Published at: 08:04 pm - Friday April 08 2011
The so-called “progress” of personal computing has largely been a collective hallucination. And it appears that I am not the only one who understands this: “A friend of mine recently gave me an old HP 35 calculator. For a geek like me, a true HP calculator is a kingly gift. I cleaned off some grime […]
Published at: 05:03 pm - Friday March 04 2011
I believe that Apple manufactures and sells junk and crapware. If you, my dear reader, have even a rudimentary awareness of what is possible with regards to personal computing – or even of what was possible two decades ago – the above should seem obvious to you. Hopefully the idiots who accused me of kissing […]
Published at: 01:01 pm - Tuesday January 18 2011
Computer users are forever being misled, successfully lied to, sold “old wine in new bottles,” bamboozled in a myriad ways large and small. Why? Simply because we are, to use the technical term, suckers. Not always as individuals, but certainly collectively. The defining attribute of the sucker is, of course, an inability to learn from […]
Published at: 03:09 pm - Thursday September 30 2010
Is there a ballpoint pen in your pocket? How fast is it? What do you mean, you don’t know? You didn’t ask the salesman? There is indeed a maximum speed at which the little ball in the pen can roll and still leave a satisfactory trace of ink upon the page. Would you pay extra […]
Published at: 05:08 pm - Thursday August 26 2010
My apologies to all readers who were inconvenienced by the multi-page layout. All of the Laws, slightly re-worded [1], are here once more. To view the original pages, click on the numerals. A sanely designed personal computer system: I – Obeys operator The operator shall retain full control of the machine at all times. In […]
Published at: 08:08 pm - Tuesday August 24 2010
The machine shall never tell a lie to the user/programmer. [1] It shall obey all orders given to it through the human interface devices, without attempting to pass judgement on their legality or morality. The machine shall not put the interests of any third party (including society in the abstract) above those of its user/programmer. […]
Published at: 07:08 pm - Tuesday August 24 2010
All of the information contained inside the machine’s storage array (see the Third Law), whether executable or not, shall be accessible at all times for inspection and modification by the user/programmer, in the form preferred for modification. The user/programmer shall have the ability to modify the functionality of any executable code within the system without […]
Published at: 07:08 pm - Tuesday August 24 2010
If the machine encounters an error condition requiring the user’s manual intervention, the state of the now-halted process prior to this event shall be preserved, and the user given an opportunity to correct the error using an interactive debugger and resume execution from the saved-and-corrected state. The debugger shall display the code which generated the […]
Published at: 07:08 pm - Tuesday August 24 2010
Compilation is to be considered a form of caching, and thus shall happen solely behind the scenes, like all other forms of caching. (See: the Third Law.) The machine is to accept no externally-introduced executable code except in the form preferred for making modifications (i.e. source.) All executable code visible during any kind of debugging […]
Published at: 04:08 pm - Tuesday August 24 2010
Volatile storage devices (i.e. RAM) shall serve exclusively as read/write cache for non-volatile storage devices. From the perspective of all software except for the operating system, the machine must present a single address space which can be considered non-volatile. No computer system obeys this law which takes longer to fully recover its state from a […]