Hale, Jim
Jim.Hale at FleetPride.com
Fri Sep 28 10:34:42 CDT 2007
Those are more along the lines of dragons than bugs, as in "I be dragon my sorry butt in on Saturday to try and figure out what broke before they fire me" :-) Jim Hale -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com] On Behalf Of Arthur Fuller Sent: Friday, September 28, 2007 8:28 AM To: Access Developers discussion and problem solving Subject: Re: [AccessD] Friday (You Know) Back in the days of DOS, Pinnacle Publications had a Clipper Advisor magazine, for which I wrote a column called Seek And Destroy. The idea was that I would present some code containing a bug and challenge the reader to detect the bug. The first few columns were easy, but as the months passed I found it increasingly difficult to come up with a non-obvious bug. This may not be further proof of my conjecture, but it is an interesting exercise. Try to write a buggy routine. Nothing obvious like an a misspelled variable name or an array-boundary error. It's got to be subtle. A. On 9/28/07, max.wanadoo at gmail.com <max.wanadoo at gmail.com> wrote: > > The reason they are not bugs is because in my software they are known as > "Hidden Easter Egg Features" and the person who finds them gets a prize. > First prize being the ability to be the first to test the update. > > Problems are merely "challenges" > > Max > -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com *********************************************************************** The information transmitted is intended solely for the individual or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of or taking action in reliance upon this information by persons or entities other than the intended recipient is prohibited. If you have received this email in error please contact the sender and delete the material from any computer. As a recipient of this email, you are responsible for screening its contents and the contents of any attachments for the presence of viruses. No liability is accepted for any damages caused by any virus transmitted by this email.