DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
computing
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

DISCLAIMER:
Use of this advanced computing technology does not imply an endorsement
of Western industrial civilization.
In computing, the mean time to failure keeps getting shorter.
LOGO for the Dead

LOGO for the Dead lets you continue your computing activities from
"The Other Side."

The package includes a unique telecommunications feature which lets you
turn your TRS-80 into an electronic Ouija board.  Then, using Logo's
graphics capabilities, you can work with a friend or relative on this
side of the Great Beyond to write programs.  The software requires that
your body be hardwired to an analog-to-digital converter, which is then
interfaced to your computer.  A special terminal (very terminal) program
lets you talk with the users through Deadnet, an EBBS (Ectoplasmic
Bulletin Board System).

LOGO for the Dead is available for 10 percent of your estate
from NecroSoft inc., 6502 Charnelhouse Blvd., Cleveland, OH 44101.
                -- '80 Microcomputing
Per buck you get more computing action with the small computer.
                -- R.W. Hamming
                                SEMINAR ANNOUNCEMENT

Title:                Are Frogs Turing Compatible?
Speaker:        Don "The Lion" Knuth

                                ABSTRACT
        Several researchers at the University of Louisiana have been studying
the computing power of various amphibians, frogs in particular.  The problem
of frog computability has become a critical issue that ranges across all areas
of computer science.  It has been shown that anything computable by an amphi-
bian community in a fixed-size pond is computable by a frog in the same-size
pond -- that is to say, frogs are Pond-space complete.  We will show that
there is a log-space, polywog-time reduction from any Turing machine program
to a frog.  We will suggest these represent a proper subset of frog-computable
functions.
        This is not just a let's-see-how-far-those-frogs-can-jump seminar.
This is only for hardcore amphibian-computation people and their colleagues.
        Refreshments will be served.  Music will be played.
        *** STUDENT SUCCESSES ***

Many of our students have gone on to achieve great success in all fields of
programming.  One former student developed the concept of the personalized
form letter.  Does the phrase, "Dear Mr.(insert name), You may already be a
winner!," sound familiar?  Another student writes "After only five lessons I
sold a "My Most Unforgettable Program" article to Corrosive Computing magazine.
Another of our graduates writes, "I recently completed a database-management
program for my department manager.  My program touched him so deeply that he
was speechless.  He told me later that he had never seen such a program in
his entire career.  Thank you, Famous Programmers' school; only you could
have made this possible."  Send for our introductory brochure which explains
in vague detail the operation of the Famous Programmers' School, and you'll
be eligible to win a possible chance to enter a drawing, the winner of which
can vie for a set of free steak knives.  If you don't do it now, you'll hate
yourself in the morning.
The computing field is always in need of new cliches.
                -- Alan Perlis
The idea that an arbitrary naive human should be able to properly use a given
tool without training or understanding is even more wrong for computing than
it is for other tools (e.g. automobiles, airplanes, guns, power saws).
                -- Doug Gwyn
The use of anthropomorphic terminology when dealing with computing systems
is a symptom of professional immaturity.
                -- Edsger Dijkstra
What the hell is it good for?
                -- Robert Lloyd (engineer of the Advanced Computing Systems
                   Division of IBM), to colleagues who insisted that the
                   microprocessor was the wave of the future, c. 1968
"Computer literacy is a contact with the activity of computing deep enough to
make the computational equivalent of reading and writing fluent and enjoyable.
As in all the arts, a romance with the material must be well under way.  If
we value the lifelong learning of arts and letters as a springboard for
personal and societal growth, should any less effort be spent to make computing
a part of our lives?"
-- Alan Kay, "Computer Software", Scientific American, September 1984
3rd Law of Computing:
        Anything that can go wr
fortune: Segmentation violation -- Core dumped
ADA:
        Something you need only know the name of to be an Expert in
        Computing.  Useful in sentences like, "We had better develop
        an ADA awareness.
                -- "Datamation", January 15, 1984
In 1968 it took the computing power of 2 C-64's to fly a rocket to the moon.
Now, in 1998 it takes the Power of a Pentium 200 to run Microsoft Windows 95.
Something must have gone wrong.
Hear me out. Linux is Microsoft's main competition right now. Because of
this we are forcing them to "innovate", something they would usually avoid.
Now if MS Bob has taught us anything, Microsoft is not a company that
should be innovating. When they do, they don't come up with things like
"better security" or "stability", they come back with "talking
paperclips", and "throw in every usless feature we can think of, memory
footprint be dammed".

Unfortunatly, they also come up with the bright idea of executing email.
Now MIME attachments aren't enough, they want you to be able to run/open
attachments right when you get them. This sounds like a good idea to
people who believe renaming directories to folders made computing possible
for the common man, but security wise it's like vigorously shaking a
package from the Unibomber.

So my friends, we are to blame. We pushed them into frantically trying to
invent "necessary" features to stay on top, and look where it got us. Many
of us are watching our beloved mail servers go down under the strain and
rebuilding our company's PC because of our pointless competition with MS.
I implore you to please drop Linux before Microsoft innovates again.

  -- From a Slashdot.org post in regards to the ILOVEYOU email virus
Mastery of UNIX, like mastery of language, offers real freedom. The price
of freedom is always dear, but there's no substitute. Personally, I'd
rather pay for my freedom than live in a bitmapped, pop-up-happy dungeon
like NT.

   -- Thomas Scoville, Performance Computing
Attack of the Tuxissa Virus

What started out as a prank posting to comp.os.linux.advocacy yesterday has
turned into one of the most significant viruses in computing history.
The creator of the virus, who goes by the moniker "Anonymous Longhair",
modified the Melissa virus to install Linux on infected machines.

"It's a work of art," one Linux advocate told Humorix after he looked
through the Tuxissa virus source code.  "This virus goes well beyond the
feeble troublemaking of Melissa.  It actually configures a UMSDOS partition
on the user's hard drive and then downloads and installs a stripped-down
version of Slackware Linux."

The email message that the virus is attached to has the subject "Important
Message About Windows Security".  The text of the body says, "I want to let
you know about some security problems I've uncovered in Windows 95/98/NT,
Office 95/97, and Outlook. It's critically important that you protect your
system against these attacks.  Visit these sites for more information..."
The rest of the message contains 42 links to sites about Linux and free
software.

Details on how the virus started are a bit sketchy.  The "Anonymous
Longhair" who created it only posted it to Usenet as an early April Fool's
gag, demonstrating how easy it would be to mount a "Linux revolution".
OPPRESSED GEEK: Everybody keeps blaming me for the Y2K problem, the
Melissa Virus, Windows crashes... you name it. When somebody finds out
you're a bona fide geek, they start bugging you about computer problems. I
frequently hear things like, "Why can't you geeks make Windows work
right?", "What kind of idiot writes a program that can't handle the year
2000?", "Geeks are evil, all they do is write viruses", and "The Internet
is the spawn of Satan".

I'm afraid to admit I have extensive computing experience. When somebody
asks what kind of job I have, I always lie. From my experience, admitting
that you're a geek is an invitation to disaster.

LARRY WALL: I know, I know. I sometimes say that I'm the founder of a
pearl harvesting company instead of admitting that I'm the founder of the
Perl programming language.

ERIC S. RAYMOND: This is tragic. We can't live in a world like this. We
need your donations to fight social oppression and ignorance against
geekdom...

   -- Excerpt from the Geek Grok '99 telethon      
Brief History Of Linux (#10)
The AnyQuack Computer

One electronic machine, Colossus, was used by the British in World War II
to decode Nazi transmissions. The code-breakers were quite successful in
their mission, except for the tiny detail that nobody knew how to read
German. They had decoded unreadable messages into... unreadable messages.

Two years later in 1945, a group of professors and students at the Univ.
of Pennsylvania were discussing computing theory. An argument ensued, in
which one professor yelled, "Any quack can build an electronic computer!
The real challenge is building one that doesn't crash every five minutes."

One graduate student, J. Presper Eckert, Jr., responded, "I'm any quack!
I'll take you up on that challenge. I'll build a device that can calculate
1,000 digits of pi in one hour... without crashing!" Several professors
laughed; "Such high-speed calculations are beyond our level of technology."

