Computer science shirts and computer science articles
At times, we reach the point where our brain just refuses to function properly and even the simplest tasks are impossible to complete. Most program...
View full detailsThis game is probably not for the full-grown programmers of this world, but certainly something for their children or for pupils who are allowed to...
View full detailsMechanical keyboards are usually a double-edged sword for Mac users, as they often only have the labeling for the PC. Not so the MacTigr keyboard, ...
View full detailsAnyone who's ever developed a program knows that just because it works on one person's computer, doesn't means it works on another! Given the almos...
View full detailsLook again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
In the Bible, the four horsemen are the messengers of the Apocalypse. Nowadays, they are often (simplified) referred to as war, famine, disease and...
View full detailsWhen the work is done, everything runs as you imagine it. So much for the theory of programming...When you have to change the code in a few months'...
View full detailsAn answer to every single newbee question... Now you do not even have to make the effort to open your mouth!For those who do not know (and are afra...
View full detailsAs a nerd, you always have to be careful in public that nobody can see behind the façade of the friendly and harmless technology fan. Because as so...
View full detailsWith this sticker on your computer, you can make it absolutely clear, e.g. at a LAN party, that people should keep their hands off your computer......
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsThe word 'hacker' in Japanese, on a T-shirt. The characters are pronounced "hakka" (with a short pause between the k: "hak...
View full detailsWhen navigating through the sheer endless expanse of the local network, inexperienced users must be careful not to lose track of the assigned IP ad...
View full detailsWhen it comes to choosing a keyboard that meets the highest demands for typing, coding and gaming at the same time, sooner or later you will end up...
View full details"Too many cooks spoil the broth!" - a principle that not only applies in the kitchen but also the world of IT. When it comes to identifying former ...
View full detailsWe've all been there: you're in a hurry, throw on your jacket and quickly want to grab your keys when you leave the house. Unfortunately, it's nowh...
View full detailsAll users of a unix-like operating systems (Linux, Mac, BSD, etc) should know what a fork bomb is. A fork bomb is a program which creates so many c...
View full detailsIsn't it a good feeling to have power over hardware users? Of course, backups don't help against a real admin, but users won't reali...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsWe really don't know what evolution was thinking with zebras! Ok, maybe the stripes help against flies, in the heat or confuse predators. But let's...
View full detailsFirst of all, what is MaKey MaKey and what can it do?MaKey MaKey (Make + Key), a Kickstarter project, is a kit that contains all the necessary comp...
View full details"Hey, you're studying computer science, physics or something. Can you take a look at my computer? Internet Explorer is suddenly so slow and the nic...
View full detailsWho knew that two small words could make a seasoned programmer sweat and shiver in fear? Simply utter "syntax error" to reduce anyone who works in ...
View full detailsLet's be honest: anyone who needs additional explanations besides the code wouldn't understand your explanations anyway. The next time someone asks...
View full detailsFortunately, overloaded keyboards with dozens of extra buttons that you will never actually use are (almost) a thing of the past! Instead, the tren...
View full details[i]pi[/i] * thumb = 42-thumb = 42/[i]pi[/i]-thumb = ~13.3742 is the answer to everything, as we know – life, the universe and everything. And, as ...
View full detailsTo be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsWhen a German-speaking person reads these two words, a relaxed feeling automatically sets in. One thinks of good air, healing springs, and absolute...
View full detailsIf there's going to be chaos on your desk, at least it should be in style! Inspired by one of the most famous works of Japanese art, The Great Mat ...
View full detailsWho tells us what is right and what is wrong? Or, maybe, right is not right, and wrong is right!? Maybe it's a matter of opinion?
At times, one can get the impression that in many software companies, one department does not know what the other is doing and vice versa. For exam...
View full detailsGiven that the binary system is widely used in IT (and thus in most parts of our lives), surprisingly few people actually understand the combinatio...
View full detailsAnyone who spends a lot of time at the computer knows how important it is to optimize their working and gaming environment. This also includes a pa...
View full detailsSure, table based layouts should be avoided at all costs, but, if you ever make a layout for Firefox which took several hours of hard work and trie...
View full detailsSometimes it's astonishingly easy to hack into other computer systems. Just pick up your phone and say: "Hi. This is your system administ...
View full details