Products
Are HEX numbers your bread and butter? Then you should have little problem understanding the subtle message of this shirt. Otherwise, just think a ...
View full detailsSome people recognize their age by their back pain. We nerds recognize it by the moment when we want to save a file and briefly think: "Where is ac...
View full detailsSometimes it can seem that in many software companies, one department doesn't know what the other is doing and vice versa. Sales and marketing woul...
View full detailsThe word hacker in Japanese on a shirt. The characters are pronounced "hakka" (with a small pause between the k, i.e. "hak (pause) ka").
Let's keep our computers clean and make sure Unicode doesn't get a chance! Things like Unicode undermine our good nerd values. If we really think a...
View full detailsIf you need a little help with everyday problems, you should simply summon Mr. Meeseeks! All you have to do is pop into a popular TV series about a...
View full detailsWhen you're out and about on social media, you occasionally stumble across the odd comment that makes you question the sanity of some people. Until...
View full detailsYou should be very careful when programming with pointers, because you are walking close to hell ;) At least the 2nd of the 10 commandments for C p...
View full detailsLinux - The choice of the GNU generation
In principle, we nerds shouldn't have any problems with curfews in any type of game - after all, we're usually sitting at home in front of the comp...
View full detailsWhat is actually behind all this software and where does it come from, we asked ourselves and did some research. During our research, we came up wi...
View full detailsA simple card game can often still be the best way to pass the time. For example, when external influences push you towards analog amusement. Like ...
View full detailsVarious accessories for your Raspberry Pi open up new possibilities:- HousingAvailable in two versions: White and transparent. Suitable for Raspber...
View full detailsWhether it's the software, hardware or the analog world outside the computer - sometimes, when things have gotten too convoluted and overheated, al...
View full detailsParticularly talented coders are not satisfied with writing their own code, but also try to analyze other programs and hardware, e.g. to write driv...
View full detailsIf genre legends Run DMC are to be believed, the same applies to hip-hop as to computer science: [i]It's tricky[/i]! While the trio Run, DMC and Ja...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsTo be, or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We always knew that coders are lyricists. If Shakespea...
View full detailsFor the code monkeys among you ;-)
Imagine developing a model that enables different technical systems to communicate and that simplifies this communication enormously through clearl...
View full detailsThe (almost exclusively jokingly used) eighth layer of the OSI model for network protocols is a nice way of saying that the problem lies with the p...
View full detailsTranslated into "normal language", the T-shirt text would mean something like "Please stay at home. Don't broadcast /connect with everyone". So: "P...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice early.), on the other ...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting as a child (keyword: practice early), on the other hand,...
View full detailsEver since Bill Gates' famous saying about lazy people, we have known that good computer scientists are characterized by their ability to achieve t...
View full detailsComments in the code are grossly overrated. Everything is already there! If you have a plan of the matter, you don't need any extra explanations ;)
When the work is done, everything runs as you imagine it. So much for the theory of programming...When you have to change the code in a few months'...
View full detailsOn January 19 of the year 2038 at exactly 3:14:07 (GMT), the variable that stores the Unix time will overflow!Unix systems store the time as a numb...
View full detailstake a close look!Bugs are even becoming more common on T-shirts. The getDigital T-shirts are of course all out of the beta phase ;)
Sometimes you don't need modern graphics or hyper-realistic textures to create icons - sometimes all you need is a glowing grille, a soundtrack by ...
View full detailsLet someone say again that we nerds have nothing to do with nature! It can't be a coincidence that parts of the Unix architecture were clearly insp...
View full detailsHave you ever thought about how to drink coffee? You're going to say "Sure, fill the cup, brew, drink. Repeat if necessary." But by "drink coffee" ...
View full details