Amethyst

 view release on metacpan or  search on metacpan

Amethyst/Brain/Infobot/Module/Zappa.pm  view on Meta::CPAN


__DATA__
Don't eat yellow snow!
Remember there's a big difference between kneeling down and bending over.
You have just destroyed one model XQJ-37 nuclear powered pansexual roto-plooker....and you're gonna have to pay for it.
He was in a quandary...being devoured by the swirling cesspool of his own steaming desires... uh.. the guy was a wreck
All people have the right to be stupid, some people just abuse it!
And now....you are going to dance...like you've never danced before!
Bring the band on down behind me, boys.
Not a speck of cereal.
Nothing but the best for my dog.
You drank beer, you played golf, you watched football - WE EVOLVED!
It looks just like a Telefunken U-47!
Don't mind your make-up, you'd better make your mind up.
They're serving burgers in the back!
Jazz is not dead...it just smells funny. -- Beebop tango introduction
I have a message to deliver to the cute people of the world...if you're cute, or maybe you're beautiful...there's MORE OF US UGLY MOTHERFUCKERS OUT THERE THAN YOU ARE!! So watch out.
Is that a real poncho or a Sears poncho?
You're an asshole! You're an asshole! That's right! You're an asshole! You're an asshole! Yes yes!
Number one ain't you... You ain't even number two.
Who are the brain police?

Amethyst/Brain/Infobot/Module/Zappa.pm  view on Meta::CPAN

Beauty is a French phonetic corruption of a short, cloth neck ornament, currently in resurgence.
Modern music is a sick puppy.
Some Scientists claim that hydrogen, because it is so plentiful, is the basic building block of the universe. I dispute that. I say there is more stupidity than hydrogen, and that is the basic building block of the universe.
Most people wouldn't know good music if it came up and bit them in the äss. -- Whole Grains
I figure the odds be fifty-fifty I just might have some thing to say.
The person who stands up and says, `This is stupid,' either is asked to behave  or, worse, is greeted with a cheerful `Yes, we know! Isn't it terrific!'
The more BORING a child is, the more the parents, when showing off the child, receive adulation for being GOOD PARENTS -- because they have a TAME CHILD-CREATURE in their house.
The worst aspect of `typical familyism' (as media-merchandised) is that it glorifies _involuntary_homogenization_.
Gail has said in interviews that one of the things that makes our relationship work is the fact that we hardly ever get to talk to each other.
The language and concepts contained herein are guaranteed not to cause eternal torment in the place where the guy with the horns and pointed stick conducts his business.
My best advice to anyone who wants to raise a happy, mentally healthy child is: Keep him or her as far away from a church as you can.
I like having the capitol of the United States in Washington, D.C., in spite of recent efforts to move it to Lynchburg, Virginia.
He [Barney Frank] is one of the most impressive guys in Congress.  He is a great model for young gay men.
Children are naive -- they trust everyone. School is bad enough, but, if you put a child anywhere in the vicinity of a church, you're asking for trouble.
It would be easier to pay off the national debt overnight than to neutralize the long-range effects of OUR NATIONAL STUPIDITY.
Nuclear explosions under the Nevada desert? What the fück are we testing for? We already know the shit blows up.
Politics is the entertainment branch of industry.
Star Wars won't work.  Star Wars won't work. The gas still gets through; it could get right on you.  And what about those germs, now? Star Wars won't work.
Washington, D.C.: a city infested with statues -- and Congressional Blow-Boys who WISH they were statues.
Thanks to our schools and political leadership, the U.S. has acquired an international reputation as the home of 250 million people dumb enough to buy 'The Wacky Wall-Walker.'
Stupidity has a certain charm -- ignorance does not.

Amethyst/Brain/Infobot/Module/Zappa.pm  view on Meta::CPAN

If your children ever find out how lame you really are, they'll gonna murder you in your sleep....-- Whole Grains
I'm not a man for all seasons but I'm doing something right. -- Frank Zappa during the Senate PMRC hearings.
Ugly as I mights be, I is your futum!
There is no hell. There is only France.
`Conducting' is when you draw `designs' in the nowhere -- with your stick, or with your hands -- which are interpreted as `instructional messages' by guys wearing bow ties who wish they were fishing.
Without music to decorate it, time is just a bunch of boring production  deadlines or dates by which bills must be paid.
The bassoon is one of my favorite instruments.  It has the medieval aroma -- like the days when everything used to sound like that.
Some people crave baseball -- I find this unfathomable --  but I can easily understand why a person could get excited about playing a bassoon.
Whatever you have to do to have a good time, let's get on with it, so long as it doesn't cause a murder.
Politics is the showbiz of industry.
Let's just admit that public education is mediocre at best.
Without deviation from the norm, 'progress' is not possible.
The last election just laid the foundation of the next 500 years of Dark Ages -- 1981
Look, just because you have got that fuckin' thing between  your legs it doesn't make any diference. If a girl does  something stupid I am going to call her just as I would a guy.
A world of sexual incompetents, encountering each other, under disco circumstances... Now can't you do songs about that?
A composer is a guy who goes around forcing his will on unsuspecting air molecules,often with the assistence of  unsuspecting musicians.
There is no such thing as a dirty word. Nor is there a word so powerful, that it's going to send the listener to the lake of fire upon hearing it.
Why do you necessarily have to be wrong just because a few million people  think you are?
Life is like highschool with money.
Information doesn't kill you...  -- PMRC Hearings during an exchange with a Born Again Christian.
Where ever you're going, don't walk there first.  If you do, people will think you know where you're going.
A drug is not bad. A drug is a chemical compound. The problem comes  in when people who take drugs treat them like a licence to behave like an asshole.
Flatulence can be cruel!
Speed: It will turn you into your parents. -- 1970 public service announcement regarding drug (namely, speed) use
Winos don't march.
Reporter: This is a personal thing, I think that if you wanted to make  top ten hits and sell millions of records, you could. FZ: Yeah, but who wants to go through life with a tiny nose and one glove on?
It is always advisable to be a loser if you cannot become a winner.
I knew  Jimi (Hendrix) and I think that the best thing you could say about Jimi was: there was a person who shouldn't use drugs.
The emotion of every player is the most important thing, what stands behind this chord or tone. If you leave that out, the  music does not touch you. -- Interview from Keyboard June 1980.
It's better to have something to remember than nothing to reget...
Why do people continue to compose music, and even pretend to teach  others how to do it, when they already know the answer?  Nobody gives a fuck.
If you wind up with a boring, miserable life because you listened to your  mom, your dad, your teacher, your priest or some guy on TV telling you how to  do your shit, then YOU DESERVE IT. -- The Real Frank Zappa Book
A mind is like a parachute. It doesn't work if it not open.
You've got to be digging it while it's happening 'cause it just might be a one shot deal -- Waka/Jawaka
There will never be a nuclear war; there's too much real estate involved. -- Tonight Show, C.A. 1988
Heaven would be a place where bullshit existed only on television. (Hallelujah! We's halfway there!) -- The Real Frank Zappa Book
Don't expect anything,don't expect fun, don't expect friends.. if you get something...it's a BONUS
Golly, do I ever have alot of soul!!

Amethyst/Brain/Infobot/Module/Zappa.pm  view on Meta::CPAN

The essence of Christianity is told us in the Garden of Eden history. The fruit that was forbidden was on the tree of knowledge. The subtext is, All the suffering you have is because you wanted to find out what was going on. You could be in the Garde...
When we talk about artistic freedom in this country We sometime lose sight of the fact that freedom is often dependent on adequate financing.
If you want to get laid, go to college, but if you want an education,  go to the library.
Outdoors for me is walking from the car to the ticket desk at the airport -- Regarding secondhand smoke in The Real FZ Book
My music is like a movie for your ear
Here I stand hoping against hope that it's a chick with a low voice -- After a guy in the audience yelled out, 'Eat me Zappa'
Don't clap for destroying America. This place is as good as you want to make it.
The whole Universe is a large joke. Everything in the Universe is just  subdivisions of this joke. So why take anything too serious. -- September 1992 during an interview about the Yellow Shark.
Kid's heads are filled with so many nonfacts that when they get out of  school they're totally unprepared to do anything.  They can't read, they  can't write, they can't think.  Talk about child abuse.  The U.S. school  system as a whole qualifies. -...
Drop out of school, before your mind rots from exposure to our mediocre  educational system.  Go to the library and educate yourself if you've got any  guts...--SLUG Magazine June 1995
Never stop until your good becomes better, and your better becomes the best.
The people of your century no longer require the service of composers. A composer is as useful to a person in a jogging suit as a dinsoaur turd in the middle of his runway.--from the Them Or Us The Book
THE  VERY  BIG  STUPID is a thing which  breeds  by  eating  The Future.  Have  you seen it? It sometimes disguises  itself  as  a good-looking  quarterly bottom line, derived by closing  the  R&D Department. -- The Real Frank Zappa Book.
Most rock journalism is people who can not write interviewing people who can not talk.
The typical rock fan is not smart enough to know when he is being dumped on.
It's not pretty, also you can't dance to it.
It's all one big note.
Ladies and gentleman, watch Ruth.  All through the show, Ruth has been thinking...Ruth has been thinking?  ALL THROUGH THE SHOW???
You can tell what they think of our music by the places we are forced to play it in.  This looks like a good spot for a livestock show. -- April 1968, Chicago, Mothers of Invention open for Cream
I'm not going to be Bill Clinton and say I never inhaled.  I did inhale.  I liked tobacco a lot better.
Consider for a moment any beauty in the name Ralph. -- FZ on why he gave his children such odd names

Amethyst/Brain/Infobot/Module/Zippy.pm  view on Meta::CPAN

How many retured bricklayers from FLORIDA are out purchasing PENCIL
SHARPENERS right NOW??
How's it going in those MODULAR LOVE UNITS??
How's the wife?  Is she at home enjoying capitalism?
hubub, hubub, HUBUB, hubub, hubub, hubub, HUBUB, hubub, hubub, hubub.
HUGH BEAUMONT died in 1982!!
HUMAN REPLICAS are inserted into VATS of NUTRITIONAL YEAST ...
I always have fun because I'm out of my mind!!!
I am a jelly donut.  I am a jelly donut.
I am a traffic light, and Alan Ginzberg kidnapped my laundry in 1927!
I am covered with pure vegetable oil and I am writing a best seller!
I am deeply CONCERNED and I want something GOOD for BREAKFAST!
I am having FUN...  I wonder if it's NET FUN or GROSS FUN?
I am NOT a nut....
I appoint you ambassador to Fantasy Island!!!
I brought my BOWLING BALL -- and some DRUGS!!
I can't decide which WRONG TURN to make first!!  I wonder if BOB GUCCIONE has these problems!
I can't think about that.  It doesn't go with HEDGES in the shape of LITTLE LULU -- or ROBOTS making BRICKS ...
I demand IMPUNITY!
I didn't order any WOO-WOO ... Maybe a YUBBA ... But no WOO-WOO!
I don't believe there really IS a GAS SHORTAGE.. I think it's all just a BIG HOAX on the part of the plastic sign salesmen -- to sell more numbers!!

Makefile  view on Meta::CPAN

-e 'print " appropriate files manually.\n  Sorry for the inconveniences.\n"'


# --- MakeMaker dist section:

DISTVNAME = $(DISTNAME)-$(VERSION)
TAR  = tar
TARFLAGS = cvf
ZIP  = zip
ZIPFLAGS = -r
COMPRESS = gzip --best
SUFFIX = .gz
SHAR = shar
PREOP = @$(NOOP)
POSTOP = @$(NOOP)
TO_UNIX = @$(NOOP)
CI = ci -u
RCS_LABEL = rcs -Nv$(VERSION_SYM): -q
DIST_CP = best
DIST_DEFAULT = tardist


# --- MakeMaker macro section:


# --- MakeMaker depend section:


# --- MakeMaker cflags section:

factpacks/Linux.fact  view on Meta::CPAN

Darxite => <reply> $who, Controllable daemon that downloads via FTP in the background. URL: http://darxite.cjb.net/
DashO-Pro => <reply> $who, Java Application Size-Reducer, Optimizer, and Obfuscator. URL: http://www.preemptive.com
Data::Address::Standardize Perl Module => <reply> $who, A Perl module for standardizing U.S. URL: http://www.focusresearch.com/gregor/Data-Address-Standardize-0.001.html
Data::Locations => <reply> $who, A virtual file manager which allows to read/write data to and from virtual files. URL: http://www.engelschall.com/u/sb/download/
DataGate's Connector => <reply> $who, DG Connector is a Web-based Instant Intranet solution.. URL: http://www.datagate.co.uk/products/connector/index.html
Datalink library => <reply> $who, Send data to the Timex DataLink watches. URL: http://datalink.fries.net/
DataManager => <reply> $who, Shared memory ringbuffers client-server library. URL: http://www.anatom.uni-tuebingen.de/~richi/linux/DataManager/datamanager.html
Datasphere => <reply> $who, Non-IRC text-based conferencing package. URL: http://www.wwcn.org/
Datbkr => <reply> $who, Tar based tape backup program with remote SSH support. URL: http://www.psychosis.com/datbkr/
Date::Calc => <reply> $who, Package for all kinds of date calculations based onthe Gregorian calendar. URL: http://www.engelschall.com/u/sb/download/
Date::Pcalc => <reply> $who, All-Perl module for date calculations, based on Date::Calc. URL: http://www.best.com/~nessus/date/pcalc.html
Dave Gnukem => <reply> $who, GGI-based 2D scrolling platform game, similar to Duke Nukem 1. URL: http://www.geocities.com/SoHo/Lofts/2018/djgame.html
daVinci => <reply> $who, daVinci is a X-Window visualization tool for drawing directed graphs automatical. URL: http://www.informatik.uni-bremen.de/~davinci/
Daydream => <reply> $who, Daydream BBS version 2.07. URL: http://daydream.iwn.fi/
DB2 => <reply> $who, Universal Database for Linux. URL: http://www.software.ibm.com/data/db2/linux/
DBE => <reply> $who, Easily insert, delete, and update records in a database table.. URL: http://edseek.com/developers.shtml
DBedit => <reply> $who, A system for integrating development web database applications. URL: http://admin.gnacademy.org:8001/uu-gna/tech/dbedit/dbedit.html
dbf2pos => <reply> $who, Dbf to Postgresql converter. URL: http://www.mat.uni.torun.pl/~jerzy/wegorz/
DBInspector => <reply> $who, Easy-to-use front end to Oracle Databases written in Java.. URL: http://dbinspector.com/
DBIx::CGI => <reply> $who, Easy to Use DBI Interface for CGI Scripts. URL: http://www.linuxia.net/DBIx/CGI/
DBMAIL => <reply> $who, A mailsystem that uses a SQL database to store it's messages (POP3). URL: http://www.dbmail.org/

factpacks/Linux.fact  view on Meta::CPAN

Ecology-HOWTO => <reply> $who, Linux as a mean to protect our environment.. URL: http://www.snafu.de/~wehe/eco_linux.html
eCos => <reply> $who, Real Time Operating System. URL: http://sourceware.cygnus.com/ecos/
Edcom => <reply> $who, An easy to administer, multiuser, story posting system, written in perl5.. URL: http://edseek.com/developers.shtml
Eddie => <reply> $who, Robust, clustering, load balancing, high availability, web server tool.. URL: http://www.eddieware.org/
editek => <reply> $who, Colorizer for /etc/issue, /etc/issue.net and /etc/motd. URL: http://www.xnot.com/editek/
edna => <reply> $who, tiny HTTP server for selecting and streaming MP3 files. URL: 
eEMU => <reply> $who, Enterprise Event Management and Monitoring Utility. URL: http://www.jarrix.com.au/
efingerd => <reply> $who, Another finger daemon for linux. URL: http://melkor.dnp.fmph.uniba.sk/~garabik/efingerd.html
EFMC => <reply> $who, EFMC (Element's Formula Mass Calculator) calculates Formula Mass. URL: http://emu.simplenet.com/misc/efmc-0.1.tar.gz
efs => <reply> $who, Extent File System support (read-only). URL: http://aeschi.ch.eu.org/efs/
Efsane => <reply> $who, Turkish Window Manager for X. URL: http://efsane.sitebest.com/
efsmod => <reply> $who, Read EFS (Silicon Graphic's own Filesystem) Media on a Linux Platform. URL: http://wwwcip.informatik.uni-erlangen.de/user/cnvogelg/proj.html
egcs => <reply> $who, Experimental set of enhancements for the GNU tools. URL: http://www.cygnus.com/egcs/
Egg => <reply> $who, Interpreter for the language in Dijkstra's Discipline of Computer Programming. URL: http://www.andrewcooke.free-online.co.uk/jara/egg/index.html
ZNibbles => <reply> $who, Networked multiplayer nibbles/snake game for X11/Motif. URL: http://www.stud.enst.fr/~vmallet/ZNibbles.html
eggdrop2 => <reply> $who, IRC bot, written in C. URL: http://www.eggdrop.net/
Egoistic Wordlist Generator => <reply> $who, A wordlist generator with a variety of options.. URL: http://www.geocities.com/divideb0/
egrep-finger => <reply> $who, Extended finger program using extended regular expressions. URL: http://torch.rowan.edu/egrep-finger/
eGTK => <reply> $who, Bindings to GTK+ widget toolkit for Eiffel.. URL: http://www.netlabs.net/hp/richieb/gtk_eiffel.html
EHD => <reply> $who, patch for login to allow encrypted home directories under linux. URL: http://members.home.net/id-est/
EHeadlines => <reply> $who, Root Menu news system.. URL: http://dragon.acadiau.ca/~015940b/escripts/

factpacks/Linux.fact  view on Meta::CPAN

laddr => <reply> $who, Lesstif Address Book. URL: http://cse.unl.edu/~cluening/laddr/
LAGII => <reply> $who, Linux AGI Interpreter. URL: http://www.zip.com.au/~gsymonds/LAGII/
LAIM => <reply> $who, An ncurses based AOL Instant Messenger(tm) client. URL: http://www.angelfire.com/biz/majutsu/laim.html
LAME => <reply> $who, open source MP3 encoder and graphical frame analyzer. URL: http://www.sulaco.org/mp3/
LANdb => <reply> $who, Provides network managers with a means of cataloging network connections.. URL: http://avenir.dhs.org/landb/
lando => <reply> $who, command execution server for UNIX. URL: http://www.moonglade.com/lando/
Langton's Ant => <reply> $who, Langton's Ant-Cellular Automata. URL: http://theory.org/software/ant/
Lanlord => <reply> $who, A dhcpd lease reporting program. URL: http://linux.uhw.com/software/lanlord/index.html
LAPACK-D => <reply> $who, Dynamically loadable version of LAPACK libraries. URL: http://www.honeylocust.com/lapack_d/
Laptop Tracker => <reply> $who, Client for SaveTheLaptop. URL: http://savethelaptop.zzweb.com/
Laptop-HOWTO => <reply> $who, How to make the best of Linux features with laptops.. URL: http://www.snafu.de/~wehe/index_li.html
lasteject => <reply> $who, Eject CD on reboot/halt. URL: http://home.pages.de/~stesch/stuff/lasteject/lasteject.html
latencytest => <reply> $who, benchmarks scheduling latencies (of audio apps) during high system load. URL: http://www.gardena.net/benno/linux/audio/
lathi-themes => <reply> $who, Perl script to implement themes for the AfterStep window manager. URL: http://home.earthlink.net/~alcornd/
Latrell Sprewell => <reply> $who, Linux Mini-distribution based on Slackware v3.6. URL: http://www.linuxsupportline.com/~pygmy/
Latte => <reply> $who, Better web authoring language. URL: http://www.latte.org/
Launcher => <reply> $who, One-stop filetype/application mapping solution. URL: http://www.cs.columbia.edu/~etgold/software/launcher/
LAuRA => <reply> $who, Little Audiogram Recorder/Archiver. URL: http://stud4.tuwien.ac.at/~e9525556/audiometry/
lavaps => <reply> $who, A lava lamp of currently running processes. URL: http://www.isi.edu/~johnh/SOFTWARE/LAVAPS/index.html
Lazarus => <reply> $who, Lazarus Object Pascal IDE. URL: http://www.pcpros.net/~vbman/
Lazy Solitaire => <reply> $who, Solitaire card game for lazy people. URL: http://www.seindal.dk/rene/software/gtkabale/

factpacks/Linux.fact  view on Meta::CPAN

Millenium counter => <reply> $who, Millenium counter for Linux/unix. URL: http://www.vip.fi/~baze/millenium/
Milo 2.2 => <reply> $who, The Alpha-Linux bootloader.. URL: http://www.stefan-reinauer.de/Milo/
MindsEye => <reply> $who, 3D modelling program for Linux. URL: http://mindseye.luna.net/
MindTemplate => <reply> $who, A robust, high performance template engine for web development. URL: http://www.mindbright.se/mindtemplate.html
MindTerm => <reply> $who, SSH-client in pure Java, includes stand-alone ssh- and terminal(vt100)-packages. URL: http://www.mindbright.se/mindterm/
Mini-Commander => <reply> $who, Configurable Application and URL launcher for Gnome. URL: http://lfw.linuxhq.com/oliver_maruhn/mcl/
miniBar => <reply> $who, Small, Fast, Single click program launcher.. URL: http://www.phed.org/miniProject/
MiniCGI.pm => <reply> $who, Small CGI package for when CGI.pm is overkill.. URL: http://www.devzero.org/code/minicgi.tar.gz
miniCHESS => <reply> $who, chess dock app. URL: http://www.pobox.com/~ead/miniCHESS/
minicom => <reply> $who, Serial communication program. URL: http://www.clinet.fi/~walker/minicom.html
Minimalist => <reply> $who, Easy-but-powerful Mailing List Manager. URL: http://www.webest.com/minimalist/
MiniMate => <reply> $who, Administration tool for MiniVend. URL: http://linuxia.cobolt.ch/minimate/
MinIRC => <reply> $who, Ultra-small IRC client which uses Tcl/Tk (NOT a front-end for ircII). URL: http://minirc.hypermart.net
MiniSearch => <reply> $who, a simple website search engine written in Perl. URL: http://www.dansteinman.com/minisearch/
Ministry of Truth => <reply> $who, Web-based job tracking system. URL: http://tomato.nvgc.vt.edu/~hroberts/mot
MiniVend => <reply> $who, Powerful freely redistributable shopping cart package. URL: http://www.minivend.com/
minordomo => <reply> $who, A minimalistic mailing list manager. URL: http://www.nodomainname.net/software/minordomo/
Minotaur => <reply> $who, Embedding Perl, Python, Tcl scripts in each other. URL: http://mini.net/pub/ts2/minotaur.html
Mirror => <reply> $who, . URL: http://sunsite.org.uk/packages/mirror/
mirrordir => <reply> $who, Provides mirroring, backup, ftp, secure shell, secure file tranfer. URL: http://www.obsidian.co.za/mirrordir/
Miscellaneous Unix scripts => <reply> $who, A collection of miscellaneous useful Unix scripts. URL: http://www.linuxstart.com/~winitzki/

factpacks/Linux.fact  view on Meta::CPAN

plugger => <reply> $who, Streaming multimedia plugin for UNIX netscape. URL: http://fredrik.hubbe.net/plugger.html
PM3 => <reply> $who, Modula-3 compiler, debugger, libraries, and applications. URL: http://m3.polymtl.ca/m3/
pmail => <reply> $who, Perl mail program/scripts. URL: http://junior.apk.net/~qc/goodies/
PMan => <reply> $who, FLTK-based Project Manager. URL: http://r10k.webcity.nl/pman/
PMFirewall => <reply> $who, An Ipchains Firewall and Masquerading Configuration Utility.. URL: http://www.pointman.org/
pmpp => <reply> $who, A Poor Man's Pre-Processor. URL: http://www.zip.com.au/~kev/pmpp/
Pmw => <reply> $who, Python GUI-Widget Toolkit based on Tkinter (Tcl/Tk). URL: http://www.dscpl.com.au/pmw/
png2html => <reply> $who, Converts a PNG image into a web page.. URL: http://www.engr.mun.ca/~holden/png2html.html
png2jpg proxy => <reply> $who, HTTP proxy with png to jpg conversion.. URL: http://www.penguin.cz/~martinmv/index_eng.html
pngcrush => <reply> $who, Optimizer for PNG files that can also delete specified chunks. URL: http://www.xnot.com/pmt/pngcrush/
PngEncoder => <reply> $who, A Java class to convert Java images to a byte-array in PNG format. URL: http://www.best.com/~nessus/pngencoder/
PNGgraph.pm => <reply> $who, Chart-plotting perl module. URL: ftp://ftp.mobile.ru/pub/DISTRIB/PNGgraph-1.11.tar.gz
PNMA => <reply> $who, PNM based plug-in for GIMP with alpha and layering capabilities.. URL: http://cemtach.org/software/pnma/pnma.html
pnmtopng => <reply> $who, PBMplus/NetPBM converters to/from PNG image format. URL: http://www.cdrom.com/pub/png/pngcode.html
pnpmodem => <reply> $who, Simple bourne shell script for setting up ISA plug and play modems. URL: http://linuxmafia.org/~shaded/dist/pnpmodem-0.2.gz
Pocket Frog => <reply> $who, Green Frog Linux for the Mobile Gear. URL: http://www.linuxstart.com/~austin/pocket-frog.html
Pocket Linux => <reply> $who, A modern, single floppy distribution of Linux dedicated to networking. URL: http://pocket-linux.coven.vmh.net/
pod2ps => <reply> $who, A pod to PostScript translator, with PDF support. URL: http://www.oasis.leo.org/perl/scripts/textproc/pod2ps.dsc.html
pointlist.pl => <reply> $who, Pointlist generator script. URL: http://acidlinux.webjump.com/perl.htm
poll => <reply> $who, Script for automating Fidonet polls. URL: http://www.drmach.demon.co.uk/vashti/software/index.html
Pollera => <reply> $who, A www poll system meant to be run via CGI.. URL: http://bachue.com/alejo/pollera.html

factpacks/Linux.fact  view on Meta::CPAN

swapd => <reply> $who, Swapspace management daemon. URL: ftp://ftp.replicant.nu/pub/swapd/
swatch => <reply> $who, The Simple WATCHdog: syslog monitoring utility/daemon.. URL: http://www.stanford.edu/~atkins/swatch/
swc => <reply> $who, Simple Webpage Counter. URL: http://whatsis.com/swc/
swebget => <reply> $who, Prints a webpage to stdout. URL: http://www.uni-hildesheim.de/~smol0075/swebget/
SWI-Prolog => <reply> $who, Cross-Platform Prolog Compiler and Library. URL: http://swi.psy.uva.nl/projects/SWI-Prolog/
Swift Generator => <reply> $who, Dynamic Flash content generator.. URL: http://www.swift-tools.com/
Swift Inspector => <reply> $who, Flash file editor. URL: http://perso.club-internet.fr/odebon/swift.html
SwiftView => <reply> $who, HPGL, PCL Online Document Viewing System. URL: http://www.swiftview.com/
swim => <reply> $who, Package administration and research tool for Debian. URL: http://the.netpedia.net/the-software.html
Swish => <reply> $who, CGI news engine. URL: http://munchkin.comlab.ox.ac.uk/~simon/about.html
SWISH++ => <reply> $who, File indexing and searching engine (typically used for web servers).. URL: http://www.best.com/~pjl/software/swish/
SWORD Project => <reply> $who, Free Bible Study Software Development Libraries and Tools. URL: http://www.crosswire.org
SWplayer => <reply> $who, Plays Simon Jansen's Star Wars ASCIImation on a Unix text terminal. URL: http://people.tamu.edu/~cwb2900/
sws => <reply> $who, A Star Wars style scroller using GLUT. URL: http://helllabs.org/~claudio/sws/
swsus => <reply> $who, Software Suspend using pretty near only high level routines. URL: http://falcon.sch.bme.hu/~seasons/linux/swsusp.html
sXid => <reply> $who, All in one suid/sgid monitoring script written in C. URL: ftp://marcus.seva.net/pub/sxid/
Sybase ASE => <reply> $who, Full featured SQL Backend. URL: http://www.sybase.com
SybSQL => <reply> $who, X11-based SQL Query tool for Sybase and MS SQL.. URL: http://www.megsinet.net/~agatka/
sybtable.pl => <reply> $who, Web-based table browser/SQL interface for Sybase databases. URL: http://www.pdamusic.com/computer/sybtable.html
Sybtcl => <reply> $who, Sybase interface for Tcl. URL: http://www.nyx.net/~tpoindex/tcl.html#Sybtcl
Sympa => <reply> $who, A powerful multilingual List Manager- LDAP and SQL features.. URL: http://listes.cru.fr/sympa/

factpacks/Linux.fact  view on Meta::CPAN

TwinTRIS => <reply> $who, Multiplayer tetris clone for all Unix boxes. URL: http://membres.tripod.fr/twintris/
Twist => <reply> $who, Embedded Python text processor. URL: http://pyrite.linuxbox.com/twist/twist.html
Twisted Reality => <reply> $who, A fully buzzword-compliant roleplaying system.. URL: http://www.twistedmatrix.com/
twonz => <reply> $who, secure hash calculator for password management. URL: http://www.pobox.com/~graydon/twonz/twonz.html
twz1jdbcForMysql => <reply> $who, A type 4 JDBC driver for MySQL. URL: http://www.voicenet.com/~zellert/tjFM/
txt2html => <reply> $who, Converts plain text to HTML. URL: http://www.thehouse.org/txt2html/
txt2pdf => <reply> $who, A very flexible and powerful PERL5 converter from text files to PDF. URL: http://www.sanface.com/
txt2pdf.cgi => <reply> $who, a very flexible PERL cgi-bin application based on the powerful txt2pdf script. URL: http://www.sanface.com/
Tya => <reply> $who, JIT-compiler. URL: ftp://gonzalez.cyberus.ca/pub/Linux/java/
Type decomposition library => <reply> $who, C++ library for discovering compile-time type information.. URL: http://lazy.ton.tut.fi/type_decomposition/index.html
typespeed => <reply> $who, Type speed testing program, gives your fingers' CPS. URL: http://www.sicom.fi/~bestis/typespeed.html
Typhoon RDBMS => <reply> $who, Relational database library.. URL: http://users.footprints.net/~kaz/typhoon.html
TZO Internet Naming System => <reply> $who, Dynamic DNS Software client. URL: http://www.tzo.com/
U.S. Street Map database => <reply> $who, Complete digital street map of the U.S.. URL: http://perens.com/FreeSoftware/
U2NT => <reply> $who, Unix to NT porting library. URL: http://www.ede.com/free/u2nt/
UAE => <reply> $who, Software emulation of the hardware of theCommodore Amiga 500/1000/2000. URL: http://www.freiburg.linux.de/~uae/
ubiqx library => <reply> $who, Base-level utility modules from undergrad CS books.. URL: http://ubiqx.org/
UCD-SNMP => <reply> $who, Various tools relating to the Simple Network Managemnet Protocol. URL: http://ucd-snmp.ucdavis.edu/
UCDP => <reply> $who, A console-based Linux CD-player with a nice interface.. URL: http://home.sol.no/~upstream/ucdp/
uCON => <reply> $who, uCON - SNES/Genesis Image Conversion/Edit/Patch/Fix Utility. URL: http://spliceworld.parodius.com/
UConvert => <reply> $who, A units conversion program with thousdands of possible conversions.. URL: http://www.posc.org/

factpacks/Linux.fact  view on Meta::CPAN

unixODBC => <reply> $who, Provides ODBC 3 connectivity for Unix. URL: http://www.unixodbc.org/
Unlimited Simulator => <reply> $who, General purpose simulator. URL: http://www.hozelhoff.com/~brunobg/
UnLockPRO => <reply> $who, ZZT world lock manipulator. URL: http://www.linuxstart.com/~kvance/sw_byname.html#U
unrar => <reply> $who, extract, test and view RAR archives. URL: ftp://ftp.elf.stuba.sk/pub/pc/pack/
Unreal Tournament demo => <reply> $who, Unreal Tournament demo (client/server). URL: http://www.unrealtournament.com/
UnrealIRCd => <reply> $who, Advanced IRC daemon based off EliteIRCd with numerous of new features. URL: http://toybox.flirt.org/~cmunk/unreal/
unzip => <reply> $who, Unpacks .zip files such as those made by pkzip under DOS. URL: http://www.cdrom.com/pub/infozip/
UOOS => <reply> $who, Ultima Online Game Server Emulator. URL: http://www.uoos.com/
up => <reply> $who, Replacement program for uptime.. URL: http://www.burdell.org/up.php3
uparrow => <reply> $who, tcl command loop. URL: http://www.aist.go.jp/NIBH/~tomh/
upd => <reply> $who, Makes hiscores of your best five uptimes, ready for when showing off!. URL: http://tisprut.n3.net/
UPS => <reply> $who, Light C and C++ debugger under X11.. URL: http://www.concerto.demon.co.uk/UPS/
UPSomatic => <reply> $who, UPS parcel pricing for US sources, all destinations. URL: ftp://ftp.linux.org.uk/pub/linux/alan/UPSomatic/
Uptime client => <reply> $who, Keep track of your uptime and compare it with other hosts.. URL: http://uptime.hexon.cx/
Uptime Daemon => <reply> $who, Constantly checks your current uptime against uptime records. URL: http://www.vistasafe.com/ud/
Uptime Record Suite => <reply> $who, Records the record uptime. URL: http://jaeger.festing.org/projects/uptime-record/
Uptimed => <reply> $who, Uptime record daemon keeping track of the highest uptimes the system ever had. URL: http://capsi.cx/?q=code/uptimed
uptimer => <reply> $who, Adds the current uptime to your .sig file. URL: http://212.19.67.58/
uptime_applet => <reply> $who, Gnome applet which will display your system uptime. URL: http://outsole.com/uptime.shtml
UPX => <reply> $who, powerful executable packer. URL: http://wildsau.idv.uni-linz.ac.at/mfx/upx.html
URBAN => <reply> $who, A nice shoot-'em-up game for Linux and DOS, lots of blood and gore.. URL: http://urban.home.dhs.org/

factpacks/Linux.fact  view on Meta::CPAN

xhangglider => <reply> $who, X-based program that makes hanggliders fly in the background of your screen.. URL: http://plaza.harmonix.ne.jp/~redstar/xhang-en.html
xhdbench => <reply> $who, Qt-based X-program for testing the output speed of severaldevices. URL: ftp://metalab.unc.edu/pub/Linux/system/benchmark/
XHourGas => <reply> $who, An alarm clock that exhibits what can happen with an improper diet. URL: http://qu.dhs.org/xhourgas/xhourgas.html
XHpcd => <reply> $who, A GIMP plugin to read Kodak PhotoCD images. URL: http://studenti.csr.unibo.it/~abaldoni/hpcd.html
XIAS => <reply> $who, Tcl/Tk-based front-end to IAS (N64 backup device transfer tool). URL: http://www.dextrose.com/info/0719xias-1_1_tar.htm
Xicq / KXicq => <reply> $who, An ICQ client for use in both console and X11.. URL: http://www.xtrophy.dk/xicq/
xinetd => <reply> $who, Powerful inetd replacement. URL: http://www.synack.net/xinetd/
Xing MP3 Encoder => <reply> $who, MP3 encoder. URL: http://www.xingtech.com/mp3/encoder/
xipdump => <reply> $who, displays ip packets using the X Window System.. URL: http://www.epita.fr/~lse/xipdump/
xIrc => <reply> $who, . URL: http://www.croftj.net/~xirc/
Xitami => <reply> $who, A fast, portable, and best of all free multi-threaded web server. URL: http://www.xitami.com/
XKeyCaps => <reply> $who, A graphical front-end to xmodmap.. URL: http://www.jwz.org/xkeycaps/
XKobo => <reply> $who, Fastpaced multiway scrolling shoot-em-up.. URL: ftp://metalab.unc.edu/pub/Linux/games/arcade/
Xlab => <reply> $who, Automates any X application by recording and playing backX-events.. URL: http://www.alphalink.com.au/~mvertes/xlab.html
xlHtml => <reply> $who, XLS to HTML converter. URL: http://www.gate.net/~ddata/xlHtml/index.htm
xlnotice => <reply> $who, Login time public notice board for X. URL: http://www.dcc.unicamp.br/~guazzibe/XLN/
Xlockmore => <reply> $who, screen saver / locker for the X Window System. URL: http://www.tux.org/~bagleyd/xlockmore.html
Xlogmaster => <reply> $who, Tool to monitor logfiles and hardware status. URL: http://www.gnu.org/software/xlogmaster/xlogmaster.html
XLogMonitor => <reply> $who, Tool for monitoring linux log's. URL: http://members.xoom.com/chaosmaker/linux/
xls2xml => <reply> $who, A free converter from Microsoft Excel to XML, and a free C library. URL: http://arturo.directmail.org/filtersweb/
Xmahjongg => <reply> $who, Colorful X solitaire Mah Jongg game. URL: http://www.lcdf.org/xmahjongg/

factpacks/jargon-split.fact  view on Meta::CPAN

arc2 is  feather}, {zip}. 
arc wars is  [primarily MSDOS] n. {holy wars} over which archiving   program one should use.  The first arc war was sparked when System   Enhancement Associates (SEA) sued PKWare for copyright and   trademark infringement on its ARC program.  PKWare'...
arc wars2 is  and speed while largely   retaining compatibility (it introduced a new compression type that   could be disabled for backward-compatibility).  PKWare settled out   of court to avoid enormous legal costs (both SEA and PKWare are   small ...
arc wars3 is  of PKARC was   changed to PKPAK.  The public backlash against SEA for bringing   suit helped to hasten the demise of ARC as a standard when PKWare   and others introduced new, incompatible archivers with better   compression algorithms....
archive is  n. 1. A collection of several files bundled into one file   by a program such as `ar(1)', `tar(1)', `cpio(1)',   or {arc} for shipment or archiving (sense 2).  See also {tar   and feather}.  2. A collection of files or archives (sense 1) ...
archive2 is  {FTP} or an email server. 
arena is  [UNIX] n. The area of memory attached to a process by   `brk(2)' and `sbrk(2)' and used by `malloc(3)' as   dynamic storage.  So named from a semi-mythical `malloc   corrupt arena' message supposedly emitted when some early versions   becam...
arena2 is  {aliasing   bug}, {memory leak}, {smash the stack}. 
arg is  /arg/ n. Abbreviation for `argument' (to a function),   used so often as to have become a new word (like `piano' from   `pianoforte').  "The sine function takes 1 arg, but the   arc-tangent function can take either 1 or 2 args."  Compare   {p...
armor-plated is  n. Syn. for {bulletproof}.
asbestos is  adj. Used as a modifier to anything intended to protect   one from {flame}s.  Important cases of this include {asbestos   longjohns} and {asbestos cork award}, but it is used more   generally.
asbestos cork award is  n. Once, long ago at MIT, there was a {flamer}   so consistently obnoxious that another hacker designed, had made,   and distributed posters announcing that said flamer had been   nominated for the `asbestos cork award'.  Pers...
asbestos cork award2 is  application of the cork should consult the   etymology under {flame}.  Since then, it is agreed that only a   select few have risen to the heights of bombast required to earn   this dubious dignity --- but there is no agreeme...
asbestos longjohns is  n. Notional garments often donned by {USENET}   posters just before emitting a remark they expect will elicit   {flamage}.  This is the most common of the {asbestos} coinages.   Also `asbestos underwear', `asbestos overcoat', e...
attoparsec is  n. `atto-' is the standard SI prefix for   multiplication by 10^{-18}.  A parsec (parallax-second) is   3.26 light-years; an attoparsec is thus 3.26 * 10^{-18} light   years, or about 3.1 cm (thus, 1 attoparsec/{microfortnight}   equal...
attoparsec2 is  be in use   (though probably not very seriously) among hackers in the U.K.  See   {micro-}. 
autobogotiphobia is  /aw'to-boh-got`*-foh'bee-*/ n. See {bogotify}.
automagically is  /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv.   Automatically, but in a way that, for some reason (typically   because it is too complicated, or too ugly, or perhaps even too   trivial), the speaker doesn't feel like explaining ...
automagically2 is  compiler generates C, then automagically   invokes `cc(1)' to produce an executable." 
avatar is  [CMU, Tektronix] n. Syn. {root}, {superuser}.  There   are quite a few UNIX machines on which the name of the superuser   account is `avatar' rather than `root'.  This quirk was   originated by a CMU hacker who disliked the term `superuser...
avatar2 is  hacker at Tektronix. 
awk is  1. n. [UNIX techspeak] An interpreted language for massaging   text data developed by Alfred Aho, Peter Weinberger, and Brian   Kernighan (the name is from their initials).  It is characterized   by C-like syntax, a declaration-free approach ...
awk2 is  associative arrays, and field-oriented text   processing.  See also {Perl}.  2. n.  Editing term for an   expression awkward to manipulate through normal {regexp}   facilities (for example, one containing a {newline}).  3. vt. To   process d...
awk3 is  security of a system deliberately left   in place by designers or maintainers.  The motivation for this is   not always sinister; some operating systems, for example, come out   of the box with privileged accounts intended for use by field  ...

factpacks/jargon-split.fact  view on Meta::CPAN

book titles is  There is a tradition in hackerdom of informally   tagging important textbooks and standards documents with the   dominant color of their covers or with some other conspicuous   feature of the cover.  Many of these are described in thi...
book titles2 is  {Aluminum Book}, {Blue Book},   {Cinderella Book}, {Devil Book}, {Dragon Book}, {Green   Book}, {Orange Book}, {Pink-Shirt Book}, {Purple Book},   {Red Book}, {Silver Book}, {White Book}, {Wizard Book},   {Yellow Book}, and {bible}.b...
book titles3 is  v.,n. To load and   initialize the operating system on a machine.  This usage is no   longer jargon (having passed into techspeak) but has given rise to   some derivatives that are still jargon.   The derivative `reboot' implies that...
book titles4 is  that the boot is a {bounce} intended to clear   some state of {wedgitude}.  This is sometimes used of human   thought processes, as in the following exchange "You've lost   me." "OK, reboot.  Here's the theory...."   This term is als...
book titles5 is  power-off condition) and `warm boot' (with the CPU and all   devices already powered up, as after a hardware reset or software   crash).   Another variant `soft boot', reinitialization of only part of a   system, under control of oth...
book titles6 is  the {mess-dos} emulator, control-alt-insert will   cause a soft-boot of the emulator, while leaving the rest of the   system running."   Opposed to this there is `hard boot', which connotes hostility   towards or frustration with the...
book titles7 is  hard-boot this losing Sun." "I recommend booting it hard."   Historical note this term derives from `bootstrap loader', a short   program that was read in from cards or paper tape, or toggled in   from the front panel switches.  This...
book titles8 is  were expended on making it short in order to   minimize the labor and chance of error involved in toggling it in),   but was just smart enough to read in a slightly more complex   program (usually from a card or paper tape reader), t...
book titles9 is  turn was smart enough to read the   application or operating system from a magnetic tape drive or disk   drive.  Thus, in successive steps, the computer `pulled itself up   by its bootstraps' to a useful operating state.  Nowadays th...
book titles10 is  and reads the first   stage in from a fixed location on the disk, called the `boot   block'.  When this program gains control, it is powerful enough to   load the actual OS and hand control over to it. 
bottom-up implementation is  n. Hackish opposite of the techspeak term   `top-down design'.  It is now received wisdom in most   programming cultures that it is best to design from higher levels   of abstraction down to lower, specifying sequences of...
bottom-up implementation2 is  to actual code.  Hackers often find   (especially in exploratory designs that cannot be closely   specified in advance) that it works best to *build* things in   the opposite order, by writing and testing a clean set of ...
bounce is  v. 1. [perhaps from the image of a thrown ball bouncing   off a wall] An electronic mail message that is undeliverable and   returns an error notification to the sender is said to `bounce'.   See also {bounce message}.  2. [Stanford] To pl...
bounce2 is  Power Lab} building used by the   Stanford AI Lab in the 1970s, there was a volleyball court on the   front lawn.  From 5 P.M. to 7 P.M. was the scheduled   maintenance time for the computer, so every afternoon at 5 the   computer would b...
bounce3 is  voice   would cry, "Now hear this bounce, bounce!" followed by Brian   McCune loudly bouncing a volleyball on the floor outside the   offices of known volleyballers.  3. To engage in sexual   intercourse; prob. from the expression `bounci...
bounce4 is  psychosexually loaded "Bounce on me   too, Tigger!" from the "Winnie-the-Pooh" books.  Compare   {boink}.  4. To casually reboot a system in order to clear up a   transient problem.  Reported primarily among {VMS} users.   5. [IBM] To {po...
bounce message is  [UNIX] n. Notification message returned to sender by   a site unable to relay {email} to the intended {{Internet address}}   recipient or the next link in a {bang path} (see {bounce}).   Reasons might include a nonexistent or missp...
bounce message2 is  Bounce messages can themselves fail, with   occasionally ugly results; see {sorcerer's apprentice mode}.   The term `bounce mail' is also common. 
box is  n. 1. A computer; esp. in the construction `foo box'   where foo is some functional qualifier, like `graphics', or   the name of an OS (thus, `UNIX box', `MS-DOS box', etc.)  "We   preprocess the data on UNIX boxes before handing it up to the...
box2 is  qualification but within an   SNA-using site, this refers specifically to an IBM front-end   processor or FEP /F-E-P/.  An FEP is a small computer necessary   to enable an IBM {mainframe} to communicate beyond the limits of   the {dinosaur p...
box3 is  cry   that goes up when an SNA network goes down "Looks like the   {box} has fallen over." (See {fall over}.) See also   {IBM}, {fear and loathing}, {fepped out}, {Blue   Glue}. 
boxed comments is  n. Comments (explanatory notes attached to program   instructions) that occupy several lines by themselves; so called   because in assembler and C code they are often surrounded by a box   in a style something like this   Common va...

factpacks/jargon-split.fact  view on Meta::CPAN

brute force and ignorance is  n. A popular design technique at many   software houses --- {brute force} coding unrelieved by any   knowledge of how problems have been previously solved in elegant   ways.  Dogmatic adherence to design methodologies te...
brute force and ignorance2 is  early {larval stage}   programming; unfortunately, many never outgrow it.  Often   abbreviated BFI "Gak, they used a bubble sort!  That's strictly   from BFI."  Compare {bogosity}. 
BSD is  /B-S-D/ n. [acronym for `Berkeley System Distribution'] a   family of {{UNIX}} versions for the DEC {VAX} and PDP-11   developed by Bill Joy and others at {Berzerkeley} starting around   1980, incorporating paged virtual memory, TCP/IP networ...
BSD2 is  The BSD versions (4.1, 4.2,   and 4.3) and the commercial versions derived from them (SunOS, ULTRIX,   and Mt. Xinu) held the technical lead in the UNIX world until   AT&T's successful standardization efforts after about 1986, and are   stil...
bubble sort is  n. Techspeak for a particular sorting technique in   which pairs of adjacent values in the list to be sorted are   compared and interchanged if they are out of order; thus, list   entries `bubble upward' in the list until they bump in...
bubble sort2 is  is not very good relative to other   methods and is the one typically stumbled on by {na"ive} and   untutored programmers, hackers consider it the {canonical}   example of a na"ive algorithm.  The canonical example of a really   *bad...
bubble sort3 is  might be used   out of ignorance, but any use of bogo-sort could issue only from   brain damage or willful perversity. 
bucky bits is  /buh'kee bits/ n. 1. obs. The bits produced by the   CONTROL and META shift keys on a SAIL keyboard, resulting in a   9-bit keyboard character set.  The MIT AI TV (Knight) keyboards   extended this with TOP and separate left and right ...
bucky bits2 is  character set; later, LISP Machines   added such keys as SUPER, HYPER, and GREEK (see {space-cadet   keyboard}).  2. By extension, bits associated with `extra' shift   keys on any keyboard, e.g., the ALT on an IBM PC or command and   ...
bucky bits3 is  that `bucky bits' were named for Buckminster Fuller   during a period when he was consulting at Stanford.  Actually,   `Bucky' was Niklaus Wirth's nickname when *he* was at   Stanford; he first suggested the idea of an EDIT key to set...
bucky bits4 is  character.  This was used in a   number of editors written at Stanford or in its environs (TV-EDIT   and NLS being the best-known).  The term spread to MIT and CMU   early and is now in general use.  See {double bucky},   {quadruple b...
buffer overflow is  n. What happens when you try to stuff more data   into a buffer (holding area) than it can handle.  This may be due   to a mismatch in the processing rates of the producing and   consuming processes (see {overrun}), or because the...
buffer overflow2 is  data that must accumulate before a   piece of it can be processed. For example, in a text-processing   tool that {crunch}es a line at a time, a short line buffer can   result in {lossage} as input from a long line overflows the  ...
buffer overflow3 is  defensive programming   would check for overflow on each character and stop accepting data   when the buffer is full up.  The term is used of and by humans in a   metaphorical sense. "What time did I agree to meet you?  My buffer...
buffer overflow4 is  phone my buffer is   going to overflow."  See also {spam}, {overrun screw}. 
bug is  n. An unwanted and unintended property of a program or hardware,   esp. one that causes it to malfunction.  Antonym of {feature}.   Examples "There's a bug in the editor it writes things out   backwards."  "The system crashed because of a har...
bug2 is  few bugs"  (i.e., Fred is a good   guy, but he has a few personality problems).   Historical note Some have said this term came from telephone   company usage, in which "bugs in a telephone cable" were blamed   for noisy lines, but this appe...
bug3 is  Admiral Grace Hopper (an early computing pioneer better   known for inventing {COBOL}) liked to tell a story in which a   technician solved a persistent {glitch} in the Harvard Mark II   machine by pulling an actual insect out from between t...
bug4 is  subsequently promulgated   {bug} in its hackish sense as a joke about the incident (though,   as she was careful to admit, she was not there when it happened).   For many years the logbook associated with the incident and the   actual bug in...
bug5 is  Naval   Surface Warfare Center.  The entire story, with a picture of the   logbook and the moth taped into it, is recorded in the `Annals of   the History of Computing', Vol. 3, No. 3 (July 1981), pp. 285--286.   The text of the log entry (f...
bug6 is  Panel F (moth) in relay.  First actual case of bug being   found".  This wording seems to establish that the term was already in use   at the time in its current specific sense.  Indeed, the use of   `bug' to mean an industrial defect was al...

factpacks/jargon-split.fact  view on Meta::CPAN

bum2 is  whatever it was removed from (without   changing function; this distinguishes the process from a   {featurectomy}).  3. n. A small change to an algorithm, program,   or hardware device to make it more efficient.  "This hardware bum   makes t...
bum3 is  uncommon, largely   superseded by v. {tune} (and n. {tweak}, {hack}), though   none of these exactly capture sense 2.  All these uses are rare in   Commonwealth hackish, because in the parent dialects of English   `bum' is a rude synonym for...
bump is  vt. Synonym for increment.  Has the same meaning as   C's ++ operator.  Used esp. of counter variables, pointers, and index   dummies in `for', `while', and `do-while' loops.
burble is  [from Lewis Carroll's "Jabberwocky"] v. Like {flame},   but connotes that the source is truly clueless and ineffectual   (mere flamers can be competent).  A term of deep contempt.   "There's some guy on the phone burbling about how he got ...
buried treasure is  n. A surprising piece of code found in some   program.  While usually not wrong, it tends to vary from {crufty}   to {bletcherous}, and has lain undiscovered only because it was   functionally correct, however horrible it is.  Use...
buried treasure2 is  anything *but* treasure.  Buried   treasure almost always needs to be dug up and removed.  "I just   found that the scheduler sorts its queue using {bubble sort}!   Buried treasure!" 
burn-in period is  n. 1. A factory test designed to catch systems   with {marginal} components before they get out the door; the   theory is that burn-in will protect customers by outwaiting the   steepest part of the {bathtub curve} (see {infant   m...
burn-in period2 is  length in which a person   using a computer is so intensely involved in his project that he   forgets basic needs such as food, drink, sleep, etc.  Warning   Excessive burn-in can lead to burn-out.  See {hack mode},   {larval stag...
burst page is  n. Syn. {banner}, sense 1.
busy-wait is  vi. Used of human behavior, conveys that the subject is   busy waiting for someone or something, intends to move instantly as   soon as it shows up, and thus cannot do anything else at the   moment.  "Can't talk now, I'm busy-waiting ti...
busy-wait2 is  `busy-wait' means to wait on an event by   {spin}ning through a tight or timed-delay loop that polls for   the event on each pass, as opposed to setting up an interrupt   handler and continuing execution on another part of the task.  T...
busy-wait3 is  time-sharing systems where   a busy-waiting program may {hog} the processor. 
buzz is  vi. 1. Of a program, to run with no indication of progress   and perhaps without guarantee of ever finishing; esp. said of   programs thought to be executing tight loops of code.  A program   that is buzzing appears to be {catatonic}, but yo...
buzz2 is  buzzing loop may eventually end of its own   accord.  "The program buzzes for about 10 seconds trying to sort   all the names into order."  See {spin}; see also {grovel}.   2. [ETA Systems] To test a wire or printed circuit trace for   cont...
buzz3 is   Some wire   faults will pass DC tests but fail a buzz test.  3. To process an   array or list in sequence, doing the same thing to each element.   "This loop buzzes through the tz array looking for a terminator   type." 
BWQ is  /B-W-Q/ [IBM acronym, `Buzz Word Quotient'] The   percentage of buzzwords in a speech or documents.  Usually roughly   proportional to {bogosity}.  See {TLA}.
by hand is  adv. Said of an operation (especially a repetitive,   trivial, and/or tedious one) that ought to be performed   automatically by the computer, but which a hacker instead has to   step tediously through.  "My mailer doesn't have a command ...
by hand2 is  replying to, so I have to do it   by hand."  This does not necessarily mean the speaker has to   retype a copy of the message; it might refer to, say, dropping into   a {subshell} from the mailer, making a copy of one's mailbox file,   r...
by hand3 is  and bottom of the   message in question, deleting the rest of the file, inserting `>'   characters on each line, writing the file, leaving the editor,   returning to the mailer, reading the file in, and later remembering   to delete the ...
byte is  /bit/ [techspeak] n. A unit of memory or data equal to   the amount used to represent one character; on modern architectures   this is usually 8 bits, but may be 9 on 36-bit machines.  Some   older architectures used `byte' for quantities of...
byte2 is  `bytes' that were actually bitfields of   1 to 36 bits!  These usages are now obsolete, and even 9-bit bytes   have become rare in the general trend toward power-of-2 word sizes.   Historical note The term originated in 1956 during the earl...

factpacks/jargon-split.fact  view on Meta::CPAN

Church of the SubGenius is  n. A mutant offshoot of   {Discordianism} launched in 1981 as a spoof of fundamentalist   Christianity by the `Reverend' Ivan Stang, a brilliant satirist   with a gift for promotion.  Popular among hackers as a rich source...
Church of the SubGenius2 is  "Bob" the divine   drilling-equipment salesman, the Benevolent Space Xists, and the   Stark Fist of Removal.  Much SubGenius theory is concerned with the   acquisition of the mystical substance or quality of   `slack'. 
Cinderella Book is  [CMU] n. `Introduction to Automata Theory,   Languages, and Computation', by John Hopcroft and Jeffrey Ullman,   (Addison-Wesley, 1979).  So called because the cover depicts a girl   (putatively Cinderella) sitting in front of a R...
Cinderella Book2 is  coming out of it.  The back cover depicts the   girl with the device in shambles after she has pulled on the rope.   See also {{book titles}}. 
CI$ is  // n. Hackerism for `CIS', CompuServe Information Service.   The dollar sign refers to CompuServe's rather steep line charges.  Often   used in {sig block}s just before a CompuServe address.  Syn.   {Compu$erve}.
Classic C is  /klas'ik C/ [a play on `Coke Classic'] n. The   C programming language as defined in the first edition of {K&R},   with some small additions.  It is also known as `K&R C'.  The name   came into use while C was being standardized by the ...
Classic C2 is  This is sometimes applied   elsewhere thus, `X Classic', where X = Star Trek (referring to the   original TV series) or X = PC (referring to IBM's ISA-bus machines   as opposed to the PS/2 series).  This construction is especially   us...
Classic C3 is  versions are considered   serious losers relative to the older ones. 
clean is  1. adj. Used of hardware or software designs, implies   `elegance in the small', that is, a design or implementation that   may not hold any surprises but does things in a way that is   reasonably intuitive and relatively easy to comprehend...
clean2 is  or {crufty}.  2. v. To remove   unneeded or undesired files in a effort to reduce clutter  "I'm   cleaning up my account." "I cleaned up the garbage and now have   100 Meg free on that partition." 
CLM is  /C-L-M/ [Sun `Career Limiting Move'] 1. n. An action   endangering one's future prospects of getting plum projects and   raises, and possibly one's job  "His Halloween costume was a   parody of his manager.  He won the prize for `best CLM'." ...
CLM2 is  discovered by a   customer and obviously missed earlier because of poor testing   "That's a CLM bug!" 
clobber is  vt. To overwrite, usually unintentionally "I walked off   the end of the array and clobbered the stack."  Compare {mung},   {scribble}, {trash}, and {smash the stack}.
clocks is  n. Processor logic cycles, so called because each   generally corresponds to one clock pulse in the processor's timing.   The relative execution times of instructions on a machine are   usually discussed in clocks rather than absolute frac...
clocks2 is  is that clock speeds for various   models of the machine may increase as technology improves, and it   is usually the relative times one is interested in when discussing   the instruction set.  Compare {cycle}. 
clone is  n. 1. An exact duplicate "Our product is a clone of   their product."  Implies a legal reimplementation from   documentation or by reverse-engineering.  Also connotes lower   price.  2. A shoddy, spurious copy "Their product is a   clone of...
clone2 is  likely violating   copyright, patent, or trade secret protections "Your   product is a clone of my product."  This use implies legal   action is pending.  4. A `PC clone'; a PC-BUS/ISA or   EISA-compatible 80x86-based microcomputer (this u...
clone3 is   These invariably have much   more bang for the buck than the IBM archetypes they resemble.   5. In the construction `UNIX clone' An OS designed to deliver   a UNIX-lookalike environment without UNIX license fees, or with   additional `mis...
clone4 is  real-time programming.  6. v. To make an exact copy of something.   "Let me clone that" might mean "I want to borrow that paper so I   can make a photocopy" or "Let me get a copy of that file before   you {mung} it". 
clover key is  [Mac users] n. See {command key}.
clustergeeking is  /kluh'st*r-gee`king/ [CMU] n.  Spending more time   at a computer cluster doing CS homework than most people spend   breathing.

factpacks/jargon-split.fact  view on Meta::CPAN

Compu$erve is  n. See {CI$}.
computer confetti is  n. Syn. {chad}.  Though this term is common,   this use of the punched-card chad is not a good idea, as the pieces   are stiff and have sharp corners that could injure the eyes.  GLS   reports that he once attended a wedding at ...
computer confetti2 is  enthusiastically threw chad instead of rice. The   groom later grumbled that he and his bride had spent most of the   evening trying to get the stuff out of their hair. 
computer geek is  n. One who eats (computer) bugs for a living.  One   who fulfills all the dreariest negative stereotypes about hackers   an asocial, malodorous, pasty-faced monomaniac with all the   personality of a cheese grater.  Cannot be used b...
computer geek2 is  hackers; compare black-on-black usage   of `nigger'.  A computer geek may be either a fundamentally   clueless individual or a proto-hacker in {larval stage}.  Also   called `turbo nerd', `turbo geek'.  See also   {clustergeeking},...
computron is  /kom'pyoo-tron`/ n. 1. A notional unit of computing   power combining instruction speed and storage capacity, dimensioned   roughly in instructions-per-second times megabytes-of-main-store   times megabytes-of-mass-storage.  "That machi...
computron2 is  enough computrons!"  This usage is usually   found in metaphors that treat computing power as a fungible   commodity good, like a crop yield or diesel horsepower.  See   {bitty box}, {Get a real computer!}, {toy}, {crank}.   2. A mythi...
computron3 is  quantity of   computation or information, in much the same way that an electron   bears one unit of electric charge (see also {bogon}).  An   elaborate pseudo-scientific theory of computrons has been developed   based on the physical f...
computron4 is  more rapidly as it is heated.  It is argued that an object   melts because the molecules have lost their information about where   they are supposed to be (that is, they have emitted computrons).   This explains why computers get so ho...
computron5 is  computrons.  Conversely, it should be   possible to cool down an object by placing it in the path of a   computron beam.  It is believed that this may also explain why   machines that work at the factory fail in the computer room the  ...
computron6 is  other hardware.   (This theory probably owes something to the "Warlock" stories   by Larry Niven, the best known being "What Good is a Glass   Dagger?", in which magic is fueled by an exhaustible natural   resource called `mana'.) 
condition out is  vt. To prevent a section of code from being compiled   by surrounding it with a conditional-compilation directive whose   condition is always false.  The {canonical} examples are `#if   0' (or `#ifdef notdef', though some find this ...
condom is  n. 1. The protective plastic bag that accompanies 3.5-inch   microfloppy diskettes.  Rarely, also used of (paper) disk envelopes.   Unlike the write protect tab, the condom (when left on) not only   impedes the practice of {SEX} but has al...
condom2 is  drive mechanisms attempt to access the disk --- and   can even fatally frustrate insertion.  2. The protective cladding   on a {light pipe}. 
connector conspiracy is  [probably came into prominence with the   appearance of the KL-10 (one model of the {PDP-10}), none of   whose connectors matched anything else] n. The tendency of   manufacturers (or, by extension, programmers or purveyors o...
connector conspiracy2 is  that don't fit together   with the old stuff, thereby making you buy either all new stuff or   expensive interface devices.  The KL-10 Massbus connector was   actually *patented* by DEC, which reputedly refused to license   ...
connector conspiracy3 is  parties out of   competition for the lucrative Massbus peripherals market.  This is   a source of never-ending frustration for the diehards who maintain   older PDP-10 or VAX systems.  Their CPUs work fine, but they are   st...
connector conspiracy4 is  drives with low   capacity and high power requirements.   In these latter days of open-systems computing this term has fallen   somewhat into disuse, to be replaced by the observation that   "Standards are great!  There are ...
cons is  /konz/ or /kons/ [from LISP] 1. vt. To add a new element   to a specified list, esp. at the top.  "OK, cons picking a   replacement for the console TTY onto the agenda."  2. `cons up'   vt. To synthesize from smaller pieces "to cons up an ex...
cons2 is  fundamental operation for   building structures.  It takes any two objects and returns a   `dot-pair' or two-branched tree with one object hanging from each   branch.  Because the result of a cons is an object, it can be used   to build bin...
cons3 is  think   of it as a sort of universal constructor, and that is where the   jargon meanings spring from. 

factpacks/jargon-split.fact  view on Meta::CPAN

down2 is  mainstream; the extension to other kinds   of machine is still hackish.  2. `go down' vi. To stop   functioning; usually said of the {system}.  The message from the   {console} that every hacker hates to hear from the operator is   "The sys...
down3 is  down',   `bring down' vt. To deactivate purposely, usually for repair work   or {PM}.  "I'm taking the system down to work on that bug in the   tape drive."  Occasionally one hears the word `down' by itself   used as a verb in this vt. sens...
download is  vt. To transfer data or (esp.) code from a larger `host'   system (esp. a {mainframe}) over a digital comm link to a smaller   `client' system, esp. a microcomputer or specialized peripheral.   Oppose {upload}.   However, note that groun...
download2 is  rule for this term.  Space-to-earth transmission is always download   and the reverse upload regardless of the relative size of the   computers involved.  So far the in-space machines have invariably   been smaller; thus the upload/down...
DP is  /D-P/ n. 1. Data Processing.  Listed here because,   according to hackers, use of the term marks one immediately as a   {suit}.  See {DPer}.  2. Common abbrev for {Dissociated   Press}.
DPB is  /d*-pib'/ [from the PDP-10 instruction set] vt. To plop   something down in the middle.  Usage silly.  "DPB   yourself into that couch there."  The connotation would be that   the couch is full except for one slot just big enough for you to  ...
DPB2 is  the name of a PDP-10   instruction that inserts some bits into the middle of some other   bits.  This usage has been kept alive by the Common LISP function   of the same name. 
DPer is  /dee-pee-er/ n. Data Processor.  Hackers are absolutely   amazed that {suit}s use this term self-referentially.   "*Computers* process data, not people!"  See {DP}.
dragon is  n. [MIT] A program similar to a {daemon}, except that it   is not invoked at all, but is instead used by the system to perform   various secondary tasks.  A typical example would be an accounting   program, which keeps track of who is logg...
dragon2 is  etc.  Under ITS, many terminals displayed   a list of people logged in, where they were, what they were   running, etc., along with some random picture (such as a unicorn,   Snoopy, or the Enterprise), which was generated by the `name   d...
dragon3 is  and most other OSes   this would be called a `background demon' or {daemon}.  The   best-known UNIX example of a dragon is `cron(1)'.  At SAIL,   they called this sort of thing a `phantom'. 
Dragon Book is  n. The classic text `Compilers Principles,   Techniques and Tools', by Alfred V. Aho, Ravi Sethi, and Jeffrey D.   Ullman (Addison-Wesley 1986; ISBN 0-201-10088-6), so called because   of the cover design featuring a dragon labeled `c...
Dragon Book2 is  bearing the lance `LALR parser   generator' among his other trappings.  This one is more   specifically known as the `Red Dragon Book' (1986); an earlier   edition, sans Sethi and titled `Principles Of Compiler Design'   (Alfred V. A...
Dragon Book3 is  ISBN   0-201-00022-9), was the `Green Dragon Book' (1977).  (Also `New   Dragon Book', `Old Dragon Book'.)  The horsed knight and the   Green Dragon were warily eying each other at a distance; now the   knight is typing (wearing gaun...
Dragon Book4 is  representation of the Red Dragon's head while the rest   of the beast extends back in normal space.  See also {{book   titles}}. 
drain is  [IBM] v. Syn. for {flush} (sense 2).  Has a connotation   of finality about it; one speaks of draining a device before taking   it offline.
dread high-bit disease is  n. A condition endemic to PRIME (a.k.a.   PR1ME) minicomputers that results in all the characters having   their high (0x80) bit ON rather than OFF.  This of course makes   transporting files to other systems much more diff...
dread high-bit disease2 is  devices.  It is reported that   PRIME adopted the reversed-8-bit convention in order to save   25 cents per serial line per machine.  This probably qualifies as one   of the most {cretinous} design tradeoffs ever made.  Se...
dread high-bit disease3 is  (including the Atari 800) have exhibited   similar brain damage. 
DRECNET is  /drek'net/ [from Yiddish/German `dreck', meaning   dirt] n. Deliberate distortion of DECNET, a networking protocol   used in the {VMS} community.  So called because DEC helped write   the Ethernet specification and then (either stupidly o...
DRECNET2 is  violated that spec in the design   of DRECNET in a way that made it incompatible.  See also   {connector conspiracy}. 

factpacks/jargon-split.fact  view on Meta::CPAN

flag is  n. A variable or quantity that can take on one of two   values; a bit, particularly one that is used to indicate one of two   outcomes or is used to control which of two things is to be done.   "This flag controls whether to clear the screen...
flag2 is  status word contains several flag   bits."  Used of humans analogously to {bit}.  See also   {hidden flag}, {mode bit}. 
flag day is  n. A software change that is neither forward- nor   backward-compatible, and which is costly to make and costly to   reverse.  "Can we install that without causing a flag day for all   users?"  This term has nothing to do with the use of...
flag day2 is  two values.  It came into use   when a massive change was made to the {{Multics}} timesharing   system to convert from the old ASCII code to the new one; this was   scheduled for Flag Day (a U.S. holiday), June 14, 1966.  See also   {ba...
flaky is  adj. (var sp. `flakey') Subject to frequent {lossage}.   This use is of course related to the common slang use of the word   to describe a person as eccentric, crazy, or just unreliable.  A   system that is flaky is working, sort of --- eno...
flaky2 is  --- but fails frequently enough that the   odds in favor of finishing what you start are low.  Commonwealth   hackish prefers {dodgy} or {wonky}. 
flamage is  /flay'm*j/ n. Flaming verbiage, esp. high-noise,   low-signal postings to {USENET} or other electronic {fora}.   Often in the phrase `the usual flamage'.  `Flaming' is the act   itself; `flamage' the content; a `flame' is a single flaming...
flame is  1. vi. To post an email message intended to insult and   provoke.  2. vi. To speak incessantly and/or rabidly on some   relatively uninteresting subject or with a patently ridiculous   attitude.  3. vt. Either of senses 1 or 2, directed wit...
flame2 is  people.  4. n. An instance of   flaming.  When a discussion degenerates into useless controversy,   one might tell the participants "Now you're just flaming" or   "Stop all that flamage!" to try to get them to cool down (so to   speak).   ...
flame3 is  to 1976, adds "I   am 99% certain that the use of `flame' originated at WPI.  Those   who made a nuisance of themselves insisting that they needed to use   a TTY for `real work' came to be known as `flaming asshole lusers'.   Other particu...
flame4 is  ravers',   which shortened to `flaming ravers', and ultimately `flamers'.  I   remember someone picking up on the Human Torch pun, but I don't   think `flame on/off' was ever much used at WPI."  See also   {asbestos}.   The term may have b...
flame5 is    places; it is also reported that `flaming' was in use to mean   something like `interminably drawn-out semi-serious discussions'   (late-night bull sessions) at Carleton College during 1968--1971. 
flame bait is  n. A posting intended to trigger a {flame war}, or one   that invites flames in reply.
flame on is  vi.,interj.  1. To begin to {flame}.  The punning   reference to Marvel Comics's Human Torch is no longer widely   recognized.  2. To continue to flame.  See {rave}, {burble}.
flame war is  n. (var. `flamewar') An acrimonious dispute,   especially when conducted on a public electronic forum such as   {USENET}.
flamer is  n. One who habitually {flame}s.  Said esp. of obnoxious   {USENET} personalities.
flap is  vt. 1. To unload a DECtape (so it goes flap, flap,   flap...).  Old-time hackers at MIT tell of the days when the   disk was device 0 and {microtape}s were 1, 2,... and   attempting to flap device 0 would instead start a motor banging   insi...
flap2 is  to unload any   magnetic tape.  See also {macrotape}.  Modern cartridge tapes no   longer actually flap, but the usage has remained. 
flarp is  /flarp/ [Rutgers University] n. Yet another metasyntactic   variable (see {foo}).  Among those who use it, it is associated   with a legend that any program not containing the word `flarp'   somewhere will not work.  The legend is discreetl...
flarp2 is  which *do* contain the magic word. 
flat is  adj. 1. Lacking any complex internal structure.  "That   {bitty box} has only a flat filesystem, not a hierarchical   one."  The verb form is {flatten}.  2. Said of a memory   architecture (like that of the VAX or 680x0) that is one big line...

factpacks/jargon-split.fact  view on Meta::CPAN

JEDR is  // n. Synonymous with {IYFEG}.  At one time, people in   the USENET newsgroup rec.humor.funny tended to use `JEDR'   instead of {IYFEG} or `<ethnic>'; this stemmed from a public   attempt to suppress the group once made by a loser with initi...
JEDR2 is  joke posted there.  (The   practice was {retcon}ned by the expanding these initials as   `Joke Ethnic/Denomination/Race'.)  After much sound and fury JEDR   faded away; this term appears to be doing likewise.  JEDR's only   permanent effect...
JEDR3 is  `sensitivity' arguments for censorship so thoroughly that more   recent attempts to raise them have met with immediate and   near-universal rejection. 
JFCL is  /jif'kl/, /jaf'kl/, /j*-fi'kl/ vt., obs. (alt.   `jfcl') To cancel or annul something.  "Why don't you jfcl that   out?"  The fastest do-nothing instruction on older models of the   PDP-10 happened to be JFCL, which stands for "Jump if Flag ...
JFCL2 is  something useful, but is a very   fast no-operation if no flag is specified.  Geoff Goodfellow, one   of the jargon-1 co-authors, has long had JFCL on the license plate   of his BMW.  Usage rare except among old-time PDP-10 hackers. 
jiffy is  n. 1. The duration of one tick of the system clock on the   computer (see {tick}).  Often one AC cycle time (1/60 second in   the U.S. and Canada, 1/50 most other places), but more recently   1/100 sec has become common.  "The swapper runs ...
jiffy2 is  memory management routine is executed once for   every 6 ticks of the clock, or about ten times a second.   2. Confusingly, the term is sometimes also used for a 1-millisecond   {wall time} interval.  3. Indeterminate time from a few secon...
jiffy3 is  certainly not now and   possibly never.  This is a bit contrary to the more widespread use   of the word.  Oppose {nano}. See also {Real Soon Now}. 
job security is  n. When some piece of code is written in a   particularly {obscure} fashion, and no good reason (such as time   or space optimization) can be discovered, it is often said that the   programmer was attempting to increase his job secur...
job security2 is  for maintenance).  This sour joke   seldom has to be said in full; if two hackers are looking over some   code together and one points at a section and says "job security",   the other one may just nod. 
jock is  n. 1. A programmer who is characterized by large and somewhat   brute-force programs.  See {brute force}.  2. When modified by   another noun, describes a specialist in some particular computing   area.  The compounds `compiler jock' and `sy...
jock2 is  examples of this. 
joe code is  /joh' kohd`/ n. 1. Code that is overly {tense} and   unmaintainable.  "{Perl} may be a handy program, but if you look   at the source, it's complete joe code."  2. Badly written,   possibly buggy code.   Correspondents wishing to remain ...
joe code2 is  the Lawrence Berkeley Laboratory and observed   that usage has drifted slightly; the original sobriquet `Joe code'   was intended in sense 1. 
JR[LN] is  /J-R-L/, /J-R-N/ n. The names JRL and JRN   were sometimes used as example names when discussing a kind of user   ID used under {{TOPS-10}}; they were understood to be the initials   of (fictitious) programmers named `J. Random Loser' and ...
JR[LN]2 is  example, if one said "To log   in, type log one comma jay are en" (that is, "log 1,JRN"), the   listener would have understood that he should use his own computer   ID in place of `JRN'. 
JRST is  /jerst/ [based on the PDP-10 jump instruction] v.,obs. To   suddenly change subjects, with no intention of returning to the   previous topic.  Usage rather rare except among PDP-10 diehards, and   considered silly.  See also {AOS}.
juggling eggs is  vi. Keeping a lot of {state} in your head while   modifying a program.  "Don't bother me now, I'm juggling eggs",   means that an interrupt is likely to result in the program's being   scrambled.  In the classic first-contact SF nov...
juggling eggs2 is  and Jerry Pournelle, an alien describes a   very difficult task by saying "We juggle priceless eggs in   variable gravity."  That is a very hackish use of language.  See   also {hack mode}. 
jump off into never-never land is  [from J. M. Barrie's `Peter   Pan'] v. Same as {branch to Fishkill}, but more common in   technical cultures associated with non-IBM computers that use the   term `jump' rather than `branch'.  Compare {hyperspace}.*...
jump off into never-never land2 is  used both as a   spoken word and a written suffix (like {meg} and {gig} for   megabyte and gigabyte).  See {{quantifiers}}. 

factpacks/jargon-split.fact  view on Meta::CPAN

livelock2 is  waiting for anything, but has a   virtually infinite amount of work to do and can never catch up. 
liveware is  /liv'weir/ n. 1. Synonym for {wetware}.  Less   common.  2. [Cambridge] Vermin. "Waiter, there's some liveware in my   salad..."
lobotomy is  n. 1. What a hacker subjected to formal management   training is said to have undergone.  At IBM and elsewhere this term   is used by both hackers and low-level management; the latter   doubtless intend it as a joke.  2. The act of remov...
lobotomy2 is  order to replace or upgrade it.   Some very cheap {clone} systems are sold in `lobotomized' form   --- everything but the brain. 
locked and loaded is  [from military slang for an M-16 rifle with   magazine inserted and prepared for firing] adj. Said of a removable   disk volume properly prepared for use --- that is, locked into the   drive and with the heads loaded.  Ironicall...
locked and loaded2 is  the power is up, this description is never   used of {{Winchester}} drives (which are named after a rifle). 
locked up is  adj. Syn. for {hung}, {wedged}.
logic bomb is  n. Code surreptitiously inserted in an application or   OS that causes it to perform some destructive or   security-compromising activity whenever specified conditions are   met.  Compare {back door}.
logical is  [from the technical term `logical device', wherein a   physical device is referred to by an arbitrary `logical' name]   adj.  Having the role of.  If a person (say, Les Earnest at SAIL)   who had long held a certain post left and were rep...
logical2 is  known as the `logical' Les   Earnest.  (This does not imply any judgment on the replacement.)   Compare {virtual}.   At Stanford, `logical' compass directions denote a coordinate   system in which `logical north' is toward San Francisco,...
logical3 is  even though logical   north varies between physical (true) north near San Francisco and   physical west near San Jose.  (The best rule of thumb here is that,   by definition, El Camino Real always runs logical north-and-south.)   In givi...
logical4 is  Tarasco   restaurant, get onto {El Camino Bignum} going logical north."   Using the word `logical' helps to prevent the recipient from   worrying about that the fact that the sun is setting almost   directly in front of him.  The concept...
logical5 is  which are almost, but not quite, consistently   labeled with logical rather than physical directions.  A similar   situation exists at MIT.  Route 128 (famous for the electronics   industry that has grown up along it) is a 3-quarters cir...
logical6 is  miles, terminating near the   coastline at each end.  It would be most precise to describe the   two directions along this highway as `clockwise' and   `counterclockwise', but the road signs all say "north" and   "south", respectively.  ...
logical7 is  `logical north' and `logical south', to indicate that they   are conventional directions not corresponding to the usual   denotation for those words.  (If you went logical south along the   entire length of route 128, you would start out...
logical8 is  and finish headed due east!) 
loop through is  vt. To process each element of a list of things.   "Hold on, I've got to loop through my paper mail."  Derives from   the computer-language notion of an iterative loop; compare `cdr   down' (under {cdr}), which is less common among C...
loop through2 is  say `IRP over' after an   obscure pseudo-op in the MIDAS PDP-10 assembler. 
lord high fixer is  [primarily British, from Gilbert & Sullivan's   `lord high executioner'] n. The person in an organization who knows   the most about some aspect of a system.  See {wizard}.
lose  is  [MIT] vi. 1. To fail.  A program loses when it encounters   an exceptional condition or fails to work in the expected manner.   2. To be exceptionally unesthetic or crocky.  3. Of people, to   be obnoxious or unusually stupid (as opposed to...
lose 2 is  4. n. Refers to something that is   {losing}, especially in the phrases "That's a lose!" and "What   a lose!" 

factpacks/jargon-split.fact  view on Meta::CPAN

MFTL is  /M-F-T-L/ [acronym: `My Favorite Toy Language'] 1. adj.   Describes a talk on a programming language design that is heavy on   the syntax (with lots of BNF), sometimes even talks about semantics   (e.g., type systems), but rarely, if ever, h...
MFTL2 is  broadly applied to talks --- even when   the topic is not a programming language --- in which the subject   matter is gone into in unnecessary and meticulous detail at the   sacrifice of any conceptual content.  "Well, it was a typical MFTL...
MFTL3 is  which the developers are   passionate (often to the point of prosyletic zeal) but no one else   cares about.  Applied to the language by those outside the   originating group.  "He cornered me about type resolution in his   MFTL."   The fir...
MFTL4 is  MFTL is   usually to write a compiler for it, then bootstrap the design away   from contamination by lesser languages by writing a compiler for it   in itself.  Thus, the standard put-down question at an MFTL talk is   "Has it been used for...
MFTL5 is  other hand, a language that *cannot* be used to write   its own compiler is beneath contempt... 
mickey is  n. The resolution unit of mouse movement.  It has been   suggested that the `disney' will become a benchmark unit for   animation graphics performance.
mickey mouse program is  n. North American equivalent of a {noddy}   (that is, trivial) program.  Doesn't necessarily have the   belittling connotations of mainstream slang "Oh, that's just   mickey mouse stuff!"; sometimes trivial programs can be ve...
micro- is  pref. 1. Very small; this is the root of its use as a   quantifier prefix.  2. A quantifier prefix, calling for   multiplication by 10^{-6} (see {{quantifiers}}).  Neither   of these uses is peculiar to hackers, but hackers tend to fling  ...
micro-2 is  countenanced in   standard English.  It is recorded, for example, that one   CS professor used to characterize the standard length of his   lectures as a microcentury --- that is, about 52.6 minutes (see   also {attoparsec}, {nanoacre}, a...
micro-3 is  or human-scale --- that is,   capable of being maintained or comprehended or manipulated by one   human being.  This sense is generalized from `microcomputer',   and is esp. used in contrast with `macro-' (the corresponding   Greek prefix...
micro-4 is  global (or   {macro-}).  Thus a hacker might say that buying a smaller car to   reduce pollution only solves a microproblem; the macroproblem of   getting to work might be better solved by using mass transit,   moving to within walking di...
micro-5 is  microfloppies n. 3.5-inch floppies, as opposed to 5.25-inch   {vanilla} or mini-floppies and the now-obsolete 8-inch variety.   This term may be headed for obsolescence as 5.25-inchers pass out   of use, only to be revived if anybody floa...
micro-6 is  {stiffy}, {minifloppies}. 
microfortnight is  n. About 1.2 sec. The VMS operating system has a   lot of tuning parameters that you can set with the SYSGEN utility,   and one of these is TIMEPROMPTWAIT, the time the system will wait   for an operator to set the correct date and...
microfortnight2 is  current value is bogus.  This time is specified   in microfortnights! 
microLenat is  /mi:-kroh-len'-*t/ n. See {bogosity}.
microReid is  /mi:'kroh-reed/ n. See {bogosity}.
Microsloth Windows is  /mi:'kroh-sloth` win'dohz/ n. Hackerism for   `Microsoft Windows', a windowing system for the IBM-PC which is so   limited by bug-for-bug compatibility with {mess-dos} that it is   agonizingly slow on anything less than a fast ...
microtape is  /mi:'kroh-tayp/ n. Occasionally used to mean a   DECtape, as opposed to a {macrotape}.  A DECtape is a small   reel, about 4 inches in diameter, of magnetic tape about an inch   wide.  Unlike drivers for today's {macrotape}s, microtape ...
microtape2 is  therefore could be   used to support file systems and even for swapping (this was   generally done purely for {hack value}, as they were far too   slow for practical use).  In their heyday they were used in pretty   much the same ways ...
microtape3 is  portable way to save and transport files and programs.  Apparently   the term `microtape' was actually the official term used within   DEC for these tapes until someone coined the word `DECtape',   which, of course, sounded sexier to t...

factpacks/jargon-split.fact  view on Meta::CPAN

newgroup wars3 is  alt.tv.muppets in   early 1990, or any number of specialized abuse groups named after   particularly notorious {flamer}s, e.g., alt.weemba. 
newline is  /n[y]oo'li:n/ n. 1. [techspeak, primarily UNIX] The   ASCII LF character (0001010), used under {{UNIX}} as a text line   terminator.  A Bell-Labs-ism rather than a Berkeleyism;   interestingly (and unusually for UNIX jargon), it is said t...
newline2 is  (Though the term `newline' appears   in ASCII standards, it never caught on in the general computing   world before UNIX).  2. More generally, any magic character,   character sequence, or operation (like Pascal's writeln procedure)   re...
newline3 is  lines.  See   {crlf}, {terpri}. 
NeWS is  /nee'wis/, /n[y]oo'is/ or /n[y]ooz/ [acronym; the   `Network Window System'] n. The road not taken in window systems, an   elegant PostScript-based environment that would almost certainly   have won the standards war with {X} if it hadn't be...
NeWS2 is  is a lesson here that   too many software vendors haven't yet heeded.  Many hackers insist   on the two-syllable pronunciations above as a way of distinguishing   NeWS from {news} (the {netnews} software). 
news is  n. See {netnews}.
newsfroup is  // [USENET] n. Silly synonym for {newsgroup},   originally a typo but now in regular use on USENET's talk.bizarre   and other lunatic-fringe groups.
newsgroup is  [USENET] n. One of {USENET}'s huge collection of   topic groups or {fora}.  Usenet groups can be `unmoderated'   (anyone can post) or `moderated' (submissions are automatically   directed to a moderator, who edits or filters and then po...
newsgroup2 is  parallel {mailing list}s for   Internet people with no netnews access, with postings to the group   automatically propagated to the list and vice versa.  Some   moderated groups (especially those which are actually gatewayed   Internet...
newsgroup3 is  with groups   of postings periodically collected into a single large posting with   an index.   Among the best-known are comp.lang.c (the C-language forum),   comp.arch (on computer architectures), comp.unix.wizards   (for UNIX wizards...
newsgroup4 is  fans), and talk.politics.misc (miscellaneous political   discussions and {flamage}). 
nickle is  /ni'kl/ [from `nickel', common name for the U.S.   5-cent coin] n. A {nybble} + 1; 5 bits.  Reported among   developers for Mattel's GI 1600 (the Intellivision games   processor), a chip with 16-bit-wide RAM but 10-bit-wide ROM.  See   als...
night mode is  n. See {phase} (of people).
Nightmare File System is  n. Pejorative hackerism for Sun's Network   File System (NFS).  In any nontrivial network of Suns where there   is a lot of NFS cross-mounting, when one Sun goes down, the others   often freeze up.  Some machine tries to acc...
Nightmare File System2 is  repeats indefinitely.  This causes it to   appear dead to some messages (what is actually happening is that   it is locked up in what should have been a brief excursion to a   higher {spl} level).  Then another machine trie...
Nightmare File System3 is  pseudo-down machine, and itself becomes   pseudo-down.  The first machine to discover the down one is now   trying both to access the down one and to respond to the pseudo-down   one, so it is even harder to reach.  This sn...
Nightmare File System4 is  network of machines is frozen --- the user can't   even abort the file access that started the problem!  (ITS   partisans are apt to cite this as proof of UNIX's alleged bogosity;   ITS had a working NFS-like shared file sy...
Nightmare File System5 is  1970s.)  See also {broadcast storm}. 
NIL is  /nil/ [from LISP terminology for `false'] No.  Used   in reply to a question, particularly one asked using the   `-P' convention.  See {T}.
NMI is  /N-M-I/ n. Non-Maskable Interrupt.  An IRQ 7 on the PDP-11   or 680[01234]0; the NMI line on an 80{88,[1234]}86.  In contrast   with a {priority interrupt} (which might be ignored, although   that is unlikely), an NMI is *never* ignored.
no-op is  /noh'op/ alt. NOP /nop/ [no operation] n. 1. (also v.)   A machine instruction that does nothing (sometimes used in   assembler-level programming as filler for data or patch areas, or   to overwrite code to be removed in binaries).  See als...
no-op2 is  nothing to a project, or has nothing   going on upstairs, or both.  As in "He's a no-op." 3. Any   operation or sequence of operations with no effect, such as   circling the block without finding a parking space, or putting   money into a ...
no-op3 is  into   the coin-return box, or asking someone for help and being told to   go away.  "Oh, well, that was a no-op."  Hot-and-sour soup (see   {great-wall}) that is insufficiently either is `no-op soup';   so is wonton soup if everybody else...
noddy is  /nod'ee/ [UK: from the children's books] adj.   1. Small and un-useful, but demonstrating a point.  Noddy programs   are often written by people learning a new language or system.  The   archetypal noddy program is {hello, world}.  Noddy co...
noddy2 is  bug of a compiler.  May be used of   real hardware or software to imply that it isn't worth using.   "This editor's a bit noddy."  2. A program that is more or less   instant to produce.  In this use, the term does not necessarily   connot...
noddy3 is  sufficiently trivial   that it can be written and debugged while carrying on (and during   the space of) a normal conversation.  "I'll just throw together a   noddy {awk} script to dump all the first fields."  In North   America this might...
NOMEX underwear is  /noh'meks uhn'-der-weir/ [USENET] n. Syn.   {asbestos longjohns}, used mostly in auto-related mailing lists   and newsgroups.  NOMEX underwear is an actual product available on   the racing equipment market, used as a fire resista...
non-optimal solution is  n. (also `sub-optimal solution') An   astoundingly stupid way to do something.  This term is generally   used in deadpan sarcasm, as its impact is greatest when the person   speaking looks completely serious.  Compare {stunni...
nonlinear is  adj. [scientific computation] 1. Behaving in an erratic and   unpredictable fashion.  When used to describe the behavior of a   machine or program, it suggests that said machine or program is   being forced to run far outside of design ...
nonlinear2 is  induced by unreasonable inputs, or may be triggered   when a more mundane bug sends the computation far off from its   expected course.  2. When describing the behavior of a person,   suggests a tantrum or a {flame}.  "When you talk to...
nonlinear3 is  go nonlinear for hours."  In   this context, `go nonlinear' connotes `blow up out of proportion'   (proportion connotes linearity). 
nontrivial is  adj. Requiring real thought or significant computing   power.  Often used as an understated way of saying that a problem   is quite difficult or impractical, or even entirely unsolvable   ("Proving P=NP is nontrivial").  The preferred ...
nontrivial2 is  See {trivial}, {uninteresting},   {interesting}. 
notwork is  /not'werk/ n. A network, when it is acting {flaky} or is   {down}.  Compare {nyetwork}.  Said at IBM to have orig.   referred to a particular period of flakiness on IBM's VNET   corporate network, ca. 1988; but there are independent repor...
NP- is  /N-P/ pref. Extremely.  Used to modify adjectives   describing a level or quality of difficulty; the connotation is   often `more so than it should be' (NP-complete problems all seem to   be very hard, but so far no one has found a good a pri...
NP-2 is  this algorithm to perform   correctly in every case is NP-annoying."  This is generalized from   the computer-science terms `NP-hard' and `NP-complete'.  NP is   the set of Nondeterministic-Polynomial algorithms, those that can   be complete...
NP-3 is  amount of   time that is a polynomial function of the size of the input; a   solution for one NP-complete problem would solve all the others. 

factpacks/jargon-split.fact  view on Meta::CPAN

offline is  adv. Not now or not here.  "Let's take this   discussion offline."  Specifically used on {USENET} to suggest   that a discussion be taken off a public newsgroup to email.
old fart is  n. Tribal elder.  A title self-assumed with remarkable   frequency by (esp.) USENETters who have been programming for more   than about 25 years; often appears in {sig block}s attached to   Jargon File contributions of great archeologica...
old fart2 is  the second or third person but one of   pride in first person. 
Old Testament is  n. [C programmers] The first edition of {K&R}, the   sacred text describing {Classic C}.
one-line fix is  n. Used (often sarcastically) of a change to a   program that is thought to be trivial or insignificant right up to   the moment it crashes the system.  Usually `cured' by another   one-line fix.  See also {I didn't change anything!}
one-liner wars is  n. A game popular among hackers who code in the   language APL (see {write-only language}).  The objective is to   see who can code the most interesting and/or useful routine in one   line of operators chosen from APL's exceedingly...
one-liner wars2 is  was practiced among {TECO} hackers.      Ken Iverson, the inventor of APL, has been credited with a   one-liner that, given a number N, produces a list of the   prime numbers from 1 to N inclusive.  It looks like this	(2 = 0 +.= T...
one-liner wars3 is  character, the assignment arrow is a   single character, and `i' represents the APL iota. 
ooblick is  /oo'blik/ [from Dr. Seuss's `Bartholomew and the   Oobleck'] n. A bizarre semi-liquid sludge made from cornstarch and   water.  Enjoyed among hackers who make batches during playtime at   parties for its amusing and extremely non-Newtonia...
ooblick2 is  resists rapid motion like a solid and will   even crack when hit by a hammer.  Often found near lasers.   Here is a field-tested ooblick recipe contributed by GLS     1 cup cornstarch     1 cup baking soda     3/4 cup water     N drops o...
ooblick3 is  non-Newtonian as a pure cornstarch   ooblick, but has an appropriately slimy feel.   Some, however, insist that the notion of an ooblick *recipe*   is far too mechanical, and that it is best to add the water in   small increments so that...
ooblick4 is  through as it *becomes* ooblick can be grokked in   fullness by many hands.  For optional ingredients of this   experience, see the "Ceremonial Chemicals" section of   appendix B. 
open is  n. Abbreviation for `open (or left) parenthesis' --- used when   necessary to eliminate oral ambiguity.  To read aloud the LISP form   (DEFUN FOO (X) (PLUS X 1)) one might say "Open defun foo, open   eks close, open, plus eks one, close clos...
open switch is  [IBM prob. from railroading] n. An unresolved   question, issue, or problem.
operating system is  [techspeak] n. (Often abbreviated `OS') The   foundation software of a machine, of course; that which schedules   tasks, allocates storage, and presents a default interface to the   user between applications.  The facilities an o...
operating system2 is  design philosophy exert an extremely   strong influence on programming style and on the technical cultures   that grow up around its host machines.  Hacker folklore has been   shaped primarily by the {{UNIX}}, {{ITS}}, {{TOPS-10...
operating system3 is  {{CP/M}}, {{MS-DOS}}, and   {{Multics}} operating systems (most importantly by ITS and   UNIX). 
Orange Book is  n. The U.S. Government's standards document   `Trusted Computer System Evaluation Criteria, DOD standard   5200.28-STD, December, 1985' which characterize secure computing   architectures and defines levels A1 (most secure) through D ...
Orange Book2 is  can be upgraded to about C1   without excessive pain.  See also {{book titles}}. 
oriental food is  n. Hackers display an intense tropism towards   oriental cuisine, especially Chinese, and especially of the spicier   varieties such as Szechuan and Hunan.  This phenomenon (which has   also been observed in subcultures that overlap...
oriental food2 is  science-fiction fandom) has never been   satisfactorily explained, but is sufficiently intense that one can   assume the target of a hackish dinner expedition to be the best   local Chinese place and be right at least three times o...
oriental food3 is  {stir-fried random},   {laser chicken}, {Yu-Shiang Whole Fish}.  Thai, Indian,   Korean, and Vietnamese cuisines are also quite popular. 
orphan is  [UNIX] n. A process whose parent has died; one inherited by   `init(1)'.  Compare {zombie}.
orphaned i-node is  /or'f*nd i'nohd/ [UNIX] n. 1. [techspeak] A   file that retains storage but no longer appears in the directories   of a filesystem.  2. By extension, a pejorative for any person   serving no useful function within some organizatio...
orthogonal is  [from mathematics] adj. Mutually independent; well   separated; sometimes, irrelevant to.  Used in a generalization of   its mathematical meaning to describe sets of primitives or   capabilities that, like a vector basis in geometry, s...
orthogonal2 is  system and are in some sense   non-overlapping or mutually independent.  For example, in   architectures such as the PDP-11 or VAX where all or nearly all   registers can be used interchangeably in any role with respect to   any instr...
orthogonal3 is  orthogonal.  Or, in   logic, the set of operators `not' and `or' is orthogonal,   but the set `nand', `or', and `not' is not (because any   one of these can be expressed in terms of the others).  Also used   in comments on human disco...
OS is  /O-S/ 1. [Operating System] n. An acronym heavily used in email,   occasionally in speech. 2. n.,obs. On ITS, an output spy.  See   appendix A.
OS/2 is  /O S too/ n. The anointed successor to MS-DOS for Intel   286- and 386-based micros; proof that IBM/Microsoft couldn't get it   right the second time, either.  Mentioning it is usually good for a   cheap laugh among hackers --- the design wa...
OS/22 is  1.x so bad, that 3 years after introduction   you could still count the major {app}s shipping for it on the   fingers of two hands --- in unary.  Often called `Half-an-OS'.  On   January 28, 1991, Microsoft announced that it was dropping it...
OS/23 is  leaving the OS entirely in   the hands of IBM; on January 29 they claimed the media had got the   story wrong, but were vague about how.  It looks as though OS/2 is   moribund.  See {vaporware}, {monstrosity}, {cretinous},   {second-system ...

factpacks/jargon-split.fact  view on Meta::CPAN

parity errors is  pl.n. Little lapses of attention or (in more severe   cases) consciousness, usually brought on by having spent all night   and most of the next day hacking.  "I need to go home and crash;   I'm starting to get a lot of parity errors...
parity errors2 is  nearly always correctable transient error in   RAM hardware. 
Parkinson's Law of Data is  prov. "Data expands to fill the space   available for storage"; buying more memory encourages the use of   more memory-intensive techniques.  It has been observed over the   last 10 years that the memory usage of evolving ...
Parkinson's Law of Data2 is  18 months.  Fortunately, memory density   available for constant dollars tends to double about once every   12 months (see {Moore's Law}); unfortunately, the laws of   physics guarantee that the latter cannot continue ind...
parm is  /parm/ n. Further-compressed form of {param}.  This term   is an IBMism, and written use is almost unknown outside IBM   shops; spoken /parm/ is more widely distributed, but the synonym   {arg} is favored among hackers.  Compare {arg}, {var}...
parse is  [from linguistic terminology] vt. 1. To determine the   syntactic structure of a sentence or other utterance (close to the   standard English meaning).  "That was the one I saw you."  "I   can't parse that."  2. More generally, to understan...
parse2 is  just kretch the glims and then   aos the zotz."  "I can't parse that."  3. Of fish, to have to   remove the bones yourself.  "I object to parsing fish", means "I   don't want to get a whole fish, but a sliced one is okay".  A   `parsed fis...
parse3 is  over   whether `unparsed' should mean `bony', or also mean   `deboned'. 
Pascal is  n. An Algol-descended language designed by Niklaus Wirth   on the CDC 6600 around 1967--68 as an instructional tool for   elementary programming.  This language, designed primarily to keep   students from shooting themselves in the foot an...
Pascal2 is  general-purpose-programming point of view, was   later promoted as a general-purpose tool and, in fact, became the   ancestor of a large family of languages including Modula-2 and   {{Ada}} (see also {bondage-and-discipline language}).  T...
Pascal3 is  probably best summed up by a   devastating (and, in its deadpan way, screamingly funny) 1981 paper   by Brian Kernighan (of {K&R} fame) entitled "Why Pascal is   Not My Favorite Programming Language", which was never formally   published ...
Pascal4 is  Part of his   discussion is worth repeating here, because its criticisms are   still apposite to Pascal itself after ten years of improvement and   could also stand as an indictment of many other   bondage-and-discipline languages.  At th...
Pascal5 is  Pascal, Kernighan wrote     9. There is no escape     This last point is perhaps the most important.  The language is     inadequate but circumscribed, because there is no way to escape its     limitations.  There are no casts to disable ...
Pascal6 is  no way to replace the defective run-time     environment with a sensible one, unless one controls the compiler that     defines the "standard procedures".  The language is closed.      People who use Pascal for serious programming fall in...
Pascal7 is  impotent, it must be extended.  But each group     extends Pascal in its own direction, to make it look like whatever     language they really want.  Extensions for separate compilation,     FORTRAN-like COMMON, string data types, interna...
Pascal8 is  numbers, bit operators, etc., all add to the     utility of the language for one group but destroy its portability to     others.     I feel that it is a mistake to use Pascal for anything much beyond its     original target.  In its pure...
Pascal9 is  for teaching but not for real programming.   Pascal has since been almost entirely displaced (by {C}) from the   niches it had acquired in serious applications and systems   programming, but retains some popularity as a hobbyist language ...
patch is  1. n. A temporary addition to a piece of code, usually as a   {quick-and-dirty} remedy to an existing bug or misfeature.  A   patch may or may not work, and may or may not eventually be   incorporated permanently into the program.  Distingu...
patch2 is  that a patch is generated by more   primitive means than the rest of the program; the classical   examples are instructions modified by using the front panel   switches, and changes made directly to the binary executable of a   program ori...
patch3 is    fix}.  2. vt. To insert a patch into a piece of code.  3. [in the   UNIX world] n. A {diff} (sense 2).  4. A set of modifications to   binaries to be applied by a patching program.  IBM operating   systems often receive updates to the op...
patch4 is  hexadecimal patches.  If you have modified your OS, you   have to disassemble these back to the source.  The patches might   later be corrected by other patches on top of them (patches were   said to "grow scar tissue").  The result was of...

factpacks/jargon-split.fact  view on Meta::CPAN

polygon pusher is  n. A chip designer who spends most of his or her time at   the physical layout level (which requires drawing *lots* of   multi-colored polygons).  Also `rectangle slinger'.
POM is  /P-O-M/ n. Common acronym for {phase of the moon}.  Usage   usually in the phrase `POM-dependent', which means {flaky}.
pop is  [from the operation that removes the top of a stack, and the   fact that procedure return addresses are saved on the stack] (also   capitalized `POP' /pop/) 1. vt. To remove something from a   {stack} or {pdl}.  If a person says he/she has po...
pop2 is  he/she has finally finished   working on it and can now remove it from the list of things hanging   overhead.  2. When a discussion gets to too deep a level of detail   so that the main point of the discussion is being lost, someone   will s...
pop3 is  level!"   The shout is frequently accompanied by an upthrust arm with a   finger pointing to the ceiling. 
POPJ is  /pop'J/ [from a {PDP-10} return-from-subroutine   instruction] n.,v. To return from a digression.  By verb doubling,   "Popj, popj" means roughly "Now let's see, where were we?"   See {RTI}.
posing is  n. On a {MUD}, the use of `' or an equivalent   command to announce to other players that one is taking a certain   physical action that has no effect on the game (it may, however,   serve as a social signal or propaganda device that induc...
posing2 is  example, if one's character name   is Firechild, one might type ` looks delighted at the idea and   begins hacking on the nearest terminal' to broadcast a message that   says "Firechild looks delighted at the idea and begins hacking on   ...
post is  v. To send a message to a {mailing list} or {newsgroup}.   Distinguished in context from `mail'; one might ask, for   example "Are you going to post the patch or mail it to known   users?"
posting is  n. Noun corresp. to v. {post} (but note that   {post} can be nouned).  Distinguished from a `letter' or ordinary   {email} message by the fact that it is broadcast rather than   point-to-point.  It is not clear whether messages sent to a ...
posting2 is  perhaps the best dividing line   is that if you don't know the names of all the potential   recipients, it is a posting. 
postmaster is  n. The email contact and maintenance person at a site   connected to the Internet or UUCPNET.  Often, but not always, the   same as the {admin}.  It is conventional for each machine to have   a `postmaster' address that is aliased to t...
pound on is  vt.  Syn. {bang on}.
power cycle is  vt. (also, `cycle power' or just `cycle') To   power off a machine and then power it on immediately, with the   intention of clearing some kind of {hung} or {gronk}ed state.   Syn. {120 reset}; see also {Big Red Switch}.  Compare   {V...
power cycle2 is  see the   AI Koan in appendix A about Tom Knight and the novice. 
PPN is  /P-P-N/, /pip'n/ [from `Project-Programmer Number'] n. A   user-ID under {{TOPS-10}} and its various mutant progeny at SAIL,   BBN, CompuServe, and elsewhere.  Old-time hackers from the PDP-10   era sometimes use this to refer to user IDs on ...
precedence lossage is  /pre's*-dens los'*j/ [C programmers] n. Coding   error in an expression due to unexpected grouping of arithmetic or   logical operators by the compiler.  Used esp. of certain common   coding errors in C due to the nonintuitivel...
precedence lossage2 is  `<<', and `>>' (for this   reason, experienced C programmers deliberately forget the   language's {baroque} precedence hierarchy and parenthesize   defensively).  Can always be avoided by suitable use of   parentheses.  {LISP}...
precedence lossage3 is  happen in *their* favorite language, which eschews precedence   entirely, requiring one to use explicit parentheses everywhere.   See {aliasing bug}, {memory leak}, {smash the stack},   {fandango on core}, {overrun screw}. 
prepend is  /pree`pend'/ [by analogy with `append'] vt. To   prefix.  As with `append' (but not `prefix' or `suffix' as a   verb), the direct object is always the thing being added and not   the original word (or character string, or whatever).  "If ...
prepend2 is  translation routine will pass   it through unaltered." 

factpacks/jargon-split.fact  view on Meta::CPAN

proprietary is  adj. 1. In {marketroid}-speak, superior; implies a   product imbued with exclusive magic by the unmatched brilliance of   the company's hardware or software designers.  2. In the language   of hackers and users, inferior; implies a pr...
proprietary2 is  standards, and thus one that puts the customer at the   mercy of a vendor able to gouge freely on service and upgrade   charges after the initial sale has locked the customer in (that's   assuming it wasn't too expensive in the first...
protocol is  n. As used by hackers, this never refers to niceties   about the proper form for addressing letters to the Papal Nuncio or   the order in which one should use the forks in a Russian-style   place setting; hackers don't care about such th...
protocol2 is  set of rules that allow different machines   or pieces of software to coordinate with each other without   ambiguity.  So, for example, it does include niceties about the   proper form for addressing packets on a network or the order in...
protocol3 is  Philosophers Problem.   It implies that there is some common message format and an accepted set   of primitives or commands that all parties involved understand, and   that transactions among them follow predictable logical sequences.  ...
provocative maintenance is  [common ironic mutation of `preventive   maintenance'] n. Actions performed upon a machine at regularly   scheduled intervals to ensure that the system remains in a usable   state.  So called because it is all too often pe...
provocative maintenance2 is  know what he is doing; this results   in the machine's remaining in an *un*usable state for an   indeterminate amount of time.  See also {scratch monkey}. 
prowler is  [UNIX] n. A {daemon} that is run periodically (typically   once a week) to seek out and erase {core} files, truncate   administrative logfiles, nuke `lost+found' directories, and   otherwise clean up the {cruft} that tends to pile up in t...
prowler2 is  {GFR}, {reaper},   {skulker}. 
pseudo is  /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An   electronic-mail or {USENET} persona adopted by a human for   amusement value or as a means of avoiding negative repercussions of   one's net.behavior; a `nom de USENET', often associa...
pseudo2 is  message origins.  Perhaps the   best-known and funniest hoax of this type is {BIFF}.   2. Notionally, a {flamage}-generating AI program simulating a   USENET user.  Many flamers have been accused of actually being such   entities, despite...
pseudo3 is  sophistication yet exists.  However, in 1989 there was a famous   series of forged postings that used a phrase-frequency-based   travesty generator to simulate the styles of several well-known   flamers; it was based on large samples of t...
pseudo4 is  Press}).  A significant number of people   were fooled by the forgeries, and the debate over their   authenticity was settled only when the perpetrator came forward to   publicly admit the hoax. 
pseudoprime is  n. A backgammon prime (six consecutive occupied   points) with one point missing.  This term is an esoteric pun   derived from a mathematical method that, rather than determining   precisely whether a number is prime (has no divisors)...
pseudoprime2 is  whether the number is `probably'   prime.  A number that passes this test is called a pseudoprime.   The hacker backgammon usage stems from the idea that a pseudoprime   is almost as good as a prime it does the job of a prime until  ...
pseudosuit is  /soo'doh-s[y]oot`/ n. A {suit} wannabee; a hacker   who has decided that he wants to be in management or administration   and begins wearing ties, sport coats, and (shudder!) suits   voluntarily.  It's his funeral.  See also {lobotomy}...
psychedelicware is  /si`k*-del'-ik-weir/ [UK] n. Syn.   {display hack}.  See also {smoking clover}.
psyton is  /si'ton/ [TMRC] n. The elementary particle carrying the   sinister force.  The probability of a process losing is   proportional to the number of psytons falling on it.  Psytons are   generated by observers, which is why demos are more lik...
psyton2 is  watching.  [This term appears to have been   largely superseded by {bogon}; see also {quantum bogodynamics}.   --- ESR] 
pubic directory is  [NYU] (also `pube directory' /pyoob'   d*-rek't*-ree/) n. The `pub' (public) directory on a machine that   allows {FTP} access.  So called because it is the default   location for {SEX} (sense 1).  "I'll have the source in the   p...
puff is  vt. To decompress data that has been crunched by Huffman   coding.  At least one widely distributed Huffman decoder program   was actually *named* `PUFF', but these days it is usually   packaged with the encoder.  Oppose {huff}.

factpacks/jargon-split.fact  view on Meta::CPAN

Red Book is  n. 1. Informal name for one of the three standard   references on PostScript (`PostScript Language Reference   Manual', Adobe Systems (Addison-Wesley, 1985; QA76.73.P67P67; ISBN   0-201-10174-2); the others are known as the {Green Book} ...
Red Book2 is  one of the 3 standard   references on Smalltalk (`Smalltalk-80 The Interactive   Programming Environment' by Adele Goldberg (Addison-Wesley, 1984;   QA76.8.S635G638; ISBN 0-201-11372-4); this too is associated with   blue and green book...
Red Book3 is    CCITT eighth plenary assembly.  Until now, these have changed color   each review cycle (1988 was {Blue Book}, 1992 will be {Green   Book}); however, it is rumored that this convention is going to be   dropped before 1992.  These incl...
Red Book4 is  and the Group 1 through 4 fax standards.  4. The   new version of the {Green Book} (sense 4) --- IEEE 1003.1-1990, a.k.a   ISO 9945-1 --- is (because of the color and the fact that it is   printed on A4 paper) known in the U.S.A. as "th...
Red Book5 is  and in Europe as "the Ugly Red Book   That's A Sensible Size".  5. The NSA `Trusted Network   Interpretation' companion to the {Orange Book}.  See also   {{book titles}}. 
regexp is  /reg'eksp/ [UNIX] n. (alt. `regex' or `reg-ex')   1. Common written and spoken abbreviation for `regular   expression', one of the wildcard patterns used, e.g., by UNIX   utilities such as `grep(1)', `sed(1)', and `awk(1)'.   These use con...
regexp2 is  those   described under {glob}.  For purposes of this lexicon, it is   sufficient to note that regexps also allow complemented character   sets using `^'; thus, one can specify `any non-alphabetic   character' with `[^A-Za-z]'.  2. Name o...
regexp3 is  portable C, written by revered USENETter   Henry Spencer (henry@zoo.toronto.edu). 
reinvent the wheel is  v. To design or implement a tool equivalent to   an existing one or part of one, with the implication that doing so   is silly or a waste of time.  This is often a valid criticism.   On the other hand, automobiles don't use woo...
reinvent the wheel2 is  be reinvented many times before you get them   right.  On the third hand, people reinventing the wheel do tend to   come up with the moral equivalent of a trapezoid with an offset   axle. 
religious issues is  n. Questions which seemingly cannot be raised   without touching off {holy wars}, such as "What is the best   operating system (or editor, language, architecture, shell, mail   reader, news reader)?", "What about that Heinlein gu...
religious issues2 is  Jargon File?"  See {holy wars};   see also {theology}, {bigot}.   This term is an example of {ha ha only serious}.  People   actually develop the most amazing and religiously intense   attachments to their tools, even when the t...
religious issues3 is  thing one can do when one stumbles into the   crossfire is mumble {Get a life!} and leave --- unless, of course,   one's *own* unassailably rational and obviously correct   choices are being slammed. 
replicator is  n. Any construct that acts to produce copies of itself;   this could be a living organism, an idea (see {meme}), a program   (see {worm}, {wabbit}, and {virus}), a pattern in a cellular   automaton (see {life}, sense 1), or (speculativ...
replicator2 is  claimed by some that {{UNIX}} and {C}   are the symbiotic halves of an extremely successful replicator; see   {UNIX conspiracy}. 
reply is  n. See {followup}.
reset is  [the MUD community] v. In AberMUD, to bring all dead mobiles   to life and move items back to their initial starting places. New   players who can't find anything shout "Reset! Reset!" quite a bit.   Higher-level players shout back "No way!...
reset2 is  found.  Used in {RL}, it means to put things back   to the way they were when you found them. 
restriction is  n. A {bug} or design error that limits a program's   capabilities, and which is sufficiently egregious that nobody can   quite work up enough nerve to describe it as a {feature}.  Often   used (esp. by {marketroid} types) to make it s...
restriction2 is  been intended by the designers all   along, or was forced upon them by arcane technical constraints of a   nature no mere user could possibly comprehend (these claims are   almost invariably false).   Old-time hacker Joseph M. Newcom...
restriction3 is  quantifiable but arbitrary restriction, you should make it either a   power of 2 or a power of 2 minus 1.  If you impose a limit of   17 items in a list, everyone will know it is a random number --- on   the other hand, a limit of 15...

factpacks/jargon-split.fact  view on Meta::CPAN

stack4 is  spring up a bit.  See also {push} and {pop}.   At MIT, {pdl} used to be a more common synonym for {stack} in   all these contexts, and this may still be true.  Everywhere else   {stack} seems to be the preferred term.  {Knuth}   (`The Art ...
stack5 is  1,   p. 236) says        Many people who realized the importance of stacks and queues        independently have given other names to these structures        stacks have been called push-down lists, reversion storages,        cellars, nesti...
stack6 is      lists, and even yo-yo lists! 
stack puke is  n. Some processor architectures are said to `puke their   guts onto the stack' to save their internal state during exception   processing.  The Motorola 68020, for example, regurgitates up to   92 bytes on a bus fault.  On a pipelined ...
stale pointer bug is  n. Synonym for {aliasing bug} used esp. among   microcomputer hackers.
state is  n. 1. Condition, situation.  "What's the state of your   latest hack?"  "It's winning away."  "The system tried to read   and write the disk simultaneously and got into a totally wedged   state."  The standard question "What's your state?" ...
state2 is  you about to do?"  Typical   answers are "about to gronk out", or "hungry".  Another   standard question is "What's the state of the world?", meaning   "What's new?" or "What's going on?".  The more terse and   humorous way of asking these...
state3 is  of phrasing the first question under sense 1 would be   "state-p latest hack?".  2. Information being maintained in   non-permanent memory (electronic or human). 
steam-powered is  adj. Old-fashioned or underpowered; archaic.  This   term does not have a strong negative loading and may even be used   semi-affectionately for something that clanks and wheezes a lot   but hangs in there doing the job.
stiffy is  [University of Lowell,  Massachusetts.] n. 3.5-inch   {microfloppies}, so called because their jackets are more firm   than those of the 5.25-inch and the 8-inch floppy.  Elsewhere this might be   called a `firmy'.
stir-fried random is  alt. `stir-fried mumble' n. Term used for the    best dish of many of those hackers who can cook.  Consists of   random fresh veggies and meat wokked with random spices.  Tasty and   economical.  See {random}, {great-wall}, {rav...
stomp on is  vt. To inadvertently overwrite something important, usually   automatically.  "All the work I did this weekend got   stomped on last night by the nightly server script."  Compare   {scribble}, {mangle}, {trash}, {scrog}, {roach}.
Stone Age is  n., adj. 1. In computer folklore, an ill-defined period   from ENIAC (ca. 1943) to the mid-1950s; the great age of   electromechanical {dinosaur}s.  Sometimes used for the entire   period up to 1960--61 (see {Iron Age}); however, it is ...
Stone Age2 is  the latter period in terms of   a `Bronze Age' era of transistor-logic, pre-ferrite-{core}   machines with drum or CRT mass storage (as opposed to just mercury   delay lines and/or relays).  See also {Iron Age}.  2. More   generally, a...
Stone Age3 is  hardware   or software technology.  Note that this is used even by people who   were there for the {Stone Age} (sense 1). 
stoppage is  /sto'p*j/ n. Extreme {lossage} that renders   something (usually something vital) completely unusable.  "The   recent system stoppage was caused by a {fried} transformer."
store is  [prob. from techspeak `main store'] n. Preferred Commonwealth   synonym for {core}.  Thus, `bringing a program into store' means   not that one is returning shrink-wrapped software but that a   program is being {swap}ped in.
stroke is  n. Common name for the slant (`/', ASCII 0101111)   character.  See {ASCII} for other synonyms.
strudel is  n. Common (spoken) name for the circumflex (`', ASCII   1000000) character.  See {ASCII} for other synonyms.
stubroutine is  /stuhb'roo-teen/ [contraction of `stub routine']   n.  Tiny, often vacuous placeholder for a subroutine that is to be   written or fleshed out later.
studlycaps is  /stuhd'lee-kaps/ n. A hackish form of silliness   similar to {BiCapitalization} for trademarks, but applied   randomly and to arbitrary text rather than to trademarks.  ThE   oRigiN and SigNificaNce of thIs pRacTicE iS oBscuRe.

factpacks/jargon-split.fact  view on Meta::CPAN

system mangler4 is  it happens, most   hackers (particularly those who frequent Chinese restaurants) like   tea at least as well as coffee --- so it is not that big a problem.   2. See {time T} (also {since time T equals minus infinity}).   3. [techs...
system mangler5 is  abbreviation   for the noun `transaction.  4. [Purdue] Alternate spelling of   {tee}. 
tail recursion is  n. If you arent sick of it already, see {tail   recursion}.
talk mode is  n. A feature supported by UNIX, ITS, and some other   OSes that allows two or more logged-in users to set up a real-time   on-line conversation.  It combines the immediacy of talking with   all the precision (and verbosity) that written...
talk mode2 is  communicate inflection, though conventions have   arisen for some of these (see the section on writing style in the   Prependices for details).   Talk mode has a special set of jargon words, used to save typing,   which are not used or...
talk mode3 is  probably derived from) Morse-code jargon used by ham-radio amateurs   since the 1920s.   Most of these are not used at universities or in the UNIX world,   though ROTF and TTFN have gained some currency there and IMHO is   common; conv...
talk mode4 is  unfamiliar with FOO?, BCNU, HELLOP, {NIL}, and {T}.   The {MUD} community uses a mixture of USENET/Internet emoticons, a   few of the more natural of the old-style talk-mode abbrevs, and   some of the `social list above; specifically, ...
talk mode5 is  b4, BTW, WTF, TTFN, and WTH.  The use of   `rehi is also common; in fact, mudders are fond of re- compounds and   will frequently `rehug or `rebonk (see {bonk/oif}) people.  The   word `re by itself is taken as `regreet.  In general, t...
talk mode6 is  typing things out in full rather   than using abbreviations; this may be due to the relative youth of   the MUD cultures, which tend to include many touch typists and   to assume high-speed links.  The following uses specific to MUDs a...
talk mode7 is  variant spelling `d00d)   appear to be passing into wider use among some subgroups of   MUDders.   One final note on talk mode style neophytes, when in talk mode,   often seem to think they must produce letter-perfect prose because   t...
talk mode8 is  not the best   approach.  It can be very frustrating to wait while your partner   pauses to think of a word, or repeatedly makes the same spelling   error and backs up to fix it.  It is usually best just to leave   typographical errors...
talk mode9 is  confusion may result; in that case it is often fastest just to type   "xxx" and start over from before the mistake.   See also {hakspek}, {emoticon}, {bonk/oif}. 
talker system is  n. British hackerism for software that enables   real-time chat or {talk mode}.
tall card is  n. A PC/AT-size expansion card (these can be larger   than IBM PC or XT cards because the AT case is bigger).  See also   {short card}.  When IBM introduced the PS/2 model 30 (its last   gasp at supporting the ISA) they made the case lo...
tall card2 is  wouldnt fit; this was felt to be a   reincarnation of the {connector conspiracy}, done with less   style. 
tanked is  adj. Same as {down}, used primarily by UNIX hackers.  See   also {hosed}.  Popularized as a synonym for `drunk by Steve   Dallas in the late lamented "Bloom County" comic strip.
tar and feather is  [from UNIX `tar(1)] vt. To create a   transportable archive from a group of files by first sticking them   together with `tar(1) (the Tape ARchiver) and then   compressing the result (see {compress}).  The latter action is   dubbe...
tar and feather2 is  an airplane   propeller to decrease wind resistance, or with an oar to reduce   water resistance; smaller files, after all, slip through comm links   more easily. 
taste is  [primarily MIT] n. 1. The quality in a program that tends   to be inversely proportional to the number of features, hacks, and   kluges programmed into it.  Also `tasty, `tasteful,   `tastefulness.  "This feature comes in N tasty flavors." ...
taste2 is  essentially   synonyms, `taste and {flavor} are not.  Taste refers to   sound judgment on the part of the creator; a program or feature   can *exhibit* taste but cannot {have} taste.  On the other   hand, a feature can have {flavor}.  Also...
taste3 is  `kind or `variety not shared by   `taste.  {Flavor} is a more popular word than `taste,   though both are used.  See also {elegant}.  2. Alt. sp. of   {tayste}. 

factpacks/jargon-split.fact  view on Meta::CPAN

tweak is  vt. 1. To change slightly, usually in reference to a value.   Also used synonymously with {twiddle}.  If a program is almost   correct, rather than figure out the precise problem you might   just keep tweaking it until it works.  See {frobn...
tweak2 is  debugging}.  2. To {tune}   or {bum} a program; preferred usage in the U.K. 
TWENEX is  /tweneks/ n. The TOPS-20 operating system by DEC ---   the second proprietary OS for the PDP-10 --- preferred by most   PDP-10 hackers over TOPS-10 (that is, by those who were not   {{ITS}} or {{WAITS}} partisans).  TOPS-20 began in 1969 a...
TWENEX2 is  system using special paging   hardware.  By the early 1970s, almost all of the systems on the   ARPANET ran TENEX.  DEC purchased the rights to TENEX from BBN and   began work to make it their own.  The first in-house code name for   the ...
TWENEX3 is  Operating System);   when customers started asking questions, the name was changed to   SNARK so DEC could truthfully deny that there was any project   called VIROS.  When the name SNARK became known, the name was   briefly reversed to be...
TWENEX4 is  it was discovered that `krans meant `funeral shroud in   Swedish.  Ultimately DEC picked TOPS-20 as the name of the   operating system, and it was as TOPS-20 that it was marketed.  The   hacker community, mindful of its origins, quickly d...
TWENEX5 is  TENEX), even though by this   point very little of the original TENEX code remained (analogously   to the differences between AT&T V6 UNIX and BSD).  DEC people   cringed when they heard "TWENEX", but the term caught on   nevertheless (th...
TWENEX6 is  TWENEX was successful and very popular; in fact, there was a period   in the early 1980s when it commanded as fervent a culture of   partisans as UNIX or ITS --- but DECs decision to scrap all the   internal rivals to the VAX architecture...
TWENEX7 is  DEC-20 and put a sad end to TWENEXs brief day in   the sun.  DEC attempted to convince TOPS-20 hackers to convert to   {VMS}, but instead, by the late 1980s, most of the TOPS-20   hackers had migrated to UNIX. 
twiddle is  n. 1. Tilde (ASCII 1111110, `~).  Also   called `squiggle, `sqiggle (sic --- pronounced /skigl/),   and `twaddle, but twiddle is the most common term.  2. A small   and insignificant change to a program.  Usually fixes one bug and   gener...
twiddle2 is  something in a small   way.  Bits, for example, are often twiddled.  Twiddling a switch or   knob implies much less sense of purpose than toggling or tweaking   it; see {frobnicate}.  To speak of twiddling a bit connotes   aimlessness, a...
twiddle3 is  the   bit; `toggling a bit has a more specific meaning (see {bit   twiddling}, {toggle}). 
twink is  /twink/ [UCSC] n. Equivalent to {read-only user}.  Also   reported on the USENET group soc.motss; may derive from gay   slang for a cute young thing with nothing upstairs.
two pi is  quant. The number of years it takes to finish ones   thesis.  Occurs in stories in the following form "He started on   his thesis; 2 pi years later..."
two-to-the-N is  quant. An amount much larger than {N} but smaller   than {infinity}.  "I have 2-to-the-N things to do before I can   go out for lunch" means you probably wont show up.
twonkie is  /twonkee/ n. The software equivalent of a Twinkie (a   variety of sugar-loaded junk food, or (in gay slang) the male   equivalent of `chick); a useless `feature added to look sexy   and placate a {marketroid} (compare {Saturday-night   sp...
twonkie2 is  Twonky", title menace   of a classic SF short story by Lewis Padgett (Henry Kuttner and   C. L. Moore), first published in the September 1942   `Astounding Science Fiction and subsequently much   anthologized.*UBD /U-B-D/ [abbreviation f...
twonkie3 is  to close out trouble reports obviously due to   utter cluelessness on the user's part.  Compare {pilot error};   oppose {PBD}; see also {brain-damaged}. 
UN*X is  n. Used to refer to the UNIX operating system (a trademark of   AT&T) in writing, but avoiding the need for the ugly   {(TM)} typography.   Also used to refer to any or all varieties of Unixoid operating   systems.  Ironically, lawyers now s...
UN*X2 is  TM-postfix has no legal force, but the asterisk usage   is entrenched anyhow.  It has been suggested that there may be a   psychological connection to practice in certain religions   (especially Judaism) in which the name of the deity is ne...
UN*X3 is  `G--d' is used.  See also   {glob}. 

factpacks/jargon-split.fact  view on Meta::CPAN

user is  n. 1. Someone doing `real work' with the computer, using   it as a means rather than an end.  Someone who pays to use a   computer.  See {real user}.  2. A programmer who will believe   anything you tell him.  One who asks silly questions.  ...
user2 is  is true that users ask   questions (of necessity).  Sometimes they are thoughtful or deep.   Very often they are annoying or downright stupid, apparently   because the user failed to think for two seconds or look in the   documentation befo...
user3 is  3. Someone who uses a program from the outside, however skillfully,   without getting into the internals of the program.  One who reports   bugs instead of just going ahead and fixing them.   The general theory behind this term is that ther...
user4 is  program there are implementors (hackers)   and {luser}s.  The users are looked down on by hackers to a mild   degree because they don't understand the full ramifications of the   system in all its glory.  (The few users who do are known as ...
user5 is  a skilled hacker   may be a user with respect to some program he himself does not   hack.  A LISP hacker might be one who maintains LISP or one who   uses LISP (but with the skill of a hacker).  A LISP user is one who   uses LISP, whether s...
user6 is  between the two terms; the subtle distinctions must be resolved by   context. 
user-friendly is  adj. Programmer-hostile.  Generally used by hackers in   a critical tone, to describe systems that hold the user's hand so   obsessively that they make it painful for the more experienced and   knowledgeable to get any work done.  S...
user-friendly2 is  {Macintrash}, {user-obsequious}. 
user-obsequious is  adj. Emphatic form of {user-friendly}.  Connotes   a system so verbose, inflexible, and determinedly simple-minded   that it is nearly unusable.  "Design a system any fool can use and   only a fool will want to use it."  See {WIMP...
USG UNIX is  /U-S-G yoo'niks/ n. Refers to AT&T UNIX   commercial versions after {Version 7}, especially System III and   System V releases 1, 2, and 3.  So called because during most of   the life-span of those versions AT&T's support crew was calle...
UTSL is  // [UNIX] n. On-line acronym for `Use the Source, Luke' (a   pun on Obi-Wan Kenobi's "Use the Force, Luke!" in `Star   Wars') --- analogous to {RTFM} but more polite.  This is a   common way of suggesting that someone would be best off readi...
UTSL2 is  feature is causing confusion,   rather than making yet another futile pass through the manuals or   broadcasting questions that haven't attracted {wizard}s to   answer them.  In theory, this is appropriately directed only at   associates of...
UTSL3 is  practice,   bootlegs of UNIX source code (made precisely for reference   purposes) are so ubiquitous that one may utter this at almost   anyone on {the network} without concern.  In the near future   (this written in 1991) source licenses m...
UTSL4 is  recent release of the Mach 3.0 microkernal,   given the continuing efforts of the {GNU} project, and with the   4.4BSD release on the horizon, complete free source code for   UNIX-clone toolsets and kernels should soon be widely available. 
UUCPNET is  n. The store-and-forward network consisting of all the   world's connected UNIX machines (and others running some clone of   the UUCP (UNIX-to-UNIX CoPy) software).  Any machine reachable only   via a {bang path} is on UUCPNET.  See {netw...
UUCPNET2 is  permutation of ADV (i.e.,   {ADVENT}), used to avoid a particular {admin}'s continual   search-and-destroy sweeps for the game] n. A leisure-time activity   of certain hackers involving the covert exploration of the `secret'   parts of l...
UUCPNET3 is  elevators,   maintenance crawlways, steam tunnels, and the like.  A few go so   far as to learn locksmithing in order to synthesize vadding keys.   The verb is `to vad' (compare {phreaking}).   The most extreme and dangerous form of vadd...
UUCPNET4 is  surfing', a sport played by wrasslin'   down a thousand-pound elevator car with a 3-foot piece of   string, and then exploiting this mastery in various stimulating   ways (such as elevator hopping, shaft exploration, rat-racing, and   th...
UUCPNET5 is  try this at home!    See also {hobbit} (sense 2). 
vanilla is  [from the default flavor of ice cream in the U.S.] adj.   Ordinary {flavor}, standard.  When used of food, very often does   not mean that the food is flavored with vanilla extract!  For   example, `vanilla wonton soup' means ordinary won...
vanilla2 is  soup.  Applied to hardware and   software, as in "Vanilla Version 7 UNIX can't run on a   vanilla 11/34."  Also used to orthogonalize chip nomenclature; for   instance, a 74V00 means what TI calls a 7400, as distinct from   a 74LS00, etc...

factpacks/jargon-split.fact  view on Meta::CPAN

wall time2 is  differ, as no one program gets all the   {clocks}, and on multiprocessor systems with good thread support   one may get more processor clocks than real-time clocks). 
wallpaper is  n. 1. A file containing a listing (e.g., assembly   listing) or a transcript, esp. a file containing a transcript of   all or part of a login session.  (The idea was that the paper for   such listings was essentially good only for wallp...
wallpaper2 is  used to cover windows.)  Now rare,   esp. since other systems have developed other terms for it (e.g.,   PHOTO on TWENEX).  However, the UNIX world doesn't have an   equivalent term, so perhaps {wallpaper} will take hold there.   The t...
wallpaper3 is  commands to begin   and end transcript files were `WALBEG' and `WALEND',   with default file `WALL PAPER' (the space was a path   delimiter).  2. The background pattern used on graphical   workstations (this is techspeak under the `Win...
wallpaper4 is  3. `wallpaper file' n. The file that   contains the wallpaper information before it is actually printed on   paper.  (Even if you don't intend ever to produce a real paper copy   of the file, it is still called a wallpaper file.) 
wango is  /wang'goh/ n. Random bit-level {grovel}ling going on in   a system during some unspecified operation.  Often used in   combination with {mumble}.  For example "You start with the `.o'   file, run it through this postprocessor that does mumb...
wango2 is  object-oriented executable." 
wank is  /wangk/ [Columbia University prob. by mutation from   Commonwealth slang v. `wank', to masturbate] n.,v. Used much as   {hack} is elsewhere, as a noun denoting a clever technique or   person or the result of such cleverness.  May describe (n...
wank2 is  sake ("Quit wanking, let's go get   supper!")  or (more positively) a {wizard}.  Adj.  `wanky'   describes something particularly clever (a person, program, or   algorithm).  Conversations can also get wanky when there are too   many wanks ...
wank3 is  by an   overload of the `wankometer' (compare {bogometer}).  When the   wankometer overloads, the conversation's subject must be changed,   or all non-wanks will leave.  Compare `neep-neeping' (under   {neep-neep}).  Usage U.S. only.  In Br...
wank4 is  *extremely* rude and is best avoided unless one   intends to give offense. 
wannabee is  /won'*-bee/ (also, more plausibly, spelled `wannabe')   [from a term recently used to describe Madonna fans who dress,   talk, and act like their idol; prob. originally from biker slang]   n. A would-be {hacker}.  The connotations of thi...
wannabee2 is  and exposure of the subject.  Used of   a person who is in or might be entering {larval stage}, it is   semi-approving; such wannabees can be annoying but most hackers   remember that they, too, were once such creatures.  When used of  ...
wannabee3 is  writer, or {suit}, it is   derogatory, implying that said person is trying to cuddle up to the   hacker mystique but doesn't, fundamentally, have a prayer of   understanding what it is all about.  Overuse of terms from this lexicon   is...
wannabee4 is  Compare   {newbie}.   Historical note The wannabee phenomenon has a slightly different   flavor now (1991) than it did ten or fifteen years ago.  When the   people who are now hackerdom's tribal elders were in {larval   stage}, the proc...
wannabee5 is  unconscious   and unaffected by models known in popular culture --- communities   formed spontaneously around people who, *as individuals*, felt   irresistibly drawn to do hackerly things, and what wannabees   experienced was a fairly p...
wannabee6 is  wizardly.  Those days of innocence are gone forever;   society's adaptation to the advent of the microcomputer after 1980   included the elevation of the hacker as a new kind of folk hero,   and the result is that some people semi-consc...
wannabee7 is  hackish prestige by fitting the   popular image of hackers.  Fortunately, to do this really well, one   has to actually become a wizard.  Nevertheless, old-time hackers   tend to share a poorly articulated disquiet about the change; amo...
wannabee8 is  about the effects of   public compendia of lore like this one. 
warm boot is  n. See {boot}.
wart is  n. A small, {crock}y {feature} that sticks out of an   otherwise {clean} design.  Something conspicuous for localized   ugliness, especially a special-case exception to a general rule.   For example, in some versions of `csh(1)', single quot...

factpacks/jargon-split.fact  view on Meta::CPAN

womb box is  n. 1. [TMRC] Storage space for equipment.  2. [proposed]   A variety of hard-shell equipment case with heavy interior padding   and/or shaped carrier cutouts in a foam-rubber matrix; mundanely   called a `flight case'.  Used for delicate...
WOMBAT is  [Waste Of Money, Brains, And Time] adj. Applied to problems   which are both profoundly {uninteresting} in themselves and   unlikely to benefit anyone interesting even if solved.  Often used   in fanciful constructions such as `wrestling w...
WOMBAT2 is  {SMOP}.  Also note the rather different   usage as a meta-syntactic variable in {{Commonwealth Hackish}}. 
wonky is  /wong'kee/ [from Australian slang] adj. Yet another   approximate synonym for {broken}.  Specifically connotes a   malfunction that produces behavior seen as crazy, humorous, or   amusingly perverse.  "That was the day the printer's font lo...
wonky2 is  out in Tengwar."  Also in   `wonked out'.  See {funky}, {demented}, {bozotic}. 
workaround is  n. A temporary {kluge} inserted in a system under   development or test in order to avoid the effects of a {bug} or   {misfeature} so that work can continue.  Theoretically,   workarounds are always replaced by {fix}es; in practice,   ...
workaround2 is  workarounds in the   first couple of releases.  "The code died on NUL characters in the   input, so I fixed it to interpret them as spaces."  "That's not a   fix, that's a workaround!" 
working as designed is  [IBM] adj. 1. In conformance to a wrong or   inappropriate specification; useful, but misdesigned.   2. Frequently used as a sardonic comment on a program's utility.   3. Unfortunately also used as a bogus reason for not accep...
working as designed2 is  this sense is used in   official documents!  See {BAD}. 
worm is  [from `tapeworm' in John Brunner's novel `The   Shockwave Rider', via XEROX PARC] n. A program that propagates   itself over a network, reproducing itself as it goes.  Compare   {virus}.  Nowadays the term has negative connotations, as it is...
worm2 is  Perhaps the   best-known example was Robert T. Morris's `Internet Worm' of 1988,   a `benign' one that got out of control and hogged hundreds of   Suns and VAXen across the U.S.  See also {cracker}, {RTM},   {Trojan horse}, {ice}. 
wound around the axle is  adj. In an infinite loop.  Often used by older   computer types.
wrap around is  vi. (also n. `wraparound' and v. shorthand `wrap')   1. [techspeak] The action of a counter that starts over at zero or at   `minus infinity' (see {infinity}) after its maximum value has   been reached, and continues incrementing, eit...
wrap around2 is  because of an overflow (as when a car's   odometer starts over at 0).  2. To change {phase} gradually and   continuously by maintaining a steady wake-sleep cycle somewhat   longer than 24 hours, e.g., living six long (28-hour) days i...
wrap around3 is  rate of 10 microhertz). 
write-only code is  [a play on `read-only memory'] n. Code so   arcane, complex, or ill-structured that it cannot be modified or   even comprehended by anyone but its author, and possibly not even   by him/her.  A {Bad Thing}.
write-only language is  n. A language with syntax (or semantics)   sufficiently dense and bizarre that any routine of significant size   is {write-only code}.  A sobriquet applied occasionally to C and   often to APL, though {INTERCAL} and {TECO} cer...
write-only memory is  n. The obvious antonym to `read-only   memory'.  Out of frustration with the long and seemingly useless   chain of approvals required of component specifications, during   which no actual checking seemed to occur, an engineer at...
write-only memory2 is  a write-only memory and included   it with a bunch of other specifications to be approved.  This   inclusion came to the attention of Signetics {management} only   when regular customers started calling and asking for pricing  ...
write-only memory3 is  edition of the data   book and requested the return of the `erroneous' ones.  Later,   around 1974, Signetics bought a double-page spread in `Electronics'   magazine's April issue and used the spec as an April Fools' Day   joke...
write-only memory4 is  characteristic curves, the   25120 "fully encoded, 9046 x N, Random Access, write-only-memory"   data sheet included diagrams of "bit capacity vs. Temp.",   "Iff vs. Vff", "Number of pins remaining vs. number of socket   insert...
write-only memory5 is  required a   6.3 VAC VFF supply, a +10V VCC, and VDD of 0V,   +/- 2%. 
Wrong Thing is  n. A design, action, or decision that is clearly   incorrect or inappropriate.  Often capitalized; always emphasized   in speech as if capitalized.  The opposite of the {Right Thing};   more generally, anything that is not the Right T...
Wrong Thing2 is  of the best', the merely good --- although   good --- is nevertheless the Wrong Thing. "In C, the default is for   module-level declarations to be visible everywhere, rather than   just within the module.  This is clearly the Wrong T...
wugga wugga is  /wuh'g* wuh'g*/ n. Imaginary sound that a computer   program makes as it labors with a tedious or difficult task.   Compare {cruncha cruncha cruncha}, {grind} (sense 4).
WYSIWYG is  /wiz'ee-wig/ adj. Describes a user interface under which   "What You See Is What You Get", as opposed to one that uses   more-or-less obscure commands which do not result in immediate   visual feedback.  The term can be mildly derogatory,...
WYSIWYG2 is  {user-friendly} interfaces targeted   at non-programmers; a hacker has no fear of obscure commands.   On the other hand, EMACS was one of the very first WYSIWYG editors,   replacing (actually, at first overlaying) the extremely obscure, ...
WYSIWYG3 is  environment}.  [Oddly   enough, this term has already made it into the OED. --- ESR]*X /X/ n. 1. Used in various speech and writing contexts (also   in lowercase) in roughly its algebraic sense of `unknown within a   set defined by conte...
WYSIWYG4 is  680x0 stands for 68000, 68010, 68020, 68030, or 68040, and 80x86   stands for 80186, 80286 80386 or 80486 (note that a UNIX hacker   might write these as 680[0-4]0 and 80[1-4]86 or 680?0 and 80?86   respectively; see {glob}).  2. [after ...
WYSIWYG5 is  `W'] An over-sized, over-featured,   over-engineered and incredibly over-complicated window system   developed at MIT and widely used on UNIX systems. 
XOFF is  /X'of/ n. Syn. {control-s}.
xor is  /X'or/, /kzor/ conj. Exclusive or.  `A xor B' means   `A or B, but not both'.  "I want to get cherry pie xor a   banana split."  This derives from the technical use of the term as   a function on truth-values that is true if exactly one of it...
xref is  /X'ref/ vt., n. Hackish standard abbreviation for   `cross-reference'.
XXX is  /X-X-X/ n. A marker that attention is needed.   Commonly used in program comments to indicate areas that are kluged   up or need to be.  Some hackers liken `XXX' to the notional   heavy-porn movie rating.

factpacks/jargon-split.fact  view on Meta::CPAN

YABA is  /ya'b*/ [Cambridge] n. Yet Another Bloody Acronym.  Whenever   some program is being named, someone invariably suggests that it be   given a name that is acronymic.  The response from those with a   trace of originality is to remark ironical...
YABA2 is  `YABA-compatible'.  Also used in response to questions   like "What is WYSIWYG?"  See also {TLA}. 
YAUN is  /yawn/ [Acronym for `Yet Another UNIX Nerd'] n. Reported   from the San Diego Computer Society (predominantly a microcomputer   users' group) as a good-natured punning insult aimed at UNIX   zealots.
Yellow Book is  [proposed] n. The print version of this Jargon File;   `The New Hacker's Dictionary', forthcoming from MIT Press,   1991.  Includes all the material in the File, plus a Foreword by   Guy L.  Steele and a Preface by Eric S. Raymond.  M...
Yellow Book2 is  typeset and includes almost all of the   infamous Crunchly cartoons by the Great Quux, each attached to an   appropriate entry. 
Yet Another is  adj. [From UNIX's `yacc(1)', `Yet Another Compiler-   Compiler', a LALR parser generator]  1. Of your own work A humorous   allusion often used in titles to acknowledge that the topic is not   original, though the content is.  As in `...
Yet Another2 is  Simulated Annealing Algorithm'.  2. Of others'   work Describes something of which there are far too many.  See   also {YA-}, {YABA}, {YAUN}. 
You are not expected to understand this is  cav. [UNIX] The canonical   comment describing something {magic} or too complicated to   bother explaining properly.  From an infamous comment in the   context-switching code of the V6 UNIX kernel.
You know you've been hacking too long when... is  The set-up line   for a genre of one-liners told by hackers about themselves.  These   include the following   * not only do you check your email more often than your paper     mail, but you remember ...
You know you've been hacking too long when...2 is  postal one.   * your {SO} kisses you on the neck and the first thing you     think is "Uh, oh, {priority interrupt}."   * you go to balance your checkbook and discover that you're     doing it in oct...
You know you've been hacking too long when...3 is  value than your car.   * in your universe, `round numbers' are powers of 2, not 10.   * more than once, you have woken up recalling a dream in     some programming language.   * you realize you have ...
You know you've been hacking too long when...4 is  early version of this entry said "All but one of these   have been reliably reported as hacker traits (some of them quite   often).  Even hackers may have trouble spotting the ringer."  The   ringer ...
You know you've been hacking too long when...5 is  made up out   of whole cloth.  Although more respondents picked that one   out as fiction than any of the others, I also received multiple   independent reports of its actually happening. --- ESR] 
Your mileage may vary is  cav. [from the standard disclaimer attached   to EPA mileage ratings by American car manufacturers] 1. A ritual   warning often found in UNIX freeware distributions.  Translates   roughly as "Hey, I tried to write this porta...
Your mileage may vary2 is  system?"  2. A qualifier more   generally attached to advice.  "I find that sending flowers works   well, but your mileage may vary." 
Yow! is  /yow/ [from "Zippy the Pinhead" comix] interj. A favored hacker   expression of humorous surprise or emphasis.  "Yow!  Check out what   happens when you twiddle the foo option on this display hack!"   Compare {gurfle}.
yoyo mode is  n. The state in which the system is said to be when it   rapidly alternates several times between being up and being down.   Interestingly (and perhaps not by coincidence), many hardware   vendors give out free yoyos at Usenix exhibits....
yoyo mode2 is  SIGPLAN '88.  Tourists   staying at one of Atlanta's most respectable hotels were   subsequently treated to the sight of 200 of the country's top   computer scientists testing yo-yo algorithms in the lobby. 
Yu-Shiang Whole Fish is  /yoo-shyang hohl fish/ n. obs. The   character gamma (extended SAIL ASCII 0001001), which with a loop in   its tail looks like a little fish swimming down the page.  The term   is actually the name of a Chinese dish in which ...
Yu-Shiang Whole Fish2 is  covered with Yu-Shiang (or Yu-Hsiang)   sauce.  Usage primarily by people on the MIT LISP Machine, which   could display this character on the screen.  Tends to elicit   incredulity from people who hear about it second-hand....
zap is  1. n. Spiciness.  2. vt. To make food spicy.  3. vt. To make   someone `suffer' by making his food spicy.  (Most hackers love   spicy food.  Hot-and-sour soup is considered wimpy unless it makes   you wipe your nose for the rest of the meal.)...

factpacks/jargon.fact  view on Meta::CPAN

AOS => 1. /aws/ (East Coast), /ay-os/ (West Coast) [based on a PDP-10 increment instruction] vt.,obs. To increase the amount of something. "AOS the campfire." Usage considered silly, and now obsolete. Now largely supplanted by bump. See SOS. 2. A {Mu...
app => /ap/ n. Short for `application program', as opposed to a systems program. What systems vendors are forever chasing developers to create for their environments so they can sell more boxes. Hackers tend not to think of the things they themselves...
arc => [primarily MSDOS] vt. To create a compressed archive from a group of files using SEA ARC, PKWare PKARC, or a compatible program. Rapidly becoming obsolete as the ARC compression method is falling into disuse, having been replaced by newer comp...
arc wars => [primarily MSDOS] n. {holy wars} over which archiving program one should use. The first arc war was sparked when System Enhancement Associates (SEA) sued PKWare for copyright and trademark infringement on its ARC program. PKWare's PKARC o...
arc wars2 => and speed while largely retaining compatibility (it introduced a new compression type that could be disabled for backward-compatibility). PKWare settled out of court to avoid enormous legal costs (both SEA and PKWare are small companies)...
arc wars3 => of PKARC was changed to PKPAK. The public backlash against SEA for bringing suit helped to hasten the demise of ARC as a standard when PKWare and others introduced new, incompatible archivers with better compression algorithms. 
archive => n. 1. A collection of several files bundled into one file by a program such as `ar(1)', `tar(1)', `cpio(1)', or arc for shipment or archiving (sense 2). See also {tar and feather}. 2. A collection of files or archives (sense 1) made availa...
arena => [UNIX] n. The area of memory attached to a process by `brk(2)' and `sbrk(2)' and used by `malloc(3)' as dynamic storage. So named from a semi-mythical `malloc corrupt arena' message supposedly emitted when some early versions became terminal...
arg => /arg/ n. Abbreviation for `argument' (to a function), used so often as to have become a new word (like `piano' from `pianoforte'). "The sine function takes 1 arg, but the arc-tangent function can take either 1 or 2 args." Compare param, parm, ...
armor-plated => n. Syn. for bulletproof.
asbestos => adj. Used as a modifier to anything intended to protect one from flames. Important cases of this include {asbestos longjohns} and {asbestos cork award}, but it is used more generally.
asbestos cork award => n. Once, long ago at MIT, there was a flamer so consistently obnoxious that another hacker designed, had made, and distributed posters announcing that said flamer had been nominated for the `asbestos cork award'. Persons in any...
asbestos cork award2 => application of the cork should consult the etymology under flame. Since then, it is agreed that only a select few have risen to the heights of bombast required to earn this dubious dignity --- but there is no agreement on *whi...
asbestos longjohns => n. Notional garments often donned by USENET posters just before emitting a remark they expect will elicit flamage. This is the most common of the asbestos coinages. Also `asbestos underwear', `asbestos overcoat', etc.
attoparsec => n. `atto-' is the standard SI prefix for multiplication by 10^-18. A parsec (parallax-second) is 3.26 light-years; an attoparsec is thus 3.26 * 10^-18 light years, or about 3.1 cm (thus, 1 attoparsec/microfortnight equals about 1 inch/s...
autobogotiphobia => /aw'to-boh-got`*-foh'bee-*/ n. See bogotify.
automagically => /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv. Automatically, but in a way that, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining to you....
avatar => [CMU, Tektronix] n. Syn. root, superuser. There are quite a few UNIX machines on which the name of the superuser account is `avatar' rather than `root'. This quirk was originated by a CMU hacker who disliked the term `superuser', and was pr...
awk => 1. n. [UNIX techspeak] An interpreted language for massaging text data developed by Alfred Aho, Peter Weinberger, and Brian Kernighan (the name is from their initials). It is characterized by C-like syntax, a declaration-free approach to varia...
backbone cabal => n. A group of large-site administrators who pushed through the {Great Renaming} and reined in the chaos of USENET during most of the 1980s. The cabal {mailing list} disbanded in late 1988 after a bitter internal catfight, but the ne...
backbone site => n. A key USENET and email site; one that processes a large amount of third-party traffic, especially if it is the home site of any of the regional coordinators for the USENET maps. Notable backbone sites as of early 1991 include uune...
backbone site2 => University, UC Berkeley, DEC's Western Research Laboratories, Ohio State University, and the University of Texas. Compare {rib site}, {leaf site}. 
backgammon => See bignum, moby, and pseudoprime.
background => n.,adj.,vt. To do a task `in background' is to do it whenever foreground matters are not claiming your undivided attention, and `to background' something means to relegate it to a lower priority. "For now, we'll just print a list of nod...

factpacks/jargon.fact  view on Meta::CPAN

book titles => There is a tradition in hackerdom of informally tagging important textbooks and standards documents with the dominant color of their covers or with some other conspicuous feature of the cover. Many of these are described in this lexico...
book titles2 => {Aluminum Book}, {Blue Book}, {Cinderella Book}, {Devil Book}, {Dragon Book}, {Green Book}, {Orange Book}, {Pink-Shirt Book}, {Purple Book}, {Red Book}, {Silver Book}, {White Book}, {Wizard Book}, {Yellow Book}, and bible.boot [techsp...
book titles3 => v.,n. To load and initialize the operating system on a machine. This usage is no longer jargon (having passed into techspeak) but has given rise to some derivatives that are still jargon. The derivative `reboot' implies that the machi...
book titles4 => that the boot is a bounce intended to clear some state of wedgitude. This is sometimes used of human thought processes, as in the following exchange "You've lost me." "OK, reboot. Here's the theory...." This term is also found in the ...
book titles5 => power-off condition) and `warm boot' (with the CPU and all devices already powered up, as after a hardware reset or software crash). Another variant `soft boot', reinitialization of only part of a system, under control of other softwa...
book titles6 => the mess-dos emulator, control-alt-insert will cause a soft-boot of the emulator, while leaving the rest of the system running." Opposed to this there is `hard boot', which connotes hostility towards or frustration with the machine be...
book titles7 => hard-boot this losing Sun." "I recommend booting it hard." Historical note this term derives from `bootstrap loader', a short program that was read in from cards or paper tape, or toggled in from the front panel switches. This program...
book titles8 => were expended on making it short in order to minimize the labor and chance of error involved in toggling it in), but was just smart enough to read in a slightly more complex program (usually from a card or paper tape reader), to which...
book titles9 => turn was smart enough to read the application or operating system from a magnetic tape drive or disk drive. Thus, in successive steps, the computer `pulled itself up by its bootstraps' to a useful operating state. Nowadays the bootstr...
book titles10 => and reads the first stage in from a fixed location on the disk, called the `boot block'. When this program gains control, it is powerful enough to load the actual OS and hand control over to it. 
bottom-up implementation => n. Hackish opposite of the techspeak term `top-down design'. It is now received wisdom in most programming cultures that it is best to design from higher levels of abstraction down to lower, specifying sequences of action ...
bottom-up implementation2 => to actual code. Hackers often find (especially in exploratory designs that cannot be closely specified in advance) that it works best to *build* things in the opposite order, by writing and testing a clean set of primitiv...
bounce => v. 1. [perhaps from the image of a thrown ball bouncing off a wall] An electronic mail message that is undeliverable and returns an error notification to the sender is said to `bounce'. See also {bounce message}. 2. [Stanford] To play volle...
bounce message => [UNIX] n. Notification message returned to sender by a site unable to relay email to the intended {{Internet address}} recipient or the next link in a {bang path} (see bounce). Reasons might include a nonexistent or misspelled usern...
bounce message2 => Bounce messages can themselves fail, with occasionally ugly results; see {sorcerer's apprentice mode}. The term `bounce mail' is also common. 
box => n. 1. A computer; esp. in the construction `foo box' where foo is some functional qualifier, like `graphics', or the name of an OS (thus, `UNIX box', `MS-DOS box', etc.) "We preprocess the data on UNIX boxes before handing it up to the mainfra...
boxed comments => n. Comments (explanatory notes attached to program instructions) that occupy several lines by themselves; so called because in assembler and C code they are often surrounded by a box in a style something like this Common variants of...
boxed comments2 => column 2 or add a matching row of asterisks closing the right side of the box. The sparest variant omits all but the comment delimiters themselves; the `box' is implied. Oppose {winged comments}. 
boxen => /bok'sn/ [by analogy with VAXen] pl.n. Fanciful plural of box often encountered in the phrase `UNIX boxen', used to describe commodity {UNIX} hardware. The connotation is that any two UNIX boxen are interchangeable.
boxology => /bok-sol'*-jee/ n. Syn. {ASCII art}. This term implies a more restricted domain, that of box-and-arrow drawings. "His report has a lot of boxology in it." Compare macrology.
bozotic => /boh-zoh'tik/ or /boh-zo'tik/ [from the name of a TV clown even more losing than Ronald McDonald] adj. Resembling or having the quality of a bozo; that is, clownish, ludicrously wrong, unintentionally humorous. Compare wonky, demented. Not...
BQS => /B-Q-S/ adj. Syn. {Berkeley Quality Software}.

factpacks/jargon.fact  view on Meta::CPAN

brute force9 => tradeoffs in software design, the choice between brute force and complex, finely-tuned cleverness is often a difficult one that requires both engineering savvy and delicate esthetic judgment. 
brute force and ignorance => n. A popular design technique at many software houses --- {brute force} coding unrelieved by any knowledge of how problems have been previously solved in elegant ways. Dogmatic adherence to design methodologies tends to e...
brute force and ignorance2 => early {larval stage} programming; unfortunately, many never outgrow it. Often abbreviated BFI "Gak, they used a bubble sort! That's strictly from BFI." Compare bogosity. 
BSD => /B-S-D/ n. [acronym for `Berkeley System Distribution'] a family of {UNIX} versions for the DEC VAX and PDP-11 developed by Bill Joy and others at Berzerkeley starting around 1980, incorporating paged virtual memory, TCP/IP networking enhancem...
bubble sort => n. Techspeak for a particular sorting technique in which pairs of adjacent values in the list to be sorted are compared and interchanged if they are out of order; thus, list entries `bubble upward' in the list until they bump into one ...
bubble sort2 => is not very good relative to other methods and is the one typically stumbled on by na"ive and untutored programmers, hackers consider it the canonical example of a na"ive algorithm. The canonical example of a really *bad* algorithm is...
bubble sort3 => might be used out of ignorance, but any use of bogo-sort could issue only from brain damage or willful perversity. 
bucky bits => /buh'kee bits/ n. 1. obs. The bits produced by the CONTROL and META shift keys on a SAIL keyboard, resulting in a 9-bit keyboard character set. The MIT AI TV (Knight) keyboards extended this with TOP and separate left and right CONTROL ...
bucky bits2 => character set; later, LISP Machines added such keys as SUPER, HYPER, and GREEK (see {space-cadet keyboard}). 2. By extension, bits associated with `extra' shift keys on any keyboard, e.g., the ALT on an IBM PC or command and option key...
bucky bits3 => that `bucky bits' were named for Buckminster Fuller during a period when he was consulting at Stanford. Actually, `Bucky' was Niklaus Wirth's nickname when *he* was at Stanford; he first suggested the idea of an EDIT key to set the 8th...
bucky bits4 => character. This was used in a number of editors written at Stanford or in its environs (TV-EDIT and NLS being the best-known). The term spread to MIT and CMU early and is now in general use. See {double bucky}, {quadruple bucky}. 
buffer overflow => n. What happens when you try to stuff more data into a buffer (holding area) than it can handle. This may be due to a mismatch in the processing rates of the producing and consuming processes (see overrun), or because the buffer is...
buffer overflow2 => data that must accumulate before a piece of it can be processed. For example, in a text-processing tool that crunches a line at a time, a short line buffer can result in lossage as input from a long line overflows the buffer and t...
buffer overflow3 => defensive programming would check for overflow on each character and stop accepting data when the buffer is full up. The term is used of and by humans in a metaphorical sense. "What time did I agree to meet you? My buffer must hav...
buffer overflow4 => phone my buffer is going to overflow." See also spam, {overrun screw}. 
bug => n. An unwanted and unintended property of a program or hardware, esp. one that causes it to malfunction. Antonym of feature. Examples "There's a bug in the editor it writes things out backwards." "The system crashed because of a hardware bug."...
bug-compatible => adj. Said of a design or revision that has been badly compromised by a requirement to be compatible with fossils or misfeatures in other programs or (esp.) previous releases of itself. "MS-DOS 2.0 used \ as a path separator to be bu...
bug-for-bug compatible => n. Same as bug-compatible, with the additional implication that much tedious effort went into ensuring that each (known) bug was replicated.
buglix => /buhg'liks/ n. Pejorative term referring to DEC's ULTRIX operating system in its earlier *severely* buggy versions. Still used to describe ULTRIX, but without venom. Compare HP-SUX.
bulletproof => adj. Used of an algorithm or implementation considered extremely robust; lossage-resistant; capable of correctly recovering from any imaginable exception condition. This is a rare and valued quality. Syn. armor-plated.
bum => 1. vt. To make highly efficient, either in time or space, often at the expense of clarity. "I managed to bum three more instructions out of that code." "I spent half the night bumming the interrupt code." 2. To squeeze out excess; to remove so...
bump => vt. Synonym for increment. Has the same meaning as C's ++ operator. Used esp. of counter variables, pointers, and index dummies in `for', `while', and `do-while' loops.
burble => [from Lewis Carroll's "Jabberwocky"] v. Like flame, but connotes that the source is truly clueless and ineffectual (mere flamers can be competent). A term of deep contempt. "There's some guy on the phone burbling about how he got a DISK FUL...
buried treasure => n. A surprising piece of code found in some program. While usually not wrong, it tends to vary from crufty to bletcherous, and has lain undiscovered only because it was functionally correct, however horrible it is. Used sarcastical...
buried treasure2 => anything *but* treasure. Buried treasure almost always needs to be dug up and removed. "I just found that the scheduler sorts its queue using {bubble sort}! Buried treasure!" 
burn-in period => n. 1. A factory test designed to catch systems with marginal components before they get out the door; the theory is that burn-in will protect customers by outwaiting the steepest part of the {bathtub curve} (see {infant mortality})....
burn-in period2 => length in which a person using a computer is so intensely involved in his project that he forgets basic needs such as food, drink, sleep, etc. Warning Excessive burn-in can lead to burn-out. See {hack mode}, {larval stage}. 
burst page => n. Syn. banner, sense 1.
busy-wait => vi. Used of human behavior, conveys that the subject is busy waiting for someone or something, intends to move instantly as soon as it shows up, and thus cannot do anything else at the moment. "Can't talk now, I'm busy-waiting till Bill ...
buzz => vi. 1. Of a program, to run with no indication of progress and perhaps without guarantee of ever finishing; esp. said of programs thought to be executing tight loops of code. A program that is buzzing appears to be catatonic, but you never ge...
BWQ => /B-W-Q/ [IBM acronym, `Buzz Word Quotient'] The percentage of buzzwords in a speech or documents. Usually roughly proportional to bogosity. See TLA.
by hand => adv. Said of an operation (especially a repetitive, trivial, and/or tedious one) that ought to be performed automatically by the computer, but which a hacker instead has to step tediously through. "My mailer doesn't have a command to inclu...
by hand2 => replying to, so I have to do it by hand." This does not necessarily mean the speaker has to retype a copy of the message; it might refer to, say, dropping into a subshell from the mailer, making a copy of one's mailbox file, reading that ...
by hand3 => and bottom of the message in question, deleting the rest of the file, inserting `>' characters on each line, writing the file, leaving the editor, returning to the mailer, reading the file in, and later remembering to delete the file. Com...
byte => /bit/ [techspeak] n. A unit of memory or data equal to the amount used to represent one character; on modern architectures this is usually 8 bits, but may be 9 on 36-bit machines. Some older architectures used `byte' for quantities of 6 or 7 ...
bytesexual => /bit`sek'shu-*l/ adj. Said of hardware, denotes willingness to compute or pass data in either big-endian or little-endian format (depending, presumably, on a {mode bit} somewhere). See also {NUXI problem}.*C n. 1. The third letter of th...
calculator => [Cambridge] n. Syn. for {bitty box}.
can => vt. To abort a job on a time-sharing system. Used esp. when the person doing the deed is an operator, as in "canned from the {console}". Frequently used in an imperative sense, as in "Can that print job, the LPT just popped a sprocket!" Synony...
canonical => [historically, `according to religious law'] adj. The usual or standard state or manner of something. This word has a somewhat more technical meaning in mathematics. Two formulas such as 9 + x and x + 9 are said to be equivalent because ...

factpacks/jargon.fact  view on Meta::CPAN

chug => vi. To run slowly; to grind or grovel. "The disk is chugging like crazy."
Church of the SubGenius => n. A mutant offshoot of Discordianism launched in 1981 as a spoof of fundamentalist Christianity by the `Reverend' Ivan Stang, a brilliant satirist with a gift for promotion. Popular among hackers as a rich source of bizarr...
Church of the SubGenius2 => "Bob" the divine drilling-equipment salesman, the Benevolent Space Xists, and the Stark Fist of Removal. Much SubGenius theory is concerned with the acquisition of the mystical substance or quality of `slack'. 
Cinderella Book => [CMU] n. `Introduction to Automata Theory, Languages, and Computation', by John Hopcroft and Jeffrey Ullman, (Addison-Wesley, 1979). So called because the cover depicts a girl (putatively Cinderella) sitting in front of a Rube Gold...
Cinderella Book2 => coming out of it. The back cover depicts the girl with the device in shambles after she has pulled on the rope. See also {{book titles}}. 
CI$ => // n. Hackerism for `CIS', CompuServe Information Service. The dollar sign refers to CompuServe's rather steep line charges. Often used in {sig block}s just before a CompuServe address. Syn. Compu$erve.
Classic C => /klas'ik C/ [a play on `Coke Classic'] n. The C programming language as defined in the first edition of K&R, with some small additions. It is also known as `K&R C'. The name came into use while C was being standardized by the ANSI X3J11 ...
Classic C2 => This is sometimes applied elsewhere thus, `X Classic', where X = Star Trek (referring to the original TV series) or X = PC (referring to IBM's ISA-bus machines as opposed to the PS/2 series). This construction is especially used of prod...
Classic C3 => versions are considered serious losers relative to the older ones. 
clean => 1. adj. Used of hardware or software designs, implies `elegance in the small', that is, a design or implementation that may not hold any surprises but does things in a way that is reasonably intuitive and relatively easy to comprehend from t...
CLM => /C-L-M/ [Sun `Career Limiting Move'] 1. n. An action endangering one's future prospects of getting plum projects and raises, and possibly one's job "His Halloween costume was a parody of his manager. He won the prize for `best CLM'." 2. adj. D...
clobber => vt. To overwrite, usually unintentionally "I walked off the end of the array and clobbered the stack." Compare mung, scribble, trash, and {smash the stack}.
clocks => n. Processor logic cycles, so called because each generally corresponds to one clock pulse in the processor's timing. The relative execution times of instructions on a machine are usually discussed in clocks rather than absolute fractions o...
clone => n. 1. An exact duplicate "Our product is a clone of their product." Implies a legal reimplementation from documentation or by reverse-engineering. Also connotes lower price. 2. A shoddy, spurious copy "Their product is a clone of our product...
clover key => [Mac users] n. See {command key}.
clustergeeking => /kluh'st*r-gee`king/ [CMU] n. Spending more time at a computer cluster doing CS homework than most people spend breathing.
COBOL => /koh'bol/ [COmmon Business-Oriented Language] n. (Synonymous with evil.) A weak, verbose, and flabby language used by {card walloper}s to do boring mindless things on dinosaur mainframes. Hackers believe all COBOL programmers are suits or {c...
COBOL fingers => /koh'bol fing'grz/ n. Reported from Sweden, a (hypothetical) disease one might get from coding in COBOL. The language requires code verbose beyond all reason; thus it is alleged that programming too much in COBOL causes one's fingers...
COBOL fingers2 => endless typing. "I refuse to type in all that source code again; it would give me COBOL fingers!" 
code grinder => n. 1. A suit-wearing minion of the sort hired in legion strength by banks and insurance companies to implement payroll packages in RPG and other such unspeakable horrors. In his native habitat, the code grinder often removes the suit ...
code grinder2 => consisting of button-down shirt (starch optional) and a tie. In times of dire stress, the sleeves (if long) may be rolled up and the tie loosened about half an inch. It seldom helps. The {code grinder}'s milieu is about as far from h...

factpacks/jargon.fact  view on Meta::CPAN

Commonwealth Hackish6 => fixer}, noddy, psychedelicware, plingnet, {raster blaster}, seggie, {terminal junkie}, {tick-list features}, weeble, weasel, YABA, and notes or definitions under {Bad Thing}, barf, bogus, bum, {chase pointers}, {cosmic rays},...
Commonwealth Hackish7 => crunch, dodgy, gonk, hamster, hardwarily, mess-dos, nybble, proglet, root, SEX, tweak, and xyzzy. 
compact => adj. Of a design, describes the valuable property that it can all be apprehended at once in one's head. This generally means the thing created from the design can be used with greater facility and fewer errors than an equivalent tool that ...
compiler jock => n. See jock (sense 2).
compress => [UNIX] vt. When used without a qualifier, generally refers to crunching of a file using a particular C implementation of Lempel-Ziv compression by James A. Woods et al. and widely circulated via USENET. Use of crunch itself in this sense ...
Compu$erve => n. See CI$.
computer confetti => n. Syn. chad. Though this term is common, this use of the punched-card chad is not a good idea, as the pieces are stiff and have sharp corners that could injure the eyes. GLS reports that he once attended a wedding at MIT during ...
computer confetti2 => enthusiastically threw chad instead of rice. The groom later grumbled that he and his bride had spent most of the evening trying to get the stuff out of their hair. 
computer geek => n. One who eats (computer) bugs for a living. One who fulfills all the dreariest negative stereotypes about hackers an asocial, malodorous, pasty-faced monomaniac with all the personality of a cheese grater. Cannot be used by outside...
computer geek2 => hackers; compare black-on-black usage of `nigger'. A computer geek may be either a fundamentally clueless individual or a proto-hacker in {larval stage}. Also called `turbo nerd', `turbo geek'. See also clustergeeking, {geek out}, w...
computron => /kom'pyoo-tron`/ n. 1. A notional unit of computing power combining instruction speed and storage capacity, dimensioned roughly in instructions-per-second times megabytes-of-main-store times megabytes-of-mass-storage. "That machine can't...
condition out => vt. To prevent a section of code from being compiled by surrounding it with a conditional-compilation directive whose condition is always false. The canonical examples are `#if 0' (or `#ifdef notdef', though some find this bletcherou...
condom => n. 1. The protective plastic bag that accompanies 3.5-inch microfloppy diskettes. Rarely, also used of (paper) disk envelopes. Unlike the write protect tab, the condom (when left on) not only impedes the practice of SEX but has also been sh...
connector conspiracy => [probably came into prominence with the appearance of the KL-10 (one model of the PDP-10), none of whose connectors matched anything else] n. The tendency of manufacturers (or, by extension, programmers or purveyors of anythin...
connector conspiracy2 => that don't fit together with the old stuff, thereby making you buy either all new stuff or expensive interface devices. The KL-10 Massbus connector was actually *patented* by DEC, which reputedly refused to license the design...
connector conspiracy3 => parties out of competition for the lucrative Massbus peripherals market. This is a source of never-ending frustration for the diehards who maintain older PDP-10 or VAX systems. Their CPUs work fine, but they are stuck with dy...
connector conspiracy4 => drives with low capacity and high power requirements. In these latter days of open-systems computing this term has fallen somewhat into disuse, to be replaced by the observation that "Standards are great! There are so *many* ...
cons => /konz/ or /kons/ [from LISP] 1. vt. To add a new element to a specified list, esp. at the top. "OK, cons picking a replacement for the console TTY onto the agenda." 2. `cons up' vt. To synthesize from smaller pieces "to cons up an example". I...
considered harmful => adj. Edsger W. Dijkstra's note in the March 1968 `Communications of the ACM', "Goto Statement Considered Harmful", fired the first salvo in the structured programming wars. Amusingly, the ACM considered the resulting acrimony su...
considered harmful2 => policy) no longer print an article taking so assertive a position against a coding practice. In the ensuing decades, a large number of both serious papers and parodies have borne titles of the form "X considered Y". The structu...
considered harmful3 => over with the realization that both sides were wrong, but use of such titles has remained as a persistent minor in-joke (the `considered silly' found at various places in this lexicon is related). 

factpacks/jargon.fact  view on Meta::CPAN

double bucky4 => much like playing a full pipe organ. This idea is mentioned in a parody of a very fine song by Jeffrey Moss called "Rubber Duckie", which was published in `The Sesame Street Songbook' (Simon and Schuster 1971, ISBN 671-21036-X). Thes...
double bucky5 => 1978, in celebration of the Stanford keyboard See also {meta bit}, cokebottle, and {quadruple bucky}. 
double DECkers => n. Used to describe married couples in which both partners work for Digital Equipment Corporation.
doubled sig => [USENET] n. A {sig block} that has been included twice in a USENET article or, less commonly, in an electronic mail message. An article or message with a doubled sig can be caused by improperly configured software. More often, however,...
doubled sig2 => experience in electronic communication. See BIFF, pseudo. 
down => 1. adj. Not operating. "The up escalator is down" is considered a humorous thing to say, and "The elevator is down" always means "The elevator isn't working" and never refers to what floor the elevator is on. With respect to computers, this u...
download => vt. To transfer data or (esp.) code from a larger `host' system (esp. a mainframe) over a digital comm link to a smaller `client' system, esp. a microcomputer or specialized peripheral. Oppose upload. However, note that ground-to-space co...
DP => /D-P/ n. 1. Data Processing. Listed here because, according to hackers, use of the term marks one immediately as a suit. See DPer. 2. Common abbrev for {Dissociated Press}.
DPB => /d*-pib'/ [from the PDP-10 instruction set] vt. To plop something down in the middle. Usage silly. "DPB yourself into that couch there." The connotation would be that the couch is full except for one slot just big enough for you to sit in. DPB...
DPer => /dee-pee-er/ n. Data Processor. Hackers are absolutely amazed that suits use this term self-referentially. "*Computers* process data, not people!" See DP.
dragon => n. [MIT] A program similar to a daemon, except that it is not invoked at all, but is instead used by the system to perform various secondary tasks. A typical example would be an accounting program, which keeps track of who is logged in, acc...
Dragon Book => n. The classic text `Compilers Principles, Techniques and Tools', by Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman (Addison-Wesley 1986; ISBN 0-201-10088-6), so called because of the cover design featuring a dragon labeled `complexi...
Dragon Book2 => bearing the lance `LALR parser generator' among his other trappings. This one is more specifically known as the `Red Dragon Book' (1986); an earlier edition, sans Sethi and titled `Principles Of Compiler Design' (Alfred V. Aho and Jef...
Dragon Book3 => ISBN 0-201-00022-9), was the `Green Dragon Book' (1977). (Also `New Dragon Book', `Old Dragon Book'.) The horsed knight and the Green Dragon were warily eying each other at a distance; now the knight is typing (wearing gauntlets!) at ...
Dragon Book4 => representation of the Red Dragon's head while the rest of the beast extends back in normal space. See also {{book titles}}. 
drain => [IBM] v. Syn. for flush (sense 2). Has a connotation of finality about it; one speaks of draining a device before taking it offline.
dread high-bit disease => n. A condition endemic to PRIME (a.k.a. PR1ME) minicomputers that results in all the characters having their high (0x80) bit ON rather than OFF. This of course makes transporting files to other systems much more difficult, n...
dread high-bit disease2 => devices. It is reported that PRIME adopted the reversed-8-bit convention in order to save 25 cents per serial line per machine. This probably qualifies as one of the most cretinous design tradeoffs ever made. See {meta bit}...
dread high-bit disease3 => (including the Atari 800) have exhibited similar brain damage. 
DRECNET => /drek'net/ [from Yiddish/German `dreck', meaning dirt] n. Deliberate distortion of DECNET, a networking protocol used in the VMS community. So called because DEC helped write the Ethernet specification and then (either stupidly or as a mal...
driver => n. 1. The {main loop} of an event-processing program; the code that gets commands and dispatches them for execution. 2. [techspeak] In `device driver', code designed to handle a particular peripheral device such as a magnetic disk or tape u...

factpacks/jargon.fact  view on Meta::CPAN

firmy => /fer'mee/ Syn. stiffy (a 3.5-inch floppy disk).
fish => [Adelaide University, Australia] n. 1. Another metasyntactic variable. See foo. Derived originally from the Monty Python skit in the middle of "The Meaning of Life" entitled "Find the Fish". 2. A pun for `microfiche'. A microfiche file cabine...
FISH queue => [acronym, by analogy with FIFO (First In, First Out)] n. `First In, Still Here'. A joking way of pointing out that processing of a particular sequence of events or requests has stopped dead. Also `FISH mode' and `FISHnet'; the latter ma...
FISH queue2 => running really slowly or exhibiting extreme flakiness. 
fix => n.,v. What one does when a problem has been reported too many times to be ignored.
flag => n. A variable or quantity that can take on one of two values; a bit, particularly one that is used to indicate one of two outcomes or is used to control which of two things is to be done. "This flag controls whether to clear the screen before...
flag day => n. A software change that is neither forward- nor backward-compatible, and which is costly to make and costly to reverse. "Can we install that without causing a flag day for all users?" This term has nothing to do with the use of the word...
flag day2 => two values. It came into use when a massive change was made to the {Multics} timesharing system to convert from the old ASCII code to the new one; this was scheduled for Flag Day (a U.S. holiday), June 14, 1966. See also {backward combat...
flaky => adj. (var sp. `flakey') Subject to frequent lossage. This use is of course related to the common slang use of the word to describe a person as eccentric, crazy, or just unreliable. A system that is flaky is working, sort of --- enough that y...
flamage => /flay'm*j/ n. Flaming verbiage, esp. high-noise, low-signal postings to USENET or other electronic fora. Often in the phrase `the usual flamage'. `Flaming' is the act itself; `flamage' the content; a `flame' is a single flaming message. Se...
flame => 1. vi. To post an email message intended to insult and provoke. 2. vi. To speak incessantly and/or rabidly on some relatively uninteresting subject or with a patently ridiculous attitude. 3. vt. Either of senses 1 or 2, directed with hostili...
flame bait => n. A posting intended to trigger a {flame war}, or one that invites flames in reply.
flame on => vi.,interj. 1. To begin to flame. The punning reference to Marvel Comics's Human Torch is no longer widely recognized. 2. To continue to flame. See rave, burble.
flame war => n. (var. `flamewar') An acrimonious dispute, especially when conducted on a public electronic forum such as USENET.
flamer => n. One who habitually flames. Said esp. of obnoxious USENET personalities.
flap => vt. 1. To unload a DECtape (so it goes flap, flap, flap...). Old-time hackers at MIT tell of the days when the disk was device 0 and microtapes were 1, 2,... and attempting to flap device 0 would instead start a motor banging inside a cabinet...
flarp => /flarp/ [Rutgers University] n. Yet another metasyntactic variable (see foo). Among those who use it, it is associated with a legend that any program not containing the word `flarp' somewhere will not work. The legend is discreetly silent on...
flat => adj. 1. Lacking any complex internal structure. "That {bitty box} has only a flat filesystem, not a hierarchical one." The verb form is flatten. 2. Said of a memory architecture (like that of the VAX or 680x0) that is one big linear address s...
flat-ASCII => adj. Said of a text file that contains only 7-bit ASCII characters and uses only ASCII-standard control characters (that is, has no embedded codes specific to a particular text formatter or markup language, and no meta-characters). Syn....
flat-file => adj. A flattened representation of some database or tree or network structure as a single file from which the structure could implicitly be rebuilt, esp. one in flat-ASCII form.
flatten => vt. To remove structural information, esp. to filter something with an implicit tree structure into a simple sequence of leaves; also tends to imply mapping to flat-ASCII. "This code flattens an expression with parentheses into an equivale...

factpacks/jargon.fact  view on Meta::CPAN

IWBNI => // [acronym] `It Would Be Nice If'. Compare WIBNI.
IYFEG => // [USENET] Abbreviation for `Insert Your Favorite Ethnic Group'. Used as a meta-name when telling racist jokes on the net to avoid offending anyone. See JEDR.*J. Random /J rand'm/ n. [generalized from {J. Random Hacker}] Arbitrary; ordinary...
J. Random Hacker => [MIT] /J rand'm hak'r/ n. A mythical figure like the Unknown Soldier; the archetypal hacker nerd. See random, {Suzie COBOL}. This may originally have been inspired or influenced by `J. Fred Muggs', a show-biz chimpanzee whose name...
jaggies => /jag'eez/ n. The `stairstep' effect observable when an edge (esp. a linear edge of very shallow or steep slope) is rendered on a pixel device (as opposed to a vector display).
JCL => /J-C-L/ n. 1. IBM's supremely rude Job Control Language. JCL is the script language used to control the execution of programs in IBM's batch systems. JCL has a very fascist syntax, and some versions will, for example, barf if two spaces appear...
JEDR => // n. Synonymous with IYFEG. At one time, people in the USENET newsgroup rec.humor.funny tended to use `JEDR' instead of IYFEG or `<ethnic>'; this stemmed from a public attempt to suppress the group once made by a loser with initials JEDR aft...
JFCL => /jif'kl/, /jaf'kl/, /j*-fi'kl/ vt., obs. (alt. `jfcl') To cancel or annul something. "Why don't you jfcl that out?" The fastest do-nothing instruction on older models of the PDP-10 happened to be JFCL, which stands for "Jump if Flag set and t...
jiffy => n. 1. The duration of one tick of the system clock on the computer (see tick). Often one AC cycle time (1/60 second in the U.S. and Canada, 1/50 most other places), but more recently 1/100 sec has become common. "The swapper runs every 6 jif...
job security => n. When some piece of code is written in a particularly obscure fashion, and no good reason (such as time or space optimization) can be discovered, it is often said that the programmer was attempting to increase his job security (i.e....
job security2 => for maintenance). This sour joke seldom has to be said in full; if two hackers are looking over some code together and one points at a section and says "job security", the other one may just nod. 
jock => n. 1. A programmer who is characterized by large and somewhat brute-force programs. See {brute force}. 2. When modified by another noun, describes a specialist in some particular computing area. The compounds `compiler jock' and `systems jock...
joe code => /joh' kohd`/ n. 1. Code that is overly tense and unmaintainable. "Perl may be a handy program, but if you look at the source, it's complete joe code." 2. Badly written, possibly buggy code. Correspondents wishing to remain anonymous have ...
joe code2 => the Lawrence Berkeley Laboratory and observed that usage has drifted slightly; the original sobriquet `Joe code' was intended in sense 1. 
JR[LN] => /J-R-L/, /J-R-N/ n. The names JRL and JRN were sometimes used as example names when discussing a kind of user ID used under {TOPS-10}; they were understood to be the initials of (fictitious) programmers named `J. Random Loser' and `J. Rando...
JRST => /jerst/ [based on the PDP-10 jump instruction] v.,obs. To suddenly change subjects, with no intention of returning to the previous topic. Usage rather rare except among PDP-10 diehards, and considered silly. See also AOS.
juggling eggs => vi. Keeping a lot of state in your head while modifying a program. "Don't bother me now, I'm juggling eggs", means that an interrupt is likely to result in the program's being scrambled. In the classic first-contact SF novel `The Mot...
juggling eggs2 => and Jerry Pournelle, an alien describes a very difficult task by saying "We juggle priceless eggs in variable gravity." That is a very hackish use of language. See also {hack mode}. 
jump off into never-never land => [from J. M. Barrie's `Peter Pan'] v. Same as {branch to Fishkill}, but more common in technical cultures associated with non-IBM computers that use the term `jump' rather than `branch'. Compare hyperspace.*K /K/ [fro...
jump off into never-never land2 => used both as a spoken word and a written suffix (like meg and gig for megabyte and gigabyte). See {quantifiers}. 
K&R => [Kernighan and Ritchie] n. Brian Kernighan and Dennis Ritchie's book `The C Programming Language', esp. the classic and influential first edition (Prentice-Hall 1978; ISBN 0-113-110163-3). Syn. {White Book}, {Old Testament}. See also {New Test...
kahuna => /k*-hoo'nuh/ [IBM from the Hawaiian title for a shaman] n. Synonym for wizard, guru.

factpacks/jargon.fact  view on Meta::CPAN

Live Free Or Die! => imp. 1. The state motto of New Hampshire, which appears on that state's automobile license plates. 2. A slogan associated with UNIX in the romantic days when UNIX aficionados saw themselves as a tiny, beleaguered underground tilt...
Live Free Or Die!2 => industry. The "free" referred specifically to freedom from the fascist design philosophies and crufty misfeatures common on commercial operating systems. Armando Stettner, one of the early UNIX developers, used to give out fake ...
Live Free Or Die!3 => under a large UNIX, all in New Hampshire colors of green and white. These are now valued collector's items. 
livelock => /liv'lok/ n. A situation in which some critical stage of a task is unable to finish because its clients perpetually create more work for it to do after they have been serviced but before it can clear its queue. Differs from deadlock in th...
liveware => /liv'weir/ n. 1. Synonym for wetware. Less common. 2. [Cambridge] Vermin. "Waiter, there's some liveware in my salad..."
lobotomy => n. 1. What a hacker subjected to formal management training is said to have undergone. At IBM and elsewhere this term is used by both hackers and low-level management; the latter doubtless intend it as a joke. 2. The act of removing the p...
locked and loaded => [from military slang for an M-16 rifle with magazine inserted and prepared for firing] adj. Said of a removable disk volume properly prepared for use --- that is, locked into the drive and with the heads loaded. Ironically, becau...
locked and loaded2 => the power is up, this description is never used of {Winchester} drives (which are named after a rifle). 
locked up => adj. Syn. for hung, wedged.
logic bomb => n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}.
logical => [from the technical term `logical device', wherein a physical device is referred to by an arbitrary `logical' name] adj. Having the role of. If a person (say, Les Earnest at SAIL) who had long held a certain post left and were replaced, th...
loop through => vt. To process each element of a list of things. "Hold on, I've got to loop through my paper mail." Derives from the computer-language notion of an iterative loop; compare `cdr down' (under cdr), which is less common among C and UNIX ...
loop through2 => say `IRP over' after an obscure pseudo-op in the MIDAS PDP-10 assembler. 
lord high fixer => [primarily British, from Gilbert & Sullivan's `lord high executioner'] n. The person in an organization who knows the most about some aspect of a system. See wizard.
lose => [MIT] vi. 1. To fail. A program loses when it encounters an exceptional condition or fails to work in the expected manner. 2. To be exceptionally unesthetic or crocky. 3. Of people, to be obnoxious or unusually stupid (as opposed to ignorant)...
lose 2 => 4. n. Refers to something that is losing, especially in the phrases "That's a lose!" and "What a lose!" 
lose lose => interj. A reply to or comment on an undesirable situation. "I accidentally deleted all my files!" "Lose, lose."
loser => n. An unexpectedly bad situation, program, programmer, or person. Someone who habitually loses. (Even winners can lose occasionally.) Someone who knows not and knows not that he knows not. Emphatic forms are `real loser', `total loser', and ...
losing => adj. Said of anything that is or causes a lose or lossage.
loss => n. Something (not a person) that loses; a situation in which something is losing. Emphatic forms include `moby loss', and `total loss', `complete loss'. Common interjections are "What a loss!" and "What a moby loss!" Note that `moby loss' is ...
lossage => /los'*j/ n. The result of a bug or malfunction. This is a mass or collective noun. "What a loss!" and "What lossage!" are nearly synonymous. The former is slightly more particular to the speaker's present circumstances; the latter implies ...

factpacks/jargon.fact  view on Meta::CPAN

memory leak => n. An error in a program's dynamic-store allocation logic that causes it to fail to reclaim discarded memory, leading to eventual collapse due to memory exhaustion. Also (esp. at CMU) called {core leak}. See {aliasing bug}, {fandango o...
memory leak2 => {precedence lossage}, {overrun screw}, {leaky heap}, leak. 
menuitis => /men`yoo-i:'tis/ n. Notional disease suffered by software with an obsessively simple-minded menu interface and no escape. Hackers find this intensely irritating and much prefer the flexibility of command-line or language-style interfaces,...
mess-dos => /mes-dos/ n. Derisory term for MS-DOS. Often followed by the ritual banishing "Just say No!" See {MS-DOS}. Most hackers (even many MS-DOS hackers) loathe MS-DOS for its single-tasking nature, its limits on application size, its nasty prim...
meta => /me't*/ or /may't*/ or (Commonwealth) /mee't*/ [from analytic philosophy] adj.,pref. One level of description up. A meta-syntactic variable is a variable in notation used to describe syntax, and meta-language is language used to describe lang...
meta bit => n. The top bit of an 8-bit character, which is on in character values 128--255. Also called {high bit}, {alt bit}, or hobbit. Some terminals and consoles (see {space-cadet keyboard}) have a META shift key. Others (including, *mirabile dic...
meta bit2 => machines) have an ALT key. See also {bucky bits}. 
MFTL => /M-F-T-L/ [acronym: `My Favorite Toy Language'] 1. adj. Describes a talk on a programming language design that is heavy on the syntax (with lots of BNF), sometimes even talks about semantics (e.g., type systems), but rarely, if ever, has any ...
mickey => n. The resolution unit of mouse movement. It has been suggested that the `disney' will become a benchmark unit for animation graphics performance.
mickey mouse program => n. North American equivalent of a noddy (that is, trivial) program. Doesn't necessarily have the belittling connotations of mainstream slang "Oh, that's just mickey mouse stuff!"; sometimes trivial programs can be very useful.
micro- => pref. 1. Very small; this is the root of its use as a quantifier prefix. 2. A quantifier prefix, calling for multiplication by 10^-6 (see {quantifiers}). Neither of these uses is peculiar to hackers, but hackers tend to fling them both arou...
microfortnight => n. About 1.2 sec. The VMS operating system has a lot of tuning parameters that you can set with the SYSGEN utility, and one of these is TIMEPROMPTWAIT, the time the system will wait for an operator to set the correct date and time a...
microLenat => /mi:-kroh-len'-*t/ n. See bogosity.
microReid => /mi:'kroh-reed/ n. See bogosity.
Microsloth Windows => /mi:'kroh-sloth` win'dohz/ n. Hackerism for `Microsoft Windows', a windowing system for the IBM-PC which is so limited by bug-for-bug compatibility with mess-dos that it is agonizingly slow on anything less than a fast 386. Comp...
microtape => /mi:'kroh-tayp/ n. Occasionally used to mean a DECtape, as opposed to a macrotape. A DECtape is a small reel, about 4 inches in diameter, of magnetic tape about an inch wide. Unlike drivers for today's macrotapes, microtape drivers allow...
middle-endian => adj. Not big-endian or little-endian. Used of perverse byte orders such as 3-4-1-2 or 2-1-4-3, occasionally found in the packed-decimal formats of minicomputer manufacturers who shall remain nameless. See {NUXI problem}.
milliLampson => /mil'*-lamp`sn/ n. A unit of talking speed, abbreviated mL. Most people run about 200 milliLampsons. Butler Lampson (a CS theorist and systems implementor highly regarded among hackers) goes at 1000. A few people speak faster. This un...
minifloppies => n. 5.25-inch vanilla floppy disks, as opposed to 3.5-inch or microfloppies and the now-obsolescent 8-inch variety. At one time, this term was a trademark of Shugart Associates for their SA-400 minifloppy drive. Nobody paid any attenti...
MIPS => /mips/ [acronym] n. 1. A measure of computing speed; formally, `Million Instructions Per Second' (that's 10^6 per second, not 2^20!); often rendered by hackers as `Meaningless Indication of Processor Speed' or in other unflattering ways. This...
misbug => /mis-buhg/ [MIT] n. An unintended property of a program that turns out to be useful; something that should have been a bug but turns out to be a feature. Usage: rare. Compare {green lightning}. See miswart.

factpacks/jargon.fact  view on Meta::CPAN

New Jersey2 => from a compiler designed in New Jersey?" Compare {Berkeley Quality Software}. See also {UNIX conspiracy}. 
New Testament => n. [C programmers] The second edition of K&R's `The C Programming Language' (Prentice-Hall, 1988; ISBN 0-13-110362-8), describing ANSI Standard C. See K&R.
newbie => /n[y]oo'bee/ n. [orig. from British public-school and military slang variant of `new boy'] A USENET neophyte. This term surfaced in the newsgroup talk.bizarre but is now in wide use. Criteria for being considered a newbie vary wildly; a per...
newgroup wars => /n[y]oo'groop wohrz/ [USENET] n. The salvos of dueling `newgroup' and `rmgroup' messages sometimes exchanged by persons on opposite sides of a dispute over whether a newsgroup should be created net-wide. These usually settle out with...
newgroup wars2 => clear whether the group has a natural constituency (usually, it doesn't). At times, especially in the completely anarchic alt hierarchy, the names of newsgroups themselves become a form of comment or humor; e.g., the spinoff of alt....
newgroup wars3 => alt.tv.muppets in early 1990, or any number of specialized abuse groups named after particularly notorious flamers, e.g., alt.weemba. 
newline => /n[y]oo'li:n/ n. 1. [techspeak, primarily UNIX] The ASCII LF character (0001010), used under {UNIX} as a text line terminator. A Bell-Labs-ism rather than a Berkeleyism; interestingly (and unusually for UNIX jargon), it is said to have ori...
NeWS => /nee'wis/, /n[y]oo'is/ or /n[y]ooz/ [acronym; the `Network Window System'] n. The road not taken in window systems, an elegant PostScript-based environment that would almost certainly have won the standards war with X if it hadn't been propri...
news => n. See netnews.
newsfroup => // [USENET] n. Silly synonym for newsgroup, originally a typo but now in regular use on USENET's talk.bizarre and other lunatic-fringe groups.
newsgroup => [USENET] n. One of USENET's huge collection of topic groups or fora. Usenet groups can be `unmoderated' (anyone can post) or `moderated' (submissions are automatically directed to a moderator, who edits or filters and then posts the resu...
nickle => /ni'kl/ [from `nickel', common name for the U.S. 5-cent coin] n. A nybble + 1; 5 bits. Reported among developers for Mattel's GI 1600 (the Intellivision games processor), a chip with 16-bit-wide RAM but 10-bit-wide ROM. See also deckle.
night mode => n. See phase (of people).
Nightmare File System => n. Pejorative hackerism for Sun's Network File System (NFS). In any nontrivial network of Suns where there is a lot of NFS cross-mounting, when one Sun goes down, the others often freeze up. Some machine tries to access the d...
Nightmare File System2 => repeats indefinitely. This causes it to appear dead to some messages (what is actually happening is that it is locked up in what should have been a brief excursion to a higher spl level). Then another machine tries to reach ...
Nightmare File System3 => pseudo-down machine, and itself becomes pseudo-down. The first machine to discover the down one is now trying both to access the down one and to respond to the pseudo-down one, so it is even harder to reach. This snowballs v...
Nightmare File System4 => network of machines is frozen --- the user can't even abort the file access that started the problem! (ITS partisans are apt to cite this as proof of UNIX's alleged bogosity; ITS had a working NFS-like shared file system wit...
Nightmare File System5 => 1970s.) See also {broadcast storm}. 
NIL => /nil/ [from LISP terminology for `false'] No. Used in reply to a question, particularly one asked using the `-P' convention. See T.
NMI => /N-M-I/ n. Non-Maskable Interrupt. An IRQ 7 on the PDP-11 or 680[01234]0; the NMI line on an 8088,[1234]86. In contrast with a {priority interrupt} (which might be ignored, although that is unlikely), an NMI is *never* ignored.
no-op => /noh'op/ alt. NOP /nop/ [no operation] n. 1. (also v.) A machine instruction that does nothing (sometimes used in assembler-level programming as filler for data or patch areas, or to overwrite code to be removed in binaries). See also JFCL. ...
noddy => /nod'ee/ [UK: from the children's books] adj. 1. Small and un-useful, but demonstrating a point. Noddy programs are often written by people learning a new language or system. The archetypal noddy program is {hello, world}. Noddy code may be ...
NOMEX underwear => /noh'meks uhn'-der-weir/ [USENET] n. Syn. {asbestos longjohns}, used mostly in auto-related mailing lists and newsgroups. NOMEX underwear is an actual product available on the racing equipment market, used as a fire resistance meas...
non-optimal solution => n. (also `sub-optimal solution') An astoundingly stupid way to do something. This term is generally used in deadpan sarcasm, as its impact is greatest when the person speaking looks completely serious. Compare stunning. See al...
nonlinear => adj. [scientific computation] 1. Behaving in an erratic and unpredictable fashion. When used to describe the behavior of a machine or program, it suggests that said machine or program is being forced to run far outside of design specific...
nontrivial => adj. Requiring real thought or significant computing power. Often used as an understated way of saying that a problem is quite difficult or impractical, or even entirely unsolvable ("Proving P=NP is nontrivial"). The preferred emphatic ...
notwork => /not'werk/ n. A network, when it is acting flaky or is down. Compare nyetwork. Said at IBM to have orig. referred to a particular period of flakiness on IBM's VNET corporate network, ca. 1988; but there are independent reports of the term ...
NP- => /N-P/ pref. Extremely. Used to modify adjectives describing a level or quality of difficulty; the connotation is often `more so than it should be' (NP-complete problems all seem to be very hard, but so far no one has found a good a priori reas...
nuke => vt. 1. To intentionally delete the entire contents of a given directory or storage volume. "On UNIX, `rm -r /usr' will nuke everything in the usr filesystem." Never used for accidental deletion. Oppose {blow away}. 2. Syn. for dike, applied t...
number-crunching => n. Computations of a numerical nature, esp. those that make extensive use of floating-point numbers. The only thing Fortrash is good for. This term is in widespread informal use outside hackerdom and even in mainstream slang, but ...
numbers => [scientific computation] n. Output of a computation that may not be significant results but at least indicate that the program is running. May be used to placate management, grant sponsors, etc. `Making numbers' means running a program bec...
NUXI problem => /nuk'see pro'bl*m/ n. This refers to the problem of transferring data between machines with differing byte-order. The string `UNIX' might look like `NUXI' on a machine with a different `byte sex' (e.g., when transferring data from a l...
NUXI problem2 => vice-versa). See also middle-endian, swab, and bytesexual. 

factpacks/jargon.fact  view on Meta::CPAN

off-by-one error => n. Exceedingly common error induced in many ways, such as by starting at 0 when you should have started at 1 or vice versa, or by writing `< N' instead of `<= N' or vice-versa. Also applied to giving something to the person next t...
off-by-one error2 => Often confounded with {fencepost error}, which is properly a particular subtype of it. 
offline => adv. Not now or not here. "Let's take this discussion offline." Specifically used on USENET to suggest that a discussion be taken off a public newsgroup to email.
old fart => n. Tribal elder. A title self-assumed with remarkable frequency by (esp.) USENETters who have been programming for more than about 25 years; often appears in {sig block}s attached to Jargon File contributions of great archeological signif...
old fart2 => the second or third person but one of pride in first person. 
Old Testament => n. [C programmers] The first edition of K&R, the sacred text describing {Classic C}.
one-line fix => n. Used (often sarcastically) of a change to a program that is thought to be trivial or insignificant right up to the moment it crashes the system. Usually `cured' by another one-line fix. See also {I didn't change anything!}
one-liner wars => n. A game popular among hackers who code in the language APL (see {write-only language}). The objective is to see who can code the most interesting and/or useful routine in one line of operators chosen from APL's exceedingly hairy p...
one-liner wars2 => was practiced among TECO hackers. Ken Iverson, the inventor of APL, has been credited with a one-liner that, given a number N, produces a list of the prime numbers from 1 to N inclusive. It looks like this	(2 = 0 +.= T o.| T) / T <...
one-liner wars3 => character, the assignment arrow is a single character, and `i' represents the APL iota. 
ooblick => /oo'blik/ [from Dr. Seuss's `Bartholomew and the Oobleck'] n. A bizarre semi-liquid sludge made from cornstarch and water. Enjoyed among hackers who make batches during playtime at parties for its amusing and extremely non-Newtonian behavi...
open => n. Abbreviation for `open (or left) parenthesis' --- used when necessary to eliminate oral ambiguity. To read aloud the LISP form (DEFUN FOO (X) (PLUS X 1)) one might say "Open defun foo, open eks close, open, plus eks one, close close."
open switch => [IBM prob. from railroading] n. An unresolved question, issue, or problem.
operating system => [techspeak] n. (Often abbreviated `OS') The foundation software of a machine, of course; that which schedules tasks, allocates storage, and presents a default interface to the user between applications. The facilities an operating...
operating system2 => design philosophy exert an extremely strong influence on programming style and on the technical cultures that grow up around its host machines. Hacker folklore has been shaped primarily by the {UNIX}, {ITS}, {TOPS-10}, {TOPS-20}}...
operating system3 => {CP/M}, {MS-DOS}, and {Multics} operating systems (most importantly by ITS and UNIX). 
Orange Book => n. The U.S. Government's standards document `Trusted Computer System Evaluation Criteria, DOD standard 5200.28-STD, December, 1985' which characterize secure computing architectures and defines levels A1 (most secure) through D (least)...
Orange Book2 => can be upgraded to about C1 without excessive pain. See also {{book titles}}. 
oriental food => n. Hackers display an intense tropism towards oriental cuisine, especially Chinese, and especially of the spicier varieties such as Szechuan and Hunan. This phenomenon (which has also been observed in subcultures that overlap heavily...
oriental food2 => science-fiction fandom) has never been satisfactorily explained, but is sufficiently intense that one can assume the target of a hackish dinner expedition to be the best local Chinese place and be right at least three times out of f...
oriental food3 => {stir-fried random}, {laser chicken}, {Yu-Shiang Whole Fish}. Thai, Indian, Korean, and Vietnamese cuisines are also quite popular. 
orphan => [UNIX] n. A process whose parent has died; one inherited by `init(1)'. Compare zombie.
orphaned i-node => /or'f*nd i'nohd/ [UNIX] n. 1. [techspeak] A file that retains storage but no longer appears in the directories of a filesystem. 2. By extension, a pejorative for any person serving no useful function within some organization, esp. ...
orthogonal => [from mathematics] adj. Mutually independent; well separated; sometimes, irrelevant to. Used in a generalization of its mathematical meaning to describe sets of primitives or capabilities that, like a vector basis in geometry, span the ...
OS => /O-S/ 1. [Operating System] n. An acronym heavily used in email, occasionally in speech. 2. n.,obs. On ITS, an output spy. See appendix A.
OS/2 => /O S too/ n. The anointed successor to MS-DOS for Intel 286- and 386-based micros; proof that IBM/Microsoft couldn't get it right the second time, either. Mentioning it is usually good for a cheap laugh among hackers --- the design was so bar...
out-of-band => [from telecommunications and network theory] adj. 1. In software, describes values of a function which are not in its `natural' range of return values, but are rather signals that some kind of exception has occurred. Many C functions, ...
overflow bit => n. 1. [techspeak] On some processors, an attempt to calculate a result too large for a register to hold causes a particular flag called an {overflow bit} to be set. 2. Hackers use the term of human thought too. "Well, the {Ada} descri...
overflow bit2 => but I could hack it OK until they got to the exception handling ... that set my overflow bit." 3. The hypothetical bit that will be set if a hacker doesn't get to make a trip to the Room of Porcelain Fixtures "I'd better process an i...
overrun => n. 1. [techspeak] Term for a frequent consequence of data arriving faster than it can be consumed, esp. in serial line communications. For example, at 9600 baud there is almost exactly one character per millisecond, so if your silo can hol...

factpacks/jargon.fact  view on Meta::CPAN

pain in the net => n. A flamer.
paper-net => n. Hackish way of referring to the postal service, analogizing it to a very slow, low-reliability network. USENET {sig block}s not uncommonly include a "Paper-Net" header just before the sender's postal address; common variants of this a...
param => /p*-ram'/ n. Shorthand for `parameter'. See also parm; Compare arg, var.
parent message => n. See followup.
parity errors => pl.n. Little lapses of attention or (in more severe cases) consciousness, usually brought on by having spent all night and most of the next day hacking. "I need to go home and crash; I'm starting to get a lot of parity errors." Deriv...
parity errors2 => nearly always correctable transient error in RAM hardware. 
Parkinson's Law of Data => prov. "Data expands to fill the space available for storage"; buying more memory encourages the use of more memory-intensive techniques. It has been observed over the last 10 years that the memory usage of evolving systems ...
Parkinson's Law of Data2 => 18 months. Fortunately, memory density available for constant dollars tends to double about once every 12 months (see {Moore's Law}); unfortunately, the laws of physics guarantee that the latter cannot continue indefinitel...
parm => /parm/ n. Further-compressed form of param. This term is an IBMism, and written use is almost unknown outside IBM shops; spoken /parm/ is more widely distributed, but the synonym arg is favored among hackers. Compare arg, var.
parse => [from linguistic terminology] vt. 1. To determine the syntactic structure of a sentence or other utterance (close to the standard English meaning). "That was the one I saw you." "I can't parse that." 2. More generally, to understand or compr...
Pascal => n. An Algol-descended language designed by Niklaus Wirth on the CDC 6600 around 1967--68 as an instructional tool for elementary programming. This language, designed primarily to keep students from shooting themselves in the foot and thus e...
patch => 1. n. A temporary addition to a piece of code, usually as a quick-and-dirty remedy to an existing bug or misfeature. A patch may or may not work, and may or may not eventually be incorporated permanently into the program. Distinguished from ...
patch space => n. An unused block of bits left in a binary so that it can later be modified by insertion of machine-language instructions there (typically, the patch space is modified to contain new code, and the superseded code is patched to contain...
patch space2 => The widening use of HLLs has made this term rare; it is now primarily historical outside IBM shops. See patch (sense 4), zap (sense 4), hook. 
path => n. 1. A {bang path} or explicitly routed {{Internet address}}; a node-by-node specification of a link between two machines. 2. [UNIX] A filename, fully specified relative to the root directory (as opposed to relative to the current directory;...
pathological => adj. 1. [scientific computation] Used of a data set that is grossly atypical of normal expected input, esp. one that exposes a weakness or bug in whatever algorithm one is using. An algorithm that can be broken by pathological inputs ...
payware => /pay'weir/ n. Commercial software. Oppose shareware or freeware.
PBD => /P-B-D/ [abbrev. of `Programmer Brain Damage'] n. Applied to bug reports revealing places where the program was obviously broken by an incompetent or short-sighted programmer. Compare UBD; see also brain-damaged.
PC-ism => /P-C-izm/ n. A piece of code or coding technique that takes advantage of the unprotected single-tasking environment in IBM PCs and the like, e.g., by busy-waiting on a hardware register, direct diddling of screen memory, or using hard timin...
PD => /P-D/ adj. Common abbreviation for `public domain', applied to software distributed over USENET and from Internet archive sites. Much of this software is not in fact public domain in the legal sense but travels under various copyrights granting...
pdl => /pid'l/ or /puhd'l/ [acronym for `Push Down List'] 1. In ITS days, the preferred MITism for stack. 2. Dave Lebling, one of the co-authors of Zork; (his {network address} on the ITS machines was at one time pdl@dms). 3. `Program Design Language...

factpacks/jargon.fact  view on Meta::CPAN

pnambic => /p*-nam'bik/ [Acronym from the scene in the film version of `The Wizard of Oz' in which true nature of the wizard is first discovered "Pay no attention to the man behind the curtain."] 1. A stage of development of a process or function tha...
pod => [allegedly from acronym POD for `Prince Of Darkness'] n. A Diablo 630 (or, latterly, any letter-quality impact printer). From the DEC-10 PODTYPE program used to feed formatted text to it. See also P.O.D.
poke => n.,vt. See peek.
poll => v.,n. 1. [techspeak] The action of checking the status of an input line, sensor, or memory location to see if a particular external event has been registered. 2. To repeatedly call or check with someone "I keep polling him, but he's not answe...
polygon pusher => n. A chip designer who spends most of his or her time at the physical layout level (which requires drawing *lots* of multi-colored polygons). Also `rectangle slinger'.
POM => /P-O-M/ n. Common acronym for {phase of the moon}. Usage usually in the phrase `POM-dependent', which means flaky.
pop => [from the operation that removes the top of a stack, and the fact that procedure return addresses are saved on the stack] (also capitalized `POP' /pop/) 1. vt. To remove something from a stack or pdl. If a person says he/she has popped somethi...
POPJ => /pop'J/ [from a PDP-10 return-from-subroutine instruction] n.,v. To return from a digression. By verb doubling, "Popj, popj" means roughly "Now let's see, where were we?" See RTI.
posing => n. On a MUD, the use of `' or an equivalent command to announce to other players that one is taking a certain physical action that has no effect on the game (it may, however, serve as a social signal or propaganda device that induces other ...
post => v. To send a message to a {mailing list} or newsgroup. Distinguished in context from `mail'; one might ask, for example "Are you going to post the patch or mail it to known users?"
posting => n. Noun corresp. to v. post (but note that post can be nouned). Distinguished from a `letter' or ordinary email message by the fact that it is broadcast rather than point-to-point. It is not clear whether messages sent to a small mailing l...
postmaster => n. The email contact and maintenance person at a site connected to the Internet or UUCPNET. Often, but not always, the same as the admin. It is conventional for each machine to have a `postmaster' address that is aliased to this person.
pound on => vt. Syn. {bang on}.
power cycle => vt. (also, `cycle power' or just `cycle') To power off a machine and then power it on immediately, with the intention of clearing some kind of hung or gronked state. Syn. {120 reset}; see also {Big Red Switch}. Compare {Vulcan nerve pi...
power cycle2 => see the AI Koan in appendix A about Tom Knight and the novice. 
PPN => /P-P-N/, /pip'n/ [from `Project-Programmer Number'] n. A user-ID under {TOPS-10} and its various mutant progeny at SAIL, BBN, CompuServe, and elsewhere. Old-time hackers from the PDP-10 era sometimes use this to refer to user IDs on other syst...
precedence lossage => /pre's*-dens los'*j/ [C programmers] n. Coding error in an expression due to unexpected grouping of arithmetic or logical operators by the compiler. Used esp. of certain common coding errors in C due to the nonintuitively low pr...
precedence lossage2 => `<<', and `>>' (for this reason, experienced C programmers deliberately forget the language's baroque precedence hierarchy and parenthesize defensively). Can always be avoided by suitable use of parentheses. LISP fans enjoy poi...
precedence lossage3 => happen in *their* favorite language, which eschews precedence entirely, requiring one to use explicit parentheses everywhere. See {aliasing bug}, {memory leak}, {smash the stack}, {fandango on core}, {overrun screw}. 
prepend => /pree`pend'/ [by analogy with `append'] vt. To prefix. As with `append' (but not `prefix' or `suffix' as a verb), the direct object is always the thing being added and not the original word (or character string, or whatever). "If you prepe...
prestidigitization => /pres`t*-di`j*-ti-zay'sh*n/ n. 1. The act of putting something into digital notation via sleight of hand. 2. Data entry through legerdemain.

factpacks/jargon.fact  view on Meta::CPAN

Programmer's Cheer => "Shift to the left! Shift to the right! Pop up, push down! Byte! Byte! Byte!" A joke so old it has hair on it.
programming => n. 1. The art of debugging a blank sheet of paper (or, in these days of on-line editing, the art of debugging an empty file). 2. n. A pastime similar to banging one's head against a wall, but with fewer opportunities for reward. 3. n. ...
propeller head => n. Used by hackers, this is syn. with {computer geek}. Non-hackers sometimes use it to describe all techies. Prob. derives from SF fandom's tradition (originally invented by old-time fan Ray Faraday Nelson) of propeller beanies as f...
propeller head2 => actually wears them except as a joke). 
propeller key => [Mac users] n. See {command key}.
proprietary => adj. 1. In marketroid-speak, superior; implies a product imbued with exclusive magic by the unmatched brilliance of the company's hardware or software designers. 2. In the language of hackers and users, inferior; implies a product not ...
protocol => n. As used by hackers, this never refers to niceties about the proper form for addressing letters to the Papal Nuncio or the order in which one should use the forks in a Russian-style place setting; hackers don't care about such things. I...
provocative maintenance => [common ironic mutation of `preventive maintenance'] n. Actions performed upon a machine at regularly scheduled intervals to ensure that the system remains in a usable state. So called because it is all too often performed ...
provocative maintenance2 => know what he is doing; this results in the machine's remaining in an *un*usable state for an indeterminate amount of time. See also {scratch monkey}. 
prowler => [UNIX] n. A daemon that is run periodically (typically once a week) to seek out and erase core files, truncate administrative logfiles, nuke `lost+found' directories, and otherwise clean up the cruft that tends to pile up in the corners of...
pseudo => /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An electronic-mail or USENET persona adopted by a human for amusement value or as a means of avoiding negative repercussions of one's net.behavior; a `nom de USENET', often associated with ...
pseudoprime => n. A backgammon prime (six consecutive occupied points) with one point missing. This term is an esoteric pun derived from a mathematical method that, rather than determining precisely whether a number is prime (has no divisors), uses a...
pseudosuit => /soo'doh-s[y]oot`/ n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also lobotomy.
psychedelicware => /si`k*-del'-ik-weir/ [UK] n. Syn. {display hack}. See also {smoking clover}.
psyton => /si'ton/ [TMRC] n. The elementary particle carrying the sinister force. The probability of a process losing is proportional to the number of psytons falling on it. Psytons are generated by observers, which is why demos are more likely to fa...
pubic directory => [NYU] (also `pube directory' /pyoob' d*-rek't*-ree/) n. The `pub' (public) directory on a machine that allows FTP access. So called because it is the default location for SEX (sense 1). "I'll have the source in the pube directory b...
puff => vt. To decompress data that has been crunched by Huffman coding. At least one widely distributed Huffman decoder program was actually *named* `PUFF', but these days it is usually packaged with the encoder. Oppose huff.
punched card => alt. `punch card' [techspeak] n.obs. The signature medium of computing's {Stone Age}, now obsolescent outside of some IBM shops. The punched card actually predated computers considerably, originating in 1801 as a control device for me...
punched card2 => patented by Hollerith and used with mechanical tabulating machines in the 1890 U.S. Census was a piece of cardboard about 90 mm by 215 mm, designed to fit exactly in the currency trays used for that era's larger dollar bills. IBM (wh...
punched card3 => manufacturer) married the punched card to computers, encoding binary information as patterns of small rectangular holes; one character per column, 80 columns per card. Other coding schemes, sizes of card, and hole shapes were tried a...
punched card4 => width of most character terminals is a legacy of the IBM punched card; so is the size of the quick-reference cards distributed with many varieties of computers even today. See chad, {chad box}, {eighty-column mind}, {green card}, {du...

factpacks/jargon.fact  view on Meta::CPAN

recursive acronym => pl.n. A hackish (and especially MIT) tradition is to choose acronyms that refer humorously to themselves or to other acronyms. The classic examples were two MIT editors called EINE ("EINE Is Not EMACS") and ZWEI ("ZWEI Was EINE I...
recursive acronym2 => a Scheme compiler called LIAR (Liar Imitates Apply Recursively), and GNU (q.v., sense 1) stands for "GNU's Not UNIX!" --- and a company with the name CYGNUS, which expands to "Cygnus, Your GNU Support". See also mung, EMACS. 
Red Book => n. 1. Informal name for one of the three standard references on PostScript (`PostScript Language Reference Manual', Adobe Systems (Addison-Wesley, 1985; QA76.73.P67P67; ISBN 0-201-10174-2); the others are known as the {Green Book} and the...
Red Book2 => one of the 3 standard references on Smalltalk (`Smalltalk-80 The Interactive Programming Environment' by Adele Goldberg (Addison-Wesley, 1984; QA76.8.S635G638; ISBN 0-201-11372-4); this too is associated with blue and green books). 3. An...
Red Book3 => CCITT eighth plenary assembly. Until now, these have changed color each review cycle (1988 was {Blue Book}, 1992 will be {Green Book}); however, it is rumored that this convention is going to be dropped before 1992. These include, among ...
Red Book4 => and the Group 1 through 4 fax standards. 4. The new version of the {Green Book} (sense 4) --- IEEE 1003.1-1990, a.k.a ISO 9945-1 --- is (because of the color and the fact that it is printed on A4 paper) known in the U.S.A. as "the Ugly R...
Red Book5 => and in Europe as "the Ugly Red Book That's A Sensible Size". 5. The NSA `Trusted Network Interpretation' companion to the {Orange Book}. See also {{book titles}}. 
regexp => /reg'eksp/ [UNIX] n. (alt. `regex' or `reg-ex') 1. Common written and spoken abbreviation for `regular expression', one of the wildcard patterns used, e.g., by UNIX utilities such as `grep(1)', `sed(1)', and `awk(1)'. These use conventions ...
reinvent the wheel => v. To design or implement a tool equivalent to an existing one or part of one, with the implication that doing so is silly or a waste of time. This is often a valid criticism. On the other hand, automobiles don't use wooden roll...
reinvent the wheel2 => be reinvented many times before you get them right. On the third hand, people reinventing the wheel do tend to come up with the moral equivalent of a trapezoid with an offset axle. 
religious issues => n. Questions which seemingly cannot be raised without touching off {holy wars}, such as "What is the best operating system (or editor, language, architecture, shell, mail reader, news reader)?", "What about that Heinlein guy, eh?"...
religious issues2 => Jargon File?" See {holy wars}; see also theology, bigot. This term is an example of {ha ha only serious}. People actually develop the most amazing and religiously intense attachments to their tools, even when the tools are intang...
religious issues3 => thing one can do when one stumbles into the crossfire is mumble {Get a life!} and leave --- unless, of course, one's *own* unassailably rational and obviously correct choices are being slammed. 
replicator => n. Any construct that acts to produce copies of itself; this could be a living organism, an idea (see meme), a program (see worm, wabbit, and virus), a pattern in a cellular automaton (see life, sense 1), or (speculatively) a robot or n...
reply => n. See followup.
reset => [the MUD community] v. In AberMUD, to bring all dead mobiles to life and move items back to their initial starting places. New players who can't find anything shout "Reset! Reset!" quite a bit. Higher-level players shout back "No way!" since...
restriction => n. A bug or design error that limits a program's capabilities, and which is sufficiently egregious that nobody can quite work up enough nerve to describe it as a feature. Often used (esp. by marketroid types) to make it sound as though...
retcon => /ret'kon/ [`retroactive continuity', from the USENET newsgroup rec.arts.comics] 1. n. The common situation in pulp fiction (esp. comics or soap operas) where a new story `reveals' things about events in previous stories, usually leaving the...
RETI => v. Syn. RTI
retrocomputing => /ret'-roh-k*m-pyoo'ting/ n. Refers to emulations of way-behind-the-state-of-the-art hardware or software, or implementations of never-was-state-of-the-art; esp. if such implementations are elaborate practical jokes and/or parodies o...
RFC => /R-F-C/ [Request For Comment] n. One of a long-established series of numbered Internet standards widely followed by commercial and PD software in the Internet and UNIX communities. Perhaps the single most influential one has been RFC-822 (the ...

factpacks/jargon.fact  view on Meta::CPAN

splat => n. 1. Name used in many places (DEC, IBM, and others) for the asterisk (`*') character (ASCII 0101010). This may derive from the `squashed-bug' appearance of the asterisk on many early line printers. 2. [MIT] Name used by some people for the...
sponge => [UNIX] n. A special case of a filter that reads its entire input before writing any output; the canonical example is a sort utility. Unlike most filters, a sponge can conveniently overwrite the input file with the output data stream. If you...
spooge => /spooj/ 1. n. Inexplicable or arcane code, or random and probably incorrect output from a computer program. 2. vi. To generate spooge (sense 1).
spool => [from early IBM `Simultaneous Peripheral Operation Off-Line', but this acronym is widely thought to have been contrived for effect] vt. To send files to some device or program (a `spooler') that queues them up and does something useful with ...
stack => n. A person's stack is the set of things he or she has to do in the future. One speaks of the next project to be attacked as having risen to the top of the stack. "I'm afraid I've got real work to do, so this'll have to be pushed way down on...
stack puke => n. Some processor architectures are said to `puke their guts onto the stack' to save their internal state during exception processing. The Motorola 68020, for example, regurgitates up to 92 bytes on a bus fault. On a pipelined machine, ...
stale pointer bug => n. Synonym for {aliasing bug} used esp. among microcomputer hackers.
state => n. 1. Condition, situation. "What's the state of your latest hack?" "It's winning away." "The system tried to read and write the disk simultaneously and got into a totally wedged state." The standard question "What's your state?" means "What...
steam-powered => adj. Old-fashioned or underpowered; archaic. This term does not have a strong negative loading and may even be used semi-affectionately for something that clanks and wheezes a lot but hangs in there doing the job.
stiffy => [University of Lowell, Massachusetts.] n. 3.5-inch microfloppies, so called because their jackets are more firm than those of the 5.25-inch and the 8-inch floppy. Elsewhere this might be called a `firmy'.
stir-fried random => alt. `stir-fried mumble' n. Term used for the best dish of many of those hackers who can cook. Consists of random fresh veggies and meat wokked with random spices. Tasty and economical. See random, great-wall, ravs, {{laser chick...
stomp on => vt. To inadvertently overwrite something important, usually automatically. "All the work I did this weekend got stomped on last night by the nightly server script." Compare scribble, mangle, trash, scrog, roach.
Stone Age => n., adj. 1. In computer folklore, an ill-defined period from ENIAC (ca. 1943) to the mid-1950s; the great age of electromechanical dinosaurs. Sometimes used for the entire period up to 1960--61 (see {Iron Age}); however, it is funnier an...
Stone Age2 => the latter period in terms of a `Bronze Age' era of transistor-logic, pre-ferrite-core machines with drum or CRT mass storage (as opposed to just mercury delay lines and/or relays). See also {Iron Age}. 2. More generally, a pejorative f...
Stone Age3 => hardware or software technology. Note that this is used even by people who were there for the {Stone Age} (sense 1). 
stoppage => /sto'p*j/ n. Extreme lossage that renders something (usually something vital) completely unusable. "The recent system stoppage was caused by a fried transformer."
store => [prob. from techspeak `main store'] n. Preferred Commonwealth synonym for core. Thus, `bringing a program into store' means not that one is returning shrink-wrapped software but that a program is being swapped in.
stroke => n. Common name for the slant (`/', ASCII 0101111) character. See ASCII for other synonyms.
strudel => n. Common (spoken) name for the circumflex (`', ASCII 1000000) character. See ASCII for other synonyms.
stubroutine => /stuhb'roo-teen/ [contraction of `stub routine'] n. Tiny, often vacuous placeholder for a subroutine that is to be written or fleshed out later.
studlycaps => /stuhd'lee-kaps/ n. A hackish form of silliness similar to BiCapitalization for trademarks, but applied randomly and to arbitrary text rather than to trademarks. ThE oRigiN and SigNificaNce of thIs pRacTicE iS oBscuRe.

factpacks/jargon.fact  view on Meta::CPAN

system mangler4 => it happens, most hackers (particularly those who frequent Chinese restaurants) like tea at least as well as coffee --- so it is not that big a problem. 2. See {time T} (also {since time T equals minus infinity}). 3. [techspeak] In ...
system mangler5 => abbreviation for the noun `transaction. 4. [Purdue] Alternate spelling of tee. 
tail recursion => n. If you arent sick of it already, see {tail recursion}.
talk mode => n. A feature supported by UNIX, ITS, and some other OSes that allows two or more logged-in users to set up a real-time on-line conversation. It combines the immediacy of talking with all the precision (and verbosity) that written languag...
talk mode2 => communicate inflection, though conventions have arisen for some of these (see the section on writing style in the Prependices for details). Talk mode has a special set of jargon words, used to save typing, which are not used orally. Som...
talk mode3 => probably derived from) Morse-code jargon used by ham-radio amateurs since the 1920s. Most of these are not used at universities or in the UNIX world, though ROTF and TTFN have gained some currency there and IMHO is common; conversely, m...
talk mode4 => unfamiliar with FOO?, BCNU, HELLOP, NIL, and T. The MUD community uses a mixture of USENET/Internet emoticons, a few of the more natural of the old-style talk-mode abbrevs, and some of the `social list above; specifically, MUD responden...
talk mode5 => b4, BTW, WTF, TTFN, and WTH. The use of `rehi is also common; in fact, mudders are fond of re- compounds and will frequently `rehug or `rebonk (see bonk/oif) people. The word `re by itself is taken as `regreet. In general, though, MUDde...
talk mode6 => typing things out in full rather than using abbreviations; this may be due to the relative youth of the MUD cultures, which tend to include many touch typists and to assume high-speed links. The following uses specific to MUDs are repor...
talk mode7 => variant spelling `d00d) appear to be passing into wider use among some subgroups of MUDders. One final note on talk mode style neophytes, when in talk mode, often seem to think they must produce letter-perfect prose because they are typ...
talk mode8 => not the best approach. It can be very frustrating to wait while your partner pauses to think of a word, or repeatedly makes the same spelling error and backs up to fix it. It is usually best just to leave typographical errors behind and...
talk mode9 => confusion may result; in that case it is often fastest just to type "xxx" and start over from before the mistake. See also hakspek, emoticon, bonk/oif. 
talker system => n. British hackerism for software that enables real-time chat or {talk mode}.
tall card => n. A PC/AT-size expansion card (these can be larger than IBM PC or XT cards because the AT case is bigger). See also {short card}. When IBM introduced the PS/2 model 30 (its last gasp at supporting the ISA) they made the case lower and m...
tall card2 => wouldnt fit; this was felt to be a reincarnation of the {connector conspiracy}, done with less style. 
tanked => adj. Same as down, used primarily by UNIX hackers. See also hosed. Popularized as a synonym for `drunk by Steve Dallas in the late lamented "Bloom County" comic strip.
tar and feather => [from UNIX `tar(1)] vt. To create a transportable archive from a group of files by first sticking them together with `tar(1) (the Tape ARchiver) and then compressing the result (see compress). The latter action is dubbed `featherin...
tar and feather2 => an airplane propeller to decrease wind resistance, or with an oar to reduce water resistance; smaller files, after all, slip through comm links more easily. 
taste => [primarily MIT] n. 1. The quality in a program that tends to be inversely proportional to the number of features, hacks, and kluges programmed into it. Also `tasty, `tasteful, `tastefulness. "This feature comes in N tasty flavors." Although ...
tayste => /tayst/ n. Two bits; also as taste. Syn. crumb, quarter. Compare {byte}, dynner, playte, nybble, quad.
TCB => /T-C-B/ [IBM] n. 1. Trouble Came Back. An intermittent or difficult-to-reproduce problem that has failed to respond to neglect. Compare heisenbug. Not to be confused with 2. Trusted Computing Base, an `official jargon term from the {Orange Boo...

factpacks/jargon.fact  view on Meta::CPAN

true-hacker => [analogy with `trufan from SF fandom] n. One who exemplifies the primary values of hacker culture, esp. competence and helpfulness to other hackers. A high compliment. "He spent 6 hours helping me bring up UUCP and netnews on my FOOBAR...
tty => /T-T-Y/ [UNIX], /titee/ [ITS, but some UNIX people say it this way as well; this pronunciation is not considered to have sexual undertones] n. 1. A terminal of the teletype variety, characterized by a noisy mechanical printer, a very limited c...
tube => 1. n. A CRT terminal. Never used in the mainstream sense of TV; real hackers dont watch TV, except for Loony Toons, Rocky & Bullwinkle, Trek Classic, the Simpsons, and the occasional cheesy old swashbuckler movie (see appendix B). 2. [IBM] To...
tube time => n. Time spent at a terminal or console. More inclusive than hacking time; commonly used in discussions of what parts of ones environment one uses most heavily. "I find Im spending too much of my tube time reading mail since I started thi...
tunafish => n. In hackish lore, refers to the mutated punchline of an age-old joke to be found at the bottom of the manual pages of `tunefs(8) in the original BSD 4.2 distribution. The joke was removed in later releases once commercial sites started ...
tune => [from automotive or musical usage] vt. To optimize a program or system for a particular environment, esp. by adjusting numerical parameters designed as hooks for tuning, e.g., by changing `#define lines in C. One may `tune for time (fastest e...
turbo nerd => n. See {computer geek}.
turist => /toorist/ n. Var. sp. of tourist, q.v. Also in adjectival form, `turistic. Poss. influenced by luser and `Turing.
tweak => vt. 1. To change slightly, usually in reference to a value. Also used synonymously with twiddle. If a program is almost correct, rather than figure out the precise problem you might just keep tweaking it until it works. See frobnicate and {f...
TWENEX => /tweneks/ n. The TOPS-20 operating system by DEC --- the second proprietary OS for the PDP-10 --- preferred by most PDP-10 hackers over TOPS-10 (that is, by those who were not {ITS} or {WAITS} partisans). TOPS-20 began in 1969 as Bolt, Bera...
twiddle => n. 1. Tilde (ASCII 1111110, `~). Also called `squiggle, `sqiggle (sic --- pronounced /skigl/), and `twaddle, but twiddle is the most common term. 2. A small and insignificant change to a program. Usually fixes one bug and generates several...
twink => /twink/ [UCSC] n. Equivalent to {read-only user}. Also reported on the USENET group soc.motss; may derive from gay slang for a cute young thing with nothing upstairs.
two pi => quant. The number of years it takes to finish ones thesis. Occurs in stories in the following form "He started on his thesis; 2 pi years later..."
two-to-the-N => quant. An amount much larger than N but smaller than infinity. "I have 2-to-the-N things to do before I can go out for lunch" means you probably wont show up.
twonkie => /twonkee/ n. The software equivalent of a Twinkie (a variety of sugar-loaded junk food, or (in gay slang) the male equivalent of `chick); a useless `feature added to look sexy and placate a marketroid (compare {Saturday-night special}). Th...
UN*X => n. Used to refer to the UNIX operating system (a trademark of AT&T) in writing, but avoiding the need for the ugly (TM) typography. Also used to refer to any or all varieties of Unixoid operating systems. Ironically, lawyers now say (1990) th...
undefined external reference => excl. [UNIX] A message from UNIX's linker. Used in speech to flag loose ends or dangling references in an argument or discussion.
under the hood => prep. [hot-rodder talk] 1. Used to introduce the underlying implementation of a product (hardware, software, or idea). Implies that the implementation is not intuitively obvious from the appearance, but the speaker is about to enabl...
under the hood2 => now look under the hood to see how ...." 2. Can also imply that the implementation is much simpler than the appearance would indicate "Under the hood, we are just fork/execing the shell." 3. Inside a chassis, as in "Under the hood,...
undocumented feature => n. See feature.
uninteresting => adj. 1. Said of a problem that, although nontrivial, can be solved simply by throwing sufficient resources at it. 2. Also said of problems for which a solution would neither advance the state of the art nor be fun to design and code....

factpacks/jargon.fact  view on Meta::CPAN

unwind-protect => [MIT from the name of a LISP operator] n. A task you must remember to perform before you leave a place or finish a project. "I have an unwind-protect to call my advisor."
up => adj. 1. Working, in order. "The down escalator is up." Oppose down. 2. `bring up' vt. To create a working version and start it. "They brought up a down system." 3. `come up' vi. To become ready for production use.
upload => /uhp'lohd/ v. 1. [techspeak] To transfer programs or data over a digital communications link from a smaller or peripheral `client' system to a larger or central `host' one. A transfer in the other direction is, of course, called a download ...
upthread => adv. Earlier in the discussion (see thread), i.e., `above'. "As Joe pointed out upthread, ..." See also followup.
urchin => n. See munchkin.
USENET => /yoos'net/ or /yooz'net/ [from `Users' Network'] n. A distributed bboard (bulletin board) system supported mainly by UNIX machines. Originally implemented in 1979-1980 by Steve Bellovin, Jim Ellis, Tom Truscott, and Steve Daniel at Duke Uni...
user => n. 1. Someone doing `real work' with the computer, using it as a means rather than an end. Someone who pays to use a computer. See {real user}. 2. A programmer who will believe anything you tell him. One who asks silly questions. [GLS observe...
user-friendly => adj. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuit...
user-obsequious => adj. Emphatic form of user-friendly. Connotes a system so verbose, inflexible, and determinedly simple-minded that it is nearly unusable. "Design a system any fool can use and only a fool will want to use it." See {WIMP environment...
USG UNIX => /U-S-G yoo'niks/ n. Refers to AT&T UNIX commercial versions after {Version 7}, especially System III and System V releases 1, 2, and 3. So called because during most of the life-span of those versions AT&T's support crew was called the `U...
UTSL => // [UNIX] n. On-line acronym for `Use the Source, Luke' (a pun on Obi-Wan Kenobi's "Use the Force, Luke!" in `Star Wars') --- analogous to RTFM but more polite. This is a common way of suggesting that someone would be best off reading the sou...
UUCPNET => n. The store-and-forward network consisting of all the world's connected UNIX machines (and others running some clone of the UUCP (UNIX-to-UNIX CoPy) software). Any machine reachable only via a {bang path} is on UUCPNET. See {network addre...
vanilla => [from the default flavor of ice cream in the U.S.] adj. Ordinary flavor, standard. When used of food, very often does not mean that the food is flavored with vanilla extract! For example, `vanilla wonton soup' means ordinary wonton soup, a...
vannevar => /van'*-var/ n. A bogus technological prediction or a foredoomed engineering concept, esp. one that fails by implicitly assuming that technologies develop linearly, incrementally, and in isolation from one another when in fact the learning...
vaporware => /vay'pr-weir/ n. Products announced far in advance of any release (which may or may not actually take place).
var => /veir/ or /var/ n. Short for `variable'. Compare arg, param.
VAX => /vaks/ n. 1. [from Virtual Address eXtension] The most successful minicomputer design in industry history, possibly excepting its immediate ancestor, the PDP-11. Between its release in 1978 and its eclipse by {killer micro}s after about 1986, ...
VAXectomy => /vak-sek't*-mee/ [by analogy with `vasectomy'] n. A VAX removal. DEC's Microvaxen, especially, are much slower than newer RISC-based workstations such as the SPARC. Thus, if one knows one has a replacement coming, VAX removal can be caus...
VAXen => /vak'sn/ [from `oxen', perhaps influenced by `vixen'] n. (alt. `vaxen') The plural canonically used among hackers for the DEC VAX computers. "Our installation has four PDP-10s and twenty vaxen." See boxen.
vaxherd => n. /vaks'herd/ [from `oxherd'] A VAX operator.
vaxism => /vak'sizm/ n. A piece of code that exhibits vaxocentrism in critical areas. Compare PC-ism, unixism.

factpacks/jargon.fact  view on Meta::CPAN

walking drives4 => patterns that would do this to particular drive models and held disk-drive races. 
wall => [WPI] interj. 1. An indication of confusion, usually spoken with a quizzical tone "Wall??" 2. A request for further explication. Compare {octal forty}. It is said that "Wall?" really came from `like talking to a blank wall'. It was initially ...
wall follower => n. A person or algorithm that compensates for lack of sophistication or native stupidity by efficiently following some simple procedure shown to have been effective in the past. Used of an algorithm, this is not necessarily pejorativ...
wall follower2 => the winning robot in an early AI contest (named, of course, after the cocktail). Harvey successfully solved mazes by keeping a `finger' on one wall and running till it came out the other end. This was inelegant, but it was mathemati...
wall follower3 => simply-connected mazes --- and, in fact, Harvey outperformed more sophisticated robots that tried to `learn' each maze by building an internal representation of it. Used of humans, the term *is* pejorative and implies an uncreative,...
wall follower4 => See also {code grinder}, droid. 
wall time => n. (also `wall clock time') 1. `Real world' time (what the clock on the wall shows), as opposed to the system clock's idea of time. 2. The real running time of a program, as opposed to the number of clocks required to execute it (on a ti...
wall time2 => differ, as no one program gets all the clocks, and on multiprocessor systems with good thread support one may get more processor clocks than real-time clocks). 
wallpaper => n. 1. A file containing a listing (e.g., assembly listing) or a transcript, esp. a file containing a transcript of all or part of a login session. (The idea was that the paper for such listings was essentially good only for wallpaper, as...
wango => /wang'goh/ n. Random bit-level grovelling going on in a system during some unspecified operation. Often used in combination with mumble. For example "You start with the `.o' file, run it through this postprocessor that does mumble-wango --- ...
wank => /wangk/ [Columbia University prob. by mutation from Commonwealth slang v. `wank', to masturbate] n.,v. Used much as hack is elsewhere, as a noun denoting a clever technique or person or the result of such cleverness. May describe (negatively)...
wannabee => /won'*-bee/ (also, more plausibly, spelled `wannabe') [from a term recently used to describe Madonna fans who dress, talk, and act like their idol; prob. originally from biker slang] n. A would-be hacker. The connotations of this term dif...
warm boot => n. See boot.
wart => n. A small, crocky feature that sticks out of an otherwise clean design. Something conspicuous for localized ugliness, especially a special-case exception to a general rule. For example, in some versions of `csh(1)', single quotes literalize ...
washing machine => n. Old-style 14-inch hard disks in floor-standing cabinets. So called because of the size of the cabinet and the `top-loading' access to the media packs --- and, of course, they were always set on `spin cycle'. The washing-machine ...
washing machine2 => it is even used in Russian hacker jargon. See also {walking drives}. The thick channel cables connecting these were called `bit hoses' (see hose). 
water MIPS => n. (see MIPS, sense 2) Large, water-cooled machines of either today's ECL-supercomputer flavor or yesterday's traditional mainframe type.
wave a dead chicken => v. To perform a ritual in the direction of crashed software or hardware that one believes to be futile but is nevertheless necessary so that others are satisfied that an appropriate degree of effort has been expended. "I'll wav...
wave a dead chicken2 => code, but I really think we've run into an OS bug." Compare {voodoo programming}, {rain dance}. 
weasel => n. [Cambridge] A na"ive user, one who deliberately or accidentally does things that are stupid or ill-advised. Roughly synonymous with loser.
wedged => [from a common description of recto-cranial inversion] adj. 1. To be stuck, incapable of proceeding without help. This is different from having crashed. If the system has crashed, then it has become totally non-functioning. If the system is...

factpacks/jargon.fact  view on Meta::CPAN

Wizard Book => n. Hal Abelson and Jerry Sussman's `Structure and Interpretation of Computer Programs' (MIT Press, 1984; ISBN 0-262-01077-1, an excellent computer science text used in introductory courses at MIT. So called because of the wizard on the...
Wizard Book2 => LISP/Scheme world. 
wizard mode => [from rogue] n. A special access mode of a program or system, usually passworded, that permits some users godlike privileges. Generally not used for operating systems themselves (`root mode' or `wheel mode' would be used instead).
wizardly => adj. Pertaining to wizards. A wizardly feature is one that only a wizard could understand or use properly.
womb box => n. 1. [TMRC] Storage space for equipment. 2. [proposed] A variety of hard-shell equipment case with heavy interior padding and/or shaped carrier cutouts in a foam-rubber matrix; mundanely called a `flight case'. Used for delicate test equ...
WOMBAT => [Waste Of Money, Brains, And Time] adj. Applied to problems which are both profoundly uninteresting in themselves and unlikely to benefit anyone interesting even if solved. Often used in fanciful constructions such as `wrestling with a womb...
wonky => /wong'kee/ [from Australian slang] adj. Yet another approximate synonym for broken. Specifically connotes a malfunction that produces behavior seen as crazy, humorous, or amusingly perverse. "That was the day the printer's font logic went wo...
workaround => n. A temporary kluge inserted in a system under development or test in order to avoid the effects of a bug or misfeature so that work can continue. Theoretically, workarounds are always replaced by fixes; in practice, customers often fi...
working as designed => [IBM] adj. 1. In conformance to a wrong or inappropriate specification; useful, but misdesigned. 2. Frequently used as a sardonic comment on a program's utility. 3. Unfortunately also used as a bogus reason for not accepting a ...
working as designed2 => this sense is used in official documents! See BAD. 
worm => [from `tapeworm' in John Brunner's novel `The Shockwave Rider', via XEROX PARC] n. A program that propagates itself over a network, reproducing itself as it goes. Compare virus. Nowadays the term has negative connotations, as it is assumed th...
wound around the axle => adj. In an infinite loop. Often used by older computer types.
wrap around => vi. (also n. `wraparound' and v. shorthand `wrap') 1. [techspeak] The action of a counter that starts over at zero or at `minus infinity' (see infinity) after its maximum value has been reached, and continues incrementing, either becau...
wrap around2 => because of an overflow (as when a car's odometer starts over at 0). 2. To change phase gradually and continuously by maintaining a steady wake-sleep cycle somewhat longer than 24 hours, e.g., living six long (28-hour) days in a week (...
wrap around3 => rate of 10 microhertz). 
write-only code => [a play on `read-only memory'] n. Code so arcane, complex, or ill-structured that it cannot be modified or even comprehended by anyone but its author, and possibly not even by him/her. A {Bad Thing}.
write-only language => n. A language with syntax (or semantics) sufficiently dense and bizarre that any routine of significant size is {write-only code}. A sobriquet applied occasionally to C and often to APL, though INTERCAL and TECO certainly deser...
write-only memory => n. The obvious antonym to `read-only memory'. Out of frustration with the long and seemingly useless chain of approvals required of component specifications, during which no actual checking seemed to occur, an engineer at Signeti...
write-only memory2 => a write-only memory and included it with a bunch of other specifications to be approved. This inclusion came to the attention of Signetics management only when regular customers started calling and asking for pricing information...
write-only memory3 => edition of the data book and requested the return of the `erroneous' ones. Later, around 1974, Signetics bought a double-page spread in `Electronics' magazine's April issue and used the spec as an April Fools' Day joke. Instead ...
write-only memory4 => characteristic curves, the 25120 "fully encoded, 9046 x N, Random Access, write-only-memory" data sheet included diagrams of "bit capacity vs. Temp.", "Iff vs. Vff", "Number of pins remaining vs. number of socket insertions", an...
write-only memory5 => required a 6.3 VAC VFF supply, a +10V VCC, and VDD of 0V, +/- 2%. 
Wrong Thing => n. A design, action, or decision that is clearly incorrect or inappropriate. Often capitalized; always emphasized in speech as if capitalized. The opposite of the {Right Thing}; more generally, anything that is not the Right Thing. In ...
Wrong Thing2 => of the best', the merely good --- although good --- is nevertheless the Wrong Thing. "In C, the default is for module-level declarations to be visible everywhere, rather than just within the module. This is clearly the Wrong Thing." 
wugga wugga => /wuh'g* wuh'g*/ n. Imaginary sound that a computer program makes as it labors with a tedious or difficult task. Compare {cruncha cruncha cruncha}, grind (sense 4).
WYSIWYG => /wiz'ee-wig/ adj. Describes a user interface under which "What You See Is What You Get", as opposed to one that uses more-or-less obscure commands which do not result in immediate visual feedback. The term can be mildly derogatory, as it i...
XOFF => /X'of/ n. Syn. control-s.
xor => /X'or/, /kzor/ conj. Exclusive or. `A xor B' means `A or B, but not both'. "I want to get cherry pie xor a banana split." This derives from the technical use of the term as a function on truth-values that is true if exactly one of its two argu...
xref => /X'ref/ vt., n. Hackish standard abbreviation for `cross-reference'.
XXX => /X-X-X/ n. A marker that attention is needed. Commonly used in program comments to indicate areas that are kluged up or need to be. Some hackers liken `XXX' to the notional heavy-porn movie rating.
xyzzy => /X-Y-Z-Z-Y/, /X-Y-ziz'ee/, /ziz'ee/, or /ik-ziz'ee/ [from the ADVENT game] adj. The canonical `magic word'. This comes from ADVENT, in which the idea is to explore an underground cave with many rooms and to collect the treasures you find the...
YA- => [Yet Another] abbrev. In hackish acronyms this almost invariably expands to {Yet Another}, following the precedent set by UNIX `yacc(1)'. See YABA.
YABA => /ya'b*/ [Cambridge] n. Yet Another Bloody Acronym. Whenever some program is being named, someone invariably suggests that it be given a name that is acronymic. The response from those with a trace of originality is to remark ironically that t...
YAUN => /yawn/ [Acronym for `Yet Another UNIX Nerd'] n. Reported from the San Diego Computer Society (predominantly a microcomputer users' group) as a good-natured punning insult aimed at UNIX zealots.
Yellow Book => [proposed] n. The print version of this Jargon File; `The New Hacker's Dictionary', forthcoming from MIT Press, 1991. Includes all the material in the File, plus a Foreword by Guy L. Steele and a Preface by Eric S. Raymond. Most import...
Yellow Book2 => typeset and includes almost all of the infamous Crunchly cartoons by the Great Quux, each attached to an appropriate entry. 
Yet Another => adj. [From UNIX's `yacc(1)', `Yet Another Compiler- Compiler', a LALR parser generator] 1. Of your own work A humorous allusion often used in titles to acknowledge that the topic is not original, though the content is. As in `Yet Anoth...
Yet Another2 => Simulated Annealing Algorithm'. 2. Of others' work Describes something of which there are far too many. See also YA-, YABA, YAUN. 
You are not expected to understand this => cav. [UNIX] The canonical comment describing something magic or too complicated to bother explaining properly. From an infamous comment in the context-switching code of the V6 UNIX kernel.
You know you've been hacking too long when... => The set-up line for a genre of one-liners told by hackers about themselves. These include the following * not only do you check your email more often than your paper mail, but you remember your {networ...
You know you've been hacking too long when...2 => postal one. * your SO kisses you on the neck and the first thing you think is "Uh, oh, {priority interrupt}." * you go to balance your checkbook and discover that you're doing it in octal. * your comp...
You know you've been hacking too long when...3 => value than your car. * in your universe, `round numbers' are powers of 2, not 10. * more than once, you have woken up recalling a dream in some programming language. * you realize you have never seen ...
You know you've been hacking too long when...4 => early version of this entry said "All but one of these have been reliably reported as hacker traits (some of them quite often). Even hackers may have trouble spotting the ringer." The ringer was balan...
You know you've been hacking too long when...5 => made up out of whole cloth. Although more respondents picked that one out as fiction than any of the others, I also received multiple independent reports of its actually happening. --- ESR] 
Your mileage may vary => cav. [from the standard disclaimer attached to EPA mileage ratings by American car manufacturers] 1. A ritual warning often found in UNIX freeware distributions. Translates roughly as "Hey, I tried to write this portably, but...
Your mileage may vary2 => system?" 2. A qualifier more generally attached to advice. "I find that sending flowers works well, but your mileage may vary." 
Yow! => /yow/ [from "Zippy the Pinhead" comix] interj. A favored hacker expression of humorous surprise or emphasis. "Yow! Check out what happens when you twiddle the foo option on this display hack!" Compare gurfle.
yoyo mode => n. The state in which the system is said to be when it rapidly alternates several times between being up and being down. Interestingly (and perhaps not by coincidence), many hardware vendors give out free yoyos at Usenix exhibits. Sun Mi...
yoyo mode2 => SIGPLAN '88. Tourists staying at one of Atlanta's most respectable hotels were subsequently treated to the sight of 200 of the country's top computer scientists testing yo-yo algorithms in the lobby. 
Yu-Shiang Whole Fish => /yoo-shyang hohl fish/ n. obs. The character gamma (extended SAIL ASCII 0001001), which with a loop in its tail looks like a little fish swimming down the page. The term is actually the name of a Chinese dish in which a fish i...
Yu-Shiang Whole Fish2 => covered with Yu-Shiang (or Yu-Hsiang) sauce. Usage primarily by people on the MIT LISP Machine, which could display this character on the screen. Tends to elicit incredulity from people who hear about it second-hand. 
zap => 1. n. Spiciness. 2. vt. To make food spicy. 3. vt. To make someone `suffer' by making his food spicy. (Most hackers love spicy food. Hot-and-sour soup is considered wimpy unless it makes you wipe your nose for the rest of the meal.) See zapped...

factpacks/old_test_meanings.fact  view on Meta::CPAN

Arcturus => a gathering together
Ard => one that commands; he that descends
Ardon => ruling; a judgment of malediction
Areli => the light or vision of God
Areopagus => the hill of Mars
Aretas => agreeable, virtuous
Argob => a turf, or fat land
Ariel => altar; light or lion of God
Arimathea => a lion dead to the Lord
Arioch => long; great; tall
Aristarchus => the best prince
Aristobulus => a good counselor
Armageddon => hill of fruits; mountain of Megiddo
Arnon => rejoicing; sunlight
Aroer => heath; tamarisk
Arpad => the light of redemption
Arphaxad => a healer; a releaser
Artaxerxes => the silence of light; fervent to spoil
Artemas => whole, sound
Arumah => high; exalted
Asa => physician; cure

factpacks/techdict.fact  view on Meta::CPAN

Clustering => Clustering is an up-and-coming technology using two or more computers that function together as a single entity for fault tolerance and load balancing. This increases reliability and up-time in a client/server environment. One computer ...
CLV => (Constant Linear Velocity) In terms of disk drives, it means that the rate of data being read off of the disk stays the same from center to outer edge. To accomplish this, the drive motor speeds up and slows down as data is read from different...
CMOS => (Complementary Metal-Oxide Semiconductor) This is the common reference for the BIOS preferences in your computer. Actually, it is a low power version of a chip. The low power comes into play because it is what commonly holds your BIOS prefere...
Coaxial cable => This is the original Ethernet cable. It consists of a single, insulated copper wire, surrounded by a copper braid or foil. The wire is then coated with plastic. Coaxial cable is used in bus topology.
COBOL => (COmmon Business-Oriented Language) This is a programming language developed in the '60s by several computer companies and the US Department of Defense. COBOL is still used today for programming business applications and COBOL programmers ar...
Code => A series of instructions that make up a program.
Code generator => A code generator is part of a compiler. It takes intermediate code and translates it into the final workable code in the target language.
Coily => Enemy of Q-Bert.
COM => (Component Object Model) This is a Microsoft specification that describes methods of communication between components. For example, if you were to drag an item over a window, the item and window would have some rules of communication that they...
Compiler => A compiler translates a computer program from one language into another, catching any errors in syntax along the way. Most commonly, you translate some high level language, such as C++ or COBOL, into optimized machine language. This form ...
Compression => Takes something large and makes it smaller. Compression generally comes in two forms, lossy and lossless. Lossy compression is best used on graphics files and sound files. It crunches down the data at a much higher ratio, at the expens...
Computer => Technically, this is anything that inputs data, processes it in some way, and outputs it.
Control Program for Microprocessors (CP/M) => CP/M was THE operating system before IBM created the PC. IBM was shopping for an OS for the PC, ended up going with Microsoft, and Bill Gates created DOS. CP/M is not really used on anything but fossils a...
Convergence => The ability of the three electron beams (red, green and blue) in a CRT monitor to meet at a single point and produce one dot. If a monitor is mis-converging, you will notice shadows of blue or red around any white images. Often, this w...
Cookie => Web sites send these to your browser so that the site is customized based on your previous actions on that site. For example, someday UGeek may send a cookie to your browser to let us know whether you are a new visitor or if you've been her...
Core => In UNIX systems this term is commonly used in reference to core dumps.
Core Dump => In UNIX systems, when a program crashes, it "dumps" out an image of the memory and registers so that you may go through and see what caused the problem. This is almost as useful as the Netware and Windows NT memory dumps (which is not ve...
CP/M => see Control Program for Microprocessors.
CPU => (Central Processing Unit) Think of this as the brains of the computer. When most people think of processors, they think of Intel. The Pentium and Pentium Pro are CPUs.
CRC => (Cyclic Redundancy Check) A mathematical calculation that produces a number that can be used to check the integrity of a file by regenerating the number and comparing the results.
CRT => (Cathode Ray Tube) This is one of the main components of monitors and TVs. A beam of electrons is shot towards the CRT and as they collide with phosphors on the inside surface, they produce light. Today, other technologies are performing bette...

factpacks/techdict.fact  view on Meta::CPAN

Mission-Critical Application => This is any application that is critical to the proper running of a business. If this application fails for any length of time, you may be out of business. For example, an order-entry system may be considered mission c...
MMX => (Matrix Math Extensions / Multi Media Extensions) 64 additional instructions for matrix math operations that are commonly used to process multimedia data. A slight improvement of the Pentium and Pentium Pro chip designs that is supposed to mak...
MODEM => (Modulator/Demodulator) A device to turn digital signals to analog ones and back again, so they can be transmitted and translated back to digital at another modem without loss. Used for communication through means of audio, telephone, CB, et...
Moiré => An interference pattern that gets created when small dots are placed in a tight pattern.
Monitor => A device for viewing the output from a computer, traditionally a much more precise TV set.
Moore's Law => Former Intel chairman Gordon Moore is credited with predicting the trend that transistor counts in processors double every 18 months. This law has held true since the 1970s. The law can also be applied to other technologies and works f...
Motherboard => The circuit board that your CPU, IO chips and all the peripheral cards plug into.
MotherGlass => The sheet of silicon that the wafers are stamped out of to make computer chips.
Mouse => A pointing device that uses a roller ball on the bottom to detect motion.
Mousepad => A pad that has a surface made for use with a mouse.
MP3 => (MPEG 3) This is a compression standard for music. It enables you to fit over 100 full length songs on a single CD with almost no loss of quality. You can find MP3 players and MP3 files on the Web--you just have to look. The music industry is ...
MPEG => (Moving Pictures Expert Group) This is a format for compressing video in a format similar to JPEG. It works.
MTBF => (Mean Time Between Failures) This is a time normally given in hours that predicts the failure of a device. The larger the number the better.
Multi-Threaded => Some operating systems allow multiple parts, or threads, of a single process to run simultaneously. These OSs are referred to as multi-threaded. UNIX is a multi-threaded OS, as is Windows NT.
Multi-tier client server => This is a form of client/server application that uses the multi-tiered architecture.
Multi-tiered architecture => This is the most scalable application architecture (over 2-tier and 3-tier). This architecture refers to 4-, 5-, or even higher-tiered architectures. It is the most complex type of architecture, splitting the application ...
Multicast IP => This is a form of TCP/IP being proposed that will allow for high-bandwidth transmissions (like television channels) to be broadcast over the Internet to all the routers in the world (possibly) that are connected to someone watching th...
Multipurpose Internet Mail Extensions => (MIME) This refers to functions used for the attachment of binary files to an e-mail message. MIME is the most common group of functions used to make this translation, and allows us to tack on graphics, sound,...
n-tuple => ((pronounced en-too-pull)) This is a mathematical term for a finite sequence of n terms. For example, the set {1, 2, 3, 4} is a 4-tuple. The set {Frank, Jane, Ed} is a 3-tuple. Any time there is a list of n things in a certain order, you c...
Nanosecond => (One billionth of a second) Used most often to measure the speed of memory.
NC => (Network Computer) This is a concept that came from the old days of dumb terminals. They are supposed to reduce the cost of standardized computers in the office environment.

factpacks/techdict.fact  view on Meta::CPAN

OC3 => See Optical Carrier 3.
OCR => (Optical Character Recognition) This is the technology that allows computers to "read" the text from physical objects. It requires a graphical representation of text to interpret. This usually comes from a scanned image.
OEM => (Original Equipment Manufacturer) This acronym is used to denote equipment that is sold to other companies or resellers for integration into systems. For example, a hard drive manufacturer may sell an OEM hard drive in bulk quantities and no m...
Office Suite => The set of software products that are required by an office. Most often comprised of a spreadsheet program, a word processor, a scheduler, and a presentation manager. Sometimes they will include a financial package and a database prog...
OLE => (see Object Linking and Embedding) see Object Linking and Embedding
Online => The term refers to anything that's on the Internet, as in "I've got this great online magazine for you to check out at www.ugeek.com."
OpenGL => (Open Graphics Language) This is a 3D graphics language developed by Silicon Graphics. OpenGL support is built into Windows NT. You can see some examples by checking out the NT screen savers. Some 3D graphics accelerators have OpenGL accele...
Optical Carrier 12 => (OC-12) This stands for the 622 Mbps ATM protocol. Some large Internet providers are using OC-12 for their backbones.
Optical Carrier 3 => (OC-3) Synonym for the 155 Mbps ATM protocol.
Optical Drive => A storage device that uses light to store data instead of magnetism. To write it (usually) uses a laser to change a tiny portion of an optical disk so that it can be read later by checking the state of that portion.
OS => (Operating System) The program that allows you to access the basic functions of your computer. It is the minimum software required to run a program. The best one by far is the MacOS.
Output => Anything that comes out of a computer or system. As in, "Watch out for that pile of OUTPUT on the sidewalk."
Over-clocking => This is the act of running a chip at a higher clock speed than it was specified for. Very often, chips are capable of running faster than they are specified for, and can be safely over-clocked. 
P54C => This is the official part number for the Pentium processor from Intel.
P55C => This is the official part number for the Pentium processor with MMX technology from Intel.
Packet => A collection of information. It's often used to refer to the chunks of information sent over computer networks.
Packet Filter => This is anything that filters out network traffic based on sender's address, receiver's address, and the type of protocol being sent. Some routers support packet filtering, all firewalls do, and some proxy servers will as well.
Packet InterNet Gopher => (PING) Part of the standard TCP/IP suite of protocols that allows you to check your connectivity with other devices, or to check whether your own TCP/IP stack is working properly. Normally, you type in something like "ping 2...
Page Fault => This is not an error. It means that the computer had to resort to using the swap file as memory.
Parallel => Meaning in unison, or many things at the same time. Most commonly refers to a computer with multiple processors that can execute multiple instructions at the same time.
Parallel Port => The parallel port is found on just about all PCs. It's a 25-pin interface cable (DB-25) that is designed for connection to a printer. Normally, it will take up IRQ 7. In addition to printers, you can connect many other devices such a...

factpacks/usazips.fact  view on Meta::CPAN

76873	=> 	Rockwood	Coleman	TX
76874	=> 	Roosevelt	Kimble	TX
76875	=> 	Rowena	Runnels	TX
76877	=> 	San Saba	San Saba	TX
76878	=> 	Santa Anna	Coleman	TX
76880	=> 	Star	Mills	TX
76882	=> 	Talpa	Coleman	TX
76883	=> 	Telegraph	Edwards	TX
76884	=> 	Valera	Coleman	TX
76885	=> 	Valley Spring	Llano	TX
76886	=> 	Veribest	Tom Green	TX
76887	=> 	Voca	McCulloch	TX
76888	=> 	Voss	Coleman	TX
76890	=> 	Zephyr	Brown	TX
76901	=> 	San Angelo	Tom Green	TX
76902	=> 	San Angelo	Tom Green	TX
76903	=> 	San Angelo	Tom Green	TX
76904	=> 	San Angelo	Tom Green	TX
76905	=> 	San Angelo	Tom Green	TX
76906	=> 	San Angelo	Tom Green	TX
76908	=> 	Goodfellow Afb	Tom Green	TX

factpacks/usazips.fact  view on Meta::CPAN

95930	=> 	Clipper Mills	Butte	CA
95931	=> 	College City	Colusa	CA
95932	=> 	Colusa	Colusa	CA
95934	=> 	Crescent Mills	Plumas	CA
95935	=> 	Dobbins	Yuba	CA
95936	=> 	Downieville	Sierra	CA
95937	=> 	Dunnigan	Yolo	CA
95938	=> 	Durham	Butte	CA
95939	=> 	Elk Creek	Glenn	CA
95940	=> 	Feather Falls	Butte	CA
95941	=> 	Forbestown	Butte	CA
95942	=> 	Forest Ranch	Butte	CA
95943	=> 	Glenn	Glenn	CA
95944	=> 	Goodyears Bar	Sierra	CA
95945	=> 	Grass Valley	Nevada	CA
95946	=> 	Penn Valley	Nevada	CA
95947	=> 	Greenville	Plumas	CA
95948	=> 	Gridley	Butte	CA
95949	=> 	Grass Valley	Nevada	CA
95950	=> 	Grimes	Colusa	CA
95951	=> 	Hamilton City	Glenn	CA



( run in 1.111 second using v1.01-cache-2.11-cpan-4e96b696675 )