Q: How many Pentium designers does it take to screw in a light bulb?
A: 1.99904274017, but that's close enough for non-technical people.
Q: What do you get when you cross a Pentium PC with a research grant?
A: A mad scientist.
Q: What's another name for the "Intel Inside" sticker they put on Pentiums?
A: The warning label.
Q: What do you call a series of FDIV instructions on a Pentium?
A: Successive approximations.
Q: Complete the following word analogy: Add is to Subtract as Multiply is to: 1)
Divide 2) ROUND 3) RANDOM 4) On a Pentium, all of the above
A: Number 4.
Q: What algorithm did Intel use in the Pentium's floating point divider?
A: "Life is like a box of chocolates..." (Source: F. Gump of Intel)
Q: Why didn't Intel call the Pentium the 586?
A: Because they added 486 and 100 on the first Pentium and got 585.999983605.
Q: According to Intel, the Pentium conforms to the IEEE standards 754 and 854
for floating point arithmetic. If you fly in aircraft designed using a Pentium,
what is the correct pronunciation of "IEEE"?
TOP TEN NEW INTEL SLOGANS FOR THE PENTIUM
9.9999973251 It's a FLAW, Dammit, not a Bug
8.9999163362 It's the new math
7.9999414610 Nearly 300 Correct Opcodes
6.9999831538 You Don't Need to Know What's Inside
5.9999835137 Redefining the PC -- and Mathematics As Well
4.9999999021 We Fixed It, Really
3.9998245917 Division Considered Harmful
2.9991523619 Why Do You Think They Call It *Floating* Point? 1.9999103517 We're
Looking for a Few Good Flaws
0.9999999998 The Errata Inside
31 Signs That Technology Has Taken Over Your Life:
1. Your stationery is more cluttered than Warren Beatty's address book. The
letterhead lists a fax number, e-mail addresses for two on-line services, and
your Internet address, which spreads across the breadth of the letterhead and
continues to the back. In essence, you have conceded that the first page of any
letter you write *is* letterhead
. 2. You have never sat through an entire movie without having at least one
device on your body beep or buzz.
3. You need to fill out a form that must be typewritten, but you can't because
there isn't one typewriter in your house -- only computers with laser printers.
4. You think of the gadgets in your office as "friends," but you forget to send
your father a birthday card.
5. You disdain people who use low baud rates.
6. When you go into a computer store, you eavesdrop on a salesperson talking
with customers -- and you butt in to correct him and spend the next twenty
minutes answering the customers' questions, while the salesperson stands by
silently, nodding his head.
7. You use the phrase "digital compression" in a conversation without thinking
how strange your mouth feels when you say it.
8. You constantly find yourself in groups of people to whom you say the phrase
"digital compression." Everyone understands what you mean, and you are not
surprised or disappointed that you don't have to explain it.
9. You know Bill Gates' e-mail address, but you have to look up your own social
10. You stop saying "phone number" and replace it with "voice number," since we
all know the majority of phone lines in any house are plugged into contraptions
that talk to other contraptions.
11. You sign Christmas cards by putting :-) next to your signature.
12. Off the top of your head, you can think of nineteen keystroke symbols that
are far more clever than :-)
13. You back up your data every day.
14. Your wife asks you to pick up some minipads for her at the store and you
return with a rest for your mouse.
15. You think jokes about being unable to program a VCR are stupid.
16. On vacation, you are reading a computer manual and turning the pages faster
than everyone else who is reading John Grisham novels.
17. The thought that CD could refer to investment finance or music rarely enters
18. You are able to argue persuasively that Ross Perot's phrase "electronic town
hall" makes more sense than the term "information superhighway," but you don't
because, after all, the man still uses hand-drawn pie charts.
19. You go to computer trade shows and map out your path of the exhibit hall in
advance. However, you cannot give someone directions to your house without
looking up the street names.
20. You would rather get more dots per inch than miles per gallon.
21. You become upset when a person calls you on the phone to sell you something,
but you think it's okay for a computer to call and demand that you start pushing
buttons on your telephone to receive more information about the product it is
22. You know without a doubt that disks come in five-and-a-quarter and
three-and-a-half inch sizes.
23. Al Gore strikes you as an "intriguing" fellow.
24. You own a set of itty-bitty screwdrivers and you actually know where they
25. While contemporaries swap stories about their recent hernia surgeries, you
compare mouse-induced index-finger strain with a nine-year-old.
