Beefy Boxes and Bandwidth Generously Provided by pair Networks
There's more than one way to do things

Re^2: The Perl Hacker Inferiority Complex

by coreolyn (Parson)
on Jul 25, 2006 at 19:15 UTC ( #563612=note: print w/replies, xml ) Need Help??

in reply to Re: The Perl Hacker Inferiority Complex
in thread The Perl Hacker Inferiority Complex

The fact that you used Procomm instead of Telix say's volumes in and of itself.

The fact that it took your system 20 minutes to load this page means your probably still using it and your modem.

The fact that Microsoft fears the access Perl gives to a system and proved to be financially unexploitable by them is ++Perl in my book.

. . . you are left with a steaming pile of undulating and evilly sentient hostility that literally takes an "appocalypse" to make even the slightest change . . .

I love that line.. Don't agree with it but it's still quite amusing

  • Comment on Re^2: The Perl Hacker Inferiority Complex

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://563612]
[choroba]: Well, merging two hashes recursivelly is not that hard either, but...
[Corion]: choroba: Yeah - I think I used (and extended) Hash::Merge for recursive merging
[Corion]: I still wonder if I should maybe publish Config::Collect, which (I think) is the dumb hash merger

How do I use this? | Other CB clients
Other Users?
Others chilling in the Monastery: (8)
As of 2018-02-23 19:28 GMT
Find Nodes?
    Voting Booth?
    When it is dark outside I am happiest to see ...

    Results (310 votes). Check out past polls.