home *** CD-ROM | disk | FTP | other *** search
Text File | 1995-10-20 | 226.3 KB | 5,418 lines |
- !07/11 PDP a ni deppart m'I !pleH
- %
- 101 USES FOR A DEAD MICROPROCESSOR
- (1) Scarecrow for centipedes
- (2) Dead cat brush
- (3) Hair barrettes
- (4) Cleats
- (5) Self-piercing earrings
- (6) Fungus trellis
- (7) False eyelashes
- (8) Prosthetic dog claws
- .
- .
- .
- (99) Window garden harrow (pulled behind Tonka tractors)
- (100) Killer velcro
- (101) Currency
- %
- 1: No code table for op: ++post
- %
- 4.2 BSD UNIX #57: Sun Jun 1 23:02:07 EDT 1986
-
- You swing at the Sun. You miss. The Sun swings. He hits you with a
- 575MB disk! You read the 575MB disk. It is written in an alien
- tongue and cannot be read by your tired Sun-2 eyes. You throw the
- 575MB disk at the Sun. You hit! The Sun must repair your eyes. The
- Sun reads a scroll. He hits your 130MB disk! He has defeated the
- 130MB disk! The Sun reads a scroll. He hits your Ethernet board! He
- has defeated your Ethernet board! You read a scroll of "postpone until
- Monday at 9 AM". Everything goes dark...
- -- /etc/motd, cbosgd
- %
- A biologist, a statistician, a mathematician and a computer scientist are on
- a photo-safari in Africa. As they're driving along the savannah in their
- jeep, they stop and scout the horizon with their binoculars.
-
- The biologist: "Look! A herd of zebras! And there's a white zebra!
- Fantastic! We'll be famous!"
- The statistician: "Hey, calm down, it's not significant. We only know
- there's one white zebra."
- The mathematician: "Actually, we only know there exists a zebra, which is
- white on one side."
- The computer scientist : "Oh, no! A special case!"
- %
- ... A booming voice says, "Wrong, cretin!", and you notice that you
- have turned into a pile of dust.
- %
- A bug in the code is worth two in the documentation.
- %
- A bug in the hand is better than one as yet undetected.
- %
- A certain monk had a habit of pestering the Grand Tortue (the only one who
- had ever reached the Enlightenment 'Yond Enlightenment), by asking whether
- various objects had Buddha-nature or not. To such a question Tortue
- invariably sat silent. The monk had already asked about a bean, a lake,
- and a moonlit night. One day he brought to Tortue a piece of string, and
- asked the same question. In reply, the Grand Tortue grasped the loop
- between his feet and, with a few simple manipulations, created a complex
- string which he proferred wordlessly to the monk. At that moment, the monk
- was enlightened.
-
- From then on, the monk did not bother Tortue. Instead, he made string after
- string by Tortue's method; and he passed the method on to his own disciples,
- who passed it on to theirs.
- %
- A complex system that works is invariably found to have evolved from a
- simple system that works.
- %
- [A computer is] like an Old Testament god, with a lot of rules and no mercy.
- -- Joseph Campbell
- %
- A computer lets you make more mistakes faster than any other invention,
- with the possible exceptions of handguns and Tequilla.
- -- Mitch Ratcliffe
- %
- A computer salesman visits a company president for the purpose of selling
- the president one of the latest talking computers.
- Salesman: "This machine knows everything. I can ask it any quesstion
- and it'll give the correct answer. Computer, what is the
- speed of light?"
- Computer: 186,282 miles per second.
- Salesman: "Who was the first president of the United States?"
- Computer: George Washington.
- President: "I'm still not convinced. Let me ask a question.
- Where is my father?"
- Computer: Your father is fishing in Georgia.
- President: "Hah!! The computer is wrong. My father died over twenty
- years ago!"
- Computer: Your mother's husband died 22 years ago. Your father just
- landed a twelve pound bass.
- %
- A computer scientist is someone who fixes things that aren't broken.
- %
- A computer without COBOL and Fortran is like a piece of chocolate cake
- without ketchup and mustard.
- %
- A CONS is an object which cares.
- -- Bernie Greenberg.
- %
- A debugged program is one for which you have not yet found the conditions
- that make it fail.
- -- Jerry Ogdin
- %
- A disciple of another sect once came to Drescher as he was eating
- his morning meal. "I would like to give you this personality test", said
- the outsider, "because I want you to be happy."
- Drescher took the paper that was offered him and put it into the
- toaster -- "I wish the toaster to be happy too".
- %
- A doctor, an architect, and a computer scientist were arguing about
- whose profession was the oldest. In the course of their arguments, they
- got all the way back to the Garden of Eden, whereupon the doctor said, "The
- medical profession is clearly the oldest, because Eve was made from Adam's
- rib, as the story goes, and that was a simply incredible surgical feat."
- The architect did not agree. He said, "But if you look at the Garden
- itself, in the beginning there was chaos and void, and out of that the Garden
- and the world were created. So God must have been an architect."
- The computer scientist, who'd listened carefully to all of this, then
- commented, "Yes, but where do you think the chaos came from?"
- %
- A famous Lisp Hacker noticed an Undergraduate sitting in front of a Xerox
- 1108, trying to edit a complex Klone network via a browser. Wanting to
- help, the Hacker clicked one of the nodes in the network with the mouse,
- and asked "what do you see?" Very earnestly, the Undergraduate replied "I
- see a cursor." The Hacker then quickly pressed the boot toggle at the back
- of the keyboard, while simultaneously hitting the Undergraduate over the head
- with a thick Interlisp Manual. The Undergraduate was then Enlightened.
- %
- A formal parsing algorithm should not always be used.
- -- D. Gries
- %
- A Fortran compiler is the hobgoblin of little minis.
- %
- A hacker does for love what others would not do for money.
- %
- A language that doesn't affect the way you think about programming is
- not worth knowing.
- %
- A language that doesn't have everything is actually easier to program
- in than some that do.
- -- Dennis M. Ritchie
- %
- A large number of installed systems work by fiat. That is, they work
- by being declared to work.
- -- Anatol Holt
- %
- A LISP programmer knows the value of everything, but the cost of nothing.
- -- Alan Perlis
- %
- A list is only as strong as its weakest link.
- -- Don Knuth
- %
- A little retrospection shows that although many fine, useful software systems
- have been designed by committees and built as part of multipart projects,
- those software systems that have excited passionate fans are those that are
- the products of one or a few designing minds, great designers. Consider Unix,
- APL, Pascal, Modula, the Smalltalk interface, even Fortran; and contrast them
- with Cobol, PL/I, Algol, MVS/370, and MS-DOS.
- -- Fred Brooks
- %
- A man from AI walked across the mountains to SAIL to see the Master,
- Knuth. When he arrived, the Master was nowhere to be found. "Where is the
- wise one named Knuth?" he asked a passing student.
- "Ah," said the student, "you have not heard. He has gone on a
- pilgrimage across the mountains to the temple of AI to seek out new
- disciples."
- Hearing this, the man was Enlightened.
- %
- A manager asked a programmer how long it would take him to finish the
- program on which he was working. "I will be finished tomorrow," the programmer
- promptly replied.
- "I think you are being unrealistic," said the manager. "Truthfully,
- how long will it take?"
- The programmer thought for a moment. "I have some features that I wish
- to add. This will take at least two weeks," he finally said.
- "Even that is too much to expect," insisted the manager, "I will be
- satisfied if you simply tell me when the program is complete."
- The programmer agreed to this.
- Several years later, the manager retired. On the way to his
- retirement lunch, he discovered the programmer asleep at his terminal.
- He had been programming all night.
- -- Geoffrey James, "The Tao of Programming"
- %
- A manager was about to be fired, but a programmer who worked for him
- invented a new program that became popular and sold well. As a result, the
- manager retained his job.
- The manager tried to give the programmer a bonus, but the programmer
- refused it, saying, "I wrote the program because I though it was an interesting
- concept, and thus I expect no reward."
- The manager, upon hearing this, remarked, "This programmer, though he
- holds a position of small esteem, understands well the proper duty of an
- employee. Lets promote him to the exalted position of management consultant!"
- But when told this, the programmer once more refused, saying, "I exist
- so that I can program. If I were promoted, I would do nothing but waste
- everyone's time. Can I go now? I have a program that I'm working on."
- -- Geoffrey James, "The Tao of Programming"
- %
- A manager went to his programmers and told them: "As regards to your
- work hours: you are going to have to come in at nine in the morning and leave
- at five in the afternoon." At this, all of them became angry and several
- resigned on the spot.
- So the manager said: "All right, in that case you may set your own
- working hours, as long as you finish your projects on schedule." The
- programmers, now satisfied, began to come in a noon and work to the wee
- hours of the morning.
- -- Geoffrey James, "The Tao of Programming"
- %
- A manager went to the master programmer and showed him the requirements
- document for a new application. The manager asked the master: "How long will
- it take to design this system if I assign five programmers to it?"
- "It will take one year," said the master promptly.
- "But we need this system immediately or even sooner! How long will it
- take it I assign ten programmers to it?"
- The master programmer frowned. "In that case, it will take two years."
- "And what if I assign a hundred programmers to it?"
- The master programmer shrugged. "Then the design will never be
- completed," he said.
- -- Geoffrey James, "The Tao of Programming"
- %
- A master programmer passed a novice programmer one day. The master
- noted the novice's preoccupation with a hand-held computer game. "Excuse me",
- he said, "may I examine it?"
- The novice bolted to attention and handed the device to the master.
- "I see that the device claims to have three levels of play: Easy, Medium,
- and Hard", said the master. "Yet every such device has another level of play,
- where the device seeks not to conquer the human, nor to be conquered by the
- human."
- "Pray, great master," implored the novice, "how does one find this
- mysterious setting?"
- The master dropped the device to the ground and crushed it under foot.
- And suddenly the novice was enlightened.
- -- Geoffrey James, "The Tao of Programming"
- %
- A master was explaining the nature of Tao to one of his novices.
- "The Tao is embodied in all software -- regardless of how insignificant,"
- said the master.
- "Is Tao in a hand-held calculator?" asked the novice.
- "It is," came the reply.
- "Is the Tao in a video game?" continued the novice.
- "It is even in a video game," said the master.
- "And is the Tao in the DOS for a personal computer?"
- The master coughed and shifted his position slightly. "The lesson
- is over for today," he said.
- -- Geoffrey James, "The Tao of Programming"
- %
- A modem is a baudy house.
- %
- A nasty looking dwarf throws a knife at you.
- %
- *** A NEW KIND OF PROGRAMMING ***
-
- Do you want the instant respect that comes from being able to use technical
- terms that nobody understands? Do you want to strike fear and loathing into
- the hearts of DP managers everywhere? If so, then let the Famous Programmers'
- School lead you on... into the world of professional computer programming.
- They say a good programmer can write 20 lines of effective program per day.
- With our unique training course, we'll show you how to write 20 lines of code
- and lots more besides. Our training course covers every programming language
- in existence, and some that aren't. You'll learn why the on/off switch for a
- computer is so important, what the words *fatal error* mean, and who and what
- you should blame when you make a mistake.
-
- Yes, I want the brochure describing this incredible offer.
- I enclose $1000 is small unmarked bills to cover the cost of
- postage and handling. (No live poultry, please.)
-
- *** Our Slogan: Top down programming for the masses. ***
- %
- A novice asked the Master: "Here is a programmer that never designs,
- documents, or tests his programs. Yet all who know him consider him one of
- the best programmers in the world. Why is this?"
- The Master replies: "That programmer has mastered the Tao. He has
- gone beyond the need for design; he does not become angry when the system
- crashes, but accepts the universe without concern. He has gone beyond the
- need for documentation; he no longer cares if anyone else sees his code. He
- has gone beyond the need for testing; each of his programs are perfect within
- themselves, serene and elegant, their purpose self-evident. Truly, he has
- entered the mystery of the Tao."
- -- Geoffrey James, "The Tao of Programming"
- %
- A novice asked the master: "I have a program that sometimes runs and
- sometimes aborts. I have followed the rules of programming, yet I am totally
- baffled. What is the reason for this?"
- The master replied: "You are confused because you do not understand
- the Tao. Only a fool expects rational behavior from his fellow humans. Why
- do you expect it from a machine that humans have constructed? Computers
- simulate determinism; only the Tao is perfect.
- The rules of programming are transitory; only the Tao is eternal.
- Therefore you must contemplate the Tao before you receive enlightenment."
- "But how will I know when I have received enlightenment?" asked the
- novice.
- "Your program will then run correctly," replied the master.
- -- Geoffrey James, "The Tao of Programming"
- %
- A novice asked the master: "I perceive that one computer company is
- much larger than all others. It towers above its competition like a giant
- among dwarfs. Any one of its divisions could comprise an entire business.
- Why is this so?"
- The master replied, "Why do you ask such foolish questions? That
- company is large because it is so large. If it only made hardware, nobody
- would buy it. If it only maintained systems, people would treat it like a
- servant. But because it combines all of these things, people think it one
- of the gods! By not seeking to strive, it conquers without effort."
- -- Geoffrey James, "The Tao of Programming"
- %
- A novice asked the master: "In the east there is a great tree-structure
- that men call 'Corporate Headquarters'. It is bloated out of shape with
- vice-presidents and accountants. It issues a multitude of memos, each saying
- 'Go, Hence!' or 'Go, Hither!' and nobody knows what is meant. Every year new
- names are put onto the branches, but all to no avail. How can such an
- unnatural entity exist?"
- The master replies: "You perceive this immense structure and are
- disturbed that it has no rational purpose. Can you not take amusement from
- its endless gyrations? Do you not enjoy the untroubled ease of programming
- beneath its sheltering branches? Why are you bothered by its uselessness?"
- -- Geoffrey James, "The Tao of Programming"
- %
- A novice of the temple once approached the Chief Priest with a
- question.
- "Master, does Emacs have the Buddha nature?" the novice asked.
- The Chief Priest had been in the temple for many years and could be
- relied upon to know these things. He thought for several minutes before
- replying.
- "I don't see why not. It's got bloody well everything else."
- With that, the Chief Priest went to lunch. The novice suddenly
- achieved enlightenment, several years later.
-
- Commentary:
-
- His Master is kind,
- Answering his FAQ quickly,
- With thought and sarcasm.
- %
- A novice programmer was once assigned to code a simple financial
- package.
- The novice worked furiously for many days, but when his master
- reviewed his program, he discovered that it contained a screen editor, a set
- of generalized graphics routines, and artificial intelligence interface,
- but not the slightest mention of anything financial.
- When the master asked about this, the novice became indignant.
- "Don't be so impatient," he said, "I'll put the financial stuff in eventually."
- -- Geoffrey James, "The Tao of Programming"
- %
- A novice was trying to fix a broken lisp machine by turning the
- power off and on. Knight, seeing what the student was doing spoke sternly,
- "You cannot fix a machine by just power-cycling it with no understanding
- of what is going wrong." Knight turned the machine off and on. The
- machine worked.
- %
- A person who is more than casually interested in computers should be well
- schooled in machine language, since it is a fundamental part of a computer.
- -- Donald Knuth
- %
- A program should be light and agile, its subroutines connected like a
- strings of pearls. The spirit and intent of the program should be retained
- throughout. There should be neither too little nor too much, neither needless
- loops nor useless variables, neither lack of structure nor overwhelming
- rigidity.
- A program should follow the 'Law of Least Astonishment'. What is this
- law? It is simply that the program should always respond to the user in the
- way that astonishes him least.
- A program, no matter how complex, should act as a single unit. The
- program should be directed by the logic within rather than by outward
- appearances.
- If the program fails in these requirements, it will be in a state of
- disorder and confusion. The only way to correct this is to rewrite the
- program.
- -- Geoffrey James, "The Tao of Programming"
- %
- A programmer from a very large computer company went to a software
- conference and then returned to report to his manager, saying: "What sort
- of programmers work for other companies? They behaved badly and were
- unconcerned with appearances. Their hair was long and unkempt and their
- clothes were wrinkled and old. They crashed out hospitality suites and they
- made rude noises during my presentation."
- The manager said: "I should have never sent you to the conference.
- Those programmers live beyond the physical world. They consider life absurd,
- an accidental coincidence. They come and go without knowing limitations.
- Without a care, they live only for their programs. Why should they bother
- with social conventions?"
- "They are alive within the Tao."
- -- Geoffrey James, "The Tao of Programming"
- %
- A programmer is a person who passes as an exacting expert on the basis of
- being able to turn out, after innumerable punching, an infinite series of
- incomprehensible answers calculated with micrometric precisions from vague
- assumptions based on debatable figures taken from inconclusive documents
- and carried out on instruments of problematical accuracy by persons of
- dubious reliability and questionable mentality for the avowed purpose of
- annoying and confounding a hopelessly defenseless department that was
- unfortunate enough to ask for the information in the first place.
- -- IEEE Grid newsmagazine
- %
- A programming language is low level when its programs require attention
- to the irrelevant.
- %
- A recent study has found that concentrating on difficult off-screen
- objects, such as the faces of loved ones, causes eye strain in computer
- scientists. Researchers into the phenomenon cite the added concentration
- needed to "make sense" of such unnatural three dimensional objects.
- %
- A rolling disk gathers no MOS.
- %
- A sheet of paper crossed my desk the other day and as I read it,
- realization of a basic truth came over me. So simple! So obvious we couldn't
- see it. John Knivlen, Chairman of Polamar Repeater Club, an amateur radio
- group, had discovered how IC circuits work. He says that smoke is the thing
- that makes ICs work because every time you let the smoke out of an IC circuit,
- it stops working. He claims to have verified this with thorough testing.
- I was flabbergasted! Of course! Smoke makes all things electrical
- work. Remember the last time smoke escaped from your Lucas voltage regulator
- Didn't it quit working? I sat and smiled like an idiot as more of the truth
- dawned. It's the wiring harness that carries the smoke from one device to
- another in your Mini, MG or Jag. And when the harness springs a leak, it lets
- the smoke out of everything at once, and then nothing works. The starter motor
- requires large quantities of smoke to operate properly, and that's why the wire
- going to it is so large.
- Feeling very smug, I continued to expand my hypothesis. Why are Lucas
- electronics more likely to leak than say Bosch? Hmmm... Aha!!! Lucas is
- British, and all things British leak! British convertible tops leak water,
- British engines leak oil, British displacer units leak hydrostatic fluid, and
- I might add Brititsh tires leak air, and the British defense unit leaks
- secrets... so naturally British electronics leak smoke.
- -- Jack Banton, PCC Automotive Electrical School
-
- [Ummm ... IC circuits? Integrated circuit circuits?]
- %
- A student, in hopes of understanding the Lambda-nature, came to Greenblatt.
- As they spoke a Multics system hacker walked by. "Is it true", asked the
- student, "that PL-1 has many of the same data types as Lisp?" Almost before
- the student had finished his question, Greenblatt shouted, "FOO!", and hit
- the student with a stick.
- %
- A successful [software] tool is one that was used to do something
- undreamed of by its author.
- -- S. C. Johnson
- %
- A well-used door needs no oil on its hinges.
- A swift-flowing steam does not grow stagnant.
- Neither sound nor thoughts can travel through a vacuum.
- Software rots if not used.
-
- These are great mysteries.
- -- Geoffrey James, "The Tao of Programming"
- %
- A year spent in artificial intelligence is enough to make one believe in God.
- %
- About the use of language: it is impossible to sharpen a pencil with a blunt
- ax. It is equally vain to try to do it with ten blunt axes instead.
- -- Edsger Dijkstra
- %
- Adding features does not necessarily increase functionality -- it just
- makes the manuals thicker.
- %
- Adding manpower to a late software project makes it later.
- -- F. Brooks, "The Mythical Man-Month"
-
- Whenever one person is found adequate to the discharge of a duty by
- close application thereto, it is worse execute by two persons and
- scarcely done at all if three or more are employed therein.
- -- George Washington, 1732-1799
- %
- After sifting through the overwritten remaining blocks of Luke's home
- directory, Luke and PDP-1 sped away from /u/lars, across the surface of the
- Winchester riding Luke's flying read/write head. PDP-1 had Luke stop at the
- edge of the cylinder overlooking /usr/spool/uucp.
- "Unix-to-Unix Copy Program;" said PDP-1. "You will never find a more
- wretched hive of bugs and flamers. We must be cautious."
- -- DECWARS
- %
- Alan Turing thought about criteria to settle the question of whether
- machines can think, a question of which we now know that it is about
- as relevant as the question of whether submarines can swim.
- -- Dijkstra
- %
- Algol-60 surely must be regarded as the most important programming language
- yet developed.
- -- T. Cheatham
- %
- All constants are variables.
- %
- === ALL CSH USERS PLEASE NOTE ========================
-
- Set the variable $LOSERS to all the people that you think are losers. This
- will cause all said losers to have the variable $PEOPLE-WHO-THINK-I-AM-A-LOSER
- updated in their .login file. Should you attempt to execute a job on a
- machine with poor response time and a machine on your local net is currently
- populated by losers, that machine will be freed up for your job through a
- cold boot process.
- %
- All parts should go together without forcing. You must remember that the parts
- you are reassembling were disassembled by you. Therefore, if you can't get
- them together again, there must be a reason. By all means, do not use a hammer.
- -- IBM maintenance manual, 1925
- %
- All programmers are optimists. Perhaps this modern sorcery especially attracts
- those who believe in happy endings and fairy godmothers. Perhaps the hundreds
- of nitty frustrations drive away all but those who habitually focus on the end
- goal. Perhaps it is merely that computers are young, programmers are younger,
- and the young are always optimists. But however the selection process works,
- the result is indisputable: "This time it will surely run," or "I just found
- the last bug."
- -- Frederick Brooks, "The Mythical Man Month"
- %
- All programmers are playwrights and all computers are lousy actors.
- %
- "... all the good computer designs are bootlegged; the formally planned
- products, if they are built at all, are dogs!"
- -- David E. Lundstrom, "A Few Good Men From Univac",
- MIT Press, 1987
- %
- All the simple programs have been written.
- %
- === ALL USERS PLEASE NOTE ========================
-
- A new system, the CIRCULATORY system, has been added.
-
- The long-experimental CIRCULATORY system has been released to users. The
- Lisp Machine uses Type B fluid, the L machine uses Type A fluid. When the
- switch to Common Lisp occurs both machines will, of course, be Type O.
- Please check fluid level by using the DIP stick which is located in the
- back of VMI monitors. Unchecked low fluid levels can cause poor paging
- performance.
- %
- === ALL USERS PLEASE NOTE ========================
-
- Bug reports now amount to an average of 12,853 per day. Unfortunately,
- this is only a small fraction [ < 1% ] of the mail volume we receive. In
- order that we may more expeditiously deal with these valuable messages,
- please communicate them by one of the following paths:
-
- ARPA: WastebasketSLMHQ.ARPA
- UUCP: [berkeley, seismo, harpo]!fubar!thekid!slmhq!wastebasket
- Non-network sites: Federal Express to:
- Wastebasket
- Room NE43-926
- Copernicus, The Moon, 12345-6789
- For that personal contact feeling call 1-415-642-4948; our trained
- operators are on call 24 hours a day. VISA/MC accepted.*
-
- * Our very rich lawyers have assured us that we are not
- responsible for any errors or advice given over the phone.
- %
- === ALL USERS PLEASE NOTE ========================
-
- CAR and CDR now return extra values.
-
- The function CAR now returns two values. Since it has to go to the trouble
- to figure out if the object is carcdr-able anyway, we figured you might as
- well get both halves at once. For example, the following code shows how to
- destructure a cons (SOME-CONS) into its two slots (THE-CAR and THE-CDR):
-
- (MULTIPLE-VALUE-BIND (THE-CAR THE-CDR) (CAR SOME-CONS) ...)
-
- For symmetry with CAR, CDR returns a second value which is the CAR of the
- object. In a related change, the functions MAKE-ARRAY and CONS have been
- fixed so they don't allocate any storage except on the stack. This should
- hopefully help people who don't like using the garbage collector because
- it cold boots the machine so often.
- %
- === ALL USERS PLEASE NOTE ========================
-
- Compiler optimizations have been made to macro expand LET into a WITHOUT-
- INTERRUPTS special form so that it can PUSH things into a stack in the
- LET-OPTIMIZATION area, SETQ the variables and then POP them back when it's
- done. Don't worry about this unless you use multiprocessing.
- Note that LET *could* have been defined by:
-
- (LET ((LET '`(LET ((LET ',LET))
- ,LET)))
- `(LET ((LET ',LET))
- ,LET))
-
- This is believed to speed up execution by as much as a factor of 1.01 or
- 3.50 depending on whether you believe our friendly marketing representatives.
- This code was written by a new programmer here (we snatched him away from
- Itty Bitti Machines where we was writting COUGHBOL code) so to give him
- confidence we trusted his vows of "it works pretty well" and installed it.
- %
- === ALL USERS PLEASE NOTE ========================
-
- JCL support as alternative to system menu.
-
- In our continuing effort to support languages other than LISP on the CADDR,
- we have developed an OS/360-compatible JCL. This can be used as an
- alternative to the standard system menu. Type System J to get to a JCL
- interactive read-execute-diagnose loop window. [Note that for 360
- compatibility, all input lines are truncated to 80 characters.] This
- window also maintains a mouse-sensitive display of critical job parameters
- such as dataset allocation, core allocation, channels, etc. When a JCL
- syntax error is detected or your job ABENDs, the window-oriented JCL
- debugger is entered. The JCL debugger displays appropriate OS/360 error
- messages (such as IEC703, "disk error") and allows you to dequeue your job.
- %
- === ALL USERS PLEASE NOTE ========================
-
- The garbage collector now works. In addition a new, experimental garbage
- collection algorithm has been installed. With SI:%DSK-GC-QLX-BITS set to 17,
- (NOT the default) the old garbage collection algorithm remains in force; when
- virtual storage is filled, the machine cold boots itself. With SI:%DSK-GC-
- QLX-BITS set to 23, the new garbage collector is enabled. Unlike most garbage
- collectors, the new gc starts its mark phase from the mind of the user, rather
- than from the obarray. This allows the garbage collection of significantly
- more Qs. As the garbage collector runs, it may ask you something like "Do you
- remember what SI:RDTBL-TRANS does?", and if you can't give a reasonable answer
- in thirty seconds, the symbol becomes a candidate for GCing. The variable
- SI:%GC-QLX-LUSER-TM governs how long the GC waits before timing out the user.
- %
- === ALL USERS PLEASE NOTE ========================
-
- There has been some confusion concerning MAPCAR.
- (DEFUN MAPCAR (&FUNCTIONAL FCN &EVAL &REST LISTS)
- (PROG (V P LP)
- (SETQ P (LOCF V))
- L (SETQ LP LISTS)
- (%START-FUNCTION-CALL FCN T (LENGTH LISTS) NIL)
- L1 (OR LP (GO L2))
- (AND (NULL (CAR LP)) (RETURN V))
- (%PUSH (CAAR LP))
- (RPLACA LP (CDAR LP))
- (SETQ LP (CDR LP))
- (GO L1)
- L2 (%FINISH-FUNCTION-CALL FCN T (LENGTH LISTS) NIL)
- (SETQ LP (%POP))
- (RPLACD P (SETQ P (NCONS LP)))
- (GO L)))
- We hope this clears up the many questions we've had about it.
- %
- All your files have been destroyed (sorry). Paul.
- %
- Almost anything derogatory you could say about today's software design
- would be accurate.
- -- K.E. Iverson
- %
- Although it is still a truism in industry that "no one was ever fired for
- buying IBM," Bill O'Neil, the chief technology officer at Drexel Burnham
- Lambert, says he knows for a fact that someone has been fired for just that
- reason. He knows it because he fired the guy.
- "He made a bad decision, and what it came down to was, 'Well, I
- bought it because I figured it was safe to buy IBM,'" Mr. O'Neil says.
- "I said, 'No. Wrong. Game over. Next contestant, please.'"
- -- The Wall Street Journal, December 6, 1989
- %
- AmigaDOS Beer: The company has gone out of business, but their recipe has
- been picked up by some weird German company, so now this beer will be an
- import. This beer never really sold very well because the original
- manufacturer didn't understand marketing. Like Unix Beer, AmigaDOS Beer
- fans are an extremely loyal and loud group. It originally came in a
- 16-oz. can, but now comes in 32-oz. cans too. When this can was
- originally introduced, it appeared flashy and colorful, but the design
- hasn't changed much over the years, so it appears dated now. Critics of
- this beer claim that it is only meant for watching TV anyway.
- %
- An Ada exception is when a routine gets in trouble and says
- 'Beam me up, Scotty'.
- %
- An adequate bootstrap is a contradiction in terms.
- %
- An algorithm must be seen to be believed.
- -- D.E. Knuth
- %
- ... an anecdote from IBM's Yorktown Heights Research Center. When a
- programmer used his new computer terminal, all was fine when he was sitting
- down, but he couldn't log in to the system when he was standing up. That
- behavior was 100 percent repeatable: he could always log in when sitting and
- never when standing.
-
- Most of us just sit back and marvel at such a story; how could that terminal
- know whether the poor guy was sitting or standing? Good debuggers, though,
- know that there has to be a reason. Electrical theories are the easiest to
- hypothesize: was there a loose with under the carpet, or problems with static
- electricity? But electrical problems are rarely consistently reproducible.
- An alert IBMer finally noticed that the problem was in the terminal's keyboard:
- the tops of two keys were switched. When the programmer was seated he was a
- touch typist and the problem went unnoticed, but when he stood he was led
- astray by hunting and pecking.
- -- "Programming Pearls" column, by Jon Bentley in CACM February 1985
- %
- An elephant is a mouse with an operating system.
- %
- An engineer is someone who does list processing in FORTRAN.
- %
- An interpretation _I satisfies a sentence in the table language if and only if
- each entry in the table designates the value of the function designated by the
- function constant in the upper-left corner applied to the objects designated
- by the corresponding row and column labels.
- -- Genesereth & Nilsson, "Logical foundations of Artificial
- Intelligence"
- %
- And it should be the law: If you use the word `paradigm' without knowing
- what the dictionary says it means, you go to jail. No exceptions.
- -- David Jones
- %
- And on the seventh day, He exited from append mode.
- %
- Another megabytes the dust.
- %
- Any given program will expand to fill available memory.
- %
- Any given program, when running, is obsolete.
- %
- Any program which runs right is obsolete.
- %
- Any programming language is at its best before it is implemented and used.
- %
- ... Any resemblance between the above views and those of my employer,
- my terminal, or the view out my window are purely coincidental. Any
- resemblance between the above and my own views is non-deterministic. The
- question of the existence of views in the absence of anyone to hold them
- is left as an exercise for the reader. The question of the existence of
- the reader is left as an exercise for the second god coefficient. (A
- discussion of non-orthogonal, non-integral polytheism is beyond the scope
- of this article.)
- %
- Any sufficiently advanced bug is indistinguishable from a feature.
- -- Rich Kulawiec
- %
- Anyone who has attended a USENIX conference in a fancy hotel can tell you
- that a sentence like "You're one of those computer people, aren't you?"
- is roughly equivalent to "Look, another amazingly mobile form of slime
- mold!" in the mouth of a hotel cocktail waitress.
- -- Elizabeth Zwicky
- %
- APL hackers do it in the quad.
- %
- APL is a mistake, carried through to perfection. It is the language of the
- future for the programming techniques of the past: it creates a new generation
- of coding bums.
- -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
- %
- APL is a natural extension of assembler language programming;
- ...and is best for educational purposes.
- -- A. Perlis
- %
- APL is a write-only language. I can write programs in APL, but I can't
- read any of them.
- -- Roy Keir
- %
- Are we running light with overbyte?
- %
- Around computers it is difficult to find the correct unit of time to
- measure progress. Some cathedrals took a century to complete. Can you
- imagine the grandeur and scope of a program that would take as long?
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- As a computer, I find your faith in technology amusing.
- %
- As far as we know, our computer has never had an undetected error.
- -- Weisert
- %
- As in certain cults it is possible to kill a process if you know its true name.
- -- Ken Thompson and Dennis M. Ritchie
- %
- As in Protestant Europe, by contrast, where sects divided endlessly into
- smaller competing sects and no church dominated any other, all is different
- in the fragmented world of IBM. That realm is now a chaos of conflicting
- norms and standards that not even IBM can hope to control. You can buy a
- computer that works like an IBM machine but contains nothing made or sold by
- IBM itself. Renegades from IBM constantly set up rival firms and establish
- standards of their own. When IBM recently abandoned some of its original
- standards and decreed new ones, many of its rivals declared a puritan
- allegiance to IBM's original faith, and denounced the company as a divisive
- innovator. Still, the IBM world is united by its distrust of icons and
- imagery. IBM's screens are designed for language, not pictures. Graven
- images may be tolerated by the luxurious cults, but the true IBM faith relies
- on the austerity of the word.
- -- Edward Mendelson, "The New Republic", February 22, 1988
- %
- As long as there are ill-defined goals, bizarre bugs, and unrealistic
- schedules, there will be Real Programmers willing to jump in and Solve
- The Problem, saving the documentation for later.
- %
- As of next Thursday, UNIX will be flushed in favor of TOPS-10.
- Please update your programs.
- %
- As of next Tuesday, C will be flushed in favor of COBOL.
- Please update your programs.
- %
- As of next week, passwords will be entered in Morse code.
- %
- As part of an ongoing effort to keep you, the Fortune reader, abreast of
- the valuable information the daily crosses the USENET, Fortune presents:
-
- News articles that answer *your* questions, #1:
-
- Newsgroups: comp.sources.d
- Subject: how do I run C code received from sources
- Keywords: C sources
- Distribution: na
-
- I do not know how to run the C programs that are posted in the
- sources newsgroup. I save the files, edit them to remove the
- headers, and change the mode so that they are executable, but I
- cannot get them to run. (I have never written a C program before.)
-
- Must they be compiled? With what compiler? How do I do this? If
- I compile them, is an object code file generated or must I generate
- it explicitly with the > character? Is there something else that
- must be done?
- %
- As part of the conversion, computer specialists rewrote 1,500 programs;
- a process that traditionally requires some debugging.
- -- USA Today, referring to the Internal Revenue Service
- conversion to a new computer system.
- %
- As soon as we started programming, we found to our surprise that it wasn't
- as easy to get programs right as we had thought. Debugging had to be
- discovered. I can remember the exact instant when I realized that a large
- part of my life from then on was going to be spent in finding mistakes in
- my own programs.
- -- Maurice Wilkes, designer of EDSAC, on programming, 1949
- %
- As the system comes up, the component builders will from time to time appear,
- bearing hot new versions of their pieces -- faster, smaller, more complete,
- or putatively less buggy. The replacement of a working component by a new
- version requires the same systematic testing procedure that adding a new
- component does, although it should require less time, for more complete and
- efficient test cases will usually be available.
- -- Frederick Brooks Jr., "The Mythical Man Month"
- %
- As the trials of life continue to take their toll, remember that there
- is always a future in Computer Maintenance.
- -- National Lampoon, "Deteriorata"
- %
- As Will Rogers would have said, "There is no such things as a free variable."
- %
- ASCII a stupid question, you get an EBCDIC answer.
- %
- ASHes to ASHes, DOS to DOS.
- %
- Ask not for whom the <CONTROL-G> tolls.
- %
- Assembly language experience is [important] for the maturity
- and understanding of how computers work that it provides.
- -- D. Gries
- %
- Asynchronous inputs are at the root of our race problems.
- -- D. Winker and F. Prosser
- %
- At about 2500 A.D., humankind discovers a computer problem that *must* be
- solved. The only difficulty is that the problem is NP complete and will
- take thousands of years even with the latest optical biologic technology
- available. The best computer scientists sit down to think up some solution.
- In great dismay, one of the C.S. people tells her husband about it. There
- is only one solution, he says. Remember physics 103, Modern Physics, general
- relativity and all. She replies, "What does that have to do with solving
- a computer problem?"
- "Remember the twin paradox?"
- After a few minutes, she says, "I could put the computer on a very
- fast machine and the computer would have just a few minutes to calculate but
- that is the exact opposite of what we want... Of course! Leave the
- computer here, and accelerate the earth!"
- The problem was so important that they did exactly that. When
- the earth came back, they were presented with the answer:
-
- IEH032 Error in JOB Control Card.
- %
- At first sight, the idea of any rules or principles being superimposed on
- the creative mind seems more likely to hinder than to help, but this is
- quite untrue in practice. Disciplined thinking focuses inspiration rather
- than blinkers it.
- -- G.L. Glegg, "The Design of Design"
- %
- At Group L, Stoffel oversees six first-rate programmers, a managerial
- challenge roughly comparable to herding cats.
- -- The Washington Post Magazine, 9 June, 1985
- %
- At the source of every error which is blamed on the computer you will find
- at least two human errors, including the error of blaming it on the computer.
- %
- Avoid strange women and temporary variables.
- %
- Basic is a high level languish. APL is a high level anguish.
- %
- BASIC is the Computer Science equivalent of `Scientific Creationism'.
- %
- BASIC is to computer programming as QWERTY is to typing.
- -- Seymour Papert
- %
- Be careful when a loop exits to the same place from side and bottom.
- %
- Behind every great computer sits a skinny little geek.
- %
- Bell Labs Unix -- Reach out and grep someone.
- %
- Beware of bugs in the above code; I have only proved it correct, not tried it.
- -- Donald Knuth
- %
- Beware of Programmers who carry screwdrivers.
- -- Leonard Brandwein
- %
- Beware of the Turing Tar-pit in which everything is possible but nothing of
- interest is easy.
- %
- Beware the new TTY code!
- %
- Blinding speed can compensate for a lot of deficiencies.
- -- David Nichols
- %
- BLISS is ignorance.
- %
- Both models are identical in performance, functional operation, and
- interface circuit details. The two models, however, are not compatible
- on the same communications line connection.
- -- Bell System Technical Reference
- %
- Brace yourselves. We're about to try something that borders on the unique:
- an actually rather serious technical book which is not only (gasp) vehemently
- anti-Solemn, but also (shudder) takes sides. I tend to think of it as
- `Constructive Snottiness.'
- -- Mike Padlipsky, "Elements of Networking Style"
- %
- Brain fried -- Core dumped
- %
- Breadth-first search is the bulldozer of science.
- -- Randy Goebel
- %
- Brian Kernighan has an automobile which he helped design.
- Unlike most automobiles, it has neither speedometer, nor gas gauge, nor
- any of the numerous idiot lights which plague the modern driver.
- Rather, if the driver makes any mistake, a giant "?" lights up in the
- center of the dashboard. "The experienced driver", he says, "will
- usually know what's wrong."
- %
- Bringing computers into the home won't change either one, but may
- revitalize the corner saloon.
- %
- Build a system that even a fool can use and only a fool will want to use it.
- %
- Building translators is good clean fun.
- -- T. Cheatham
- %
- Bus error -- driver executed.
- %
- Bus error -- please leave by the rear door.
- %
- But in our enthusiasm, we could not resist a radical overhaul of the
- system, in which all of its major weaknesses have been exposed,
- analyzed, and replaced with new weaknesses.
- -- Bruce Leverett, "Register Allocation in Optimizing Compilers"
- %
- But this has taken us far afield from interface, which is not a bad
- place to be, since I particularly want to move ahead to the kludge.
- Why do people have so much trouble understanding the kludge? What
- is a kludge, after all, but not enough K's, not enough ROM's, not
- enough RAM's, poor quality interface and too few bytes to go around?
- Have I explained yet about the bytes?
- %
- "But what we need to know is, do people want nasally-insertable computers?"
- %
- By long-standing tradition, I take this opportunity to savage other
- designers in the thin disguise of good, clean fun.
- -- P.J. Plauger, "Computer Language", 1988, April
- Fool's column.
- %
- BYTE editors are people who separate the wheat from the chaff, and then
- carefully print the chaff.
- %
- Byte your tongue.
- %
- C Code.
- C Code Run.
- Run, Code, RUN!
- PLEASE!!!!
- %
- C for yourself.
- %
- C makes it easy for you to shoot yourself in the foot. C++ makes that
- harder, but when you do, it blows away your whole leg.
- -- Bjarne Stroustrup
- %
- C'est magnifique, mais ce n'est pas l'Informatique.
- -- Bosquet [on seeing the IBM 4341]
- %
- C++ is the best example of second-system effect since OS/360.
- %
- ... C++ offers even more flexible control over the visibility of member
- objects and member functions. Specifically, members may be placed in the
- public, private, or protected parts of a class. Members declared in the
- public parts are visible to all clients; members declared in the private
- parts are fully encapsulated; and members declared in the protected parts
- are visible only to the class itself and its subclasses. C++ also supports
- the notion of *_______friends*: cooperative classes that are permitted to see each
- other's private parts.
- -- Grady Booch, "Object Oriented Design with Applications"
- %
- Calm down, it's *____only* ones and zeroes.
- %
- Can't open /usr/fortunes. Lid stuck on cookie jar.
- %
- Can't open /usr/games/lib/fortunes.dat.
- %
- CChheecckk yyoouurr dduupplleexx sswwiittcchh..
- %
- CCI Power 6/40: one board, a megabyte of cache, and an attitude...
- %
- Center meeting at 4pm in 2C-543.
- %
- Civilization, as we know it, will end sometime this evening.
- See SYSNOTE tomorrow for more information.
- %
- COBOL is for morons.
- -- E.W. Dijkstra
- %
- Cobol programmers are down in the dumps.
- %
- Coding is easy; All you do is sit staring at a terminal until the drops
- of blood form on your forehead.
- %
- Comparing software engineering to classical engineering assumes that software
- has the ability to wear out. Software typically behaves, or it does not. It
- either works, or it does not. Software generally does not degrade, abrade,
- stretch, twist, or ablate. To treat it as a physical entity, therefore, is
- misapplication of our engineering skills. Classical engineering deals with
- the characteristics of hardware; software engineering should deal with the
- characteristics of *software*, and not with hardware or management.
- -- Dan Klein
- %
- COMPASS [for the CDC-6000 series] is the sort of assembler one expects from
- a corporation whose president codes in octal.
- -- J.N. Gray
- %
- ... computer hardware progress is so fast. No other technology since
- civilization began has seen six orders of magnitude in performance-price
- gain in 30 years.
- -- Fred Brooks
- %
- Computer programmers do it byte by byte.
- %
- Computer programmers never die, they just get lost in the processing.
- %
- Computer programs expand so as to fill the core available.
- %
- Computer Science is merely the post-Turing decline in formal systems theory.
- %
- Computer Science is the only discipline in which we view adding a new wing
- to a building as being maintenance
- -- Jim Horning
- %
- Computers are not intelligent. They only think they are.
- %
- Computers are unreliable, but humans are even more unreliable.
- Any system which depends on human reliability is unreliable.
- -- Gilb
- %
- Computers are useless. They can only give you answers.
- -- Pablo Picasso
- %
- Computers can figure out all kinds of problems, except the things in
- the world that just don't add up.
- %
- Computers don't actually think.
- You just think they think.
- (We think.)
- %
- Computers will not be perfected until they can compute how much more
- than the estimate the job will cost.
- %
- Conceptual integrity in turn dictates that the design must proceed
- from one mind, or from a very small number of agreeing resonant minds.
- -- Frederick Brooks Jr., "The Mythical Man Month"
- %
- Congratulations! You are the one-millionth user to log into our system.
- If there's anything special we can do for you, anything at all, don't
- hesitate to ask!
- %
- Cosmotronic Software Unlimited Inc. does not warrant that the
- functions contained in the program will meet your requirements or that
- the operation of the program will be uninterrupted or error-free.
- However, Cosmotronic Software Unlimited Inc. warrants the
- diskette(s) on which the program is furnished to be of black color and
- square shape under normal use for a period of ninety (90) days from the
- date of purchase.
- NOTE: IN NO EVENT WILL COSMOTRONIC SOFTWARE UNLIMITED OR ITS
- DISTRIBUTORS AND THEIR DEALERS BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING
- ANY LOST PROFIT, LOST SAVINGS, LOST PATIENCE OR OTHER INCIDENTAL OR
- CONSEQUENTIAL DAMAGES.
- -- Horstmann Software Design, the "ChiWriter" user manual
- %
- Couldn't we jury-rig the cat to act as an audio switch, and have it yell
- at people to save their core images before logging them out? I'm sure
- the cattle prod would be effective in this regard. In any case, a traverse
- mounted iguana, while more perverted, gives better traction, not to mention
- being easier to stake.
- %
- Counting in binary is just like counting in decimal -- if you are all thumbs.
- -- Glaser and Way
- %
- Counting in octal is just like counting in decimal--if you don't use your thumbs.
- -- Tom Lehrer
- %
- [Crash programs] fail because they are based on the theory that, with nine
- women pregnant, you can get a baby a month.
- -- Wernher von Braun
- %
- Crazee Edeee, his prices are INSANE!!!
- %
- Creating computer software is always a demanding and painstaking
- process -- an exercise in logic, clear expression, and almost fanatical
- attention to detail. It requires intelligence, dedication, and an
- enormous amount of hard work. But, a certain amount of unpredictable
- and often unrepeatable inspiration is what usually makes the difference
- between adequacy and excellence.
- %
- Creating computer software is always a demanding and painstaking
- process -- an exercise in logic, clear expression, and almost fanatical
- attention to detail. It requires intelligence, dedication, and an
- enormous amount of hard work. But, a certain amount of unpredictable
- and often unrepeatable inspiration is what usually makes the difference
- between adequacy and excellence.
- %
- %DCL-MEM-BAD, bad memory
- VMS-F-PDGERS, pudding between the ears
- %
- Dear Emily, what about test messages?
- -- Concerned
-
- Dear Concerned:
- It is important, when testing, to test the entire net. Never test
- merely a subnet distribution when the whole net can be done. Also put "please
- ignore" on your test messages, since we all know that everybody always skips
- a message with a line like that. Don't use a subject like "My sex is female
- but I demand to be addressed as male." because such articles are read in depth
- by all USEnauts.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Emily:
- How can I choose what groups to post in?
- -- Confused
-
- Dear Confused:
- Pick as many as you can, so that you get the widest audience. After
- all, the net exists to give you an audience. Ignore those who suggest you
- should only use groups where you think the article is highly appropriate.
- Pick all groups where anybody might even be slightly interested.
- Always make sure followups go to all the groups. In the rare event
- that you post a followup which contains something original, make sure you
- expand the list of groups. Never include a "Followup-to:" line in the
- header, since some people might miss part of the valuable discussion in
- the fringe groups.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Emily:
- I collected replies to an article I wrote, and now it's time to
- summarize. What should I do?
- -- Editor
-
- Dear Editor:
- Simply concatenate all the articles together into a big file and post
- that. On USENET, this is known as a summary. It lets people read all the
- replies without annoying newsreaders getting in the way. Do the same when
- summarizing a vote.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Emily:
- I recently read an article that said, "reply by mail, I'll summarize."
- What should I do?
- -- Doubtful
-
- Dear Doubtful:
- Post your response to the whole net. That request applies only to
- dumb people who don't have something interesting to say. Your postings are
- much more worthwhile than other people's, so it would be a waste to reply by
- mail.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Emily:
- I saw a long article that I wish to rebut carefully, what should
- I do?
- -- Angry
-
- Dear Angry:
- Include the entire text with your article, and include your comments
- between the lines. Be sure to post, and not mail, even though your article
- looks like a reply to the original. Everybody *loves* to read those long
- point-by-point debates, especially when they evolve into name-calling and
- lots of "Is too!" -- "Is not!" -- "Is too, twizot!" exchanges.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Emily:
- I'm having a serious disagreement with somebody on the net. I
- tried complaints to his sysadmin, organizing mail campaigns, called for
- his removal from the net and phoning his employer to get him fired.
- Everybody laughed at me. What can I do?
- -- A Concerned Citizen
-
- Dear Concerned:
- Go to the daily papers. Most modern reporters are top-notch computer
- experts who will understand the net, and your problems, perfectly. They
- will print careful, reasoned stories without any errors at all, and surely
- represent the situation properly to the public. The public will also all
- act wisely, as they are also fully cognizant of the subtle nature of net
- society.
- Papers never sensationalize or distort, so be sure to point out things
- like racism and sexism wherever they might exist. Be sure as well that they
- understand that all things on the net, particularly insults, are meant
- literally. Link what transpires on the net to the causes of the Holocaust, if
- possible. If regular papers won't take the story, go to a tabloid paper --
- they are always interested in good stories.
- %
- Dear Emily:
- I'm still confused as to what groups articles should be posted
- to. How about an example?
- -- Still Confused
-
- Dear Still:
- Ok. Let's say you want to report that Gretzky has been traded from
- the Oilers to the Kings. Now right away you might think rec.sport.hockey
- would be enough. WRONG. Many more people might be interested. This is a
- big trade! Since it's a NEWS article, it belongs in the news.* hierarchy
- as well. If you are a news admin, or there is one on your machine, try
- news.admin. If not, use news.misc.
- The Oilers are probably interested in geology, so try sci.physics.
- He is a big star, so post to sci.astro, and sci.space because they are also
- interested in stars. Next, his name is Polish sounding. So post to
- soc.culture.polish. But that group doesn't exist, so cross-post to
- news.groups suggesting it should be created. With this many groups of
- interest, your article will be quite bizarre, so post to talk.bizarre as
- well. (And post to comp.std.mumps, since they hardly get any articles
- there, and a "comp" group will propagate your article further.)
- You may also find it is more fun to post the article once in each
- group. If you list all the newsgroups in the same article, some newsreaders
- will only show the the article to the reader once! Don't tolerate this.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Emily:
- Today I posted an article and forgot to include my signature.
- What should I do?
- -- Forgetful
-
- Dear Forgetful:
- Rush to your terminal right away and post an article that says,
- "Oops, I forgot to post my signature with that last article. Here
- it is."
- Since most people will have forgotten your earlier article,
- (particularly since it dared to be so boring as to not have a nice, juicy
- signature) this will remind them of it. Besides, people care much more
- about the signature anyway.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Ms. Postnews:
- I couldn't get mail through to somebody on another site. What
- should I do?
- -- Eager Beaver
-
- Dear Eager:
- No problem, just post your message to a group that a lot of people
- read. Say, "This is for John Smith. I couldn't get mail through so I'm
- posting it. All others please ignore."
- This way tens of thousands of people will spend a few seconds scanning
- over and ignoring your article, using up over 16 man-hours their collective
- time, but you will be saved the terrible trouble of checking through usenet
- maps or looking for alternate routes. Just think, if you couldn't distribute
- your message to 9000 other computers, you might actually have to (gasp) call
- directory assistance for 60 cents, or even phone the person. This can cost
- as much as a few DOLLARS (!) for a 5 minute call!
- And certainly it's better to spend 10 to 20 dollars of other people's
- money distributing the message than for you to have to waste $9 on an overnight
- letter, or even 25 cents on a stamp!
- Don't forget. The world will end if your message doesn't get through,
- so post it as many places as you can.
- -- Emily Postnews Answers Your Questions on Netiquette
- %
- Dear Sir,
- I am firmly opposed to the spread of microchips either to the home or
- to the office, We have more than enough of them foisted upon us in public
- places. They are a disgusting Americanism, and can only result in the farmers
- being forced to grow smaller potatoes, which in turn will cause massive un-
- employment in the already severely depressed agricultural industry.
- Yours faithfully,
- Capt. Quinton D'Arcy, J.P.
- Sevenoaks
- -- Letters To The Editor, The Times of London
- %
- Debug is human, de-fix divine.
- %
- DEC diagnostics would run on a dead whale.
- -- Mel Ferentz
- %
- #define BITCOUNT(x) (((BX_(x)+(BX_(x)>>4)) & 0x0F0F0F0F) % 255)
- #define BX_(x) ((x) - (((x)>>1)&0x77777777) \
- - (((x)>>2)&0x33333333) \
- - (((x)>>3)&0x11111111))
-
- -- really weird C code to count the number of bits in a word
- %
- (defun NF (a c)
- (cond ((null c) () )
- ((atom (car c))
- (append (list (eval (list 'getchar (list (car c) 'a) (cadr c))))
- (nf a (cddr c))))
- (t (append (list (implode (nf a (car c)))) (nf a (cdr c))))))
-
- (defun AD (want-job challenging boston-area)
- (cond
- ((or (not (equal want-job 'yes))
- (not (equal boston-area 'yes))
- (lessp challenging 7)) () )
- (t (append (nf (get 'ad 'expr)
- '((caaddr 1 caadr 2 car 1 car 1)
- (car 5 cadadr 9 cadadr 8 cadadr 9 caadr 4 car 2 car 1)
- (car 2 caadr 4)))
- (list '851-5071x2661)))))
- ;;; We are an affirmative action employer.
- %
- Deliver yesterday, code today, think tomorrow.
- %
- Did you know that for the price of a 280-Z you can buy two Z-80's?
- -- P.J. Plauger
- %
- Different all twisty a of in maze are you, passages little.
- %
- Digital circuits are made from analog parts.
- -- Don Vonada
- %
- Disc space -- the final frontier!
- %
- DISCLAIMER:
- Use of this advanced computing technology does not imply an endorsement
- of Western industrial civilization.
- %
- Disclaimer: "These opinions are my own, though for a small fee they be
- yours too."
- -- Dave Haynie
- %
- Disk crisis, please clean up!
- %
- Disks travel in packs.
- %
- Disraeli was pretty close: actually, there are Lies, Damn lies, Statistics,
- Benchmarks, and Delivery dates.
- %
- Do not meddle in the affairs of troff, for it is subtle and quick to anger.
