Gifts for computer scientists
Gift ideas for computer scientists
This is where creativity is at a premium for many people. ;) Unfortunately, it is becoming more and more common for people to need gifts that appeal to lovers of ones and zeros. Be it because relatives or friends are IT administrators, programmers or something else in the IT industry, or because SysAdmin Day is approaching - sometimes you just need something suitable for IT people. In our Geek Shop, IT people are some... Mehr anzeigen of our favorite customers and that is why we have a large selection of IT gadgets and other items that they are guaranteed to be happy about and that also make great gifts.Penguins are cool, pretty goofy and probably the only birds in the world who forgot to be birds. No other animal looks funnier waddling in the snow...
View full detailsThis year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsTo understand recursion, you first have to understand recursion.
In 1989, Phil Katz thought that you could really make money with compression. He was not entirely wrong, because the invention of the ZIP format ma...
View full detailsEin Sysadmin schläft nicht
Blechschild Kein Backup - Kein Mitleid
Anyone who's ever developed a program knows that just because it works on one person's computer, doesn't means it works on another! Given the almos...
View full detailsThe word hacker in Japanese on a shirt. The characters are pronounced "hakka" (with a small pause between the k, i.e. "hak (pause) ka").
You may say you're a rather reserved person. But that doesn't stop you from attracting attention from friends and colleagues with fascinating gadge...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
Let me consider this briefly...............well, NO !Do you always need a bit of time to come up with an appropriate answer when someone else is as...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsWhen programmers have worked too long on a project, or when you ask them how the code they worked on actually functions, their favorite answer will...
View full detailsIn the bible, the Four Horsemen are the personifications of war, hunger, pestilence and death. But even those who don’t believe in the Christian ve...
View full detailsOne does not simply explain a joke. Explaining jokes kills the fun. So, how do we write an entertaining product text about a Using Cookies Cookie B...
View full detailsHome is still the best place to be. Who likes to sit at other people's computers where nothing is set up the way it should be ;)
The back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.
Look again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
As a nerd, one needs to be careful. One small mishap, one mistake and the whole disguise of a friendly and harmless computer guy can come crumbling...
View full detailsAt times, we reach the point where our brain just refuses to function properly and even the simplest tasks are impossible to complete. Most program...
View full details"Too many cooks spoil the broth!" - a principle that not only applies in the kitchen but also the world of IT. When it comes to identifying former ...
View full detailsOf course, table-based layouts are evil and should be avoided. But when you test the CSS layout you've painstakingly created for Firefox with Inter...
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsImagine that you’ve just created a model that allows different technical systems to communicate with each other and that features different layers ...
View full detailsA progress bar for human thinking processes could be pretty useful, don't you think? Everyone would know whether there's enough time to go get a cu...
View full detailsWhen it's done, it's done and everything will run the way you expect it to run. Well, in theory...In a couple of months, you might have to make som...
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsAll users of a unix-like operating systems (Linux, Mac, BSD, etc) should know what a fork bomb is. A fork bomb is a program which creates so many c...
View full detailsIf you ever meet a colour-blind robot, it will be useful to have the hex code the same colour of your shirt written on it :)The writing #000000 is ...
View full detailsWhy don't we use the binary system in elementary school? Learning just two numbers would make a lot of things easier and it would also be easier to...
View full detailsTo be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsLinux - The choice of the GNU generation
For the code monkeys among you ;-)
An answer to every single newbee question... Now you do not even have to make the effort to open your mouth!For those who do not know (and are afra...
View full details"Hey, you're working with computers, right? Can you take a look at my laptop? Internet Explorer is extremely slow and this moose keeps asking for m...
View full details