DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
protocol
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Anyone who considers protocol unimportant has never dealt with a cat.
                -- R. Heinlein
/*
* [...] Note that 120 sec is defined in the protocol as the maximum
* possible RTT.  I guess we'll have to use something other than TCP
* to talk to the University of Mars.
* PAWS allows us longer timeouts and large windows, so once implemented
* ftp to mars will work nicely.
*/
(from /usr/src/linux/net/inet/tcp.c, concerning RTT [retransmission timeout])
Party-bug in the Aloha protocol.
transient bus protocol violation
If you ever want to have a lot of fun, I recommend that you go off and program
an imbedded system.  The salient characteristic of an imbedded system is that
it cannot be allowed to get into a state from which only direct intervention
will suffice to remove it.  An imbedded system can't permanently trust anything
it hears from the outside world.  It must sniff around, adapt, consider, sniff
around, and adapt again.  I'm not talking about ordinary modular programming
carefulness here.  No.  Programming an imbedded system calls for undiluted
raging maniacal paranoia.  For example, our ethernet front ends need to know
what network number they are on so that they can address and route PUPs
properly.  How do you find out what your network number is?  Easy, you ask a
gateway.  Gateways are required by definition to know their correct network
numbers.  Once you've got your network number, you start using it and before
you can blink you've got it wired into fifteen different sockets spread all
over creation.  Now what happens when the panic-stricken operator realizes he
was running the wrong version of the gateway which was giving out the wrong
network number?  Never supposed to happen.  Tough.  Supposing that your
software discovers that the gateway is now giving out a different network
number than before, what's it supposed to do about it?  This is not discussed
in the protocol document.  Never supposed to happen.  Tough.  I think you
get my drift.
"We invented a new protocol and called it Kermit, after Kermit the Frog,
star of "The Muppet Show." [3]

[3]  Why?  Mostly because there was a Muppets calendar on the wall when we
were trying to think of a name, and Kermit is a pleasant, unassuming sort of
character.  But since we weren't sure whether it was OK to name our protocol
after this popular television and movie star, we pretended that KERMIT was an
acronym; unfortunately, we could never find a good set of words to go with the
letters, as readers of some of our early source code can attest.  Later, while
looking through a name book for his forthcoming baby, Bill Catchings noticed
that "Kermit" was a Celtic word for "free", which is what all Kermit programs
should be, and words to this effect replaced the strained acronyms in our
source code (Bill's baby turned out to be a girl, so he had to name her Becky
instead).  When BYTE Magazine was preparing our 1984 Kermit article for
publication, they suggested we contact Henson Associates Inc. for permission
to say that we did indeed name the protocol after Kermit the Frog.  Permission
was kindly granted, and now the real story can be told.  I resisted the
temptation, however, to call the present work "Kermit the Book."
                -- Frank da Cruz, "Kermit - A File Transfer Protocol"
A diplomat's life consists of three things: protocol, Geritol, and alcohol.
                -- Adlai Stevenson
handshaking protocol, n:
        A process employed by hostile hardware devices to initate a
        terse but civil dialogue, which, in turn, is characterized by
        occasional misunderstanding, sulking, and name-calling.
MAFIA, n:
        [Acronym for Mechanized Applications in Forced Insurance
Accounting.] An extensive network with many on-line and offshore
subsystems running under OS, DOS, and IOS.  MAFIA documentation is
rather scanty, and the MAFIA sales office exhibits that testy
reluctance to bona fide inquiries which is the hallmark of so many DP
operations.  From the little that has seeped out, it would appear that
MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped
variant of SNA, in which extended handshakes also perform complex
security functions.  The known timesharing aspects of MAFIA point to a
more than usually autocratic operating system.  Screen prompts carry an
imperative, nonrefusable weighting (most menus offer simple YES/YES
options, defaulting to YES) that precludes indifference or delay.
Uniquely, all editing under MAFIA is performed centrally, using a
powerful rubout feature capable of erasing files, filors, filees, and
entire nodal aggravations.
                -- Stan Kelly-Bootle, "The Devil's DP Dictionary"
If Dr. Seuss Were a Technical Writer.....

Here's an easy game to play.
Here's an easy thing to say:

If a packet hits a pocket on a socket on a port,
And the bus is interrupted as a very last resort,
And the address of the memory makes your floppy disk abort,
Then the socket packet pocket has an error to report!

If your cursor finds a menu item followed by a dash,
And the double-clicking icon puts your window in the trash,
And your data is corrupted 'cause the index doesn't hash,
then your situation's hopeless, and your system's gonna crash!

You can't say this?  What a shame, sir!
We'll find you another game, sir.

If the label on the cable on the table at your house,
Says the network is connected to the button on your mouse,
But your packets want to tunnel on another protocol,
That's repeatedly rejected by the printer down the hall,
And your screen is all distorted by the side effects of gauss,
So your icons in the window are as wavy as a souse,
Then you may as well reboot and go out with a bang,
'Cause as sure as I'm a poet, the sucker's gonna hang!

When the copy of your floppy's getting sloppy on the disk,
And the microcode instructions cause unnecessary risc,
Then you have to flash your memory and you'll want to ram your rom.
Quickly turn off the computer and be sure to tell your mom!

                -- DementDJ@ccip.perkin-elmer.com (DementDJ) [rec.humor.funny]
Microsoft Fights Linux -- By Contributing Kernel Patches

If you can't beat 'em, join 'em... and then destory 'em. That seems to be the
new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or
patent war, Microsoft operatives are doing something totally out of character:
they are contributing patches for the Linux kernel and other programs.

Don't worry, Microsoft is still evil. It's all part of a massive denial of
service attack against Linus Torvalds designed to bring kernel development to
a standstill. By sending over 10,000 patches per minute by email to Linus and
other top kernel hackers, Microsoft has exposed Linux's Achilles heel.

"I can't believe this is happening!" one stressed-out kernel hacker said at a
press conference on IRC. "If this goes on, we may have to conduct kernel
development over some other network protocol, like avian carriers... Aw crap,
there's smoke coming from my email server! Ahh... it can't handle the load!"
At this point the developer cut off and we haven't heard from him since.

At first Linus was unsure where the deluge of patches was coming from. But
when he saw one patch to replace kernel panics with bluescreens, the source
was pretty obvious. "Oh, and the fact that all of the patches are covered by
Microsoft's GPL [Grossly Private License] was a dead giveaway, too,"
Severe Acronym Shortage Cripples Computer Industry

SILICON VALLEY, CALIFORNIA (SVC) -- According to a recent study by the
Blartner Group, 99.5% of all possible five letter combinations have
already been appropriated for computer industry acronyms. The impending
shortage of 5LC's is casting a dark shadow over the industry, which relies
heavily on short, easy-to-remember acronyms for everything.

"Acronym namespace collisions (ANCs) are increasing at a fantastic rate
and threaten the very fabric of the computing world," explained one ZD
pundit. "For example, when somebody talks about XP, I don't know whether
they mean eXtreme Programming or Microsoft's eXceptionally Pathetic
operating system. We need to find a solution now or chaos will result."

Leaders of several SVC companies have floated the idea of an
"industry-wide acronym conservation protocol" (IWACP -- one of the few
5LCs not already appropriated). Explained Bob Smith, CTO of IBM, "If
companies would voluntarily limit the creation of new acronyms while
recycling outdated names, we could reduce much of the pollution within the
acronym namespace ourselves. The last thing we want is for Congress to get
involved and try to impose a solution for this SAS (Severe Acronym
Shortage) that would likely only create many new acronyms in the process."
Alan Cox wrote:
> RFC1122 also requires that your protocol stack SHOULD be able to leap tall
> buldings at a single bound of course...

And, of course my protocol stack does :) It is also a floor wax, AND a
dessert topping!-)

        - Rick Jones trying to sell his protocol stack
/*
* [...] Note that 120 sec is defined in the protocol as the maximum
* possible RTT.  I guess we'll have to use something other than TCP
* to talk to the University of Mars.
* PAWS allows us longer timeouts and large windows, so once implemented
* ftp to mars will work nicely.
*/
        -- from /usr/src/linux/net/inet/tcp.c, concerning RTT [round trip time]
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners