Proverbs, aphorisms, quotations (English) | by Linux fortune |
George Bernard Shaw once sent two tickets to the opening night of one of his plays to Winston Churchill with the following note: "Bring a friend, if you have one." Churchill wrote back, returning the two tickets and excused himself as he had a previous engagement. He also attached the following: "Please send me two tickets for the next night, if there is one." | |
/* * [...] Note that 120 sec is defined in the protocol as the maximum * possible RTT. I guess we'll have to use something other than TCP * to talk to the University of Mars. * PAWS allows us longer timeouts and large windows, so once implemented * ftp to mars will work nicely. */ (from /usr/src/linux/net/inet/tcp.c, concerning RTT [retransmission timeout]) | |
"Note that if I can get you to \"su and say\" something just by asking, you have a very serious security problem on your system and you should look into it." (By Paul Vixie, vixie-cron 3.0.1 installation notes) | |
quit When the quit statement is read, the bc processor is terminated, regardless of where the quit state- ment is found. For example, "if (0 == 1) quit" will cause bc to terminate. (Seen in the manpage for "bc". Note the "if" statement's logic) | |
vapors from evaporating sticky-note adhesives | |
Post-it Note Sludge leaked into the monitor. | |
=== ALL CSH USERS PLEASE NOTE ======================== Set the variable $LOSERS to all the people that you think are losers. This will cause all said losers to have the variable $PEOPLE-WHO-THINK-I-AM-A-LOSER updated in their .login file. Should you attempt to execute a job on a machine with poor response time and a machine on your local net is currently populated by losers, that machine will be freed up for your job through a cold boot process. | |
=== ALL USERS PLEASE NOTE ======================== A new system, the CIRCULATORY system, has been added. The long-experimental CIRCULATORY system has been released to users. The Lisp Machine uses Type B fluid, the L machine uses Type A fluid. When the switch to Common Lisp occurs both machines will, of course, be Type O. Please check fluid level by using the DIP stick which is located in the back of VMI monitors. Unchecked low fluid levels can cause poor paging performance. | |
=== ALL USERS PLEASE NOTE ======================== Bug reports now amount to an average of 12,853 per day. Unfortunately, this is only a small fraction [ < 1% ] of the mail volume we receive. In order that we may more expeditiously deal with these valuable messages, please communicate them by one of the following paths: ARPA: WastebasketSLMHQ.ARPA UUCP: [berkeley, seismo, harpo]!fubar!thekid!slmhq!wastebasket Non-network sites: Federal Express to: Wastebasket Room NE43-926 Copernicus, The Moon, 12345-6789 For that personal contact feeling call 1-415-642-4948; our trained operators are on call 24 hours a day. VISA/MC accepted.* * Our very rich lawyers have assured us that we are not responsible for any errors or advice given over the phone. | |
=== ALL USERS PLEASE NOTE ======================== CAR and CDR now return extra values. The function CAR now returns two values. Since it has to go to the trouble to figure out if the object is carcdr-able anyway, we figured you might as well get both halves at once. For example, the following code shows how to destructure a cons (SOME-CONS) into its two slots (THE-CAR and THE-CDR): (MULTIPLE-VALUE-BIND (THE-CAR THE-CDR) (CAR SOME-CONS) ...) For symmetry with CAR, CDR returns a second value which is the CAR of the object. In a related change, the functions MAKE-ARRAY and CONS have been fixed so they don't allocate any storage except on the stack. This should hopefully help people who don't like using the garbage collector because it cold boots the machine so often. | |
=== ALL USERS PLEASE NOTE ======================== Compiler optimizations have been made to macro expand LET into a WITHOUT- INTERRUPTS special form so that it can PUSH things into a stack in the LET-OPTIMIZATION area, SETQ the variables and then POP them back when it's done. Don't worry about this unless you use multiprocessing. Note that LET *could* have been defined by: (LET ((LET '`(LET ((LET ',LET)) ,LET))) `(LET ((LET ',LET)) ,LET)) This is believed to speed up execution by as much as a factor of 1.01 or 3.50 depending on whether you believe our friendly marketing representatives. This code was written by a new programmer here (we snatched him away from Itty Bitti Machines where he was writing COUGHBOL code) so to give him confidence we trusted his vows of "it works pretty well" and installed it. | |
