Amethyst

 view release on metacpan or  search on metacpan

Amethyst/Brain/Infobot/Module/Zippy.pm  view on Meta::CPAN

Psychoanalysis??  I thought this was a nude rap session!!!
PUNK ROCK!!  DISCO DUCK!!  BIRTH CONTROL!!
Quick, sing me the BUDAPEST NATIONAL ANTHEM!!
RELATIVES!!
Remember, in 2039, MOUSSE & PASTA will be available ONLY by prescription!! 
RHAPSODY in Glue!
SANTA CLAUS comes down a FIRE ESCAPE wearing bright blue LEG WARMERS ... He scrubs the POPE with a mild soap or detergent for 15 minutes, starring JANE FONDA!!
Send your questions to ``ASK ZIPPY'', Box 40474, San Francisco, CA 94140, USA
SHHHH!!  I hear SIX TATTOOED TRUCK-DRIVERS tossing ENGINE BLOCKS into empty OIL DRUMS ...
Should I do my BOBBIE VINTON medley?
Should I get locked in the PRINCICAL'S OFFICE today -- or have a VASECTOMY??
Should I start with the time I SWITCHED personalities with a BEATNIK hair stylist or my failure to refer five TEENAGERS to a good OCULIST? Sign my PETITION.
So this is what it feels like to be potato salad
So, if we convert SUPPLY-SIDE SOYABEAN FUTURES into HIGH-YIELD T-BILL INDICATORS, the PRE-INFLATIONARY risks will DWINDLE to a rate of 2 SHOPPING SPREES per EGGPLANT!!
Someone in DAYTON, Ohio is selling USED CARPETS to a SERBO-CROATIAN
Sometime in 1993 NANCY SINATRA will lead a BLOODLESS COUP on GUAM!!
Somewhere in DOWNTOWN BURBANK a prostitute is OVERCOOKING a LAMB CHOP!!
Somewhere in suburban Honolulu, an unemployed bellhop is whipping up a batch of illegal psilocybin chop suey!!
Somewhere in Tenafly, New Jersey, a chiropractor is viewing "Leave it
to Beaver"!
Spreading peanut butter reminds me of opera!!  I wonder why?

factpacks/MacErrorCodes.fact  view on Meta::CPAN

Mac Error -34 => ( dskFulErr ) Disk full **File System Error**
Mac Error -35 => ( nsvErr ) No such volume; volume not found
Mac Error -36 => ( ioErr ) I/O error (bummers) **File System Error**
Mac Error -37 => ( bdNamErr ) Bad file name; there may be no bad names in the final system! **File System Error**
Mac Error -38 => ( fnOpnErr ) File not open **File System Error**
Mac Error -39 => ( eofErr ) End of file; no additional data in the format **File System Error**
Mac Error -40 => ( posErr ) Tried to position to before start of file (r/w) **File System Error**
Mac Error -41 => ( mFulErr ) Memory full (open) or file won't fit (load) **File System Error**
Mac Error -42 => ( tmfoErr ) too many files open **File System Error**
Mac Error -43 => ( fnfErr ) File not found; Folder not found; Edition container not found; Target not found **File System Error**
Mac Error -44 => ( wPrErr ) Diskette is write protected; Volume is locked through hardware **File System Error**
Mac Error -45 => ( fLckdErr ) File is locked **File System Error**
Mac Error -45 => ( fLckedErr ) Publisher writing to an edition **File System Error**
Mac Error -46 => ( vLckdErr ) Volume is locked through software **File System Error**
Mac Error -47 => ( fBsyErr ) File is busy (delete); Section doing I/O **File System Error**
Mac Error -48 => ( dupFNErr ) Duplicate filename (rename); File found instead of folder **File System Error**
Mac Error -49 => ( opWrErr ) File already open with with write permission **File System Error**
Mac Error -50 => ( paramErr ) Error in user parameter list **File System Error**
Mac Error -51 => ( rfNumErr ) Reference number invalid **File System Error**
Mac Error -52 => ( gfpErr ) Get file position error **File System Error**
Mac Error -53 => ( volOffLinErr ) Volume is off line **File System Error**
Mac Error -54 => ( permErr ) Software lock on file; Not a subscriber [permissions error on file open] **File System Error** 
Mac Error -55 => ( volOnLinErr ) drive volume already on-line at MountVol **File System Error**
Mac Error -56 => ( nsDrvErr ) no such drive (tried to mount a bad drive num) **File System Error**

factpacks/MacErrorCodes.fact  view on Meta::CPAN

Mac Error -95 => ( excessCollsns ) Hardware error [excessive collisions on write] **AppleTalk Error**
Mac Error -97 => ( portInUse ) driver Open error code (port is in use) **AppleTalk Error**
Mac Error -98 => ( portNotCf ) driver Open error code (parameter RAM not configured for this connection) **AppleTalk Error**
Mac Error -99 => ( memROZErr ) hard error in ROZ **AppleTalk Error** or ( memROZError ) hard error in ROZ / ( memROZWarn ) soft error in ROZ **AppleTalk Error** or ( memROZWarn ) soft error in ROZ **AppleTalk Error**
Mac Error -100 => ( noScrapErr ) No scrap exists error **Scrap Manager Error**
Mac Error -102 => ( noTypeErr ) Format not available [no object of that type in scrap] **Scrap Manager Error**
Mac Error -108 => ( memFullErr ) Ran out of memory [not enough room in heap zone] **Storage Allocator Error**
Mac Error -109 => ( nilHandleErr ) GetHandleSize fails on baseText or substitutionText; NIL master pointer [handle was NIL in HandleZone or other] **Storage Allocator Error**
Mac Error -110 => ( memAdrErr ) Address was odd, or out of range **Storage Allocator Error**
Mac Error -111 => ( memWZErr ) Attempted to operate on a free block; GetHandleSize fails on baseText or substitutionText [WhichZone failed (applied to free block)] **Storage Allocator Error**
Mac Error -112 => ( memPurErr ) Trying to purge a locked or non-purgeable block **Storage Allocator Error**
Mac Error -113 => ( memAZErr ) Address in zone check failed **Storage Allocator Error**
Mac Error -114 => ( memPCErr ) Pointer Check failed **Storage Allocator Error**
Mac Error -115 => ( memBCErr ) Block Check failed **Storage Allocator Error**
Mac Error -116 => ( memSCErr ) Size Check failed **Storage Allocator Error**
Mac Error -117 => ( memLockedErr ) Trying to move a locked block (MoveHHi) **Storage Allocator Error**
Mac Error -120 => ( dirNFErr ) Directory not found **HFS Error**
Mac Error -121 => ( tmwdoErr ) No free WDCB available **HFS Error**
Mac Error -122 => ( badMovErr ) Move into offspring error **HFS Error**
Mac Error -123 => ( wrgVolTypErr ) Not an HFS volume [wrong volume type error or (obsolete) operation not supported for MFS] **HFS Error**
Mac Error -124 => ( volGoneErr ) Server volume has been disconnected **HFS Error**
Mac Error -125 => ( updPixMemErr ) Insufficient memory to update a pixmap **HFS Error**
Mac Error -127 => ( fsDSIntErr ) Internal file system error **HFS Error**
Mac Error -126 => ( dsMBarNFnd ) System error code for MBDF not found **Menu Manager Error**
Mac Error -127 => ( dsHMenuFindErr ) Could not find HMenu's parent in MenuKey **Menu Manager Error**
Mac Error -128 => ( userCanceledErr ) User canceled an operation **Menu Manager Error**

factpacks/MacErrorCodes.fact  view on Meta::CPAN

Mac Error -604 => ( hardwareConfigErr ) hardware configuration not correct for call **Processes Errors**
Mac Error -605 => ( appMemFullErr ) Partition size specified in 'SIZE' resource is not big enough for launch **Processes Errors**
Mac Error -606 => ( appIsDaemon ) Application is background-only **Processes Errors**
Mac Error -607 => ( bufferIsSmall ) Buffer is too small **Processes Errors**
Mac Error -608 => ( noOutstandingHLE ) No outstanding high-level event **Processes Errors**
Mac Error -609 => ( connectionInvalid ) Connection is invalid **Processes Errors**
Mac Error -610 => ( noUserInteractionAllowed ) Attempted PostHighLevelEvent from background and no session yet established **Processes Errors**
Mac Error -620 => ( notEnoughMemoryErr ) Insufficient physical memory **Memory Dispatch Errors**
Mac Error -621 => ( notHeldErr ) Specified range of memory is not held **Memory Dispatch Errors**
Mac Error -622 => ( cannotMakeContiguousErr ) Cannot make specified range contiguous **Memory Dispatch Errors**
Mac Error -623 => ( notLockedErr ) Specified range of memory is not locked **Memory Dispatch Errors**
Mac Error -624 => ( interruptsMaskedErr ) Called with interrupts masked **Memory Dispatch Errors**
Mac Error -625 => ( cannotDeferErr ) Unable to defer additional user functions **Memory Dispatch Errors**
Mac Error -800 => ( rcDBNull ) The data item was NULL **DatabaseAccess (Pack 13) Errors**
Mac Error -801 => ( rcDBValue ) Data available or successfully retrieved **DatabaseAccess (Pack 13) Errors**
Mac Error -802 => ( rcDBError ) Error executing function **DatabaseAccess (Pack 13) Errors**
Mac Error -803 => ( rcDBBadType ) Next data item not of requested data type **DatabaseAccess (Pack 13) Errors**
Mac Error -804 => ( rcDBBreak ) Function timed out **DatabaseAccess (Pack 13) Errors**
Mac Error -805 => ( rcDBExec ) Query currently executing **DatabaseAccess (Pack 13) Errors**
Mac Error -806 => ( reDBBadSessID ) Session ID is invalid **DatabaseAccess (Pack 13) Errors**
Mac Error -807 => ( rcDBBadSessNum ) Invalid session number **DatabaseAccess (Pack 13) Errors**

factpacks/jargon-split.fact  view on Meta::CPAN

blinkenlights7 is  astaunished        the blinkenlights.   See also {geef}. 
blit is  /blit/ vt. 1. To copy a large array of bits from one part   of a computer's memory to another part, particularly when the   memory is being used to determine what is shown on a display   screen.  "The storage allocator picks through the tabl...
blit2 is  memory, and then blits it all back   down again."  See {bitblt}, {BLT}, {dd}, {cat},   {blast}, {snarf}.  More generally, to perform some operation   (such as toggling) on a large array of bits while moving them.   2. All-capitalized as `BL...
blit3 is  designed by Rob Pike at Bell Labs, later commercialized as   the AT&T 5620.  (The folk etymology from `Bell Labs Intelligent   Terminal' is incorrect.) 
blitter is  /blit'r/ n. A special-purpose chip or hardware system   built to perform {blit} operations, esp. used for fast   implementation of bit-mapped graphics.  The Commodore Amiga and a   few other micros have these, but in 1991 the trend is awa...
blitter2 is  reincarnation}).  Syn. {raster   blaster}. 
blivet is  /bliv'*t/ [allegedly from a World War II military term   meaning "ten pounds of manure in a five-pound bag"] n. 1. An   intractable problem.  2. A crucial piece of hardware that can't be   fixed or replaced if it breaks.  3. A tool that ha...
blivet2 is  programmers that it has become an   unmaintainable tissue of hacks.  4. An out-of-control but   unkillable development effort.  5. An embarrassing bug that pops up   during a customer demo.   This term has other meanings in other technica...
blivet3 is  hardware engineers of various kinds it   seems to mean any random object of unknown purpose (similar to   hackish use of {frob}).  It has also been used to describe an   amusing trick-the-eye drawing resembling a three-pronged fork that  ...
blivet4 is  until one realizes that   the parts fit together in an impossible way. 
block is  [from process scheduling terminology in OS theory] 1. vi.   To delay or sit idle while waiting for something.  "We're blocking   until everyone gets here."  Compare {busy-wait}.  2. `block   on' vt. To block, waiting for (something).  "Lunc...
block transfer computations is  n. From the television series   "Dr. Who", in which it referred to computations so fiendishly   subtle and complex that they could not be performed by machines.   Used to refer to any task that should be expressible as...
blow an EPROM is  /bloh *n ee'prom/ v. (alt. `blast an EPROM',   `burn an EPROM') To program a read-only memory, e.g. for use   with an embedded system.  This term arises because the programming   process for the Programmable Read-Only Memories (PROM...
blow an EPROM2 is  Programmable Read-Only Memories   (EPROMs) involved intentionally blowing tiny electrical fuses on   the chip.  Thus, one was said to `blow' (or `blast') a PROM, and   the terminology carried over even though the write process on  ...
blow away is  vt. To remove (files and directories) from permanent   storage, generally by accident.  "He reformatted the wrong   partition and blew away last night's netnews."  Oppose {nuke}.
blow out is  vi. Of software, to fail spectacularly; almost as serious   as {crash and burn}.  See {blow past}, {blow up}.
blow past is  vt. To {blow out} despite a safeguard.  "The server blew   past the 5K reserve buffer."
blow up is  vi. 1. [scientific computation] To become unstable.  Suggests   that the computation is diverging so rapidly that it will soon   overflow or at least go {nonlinear}.  2.  Syn. {blow out}.
BLT is  /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. Synonym for   {blit}.  This is the original form of {blit} and the ancestor   of {bitblt}.  It referred to any large bit-field copy or move   operation (one resource-intensive memory-shuffling operati...
BLT2 is  and TOPS-10 was sardonically   referred to as `The Big BLT').  The jargon usage has outlasted the   {PDP-10} BLock Transfer instruction from which {BLT} derives;   nowadays, the assembler mnemonic {BLT} almost always means   `Branch if Less ...
Blue Book is  n. 1. Informal name for one of the three standard   references on the page-layout and graphics-control language   PostScript (`PostScript Language Tutorial and Cookbook', Adobe   Systems, Addison-Wesley 1985, QA76.73.P67P68, ISBN 0-201-...

