Amethyst

 view release on metacpan or  search on metacpan

Amethyst/Brain/Infobot/Module/Excuse.pm  view on Meta::CPAN

What office are you in? Oh, that one.  Did you know that your building was built over the universities first nuclear research site? And wow, aren't you the lucky one, your office is right over where the core is buried!
The MGs ran out of gas.
The UPS doesn't have a battery backup.
Recursivity.  Call back if it happens again.
Someone thought The Big Red Button was a light switch.
The mainframe needs to rest.  It's getting old, you know.
I'm not sure.  Try calling the Internet's head office -- it's in the book.
The lines are all busy (busied out, that is -- why let them in to begin with?).
Jan  9 16:41:27 huber su: 'su root' succeeded for .... on /dev/pts/1
It's those computer people in X {city of world}.  They keep stuffing things up.
A star wars satellite accidently blew up the WAN.
Fatal error right in front of screen
That function is not currently supported, but Bill Gates assures us it will be featured in the next upgrade.
wrong polarity of neutron flow
Lusers learning curve appears to be fractal
We had to turn off that service to comply with the CDA Bill.
Ionisation from the air-conditioning
TCP/IP UDP alarm threshold is set too low.
Someone is broadcasting pigmy packets and the router dosn't know how to deal with them.
The new frame relay network hasn't bedded down the software loop transmitter yet. 
Fanout dropping voltage too much, try cutting some of those little traces

Amethyst/Brain/Infobot/Module/Excuse.pm  view on Meta::CPAN

Jupiter is aligned with Mars.
Redundant ACLs. 
Mail server hit by UniSpammer.
T-1's congested due to porn traffic to the news server.
Data for intranet got routed through the extranet and landed on the internet.
We are a 100% Microsoft Shop.
We are Microsoft.  What you are experiencing is not a problem; it is an undocumented feature.
Sales staff sold a product we don't offer.
Secretary sent chain letter to all 5000 employees.
Sysadmin didn't hear pager go off due to loud music from bar-room speakers.
Sysadmin accidentally destroyed pager with a large hammer.
Sysadmins unavailable because they are in a meeting talking about why they are unavailable so much.
Bad cafeteria food landed all the sysadmins in the hospital.
Route flapping at the NAP.
Computers under water due to SYN flooding.
The vulcan-death-grip ping has been applied.
Electrical conduits in machine room are melting.
Traffic jam on the Information Superhighway.
Radial Telemetry Infiltration
Cow-tippers tipped a cow onto the server.
tachyon emissions overloading the system

Amethyst/Brain/Infobot/Module/Zippy.pm  view on Meta::CPAN

HUMAN REPLICAS are inserted into VATS of NUTRITIONAL YEAST ...
I always have fun because I'm out of my mind!!!
I am a jelly donut.  I am a jelly donut.
I am a traffic light, and Alan Ginzberg kidnapped my laundry in 1927!
I am covered with pure vegetable oil and I am writing a best seller!
I am deeply CONCERNED and I want something GOOD for BREAKFAST!
I am having FUN...  I wonder if it's NET FUN or GROSS FUN?
I am NOT a nut....
I appoint you ambassador to Fantasy Island!!!
I brought my BOWLING BALL -- and some DRUGS!!
I can't decide which WRONG TURN to make first!!  I wonder if BOB GUCCIONE has these problems!
I can't think about that.  It doesn't go with HEDGES in the shape of LITTLE LULU -- or ROBOTS making BRICKS ...
I demand IMPUNITY!
I didn't order any WOO-WOO ... Maybe a YUBBA ... But no WOO-WOO!
I don't believe there really IS a GAS SHORTAGE.. I think it's all just a BIG HOAX on the part of the plastic sign salesmen -- to sell more numbers!!
... I don't know why but, suddenly, I want to discuss declining I.Q. LEVELS with a blue ribbon SENATE SUB-COMMITTEE!
I don't know WHY I said that ... I think it came from the FILLINGS in my read molars ...
... I don't like FRANK SINATRA or his CHILDREN. I don't understand the HUMOUR of the THREE STOOGES!!
I feel ... JUGULAR ...
I feel better about world problems now!
I feel like a wet parking meter on Darvon!

Amethyst/Brain/Infobot/Module/Zippy.pm  view on Meta::CPAN

With YOU, I can be MYSELF ...  We don't NEED Dan Rather ...
World War III?  No thanks!
World War Three can be averted by adherence to a strictly enforced dress code!
Wow!  Look!!  A stray meatball!!  Let's interview it!
Xerox your lunch and file it under "sex offenders"!
Yes, but will I see the EASTER BUNNY in skintight leather at an IRON MAIDEN concert?
You can't hurt me!!  I have an ASSUMABLE MORTGAGE!!
You mean now I can SHOOT YOU in the back and further BLUR th' distinction between FANTASY and REALITY?
You mean you don't want to watch WRESTLING from ATLANTA?
YOU PICKED KARL MALDEN'S NOSE!!
You should all JUMP UP AND DOWN for TWO HOURS while I decide on a NEW CAREER!!
You were s'posed to laugh!
YOU!!  Give me the CUTEST, PINKEST, most charming little VICTORIAN DOLLHOUSE you can find!!  An make it SNAPPY!!
Your CHEEKS sit like twin NECTARINES above a MOUTH that knows no BOUNDS -- Youth of today!  Join me in a mass rally for traditional mental attitudes!
Yow!
Yow!  Am I having fun yet?
Yow!  Am I in Milwaukee?
Yow!  And then we could sit on the hoods of cars at stop lights!
Yow!  Are we laid back yet?
Yow!  Are we wet yet?
Yow!  Are you the self-frying president?

README  view on Meta::CPAN


The README is used to introduce the module and provide instructions on
how to install the module, any machine dependencies it may have (for
example C compilers and installed libraries) and any other information
that should be provided before the module is installed.

A README file is required for CPAN modules since CPAN extracts the
README file from a module distribution so that people browsing the
archive can use it get an idea of the modules uses. It is usually a
good idea to provide version information here so that people can
decide whether fixes for the module are worth downloading.

INSTALLATION

To install this module type the following:

   perl Makefile.PL
   make
   make test
   make install

factpacks/Linux.fact  view on Meta::CPAN

AB.pl => <reply> $who, Portable PIM. URL: http://forsythe.dhs.org/~hdiwan/
Abacus => <reply> $who, Spreadsheet for Linux/XWindows written in Tcl/Tk and C/C++. URL: http://www-cad.eecs.berkeley.edu/HomePages/aml/abacus/abacus.html
AbiWord => <reply> $who, Fully featured word processor. URL: http://www.abisource.com/
abs => <reply> $who, Full featured spreadsheet for X11. URL: http://www.ping.be/bertin/abs.shtml
AC3D => <reply> $who, A powerful and intuitive 3D modeller that really shows off the power of Linux.. URL: http://www.comp.lancs.ac.uk/computing/users/andy/ac3d.html
ac3dec => <reply> $who, A free Dolby Digital (AC-3) decoder for unix. URL: http://ess.engr.uvic.ca/~aholtzma/ac3/
acalc => <reply> $who, A console calculator.. URL: http://homepages.infoseek.com/~googlefritz/acalc.htm
Accuradar => <reply> $who, Shell script that downloads radar images using an Accuweather account. URL: http://www.digital-galaxy.net/~patt/storm.html
AccuRev => <reply> $who, Cross Platform Configuration Management for Distributed Development. URL: http://www.accurev.com/
ACE => <reply> $who, Object-oriented C++ class library and framework. URL: http://www.cs.wustl.edu/~schmidt/ACE.html
Acidblood => <reply> $who, Full-featured IRC Bot. URL: http://www.darkice.com/site/acidblood/
acl => <reply> $who, Colorizes log files using advanced parsing capabilities.. URL: http://www.LinuxRC.org/projects/acl/
acmemail => <reply> $who, A multiuser POP3/IMAP to Web gateway with MIME and mod_perl support. URL: http://www.astray.com/acmemail/
ACPLT/KS => <reply> $who, Open and free communication system for Process Control (Engineering). URL: http://www.plt.rwth-aachen.de/ks/english/
acro => <reply> $who, Random character-sequence generator. URL: http://finbar.dyndns.org/programs/acro/
Acrobat Reader => <reply> $who, Acrobat reader for linux and other unices. URL: http://www.adobe.com/prodindex/acrobat/readstep.html#reader
ACS => <reply> $who, GPL licensed multi-line voice response telephony platform. URL: http://www.voxilla.org/projects/projacs.html
active => <reply> $who, news, events and projects on the web. URL: http://active.org.au/about/
Active Guardian => <reply> $who, Server based web content filter. URL: http://www.activeguardian.com/
ACUA => <reply> $who, . URL: http://acua.ebbs.com.au/
Ad Buster => <reply> $who, Simple personal proxy, which removes unwanted ad banners, depending on URL.. URL: http://lide.punknet.cz/miri/adbuster.html

factpacks/Linux.fact  view on Meta::CPAN

ChemApp => <reply> $who, A thermochemistry library for your software. URL: http://gttserv.lth.rwth-aachen.de/gtt/
Cheops => <reply> $who, Network User Interface. URL: http://www.marko.net/cheops/
ZMech => <reply> $who, State machine development tool. URL: http://www.demon.co.uk/titan/ZMECH/
Chester => <reply> $who, Newsgroup article-downloader. URL: http://www.io.com/~brettw/Chester/Chester.html
Chinese Lyx Patch => <reply> $who, patch to make lyx a Chinese writing tool.. URL: 
chord2html => <reply> $who, A Perl script to convert CHORD input files to HTML. URL: http://helllabs.org/~claudio/chord/
chpasswd => <reply> $who, change user password by WWW. URL: http://sic.popnet.pl/~mlody/chpasswd
chpp => <reply> $who, General purpose preprocessor. URL: http://chakotay.ist.org/
chrony => <reply> $who, Network time protocol client/server tailored for dial-up client use. URL: http://www.rrbcurnow.freeserve.co.uk/chrony/
cicq => <reply> $who, A command-line based icq client. URL: http://uhura.cc.rochester.edu/~ab012f/cicq/
cid => <reply> $who, TCP client/server Caller-ID system, including server and Tk GUI client.. URL: http://www.tummy.com/cid
Cinderella => <reply> $who, Interactive Geometry Software (like Geometers' Sketchpad or Cabri). URL: http://www.cinderella.de/
CINQ => <reply> $who, Portable BASIC Compiler. URL: http://shell.flite.net/~rmann/index.html
CINT => <reply> $who, C/C++ Interpreter. URL: http://root.cern.ch/root/Cint.html
CIPE => <reply> $who, Crypto IP Encapsulation. URL: http://sites.inka.de/~W1011/devel/cipe.html
cipherczar => <reply> $who, ncurses environment that helps solve simple substitution ciphers. URL: http://wil.langford.net/cipherczar/
CircleMUD => <reply> $who, Multi User Dungeon for Linux. URL: http://www.circlemud.org/
cIRCus => <reply> $who, Graphical IRC client for Linux/X11. URL: http://www.nijenrode.nl/~ivo/circus/
CIS => <reply> $who, A Web-application System used to. URL: http://www.bionode.com/cis/
Cistron Radius Server => <reply> $who, Free Radius Server with many features. URL: http://www.miquels.cistron.nl/radius/
Citadel/UX => <reply> $who, Multiuser, multithreaded BBS software. URL: http://uncnsrd.mt-kisco.ny.us

factpacks/Linux.fact  view on Meta::CPAN

CSCMail => <reply> $who, Gtk E-Mail Client written in Perl. URL: http://www.cyberdeck.org/cscmail/
CSP => <reply> $who, Interpreted C/C++ web pages with ASP-like loadable module. URL: http://ruby.ddiworld.com/jreed/web/csp/index.html
CSSC => <reply> $who, SCCS clone. URL: http://www.free-lunch.demon.co.uk/CSSC/
cst-calendar => <reply> $who, Web based, php3/mysql powered organisationalcalendar. URL: http://www.goulburn.net.au/~hagus/
cstream => <reply> $who, dd(1)-like tool, precise bandwidth limiting/reporting, fifo support. URL: http://www.cons.org/cracauer/cstream.html
csv2html => <reply> $who, Converts CSV files to HTML tables. URL: http://virtual.oltronics.net/~phma/Software/csv2html.html
csvdump => <reply> $who, Dump, process, and mail a MySQL table.. URL: http://oss.gospelcom.net/
ctBLD => <reply> $who, A platform independent builder similar in purpose to make.. URL: http://www.imonk.com/
ctDSM => <reply> $who, C++ Library-Based Distributed Shared Memory. URL: http://www.imonk.com/
ctGUI => <reply> $who, GUI development portion of the Coral Tree Library Set. URL: http://www.imonk.com/
Cthuga-L => <reply> $who, An oscilloscope on acid.. URL: http://www.afn.org/~cthugha/
cthugha => <reply> $who, An oscilliscope on acid, displays patterns in sync with music.. URL: http://www.geocities.com/CapeCanaveral/Lab/6386/cthugha/index.html
CthulhuMud => <reply> $who, MUD-ROM with major scripting/RP enhancements. URL: http://www.cthulhumud.cx/
cthumb => <reply> $who, Automatic creation of a picture album in HTML w/ thumbnails. URL: http://puchol.com/cpg/software/cthumb/
ctm => <reply> $who, SNMP interface statistics gatherer. URL: http://www.cityline.net/~lf/ctm/
ctNET => <reply> $who, Networking abstraction portion of Coral Tree Library Set. URL: http://www.imonk.com/
cucipop => <reply> $who, The Cubic Circle POP3 daemon. URL: ftp://ftp.informatik.rwth-aachen.de/pub/packages/cucipop/
Cult-3d plugin => <reply> $who, New multi-platform 3D object rendering engine. URL: http://www.cult3d.com
CUP => <reply> $who, CUP is a LALR arser Generator for Java. URL: http://www.cs.princeton.edu/~appel/modern/java/CUP/
CUPS-filters => <reply> $who, Printer filters to use with CUPS. URL: http://www.geocities.com/SiliconValley/8036/cups_page.html
curl => <reply> $who, Command line tool for getting data from a URL. URL: http://curl.haxx.nu/
curnel => <reply> $who, Download latest stable/beta Linux kernel without knowing the version. URL: http://float.dhs.org/

factpacks/Linux.fact  view on Meta::CPAN

NmapFE => <reply> $who, GTK+ front end for Nmap.. URL: http://codebox.net/nmapfe.html
nmh => <reply> $who, Enhanced version of the MH electronic mail system.. URL: http://www.mhost.com/nmh/
nmix => <reply> $who, An ncurses mixer for the console.. URL: http://www.sourceforge.net/download.php?fileid=485
nmpg => <reply> $who, Command driven frontend for mpg123. URL: http://zippy.ultrashell.net/~nevyn/soft/nmpg.htm
nmsms => <reply> $who, Newmail to sms announcer. URL: http://lide.pruvodce.cz/~wayne/nmsms-0.04.tgz
NNTP for Gamora => <reply> $who, NNTP services for Gamora applications. URL: ftp://gamora.org/pub/gamora/plugins/nntp4g-0.0.jar
NNTP Newsreader Servlet => <reply> $who, NNTP access servlet with viewing, sort and posting functions.. URL: http://www.isnetworks.com/
NNTPcache => <reply> $who, Caching proxy for NNTP servers. URL: http://www.nntpcache.org/
Zune => <reply> $who, A free MUI (an Amiga GUI toolkit) clone for Un*x. URL: http://www.penguinpowered.com/~zune/
NOCOL => <reply> $who, System and network monitoring software. URL: http://www.netplex-tech.com/software/nocol/
nodelist.pl => <reply> $who, FidoNet nodelist generator written in perl. URL: http://acidlinux.webjump.com/perl.htm
NodeWatch => <reply> $who, Monitor and react to TCP/IP network nodes using fping.. URL: http://junebug.fhcrc.org/nodewatch/
nodoze => <reply> $who, Prepares Web sites built using Microsoft Windows for UNIX servers.. URL: http://www.cuug.ab.ca/~babulicm/perl/nodoze/
noffle => <reply> $who, News server optimized for low speed dial-up connections to the Internet. URL: http://home.t-online.de/home/markus.enzenberger/noffle.html
noflushd => <reply> $who, Daemon that sends idle disks to sleep (for kernels 2.2.11+). URL: http://www.tuebingen.linux.de/kobras/noflushd/
NoNEdit => <reply> $who, Makes noweb literate programming easier with NEdit.. URL: http://nonedit.resourcez.com/
noniget => <reply> $who, A tcl script for anonymous ftp.. URL: http://www.earthlink.net/~tarozax/noniget.html
NoSQL => <reply> $who, A Relational Database Management System. URL: http://www.mi.linux.it/nosql/
note => <reply> $who, commandline note tool. URL: http://www.daemon.de/software.html
notify => <reply> $who, Notify (website) visitors of changes to your site.. URL: http://www.ping.de/~sven/notify/
NotifyMe => <reply> $who, Program which displays message if a specific user just logged in. URL: http://wizard.ae.krakow.pl/~mike/

factpacks/Linux.fact  view on Meta::CPAN

Perl/Tk Finger => <reply> $who, Perl/Tk Finger Client. URL: http://www.whirlnet.demon.co.uk/linux/ptkfinger.html
Perl/Tk Headline Grabbers => <reply> $who, Headline grabbers for various Linux-related sites. URL: http://jade.netpedia.net/
Perl/Tk NSLookup => <reply> $who, DNS Lookup app written in Perl/Tk. URL: http://www.whirlnet.demon.co.uk/linux/ptknslookup.html
Perl/Tk Time Client => <reply> $who, Compares your system time with another machine. URL: http://www.whirlnet.demon.co.uk/linux/ptktime.html
perlbot => <reply> $who, An IRC bot in Perl written with simplicity in mind. URL: http://www.pas.rochester.edu/~burke/perlbot/
perldap => <reply> $who, Perl C and OO interface to LDAP. URL: http://www.mozilla.org/directory/
perldbgui => <reply> $who, A GUI for the Perl debugger.. URL: http://members.tripod.com/~CurtMcKelvey/perldbgui/
Perlfect Search => <reply> $who, Web site indexer and search engine.. URL: http://perlfect.com/freescripts/search/
Perlfect::Template => <reply> $who, Text/HTML template processing module for Perl.. URL: http://www.perlfect.com/articles/templates.shtml
PerlHoo => <reply> $who, Yahoo-like Web Directory. URL: http://www.webreference.com/perl/
perlitil => <reply> $who, incident control based on itil.. URL: http://www.pacha.nl/perlitil/
perlmoo => <reply> $who, lambdamoo style moo written in perl. URL: http://kitenet.net/programs/perlmoo/
perlonfile => <reply> $who, Process a set of files with any Perl expression.. URL: http://novelidea.com/products/perlonfile/
perlradius => <reply> $who, A drop-in replacement for the livingstonradiusd. URL: http://www.iinet.net.au/~michael/radius.html
PerlSETI => <reply> $who, GUI front end for the SETI@home client, programmed in Perl. URL: http://ude.org/jan/perlseti/
Perro => <reply> $who, This is a set of daemons that log TCP/UDP/ICMP packets.. URL: http://www.grigna.com/diego/linux/perro/
Personal Webspace => <reply> $who, A set of scripts that allows users to maintain their web pages using a browser.. URL: http://zorro.pangea.ca/~mcrewson/pws/
Petey => <reply> $who, Fortune like application for story generation. URL: http://members.xoom.com/uruk/index.html
Petidomo => <reply> $who, Easy to use mailing list processor and manager. URL: http://www.petidomo.com/
Petite Chez Scheme => <reply> $who, An implementation of extended ANSI Scheme. URL: http://www.scheme.com/
petopt => <reply> $who, C command line argument parsing library. URL: ftp://ftp.lysator.liu.se/pub/unix/petopt

factpacks/Linux.fact  view on Meta::CPAN

png2jpg proxy => <reply> $who, HTTP proxy with png to jpg conversion.. URL: http://www.penguin.cz/~martinmv/index_eng.html
pngcrush => <reply> $who, Optimizer for PNG files that can also delete specified chunks. URL: http://www.xnot.com/pmt/pngcrush/
PngEncoder => <reply> $who, A Java class to convert Java images to a byte-array in PNG format. URL: http://www.best.com/~nessus/pngencoder/
PNGgraph.pm => <reply> $who, Chart-plotting perl module. URL: ftp://ftp.mobile.ru/pub/DISTRIB/PNGgraph-1.11.tar.gz
PNMA => <reply> $who, PNM based plug-in for GIMP with alpha and layering capabilities.. URL: http://cemtach.org/software/pnma/pnma.html
pnmtopng => <reply> $who, PBMplus/NetPBM converters to/from PNG image format. URL: http://www.cdrom.com/pub/png/pngcode.html
pnpmodem => <reply> $who, Simple bourne shell script for setting up ISA plug and play modems. URL: http://linuxmafia.org/~shaded/dist/pnpmodem-0.2.gz
Pocket Frog => <reply> $who, Green Frog Linux for the Mobile Gear. URL: http://www.linuxstart.com/~austin/pocket-frog.html
Pocket Linux => <reply> $who, A modern, single floppy distribution of Linux dedicated to networking. URL: http://pocket-linux.coven.vmh.net/
pod2ps => <reply> $who, A pod to PostScript translator, with PDF support. URL: http://www.oasis.leo.org/perl/scripts/textproc/pod2ps.dsc.html
pointlist.pl => <reply> $who, Pointlist generator script. URL: http://acidlinux.webjump.com/perl.htm
poll => <reply> $who, Script for automating Fidonet polls. URL: http://www.drmach.demon.co.uk/vashti/software/index.html
Pollera => <reply> $who, A www poll system meant to be run via CGI.. URL: http://bachue.com/alejo/pollera.html
Pontifex => <reply> $who, Pontifex online. URL: http://www.carumba.com/cipher/pontifex/pontifex.cgi
POO Library => <reply> $who, Open-put-get-close library for writing (portable) multiwindowed applications.. URL: http://www.ogsoftware.com/
Poor Man's Cam => <reply> $who, PMCam allows you to set up a web cam on a remote site.. URL: http://ic.net/~craig/pmcam/
Poorcount => <reply> $who, CGI scripts to enable counters in home pages for Web servers. URL: http://perso.infonie.fr/domi37/poorcount.html
POP Checker => <reply> $who, GNOME POP mail checking panel applet.. URL: http://www.uq.edu.au/~cmamuys/source_downloads/popchk-1.2.tgz
Pop Notifier => <reply> $who, Small C program to notify a user when mail arrives. URL: http://henry.cipolla.com/pub/popnotify.tgz
pop-perl5 => <reply> $who, Perl script to retrieve mail from pop server(s). URL: http://engsoc.queensu.ca/flynn/pop-perl/
POP3 with Source => <reply> $who, POP3 provides diverse applications with the ability to receive e-mails. URL: http://www.alphaWorks.ibm.com/

factpacks/Linux.fact  view on Meta::CPAN

RioExpress => <reply> $who, Manager for the Rio portable MP3 player.. URL: http://www.phed.org/RioExpress/
riofill => <reply> $who, MP3 - Fill a Diamond Rio with a random playlist. URL: http://www.egbok.com/perl.html
Rioja => <reply> $who, A record-oriented java input/output class library.. URL: http://www.alphaworks.ibm.com/
riolist => <reply> $who, Builds random play lists for Diamond RIO. URL: http://www.zero-ping.com/riolist/riolist
RioRand => <reply> $who, Perl script to create random lists of mp3s for your Rio.. URL: http://landru.myhome.net/opperman/riorand/
Ripenc => <reply> $who, Bourne shell script frontend to Cdparanoia, and Bladeenc.. URL: http://www.asde.com/~mjparme/index.htm
ripit => <reply> $who, Front-end for Ripping/Encoding/Tagging MP3s. URL: http://www.bigfoot.com/~simon.quinn/ripit.html
ripperX => <reply> $who, GTK program to rip and encode mp3 files. URL: http://www.digitallabyrinth.com/linux/ripperX/index.html
rjobs => <reply> $who, A Periodic Remote Job Agent/Daemon. URL: http://www.psych.mcgill.ca/perpg/stds/rk/linux/rjobs.html
Rlab => <reply> $who, Mathematical program similar to Matlab. URL: http://www.eskimo.com/~ians/Rlab.html
rlinetd => <reply> $who, inetd replacement on acid. URL: http://www.rcpt.to/rlinetd/
rlpr => <reply> $who, Print from remote sites to your local printer w/o configuring remote site. URL: http://truffula.com/rlpr/
rmcore => <reply> $who, Shell script to list/remove core files. URL: http://www.angelfire.com/ks/linuxprg/
rmd160 => <reply> $who, RIPEMD-160 digest hashing library for C. URL: http://phil.ipal.org/freeware/rmd160/
rmhatm => <reply> $who, Advanced script to strip CR/LF from textfiles. URL: http://insomnia.be/johanvg/
rmligs => <reply> $who, Ligature corrector for German LaTeX documents.. URL: http://members.xoom.com/maccy/ispell/dict/
rmRemote => <reply> $who, Use the REALmagic Remote with Linux.. URL: http://boost.linux.kz/rmremote/
RMTP => <reply> $who, Request Mail-Transfer Protocol. URL: http://www.noord.nu/
Rm_old.pl => <reply> $who, Lists all files older than a specified date, create shell scripts to remove them. URL: http://www.curtisonline.net/software/
rndln - randomize lines => <reply> $who, Randomize the line sequence of file(s) or standard in and output to standard out. URL: http://deutschsoft.com/rndln/
ROADS => <reply> $who, A free Yahoo-like system written in Perl. URL: http://www.roads.lut.ac.uk/

factpacks/Linux.fact  view on Meta::CPAN

weedlog => <reply> $who, A packet logger to help debug network connections.. URL: http://www.firepool.com/weedlog/
WEEDS => <reply> $who, Java application that converts XML files describing plants into an HTML flora. URL: http://www.honeylocust.com/weeds/
WeirdX => <reply> $who, A pure Java X Window System server. URL: http://www.jcraft.com/weirdx/
WEKA => <reply> $who, Data Mining Workbench in Java. URL: http://www.cs.waikato.ac.nz/ml/weka/
Welcome2L => <reply> $who, Linux ANSI boot logo. URL: http://www.littleigloo.org/
Wforward => <reply> $who, Virtual Web hosting. URL: http://ac2i.dyn.ml.org/wforward.html
Wget-HTML-Interface => <reply> $who, HTML-based Wget-Interface. URL: http://www.provi.de/s.schliesing/wget/
Wget-New-Percentage => <reply> $who, New progress/percentage indicator for WGNU Wget. URL: http://www.biscom.net/~cade/away/
WHAMp => <reply> $who, An mpg123 frontend using the gtk-toolkit. URL: http://www.casema.net/~bosboom/
whatpix => <reply> $who, Duplicate file finder.. URL: http://www.bogus.net/~codex/
whats => <reply> $who, Grab useful info from Netcraft. URL: http://www.luciddesigns.com/chrislea/whats/index.html
Wheel of Falken => <reply> $who, A Wheel of Fortune style game for Falken. URL: http://bbs.ipass.net/rds/
Where's Your Grammar? => <reply> $who, A simple config-file-and-command-line-parser generator.. URL: http://www.larsshack.org/sw/wyg/
which => <reply> $who, Show full path of commands. URL: http://www.xs4all.nl/~carlo17/which/
whichcap => <reply> $who, Allows Linux capabilities to be used via sudo. URL: http://epona.ucam.org/rrw/whichcap.html
whichman => <reply> $who, whichman, ftff and ftwhich are fault tolerant search utilities.. URL: http://www.linuxfocus.org/~guido.socher/
WhirlGif => <reply> $who, Command-line animated GIF creator. URL: http://www.msg.net/utility/whirlgif/
Whodat => <reply> $who, modified whois. URL: ftp://divisionbyzero.com/pub/
whois => <reply> $who, A modern whois client. URL: http://www.linux.it/~md/software/
Whois2 => <reply> $who, Recursive whois client. URL: http://onegeek.org/~tom/software/whois2/
whowatch => <reply> $who, Console program which displays in real time list of logged users.. URL: http://wizard.ae.krakow.pl/~mike/

factpacks/LinuxFS.fact  view on Meta::CPAN

# Linux File System
# Created 12-30-99
# Creator: Sean Hollen

directory /bin => /bin is short for "binaries," or executables, where many essential system programs reside. Use ls -F /bin to list the files here. If you look down the list you may see a few commands that you recognize, such as cp, ls and mv. These ...
directory /dev => The "files," in /dev are device drivers - they access system devices and resources like disk drives, modems, and memory. Just as your system can read data from a file, it can also read imput from the mouse by accessing /dev/mouse.
directory /dev/console => refers to the system's console - this is the monitor connected directly to your system.
directory /dev/cua => The directory for devices that are used to access serial ports.
directory /dev/ttyS => The directory for different com ports. Example: ttyS1 is com 2, ttyS2 is com three, etc.
directory /dev/hda => The directory that refers to the whole first hard disk, while /dev/hda1 refers to the first partition on /dev/hda.
directory /dev/null => The directory that is concidered the balck-hole. Data sent to this device is gone forever. Why is this useful you ask? Well, if you wanted to suppress the output of a command appearing on your screen, you could send that output...
directory /ect => The directory /etc contains a number of miscellaneous system configuration files. These include, /etc/passwd (the user database), /etc/rc (the system initialization script), and so on.
directory /sbin => The directory that contains essential system binaries that are used for system administration.
directory /home => The directory that contains user's home directories. For Exapmle: /home/larry is the home directory for the user "larry." On a newly installed system, there may not be any users in this directory.
directory /lib => The directory that contains shared library images, which are files that contain code whic many programs share in common. Rather than each program using its own copy of these shared routines, they are all stored in on common place, i...
directory /proc => The directory that supports a "virtual file system," where the files are stored in memory, not on disk. These "files" refer to the various processes running on the system, and let you get information about the programs and processe...
directory /tmp => The directory that programs store temporary information in when the program has finished executing. 
directory /usr => The directory /usr is a very important directory whic contains subdirectories that contain some of the most important and useful programs and configuration files used on the system. The various directories are essential for the syst...
directory /usr/X11r6 => The directory that contains the X Windows System, if you installed it. The X Window System is a large, powerful graphical environment that provides a large number of graphical utilities and programs. If you're at all familiar ...
directory /usr/bin => The directory that is a real warehouse for sofware on any UNIX system, containing most of the executables for programs not found in other places, like /bin.
directory /usr/etc => The directory that contains miscellaneous utilities and files, that in general, are not essential to the system.

factpacks/dos.fact  view on Meta::CPAN

KEYB => (External) KEYB [xx][,][yyy][,][d:][path]filename [/E][/ID:(number)]  Loads a program that replaces the support program for U. S. keyboards. 
LABEL => (External) LABEL [d:][volume label] Creates or changes or deletes a volume label for a disk. 
LASTDRIVE => (Internal) LASTDRIVE=(drive letter) Used in the CONFIG.SYS file to set the maximum number of drives that can be accessed. 
LOADFIX => (Internal) LOADFIX [d:][path]filename [parameters] Ensures that a program is loaded above the first 64K of conventional memory, and runs the program. 
LOADHIGH => (Internal) LOADHIGH (LH) [d:][path]filename [parameters] Loads memory resident application into reserved area of memory (between 640K-1M).
MEM => (External) MEM [/program|/debug|/classify|/free|/module(name)] [/page] Displays amount of installed and available memory, including extended, expanded, and upper memory.
MEMMAKER => (External) MEMMAKER [/B][/batch][/session][/swap:d] [/T][/undo][/W:size1,size2] Starts the MemMaker program, a program that lets you optimize your computer's memory. 
MENUCOLOR => (Internal) MENUCOLOR=textcolor,[background] Used in the CONFIG.SYS file to set the colors that will be used by DOS to display text on the screen.
MENUDEFAULT => (Internal) MENUDEFAULT=blockname, [timeout] Used in the CONFIG.SYS file to set the startup configuration that will be used by DOS if no key is pressed within the specified timeout period.
MENUITEM => (Internal)MENUITEM=blockname, [menutext] Used in the CONFIG.SYS file to create a start-up menu from which you can select a group of CONFIG.SYS commands to be processed upon reboot.
MIRROR => (External) MIRROR [d:]path [d:] path [...] IRROR [d1:][d2:][...] [/T(drive)(files)] [/partn][/U][/1] Saves disk storage information that can be used to recover accidentally erased files. 
MKDIR => (MD) (Internal) MKDIR (MD) [d:]path Creates a new subdirectory.
MODE => (External) Sets mode of operation for devices or communications.
MORE => (External) MORE < (filename or command) (name)MORE Sends output to console, one screen at a time. 
MOVE => (Internal) MOVE [/Y|/-Y] [d:][path]filename[,[d:][path]filename[...]] destination Moves one or more files to the location you specify. Can also be used to rename directories. 
MSAV => (External) MSAV [d:] [/S|/C][/R][/A][/L][/N][/P][/F][/video][/mouse] SAV /video Scans your computer for known viruses. 
MSBACKUP => External) MSBACKUP [setupfile] [/BW|/LCD|/MDA] Used to backup or restore one or more files from one disk to another. 
MSCDEX => (External) MSCDEX /D:driver [/D:driver2. . .] [/E][/K][/S][/V][/L:letter] [/M:number] Used to gain access to CD-ROM drives (new with DOS Version 6).
MSD => (External) MSD [/B][/I] BSD [/I] [/F[d:][path]filename [/P[d:][path]filename [/S[d:][path]filename Provides detailed technical information about your computer. 
NLSFUNC => (External) NLSFUNC [d:][path]filename Used to load a file with country-specific information.
NUMLOCK => (Internal) NUMLOCK=on|off Used in the CONFIG.SYS file to specify the state of the NumLock key.

factpacks/html.fact  view on Meta::CPAN

example <FORM ENCTYPE> => <FORM ENCTYPE=media type> form tags </FORM>
html <FORM SCRIPT> => The SCRIPT attribute points to a script to be run. The browser must be able to run the type of script that is specified.
example <FORM SCRIPT> => <FORM SCRIPT=URL> form tags </FORM>
html <FRAME> => The frame tag appears inside the FRAMESET tag and specifies one frame in the frameset.
example <FRAME> => <FRAME attributes>
html <FRAME attributes> => One or all of these: SRC, NAME, MARGINWIDTH, MARGINHEIGHT, SCROLLING, NORESIZE, FRAMEBORDER, FRAMESPACING & ALIGN
html <FRAME SRC> => (SRC="URL") The URL of the source document to be displayed in this frame. If the frame does not specify a source it will be displayed as blank space.
html <FRAME NAME> => (NAME="window name") Here "window name" is the name associated with this frame. It can be used by the TARGET attribute in the A, BASE, AREA, and FORM tags to target this frame.
html <FRAME MARGINWIDTH> => ( MARGINWIDTH=number ) Here number is the left and right margin thickness in pixels.
html <FRAME MARGINHEIGHT> => ( MARGINHEIGHT=number ) Here number is the top and bottom margin thickness in pixels.
html <FRAME SCROLLING> => (SCROLLING=type) Here type is one of yes, no or auto. It specifies if the frame is to have a scroll bar: auto (the default) means the browser will decide.
html <FRAME NORESIZE> => Stops the user from resizing the frame..
html <FRAME FRAMEBORDER> => (FRAMEBORDER=yes/no) Specifies if the border should be displayed.
html <FRAME FRAMESPACING> => (FRAMESPACING=number) Here number is the spacing between frames in pixels.
html <FRAME ALIGN> => (ALIGN = "alignment") One of: LEFT, RIGHT, TOP, TEXTTOP, MIDDLE, ABSMIDDLE, BASELINE, BOTTOM, or ABSBOTTOM.
html <FRAMESET> => The FRAMESET tag replaces the BODY tag in a document and is used to split the documents window into a set of smaller frames. See: html <FRAMESET> 2
html <FRAMESET> 2 => FRAMESET tags can be nested to create more complicated frame layouts. NOFRAME tags can also be placed in a frameset.
example <FRAMESET> => <FRAMESET attributes> frame tags </FRAMESET>
html <FRAMESET attributes> => The attributes for the tag <FRAMESET> are: ROWS & COLS
html <FRAMESET ROWS> => (ROWS="row heights") Here "row heights" specifies a list of values for the rows, each one can be specified as a percentage, a pixel value or as "*". See: html <FRAMESET ROWS> 2
html <FRAMESET ROWS> 2 => The frameset will be split vertically into frames based on these values. Rows with "*"'s in them will have any remaining space split between them.

factpacks/jargon-split.fact  view on Meta::CPAN

barf3 is  operation checks for an attempt to divide by zero, and   if one is encountered it causes the operation to fail in some   unspecified, but generally obvious, manner.) "The text editor   barfs if you try to read in a new file before writing o...
barf4 is  Commonwealth hackish,   `barf' is generally replaced by `puke' or `vom'.  {barf}   is sometimes also used as a metasyntactic variable, like {foo} or   {bar}. 
barfulation is  /bar`fyoo-lay'sh*n/ interj. Variation of {barf}   used around the Stanford area.  An exclamation, expressing disgust.   On seeing some particularly bad code one might exclaim,   "Barfulation!  Who wrote this, Quux?"
barfulous is  /bar'fyoo-l*s/ adj. (alt. `barfucious',   /bar-fyoo-sh*s/) Said of something that would make anyone barf,   if only for esthetic reasons.
baroque is  adj. Feature-encrusted; complex; gaudy; verging on   excessive.  Said of hardware or (esp.) software designs, this has   many of the connotations of {elephantine} or {monstrosity} but is   less extreme and not pejorative in itself.  "Meta...
baroque2 is  variations to its letterform output.   Now *that* is baroque!"  See also {rococo}. 
BartleMUD is  /bar'tl-muhd/ n. Any of the MUDs derived from the   original MUD game by Richard Bartle (see {MUD}).  BartleMUDs are   noted for their (usually slightly offbeat) humor, dry but friendly   syntax, and lack of adjectives in object descrip...
BartleMUD2 is  `brand172', for instance (see {brand   brand brand}).  Some MUDders intensely dislike Bartle and this   term, and prefer to speak of `MUD-1'. 
BASIC is  n. A programming language, originally designed for   Dartmouth's experimental timesharing system in the   early 1960s, which has since become the leading cause of   brain-damage in proto-hackers.  This is another case (like   {Pascal}) of t...
BASIC2 is  deliberately designed as an educational toy gets taken too   seriously.  A novice can write short BASIC programs (on the order of   10--20 lines) very easily; writing anything longer is (a) very   painful, and (b) encourages bad habits tha...
BASIC3 is  hack in a real language.  This wouldn't be so   bad if historical accidents hadn't made BASIC so common on low-end   micros.  As it is, it ruins thousands of potential wizards a year. 
batch is  adj. 1. Non-interactive.  Hackers use this somewhat more   loosely than the traditional technical definitions justify; in   particular, switches on a normally interactive program that prepare   it to receive non-interactive command input ar...
batch2 is  switches.  A `batch file' is a series of   instructions written to be handed to an interactive program running   in batch mode.  2. Performance of dreary tasks all at one sitting.   "I finally sat down in batch mode and wrote out checks fo...
batch3 is  electricity back on next   week..." 3. Accumulation of a number of small tasks that can be   lumped together for greater efficiency.  "I'm batching up those   letters to send sometime" "I'm batching up bottles to take to the   recycling ce...
bathtub curve is  n. Common term for the curve (resembling an   end-to-end section of one of those claw-footed antique bathtubs)   that describes the expected failure rate of electronics with time   initially high, dropping to near 0 for most of the ...
bathtub curve2 is  `tires out'.  See also {burn-in   period}, {infant mortality}. 
baud is  /bawd/ [simplified from its technical meaning] n. Bits per   second.  Hence kilobaud or Kbaud, thousands of bits per second.   The technical meaning is `level transitions per second'; this   coincides with bps only for two-level modulation w...
baud2 is  are aware of these nuances but blithely   ignore them. 
baud barf is  /bawd barf/ n. The garbage one gets on the monitor   when using a modem connection with some protocol setting (esp.   line speed) incorrect, or when someone picks up a voice extension   on the same line, or when really bad line noise di...
baud barf2 is  completely {random}, by the way;   hackers with a lot of serial-line experience can usually tell   whether the device at the other end is expecting a higher or lower   speed than the terminal is set to.  *Really* experienced ones   can...
baz is  /baz/ [Stanford corruption of {bar}] n. 1. The third   metasyntactic variable, after {foo} and {bar} and before   {quux} (or, occasionally, `qux'; or local idiosyncracies like   `rag', `zowie', etc.).  "Suppose we have three functions FOO,BAR...
baz2 is  BAZ...."   2. interj. A term of mild annoyance.  In this usage the term is   often drawn out for 2 or 3 seconds, producing an effect not unlike   the bleating of a sheep; /baaaaaaz/.  3. Occasionally appended to   {foo} to produce `foobaz'. 
bboard is  /bee'bord/ [contraction of `bulletin board'] n.   1. Any electronic bulletin board; esp. used of {BBS} systems   running on personal micros, less frequently of a USENET   {newsgroup} (in fact, use of the term for a newsgroup generally   ma...
bboard2 is  BBS world or as   a real old-timer predating USENET).  2. At CMU and other colleges   with similar facilities, refers to campus-wide electronic bulletin   boards.  3. The term `physical bboard' is sometimes used to   refer to a old-fashio...
bboard3 is  it refers to a particular one outside the CS Lounge.   In either of senses 1 or 2, the term is usually prefixed by the   name of the intended board (`the Moonlight Casino bboard' or   `market bboard'); however, if the context is clear, th...
bboard4 is  name alone, as in (at CMU) "Don't   post for-sale ads on general". 
BBS is  /B-B-S/ [acronym, `Bulletin Board System'] n. An electronic   bulletin board system; that is, a message database where people can   log in and leave broadcast messages for others grouped (typically)   into {topic group}s.  Thousands of local ...

