Products
At some point, there has to be an end to the stupid "Connection reset by peer"
Particularly talented coders are not satisfied with writing their own code, but also try to analyze other programs and hardware, e.g. to write driv...
View full detailsWhether through portals or with the help of a flying saucer through the vastness of the universe, with Rick Sanchez at your side you usually end up...
View full detailsAn answer for all DAU questions... Now it doesn't even cost you the effort to open your mouth about something like this.If anyone doesn't know (and...
View full detailsIf genre legends Run DMC are to be believed, the same applies to hip-hop as to computer science: [i]It's tricky[/i]! While the trio Run, DMC and Ja...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsThe security principle "[i]Security by Obscurity[/i]" from the field of computer and network security is based on the assumption that a system cann...
View full detailsThere was little competition for the NES among 16-bit games consoles, but the Sega Mega Drive was definitely one of them. It ran iconic classic gam...
View full detailsWithout words
Uh Oh...You wouldn't want to be the admin of the database...
To be, or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We always knew that coders are lyricists. If Shakespea...
View full detailsFor the code monkeys among you ;-)
It is surprisingly easy to hack into other computer systems, often a simple phone call does the trick: "Hello, I am your system administrator. I ne...
View full detailsThis quote from Linus hits the nail on the head :)
Sometimes all it takes is four little boys from Colorado to brighten up even the gloomiest working day. With the Southpark XL mouse pad, you can br...
View full detailsImagine developing a model that enables different technical systems to communicate and that simplifies this communication enormously through clearl...
View full detailsThe (almost exclusively jokingly used) eighth layer of the OSI model for network protocols is a nice way of saying that the problem lies with the p...
View full detailsTranslated into "normal language", the T-shirt text would mean something like "Please stay at home. Don't broadcast /connect with everyone". So: "P...
View full detailsSome things are better left to the professionals. This also applies to "just pulling the plug for a moment". So never - NEVER - enter the server ro...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice early.), on the other ...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting as a child (keyword: practice early), on the other hand,...
View full detailsACK is written on the back. SYN/ACK are the "commands" that the TCP/IP protocol uses for each connection setup. More about this here, for example: ...
View full detailsMechanical keyboards are outstanding writing instruments. The typing experience on a Das Keyboard, a Filco or a Leopold is incomparable: fast, ligh...
View full detailsMechanical keyboards are outstanding writing instruments. The typing experience on a Das Keyboard, a Filco or a Leopold is incomparable: fast, ligh...
View full detailsIt's the weekend - or late at night - you're gaming, binging or dozing. Suddenly your cell phone rings. That can only mean one thing: your mother i...
View full detailsUnit tests are for beginners, test environments are overrated and the last deploy was... adventurous? Then Test in Production is exactly your style...
View full detailsEver since Bill Gates' famous saying about lazy people, we have known that good computer scientists are characterized by their ability to achieve t...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
When the work is done, everything runs as you imagine it. So much for the theory of programming...When you have to change the code in a few months'...
View full detailsOn January 19 of the year 2038 at exactly 3:14:07 (GMT), the variable that stores the Unix time will overflow!Unix systems store the time as a numb...
View full detailsWhat sounds like a joke to today's generation was once an absolute revolution: a data carrier made of cardboard that is inserted into a drive. 80 k...
View full detailsIf you don't know what this saying is supposed to mean, you belong to the other half ;-) But if you are smiling right now, maybe you should think a...
View full detailstake a close look!Bugs are even becoming more common on T-shirts. The getDigital T-shirts are of course all out of the beta phase ;)
[i]"Do you have too little storage space on your computer? Are vacation photos and old text documents cluttering up your hard drive? Then simply mo...
View full detailsHome is still the best place to be. Who likes sitting at other people's computers where nothing is set up the way it should be ;)
A progress bar for thought processes would be really useful. It would let everyone involved know when it's okay to get another cup of coffee and wh...
View full details