Input Jokes
Funny Jokes
CAT v.6.1b: Completely Autonomous Tester, Manufactured by MOMCAT
User Installation and Maintenance Documentation:
Features:
User Friendly
Low Power CPU
Self Portable Operation
Dual Video and Audio Input
Audio Output
Auto Search Capability for Input Data
Auto Search for Output Bin
Auto Learn Program in ROM
Instant Transition To Energy Saving Standby Mode When Not In Use
Wide Operating Temperature Range
Mouse Driven
Self Cleaning
Production Details:
After basic KIT construction, the unit undergoes six weeks of
onsite ROM programming and burn-in testing. Listed features are
installed during this period. Since MOMCAT uses local suppliers,
there may be a variation between individual units. Some of the
units may not meet general standards. MOMCAT's quality assurance
may reject inferior units. Users may sometimes salvage rejected
units. Beware of Far East clones. These may violate more...When I went to college in the 1980's, I heard a lot of words like "data input" and "beta version." They confused me. I wanted desperately to know what people were talking about, what Big Secret resided in the computer industry.
Now that I've worked in a computer company for the last few years, I've gained an insider's perspective. I decided to share my knowledge with the uninitiated by creating the following brief, handy glossary:
Alpha. Software undergoes alpha testing as a first step in getting user feedback. Alpha is Latin for "doesn't work."
Beta. Software undergoes beta testing shortly before it's released. Beta is Latin for "still doesn't work."
Computer. Instrument of torture. The first computer was invented by Roger "Duffy" Billingsly, a British scientist. In a plot to overthrow Adolf Hitler, Duffy disguised himself as a German ally and offered his invention as a gift to the surly dictator. The plot worked. On more...While we believe we will be fully Y2K compliant by January 1, 2000, and most of our subsidiary units and contractors claim they will also be fully compliant, we obviously need to make some preparations in case unexpected challenges impair our ability to meet the needs of our customers.
Enclosed with this memo is a "Y2K Backup System" device designed to meet short time emergency needs in case of a computer operations failure, or operational delay. This device is the company's Primary Emergency Network Computer Interface Liaison device (P. E. N. C. I. L.).
This device has been field tested extensively, including certification testing, as well as volume and stress testing. Properly maintained, the device meets all the requirements for coding and data input. Prior to use, the (P. E. N. C. I. L.) will require preparation and testing. Tools and supplies required will be: A sharpened knife or grinding device; and a supply of computer paper (with or without more...While we believe we will be fully Y2K compliant by January 1, 2000, and most of our subsidiary units and contractors claim they will also be fully compliant, we obviously need to make some preparations in case unexpected challenges impair our ability to meet the needs of our customers.
Enclosed with this memo is a "Y2K Backup System" device designed to meet short time emergency needs in case of a computer operations failure, or operational delay. This device is the company's Primary Emergency Network Computer Interface Liaison device (P.E.N.C.I.L.).
This device has been field tested extensively, including certification testing, as well as volume and stress testing. Properly maintained, the device meets all the requirements for coding and data input. Prior to use, the (P.E.N.C.I.L.) will require preparation and testing. Tools and supplies required will be: A sharpened knife or grinding device;and a supply of computer paper (with or without holes).
Gripping the more...Those vexatious software companies.
We all know about them. Their software products range from user friendly software to the truly inimical software. Most people would tell you that the majority of software fall in to the latter category. Why?, One might ask. Well, it's just the way it is. To elaborate my point, I present you with the following "Important Notice" I found on the back side of a certain software package.
Important Notice to the purchaser.
The purchaser of this package, hereinafter referred to as the goose punter, is requested to read the under mentioned notice, and on opening and breaking the seal of this package, shall be deemed to have agreed to the following terms.
The goose punter undertakes to use the software on one computer only, and not to duplicate the software on to other computers whether owned by the goose punter or not.
The goose punter also undertakes not to complain about the ridiculously complicated copy more...- Add a Useful Link
External Links
Recent Activity