26. You are so knowledgeable about technology that you feel secure enough to say
"I don't know" when someone asks you a technology question instead of feeling
compelled to make something up.
27. You rotate your screen savers more frequently than your automobile tires.
28. You have a functioning home copier machine, but every toaster you own turns
bread into charcoal.
29. You have ended friendships because of irreconcilably different opinions
about which is better: the track ball or the track pad.
30. You understand all the jokes in this message. If so, my friend, technology
has taken over your life. We suggest, for your own good, that you go lie under a
tree and write a haiku. And don't use a laptop.
31. You email this message to your friends over the net. You'd never get around
to showing it to them in person or reading it to them on the phone. In fact, you
have probably never met most of these people face-to-face.
by Tad Deriso
There is some compelling force in all Hackers that seems to draw them
to their computers every day. Why they get up at 4am to use the modem, and why
they continue to rack up a truly incredible phone bill is beyond me.
Most computer areas, at your home or at your office, tend to be messy. Even you
try to keep it clean, it is truly impossible. Whether it be empty Coke cans
laying all around, soldering devices, electric diodes, computer parts, or
integrated circuits, it is not only a pain for your mother to look at, but a
prime Russian ICBM missile target as well.
There is much detail needed to explain a Hacker. For instance, instead of
organizing his clothes by color, best ones, or style, he organizes his by pile.
Also, he likes to sing songs such as, "Let's get Digital", "We
all live in a yellow subroutine", and "Somewhere over the RAMbow".
Most Hackers do well in school. The reason is not to impress their teachers, not
to get money from their parents, and not to be educated, but they do it so they
can hopefully get a scholarship to MIT. You can't blame them, though, if they
are looking out into space. It might be because they are worried if MCI traced
the calls that they sent to NORAD.
All Hackers, big or small, love computers, whether they be Trash-80's or an IBM
360/VM workstation. When they get on one, it's mighty hard to get them off of
There are 2 types of Hackers. One who likes to crash local BBS's, and the one
who writes programs in Assembly Language. The Hacker who crashes systems is the
one that most people think that a Hacker is. A typical example of one is John
Fredrickson (A.K.A. "The Phone Man"). He loves to crash computers, and
break into illegal systems. The ones that he has gotten in to are MCI, CitiBank,
school systems, IBM, Southern Bell, and Georgia Tech, not to mention all the
ones in between.
The second type of Hacker is the programmer. He writes games, utilities, and
anything else that he can think of. Take for example, John Harris, a freelance
software writer for On-Line Software Co. John had a brainstorm one day, and
decided to write Frogger for the Apple. He thought that it would take about 3
weeks to complete. He started on Frogger a week late, because of the complicated
music set that he had to write. After two months, he was almost done. He decided
to take a break and go to the Software Expo. He decided to take his nearly
completed Frogger, and show it to the consumers at the show. He also took with
him the only back-up copy, in case the main disk did not boot.
While at the fair, he was talking to the Manager about getting a booth. He had
his disks with him. Then, when he got a booth reserved, he reached down to get
his disks, and they were gone! All his hard work, including the MultiLevel
character generator, music lines, disk subroutines, assembly routines, debugging
programs, etc. All gone.
After that tragedy, John was in a deep depression. He finally started working on
it again in 3 months. He completed it in 4 months and 3 days.
Hackers always take time off. There is always one way to notice a true Hacker.
At a party, the true Hacker is the one in the corner talking about operating
system security and how to get around it. At the beach, the True Hacker is the
one drawing flow charts in the sand. At a football game, the true Hacker is the
one comparing the football plays against a simulation printed on 11 by 14
Most Hackers work for the U.S. Government-- mainly the Department of Defense.
You can see the best Hackers at the Jet Propulsion Laboratory in California.
What sort of environment does a Hacker function best in? No, not a heated room
with a clean table and disks organized neatly, but they do best in rooms that
have line-printed Snoopy calendars from the year 1969. They do not know how to
cook, so they survive on Twinkies and coffee. Instead of wasting electricity for
a heater, they spend it on air-conditioners to cool of their computer system in
mid-January when the temperatures are below freezing. They wear layers and
layers of clothing to keep the body heat in. When you see one of these people,
instead of a Hacker coming into your mind, you think that he is about to go on a
Polar expedition somewhere in the North Pole.
Hackers also like to hang around arcades. (This is also true for kids, little
old ladies, and fighter pilots.) There, secluded in their
own environment, Hackers can talk freely on computer hints and short cuts while
playing Pac-Man, or Joust.
All Hackers like Graphics. They like low-resolution, but prefer high-resolution
the best. These graphics, such as Sine waves, rotating 3-D boxes, and little
balloons, are confined to the limits of a systems capability. The older more
experienced Hackers are the ones who are lucky enough to get to work on a VAX
system, and maybe even a CRAY-1 SuperComputer. If they use these, they have only
the limits of their imagination to stop them.
Most Middle School Hackers between the ages of 10 through 14, like to use
computers to do reports on, and play games. Some of these younger generation
Hackers have gotten into BASIC programming.
Some people, like to impress real Hackers by making them think that they know
everything. There is a name for this kind of person. He is a Sub-Hacker (Intillectuous
dumbfoundeth). For instance, you come up to them one day, and say,"Hey
so-and-so what does BASIC stand for?" and you could sit there for days, and
he would act like the answer was on the tip of his tongue, when it was probably
in his toes. It is people like this that give Hackers a bad name.
All Hackers have rules that they go by. One is to never call long distance on
Monday, because of the high phone charge. If builders built buildings they way
programmers wrote programs, the first woodpecker that comes along would destroy
civilization. Another is, if the computer accepts a program on the first run
without any errors, either there is a malfunction, or it must be a dream.
Hackers are a unique breed. Combining intelligence, personality, and a morale
sense of good taste. A Hacker enjoys the environment that appeals to him the
most. Such as, the computer room, the arcade, science lab, or the Atari
downstairs. They like to be alone. Secluded in their own thoughts, thinking of
what the password could be to log on to General Electric. Hackers are the people
who are going to make our future brighter, and more exciting in the field of
electronics, data processing, artificial intelligence, and programming. We need
to support these people in all the ways that we can, so we will be insured of a
more happier future in the world of technological advancements.
Software development cycle
1. Programmer produces code he believes is bug-free.
2. Product is tested. 20 bugs are found.
3. Programmer fixes 10 of the bugs and explains to the testing department that
the other 10 aren't really bugs.
4. Testing department finds that five of the fixes didn't work and discovers 15
5. Repeat three times steps 3 and 4.
6. Due to marketing pressure and an extremely premature product announcement
based on overly-optimistic programming schedule, the product is released.
7. Users find 137 new bugs.
8. Original programmer, having cashed his royalty check, is nowhere to be found.
9. Newly-assembled programming team fixes almost all of the 137 bugs, but
introduce 456 new ones.
10. Original programmer sends underpaid testing department a postcard from Fiji.
Entire testing department quits.
11. Company is bought in a hostile takeover by competitor using profits from
their latest release, which had 783 bugs.
12. New CEO is brought in by board of directors. He hires a programmer to redo
program from scratch.
13. Programmer produces code he believes is bug-free.
Alice is in UNIX land
"Can you help me? asked Alice.
"No," said Negative.
"I'm looking for a white consultant." Alice pointed in the direction
she had been walking. "Did he go this way?" she asked.
"No," said Negative.
She pointed the other way.
"Yes," said Positive.
Soon Alice came upon a large brown table. The Consultant was there, as was an
apparently Mad Hacker, and several creatures that Alice did not recognize. In
one corner sat a Dormouse fast asleep. Over the table was a large sign that read
Everyone except the Dormouse was holding a paper cup, from which they were
sampling what appeared to be custard. "Wrong flavor," they all
declared as they passed the cup the cup to the creature on their right and
graciously took the one being offered on their left. Alice watched them repeat
this ritual three or four times before she approached and sat down.
Immediately, a large toad leaped into her lap and looked at her as if it wanted
to be loved. "Grep," it exclaimed.
"Don't mind him," explained the Mad Hacker. "He's just looking
for some string."
"Nroff?" asked the Frog.
The Mad Hacker handed Alice a cup of custard-like substance and a spoon.
"Here," he said, "what do you think of this?"
"It looks lovely," said Alice, "very sweet." She tried a
spoonful. "Yuck!" she cried. "It's awful. What is it?"
"Oh just another graphic interface for UNIX," answered the Hacker.
Alice pointed to the sleeping Dormouse. "Who's he?" she asked.
"That's OS Too," explained the Hacker. "We've pretty much given
up on waking him.
"Just than, a large, Blue Elephant sitting next to the Dormouse stood up.
"Ladies and gentlemen," he trumpeted pompously, "as the largest
creature here, I feel impelled to state that we must take an Open Look
A young Job Sparrow on the other side of the table stood up angrily. The
Elephant noticed and changed his speech accordingly."...what our NextStep
"Half the creatures bowed in respect while the other half snickered quietly
to themselves. Just then, OS Too fell over in his sleep, crashing into the
Elephant and taking him down with him. No one seemed a bit surprised.
"What we need," declared a Sun Bear as he lapped up custard with his
long tongue," is a flavor that goes down like the Macintosh.
"Suddenly, the White Consultant began jumping up and down as his face got
red. "No, no, no! he screamed. "No one pays one fifty an hour to
"Awk," said the Frog.
"Users," explained the Sun Bear, "want an easy interface that
they will not have to learn."
"Users?" cried the Consultant in disbelief. "Users?! You mean
secretaries, accountants, architects. Manual laborers!"
"Well," responded the Sun Bear, "we've got to do something to
make them want to switch to UNIX."
"Do you think," said a Woodpecker who had been busy making a hole in
the table, "that there might be a problem with the name `UNIX?' I mean, it
does sort of suggest being less than a man."
"Maybe we should try another name, " suggested the Job Sparrow,
"like Brut, or Rambo."
"Penix," suggested a Penguin.
"Mount," said the Frog, "spawn."
Alice slapped him. "Nice?" he asked.
"But then again," suggested the Woodpecker, "what about the
Suddenly, everyone leaped up and started dashing about, waving their hands in
the air and screaming. Just as suddenly, they all sat down again.
"Now that that's settled," said the Woodpecker, "let's go back to
Everyone at the table sampled a new cup of custard. "Wrong flavor,"
they all declared as they passed the cup to the creature on their right and took
the one being offered on their left.
Totally confused, Alice got up and left. After she had been walking away, she
heard a familiar voice behind her.
"Rem," is said, "edlin."
Alice turned and saw the Frog. She smiled. "Those are queer sounding
words," she said, "but at least I know what they mean."
"Chkdsk," said the Frog.
"Alice in UNIX land" was created by Lincoln Spector TEXAS COMPUTER
CURRENTS SEPTEMBER 1989
Car break trouble
A Software Engineer, a Hardware Engineer and a Branch Manager were on
their way to a meeting. They were driving down a steep mountain road when
suddenly the brakes on their car failed. The car careened almost out of control
down the road, bouncing off the crash barriers, until it miraculously ground to
a halt scraping along the mountainside. The car's occupants, shaken but unhurt,
now had a problem: they were stuck halfway down a mountain in a car with no
brakes. What were they to do?
"I know," said the Branch Manager, "Let's have a meeting, propose
a Vision, formulate a Mission Statement, define some Goals, and by a process of
Continuous Improvement find a solution to the Critical Problems, and we can be
on our way."
"No, no," said the Hardware Engineer, "That will take far too
long, and besides, that method has never worked before. I've got my Swiss Army
knife with me, and in no time at all I can strip down the car's braking system,
isolate the fault, fix it, and we can be on our way."
"Well," said the Software Engineer, "Before we do anything, I
think we should push the car back up the road and see if it happens again."
The top ten signs that your co-worker is a computer hacker
10. You ticked him off once and your next phone bill was $20,000.
9. He's won the Publisher's Clearing House sweepstakes three years running.
8. When asked for his phone number, he gives it in hex.
7. Seems strangely calm whenever the office LAN goes down.
6. Somehow he/she gets HBO on his PC at work.
5. Mumbled, "Oh, puh-leeez" 95 times during the movie "The
4. Massive RRSP contribution made in half-cent increments.
3. Video dating profile lists "public-key encryption" among turn-ons
2. When his computer starts up, you hear, "Good Morning, Mr.
1. You hear him murmur, "Let's see you use that Visa card now, jerk."
Some possible computer bumper stickers
1. BREAKFAST.COM Halted...Cereal Port Not Responding
2. <-------- The information went data way
3. The name is Baud...James Baud.
4. BUFFERS=20 FILES=15 2nd down, 4th quarter, 5 yards to go!
5. Access denied--nah nah na nah nah!
6. C:V> Bad command or file name! Go stand in the corner.
7. Southern DOS: Y'all reckon? (Yep/Nope)
8. Backups? We don' *NEED* no steenking backups.
9. E Pluribus Modem
10. .... File not found. Should I fake it? (Y/N)
11. Ethernet (n): something used to catch the etherbunny
12. CONGRESS.SYS Corrupted: Re-boot Washington D.C (Y/N)?
13. 11th commandment - Covet not thy neighbor's Pentium.
14. Windows: Just another pane in the glass.
15. SENILE.COM found . . . Out Of Memory . . .
16. RAM disk is *not* an installation procedure.
17. Smash forehead on keyboard to continue...
18. COFFEE.EXE Missing - Insert Cup and Press Any Key
19. ASCII stupid question, get a stupid ANSI!
20. E-mail returned to sender -- insufficient voltage.
21. Error: Keyboard not attached. Press F1 to continue.
22. "640K ought to be enough for anybody." - Bill Gates, 1981
23. Press any key... no, no, no, NOT THAT ONE!
24. Press any key to continue or any other key to quit...
25. REALITY.SYS corrupted: Reboot universe? (Y/N/Q)
26. Error reading FAT record: Try the SKINNY one? (Y/N)
27. Hit any user to continue.
28. Disk Full - Press F1 to belch.
29. Backup not found: (A)bort (R)etry (P)anic
30. (A)bort, (R)etry, (G)et a beer?
Floppy disk care
By following the instructions below, you should have error-free,
long-lasting floppy disks.
- Never leave diskettes in the disk drive, as data can leak out of the disk
and corrode the inner mechanics of the drive. Diskettes should be rolled up
and stored in pencil holders.
- Diskettes should be cleaned and waxed once a week. Microscopic metal
particles can be removed by waving a powerful magnet over the surface of the
disk. Any stubborn metallic shavings can be removed with scouring powder and
soap. When waxing the diskettes, make sure the surface is even. This will
allow the diskette to spin faster, resulting in better access time.
- Do not fold diskettes unless they do not fit into the drive.
"Big" diskettes may be folded and used in "little" disk
- Never insert a diskette into the drive upside down. The data can fall off
the surface of the disk and jam the intricate mechanics of the drive.
- Diskettes cannot be backed up by running them through the xerox machine.
If your data is going to need to be backed up, simply insert two diskettes
into the drive. Whenever you update a document, the data will be written on
- Diskettes should not be inserted or removed from the drive while the red
light is flashing. Doing so could result in smeared or possibly unreadable
text. Occasionally the red light remains flashing in what is known as a
"hung" or "hooked" state. If your system is
"hooking" you will probably need to insert a few coins before
being allowed access to the slot.
- If your diskette is full and you need more storage space, remove the disk
from the drive and shake vigorously for 2 minutes. This will pack the data
enough (Data Compression) to allow for more storage. Be sure to cover all
the openings with scotch tape to prevent loss data.
- Access time can be greatly improved by cutting more holes in the diskette
jacket. This will provide more simultaneous access points to the disk.
- Diskettes may be used as coasters for beverage glasses, provided that they
are properly waxed beforehand. Be sure to wipe the diskettes dry before
using. (see item 2 above)
- Never use scissors and glue to manually edit documents. The data is stored
much too small for the naked eye, and you may end up with data from some
other document stuck in the middle of your document. Razor blades and scotch
tape may be used, however, provided the user is equipped with an electron
- Periodically spray diskettes with insecticide to prevent system bugs from
Once upon a time there was a shepherd tending his sheep at the edge of a country road.
A brand new Jeep Grand Cherokee screeches to a halt next to him. The driver, a young man dressed in a Brioni suit, Cerrutti shoes, Ray-Ban sunglasses, Jovial Swiss wrist watch and a Bhs tie gets out and asks the shepherd:
"If I guess how many sheep you have, will you give me one of them?"
The shepherd looks at the young man, then looks at the sprawling field of sheep and says: "Okay."
The young man parks the SUV, connects his notebook and wireless modem, enters a NASA site, scans the ground using his GPS, opens a database and 60 Excel tables filled with algorithms, then prints a 150 page report on his high tech mini printer. He then turns to the shepherd and says: "You have exactly 1,586 sheep here."
The shepherd answers: "That's correct, you can have your sheep."
The young man takes one of the animals and puts it in the back of his vehicle.
The shepherd looks at him and asks: "Now, if I guess your profession, will you pay me back in kind?"
The young man answers: "Sure."
The shepherd says: "You are a consultant."
"Exactly! How did you know?" asks the young man.
"Very simple," answers the shepherd, "First, you came here without being called. Second, you charged me a fee to tell me something I already knew. Third, you do not understand anything about my business and I'd really like to have my dog back."
If Operating Systems Were Airlines...
DOS Air: Passengers walk out onto the runway, grab hold of the plane, push it until it gets in the air, hop on, then jump off when it hits the ground. They grab the plane again, push it back into the air, hop on, jump off...
Mac Airways: The cashiers, flight attendants, and pilots all look the same, talk the same, and act the same. When you ask them questions about the flight, they reply that you don't want to know, don't need to know, and would you please return to your seat and watch the movie.
Windows Airlines: The terminal is neat and clean, the attendants courteous, the pilots capable. The fleet of Lear jets the carrier operates is immense. Your jet takes off without a hitch, pushes above the clouds and, at 20,000 feet, explodes without warning.
OS/2 Skyways: Everything looks very comfortable but a little bit plain. The pilots and the carrier are experts, sometimes the flight attendants are a little bit ragged but routined. There are fewer passangers so you have more place to sit. The films are good, but sometimes they are not the newest stuff. There is only first-class and you won't to have pay more for it. All together you have a nice flight and you safely arrive at your destination. Only the few Windows-Airline-Survivors in the departure-hall singing "Tomorrow we own the sky alone" are a little bit disturbing.
Fly Windows NT: Passengers carry their seats out onto the tarmac and place them in the outline of a plane. They sit down, flap their arms, and make jet swooshing sounds as if they are flying.
Unix Express: Passengers bring a piece of the airplane and a box of tools with them to the airport. They gather on the tarmac, arguing about what kind of plane they want to build. The passengers split into groups and build several different aircraft but give them all the same name. Only some passengers reach their destinations, but all of them believe they arrived.
AIR GEOS: The airlines has a diverse fleet of commuter, mid-range and even supersonic aircraft, the termanils are open and clean, with lots of complimentary services for the passangers. The rates are the lowest in the business, but still the terminals are empty because they have not had a single arr/dep for years.
cross the road in June. No, August. September for sure.
It crossed the road in style years ago, but it was so quiet that nobody noticed.
Win 95 Chicken:
You see different coloured feathers while it crosses, but cook it and it still
* Microsoft Chicken (TM):
It's already on both sides of the road. And it just bought the road.
* OOP Chicken:
It doesn't need to cross the road, it just sends a message.
* Assembler Chicken:
First it builds the road ...
* C Chicken:
It crosses the road without looking both ways.
* C++ Chicken:
The chicken wouldn't have to cross the road, you'd simply refer to him on the other side.
* VB Chicken:
* Delphi Chicken:
The chicken is dragged across the road and dropped on the other side.
* Java Chicken:
If your road needs to be crossed by a chicken, the server will download one to the other side. (Of course, those are chicklets)
* Web Chicken:
Jumps out onto the road, turns right, and just keeps on running.
* Gopher Chicken:
Tried to run, but got flattened by the Web chicken.
* Newton Chicken:
Can't cluck, can't fly, and can't lay eggs, but you can carry it across the road in your pocket!
* Cray Chicken:
Crosses faster than any other chicken, but if you don't dip it in liquid nitrogen first, it arrives on the other side fully cooked.
* Quantum Logic Chicken:
The chicken is distributed probabalistically on all sides of the road until you observe it on the side of your course.
* Lotus Chicken:
Don't you *dare* try to cross the road the same way we do!
* Mac Chicken:
No reasonable chicken owner would want a chicken to cross the road, so there's no way to tell it to.
* Al Gore Chicken:
Waiting for completion of NCI (Nation Chicken-crossing Infrastructure) and will cross as soon as it's finished, assuming he's re-elected and the Republicans don't get the program.
* Jeff Kennett Chicken:
Arranges for a consultant to divert the road behind him instead
* Moses Chicken:
And God came down from the Heavens, and He said unto the Chicken, "Thou shalt cross the road!" And the chicken crossed the road, and there was much rejoicing.
* AGENT MULDER Chicken:
You saw it cross the road with your own eyes. How many more chickens have to cross the road before you believe it?
* RICHARD M. NIXON Chicken:
The chicken did not cross the road. I repeat, the chicken did NOT cross the road.
* BILL CLINTON Chicken:
We categorically deny the chicken did cross the road and any allegations to the contrary by the right-wing extremeists should be postponed until I am out of office.
* JERRY SEINFELD Chicken:
Why does anyone cross a road? I mean, why doesn't anyone ever think to ask, "What the heck was this chicken doing walking around all over the place, anyway?"
* BILL GATES Chicken:
I have just released the new Chicken Office 2000, which will not only cross roads, but will lay eggs, file your important documents, and balance your checkbook.
* OLIVER STONE Chicken:
The question is not Why did the chicken cross the road? Rather, it is, Who was crossing the road at the same time, whom we overlooked in our haste to observe the chicken crossing?
* LOUIS FARRAKHAN Chicken:
The road, you will see, represents the black man. The chicken crossed the black man in order to trample him and keep him down!
* MARTIN LUTHER KING, JR. Chicken:
I envision a world where all chickens will be free to cross roads without having their motives called into question.
* GRANDPA Chicken:
In my day, we didn't ask why the chicken crossed the road. Someone told us that the chicken had crossed the road, and that was good enough for us.
* MACHIAVELLI Chicken:
The point is that the chicken crossed the road. Who cares why? The end of crossing the road justifies whatever motive there was.
* EINSTEIN Chicken:
Whether the chicken crossed the road or the road moved beneath the chicken depends upon your frame of reference.
* BUDDHA Chicken:
Asking this questions denies your own chicken nature.
* RALPH WALDO EMERSON Chicken:
The chicken did not cross the road; it transcended it.
* ERNEST HEMINGWAY Chicken:
To die. In the rain. Alone.
* COLONEL SANDERS Chicken:
I missed one?
* COBOL Chicken:
IF NO-MORE-VEHICLES THEN
VARYING STEPS FROM 1 BY 1 UNTIL
GO TO 0001-CHICKEN-CROSSING
* Bluebottle Chicken:
You won't start the cars going until I'm across, will you my Capitan? <Bonk> You rotten swine you! I do not like this game!
* Major Bloodnok Chicken:
Oh, it's been knocked over. Quick, get the weight of its wallet off its chest. No wonder, there were forty pounds pressing down on it!
* Neddie Seagoon Chicken:
What what what whatwhatwhatwhat? Chicken? Ha ha ha, ha ha ha! Ahem!
* Henry Crun Chicken:
* Moriarty Chicken:
Chicken crossed the road? Owwwwwwwwwwwwwww...
* Eccles Chicken:
<Bonk> How about dat?
* Greenslade Chicken:
Part 3. Chicken crossing the road. <cluck cluck> Part 4.
A mechanical, electrical and computer engineer were riding together to an
engineering seminar the car began jerking and shuttering. The mechanical
engineer, said, "I think the car has a faulty carburetor."
The electrical engineer said, "no, I think the problem lies with the
The computer engineer brightened up and said, "I know, let's stop the car,
all get out of the car and get back in again!"
quotes" contest. They were looking for people to submit quotes from their
real life Dilbert-type managers. Here are some of the submittals...
1. As of tomorrow, employees will only be able to access the building using
individual security cards. Pictures will be taken next Wednesday and employees
will receive their cards in two weeks.
(This was the winning quote from Fred Dales at Microsoft Corporation in Redmond,
2. What I need is a list of specific unknown problems we will encounter. (Lykes
3 How long is this Beta guy going to keep testing our stuff? (Programming
intern, Microsoft IIS development team)
4. E-mail is not to be used to pass on information or data. It should be used
only for company business. (Accounting manager, Electric Boat Company)
5. This project is so important, we can't let things that are more important
interfere with it. (Advertising/Marketing manager, United Parcel Service)
6. Doing it right is no excuse for not meeting the schedule. No one will believe
you solved this problem in one day! We've been working on it for months. Now, go
act busy for a few weeks and I'll let you know when it's time to tell them.
(R&D supervisor, Minnesota Mining and Manufacturing/3M Corp.)
7. My Boss spent the entire weekend retyping a 25-page proposal that only needed
corrections. She claims the disk I gave her was damaged and she couldn't edit
it. The disk I gave her was write-protected. (CIO of Dell Computers)
8. Quote from the Boss: "Teamwork is a lot of people doing what 'I'
say." (Marketing executive, Citrix Corporation)
9. "How About Friday?" My sister passed away and her funeral was
scheduled for Monday. When I told my Boss, he said she died so that I would have
to miss work on the busiest day of the year. He then asked if we could change
her burial to Friday. He said, "That would be better for me."
(Shipping executive, FTD Florists)
10. "We know that communication is a problem, but the company is not going
to discuss it with the employees." (Switching supervisor, AT&T Lone
11. We recently received a memo from senior management saying: "This is to
inform you that a memo will be issued today regarding the subject mentioned
above." (Microsoft, Legal Affairs Division)
12. One day my Boss asked me to submit a status report to him concerning a
project I was working on. I asked him if tomorrow would be soon enough. He said
"If I wanted it tomorrow, I would have waited until tomorrow to ask for
it!" (New business manager, Hallmark Greeting Cards.)
13. Speaking the Same Language: As director of communications I was asked to
prepare a memo reviewing our company's training programs and materials. In the
body of the memo one of the sentences mentioned the "pedagogical
approach" used by one of the training manuals. The day after I routed the
memo to the executive committee, I was called into the HR director's office, and
told that the executive vice president wanted me out of the building by lunch.
When I asked why, I was told that she wouldn't stand for "perverts"
(pedophilia?) working in her company. Finally he showed me her copy of the memo,
with her demand that I be fired-and the word "pedagogical" circled in
red. The HR manager was fairly reasonable, and once he looked the word up in his
dictionary, and made a copy of the definition to send back to her, he told me
not to worry. He would take care of it. Two days later a memo to the entire
staff came out - directing us that no words which could not be found in the
local Sunday newspaper could be used in company memos. A month later, I
resigned. In accordance with company policy, I created my resignation memo by
pasting words together from the Sunday paper. (Taco Bell Corporation)
14. This gem is the closing paragraph of a nationally-circulated memo from a
large communications company: "(Company name) is endeavorily determined to
promote constant attention on current procedures of transacting business
focusing emphasis on innovative ways to better, if not supersede, the
expectations of quality!" (Lucent Technologies)
If Dr. Seuss was a Technical Writer? Here's an easy game to play.
Here's an easy thing to say:
If a packet hits a pocket on a socket on a port, And the bus is interrupted as a
very last resort, And the address of the memory makes your floppy disk abort,
Then the socket packet pocket has an error to report!
If your cursor finds a menu item followed by a dash, And the double-clicking
icon puts your window in the trash, And your data is corrupted 'cause the index
doesn't hash, Then your situation's hopeless, and your system's gonna crash!
You can't say this?
What a shame sir!
We'll find you Another game sir.
If the label on the cable on the table at your house, Says the network is
connected to the button on your mouse, But your packets want to tunnel on
another protocol, That's repeatedly rejected by the printer down the hall.
And your screen is all distorted by the side effects of gauss So your icons in
the window are as wavy as a souse, Then you may as well reboot and go out with a
bang, 'Cause as sure as I'm a poet, the sucker's gonna hang!
When the copy of your floppy's getting sloppy on the disk, And the microcode
instructions cause unnecessary risk, Then you have to flash your memory and
you'll want to RAM your ROM. Quickly turn off the computer and be sure to tell
A manager in a big company needed to contact one of his
employees about an urgent problem with one of the main computers. He dialed the
employee's home phone number and was greeted with a child's whispered voice on
the first ring, "Hello?"
"Is your Daddy home?" the boss quickly asked. "Yes",
whispered the small voice. May I talk with him?" the man asked, feeling
somewhat put-off by this delay. To the surprise of the boss, the small voice
Wanting to talk with an adult, the boss asked, "Is your Mommy there?"
"Yes", came the answer. "May I talk with her?" Again the
small voice whispered, "No."
"Son, is there any one there besides you?" the boss impatiently asked
the child. "Yes", whispered the child, "A policeman."
Wondering what a cop would be doing at his employee's home, the boss asked,
"May I speak with the policeman?" "No, he's busy", whispered
the child. "Busy doing what?" asked the boss. "Talking to Daddy
and Mommy and the Fireman", came the whispered answer.
Growing concerned and even worried as he heard what sounded like a helicopter
through the ear piece on the phone the boss asked, "What is that
noise?" "A hello-copper.", answered the whispering voice.
"What is going on there?" asked the boss, now alarmed. In an awed
voice the child answered, "The police just landed the hello-copper!"
Alarmed, concerned and more than just a little frustrated the boss asked,
"Why are they there?"
After a muffled giggle, the young voice replied in a very low whisper,
"They're looking for me!"
Technology for Country Folk
a wood stove hot
much wood on fire
an eye on the wood stove
the farwood off'n the truck
yer not keerfull gitten the farwood
git from tryin to tote too much farwood
thar thang what splits the farwood
home in the winter time
to shut when its cold outside
to shut when its black fly season
dem dang flys do
fer the TV
in the bottom of the munchie bag
do to the hay fields
Dan Matrix's wife
the kitty sleeps
you hang the dang truck keys
dang plastic forks and knifes
eats the grain in the barn
hippie talk fer where the mouse lives
up the barn roof
talk fer "C'Mon in y'all"
you hear when you cock yer gun
you cock the double barrel
you have to do right before bedtime, when you have to go to the outhouse