Favourite quotes

These are a collection of quotes coming from the various books I read, movies (and even TV shows) I watched... Basically, a collection of ideas (or formulations) that either cracked me up or made me think. I hope you'll enjoy them as much as I do.

Please note that most (if not all) of these sentences/excerpts are copyrighted by their respective authors. I try not to put more than what is needed to keep the entry relevant. For that reason, should the quotation be shortened, the original context will not be altered. If you are the author of one of the following quotes, and you want it to be removed, please contact me.

You thought, huh?
Yeah - Well that didn't really work out too well for you... did it?

Ben Stiller (as Tommy)
Friends, The One With The Screamer

Knowledge is a tricky thing.

Matt LeBlanc (as Joey)
Friends, The One With Mrs Bing

But, as the philosopher Jagger once said, "you can't always get what you want".

Hugh Laurie (as Dr House)
House, MD, Pilot

That guy couldn't get any dumber if he cut his head off!

Dr Phil McGraw
The Jay Leno Show, October 26th, 2009

Perhaps the most significant drawback of routers is [...]. Also, there are two different ways to pronounce the word "router", either as "rootor" or "rowter", and people waste a lot of time arguing over the proper pronounciation.

James F. Kurose, Keith W. Ross
Computer Networking: A Top-Down Approach, 4th ed.

The SNR is typically measured in units of decibels (dB), a unit of measure that some think is used by electrical engineers primarily to confuse computer scientists.

James F. Kurose, Keith W. Ross
Computer Networking: A Top-Down Approach, 4th ed.

A node is able to explicitly alternate between sleep and wake states (not unlike a sleepy student in a classroom!)

James F. Kurose, Keith W. Ross
Computer Networking: A Top-Down Approach, 4th ed.

RSA Laboratories recommends that the product of p and q be on the order of 1024 bits for corporate use and 768 bits for use with "less valuable information" (which leads to wonder why corporate use is deemed so much more important than other use!)

James F. Kurose, Keith W. Ross
Computer Networking: A Top-Down Approach, 4th ed.

Sometimes there is a gap between theory and practice. The gap between theory and practice in theory is not as large as the gap between theory and practice in practice.

Random numbers should not be generated with a method chosen at random.

Donald Knuth

We do not use the term "hacker" to describe the vandals that break into computer systems. These criminals call themselves hackers, and that is how they got the name. But they do not deserve the name. True hackers are master programmers, incorruptibly honnest, unmotivated by money, and careful not to harm anyone. The criminals termed "hackers" are not brilliant and accomplished. It is really too bad that they not only steal money, people's time, and worse, but they've also stolen a beautiful word that had been used to describe some remarkable and wonderful people.

Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: PRIVATE Communication In A PUBLIC World, 2nd ed.

Kt is a constant, but it varies according to which word you're on (do you like the idea of a variable constant?).

Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: PRIVATE Communication In A PUBLIC World, 2nd ed.

The chapter requires no more background other than intellectual curiosity, a vague remembrance of high school algebra, a certain amount of trust that it will all be understandable with just a little bit of thought, and a resonable night's sleep in the recent past.

Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: PRIVATE Communication In A PUBLIC World, 2nd ed.

A proper password is like pornography. You can't tell what it is, but you know it when you see one.

Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: PRIVATE Communication In A PUBLIC World, 2nd ed.

IP was designed with 32-bit addresses, and many people started to realize in the mid-1980s that 32 bits was too few. There were other layer 3 protocols deployed at the time with adequate address space, and the IETF could have adopted one of those. In fact, in 1992, the IAB recommended replacing IP with the CLNP packet format, a format that was very similar to IP, but had larger addresses. CLNP had been standardized by ISO and implemented by most of the vendors.

If the IETF had adopted CLNP in 1992, most likely at this point the Internet would be better off than it is now, but certain very vocal IETF members wanted to invent their own header format.

Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: PRIVATE Communication In A PUBLIC World, 2nd ed.

At one of the final IETF meetings before AH and ESP were finalized, someone from Microsoft got up and gave an impassioned speech about how AH was useless given the existence of ESP, cluttered up the spec, and couldn't be implemented efficiently. Our impression of what happend next was that everyone in the room looked around at each other and said "Hmm. He's right, and we hate AH also, but if it annoys Microsoft, let's leave it in, since we hate Microsoft more than we hate AH."

Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: PRIVATE Communication In A PUBLIC World, 2nd ed.

If privacy is outlawed, only outlaws will have privacy.

Phil Zimmermann

Until a few years ago, you could connect to the Internet and be in contact with hundreds of millions of other nodes, without giving even a thought to security. The Internet in the '90's was like sex in the '60's. It was great while it lasted, but it was inherently unhealthy and was destined to end badly. I'm just glad I didn't miss out this time.

Charlie Kaufman

(Talking about firewalls)

During Stone Age, everyone knew everyone else in the same cave. There was no need for security. In the Middle Ages, they lived in castles or villages surrounded by town walls. History has shown that these security models don't work.

The Internet has entered the Middle Ages.

Guy Leduc

Dans tous les domaines, il est plus facile de reconnaître la beauté que de la définir. Le plus souvent, ce qui nous fait penser que quelque chose est beau est un ensemble de caractéristiques dont chacune est relativement insignifiante, mais qui se complètent et s'intègrent harmonieusement.

Pierre Wolper
Introduction à la Calculabilité, 3e ed.

A mathematician is a machine for turning coffee into theorems.

Alfréd Rényi

Some networks have their peering policies set in stone. Trying to get them to peer when you don't meet the criteria listed in the policy is like trying to teach a pig to sing: it wastes your time and annoys the pig. (Referring to intended peering partners as "pigs" doesn't help, either.)

Iljitsch van Beijnum
BGP

There are two ways of constructing a software design. One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult.

Charles Antony Richard Hoare

Axiom 1: Computers are machines which execute instructions. If someone is not telling the computer what to do, it does nothing.

Most people have had some experience with computers, and immediately they will read this statement and say: "Hey, I have had my computer do all kinds of things that I didn't want!".

George Em Karniadakis, Robert M. Kirby II
Parallel Scientific Computing in C++ and MPI: A Seamless Approach to Parallel Algorithms and their Implementation

When I use a word, it means just what I choose it to mean - neither more nor less.

Humpty Dumpty
Through the Looking Glass

There's no sense in being precise when you don't even know what you're talking about.

John von Neumann

Copy from one, it's plagiarism; copy from two, it's research.

Wilson Mizner

Household tasks are easier and quicker when they are done by somebody else.

James Thorpe

Understand 'free' in 'free software' as 'free' in 'freedom of speech'; not as 'free' in 'free beer'!

Richard Stallman

Complexity can also interfere with success of a backup system. Another piece of folk wisdom is that the more elaborate the backup system, the less likely that it actually works.

Principles of Computer System Design: An Introduction
Jerome H. Saltzer, M. Frans Kaashoek

Last modified: Sunday, January 05, 2014, 00:53:50 (Europe/Brussels).

stopsoftwarepatents.eu petition banner