Proverbs, aphorisms, quotations (English) | by Linux fortune |
As in Protestant Europe, by contrast, where sects divided endlessly into smaller competing sects and no church dominated any other, all is different in the fragmented world of IBM. That realm is now a chaos of conflicting norms and standards that not even IBM can hope to control. You can buy a computer that works like an IBM machine but contains nothing made or sold by IBM itself. Renegades from IBM constantly set up rival firms and establish standards of their own. When IBM recently abandoned some of its original standards and decreed new ones, many of its rivals declared a puritan allegiance to IBM's original faith, and denounced the company as a divisive innovator. Still, the IBM world is united by its distrust of icons and imagery. IBM's screens are designed for language, not pictures. Graven images may be tolerated by the luxurious cults, but the true IBM faith relies on the austerity of the word. -- Edward Mendelson, "The New Republic", February 22, 1988 | |
Dear Emily: How can I choose what groups to post in? -- Confused Dear Confused: Pick as many as you can, so that you get the widest audience. After all, the net exists to give you an audience. Ignore those who suggest you should only use groups where you think the article is highly appropriate. Pick all groups where anybody might even be slightly interested. Always make sure followups go to all the groups. In the rare event that you post a followup which contains something original, make sure you expand the list of groups. Never include a "Followup-to:" line in the header, since some people might miss part of the valuable discussion in the fringe groups. -- Emily Postnews Answers Your Questions on Netiquette | |
No proper program contains an indication which as an operator-applied occurrence identifies an operator-defining occurrence which as an indication-applied occurrence identifies an indication-defining occurrence different from the one identified by the given indication as an indication-applied occurrence. -- ALGOL 68 Report | |
Unix Beer: Comes in several different brands, in cans ranging from 8 oz. to 64 oz. Drinkers of Unix Beer display fierce brand loyalty, even though they claim that all the different brands taste almost identical. Sometimes the pop-tops break off when you try to open them, so you have to have your own can opener around for those occasions, in which case you either need a complete set of instructions, or a friend who has been drinking Unix Beer for several years. BSD stout: Deep, hearty, and an acquired taste. The official brewer has released the recipe, and a lot of home-brewers now use it. Hurd beer: Long advertised by the popular and politically active GNU brewery, so far it has more head than body. The GNU brewery is mostly known for printing complete brewing instructions on every can, which contains hops, malt, barley, and yeast ... not yet fermented. Linux brand: A recipe originally created by a drunken Finn in his basement, it has since become the home-brew of choice for impecunious brewers and Unix beer-lovers worldwide, many of whom change the recipe. POSIX ales: Sweeter than lager, with the kick of a stout; the newer batches of a lot of beers seem to blend ale and stout or lager. Solaris brand: A lager, intended to replace Sun brand stout. Unlike most lagers, this one has to be drunk more slowly than stout. Sun brand: Long the most popular stout on the Unix market, it was discontinued in favor of a lager. SysV lager: Clear and thirst-quenching, but lacking the body of stout or the sweetness of ale. | |
HOW TO PROVE IT, PART 1 proof by example: The author gives only the case n = 2 and suggests that it contains most of the ideas of the general proof. proof by intimidation: 'Trivial'. proof by vigorous handwaving: Works well in a classroom or seminar setting. | |
Never drink from your finger bowl -- it contains only water. | |
Q: How many Marxists does it take to screw in a light bulb? A: None: The light bulb contains the seeds of its own revolution. | |
Periphrasis is the putting of things in a round-about way. "The cost may be upwards of a figure rather below 10m#." is a periphrasis for The cost may be nearly 10m#. "In Paris there reigns a complete absence of really reliable news" is a periphrasis for There is no reliable news in Paris. "Rarely does the 'Little Summer' linger until November, but at times its stay has been prolonged until quite late in the year's penultimate month" contains a periphrasis for November, and another for lingers. "The answer is in the negative" is a periphrasis for No. "Was made the recipient of" is a periphrasis for Was presented with. The periphrasis style is hardly possible on any considerable scale without much use of abstract nouns such as "basis, case, character, connexion, dearth, description, duration, framework, lack, nature, reference, regard, respect". The existence of abstract nouns is a proof that abstract thought has occurred; abstract thought is a mark of civilized man; and so it has come about that periphrasis and civilization are by many held to be inseparable. These good people feel that there is an almost indecent nakedness, a reversion to barbarism, in saying No news is good news instead of "The absence of intelligence is an indication of satisfactory developments." -- Fowler's English Usage | |