factpacks/jargon-split.fact  view on Meta::CPAN

bogus is  adj. 1. Non-functional.  "Your patches are bogus."   2. Useless.  "OPCON is a bogus program."  3. False.  "Your   arguments are bogus."  4. Incorrect.  "That algorithm is bogus."   5. Unbelievable.  "You claim to have solved the halting pro...
bogus2 is  bogus."  6. Silly.  "Stop   writing those bogus sagas."   Astrology is bogus.  So is a bolt that is obviously about to break.   So is someone who makes blatantly false claims to have solved a   scientific problem.  (This word seems to have...
bogus3 is  {random} --- mostly the negative ones.)   It is claimed that `bogus' was originally used in the hackish sense   at Princeton in the late 1960s.  It was spread to CMU and Yale by   Michael Shamos, a migratory Princeton alumnus.  A glossary ...
bogus4 is  word was first popularized (see   {autobogotiphobia} under {bogotify}). The word spread into   hackerdom from CMU and MIT.  By the early 1980s it was also   current in something like the hackish sense in West Coast teen   slang, and it had...
bogus5 is    Cambridge reports, by contrast, that these uses of `bogus' grate on   British nerves; in Britain the word means, rather specifically,   `counterfeit', as in "a bogus 10-pound note". 
Bohr bug is  /bohr buhg/ [from quantum physics] n. A repeatable   {bug}; one that manifests reliably under a possibly unknown but   well-defined set of conditions.  Antonym of {heisenbug}; see also   {mandelbug}.
boink is  /boynk/ [USENET ascribed there to the TV series   "Cheers" and "Moonlighting"] 1. To have sex with;   compare {bounce}, sense 3. (This is mainstream slang.) In   Commonwealth hackish the variant `bonk' is more common.  2. After   the origin...
boink2 is  for   almost any net social gathering, e.g., Miniboink, a small boink   held by Nancy Gillett in 1988; Minniboink, a Boinkcon in Minnesota   in 1989; Humpdayboinks, Wednesday get-togethers held in the San   Francisco Bay Area.  Compare {@-...
bomb is  1. v. General synonym for {crash} (sense 1) except that it   is not used as a noun; esp. used of software or OS failures.   "Don't run Empire with less than 32K stack, it'll bomb."   2. n.,v. Atari ST and Macintosh equivalents of a UNIX `pan...
bomb2 is  of little black-powder bombs   or mushroom clouds are displayed, indicating that the system has died.   On the Mac, this may be accompanied by a decimal (or occasionally   hexadecimal) number indicating what went wrong, similar to the   Ami...
bomb3 is  {{MS-DOS}} machines   tend to get {locked up} in this situation. 
bondage-and-discipline language is  A language (such as Pascal, Ada,   APL, or Prolog) that, though ostensibly general-purpose, is designed   so as to enforce an author's theory of `right programming' even   though said theory is demonstrably inadequ...
bondage-and-discipline language2 is  general-purpose programming.  Often abbreviated   `B&D'; thus, one may speak of things "having the B&D nature".   See {{Pascal}}; oppose {languages of choice}. 
bonk/oif is  /bonk/, /oyf/ interj. In the {MUD} community, it has   become traditional to express pique or censure by `bonking' the   offending person.  There is a convention that one should   acknowledge a bonk by saying `oif!' and a myth to the eff...
bonk/oif2 is  bonk/oif balance, causing much   trouble in the universe.  Some MUDs have implemented special   commands for bonking and oifing.  See also {talk mode},   {posing}. 
book titles is  There is a tradition in hackerdom of informally   tagging important textbooks and standards documents with the   dominant color of their covers or with some other conspicuous   feature of the cover.  Many of these are described in thi...
book titles2 is  {Aluminum Book}, {Blue Book},   {Cinderella Book}, {Devil Book}, {Dragon Book}, {Green   Book}, {Orange Book}, {Pink-Shirt Book}, {Purple Book},   {Red Book}, {Silver Book}, {White Book}, {Wizard Book},   {Yellow Book}, and {bible}.b...
book titles3 is  v.,n. To load and   initialize the operating system on a machine.  This usage is no   longer jargon (having passed into techspeak) but has given rise to   some derivatives that are still jargon.   The derivative `reboot' implies that...
book titles4 is  that the boot is a {bounce} intended to clear   some state of {wedgitude}.  This is sometimes used of human   thought processes, as in the following exchange "You've lost   me." "OK, reboot.  Here's the theory...."   This term is als...
book titles5 is  power-off condition) and `warm boot' (with the CPU and all   devices already powered up, as after a hardware reset or software   crash).   Another variant `soft boot', reinitialization of only part of a   system, under control of oth...
book titles6 is  the {mess-dos} emulator, control-alt-insert will   cause a soft-boot of the emulator, while leaving the rest of the   system running."   Opposed to this there is `hard boot', which connotes hostility   towards or frustration with the...

factpacks/jargon-split.fact  view on Meta::CPAN

computron is  /kom'pyoo-tron`/ n. 1. A notional unit of computing   power combining instruction speed and storage capacity, dimensioned   roughly in instructions-per-second times megabytes-of-main-store   times megabytes-of-mass-storage.  "That machi...
computron2 is  enough computrons!"  This usage is usually   found in metaphors that treat computing power as a fungible   commodity good, like a crop yield or diesel horsepower.  See   {bitty box}, {Get a real computer!}, {toy}, {crank}.   2. A mythi...
computron3 is  quantity of   computation or information, in much the same way that an electron   bears one unit of electric charge (see also {bogon}).  An   elaborate pseudo-scientific theory of computrons has been developed   based on the physical f...
computron4 is  more rapidly as it is heated.  It is argued that an object   melts because the molecules have lost their information about where   they are supposed to be (that is, they have emitted computrons).   This explains why computers get so ho...
computron5 is  computrons.  Conversely, it should be   possible to cool down an object by placing it in the path of a   computron beam.  It is believed that this may also explain why   machines that work at the factory fail in the computer room the  ...
computron6 is  other hardware.   (This theory probably owes something to the "Warlock" stories   by Larry Niven, the best known being "What Good is a Glass   Dagger?", in which magic is fueled by an exhaustible natural   resource called `mana'.) 
condition out is  vt. To prevent a section of code from being compiled   by surrounding it with a conditional-compilation directive whose   condition is always false.  The {canonical} examples are `#if   0' (or `#ifdef notdef', though some find this ...
condom is  n. 1. The protective plastic bag that accompanies 3.5-inch   microfloppy diskettes.  Rarely, also used of (paper) disk envelopes.   Unlike the write protect tab, the condom (when left on) not only   impedes the practice of {SEX} but has al...
condom2 is  drive mechanisms attempt to access the disk --- and   can even fatally frustrate insertion.  2. The protective cladding   on a {light pipe}. 
connector conspiracy is  [probably came into prominence with the   appearance of the KL-10 (one model of the {PDP-10}), none of   whose connectors matched anything else] n. The tendency of   manufacturers (or, by extension, programmers or purveyors o...
connector conspiracy2 is  that don't fit together   with the old stuff, thereby making you buy either all new stuff or   expensive interface devices.  The KL-10 Massbus connector was   actually *patented* by DEC, which reputedly refused to license   ...
connector conspiracy3 is  parties out of   competition for the lucrative Massbus peripherals market.  This is   a source of never-ending frustration for the diehards who maintain   older PDP-10 or VAX systems.  Their CPUs work fine, but they are   st...
connector conspiracy4 is  drives with low   capacity and high power requirements.   In these latter days of open-systems computing this term has fallen   somewhat into disuse, to be replaced by the observation that   "Standards are great!  There are ...
cons is  /konz/ or /kons/ [from LISP] 1. vt. To add a new element   to a specified list, esp. at the top.  "OK, cons picking a   replacement for the console TTY onto the agenda."  2. `cons up'   vt. To synthesize from smaller pieces "to cons up an ex...
cons2 is  fundamental operation for   building structures.  It takes any two objects and returns a   `dot-pair' or two-branched tree with one object hanging from each   branch.  Because the result of a cons is an object, it can be used   to build bin...
cons3 is  think   of it as a sort of universal constructor, and that is where the   jargon meanings spring from. 
considered harmful is  adj. Edsger W. Dijkstra's note in the   March 1968 `Communications of the ACM', "Goto Statement   Considered Harmful", fired the first salvo in the structured   programming wars.  Amusingly, the ACM considered the resulting   a...
considered harmful2 is  policy) no longer   print an article taking so assertive a position against a coding   practice.  In the ensuing decades, a large number of both serious   papers and parodies have borne titles of the form "X   considered Y".  ...
considered harmful3 is    over with the realization that both sides were wrong, but use of   such titles has remained as a persistent minor in-joke (the   `considered silly' found at various places in this lexicon is   related). 
console is  n. 1. The operator's station of a {mainframe}.  In   times past, this was a privileged location that conveyed godlike   powers to anyone with fingers on its keys.  Under UNIX and other   modern timesharing OSes, such privileges are guarde...
console2 is  just the {tty} the system was booted   from.  Some of the mystique remains, however, and it is traditional   for sysadmins to post urgent messages to all users from the console   (on UNIX, /dev/console).  2. On microcomputer UNIX boxes, ...

factpacks/jargon-split.fact  view on Meta::CPAN

huff is  v. To compress data using a Huffman code.  Various programs   that use such methods have been called `HUFF' or some variant   thereof.  Oppose {puff}.  Compare {crunch}, {compress}.
humma is  // excl. A filler word used on various `chat' and   `talk' programs when you had nothing to say but felt that it was   important to say something.  The word apparently originated (at   least with this definition) on the MECC Timeshare Syste...
humma2 is  time-sharing system running in Minnesota   during the 1970s and the early 1980s) but was later sighted on   early UNIX systems. 
Humor, Hacker is  n. A distinctive style of shared intellectual humor   found among hackers, having the following distinctive   characteristics   1. Fascination with form-vs.-content jokes, paradoxes, and humor   having to do with confusion of metale...
Humor, Hacker2 is  laugh hold a red index card in front of him/her   with "GREEN" written on it, or vice-versa (note, however, that   this is funny only the first time).   2. Elaborate deadpan parodies of large intellectual constructs, such   as spec...
Humor, Hacker3 is  documents,   language descriptions (see {INTERCAL}), and even entire scientific   theories (see {quantum bogodynamics}, {computron}).   3. Jokes that involve screwily precise reasoning from bizarre,   ludicrous, or just grossly cou...
Humor, Hacker4 is  puns and wordplay.   5. A fondness for apparently mindless humor with subversive   currents of intelligence in it --- for example, old Warner Brothers   and Rocky & Bullwinkle cartoons, the Marx brothers, the early   B-52s, and Mon...
Humor, Hacker5 is  this   trait with elements of high camp and slapstick is especially   favored.   6. References to the symbol-object antinomies and associated ideas   in Zen Buddhism and (less often) Taoism.  See {has the X nature},   {Discordianis...
Humor, Hacker6 is  See also {filk}, {retrocomputing}, and appendix B.  If you have an   itchy feeling that all 6 of these traits are really aspects of   one thing that is incredibly difficult to talk about exactly, you   are (a) correct and (b) respo...
Humor, Hacker7 is  recognizable (though in a less marked form) throughout   {{science-fiction fandom}}. 
hung is  [from `hung up'] adj. Equivalent to {wedged}, but more   common at UNIX/C sites.  Not generally used of people.  Syn. with   {locked up}, {wedged}; compare {hosed}.  See also {hang}.   A hung state is distinguished from {crash}ed or {down}, ...
hung2 is  but because it is not running   rather than because it is waiting for something.  However, the   recovery from both situations is often the same. 
hungry puppy is  n. Syn. {slopsucker}.
hungus is  /huhng'g*s/ [perhaps related to slang `humongous'] adj.   Large, unwieldy, usually unmanageable.  "TCP is a hungus piece of   code."  "This is a hungus set of modifications."
hyperspace is  /hi'per-spays/ n. A memory location that is *far*   away from where the program counter should be pointing, often   inaccessible because it is not even mapped in.  "Another core   dump --- looks like the program jumped off to hyperspac...
hyperspace2 is  never-never land}.)  This   usage is from the SF notion of a spaceship jumping `into   hyperspace', that is, taking a shortcut through higher-dimensional   space --- in other words, bypassing this universe.  The variant   `east hypers...
hyperspace3 is  hackers.*I didn't change anything! interj. An aggrieved cry often heard as   bugs manifest during a regression test.  The {canonical} reply to   this assertion is "Then it works just the same as it did before,   doesn't it?"  See also...
hyperspace4 is  applications programmers trying to blame an obvious applications   problem on an unrelated systems software change, for example a   divide-by-0 fault after terminals were added to a network.   Usually, their statement is found to be f...
hyperspace5 is  admit some major restructuring of the   program that shouldn't have broken anything, in their opinion,   but which actually {hosed} the code completely. 
I see no X here. is  Hackers (and the interactive computer games they   write) traditionally favor this slightly marked usage over other   possible equivalents such as "There's no X here!" or "X is   missing."  or "Where's the X?".  This goes back to...
I see no X here.2 is  respond in this wise if you asked   it to do something involving an object not present at your location   in the game. 
i14y is  // n. Abbrev. for `interoperability', with the `14'   replacing fourteen letters.  Used in the {X} (windows)   community.  Refers to portability and compatibility of data formats   (even binary ones) between different programs or implementat...
i18n is  // n. Abbrev. for `internationali{z,s}ation', with the 18   replacing 18 letters.  Used in the {X} (windows) community.
IBM is  /I-B-M/ Inferior But Marketable; It's Better Manually;   Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel   Movement; and a near-{infinite} number of even less complimentary   expansions, including `International Business Ma...
IBM2 is  illustrate the considerable   antipathy most hackers have long felt toward the `industry leader'   (see {fear and loathing}).   What galls hackers about most IBM machines above the PC level isn't   so much that they are underpowered and over...
IBM3 is  but that the designs are incredibly archaic,   {crufty}, and {elephantine} ... and you can't *fix* them   --- source code is locked up tight, and programming tools are   expensive, hard to find, and bletcherous to use once you've found   the...
IBM4 is  family this may have   begun to change --- but then, we thought that when the PC-RT came   out, too.   In the spirit of universal peace and brotherhood, this lexicon now   includes a number of entries attributed to `IBM'; these derive from s...
IBM5 is  circulated within IBM's own   beleaguered hacker underground. 
IBM discount is  n. A price increase.  Outside IBM, this derives from   the common perception that IBM products are generally overpriced   (see {clone}); inside, it is said to spring from a belief that   large numbers of IBM employees living in an ar...
ice is  [coined by USENETter Tom Maddox, popularized by William   Gibson's cyberpunk SF novels acronym for `Intrusion   Countermeasure Electronics'] Security software (in Gibson's novels,   software that responds to intrusion by attempting to literal...
ice2 is  program designed for   cracking security on a system.  Neither term is in serious use yet   as of mid-1991, but many hackers find the metaphor attractive, and   each may develop a denotation in the future. 
ifdef out is  /if'def owt/ v. Syn. for {condition out}, specific   to {C}.
ill-behaved is  adj. 1. [numerical analysis] Said of an algorithm or   computational method that tends to blow up because of accumulated   roundoff error or poor convergence properties.  2. Software that   bypasses the defined {OS} interfaces to do t...
ill-behaved2 is  itself, often in a way that depends on the   hardware of the machine it is running on or which is nonportable or   incompatible with other pieces of software.  In the IBM PC/MS-DOS   world, there is a folk theorem (nearly true) to th...
ill-behaved3 is  and performance penalties in the OS   interface) all interesting applications are ill-behaved.  See also   {bare metal}. Oppose {well-behaved}, compare {PC-ism}.  See   {mess-dos}. 
IMHO is  // [from SF fandom via USENET; acronym for `In My Humble   Opinion']  "IMHO, mixed-case C names should be avoided, as   mistyping something in the wrong case can cause hard-to-detect   errors --- and they look too Pascalish anyhow."  Also se...

factpacks/jargon-split.fact  view on Meta::CPAN

Internet address is  n. 1. [techspeak] An absolute network address of   the form foo@bar.baz, where foo is a user name, bar is a   {sitename}, and baz is a `domain' name, possibly including   periods itself.  Contrast with {bang path}; see also {netw...
Internet address2 is  Internet machines and most UUCP   sites can now resolve these addresses, thanks to a large amount of   behind-the-scenes magic and PD software written since 1980 or so.   See also {bang path}, {domainist}.  2. More loosely, any ...
Internet address3 is  this includes {bang   path} addresses and some internal corporate and government   networks.   Reading Internet addresses is something of an art.  Here are the   four most important top-level functional Internet domains followed...
Internet address4 is  com          commercial organizations     edu          educational institutions     gov          U.S. government civilian sites     mil          U.S. military sites   Note that most of the sites in the com and edu domains are in...
Internet address5 is  the U.S. outside the functional domains     su          sites in the Soviet Union (see {kremvax}).     uk          sites in the United Kingdom   Within the us domain, there are subdomains for the fifty   states, each generally w...
Internet address6 is  abbreviation.  Within the uk domain, there is an ac subdomain for   academic sites and a co domain for commercial ones.  Other   top-level domains may be divided up in similar ways. 
interrupt is  1. [techspeak] n. On a computer, an event that   interrupts normal processing and temporarily diverts   flow-of-control through an "interrupt handler" routine.  See also   {trap}.  2. interj. A request for attention from a hacker.   Oft...
interrupt2 is  seen Joe   recently?"  See {priority interrupt}.  3. Under MS-DOS, the   term `interrupt' is nearly synonymous with `system call', because   the OS and BIOS routines are both called using the INT instruction   (see {{interrupt list, th...
interrupt3 is  bypass the OS (going directly to a BIOS interrupt) to get   reasonable performance. 
interrupt list, the is  [MS-DOS] n. The list of all known software   interrupt calls (both documented and undocumented) for IBM PCs and   compatibles, maintained and made available for free redistribution   by Ralf Brown (ralf@cs.cmu.edu).  As of ear...
interrupts locked out is  When someone is ignoring you.  In a   restaurant, after several fruitless attempts to get the waitress's   attention, a hacker might well observe "She must have interrupts   locked out".  The synonym `interrupts disabled' is...
interrupts locked out2 is  have one's interrupt mask bit set"   or "interrupts masked out" is also heard.  See also {spl}. 
iron is  n. Hardware, especially older and larger hardware of   {mainframe} class with big metal cabinets housing relatively   low-density electronics (but the term is also used of modern   supercomputers).  Often in the phrase {big iron}.  Oppose   ...
Iron Age is  n. In the history of computing, 1961--1971 --- the   formative era of commercial {mainframe} technology, when {big   iron} {dinosaur}s ruled the earth.  These began with the delivery   of the first PDP-1, coincided with the dominance of ...
Iron Age2 is  introduction of the first commercial   microprocessor (the Intel 4004) in 1971.  See also {Stone Age};   compare {elder days}. 
iron box is  [UNIX/Internet] n. A special environment set up to trap   a {cracker} logging in over remote connections long enough to be   traced.  May include a modified {shell} restricting the hacker's   movements in unobvious ways, and `bait' files...
iron box2 is  on.  See also {back door}, {firewall   machine}, {Venus flytrap}, and Clifford Stoll's account in   `The Cuckoo's Egg' of how he made and used one (see   the Bibliography).  Compare {padded cell}. 
ironmonger is  [IBM] n. Derogatory.  A hardware specialist.  Compare   {sandbender}, {polygon pusher}.
ITS is  /I-T-S/ n. 1. Incompatible Time-sharing System, an   influential but highly idiosyncratic operating system written for   PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab.  Much   AI-hacker jargon derives from ITS folklore, and to hav...
ITS2 is  instantly as an old-timer of the most   venerable sort.  ITS pioneered many important innovations,   including transparent file sharing between machines and   terminal-independent I/O.  After about 1982, most actual work was   shifted to new...
ITS3 is  essentially as a hobby and service to the hacker community.  The   shutdown of the lab's last ITS machine in May 1990 marked the end   of an era and sent old-time hackers into mourning nationwide (see   {high moby}).  The Royal Institute of ...
ITS4 is  `live' ITS site at its computer museum (right next   to the only TOPS-10 system still on the Internet), so ITS is still   alleged to hold the record for OS in longest continuous use   (however, {{WAITS}} is a credible rival for this palm).  ...

factpacks/jargon-split.fact  view on Meta::CPAN

little-endian2 is  and networking hardware are little-endian.   See {big-endian}, {middle-endian}, {NUXI problem}.  The term   is sometimes used to describe the ordering of units other than   bytes; most often these are bits within a byte. 
live data is  n. 1. Data that is written to be interpreted and takes   over program flow when triggered by some un-obvious operation, such   as viewing it.  One use of such hacks is to break security.  For   example, some smart terminals have command...
live data2 is  program keys; this can be used to write live   data that, when listed to the terminal, infects it with a   security-breaking {virus} that is triggered the next time a   hapless user strikes that key.  For another, there are some   well...
live data3 is  send   arbitrary commands back to the machine when they are simply viewed.   2. In C code, data that includes pointers to function {hook}s   (executable code).  3. An object, such as a {trampoline}, that is   constructed on the fly by ...
live data4 is  code. 4. Actual real-world data, as opposed to `test data'.   For example, "I think I have the record deletion module   finished."  "Have you tried it out on live data?"  It usually   carries the connotation that live data is more frag...
live data5 is  things will happen.  So a possible alternate   response to the above claim might be "Well, make sure it works   perfectly before we throw live data at it."  The implication here   is that record deletion is something pretty significant...
live data6 is  running amok on live data would   cause great harm and probably require restoring from backups. 
Live Free Or Die! is  imp. 1. The state motto of New Hampshire, which   appears on that state's automobile license plates.  2. A slogan   associated with UNIX in the romantic days when UNIX aficionados saw   themselves as a tiny, beleaguered undergro...
Live Free Or Die!2 is  industry.  The "free" referred specifically to   freedom from the {fascist} design philosophies and crufty   misfeatures common on commercial operating systems.  Armando   Stettner, one of the early UNIX developers, used to giv...
Live Free Or Die!3 is  under a large UNIX, all in New   Hampshire colors of green and white.  These are now valued   collector's items. 
livelock is  /liv'lok/ n. A situation in which some critical stage   of a task is unable to finish because its clients perpetually   create more work for it to do after they have been serviced but   before it can clear its queue.  Differs from {deadl...
livelock2 is  waiting for anything, but has a   virtually infinite amount of work to do and can never catch up. 
liveware is  /liv'weir/ n. 1. Synonym for {wetware}.  Less   common.  2. [Cambridge] Vermin. "Waiter, there's some liveware in my   salad..."
lobotomy is  n. 1. What a hacker subjected to formal management   training is said to have undergone.  At IBM and elsewhere this term   is used by both hackers and low-level management; the latter   doubtless intend it as a joke.  2. The act of remov...
lobotomy2 is  order to replace or upgrade it.   Some very cheap {clone} systems are sold in `lobotomized' form   --- everything but the brain. 
locked and loaded is  [from military slang for an M-16 rifle with   magazine inserted and prepared for firing] adj. Said of a removable   disk volume properly prepared for use --- that is, locked into the   drive and with the heads loaded.  Ironicall...
locked and loaded2 is  the power is up, this description is never   used of {{Winchester}} drives (which are named after a rifle). 
locked up is  adj. Syn. for {hung}, {wedged}.
logic bomb is  n. Code surreptitiously inserted in an application or   OS that causes it to perform some destructive or   security-compromising activity whenever specified conditions are   met.  Compare {back door}.
logical is  [from the technical term `logical device', wherein a   physical device is referred to by an arbitrary `logical' name]   adj.  Having the role of.  If a person (say, Les Earnest at SAIL)   who had long held a certain post left and were rep...
logical2 is  known as the `logical' Les   Earnest.  (This does not imply any judgment on the replacement.)   Compare {virtual}.   At Stanford, `logical' compass directions denote a coordinate   system in which `logical north' is toward San Francisco,...
logical3 is  even though logical   north varies between physical (true) north near San Francisco and   physical west near San Jose.  (The best rule of thumb here is that,   by definition, El Camino Real always runs logical north-and-south.)   In givi...
logical4 is  Tarasco   restaurant, get onto {El Camino Bignum} going logical north."   Using the word `logical' helps to prevent the recipient from   worrying about that the fact that the sun is setting almost   directly in front of him.  The concept...
logical5 is  which are almost, but not quite, consistently   labeled with logical rather than physical directions.  A similar   situation exists at MIT.  Route 128 (famous for the electronics   industry that has grown up along it) is a 3-quarters cir...
logical6 is  miles, terminating near the   coastline at each end.  It would be most precise to describe the   two directions along this highway as `clockwise' and   `counterclockwise', but the road signs all say "north" and   "south", respectively.  ...
logical7 is  `logical north' and `logical south', to indicate that they   are conventional directions not corresponding to the usual   denotation for those words.  (If you went logical south along the   entire length of route 128, you would start out...
logical8 is  and finish headed due east!) 
loop through is  vt. To process each element of a list of things.   "Hold on, I've got to loop through my paper mail."  Derives from   the computer-language notion of an iterative loop; compare `cdr   down' (under {cdr}), which is less common among C...

