Proverbs, aphorisms, quotations (English) | by Linux fortune |
BNC (brain not (user brain not connected) | |
UBNC (user brain not connected) | |
LBNC (luser brain not connected) | |
new guy cross-connected phone lines with ac power bus. | |
A program should be light and agile, its subroutines connected like a strings of pearls. The spirit and intent of the program should be retained throughout. There should be neither too little nor too much, neither needless loops nor useless variables, neither lack of structure nor overwhelming rigidity. A program should follow the 'Law of Least Astonishment'. What is this law? It is simply that the program should always respond to the user in the way that astonishes him least. A program, no matter how complex, should act as a single unit. The program should be directed by the logic within rather than by outward appearances. If the program fails in these requirements, it will be in a state of disorder and confusion. The only way to correct this is to rewrite the program. -- Geoffrey James, "The Tao of Programming" | |
Those of us who believe in the right of any human being to belong to whatever church he sees fit, and to worship God in his own way, cannot be accused of prejudice when we do not want to see public education connected with religious control of the schools, which are paid for by taxpayers' money. - Eleanor Roosevelt | |
I am approached with the most opposite opinions and advice, and by men who are equally certain that they represent the divine will. I am sure that either the one or the other is mistaken in the belief, and perhaps in some respects, both. I hope it will not be irreverent of me to say that if it is probable that God would reveal his will to others on a point so connected with my duty, it might be supposed he would reveal it directly to me. - Abraham Lincoln | |
If Dr. Seuss Were a Technical Writer..... Here's an easy game to play. Here's an easy thing to say: If a packet hits a pocket on a socket on a port, And the bus is interrupted as a very last resort, And the address of the memory makes your floppy disk abort, Then the socket packet pocket has an error to report! If your cursor finds a menu item followed by a dash, And the double-clicking icon puts your window in the trash, And your data is corrupted 'cause the index doesn't hash, then your situation's hopeless, and your system's gonna crash! You can't say this? What a shame, sir! We'll find you another game, sir. If the label on the cable on the table at your house, Says the network is connected to the button on your mouse, But your packets want to tunnel on another protocol, That's repeatedly rejected by the printer down the hall, And your screen is all distorted by the side effects of gauss, So your icons in the window are as wavy as a souse, Then you may as well reboot and go out with a bang, 'Cause as sure as I'm a poet, the sucker's gonna hang! When the copy of your floppy's getting sloppy on the disk, And the microcode instructions cause unnecessary risc, Then you have to flash your memory and you'll want to ram your rom. Quickly turn off the computer and be sure to tell your mom! -- DementDJ@ccip.perkin-elmer.com (DementDJ) [rec.humor.funny] | |
MARTA SAYS THE INTERESTING thing about fly-fishing is that it's two lives connected by a thin strand. Come on, Marta, grow up. -- Jack Handley, The New Mexican, 1988. | |
The pitcher wound up and he flang the ball at the batter. The batter swang and missed. The pitcher flang the ball again and this time the batter connected. He hit a high fly right to the center fielder. The center fielder was all set to catch the ball, but at the last minute his eyes were blound by the sun and he dropped it. -- Dizzy Dean | |
"There are of course many problems connected with life, of which some of the most popular are `Why are people born?' `Why do they die?' `Why do they spend so much of the intervening time wearing digital watches?'" - The Book. | |
Operation Desert Slash WASHINGTON, D.C. -- High officials in the US military are planning on putting the 'Slashdot Effect' to use against Iraq. Pentagon computer experts think that the Slashdot Effect could topple key Net-connected Iraqi computer systems. Such a Denial of Service attack could prove instrumental when the US invades. One Pentagon official said, "If I had a million dollars for every server that crashed as a result of being linked on Slashdot, I'd be richer than Bill Gates. The Slashdot Effect is a very powerful weapon that the US military wants to tap into." Rob Malda has been contacted by top military brass. According to anonymous sources, Malda will play a key part in the so-called "Operation Desert Slash". Supposedly Malda will post several Slashdot articles with links to critical Iraqi websites right when the US invasion is set to begin. Meanwhile, Pentagon operatives will begin a series of Denial of Service attacks on other key Iraqi computer systems. One source notes, "Since many Iraqi systems rely on Microsoft software, this task should be relatively simple." | |
World Domination, One CPU Cycle At A Time Forget about searching for alien signals or prime numbers. The real distributed computing application is "Domination@World", a program to advocate Linux and Apache to every website in the world that uses Windows and IIS. The goal of the project is to probe every IP number to determine what kind of platform each Net-connected machine is running. "That's a tall order... we need lots of computers running our Domination@World clients to help probe every nook and cranny of the Net," explained Mr. Zell Litt, the project head. After the probing is complete, the second phase calls for the data to be cross-referenced with the InterNIC whois database. "This way we'll have the names, addresses, and phone numbers for every Windows-using system administrator on the planet," Zell gloated. "That's when the fun begins." The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan for extreme advocacy. As part of LART, each Linux User Group will receive a list of the Windows-using weenies in their region. The LUG will then be able to employ various advocacy techniques, ranging from a soft-sell approach (sending the target a free Linux CD in the mail) all the way to "LARTcon 5" (cracking into their system and forcibly installing Linux). | |
I value kindness to human beings first of all, and kindness to animals. I don't respect the law; I have a total irreverence for anything connected with society except that which makes the roads safer, the beer stronger, the food cheaper, and old men and women warmer in the winter, and happier in the summer. -- Brendan Behan | |
A cow is a completely automated milk-manufacturing machine. It is encased in untanned leather and mounted on four vertical, movable supports, one at each corner. The front end of the machine, or input, contains the cutting and grinding mechanism, utilizing a unique feedback device. Here also are the headlights, air inlet and exhaust, a bumper and a foghorn. At the rear, the machine carries the milk-dispensing equipment as well as a built-in flyswatter and insect repeller. The central portion houses a hydro- chemical-conversion unit. Briefly, this consists of four fermentation and storage tanks connected in series by an intricate network of flexible plumbing. This assembly also contains the central heating plant complete with automatic temperature controls, pumping station and main ventilating system. The waste disposal apparatus is located to the rear of this central section. Cows are available fully-assembled in an assortment of sizes and colors. Production output ranges from 2 to 20 tons of milk per year. In brief, the main external visible features of the cow are: two lookers, two hookers, four stander-uppers, four hanger-downers, and a swishy-wishy. | |
To understand this important story, you have to understand how the telephone company works. Your telephone is connected to a local computer, which is in turn connected to a regional computer, which is in turn connected to a loudspeaker the size of a garbage truck on the lawn of Edna A. Bargewater of Lawrence, Kan. Whenever you talk on the phone, your local computer listens in. If it suspects you're going to discuss an intimate topic, it notifies the computer above it, which listens in and decides whether to alert the one above it, until finally, if you really humiliate yourself, maybe break down in tears and tell your closest friend about a sordid incident from your past involving a seedy motel, a neighbor's spouse, an entire religious order, a garden hose and six quarts of tapioca pudding, the top computer feeds your conversation into Edna's loudspeaker, and she and her friends come out on the porch to listen and drink gin and laugh themselves silly. -- Dave Barry, "Won't It Be Just Great Owning Our Own Phones?" |