FORTUNE'S GUIDE TO DEALING WITH REAL-LIFE SCIENCE FICTION: #6 What to do... if a starship, equipped with an FTL hyperdrive lands in your backyard? First of all, do not run after your camera. You will not have any film, and, given the state of computer animation, noone will believe you anyway. Be polite. Remember, if they have an FTL hyperdrive, they can probably vaporize you, should they find you to be rude. Direct them to the White House lawn, which is where they probably wanted to land, anyway. A good road map should help. if you wake up in the middle of the night, and discover that your closet contains an alternate dimension? Don't walk in. You almost certainly will not be able to get back, and alternate dimensions are almost never any fun. Remain calm and go back to bed. Close the door first, so that the cat does not wander off. Check your closet in the morning. If it still contains an alternate dimension, nail it shut. | |
As with most fine things, chocolate has its season. There is a simple memory aid that you can use to determine whether it is the correct time to order chocolate dishes: any month whose name contains the letter A, E, or U is the proper time for chocolate. -- Sandra Boynton, "Chocolate: The Consuming Passion" | |
The reason it's called "Grape Nuts" is that it contains "dextrose", which is also sometimes called "grape sugar," and also because "Grape Nuts" is catchier, in terms of marketing, than "A Cross Between Gerbil Food and Gravel," which is what it tastes like. -- Dave Barry, "Tips for Writer's" | |
You should tip the waiter $10, minus $2 if he tells you his name, another $2 if he claims it will be His Pleasure to serve you and another $2 for each "special" he describes involving confusing terms such as "shallots," and $4 if the menu contains the word "fixin's." In many restaurants, this means the waiter will actually owe you money. If you are traveling with a child aged six months to three years, you should leave an additional amount equal to twice the bill to compensate for the fact that they will have to take the banquette out and burn it because the cracks are wedged solid with gobbets made of partially chewed former restaurant rolls saturated with baby spit. In New York, tip the taxicab driver $40 if he does not mention his hemorrhoids. -- Dave Barry, "The Stuff of Etiquette" | |
Although written many years ago, Lady Chatterley's Lover has just been reissued by the Grove Press, and this pictorial account of the day-to-day life of an English gamekeeper is full of considerable interest to outdoor minded readers, as it contains many passages on pheasant-raising, the apprehending of poachers, ways to control vermin, and other chores and duties of the professional gamekeeper. Unfortunately, one is obliged to wade through many pages of extraneous material in order to discover and savour those sidelights on the management of a midland shooting estate, and in this reviewer's opinion the book cannot take the place of J. R. Miller's "Practical Gamekeeping." -- Ed Zern, "Field and Stream" (Nov. 1959) | |
Windows contains FAT. Use Linux -- you won't ever have to worry about your weight. -- Ewout Stam | |
Humorix Holiday Gift Idea #2 Nerd Trading Cards Price: $10/pack Producer: Bottomms; 1-800-NRDS-ROK Forget baseball, nerd trading cards are the future. Now your kids can collect and trade cards of their favorite open source hackers and computer industry figures. Some of the cards included feature Linus Torvalds, Richard M. Stallman, and Larry Wall. Also contains cards for companies (Red Hat, Netscape, Transmeta, etc.), specific open source programs (Apache, Perl, Mozilla, etc.), and well-known websites (Slashdot, Freshmeat, etc.). Each card features a full-color picture on the front and complete information and statistics on back. Some of the cards have even been autographed. Quit trying to search eBay.com for a Mark McGwire rookie card and collect nerd cards instead! | |
Humorix Holiday Gift Idea #3 iTux Penguin Computer Price: $999.95 for base model Producer: Orange Computer, Co.; 1-800-GET-ITUX Based on the Slashdot comments, response to the Apple iMac from the Linux community was lukewarm at best. Orange Computer, Co., has picked up where Apple left behind and produced the iTux computer specifically for Linux users who want to "Think a lot different". The self-contained iTux computer system is built in the shape of Tux the Penguin. Its 15 inch monitor (17 inch available next year) is located at Tux's large belly. The penguin's two feet make up the split ergonomic keyboard (without those annoying Windows keys, of course). A 36X CD-ROM drive fits into Tux's mouth. Tux's left eye is actually the reboot button (can be reconfigured for other purposes since it is rarely used) and his right eye is the power button. The iTux case opens up from the back, allowing easy access for screwdriver-wielding nerds into Tux's guts. The US$995.95 model contains an Alpha CPU and all the usual stuff found in a Linux-class machine. More expensive models, to be debuted next year, will feature dual or quad Alpha CPUs and a larger size. | |
Red Hat Linux 10.0 RALEIGH-DURHAM, NC -- HypeNewsWire -- Red Hat, the producer of the most popular Linux distribution with over 25 million estimated users, is proud to announce the availability of Red Hat Linux 10.0. The latest version contains the new Linux 6.2 kernel, the Z Window System 2.0, full support for legacy Windows 3.x/9x/200x/NT software apps, and more. Copies of Red Hat Linux 10.0 will be available in stores on CD-ROM, DVD-ROM, or GNUDE (GNU Digital Encoding) disks within the next week. Compaq, Dell, Gateway, and several other large computer manufacturers have announced that they will offer computer systems with Red Hat 10.0 pre-installed. "We can sell systems with Red Hat pre-installed for considerably less than systems with Microsoft ActiveWindows 2001. Overall, Red Hat Linux's superior quality, low price, and modest system requirements puts Windows to shame," one Dell spokesperson said at last week's LinDex convention. | |
Open Source Irrational Constant BREEZEWOOD, PA -- In a revelation that could rock the foundations of science, a researcher in Pennsylvania has discovered that the digits of the irrational constant PI encode a version of the Linux kernel. "I can't believe it," the researcher, Neil Hoffman, exclaimed. "And yet, here I am staring at what appears to be the source code for Linux kernel 5.0.0. Needless to say, my whole world-view has changed..." Hoffman explained, "My algorithm, which applies several dozen conversions and manipulations to each digit of PI, spits out plain vanilla ASCII characters that happen to form the source code for the Linux kernel." Many members of the scientific community are skeptical. One One mathematician who has memorized the digits of PI to 10,000 places said, "This is the kind of nonsense one would expect to find in a tabloid such as the National Mathematics Enquirer. Or a Linux fortune(6) file. Hoffman's 'discovery' is obviously a hoax designed to secure government research grants." In a related matter, we have received an unconfirmed report that a region of the Mandelbrot fractal contains what appear to be the words "LINUS TORVALDS WAS HERE". In addition, the words "TRANSMETA: THIS SECRET MESSAGE IS NOT HERE YET" supposedly appear within the depths of the Julia Set. | |
Attack of the Tuxissa Virus What started out as a prank posting to comp.os.linux.advocacy yesterday has turned into one of the most significant viruses in computing history. The creator of the virus, who goes by the moniker "Anonymous Longhair", modified the Melissa virus to install Linux on infected machines. "It's a work of art," one Linux advocate told Humorix after he looked through the Tuxissa virus source code. "This virus goes well beyond the feeble troublemaking of Melissa. It actually configures a UMSDOS partition on the user's hard drive and then downloads and installs a stripped-down version of Slackware Linux." The email message that the virus is attached to has the subject "Important Message About Windows Security". The text of the body says, "I want to let you know about some security problems I've uncovered in Windows 95/98/NT, Office 95/97, and Outlook. It's critically important that you protect your system against these attacks. Visit these sites for more information..." The rest of the message contains 42 links to sites about Linux and free software. Details on how the virus started are a bit sketchy. The "Anonymous Longhair" who created it only posted it to Usenet as an early April Fool's gag, demonstrating how easy it would be to mount a "Linux revolution". | |
Dave Finton gazes into his crystal ball... May 2049: Transmeta Updates Webpage In a bold move that shocked observers everywhere, Transmeta Corp., a secretive Silicon Valley company, updated their webpage. According to our sources, Transmeta fixed a bug in their existing web page located in the comment "This page contains no tyops". The message has been fixed to read "This page contains no typso". | |
Excerpts From The First Annual Nerd Bowl (#5) A commercial that aired during the live ASCII broadcast of the game: Having trouble staying awake for weeks at a time working on that latest hack? Worried that some young punk will take over your cushy job because you sleep too much? Don't worry, EyeOpener® brand cola is here to save the day. You'll never feel sleepy again when you drink EyeOpener®. Surgeon General's Warning: This product should only be used under a doctor's immediate supervision, as it contains more caffeine than 512 cases of Coca-Cola. Caution: When sleep does occur after about three weeks, optometrists recommend having someone on hand to close your eyelids. Coming soon: ExtremelyWired(tm) cola with 50% more sugar! May or may not meet FDA approval... we're still trying. | |
I Want My Bugs! An entymologist in Georgia is threatening to sue Microsoft over false advertising in Windows 2000. "According to Microsoft, Win2K contains 63,000 bugs," he explained. "However, the shrink-wrapped box I purchased at CompUSSR only had one cockroach along with some worthless papers and a shiny drink coaster. I got ripped off." The entymologist hoped that the 63,000 promised bugs would greatly add to his insect collection. "I had my doubts that Microsoft could deliver 63,000 insects in one small box for only US$299," he said. "However, with a company as innovative as Microsoft, the sky is the limit. Or at least that's what I thought." He then asked angrily, "Where do I want to go today? Back to the store for a refund!" | |
"Brown Orifice" Is Only The Beginning Last week security holes were found in Netscape's Java implementation that allowed it to act as a web server. Earlier today, a hacker announced that he had found vulnerabilities in Mozilla M17 that allow it to operate as a web browser. And that's just the beginning. Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a hack! By manipulating some internal functions, I was able to use M17 to actually surf the web. Slashdot and Humorix rendered beautifully." Mozilla engineers were stunned. "This shouldn't be possible. M17 contains a newsreader, a mail client, an instant messenger client, and a whole bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle HTTP or HTML. We haven't been planning on adding web-surfing functionality to Mozilla until M30... maybe M25 at the earliest. I suspect this whole thing is a hoax." | |
