DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
valuable
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Truth is the most valuable thing we have -- so let us economize it.
                -- Mark Twain
===  ALL USERS PLEASE NOTE  ========================

Bug reports now amount to an average of 12,853 per day.  Unfortunately,
this is only a small fraction [ < 1% ] of the mail volume we receive.  In
order that we may more expeditiously deal with these valuable messages,
please communicate them by one of the following paths:

        ARPA:  WastebasketSLMHQ.ARPA
        UUCP:  [berkeley, seismo, harpo]!fubar!thekid!slmhq!wastebasket
         Non-network sites:  Federal Express to:
                Wastebasket
                Room NE43-926
                Copernicus, The Moon, 12345-6789
        For that personal contact feeling call 1-415-642-4948; our trained
        operators are on call 24 hours a day.  VISA/MC accepted.*

* Our very rich lawyers have assured us that we are not
  responsible for any errors or advice given over the phone.
As part of an ongoing effort to keep you, the Fortune reader, abreast of
the valuable information the daily crosses the USENET, Fortune presents:

News articles that answer *your* questions, #1:

        Newsgroups: comp.sources.d
        Subject: how do I run C code received from sources
        Keywords: C sources
        Distribution: na

        I do not know how to run the C programs that are posted in the
        sources newsgroup.  I save the files, edit them to remove the
        headers, and change the mode so that they are executable, but I
        cannot get them to run.  (I have never written a C program before.)

        Must they be compiled?  With what compiler?  How do I do this?  If
        I compile them, is an object code file generated or must I generate
        it explicitly with the > character?  Is there something else that
        must be done?
Dear Emily:
        How can I choose what groups to post in?
                -- Confused

Dear Confused:
        Pick as many as you can, so that you get the widest audience.  After
all, the net exists to give you an audience.  Ignore those who suggest you
should only use groups where you think the article is highly appropriate.
Pick all groups where anybody might even be slightly interested.
        Always make sure followups go to all the groups.  In the rare event
that you post a followup which contains something original, make sure you
expand the list of groups.  Never include a "Followup-to:" line in the
header, since some people might miss part of the valuable discussion in
the fringe groups.
                -- Emily Postnews Answers Your Questions on Netiquette
A good reputation is more valuable than money.
                -- Publilius Syrus
Cheap things are of no value, valuable things are not cheap.
A morsel of genuine history is a thing so rare as to be always valuable.
-- Thomas Jefferson
Once upon a time there was a kingdom ruled by a great bear.  The peasants
were not very rich, and one of the few ways to become at all wealthy was
to become a Royal Knight.  This required an interview with the bear.  If
the bear liked you, you were knighted on the spot.  If not, the bear would
just as likely remove your head with one swat of a paw.  However, the family
of these unfortunate would-be knights was compensated with a beautiful
sheepdog from the royal kennels, which was itself a fairly valuable
possession.  And the moral of the story is:

The mourning after a terrible knight, nothing beats the dog of the bear that
hit you.
You Might be a Microsoft Employee If...

1. When a Microsoft program crashes for the millionth time, you say "Oh,
    well!" and reboot without any negative thoughts
2. The Windows 95 startup screen (the clouds) makes you feel all warm and
    fuzzy inside
3. You fully understand why Windows 95's Shutdown Option has to be
    accessed from the Start Menu
4. You believe Internet Explorer's security flaws were slipped in by a
    crack team of Netscape programmers
5. You keep valuable papers near your fireplace. Therefore, you are
    comfortable with Windows 95's "may-delete-it-at-anytime" philosophy
6. You're the Bob that Microsoft Bob was named after
7. Instead of "I'd rather be fishing," your bumper sticker says, "I'd
    rather be writing buggy Microsoft code"
8. You know the technical difference between OLE 1.0 and OLE 2.0
9. You've ever completed your income taxes while waiting for Windows 95
    to boot, and didn't think anything of it
10. You run Solitaire more than any other program, and therefore you
    consider your computer a Dedicated Solitaire Engine (DSE)
Tux Penguin Beanie Baby Sales Skyrocket

Two weeks ago Ty released a 'Tux the Penguin' Beanie Baby. Sales of the stuffed
toy have exceeded expectations. All 100,000 of them have been sold, and it will
be another week before more can be produced and distributed. Tux is now the one
of the most valuable Beanie Babies, with some stores selling remaining ones for
over $500.

Tux's strong sales constrast sharply with Ty's other computer-related Beanie
Baby, 'Billy the Billionaire'. "Billy's sales are dismal. Except for the 2,000
that Bill Gates bought for himself and his daughter Jennifer, Billy has been a
failure. People just aren't responsive to toys that represent greedy,
capitalistic billionaires with bad haircuts," a member of the Church of Beanie
Baby Collecting said.