factpacks/jargon-split.fact  view on Meta::CPAN

NeWS2 is  is a lesson here that   too many software vendors haven't yet heeded.  Many hackers insist   on the two-syllable pronunciations above as a way of distinguishing   NeWS from {news} (the {netnews} software). 
news is  n. See {netnews}.
newsfroup is  // [USENET] n. Silly synonym for {newsgroup},   originally a typo but now in regular use on USENET's talk.bizarre   and other lunatic-fringe groups.
newsgroup is  [USENET] n. One of {USENET}'s huge collection of   topic groups or {fora}.  Usenet groups can be `unmoderated'   (anyone can post) or `moderated' (submissions are automatically   directed to a moderator, who edits or filters and then po...
newsgroup2 is  parallel {mailing list}s for   Internet people with no netnews access, with postings to the group   automatically propagated to the list and vice versa.  Some   moderated groups (especially those which are actually gatewayed   Internet...
newsgroup3 is  with groups   of postings periodically collected into a single large posting with   an index.   Among the best-known are comp.lang.c (the C-language forum),   comp.arch (on computer architectures), comp.unix.wizards   (for UNIX wizards...
newsgroup4 is  fans), and talk.politics.misc (miscellaneous political   discussions and {flamage}). 
nickle is  /ni'kl/ [from `nickel', common name for the U.S.   5-cent coin] n. A {nybble} + 1; 5 bits.  Reported among   developers for Mattel's GI 1600 (the Intellivision games   processor), a chip with 16-bit-wide RAM but 10-bit-wide ROM.  See   als...
night mode is  n. See {phase} (of people).
Nightmare File System is  n. Pejorative hackerism for Sun's Network   File System (NFS).  In any nontrivial network of Suns where there   is a lot of NFS cross-mounting, when one Sun goes down, the others   often freeze up.  Some machine tries to acc...
Nightmare File System2 is  repeats indefinitely.  This causes it to   appear dead to some messages (what is actually happening is that   it is locked up in what should have been a brief excursion to a   higher {spl} level).  Then another machine trie...
Nightmare File System3 is  pseudo-down machine, and itself becomes   pseudo-down.  The first machine to discover the down one is now   trying both to access the down one and to respond to the pseudo-down   one, so it is even harder to reach.  This sn...
Nightmare File System4 is  network of machines is frozen --- the user can't   even abort the file access that started the problem!  (ITS   partisans are apt to cite this as proof of UNIX's alleged bogosity;   ITS had a working NFS-like shared file sy...
Nightmare File System5 is  1970s.)  See also {broadcast storm}. 
NIL is  /nil/ [from LISP terminology for `false'] No.  Used   in reply to a question, particularly one asked using the   `-P' convention.  See {T}.
NMI is  /N-M-I/ n. Non-Maskable Interrupt.  An IRQ 7 on the PDP-11   or 680[01234]0; the NMI line on an 80{88,[1234]}86.  In contrast   with a {priority interrupt} (which might be ignored, although   that is unlikely), an NMI is *never* ignored.
no-op is  /noh'op/ alt. NOP /nop/ [no operation] n. 1. (also v.)   A machine instruction that does nothing (sometimes used in   assembler-level programming as filler for data or patch areas, or   to overwrite code to be removed in binaries).  See als...
no-op2 is  nothing to a project, or has nothing   going on upstairs, or both.  As in "He's a no-op." 3. Any   operation or sequence of operations with no effect, such as   circling the block without finding a parking space, or putting   money into a ...
no-op3 is  into   the coin-return box, or asking someone for help and being told to   go away.  "Oh, well, that was a no-op."  Hot-and-sour soup (see   {great-wall}) that is insufficiently either is `no-op soup';   so is wonton soup if everybody else...
noddy is  /nod'ee/ [UK: from the children's books] adj.   1. Small and un-useful, but demonstrating a point.  Noddy programs   are often written by people learning a new language or system.  The   archetypal noddy program is {hello, world}.  Noddy co...
noddy2 is  bug of a compiler.  May be used of   real hardware or software to imply that it isn't worth using.   "This editor's a bit noddy."  2. A program that is more or less   instant to produce.  In this use, the term does not necessarily   connot...

factpacks/jargon-split.fact  view on Meta::CPAN

proglet2 is  any editing, and that runs correctly the   first time (this amount varies significantly according to the   language one is using).  Compare {toy program}, {noddy},   {one-liner wars}. 
program is  n. 1. A magic spell cast over a computer allowing it to   turn one's input into error messages.  2. An exercise in   experimental epistemology.  3. A form of art, ostensibly intended   for the instruction of computers, which is neverthele...
program2 is  programmers can't understand it. 
Programmer's Cheer is  "Shift to the left!  Shift to the right!  Pop   up, push down!  Byte!  Byte!  Byte!"  A joke so old it has hair on   it.
programming is  n. 1. The art of debugging a blank sheet of paper (or,   in these days of on-line editing, the art of debugging an empty   file).  2. n. A pastime similar to banging one's head against a   wall, but with fewer opportunities for reward...
programming2 is  clothes on (although clothes are not   mandatory). 
propeller head is  n. Used by hackers, this is syn. with {computer   geek}.  Non-hackers sometimes use it to describe all techies.   Prob. derives from SF fandom's tradition (originally invented by   old-time fan Ray Faraday Nelson) of propeller bean...
propeller head2 is  actually wears them except as a joke). 
propeller key is  [Mac users] n. See {command key}.
proprietary is  adj. 1. In {marketroid}-speak, superior; implies a   product imbued with exclusive magic by the unmatched brilliance of   the company's hardware or software designers.  2. In the language   of hackers and users, inferior; implies a pr...
proprietary2 is  standards, and thus one that puts the customer at the   mercy of a vendor able to gouge freely on service and upgrade   charges after the initial sale has locked the customer in (that's   assuming it wasn't too expensive in the first...
protocol is  n. As used by hackers, this never refers to niceties   about the proper form for addressing letters to the Papal Nuncio or   the order in which one should use the forks in a Russian-style   place setting; hackers don't care about such th...
protocol2 is  set of rules that allow different machines   or pieces of software to coordinate with each other without   ambiguity.  So, for example, it does include niceties about the   proper form for addressing packets on a network or the order in...
protocol3 is  Philosophers Problem.   It implies that there is some common message format and an accepted set   of primitives or commands that all parties involved understand, and   that transactions among them follow predictable logical sequences.  ...
provocative maintenance is  [common ironic mutation of `preventive   maintenance'] n. Actions performed upon a machine at regularly   scheduled intervals to ensure that the system remains in a usable   state.  So called because it is all too often pe...
provocative maintenance2 is  know what he is doing; this results   in the machine's remaining in an *un*usable state for an   indeterminate amount of time.  See also {scratch monkey}. 
prowler is  [UNIX] n. A {daemon} that is run periodically (typically   once a week) to seek out and erase {core} files, truncate   administrative logfiles, nuke `lost+found' directories, and   otherwise clean up the {cruft} that tends to pile up in t...
prowler2 is  {GFR}, {reaper},   {skulker}. 
pseudo is  /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An   electronic-mail or {USENET} persona adopted by a human for   amusement value or as a means of avoiding negative repercussions of   one's net.behavior; a `nom de USENET', often associa...
pseudo2 is  message origins.  Perhaps the   best-known and funniest hoax of this type is {BIFF}.   2. Notionally, a {flamage}-generating AI program simulating a   USENET user.  Many flamers have been accused of actually being such   entities, despite...
pseudo3 is  sophistication yet exists.  However, in 1989 there was a famous   series of forged postings that used a phrase-frequency-based   travesty generator to simulate the styles of several well-known   flamers; it was based on large samples of t...

factpacks/jargon-split.fact  view on Meta::CPAN

special-case is  vt. To write unique code to handle input to or   situations arising in program that are somehow distinguished from   normal processing.  This would be used for processing of mode   switches or interrupt characters in an interactive i...
special-case2 is  normal commands), or for processing   of {hidden flag}s in the input of a batch program or {filter}. 
speedometer is  n. A pattern of lights displayed on a linear set of   LEDs (today) or nixie tubes (yesterday, on ancient mainframes).  The   pattern is shifted left every N times the software goes   through its main loop.  A swiftly moving pattern in...
speedometer2 is  speedometer slows down as the system   becomes overloaded.  The speedometer on Sun Microsystems hardware   bounces back and forth like the eyes on one of the Cylons from the   wretched "Battlestar Galactica" TV series.   Historical n...
speedometer3 is  600)   actually had an *analog* speedometer on the front panel,   calibrated in instructions executed per second. 
spell is  n. Syn. {incantation}.
spiffy is  /spi'fee/ adj. 1. Said of programs having a pretty,   clever, or exceptionally well-designed interface. "Have you seen   the spiffy {X} version of {empire} yet?"  2. Said   sarcastically of a program that is perceived to have little more  ...
spiffy2 is  meaning should be   drawn depends delicately on tone of voice and context.  This word   was common mainstream slang during the 1940s, in a sense close to #1. 
spin is  vi. Equivalent to {buzz}.  More common among C and UNIX   programmers.
spl is  /S-P-L/ [abbrev, from Set Priority Level] The way   traditional UNIX kernels implement mutual exclusion by running code   at high interrupt levels.  Used in jargon to describe the act of   tuning in or tuning out ordinary communication.  Clas...
spl2 is  at spl 6 today." would mean   that he is very hard to interrupt.  "Wait till I finish this; I'll   spl down then."  See also {interrupts locked out}. 
splat is  n. 1. Name used in many places (DEC, IBM, and others) for   the asterisk (`*') character (ASCII 0101010).  This may derive   from the `squashed-bug' appearance of the asterisk on many early   line printers.  2. [MIT] Name used by some peopl...
splat2 is  [Rochester Institute of   Technology] The {command key} on a Mac (same as {ALT},   sense 2).  4. [Stanford] Name used by some people for the   Stanford/ITS extended ASCII   circle-x   character.  This character is also called `blobby' and ...
splat3 is  used by mathematicians as a   notation for `tensor product'.  5. [Stanford] Name for the   semi-mythical extended ASCII   circle-plus   character.  6. Canonical name for an output routine that outputs   whatever the local interpretation of...
splat4 is  4--6 are now nearly obsolete.  See   also {{ASCII}}. 
sponge is  [UNIX] n. A special case of a {filter} that reads its   entire input before writing any output; the canonical example is a   sort utility.  Unlike most filters, a sponge can conveniently   overwrite the input file with the output data stre...
sponge2 is  ITS did and VMS does now) the   sponge/filter distinction loses its usefulness, because directing   filter output would just write a new version.  See also {slurp}. 
spooge is  /spooj/ 1. n. Inexplicable or arcane code, or random   and probably incorrect output from a computer program.  2. vi. To   generate spooge (sense 1).
spool is  [from early IBM `Simultaneous Peripheral Operation Off-Line',   but this acronym is widely thought to have been contrived for   effect] vt. To send files to some device or program (a `spooler')   that queues them up and does something usefu...
spool2 is  understood is the `print spooler' controlling   output of jobs to a printer, but the term has been used in   connection with other peripherals (especially plotters and graphics   devices).  See also {demon}. 
stack is  n. A person's stack is the set of things he or she has to do   in the future.  One speaks of the next project to be attacked as   having risen to the top of the stack.  "I'm afraid I've got real   work to do, so this'll have to be pushed wa...