=== ALL USERS PLEASE NOTE ======================== JCL support as alternative to system menu. In our continuing effort to support languages other than LISP on the CADDR, we have developed an OS/360-compatible JCL. This can be used as an alternative to the standard system menu. Type System J to get to a JCL interactive read-execute-diagnose loop window. [Note that for 360 compatibility, all input lines are truncated to 80 characters.] This window also maintains a mouse-sensitive display of critical job parameters such as dataset allocation, core allocation, channels, etc. When a JCL syntax error is detected or your job ABENDs, the window-oriented JCL debugger is entered. The JCL debugger displays appropriate OS/360 error messages (such as IEC703, "disk error") and allows you to dequeue your job. | |
=== ALL USERS PLEASE NOTE ======================== The garbage collector now works. In addition a new, experimental garbage collection algorithm has been installed. With SI:%DSK-GC-QLX-BITS set to 17, (NOT the default) the old garbage collection algorithm remains in force; when virtual storage is filled, the machine cold boots itself. With SI:%DSK-GC- QLX-BITS set to 23, the new garbage collector is enabled. Unlike most garbage collectors, the new gc starts its mark phase from the mind of the user, rather than from the obarray. This allows the garbage collection of significantly more Qs. As the garbage collector runs, it may ask you something like "Do you remember what SI:RDTBL-TRANS does?", and if you can't give a reasonable answer in thirty seconds, the symbol becomes a candidate for GCing. The variable SI:%GC-QLX-LUSER-TM governs how long the GC waits before timing out the user. | |
=== ALL USERS PLEASE NOTE ======================== There has been some confusion concerning MAPCAR. (DEFUN MAPCAR (&FUNCTIONAL FCN &EVAL &REST LISTS) (PROG (V P LP) (SETQ P (LOCF V)) L (SETQ LP LISTS) (%START-FUNCTION-CALL FCN T (LENGTH LISTS) NIL) L1 (OR LP (GO L2)) (AND (NULL (CAR LP)) (RETURN V)) (%PUSH (CAAR LP)) (RPLACA LP (CDAR LP)) (SETQ LP (CDR LP)) (GO L1) L2 (%FINISH-FUNCTION-CALL FCN T (LENGTH LISTS) NIL) (SETQ LP (%POP)) (RPLACD P (SETQ P (NCONS LP))) (GO L))) We hope this clears up the many questions we've had about it. | |
Cosmotronic Software Unlimited Inc. does not warrant that the functions contained in the program will meet your requirements or that the operation of the program will be uninterrupted or error-free. However, Cosmotronic Software Unlimited Inc. warrants the diskette(s) on which the program is furnished to be of black color and square shape under normal use for a period of ninety (90) days from the date of purchase. NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES. -- Horstmann Software Design, the "ChiWriter" user manual | |
**** IMPORTANT **** ALL USERS PLEASE NOTE **** Due to a recent systems overload error your recent disk files have been erased. Therefore, in accordance with the UNIX Basic Manual, University of Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised Federal Communications Act, you are being granted Temporary Disk Space, valid for three months from this date, subject to the restrictions set forth in Appendix II of the Federal Communications Handbook (18th edition) as well as the references mentioned herein. You may apply for more disk space at any time. Disk usage in or above the eighth percentile will secure the removal of all restrictions and you will immediately receive your permanent disk space. Disk usage in the sixth or seventh percentile will not effect the validity of your temporary disk space, though its expiration date may be extended for a period of up to three months. A score in the fifth percentile or below will result in the withdrawal of your Temporary Disk space. | |
Meantime, in the slums below Ronnie's Ranch, Cynthia feels as if some one has made voodoo boxen of her and her favorite backplanes. On this fine moonlit night, some horrible persona has been jabbing away at, dragging magnets over, and surging these voodoo boxen. Fortunately, they seem to have gotten a bit bored and fallen asleep, for it looks like Cynthia may get to go home. However, she has made note to quickly put together a totem of sweaty, sordid static straps, random bits of wire, flecks of once meaniful oxide, bus grant cards, gummy worms, and some bits of old pdp backplane to hang above the machine room. This totem must be blessed by the old and wise venerable god of unibus at once, before the idolatization of vme, q and pc bus drive him to bitter revenge. Alas, if this fails, and the voodoo boxen aren't destroyed, there may be more than worms in the apple. Next, the arrival of voodoo optico transmitigational magneto killer paramecium, capable of teleporting from cable to cable, screen to screen, ear to ear and hoof to mouth... | |