Ty is considering releasing other Beanie Babies similar to Tux. Some
possibities include 'Steve the Apple Worm' and 'Wilbur the Gimp'.
"Computer-related Beanie Babies are selling extremely well," a Ty spokesman
said. "I don't understand why people are obsessed with these stupid stuffed
toys. But as long as they're making me lots of money, I don't care! Oops...
Please don't quote me on that."
Excerpts From The First Annual Nerd Bowl (#1)

JOHN SPLADDEN: Hi, and welcome to the first annual Nerd Bowl in sunny
Silicon Valley.

BRYANT DUMBELL: We're coming to you live from the Transmeta Dome to watch
the battle between the North Carolina Mad Hatters and the Michigan
Portalbacks as they compete for the coveted Linus Torvalds Trophy.

SPLADDEN: This is shaping up to be one hell of a match. The Mad Hatters --
sponsored by Linux distributor Red Hat -- have been on fire the past
month. But the Andover.Net sponsored Michigan Portalbacks are on a tear as
well, thanks in part to the stellar performance of Rob "Taco Boy" Malda.

DUMBELL: Taco Boy is quite a star, John. Last week at the Kernelbowl he
blew away the Transmeta Secret Agents when he scored 51 points
singlehandedly in the Flying CompactDiscus round.

SPLADDEN: But then Mad Hatter's Alan Cox was voted this season's Most
Valuable Hacker in the Eastern Division. So, this game is going to be
quite a show.
Are you sick of wasting valuable seconds while ingesting caffeine or
eating a cold pizza? Is your programming project running behind because
you keep falling asleep? EyeOpener(tm) brand caffeinated beverages has the
solution. Our new ActiveIV product will provide a 24 hour supply of
caffeine via intravenous tube while you work -- so you can hack without
any interruptions at all (except going to the bathroom -- but our
Port-a-Urinal(tm) can help solve that problem as well).

EyeOpener(tm) beverages contain at least 5,000% of the daily recommended
dose of caffeine, a quantity that will surely keep you wide awake, alert,
and in Deep Hack Mode for weeks at a time. With EyeOpener and ActiveIV,
you won't waste your valuable time at a vendine machine.

EyeOpener(tm): You'll Never Waste Another Millisecond Ever Again.
Linux Distro To Include Pre-Installed Security Holes

Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired
Bosses, will now include built-in security flaws to better compete with
Microsoft programs.

"The sheer popularity of Windows, Outlook, and IIS clearly shows that
people demand security holes large enough to drive a truck through," said
Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the
consumer wants. Just as Microsoft stole ideas from Apple during the
1980's, we're stealing ideas from Microsoft today."

Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a
mail reader that automatically executes (with root privileges) e-mail
attachments coded in Perl, JavaScript, Python, and Visual Basic.

"Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill.
"Now PHBs won't have to stick with Windows in order to have their
confidential files secretly emailed to their colleagues by a worm. Better
yet, this capability allows viruses to automagically delete unnecessary
files to save disk space without wasting the PHB's valuable time.
Advertising is a valuable economic factor because it is the cheapest
way of selling goods, particularly if the goods are worthless.
                -- Sinclair Lewis
Time is the most valuable thing a man can spend.
                -- Theophrastus
XLVII:
        Two-thirds of the Earth's surface is covered with water.  The other
        third is covered with auditors from headquarters.
XLVIII:
        The more time you spend talking about what you have been doing, the
        less time you have to spend doing what you have been talking about.
        Eventually, you spend more and more time talking about less and less
        until finally you spend all your time talking about nothing.
XLIX:
        Regulations grow at the same rate as weeds.
L:
        The average regulation has a life span one-fifth as long as a
        chimpanzee's and one-tenth as long as a human's -- but four times
        as long as the official's who created it.
LI:
        By the time of the United States Tricentennial, there will be more
        government workers than there are workers.
LII:
        People working in the private sector should try to save money.
        There remains the possibility that it may someday be valuable again.
                -- Norman Augustine
When you said "HEAVILY FORESTED" it reminded me of an overdue CLEANING
BILL ... Don't you SEE?  O'Grogan SWALLOWED a VALUABLE COIN COLLECTION
and HAD to murder the ONLY MAN who KNEW!!
A CODE OF ETHICAL BEHAVIOR FOR PATIENTS:

1. DO NOT EXPECT YOUR DOCTOR TO SHARE YOUR DISCOMFORT.
        Involvement with the patient's suffering might cause him to lose
        valuable scientific objectivity.

2. BE CHEERFUL AT ALL TIMES.
        Your doctor leads a busy and trying life and requires all the
        gentleness and reassurance he can get.

3. TRY TO SUFFER FROM THE DISEASE FOR WHICH YOU ARE BEING TREATED.
        Remember that your doctor has a professional reputation to uphold.
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners