DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
program
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

The chat program is in public domain. This is not the GNU public license. If
it breaks then you get to keep both pieces.
(Copyright notice for the chat program)
`When you say "I wrote a program that crashed Windows", people just stare at
you blankly and say "Hey, I got those with the system, *for free*".'
(By Linus Torvalds)
Program load too heavy for processor to lift.
A debugged program is one for which you have not yet found the conditions
that make it fail.
                -- Jerry Ogdin
A language that doesn't have everything is actually easier to program
in than some that do.
                -- Dennis M. Ritchie
        A manager asked a programmer how long it would take him to finish the
program on which he was working.  "I will be finished tomorrow," the programmer
promptly replied.
        "I think you are being unrealistic," said the manager. "Truthfully,
how long will it take?"
        The programmer thought for a moment.  "I have some features that I wish
to add.  This will take at least two weeks," he finally said.
        "Even that is too much to expect," insisted the manager, "I will be
satisfied if you simply tell me when the program is complete."
        The programmer agreed to this.
        Several years later, the manager retired.  On the way to his
retirement lunch, he discovered the programmer asleep at his terminal.
He had been programming all night.
                -- Geoffrey James, "The Tao of Programming"
        A manager was about to be fired, but a programmer who worked for him
invented a new program that became popular and sold well.  As a result, the
manager retained his job.
        The manager tried to give the programmer a bonus, but the programmer
refused it, saying, "I wrote the program because I though it was an interesting
concept, and thus I expect no reward."
        The manager, upon hearing this, remarked, "This programmer, though he
holds a position of small esteem, understands well the proper duty of an
employee.  Lets promote him to the exalted position of management consultant!"
        But when told this, the programmer once more refused, saying, "I exist
so that I can program.  If I were promoted, I would do nothing but waste
everyone's time.  Can I go now?  I have a program that I'm working on."
                -- Geoffrey James, "The Tao of Programming"
        *** A NEW KIND OF PROGRAMMING ***

Do you want the instant respect that comes from being able to use technical
terms that nobody understands?  Do you want to strike fear and loathing into
the hearts of DP managers everywhere?  If so, then let the Famous Programmers'
School lead you on... into the world of professional computer programming.
They say a good programmer can write 20 lines of effective program per day.
With our unique training course, we'll show you how to write 20 lines of code
and lots more besides.  Our training course covers every programming language
in existence, and some that aren't.  You'll learn why the on/off switch for a
computer is so important, what the words *fatal error* mean, and who and what
you should blame when you make a mistake.

        Yes, I want the brochure describing this incredible offer.
        I enclose $1000 is small unmarked bills to cover the cost of
        postage and handling. (No live poultry, please.)

*** Our Slogan:  Top down programming for the masses. ***
        A novice asked the master: "I have a program that sometimes runs and
sometimes aborts.  I have followed the rules of programming, yet I am totally
baffled. What is the reason for this?"
        The master replied: "You are confused because you do not understand
the Tao.  Only a fool expects rational behavior from his fellow humans.  Why
do you expect it from a machine that humans have constructed?  Computers
simulate determinism; only the Tao is perfect.
        The rules of programming are transitory; only the Tao is eternal.
Therefore you must contemplate the Tao before you receive enlightenment."
        "But how will I know when I have received enlightenment?" asked the
novice.
        "Your program will then run correctly," replied the master.
                -- Geoffrey James, "The Tao of Programming"
        A novice programmer was once assigned to code a simple financial
package.
        The novice worked furiously for many days, but when his master
reviewed his program, he discovered that it contained a screen editor, a set
of generalized graphics routines, and artificial intelligence interface,
but not the slightest mention of anything financial.
        When the master asked about this, the novice became indignant.
"Don't be so impatient," he said, "I'll put the financial stuff in eventually."
                -- Geoffrey James, "The Tao of Programming"
        A program should be light and agile, its subroutines connected like a
strings of pearls.  The spirit and intent of the program should be retained
throughout.  There should be neither too little nor too much, neither needless
loops nor useless variables, neither lack of structure nor overwhelming
rigidity.
        A program should follow the 'Law of Least Astonishment'.  What is this
law?  It is simply that the program should always respond to the user in the
way that astonishes him least.
        A program, no matter how complex, should act as a single unit.  The
program should be directed by the logic within rather than by outward
appearances.
        If the program fails in these requirements, it will be in a state of
disorder and confusion.  The only way to correct this is to rewrite the
program.
                -- Geoffrey James, "The Tao of Programming"
        After sifting through the overwritten remaining blocks of Luke's home
directory, Luke and PDP-1 sped away from /u/lars, across the surface of the
Winchester riding Luke's flying read/write head.  PDP-1 had Luke stop at the
edge of the cylinder overlooking /usr/spool/uucp.
        "Unix-to-Unix Copy Program;" said PDP-1.  "You will never find a more
wretched hive of bugs and flamers.  We must be cautious."
                -- DECWARS
Any given program will expand to fill available memory.
Any given program, when running, is obsolete.
Any program which runs right is obsolete.
Around computers it is difficult to find the correct unit of time to
measure progress.  Some cathedrals took a century to complete.  Can you
imagine the grandeur and scope of a program that would take as long?
                -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
As part of an ongoing effort to keep you, the Fortune reader, abreast of
the valuable information the daily crosses the USENET, Fortune presents:

News articles that answer *your* questions, #1:

        Newsgroups: comp.sources.d
        Subject: how do I run C code received from sources
        Keywords: C sources
        Distribution: na

        I do not know how to run the C programs that are posted in the
        sources newsgroup.  I save the files, edit them to remove the
        headers, and change the mode so that they are executable, but I
        cannot get them to run.  (I have never written a C program before.)

        Must they be compiled?  With what compiler?  How do I do this?  If
        I compile them, is an object code file generated or must I generate
        it explicitly with the > character?  Is there something else that
        must be done?
        Cosmotronic Software Unlimited Inc. does not warrant that the
functions contained in the program will meet your requirements or that
the operation of the program will be uninterrupted or error-free.
        However, Cosmotronic Software Unlimited Inc. warrants the
diskette(s) on which the program is furnished to be of black color and
square shape under normal use for a period of ninety (90) days from the
date of purchase.
        NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS
DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING
ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR
CONSEQUENTIAL DAMAGES.
                -- Horstmann Software Design, the "ChiWriter" user manual
Do not simplify the design of a program if a way can be found to make
it complex and wonderful.
        *** DO YOU HAVE A RESTLESS URGE TO PROGRAM? ***
Do you want the instant respect that comes from being able to use technical
terms that nobody understands?  Do you want to strike fear and loathing into
the hearts of DP managers everywhere?  If so, then let the Famous Programmers'
School lead you on... into the world of professional computer programming.

        *** IS PROGRAMMING FOR YOU? ***
Programming is not for everyone.  But, if you have the desire to learn, we can
help you get started.  All you need is the Famous Programmers' Course and
enough money to keep those lessons coming month after month.

