Every year, MySQL engineers gather together for the developers meeting. It's the time of the highest productivity and fun at the same time. It starts usually by performing an old play, Guess who I am, featuring 100 employees who know each other by name but not by face. At every new entrance, a flurry of introductions is acknowledged and promptly forgotten, leaving the unfamiliar faces deprived of the familiar names. So a few minutes later the same people run around each other again, staring nonchalantly at the name tags, trying to avoid a gaffe. Despite the fierce fight for a name, nobody gets hurt, and in the end the leading actors and support roles go back to the script of exchanging geeky thoughts in person, as confidently as if they were doing that through the IRC. During these meetings, the following glossary was developed. Its origins lost in the fumes of beer. This blog post is a cherry picking collection from the daily newsletter (Heidelberg NachtRichten) distributed during the latest developers meeting. |
(Warning! Dangerous silly humor ahead!)
database hacker glossary
- Primary key. The key that you get first from your keyring when trying to open the door. Unfortunately, it's usually the wrong one.
- Table. A piece of furniture that contains records instead of cutlery.
- Cursor. Someone who curses, especially after noticing how slow cursors are.
- Buffer overflow. Drinking more beer than your stomach can hold.
- Morning. Start of the work day for managers.
- Afternoon. Time of day expressly invented to make conversation difficult.
- Evening. Time for honest developers to wake up.
- Night. Time to do serious work.
- Specifications. Things that developers will eventually write after seeing how their own application works.
- User requirements. Unnecessary burdens to developers creativity.
- Test suite. A useful invention created to give you time to drink coffee.
- Weekly report. The output of a clever Perl script, producing random text that managers pretend to understand.
- Developers meeting. The funniest time of the year, and getting paid for it!
- Line manager. A former developer suffering from ERS (Early Rising Syndrome)
- Vice President. A former manager too lazy to go back to developing duties.
- Keyboard. Natural extension of the hands for real people.
An ancient legend
When Sir Geoffrey Hawks went to fight the First Crusade, in A.D. 1096, he left a gift to his young wife, a chastity belt chiseled by the finest artisans in Spain, a jewel of efficiency, as beautiful as robust, able to protect her honor while he was abroad. The belt was kept closed by two engraved keys, also work of the same Spanish craftsmen. He made sure that she wore the belt, locked both locks, put the keys in his purse, and went to war. Three years passed, without any news. The lady was restless and bored, and she welcomed the arrival of a minstrel from the South as a much needed distraction. The minstrel was skilled in his arts, and soon he managed to be in close intimacy with the lady. He managed to overcome all her defenses, but he found the disappointing obstacle of the chastity belt. He then applied his skills to the locks, to no avail. He had a set of keys, built by a blacksmith in London, but every attempt at violating the locks fail. With a sad and defeated sigh, the lady acknowledged that she would never achieve her pleasure without the precious keys made by the Spanish craftsmen. She admitted defeat. "I will never be happy - she told her lover - without those foreign keys!"Final item of the hacker glossary
- Foreign key. A key to open a foreign lock.
No comments:
Post a Comment