factpacks/jargon-split.fact  view on Meta::CPAN

wart is  n. A small, {crock}y {feature} that sticks out of an   otherwise {clean} design.  Something conspicuous for localized   ugliness, especially a special-case exception to a general rule.   For example, in some versions of `csh(1)', single quot...
wart2 is  except `!'.  In ANSI C,   the `??' syntax used obtaining ASCII characters in a foreign   environment is a wart.  See also {miswart}. 
washing machine is  n. Old-style 14-inch hard disks in floor-standing   cabinets.  So called because of the size of the cabinet and the   `top-loading' access to the media packs --- and, of course, they   were always set on `spin cycle'.  The washing...
washing machine2 is  it is even used in Russian hacker   jargon.  See also {walking drives}.  The thick channel cables   connecting these were called `bit hoses' (see {hose}). 
water MIPS is  n. (see {MIPS}, sense 2) Large, water-cooled   machines of either today's ECL-supercomputer flavor or yesterday's   traditional {mainframe} type.
wave a dead chicken is  v. To perform a ritual in the direction of   crashed software or hardware that one believes to be futile but   is nevertheless necessary so that others are satisfied that an   appropriate degree of effort has been expended.  "...
wave a dead chicken2 is  code, but I really think we've run into an   OS bug."  Compare {voodoo programming}, {rain dance}. 
weasel is  n. [Cambridge] A na"ive user, one who deliberately or   accidentally does things that are stupid or ill-advised.  Roughly   synonymous with {loser}.
wedged is  [from a common description of recto-cranial inversion] adj.   1. To be stuck, incapable of proceeding without help.  This is   different from having crashed.  If the system has crashed, then it   has become totally non-functioning.  If the...
wedged2 is  something but cannot make progress; it may be capable   of doing a few things, but not be fully operational.  For example,   a process may become wedged if it {deadlock}s with another (but   not all instances of wedging are deadlocks).  B...
wedged3 is  {hung}.  See also {gronk}, {locked   up}, {hosed}.  Describes a {deadlock}ed condition.  2. Often   refers to humans suffering misconceptions.  "He's totally wedged   --- he's convinced that he can levitate through meditation."   3. [UNIX...
wedged4 is  TTY left in   a losing state by abort of a screen-oriented program or one that   has messed with the line discipline in some obscure way. 
wedgie is  [Fairchild] n. A bug.  Prob. related to {wedged}.
wedgitude is  /wedj'i-t[y]ood/ n. The quality or state of being   {wedged}.
weeble is  /weeb'l/ [Cambridge] interj. Used to denote frustration,   usually at amazing stupidity.  "I stuck the disk in upside down."   "Weeble...." Compare {gurfle}.
weeds is  n. 1. Refers to development projects or algorithms that have   no possible relevance or practical application.  Comes from `off in   the weeds'.  Used in phrases like "lexical analysis for microcode   is serious weeds...."  2. At CDC/ETA be...
weeds2 is  weeds' was equivalent to IBM's {branch to   Fishkill} and mainstream hackerdom's {jump off into never-never   land}. 
weenie is  n. 1. When used with a qualifier (for example, as in   {UNIX weenie}, VMS weenie, IBM weenie) this can be either an   insult or a term of praise, depending on context, tone of voice,   and whether or not it is applied by a person who consi...
weenie2 is  weenie.  Implies that the weenie   has put a major investment of time, effort, and concentration into   the area indicated; whether this is positive or negative depends on   the hearer's judgment of how the speaker feels about that area. ...
weenie3 is  character, `;' (ASCII   0111011). 
Weenix is  /wee'niks/ [ITS] n. A derogatory term for {{UNIX}},   derived from {UNIX weenie}.  According to one noted ex-ITSer, it   is "the operating system preferred by Unix Weenies typified by   poor modularity, poor reliability, hard file deletion...

factpacks/jargon.fact  view on Meta::CPAN

black hole2 => site foovax has been dropping a lot of stuff on the floor lately (see {drop on the floor}). The implied metaphor of email as interstellar travel is interesting in itself. Compare {bit bucket}. 
black magic => n. A technique that works, though nobody really understands why. More obscure than {voodoo programming}, which may be done by cookbook. Compare also {black art}, {deep magic}, and {magic number} (sense 2).
blast => 1. vt.,n. Synonym for BLT, used esp. for large data sends over a network or comm line. Opposite of snarf. Usage uncommon. The variant `blat' has been reported. 2. vt. [HP/Apollo] Synonymous with nuke (sense 3). Sometimes the message `Unable ...
blat => n. 1. Syn. blast, sense 1. 2. See thud.
bletch => /blech/ [from Yiddish/German `brechen', to vomit, poss. via comic-strip exclamation `blech'] interj. Term of disgust. Often used in "Ugh, bletch". Compare barf.
bletcherous => /blech'*-r*s/ adj. Disgusting in design or function; esthetically unappealing. This word is seldom used of people. "This keyboard is bletcherous!" (Perhaps the keys don't work very well, or are misplaced.) See losing, cretinous, bagbit...
blinkenlights => /blink'*n-litz/ n. Front-panel diagnostic lights on a computer, esp. a dinosaur. Derives from the last word of the famous blackletter-Gothic sign in mangled pseudo-German that once graced about half the computer rooms in the English-...
blit => /blit/ vt. 1. To copy a large array of bits from one part of a computer's memory to another part, particularly when the memory is being used to determine what is shown on a display screen. "The storage allocator picks through the table and co...
blitter => /blit'r/ n. A special-purpose chip or hardware system built to perform blit operations, esp. used for fast implementation of bit-mapped graphics. The Commodore Amiga and a few other micros have these, but in 1991 the trend is away from the...
blivet => /bliv'*t/ [allegedly from a World War II military term meaning "ten pounds of manure in a five-pound bag"] n. 1. An intractable problem. 2. A crucial piece of hardware that can't be fixed or replaced if it breaks. 3. A tool that has been ha...
block => [from process scheduling terminology in OS theory] 1. vi. To delay or sit idle while waiting for something. "We're blocking until everyone gets here." Compare busy-wait. 2. `block on' vt. To block, waiting for (something). "Lunch is blocked ...
block transfer computations => n. From the television series "Dr. Who", in which it referred to computations so fiendishly subtle and complex that they could not be performed by machines. Used to refer to any task that should be expressible as an alg...
blow an EPROM => /bloh *n ee'prom/ v. (alt. `blast an EPROM', `burn an EPROM') To program a read-only memory, e.g. for use with an embedded system. This term arises because the programming process for the Programmable Read-Only Memories (PROMs) that ...
blow an EPROM2 => Programmable Read-Only Memories (EPROMs) involved intentionally blowing tiny electrical fuses on the chip. Thus, one was said to `blow' (or `blast') a PROM, and the terminology carried over even though the write process on EPROMs is...
blow away => vt. To remove (files and directories) from permanent storage, generally by accident. "He reformatted the wrong partition and blew away last night's netnews." Oppose nuke.
blow out => vi. Of software, to fail spectacularly; almost as serious as {crash and burn}. See {blow past}, {blow up}.
blow past => vt. To {blow out} despite a safeguard. "The server blew past the 5K reserve buffer."
blow up => vi. 1. [scientific computation] To become unstable. Suggests that the computation is diverging so rapidly that it will soon overflow or at least go nonlinear. 2. Syn. {blow out}.
BLT => /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. Synonym for blit. This is the original form of blit and the ancestor of bitblt. It referred to any large bit-field copy or move operation (one resource-intensive memory-shuffling operation done on pre-...
Blue Book => n. 1. Informal name for one of the three standard references on the page-layout and graphics-control language PostScript (`PostScript Language Tutorial and Cookbook', Adobe Systems, Addison-Wesley 1985, QA76.73.P67P68, ISBN 0-201-10179-3...
Blue Book2 => known as the {Green Book} and {Red Book}. 2. Informal name for one of the three standard references on Smalltalk `Smalltalk-80 The Language and its Implementation', David Robson, Addison-Wesley 1983, QA76.8.S635G64, ISBN 0-201-11371-63 ...

factpacks/jargon.fact  view on Meta::CPAN

bogometer => /boh-gom'-*t-er/ n. See bogosity. Compare the `wankometer' described in the wank entry; see also bogus.
bogon => /boh'gon/ [by analogy with proton/electron/neutron, but doubtless reinforced after 1980 by the similarity to Douglas Adams's `Vogons'; see the Bibliography] n. 1. The elementary particle of bogosity (see {quantum bogodynamics}). For instance...
bogon filter => /boh'gon fil'tr/ n. Any device, software or hardware, that limits or suppresses the flow and/or emission of bogons. "Engineering hacked a bogon filter between the Cray and the VAXen, and now we're getting fewer dropped packets." See a...
bogon flux => /boh'gon fluhks/ n. A measure of a supposed field of bogosity emitted by a speaker, measured by a bogometer; as a speaker starts to wander into increasing bogosity a listener might say "Warning, warning, bogon flux is rising". See {quan...
bogosity => /boh-go's*-tee/ n. 1. The degree to which something is bogus. At CMU, bogosity is measured with a bogometer; in a seminar, when a speaker says something bogus, a listener might raise his hand and say "My bogometer just triggered". More ex...
bogotify => /boh-go't*-fi/ vt. To make or become bogus. A program that has been changed so many times as to become completely disorganized has become bogotified. If you tighten a nut too hard and strip the threads on the bolt, the bolt has become bog...
bogue out => /bohg owt/ vi. To become bogus, suddenly and unexpectedly. "His talk was relatively sane until somebody asked him a trick question; then he bogued out and did nothing but flame afterwards." See also bogosity, bogus.
bogus => adj. 1. Non-functional. "Your patches are bogus." 2. Useless. "OPCON is a bogus program." 3. False. "Your arguments are bogus." 4. Incorrect. "That algorithm is bogus." 5. Unbelievable. "You claim to have solved the halting problem for Turin...
Bohr bug => /bohr buhg/ [from quantum physics] n. A repeatable bug; one that manifests reliably under a possibly unknown but well-defined set of conditions. Antonym of heisenbug; see also mandelbug.
boink => /boynk/ [USENET ascribed there to the TV series "Cheers" and "Moonlighting"] 1. To have sex with; compare bounce, sense 3. (This is mainstream slang.) In Commonwealth hackish the variant `bonk' is more common. 2. After the original Peter Kor...
bomb => 1. v. General synonym for crash (sense 1) except that it is not used as a noun; esp. used of software or OS failures. "Don't run Empire with less than 32K stack, it'll bomb." 2. n.,v. Atari ST and Macintosh equivalents of a UNIX `panic' or Am...
bondage-and-discipline language => A language (such as Pascal, Ada, APL, or Prolog) that, though ostensibly general-purpose, is designed so as to enforce an author's theory of `right programming' even though said theory is demonstrably inadequate for...
bondage-and-discipline language2 => general-purpose programming. Often abbreviated `B&D'; thus, one may speak of things "having the B&D nature". See {Pascal}; oppose {languages of choice}. 
bonk/oif => /bonk/, /oyf/ interj. In the MUD community, it has become traditional to express pique or censure by `bonking' the offending person. There is a convention that one should acknowledge a bonk by saying `oif!' and a myth to the effect that f...
book titles => There is a tradition in hackerdom of informally tagging important textbooks and standards documents with the dominant color of their covers or with some other conspicuous feature of the cover. Many of these are described in this lexico...
book titles2 => {Aluminum Book}, {Blue Book}, {Cinderella Book}, {Devil Book}, {Dragon Book}, {Green Book}, {Orange Book}, {Pink-Shirt Book}, {Purple Book}, {Red Book}, {Silver Book}, {White Book}, {Wizard Book}, {Yellow Book}, and bible.boot [techsp...
book titles3 => v.,n. To load and initialize the operating system on a machine. This usage is no longer jargon (having passed into techspeak) but has given rise to some derivatives that are still jargon. The derivative `reboot' implies that the machi...
book titles4 => that the boot is a bounce intended to clear some state of wedgitude. This is sometimes used of human thought processes, as in the following exchange "You've lost me." "OK, reboot. Here's the theory...." This term is also found in the ...
book titles5 => power-off condition) and `warm boot' (with the CPU and all devices already powered up, as after a hardware reset or software crash). Another variant `soft boot', reinitialization of only part of a system, under control of other softwa...
book titles6 => the mess-dos emulator, control-alt-insert will cause a soft-boot of the emulator, while leaving the rest of the system running." Opposed to this there is `hard boot', which connotes hostility towards or frustration with the machine be...
book titles7 => hard-boot this losing Sun." "I recommend booting it hard." Historical note this term derives from `bootstrap loader', a short program that was read in from cards or paper tape, or toggled in from the front panel switches. This program...

