DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Keyboard
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

improperly oriented keyboard
The keyboard isn't plugged in
your keyboard's space bar is generating spurious keycodes.
no "any" key on keyboard
the curls in your keyboard cord are losing electricity.
Interference between the keyboard and the chair.
PEBKAC (Problem Exists Between Keyboard And Chair)
A famous Lisp Hacker noticed an Undergraduate sitting in front of a Xerox
1108, trying to edit a complex Klone network via a browser. Wanting to
help, the Hacker clicked one of the nodes in the network with the mouse,
and asked "what do you see?" Very earnestly, the Undergraduate replied "I
see a cursor." The Hacker then quickly pressed the boot toggle at the back
of the keyboard, while simultaneously hitting the Undergraduate over the head
with a thick Interlisp Manual.  The Undergraduate was then Enlightened.
... an anecdote from IBM's Yorktown Heights Research Center.  When a
programmer used his new computer terminal, all was fine when he was sitting
down, but he couldn't log in to the system when he was standing up.  That
behavior was 100 percent repeatable: he could always log in when sitting and
never when standing.

Most of us just sit back and marvel at such a story; how could that terminal
know whether the poor guy was sitting or standing?  Good debuggers, though,
know that there has to be a reason.  Electrical theories are the easiest to
hypothesize: was there a loose with under the carpet, or problems with static
electricity?  But electrical problems are rarely consistently reproducible.
An alert IBMer finally noticed that the problem was in the terminal's keyboard:
the tops of two keys were switched.  When the programmer was seated he was a
touch typist and the problem went unnoticed, but when he stood he was led
astray by hunting and pecking.
        -- "Programming Pearls" column, by Jon Bentley in CACM February 1985
Has everyone noticed that all the letters of the word "database" are
typed with the left hand?  Now the layout of the QWERTYUIOP typewriter
keyboard was designed, among other things, to facilitate the even use
of both hands.  It follows, therefore, that writing about databases is
not only unnatural, but a lot harder than it appears.
Kiss your keyboard goodbye!
        Price Wang's programmer was coding software.  His fingers danced upon
the keyboard.  The program compiled without an error message, and the program
ran like a gentle wind.
        Excellent!" the Price exclaimed, "Your technique is faultless!"
        "Technique?" said the programmer, turning from his terminal, "What I
follow is the Tao -- beyond all technique.  When I first began to program I
would see before me the whole program in one mass.  After three years I no
longer saw this mass.  Instead, I used subroutines.  But now I see nothing.
My whole being exists in a formless void.  My senses are idle.  My spirit,
free to work without a plan, follows its own instinct.  In short, my program
writes itself.  True, sometimes there are difficult problems.  I see them
coming, I slow down, I watch silently.  Then I change a single line of code
and the difficulties vanish like puffs of idle smoke.  I then compile the
program.  I sit still and let the joy of the work fill my being.  I close my
eyes for a moment and then log off."
        Price Wang said, "Would that all of my programmers were as wise!"
                -- Geoffrey James, "The Tao of Programming"
The sendmail configuration file is one of those files that looks like someone
beat their head on the keyboard.  After working with it... I can see why!
                -- Harry Skelton
Trying to establish voice contact ... please ____yell into keyboard.
You're using a keyboard!  How quaint!
The rules:
         (1) Thou shalt not worship other computer systems.
         (2) Thou shalt not impersonate Liberace or eat watermelon while
              sitting at the console keyboard.
         (3) Thou shalt not slap users on the face, nor staple their silly
             little card decks together.
         (4) Thou shalt not get physically involved with the computer system,
             especially if you're already married.
         (5) Thou shalt not use magnetic tapes as frisbees, nor use a disk
             pack as a stool to reach another disk pack.
         (6) Thou shalt not stare at the blinking lights for more than one
             eight hour shift.
         (7) Thou shalt not tell users that you accidentally destroyed their
             files/backup just to see the look on their little faces.
         (8) Thou shalt not enjoy cancelling a job.
         (9) Thou shalt not display firearms in the computer room.
        (10) Thou shalt not push buttons "just to see what happens".
Double Bucky, you're the one,
You make my keyboard so much fun,
Double Bucky, an additional bit or two, (Vo-vo-de-o)
Control and meta, side by side,
Augmented ASCII, 9 bits wide!
Double Bucky, a half a thousand glyphs, plus a few!

Oh, I sure wish that I,
Had a couple of bits more!
Perhaps a set of pedals to make the number of bits four.

Double Double Bucky!  Double Bucky left and right
OR'd together, outta sight!
Double Bucky, I'd like a whole word of,
Double Bucky, I'm happy I heard of,
Double Bucky, I'd like a whole word of you!
                -- to Nicholas Wirth, who suggested that an extra bit
                be added to terminal codes on 36-bit machines for use
                by screen editors.  [to the tune of "Rubber Ducky"]
Eleanor Rigby
        Sits at the keyboard
        And waits for a line on the screen
Lives in a dream
Waits for a signal
        Finding some code
        That will make the machine do some more.
What is it for?

