DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

As in Protestant Europe, by contrast, where sects divided endlessly into
smaller competing sects and no church dominated any other, all is different
in the fragmented world of IBM.  That realm is now a chaos of conflicting
norms and standards that not even IBM can hope to control.  You can buy a
computer that works like an IBM machine but contains nothing made or sold by
IBM itself.  Renegades from IBM constantly set up rival firms and establish
standards of their own.  When IBM recently abandoned some of its original
standards and decreed new ones, many of its rivals declared a puritan
allegiance to IBM's original faith, and denounced the company as a divisive
innovator.  Still, the IBM world is united by its distrust of icons and
imagery.  IBM's screens are designed for language, not pictures.  Graven
images may be tolerated by the luxurious cults, but the true IBM faith relies
on the austerity of the word.
                -- Edward Mendelson, "The New Republic", February 22, 1988
Dear Emily:
        How can I choose what groups to post in?
                -- Confused

Dear Confused:
        Pick as many as you can, so that you get the widest audience.  After
all, the net exists to give you an audience.  Ignore those who suggest you
should only use groups where you think the article is highly appropriate.
Pick all groups where anybody might even be slightly interested.
        Always make sure followups go to all the groups.  In the rare event
that you post a followup which contains something original, make sure you
expand the list of groups.  Never include a "Followup-to:" line in the
header, since some people might miss part of the valuable discussion in
the fringe groups.
                -- Emily Postnews Answers Your Questions on Netiquette
No proper program contains an indication which as an operator-applied
occurrence identifies an operator-defining occurrence which as an
indication-applied occurrence identifies an indication-defining occurrence
different from the one identified by the given indication as an
indication-applied occurrence.
                -- ALGOL 68 Report
Unix Beer: Comes in several different brands, in cans ranging from 8 oz.
to 64 oz.  Drinkers of Unix Beer display fierce brand loyalty, even
though they claim that all the different brands taste almost identical.
Sometimes the pop-tops break off when you try to open them, so you have
to have your own can opener around for those occasions, in which case you
either need a complete set of instructions, or a friend who has been
drinking Unix Beer for several years.
        BSD stout: Deep, hearty, and an acquired taste.  The official
brewer has released the recipe, and a lot of home-brewers now use it.
        Hurd beer: Long advertised by the popular and politically active
GNU brewery, so far it has more head than body.  The GNU brewery is
mostly known for printing complete brewing instructions on every can,
which contains hops, malt, barley, and yeast ... not yet fermented.
        Linux brand: A recipe originally created by a drunken Finn in his
basement, it has since become the home-brew of choice for impecunious
brewers and Unix beer-lovers worldwide, many of whom change the recipe.
        POSIX ales: Sweeter than lager, with the kick of a stout; the
newer batches of a lot of beers seem to blend ale and stout or lager.
        Solaris brand: A lager, intended to replace Sun brand stout.
Unlike most lagers, this one has to be drunk more slowly than stout.
        Sun brand: Long the most popular stout on the Unix market, it was
discontinued in favor of a lager.
        SysV lager: Clear and thirst-quenching, but lacking the body of
stout or the sweetness of ale.
                        HOW TO PROVE IT, PART 1

proof by example:
        The author gives only the case n = 2 and suggests that it
        contains most of the ideas of the general proof.

proof by intimidation:
        'Trivial'.