        *** TAKE OUR FREE APTITUDE TEST ***
To help determine if you are qualified to be a programmer, take a moment to
try this simple test:
        (1) Write down the numbers from zero to nine and the first six letters
                of the alphabet (Hint: 0123456789ABCDEF).
        (2) Whose picture is on the back of a twenty-dollar bill?
        (3) What is the state capital of Idaho?
If you managed to read all three questions without wondering why we asked
them, you may have a future as a computer programmer.
Every program has at least one bug and can be shortened by at least one
instruction -- from which, by induction, one can deduce that every
program can be reduced to one instruction which doesn't work.
Every program is a part of some other program, and rarely fits.
Evolution is a million line computer program falling into place by accident.
I went on to test the program in every way I could devise.  I strained
it to expose its weaknesses.  I ran it for high-mass stars and low-mass
stars, for stars born exceedingly hot and those born relatively cold.
I ran it assuming the superfluid currents beneath the crust to be
absent -- not because I wanted to know the answer, but because I had
developed an intuitive feel for the answer in this particular case.
Finally I got a run in which the computer showed the pulsar's
temperature to be less than absolute zero.  I had found an error.  I
chased down the error and fixed it.  Now I had improved the program to
the point where it would not run at all.
                -- George Greenstein, "Frozen Star: Of Pulsars, Black
                   Holes and the Fate of Stars"
If a listener nods his head when you're explaining your program, wake him up.
If God had intended Man to program, we'd be born with serial I/O ports.
        If the Tao is great, then the operating system is great.  If the
operating system is great, then the compiler is great.  If the compiler
is great, then the application is great.  If the application is great, then
the user is pleased and there is harmony in the world.
        The Tao gave birth to machine language.  Machine language gave birth
to the assembler.
        The assembler gave birth to the compiler.  Now there are ten thousand
languages.
        Each language has its purpose, however humble.  Each language
expresses the Yin and Yang of software.  Each language has its place within
the Tao.
        But do not program in COBOL if you can avoid it.
                -- Geoffrey James, "The Tao of Programming"
If you ever want to have a lot of fun, I recommend that you go off and program
an imbedded system.  The salient characteristic of an imbedded system is that
it cannot be allowed to get into a state from which only direct intervention
will suffice to remove it.  An imbedded system can't permanently trust anything
it hears from the outside world.  It must sniff around, adapt, consider, sniff
around, and adapt again.  I'm not talking about ordinary modular programming
carefulness here.  No.  Programming an imbedded system calls for undiluted
raging maniacal paranoia.  For example, our ethernet front ends need to know
what network number they are on so that they can address and route PUPs
properly.  How do you find out what your network number is?  Easy, you ask a
gateway.  Gateways are required by definition to know their correct network
numbers.  Once you've got your network number, you start using it and before
you can blink you've got it wired into fifteen different sockets spread all
over creation.  Now what happens when the panic-stricken operator realizes he
was running the wrong version of the gateway which was giving out the wrong
network number?  Never supposed to happen.  Tough.  Supposing that your
software discovers that the gateway is now giving out a different network
number than before, what's it supposed to do about it?  This is not discussed
in the protocol document.  Never supposed to happen.  Tough.  I think you
get my drift.
In every non-trivial program there is at least one bug.
In the long run, every program becomes rococco, and then rubble.
                -- Alan Perlis
>>> Internal error in fortune program:
>>>        fnum=2987  n=45  flag=1  goose_level=-232323
>>> Please write down these values and notify fortune program administrator.
        It is a period of system war.  User programs, striking from a hidden
directory, have won their first victory against the evil Administrative Empire.
During the battle, User spies managed to steal secret source code to the
Empire's ultimate program: the Are-Em Star, a privileged root program with
enough power to destroy an entire file structure.  Pursued by the Empire's
sinister audit trail, Princess _LPA0 races ~ aboard her shell script,
custodian of the stolen listings that could save her people, and restore
freedom and games to the network...
                -- DECWARS
It is a very humbling experience to make a multimillion-dollar mistake, but
it is also very memorable.  I vividly recall the night we decided how to
organize the actual writing of external specifications for OS/360.  The
manager of architecture, the manager of control program implementation, and
I were threshing out the plan, schedule, and division of responsibilities.
        The architecture manager had 10 good men.  He asserted that they
could write the specifications and do it right.  It would take ten months,
three more than the schedule allowed.
        The control program manager had 150 men.  He asserted that they
could prepare the specifications, with the architecture team coordinating;
it would be well-done and practical, and he could do it on schedule.
Furthermore, if the architecture team did it, his 150 men would sit twiddling
their thumbs for ten months.
        To this the architecture manager responded that if I gave the control
program team the responsibility, the result would not in fact be on time,
but would also be three months late, and of much lower quality.  I did, and
it was.  He was right on both counts.  Moreover, the lack of conceptual
integrity made the system far more costly to build and change, and I would
estimate that it added a year to debugging time.
                -- Frederick Brooks Jr., "The Mythical Man Month"
It is against the grain of modern education to teach children to program.
What fun is there in making plans, acquiring discipline in organizing
thoughts, devoting attention to detail, and learning to be self-critical?
                -- Alan Perlis
It is easier to change the specification to fit the program than vice versa.
It is easier to write an incorrect program than understand a correct one.
... Jesus cried with a loud voice: Lazarus, come forth; the bug hath been
found and thy program runneth.  And he that was dead came forth...
                -- John 11:43-44 [version 2.0?]
LOGO for the Dead

LOGO for the Dead lets you continue your computing activities from
"The Other Side."

The package includes a unique telecommunications feature which lets you
turn your TRS-80 into an electronic Ouija board.  Then, using Logo's
graphics capabilities, you can work with a friend or relative on this
side of the Great Beyond to write programs.  The software requires that
your body be hardwired to an analog-to-digital converter, which is then
interfaced to your computer.  A special terminal (very terminal) program
lets you talk with the users through Deadnet, an EBBS (Ectoplasmic
Bulletin Board System).

LOGO for the Dead is available for 10 percent of your estate
from NecroSoft inc., 6502 Charnelhouse Blvd., Cleveland, OH 44101.
                -- '80 Microcomputing
No proper program contains an indication which as an operator-applied
occurrence identifies an operator-defining occurrence which as an
indication-applied occurrence identifies an indication-defining occurrence
different from the one identified by the given indication as an
indication-applied occurrence.
                -- ALGOL 68 Report
        Now she speaks rapidly.  "Do you know *why* you want to program?"
        He shakes his head.  He hasn't the faintest idea.
        "For the sheer *joy* of programming!" she cries triumphantly.  
"The joy of the parent, the artist, the craftsman.  "You take a program,
born weak and impotent as a dimly-realized solution.  You nurture the
program and guide it down the right path, building, watching it grow ever
stronger.  Sometimes you paint with tiny strokes, a keystroke added here,
a keystroke changed there."  She sweeps her arm in a wide arc.  "And other
times you savage whole *blocks* of code, ripping out the program's very
*essence*, then beginning anew.  But always building, creating, filling the
program with your own personal stamp, your own quirks and nuances.  Watching
the program grow stronger, patching it when it crashes, until finally it can
stand alone -- proud, powerful, and perfect.  This is the programmer's finest
hour!"  Softly at first, then louder, he hears the strains of a Sousa march.
"This ... this is your canvas! your clay!  Go forth and create a masterwork!"
Okay, Okay -- I admit it.  You didn't change that program that worked
just a little while ago; I inserted some random characters into the
executable.  Please forgive me.  You can recover the file by typing in
the code over again, since I also removed the source.
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the remaining
errors by providing for recovery from them.  An interesting footnote to this
design is that now a system failure can usually be considered to be the
result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.
                -- A.L. Scherr, "Functional Structure of IBM Virtual Storage
                   Operating Systems, Part II: OS/VS-2 Concepts and
                   Philosophies," IBM Systems Journal, Vol. 12, No. 4.
        Price Wang's programmer was coding software.  His fingers danced upon
the keyboard.  The program compiled without an error message, and the program
ran like a gentle wind.
        Excellent!" the Price exclaimed, "Your technique is faultless!"
        "Technique?" said the programmer, turning from his terminal, "What I
follow is the Tao -- beyond all technique.  When I first began to program I
would see before me the whole program in one mass.  After three years I no
longer saw this mass.  Instead, I used subroutines.  But now I see nothing.
My whole being exists in a formless void.  My senses are idle.  My spirit,
free to work without a plan, follows its own instinct.  In short, my program
writes itself.  True, sometimes there are difficult problems.  I see them
coming, I slow down, I watch silently.  Then I change a single line of code
and the difficulties vanish like puffs of idle smoke.  I then compile the
program.  I sit still and let the joy of the work fill my being.  I close my
eyes for a moment and then log off."
        Price Wang said, "Would that all of my programmers were as wise!"
                -- Geoffrey James, "The Tao of Programming"
Proposed Additions to the PDP-11 Instruction Set:

PI        Punch Invalid
POPI        Punch Operator Immediately
PVLC        Punch Variable Length Card
RASC        Read And Shred Card
RPM        Read Programmers Mind
RSSC        reduce speed, step carefully  (for improved accuracy)
RTAB        Rewind tape and break
RWDSK        rewind disk
RWOC        Read Writing On Card
SCRBL        scribble to disk  - faster than a write
SLC        Search for Lost Chord
SPSW        Scramble Program Status Word
SRSD        Seek Record and Scar Disk
STROM        Store in Read Only Memory
TDB        Transfer and Drop Bit
WBT        Water Binary Tree
Real computer scientists admire ADA for its overwhelming aesthetic
value but they find it difficult to actually program in it, as it is
much too large to implement.  Most computer scientists don't notice
this because they are still arguing over what else to add to ADA.
Real computer scientists don't program in assembler.  They don't write
in anything less portable than a number two pencil.
Real Users never know what they want, but they always know when your program
doesn't deliver it.
                                SEMINAR ANNOUNCEMENT

Title:                Are Frogs Turing Compatible?
Speaker:        Don "The Lion" Knuth

                                ABSTRACT
        Several researchers at the University of Louisiana have been studying
the computing power of various amphibians, frogs in particular.  The problem
of frog computability has become a critical issue that ranges across all areas
of computer science.  It has been shown that anything computable by an amphi-
bian community in a fixed-size pond is computable by a frog in the same-size
pond -- that is to say, frogs are Pond-space complete.  We will show that
there is a log-space, polywog-time reduction from any Turing machine program
to a frog.  We will suggest these represent a proper subset of frog-computable
functions.
        This is not just a let's-see-how-far-those-frogs-can-jump seminar.
This is only for hardcore amphibian-computation people and their colleagues.
        Refreshments will be served.  Music will be played.
        Several students were asked to prove that all odd integers are prime.
        The first student to try to do this was a math student.  "Hmmm...
Well, 1 is prime, 3 is prime, 5 is prime, and by induction, we have that all
the odd integers are prime."
        The second student to try was a man of physics who commented, "I'm not
sure of the validity of your proof, but I think I'll try to prove it by
experiment."  He continues, "Well, 1 is prime, 3 is prime, 5 is prime, 7 is
prime, 9 is...  uh, 9 is... uh, 9 is an experimental error, 11 is prime, 13
is prime...  Well, it seems that you're right."
        The third student to try it was the engineering student, who responded,
"Well, to be honest, actually, I'm not sure of your answer either.  Let's
see...  1 is prime, 3 is prime, 5 is prime, 7 is prime, 9 is... uh, 9 is...
well, if you approximate, 9 is prime, 11 is prime, 13 is prime...  Well, it
does seem right."
        Not to be outdone, the computer science student comes along and says
"Well, you two sort've got the right idea, but you'll end up taking too long!
I've just whipped up a program to REALLY go and prove it."  He goes over to
his terminal and runs his program.  Reading the output on the screen he says,
"1 is prime, 1 is prime, 1 is prime, 1 is prime..."
        *** STUDENT SUCCESSES ***

Many of our students have gone on to achieve great success in all fields of
programming.  One former student developed the concept of the personalized
form letter.  Does the phrase, "Dear Mr.(insert name), You may already be a
winner!," sound familiar?  Another student writes "After only five lessons I
sold a "My Most Unforgettable Program" article to Corrosive Computing magazine.
Another of our graduates writes, "I recently completed a database-management
program for my department manager.  My program touched him so deeply that he
was speechless.  He told me later that he had never seen such a program in
his entire career.  Thank you, Famous Programmers' school; only you could
have made this possible."  Send for our introductory brochure which explains
in vague detail the operation of the Famous Programmers' School, and you'll
be eligible to win a possible chance to enter a drawing, the winner of which
can vie for a set of free steak knives.  If you don't do it now, you'll hate
yourself in the morning.
The connection between the language in which we think/program and the problems
and solutions we can imagine is very close.  For this reason restricting
language features with the intent of eliminating programmer errors is at best
dangerous.
                -- Bjarne Stroustrup
The flow chart is a most thoroughly oversold piece of program documentation.
                -- Frederick Brooks, "The Mythical Man Month"
The Gurus of Unix Meeting of Minds (GUMM) takes place Wednesday, April
1, 2076 (check THAT in your perpetual calendar program), 14 feet above
the ground directly in front of the Milpitas Gumps.  Members will grep
each other by the hand (after intro), yacc a lot, smoke filtered
chroots in pipes, chown with forks, use the wc (unless uuclean), fseek
nice zombie processes, strip, and sleep, but not, we hope, od.  Three
days will be devoted to discussion of the ramifications of whodo.  Two
seconds have been allotted for a complete rundown of all the user-
friendly features of Unix.  Seminars include "Everything You Know is
Wrong", led by Tom Kempson, "Batman or Cat:man?" led by Richie Dennis
"cc C?  Si!  Si!" led by Kerwin Bernighan, and "Document Unix, Are You
Kidding?" led by Jan Yeats.  No Reader Service No. is necessary because
all GUGUs (Gurus of Unix Group of Users) already know everything we
could tell them.
                -- "Get GUMMed," Dr. Dobb's Journal, June '84
        THE LESSER-KNOWN PROGRAMMING LANGUAGES #13: SLOBOL

SLOBOL is best known for the speed, or lack of it, of its compiler.
Although many compilers allow you to take a coffee break while they
compile, SLOBOL compilers allow you to travel to Bolivia to pick the
coffee.  Forty-three programmers are known to have died of boredom
sitting at their terminals while waiting for a SLOBOL program to
compile.  Weary SLOBOL programmers often turn to a related (but
infinitely faster) language, COCAINE.
        THE LESSER-KNOWN PROGRAMMING LANGUAGES #14 -- VALGOL

        VALGOL is enjoying a dramatic surge of popularity across the
industry.  VALGOL commands include REALLY, LIKE, WELL, and Y*KNOW.
Variables are assigned with the =LIKE and =TOTALLY operators.  Other
operators include the "California booleans", AX and NOWAY.  Loops are
accomplished with the FOR SURE construct.  A simple example:

        LIKE, Y*KNOW(I MEAN)START
        IF PIZZA        =LIKE BITCHEN AND
        GUY                =LIKE TUBULAR AND
        VALLEY GIRL        =LIKE GRODY**MAX(FERSURE)**2
        THEN
                FOR I =LIKE 1 TO OH*MAYBE 100
                        DO*WAH - (DITTY**2); BARF(I)=TOTALLY GROSS(OUT)
                SURE
        LIKE, BAG THIS PROGRAM; REALLY; LIKE TOTALLY(Y*KNOW); IM*SURE
        GOTO THE MALL

        VALGOL is also characterized by its unfriendly error messages.  For
example, when the user makes a syntax error, the interpreter displays the
message GAG ME WITH A SPOON!  A successful compile may be termed MAXIMALLY
AWESOME!
        The Magician of the Ivory Tower brought his latest invention for the
master programmer to examine.  The magician wheeled a large black box into the
master's office while the master waited in silence.
        "This is an integrated, distributed, general-purpose workstation,"
began the magician, "ergonomically designed with a proprietary operating
system, sixth generation languages, and multiple state of the art user
interfaces.  It took my assistants several hundred man years to construct.
Is it not amazing?"
        The master raised his eyebrows slightly. "It is indeed amazing," he
said.
        "Corporate Headquarters has commanded," continued the magician, "that
everyone use this workstation as a platform for new programs.  Do you agree
to this?"
        "Certainly," replied the master, "I will have it transported to the
data center immediately!"  And the magician returned to his tower, well
pleased.
        Several days later, a novice wandered into the office of the master
programmer and said, "I cannot find the listing for my new program.  Do
you know where it might be?"
        "Yes," replied the master, "the listings are stacked on the platform
in the data center."
                -- Geoffrey James, "The Tao of Programming"
        The master programmer moves from program to program without fear.  No
change in management can harm him.  He will not be fired, even if the project
is canceled. Why is this?  He is filled with the Tao.
                -- Geoffrey James, "The Tao of Programming"
The primary purpose of the DATA statement is to give names to constants;
instead of referring to pi as 3.141592653589793 at every appearance, the
variable PI can be given that value with a DATA statement and used instead
of the longer form of the constant.  This also simplifies modifying the
program, should the value of pi change.
                -- FORTRAN manual for Xerox Computers
        The problem with engineers is that they tend to cheat in order to
get results.
        The problem with mathematicians is that they tend to work on toy
problems in order to get results.
        The problem with program verifiers is that they tend to cheat at
toy problems in order to get results.
The program isn't debugged until the last user is dead.
The value of a program is proportional to the weight of its output.
        The wise programmer is told about the Tao and follows it.  The average
programmer is told about the Tao and searches for it.  The foolish programmer
is told about the Tao and laughs at it.  If it were not for laughter, there
would be no Tao.
        The highest sounds are the hardest to hear.  Going forward is a way to
retreat.  Greater talent shows itself late in life.  Even a perfect program
still has bugs.
                -- Geoffrey James, "The Tao of Programming"
There is no distinction between any AI program and some existent game.
This quote is taken from the Diamondback, the University of Maryland
student newspaper, of Tuesday, 3/10/87.