factpacks/jargon.fact  view on Meta::CPAN

compress => [UNIX] vt. When used without a qualifier, generally refers to crunching of a file using a particular C implementation of Lempel-Ziv compression by James A. Woods et al. and widely circulated via USENET. Use of crunch itself in this sense ...
Compu$erve => n. See CI$.
computer confetti => n. Syn. chad. Though this term is common, this use of the punched-card chad is not a good idea, as the pieces are stiff and have sharp corners that could injure the eyes. GLS reports that he once attended a wedding at MIT during ...
computer confetti2 => enthusiastically threw chad instead of rice. The groom later grumbled that he and his bride had spent most of the evening trying to get the stuff out of their hair. 
computer geek => n. One who eats (computer) bugs for a living. One who fulfills all the dreariest negative stereotypes about hackers an asocial, malodorous, pasty-faced monomaniac with all the personality of a cheese grater. Cannot be used by outside...
computer geek2 => hackers; compare black-on-black usage of `nigger'. A computer geek may be either a fundamentally clueless individual or a proto-hacker in {larval stage}. Also called `turbo nerd', `turbo geek'. See also clustergeeking, {geek out}, w...
computron => /kom'pyoo-tron`/ n. 1. A notional unit of computing power combining instruction speed and storage capacity, dimensioned roughly in instructions-per-second times megabytes-of-main-store times megabytes-of-mass-storage. "That machine can't...
condition out => vt. To prevent a section of code from being compiled by surrounding it with a conditional-compilation directive whose condition is always false. The canonical examples are `#if 0' (or `#ifdef notdef', though some find this bletcherou...
condom => n. 1. The protective plastic bag that accompanies 3.5-inch microfloppy diskettes. Rarely, also used of (paper) disk envelopes. Unlike the write protect tab, the condom (when left on) not only impedes the practice of SEX but has also been sh...
connector conspiracy => [probably came into prominence with the appearance of the KL-10 (one model of the PDP-10), none of whose connectors matched anything else] n. The tendency of manufacturers (or, by extension, programmers or purveyors of anythin...
connector conspiracy2 => that don't fit together with the old stuff, thereby making you buy either all new stuff or expensive interface devices. The KL-10 Massbus connector was actually *patented* by DEC, which reputedly refused to license the design...
connector conspiracy3 => parties out of competition for the lucrative Massbus peripherals market. This is a source of never-ending frustration for the diehards who maintain older PDP-10 or VAX systems. Their CPUs work fine, but they are stuck with dy...
connector conspiracy4 => drives with low capacity and high power requirements. In these latter days of open-systems computing this term has fallen somewhat into disuse, to be replaced by the observation that "Standards are great! There are so *many* ...
cons => /konz/ or /kons/ [from LISP] 1. vt. To add a new element to a specified list, esp. at the top. "OK, cons picking a replacement for the console TTY onto the agenda." 2. `cons up' vt. To synthesize from smaller pieces "to cons up an example". I...
considered harmful => adj. Edsger W. Dijkstra's note in the March 1968 `Communications of the ACM', "Goto Statement Considered Harmful", fired the first salvo in the structured programming wars. Amusingly, the ACM considered the resulting acrimony su...
considered harmful2 => policy) no longer print an article taking so assertive a position against a coding practice. In the ensuing decades, a large number of both serious papers and parodies have borne titles of the form "X considered Y". The structu...
considered harmful3 => over with the realization that both sides were wrong, but use of such titles has remained as a persistent minor in-joke (the `considered silly' found at various places in this lexicon is related). 
console => n. 1. The operator's station of a mainframe. In times past, this was a privileged location that conveyed godlike powers to anyone with fingers on its keys. Under UNIX and other modern timesharing OSes, such privileges are guarded by passwo...
console jockey => n. See {terminal junkie}.
content-free => [by analogy with techspeak `context-free'] adj. Used of a message that adds nothing to the recipient's knowledge. Though this adjective is sometimes applied to flamage, it more usually connotes derision for communication styles that e...
control-C => vi. 1. "Stop whatever you are doing." From the interrupt character used on many operating systems to abort a running program. Considered silly. 2. interj. Among BSD UNIX hackers, the canonical humorous response to "Give me a break!"

factpacks/jargon.fact  view on Meta::CPAN

HP-SUX => /H-P suhks/ n. Unflattering hackerism for HP-UX, Hewlett-Packard's UNIX port. Features some truly unique bogosities in the filesystem internals and elsewhere which occasionally create portability problems. HP-UX is often referred to as `hoc...
huff => v. To compress data using a Huffman code. Various programs that use such methods have been called `HUFF' or some variant thereof. Oppose puff. Compare crunch, compress.
humma => // excl. A filler word used on various `chat' and `talk' programs when you had nothing to say but felt that it was important to say something. The word apparently originated (at least with this definition) on the MECC Timeshare System (MTS, ...
Humor, Hacker => n. A distinctive style of shared intellectual humor found among hackers, having the following distinctive characteristics 1. Fascination with form-vs.-content jokes, paradoxes, and humor having to do with confusion of metalevels (see...
Humor, Hacker2 => laugh hold a red index card in front of him/her with "GREEN" written on it, or vice-versa (note, however, that this is funny only the first time). 2. Elaborate deadpan parodies of large intellectual constructs, such as specification...
Humor, Hacker3 => documents, language descriptions (see INTERCAL), and even entire scientific theories (see {quantum bogodynamics}, computron). 3. Jokes that involve screwily precise reasoning from bizarre, ludicrous, or just grossly counter-intuitiv...
Humor, Hacker4 => puns and wordplay. 5. A fondness for apparently mindless humor with subversive currents of intelligence in it --- for example, old Warner Brothers and Rocky & Bullwinkle cartoons, the Marx brothers, the early B-52s, and Monty Python...
Humor, Hacker5 => this trait with elements of high camp and slapstick is especially favored. 6. References to the symbol-object antinomies and associated ideas in Zen Buddhism and (less often) Taoism. See {has the X nature}, Discordianism, zen, {ha h...
Humor, Hacker6 => See also filk, retrocomputing, and appendix B. If you have an itchy feeling that all 6 of these traits are really aspects of one thing that is incredibly difficult to talk about exactly, you are (a) correct and (b) responding like a...
Humor, Hacker7 => recognizable (though in a less marked form) throughout {{science-fiction fandom}}. 
hung => [from `hung up'] adj. Equivalent to wedged, but more common at UNIX/C sites. Not generally used of people. Syn. with {locked up}, wedged; compare hosed. See also hang. A hung state is distinguished from crashed or down, where the program or s...
hungry puppy => n. Syn. slopsucker.
hungus => /huhng'g*s/ [perhaps related to slang `humongous'] adj. Large, unwieldy, usually unmanageable. "TCP is a hungus piece of code." "This is a hungus set of modifications."
hyperspace => /hi'per-spays/ n. A memory location that is *far* away from where the program counter should be pointing, often inaccessible because it is not even mapped in. "Another core dump --- looks like the program jumped off to hyperspace someho...
I see no X here. => Hackers (and the interactive computer games they write) traditionally favor this slightly marked usage over other possible equivalents such as "There's no X here!" or "X is missing." or "Where's the X?". This goes back to the orig...
I see no X here.2 => respond in this wise if you asked it to do something involving an object not present at your location in the game. 
i14y => // n. Abbrev. for `interoperability', with the `14' replacing fourteen letters. Used in the X (windows) community. Refers to portability and compatibility of data formats (even binary ones) between different programs or implementations of the...
i18n => // n. Abbrev. for `internationaliz,sation', with the 18 replacing 18 letters. Used in the X (windows) community.
IBM => /I-B-M/ Inferior But Marketable; It's Better Manually; Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel Movement; and a near-infinite number of even less complimentary expansions, including `International Business Machines'. ...
IBM discount => n. A price increase. Outside IBM, this derives from the common perception that IBM products are generally overpriced (see clone); inside, it is said to spring from a belief that large numbers of IBM employees living in an area cause p...
ice => [coined by USENETter Tom Maddox, popularized by William Gibson's cyberpunk SF novels acronym for `Intrusion Countermeasure Electronics'] Security software (in Gibson's novels, software that responds to intrusion by attempting to literally kill...
ifdef out => /if'def owt/ v. Syn. for {condition out}, specific to C.
ill-behaved => adj. 1. [numerical analysis] Said of an algorithm or computational method that tends to blow up because of accumulated roundoff error or poor convergence properties. 2. Software that bypasses the defined OS interfaces to do things (lik...
IMHO => // [from SF fandom via USENET; acronym for `In My Humble Opinion'] "IMHO, mixed-case C names should be avoided, as mistyping something in the wrong case can cause hard-to-detect errors --- and they look too Pascalish anyhow." Also seen in var...
in the extreme => adj. A preferred superlative suffix for many hackish terms. See, for example, `obscure in the extreme' under obscure, and compare highly.
incantation => n. Any particularly arbitrary or obscure command that one must mutter at a system to attain a desired result. Not used of passwords or other explicit security features. Especially used of tricks that are so poorly documented they must ...
include => vt. [USENET] 1. To duplicate a portion (or whole) of another's message (typically with attribution to the source) in a reply or followup, for clarifying the context of one's response. See the the discussion of inclusion styles under "Hacke...
include war => n. Excessive multi-leveled including within a discussion thread, a practice that tends to annoy readers. In a forum with high-traffic newsgroups, such as USENET, this can lead to flames and the urge to start a {kill file}.
indent style => [C programmers] n. The rules one uses to indent code in a readable fashion; a subject of {holy wars}. There are four major C indent styles, described below; all have the aim of making it easier for the reader to visually track the sco...

factpacks/jargon.fact  view on Meta::CPAN

INTERCAL => /in't*r-kal/ [said by the authors to stand for `Compiler Language With No Pronounceable Acronym'] n. A computer language designed by Don Woods and James Lyon in 1972. INTERCAL is purposely different from all other computer languages in al...
interesting => adj. In hacker parlance, this word has strong connotations of `annoying', or `difficult', or both. Hackers relish a challenge, and enjoy wringing all the irony possible out of the ancient Chinese curse "May you live in interesting time...
Internet address => n. 1. [techspeak] An absolute network address of the form foo@bar.baz, where foo is a user name, bar is a sitename, and baz is a `domain' name, possibly including periods itself. Contrast with {bang path}; see also {network, the} ...
Internet address2 => Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, domainist. 2. More loosely, any network ad...
Internet address3 => this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed by a sele...
Internet address4 => com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in the U.S. or Canada. us sites in See: Internet addr...
Internet address5 => the U.S. outside the functional domains su sites in the Soviet Union (see kremvax). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally with a name identical to the state...
Internet address6 => abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways. 
interrupt => 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also trap. 2. interj. A request for attention from a hacker. Often explicitly...
interrupt list, the => [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of early 1991,...
interrupts locked out => When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is also com...
interrupts locked out2 => have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also spl. 
iron => n. Hardware, especially older and larger hardware of mainframe class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose silicon. See ...
Iron Age => n. In the history of computing, 1961--1971 --- the formative era of commercial mainframe technology, when {big iron} dinosaurs ruled the earth. These began with the delivery of the first PDP-1, coincided with the dominance of ferrite core...
Iron Age2 => introduction of the first commercial microprocessor (the Intel 4004) in 1971. See also {Stone Age}; compare {elder days}. 
iron box => [UNIX/Internet] n. A special environment set up to trap a cracker logging in over remote connections long enough to be traced. May include a modified shell restricting the hacker's movements in unobvious ways, and `bait' files designed to...
iron box2 => on. See also {back door}, {firewall machine}, {Venus flytrap}, and Clifford Stoll's account in `The Cuckoo's Egg' of how he made and used one (see the Bibliography). Compare {padded cell}. 
ironmonger => [IBM] n. Derogatory. A hardware specialist. Compare sandbender, {polygon pusher}.
ITS => /I-T-S/ n. 1. Incompatible Time-sharing System, an influential but highly idiosyncratic operating system written for PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab. Much AI-hacker jargon derives from ITS folklore, and to have been `...
IWBNI => // [acronym] `It Would Be Nice If'. Compare WIBNI.
IYFEG => // [USENET] Abbreviation for `Insert Your Favorite Ethnic Group'. Used as a meta-name when telling racist jokes on the net to avoid offending anyone. See JEDR.*J. Random /J rand'm/ n. [generalized from {J. Random Hacker}] Arbitrary; ordinary...
J. Random Hacker => [MIT] /J rand'm hak'r/ n. A mythical figure like the Unknown Soldier; the archetypal hacker nerd. See random, {Suzie COBOL}. This may originally have been inspired or influenced by `J. Fred Muggs', a show-biz chimpanzee whose name...

factpacks/jargon.fact  view on Meta::CPAN

little-endian => adj. Describes a computer architecture in which, within a given 16- or 32-bit word, bytes at lower addresses have lower significance (the word is stored `little-end-first'). The PDP-11 and VAX families of computers and Intel micropro...
live data => n. 1. Data that is written to be interpreted and takes over program flow when triggered by some un-obvious operation, such as viewing it. One use of such hacks is to break security. For example, some smart terminals have commands that al...
live data2 => program keys; this can be used to write live data that, when listed to the terminal, infects it with a security-breaking virus that is triggered the next time a hapless user strikes that key. For another, there are some well-known bugs ...
live data3 => send arbitrary commands back to the machine when they are simply viewed. 2. In C code, data that includes pointers to function hooks (executable code). 3. An object, such as a trampoline, that is constructed on the fly by a program and ...
live data4 => code. 4. Actual real-world data, as opposed to `test data'. For example, "I think I have the record deletion module finished." "Have you tried it out on live data?" It usually carries the connotation that live data is more fragile and m...
live data5 => things will happen. So a possible alternate response to the above claim might be "Well, make sure it works perfectly before we throw live data at it." The implication here is that record deletion is something pretty significant, and a h...
live data6 => running amok on live data would cause great harm and probably require restoring from backups. 
Live Free Or Die! => imp. 1. The state motto of New Hampshire, which appears on that state's automobile license plates. 2. A slogan associated with UNIX in the romantic days when UNIX aficionados saw themselves as a tiny, beleaguered underground tilt...
Live Free Or Die!2 => industry. The "free" referred specifically to freedom from the fascist design philosophies and crufty misfeatures common on commercial operating systems. Armando Stettner, one of the early UNIX developers, used to give out fake ...
Live Free Or Die!3 => under a large UNIX, all in New Hampshire colors of green and white. These are now valued collector's items. 
livelock => /liv'lok/ n. A situation in which some critical stage of a task is unable to finish because its clients perpetually create more work for it to do after they have been serviced but before it can clear its queue. Differs from deadlock in th...
liveware => /liv'weir/ n. 1. Synonym for wetware. Less common. 2. [Cambridge] Vermin. "Waiter, there's some liveware in my salad..."
lobotomy => n. 1. What a hacker subjected to formal management training is said to have undergone. At IBM and elsewhere this term is used by both hackers and low-level management; the latter doubtless intend it as a joke. 2. The act of removing the p...
locked and loaded => [from military slang for an M-16 rifle with magazine inserted and prepared for firing] adj. Said of a removable disk volume properly prepared for use --- that is, locked into the drive and with the heads loaded. Ironically, becau...
locked and loaded2 => the power is up, this description is never used of {Winchester} drives (which are named after a rifle). 
locked up => adj. Syn. for hung, wedged.
logic bomb => n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}.
logical => [from the technical term `logical device', wherein a physical device is referred to by an arbitrary `logical' name] adj. Having the role of. If a person (say, Les Earnest at SAIL) who had long held a certain post left and were replaced, th...
loop through => vt. To process each element of a list of things. "Hold on, I've got to loop through my paper mail." Derives from the computer-language notion of an iterative loop; compare `cdr down' (under cdr), which is less common among C and UNIX ...
loop through2 => say `IRP over' after an obscure pseudo-op in the MIDAS PDP-10 assembler. 
lord high fixer => [primarily British, from Gilbert & Sullivan's `lord high executioner'] n. The person in an organization who knows the most about some aspect of a system. See wizard.
lose => [MIT] vi. 1. To fail. A program loses when it encounters an exceptional condition or fails to work in the expected manner. 2. To be exceptionally unesthetic or crocky. 3. Of people, to be obnoxious or unusually stupid (as opposed to ignorant)...
lose 2 => 4. n. Refers to something that is losing, especially in the phrases "That's a lose!" and "What a lose!" 
lose lose => interj. A reply to or comment on an undesirable situation. "I accidentally deleted all my files!" "Lose, lose."
loser => n. An unexpectedly bad situation, program, programmer, or person. Someone who habitually loses. (Even winners can lose occasionally.) Someone who knows not and knows not that he knows not. Emphatic forms are `real loser', `total loser', and ...
losing => adj. Said of anything that is or causes a lose or lossage.

factpacks/jargon.fact  view on Meta::CPAN

newgroup wars2 => clear whether the group has a natural constituency (usually, it doesn't). At times, especially in the completely anarchic alt hierarchy, the names of newsgroups themselves become a form of comment or humor; e.g., the spinoff of alt....
newgroup wars3 => alt.tv.muppets in early 1990, or any number of specialized abuse groups named after particularly notorious flamers, e.g., alt.weemba. 
newline => /n[y]oo'li:n/ n. 1. [techspeak, primarily UNIX] The ASCII LF character (0001010), used under {UNIX} as a text line terminator. A Bell-Labs-ism rather than a Berkeleyism; interestingly (and unusually for UNIX jargon), it is said to have ori...
NeWS => /nee'wis/, /n[y]oo'is/ or /n[y]ooz/ [acronym; the `Network Window System'] n. The road not taken in window systems, an elegant PostScript-based environment that would almost certainly have won the standards war with X if it hadn't been propri...
news => n. See netnews.
newsfroup => // [USENET] n. Silly synonym for newsgroup, originally a typo but now in regular use on USENET's talk.bizarre and other lunatic-fringe groups.
newsgroup => [USENET] n. One of USENET's huge collection of topic groups or fora. Usenet groups can be `unmoderated' (anyone can post) or `moderated' (submissions are automatically directed to a moderator, who edits or filters and then posts the resu...
nickle => /ni'kl/ [from `nickel', common name for the U.S. 5-cent coin] n. A nybble + 1; 5 bits. Reported among developers for Mattel's GI 1600 (the Intellivision games processor), a chip with 16-bit-wide RAM but 10-bit-wide ROM. See also deckle.
night mode => n. See phase (of people).
Nightmare File System => n. Pejorative hackerism for Sun's Network File System (NFS). In any nontrivial network of Suns where there is a lot of NFS cross-mounting, when one Sun goes down, the others often freeze up. Some machine tries to access the d...
Nightmare File System2 => repeats indefinitely. This causes it to appear dead to some messages (what is actually happening is that it is locked up in what should have been a brief excursion to a higher spl level). Then another machine tries to reach ...
Nightmare File System3 => pseudo-down machine, and itself becomes pseudo-down. The first machine to discover the down one is now trying both to access the down one and to respond to the pseudo-down one, so it is even harder to reach. This snowballs v...
Nightmare File System4 => network of machines is frozen --- the user can't even abort the file access that started the problem! (ITS partisans are apt to cite this as proof of UNIX's alleged bogosity; ITS had a working NFS-like shared file system wit...
Nightmare File System5 => 1970s.) See also {broadcast storm}. 
NIL => /nil/ [from LISP terminology for `false'] No. Used in reply to a question, particularly one asked using the `-P' convention. See T.
NMI => /N-M-I/ n. Non-Maskable Interrupt. An IRQ 7 on the PDP-11 or 680[01234]0; the NMI line on an 8088,[1234]86. In contrast with a {priority interrupt} (which might be ignored, although that is unlikely), an NMI is *never* ignored.
no-op => /noh'op/ alt. NOP /nop/ [no operation] n. 1. (also v.) A machine instruction that does nothing (sometimes used in assembler-level programming as filler for data or patch areas, or to overwrite code to be removed in binaries). See also JFCL. ...
noddy => /nod'ee/ [UK: from the children's books] adj. 1. Small and un-useful, but demonstrating a point. Noddy programs are often written by people learning a new language or system. The archetypal noddy program is {hello, world}. Noddy code may be ...
NOMEX underwear => /noh'meks uhn'-der-weir/ [USENET] n. Syn. {asbestos longjohns}, used mostly in auto-related mailing lists and newsgroups. NOMEX underwear is an actual product available on the racing equipment market, used as a fire resistance meas...
non-optimal solution => n. (also `sub-optimal solution') An astoundingly stupid way to do something. This term is generally used in deadpan sarcasm, as its impact is greatest when the person speaking looks completely serious. Compare stunning. See al...
nonlinear => adj. [scientific computation] 1. Behaving in an erratic and unpredictable fashion. When used to describe the behavior of a machine or program, it suggests that said machine or program is being forced to run far outside of design specific...

factpacks/jargon.fact  view on Meta::CPAN

priority interrupt => [from the hardware term] n. Describes any stimulus compelling enough to yank one right out of {hack mode}. Classically used to describe being dragged away by an SO for immediate sex, but may also refer to more mundane interrupti...
priority interrupt2 => in the near vicinity. Also called an NMI (non-maskable interrupt), especially in PC-land. 
profile => n. 1. A control file for a program, esp. a text file automatically read from each user's home directory and intended to be easily modified by the user in order to customize the program's behavior. Used to avoid hardcoded choices. 2. [techs...
proglet => /prog'let/ [UK] n. A short extempore program written to meet an immediate, transient need. Often written in BASIC, rarely more than a dozen lines long, and contains no subroutines. The largest amount of code that can be written off the top...
program => n. 1. A magic spell cast over a computer allowing it to turn one's input into error messages. 2. An exercise in experimental epistemology. 3. A form of art, ostensibly intended for the instruction of computers, which is nevertheless almost...
Programmer's Cheer => "Shift to the left! Shift to the right! Pop up, push down! Byte! Byte! Byte!" A joke so old it has hair on it.
programming => n. 1. The art of debugging a blank sheet of paper (or, in these days of on-line editing, the art of debugging an empty file). 2. n. A pastime similar to banging one's head against a wall, but with fewer opportunities for reward. 3. n. ...
propeller head => n. Used by hackers, this is syn. with {computer geek}. Non-hackers sometimes use it to describe all techies. Prob. derives from SF fandom's tradition (originally invented by old-time fan Ray Faraday Nelson) of propeller beanies as f...
propeller head2 => actually wears them except as a joke). 
propeller key => [Mac users] n. See {command key}.
proprietary => adj. 1. In marketroid-speak, superior; implies a product imbued with exclusive magic by the unmatched brilliance of the company's hardware or software designers. 2. In the language of hackers and users, inferior; implies a product not ...
protocol => n. As used by hackers, this never refers to niceties about the proper form for addressing letters to the Papal Nuncio or the order in which one should use the forks in a Russian-style place setting; hackers don't care about such things. I...
provocative maintenance => [common ironic mutation of `preventive maintenance'] n. Actions performed upon a machine at regularly scheduled intervals to ensure that the system remains in a usable state. So called because it is all too often performed ...
provocative maintenance2 => know what he is doing; this results in the machine's remaining in an *un*usable state for an indeterminate amount of time. See also {scratch monkey}. 
prowler => [UNIX] n. A daemon that is run periodically (typically once a week) to seek out and erase core files, truncate administrative logfiles, nuke `lost+found' directories, and otherwise clean up the cruft that tends to pile up in the corners of...
pseudo => /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An electronic-mail or USENET persona adopted by a human for amusement value or as a means of avoiding negative repercussions of one's net.behavior; a `nom de USENET', often associated with ...
pseudoprime => n. A backgammon prime (six consecutive occupied points) with one point missing. This term is an esoteric pun derived from a mathematical method that, rather than determining precisely whether a number is prime (has no divisors), uses a...
pseudosuit => /soo'doh-s[y]oot`/ n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also lobotomy.
psychedelicware => /si`k*-del'-ik-weir/ [UK] n. Syn. {display hack}. See also {smoking clover}.
psyton => /si'ton/ [TMRC] n. The elementary particle carrying the sinister force. The probability of a process losing is proportional to the number of psytons falling on it. Psytons are generated by observers, which is why demos are more likely to fa...
pubic directory => [NYU] (also `pube directory' /pyoob' d*-rek't*-ree/) n. The `pub' (public) directory on a machine that allows FTP access. So called because it is the default location for SEX (sense 1). "I'll have the source in the pube directory b...

factpacks/jargon.fact  view on Meta::CPAN

SPACEWAR => n. A space-combat simulation game, inspired by E. E. "Doc" Smith's "Lensman" books, in which two spaceships duel around a central sun, shooting torpedoes at each other and jumping through hyperspace. This game was first implemented on the...
spaghetti code => n. Code with a complex and tangled control structure, esp. one using many GOTOs, exceptions, or other `unstructured' branching constructs. Pejorative. The synonym `kangaroo code' has been reported, doubtless because such code has ma...
spaghetti inheritance => n. [encountered among users of object-oriented languages that use inheritance, such as Smalltalk] A convoluted class-subclass graph, often resulting from carelessly deriving subclasses from other classes just for the sake of ...
spaghetti inheritance2 => (successful) attempt to discourage such practice, through guilt-by-association with {spaghetti code}. 
spam => [from the MUD community] vt. To crash a program by overrunning a fixed-size buffer with excessively large input data. See also {buffer overflow}, {overrun screw}, {smash the stack}.
special-case => vt. To write unique code to handle input to or situations arising in program that are somehow distinguished from normal processing. This would be used for processing of mode switches or interrupt characters in an interactive interface...
speedometer => n. A pattern of lights displayed on a linear set of LEDs (today) or nixie tubes (yesterday, on ancient mainframes). The pattern is shifted left every N times the software goes through its main loop. A swiftly moving pattern indicates t...
spell => n. Syn. incantation.
spiffy => /spi'fee/ adj. 1. Said of programs having a pretty, clever, or exceptionally well-designed interface. "Have you seen the spiffy X version of empire yet?" 2. Said sarcastically of a program that is perceived to have little more than a flashy...
spin => vi. Equivalent to buzz. More common among C and UNIX programmers.
spl => /S-P-L/ [abbrev, from Set Priority Level] The way traditional UNIX kernels implement mutual exclusion by running code at high interrupt levels. Used in jargon to describe the act of tuning in or tuning out ordinary communication. Classically, ...
splat => n. 1. Name used in many places (DEC, IBM, and others) for the asterisk (`*') character (ASCII 0101010). This may derive from the `squashed-bug' appearance of the asterisk on many early line printers. 2. [MIT] Name used by some people for the...
sponge => [UNIX] n. A special case of a filter that reads its entire input before writing any output; the canonical example is a sort utility. Unlike most filters, a sponge can conveniently overwrite the input file with the output data stream. If you...
spooge => /spooj/ 1. n. Inexplicable or arcane code, or random and probably incorrect output from a computer program. 2. vi. To generate spooge (sense 1).
spool => [from early IBM `Simultaneous Peripheral Operation Off-Line', but this acronym is widely thought to have been contrived for effect] vt. To send files to some device or program (a `spooler') that queues them up and does something useful with ...
stack => n. A person's stack is the set of things he or she has to do in the future. One speaks of the next project to be attacked as having risen to the top of the stack. "I'm afraid I've got real work to do, so this'll have to be pushed way down on...
stack puke => n. Some processor architectures are said to `puke their guts onto the stack' to save their internal state during exception processing. The Motorola 68020, for example, regurgitates up to 92 bytes on a bus fault. On a pipelined machine, ...
stale pointer bug => n. Synonym for {aliasing bug} used esp. among microcomputer hackers.
state => n. 1. Condition, situation. "What's the state of your latest hack?" "It's winning away." "The system tried to read and write the disk simultaneously and got into a totally wedged state." The standard question "What's your state?" means "What...
steam-powered => adj. Old-fashioned or underpowered; archaic. This term does not have a strong negative loading and may even be used semi-affectionately for something that clanks and wheezes a lot but hangs in there doing the job.
stiffy => [University of Lowell, Massachusetts.] n. 3.5-inch microfloppies, so called because their jackets are more firm than those of the 5.25-inch and the 8-inch floppy. Elsewhere this might be called a `firmy'.

factpacks/jargon.fact  view on Meta::CPAN

wank => /wangk/ [Columbia University prob. by mutation from Commonwealth slang v. `wank', to masturbate] n.,v. Used much as hack is elsewhere, as a noun denoting a clever technique or person or the result of such cleverness. May describe (negatively)...
wannabee => /won'*-bee/ (also, more plausibly, spelled `wannabe') [from a term recently used to describe Madonna fans who dress, talk, and act like their idol; prob. originally from biker slang] n. A would-be hacker. The connotations of this term dif...
warm boot => n. See boot.
wart => n. A small, crocky feature that sticks out of an otherwise clean design. Something conspicuous for localized ugliness, especially a special-case exception to a general rule. For example, in some versions of `csh(1)', single quotes literalize ...
washing machine => n. Old-style 14-inch hard disks in floor-standing cabinets. So called because of the size of the cabinet and the `top-loading' access to the media packs --- and, of course, they were always set on `spin cycle'. The washing-machine ...
washing machine2 => it is even used in Russian hacker jargon. See also {walking drives}. The thick channel cables connecting these were called `bit hoses' (see hose). 
water MIPS => n. (see MIPS, sense 2) Large, water-cooled machines of either today's ECL-supercomputer flavor or yesterday's traditional mainframe type.
wave a dead chicken => v. To perform a ritual in the direction of crashed software or hardware that one believes to be futile but is nevertheless necessary so that others are satisfied that an appropriate degree of effort has been expended. "I'll wav...
wave a dead chicken2 => code, but I really think we've run into an OS bug." Compare {voodoo programming}, {rain dance}. 
weasel => n. [Cambridge] A na"ive user, one who deliberately or accidentally does things that are stupid or ill-advised. Roughly synonymous with loser.
wedged => [from a common description of recto-cranial inversion] adj. 1. To be stuck, incapable of proceeding without help. This is different from having crashed. If the system has crashed, then it has become totally non-functioning. If the system is...
wedgie => [Fairchild] n. A bug. Prob. related to wedged.
wedgitude => /wedj'i-t[y]ood/ n. The quality or state of being wedged.
weeble => /weeb'l/ [Cambridge] interj. Used to denote frustration, usually at amazing stupidity. "I stuck the disk in upside down." "Weeble...." Compare gurfle.
weeds => n. 1. Refers to development projects or algorithms that have no possible relevance or practical application. Comes from `off in the weeds'. Used in phrases like "lexical analysis for microcode is serious weeds...." 2. At CDC/ETA before its d...
weenie => n. 1. When used with a qualifier (for example, as in {UNIX weenie}, VMS weenie, IBM weenie) this can be either an insult or a term of praise, depending on context, tone of voice, and whether or not it is applied by a person who considers hi...
Weenix => /wee'niks/ [ITS] n. A derogatory term for {UNIX}, derived from {UNIX weenie}. According to one noted ex-ITSer, it is "the operating system preferred by Unix Weenies typified by poor modularity, poor reliability, hard file deletion, no file ...
well-behaved => adj. 1. [primarily {MS-DOS}] Said of software conforming to system interface guidelines and standards. Well-behaved software uses the operating system to do chores such as keyboard input, allocating memory and drawing graphics. Oppose...
well-connected => adj. Said of a computer installation, this means that it has reliable email links with {the network} and/or that it relays a large fraction of available USENET newsgroups. `Well-known' can be almost synonymous, but also implies that...
wetware => /wet'weir/ [prob. from the novels of Rudy Rucker] n. 1. The human nervous system, as opposed to computer hardware or software. "Wetware has 7 plus or minus 2 temporary registers." 2. Human beings (programmers, operators, administrators) at...
whacker => [University of Maryland from hacker] n. 1. A person, similar to a hacker, who enjoys exploring the details of programmable systems and how to stretch their capabilities. Whereas a hacker tends to produce great hacks, a whacker only ends up...

factpacks/techdict.fact  view on Meta::CPAN

OEM => (Original Equipment Manufacturer) This acronym is used to denote equipment that is sold to other companies or resellers for integration into systems. For example, a hard drive manufacturer may sell an OEM hard drive in bulk quantities and no m...
Office Suite => The set of software products that are required by an office. Most often comprised of a spreadsheet program, a word processor, a scheduler, and a presentation manager. Sometimes they will include a financial package and a database prog...
OLE => (see Object Linking and Embedding) see Object Linking and Embedding
Online => The term refers to anything that's on the Internet, as in "I've got this great online magazine for you to check out at www.ugeek.com."
OpenGL => (Open Graphics Language) This is a 3D graphics language developed by Silicon Graphics. OpenGL support is built into Windows NT. You can see some examples by checking out the NT screen savers. Some 3D graphics accelerators have OpenGL accele...
Optical Carrier 12 => (OC-12) This stands for the 622 Mbps ATM protocol. Some large Internet providers are using OC-12 for their backbones.
Optical Carrier 3 => (OC-3) Synonym for the 155 Mbps ATM protocol.
Optical Drive => A storage device that uses light to store data instead of magnetism. To write it (usually) uses a laser to change a tiny portion of an optical disk so that it can be read later by checking the state of that portion.
OS => (Operating System) The program that allows you to access the basic functions of your computer. It is the minimum software required to run a program. The best one by far is the MacOS.
Output => Anything that comes out of a computer or system. As in, "Watch out for that pile of OUTPUT on the sidewalk."
Over-clocking => This is the act of running a chip at a higher clock speed than it was specified for. Very often, chips are capable of running faster than they are specified for, and can be safely over-clocked. 
P54C => This is the official part number for the Pentium processor from Intel.
P55C => This is the official part number for the Pentium processor with MMX technology from Intel.
Packet => A collection of information. It's often used to refer to the chunks of information sent over computer networks.
Packet Filter => This is anything that filters out network traffic based on sender's address, receiver's address, and the type of protocol being sent. Some routers support packet filtering, all firewalls do, and some proxy servers will as well.
Packet InterNet Gopher => (PING) Part of the standard TCP/IP suite of protocols that allows you to check your connectivity with other devices, or to check whether your own TCP/IP stack is working properly. Normally, you type in something like "ping 2...
Page Fault => This is not an error. It means that the computer had to resort to using the swap file as memory.
Parallel => Meaning in unison, or many things at the same time. Most commonly refers to a computer with multiple processors that can execute multiple instructions at the same time.
Parallel Port => The parallel port is found on just about all PCs. It's a 25-pin interface cable (DB-25) that is designed for connection to a printer. Normally, it will take up IRQ 7. In addition to printers, you can connect many other devices such a...
Parity => Meaning that there is an equality. Usually for the purpose of safety, so that if one goes bad there is still the other.
Parity Memory => Not quite memory that has a twin, but instead, more like a summary. The parity does not exactly have a copy of the original, but rather enough information to verify the integrity of the original.



( run in 0.837 second using v1.01-cache-2.11-cpan-49f99fa48dc )