proof by vigorous handwaving:
        Works well in a classroom or seminar setting.
Never drink from your finger bowl -- it contains only water.
Q:        How many Marxists does it take to screw in a light bulb?
A:        None:  The light bulb contains the seeds of its own revolution.
Periphrasis is the putting of things in a round-about way.  "The cost may be
upwards of a figure rather below 10m#." is a periphrasis for The cost may be
nearly 10m#.  "In Paris there reigns a complete absence of really reliable
news" is a periphrasis for There is no reliable news in Paris.  "Rarely does
the 'Little Summer' linger until November, but at times its stay has been
prolonged until quite late in the year's penultimate month" contains a
periphrasis for November, and another for lingers.  "The answer is in the
negative" is a periphrasis for No.  "Was made the recipient of" is a
periphrasis for Was presented with.  The periphrasis style is hardly possible
on any considerable scale without much use of abstract nouns such as "basis,
case, character, connexion, dearth, description, duration, framework, lack,
nature, reference, regard, respect".  The existence of abstract nouns is a
proof that abstract thought has occurred; abstract thought is a mark of
civilized man; and so it has come about that periphrasis and civilization are
by many held to be inseparable.  These good people feel that there is an almost
indecent nakedness, a reversion to barbarism, in saying No news is good news
instead of "The absence of intelligence is an indication of satisfactory
developments."
                -- Fowler's English Usage
FORTUNE'S GUIDE TO DEALING WITH REAL-LIFE SCIENCE FICTION: #6
What to do...
    if a starship, equipped with an FTL hyperdrive lands in your backyard?
        First of all, do not run after your camera.  You will not have any
        film, and, given the state of computer animation, noone will believe
        you anyway.  Be polite.  Remember, if they have an FTL hyperdrive,
        they can probably vaporize you, should they find you to be rude.
        Direct them to the White House lawn, which is where they probably
        wanted to land, anyway.  A good road map should help.

    if you wake up in the middle of the night, and discover that your
    closet contains an alternate dimension?
        Don't walk in.  You almost certainly will not be able to get back,
        and alternate dimensions are almost never any fun.  Remain calm
        and go back to bed.  Close the door first, so that the cat does not
        wander off.  Check your closet in the morning.  If it still contains
        an alternate dimension, nail it shut.
As with most fine things, chocolate has its season.  There is a simple
memory aid that you can use to determine whether it is the correct time
to order chocolate dishes: any month whose name contains the letter A,
E, or U is the proper time for chocolate.
                -- Sandra Boynton, "Chocolate: The Consuming Passion"
The reason it's called "Grape Nuts" is that it contains "dextrose", which is
also sometimes called "grape sugar," and also because "Grape Nuts" is
catchier, in terms of marketing, than "A Cross Between Gerbil Food and
Gravel," which is what it tastes like.
                -- Dave Barry, "Tips for Writer's"
You should tip the waiter $10, minus $2 if he tells you his name, another $2
if he claims it will be His Pleasure to serve you and another $2 for each
"special" he describes involving confusing terms such as "shallots," and $4
if the menu contains the word "fixin's." In many restaurants, this means the
waiter will actually owe you money. If you are traveling with a child aged
six months to three years, you should leave an additional amount equal to
twice the bill to compensate for the fact that they will have to take the
banquette out and burn it because the cracks are wedged solid with gobbets
made of partially chewed former restaurant rolls saturated with baby spit.

In New York, tip the taxicab driver $40 if he does not mention his hemorrhoids.
                -- Dave Barry, "The Stuff of Etiquette"
Although written many years ago, Lady Chatterley's Lover has just been
reissued by the Grove Press, and this pictorial account of the
day-to-day life of an English gamekeeper is full of considerable
interest to outdoor minded readers, as it contains many passages on
pheasant-raising, the apprehending of poachers, ways to control vermin,
and other chores and duties of the professional gamekeeper.
Unfortunately, one is obliged to wade through many pages of extraneous
material in order to discover and savour those sidelights on the
management of a midland shooting estate, and in this reviewer's opinion
the book cannot take the place of J. R. Miller's "Practical Gamekeeping."
                -- Ed Zern, "Field and Stream" (Nov. 1959)
Windows contains FAT.
Use Linux -- you won't ever have to worry about your weight.

   -- Ewout Stam
Humorix Holiday Gift Idea #2

Nerd Trading Cards
Price: $10/pack
Producer: Bottomms; 1-800-NRDS-ROK

Forget baseball, nerd trading cards are the future.  Now your kids can
collect and trade cards of their favorite open source hackers and computer
industry figures.  Some of the cards included feature Linus Torvalds, Richard
M. Stallman, and Larry Wall.  Also contains cards for companies (Red Hat,
Netscape, Transmeta, etc.), specific open source programs (Apache, Perl,
Mozilla, etc.), and well-known websites (Slashdot, Freshmeat, etc.).  Each
card features a full-color picture on the front and complete information and
statistics on back. Some of the cards have even been autographed.  Quit
trying to search eBay.com for a Mark McGwire rookie card and collect nerd
cards instead!
Humorix Holiday Gift Idea #3

iTux Penguin Computer
Price: $999.95 for base model
Producer: Orange Computer, Co.; 1-800-GET-ITUX

Based on the Slashdot comments, response to the Apple iMac from the Linux
community was lukewarm at best.  Orange Computer, Co., has picked up where
Apple left behind and produced the iTux computer specifically for Linux users
who want to "Think a lot different".

The self-contained iTux computer system is built in the shape of Tux the
Penguin.  Its 15 inch monitor (17 inch available next year) is located at
Tux's large belly.  The penguin's two feet make up the split ergonomic
keyboard (without those annoying Windows keys, of course).  A 36X CD-ROM
drive fits into Tux's mouth.  Tux's left eye is actually the reboot button
(can be reconfigured for other purposes since it is rarely used) and his
right eye is the power button.  The iTux case opens up from the back,
allowing easy access for screwdriver-wielding nerds into Tux's guts.

The US$995.95 model contains an Alpha CPU and all the usual stuff found in a
Linux-class machine.  More expensive models, to be debuted next year, will
feature dual or quad Alpha CPUs and a larger size.
Red Hat Linux 10.0

RALEIGH-DURHAM, NC -- HypeNewsWire -- Red Hat, the producer of the most
popular Linux distribution with over 25 million estimated users, is proud to
announce the availability of Red Hat Linux 10.0.  The latest version
contains the new Linux 6.2 kernel, the Z Window System 2.0, full support for
legacy Windows 3.x/9x/200x/NT software apps, and more. Copies of Red Hat
Linux 10.0 will be available in stores on CD-ROM, DVD-ROM, or GNUDE (GNU
Digital Encoding) disks within the next week.

Compaq, Dell, Gateway, and several other large computer manufacturers have
announced that they will offer computer systems with Red Hat 10.0
pre-installed.  "We can sell systems with Red Hat pre-installed for
considerably less than systems with Microsoft ActiveWindows 2001. Overall,
Red Hat Linux's superior quality, low price, and modest system requirements
puts Windows to shame," one Dell spokesperson said at last week's LinDex
convention.
Open Source Irrational Constant

BREEZEWOOD, PA -- In a revelation that could rock the foundations of
science, a researcher in Pennsylvania has discovered that the digits of the
irrational constant PI encode a version of the Linux kernel.  "I can't
believe it," the researcher, Neil Hoffman, exclaimed.  "And yet, here I am
staring at what appears to be the source code for Linux kernel 5.0.0.
Needless to say, my whole world-view has changed..."

Hoffman explained, "My algorithm, which applies several dozen conversions and
manipulations to each digit of PI, spits out plain vanilla ASCII characters
that happen to form the source code for the Linux kernel."

Many members of the scientific community are skeptical.  One One
mathematician who has memorized the digits of PI to 10,000 places said,
"This is the kind of nonsense one would expect to find in a tabloid such as
the National Mathematics Enquirer.  Or a Linux fortune(6) file.  Hoffman's
'discovery' is obviously a hoax designed to secure government research
grants."

In a related matter, we have received an unconfirmed report that a region of
the Mandelbrot fractal contains what appear to be the words "LINUS TORVALDS
WAS HERE".  In addition, the words "TRANSMETA: THIS SECRET MESSAGE IS NOT
HERE YET" supposedly appear within the depths of the Julia Set.
Attack of the Tuxissa Virus

What started out as a prank posting to comp.os.linux.advocacy yesterday has
turned into one of the most significant viruses in computing history.
The creator of the virus, who goes by the moniker "Anonymous Longhair",
modified the Melissa virus to install Linux on infected machines.

