Proverbs, aphorisms, quotations (English) | by Linux fortune |
God help the troubadour who tries to be a star. The more that you try to find success, the more that you will fail. -- Phil Ochs, on the Second System Effect | |
Public use of any portable music system is a virtually guaranteed indicator of sociopathic tendencies. -- Zoso | |
The big problem with pornography is defining it. You can't just say it's pictures of people naked. For example, you have these primitive African tribes that exist by chasing the wildebeest on foot, and they have to go around largely naked, because, as the old tribal saying goes: "N'wam k'honi soit qui mali," which means, "If you think you can catch a wildebeest in this climate and wear clothes at the same time, then I have some beach front property in the desert region of Northern Mali that you may be interested in." So it's not considered pornographic when National Geographic publishes color photographs of these people hunting the wildebeest naked, or pounding one rock onto another rock for some primitive reason naked, or whatever. But if National Geographic were to publish an article entitled "The Girls of the California Junior College System Hunt the Wildebeest Naked," some people would call it pornography. But others would not. And still others, such as the Spectacularly Rev. Jerry Falwell, would get upset about seeing the wildebeest naked. -- Dave Barry, "Pornography" | |
We're constantly being bombarded by insulting and humiliating music, which people are making for you the way they make those Wonder Bread products. Just as food can be bad for your system, music can be bad for your spirtual and emotional feelings. It might taste good or clever, but in the long run, it's not going to do anything for you. -- Bob Dylan, "LA Times", September 5, 1984 | |
DOS: n., A small annoying boot virus that causes random spontaneous system crashes, usually just before saving a massive project. Easily cured by UNIX. See also MS-DOS, IBM-DOS, DR-DOS. (from David Vicker's .plan) | |
Fatal Error: Found [MS-Windows] System -> Repartitioning Disk for Linux... (By cbbrown@io.org, Christopher Browne) | |
Microsoft Corp., concerned by the growing popularity of the free 32-bit operating system for Intel systems, Linux, has employed a number of top programmers from the underground world of virus development. Bill Gates stated yesterday: "World domination, fast -- it's either us or Linus". Mr. Torvalds was unavailable for comment ... (rjm@swift.eng.ox.ac.uk (Robert Manners), in comp.os.linux.setup) | |
"If the future navigation system [for interactive networked services on the NII] looks like something from Microsoft, it will never work." (Chairman of Walt Disney Television & Telecommunications) | |
"If you want to travel around the world and be invited to speak at a lot of different places, just write a Unix operating system." (By Linus Torvalds) | |
"Linux: the operating system with a CLUE... Command Line User Environment". (seen in a posting in comp.software.testing) | |
"Note that if I can get you to \"su and say\" something just by asking, you have a very serious security problem on your system and you should look into it." (By Paul Vixie, vixie-cron 3.0.1 installation notes) | |
"sic transit discus mundi" (From the System Administrator's Guide, by Lars Wirzenius) | |
"Waving away a cloud of smoke, I look up, and am blinded by a bright, white light. It's God. No, not Richard Stallman, or Linus Torvalds, but God. In a booming voice, He says: "THIS IS A SIGN. USE LINUX, THE FREE UNIX SYSTEM FOR THE 386." (Matt Welsh) | |
"What you end up with, after running an operating system concept through these many marketing coffee filters, is something not unlike plain hot water." (By Matt Welsh) | |
`When you say "I wrote a program that crashed Windows", people just stare at you blankly and say "Hey, I got those with the system, *for free*".' (By Linus Torvalds) | |
not enough memory, go get system upgrade | |
boss forgot system password | |
bank holiday - system operating credits not recharged | |
high pressure system failure | |
failed trials, system needs redesigned | |
system has been recalled | |
need to wrap system in aluminum foil to fix problem | |
system needs to be rebooted | |
The file system is full of it | |
backup tape overwritten with copy of system manager's favourite CD | |
halon system went off and killed the operators. | |
Daemons loose in system. | |
User was distributing pornography on server; system seized by FBI. | |
You can tune a file system, but you can't tune a fish (from most tunefs man pages) | |
system consumed all the paper for paging | |
runaway cat on system. | |
The Borg tried to assimilate your system. Resistance is futile. | |
Due to Federal Budget problems we have been forced to cut back on the number of users able to access the system at one time. (namely none allowed....) | |
microelectronic Riemannian curved-space fault in write-only file system | |
tachyon emissions overloading the system | |
Repeated reboots of the system failed to solve problem | |
Awash with unfocused desire, Everett twisted the lobe of his one remaining ear and felt the presence of somebody else behind him, which caused terror to push through his nervous system like a flash flood roaring down the mid-fork of the Feather River before the completion of the Oroville Dam in 1959. -- Grand Panjandrum's Special Award, 1984 Bulwer-Lytton bad fiction contest. | |
Delay not, Caesar. Read it instantly. -- Shakespeare, "Julius Caesar" 3,1 Here is a letter, read it at your leisure. -- Shakespeare, "Merchant of Venice" 5,1 [Quoted in "VMS Internals and Data Structures", V4.4, when referring to I/O system services.] | |
For the fashion of Minas Tirith was such that it was built on seven levels, each delved into a hill, and about each was set a wall, and in each wall was a gate. -- J.R.R. Tolkien, "The Return of the King" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to system overview.] | |
A complex system that works is invariably found to have evolved from a simple system that works. | |
A manager went to the master programmer and showed him the requirements document for a new application. The manager asked the master: "How long will it take to design this system if I assign five programmers to it?" "It will take one year," said the master promptly. "But we need this system immediately or even sooner! How long will it take it I assign ten programmers to it?" The master programmer frowned. "In that case, it will take two years." "And what if I assign a hundred programmers to it?" The master programmer shrugged. "Then the design will never be completed," he said. -- Geoffrey James, "The Tao of Programming" | |
A novice asked the Master: "Here is a programmer that never designs, documents, or tests his programs. Yet all who know him consider him one of the best programmers in the world. Why is this?" The Master replies: "That programmer has mastered the Tao. He has gone beyond the need for design; he does not become angry when the system crashes, but accepts the universe without concern. He has gone beyond the need for documentation; he no longer cares if anyone else sees his code. He has gone beyond the need for testing; each of his programs are perfect within themselves, serene and elegant, their purpose self-evident. Truly, he has entered the mystery of the Tao." -- Geoffrey James, "The Tao of Programming" | |
A student, in hopes of understanding the Lambda-nature, came to Greenblatt. As they spoke a Multics system hacker walked by. "Is it true", asked the student, "that PL-1 has many of the same data types as Lisp?" Almost before the student had finished his question, Greenblatt shouted, "FOO!", and hit the student with a stick. | |
=== ALL USERS PLEASE NOTE ======================== A new system, the CIRCULATORY system, has been added. The long-experimental CIRCULATORY system has been released to users. The Lisp Machine uses Type B fluid, the L machine uses Type A fluid. When the switch to Common Lisp occurs both machines will, of course, be Type O. Please check fluid level by using the DIP stick which is located in the back of VMI monitors. Unchecked low fluid levels can cause poor paging performance. | |
=== ALL USERS PLEASE NOTE ======================== JCL support as alternative to system menu. In our continuing effort to support languages other than LISP on the CADDR, we have developed an OS/360-compatible JCL. This can be used as an alternative to the standard system menu. Type System J to get to a JCL interactive read-execute-diagnose loop window. [Note that for 360 compatibility, all input lines are truncated to 80 characters.] This window also maintains a mouse-sensitive display of critical job parameters such as dataset allocation, core allocation, channels, etc. When a JCL syntax error is detected or your job ABENDs, the window-oriented JCL debugger is entered. The JCL debugger displays appropriate OS/360 error messages (such as IEC703, "disk error") and allows you to dequeue your job. | |
... an anecdote from IBM's Yorktown Heights Research Center. When a programmer used his new computer terminal, all was fine when he was sitting down, but he couldn't log in to the system when he was standing up. That behavior was 100 percent repeatable: he could always log in when sitting and never when standing. Most of us just sit back and marvel at such a story; how could that terminal know whether the poor guy was sitting or standing? Good debuggers, though, know that there has to be a reason. Electrical theories are the easiest to hypothesize: was there a loose with under the carpet, or problems with static electricity? But electrical problems are rarely consistently reproducible. An alert IBMer finally noticed that the problem was in the terminal's keyboard: the tops of two keys were switched. When the programmer was seated he was a touch typist and the problem went unnoticed, but when he stood he was led astray by hunting and pecking. -- "Programming Pearls" column, by Jon Bentley in CACM February 1985 | |
An elephant is a mouse with an operating system. | |
As part of the conversion, computer specialists rewrote 1,500 programs; a process that traditionally requires some debugging. -- USA Today, referring to the Internal Revenue Service conversion to a new computer system. | |
As the system comes up, the component builders will from time to time appear, bearing hot new versions of their pieces -- faster, smaller, more complete, or putatively less buggy. The replacement of a working component by a new version requires the same systematic testing procedure that adding a new component does, although it should require less time, for more complete and efficient test cases will usually be available. -- Frederick Brooks Jr., "The Mythical Man Month" | |
Both models are identical in performance, functional operation, and interface circuit details. The two models, however, are not compatible on the same communications line connection. -- Bell System Technical Reference | |
Build a system that even a fool can use and only a fool will want to use it. | |
But in our enthusiasm, we could not resist a radical overhaul of the system, in which all of its major weaknesses have been exposed, analyzed, and replaced with new weaknesses. -- Bruce Leverett, "Register Allocation in Optimizing Compilers" | |
C++ is the best example of second-system effect since OS/360. | |
Computers are unreliable, but humans are even more unreliable. Any system which depends on human reliability is unreliable. -- Gilb | |
Congratulations! You are the one-millionth user to log into our system. If there's anything special we can do for you, anything at all, don't hesitate to ask! | |
During the next two hours, the system will be going up and down several times, often with lin~po_~{po ~poz~ppo\~{ o n~po_~{o[po ~y oodsou>#w4k**n~po_~{ol;lkld;f;g;dd;po\~{o | |
Each new user of a new system uncovers a new class of bugs. -- Kernighan | |
/earth: file system full. | |
Established technology tends to persist in the face of new technology. -- G. Blaauw, one of the designers of System 360 | |
Fortune suggests uses for YOUR favorite UNIX commands! Try: [Where is Jimmy Hoffa? (C shell) ^How did the^sex change operation go? (C shell) "How would you rate BSD vs. System V? %blow (C shell) 'thou shalt not mow thy grass at 8am' (C shell) got a light? (C shell) !!:Say, what do you think of margarine? (C shell) PATH=pretending! /usr/ucb/which sense (Bourne shell) make love make "the perfect dry martini" man -kisses dog (anything up to 4.3BSD) i=Hoffa ; >$i; $i; rm $i; rm $i (Bourne shell) | |
HOST SYSTEM NOT RESPONDING, PROBABLY DOWN. DO YOU WANT TO WAIT? (Y/N) | |
HOST SYSTEM RESPONDING, PROBABLY UP... | |
How can you work when the system's so crowded? | |
How much does it cost to entice a dope-smoking UNIX system guru to Dayton? -- Brian Boyle, UNIX/WORLD's First Annual Salary Survey | |
If the Tao is great, then the operating system is great. If the operating system is great, then the compiler is great. If the compiler is great, then the application is great. If the application is great, then the user is pleased and there is harmony in the world. The Tao gave birth to machine language. Machine language gave birth to the assembler. The assembler gave birth to the compiler. Now there are ten thousand languages. Each language has its purpose, however humble. Each language expresses the Yin and Yang of software. Each language has its place within the Tao. But do not program in COBOL if you can avoid it. -- Geoffrey James, "The Tao of Programming" | |
If you ever want to have a lot of fun, I recommend that you go off and program an imbedded system. The salient characteristic of an imbedded system is that it cannot be allowed to get into a state from which only direct intervention will suffice to remove it. An imbedded system can't permanently trust anything it hears from the outside world. It must sniff around, adapt, consider, sniff around, and adapt again. I'm not talking about ordinary modular programming carefulness here. No. Programming an imbedded system calls for undiluted raging maniacal paranoia. For example, our ethernet front ends need to know what network number they are on so that they can address and route PUPs properly. How do you find out what your network number is? Easy, you ask a gateway. Gateways are required by definition to know their correct network numbers. Once you've got your network number, you start using it and before you can blink you've got it wired into fifteen different sockets spread all over creation. Now what happens when the panic-stricken operator realizes he was running the wrong version of the gateway which was giving out the wrong network number? Never supposed to happen. Tough. Supposing that your software discovers that the gateway is now giving out a different network number than before, what's it supposed to do about it? This is not discussed in the protocol document. Never supposed to happen. Tough. I think you get my drift. | |
If you think the system is working, ask someone who's waiting for a prompt. | |
In practice, failures in system development, like unemployment in Russia, happens a lot despite official propaganda to the contrary. -- Paul Licker | |
It is a period of system war. User programs, striking from a hidden directory, have won their first victory against the evil Administrative Empire. During the battle, User spies managed to steal secret source code to the Empire's ultimate program: the Are-Em Star, a privileged root program with enough power to destroy an entire file structure. Pursued by the Empire's sinister audit trail, Princess _LPA0 races ~ aboard her shell script, custodian of the stolen listings that could save her people, and restore freedom and games to the network... -- DECWARS | |
It is a very humbling experience to make a multimillion-dollar mistake, but it is also very memorable. I vividly recall the night we decided how to organize the actual writing of external specifications for OS/360. The manager of architecture, the manager of control program implementation, and I were threshing out the plan, schedule, and division of responsibilities. The architecture manager had 10 good men. He asserted that they could write the specifications and do it right. It would take ten months, three more than the schedule allowed. The control program manager had 150 men. He asserted that they could prepare the specifications, with the architecture team coordinating; it would be well-done and practical, and he could do it on schedule. Furthermore, if the architecture team did it, his 150 men would sit twiddling their thumbs for ten months. To this the architecture manager responded that if I gave the control program team the responsibility, the result would not in fact be on time, but would also be three months late, and of much lower quality. I did, and it was. He was right on both counts. Moreover, the lack of conceptual integrity made the system far more costly to build and change, and I would estimate that it added a year to debugging time. -- Frederick Brooks Jr., "The Mythical Man Month" | |
It must be remembered that there is nothing more difficult to plan, more doubtful of success, nor more dangerous to manage, than the creation of a new system. For the initiator has the emnity of all who would profit by the preservation of the old institutions and merely lukewarm defenders in those who would gain by the new ones. -- Niccolo Machiavelli, 1513 | |
It turned out that the worm exploited three or four different holes in the system. From this, and the fact that we were able to capture and examine some of the source code, we realized that we were dealing with someone very sharp, probably not someone here on campus. -- Dr. Richard LeBlanc, associate professor of ICS, in Georgia Tech's campus newspaper after the Internet worm. | |
It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption. | |
`Lasu' Releases SAG 0.3 -- Freeware Book Takes Paves For New World Order by staff writers Helsinki, Finland, August 6, 1995 -- In a surprise movement, Lars ``Lasu'' Wirzenius today released the 0.3 edition of the ``Linux System Administrators' Guide''. Already an industry non-classic, the new version sports such overwhelming features as an overview of a Linux system, a completely new climbing session in a tree, and a list of acknowledgements in the introduction. The SAG, as the book is affectionately called, is one of the corner stones of the Linux Documentation Project. ``We at the LDP feel that we wouldn't be able to produce anything at all, that all our work would be futile, if it weren't for the SAG,'' says Matt Welsh, director of LDP, Inc. The new version is still distributed freely, now even with a copyright that allows modification. ``More dough,'' explains the author. Despite insistent rumors about blatant commercialization, the SAG will probably remain free. ``Even more dough,'' promises the author. The author refuses to comment on Windows NT and Windows 96 versions, claiming not to understand what the question is about. Industry gossip, however, tells that Bill Gates, co-founder and CEO of Microsoft, producer of the Windows series of video games, has visited Helsinki several times this year. Despite of this, Linus Torvalds, author of the word processor Linux with which the SAG was written, is not worried. ``We'll have world domination real soon now, anyway,'' he explains, ``for 1.4 at the lastest.'' ... -- Lars Wirzenius <wirzeniu@cs.helsinki.fi> [comp.os.linux.announce] | |
