Proverbs, aphorisms, quotations (English) | by Linux fortune |
The chat program is in public domain. This is not the GNU public license. If it breaks then you get to keep both pieces. (Copyright notice for the chat program) | |
`When you say "I wrote a program that crashed Windows", people just stare at you blankly and say "Hey, I got those with the system, *for free*".' (By Linus Torvalds) | |
Program load too heavy for processor to lift. | |
A debugged program is one for which you have not yet found the conditions that make it fail. -- Jerry Ogdin | |
A language that doesn't have everything is actually easier to program in than some that do. -- Dennis M. Ritchie | |
A manager asked a programmer how long it would take him to finish the program on which he was working. "I will be finished tomorrow," the programmer promptly replied. "I think you are being unrealistic," said the manager. "Truthfully, how long will it take?" The programmer thought for a moment. "I have some features that I wish to add. This will take at least two weeks," he finally said. "Even that is too much to expect," insisted the manager, "I will be satisfied if you simply tell me when the program is complete." The programmer agreed to this. Several years later, the manager retired. On the way to his retirement lunch, he discovered the programmer asleep at his terminal. He had been programming all night. -- Geoffrey James, "The Tao of Programming" | |
A manager was about to be fired, but a programmer who worked for him invented a new program that became popular and sold well. As a result, the manager retained his job. The manager tried to give the programmer a bonus, but the programmer refused it, saying, "I wrote the program because I though it was an interesting concept, and thus I expect no reward." The manager, upon hearing this, remarked, "This programmer, though he holds a position of small esteem, understands well the proper duty of an employee. Lets promote him to the exalted position of management consultant!" But when told this, the programmer once more refused, saying, "I exist so that I can program. If I were promoted, I would do nothing but waste everyone's time. Can I go now? I have a program that I'm working on." -- Geoffrey James, "The Tao of Programming" | |
*** A NEW KIND OF PROGRAMMING *** Do you want the instant respect that comes from being able to use technical terms that nobody understands? Do you want to strike fear and loathing into the hearts of DP managers everywhere? If so, then let the Famous Programmers' School lead you on... into the world of professional computer programming. They say a good programmer can write 20 lines of effective program per day. With our unique training course, we'll show you how to write 20 lines of code and lots more besides. Our training course covers every programming language in existence, and some that aren't. You'll learn why the on/off switch for a computer is so important, what the words *fatal error* mean, and who and what you should blame when you make a mistake. Yes, I want the brochure describing this incredible offer. I enclose $1000 is small unmarked bills to cover the cost of postage and handling. (No live poultry, please.) *** Our Slogan: Top down programming for the masses. *** | |
A novice asked the master: "I have a program that sometimes runs and sometimes aborts. I have followed the rules of programming, yet I am totally baffled. What is the reason for this?" The master replied: "You are confused because you do not understand the Tao. Only a fool expects rational behavior from his fellow humans. Why do you expect it from a machine that humans have constructed? Computers simulate determinism; only the Tao is perfect. The rules of programming are transitory; only the Tao is eternal. Therefore you must contemplate the Tao before you receive enlightenment." "But how will I know when I have received enlightenment?" asked the novice. "Your program will then run correctly," replied the master. -- Geoffrey James, "The Tao of Programming" | |
A novice programmer was once assigned to code a simple financial package. The novice worked furiously for many days, but when his master reviewed his program, he discovered that it contained a screen editor, a set of generalized graphics routines, and artificial intelligence interface, but not the slightest mention of anything financial. When the master asked about this, the novice became indignant. "Don't be so impatient," he said, "I'll put the financial stuff in eventually." -- Geoffrey James, "The Tao of Programming" | |
A program should be light and agile, its subroutines connected like a strings of pearls. The spirit and intent of the program should be retained throughout. There should be neither too little nor too much, neither needless loops nor useless variables, neither lack of structure nor overwhelming rigidity. A program should follow the 'Law of Least Astonishment'. What is this law? It is simply that the program should always respond to the user in the way that astonishes him least. A program, no matter how complex, should act as a single unit. The program should be directed by the logic within rather than by outward appearances. If the program fails in these requirements, it will be in a state of disorder and confusion. The only way to correct this is to rewrite the program. -- Geoffrey James, "The Tao of Programming" | |
After sifting through the overwritten remaining blocks of Luke's home directory, Luke and PDP-1 sped away from /u/lars, across the surface of the Winchester riding Luke's flying read/write head. PDP-1 had Luke stop at the edge of the cylinder overlooking /usr/spool/uucp. "Unix-to-Unix Copy Program;" said PDP-1. "You will never find a more wretched hive of bugs and flamers. We must be cautious." -- DECWARS | |
Any given program will expand to fill available memory. | |
Any given program, when running, is obsolete. | |
Any program which runs right is obsolete. | |
Around computers it is difficult to find the correct unit of time to measure progress. Some cathedrals took a century to complete. Can you imagine the grandeur and scope of a program that would take as long? -- Epigrams in Programming, ACM SIGPLAN Sept. 1982 | |
As part of an ongoing effort to keep you, the Fortune reader, abreast of the valuable information the daily crosses the USENET, Fortune presents: News articles that answer *your* questions, #1: Newsgroups: comp.sources.d Subject: how do I run C code received from sources Keywords: C sources Distribution: na I do not know how to run the C programs that are posted in the sources newsgroup. I save the files, edit them to remove the headers, and change the mode so that they are executable, but I cannot get them to run. (I have never written a C program before.) Must they be compiled? With what compiler? How do I do this? If I compile them, is an object code file generated or must I generate it explicitly with the > character? Is there something else that must be done? | |
Cosmotronic Software Unlimited Inc. does not warrant that the functions contained in the program will meet your requirements or that the operation of the program will be uninterrupted or error-free. However, Cosmotronic Software Unlimited Inc. warrants the diskette(s) on which the program is furnished to be of black color and square shape under normal use for a period of ninety (90) days from the date of purchase. NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES. -- Horstmann Software Design, the "ChiWriter" user manual | |
Do not simplify the design of a program if a way can be found to make it complex and wonderful. | |
*** DO YOU HAVE A RESTLESS URGE TO PROGRAM? *** Do you want the instant respect that comes from being able to use technical terms that nobody understands? Do you want to strike fear and loathing into the hearts of DP managers everywhere? If so, then let the Famous Programmers' School lead you on... into the world of professional computer programming. *** IS PROGRAMMING FOR YOU? *** Programming is not for everyone. But, if you have the desire to learn, we can help you get started. All you need is the Famous Programmers' Course and enough money to keep those lessons coming month after month. *** TAKE OUR FREE APTITUDE TEST *** To help determine if you are qualified to be a programmer, take a moment to try this simple test: (1) Write down the numbers from zero to nine and the first six letters of the alphabet (Hint: 0123456789ABCDEF). (2) Whose picture is on the back of a twenty-dollar bill? (3) What is the state capital of Idaho? If you managed to read all three questions without wondering why we asked them, you may have a future as a computer programmer. | |
Every program has at least one bug and can be shortened by at least one instruction -- from which, by induction, one can deduce that every program can be reduced to one instruction which doesn't work. | |
Every program is a part of some other program, and rarely fits. | |
Evolution is a million line computer program falling into place by accident. | |
I went on to test the program in every way I could devise. I strained it to expose its weaknesses. I ran it for high-mass stars and low-mass stars, for stars born exceedingly hot and those born relatively cold. I ran it assuming the superfluid currents beneath the crust to be absent -- not because I wanted to know the answer, but because I had developed an intuitive feel for the answer in this particular case. Finally I got a run in which the computer showed the pulsar's temperature to be less than absolute zero. I had found an error. I chased down the error and fixed it. Now I had improved the program to the point where it would not run at all. -- George Greenstein, "Frozen Star: Of Pulsars, Black Holes and the Fate of Stars" | |
If a listener nods his head when you're explaining your program, wake him up. | |
If God had intended Man to program, we'd be born with serial I/O ports. | |
If the Tao is great, then the operating system is great. If the operating system is great, then the compiler is great. If the compiler is great, then the application is great. If the application is great, then the user is pleased and there is harmony in the world. The Tao gave birth to machine language. Machine language gave birth to the assembler. The assembler gave birth to the compiler. Now there are ten thousand languages. Each language has its purpose, however humble. Each language expresses the Yin and Yang of software. Each language has its place within the Tao. But do not program in COBOL if you can avoid it. -- Geoffrey James, "The Tao of Programming" | |
If you ever want to have a lot of fun, I recommend that you go off and program an imbedded system. The salient characteristic of an imbedded system is that it cannot be allowed to get into a state from which only direct intervention will suffice to remove it. An imbedded system can't permanently trust anything it hears from the outside world. It must sniff around, adapt, consider, sniff around, and adapt again. I'm not talking about ordinary modular programming carefulness here. No. Programming an imbedded system calls for undiluted raging maniacal paranoia. For example, our ethernet front ends need to know what network number they are on so that they can address and route PUPs properly. How do you find out what your network number is? Easy, you ask a gateway. Gateways are required by definition to know their correct network numbers. Once you've got your network number, you start using it and before you can blink you've got it wired into fifteen different sockets spread all over creation. Now what happens when the panic-stricken operator realizes he was running the wrong version of the gateway which was giving out the wrong network number? Never supposed to happen. Tough. Supposing that your software discovers that the gateway is now giving out a different network number than before, what's it supposed to do about it? This is not discussed in the protocol document. Never supposed to happen. Tough. I think you get my drift. | |
In every non-trivial program there is at least one bug. | |
In the long run, every program becomes rococco, and then rubble. -- Alan Perlis | |
>>> Internal error in fortune program: >>> fnum=2987 n=45 flag=1 goose_level=-232323 >>> Please write down these values and notify fortune program administrator. | |
It is a period of system war. User programs, striking from a hidden directory, have won their first victory against the evil Administrative Empire. During the battle, User spies managed to steal secret source code to the Empire's ultimate program: the Are-Em Star, a privileged root program with enough power to destroy an entire file structure. Pursued by the Empire's sinister audit trail, Princess _LPA0 races ~ aboard her shell script, custodian of the stolen listings that could save her people, and restore freedom and games to the network... -- DECWARS | |
It is a very humbling experience to make a multimillion-dollar mistake, but it is also very memorable. I vividly recall the night we decided how to organize the actual writing of external specifications for OS/360. The manager of architecture, the manager of control program implementation, and I were threshing out the plan, schedule, and division of responsibilities. The architecture manager had 10 good men. He asserted that they could write the specifications and do it right. It would take ten months, three more than the schedule allowed. The control program manager had 150 men. He asserted that they could prepare the specifications, with the architecture team coordinating; it would be well-done and practical, and he could do it on schedule. Furthermore, if the architecture team did it, his 150 men would sit twiddling their thumbs for ten months. To this the architecture manager responded that if I gave the control program team the responsibility, the result would not in fact be on time, but would also be three months late, and of much lower quality. I did, and it was. He was right on both counts. Moreover, the lack of conceptual integrity made the system far more costly to build and change, and I would estimate that it added a year to debugging time. -- Frederick Brooks Jr., "The Mythical Man Month" | |
It is against the grain of modern education to teach children to program. What fun is there in making plans, acquiring discipline in organizing thoughts, devoting attention to detail, and learning to be self-critical? -- Alan Perlis | |
It is easier to change the specification to fit the program than vice versa. | |
It is easier to write an incorrect program than understand a correct one. | |
... Jesus cried with a loud voice: Lazarus, come forth; the bug hath been found and thy program runneth. And he that was dead came forth... -- John 11:43-44 [version 2.0?] | |
LOGO for the Dead LOGO for the Dead lets you continue your computing activities from "The Other Side." The package includes a unique telecommunications feature which lets you turn your TRS-80 into an electronic Ouija board. Then, using Logo's graphics capabilities, you can work with a friend or relative on this side of the Great Beyond to write programs. The software requires that your body be hardwired to an analog-to-digital converter, which is then interfaced to your computer. A special terminal (very terminal) program lets you talk with the users through Deadnet, an EBBS (Ectoplasmic Bulletin Board System). LOGO for the Dead is available for 10 percent of your estate from NecroSoft inc., 6502 Charnelhouse Blvd., Cleveland, OH 44101. -- '80 Microcomputing | |
No proper program contains an indication which as an operator-applied occurrence identifies an operator-defining occurrence which as an indication-applied occurrence identifies an indication-defining occurrence different from the one identified by the given indication as an indication-applied occurrence. -- ALGOL 68 Report | |
Now she speaks rapidly. "Do you know *why* you want to program?" He shakes his head. He hasn't the faintest idea. "For the sheer *joy* of programming!" she cries triumphantly. "The joy of the parent, the artist, the craftsman. "You take a program, born weak and impotent as a dimly-realized solution. You nurture the program and guide it down the right path, building, watching it grow ever stronger. Sometimes you paint with tiny strokes, a keystroke added here, a keystroke changed there." She sweeps her arm in a wide arc. "And other times you savage whole *blocks* of code, ripping out the program's very *essence*, then beginning anew. But always building, creating, filling the program with your own personal stamp, your own quirks and nuances. Watching the program grow stronger, patching it when it crashes, until finally it can stand alone -- proud, powerful, and perfect. This is the programmer's finest hour!" Softly at first, then louder, he hears the strains of a Sousa march. "This ... this is your canvas! your clay! Go forth and create a masterwork!" | |
Okay, Okay -- I admit it. You didn't change that program that worked just a little while ago; I inserted some random characters into the executable. Please forgive me. You can recover the file by typing in the code over again, since I also removed the source. | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A.L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4. | |
Price Wang's programmer was coding software. His fingers danced upon the keyboard. The program compiled without an error message, and the program ran like a gentle wind. Excellent!" the Price exclaimed, "Your technique is faultless!" "Technique?" said the programmer, turning from his terminal, "What I follow is the Tao -- beyond all technique. When I first began to program I would see before me the whole program in one mass. After three years I no longer saw this mass. Instead, I used subroutines. But now I see nothing. My whole being exists in a formless void. My senses are idle. My spirit, free to work without a plan, follows its own instinct. In short, my program writes itself. True, sometimes there are difficult problems. I see them coming, I slow down, I watch silently. Then I change a single line of code and the difficulties vanish like puffs of idle smoke. I then compile the program. I sit still and let the joy of the work fill my being. I close my eyes for a moment and then log off." Price Wang said, "Would that all of my programmers were as wise!" -- Geoffrey James, "The Tao of Programming" | |