"It's a work of art," one Linux advocate told Humorix after he looked
through the Tuxissa virus source code.  "This virus goes well beyond the
feeble troublemaking of Melissa.  It actually configures a UMSDOS partition
on the user's hard drive and then downloads and installs a stripped-down
version of Slackware Linux."

The email message that the virus is attached to has the subject "Important
Message About Windows Security".  The text of the body says, "I want to let
you know about some security problems I've uncovered in Windows 95/98/NT,
Office 95/97, and Outlook. It's critically important that you protect your
system against these attacks.  Visit these sites for more information..."
The rest of the message contains 42 links to sites about Linux and free
software.

Details on how the virus started are a bit sketchy.  The "Anonymous
Longhair" who created it only posted it to Usenet as an early April Fool's
gag, demonstrating how easy it would be to mount a "Linux revolution".
Dave Finton gazes into his crystal ball...

May 2049: Transmeta Updates Webpage

In a bold move that shocked observers everywhere, Transmeta Corp., a
secretive Silicon Valley company, updated their webpage.

According to our sources, Transmeta fixed a bug in their existing web page
located in the comment "This page contains no tyops". The message has been
fixed to read "This page contains no typso".
Excerpts From The First Annual Nerd Bowl (#5)

A commercial that aired during the live ASCII broadcast of the game:

  Having trouble staying awake for weeks at a time working on that latest
  hack? Worried that some young punk will take over your cushy job because
  you sleep too much? Don't worry, EyeOpener® brand cola is here to save
  the day. You'll never feel sleepy again when you drink EyeOpener®.

  Surgeon General's Warning: This product should only be used under a
  doctor's immediate supervision, as it contains more caffeine than 512
  cases of Coca-Cola.

  Caution: When sleep does occur after about three weeks, optometrists
  recommend having someone on hand to close your eyelids.

  Coming soon: ExtremelyWired(tm) cola with 50% more sugar! May or may not
  meet FDA approval... we're still trying.
I Want My Bugs!

An entymologist in Georgia is threatening to sue Microsoft over false
advertising in Windows 2000. "According to Microsoft, Win2K contains
63,000 bugs," he explained. "However, the shrink-wrapped box I purchased
at CompUSSR only had one cockroach along with some worthless papers and a
shiny drink coaster. I got ripped off."

The entymologist hoped that the 63,000 promised bugs would greatly add to
his insect collection. "I had my doubts that Microsoft could deliver
63,000 insects in one small box for only US$299," he said. "However, with
a company as innovative as Microsoft, the sky is the limit. Or at least
that's what I thought." He then asked angrily, "Where do I want to go
today? Back to the store for a refund!"
"Brown Orifice" Is Only The Beginning

Last week security holes were found in Netscape's Java implementation that
allowed it to act as a web server. Earlier today, a hacker announced that
he had found vulnerabilities in Mozilla M17 that allow it to operate as a
web browser. And that's just the beginning.

Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a
hack! By manipulating some internal functions, I was able to use M17 to
actually surf the web. Slashdot and Humorix rendered beautifully."

Mozilla engineers were stunned. "This shouldn't be possible. M17 contains
a newsreader, a mail client, an instant messenger client, and a whole
bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle
HTTP or HTML. We haven't been planning on adding web-surfing functionality
to Mozilla until M30... maybe M25 at the earliest. I suspect this whole
thing is a hoax."
Throwing Windows Out The Window

The Federal Bureau Of Missing Socks has banned the use of Microsoft Windows
and Office on all employee computers. But don't get too excited; they aren't
going to replace them with Linux. Instead, this government agency has decided
to go back to using abucusses, slide rules, and manual typewriters.

The banishment of Microsoft software stems from the agency's new policy
against computer games. MS Office, which contains several games in the form of
Easter Eggs, is now verboten on all agency computers. "Flight simulators,
pinball games, magic eight balls... they all violate our policy," said the
sub-adjunct administrator second-class. "So we can't use Office."