        One disadvantage of the Univac system is that it does not use
        Unix, a recently developed program which translates from one
        computer language to another and has a built-in editing system
        which identifies errors in the original program.
Those parts of the system that you can hit with a hammer (not advised)
are called hardware; those program instructions that you can only curse
at are called software.
                -- Levitating Trains and Kamikaze Genes: Technological
                   Literacy for the 1990's.
Thus spake the master programmer:
        "A well-written program is its own heaven; a poorly-written program
is its own hell."
                -- Geoffrey James, "The Tao of Programming"
Thus spake the master programmer:
        "Though a program be but three lines long, someday it will have to
        be maintained."
                -- Geoffrey James, "The Tao of Programming"
Thus spake the master programmer:
        "When a program is being tested, it is too late to make design changes."
                -- Geoffrey James, "The Tao of Programming"
Thus spake the master programmer:
        "You can demonstrate a program for a corporate executive, but you
        can't make him computer literate."
                -- Geoffrey James, "The Tao of Programming"
To understand a program you must become both the machine and the program.
"We are on the verge: Today our program proved Fermat's next-to-last theorem."
                -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
"You can't make a program without broken egos."
Your program is sick!  Shoot it and put it out of its memory.
The connection between the language in which we think/program and the problems
and solutions we can imagine is very close.  For this reason restricting
language features with the intent of eliminating programmer errors is at best
dangerous.
- Bjarne Stroustrup in "The C++ Programming Language"
"Can you program?"  "Well, I'm literate, if that's what you mean!"
It is a very humbling experience to make a multimillion-dollar mistake, but it
is also very memorable.  I vividly recall the night we decided how to organize
the actual writing of external specifications for OS/360.  The manager of
architecture, the manager of control program implementation, and I were
threshing out the plan, schedule, and division of responsibilities.

The architecture manager had 10 good men.  He asserted that they could write
the specifications and do it right.  It would take ten months, three more
than the schedule allowed.

The control program manager had 150 men.  He asserted that they could prepare
the specifications, with the architecture team coordinating; it would be
well-done and practical, and he could do it on schedule.  Futhermore, if
the architecture team did it, his 150 men would sit twiddling their thumbs
for ten months.

To this the architecture manager responded that if I gave the control program
team the responsibility, the result would not in fact be on time, but would
also be three months late, and of much lower quality.  I did, and it was.  He
was right on both counts.  Moreover, the lack of conceptual integrity made
the system far more costly to build and change, and I would estimate that it
added a year to debugging time.
- Frederick Brooks Jr., "The Mythical Man Month"
Overall, the philosophy is to attack the availability problem from two
complementary directions:  to reduce the number of software errors through
rigorous testing of running systems, and to reduce the effect of the
remaining errors by providing for recovery from them.  An interesting footnote
to this design is that now a system failure can usually be considered to be
the result of two program errors:  the first, in the program that started the
problem; the second, in the recovery routine that could not protect the
system.  -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating
Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal,
Vol. 12, No. 4, 1973, pp. 382-400
To be is to program.
To program is to be.
I program, therefore I am.
Operating-system software is the program that orchestrates all the basic
functions of a computer.
- The Wall Street Journal, Tuesday, September 15, 1987, page 40
The typical page layout program is nothing more than an electronic
light table for cutting and pasting documents.
"Largely because it is so tangible and exciting a program and as such will
serve to keep alive the interest and enthusiasm of the whole spectrum of
society...It is justified because...the program can give a sense of shared
adventure and achievement to the society at large."
- Dr. Colin S. Pittendrigh, in "The History of Manned Space Flight"
The idea of man leaving this earth and flying to another celestial body and
landing there and stepping out and walking over that body has a fascination
and a driving force that can get the country to a level of energy, ambition,
and will that I do not see in any other undertaking.  I think if we are
honest with ourselves, we must admit that we needed that impetus extremely
strongly.  I sincerely believe that the space program, with its manned
landing on the moon, if wisely executed, will become the spearhead for a
broad front of courageous and energetic activities in all the fields of
endeavour of the human mind - activities which could not be carried out
except in a mental climate of ambition and confidence which such a spearhead
can give.
- Dr. Martin Schwarzschild, 1962, in "The History of Manned Space Flight"
"Unibus timeout fatal trap program lost sorry"
- An error message printed by DEC's RSTS operating system for the PDP-11
"There is no statute of limitations on stupidity."
-- Randomly produced by a computer program called Markov3.
The rule on staying alive as a program manager is to give 'em a number or
give 'em a date, but never give 'em both at once.
This is, of course, totally uninformed specualation that I engage in to help
support my bias against such meddling... but there you have it.
-- Peter da Silva, speculating about why a computer program that had been
changed to do something he didn't approve of, didn't work
"Just think of a computer as hardware you can program."
-- Nigel de la Tierre
"Okay," Bobby said, getting the hang of it, "then what's the matrix?  If
she's a deck, and Danbala's a program, what's cyberspace?"
  "The world," Lucas said.
-- William Gibson, _Count Zero_
"In the long run, every program becomes rococo, and then rubble."
-- Alan Perlis
How many Unix hacks does it take to change a light bulb?
   Let's see, can you use a shell script for that or does it need a C program?
A student asked the master for help... does this program run from the
Workbench? The master grabbed the mouse and pointed to an icon. "What is
this?" he asked. The student replied "That's the mouse". The master pressed
control-Amiga-Amiga and hit the student on the head with the Amiga ROM Kernel
Manual.
-- Amiga Zen Master Peter da Silva
On the subject of C program indentation:
"In My Egotistical Opinion, most people's C programs should be indented
six feet downward and covered with dirt."
-- Blair P. Houghton
"Though a program be but three lines long,
someday it will have to be maintained."
-- The Tao of Programming
"(The Chief Programmer) personally defines the functional and performance
specifications, designs the program, codes it, tests it, and writes its
documentation... He needs great talent, ten years experience and
considerable systems and applications knowledge, whether in applied
mathematics, business data handling, or whatever."
-- Fred P. Brooks, _The Mythical Man Month_
Bagbiter:
        1. n.; Equipment or program that fails, usually intermittently.  2.
adj.: Failing hardware or software.  "This bagbiting system won't let me get
out of spacewar." Usage: verges on obscenity.  Grammatically separable; one
may speak of "biting the bag".  Synonyms: LOSER, LOSING, CRETINOUS,
BLETCHEROUS, BARFUCIOUS, CHOMPER, CHOMPING.
Bug, n.:
        An aspect of a computer program which exists because the
        programmer was thinking about Jumbo Jacks or stock options when s/he
        wrote the program.

Fortunately, the second-to-last bug has just been fixed.
                -- Ray Simard
bug, n:
        An elusive creature living in a program that makes it incorrect.
        The activity of "debugging", or removing bugs from a program, ends
        when people get tired of doing it, not when the bugs are removed.
                -- "Datamation", January 15, 1984
comment:
        A superfluous element of a source program included so the
        programmer can remember what the hell it was he was doing
        six months later.  Only the weak-minded need them, according
        to those who think they aren't.
Cursor, n.:
        One whose program will not run.
                -- Robb Russon
Every program has (at least) two purposes:
        the one for which it was written and another for which it wasn't.
feature, n:
        A surprising property of a program.  Occasionaly documented.  To
        call a property a feature sometimes means the author did not
        consider that case, and the program makes an unexpected, though
        not necessarily wrong response.  See BUG.  "That's not a bug, it's
        a feature!"  A bug can be changed to a feature by documenting it.
incentive program, n.:
        The system of long and short-term rewards that a corporation uses
        to motivate its people.  Still, despite all the experimentation with
        profit sharing, stock options, and the like, the most effective
        incentive program to date seems to be "Do a good job and you get to
        keep it."
Laws of Computer Programming:
        (1) Any given program, when running, is obsolete.
        (2) Any given program costs more and takes longer.
        (3) If a program is useful, it will have to be changed.
        (4) If a program is useless, it will have to be documented.
        (5) Any given program will expand to fill all available memory.
        (6) The value of a program is proportional the weight of its output.
        (7) Program complexity grows until it exceeds the capability of
                the programmer who must maintain it.
Main's Law:
        For every action there is an equal and opposite government program.
On the subject of C program indentation:
        "In My Egotistical Opinion, most people's C programs should be
        indented six feet downward and covered with dirt."
                -- Blair P. Houghton
Priority:
        A statement of the importance of a user or a program.  Often
        expressed as a relative priority, indicating that the user doesn't
        care when the work is completed so long as he is treated less
        badly than someone else.
program, n.:
        A magic spell cast over a computer allowing it to turn one's input
        into error messages.  tr.v. To engage in a pastime similar to banging
        one's head against a wall, but with fewer opportunities for reward.
program, n.:
        Any task that can't be completed in one telephone call or one
        day.  Once a task is defined as a program ("training program,"
        "sales program," or "marketing program"), its implementation
        always justifies hiring at least three more people.
The Briggs-Chase Law of Program Development:
        To determine how long it will take to write and debug a
        program, take your best estimate, multiply that by two, add
        one, and convert to the next higher units.
The First Rule of Program Optimization:
        Don't do it.