Eckert and his friends did build such a device. As a joke, he called the
machine "AnyQuack", which eventually became ENIAC -- ENIAC's Not Intended
As Crashware, the first known example of a self-referential acronym.
Brief History Of Linux (#17)
If only Gary had been sober

When Micro-soft moved to Seattle in 1979, most of its revenue came from
sales of BASIC, a horrible language so dependant on GOTOs that spaghetti
looked more orderly than its code did. (BASIC has ruined more promising
programmers than anything else, prompting its original inventor Dartmouth
University to issue a public apology in 1986.)

However, by 1981 BASIC hit the backburner to what is now considered the
luckiest break in the history of computing: MS-DOS. (We use the term
"break" because MS-DOS was and always will be broken.) IBM was developing
a 16-bit "personal computer" and desperately needed an OS to drive it.

Their first choice was Gary Kildall's CP/M, but IBM never struck a deal
with him. We've discovered the true reason: Kildall was drunk at the time
the IBM representatives went to talk with him. A sober man would not have
insulted the reps, calling their employer an "Incredibly Bad Monopoly" and
referring to their new IBM-PC as an "Idealistically Backwards
Microcomputer for People without Clues". Needless to say, Gary "I Lost The
Deal Of The Century" Kildall was not sober.
World Domination, One CPU Cycle At A Time

Forget about searching for alien signals or prime numbers. The real
distributed computing application is "Domination@World", a program to advocate
Linux and Apache to every website in the world that uses Windows and IIS.

The goal of the project is to probe every IP number to determine what kind of
platform each Net-connected machine is running. "That's a tall order... we
need lots of computers running our Domination@World clients to help probe
every nook and cranny of the Net," explained Mr. Zell Litt, the project head.

After the probing is complete, the second phase calls for the data to be
cross-referenced with the InterNIC whois database. "This way we'll have the
names, addresses, and phone numbers for every Windows-using system
administrator on the planet," Zell gloated. "That's when the fun begins."

The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan
for extreme advocacy. As part of LART, each Linux User Group will receive a
list of the Windows-using weenies in their region. The LUG will then be able
to employ various advocacy techniques, ranging from a soft-sell approach
(sending the target a free Linux CD in the mail) all the way to "LARTcon 5"
(cracking into their system and forcibly installing Linux).
Severe Acronym Shortage Cripples Computer Industry

SILICON VALLEY, CALIFORNIA (SVC) -- According to a recent study by the
Blartner Group, 99.5% of all possible five letter combinations have
already been appropriated for computer industry acronyms. The impending
shortage of 5LC's is casting a dark shadow over the industry, which relies
heavily on short, easy-to-remember acronyms for everything.

"Acronym namespace collisions (ANCs) are increasing at a fantastic rate
and threaten the very fabric of the computing world," explained one ZD
pundit. "For example, when somebody talks about XP, I don't know whether
they mean eXtreme Programming or Microsoft's eXceptionally Pathetic
operating system. We need to find a solution now or chaos will result."

Leaders of several SVC companies have floated the idea of an
"industry-wide acronym conservation protocol" (IWACP -- one of the few
5LCs not already appropriated). Explained Bob Smith, CTO of IBM, "If
companies would voluntarily limit the creation of new acronyms while
recycling outdated names, we could reduce much of the pollution within the
acronym namespace ourselves. The last thing we want is for Congress to get
involved and try to impose a solution for this SAS (Severe Acronym
Shortage) that would likely only create many new acronyms in the process."
"Linux doesn't support any sub-32-bit computers, and despite the occasional
deranged people interested in retro-computing (ie Alan Cox) I doubt it
seriously will.."

        - Linus Torvalds
Using a cluster to hide the fact that the underlying systems crash
regularly is an extremely dangerous way to manage a computing environment.

        - Matt Dillon in http://www.osnews.com/story.php?news_id=153
<NullC> I like the seed code for computing masking curves.
<NullC> I've never seen code that made be want to drink before that...
Because I don't need to worry about finances I can ignore Microsoft
and take over the (computing) world from the grassroots.
        -- Linus Torvalds
We knew from experience that the essence of communal computing, as
supplied by remote-access, time-shared machines, is not just to type
programs into a terminal instead of a keypunch, but to encourage close
communication.
        -- Dennis Ritchie
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners