Gifts for computer scientists
Gift ideas for computer scientists
This is where creativity is at a premium for many people. ;) Unfortunately, it is becoming more and more common for people to need gifts that appeal to lovers of ones and zeros. Be it because relatives or friends are IT administrators, programmers or something else in the IT industry, or because SysAdmin Day is approaching - sometimes you just need something suitable for IT people. In our Geek Shop, IT people are some... Mehr anzeigen of our favorite customers and that is why we have a large selection of IT gadgets and other items that they are guaranteed to be happy about and that also make great gifts.To understand recursion, you first have to understand recursion.
Programmers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsBlechschild Kein Backup - Kein Mitleid
This year's line-up of the Hacken Open Air is probably the best one ever: The headliners sudo's Priest and Gnutallica will set the Black Hat Stage ...
View full detailsYou may say you're a rather reserved person. But that doesn't stop you from attracting attention from friends and colleagues with fascinating gadge...
View full detailsThis product is only available in German.
In 1989, Phil Katz thought that you could really make money with compression. He was not entirely wrong, because the invention of the ZIP format ma...
View full detailsAnyone who's ever developed a program knows that just because it works on one person's computer, doesn't means it works on another! Given the almos...
View full detailsLet me consider this briefly...............well, NO !Do you always need a bit of time to come up with an appropriate answer when someone else is as...
View full detailsHome is still the best place to be. Who likes to sit at other people's computers where nothing is set up the way it should be ;)
Ein Sysadmin schläft nicht
"Too many cooks spoil the broth!" - a principle that not only applies in the kitchen but also the world of IT. When it comes to identifying former ...
View full detailsWhen programmers have worked too long on a project, or when you ask them how the code they worked on actually functions, their favorite answer will...
View full detailsThe back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.
In the bible, the Four Horsemen are the personifications of war, hunger, pestilence and death. But even those who don’t believe in the Christian ve...
View full detailsWhen trying out a new programming language, the words Hello, world are likely to be the first two that are entered for a short test to check what...
View full detailsAt times, we reach the point where our brain just refuses to function properly and even the simplest tasks are impossible to complete. Most program...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
All users of a unix-like operating systems (Linux, Mac, BSD, etc) should know what a fork bomb is. A fork bomb is a program which creates so many c...
View full detailsOf course, table-based layouts are evil and should be avoided. But when you test the CSS layout you've painstakingly created for Firefox with Inter...
View full detailsThe word hacker in Japanese on a shirt. The characters are pronounced "hakka" (with a small pause between the k, i.e. "hak (pause) ka").
Look again!Even on t-shirts, the number of bugs increases by the day. All getDigital t-shirts are of course way past the beta phase ;)
As a nerd, one needs to be careful. One small mishap, one mistake and the whole disguise of a friendly and harmless computer guy can come crumbling...
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsOn January 19, 2038, exactly on 03:14:07 (GMT) the 32-bit Unix time variable will be completely filled!Unix-like systems store the time as the numb...
View full detailsAre HEX-Numbers part of your everyday life? Then you should understand the subtle message of this t.shirt without problems. In any other case, just...
View full detailsFor the code monkeys among you ;-)
Isn't it amazing what the human brain is capable of? Not only has it secured us our place at the top of the food chain, it can also adapt extremely...
View full detailsWhen it's done, it's done and everything will run the way you expect it to run. Well, in theory...In a couple of months, you might have to make som...
View full detailsWhile navigating the sheer endless realms of a local network, novice users need to be careful not to lose track of all the different IP addresses. ...
View full detailsOne does not simply explain a joke. Explaining jokes kills the fun. So, how do we write an entertaining product text about a Using Cookies Cookie B...
View full detailsIf you ever meet a colour-blind robot, it will be useful to have the hex code the same colour of your shirt written on it :)The writing #000000 is ...
View full detailsTo be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsAn answer to every single newbee question... Now you do not even have to make the effort to open your mouth!For those who do not know (and are afra...
View full detailsAs we all know, still waters run deep. Software development might not have anything to do with water, but the basic principle of the saying can be ...
View full detailsA progress bar for human thinking processes could be pretty useful, don't you think? Everyone would know whether there's enough time to go get a cu...
View full details