The Second Rule of Program Optimization (for experts only!):
        Don't do it yet.
                -- Michael Jackson
The Illiterati Programus Canto 1:
        A program is a lot like a nose: Sometimes it runs, and
        sometimes it blows.
University, n.:
        Like a software house, except the software's free, and it's usable,
        and it works, and if it breaks they'll quickly tell you how to fix
        it, and ...

        [Okay, okay, I'll leave it in, but I think you're destroying
         the credibility of the entire fortune program.  Ed.]
Q:        How many journalists does it take to screw in a light bulb?
A:        Three.  One to report it as an inspired government program to bring
        light to the people, one to report it as a diabolical government plot
        to deprive the poor of darkness, and one to win a Pulitzer prize for
        reporting that Electric Company hired a light bulb-assassin to break
        the bulb in the first place.
Three Midwesterners, a Kansan, a Missourian and an Iowan,
all appearing on a quiz program, were asked to complete this sentence:
"Old MacDonald had a . . ."

        "Old MacDonald had a carburetor," answered the Kansan.
        "Sorry, that's wrong," the game show host said.
        "Old MacDonald had a free brake alignment down at the
                service station," said the Missourian.
        "Wrong."
        "Old MacDonald had a farm," said the Iowan.
        "CORRECT!" shouts the quizmaster.  "Now for $100,000, spell 'farm.'"
        "Easy," said the Iowan. "E-I-E-I-O."
Why don't you fix your little problem... and light this candle?
                -- Alan Shepherd, the first man into space, Gemini program
        "Yo, Mike!"
        "Yeah, Gabe?"
        "We got a problem down on Earth.  In Utah."
        "I thought you fixed that last century!"
        "No, no, not that.  Someone's found a security problem in the physics
program.  They're getting energy out of nowhere."
        "Blessit!  Lemme look...  <tappity clickity tappity>  Hey, it's
there all right!  OK, just a sec...  <tappity clickity tap... save... compile>
There, that ought to patch it.  Dist it out, wouldja?"
                -- Cold Fusion, 1989
Eleanor Rigby
        Sits at the keyboard
        And waits for a line on the screen
Lives in a dream
Waits for a signal
        Finding some code
        That will make the machine do some more.
What is it for?

All the lonely users, where do they all come from?
All the lonely users, why does it take so long?

Hacker MacKensie
Writing the code for a program that no one will run
It's nearly done
Look at him working, fixing the bugs in the night when there's
        nobody there.
What does he care?

All the lonely users, where do they all come from?
All the lonely users, why does it take so long?
Ah, look at all the lonely users.
Ah, look at all the lonely users.
God rest ye CS students now,                The bearings on the drum are gone,
Let nothing you dismay.                        The disk is wobbling, too.
The VAX is down and won't be up,        We've found a bug in Lisp, and Algol
Until the first of May.                        Can't tell false from true.
The program that was due this morn,        And now we find that we can't get
Won't be postponed, they say.                At Berkeley's 4.2.
(chorus)                                (chorus)

We've just received a call from DEC,        And now some cheery news for you,
They'll send without delay                The network's also dead,
A monitor called RSuX                        We'll have to print your files on
It takes nine hundred K.                The line printer instead.
The staff committed suicide,                The turnaround time's nineteen weeks.
We'll bury them today.                        And only cards are read.
(chorus)                                (chorus)

And now we'd like to say to you                CHORUS:        Oh, tidings of comfort and joy,
Before we go away,                                Comfort and joy,
We hope the news we've brought to you                Oh, tidings of comfort and joy.
Won't ruin your whole day.
You've got another program due, tomorrow, by the way.
(chorus)
                -- to God Rest Ye Merry Gentlemen
I gave my love an Apple, that had no core;
I gave my love a building, that had no floor;
I wrote my love a program, that had no end;
I gave my love an upgrade, with no cryin'.

How can there be an Apple, that has no core?
How can there be a building, that has no floor?
How can there be a program, that has no end?
How can there be an upgrade, with no cryin'?

An Apple's MOS memory don't use no core!
A building that's perfect, it has no flaw!
A program with GOTOs, it has no end!
I lied about the upgrade, with no cryin'!
"No program is perfect,"
They said with a shrug.
"The customer's happy--
What's one little bug?"

But he was determined,                        Then change two, then three more,
The others went home.                        As year followed year.
He dug out the flow chart                And strangers would comment,
Deserted, alone.                        "Is that guy still here?"

Night passed into morning.                He died at the console
The room was cluttered                        Of hunger and thirst
With core dumps, source listings.        Next day he was buried
"I'm close," he muttered.                Face down, nine edge first.

Chain smoking, cold coffee,                And his wife through her tears
Logic, deduction.                        Accepted his fate.
"I've got it!" he cried,                Said "He's not really gone,
"Just change one instruction."                He's just working late."
                -- The Perfect Programmer
'Twas the night before crisis, and all through the house,
        Not a program was working not even a browse.
The programmers were wrung out too mindless to care,
        Knowing chances of cutover hadn't a prayer.
The users were nestled all snug in their beds,
        While visions of inquiries danced in their heads.
When out in the lobby there arose such a clatter,
        I sprang from my tube to see what was the matter.
And what to my wondering eyes should appear,
        But a Super Programmer, oblivious to fear.
More rapid than eagles, his programs they came,
        And he whistled and shouted and called them by name;
On Update!  On Add!  On Inquiry!  On Delete!
        On Batch Jobs!  On Closing!  On Functions Complete!
His eyes were glazed over, his fingers were lean,
        From Weekends and nights in front of a screen.
A wink of his eye, and a twist of his head,
        Soon gave me to know I had nothing to dread...
                -- "Twas the Night before Crisis"
Well, my terminal's locked up, and I ain't got any Mail,
        And I can't recall the last time that my program didn't fail;
I've got stacks in my structs, I've got arrays in my queues,
        I've got the : Segmentation violation -- Core dumped blues.

If you think that it's nice that you get what you C,
        Then go : illogical statement with your whole family,
'Cause the Supreme Court ain't the only place with : Bus error views.
        I've got the : Segmentation violation -- Core dumped blues.

On a PDP-11, life should be a breeze,
        But with VAXen in the house even magnetic tapes would freeze.
Now you might think that unlike VAXen I'd know who I abuse,
        I've got the : Segmentation violation -- Core dumped blues.
                -- Core Dumped Blues
HARVARD:
Quarterback:
        Sophomore Dave Strewzinski... likes to pass.  And pass he does, with
a record 86 attempts (three completions) in 87 plays....  Though Strewzinksi
has so far failed to score any points for the Crimson, his jackrabbit speed
has made him the least sacked quarterback in the Ivy league.
Wide Receiver:
        The other directional signal in Harvard's offensive machine is senior
Phil Yip, who is very fast.  Yip is so fast that he has set a record for being
fast.  Expect to see Yip elude all pursuers and make it into the endzone five
or six times, his average for a game.  Yip, nicknamed "fumblefingers" and "you
asshole" by his teammates, hopes to carry the ball with him at least one of
those times.
YALE:
Defense:
        On the defensive side, Yale boasts the stingiest line in the Ivies.
Primarily responsible are seniors Izzy "Shylock" Bloomberg and Myron
Finklestein, the tightest ends in recent Eli history.  Also contributing to
the powerful defense is junior tackle Angus MacWhirter, a Scotsman who rounds
out the offensive ethnic joke.  Look for these three to shut down the opening
coin toss.
                -- Harvard Lampoon 1988 Program Parody, distributed at The Game
=======================================================================
||                                                                     ||
|| The FORTUNE-COOKIE program is soon to be a Major Motion Picture!  ||
||           Watch for it at a theater near you next summer!             ||
||                                                                     ||
=======================================================================
        Francis Ford Coppola presents a George Lucas Production:
                        "Fortune Cookie"
        Directed by Steven Spielberg.
        Starring  Harrison Ford  Bette Midler  Marlon Brando
                  Christopher Reeves  Marilyn Chambers
                  and Bob Hope as "The Waiter".
        Costumes Designed by Pierre Cardin.
        Special Effects by Timothy Leary.
        Read the Warner paperback!
        Invoke the Unix program!
        Soundtrack on XTC Records.
        In 70mm and Dolby Stereo at selected theaters and terminal
                centers.
By necessity, by proclivity, and by delight, we all quote.  In fact, it is as
difficult to appropriate the thoughts of others as it is to invent.
                -- R. Emerson
                -- Quoted from a fortune cookie program
                (whose author claims, "Actually, stealing IS easier.")
                [to which I reply, "You think it's easy for me to
                misconstrue all these misquotations?!?"  Ed.]
Did you know about the -o option of the fortune program?  It makes a
selection from a set of offensive and/or obscene fortunes.  Why not
try it, and see how offended you are?  The -a ("all") option will
select a fortune at random from either the offensive or inoffensive
set, and it is suggested that "fortune -a" is the command that you
should have in your .profile or .cshrc. file.
Has anyone realized that the purpose of the fortune cookie program is to
defuse project tensions?  When did you ever see a cheerful cookie, a
non-cynical, or even an informative cookie?
        Perhaps inadvertently, we have a channel for our aggressions.  This
still begs the question of whether the cookie releases the pressure or only
serves to blunt the warning signs.

        Long live the revolution!
        Have a nice day.
The fortune program is supported, in part, by user contributions and by
a major grant from the National Endowment for the Inanities.
This fortune cookie program out of order.  For those in desperate need,
please use the program "________randchar".  This program generates random
characters, and, given enough time, will undoubtedly come up with
something profound.  It will, however, take it no time at all to be
more profound than THIS program has ever been.
THIS IS PLEDGE WEEK FOR THE FORTUNE PROGRAM

If you like the fortune program, why not support it now with your
contribution of a pithy fortunes, clean or obscene?  We cannot continue
without your support.  Less than 14% of all fortune users are contributors.
That means that 86% of you are getting a free ride.  We can't go on like
this much longer.  Federal cutbacks mean less money for fortunes, and unless
user contributions increase to make up the difference, the fortune program
will have to shut down between midnight and 8 a.m.  Don't let this happen.
Mail your fortunes right now to "fortune".  Just type in your favorite pithy
saying.  Do it now before you forget.  Our target is 300 new fortunes by the
end of the week. Don't miss out.  All fortunes will be acknowledged.  If you
contribute 30 fortunes or more, you will receive a free subscription to "The
Fortune Hunter", our monthly program guide.  If you contribute 50 or more,
you will receive a free "Fortune Hunter" coffee mug ....
Some of you ... may have decided that, this year, you're going to celebrate
it the old-fashioned way, with your family sitting around stringing
cranberries and exchanging humble, handmade gifts, like on "The Waltons".
Well, you can forget it.  If everybody pulled that kind of subversive stunt,
the economy would collapse overnight.  The government would have to
intervene: it would form a cabinet-level Department of Holiday Gift-Giving,
which would spend billions and billions of tax dollars to buy Barbie dolls
and electronic games, which it would drop on the populace from Air Force
jets, killing and maiming thousands.  So, for the good of the nation, you
should go along with the Holiday Program.  This means you should get a large
sum of money and go to a mall.
                -- Dave Barry, "Christmas Shopping: A Survivor's Guide"
"If you want an application to be portable, you don't necessarily create an abstraction layer like a microkernel so much as you program intelligently."

  -- Linus Torvalds on Microkernels (Open Sources, 1999 O'Reilly and Associates)
You Might be a Microsoft Employee If...

1. When a Microsoft program crashes for the millionth time, you say "Oh,
    well!" and reboot without any negative thoughts
2. The Windows 95 startup screen (the clouds) makes you feel all warm and
    fuzzy inside
3. You fully understand why Windows 95's Shutdown Option has to be
    accessed from the Start Menu
4. You believe Internet Explorer's security flaws were slipped in by a
    crack team of Netscape programmers
5. You keep valuable papers near your fireplace. Therefore, you are
    comfortable with Windows 95's "may-delete-it-at-anytime" philosophy
6. You're the Bob that Microsoft Bob was named after
7. Instead of "I'd rather be fishing," your bumper sticker says, "I'd
    rather be writing buggy Microsoft code"
8. You know the technical difference between OLE 1.0 and OLE 2.0
9. You've ever completed your income taxes while waiting for Windows 95
    to boot, and didn't think anything of it
10. You run Solitaire more than any other program, and therefore you
    consider your computer a Dedicated Solitaire Engine (DSE)
When you say "I wrote a program that crashed Windows", people just stare at
you blankly and say "Hey, I got those with the system, *for free*".
  
   -- Linus Torvalds
Microsoft ActivePromo Campaign: "Frequent Upgrade Points"

Microsoft's PR masterminds are planning a massive marketing campaign,
code-named "ActivePromo 2000", to promote the upcoming release of Windows
2000 (scheduled for February 2001).  This marketing campaign will include a
"Frequent Upgrade Points" promotion.

Customers who purchase upgrades to Windows, Office, or other Microsoft
"solutions" will receive "frequent upgrade points" (FUPs) when they register
online.  These points, like Frequent Flyer Miles, can be redeemed in the
future for discounts on other Microsoft upgrades. This program, combined
with the fact that older versions of some Microsoft programs have glaring
Y2K problems, should be enough to convince many people to shell out big
bucks to upgrade to a more bloated Microsoft operating system. The company
hopes to eradicate 99% of Windows 3.x installations by 2003.
Microsoft ActivePromo Campaign: "Windows Competitive Upgrade Offer"

Microsoft's PR masterminds are planning a massive marketing campaign,
code-named "ActivePromo 2000", to promote the upcoming release of Windows
2000 (scheduled for February 2001).  This marketing campaign will include a
"Windows Competitive Upgrade Offer" promotion.

Users of non-Microsoft operating systems (Linux in particular) will be given
the opportunity to trade-in their present OS for a free copy of Windows 98
(or NT 4.0) and Office 97.  People (all three of them) who want to
participate in this program will have to:

1. Mail their operating system's floppy disks or CD-ROMs to Microsoft

2. Agree to a two year contract with the Microsoft Network.

3. Agree (in writing) to the Competitive Upgrade License Agreement; one of
the terms of which is that the user may not install, copy, or otherwise use
a non-Microsoft OS for five years.
Invasion of the Dancing Penguin

Those annoying, dancing cartoon characters embedded in software applications
are no longer confined to Microsoft programs.  They have entered the realm
of Linux.  A new Linux distribution under development, called LinTux,
promises to provide a more "user-friendly" environment through its "Dancing
Penguin" assistant.

Dancing Tux will "guide" users through the installation process and will be
a permanent fixture of the X root window.  The LinTux staff demonstrated a
prototype version of the Dancing Tux program to this Humorix reporter.  It
was certainly impressive, but, like the Dancing Paper Clip in Microsoft
Office, it becomes annoying very fast.

The one redeeming feature of LinTux is that, when the system is idle,
Dancing Tux becomes a make-shift screen saver.  The animations included in
the prototype were quite amusing.  For instance, in one scene, Tux chases
Bill Gates through an Antarctic backdrop.  In another animation, Tux can be
seen drinking beers with his penguin pals and telling Microsoft jokes.
BSOD Simulator

Users of Red Hat 6.0 are discovering a new feature that hasn't been widely
advertised: a Blue Screen of Death simulator.  By default, the bsodsim
program activates when the user hits the virtually unused SysRq key (this is
customizable) causing the system to switch to a character cell console to
display a ficticious Blue Screen.

Red Hat hails the bsodsim program as the "boss key" for the Linux world. One
RH engineer said, "Workers are smuggling Linux boxes into companies that
exclusively use Windows.  This is all good and well until the PHB walks by
and comments, 'That doesn't look like Windows...' With bsodsim, that problem
is solved.  The worker can hit the emergency SysRq key, and the system will
behave just like Windows..."

The bsodsim program doesn't stop at just showing a simulated error message.
If the boss doesn't walk away, the worker can continue the illusion by
hitting CTRL-ALT-DEL, which causes a simulated reboot.  After showing the
usual boot messages, bsodsim will run a simulated SCANDISK program
indefinitely. The boss won't be able to tell the difference.  If the boss
continues to hang around, the worker can say, "SCANDISK is really taking a
long time... maybe we should upgrade our computers.  And don't you have
something better to do than watch this computer reboot for the tenth time
today?"
When Computers Crash

HOLLYWOOD -- The FOX TV Network has announced a new series of "reality
shows" to be aired over the summer. The series, "When Computers Crash",
will consist of five hour-long shows documenting the aftermath of serious
computer crashes, failures, and other problems. This show comes on the
heels of other FOX reality shows such as "World's Funniest Antitrust Trial
Bloopers", "When Stupid TV Network Executives Create Bad Show Ideas", and
"When Lame Fortune Files Poke Fun At FOX Reality Shows"...

To coincide with the series, FOX will sponsor a publicity gimmick called
"Crash & Win!" Contest participants will download a free Windows 9x/NT
program that keeps track of the number of Blue Screens, Illegal
Operations, or other fatal errors that force a reboot. When a crash
occurs, the program will log it in an encrypted database, which will be
periodically uploaded to the "FOX Crash & Win!" server.

Prizes such as a "Deciphering Windows Error Messages for Dummies" book, a
1999 Ford "Gasguzzler" Sport Utility Vehicle, or a lifetime supply of
stress relief medication will be awarded to participants based on the
number of crashes they log.
Jargon Coiner (#6)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* STOP MIRAGE: Trying to click on an imaginary Stop button on a program's
  toolbar after doing something you didn't want to. Usually caused as the
  result of excessive use of Netscape.

* YA-PREFIX: Putting "another" or "yet another" in front of a name or
  tacking "YA" in front of an acronym.

  Example: "We could ya-prefix this fortune by titling it 'Yet Another
  Lame List of Fabricated Jargon'."

* DOMAINEERING: Using a service like Netcraft to determine what operating
  system and webserver a particular domain is running.

* NOT-A-SALTINE EXPLANATION: The canned response given to someone who
  uses the term "hacker" instead of "cracker".
OPPRESSED GEEK: Everybody keeps blaming me for the Y2K problem, the
Melissa Virus, Windows crashes... you name it. When somebody finds out
you're a bona fide geek, they start bugging you about computer problems. I
frequently hear things like, "Why can't you geeks make Windows work
right?", "What kind of idiot writes a program that can't handle the year
2000?", "Geeks are evil, all they do is write viruses", and "The Internet
is the spawn of Satan".

I'm afraid to admit I have extensive computing experience. When somebody
asks what kind of job I have, I always lie. From my experience, admitting
that you're a geek is an invitation to disaster.

LARRY WALL: I know, I know. I sometimes say that I'm the founder of a
pearl harvesting company instead of admitting that I'm the founder of the
Perl programming language.

ERIC S. RAYMOND: This is tragic. We can't live in a world like this. We
need your donations to fight social oppression and ignorance against
geekdom...

   -- Excerpt from the Geek Grok '99 telethon      
Bill Gates Passes Turing Test

LONDON, ENGLAND -- Microsoft proclaimed that they have passed the Turing
Test by creating a Bill Gates multimedia simulacrum that crack BBC
interviewer Jeremy Paxman couldn't distinguish from the real thing. "I
never would have expected this," Paxman said about the Gates AI program.
"After all, this Microsoft program actually worked for an extended period
of time, something you don't see very often."

Microsoft has plans to mass-produce the Bill Gates holographic simulation
by 2010 or so. "The hardware just isn't there yet for home use," a
Microserf explained. "By then, though, Intel's Itanium 6 Super Pro Plus
III CPU running at 600 Ghz or whatever should be sufficient." Windows 2010
is expected to include the Bill Gates simulation, making the World's
Richest Man(tm) accessible to the entire world.

A newly printed brochure for the faux-Gates advertises, "Need help running
Windows 2010? Bill Gates will sit beside you and guide you through the
system. Have a question for the world's sexiest and smartest nerd? He'll
answer it. Wondering if free and open source software is a plot by
Communists freaks to overthrow the free market system? He'll be there to
explain. Want to ask for a personal loan? Sorry, won't happen."          
New Linux Companies Hope To Get Rich Quick (#3)

In the "Cathedral and the Bazaar", ESR mentions that one motivation behind
Open Source software is ego-gratification. That's where OpenEgo, Inc.
comes in. For a fee, the hackers at OpenEgo will produce a piece of Open
Source software and distribute it in your name, thus building up your
reputation and ego. You can quickly become the envy of all your friends --
without lifting a finger. Want a higher-paying tech job? With OpenEgo's
services, you'll look like an Open Source pro in no time, and have dozens
of hot job offers from across the country.

Says the OpenEgo sales literature, "Designing, implementing, maintaining,
and promoting a successful Open Source project is a pain. However, at
OpenEgo, we do all the work while you reap all the rewards..." A page on
the OpenEgo site claims, "We produced a Linux kernel patch for one
customer last year that was immediately accepted by Linus Torvalds...
Within days the person gained employment at Transmeta and is now on the
road to IPO riches..."

Prices range from $1,000 for a small program to $5,000 for a kernel patch.
Excerpts From The First Annual Nerd Bowl (#6)
(Round 4, the Who Wants To Be A Billionaire? Round)

ERIC RAYMOND (Moderator): Here's the second question: Who is the primary
author of the world-renowned fetchmail program? [Bzzz] Yes, Hemos?

HEMOS: Mr. Eric... Fetch of Cincinnati, Ohio.

RAYMOND: No, no, no! The answer is me, me, me, you idiots! Sheesh. I'm
resetting your points to zero for that.

ALAN COX: Are you going to ask any questions that are not about you?

RAYMOND: Um... let's see... yeah, there's one or two here... Okay, here's
  question three... What loud-mouthed hippie-spirtualist founder of the
  GNU Project keeps demanding that everybody use the crappy term "Free
  Software" instead of "Open Source"? [Bzzz] Yes, Anonymous Coward?

ANONCOW: Eric Raymond!

RAYMOND: Why you little [expletive]! I'm going to...
Affordable Virtual Beowulf Cluster

Every nerd drools over Beowulf clusters, but very few have even seen one,
much less own one. Until now, that is. Eric Gylgen, the open source hacker
famous for EviL (the dancing ASCII paperclip add-on to vi), is working on
a program that will emulate Beowulf clusters on a standard desktop PC.

"Of course," he added candidly, "the performance of my virtual cluster
will be many orders of magnitude less than a real cluster, but that's not
really the point. I just want to be able to brag that I run a 256 node
cluster. Nobody has to know I only spent $500 on the hardware it uses."

Eric has prior experience in this field. Last month he successfully built
a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing
calculators, various digital cameras, and even some TRS-80s.

He demonstrated a pre-alpha version of his VirtualEpicPoem software to us
yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which
each node, running Linux, was emulating its own 16 node cluster in which
each node, running Bochs, was emulating VMWare to emulate Linux running
old Amiga software. The system was extremely slow, but it worked.
Brief History Of Linux (#17)
Terrible calamity

IBM chose Microsoft's Quick & Dirty Operating System instead of CP/M for
its new line of PCs. QDOS (along with the abomination known as EDLIN) had
been acquired from a Seattle man, Tim Paterson, for the paltry sum of
$50,000. "Quick" and "Dirty" were truly an accurate description of this
system, because IBM's quality assurance department discovered 300 bugs in
QDOS's 8,000 lines of assember code (that's about 1 bug per 27 lines --
which, at the time, was appalling, but compared with Windows 98 today, it
really wasn't that shabby).

Thanks in part to IBM's new marketing slogan, "Nobody Ever Got Fired For
Choosing IBM(tm)", and the release of the VisiCalc spreadsheet program
that everybody and their brother wanted, IBM PCs running DOS flew off the
shelves and, unfortunately, secured Microsoft's runaway success. Bill
Gates was now on his way to the Billionaire's Club; his days as a mediocre
programmer were long gone: he was now a Suit. The only lines of code he
would ever see would be the passcodes to his Swiss bank accounts.
Brief History Of Linux (#22)

RMS had a horrible, terrible dream set in 2020 in which all of society was
held captive by copyright law. In particular, everyone's brain waves were
monitored by the US Dept. of Copyrights. If your thoughts referenced a
copyrighted idea, you had to pay a royalty. To make it worse, a handful of
corporations held fully 99.9% of all intellectual property rights.

