Gifts for computer scientists
Gift ideas for computer scientists
This is where creativity is at a premium for many people. ;) Unfortunately, it is becoming more and more common for people to need gifts that appeal to lovers of ones and zeros. Be it because relatives or friends are IT administrators, programmers or something else in the IT industry, or because SysAdmin Day is approaching - sometimes you just need something suitable for IT people. In our Geek Shop, IT people are some... Mehr anzeigen of our favorite customers and that is why we have a large selection of IT gadgets and other items that they are guaranteed to be happy about and that also make great gifts.In IT, it's called a data center - the sacred place where servers hum and data races through cables. But what if the data center is meant literally...
View full detailsThe command [i]export EDITOR=""[/i] defines the editor that is used by other applications by default to open files. The abbreviation [i]rm[/i], how...
View full detailsLet's keep our computers clean and make sure Unicode doesn't get a chance! Things like Unicode undermine our good nerd values. If we really think a...
View full detailsFor the code monkeys among you ;-)
Whether it's the software, hardware or the analog world outside the computer - sometimes, when things have gotten too convoluted and overheated, al...
View full detailsSorry to all 1337 h4x0r, but this had to be said :) If you don't understand what it says on the shirt, consider yourself lucky. Nevertheless, here ...
View full detailsMagic: The Gathering has something for everyone. And that doesn't just mean the different colors and editions, but also the different ways to play....
View full detailsThe bike is locked, but we simply carry the USB stick with our most important and confidential data around with us. This is actually sacrilege. On ...
View full detailsUnit tests are for beginners, test environments are overrated and the last deploy was... adventurous? Then Test in Production is exactly your style...
View full detailsTwo rules for life is a dry statement for anyone who refuses access when they hear "Details please". The clear typo print sums up the humor of IT, ...
View full detailsIt decides what you can and cannot do. Seemingly omnipotent, he simply blocks your user account or deletes all your data. Whatever you do - he sees...
View full detailsDon't you sometimes feel like a completely fresh program when you're out and about in real life?
There are simply too many DAUs, so the only thing that helps is a general rejection if you don't want to keep answering stupid questions or uninsta...
View full detailsUh Oh...You wouldn't want to be the admin of the database...
This year's Hacken Open Air line-up is once again second to none: The headliners sudo's Priest and Gnutallica will heat you up on the Black Hat Sta...
View full detailsBased on a true story: "Look mom, with the new router you no longer need cables and can use Wi-Fi anywhere in the house." - "Can I use it to write ...
View full detailsAt some point, there has to be an end to the stupid "Connection reset by peer"
It's the weekend - or late at night - you're gaming, binging or dozing. Suddenly your cell phone rings. That can only mean one thing: your mother i...
View full detailsSome people recognize their age by their back pain. We nerds recognize it by the moment when we want to save a file and briefly think: "Where is ac...
View full detailsIn principle, we nerds shouldn't have any problems with curfews in any type of game - after all, we're usually sitting at home in front of the comp...
View full detailsLinux has the penguin, BSD has the daemon, Perl has the camel and the hacker community has this symbol, called the glider. It is still young, but i...
View full detailsAre HEX numbers your bread and butter? Then you should have little problem understanding the subtle message of this shirt. Otherwise, just think a ...
View full detailsWant to transform your Das Keyboard 5Q or Das Keyboard X50Q into the ultimate customized typing machine? No problem! The "Das Keyboard" Keycaps for...
View full detailsThe security principle "[i]Security by Obscurity[/i]" from the field of computer and network security is based on the assumption that a system cann...
View full detailsWithout words
Do you remember that sound? That iconic screech, hiss and beep while your modem painfully dialed into the internet - and you sat there hoping that ...
View full detailsIn a world full of tracking, data leaks and transparent citizens, one simple truth applies:Encryption is not a crime - it's self-defense.Just becau...
View full detailsFun fact: With Windows XP, Microsoft used the product activation system with serial numbers for the first time in order to curb software piracy. Ac...
View full detailsWhy didn't anyone tell Jesus that backups are important?
When navigating through the sheer endless expanse of the local network, inexperienced users must be careful not to lose track of the assigned IP ad...
View full detailsFor the real computer scientists ;)
Some things are better left to the professionals. This also applies to "just pulling the plug for a moment". So never - NEVER - enter the server ro...
View full details