Proposed Additions to the PDP-11 Instruction Set: PI Punch Invalid POPI Punch Operator Immediately PVLC Punch Variable Length Card RASC Read And Shred Card RPM Read Programmers Mind RSSC reduce speed, step carefully (for improved accuracy) RTAB Rewind tape and break RWDSK rewind disk RWOC Read Writing On Card SCRBL scribble to disk - faster than a write SLC Search for Lost Chord SPSW Scramble Program Status Word SRSD Seek Record and Scar Disk STROM Store in Read Only Memory TDB Transfer and Drop Bit WBT Water Binary Tree | |
Real computer scientists admire ADA for its overwhelming aesthetic value but they find it difficult to actually program in it, as it is much too large to implement. Most computer scientists don't notice this because they are still arguing over what else to add to ADA. | |
Real computer scientists don't program in assembler. They don't write in anything less portable than a number two pencil. | |
Real Users never know what they want, but they always know when your program doesn't deliver it. | |
SEMINAR ANNOUNCEMENT Title: Are Frogs Turing Compatible? Speaker: Don "The Lion" Knuth ABSTRACT Several researchers at the University of Louisiana have been studying the computing power of various amphibians, frogs in particular. The problem of frog computability has become a critical issue that ranges across all areas of computer science. It has been shown that anything computable by an amphi- bian community in a fixed-size pond is computable by a frog in the same-size pond -- that is to say, frogs are Pond-space complete. We will show that there is a log-space, polywog-time reduction from any Turing machine program to a frog. We will suggest these represent a proper subset of frog-computable functions. This is not just a let's-see-how-far-those-frogs-can-jump seminar. This is only for hardcore amphibian-computation people and their colleagues. Refreshments will be served. Music will be played. | |
Several students were asked to prove that all odd integers are prime. The first student to try to do this was a math student. "Hmmm... Well, 1 is prime, 3 is prime, 5 is prime, and by induction, we have that all the odd integers are prime." The second student to try was a man of physics who commented, "I'm not sure of the validity of your proof, but I think I'll try to prove it by experiment." He continues, "Well, 1 is prime, 3 is prime, 5 is prime, 7 is prime, 9 is... uh, 9 is... uh, 9 is an experimental error, 11 is prime, 13 is prime... Well, it seems that you're right." The third student to try it was the engineering student, who responded, "Well, to be honest, actually, I'm not sure of your answer either. Let's see... 1 is prime, 3 is prime, 5 is prime, 7 is prime, 9 is... uh, 9 is... well, if you approximate, 9 is prime, 11 is prime, 13 is prime... Well, it does seem right." Not to be outdone, the computer science student comes along and says "Well, you two sort've got the right idea, but you'll end up taking too long! I've just whipped up a program to REALLY go and prove it." He goes over to his terminal and runs his program. Reading the output on the screen he says, "1 is prime, 1 is prime, 1 is prime, 1 is prime..." | |
*** STUDENT SUCCESSES *** Many of our students have gone on to achieve great success in all fields of programming. One former student developed the concept of the personalized form letter. Does the phrase, "Dear Mr.(insert name), You may already be a winner!," sound familiar? Another student writes "After only five lessons I sold a "My Most Unforgettable Program" article to Corrosive Computing magazine. Another of our graduates writes, "I recently completed a database-management program for my department manager. My program touched him so deeply that he was speechless. He told me later that he had never seen such a program in his entire career. Thank you, Famous Programmers' school; only you could have made this possible." Send for our introductory brochure which explains in vague detail the operation of the Famous Programmers' School, and you'll be eligible to win a possible chance to enter a drawing, the winner of which can vie for a set of free steak knives. If you don't do it now, you'll hate yourself in the morning. | |
The connection between the language in which we think/program and the problems and solutions we can imagine is very close. For this reason restricting language features with the intent of eliminating programmer errors is at best dangerous. -- Bjarne Stroustrup | |
The flow chart is a most thoroughly oversold piece of program documentation. -- Frederick Brooks, "The Mythical Man Month" | |
The Gurus of Unix Meeting of Minds (GUMM) takes place Wednesday, April 1, 2076 (check THAT in your perpetual calendar program), 14 feet above the ground directly in front of the Milpitas Gumps. Members will grep each other by the hand (after intro), yacc a lot, smoke filtered chroots in pipes, chown with forks, use the wc (unless uuclean), fseek nice zombie processes, strip, and sleep, but not, we hope, od. Three days will be devoted to discussion of the ramifications of whodo. Two seconds have been allotted for a complete rundown of all the user- friendly features of Unix. Seminars include "Everything You Know is Wrong", led by Tom Kempson, "Batman or Cat:man?" led by Richie Dennis "cc C? Si! Si!" led by Kerwin Bernighan, and "Document Unix, Are You Kidding?" led by Jan Yeats. No Reader Service No. is necessary because all GUGUs (Gurus of Unix Group of Users) already know everything we could tell them. -- "Get GUMMed," Dr. Dobb's Journal, June '84 | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #13: SLOBOL SLOBOL is best known for the speed, or lack of it, of its compiler. Although many compilers allow you to take a coffee break while they compile, SLOBOL compilers allow you to travel to Bolivia to pick the coffee. Forty-three programmers are known to have died of boredom sitting at their terminals while waiting for a SLOBOL program to compile. Weary SLOBOL programmers often turn to a related (but infinitely faster) language, COCAINE. | |
THE LESSER-KNOWN PROGRAMMING LANGUAGES #14 -- VALGOL VALGOL is enjoying a dramatic surge of popularity across the industry. VALGOL commands include REALLY, LIKE, WELL, and Y*KNOW. Variables are assigned with the =LIKE and =TOTALLY operators. Other operators include the "California booleans", AX and NOWAY. Loops are accomplished with the FOR SURE construct. A simple example: LIKE, Y*KNOW(I MEAN)START IF PIZZA =LIKE BITCHEN AND GUY =LIKE TUBULAR AND VALLEY GIRL =LIKE GRODY**MAX(FERSURE)**2 THEN FOR I =LIKE 1 TO OH*MAYBE 100 DO*WAH - (DITTY**2); BARF(I)=TOTALLY GROSS(OUT) SURE LIKE, BAG THIS PROGRAM; REALLY; LIKE TOTALLY(Y*KNOW); IM*SURE GOTO THE MALL VALGOL is also characterized by its unfriendly error messages. For example, when the user makes a syntax error, the interpreter displays the message GAG ME WITH A SPOON! A successful compile may be termed MAXIMALLY AWESOME! | |
The Magician of the Ivory Tower brought his latest invention for the master programmer to examine. The magician wheeled a large black box into the master's office while the master waited in silence. "This is an integrated, distributed, general-purpose workstation," began the magician, "ergonomically designed with a proprietary operating system, sixth generation languages, and multiple state of the art user interfaces. It took my assistants several hundred man years to construct. Is it not amazing?" The master raised his eyebrows slightly. "It is indeed amazing," he said. "Corporate Headquarters has commanded," continued the magician, "that everyone use this workstation as a platform for new programs. Do you agree to this?" "Certainly," replied the master, "I will have it transported to the data center immediately!" And the magician returned to his tower, well pleased. Several days later, a novice wandered into the office of the master programmer and said, "I cannot find the listing for my new program. Do you know where it might be?" "Yes," replied the master, "the listings are stacked on the platform in the data center." -- Geoffrey James, "The Tao of Programming" | |
The master programmer moves from program to program without fear. No change in management can harm him. He will not be fired, even if the project is canceled. Why is this? He is filled with the Tao. -- Geoffrey James, "The Tao of Programming" | |
The primary purpose of the DATA statement is to give names to constants; instead of referring to pi as 3.141592653589793 at every appearance, the variable PI can be given that value with a DATA statement and used instead of the longer form of the constant. This also simplifies modifying the program, should the value of pi change. -- FORTRAN manual for Xerox Computers | |
The problem with engineers is that they tend to cheat in order to get results. The problem with mathematicians is that they tend to work on toy problems in order to get results. The problem with program verifiers is that they tend to cheat at toy problems in order to get results. | |
The program isn't debugged until the last user is dead. | |
The value of a program is proportional to the weight of its output. | |
The wise programmer is told about the Tao and follows it. The average programmer is told about the Tao and searches for it. The foolish programmer is told about the Tao and laughs at it. If it were not for laughter, there would be no Tao. The highest sounds are the hardest to hear. Going forward is a way to retreat. Greater talent shows itself late in life. Even a perfect program still has bugs. -- Geoffrey James, "The Tao of Programming" | |
There is no distinction between any AI program and some existent game. | |
This quote is taken from the Diamondback, the University of Maryland student newspaper, of Tuesday, 3/10/87. One disadvantage of the Univac system is that it does not use Unix, a recently developed program which translates from one computer language to another and has a built-in editing system which identifies errors in the original program. | |
Those parts of the system that you can hit with a hammer (not advised) are called hardware; those program instructions that you can only curse at are called software. -- Levitating Trains and Kamikaze Genes: Technological Literacy for the 1990's. | |
Thus spake the master programmer: "A well-written program is its own heaven; a poorly-written program is its own hell." -- Geoffrey James, "The Tao of Programming" | |
Thus spake the master programmer: "Though a program be but three lines long, someday it will have to be maintained." -- Geoffrey James, "The Tao of Programming" | |
Thus spake the master programmer: "When a program is being tested, it is too late to make design changes." -- Geoffrey James, "The Tao of Programming" | |
Thus spake the master programmer: "You can demonstrate a program for a corporate executive, but you can't make him computer literate." -- Geoffrey James, "The Tao of Programming" | |
To understand a program you must become both the machine and the program. | |
"We are on the verge: Today our program proved Fermat's next-to-last theorem." -- Epigrams in Programming, ACM SIGPLAN Sept. 1982 | |
"You can't make a program without broken egos." | |
Your program is sick! Shoot it and put it out of its memory. | |
The connection between the language in which we think/program and the problems and solutions we can imagine is very close. For this reason restricting language features with the intent of eliminating programmer errors is at best dangerous. - Bjarne Stroustrup in "The C++ Programming Language" | |
"Can you program?" "Well, I'm literate, if that's what you mean!" | |
It is a very humbling experience to make a multimillion-dollar mistake, but it is also very memorable. I vividly recall the night we decided how to organize the actual writing of external specifications for OS/360. The manager of architecture, the manager of control program implementation, and I were threshing out the plan, schedule, and division of responsibilities. The architecture manager had 10 good men. He asserted that they could write the specifications and do it right. It would take ten months, three more than the schedule allowed. The control program manager had 150 men. He asserted that they could prepare the specifications, with the architecture team coordinating; it would be well-done and practical, and he could do it on schedule. Futhermore, if the architecture team did it, his 150 men would sit twiddling their thumbs for ten months. To this the architecture manager responded that if I gave the control program team the responsibility, the result would not in fact be on time, but would also be three months late, and of much lower quality. I did, and it was. He was right on both counts. Moreover, the lack of conceptual integrity made the system far more costly to build and change, and I would estimate that it added a year to debugging time. - Frederick Brooks Jr., "The Mythical Man Month" | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4, 1973, pp. 382-400 | |
To be is to program. | |
To program is to be. | |
I program, therefore I am. | |
Operating-system software is the program that orchestrates all the basic functions of a computer. - The Wall Street Journal, Tuesday, September 15, 1987, page 40 | |
The typical page layout program is nothing more than an electronic light table for cutting and pasting documents. | |
"Largely because it is so tangible and exciting a program and as such will serve to keep alive the interest and enthusiasm of the whole spectrum of society...It is justified because...the program can give a sense of shared adventure and achievement to the society at large." - Dr. Colin S. Pittendrigh, in "The History of Manned Space Flight" | |
The idea of man leaving this earth and flying to another celestial body and landing there and stepping out and walking over that body has a fascination and a driving force that can get the country to a level of energy, ambition, and will that I do not see in any other undertaking. I think if we are honest with ourselves, we must admit that we needed that impetus extremely strongly. I sincerely believe that the space program, with its manned landing on the moon, if wisely executed, will become the spearhead for a broad front of courageous and energetic activities in all the fields of endeavour of the human mind - activities which could not be carried out except in a mental climate of ambition and confidence which such a spearhead can give. - Dr. Martin Schwarzschild, 1962, in "The History of Manned Space Flight" | |
"Unibus timeout fatal trap program lost sorry" - An error message printed by DEC's RSTS operating system for the PDP-11 | |
"There is no statute of limitations on stupidity." -- Randomly produced by a computer program called Markov3. | |
The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once. | |
This is, of course, totally uninformed specualation that I engage in to help support my bias against such meddling... but there you have it. -- Peter da Silva, speculating about why a computer program that had been changed to do something he didn't approve of, didn't work | |
"Just think of a computer as hardware you can program." -- Nigel de la Tierre | |
"Okay," Bobby said, getting the hang of it, "then what's the matrix? If she's a deck, and Danbala's a program, what's cyberspace?" "The world," Lucas said. -- William Gibson, _Count Zero_ | |
"In the long run, every program becomes rococo, and then rubble." -- Alan Perlis | |
How many Unix hacks does it take to change a light bulb? Let's see, can you use a shell script for that or does it need a C program? | |
A student asked the master for help... does this program run from the Workbench? The master grabbed the mouse and pointed to an icon. "What is this?" he asked. The student replied "That's the mouse". The master pressed control-Amiga-Amiga and hit the student on the head with the Amiga ROM Kernel Manual. -- Amiga Zen Master Peter da Silva | |
On the subject of C program indentation: "In My Egotistical Opinion, most people's C programs should be indented six feet downward and covered with dirt." -- Blair P. Houghton | |
"Though a program be but three lines long, someday it will have to be maintained." -- The Tao of Programming | |
"(The Chief Programmer) personally defines the functional and performance specifications, designs the program, codes it, tests it, and writes its documentation... He needs great talent, ten years experience and considerable systems and applications knowledge, whether in applied mathematics, business data handling, or whatever." -- Fred P. Brooks, _The Mythical Man Month_ | |
Bagbiter: 1. n.; Equipment or program that fails, usually intermittently. 2. adj.: Failing hardware or software. "This bagbiting system won't let me get out of spacewar." Usage: verges on obscenity. Grammatically separable; one may speak of "biting the bag". Synonyms: LOSER, LOSING, CRETINOUS, BLETCHEROUS, BARFUCIOUS, CHOMPER, CHOMPING. | |
Bug, n.: An aspect of a computer program which exists because the programmer was thinking about Jumbo Jacks or stock options when s/he wrote the program. Fortunately, the second-to-last bug has just been fixed. -- Ray Simard | |
bug, n: An elusive creature living in a program that makes it incorrect. The activity of "debugging", or removing bugs from a program, ends when people get tired of doing it, not when the bugs are removed. -- "Datamation", January 15, 1984 | |
comment: A superfluous element of a source program included so the programmer can remember what the hell it was he was doing six months later. Only the weak-minded need them, according to those who think they aren't. | |
Cursor, n.: One whose program will not run. -- Robb Russon | |
Every program has (at least) two purposes: the one for which it was written and another for which it wasn't. | |
feature, n: A surprising property of a program. Occasionaly documented. To call a property a feature sometimes means the author did not consider that case, and the program makes an unexpected, though not necessarily wrong response. See BUG. "That's not a bug, it's a feature!" A bug can be changed to a feature by documenting it. | |
incentive program, n.: The system of long and short-term rewards that a corporation uses to motivate its people. Still, despite all the experimentation with profit sharing, stock options, and the like, the most effective incentive program to date seems to be "Do a good job and you get to keep it." | |
Laws of Computer Programming: (1) Any given program, when running, is obsolete. (2) Any given program costs more and takes longer. (3) If a program is useful, it will have to be changed. (4) If a program is useless, it will have to be documented. (5) Any given program will expand to fill all available memory. (6) The value of a program is proportional the weight of its output. (7) Program complexity grows until it exceeds the capability of the programmer who must maintain it. | |
Main's Law: For every action there is an equal and opposite government program. | |
On the subject of C program indentation: "In My Egotistical Opinion, most people's C programs should be indented six feet downward and covered with dirt." -- Blair P. Houghton | |
Priority: A statement of the importance of a user or a program. Often expressed as a relative priority, indicating that the user doesn't care when the work is completed so long as he is treated less badly than someone else. | |
program, n.: A magic spell cast over a computer allowing it to turn one's input into error messages. tr.v. To engage in a pastime similar to banging one's head against a wall, but with fewer opportunities for reward. | |
program, n.: Any task that can't be completed in one telephone call or one day. Once a task is defined as a program ("training program," "sales program," or "marketing program"), its implementation always justifies hiring at least three more people. | |
The Briggs-Chase Law of Program Development: To determine how long it will take to write and debug a program, take your best estimate, multiply that by two, add one, and convert to the next higher units. | |
The First Rule of Program Optimization: Don't do it. The Second Rule of Program Optimization (for experts only!): Don't do it yet. -- Michael Jackson | |
The Illiterati Programus Canto 1: A program is a lot like a nose: Sometimes it runs, and sometimes it blows. | |
University, n.: Like a software house, except the software's free, and it's usable, and it works, and if it breaks they'll quickly tell you how to fix it, and ... [Okay, okay, I'll leave it in, but I think you're destroying the credibility of the entire fortune program. Ed.] | |
Q: How many journalists does it take to screw in a light bulb? A: Three. One to report it as an inspired government program to bring light to the people, one to report it as a diabolical government plot to deprive the poor of darkness, and one to win a Pulitzer prize for reporting that Electric Company hired a light bulb-assassin to break the bulb in the first place. | |
Three Midwesterners, a Kansan, a Missourian and an Iowan, all appearing on a quiz program, were asked to complete this sentence: "Old MacDonald had a . . ." "Old MacDonald had a carburetor," answered the Kansan. "Sorry, that's wrong," the game show host said. "Old MacDonald had a free brake alignment down at the service station," said the Missourian. "Wrong." "Old MacDonald had a farm," said the Iowan. "CORRECT!" shouts the quizmaster. "Now for $100,000, spell 'farm.'" "Easy," said the Iowan. "E-I-E-I-O." | |
Why don't you fix your little problem... and light this candle? -- Alan Shepherd, the first man into space, Gemini program | |
"Yo, Mike!" "Yeah, Gabe?" "We got a problem down on Earth. In Utah." "I thought you fixed that last century!" "No, no, not that. Someone's found a security problem in the physics program. They're getting energy out of nowhere." "Blessit! Lemme look... <tappity clickity tappity> Hey, it's there all right! OK, just a sec... <tappity clickity tap... save... compile> There, that ought to patch it. Dist it out, wouldja?" -- Cold Fusion, 1989 | |
Eleanor Rigby Sits at the keyboard And waits for a line on the screen Lives in a dream Waits for a signal Finding some code That will make the machine do some more. What is it for? All the lonely users, where do they all come from? All the lonely users, why does it take so long? Hacker MacKensie Writing the code for a program that no one will run It's nearly done Look at him working, fixing the bugs in the night when there's nobody there. What does he care? All the lonely users, where do they all come from? All the lonely users, why does it take so long? Ah, look at all the lonely users. Ah, look at all the lonely users. | |
God rest ye CS students now, The bearings on the drum are gone, Let nothing you dismay. The disk is wobbling, too. The VAX is down and won't be up, We've found a bug in Lisp, and Algol Until the first of May. Can't tell false from true. The program that was due this morn, And now we find that we can't get Won't be postponed, they say. At Berkeley's 4.2. (chorus) (chorus) We've just received a call from DEC, And now some cheery news for you, They'll send without delay The network's also dead, A monitor called RSuX We'll have to print your files on It takes nine hundred K. The line printer instead. The staff committed suicide, The turnaround time's nineteen weeks. We'll bury them today. And only cards are read. (chorus) (chorus) And now we'd like to say to you CHORUS: Oh, tidings of comfort and joy, Before we go away, Comfort and joy, We hope the news we've brought to you Oh, tidings of comfort and joy. Won't ruin your whole day. You've got another program due, tomorrow, by the way. (chorus) -- to God Rest Ye Merry Gentlemen | |
I gave my love an Apple, that had no core; I gave my love a building, that had no floor; I wrote my love a program, that had no end; I gave my love an upgrade, with no cryin'. How can there be an Apple, that has no core? How can there be a building, that has no floor? How can there be a program, that has no end? How can there be an upgrade, with no cryin'? An Apple's MOS memory don't use no core! A building that's perfect, it has no flaw! A program with GOTOs, it has no end! I lied about the upgrade, with no cryin'! | |
"No program is perfect," They said with a shrug. "The customer's happy-- What's one little bug?" But he was determined, Then change two, then three more, The others went home. As year followed year. He dug out the flow chart And strangers would comment, Deserted, alone. "Is that guy still here?" Night passed into morning. He died at the console The room was cluttered Of hunger and thirst With core dumps, source listings. Next day he was buried "I'm close," he muttered. Face down, nine edge first. Chain smoking, cold coffee, And his wife through her tears Logic, deduction. Accepted his fate. "I've got it!" he cried, Said "He's not really gone, "Just change one instruction." He's just working late." -- The Perfect Programmer | |
'Twas the night before crisis, and all through the house, Not a program was working not even a browse. The programmers were wrung out too mindless to care, Knowing chances of cutover hadn't a prayer. The users were nestled all snug in their beds, While visions of inquiries danced in their heads. When out in the lobby there arose such a clatter, I sprang from my tube to see what was the matter. And what to my wondering eyes should appear, But a Super Programmer, oblivious to fear. More rapid than eagles, his programs they came, And he whistled and shouted and called them by name; On Update! On Add! On Inquiry! On Delete! On Batch Jobs! On Closing! On Functions Complete! His eyes were glazed over, his fingers were lean, From Weekends and nights in front of a screen. A wink of his eye, and a twist of his head, Soon gave me to know I had nothing to dread... -- "Twas the Night before Crisis" | |
Well, my terminal's locked up, and I ain't got any Mail, And I can't recall the last time that my program didn't fail; I've got stacks in my structs, I've got arrays in my queues, I've got the : Segmentation violation -- Core dumped blues. If you think that it's nice that you get what you C, Then go : illogical statement with your whole family, 'Cause the Supreme Court ain't the only place with : Bus error views. I've got the : Segmentation violation -- Core dumped blues. On a PDP-11, life should be a breeze, But with VAXen in the house even magnetic tapes would freeze. Now you might think that unlike VAXen I'd know who I abuse, I've got the : Segmentation violation -- Core dumped blues. -- Core Dumped Blues | |
HARVARD: Quarterback: Sophomore Dave Strewzinski... likes to pass. And pass he does, with a record 86 attempts (three completions) in 87 plays.... Though Strewzinksi has so far failed to score any points for the Crimson, his jackrabbit speed has made him the least sacked quarterback in the Ivy league. Wide Receiver: The other directional signal in Harvard's offensive machine is senior Phil Yip, who is very fast. Yip is so fast that he has set a record for being fast. Expect to see Yip elude all pursuers and make it into the endzone five or six times, his average for a game. Yip, nicknamed "fumblefingers" and "you asshole" by his teammates, hopes to carry the ball with him at least one of those times. YALE: Defense: On the defensive side, Yale boasts the stingiest line in the Ivies. Primarily responsible are seniors Izzy "Shylock" Bloomberg and Myron Finklestein, the tightest ends in recent Eli history. Also contributing to the powerful defense is junior tackle Angus MacWhirter, a Scotsman who rounds out the offensive ethnic joke. Look for these three to shut down the opening coin toss. -- Harvard Lampoon 1988 Program Parody, distributed at The Game | |
======================================================================= || || || The FORTUNE-COOKIE program is soon to be a Major Motion Picture! || || Watch for it at a theater near you next summer! || || || ======================================================================= Francis Ford Coppola presents a George Lucas Production: "Fortune Cookie" Directed by Steven Spielberg. Starring Harrison Ford Bette Midler Marlon Brando Christopher Reeves Marilyn Chambers and Bob Hope as "The Waiter". Costumes Designed by Pierre Cardin. Special Effects by Timothy Leary. Read the Warner paperback! Invoke the Unix program! Soundtrack on XTC Records. In 70mm and Dolby Stereo at selected theaters and terminal centers. | |
By necessity, by proclivity, and by delight, we all quote. In fact, it is as difficult to appropriate the thoughts of others as it is to invent. -- R. Emerson -- Quoted from a fortune cookie program (whose author claims, "Actually, stealing IS easier.") [to which I reply, "You think it's easy for me to misconstrue all these misquotations?!?" Ed.] | |
Did you know about the -o option of the fortune program? It makes a selection from a set of offensive and/or obscene fortunes. Why not try it, and see how offended you are? The -a ("all") option will select a fortune at random from either the offensive or inoffensive set, and it is suggested that "fortune -a" is the command that you should have in your .profile or .cshrc. file. | |
Has anyone realized that the purpose of the fortune cookie program is to defuse project tensions? When did you ever see a cheerful cookie, a non-cynical, or even an informative cookie? Perhaps inadvertently, we have a channel for our aggressions. This still begs the question of whether the cookie releases the pressure or only serves to blunt the warning signs. Long live the revolution! Have a nice day. | |
The fortune program is supported, in part, by user contributions and by a major grant from the National Endowment for the Inanities. | |
This fortune cookie program out of order. For those in desperate need, please use the program "________randchar". This program generates random characters, and, given enough time, will undoubtedly come up with something profound. It will, however, take it no time at all to be more profound than THIS program has ever been. | |
THIS IS PLEDGE WEEK FOR THE FORTUNE PROGRAM If you like the fortune program, why not support it now with your contribution of a pithy fortunes, clean or obscene? We cannot continue without your support. Less than 14% of all fortune users are contributors. That means that 86% of you are getting a free ride. We can't go on like this much longer. Federal cutbacks mean less money for fortunes, and unless user contributions increase to make up the difference, the fortune program will have to shut down between midnight and 8 a.m. Don't let this happen. Mail your fortunes right now to "fortune". Just type in your favorite pithy saying. Do it now before you forget. Our target is 300 new fortunes by the end of the week. Don't miss out. All fortunes will be acknowledged. If you contribute 30 fortunes or more, you will receive a free subscription to "The Fortune Hunter", our monthly program guide. If you contribute 50 or more, you will receive a free "Fortune Hunter" coffee mug .... | |
Some of you ... may have decided that, this year, you're going to celebrate it the old-fashioned way, with your family sitting around stringing cranberries and exchanging humble, handmade gifts, like on "The Waltons". Well, you can forget it. If everybody pulled that kind of subversive stunt, the economy would collapse overnight. The government would have to intervene: it would form a cabinet-level Department of Holiday Gift-Giving, which would spend billions and billions of tax dollars to buy Barbie dolls and electronic games, which it would drop on the populace from Air Force jets, killing and maiming thousands. So, for the good of the nation, you should go along with the Holiday Program. This means you should get a large sum of money and go to a mall. -- Dave Barry, "Christmas Shopping: A Survivor's Guide" | |
"If you want an application to be portable, you don't necessarily create an abstraction layer like a microkernel so much as you program intelligently." -- Linus Torvalds on Microkernels (Open Sources, 1999 O'Reilly and Associates) | |
You Might be a Microsoft Employee If... 1. When a Microsoft program crashes for the millionth time, you say "Oh, well!" and reboot without any negative thoughts 2. The Windows 95 startup screen (the clouds) makes you feel all warm and fuzzy inside 3. You fully understand why Windows 95's Shutdown Option has to be accessed from the Start Menu 4. You believe Internet Explorer's security flaws were slipped in by a crack team of Netscape programmers 5. You keep valuable papers near your fireplace. Therefore, you are comfortable with Windows 95's "may-delete-it-at-anytime" philosophy 6. You're the Bob that Microsoft Bob was named after 7. Instead of "I'd rather be fishing," your bumper sticker says, "I'd rather be writing buggy Microsoft code" 8. You know the technical difference between OLE 1.0 and OLE 2.0 9. You've ever completed your income taxes while waiting for Windows 95 to boot, and didn't think anything of it 10. You run Solitaire more than any other program, and therefore you consider your computer a Dedicated Solitaire Engine (DSE) | |
When you say "I wrote a program that crashed Windows", people just stare at you blankly and say "Hey, I got those with the system, *for free*". -- Linus Torvalds | |
Microsoft ActivePromo Campaign: "Frequent Upgrade Points" Microsoft's PR masterminds are planning a massive marketing campaign, code-named "ActivePromo 2000", to promote the upcoming release of Windows 2000 (scheduled for February 2001). This marketing campaign will include a "Frequent Upgrade Points" promotion. Customers who purchase upgrades to Windows, Office, or other Microsoft "solutions" will receive "frequent upgrade points" (FUPs) when they register online. These points, like Frequent Flyer Miles, can be redeemed in the future for discounts on other Microsoft upgrades. This program, combined with the fact that older versions of some Microsoft programs have glaring Y2K problems, should be enough to convince many people to shell out big bucks to upgrade to a more bloated Microsoft operating system. The company hopes to eradicate 99% of Windows 3.x installations by 2003. | |
Microsoft ActivePromo Campaign: "Windows Competitive Upgrade Offer" Microsoft's PR masterminds are planning a massive marketing campaign, code-named "ActivePromo 2000", to promote the upcoming release of Windows 2000 (scheduled for February 2001). This marketing campaign will include a "Windows Competitive Upgrade Offer" promotion. Users of non-Microsoft operating systems (Linux in particular) will be given the opportunity to trade-in their present OS for a free copy of Windows 98 (or NT 4.0) and Office 97. People (all three of them) who want to participate in this program will have to: 1. Mail their operating system's floppy disks or CD-ROMs to Microsoft 2. Agree to a two year contract with the Microsoft Network. 3. Agree (in writing) to the Competitive Upgrade License Agreement; one of the terms of which is that the user may not install, copy, or otherwise use a non-Microsoft OS for five years. | |
Invasion of the Dancing Penguin Those annoying, dancing cartoon characters embedded in software applications are no longer confined to Microsoft programs. They have entered the realm of Linux. A new Linux distribution under development, called LinTux, promises to provide a more "user-friendly" environment through its "Dancing Penguin" assistant. Dancing Tux will "guide" users through the installation process and will be a permanent fixture of the X root window. The LinTux staff demonstrated a prototype version of the Dancing Tux program to this Humorix reporter. It was certainly impressive, but, like the Dancing Paper Clip in Microsoft Office, it becomes annoying very fast. The one redeeming feature of LinTux is that, when the system is idle, Dancing Tux becomes a make-shift screen saver. The animations included in the prototype were quite amusing. For instance, in one scene, Tux chases Bill Gates through an Antarctic backdrop. In another animation, Tux can be seen drinking beers with his penguin pals and telling Microsoft jokes. | |
BSOD Simulator Users of Red Hat 6.0 are discovering a new feature that hasn't been widely advertised: a Blue Screen of Death simulator. By default, the bsodsim program activates when the user hits the virtually unused SysRq key (this is customizable) causing the system to switch to a character cell console to display a ficticious Blue Screen. Red Hat hails the bsodsim program as the "boss key" for the Linux world. One RH engineer said, "Workers are smuggling Linux boxes into companies that exclusively use Windows. This is all good and well until the PHB walks by and comments, 'That doesn't look like Windows...' With bsodsim, that problem is solved. The worker can hit the emergency SysRq key, and the system will behave just like Windows..." The bsodsim program doesn't stop at just showing a simulated error message. If the boss doesn't walk away, the worker can continue the illusion by hitting CTRL-ALT-DEL, which causes a simulated reboot. After showing the usual boot messages, bsodsim will run a simulated SCANDISK program indefinitely. The boss won't be able to tell the difference. If the boss continues to hang around, the worker can say, "SCANDISK is really taking a long time... maybe we should upgrade our computers. And don't you have something better to do than watch this computer reboot for the tenth time today?" | |
When Computers Crash HOLLYWOOD -- The FOX TV Network has announced a new series of "reality shows" to be aired over the summer. The series, "When Computers Crash", will consist of five hour-long shows documenting the aftermath of serious computer crashes, failures, and other problems. This show comes on the heels of other FOX reality shows such as "World's Funniest Antitrust Trial Bloopers", "When Stupid TV Network Executives Create Bad Show Ideas", and "When Lame Fortune Files Poke Fun At FOX Reality Shows"... To coincide with the series, FOX will sponsor a publicity gimmick called "Crash & Win!" Contest participants will download a free Windows 9x/NT program that keeps track of the number of Blue Screens, Illegal Operations, or other fatal errors that force a reboot. When a crash occurs, the program will log it in an encrypted database, which will be periodically uploaded to the "FOX Crash & Win!" server. Prizes such as a "Deciphering Windows Error Messages for Dummies" book, a 1999 Ford "Gasguzzler" Sport Utility Vehicle, or a lifetime supply of stress relief medication will be awarded to participants based on the number of crashes they log. | |
Jargon Coiner (#6) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * STOP MIRAGE: Trying to click on an imaginary Stop button on a program's toolbar after doing something you didn't want to. Usually caused as the result of excessive use of Netscape. * YA-PREFIX: Putting "another" or "yet another" in front of a name or tacking "YA" in front of an acronym. Example: "We could ya-prefix this fortune by titling it 'Yet Another Lame List of Fabricated Jargon'." * DOMAINEERING: Using a service like Netcraft to determine what operating system and webserver a particular domain is running. * NOT-A-SALTINE EXPLANATION: The canned response given to someone who uses the term "hacker" instead of "cracker". | |
OPPRESSED GEEK: Everybody keeps blaming me for the Y2K problem, the Melissa Virus, Windows crashes... you name it. When somebody finds out you're a bona fide geek, they start bugging you about computer problems. I frequently hear things like, "Why can't you geeks make Windows work right?", "What kind of idiot writes a program that can't handle the year 2000?", "Geeks are evil, all they do is write viruses", and "The Internet is the spawn of Satan". I'm afraid to admit I have extensive computing experience. When somebody asks what kind of job I have, I always lie. From my experience, admitting that you're a geek is an invitation to disaster. LARRY WALL: I know, I know. I sometimes say that I'm the founder of a pearl harvesting company instead of admitting that I'm the founder of the Perl programming language. ERIC S. RAYMOND: This is tragic. We can't live in a world like this. We need your donations to fight social oppression and ignorance against geekdom... -- Excerpt from the Geek Grok '99 telethon | |
Bill Gates Passes Turing Test LONDON, ENGLAND -- Microsoft proclaimed that they have passed the Turing Test by creating a Bill Gates multimedia simulacrum that crack BBC interviewer Jeremy Paxman couldn't distinguish from the real thing. "I never would have expected this," Paxman said about the Gates AI program. "After all, this Microsoft program actually worked for an extended period of time, something you don't see very often." Microsoft has plans to mass-produce the Bill Gates holographic simulation by 2010 or so. "The hardware just isn't there yet for home use," a Microserf explained. "By then, though, Intel's Itanium 6 Super Pro Plus III CPU running at 600 Ghz or whatever should be sufficient." Windows 2010 is expected to include the Bill Gates simulation, making the World's Richest Man(tm) accessible to the entire world. A newly printed brochure for the faux-Gates advertises, "Need help running Windows 2010? Bill Gates will sit beside you and guide you through the system. Have a question for the world's sexiest and smartest nerd? He'll answer it. Wondering if free and open source software is a plot by Communists freaks to overthrow the free market system? He'll be there to explain. Want to ask for a personal loan? Sorry, won't happen." | |
New Linux Companies Hope To Get Rich Quick (#3) In the "Cathedral and the Bazaar", ESR mentions that one motivation behind Open Source software is ego-gratification. That's where OpenEgo, Inc. comes in. For a fee, the hackers at OpenEgo will produce a piece of Open Source software and distribute it in your name, thus building up your reputation and ego. You can quickly become the envy of all your friends -- without lifting a finger. Want a higher-paying tech job? With OpenEgo's services, you'll look like an Open Source pro in no time, and have dozens of hot job offers from across the country. Says the OpenEgo sales literature, "Designing, implementing, maintaining, and promoting a successful Open Source project is a pain. However, at OpenEgo, we do all the work while you reap all the rewards..." A page on the OpenEgo site claims, "We produced a Linux kernel patch for one customer last year that was immediately accepted by Linus Torvalds... Within days the person gained employment at Transmeta and is now on the road to IPO riches..." Prices range from $1,000 for a small program to $5,000 for a kernel patch. | |
Excerpts From The First Annual Nerd Bowl (#6) (Round 4, the Who Wants To Be A Billionaire? Round) ERIC RAYMOND (Moderator): Here's the second question: Who is the primary author of the world-renowned fetchmail program? [Bzzz] Yes, Hemos? HEMOS: Mr. Eric... Fetch of Cincinnati, Ohio. RAYMOND: No, no, no! The answer is me, me, me, you idiots! Sheesh. I'm resetting your points to zero for that. ALAN COX: Are you going to ask any questions that are not about you? RAYMOND: Um... let's see... yeah, there's one or two here... Okay, here's question three... What loud-mouthed hippie-spirtualist founder of the GNU Project keeps demanding that everybody use the crappy term "Free Software" instead of "Open Source"? [Bzzz] Yes, Anonymous Coward? ANONCOW: Eric Raymond! RAYMOND: Why you little [expletive]! I'm going to... | |
Affordable Virtual Beowulf Cluster Every nerd drools over Beowulf clusters, but very few have even seen one, much less own one. Until now, that is. Eric Gylgen, the open source hacker famous for EviL (the dancing ASCII paperclip add-on to vi), is working on a program that will emulate Beowulf clusters on a standard desktop PC. "Of course," he added candidly, "the performance of my virtual cluster will be many orders of magnitude less than a real cluster, but that's not really the point. I just want to be able to brag that I run a 256 node cluster. Nobody has to know I only spent $500 on the hardware it uses." Eric has prior experience in this field. Last month he successfully built a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing calculators, various digital cameras, and even some TRS-80s. He demonstrated a pre-alpha version of his VirtualEpicPoem software to us yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which each node, running Linux, was emulating its own 16 node cluster in which each node, running Bochs, was emulating VMWare to emulate Linux running old Amiga software. The system was extremely slow, but it worked. | |
Brief History Of Linux (#17) Terrible calamity IBM chose Microsoft's Quick & Dirty Operating System instead of CP/M for its new line of PCs. QDOS (along with the abomination known as EDLIN) had been acquired from a Seattle man, Tim Paterson, for the paltry sum of $50,000. "Quick" and "Dirty" were truly an accurate description of this system, because IBM's quality assurance department discovered 300 bugs in QDOS's 8,000 lines of assember code (that's about 1 bug per 27 lines -- which, at the time, was appalling, but compared with Windows 98 today, it really wasn't that shabby). Thanks in part to IBM's new marketing slogan, "Nobody Ever Got Fired For Choosing IBM(tm)", and the release of the VisiCalc spreadsheet program that everybody and their brother wanted, IBM PCs running DOS flew off the shelves and, unfortunately, secured Microsoft's runaway success. Bill Gates was now on his way to the Billionaire's Club; his days as a mediocre programmer were long gone: he was now a Suit. The only lines of code he would ever see would be the passcodes to his Swiss bank accounts. | |
Brief History Of Linux (#22) RMS had a horrible, terrible dream set in 2020 in which all of society was held captive by copyright law. In particular, everyone's brain waves were monitored by the US Dept. of Copyrights. If your thoughts referenced a copyrighted idea, you had to pay a royalty. To make it worse, a handful of corporations held fully 99.9% of all intellectual property rights. Coincidentally, Bill Gates experienced a similar dream that same night. To him, however, it was not a horrible, terrible nightmare, but a wonderful utopian vision. The thought of lemmings... er, customers paying a royalty everytime they hummed a copyrighted song in their head or remembered a passage in a book was simply too marvelous for the budding monopolist. RMS, waking up from his nightmare, vowed to fight the oncoming Copyright Nightmare. The GNU Project was born. His plan called for a kernel, compiler, editor, and other tools. Unfortunately, RMS became bogged down with Emacs that the kernel, HURD, was shoved on the back burner. Built with LISP (Lots of Incomprehensible Statements with Parentheses), Emacs became bloated in a way no non-Microsoft program ever has. Indeed, for a short while RMS pretended that Emacs really was the GNU OS kernel. | |
DeCSS T-Shirt Used To Commit Piracy! College student Cody Potter stunned the world yesterday when he used a T-shirt with the printed DeCSS source code to illegally copy a DVD of "Star Trek XXI: We Promise This Is The Last One". Well, it wasn't the actual DeCSS source code. The shirt contained a Perl script which spits out a bash shell script which produces a GW-BASIC program which outputs a ROT13-encoded Python script that manufactures a Pig-Latin-encoded Java program that finally produces the real DeCSS C source code when executed. | |
The Next Big Thing: "Clairvoyant Consultants" Nobody likes to deal with tech support or customer service reps. A growing number of people are getting sick of being put on hold for three hours and then paying ridiculous "per incident" fees so some Microserf can tell them to "reinstall the operating system!" Desperate users are turning to an unlikely source to diagnose and fix software problems: psychics. Palm[Pilot] readers, 1-900 number operators, and clairvoyant consultants are quickly becoming the hottest careers in the tech sector. Explained Madam Cosmos, owner of the Main Street Mysticism Temple in Keokuk, Iowa, "With my special powers, I can track down the source of any problem. Got a rogue Registry entry that's causing Bluescreens? I'll find it. Missing a curly bracket in your Perl program but can't locate it because the error messages are so unhelpful? I'll know where it is even before you walk in my door." | |
Unobfuscated Perl (#1) A rogue group of Perl hackers has presented a plan to add a "use really_goddamn_strict" pragma that would enforce readability and UNobfuscation. With this pragma in force, the Perl compiler might say: * Warning: Program contains zero comments. You've probably never seen or used one before; they begin with a # symbol. Please start using them or else a representative from the nearest Perl Mongers group will come to your house and beat you over the head with a cluestick. * Warning: Program uses a cute trick at line 125 that might make sense in C. But this isn't C! * Warning: Code at line 412 indicates that programmer is an idiot. Please correct error between chair and monitor. * Warning: While There's More Than One Way To Do It, your method at line 523 is particularly stupid. Please try again. | |
UNobfuscated Perl Code Contest The Perl Gazette has announced the winners in the First Annual Unobfuscated Perl Code Contest. First place went to Edwin Fuller, who submitted this unobfuscated program: #!/usr/bin/perl print "Hello world!\n"; "This was definitely a challenging contest," said an ecstatic Edwin Fuller. "I've never written a Perl program before that didn't have hundreds of qw( $ @ % & * | ? / \ ! # ~ ) symbols. I really had to summon all of my programming skills to produce an unobfuscated program." ...The second place winner, Mrs. Sea Pearl, submitted the following code: #!/usr/bin/perl use strict; # Do nothing, successfully exit(0); | |
World Domination, One CPU Cycle At A Time Forget about searching for alien signals or prime numbers. The real distributed computing application is "Domination@World", a program to advocate Linux and Apache to every website in the world that uses Windows and IIS. The goal of the project is to probe every IP number to determine what kind of platform each Net-connected machine is running. "That's a tall order... we need lots of computers running our Domination@World clients to help probe every nook and cranny of the Net," explained Mr. Zell Litt, the project head. After the probing is complete, the second phase calls for the data to be cross-referenced with the InterNIC whois database. "This way we'll have the names, addresses, and phone numbers for every Windows-using system administrator on the planet," Zell gloated. "That's when the fun begins." The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan for extreme advocacy. As part of LART, each Linux User Group will receive a list of the Windows-using weenies in their region. The LUG will then be able to employ various advocacy techniques, ranging from a soft-sell approach (sending the target a free Linux CD in the mail) all the way to "LARTcon 5" (cracking into their system and forcibly installing Linux). | |
Solving The Virus Problem Once And For All System administrators across the globe have tried installing anti-virus software. They've tried lecturing employees not to open unsolicited email attachments. They've tried installing firewalls and the latest security patches. But even with these precautions, email viruses continue to rank third only to Solitaire and the Blue Screen Of Death in the amount of lost productivity they cause. Meanwhile, Microsoft Exchange and LookOut! remain as the number one virus delivery products on the market today. But maybe not for much longer. A group of disgruntled administrators have teamed up to produce and sell a brand new way to fight viruses, one that attacks the root of the problem: stupid users. Salivating Dogs, Inc. of Ohio has unveiled the "Clue Delivery System" (CDS), a small device that plugs into the back of a standard PC keyboard and delivers a mild electric shock whenever the luser does something stupid. The device is triggered by a Windows program that detects when the luser attempts to open an unsolicited email attachment or perform another equally dangerous virus-friendly action. | |
> Is there anything else I can contribute? The latitude and longtitude of the bios writers current position, and a ballistic missile. Please boot 2.2.18pre24 (not pre25) on the machine and send me its DMI strings printed at boot time. I'll add it to the 'stupid morons who cant program and wouldnt know QA if it hit them on the head with a mallet' list - Alan Cox on BIOS bugs | |
"A computer is a state machine. Threads are for people who can't program state machines." - Alan Cox | |
I sat laughing snidely into my notebook until they showed me a PC running Linux.... And did this PC choke? Did it stutter? Did it, even once, say that this program has performed an illegal operation and must be shut down? No. And this is just on the client. -- LAN Times | |
<Knghtbrd> hardcopy is for wussies <Topher> computer program listings....next, on HardCopy | |
<knghtbrd> Program received signal SIGSEGV, Segmentation fault. <knghtbrd> 0x40095fb0 in memchr () from /lib/libc.so.6 <knghtbrd> (gdb) bt <knghtbrd> #0 0x40095fb0 in memchr () from /lib/libc.so.6 <knghtbrd> #1 0x0 in ?? () <knghtbrd> Well That's Really Helpful * knghtbrd trades gdb for a nice ouija board - it'll help more | |
<hoponpop> my program works if i take out the bugs. | |
When you say "I wrote a program that crashed Windows", people just stare at you blankly and say "Hey, I got those with the system, *for free*". -- Linus Torvalds | |
The chat program is in public domain. This is not the GNU public license. If it breaks then you get to keep both pieces. -- Copyright notice for the chat program | |
When you say 'I wrote a program that crashed Windows', people just stare at you blankly and say 'Hey, I got those with the system, *for free*'. -- Linus Torvalds | |
The primary difference [...] is that the Java programm will reliably and obviously crash, whereas the C Program will do something obscure -- Java Language Tutorial | |
When you have 200 programmers trying to write code for one product, like Win95 or NT, what you get is a multipule personality program. By definition, the real problem is that these programs are psychotic by nature and make people crazy when they use them. -- Joan Brewer on alt.destroy.microsoft | |
<james> Are we going to make an emacs out of apt? APT - Debian in a program. It even does your laundry -- Seen on #Debian | |
If you want to program in C, program in C. It's a nice language. I use it occasionally... :-) -- Larry Wall in <7577@jpl-devvax.JPL.NASA.GOV> | |
If you want your program to be readable, consider supplying the argument. -- Larry Wall in the perl man page | |
But then it's a bit odd to think that declaring something int could actually slow down the program, if it ended up forcing more conversions back to string. -- Larry Wall in <199708040319.UAA16213@wall.org> | |
And we can always supply them with a program that makes identical files into links to a single file. -- Larry Wall in <199709292012.NAA09616@wall.org> | |
If you remove stricture from a large Perl program currently, you're just installing delayed bugs, whereas with this feature, you're installing an instant bug that's easily fixed. Whoopee. -- Larry Wall in <199710050130.SAA04762@wall.org> | |
What PROGRAM are they watching? |