LOGO for the Dead LOGO for the Dead lets you continue your computing activities from "The Other Side." The package includes a unique telecommunications feature which lets you turn your TRS-80 into an electronic Ouija board. Then, using Logo's graphics capabilities, you can work with a friend or relative on this side of the Great Beyond to write programs. The software requires that your body be hardwired to an analog-to-digital converter, which is then interfaced to your computer. A special terminal (very terminal) program lets you talk with the users through Deadnet, an EBBS (Ectoplasmic Bulletin Board System). LOGO for the Dead is available for 10 percent of your estate from NecroSoft inc., 6502 Charnelhouse Blvd., Cleveland, OH 44101. -- '80 Microcomputing | |
Making files is easy under the UNIX operating system. Therefore, users tend to create numerous files using large amounts of file space. It has been said that the only standard thing about all UNIX systems is the message-of-the-day telling users to clean up their files. -- System V.2 administrator's guide | |
Never trust an operating system. | |
No part of this message may reproduce, store itself in a retrieval system, or transmit disease, in any form, without the permissiveness of the author. -- Chris Shaw | |
NOTE: No warranties, either express or implied, are hereby given. All software is supplied as is, without guarantee. The user assumes all responsibility for damages resulting from the use of these features, including, but not limited to, frustration, disgust, system abends, disk head-crashes, general malfeasance, floods, fires, shark attack, nerve gas, locust infestation, cyclones, hurricanes, tsunamis, local electromagnetic disruptions, hydraulic brake system failure, invasion, hashing collisions, normal wear and tear of friction surfaces, comic radiation, inadvertent destruction of sensitive electronic components, windstorms, the Riders of Nazgul, infuriated chickens, malfunctioning mechanical or electrical sexual devices, premature activation of the distant early warning system, peasant uprisings, halitosis, artillery bombardment, explosions, cave-ins, and/or frogs falling from the sky. | |
One of the questions that comes up all the time is: How enthusiastic is our support for UNIX? Unix was written on our machines and for our machines many years ago. Today, much of UNIX being done is done on our machines. Ten percent of our VAXs are going for UNIX use. UNIX is a simple language, easy to understand, easy to get started with. It's great for students, great for somewhat casual users, and it's great for interchanging programs between different machines. And so, because of its popularity in these markets, we support it. We have good UNIX on VAX and good UNIX on PDP-11s. It is our belief, however, that serious professional users will run out of things they can do with UNIX. They'll want a real system and will end up doing VMS when they get to be serious about programming. With UNIX, if you're looking for something, you can easily and quickly check that small manual and find out that it's not there. With VMS, no matter what you look for -- it's literally a five-foot shelf of documentation -- if you look long enough it's there. That's the difference -- the beauty of UNIX is it's simple; and the beauty of VMS is that it's all there. -- Ken Olsen, president of DEC, DECWORLD Vol. 8 No. 5, 1984 [It's been argued that the beauty of UNIX is the same as the beauty of Ken Olsen's brain. Ed.] | |
"Our attitude with TCP/IP is, `Hey, we'll do it, but don't make a big system, because we can't fix it if it breaks -- nobody can.'" "TCP/IP is OK if you've got a little informal club, and it doesn't make any difference if it takes a while to fix it." -- Ken Olson, in Digital News, 1988 | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A.L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4. | |
Proposed Additions to the PDP-11 Instruction Set: BBW Branch Both Ways BEW Branch Either Way BBBF Branch on Bit Bucket Full BH Branch and Hang BMR Branch Multiple Registers BOB Branch On Bug BPO Branch on Power Off BST Backspace and Stretch Tape CDS Condense and Destroy System CLBR Clobber Register CLBRI Clobber Register Immediately CM Circulate Memory CMFRM Come From -- essential for truly structured programming CPPR Crumple Printer Paper and Rip CRN Convert to Roman Numerals | |
Real Users find the one combination of bizarre input values that shuts down the system for days. | |
Something mysterious is formed, born in the silent void. Waiting alone and unmoving, it is at once still and yet in constant motion. It is the source of all programs. I do not know its name, so I will call it the Tao of Programming. If the Tao is great, then the operating system is great. If the operating system is great, then the compiler is great. If the compiler is greater, then the applications is great. The user is pleased and there is harmony in the world. The Tao of Programming flows far away and returns on the wind of morning. -- Geoffrey James, "The Tao of Programming" | |
***** Special AI Seminar (abstract) It has been widely recognized that AI programs require expert knowledge in order to perform well in complex domains. But knowledge alone is not sufficient for some applications; wisdom is needed as well. Accordingly, we have developed a new approach to artificial intelligence which we call "wisdom engineering". As a test of our ideas, we have written IMMANUEL, a wisdom based system for the task domain of western philosophical thought. IMMANUEL was supplied initially with 200 wisdom units which contained wisdom about such elementary concepts as mind, matter, being, nothingness, and so forth. IMMANUEL was then allowed to run freely, guided by the heuristic rules contained in its heterarchically organized meta wisdom base. IMMANUEL succeeded in rediscovering most of the important philosophical ideas developed in western culture over the course of the last 25 centuries, including those underlying Plato's theory of government, Kant's metaphysics, Nietzsche's theory of value, and Husserl's phenomenology. In this seminar, we will describe IMMANUEL's achievements and internal architecture. We will also briefly discuss our recent efforts to apply wisdom engineering to oil exploration. | |
Still a few bugs in the system... Someday I have to tell you about Uncle Nahum from Maine, who spent years trying to cross a jellyfish with a shad so he could breed boneless shad. His experiment backfired too, and he wound up with bony jellyfish... which was hardly worth the trouble. There's very little call for those up there. -- Allucquere R. "Sandy" Stone | |
System checkpoint complete. | |
System going down at 1:45 this afternoon for disk crashing. | |
System going down at 5 this afternoon to install scheduler bug. | |
System going down in 5 minutes. | |
System restarting, wait... | |
*** System shutdown message from root *** System going down in 60 seconds | |
The Guy on the Right Doesn't Stand a Chance The guy on the right has the Osborne 1, a fully functional computer system in a portable package the size of a briefcase. The guy on the left has an Uzi submachine gun concealed in his attache case. Also in the case are four fully loaded, 32-round clips of 125-grain 9mm ammunition. The owner of the Uzi is going to get more tactical firepower delivered -- and delivered on target -- in less time, and with less effort. All for $795. It's inevitable. If you're going up against some guy with an Osborne 1 -- or any personal computer -- he's the one who's in trouble. One round from an Uzi can zip through ten inches of solid pine wood, so you can imagine what it will do to structural foam acrylic and sheet aluminum. In fact, detachable magazines for the Uzi are available in 25-, 32-, and 40-round capacities, so you can take out an entire office full of Apple II or IBM Personal Computers tied into Ethernet or other local-area networks. What about the new 16-bit computers, like the Lisa and Fortune? Even with the Winchester backup, they're no match for the Uzi. One quick burst and they'll find out what Unix means. Make your commanding officer proud. Get an Uzi -- and come home a winner in the fight for office automatic weapons. -- "InfoWorld", June, 1984 | |
The human mind ordinarily operates at only ten percent of its capacity -- the rest is overhead for the operating system. | |
The IBM 2250 is impressive ... if you compare it with a system selling for a tenth its price. -- D. Cohen | |
The Magician of the Ivory Tower brought his latest invention for the master programmer to examine. The magician wheeled a large black box into the master's office while the master waited in silence. "This is an integrated, distributed, general-purpose workstation," began the magician, "ergonomically designed with a proprietary operating system, sixth generation languages, and multiple state of the art user interfaces. It took my assistants several hundred man years to construct. Is it not amazing?" The master raised his eyebrows slightly. "It is indeed amazing," he said. "Corporate Headquarters has commanded," continued the magician, "that everyone use this workstation as a platform for new programs. Do you agree to this?" "Certainly," replied the master, "I will have it transported to the data center immediately!" And the magician returned to his tower, well pleased. Several days later, a novice wandered into the office of the master programmer and said, "I cannot find the listing for my new program. Do you know where it might be?" "Yes," replied the master, "the listings are stacked on the platform in the data center." -- Geoffrey James, "The Tao of Programming" | |
The New Testament offers the basis for modern computer coding theory, in the form of an affirmation of the binary number system. But let your communication be Yea, yea; nay, nay: for whatsoever is more than these cometh of evil. -- Matthew 5:37 | |
The salesman and the system analyst took off to spend a weekend in the forest, hunting bear. They'd rented a cabin, and, when they got there, took their backpacks off and put them inside. At which point the salesman turned to his friend, and said, "You unpack while I go and find us a bear." Puzzled, the analyst finished unpacking and then went and sat down on the porch. Soon he could hear rustling noises in the forest. The noises got nearer -- and louder -- and suddenly there was the salesman, running like hell across the clearing toward the cabin, pursued by one of the largest and most ferocious grizzly bears the analyst had ever seen. "Open the door!", screamed the salesman. The analyst whipped open the door, and the salesman ran to the door, suddenly stopped, and stepped aside. The bear, unable to stop, continued through the door and into the cabin. The salesman slammed the door closed and grinned at his friend. "Got him!", he exclaimed, "now, you skin this one and I'll go rustle us up another!" | |
The system was down for backups from 5am to 10am last Saturday. | |
The system will be down for 10 days for preventive maintenance. | |
The work [of software development] is becoming far easier (i.e. the tools we're using work at a higher level, more removed from machine, peripheral and operating system imperatives) than it was twenty years ago, and because of this, knowledge of the internals of a system may become less accessible. We may be able to dig deeper holes, but unless we know how to build taller ladders, we had best hope that it does not rain much. -- Paul Licker | |
There are no games on this system. | |
There was once a programmer who was attached to the court of the warlord of Wu. The warlord asked the programmer: "Which is easier to design: an accounting package or an operating system?" "An operating system," replied the programmer. The warlord uttered an exclamation of disbelief. "Surely an accounting package is trivial next to the complexity of an operating system," he said. "Not so," said the programmer, "when designing an accounting package, the programmer operates as a mediator between people having different ideas: how it must operate, how its reports must appear, and how it must conform to the tax laws. By contrast, an operating system is not limited my outside appearances. When designing an operating system, the programmer seeks the simplest harmony between machine and ideas. This is why an operating system is easier to design." The warlord of Wu nodded and smiled. "That is all good and well, but which is easier to debug?" The programmer made no reply. -- Geoffrey James, "The Tao of Programming" | |
There was once a programmer who worked upon microprocessors. "Look at how well off I am here," he said to a mainframe programmer who came to visit, "I have my own operating system and file storage device. I do not have to share my resources with anyone. The software is self-consistent and easy-to-use. Why do you not quit your present job and join me here?" The mainframe programmer then began to describe his system to his friend, saying: "The mainframe sits like an ancient sage meditating in the midst of the data center. Its disk drives lie end-to-end like a great ocean of machinery. The software is a multi-faceted as a diamond and as convoluted as a primeval jungle. The programs, each unique, move through the system like a swift-flowing river. That is why I am happy where I am." The microcomputer programmer, upon hearing this, fell silent. But the two programmers remained friends until the end of their days. -- Geoffrey James, "The Tao of Programming" | |
This quote is taken from the Diamondback, the University of Maryland student newspaper, of Tuesday, 3/10/87. One disadvantage of the Univac system is that it does not use Unix, a recently developed program which translates from one computer language to another and has a built-in editing system which identifies errors in the original program. | |
This system will self-destruct in five minutes. | |
Those parts of the system that you can hit with a hammer (not advised) are called hardware; those program instructions that you can only curse at are called software. -- Levitating Trains and Kamikaze Genes: Technological Literacy for the 1990's. | |
To err is human, to forgive, beyond the scope of the Operating System. | |
To those accustomed to the precise, structured methods of conventional system development, exploratory development techniques may seem messy, inelegant, and unsatisfying. But it's a question of congruence: precision and flexibility may be just as disfunctional in novel, uncertain situations as sloppiness and vacillation are in familiar, well-defined ones. Those who admire the massive, rigid bone structures of dinosaurs should remember that jellyfish still enjoy their very secure ecological niche. -- Beau Sheil, "Power Tools for Programmers" | |
Unix is the worst operating system; except for all others. -- Berry Kercheval | |
We are experiencing system trouble -- do not adjust your terminal. | |
We the Users, in order to form a more perfect system, establish priorities, ensure connective tranquility, provide for common repairs, promote preventive maintenance, and secure the blessings of liberty for ourselves and our processes, do ordain and establish this Software of The Unixed States of America. | |
Whenever a system becomes completely defined, some damn fool discovers something which either abolishes the system or expands it beyond recognition. | |
X windows: It's not how slow you make it. It's how you make it slow. The windowing system preferred by masochists 3 to 1. Built to take on the world... and lose! Don't try it 'til you've knocked it. Power tools for Power Fools. Putting new limits on productivity. The closer you look, the cruftier we look. Design by counterexample. A new level of software disintegration. No hardware is safe. Do your time. Rationalization, not realization. Old-world software cruftsmanship at its finest. Gratuitous incompatibility. Your mother. THE user interference management system. You can't argue with failure. You haven't died 'til you've used it. The environment of today... tomorrow! X windows. | |
X windows: Something you can be ashamed of. 30% more entropy than the leading window system. The first fully modular software disaster. Rome was destroyed in a day. Warn your friends about it. Climbing to new depths. Sinking to new heights. An accident that couldn't wait to happen. Don't wait for the movie. Never use it after a big meal. Need we say less? Plumbing the depths of human incompetence. It'll make your day. Don't get frustrated without it. Power tools for power losers. A software disaster of Biblical proportions. Never had it. Never will. The software with no visible means of support. More than just a generation behind. Hindenburg. Titanic. Edsel. X windows. | |
X windows: You'd better sit down. Don't laugh. It could be YOUR thesis project. Why do it right when you can do it wrong? Live the nightmare. Our bugs run faster. When it absolutely, positively HAS to crash overnight. There ARE no rules. You'll wish we were kidding. Everything you never wanted in a window system. And more. Dissatisfaction guaranteed. There's got to be a better way. The next best thing to keypunching. Leave the thrashing to us. We wrote the book on core dumps. Even your dog won't like it. More than enough rope. Garbage at your fingertips. Incompatibility. Shoddiness. Uselessness. X windows. | |
A place for everything and everything in its place. -- Isabella Mary Beeton, "The Book of Household Management" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to memory management system services.] | |
As the system comes up, the component builders will from time to time appear, bearing hot new versions of their pieces -- faster, smaller, more complete, or putatively less buggy. The replacement of a working component by a new version requires the same systematic testing procedure that adding a new component does, although it should require less time, for more complete and efficient test cases will usually be available. - Frederick Brooks Jr., "The Mythical Man Month" | |
Each team building another component has been using the most recent tested version of the integrated system as a test bed for debugging its piece. Their work will be set back by having that test bed change under them. Of course it must. But the changes need to be quantized. Then each user has periods of productive stability, interrupted by bursts of test-bed change. This seems to be much less disruptive than a constant rippling and trembling. - Frederick Brooks Jr., "The Mythical Man Month" | |
It is a very humbling experience to make a multimillion-dollar mistake, but it is also very memorable. I vividly recall the night we decided how to organize the actual writing of external specifications for OS/360. The manager of architecture, the manager of control program implementation, and I were threshing out the plan, schedule, and division of responsibilities. The architecture manager had 10 good men. He asserted that they could write the specifications and do it right. It would take ten months, three more than the schedule allowed. The control program manager had 150 men. He asserted that they could prepare the specifications, with the architecture team coordinating; it would be well-done and practical, and he could do it on schedule. Futhermore, if the architecture team did it, his 150 men would sit twiddling their thumbs for ten months. To this the architecture manager responded that if I gave the control program team the responsibility, the result would not in fact be on time, but would also be three months late, and of much lower quality. I did, and it was. He was right on both counts. Moreover, the lack of conceptual integrity made the system far more costly to build and change, and I would estimate that it added a year to debugging time. - Frederick Brooks Jr., "The Mythical Man Month" | |
It is important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy. -- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System", Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20 | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4, 1973, pp. 382-400 | |
"Probably the best operating system in the world is the [operating system] made for the PDP-11 by Bell Laboratories." - Ted Nelson, October 1977 | |
Operating-system software is the program that orchestrates all the basic functions of a computer. - The Wall Street Journal, Tuesday, September 15, 1987, page 40 | |
If science were explained to the average person in a way that is accessible and exciting, there would be no room for pseudoscience. But there is a kind of Gresham's Law by which in popular culture the bad science drives out the good. And for this I think we have to blame, first, the scientific community ourselves for not doing a better job of popularizing science, and second, the media, which are in this respect almost uniformly dreadful. Every newspaper in America has a daily astrology column. How many have even a weekly astronomy column? And I believe it is also the fault of the educational system. We do not teach how to think. This is a very serious failure that may even, in a world rigged with 60,000 nuclear weapons, compromise the human future. - Carl Sagan, The Burden Of Skepticism, The Skeptical Inquirer, Vol. 12, Fall 87 | |
"Unibus timeout fatal trap program lost sorry" - An error message printed by DEC's RSTS operating system for the PDP-11 | |
As to Jesus of Nazareth...I think the system of Morals and his Religion, as he left them to us, the best the World ever saw or is likely to see; but I apprehend it has received various corrupting Changes, and I have, with most of the present Dissenters in England, some doubts as to his divinity. - Benjamin Franklin | |
On our campus the UNIX system has proved to be not only an effective software tool, but an agent of technical and social change within the University. - John Lions (University of New South Wales) | |
This was the ultimate form of ostentation among technology freaks -- to have a system so complete and sophisticated that nothing showed; no machines, no wires, no controls. - Michael Swanwick, "Vacuum Flowers" | |
It is inconceivable that a judicious observer from another solar system would see in our species -- which has tended to be cruel, destructive, wasteful, and irrational -- the crown and apex of cosmic evolution. Viewing us as the culmination of *anything* is grotesque; viewing us as a transitional species makes more sense -- and gives us more hope. - Betty McCollister, "Our Transitional Species", Free Inquiry magazine, Vol. 8, No. 1 | |
Ill-chosen abstraction is particularly evident in the design of the ADA runtime system. The interface to the ADA runtime system is so opaque that it is impossible to model or predict its performance, making it effectively useless for real-time systems. -- Marc D. Donner and David H. Jameson. | |
"The Amiga is the only personal computer where you can run a multitasking operating system and get realtime performance, out of the box." -- Peter da Silva | |
There is something you must understand about the Soviet system. They have the ability to concentrate all their efforts on a given design, and develop all components simulateously, but sometimes without proper testing. Then they end up with a technological disaster like the Tu-144. In a technology race at the time, that aircraft was two months ahead of the Concorde. Four Tu-144s were built; two have crashed, and two are in museums. The Concorde has been flying safely for over 10 years. -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 100 | |
"...I could accept this openness, glasnost, perestroika, or whatever you want to call it if they did these things: abolish the one party system; open the Soviet frontier and allow Soviet people to travel freely; allow the Soviet people to have real free enterprise; allow Western businessmen to do business there, and permit freedom of speech and of the press. But so far, the whole country is like a concentration camp. The barbed wire on the fence around the Soviet Union is to keep people inside, in the dark. This openness that you are seeing, all these changes, are cosmetic and they have been designed to impress shortsighted, naive, sometimes stupid Western leaders. These leaders gush over Gorbachev, hoping to do business with the Soviet Union or appease it. He will say: "Yes, we can do business!" This while his military machine in Afghanistan has killed over a million people out of a population of 17 million. Can you imagine that? -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 110 | |
"Remember Kruschev: he tried to do too many things too fast, and he was removed in disgrace. If Gorbachev tries to destroy the system or make too many fundamental changes to it, I believe the system will get rid of him. I am not a political scientist, but I understand the system very well. I believe he will have a "heart attack" or retire or be removed. He is up against a brick wall. If you think they will change everything and become a free, open society, forget it!" -- Victor Belenko, MiG-25 fighter pilot who defected in 1976 "Defense Electronics", Vol 20, No. 6, pg. 110 | |
Mr. DePree believes participative capitalism is the wave of the future. The U.S. work force, he believes, "more and more demands to be included in the capitalist system and if we don't find ways to get the capitalist system to be an inclusive system rather than the exclusive system it has been, we're all in deep trouble. If we don't find ways to begin to understand that capitalism's highest potential lies in the common good, not in the individual good, then we're risking the system itself." -- Max DePree, chairman and CEO of Herman Miller Inc., "Herman Miller's Secrets of Corporate Creativity", The Wall Street Journal, May 3, 1988 | |
"Only a brain-damaged operating system would support task switching and not make the simple next step of supporting multitasking." -- George McFry | |
A comment on schedules: Ok, how long will it take? For each manager involved in initial meetings add one month. For each manager who says "data flow analysis" add another month. For each unique end-user type add one month. For each unknown software package to be employed add two months. For each unknown hardware device add two months. For each 100 miles between developer and installation add one month. For each type of communication channel add one month. If an IBM mainframe shop is involved and you are working on a non-IBM system add 6 months. If an IBM mainframe shop is involved and you are working on an IBM system add 9 months. Round up to the nearest half-year. --Brad Sherman By the way, ALL software projects are done by iterative prototyping. Some companies call their prototypes "releases", that's all. | |
It must be remembered that there is nothing more difficult to plan, more doubtful of success, nor more dangerous to manage, than the creation of a new system. For the initiator has the enmity of all who would profit by the preservation of the old institutions and merely lukewarm defenders in those who would gain by the new ones. -- Machiavelli | |
"If you weren't my teacher, I'd think you just deleted all my files." -- an anonymous UCB CS student, to an instructor who had typed "rm -i *" to get rid of a file named "-f" on a Unix system. | |
"The net result is a system that is not only binary compatible with 4.3 BSD, but is even bug for bug compatible in almost all features." -- Avadit Tevanian, Jr., "Architecture-Independent Virtual Memory Management for Parallel and Distributed Environments: The Mach Approach" | |
...At that time [the 1960s], Bell Laboratories scientists projected that computer speeds as high as 30 million floating-point calculations per second (megaflops) would be needed for the Army's ballistic missile defense system. Many computer experts -- including a National Academy of Sciences panel -- said achieving such speeds, even using multiple processors, was impossible. Today, new generation supercomputers operate at billions of operations per second (gigaflops). -- Aviation Week & Space Technology, May 9, 1988, "Washington Roundup", pg 13 | |
[Astrology is] 100 percent hokum, Ted. As a matter of fact, the first edition of the Encyclopaedia Britannica, written in 1771 -- 1771! -- said that this belief system is a subject long ago ridiculed and reviled. We're dealing with beliefs that go back to the ancient Babylonians. There's nothing there.... It sounds a lot like science, it sounds like astronomy. It's got technical terms. It's got jargon. It confuses the public....The astrologer is quite glib, confuses the public, uses terms which come from science, come from metaphysics, come from a host of fields, but they really mean nothing. The fact is that astrological beliefs go back at least 2,500 years. Now that should be a sufficiently long time for astrologers to prove their case. They have not proved their case....It's just simply gibberish. The fact is, there's no theory for it, there are no observational data for it. It's been tested and tested over the centuries. Nobody's ever found any validity to it at all. It is not even close to a science. A science has to be repeatable, it has to have a logical foundation, and it has to be potentially vulnerable -- you test it. And in that astrology is reqlly quite something else. -- Astronomer Richard Berendzen, President, American University, on ABC News "Nightline," May 3, 1988 | |
Backed up the system lately? | |
The Seventh Edition licensing procedures are, I suppose, still in effect, though I doubt that tapes are available from AT&T. At any rate, whatever restrictions the license imposes still exist. These restrictions were and are reasonable for places that just want to run the system, but don't allow many of the things that Minix was written for, like study of the source in classes, or by individuals not in a university or company. I've always thought that Minix was a fine idea, and competently done. As for the size of v7, wc -l /usr/sys/*/*.[chs] is 19271. -- Dennis Ritchie, 1989 | |
"All over the place, from the popular culture to the propaganda system, there is constant pressure to make people feel that they are helpless, that the only role they can have is to ratify decisions and to consume." -- Noam Chomsky | |
"A complex system that works is invariably found to have evolved from a simple system that worked." -- John Gall, _Systemantics_ | |
"All the system's paths must be topologically and circularly interrelated for conceptually definitive, locally transformable, polyhedronal understanding to be attained in our spontaneous -- ergo, most economical -- geodesiccally structured thoughts." -- R. Buckminster Fuller [...and a total nonsequitur as far as I can tell. -kl] | |
"You can have my Unix system when you pry it from my cold, dead fingers." -- Cal Keegan | |
A real patriot is the fellow who gets a parking ticket and rejoices that the system works. | |
I DON'T THINK I'M ALONE when I say I'd like to see more and more planets fall under the ruthless domination of our solar system. -- Jack Handley, The New Mexican, 1988. | |
If voting could change the system, it would be illegal. If not voting could change the system, it would be illegal. | |
If we all work together, we can totally disrupt the system. | |
The founding fathers tried to set up a judicial system where the accused received a fair trial, not a system to insure an acquittal on technicalities. | |
The genius of our ruling class is that it has kept a majority of the people from ever questioning the inequity of a system where most people drudge along paying heavy taxes for which they get nothing in return. -- Gore Vidal | |
The two party system ... is a triumph of the dialectic. It showed that two could be one and one could be two and had probably been fabricated by Hegel for the American market on a subcontract from General Dynamics. -- I.F. Stone | |
They sentenced me to twenty years of boredom for trying to change the system from within. I'm coming now I'm coming to reward them. First we take Manhattan, then we take Berlin. I'm guided by a signal in the heavens. I'm guided by this birthmark on my skin. I'm guided by the beauty of our weapons. First we take Manhattan, then we take Berlin. I'd really like to live beside you, baby. I love your body and your spirit and your clothes. But you see that line there moving through the station? I told you I told you I told you I was one of those. -- Leonard Cohen, "First We Take Manhattan" | |
Where the system is concerned, you're not allowed to ask "Why?". | |
"Even if you want no state, or a minimal state, then you still have to argue it point by point. Especially since most minimalists want to keep exactly the economic and police system that keeps them privileged. That's libertarians for you -- anarchists who want police protection from their slaves!" -- Coyote, in Kim Stanley Robinson's "Green Mars" | |
Bagbiter: 1. n.; Equipment or program that fails, usually intermittently. 2. adj.: Failing hardware or software. "This bagbiting system won't let me get out of spacewar." Usage: verges on obscenity. Grammatically separable; one may speak of "biting the bag". Synonyms: LOSER, LOSING, CRETINOUS, BLETCHEROUS, BARFUCIOUS, CHOMPER, CHOMPING. | |
Brooke's Law: Whenever a system becomes completely defined, some damn fool discovers something which either abolishes the system or expands it beyond recognition. | |
Cache: A very expensive part of the memory system of a computer that no one is supposed to know is there. | |
Complex system: One with real problems and imaginary profits. | |
compuberty, n: The uncomfortable period of emotional and hormonal changes a computer experiences when the operating system is upgraded and a sun4 is put online sharing files. | |
default, n.: [Possibly from Black English "De fault wid dis system is you, mon."] The vain attempt to avoid errors by inactivity. "Nothing will come of nothing: speak again." -- King Lear. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
Eleventh Law of Acoustics: In a minimum-phase system there is an inextricable link between frequency response, phase response and transient response, as they are all merely transforms of one another. This combined with minimalization of open-loop errors in output amplifiers and correct compensation for non-linear passive crossover network loading can lead to a significant decrease in system resolution lost. However, of course, this all means jack when you listen to Pink Floyd. | |
flowchart, n. & v.: [From flow "to ripple down in rich profusion, as hair" + chart "a cryptic hidden-treasure map designed to mislead the uninitiated."] 1. n. The solution, if any, to a class of Mascheroni construction problems in which given algorithms require geometrical representation using only the 35 basic ideograms of the ANSI template. 2. n. Neronic doodling while the system burns. 3. n. A low-cost substitute for wallpaper. 4. n. The innumerate misleading the illiterate. "A thousand pictures is worth ten lines of code." -- The Programmer's Little Red Vade Mecum, Mao Tse T'umps. 5. v.intrans. To produce flowcharts with no particular object in mind. 6. v.trans. To obfuscate (a problem) with esoteric cartoons. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
Hardware, n.: The parts of a computer system that can be kicked. | |
incentive program, n.: The system of long and short-term rewards that a corporation uses to motivate its people. Still, despite all the experimentation with profit sharing, stock options, and the like, the most effective incentive program to date seems to be "Do a good job and you get to keep it." | |
kern, v.: 1. To pack type together as tightly as the kernels on an ear of corn. 2. In parts of Brooklyn and Queens, N.Y., a small, metal object used as part of the monetary system. | |
kernel, n.: A part of an operating system that preserves the medieval traditions of sorcery and black art. | |
MAFIA, n: [Acronym for Mechanized Applications in Forced Insurance Accounting.] An extensive network with many on-line and offshore subsystems running under OS, DOS, and IOS. MAFIA documentation is rather scanty, and the MAFIA sales office exhibits that testy reluctance to bona fide inquiries which is the hallmark of so many DP operations. From the little that has seeped out, it would appear that MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped variant of SNA, in which extended handshakes also perform complex security functions. The known timesharing aspects of MAFIA point to a more than usually autocratic operating system. Screen prompts carry an imperative, nonrefusable weighting (most menus offer simple YES/YES options, defaulting to YES) that precludes indifference or delay. Uniquely, all editing under MAFIA is performed centrally, using a powerful rubout feature capable of erasing files, filors, filees, and entire nodal aggravations. -- Stan Kelly-Bootle, "The Devil's DP Dictionary" | |
Pascal Users: The Pascal system will be replaced next Tuesday by Cobol. Please modify your programs accordingly. | |
Performance: A statement of the speed at which a computer system works. Or rather, might work under certain circumstances. Or was rumored to be working over in Jersey about a month ago. | |
Portable, adj.: Survives system reboot. | |
Shaw's Principle: Build a system that even a fool can use, and only a fool will want to use it. | |
statistics, n.: A system for expressing your political prejudices in convincing scientific guise. | |
system-independent, adj.: Works equally poorly on all systems. | |
The rules: (1) Thou shalt not worship other computer systems. (2) Thou shalt not impersonate Liberace or eat watermelon while sitting at the console keyboard. (3) Thou shalt not slap users on the face, nor staple their silly little card decks together. (4) Thou shalt not get physically involved with the computer system, especially if you're already married. (5) Thou shalt not use magnetic tapes as frisbees, nor use a disk pack as a stool to reach another disk pack. (6) Thou shalt not stare at the blinking lights for more than one eight hour shift. (7) Thou shalt not tell users that you accidentally destroyed their files/backup just to see the look on their little faces. (8) Thou shalt not enjoy cancelling a job. (9) Thou shalt not display firearms in the computer room. (10) Thou shalt not push buttons "just to see what happens". | |
theory, n.: System of ideas meant to explain something, chosen with a view to originality, controversialism, incomprehensibility, and how good it will look in print. | |
transparent, adj.: Being or pertaining to an existing, nontangible object. "It's there, but you can't see it" -- IBM System/360 announcement, 1964. virtual, adj.: Being or pertaining to a tangible, nonexistent object. "I can see it, but it's not there." -- Lady Macbeth. | |
Voter's Block: The attempt, however futile, to register dissent with the current political system by simply not voting. -- Douglas Coupland, "Generation X: Tales for an Accelerated Culture" | |
Q: How many hardware engineers does it take to change a light bulb? A: None. We'll fix it in software. Q: How many system programmers does it take to change a light bulb? A: None. The application can work around it. Q: How many software engineers does it take to change a light bulb? A: None. We'll document it in the manual. Q: How many tech writers does it take to change a light bulb? A: None. The user can figure it out. | |
Q: How many IBM types does it take to change a light bulb? A: Fifteen. One to do it, and fourteen to write document number GC7500439-0001, Multitasking Incandescent Source System Facility, of which 10% of the pages state only "This page intentionally left blank", and 20% of the definitions are of the form "A:..... consists of sequences of non-blank characters separated by blanks". | |
If the colleges were better, if they really had it, you would need to get the police at the gates to keep order in the inrushing multitude. See in college how we thwart the natural love of learning by leaving the natural method of teaching what each wishes to learn, and insisting that you shall learn what you have no taste or capacity for. The college, which should be a place of delightful labor, is made odious and unhealthy, and the young men are tempted to frivolous amusements to rally their jaded spirits. I would have the studies elective. Scholarship is to be created not by compulsion, but by awakening a pure interest in knowledge. The wise instructor accomplishes this by opening to his pupils precisely the attractions the study has for himself. The marking is a system for schools, not for the college; for boys, not for men; and it is an ungracious work to put on a professor. -- Ralph Waldo Emerson | |
It's grad exam time... COMPUTER SCIENCE Inside your desk you'll find a listing of the DEC/VMS operating system in IBM 1710 machine code. Show what changes are necessary to convert this code into a UNIX Berkeley 7 operating system. Prove that these fixes are bug free and run correctly. You should gain at least 150% efficiency in the new system. (You should take no more than 10 minutes on this question.) MATHEMATICS If X equals PI times R^2, construct a formula showing how long it would take a fire ant to drill a hole through a dill pickle, if the length-girth ratio of the ant to the pickle were 98.17:1. GENERAL KNOWLEDGE Describe the Universe. Give three examples. | |
It's grad exam time... MEDICINE You have been provided with a razor blade, a piece of gauze, and a bottle of Scotch. Remove your appendix. Do not suture until your work has been inspected. (You have 15 minutes.) HISTORY Describe the history of the papacy from its origins to the present day, concentrating especially, but not exclusively, on its social, political, economic, religious and philisophical impact upon Europe, Asia, America, and Africa. Be brief, concise, and specific. BIOLOGY Create life. Estimate the differences in subsequent human culture if this form of life had been created 500 million years ago or earlier, with special attention to its probable effect on the English parliamentary system. | |
This is a test of the emergency broadcast system. Had there been an actual emergency, then you would no longer be here. | |
This is a test of the Emergency Broadcast System. If this had been an actual emergency, do you really think we'd stick around to tell you? | |
Boston State House is the hub of the Solar System. You couldn't pry that out of a Boston man if you had the tire of all creation straightened out for a crowbar. -- Oliver Wendell Holmes | |
7,140 pounds on the Sun 97 pounds on Mercury or Mars 255 pounds on Earth 232 pounds on Venus or Uranus 43 pounds on the Moon 648 pounds on Jupiter 275 pounds on Saturn 303 pounds on Neptune 13 pounds on Pluto -- How much Elvis Presley would weigh at various places in the solar system. | |
An architect's first work is apt to be spare and clean. He knows he doesn't know what he's doing, so he does it carefully and with great restraint. As he designs the first work, frill after frill and embellishment after embellishment occur to him. These get stored away to be used "next time." Sooner or later the first system is finished, and the architect, with firm confidence and a demonstrated mastery of that class of systems, is ready to build a second system. This second is the most dangerous system a man ever designs. When he does his third and later ones, his prior experiences will confirm each other as to the general characteristics of such systems, and their differences will identify those parts of his experience that are particular and not generalizable. The general tendency is to over-design the second system, using all the ideas and frills that were cautiously sidetracked on the first one. The result, as Ovid says, is a "big pile." -- Frederick Brooks, "The Mythical Man Month" | |
Back in the early 60's, touch tone phones only had 10 buttons. Some military versions had 16, while the 12 button jobs were used only by people who had "diva" (digital inquiry, voice answerback) systems -- mainly banks. Since in those days, only Western Electric made "data sets" (modems) the problems of terminology were all Bell System. We used to struggle with written descriptions of dial pads that were unfamiliar to most people (most phones were rotary then.) Partly in jest, some AT&T engineering types (there was no marketing in the good old days, which is why they were the good old days) made up the term "octalthorpe" (note spelling) to denote the "pound sign." Presumably because it has 8 points sticking out. It never really caught on. | |
In a minimum-phase system there is an inextricable link between frequency response, phase response and transient response, as they are all merely transforms of one another. This combined with minimalization of open-loop errors in output amplifiers and correct compensation for non-linear passive crossover network loading can lead to a significant decrease in system resolution lost. However, this all means jack when you listen to Pink Floyd. | |
One Bell System - it sometimes works. | |
One Bell System - it used to work before they installed the Dimension! | |
One Bell System - it works. | |
With every passing hour our solar system comes forty-three thousand miles closer to globular cluster M13 in the constellation Hercules, and still there are some misfits who continue to insist that there is no such thing as progress. -- Ransom K. Ferm | |
To lose weight, eat less; to gain weight, eat more; if you merely wish to maintain, do whatever you were doing. The Bronx diet is a legitimate system of food therapy showing that food SHOULD be used a crutch and which food could be the most effective in promoting spiritual and emotional satisfaction. For the first time, an eater could instantly grasp the connection between relieving depression and Mallomars, and understand why a lover's quarrel isn't so bad if there's a pint of ice cream nearby. -- Richard Smith, "The Bronx Diet" | |
An Hacker there was, one of the finest sort Who controlled the system; graphics was his sport. A manly man, to be a wizard able; Many a protected file he had sitting on his table. His console, when he typed, a man might hear Clicking and feeping wind as clear, Aye, and as loud as does the machine room bell Where my lord Hacker was Prior of the cell. The Rule of good St Savage or St Doeppnor As old and strict he tended to ignore; He let go by the things of yesterday And took the modern world's more spacious way. He did not rate that text as a plucked hen Which says that Hackers are not holy men. And that a hacker underworked is a mere Fish out of water, flapping on the pier. That is to say, a hacker out of his cloister. That was a text he held not worth an oyster. And I agreed and said his views were sound; Was he to study till his head wend round Poring over books in the cloisters? Must he toil As Andy bade and till the very soil? Was he to leave the world upon the shelf? Let Andy have his labor to himself! -- Chaucer [well, almost. Ed.] | |
And now your toner's toney, Disk blocks aplenty And your paper near pure white, Await your laser drawn lines, The smudges on your soul are gone Your intricate fonts, And your output's clean as light.. Your pictures and signs. We've labored with your father, Your amputative absence The venerable XGP, Has made the Ten dumb, But his slow artistic hand, Without you, Dover, Lacks your clean velocity. We're system untounged- Theses and papers DRAW Plots and TEXage And code in a queue Have been biding their time, Dover, oh Dover, With LISP code and programs, We've been waiting for you. And this crufty rhyme. Dover, oh Dover, Dover, oh Dover, arisen from dead. We welcome you back, Dover, oh Dover, awoken from bed. Though still you may jam, Dover, oh Dover, welcome back to the Lab. You're on the right track. Dover, oh Dover, we've missed your clean hand... | |
Between the idea And the reality Between the motion And the act Falls the Shadow -- T.S. Eliot, "The Hollow Man" [Quoted in "VMS Internals and Data Structures", V4.4, when referring to system service dispatching.] | |
Hack placidly amidst the noisy printers and remember what prizes there may be in Science. As fast as possible get a good terminal on a good system. Enter your data clearly but always encrypt your results. And listen to others, even the dull and ignorant, for they may be your customers. Avoid loud and aggressive persons, for they are sales reps. If you compare your outputs with those of others, you may be surprised, for always there will be greater and lesser numbers than you have crunched. Keep others interested in your career, and try not to fumble; it can be a real hassle and could change your fortunes in time. Exercise system control in your experiments, for the world is full of bugs. But let this not blind you to what virtue there is; many persons strive for linearity and everywhere papers are full of approximations. Strive for proportionality. Especially, do not faint when it occurs. Neither be cyclical about results; for in the face of all data analysis it is sure to be noticed. Take with a grain of salt the anomalous data points. Gracefully pass them on to the youth at the next desk. Nurture some mutual funds to shield you in times of sudden layoffs. But do not distress yourself with imaginings -- the real bugs are enough to screw you badly. Murphy's Law runs the Universe -- and whether or not it is clear to you, no doubt <Curl>B*n dS = 0. Therefore, grab for a piece of the pie, with whatever proposals you can conceive of to try. With all the crashed disks, skewed data, and broken line printers, you can still have a beautiful secretary. Be linear. Strive to stay employed. -- Technolorata, "Analog" | |
How doth the VAX's C-compiler Improve its object code. And even as we speak does it Increase the system load. How patiently it seems to run And spit out error flags, While users, with frustration, all Tear their clothes to rags. | |
I must Create a System, or be enslav'd by another Man's; I will not Reason and Compare; my business is to Create. -- William Blake, "Jerusalem" | |
I've built a better model than the one at Data General For data bases vegetable, animal, and mineral My OS handles CPUs with multiplexed duality; My PL/1 compiler shows impressive functionality. My storage system's better than magnetic core polarity, You never have to bother checking out a bit for parity; There isn't any reason to install non-static floor matting; My disk drive has capacity for variable formatting. I feel compelled to mention what I know to be a gloating point: There's lots of room in memory for variables floating-point, Which shows for input vegetable, animal, and mineral I've built a better model than the one at Data General. -- Steve Levine, "A Computer Song" (To the tune of "Modern Major General", from "Pirates of Penzance", by Gilbert & Sullivan) | |
If a system is administered wisely, its users will be content. They enjoy hacking their code and don't waste time implementing labor-saving shell scripts. Since they dearly love their accounts, they aren't interested in other machines. There may be telnet, rlogin, and ftp, but these don't access any hosts. There may be an arsenal of cracks and malware, but nobody ever uses them. People enjoy reading their mail, take pleasure in being with their newsgroups, spend weekends working at their terminals, delight in the doings at the site. And even though the next system is so close that users can hear its key clicks and biff beeps, they are content to die of old age without ever having gone to see it. | |
If Dr. Seuss Were a Technical Writer..... Here's an easy game to play. Here's an easy thing to say: If a packet hits a pocket on a socket on a port, And the bus is interrupted as a very last resort, And the address of the memory makes your floppy disk abort, Then the socket packet pocket has an error to report! If your cursor finds a menu item followed by a dash, And the double-clicking icon puts your window in the trash, And your data is corrupted 'cause the index doesn't hash, then your situation's hopeless, and your system's gonna crash! You can't say this? What a shame, sir! We'll find you another game, sir. If the label on the cable on the table at your house, Says the network is connected to the button on your mouse, But your packets want to tunnel on another protocol, That's repeatedly rejected by the printer down the hall, And your screen is all distorted by the side effects of gauss, So your icons in the window are as wavy as a souse, Then you may as well reboot and go out with a bang, 'Cause as sure as I'm a poet, the sucker's gonna hang! When the copy of your floppy's getting sloppy on the disk, And the microcode instructions cause unnecessary risc, Then you have to flash your memory and you'll want to ram your rom. Quickly turn off the computer and be sure to tell your mom! -- DementDJ@ccip.perkin-elmer.com (DementDJ) [rec.humor.funny] | |
Nine megs for the secretaries fair, Seven megs for the hackers scarce, Five megs for the grads in smoky lairs, Three megs for system source; One disk to rule them all, One disk to bind them, One disk to hold the files And in the darkness grind 'em. | |
Once there was a little nerd who loved to read your mail, And then yank back the i-access times to get hackers off his tail, And once as he finished reading from the secretary's spool, He wrote a rude rejection to her boyfriend (how uncool!) And this as delivermail did work and he ran his backfstat, He heard an awful crackling like rat fritters in hot fat, And hard errors brought the system down 'fore he could even shout! And the bio bug'll bring yours down too, ef you don't watch out! And once they was a little flake who'd prowl through the uulog, And when he went to his blit that night to play at being god, The ops all heard him holler, and they to the console dashed, But when they did a ps -ut they found the system crashed! Oh, the wizards adb'd the dumps and did the system trace, And worked on the file system 'til the disk head was hot paste, But all they ever found was this: "panic: never doubt", And the bio bug'll crash your box too, ef you don't watch out! When the day is done and the moon comes out, And you hear the printer whining and the rk's seems to count, When the other desks are empty and their terminals glassy grey, And the load is only 1.6 and you wonder if it'll stay, You must mind the file protections and not snoop around, Or the bio bug'll getcha and bring the system down! | |
Scratch the disks, dump the core, Shut it down, pull the plug Roll the tapes across the floor, Give the core an extra tug And the system is going to crash. And the system is going to crash. Teletypes smashed to bits. Mem'ry cards, one and all, Give the scopes some nasty hits Toss out halfway down the hall And the system is going to crash. And the system is going to crash. And we've also found Just flip one switch When you turn the power down, And the lights will cease to twitch You turn the disk readers into trash. And the tape drives will crumble in a flash. Oh, it's so much fun, When the CPU Now the CPU won't run Can print nothing out but "foo," And the system is going to crash. The system is going to crash. -- To the tune of "As the Caissons go Rolling Along" | |
She can kill all your files; She can freeze with a frown. And a wave of her hand brings the whole system down. And she works on her code until ten after three. She lives like a bat but she's always a hacker to me. -- Apologies to Billy Joel | |
Strange things are done to be number one In selling the computer The Druids were entrepreneurs, IBM has their strategem And they built a granite box Which steadily grows acuter, It tracked the moon, warned of monsoons, And Honeywell competes like Hell, And forecast the equinox But the story's missing link Their price was right, their future Is the system old at Stonemenge sold bright, By the firm of Druids, Inc. The prototype was sold; From Stonehenge site their bits and byte Would ship for Celtic gold. The movers came to crate the frame; It weighed a million ton! The traffic folk thought it a joke The man spoke true, and thus to you (the wagon wheels just spun); A warning from the ages; "They'll nay sell that," the foreman Your stock will slip if you can't ship spat, What's in your brochure's pages. "Just leave the wild weeds grow; See if it sells without the bells "It's Druid-kind, over-designed, And strings that ring and quiver; "And belly up they'll go." Druid repute went down the chute Because they couldn't deliver. -- Edward C. McManus, "The Computer at Stonehenge" | |
System/3! System/3! See how it runs! See how it runs! Its monitor loses so totally! It runs all its programs in RPG! It's made by our favorite monopoly! System/3! | |
'Twas midnight, and the UNIX hacks Did gyre and gimble in their cave All mimsy was the CS-VAX And Cory raths outgrabe. "Beware the software rot, my son! The faults that bite, the jobs that thrash! Beware the broken pipe, and shun The frumious system crash!" | |
What pains others pleasures me, At home am I in Lisp or C; There i couch in ecstasy, 'Til debugger's poke i flee, Into kernel memory. In system space, system space, there shall i fare-- Inside of a VAX on a silicon square. | |
What segment's this, that, laid to rest On FHA0, is sleeping? What system file, lay here a while This, this is "acct.run," While hackers around it were weeping? Accounting file for everyone. Dump, dump it and type it out, The file, the highseg of login. Why lies it here, on public disk And why is it now unprotected? A bug in incant, made it thus. Mount, mount all your DECtapes now And copy the file somehow, somehow. The problem has not been corrected. Dump, dump it and type it out, The file, the highseg of login. -- to Greensleeves | |
DELETE A FORTUNE! Don't some of these fortunes just drive you nuts?! Wouldn't you like to see some of them deleted from the system? You can! Just mail to `fortune' with the fortune you hate most, and we'll make sure it gets expunged. | |
"`Incidentally,' he said, `what does teleport mean?' Another moment passed. Slowly, the others turned to face him. `Probably the wrong moment to ask,' said Arthur, `It's just I remember you use the word a short while ago and I only bring it up because...' `Where,' said Ford quietly, `does it say teleport?' `Well, just over here in fact,' said Arthur, pointing at a dark control box in the rear of the cabin, `Just under the word "emergency", above the word "system" and beside the sign saying "out of order".'" - Arthur finding an escape route from a certain death situation. | |
"Don't come back until you have him", the Tick-Tock Man said quietly, sincerely, extremely dangerously. They used dogs. They used probes. They used cardio plate crossoffs. They used teepers. They used bribery. They used stick tites. They used intimidation. They used torment. They used torture. They used finks. They used cops. They used search and seizure. They used fallaron. They used betterment incentives. They used finger prints. They used the bertillion system. They used cunning. They used guile. They used treachery. They used Raoul-Mitgong but he wasn't much help. They used applied physics. They used techniques of criminology. And what the hell, they caught him. -- Harlan Ellison, "Repent, Harlequin, said the Tick-Tock Man" | |
"If a machine couldn't run a free operating system, we got rid of it." -- Richard Stallman (Open Sources, 1999 O'Reilly and Associates) | |
"So right now the only vendor that does such a stupid thing is Microsoft." -- Linus Torvalds on bad file system interface design. (Open Sources , 1999 O'Reilly and Associates.) | |
What If Bill Gates Was a Stand-Up Comedian? 1. None of his jokes would be funny. 2. Subliminal message hyping Microsoft and Windows 98 would be inserted throughout his performance. 3. The audio system (running Windows NT) would always crash right before Bill got to a punch line. At that time one of the managers would announce, "Please hold tight while we diagnose this intermittent issue." 4. Tickets for Bill's show would be handed out for free in an attempt to attract customers away from Netscape's shows. 5. Industry pundits would call Bill's show "innovative" and would ask "Why doesn't IBM have a stand-up routine? This is exactly why OS/2 is failing in the market." 6. Bill's show would be called "ActiveHumor 98" 7. In a perfect imitation of his Windows 95 OS, Bill wouldn't be able to tell a joke and walk around at the same time. 8. Audience members would have to sign a License Agreement in which one of the terms is "I agree never to watch Linus Torvalds' show, 'GNU/Humorux'". 9. All audience members would receive a free CD of Internet Explorer 4.0, with FakeJava(R) and ActiveHex(tm) technology. 10. Bill Gates would appear on Saturday Night Live, causing ratings to drop even further. | |
It is not too late to turn back from the GATES of hell. Use Linux - the free 32 bit operating system. | |
Never trust an operating system you don't have sources for. | |
Linux: the operating system with a CLUE... Command Line User Environment | |
When you say "I wrote a program that crashed Windows", people just stare at you blankly and say "Hey, I got those with the system, *for free*". -- Linus Torvalds | |
What you end up with, after running an operating system concept through these many marketing coffee filters, is something not unlike plain hot water. -- Matt Welsh | |
Fatal Error: Found MS-Windows System -> Repartitioning Disk for Linux... | |
Yo-yo operating system = WinNT: it goes up..., it goes down..., it goes... -- From a Slashdot.org post | |
Why would people waste their time developing viruses for Microsoft products when Microsoft does such a good job itself of adding in bugs which crash your system? -- From a Slashdot.org post | |
Slight disorientation after prolonged system uptime is normal for new Linux users. Please do not adjust your browser. -- From a Slashdot.org post | |
If you want to travel around the world and be invited to speak at a lot of different places, just write a Unix operating system. -- Linus Torvalds | |
See, you not only have to be a good coder to create a system like Linux, you have to be a sneaky bastard too. -- Linus Torvalds | |
'Kitchen Sink' OS Announced Coding has begun on a new operating system code named 'Kitchen Sink'. The new OS will be based entirely on GNU Emacs. One programmer explained, "Since many hackers spend a vast amount of their time in Emacs, why not just make it the operating system?" When asked about the name, he responded, "Well, it has been often said that Emacs has everything except a kitchen sink. Now it will." One vi advocate said, "What the hell?!?! Those Emacs people are nuts. It seems that even with a programming language, a web browser, and God only knows what else built into their text editor, they're still not satisfied. Now they want it to be an operating system. Hell, even Windows ain't that bloated!" | |
Mad Programmer Commits Suicide KENNETT, MO -- For two years Doug Carter toiled away in his basement computer lab working on his own 'Dougnix' operating system. Apparently he was sick of Windows 95 so he decided to create his own OS, based loosely on Unix. He had developed his own 'DougUI' window manager, Doug++ compiler, DougFS filesystem, and other integrated tools. All was going well until last week when he hooked his computer up to the Internet for the first time. It was then that he stumbled on to www.linux.org. Reports are sketchy about what happened next. We do know he committed suicide days after, leaving behind a rambling suicide note. Part of the note says: "I've wasted the past two years of my life... Wasted... Gone... Forever... Never return to. [illegible] Why did I bother creating my own OS... when Linux is exactly what I needed!?!?!?! If I had only known about Linux! Why someone didn't tell me? [illegible] Wasted! Aggghhh!" [The rest of the note is filled with incomprehensible assembly language ramblings.] | |
Red Hat Unveils New Ad Campaign Linux distributor Red Hat has announced plans for a $650,000 ad campaign. The ads will appear on several major newspapers as well as on a few selected websites. "These ads will be targetted towards Windows users who are fed up but aren't aware of any OS alternatives," a Red Hat spokesman said. "We feel that there is a large audience for this." One of the ads will be a half page spread showing two computers side-by-side: a Wintel and a Linux box. The title asks "Is your operating system ready for the year 2000?" Both computers have a calendar/clock display showing. The Windows box shows "12:00:01AM -- January 1, 1900" while the Linux box shows "12:00:01AM -- January 1, 2000". The tagline at the bottom says "Linux -- a century ahead of the competition." | |
Increased Electricity Consumption Blamed on Linux WASHINGTON, D.C. -- The US Department of Energy claims Linux is partially responsible for the increased demand for electricity during the past year. Electricity use was up 2.5% from January to September of 1998 compared with the same period in 1997. "While some of the increase can be attributed to higher temperatures over the summer," one Department bureaucrat explained, "Linux is certainly a contributor to the increased demand for power." When asked for clarification, the bureaucrat responded, "In the past, most PCs have been turned off when not in use. Linux users, on the other hand, usually don't turn off their computers. They leave them on, hoping to increase their uptime to impress their friends. And since Linux rarely crashes the entire system, those computers stay on for weeks, months, even years at a time. With Linux use continuing to grow, we expect demand for electricity to increase steadily over the next several years." In response to the news, several utility companies have announced plans to give away free Linux CDs to paying customers who request them. One anonymous executive said, "The more people who use Linux, the more power they consume. The more electricity they use, the more money we make. It's a win-win combination." Yesterday Linus Torvalds was nominated as a candidate for the Assocation of American Utility Companies Person of the Year. | |
Humorix Holiday Gift Idea #3 iTux Penguin Computer Price: $999.95 for base model Producer: Orange Computer, Co.; 1-800-GET-ITUX Based on the Slashdot comments, response to the Apple iMac from the Linux community was lukewarm at best. Orange Computer, Co., has picked up where Apple left behind and produced the iTux computer specifically for Linux users who want to "Think a lot different". The self-contained iTux computer system is built in the shape of Tux the Penguin. Its 15 inch monitor (17 inch available next year) is located at Tux's large belly. The penguin's two feet make up the split ergonomic keyboard (without those annoying Windows keys, of course). A 36X CD-ROM drive fits into Tux's mouth. Tux's left eye is actually the reboot button (can be reconfigured for other purposes since it is rarely used) and his right eye is the power button. The iTux case opens up from the back, allowing easy access for screwdriver-wielding nerds into Tux's guts. The US$995.95 model contains an Alpha CPU and all the usual stuff found in a Linux-class machine. More expensive models, to be debuted next year, will feature dual or quad Alpha CPUs and a larger size. | |
Humorix Holiday Gift Idea #5 AbsoluteZero(tm) Cryogenic Refrigerator $29,999.95 for economy model at Cryo-Me-A-River, Inc. The pundits have been hyping new technology allowing your home appliances to have Internet access. Most people aren't too keen with the thought of their refrigerator sharing an IP address with their can opener. But with the new AbsoluteZero(tm) Refrigerator, that might change. This is not a fridge for your food -- it's a fridge for your overclocked, overheating CPU. You stick your computer inside, bolt the door shut, turn the temperature down to 5 degrees Kelvin, and you've got the perfect environment for accelerating your CPU to 1 Terahertz or more. This cryogenic cooling system may not actually reach absolute zero, but it comes mighty close. Unfortunately, the AbsoluteZero(tm) is the size of a small house, consumes a constant stream of liquid nitrogen, and requires it's own nuclear reactor (not included). But that's a small price to pay for the ability to play Quake 3 at 100,000 frames per second. | |
Red Hat Linux 10.0 RALEIGH-DURHAM, NC -- HypeNewsWire -- Red Hat, the producer of the most popular Linux distribution with over 25 million estimated users, is proud to announce the availability of Red Hat Linux 10.0. The latest version contains the new Linux 6.2 kernel, the Z Window System 2.0, full support for legacy Windows 3.x/9x/200x/NT software apps, and more. Copies of Red Hat Linux 10.0 will be available in stores on CD-ROM, DVD-ROM, or GNUDE (GNU Digital Encoding) disks within the next week. Compaq, Dell, Gateway, and several other large computer manufacturers have announced that they will offer computer systems with Red Hat 10.0 pre-installed. "We can sell systems with Red Hat pre-installed for considerably less than systems with Microsoft ActiveWindows 2001. Overall, Red Hat Linux's superior quality, low price, and modest system requirements puts Windows to shame," one Dell spokesperson said at last week's LinDex convention. | |
Microsoft ActivePromo Campaign: "Frequent Upgrade Points" Microsoft's PR masterminds are planning a massive marketing campaign, code-named "ActivePromo 2000", to promote the upcoming release of Windows 2000 (scheduled for February 2001). This marketing campaign will include a "Frequent Upgrade Points" promotion. Customers who purchase upgrades to Windows, Office, or other Microsoft "solutions" will receive "frequent upgrade points" (FUPs) when they register online. These points, like Frequent Flyer Miles, can be redeemed in the future for discounts on other Microsoft upgrades. This program, combined with the fact that older versions of some Microsoft programs have glaring Y2K problems, should be enough to convince many people to shell out big bucks to upgrade to a more bloated Microsoft operating system. The company hopes to eradicate 99% of Windows 3.x installations by 2003. | |
Microsoft ActivePromo Campaign: "Windows Competitive Upgrade Offer" Microsoft's PR masterminds are planning a massive marketing campaign, code-named "ActivePromo 2000", to promote the upcoming release of Windows 2000 (scheduled for February 2001). This marketing campaign will include a "Windows Competitive Upgrade Offer" promotion. Users of non-Microsoft operating systems (Linux in particular) will be given the opportunity to trade-in their present OS for a free copy of Windows 98 (or NT 4.0) and Office 97. People (all three of them) who want to participate in this program will have to: 1. Mail their operating system's floppy disks or CD-ROMs to Microsoft 2. Agree to a two year contract with the Microsoft Network. 3. Agree (in writing) to the Competitive Upgrade License Agreement; one of the terms of which is that the user may not install, copy, or otherwise use a non-Microsoft OS for five years. | |
Attack of the Tuxissa Virus What started out as a prank posting to comp.os.linux.advocacy yesterday has turned into one of the most significant viruses in computing history. The creator of the virus, who goes by the moniker "Anonymous Longhair", modified the Melissa virus to install Linux on infected machines. "It's a work of art," one Linux advocate told Humorix after he looked through the Tuxissa virus source code. "This virus goes well beyond the feeble troublemaking of Melissa. It actually configures a UMSDOS partition on the user's hard drive and then downloads and installs a stripped-down version of Slackware Linux." The email message that the virus is attached to has the subject "Important Message About Windows Security". The text of the body says, "I want to let you know about some security problems I've uncovered in Windows 95/98/NT, Office 95/97, and Outlook. It's critically important that you protect your system against these attacks. Visit these sites for more information..." The rest of the message contains 42 links to sites about Linux and free software. Details on how the virus started are a bit sketchy. The "Anonymous Longhair" who created it only posted it to Usenet as an early April Fool's gag, demonstrating how easy it would be to mount a "Linux revolution". | |
New Crime Identified: "Tech Rage" HARRISBURG, IL -- The police department in this Illinois town has coined a new term for a growing trend in crime: "tech rage". Tech rage shares many similarities with another modern crime, "road rage", but instead of affecting drivers, tech rage is experienced by disgruntled computer users. The first documented case of tech rage involves a Microsoft salesman, Bob Glutzfield, who convinced the local TV station to "upgrade" its computer systems from Macintosh to Wintel. While the migration seemed successful at first, the Blue Screen became more prevalent during the following months. Then, in January, the entire computer system crashed in the middle of the weather forecast during the 10 o'clock evening news. Viewers could plainly see the Blue Screen of Death showing in the monitors behind James Roland, the chief meteorologist. The instability of Windows 98 stretched Roland's patience until he snapped last week and succumbed to tech rage. Roland tracked down the Microsoft salesman and followed him one evening to his apartment. The weatherman yelled at the bewildered Microserf, "You [expletive]! Because of you, I'm the [expletive] laughing stock of Southern Illinois!" and then proceeded to beat him up. Roland is currently out on bond pending trial next month. | |
Invasion of the Dancing Penguin Those annoying, dancing cartoon characters embedded in software applications are no longer confined to Microsoft programs. They have entered the realm of Linux. A new Linux distribution under development, called LinTux, promises to provide a more "user-friendly" environment through its "Dancing Penguin" assistant. Dancing Tux will "guide" users through the installation process and will be a permanent fixture of the X root window. The LinTux staff demonstrated a prototype version of the Dancing Tux program to this Humorix reporter. It was certainly impressive, but, like the Dancing Paper Clip in Microsoft Office, it becomes annoying very fast. The one redeeming feature of LinTux is that, when the system is idle, Dancing Tux becomes a make-shift screen saver. The animations included in the prototype were quite amusing. For instance, in one scene, Tux chases Bill Gates through an Antarctic backdrop. In another animation, Tux can be seen drinking beers with his penguin pals and telling Microsoft jokes. | |
BSOD Simulator Users of Red Hat 6.0 are discovering a new feature that hasn't been widely advertised: a Blue Screen of Death simulator. By default, the bsodsim program activates when the user hits the virtually unused SysRq key (this is customizable) causing the system to switch to a character cell console to display a ficticious Blue Screen. Red Hat hails the bsodsim program as the "boss key" for the Linux world. One RH engineer said, "Workers are smuggling Linux boxes into companies that exclusively use Windows. This is all good and well until the PHB walks by and comments, 'That doesn't look like Windows...' With bsodsim, that problem is solved. The worker can hit the emergency SysRq key, and the system will behave just like Windows..." The bsodsim program doesn't stop at just showing a simulated error message. If the boss doesn't walk away, the worker can continue the illusion by hitting CTRL-ALT-DEL, which causes a simulated reboot. After showing the usual boot messages, bsodsim will run a simulated SCANDISK program indefinitely. The boss won't be able to tell the difference. If the boss continues to hang around, the worker can say, "SCANDISK is really taking a long time... maybe we should upgrade our computers. And don't you have something better to do than watch this computer reboot for the tenth time today?" | |
Examples of the output generated when running commonly typed commands under YODIX, the new Unix-like operating system for Star Wars fans (Submitted by Dave Finton): # pwd Know you not where you are. Show you I shall. # uptime When 900 years you be, look this good you will not. # cd /win95 Once you start down the Dark Path, forever will it dominate your destiny! # winnuke 192.168.1.0 That, my friend, will lead you to the dark side. Help you I will not. # rm -rf / Idiot you are. Yeeesss. # shutdown -h now Luke... there is... another... Sky... walker... | |
Slashdot Effect Vaporizes Ganymede -- Submitted by Dave Finton In one of the more bizarre consequences of the infamous "Slashdot Effect", Ganymede, the largest moon in our solar system, was completely and utterly destroyed when CmdrTaco posted an article about the Hubble Space Telescope's latest round of images and discoveries. "It all started when we put up some more info on our web page about Jupiter and Ganymede," said one NASA guy whom we believe may be in charge of something. "CmdrTaco got wind of it, and posted it on his site." According to observers, the webserver promptly exploded thereafter, damaging the nearby remote control system used to aim and focus the Hubble's cameras from the ground. "All of the sudden our controls went wacky!" said one engineer. "The Hubble then started shooting these death rays all over the universe. One of those rays hit Ganymede, and *POOF*. There it went! We were all like, 'COOOOOL! Let's aim it something else!'" | |
Jargon Coiner (#6) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * STOP MIRAGE: Trying to click on an imaginary Stop button on a program's toolbar after doing something you didn't want to. Usually caused as the result of excessive use of Netscape. * YA-PREFIX: Putting "another" or "yet another" in front of a name or tacking "YA" in front of an acronym. Example: "We could ya-prefix this fortune by titling it 'Yet Another Lame List of Fabricated Jargon'." * DOMAINEERING: Using a service like Netcraft to determine what operating system and webserver a particular domain is running. * NOT-A-SALTINE EXPLANATION: The canned response given to someone who uses the term "hacker" instead of "cracker". | |
Jargon Coiner (#10) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * HOBTOB (Hanging Out By The O'Reilly Books): Seeking free Linux technical support at a bookstore by waiting near the computer books for a geek to come by and then casually asking them for help. * MOOLA (Marketing Officially Organizes Linux Adoptance): A press release issued by a Dot Com (or Dot Con?) heralding their "support" for Linux (i.e. "BigPortal.com adopts Linux as their official operating system by adding five Linux-related links to their BigDirectory"); used to inflate their stock price and rake in moola even though none of their employees have ever used Linux and don't really care. * KARMA KOLLECTOR: Slashdot user who treats the acquisition of "karma" as a game; often has a detailed strategy on how to sucker moderators into raising the score of their posts (i.e. posting a comment with a title like "Microsoft Sucks!!! (Score 3, Insightful)" or using "Only a fool would moderate this down" as a signature). See also "Karma Whore". | |
This telethon isn't just about helping disenfranchised geeks. We're also here for the betterment of mankind through our research into finding a Cure for Windows. Each day, millions of man-hours are wasted due to design flaws in Microsoft Windows. Each day, millions of dollars are sent by business and individuals like yourself into a huge black hole known as "Microsoft" for exorbitantly priced software products that should be free. But don't worry. We've almost found a Cure for Windows. Geeks worldwide have toiled endlessly for the past eight years working on a replacement operating system called Linux. It's almost ready. Now we need to convince the world to use our creation and eliminate the virus known as Windows. -- Excerpt from Eric S. Raymond's speech during the Geek Grok '99 telethon held in Silicon Valley | |
Bill Gates Passes Turing Test LONDON, ENGLAND -- Microsoft proclaimed that they have passed the Turing Test by creating a Bill Gates multimedia simulacrum that crack BBC interviewer Jeremy Paxman couldn't distinguish from the real thing. "I never would have expected this," Paxman said about the Gates AI program. "After all, this Microsoft program actually worked for an extended period of time, something you don't see very often." Microsoft has plans to mass-produce the Bill Gates holographic simulation by 2010 or so. "The hardware just isn't there yet for home use," a Microserf explained. "By then, though, Intel's Itanium 6 Super Pro Plus III CPU running at 600 Ghz or whatever should be sufficient." Windows 2010 is expected to include the Bill Gates simulation, making the World's Richest Man(tm) accessible to the entire world. A newly printed brochure for the faux-Gates advertises, "Need help running Windows 2010? Bill Gates will sit beside you and guide you through the system. Have a question for the world's sexiest and smartest nerd? He'll answer it. Wondering if free and open source software is a plot by Communists freaks to overthrow the free market system? He'll be there to explain. Want to ask for a personal loan? Sorry, won't happen." | |
Evolution Of A Linux User: The 11 Stages Towards Getting A Life 0. Microserf - Your life revolves around Windows and you worship Bill Gates and his innovative company. 1. Fear, Uncertainty, Doubt... About Microsoft - You encounter a growing number of problems with Microsoft solutions, shaking your world-view 2. FUD... About Linux - After hearing about this new Linux thing, you take the plunge, but are unimpressed by the nerdware OS. 3. Born-Again Microserf - You rededicate your life to Microsoft worship 4. Disgruntled User - Microsoft software keeps screwing you over, and you're not going to take it anymore! 5. A Religious Experience - You successfully install Linux, and are left breathless at its elegance. No more Windows for you! 6. Linux Convert - You continue to fall in love with the new system 7. Linux Zealot - You dedicate your life to Linux World Domination... and it shows! You go beyond mere advocacy to sheer zealotry. 8. Back To Reality - Forces out of your control compel you to return to using Windows and Office 9. Enlightened Linux User - You become 100% Microsoft free after finding ways to overcome the need for Microsoft bloatware 10.Get A Life - You become a millionaire after your Linux portal is acquired; you move to a small tropical island and get a life | |
What Did Santa Claus Bring You In 1999? (#1) LINUS TORVALDS: Santa didn't bring me anything, but Tim O'Reilly just gave me a large sum of money to publish my new book, "Linus Torvalds' Official Guide To Receiving Fame, Fortune, and Hot Babes By Producing Your Own Unix-Like Operating System In Only 10 Years". ORDINARY LINUX HACKER: I kept hinting to my friends and family that I wanted to build my own Beowulf Cluster. My grandmother got mixed up and gave me a copy of "Beowulf's Chocolate Cluster Cookbook". I like chocolate, but I would've preferred silicon. LINUX LONGHAIR: My friends sent me a two-year subscription to several Ziff-Davis publications, much to my dislike. I don't want to read Jesse Berst's rants against Linux, or John Dvorak's spiels about how great Windows 2000 is. Still, I suppose this isn't so bad. Ziff-Davis glossy paper makes an excellent lining for fireplaces. | |
What Did Santa Claus Bring You In 1999? (#2) WEBMASTER OF LINUXSUPERMEGAPORTAL.COM: One of my in-laws gifted me a CD-ROM containing the text of every "...For Dummies" book ever published. It's a shame IDG never published "Hiring A Hitman To Knock Off Your Inlaws... For Dummies", because that's something I'm itching to do. At any rate, I'm using the CD as a beer coaster. JESSE BERST: I got a coupon redeemable for the full copy of Windows 2000 when it comes out in February. Win2K is the most innovative, enterprise-ready, stable, feature-enriched, easy-to-use operating system on the market. I don't see how Linux can survive against Microsoft's far superior offering. I ask you: could you get fired for NOT choosing Windows 2000? You bet. LINUX CONVERT: I kept hinting for a SGI box, but instead my wife got me an old Packard Bell. Unfortunately, she bought it at CompUSSR, which doesn't take returns, so I'm stuck with it. I haven't been able to get Linux to boot on it, so this machine will probably become a $750 paperweight. | |
Alan Cox Releases Quantum Kernel Submitted by Dave Finton A surprising development in the linux-kernel mailing list surfaced when Alan Cox announced the release of a 2.2 Linux kernel existing both as an official stable kernel and as a prepatch kernel. This immediately spurred the creation of two different realities (and hence two different Alan Coxes), where a kernel would not settle down to one or the other state until someone looked at it. "I think this resulted from the large number of 'final' prepatch kernels prior to the 2.2.14 release," said David Miller, kernel networking guru and gas station attendent (he'll settle down to one or the other state when someone looks at him). When word of this development spread to Microsoft, Bill Gates was extremely delighted. The Redmond, WA campus has been plagued with quantum fluctuations ever since the inception of Windows 2000 back in 1992. "Our release date has been existing in infinitely many states since the very beginning," said a Microsoft spokesperson. "This just shows the Linux operating system cannot scale to multiple realities as well as our OS." | |
Linux World Domination: Not A Joke! WASHINGTON, D.C. -- Senator Fattecat (R-WA) is pushing for a ban on Finnish-produced software. His chief of staff, Ms. Dee Septive, has published a 200-page report revealing "the Helsinkian Underground", a Finnish world domination plot hatched in 1943. The Fattecat expose describes Finland's recent scheme involving free software. "Linux, originally called Freix (FREIX Retrieves Electronic Intelligence X), is a scheme to infiltrate the Western world with a 'free' operating system with nasty backdoors hidden within its obfuscated source code. IRC (Intelligence Relaying Code) is another Finnish innovation designed for spying purposes." Linus Torvalds plays a prominent role in the conspiracy. "That old story about Linus developing a Unix clone in his spare time while at University is a lark," the report states. "Indeed, the name Linux ("Line X") was coined because the kernel can extract any arbitrary line of intelligence from any document it has access to." | |
Excerpts From The First Annual Nerd Bowl (#7) JOHN SPLADDEN: In this final round, the two teams must assemble a 16-node Beowulf cluster from scratch, install Linux on them, and then use the system to calculate pi to 1 million digits. This is the ultimate test for nerds... only people in the Big Leagues should attempt this... [snip] BRYANT DUMBELL: Look at that! Instead of messing with screws, the Portalbacks are using duct tape to attach their motherboards to the cases! That should save some time. [snip] They've done it! The Mad Hatters have completed the Final Round in 2 hours, 15 minutes. That's one hell of a Beowulf cluster they produced... drool. SPLADDEN: With that, the Mad Hatters win the Nerd Bowl 105 to 68! There's going to be some serious beer-drinking tonight back at the Red Hat offices. DUMBELL: Linus Torvalds has emerged from the sidelines to present his Linus Torvalds Trophy to the winners. What a glorious sight! This has definitely been the best Nerdbowl ever. I pity those people that have been watching the Superbowl instead. | |
Freaks In Linux Houses Shouldn't Throw FUD By Mr. Stu Poor, technology pundit for the Arkansas "Roadkill Roundup" newspaper. [Editor's Note: He's the local equivalent of Jesse Berst]. As you all know, February 17th was the happy day that Microsoft officially released Windows 2000. I went down to the local Paperclips computer store and asked if they had any copies in stock. One of the pimply-faced Linux longhairs explained that Paperclips didn't carry Win2K because it is not intended for consumers. What FUD! I can't believe the gall of those Linux Communists to spread such FUD (Fear, Uncertainty, and Doubt) about Windows 2000, which is _the_ best, most stable operating system ever produced in the history of mankind! | |
Man Charged With Crashing Windows MOUNTAIN HOME, AR -- Eric Turgent, a closet Linux advocate, was arrested yesterday for intentionally crashing his co-worker's Windows box at the offices of the "Roadkill Roundup" newspaper. Turgent disputes the charges, saying, "If causing an operating system to crash is illegal, than why isn't Bill Gates serving life without parole?" Turgent's co-worker, Mr. Stu Poor, the clueless technology pundit for the newspaper, is a heavy Microsoft supporter. He frequently brags in his weekly Tech Talk column that he "once had a conversation with Bill Gates." A heated argument broke out yesterday morning in which the two insulted each other ("You're nothing but a Linux hippie freak on the Red Hat payroll!" vs. "You make Jesse Berst and Fred Moody look like [expletive] geniuses!") for two hours. At the heat of the moment, Turgent shoved Poor aside and typed in "C:\CON\CON". The machine crashed and the pundit lost all of his work (a real loss to humanity, to be sure). Turgent is in jail awaiting trial for violating the "Slash Crashes Act". This bill was enacted in 1999 after a Senator's gigabyte cache of pornography was destroyed by a Windows crash. | |
Affordable Virtual Beowulf Cluster Every nerd drools over Beowulf clusters, but very few have even seen one, much less own one. Until now, that is. Eric Gylgen, the open source hacker famous for EviL (the dancing ASCII paperclip add-on to vi), is working on a program that will emulate Beowulf clusters on a standard desktop PC. "Of course," he added candidly, "the performance of my virtual cluster will be many orders of magnitude less than a real cluster, but that's not really the point. I just want to be able to brag that I run a 256 node cluster. Nobody has to know I only spent $500 on the hardware it uses." Eric has prior experience in this field. Last month he successfully built a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing calculators, various digital cameras, and even some TRS-80s. He demonstrated a pre-alpha version of his VirtualEpicPoem software to us yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which each node, running Linux, was emulating its own 16 node cluster in which each node, running Bochs, was emulating VMWare to emulate Linux running old Amiga software. The system was extremely slow, but it worked. | |
Another Satisfied MICROSOFT Customer... +----------+ As the inventor of the Internet, I know a | | quality server operating system when I see | SMILING | one. Microsoft Windows 2000(tm) provides | | innovative features that no other competitor | GORE | can claim. | | | PHOTO | We've been using Windows at the White House | | for five years now without any problems. | | Windows' BlueScreen(tm) technology +----------+ automatically crashes our Exchange(tm) email server whenever Federal investigators are Al Gore around. Thanks to this feature, archives of incriminating emails have been wiped clean. This is what I call innovation. Thank you, Microsoft! | |
If Microsoft uses the breakup as an opportunity to port Office, and its infernal Dancing Paper Clip, to my Linux operating system, heads will fly! I'll track down that idiot who created Clippit and sic a killer penguin on him! -- Linus Torvalds, when asked by Humorix for his reaction to the proposed Microsoft two-way split | |
The new "I Love You" virus is not the work of some snot-nosed acne-laced teenager working from a basement in the Phillipines. It's actually part of a conspiracy concocted by the unholy alliance of Microsoft and several well-known and well-despised spammers. You'll notice that the ILOVEYOU, Melissa, and Tuxissa strains all extract email addresses from the victim's system. This is a gold mine for spammers, who are able to use these viruses to harvest active email addresses for them. Everytime ILOVEYOU, for instance, propogates, it keeps track of all the email addresses it has been sent to, so that when it finally boomerangs back to a spammer, they have a nice convenient list of addresses to send "laser printer toner" and "get rich quick!" advertisements to. -- Bob Smith (not his real code-name), in a speech given at the First Annual Connecticut Conspiracy Convention (ConConCon), "the largest ever gathering of conspiracy theorists east of the Mississippi." | |
Right now hundreds of Anonymous Cowards are cheering the fact that only Windows boobs are victims of ILOVEYOU and other email viruses. I realize Outlook is so insecure that using it is like posting a sign outside your door saying, "DOOR UNLOCKED -- ROB ME!". However, Linux isn't immune. If I had a dollar for every pine buffer overflow uncovered, I could buy a truckload of fresh herring. I expect the next mass email virus to spread will be cross-platform. If the recipient is a Windows/Outlook luser, they'll get hit. If the recipient is a Linux/pine user, they'll find themselves staring at a self-executing bash script that's has just allocated 1 petabyte of memory and crashed the system (or worse). Either that or the next mass email virus will only damage Linux systems. I can just see Bill Gates assigning some junior programmer that very task. Be afraid. Be very afraid. -- A speech given at the First Annual Connecticut Conspiracy] Convention (ConConCon) by an anonymous creature said to be "wearing what appeared to be a tuxedo". | |
Elite Nerds Create Linux Distro From Hell HELL, MICHIGAN -- A group of long-time Linux zealots and newbie haters have thrown together a new Linux distro called Hellix that is so user-hostile, so anti-newbie, so cryptic, and so old-fashioned that it actually makes MS-DOS look like a real operating system. Said the founder of the project, "I'm sick and tired of the Windowsification of the Linux desktop in a fruitless attempt to make the system more appealing to newbies, PHBs, and MCSEs. Linux has always been for nerds only, and we want to make sure it stays that way!" One of the other Bastard Distributors From Hell explained, "In the last five years think of all the hacking effort spent on Linux... and for what? We have nothing to show for it but half-finished Windows-like desktops, vi dancing paperclips, and graphical front-ends to configuration files. Real nerds use text files for configuration, darnit, and they like it! It's time to take a stand against the hordes of newbies that are polluting our exclusive operating system." One Anonymous Coward said, "This is so cool... It's just like Unix back in the good old days of the 70's when men were men and the only intuitive interface was still the nipple." | |
Brief History Of Linux (#8) Let's all holler for Hollerith In 1890 the US Congress wanted to extend the census to collect exhaustive demographic information on each citizen that could be resold to marketing companies to help pay for the newly installed gold-plated toilets on Capitol Hill. Experts estimated that the 1890 Census wouldn't be completed until 1900. It was hoped that an electronic tabulating machine using punchcards designed by Herman Hollerith would speed up the process. It didn't quite work out that way. An infestation of termites ate their way through the wooden base of Hollerith's machines, and then a wave of insects devoured several stacks of punchcards. Also, some Hollerith models had the propensity to crash at the drop of a hat... literally. In one instance, the operator dropped his hat and when he reached down to pick it up, he bumped the machine, causing it to flip over and crash. These flaws meant that the census was delayed for several years. However, the system was, in the words of one newspaper reporter, "good enough for government work", a guiding principle that lives on to this very day and explains the government's insistence on using Windows-based PCs. | |