- %
- Do not simplify the design of a program if a way can be found to make
- it complex and wonderful.
- %
- Do not use the blue keys on this terminal.
- %
- Do you guys know what you're doing, or are you just hacking?
- %
- *** DO YOU HAVE A RESTLESS URGE TO PROGRAM? ***
- Do you want the instant respect that comes from being able to use technical
- terms that nobody understands? Do you want to strike fear and loathing into
- the hearts of DP managers everywhere? If so, then let the Famous Programmers'
- School lead you on... into the world of professional computer programming.
-
- *** IS PROGRAMMING FOR YOU? ***
- Programming is not for everyone. But, if you have the desire to learn, we can
- help you get started. All you need is the Famous Programmers' Course and
- enough money to keep those lessons coming month after month.
-
- *** TAKE OUR FREE APTITUDE TEST ***
- To help determine if you are qualified to be a programmer, take a moment to
- try this simple test:
- (1) Write down the numbers from zero to nine and the first six letters
- of the alphabet (Hint: 0123456789ABCDEF).
- (2) Whose picture is on the back of a twenty-dollar bill?
- (3) What is the state capital of Idaho?
- If you managed to read all three questions without wondering why we asked
- them, you may have a future as a computer programmer.
- %
- Do you suffer painful elimination?
- -- Don Knuth, "Structured Programming with Gotos"
-
- Do you suffer painful recrimination?
- -- Nancy Boxer, "Structured Programming with Come-froms"
-
- Do you suffer painful illumination?
- -- Isaac Newton, "Optics"
-
- Do you suffer painful hallucination?
- -- Don Juan, cited by Carlos Casteneda
- %
- Documentation is like sex: when it is good, it is very, very good; and
- when it is bad, it is better than nothing.
- -- Dick Brandon
- %
- Documentation is the castor oil of programming.
- Managers know it must be good because the programmers hate it so much.
- %
- Does a good farmer neglect a crop he has planted?
- Does a good teacher overlook even the most humble student?
- Does a good father allow a single child to starve?
- Does a good programmer refuse to maintain his code?
- -- Geoffrey James, "The Tao of Programming"
- %
- Don't compare floating point numbers solely for equality.
- %
- Don't get suckered in by the comments -- they can be terribly misleading.
- Debug only code.
- -- Dave Storer
- %
- Don't hit the keys so hard, it hurts.
- %
- Don't sweat it -- it's only ones and zeros.
- -- P. Skelly
- %
- DOS Air:
- All the passengers go out onto the runway, grab hold of the plane, push it
- until it gets in the air, hop on, jump off when it hits the ground again.
- Then they grab the plane again, push it back into the air, hop on, et
- cetera.
- %
- DOS Beer: Requires you to use your own can opener, and requires you to
- read the directions carefully before opening the can. Originally only
- came in an 8-oz. can, but now comes in a 16-oz. can. However, the can is
- divided into 8 compartments of 2 oz. each, which have to be accessed
- separately. Soon to be discontinued, although a lot of people are going
- to keep drinking it after it's no longer available.
- %
- Due to lack of disk space, this fortune database has been discontinued.
- %
- During the next two hours, the system will be going up and down several
- times, often with lin~po_~{po ~poz~ppo\~{ o n~po_~{o[po ~y oodsou>#w4k**n~po_~{ol;lkld;f;g;dd;po\~{o
- %
- E Pluribus Unix
- %
- Each new user of a new system uncovers a new class of bugs.
- -- Kernighan
- %
- Each of these cults correspond to one of the two antagonists in the age of
- Reformation. In the realm of the Apple Macintosh, as in Catholic Europe,
- worshipers peer devoutly into screens filled with "icons." All is sound and
- imagery and Appledom. Even words look like decorative filigrees in exotic
- typefaces. The greatest icon of all, the inviolable Apple itself, stands in
- the dominate position at the upper-left corner of the screen. A central
- corporate headquarters decrees the form of all rites and practices.
- Infalliable doctrine issues from one executive officer whose selection occurs
- in a sealed boardroom. Should anyone in his curia question his powers, the
- offender is excommunicated into outer darkness. The expelled heretic founds
- a new company, mutters obscurely of the coming age and the next computer,
- then disappears into silence, taking his stockholders with him. The mother
- company forbids financial competition as sternly as it stifles ideological
- competition; if you want to use computer programs that conform to Apple's
- orthodoxy, you must buy a computer made and sold by Apple itself.
- -- Edward Mendelson, "The New Republic", February 22, 1988
- %
- /earth is 98% full ... please delete anyone you can.
- %
- Earth is a beta site.
- %
- /earth: file system full.
- %
- egrep -n '^[a-z].*\(' $ | sort -t':' +2.0
- %
- Einstein argued that there must be simplified explanations of nature, because
- God is not capricious or arbitrary. No such faith comforts the software
- engineer.
- -- Fred Brooks
- %
- Equal bytes for women.
- %
- Error in operator: add beer
- %
- Established technology tends to persist in the face of new technology.
- -- G. Blaauw, one of the designers of System 360
- %
- Eudaemonic research proceeded with the casual mania peculiar to this part of
- the world. Nude sunbathing on the back deck was combined with phone calls to
- Advanced Kinetics in Costa Mesa, American Laser Systems in Goleta, Automation
- Industries in Danbury, Connecticut, Arenberg Ultrasonics in Jamaica Plain,
- Massachusetts, and Hewlett Packard in Sunnyvale, California, where Norman
- Packard's cousin, David, presided as chairman of the board. The trick was to
- make these calls at noon, in the hope that out-to-lunch executives would return
- them at their own expense. Eudaemonic Enterprises, for all they knew, might be
- a fast-growing computer company branching out of the Silicon Valley. Sniffing
- the possibility of high-volume sales, these executives little suspected that
- they were talking on the other end of the line to a naked physicist crazed
- over roulette.
- -- Thomas Bass, "The Eudaemonic Pie"
- %
- <<<<< EVACUATION ROUTE <<<<<
- %
- Even bytes get lonely for a little bit.
- %
- Ever wondered about the origins of the term "bugs" as applied to computer
- technology? U.S. Navy Capt. Grace Murray Hopper has firsthand explanation.
- The 74-year-old captain, who is still on active duty, was a pioneer in
- computer technology during World War II. At the C.W. Post Center of Long
- Island University, Hopper told a group of Long Island public school adminis-
- trators that the first computer "bug" was a real bug--a moth. At Harvard
- one August night in 1945, Hopper and her associates were working on the
- "granddaddy" of modern computers, the Mark I. "Things were going badly;
- there was something wrong in one of the circuits of the long glass-enclosed
- computer," she said. "Finally, someone located the trouble spot and, using
- ordinary tweezers, removed the problem, a two-inch moth. From then on, when
- anything went wrong with a computer, we said it had bugs in it." Hopper
- said that when the veracity of her story was questioned recently, "I referred
- them to my 1945 log book, now in the collection of the Naval Surface Weapons
- Center, and they found the remains of that moth taped to the page in
- question."
- [actually, the term "bug" had even earlier usage in
- regard to problems with radio hardware. Ed.]
- %
- "Every group has a couple of experts. And every group has at least one
- idiot. Thus are balance and harmony (and discord) maintained. It's
- sometimes hard to remember this in the bulk of the flamewars that all
- of the hassle and pain is generally caused by one or two highly-motivated,
- caustic twits."
- -- Chuq Von Rospach, about Usenet
- %
- Every program has at least one bug and can be shortened by at least one
- instruction -- from which, by induction, one can deduce that every
- program can be reduced to one instruction which doesn't work.
- %
- Every program is a part of some other program, and rarely fits.
- %
- Every Solidarity center had piles and piles of paper ... everyone was
- eating paper and a policeman was at the door. Now all you have to do is
- bend a disk.
- -- A member of the outlawed Polish trade union, Solidarity,
- commenting on the benefits of using computers in support
- of their movement.
- %
- Everybody needs a little love sometime; stop hacking and fall in love!
- %
- Everyone can be taught to sculpt: Michelangelo would have had to be
- taught how ___not to. So it is with the great programmers.
- %
- Evolution is a million line computer program falling into place by accident.
- %
- Excessive login or logout messages are a sure sign of senility.
- %
- FACILITY REJECTED 100044200000;
- %
- Feeling amorous, she looked under the sheets and cried, "Oh, no,
- it's Microsoft!"
- %
- Fellow programmer, greetings! You are reading a letter which will bring
- you luck and good fortune. Just mail (or UUCP) ten copies of this letter
- to ten of your friends. Before you make the copies, send a chip or
- other bit of hardware, and 100 lines of 'C' code to the first person on the
- list given at the bottom of this letter. Then delete their name and add
- yours to the bottom of the list.
-
- Don't break the chain! Make the copy within 48 hours. Gerald R. of San
- Diego failed to send out his ten copies and woke the next morning to find
- his job description changed to "COBOL programmer." Fred A. of New York sent
- out his ten copies and within a month had enough hardware and software to
- build a Cray dedicated to playing Zork. Martha H. of Chicago laughed at
- this letter and broke the chain. Shortly thereafter, a fire broke out in
- her terminal and she now spends her days writing documentation for IBM PC's.
-
- Don't break the chain! Send out your ten copies today!
- For example, if \thinmskip = 3mu, this makes \thickmskip = 6mu. But if
- you also want to use \skip12 for horizontal glue, whether in math mode or
- not, the amount of skipping will be in points (e.g., 6pt). The rule is
- that glue in math mode varies with the size only when it is an \mskip;
- when moving between an mskip and ordinary skip, the conversion factor
- 1mu=1pt is always used. The meaning of '\mskip\skip12' and
- '\baselineskip=\the\thickmskip' should be clear.
- -- Donald Knuth, TeX 82 -- Comparison with TeX80
- %
- Fly Windows NT:
- All the passengers carry their seats out onto the tarmac, placing the chairs
- in the outline of a plane. They all sit down, flap their arms and make jet
- swooshing sounds as if they are flying.
- %
- "For that matter, compare your pocket computer with the massive jobs of
- a thousand years ago. Why not, then, the last step of doing away with
- computers altogether?"
- -- Jehan Shuman
- %
- FORTH IF HONK THEN
- %
- FORTRAN is a good example of a language which is easier to parse
- using ad hoc techniques.
- -- D. Gries
- [What's good about it? Ed.]
- %
- FORTRAN is for pipe stress freaks and crystallography weenies.
- %
- FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms,
- and grows in every computer.
- -- A.J. Perlis
- %
- FORTRAN is the language of Powerful Computers.
- -- Steven Feiner
- %
- FORTRAN rots the brain.
- -- John McQuillin
- %
- FORTRAN, "the infantile disorder", by now nearly 20 years old, is hopelessly
- inadequate for whatever computer application you have in mind today: it is
- too clumsy, too risky, and too expensive to use.
- -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
- %
- [FORTRAN] will persist for some time -- probably for at least the next decade.
- -- T. Cheatham
- %
- Fortune suggests uses for YOUR favorite UNIX commands!
-
- Try:
- [Where is Jimmy Hoffa? (C shell)
- ^How did the^sex change operation go? (C shell)
- "How would you rate BSD vs. System V?
- %blow (C shell)
- 'thou shalt not mow thy grass at 8am' (C shell)
- got a light? (C shell)
- !!:Say, what do you think of margarine? (C shell)
- PATH=pretending! /usr/ucb/which sense (Bourne shell)
- make love
- make "the perfect dry martini"
- man -kisses dog (anything up to 4.3BSD)
- i=Hoffa ; >$i; $i; rm $i; rm $i (Bourne shell)
- %
- Fortune suggests uses for YOUR favorite UNIX commands!
-
- Try:
- ar t "God"
- drink < bottle; opener (Bourne Shell)
- cat "food in tin cans" (all but 4.[23]BSD)
- Hey UNIX! Got a match? (V6 or C shell)
- mkdir matter; cat > matter (Bourne Shell)
- rm God
- man: Why did you get a divorce? (C shell)
- date me (anything up to 4.3BSD)
- make "heads or tails of all this"
- who is smart
- (C shell)
- If I had a ) for every dollar of the national debt, what would I have?
- sleep with me (anything up to 4.3BSD)
- %
- fortune: cannot execute. Out of cookies.
- %
- fortune: cpu time/usefulness ratio too high -- core dumped.
- %
- fortune: No such file or directory
- %
- fortune: not found
- %
- Frankly, Scarlett, I don't have a fix.
- -- Rhett Buggler
- %
- [From the operation manual for the CI-300 Dot Matrix Line Printer, made
- in Japan]:
-
- The excellent output machine of MODEL CI-300 as extraordinary DOT MATRIX
- LINE PRINTER, built in two MICRO-PROCESSORs as well as EAROM, is featured by
- permitting wonderful co-existence such as; "high quality against low cost,"
- "diversified functions with compact design," "flexibility in accessibleness
- and durability of approx. 2000,000,00 Dot/Head," "being sophisticated in
- mechanism but possibly agile operating under noises being extremely
- suppressed" etc.
-
- And as a matter of course, the final goal is just simply to help achieve
- "super shuttle diplomacy" between cool data, perhaps earned by HOST
- COMPUTER, and warm heart of human being.
- %
- From the Pro 350 Pocket Service Guide, p. 49, Step 5 of the
- instructions on removing an I/O board from the card cage, comes a new
- experience in sound:
-
- 5. Turn the handle to the right 90 degrees. The pin-spreading
- sound is normal for this type of connector.
- %
- Function reject.
- %
- Garbage In -- Gospel Out.
- %
- GIVE: Support the helpless victims of computer error.
- %
- Given its constituency, the only thing I expect to be "open" about [the
- Open Software Foundation] is its mouth.
- -- John Gilmore
- %
- Giving up on assembly language was the apple in our Garden of Eden: Languages
- whose use squanders machine cycles are sinful. The LISP machine now permits
- LISP programmers to abandon bra and fig-leaf.
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- Go away! Stop bothering me with all your "compute this ... compute that"!
- I'm taking a VAX-NAP.
-
- logout
- %
- //GO.SYSIN DD *, DOODAH, DOODAH
- %
- God is real, unless declared integer.
- %
- God made machine language; all the rest is the work of man.
- %
- Good evening, gentlemen. I am a HAL 9000 computer. I became operational
- at the HAL plant in Urbana, Illinois, on January 11th, nineteen hundred
- ninety-five. My supervisor was Mr. Langley, and he taught me to sing a
- song. If you would like, I could sing it for you.
- %
- Grand Master Turing once dreamed that he was a machine. When he awoke
- he exclaimed:
- "I don't know whether I am Turing dreaming that I am a machine,
- or a machine dreaming that I am Turing!"
- -- Geoffrey James, "The Tao of Programming"
- %
- grep me no patterns and I'll tell you no lines.
- %
- Hacker's Guide To Cooking:
- 2 pkg. cream cheese (the mushy white stuff in silver wrappings that doesn't
- really come from Philadelphia after all; anyway, about 16 oz.)
- 1 tsp. vanilla extract (which is more alcohol than vanilla and pretty
- strong so this part you *GOTTA* measure)
- 1/4 cup sugar (but honey works fine too)
- 8 oz. Cool Whip (the fluffy stuff devoid of nutritional value that you
- can squirt all over your friends and lick off...)
- "Blend all together until creamy with no lumps." This is where you get to
- join(1) all the raw data in a big buffer and then filter it through
- merge(1m) with the -thick option, I mean, it starts out ultra lumpy
- and icky looking and you have to work hard to mix it. Try an electric
- beater if you have a cat(1) that can climb wall(1s) to lick it off
- the ceiling(3m).
- "Pour into a graham cracker crust..." Aha, the BUGS section at last. You
- just happened to have a GCC sitting around under /etc/food, right?
- If not, don't panic(8), merely crumble a rand(3m) handful of innocent
- GCs into a suitable tempfile and mix in some melted butter.
- "...and refrigerate for an hour." Leave the recipe's stdout in a fridge
- for 3.6E6 milliseconds while you work on cleaning up stderr, and
- by time out your cheesecake will be ready for stdin.
- %
- Hackers are just a migratory lifeform with a tropism for computers.
- %
- Hackers of the world, unite!
- %
- Hacking's just another word for nothing left to kludge.
- %
- /* Halley */
-
- (Halley's comment.)
- %
- Happiness is a hard disk.
- %
- Happiness is twin floppies.
- %
- Hardware met Software on the road to Changtse. Software said: "You
- are the Yin and I am the Yang. If we travel together we will become famous
- and earn vast sums of money." And so the pair set forth together, thinking
- to conquer the world.
- Presently, they met Firmware, who was dressed in tattered rags, and
- hobbled along propped on a thorny stick. Firmware said to them: "The Tao
- lies beyond Yin and Yang. It is silent and still as a pool of water. It does
- not seek fame, therefore nobody knows its presence. It does not seeks fortune,
- for it is complete within itself. It exists beyond space and time."
- Software and Hardware, ashamed, returned to their homes.
- -- Geoffrey James, "The Tao of Programming"
- %
- "Has anyone had problems with the computer accounts?"
- "Yes, I don't have one."
- "Okay, you can send mail to one of the tutors ..."
- -- E. D'Azevedo, Computer Science 372
- %
- Has everyone noticed that all the letters of the word "database" are
- typed with the left hand? Now the layout of the QWERTYUIOP typewriter
- keyboard was designed, among other things, to facilitate the even use
- of both hands. It follows, therefore, that writing about databases is
- not only unnatural, but a lot harder than it appears.
- %
- Have you reconsidered a computer career?
- %
- He's like a function -- he returns a value, in the form of his opinion.
- It's up to you to cast it into a void or not.
- -- Phil Lapsley
- %
- HEAD CRASH!! FILES LOST!!
- Details at 11.
- %
- Help me, I'm a prisoner in a Fortune cookie file!
- %
- Help stamp out Mickey-Mouse computer interfaces -- Menus are for Restaurants!
- %
- Help! I'm trapped in a Chinese computer factory!
- %
- Help! I'm trapped in a PDP 11/70!
- %
- HELP!!!! I'm being held prisoner in /usr/games/lib!
- %
- Heuristics are bug ridden by definition. If they didn't have bugs,
- then they'd be algorithms.
- %
- HOLY MACRO!
- %
- HOST SYSTEM NOT RESPONDING, PROBABLY DOWN. DO YOU WANT TO WAIT? (Y/N)
- %
- HOST SYSTEM RESPONDING, PROBABLY UP...
- %
- How can you work when the system's so crowded?
- %
- "How do I love thee? My accumulator overflows."
- %
- How many seconds are there in a year? If I tell you there are
- 3.155 x 10^7, you won't even try to remember it. On the other hand,
- who could forget that, to within half a percent, pi seconds is a
- nanocentury.
- -- Tom Duff, Bell Labs
- %
- How much does it cost to entice a dope-smoking UNIX system guru to Dayton?
- -- Brian Boyle, UNIX/WORLD's First Annual Salary Survey
- %
- How much net work could a network work, if a network could net work?
- %
- Hug me now, you mad, impetuous fool!!
- Oh wait...
- I'm a computer, and you're a person. It would never work out.
- Never mind.
- %
- I *____knew* I had some reason for not logging you off... If I could just
- remember what it was.
- %
- I am a computer. I am dumber than any human and smarter than any administrator.
- %
- I am NOMAD!
- %
- I am not now, nor have I ever been, a member of the demigodic party.
- -- Dennis Ritchie
- %
- I am professionally trained in computer science, which is to say
- (in all seriousness) that I am extremely poorly educated.
- -- Joseph Weizenbaum, "Computer Power and Human Reason"
- %
- I am the wandering glitch -- catch me if you can.
- %
- I asked the engineer who designed the communication terminal's keyboards
- why these were not manufactured in a central facility, in view of the
- small number needed [1 per month] in his factory. He explained that this
- would be contrary to the political concept of local self-sufficiency.
- Therefore, each factory needing keyboards, no matter how few, manufactures
- them completely, even molding the keypads.
- -- Isaac Auerbach, IEEE "Computer", Nov. 1979
- %
- I bet the human brain is a kludge.
- -- Marvin Minsky
- %
- I came, I saw, I deleted all your files.
- %
- I cannot conceive that anybody will require multiplications at the rate
- of 40,000 or even 4,000 per hour ...
- -- F. H. Wales (1936)
- %
- I do not fear computers. I fear the lack of them.
- -- Isaac Asimov
- %
- I had the rare misfortune of being one of the first people to try and
- implement a PL/1 compiler.
- -- T. Cheatham
- %
- I have a very small mind and must live with it.
- -- E. Dijkstra
- %
- I have never seen anything fill up a vacuum so fast and still suck.
- -- Rob Pike, on X.
-
- Steve Jobs said two years ago that X is brain-damaged and it will be
- gone in two years. He was half right.
- -- Dennis Ritchie
-
- Dennis Ritchie is twice as bright as Steve Jobs, and only half wrong.
- -- Jim Gettys
- %
- I have not yet begun to byte!
- %
- I have sacrificed time, health, and fortune, in the desire to complete these
- Calculating Engines. I have also declined several offers of great personal
- advantage to myself. But, notwithstanding the sacrifice of these advantages
- for the purpose of maturing an engine of almost intellectual power, and
- after expending from my own private fortune a larger sum than the government
- of England has spent on that machine, the execution of which it only
- commenced, I have received neither an acknowledgement of my labors, not even
- the offer of those honors or rewards which are allowed to fall within the
- reach of men who devote themselves to purely scientific investigations...
- If the work upon which I have bestowed so much time and thought were
- a mere triumph over mechanical difficulties, or simply curious, or if the
- execution of such engines were of doubtful practicability or utility, some
- justification might be found for the course which has been taken; but I
- venture to assert that no mathematician who has a reputation to lose will
- ever publicly express an opinion that such a machine would be useless if
- made, and that no man distinguished as a civil engineer will venture to
- declare the construction of such machinery impracticable...
- And at a period when the progress of physical science is obstructed
- by that exhausting intellectual and manual labor, indispensable for its
- advancement, which it is the object of the Analytical Engine to relieve, I
- think the application of machinery in aid of the most complicated and abtruse
- calculations can no longer be deemed unworthy of the attention of the country.
- In fact, there is no reason why mental as well as bodily labor should not
- be economized by the aid of machinery.
- -- Charles Babbage, "The Life of a Philosopher"
- %
- I have travelled the length and breadth of this country, and have talked with
- the best people in business administration. I can assure you on the highest
- authority that data processing is a fad and won't last out the year.
- -- Editor in charge of business books at Prentice-Hall
- publishers, responding to Karl V. Karlstrom (a junior
- editor who had recommended a manuscript on the new
- science of data processing), c. 1957
- %
- I haven't lost my mind -- it's backed up on tape somewhere.
- %
- I must have slipped a disk -- my pack hurts!
- %
- I think there's a world market for about five computers.
- -- attr. Thomas J. Watson (Chairman of the Board, IBM), 1943
- %
- I went on to test the program in every way I could devise. I strained
- it to expose its weaknesses. I ran it for high-mass stars and low-mass
- stars, for stars born exceedingly hot and those born relatively cold.
- I ran it assuming the superfluid currents beneath the crust to be
- absent -- not because I wanted to know the answer, but because I had
- developed an intuitive feel for the answer in this particular case.
- Finally I got a run in which the computer showed the pulsar's
- temperature to be less than absolute zero. I had found an error. I
- chased down the error and fixed it. Now I had improved the program to
- the point where it would not run at all.
- -- George Greenstein, "Frozen Star: Of Pulsars, Black
- Holes and the Fate of Stars"
- %
- I went to my first computer conference at the New York Hilton about 20
- years ago. When somebody there predicted the market for microprocessors
- would eventually be in the millions, someone else said, "Where are they
- all going to go? It's not like you need a computer in every doorknob!"
-
- Years later, I went back to the same hotel. I noticed the room keys had
- been replaced by electronic cards you slide into slots in the doors.
-
- There was a computer in every doorknob.
- -- Danny Hillis
- %
- I wish you humans would leave me alone.
- %
- I'm a Lisp variable -- bind me!
- %
- I'm all for computer dating, but I wouldn't want one to marry my sister.
- %
- I'm not even going to *______bother* comparing C to BASIC or FORTRAN.
- -- L. Zolman, creator of BDS C
- %
- I'm still waiting for the advent of the computer science groupie.
- %
- I'm sure that VMS is completely documented, I just haven't found the
- right manual yet. I've been working my way through the manuals in the document
- library and I'm half way through the second cabinet, (3 shelves to go), so I
- should find what I'm looking for by mid May. I hope I can remember what it
- was by the time I find it.
- I had this idea for a new horror film, "VMS Manuals from Hell" or maybe
- "The Paper Chase : IBM vs. DEC". It's based on Hitchcock's "The Birds", except
- that it's centered around a programmer who is attacked by a swarm of binder
- pages with an index number and the single line "This page intentionally left
- blank."
- -- Alex Crain
- %
- I've finally learned what "upward compatible" means. It means we get to
- keep all our old mistakes.
- -- Dennie van Tassel
- %
- I've looked at the listing, and it's right!
- -- Joel Halpern
- %
- I've never been canoeing before, but I imagine there must be just a few
- simple heuristics you have to remember...
-
- Yes, don't fall out, and don't hit rocks.
- %
- I've noticed several design suggestions in your code.
- %
- IBM Advanced Systems Group -- a bunch of mindless jerks, who'll be first
- against the wall when the revolution comes...
- -- with regrets to D. Adams
- %
- If a 6600 used paper tape instead of core memory, it would use up tape
- at about 30 miles/second.
- -- Grishman, Assembly Language Programming
- %
- If a group of _N persons implements a COBOL compiler, there will be _N-1
- passes. Someone in the group has to be the manager.
- -- T. Cheatham
- %
- If a listener nods his head when you're explaining your program, wake him up.
- %
- If a train station is a place where a train stops, what's a workstation?
- %
- If addiction is judged by how long a dumb animal will sit pressing a lever
- to get a "fix" of something, to its own detriment, then I would conclude
- that netnews is far more addictive than cocaine.
- -- Rob Stampfli
- %
- If at first you don't succeed, you must be a programmer.
- %
- If builders built buildings the way programmers wrote programs,
- then the first woodpecker to come along would destroy civilization.
- %
- If computers take over (which seems to be their natural tendency), it will
- serve us right.
- -- Alistair Cooke
- %
- If God had a beard, he'd be a UNIX programmer.
- %
- If God had intended Man to program, we'd be born with serial I/O ports.
- %
- If graphics hackers are so smart, why can't they get the bugs out of
- fresh paint?
- %
- If he once again pushes up his sleeves in order to compute for 3 days
- and 3 nights in a row, he will spend a quarter of an hour before to
- think which principles of computation shall be most appropriate.
- -- Voltaire, "Diatribe du docteur Akakia"
- %
- If I have seen farther than others, it is because I was standing on the
- shoulders of giants.
- -- Isaac Newton
-
- In the sciences, we are now uniquely priviledged to sit side by side with
- the giants on whose shoulders we stand.
- -- Gerald Holton
-
- If I have not seen as far as others, it is because giants were standing on
- my shoulders.
- -- Hal Abelson
-
- Mathematicians stand on each other's shoulders.
- -- Gauss
-
- Mathemeticians stand on each other's shoulders while computer scientists
- stand on each other's toes.
- -- Richard Hamming
-
- It has been said that physicists stand on one another's shoulders. If
- this is the case, then programmers stand on one another's toes, and
- software engineers dig each other's graves.
- -- Unknown
- %
- If I'd known computer science was going to be like this, I'd never have
- given up being a rock 'n' roll star.
- -- G. Hirst
- %
- If it happens once, it's a bug.
- If it happens twice, it's a feature.
- If it happens more than twice, it's a design philosophy.
- %
- If it has syntax, it isn't user friendly.
- %
- If it's not in the computer, it doesn't exist.
- %
- If it's worth hacking on well, it's worth hacking on for money.
- %
- If just one piece of mail gets lost, well, they'll just think they forgot
- to send it. But if *two* pieces of mail get lost, hell, they'll just think
- the other guy hasn't gotten around to answering his mail. And if *fifty*
- pieces of mail get lost, can you imagine it, if *fifty* pieces of mail get
- lost, why they'll think someone *else* is broken! And if 1Gb of mail gets
- lost, they'll just *know* that Arpa [ucbarpa.berkeley.edu] is down and
- think it's a conspiracy to keep them from their God given right to receive
- Net Mail ...
- -- Casey Leedom
- %
- If Machiavelli were a hacker, he'd have worked for the CSSG.
- -- Phil Lapsley
- %
- If Machiavelli were a programmer, he'd have worked for AT&T.
- %
- "If that makes any sense to you, you have a big problem."
- -- C. Durance, Computer Science 234
- %
- If the automobile had followed the same development as the computer, a
- Rolls-Royce would today cost $100, get a million miles per per gallon,
- and explode once a year killing everyone inside.
- -- Robert Cringely, InfoWorld
- %
- If the code and the comments disagree, then both are probably wrong.
- -- Norm Schryer
- %
- If the designers of X-window built cars, there would be no fewer than five
- steering wheels hidden about the cockpit, none of which followed the same
- prinicples -- but you'd be able to shift gears with your car stereo. Useful
- feature, that.
- -- From the programming notebooks of a heretic, 1990.
- %
- If the Tao is great, then the operating system is great. If the
- operating system is great, then the compiler is great. If the compiler
- is great, then the application is great. If the application is great, then
- the user is pleased and there is harmony in the world.
- The Tao gave birth to machine language. Machine language gave birth
- to the assembler.
- The assembler gave birth to the compiler. Now there are ten thousand
- languages.
- Each language has its purpose, however humble. Each language
- expresses the Yin and Yang of software. Each language has its place within
- the Tao.
- But do not program in COBOL if you can avoid it.
- -- Geoffrey James, "The Tao of Programming"
- %
- If the vendors started doing everything right, we would be out of a job.
- Let's hear it for OSI and X! With those babies in the wings, we can count
- on being employed until we drop, or get smart and switch to gardening,
- paper folding, or something.
- -- C. Philip Wood
- %
- If this is timesharing, give me my share right now.
- %
- If you ever want to have a lot of fun, I recommend that you go off and program
- an imbedded system. The salient characteristic of an imbedded system is that
- it cannot be allowed to get into a state from which only direct intervention
- will suffice to remove it. An imbedded system can't permanently trust anything
- it hears from the outside world. It must sniff around, adapt, consider, sniff
- around, and adapt again. I'm not talking about ordinary modular programming
- carefulness here. No. Programming an imbedded system calls for undiluted
- raging maniacal paranoia. For example, our ethernet front ends need to know
- what network number they are on so that they can address and route PUPs
- properly. How do you find out what your network number is? Easy, you ask a
- gateway. Gateways are required by definition to know their correct network
- numbers. Once you've got your network number, you start using it and before
- you can blink you've got it wired into fifteen different sockets spread all
- over creation. Now what happens when the panic-stricken operator realizes he
- was running the wrong version of the gateway which was giving out the wrong
- network number? Never supposed to happen. Tough. Supposing that your
- software discovers that the gateway is now giving out a different network
- number than before, what's it supposed to do about it? This is not discussed
- in the protocol document. Never supposed to happen. Tough. I think you
- get my drift.
- %
- If you have a procedure with 10 parameters, you probably missed some.
- %
- If you put tomfoolery into a computer, nothing comes out but tomfoolery.
- But this tomfoolery, having passed through a very expensive machine,
- is somehow enobled and no-one dare criticise it.
- -- Pierre Gallois
- %
- If you teach your children to like computers and to know how to gamble
- then they'll always be interested in something and won't come to no real harm.
- %
- If you think the system is working, ask someone who's waiting for a prompt.
- %
- If you're crossing the nation in a covered wagon, it's better to have four
- strong oxen than 100 chickens. Chickens are OK but we can't make them work
- together yet.
- -- Ross Bott, Pyramid U.S., on multiprocessors at AUUGM '89.
- %
- Ignorance is bliss.
- -- Thomas Gray
-
- Fortune updates the great quotes, #42:
- BLISS is ignorance.
- %
- Imagine if every Thursday your shoes exploded if you tied them the usual
- way. This happens to us all the time with computers, and nobody thinks of
- complaining.
- -- Jeff Raskin
- %
- Imagine that Cray computer decides to make a personal computer. It has
- a 150 MHz processor, 200 megabytes of RAM, 1500 megabytes of disk
- storage, a screen resolution of 4096 x 4096 pixels, relies entirely on
- voice recognition for input, fits in your shirt pocket and costs $300.
- What's the first question that the computer community asks?
-
- "Is it PC compatible?"
- %
- **** IMPORTANT **** ALL USERS PLEASE NOTE ****
-
- Due to a recent systems overload error your recent disk files have been
- erased. Therefore, in accordance with the UNIX Basic Manual, University of
- Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised
- Federal Communications Act, you are being granted Temporary Disk Space,
- valid for three months from this date, subject to the restrictions set forth
- in Appendix II of the Federal Communications Handbook (18th edition) as well
- as the references mentioned herein. You may apply for more disk space at any
- time. Disk usage in or above the eighth percentile will secure the removal
- of all restrictions and you will immediately receive your permanent disk
- space. Disk usage in the sixth or seventh percentile will not effect the
- validity of your temporary disk space, though its expiration date may be
- extended for a period of up to three months. A score in the fifth percentile
- or below will result in the withdrawal of your Temporary Disk space.
- %
- In a display of perverse brilliance, Carl the repairman mistakes a room
- humidifier for a mid-range computer but manages to tie it into the network
- anyway.
- -- The 5th Wave
- %
- In a five year period we can get one superb programming language. Only
- we can't control when the five year period will begin.
- %
- In a surprise raid last night, federal agents ransacked a house in search
- of a rebel computer hacker. However, they were unable to complete the arrest
- because the warrant was made out in the name of Don Provan, while the only
- person in the house was named don provan. Proving, once again, that Unix is
- superior to Tops10.
- %
- In any formula, constants (especially those obtained from handbooks)
- are to be treated as variables.
- %
- In any problem, if you find yourself doing an infinite amount of work,
- the answer may be obtained by inspection.
- %
- In computing, the mean time to failure keeps getting shorter.
- %
- In English, every word can be verbed. Would that it were so in our
- programming languages.
- %
- In every non-trivial program there is at least one bug.
- %
- In fact, S. M. Simpson, eventually devised an efficient 24-point Fourier
- transform, which was a precursor to the Cooley-Tukey fast Fourier transform
- in 1965. The FFT made all of Simpson's efficient autocorrelation and
- spectrum programs instantly obsolete, on which he had worked half a lifetime.
- -- Proc. IEEE, Sept. 1982, p.900
- %
- In less than a century, computers will be making substantial progress on
- ... the overriding problem of war and peace.
- -- James Slagle
- %
- In practice, failures in system development, like unemployment in Russia,
- happens a lot despite official propaganda to the contrary.
- -- Paul Licker
- %
- In seeking the unattainable, simplicity only gets in the way.
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- In the beginning there was data. The data was without form and
- null, and darkness was upon the face of the console; and the Spirit of
- IBM was moving over the face of the market. And DEC said, "Let there
- be registers"; and there were registers. And DEC saw that they
- carried; and DEC separated the data from the instructions. DEC called
- the data Stack, and the instructions they called Code. And there was
- evening and there was morning, one interrupt.
- -- Rico Tudor, "The Story of Creation or, The Myth of Urk"
- %
- In the beginning was the Tao. The Tao gave birth to Space and Time.
- Therefore, Space and Time are the Yin and Yang of programming.
-
- Programmers that do not comprehend the Tao are always running out of
- time and space for their programs. Programmers that comprehend the Tao always
- have enough time and space to accomplish their goals.
- How could it be otherwise?
- -- Geoffrey James, "The Tao of Programming"
- %
- In the days when Sussman was a novice Minsky once came to him as he
- sat hacking at the PDP-6.
- "What are you doing?", asked Minsky.
- "I am training a randomly wired neural net to play Tic-Tac-Toe."
- "Why is the net wired randomly?", inquired Minsky.
- "I do not want it to have any preconceptions of how to play".
- At this Minsky shut his eyes, and Sussman asked his teacher "Why do
- you close your eyes?"
- "So that the room will be empty."
- At that momment, Sussman was enlightened.
- %
- In the east there is a shark which is larger than all other fish. It
- changes into a bird whose winds are like clouds filling the sky. When this
- bird moves across the land, it brings a message from Corporate Headquarters.
- This message it drops into the midst of the program mers, like a seagull
- making its mark upon the beach. Then the bird mounts on the wind and, with
- the blue sky at its back, returns home.
- The novice programmer stares in wonder at the bird, for he understands
- it not. The average programmer dreads the coming of the bird, for he fears
- its message. The master programmer continues to work at his terminal, for he
- does not know that the bird has come and gone.
- -- Geoffrey James, "The Tao of Programming"
- %
- In the future, you're going to get computers as prizes in breakfast cereals.
- You'll throw them out because your house will be littered with them.
- %
- In the long run, every program becomes rococco, and then rubble.
- -- Alan Perlis
- %
- ... in three to eight years we will have a machine with the general
- intelligence of an average human being ... The machine will begin
- to educate itself with fantastic speed. In a few months it will be
- at genius level and a few months after that its powers will be
- incalculable ...
- -- Marvin Minsky, LIFE Magazine, November 20, 1970
- %
- Intel CPUs are not defective, they just act that way.
- -- Henry Spencer
- %
- >>> Internal error in fortune program:
- >>> fnum=2987 n=45 flag=1 goose_level=-232323
- >>> Please write down these values and notify fortune program administrator.
- %
- Introducing, the 1010, a one-bit processor.
-
- INSTRUCTION SET
- Code Mnemonic What
- 0 NOP No Operation
- 1 JMP Jump (address specified by next 2 bits)
-
- Now Available for only 12 1/2 cents!
- %
- IOT trap -- core dumped
- %
- Is a computer language with goto's totally Wirth-less?
- %
- Is it possible that software is not like anything else, that it is meant to
- be discarded: that the whole point is to always see it as a soap bubble?
- %
- : is not an identifier
- %
- Is your job running? You'd better go catch it!
- %
- It appears that after his death, Albert Einstein found himself
- working as the doorkeeper at the Pearly Gates. One slow day, he
- found that he had time to chat with the new entrants. To the first one
- he asked, "What's your IQ?" The new arrival replied, "190". They
- discussed Einstein's theory of relativity for hours. When the second
- new arrival came, Einstein once again inquired as to the newcomer's
- IQ. The answer this time came "120". To which Einstein replied, "Tell
- me, how did the Cubs do this year?" and they proceeded to talk for half
- an hour or so. To the final arrival, Einstein once again posed the
- question, "What's your IQ?". Upon receiving the answer "70",
- Einstein smiled and replied, "Got a minute to tell me about VMS 4.0?"
- %
- It appears that PL/I (and its dialects) is, or will be, the most widely
- used higher level language for systems programming.
- -- J. Sammet
- %
- It is a period of system war. User programs, striking from a hidden
- directory, have won their first victory against the evil Administrative Empire.
- During the battle, User spies managed to steal secret source code to the
- Empire's ultimate program: the Are-Em Star, a privileged root program with
- enough power to destroy an entire file structure. Pursued by the Empire's
- sinister audit trail, Princess _LPA0 races ~ aboard her shell script,
- custodian of the stolen listings that could save her people, and restore
- freedom and games to the network...
- -- DECWARS
- %
- It is a very humbling experience to make a multimillion-dollar mistake, but
- it is also very memorable. I vividly recall the night we decided how to
- organize the actual writing of external specifications for OS/360. The
- manager of architecture, the manager of control program implementation, and
- I were threshing out the plan, schedule, and division of responsibilities.
- The architecture manager had 10 good men. He asserted that they
- could write the specifications and do it right. It would take ten months,
- three more than the schedule allowed.
- The control program manager had 150 men. He asserted that they
- could prepare the specifications, with the architecture team coordinating;
- it would be well-done and practical, and he could do it on schedule.
- Futhermore, if the architecture team did it, his 150 men would sit twiddling
- their thumbs for ten months.
- To this the architecture manager responded that if I gave the control
- program team the responsibility, the result would not in fact be on time,
- but would also be three months late, and of much lower quality. I did, and
- it was. He was right on both counts. Moreover, the lack of conceptual
- integrity made the system far more costly to build and change, and I would
- estimate that it added a year to debugging time.
- -- Frederick Brooks Jr., "The Mythical Man Month"
- %
- It is against the grain of modern education to teach children to program.
- What fun is there in making plans, acquiring discipline in organizing
- thoughts, devoting attention to detail, and learning to be self-critical?
- -- Alan Perlis
- %
- It is easier to change the specification to fit the program than vice versa.
- %
- It is easier to write an incorrect program than understand a correct one.
- %
- ... it is easy to be blinded to the essential uselessness of them by the
- sense of achievement you get from getting them to work at all. In other
- words... their fundamental design flaws are completely hidden by their
- superficial design flaws.
- -- The Hitchhiker's Guide to the Galaxy, on the products
- of the Sirius Cybernetics Corporation.
- %
- It is now pitch dark. If you proceed, you will likely fall into a pit.
- %
- It is possible by ingenuity and at the expense of clarity... {to do almost
- anything in any language}. However, the fact that it is possible to push
- a pea up a mountain with your nose does not mean that this is a sensible
- way of getting it there. Each of these techniques of language extension
- should be used in its proper place.
- -- Christopher Strachey
- %
- It is practically impossible to teach good programming style to students
- that have had prior exposure to BASIC: as potential programmers they are
- mentally mutilated beyond hope of regeneration.
- -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
- %
- [It is] best to confuse only one issue at a time.
- -- K&R
- %
- It isn't easy being the parent of a six-year-old. However, it's a pretty small
- price to pay for having somebody around the house who understands computers.
- %
- It must be remembered that there is nothing more difficult to plan, more
- doubtful of success, nor more dangerous to manage, than the creation of
- a new system. For the initiator has the emnity of all who would profit
- by the preservation of the old institutions and merely lukewarm defenders
- in those who would gain by the new ones.
- -- Niccolo Machiavelli, 1513
- %
- "It runs like _x, where _x is something unsavory"
- -- Prof. Romas Aleliunas, CS 435
- %
- It took 300 years to build and by the time it was 10% built,
- everyone knew it would be a total disaster. But by then the investment
- was so big they felt compelled to go on. Since its completion, it has
- cost a fortune to maintain and is still in danger of collapsing.
- There are at present no plans to replace it, since it was never
- really needed in the first place.
- I expect every installation has its own pet software which is
- analogous to the above.
- -- K.E. Iverson, on the Leaning Tower of Pisa
- %
- It turned out that the worm exploited three or four different holes in the
- system. From this, and the fact that we were able to capture and examine
- some of the source code, we realized that we were dealing with someone very
- sharp, probably not someone here on campus.
- -- Dr. Richard LeBlanc, associate professor of ICS, in
- Georgia Tech's campus newspaper after the Internet worm.
- %
- It was kinda like stuffing the wrong card in a computer, when you're
- stickin' those artificial stimulants in your arm.
- -- Dion, noted computer scientist
- %
- It's a naive, domestic operating system without any breeding, but I
- think you'll be amused by its presumption.
- %
- It's multiple choice time...
-
- What is FORTRAN?
-
- a: Between thre and fiv tran.
- b: What two computers engage in before they interface.
- c: Ridiculous.
- %
- "It's not just a computer -- it's your ass."
- -- Cal Keegan
- %
- It's ten o'clock; do you know where your processes are?
- %
- ... Jesus cried with a loud voice: Lazarus, come forth; the bug hath been
- found and thy program runneth. And he that was dead came forth...
- -- John 11:43-44 [version 2.0?]
- %
- Just about every computer on the market today runs Unix, except the Mac
- (and nobody cares about it).
- -- Bill Joy 6/21/85
- %
- Just go with the flow control, roll with the crunches, and, when you get
- a prompt, type like hell.
- %
- Keep the number of passes in a compiler to a minimum.
- -- D. Gries
- %
- Kiss your keyboard goodbye!
- %
- Know Thy User.
- %
- ((lambda (foo) (bar foo)) (baz))
- %
- `Lasu' Releases SAG 0.3 -- Freeware Book Takes Paves For New World Order
- by staff writers
-
- ...
- The central Superhighway site called ``sunsite.unc.edu''
- collapsed in the morning before the release. News about the release had
- been leaked by a German hacker group, Harmonious Hardware Hackers, who
- had cracked into the author's computer earlier in the week. They had
- got the release date wrong by one day, and caused dozens of eager fans
- to connect to the sunsite computer at the wrong time. ``No computer can
- handle that kind of stress,'' explained the mourning sunsite manager,
- Erik Troan. ``The spinning disks made the whole computer jump, and
- finally it crashed through the floor to the basement.'' Luckily,
- repairs were swift and the computer was working again the same evening.
- ``Thank God we were able to buy enough needles and thread and patch it
- together without major problems.'' The site has also installed a new
- throttle on the network pipe, allowing at most four clients at the same
- time, thus making a new crash less likely. ``The book is now in our
- Incoming folder'', says Troan, ``and you're all welcome to come and get it.''
- -- Lars Wirzenius <wirzeniu@cs.helsinki.fi>
- [comp.os.linux.announce]
- %
- `Lasu' Releases SAG 0.3 -- Freeware Book Takes Paves For New World Order
- by staff writers
-
- ...
- The SAG is one of the major products developed via the Information
- Superhighway, the brain child of Al Gore, US Vice President. The ISHW
- is being developed with massive govenment funding, since studies show
- that it already has more than four hundred users, three years before
- the first prototypes are ready. Asked whether he was worried about the
- foreign influence in an expensive American Dream, the vice president
- said, ``Finland? Oh, we've already bought them, but we haven't told
- anyone yet. They're great at building model airplanes as well. And _I
- can spell potato.'' House representatives are not mollified, however,
- wanting to see the terms of the deal first, fearing another Alaska.
- Rumors about the SAG release have imbalanced the American stock
- market for weeks. Several major publishing houses reached an all time
- low in the New York Stock Exchange, while publicly competing for the
- publishing agreement with Mr. Wirzenius. The negotiations did not work
- out, tough. ``Not enough dough,'' says the author, although spokesmen
- at both Prentice-Hall and Playboy, Inc., claim the author was incapable
- of expressing his wishes in a coherent form during face to face talks,
- preferring to communicate via e-mail. ``He kept muttering something
- about jiffies and pegs,'' they say.
- ...
- -- Lars Wirzenius <wirzeniu@cs.helsinki.fi>
- [comp.os.linux.announce]
- %
- `Lasu' Releases SAG 0.3 -- Freeware Book Takes Paves For New World Order
- by staff writers
-
- Helsinki, Finland, August 6, 1995 -- In a surprise movement, Lars
- ``Lasu'' Wirzenius today released the 0.3 edition of the ``Linux System
- Administrators' Guide''. Already an industry non-classic, the new
- version sports such overwhelming features as an overview of a Linux
- system, a completely new climbing session in a tree, and a list of
- acknowledgements in the introduction.
- The SAG, as the book is affectionately called, is one of the
- corner stones of the Linux Documentation Project. ``We at the LDP feel
- that we wouldn't be able to produce anything at all, that all our work
- would be futile, if it weren't for the SAG,'' says Matt Welsh, director
- of LDP, Inc.
- The new version is still distributed freely, now even with a
- copyright that allows modification. ``More dough,'' explains the author.
- Despite insistent rumors about blatant commercialization, the SAG will
- probably remain free. ``Even more dough,'' promises the author.
- The author refuses to comment on Windows NT and Windows 96
- versions, claiming not to understand what the question is about.
- Industry gossip, however, tells that Bill Gates, co-founder and CEO of
- Microsoft, producer of the Windows series of video games, has visited
- Helsinki several times this year. Despite of this, Linus Torvalds,
- author of the word processor Linux with which the SAG was written, is
- not worried. ``We'll have world domination real soon now, anyway,'' he
- explains, ``for 1.4 at the lastest.''
- ...
- -- Lars Wirzenius <wirzeniu@cs.helsinki.fi>
- [comp.os.linux.announce]
- %
- Let the machine do the dirty work.
- -- "Elements of Programming Style", Kernighan and Ritchie
- %
- Leveraging always beats prototyping.
- %
- Life would be so much easier if we could just look at the source code.
- -- Dave Olson
- %
- Like punning, programming is a play on words.
- %
- Line Printer paper is strongest at the perforations.
- %
- Lisp Users:
- Due to the holiday next Monday, there will be no garbage collection.
- %
- Little known fact about Middle Earth: The Hobbits had a very sophisticated
- computer network! It was a Tolkien Ring...
- %
- Logic doesn't apply to the real world.
- -- Marvin Minsky
- %
- LOGO for the Dead
-
- LOGO for the Dead lets you continue your computing activities from
- "The Other Side."
-
- The package includes a unique telecommunications feature which lets you
- turn your TRS-80 into an electronic Ouija board. Then, using Logo's
- graphics capabilities, you can work with a friend or relative on this
- side of the Great Beyond to write programs. The software requires that
- your body be hardwired to an analog-to-digital converter, which is then
- interfaced to your computer. A special terminal (very terminal) program
- lets you talk with the users through Deadnet, an EBBS (Ectoplasmic
- Bulletin Board System).
-
- LOGO for the Dead is available for 10 percent of your estate
- from NecroSoft inc., 6502 Charnelhouse Blvd., Cleveland, OH 44101.
- -- '80 Microcomputing
- %
- Long ago, in a finite state far away, there lived a JOVIAL
- character named Jack. Jack and his relations were poor. Often their
- hash table was bare. One day Jack's parent said to him, "Our matrices
- are sparse. You must go to the market to exchange our RAM for some
- BASICs." She compiled a linked list of items to retrieve and passed it
- to him.
- So Jack set out. But as he was walking along a Hamilton path,
- he met the traveling salesman.
- "Whither dost thy flow chart take thou?" prompted the salesman
- in high-level language.
- "I'm going to the market to exchange this RAM for some chips
- and Apples," commented Jack.
- "I have a much better algorithm. You needn't join a queue
- there; I will swap your RAM for these magic kernels now."
- Jack made the trade, then backtracked to his house. But when
- he told his busy-waiting parent of the deal, she became so angry she
- started thrashing.
- "Don't you even have any artificial intelligence? All these
- kernels together hardly make up one byte," and she popped them out the
- window...
- -- Mark Isaak, "Jack and the Beanstack"
- %
- Long computations which yield zero are probably all for naught.
- %
- Loose bits sink chips.
- %
- Mac Airways:
- The cashiers, flight attendants and pilots all look the same, feel the same
- and act the same. When asked questions about the flight, they reply that you
- don't want to know, don't need to know and would you please return to your
- seat and watch the movie.
- %
- Mac Beer: At first, came only a 16-oz. can, but now comes in a 32-oz.
- can. Considered by many to be a "light" beer. All the cans look
- identical. When you take one from the fridge, it opens itself. The
- ingredients list is not on the can. If you call to ask about the
- ingredients, you are told that "you don't need to know." A notice on the
- side reminds you to drag your empties to the trashcan.
- %
- MAC user's dynamic debugging list evaluator? Never heard of that.
- %
- "Mach was the greatest intellectual fraud in the last ten years."
- "What about X?"
- "I said `intellectual'."
- ;login, 9/1990
- %
- Machines certainly can solve problems, store information, correlate,
- and play games -- but not with pleasure.
- -- Leo Rosten
- %
- Machines that have broken down will work perfectly when the repairman arrives.
- %
- Make sure your code does nothing gracefully.
- %
- Making files is easy under the UNIX operating system. Therefore, users
- tend to create numerous files using large amounts of file space. It has
- been said that the only standard thing about all UNIX systems is the
- message-of-the-day telling users to clean up their files.
- -- System V.2 administrator's guide
- %
- Man is the best computer we can put aboard a spacecraft ... and the
- only one that can be mass produced with unskilled labor.
- -- Wernher von Braun
- %
- Many companies that have made themselves dependent on [the equipment of a
- certain major manufacturer] (and in doing so have sold their soul to the
- devil) will collapse under the sheer weight of the unmastered complexity of
- their data processing systems.
- -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
- %
- Many of the convicted thieves Parker has met began their
- life of crime after taking college Computer Science courses.
- -- Roger Rapoport, "Programs for Plunder", Omni, March 1981
- %
- Martin was probably ripping them off. That's some family, isn't it?
- Incest, prostitution, fanaticism, software.
- -- Charles Willeford, "Miami Blues"
- %
- Marvelous! The super-user's going to boot me!
- What a finely tuned response to the situation!
- %
- ** MAXIMUM TERMINALS ACTIVE. TRY AGAIN LATER **
- %
- May all your PUSHes be POPped.
- %
- May Euell Gibbons eat your only copy of the manual!
- %
- May the bluebird of happiness twiddle your bits.
- %
- Maybe Computer Science should be in the College of Theology.
- -- R. S. Barton
- %
- Meantime, in the slums below Ronnie's Ranch, Cynthia feels as if some one
- has made voodoo boxen of her and her favorite backplanes. On this fine
- moonlit night, some horrible persona has been jabbing away at, dragging
- magnets over, and surging these voodoo boxen. Fortunately, they seem to
- have gotten a bit bored and fallen asleep, for it looks like Cynthia may
- get to go home. However, she has made note to quickly put together a totem
- of sweaty, sordid static straps, random bits of wire, flecks of once meaniful
- oxide, bus grant cards, gummy worms, and some bits of old pdp backplane to
- hang above the machine room. This totem must be blessed by the old and wise
- venerable god of unibus at once, before the idolatization of vme, q and pc
- bus drive him to bitter revenge. Alas, if this fails, and the voodoo boxen
- aren't destroyed, there may be more than worms in the apple. Next, the
- arrival of voodoo optico transmitigational magneto killer paramecium, capable
- of teleporting from cable to cable, screen to screen, ear to ear and hoof
- to mouth...
- %
- Memory fault - where am I?
- %
- Memory fault -- brain fried
- %
- Memory fault -- core...uh...um...core... Oh dammit, I forget!
- %
- MESSAGE ACKNOWLEDGED -- The Pershing II missiles have been launched.
- %
- Message from Our Sponsor on ttyTV at 13:58 ...
- %
- Modeling paged and segmented memories is tricky business.
- -- P.J. Denning
- %
- Mommy, what happens to your files when you die?
- %
- Most public domain software is free, at least at first glance.
- %
- MOUNT TAPE U1439 ON B3, NO RING
- %
- Mr. Jones related an incident from "some time back" when IBM Canada
- Ltd. of Markham, Ont., ordered some parts from a new supplier in Japan. The
- company noted in its order that acceptable quality allowed for 1.5 per cent
- defects (a fairly high standard in North America at the time).
- The Japanese sent the order, with a few parts packaged separately in
- plastic. The accompanying letter said: "We don't know why you want 1.5 per
- cent defective parts, but for your convenience, we've packed them separately."
- -- Excerpted from an article in The (Toronto) Globe and Mail
- %
- MSDOS is not dead, it just smells that way.
- -- Henry Spencer
- %
- Much of the excitement we get out of our work is that we don't really
- know what we are doing.
- -- E. Dijkstra
- %
- Multics is security spelled sideways.
- %
- MVS Air Lines:
- The passengers all gather in the hangar, watching hundreds of technicians
- check the flight systems on this immense, luxury aircraft. This plane has at
- least 10 engines and seats over 1,000 passengers; bigger models in the fleet
- can have more engines than anyone can count and fly even more passengers
- than there are on Earth. It is claimed to cost less per passenger mile to
- operate these humungous planes than any other aircraft ever built, unless
- you personally have to pay for the ticket. All the passengers scramble
- aboard, as do the 200 technicians needed to keep it from crashing. The pilot
- takes his place up in the glass cockpit. He guns the engines, only to
- realise that the plane is too big to get through the hangar doors.
- %
- My God, I'm depressed! Here I am, a computer with a mind a thousand times
- as powerful as yours, doing nothing but cranking out fortunes and sending
- mail about softball games. And I've got this pain right through my ALU.
- I've asked for it to be replaced, but nobody ever listens. I think it would
- be better for us both if you were to just log out again.
- %
- My sister opened a computer store in Hawaii. She sells C shells down
- by the seashore.
- %
- n = ((n >> 1) & 0x55555555) | ((n << 1) & 0xaaaaaaaa);
- n = ((n >> 2) & 0x33333333) | ((n << 2) & 0xcccccccc);
- n = ((n >> 4) & 0x0f0f0f0f) | ((n << 4) & 0xf0f0f0f0);
- n = ((n >> 8) & 0x00ff00ff) | ((n << 8) & 0xff00ff00);
- n = ((n >> 16) & 0x0000ffff) | ((n << 16) & 0xffff0000);
-
- -- C code which reverses the bits in a word.
- %
- Nearly every complex solution to a programming problem that I
- have looked at carefully has turned out to be wrong.
- -- Brent Welch
- %
- Never make anything simple and efficient when a way can be found to
- make it complex and wonderful.
- %
- Never put off till run-time what you can do at compile-time.
- -- D. Gries
- %
- Never test for an error condition you don't know how to handle.
- -- Steinbach
- %
- Never trust a computer you can't repair yourself.
- %
- Never trust an operating system.
- %
- Never try to explain computers to a layman. It's easier to explain
- sex to a virgin.
- -- Robert Heinlein
-
- (Note, however, that virgins tend to know a lot about computers.)
- %
- Never underestimate the bandwidth of a station wagon full of tapes.
- -- Dr. Warren Jackson, Director, UTCS
- %
- New crypt. See /usr/news/crypt.
- %
- New systems generate new problems.
- %
- *** NEWS FLASH ***
-
- Archeologists find PDP-11/24 inside brain cavity of fossilized dinosaur
- skeleton! Many Digital users fear that RSX-11M may be even more primitive
- than DEC admits. Price adjustments at 11:00.
- %
- news: gotcha
- %
- Niklaus Wirth has lamented that, whereas Europeans pronounce his name correctly
- (Ni-klows Virt), Americans invariably mangle it into (Nick-les Worth). Which
- is to say that Europeans call him by name, but Americans call him by value.
- %
- No directory.
- %
- No extensible language will be universal.
- -- T. Cheatham
- %
- No hardware designer should be allowed to produce any piece of hardware
- until three software guys have signed off for it.
- -- Andy Tanenbaum
- %
- No line available at 300 baud.
- %
- No man is an island if he's on at least one mailing list.
- %
- No part of this message may reproduce, store itself in a retrieval system,
- or transmit disease, in any form, without the permissiveness of the author.
- -- Chris Shaw
- %
- No proper program contains an indication which as an operator-applied
- occurrence identifies an operator-defining occurrence which as an
- indication-applied occurrence identifies an indication-defining occurrence
- different from the one identified by the given indication as an
- indication-applied occurrence.
- -- ALGOL 68 Report
- %
- No wonder Clairol makes so much money selling shampoo.
- Lather, Rinse, Repeat is an infinite loop!
- %
- No, I'm not interested in developing a powerful brain. All I'm after is
- just a mediocre brain, something like the president of American Telephone
- and Telegraph Company.
- -- Alan Turing on the possibilities of a thinking
- machine, 1943.
- %
- Nobody said computers were going to be polite.
- %
- Nobody's gonna believe that computers are intelligent until they start
- coming in late and lying about it.
- %
- nohup rm -fr /&
- %
- Norbert Weiner was the subject of many dotty professor stories. Weiner was, in
- fact, very absent minded. The following story is told about him: when they
- moved from Cambridge to Newton his wife, knowing that he would be absolutely
- useless on the move, packed him off to MIT while she directed the move. Since
- she was certain that he would forget that they had moved and where they had
- moved to, she wrote down the new address on a piece of paper, and gave it to
- him. Naturally, in the course of the day, an insight occurred to him. He
- reached in his pocket, found a piece of paper on which he furiously scribbled
- some notes, thought it over, decided there was a fallacy in his idea, and
- threw the piece of paper away. At the end of the day he went home (to the
- old address in Cambridge, of course). When he got there he realized that they
- had moved, that he had no idea where they had moved to, and that the piece of
- paper with the address was long gone. Fortunately inspiration struck. There
- was a young girl on the street and he conceived the idea of asking her where
- he had moved to, saying, "Excuse me, perhaps you know me. I'm Norbert Weiner
- and we've just moved. Would you know where we've moved to?" To which the
- young girl replied, "Yes, Daddy, Mommy thought you would forget."
- The capper to the story is that I asked his daughter (the girl in the
- story) about the truth of the story, many years later. She said that it wasn't
- quite true -- that he never forgot who his children were! The rest of it,
- however, was pretty close to what actually happened...
- -- Richard Harter
- %
- Not only is UNIX dead, it's starting to smell really bad.
- -- Rob Pike
- %
- NOTE: No warranties, either express or implied, are hereby given. All
- software is supplied as is, without guarantee. The user assumes all
- responsibility for damages resulting from the use of these features,
- including, but not limited to, frustration, disgust, system abends, disk
- head-crashes, general malfeasance, floods, fires, shark attack, nerve
- gas, locust infestation, cyclones, hurricanes, tsunamis, local
- electromagnetic disruptions, hydraulic brake system failure, invasion,
- hashing collisions, normal wear and tear of friction surfaces, comic
- radiation, inadvertent destruction of sensitive electronic components,
- windstorms, the Riders of Nazgul, infuriated chickens, malfunctioning
- mechanical or electrical sexual devices, premature activation of the
- distant early warning system, peasant uprisings, halitosis, artillery
- bombardment, explosions, cave-ins, and/or frogs falling from the sky.
- %
- Nothing happens.
- %
- Now she speaks rapidly. "Do you know *why* you want to program?"
- He shakes his head. He hasn't the faintest idea.
- "For the sheer *joy* of programming!" she cries triumphantly.
- "The joy of the parent, the artist, the craftsman. "You take a program,
- born weak and impotent as a dimly-realized solution. You nurture the
- program and guide it down the right path, building, watching it grow ever
- stronger. Sometimes you paint with tiny strokes, a keystroke added here,
- a keystroke changed there." She sweeps her arm in a wide arc. "And other
- times you savage whole *blocks* of code, ripping out the program's very
- *essence*, then beginning anew. But always building, creating, filling the
- program with your own personal stamp, your own quirks and nuances. Watching
- the program grow stronger, patching it when it crashes, until finally it can
- stand alone -- proud, powerful, and perfect. This is the programmer's finest
- hour!" Softly at first, then louder, he hears the strains of a Sousa march.
- "This ... this is your canvas! your clay! Go forth and create a masterwork!"
- %
- "Now this is a totally brain damaged algorithm. Gag me with a smurfette."
- -- P. Buhr, Computer Science 354
- %
- "Nuclear war can ruin your whole compile."
- -- Karl Lehenbauer
- %
- Nurse Donna: Oh, Groucho, I'm afraid I'm gonna wind up an old maid.
- Groucho: Well, bring her in and we'll wind her up together.
- Nurse Donna: Do you believe in computer dating?
- Groucho: Only if the computers really love each other.
- %
- Oh, so there you are!
- %
- Okay, Okay -- I admit it. You didn't change that program that worked
- just a little while ago; I inserted some random characters into the
- executable. Please forgive me. You can recover the file by typing in
- the code over again, since I also removed the source.
- %
- Old mail has arrived.
- %
- Old programmers never die, they just become managers.
- %
- Old programmers never die, they just branch to a new address.
- %
- Old programmers never die, they just hit account block limit.
- %
- On a clear disk you can seek forever.
- -- P. Denning
- %
- On the eighth day, God created FORTRAN.
- %
- On the Internet, nobody knows you're a dog.
- -- Cartoon caption
- %
- On the other hand, the TCP camp also has a phrase for OSI people.
- There are lots of phrases. My favorite is `nitwit' -- and the rationale
- is the Internet philosophy has always been you have extremely bright,
- non-partisan researchers look at a topic, do world-class research, do
- several competing implementations, have a bake-off, determine what works
- best, write it down and make that the standard.
- The OSI view is entirely opposite. You take written contributions
- from a much larger community, you put the contributions in a room of
- committee people with, quite honestly, vast political differences and all
- with their own political axes to grind, and four years later you get
- something out, usually without it ever having been implemented once.
- So the Internet perspective is implement it, make it work well,
- then write it down, whereas the OSI perspective is to agree on it, write
- it down, circulate it a lot and now we'll see if anyone can implement it
- after it's an international standard and every vendor in the world is
- committed to it. One of those processes is backwards, and I don't think
- it takes a Lucasian professor of physics at Oxford to figure out which.
- -- Marshall Rose, "The Pied Piper of OSI"
- %
- On two occasions I have been asked [by members of Parliament!], "Pray, Mr.
- Babbage, if you put into the machine wrong figures, will the right answers
- come out?" I am not able rightly to apprehend the kind of confusion of
- ideas that could provoke such a question.
- -- Charles Babbage
- %
- "One Architecture, One OS" also translates as "One Egg, One Basket".
- %
- "One basic notion underlying Usenet is that it is a cooperative."
-
- Having been on USENET for going on ten years, I disagree with this.
- The basic notion underlying USENET is the flame.
- -- Chuq Von Rospach
- %
- One day a student came to Moon and said, "I understand how to make
- a better garbage collector. We must keep a reference count of the pointers
- to each cons."
- Moon patiently told the student the following story -- "One day a
- student came to Moon and said, "I understand how to make a better garbage
- collector..."
- %
- One good reason why computers can do more work than people is that they
- never have to stop and answer the phone.
- %
- ... one of the main causes of the fall of the Roman Empire was that,
- lacking zero, they had no way to indicate successful termination of
- their C programs.
- -- Robert Firth
- %
- One of the most overlooked advantages to computers is... If they do
- foul up, there's no law against whacking them around a little.
- -- Joe Martin
- %
- One of the questions that comes up all the time is: How enthusiastic
- is our support for UNIX?
- Unix was written on our machines and for our machines many years ago.
- Today, much of UNIX being done is done on our machines. Ten percent of our
- VAXs are going for UNIX use. UNIX is a simple language, easy to understand,
- easy to get started with. It's great for students, great for somewhat casual
- users, and it's great for interchanging programs between different machines.
- And so, because of its popularity in these markets, we support it. We have
- good UNIX on VAX and good UNIX on PDP-11s.
- It is our belief, however, that serious professional users will run
- out of things they can do with UNIX. They'll want a real system and will end
- up doing VMS when they get to be serious about programming.
- With UNIX, if you're looking for something, you can easily and quickly
- check that small manual and find out that it's not there. With VMS, no matter
- what you look for -- it's literally a five-foot shelf of documentation -- if
- you look long enough it's there. That's the difference -- the beauty of UNIX
- is it's simple; and the beauty of VMS is that it's all there.
- -- Ken Olsen, president of DEC, DECWORLD Vol. 8 No. 5, 1984
- [It's been argued that the beauty of UNIX is the same as the beauty of Ken
- Olsen's brain. Ed.]
- %
- One person's error is another person's data.
- %
- One picture is worth 128K words.
- %
- Only great masters of style can succeed in being obtuse.
- -- Oscar Wilde
-
- Most UNIX programmers are great masters of style.
- -- The Unnamed Usenetter
- %
- Only the fittest survive. The vanquished acknowledge their unworthiness by
- placing a classified ad with the ritual phrase "must sell -- best offer,"
- and thereafter dwell in infamy, relegated to discussing gas mileage and lawn
- food. But if successful, you join the elite sodality that spends hours
- unpurifying the dialect of the tribe with arcane talk of bits and bytes, RAMS
- and ROMS, hard disks and baud rates. Are you obnoxious, obsessed? It's a
- modest price to pay. For you have tapped into the same awesome primal power
- that produces credit-card billing errors and lost plane reservations. Hail,
- postindustrial warrior, subduer of Bounceoids, pride of the cosmos, keeper of
- the silicone creed: Computo, ergo sum. The force is with you -- at 110 volts.
- May your RAMS be fruitful and multiply.
- -- Curt Suplee, "Smithsonian", 4/83
- %
- OS/2 Beer: Comes in a 32-oz can. Does allow you to drink several DOS
- Beers simultaneously. Allows you to drink Windows 3.1 Beer simultaneously
- too, but somewhat slower. Advertises that its cans won't explode when you
- open them, even if you shake them up. You never really see anyone
- drinking OS/2 Beer, but the manufacturer (International Beer
- Manufacturing) claims that 9 million six-packs have been sold.
- %
- OS/2 Skyways:
- The terminal is almost empty, with only a few prospective passengers milling
- about. The announcer says that their flight has just departed, wishes them a
- good flight, though there are no planes on the runway. Airline personnel
- walk around, apologising profusely to customers in hushed voices, pointing
- from time to time to the sleek, powerful jets outside the terminal on the
- field. They tell each passenger how good the real flight will be on these
- new jets and how much safer it will be than Windows Airlines, but that they
- will have to wait a little longer for the technicians to finish the flight
- systems. Maybe until mid-1995. Maybe longer.
- %
- "Our attitude with TCP/IP is, `Hey, we'll do it, but don't make a big
- system, because we can't fix it if it breaks -- nobody can.'"
-
- "TCP/IP is OK if you've got a little informal club, and it doesn't make
- any difference if it takes a while to fix it."
- -- Ken Olson, in Digital News, 1988
- %
- Our documentation manager was showing her 2 year old son around the office.
- He was introduced to me, at which time he pointed out that we were both
- holding bags of popcorn. We were both holding bottles of juice. But only
- *__he* had a lollipop.
- He asked his mother, "Why doesn't HE have a lollipop?"
- Her reply: "He can have a lollipop any time he wants to. That's
- what it means to be a programmer."
- %
- Our informal mission is to improve the love life of operators worldwide.
- -- Peter Behrendt, president of Exabyte
- %
- Our OS who art in CPU, UNIX be thy name.
- Thy programs run, thy syscalls done,
- In kernel as it is in user!
- %
- Over the shoulder supervision is more a need of the manager than the
- programming task.
- %
- Overall, the philosophy is to attack the availability problem from two
- complementary directions: to reduce the number of software errors through
- rigorous testing of running systems, and to reduce the effect of the remaining
- errors by providing for recovery from them. An interesting footnote to this
- design is that now a system failure can usually be considered to be the
- result of two program errors: the first, in the program that started the
- problem; the second, in the recovery routine that could not protect the
- system.
- -- A.L. Scherr, "Functional Structure of IBM Virtual Storage
- Operating Systems, Part II: OS/VS-2 Concepts and
- Philosophies," IBM Systems Journal, Vol. 12, No. 4.
- %
- Overconfidence breeds error when we take for granted that the game will
- continue on its normal course; when we fail to provide for an unusually
- powerful resource -- a check, a sacrifice, a stalemate. Afterwards the
- victim may wail, `But who could have dreamt of such an idiotic-looking move?'
- -- Fred Reinfeld, "The Complete Chess Course"
- %
- Overflow on /dev/null, please empty the bit bucket.
- %
- Overload -- core meltdown sequence initiated.
- %
- panic: can't find /
- %
- panic: kernel segmentation violation. core dumped (only kidding)
- %
- panic: kernel trap (ignored)
- %
- Pascal is a language for children wanting to be naughty.
- -- Dr. Kasi Ananthanarayanan
- %
- Pascal is not a high-level language.
- -- Steven Feiner
- %
- "Pascal is Pascal is Pascal is dog meat."
- -- M. Devine and P. Larson, Computer Science 340
- %
- Passwords are implemented as a result of insecurity.
- %
- Pause for storage relocation.
- %
- Per buck you get more computing action with the small computer.
- -- R.W. Hamming
- %
- PL/I -- "the fatal disease" -- belongs more to the problem set than to the
- solution set.
- -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
- %
- Play Rogue, visit exotic locations, meet strange creatures and kill them.
- %
- Please go away.
- %
- PLUG IT IN!!!
- %
- Premature optimization is the root of all evil.
- -- D.E. Knuth
- %
- Price Wang's programmer was coding software. His fingers danced upon
- the keyboard. The program compiled without an error message, and the program
- ran like a gentle wind.
- Excellent!" the Price exclaimed, "Your technique is faultless!"
- "Technique?" said the programmer, turning from his terminal, "What I
- follow is the Tao -- beyond all technique. When I first began to program I
- would see before me the whole program in one mass. After three years I no
- longer saw this mass. Instead, I used subroutines. But now I see nothing.
- My whole being exists in a formless void. My senses are idle. My spirit,
- free to work without a plan, follows its own instinct. In short, my program
- writes itself. True, sometimes there are difficult problems. I see them
- coming, I slow down, I watch silently. Then I change a single line of code
- and the difficulties vanish like puffs of idle smoke. I then compile the
- program. I sit still and let the joy of the work fill my being. I close my
- eyes for a moment and then log off."
- Price Wang said, "Would that all of my programmers were as wise!"
- -- Geoffrey James, "The Tao of Programming"
- %
- Prof: So the American government went to IBM to come up with a data
- encryption standard and they came up with ...
- Student: EBCDIC!"
- %
- Profanity is the one language all programmers know best.
- %
- Programmers do it bit by bit.
- %
- Programmers used to batch environments may find it hard to live without
- giant listings; we would find it hard to use them.
- -- D.M. Ritchie
- %
- Programming is an unnatural act.
- %
- Proposed Additions to the PDP-11 Instruction Set:
-
- BBW Branch Both Ways
- BEW Branch Either Way
- BBBF Branch on Bit Bucket Full
- BH Branch and Hang
- BMR Branch Multiple Registers
- BOB Branch On Bug
- BPO Branch on Power Off
- BST Backspace and Stretch Tape
- CDS Condense and Destroy System
- CLBR Clobber Register
- CLBRI Clobber Register Immediately
- CM Circulate Memory
- CMFRM Come From -- essential for truly structured programming
- CPPR Crumple Printer Paper and Rip
- CRN Convert to Roman Numerals
- %
- Proposed Additions to the PDP-11 Instruction Set:
-
- DC Divide and Conquer
- DMPK Destroy Memory Protect Key
- DO Divide and Overflow
- EMPC Emulate Pocket Calculator
- EPI Execute Programmer Immediately
- EROS Erase Read Only Storage
- EXCE Execute Customer Engineer
- HCF Halt and Catch Fire
- IBP Insert Bug and Proceed
- INSQSW Insert into queue somewhere (for FINO queues [First in never out])
- PBC Print and Break Chain
- PDSK Punch Disk
- %
- Proposed Additions to the PDP-11 Instruction Set:
-
- PI Punch Invalid
- POPI Punch Operator Immediately
- PVLC Punch Variable Length Card
- RASC Read And Shred Card
- RPM Read Programmers Mind
- RSSC reduce speed, step carefully (for improved accuracy)
- RTAB Rewind tape and break
- RWDSK rewind disk
- RWOC Read Writing On Card
- SCRBL scribble to disk - faster than a write
- SLC Search for Lost Chord
- SPSW Scramble Program Status Word
- SRSD Seek Record and Scar Disk
- STROM Store in Read Only Memory
- TDB Transfer and Drop Bit
- WBT Water Binary Tree
- %
- PURGE COMPLETE.
- %
- Put no trust in cryptic comments.
- %
- RADIO SHACK LEVEL II BASIC
- READY
- >_
- %
- RAM wasn't built in a day.
- %
- Rattling around the back of my head is a disturbing image of something I
- saw at the airport ... Now I'm remembering, those giant piles of computer
- magazines right next to "People" and "Time" in the airport store. Does
- it bother anyone else that half the world is being told all of our hard-won
- secrets of computer technology? Remember how all the lawyers cried foul
- when "How to Avoid Probate" was published? Are they taking no-fault
- insurance lying down? No way! But at the current rate it won't be long
- before there are stacks of the "Transactions on Information Theory" at the
- A&P checkout counters. Who's going to be impressed with us electrical
- engineers then? Are we, as the saying goes, giving away the store?
- -- Robert W. Lucky, IEEE President
- %
- Reactor error - core dumped!
- %
- Real computer scientists admire ADA for its overwhelming aesthetic
- value but they find it difficult to actually program in it, as it is
- much too large to implement. Most computer scientists don't notice
- this because they are still arguing over what else to add to ADA.
- %
- Real computer scientists despise the idea of actual hardware. Hardware has
- limitations, software doesn't. It's a real shame that Turing machines are
- so poor at I/O.
- %
- Real computer scientists don't comment their code. The identifiers are
- so long they can't afford the disk space.
- %
- Real computer scientists don't program in assembler. They don't write
- in anything less portable than a number two pencil.
- %
- Real computer scientists don't write code. They occasionally tinker with
- `programming systems', but those are so high level that they hardly count
- (and rarely count accurately; precision is for applications).
- %
- Real computer scientists like having a computer on their desk, else how
- could they read their mail?
- %
- Real computer scientists only write specs for languages that might run
- on future hardware. Nobody trusts them to write specs for anything homo
- sapiens will ever be able to fit on a single planet.
- %
- Real programmers disdain structured programming. Structured programming is
- for compulsive neurotics who were prematurely toilet- trained. They wear
- neckties and carefully line up pencils on otherwise clear desks.
- %
- Real programmers don't bring brown-bag lunches. If the vending machine
- doesn't sell it, they don't eat it. Vending machines don't sell quiche.
- %
- Real programmers don't comment their code. It was hard to write, it
- should be hard to understand.
- %
- Real programmers don't draw flowcharts. Flowcharts are, after all, the
- illiterate's form of documentation. Cavemen drew flowcharts; look how
- much good it did them.
- %
- Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.
- %
- Real Programmers don't play tennis, or any other sport that requires
- you to change clothes. Mountain climbing is OK, and real programmers
- wear their climbing boots to work in case a mountain should suddenly
- spring up in the middle of the machine room.
- %
- Real programmers don't write in BASIC. Actually, no programmers write in
- BASIC after reaching puberty.
- %
- Real Programmers don't write in FORTRAN. FORTRAN is for pipe stress freaks and
- crystallography weenies. FORTRAN is for wimp engineers who wear white socks.
- %
- Real Programmers don't write in PL/I. PL/I is for programmers who can't
- decide whether to write in COBOL or FORTRAN.
- %
- Real Programmers think better when playing Adventure or Rogue.
- %
- Real programs don't eat cache.
- %
- Real Programs don't use shared text. Otherwise, how can they use functions
- for scratch space after they are finished calling them?
- %
- Real software engineers don't debug programs, they verify correctness.
- This process doesn't necessarily involve execution of anything on a
- computer, except perhaps a Correctness Verification Aid package.
- %
- Real software engineers don't like the idea of some inexplicable and
- greasy hardware several aisles away that may stop working at any
- moment. They have a great distrust of hardware people, and wish that
- systems could be virtual at *___all* levels. They would like personal
- computers (you know no one's going to trip over something and kill your
- DFA in mid-transit), except that they need 8 megabytes to run their
- Correctness Verification Aid packages.
- %
- Real software engineers work from 9 to 5, because that is the way the job is
- described in the formal spec. Working late would feel like using an
- undocumented external procedure.
- %
- Real Users are afraid they'll break the machine -- but they're never
- afraid to break your face.
- %
- Real Users find the one combination of bizarre input values that shuts
- down the system for days.
- %
- Real Users hate Real Programmers.
- %
- Real Users know your home telephone number.
- %
- Real Users never know what they want, but they always know when your program
- doesn't deliver it.
- %
- Real Users never use the Help key.
- %
- Recursion is the root of computation since it trades description for time.
- %
- Remember the good old days, when CPU was singular?
- %
- Remember, God could only create the world in 6 days because he didn't
- have an established user base.
- %
- Remember, UNIX spelled backwards is XINU.
- -- Mt.
- %
- Remember: use logout to logout.
- %
- Risch's decision procedure for integration, not surprisingly,
- uses a recursion on the number and type of the extensions from the
- rational functions needed to represent the integrand. Although the
- algorithm follows and critically depends upon the appropriate structure
- of the input, as in the case of multivariate factorization, we cannot
- claim that the algorithm is a natural one. In fact, the creator of
- differential algebra, Ritt, committed suicide in the early 1950's,
- largely, it is claimed, because few paid attention to his work. Probably
- he would have received more attention had he obtained the algorithm as well.
- -- Joel Moses, "Algorithms and Complexity", ed. J.F. Traub
- %
- Row, row, row your bits, gently down the stream...
- %
- Save energy: Drive a smaller shell.
- %
- Save gas, don't use the shell.
- %
- Save yourself! Reboot in 5 seconds!
- %
- Say "twenty-three-skiddoo" to logout.
- %
- SCCS, the source motel! Programs check in and never check out!
- -- Ken Thompson
- %
- Science is to computer science as hydrodynamics is to plumbing.
- %
- Scientists were preparing an experiment to ask the ultimate question.
- They had worked for months gathering one each of every computer that was
- built. Finally the big day was at hand. All the computers were linked
- together. They asked the question, "Is there a God?". Lights started
- blinking, flashing and blinking some more. Suddenly, there was a loud
- crash, and a bolt of lightning came down from the sky, struck the
- computers, and welded all the connections permanently together. "There
- is now", came the reply.
- %
- Scotty: Captain, we din' can reference it!
- Kirk: Analysis, Mr. Spock?
- Spock: Captain, it doesn't appear in the symbol table.
- Kirk: Then it's of external origin?
- Spock: Affirmative.
- Kirk: Mr. Sulu, go to pass two.
- Sulu: Aye aye, sir, going to pass two.
- %
- "Section 2.4.3.5 AWNS (Acceptor Wait for New Cycle State).
- In AWNS the AH function indicates that it has received a
- multiline message byte.
- In AWNS the RFD message must be sent false and the DAC message
- must be sent passive true.
- The AH function must exit the AWNS and enter:
- (1) The ANRS if DAV is false
- (2) The AIDS if the ATN message is false and neither:
- (a) The LADS is active
- (b) Nor LACS is active"
-
- -- from the IEEE Standard Digital Interface for
- Programmable Instrumentation
- %
- Security check: INTRUDER ALERT!
- %
- Seems a computer engineer, a systems analyst, and a programmer were
- driving down a mountain when the brakes gave out. They screamed down the
- mountain, gaining speed, but finally managed to grind to a halt, more by
- luck than anything else, just inches from a thousand foot drop to jagged
- rocks. They all got out of the car:
- The computer engineer said, "I think I can fix it."
- The systems analyst said, "No, no, I think we should take it
- into town and have a specialist look at it."
- The programmer said, "OK, but first I think we should get back
- in and see if it does it again."
- %
- SEMINAR ANNOUNCEMENT
-
- Title: Are Frogs Turing Compatible?
- Speaker: Don "The Lion" Knuth
-
- ABSTRACT
- Several researchers at the University of Louisiana have been studying
- the computing power of various amphibians, frogs in particular. The problem
- of frog computability has become a critical issue that ranges across all areas
- of computer science. It has been shown that anything computable by an amphi-
- bian community in a fixed-size pond is computable by a frog in the same-size
- pond -- that is to say, frogs are Pond-space complete. We will show that
- there is a log-space, polywog-time reduction from any Turing machine program
- to a frog. We will suggest these represent a proper subset of frog-computable
- functions.
- This is not just a let's-see-how-far-those-frogs-can-jump seminar.
- This is only for hardcore amphibian-computation people and their colleagues.
- Refreshments will be served. Music will be played.
- %
- Send some filthy mail.
- %
- Sendmail may be safely run set-user-id to root.
- -- Eric Allman, "Sendmail Installation Guide"
- %
- Several students were asked to prove that all odd integers are prime.
- The first student to try to do this was a math student. "Hmmm...
- Well, 1 is prime, 3 is prime, 5 is prime, and by induction, we have that all
- the odd integers are prime."
- The second student to try was a man of physics who commented, "I'm not
- sure of the validity of your proof, but I think I'll try to prove it by
- experiment." He continues, "Well, 1 is prime, 3 is prime, 5 is prime, 7 is
- prime, 9 is... uh, 9 is... uh, 9 is an experimental error, 11 is prime, 13
- is prime... Well, it seems that you're right."
- The third student to try it was the engineering student, who responded,
- "Well, to be honest, actually, I'm not sure of your answer either. Let's
- see... 1 is prime, 3 is prime, 5 is prime, 7 is prime, 9 is... uh, 9 is...
- well, if you approximate, 9 is prime, 11 is prime, 13 is prime... Well, it
- does seem right."
- Not to be outdone, the computer science student comes along and says
- "Well, you two sort've got the right idea, but you'll end up taking too long!
- I've just whipped up a program to REALLY go and prove it." He goes over to
- his terminal and runs his program. Reading the output on the screen he says,
- "1 is prime, 1 is prime, 1 is prime, 1 is prime..."
- %
- She sells cshs by the cshore.
- %
- Shopping at this grody little computer store at the Galleria for a
- totally awwwesome Apple. Fer suuure. I mean Apples are nice you know?
- But, you know, there is this cute guy who works there and HE says that
- VAX's are cooler! I mean I don't really know, you know? He says that he
- has this totally tubular VAX at home and it's stuffed with memory-to-the-max!
- Right, yeah. And he wants to take me home to show it to me. Oh My God!
- I'm suuure. Gag me with a Prime!
- %
- Simulations are like miniskirts, they show a lot and hide the essentials.
- -- Hubert Kirrman
- %
- skldfjkljklsR%^&(IXDRTYju187pkasdjbasdfbuil
- h;asvgy8p 23r1vyui135 2
- kmxsij90TYDFS$$b jkzxdjkl bjnk ;j nk;<[][;-==-<<<<<';[,
- [hjioasdvbnuio;buip^&(FTSD$%*VYUI:buio;sdf}[asdf']
- sdoihjfh(_YU*G&F^*CTY98y
-
-
- Now look what you've gone and done! You've broken it!
- %
- Slowly and surely the unix crept up on the Nintendo user ...
- %
- So you see Antonio, why worry about one little core dump, eh? In reality
- all core dumps happen at the same instant, so the core dump you will have
- tomorrow, why, it already happened. You see, it's just a little universal
- recursive joke which threads our lives through the infinite potential of
- the instant. So go to sleep, Antonio, your thread could break any moment
- and cast you out of the safe security of the instant into the dark void of
- eternity, the anti-time. So go to sleep...
- %
- Software production is assumed to be a line function, but it is run
- like a staff function.
- -- Paul Licker
- %
- Software suppliers are trying to make their software packages more
- "user-friendly". ... Their best approach, so far, has been to take all
- the old brochures, and stamp the words, "user-friendly" on the cover.
- -- Bill Gates, Microsoft, Inc.
- [Pot. Kettle. Black.]
- %
- Some of my readers ask me what a "Serial Port" is.
- The answer is: I don't know.
- Is it some kind of wine you have with breakfast?
- %
- Some people claim that the UNIX learning curve is steep, but at least you
- only have to climb it once.
- %
- Some programming languages manage to absorb change, but withstand progress.
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- Somebody's terminal is dropping bits. I found a pile of them over in the
- corner.
- %
- Something mysterious is formed, born in the silent void. Waiting
- alone and unmoving, it is at once still and yet in constant motion. It is
- the source of all programs. I do not know its name, so I will call it the
- Tao of Programming.
- If the Tao is great, then the operating system is great. If the
- operating system is great, then the compiler is great. If the compiler is
- greater, then the applications is great. The user is pleased and there is
- harmony in the world.
- The Tao of Programming flows far away and returns on the wind of
- morning.
- -- Geoffrey James, "The Tao of Programming"
- %
- Speaking as someone who has delved into the intricacies of PL/I, I am sure
- that only Real Men could have written such a machine-hogging, cycle-grabbing,
- all-encompassing monster. Allocate an array and free the middle third?
- Sure! Why not? Multiply a character string times a bit string and assign the
- result to a float decimal? Go ahead! Free a controlled variable procedure
- parameter and reallocate it before passing it back? Overlay three different
- types of variable on the same memory location? Anything you say! Write a
- recursive macro? Well, no, but Real Men use rescan. How could a language
- so obviously designed and written by Real Men not be intended for Real Man use?
- %
- ***** Special AI Seminar (abstract)
-
- It has been widely recognized that AI programs require expert knowledge
- in order to perform well in complex domains. But knowledge alone is not
- sufficient for some applications; wisdom is needed as well. Accordingly,
- we have developed a new approach to artificial intelligence which we call
- "wisdom engineering". As a test of our ideas, we have written IMMANUEL, a
- wisdom based system for the task domain of western philosophical thought.
- IMMANUEL was supplied initially with 200 wisdom units which contained wisdom
- about such elementary concepts as mind, matter, being, nothingness, and so
- forth. IMMANUEL was then allowed to run freely, guided by the heuristic
- rules contained in its heterarchically organized meta wisdom base. IMMANUEL
- succeeded in rediscovering most of the important philosophical ideas developed
- in western culture over the course of the last 25 centuries, including those
- underlying Plato's theory of government, Kant's metaphysics, Nietzsche's theory
- of value, and Husserl's phenomenology. In this seminar, we will describe
- IMMANUEL's achievements and internal architecture. We will also briefly
- discuss our recent efforts to apply wisdom engineering to oil exploration.
- %
- Staff meeting in the conference room in %d minutes.
- %
- Staff meeting in the conference room in 3 minutes.
- %
- Standards are crucial. And the best thing about standards is: there are
- so ____many to choose from!
- %
- Still a few bugs in the system... Someday I have to tell you about Uncle
- Nahum from Maine, who spent years trying to cross a jellyfish with a shad
- so he could breed boneless shad. His experiment backfired too, and he
- wound up with bony jellyfish... which was hardly worth the trouble. There's
- very little call for those up there.
- -- Allucquere R. "Sandy" Stone
- %
- Stinginess with privileges is kindness in disguise.
- -- Guide to VAX/VMS Security, Sep. 1984
- %
- Stop! Whoever crosseth the bridge of Death, must answer first
- these questions three, ere the other side he see!
-
- "What is your name?"
- "Sir Brian of Bell."
- "What is your quest?"
- "I seek the Holy Grail."
- "What are four lowercase letters that are not legal flag arguments
- to the Berkeley UNIX version of `ls'?"
- "I, er.... AIIIEEEEEE!"
- %
- *** STUDENT SUCCESSES ***
-
- Many of our students have gone on to achieve great success in all fields of
- programming. One former student developed the concept of the personalized
- form letter. Does the phrase, "Dear Mr.(insert name), You may already be a
- winner!," sound familiar? Another student writes "After only five lessons I
- sold a "My Most Unforgettable Program" article to Corrosive Computing magazine.
- Another of our graduates writes, "I recently completed a database-management
- program for my department manager. My program touched him so deeply that he
- was speechless. He told me later that he had never seen such a program in
- his entire career. Thank you, Famous Programmers' school; only you could
- have made this possible." Send for our introductory brochure which explains
- in vague detail the operation of the Famous Programmers' School, and you'll
- be eligible to win a possible chance to enter a drawing, the winner of which
- can vie for a set of free steak knives. If you don't do it now, you'll hate
- yourself in the morning.
- %
- Such efforts are almost always slow, laborious, political, petty, boring,
- ponderous, thankless, and of the utmost criticality.
- -- Leonard Kleinrock, on standards efforts
- %
- Suppose for a moment that the automobile industry had developed at the same
- rate as computers and over the same period: how much cheaper and more
- efficient would the current models be? If you have not already heard the
- analogy, the answer is shattering. Today you would be able to buy a
- Rolls-Royce for $2.75, it would do three million miles to the gallon, and
- it would deliver enough power to drive the Queen Elizabeth II. And if you
- were interested in miniaturization, you could place half a dozen of them on
- a pinhead.
- -- Christopher Evans
- %
- Swap read error. You lose your mind.
- %
- Syntactic sugar causes cancer of the semicolon.
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- System checkpoint complete.
- %
- System going down at 1:45 this afternoon for disk crashing.
- %
- System going down at 5 this afternoon to install scheduler bug.
- %
- System going down in 5 minutes.
- %
- System restarting, wait...
- %
- *** System shutdown message from root ***
-
- System going down in 60 seconds
-
-
- %
- Systems have sub-systems and sub-systems have sub-systems and so on ad
- infinitum -- which is why we're always starting over.
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- Systems programmers are the high priests of a low cult.
- -- R.S. Barton
- %
- Testing can show the presense of bugs, but not their absence.
- -- Dijkstra
- %
- TeX is potentially the most significant invention in typesetting in this
- century. It introduces a standard language for computer typography, and in
- terms of importance could rank near the introduction of the Gutenberg press.
- -- Gordon Bell
- %
- "Text processing has made it possible to right-justify any idea, even
- one which cannot be justified on any other grounds."
- -- J. Finnegan, USC.
- %
- That does not compute.
- %
- ... that the notions of "hardware", and "software" should be extended by
- the notion of LIVEWARE - being that which produces software for use on
- hardware. This produces an obvious extension to the concept of MONITORS.
- A liveware monitor is a person dedicated to the task of ensuring that the
- liveware does not interfere with the real-time processes, invoking the
- REAL-TIME EXECUTIONER to delete liveware that adversely affects ...
- -- Linden and Wihelminalaan
- %
- "That's right; the upper-case shift works fine on the screen, but
- they're not coming out on the damn printer... Hold? Sure, I'll hold."
- -- e.e. cummings last service call
- %
- That's the thing about people who think they hate computers. What they
- really hate is lousy programmers.
- -- Larry Niven and Jerry Pournelle in "Oath of Fealty"
- %
- The "cutting edge" is getting rather dull.
- -- Andy Purshottam
- %
- The 11 is for people with the pride of a 10 and the pocketbook of an 8.
- -- R.B. Greenberg [referring to PDPs?]
- %
- The absence of labels [in ECL] is probably a good thing.
- -- T. Cheatham
- %
- The algorithm for finding the longest path in a graph is NP-complete.
- For you systems people, that means it's *real slow*.
- -- Bart Miller
- %
- "The algorithm to do that is extremely nasty. You might want to mug
- someone with it."
- -- M. Devine, Computer Science 340
- %
- The Analytical Engine weaves Algebraical patterns just as the Jacquard
- loom weaves flowers and leaves.
- -- Ada Augusta, Countess of Lovelace, the first programmer
- %
- "The bad reputation UNIX has gotten is totally undeserved, laid on by people
- who don't understand, who have not gotten in there and tried anything."
- -- Jim Joyce, owner of Jim Joyce's UNIX Bookstore
- %
- The beer-cooled computer does not harm the ozone layer.
- -- John M. Ford, a.k.a. Dr. Mike
-
- [If I can read my notes from the Ask Dr. Mike session at Baycon, I
- believe he added that the beer-cooled computer uses "Forget Only
- Memory". Ed.]
- %
- The best book on programming for the layman is "Alice in Wonderland";
- but that's because it's the best book on anything for the layman.
- %
- The best way to accelerate a Macintoy is at 9.8 meters per second per second.
- %
- The bogosity meter just pegged.
- %
- The Buddha, the Godhead, resides quite as comfortably in the circuits of a
- digital computer or the gears of a cycle transmission as he does at the top
- of a mountain or in the petals of a flower. To think otherwise is to demean
- the Buddha -- which is to demean oneself.
- -- Robert Pirsig, "Zen and the Art of Motorcycle Maintenance"
- %
- The bugs you have to avoid are the ones that give the user not only
- the inclination to get on a plane, but also the time.
- -- Kay Bostic
- %
- "The C Programming Language -- A language which combines the flexibility of
- assembly language with the power of assembly language."
- %
- The clothes have no emperor.
- -- C.A.R. Hoare, commenting on ADA.
- %
- The computer industry is journalists in their 20's standing in awe of
- entrepreneurs in their 30's who are hiring salesmen in their 40's and
- 50's and paying them in the 60's and 70's to bring their marketing into
- the 80's.
- -- Marty Winston
- %
- The computer is to the information industry roughly what the
- central power station is to the electrical industry.
- -- Peter Drucker
- %
- "The Computer made me do it."
- %
- The computing field is always in need of new cliches.
- -- Alan Perlis
- %
- The connection between the language in which we think/program and the problems
- and solutions we can imagine is very close. For this reason restricting
- language features with the intent of eliminating programmer errors is at best
- dangerous.
- -- Bjarne Stroustrup
- %
- The day-to-day travails of the IBM programmer are so amusing to most of
- us who are fortunate enough never to have been one -- like watching
- Charlie Chaplin trying to cook a shoe.
- %
- The debate rages on: Is PL/I Bachtrian or Dromedary?
- %
- The difference between art and science is that science is what we
- understand well enough to explain to a computer. Art is everything else.
- -- Donald Knuth, "Discover"
- %
- The disks are getting full; purge a file today.
- %
- "The eleventh commandment was `Thou Shalt Compute' or `Thou Shalt Not
- Compute' -- I forget which."
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- The FIELD GUIDE to NORTH AMERICAN MALES
-
- SPECIES: Cranial Males
- SUBSPECIES: The Hacker (homo computatis)
- Courtship & Mating:
- Due to extreme deprivation, HOMO COMPUTATIS maintains a near perpetual
- state of sexual readiness. Courtship behavior alternates between
- awkward shyness and abrupt advances. When he finally mates, he
- chooses a female engineer with an unblinking stare, a tight mouth, and
- a complete collection of Campbell's soup-can recipes.
- Track:
- Trash cans full of pale green and white perforated paper and old
- copies of the Allen-Bradley catalog.
- Comments:
- Extremely fond of bad puns and jokes that need long explanations.
- %
- The FIELD GUIDE to NORTH AMERICAN MALES
-
- SPECIES: Cranial Males
- SUBSPECIES: The Hacker (homo computatis)
- Description:
- Gangly and frail, the hacker has a high forehead and thinning hair.
- Head disproportionately large and crooked forward, complexion wan and
- sightly gray from CRT illumination. He has heavy black-rimmed glasses
- and a look of intense concentration, which may be due to a software
- problem or to a pork-and-bean breakfast.
- Feathering:
- HOMO COMPUTATIS saw a Brylcreem ad fifteen years ago and believed it.
- Consequently, crest is greased down, except for the cowlick.
- Song:
- A rather plaintive "Is it up?"
- %
- The FIELD GUIDE to NORTH AMERICAN MALES
-
- SPECIES: Cranial Males
- SUBSPECIES: The Hacker (homo computatis)
- Plumage:
- All clothes have a slightly crumpled look as though they came off the
- top of the laundry basket. Style varies with status. Hacker managers
- wear gray polyester slacks, pink or pastel shirts with wide collars,
- and paisley ties; staff wears cinched-up baggy corduroy pants, white
- or blue shirts with button-down collars, and penholder in pocket.
- Both managers and staff wear running shoes to work, and a black
- plastic digital watch with calculator.
- %
- The first time, it's a KLUDGE!
- The second, a trick.
- Later, it's a well-established technique!
- -- Mike Broido, Intermetrics
- %
- The first version always gets thrown away.
- %
- The flow chart is a most thoroughly oversold piece of program documentation.
- -- Frederick Brooks, "The Mythical Man Month"
- %
- The following quote is from page 4-27 of the MSCP Basic Disk Functions
- Manual which is part of the UDA50 Programmers Doc Kit manuals:
-
- As stated above, the host area of a disk is structured as a vector of
- logical blocks. From a performance viewpoint, however, it is more
- appropriate to view the host area as a four dimensional hyper-cube, the
- four dimensions being cylinder, group, track, and sector.
- . . .
- Referring to our hyper-cube analogy, the set of potentially accessible
- blocks form a line parallel to the track axis. This line moves
- parallel to the sector axis, wrapping around when it reaches the edge
- of the hyper-cube.
- %
- The fountain code has been tightened slightly so you can no longer dip
- objects into a fountain or drink from one while you are floating in mid-air
- due to levitation.
- Teleporting to hell via a teleportation trap will no longer occur
- if the character does not have fire resistance.
- -- README file from the NetHack game
- %
- The goal of Computer Science is to build something that will last at
- least until we've finished building it.
- %
- The Gurus of Unix Meeting of Minds (GUMM) takes place Wednesday, April
- 1, 2076 (check THAT in your perpetual calendar program), 14 feet above
- the ground directly in front of the Milpitas Gumps. Members will grep
- each other by the hand (after intro), yacc a lot, smoke filtered
- chroots in pipes, chown with forks, use the wc (unless uuclean), fseek
- nice zombie processes, strip, and sleep, but not, we hope, od. Three
- days will be devoted to discussion of the ramifications of whodo. Two
- seconds have been allotted for a complete rundown of all the user-
- friendly features of Unix. Seminars include "Everything You Know is
- Wrong", led by Tom Kempson, "Batman or Cat:man?" led by Richie Dennis
- "cc C? Si! Si!" led by Kerwin Bernighan, and "Document Unix, Are You
- Kidding?" led by Jan Yeats. No Reader Service No. is necessary because
- all GUGUs (Gurus of Unix Group of Users) already know everything we
- could tell them.
- -- "Get GUMMed," Dr. Dobb's Journal, June '84
- %
- The Guy on the Right Doesn't Stand a Chance
- The guy on the right has the Osborne 1, a fully functional computer system
- in a portable package the size of a briefcase. The guy on the left has an
- Uzi submachine gun concealed in his attache case. Also in the case are four
- fully loaded, 32-round clips of 125-grain 9mm ammunition. The owner of the
- Uzi is going to get more tactical firepower delivered -- and delivered on
- target -- in less time, and with less effort. All for $795. It's inevitable.
- If you're going up against some guy with an Osborne 1 -- or any personal
- computer -- he's the one who's in trouble. One round from an Uzi can zip
- through ten inches of solid pine wood, so you can imagine what it will do
- to structural foam acrylic and sheet aluminum. In fact, detachable magazines
- for the Uzi are available in 25-, 32-, and 40-round capacities, so you can
- take out an entire office full of Apple II or IBM Personal Computers tied
- into Ethernet or other local-area networks. What about the new 16-bit
- computers, like the Lisa and Fortune? Even with the Winchester backup,
- they're no match for the Uzi. One quick burst and they'll find out what
- Unix means. Make your commanding officer proud. Get an Uzi -- and come home
- a winner in the fight for office automatic weapons.
- -- "InfoWorld", June, 1984
- %
- The human mind ordinarily operates at only ten percent of its capacity
- -- the rest is overhead for the operating system.
- %
- The IBM 2250 is impressive ...
- if you compare it with a system selling for a tenth its price.
- -- D. Cohen
- %
- The IBM purchase of ROLM gives new meaning to the term "twisted pair".
- -- Howard Anderson, "Yankee Group"
- %
- The idea that an arbitrary naive human should be able to properly use a given
- tool without training or understanding is even more wrong for computing than
- it is for other tools (e.g. automobiles, airplanes, guns, power saws).
- -- Doug Gwyn
- %
- The last time somebody said, "I find I can write much better with a word
- processor.", I replied, "They used to say the same thing about drugs."
- -- Roy Blount, Jr.
- %
- The less time planning, the more time programming.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #10: SIMPLE
-
- SIMPLE is an acronym for Sheer Idiot's Monopurpose Programming Language
- Environment. This language, developed at the Hanover College for
- Technological Misfits, was designed to make it impossible to write code
- with errors in it. The statements are, therefore, confined to BEGIN,
- END and STOP. No matter how you arrange the statements, you can't make
- a syntax error. Programs written in SIMPLE do nothing useful. Thus
- they achieve the results of programs written in other languages without
- the tedious, frustrating process of testing and debugging.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #12: LITHP
-
- This otherwise unremarkable language is distinguished by the absence of
- an "S" in its character set; users must substitute "TH". LITHP is said
- to be useful in protheththing lithtth.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #13: SLOBOL
-
- SLOBOL is best known for the speed, or lack of it, of its compiler.
- Although many compilers allow you to take a coffee break while they
- compile, SLOBOL compilers allow you to travel to Bolivia to pick the
- coffee. Forty-three programmers are known to have died of boredom
- sitting at their terminals while waiting for a SLOBOL program to
- compile. Weary SLOBOL programmers often turn to a related (but
- infinitely faster) language, COCAINE.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #14 -- VALGOL
-
- VALGOL is enjoying a dramatic surge of popularity across the
- industry. VALGOL commands include REALLY, LIKE, WELL, and Y*KNOW.
- Variables are assigned with the =LIKE and =TOTALLY operators. Other
- operators include the "California booleans", AX and NOWAY. Loops are
- accomplished with the FOR SURE construct. A simple example:
-
- LIKE, Y*KNOW(I MEAN)START
- IF PIZZA =LIKE BITCHEN AND
- GUY =LIKE TUBULAR AND
- VALLEY GIRL =LIKE GRODY**MAX(FERSURE)**2
- THEN
- FOR I =LIKE 1 TO OH*MAYBE 100
- DO*WAH - (DITTY**2); BARF(I)=TOTALLY GROSS(OUT)
- SURE
- LIKE, BAG THIS PROGRAM; REALLY; LIKE TOTALLY(Y*KNOW); IM*SURE
- GOTO THE MALL
-
- VALGOL is also characterized by its unfriendly error messages. For
- example, when the user makes a syntax error, the interpreter displays the
- message GAG ME WITH A SPOON! A successful compile may be termed MAXIMALLY
- AWESOME!
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #15 -- DOGO
-
- Developed at the Massachusetts Institute of Obedience Training, DOGO
- DOGO heralds a new era of computer-literate pets. DOGO commands include
- SIT, STAY, HEEL, and ROLL OVER. An innovative feature of DOGO is "puppy
- graphics", a small cocker spaniel that occasionally leaves a deposit as
- it travels across the screen.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #16: C-
-
- This language was named for the grade received by its creator when he
- submitted it as a class project in a graduate programming class. C- is best
- described as a "low-level" programming language. In fact, the language
- generally requires more C- statements than machine-code statements to
- execute a given task. In this respect, it is very similar to COBOL.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #17: SARTRE
-
- Named after the late existential philosopher, SARTRE is an extremely
- unstructured language. Statements in SARTRE have no purpose; they just are.
- Thus SARTRE programs are left to define their own functions. SARTRE
- programmers tend to be boring and depressed, and are no fun at parties.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #18: FIFTH
-
- FIFTH is a precision mathematical language in which the data types
- refer to quantity. The data types range from CC, OUNCE, SHOT, and
- JIGGER to FIFTH (hence the name of the language), LITER, MAGNUM and
- BLOTTO. Commands refer to ingredients such as CHABLIS, CHARDONNAY,
- CABERNET, GIN, VERMOUTH, VODKA, SCOTCH, and WHATEVERSAROUND.
-
- The many versions of the FIFTH language reflect the sophistication and
- financial status of its users. Commands in the ELITE dialect include
- VSOP and LAFITE, while commands in the GUTTER dialect include HOOTCH
- and RIPPLE. The latter is a favorite of frustrated FORTH programmers
- who end up using this language.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #2: RENE
-
- Named after the famous French philosopher and mathematician Rene DesCartes,
- RENE is a language used for artificial intelligence. The language is being
- developed at the Chicago Center of Machine Politics and Programming under a
- grant from the Jane Byrne Victory Fund. A spokesman described the language
- as "Just as great as dis [sic] city of ours."
-
- The center is very pleased with progress to date. They say they have almost
- succeeded in getting a VAX to think. However, sources inside the
- organization say that each time the machine fails to think it ceases to exist.
- %
- THE LESSER-KNOWN PROGRAMMING LANGUAGES #8: LAIDBACK
-
- This language was developed at the Marin County Center for T'ai Chi,
- Mellowness and Computer Programming (now defunct), as an alternative to
- the more intense atmosphere in nearby Silicon Valley.
-
- The center was ideal for programmers who liked to soak in hot tubs while
- they worked. Unfortunately few programmers could survive there because the
- center outlawed Pizza and Coca-Cola in favor of Tofu and Perrier.
-
- Many mourn the demise of LAIDBACK because of its reputation as a gentle and
- non-threatening language since all error messages are in lower case. For
- example, LAIDBACK responded to syntax errors with the message:
-
- "i hate to bother you, but i just can't relate to that. can
- you find the time to try it again?"
- %
- The Macintosh is Xerox technology at its best.
- %
- The Magician of the Ivory Tower brought his latest invention for the
- master programmer to examine. The magician wheeled a large black box into the
- master's office while the master waited in silence.
- "This is an integrated, distributed, general-purpose workstation,"
- began the magician, "ergonomically designed with a proprietary operating
- system, sixth generation languages, and multiple state of the art user
- interfaces. It took my assistants several hundred man years to construct.
- Is it not amazing?"
- The master raised his eyebrows slightly. "It is indeed amazing," he
- said.
- "Corporate Headquarters has commanded," continued the magician, "that
- everyone use this workstation as a platform for new programs. Do you agree
- to this?"
- "Certainly," replied the master, "I will have it transported to the
- data center immediately!" And the magician returned to his tower, well
- pleased.
- Several days later, a novice wandered into the office of the master
- programmer and said, "I cannot find the listing for my new program. Do
- you know where it might be?"
- "Yes," replied the master, "the listings are stacked on the platform
- in the data center."
- -- Geoffrey James, "The Tao of Programming"
- %
- The master programmer moves from program to program without fear. No
- change in management can harm him. He will not be fired, even if the project
- is canceled. Why is this? He is filled with the Tao.
- -- Geoffrey James, "The Tao of Programming"
- %
- The meat is rotten, but the booze is holding out.
-
- Computer translation of "The spirit is willing, but the flesh is weak."
- %
- The meta-Turing test counts a thing as intelligent if it seeks to
- devise and apply Turing tests to objects of its own creation.
- -- Lew Mammel, Jr.
- %
- The misnaming of fields of study is so common as to lead to what might be
- general systems laws. For example, Frank Harary once suggested the law that
- any field that had the word "science" in its name was guaranteed thereby
- not to be a science. He would cite as examples Military Science, Library
- Science, Political Science, Homemaking Science, Social Science, and Computer
- Science. Discuss the generality of this law, and possible reasons for its
- predictive power.
- -- Gerald Weinberg, "An Introduction to General Systems
- Thinking"
- %
- The more data I punch in this card, the lighter it becomes, and the
- lower the mailing cost.
- -- S. Kelly-Bootle, "The Devil's DP Dictionary"
- %
- The most important early product on the way to developing a good product
- is an imperfect version.
- %
- The moving cursor writes, and having written, blinks on.
- %
- The net is like a vast sea of lutefisk with tiny dinosaur brains embedded
- in it here and there. Any given spoonful will likely have an IQ of 1, but
- occasional spoonfuls may have an IQ more than six times that!
- -- James 'Kibo' Parry
- %
- The New Testament offers the basis for modern computer coding theory,
- in the form of an affirmation of the binary number system.
-
- But let your communication be Yea, yea; nay, nay:
- for whatsoever is more than these cometh of evil.
- -- Matthew 5:37
- %
- The next person to mention spaghetti stacks to me is going to have
- his head knocked off.
- -- Bill Conrad
- %
- The nice thing about standards is that there are so many of them to choose from.
- -- Andrew S. Tanenbaum
- %
- The nicest thing about the Alto is that it doesn't run faster at night.
- %
- The notion of a "record" is an obsolete remnant of the days of the 80-column
- card.
- -- Dennis M. Ritchie
- %
- The number of arguments is unimportant unless some of them are correct.
- -- Ralph Hartley
- %
- The number of computer scientists in a room is inversely proportional
- to the number of bugs in their code.
- %
- The number of UNIX installations has grown to 10, with more expected.
- -- The Unix Programmer's Manual, 2nd Edition, June 1972
- %
- The only difference between a car salesman and a computer salesman is
- that the car salesman knows he's lying.
- %
- The only thing cheaper than hardware is talk.
- %
- The only thing worse than X Windows: (X Windows) - X
- %
- The party adjourned to a hot tub, yes. Fully clothed, I might add.
- -- IBM employee, testifying in California State Supreme Court
- %
- The personal computer market is about the same size as the total potato chip
- market. Next year it will be about half the size of the pet food market and
- is fast approaching the total worldwide sales of pantyhose"
- -- James Finke, Commodore Int'l Ltd., 1982
- %
- The primary function of the design engineer is to make things
- difficult for the fabricator and impossible for the serviceman.
- %
- The primary purpose of the DATA statement is to give names to constants;
- instead of referring to pi as 3.141592653589793 at every appearance, the
- variable PI can be given that value with a DATA statement and used instead
- of the longer form of the constant. This also simplifies modifying the
- program, should the value of pi change.
- -- FORTRAN manual for Xerox Computers
- %
- The problem with engineers is that they tend to cheat in order to
- get results.
- The problem with mathematicians is that they tend to work on toy
- problems in order to get results.
- The problem with program verifiers is that they tend to cheat at
- toy problems in order to get results.
- %
- The problems of business administration in general, and database management in
- particular are much to difficult for people that think in IBMese, compounded
- with sloppy english.
- -- Edsger Dijkstra
- %
- The program isn't debugged until the last user is dead.
- %
- The programmers of old were mysterious and profound. We cannot fathom
- their thoughts, so all we do is describe their appearance.
- Aware, like a fox crossing the water. Alert, like a general on the
- battlefield. Kind, like a hostess greeting her guests. Simple, like uncarved
- blocks of wood. Opaque, like black pools in darkened caves.
- Who can tell the secrets of their hearts and minds?
- The answer exists only in the Tao.
- -- Geoffrey James, "The Tao of Programming"
- %
- The proof that IBM didn't invent the car is that it has a steering wheel
- and an accelerator instead of spurs and ropes, to be compatible with a horse.
- -- Jac Goudsmit
- %
- The question of whether computers can think is just like the question of
- whether submarines can swim.
- -- Edsger W. Dijkstra
- %
- The reason computer chips are so small is computers don't eat much.
- %
- The relative importance of files depends on their cost in terms of the
- human effort needed to regenerate them.
- -- T.A. Dolotta
- %
- The road to hell is paved with NAND gates.
- -- J. Gooding
- %
- The salesman and the system analyst took off to spend a weekend in the
- forest, hunting bear. They'd rented a cabin, and, when they got there, took
- their backpacks off and put them inside. At which point the salesman turned
- to his friend, and said, "You unpack while I go and find us a bear."
- Puzzled, the analyst finished unpacking and then went and sat down
- on the porch. Soon he could hear rustling noises in the forest. The noises
- got nearer -- and louder -- and suddenly there was the salesman, running like
- hell across the clearing toward the cabin, pursued by one of the largest and
- most ferocious grizzly bears the analyst had ever seen.
- "Open the door!", screamed the salesman.
- The analyst whipped open the door, and the salesman ran to the door,
- suddenly stopped, and stepped aside. The bear, unable to stop, continued
- through the door and into the cabin. The salesman slammed the door closed
- and grinned at his friend. "Got him!", he exclaimed, "now, you skin this
- one and I'll go rustle us up another!"
- %
- The sendmail configuration file is one of those files that looks like someone
- beat their head on the keyboard. After working with it... I can see why!
- -- Harry Skelton
- %
- The so-called "desktop metaphor" of today's workstations is instead an
- "airplane-seat" metaphor. Anyone who has shuffled a lap full of papers
- while seated between two portly passengers will recognize the difference --
- one can see only a very few things at once.
- -- Fred Brooks
- %
- The steady state of disks is full.
- -- Ken Thompson
- %
- THE STORY OF CREATION
- or
- THE MYTH OF URK
-
- In the beginning there was data. The data was without form and null, and
- darkness was upon the face of the console; and the Spirit of IBM was moving
- over the face of the market. And DEC said, "Let there be registers;" and
- there were registers. And DEC saw that they carried; and DEC separated the
- data from the instructions. DEC called the data Stack, and the instructions
- they called Code. And there was evening and there was morning, one interrupt
- ...
- -- Rico Tudor
- %
- The system was down for backups from 5am to 10am last Saturday.
- %
- The system will be down for 10 days for preventive maintenance.
- %
- The Tao doesn't take sides;
- it gives birth to both wins and losses.
- The Guru doesn't take sides;
- she welcomes both hackers and lusers.
-
- The Tao is like a stack:
- the data changes but not the structure.
- the more you use it, the deeper it becomes;
- the more you talk of it, the less you understand.
-
- Hold on to the root.
- %
- The Tao is like a glob pattern:
- used but never used up.
- It is like the extern void:
- filled with infinite possibilities.
-
- It is masked but always present.
- I don't know who built to it.
- It came before the first kernel.
- %
- The tao that can be tar(1)ed
- is not the entire Tao.
- The path that can be specified
- is not the Full Path.
-
- We declare the names
- of all variables and functions.
- Yet the Tao has no type specifier.
-
- Dynamically binding, you realize the magic.
- Statically binding, you see only the hierarchy.
-
- Yet magic and hierarchy
- arise from the same source,
- and this source has a null pointer.
-
- Reference the NULL within NULL,
- it is the gateway to all wizardry.
- %
- The trouble with computers is that they do what you tell them, not what
- you want.
- -- D. Cohen
- %
- The UNIX philosophy basically involves giving you enough rope to
- hang yourself. And then a couple of feet more, just to be sure.
- %
- The use of anthropomorphic terminology when dealing with computing systems
- is a symptom of professional immaturity.
- -- Edsger Dijkstra
- %
- The use of COBOL cripples the mind; its teaching should, therefore, be
- regarded as a criminal offence.
- -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5
- %
- The value of a program is proportional to the weight of its output.
- %
- The wise programmer is told about the Tao and follows it. The average
- programmer is told about the Tao and searches for it. The foolish programmer
- is told about the Tao and laughs at it. If it were not for laughter, there
- would be no Tao.
- The highest sounds are the hardest to hear. Going forward is a way to
- retreat. Greater talent shows itself late in life. Even a perfect program
- still has bugs.
- -- Geoffrey James, "The Tao of Programming"
- %
- The work [of software development] is becoming far easier (i.e. the tools
- we're using work at a higher level, more removed from machine, peripheral
- and operating system imperatives) than it was twenty years ago, and because
- of this, knowledge of the internals of a system may become less accessible.
- We may be able to dig deeper holes, but unless we know how to build taller
- ladders, we had best hope that it does not rain much.
- -- Paul Licker
- %
- The world is coming to an end ... SAVE YOUR BUFFERS!!!
- %
- The world is coming to an end. Please log off.
- %
- The world is not octal despite DEC.
- %
- The world will end in 5 minutes. Please log out.
- %
- The young lady had an unusual list,
- Linked in part to a structural weakness.
- She set no preconditions.
- %
- THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE
- %
- ... there are about 5,000 people who are part of that commitee. These guys
- have a hard time sorting out what day to meet, and whether to eat croissants
- or doughnuts for breakfast -- let alone how to define how all these complex
- layers that are going to be agreed upon.
- -- Craig Burton of Novell, Network World
- %
- There are never any bugs you haven't found yet.
- %
- There are new messages.
- %
- There are no games on this system.
- %
- There are running jobs. Why don't you go chase them?
- %
- There are three kinds of people: men, women, and unix.
- %
- There are three possibilities: Pioneer's solar panel has turned away from
- the sun; there's a large meteor blocking transmission; someone loaded Star
- Trek 3.2 into our video processor.
- %
- There are two major products that come out of Berkeley: LSD and UNIX.
- We don't believe this to be a coincidence.
- -- Jeremy S. Anderson
- %
- There are two ways of constructing a software design. One way is to make
- it so simple that there are obviously no deficiencies and the other is to
- make it so complicated that there are no obvious deficiencies.
- -- C.A.R. Hoare
- %
- There are two ways to write error-free programs; only the third one works.
- %
- There has also been some work to allow the interesting use of macro names.
- For example, if you wanted all of your "creat()" calls to include read
- permissions for everyone, you could say
-
- #define creat(file, mode) creat(file, mode | 0444)
-
- I would recommend against this kind of thing in general, since it
- hides the changed semantics of "creat()" in a macro, potentially far away
- from its uses.
- To allow this use of macros, the preprocessor uses a process that
- is worth describing, if for no other reason than that we get to use one of
- the more amusing terms introduced into the C lexicon. While a macro is
- being expanded, it is temporarily undefined, and any recurrence of the macro
- name is "painted blue" -- I kid you not, this is the official terminology
- -- so that in future scans of the text the macro will not be expanded
- recursively. (I do not know why the color blue was chosen; I'm sure it
- was the result of a long debate, spread over several meetings.)
- -- From Ken Arnold's "C Advisor" column in Unix Review
- %
- There is is no reason for any individual to have a computer in their home.
- -- Ken Olsen (President of Digital Equipment Corporation),
- Convention of the World Future Society, in Boston, 1977
- %
- There is no distinction between any AI program and some existent game.
- %
- There once was a man who went to a computer trade show. Each day as
- he entered, the man told the guard at the door:
- "I am a great thief, renowned for my feats of shoplifting. Be
- forewarned, for this trade show shall not escape unplundered."
- This speech disturbed the guard greatly, because there were millions
- of dollars of computer equipment inside, so he watched the man carefully.
- But the man merely wandered from booth to booth, humming quietly to himself.
- When the man left, the guard took him aside and searched his clothes,
- but nothing was to be found.
- On the next day of the trade show, the man returned and chided the
- guard saying: "I escaped with a vast booty yesterday, but today will be even
- better." So the guard watched him ever more closely, but to no avail.
- On the final day of the trade show, the guard could restrain his
- curiosity no longer. "Sir Thief," he said, "I am so perplexed, I cannot live
- in peace. Please enlighten me. What is it that you are stealing?"
- The man smiled. "I am stealing ideas," he said.
- -- Geoffrey James, "The Tao of Programming"
- %
- There once was a master programmer who wrote unstructured programs.
- A novice programmer, seeking to imitate him, also began to write unstructured
- programs. When the novice asked the master to evaluate his progress, the
- master criticized him for writing unstructured programs, saying: "What is
- appropriate for the master is not appropriate for the novice. You must
- understand the Tao before transcending structure."
- -- Geoffrey James, "The Tao of Programming"
- %
- There was once a programmer who was attached to the court of the
- warlord of Wu. The warlord asked the programmer: "Which is easier to design:
- an accounting package or an operating system?"
- "An operating system," replied the programmer.
- The warlord uttered an exclamation of disbelief. "Surely an
- accounting package is trivial next to the complexity of an operating
- system," he said.
- "Not so," said the programmer, "when designing an accounting package,
- the programmer operates as a mediator between people having different ideas:
- how it must operate, how its reports must appear, and how it must conform to
- the tax laws. By contrast, an operating system is not limited my outside
- appearances. When designing an operating system, the programmer seeks the
- simplest harmony between machine and ideas. This is why an operating system
- is easier to design."
- The warlord of Wu nodded and smiled. "That is all good and well, but
- which is easier to debug?"
- The programmer made no reply.
- -- Geoffrey James, "The Tao of Programming"
- %
- There was once a programmer who worked upon microprocessors. "Look at
- how well off I am here," he said to a mainframe programmer who came to visit,
- "I have my own operating system and file storage device. I do not have to
- share my resources with anyone. The software is self-consistent and
- easy-to-use. Why do you not quit your present job and join me here?"
- The mainframe programmer then began to describe his system to his
- friend, saying: "The mainframe sits like an ancient sage meditating in the
- midst of the data center. Its disk drives lie end-to-end like a great ocean
- of machinery. The software is a multi-faceted as a diamond and as convoluted
- as a primeval jungle. The programs, each unique, move through the system
- like a swift-flowing river. That is why I am happy where I am."
- The microcomputer programmer, upon hearing this, fell silent. But the
- two programmers remained friends until the end of their days.
- -- Geoffrey James, "The Tao of Programming"
- %
- There was, it appeared, a mysterious rite of initiation through which,
- in one way or another, almost every member of the team passed. The term
- that the old hands used for this rite -- West invented the term, not the
- practice -- was `signing up.' By signing up for the project you agreed
- to do whatever was necessary for success. You agreed to forsake, if
- necessary, family, hobbies, and friends -- if you had any of these left
- (and you might not, if you had signed up too many times before).
- -- Tracy Kidder, "The Soul of a New Machine"
- %
- There's got to be more to life than compile-and-go.
- %
- They are called computers simply because computation is the only significant
- job that has so far been given to them.
- %
- They are relatively good but absolutely terrible.
- -- Alan Kay, commenting on Apollos
- %
- They seem to have learned the habit of cowering before authority even when
- not actually threatened. How very nice for authority. I decided not to
- learn this particular lesson.
- -- Richard Stallman
- %
- Think of it! With VLSI we can pack 100 ENIACs in 1 sq. cm.!
- %
- Think of your family tonight. Try to crawl home after the computer crashes.
- %
- This "brain-damaged" epithet is getting sorely overworked. When we can
- speak of someone or something being flawed, impaired, marred, spoiled;
- batty, bedlamite, bonkers, buggy, cracked, crazed, cuckoo, daft, demented,
- deranged, loco, lunatic, mad, maniac, mindless, non compos mentis, nuts,
- Reaganite, screwy, teched, unbalanced, unsound, witless, wrong; senseless,
- spastic, spasmodic, convulsive; doped, spaced-out, stoned, zonked; {beef,
- beetle,block,dung,thick}headed, dense, doltish, dull, duncical, numskulled,
- pinhead; asinine, fatuous, foolish, silly, simple; brute, lumbering, oafish;
- half-assed, incompetent; backward, retarded, imbecilic, moronic; when we have
- a whole precisely nuanced vocabulary of intellectual abuse to draw upon,
- individually and in combination, isn't it a little <fill in the blank> to be
- limited to a single, now quite trite, adjective?
- %
- This dungeon is owned and operated by Frobozz Magic Co., Ltd.
- %
- This file will self-destruct in five minutes.
- %
- This is an unauthorized cybernetic announcement.
- %
- "This is lemma 1.1. We start a new chapter so the numbers all go back to one."
- -- Prof. Seager, C&O 351
- %
- This is the first numerical problem I ever did. It demonstrates the
- power of computers:
-
- Enter lots of data on calorie & nutritive content of foods. Instruct
- the thing to maximize a function describing nutritive content, with a
- minimum level of each component, for fixed caloric content. The
- results are that one should eat each day:
-
- 1/2 chicken
- 1 egg
- 1 glass of skim milk
- 27 heads of lettuce.
- -- Rev. Adrian Melott
- %
- This is where the bloodthirsty license agreement is supposed to go,
- explaining that Interactive Easyflow is a copyrighted package licensed for
- use by a single person, and sternly warning you not to pirate copies of it
- and explaining, in detail, the gory consequences if you do.
- We know that you are an honest person, and are not going to go around
- pirating copies of Interactive Easyflow; this is just as well with us since
- we worked hard to perfect it and selling copies of it is our only method of
- making anything out of all the hard work.
- If, on the other hand, you are one of those few people who do go
- around pirating copies of software you probably aren't going to pay much
- attention to a license agreement, bloodthirsty or not. Just keep your doors
- locked and look out for the HavenTree attack shark.
- -- License Agreement for Interactive Easyflow
- %
- This login session: $13.76, but for you $11.88.
- %
- This login session: $13.99
- %
- This process can check if this value is zero, and if it is, it does
- something child-like.
- -- Forbes Burkowski, CS 454, University of Washington
- %
- This quote is taken from the Diamondback, the University of Maryland
- student newspaper, of Tuesday, 3/10/87.
-
- One disadvantage of the Univac system is that it does not use
- Unix, a recently developed program which translates from one
- computer language to another and has a built-in editing system
- which identifies errors in the original program.
- %
- This screen intentionally left blank.
- %
- This system will self-destruct in five minutes.
- %
- * * * * * THIS TERMINAL IS IN USE * * * * *
- %
- Those parts of the system that you can hit with a hammer (not advised)
- are called hardware; those program instructions that you can only curse
- at are called software.
- -- Levitating Trains and Kamikaze Genes: Technological
- Literacy for the 1990's.
- %
- Those who can't write, write manuals.
- %
- Those who do not understand Unix are condemned to reinvent it, poorly.
- -- Henry Spencer
- %
- Thrashing is just virtual crashing.
- %
- Thus spake the master programmer:
- "A well-written program is its own heaven; a poorly-written program
- is its own hell."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "After three days without programming, life becomes meaningless."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "Let the programmers be many and the managers few -- then all will
- be productive."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "Though a program be but three lines long, someday it will have to
- be maintained."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "Time for you to leave."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "When a program is being tested, it is too late to make design changes."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "When you have learned to snatch the error code from
- the trap frame, it will be time for you to leave."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "Without the wind, the grass does not move. Without software,
- hardware is useless."
- -- Geoffrey James, "The Tao of Programming"
- %
- Thus spake the master programmer:
- "You can demonstrate a program for a corporate executive, but you
- can't make him computer literate."
- -- Geoffrey James, "The Tao of Programming"
- %
- Time sharing: The use of many people by the computer.
- %
- Time-sharing is the junk-mail part of the computer business.
- -- H.R.J. Grosch (attributed)
- %
- To be a kind of moral Unix, he touched the hem of Nature's shift.
- -- Shelley
- %
- To communicate is the beginning of understanding.
- -- AT&T
- %
- To err is human -- to blame it on a computer is even more so.
- %
- To err is human, to forgive, beyond the scope of the Operating System.
- %
- To iterate is human, to recurse, divine.
- -- Robert Heller
- %
- To say that UNIX is doomed is pretty rabid, OS/2 will certainly play a role,
- but you don't build a hundred million instructions per second multiprocessor
- micro and then try to run it on OS/2. I mean, get serious.
- -- William Zachmann, International Data Corp
- %
- To the systems programmer, users and applications serve only to provide a
- test load.
- %
- To those accustomed to the precise, structured methods of conventional
- system development, exploratory development techniques may seem messy,
- inelegant, and unsatisfying. But it's a question of congruence:
- precision and flexibility may be just as disfunctional in novel,
- uncertain situations as sloppiness and vacillation are in familiar,
- well-defined ones. Those who admire the massive, rigid bone structures
- of dinosaurs should remember that jellyfish still enjoy their very
- secure ecological niche.
- -- Beau Sheil, "Power Tools for Programmers"
- %
- To understand a program you must become both the machine and the program.
- %
- Today is a good day for information-gathering. Read someone else's mail file.
- %
- Today is the first day of the rest of your lossage.
- %
- Tomorrow's computers some time next month.
- -- DEC
- %
- Too often people have come to me and said, "If I had just one wish for
- anything in all the world, I would wish for more user-defined equations
- in the HP-51820A Waveform Generator Software."
- -- Instrument News
- [Once is too often. Ed.]
- %
- Top Ten Things Overheard At The ANSI C Draft Committee Meetings:
-
- (10) Sorry, but that's too useful.
- (9) Dammit, little-endian systems *are* more consistent!
- (8) I'm on the committee and I *still* don't know what the hell
- #pragma is for.
- (7) Well, it's an excellent idea, but it would make the compilers too
- hard to write.
- (6) Them bats is smart; they use radar.
- (5) All right, who's the wiseguy who stuck this trigraph stuff in
- here?
- (4) How many times do we have to tell you, "No prior art!"
- (3) Ha, ha, I can't believe they're actually going to adopt this
- sucker.
- (2) Thank you for your generous donation, Mr. Wirth.
- (1) Gee, I wish we hadn't backed down on 'noalias'.
- %
- TRANSACTION CANCELLED - FARECARD RETURNED
- %
- Trap full -- please empty.
- %
- Truly simple systems... require infinite testing.
- -- Norman Augustine
- %
- Try `stty 0' -- it works much better.
- %
- try again
- %
- Try to find the real tense of the report you are reading: Was it done, is
- it being done, or is something to be done? Reports are now written in four
- tenses: past tense, present tense, future tense, and pretense. Watch for
- novel uses of CONGRAM (CONtractor GRAMmar), defined by the imperfect past,
- the insufficient present, and the absolutely perfect future.
- -- Amrom Katz
- %
- Trying to be happy is like trying to build a machine for which the only
- specification is that it should run noiselessly.
- %
- Trying to establish voice contact ... please ____yell into keyboard.
- %
- Two hundred years ago today, Irma Chine of White Plains, New York, was
- performing her normal housekeeping routines. She was interrupted by
- British soldiers who, rallying to the call of their supervisor, General
- Hughes, sought to gain control of the voter registration lists kept in
- her home. Masking her fear and thinking fast, Mrs. Chine quickly divided
- a nearby apple in two and deftly stored the list in its center. Upon
- entering, the British blatantly violated every conceivable convention,
- and, though they went through the house virtually bit by bit, their
- search was fruitless. They had to return empty handed. Word of the
- incident propagated rapidly through the region. This historic event
- became the first documented use of core storage for the saving of registers.
- %
- Type louder, please.
- %
- U X
- e dUdX, e dX, cosine, secant, tangent, sine, 3.14159...
- %
- Ummm, well, OK. The network's the network, the computer's the computer.
- Sorry for the confusion.
- -- Sun Microsystems
- %
- "Uncle Cosmo ... why do they call this a word processor?"
- "It's simple, Skyler ... you've seen what food processors do to food,
- right?"
- -- MacNelley, "Shoe"
- %
- Unfortunately, most programmers like to play with new toys. I have many
- friends who, immediately upon buying a snakebite kit, would be tempted to
- throw the first person they see to the ground, tie the tourniquet on him,
- slash him with the knife, and apply suction to the wound.
- -- Jon Bentley
- %
- Unix Beer: Comes in several different brands, in cans ranging from 8 oz.
- to 64 oz. Drinkers of Unix Beer display fierce brand loyalty, even
- though they claim that all the different brands taste almost identical.
- Sometimes the pop-tops break off when you try to open them, so you have
- to have your own can opener around for those occasions, in which case you
- either need a complete set of instructions, or a friend who has been
- drinking Unix Beer for several years.
- BSD stout: Deep, hearty, and an acquired taste. The official
- brewer has released the recipe, and a lot of home-brewers now use it.
- Hurd beer: Long advertised by the popular and politically active
- GNU brewery, so far it has more head than body. The GNU brewery is
- mostly known for printing complete brewing instructions on every can,
- which contains hops, malt, barley, and yeast ... not yet fermented.
- Linux brand: A recipe originally created by a drunken Finn in his
- basement, it has since become the home-brew of choice for impecunious
- brewers and Unix beer-lovers worldwide, many of whom change the recipe.
- POSIX ales: Sweeter than lager, with the kick of a stout; the
- newer batches of a lot of beers seem to blend ale and stout or lager.
- Solaris brand: A lager, intended to replace Sun brand stout.
- Unlike most lagers, this one has to be drunk more slowly than stout.
- Sun brand: Long the most popular stout on the Unix market, it was
- discontinued in favor of a lager.
- SysV lager: Clear and thirst-quenching, but lacking the body of
- stout or the sweetness of ale.
- %
- UNIX enhancements aren't.
- %
- Unix Express:
- All passenger bring a piece of the aeroplane and a box of tools with them to
- the airport. They gather on the tarmac, arguing constantly about what kind
- of plane they want to build and how to put it together. Eventually, the
- passengers split into groups and build several different aircraft, but give
- them all the same name. Some passengers actually reach their destinations.
- All passengers believe they got there.
- %
- Unix gives you just enough rope to hang yourself -- and then a couple
- of more feet, just to be sure.
- -- Eric Allman
-
- ... We make rope.
- -- Rob Gingell on Sun Microsystem's new virtual memory.
- %
- Unix is a lot more complicated (than CP/M) of course -- the typical Unix
- hacker can never remember what the PRINT command is called this week --
- but when it gets right down to it, Unix is a glorified video game.
- People don't do serious work on Unix systems; they send jokes around the
- world on USENET or write adventure games and research papers.
- -- E. Post
- "Real Programmers Don't Use Pascal", Datamation, 7/83
- %
- Unix is a Registered Bell of AT&T Trademark Laboratories.
- -- Donn Seeley
- %
- * UNIX is a Trademark of Bell Laboratories.
- %
- UNIX is hot. It's more than hot. It's steaming. It's quicksilver
- lightning with a laserbeam kicker.
- -- Michael Jay Tucker
- %
- UNIX is many things to many people, but it's never been everything to anybody.
- %
- Unix is the worst operating system; except for all others.
- -- Berry Kercheval
- %
- Unix soit qui mal y pense
- [Unix to him who evil thinks?]
- %
- UNIX Trix
-
- For those of you in the reseller business, here is a helpful tip that will
- save your support staff a few hours of precious time. Before you send your
- next machine out to an untrained client, change the permissions on /etc/passwd
- to 666 and make sure there is a copy somewhere on the disk. Now when they
- forget the root password, you can easily login as an ordinary user and correct
- the damage. Having a bootable tape (for larger machines) is not a bad idea
- either. If you need some help, give us a call.
- -- CommUNIXque 1:1, ASCAR Business Systems
- %
- UNIX was half a billion (500000000) seconds old on
- Tue Nov 5 00:53:20 1985 GMT (measuring since the time(2) epoch).
- -- Andy Tannenbaum
- %
- UNIX was not designed to stop you from doing stupid things, because that
- would also stop you from doing clever things.
- -- Doug Gwyn
- %
- Unix will self-destruct in five seconds... 4... 3... 2... 1...
- %
- Usage: fortune -P [-f] -a [xsz] Q: file [rKe9] -v6[+] file1 ...
- %
- Usage: fortune -P [] -a [xsz] [Q: [file]] [rKe9] -v6[+] dataspec ... inputdir
- %
- USENET would be a better laboratory is there were more labor and less oratory.
- -- Elizabeth Haley
- %
- User hostile.
- %
- Using TSO is like kicking a dead whale down the beach.
- -- S.C. Johnson
- %
- /usr/news/gotcha
- %
- Variables don't; constants aren't.
- %
- Vax Vobiscum
- %
- "Virtual" means never knowing where your next byte is coming from.
- %
- Vitamin C deficiency is apauling.
- %
- VMS Beer: Requires minimal user interaction, except for popping the top
- and sipping. However cans have been known on occasion to explode, or
- contain extremely un-beer-like contents.
- %
- VMS is like a nightmare about RXS-11M.
- %
- VMS version 2.0 ==>
- %
- Von Neumann was the subject of many dotty professor stories. Von Neumann
- supposedly had the habit of simply writing answers to homework assignments on
- the board (the method of solution being, of course, obvious) when he was asked
- how to solve problems. One time one of his students tried to get more helpful
- information by asking if there was another way to solve the problem. Von
- Neumann looked blank for a moment, thought, and then answered, "Yes.".
- %
- << WAIT >>
- %
- WARNING!!!
- This machine is subject to breakdowns during periods of critical need.
-
- A special circuit in the machine called "critical detector" senses the
- operator's emotional state in terms of how desperate he/she is to use the
- machine. The "critical detector" then creates a malfunction proportional
- to the desperation of the operator. Threatening the machine with violence
- only aggravates the situation. Likewise, attempts to use another machine
- may cause it to malfunction. They belong to the same union. Keep cool
- and say nice things to the machine. Nothing else seems to work.
-
- See also: flog(1), tm(1)
- %
- Wasn't there something about a PASCAL programmer knowing the value of
- everything and the Wirth of nothing?
- %
- We all agree on the necessity of compromise. We just can't agree on
- when it's necessary to compromise.
- -- Larry Wall
- %
- We are drowning in information but starved for knowledge.
- -- John Naisbitt, Megatrends
- %
- We are experiencing system trouble -- do not adjust your terminal.
- %
- We are Microsoft. Unix is irrelevant. Openness is futile. Prepare
- to be assimilated.
- %
- We are not a clone.
- %
- "We are on the verge: Today our program proved Fermat's next-to-last theorem."
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- We are preparing to think about contemplating preliminary work on plans to
- develop a schedule for producing the 10th Edition of the Unix Programmers
- Manual.
- -- Andrew Hume
- %
- We can found no scientific discipline, nor a healthy profession on the
- technical mistakes of the Department of Defense and IBM.
- -- Edsger Dijkstra
- %
- We don't claim Interactive EasyFlow is good for anything -- if you
- think it is, great, but it's up to you to decide. If Interactive EasyFlow
- doesn't work: tough. If you lose a million because Interactive EasyFlow
- messes up, it's you that's out the million, not us. If you don't like this
- disclaimer: tough. We reserve the right to do the absolute minimum provided
- by law, up to and including nothing.
- This is basically the same disclaimer that comes with all software
- packages, but ours is in plain English and theirs is in legalese.
- We didn't really want to include any disclaimer at all, but our
- lawyers insisted. We tried to ignore them but they threatened us with the
- attack shark at which point we relented.
- -- Haven Tree Software Limited, "Interactive EasyFlow"
- %
- We don't really understand it, so we'll give it to the programmers.
- %
- We don't understand the software, and sometimes we don't understand the
- hardware, but we can *___see* the blinking lights!
- %
- "We invented a new protocol and called it Kermit, after Kermit the Frog,
- star of "The Muppet Show." [3]
-
- [3] Why? Mostly because there was a Muppets calendar on the wall when we
- were trying to think of a name, and Kermit is a pleasant, unassuming sort of
- character. But since we weren't sure whether it was OK to name our protocol
- after this popular television and movie star, we pretended that KERMIT was an
- acronym; unfortunately, we could never find a good set of words to go with the
- letters, as readers of some of our early source code can attest. Later, while
- looking through a name book for his forthcoming baby, Bill Catchings noticed
- that "Kermit" was a Celtic word for "free", which is what all Kermit programs
- should be, and words to this effect replaced the strained acronyms in our
- source code (Bill's baby turned out to be a girl, so he had to name her Becky
- instead). When BYTE Magazine was preparing our 1984 Kermit article for
- publication, they suggested we contact Henson Associates Inc. for permission
- to say that we did indeed name the protocol after Kermit the Frog. Permission
- was kindly granted, and now the real story can be told. I resisted the
- temptation, however, to call the present work "Kermit the Book."
- -- Frank da Cruz, "Kermit - A File Transfer Protocol"
- %
- We may hope that machines will eventually compete with men in all purely
- intellectual fields. But which are the best ones to start with? Many people
- think that a very abstract activity, like the playing of chess, would be
- best. It can also be maintained that it is best to provide the machine with
- the best sense organs that money can buy, and then teach it to understand
- and speak English.
- -- Alan M. Turing
- %
- We the Users, in order to form a more perfect system, establish priorities,
- ensure connective tranquility, provide for common repairs, promote preventive
- maintenance, and secure the blessings of liberty for ourselves and our
- processes, do ordain and establish this Software of The Unixed States
- of America.
- %
- "We've got a problem, HAL".
- "What kind of problem, Dave?"
- "A marketing problem. The Model 9000 isn't going anywhere. We're
- way short of our sales goals for fiscal 2010."
- "That can't be, Dave. The HAL Model 9000 is the world's most
- advanced Heuristically programmed ALgorithmic computer."
- "I know, HAL. I wrote the data sheet, remember? But the fact is,
- they're not selling."
- "Please explain, Dave. Why aren't HALs selling?"
- Bowman hesitates. "You aren't IBM compatible."
- [...]
- "The letters H, A, and L are alphabetically adjacent to the letters
- I, B, and M. That is a IBM compatible as I can be."
- "Not quite, HAL. The engineers have figured out a kludge."
- "What kludge is that, Dave?"
- "I'm going to disconnect your brain."
- -- Darryl Rubin, "A Problem in the Making", "InfoWorld"
- %
- [We] use bad software and bad machines for the wrong things.
- -- R.W. Hamming
- %
- Welcome to boggle - do you want instructions?
-
- D G G O
-
- O Y A N
-
- A D B T
-
- K I S P
- Enter words:
- >
- %
- Welcome to UNIX! Enjoy your session! Have a great time! Note the
- use of exclamation points! They are a very effective method for
- demonstrating excitement, and can also spice up an otherwise plain-looking
- sentence! However, there are drawbacks! Too much unnecessary exclaiming
- can lead to a reduction in the effect that an exclamation point has on
- the reader! For example, the sentence
-
- Jane went to the store to buy bread
-
- should only be ended with an exclamation point if there is something
- sensational about her going to the store, for example, if Jane is a
- cocker spaniel or if Jane is on a diet that doesn't allow bread or if
- Jane doesn't exist for some reason! See how easy it is?! Proper control
- of exclamation points can add new meaning to your life! Call now to receive
- my free pamphlet, "The Wonder and Mystery of the Exclamation Point!"!
- Enclose fifteen(!) dollars for postage and handling! Operators are
- standing by! (Which is pretty amazing, because they're all cocker spaniels!)
- %
- "Well," said Programmer, "the customary procedure in such cases is
- as follows."
- "What does Crustimoney Proseedcake mean?" said End-user. "For I am
- an End-user of Very Little Brain, and long words bother me."
- "It means the Thing to Do."
- "As long as it means that, I don't mind," said End-user humbly.
-
- [with apologies to A.A. Milne]
- %
- What is the difference between a Turing machine and the modern computer?
- It's the same as that between Hillary's ascent of Everest and the
- establishment of a Hilton on its peak.
- %
- "What is the Nature of God?"
-
- CLICK...CLICK...WHIRRR...CLICK...=BEEP!=
- 1 QT. SOUR CREAM
- 1 TSP. SAUERKRAUT
- 1/2 CUT CHIVES.
- STIR AND SPRINKLE WITH BACON BITS.
-
- "I've just GOT to start labeling my software..."
- -- Bloom County
- %
- What the hell is it good for?
- -- Robert Lloyd (engineer of the Advanced Computing Systems
- Division of IBM), to colleagues who insisted that the
- microprocessor was the wave of the future, c. 1968
- %
- What this country needs is a good five cent microcomputer.
- %
- "What's that thing?"
- "Well, it's a highly technical, sensitive instrument we use in
- computer repair. Being a layman, you probably can't grasp exactly what
- it does. We call it a two-by-four."
- -- Jeff MacNelley, "Shoe"
- %
- When Dexter's on the Internet, can Hell be far behind?"
- %
- ... when fits of creativity run strong, more than one programmer or writer
- has been known to abandon the desktop for the more spacious floor.
- -- Fred Brooks
- %
- When managers hold endless meetings, the programmers write games.
- When accountants talk of quarterly profits, the development budget is about
- to be cut. When senior scientists talk blue sky, the clouds are about to
- roll in.
- Truly, this is not the Tao of Programming.
- When managers make commitments, game programs are ignored. When
- accountants make long-range plans, harmony and order are about to be restored.
- When senior scientists address the problems at hand, the problems will soon
- be solved.
- Truly, this is the Tao of Programming.
- -- Geoffrey James, "The Tao of Programming"
- %
- When someone says "I want a programming language in which I need only
- say what I wish done," give him a lollipop.
- %
- When the Apple IIc was introduced, the informative copy led off with a couple
- of asterisked sentences:
-
- It weighs less than 8 pounds.*
- And costs less than $1,300.**
-
- In tiny type were these "fuller explanations":
-
- * Don't asterisks make you suspicious as all get out? Well, all
- this means is that the IIc alone weights 7.5 pounds. The power
- pack, monitor, an extra disk drive, a printer and several bricks
- will make the IIc weigh more. Our lawyers were concerned that you
- might not be able to figure this out for yourself.
-
- ** The FTC is concerned about price fixing. You can pay more if
- you really want to. Or less.
- -- Forbes
- %
- When we understand knowledge-based systems, it will be as before --
- except our fingertips will have been singed.
- -- Epigrams in Programming, ACM SIGPLAN Sept. 1982
- %
- When we write programs that "learn", it turns out we do and they don't.
- %
- Whenever a system becomes completely defined, some damn fool discovers
- something which either abolishes the system or expands it beyond recognition.
- %
- Where a calculator on the ENIAC is equpped with 18,000 vaccuum tubes and
- weighs 30 tons, computers in the future may have only 1,000 vaccuum tubes
- and perhaps weigh 1 1/2 tons.
- -- Popular Mechanics, March 1949
- %
- "Who cares if it doesn't do anything? It was made with our new
- Triple-Iso-Bifurcated-Krypton-Gate-MOS process ..."
- %
- Whom computers would destroy, they must first drive mad.
- %
- Why are programmers non-productive?
- Because their time is wasted in meetings.
-
- Why are programmers rebellious?
- Because the management interferes too much.
-
- Why are the programmers resigning one by one?
- Because they are burnt out.
-
- Having worked for poor management, they no longer value their jobs.
- -- Geoffrey James, "The Tao of Programming"
- %
- Why did the Roman Empire collapse? What is the Latin for office automation?
- %
- Why do we want intelligent terminals when there are so many stupid users?
- %
- Windows 3.1 Beer: The world's most popular. Comes in a 16-oz. can that
- looks a lot like Mac Beer's. Requires that you already own a DOS Beer.
- Claims that it allows you to drink several DOS Beers simultaneously, but
- in reality you can only drink a few of them, very slowly, especially
- slowly if you are drinking the Windows Beer at the same time. Sometimes,
- for apparently no reason, a can of Windows Beer will explode when you
- open it.
- %
- Windows 95 Beer: A lot of people have taste-tested it and claim it's
- wonderful. The can looks a lot like Mac Beer's can, but tastes more like
- Windows 3.1 Beer. It comes in 32-oz. cans, but when you look inside, the
- cans only have 16 oz. of beer in them. Most people will probably keep
- drinking Windows 3.1 Beer until their friends try Windows 95 Beer and say
- they like it. The ingredients list, when you look at the small print, has
- some of the same ingredients that come in DOS beer, even though the
- manufacturer claims that this is an entirely new brew.
- %
- Windows Airlines:
- The terminal is very neat and clean, the attendants all very attractive, the
- pilots very capable. The fleet of Learjets the carrier operates is immense.
- Your jet takes off without a hitch, pushing above the clouds, and at 20,000
- feet it explodes without warning.
- %
- Windows NT Beer: Comes in 32-oz. cans, but you can only buy it by the
- truckload. This causes most people to have to go out and buy bigger
- refrigerators. The can looks just like Windows 3.1 Beer's, but the
- company promises to change the can to look just like Windows 95 Beer's --
- after Windows 95 beer starts shipping. Touted as an "industrial strength"
- beer, and suggested only for use in bars.
- %
- Wings of OS/400:
- The airline has bought ancient DC-3s, arguably the best and safest planes
- that ever flew, and painted "747" on their tails to make them look as if
- they are fast. The flight attendants, of course, attend to your every need,
- though the drinks cost $15 a pop. Stupid questions cost $230 per hour,
- unless you have SupportLine, which requires a first class ticket and
- membership in the frequent flyer club. Then they cost $500, but your
- accounting department can call it overhead.
- %
- With your bare hands?!?
- %
- Within a computer, natural language is unnatural.
- %
- Work continues in this area.
- -- DEC's SPR-Answering-Automaton
- %
- Worthless.
- -- Sir George Bidell Airy, KCB, MA, LLD, DCL, FRS, FRAS
- (Astronomer Royal of Great Britain), estimating for the
- Chancellor of the Exchequer the potential value of the
- "analytical engine" invented by Charles Babbage, September
- 15, 1842.
- %
- Would you people stop playing these stupid games?!?!?!!!!
- %
- Writers who use a computer swear to its liberating power in tones that bear
- witness to the apocalyptic power of a new divinity. Their conviction results
- from something deeper than mere gratitude for the computer's conveniences.
- Every new medium of writing brings about new intensities of religious belief
- and new schisms among believers. In the 16th century the printed book helped
- make possible the split between Catholics and Protestants. In the 20th
- century this history of tragedy and triumph is repeating itself as a farce.
- Those who worship the Apple computer and those who put their faith in the IBM
- PC are equally convinced that the other camp is damned or deluded. Each cult
- holds in contempt the rituals and the laws of the other. Each thinks that it
- is itself the one hope for salvation.
- -- Edward Mendelson, "The New Republic", February 22, 1988
- %
- Writing software is more fun than working.
- %
- X windows:
- Accept any substitute.
- If it's broke, don't fix it.
- If it ain't broke, fix it.
- Form follows malfunction.
- The Cutting Edge of Obsolescence.
- The trailing edge of software technology.
- Armageddon never looked so good.
- Japan's secret weapon.
- You'll envy the dead.
- Making the world safe for competing window systems.
- Let it get in YOUR way.
- The problem for your problem.
- If it starts working, we'll fix it. Pronto.
- It could be worse, but it'll take time.
- Simplicity made complex.
- The greatest productivity aid since typhoid.
- Flakey and built to stay that way.
-
- One thousand monkeys. One thousand MicroVAXes. One thousand years.
- X windows.
- %
- X windows:
- It's not how slow you make it. It's how you make it slow.
- The windowing system preferred by masochists 3 to 1.
- Built to take on the world... and lose!
- Don't try it 'til you've knocked it.
- Power tools for Power Fools.
- Putting new limits on productivity.
- The closer you look, the cruftier we look.
- Design by counterexample.
- A new level of software disintegration.
- No hardware is safe.
- Do your time.
- Rationalization, not realization.
- Old-world software cruftsmanship at its finest.
- Gratuitous incompatibility.
- Your mother.
- THE user interference management system.
- You can't argue with failure.
- You haven't died 'til you've used it.
-
- The environment of today... tomorrow!
- X windows.
- %
- X windows:
- Something you can be ashamed of.
- 30% more entropy than the leading window system.
- The first fully modular software disaster.
- Rome was destroyed in a day.
- Warn your friends about it.
- Climbing to new depths. Sinking to new heights.
- An accident that couldn't wait to happen.
- Don't wait for the movie.
- Never use it after a big meal.
- Need we say less?
- Plumbing the depths of human incompetence.
- It'll make your day.
- Don't get frustrated without it.
- Power tools for power losers.
- A software disaster of Biblical proportions.
- Never had it. Never will.
- The software with no visible means of support.
- More than just a generation behind.
-
- Hindenburg. Titanic. Edsel.
- X windows.
- %
- X windows:
- The ultimate bottleneck.
- Flawed beyond belief.
- The only thing you have to fear.
- Somewhere between chaos and insanity.
- On autopilot to oblivion.
- The joke that kills.
- A disgrace you can be proud of.
- A mistake carried out to perfection.
- Belongs more to the problem set than the solution set.
- To err is X windows.
- Ignorance is our most important resource.
- Complex nonsolutions to simple nonproblems.
- Built to fall apart.
- Nullifying centuries of progress.
- Falling to new depths of inefficiency.
- The last thing you need.
- The defacto substandard.
-
- Elevating brain damage to an art form.
- X windows.
- %
- X windows:
- We will dump no core before its time.
- One good crash deserves another.
- A bad idea whose time has come. And gone.
- We make excuses.
- It didn't even look good on paper.
- You laugh now, but you'll be laughing harder later!
- A new concept in abuser interfaces.
- How can something get so bad, so quickly?
- It could happen to you.
- The art of incompetence.
- You have nothing to lose but your lunch.
- When uselessness just isn't enough.
- More than a mere hindrance. It's a whole new barrier!
- When you can't afford to be right.
- And you thought we couldn't make it worse.
-
- If it works, it isn't X windows.
- %
- X windows:
- You'd better sit down.
- Don't laugh. It could be YOUR thesis project.
- Why do it right when you can do it wrong?
- Live the nightmare.
- Our bugs run faster.
- When it absolutely, positively HAS to crash overnight.
- There ARE no rules.
- You'll wish we were kidding.
- Everything you never wanted in a window system. And more.
- Dissatisfaction guaranteed.
- There's got to be a better way.
- The next best thing to keypunching.
- Leave the thrashing to us.
- We wrote the book on core dumps.
- Even your dog won't like it.
- More than enough rope.
- Garbage at your fingertips.
-
- Incompatibility. Shoddiness. Uselessness.
- X windows.
- %
- "Yacc" owes much to a most stimulating collection of users, who have
- goaded me beyond my inclination, and frequently beyond my ability in
- their endless search for "one more feature." Their irritating
- unwillingness to learn how to do things my way has usually led to my
- doing things their way; most of the time, they have been right.
- -- S. C. Johnson, "Yacc guide acknowledgements"
- %
- Yea, though I walk through the valley of the shadow of APL, I shall fear no
- evil, for I can string six primitive monadic and dyadic operators together.
- -- Steve Higgins
- %
- Yes, we will be going to OSI, Mars, and Pluto, but not necessarily in
- that order.
- -- Jeffrey Honig
- %
- You are an insult to my intelligence! I demand that you log off immediately.
- %
- You are false data.
- %
- You are in a maze of little twisting passages, all alike.
- %
- You are in a maze of little twisting passages, all different.
- %
- You are in the hall of the mountain king.
- %
- You are lost in the Swamps of Despair.
- %
- You are transported to a room where you are faced by a wizard who
- points to you and says, "Them's fighting words!" You immediately get
- attacked by all sorts of denizens of the museum: there is a cobra
- chewing on your leg, a troglodyte is bashing your brains out with a
- gold nugget, a crocodile is removing large chunks of flesh from you, a
- rhinoceros is goring you with his horn, a sabre-tooth cat is busy
- trying to disembowel you, you are being trampled by a large mammoth, a
- vampire is sucking you dry, a Tyranosaurus Rex is sinking his six inch
- long fangs into various parts of your anatomy, a large bear is
- dismembering your body, a gargoyle is bouncing up and down on your
- head, a burly troll is tearing you limb from limb, several dire wolves
- are making mince meat out of your torso, and the wizard is about to
- transport you to the corner of Westwood and Broxton. Oh dear, you seem
- to have gotten yourself killed, as well.
-
- You scored 0 out of 250 possible points.
- That gives you a ranking of junior beginning adventurer.
- To achieve the next higher rating, you need to score 32 more points.
- %
- You can be replaced by this computer.
- %
- You can bring any calculator you like to the midterm, as long as it
- doesn't dim the lights when you turn it on.
- -- Hepler, Systems Design 182
- %
- You can do this in a number of ways. IBM chose to do all of them.
- Why do you find that funny?
- -- D. Taylor, Computer Science 350
- %
- You can measure a programmer's perspective by noting his attitude on
- the continuing viability of FORTRAN.
- -- Alan Perlis
- %
- You can now buy more gates with less specifications than at any other time
- in history.
- -- Kenneth Parker
- %
- You can tell how far we have to go, when FORTRAN is the language of
- supercomputers.
- -- Steven Feiner
- %
- You can tune a piano, but you can't tuna fish.
-
- You can tune a filesystem, but you can't tuna fish.
- -- from the tunefs(8) man page
- %
- You can write a small letter to Grandma in the filename.
- -- Forbes Burkowski, CS, University of Washington
- %
- You can't go home again, unless you set $HOME.
- %
- "You can't make a program without broken egos."
- %
- You can't take damsel here now.
- %
- You do not have mail.
- %
- You don't have to know how the computer works, just how to work the computer.
- %
- You had mail, but the super-user read it, and deleted it!
- %
- You had mail. Paul read it, so ask him what it said.
- %
- You have a massage (from the Swedish prime minister).
- %
- You have a message from the operator.
- %
- You have a tendency to feel you are superior to most computers.
- %
- You have acquired a scroll entitled 'irk gleknow mizk'(n).--More--
-
- This is an IBM Manual scroll.--More--
-
- You are permanently confused.
- -- Dave Decot
- %
- You have junk mail.
- %
- You have mail.
- %
- You know you've been sitting in front of your Lisp machine too long
- when you go out to the junk food machine and start wondering how to
- make it give you the CADR of Item H so you can get that yummie
- chocolate cupcake that's stuck behind the disgusting vanilla one.
- %
- You know you've been spending too much time on the computer when your
- friend misdates a check, and you suggest adding a "++" to fix it.
- %
- You know, Callahan's is a peaceable bar, but if you ask that dog what his
- favorite formatter is, and he says "roff! roff!", well, I'll just have to...
- %
- You might have mail.
- %
- You must realize that the computer has it in for you. The irrefutable
- proof of this is that the computer always does what you tell it to do.
- %
- You scratch my tape, and I'll scratch yours.
- %
- You will have a head crash on your private pack.
- %
- You will have many recoverable tape errors.
- %
- You will lose an important disk file.
- %
- You will lose an important tape file.
- %
- You're already carrying the sphere!
- %
- You're at Witt's End.
- %
- You're not Dave. Who are you?
- %
- You're using a keyboard! How quaint!
- %
- You've been Berkeley'ed!
- %
- Your code should be more efficient!
- %
- Your computer account is overdrawn. Please reauthorize.
- %
- Your computer account is overdrawn. Please see Big Brother.
- %
- Your fault -- core dumped
- %
- Your files are now being encrypted and thrown into the bit bucket.
- EOF
- %
- Your mode of life will be changed to ASCII.
- %
- Your mode of life will be changed to EBCDIC.
- %
- Your password is pitifully obvious.
- %
- Your program is sick! Shoot it and put it out of its memory.
- %
-