factpacks/jargon-split.fact  view on Meta::CPAN

Big Gray Wall2 is  Recent (since VMS version 5) DEC   documentation comes with gray binders; under VMS version 4 the   binders were orange (`big orange wall'), and under version 3   they were blue.  See {VMS}. 
big iron is  n. Large, expensive, ultra-fast computers.  Used generally   of {number-crunching} supercomputers such as Crays, but can include   more conventional big commercial IBMish mainframes.  Term of   approval; compare {heavy metal}, oppose {di...
Big Red Switch is  [IBM] n. The power switch on a computer, esp. the   `Emergency Pull' switch on an IBM {mainframe} or the power switch   on an IBM PC where it really is large and red.  "This !@%$%   {bitty box} is hung again; time to hit the Big Re...
Big Red Switch2 is  tune with the company's passion for   {TLA}s, this is often acronymized as `BRS' (this has also   become established on FidoNet and in the PC {clone} world).  It   is alleged that the emergency pull switch on an IBM 360/91 actuall...
Big Red Switch3 is  power feed; the BRSes on   more recent machines physically drop a block into place so that   they can't be pushed back in.  People get fired for pulling them,   especially inappropriately (see also {molly-guard}).  Compare   {powe...
the Big Room is  n. The extremely large room with the blue ceiling   and intensely bright light (during the day) or black ceiling with   lots of tiny night-lights (during the night) found outside all   computer installations.  "He can't come to the p...
big win is  n. Serendipity.  "Yes, those two physicists discovered   high-temperature superconductivity in a batch of ceramic that had   been prepared incorrectly according to their experimental schedule.   Small mistake; big win!" See {win big}.
big-endian is  [From Swift's `Gulliver's Travels' via the famous   paper `On Holy Wars and a Plea for Peace' by Danny Cohen,   USC/ISI IEN 137, dated April 1, 1980] adj. 1. Describes a computer   architecture in which, within a given multi-byte numer...
big-endian2 is  has the lowest address   (the word is stored `big-end-first').  Most processors, including   the IBM 370 family, the {PDP-10}, the Motorola microprocessor   families, and most of the various RISC designs current in mid-1991,   are big...
big-endian3 is  {NUXI   problem}.  2. An {{Internet address}} the wrong way round.  Most   of the world follows the Internet standard and writes email   addresses starting with the name of the computer and ending up with   the name of the country.  I...
big-endian4 is  decided to do it the other way round before the Internet domain   standard was established; e.g., me@uk.ac.wigan.cs.  Most gateway   sites have {ad-hockery} in their mailers to handle this, but can   still be confused.  In particular,...
big-endian5 is  (domain uk) or Czechoslovakia (domain cs). 
bignum is  /big'nuhm/ [orig. from MIT MacLISP] n. 1. [techspeak] A   multiple-precision computer representation for very large integers.   More generally, any very large number.  "Have you ever looked at   the United States Budget?  There's bignums f...
bignum2 is  numbers on the dice are called   `bignums', especially a roll of double fives or double sixes   (compare {moby}, sense 4).  See also {El Camino Bignum}.   Sense 1 may require some explanation.  Most computer languages   provide a kind of ...
bignum3 is  integers are usually very limited in size; usually they must be   smaller than than 2^{31} (2,147,483,648) or (on a losing   {bitty box}) 2^{15} (32,768).  If you want to work with   numbers larger than that, you have to use floating-poin...
bignum4 is  six or seven decimal places.   Computer languages that provide bignums can perform exact   calculations on very large numbers, such as 1000!  (the factorial   of 1000, which is 1000 times 999 times 998 times ... times 2   times 1). 
bigot is  n. A person who is religiously attached to a particular   computer, language, operating system, editor, or other tool (see   {religious issues}).  Usually found with a specifier; thus,   `cray bigot', {ITS bigot}, `APL bigot', `VMS bigot', ...
bigot2 is  distinguished from mere   partisans or zealots by the fact that they refuse to learn   alternatives even when the march of time and/or technology is   threatening to obsolete the favored tool.  It is said "You can   tell a bigot, but you c...
bit is  [from the mainstream meaning and `Binary digIT'] n.   1. [techspeak] The unit of information; the amount of information   obtained by asking a yes-or-no question for which the two outcomes   are equally probable.  2. [techspeak] A computation...
bit2 is  values, such as true and false or 0 and 1.   3. A mental flag a reminder that something should be done   eventually.  "I have a bit set for you."  (I haven't seen you for   a while, and I'm supposed to tell or ask you something.)  4. More   ...
bit3 is  of belief.  "I have   a bit set that says that you were the last guy to hack on EMACS."   (Meaning "I think you were the last guy to hack on EMACS, and what   I am about to say is predicated on this, so please stop me if this   isn't true.")...

factpacks/jargon-split.fact  view on Meta::CPAN

blitter is  /blit'r/ n. A special-purpose chip or hardware system   built to perform {blit} operations, esp. used for fast   implementation of bit-mapped graphics.  The Commodore Amiga and a   few other micros have these, but in 1991 the trend is awa...
blitter2 is  reincarnation}).  Syn. {raster   blaster}. 
blivet is  /bliv'*t/ [allegedly from a World War II military term   meaning "ten pounds of manure in a five-pound bag"] n. 1. An   intractable problem.  2. A crucial piece of hardware that can't be   fixed or replaced if it breaks.  3. A tool that ha...
blivet2 is  programmers that it has become an   unmaintainable tissue of hacks.  4. An out-of-control but   unkillable development effort.  5. An embarrassing bug that pops up   during a customer demo.   This term has other meanings in other technica...
blivet3 is  hardware engineers of various kinds it   seems to mean any random object of unknown purpose (similar to   hackish use of {frob}).  It has also been used to describe an   amusing trick-the-eye drawing resembling a three-pronged fork that  ...
blivet4 is  until one realizes that   the parts fit together in an impossible way. 
block is  [from process scheduling terminology in OS theory] 1. vi.   To delay or sit idle while waiting for something.  "We're blocking   until everyone gets here."  Compare {busy-wait}.  2. `block   on' vt. To block, waiting for (something).  "Lunc...
block transfer computations is  n. From the television series   "Dr. Who", in which it referred to computations so fiendishly   subtle and complex that they could not be performed by machines.   Used to refer to any task that should be expressible as...
blow an EPROM is  /bloh *n ee'prom/ v. (alt. `blast an EPROM',   `burn an EPROM') To program a read-only memory, e.g. for use   with an embedded system.  This term arises because the programming   process for the Programmable Read-Only Memories (PROM...
blow an EPROM2 is  Programmable Read-Only Memories   (EPROMs) involved intentionally blowing tiny electrical fuses on   the chip.  Thus, one was said to `blow' (or `blast') a PROM, and   the terminology carried over even though the write process on  ...
blow away is  vt. To remove (files and directories) from permanent   storage, generally by accident.  "He reformatted the wrong   partition and blew away last night's netnews."  Oppose {nuke}.
blow out is  vi. Of software, to fail spectacularly; almost as serious   as {crash and burn}.  See {blow past}, {blow up}.
blow past is  vt. To {blow out} despite a safeguard.  "The server blew   past the 5K reserve buffer."
blow up is  vi. 1. [scientific computation] To become unstable.  Suggests   that the computation is diverging so rapidly that it will soon   overflow or at least go {nonlinear}.  2.  Syn. {blow out}.
BLT is  /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. Synonym for   {blit}.  This is the original form of {blit} and the ancestor   of {bitblt}.  It referred to any large bit-field copy or move   operation (one resource-intensive memory-shuffling operati...
BLT2 is  and TOPS-10 was sardonically   referred to as `The Big BLT').  The jargon usage has outlasted the   {PDP-10} BLock Transfer instruction from which {BLT} derives;   nowadays, the assembler mnemonic {BLT} almost always means   `Branch if Less ...
Blue Book is  n. 1. Informal name for one of the three standard   references on the page-layout and graphics-control language   PostScript (`PostScript Language Tutorial and Cookbook', Adobe   Systems, Addison-Wesley 1985, QA76.73.P67P68, ISBN 0-201-...
Blue Book2 is  known as the {Green Book} and   {Red Book}.  2. Informal name for one of the three standard   references on Smalltalk `Smalltalk-80 The Language and its   Implementation', David Robson, Addison-Wesley 1983, QA76.8.S635G64,   ISBN 0-201...
Blue Book3 is  and red   books).  3. Any of the 1988 standards issued by the CCITT's   ninth plenary assembly.  Until now, they have changed color each review   cycle (1984 was {Red Book}, 1992 would be {Green Book}); however,   it is rumored that th...
Blue Book4 is  1992.   These include, among other things, the X.400 email spec and   the Group 1 through 4 fax standards.  See also {{book titles}}. 
Blue Glue is  [IBM] n. IBM's SNA (Systems Network Architecture), an   incredibly {losing} and {bletcherous} communications protocol   widely favored at commercial shops that don't know any better.  The   official IBM definition is "that which binds b...

factpacks/jargon-split.fact  view on Meta::CPAN

boxed comments is  n. Comments (explanatory notes attached to program   instructions) that occupy several lines by themselves; so called   because in assembler and C code they are often surrounded by a box   in a style something like this   Common va...
boxed comments2 is  column 2 or add   a matching row of asterisks closing the right side of the box.  The   sparest variant omits all but the comment delimiters themselves;   the `box' is implied.  Oppose {winged comments}. 
boxen is  /bok'sn/ [by analogy with {VAXen}] pl.n. Fanciful   plural of {box} often encountered in the phrase `UNIX boxen',   used to describe commodity {{UNIX}} hardware.  The connotation is   that any two UNIX boxen are interchangeable.
boxology is  /bok-sol'*-jee/ n. Syn. {ASCII art}.  This term   implies a more restricted domain, that of box-and-arrow drawings.   "His report has a lot of boxology in it."  Compare   {macrology}.
bozotic is  /boh-zoh'tik/ or /boh-zo'tik/ [from the name of a TV   clown even more losing than Ronald McDonald] adj. Resembling or   having the quality of a bozo; that is, clownish, ludicrously wrong,   unintentionally humorous.  Compare {wonky}, {de...
bozotic2 is  in slang, but the mainstream   adjectival form would be `bozo-like' or (in New England)   `bozoish'. 
BQS is  /B-Q-S/ adj. Syn. {Berkeley Quality Software}.
brain dump is  n. The act of telling someone everything one knows   about a particular topic or project.  Typically used when someone   is going to let a new party maintain a piece of code.  Conceptually   analogous to an operating system {core dump}...
brain dump2 is  before an exit.  "You'll have to   give me a brain dump on FOOBAR before you start your new job at   HackerCorp."  See {core dump} (sense 4).  At Sun, this is also   known as `TOI' (transfer of information). 
brain-damaged is  1. [generalization of `Honeywell Brain Damage'   (HBD), a theoretical disease invented to explain certain utter   cretinisms in Honeywell {{Multics}}] adj. Obviously wrong;   {cretinous}; {demented}.  There is an implication that th...
brain-damaged2 is  brain damage, because he   should have known better.  Calling something brain-damaged is   really bad; it also implies it is unusable, and that its failure to   work is due to poor design rather than some accident.  "Only six   mon...
brain-damaged3 is  brain-damaged!"  2. [esp. in the Mac world] May refer to free   demonstration software that has been deliberately crippled in some   way so as not to compete with the commercial product it is   intended to sell.  Syn.  {crippleware...
brain-dead is  adj. Brain-damaged in the extreme.  It tends to imply   terminal design failure rather than malfunction or simple   stupidity.  "This comm program doesn't know how to send a break   --- how brain-dead!"
braino is  /bray'no/ n. Syn. for {thinko}.
branch to Fishkill is  [IBM from the location of one of the   corporation's facilities] n. Any unexpected jump in a program that   produces catastrophic or just plain weird results.  See {jump   off into never-never land}, {hyperspace}.
brand brand brand is  n. Humorous catch-phrase from {BartleMUD}s, in   which players were described carrying a list of objects, the most   common of which would usually be a brand.  Often used as a joke in   {talk mode} as in "Fred the wizard is here...
brand brand brand2 is  kettle broadsword flamethrower".  A brand is a   torch, of course; one burns up a lot of those exploring dungeons.   Prob. influenced by the famous Monty Python "Spam" skit. 
break is  1. vt. To cause to be broken (in any sense).  "Your latest   patch to the editor broke the paragraph commands."  2. v.  (of a   program) To stop temporarily, so that it may debugged.  The place   where it stops is a `breakpoint'.  3. [techs...
break2 is  of line high) over a serial comm line.   4. [UNIX] vi. To strike whatever key currently causes the tty   driver to send SIGINT to the current process.  Normally, break   (sense 3) or delete does this.  5. `break break' may be said to   int...
break3 is  verb doubling). 
breath-of-life packet is  [XEROX PARC] n. An Ethernet packet that   contained bootstrap (see {boot}) code, periodically sent out   from a working computer to infuse the `breath of life' into any   computer on the network that had happened to crash.  ...
breath-of-life packet2 is  would wait for such a packet after a   catastrophic error. 
breedle is  n. See {feep}.
bring X to its knees is  v. To present a machine, operating system,   piece of software, or algorithm with a load so extreme or   {pathological} that it grinds to a halt.  "To bring a MicroVAX   to its knees, try twenty users running {vi} --- or four...
brittle is  adj. Said of software that is functional but easily broken   by changes in operating environment or configuration, or by any   minor tweak to the software itself.  Also, any system that   responds inappropriately and disastrously to expec...
brittle2 is  that is usually totally scrambled by a   power failure is said to be brittle.  This term is often used to   describe the results of a research effort that were never intended   to be robust, but it can be applied to commercially develope...
brittle3 is  more often than it ought   to.  Oppose {robust}. 
broadcast storm is  n. An incorrect packet broadcast on a network that   causes most hosts to respond all at once, typically with wrong   answers that start the process over again.  See {network   meltdown}.
broken is  adj. 1. Not working properly (of programs).  2. Behaving   strangely; especially (when used of people) exhibiting extreme   depression.
broken arrow is  [IBM] n. The error code displayed on line 25 of a   3270 terminal (or a PC emulating a 3270) for various kinds of   protocol violations and "unexpected" error conditions (including   connection to a {down} computer).  On a PC, simula...
broken arrow2 is  characters overstruck. In true   {luser} fashion, the original documentation of these codes   (visible on every 3270 terminal, and necessary for debugging   network problems) was confined to an IBM customer engineering   manual.   N...
broken arrow3 is  know that `broken   arrow' is also military jargon for an accident involving nuclear   weapons....  
broket is  /broh'k*t/ or /broh'ket`/ [by analogy with `bracket' a   `broken bracket'] n. Either of the characters `<' and `>',   when used as paired enclosing delimiters.  This word   originated as a contraction of the phrase `broken bracket', that  ...
broket2 is  (At MIT, and apparently   in the {Real World} as well, these are usually called {angle   brackets}.) 
Brooks's Law is  prov. "Adding manpower to a late software project   makes it later" --- a result of the fact that the advantage from   splitting work among N programmers is O(N) (that is,   proportional to N), but the complexity and communications  ...
Brooks's Law2 is  merging their work   is O(N^2) (that is, proportional to the square of N).   The quote is from Fred Brooks, a manager of IBM's OS/360 project   and author of `The Mythical Man-Month' (Addison-Wesley, 1975,   ISBN 0-201-00650-2), an ...
Brooks's Law3 is   The myth in question has been most tersely expressed   as "Programmer time is fungible" and Brooks established   conclusively that it is not.  Hackers have never forgotten his   advice; too often, {management} does.  See also   {cr...
BRS is  /B-R-S/ n. Syn. {Big Red Switch}.  This abbreviation is   fairly common on-line.
brute force is  adj. Describes a primitive programming style, one in   which the programmer relies on the computer's processing power   instead of using his or her own intelligence to simplify the problem,   often ignoring problems of scale and apply...
brute force2 is  directly to large ones.   The {canonical} example of a brute-force algorithm is associated   with the `traveling salesman problem' (TSP), a classical NP-hard   problem Suppose a person is in, say, Boston, and wishes to drive   to N o...
brute force3 is  visit   them in order to minimize the distance travelled?  The brute-force   method is to simply generate all possible routes and compare the   distances; while guaranteed to work and simple to implement, this   algorithm is clearly ...
brute force4 is  obviously absurd routes (like going from Boston to Houston via San   Francisco and New York, in that order).  For very small N it   works well, but it rapidly becomes absurdly inefficient when   N increases (for N = 15, there are alr...

factpacks/jargon-split.fact  view on Meta::CPAN

bucky bits2 is  character set; later, LISP Machines   added such keys as SUPER, HYPER, and GREEK (see {space-cadet   keyboard}).  2. By extension, bits associated with `extra' shift   keys on any keyboard, e.g., the ALT on an IBM PC or command and   ...
bucky bits3 is  that `bucky bits' were named for Buckminster Fuller   during a period when he was consulting at Stanford.  Actually,   `Bucky' was Niklaus Wirth's nickname when *he* was at   Stanford; he first suggested the idea of an EDIT key to set...
bucky bits4 is  character.  This was used in a   number of editors written at Stanford or in its environs (TV-EDIT   and NLS being the best-known).  The term spread to MIT and CMU   early and is now in general use.  See {double bucky},   {quadruple b...
buffer overflow is  n. What happens when you try to stuff more data   into a buffer (holding area) than it can handle.  This may be due   to a mismatch in the processing rates of the producing and   consuming processes (see {overrun}), or because the...
buffer overflow2 is  data that must accumulate before a   piece of it can be processed. For example, in a text-processing   tool that {crunch}es a line at a time, a short line buffer can   result in {lossage} as input from a long line overflows the  ...
buffer overflow3 is  defensive programming   would check for overflow on each character and stop accepting data   when the buffer is full up.  The term is used of and by humans in a   metaphorical sense. "What time did I agree to meet you?  My buffer...
buffer overflow4 is  phone my buffer is   going to overflow."  See also {spam}, {overrun screw}. 
bug is  n. An unwanted and unintended property of a program or hardware,   esp. one that causes it to malfunction.  Antonym of {feature}.   Examples "There's a bug in the editor it writes things out   backwards."  "The system crashed because of a har...
bug2 is  few bugs"  (i.e., Fred is a good   guy, but he has a few personality problems).   Historical note Some have said this term came from telephone   company usage, in which "bugs in a telephone cable" were blamed   for noisy lines, but this appe...
bug3 is  Admiral Grace Hopper (an early computing pioneer better   known for inventing {COBOL}) liked to tell a story in which a   technician solved a persistent {glitch} in the Harvard Mark II   machine by pulling an actual insect out from between t...
bug4 is  subsequently promulgated   {bug} in its hackish sense as a joke about the incident (though,   as she was careful to admit, she was not there when it happened).   For many years the logbook associated with the incident and the   actual bug in...
bug5 is  Naval   Surface Warfare Center.  The entire story, with a picture of the   logbook and the moth taped into it, is recorded in the `Annals of   the History of Computing', Vol. 3, No. 3 (July 1981), pp. 285--286.   The text of the log entry (f...
bug6 is  Panel F (moth) in relay.  First actual case of bug being   found".  This wording seems to establish that the term was already in use   at the time in its current specific sense.  Indeed, the use of   `bug' to mean an industrial defect was al...
bug7 is  and `bug' in the sense of an disruptive event   goes back to Shakespeare!  In the first edition of Samuel Johnson's   dictionary one meaning of `bug' is "A frightful object; a walking   spectre"; this is traced to `bugbear', a Welsh term for...
bug8 is  complete the circle) has recently   been reintroduced into the popular lexicon through fantasy   role-playing games.   In any case, in jargon the word almost never refers to insects.   Here is a plausible conversation that never actually hap...
bug9 is  "What do you mean?  I don't see any ants in it."   "That's the bug."   [There has been a widespread myth that the original bug was moved   to the Smithsonian, and an earlier version of this entry so   asserted.  A correspondent who thought t...
bug10 is  there.  While investigating this, your editor   discovered that the NSWC still had the bug, but had unsuccessfully   tried to get the Smithsonian to accept it --- and that the present   curator of the History of American Technology Museum d...
bug11 is  a worthwhile exhibit.   Thus, the process of investigating the original-computer-bug bug   may have fixed it in an entirely unexpected way, by making the myth   true!  --- ESR] 
bug-compatible is  adj. Said of a design or revision that has been   badly compromised by a requirement to be compatible with   {fossil}s or {misfeature}s in other programs or (esp.)   previous releases of itself. "MS-DOS 2.0 used \ as a path   separ...
bug-compatible2 is  choice of / as an   option character in 1.0." 
bug-for-bug compatible is  n. Same as {bug-compatible}, with the   additional implication that much tedious effort went into ensuring   that each (known) bug was replicated.

factpacks/jargon-split.fact  view on Meta::CPAN

buzz is  vi. 1. Of a program, to run with no indication of progress   and perhaps without guarantee of ever finishing; esp. said of   programs thought to be executing tight loops of code.  A program   that is buzzing appears to be {catatonic}, but yo...
buzz2 is  buzzing loop may eventually end of its own   accord.  "The program buzzes for about 10 seconds trying to sort   all the names into order."  See {spin}; see also {grovel}.   2. [ETA Systems] To test a wire or printed circuit trace for   cont...
buzz3 is   Some wire   faults will pass DC tests but fail a buzz test.  3. To process an   array or list in sequence, doing the same thing to each element.   "This loop buzzes through the tz array looking for a terminator   type." 
BWQ is  /B-W-Q/ [IBM acronym, `Buzz Word Quotient'] The   percentage of buzzwords in a speech or documents.  Usually roughly   proportional to {bogosity}.  See {TLA}.
by hand is  adv. Said of an operation (especially a repetitive,   trivial, and/or tedious one) that ought to be performed   automatically by the computer, but which a hacker instead has to   step tediously through.  "My mailer doesn't have a command ...
by hand2 is  replying to, so I have to do it   by hand."  This does not necessarily mean the speaker has to   retype a copy of the message; it might refer to, say, dropping into   a {subshell} from the mailer, making a copy of one's mailbox file,   r...
by hand3 is  and bottom of the   message in question, deleting the rest of the file, inserting `>'   characters on each line, writing the file, leaving the editor,   returning to the mailer, reading the file in, and later remembering   to delete the ...
byte is  /bit/ [techspeak] n. A unit of memory or data equal to   the amount used to represent one character; on modern architectures   this is usually 8 bits, but may be 9 on 36-bit machines.  Some   older architectures used `byte' for quantities of...
byte2 is  `bytes' that were actually bitfields of   1 to 36 bits!  These usages are now obsolete, and even 9-bit bytes   have become rare in the general trend toward power-of-2 word sizes.   Historical note The term originated in 1956 during the earl...
byte3 is  originally it was   described as 1 to 6 bits (typical I/O equipment of the period   used 6-bit chunks of information).  The move to an 8-bit byte   happened in late 1956, and this size was later adopted and   promulgated as a standard by th...
byte4 is  mutating the word `bite' so it would not be accidentally   misspelled as {bit}.  See also {nybble}. 
bytesexual is  /bit`sek'shu-*l/ adj. Said of hardware, denotes   willingness to compute or pass data in either {big-endian} or   {little-endian} format (depending, presumably, on a {mode bit}   somewhere).  See also {NUXI problem}.*C n. 1. The third ...
bytesexual2 is  1000011.  3. The name of a programming language designed by   Dennis Ritchie during the early 1970s and immediately used to   reimplement {{UNIX}}.  So called because many features derived   from an earlier compiler named `B' in comme...
bytesexual3 is  Stroustrup settled the   question by designing C++, there was a humorous debate over whether   C's successor should be named `D' or `P'.  C became immensely   popular outside Bell Labs after about 1980 and is now the dominant   langua...
bytesexual4 is  programming.   See also {languages of choice}, {indent style}.   C is often described, with a mixture of fondness and disdain   varying according to the speaker, as "a language that combines   all the elegance and power of assembly la...
bytesexual5 is  maintainability of assembly language". 
calculator is  [Cambridge] n. Syn. for {bitty box}.
can is  vt. To abort a job on a time-sharing system.  Used esp. when the   person doing the deed is an operator, as in "canned from the   {{console}}".  Frequently used in an imperative sense, as in "Can   that print job, the LPT just popped a sprock...
can2 is  that the ASCII character with mnemonic CAN   (0011000) was used as a kill-job character on some early OSes. 
canonical is  [historically, `according to religious law'] adj. The   usual or standard state or manner of something.  This word has a   somewhat more technical meaning in mathematics.  Two formulas such   as 9 + x and x + 9 are said to be equivalent...
canonical2 is  second one is in `canonical   form' because it is written in the usual way, with the highest   power of x first.  Usually there are fixed rules you can use   to decide whether something is in canonical form.  The jargon   meaning, a re...
canonical3 is    present loading in computer-science culture largely through its   prominence in Alonzo Church's work in computation theory and   mathematical logic (see {Knights of the Lambda Calculus}).   Compare {vanilla}.   This word has an inter...
canonical4 is  not use the adjective `canonical' in any of the senses defined   above with any regularity; they do however use the nouns `canon' and   `canonicity' (not *canonicalness or *canonicality). The `canon' of   a given author is the complete...
canonical5 is  usage is familiar to Sherlock Holmes fans as well as   to literary scholars).  `*The* canon' is the body of works in   a given field (e.g., works of literature, or of art, or of music)   deemed worthwhile for students to study and for ...
canonical6 is  non-techspeak academic usages derive ultimately from the   historical meaning, specifically the classification of the books of   the Bible into two groups by Christian theologians.  The   `canonical' books were the ones widely accepted...
canonical7 is  authority.  The   `deuterocanonical' books (literally `secondarily canonical';   also known as the `Apochrypha') were held to be of lesser   authority --- indeed they have been held in such low esteem that to   this day they are omitte...
canonical8 is  this term with a playfulness that makes an ironic   contrast with its historical meaning.  A true story One Bob   Sjoberg, new at the MIT AI Lab, expressed some annoyance at the use   of jargon.  Over his loud objections, GLS and RMS m...
canonical9 is  in his presence, and eventually it   began to sink in.  Finally, in one conversation, he used the word   `canonical' in jargon-like fashion without thinking.  Steele   "Aha!  We've finally got you talking jargon too!"  Stallman   "What...
canonical10 is  `canonical' in the   canonical way."   Of course, canonicality depends on context, but it is implicitly   defined as the way *hackers* normally expect things to be.   Thus, a hacker may claim with a straight face that `according to   ...
card is  n. 1. An electronic printed-circuit board (see also {tall   card}, {short card}.  2. obs. Syn. {{punched card}}.
card walloper is  n. An EDP programmer who grinds out batch programs   that do stupid things like print people's paychecks.  Compare   {code grinder}.  See also {{punched card}}, {eighty-column   mind}.

factpacks/jargon-split.fact  view on Meta::CPAN

chain is  [orig. from BASIC's `CHAIN' statement] vi. To hand off   execution to a child or successor without going through the   {OS} command interpreter that invoked it.  The state of the   parent program is lost and there is no returning to it.  Th...
chain2 is  memory-limited micros and is   still widely supported for backward compatibility, the jargon usage   is semi-obsolescent; in particular, most UNIX programmers will   think of this as an {exec}.  Oppose the more modern {subshell}. 
char is  /keir/ or /char/; rarely, /kar/ n. Shorthand for   `character'.  Esp. used by C programmers, as `char' is   C's typename for character data.
charityware is  /char'it-ee-weir`/ n. Syn. {careware}.
chase pointers is  1. vi. To go through multiple levels of   indirection, as in traversing a linked list or graph structure.   Used esp. by programmers in C, where explicit pointers are a very   common data type.  This is techspeak, but it remains ja...
chase pointers2 is  chasing pointers.  Bob said you   could tell me who to talk to about...." See {dangling   pointer} and {snap}.  2. [Cambridge] `pointer chase' or   `pointer hunt' The process of going through a dump   (interactively or on a large ...
chase pointers3 is  following dynamic data-structures.  Used only in a   debugging context. 
chemist is  [Cambridge] n. Someone who wastes computer time on   {number-crunching} when you'd far rather the machine were doing   something more productive, such as working out anagrams of your   name or printing Snoopy calendars or running {life} p...
chemist2 is  actually studies chemistry. 
Chernobyl chicken is  n. See {laser chicken}.
Chernobyl packet is  /cher-noh'b*l pak'*t/ n. A network packet that   induces {network meltdown} (the result of a {broadcast storm}),   in memory of the 1987 nuclear accident at Chernobyl in the Ukraine.   The typical case of this is an IP Ethernet d...
Chernobyl packet2 is  both source and destination Ether and IP   address set as the respective broadcast addresses for the   subnetworks being gated between.  Compare {Christmas tree   packet}. 
chicken head is  [Commodore] n. The Commodore Business Machines logo,   which strongly resembles a poultry part.  Rendered in ASCII as   `C='.  With the arguable exception of the Amiga (see {amoeba}),   Commodore's machines are notoriously crocky lit...
chicken head2 is  Thus, this usage may owe something to   Philip K.  Dick's novel `Do Androids Dream of Electric Sheep?'   (the basis for the movie `Blade Runner'), in which a   `chickenhead' is a mutant with below-average intelligence. 
chiclet keyboard is  n. A keyboard with small rectangular or   lozenge-shaped rubber or plastic keys that look like pieces of   chewing gum.  (Chiclets is the brand name of a variety of chewing   gum that does in fact resemble the keys of chiclet key...
chiclet keyboard2 is  IBM PCjr keyboard.  Vendors   unanimously liked these because they were cheap, and a lot of early   portable and laptop products got launched using them.  Customers   rejected the idea with almost equal unanimity, and chiclets a...
chine nual is  /sheen'yu-*l/ [MIT] n.,obs. The Lisp Machine Manual, so   called because the title was wrapped around the cover so only those   letters showed on the front.
Chinese Army technique is  n. Syn. {Mongolian Hordes technique}.
choke is  v. To reject input, often ungracefully.  "Nuls make System   V's `lpr(1)' choke."  "I tried building an {EMACS} binary to   use {X}, but `cpp(1)' choked on all those `#define's."   See {barf}, {gag}, {vi}.
chomp is  vi. To {lose}; specifically, to chew on something of   which more was bitten off than one can.  Probably related to   gnashing of teeth.  See {bagbiter}.  A hand gesture commonly   accompanies this.  To perform it, hold the four fingers   t...
chomp2 is  tips.  Now open and   close your hand rapidly to suggest a biting action (much like what   Pac-Man does in the classic video game, though this pantomime seems   to predate that).  The gesture alone means `chomp chomp' (see   Verb Doubling ...

factpacks/jargon-split.fact  view on Meta::CPAN

cosmic rays is  n. Notionally, the cause of {bit rot}.  However, this is   a semi-independent usage that may be invoked as a humorous way to   {handwave} away any minor {randomness} that doesn't seem worth the   bother of investigating.  "Hey, Eric -...
cosmic rays2 is  {tube}, where did that come from?"  "Cosmic rays, I   guess."  Compare {sunspots}, {phase of the moon}.  The British seem   to prefer the usage `cosmic showers'; `alpha particles' is also   heard, because stray alpha particles passin...
cosmic rays3 is  errors (this becomes increasingly more likely   as memory sizes and densities increase).   Factual note Alpha particles cause bit rot, cosmic rays do not   (except occasionally in spaceborne computers).  Intel could not   explain ran...
cosmic rays4 is  hypothesis   was cosmic rays.  So they created the World's Largest Lead Safe,   using 25 tons of the stuff, and used two identical boards for   testing.  One was placed in the safe, one outside.  The hypothesis   was that if cosmic r...
cosmic rays5 is    a statistically significant difference between the error rates on   the two boards.  They did not observe such a difference.  Further   investigation demonstrated conclusively that the bit drops were due   to alpha particle emissio...
cosmic rays6 is  uranium) in the encapsulation material.  Since it is   impossible to eliminate these radioactives (they are uniformly   distributed through the earth's crust, with the statistically   insignificant exception of uranium lodes) it beca...
cosmic rays7 is  to withstand these hits. 
cough and die is  v. Syn. {barf}.  Connotes that the program is   throwing its hands up by design rather than because of a bug or   oversight.  "The parser saw a control-A in its input where it was   looking for a printable, so it coughed and died."
cowboy is  [Sun, from William Gibson's {cyberpunk} SF] n. Synonym   for {hacker}.  It is reported that at Sun this word is often   said with reverence.
CP/M is  /C-P-M/ n. [Control Program for Microcomputers] An   early microcomputer {OS} written by hacker Gary Kildall for   8080- and Z80-based machines, very popular in the late 1970s but   virtually wiped out by MS-DOS after the release of the IBM ...
CP/M2 is  company blew its chance to   write the OS for the IBM PC because Kildall decided to spend a day   IBM's reps wanted to meet with him enjoying the perfect flying   weather in his private plane.  Many of CP/M's features and conventions   stro...
CP/M3 is  systems such as   {{TOPS-10}}, OS/8, RSTS, and RSX-11.  See {{MS-DOS}},   {operating system}. 
CPU Wars is  /C-P-U worz/ n. A 1979 large-format comic by Chas   Andres chronicling the attempts of the brainwashed androids of IPM   (Impossible to Program Machines) to conquer and destroy the   peaceful denizens of HEC (Human Engineered Computers)....
CPU Wars2 is  many references to {ADVENT} and   the immortal line "Eat flaming death, minicomputer mongrels!"   (uttered, of course, by an IPM stormtrooper).  It is alleged that   the author subsequently received a letter of appreciation on IBM   com...
CPU Wars3 is  J. Watson Research   Laboratories (then, as now, one of the few islands of true   hackerdom in the IBM archipelago).  The lower loop of the B in the   IBM logo, it is said, had been carefully whited out.  See {eat   flaming death}. 
cracker is  n. One who breaks security on a system.  Coined ca. 1985   by hackers in defense against journalistic misuse of {hacker}   (q.v., sense 8).  An earlier attempt to establish `worm' in this   sense around 1981--82 on USENET was largely a fa...
crank is  [from automotive slang] vt. Verb used to describe the   performance of a machine, especially sustained performance.  "This   box cranks (or, cranks at) about 6 {megaflops}, with a burst mode   of twice that on vectorized operations."
crash is  1. n. A sudden, usually drastic failure.  Most often said   of the {system} (q.v., sense 1), sometimes of magnetic disk   drives.  "Three {luser}s lost their files in last night's disk   crash."  A disk crash that involves the read/write he...
crash2 is  and scraping off the oxide may also   be referred to as a `head crash', whereas the term `system   crash' usually, though not always, implies that the operating   system or other software was at fault.  2. v. To fail suddenly.   "Has the s...
crash3 is  OS!" See   {down}.  Also used transitively to indicate the cause of the   crash (usually a person or a program, or both).  "Those idiots   playing {SPACEWAR} crashed the system." 3. vi. Sometimes said   of people hitting the sack after a l...
crash and burn is  vi.,n. A spectacular crash, in the mode of the   conclusion of the car-chase scene in the movie "Bullitt" and   many subsequent imitators.  Sun-3 monitors losing the flyback   transformer and lightning strikes on VAX-11/780 backpla...

factpacks/jargon-split.fact  view on Meta::CPAN

crunch4 is  3. n. The character `#'.  Used at XEROX and CMU, among other   places.  See {{ASCII}}.  4. vt. To squeeze program source into a   minimum-size representation that will still compile or execute.   The term came into being specifically for ...
crunch5 is  crunched BASIC source in order to make it run more   quickly (it was a wholly interpretive BASIC, so the number of   characters mattered).  {Obfuscated C Contest} entries are often   crunched; see the first example under that entry. 
cruncha cruncha cruncha is  /kruhn'ch* kruhn'ch* kruhn'ch*/ interj.   An encouragement sometimes muttered to a machine bogged down in a   serious {grovel}.  Also describes a notional sound made by   groveling hardware.  See {wugga wugga}, {grind} (se...
cryppie is  /krip'ee/ n. A cryptographer.  One who hacks or implements   cryptographic software or hardware.
CTSS is  /C-T-S-S/ n. Compatible Time-Sharing System.  An early   (1963) experiment in the design of interactive time-sharing   operating systems, ancestral to {{Multics}}, {{UNIX}}, and   {{ITS}}.  The name {{ITS}} (Incompatible Time-sharing System)...
CTSS2 is  and to express some basic   differences in philosophy about the way I/O services should be   presented to user programs. 
CTY is  /sit'ee/ or /C-T-Y/ n. [MIT] The terminal physically   associated with a computer's system {{console}}.  The term is a   contraction of `Console {tty}', that is, `Console TeleTYpe'.   This {{ITS}}- and {{TOPS-10}}-associated term has become l...
CTY2 is  refer to the CTY as `the   console'. 
cube is  n. 1. [short for `cubicle'] A module in the open-plan   offices used at many programming shops.  "I've got the manuals in   my cube."  2. A NeXT machine (which resembles a matte-black cube).
cubing is  [parallel with `tubing'] vi. 1. Hacking on an IPSC (Intel   Personal SuperComputer) hypercube.  "Louella's gone cubing   *again*!!"  2. Hacking Rubik's Cube or related puzzles,   either physically or mathematically.  3. An indescribable fo...
cursor dipped in X is  n. There are a couple of metaphors in English   of the form `pen dipped in X' (perhaps the most common values of X   are `acid', `bile', and `vitriol').  These map over neatly to this   hackish usage (the cursor being what move...
cursor dipped in X2 is  composing on-line).  "Talk about a {nastygram}!  He   must've had his cursor dipped in acid when he wrote that one!" 
cuspy is  /kuhs'pee/ [WPI from the DEC acronym CUSP, for `Commonly   Used System Program', i.e., a utility program used by many people]   adj. 1. (of a program) Well-written.  2. Functionally excellent.  A   program that performs well and interfaces ...
cuspy2 is  [NYU] Said of an attractive woman, especially one   regarded as available.  Implies a certain curvaceousness. 
cut a tape is  [poss. fr. mainstream `cut a check' or from the   recording industry's `cut a record'] vi. To write a software or   document distribution on magnetic tape for shipment.  Has nothing   to do with physically cutting the medium!  Though t...
cut a tape2 is  speaks of analogously `cutting a disk'   or anything else in this sense. 
cybercrud is  /si'ber-kruhd/ [coined by Ted Nelson] n. Obfuscatory   tech-talk.  Verbiage with a high {MEGO} factor.  The computer   equivalent of bureaucratese.
cyberpunk is  /si'ber-puhnk/ [orig. by SF writer Bruce Bethke and/or   editor Gardner Dozois] n.,adj. A subgenre of SF launched in 1982   by William Gibson's epoch-making novel `Neuromancer' (though   its roots go back through Vernor Vinge's `True Na...
cyberpunk2 is  Brunner's 1975 novel `The Shockwave   Rider').  Gibson's near-total ignorance of computers and the   present-day hacker culture enabled him to speculate about the role   of computers and hackers in the future in ways hackers have since...
cyberpunk3 is  tremendously stimulating.   Gibson's work was widely imitated, in particular by the short-lived   but innovative "Max Headroom" TV series.  See {cyberspace},   {ice}, {go flatline}. 
cyberspace is  /si'ber-spays/ n. 1. Notional `information-space'   loaded with visual cues and navigable with brain-computer   interfaces called `cyberspace decks'; a characteristic prop of   {cyberpunk} SF.  At the time of this writing (mid-1991),  ...
cyberspace2 is  reality} interfaces   modeled explicitly on Gibsonian cyberspace are already under way,   using more conventional devices such as glove sensors and binocular   TV headsets.  Few hackers are prepared to deny outright the   possibility ...

factpacks/jargon-split.fact  view on Meta::CPAN

cycle crunch3 is  opposed to traditional   timesharing systems. 
cycle drought is  n. A scarcity of cycles.  It may be due to a {cycle   crunch}, but it could also occur because part of the computer is   temporarily not working, leaving fewer cycles to go around.   "The {high moby} is {down}, so we're running with...
cycle drought2 is  There will be a cycle drought   until it's fixed." 
cycle of reincarnation is  [coined by Ivan Sutherland ca. 1970] n.   Term used to refer to a well-known effect whereby function in a   computing system family is migrated out to special-purpose   peripheral hardware for speed, then the peripheral evo...
cycle of reincarnation2 is  its job, then somebody notices that   it is inefficient to support two asymmetrical processors in the   architecture and folds the function back into the main CPU, at   which point the cycle begins again.  Several iteratio...
cycle of reincarnation3 is  graphics-processor design, and at least   one or two in communications and floating-point processors.  Also   known as `the Wheel of Life', `the Wheel of Samsara', and other   variations of the basic Hindu/Buddhist theolog...
cycle server is  n. A powerful machine that exists primarily for   running large {batch} jobs.  Implies that interactive tasks such as   editing are done on other machines on the network, such as   workstations.*D.C. Power Lab n. The former site of {...
cycle server2 is  funny because the obvious connection to electrical   engineering was nonexistent --- the lab was named for a Donald C.   Power.  Compare {Marginal Hacks}. 
daemon is  /day'mn/ or /dee'mn/ [from the mythological meaning,   later rationalized as the acronym `Disk And Execution MONitor'] n.   A program that is not invoked explicitly, but lies dormant waiting   for some condition(s) to occur.  The idea is t...
daemon2 is  not be aware that a daemon is lurking (though   often a program will commit an action only because it knows that it   will implicitly invoke a daemon).  For example, under {{ITS}}   writing a file on the {LPT} spooler's directory would in...
daemon3 is  print the file.  The advantage is   that programs wanting (in this example) files printed need not   compete for access to the {LPT}.  They simply enter their   implicit requests and let the daemon decide what to do with them.   Daemons a...
daemon4 is  and may   either live forever or be regenerated at intervals.  Daemon and   {demon} are often used interchangeably, but seem to have   distinct connotations.  The term `daemon' was introduced to   computing by {CTSS} people (who pronounce...
daemon5 is  ITS called a {dragon}.  Although the   meaning and the pronunciation have drifted, we think this glossary   reflects current (1991) usage. 
dangling pointer is  n. A reference that doesn't actually lead   anywhere (in C and some other languages, a pointer that doesn't   actually point at anything valid).  Usually this is because it   formerly pointed to something that has moved or disapp...
dangling pointer2 is  of its techspeak meaning; for   example, a local phone number for a person who has since moved to the   other coast is a dangling pointer. 
Datamation is  /day`t*-may'sh*n/ n. A magazine that many hackers   assume all {suit}s read.  Used to question an unbelieved quote,   as in "Did you read that in `Datamation?'" It used to   publish something hackishly funny every once in a while, like...
Datamation2 is  but it has since become much   more exclusively {suit}-oriented and boring. 
day mode is  n. See {phase} (sense 1).  Used of people only.
dd is  /dee-dee/ [UNIX from IBM {JCL}] vt. Equivalent to {cat}   or {BLT}.  This was originally the name of a UNIX copy command   with special options suitable for block-oriented devices.  Often   used in heavy-handed system maintenance, as in "Let's...
dd2 is  the boot PROM to load it back on to   a new disk".  The UNIX `dd(1)' was designed with a weird,   distinctly non-UNIXy keyword option syntax reminiscent of IBM   System/360 JCL (which had a similar DD command); though the command   filled a n...
dd3 is  The   jargon usage is now very rare outside UNIX sites and now nearly   obsolete even there, as `dd(1)' has been {deprecated} for a   long time (though it has no exact replacement).  Replaced by   {BLT} or simple English `copy'. 
DDT is  /D-D-T/ n. 1. Generic term for a program that assists in   debugging other programs by showing individual machine instructions   in a readable symbolic form and letting the user change them.  In   this sense the term DDT is now archaic, havin...
DDT2 is  names of individual programs like   `dbx', `adb', `gdb', or `sdb'.  2. [ITS] Under   MIT's fabled {{ITS}} operating system, DDT (running under the alias   HACTRN) was also used as the {shell} or top level command   language used to execute o...
DDT3 is  specific DDTs (sense 1) supported on early DEC hardware.  The DEC   PDP-10 Reference Handbook (1969) contained a footnote on the first   page of the documentation for DDT which illuminates the origin of   the term     Historical footnote DDT...
DDT4 is  computer in 1961.  At that time DDT stood for "DEC Debugging Tape".     Since then, the idea of an on-line debugging program has propagated     throughout the computer industry.  DDT programs are now available     for all DEC computers.  Sin...
DDT5 is  used, the more descriptive name "Dynamic Debugging     Technique" has been adopted, retaining the DDT acronym.  Confusion     between DDT-10 and another well known pesticide,     dichloro-diphenyl-trichloroethane (C14-H9-Cl5) should be minim...
DDT6 is  apparently mutually exclusive,     class of bugs.   Sadly, this quotation was removed from later editions of the   handbook after the {suit}s took over and DEC became much more   `businesslike'. 
de-rezz is  /dee-rez'/ [from `de-resolve' via the movie "Tron"]   (also `derez') 1. vi. To disappear or dissolve; the image that goes   with it is of an object breaking up into raster lines and static   and then dissolving.  Occasionally used of a pe...
de-rezz2 is  mentally rather than physically.   Usage extremely silly, also rare.  This verb was actually invented   as *fictional* hacker jargon, and adopted in a spirit of irony   by real hackers years after the fact.  2. vt. On a Macintosh, many  ...
de-rezz3 is  are managed in small   segments of the program file known as `resources'. The standard   resource compiler is Rez.  The standard resource decompiler is   DeRez.  Thus, decompiling a resource is `derezzing'.  Usage very   common. 
dead code is  n. Routines that can never be accessed because all calls   to them have been removed, or code that cannot be reached because   it is guarded by a control structure that provably must always   transfer control somewhere else.  The presen...
dead code2 is  errors due to alterations in the program or   significant changes in the assumptions and environment of the   program (see also {software rot}); a good compiler should report   dead code so a maintainer can think about what it means.  ...
DEADBEEF is  /ded-beef/ n. The hexadecimal word-fill pattern for   freshly allocated memory (decimal -21524111) under a number of   IBM environments, including the RS/6000.  As in "Your program is   DEADBEEF" (meaning gone, aborted, flushed from memo...
DEADBEEF2 is  boundary, of course, you have   BEEFDEAD. 
deadlock is  n. 1. [techspeak] A situation wherein two or more   processes are unable to proceed because each is waiting for one of   the others to do something.  A common example is a program   communicating to a server, which may find itself waitin...
deadlock2 is  anything more to it, while the   server is similarly waiting for more input from the controlling   program before outputting anything.  (It is reported that this   particular flavor of deadlock is sometimes called a `starvation   deadlo...

factpacks/jargon-split.fact  view on Meta::CPAN

dump is  n. 1. An undigested and voluminous mass of information about a   problem or the state of a system, especially one routed to the   slowest available output device (compare {core dump}), and most   especially one consisting of hex or octal {ru...
dump2 is  memory, mass storage, or some file.  In {elder   days}, debugging was generally done by `groveling over' a dump   (see {grovel}); increasing use of high-level languages and   interactive debuggers has made this uncommon, and the term `dump'...
dump3 is  backup.  This usage is   typical only at large timesharing installations. 
dup killer is  /d[y]oop kill'r/ [FidoNet] n. Software that is   supposed to detect and delete duplicates of a message that may   have reached the FidoNet system via different routes.
dup loop is  /d[y]oop loop/ (also `dupe loop') [FidoNet] n. An   incorrectly configured system or network gateway may propagate   duplicate messages on one or more {echo}es, with different   identification information that renders {dup killer}s   ine...
dup loop2 is  eventually reaches a   system through which it has already passed (with the original   identification information), all systems passed on the way back to   that system are said to be involved in a {dup loop}. 
dusty deck is  n. Old software (especially applications) which one is   obliged to remain compatible with (or to maintain).  The term   implies that the software in question is a holdover from card-punch   days.  Used esp. when referring to old scien...
dusty deck2 is  of which was written in FORTRAN   and very poorly documented but is believed to be too expensive to   replace.  See {fossil}. 
DWIM is  /dwim/ [acronym, `Do What I Mean'] 1. adj. Able to guess, sometimes   even correctly, the result intended when bogus input was provided.   2. n.,obs. The BBNLISP/INTERLISP function that attempted to   accomplish this feat by correcting many ...
DWIM2 is  Occasionally, an interjection hurled at a   balky computer, esp. when one senses one might be tripping over   legalisms (see {legalese}).   Warren Teitelman originally wrote DWIM to fix his typos and   spelling errors, so it was somewhat id...
DWIM3 is  make hash of anyone else's typos if they were   stylistically different.  This led a number of victims of DWIM to   claim the acronym stood for `Damn Warren's Infernal Machine!'.   In one notorious incident, Warren added a DWIM feature to t...
DWIM4 is  One day another hacker   there typed `delete *$' to free up some disk space.  (The editor   there named backup files by appending `$' to the original file   name, so he was trying to delete any backup files left over from   old editing sess...
DWIM5 is  editor   backup files, so DWIM helpfully reported `*$ not found, assuming   you meant 'delete *'.'  It then started to delete all the files on   the disk!  The hacker managed to stop it with a {Vulcan nerve   pinch} after only a half dozen ...
DWIM6 is  said he had been sorely tempted to go to Warren's   office, tie Warren down in his chair in front of his workstation,   and then type `delete *$' twice.   DWIM is often suggested in jest as a desired feature for a complex   program; it is a...
DWIM7 is  instruction the ideal computer would have.  Back when proofs of   program correctness were in vogue, there were also jokes about   `DWIMC' (Do What I Mean, Correctly).  A related term, more often   seen as a verb, is DTRT (Do The Right Thin...
dynner is  /din'r/ 32 bits, by analogy with {nybble} and {{byte}}.  Usage rare and extremely silly.  See also {playte}, {tayste}, {crumb}.*earthquake [IBM] n. The ultimate real-world shock test for   computer hardware.  Hackish sources at IBM deny th...
dynner2 is  initiated by the company to test   quality-assurance procedures at its California plants. 
Easter egg is  n. 1. A message hidden in the object code of a program   as a joke, intended to be found by persons disassembling or   browsing the code.  2. A message, graphic, or sound effect emitted   by a program (or, on a PC, the BIOS ROM) in res...
Easter egg2 is  or keystrokes, intended as a joke or   to display program credits.  One well-known early Easter egg found   in a couple of OSes caused them to respond to the command   `make love' with `not war?'.  Many personal computers   have much ...
Easter egg3 is  lists of the   developers' names, political exhortations, snatches of music, and   (in one case) graphics images of the entire development team. 
Easter egging is  [IBM] n. The act of replacing unrelated parts more or   less at random in hopes that a malfunction will go away.  Hackers   consider this the normal operating mode of {field circus} techs and   do not love them for it.  Compare {sho...

factpacks/jargon-split.fact  view on Meta::CPAN

the era is  Syn. {epoch}.  Webster's Unabridged makes these words   almost synonymous, but `era' usually connotes a span of time rather   than a point in time.  The {epoch} usage is recommended.
Eric Conspiracy is  n. A shadowy group of mustachioed hackers named   Eric first pinpointed as a sinister conspiracy by an infamous   talk.bizarre posting ca. 1986; this was doubtless influenced by the   numerous `Eric' jokes in the Monty Python oeuv...
Eric Conspiracy2 is  more mustachioed Erics in hackerdom than   the frequency of these three traits can account for unless they are   correlated in some arcane way.  Well-known examples include Eric   Allman (he of the `Allman style' described under ...
Eric Conspiracy3 is  NNTP); your editor has heard from about   fourteen others by email, and the organization line `Eric   Conspiracy Secret Laboratories' now emanates regularly from more   than one site. 
Eris is  /e'ris/ n. The Greek goddess of Chaos, Discord, Confusion,   and Things You Know Not Of; her name was latinized to Discordia and   she was worshiped by that name in Rome.  Not a very friendly deity   in the Classical original, she was reinve...
Eris2 is  creative anarchy starting in 1959 by the   adherents of {Discordianism} and has since been a semi-serious   subject of veneration in several `fringe' cultures, including   hackerdom.  See {Discordianism}, {Church of the SubGenius}. 
erotics is  /ee-ro'tiks/ n. [Helsinki University of Technology,   Finland] n. English-language university slang for electronics.   Often used by hackers in Helsinki, maybe because good electronics   excites them and makes them warm.
essentials is  n. Things necessary to maintain a productive and secure   hacking environment.  "A jug of wine, a loaf of bread, a   20-megahertz 80386 box with 8 meg of core and a 300-megabyte disk   supporting full UNIX with source and X windows and...
essentials2 is  Internet site, and thou." 
evil is  adj. As used by hackers, implies that some system, program,   person, or institution is sufficiently maldesigned as to be not   worth the bother of dealing with.  Unlike the adjectives in the   {cretinous}/{losing}/{brain-damaged} series, `e...
evil2 is  design, but rather a set of goals or   design criteria fatally incompatible with the speaker's.  This is   more an esthetic and engineering judgment than a moral one in the   mainstream sense.  "We thought about adding a {Blue Glue}   inter...
evil3 is   "{TECO}   is neat, but it can be pretty evil if you're prone to typos."   Often pronounced with the first syllable lengthened, as /eeee'vil/. 
exa- is  /ek's*/ [SI] pref. See {{quantifiers}}.
examining the entrails is  n. The process of {grovel}ling through a   core dump or hex image in the attempt to discover the bug that   brought a program or system down.  Compare {runes},   {incantation}, {black art}, {desk check}.
EXCH is  /eks'ch*/ or /eksch/ vt. To exchange two things, each for the   other; to swap places.  If you point to two people sitting down and   say "Exch!", you are asking them to trade places.  EXCH,   meaning EXCHange, was originally the name of a P...
EXCH2 is  contents of a register and a memory location.   Many newer hackers tend to be thinking instead of the PostScript   exchange operator (which is usually written in lowercase). 
excl is  /eks'kl/ n. Abbreviation for `exclamation point'.  See   {bang}, {shriek}, {{ASCII}}.
EXE is  /eks'ee/ or /eek'see/ or /E-X-E/ n. An executable   binary file.  Some operating systems (notably MS-DOS, VMS, and   TWENEX) use the extension .EXE to mark such files.  This usage is   also occasionally found among UNIX programmers even thoug...
exec is  /eg-zek'/ vt.,n.  1. [UNIX from `execute'] Synonym for   {chain}, derives from the `exec(2)' call.  2. [from   `executive'] obs. The command interpreter for an {OS} (see   {shell}); term esp. used around mainframes, and prob. derived from   ...
exec2 is  systems.  3. At IBM,   the equivalent of a shell command file (among VM/CMS users).   The mainstream `exec' as an abbreviation for (human) executive is   *not* used.  To a hacker, an `exec' is a always a program,   never a person. 
left as an exercise is  [from technical books] Used to complete a   proof when one doesn't mind a {handwave}, or to avoid one   entirely.  The complete phrase is "The proof (or the rest) is left as   an exercise for the reader."  This comment *has* o...

factpacks/jargon-split.fact  view on Meta::CPAN

Gosperism is  /gos'p*r-izm/ A hack, invention, or saying by   arch-hacker R. William (Bill) Gosper.  This notion merits its own   term because there are so many of them.  Many of the entries in   {HAKMEM} are Gosperisms; see also {life}.
gotcha is  n. A {misfeature} of a system, especially a programming   language or environment, that tends to breed bugs or mistakes because   it behaves in an unexpected way.  For example, a classic gotcha in {C}   is the fact that `if (a=b) {code;}' ...
gotcha2 is  correct.  It puts the value of `b' into `a'   and then executes `code' if `a' is non-zero.  What the   programmer probably meant was `if (a==b) {code;}',   which executes `code' if `a' and `b' are equal. 
GPL is  /G-P-L/ n. Abbrev. for `General Public License' in   widespread use; see {copyleft}.
GPV is  /G-P-V/ n. Abbrev. for {General Public Virus} in   widespread use.
grault is  /grawlt/ n. Yet another meta-syntactic variable, invented by   Mike Gallaher and propagated by the {GOSMACS} documentation.  See   {corge}.
gray goo is  n. A hypothetical substance composed of {sagan}s of   sub-micron-sized self-replicating robots programmed to make copies   of themselves out of whatever is available.  The image that goes   with the term is one of the entire biosphere of...
gray goo2 is  goo.  This is the simplest of the   {{nanotechnology}} disaster scenarios, easily refuted by arguments   from energy requirements and elemental abundances.  Compare {blue   goo}. 
Great Renaming is  n. The {flag day} on which all of the non-local   groups on the {USENET} had their names changed from the net.-   format to the current multiple-hierarchies scheme.
Great Runes is  n. Uppercase-only text or display messages.  Some   archaic operating systems still emit these.  See also {runes},   {smash case}, {fold case}.   Decades ago, back in the days when it was the sole supplier of   long-distance hardcopy ...
Great Runes2 is  Corporation was faced with a major design choice.  To shorten code   lengths and cut complexity in the printing mechanism, it had been   decided that teletypes would use a monocase font, either ALL UPPER   or all lower.  The question...
Great Runes3 is  conducted on readability under various conditions of bad ribbon,   worn print hammers, etc.  Lowercase won; it is less dense and has   more distinctive letterforms, and is thus much easier to read both   under ideal conditions and wh...
Great Runes4 is  obscured.  The results were filtered up through {management}.   The chairman of Teletype killed the proposal because it failed one   incredibly important criterion     "It would be impossible to spell the name of the Deity correctly....
Great Runes5 is  folklore has it) superstition   triumphed over utility.  Teletypes were the major input devices on   most early computers, and terminal manufacturers looking for   corners to cut naturally followed suit until well into the 1970s.   T...
Great Runes6 is  Runes for thirty years. 
great-wall is  [from SF fandom] vi.,n. A mass expedition to an   oriental restaurant, esp. one where food is served family-style   and shared.  There is a common heuristic about the amount of food   to order, expressed as "Get N - 1 entrees"; the val...
great-wall2 is  the group, can be inferred from   context (see {N}).  See {{oriental food}}, {ravs},   {stir-fried random}. 
Green Book is  n. 1. One of the three standard PostScript references   `PostScript Language Program Design', bylined `Adobe Systems'   (Addison-Wesley, 1988; QA76.73.P67P66 ISBN; 0-201-14396-8); see   also {Red Book}, {Blue Book}).  2. Informal name ...
Green Book2 is  SmallTalk `Smalltalk-80   Bits of History, Words of Advice', by Glenn Krasner   (Addison-Wesley, 1983; QA76.8.S635S58; ISBN 0-201-11669-3) (this,   too, is associated with blue and red books).  3. The `X/Open   Compatibility Guide'.  ...
Green Book3 is  environment that is a proper superset of POSIX/SVID; also includes   descriptions of a standard utility toolkit, systems administrations   features, and the like.  This grimoire is taken with particular   seriousness in Europe.  See {...
Green Book4 is  Operating Systems Interface standard has been dubbed "The   Ugly Green Book".  5. Any of the 1992 standards which will be   issued by the CCITT's tenth plenary assembly.  Until now, these   have changed color each review cycle (1984 w...

factpacks/jargon-split.fact  view on Meta::CPAN

Internet address4 is  com          commercial organizations     edu          educational institutions     gov          U.S. government civilian sites     mil          U.S. military sites   Note that most of the sites in the com and edu domains are in...
Internet address5 is  the U.S. outside the functional domains     su          sites in the Soviet Union (see {kremvax}).     uk          sites in the United Kingdom   Within the us domain, there are subdomains for the fifty   states, each generally w...
Internet address6 is  abbreviation.  Within the uk domain, there is an ac subdomain for   academic sites and a co domain for commercial ones.  Other   top-level domains may be divided up in similar ways. 
interrupt is  1. [techspeak] n. On a computer, an event that   interrupts normal processing and temporarily diverts   flow-of-control through an "interrupt handler" routine.  See also   {trap}.  2. interj. A request for attention from a hacker.   Oft...
interrupt2 is  seen Joe   recently?"  See {priority interrupt}.  3. Under MS-DOS, the   term `interrupt' is nearly synonymous with `system call', because   the OS and BIOS routines are both called using the INT instruction   (see {{interrupt list, th...
interrupt3 is  bypass the OS (going directly to a BIOS interrupt) to get   reasonable performance. 
interrupt list, the is  [MS-DOS] n. The list of all known software   interrupt calls (both documented and undocumented) for IBM PCs and   compatibles, maintained and made available for free redistribution   by Ralf Brown (ralf@cs.cmu.edu).  As of ear...
interrupts locked out is  When someone is ignoring you.  In a   restaurant, after several fruitless attempts to get the waitress's   attention, a hacker might well observe "She must have interrupts   locked out".  The synonym `interrupts disabled' is...
interrupts locked out2 is  have one's interrupt mask bit set"   or "interrupts masked out" is also heard.  See also {spl}. 
iron is  n. Hardware, especially older and larger hardware of   {mainframe} class with big metal cabinets housing relatively   low-density electronics (but the term is also used of modern   supercomputers).  Often in the phrase {big iron}.  Oppose   ...
Iron Age is  n. In the history of computing, 1961--1971 --- the   formative era of commercial {mainframe} technology, when {big   iron} {dinosaur}s ruled the earth.  These began with the delivery   of the first PDP-1, coincided with the dominance of ...
Iron Age2 is  introduction of the first commercial   microprocessor (the Intel 4004) in 1971.  See also {Stone Age};   compare {elder days}. 
iron box is  [UNIX/Internet] n. A special environment set up to trap   a {cracker} logging in over remote connections long enough to be   traced.  May include a modified {shell} restricting the hacker's   movements in unobvious ways, and `bait' files...
iron box2 is  on.  See also {back door}, {firewall   machine}, {Venus flytrap}, and Clifford Stoll's account in   `The Cuckoo's Egg' of how he made and used one (see   the Bibliography).  Compare {padded cell}. 
ironmonger is  [IBM] n. Derogatory.  A hardware specialist.  Compare   {sandbender}, {polygon pusher}.
ITS is  /I-T-S/ n. 1. Incompatible Time-sharing System, an   influential but highly idiosyncratic operating system written for   PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab.  Much   AI-hacker jargon derives from ITS folklore, and to hav...
ITS2 is  instantly as an old-timer of the most   venerable sort.  ITS pioneered many important innovations,   including transparent file sharing between machines and   terminal-independent I/O.  After about 1982, most actual work was   shifted to new...
ITS3 is  essentially as a hobby and service to the hacker community.  The   shutdown of the lab's last ITS machine in May 1990 marked the end   of an era and sent old-time hackers into mourning nationwide (see   {high moby}).  The Royal Institute of ...
ITS4 is  `live' ITS site at its computer museum (right next   to the only TOPS-10 system still on the Internet), so ITS is still   alleged to hold the record for OS in longest continuous use   (however, {{WAITS}} is a credible rival for this palm).  ...
ITS5 is  operating-system perfection   worshiped by a bizarre, fervent retro-cult of old-time hackers and   ex-users (see {troglodyte}, sense 2).  ITS worshipers manage   somehow to continue believing that an OS maintained by   assembly-language hand...
ITS6 is  6-character filenames in one directory per account remains superior   to today's state of commercial art (their venom against UNIX is   particularly intense).  See also {holy wars},   {Weenix}. 

factpacks/jargon-split.fact  view on Meta::CPAN

logical4 is  Tarasco   restaurant, get onto {El Camino Bignum} going logical north."   Using the word `logical' helps to prevent the recipient from   worrying about that the fact that the sun is setting almost   directly in front of him.  The concept...
logical5 is  which are almost, but not quite, consistently   labeled with logical rather than physical directions.  A similar   situation exists at MIT.  Route 128 (famous for the electronics   industry that has grown up along it) is a 3-quarters cir...
logical6 is  miles, terminating near the   coastline at each end.  It would be most precise to describe the   two directions along this highway as `clockwise' and   `counterclockwise', but the road signs all say "north" and   "south", respectively.  ...
logical7 is  `logical north' and `logical south', to indicate that they   are conventional directions not corresponding to the usual   denotation for those words.  (If you went logical south along the   entire length of route 128, you would start out...
logical8 is  and finish headed due east!) 
loop through is  vt. To process each element of a list of things.   "Hold on, I've got to loop through my paper mail."  Derives from   the computer-language notion of an iterative loop; compare `cdr   down' (under {cdr}), which is less common among C...
loop through2 is  say `IRP over' after an   obscure pseudo-op in the MIDAS PDP-10 assembler. 
lord high fixer is  [primarily British, from Gilbert & Sullivan's   `lord high executioner'] n. The person in an organization who knows   the most about some aspect of a system.  See {wizard}.
lose  is  [MIT] vi. 1. To fail.  A program loses when it encounters   an exceptional condition or fails to work in the expected manner.   2. To be exceptionally unesthetic or crocky.  3. Of people, to   be obnoxious or unusually stupid (as opposed to...
lose 2 is  4. n. Refers to something that is   {losing}, especially in the phrases "That's a lose!" and "What   a lose!" 
lose lose is  interj. A reply to or comment on an undesirable   situation.  "I accidentally deleted all my files!"  "Lose,   lose."
loser is  n. An unexpectedly bad situation, program, programmer, or   person.  Someone who habitually loses.  (Even winners can lose   occasionally.)  Someone who knows not and knows not that he knows   not.  Emphatic forms are `real loser', `total l...
loser2 is  loser', which would be a   contradiction in terms).  See {luser}. 
losing is  adj. Said of anything that is or causes a {lose} or   {lossage}.
loss is  n. Something (not a person) that loses; a situation in which   something is losing.  Emphatic forms include `moby loss', and   `total loss', `complete loss'.  Common interjections are   "What a loss!"  and "What a moby loss!"  Note that `mob...
loss2 is  not used; applied to an abstract   noun, moby is simply a magnifier, whereas when applied to a person   it implies substance and has positive connotations.  Compare   {lossage}. 
lossage is  /los'*j/ n. The result of a bug or malfunction.  This   is a mass or collective noun.  "What a loss!" and "What   lossage!"  are nearly synonymous.  The former is slightly more   particular to the speaker's present circumstances; the latt...
lossage2 is  speaker is currently   a victim.  Thus (for example) a temporary hardware failure is a loss,   but bugs in an important tool (like a compiler) are serious   lossage. 
lost in the noise is  adj. Syn. {lost in the underflow}.  This term   is from signal processing, where signals of very small amplitude   cannot be separated from low-intensity noise in the system.  Though   popular among hackers, it is not confined t...
lost in the noise2 is  astronomers, and statisticians all use it. 
lost in the underflow is  adj. Too small to be worth considering;   more specifically, small beyond the limits of accuracy or   measurement.  This is a reference to `floating underflow', a   condition that can occur when a floating-point arithmetic p...

factpacks/jargon-split.fact  view on Meta::CPAN

magic smoke is  n. A substance trapped inside IC packages that enables   them to function (also called `blue smoke'; this is similar to   the archaic `phlogiston' hypothesis about combustion).  Its   existence is demonstrated by what happens when a c...
magic smoke2 is  out, so it doesn't work any more.  See   {smoke test}, {let the smoke out}.   USENETter Jay Maynard tells the following story: "Once, while   hacking on a dedicated Z80 system, I was testing code by blowing   EPROMs and plugging them...
magic smoke3 is  One time, I plugged one in backwards.  I only discovered that   *after* I realized that Intel didn't put power-on lights under   the quartz windows on the tops of their EPROMs --- the die was   glowing white-hot.  Amazingly, the EPRO...
magic smoke4 is  full of zeros, then erased it again.  For all I know,   it's still in service.  Of course, this is because the magic smoke   didn't get let out."  Compare the original phrasing of {Murphy's   Law}. 
main loop is  n. Software tools are often written to perform some   actions repeatedly on whatever input is handed to them, terminating   when there is no more input or they are explicitly told to go away.   In such programs, the loop that gets and p...
mainframe is  n. This term originally referred to the cabinet   containing the central processor unit or `main frame' of a   room-filling {Stone Age} batch machine.  After the emergence of   smaller `minicomputer' designs in the early 1970s, the   tr...
mainframe2 is  as `mainframe   computers' and eventually just as mainframes.  The term carries the   connotation of a machine designed for batch rather than interactive   use, though possibly with an interactive timesharing operating   system retrofi...
mainframe3 is  built   by IBM, Unisys, and the other great {dinosaur}s surviving from   computing's {Stone Age}.   It is common wisdom among hackers that the mainframe architectural   tradition is essentially dead (outside of the tiny market for   {n...
mainframe4 is  having been   swamped by the recent huge advances in IC technology and low-cost   personal computing.  As of 1991, corporate America hasn't quite   figured this out yet, though the wave of failures, takeovers, and   mergers among tradi...
mainframe5 is    the wind (see {dinosaurs mating}). 
management is  n. 1. Corporate power elites distinguished primarily by   their distance from actual productive work and their chronic   failure to manage (see also {suit}).  Spoken derisively, as in   "*Management* decided that ...".  2. Mythically, ...
management2 is  world's minor irritations.   Hackers' satirical public notices are often signed `The Mgt'; this   derives from the `Illuminatus' novels (see the Bibliography). 
mandelbug is  /mon'del-buhg/ [from the Mandelbrot set] n. A bug   whose underlying causes are so complex and obscure as to make its   behavior appear chaotic or even non-deterministic.  This term   implies that the speaker thinks it is a {Bohr bug}, ...
manged is  /monjd/ [probably from the French `manger' or Italian   `mangiare', to eat; perhaps influenced by English n. `mange',   `mangy'] adj. Refers to anything that is mangled or damaged,   usually beyond repair.  "The disk was manged after the e...
mangle is  vt. Used similarly to {mung} or {scribble}, but more violent   in its connotations; something that is mangled has been   irreversibly and totally trashed.
mangler is  [DEC] n. A manager.  Compare {mango}; see also   {management}.  Note that {system mangler} is somewhat different   in connotation.
mango is  /mang'go/ [orig. in-house jargon at Symbolics] n. A manager.   Compare {mangler}.  See also {devo} and {doco}.
marbles is  [from mainstream "lost all his/her marbles"] pl.n. The   minimum needed to build your way further up some hierarchy of tools   or abstractions.  After a bad system crash, you need to determine   if the machine has enough marbles to come u...
marbles2 is  rebuild from backups, or if you need to rebuild   from scratch.  "This compiler doesn't even have enough marbles to   compile `Hello World'." 
marginal is  adj. 1. Extremely small.  "A marginal increase in   {core} can decrease {GC} time drastically."  In everyday   terms, this means that it is a lot easier to clean off your desk if   you have a spare place to put some of the junk while you...
marginal2 is  merit.  "This proposed new   feature seems rather marginal to me."  3. Of extremely small   probability of {win}ning.  "The power supply was rather marginal   anyway; no wonder it fried." 

factpacks/jargon-split.fact  view on Meta::CPAN

munch is  [often confused with {mung}, q.v.] vt. To transform   information in a serial fashion, often requiring large amounts of   computation.  To trace down a data structure.  Related to {crunch}   and nearly synonymous with {grovel}, but connotes...
munching is  n. Exploration of security holes of someone else's   computer for thrills, notoriety, or to annoy the system manager.   Compare {cracker}.  See also {hacked off}.
munching squares is  n. A {display hack} dating back to the PDP-1   (ca. 1962, reportedly discovered by Jackson Wright), which employs a   trivial computation (repeatedly plotting the graph Y = X XOR T for   successive values of T --- see {HAKMEM} it...
munching squares2 is  display of moving and growing squares that devour the   screen.  The initial value of T is treated as a parameter, which,   when well-chosen, can produce amazing effects.  Some of these,   later (re)discovered on the LISP machin...
munching squares3 is  (try AND for XOR and toggling points   instead of plotting them), `munching w's', and `munching   mazes'.  More generally, suppose a graphics program produces an   impressive and ever-changing display of some basic form, foo, on...
munching squares4 is  relatively simple program;   then the program (or the resulting display) is likely to be   referred to as `munching foos' (this is a good example of the use   of the word {foo} as a metasyntactic variable). 
munchkin is  /muhnch'kin/ [from the squeaky-voiced little people in   L. Frank Baum's `The Wizard of Oz'] n. A teenage-or-younger micro   enthusiast hacking BASIC or something else equally constricted.  A   term of mild derision --- munchkins are ann...
munchkin2 is  passing through a {larval stage}.  The term   {urchin} is also used.  See also {wannabee}, {bitty box}. 
mundane is  [from SF fandom] n. 1. A person who is not in science   fiction fandom.  2. A person who is not in the computer industry.   In this sense, most often an adjectival modifier as in "in my   mundane life...." See also {Real World}.
mung is  /muhng/ alt. `munge' /muhnj/ [in 1960 at MIT, `Mash   Until No Good'; sometime after that the derivation from the   {{recursive acronym}} `Mung Until No Good' became standard] vt.   1. To make changes to a file, esp. large-scale and irrevoca...
mung2 is  usually accidentally,   occasionally maliciously.  The system only mungs things   maliciously; this is a consequence of {Finagle's Law}.  See   {scribble}, {mangle}, {trash}, {nuke}.  Reports from   {USENET} suggest that the pronunciation /...
mung3 is  spelling `mung' is still common in program   comments (compare the widespread confusion over the proper spelling   of {kluge}).  3. The kind of beans of which the sprouts are used   in Chinese food.  (That's their real name!  Mung beans!  R...
Music is  n. A common extracurricular interest of hackers (compare   {{science-fiction fandom}}, {{oriental food}}; see also   {filk}).  Hackish folklore has long claimed that musical and   programming abilities are closely related, and there has bee...
Music2 is  that supports this.   Hackers, as a rule, like music and often develop musical   appreciation in unusual and interesting directions.  Folk music is   very big in hacker circles; so is electronic music, and the sort of   elaborate instrumen...
Music3 is  `progressive' and isn't recorded much any more.  The hacker's   musical range tends to be wide; many can listen with equal   appreciation to (say) Talking Heads, Yes, Gentle Giant, Spirogyra,   Scott Joplin, Tangerine Dream, King Sunny Ade...
Music4 is  Concerti.  It is also apparently true that   hackerdom includes a much higher concentration of talented amateur   musicians than one would expect from a similar-sized control group   of {mundane} types. 
mutter is  vt. To quietly enter a command not meant for the ears, eyes,   or fingers of ordinary mortals.  Often used in `mutter an   {incantation}'.  See also {wizard}.
N is  /N/ quant. 1. A large and indeterminate number of objects:   "There were N bugs in that crock!"  Also used in its   original sense of a variable name: "This crock has N bugs,   as N goes to infinity."  (The true number of bugs is always   at le...
N2 is  inherited   from the current context.  For example, when a meal is being   ordered at a restaurant, N may be understood to mean however   many people there are at the table.  From the remark "We'd like to   order N wonton soups and a family di...
N3 is  person at the table   wants to eat only soup, even though you don't know how many people   there are (see {great-wall}).  3. `Nth': adj. The   ordinal counterpart of N, senses #1 and #2.  "Now for the   Nth and last time..." In the specific co...
N4 is  assumed to   be at least 4, and is usually 5 or more (see {tenured graduate   student}).  See also {{random numbers}}, {two-to-the-n}. 
nailed to the wall is  [like a trophy] adj. Said of a bug finally   eliminated after protracted, and even heroic, effort.
nailing jelly is  vi. See {like nailing jelly to a tree}.
na"ive is  adj. Untutored in the perversities of some particular   program or system; one who still tries to do things in an intuitive   way, rather than the right way (in really good designs these   coincide, but most designs aren't `really good' in...
na"ive2 is  unrelated to general   maturity or competence, or even competence at any other specific   program.  It is a sad commentary on the primitive state of   computing that the natural opposite of this term is often claimed   to be `experienced ...
na"ive user is  n. A {luser}.  Tends to imply someone who is   ignorant mainly owing to inexperience.  When this is applied to   someone who *has* experience, there is a definite implication   of stupidity.
NAK is  /nak/ [from the ASCII mnemonic for 0010101] interj.   1. On-line joke answer to {ACK}?: "I'm not here."   2. On-line answer to a request for chat: "I'm not available."   3. Used to politely interrupt someone to tell them you don't   understan...
NAK2 is  stopped making   sense.  See {ACK}, sense 3.  "And then, after we recode the   project in COBOL...."  "Nak, Nak, Nak!  I thought I heard you   say COBOL!" 
nano is  /nan'oh/ [CMU: from `nanosecond'] n. A brief period of   time.  "Be with you in a nano" means you really will be free   shortly, i.e., implies what mainstream people mean by "in a   jiffy" (whereas the hackish use of `jiffy' is quite differe...
nano- is  [SI: the next quantifier below {micro-}; meaning *   10^{-9}] pref. Smaller than {micro-}, and used in the same rather   loose and connotative way.  Thus, one has {{nanotechnology}}   (coined by hacker K. Eric Drexler) by analogy with   `mi...
nano-2 is  architectures have a   `nanocode' level below `microcode'.  Tom Duff at Bell Labs has   also pointed out that "Pi seconds is a nanocentury".   See also {{quantifiers}}, {pico-}, {nanoacre}, {nanobot},   {nanocomputer}, {nanofortnight}. 
nanoacre is  /nan'oh-ay`kr/ n. A unit (about 2 mm square) of real   estate on a VLSI chip.  The term gets its giggle value from the   fact that VLSI nanoacres have costs in the same range as real acres   once one figures in design and fabrication-set...
nanobot is  /nan'oh-bot/ n. A robot of microscopic proportions,   presumably built by means of {{nanotechnology}}.  As yet, only   used informally (and speculatively!).  Also called a `nanoagent'.
nanocomputer is  /nan'oh-k*m-pyoo'tr/ n. A computer whose switching   elements are molecular in size.  Designs for mechanical   nanocomputers which use single-molecule sliding rods for their   logic have been proposed.  The controller for a {nanobot}...

factpacks/jargon-split.fact  view on Meta::CPAN

netnews is  /net'n[y]ooz/ n. 1. The software that makes {USENET}   run.  2. The content of USENET.  "I read netnews right after my   mail most mornings."
netrock is  /net'rok/ [IBM] n. A {flame}; used esp. on VNET,   IBM's internal corporate network.
network address is  n. (also `net address') As used by hackers,   means an address on `the' network (see {network, the}; this is   almost always a {bang path} or {{Internet address}}).  Such an   address is essential if one wants to be to be taken se...
network address2 is  or organizations that claim to   understand, work with, sell to, or recruit from among hackers but   *don't* display net addresses are quietly presumed to be   clueless poseurs and mentally flushed (see {flush}, sense 4).   Hacke...
network address3 is  business cards and   wear them prominently in contexts where they expect to meet other   hackers face-to-face (see also {{science-fiction fandom}}).  This   is mostly functional, but is also a signal that one identifies with   ha...
network address4 is  tie-dyed T-shirts among   Grateful Dead fans).  Net addresses are often used in email text as   a more concise substitute for personal names; indeed, hackers may   come to know each other quite well by network names without ever ...
network address5 is  also {sitename},   {domainist}. 
network meltdown is  n. A state of complete network overload; the   network equivalent of {thrash}ing.  This may be induced by a   {Chernobyl packet}.  See also {broadcast storm}, {kamikaze   packet}.
network, the is  n. 1. The union of all the major noncommercial,   academic, and hacker-oriented networks, such as Internet, the old   ARPANET, NSFnet, {BITNET}, and the virtual UUCP and {USENET}   `networks', plus the corporate in-house networks and...
network, the2 is  CompuServe) that gateway to them.  A   site is generally considered `on the network' if it can be reached   through some combination of Internet-style (@-sign) and UUCP   (bang-path) addresses.  See {bang path}, {{Internet address}}...
network, the3 is  conspiracy of libertarian   hacker-subversives and anti-authoritarian monkeywrenchers described   in Robert Anton Wilson's novel `Schr"odinger's Cat', to which   many hackers have subsequently decided they belong (this is an   examp...
network, the4 is  `network' is often abbreviated to `net'.  "Are   you on the net?" is a frequent question when hackers first meet   face to face, and "See you on the net!" is a frequent goodbye. 
New Jersey is  [primarily Stanford/Silicon Valley] adj. Brain-damaged   or of poor design.  This refers to the allegedly wretched quality   of such software as C, C++, and UNIX (which originated at Bell Labs   in Murray Hill, New Jersey).  "This comp...
New Jersey2 is  from a compiler designed in New Jersey?"   Compare {Berkeley Quality Software}.  See also {UNIX   conspiracy}. 
New Testament is  n. [C programmers] The second edition of K&R's   `The C Programming Language' (Prentice-Hall, 1988; ISBN   0-13-110362-8), describing ANSI Standard C.  See {K&R}.
newbie is  /n[y]oo'bee/ n. [orig. from British public-school and   military slang variant of `new boy'] A USENET neophyte.   This term surfaced in the {newsgroup} talk.bizarre but is   now in wide use.  Criteria for being considered a newbie vary   w...
newbie2 is  newsgroup while   remaining a respected regular in another.  The label `newbie'   is sometimes applied as a serious insult to a person who has been   around USENET for a long time but who carefully hides all evidence   of having a clue.  ...
newgroup wars is  /n[y]oo'groop wohrz/ [USENET] n. The salvos of dueling   `newgroup' and `rmgroup' messages sometimes exchanged by   persons on opposite sides of a dispute over whether a {newsgroup}   should be created net-wide.  These usually settl...
newgroup wars2 is  clear whether the group has a natural   constituency (usually, it doesn't).  At times, especially in the   completely anarchic alt hierarchy, the names of newsgroups   themselves become a form of comment or humor; e.g., the spinoff...
newgroup wars3 is  alt.tv.muppets in   early 1990, or any number of specialized abuse groups named after   particularly notorious {flamer}s, e.g., alt.weemba. 
newline is  /n[y]oo'li:n/ n. 1. [techspeak, primarily UNIX] The   ASCII LF character (0001010), used under {{UNIX}} as a text line   terminator.  A Bell-Labs-ism rather than a Berkeleyism;   interestingly (and unusually for UNIX jargon), it is said t...

factpacks/jargon-split.fact  view on Meta::CPAN

no-op2 is  nothing to a project, or has nothing   going on upstairs, or both.  As in "He's a no-op." 3. Any   operation or sequence of operations with no effect, such as   circling the block without finding a parking space, or putting   money into a ...
no-op3 is  into   the coin-return box, or asking someone for help and being told to   go away.  "Oh, well, that was a no-op."  Hot-and-sour soup (see   {great-wall}) that is insufficiently either is `no-op soup';   so is wonton soup if everybody else...
noddy is  /nod'ee/ [UK: from the children's books] adj.   1. Small and un-useful, but demonstrating a point.  Noddy programs   are often written by people learning a new language or system.  The   archetypal noddy program is {hello, world}.  Noddy co...
noddy2 is  bug of a compiler.  May be used of   real hardware or software to imply that it isn't worth using.   "This editor's a bit noddy."  2. A program that is more or less   instant to produce.  In this use, the term does not necessarily   connot...
noddy3 is  sufficiently trivial   that it can be written and debugged while carrying on (and during   the space of) a normal conversation.  "I'll just throw together a   noddy {awk} script to dump all the first fields."  In North   America this might...
NOMEX underwear is  /noh'meks uhn'-der-weir/ [USENET] n. Syn.   {asbestos longjohns}, used mostly in auto-related mailing lists   and newsgroups.  NOMEX underwear is an actual product available on   the racing equipment market, used as a fire resista...
non-optimal solution is  n. (also `sub-optimal solution') An   astoundingly stupid way to do something.  This term is generally   used in deadpan sarcasm, as its impact is greatest when the person   speaking looks completely serious.  Compare {stunni...
nonlinear is  adj. [scientific computation] 1. Behaving in an erratic and   unpredictable fashion.  When used to describe the behavior of a   machine or program, it suggests that said machine or program is   being forced to run far outside of design ...
nonlinear2 is  induced by unreasonable inputs, or may be triggered   when a more mundane bug sends the computation far off from its   expected course.  2. When describing the behavior of a person,   suggests a tantrum or a {flame}.  "When you talk to...
nonlinear3 is  go nonlinear for hours."  In   this context, `go nonlinear' connotes `blow up out of proportion'   (proportion connotes linearity). 
nontrivial is  adj. Requiring real thought or significant computing   power.  Often used as an understated way of saying that a problem   is quite difficult or impractical, or even entirely unsolvable   ("Proving P=NP is nontrivial").  The preferred ...
nontrivial2 is  See {trivial}, {uninteresting},   {interesting}. 
notwork is  /not'werk/ n. A network, when it is acting {flaky} or is   {down}.  Compare {nyetwork}.  Said at IBM to have orig.   referred to a particular period of flakiness on IBM's VNET   corporate network, ca. 1988; but there are independent repor...
NP- is  /N-P/ pref. Extremely.  Used to modify adjectives   describing a level or quality of difficulty; the connotation is   often `more so than it should be' (NP-complete problems all seem to   be very hard, but so far no one has found a good a pri...
NP-2 is  this algorithm to perform   correctly in every case is NP-annoying."  This is generalized from   the computer-science terms `NP-hard' and `NP-complete'.  NP is   the set of Nondeterministic-Polynomial algorithms, those that can   be complete...
NP-3 is  amount of   time that is a polynomial function of the size of the input; a   solution for one NP-complete problem would solve all the others. 
nuke is  vt. 1. To intentionally delete the entire contents of a   given directory or storage volume.  "On UNIX, `rm -r /usr'   will nuke everything in the usr filesystem."  Never used for   accidental deletion.  Oppose {blow away}.  2. Syn. for   {d...
nuke2 is  features, or   code sections.  Often used to express a final verdict.  "What do   you want me to do with that 80-meg {wallpaper} file?"  "Nuke   it."  3. Used of processes as well as files; nuke is a frequent   verbal alias for `kill -9' on...
nuke3 is  {fandango on core} can trash the operating   system, including the FAT (the in-core copy of the disk block   chaining information).  This can utterly scramble attached disks,   which are then said to have been `nuked'.  This term is also   ...
nuke4 is  other micros without   memory protection. 
number-crunching is  n. Computations of a numerical nature, esp.   those that make extensive use of floating-point numbers.  The only   thing {Fortrash} is good for.  This term is in widespread   informal use outside hackerdom and even in mainstream ...
number-crunching2 is  connotations: namely, that the computations   are mindless and involve massive use of {brute force}.  This is   not always {evil}, esp. if it involves ray tracing or fractals   or some other use that makes {pretty pictures}, esp...
numbers is  [scientific computation] n. Output of a computation that   may not be significant results but at least indicate that the   program is running.  May be used to placate management, grant   sponsors, etc.  `Making numbers' means running a pr...
numbers2 is  necessarily meaningful output   --- is needed as a demonstration of progress.  See {pretty   pictures}, {math-out}, {social science number}. 
NUXI problem is  /nuk'see pro'bl*m/ n. This refers to the problem of   transferring data between machines with differing byte-order.  The   string `UNIX' might look like `NUXI' on a machine with a   different `byte sex' (e.g., when transferring data ...
NUXI problem2 is  vice-versa).  See also   {middle-endian}, {swab}, and {bytesexual}. 
nybble is  /nib'l/ (alt. `nibble') [from v. `nibble' by analogy   with `bite' => `byte'] n. Four bits; one {hex} digit;   a half-byte.  Though `byte' is now techspeak, this useful relative   is still jargon.  Compare {{byte}}, {crumb}, {tayste},   {d...

factpacks/jargon-split.fact  view on Meta::CPAN

Ob- is  /ob/ pref. Obligatory.  A piece of {netiquette}   acknowledging that the author has been straying from the newsgroup's   charter topic.  For example, if a posting in alt.sex is a response   to a part of someone else's posting that has nothing...
Ob-2 is  append `ObSex' (or `Obsex') and toss   off a question or vignette about some unusual erotic act.  It is   considered a sign of great {winnitude} when your Obs are more   interesting than other people's whole postings. 
Obfuscated C Contest is  n. An annual contest run since 1984 over   USENET by Landon Curt Noll and friends.  The overall winner is   whoever produces the most unreadable, creative, and bizarre (but   working) C program; various other prizes are award...
Obfuscated C Contest2 is  and macro-preprocessor facilities give   contestants a lot of maneuvering room.  The winning programs often   manage to be simultaneously (a) funny, (b) breathtaking works of   art, and (c) horrible examples of how *not* to ...
Obfuscated C Contest3 is  entry might help convey the flavor   of obfuscated C     /*      * HELLO WORLD program      * by Jack Applin and Robert Heckendorn, 1985      */     main(v,c)char**c;{for(v[c++]="Hello, world!\n)";     (!!c)[*c]&&(v--||--c&&...
obi-wan error is  /oh'bee-won` er'*r/ [RPI, from `off-by-one' and   the Obi-Wan Kenobi character in "Star Wars"] n.  A loop of   some sort in which the index is off by 1.  Common when the index   should have started from 0 but instead started from 1....
Objectionable-C is  n. Hackish take on "Objective-C", the name of an   object-oriented dialect of C in competition with the    better-known C++ (it is used to write native applications on the NeXT   machine).  Objectionable-C uses a Smalltalk-like sy...
Objectionable-C2 is  method calls, and (like many such   efforts) comes frustratingly close to attaining the {Right Thing}   without actually doing so. 
obscure is  adj. Used in an exaggeration of its normal meaning, to   imply total incomprehensibility.  "The reason for that last crash   is obscure."  "The `find(1)' command's syntax is obscure!"   The phrase `moderately obscure' implies that it coul...
obscure2 is  the trouble.  The construction   `obscure in the extreme' is the preferred emphatic form. 
octal forty is  /ok'tl for'tee/ n. Hackish way of saying "I'm   drawing a blank."  Octal 40 is the {{ASCII}} space character,   0100000; by an odd coincidence, {hex} 40 (01000000) is the   {{EBCDIC}} space character.  See {wall}.
off the trolley is  adj. Describes the behavior of a program that   malfunctions and goes catatonic, but doesn't actually {crash} or   abort.  See {glitch}, {bug}, {deep space}.
off-by-one error is  n. Exceedingly common error induced in many   ways, such as by starting at 0 when you should have started at 1 or   vice versa, or by writing `< N' instead of `<= N' or   vice-versa.  Also applied to giving something to the perso...
off-by-one error2 is   Often confounded with   {fencepost error}, which is properly a particular subtype of it. 
offline is  adv. Not now or not here.  "Let's take this   discussion offline."  Specifically used on {USENET} to suggest   that a discussion be taken off a public newsgroup to email.
old fart is  n. Tribal elder.  A title self-assumed with remarkable   frequency by (esp.) USENETters who have been programming for more   than about 25 years; often appears in {sig block}s attached to   Jargon File contributions of great archeologica...
old fart2 is  the second or third person but one of   pride in first person. 
Old Testament is  n. [C programmers] The first edition of {K&R}, the   sacred text describing {Classic C}.
one-line fix is  n. Used (often sarcastically) of a change to a   program that is thought to be trivial or insignificant right up to   the moment it crashes the system.  Usually `cured' by another   one-line fix.  See also {I didn't change anything!}
one-liner wars is  n. A game popular among hackers who code in the   language APL (see {write-only language}).  The objective is to   see who can code the most interesting and/or useful routine in one   line of operators chosen from APL's exceedingly...
one-liner wars2 is  was practiced among {TECO} hackers.      Ken Iverson, the inventor of APL, has been credited with a   one-liner that, given a number N, produces a list of the   prime numbers from 1 to N inclusive.  It looks like this	(2 = 0 +.= T...

factpacks/jargon-split.fact  view on Meta::CPAN

payware is  /pay'weir/ n. Commercial software.  Oppose {shareware}   or {freeware}.
PBD is  /P-B-D/ [abbrev. of `Programmer Brain Damage'] n.  Applied   to bug reports revealing places where the program was obviously   broken by an incompetent or short-sighted programmer.  Compare   {UBD}; see also {brain-damaged}.
PC-ism is  /P-C-izm/ n. A piece of code or coding technique that   takes advantage of the unprotected single-tasking environment in   IBM PCs and the like, e.g., by busy-waiting on a hardware register,   direct diddling of screen memory, or using har...
PC-ism2 is  {vaxism}, {unixism}.  Also,   `PC-ware' n., a program full of PC-isms on a machine with a more   capable operating system.  Pejorative. 
PD is  /P-D/ adj. Common abbreviation for `public domain', applied   to software distributed over {USENET} and from Internet archive   sites.  Much of this software is not in fact public domain in   the legal sense but travels under various copyright...
PD2 is  anyone who can {snarf} a copy.  See   {copyleft}. 
pdl is  /pid'l/ or /puhd'l/ [acronym for `Push Down List'] 1. In   ITS days, the preferred MITism for {stack}.  2. Dave Lebling, one   of the co-authors of {Zork}; (his {network address} on the ITS   machines was at one time pdl@dms).  3. `Program De...
pdl2 is  formal and profoundly useless   pseudo-languages in which {management} forces one to design   programs.  {Management} often expects it to be maintained in   parallel with the code.  See also {{flowchart}}.  4. To design   using a program des...
pdl3 is  eyes won't focus beyond 2 feet." 
PDP-10 is  [Programmed Data Processor model 10] n. The machine that   made timesharing real.  It looms large in hacker folklore because   of its adoption in the mid-1970s by many university computing   facilities and research labs, including the MIT ...
PDP-102 is  the instruction set (most notably the   bit-field instructions) are still considered unsurpassed.  The 10   was eventually eclipsed by the VAX machines (descendants of the   PDP-11) when DEC recognized that the 10 and VAX product lines we...
PDP-103 is  concentrate its software   development effort on the more profitable VAX.  The machine was   finally dropped from DEC's line in 1983, following the failure of   the Jupiter Project at DEC to build a viable new model. (Some   attempts by o...
PDP-104 is  nothing; see   {Foonly}) This event spelled the doom of {{ITS}} and the   technical cultures that had spawned the original Jargon File, but   by mid-1991 it had become something of a badge of honorable   old-timerhood among hackers to hav...
PDP-105 is  {{TOPS-10}}, {{ITS}}, {AOS}, {BLT}, {DDT}, {DPB},   {EXCH}, {HAKMEM}, {JFCL}, {LDB}, {pop}, {push},   appendix A. 
PDP-20 is  n. The most famous computer that never was.  {PDP-10}   computers running the {{TOPS-10}} operating system were labeled   `DECsystem-10' as a way of differentiating them from the PDP-11.   Later on, those systems running {TOPS-20} were lab...
PDP-202 is  being the result of a lawsuit   brought against DEC by Singer, which once made a computer called   `system-10'), but contrary to popular lore there was never a   `PDP-20'; the only difference between a 10 and a 20 was the   operating syst...
PDP-203 is  all)   machines sold to run TOPS-10 were painted `Basil Blue', whereas   most TOPS-20 machines were painted `Chinese Red' (often mistakenly   called orange). 
peek is  n.,vt. (and {poke}) The commands in most microcomputer   BASICs for directly accessing memory contents at an absolute   address; often extended to mean the corresponding constructs in any   {HLL} (peek reads memory, poke modifies it).  Much ...
peek2 is  {peek}ing around memory, more   or less at random, to find the location where the system keeps   interesting stuff.  Long (and variably accurate) lists of such   addresses for various computers circulate (see {{interrupt list,   the}}).  Th...
peek3 is  highly   useful, mildly amusing, useless but neat, or (most likely) total   {lossage} (see {killer poke}). 
pencil and paper is  n. An archaic information storage and   transmission device that works by depositing smears of graphite on   bleached wood pulp.  More recent developments in paper-based   technology include improved `write-once' update devices w...

factpacks/jargon-split.fact  view on Meta::CPAN

protocol2 is  set of rules that allow different machines   or pieces of software to coordinate with each other without   ambiguity.  So, for example, it does include niceties about the   proper form for addressing packets on a network or the order in...
protocol3 is  Philosophers Problem.   It implies that there is some common message format and an accepted set   of primitives or commands that all parties involved understand, and   that transactions among them follow predictable logical sequences.  ...
provocative maintenance is  [common ironic mutation of `preventive   maintenance'] n. Actions performed upon a machine at regularly   scheduled intervals to ensure that the system remains in a usable   state.  So called because it is all too often pe...
provocative maintenance2 is  know what he is doing; this results   in the machine's remaining in an *un*usable state for an   indeterminate amount of time.  See also {scratch monkey}. 
prowler is  [UNIX] n. A {daemon} that is run periodically (typically   once a week) to seek out and erase {core} files, truncate   administrative logfiles, nuke `lost+found' directories, and   otherwise clean up the {cruft} that tends to pile up in t...
prowler2 is  {GFR}, {reaper},   {skulker}. 
pseudo is  /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An   electronic-mail or {USENET} persona adopted by a human for   amusement value or as a means of avoiding negative repercussions of   one's net.behavior; a `nom de USENET', often associa...
pseudo2 is  message origins.  Perhaps the   best-known and funniest hoax of this type is {BIFF}.   2. Notionally, a {flamage}-generating AI program simulating a   USENET user.  Many flamers have been accused of actually being such   entities, despite...
pseudo3 is  sophistication yet exists.  However, in 1989 there was a famous   series of forged postings that used a phrase-frequency-based   travesty generator to simulate the styles of several well-known   flamers; it was based on large samples of t...
pseudo4 is  Press}).  A significant number of people   were fooled by the forgeries, and the debate over their   authenticity was settled only when the perpetrator came forward to   publicly admit the hoax. 
pseudoprime is  n. A backgammon prime (six consecutive occupied   points) with one point missing.  This term is an esoteric pun   derived from a mathematical method that, rather than determining   precisely whether a number is prime (has no divisors)...
pseudoprime2 is  whether the number is `probably'   prime.  A number that passes this test is called a pseudoprime.   The hacker backgammon usage stems from the idea that a pseudoprime   is almost as good as a prime it does the job of a prime until  ...
pseudosuit is  /soo'doh-s[y]oot`/ n. A {suit} wannabee; a hacker   who has decided that he wants to be in management or administration   and begins wearing ties, sport coats, and (shudder!) suits   voluntarily.  It's his funeral.  See also {lobotomy}...
psychedelicware is  /si`k*-del'-ik-weir/ [UK] n. Syn.   {display hack}.  See also {smoking clover}.
psyton is  /si'ton/ [TMRC] n. The elementary particle carrying the   sinister force.  The probability of a process losing is   proportional to the number of psytons falling on it.  Psytons are   generated by observers, which is why demos are more lik...
psyton2 is  watching.  [This term appears to have been   largely superseded by {bogon}; see also {quantum bogodynamics}.   --- ESR] 
pubic directory is  [NYU] (also `pube directory' /pyoob'   d*-rek't*-ree/) n. The `pub' (public) directory on a machine that   allows {FTP} access.  So called because it is the default   location for {SEX} (sense 1).  "I'll have the source in the   p...
puff is  vt. To decompress data that has been crunched by Huffman   coding.  At least one widely distributed Huffman decoder program   was actually *named* `PUFF', but these days it is usually   packaged with the encoder.  Oppose {huff}.
punched card is  alt. `punch card' [techspeak] n.obs. The signature   medium of computing's {Stone Age}, now obsolescent outside of   some IBM shops.  The punched card actually predated computers   considerably, originating in 1801 as a control devic...
punched card2 is  patented by Hollerith and used with   mechanical tabulating machines in the 1890 U.S. Census was a piece   of cardboard about 90 mm by 215 mm, designed to fit exactly in the   currency trays used for that era's larger dollar bills. ...
punched card3 is  manufacturer) married   the punched card to computers, encoding binary information as   patterns of small rectangular holes; one character per column,   80 columns per card.  Other coding schemes, sizes of card, and   hole shapes we...
punched card4 is  width of most character terminals is a legacy of the   IBM punched card; so is the size of the quick-reference cards   distributed with many varieties of computers even today.  See   {chad}, {chad box}, {eighty-column mind}, {green ...
punt is  [from the punch line of an old joke referring to American   football "Drop back 15 yards and punt!"] v. 1. To give up,   typically without any intention of retrying.  "Let's punt the   movie tonight."  "I was going to hack all night to get t...
punt2 is  mean that you've decided   not to stay up all night, and may also mean you're not ever even   going to put in the feature.  2. More specifically, to give up on   figuring out what the {Right Thing} is and resort to an   inefficient hack.  3...
punt3 is  problem, typically because one cannot define what is desirable   sufficiently well to frame an algorithmic solution.  "No way to   know what the right form to dump the graph in is --- we'll punt   that for now."  4. To hand a tricky impleme...
punt4 is  the design.  "It's too hard to get the   compiler to do that; let's punt to the runtime system." 
Purple Book is  n. The `System V Interface Definition'.  The covers   of the first editions were an amazingly nauseating shade of   off-lavender.  See also {{book titles}}.
push is  [from the operation that puts the current information on a   stack, and the fact that procedure return addresses are saved on   a stack] Also PUSH /push/ or PUSHJ /push'J/ (the latter based   on the PDP-10 procedure call instruction).  1. To...
push2 is  one says that something has been   pushed onto one's stack, it means that the Damoclean list of things   hanging over ones's head has grown longer and heavier yet.  This may   also imply that one will deal with it *before* other pending   i...
push3 is  was `added to my queue'.   2. vi. To enter upon a digression, to save the current discussion   for later.  Antonym of {pop}; see also {stack}, {pdl}.*quad n. 1. Two bits; syn. for {quarter}, {crumb},   {tayste}.  2. A four-pack of anything ...
push4 is  box glyph used in the APL language for various   arcane purposes mostly related to I/O.  Former Ivy-Leaguers and   Oxbridge types are said to associate it with nostalgic memories of   dear old University. 
quadruple bucky is  n., obs. 1. On an MIT {space-cadet keyboard},   use of all four of the shifting keys (control, meta, hyper, and   super) while typing a character key.  2. On a Stanford or MIT   keyboard in {raw mode}, use of four shift keys while...
quadruple bucky2 is  shift keys are the control and meta   keys on *both* sides of the keyboard.  This was very difficult   to do!  One accepted technique was to press the left-control and   left-meta keys with your left hand, the right-control and  ...
quadruple bucky3 is  fifth key with your   nose.   Quadruple-bucky combinations were very seldom used in practice,   because when one invented a new command one usually assigned it to   some character that was easier to type.  If you want to imply th...

factpacks/jargon-split.fact  view on Meta::CPAN

quantifiers is  In techspeak and jargon, the standard metric   prefixes used in the SI (Syst`eme International) conventions for   scientific measurement have dual uses.  With units of time or   things that come in powers of 10, such as money, they re...
quantifiers2 is  by powers of 1000 = 10^3.   But when used with bytes or other things that naturally come in   powers of 2, they usually denote multiplication by powers of   1024 = 2^{10}.       The binary peta- and exa- loadings are not in common us...
quantifiers3 is  multiplication by 1000^{-1},   has always been rare (there is, however, a standard joke about the   `millihelen' --- notionally, the amount of beauty required to   launch one ship).  See the entries on {micro-}, {pico-}, and   {nano-...
quantifiers4 is  use of these   terms.  `Femto' and `atto' (which, interestingly, derive not   from Greek but from Danish) have not yet acquired jargon loadings,   though it is easy to predict what those will be once computing   technology enters the...
quantifiers5 is  {attoparsec}).   There are, of course, some standard unit prefixes for powers of   10.  In the following table, the `prefix' column is the   international standard suffix for the appropriate power of ten; the   `binary' column lists ...
quantifiers6 is  corresponding power of 2.  The B-suffixed forms are commonly used   for byte quantities; the words `meg' and `gig' are nouns which may   (but do not always) pluralize with `s'.       Confusingly, hackers often use K as though it were...
quantifiers7 is  prefix; thus "2K dollars".  This   is also true (though less commonly) of G and M.   Note that the formal SI metric prefix for 1000 is `k'; some use   this strictly, reserving `K' for multiplication by 1024 (KB is   `kilobytes').   K...
quantifiers8 is  bytes; thus, 64G is   64 gigabytes and `a K' is a kilobyte (compare mainstream use of `a G'   as short for `a grand', that is, $1000).  Whether one pronounces   `gig' with hard or soft `g' depends on what one thinks the proper   pron...
quantifiers9 is  1024 (or other powers of 2 and 10 close in   magnitude) --- for example, describing a memory in units of   500K or 524K instead of 512K --- is a sure sign of the   {marketroid}. 
quantum bogodynamics is  /kwon'tm boh`goh-di-nam'iks/ n. A theory   that characterizes the universe in terms of bogon sources (such as   politicians, used-car salesmen, TV evangelists, and {suit}s in   general), bogon sinks (such as taxpayers and com...
quantum bogodynamics2 is  Bogon absorption, of course, causes   human beings to behave mindlessly and machines to fail (and may   also cause both to emit secondary bogons); however, the precise   mechanics of the bogon-computron interaction are not y...
quantum bogodynamics3 is  Quantum bogodynamics is most often   invoked to explain the sharp increase in hardware and software   failures in the presence of suits; the latter emit bogons, which   the former absorb.  See {bogon}, {computron}, {suit},  ...
quarter is  n. Two bits.  This in turn comes from the `pieces of   eight' famed in pirate movies --- Spanish gold pieces that could be   broken into eight pie-slice-shaped `bits' to make change.  Early   in American history the Spanish coin was consi...
quarter2 is  `bits' was considered worth 12.5 cents.   Syn.  {tayste}, {crumb}, {quad}.  Usage rare.  See also   {nickle}, {nybble}, {{byte}}, {dynner}. 
ques is  /kwes/ 1. n. The question mark character (`?', ASCII   0111111).  2. interj.  What?  Also frequently verb-doubled as   "Ques ques?"  See {wall}.
quick-and-dirty is  adj. Describes a {crock} put together under time   or user pressure.  Used esp. when you want to convey that you think   the fast way might lead to trouble further down the road.  "I can   have a quick-and-dirty fix in place tonig...
quick-and-dirty2 is  module to solve the underlying design problem."   See also {kluge}. 
quote chapter and verse is  [by analogy with the mainstream phrase] v.   To reproduce a relevant excerpt from an appropriate {bible}.   "I don't care if `rn' gets it wrong; `Followup-To poster' is    explicitly permitted by RFC-1036.  I'll quote chap...
quotient is  n. See {coefficient}.
quux is  /kwuhks/ Mythically, from the Latin semi-deponent verb   quuxo, quuxare, quuxandum iri; noun form variously `quux' (plural   `quuces', anglicized to `quuxes') and `quuxu' (genitive   plural is `quuxuum', for four u-letters out of seven in al...
quux2 is  Scrabble).]  1. Originally, a   metasyntactic variable like {foo} and {foobar}.  Invented by   Guy Steele for precisely this purpose when he was young and na"ive   and not yet interacting with the real computing community.  Many   people in...

factpacks/jargon-split.fact  view on Meta::CPAN

random3 is  deterministic.  "The I/O channels are in a pool, and when a file   is opened one is chosen randomly."  6. Arbitrary.  "It generates   a random name for the scratch file."  7. Gratuitously wrong, i.e.,   poorly done and for no good apparen...
random4 is  handles file name defaulting in a particularly useless   way, or an assembler routine that could easily have been coded   using only three registers, but redundantly uses seven for values with   non-overlapping lifetimes, so that no one e...
random5 is  extra registers.  What {randomness}!   8. n. A random hacker; used particularly of high-school students   who soak up computer time and generally get in the way.  9. n.   Anyone who is not a hacker (or, sometimes, anyone not known to the ...
random6 is  "I went to the talk,   but the audience was full of randoms asking bogus questions".   10. n. (occasional MIT usage) One who lives at Random Hall.  See   also {J. Random}, {some random X}. 
random numbers is  n. When one wishes to specify a large but random   number of things, and the context is inappropriate for {N}, certain   numbers are preferred by hacker tradition (that is, easily   recognized as placeholders).  These include the f...
random numbers2 is  as `the least random number'; see 23.     23          Sacred number of Eris, Goddess of Discord (along with 17 and 5).     42          The Answer to the Ultimate Question of Life, the Universe, and          Everything. (Note that ...
random numbers3 is  69          From the sexual act.  This one was favored in MIT's ITS culture.     105          69 hex = 105 decimal, and 69 decimal = 105 octal.     666          The Number of the Beast.   For further enlightenment, consult the `Pr...
random numbers4 is  to the Galaxy', `The Joy of Sex',   and the Christian Bible (Revelation 138).  See also   {Discordianism} or consult your pineal gland.   One common rhetorical maneuver uses any of the canonical random   numbers as placeholders fo...
random numbers5 is  arguments, for arbitrary values of 42." "There are 69 ways   to leave your lover, for 69 = 50."  This is especially likely when   the speaker has uttered a random number and realizes that it was   not recognized as such, but even ...
random numbers6 is  this fashion.  A related joke is that pi   equals 3 --- for small values of pi and large values of 3. 
randomness is  n. An inexplicable misfeature; gratuitous inelegance.   Also, a {hack} or {crock} that depends on a complex   combination of coincidences (or, possibly, the combination upon   which the crock depends for its accidental failure to malfu...
randomness2 is  40--57 by putting the character   in the four-bit accumulator field of an XCT and then extracting six bits   --- the low 2 bits of the XCT opcode are the right thing." "What   randomness!" 
rape is  vt. 1. To {screw} someone or something, violently; in   particular, to destroy a program or information irrecoverably.   Often used in describing file-system damage.  "So-and-so was   running a program that did absolute disk I/O and ended up...
rape2 is  a piece of hardware for parts. 
rare mode is  [UNIX] adj. CBREAK mode (character-by-character with   interrupts enabled).  Distinguished from {raw mode} and `cooked   mode'; the phrase "a sort of half-cooked (rare?) mode" is used   in the V7/BSD manuals to describe the mode.  Usage...
raster blaster is  n. [Cambridge] Specialized hardware for   {bitblt} operations (a {blitter}).  Allegedly inspired by   `Rasta Blasta', British slang for the sort of portable stereo   Americans call a `boom box' or `ghetto blaster'.
raster burn is  n. Eyestrain brought on by too many hours of looking at   low-res, poorly tuned, or glare-ridden monitors, esp. graphics   monitors.  See {terminal illness}.
rat belt is  n. A cable tie, esp. the sawtoothed, self-locking plastic   kind that you can remove only by cutting (as opposed to a random   twist of wire or a twist tie or one of those humongous metal clip   frobs).  Small cable ties are `mouse belts...
rave is  [WPI] vi. 1. To persist in discussing a specific subject.   2. To speak authoritatively on a subject about which one knows   very little.  3. To complain to a person who is not in a position   to correct the difficulty.  4. To purposely anno...
rave2 is  evangelize.  See {flame}.  6. Also used to   describe a less negative form of blather, such as friendly   bullshitting.  `Rave' differs slightly from {flame} in that   `rave' implies that it is the persistence or obliviousness of the   pers...
rave3 is  implies somewhat   more strongly that the tone is offensive as well. 

factpacks/jargon-split.fact  view on Meta::CPAN

snivitz is  /sniv'itz/ n. A hiccup in hardware or software; a small,   transient problem of unknown origin (less serious than a   {snark}).  Compare {glitch}.
SO is  /S-O/ n. 1. (also `S.O.') Abbrev. for Significant   Other, almost invariably written abbreviated and pronounced   /S-O/ by hackers.  Used to refer to one's primary   relationship, esp. a live-in to whom one is not married.  See   {MOTAS}, {MOT...
SO2 is  character in ASCII (Control-N, 0001110). 
social science number is  [IBM] n. A statistic that is   {content-free}, or nearly so.  A measure derived via methods of   questionable validity from data of a dubious and vague nature.   Predictively, having a social science number in hand is seldom...
social science number2 is  considerably worse.  {Management}   loves them.  See also {numbers}, {math-out}, {pretty   pictures}. 
soft boot is  n. See {boot}.
softcopy is  /soft'ko-pee/ n. [by analogy with `hardcopy'] A   machine-readable form of corresponding hardcopy.  See {bits},   {machinable}.
software bloat is  n. The results of {second-system effect} or   {creeping featuritis}.  Commonly cited examples include   `ls(1)', {X}, {BSD}, {Missed'em-five}, and {OS/2}.
software rot is  n. Term used to describe the tendency of software   that has not been used in a while to {lose}; such failure may be   semi-humorously ascribed to {bit rot}.  More commonly,   `software rot' strikes when a program's assumptions becom...
software rot2 is  insufficiently {robust}, this may   cause it to fail in mysterious ways.   For example, owing to endemic shortsightedness in the design of   COBOL programs, most will succumb to software rot when their   2-digit year counters {wrap ...
software rot3 is  Actually, related lossages often afflict centenarians   who have to deal with computer software designed by unimaginative   clods.  One such incident became the focus of a minor public flap   in 1990, when a gentleman born in 1889 a...
software rot4 is  Raleigh, North Carolina.  The new system   refused to issue the card, probably because with 2-digit years the   ages 101 and 1 cannot be distinguished.   Historical note Software rot in an even funnier sense than the   mythical one ...
software rot5 is  (e.g.,   the R1; see {grind crank}).  If a program that depended on a   peculiar instruction hadn't been run in quite a while, the user   might discover that the opcodes no longer did the same things they   once did.  ("Hey, so-and-...
software rot6 is  We can {snarf} this opcode, right?  No one uses   it.")   Another classic example of this sprang from the time an MIT hacker   found a simple way to double the speed of the unconditional jump   instruction on a PDP-6, so he patched ...
software rot7 is  fragile timing software in a music-playing program,   throwing its output out of tune.  This was fixed by adding a   defensive initialization routine to compare the speed of a timing   loop with the real-time clock; in other words, ...
software rot8 is  day, and corrected appropriately.   Compare {bit rot}. 
softwarily is  /soft-weir'i-lee/ adv. In a way pertaining to software.   "The system is softwarily unreliable."  The adjective   `softwary' is *not* used.  See {hardwarily}.
softy is  [IBM] n. Hardware hackers' term for a software expert who   is largely ignorant of the mysteries of hardware.
some random X is  adj. Used to indicate a member of class X, with the   implication that Xs are interchangeable.  "I think some random   cracker tripped over the guest timeout last night."  See also   {J. Random}.
sorcerer's apprentice mode is  [from the film "Fantasia"] n. A bug in a   protocol where, under some circumstances, the receipt of a message   causes multiple messages to be sent, each of which, when   received, triggers the same bug.  Used esp. of s...
sorcerer's apprentice mode2 is  loops in {email} software.  Compare   {broadcast storm}, {network meltdown}. 

factpacks/jargon-split.fact  view on Meta::CPAN

TCB is  /T-C-B/ [IBM] n. 1. Trouble Came Back.  An intermittent or   difficult-to-reproduce problem that has failed to respond to   neglect.  Compare {heisenbug}.  Not to be confused with   2. Trusted Computing Base, an `official jargon term from the...
ISO standard cup of tea is  [South Africa] n. A cup of tea with milk   and one teaspoon of sugar, where the milk is poured into the cup   before the tea.  Variations are ISO 0, with no sugar; ISO 2, with   two spoons of sugar; and so on.   Like many ...
ISO standard cup of tea2 is  ring in North   America, where hackers generally shun the decadent British practice   of adulterating perfectly good tea with dairy products and   prefer instead to add a wedge of lemon, if anything.  If one were   feelin...
ISO standard cup of tea3 is  analogous `ANSI   standard cup of tea and wind up with a political situation   distressingly similar to several that arise in much more serious   technical contexts.  Milk and lemon dont mix very well. 
TechRef is  /tekref/ [MS-DOS] n. The original `IBM PC   Technical Reference Manual, including the BIOS listing and   complete schematics for the PC.  The only PC documentation in the   issue package thats considered serious by real hackers.
TECO is  /teekoh/ obs. 1. vt. Originally, to edit using the TECO   editor in one of its infinite variations (see below).  2. vt.,obs.   To edit even when TECO is *not* the editor being used!  This   usage is rare and now primarily historical.  2. [or...
TECO2 is  and COrrector; later, `Text   Editor and COrrector] n. A text editor developed at MIT and   modified by just about everybody.  With all the dialects included,   TECO might have been the most prolific editor in use before   {EMACS}, to which...
TECO3 is  powerful programming-language-like features and its unspeakably   hairy syntax.  It is literally the case that every string of   characters is a valid TECO program (though probably not a useful   one); one common hacker game used to be ment...
TECO4 is  corresponding to human names did.  As an example   of TECOs obscurity, here is a TECO program that takes a list of   names such as     Loser, J. Random     Quux, The Great     Dick, Moby   sorts them alphabetically according to surname, and...
TECO5 is  comma, to produce the following     Moby Dick     J. Random Loser     The Great Quux   The program is     [1 J^P$L$$     J <.-Z; .,(S,$ -D .)FX1 @F^B $K L I $ G1 L>$$   (where ^B means `Control-B (ASCII 0000010) and $ is actually   an {ALT}...
TECO6 is  fact, this very program was used to produce the second, sorted   list from the first list.  The first hack at it had a {bug} GLS   (the author) had accidentally omitted the `@ in front   of `F^B, which as anyone can see is clearly the {Wron...
TECO7 is  There is no space to describe all the   features of TECO, but it may be of interest that `^P means   `sort and `J<.-Z; ... L> is an idiomatic series of commands   for `do once for every line.   In mid-1991, TECO is pretty much one with the ...
TECO8 is  affections of hackerdom by {EMACS}.   Descendants of an early (and somewhat lobotomized) version adopted   by DEC can still be found lurking on VMS and a couple of crufty   PDP-11 operating systems, however, and ports of the more advanced  ...
TECO9 is  antiquarian interest.  See   also {retrocomputing}, {write-only language}. 
tee is  n.,vt. [Purdue] A carbon copy of an electronic transmission.   "Oh, youre sending him the {bits} to that?  Slap on a tee for   me."  From the UNIX command `tee(1), itself named after a   pipe fitting (see {plumbing}).  Can also mean `save one...
Telerat is  /tel*-rat/ n. Unflattering hackerism for `Teleray, a   line of extremely losing terminals.  See also {terminak},   {sun-stools}, {HP-SUX}.
TELNET is  /telnet/ vt. To communicate with another Internet host   using the {TELNET} program.  TOPS-10 people used the word   IMPCOM, since that was the program name for them.  Sometimes   abbreviated to TN /T-N/.  "I usually TN over to SAIL just t...
ten-finger interface is  n. The interface between two networks that   cannot be directly connected for security reasons; refers to the   practice of placing two terminals side by side and having an   operator read from one and type into the other.
tense is  adj. Of programs, very clever and efficient.  A tense piece   of code often got that way because it was highly {bum}med, but   sometimes it was just based on a great idea.  A comment in a clever   routine by Mike Kazar, once a grad-student ...
tense2 is  will bring tears to your eyes."  A tense   programmer is one who produces tense code. 
tenured graduate student is  n. One who has been in graduate school   for 10 years (the usual maximum is 5 or 6) a `ten-yeared   student (get it?).  Actually, this term may be used of any grad   student beginning in his seventh year.  Students dont r...

factpacks/jargon-split.fact  view on Meta::CPAN

tick2 is  AI simulation is often   pejoratively referred to as `tick-tick-tick simulation,   especially when the issue of simultaneity of events with long,   independent chains of causes is {handwave}d. 3. In the FORTH   language, a single quote char...
tick-list features is  [Acorn Computers] n. Features in software or   hardware that customers insist on but never use (calculators in   desktop TSRs and that sort of thing).  The American equivalent   would be `checklist features, but this jargon sen...
tickle a bug is  vt. To cause a normally hidden bug to manifest   through some known series of inputs or operations.  "You can   tickle the bug in the Paradise VGA cards highlight handling by   trying to set bright yellow reverse video."
tiger team is  [U.S. military jargon] n. A team whose purpose is to   penetrate security, and thus test security measures.  These people   are paid professionals who do hacker-type tricks, e.g., leave   cardboard signs saying "bomb" in critical defen...
tiger team2 is  "Your codebooks have been stolen"   (they usually havent been) inside safes, etc.  After a successful   penetration, some high-ranking security type shows up the next   morning for a `security review and finds the sign, note, etc.,   ...
tiger team3 is  of tiger teams   sometimes lead to early retirement for base commanders and security   officers (see the {patch} entry for an example).   A subset of tiger teams are professional {cracker}s, testing the   security of military computer...
tiger team4 is  via networks or supposedly `secure comm channels.  Some of   their escapades, if declassified, would probably rank among the   greatest hacks of all times.  The term has been adopted in   commercial computer-security circles in this m...
time sink is  [poss. by analogy with `heat sink or `current sink] n.   A project that consumes unbounded amounts of time.
time T is  /tim T/ n. 1. An unspecified but usually well-understood   time, often used in conjunction with a later time T+1.   "Well meet on campus at time T or at Louies at   time T+1" means, in the context of going out for dinner   "We can meet on ...
time T2 is  Louies   itself a bit later."  (Louies is a Chinese restaurant in Palo Alto   that is a favorite with hackers.)  Had the number 30 been used instead   of the number 1, it would have implied that the travel time from   campus to Louies is ...
time T3 is  hasnt been decided on yet), you can meet half an hour later at   Louies than you could on campus and end up eating at the same time.   See also {since time T equals minus infinity}. 
times-or-divided-by is  [by analogy with `plus-or-minus] quant. Term   occasionally used when describing the uncertainty associated with a   scheduling estimate, for either humorous or brutally honest effect.   For a software project, the factor is u...
tinycrud is  /tinee-kruhd/ n. A pejorative used by habitues of older   game-oriented {MUD} versions for TinyMUDs and other   user-extensible {MUD} variants; esp. common among users of the   rather violent and competitive AberMUD and MIST systems.  Th...
tinycrud2 is  how (allegedly)   inconsistent and lacking in genuine atmosphere the scenarios   generated in user extensible MUDs can be.  Other common knocks on   them are that they feature little overall plot, bad game topology,   little competitive...
tinycrud3 is  alleged   horrors of the TinyMUD code itself.  This dispute is one of the MUD   worlds hardiest perennial {holy wars}. 
tip of the ice-cube is  [IBM] n. The visible part of something small and   insignificant.  Used as an ironic comment in situations where `tip   of the iceberg might be appropriate if the subject were actually   nontrivial.
tired iron is  [IBM] n. Hardware that is perfectly functional but   far enough behind the state of the art to have been superseded by new   products, presumably with sufficient improvement in bang-per-buck that   the old stuff is starting to look a b...
tits on a keyboard is  n. Small bumps on certain keycaps to keep   touch-typists registered (usually on the `5 of a numeric keypad,   and on the `F and `J of a QWERTY keyboard).
TLA is  /T-L-A/ [Three-Letter Acronym] n. 1. Self-describing   acronym for a species with which computing terminology is infested.   2. Any confusing acronym.  Examples include MCA, FTP, SNA, CPU,   MMU, SCCS, DMU, FPU, NNTP, TLA.  People who like th...
TLA2 is  three letters, just as not all four-letter   words have four letters.  One also hears of `ETLA (Extended   Three-Letter Acronym, pronounced /ee tee el ay/) being used to   describe four-letter acronyms.  The term `SFLA (Stupid Four-Letter   ...
TLA3 is  {YABA}.   The self-effacing phrase "TDM TLA" (Too Damn Many...) is   often used to bemoan the plethora of TLAs in use.  In 1989, a   random of the journalistic persuasion asked hacker Paul Boutin   "What do you think will be the biggest prob...
TLA4 is  straight-faced response "There are only   17,000 three-letter acronyms." (To be exact, there are 26^3   = 17,576.) 
TMRC is  /tmerk/ n. The Tech Model Railroad Club at MIT, one of   the wellsprings of hacker culture.  The 1959 `Dictionary of   the TMRC Language compiled by Peter Samson included several terms   which became basics of the hackish vocabulary (see esp...
TMRC2 is  legendary layout was already a marvel of   complexity.  The control system alone featured about 1200 relays.   There were {scram switch}es located at numerous places around   the room that could be pressed if something undesirable was about...
TMRC3 is  an obstruction.   Another feature of the system was a digital clock on the dispatch   board.  Normally it ran at some multiple of real time, but if   someone hit a scram switch the clock stopped and the display was   replaced with the word ...
TMRC4 is  the Bibliography), gives a   stimulating account of those early years.  TMRCs Power and Signals   group included most of the early PDP-1 hackers and the people who   later bacame the core of the MIT AI Lab staff.  Thirty years later   that ...
TMRC5 is  lexicon   accordingly includes a number of entries from a recent revision of   the TMRC Dictionary. 
to a first approximation is  1. [techspeak] When one is doing certain   numerical computations, an approximate solution may be computed by   any of several heuristic methods, then refined to a final value.   By using the starting point of a first app...
to a first approximation2 is  algorithm that converges more quickly to the   correct result.  2. In jargon, a preface to any comment that   indicates that the comment is only approximately true.  The remark   "To a first approximation, I feel good" m...
to a first approximation3 is  reveal that not all is perfect (e.g., a   nagging cough still remains after an illness). 
to a zeroth approximation is  [from `to a first approximation] A   *really* sloppy approximation; a wild guess.  Compare   {social science number}.
toast is  1. n. Any completely inoperable system or component, esp.   one that has just crashed and burned "Uh, oh ... I think the   serial board is toast."  2. vt. To cause a system to crash   accidentally, especially in a manner that requires manua...
toast2 is  {firewall machine} again." 
toaster is  n. 1. The archetypal really stupid application for an   embedded microprocessor controller; often used in comments that   imply that a scheme is inappropriate technology (but see   {elevator controller}).  "{DWIM} for an assembler?  Thatd...
toaster2 is  toaster!"  2. A very, very dumb   computer. "You could run this program on any dumb toaster."  See   {bitty box}, {Get a real computer!}, {toy}, {beige toaster}.   3. A Macintosh, esp. the Classic Mac.  Some hold that this is   implied b...
toaster3 is  my box   without toasters, but since then Ive added two boards and a second   disk drive." 
toeprint is  n. A {footprint} of especially small size.
toggle is  vt. To change a {bit} from whatever state it is in to the   other state; to change from 1 to 0 or from 0 to 1.  This comes from   `toggle switches, such as standard light switches, though the   word `toggle actually refers to the mechanism...
toggle2 is  which it is flipped rather than to the   fact that the switch has two positions.  There are four things you   can do to a bit set it (force it to be 1), clear (or zero) it,   leave it alone, or toggle it.  (Mathematically, one would say t...
toggle3 is  functions of one boolean   argument, but saying that is much less fun than talking about   toggling bits.) 
tool is  1. n. A program used primarily to create, manipulate, modify,   or analyze other programs, such as a compiler or an editor or a   cross-referencing program.  Oppose {app}, {operating system}.   2. [UNIX] An application program with a simple,...
tool2 is  interface designed specifically to be used   in programmed combination with other tools (see {filter}).   3. [MIT general to students there] vi. To work; to study (connotes   tedium).  The TMRC Dictionary defined this as "to set ones brain ...

factpacks/jargon-split.fact  view on Meta::CPAN

wannabee7 is  hackish prestige by fitting the   popular image of hackers.  Fortunately, to do this really well, one   has to actually become a wizard.  Nevertheless, old-time hackers   tend to share a poorly articulated disquiet about the change; amo...
wannabee8 is  about the effects of   public compendia of lore like this one. 
warm boot is  n. See {boot}.
wart is  n. A small, {crock}y {feature} that sticks out of an   otherwise {clean} design.  Something conspicuous for localized   ugliness, especially a special-case exception to a general rule.   For example, in some versions of `csh(1)', single quot...
wart2 is  except `!'.  In ANSI C,   the `??' syntax used obtaining ASCII characters in a foreign   environment is a wart.  See also {miswart}. 
washing machine is  n. Old-style 14-inch hard disks in floor-standing   cabinets.  So called because of the size of the cabinet and the   `top-loading' access to the media packs --- and, of course, they   were always set on `spin cycle'.  The washing...
washing machine2 is  it is even used in Russian hacker   jargon.  See also {walking drives}.  The thick channel cables   connecting these were called `bit hoses' (see {hose}). 
water MIPS is  n. (see {MIPS}, sense 2) Large, water-cooled   machines of either today's ECL-supercomputer flavor or yesterday's   traditional {mainframe} type.
wave a dead chicken is  v. To perform a ritual in the direction of   crashed software or hardware that one believes to be futile but   is nevertheless necessary so that others are satisfied that an   appropriate degree of effort has been expended.  "...
wave a dead chicken2 is  code, but I really think we've run into an   OS bug."  Compare {voodoo programming}, {rain dance}. 
weasel is  n. [Cambridge] A na"ive user, one who deliberately or   accidentally does things that are stupid or ill-advised.  Roughly   synonymous with {loser}.
wedged is  [from a common description of recto-cranial inversion] adj.   1. To be stuck, incapable of proceeding without help.  This is   different from having crashed.  If the system has crashed, then it   has become totally non-functioning.  If the...
wedged2 is  something but cannot make progress; it may be capable   of doing a few things, but not be fully operational.  For example,   a process may become wedged if it {deadlock}s with another (but   not all instances of wedging are deadlocks).  B...
wedged3 is  {hung}.  See also {gronk}, {locked   up}, {hosed}.  Describes a {deadlock}ed condition.  2. Often   refers to humans suffering misconceptions.  "He's totally wedged   --- he's convinced that he can levitate through meditation."   3. [UNIX...
wedged4 is  TTY left in   a losing state by abort of a screen-oriented program or one that   has messed with the line discipline in some obscure way. 
wedgie is  [Fairchild] n. A bug.  Prob. related to {wedged}.
wedgitude is  /wedj'i-t[y]ood/ n. The quality or state of being   {wedged}.
weeble is  /weeb'l/ [Cambridge] interj. Used to denote frustration,   usually at amazing stupidity.  "I stuck the disk in upside down."   "Weeble...." Compare {gurfle}.
weeds is  n. 1. Refers to development projects or algorithms that have   no possible relevance or practical application.  Comes from `off in   the weeds'.  Used in phrases like "lexical analysis for microcode   is serious weeds...."  2. At CDC/ETA be...
weeds2 is  weeds' was equivalent to IBM's {branch to   Fishkill} and mainstream hackerdom's {jump off into never-never   land}. 
weenie is  n. 1. When used with a qualifier (for example, as in   {UNIX weenie}, VMS weenie, IBM weenie) this can be either an   insult or a term of praise, depending on context, tone of voice,   and whether or not it is applied by a person who consi...

factpacks/jargon-split.fact  view on Meta::CPAN

Yet Another2 is  Simulated Annealing Algorithm'.  2. Of others'   work Describes something of which there are far too many.  See   also {YA-}, {YABA}, {YAUN}. 
You are not expected to understand this is  cav. [UNIX] The canonical   comment describing something {magic} or too complicated to   bother explaining properly.  From an infamous comment in the   context-switching code of the V6 UNIX kernel.
You know you've been hacking too long when... is  The set-up line   for a genre of one-liners told by hackers about themselves.  These   include the following   * not only do you check your email more often than your paper     mail, but you remember ...
You know you've been hacking too long when...2 is  postal one.   * your {SO} kisses you on the neck and the first thing you     think is "Uh, oh, {priority interrupt}."   * you go to balance your checkbook and discover that you're     doing it in oct...
You know you've been hacking too long when...3 is  value than your car.   * in your universe, `round numbers' are powers of 2, not 10.   * more than once, you have woken up recalling a dream in     some programming language.   * you realize you have ...
You know you've been hacking too long when...4 is  early version of this entry said "All but one of these   have been reliably reported as hacker traits (some of them quite   often).  Even hackers may have trouble spotting the ringer."  The   ringer ...
You know you've been hacking too long when...5 is  made up out   of whole cloth.  Although more respondents picked that one   out as fiction than any of the others, I also received multiple   independent reports of its actually happening. --- ESR] 
Your mileage may vary is  cav. [from the standard disclaimer attached   to EPA mileage ratings by American car manufacturers] 1. A ritual   warning often found in UNIX freeware distributions.  Translates   roughly as "Hey, I tried to write this porta...
Your mileage may vary2 is  system?"  2. A qualifier more   generally attached to advice.  "I find that sending flowers works   well, but your mileage may vary." 
Yow! is  /yow/ [from "Zippy the Pinhead" comix] interj. A favored hacker   expression of humorous surprise or emphasis.  "Yow!  Check out what   happens when you twiddle the foo option on this display hack!"   Compare {gurfle}.
yoyo mode is  n. The state in which the system is said to be when it   rapidly alternates several times between being up and being down.   Interestingly (and perhaps not by coincidence), many hardware   vendors give out free yoyos at Usenix exhibits....
yoyo mode2 is  SIGPLAN '88.  Tourists   staying at one of Atlanta's most respectable hotels were   subsequently treated to the sight of 200 of the country's top   computer scientists testing yo-yo algorithms in the lobby. 
Yu-Shiang Whole Fish is  /yoo-shyang hohl fish/ n. obs. The   character gamma (extended SAIL ASCII 0001001), which with a loop in   its tail looks like a little fish swimming down the page.  The term   is actually the name of a Chinese dish in which ...
Yu-Shiang Whole Fish2 is  covered with Yu-Shiang (or Yu-Hsiang)   sauce.  Usage primarily by people on the MIT LISP Machine, which   could display this character on the screen.  Tends to elicit   incredulity from people who hear about it second-hand....
zap is  1. n. Spiciness.  2. vt. To make food spicy.  3. vt. To make   someone `suffer' by making his food spicy.  (Most hackers love   spicy food.  Hot-and-sour soup is considered wimpy unless it makes   you wipe your nose for the rest of the meal.)...
zap2 is  correct; esp. used when the action   is performed with a debugger or binary patching tool.  Also implies   surgical precision.  "Zap the debug level to 6 and run it again."   In the IBM mainframe world, binary patches are applied to programs...
zap3 is  `superzap', whose file name is   `IMASPZAP' (I M A SuPerZAP).  5. vt. To erase or reset.  6. To   {fry} a chip with static electricity. "Uh oh --- I think that   lightning strike may have zapped the disk controller." 
zapped is  adj. Spicy.  This term is used to distinguish between food   that is hot (in temperature) and food that is *spicy*-hot.   For example, the Chinese appetizer Bon Bon Chicken is a kind of   chicken salad that is cold but zapped; by contrast,...
zapped2 is  zapped.  See also {{oriental food}},   {laser chicken}.  See {zap}, senses 1 and 2. 
zen is  vt. To figure out something by meditation or by a sudden flash   of enlightenment.  Originally applied to bugs, but occasionally   applied to problems of life in general.  "How'd you figure out the   buffer allocation problem?"  "Oh, I zenned...
zen2 is  time-extended version of zenning a system.   Compare {hack mode}.  See also {guru}. 

factpacks/jargon.fact  view on Meta::CPAN

bare metal3 => real development environment. 2. `Programming on the bare metal' is also used to describe a style of hand-hacking that relies on bit-level peculiarities of a particular hardware design, esp. tricks for speed and space optimization that...
bare metal4 => overlapping instructions (or, as in the famous case described in appendix A, interleaving of opcodes on a magnetic drum to minimize fetch delays due to the device's rotational latency). This sort of thing has become less common as the ...
bare metal5 => and machine resources have changed, but is still found in heavily constrained environments such as industrial embedded systems. See {real programmer}. In the world of personal computing, bare metal programming (especially in sense 1 bu...
bare metal6 => considered a {Good Thing}, or at least a necessary thing (because these machines have often been sufficiently slow and poorly designed to make it necessary; see ill-behaved). There, the term usually refers to bypassing the BIOS or OS i...
bare metal7 => application to directly access device registers and machine addresses. "To get 19.2 kilobaud on the serial port, you need to get down to the bare metal." People who can do this sort of thing are held in high regard. 
barf => /barf/ [from mainstream slang meaning `vomit'] 1. interj. Term of disgust. This is the closest hackish equivalent of the Val\-speak "gag me with a spoon". (Like, euwww!) See bletch. 2. vi. To say "Barf!" or emit some similar expression of dis...
barfulation => /bar`fyoo-lay'sh*n/ interj. Variation of barf used around the Stanford area. An exclamation, expressing disgust. On seeing some particularly bad code one might exclaim, "Barfulation! Who wrote this, Quux?"
barfulous => /bar'fyoo-l*s/ adj. (alt. `barfucious', /bar-fyoo-sh*s/) Said of something that would make anyone barf, if only for esthetic reasons.
baroque => adj. Feature-encrusted; complex; gaudy; verging on excessive. Said of hardware or (esp.) software designs, this has many of the connotations of elephantine or monstrosity but is less extreme and not pejorative in itself. "Metafont even has...
BartleMUD => /bar'tl-muhd/ n. Any of the MUDs derived from the original MUD game by Richard Bartle (see MUD). BartleMUDs are noted for their (usually slightly offbeat) humor, dry but friendly syntax, and lack of adjectives in object descriptions, so ...
BASIC => n. A programming language, originally designed for Dartmouth's experimental timesharing system in the early 1960s, which has since become the leading cause of brain-damage in proto-hackers. This is another case (like Pascal) of the bad thing...
batch => adj. 1. Non-interactive. Hackers use this somewhat more loosely than the traditional technical definitions justify; in particular, switches on a normally interactive program that prepare it to receive non-interactive command input are often ...
bathtub curve => n. Common term for the curve (resembling an end-to-end section of one of those claw-footed antique bathtubs) that describes the expected failure rate of electronics with time initially high, dropping to near 0 for most of the system'...
bathtub curve2 => `tires out'. See also {burn-in period}, {infant mortality}. 
baud => /bawd/ [simplified from its technical meaning] n. Bits per second. Hence kilobaud or Kbaud, thousands of bits per second. The technical meaning is `level transitions per second'; this coincides with bps only for two-level modulation with no f...
baud barf => /bawd barf/ n. The garbage one gets on the monitor when using a modem connection with some protocol setting (esp. line speed) incorrect, or when someone picks up a voice extension on the same line, or when really bad line noise disrupts ...
baud barf2 => completely random, by the way; hackers with a lot of serial-line experience can usually tell whether the device at the other end is expecting a higher or lower speed than the terminal is set to. *Really* experienced ones can identify pa...
baz => /baz/ [Stanford corruption of bar] n. 1. The third metasyntactic variable, after foo and bar and before quux (or, occasionally, `qux'; or local idiosyncracies like `rag', `zowie', etc.). "Suppose we have three functions FOO,BAR, and BAZ. FOO c...
bboard => /bee'bord/ [contraction of `bulletin board'] n. 1. Any electronic bulletin board; esp. used of BBS systems running on personal micros, less frequently of a USENET newsgroup (in fact, use of the term for a newsgroup generally marks one eithe...
BBS => /B-B-S/ [acronym, `Bulletin Board System'] n. An electronic bulletin board system; that is, a message database where people can log in and leave broadcast messages for others grouped (typically) into {topic group}s. Thousands of local BBS syst...
beam => [from Star Trek Classic's "Beam me up, Scotty!"] vt. To transfer softcopy of a file electronically; most often in combining forms such as `beam me a copy' or `beam that over to his site'. Compare blast, snarf, BLT.
beanie key => [Mac users] n. See {command key}.
beep => n.,v. Syn. feep. This term seems to be preferred among micro hobbyists.
beige toaster => n. A Macintosh. See toaster; compare Macintrash, maggotbox.
bells and whistles => [by analogy with the toyboxes on theater organs] n. Features added to a program or system to make it more flavorful from a hacker's point of view, without necessarily adding to its utility for its primary function. Distinguished...

factpacks/jargon.fact  view on Meta::CPAN

BIFF => /bif/ [USENET] n. The most famous pseudo, and the prototypical newbie. Articles from BIFF are characterized by all uppercase letters sprinkled liberally with bangs, typos, `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ HE"S A K00L DOOD...
biff => /bif/ vt. To notify someone of incoming mail. From the BSD utility `biff(1)', which was in turn named after the implementor's dog (it barked whenever the mailman came). No relation to BIFF.
Big Gray Wall => n. What faces a VMS user searching for documentation. A full VMS kit comes on a pallet, the documentation taking up around 15 feet of shelf space before the addition of layered products such as compilers, databases, multivendor netwo...
Big Gray Wall2 => Recent (since VMS version 5) DEC documentation comes with gray binders; under VMS version 4 the binders were orange (`big orange wall'), and under version 3 they were blue. See VMS. 
big iron => n. Large, expensive, ultra-fast computers. Used generally of number-crunching supercomputers such as Crays, but can include more conventional big commercial IBMish mainframes. Term of approval; compare {heavy metal}, oppose dinosaur.
Big Red Switch => [IBM] n. The power switch on a computer, esp. the `Emergency Pull' switch on an IBM mainframe or the power switch on an IBM PC where it really is large and red. "This !@%$% {bitty box} is hung again; time to hit the Big Red Switch."...
Big Red Switch2 => tune with the company's passion for TLAs, this is often acronymized as `BRS' (this has also become established on FidoNet and in the PC clone world). It is alleged that the emergency pull switch on an IBM 360/91 actually fired a no...
Big Red Switch3 => power feed; the BRSes on more recent machines physically drop a block into place so that they can't be pushed back in. People get fired for pulling them, especially inappropriately (see also molly-guard). Compare {power cycle}, {th...
the Big Room => n. The extremely large room with the blue ceiling and intensely bright light (during the day) or black ceiling with lots of tiny night-lights (during the night) found outside all computer installations. "He can't come to the phone rig...
big win => n. Serendipity. "Yes, those two physicists discovered high-temperature superconductivity in a batch of ceramic that had been prepared incorrectly according to their experimental schedule. Small mistake; big win!" See {win big}.
big-endian => [From Swift's `Gulliver's Travels' via the famous paper `On Holy Wars and a Plea for Peace' by Danny Cohen, USC/ISI IEN 137, dated April 1, 1980] adj. 1. Describes a computer architecture in which, within a given multi-byte numeric repr...
bignum => /big'nuhm/ [orig. from MIT MacLISP] n. 1. [techspeak] A multiple-precision computer representation for very large integers. More generally, any very large number. "Have you ever looked at the United States Budget? There's bignums for you!" ...
bigot => n. A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see {religious issues}). Usually found with a specifier; thus, `cray bigot', {ITS bigot}, `APL bigot', `VMS bigot', {Berkele...
bit => [from the mainstream meaning and `Binary digIT'] n. 1. [techspeak] The unit of information; the amount of information obtained by asking a yes-or-no question for which the two outcomes are equally probable. 2. [techspeak] A computational quant...
bit bang => n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesti...
bit bang2 => and output at the same time) is one way to separate the real hackers from the wannabees. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO b...
bit bang3 => instance of the {cycle of reincarnation}, this technique is now (1991) coming back into use on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART. 
bit bashing => n. (alt. `bit diddling' or {bit twiddling}) Term used to describe any of several kinds of low-level programming characterized by manipulation of bit, flag, nybble, and other smaller-than-character-sized pieces of data; these include lo...
bit bashing2 => encryption algorithms, checksum and error-correcting codes, hash functions, some flavors of graphics programming (see bitblt), and assembler/compiler code generation. May connote either tedium or a real technical challenge (more usual...
bit bashing3 => decoding for the new tape driver looks pretty solid but the bit-bashing for the control registers still has bugs." See also {bit bang}, {mode bit}. 
bit bucket => n. 1. The universal data sink (originally, the mythical receptacle used to catch bits when they fall off the end of a register during a shift instruction). Discarded, lost, or destroyed data is said to have `gone to the bit bucket'. On ...

factpacks/jargon.fact  view on Meta::CPAN

bletch => /blech/ [from Yiddish/German `brechen', to vomit, poss. via comic-strip exclamation `blech'] interj. Term of disgust. Often used in "Ugh, bletch". Compare barf.
bletcherous => /blech'*-r*s/ adj. Disgusting in design or function; esthetically unappealing. This word is seldom used of people. "This keyboard is bletcherous!" (Perhaps the keys don't work very well, or are misplaced.) See losing, cretinous, bagbit...
blinkenlights => /blink'*n-litz/ n. Front-panel diagnostic lights on a computer, esp. a dinosaur. Derives from the last word of the famous blackletter-Gothic sign in mangled pseudo-German that once graced about half the computer rooms in the English-...
blit => /blit/ vt. 1. To copy a large array of bits from one part of a computer's memory to another part, particularly when the memory is being used to determine what is shown on a display screen. "The storage allocator picks through the table and co...
blitter => /blit'r/ n. A special-purpose chip or hardware system built to perform blit operations, esp. used for fast implementation of bit-mapped graphics. The Commodore Amiga and a few other micros have these, but in 1991 the trend is away from the...
blivet => /bliv'*t/ [allegedly from a World War II military term meaning "ten pounds of manure in a five-pound bag"] n. 1. An intractable problem. 2. A crucial piece of hardware that can't be fixed or replaced if it breaks. 3. A tool that has been ha...
block => [from process scheduling terminology in OS theory] 1. vi. To delay or sit idle while waiting for something. "We're blocking until everyone gets here." Compare busy-wait. 2. `block on' vt. To block, waiting for (something). "Lunch is blocked ...
block transfer computations => n. From the television series "Dr. Who", in which it referred to computations so fiendishly subtle and complex that they could not be performed by machines. Used to refer to any task that should be expressible as an alg...
blow an EPROM => /bloh *n ee'prom/ v. (alt. `blast an EPROM', `burn an EPROM') To program a read-only memory, e.g. for use with an embedded system. This term arises because the programming process for the Programmable Read-Only Memories (PROMs) that ...
blow an EPROM2 => Programmable Read-Only Memories (EPROMs) involved intentionally blowing tiny electrical fuses on the chip. Thus, one was said to `blow' (or `blast') a PROM, and the terminology carried over even though the write process on EPROMs is...
blow away => vt. To remove (files and directories) from permanent storage, generally by accident. "He reformatted the wrong partition and blew away last night's netnews." Oppose nuke.
blow out => vi. Of software, to fail spectacularly; almost as serious as {crash and burn}. See {blow past}, {blow up}.
blow past => vt. To {blow out} despite a safeguard. "The server blew past the 5K reserve buffer."
blow up => vi. 1. [scientific computation] To become unstable. Suggests that the computation is diverging so rapidly that it will soon overflow or at least go nonlinear. 2. Syn. {blow out}.
BLT => /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. Synonym for blit. This is the original form of blit and the ancestor of bitblt. It referred to any large bit-field copy or move operation (one resource-intensive memory-shuffling operation done on pre-...
Blue Book => n. 1. Informal name for one of the three standard references on the page-layout and graphics-control language PostScript (`PostScript Language Tutorial and Cookbook', Adobe Systems, Addison-Wesley 1985, QA76.73.P67P68, ISBN 0-201-10179-3...
Blue Book2 => known as the {Green Book} and {Red Book}. 2. Informal name for one of the three standard references on Smalltalk `Smalltalk-80 The Language and its Implementation', David Robson, Addison-Wesley 1983, QA76.8.S635G64, ISBN 0-201-11371-63 ...
Blue Book3 => and red books). 3. Any of the 1988 standards issued by the CCITT's ninth plenary assembly. Until now, they have changed color each review cycle (1984 was {Red Book}, 1992 would be {Green Book}); however, it is rumored that this conventi...
Blue Book4 => 1992. These include, among other things, the X.400 email spec and the Group 1 through 4 fax standards. See also {{book titles}}. 
Blue Glue => [IBM] n. IBM's SNA (Systems Network Architecture), an incredibly losing and bletcherous communications protocol widely favored at commercial shops that don't know any better. The official IBM definition is "that which binds blue boxes to...
Blue Glue2 => loathing}. It may not be irrelevant that {Blue Glue} is the trade name of a 3M product that is commonly used to hold down the carpet squares to the removable panel floors common in {dinosaur pens}. A correspondent at U. Minn. reports th...

factpacks/jargon.fact  view on Meta::CPAN

bounce message2 => Bounce messages can themselves fail, with occasionally ugly results; see {sorcerer's apprentice mode}. The term `bounce mail' is also common. 
box => n. 1. A computer; esp. in the construction `foo box' where foo is some functional qualifier, like `graphics', or the name of an OS (thus, `UNIX box', `MS-DOS box', etc.) "We preprocess the data on UNIX boxes before handing it up to the mainfra...
boxed comments => n. Comments (explanatory notes attached to program instructions) that occupy several lines by themselves; so called because in assembler and C code they are often surrounded by a box in a style something like this Common variants of...
boxed comments2 => column 2 or add a matching row of asterisks closing the right side of the box. The sparest variant omits all but the comment delimiters themselves; the `box' is implied. Oppose {winged comments}. 
boxen => /bok'sn/ [by analogy with VAXen] pl.n. Fanciful plural of box often encountered in the phrase `UNIX boxen', used to describe commodity {UNIX} hardware. The connotation is that any two UNIX boxen are interchangeable.
boxology => /bok-sol'*-jee/ n. Syn. {ASCII art}. This term implies a more restricted domain, that of box-and-arrow drawings. "His report has a lot of boxology in it." Compare macrology.
bozotic => /boh-zoh'tik/ or /boh-zo'tik/ [from the name of a TV clown even more losing than Ronald McDonald] adj. Resembling or having the quality of a bozo; that is, clownish, ludicrously wrong, unintentionally humorous. Compare wonky, demented. Not...
BQS => /B-Q-S/ adj. Syn. {Berkeley Quality Software}.
brain dump => n. The act of telling someone everything one knows about a particular topic or project. Typically used when someone is going to let a new party maintain a piece of code. Conceptually analogous to an operating system {core dump} in that ...
brain dump2 => before an exit. "You'll have to give me a brain dump on FOOBAR before you start your new job at HackerCorp." See {core dump} (sense 4). At Sun, this is also known as `TOI' (transfer of information). 
brain-damaged => 1. [generalization of `Honeywell Brain Damage' (HBD), a theoretical disease invented to explain certain utter cretinisms in Honeywell {Multics}] adj. Obviously wrong; cretinous; demented. There is an implication that the person respo...
brain-dead => adj. Brain-damaged in the extreme. It tends to imply terminal design failure rather than malfunction or simple stupidity. "This comm program doesn't know how to send a break --- how brain-dead!"
braino => /bray'no/ n. Syn. for thinko.
branch to Fishkill => [IBM from the location of one of the corporation's facilities] n. Any unexpected jump in a program that produces catastrophic or just plain weird results. See {jump off into never-never land}, hyperspace.
brand brand brand => n. Humorous catch-phrase from BartleMUDs, in which players were described carrying a list of objects, the most common of which would usually be a brand. Often used as a joke in {talk mode} as in "Fred the wizard is here, carrying...
brand brand brand2 => kettle broadsword flamethrower". A brand is a torch, of course; one burns up a lot of those exploring dungeons. Prob. influenced by the famous Monty Python "Spam" skit. 
break => 1. vt. To cause to be broken (in any sense). "Your latest patch to the editor broke the paragraph commands." 2. v. (of a program) To stop temporarily, so that it may debugged. The place where it stops is a `breakpoint'. 3. [techspeak] vi. To...
breath-of-life packet => [XEROX PARC] n. An Ethernet packet that contained bootstrap (see boot) code, periodically sent out from a working computer to infuse the `breath of life' into any computer on the network that had happened to crash. The machin...
breath-of-life packet2 => would wait for such a packet after a catastrophic error. 
breedle => n. See feep.
bring X to its knees => v. To present a machine, operating system, piece of software, or algorithm with a load so extreme or pathological that it grinds to a halt. "To bring a MicroVAX to its knees, try twenty users running vi --- or four running EMA...
brittle => adj. Said of software that is functional but easily broken by changes in operating environment or configuration, or by any minor tweak to the software itself. Also, any system that responds inappropriately and disastrously to expected exte...
broadcast storm => n. An incorrect packet broadcast on a network that causes most hosts to respond all at once, typically with wrong answers that start the process over again. See {network meltdown}.
broken => adj. 1. Not working properly (of programs). 2. Behaving strangely; especially (when used of people) exhibiting extreme depression.
broken arrow => [IBM] n. The error code displayed on line 25 of a 3270 terminal (or a PC emulating a 3270) for various kinds of protocol violations and "unexpected" error conditions (including connection to a down computer). On a PC, simulated with `...
broken arrow2 => characters overstruck. In true luser fashion, the original documentation of these codes (visible on every 3270 terminal, and necessary for debugging network problems) was confined to an IBM customer engineering manual. Note to apprec...
broken arrow3 => know that `broken arrow' is also military jargon for an accident involving nuclear weapons.... 
broket => /broh'k*t/ or /broh'ket`/ [by analogy with `bracket' a `broken bracket'] n. Either of the characters `<' and `>', when used as paired enclosing delimiters. This word originated as a contraction of the phrase `broken bracket', that is, a bra...
Brooks's Law => prov. "Adding manpower to a late software project makes it later" --- a result of the fact that the advantage from splitting work among N programmers is O(N) (that is, proportional to N), but the complexity and communications cost ass...
Brooks's Law2 => merging their work is O(N^2) (that is, proportional to the square of N). The quote is from Fred Brooks, a manager of IBM's OS/360 project and author of `The Mythical Man-Month' (Addison-Wesley, 1975, ISBN 0-201-00650-2), an excellent...
Brooks's Law3 => The myth in question has been most tersely expressed as "Programmer time is fungible" and Brooks established conclusively that it is not. Hackers have never forgotten his advice; too often, management does. See also creationism, {sec...
BRS => /B-R-S/ n. Syn. {Big Red Switch}. This abbreviation is fairly common on-line.
brute force => adj. Describes a primitive programming style, one in which the programmer relies on the computer's processing power instead of using his or her own intelligence to simplify the problem, often ignoring problems of scale and applying na"...
brute force2 => directly to large ones. The canonical example of a brute-force algorithm is associated with the `traveling salesman problem' (TSP), a classical NP-hard problem Suppose a person is in, say, Boston, and wishes to drive to N other cities...
brute force3 => visit them in order to minimize the distance travelled? The brute-force method is to simply generate all possible routes and compare the distances; while guaranteed to work and simple to implement, this algorithm is clearly very stupi...
brute force4 => obviously absurd routes (like going from Boston to Houston via San Francisco and New York, in that order). For very small N it works well, but it rapidly becomes absurdly inefficient when N increases (for N = 15, there are already 1,3...
brute force5 => consider, and for N = 1000 --- well, see bignum). See also NP-. A more simple-minded example of brute-force programming is finding the smallest number in a large list by first using an existing program to sort the list in ascending or...

factpacks/jargon.fact  view on Meta::CPAN

bubble sort2 => is not very good relative to other methods and is the one typically stumbled on by na"ive and untutored programmers, hackers consider it the canonical example of a na"ive algorithm. The canonical example of a really *bad* algorithm is...
bubble sort3 => might be used out of ignorance, but any use of bogo-sort could issue only from brain damage or willful perversity. 
bucky bits => /buh'kee bits/ n. 1. obs. The bits produced by the CONTROL and META shift keys on a SAIL keyboard, resulting in a 9-bit keyboard character set. The MIT AI TV (Knight) keyboards extended this with TOP and separate left and right CONTROL ...
bucky bits2 => character set; later, LISP Machines added such keys as SUPER, HYPER, and GREEK (see {space-cadet keyboard}). 2. By extension, bits associated with `extra' shift keys on any keyboard, e.g., the ALT on an IBM PC or command and option key...
bucky bits3 => that `bucky bits' were named for Buckminster Fuller during a period when he was consulting at Stanford. Actually, `Bucky' was Niklaus Wirth's nickname when *he* was at Stanford; he first suggested the idea of an EDIT key to set the 8th...
bucky bits4 => character. This was used in a number of editors written at Stanford or in its environs (TV-EDIT and NLS being the best-known). The term spread to MIT and CMU early and is now in general use. See {double bucky}, {quadruple bucky}. 
buffer overflow => n. What happens when you try to stuff more data into a buffer (holding area) than it can handle. This may be due to a mismatch in the processing rates of the producing and consuming processes (see overrun), or because the buffer is...
buffer overflow2 => data that must accumulate before a piece of it can be processed. For example, in a text-processing tool that crunches a line at a time, a short line buffer can result in lossage as input from a long line overflows the buffer and t...
buffer overflow3 => defensive programming would check for overflow on each character and stop accepting data when the buffer is full up. The term is used of and by humans in a metaphorical sense. "What time did I agree to meet you? My buffer must hav...
buffer overflow4 => phone my buffer is going to overflow." See also spam, {overrun screw}. 
bug => n. An unwanted and unintended property of a program or hardware, esp. one that causes it to malfunction. Antonym of feature. Examples "There's a bug in the editor it writes things out backwards." "The system crashed because of a hardware bug."...
bug-compatible => adj. Said of a design or revision that has been badly compromised by a requirement to be compatible with fossils or misfeatures in other programs or (esp.) previous releases of itself. "MS-DOS 2.0 used \ as a path separator to be bu...
bug-for-bug compatible => n. Same as bug-compatible, with the additional implication that much tedious effort went into ensuring that each (known) bug was replicated.
buglix => /buhg'liks/ n. Pejorative term referring to DEC's ULTRIX operating system in its earlier *severely* buggy versions. Still used to describe ULTRIX, but without venom. Compare HP-SUX.
bulletproof => adj. Used of an algorithm or implementation considered extremely robust; lossage-resistant; capable of correctly recovering from any imaginable exception condition. This is a rare and valued quality. Syn. armor-plated.
bum => 1. vt. To make highly efficient, either in time or space, often at the expense of clarity. "I managed to bum three more instructions out of that code." "I spent half the night bumming the interrupt code." 2. To squeeze out excess; to remove so...
bump => vt. Synonym for increment. Has the same meaning as C's ++ operator. Used esp. of counter variables, pointers, and index dummies in `for', `while', and `do-while' loops.
burble => [from Lewis Carroll's "Jabberwocky"] v. Like flame, but connotes that the source is truly clueless and ineffectual (mere flamers can be competent). A term of deep contempt. "There's some guy on the phone burbling about how he got a DISK FUL...
buried treasure => n. A surprising piece of code found in some program. While usually not wrong, it tends to vary from crufty to bletcherous, and has lain undiscovered only because it was functionally correct, however horrible it is. Used sarcastical...
buried treasure2 => anything *but* treasure. Buried treasure almost always needs to be dug up and removed. "I just found that the scheduler sorts its queue using {bubble sort}! Buried treasure!" 
burn-in period => n. 1. A factory test designed to catch systems with marginal components before they get out the door; the theory is that burn-in will protect customers by outwaiting the steepest part of the {bathtub curve} (see {infant mortality})....
burn-in period2 => length in which a person using a computer is so intensely involved in his project that he forgets basic needs such as food, drink, sleep, etc. Warning Excessive burn-in can lead to burn-out. See {hack mode}, {larval stage}. 
burst page => n. Syn. banner, sense 1.
busy-wait => vi. Used of human behavior, conveys that the subject is busy waiting for someone or something, intends to move instantly as soon as it shows up, and thus cannot do anything else at the moment. "Can't talk now, I'm busy-waiting till Bill ...
buzz => vi. 1. Of a program, to run with no indication of progress and perhaps without guarantee of ever finishing; esp. said of programs thought to be executing tight loops of code. A program that is buzzing appears to be catatonic, but you never ge...
BWQ => /B-W-Q/ [IBM acronym, `Buzz Word Quotient'] The percentage of buzzwords in a speech or documents. Usually roughly proportional to bogosity. See TLA.
by hand => adv. Said of an operation (especially a repetitive, trivial, and/or tedious one) that ought to be performed automatically by the computer, but which a hacker instead has to step tediously through. "My mailer doesn't have a command to inclu...
by hand2 => replying to, so I have to do it by hand." This does not necessarily mean the speaker has to retype a copy of the message; it might refer to, say, dropping into a subshell from the mailer, making a copy of one's mailbox file, reading that ...
by hand3 => and bottom of the message in question, deleting the rest of the file, inserting `>' characters on each line, writing the file, leaving the editor, returning to the mailer, reading the file in, and later remembering to delete the file. Com...
byte => /bit/ [techspeak] n. A unit of memory or data equal to the amount used to represent one character; on modern architectures this is usually 8 bits, but may be 9 on 36-bit machines. Some older architectures used `byte' for quantities of 6 or 7 ...
bytesexual => /bit`sek'shu-*l/ adj. Said of hardware, denotes willingness to compute or pass data in either big-endian or little-endian format (depending, presumably, on a {mode bit} somewhere). See also {NUXI problem}.*C n. 1. The third letter of th...
calculator => [Cambridge] n. Syn. for {bitty box}.
can => vt. To abort a job on a time-sharing system. Used esp. when the person doing the deed is an operator, as in "canned from the {console}". Frequently used in an imperative sense, as in "Can that print job, the LPT just popped a sprocket!" Synony...
canonical => [historically, `according to religious law'] adj. The usual or standard state or manner of something. This word has a somewhat more technical meaning in mathematics. Two formulas such as 9 + x and x + 9 are said to be equivalent because ...
card => n. 1. An electronic printed-circuit board (see also {tall card}, {short card}. 2. obs. Syn. {{punched card}}.
card walloper => n. An EDP programmer who grinds out batch programs that do stupid things like print people's paychecks. Compare {code grinder}. See also {{punched card}}, {eighty-column mind}.
careware => /keir'weir/ n. Shareware for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge. Syn. charityware; compare crippleware, sense 2.
cargo cult programming => n. A style of (incompetent) programming dominated by ritual inclusion of code or program structures that serve no real purpose. A cargo cult programmer will usually explain the extra code as a way of working around some bug ...
cargo cult programming2 => neither the bug nor the reason the code apparently avoided the bug was ever fully understood (compare {shotgun debugging}, {voodoo programming}). The term `cargo cult' is a reference to aboriginal religions that grew up in ...
cargo cult programming3 => The practices of these cults center on building elaborate mockups of airplanes and military style landing strips in the hope of bringing the return of the god-like airplanes that brought such marvelous cargo during the war....
cargo cult programming4 => Richard Feynman's characterization of certain practices as "cargo cult science" in his book `Surely You're Joking, Mr. Feynman' (W. W. Norton & Co, New York 1985, ISBN 0-393-01921-7). 
case and paste => [from `cut and paste'] n. 1. The addition of a new feature to an existing system by selecting the code from an existing feature and pasting it in with minor changes. Common in telephony circles because most operations in a telephone...
case and paste2 => statements. Leads to {software bloat}. In some circles of EMACS users this is called `programming by Meta-W', because Meta-W is the EMACS command for copying a block of text to a kill buffer in preparation to pasting it in elsewher...
case and paste3 => implying that the programmer is acting mindlessly rather than thinking carefully about what is required to integrate the code for two similar cases. 

factpacks/jargon.fact  view on Meta::CPAN

chad box => n. {Iron Age} card punches contained boxes inside them, about the size of a lunchbox (or in some models a large wastebasket), that held the chad (sense 2). You had to open the covers of the card punch periodically and empty the chad box. ...
chad box2 => the equivalent device in the CPU enclosure, which was typically across the room in another great gray-and-blue box. 
chain => [orig. from BASIC's `CHAIN' statement] vi. To hand off execution to a child or successor without going through the OS command interpreter that invoked it. The state of the parent program is lost and there is no returning to it. Though this f...
char => /keir/ or /char/; rarely, /kar/ n. Shorthand for `character'. Esp. used by C programmers, as `char' is C's typename for character data.
charityware => /char'it-ee-weir`/ n. Syn. careware.
chase pointers => 1. vi. To go through multiple levels of indirection, as in traversing a linked list or graph structure. Used esp. by programmers in C, where explicit pointers are a very common data type. This is techspeak, but it remains jargon whe...
chase pointers2 => chasing pointers. Bob said you could tell me who to talk to about...." See {dangling pointer} and snap. 2. [Cambridge] `pointer chase' or `pointer hunt' The process of going through a dump (interactively or on a large piece of pape...
chase pointers3 => following dynamic data-structures. Used only in a debugging context. 
chemist => [Cambridge] n. Someone who wastes computer time on number-crunching when you'd far rather the machine were doing something more productive, such as working out anagrams of your name or printing Snoopy calendars or running life patterns. Ma...
Chernobyl chicken => n. See {laser chicken}.
Chernobyl packet => /cher-noh'b*l pak'*t/ n. A network packet that induces {network meltdown} (the result of a {broadcast storm}), in memory of the 1987 nuclear accident at Chernobyl in the Ukraine. The typical case of this is an IP Ethernet datagram...
Chernobyl packet2 => both source and destination Ether and IP address set as the respective broadcast addresses for the subnetworks being gated between. Compare {Christmas tree packet}. 
chicken head => [Commodore] n. The Commodore Business Machines logo, which strongly resembles a poultry part. Rendered in ASCII as `C='. With the arguable exception of the Amiga (see amoeba), Commodore's machines are notoriously crocky little {bitty ...
chicken head2 => Thus, this usage may owe something to Philip K. Dick's novel `Do Androids Dream of Electric Sheep?' (the basis for the movie `Blade Runner'), in which a `chickenhead' is a mutant with below-average intelligence. 
chiclet keyboard => n. A keyboard with small rectangular or lozenge-shaped rubber or plastic keys that look like pieces of chewing gum. (Chiclets is the brand name of a variety of chewing gum that does in fact resemble the keys of chiclet keyboards.)...
chiclet keyboard2 => IBM PCjr keyboard. Vendors unanimously liked these because they were cheap, and a lot of early portable and laptop products got launched using them. Customers rejected the idea with almost equal unanimity, and chiclets are not of...
chine nual => /sheen'yu-*l/ [MIT] n.,obs. The Lisp Machine Manual, so called because the title was wrapped around the cover so only those letters showed on the front.
Chinese Army technique => n. Syn. {Mongolian Hordes technique}.
choke => v. To reject input, often ungracefully. "Nuls make System V's `lpr(1)' choke." "I tried building an EMACS binary to use X, but `cpp(1)' choked on all those `#define's." See barf, gag, vi.
chomp => vi. To lose; specifically, to chew on something of which more was bitten off than one can. Probably related to gnashing of teeth. See bagbiter. A hand gesture commonly accompanies this. To perform it, hold the four fingers together and place...
chomper => n. Someone or something that is chomping; a loser. See loser, bagbiter, chomp.

factpacks/jargon.fact  view on Meta::CPAN

corge => /korj/ [originally, the name of a cat] n. Yet another meta-syntactic variable, invented by Mike Gallaher and propagated by the GOSMACS documentation. See grault.
cosmic rays => n. Notionally, the cause of {bit rot}. However, this is a semi-independent usage that may be invoked as a humorous way to handwave away any minor randomness that doesn't seem worth the bother of investigating. "Hey, Eric --- I just got...
cosmic rays2 => tube, where did that come from?" "Cosmic rays, I guess." Compare sunspots, {phase of the moon}. The British seem to prefer the usage `cosmic showers'; `alpha particles' is also heard, because stray alpha particles passing through a me...
cosmic rays3 => errors (this becomes increasingly more likely as memory sizes and densities increase). Factual note Alpha particles cause bit rot, cosmic rays do not (except occasionally in spaceborne computers). Intel could not explain random bit dr...
cosmic rays4 => hypothesis was cosmic rays. So they created the World's Largest Lead Safe, using 25 tons of the stuff, and used two identical boards for testing. One was placed in the safe, one outside. The hypothesis was that if cosmic rays were cau...
cosmic rays5 => a statistically significant difference between the error rates on the two boards. They did not observe such a difference. Further investigation demonstrated conclusively that the bit drops were due to alpha particle emissions from tho...
cosmic rays6 => uranium) in the encapsulation material. Since it is impossible to eliminate these radioactives (they are uniformly distributed through the earth's crust, with the statistically insignificant exception of uranium lodes) it became obvio...
cosmic rays7 => to withstand these hits. 
cough and die => v. Syn. barf. Connotes that the program is throwing its hands up by design rather than because of a bug or oversight. "The parser saw a control-A in its input where it was looking for a printable, so it coughed and died."
cowboy => [Sun, from William Gibson's cyberpunk SF] n. Synonym for hacker. It is reported that at Sun this word is often said with reverence.
CP/M => /C-P-M/ n. [Control Program for Microcomputers] An early microcomputer OS written by hacker Gary Kildall for 8080- and Z80-based machines, very popular in the late 1970s but virtually wiped out by MS-DOS after the release of the IBM PC in 198...
CPU Wars => /C-P-U worz/ n. A 1979 large-format comic by Chas Andres chronicling the attempts of the brainwashed androids of IPM (Impossible to Program Machines) to conquer and destroy the peaceful denizens of HEC (Human Engineered Computers). This r...
CPU Wars2 => many references to ADVENT and the immortal line "Eat flaming death, minicomputer mongrels!" (uttered, of course, by an IPM stormtrooper). It is alleged that the author subsequently received a letter of appreciation on IBM company station...
CPU Wars3 => J. Watson Research Laboratories (then, as now, one of the few islands of true hackerdom in the IBM archipelago). The lower loop of the B in the IBM logo, it is said, had been carefully whited out. See {eat flaming death}. 
cracker => n. One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of hacker (q.v., sense 8). An earlier attempt to establish `worm' in this sense around 1981--82 on USENET was largely a failure.
crank => [from automotive slang] vt. Verb used to describe the performance of a machine, especially sustained performance. "This box cranks (or, cranks at) about 6 megaflops, with a burst mode of twice that on vectorized operations."
crash => 1. n. A sudden, usually drastic failure. Most often said of the system (q.v., sense 1), sometimes of magnetic disk drives. "Three lusers lost their files in last night's disk crash." A disk crash that involves the read/write heads dropping o...
crash and burn => vi.,n. A spectacular crash, in the mode of the conclusion of the car-chase scene in the movie "Bullitt" and many subsequent imitators. Sun-3 monitors losing the flyback transformer and lightning strikes on VAX-11/780 backplanes are ...
crash and burn2 => The construction `crash-and-burn machine' is reported for a computer used exclusively for alpha or beta testing, or reproducing bugs (i.e., not for development). The implication is that it wouldn't be such a disaster if that machin...
crash and burn3 => would be inconvenienced. 
crawling horror => n. Ancient crufty hardware or software that is kept obstinately alive by forces beyond the control of the hackers at a site. Like {dusty deck} or gonkulator, but connotes that the thing described is not just an irritation but an ac...

factpacks/jargon.fact  view on Meta::CPAN

cruftsmanship => /kruhfts'm*n-ship / n. [from cruft] The antithesis of craftsmanship.
crufty => /kruhf'tee/ [origin unknown; poss. from `crusty' or `cruddy'] adj. 1. Poorly built, possibly over-complex. The canonical example is "This is standard old crufty DEC software". In fact, one fanciful theory of the origin of `crufty' holds tha...
crumb => n. Two binary digits; a quad. Larger than a bit, smaller than a nybble. Considered silly. Syn. tayste.
crunch => 1. vi. To process, usually in a time-consuming or complicated way. Connotes an essentially trivial operation that is nonetheless painful to perform. The pain may be due to the triviality's being embedded in a loop from 1 to 1,000,000,000. "...
cruncha cruncha cruncha => /kruhn'ch* kruhn'ch* kruhn'ch*/ interj. An encouragement sometimes muttered to a machine bogged down in a serious grovel. Also describes a notional sound made by groveling hardware. See {wugga wugga}, grind (sense 3).
cryppie => /krip'ee/ n. A cryptographer. One who hacks or implements cryptographic software or hardware.
CTSS => /C-T-S-S/ n. Compatible Time-Sharing System. An early (1963) experiment in the design of interactive time-sharing operating systems, ancestral to {Multics}, {UNIX}, and {ITS}. The name {ITS} (Incompatible Time-sharing System) was a hack on CT...
CTY => /sit'ee/ or /C-T-Y/ n. [MIT] The terminal physically associated with a computer's system {console}. The term is a contraction of `Console tty', that is, `Console TeleTYpe'. This {ITS}- and {TOPS-10}-associated term has become less common, as m...
cube => n. 1. [short for `cubicle'] A module in the open-plan offices used at many programming shops. "I've got the manuals in my cube." 2. A NeXT machine (which resembles a matte-black cube).
cubing => [parallel with `tubing'] vi. 1. Hacking on an IPSC (Intel Personal SuperComputer) hypercube. "Louella's gone cubing *again*!!" 2. Hacking Rubik's Cube or related puzzles, either physically or mathematically. 3. An indescribable form of self...
cursor dipped in X => n. There are a couple of metaphors in English of the form `pen dipped in X' (perhaps the most common values of X are `acid', `bile', and `vitriol'). These map over neatly to this hackish usage (the cursor being what moves, leavi...
cursor dipped in X2 => composing on-line). "Talk about a nastygram! He must've had his cursor dipped in acid when he wrote that one!" 
cuspy => /kuhs'pee/ [WPI from the DEC acronym CUSP, for `Commonly Used System Program', i.e., a utility program used by many people] adj. 1. (of a program) Well-written. 2. Functionally excellent. A program that performs well and interfaces well to u...
cut a tape => [poss. fr. mainstream `cut a check' or from the recording industry's `cut a record'] vi. To write a software or document distribution on magnetic tape for shipment. Has nothing to do with physically cutting the medium! Though this usage...
cut a tape2 => speaks of analogously `cutting a disk' or anything else in this sense. 
cybercrud => /si'ber-kruhd/ [coined by Ted Nelson] n. Obfuscatory tech-talk. Verbiage with a high MEGO factor. The computer equivalent of bureaucratese.
cyberpunk => /si'ber-puhnk/ [orig. by SF writer Bruce Bethke and/or editor Gardner Dozois] n.,adj. A subgenre of SF launched in 1982 by William Gibson's epoch-making novel `Neuromancer' (though its roots go back through Vernor Vinge's `True Names' (s...
cyberspace => /si'ber-spays/ n. 1. Notional `information-space' loaded with visual cues and navigable with brain-computer interfaces called `cyberspace decks'; a characteristic prop of cyberpunk SF. At the time of this writing (mid-1991), serious eff...
cycle => 1. n. The basic unit of computation. What every hacker wants more of (noted hacker Bill Gosper describes himself as a "cycle junkie"). One can describe an instruction as taking so many `clock cycles'. Often the computer can access its memory...
cycle crunch => n. A situation where the number of people trying to use the computer simultaneously has reached the point where no one can get enough cycles because they are spread too thin and the system has probably begun to thrash. This is an inev...
cycle crunch2 => applied to timesharing. Usually the only solution is to buy more computer. Happily, this has rapidly become easier in recent years, so much so that the very term `cycle crunch' now has a faintly archaic flavor; most hackers now use w...
cycle crunch3 => opposed to traditional timesharing systems. 
cycle drought => n. A scarcity of cycles. It may be due to a {cycle crunch}, but it could also occur because part of the computer is temporarily not working, leaving fewer cycles to go around. "The {high moby} is down, so we're running with only half...
cycle drought2 => There will be a cycle drought until it's fixed." 
cycle of reincarnation => [coined by Ivan Sutherland ca. 1970] n. Term used to refer to a well-known effect whereby function in a computing system family is migrated out to special-purpose peripheral hardware for speed, then the peripheral evolves to...
cycle of reincarnation2 => its job, then somebody notices that it is inefficient to support two asymmetrical processors in the architecture and folds the function back into the main CPU, at which point the cycle begins again. Several iterations of th...
cycle of reincarnation3 => graphics-processor design, and at least one or two in communications and floating-point processors. Also known as `the Wheel of Life', `the Wheel of Samsara', and other variations of the basic Hindu/Buddhist theological ide...
cycle server => n. A powerful machine that exists primarily for running large batch jobs. Implies that interactive tasks such as editing are done on other machines on the network, such as workstations.*D.C. Power Lab n. The former site of {SAIL}. Hac...
cycle server2 => funny because the obvious connection to electrical engineering was nonexistent --- the lab was named for a Donald C. Power. Compare {Marginal Hacks}. 
daemon => /day'mn/ or /dee'mn/ [from the mythological meaning, later rationalized as the acronym `Disk And Execution MONitor'] n. A program that is not invoked explicitly, but lies dormant waiting for some condition(s) to occur. The idea is that the ...
dangling pointer => n. A reference that doesn't actually lead anywhere (in C and some other languages, a pointer that doesn't actually point at anything valid). Usually this is because it formerly pointed to something that has moved or disappeared. U...
dangling pointer2 => of its techspeak meaning; for example, a local phone number for a person who has since moved to the other coast is a dangling pointer. 
Datamation => /day`t*-may'sh*n/ n. A magazine that many hackers assume all suits read. Used to question an unbelieved quote, as in "Did you read that in `Datamation?'" It used to publish something hackishly funny every once in a while, like the origi...
day mode => n. See phase (sense 1). Used of people only.
dd => /dee-dee/ [UNIX from IBM JCL] vt. Equivalent to cat or BLT. This was originally the name of a UNIX copy command with special options suitable for block-oriented devices. Often used in heavy-handed system maintenance, as in "Let's dd the root pa...
DDT => /D-D-T/ n. 1. Generic term for a program that assists in debugging other programs by showing individual machine instructions in a readable symbolic form and letting the user change them. In this sense the term DDT is now archaic, having been w...
de-rezz => /dee-rez'/ [from `de-resolve' via the movie "Tron"] (also `derez') 1. vi. To disappear or dissolve; the image that goes with it is of an object breaking up into raster lines and static and then dissolving. Occasionally used of a person who...
dead code => n. Routines that can never be accessed because all calls to them have been removed, or code that cannot be reached because it is guarded by a control structure that provably must always transfer control somewhere else. The presence of de...
dead code2 => errors due to alterations in the program or significant changes in the assumptions and environment of the program (see also {software rot}); a good compiler should report dead code so a maintainer can think about what it means. Syn. gru...
DEADBEEF => /ded-beef/ n. The hexadecimal word-fill pattern for freshly allocated memory (decimal -21524111) under a number of IBM environments, including the RS/6000. As in "Your program is DEADBEEF" (meaning gone, aborted, flushed from memory); if ...
deadlock => n. 1. [techspeak] A situation wherein two or more processes are unable to proceed because each is waiting for one of the others to do something. A common example is a program communicating to a server, which may find itself waiting for ou...
deadly embrace => n. Same as deadlock, though usually used only when exactly 2 processes are involved. This is the more popular term in Europe, while deadlock predominates in the United States.
Death Star => [from the movie "Star Wars"] 1. The AT&T corporate logo, which appears on computers sold by AT&T and bears an uncanny resemblance to the `Death Star' in the movie. This usage is particularly common among partisans of BSD UNIX, who tend ...
Death Star2 => inferior and AT&T as a bad guy. Copies still circulate of a poster printed by Mt. Xinu showing a starscape with a space fighter labeled 4.2 BSD streaking away from a broken AT&T logo wreathed in flames. 2. AT&T's internal magazine, `Fo...
Death Star3 => incorrectly done AT&T logo in which the inner circle in the top left is dark instead of light --- a frequent result of dark-on-light logo images. 
DEC Wars => n. A 1983 USENET posting by Alan Hastings and Steve Tarr spoofing the "Star Wars" movies in hackish terms. Some years later, ESR (disappointed by Hastings and Tarr's failure to exploit a great premise more thoroughly) posted a 3-times-lon...

factpacks/jargon.fact  view on Meta::CPAN

drunk mouse syndrome3 => up enough cruft to be unreliable, the mouse was doused in cleaner, which restored it for a while. However, this operation left a fine residue that accelerated the accumulation of cruft, so the dousings became more and more fr...
drunk mouse syndrome4 => declared `alcoholic' and sent to the clinic to be dried out in a CFC ultrasonic bath. 
dumbass attack => /duhm'as *-tak'/ [Purdue] n. Notional cause of a novice's mistake made by the experienced, especially one made while running as root under UNIX, e.g., typing `rm -r *' or `mkfs' on a mounted file system. Compare adger.
dumbed down => adj. Simplified, with a strong connotation of *over*simplified. Often, a marketroid will insist that the interfaces and documentation of software be dumbed down after the designer has burned untold gallons of midnight oil making it sma...
dump => n. 1. An undigested and voluminous mass of information about a problem or the state of a system, especially one routed to the slowest available output device (compare {core dump}), and most especially one consisting of hex or octal runes desc...
dup killer => /d[y]oop kill'r/ [FidoNet] n. Software that is supposed to detect and delete duplicates of a message that may have reached the FidoNet system via different routes.
dup loop => /d[y]oop loop/ (also `dupe loop') [FidoNet] n. An incorrectly configured system or network gateway may propagate duplicate messages on one or more echoes, with different identification information that renders {dup killer}s ineffective. I...
dup loop2 => eventually reaches a system through which it has already passed (with the original identification information), all systems passed on the way back to that system are said to be involved in a {dup loop}. 
dusty deck => n. Old software (especially applications) which one is obliged to remain compatible with (or to maintain). The term implies that the software in question is a holdover from card-punch days. Used esp. when referring to old scientific and...
dusty deck2 => of which was written in FORTRAN and very poorly documented but is believed to be too expensive to replace. See fossil. 
DWIM => /dwim/ [acronym, `Do What I Mean'] 1. adj. Able to guess, sometimes even correctly, the result intended when bogus input was provided. 2. n.,obs. The BBNLISP/INTERLISP function that attempted to accomplish this feat by correcting many of the ...
dynner => /din'r/ 32 bits, by analogy with nybble and {byte}. Usage rare and extremely silly. See also playte, tayste, crumb.*earthquake [IBM] n. The ultimate real-world shock test for computer hardware. Hackish sources at IBM deny the rumor that the...
Easter egg => n. 1. A message hidden in the object code of a program as a joke, intended to be found by persons disassembling or browsing the code. 2. A message, graphic, or sound effect emitted by a program (or, on a PC, the BIOS ROM) in response to...
Easter egg2 => or keystrokes, intended as a joke or to display program credits. One well-known early Easter egg found in a couple of OSes caused them to respond to the command `make love' with `not war?'. Many personal computers have much more elabor...
Easter egg3 => lists of the developers' names, political exhortations, snatches of music, and (in one case) graphics images of the entire development team. 
Easter egging => [IBM] n. The act of replacing unrelated parts more or less at random in hopes that a malfunction will go away. Hackers consider this the normal operating mode of {field circus} techs and do not love them for it. Compare {shotgun debu...
eat flaming death => imp. A construction popularized among hackers by the infamous {CPU Wars} comic; supposed to derive from a famously turgid line in a WWII-era anti-Nazi propaganda comic that ran "Eat flaming death, non-Aryan mongrels!" or somethin...
eat flaming death2 => reported that the Firesign Theater's 1975 album "In The Next World, You're On Your Own" included the phrase "Eat flaming death, fascist media pigs"; this may have been an influence). Used in humorously overblown expressions of h...
EBCDIC => /eb's*-dik/, /eb'see`dik/, or /eb'k*-dik/ [acronym, Extended Binary Coded Decimal Interchange Code] n. An alleged character set used on IBM dinosaurs. It exists in at least six mutually incompatible versions, all featuring such delights as ...
echo => [FidoNet] n. A {topic group} on FidoNet's echomail system. Compare newsgroup.
eighty-column mind => [IBM] n. The sort said to be possessed by persons for whom the transition from {punched card} to tape was traumatic (nobody has dared tell them about disks yet). It is said that these people, including (according to an old joke)...

factpacks/jargon.fact  view on Meta::CPAN

epsilon => [see delta] 1. n. A small quantity of anything. "The cost is epsilon." 2. adj. Very small, negligible; less than marginal. "We can get this feature for epsilon cost." 3. `within epsilon of' close enough to be indistinguishable for all prac...
epsilon squared => n. A quantity even smaller than epsilon, as small in comparison to epsilon as epsilon is to something normal; completely negligible. If you buy a supercomputer for a million dollars, the cost of the thousand-dollar terminal to go w...
epsilon squared2 => of the ten-dollar cable to connect them is epsilon squared. Compare {lost in the underflow}, {lost in the noise}. 
the era => Syn. epoch. Webster's Unabridged makes these words almost synonymous, but `era' usually connotes a span of time rather than a point in time. The epoch usage is recommended.
Eric Conspiracy => n. A shadowy group of mustachioed hackers named Eric first pinpointed as a sinister conspiracy by an infamous talk.bizarre posting ca. 1986; this was doubtless influenced by the numerous `Eric' jokes in the Monty Python oeuvre. The...
Eric Conspiracy2 => more mustachioed Erics in hackerdom than the frequency of these three traits can account for unless they are correlated in some arcane way. Well-known examples include Eric Allman (he of the `Allman style' described under {indent ...
Eric Conspiracy3 => NNTP); your editor has heard from about fourteen others by email, and the organization line `Eric Conspiracy Secret Laboratories' now emanates regularly from more than one site. 
Eris => /e'ris/ n. The Greek goddess of Chaos, Discord, Confusion, and Things You Know Not Of; her name was latinized to Discordia and she was worshiped by that name in Rome. Not a very friendly deity in the Classical original, she was reinvented as ...
erotics => /ee-ro'tiks/ n. [Helsinki University of Technology, Finland] n. English-language university slang for electronics. Often used by hackers in Helsinki, maybe because good electronics excites them and makes them warm.
essentials => n. Things necessary to maintain a productive and secure hacking environment. "A jug of wine, a loaf of bread, a 20-megahertz 80386 box with 8 meg of core and a 300-megabyte disk supporting full UNIX with source and X windows and EMACS a...
evil => adj. As used by hackers, implies that some system, program, person, or institution is sufficiently maldesigned as to be not worth the bother of dealing with. Unlike the adjectives in the cretinous}/{losing}/{brain-damaged series, `evil' does ...
exa- => /ek's*/ [SI] pref. See {quantifiers}.
examining the entrails => n. The process of grovelling through a core dump or hex image in the attempt to discover the bug that brought a program or system down. Compare runes, incantation, {black art}, {desk check}.
EXCH => /eks'ch*/ or /eksch/ vt. To exchange two things, each for the other; to swap places. If you point to two people sitting down and say "Exch!", you are asking them to trade places. EXCH, meaning EXCHange, was originally the name of a PDP-10 ins...
excl => /eks'kl/ n. Abbreviation for `exclamation point'. See bang, shriek, {ASCII}.
EXE => /eks'ee/ or /eek'see/ or /E-X-E/ n. An executable binary file. Some operating systems (notably MS-DOS, VMS, and TWENEX) use the extension .EXE to mark such files. This usage is also occasionally found among UNIX programmers even though UNIX ex...
exec => /eg-zek'/ vt.,n. 1. [UNIX from `execute'] Synonym for chain, derives from the `exec(2)' call. 2. [from `executive'] obs. The command interpreter for an OS (see shell); term esp. used around mainframes, and prob. derived from UNIVAC's archaic ...
left as an exercise => [from technical books] Used to complete a proof when one doesn't mind a handwave, or to avoid one entirely. The complete phrase is "The proof (or the rest) is left as an exercise for the reader." This comment *has* occasionally...
left as an exercise2 => research problems by authors possessed of either an evil sense of humor or a vast faith in the capabilities of their audiences. 
eyeball search => n. To look for something in a mass of code or data with one's own native optical sensors, as opposed to using some sort of pattern matching software like grep or any other automated search tool. Also called a vgrep; compare vdiff, {...
eyeball search2 => `fabricate'] v. 1. To produce chips from a design that may have been created by someone at another company. Fabbing chips based on the designs of others is the activity of a {silicon foundry}. To a hacker, `fab' is practically neve...

factpacks/jargon.fact  view on Meta::CPAN

GOSMACS => /goz'maks/ [contraction of `Gosling EMACS'] n. The first EMACS-in-C implementation, predating but now largely eclipsed by GNUMACS. Originally freeware; a commercial version is now modestly popular as `UniPress EMACS'. The author (James Gos...
Gosperism => /gos'p*r-izm/ A hack, invention, or saying by arch-hacker R. William (Bill) Gosper. This notion merits its own term because there are so many of them. Many of the entries in HAKMEM are Gosperisms; see also life.
gotcha => n. A misfeature of a system, especially a programming language or environment, that tends to breed bugs or mistakes because it behaves in an unexpected way. For example, a classic gotcha in C is the fact that `if (a=b) code;' is syntactical...
GPL => /G-P-L/ n. Abbrev. for `General Public License' in widespread use; see copyleft.
GPV => /G-P-V/ n. Abbrev. for {General Public Virus} in widespread use.
grault => /grawlt/ n. Yet another meta-syntactic variable, invented by Mike Gallaher and propagated by the GOSMACS documentation. See corge.
gray goo => n. A hypothetical substance composed of sagans of sub-micron-sized self-replicating robots programmed to make copies of themselves out of whatever is available. The image that goes with the term is one of the entire biosphere of Earth bei...
gray goo2 => goo. This is the simplest of the {nanotechnology} disaster scenarios, easily refuted by arguments from energy requirements and elemental abundances. Compare {blue goo}. 
Great Renaming => n. The {flag day} on which all of the non-local groups on the USENET had their names changed from the net.- format to the current multiple-hierarchies scheme.
Great Runes => n. Uppercase-only text or display messages. Some archaic operating systems still emit these. See also runes, {smash case}, {fold case}. Decades ago, back in the days when it was the sole supplier of long-distance hardcopy transmittal d...
Great Runes2 => Corporation was faced with a major design choice. To shorten code lengths and cut complexity in the printing mechanism, it had been decided that teletypes would use a monocase font, either ALL UPPER or all lower. The question was, whi...
Great Runes3 => conducted on readability under various conditions of bad ribbon, worn print hammers, etc. Lowercase won; it is less dense and has more distinctive letterforms, and is thus much easier to read both under ideal conditions and when the l...
Great Runes4 => obscured. The results were filtered up through management. The chairman of Teletype killed the proposal because it failed one incredibly important criterion "It would be impossible to spell the name of the Deity correctly." In this wa...
Great Runes5 => folklore has it) superstition triumphed over utility. Teletypes were the major input devices on most early computers, and terminal manufacturers looking for corners to cut naturally followed suit until well into the 1970s. Thus, that ...
Great Runes6 => Runes for thirty years. 
great-wall => [from SF fandom] vi.,n. A mass expedition to an oriental restaurant, esp. one where food is served family-style and shared. There is a common heuristic about the amount of food to order, expressed as "Get N - 1 entrees"; the value of N,...
Green Book => n. 1. One of the three standard PostScript references `PostScript Language Program Design', bylined `Adobe Systems' (Addison-Wesley, 1988; QA76.73.P67P66 ISBN; 0-201-14396-8); see also {Red Book}, {Blue Book}). 2. Informal name for one ...
Green Book2 => SmallTalk `Smalltalk-80 Bits of History, Words of Advice', by Glenn Krasner (Addison-Wesley, 1983; QA76.8.S635S58; ISBN 0-201-11669-3) (this, too, is associated with blue and red books). 3. The `X/Open Compatibility Guide'. Defines an ...
Green Book3 => environment that is a proper superset of POSIX/SVID; also includes descriptions of a standard utility toolkit, systems administrations features, and the like. This grimoire is taken with particular seriousness in Europe. See {Purple Bo...
Green Book4 => Operating Systems Interface standard has been dubbed "The Ugly Green Book". 5. Any of the 1992 standards which will be issued by the CCITT's tenth plenary assembly. Until now, these have changed color each review cycle (1984 was {Red B...
Green Book5 => is rumored that this convention is going to be dropped before 1992. These include, among other things, the X.400 email standard and the Group 1 through 4 fax standards. See also {{book titles}}. 

factpacks/jargon.fact  view on Meta::CPAN

Internet address2 => Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, domainist. 2. More loosely, any network ad...
Internet address3 => this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed by a sele...
Internet address4 => com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in the U.S. or Canada. us sites in See: Internet addr...
Internet address5 => the U.S. outside the functional domains su sites in the Soviet Union (see kremvax). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally with a name identical to the state...
Internet address6 => abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways. 
interrupt => 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also trap. 2. interj. A request for attention from a hacker. Often explicitly...
interrupt list, the => [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of early 1991,...
interrupts locked out => When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is also com...
interrupts locked out2 => have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also spl. 
iron => n. Hardware, especially older and larger hardware of mainframe class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose silicon. See ...
Iron Age => n. In the history of computing, 1961--1971 --- the formative era of commercial mainframe technology, when {big iron} dinosaurs ruled the earth. These began with the delivery of the first PDP-1, coincided with the dominance of ferrite core...
Iron Age2 => introduction of the first commercial microprocessor (the Intel 4004) in 1971. See also {Stone Age}; compare {elder days}. 
iron box => [UNIX/Internet] n. A special environment set up to trap a cracker logging in over remote connections long enough to be traced. May include a modified shell restricting the hacker's movements in unobvious ways, and `bait' files designed to...
iron box2 => on. See also {back door}, {firewall machine}, {Venus flytrap}, and Clifford Stoll's account in `The Cuckoo's Egg' of how he made and used one (see the Bibliography). Compare {padded cell}. 
ironmonger => [IBM] n. Derogatory. A hardware specialist. Compare sandbender, {polygon pusher}.
ITS => /I-T-S/ n. 1. Incompatible Time-sharing System, an influential but highly idiosyncratic operating system written for PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab. Much AI-hacker jargon derives from ITS folklore, and to have been `...
IWBNI => // [acronym] `It Would Be Nice If'. Compare WIBNI.
IYFEG => // [USENET] Abbreviation for `Insert Your Favorite Ethnic Group'. Used as a meta-name when telling racist jokes on the net to avoid offending anyone. See JEDR.*J. Random /J rand'm/ n. [generalized from {J. Random Hacker}] Arbitrary; ordinary...
J. Random Hacker => [MIT] /J rand'm hak'r/ n. A mythical figure like the Unknown Soldier; the archetypal hacker nerd. See random, {Suzie COBOL}. This may originally have been inspired or influenced by `J. Fred Muggs', a show-biz chimpanzee whose name...
jaggies => /jag'eez/ n. The `stairstep' effect observable when an edge (esp. a linear edge of very shallow or steep slope) is rendered on a pixel device (as opposed to a vector display).
JCL => /J-C-L/ n. 1. IBM's supremely rude Job Control Language. JCL is the script language used to control the execution of programs in IBM's batch systems. JCL has a very fascist syntax, and some versions will, for example, barf if two spaces appear...

factpacks/jargon.fact  view on Meta::CPAN

locked and loaded => [from military slang for an M-16 rifle with magazine inserted and prepared for firing] adj. Said of a removable disk volume properly prepared for use --- that is, locked into the drive and with the heads loaded. Ironically, becau...
locked and loaded2 => the power is up, this description is never used of {Winchester} drives (which are named after a rifle). 
locked up => adj. Syn. for hung, wedged.
logic bomb => n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}.
logical => [from the technical term `logical device', wherein a physical device is referred to by an arbitrary `logical' name] adj. Having the role of. If a person (say, Les Earnest at SAIL) who had long held a certain post left and were replaced, th...
loop through => vt. To process each element of a list of things. "Hold on, I've got to loop through my paper mail." Derives from the computer-language notion of an iterative loop; compare `cdr down' (under cdr), which is less common among C and UNIX ...
loop through2 => say `IRP over' after an obscure pseudo-op in the MIDAS PDP-10 assembler. 
lord high fixer => [primarily British, from Gilbert & Sullivan's `lord high executioner'] n. The person in an organization who knows the most about some aspect of a system. See wizard.
lose => [MIT] vi. 1. To fail. A program loses when it encounters an exceptional condition or fails to work in the expected manner. 2. To be exceptionally unesthetic or crocky. 3. Of people, to be obnoxious or unusually stupid (as opposed to ignorant)...
lose 2 => 4. n. Refers to something that is losing, especially in the phrases "That's a lose!" and "What a lose!" 
lose lose => interj. A reply to or comment on an undesirable situation. "I accidentally deleted all my files!" "Lose, lose."
loser => n. An unexpectedly bad situation, program, programmer, or person. Someone who habitually loses. (Even winners can lose occasionally.) Someone who knows not and knows not that he knows not. Emphatic forms are `real loser', `total loser', and ...
losing => adj. Said of anything that is or causes a lose or lossage.
loss => n. Something (not a person) that loses; a situation in which something is losing. Emphatic forms include `moby loss', and `total loss', `complete loss'. Common interjections are "What a loss!" and "What a moby loss!" Note that `moby loss' is ...
lossage => /los'*j/ n. The result of a bug or malfunction. This is a mass or collective noun. "What a loss!" and "What lossage!" are nearly synonymous. The former is slightly more particular to the speaker's present circumstances; the latter implies ...
lost in the noise => adj. Syn. {lost in the underflow}. This term is from signal processing, where signals of very small amplitude cannot be separated from low-intensity noise in the system. Though popular among hackers, it is not confined to hackerd...
lost in the noise2 => astronomers, and statisticians all use it. 
lost in the underflow => adj. Too small to be worth considering; more specifically, small beyond the limits of accuracy or measurement. This is a reference to `floating underflow', a condition that can occur when a floating-point arithmetic processor...
lost in the underflow2 => than its limit of magnitude. It is also a pun on `undertow' (a kind of fast, cold current that sometimes runs just offshore and can be dangerous to swimmers). "Well, sure, photon pressure from the stadium lights alters the p...
lost in the underflow3 => effect gets lost in the underflow." See also {overflow bit}. 
lots of MIPS but no I/O => adj. Used to describe a person who is technically brilliant but can't seem to communicate with human beings effectively. Technically it describes a machine that has lots of processing power but is bottlenecked on input-outp...

factpacks/jargon.fact  view on Meta::CPAN

magic number2 => are bad style. 2. A number that encodes critical information used in an algorithm in some opaque way. The classic examples of these are the numbers used in hash or CRC functions, or the coefficients in a linear congruential generator...
magic number3 => sense actually predates and was ancestral to the more common sense 1. 3. Special data located at the beginning of a binary data file to indicate its type to a utility. Under UNIX, the system and various applications programs (especia...
magic number4 => types of executable file by looking for a magic number. Once upon a time, these magic numbers were PDP-11 branch instructions that skipped over header data to the start of executable code; the 0407, for example, was octal for `branch...
magic number5 => wizard knows the spells to create magic numbers. How do you choose a fresh magic number of your own? Simple --- you pick one at random. See? It's magic! 
magic smoke => n. A substance trapped inside IC packages that enables them to function (also called `blue smoke'; this is similar to the archaic `phlogiston' hypothesis about combustion). Its existence is demonstrated by what happens when a chip burn...
magic smoke2 => out, so it doesn't work any more. See {smoke test}, {let the smoke out}. USENETter Jay Maynard tells the following story: "Once, while hacking on a dedicated Z80 system, I was testing code by blowing EPROMs and plugging them in the sy...
magic smoke3 => One time, I plugged one in backwards. I only discovered that *after* I realized that Intel didn't put power-on lights under the quartz windows on the tops of their EPROMs --- the die was glowing white-hot. Amazingly, the EPROM worked ...
magic smoke4 => full of zeros, then erased it again. For all I know, it's still in service. Of course, this is because the magic smoke didn't get let out." Compare the original phrasing of {Murphy's Law}. 
main loop => n. Software tools are often written to perform some actions repeatedly on whatever input is handed to them, terminating when there is no more input or they are explicitly told to go away. In such programs, the loop that gets and processe...
mainframe => n. This term originally referred to the cabinet containing the central processor unit or `main frame' of a room-filling {Stone Age} batch machine. After the emergence of smaller `minicomputer' designs in the early 1970s, the traditional ...
management => n. 1. Corporate power elites distinguished primarily by their distance from actual productive work and their chronic failure to manage (see also suit). Spoken derisively, as in "*Management* decided that ...". 2. Mythically, a vast bure...
mandelbug => /mon'del-buhg/ [from the Mandelbrot set] n. A bug whose underlying causes are so complex and obscure as to make its behavior appear chaotic or even non-deterministic. This term implies that the speaker thinks it is a {Bohr bug}, rather t...
manged => /monjd/ [probably from the French `manger' or Italian `mangiare', to eat; perhaps influenced by English n. `mange', `mangy'] adj. Refers to anything that is mangled or damaged, usually beyond repair. "The disk was manged after the electrica...
mangle => vt. Used similarly to mung or scribble, but more violent in its connotations; something that is mangled has been irreversibly and totally trashed.
mangler => [DEC] n. A manager. Compare mango; see also management. Note that {system mangler} is somewhat different in connotation.
mango => /mang'go/ [orig. in-house jargon at Symbolics] n. A manager. Compare mangler. See also devo and doco.
marbles => [from mainstream "lost all his/her marbles"] pl.n. The minimum needed to build your way further up some hierarchy of tools or abstractions. After a bad system crash, you need to determine if the machine has enough marbles to come up on its...
marginal => adj. 1. Extremely small. "A marginal increase in core can decrease GC time drastically." In everyday terms, this means that it is a lot easier to clean off your desk if you have a spare place to put some of the junk while you sort through...
Marginal Hacks => n. Margaret Jacks Hall, a building into which the Stanford AI Lab was moved near the beginning of the 1980s (from the {D. C. Power Lab}).
marginally => adv. Slightly. "The ravs here are only marginally better than at Small Eating Place." See epsilon.
marketroid => /mar'k*-troyd/ alt. `marketing slime', `marketing droid', `marketeer' n. A member of a company's marketing department, esp. one who promises users that the next version of a product will have features that are not actually scheduled for...

factpacks/jargon.fact  view on Meta::CPAN

mumblage => /muhm'bl*j/ n. The topic of one's mumbling (see mumble). "All that mumblage" is used like "all that stuff" when it is not quite clear how the subject of discussion works, or like "all that crap" when `mumble' is being used as an implicit ...
mumble => interj. 1. Said when the correct response is too complicated to enunciate, or the speaker has not thought it out. Often prefaces a longer answer, or indicates a general reluctance to get into a long discussion. "Don't you think that we coul...
munch => [often confused with mung, q.v.] vt. To transform information in a serial fashion, often requiring large amounts of computation. To trace down a data structure. Related to crunch and nearly synonymous with grovel, but connotes less pain.
munching => n. Exploration of security holes of someone else's computer for thrills, notoriety, or to annoy the system manager. Compare cracker. See also {hacked off}.
munching squares => n. A {display hack} dating back to the PDP-1 (ca. 1962, reportedly discovered by Jackson Wright), which employs a trivial computation (repeatedly plotting the graph Y = X XOR T for successive values of T --- see HAKMEM items 146--...
munching squares2 => display of moving and growing squares that devour the screen. The initial value of T is treated as a parameter, which, when well-chosen, can produce amazing effects. Some of these, later (re)discovered on the LISP machine, have b...
munching squares3 => (try AND for XOR and toggling points instead of plotting them), `munching w's', and `munching mazes'. More generally, suppose a graphics program produces an impressive and ever-changing display of some basic form, foo, on a displ...
munching squares4 => relatively simple program; then the program (or the resulting display) is likely to be referred to as `munching foos' (this is a good example of the use of the word foo as a metasyntactic variable). 
munchkin => /muhnch'kin/ [from the squeaky-voiced little people in L. Frank Baum's `The Wizard of Oz'] n. A teenage-or-younger micro enthusiast hacking BASIC or something else equally constricted. A term of mild derision --- munchkins are annoying bu...
mundane => [from SF fandom] n. 1. A person who is not in science fiction fandom. 2. A person who is not in the computer industry. In this sense, most often an adjectival modifier as in "in my mundane life...." See also {Real World}.
mung => /muhng/ alt. `munge' /muhnj/ [in 1960 at MIT, `Mash Until No Good'; sometime after that the derivation from the {{recursive acronym}} `Mung Until No Good' became standard] vt. 1. To make changes to a file, esp. large-scale and irrevocable cha...
Music => n. A common extracurricular interest of hackers (compare {{science-fiction fandom}}, {{oriental food}}; see also filk). Hackish folklore has long claimed that musical and programming abilities are closely related, and there has been at least...
mutter => vt. To quietly enter a command not meant for the ears, eyes, or fingers of ordinary mortals. Often used in `mutter an incantation'. See also wizard.
N => /N/ quant. 1. A large and indeterminate number of objects: "There were N bugs in that crock!" Also used in its original sense of a variable name: "This crock has N bugs, as N goes to infinity." (The true number of bugs is always at least N + 1.)...
nailed to the wall => [like a trophy] adj. Said of a bug finally eliminated after protracted, and even heroic, effort.
nailing jelly => vi. See {like nailing jelly to a tree}.
na"ive => adj. Untutored in the perversities of some particular program or system; one who still tries to do things in an intuitive way, rather than the right way (in really good designs these coincide, but most designs aren't `really good' in the ap...
na"ive user => n. A luser. Tends to imply someone who is ignorant mainly owing to inexperience. When this is applied to someone who *has* experience, there is a definite implication of stupidity.
NAK => /nak/ [from the ASCII mnemonic for 0010101] interj. 1. On-line joke answer to ACK?: "I'm not here." 2. On-line answer to a request for chat: "I'm not available." 3. Used to politely interrupt someone to tell them you don't understand their poi...
nano => /nan'oh/ [CMU: from `nanosecond'] n. A brief period of time. "Be with you in a nano" means you really will be free shortly, i.e., implies what mainstream people mean by "in a jiffy" (whereas the hackish use of `jiffy' is quite different --- s...
nano- => [SI: the next quantifier below micro-; meaning * 10^-9] pref. Smaller than micro-, and used in the same rather loose and connotative way. Thus, one has {nanotechnology} (coined by hacker K. Eric Drexler) by analogy with `microtechnology'; an...
nanoacre => /nan'oh-ay`kr/ n. A unit (about 2 mm square) of real estate on a VLSI chip. The term gets its giggle value from the fact that VLSI nanoacres have costs in the same range as real acres once one figures in design and fabrication-setup costs...
nanobot => /nan'oh-bot/ n. A robot of microscopic proportions, presumably built by means of {nanotechnology}. As yet, only used informally (and speculatively!). Also called a `nanoagent'.
nanocomputer => /nan'oh-k*m-pyoo'tr/ n. A computer whose switching elements are molecular in size. Designs for mechanical nanocomputers which use single-molecule sliding rods for their logic have been proposed. The controller for a nanobot would be a...
nanofortnight => [Adelaide University] n. 1 fortnight * 10^-9, or about 1.2 msec. This unit was used largely by students doing undergraduate practicals. See microfortnight, attoparsec, and micro-.
nanotechnology => /nan'-oh-tek-no`l*-jee/ n. A hypothetical fabrication technology in which objects are designed and built with the individual specification and placement of each separate atom. The first unequivocal nanofabrication experiments are ta...
nastygram => /nas'tee-gram/ n. 1. A protocol packet or item of email (the latter is also called a letterbomb) that takes advantage of misfeatures or security holes on the target system to do untoward things. 2. Disapproving mail, esp. from a net.god,...

factpacks/jargon.fact  view on Meta::CPAN

netnews => /net'n[y]ooz/ n. 1. The software that makes USENET run. 2. The content of USENET. "I read netnews right after my mail most mornings."
netrock => /net'rok/ [IBM] n. A flame; used esp. on VNET, IBM's internal corporate network.
network address => n. (also `net address') As used by hackers, means an address on `the' network (see {network, the}; this is almost always a {bang path} or {{Internet address}}). Such an address is essential if one wants to be to be taken seriously ...
network address2 => or organizations that claim to understand, work with, sell to, or recruit from among hackers but *don't* display net addresses are quietly presumed to be clueless poseurs and mentally flushed (see flush, sense 4). Hackers often pu...
network address3 => business cards and wear them prominently in contexts where they expect to meet other hackers face-to-face (see also {{science-fiction fandom}}). This is mostly functional, but is also a signal that one identifies with hackerdom (l...
network address4 => tie-dyed T-shirts among Grateful Dead fans). Net addresses are often used in email text as a more concise substitute for personal names; indeed, hackers may come to know each other quite well by network names without ever learning...
network address5 => also sitename, domainist. 
network meltdown => n. A state of complete network overload; the network equivalent of thrashing. This may be induced by a {Chernobyl packet}. See also {broadcast storm}, {kamikaze packet}.
network, the => n. 1. The union of all the major noncommercial, academic, and hacker-oriented networks, such as Internet, the old ARPANET, NSFnet, BITNET, and the virtual UUCP and USENET `networks', plus the corporate in-house networks and commercial...
network, the2 => CompuServe) that gateway to them. A site is generally considered `on the network' if it can be reached through some combination of Internet-style (@-sign) and UUCP (bang-path) addresses. See {bang path}, {{Internet address}}, {networ...
network, the3 => conspiracy of libertarian hacker-subversives and anti-authoritarian monkeywrenchers described in Robert Anton Wilson's novel `Schr"odinger's Cat', to which many hackers have subsequently decided they belong (this is an example of {ha...
network, the4 => `network' is often abbreviated to `net'. "Are you on the net?" is a frequent question when hackers first meet face to face, and "See you on the net!" is a frequent goodbye. 
New Jersey => [primarily Stanford/Silicon Valley] adj. Brain-damaged or of poor design. This refers to the allegedly wretched quality of such software as C, C++, and UNIX (which originated at Bell Labs in Murray Hill, New Jersey). "This compiler bite...
New Jersey2 => from a compiler designed in New Jersey?" Compare {Berkeley Quality Software}. See also {UNIX conspiracy}. 
New Testament => n. [C programmers] The second edition of K&R's `The C Programming Language' (Prentice-Hall, 1988; ISBN 0-13-110362-8), describing ANSI Standard C. See K&R.
newbie => /n[y]oo'bee/ n. [orig. from British public-school and military slang variant of `new boy'] A USENET neophyte. This term surfaced in the newsgroup talk.bizarre but is now in wide use. Criteria for being considered a newbie vary wildly; a per...
newgroup wars => /n[y]oo'groop wohrz/ [USENET] n. The salvos of dueling `newgroup' and `rmgroup' messages sometimes exchanged by persons on opposite sides of a dispute over whether a newsgroup should be created net-wide. These usually settle out with...
newgroup wars2 => clear whether the group has a natural constituency (usually, it doesn't). At times, especially in the completely anarchic alt hierarchy, the names of newsgroups themselves become a form of comment or humor; e.g., the spinoff of alt....
newgroup wars3 => alt.tv.muppets in early 1990, or any number of specialized abuse groups named after particularly notorious flamers, e.g., alt.weemba. 
newline => /n[y]oo'li:n/ n. 1. [techspeak, primarily UNIX] The ASCII LF character (0001010), used under {UNIX} as a text line terminator. A Bell-Labs-ism rather than a Berkeleyism; interestingly (and unusually for UNIX jargon), it is said to have ori...
NeWS => /nee'wis/, /n[y]oo'is/ or /n[y]ooz/ [acronym; the `Network Window System'] n. The road not taken in window systems, an elegant PostScript-based environment that would almost certainly have won the standards war with X if it hadn't been propri...

factpacks/jargon.fact  view on Meta::CPAN

Nightmare File System3 => pseudo-down machine, and itself becomes pseudo-down. The first machine to discover the down one is now trying both to access the down one and to respond to the pseudo-down one, so it is even harder to reach. This snowballs v...
Nightmare File System4 => network of machines is frozen --- the user can't even abort the file access that started the problem! (ITS partisans are apt to cite this as proof of UNIX's alleged bogosity; ITS had a working NFS-like shared file system wit...
Nightmare File System5 => 1970s.) See also {broadcast storm}. 
NIL => /nil/ [from LISP terminology for `false'] No. Used in reply to a question, particularly one asked using the `-P' convention. See T.
NMI => /N-M-I/ n. Non-Maskable Interrupt. An IRQ 7 on the PDP-11 or 680[01234]0; the NMI line on an 8088,[1234]86. In contrast with a {priority interrupt} (which might be ignored, although that is unlikely), an NMI is *never* ignored.
no-op => /noh'op/ alt. NOP /nop/ [no operation] n. 1. (also v.) A machine instruction that does nothing (sometimes used in assembler-level programming as filler for data or patch areas, or to overwrite code to be removed in binaries). See also JFCL. ...
noddy => /nod'ee/ [UK: from the children's books] adj. 1. Small and un-useful, but demonstrating a point. Noddy programs are often written by people learning a new language or system. The archetypal noddy program is {hello, world}. Noddy code may be ...
NOMEX underwear => /noh'meks uhn'-der-weir/ [USENET] n. Syn. {asbestos longjohns}, used mostly in auto-related mailing lists and newsgroups. NOMEX underwear is an actual product available on the racing equipment market, used as a fire resistance meas...
non-optimal solution => n. (also `sub-optimal solution') An astoundingly stupid way to do something. This term is generally used in deadpan sarcasm, as its impact is greatest when the person speaking looks completely serious. Compare stunning. See al...
nonlinear => adj. [scientific computation] 1. Behaving in an erratic and unpredictable fashion. When used to describe the behavior of a machine or program, it suggests that said machine or program is being forced to run far outside of design specific...
nontrivial => adj. Requiring real thought or significant computing power. Often used as an understated way of saying that a problem is quite difficult or impractical, or even entirely unsolvable ("Proving P=NP is nontrivial"). The preferred emphatic ...
notwork => /not'werk/ n. A network, when it is acting flaky or is down. Compare nyetwork. Said at IBM to have orig. referred to a particular period of flakiness on IBM's VNET corporate network, ca. 1988; but there are independent reports of the term ...
NP- => /N-P/ pref. Extremely. Used to modify adjectives describing a level or quality of difficulty; the connotation is often `more so than it should be' (NP-complete problems all seem to be very hard, but so far no one has found a good a priori reas...
nuke => vt. 1. To intentionally delete the entire contents of a given directory or storage volume. "On UNIX, `rm -r /usr' will nuke everything in the usr filesystem." Never used for accidental deletion. Oppose {blow away}. 2. Syn. for dike, applied t...
number-crunching => n. Computations of a numerical nature, esp. those that make extensive use of floating-point numbers. The only thing Fortrash is good for. This term is in widespread informal use outside hackerdom and even in mainstream slang, but ...
numbers => [scientific computation] n. Output of a computation that may not be significant results but at least indicate that the program is running. May be used to placate management, grant sponsors, etc. `Making numbers' means running a program bec...
NUXI problem => /nuk'see pro'bl*m/ n. This refers to the problem of transferring data between machines with differing byte-order. The string `UNIX' might look like `NUXI' on a machine with a different `byte sex' (e.g., when transferring data from a l...
NUXI problem2 => vice-versa). See also middle-endian, swab, and bytesexual. 
nybble => /nib'l/ (alt. `nibble') [from v. `nibble' by analogy with `bite' => `byte'] n. Four bits; one hex digit; a half-byte. Though `byte' is now techspeak, this useful relative is still jargon. Compare {byte}, crumb, tayste, dynner; see also bit,...
nyetwork => /nyet'werk/ [from Russian `nyet' = no] n. A network, when it is acting flaky or is down. Compare notwork.
Ob- => /ob/ pref. Obligatory. A piece of netiquette acknowledging that the author has been straying from the newsgroup's charter topic. For example, if a posting in alt.sex is a response to a part of someone else's posting that has nothing particular...
Obfuscated C Contest => n. An annual contest run since 1984 over USENET by Landon Curt Noll and friends. The overall winner is whoever produces the most unreadable, creative, and bizarre (but working) C program; various other prizes are awarded at th...
Obfuscated C Contest2 => and macro-preprocessor facilities give contestants a lot of maneuvering room. The winning programs often manage to be simultaneously (a) funny, (b) breathtaking works of art, and (c) horrible examples of how *not* to code in ...
Obfuscated C Contest3 => entry might help convey the flavor of obfuscated C /* * HELLO WORLD program * by Jack Applin and Robert Heckendorn, 1985 */ main(v,c)char**c;{for(v[c++]="Hello, world!\n)"; (!!c)[*c]&&(v--||--c&&execlp(*c,*c,c[!!c]+!!c,!c)); ...
obi-wan error => /oh'bee-won` er'*r/ [RPI, from `off-by-one' and the Obi-Wan Kenobi character in "Star Wars"] n. A loop of some sort in which the index is off by 1. Common when the index should have started from 0 but instead started from 1. A kind o...
Objectionable-C => n. Hackish take on "Objective-C", the name of an object-oriented dialect of C in competition with the better-known C++ (it is used to write native applications on the NeXT machine). Objectionable-C uses a Smalltalk-like syntax, but...
obscure => adj. Used in an exaggeration of its normal meaning, to imply total incomprehensibility. "The reason for that last crash is obscure." "The `find(1)' command's syntax is obscure!" The phrase `moderately obscure' implies that it could be figu...
octal forty => /ok'tl for'tee/ n. Hackish way of saying "I'm drawing a blank." Octal 40 is the {ASCII} space character, 0100000; by an odd coincidence, hex 40 (01000000) is the {EBCDIC} space character. See wall.
off the trolley => adj. Describes the behavior of a program that malfunctions and goes catatonic, but doesn't actually crash or abort. See glitch, bug, {deep space}.
off-by-one error => n. Exceedingly common error induced in many ways, such as by starting at 0 when you should have started at 1 or vice versa, or by writing `< N' instead of `<= N' or vice-versa. Also applied to giving something to the person next t...
off-by-one error2 => Often confounded with {fencepost error}, which is properly a particular subtype of it. 
offline => adv. Not now or not here. "Let's take this discussion offline." Specifically used on USENET to suggest that a discussion be taken off a public newsgroup to email.
old fart => n. Tribal elder. A title self-assumed with remarkable frequency by (esp.) USENETters who have been programming for more than about 25 years; often appears in {sig block}s attached to Jargon File contributions of great archeological signif...
old fart2 => the second or third person but one of pride in first person. 
Old Testament => n. [C programmers] The first edition of K&R, the sacred text describing {Classic C}.
one-line fix => n. Used (often sarcastically) of a change to a program that is thought to be trivial or insignificant right up to the moment it crashes the system. Usually `cured' by another one-line fix. See also {I didn't change anything!}
one-liner wars => n. A game popular among hackers who code in the language APL (see {write-only language}). The objective is to see who can code the most interesting and/or useful routine in one line of operators chosen from APL's exceedingly hairy p...
one-liner wars2 => was practiced among TECO hackers. Ken Iverson, the inventor of APL, has been credited with a one-liner that, given a number N, produces a list of the prime numbers from 1 to N inclusive. It looks like this	(2 = 0 +.= T o.| T) / T <...

factpacks/jargon.fact  view on Meta::CPAN

patch => 1. n. A temporary addition to a piece of code, usually as a quick-and-dirty remedy to an existing bug or misfeature. A patch may or may not work, and may or may not eventually be incorporated permanently into the program. Distinguished from ...
patch space => n. An unused block of bits left in a binary so that it can later be modified by insertion of machine-language instructions there (typically, the patch space is modified to contain new code, and the superseded code is patched to contain...
patch space2 => The widening use of HLLs has made this term rare; it is now primarily historical outside IBM shops. See patch (sense 4), zap (sense 4), hook. 
path => n. 1. A {bang path} or explicitly routed {{Internet address}}; a node-by-node specification of a link between two machines. 2. [UNIX] A filename, fully specified relative to the root directory (as opposed to relative to the current directory;...
pathological => adj. 1. [scientific computation] Used of a data set that is grossly atypical of normal expected input, esp. one that exposes a weakness or bug in whatever algorithm one is using. An algorithm that can be broken by pathological inputs ...
payware => /pay'weir/ n. Commercial software. Oppose shareware or freeware.
PBD => /P-B-D/ [abbrev. of `Programmer Brain Damage'] n. Applied to bug reports revealing places where the program was obviously broken by an incompetent or short-sighted programmer. Compare UBD; see also brain-damaged.
PC-ism => /P-C-izm/ n. A piece of code or coding technique that takes advantage of the unprotected single-tasking environment in IBM PCs and the like, e.g., by busy-waiting on a hardware register, direct diddling of screen memory, or using hard timin...
PD => /P-D/ adj. Common abbreviation for `public domain', applied to software distributed over USENET and from Internet archive sites. Much of this software is not in fact public domain in the legal sense but travels under various copyrights granting...
pdl => /pid'l/ or /puhd'l/ [acronym for `Push Down List'] 1. In ITS days, the preferred MITism for stack. 2. Dave Lebling, one of the co-authors of Zork; (his {network address} on the ITS machines was at one time pdl@dms). 3. `Program Design Language...
PDP-10 => [Programmed Data Processor model 10] n. The machine that made timesharing real. It looms large in hacker folklore because of its adoption in the mid-1970s by many university computing facilities and research labs, including the MIT AI Lab, ...
PDP-20 => n. The most famous computer that never was. PDP-10 computers running the {TOPS-10} operating system were labeled `DECsystem-10' as a way of differentiating them from the PDP-11. Later on, those systems running TOPS-20 were labeled `DECSYSTE...
peek => n.,vt. (and poke) The commands in most microcomputer BASICs for directly accessing memory contents at an absolute address; often extended to mean the corresponding constructs in any HLL (peek reads memory, poke modifies it). Much hacking on s...
pencil and paper => n. An archaic information storage and transmission device that works by depositing smears of graphite on bleached wood pulp. More recent developments in paper-based technology include improved `write-once' update devices which use...
pencil and paper2 => balls to deposit colored pigment. All these devices require an operator skilled at so-called `handwriting' technique. These technologies are ubiquitous outside hackerdom, but nearly forgotten inside it. Most hackers had terrible ...
pencil and paper3 => years of keyboarding tend to have encouraged it to degrade further. Perhaps for this reason, hackers deprecate pencil-and-paper technology and often resist using it in any but the most trivial contexts. See also appendix B. 
peon => n. A person with no special (root or wheel) privileges on a computer system. "I can't create an account on *foovax* for you; I'm only a peon there."
percent-S => /per-sent' es'/ [From the code in C's `printf(3)' library function used to insert an arbitrary string argument] n. An unspecified person or object. "I was just talking to some percent-s in administration." Compare random.
perf => /perf/ n. See chad (sense 1). The term `perfory' /per'f*-ree/ is also heard.
perfect programmer syndrome => n. Arrogance; the egotistical conviction that one is above normal human error. Most frequently found among programmers of some native ability but relatively little experience (especially new graduates; their perceptions...
perfect programmer syndrome2 => excellent performance at solving {toy problem}s). "Of course my program is correct, there is no need to test it." "Yes, I can see there may be a problem here, but *I'll* never type `rm -r /' while in root." 

factpacks/jargon.fact  view on Meta::CPAN

programming => n. 1. The art of debugging a blank sheet of paper (or, in these days of on-line editing, the art of debugging an empty file). 2. n. A pastime similar to banging one's head against a wall, but with fewer opportunities for reward. 3. n. ...
propeller head => n. Used by hackers, this is syn. with {computer geek}. Non-hackers sometimes use it to describe all techies. Prob. derives from SF fandom's tradition (originally invented by old-time fan Ray Faraday Nelson) of propeller beanies as f...
propeller head2 => actually wears them except as a joke). 
propeller key => [Mac users] n. See {command key}.
proprietary => adj. 1. In marketroid-speak, superior; implies a product imbued with exclusive magic by the unmatched brilliance of the company's hardware or software designers. 2. In the language of hackers and users, inferior; implies a product not ...
protocol => n. As used by hackers, this never refers to niceties about the proper form for addressing letters to the Papal Nuncio or the order in which one should use the forks in a Russian-style place setting; hackers don't care about such things. I...
provocative maintenance => [common ironic mutation of `preventive maintenance'] n. Actions performed upon a machine at regularly scheduled intervals to ensure that the system remains in a usable state. So called because it is all too often performed ...
provocative maintenance2 => know what he is doing; this results in the machine's remaining in an *un*usable state for an indeterminate amount of time. See also {scratch monkey}. 
prowler => [UNIX] n. A daemon that is run periodically (typically once a week) to seek out and erase core files, truncate administrative logfiles, nuke `lost+found' directories, and otherwise clean up the cruft that tends to pile up in the corners of...
pseudo => /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An electronic-mail or USENET persona adopted by a human for amusement value or as a means of avoiding negative repercussions of one's net.behavior; a `nom de USENET', often associated with ...
pseudoprime => n. A backgammon prime (six consecutive occupied points) with one point missing. This term is an esoteric pun derived from a mathematical method that, rather than determining precisely whether a number is prime (has no divisors), uses a...
pseudosuit => /soo'doh-s[y]oot`/ n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also lobotomy.
psychedelicware => /si`k*-del'-ik-weir/ [UK] n. Syn. {display hack}. See also {smoking clover}.
psyton => /si'ton/ [TMRC] n. The elementary particle carrying the sinister force. The probability of a process losing is proportional to the number of psytons falling on it. Psytons are generated by observers, which is why demos are more likely to fa...
pubic directory => [NYU] (also `pube directory' /pyoob' d*-rek't*-ree/) n. The `pub' (public) directory on a machine that allows FTP access. So called because it is the default location for SEX (sense 1). "I'll have the source in the pube directory b...
puff => vt. To decompress data that has been crunched by Huffman coding. At least one widely distributed Huffman decoder program was actually *named* `PUFF', but these days it is usually packaged with the encoder. Oppose huff.
punched card => alt. `punch card' [techspeak] n.obs. The signature medium of computing's {Stone Age}, now obsolescent outside of some IBM shops. The punched card actually predated computers considerably, originating in 1801 as a control device for me...
punched card2 => patented by Hollerith and used with mechanical tabulating machines in the 1890 U.S. Census was a piece of cardboard about 90 mm by 215 mm, designed to fit exactly in the currency trays used for that era's larger dollar bills. IBM (wh...
punched card3 => manufacturer) married the punched card to computers, encoding binary information as patterns of small rectangular holes; one character per column, 80 columns per card. Other coding schemes, sizes of card, and hole shapes were tried a...
punched card4 => width of most character terminals is a legacy of the IBM punched card; so is the size of the quick-reference cards distributed with many varieties of computers even today. See chad, {chad box}, {eighty-column mind}, {green card}, {du...
punt => [from the punch line of an old joke referring to American football "Drop back 15 yards and punt!"] v. 1. To give up, typically without any intention of retrying. "Let's punt the movie tonight." "I was going to hack all night to get this featu...
Purple Book => n. The `System V Interface Definition'. The covers of the first editions were an amazingly nauseating shade of off-lavender. See also {{book titles}}.
push => [from the operation that puts the current information on a stack, and the fact that procedure return addresses are saved on a stack] Also PUSH /push/ or PUSHJ /push'J/ (the latter based on the PDP-10 procedure call instruction). 1. To put som...
quadruple bucky => n., obs. 1. On an MIT {space-cadet keyboard}, use of all four of the shifting keys (control, meta, hyper, and super) while typing a character key. 2. On a Stanford or MIT keyboard in {raw mode}, use of four shift keys while typing ...
quadruple bucky2 => shift keys are the control and meta keys on *both* sides of the keyboard. This was very difficult to do! One accepted technique was to press the left-control and left-meta keys with your left hand, the right-control and right-meta...
quadruple bucky3 => fifth key with your nose. Quadruple-bucky combinations were very seldom used in practice, because when one invented a new command one usually assigned it to some character that was easier to type. If you want to imply that a progr...
quadruple bucky4 => or features, you can say something like "Oh, the command that makes it spin the tapes while whistling Beethoven's Fifth Symphony is quadruple-bucky-cokebottle." See {double bucky}, {bucky bits}, cokebottle. 
quantifiers => In techspeak and jargon, the standard metric prefixes used in the SI (Syst`eme International) conventions for scientific measurement have dual uses. With units of time or things that come in powers of 10, such as money, they retain the...
quantum bogodynamics => /kwon'tm boh`goh-di-nam'iks/ n. A theory that characterizes the universe in terms of bogon sources (such as politicians, used-car salesmen, TV evangelists, and suits in general), bogon sinks (such as taxpayers and computers), ...
quantum bogodynamics2 => Bogon absorption, of course, causes human beings to behave mindlessly and machines to fail (and may also cause both to emit secondary bogons); however, the precise mechanics of the bogon-computron interaction are not yet unde...
quantum bogodynamics3 => Quantum bogodynamics is most often invoked to explain the sharp increase in hardware and software failures in the presence of suits; the latter emit bogons, which the former absorb. See bogon, computron, suit, psyton. 
quarter => n. Two bits. This in turn comes from the `pieces of eight' famed in pirate movies --- Spanish gold pieces that could be broken into eight pie-slice-shaped `bits' to make change. Early in American history the Spanish coin was considered equ...
ques => /kwes/ 1. n. The question mark character (`?', ASCII 0111111). 2. interj. What? Also frequently verb-doubled as "Ques ques?" See wall.
quick-and-dirty => adj. Describes a crock put together under time or user pressure. Used esp. when you want to convey that you think the fast way might lead to trouble further down the road. "I can have a quick-and-dirty fix in place tonight, but I'l...
quote chapter and verse => [by analogy with the mainstream phrase] v. To reproduce a relevant excerpt from an appropriate bible. "I don't care if `rn' gets it wrong; `Followup-To poster' is explicitly permitted by RFC-1036. I'll quote chapter and ver...
quotient => n. See coefficient.
quux => /kwuhks/ Mythically, from the Latin semi-deponent verb quuxo, quuxare, quuxandum iri; noun form variously `quux' (plural `quuces', anglicized to `quuxes') and `quuxu' (genitive plural is `quuxuum', for four u-letters out of seven in all, usin...
qux => /kwuhks/ The fourth of the standard metasyntactic variables, after baz and before the quu(u...)x series. See foo, bar, baz, quux. This appears to be a recent mutation from quux, and many versions of the standard series just run foo, bar, baz, ...
QWERTY => /kwer'tee/ [from the keycaps at the upper left] adj. Pertaining to a standard English-language typewriter keyboard (sometimes called the Sholes keyboard after its inventor), as opposed to Dvorak or foreign-language layouts or a {space-cadet...
random => adj. 1. Unpredictable (closest to mathematical definition); weird. "The system's been behaving pretty randomly." 2. Assorted; undistinguished. "Who was at the conference?" "Just a bunch of random business types." 3. (pejorative) Frivolous; ...
random numbers => n. When one wishes to specify a large but random number of things, and the context is inappropriate for N, certain numbers are preferred by hacker tradition (that is, easily recognized as placeholders). These include the following 1...
random numbers2 => as `the least random number'; see 23. 23 Sacred number of Eris, Goddess of Discord (along with 17 and 5). 42 The Answer to the Ultimate Question of Life, the Universe, and Everything. (Note that this answer is completely fortuitous...
random numbers3 => 69 From the sexual act. This one was favored in MIT's ITS culture. 105 69 hex = 105 decimal, and 69 decimal = 105 octal. 666 The Number of the Beast. For further enlightenment, consult the `Principia Discordia', `The Hitchhiker's G...
random numbers4 => to the Galaxy', `The Joy of Sex', and the Christian Bible (Revelation 138). See also Discordianism or consult your pineal gland. One common rhetorical maneuver uses any of the canonical random numbers as placeholders for variables....
random numbers5 => arguments, for arbitrary values of 42." "There are 69 ways to leave your lover, for 69 = 50." This is especially likely when the speaker has uttered a random number and realizes that it was not recognized as such, but even `non-ran...
random numbers6 => this fashion. A related joke is that pi equals 3 --- for small values of pi and large values of 3. 
randomness => n. An inexplicable misfeature; gratuitous inelegance. Also, a hack or crock that depends on a complex combination of coincidences (or, possibly, the combination upon which the crock depends for its accidental failure to malfunction). "T...
rape => vt. 1. To screw someone or something, violently; in particular, to destroy a program or information irrecoverably. Often used in describing file-system damage. "So-and-so was running a program that did absolute disk I/O and ended up raping th...
rare mode => [UNIX] adj. CBREAK mode (character-by-character with interrupts enabled). Distinguished from {raw mode} and `cooked mode'; the phrase "a sort of half-cooked (rare?) mode" is used in the V7/BSD manuals to describe the mode. Usage rare.
raster blaster => n. [Cambridge] Specialized hardware for bitblt operations (a blitter). Allegedly inspired by `Rasta Blasta', British slang for the sort of portable stereo Americans call a `boom box' or `ghetto blaster'.
raster burn => n. Eyestrain brought on by too many hours of looking at low-res, poorly tuned, or glare-ridden monitors, esp. graphics monitors. See {terminal illness}.
rat belt => n. A cable tie, esp. the sawtoothed, self-locking plastic kind that you can remove only by cutting (as opposed to a random twist of wire or a twist tie or one of those humongous metal clip frobs). Small cable ties are `mouse belts'.
rave => [WPI] vi. 1. To persist in discussing a specific subject. 2. To speak authoritatively on a subject about which one knows very little. 3. To complain to a person who is not in a position to correct the difficulty. 4. To purposely annoy another...
rave on! => imp. Sarcastic invitation to continue a rave, often by someone who wishes the raver would get a clue but realizes this is unlikely.
ravs => /ravz/, also `Chinese ravs' n. Jiao-zi (steamed or boiled) or Guo-tie (pan-fried). A Chinese appetizer, known variously in the plural as dumplings, pot stickers (the literal translation of guo-tie), and (around Boston) `Peking Ravioli'. The t...
raw mode => n. A mode that allows a program to transfer bits directly to or from an I/O device without any processing, abstraction, or interpretation by the operating system. Compare rare. This is techspeak under UNIX, jargon elsewhere.
rc file => /R-C fil/ [UNIX from the startup script `/etc/rc', but this is commonly believed to have been named after older scripts to `run commands'] n. Script file containing startup instructions for an application program (or an entire operating sy...

factpacks/jargon.fact  view on Meta::CPAN

sniff => v.,n. Synonym for poll.
snivitz => /sniv'itz/ n. A hiccup in hardware or software; a small, transient problem of unknown origin (less serious than a snark). Compare glitch.
SO => /S-O/ n. 1. (also `S.O.') Abbrev. for Significant Other, almost invariably written abbreviated and pronounced /S-O/ by hackers. Used to refer to one's primary relationship, esp. a live-in to whom one is not married. See MOTAS, MOTOS, MOTSS. 2. ...
social science number => [IBM] n. A statistic that is content-free, or nearly so. A measure derived via methods of questionable validity from data of a dubious and vague nature. Predictively, having a social science number in hand is seldom much bett...
social science number2 => considerably worse. Management loves them. See also numbers, math-out, {pretty pictures}. 
soft boot => n. See boot.
softcopy => /soft'ko-pee/ n. [by analogy with `hardcopy'] A machine-readable form of corresponding hardcopy. See bits, machinable.
software bloat => n. The results of {second-system effect} or {creeping featuritis}. Commonly cited examples include `ls(1)', X, BSD, Missed'em-five, and OS/2.
software rot => n. Term used to describe the tendency of software that has not been used in a while to lose; such failure may be semi-humorously ascribed to {bit rot}. More commonly, `software rot' strikes when a program's assumptions become out of d...
software rot2 => insufficiently robust, this may cause it to fail in mysterious ways. For example, owing to endemic shortsightedness in the design of COBOL programs, most will succumb to software rot when their 2-digit year counters {wrap around} at ...
software rot3 => Actually, related lossages often afflict centenarians who have to deal with computer software designed by unimaginative clods. One such incident became the focus of a minor public flap in 1990, when a gentleman born in 1889 applied f...
software rot4 => Raleigh, North Carolina. The new system refused to issue the card, probably because with 2-digit years the ages 101 and 1 cannot be distinguished. Historical note Software rot in an even funnier sense than the mythical one was a real...
software rot5 => (e.g., the R1; see {grind crank}). If a program that depended on a peculiar instruction hadn't been run in quite a while, the user might discover that the opcodes no longer did the same things they once did. ("Hey, so-and-so needs an...
software rot6 => We can snarf this opcode, right? No one uses it.") Another classic example of this sprang from the time an MIT hacker found a simple way to double the speed of the unconditional jump instruction on a PDP-6, so he patched the hardware...
software rot7 => fragile timing software in a music-playing program, throwing its output out of tune. This was fixed by adding a defensive initialization routine to compare the speed of a timing loop with the real-time clock; in other words, it figur...
software rot8 => day, and corrected appropriately. Compare {bit rot}. 
softwarily => /soft-weir'i-lee/ adv. In a way pertaining to software. "The system is softwarily unreliable." The adjective `softwary' is *not* used. See hardwarily.
softy => [IBM] n. Hardware hackers' term for a software expert who is largely ignorant of the mysteries of hardware.
some random X => adj. Used to indicate a member of class X, with the implication that Xs are interchangeable. "I think some random cracker tripped over the guest timeout last night." See also {J. Random}.
sorcerer's apprentice mode => [from the film "Fantasia"] n. A bug in a protocol where, under some circumstances, the receipt of a message causes multiple messages to be sent, each of which, when received, triggers the same bug. Used esp. of such beha...
sorcerer's apprentice mode2 => loops in email software. Compare {broadcast storm}, {network meltdown}. 

factpacks/jargon.fact  view on Meta::CPAN

tanked => adj. Same as down, used primarily by UNIX hackers. See also hosed. Popularized as a synonym for `drunk by Steve Dallas in the late lamented "Bloom County" comic strip.
tar and feather => [from UNIX `tar(1)] vt. To create a transportable archive from a group of files by first sticking them together with `tar(1) (the Tape ARchiver) and then compressing the result (see compress). The latter action is dubbed `featherin...
tar and feather2 => an airplane propeller to decrease wind resistance, or with an oar to reduce water resistance; smaller files, after all, slip through comm links more easily. 
taste => [primarily MIT] n. 1. The quality in a program that tends to be inversely proportional to the number of features, hacks, and kluges programmed into it. Also `tasty, `tasteful, `tastefulness. "This feature comes in N tasty flavors." Although ...
tayste => /tayst/ n. Two bits; also as taste. Syn. crumb, quarter. Compare {byte}, dynner, playte, nybble, quad.
TCB => /T-C-B/ [IBM] n. 1. Trouble Came Back. An intermittent or difficult-to-reproduce problem that has failed to respond to neglect. Compare heisenbug. Not to be confused with 2. Trusted Computing Base, an `official jargon term from the {Orange Boo...
ISO standard cup of tea => [South Africa] n. A cup of tea with milk and one teaspoon of sugar, where the milk is poured into the cup before the tea. Variations are ISO 0, with no sugar; ISO 2, with two spoons of sugar; and so on. Like many ISO standa...
ISO standard cup of tea2 => ring in North America, where hackers generally shun the decadent British practice of adulterating perfectly good tea with dairy products and prefer instead to add a wedge of lemon, if anything. If one were feeling extremel...
ISO standard cup of tea3 => analogous `ANSI standard cup of tea and wind up with a political situation distressingly similar to several that arise in much more serious technical contexts. Milk and lemon dont mix very well. 
TechRef => /tekref/ [MS-DOS] n. The original `IBM PC Technical Reference Manual, including the BIOS listing and complete schematics for the PC. The only PC documentation in the issue package thats considered serious by real hackers.
TECO => /teekoh/ obs. 1. vt. Originally, to edit using the TECO editor in one of its infinite variations (see below). 2. vt.,obs. To edit even when TECO is *not* the editor being used! This usage is rare and now primarily historical. 2. [originally a...
tee => n.,vt. [Purdue] A carbon copy of an electronic transmission. "Oh, youre sending him the bits to that? Slap on a tee for me." From the UNIX command `tee(1), itself named after a pipe fitting (see plumbing). Can also mean `save one for me, as in...
Telerat => /tel*-rat/ n. Unflattering hackerism for `Teleray, a line of extremely losing terminals. See also terminak, sun-stools, HP-SUX.
TELNET => /telnet/ vt. To communicate with another Internet host using the TELNET program. TOPS-10 people used the word IMPCOM, since that was the program name for them. Sometimes abbreviated to TN /T-N/. "I usually TN over to SAIL just to read the A...
ten-finger interface => n. The interface between two networks that cannot be directly connected for security reasons; refers to the practice of placing two terminals side by side and having an operator read from one and type into the other.
tense => adj. Of programs, very clever and efficient. A tense piece of code often got that way because it was highly bummed, but sometimes it was just based on a great idea. A comment in a clever routine by Mike Kazar, once a grad-student hacker at C...
tenured graduate student => n. One who has been in graduate school for 10 years (the usual maximum is 5 or 6) a `ten-yeared student (get it?). Actually, this term may be used of any grad student beginning in his seventh year. Students dont really get...
tenured graduate student2 => professors do, but a tenth-year graduate student has probably been around the university longer than any untenured professor. 
tera- => /ter*/ [SI] pref. See {quantifiers}.
teraflop club => /ter*-flop kluhb/ [FLOP = Floating Point Operation] n. A mythical association of people who consume outrageous amounts of computer time in order to produce a few simple pictures of glass balls with intricate ray-tracing techniques. C...
teraflop club2 => said to have been the founder. 

factpacks/jargon.fact  view on Meta::CPAN

tick => n. 1. A jiffy (sense 1). 2. In simulations, the discrete unit of time that passes between iterations of the simulation mechanism. In AI applications, this amount of time is often left unspecified, since the only constraint of interest is the ...
tick-list features => [Acorn Computers] n. Features in software or hardware that customers insist on but never use (calculators in desktop TSRs and that sort of thing). The American equivalent would be `checklist features, but this jargon sense of th...
tickle a bug => vt. To cause a normally hidden bug to manifest through some known series of inputs or operations. "You can tickle the bug in the Paradise VGA cards highlight handling by trying to set bright yellow reverse video."
tiger team => [U.S. military jargon] n. A team whose purpose is to penetrate security, and thus test security measures. These people are paid professionals who do hacker-type tricks, e.g., leave cardboard signs saying "bomb" in critical defense insta...
tiger team2 => "Your codebooks have been stolen" (they usually havent been) inside safes, etc. After a successful penetration, some high-ranking security type shows up the next morning for a `security review and finds the sign, note, etc., and all he...
tiger team3 => of tiger teams sometimes lead to early retirement for base commanders and security officers (see the patch entry for an example). A subset of tiger teams are professional crackers, testing the security of military computer installation...
tiger team4 => via networks or supposedly `secure comm channels. Some of their escapades, if declassified, would probably rank among the greatest hacks of all times. The term has been adopted in commercial computer-security circles in this more speci...
time sink => [poss. by analogy with `heat sink or `current sink] n. A project that consumes unbounded amounts of time.
time T => /tim T/ n. 1. An unspecified but usually well-understood time, often used in conjunction with a later time T+1. "Well meet on campus at time T or at Louies at time T+1" means, in the context of going out for dinner "We can meet on campus an...
time T2 => Louies itself a bit later." (Louies is a Chinese restaurant in Palo Alto that is a favorite with hackers.) Had the number 30 been used instead of the number 1, it would have implied that the travel time from campus to Louies is 30 minutes;...
time T3 => hasnt been decided on yet), you can meet half an hour later at Louies than you could on campus and end up eating at the same time. See also {since time T equals minus infinity}. 
times-or-divided-by => [by analogy with `plus-or-minus] quant. Term occasionally used when describing the uncertainty associated with a scheduling estimate, for either humorous or brutally honest effect. For a software project, the factor is usually ...
tinycrud => /tinee-kruhd/ n. A pejorative used by habitues of older game-oriented MUD versions for TinyMUDs and other user-extensible MUD variants; esp. common among users of the rather violent and competitive AberMUD and MIST systems. These people j...
tip of the ice-cube => [IBM] n. The visible part of something small and insignificant. Used as an ironic comment in situations where `tip of the iceberg might be appropriate if the subject were actually nontrivial.
tired iron => [IBM] n. Hardware that is perfectly functional but far enough behind the state of the art to have been superseded by new products, presumably with sufficient improvement in bang-per-buck that the old stuff is starting to look a bit like...
tits on a keyboard => n. Small bumps on certain keycaps to keep touch-typists registered (usually on the `5 of a numeric keypad, and on the `F and `J of a QWERTY keyboard).
TLA => /T-L-A/ [Three-Letter Acronym] n. 1. Self-describing acronym for a species with which computing terminology is infested. 2. Any confusing acronym. Examples include MCA, FTP, SNA, CPU, MMU, SCCS, DMU, FPU, NNTP, TLA. People who like this looser...
TMRC => /tmerk/ n. The Tech Model Railroad Club at MIT, one of the wellsprings of hacker culture. The 1959 `Dictionary of the TMRC Language compiled by Peter Samson included several terms which became basics of the hackish vocabulary (see esp. foo an...
to a first approximation => 1. [techspeak] When one is doing certain numerical computations, an approximate solution may be computed by any of several heuristic methods, then refined to a final value. By using the starting point of a first approximat...
to a first approximation2 => algorithm that converges more quickly to the correct result. 2. In jargon, a preface to any comment that indicates that the comment is only approximately true. The remark "To a first approximation, I feel good" might indi...
to a first approximation3 => reveal that not all is perfect (e.g., a nagging cough still remains after an illness). 
to a zeroth approximation => [from `to a first approximation] A *really* sloppy approximation; a wild guess. Compare {social science number}.
toast => 1. n. Any completely inoperable system or component, esp. one that has just crashed and burned "Uh, oh ... I think the serial board is toast." 2. vt. To cause a system to crash accidentally, especially in a manner that requires manual reboot...
toaster => n. 1. The archetypal really stupid application for an embedded microprocessor controller; often used in comments that imply that a scheme is inappropriate technology (but see {elevator controller}). "DWIM for an assembler? Thatd be as sill...
toeprint => n. A footprint of especially small size.
toggle => vt. To change a bit from whatever state it is in to the other state; to change from 1 to 0 or from 0 to 1. This comes from `toggle switches, such as standard light switches, though the word `toggle actually refers to the mechanism that keep...
tool => 1. n. A program used primarily to create, manipulate, modify, or analyze other programs, such as a compiler or an editor or a cross-referencing program. Oppose app, {operating system}. 2. [UNIX] An application program with a simple, `transpar...
toolsmith => n. The software equivalent of a tool-and-die specialist; one who specializes in making the tools with which other programmers create applications. See also uninteresting.
topic drift => n. Term used on GEnie, USENET and other electronic fora to describe the tendency of a thread to drift away from the original subject of discussion (and thus, from the Subject header of the originating message), or the results of that t...
topic drift2 => reminders that the discussion has strayed off any useful track. "I think we started with a question about Nivens last book, but weve ended up discussing the sexual habits of the common marmoset. Now *thats* topic drift!" 
topic group => n. Syn. forum.
TOPS-10 => /tops-ten/ n. DECs proprietary OS for the fabled PDP-10 machines, long a favorite of hackers but now effectively extinct. A fountain of hacker folklore; see appendix A. See also {ITS}, {TOPS-20}, {TWENEX}, VMS, {operating system}. TOPS-10 ...
TOPS-20 => /tops-twentee/ n. See {TWENEX}.

factpacks/jargon.fact  view on Meta::CPAN

wango => /wang'goh/ n. Random bit-level grovelling going on in a system during some unspecified operation. Often used in combination with mumble. For example "You start with the `.o' file, run it through this postprocessor that does mumble-wango --- ...
wank => /wangk/ [Columbia University prob. by mutation from Commonwealth slang v. `wank', to masturbate] n.,v. Used much as hack is elsewhere, as a noun denoting a clever technique or person or the result of such cleverness. May describe (negatively)...
wannabee => /won'*-bee/ (also, more plausibly, spelled `wannabe') [from a term recently used to describe Madonna fans who dress, talk, and act like their idol; prob. originally from biker slang] n. A would-be hacker. The connotations of this term dif...
warm boot => n. See boot.
wart => n. A small, crocky feature that sticks out of an otherwise clean design. Something conspicuous for localized ugliness, especially a special-case exception to a general rule. For example, in some versions of `csh(1)', single quotes literalize ...
washing machine => n. Old-style 14-inch hard disks in floor-standing cabinets. So called because of the size of the cabinet and the `top-loading' access to the media packs --- and, of course, they were always set on `spin cycle'. The washing-machine ...
washing machine2 => it is even used in Russian hacker jargon. See also {walking drives}. The thick channel cables connecting these were called `bit hoses' (see hose). 
water MIPS => n. (see MIPS, sense 2) Large, water-cooled machines of either today's ECL-supercomputer flavor or yesterday's traditional mainframe type.
wave a dead chicken => v. To perform a ritual in the direction of crashed software or hardware that one believes to be futile but is nevertheless necessary so that others are satisfied that an appropriate degree of effort has been expended. "I'll wav...
wave a dead chicken2 => code, but I really think we've run into an OS bug." Compare {voodoo programming}, {rain dance}. 
weasel => n. [Cambridge] A na"ive user, one who deliberately or accidentally does things that are stupid or ill-advised. Roughly synonymous with loser.
wedged => [from a common description of recto-cranial inversion] adj. 1. To be stuck, incapable of proceeding without help. This is different from having crashed. If the system has crashed, then it has become totally non-functioning. If the system is...
wedgie => [Fairchild] n. A bug. Prob. related to wedged.
wedgitude => /wedj'i-t[y]ood/ n. The quality or state of being wedged.
weeble => /weeb'l/ [Cambridge] interj. Used to denote frustration, usually at amazing stupidity. "I stuck the disk in upside down." "Weeble...." Compare gurfle.
weeds => n. 1. Refers to development projects or algorithms that have no possible relevance or practical application. Comes from `off in the weeds'. Used in phrases like "lexical analysis for microcode is serious weeds...." 2. At CDC/ETA before its d...
weenie => n. 1. When used with a qualifier (for example, as in {UNIX weenie}, VMS weenie, IBM weenie) this can be either an insult or a term of praise, depending on context, tone of voice, and whether or not it is applied by a person who considers hi...
Weenix => /wee'niks/ [ITS] n. A derogatory term for {UNIX}, derived from {UNIX weenie}. According to one noted ex-ITSer, it is "the operating system preferred by Unix Weenies typified by poor modularity, poor reliability, hard file deletion, no file ...
well-behaved => adj. 1. [primarily {MS-DOS}] Said of software conforming to system interface guidelines and standards. Well-behaved software uses the operating system to do chores such as keyboard input, allocating memory and drawing graphics. Oppose...
well-connected => adj. Said of a computer installation, this means that it has reliable email links with {the network} and/or that it relays a large fraction of available USENET newsgroups. `Well-known' can be almost synonymous, but also implies that...
wetware => /wet'weir/ [prob. from the novels of Rudy Rucker] n. 1. The human nervous system, as opposed to computer hardware or software. "Wetware has 7 plus or minus 2 temporary registers." 2. Human beings (programmers, operators, administrators) at...

factpacks/jargon.fact  view on Meta::CPAN

Yet Another2 => Simulated Annealing Algorithm'. 2. Of others' work Describes something of which there are far too many. See also YA-, YABA, YAUN. 
You are not expected to understand this => cav. [UNIX] The canonical comment describing something magic or too complicated to bother explaining properly. From an infamous comment in the context-switching code of the V6 UNIX kernel.
You know you've been hacking too long when... => The set-up line for a genre of one-liners told by hackers about themselves. These include the following * not only do you check your email more often than your paper mail, but you remember your {networ...
You know you've been hacking too long when...2 => postal one. * your SO kisses you on the neck and the first thing you think is "Uh, oh, {priority interrupt}." * you go to balance your checkbook and discover that you're doing it in octal. * your comp...
You know you've been hacking too long when...3 => value than your car. * in your universe, `round numbers' are powers of 2, not 10. * more than once, you have woken up recalling a dream in some programming language. * you realize you have never seen ...
You know you've been hacking too long when...4 => early version of this entry said "All but one of these have been reliably reported as hacker traits (some of them quite often). Even hackers may have trouble spotting the ringer." The ringer was balan...
You know you've been hacking too long when...5 => made up out of whole cloth. Although more respondents picked that one out as fiction than any of the others, I also received multiple independent reports of its actually happening. --- ESR] 
Your mileage may vary => cav. [from the standard disclaimer attached to EPA mileage ratings by American car manufacturers] 1. A ritual warning often found in UNIX freeware distributions. Translates roughly as "Hey, I tried to write this portably, but...
Your mileage may vary2 => system?" 2. A qualifier more generally attached to advice. "I find that sending flowers works well, but your mileage may vary." 
Yow! => /yow/ [from "Zippy the Pinhead" comix] interj. A favored hacker expression of humorous surprise or emphasis. "Yow! Check out what happens when you twiddle the foo option on this display hack!" Compare gurfle.
yoyo mode => n. The state in which the system is said to be when it rapidly alternates several times between being up and being down. Interestingly (and perhaps not by coincidence), many hardware vendors give out free yoyos at Usenix exhibits. Sun Mi...
yoyo mode2 => SIGPLAN '88. Tourists staying at one of Atlanta's most respectable hotels were subsequently treated to the sight of 200 of the country's top computer scientists testing yo-yo algorithms in the lobby. 
Yu-Shiang Whole Fish => /yoo-shyang hohl fish/ n. obs. The character gamma (extended SAIL ASCII 0001001), which with a loop in its tail looks like a little fish swimming down the page. The term is actually the name of a Chinese dish in which a fish i...
Yu-Shiang Whole Fish2 => covered with Yu-Shiang (or Yu-Hsiang) sauce. Usage primarily by people on the MIT LISP Machine, which could display this character on the screen. Tends to elicit incredulity from people who hear about it second-hand. 
zap => 1. n. Spiciness. 2. vt. To make food spicy. 3. vt. To make someone `suffer' by making his food spicy. (Most hackers love spicy food. Hot-and-sour soup is considered wimpy unless it makes you wipe your nose for the rest of the meal.) See zapped...
zapped => adj. Spicy. This term is used to distinguish between food that is hot (in temperature) and food that is *spicy*-hot. For example, the Chinese appetizer Bon Bon Chicken is a kind of chicken salad that is cold but zapped; by contrast, vanilla...
zen => vt. To figure out something by meditation or by a sudden flash of enlightenment. Originally applied to bugs, but occasionally applied to problems of life in general. "How'd you figure out the buffer allocation problem?" "Oh, I zenned it." Cont...
zero => vt. 1. To set to 0. Usually said of small pieces of data, such as bits or words (esp. in the construction `zero out'). 2. To erase; to discard all data from. Said of disks and directories, where `zeroing' need not involve actually writing zer...
zero-content => adj. Syn. content-free.
zeroth => /zee'rohth/ adj. First. Among software designers, comes from C's and LISP's 0-based indexing of arrays. Hardware people also tend to start counting at 0 instead of 1; this is natural since, e.g., the 256 states of 8 bits correspond to the b...
zigamorph => /zig'*-morf/ n. Hex FF (11111111) when used as a delimiter or fence character. Usage primarily at IBM shops.

factpacks/ports.fact  view on Meta::CPAN

port 103 => gppitnp - Genesis Point-to-Point Trans Net 
port 104 => acr-nema - ACR-NEMA Digital Imag. & Comm. 300 
port 105 => cso - CCSO name server protocol 
port 105 => csnet-ns - Mailbox Name Nameserver 
port 106 => 3com-tsmux - 3COM-TSMUX 
port 107 => rtelnet - Remote Telnet Service 
port 108 => snagas - SNA Gateway Access Server 
port 109 => pop2 - Post Office Protocol - Version 2 
port 110 => pop3 - Post Office Protocol - Version 3 
port 111 => sunrpc - SUN Remote Procedure Call 
port 112 => mcidas - McIDAS Data Transmission Protocol 
port 113 => ident - 113/tcp => auth - Authentication Service 
port 114 => audionews - Audio News Multicast 
port 115 => sftp - Simple File Transfer Protocol 
port 116 => ansanotify - ANSA REX Notify 
port 117 => uucp-path - UUCP Path Service 
port 118 => sqlserv - SQL Services 
port 119 => nntp - Network News Transfer Protocol 
port 120 => cfdptkt - CFDPTKT 
port 121 => erpc - Encore Expedited Remote Pro.Call 
port 122 => smakynet - SMAKYNET 

factpacks/security.fact  view on Meta::CPAN

security => Synonymous with automated information systems security.
security subsystem => A device designed to provide limited computer security features in a larger system environment.
concealment system => A method of achieving confidentiality in which sensitive information is hidden by embedding it in irrelevant data.
confidentiality => (1) The assurance that information is not disclosed to inappropriate entities or processes. (2) The property that information is not made available or disclosed to unauthorized entities. (3) The prevention of the unauthorized discl...
configuration => the selection of one of the sets of possible combinations of features of a Target of Evaluation.
configuration control => management of changes made to a system's hardware, software, firmware, and documentation throughout the development and operational life of the system.
configuration management => The management of security features and assurances through control of changes made to a system's hardware, software, firmware, documentation, test, test fixtures and test documentation throughout the development and operat...
confinement => The prevention of the leaking of sensitive data from a program.
confinement channel => Synonymous with covert channel.
confinement property => Synonymous with star property (*-property).
connection => a liaison, in the sense of a network interrelationship, between two hosts for a period of time. The liaison is established (by an initiating host) for the purpose of information transfer (with the associated host); the period of time is...
constrained => A qualifier implying: within the TSF Scope of Control
construction => the process of creating a Target of Evaluation.
consumers => Individuals or groups responsible for specifying requirements for IT product security (e.g., policy makers and regulatory officials, system architects, integrators, acquisition managers, product purchasers, and end users.
contamination => The intermixing of data at different sensitivity and need-to-know levels.  The lower level data is said to be contaminated by the higher level data; thus, the contaminating (higher level) data may not receive the required level of pr...
content-dependent access control => Access control in which access is determined by the value of the data to be accessed.
context-dependent access control => Access control in which access is determined by the specific circumstances under which the data is being accessed.
contingency plan => A plan for emergency response, backup operations, and post-disaster recovery maintained by an activity as a part of its security program that will ensure the availability of critical resources and facilitate the continuity of oper...
control objective => Required result of protecting information within an IT product and its immediate environment.
control zone => The space, expressed in feet of radius, surrounding equipment processing sensitive information, that is under sufficient physical and technical control to preclude an unauthorized entry or compromise.
controlled access => See access control.

factpacks/security.fact  view on Meta::CPAN

covert storage channel => A covert channel that involves the direct or indirect writing of a storage location by one process and the direct or indirect reading of the storage location by another process.  Covert storage channels typically involve a f...
covert timing channel => A covert channel in which one process signals information to another by modulating its own use of system resources (e.g=2E, CPU time) in such a way that this manipulation affects the real response time observed by the second ...
criteria => See DoD Trusted Computer System Evaluation Criteria. Examples of other criteria are the Information Technology Security Evaluation Criteria (Europe), Canadian Trusted Computer Product Evaluation Criteria, Federal Criteria for Information ...
critical mechanism => a mechanism within a Target of Evaluation whose failure would create a security weakness. Customer - the person or organisation that purchases a Target of Evaluation.
cryptoalgorithm => A well-defined procedure or sequence of rules or steps used to produce a key stream or ciphertext from plaintext and vice versa.
cryptography => (1) The principles, means, and methods for rendering information unintelligible, and for restoring encrypted information to intelligible form. (2) The transformation of ordinary text, or "plaintext," into coded form by encryption and ...
cryptosecurity => The security or protection resulting from the proper use of technically sound cryptosystems. 
data => Information with a specific physical representation.
data confidentiality => the state that exists when data is held in confidence and is protected from unauthorized disclosure.
DES => Data Encryption Standard - (1) A cryptographic algorithm for the protection of unclassified data, published in US Federal Information Processing Standard (FIPS) 46. The DES, which was approved by the US National Institute of Standards and Tech...
data integrity => (1) The state that exists when computerized data is the same as that in the source documents and has not been exposed to accidental or malicious alteration or destruction. (2) The property that data has not been exposed to accidenta...
data flow control => Synonymous with  information flow control.
data security => The protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure.
database management system => A computer system whose main function is to facilitate the sharing of a common set of data among many different users. It may or may not maintain semantic relationships among the data items.
DBMS => Abbreviation for "database management system."
decomposition => Requirement in a protection profile that spans several components. Note: The decomposition of a specific requirement becomes necessary when that requirement must be assigned to multiple components of the generic product requirements ...
dedicated security mode => the mode of operation in which the system is specifically and exclusively dedicated to and controlled for the processing of one particular type or classification of information, either for full-time operation or for a speci...
default classification => A temporary classification reflecting the highest classification being processed in a system.  The default classification is included in the caution statement affixed to the object.
degauss => To reduce magnetic flux density to zero by applying a reverse magnetizing field.
DPL => Degausser Products List - A list of commercially produced degaussers that meet US National Security Agency (NSA) specifications. This list is included in NSA's "Information Systems Security Products and Services Catalogue," available through t...
degausser => An electrical device that can generate a magnetic field for the purpose of degaussing magnetic storage media.  Degausser Products List (DPL) A list of commercially produced degaussers that meet National Security Agency specifications.  T...
delivery => the process whereby a copy of the Target of Evaluation is transferred from the developer to a customer.
DOS => Denial Of Service - (1) The prevention of authorized access to system assets or services or the delaying of time-critical operations. (2) Any action or series of actions that prevents any part of a system from functioning in accordance with it...

factpacks/security.fact  view on Meta::CPAN

internal subject => a subject which is not acting as direct surrogate for a user. A process which is not associated with any user but performs system-wide functions such as packet switching, line printer spooling, and so on. Also known as a daemon or...
interoperability => The ability of computers to act upon information received from one another.
isolation => The containment of subjects and objects in a system in such a way that they are separated from one another, as well as from the protection controls of the operating system.
IT Security => The state of security in an IT system.
IT System => A specific IT installation, with a particular purpose and operational environment.
key management => A method of electronically transmitting, in a secure fashion, a secret key for use with a secret key cryptographic system. Key management can be used to support communications privacy. This method can be accomplished most securely w...
key escrow system => An electronic means of reconstructing a secret key (for secret key encryption) or a private key (for public key encryption)=2E The reconstructed key can then be used in a process to decrypt a communication.
key => A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt or decrypt messages and conversations. The keys must be known or guessed to forge a digital signature or decrypt an en...
label => see Security Label and Sensitivity Label.
lattice => A partially ordered set for which every pair of elements has a greatest lower bound and a least upper bound.
least privilege => The principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, erro...
limited access => Synonymous with access control.
list oriented => A computer protection system in which each protected object has a list of all subjects authorized to access it.  Compare ticket-oriented.
local requirements => Those for which separate analysis of the individual TCB (trusted computing base) subsets suffices to determine compliance for the composite TCB. (See the trusted database interpretation of the Trusted Computer System Evaluation ...
lock and key protection system => A protection system that involves matching a key or password with a specific access requirement.
logic bomb => A resident computer program that triggers the perpetration of an unauthorized act when particular states of the system are realized.
loophole => An error of omission or oversight in software or hardware that permits circumventing the system security policy.
*-property => (Star Property) - A Bell-LaPadula security model rule allowing a subject write access to an object only if the security level of the subject is dominated by the security level of the object.  Also known as the Confinement Property.
star property => A Bell-LaPadula security model rule allowing a subject write access to an object only if the security level of the subject is dominated by the security level of the object.  Also known as the Confinement Property.
machine user => A  machine,  group  of  machines  or  other  logical  entity outside  of  the  TOE  with interacts with the TOE.
magnetic remanence => A measure of the magnetic flux density remaining after removal of the applied magnetic force.  Refers to any data remaining on magnetic storage media after removal of the power.

factpacks/security.fact  view on Meta::CPAN

primitive => An ordering relation between TCB subsets based on dependency (see "depends" above). A TCB subset B is more primitive than a second TCB subset A (and A is less primitive than B) if (a) A directly depends on B or (b) a chain of TCB subsets...
print suppression => Eliminating the displaying of characters in order to preserve their secrecy; e.g., not displaying the characters of a password as it is keyed at the input terminal.
privacy => (1) the ability of an individual or organization to control the collection, storage, sharing, and dissemination of personal and organizational information. (2) The right to insist on adequate security of, and to define authorized users of,...
private key =>  The undisclosed key in a matched key pair - private key and public key - that each party safeguards for public key cryptography.
privilege => Special authorization that is granted to particular users to perform security rel- evant operations.
privileged instructions => A set of instructions (e.g., interrupt handling or special computer instructions) to control features (such as storage protection features) that are generally executable only when the automated system is operating in the ex...
procedural security => Synonymous with administrative security.
process => a program in execution. It is completely characterized by a single current execution point (represented by the machine state) and address space.
producers =>  Providers of IT (information technology) product security (for example, product vendors, product developers, security analysts, and value-added resellers).
product => A package of IT software and/or hardware, providing functionality designed for use or incorporation within a multiplicity of systems.
product rationale => a description of the security capabilities of a product, giving the necessary information for a prospective purchaser to decide whether it will help to satisfy his system security objectives.
production =>  the process whereby copies of the Target of Evaluation are generated for distribution to customers.
profile => Detailed security description of the physical structure, equipment component, lo- cation, relationships, and general operating environment of an IT product or AIS. (See Protection Profile.) 
profile assurance => Measure of confidence in the technical soundness of a protection profile.
proprietary information => Information that is owned by a private enterprise and whose use and/or distribution is restricted by that enterprise. <br><br>Note: Proprietary information may be related to the company's products, business, or activities, ...
protection philosophy => An informal description of the overall design of a system that delineates each of the protection mechanisms employed.  A combination (appropriate to the evaluation class) of formal and informal techniques is used to show that...
PP => Protection Profile - A  combination  of  security  requirements including  assurance  and  functional requirements with associated rationale and target environment
protection ring =>  One of a hierarchy of privileged modes of a system that gives certain access rights to user programs and processes authorized to operate in a given mode. 
protocols => A set of rules and formats, semantic and syntactic, that permits entities to exchange information.
pseudoflaw => An apparent loophole deliberately implanted in an operating system program as a trap for intruders.
public key cryptography => Cryptography using two matched keys (or asymmetric cryptography) in which a single private key is not shared by a pair of users. Instead, users have their own key pairs. Each key pair consists of a matched private and publi...

factpacks/techdict.fact  view on Meta::CPAN

Extended Binary Coded Decimal Interchange Code => (EBCDIC) This is a way of encoding 256 characters in binary, much like ASCII, but used mainly on mainframes. Most of the time, EBCDIC is only mentioned in translations between EBCDIC and ASCII.
Extended partition => This is a type of partition that is an extension of a primary partition. It's possible to have many extended partitions on a hard drive.
Extranet => An Extranet is an intranet that extends onto the Internet. Confusing? Yes. Extranets are external extensions of a company's intranet that allow certain people to interact from the Internet. Not all intranets are Extranets. 
Fabless => This term refers to a company that produces chips but doesn't own a fabrication plant, or fab. These companies are starting to become more and more successful at creating chips and renting out other companies' excess fabs to produce their ...
Fabrication Plant => A fab is a factory that takes raw silicon wafers and creates chips with them. Often, fabs are categorized by what micron process they use. For example, the Intel Pentium chip with MMX is produced in a fab with a 0.35 micron proce...
FAQ => (Frequently Asked Questions) This is a document that lists the most common questions about something (with the answers, of course).
Fast SCSI 2 => This version of SCSI transfers data at 10 Mbps. The connections all contain 50 pins. See also Fast-Wide SCSI 2.
Fast-SCSI => Plain vanilla fast-SCSI never really existed. See Fast-SCSI 2
Fast-Wide SCSI 2 => This version of SCSI upped the pin count to 68, effectively doubling the signal speed of Fast-SCSI 2 to 20 Mbps.
Fat Client => Today's fast PCs are fat clients. They've got lots of memory and big hard drives. They store information and run programs locally off of their hard drives. Fat clients usually work in client/server environments, where they leave the ser...
FCC => (Federal Communications Commission) These are the people in the government who decide what's legal and illegal to broadcast, including what frequencies are allowed to be used by whom.
FDDI => (Fiber Distributed Data Interface) This is a fiber optic interface that allows data to travel extreme distances (many miles/kilometers) without signal loss. It is far superior to copper wire for data integrity as well. FDDI is often used to c...
Feature => A feature is something that a piece of hardware or software is designed to do. Many things that appear to be bugs are actually features. Often, a hardware or software developer will have to make a tradeoff in functionality that causes some...
Fiber Optic => A method of transmission alternative to copper. The way it works is by pulsing light down a strand of glass. These pulses represent binary code. So far, that's no better than copper. The advantage is that a single strand of fiber optic...
FIFO Buffer (First In First Out Buffer) => An area of memory that holds information in the order in which it was received until the computer has time to use it.
Firewall => This is a form of Internet security that stands between a private network and the Internet. It is like a wall in that it can prevent unwanted traffic from passing either way. Some firewalls have proxy functions built in. In fact, the dist...
Firewire => An up and coming serial technology that promises to speed data at 200 => 400 Mbps. This standard may eventually replace your serial ports, parallel ports, game ports, USB and maybe even SCSI.
FishNet => This is a type of stocking material that Joel likes to wear under his pants.
Flash BIOS => This BIOS contains a flash ROM chip that can be updated under certain conditions, but is otherwise static.
Flash ROM => A rewriteable ROM that doesn't lose its info when the power turns off.
Flat Screen => A CRT that is made more flat than a standard tube by using more than one electron gun. It is most useful to professionals who rely on the precision of their monitors. It is also better for the standard user because a straight light acr...

factpacks/techdict.fact  view on Meta::CPAN

I/O => (Input/Output) This abbreviation refers to any operation in a computer where data is transferred in or out of the computer. I/O may seem like a vague concept, but it refers to the basic throughput power of a computer.
I2O => The I2O standard is designed to simplify and speed up I/O operations on servers. It will eliminate the need for different drivers for each OS, and for each SCSI card and network card. The speedup is achieved by using an Intel 960 chip on the s...
IA-32 => (Intel Architecture-32 bit) This is Intel's 32-bit instruction architecture that runs on their 386, 486, Pentium, Pentium Pro, and Pentium II chips.
IA-64 => (Intel Architecture-64 bit) Intel's 64-bit instruction architecture that will feature EPIC and run on the Merced processor when it is released.
IDE => (Integrated Device Electronics) IDE is the standard hard drive interface for PCs. You can connect a maximum of two hard drives to an IDE connection or channel. IDE hard drives are cheaper than SCSI drives, but IDE is generally slower than SCSI...
Impression => When a user looks at a page on the World Wide Web, that visit is counted as one impression regardless of how many images are on that page. Most access log analysis tools remove server requests that reference ".gif", or ".jpg" (image tag...
Inkjet Printer => The next generation of dot matrix printers. It uses a head that sprays tiny droplets of ink onto print material. There are three major benefits to this method: 1) it is quieter than standard dot matrix printers, 2) it is able to mak...
Input => Anything entered into a computer or system. This includes keystrokes, mouse movement, and talking into a microphone.
Instruction => The simplest direction that you can give to a processor. Programs are made up of these, but you usually don't go down to such nitty-gritty levels. An example of what a single instruction would do is incrementing a piece of data by one,...
Intermediate Code => This is code that is generated by the first step in a compiler. Rather than translating code directly from one language to another, it first translates it to this more generic and easier to manipulate language and then spits it a...
International Telecommunications Union (ITU) => This is a Swiss organization that decides on international telecommunications standards. Currently, they are working on the 56K standard.
Internet => The global network of computers constantly connected to each other using standardized communications protocols, specifically TCP/IP.
Intranet => Local network of computers using TCP/IP as the standard communications protocol. Usually an Intranet features some sort of HTML content that you can use a browser to look at. Think of it as a mini, private Internet.
IP Address => The specific network address of a computer on a network using TCP/IP as its network protocol.
IRDA => (InfraRed Data Association) These people developed the IRDA port standard that transfers data through the use of infrared light. Of course, you must have two IRDA devices to get any real use out of this technology. Most notebooks today come s...
IRQ => (Interrupt request) This is a gateway for devices to request time from the processor to do their jobs. For instance, every time you hit a key on your keyboard an interrupt is generated on the keyboard IRQ. This is mainly only a concern for PC ...
IS => (Information Services) This refers to the field of computer technology but has been replaced by the newer and sexier term, "IT."
ISA => (Industry Standard Adapter) The 8- and 16-bit original connectors used in PCs. They run at a bus speed of 8 MHz. You can plug ISA expansion cards into an ISA slot. Modems and sound cards are ISA cards due to their low bandwidth requirements.
ISAPI => (Internet Server API) This is an API proposed by Microsoft to replace CGI. Programs written to ISAPI are compiled as DLLs and stored in memory so they can be run faster than CGI scripts.
ISDN => (Integrated Services Digital Network) This is a digital line that is often used to connect to the Internet. It generally come in two flavors: one is a 56 Kbps version, which in actuality only uses half of the ISDN line's bandwidth; the other ...
ISP => (Internet Service Provider) An ISP provides Internet access to people or corporations. ISPs generally have pools of modems awaiting dial-up connections. Smaller ISPs buy bandwidth from larger ISPs. There are two basic ways of connecting: one i...

factpacks/techdict.fact  view on Meta::CPAN

Specular Highlights => This allows for the appearance of light reflecting off an object. White or light-colored pixels are blended into darker areas to provide this function.
Spider => Also known as a Web crawler, a robot, Web spider, or sometimes a worm. A program that runs on the Internet, goes out to an URL (Web page), and requests all links that are referred to on that page. Robots learn as they go, building a databas...
SQL => (Structured Query Language) This is a type of relational database that features data in rows and columns. Each row represents a record. Each column is a field. Most serious database solutions today use some form of SQL to store and access larg...
SRAM => (Static Random Access Memory) Much more expensive and physically larger than DRAM, but much faster. The fastest SRAM has a latency of about 5 nanoseconds.
SSD => (Solid State Disk) The D in SSD is really a misnomer. SSD storage is basically a huge block of RAM chips that functions like a hard drive. SSD drives (obviously) are extremely expensive, but offer very high data speeds that are necessary in so...
SSL => see Secure Socket Layer
SSMP => (Simple Screen Management Protocol) This is a communications protocol for text-based terminals.
Star topology => This is a network topology that has network hubs at the center, with all connected computers linked back to the hub by a single cable. Thus, if one cable goes down, the rest of the computers can still communicate.
Stepping => This refers to the version of a chip. Microprocessors typically have many different steppings where performance is increased or minor bugs are fixed. The steppings are generally not touted as a new release of the chip, because chips are n...
Streaming => This term is often used to describe technology that is capable of playing audio or video while it is still downloading. This saves you some waiting.
Superscalar Processor => This term describes a processor that is capable of executing more than one instruction during a processor cycle. Processors can do this by fetching multiple instructions in one cycle, deciding which instructions are independe...
Surge Protector => A specialized outlet that uses capacitors to keep spikes in the power supply from damaging electronic devices.
Swap file => An area of your hard drive that the computer uses for RAM. Although slower, it is usually much more abundant.
Switch => This refers to a hub that directs network packets to the port they are intended for, without broadcasting them to all connections. Switching is an alternative to moving to faster architectures. Switched 10Base-T can move data faster in some...
Sybase => This company makes a SQL database product that competes with Oracle and Microsoft SQL Server. It's also the type of SQL that Microsoft based Microsoft SQL Server on.
Synchronous => Meaning that things happen at the same time. More commonly, used in electronics to signify something occurring at the set pace of a clock, much like a metronome.
System Software => This term can refer to all of the software that comes with a computer system, or more specifically, the operating system. 
T1 => Two pairs of copper wire that carry data at a rate of 1.544 Mbps. T1 lines are used to carry 24 DS-0 signals. They can be used to carry 24 phone lines or an Internet connection capable of 1.544 Mbps data transfer. See also fractional T1.
T3 => 28 T1 lines together make up a T3, which can carry 672 separate voice channels or up to 44.736 Mbps data throughput. Many large Internet providers brag of about having T3 backbones.
T4 => Six T3 lines make up a T4 which carries data at 274 Mbps.
Tag RAM => This is a bank of SRAM that only holds addresses. Tag RAM is used to store addresses so that when the processor makes a call for memory, it first checks to see if the data is in the cache by looking for the memory address in the tag RAM. I...

factpacks/usazips.fact  view on Meta::CPAN

12934	=> 	Ellenburg Center	Clinton	NY
12935	=> 	Ellenburg Depot	Clinton	NY
12936	=> 	Essex	Essex	NY
12937	=> 	Fort Covington	Franklin	NY
12939	=> 	Gabriels	Franklin	NY
12941	=> 	Jay	Essex	NY
12942	=> 	Keene	Essex	NY
12943	=> 	Keene Valley	Essex	NY
12944	=> 	Keeseville	Essex	NY
12945	=> 	Lake Clear	Franklin	NY
12946	=> 	Lake Placid	Essex	NY
12949	=> 	Lawrenceville	Saint Lawrence	NY
12950	=> 	Lewis	Essex	NY
12952	=> 	Lyon Mountain	Clinton	NY
12953	=> 	Malone	Franklin	NY
12955	=> 	Lyon Mountain	Clinton	NY
12956	=> 	Mineville	Essex	NY
12957	=> 	Moira	Franklin	NY
12958	=> 	Mooers	Clinton	NY
12959	=> 	Mooers Forks	Clinton	NY
12960	=> 	Moriah	Essex	NY

factpacks/usazips.fact  view on Meta::CPAN

21403	=> 	Annapolis	Anne Arundel	MD
21404	=> 	Annapolis	Anne Arundel	MD
21405	=> 	Annapolis	Anne Arundel	MD
21411	=> 	Annapolis	Anne Arundel	MD
21412	=> 	Annapolis	Anne Arundel	MD
21501	=> 	Cumberland	Allegany	MD
21502	=> 	Cumberland	Allegany	MD
21503	=> 	Cumberland	Allegany	MD
21504	=> 	Cumberland	Allegany	MD
21505	=> 	Cumberland	Allegany	MD
21520	=> 	Accident	Garrett	MD
21521	=> 	Barton	Allegany	MD
21522	=> 	Bittinger	Garrett	MD
21523	=> 	Bloomington	Garrett	MD
21524	=> 	Corriganville	Allegany	MD
21528	=> 	Eckhart Mines	Allegany	MD
21529	=> 	Ellerslie	Allegany	MD
21530	=> 	Flintstone	Allegany	MD
21531	=> 	Friendsville	Garrett	MD
21532	=> 	Frostburg	Allegany	MD
21536	=> 	Grantsville	Garrett	MD

factpacks/usazips.fact  view on Meta::CPAN

33842	=> 	Fort Ogden	De Soto	FL
33843	=> 	Frostproof	Polk	FL
33844	=> 	Haines City	Polk	FL
33845	=> 	Haines City	Polk	FL
33846	=> 	Highland City	Polk	FL
33847	=> 	Homeland	Polk	FL
33848	=> 	Intercession City	Osceola	FL
33849	=> 	Kathleen	Polk	FL
33850	=> 	Lake Alfred	Polk	FL
33851	=> 	Lake Hamilton	Polk	FL
33852	=> 	Lake Placid	Highlands	FL
33853	=> 	Lake Wales	Polk	FL
33854	=> 	Fedhaven	Polk	FL
33855	=> 	Indian Lake Estates	Polk	FL
33856	=> 	Nalcrest	Polk	FL
33857	=> 	Lorida	Highlands	FL
33858	=> 	Loughman	Polk	FL
33859	=> 	Lake Wales	Polk	FL
33860	=> 	Mulberry	Polk	FL
33862	=> 	Lake Placid	Highlands	FL
33863	=> 	Nichols	Polk	FL
33864	=> 	Nocatee	De Soto	FL
33865	=> 	Ona	Hardee	FL
33867	=> 	River Ranch	Polk	FL
33868	=> 	Polk City	Polk	FL
33870	=> 	Sebring	Highlands	FL
33871	=> 	Sebring	Highlands	FL
33872	=> 	Sebring	Highlands	FL
33873	=> 	Wauchula	Hardee	FL
33877	=> 	Waverly	Polk	FL

factpacks/usazips.fact  view on Meta::CPAN

33936	=> 	Lehigh Acres	Lee	FL
33937	=> 	Marco Island	Collier	FL
33938	=> 	Murdock	Charlotte	FL
33939	=> 	Naples	Collier	FL
33940	=> 	Naples	Collier	FL
33941	=> 	Naples	Collier	FL
33942	=> 	Naples	Collier	FL
33943	=> 	Ochopee	Collier	FL
33944	=> 	Palmdale	Glades	FL
33945	=> 	Pineland	Lee	FL
33946	=> 	Placida	Charlotte	FL
33947	=> 	Rotonda West	Charlotte	FL
33948	=> 	Port Charlotte	Charlotte	FL
33949	=> 	Port Charlotte	Charlotte	FL
33950	=> 	Punta Gorda	Charlotte	FL
33951	=> 	Punta Gorda	Charlotte	FL
33952	=> 	Port Charlotte	Charlotte	FL
33953	=> 	Port Charlotte	Charlotte	FL
33954	=> 	Port Charlotte	Charlotte	FL
33955	=> 	Punta Gorda	Charlotte	FL
33956	=> 	Saint James City	Lee	FL

factpacks/usazips.fact  view on Meta::CPAN

95454	=> 	Laytonville	Mendocino	CA
95456	=> 	Littleriver	Mendocino	CA
95457	=> 	Lower Lake	Lake	CA
95458	=> 	Lucerne	Lake	CA
95459	=> 	Manchester	Mendocino	CA
95460	=> 	Mendocino	Mendocino	CA
95461	=> 	Middletown	Lake	CA
95462	=> 	Monte Rio	Sonoma	CA
95463	=> 	Navarro	Mendocino	CA
95464	=> 	Nice	Lake	CA
95465	=> 	Occidental	Sonoma	CA
95466	=> 	Philo	Mendocino	CA
95468	=> 	Point Arena	Mendocino	CA
95469	=> 	Potter Valley	Mendocino	CA
95470	=> 	Redwood Valley	Mendocino	CA
95471	=> 	Rio Nido	Sonoma	CA
95472	=> 	Sebastopol	Sonoma	CA
95473	=> 	Sebastopol	Sonoma	CA
95476	=> 	Sonoma	Sonoma	CA
95480	=> 	Stewarts Point	Sonoma	CA
95481	=> 	Talmage	Mendocino	CA



( run in 1.607 second using v1.01-cache-2.11-cpan-4505f990765 )