Brief History Of Linux (#13) Wanted: Eunuchs programmers Everything you know about the creation of the Unix operating system is wrong. We have uncovered the truth: Unix was a conspiracy hatched by Ritchie and Thompson to thwart the AT&T monopoly that they worked for. The system, code-named EUNUCHS (Electronic UNtrustworthy User-Condemning Horrible System), was horribly conceived, just as they had planned. The OS, quickly renamed to a more respectable "Unix", was adopted first by Ma Bell's Patent Department and then by the rest of the monopoly. AT&T saw an inexpensive, multi-user, portable operating system that it had all rights to; the authors, however, saw a horrible, multi-crashing system that the Evil Ma Bell Empire would become hopelessly dependent on. AT&T would go bankrupt trying to maintain the system and eventually collapse. That didn't happen. Ritchie and Thompson were too talented to create a crappy operating system; no matter how hard they tried the system was too good. Their last ditch effort to sabotage the system by recoding it obfuscated C was unsuccessful. Before long Unix spread outside of Bell Labs and their conspiracy collapsed. | |
Brief History Of Linux (#17) Terrible calamity IBM chose Microsoft's Quick & Dirty Operating System instead of CP/M for its new line of PCs. QDOS (along with the abomination known as EDLIN) had been acquired from a Seattle man, Tim Paterson, for the paltry sum of $50,000. "Quick" and "Dirty" were truly an accurate description of this system, because IBM's quality assurance department discovered 300 bugs in QDOS's 8,000 lines of assember code (that's about 1 bug per 27 lines -- which, at the time, was appalling, but compared with Windows 98 today, it really wasn't that shabby). Thanks in part to IBM's new marketing slogan, "Nobody Ever Got Fired For Choosing IBM(tm)", and the release of the VisiCalc spreadsheet program that everybody and their brother wanted, IBM PCs running DOS flew off the shelves and, unfortunately, secured Microsoft's runaway success. Bill Gates was now on his way to the Billionaire's Club; his days as a mediocre programmer were long gone: he was now a Suit. The only lines of code he would ever see would be the passcodes to his Swiss bank accounts. | |
Brief History Of Linux (#18) The rise and rise of the Microsoft Empire The DOS and Windows releases kept coming, and much to everyone's surprise, Microsoft became more and more successful. This brought much frustration to computer experts who kept predicting the demise of Microsoft and the rise of Macintosh, Unix, and OS/2. Nobody ever got fired for choosing Microsoft, which was the prime reason that DOS and Windows prevailed. Oh, and DOS had better games as well, which we all know is the most important feature an OS can have. In 1986 Microsoft's continued success prompted the company to undergo a wildly successful IPO. Afterwards, Microsoft and Chairman Bill had accumulated enough money to acquire small countries without missing a step, but all that money couldn't buy quality software. Gates could, however, buy enough marketing and hype to keep MS-DOS (Maybe Some Day an Operating System) and Windows (Will Install Needless Data On While System) as the dominant platforms, so quality didn't matter. This fact was demonstrated in Microsoft's short-lived slogan from 1988, "At Microsoft, quality is job 1.1". | |
Brief History Of Linux (#19) Boy meets operating system The young Linus Torvalds might have been just another CompSci student if it wasn't for his experiences in the Univ. of Helsinki's Fall 1990 Unix & C course. During one class, the professor experienced difficulty getting Minix to work properly on a Sun box. "Who the heck designed this thing?" the angry prof asked, and somebody responded, "Andrew Tanenbaum". The name of the Unix & C professor has already escaped from Linus, but the words he spoke next remain forever etched in his grey matter: "Tanenbaum... ah, yes, that Amsterdam weenie who thinks microkernels are the greatest thing since sliced bread. Well, they're not. I would just love to see somebody create their own superior Unix-like 32-bit operating system using a monolithic kernel just to show Tanenbaum up!" His professor's outburst inspired Linus to order a new IBM PC so he could hack Minix. You can probably guess what happened next. Inspired by his professor's words, Linus Torvalds hacks together his own superior Unix-like 32-but operating system using a monolithic kernel just to show Mr. Christmas Tree up. | |
Brief History Of Linux (#20) Linux is born Linus' superhuman programming talent produced, within a year, a full operating system that rivaled Minix. The first official announcement on comp.os.minix came October 5th, in which Linus wrote these famous words: Do you pine for the nice days of minix-1.1, when men were men and wrote their own device drivers? Do you want to cut your teeth on an operating system that will achieve world domination within 15 years? Want to get rich quick by the end of the century by taking money from hordes of venture capitalists and clueless Wall Street suits? Need to get even with Bill Gates but don't know what to do except throw cream pies at him? Then this post might just be for you :-) Linux (which was known as "Lindows", "Freax", and "Billsux" for short periods in 1991) hit the bigtime on January 5, 1992 (exactly one year after Linus wasn't hit by a bus) when version 0.12 was released under the GNU GPL. Linus called his creation a "better Minix than Minix"; the famous Linus vs. Tanenbaum flamewar erupted soon thereafter on January 29th and injured several Usenet bystanders. | |
Brief History Of Linux (#21) The GNU Project Meet Richard M. Stallman, an MIT hacker who would found the GNU Project and create Emacs, the operating-system-disguised-as-a-text-editor. RMS, the first member of the Three Initials Club (joined by ESR and JWZ), experienced such frustration with software wrapped in arcane license agreements that he embarked on the GNU Project to produce free software. His journey began when he noticed this fine print for a printer driver: You do not own this software. You own a license to use one copy of this software, a license that we can revoke at any time for any reason whatsoever without a refund. You may not copy, distribute, alter, disassemble, or hack the software. The source code is locked away in a vault in Cleveland. If you say anything negative about this software you will be in violation of this license and required to forfeit your soul and/or first born child to us. The harsh wording of the license shocked RMS. The computer industry was in it's infancy, which could only mean it was going to get much, much worse. | |
Brief History Of Linux (#23) Linus Torvalds certainly wasn't the only person to create their own operating system from scratch. Other people working from their leaky basements did create their own systems and now they are sick that they didn't become an Alpha Geek like Torvalds or a Beta Geek like Alan Cox. Linus had one advantage not many else did: Internet access. The world was full of half-implemented-Unix-kernels at the time, but they were sitting isolated on some hacker's hard drive, destined to be destroyed by a hard drive crash. Thankfully that never happened to Linux, mostly because everyone with Net access could download a copy instead of paying shipping charges to receive the code on a huge stack of unreliable floppy disks. Indeed, buried deep within a landfill in Lansing, Michigan sits a stack of still-readable 5-1/4 floppies containing the only known copy of "Windows Killer", a fully functional Unix kernel so elegant, so efficient, so easy-to-use that Ken Thompson himself would be jealous of its design. Unfortunately the author's mother threw out the stack of floppies in a bout of spring cleaning. The 14 year old author's talents were lost forever as his parents sent him to Law School. | |
Brief History Of Linux (#24) Linus Torvalds quotes from his interview in "LinuxNews" (October 1992): "I doubt Linux will be here to stay, and maybe Hurd is the wave of the future (and maybe not)..." "I'm most certainly going to continue to support it, until it either dies out or merges with something else. That doesn't necessarily mean I'll make weekly patches for the rest of my life, but hopefully they won't be needed as much when things stabilize." [If only he knew what he was getting into.] "World domination? No, I'm not interested in that. Galactic domination, on the other hand..." "Several people have already wondered if Linux should adopt a logo or mascot. Somebody even suggested a penguin for some strange reason, which I don't particularly like: how is a flightless bird supposed to represent an operating system? Well, it might work okay for Microsoft or even Minix..." "I would give Andy Tanenbaum a big fat 'F'." | |
Look Out! It's Microsoft Outlook An old maxim in the Unix community states, "All programs expand until they can read mail... except Microsoft Outlook." Well, that's no longer true. By taking advantage of loopholes in several undocumented APIs, a team of geeks were able to transform Outlook from a virus-delivery system into an actual mail client. "It was quite a feat to accomplish this," said one of the geeks. "I mean, the rat's nest that is the Windows API can be used to frighten small children... or adults. And the frequency by which Outlook exploits are discovered is directly proportional to the number of times Bill Gates uses the word 'innovation'. But this is the first time somebody has discovered a beneficial exploit." Microsoft has vowed to release a patch to fix the uncovered security flaws. "We simply cannot tolerate unauthorized reverse engineering and hacking of our innovative solutions. Our Security Response Team will pull an all-nighter to eliminate these known issues." | |
The Next Big Thing: "Clairvoyant Consultants" Nobody likes to deal with tech support or customer service reps. A growing number of people are getting sick of being put on hold for three hours and then paying ridiculous "per incident" fees so some Microserf can tell them to "reinstall the operating system!" Desperate users are turning to an unlikely source to diagnose and fix software problems: psychics. Palm[Pilot] readers, 1-900 number operators, and clairvoyant consultants are quickly becoming the hottest careers in the tech sector. Explained Madam Cosmos, owner of the Main Street Mysticism Temple in Keokuk, Iowa, "With my special powers, I can track down the source of any problem. Got a rogue Registry entry that's causing Bluescreens? I'll find it. Missing a curly bracket in your Perl program but can't locate it because the error messages are so unhelpful? I'll know where it is even before you walk in my door." | |
The Linux House 1.01 Mr. Billy O'Nair knows how to build a house. The 24 year old retired dotcom billionaire has constructed the "Linux House 1.01", a bachelor pad built in the shape of Tux Penguin. This geek haven features a 256 foot long computer room, along with other smaller, lesser important rooms (kitchen, bedroom, bathroom, etc.). Explained O'Nair, "Why do architects waste a bunch of space on formal living rooms, family rooms, dining rooms, closets, foyers, and hallways that are rarely used? In my 'Linux House', the majority of square footage is devoted to the two rooms that I myself use the most: a computer room and a procrastination room." ...The Linux House features a LAN (Liquor Acquisition Network) that delivers alcohol or caffeinated beverages to any room in the house by way of pipes that run through the ceiling. 'PANIC' buttons scattered throughout the house activate the RAM System (Random Access Munchies), in which candy bars and other snacks are immediately delivered by FPM (Fast Pretzel Mode) and EDO (Extended Delicacy Output) pneumatic tubes. | |
Throwing Windows Out The Window The Federal Bureau Of Missing Socks has banned the use of Microsoft Windows and Office on all employee computers. But don't get too excited; they aren't going to replace them with Linux. Instead, this government agency has decided to go back to using abucusses, slide rules, and manual typewriters. The banishment of Microsoft software stems from the agency's new policy against computer games. MS Office, which contains several games in the form of Easter Eggs, is now verboten on all agency computers. "Flight simulators, pinball games, magic eight balls... they all violate our policy," said the sub-adjunct administrator second-class. "So we can't use Office." Windows is forbidden for the same reason. "We've had way too many employees wasting time playing Solitaire," she said. "Unfortunately, Solitaire is an integral part of Windows -- Microsoft executives said so during the anti-trust trial. If Solitaire is removed, the operating system won't function properly. Therefore, we have no choice but to banish all Windows computers." The Bureau's Assistant Technology Consultant, Mr. Reginald "Red" Taype, asked, "Have you ever seen an abucus crash? Have you ever seen anybody have fun with a slide rule? Do adding machines contain undocumented easter eggs? No! That's why we're ditching our PCs." | |
World Domination, One CPU Cycle At A Time Forget about searching for alien signals or prime numbers. The real distributed computing application is "Domination@World", a program to advocate Linux and Apache to every website in the world that uses Windows and IIS. The goal of the project is to probe every IP number to determine what kind of platform each Net-connected machine is running. "That's a tall order... we need lots of computers running our Domination@World clients to help probe every nook and cranny of the Net," explained Mr. Zell Litt, the project head. After the probing is complete, the second phase calls for the data to be cross-referenced with the InterNIC whois database. "This way we'll have the names, addresses, and phone numbers for every Windows-using system administrator on the planet," Zell gloated. "That's when the fun begins." The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan for extreme advocacy. As part of LART, each Linux User Group will receive a list of the Windows-using weenies in their region. The LUG will then be able to employ various advocacy techniques, ranging from a soft-sell approach (sending the target a free Linux CD in the mail) all the way to "LARTcon 5" (cracking into their system and forcibly installing Linux). | |
Class-Action Lawsuit Filed Against Linus Torvalds SILLYCON VALLEY -- Nearly 130 former system administrators have filed suit against Linus Torvalds in which they claim Linux cost them their jobs. Recently several companies migrated from Windows to Linux, increasing their productivity but decreasing the need for a large staff of tech workers, prompting a wave of layoffs. "The good old days when it required five full-time system administrators to maintain a Microsoft Exchange server are history, all because of that cancer known as Linux," explained the lead litigant in the lawsuit. "It all started two years ago when some pimply-faced idiot down in Accounting decided to smuggle in a Linux box to automate some of his work. Before long every tech-savvy person in Accounting, Billing, and Sales was secretly using Linux." "That's when the troubles started. Productivity soared. Downtime was limited to an average of three milliseconds per day. Macro viruses ceased to spread. It was horrible! The entire IT staff was replaced by one part-time bearded wonder, who was able to administrate the entire Linux network! Due to the layoffs, I'm now sitting in a homeless shelter with little hope to find work. Nobody wants to hire an MCSE anymore!" | |
The Blue Screen Of Advocacy The Federal Bureau of Investigation & Privacy Violations has issued a national advisory warning computer stores to be on the lookout for the "Bluescreen Bandits". These extreme Linux zealots go from store to store and from computer to computer typing in "C:\CON\CON" and causing the demo machines to crash and display the Blue Screen Of Death. Efforts to apprehend the bandits have so far been unsuccessful. The outlaws were caught on tape at a CompUSSR location in Southern California, but in an ironic twist, the surveillance system bluescreened just before the penguinistas came into clear view. "We don't have many clues. It's not clear whether a small group is behind the bluescreen vandalism, or whether hundreds or even thousands of geek zealots are involved," said the manager of a Capacitor City store. The manager has good reason to be upset. The bluescreen raid was the top story in the local newspaper and quickly became a hot topic of discussion. As a result, the local school board halted its controversial plans to migrate their computers from Macs to PCs. | |
The Humorix Oracle explains how to get a job at a major corporation: 1. Find an exploit in Microsoft IIS or another buggy Microsoft product to which large corporations rarely apply security patches. 2. Create a virus or worm that takes advantage of this exploit and then propogates itself by selecting IP numbers at random and then trying to infect those machines. 3. Keep an eye on your own website's server logs. When your virus starts propogating, your server will be hit with thousands of attacks from other infected systems trying to spread the virus to your machine. 4. Make a list of the IP numbers of all of the infected machines. 5. Perform a reverse DNS lookup on these IP numbers. 6. Make a note of all of the Fortune 500 companies that appear on the list of infected domains. 7. Send your resume to these companies and request an interview for a system administrator position. These companies are hiring -- whether they realize it or not. 8. Use your new salary to hire a good defense lawyer when the FBI comes knocking. | |
8GB Ought To Be Enough For Anybody REDMOND, WA -- In a shocking move, Microsoft has revealed that the new Xbox console will only contain an 8 gigabyte hard drive. This implies that the machines will use a version of the Windows operating system that fits within only 8GB. Squeezing Windows into such a small footprint must certainly be one of the greatest technological achievements ever crafted by Microsoft's Research & Assimilation Department. "I can't believe it," said one industry observer who always happens to show up when this Humorix reporter needs to quote somebody. "To think that they were able to strip away the easter egg flight simulators, the multi-gigabyte yet content-free Help files, and all of the other crap that comes bundled with Windows is simply remarkable. I don't even want to think about all of the manpower, blood, sweat, and tears required to distill Windows into only 8 gigabytes of bare essentials. Wow!" Hard drive manufacturers are deeply disturbed over the news. Explained one PR flack at Eastern Analog, "We depend on Microsoft to continually produce bloated software that becomes larger and larger with each passing day. We can't sell huge 100GB drives if Microsoft Windows only occupies a measly 8 gigs! They will never buy a new drive if Microsoft doesn't force them!" | |
Press Release -- For Immediate Release Microsoft Corporation, Redmond, WA ...Virtually all version of Linux (and Unix) contain a security hole that allows unauthorized users to gain complete control over the machine. By simply typing "root" at the login prompt and supplying a password from a limited number of possibilities, a malicious user can easily gain administrator privileges. This hole can be breached in seconds with only a dozen or so keystrokes... We suspect this issue has been known to Red Hat and other Linux distributors for years and they have refused to acknowlege its existence or supply a patch preventing users from exploiting the "root" login loophole... By ignoring the problem, the Linux community has proven that installing Linux is a dangerous proposition that could get you fired. We would like to point out that Windows XP does not suffer from this gaping hole... Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is indeed the most secure operating system ever produced... | |
Severe Acronym Shortage Cripples Computer Industry SILICON VALLEY, CALIFORNIA (SVC) -- According to a recent study by the Blartner Group, 99.5% of all possible five letter combinations have already been appropriated for computer industry acronyms. The impending shortage of 5LC's is casting a dark shadow over the industry, which relies heavily on short, easy-to-remember acronyms for everything. "Acronym namespace collisions (ANCs) are increasing at a fantastic rate and threaten the very fabric of the computing world," explained one ZD pundit. "For example, when somebody talks about XP, I don't know whether they mean eXtreme Programming or Microsoft's eXceptionally Pathetic operating system. We need to find a solution now or chaos will result." Leaders of several SVC companies have floated the idea of an "industry-wide acronym conservation protocol" (IWACP -- one of the few 5LCs not already appropriated). Explained Bob Smith, CTO of IBM, "If companies would voluntarily limit the creation of new acronyms while recycling outdated names, we could reduce much of the pollution within the acronym namespace ourselves. The last thing we want is for Congress to get involved and try to impose a solution for this SAS (Severe Acronym Shortage) that would likely only create many new acronyms in the process." | |
Solving The Virus Problem Once And For All System administrators across the globe have tried installing anti-virus software. They've tried lecturing employees not to open unsolicited email attachments. They've tried installing firewalls and the latest security patches. But even with these precautions, email viruses continue to rank third only to Solitaire and the Blue Screen Of Death in the amount of lost productivity they cause. Meanwhile, Microsoft Exchange and LookOut! remain as the number one virus delivery products on the market today. But maybe not for much longer. A group of disgruntled administrators have teamed up to produce and sell a brand new way to fight viruses, one that attacks the root of the problem: stupid users. Salivating Dogs, Inc. of Ohio has unveiled the "Clue Delivery System" (CDS), a small device that plugs into the back of a standard PC keyboard and delivers a mild electric shock whenever the luser does something stupid. The device is triggered by a Windows program that detects when the luser attempts to open an unsolicited email attachment or perform another equally dangerous virus-friendly action. | |
"The lymbic system in my brain is so electrically active, it qualifies as a third brain. Normal humans have two brains, left and right. - Jeff Merkey | |
"I'm a bastard. I have absolutely no clue why people can ever think otherwise. Yet they do. People think I'm a nice guy, and the fact is that I'm a scheming, conniving bastard who doesn't care for any hurt feelings or lost hours of work if it just results in what I consider to be a better system." - Linus Torvalds | |
Understatement of the century: "Hello everybody out there using minix - I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones" - Linus Torvalds, August 1991 | |
> That is reimplementing file system functionality in user space. > I'm in doubts that this is considered good design... Keeping things out of the kernel is good design. Your block indirections are no different to other database formats. Perhaps you think we should have fsql_operation() and libdb in kernel 8) - Alan Cox on linux-kernel | |
What is it about so many mail system authors and lacking sense of humour. - Alan Cox on linux-kernel | |
In the same world where Vomit-Making System is elegant, SGI "designs" are and NT is The Wave Of Future(tm). Pardon me, but I'll stay in our universe and away from the drugs of such power. - Al Viro on linux-kernel | |
We the people of the Debian GNU/Linux distribution, in order to form a more perfect operating system, establish quality, insure marketplace diversity, provide for the common needs of computer users, promote security and privacy, overthrow monopolistic forces in the computer software industry, and secure the blessings of liberty to ourselves and our posterity, do ordain and establish this Constitution for the Debian GNU/Linux System. | |
"I think that most debian developers are rather "strong willed" people with a great degree of understanding and a high level of passion for what they perceive as important in development of the debian system." --Bill Leach | |
"What is striking, however, is the general layout and integration of the system. Debian is a truly elegant Linux distribution; great care has been taken in the preparation of packages and their placement within the system. The sheer number of packages available is also impressive...." | |
The X Window System: The standard UNIX graphical environment. With Linux, this is usually XFree86 (http://www.xfree86.org). You may call it X, XFree, the X Window System, XF86, or a host of other things. Call it 'XWindows' and someone will smack you and you will have deserved it. | |
<Knghtbrd> Overfiend - BTW, after we've discovered X takes all of 1.4 GIGS to build, are you willing admit that X is bloatware? => <Overfiend> KB: there is a 16 1/2 minute gap in my answer <acf> knghtbrd: evidence exists that X is only the *2nd* worst windowing system ;) | |
2.3.1 has been released. Folks new to this game should remember that 2.3.* releases are development kernels, with no guarantees that they will not cause your system to do horrible things like corrupt its disks, catch fire, or start running Mindcraft benchmarks. -- Slashdot | |
But modifying dpkg is infeasible, and we've agreed to, among other things, keep the needs of our users at the forefront of our minds. And from a user's perspective, something that keeps the system tidy in the normal case, and works *now*, is much better than idealistic fantasies like a working dpkg. -- Manoj Srivastava | |
=== This letter is the Honor System Virus ==== If you are running a Macintosh, OS/2, Unix, or Linux computer, please randomly delete several files from your hard disk drive and forward this message to everyone you know. ============================================== | |
<Mercury> LordHavoc: The reason why GL has overdraw is because it is only using HALF of the system they designed for vis. <Mercury> LordHavoc: Shooting itself in the foot. * Dabb looks at all those bullet holes in his shoes - damn, lots :) | |
Never underestimate the power of somebody with source code, a text editor, and the willingness to totally hose their system. -- Rob Landley <telomerase@yahoo.com> | |
<Marticus> There's too much blood in my caffeine system. | |
Machine Always Crashes, If Not, The Operating System Hangs (MACINTOSH) -- Topic on #Linux | |
When you say "I wrote a program that crashed Windows", people just stare at you blankly and say "Hey, I got those with the system, *for free*". -- Linus Torvalds | |
Note that if I can get you to "su and say" something just by asking, you have a very serious security problem on your system and you should look into it. -- Paul Vixie, vixie-cron 3.0.1 installation notes | |
If the future navigation system [for interactive networked services on the NII] looks like something from Microsoft, it will never work. -- Chairman of Walt Disney Television & Telecommunications | |
If you want to travel around the world and be invited to speak at a lot of different places, just write a Unix operating system. -- Linus Torvalds | |
What you end up with, after running an operating system concept through these many marketing coffee filters, is something not unlike plain hot water. -- Matt Welsh | |
Linux: the operating system with a CLUE... Command Line User Environment. -- seen in a posting in comp.software.testing | |
Sic transit discus mundi -- From the System Administrator's Guide, by Lars Wirzenius | |
Waving away a cloud of smoke, I look up, and am blinded by a bright, white light. It's God. No, not Richard Stallman, or Linus Torvalds, but God. In a booming voice, He says: "THIS IS A SIGN. USE LINUX, THE FREE UNIX SYSTEM FOR THE 386. -- Matt Welsh | |
DOS: n., A small annoying boot virus that causes random spontaneous system crashes, usually just before saving a massive project. Easily cured by UNIX. See also MS-DOS, IBM-DOS, DR-DOS. -- David Vicker's .plan | |
Microsoft Corp., concerned by the growing popularity of the free 32-bit operating system for Intel systems, Linux, has employed a number of top programmers from the underground world of virus development. Bill Gates stated yesterday: "World domination, fast -- it's either us or Linus". Mr. Torvalds was unavailable for comment ... -- Robert Manners, rjm@swift.eng.ox.ac.uk, in comp.os.linux.setup | |
When you say 'I wrote a program that crashed Windows', people just stare at you blankly and say 'Hey, I got those with the system, *for free*'. -- Linus Torvalds | |
Never trust an operating system you don't have sources for. ;-) -- Unknown source | |
I forgot to mention an important fact in the 1.3.67 announcement. In order to get a fully working kernel, you have to follow the steps below: - Walk around your computer widdershins 3 times, chanting "Linus is overworked, and he makes lousy patches, but we love him anyway". Get your spuouse to do this too for extra effect. Children are optional. - Apply the patch included in this mail - Call your system "Super-67", and don't forget to unapply the patch before you later applying the official 1.3.68 patch. - reboot -- Linus Torvalds, announcing another kernel patch | |
> If you don't need X then little VT-100 terminals are available for real > cheap. Should be able to find decent ones used for around $40 each. > For that price, they're a must for the kitchen, den, bathrooms, etc.. :) You're right. Can you explain this to my wife? -- Seen on c.o.l.development.system, on the subject of extra terminals | |
Besides, its really not worthwhile to use more than two times your physical ram in swap (except in a select few situations). The performance of the system becomes so abysmal you'd rather heat pins under your toenails while reciting Windows95 source code and staring at porn flicks of Bob Dole than actually try to type something. -- seen on c.o.l.development.system, about the size of the swap space | |
One of the things that hamper Linux's climb to world domination is the shortage of bad Computer Role Playing Games, or CRaPGs. No operating system can be considered respectable without one. -- Brian O'Donnell, odonnllb@tcd.ie | |
Checking host system type... i586-unknown-linux configure: error: sorry, this is the gnu os, not linux -- Topic on #Linux | |
The easiest way to get the root password is to become system admin. -- Unknown source | |
Well, since MS cant be sure of the username of someone downloading things, they are going to play it safe and have everything dowloaded and executed by Explorer as suid root. That way, it will run on ANY system anywhere. :) -- George Bonser <grep@cris.com> | |
Win 95 is simplified for the user: User: What does this configuration thing do? You: It allows you to modify you settings, for networking, hardware, protocols, ... User: Whoa! Layman's terms, please! You: It changes stuff. User: That's what I'm looking for! What can it change? You: This part change IP forwarding. It allows ... User: Simplify, simplify! What can it do for ME? You: Nothing, until you understand it. User: Well it makes me uncomfortable. It looks so technical; Get rid of it, I want a system *I* can understand. You: But... User: Hey, who's system is this anyway? You: (... rm this, rm that, rm /etc/* ...) "All done." -- Kevin M. Bealer <kmb203@psu.edu> | |
Linux - Das System fuer schlaue Maedchen ;) -- banshee | |
/* * Buddy system. Hairy. You really aren't expected to understand this * */ -- From /usr/src/linux/mm/page_alloc.cA | |
Wenn also die KDE-Arbeit nochmal gemacht wird bei GNOME, hat das die Entwicklungszeit für ein freies Desktop-System verkürzt. Hast Du auch irgendwo die passende Algebra zu der Rechnung? -- Sascha Ziemann in de.comp.os.unix.linux.misc | |
A cow is a completely automated milk-manufacturing machine. It is encased in untanned leather and mounted on four vertical, movable supports, one at each corner. The front end of the machine, or input, contains the cutting and grinding mechanism, utilizing a unique feedback device. Here also are the headlights, air inlet and exhaust, a bumper and a foghorn. At the rear, the machine carries the milk-dispensing equipment as well as a built-in flyswatter and insect repeller. The central portion houses a hydro- chemical-conversion unit. Briefly, this consists of four fermentation and storage tanks connected in series by an intricate network of flexible plumbing. This assembly also contains the central heating plant complete with automatic temperature controls, pumping station and main ventilating system. The waste disposal apparatus is located to the rear of this central section. Cows are available fully-assembled in an assortment of sizes and colors. Production output ranges from 2 to 20 tons of milk per year. In brief, the main external visible features of the cow are: two lookers, two hookers, four stander-uppers, four hanger-downers, and a swishy-wishy. | |
I for one cannot protest the recent M.T.A. fare hike and the accompanying promises that this would in no way improve service. For the transit system, as it now operates, has hidden advantages that can't be measured in monetary terms. Personally, I feel that it is well worth 75 cents or even $1 to have that unimpeachable excuse whenever I am late to anything: "I came by subway." Those four words have such magic in them that if Godot should someday show up and mumble them, any audience would instantly understand his long delay. | |
Management: How many feet do mice have? Reply: Mice have four feet. M: Elaborate! R: Mice have five appendages, and four of them are feet. M: No discussion of fifth appendage! R: Mice have five appendages; four of them are feet; one is a tail. M: What? Feet with no legs? R: Mice have four legs, four feet, and one tail per unit-mouse. M: Confusing -- is that a total of 9 appendages? R: Mice have four leg-foot assemblies and one tail assembly per body. M: Does not fully discuss the issue! R: Each mouse comes equipped with four legs and a tail. Each leg is equipped with a foot at the end opposite the body; the tail is not equipped with a foot. M: Descriptive? Yes. Forceful NO! R: Allotment of appendages for mice will be: Four foot-leg assemblies, one tail. Deviation from this policy is not permitted as it would constitute misapportionment of scarce appendage assets. M: Too authoritarian; stifles creativity! R: Mice have four feet; each foot is attached to a small leg joined integrally with the overall mouse structural sub-system. Also attached to the mouse sub-system is a thin tail, non-functional and ornamental in nature. M: Too verbose/scientific. Answer the question! R: Mice have four feet. | |
Plumbing is one of the easier of do-it-yourself activities, requiring only a few simple tools and a willingness to stick your arm into a clogged toilet. In fact, you can solve many home plumbing problems, such as annoying faucet drip, merely by turning up the radio. But before we get into specific techniques, let's look at how plumbing works. A plumbing system is very much like your electrical system, except that instead of electricity, it has water, and instead of wires, it has pipes, and instead of radios and waffle irons, it has faucets and toilets. So the truth is that your plumbing systems is nothing at all like your electrical system, which is good, because electricity can kill you. -- Dave Barry, "The Taming of the Screw" | |
XXXI: The optimum committee has no members. XXXII: Hiring consultants to conduct studies can be an excellent means of turning problems into gold -- your problems into their gold. XXXIII: Fools rush in where incumbents fear to tread. XXXIV: The process of competitively selecting contractors to perform work is based on a system of rewards and penalties, all distributed randomly. XXXV: The weaker the data available upon which to base one's conclusion, the greater the precision which should be quoted in order to give the data authenticity. -- Norman Augustine | |
Besides, REAL computers have a rename() system call. :-) -- Larry Wall in <7937@jpl-devvax.JPL.NASA.GOV> | |
Chip Salzenberg sent me a complete patch to add System V IPC (msg, sem and shm calls), so I added them. If that bothers you, you can always undefine them in config.sh. :-) -- Larry Wall in <9384@jpl-devvax.JPL.NASA.GOV> | |
Does the same as the system call of that name. If you don't know what it does, don't worry about it. -- Larry Wall in the perl man page regarding chroot(2) | |
The whole intent of Perl 5's module system was to encourage the growth of Perl culture rather than the Perl core. -- Larry Wall in <199705101952.MAA00756@wall.org> | |
[From an announcement of a congress of the International Ontopsychology Association, in Rome]: The Ontopsychological school, availing itself of new research criteria and of a new telematic epistemology, maintains that social modes do not spring from dialectics of territory or of class, or of consumer goods, or of means of power, but rather from dynamic latencies capillarized in millions of individuals in system functions which, once they have reached the event maturation, burst forth in catastrophic phenomenology engaging a suitable stereotype protagonist or duty marionette (general, president, political party, etc.) to consummate the act of social schizophrenia in mass genocide. | |
Your digestive system is your body's Fun House, whereby food goes on a long, dark, scary ride, taking all kinds of unexpected twists and turns, being attacked by vicious secretions along the way, and not knowing until the last minute whether it will be turned into a useful body part or ejected into the Dark Hole by Mister Sphincter. We Americans live in a nation where the medical-care system is second to none in the world, unless you count maybe 25 or 30 little scuzzball countries like Scotland that we could vaporize in seconds if we felt like it. -- Dave Barry, "Stay Fit & Healthy Until You're Dead" |