All the lonely users, where do they all come from?
All the lonely users, why does it take so long?

Hacker MacKensie
Writing the code for a program that no one will run
It's nearly done
Look at him working, fixing the bugs in the night when there's
        nobody there.
What does he care?

All the lonely users, where do they all come from?
All the lonely users, why does it take so long?
Ah, look at all the lonely users.
Ah, look at all the lonely users.
Humorix Holiday Gift Idea #3

iTux Penguin Computer
Price: $999.95 for base model
Producer: Orange Computer, Co.; 1-800-GET-ITUX

Based on the Slashdot comments, response to the Apple iMac from the Linux
community was lukewarm at best.  Orange Computer, Co., has picked up where
Apple left behind and produced the iTux computer specifically for Linux users
who want to "Think a lot different".

The self-contained iTux computer system is built in the shape of Tux the
Penguin.  Its 15 inch monitor (17 inch available next year) is located at
Tux's large belly.  The penguin's two feet make up the split ergonomic
keyboard (without those annoying Windows keys, of course).  A 36X CD-ROM
drive fits into Tux's mouth.  Tux's left eye is actually the reboot button
(can be reconfigured for other purposes since it is rarely used) and his
right eye is the power button.  The iTux case opens up from the back,
allowing easy access for screwdriver-wielding nerds into Tux's guts.

The US$995.95 model contains an Alpha CPU and all the usual stuff found in a
Linux-class machine.  More expensive models, to be debuted next year, will
feature dual or quad Alpha CPUs and a larger size.
Microsoft Mandatory Survey (#13)

Customers who want to upgrade to Windows 98 Second Edition must now fill
out a Microsoft survey online before they can order the bugfix/upgrade.

Question 13: Which of the following new Microsoft products do you plan on
             buying within the next 6 months?

A. Windows For Babies(tm) - Using an enhanced "click-n-drool" interface,
   babies will be able to learn how to use a Wintel computer, giving them
   a head start in living in a Microsoft-led world.

B. Where In Redmond Is Carmen Sandiego?(tm) - The archvillian Sandiego has
   stolen the Windows source code and must be stopped before she can
   publish it on the Net.

C. ActiveKeyboard 2000(tm) - An ergonomic keyboard that replaces useless
   keys like SysRq and Scroll Lock with handy keys like "Play Solitaire"
   and "Visit Microsoft.com".

D. Visual BatchFile(tm) - An IDE and compiler for the MS-DOS batch file
   language. MSNBC calls it "better than Perl".
Jargon Coiner (#1)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* WINCURSE: Loud expletive uttered when a Linux user comes face-to-face
  with a computer containing a WinModem.

  Example: "Eric wincursed when his mother showed him the new computer she
  bought from CompUSSR... which contained a WinModem and a WinSoundCard."

* WIND'OH KEY: Nickname given to the three useless Windows keys that come
  on virtually all new keyboards. These keys are often hit by mistake
  instead of CTRL or ALT, causing the user to shout "D'oh!"

* DE-WIND'OH!ED KEYBOARD: (1) A new keyboard produced without any wind'oh!
  keys or a "Enhanced for Windows 95/98" logo. Extremely rare. (2) A
  keyboard in which the wind'oh! keys have been physically removed.
Solving The Virus Problem Once And For All

System administrators across the globe have tried installing anti-virus
software. They've tried lecturing employees not to open unsolicited email
attachments. They've tried installing firewalls and the latest security
patches. But even with these precautions, email viruses continue to rank
third only to Solitaire and the Blue Screen Of Death in the amount of lost
productivity they cause. Meanwhile, Microsoft Exchange and LookOut! remain
as the number one virus delivery products on the market today.

But maybe not for much longer. A group of disgruntled administrators have
teamed up to produce and sell a brand new way to fight viruses, one that
attacks the root of the problem: stupid users.

Salivating Dogs, Inc. of Ohio has unveiled the "Clue Delivery System"
(CDS), a small device that plugs into the back of a standard PC keyboard
and delivers a mild electric shock whenever the luser does something
stupid. The device is triggered by a Windows program that detects when the
luser attempts to open an unsolicited email attachment or perform another
equally dangerous virus-friendly action.
<Mercury> Be warned, I have a keyboard I can use to beat luser's heads
          in, and then continue to use... (=:]
<Deek> Mercury: Oh, an IBM. :)
<xtifr> wow, I think I just used libtool to solve a problem -- somebody
        help me! :>
<luca> xtifr, STEP AWAY FROM THE KEYBOARD
Hand me a pair of leather pants and a CASIO keyboard -- I'm living for today!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners