Friday, June 29, 2007

Mistranslations

Signs from around the world written in fractured English


Hotel, Japan:
YOU ARE INVITED TO TAKE ADVANTAGE OF THE CHAMBERMAID.

In the lobby of a Moscow hotel across from a Russian Orthodox monastery:
YOU ARE WELCOME TO VISIT THE CEMETERY WHERE FAMOUS RUSSIAN AND SOVIET
COMPOSERS, ARTISTS, AND WRITERS ARE BURIED DAILY EXCEPT THURSDAY.

Hotel, Zurich:
BECAUSE OF THE IMPROPRIETY OF ENTERTAINING GUESTS OF THE
OPPOSITE SEX IN THE BEDROOM, IT IS SUGGESTED THAT THE LOBBY BE USED FOR THIS
PURPOSE.

Advertisement by a Hong Kong dentist:
TEETH EXTRACTED BY THE LATEST
METHODISTS.

A laundry in Rome:
LADIES, LEAVE YOUR CLOTHES HERE AND SPEND THE
AFTERNOON HAVING A GOOD TIME.

Wednesday, June 27, 2007

Bondage Couple Lose Key

A German couple had to call out the fire brigade after tying each other up in chains - and then losing the key to the padlock.

Jochen Ranstett, 56 and his wife Maria, from the town of Weiden, dressed up in leathers and chained each other to their beds, but lost the key during the romp.

After hours of trying to free themselves they finally gave up and called for help on Jochen's mobile phone.

He said: "It was so embarrassing. We just wanted to try something a bit different and we ended up with this.

"I even had to be taken to hospital because my wrists had swollen so much from trying to get out of the handcuffs."

http://www.ananova.com/news/story/sm_2344515.html?menu=news.quirkies.sexlife

Monday, June 18, 2007

Things Computers can ONLY do in Movies

Word processors never display a cursor.

You never have to use the space-bar when typing long sentences.

Movie characters never make typing mistakes.

All monitors display inch-high letters.

High-tech computers, such as those used by NASA, the CIA or some such governmental institution, will have easy to understand graphical interfaces.

Those that don't have graphical interfaces will have incredibly powerful text-based command shells that can correctly understand and execute commands typed in plain English.

Note: Command line interfaces will give you access to any information you want by simply typing, "ACCESS THE SECRET FILES" on any near-by keyboard.

You can also infect a computer with a destructive virus by simply typing "UPLOAD VIRUS". (See "Fortress".)

All computers are connected. You can access the information on the villain's desktop computer even if it's turned off.

Powerful computers beep whenever you press a key or the screen changes. Some computers also slow down the output on the screen so that it doesn't go faster than you can read. (Really advanced computers will also emulate the sound of a dot-matrix printer.)

All computer panels operate on thousands of volts and have explosive devices underneath their surface. Malfunctions are indicated by a bright flash of light, a puff of smoke, a shower of sparks and an explosion that causes you to jump backwards.

People typing on a computer can safely turn it off without saving the data.
A hacker is always able to break into the most sensitive computer in the world by guessing the secret password in two tries.

You may bypass "PERMISSION DENIED" message by using the "OVERRIDE" function. (See "Demolition Man".)

Computers only take 2 seconds to boot up instead of the average minutes for desktop PCs and 30 minutes or more for larger systems that can run 24 hours, 365 days a year without a reset.

Complex calculations and loading of huge amounts of data will be accomplished in under three seconds. Movie modems usually appear to transmit data at the speed of two gigabytes per second.

When the power plant/missile site/main computer overheats, all control panels will explode shortly before the entire building will.

If you display a file on the screen and someone deletes the file, it also disappears from the screen (See "Clear and Present Danger").

If a disk contains encrypted files, you are automatically asked for a password when you insert it.

Computers can interface with any other computer regardless of the manufacturer or galaxy where it originated. (See "Independence Day".)

Computer disks will work on any computer has a floppy drive and all software is usable on any platforms.

The more high-tech the equipment, the more buttons it will have (See "Aliens".)

Note: You must be highly trained to operate high-tech computers because the buttons have no labels except for the "SELF-DESTRUCT" button.

Most computers, no matter how small, have reality-defying three-dimensional active animation, photo-realistic graphics capabilities.

Laptops always have amazing real-time video phone capabilities and performance similar to a CRAY Supercomputer.

Thanks to the Vole

Friday, June 08, 2007

Fast Food Reality


This is what a freshly purchased KFC Famous Bowl really looks like and it does not compare favorably to the advertisement.

It's a funny experiment from The West Virginia Surf Report. They take several ads from fast food companies such as McDonald's, KFC, Arby's, Subway, Burger King, and Wendy's and compare the pics to the actual food they went and bought. Yum!!!!!

http://www.thewvsr.com/adsvsreality.htm

Wednesday, June 06, 2007

American Idol with Stripes


“Hello, everybody out there, have we got something for you. I’m talking about the first-ever Inmate Idle contest.”
“This is a groundbreaking opportunity, never before done in any jail, so don’t miss out. We hear you singing all the time in the pods.”
“ In your cells. In the holding tanks. Now, let’s put you in front of a microphone and on a stage.”


It would have been just another day in jail if not for the wild applause.

In the yard was a stage, a festive canopy and a 15-foot billboard with a cartoon prisoner in stripes singing into a microphone. Above it, a logo, styled after American Idol, read: “Inmate Idle Singing Con-Test.”


http://www.laweekly.com/general/features/jailhouse-rock/16256/

Contributed by Vonross
http://www.clubofpioneers.com/blog/blog-from-ross-von-burg/16/