Throwing Windows Out The Window The Federal Bureau Of Missing Socks has banned the use of Microsoft Windows and Office on all employee computers. But don't get too excited; they aren't going to replace them with Linux. Instead, this government agency has decided to go back to using abucusses, slide rules, and manual typewriters. The banishment of Microsoft software stems from the agency's new policy against computer games. MS Office, which contains several games in the form of Easter Eggs, is now verboten on all agency computers. "Flight simulators, pinball games, magic eight balls... they all violate our policy," said the sub-adjunct administrator second-class. "So we can't use Office." Windows is forbidden for the same reason. "We've had way too many employees wasting time playing Solitaire," she said. "Unfortunately, Solitaire is an integral part of Windows -- Microsoft executives said so during the anti-trust trial. If Solitaire is removed, the operating system won't function properly. Therefore, we have no choice but to banish all Windows computers." The Bureau's Assistant Technology Consultant, Mr. Reginald "Red" Taype, asked, "Have you ever seen an abucus crash? Have you ever seen anybody have fun with a slide rule? Do adding machines contain undocumented easter eggs? No! That's why we're ditching our PCs." | |
Unobfuscated Perl (#1) A rogue group of Perl hackers has presented a plan to add a "use really_goddamn_strict" pragma that would enforce readability and UNobfuscation. With this pragma in force, the Perl compiler might say: * Warning: Program contains zero comments. You've probably never seen or used one before; they begin with a # symbol. Please start using them or else a representative from the nearest Perl Mongers group will come to your house and beat you over the head with a cluestick. * Warning: Program uses a cute trick at line 125 that might make sense in C. But this isn't C! * Warning: Code at line 412 indicates that programmer is an idiot. Please correct error between chair and monitor. * Warning: While There's More Than One Way To Do It, your method at line 523 is particularly stupid. Please try again. | |
Jon Splatz's Movie Review: "Lord of the Pings" I've never walked out on a movie before. When I pay $9.50 to see a movie (plus $16.50 for snacks), I'm going to sit through every single minute no matter how awful. The resolve to get my money's worth allowed me to watch Jar Jar Binks without even flinching last year. But I couldn't make it through "Lord of the Pings". This movie contains a scene that is so appalling, so despicable, so vile, so terrible, so crappy, and so gut-wrenching that I simply had to get up, run out of the theater, and puke in the nearest restroom. It was just that bad. The whole thing is completely ruined by a scene that takes place only 52 seconds into the flick. Brace yourself: big letters appear on screen that say "An AOL/Time Warner Production". ... Because this film is brought to you by the letters A-O-L-T-W, I must give it an F-minus even though I've only seen 53 seconds of it. | |
> ... but i could not found any source code or > information in Internet. How strange. The kernel source code is definitely on the internet, and definitely contains drivers that implement internal layering - nrdev, shaper, the sync cards, isdn - Alan Cox on linux-kernel | |
<ExMachina> glQuakeIIIRendererMode(GL_TRUE) <Knghtbrd> ExMachina: isn't that part of the extension which provides glDriverBugs(GL_FALSE); ? <Siigron> Knghtbrd: no, glDriverBugs() is part of EXT_help_me. <Siigron> which also contains glMakeItWork(GL_PLEASE); | |
The state of innocence contains the germs of all future sin. -- Alexandre Arnoux, "Etudes et caprices" | |
A cow is a completely automated milk-manufacturing machine. It is encased in untanned leather and mounted on four vertical, movable supports, one at each corner. The front end of the machine, or input, contains the cutting and grinding mechanism, utilizing a unique feedback device. Here also are the headlights, air inlet and exhaust, a bumper and a foghorn. At the rear, the machine carries the milk-dispensing equipment as well as a built-in flyswatter and insect repeller. The central portion houses a hydro- chemical-conversion unit. Briefly, this consists of four fermentation and storage tanks connected in series by an intricate network of flexible plumbing. This assembly also contains the central heating plant complete with automatic temperature controls, pumping station and main ventilating system. The waste disposal apparatus is located to the rear of this central section. Cows are available fully-assembled in an assortment of sizes and colors. Production output ranges from 2 to 20 tons of milk per year. In brief, the main external visible features of the cow are: two lookers, two hookers, four stander-uppers, four hanger-downers, and a swishy-wishy. | |
*** The previous line contains the naughty word "$&".\n if /(ibm|apple|awk)/; # :-) -- Larry Wall in the perl man page | |
'Course, that doesn't work when 'a' contains parentheses. -- Larry Wall in <199710211647.JAA17957@wall.org> |