Coincidentally, Bill Gates experienced a similar dream that same night. To
him, however, it was not a horrible, terrible nightmare, but a wonderful
utopian vision. The thought of lemmings... er, customers paying a royalty
everytime they hummed a copyrighted song in their head or remembered a
passage in a book was simply too marvelous for the budding monopolist.

RMS, waking up from his nightmare, vowed to fight the oncoming Copyright
Nightmare. The GNU Project was born. His plan called for a kernel,
compiler, editor, and other tools. Unfortunately, RMS became bogged down
with Emacs that the kernel, HURD, was shoved on the back burner. Built
with LISP (Lots of Incomprehensible Statements with Parentheses), Emacs
became bloated in a way no non-Microsoft program ever has. Indeed, for a
short while RMS pretended that Emacs really was the GNU OS kernel.
DeCSS T-Shirt Used To Commit Piracy!

College student Cody Potter stunned the world yesterday when he used a
T-shirt with the printed DeCSS source code to illegally copy a DVD of
"Star Trek XXI: We Promise This Is The Last One". Well, it wasn't the
actual DeCSS source code. The shirt contained a Perl script which spits
out a bash shell script which produces a GW-BASIC program which outputs a
ROT13-encoded Python script that manufactures a Pig-Latin-encoded Java
program that finally produces the real DeCSS C source code when executed.
The Next Big Thing: "Clairvoyant Consultants"

Nobody likes to deal with tech support or customer service reps. A growing
number of people are getting sick of being put on hold for three hours and
then paying ridiculous "per incident" fees so some Microserf can tell them
to "reinstall the operating system!"

Desperate users are turning to an unlikely source to diagnose and fix
software problems: psychics. Palm[Pilot] readers, 1-900 number operators,
and clairvoyant consultants are quickly becoming the hottest careers in
the tech sector.

Explained Madam Cosmos, owner of the Main Street Mysticism Temple in
Keokuk, Iowa, "With my special powers, I can track down the source of any
problem. Got a rogue Registry entry that's causing Bluescreens? I'll find
it. Missing a curly bracket in your Perl program but can't locate it
because the error messages are so unhelpful? I'll know where it is even
before you walk in my door."
Unobfuscated Perl (#1)

A rogue group of Perl hackers has presented a plan to add a "use
really_goddamn_strict" pragma that would enforce readability and
UNobfuscation. With this pragma in force, the Perl compiler might say:

* Warning: Program contains zero comments. You've probably never seen or
  used one before; they begin with a # symbol. Please start using them or
  else a representative from the nearest Perl Mongers group will come to
  your house and beat you over the head with a cluestick.

* Warning: Program uses a cute trick at line 125 that might make sense in
  C. But this isn't C!

* Warning: Code at line 412 indicates that programmer is an idiot. Please
  correct error between chair and monitor.

* Warning: While There's More Than One Way To Do It, your method at line
  523 is particularly stupid. Please try again.
UNobfuscated Perl Code Contest

The Perl Gazette has announced the winners in the First Annual Unobfuscated
Perl Code Contest. First place went to Edwin Fuller, who submitted this
unobfuscated program:

  #!/usr/bin/perl
  print "Hello world!\n";

"This was definitely a challenging contest," said an ecstatic Edwin
Fuller. "I've never written a Perl program before that didn't have
hundreds of qw( $ @ % & * | ? / \ ! # ~ ) symbols. I really had to summon
all of my programming skills to produce an unobfuscated program."

...The second place winner, Mrs. Sea Pearl, submitted the following code:

  #!/usr/bin/perl
  use strict;
  # Do nothing, successfully
  exit(0);
World Domination, One CPU Cycle At A Time

Forget about searching for alien signals or prime numbers. The real
distributed computing application is "Domination@World", a program to advocate
Linux and Apache to every website in the world that uses Windows and IIS.

The goal of the project is to probe every IP number to determine what kind of
platform each Net-connected machine is running. "That's a tall order... we
need lots of computers running our Domination@World clients to help probe
every nook and cranny of the Net," explained Mr. Zell Litt, the project head.

After the probing is complete, the second phase calls for the data to be
cross-referenced with the InterNIC whois database. "This way we'll have the
names, addresses, and phone numbers for every Windows-using system
administrator on the planet," Zell gloated. "That's when the fun begins."

The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan
for extreme advocacy. As part of LART, each Linux User Group will receive a
list of the Windows-using weenies in their region. The LUG will then be able
to employ various advocacy techniques, ranging from a soft-sell approach
(sending the target a free Linux CD in the mail) all the way to "LARTcon 5"
(cracking into their system and forcibly installing Linux).
Solving The Virus Problem Once And For All

System administrators across the globe have tried installing anti-virus
software. They've tried lecturing employees not to open unsolicited email
attachments. They've tried installing firewalls and the latest security
patches. But even with these precautions, email viruses continue to rank
third only to Solitaire and the Blue Screen Of Death in the amount of lost
productivity they cause. Meanwhile, Microsoft Exchange and LookOut! remain
as the number one virus delivery products on the market today.

But maybe not for much longer. A group of disgruntled administrators have
teamed up to produce and sell a brand new way to fight viruses, one that
attacks the root of the problem: stupid users.

Salivating Dogs, Inc. of Ohio has unveiled the "Clue Delivery System"
(CDS), a small device that plugs into the back of a standard PC keyboard
and delivers a mild electric shock whenever the luser does something
stupid. The device is triggered by a Windows program that detects when the
luser attempts to open an unsolicited email attachment or perform another
equally dangerous virus-friendly action.
> Is there anything else I can contribute?

The latitude and longtitude of the bios writers current position, and
a ballistic missile.

Please boot 2.2.18pre24 (not pre25) on the machine and send me its DMI strings
printed at boot time. I'll add it to the 'stupid morons who cant program and
wouldnt know QA if it hit them on the head with a mallet' list

        - Alan Cox on BIOS bugs
"A computer is a state machine.
Threads are for people who can't program state machines."

        - Alan Cox
I sat laughing snidely into my notebook until they showed me a PC running
Linux....  And did this PC choke?  Did it stutter?  Did it, even once,
say that this program has performed an illegal operation and must be shut
down?  No. And this is just on the client.
        -- LAN Times
<Knghtbrd> hardcopy is for wussies
<Topher> computer program listings....next, on HardCopy
<knghtbrd> Program received signal SIGSEGV, Segmentation fault.
<knghtbrd> 0x40095fb0 in memchr () from /lib/libc.so.6
<knghtbrd> (gdb) bt
<knghtbrd> #0  0x40095fb0 in memchr () from /lib/libc.so.6
<knghtbrd> #1  0x0 in ?? ()
<knghtbrd> Well That's Really Helpful
* knghtbrd trades gdb for a nice ouija board - it'll help more
<hoponpop> my program works if i take out the bugs.
When you say "I wrote a program that crashed Windows", people just stare at
you blankly and say "Hey, I got those with the system, *for free*".
        -- Linus Torvalds
The chat program is in public domain.  This is not the GNU public license.
If it breaks then you get to keep both pieces.
        -- Copyright notice for the chat program
When you say 'I wrote a program that crashed Windows', people just stare at
you blankly and say 'Hey, I got those with the system, *for free*'.
        -- Linus Torvalds
The primary difference [...] is that the Java programm will reliably and
obviously crash, whereas the C Program will do something obscure
        -- Java Language Tutorial
When you have 200 programmers trying to write code for one
product, like Win95 or NT, what you get is a multipule personality
program.  By definition, the real problem is that these programs are
psychotic by nature and make people crazy when they use them.
        -- Joan Brewer on alt.destroy.microsoft
<james> Are we going to make an emacs out of apt?
        APT - Debian in a program.  It even does your laundry
        -- Seen on #Debian
If you want to program in C, program in C.  It's a nice language.  I
use it occasionally...   :-)
             -- Larry Wall in <7577@jpl-devvax.JPL.NASA.GOV>
If you want your program to be readable, consider supplying the argument.
             -- Larry Wall in the perl man page
But then it's a bit odd to think that declaring something int could
actually slow down the program, if it ended up forcing more conversions
back to string.
             -- Larry Wall in <199708040319.UAA16213@wall.org>
And we can always supply them with a program that makes identical files
into links to a single file.
             -- Larry Wall in <199709292012.NAA09616@wall.org>
If you remove stricture from a large Perl program currently, you're just
installing delayed bugs, whereas with this feature, you're installing an
instant bug that's easily fixed.  Whoopee.
             -- Larry Wall in <199710050130.SAA04762@wall.org>
What PROGRAM are they watching?
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners