Linux Cookie: 112 of 1140 |
Don't tell me how hard you work. Tell me how much you get done.
-- James J. Ling
|
|
|
Linux Cookie: 113 of 1140 |
One friend in a lifetime is much; two are many; three are hardly possible.
Friendship needs a certain parallelism of life, a community of thought,
a rivalry of aim. -- Henry Brook Adams
|
|
|
Linux Cookie: 114 of 1140 |
Remember thee
Ay, thou poor ghost while memory holds a seat
In this distracted globe. Remember thee!
Yea, from the table of my memory
I'll wipe away all trivial fond records,
All saws of books, all forms, all pressures past,
That youth and observation copied there.
Hamlet, I : v : 95 William Shakespeare
|
|
|
Linux Cookie: 115 of 1140 |
Obviously, a man's judgement cannot be better than the information on which he
has based it. Give him the truth and he may still go wrong when he has
the chance to be right, but give him no news or present him only with distorted
and incomplete data, with ignorant, sloppy or biased reporting, with propaganda
and deliberate falsehoods, and you destroy his whole reasoning processes, and
make him something less than a man.
-- Arthur Hays Sulzberger
|
|
|
Linux Cookie: 116 of 1140 |
Each honest calling, each walk of life, has its own elite, its own aristocracy
based on excellence of performance. -- James Bryant Conant
|
|
|
Linux Cookie: 117 of 1140 |
You can observe a lot just by watching. -- Yogi Berra
|
|
|
Linux Cookie: 118 of 1140 |
If the presence of electricity can be made visible in any part of a circuit, I
see no reason why intelligence may not be transmitted instantaneously by
electricity. -- Samuel F. B. Morse
|
|
|
Linux Cookie: 119 of 1140 |
"Mr. Watson, come here, I want you." -- Alexander Graham Bell
|
|
|
Linux Cookie: 120 of 1140 |
It's currently a problem of access to gigabits through punybaud.
-- J. C. R. Licklider
|
|
|
Linux Cookie: 121 of 1140 |
It is important to note that probably no large operating system using current
design technology can withstand a determined and well-coordinated attack,
and that most such documented penetrations have been remarkably easy.
-- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System",
Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20
|
|