Never try to explain computers to a layman. It's easier to explain sex to a virgin. -- Robert Heinlein (Note, however, that virgins tend to know a lot about computers.) | |
NOTE: No warranties, either express or implied, are hereby given. All software is supplied as is, without guarantee. The user assumes all responsibility for damages resulting from the use of these features, including, but not limited to, frustration, disgust, system abends, disk head-crashes, general malfeasance, floods, fires, shark attack, nerve gas, locust infestation, cyclones, hurricanes, tsunamis, local electromagnetic disruptions, hydraulic brake system failure, invasion, hashing collisions, normal wear and tear of friction surfaces, comic radiation, inadvertent destruction of sensitive electronic components, windstorms, the Riders of Nazgul, infuriated chickens, malfunctioning mechanical or electrical sexual devices, premature activation of the distant early warning system, peasant uprisings, halitosis, artillery bombardment, explosions, cave-ins, and/or frogs falling from the sky. | |
Welcome to UNIX! Enjoy your session! Have a great time! Note the use of exclamation points! They are a very effective method for demonstrating excitement, and can also spice up an otherwise plain-looking sentence! However, there are drawbacks! Too much unnecessary exclaiming can lead to a reduction in the effect that an exclamation point has on the reader! For example, the sentence Jane went to the store to buy bread should only be ended with an exclamation point if there is something sensational about her going to the store, for example, if Jane is a cocker spaniel or if Jane is on a diet that doesn't allow bread or if Jane doesn't exist for some reason! See how easy it is?! Proper control of exclamation points can add new meaning to your life! Call now to receive my free pamphlet, "The Wonder and Mystery of the Exclamation Point!"! Enclose fifteen(!) dollars for postage and handling! Operators are standing by! (Which is pretty amazing, because they're all cocker spaniels!) | |
It is important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy. -- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System", Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20 | |
"The urge to destroy is also a creative urge." -- Bakunin [ed. note - I would say: The urge to destroy may sometimes be a creative urge.] | |
Engram, n.: 1. The physical manifestation of human memory -- "the engram." 2. A particular memory in physical form. [Usage note: this term is no longer in common use. Prior to Wilson and Magruder's historic discovery, the nature of the engram was a topic of intense speculation among neuroscientists, psychologists, and even computer scientists. In 1994 Professors M. R. Wilson and W. V. Magruder, both of Mount St. Coax University in Palo Alto, proved conclusively that the mammalian brain is hardwired to interpret a set of thirty seven genetically transmitted cooperating TECO macros. Human memory was shown to reside in 1 million Q-registers as Huffman coded uppercase-only ASCII strings. Interest in the engram has declined substantially since that time.] -- New Century Unabridged English Dictionary, 3rd edition, 2007 A.D. | |
Extract from Official Sweepstakes Rules: NO PURCHASE REQUIRED TO CLAIM YOUR PRIZE To claim your prize without purchase, do the following: (a) Carefully cut out your computer-printed name and address from upper right hand corner of the Prize Claim Form. (b) Affix computer-printed name and address -- with glue or cellophane tape (no staples or paper clips) -- to a 3x5 inch index card. (c) Also cut out the "No" paragraph (lower left hand corner of Prize Claim Form) and affix it to the 3x5 card below your address label. (d) Then print on your 3x5 card, above your computer-printed name and address the words "CARTER & VAN PEEL SWEEPSTAKES" (Use all capital letters.) (e) Finally place 3x5 card (without bending) into a plain envelope [NOTE: do NOT use the the Official Prize Claim and CVP Perfume Reply Envelope or you may be disqualified], and mail to: CVP, Box 1320, Westbury, NY 11595. Print this address correctly. Comply with above instructions carefully and completely or you may be disqualified from receiving your prize. | |
Please take note: | |
Pudder's Law: Anything that begins well will end badly. (Note: The converse of Pudder's law is not true.) | |
Viking, n.: 1. Daring Scandinavian seafarers, explorers, adventurers, entrepreneurs world-famous for their aggressive, nautical import business, highly leveraged takeovers and blue eyes. 2. Bloodthirsty sea pirates who ravaged northern Europe beginning in the 9th century. Hagar's note: The first definition is much preferred; the second is used only by malcontents, the envious, and disgruntled owners of waterfront property. | |
Q: How many lawyers does it take to change a light bulb? A: Whereas the party of the first part, also known as "Lawyer", and the party of the second part, also known as "Light Bulb", do hereby and forthwith agree to a transaction wherein the party of the second part shall be removed from the current position as a result of failure to perform previously agreed upon duties, i.e., the lighting, elucidation, and otherwise illumination of the area ranging from the front (north) door, through the entryway, terminating at an area just inside the primary living area, demarcated by the beginning of the carpet, any spillover illumination being at the option of the party of the second part and not required by the aforementioned agreement between the parties. The aforementioned removal transaction shall include, but not be limited to, the following. The party of the first part shall, with or without elevation at his option, by means of a chair, stepstool, ladder or any other means of elevation, grasp the party of the second part and rotate the party of the second part in a counter-clockwise direction, this point being tendered non-negotiable. Upon reaching a point where the party of the second part becomes fully detached from the receptacle, the party of the first part shall have the option of disposing of the party of the second part in a manner consistent with all relevant and applicable local, state and federal statutes. Once separation and disposal have been achieved, the party of the first part shall have the option of beginning installation. Aforesaid installation shall occur in a manner consistent with the reverse of the procedures described in step one of this self-same document, being careful to note that the rotation should occur in a clockwise direction, this point also being non-negotiable. The above described steps may be performed, at the option of the party of the first part, by any or all agents authorized by him, the objective being to produce the most possible revenue for the Partnership. | |
=============== ALL FRESHMEN PLEASE NOTE =============== To minimize scheduling confusion, please realize that if you are taking one course which is offered at only one time on a given day, and another which is offered at all times on that day, the second class will be arranged as to afford maximum inconvenience to the student. For example, if you happen to work on campus, you will have 1-2 hours between classes. If you commute, there will be a minimum of 6 hours between the two classes. | |
"I'm returning this note to you, instead of your paper, because it (your paper) presently occupies the bottom of my bird cage." -- English Professor, Providence College | |
Back in the early 60's, touch tone phones only had 10 buttons. Some military versions had 16, while the 12 button jobs were used only by people who had "diva" (digital inquiry, voice answerback) systems -- mainly banks. Since in those days, only Western Electric made "data sets" (modems) the problems of terminology were all Bell System. We used to struggle with written descriptions of dial pads that were unfamiliar to most people (most phones were rotary then.) Partly in jest, some AT&T engineering types (there was no marketing in the good old days, which is why they were the good old days) made up the term "octalthorpe" (note spelling) to denote the "pound sign." Presumably because it has 8 points sticking out. It never really caught on. | |
By the time you swear you're his, shivering and sighing and he vows his passion is infinite, undying -- Lady, make a note of this: One of you is lying. -- Dorothy Parker, "Unfortunate Coincidence" | |
Lady, lady, should you meet One whose ways are all discreet, One who murmurs that his wife Is the lodestar of his life, One who keeps assuring you That he never was untrue, Never loved another one... Lady, lady, better run! -- Dorothy Parker, "Social Note" | |
Well, we're big rock singers, we've got golden fingers, And we're loved everywhere we go. We sing about beauty, and we sing about truth, At ten thousand dollars a show. We take all kind of pills to give us all kind of thrills, But the thrill we've never known, Is the thrill that'll get'cha, when you get your picture, On the cover of the Rolling Stone. I got a freaky old lady, name of Cole King Katie, Who embroiders on my jeans. I got my poor old gray-haired daddy, Drivin' my limousine. Now it's all designed, to blow our minds, But our minds won't be really be blown; Like the blow that'll get'cha, when you get your picture, On the cover of the Rolling Stone. We got a lot of little, teen-aged, blue-eyed groupies, Who'll do anything we say. We got a genuine Indian guru, that's teachin' us a better way. We got all the friends that money can buy, So we never have to be alone. And we keep gettin' richer, but we can't get our picture, On the cover of the Rolling Stone. -- Dr. Hook and the Medicine Show [As a note, they eventually DID make the cover of RS. Ed.] | |
Hi there! This is just a note from me, to you, to tell you, the person reading this note, that I can't think up any more famous quotes, jokes, nor bizarre stories, so you may as well go home. | |
Mad Programmer Commits Suicide KENNETT, MO -- For two years Doug Carter toiled away in his basement computer lab working on his own 'Dougnix' operating system. Apparently he was sick of Windows 95 so he decided to create his own OS, based loosely on Unix. He had developed his own 'DougUI' window manager, Doug++ compiler, DougFS filesystem, and other integrated tools. All was going well until last week when he hooked his computer up to the Internet for the first time. It was then that he stumbled on to www.linux.org. Reports are sketchy about what happened next. We do know he committed suicide days after, leaving behind a rambling suicide note. Part of the note says: "I've wasted the past two years of my life... Wasted... Gone... Forever... Never return to. [illegible] Why did I bother creating my own OS... when Linux is exactly what I needed!?!?!?! If I had only known about Linux! Why someone didn't tell me? [illegible] Wasted! Aggghhh!" [The rest of the note is filled with incomprehensible assembly language ramblings.] | |
Actual Snippet of Windows Source Code! Honest! NOTE: The following snippet of the Windows 95 source code was sent to us via 'unofficial' channels. Don't tell anyone you saw this! We really don't feel like being visited by the Microsoft Intellectual Property Police. void BusyLoop() /* Do nothing loop to kill CPU cycles; added at the request of Intel */ { DisplayRandomSubliminalMessage(); for( int i = 0; i < BIG_INT; i++ ) for( int j = 0; j < BIG_INT; j++ ) for( int k = 0; k < BIG_INT; k++ ) for( int l = 0; l < BIG_INT; l++ ) if( STACK_SPACE_PERCENTAGE_FREE > .05 ) /* There's plenty of stack space left -- let's eat up some more CPU cycles, recursively! */ BusyLoop(); } | |
Freaks In Linux Houses Shouldn't Throw FUD By Mr. Stu Poor, technology pundit for the Arkansas "Roadkill Roundup" newspaper. [Editor's Note: He's the local equivalent of Jesse Berst]. As you all know, February 17th was the happy day that Microsoft officially released Windows 2000. I went down to the local Paperclips computer store and asked if they had any copies in stock. One of the pimply-faced Linux longhairs explained that Paperclips didn't carry Win2K because it is not intended for consumers. What FUD! I can't believe the gall of those Linux Communists to spread such FUD (Fear, Uncertainty, and Doubt) about Windows 2000, which is _the_ best, most stable operating system ever produced in the history of mankind! | |
Brief History Of Linux (#12) A note from Bill Gates' second grade teacher: Billy has been having some trouble behaving in class lately... Last Monday he horded all of the crayons and refused to share, saying that he needed all 160 colors to maximize his 'innovation'. He then proceeded to sell little pieces of paper ("End-User License Agreement for Crayons" he called them) granting his classmates the 'non-transferable right' to use the crayons on a limited time basis in exchange for their lunch money... When I tried to stop Billy, he kept harping about his right to innovate and how my interference violated basic notions of free-market capitalism. "Holding a monopoly is not illegal," he rebutted. I chastised him for talking back, and then I took away the box of crayons so others could share them... angrily, he then pointed to a drawing of his hanging on the wall and yelled, "That's my picture! You don't have the right to present my copyrighted material in a public exhibition without my permission! You're pirating my intellectual property. Pirate! Pirate! Pirate!" I developed a headache that day that even the maximum dosage of Aspirin wasn't able to handle. And then on Tuesday, he conned several students out of their milk money by convincing them to play three-card Monty... | |
The Humorix Oracle explains how to get a job at a major corporation: 1. Find an exploit in Microsoft IIS or another buggy Microsoft product to which large corporations rarely apply security patches. 2. Create a virus or worm that takes advantage of this exploit and then propogates itself by selecting IP numbers at random and then trying to infect those machines. 3. Keep an eye on your own website's server logs. When your virus starts propogating, your server will be hit with thousands of attacks from other infected systems trying to spread the virus to your machine. 4. Make a list of the IP numbers of all of the infected machines. 5. Perform a reverse DNS lookup on these IP numbers. 6. Make a note of all of the Fortune 500 companies that appear on the list of infected domains. 7. Send your resume to these companies and request an interview for a system administrator position. These companies are hiring -- whether they realize it or not. 8. Use your new salary to hire a good defense lawyer when the FBI comes knocking. | |
"Note that nobody reads every post in linux-kernel. In fact, nobody who expects to have time left over to actually do any real kernel work will read even half. Except Alan Cox, but he's actually not human, but about a thousand gnomes working in under-ground caves in Swansea. None of the individual gnomes read all the postings either, they just work together really well." - Linus Torvalds | |
<Reed> It is important to note that the primary reason the Roman Empire fail is that they had no concept of zero... thus they could not test the success or failure of their C programs. | |
<rain_work> note on a dorm fridge ... "To the person who ate the contents of the container labeled 'James' - warning, it was my biology experiment" | |
<KatanaJ> Note on a chem lab fridge- "This refrigerator is not explosion- proof". | |
<Knghtbrd> NOTE THAT THE ABOVE IS JUST AN OPINION AND SHOULD NOT BE TAKEN TO INCLUDE ANY MEASURE OF FACTUAL INFORMATION. THE SPEAKER DISCLAIMS EVERYTHING AND EVERYONE. DEAL WITH IT. | |
<Knghtbrd> "... you will more than likely see all kinds of compiler warnings scrolling by on the screen. These are normal and can be safely ignored." <LordHavoc> Knghtbrd: is that a note attached to some M$ code? <Knghtbrd> No, it's a note about a bunch of GNU stuff. | |
"You would do well not to imagine profundity," he said. "Anything that seems of momentous occasion should be dwelt upon as though it were of slight note. Conversely, trivialities must be attended to with the greatest of care. Because death is momentous, give it no thought; because victory is important, give it no thought; because the method of achievement and discovery is less momentous than the effect, dwell always upon the method. You will strengthen yourself in this way." -- Jessica Salmonson, "The Swordswoman" | |
Note that if I can get you to "su and say" something just by asking, you have a very serious security problem on your system and you should look into it. -- Paul Vixie, vixie-cron 3.0.1 installation notes | |
quit When the quit statement is read, the bc processor is terminated, regardless of where the quit state- ment is found. For example, "if (0 == 1) quit" will cause bc to terminate. -- seen in the manpage for "bc". Note the "if" statement's logic | |
/* * [...] Note that 120 sec is defined in the protocol as the maximum * possible RTT. I guess we'll have to use something other than TCP * to talk to the University of Mars. * PAWS allows us longer timeouts and large windows, so once implemented * ftp to mars will work nicely. */ -- from /usr/src/linux/net/inet/tcp.c, concerning RTT [round trip time] | |
Men's skin is different from women's skin. It is usually bigger, and it has more snakes tattooed on it. Also, if you examine a woman's skin very closely, inch by inch, starting at her shapely ankles, then gently tracing the slender curve of her calves, then moving up to her ... [EDITOR'S NOTE: To make room for news articles about important world events such as agriculture, we're going to delete the next few square feet of the woman's skin. Thank you.] ... until finally the two of you are lying there, spent, smoking your cigarettes, and suddenly it hits you: Human skin is actually made up of billions of tiny units of protoplasm, called "cells"! And what is even more interesting, the ones on the outside are all dying! This is a fact. Your skin is like an aggressive modern corporation, where the older veteran cells, who have finally worked their way to the top and obtained offices with nice views, are constantly being shoved out the window head first, without so much as a pension plan, by younger hotshot cells moving up from below. -- Dave Barry, "Saving Face" |