Geek Clothing: Nerd Shirts & Geek Shirts
Nobody likes to fix the mistakes another person has made due to incompetence, laziness or simply by accident. But when you yourself are that person...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsSo, you're looking for a really distinguished-looking watch for your wrist, right? But you find all those analogue watches just soooo boring? Maybe...
View full detailsAs we all know, hindsight is 20/20. This universally applicable wisdom can also be used to describe informatics, especially debugging (i.e. testing...
View full detailsDid you know that you can make a lot of money with compression? And we’re not talking about the inventors of WinRAR (who are most likely still wait...
View full detailsAs we all know, silent waters run deep. While software development does not exactly have anything to do with water, the basic principle of the sayi...
View full detailsWe can all agree that it can be pretty hard keeping up with all the latest social customs. One minute you shake a person's hand when you meet them,...
View full detailsDeath, War, Pestilence and Hunger - one does not need to be familiar with the works of Albrecht Dürer to recognize this unholy quartet: The Four Ho...
View full detailsFor those of you who have comments regarding a source code: It was hard to write - it was meant to be hard to understand..
If one were to believe the genre legends Run DMC, hip-hop really does have one thing in common with informatics: It's tricky! While the trio of Run...
View full details"Is your computer running low on disk space? Are old holiday pictures and text documents clogging your hard drive? Then simply put everything into ...
View full detailsThe good ol'’ floppy disk!How we loved you when you were our go-to portable, long-term memory solution. We shared so many happy years…!Not tha...
View full detailsRemember way back... when to be able to load programmes and games on a C64, you had to type in a special command first? For the sake of nostalgia, ...
View full detailsIsn't it amazing what the human brain is capable of? Not only has it secured us our place at the top of the food chain, it can also adapt extremely...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice makes perfect), and on...
View full detailsAnyone who has ever worked in IT support will know what the following situation is like: "Can you help me? My computer crashed and I can't get to a...
View full detailsMany people see administrators as a kind of Matrix god. They sit in front of computers, typing away like mad in completely unspectacular looking te...
View full detailsTurns out that most nerds do actually care about nature and know a lot about the evil “outside world”. So much so that even parts of the Unix archi...
View full detailsImagine arriving at the office, sitting down at your desk in order to do all the important bug fixes , whilst sipping your coffee... when all of t...
View full detailsThere are a few unwritten rules everybody in IT should always follow. And trust us, if you decide to ignore these rules, you definitely won't want ...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsPenguins are cool, pretty goofy and probably the only birds in the world who forgot to be birds. No other animal looks funnier waddling in the snow...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsTo understand recursion, you first have to understand recursion.
Ein Sysadmin schläft nicht
Anyone who's ever developed a program knows that just because it works on one person's computer, doesn't means it works on another! Given the almos...
View full detailsThe (almost exclusively jokingly used) eighth layer of the OSI model for network protocols is a nice way of saying that the problem lies with the p...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
The word hacker in Japanese on a shirt. The characters are pronounced "hakka" (with a small pause between the k, i.e. "hak (pause) ka").
When programmers have worked too long on a project, or when you ask them how the code they worked on actually functions, their favorite answer will...
View full detailsLet me consider this briefly...............well, NO !Do you always need a bit of time to come up with an appropriate answer when someone else is as...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsHome is still the best place to be. Who likes to sit at other people's computers where nothing is set up the way it should be ;)
Sometimes you just need a little longer to sort out your thoughts. Just point to the button and finish thinking. That way everyone knows and you ha...
View full detailsOf course, table-based layouts are evil and should be avoided. But when you test the CSS layout you've painstakingly created for Firefox with Inter...
View full detailsThe back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.