Windows is forbidden for the same reason. "We've had way too many
employees wasting time playing Solitaire," she said. "Unfortunately,
Solitaire is an integral part of Windows -- Microsoft executives said so
during the anti-trust trial. If Solitaire is removed, the operating system
won't function properly. Therefore, we have no choice but to banish all
Windows computers."

The Bureau's Assistant Technology Consultant, Mr. Reginald "Red" Taype,
asked,  "Have you ever seen an abucus crash? Have you ever seen anybody
have fun with a slide rule? Do adding machines contain undocumented easter
eggs? No! That's why we're ditching our PCs."
Unobfuscated Perl (#1)

A rogue group of Perl hackers has presented a plan to add a "use
really_goddamn_strict" pragma that would enforce readability and
UNobfuscation. With this pragma in force, the Perl compiler might say:

* Warning: Program contains zero comments. You've probably never seen or
  used one before; they begin with a # symbol. Please start using them or
  else a representative from the nearest Perl Mongers group will come to
  your house and beat you over the head with a cluestick.

* Warning: Program uses a cute trick at line 125 that might make sense in
  C. But this isn't C!

* Warning: Code at line 412 indicates that programmer is an idiot. Please
  correct error between chair and monitor.

* Warning: While There's More Than One Way To Do It, your method at line
  523 is particularly stupid. Please try again.
Jon Splatz's Movie Review: "Lord of the Pings"

I've never walked out on a movie before. When I pay $9.50 to see a movie
(plus $16.50 for snacks), I'm going to sit through every single minute no
matter how awful. The resolve to get my money's worth allowed me to watch
Jar Jar Binks without even flinching last year.

But I couldn't make it through "Lord of the Pings". This movie contains a
scene that is so appalling, so despicable, so vile, so terrible, so
crappy, and so gut-wrenching that I simply had to get up, run out of the
theater, and puke in the nearest restroom. It was just that bad.

The whole thing is completely ruined by a scene that takes place only 52
seconds into the flick. Brace yourself: big letters appear on screen that
say "An AOL/Time Warner Production".

...

Because this film is brought to you by the letters A-O-L-T-W, I must give
it an F-minus even though I've only seen 53 seconds of it.
> ...  but i could not found any source code or
> information in Internet.

How strange. The kernel source code is definitely on the internet, and
definitely contains drivers that implement internal layering -
nrdev, shaper, the sync cards, isdn

        - Alan Cox on linux-kernel
<ExMachina> glQuakeIIIRendererMode(GL_TRUE)
<Knghtbrd> ExMachina: isn't that part of the extension which provides
           glDriverBugs(GL_FALSE); ?
<Siigron> Knghtbrd: no, glDriverBugs() is part of EXT_help_me.
<Siigron> which also contains glMakeItWork(GL_PLEASE);
The state of innocence contains the germs of all future sin.
                -- Alexandre Arnoux, "Etudes et caprices"
A cow is a completely automated milk-manufacturing machine. It is encased
in untanned leather and mounted on four vertical, movable supports, one at
each corner.  The front end of the machine, or input, contains the cutting
and grinding mechanism, utilizing a unique feedback device.  Here also are
the headlights, air inlet and exhaust, a bumper and a foghorn.
        At the rear, the machine carries the milk-dispensing equipment as
well as a built-in flyswatter and insect repeller.  The central portion
houses a hydro- chemical-conversion unit.  Briefly, this consists of four
fermentation and storage tanks connected in series by an intricate network
of flexible plumbing.  This assembly also contains the central heating plant
complete with automatic temperature controls, pumping station and main
ventilating system.  The waste disposal apparatus is located to the rear of
this central section.
        Cows are available fully-assembled in an assortment of sizes and
colors.  Production output ranges from 2 to 20 tons of milk per year.  In
brief, the main external visible features of the cow are:  two lookers, two
hookers, four stander-uppers, four hanger-downers, and a swishy-wishy.
*** The previous line contains the naughty word "$&".\n
if /(ibm|apple|awk)/;      # :-)
             -- Larry Wall in the perl man page
'Course, that doesn't work when 'a' contains parentheses.
             -- Larry Wall in <199710211647.JAA17957@wall.org>
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners