. From the little that has seeped out, it would appear that MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped variant of SNA, in which extended handshakes also perform complex security functions. The known timesharing aspects of MAFIA point to a more than usually autocratic operating system. Screen prompts carry an imperative, nonrefusable weighting (most menus offer simple YES/YES options, defaulting to YES) that precludes indifference or delay. Uniquely, all editing under MAFIA is performed centrally, using a powerful rubout feature capable of erasing files, filors, filees, and entire nodal aggravations. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
Status Substitution: Using an object with intellectual or fashionable cachet to substitute for an object that is merely pricey: "Brian, you left your copy of Camus in your brother's BMW." -- Douglas Coupland, "Generation X: Tales for an Accelerated Culture" | |
101-ism: The tendency to pick apart, often in minute detail, all aspects of life using half-understood pop psychology as a tool. -- Douglas Coupland, "Generation X: Tales for an Accelerated Culture" | |
A reader reports that when the patient died, the attending doctor recorded the following on the patient's chart: "Patient failed to fulfill his wellness potential." Another doctor reports that in a recent issue of the *American Journal of Family Practice* fleas were called "hematophagous arthropod vectors." A reader reports that the Army calls them "vertically deployed anti- personnel devices." You probably call them bombs. At McClellan Air Force base in Sacramento, California, civilian mechanics were placed on "non-duty, non-pay status." That is, they were fired. After taking the trip of a lifetime, our reader sent his twelve rolls of film to Kodak for developing (or "processing," as Kodak likes to call it) only to receive the following notice: "We must report that during the handling of your twelve 35mm Kodachrome slide orders, the films were involved in an unusual laboratory experience." The use of the passive is a particularly nice touch, don't you think? Nobody did anything to the films; they just had a bad experience. Of course our reader can always go back to Tibet and take his pictures all over again, using the twelve replacement rolls Kodak so generously sent him. -- Quarterly Review of Doublespeak (NCTE) | |
Abstract: This study examined the incidence of neckwear tightness among a group of 94 white-collar working men and the effect of a tight business-shirt collar and tie on the visual performance of 22 male subjects. Of the white-collar men measured, 67% were found to be wearing neckwear that was tighter than their neck circumference. The visual discrimination of the 22 subjects was evaluated using a critical flicker frequency (CFF) test. Results of the CFF test indicated that tight neckwear significantly decreased the visual performance of the subjects and that visual performance did not improve immediately when tight neckwear was removed. -- Langan, L.M. and Watkins, S.M. "Pressure of Menswear on the Neck in Relation to Visual Performance." Human Factors 29, #1 (Feb. 1987), pp. 67-71. | |
Maybe ain't ain't so correct, but I notice that lots of folks who ain't using ain't ain't eatin' well. -- Will Rogers | |
An architect's first work is apt to be spare and clean. He knows he doesn't know what he's doing, so he does it carefully and with great restraint. As he designs the first work, frill after frill and embellishment after embellishment occur to him. These get stored away to be used "next time." Sooner or later the first system is finished, and the architect, with firm confidence and a demonstrated mastery of that class of systems, is ready to build a second system. This second is the most dangerous system a man ever designs. When he does his third and later ones, his prior experiences will confirm each other as to the general characteristics of such systems, and their differences will identify those parts of his experience that are particular and not generalizable. The general tendency is to over-design the second system, using all the ideas and frills that were cautiously sidetracked on the first one. The result, as Ovid says, is a "big pile." -- Frederick Brooks, "The Mythical Man Month" | |
It seems that more and more mathematicians are using a new, high level language named "research student". | |
The problem ... is that we have run out of dinosaurs to form oil with. Scientists working for the Department of Energy have tried to form oil using other animals; they've piled thousands of tons of sand and Middle Eastern countries on top of cows, raccoons, haddock, laboratory rats, etc., but so far all they have managed to do is run up an enormous bulldozer-rental bill and anger a lot of Middle Eastern persons. None of the animals turned into oil, although most of the laboratory rats developed cancer. -- Dave Barry, "Postpetroleum Guzzler" | |
The temperature of Heaven can be rather accurately computed from available data. Our authority is Isaiah 30:26, "Moreover, the light of the Moon shall be as the light of the Sun and the light of the Sun shall be sevenfold, as the light of seven days." Thus Heaven receives from the Moon as much radiation as we do from the Sun, and in addition seven times seven (49) times as much as the Earth does from the Sun, or fifty times in all. The light we receive from the Moon is one ten-thousandth of the light we receive from the Sun, so we can ignore that. With these data we can compute the temperature of Heaven. The radiation falling on Heaven will heat it to the point where the heat lost by radiation is just equal to the heat received by radiation, i.e., Heaven loses fifty times as much heat as the Earth by radiation. Using the Stefan-Boltzmann law for radiation, (H/E)^4 = 50, where E is the absolute temperature of the earth (~300K), gives H as 798K (525C). The exact temperature of Hell cannot be computed, but it must be less than 444.6C, the temperature at which brimstone or sulphur changes from a liquid to a gas. Revelations 21:8 says "But the fearful, and unbelieving ... shall have their part in the lake which burneth with fire and brimstone." A lake of molten brimstone means that its temperature must be at or below the boiling point, or 444.6C (Above this point it would be a vapor, not a lake.) We have, then, that Heaven, at 525C is hotter than Hell at 445C. -- "Applied Optics", vol. 11, A14, 1972 | |
Why do mathematicians insist on using words that already have another meaning? "It is the complex case that is easier to deal with." "If it doesn't happen at a corner, but at an edge, it nonetheless happens at a corner." | |
A couple of kids tried using pickles instead of paddles for a Ping-Pong game. They had the volley of the Dills. | |
Lobster: Everyone loves these delectable crustaceans, but many cooks are squeamish about placing them into boiling water alive, which is the only proper method of preparing them. Frankly, the easiest way to eliminate your guilt is to establish theirs by putting them on trial before they're cooked. The fact is, lobsters are among the most ferocious predators on the sea floor, and you're helping reduce crime in the reefs. Grasp the lobster behind the head, look it right in its unmistakably guilty eyestalks and say, "Where were you on the night of the 21st?", then flourish a picture of a scallop or a sole and shout, "Perhaps this will refresh that crude neural apparatus you call a memory!" The lobster will squirm noticeably. It may even take a swipe at you with one of its claws. Incorrigible. Pop it into the pot. Justice has been served, and shortly you and your friends will be, too. -- Dave Barry, "Cooking: The Art of Using Appliances and Utensils into Excuses and Apologies" | |
Tim and I a hunting went We found three damsels in a tent, As they were three, and we were two, I bucked one and Timbuktu. -- the only known poem using the word "Timbuktu" | |
On my planet, to rest is to rest -- to cease using energy. To me, it is quite illogical to run up and down on green grass, using energy, instead of saving it. -- Spock, "Shore Leave", stardate 3025.2 | |
"It is easy to sympathize with the MIS staffs around the world, I mean who hasn't lost work due to Windows or a Microsoft application crashing?" -- Chris DiBona, happy he's been using Linux and can avoid such things, from the introduction. (Open Sources, 1999 O'Reilly and Associates) | |
Father, forgive me, I've been caught using Windows... | |
A fool and his money are soon using Windows. | |
If at first you don't succeed, you must be using Windows. | |
We are using Linux daily to UP our productivity -- so UP yours, Microsoft! | |
Tux Penguin Boxing Match LAS VEGAS, NV -- The unofficial Linux mascot Tux the Penguin will face his arch rival the BSD Daemon in a boxing match this Saturday night. The match is part of the International Computer Mascot Boxing Federation's First Annual World Championship Series. The winner will advance to face one of the Intel "Bunny People". Boxing pundits favor Tux as the winner. Last week Tux won his first match in the Championship Series against Wilbur the Gimp. "The Gimp didn't have a chance," one spectator said. "With Tux's ability to run at top speeds of over 100mph, I don't see how he could possibly lose." The BSD Daemon, however, is certainly a formidible opponent. While boxing rules prohibit the Daemon from using his patented pitchfork, his pointy horns are permitted in the ring. Some observers think the whole Computer Mascot Boxing Federation is a fake. "WWF is all scripted," one sports writer pointed out. "And so is this. You actually think that a penguin is capable of boxing? The idea of a penguin fighting a demon is patently absurd. This whole Championship Series has no doubt been scripted. It's probably nothing more than two little kids in penguin and demon suits duking it out in a boxing ring. What a waste of time." | |
Humorix Holiday Gift Idea #1 Linux-of-the-Month Club Price: US$60 for a one year membership Producer: CheapNybbles; 1-800-LINUX-CD It's the gift that keeps on giving. Every month a CD-ROM with a different Linux distribution or BSD Unix flavor will be sent in the mail. This is the perfect gift for those that have been using Slackware since day one and haven't gotten around to trying another distribution. Or, for those friends or relatives that still cling to Windows, a Linux-of-the-Month club membership is the perfect way to say, "Your OS sucks". | |
Humorix Holiday Gift Idea #7 Bluescreen Computer Case US$27.97 at Bud's Beige Box Bazaar Real Geeks may not admit to using Windows, but there's still countless geeks out there who must suffer through the humiliation of using Windows while at work. The patent-not-pending Bluescreen Case, though, will ease the stress of working with Microsoft "solutions". This computer case is very similar to other beige boxes, but with one important difference: the reboot button is covered with a picture of Bill Gates. When the machine bluescreens for the millionth time, all you have to do is punch Bill Gates in the face as hard as you can, and the computer will restart. This provides invaluable therapeutic stress relief. | |
Humorix Holiday Gift Idea #9 Dial-A-Detective $499.95/year; 1-888-BYE-SPAM This detective firm is not what you'd expect. Instead of tracking murderers or unfaithful husbands, this band of rogue private investigators goes after something just as sinister -- spammers. For a modest annual retainer fee, these spam detectives will track down the source of every piece of spam you receive. Using the latest in forensic technology, they will bring you the virtual scalp of the spammer -- their name, home address, social-security number, and, more importantly, credit card numbers. At this point you are free to pursue the evil spammer as you see fit. If your friend or relative is sick of receiving wave after wave of "Find Out Anything About Anyone" spams, give them a subscription to Dial-A-Detective, and they'll find out anything about any spammer -- for real. | |
MAKE MONEY FAST FROM SLASHDOT!!!!!! You are probably familiar with the Slashdot.org "News for Nerds" site. You've probably heard about the "Slashdot Effect". Now, we want to introduce a new term that could change your life: "Slashdot Baiting". The Slashdot Effect is a significant source of traffic. Lots of traffic. Thousands of visitors within hours. Thousands of eyeballs looking and clicking at YOUR banner advertisements. In short, the Slashdot Effect, if properly utilized, can produce a significant amount of advertising revenue. That's where we at MoneyDot Lucrative Marketing International Group, Inc. come in. We know how to exploit the Slashdot Effect. We call our strategy "Slashdot Baiting". It's quite painless. We have formulated 101 easy ways to get your site mentioned on Slashdot. Interested in pursuing Slashdot Baiting and obtaining financial independence? Want to make $50,000 (or more!) within 90 days? Then purchase MLM's "Slashdot Baiting Kit", which will contain everything you need to know to put this powerful marketing force to work for YOU! We also throw in a warranty: if your site isn't mentioned on Slashdot within 90 days of using this Kit, we'll give you your money back guaranteed! | |
Microsoft Mandatory Survey (#13) Customers who want to upgrade to Windows 98 Second Edition must now fill out a Microsoft survey online before they can order the bugfix/upgrade. Question 13: Which of the following new Microsoft products do you plan on buying within the next 6 months? A. Windows For Babies(tm) - Using an enhanced "click-n-drool" interface, babies will be able to learn how to use a Wintel computer, giving them a head start in living in a Microsoft-led world. B. Where In Redmond Is Carmen Sandiego?(tm) - The archvillian Sandiego has stolen the Windows source code and must be stopped before she can publish it on the Net. C. ActiveKeyboard 2000(tm) - An ergonomic keyboard that replaces useless keys like SysRq and Scroll Lock with handy keys like "Play Solitaire" and "Visit Microsoft.com". D. Visual BatchFile(tm) - An IDE and compiler for the MS-DOS batch file language. MSNBC calls it "better than Perl". | |
Jargon Coiner (#6) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * STOP MIRAGE: Trying to click on an imaginary Stop button on a program's toolbar after doing something you didn't want to. Usually caused as the result of excessive use of Netscape. * YA-PREFIX: Putting "another" or "yet another" in front of a name or tacking "YA" in front of an acronym. Example: "We could ya-prefix this fortune by titling it 'Yet Another Lame List of Fabricated Jargon'." * DOMAINEERING: Using a service like Netcraft to determine what operating system and webserver a particular domain is running. * NOT-A-SALTINE EXPLANATION: The canned response given to someone who uses the term "hacker" instead of "cracker". | |
Jargon Coiner (#10) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * HOBTOB (Hanging Out By The O'Reilly Books): Seeking free Linux technical support at a bookstore by waiting near the computer books for a geek to come by and then casually asking them for help. * MOOLA (Marketing Officially Organizes Linux Adoptance): A press release issued by a Dot Com (or Dot Con?) heralding their "support" for Linux (i.e. "BigPortal.com adopts Linux as their official operating system by adding five Linux-related links to their BigDirectory"); used to inflate their stock price and rake in moola even though none of their employees have ever used Linux and don't really care. * KARMA KOLLECTOR: Slashdot user who treats the acquisition of "karma" as a game; often has a detailed strategy on how to sucker moderators into raising the score of their posts (i.e. posting a comment with a title like "Microsoft Sucks!!! (Score 3, Insightful)" or using "Only a fool would moderate this down" as a signature). See also "Karma Whore". | |
Programming for money sucks... you have to deal with PHBs, 16 hour days, and spending the night in your cubicle half of the time to avoid the Commute From Hell... I minored in Journalism, so I tried to switch into a job as an IT pundit. You'd think they'd welcome a geek like me with open arms, but they didn't. Ziff-Davis wouldn't even give me an interview. I was "too qualified" they said. Apparently my technical acumen was too much for their organization, which employs Jesse Berst and the ilk. It gets worse. I tried to get an entry-level reporting job for a local-yokel paper. After the interview they gave me a "skills test": I had to compose an article using Microsoft Word 97. Since I've never touched a Windows box, I had no clue how to use it. When I botched the test, the personnel manager spouted, "Your resume said you were a computer programmer. Obviously you're a liar. Get out of my office now!" -- Excerpt from a horror story about geek discrimination during the Geek Grok '99 telethon | |
Evolution Of A Linux User: The 11 Stages Towards Getting A Life 0. Microserf - Your life revolves around Windows and you worship Bill Gates and his innovative company. 1. Fear, Uncertainty, Doubt... About Microsoft - You encounter a growing number of problems with Microsoft solutions, shaking your world-view 2. FUD... About Linux - After hearing about this new Linux thing, you take the plunge, but are unimpressed by the nerdware OS. 3. Born-Again Microserf - You rededicate your life to Microsoft worship 4. Disgruntled User - Microsoft software keeps screwing you over, and you're not going to take it anymore! 5. A Religious Experience - You successfully install Linux, and are left breathless at its elegance. No more Windows for you! 6. Linux Convert - You continue to fall in love with the new system 7. Linux Zealot - You dedicate your life to Linux World Domination... and it shows! You go beyond mere advocacy to sheer zealotry. 8. Back To Reality - Forces out of your control compel you to return to using Windows and Office 9. Enlightened Linux User - You become 100% Microsoft free after finding ways to overcome the need for Microsoft bloatware 10.Get A Life - You become a millionaire after your Linux portal is acquired; you move to a small tropical island and get a life | |
What Did Santa Claus Bring You In 1999? (#2) WEBMASTER OF LINUXSUPERMEGAPORTAL.COM: One of my in-laws gifted me a CD-ROM containing the text of every "...For Dummies" book ever published. It's a shame IDG never published "Hiring A Hitman To Knock Off Your Inlaws... For Dummies", because that's something I'm itching to do. At any rate, I'm using the CD as a beer coaster. JESSE BERST: I got a coupon redeemable for the full copy of Windows 2000 when it comes out in February. Win2K is the most innovative, enterprise-ready, stable, feature-enriched, easy-to-use operating system on the market. I don't see how Linux can survive against Microsoft's far superior offering. I ask you: could you get fired for NOT choosing Windows 2000? You bet. LINUX CONVERT: I kept hinting for a SGI box, but instead my wife got me an old Packard Bell. Unfortunately, she bought it at CompUSSR, which doesn't take returns, so I'm stuck with it. I haven't been able to get Linux to boot on it, so this machine will probably become a $750 paperweight. | |
Excerpts From The First Annual Nerd Bowl (#7) JOHN SPLADDEN: In this final round, the two teams must assemble a 16-node Beowulf cluster from scratch, install Linux on them, and then use the system to calculate pi to 1 million digits. This is the ultimate test for nerds... only people in the Big Leagues should attempt this... [snip] BRYANT DUMBELL: Look at that! Instead of messing with screws, the Portalbacks are using duct tape to attach their motherboards to the cases! That should save some time. [snip] They've done it! The Mad Hatters have completed the Final Round in 2 hours, 15 minutes. That's one hell of a Beowulf cluster they produced... drool. SPLADDEN: With that, the Mad Hatters win the Nerd Bowl 105 to 68! There's going to be some serious beer-drinking tonight back at the Red Hat offices. DUMBELL: Linus Torvalds has emerged from the sidelines to present his Linus Torvalds Trophy to the winners. What a glorious sight! This has definitely been the best Nerdbowl ever. I pity those people that have been watching the Superbowl instead. | |
Another Satisfied MICROSOFT Customer... +----------+ As the inventor of the Internet, I know a | | quality server operating system when I see | SMILING | one. Microsoft Windows 2000(tm) provides | | innovative features that no other competitor | GORE | can claim. | | | PHOTO | We've been using Windows at the White House | | for five years now without any problems. | | Windows' BlueScreen(tm) technology +----------+ automatically crashes our Exchange(tm) email server whenever Federal investigators are Al Gore around. Thanks to this feature, archives of incriminating emails have been wiped clean. This is what I call innovation. Thank you, Microsoft! | |
Right now hundreds of Anonymous Cowards are cheering the fact that only Windows boobs are victims of ILOVEYOU and other email viruses. I realize Outlook is so insecure that using it is like posting a sign outside your door saying, "DOOR UNLOCKED -- ROB ME!". However, Linux isn't immune. If I had a dollar for every pine buffer overflow uncovered, I could buy a truckload of fresh herring. I expect the next mass email virus to spread will be cross-platform. If the recipient is a Windows/Outlook luser, they'll get hit. If the recipient is a Linux/pine user, they'll find themselves staring at a self-executing bash script that's has just allocated 1 petabyte of memory and crashed the system (or worse). Either that or the next mass email virus will only damage Linux systems. I can just see Bill Gates assigning some junior programmer that very task. Be afraid. Be very afraid. -- A speech given at the First Annual Connecticut Conspiracy] Convention (ConConCon) by an anonymous creature said to be "wearing what appeared to be a tuxedo". | |
Security Holes Found In Microsoft Easter Eggs REDMOND, WA -- It's damage control time for the Microsoft Marketing Machine. Not only have exploits been found in IE, Outlook, and even the Dancing Paper Clip, but now holes have been uncovered in Excel's Flight Simulator and Word's pinball game. "If you enter Excel 97's flight simulator and then hit the F1, X, and SysRq keys while reading a file from Drive A:, you automatically gain Administrator rights on Windows NT," explained the security expert who first discovered the problem. "And that's just the tip of the iceberg." Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and eastereggs.dll, that are marked as "Safe for scripting" but are not. Arbitrary Visual BASIC code can be executed using these files. More disturbing, however, are the undocumented API calls "ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow", and "UploadRegistryToMicrosoft" within easter~1.dll. Microsoft spokesdroids have already hailed the problem as "an insignificant byproduct of Microsoft innovation." | |
Brief History Of Linux (#3) Lawyers Unite Humanity faced a tremendous setback ca. 1100 A.D., when the first law school was established in Bologna. Ironically, the free exchange of ideas at the law school spurred the law students to invent new ways (patents, trademarks, copyrights) to stifle the free exchange of ideas in other industries. If, at some point in the future, you happen upon a time machine, we here at Humorix (and, indeed, the whole world) implore you to travel back to 1100, track down a law teacher called Irnerius, and prevent him from founding his school using whatever means necessary. Your contribution to humanity will truly make the world (in an alternate timeline) a better place. | |
Brief History Of Linux (#7) The Rise of Geeks The late 19th Century saw the rise and fall of "geeks", wild carnival performers who bit the heads off live chickens. This vocal minority, outcast from mainstream society, clamored for respect, but failed. Their de facto spokesman, Tom Splatz, tried to expose America to their plight in his 312-page book, "Geeks". In the book Splatz documented the life of two Idahoan geeks with no social life as they made a meager living traveling the Pacific Northwest in circuses. While Splatz's masterpiece was a commercial failure, the book did set a world record for using the term "geek" a total of 6,143 times. | |
Brief History Of Linux (#8) Let's all holler for Hollerith In 1890 the US Congress wanted to extend the census to collect exhaustive demographic information on each citizen that could be resold to marketing companies to help pay for the newly installed gold-plated toilets on Capitol Hill. Experts estimated that the 1890 Census wouldn't be completed until 1900. It was hoped that an electronic tabulating machine using punchcards designed by Herman Hollerith would speed up the process. It didn't quite work out that way. An infestation of termites ate their way through the wooden base of Hollerith's machines, and then a wave of insects devoured several stacks of punchcards. Also, some Hollerith models had the propensity to crash at the drop of a hat... literally. In one instance, the operator dropped his hat and when he reached down to pick it up, he bumped the machine, causing it to flip over and crash. These flaws meant that the census was delayed for several years. However, the system was, in the words of one newspaper reporter, "good enough for government work", a guiding principle that lives on to this very day and explains the government's insistence on using Windows-based PCs. | |
Brief History Of Linux (#15) Too many hyphens: Traf-O-Data and Micro-soft Bill Gates and Paul Allen attended an exclusive private school in Seattle. In 1968, after raising $3,000 from a yard sale, they gained access to a timeshare computer and became addicted. After depleting their money learning BASIC and playing Solitaire, they convinced a company to give them free computer time in exchange for reporting bugs -- ironically, an early form of Open Source development! The two then founded a small company called Traf-O-Data that collected and analyzed traffic counts for municipalities using a crude device based on the Intel "Pretanium" 8008 CPU. They had some success at first, but ran into problems when they were unable to deliver their much hyped next-generation device called "TrafficX". An engineer is quoted as saying that "Traf-O-Data is the local leader in vaporware", the first documented usage of the term that has come to be synonymous with Bill Gates. Soon thereafter, the two developed their own BASIC interpreter, and sold it to MITS for their new Altair computer. April 4, 1975 is the fateful day that Micro-soft was founded in Albuquerque, NM as a language vendor. | |
Brief History Of Linux (#19) Boy meets operating system The young Linus Torvalds might have been just another CompSci student if it wasn't for his experiences in the Univ. of Helsinki's Fall 1990 Unix & C course. During one class, the professor experienced difficulty getting Minix to work properly on a Sun box. "Who the heck designed this thing?" the angry prof asked, and somebody responded, "Andrew Tanenbaum". The name of the Unix & C professor has already escaped from Linus, but the words he spoke next remain forever etched in his grey matter: "Tanenbaum... ah, yes, that Amsterdam weenie who thinks microkernels are the greatest thing since sliced bread. Well, they're not. I would just love to see somebody create their own superior Unix-like 32-bit operating system using a monolithic kernel just to show Tanenbaum up!" His professor's outburst inspired Linus to order a new IBM PC so he could hack Minix. You can probably guess what happened next. Inspired by his professor's words, Linus Torvalds hacks together his own superior Unix-like 32-but operating system using a monolithic kernel just to show Mr. Christmas Tree up. | |
Clippit Charged With Attempted Murder Microsoft's Dancing Paper Clip turned violent last week and nearly killed a university student testing a new Windows-based human-computer interface. The victim is expected to make a full recovery, although psychiatrists warn that the incident may scar him emotionally for life. "You can bet this kid won't be using Windows or Office ever again," said one shrink. The victim had been alpha-testing CHUG (Computer-Human Unencumbered Groupware), a new interface in which the user controls the computer with force-feedback gloves and voice activation. "I was trying to write a term paper in Word," he said from his hospital bed. "But then that damned Dancing Paper Clip came up and started annoying me. I gave it the middle finger. It reacted by deleting my document, at which point I screamed at it and threatened to pull the power cord. I didn't get a chance; the force-feedback gloves started choking me." "We told Clippit it had the right to remain silent, and so on," said a campus police officer. "The paperclip responded, 'Hi, I'm Clippit, the Office Assistant. Would you like to create a letter?' I said, 'Look here, Mr. Paperclip. You're being charged with attempted murder.' At that point the computer bluescreened." | |
Throwing Windows Out The Window The Federal Bureau Of Missing Socks has banned the use of Microsoft Windows and Office on all employee computers. But don't get too excited; they aren't going to replace them with Linux. Instead, this government agency has decided to go back to using abucusses, slide rules, and manual typewriters. The banishment of Microsoft software stems from the agency's new policy against computer games. MS Office, which contains several games in the form of Easter Eggs, is now verboten on all agency computers. "Flight simulators, pinball games, magic eight balls... they all violate our policy," said the sub-adjunct administrator second-class. "So we can't use Office." Windows is forbidden for the same reason. "We've had way too many employees wasting time playing Solitaire," she said. "Unfortunately, Solitaire is an integral part of Windows -- Microsoft executives said so during the anti-trust trial. If Solitaire is removed, the operating system won't function properly. Therefore, we have no choice but to banish all Windows computers." The Bureau's Assistant Technology Consultant, Mr. Reginald "Red" Taype, asked, "Have you ever seen an abucus crash? Have you ever seen anybody have fun with a slide rule? Do adding machines contain undocumented easter eggs? No! That's why we're ditching our PCs." | |
Unobfuscated Perl (#1) A rogue group of Perl hackers has presented a plan to add a "use really_goddamn_strict" pragma that would enforce readability and UNobfuscation. With this pragma in force, the Perl compiler might say: * Warning: Program contains zero comments. You've probably never seen or used one before; they begin with a # symbol. Please start using them or else a representative from the nearest Perl Mongers group will come to your house and beat you over the head with a cluestick. * Warning: Program uses a cute trick at line 125 that might make sense in C. But this isn't C! * Warning: Code at line 412 indicates that programmer is an idiot. Please correct error between chair and monitor. * Warning: While There's More Than One Way To Do It, your method at line 523 is particularly stupid. Please try again. | |
World Domination, One CPU Cycle At A Time Forget about searching for alien signals or prime numbers. The real distributed computing application is "Domination@World", a program to advocate Linux and Apache to every website in the world that uses Windows and IIS. The goal of the project is to probe every IP number to determine what kind of platform each Net-connected machine is running. "That's a tall order... we need lots of computers running our Domination@World clients to help probe every nook and cranny of the Net," explained Mr. Zell Litt, the project head. After the probing is complete, the second phase calls for the data to be cross-referenced with the InterNIC whois database. "This way we'll have the names, addresses, and phone numbers for every Windows-using system administrator on the planet," Zell gloated. "That's when the fun begins." The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan for extreme advocacy. As part of LART, each Linux User Group will receive a list of the Windows-using weenies in their region. The LUG will then be able to employ various advocacy techniques, ranging from a soft-sell approach (sending the target a free Linux CD in the mail) all the way to "LARTcon 5" (cracking into their system and forcibly installing Linux). | |
Official National Anthem Of The Geek Paradise Of Humorixia (first verse) I got this bark letter the other day, "Stop using our trademark or you will pay". I said "Ha" and threw it in the trash, Oh but then those lawyers got very rash, Lawsuits, subpoenas, the accusations came, All their attacks were truly lame, They said, "You've committed quite a sin!" "You're going to get five to ten!" Kill all the lawyers! Oh, kill all the lawyers! Let's "kill -9 lawyers" now! | |
Class-Action Lawsuit Filed Against Linus Torvalds SILLYCON VALLEY -- Nearly 130 former system administrators have filed suit against Linus Torvalds in which they claim Linux cost them their jobs. Recently several companies migrated from Windows to Linux, increasing their productivity but decreasing the need for a large staff of tech workers, prompting a wave of layoffs. "The good old days when it required five full-time system administrators to maintain a Microsoft Exchange server are history, all because of that cancer known as Linux," explained the lead litigant in the lawsuit. "It all started two years ago when some pimply-faced idiot down in Accounting decided to smuggle in a Linux box to automate some of his work. Before long every tech-savvy person in Accounting, Billing, and Sales was secretly using Linux." "That's when the troubles started. Productivity soared. Downtime was limited to an average of three milliseconds per day. Macro viruses ceased to spread. It was horrible! The entire IT staff was replaced by one part-time bearded wonder, who was able to administrate the entire Linux network! Due to the layoffs, I'm now sitting in a homeless shelter with little hope to find work. Nobody wants to hire an MCSE anymore!" | |
Looking for a cool one after a long, dusty ride, the drifter strode into the saloon. As he made his way through the crowd to the bar, a man galloped through town screaming, "Big Mike's comin'! Run fer yer lives!" Suddenly, the saloon doors burst open. An enormous man, standing over eight feet tall and weighing an easy 400 pounds, rode in on a bull, using a rattlesnake for a whip. Grabbing the drifter by the arm and throwing him over the bar, the giant thundered, "Gimme a drink!" The terrified man handed over a bottle of whiskey, which the man guzzled in one gulp and then smashed on the bar. He then stood aghast as the man stuffed the broken bottle in his mouth, munched broken glass and smacked his lips with relish. "Can I, ah, uh, get you another, sir?" the drifter stammered. "Naw, I gotta git outa here, boy," the man grunted. "Big Mike's a-comin'." | |
Whenever someone tells you to take their advice, you can be pretty sure that they're not using it. | |
You know your apartment is small... when you can't know its position and velocity at the same time. you put your key in the lock and it breaks the window. you have to go outside to change your mind. you can vacuum the entire place using a single electrical outlet. | |
Understatement of the century: "Hello everybody out there using minix - I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones" - Linus Torvalds, August 1991 | |
"> I am using the Intel PCI backplane with default etchlink/jumper > configuration and the EBSA285 configured as host bridge. I'd suggest that you check, double check, triple check, take a photo of the links and put it up on the web and get someone else to check all the link settings on the EBSA285 card." - Russell King on linux-arm-kernel | |
IOW, "not a tty" used to mean "WTF are you using ioctls here?" - Al Viro explaining ENOTTY on linux-kernel | |
Q: I like to dynamically load buggy drivers into the kernel because that is what kernel developers like me do for fun, how can I better avoid data corruption when doing this and using ReiserFS? A: Do sync before insmod. (Alan Cox's good suggestion.) - Hans Reiser on linux-kernel | |
Eric Biederman wrote: > That added to the fact that last time someone ran the numbers linux > was considerably faster than the BSD for mm type operations when not > swapping. And this is the common case. "Linux VM works wonderfully when nobody is using it" - Alan Cox on linux-kernel | |
> I got a kernel crash when dial up. But I am using > 2.4.0-rmk1 and pppd-2.4.1. Is there any known ppp problem > in that release? Will it help if I upgrade my kernel? Who knows, we're now many versions ahead, many bugs have been fixed, and a lot of work has been done. - Russell King on linux-arm-kernel | |
..... using XML would just be shooting birds with tactical nukes. E.g. lots of fun, but a little expensive and not really necessary. - Jakob Østergaard about using XML in /proc file on linux-kernel | |
Using a cluster to hide the fact that the underlying systems crash regularly is an extremely dangerous way to manage a computing environment. - Matt Dillon in http://www.osnews.com/story.php?news_id=153 | |
The beginning of the universe Is the mother of all things. Knowing the mother, on also knows the sons. Knowing the sons, yet remaining in touch with the mother, Brings freedom from the fear of death. Keep your mouth shut, Guard the senses, And life is ever full. Open your mouth, Always be busy, And life is beyond hope. Seeing the small is insight; Yielding to force is strength. Using the outer light, return to insight, And in this way be saved from harm. This is learning constancy. | |
In caring for others and serving heaven, There is nothing like using restraint. Restraint begins with giving up one's own ideas. This depends on Virtue gathered in the past. If there is a good store of Virtue, then nothing is impossible. If nothing is impossible, then there are no limits. If a man knows no limits, then he is fit to be a ruler. The mother principle of ruling holds good for a long time. This is called having deep roots and a firm foundation, The Tao of long life and eternal vision. | |
!netgod:*! time flies when youre using linux !doogie:*! yeah, infinite loops in 5 seconds. !Teknix:*! has anyone re-tested that with 2.2.x ? !netgod:*! yeah, 4 seconds now | |
<xtifr> direct brain implants :) <knghtbrd> xtifr - yah, then using computers would actually require some of these idiots to think! <knghtbrd> ;> | |
<Mercury> Knghtbrd: Using -3dfx or -svga? <Knghtbrd> Mercury will do something sane with it <Knghtbrd> Mercury: both---svga sig11's, -3dfx sig4's <Knghtbrd> Mercury: that's not good right? ;> | |
<knghtbrd> eek, not another one... <knghtbrd> Seems ever developer and their mother now has a random signature using irc quotes ... <knghtbrd> WHAT HAVE I STARTED HERE?? | |
<Mercury> LordHavoc: The reason why GL has overdraw is because it is only using HALF of the system they designed for vis. <Mercury> LordHavoc: Shooting itself in the foot. * Dabb looks at all those bullet holes in his shoes - damn, lots :) | |
<shader> whats wrong with rjing? <Rhamphoryncus> it's lame :P <Rhamphoryncus> it should NOT be possible <Rhamphoryncus> shoving a grenade up your ass and using it as rocket propelant shouldn't be a viable technique :P | |
<|Rain|> *nod* I'm not fond of using smarthosts, myself <|Rain|> as it relies on both the remote host and your host being smart <|Rain|> and too often you miss one of both of those goals | |
It's recently come to Fortune's attention that scientists have stopped using laboratory rats in favor of attorneys. Seems that there are not only more of them, but you don't get so emotionally attached. The only difficulty is that it's sometimes difficult to apply the experimental results to humans. [Also, there are some things even a rat won't do. Ed.] | |
The justifications for drug testing are part of the presently fashionable debate concerning restoring America's "competitiveness." Drugs, it has been revealed, are responsible for rampant absenteeism, reduced output, and poor quality work. But is drug testing in fact rationally related to the resurrection of competitiveness? Will charging the atmosphere of the workplace with the fear of excretory betrayal honestly spur productivity? Much noise has been made about rehabilitating the worker using drugs, but to date the vast majority of programs end with the simple firing or the not hiring of the abuser. This practice may exacerbate, not alleviate, the nation's productivity problem. If economic rehabilitation is the ultimate goal of drug testing, then criteria abandoning the rehabilitation of the drug-using worker is the purest of hypocrisy and the worst of rationalization. -- The concluding paragraph of "Constitutional Law: The Fourth Amendment and Drug Testing in the Workplace," Tim Moore, Harvard Journal of Law & Public Policy, vol. 10, No. 3 (Summer 1987), pp. 762-768. | |
> > Other than the fact Linux has a cool name, could someone explain why I > > should use Linux over BSD? > > No. That's it. The cool name, that is. We worked very hard on > creating a name that would appeal to the majority of people, and it > certainly paid off: thousands of people are using linux just to be able > to say "OS/2? Hah. I've got Linux. What a cool name". 386BSD made the > mistake of putting a lot of numbers and weird abbreviations into the > name, and is scaring away a lot of people just because it sounds too > technical. -- Linus Torvalds' follow-up to a question about Linux | |
We are using Linux daily to UP our productivity - so UP yours! -- Adapted from Pat Paulsen by Joe Sloan | |
Anyone who thinks UNIX is intuitive should be forced to write 5000 lines of code using nothing but vi or emacs. AAAAACK! -- Discussion on the intuitiveness of commands, especially Emacs | |
On the Internet, no one knows you're using Windows NT -- Submitted by Ramiro Estrugo, restrugo@fateware.com | |
Seriously, the way I did this was by using a special /sbin/loader binary with debugging hooks that I made ("dd" is your friend: binary editors are for wimps). -- Linus Torvalds, in an article on a dnserver | |
How do you power off this machine? -- Linus, when upgrading linux.cs.helsinki.fi, and after using the machine for several months | |
Also another major deciding factor is availability of source code. It just gives everybody a warm fuzzy feeling knowing that there is source code available to the product you are using. It allows everybody to improve on the product and fix bugs etc. sooner that the author(s) would get the time/chance to. -- Atif Khan | |
> Also another major deciding factor is availability of source code. > It just gives everybody a warm fuzzy feeling knowing that there is > source code available to the product you are using. It allows everybody > to improve on the product and fix bugs etc. sooner that the author(s) > would get the time/chance to. I think this is one the really BIG reasons for the snowball/onslaught of Linux and the wealth of stuff available that gets enhanced faster than the real vendors can keep up. -- Norman | |
Between 1950 and 1952, a bored weatherman, stationed north of Hudson Bay, left a monument that neither government nor time can eradicate. Using a bulldozer abandoned by the Air Force, he spent two years and great effort pushing boulders into a single word. It can be seen from 10,000 feet, silhouetted against the snow. Government officials exchanged memos full of circumlocutions (no Latin equivalent exists) but failed to word an appropriation bill for the destruction of this cairn, that wouldn't alert the press and embarrass both Parliament and Party. It stands today, a monument to human spirit. If life exists on other planets, this may be the first message received from us. -- The Realist, November, 1964. | |
I want to see people using Perl to glue things together creatively, not just technically but also socially. -- Larry Wall in <199702111730.JAA28598@wall.org> | |
Most places distinguish them merely by using the appropriate value. Hooray for context... -- Larry Wall in <199708040319.UAA16213@wall.org> | |
The reason I like hitching a ride on strict vars is that it cuts down the number of rarely used pragmas people have to remember, yet provides a way to get to the point where we might, just maybe, someday, make local lexicals the default for everyone, without having useless pragmas wandering around various programs, or using up another bit in $^H. -- Larry Wall in <199710050130.SAA04762@wall.org> | |
I'm using my X-RAY VISION to obtain a rare glimpse of the INNER WORKINGS of this POTATO!! | |
"A wizard cannot do everything; a fact most magicians are reticent to admit, let alone discuss with prospective clients. Still, the fact remains that there are certain objects, and people, that are, for one reason or another, completely immune to any direct magical spell. It is for this group of beings that the magician learns the subtleties of using indirect spells. It also does no harm, in dealing with these matters, to carry a large club near your person at all times." -- The Teachings of Ebenezum, Volume VIII | |
Using words to describe magic is like using a screwdriver to cut roast beef. -- Tom Robbins |