Amethyst
view release on metacpan or search on metacpan
factpacks/jargon-split.fact view on Meta::CPAN
Ada is n. A {{Pascal}}-descended language that has been made mandatory for Department of Defense software projects by the Pentagon. Hackers are nearly unanimous in observing that, technically, it is precisely what one might expect given that ...
Ada2 is committee, crockish, difficult to use, and overall a disastrous, multi-billion-dollar boondoggle (one common description is "The PL/I of the 1980s"). Hackers find Ada's exception-handling and inter-process communication features par...
Ada3 is daughter of Lord Byron who became the world's first programmer while cooperating with Charles Babbage on the design of his mechanical computing engines in the mid-1800s) would almost certainly blanch at the use to which her name has ...
Ada4 is been said about it is that there is probably a good small language screaming to get out from inside its vast, {elephantine} bulk.
adger is /aj'r/ [UCLA] vt. To make a bonehead move with consequences that could have been foreseen with a slight amount of mental effort. E.g., "He started removing files and promptly adgered the whole project". Compare {dumbass attack}.
admin is /ad-min'/ n. Short for `administrator'; very commonly used in speech or on-line to refer to the systems person in charge on a computer. Common constructions on this include `sysadmin' and `site admin' (emphasizing the administrator's...
admin2 is or `newsadmin' (focusing specifically on news). Compare {postmaster}, {sysop}, {system mangler}.
ADVENT is /ad'vent/ n. The prototypical computer adventure game, first implemented on the {PDP-10} by Will Crowther as an attempt at computer-refereed fantasy gaming, and expanded into a puzzle-oriented game by Don Woods. Now better known as ...
ADVENT2 is system permitted only 6-letter filenames. See also {vadding}. This game defined the terse, dryly humorous style now expected in text adventure games, and popularized several tag lines that have become fixtures of hacker-speak "A...
ADVENT3 is see no X here" (for some noun X). "You are in a maze of twisty little passages, all alike." "You are in a little maze of twisty passages, all different." The `magic words' {xyzzy} and {plugh} also derive from this game. Crowthe...
ADVENT4 is of the Mammoth & Flint Ridge cave system; it actually *has* a `Colossal Cave' and a `Bedquilt' as in the game, and the `Y2' that also turns up is cavers' jargon for a map reference to a secondary entrance.
AI-complete is /A-I k*m-pleet'/ [MIT, Stanford by analogy with `NP-complete' (see {NP-})] adj. Used to describe problems or subproblems in AI, to indicate that the solution presupposes a solution to the `strong AI problem' (that is, the synthe...
AI-complete2 is problem that is AI-complete is, in other words, just too hard. Examples of AI-complete problems are `The Vision Problem' (building a system that can see as well as a human) and `The Natural Language Problem' (building a syste...
AI-complete3 is language as well as a human). These may appear to be modular, but all attempts so far (1991) to solve them have foundered on the amount of context information and `intelligence' they seem to require. See also {gedanken}.
AI koans is /A-I koh'anz/ pl.n. A series of pastiches of Zen teaching riddles created by Danny Hillis at the MIT AI Lab around various major figures of the Lab's culture (several are included in appendix A). See also {ha ha only serious}, {mu...
AIDS is /aydz/ n. Short for A* Infected Disk Syndrome (`A*' is a {glob} pattern that matches, but is not limited to, Apple), this condition is quite often the result of practicing unsafe {SEX}. See {virus}, {worm}, {Trojan horse}, {virgin}.
airplane rule is n. "Complexity increases the possibility of failure; a twin-engine airplane has twice as many engine problems as a single-engine airplane." By analogy, in both software and electronics, the rule that simplicity increases robu...
airplane rule2 is correspondingly argued that the right way to build reliable systems is to put all your eggs in one basket, after making sure that you've built a really *good* basket.
aliasing bug is n. A class of subtle programming errors that can arise in code that does dynamic allocation, esp. via `malloc(3)' or equivalent. If more than one pointer addresses (`aliases for') a given hunk of storage, it may happen that th...
aliasing bug2 is then referenced through another, which may lead to subtle (and possibly intermittent) lossage depending on the state and the allocation history of the malloc {arena}. Avoidable by use of allocation strategies that never ali...
aliasing bug3 is higher-level languages, such as {LISP}, which employ a garbage collector (see {GC}). Also called a {stale pointer bug}. See also {precedence lossage}, {smash the stack}, {fandango on core}, {memory leak}, {overrun screw}, ...
aliasing bug4 is nowadays associated with C programming, it was already in use in a very similar sense in the Algol-60 and FORTRAN communities in the 1960s.
all-elbows is adj. Of a TSR (terminate-and-stay-resident) IBM PC program, such as the N pop-up calendar and calculator utilities that circulate on {BBS} systems unsociable. Used to describe a program that rudely steals the resources that it n...
all-elbows2 is also be resident. One particularly common form of rudeness is lock-up due to programs fighting over the keyboard interrupt. See also {mess-dos}.
alpha particles is n. See {bit rot}.
ALT is /awlt/ 1. n. The ALT shift key on an IBM PC or {clone}. 2. [possibly lowercased] n. The `clover' or `Command' key on a Macintosh; use of this term usually reveals that the speaker hacked PCs before coming to the Mac (see also {command k...
ALT2 is reserve `ALT' for the Option key. 3. n.obs. [PDP-10] Alternate name for the ASCII ESC character (ASCII 0011011), after the keycap labeling on some older terminals. Also `ALTMODE' (/awlt'mohd/). This character was almost never pron...
ALT3 is under TOPS-10 --- always ALT, as in "Type ALT ALT to end a TECO command" or "ALT U onto the system" (for "log onto the [ITS] system"). This was probably because ALT is more convenient to say than `escape', especially when followed b...
ALT4 is *and* a character, for that matter).
alt bit is /awlt bit/ [from alternate] adj. See {meta bit}.
Aluminum Book is [MIT] n. `Common LISP The Language', by Guy L. Steele Jr. (Digital Press, first edition 1984, second edition 1990). Note that due to a technical screwup some printings of the second edition are actually of a color the author...
Aluminum Book2 is also {{book titles}}.
amoeba is n. Humorous term for the Commodore Amiga personal computer.
amp off is [Purdue] vt. To run in {background}. From the UNIX shell `&' operator.
amper is n. Common abbreviation for the name of the ampersand (`&', ASCII 0100110) character. See {ASCII} for other synonyms.
angle brackets is n. Either of the characters `<' (ASCII 0111100) and `>' (ASCII 0111110) (ASCII less-than or greater-than signs). The {Real World} angle brackets used by typographers are actually taller than a less-than or greater-than sig...
angry fruit salad is n. A bad visual-interface design that uses too many colors. This derives, of course, from the bizarre day-glo colors found in canned fruit salad. Too often one sees similar affects from interface designers using color wi...
angry fruit salad2 is tendency to create displays that are flashy and attention-getting but uncomfortable for long-term use.
AOS is 1. /aws/ (East Coast), /ay-os/ (West Coast) [based on a PDP-10 increment instruction] vt.,obs. To increase the amount of something. "AOS the campfire." Usage considered silly, and now obsolete. Now largely supplanted by {bump}. See ...
AOS2 is supported at one time by Data General. This was pronounced /A-O-S/ or /A-os/. A spoof of the standard AOS system administrator's manual (`How to load and generate your AOS system') was created, issued a part number, and circulated ...
AOS3 is goad and levitate your chaos system'. 3. Algebraic Operating System, in reference to those calculators which use infix instead of postfix (reverse Polish) notation. Historical note AOS in sense 1 was the name of a {PDP-10} instruc...
AOS4 is computer and added 1 to it; AOS meant `Add One and do not Skip'. Why, you may ask, does the `S' stand for `do not Skip' rather than for `Skip'? Ah, here was a beloved piece of PDP-10 folklore. There were eight such instructions AO...
AOS5 is instruction if the result was Equal to zero; AOSG added 1 and then skipped if the result was Greater than 0; AOSN added 1 and then skipped if the result was Not 0; AOSA added 1 and then skipped Always; and so on. Just plain AOS didn...
AOS6 is For similar reasons, AOJ meant `Add One and do not Jump'. Even more bizarre, SKIP meant `do not SKIP'! If you wanted to skip the next instruction, you had to say `SKIPA'. Likewise, JUMP meant `do not JUMP'; the unconditional form wa...
AOS7 is By some quirk of the 10's design, the {JRST} (Jump and ReSTore flag with no flag specified) was actually faster and so was invariably used. Such were the perverse mysteries of assembler programming.
app is /ap/ n. Short for `application program', as opposed to a systems program. What systems vendors are forever chasing developers to create for their environments so they can sell more boxes. Hackers tend not to think of the things they t...
app2 is parlance the term excludes compilers, program editors, games, and messaging systems, though a user would consider all those to be apps. Oppose {tool}, {operating system}.
arc is [primarily MSDOS] vt. To create a compressed {archive} from a group of files using SEA ARC, PKWare PKARC, or a compatible program. Rapidly becoming obsolete as the ARC compression method is falling into disuse, having been replaced by ...
arc2 is feather}, {zip}.
arc wars is [primarily MSDOS] n. {holy wars} over which archiving program one should use. The first arc war was sparked when System Enhancement Associates (SEA) sued PKWare for copyright and trademark infringement on its ARC program. PKWare'...
arc wars2 is and speed while largely retaining compatibility (it introduced a new compression type that could be disabled for backward-compatibility). PKWare settled out of court to avoid enormous legal costs (both SEA and PKWare are small ...
arc wars3 is of PKARC was changed to PKPAK. The public backlash against SEA for bringing suit helped to hasten the demise of ARC as a standard when PKWare and others introduced new, incompatible archivers with better compression algorithms....
archive is n. 1. A collection of several files bundled into one file by a program such as `ar(1)', `tar(1)', `cpio(1)', or {arc} for shipment or archiving (sense 2). See also {tar and feather}. 2. A collection of files or archives (sense 1) ...
archive2 is {FTP} or an email server.
arena is [UNIX] n. The area of memory attached to a process by `brk(2)' and `sbrk(2)' and used by `malloc(3)' as dynamic storage. So named from a semi-mythical `malloc corrupt arena' message supposedly emitted when some early versions becam...
arena2 is {aliasing bug}, {memory leak}, {smash the stack}.
arg is /arg/ n. Abbreviation for `argument' (to a function), used so often as to have become a new word (like `piano' from `pianoforte'). "The sine function takes 1 arg, but the arc-tangent function can take either 1 or 2 args." Compare {p...
armor-plated is n. Syn. for {bulletproof}.
asbestos is adj. Used as a modifier to anything intended to protect one from {flame}s. Important cases of this include {asbestos longjohns} and {asbestos cork award}, but it is used more generally.
asbestos cork award is n. Once, long ago at MIT, there was a {flamer} so consistently obnoxious that another hacker designed, had made, and distributed posters announcing that said flamer had been nominated for the `asbestos cork award'. Pers...
asbestos cork award2 is application of the cork should consult the etymology under {flame}. Since then, it is agreed that only a select few have risen to the heights of bombast required to earn this dubious dignity --- but there is no agreeme...
asbestos longjohns is n. Notional garments often donned by {USENET} posters just before emitting a remark they expect will elicit {flamage}. This is the most common of the {asbestos} coinages. Also `asbestos underwear', `asbestos overcoat', e...
attoparsec is n. `atto-' is the standard SI prefix for multiplication by 10^{-18}. A parsec (parallax-second) is 3.26 light-years; an attoparsec is thus 3.26 * 10^{-18} light years, or about 3.1 cm (thus, 1 attoparsec/{microfortnight} equal...
attoparsec2 is be in use (though probably not very seriously) among hackers in the U.K. See {micro-}.
autobogotiphobia is /aw'to-boh-got`*-foh'bee-*/ n. See {bogotify}.
automagically is /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv. Automatically, but in a way that, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining ...
automagically2 is compiler generates C, then automagically invokes `cc(1)' to produce an executable."
avatar is [CMU, Tektronix] n. Syn. {root}, {superuser}. There are quite a few UNIX machines on which the name of the superuser account is `avatar' rather than `root'. This quirk was originated by a CMU hacker who disliked the term `superuser...
avatar2 is hacker at Tektronix.
awk is 1. n. [UNIX techspeak] An interpreted language for massaging text data developed by Alfred Aho, Peter Weinberger, and Brian Kernighan (the name is from their initials). It is characterized by C-like syntax, a declaration-free approach ...
awk2 is associative arrays, and field-oriented text processing. See also {Perl}. 2. n. Editing term for an expression awkward to manipulate through normal {regexp} facilities (for example, one containing a {newline}). 3. vt. To process d...
awk3 is security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field ...
awk4 is maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BS...
awk5 is 1983 Turing Award lecture to the ACM revealed the existence of a back door in early UNIX versions that may have qualified as the most fiendishly clever security hack of all time. The C compiler contained code that would recognize when ...
awk6 is insert some code recognizing a password chosen by Thompson, giving him entry to the system whether or not an account had been created for him. Normally such a back door could be removed by removing it from the source code for the com...
awk7 is recompile the compiler, you have to *use* the compiler --- so Thompson also arranged that the compiler would *recognize when it was compiling a version of itself*, and insert into the recompiled compiler the code to insert into the rec...
awk8 is entry --- and, of course, the code to recognize itself and do the whole thing again the next time around! And having done this once, he was then able to recompile the compiler from the original sources, leaving his back door in place ...
awk9 is The talk that revealed this truly moby hack was published as "Reflections on Trusting Trust", `Communications of the ACM 27', 8 (August 1984), pp. 761--763. Syn. {trap door}; may also be called a `wormhole'. See also {iron box}, {cr...
backbone cabal is n. A group of large-site administrators who pushed through the {Great Renaming} and reined in the chaos of {USENET} during most of the 1980s. The cabal {mailing list} disbanded in late 1988 after a bitter internal catfight, ...
backbone site is n. A key USENET and email site; one that processes a large amount of third-party traffic, especially if it is the home site of any of the regional coordinators for the USENET maps. Notable backbone sites as of early 1991 inclu...
backbone site2 is University, UC Berkeley, DEC's Western Research Laboratories, Ohio State University, and the University of Texas. Compare {rib site}, {leaf site}.
backgammon is See {bignum}, {moby}, and {pseudoprime}.
background is n.,adj.,vt. To do a task `in background' is to do it whenever {foreground} matters are not claiming your undivided attention, and `to background' something means to relegate it to a lower priority. "For now, we'll just print a ...
background2 is graph-printing problem in background." Note that this implies ongoing activity but at a reduced level or in spare time, in contrast to mainstream `back burner' (which connotes benign neglect until some future resumption of activ...
background3 is processing that they have queued up for their unconscious minds (a tack that one can often fruitfully take upon encountering an obstacle in creative work). Compare {amp off}, {slopsucker}. Technically, a task running in backgr...
background4 is was started (and often running at a lower priority); oppose {foreground}. Nowadays this term is primarily associated with {{UNIX}}, but it appears to have been first used in this sense on OS/360.
backspace and overstrike is interj. Whoa! Back up. Used to suggest that someone just said or did something wrong. Common among APL programmers.
backward combatability is /bak'w*rd k*m-bat'*-bil'*-tee/ [from `backward compatibility'] n. A property of hardware or software revisions in which previous protocols, formats, and layouts are discarded in favor of `new and improved' protocols, ...
backward combatability2 is making the transition between major releases. When the change is so drastic that the old formats are not retained in the new version, it is said to be `backward combatable'. See {flag day}.
BAD is /B-A-D/ [IBM acronym, `Broken As Designed'] adj. Said of a program that is {bogus} because of bad design and misfeatures rather than because of bugginess. See {working as designed}.
Bad Thing is [from the 1930 Sellar & Yeatman parody `1066 And All That'] n. Something that can't possibly result in improvement of the subject. This term is always capitalized, as in "Replacing all of the 9600-baud modems with bicycle courier...
Bad Thing2 is Thing}. British correspondents confirm that {Bad Thing} and {Good Thing} (and prob. therefore {Right Thing} and {Wrong Thing}) come from the book referenced in the etymology, which discusses rulers who were Good Kings but Bad ...
Bad Thing3 is mainstream idiom on the British side of the pond.
bag on the side is n. An extension to an established hack that is supposed to add some functionality to the original. Usually derogatory, implying that the original was being overextended and should have been thrown away, and the new product ...
bag on the side2 is phrase, `to hang a bag on the side [of]'. "C++? That's just a bag on the side of C ...." "They want me to hang a bag on the side of the accounting system."
bagbiter is /bag'bit-*r/ n. 1. Something, such as a program or a computer, that fails to work, or works in a remarkably clumsy manner. "This text editor won't let me make a file with a line longer than 80 characters! What a bagbiter!" 2. A ...
bagbiter2 is inadvertently or otherwise, typically by failing to program the computer properly. Synonyms {loser}, {cretin}, {chomper}. 3. adj. `bagbiting' Having the quality of a bagbiter. "This bagbiting system won't let me compute the f...
bagbiter3 is {losing}, {cretinous}, {bletcherous}, `barfucious' (under {barfulous}) and `chomping' (under {chomp}). 4. `bite the bag' vi. To fail in some manner. "The computer keeps crashing every 5 minutes." "Yes, the disk controller is ...
bagbiter4 is of these terms was almost undoubtedly obscene, possibly referring to the scrotum, but in their current usage they have become almost completely sanitized. A program called Lexiphage on the old MIT AI PDP-10 would draw on a selec...
bagbiter5 is BAG" in ornate letters, and then a pair of jaws biting pieces of it off. This is the first and to date only known example of a program *intended* to be a bagbiter.
bamf is /bamf/ 1. [from old X-Men comics] interj. Notional sound made by a person or object teleporting in or out of the hearer's vicinity. Often used in {virtual reality} (esp. {MUD}) electronic {fora} when a character wishes to make a drama...
bamf2 is magical transformation, used in virtual reality {fora} like sense 1. 3. [from `Don Washington's Survival Guide'] n. Acronym for `Bad-Ass Mother Fucker', used to refer to one of the handful of nastiest monsters on an LPMUD or other ...
banana label is n. The labels often used on the sides of {macrotape} reels, so called because they are shaped roughly like blunt-ended bananas. This term, like macrotapes themselves, is still current but visibly headed for obsolescence.
banana problem is n. [from the story of the little girl who said "I know how to spell `banana', but I don't know when to stop"]. Not knowing where or when to bring a production to a close (compare {fencepost error}). One may say `there is a ...
banana problem2 is defined or incorrect termination conditions, or in discussing the evolution of a design that may be succumbing to featuritis (see also {creeping elegance}, {creeping featuritis}). See item 176 under {HAKMEM}, which describe...
banana problem3 is implementation.bandwidth n. 1. Used by hackers in a generalization of its technical meaning as the volume of information per unit time that a computer, person, or transmission medium can handle. "Those are amazing graphics,...
banana problem4 is bandwidth, I guess." Compare {low-bandwidth}. 2. Attention span. 3. On {USENET}, a measure of network capacity that is often wasted by people complaining about how items posted by others are a waste of bandwidth.
bang is 1. n. Common spoken name for `!' (ASCII 0100001), especially when used in pronouncing a {bang path} in spoken hackish. In {elder days} this was considered a CMUish usage, with MIT and Stanford hackers preferring {excl} or {shriek}; ...
bang2 is it (esp. via the term {bang path}) and it is now certainly the most common spoken name for `!'. Note that it is used exclusively for non-emphatic written `!'; one would not say "Congratulations bang" (except possibly for humorous p...
bang3 is exact characters `foo!' one would speak "Eff oh oh bang". See {shriek}, {{ASCII}}. 2. interj. An exclamation signifying roughly "I have achieved enlightenment!", or "The dynamite has cleared out my brain!" Often used to acknowledge...
bang4 is immediately after one has been called on it.
bang on is vt. To stress-test a piece of hardware or software "I banged on the new version of the simulator all day yesterday and it didn't crash once. I guess it is ready to release." The term {pound on} is synonymous.
bang path is n. An old-style UUCP electronic-mail address specifying hops to get from some assumed-reachable location to the addressee, so called because each {hop} is signified by a {bang} sign. Thus, for example, the path ...!bigsite!foovax!...
bang path2 is to machine bigsite (presumably a well-known location accessible to everybody) and from there through the machine foovax to the account of user me on barbox. In the bad old days of not so long ago, before autorouting mailers b...
bang path3 is compound bang addresses using the { } convention (see {glob}) to give paths from *several* big machines, in the hopes that one's correspondent might be able to get mail to one of them reliably (example ...!{seismo, ut-sally, ih...
bang path4 is 10 hops were not uncommon in 1981. Late-night dial-up UUCP links would cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. See {{Inter...
banner is n. 1. The title page added to printouts by most print spoolers (see {spool}). Typically includes user or account ID information in very large character-graphics capitals. Also called a `burst page', because it indicates where to bu...
banner2 is one user's printout from the next. 2. A similar printout generated (typically on multiple pages of fan-fold paper) from user-specified text, e.g., by a program such as UNIX's `banner({1,6})'. 3. On interactive software, a first sc...
banner3 is and/or a copyright notice.
bar is /bar/ n. 1. The second metasyntactic variable, after {foo} and before {baz}. "Suppose we have two functions FOO and BAR. FOO calls BAR...." 2. Often appended to {foo} to produce {foobar}.
bare metal is n. 1. New computer hardware, unadorned with such snares and delusions as an {operating system}, an {HLL}, or even assembler. Commonly used in the phrase `programming on the bare metal', which refers to the arduous work of {bit b...
bare metal2 is for a new machine. Real bare-metal programming involves things like building boot proms and BIOS chips, implementing basic monitors used to test device drivers, and writing the assemblers that will be used to write the compil...
bare metal3 is real development environment. 2. `Programming on the bare metal' is also used to describe a style of {hand-hacking} that relies on bit-level peculiarities of a particular hardware design, esp. tricks for speed and space optim...
bare metal4 is overlapping instructions (or, as in the famous case described in appendix A, interleaving of opcodes on a magnetic drum to minimize fetch delays due to the device's rotational latency). This sort of thing has become less common...
bare metal5 is and machine resources have changed, but is still found in heavily constrained environments such as industrial embedded systems. See {real programmer}. In the world of personal computing, bare metal programming (especially in s...
bare metal6 is considered a {Good Thing}, or at least a necessary thing (because these machines have often been sufficiently slow and poorly designed to make it necessary; see {ill-behaved}). There, the term usually refers to bypassing the ...
bare metal7 is application to directly access device registers and machine addresses. "To get 19.2 kilobaud on the serial port, you need to get down to the bare metal." People who can do this sort of thing are held in high regard.
barf is /barf/ [from mainstream slang meaning `vomit'] 1. interj. Term of disgust. This is the closest hackish equivalent of the Val\-speak "gag me with a spoon". (Like, euwww!) See {bletch}. 2. vi. To say "Barf!" or emit some similar exp...
barf2 is hack and he barfed" means only that he complained about it, not that he literally vomited. 3. vi. To fail to work because of unacceptable input. May mean to give an error message. Examples "The division operation barfs if you try...
barf3 is operation checks for an attempt to divide by zero, and if one is encountered it causes the operation to fail in some unspecified, but generally obvious, manner.) "The text editor barfs if you try to read in a new file before writing o...
barf4 is Commonwealth hackish, `barf' is generally replaced by `puke' or `vom'. {barf} is sometimes also used as a metasyntactic variable, like {foo} or {bar}.
barfulation is /bar`fyoo-lay'sh*n/ interj. Variation of {barf} used around the Stanford area. An exclamation, expressing disgust. On seeing some particularly bad code one might exclaim, "Barfulation! Who wrote this, Quux?"
barfulous is /bar'fyoo-l*s/ adj. (alt. `barfucious', /bar-fyoo-sh*s/) Said of something that would make anyone barf, if only for esthetic reasons.
baroque is adj. Feature-encrusted; complex; gaudy; verging on excessive. Said of hardware or (esp.) software designs, this has many of the connotations of {elephantine} or {monstrosity} but is less extreme and not pejorative in itself. "Meta...
baroque2 is variations to its letterform output. Now *that* is baroque!" See also {rococo}.
BartleMUD is /bar'tl-muhd/ n. Any of the MUDs derived from the original MUD game by Richard Bartle (see {MUD}). BartleMUDs are noted for their (usually slightly offbeat) humor, dry but friendly syntax, and lack of adjectives in object descrip...
BartleMUD2 is `brand172', for instance (see {brand brand brand}). Some MUDders intensely dislike Bartle and this term, and prefer to speak of `MUD-1'.
BASIC is n. A programming language, originally designed for Dartmouth's experimental timesharing system in the early 1960s, which has since become the leading cause of brain-damage in proto-hackers. This is another case (like {Pascal}) of t...
BASIC2 is deliberately designed as an educational toy gets taken too seriously. A novice can write short BASIC programs (on the order of 10--20 lines) very easily; writing anything longer is (a) very painful, and (b) encourages bad habits tha...
BASIC3 is hack in a real language. This wouldn't be so bad if historical accidents hadn't made BASIC so common on low-end micros. As it is, it ruins thousands of potential wizards a year.
batch is adj. 1. Non-interactive. Hackers use this somewhat more loosely than the traditional technical definitions justify; in particular, switches on a normally interactive program that prepare it to receive non-interactive command input ar...
batch2 is switches. A `batch file' is a series of instructions written to be handed to an interactive program running in batch mode. 2. Performance of dreary tasks all at one sitting. "I finally sat down in batch mode and wrote out checks fo...
batch3 is electricity back on next week..." 3. Accumulation of a number of small tasks that can be lumped together for greater efficiency. "I'm batching up those letters to send sometime" "I'm batching up bottles to take to the recycling ce...
bathtub curve is n. Common term for the curve (resembling an end-to-end section of one of those claw-footed antique bathtubs) that describes the expected failure rate of electronics with time initially high, dropping to near 0 for most of the ...
bathtub curve2 is `tires out'. See also {burn-in period}, {infant mortality}.
baud is /bawd/ [simplified from its technical meaning] n. Bits per second. Hence kilobaud or Kbaud, thousands of bits per second. The technical meaning is `level transitions per second'; this coincides with bps only for two-level modulation w...
baud2 is are aware of these nuances but blithely ignore them.
baud barf is /bawd barf/ n. The garbage one gets on the monitor when using a modem connection with some protocol setting (esp. line speed) incorrect, or when someone picks up a voice extension on the same line, or when really bad line noise di...
baud barf2 is completely {random}, by the way; hackers with a lot of serial-line experience can usually tell whether the device at the other end is expecting a higher or lower speed than the terminal is set to. *Really* experienced ones can...
baz is /baz/ [Stanford corruption of {bar}] n. 1. The third metasyntactic variable, after {foo} and {bar} and before {quux} (or, occasionally, `qux'; or local idiosyncracies like `rag', `zowie', etc.). "Suppose we have three functions FOO,BAR...
baz2 is BAZ...." 2. interj. A term of mild annoyance. In this usage the term is often drawn out for 2 or 3 seconds, producing an effect not unlike the bleating of a sheep; /baaaaaaz/. 3. Occasionally appended to {foo} to produce `foobaz'.
bboard is /bee'bord/ [contraction of `bulletin board'] n. 1. Any electronic bulletin board; esp. used of {BBS} systems running on personal micros, less frequently of a USENET {newsgroup} (in fact, use of the term for a newsgroup generally ma...
bboard2 is BBS world or as a real old-timer predating USENET). 2. At CMU and other colleges with similar facilities, refers to campus-wide electronic bulletin boards. 3. The term `physical bboard' is sometimes used to refer to a old-fashio...
bboard3 is it refers to a particular one outside the CS Lounge. In either of senses 1 or 2, the term is usually prefixed by the name of the intended board (`the Moonlight Casino bboard' or `market bboard'); however, if the context is clear, th...
bboard4 is name alone, as in (at CMU) "Don't post for-sale ads on general".
BBS is /B-B-S/ [acronym, `Bulletin Board System'] n. An electronic bulletin board system; that is, a message database where people can log in and leave broadcast messages for others grouped (typically) into {topic group}s. Thousands of local ...
BBS2 is U.S., typically run by amateurs for fun out of their homes on MS-DOS boxes with a single modem line each. Fans of USENET and Internet or the big commercial timesharing bboards such as CompuServe and GEnie tend to consider local BBSes ...
BBS3 is but they serve a valuable function by knitting together lots of hackers and users in the personal-micro world who would otherwise be unable to exchange code at all.
beam is [from Star Trek Classic's "Beam me up, Scotty!"] vt. To transfer {softcopy} of a file electronically; most often in combining forms such as `beam me a copy' or `beam that over to his site'. Compare {blast}, {snarf}, {BLT}.
beanie key is [Mac users] n. See {command key}.
beep is n.,v. Syn. {feep}. This term seems to be preferred among micro hobbyists.
beige toaster is n. A Macintosh. See {toaster}; compare {Macintrash}, {maggotbox}.
bells and whistles is [by analogy with the toyboxes on theater organs] n. Features added to a program or system to make it more {flavorful} from a hacker's point of view, without necessarily adding to its utility for its primary function. Dis...
bells and whistles2 is to attract users. "Now that we've got the basic program working, let's go back and add some bells and whistles." No one seems to know what distinguishes a bell from a whistle.
bells, whistles, and gongs is n. A standard elaborated form of {bells and whistles}; typically said with a pronounced and ironic accent on the `gongs'.
benchmark is [techspeak] n. An inaccurate measure of computer performance. "In the computer industry, there are three kinds of lies lies, damn lies, and benchmarks." Well-known ones include Whetstone, Dhrystone, Rhealstone (see {h}), the Gab...
benchmark2 is SPECmark suite, and LINPACK. See also {machoflops}, {MIPS}.
Berkeley Quality Software is adj. (often abbreviated `BQS') Term used in a pejorative sense to refer to software that was apparently created by rather spaced-out hackers late at night to solve some unique problem. It usually has nonexistent, ...
Berkeley Quality Software2 is been tested on at least two examples, and core dumps when anyone else attempts to use it. This term was frequently applied to early versions of the `dbx(1)' debugger. See also {Berzerkeley}.
berklix is /berk'liks/ n.,adj. [contraction of `Berkeley UNIX'] See {BSD}. Not used at Berkeley itself. May be more common among {suit}s attempting to sound like cognoscenti than among hackers, who usually just say `BSD'.
berserking is vi. A {MUD} term meaning to gain points *only* by killing other players and mobiles (non-player characters). Hence, a Berserker-Wizard is a player character that has achieved enough points to become a wizard, but only by killing ...
berserking2 is frowned upon because of its inherently antisocial nature, but some MUDs have a `berserker mode' in which a player becomes *permanently* berserk, can never flee from a fight, cannot use magic, gets no score for treasure, but do...
berserking3 is wizards can seriously damage your elf!"
Berzerkeley is /b*r-zer'klee/ [from `berserk', via the name of a now-deceased record label] n. Humorous distortion of `Berkeley' used esp. to refer to the practices or products of the {BSD} UNIX hackers. See {software bloat}, {Missed'em-five}...
Berzerkeley2 is use of this term in reference to the cultural and political peculiarities of UC Berkeley as a whole has been reported from as far back as the 1960s.
beta is /bay't*/, /be't*/ or (Commonwealth) /bee't*/ n. 1. In the {Real World}, software often goes through two stages of testing Alpha (in-house) and Beta (out-house?). Software is said to be `in beta'. 2. Anything that is new and experimen...
beta2 is means that he is still testing for compatibility and reserving judgment. 3. Beta software is notoriously buggy, so `in beta' connotes flakiness. Historical note More formally, to beta-test is to test a pre-release (potentially unre...
beta3 is making it available to selected customers and users. This term derives from early 1960s terminology for product cycle checkpoints, first used at IBM but later standard throughout the industry. `Alpha Test' was the unit, module, or co...
beta4 is system test. These themselves came from earlier A- and B-tests for hardware. The A-test was a feasibility and manufacturability evaluation done before any commitment to design and development. The B-test was a demonstration that th...
beta5 is The C-test (corresponding to today's beta) was the B-test performed on early samples of the production design.
BFI is /B-F-I/ n. See {brute force and ignorance}. Also encountered in the variant `BFMI', `brute force and *massive* ignorance'.
bible is n. 1. One of a small number of fundamental source books such as {Knuth} and {K&R}. 2. The most detailed and authoritative reference for a particular language, operating system, or other complex software system.
BiCapitalization is n. The act said to have been performed on trademarks (such as NeXT, {NeWS}, VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been raised above the ruck of common coinage by nonstandard capitalization. Too many {mar...
BiCapitalization2 is really cute, even the 2,317th time they do it. Compare {studlycaps}.
BIFF is /bif/ [USENET] n. The most famous {pseudo}, and the prototypical {newbie}. Articles from BIFF are characterized by all uppercase letters sprinkled liberally with bangs, typos, `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ HE"S...
BIFF2 is IN CAPITULL LETTRS LIKE THIS!!!), use (and often misuse) of fragments of {talk mode} abbreviations, a long {sig block} (sometimes even a {doubled sig}), and unbounded na"ivet'e. BIFF posts articles using his elder brother's VIC-20....
BIFF3 is appear to come from a variety of sites. However, {BITNET} seems to be the most frequent origin. The theory that BIFF is a denizen of BITNET is supported by BIFF's (unfortunately invalid) electronic mail address BIFF@BIT.NET.
biff is /bif/ vt. To notify someone of incoming mail. From the BSD utility `biff(1)', which was in turn named after the implementor's dog (it barked whenever the mailman came). No relation to {BIFF}.
Big Gray Wall is n. What faces a {VMS} user searching for documentation. A full VMS kit comes on a pallet, the documentation taking up around 15 feet of shelf space before the addition of layered products such as compilers, databases, multive...
Big Gray Wall2 is Recent (since VMS version 5) DEC documentation comes with gray binders; under VMS version 4 the binders were orange (`big orange wall'), and under version 3 they were blue. See {VMS}.
big iron is n. Large, expensive, ultra-fast computers. Used generally of {number-crunching} supercomputers such as Crays, but can include more conventional big commercial IBMish mainframes. Term of approval; compare {heavy metal}, oppose {di...
Big Red Switch is [IBM] n. The power switch on a computer, esp. the `Emergency Pull' switch on an IBM {mainframe} or the power switch on an IBM PC where it really is large and red. "This !@%$% {bitty box} is hung again; time to hit the Big Re...
Big Red Switch2 is tune with the company's passion for {TLA}s, this is often acronymized as `BRS' (this has also become established on FidoNet and in the PC {clone} world). It is alleged that the emergency pull switch on an IBM 360/91 actuall...
Big Red Switch3 is power feed; the BRSes on more recent machines physically drop a block into place so that they can't be pushed back in. People get fired for pulling them, especially inappropriately (see also {molly-guard}). Compare {powe...
the Big Room is n. The extremely large room with the blue ceiling and intensely bright light (during the day) or black ceiling with lots of tiny night-lights (during the night) found outside all computer installations. "He can't come to the p...
big win is n. Serendipity. "Yes, those two physicists discovered high-temperature superconductivity in a batch of ceramic that had been prepared incorrectly according to their experimental schedule. Small mistake; big win!" See {win big}.
big-endian is [From Swift's `Gulliver's Travels' via the famous paper `On Holy Wars and a Plea for Peace' by Danny Cohen, USC/ISI IEN 137, dated April 1, 1980] adj. 1. Describes a computer architecture in which, within a given multi-byte numer...
big-endian2 is has the lowest address (the word is stored `big-end-first'). Most processors, including the IBM 370 family, the {PDP-10}, the Motorola microprocessor families, and most of the various RISC designs current in mid-1991, are big...
big-endian3 is {NUXI problem}. 2. An {{Internet address}} the wrong way round. Most of the world follows the Internet standard and writes email addresses starting with the name of the computer and ending up with the name of the country. I...
big-endian4 is decided to do it the other way round before the Internet domain standard was established; e.g., me@uk.ac.wigan.cs. Most gateway sites have {ad-hockery} in their mailers to handle this, but can still be confused. In particular,...
big-endian5 is (domain uk) or Czechoslovakia (domain cs).
bignum is /big'nuhm/ [orig. from MIT MacLISP] n. 1. [techspeak] A multiple-precision computer representation for very large integers. More generally, any very large number. "Have you ever looked at the United States Budget? There's bignums f...
bignum2 is numbers on the dice are called `bignums', especially a roll of double fives or double sixes (compare {moby}, sense 4). See also {El Camino Bignum}. Sense 1 may require some explanation. Most computer languages provide a kind of ...
bignum3 is integers are usually very limited in size; usually they must be smaller than than 2^{31} (2,147,483,648) or (on a losing {bitty box}) 2^{15} (32,768). If you want to work with numbers larger than that, you have to use floating-poin...
bignum4 is six or seven decimal places. Computer languages that provide bignums can perform exact calculations on very large numbers, such as 1000! (the factorial of 1000, which is 1000 times 999 times 998 times ... times 2 times 1).
bigot is n. A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see {religious issues}). Usually found with a specifier; thus, `cray bigot', {ITS bigot}, `APL bigot', `VMS bigot', ...
bigot2 is distinguished from mere partisans or zealots by the fact that they refuse to learn alternatives even when the march of time and/or technology is threatening to obsolete the favored tool. It is said "You can tell a bigot, but you c...
bit is [from the mainstream meaning and `Binary digIT'] n. 1. [techspeak] The unit of information; the amount of information obtained by asking a yes-or-no question for which the two outcomes are equally probable. 2. [techspeak] A computation...
bit2 is values, such as true and false or 0 and 1. 3. A mental flag a reminder that something should be done eventually. "I have a bit set for you." (I haven't seen you for a while, and I'm supposed to tell or ask you something.) 4. More ...
bit3 is of belief. "I have a bit set that says that you were the last guy to hack on EMACS." (Meaning "I think you were the last guy to hack on EMACS, and what I am about to say is predicated on this, so please stop me if this isn't true.")...
bit4 is way of indicating that you intend only a short interruption for a question that can presumably be answered yes or no. A bit is said to be `set' if its value is true or 1, and `reset' or `clear' if its value is false or 0. One spea...
bit5 is or `invert' a bit is to change it, either from 0 to 1 or from 1 to 0. See also {flag}, {trit}, {mode bit}.
bit bang is n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more...
bit bang2 is and output at the same time) is one way to separate the real hackers from the {wannabee}s. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with ...
bit bang3 is instance of the {cycle of reincarnation}, this technique is now (1991) coming back into use on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UA...
bit bashing is n. (alt. `bit diddling' or {bit twiddling}) Term used to describe any of several kinds of low-level programming characterized by manipulation of {bit}, {flag}, {nybble}, and other smaller-than-character-sized pieces of data; the...
bit bashing2 is encryption algorithms, checksum and error-correcting codes, hash functions, some flavors of graphics programming (see {bitblt}), and assembler/compiler code generation. May connote either tedium or a real technical challenge...
bit bashing3 is decoding for the new tape driver looks pretty solid but the bit-bashing for the control registers still has bugs." See also {bit bang}, {mode bit}.
bit bucket is n. 1. The universal data sink (originally, the mythical receptacle used to catch bits when they fall off the end of a register during a shift instruction). Discarded, lost, or destroyed data is said to have `gone to the bit buck...
bit bucket2 is {/dev/null}. Sometimes amplified as `the Great Bit Bucket in the Sky'. 2. The place where all lost mail and news messages eventually go. The selection is performed according to {Finagle's Law}; important mail is much more lik...
bit bucket3 is mail, which has an almost 100% probability of getting delivered. Routing to the bit bucket is automatically performed by mail-transfer agents, news systems, and the lower layers of the network. 3. The ideal location for all un...
bit bucket4 is article to the bit bucket." Such a request is guaranteed to overflow one's mailbox with flames. 4. Excuse for all mail that has not been sent. "I mailed you those figures last week; they must have ended in the bit bucket." Co...
bit bucket5 is in jest. It is based on the fanciful notion that bits are objects that are not destroyed but only misplaced. This appears to have been a mutation of an earlier term `bit box', about which the same legend was current; old-time ...
bit bucket6 is told that when the CPU stored bits into memory it was actually pulling them `out of the bit box'. See also {chad box}. Another variant of this legend has it that, as a consequence of the `parity preservation law', the number ...
bit bucket7 is equal the number of 0 bits. Any imbalance results in bits filling up the bit bucket. A qualified computer technician can empty a full bit bucket as part of scheduled maintenance.
bit decay is n. See {bit rot}. People with a physics background tend to prefer this one for the analogy with particle decay. See also {computron}, {quantum bogodynamics}.
bit rot is n. Also {bit decay}. Hypothetical disease the existence of which has been deduced from the observation that unused programs or features will often stop working after sufficient time has passed, even if `nothing has changed'. The t...
bit rot2 is were radioactive. As time passes, the contents of a file or the code in a program will become increasingly garbled. There actually are physical processes that produce such effects (alpha particles generated by trace radionuclide...
bit rot3 is change the contents of a computer memory unpredictably, and various kinds of subtle media failures can corrupt files in mass storage), but they are quite rare (and computers are built with error-detecting circuitry to compensate ...
bit rot4 is hackers that cosmic rays are among the causes of such events turns out to be a myth; see the {cosmic rays} entry for details. The term {software rot} is almost synonymous. Software rot is the effect, bit rot the notional cause.
bit twiddling is n. 1. (pejorative) An exercise in {tuning} in which incredible amounts of time and effort go to produce little noticeable improvement, often with the result that the code has become incomprehensible. 2. Aimless small modifica...
bit twiddling2 is goal. 3. Approx. syn. for {bit bashing}; esp. used for the act of frobbing the device control register of a peripheral in an attempt to get it back to a known state.
bit-paired keyboard is n. obs. (alt. `bit-shift keyboard') A non-standard keyboard layout that seems to have originated with the Teletype ASR-33 and remained common for several years on early computer equipment. The ASR-33 was a mechanical de...
bit-paired keyboard2 is generate the character codes from keystrokes was by some physical linkage. The design of the ASR-33 assigned each character key a basic pattern that could be modified by flipping bits if the SHIFT or the CTRL key was p...
bit-paired keyboard3 is more of a Rube Goldberg kluge than it already was, the design had to group characters that shared the same basic bit pattern on one key. This is why the characters !"#$%&'() appear where they do on a Teletype (thankfu...
bit-paired keyboard4 is was *not* the weirdest variant of the {QWERTY} layout widely seen, by the way; that prize should probably go to one of several (differing) arrangements on IBM's even clunkier 026 and 029 card punches. When electroni...
bit-paired keyboard5 is there was no agreement in the industry over how the keyboards should be laid out. Some vendors opted to emulate the Teletype keyboard, while others used the flexibility of electronic circuitry to make their product l...
bit-paired keyboard6 is alternatives became known as `bit-paired' and `typewriter-paired' keyboards. To a hacker, the bit-paired keyboard seemed far more logical --- and because most hackers in those days had never learned to touch-type, th...
bit-paired keyboard7 is users to adapt keyboards to the typewriter standard. The doom of the bit-paired keyboard was the large-scale introduction of the computer terminal into the normal office environment, where out-and-out technophobes wer...
bit-paired keyboard8 is `typewriter-paired' standard became universal, `bit-paired' hardware was quickly junked or relegated to dusty corners, and both terms passed into disuse.
bitblt is /bit'blit/ n. [from {BLT}, q.v.] 1. Any of a family of closely related algorithms for moving and copying rectangles of bits between main and display memory on a bit-mapped device, or between two areas of either main or display memory...
bitblt2 is the case of overlapping source and destination rectangles is what makes BitBlt tricky). 2. Synonym for {blit} or {BLT}. Both uses are borderline techspeak.
BITNET is /bit'net/ [acronym Because It's Time NETwork] n. Everybody's least favorite piece of the network (see {network, the}). The BITNET hosts are a collection of IBM dinosaurs and VAXen (the latter with lobotomized comm hardware) that com...
BITNET2 is images (see {eighty-column mind}); thus, they tend to mangle the headers and text of third-party traffic from the rest of the ASCII/RFC-822 world with annoying regularity. BITNET is also notorious as the apparent home of {BIFF}.
bits is n.pl. 1. Information. Examples "I need some bits about file formats." ("I need to know about file formats.") Compare {core dump}, sense 4. 2. Machine-readable representation of a document, specifically as contrasted with paper "I ...
bits2 is does anyone know where I can get the bits?". See {softcopy}, {source of all good bits} See also {bit}.
bitty box is /bit'ee boks/ n. 1. A computer sufficiently small, primitive, or incapable as to cause a hacker acute claustrophobia at the thought of developing software for it. Especially used of small, obsolescent, single-tasking-only persona...
bitty box2 is Sinclair, VIC-20, TRS-80, or IBM PC. 2. [Pejorative] More generally, the opposite of `real computer' (see {Get a real computer!}). See also {mess-dos}, {toaster}, and {toy}.
bixie is /bik'see/ n. Variant {emoticon}s used on BIX (the Byte Information eXchange). The {smiley} bixie is <@_@>, apparently intending to represent two cartoon eyes and a mouth. A few others have been reported.
black art is n. A collection of arcane, unpublished, and (by implication) mostly ad-hoc techniques developed for a particular application or systems area (compare {black magic}). VLSI design and compiler code optimization were (in their begin...
black art2 is art; as theory developed they became {deep magic}, and once standard textbooks had been written, became merely {heavy wizardry}. The huge proliferation of formal and informal channels for spreading around new computer-related ...
black art3 is made both the term `black art' and what it describes less common than formerly. See also {voodoo programming}.
black hole is n. When a piece of email or netnews disappears mysteriously between its origin and destination sites (that is, without returning a {bounce message}) it is commonly said to have `fallen into a black hole'. "I think there's a blac...
black hole2 is site foovax has been dropping a lot of stuff on the floor lately (see {drop on the floor}). The implied metaphor of email as interstellar travel is interesting in itself. Compare {bit bucket}.
black magic is n. A technique that works, though nobody really understands why. More obscure than {voodoo programming}, which may be done by cookbook. Compare also {black art}, {deep magic}, and {magic number} (sense 2).
blast is 1. vt.,n. Synonym for {BLT}, used esp. for large data sends over a network or comm line. Opposite of {snarf}. Usage uncommon. The variant `blat' has been reported. 2. vt. [HP/Apollo] Synonymous with {nuke} (sense 3). Sometimes th...
blast2 is Blast them (y/n)?' would appear in the command window upon logout.
blat is n. 1. Syn. {blast}, sense 1. 2. See {thud}.
bletch is /blech/ [from Yiddish/German `brechen', to vomit, poss. via comic-strip exclamation `blech'] interj. Term of disgust. Often used in "Ugh, bletch". Compare {barf}.
bletcherous is /blech'*-r*s/ adj. Disgusting in design or function; esthetically unappealing. This word is seldom used of people. "This keyboard is bletcherous!" (Perhaps the keys don't work very well, or are misplaced.) See {losing}, {creti...
bletcherous2 is The term {bletcherous} applies to the esthetics of the thing so described; similarly for {cretinous}. By contrast, something that is `losing' or `bagbiting' may be failing to meet objective criteria. See also {bogus} and {r...
bletcherous3 is meaning than any of the above.
blinkenlights is /blink'*n-litz/ n. Front-panel diagnostic lights on a computer, esp. a {dinosaur}. Derives from the last word of the famous blackletter-Gothic sign in mangled pseudo-German that once graced about half the computer rooms i...
blinkenlights2 is in its entirety as follows ACHTUNG! ALLES LOOKENSPEEPERS! Das computermachine ist nicht fuer gefingerpoken und mittengrabben. Ist easy schnappen der springenwerk, blowenfusen und poppencorken ...
blinkenlights3 is bei das dumpkopfen. Das rubbernecken sichtseeren keepen das cotten-pickenen hans in das pockets muss; relaxen und watchen das blinkenlichten. This silliness dates back at least as far as 1959 at Stanford Universit...
blinkenlights4 is early 1960s, when it was reported at London University's ATLAS computing site. There are several variants of it in circulation, some of which actually do end with the word `blinkenlights'. In an amusing example of turnabout...
blinkenlights5 is their own versions of the blinkenlights poster in fractured English, one of which is reproduced here ATTENTION This room is fullfilled mit special electronische equippment. Fingergrabbi...
blinkenlights6 is computers is allowed for die experts only! So all the "lefthanders" stay away and do not disturben the brainstorming von here working intelligencies. Otherwise you will be out thrown and kicked andersw...
blinkenlights7 is astaunished the blinkenlights. See also {geef}.
blit is /blit/ vt. 1. To copy a large array of bits from one part of a computer's memory to another part, particularly when the memory is being used to determine what is shown on a display screen. "The storage allocator picks through the tabl...
blit2 is memory, and then blits it all back down again." See {bitblt}, {BLT}, {dd}, {cat}, {blast}, {snarf}. More generally, to perform some operation (such as toggling) on a large array of bits while moving them. 2. All-capitalized as `BL...
blit3 is designed by Rob Pike at Bell Labs, later commercialized as the AT&T 5620. (The folk etymology from `Bell Labs Intelligent Terminal' is incorrect.)
blitter is /blit'r/ n. A special-purpose chip or hardware system built to perform {blit} operations, esp. used for fast implementation of bit-mapped graphics. The Commodore Amiga and a few other micros have these, but in 1991 the trend is awa...
blitter2 is reincarnation}). Syn. {raster blaster}.
blivet is /bliv'*t/ [allegedly from a World War II military term meaning "ten pounds of manure in a five-pound bag"] n. 1. An intractable problem. 2. A crucial piece of hardware that can't be fixed or replaced if it breaks. 3. A tool that ha...
blivet2 is programmers that it has become an unmaintainable tissue of hacks. 4. An out-of-control but unkillable development effort. 5. An embarrassing bug that pops up during a customer demo. This term has other meanings in other technica...
blivet3 is hardware engineers of various kinds it seems to mean any random object of unknown purpose (similar to hackish use of {frob}). It has also been used to describe an amusing trick-the-eye drawing resembling a three-pronged fork that ...
blivet4 is until one realizes that the parts fit together in an impossible way.
block is [from process scheduling terminology in OS theory] 1. vi. To delay or sit idle while waiting for something. "We're blocking until everyone gets here." Compare {busy-wait}. 2. `block on' vt. To block, waiting for (something). "Lunc...
block transfer computations is n. From the television series "Dr. Who", in which it referred to computations so fiendishly subtle and complex that they could not be performed by machines. Used to refer to any task that should be expressible as...
factpacks/jargon-split.fact view on Meta::CPAN
bug6 is Panel F (moth) in relay. First actual case of bug being found". This wording seems to establish that the term was already in use at the time in its current specific sense. Indeed, the use of `bug' to mean an industrial defect was al...
bug7 is and `bug' in the sense of an disruptive event goes back to Shakespeare! In the first edition of Samuel Johnson's dictionary one meaning of `bug' is "A frightful object; a walking spectre"; this is traced to `bugbear', a Welsh term for...
bug8 is complete the circle) has recently been reintroduced into the popular lexicon through fantasy role-playing games. In any case, in jargon the word almost never refers to insects. Here is a plausible conversation that never actually hap...
bug9 is "What do you mean? I don't see any ants in it." "That's the bug." [There has been a widespread myth that the original bug was moved to the Smithsonian, and an earlier version of this entry so asserted. A correspondent who thought t...
bug10 is there. While investigating this, your editor discovered that the NSWC still had the bug, but had unsuccessfully tried to get the Smithsonian to accept it --- and that the present curator of the History of American Technology Museum d...
bug11 is a worthwhile exhibit. Thus, the process of investigating the original-computer-bug bug may have fixed it in an entirely unexpected way, by making the myth true! --- ESR]
bug-compatible is adj. Said of a design or revision that has been badly compromised by a requirement to be compatible with {fossil}s or {misfeature}s in other programs or (esp.) previous releases of itself. "MS-DOS 2.0 used \ as a path separ...
bug-compatible2 is choice of / as an option character in 1.0."
bug-for-bug compatible is n. Same as {bug-compatible}, with the additional implication that much tedious effort went into ensuring that each (known) bug was replicated.
buglix is /buhg'liks/ n. Pejorative term referring to DEC's ULTRIX operating system in its earlier *severely* buggy versions. Still used to describe ULTRIX, but without venom. Compare {HP-SUX}.
bulletproof is adj. Used of an algorithm or implementation considered extremely {robust}; lossage-resistant; capable of correctly recovering from any imaginable exception condition. This is a rare and valued quality. Syn. {armor-plated}.
bum is 1. vt. To make highly efficient, either in time or space, often at the expense of clarity. "I managed to bum three more instructions out of that code." "I spent half the night bumming the interrupt code." 2. To squeeze out excess; to...
bum2 is whatever it was removed from (without changing function; this distinguishes the process from a {featurectomy}). 3. n. A small change to an algorithm, program, or hardware device to make it more efficient. "This hardware bum makes t...
bum3 is uncommon, largely superseded by v. {tune} (and n. {tweak}, {hack}), though none of these exactly capture sense 2. All these uses are rare in Commonwealth hackish, because in the parent dialects of English `bum' is a rude synonym for...
bump is vt. Synonym for increment. Has the same meaning as C's ++ operator. Used esp. of counter variables, pointers, and index dummies in `for', `while', and `do-while' loops.
burble is [from Lewis Carroll's "Jabberwocky"] v. Like {flame}, but connotes that the source is truly clueless and ineffectual (mere flamers can be competent). A term of deep contempt. "There's some guy on the phone burbling about how he got ...
buried treasure is n. A surprising piece of code found in some program. While usually not wrong, it tends to vary from {crufty} to {bletcherous}, and has lain undiscovered only because it was functionally correct, however horrible it is. Use...
buried treasure2 is anything *but* treasure. Buried treasure almost always needs to be dug up and removed. "I just found that the scheduler sorts its queue using {bubble sort}! Buried treasure!"
burn-in period is n. 1. A factory test designed to catch systems with {marginal} components before they get out the door; the theory is that burn-in will protect customers by outwaiting the steepest part of the {bathtub curve} (see {infant m...
burn-in period2 is length in which a person using a computer is so intensely involved in his project that he forgets basic needs such as food, drink, sleep, etc. Warning Excessive burn-in can lead to burn-out. See {hack mode}, {larval stag...
burst page is n. Syn. {banner}, sense 1.
busy-wait is vi. Used of human behavior, conveys that the subject is busy waiting for someone or something, intends to move instantly as soon as it shows up, and thus cannot do anything else at the moment. "Can't talk now, I'm busy-waiting ti...
busy-wait2 is `busy-wait' means to wait on an event by {spin}ning through a tight or timed-delay loop that polls for the event on each pass, as opposed to setting up an interrupt handler and continuing execution on another part of the task. T...
busy-wait3 is time-sharing systems where a busy-waiting program may {hog} the processor.
buzz is vi. 1. Of a program, to run with no indication of progress and perhaps without guarantee of ever finishing; esp. said of programs thought to be executing tight loops of code. A program that is buzzing appears to be {catatonic}, but yo...
buzz2 is buzzing loop may eventually end of its own accord. "The program buzzes for about 10 seconds trying to sort all the names into order." See {spin}; see also {grovel}. 2. [ETA Systems] To test a wire or printed circuit trace for cont...
buzz3 is Some wire faults will pass DC tests but fail a buzz test. 3. To process an array or list in sequence, doing the same thing to each element. "This loop buzzes through the tz array looking for a terminator type."
BWQ is /B-W-Q/ [IBM acronym, `Buzz Word Quotient'] The percentage of buzzwords in a speech or documents. Usually roughly proportional to {bogosity}. See {TLA}.
by hand is adv. Said of an operation (especially a repetitive, trivial, and/or tedious one) that ought to be performed automatically by the computer, but which a hacker instead has to step tediously through. "My mailer doesn't have a command ...
by hand2 is replying to, so I have to do it by hand." This does not necessarily mean the speaker has to retype a copy of the message; it might refer to, say, dropping into a {subshell} from the mailer, making a copy of one's mailbox file, r...
by hand3 is and bottom of the message in question, deleting the rest of the file, inserting `>' characters on each line, writing the file, leaving the editor, returning to the mailer, reading the file in, and later remembering to delete the ...
byte is /bit/ [techspeak] n. A unit of memory or data equal to the amount used to represent one character; on modern architectures this is usually 8 bits, but may be 9 on 36-bit machines. Some older architectures used `byte' for quantities of...
byte2 is `bytes' that were actually bitfields of 1 to 36 bits! These usages are now obsolete, and even 9-bit bytes have become rare in the general trend toward power-of-2 word sizes. Historical note The term originated in 1956 during the earl...
byte3 is originally it was described as 1 to 6 bits (typical I/O equipment of the period used 6-bit chunks of information). The move to an 8-bit byte happened in late 1956, and this size was later adopted and promulgated as a standard by th...
byte4 is mutating the word `bite' so it would not be accidentally misspelled as {bit}. See also {nybble}.
bytesexual is /bit`sek'shu-*l/ adj. Said of hardware, denotes willingness to compute or pass data in either {big-endian} or {little-endian} format (depending, presumably, on a {mode bit} somewhere). See also {NUXI problem}.*C n. 1. The third ...
bytesexual2 is 1000011. 3. The name of a programming language designed by Dennis Ritchie during the early 1970s and immediately used to reimplement {{UNIX}}. So called because many features derived from an earlier compiler named `B' in comme...
bytesexual3 is Stroustrup settled the question by designing C++, there was a humorous debate over whether C's successor should be named `D' or `P'. C became immensely popular outside Bell Labs after about 1980 and is now the dominant langua...
bytesexual4 is programming. See also {languages of choice}, {indent style}. C is often described, with a mixture of fondness and disdain varying according to the speaker, as "a language that combines all the elegance and power of assembly la...
bytesexual5 is maintainability of assembly language".
calculator is [Cambridge] n. Syn. for {bitty box}.
can is vt. To abort a job on a time-sharing system. Used esp. when the person doing the deed is an operator, as in "canned from the {{console}}". Frequently used in an imperative sense, as in "Can that print job, the LPT just popped a sprock...
can2 is that the ASCII character with mnemonic CAN (0011000) was used as a kill-job character on some early OSes.
canonical is [historically, `according to religious law'] adj. The usual or standard state or manner of something. This word has a somewhat more technical meaning in mathematics. Two formulas such as 9 + x and x + 9 are said to be equivalent...
canonical2 is second one is in `canonical form' because it is written in the usual way, with the highest power of x first. Usually there are fixed rules you can use to decide whether something is in canonical form. The jargon meaning, a re...
canonical3 is present loading in computer-science culture largely through its prominence in Alonzo Church's work in computation theory and mathematical logic (see {Knights of the Lambda Calculus}). Compare {vanilla}. This word has an inter...
canonical4 is not use the adjective `canonical' in any of the senses defined above with any regularity; they do however use the nouns `canon' and `canonicity' (not *canonicalness or *canonicality). The `canon' of a given author is the complete...
canonical5 is usage is familiar to Sherlock Holmes fans as well as to literary scholars). `*The* canon' is the body of works in a given field (e.g., works of literature, or of art, or of music) deemed worthwhile for students to study and for ...
canonical6 is non-techspeak academic usages derive ultimately from the historical meaning, specifically the classification of the books of the Bible into two groups by Christian theologians. The `canonical' books were the ones widely accepted...
canonical7 is authority. The `deuterocanonical' books (literally `secondarily canonical'; also known as the `Apochrypha') were held to be of lesser authority --- indeed they have been held in such low esteem that to this day they are omitte...
canonical8 is this term with a playfulness that makes an ironic contrast with its historical meaning. A true story One Bob Sjoberg, new at the MIT AI Lab, expressed some annoyance at the use of jargon. Over his loud objections, GLS and RMS m...
canonical9 is in his presence, and eventually it began to sink in. Finally, in one conversation, he used the word `canonical' in jargon-like fashion without thinking. Steele "Aha! We've finally got you talking jargon too!" Stallman "What...
canonical10 is `canonical' in the canonical way." Of course, canonicality depends on context, but it is implicitly defined as the way *hackers* normally expect things to be. Thus, a hacker may claim with a straight face that `according to ...
card is n. 1. An electronic printed-circuit board (see also {tall card}, {short card}. 2. obs. Syn. {{punched card}}.
card walloper is n. An EDP programmer who grinds out batch programs that do stupid things like print people's paychecks. Compare {code grinder}. See also {{punched card}}, {eighty-column mind}.
careware is /keir'weir/ n. {Shareware} for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge. Syn. {charityware}; compare {cripplewa...
cargo cult programming is n. A style of (incompetent) programming dominated by ritual inclusion of code or program structures that serve no real purpose. A cargo cult programmer will usually explain the extra code as a way of working around s...
cargo cult programming2 is neither the bug nor the reason the code apparently avoided the bug was ever fully understood (compare {shotgun debugging}, {voodoo programming}). The term `cargo cult' is a reference to aboriginal religions that gr...
cargo cult programming3 is The practices of these cults center on building elaborate mockups of airplanes and military style landing strips in the hope of bringing the return of the god-like airplanes that brought such marvelous cargo during t...
cargo cult programming4 is Richard Feynman's characterization of certain practices as "cargo cult science" in his book `Surely You're Joking, Mr. Feynman' (W. W. Norton & Co, New York 1985, ISBN 0-393-01921-7).
case and paste is [from `cut and paste'] n. 1. The addition of a new {feature} to an existing system by selecting the code from an existing feature and pasting it in with minor changes. Common in telephony circles because most operations in a...
case and paste2 is statements. Leads to {software bloat}. In some circles of EMACS users this is called `programming by Meta-W', because Meta-W is the EMACS command for copying a block of text to a kill buffer in preparation to pasting it in ...
case and paste3 is implying that the programmer is acting mindlessly rather than thinking carefully about what is required to integrate the code for two similar cases.
casters-up mode is [IBM] n. Yet another synonym for `broken' or `down'.
casting the runes is n. What a {guru} does when you ask him or her to run a particular program and type at it because it never works for anyone else; esp. used when nobody can ever see what the guru is doing different from what J. Random Luser...
casting the runes2 is {examining the entrails}; also see the AI koan about Tom Knight in appendix A.
cat is [from `catenate' via {{UNIX}} `cat(1)'] vt. 1. [techspeak] To spew an entire file to the screen or some other output sink without pause. 2. By extension, to dump large amounts of data at an unprepared target or with no intention of bro...
cat2 is Rare outside UNIX sites. See also {dd}, {BLT}. Among UNIX fans, `cat(1)' is considered an excellent example of user-interface design, because it outputs the file contents without such verbosity as spacing or headers between the fil...
cat3 is to consist of lines of text, but works with any sort of data. Among UNIX-haters, `cat(1)' is considered the {canonical} example of *bad* user-interface design. This because it is more often used to {blast} a file to standard output ...
cat4 is `cat' for the former operation is just as unintuitive as, say, LISP's {cdr}. Of such oppositions are {holy wars} made....
catatonic is adj. Describes a condition of suspended animation in which something is so {wedged} or {hung} that it makes no response. If you are typing on a terminal and suddenly the computer doesn't even echo the letters back to the screen a...
catatonic2 is it to do, then the computer is suffering from catatonia (possibly because it has crashed). "There I was in the middle of a winning game of {nethack} and it went catatonic on me! Aaargh!" Compare {buzz}.
cdr is /ku'dr/ or /kuh'dr/ [from LISP] vt. To skip past the first item from a list of things (generalized from the LISP operation on binary tree structures, which returns a list consisting of all but the first element of its argument). In the...
cdr2 is elements "Shall we cdr down the agenda?" Usage silly. See also {loop through}. Historical note The instruction format of the IBM 7090 that hosted the original LISP implementation featured two 15-bit fields called the `address' and...
cdr3 is originally `Contents of Decrement part of Register'. Similarly, `car' stood for `Contents of Address part of Register'. The cdr and car operations have since become bases for formation of compound metaphors in non-LISP contexts. GL...
cdr4 is in which strings were represented as linked lists; the get-character and skip-character operations were of course called CHAR and CHDR.
chad is /chad/ n. 1. The perforated edge strips on printer paper, after they have been separated from the printed portion. Also called {selvage} and {perf}. 2. obs. The confetti-like paper bits punched out of cards or paper tape; this was al...
chad2 is `keypunch droppings'. Historical note One correspondent believes `chad' (sense 2) derives from the Chadless keypunch (named for its inventor), which cut little u-shaped tabs in the card to make a hole when the tab folded back, rathe...
chad3 is clear that if the Chadless keypunch didn't make them, then the stuff that other keypunches made had to be `chad'.
chad box is n. {Iron Age} card punches contained boxes inside them, about the size of a lunchbox (or in some models a large wastebasket), that held the {chad} (sense 2). You had to open the covers of the card punch periodically and empty the ...
chad box2 is the equivalent device in the CPU enclosure, which was typically across the room in another great gray-and-blue box.
chain is [orig. from BASIC's `CHAIN' statement] vi. To hand off execution to a child or successor without going through the {OS} command interpreter that invoked it. The state of the parent program is lost and there is no returning to it. Th...
chain2 is memory-limited micros and is still widely supported for backward compatibility, the jargon usage is semi-obsolescent; in particular, most UNIX programmers will think of this as an {exec}. Oppose the more modern {subshell}.
char is /keir/ or /char/; rarely, /kar/ n. Shorthand for `character'. Esp. used by C programmers, as `char' is C's typename for character data.
charityware is /char'it-ee-weir`/ n. Syn. {careware}.
chase pointers is 1. vi. To go through multiple levels of indirection, as in traversing a linked list or graph structure. Used esp. by programmers in C, where explicit pointers are a very common data type. This is techspeak, but it remains ja...
chase pointers2 is chasing pointers. Bob said you could tell me who to talk to about...." See {dangling pointer} and {snap}. 2. [Cambridge] `pointer chase' or `pointer hunt' The process of going through a dump (interactively or on a large ...
chase pointers3 is following dynamic data-structures. Used only in a debugging context.
chemist is [Cambridge] n. Someone who wastes computer time on {number-crunching} when you'd far rather the machine were doing something more productive, such as working out anagrams of your name or printing Snoopy calendars or running {life} p...
chemist2 is actually studies chemistry.
Chernobyl chicken is n. See {laser chicken}.
Chernobyl packet is /cher-noh'b*l pak'*t/ n. A network packet that induces {network meltdown} (the result of a {broadcast storm}), in memory of the 1987 nuclear accident at Chernobyl in the Ukraine. The typical case of this is an IP Ethernet d...
Chernobyl packet2 is both source and destination Ether and IP address set as the respective broadcast addresses for the subnetworks being gated between. Compare {Christmas tree packet}.
chicken head is [Commodore] n. The Commodore Business Machines logo, which strongly resembles a poultry part. Rendered in ASCII as `C='. With the arguable exception of the Amiga (see {amoeba}), Commodore's machines are notoriously crocky lit...
chicken head2 is Thus, this usage may owe something to Philip K. Dick's novel `Do Androids Dream of Electric Sheep?' (the basis for the movie `Blade Runner'), in which a `chickenhead' is a mutant with below-average intelligence.
chiclet keyboard is n. A keyboard with small rectangular or lozenge-shaped rubber or plastic keys that look like pieces of chewing gum. (Chiclets is the brand name of a variety of chewing gum that does in fact resemble the keys of chiclet key...
chiclet keyboard2 is IBM PCjr keyboard. Vendors unanimously liked these because they were cheap, and a lot of early portable and laptop products got launched using them. Customers rejected the idea with almost equal unanimity, and chiclets a...
chine nual is /sheen'yu-*l/ [MIT] n.,obs. The Lisp Machine Manual, so called because the title was wrapped around the cover so only those letters showed on the front.
Chinese Army technique is n. Syn. {Mongolian Hordes technique}.
choke is v. To reject input, often ungracefully. "Nuls make System V's `lpr(1)' choke." "I tried building an {EMACS} binary to use {X}, but `cpp(1)' choked on all those `#define's." See {barf}, {gag}, {vi}.
chomp is vi. To {lose}; specifically, to chew on something of which more was bitten off than one can. Probably related to gnashing of teeth. See {bagbiter}. A hand gesture commonly accompanies this. To perform it, hold the four fingers t...
chomp2 is tips. Now open and close your hand rapidly to suggest a biting action (much like what Pac-Man does in the classic video game, though this pantomime seems to predate that). The gesture alone means `chomp chomp' (see Verb Doubling ...
chomp3 is Prependices). The hand may be pointed at the object of complaint, and for real emphasis you can use both hands at once. Doing this to a person is equivalent to saying "You chomper!" If you point the gesture at yourself, it is a hu...
chomp4 is You might do this if someone told you that a program you had written had failed in some surprising way and you felt dumb for not having anticipated it.
chomper is n. Someone or something that is chomping; a loser. See {loser}, {bagbiter}, {chomp}.
Christmas tree is n. A kind of RS-232 line tester or breakout box featuring rows of blinking red and green LEDs suggestive of Christmas lights.
Christmas tree packet is n. A packet with every single option set for whatever protocol is in use. See {kamikaze packet}, {Chernobyl packet}. (The term doubtless derives from a fanciful image of each little option bit being represented by a ...
chrome is [from automotive slang via wargaming] n. Showy features added to attract users but contributing little or nothing to the power of a system. "The 3D icons in Motif are just chrome, but they certainly are *pretty* chrome!" Distinguis...
chrome2 is that the latter are usually added to gratify developers' own desires for featurefulness. Often used as a term of contempt.
chug is vi. To run slowly; to {grind} or {grovel}. "The disk is chugging like crazy."
Church of the SubGenius is n. A mutant offshoot of {Discordianism} launched in 1981 as a spoof of fundamentalist Christianity by the `Reverend' Ivan Stang, a brilliant satirist with a gift for promotion. Popular among hackers as a rich source...
Church of the SubGenius2 is "Bob" the divine drilling-equipment salesman, the Benevolent Space Xists, and the Stark Fist of Removal. Much SubGenius theory is concerned with the acquisition of the mystical substance or quality of `slack'.
Cinderella Book is [CMU] n. `Introduction to Automata Theory, Languages, and Computation', by John Hopcroft and Jeffrey Ullman, (Addison-Wesley, 1979). So called because the cover depicts a girl (putatively Cinderella) sitting in front of a R...
Cinderella Book2 is coming out of it. The back cover depicts the girl with the device in shambles after she has pulled on the rope. See also {{book titles}}.
CI$ is // n. Hackerism for `CIS', CompuServe Information Service. The dollar sign refers to CompuServe's rather steep line charges. Often used in {sig block}s just before a CompuServe address. Syn. {Compu$erve}.
Classic C is /klas'ik C/ [a play on `Coke Classic'] n. The C programming language as defined in the first edition of {K&R}, with some small additions. It is also known as `K&R C'. The name came into use while C was being standardized by the ...
Classic C2 is This is sometimes applied elsewhere thus, `X Classic', where X = Star Trek (referring to the original TV series) or X = PC (referring to IBM's ISA-bus machines as opposed to the PS/2 series). This construction is especially us...
Classic C3 is versions are considered serious losers relative to the older ones.
clean is 1. adj. Used of hardware or software designs, implies `elegance in the small', that is, a design or implementation that may not hold any surprises but does things in a way that is reasonably intuitive and relatively easy to comprehend...
clean2 is or {crufty}. 2. v. To remove unneeded or undesired files in a effort to reduce clutter "I'm cleaning up my account." "I cleaned up the garbage and now have 100 Meg free on that partition."
CLM is /C-L-M/ [Sun `Career Limiting Move'] 1. n. An action endangering one's future prospects of getting plum projects and raises, and possibly one's job "His Halloween costume was a parody of his manager. He won the prize for `best CLM'." ...
factpacks/jargon-split.fact view on Meta::CPAN
gensym is /jen'sim/ [from MacLISP for `generated symbol'] 1. v. To invent a new name for something temporary, in such a way that the name is almost certainly not in conflict with one already in use. 2. n. The resulting name. The canonical f...
gensym2 is represents a number; any LISP hacker would recognize G0093 (for example) as a gensym. 3. A freshly generated data structure with a gensymmed name. These are useful for storing or uniquely identifying crufties (see {cruft}).
Get a life! is imp. Hacker-standard way of suggesting that the person to whom you are speaking has succumbed to terminal geekdom (see {computer geek}). Often heard on {USENET}, esp. as a way of suggesting that the target is taking some obscur...
Get a life!2 is exhortation was popularized by William Shatner on a "Saturday Night Live" episode in a speech that ended "Get a *life*!", but some respondents believe it to have been in use before then.
Get a real computer! is imp. Typical hacker response to news that somebody is having trouble getting work done on a system that (a) is single-tasking, (b) has no hard disk, or (c) has an address space smaller than 4 megabytes. This is as of m...
Get a real computer!2 is computer' rises with time, and it may well be (for example) that machines with character-only displays will be generally considered `unreal' in a few years (GLS points out that they already are in some circles). See {...
GFR is /G-F-R/ vt. [ITS] From `Grim File Reaper', an ITS and Lisp Machine utility. To remove a file or files according to some program-automated or semi-automatic manual procedure, especially one designed to reclaim mass storage space or redu...
GFR2 is actually moved files to tape). Often generalized to pieces of data below file level. "I used to have his phone number, but I guess I {GFR}ed it." See also {prowler}, {reaper}. Compare {GC}, which discards only provably worthless ...
gig is /jig/ or /gig/ [SI] n. See {{quantifiers}}.
giga- is /ji'ga/ or /gi'ga/ [SI] pref. See {{quantifiers}}.
GIGO is /gi'goh/ [acronym] 1. `Garbage In, Garbage Out' --- usually said in response to {luser}s who complain that a program didn't complain about faulty data. Also commonly used to describe failures in human decision making due to faulty, in...
GIGO2 is In, Gospel Out' this more recent expansion is a sardonic comment on the tendency human beings have to put excessive trust in `computerized' data.
gillion is /gil'y*n/ or /jil'y*n/ [formed from {giga-} by analogy with mega/million and tera/trillion] n. 10^9. Same as an American billion or a British `milliard'. How one pronounces this depends on whether one speaks {giga-} with a hard or ...
GIPS is /gips/ or /jips/ [analogy with {MIPS}] n. Giga-Instructions per Second (also possibly `Gillions of Instructions per Second'; see {gillion}). In 1991, this is used of only a handful of highly parallel machines, but this is expected t...
glark is /glark/ vt. To figure something out from context. "The System III manuals are pretty poor, but you can generally glark the meaning from context." Interestingly, the word was originally `glork'; the context was "This gubblick contain...
glark2 is the overall pluggandisp can be glorked [sic] from context" (David Moser, quoted by Douglas Hofstadter in his "Metamagical Themas" column in the January 1981 `Scientific American'). It is conjectured that hackish usage mutated the ve...
glark3 is established jargon term. Compare {grok}, {zen}.
glass is [IBM] n. Synonym for {silicon}.
glass tty is /glas T-T-Y/ or /glas ti'tee/ n. A terminal that has a display screen but which, because of hardware or software limitations, behaves like a teletype or some other printing terminal, thereby combining the disadvantages of both lik...
glass tty2 is display hacks, and like a display terminal, it doesn't produce hard copy. An example is the early `dumb' version of Lear-Siegler ADM 3 (without cursor control). See {tube}, {tty}. See appendix A for an interesting true story...
glassfet is /glas'fet/ [by analogy with MOSFET, the acronym for `Metal-Oxide-Semiconductor Field-Effect Transistor'] n. Syn. {firebottle}, a humorous way to refer to a vacuum tube.
glitch is /glich/ [from German `glitschen' to slip, via Yiddish `glitshen', to slide or skid] 1. n. A sudden interruption in electric service, sanity, continuity, or program function. Sometimes recoverable. An interruption in electric service...
glitch2 is This is of grave concern because it usually crashes all the computers. In jargon, though, a hacker who got to the middle of a sentence and then forgot how he or she intended to complete it might say, "Sorry, I just glitched". 2....
glitch3 is [Stanford] To scroll a display screen, esp. several lines at a time. {{WAITS}} terminals used to do this in order to avoid continuous scrolling, which is distracting to the eye. 4. obs. Same as {magic cookie}, sense 2. All the...
glitch4 is technical meaning the term has to hardware people. If the inputs of a circuit change, and the outputs change to some {random} value for some very brief time before they settle down to the correct value, then that is called a glit...
glitch5 is depending on what the circuit is connected to. This term is techspeak, found in electronics texts.
glob is /glob/, *not* /glohb/ [UNIX] vt.,n. To expand special characters in a wildcarded name, or the act of so doing (the action is also called `globbing'). The UNIX conventions for filename wildcarding have become sufficiently pervasive tha...
glob2 is English, especially in email or news on technical topics. Those commonly encountered include the following * wildcard for any string (see also {UN*X}) ? wildcard for any character (generally read this way only...
glob3 is a word) [] delimits a wildcard matching any of the enclosed characters {} alternation of comma-separated alternatives; thus, `foo{baz,qux}' would be read as `foobaz' or `fooqux' Some examples "He said hi...
glob4 is "I don't read talk.politics.*" (any of the talk.politics subgroups on {USENET}). Other examples are given under the entry for {X}. Compare {regexp}. Historical note The jargon usage derives from `glob', the name of a subprogram th...
glob5 is versions of the UNIX shell.
glork is /glork/ 1. interj. Term of mild surprise, usually tinged with outrage, as when one attempts to save the results of 2 hours of editing and finds that the system has just crashed. 2. Used as a name for just about anything. See {foo}. ...
glork2 is used reflexively. "My program just glorked itself." See also {glark}.
glue is n. Generic term for any interface logic or protocol that connects two component blocks. For example, {Blue Glue} is IBM's SNA protocol, and hardware designers call anything used to connect large VLSI's or circuit blocks `glue logic'.
gnarly is /nar'lee/ adj. Both {obscure} and {hairy} in the sense of complex. "{Yow}! --- the tuned assembler implementation of BitBlt is really gnarly!" From a similar but less specific usage in surfer slang.
GNU is /gnoo/, *not* /noo/ 1. [acronym `GNU's Not UNIX!', see {{recursive acronym}}] A UNIX-workalike development effort of the Free Software Foundation headed by Richard Stallman (rms@gnu.ai.mit.edu). GNU EMACS and the GNU C compiler, two to...
GNU2 is very popular in hackerdom and elsewhere. The GNU project was designed partly to proselytize for RMS's position that information is community property and all software source should be shared. One of its slogans is "Help stamp out s...
GNU3 is controversial (because it implicitly denies any right of designers to own, assign, and sell the results of their labors), many hackers who disagree with RMS have nevertheless cooperated to produce large amounts of high-quality softwa...
GNU4 is Software Foundation's imprimatur. See {EMACS}, {copyleft}, {General Public Virus}. 2. Noted UNIX hacker John Gilmore (gnu@toad.com), founder of USENET's anarchic alt.* hierarchy.
GNUMACS is /gnoo'maks/ [contraction of `GNU EMACS'] Often-heard abbreviated name for the {GNU} project's flagship tool, {EMACS}. Used esp. in contrast with {GOSMACS}.
go flatline is [from cyberpunk SF, refers to flattening of EEG traces upon brain-death] vi., also adjectival `flatlined'. 1. To die, terminate, or fail, esp. irreversibly. In hacker parlance, this is used of machines only, human death being c...
go flatline2 is employ jargon-jokes. 2. To go completely quiescent; said of machines undergoing controlled shutdown. "You can suffer file damage if you shut down UNIX but power off before the system has gone flatline." 3. Of a video tube, t...
go flatline3 is sees is a bright horizontal line bisecting the screen.
go root is [UNIX] vi. To temporarily enter {root mode} in order to perform a privileged operation. This use is deprecated in Australia, where v. `root' refers to animal sex.
go-faster stripes is [UK] Syn. {chrome}.
gobble is vt. To consume or to obtain. The phrase `gobble up' tends to imply `consume', while `gobble down' tends to imply `obtain'. "The output spy gobbles characters out of a {tty} output buffer." "I guess I'll gobble down a copy of the doc...
Godzillagram is /god-zil'*-gram/ n. [from Japan's national hero] 1. A network packet that in theory is a broadcast to every machine in the universe. The typical case of this is an IP datagram whose destination IP address is [255.255.255.255]....
Godzillagram2 is enough to attempt to implement this! 2. A network packet of maximum size. An IP Godzillagram has 65,536 octets.
golden is adj. [prob. from folklore's `golden egg'] When used to describe a magnetic medium (e.g., `golden disk', `golden tape'), describes one containing a tested, up-to-spec, ready-to-ship software version. Compare {platinum-iridium}.
golf-ball printer is n. The IBM 2741, a slow but letter-quality printing device and terminal based on the IBM Selectric typewriter. The `golf ball' was a round object bearing reversed embossed images of 88 different characters arranged on four...
golf-ball printer2 is font by swapping in a different golf ball. This was the technology that enabled APL to use a non-EBCDIC, non-ASCII, and in fact completely non-standard character set. This put it 10 years ahead of its time --- where it ...
golf-ball printer3 is character displays gave way to programmable bit-mapped devices with the flexibility to support other character sets.
gonk is /gonk/ vt.,n. 1. To prevaricate or to embellish the truth beyond any reasonable recognition. It is alleged that in German the term is (mythically) `gonken'; in Spanish the verb becomes `gonkar'. "You're gonking me. That story you ju...
gonk2 is for example, "Du gonkst mir" (You're pulling my leg). See also {gonkulator}. 2. [British] To grab some sleep at an odd time; compare {gronk out}.
gonkulator is /gon'kyoo-lay-tr/ [from the old "Hogan's Heroes" TV series] n. A pretentious piece of equipment that actually serves no useful purpose. Usually used to describe one's least favorite piece of computer hardware. See {gonk}.
gonzo is /gon'zoh/ [from Hunter S. Thompson] adj. Overwhelming; outrageous; over the top; very large, esp. used of collections of source code, source files, or individual functions. Has some of the connotations of {moby} and {hairy}, but with...
Good Thing is n.,adj. Often capitalized; always pronounced as if capitalized. 1. Self-evidently wonderful to anyone in a position to notice "The Trailblazer's 19.2Kbaud PEP mode with on-the-fly Lempel-Ziv compression is a Good Thing for sites...
Good Thing2 is possibly have any ill side-effects and may save considerable grief later "Removing the self-modifying code from that shared library would be a Good Thing." 3. When said of software tools or libraries, as in "YACC is a Good Th...
Good Thing3 is drastically reduced a programmer's work load. Oppose {Bad Thing}.
gorilla arm is n. The side-effect that destroyed touch-screens as a mainstream input technology despite a promising start in the early 1980s. It seems the designers of all those {spiffy} touch-menu systems failed to notice that humans aren't ...
gorilla arm2 is their faces making small motions. After more than a very few selections, the arm begins to feel sore, cramped, and oversized; hence `gorilla arm'. This is now considered a classic cautionary tale to human-factors designers; "...
gorilla arm3 is "How is this going to fly in *real* use?".
gorp is /gorp/ [CMU perhaps from the canonical hiker's food, Good Old Raisins and Peanuts] Another metasyntactic variable, like {foo} and {bar}.
GOSMACS is /goz'maks/ [contraction of `Gosling EMACS'] n. The first {EMACS}-in-C implementation, predating but now largely eclipsed by {GNUMACS}. Originally freeware; a commercial version is now modestly popular as `UniPress EMACS'. The auth...
Gosperism is /gos'p*r-izm/ A hack, invention, or saying by arch-hacker R. William (Bill) Gosper. This notion merits its own term because there are so many of them. Many of the entries in {HAKMEM} are Gosperisms; see also {life}.
gotcha is n. A {misfeature} of a system, especially a programming language or environment, that tends to breed bugs or mistakes because it behaves in an unexpected way. For example, a classic gotcha in {C} is the fact that `if (a=b) {code;}' ...
gotcha2 is correct. It puts the value of `b' into `a' and then executes `code' if `a' is non-zero. What the programmer probably meant was `if (a==b) {code;}', which executes `code' if `a' and `b' are equal.
GPL is /G-P-L/ n. Abbrev. for `General Public License' in widespread use; see {copyleft}.
GPV is /G-P-V/ n. Abbrev. for {General Public Virus} in widespread use.
grault is /grawlt/ n. Yet another meta-syntactic variable, invented by Mike Gallaher and propagated by the {GOSMACS} documentation. See {corge}.
gray goo is n. A hypothetical substance composed of {sagan}s of sub-micron-sized self-replicating robots programmed to make copies of themselves out of whatever is available. The image that goes with the term is one of the entire biosphere of...
gray goo2 is goo. This is the simplest of the {{nanotechnology}} disaster scenarios, easily refuted by arguments from energy requirements and elemental abundances. Compare {blue goo}.
Great Renaming is n. The {flag day} on which all of the non-local groups on the {USENET} had their names changed from the net.- format to the current multiple-hierarchies scheme.
Great Runes is n. Uppercase-only text or display messages. Some archaic operating systems still emit these. See also {runes}, {smash case}, {fold case}. Decades ago, back in the days when it was the sole supplier of long-distance hardcopy ...
Great Runes2 is Corporation was faced with a major design choice. To shorten code lengths and cut complexity in the printing mechanism, it had been decided that teletypes would use a monocase font, either ALL UPPER or all lower. The question...
Great Runes3 is conducted on readability under various conditions of bad ribbon, worn print hammers, etc. Lowercase won; it is less dense and has more distinctive letterforms, and is thus much easier to read both under ideal conditions and wh...
Great Runes4 is obscured. The results were filtered up through {management}. The chairman of Teletype killed the proposal because it failed one incredibly important criterion "It would be impossible to spell the name of the Deity correctly....
Great Runes5 is folklore has it) superstition triumphed over utility. Teletypes were the major input devices on most early computers, and terminal manufacturers looking for corners to cut naturally followed suit until well into the 1970s. T...
Great Runes6 is Runes for thirty years.
great-wall is [from SF fandom] vi.,n. A mass expedition to an oriental restaurant, esp. one where food is served family-style and shared. There is a common heuristic about the amount of food to order, expressed as "Get N - 1 entrees"; the val...
great-wall2 is the group, can be inferred from context (see {N}). See {{oriental food}}, {ravs}, {stir-fried random}.
Green Book is n. 1. One of the three standard PostScript references `PostScript Language Program Design', bylined `Adobe Systems' (Addison-Wesley, 1988; QA76.73.P67P66 ISBN; 0-201-14396-8); see also {Red Book}, {Blue Book}). 2. Informal name ...
Green Book2 is SmallTalk `Smalltalk-80 Bits of History, Words of Advice', by Glenn Krasner (Addison-Wesley, 1983; QA76.8.S635S58; ISBN 0-201-11669-3) (this, too, is associated with blue and red books). 3. The `X/Open Compatibility Guide'. ...
Green Book3 is environment that is a proper superset of POSIX/SVID; also includes descriptions of a standard utility toolkit, systems administrations features, and the like. This grimoire is taken with particular seriousness in Europe. See {...
Green Book4 is Operating Systems Interface standard has been dubbed "The Ugly Green Book". 5. Any of the 1992 standards which will be issued by the CCITT's tenth plenary assembly. Until now, these have changed color each review cycle (1984 w...
Green Book5 is is rumored that this convention is going to be dropped before 1992. These include, among other things, the X.400 email standard and the Group 1 through 4 fax standards. See also {{book titles}}.
green bytes is n. 1. Meta-information embedded in a file, such as the length of the file or its name; as opposed to keeping such information in a separate description file or record. The term comes from an IBM user's group meeting (ca. 1962) ...
green bytes2 is debated and the diagram of the file on the blackboard had the `green bytes' drawn in green. 2. By extension, the non-data bits in any self-describing format. "A GIF file contains, among other things, green bytes describing th...
green bytes3 is {out-of-band}, {zigamorph}, {fence} (sense 1).
green card is n. [after the `IBM System/360 Reference Data' card] This is used for any summary of an assembly language, even if the color is not green. Less frequently used now because of the decrease in the use of assembly language. "I'll g...
green card2 is addressing mode for that instruction." Some green cards are actually booklets. The original green card became a yellow card when the System/370 was introduced, and later a yellow booklet. An anecdote from IBM refers to a scen...
green card3 is room at Yorktown in 1978. A luser overheard one of the programmers ask another "Do you have a green card?" The other grunted and passed the first a thick yellow booklet. At this point the luser turned a delicate shade of ol...
green card4 is return. See also {card}.
green lightning is [IBM] n. 1. Apparently random flashing streaks on the face of 3278-9 terminals while a new symbol set is being downloaded. This hardware bug was left deliberately unfixed, as some genius within IBM suggested it would let th...
green lightning2 is That, it certainly does. Later microprocessor-driven IBM color graphics displays were actually *programmed* to produce green lightning! 2. [proposed] Any bug perverted into an alleged feature by adroit rationalization or ...
green lightning3 is the 88000 architecture `compatibility logic', but I call it green lightning". See also {feature}.
green machine is n. A computer or peripheral device that has been designed and built to military specifications for field equipment (that is, to withstand mechanical shock, extremes of temperature and humidity, and so forth). Comes from the o...
Green's Theorem is [TMRC] prov. For any story, in any group of people there will be at least one person who has not heard the story. [The name of this theorem is a play on a fundamental theorem in calculus. --- ESR]
grep is /grep/ [from the qed/ed editor idiom g/re/p , where re stands for a regular expression, to Globally search for the Regular Expression and Print the lines containing matches to it, via {{UNIX}} `grep(1)'] vt. To rapidly scan a file or f...
grep2 is pattern. By extension, to look for something by pattern. "Grep the bulletin board for the system backup schedule, would you?" See also {vgrep}.
grind is vt. 1. [MIT and Berkeley] To format code, especially LISP code, by indenting lines so that it looks pretty. This usage was associated with the MacLISP community and is now rare; {prettyprint} was and is the generic term for such op...
grind2 is version of a document from the nroff, troff, TeX, or Scribe source. The BSD program `vgrind(1)' grinds code for printing on a Versatec bitmapped printer. 3. To run seemingly interminably, esp. (but not necessarily) if performing ...
grind3 is Similar to {crunch} or {grovel}. Grinding has a connotation of using a lot of CPU time, but it is possible to grind a disk, network, etc. See also {hog}. 4. To make the whole system slow. "Troff really grinds a PDP-11." 5. `grin...
grind crank is n. A mythical accessory to a terminal. A crank on the side of a monitor, which when operated makes a zizzing noise and causes the computer to run faster. Usually one does not refer to a grind crank out loud, but merely makes t...
grind crank2 is {grind} and {wugga wugga}. Historical note At least one real machine actually had a grind crank --- the R1, a research machine built toward the end of the days of the great vacuum tube computers, in 1959. R1 (also known as `...
grind crank3 is as `The Rice University Computer' (TRUC)) had a single-step/free-run switch for use when debugging programs. Since single-stepping through a large program was rather tedious, there was also a crank with a cam and gear arrang...
grind crank4 is button. This allowed one to `crank' through a lot of code, then slow down to single-step for a bit when you got near the code of interest, poke at some registers using the console typewriter, and then keep on cranking.
gritch is /grich/ 1. n. A complaint (often caused by a {glitch}). 2. vi. To complain. Often verb-doubled "Gritch gritch". 3. A synonym for {glitch} (as verb or noun).
grok is /grok/, var. /grohk/ [from the novel `Stranger in a Strange Land', by Robert A. Heinlein, where it is a Martian word meaning literally `to drink' and metaphorically `to be one with'] vt. 1. To understand, usually in a global sense. Co...
grok2 is Contrast {zen}, similar supernal understanding as a single brief flash. See also {glark}. 2. Used of programs, may connote merely sufficient understanding. "Almost all C compilers grok the `void' type these days."
gronk is /gronk/ [popularized by Johnny Hart's comic strip "B.C." but the word apparently predates that] vt. 1. To clear the state of a wedged device and restart it. More severe than `to {frob}'. 2. [TMRC] To cut, sever, smash, or similarl...
gronk2 is diskette drives. In particular, the microfloppies on a Commodore Amiga go "grink, gronk".
gronk out is vi. To cease functioning. Of people, to go home and go to sleep. "I guess I'll gronk out now; see you all tomorrow."
gronked is adj. 1. Broken. "The teletype scanner was gronked, so we took the system down." 2. Of people, the condition of feeling very tired or (less commonly) sick. "I've been chasing that bug for 17 hours now and I am thoroughly gronked!"...
gronked2 is same as {gronk} used of hardware, but connotes depression or mental/emotional problems in people.
grovel is vi. 1. To work interminably and without apparent progress. Often used transitively with `over' or `through'. "The file scavenger has been groveling through the file directories for 10 minutes now." Compare {grind} and {crunch}. Em...
grovel2 is examine minutely or in complete detail. "The compiler grovels over the entire source program before beginning to translate it." "I grovelled through all the documentation, but I still couldn't find the command I wanted."
grunge is /gruhnj/ n. 1. That which is grungy, or that which makes it so. 2. [Cambridge] Code which is inaccessible due to changes in other parts of the program. The preferred term in North America is {dead code}.
gubbish is /guhb'*sh/ [a portmanteau of `garbage' and `rubbish'?] n. Garbage; crap; nonsense. "What is all this gubbish?" The opposite portmanteau `rubbage' is also reported.
guiltware is /gilt'weir/ n. 1. A piece of {freeware} decorated with a message telling one how long and hard the author worked on it and intimating that one is a no-good freeloader if one does not immediately send the poor suffering martyr gobs...
gumby is /guhm'bee/ [from a class of Monty Python characters, poss. themselves named after the 1960s claymation character] n. An act of minor but conspicuous stupidity, often in `gumby maneuver' or `pull a gumby'.
factpacks/jargon-split.fact view on Meta::CPAN
hungry puppy is n. Syn. {slopsucker}.
hungus is /huhng'g*s/ [perhaps related to slang `humongous'] adj. Large, unwieldy, usually unmanageable. "TCP is a hungus piece of code." "This is a hungus set of modifications."
hyperspace is /hi'per-spays/ n. A memory location that is *far* away from where the program counter should be pointing, often inaccessible because it is not even mapped in. "Another core dump --- looks like the program jumped off to hyperspac...
hyperspace2 is never-never land}.) This usage is from the SF notion of a spaceship jumping `into hyperspace', that is, taking a shortcut through higher-dimensional space --- in other words, bypassing this universe. The variant `east hypers...
hyperspace3 is hackers.*I didn't change anything! interj. An aggrieved cry often heard as bugs manifest during a regression test. The {canonical} reply to this assertion is "Then it works just the same as it did before, doesn't it?" See also...
hyperspace4 is applications programmers trying to blame an obvious applications problem on an unrelated systems software change, for example a divide-by-0 fault after terminals were added to a network. Usually, their statement is found to be f...
hyperspace5 is admit some major restructuring of the program that shouldn't have broken anything, in their opinion, but which actually {hosed} the code completely.
I see no X here. is Hackers (and the interactive computer games they write) traditionally favor this slightly marked usage over other possible equivalents such as "There's no X here!" or "X is missing." or "Where's the X?". This goes back to...
I see no X here.2 is respond in this wise if you asked it to do something involving an object not present at your location in the game.
i14y is // n. Abbrev. for `interoperability', with the `14' replacing fourteen letters. Used in the {X} (windows) community. Refers to portability and compatibility of data formats (even binary ones) between different programs or implementat...
i18n is // n. Abbrev. for `internationali{z,s}ation', with the 18 replacing 18 letters. Used in the {X} (windows) community.
IBM is /I-B-M/ Inferior But Marketable; It's Better Manually; Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel Movement; and a near-{infinite} number of even less complimentary expansions, including `International Business Ma...
IBM2 is illustrate the considerable antipathy most hackers have long felt toward the `industry leader' (see {fear and loathing}). What galls hackers about most IBM machines above the PC level isn't so much that they are underpowered and over...
IBM3 is but that the designs are incredibly archaic, {crufty}, and {elephantine} ... and you can't *fix* them --- source code is locked up tight, and programming tools are expensive, hard to find, and bletcherous to use once you've found the...
IBM4 is family this may have begun to change --- but then, we thought that when the PC-RT came out, too. In the spirit of universal peace and brotherhood, this lexicon now includes a number of entries attributed to `IBM'; these derive from s...
IBM5 is circulated within IBM's own beleaguered hacker underground.
IBM discount is n. A price increase. Outside IBM, this derives from the common perception that IBM products are generally overpriced (see {clone}); inside, it is said to spring from a belief that large numbers of IBM employees living in an ar...
ice is [coined by USENETter Tom Maddox, popularized by William Gibson's cyberpunk SF novels acronym for `Intrusion Countermeasure Electronics'] Security software (in Gibson's novels, software that responds to intrusion by attempting to literal...
ice2 is program designed for cracking security on a system. Neither term is in serious use yet as of mid-1991, but many hackers find the metaphor attractive, and each may develop a denotation in the future.
ifdef out is /if'def owt/ v. Syn. for {condition out}, specific to {C}.
ill-behaved is adj. 1. [numerical analysis] Said of an algorithm or computational method that tends to blow up because of accumulated roundoff error or poor convergence properties. 2. Software that bypasses the defined {OS} interfaces to do t...
ill-behaved2 is itself, often in a way that depends on the hardware of the machine it is running on or which is nonportable or incompatible with other pieces of software. In the IBM PC/MS-DOS world, there is a folk theorem (nearly true) to th...
ill-behaved3 is and performance penalties in the OS interface) all interesting applications are ill-behaved. See also {bare metal}. Oppose {well-behaved}, compare {PC-ism}. See {mess-dos}.
IMHO is // [from SF fandom via USENET; acronym for `In My Humble Opinion'] "IMHO, mixed-case C names should be avoided, as mistyping something in the wrong case can cause hard-to-detect errors --- and they look too Pascalish anyhow." Also se...
IMHO2 is Not-So-Humble Opinion) and IMAO (In My Arrogant Opinion).
in the extreme is adj. A preferred superlative suffix for many hackish terms. See, for example, `obscure in the extreme' under {obscure}, and compare {highly}.
incantation is n. Any particularly arbitrary or obscure command that one must mutter at a system to attain a desired result. Not used of passwords or other explicit security features. Especially used of tricks that are so poorly documented t...
incantation2 is compiler normally locates initialized data in the data segment, but if you {mutter} the right incantation they will be forced into text space."
include is vt. [USENET] 1. To duplicate a portion (or whole) of another's message (typically with attribution to the source) in a reply or followup, for clarifying the context of one's response. See the the discussion of inclusion styles under...
include2 is `#include <disclaimer.h>' has appeared in {sig block}s to refer to a notional `standard disclaimer file'.
include war is n. Excessive multi-leveled including within a discussion {thread}, a practice that tends to annoy readers. In a forum with high-traffic newsgroups, such as USENET, this can lead to {flame}s and the urge to start a {kill file}.
indent style is [C programmers] n. The rules one uses to indent code in a readable fashion; a subject of {holy wars}. There are four major C indent styles, described below; all have the aim of making it easier for the reader to visually track...
indent style2 is significant variable is the placement of `{' and `}' with respect to the statement(s) they enclose and the guard or controlling statement (`if', `else', `for', `while', or `do') on the block, if any. `K&R style' --- Named ...
indent style3 is examples in {K&R} are formatted this way. Also called `kernel style' because the UNIX kernel is written in it, and the `One True Brace Style' (abbrev. 1TBS) by its partisans. The basic indent shown here is eight spaces (or o...
indent style4 is seen, but are much less common. if (cond) { <body> } `Allman style' --- Named for Eric Allman, a Berkeley hacker who wrote a lot of the BSD utilities in it (it is sometimes called `BSD style'). Resembles n...
indent style5 is indent per level shown here is eight spaces, but four is just as common (esp. in C++ code). if (cond) { <body> } `Whitesmiths style' --- popularized by the examples that came with Whitesmiths C, an earl...
indent style6 is level shown here is eight spaces, but four is occasionally seen. if (cond) { <body> } `GNU style' --- Used throughout GNU EMACS and the Free Software Foundation code, and just about nowher...
indent style7 is level, with `{' and `}' halfway between the outer and inner indent levels. if (cond) { <body> } Surveys have shown the Allman and Whitesmiths styles to be the most common, with about equal mind shares. ...
indent style8 is now much less common (the opening brace tends to get lost against the right paren of the guard part in an `if' or `while', which is a {Bad Thing}). Defenders of 1TBS argue that any putative gain in readability is less importa...
indent style9 is vertical space, which enables one to see more code on one's screen at once. Doubtless these issues will continue to be the subject of {holy wars}.
index is n. See {coefficient}.
infant mortality is n. It is common lore among hackers that the chances of sudden hardware failure drop off exponentially with a machine's time since power-up (that is, until the relatively distant time at which enough mechanical wear in I/O d...
infant mortality2 is components has accumulated for the machine to start going senile). Up to half of all chip and wire failures happen within a new system's first few weeks; such failures are often referred to as `infant mortality' problems ...
infant mortality3 is syndrome'). See {bathtub curve}, {burn-in period}.
infinite is adj. Consisting of a large number of objects; extreme. Used very loosely as in "This program produces infinite garbage." "He is an infinite loser." The word most likely to follow `infinite', though, is {hair} (it has been pointed...
infinite2 is of infinite hair). These uses are abuses of the word's mathematical meaning. The term `semi-infinite', denoting an immoderately large amount of some resource, is also heard. "This compiler is taking a semi-infinite amount of ...
infinite loop is n. One that never terminates (that is, the machine {spin}s or {buzz}es forever; the usual symptom is {catatonia}). There is a standard joke that has been made about each generation's exemplar of the ultra-fast machine "The Cr...
infinite loop2 is loop in under 2 seconds!"
infinity is n. 1. The largest value that can be represented in a particular type of variable (register, memory location, data type, whatever). 2. `minus infinity' The smallest such value, not necessarily or even usually the simple negation of...
infinity2 is arithmetic, infinity is 2^{N-1} - 1 but minus infinity is - (2^{N-1}), not -(2^{N-1} - 1). Note also that this is different from "time T equals minus infinity", which is closer to a mathematician's usage of infinity.
insanely great is adj. [Mac community, from Steve Jobs; also BSD UNIX people via Bill Joy] Something so incredibly {elegant} that it is imaginable only to someone possessing the most puissant of {hacker}-natures.
INTERCAL is /in't*r-kal/ [said by the authors to stand for `Compiler Language With No Pronounceable Acronym'] n. A computer language designed by Don Woods and James Lyon in 1972. INTERCAL is purposely different from all other computer langua...
INTERCAL2 is written language, being totally unspeakable. An excerpt from the INTERCAL Reference Manual will make the style of the language clear It is a well-known and oft-demonstrated fact that a person whose work is incomprehen...
INTERCAL3 is one were to state that the simplest way to store a value of 65536 in a 32-bit INTERCAL variable is DO 1 <- #0$#256 any sensible programmer would say that that was absurd. Since this is indeed the sim...
INTERCAL4 is look foolish in front of his boss, who would of course have happened to turn up, as bosses are wont to do. The effect would be no less devastating for the programmer having been correct. INTERCAL has many other p...
INTERCAL5 is more unspeakable. The Woods-Lyons implementation was actually used by many (well, at least several) people at Princeton. The language has been recently reimplemented as C-INTERCAL and is consequently enjoying an unprecedented le...
INTERCAL6 is alt.lang.intercal newsgroup devoted to the study and ... appreciation of the language on USENET.
interesting is adj. In hacker parlance, this word has strong connotations of `annoying', or `difficult', or both. Hackers relish a challenge, and enjoy wringing all the irony possible out of the ancient Chinese curse "May you live in interest...
Internet address is n. 1. [techspeak] An absolute network address of the form foo@bar.baz, where foo is a user name, bar is a {sitename}, and baz is a `domain' name, possibly including periods itself. Contrast with {bang path}; see also {netw...
Internet address2 is Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, {domainist}. 2. More loosely, any ...
Internet address3 is this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed...
Internet address4 is com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in...
Internet address5 is the U.S. outside the functional domains su sites in the Soviet Union (see {kremvax}). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally w...
Internet address6 is abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways.
interrupt is 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also {trap}. 2. interj. A request for attention from a hacker. Oft...
interrupt2 is seen Joe recently?" See {priority interrupt}. 3. Under MS-DOS, the term `interrupt' is nearly synonymous with `system call', because the OS and BIOS routines are both called using the INT instruction (see {{interrupt list, th...
interrupt3 is bypass the OS (going directly to a BIOS interrupt) to get reasonable performance.
interrupt list, the is [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of ear...
interrupts locked out is When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is...
interrupts locked out2 is have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also {spl}.
iron is n. Hardware, especially older and larger hardware of {mainframe} class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose ...
Iron Age is n. In the history of computing, 1961--1971 --- the formative era of commercial {mainframe} technology, when {big iron} {dinosaur}s ruled the earth. These began with the delivery of the first PDP-1, coincided with the dominance of ...
Iron Age2 is introduction of the first commercial microprocessor (the Intel 4004) in 1971. See also {Stone Age}; compare {elder days}.
iron box is [UNIX/Internet] n. A special environment set up to trap a {cracker} logging in over remote connections long enough to be traced. May include a modified {shell} restricting the hacker's movements in unobvious ways, and `bait' files...
iron box2 is on. See also {back door}, {firewall machine}, {Venus flytrap}, and Clifford Stoll's account in `The Cuckoo's Egg' of how he made and used one (see the Bibliography). Compare {padded cell}.
ironmonger is [IBM] n. Derogatory. A hardware specialist. Compare {sandbender}, {polygon pusher}.
ITS is /I-T-S/ n. 1. Incompatible Time-sharing System, an influential but highly idiosyncratic operating system written for PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab. Much AI-hacker jargon derives from ITS folklore, and to hav...
ITS2 is instantly as an old-timer of the most venerable sort. ITS pioneered many important innovations, including transparent file sharing between machines and terminal-independent I/O. After about 1982, most actual work was shifted to new...
ITS3 is essentially as a hobby and service to the hacker community. The shutdown of the lab's last ITS machine in May 1990 marked the end of an era and sent old-time hackers into mourning nationwide (see {high moby}). The Royal Institute of ...
ITS4 is `live' ITS site at its computer museum (right next to the only TOPS-10 system still on the Internet), so ITS is still alleged to hold the record for OS in longest continuous use (however, {{WAITS}} is a credible rival for this palm). ...
ITS5 is operating-system perfection worshiped by a bizarre, fervent retro-cult of old-time hackers and ex-users (see {troglodyte}, sense 2). ITS worshipers manage somehow to continue believing that an OS maintained by assembly-language hand...
ITS6 is 6-character filenames in one directory per account remains superior to today's state of commercial art (their venom against UNIX is particularly intense). See also {holy wars}, {Weenix}.
IWBNI is // [acronym] `It Would Be Nice If'. Compare {WIBNI}.
IYFEG is // [USENET] Abbreviation for `Insert Your Favorite Ethnic Group'. Used as a meta-name when telling racist jokes on the net to avoid offending anyone. See {JEDR}.*J. Random /J rand'm/ n. [generalized from {J. Random Hacker}] Arbitrar...
IYFEG2 is often prefixed to a noun to make a name out of it. It means roughly `some particular' or `any specific one'. "Would you let J. Random Loser marry your daughter?" The most common uses are `J. Random Hacker', `J. Random Loser', an...
IYFEG3 is be allowed to {gun} down other people?"), but it can be used simply as an elaborate version of {random} in any sense.
J. Random Hacker is [MIT] /J rand'm hak'r/ n. A mythical figure like the Unknown Soldier; the archetypal hacker nerd. See {random}, {Suzie COBOL}. This may originally have been inspired or influenced by `J. Fred Muggs', a show-biz chimpanzee...
jaggies is /jag'eez/ n. The `stairstep' effect observable when an edge (esp. a linear edge of very shallow or steep slope) is rendered on a pixel device (as opposed to a vector display).
JCL is /J-C-L/ n. 1. IBM's supremely {rude} Job Control Language. JCL is the script language used to control the execution of programs in IBM's batch systems. JCL has a very {fascist} syntax, and some versions will, for example, {barf} if tw...
JCL2 is programmers confronted with JCL simply copy a working file (or card deck), changing the file names. Someone who actually understands and generates unique JCL is regarded with the mixed respect one gives to someone who memorizes the ...
JCL3 is itself sometimes sing "Who's the breeder of the crud that mangles you and me? I-B-M, J-C-L, M-o-u-s-e" to the tune of the "Mickey Mouse Club" theme to express their opinion of the beast. 2. A comparative for any very {rude} softwar...
JCL4 is as bad as JCL." As with {COBOL}, JCL is often used as an archetype of ugliness even by those who haven't experienced it. See also {IBM}, {fear and loathing}.
JEDR is // n. Synonymous with {IYFEG}. At one time, people in the USENET newsgroup rec.humor.funny tended to use `JEDR' instead of {IYFEG} or `<ethnic>'; this stemmed from a public attempt to suppress the group once made by a loser with initi...
JEDR2 is joke posted there. (The practice was {retcon}ned by the expanding these initials as `Joke Ethnic/Denomination/Race'.) After much sound and fury JEDR faded away; this term appears to be doing likewise. JEDR's only permanent effect...
JEDR3 is `sensitivity' arguments for censorship so thoroughly that more recent attempts to raise them have met with immediate and near-universal rejection.
JFCL is /jif'kl/, /jaf'kl/, /j*-fi'kl/ vt., obs. (alt. `jfcl') To cancel or annul something. "Why don't you jfcl that out?" The fastest do-nothing instruction on older models of the PDP-10 happened to be JFCL, which stands for "Jump if Flag ...
JFCL2 is something useful, but is a very fast no-operation if no flag is specified. Geoff Goodfellow, one of the jargon-1 co-authors, has long had JFCL on the license plate of his BMW. Usage rare except among old-time PDP-10 hackers.
jiffy is n. 1. The duration of one tick of the system clock on the computer (see {tick}). Often one AC cycle time (1/60 second in the U.S. and Canada, 1/50 most other places), but more recently 1/100 sec has become common. "The swapper runs ...
jiffy2 is memory management routine is executed once for every 6 ticks of the clock, or about ten times a second. 2. Confusingly, the term is sometimes also used for a 1-millisecond {wall time} interval. 3. Indeterminate time from a few secon...
jiffy3 is certainly not now and possibly never. This is a bit contrary to the more widespread use of the word. Oppose {nano}. See also {Real Soon Now}.
job security is n. When some piece of code is written in a particularly {obscure} fashion, and no good reason (such as time or space optimization) can be discovered, it is often said that the programmer was attempting to increase his job secur...
job security2 is for maintenance). This sour joke seldom has to be said in full; if two hackers are looking over some code together and one points at a section and says "job security", the other one may just nod.
jock is n. 1. A programmer who is characterized by large and somewhat brute-force programs. See {brute force}. 2. When modified by another noun, describes a specialist in some particular computing area. The compounds `compiler jock' and `sy...
jock2 is examples of this.
joe code is /joh' kohd`/ n. 1. Code that is overly {tense} and unmaintainable. "{Perl} may be a handy program, but if you look at the source, it's complete joe code." 2. Badly written, possibly buggy code. Correspondents wishing to remain ...
joe code2 is the Lawrence Berkeley Laboratory and observed that usage has drifted slightly; the original sobriquet `Joe code' was intended in sense 1.
JR[LN] is /J-R-L/, /J-R-N/ n. The names JRL and JRN were sometimes used as example names when discussing a kind of user ID used under {{TOPS-10}}; they were understood to be the initials of (fictitious) programmers named `J. Random Loser' and ...
JR[LN]2 is example, if one said "To log in, type log one comma jay are en" (that is, "log 1,JRN"), the listener would have understood that he should use his own computer ID in place of `JRN'.
JRST is /jerst/ [based on the PDP-10 jump instruction] v.,obs. To suddenly change subjects, with no intention of returning to the previous topic. Usage rather rare except among PDP-10 diehards, and considered silly. See also {AOS}.
juggling eggs is vi. Keeping a lot of {state} in your head while modifying a program. "Don't bother me now, I'm juggling eggs", means that an interrupt is likely to result in the program's being scrambled. In the classic first-contact SF nov...
juggling eggs2 is and Jerry Pournelle, an alien describes a very difficult task by saying "We juggle priceless eggs in variable gravity." That is a very hackish use of language. See also {hack mode}.
jump off into never-never land is [from J. M. Barrie's `Peter Pan'] v. Same as {branch to Fishkill}, but more common in technical cultures associated with non-IBM computers that use the term `jump' rather than `branch'. Compare {hyperspace}.*...
jump off into never-never land2 is used both as a spoken word and a written suffix (like {meg} and {gig} for megabyte and gigabyte). See {{quantifiers}}.
K&R is [Kernighan and Ritchie] n. Brian Kernighan and Dennis Ritchie's book `The C Programming Language', esp. the classic and influential first edition (Prentice-Hall 1978; ISBN 0-113-110163-3). Syn. {White Book}, {Old Testament}. See also ...
kahuna is /k*-hoo'nuh/ [IBM from the Hawaiian title for a shaman] n. Synonym for {wizard}, {guru}.
kamikaze packet is n. The `official' jargon for what is more commonly called a {Christmas tree packet}. RFC-1025, `TCP and IP Bake Off' says 10 points for correctly being able to process a "Kamikaze" packet (AKA nastygram, christmas tree...
kamikaze packet2 is is, correctly handle a segment with the maximum combination of features at once (e.g., a SYN URG PUSH FIN segment with options and data). See also {Chernobyl packet}.
kangaroo code is n. Syn. {spaghetti code}.
ken is /ken/ n. 1. [UNIX] Ken Thompson, principal inventor of UNIX. In the early days he used to hand-cut distribution tapes, often with a note that read "Love, ken". Old-timers still use his first name (sometimes uncapitalized, because it's...
ken2 is third-person reference; it is widely understood (on USENET, in particular) that without a last name `Ken' refers only to Ken Thompson. Similarly, Dennis without last name means Dennis Ritchie (and he is often known as dmr). See als...
ken3 is This was originated by the Software Support group at Symbolics because the two greatest flamers in the user community were both named Ken.
factpacks/jargon-split.fact view on Meta::CPAN
macro5 is application control language (whether or not the language is actually translated by text expansion), and for macro-like entities such as the `keyboard macros' supported in some text editors (and PC TSR or Macintosh INIT/CDEV keyboard...
macro- is pref. Large. Opposite of {micro-}. In the mainstream and among other technical cultures (for example, medical people) this competes with the prefix {mega-}, but hackers tend to restrict the latter to quantification.
macrology is /mak-rol'*-jee/ n. 1. Set of usually complex or crufty macros, e.g., as part of a large system written in {LISP}, {TECO}, or (less commonly) assembler. 2. The art and science involved in comprehending a macrology in sense 1. Som...
macrology2 is not unlike archeology, ecology, or {theology}, hence the sound-alike construction. See also {boxology}.
macrotape is /ma'kroh-tayp/ n. An industry-standard reel of tape, as opposed to a {microtape}.
maggotbox is /mag'*t-boks/ n. See {Macintrash}. This is even more derogatory.
magic is adj. 1. As yet unexplained, or too complicated to explain; compare {automagically} and (Arthur C.) Clarke's Third Law: "Any sufficiently advanced technology is indistinguishable from magic." "TTY echoing is controlled by a large numb...
magic2 is computes the parity of an 8-bit byte in three instructions." 2. Characteristic of something that works although no one really understands why (this is especially called {black magic}). 3. [Stanford] A feature not generally public...
magic3 is impossible, or a feature formerly in that category but now unveiled. Compare {black magic}, {wizardly}, {deep magic}, {heavy wizardry}. For more about hackish `magic', see appendix A.
magic cookie is [UNIX] n. 1. Something passed between routines or programs that enables the receiver to perform some operation; a capability ticket or opaque identifier. Especially used of small data objects that contain data encoded in a str...
magic cookie2 is E.g., on non-UNIX OSes with a non-byte-stream model of files, the result of `ftell(3)' may be a magic cookie rather than a byte offset; it can be passed to `fseek(3)', but not operated on in any meaningful way. The phrase ...
magic cookie3 is a result whose contents are not defined but which can be passed back to the same or some other program later. 2. An in-band code for changing graphic rendition (e.g., inverse video or underlining) or performing other contro...
magic cookie4 is leave a blank on the screen corresponding to mode-change magic cookies; this was also called a {glitch}. See also {cookie}.
magic number is [UNIX/C] n. 1. In source code, some non-obvious constant whose value is significant to the operation of a program and that is inserted inconspicuously in-line ({hardcoded}), rather than expanded in by a symbol set by a commente...
magic number2 is are bad style. 2. A number that encodes critical information used in an algorithm in some opaque way. The classic examples of these are the numbers used in hash or CRC functions, or the coefficients in a linear congruentia...
magic number3 is sense actually predates and was ancestral to the more common sense 1. 3. Special data located at the beginning of a binary data file to indicate its type to a utility. Under UNIX, the system and various applications program...
magic number4 is types of executable file by looking for a magic number. Once upon a time, these magic numbers were PDP-11 branch instructions that skipped over header data to the start of executable code; the 0407, for example, was octal for...
magic number5 is {wizard} knows the spells to create magic numbers. How do you choose a fresh magic number of your own? Simple --- you pick one at random. See? It's magic!
magic smoke is n. A substance trapped inside IC packages that enables them to function (also called `blue smoke'; this is similar to the archaic `phlogiston' hypothesis about combustion). Its existence is demonstrated by what happens when a c...
magic smoke2 is out, so it doesn't work any more. See {smoke test}, {let the smoke out}. USENETter Jay Maynard tells the following story: "Once, while hacking on a dedicated Z80 system, I was testing code by blowing EPROMs and plugging them...
magic smoke3 is One time, I plugged one in backwards. I only discovered that *after* I realized that Intel didn't put power-on lights under the quartz windows on the tops of their EPROMs --- the die was glowing white-hot. Amazingly, the EPRO...
magic smoke4 is full of zeros, then erased it again. For all I know, it's still in service. Of course, this is because the magic smoke didn't get let out." Compare the original phrasing of {Murphy's Law}.
main loop is n. Software tools are often written to perform some actions repeatedly on whatever input is handed to them, terminating when there is no more input or they are explicitly told to go away. In such programs, the loop that gets and p...
mainframe is n. This term originally referred to the cabinet containing the central processor unit or `main frame' of a room-filling {Stone Age} batch machine. After the emergence of smaller `minicomputer' designs in the early 1970s, the tr...
mainframe2 is as `mainframe computers' and eventually just as mainframes. The term carries the connotation of a machine designed for batch rather than interactive use, though possibly with an interactive timesharing operating system retrofi...
mainframe3 is built by IBM, Unisys, and the other great {dinosaur}s surviving from computing's {Stone Age}. It is common wisdom among hackers that the mainframe architectural tradition is essentially dead (outside of the tiny market for {n...
mainframe4 is having been swamped by the recent huge advances in IC technology and low-cost personal computing. As of 1991, corporate America hasn't quite figured this out yet, though the wave of failures, takeovers, and mergers among tradi...
mainframe5 is the wind (see {dinosaurs mating}).
management is n. 1. Corporate power elites distinguished primarily by their distance from actual productive work and their chronic failure to manage (see also {suit}). Spoken derisively, as in "*Management* decided that ...". 2. Mythically, ...
management2 is world's minor irritations. Hackers' satirical public notices are often signed `The Mgt'; this derives from the `Illuminatus' novels (see the Bibliography).
mandelbug is /mon'del-buhg/ [from the Mandelbrot set] n. A bug whose underlying causes are so complex and obscure as to make its behavior appear chaotic or even non-deterministic. This term implies that the speaker thinks it is a {Bohr bug}, ...
manged is /monjd/ [probably from the French `manger' or Italian `mangiare', to eat; perhaps influenced by English n. `mange', `mangy'] adj. Refers to anything that is mangled or damaged, usually beyond repair. "The disk was manged after the e...
mangle is vt. Used similarly to {mung} or {scribble}, but more violent in its connotations; something that is mangled has been irreversibly and totally trashed.
mangler is [DEC] n. A manager. Compare {mango}; see also {management}. Note that {system mangler} is somewhat different in connotation.
mango is /mang'go/ [orig. in-house jargon at Symbolics] n. A manager. Compare {mangler}. See also {devo} and {doco}.
marbles is [from mainstream "lost all his/her marbles"] pl.n. The minimum needed to build your way further up some hierarchy of tools or abstractions. After a bad system crash, you need to determine if the machine has enough marbles to come u...
marbles2 is rebuild from backups, or if you need to rebuild from scratch. "This compiler doesn't even have enough marbles to compile `Hello World'."
marginal is adj. 1. Extremely small. "A marginal increase in {core} can decrease {GC} time drastically." In everyday terms, this means that it is a lot easier to clean off your desk if you have a spare place to put some of the junk while you...
marginal2 is merit. "This proposed new feature seems rather marginal to me." 3. Of extremely small probability of {win}ning. "The power supply was rather marginal anyway; no wonder it fried."
Marginal Hacks is n. Margaret Jacks Hall, a building into which the Stanford AI Lab was moved near the beginning of the 1980s (from the {D. C. Power Lab}).
marginally is adv. Slightly. "The ravs here are only marginally better than at Small Eating Place." See {epsilon}.
marketroid is /mar'k*-troyd/ alt. `marketing slime', `marketing droid', `marketeer' n. A member of a company's marketing department, esp. one who promises users that the next version of a product will have features that are not actually sche...
marketroid2 is to implement, and/or are in violation of the laws of physics; and/or one who describes existing features (and misfeatures) in ebullient, buzzword-laden adspeak. Derogatory. Compare {droid}.* martian: n. A packet sent on a TC...
marketroid3 is test loopback interface [127.0.0.1]. This means that it will come back at you labeled with a source address that is clearly not of this earth. "The domain server is getting lots of packets from Mars. Does that gateway have a ...
massage: vt. Vague term used to describe `smooth' transformations of is a data set into a different form, esp. transformations that do not lose information. Connotes less pain than {munch} or {crunch}. "He wrote a program that massages X bitm...
math-out: [poss. from `white-out' (the blizzard variety)] n. A is paper or presentation so encrusted with mathematical or other formal notation as to be incomprehensible. This may be a device for concealing the fact that it is actually {conte...
Matrix: [FidoNet] n. 1. What the Opus BBS software and sysops call is {FidoNet}. 2. Fanciful term for a {cyberspace} expected to emerge from current networking experiments (see {network, the}). Some people refer to the totality of present net...
Mbogo, Dr. Fred: /*m-boh'goh, dok'tr fred/ [Stanford] n. The is archetypal man you don't want to see about a problem, esp. an incompetent professional; a shyster. "Do you know a good eye doctor?" "Sure, try Mbogo Eye Care and Professional Dr...
Mbogo, Dr. Fred: /*m-boh'goh, dok'tr fred/ [Stanford] n. The2 is between {bogus} and the original Dr. Mbogo, a witch doctor who was Gomez Addams' physician on the old "Addams Family" TV show. See also {fred}.
meatware is n. Synonym for {wetware}. Less common.
meeces is /mees'*z/ [TMRC] n. Occasional furry visitors who are not {urchin}s. [That is, mice. This may no longer be in live use; it clearly derives from the refrain of the early-1960s cartoon character Mr. Jinx: "I hate meeces to *pieces*!" ...
meg is /meg/ n. See {{quantifiers}}.
mega- is /me'g*/ [SI] pref. See {{quantifiers}}.
megapenny is /meg'*-pen`ee/ n. $10,000 (1 cent * 10^6). Used semi-humorously as a unit in comparing computer cost and performance figures.
MEGO is /me'goh/ or /mee'goh/ [`My Eyes Glaze Over', often `Mine Eyes Glazeth (sic) Over', attributed to the futurologist Herman Kahn] Also `MEGO factor'. 1. n. A {handwave} intended to confuse the listener and hopefully induce agreement beca...
MEGO2 is not understanding what is going on. MEGO is usually directed at senior management by engineers and contains a high proportion of {TLA}s. 2. excl. An appropriate response to MEGO tactics. 3. Among non-hackers this term often refers ...
MEGO3 is glaze, but to the eye-glazing reaction itself, which may be triggered by the mere threat of technical detail as effectively as by an actual excess of it.
meltdown, network is n. See {network meltdown}.
meme is /meem/ [coined on analogy with `gene' by Richard Dawkins] n. An idea considered as a {replicator}, esp. with the connotation that memes parasitize people into propagating them much as viruses do. Used esp. in the phrase `meme complex'...
meme2 is memes that form an organized belief system, such as a religion. This lexicon is an (epidemiological) vector of the `hacker subculture' meme complex; each entry might be considered a meme. However, `meme' is often misused to mean `...
meme3 is acceptance of the idea that in humans (and presumably other tool- and language-using sophonts) cultural evolution by selection of adaptive ideas has superseded biological evolution by selection of hereditary traits. Hackers find this...
meme plague is n. The spread of a successful but pernicious {meme}, esp. one that parasitizes the victims into giving their all to propagate it. Astrology, BASIC, and the other guy's religion are often considered to be examples. This usage i...
meme plague2 is `joiner' ideologies like Naziism or various forms of millennarian Christianity have exhibited plague-like cycles of exponential growth followed by collapses to small reservoir populations.
memetics is /me-met'iks/ [from {meme}] The study of memes. As of mid-1991, this is still an extremely informal and speculative endeavor, though the first steps towards at least statistical rigor have been made by H. Keith Henson and others. ...
memetics2 is among hackers, who like to see themselves as the architects of the new information ecologies in which memes live and replicate.
memory leak is n. An error in a program's dynamic-store allocation logic that causes it to fail to reclaim discarded memory, leading to eventual collapse due to memory exhaustion. Also (esp. at CMU) called {core leak}. See {aliasing bug}, {f...
memory leak2 is {precedence lossage}, {overrun screw}, {leaky heap}, {leak}.
menuitis is /men`yoo-i:'tis/ n. Notional disease suffered by software with an obsessively simple-minded menu interface and no escape. Hackers find this intensely irritating and much prefer the flexibility of command-line or language-style inte...
menuitis2 is macros or a special-purpose language in which one can encode useful hacks. See {user-obsequious}, {drool-proof paper}, {WIMP environment}, {for the rest of us}.
mess-dos is /mes-dos/ n. Derisory term for MS-DOS. Often followed by the ritual banishing "Just say No!" See {{MS-DOS}}. Most hackers (even many MS-DOS hackers) loathe MS-DOS for its single-tasking nature, its limits on application size, it...
mess-dos2 is IBMness (see {fear and loathing}). Also `mess-loss', `messy-dos', `mess-dog', `mess-dross', `mush-dos', and various combinations thereof. In Ireland and the U.K. it is even sometimes called `Domestos' after a brand of toilet c...
meta is /me't*/ or /may't*/ or (Commonwealth) /mee't*/ [from analytic philosophy] adj.,pref. One level of description up. A meta-syntactic variable is a variable in notation used to describe syntax, and meta-language is language used to descri...
meta2 is briefly, but much hacker humor turns on deliberate confusion between meta-levels. See {{Humor, Hacker}}.
meta bit is n. The top bit of an 8-bit character, which is on in character values 128--255. Also called {high bit}, {alt bit}, or {hobbit}. Some terminals and consoles (see {space-cadet keyboard}) have a META shift key. Others (including, ...
meta bit2 is machines) have an ALT key. See also {bucky bits}.
MFTL is /M-F-T-L/ [acronym: `My Favorite Toy Language'] 1. adj. Describes a talk on a programming language design that is heavy on the syntax (with lots of BNF), sometimes even talks about semantics (e.g., type systems), but rarely, if ever, h...
MFTL2 is broadly applied to talks --- even when the topic is not a programming language --- in which the subject matter is gone into in unnecessary and meticulous detail at the sacrifice of any conceptual content. "Well, it was a typical MFTL...
MFTL3 is which the developers are passionate (often to the point of prosyletic zeal) but no one else cares about. Applied to the language by those outside the originating group. "He cornered me about type resolution in his MFTL." The fir...
MFTL4 is MFTL is usually to write a compiler for it, then bootstrap the design away from contamination by lesser languages by writing a compiler for it in itself. Thus, the standard put-down question at an MFTL talk is "Has it been used for...
MFTL5 is other hand, a language that *cannot* be used to write its own compiler is beneath contempt...
mickey is n. The resolution unit of mouse movement. It has been suggested that the `disney' will become a benchmark unit for animation graphics performance.
mickey mouse program is n. North American equivalent of a {noddy} (that is, trivial) program. Doesn't necessarily have the belittling connotations of mainstream slang "Oh, that's just mickey mouse stuff!"; sometimes trivial programs can be ve...
micro- is pref. 1. Very small; this is the root of its use as a quantifier prefix. 2. A quantifier prefix, calling for multiplication by 10^{-6} (see {{quantifiers}}). Neither of these uses is peculiar to hackers, but hackers tend to fling ...
micro-2 is countenanced in standard English. It is recorded, for example, that one CS professor used to characterize the standard length of his lectures as a microcentury --- that is, about 52.6 minutes (see also {attoparsec}, {nanoacre}, a...
micro-3 is or human-scale --- that is, capable of being maintained or comprehended or manipulated by one human being. This sense is generalized from `microcomputer', and is esp. used in contrast with `macro-' (the corresponding Greek prefix...
micro-4 is global (or {macro-}). Thus a hacker might say that buying a smaller car to reduce pollution only solves a microproblem; the macroproblem of getting to work might be better solved by using mass transit, moving to within walking di...
micro-5 is microfloppies n. 3.5-inch floppies, as opposed to 5.25-inch {vanilla} or mini-floppies and the now-obsolete 8-inch variety. This term may be headed for obsolescence as 5.25-inchers pass out of use, only to be revived if anybody floa...
micro-6 is {stiffy}, {minifloppies}.
microfortnight is n. About 1.2 sec. The VMS operating system has a lot of tuning parameters that you can set with the SYSGEN utility, and one of these is TIMEPROMPTWAIT, the time the system will wait for an operator to set the correct date and...
microfortnight2 is current value is bogus. This time is specified in microfortnights!
microLenat is /mi:-kroh-len'-*t/ n. See {bogosity}.
microReid is /mi:'kroh-reed/ n. See {bogosity}.
Microsloth Windows is /mi:'kroh-sloth` win'dohz/ n. Hackerism for `Microsoft Windows', a windowing system for the IBM-PC which is so limited by bug-for-bug compatibility with {mess-dos} that it is agonizingly slow on anything less than a fast ...
microtape is /mi:'kroh-tayp/ n. Occasionally used to mean a DECtape, as opposed to a {macrotape}. A DECtape is a small reel, about 4 inches in diameter, of magnetic tape about an inch wide. Unlike drivers for today's {macrotape}s, microtape ...
microtape2 is therefore could be used to support file systems and even for swapping (this was generally done purely for {hack value}, as they were far too slow for practical use). In their heyday they were used in pretty much the same ways ...
microtape3 is portable way to save and transport files and programs. Apparently the term `microtape' was actually the official term used within DEC for these tapes until someone coined the word `DECtape', which, of course, sounded sexier to t...
middle-endian is adj. Not {big-endian} or {little-endian}. Used of perverse byte orders such as 3-4-1-2 or 2-1-4-3, occasionally found in the packed-decimal formats of minicomputer manufacturers who shall remain nameless. See {NUXI problem}.
milliLampson is /mil'*-lamp`sn/ n. A unit of talking speed, abbreviated mL. Most people run about 200 milliLampsons. Butler Lampson (a CS theorist and systems implementor highly regarded among hackers) goes at 1000. A few people speak faste...
milliLampson2 is the (sometimes widely disparate) rates at which people can generate ideas and actually emit them in speech. For example, noted computer architect C. Gordon Bell (designer of the PDP-11) is said, with some awe, to think at abo...
milliLampson3 is frequently reduced to fragments of sentences as his mouth tries to keep up with his speeding brain.
minifloppies is n. 5.25-inch {vanilla} floppy disks, as opposed to 3.5-inch or {microfloppies} and the now-obsolescent 8-inch variety. At one time, this term was a trademark of Shugart Associates for their SA-400 minifloppy drive. Nobody pai...
MIPS is /mips/ [acronym] n. 1. A measure of computing speed; formally, `Million Instructions Per Second' (that's 10^6 per second, not 2^{20}!); often rendered by hackers as `Meaningless Indication of Processor Speed' or in other unflattering...
MIPS2 is attitude about the value of most {benchmark} claims, said attitude being one of the great cultural divides between hackers and {marketroid}s. The singular is sometimes `1 MIP' even though this is clearly etymologically wrong. See ...
MIPS3 is especially large computers, considered abstractly as sources of {computron}s. "This is just a workstation; the heavy MIPS are hidden in the basement." 3. The corporate name of a particular RISC-chip company; among other things, th...
MIPS4 is 3100 workstation series. 4. Acronym for `Meaningless Information per Second' (a joke, prob. from sense 1).
misbug is /mis-buhg/ [MIT] n. An unintended property of a program that turns out to be useful; something that should have been a {bug} but turns out to be a {feature}. Usage: rare. Compare {green lightning}. See {miswart}.
misfeature is /mis-fee'chr/ or /mis'fee`chr/ n. A feature that eventually causes lossage, possibly because it is not adequate for a new situation which has evolved. It is not the same as a bug, because fixing it involves a substantial philoso...
misfeature2 is involved. A misfeature is different from a simple unforeseen side effect; the term implies that the misfeature was actually carefully planned to be that way, but its future consequences or circumstances just weren't predicted ...
misfeature3 is having thought ahead about it at all. Many misfeatures (especially in user-interface design) arise because the designers/implementors mistook their personal tastes for laws of nature. Often a former feature becomes a misfeat...
misfeature4 is parameters subsequently changed (possibly only in the judgment of the implementors). "Well, yeah, it is kind of a misfeature that file names are limited to 6 characters, but the original implementors wanted to save directory ...
Missed'em-five is n. Pejorative hackerism for AT&T System V UNIX, generally used by {BSD} partisans in a bigoted mood. (The synonym `SysVile' is also encountered.) See {software bloat}, {Berzerkeley}.
miswart is /mis-wort/ [from {wart} by analogy with {misbug}] n. A {feature} that superficially appears to be a {wart} but has been determined to be the {Right Thing}. For example, in some versions of the {EMACS} text editor, the `transpose ch...
miswart2 is characters on either side of the cursor on the screen, *except* when the cursor is at the end of a line, in which case the two characters before the cursor are exchanged. While this behavior is perhaps surprising, and certainly i...
miswart3 is extensive experimentation to be what most users want. This feature is a miswart.
mod is vt.,n. 1. Short for `modify' or `modification'. Very commonly used --- in fact the full terms are considered markers that one is being formal. The plural `mods' is used esp. with reference to bug fixes or minor design changes in hardw...
mod2 is {patch} sets or a {diff}. 2. Short for {modulo} but used *only* for its techspeak sense.
mode is n. A general state, usually used with an adjective describing the state. Use of the word `mode' rather than `state' implies that the state is extended over time, and probably also that some activity characteristic of that state is b...
mode2 is thesis mode." In its jargon sense, `mode' is most often attributed to people, though it is sometimes applied to programs and inanimate objects. In particular, see {hack mode}, {day mode}, {night mode}, {demo mode}, {fireworks mode}...
mode3 is also often hears the verbs `enable' and `disable' used in connection with jargon modes. Thus, for example, a sillier way of saying "I'm going to crash" is "I'm going to enable crash mode now". One might also hear a request to "disab...
mode bit is n. A {flag}, usually in hardware, that selects between two (usually quite different) modes of operation. The connotations are different from {flag} bit in that mode bits are mainly written during a boot or set-up phase, are seldom...
mode bit2 is lifetime of an ordinary program. The classic example was the EBCDIC-vs.-ASCII bit (#12) of the Program Status Word of the IBM 360. Another was the bit on a PDP-12 that controlled whether it ran the PDP-8 or the LINC instruction ...
modulo is /mo'dyu-loh/ prep. Except for. From mathematical terminology; one can consider saying that 4 = 22 except for the 9s (4 = 22 mod 9). "Well, LISP seems to work okay now, modulo that {GC} bug." "I feel fine today modulo a slight he...
molly-guard is /mol'ee-gard/ [University of Illinois] n. A shield to prevent tripping of some {Big Red Switch} by clumsy or ignorant hands. Originally used of some plexiglass covers improvised for the BRS on an IBM 4341 after a programmer's t...
molly-guard2 is twice in one day. Later generalized to covers over stop/reset switches on disk drives and networking equipment.
Mongolian Hordes technique is n. Development by {gang bang} (poss. from the Sixties counterculture expression `Mongolian clusterfuck' for a public orgy). Implies that large numbers of inexperienced programmers are being put on a job better pe...
Mongolian Hordes technique2 is `Chinese Army technique'; see also {Brooks's Law}.
monkey up is vt. To hack together hardware for a particular task, especially a one-shot job. Connotes an extremely {crufty} and consciously temporary solution. Compare {hack up}, {kluge up}, {cruft together}, {cruft together}.
monkey, scratch is n. See {scratch monkey}.
monstrosity is 1. n. A ridiculously {elephantine} program or system, esp. one that is buggy or only marginally functional. 2. The quality of being monstrous (see `Overgeneralization' in the discussion of jargonification). See also {baroque}.
Moof is /moof/ [MAC users] n. The Moof or `dogcow' is a semi-legendary creature that lurks in the depths of the Macintosh Technical Notes Hypercard stack V3.1; specifically, the full story of the dogcow is told in technical note #31 (the parti...
Moof2 is `Clarus'). Option-shift-click will cause it to emit a characteristic `Moof!' or `!fooM' sound. *Getting* to tech note 31 is the hard part; to discover how to do that, one must needs examine the stack script with a hackerly eye. Cl...
Moof3 is if you choose `Page Setup...' with a LaserWriter selected and click on the `Options' button.
Moore's Law is /morz law/ prov. The observation that the logic density of silicon integrated circuits has closely followed the curve (bits per square inch) = 2^{(n - 1962)}; that is, the amount of information storable in one square inch of si...
Moore's Law2 is since the technology was invented. See also {Parkinson's Law of Data}.
moria is /mor'ee-*/ n. Like {nethack} and {rogue}, one of the large PD Dungeons-and-Dragons-like simulation games, available for a wide range of machines and operating systems. Extremely addictive and a major consumer of time better used for ...
MOTAS is /moh-toz/ [USENET: Member Of The Appropriate Sex, after {MOTOS} and {MOTSS}] n. A potential or (less often) actual sex partner. See also {SO}.
MOTOS is /moh-tohs/ [acronym from the 1970 U.S. census forms via USENET: Member Of The Opposite Sex] n. A potential or (less often) actual sex partner. See {MOTAS}, {MOTSS}, {SO}. Less common than MOTSS or {MOTAS}, which have largely displac...
MOTSS is /mots/ or /M-O-T-S-S/ [from the 1970 U.S. census forms via USENET, Member Of The Same Sex] n. Esp. one considered as a possible sexual partner. The gay-issues newsgroup on USENET is called soc.motss. See {MOTOS} and {MOTAS}, which d...
mouse ahead is vi. Point-and-click analog of `type ahead'. To manipulate a computer's pointing device (almost always a mouse in this usage, but not necessarily) and its selection or command buttons before a computer program is ready to accept...
mouse ahead2 is accepting the input. Handling this properly is rare, but it can help make a {WIMP environment} much more usable, assuming the users are familiar with the behavior of the user interface.
mouse around is vi. To explore public portions of a large system, esp. a network such as Internet via {FTP} or {TELNET}, looking for interesting stuff to {snarf}.
mouse belt is n. See {rat belt}.
mouse droppings is [MS-DOS] n. Pixels (usually single) that are not properly restored when the mouse pointer moves away from a particular location on the screen, producing the appearance that the mouse pointer has left droppings behind. The m...
mouse droppings2 is that write to the screen memory corresponding to the mouse pointer's current location without hiding the mouse pointer first, and mouse drivers that do not quite support the graphics mode in use.
mouse elbow is n. A tennis-elbow-like fatigue syndrome resulting from excessive use of a {WIMP environment}. Similarly, `mouse shoulder'; GLS reports that he used to get this a lot before he taught himself to be ambimoustrous.
mouso is /mow'soh/ n. [by analogy with `typo'] An error in mouse usage resulting in an inappropriate selection or graphic garbage on the screen. Compare {thinko}, {braino}.
MS-DOS is /M-S-dos/ [MicroSoft Disk Operating System] n. A {clone} of {{CP/M}} for the 8088 crufted together in 6 weeks by hacker Tim Paterson, who is said to have regretted it ever since. Numerous features, including vaguely UNIX-like but rat...
MS-DOS2 is redirection, and pipelines, were hacked into 2.0 and subsequent versions; as a result, there are two or more incompatible versions of many system calls, and MS-DOS programmers can never agree on basic things like what character to ...
MS-DOS3 is case-sensitive. The resulting mess is now the highest-unit-volume OS in history. Often known simply as DOS, which annoys people familiar with other similarly abbreviated operating systems (the name goes back to the mid-1960s, wh...
MS-DOS4 is operating system for the 360). Some people like to pronounce DOS like "dose", as in "I don't work on dose, man!", or to compare it to a dose of brain-damaging drugs (a slogan button in wide circulation among hackers exhorts: "MS-...
mu is /moo/ The correct answer to the classic trick question "Have you stopped beating your wife yet?". Assuming that you have no wife or you have never beaten your wife, the answer "yes" is wrong because it implies that you used to beat your...
mu2 is because it suggests that you have one and are still beating her. According to various Discordians and Douglas Hofstadter (see the Bibliography), the correct answer is usually "mu", a Japanese word alleged to mean "Your question canno...
mu3 is assumptions". Hackers tend to be sensitive to logical inadequacies in language, and many have adopted this suggestion with enthusiasm. The word `mu' is actually from Chinese, meaning `nothing'; it is used in mainstream Japanese in tha...
mu4 is the Discordian question-denying use. It almost certainly derives from overgeneralization of the answer in the following well-known Rinzei Zen teaching riddle: A monk asked Joshu, "Does a dog have the Buddha nature?" Joshu retorte...
mu5 is Koans}, and Douglas Hofstadter's `G"odel, Escher, Bach' (pointer in the Bibliography).
mudhead is n. Commonly used to refer to a {MUD} player who sleeps, breathes, and eats MUD. Mudheads have been known to fail their degrees, drop out, etc., with the consolation, however, that they made wizard level. When encountered in person...
mudhead2 is topics: the tactic, character, or wizard that is supposedly always unfairly stopping him/her from becoming a wizard or beating a favorite MUD, and the MUD he or she is writing or going to write because all existing MUDs are so drea...
multician is /muhl-ti'shn/ [coined at Honeywell, ca. 1970] n. Competent user of {{Multics}}. Perhaps oddly, no one has ever promoted the analogous `Unician'.
Multics is /muhl'tiks/ n. [from "MULTiplexed Information and Computing Service"] An early (late 1960s) timesharing operating system co-designed by a consortium including MIT, GE, and Bell Laboratories. Very innovative for its time --- among o...
Multics2 is treating all devices uniformly as special files. All the members but GE eventually pulled out after determining that {second-system effect} had bloated Multics to the point of practical unusability (the `lean' predecessor in que...
Multics3 is Multics after buying out GE's computer group, but it was never very successful (among other things, on some versions one was commonly required to enter a password to log out). One of the developers left in the lurch by the proje...
Multics4 is which led directly to the birth of {{UNIX}}. For this and other reasons, aspects of the Multics design remain a topic of occasional debate among hackers. See also {brain-damaged} and {GCOS}.
multitask is n. Often used of humans in the same meaning it has for computers, to describe a person doing several things at once (but see {thrash}). The term `multiplex', from communications technology (meaning to handle more than one channel...
mumblage is /muhm'bl*j/ n. The topic of one's mumbling (see {mumble}). "All that mumblage" is used like "all that stuff" when it is not quite clear how the subject of discussion works, or like "all that crap" when `mumble' is being used as an ...
mumble is interj. 1. Said when the correct response is too complicated to enunciate, or the speaker has not thought it out. Often prefaces a longer answer, or indicates a general reluctance to get into a long discussion. "Don't you think that...
mumble2 is a hybrid reference-count transaction garbage collector, if the cache is big enough and there are some extra cache bits for the microcode to use?" "Well, mumble ... I'll have to think about it." 2. Sometimes used as an expression...
mumble3 is {VAX}." "Mumble!" Common variant: `mumble frotz' (see {frotz}; interestingly, one does not say `mumble frobnitz' even though `frotz' is short for `frobnitz'). 3. Yet another metasyntactic variable, like {foo}. 4. When used as a ...
mumble4 is understand you". 5. Sometimes used in `public' contexts on-line as a placefiller for things one is barred from giving details about. For example, a poster with pre-released hardware in his machine might say "Yup, my machine now ...
mumble5 is I'm testing for Mumbleco."
munch is [often confused with {mung}, q.v.] vt. To transform information in a serial fashion, often requiring large amounts of computation. To trace down a data structure. Related to {crunch} and nearly synonymous with {grovel}, but connotes...
munching is n. Exploration of security holes of someone else's computer for thrills, notoriety, or to annoy the system manager. Compare {cracker}. See also {hacked off}.
munching squares is n. A {display hack} dating back to the PDP-1 (ca. 1962, reportedly discovered by Jackson Wright), which employs a trivial computation (repeatedly plotting the graph Y = X XOR T for successive values of T --- see {HAKMEM} it...
munching squares2 is display of moving and growing squares that devour the screen. The initial value of T is treated as a parameter, which, when well-chosen, can produce amazing effects. Some of these, later (re)discovered on the LISP machin...
munching squares3 is (try AND for XOR and toggling points instead of plotting them), `munching w's', and `munching mazes'. More generally, suppose a graphics program produces an impressive and ever-changing display of some basic form, foo, on...
munching squares4 is relatively simple program; then the program (or the resulting display) is likely to be referred to as `munching foos' (this is a good example of the use of the word {foo} as a metasyntactic variable).
munchkin is /muhnch'kin/ [from the squeaky-voiced little people in L. Frank Baum's `The Wizard of Oz'] n. A teenage-or-younger micro enthusiast hacking BASIC or something else equally constricted. A term of mild derision --- munchkins are ann...
munchkin2 is passing through a {larval stage}. The term {urchin} is also used. See also {wannabee}, {bitty box}.
mundane is [from SF fandom] n. 1. A person who is not in science fiction fandom. 2. A person who is not in the computer industry. In this sense, most often an adjectival modifier as in "in my mundane life...." See also {Real World}.
mung is /muhng/ alt. `munge' /muhnj/ [in 1960 at MIT, `Mash Until No Good'; sometime after that the derivation from the {{recursive acronym}} `Mung Until No Good' became standard] vt. 1. To make changes to a file, esp. large-scale and irrevoca...
mung2 is usually accidentally, occasionally maliciously. The system only mungs things maliciously; this is a consequence of {Finagle's Law}. See {scribble}, {mangle}, {trash}, {nuke}. Reports from {USENET} suggest that the pronunciation /...
mung3 is spelling `mung' is still common in program comments (compare the widespread confusion over the proper spelling of {kluge}). 3. The kind of beans of which the sprouts are used in Chinese food. (That's their real name! Mung beans! R...
Music is n. A common extracurricular interest of hackers (compare {{science-fiction fandom}}, {{oriental food}}; see also {filk}). Hackish folklore has long claimed that musical and programming abilities are closely related, and there has bee...
Music2 is that supports this. Hackers, as a rule, like music and often develop musical appreciation in unusual and interesting directions. Folk music is very big in hacker circles; so is electronic music, and the sort of elaborate instrumen...
Music3 is `progressive' and isn't recorded much any more. The hacker's musical range tends to be wide; many can listen with equal appreciation to (say) Talking Heads, Yes, Gentle Giant, Spirogyra, Scott Joplin, Tangerine Dream, King Sunny Ade...
Music4 is Concerti. It is also apparently true that hackerdom includes a much higher concentration of talented amateur musicians than one would expect from a similar-sized control group of {mundane} types.
mutter is vt. To quietly enter a command not meant for the ears, eyes, or fingers of ordinary mortals. Often used in `mutter an {incantation}'. See also {wizard}.
N is /N/ quant. 1. A large and indeterminate number of objects: "There were N bugs in that crock!" Also used in its original sense of a variable name: "This crock has N bugs, as N goes to infinity." (The true number of bugs is always at le...
N2 is inherited from the current context. For example, when a meal is being ordered at a restaurant, N may be understood to mean however many people there are at the table. From the remark "We'd like to order N wonton soups and a family di...
N3 is person at the table wants to eat only soup, even though you don't know how many people there are (see {great-wall}). 3. `Nth': adj. The ordinal counterpart of N, senses #1 and #2. "Now for the Nth and last time..." In the specific co...
N4 is assumed to be at least 4, and is usually 5 or more (see {tenured graduate student}). See also {{random numbers}}, {two-to-the-n}.
nailed to the wall is [like a trophy] adj. Said of a bug finally eliminated after protracted, and even heroic, effort.
nailing jelly is vi. See {like nailing jelly to a tree}.
na"ive is adj. Untutored in the perversities of some particular program or system; one who still tries to do things in an intuitive way, rather than the right way (in really good designs these coincide, but most designs aren't `really good' in...
na"ive2 is unrelated to general maturity or competence, or even competence at any other specific program. It is a sad commentary on the primitive state of computing that the natural opposite of this term is often claimed to be `experienced ...
na"ive user is n. A {luser}. Tends to imply someone who is ignorant mainly owing to inexperience. When this is applied to someone who *has* experience, there is a definite implication of stupidity.
NAK is /nak/ [from the ASCII mnemonic for 0010101] interj. 1. On-line joke answer to {ACK}?: "I'm not here." 2. On-line answer to a request for chat: "I'm not available." 3. Used to politely interrupt someone to tell them you don't understan...
NAK2 is stopped making sense. See {ACK}, sense 3. "And then, after we recode the project in COBOL...." "Nak, Nak, Nak! I thought I heard you say COBOL!"
nano is /nan'oh/ [CMU: from `nanosecond'] n. A brief period of time. "Be with you in a nano" means you really will be free shortly, i.e., implies what mainstream people mean by "in a jiffy" (whereas the hackish use of `jiffy' is quite differe...
nano- is [SI: the next quantifier below {micro-}; meaning * 10^{-9}] pref. Smaller than {micro-}, and used in the same rather loose and connotative way. Thus, one has {{nanotechnology}} (coined by hacker K. Eric Drexler) by analogy with `mi...
nano-2 is architectures have a `nanocode' level below `microcode'. Tom Duff at Bell Labs has also pointed out that "Pi seconds is a nanocentury". See also {{quantifiers}}, {pico-}, {nanoacre}, {nanobot}, {nanocomputer}, {nanofortnight}.
nanoacre is /nan'oh-ay`kr/ n. A unit (about 2 mm square) of real estate on a VLSI chip. The term gets its giggle value from the fact that VLSI nanoacres have costs in the same range as real acres once one figures in design and fabrication-set...
nanobot is /nan'oh-bot/ n. A robot of microscopic proportions, presumably built by means of {{nanotechnology}}. As yet, only used informally (and speculatively!). Also called a `nanoagent'.
nanocomputer is /nan'oh-k*m-pyoo'tr/ n. A computer whose switching elements are molecular in size. Designs for mechanical nanocomputers which use single-molecule sliding rods for their logic have been proposed. The controller for a {nanobot}...
nanofortnight is [Adelaide University] n. 1 fortnight * 10^-9, or about 1.2 msec. This unit was used largely by students doing undergraduate practicals. See {microfortnight}, {attoparsec}, and {micro-}.
nanotechnology is /nan'-oh-tek-no`l*-jee/ n. A hypothetical fabrication technology in which objects are designed and built with the individual specification and placement of each separate atom. The first unequivocal nanofabrication experiments...
nanotechnology2 is with the deposition of individual xenon atoms on a nickel substrate to spell the logo of a certain very large computer company. Nanotechnology has been a hot topic in the hacker subculture ever since the term was coined by ...
factpacks/jargon-split.fact view on Meta::CPAN
replicator2 is claimed by some that {{UNIX}} and {C} are the symbiotic halves of an extremely successful replicator; see {UNIX conspiracy}.
reply is n. See {followup}.
reset is [the MUD community] v. In AberMUD, to bring all dead mobiles to life and move items back to their initial starting places. New players who can't find anything shout "Reset! Reset!" quite a bit. Higher-level players shout back "No way!...
reset2 is found. Used in {RL}, it means to put things back to the way they were when you found them.
restriction is n. A {bug} or design error that limits a program's capabilities, and which is sufficiently egregious that nobody can quite work up enough nerve to describe it as a {feature}. Often used (esp. by {marketroid} types) to make it s...
restriction2 is been intended by the designers all along, or was forced upon them by arcane technical constraints of a nature no mere user could possibly comprehend (these claims are almost invariably false). Old-time hacker Joseph M. Newcom...
restriction3 is quantifiable but arbitrary restriction, you should make it either a power of 2 or a power of 2 minus 1. If you impose a limit of 17 items in a list, everyone will know it is a random number --- on the other hand, a limit of 15...
restriction4 is 0- or 1-based indexing in binary) and you will get less {flamage} for it. Limits which are round numbers in base 10 are always especially suspect.
retcon is /ret'kon/ [`retroactive continuity', from the USENET newsgroup rec.arts.comics] 1. n. The common situation in pulp fiction (esp. comics or soap operas) where a new story `reveals' things about events in previous stories, usually leav...
retcon2 is continuity) while completely changing their interpretation. E.g., revealing that a whole season of "Dallas" was a dream was a retcon. 2. vt. To write such a story about a character or fictitious object. "Byrne has retconned Sup...
retcon3 is unbreakable." "Marvelman's old adventures were retconned into synthetic dreams." "Swamp Thing was retconned from a transformed person into a sentient vegetable." [This is included because it is a good example of hackish linguisti...
retcon4 is to computers. The word `retcon' will probably spread through comics fandom and lose its association with hackerdom within a couple of years; for the record, it started here. --- ESR]
RETI is v. Syn. {RTI}
retrocomputing is /ret'-roh-k*m-pyoo'ting/ n. Refers to emulations of way-behind-the-state-of-the-art hardware or software, or implementations of never-was-state-of-the-art; esp. if such implementations are elaborate practical jokes and/or par...
retrocomputing2 is the most widely distributed retrocomputing utility was the `pnch(6)' or `bcd(6)' program on V7 and other early UNIX versions, which would accept up to 80 characters of text argument and display the corresponding pattern in...
retrocomputing3 is retrocomputing hacks have included the programming language {INTERCAL}, a {JCL}-emulating shell for UNIX, the card-punch-emulating editor named 029, and various elaborate PDP-11 hardware emulators and RT-11 OS emulators wr...
RFC is /R-F-C/ [Request For Comment] n. One of a long-established series of numbered Internet standards widely followed by commercial and PD software in the Internet and UNIX communities. Perhaps the single most influential one has been RFC-8...
RFC2 is RFCs are unusual in that they are floated by technical experts acting on their own initiative and reviewed by the Internet at large, rather than formally promulgated through an institution such as ANSI. For this reason, they remain ...
RFE is /R-F-E/ n. 1. [techspeak] Request For Enhancement. 2. [from `Radio Free Europe', Bellcore and Sun] Radio Free Ethernet, a system (originated by Peter Langston) for broadcasting audio among Sun SPARCstations over the ethernet.
rib site is [by analogy with {backbone site}] n. A machine that has an on-demand high-speed link to a {backbone site} and serves as a regional distribution point for lots of third-party traffic in email and USENET news. Compare {leaf site}, {...
rice box is [from ham radio slang] n. Any Asian-made commodity computer, esp. an 80x86-based machine built to IBM PC-compatible ISA or EISA-bus standards.
Right Thing is n. That which is {compellingly} the correct or appropriate thing to use, do, say, etc. Often capitalized, always emphasized in speech as though capitalized. Use of this term often implies that in fact reasonable people may dis...
Right Thing2 is do when it sees `(mod a 0)'? Should it return `a', or give a divide-by-0 error?" Oppose {Wrong Thing}.
RL is // [MUD community] n. Real Life. "Firiss laughs in RL" means that Firiss's player is laughing. Oppose {VR}.
roach is [Bell Labs] vt. To destroy, esp. of a data structure. Hardware gets {toast}ed or {fried}, software gets roached.
robust is adj. Said of a system that has demonstrated an ability to recover gracefully from the whole range of exceptional inputs and situations in a given environment. One step below {bulletproof}. Carries the additional connotation of elega...
robust2 is detail. Compare {smart}, oppose {brittle}.
rococo is adj. {Baroque} in the extreme. Used to imply that a program has become so encrusted with the software equivalent of gold leaf and curlicues that they have completely swamped the underlying design. Called after the later and more ex...
rococo2 is decoration prevalent during the mid-1700s in Europe. Fred Brooks (the man who coined {second-system effect}) said "Every program eventually becomes rococo, and then rubble."
rogue is [UNIX] n. A Dungeons-and-Dragons-like game using character graphics, written under BSD UNIX and subsequently ported to other UNIX systems. The original BSD `curses(3)' screen-handling package was hacked together by Ken Arnold to supp...
rogue2 is UNIX's most important and heavily used application libraries. Nethack, Omega, Larn, and an entire subgenre of computer dungeon games all took off from the inspiration provided by `rogue(6)'. See {nethack}.
room-temperature IQ is [IBM] quant. 80 or below. Used in describing the expected intelligence range of the {luser}. "Well, but how's this interface going to play with the room-temperature IQ crowd?" See {drool-proof paper}. This is a much ...
root is [UNIX] n. 1. The {superuser} account that ignores permission bits, user number 0 on a UNIX system. This account has the user name `root'. The term {avatar} is also used. 2. The top node of the system directory structure (home directo...
root2 is privileged system-maintenance login on any OS. See {root mode}, {go root}.
root mode is n. Syn. with {wizard mode} or `wheel mode'. Like these, it is often generalized to describe privileged states in systems other than OSes.
rot13 is /rot ther'teen/ [USENET from `rotate alphabet 13 places'] n., v. The simple Caesar-cypher encryption that replaces each English letter with the one 13 places forward or back along the alphabet, so that "The butler did it!" becomes "Gu...
rot132 is and posting programs include a rot13 feature. It is used to enclose the text in a sealed wrapper that the reader must choose to open --- e.g., for posting things that might offend some readers, or answers to puzzles. A major adva...
rot133 is it is self-inverse, so the same code can be used for encoding and decoding.
rotary debugger is [Commodore] n. Essential equipment for those late-night or early-morning debugging sessions. Mainly used as sustenance for the hacker. Comes in many decorator colors, such as Sausage, Pepperoni, and Garbage. See {pizza, A...
RSN is // adj. See {Real Soon Now}.
RTFAQ is /R-T-F-A-Q/ [USENET primarily written, by analogy with {RTFM}] imp. Abbrev. for `Read the FAQ!', an exhortation that the person addressed ought to read the newsgroup's {FAQ list} before posting questions.
RTFM is /R-T-F-M/ [UNIX] imp. Acronym for `Read The Fucking Manual'. 1. Used by {guru}s to brush off questions they consider trivial or annoying. Compare {Don't do that, then!} 2. Used when reporting a problem to indicate that you aren't jus...
RTFM2 is figure out how to interface UNIX to my toaster, and yes, I have RTFM." Unlike sense 1, this use is considered polite. See also {RTFAQ}, {RTM}. The variant RTFS, where S = `Standard', has also been reported. Compare {UTSL}.
RTI is /R-T-I/ interj. The mnemonic for the `return from interrupt' instruction on many computers including the 6502 and 6800. The variant `RETI' is found among former Z80 hackers (almost nobody programs these things in assembler anymore). E...
RTI2 is end a conversational digression. See {pop}; see also {POPJ}.
RTM is /R-T-M/ [USENET acronym for `Read The Manual'] 1. Politer variant of {RTFM}. 2. Robert T. Morris, perpetrator of the great Internet worm of 1988; villain to many, na"ive hacker gone wrong to a few. Morris claimed that the worm that br...
RTM2 is experiment that got out of control as the result of a coding error. After the storm of negative publicity that followed this blunder, Morris's name on ITS was hacked from RTM to {RTFM}.
rude is [WPI] adj. 1. (of a program) Badly written. 2. Functionally poor, e.g., a program that is very difficult to use because of gratuitously poor (random?) design decisions. See {cuspy}.
runes is pl.n. 1. Anything that requires {heavy wizardry} or {black art} to {parse} core dumps, JCL commands, APL, or code in a language you haven't a clue how to read. Compare {casting the runes}, {Great Runes}. 2. Special display character...
runic is adj. Syn. {obscure}. VMS fans sometimes refer to UNIX as `Runix'; UNIX fans return the compliment by expanding VMS to `Very Messy Syntax' or `Vachement Mauvais Syst`eme' (French; lit. "Cowlike Bad System", idiomatically "Bitchy Bad S...
rusty iron is n. Syn. {tired iron}. It has been claimed that this is the inevitable fate of {water MIPS}.
rusty memory is n. Mass-storage that uses iron-oxide-based magnetic media (esp. tape and the pre-Winchester removable disk packs used in {washing machine}s). Compare {donuts}.*S/N ratio // n. (also `s/n ratio', `sn ratio'). Syn. {signal-to-n...
sacred is adj. Reserved for the exclusive use of something (an extension of the standard meaning). Often means that anyone may look at the sacred object, but clobbering it will screw whatever it is sacred to. The comment "Register 7 is sacre...
sacred2 is program would be interpreted by a hacker to mean that if any *other* part of the program changes the contents of register 7, dire consequences are likely to ensue.
saga is [WPI] n. A cuspy but bogus raving story about N random broken people.
sagan is /say'gn/ [from Carl Sagan's TV series "Cosmos"; think "billions and billions"] n. A large quantity of anything. "There's a sagan different ways to tweak EMACS." "The U.S. Government spends sagans on bombs and welfare --- hard to say ...
SAIL is /sayl/, not /S-A-I-L/ n. 1. Stanford Artificial Intelligence Lab. An important site in the early development of LISP; with the MIT AI Lab, BBN, CMU, and the UNIX community, one of the major wellsprings of technical innovation and hack...
SAIL2 is entry for details). The SAIL machines were officially shut down in late May 1990, scant weeks after the MIT AI Lab's ITS cluster was officially decommissioned. 2. The Stanford Artificial Intelligence Language used at SAIL (sense 1)...
SAIL3 is coroutining facility and some new data types intended for building search trees and association lists.
salescritter is /sayls'kri`tr/ n. Pejorative hackerism for a computer salesperson. Hackers tell the following joke Q. What's the difference between a used-car dealer and a computer salesman? A. The used-car dealer knows he's lying....
salescritter2 is that salescritters are self-selected for stupidity (after all, if they had brains and the inclination to use them, they'd be in programming). The terms `salesthing' and `salesdroid' are also common. Compare {marketroid}, {...
salsman is /salz'm*n/ v. To flood a mailing list or newsgroup with huge amounts of useless, trivial or redundant information. From the name of a hacker who has frequently done this on some widely distributed mailing lists.
salt mines is n. Dense quarters housing large numbers of programmers working long hours on grungy projects, with some hope of seeing the end of the tunnel in N years. Noted for their absence of sunshine. Compare {playpen}, {sandbox}.
salt substrate is [MIT] n. Collective noun used to refer to potato chips, pretzels, saltines, or any other form of snack food designed primarily as a carrier for sodium chloride. From the technical term `chip substrate', used to refer to the ...
salt substrate2 is of integrated circuits are deposited.
same-day service is n. Ironic term used to describe long response time, particularly with respect to {{MS-DOS}} system calls (which ought to require only a tiny fraction of a second to execute). Such response time is a major incentive for prog...
same-day service2 is {well-behaved}. See also {PC-ism}.
sandbender is [IBM] n. A person involved with silicon lithography and the physical design of chips. Compare {ironmonger}, {polygon pusher}.
sandbox is n. (or `sandbox, the') Common term for the R&D department at many software and computer companies (where hackers in commercial environments are likely to be found). Half-derisive, but reflects the truth that research is a form of c...
sanity check is n. 1. The act of checking a piece of code (or anything else, e.g., a USENET posting) for completely stupid mistakes. Implies that the check is to make sure the author was sane when it was written; e.g., if a piece of scientific...
sanity check2 is was giving unexpected results, one might first look at the nesting of parentheses or the coding of the formula, as a {sanity check}, before looking at the more complex I/O or data structure manipulation routines, much less the...
sanity check3 is 2. A run-time test, either validating input or ensuring that the program hasn't screwed up internally (producing an inconsistent value or state).
Saturday night special is [from police slang for a cheap handgun] n. A program or feature kluged together during off hours, under a deadline, and in response to pressure from a {salescritter}. Such hacks are dangerously unreliable, but all too...
say is vt. 1. To type to a terminal. "To list a directory verbosely, you have to say `ls -l'." Tends to imply a {newline}-terminated command (a `sentence'). 2. A computer may also be said to `say' things to you, even if it doesn't have a ...
say2 is terminal in response to your commands. Hackers find it odd that this usage confuses {mundane}s.
science-fiction fandom is n. Another voluntary subculture having a very heavy overlap with hackerdom; most hackers read SF and/or fantasy fiction avidly, and many go to `cons' (SF conventions) or are involved in fandom-connected activities suc...
science-fiction fandom2 is Some hacker jargon originated in SF fandom; see {defenestration}, {great-wall}, {cyberpunk}, {h}, {ha ha only serious}, {IMHO}, {mundane}, {neep-neep}, {Real Soon Now}. Additionally, the jargon terms {cowboy}, {cy...
science-fiction fandom3 is {virus}, {wetware}, {wirehead}, and {worm} originated in SF stories.
scram switch is [from the nuclear power industry] n. An emergency-power-off switch (see {Big Red Switch}), esp. one positioned to be easily hit by evacuating personnel. In general, this is *not* something you {frob} lightly; these often ini...
scram switch2 is and are installed in a {dinosaur pen} for use in case of electrical fire or in case some luckless {field servoid} should put 120 volts across himself while {Easter egging}.
scratch is 1. [from `scratchpad'] adj. Describes a data structure or recording medium attached to a machine for testing or temporary-use purposes; one that can be {scribble}d on without loss. Usually in the combining forms `scratch memory', ...
scratch2 is tape', `scratch volume'. See {scratch monkey}. 2. [primarily IBM] vt. To delete (as in a file).
scratch monkey is n. As in "Before testing or reconfiguring, always mount a {scratch monkey}", a proverb used to advise caution when dealing with irreplaceable data or devices. Used to refer to any scratch volume hooked to a computer during a...
scratch monkey2 is precious resource or data that might otherwise get trashed. This term preserves the memory of Mabel, the Swimming Wonder Monkey, star of a biological research program at the University of Toronto ca. 1986. Mabel was not (...
scratch monkey3 is university had spent years teaching her how to swim, breathing through a regulator, in order to study the effects of different gas mixtures on her physiology. Mabel suffered an untimely demise one day when DEC {PM}ed the PD...
scratch monkey4 is {provocative maintainance}). It is recorded that, after calming down an understandably irate customer sufficiently to ascertain the facts of the matter, a DEC troubleshooter called up the {field circus} manager responsible ...
scratch monkey5 is all the consequences to humans were so amusing; the sysop of the machine in question was nearly thrown in jail at the behest of certain clueless droids at the local `humane' society. The moral is clear When in doubt, always...
screw is [MIT] n. A {lose}, usually in software. Especially used for user-visible misbehavior caused by a bug or misfeature. This use has become quite widespread outside MIT.
screwage is /skroo'*j/ n. Like {lossage} but connotes that the failure is due to a designed-in misfeature rather than a simple inadequacy or a mere bug.
scribble is n. To modify a data structure in a random and unintentionally destructive way. "Bletch! Somebody's disk-compactor program went berserk and scribbled on the i-node table." "It was working fine until one of the allocation routines ...
scribble2 is {trash}; compare {mung}, which conveys a bit more intention, and {mangle}, which is more violent and final.
scrog is /skrog/ [Bell Labs] vt. To damage, trash, or corrupt a data structure. "The list header got scrogged." Also reported as `skrog', and ascribed to the comic strip "The Wizard of Id". Equivalent to {scribble} or {mangle}.
scrool is /skrool/ [from the pioneering Roundtable chat system in Houston ca. 1984; prob. originated as a typo for `scroll'] n. The log of old messages, available for later perusal or to help one get back in synch with the conversation. It was...
scrool2 is because an early version of the roundtable software had a bug where it would dump all 8K of scrool on a user's terminal.
scrozzle is /skroz'l/ vt. Used when a self-modifying code segment runs incorrectly and corrupts the running program or vital data. "The damn compiler scrozzled itself again!"
SCSI is [Small Computer System Interface] n. A bus-independent standard for system-level interfacing between a computer and intelligent devices. Typically annotated in literature with `sexy' (/sek'see/), `sissy' (/sis'ee/), and `scuzzy' (/sku...
SCSI2 is being the overwhelmingly predominant form, much to the dismay of the designers and their marketing people. One can usually assume that a person who pronounces it /S-C-S-I/ is clueless.
search-and-destroy mode is n. Hackerism for the search-and-replace facility in an editor, so called because an incautiously chosen match pattern can cause {infinite} damage.
second-system effect is n. (sometimes, more euphoniously, `second-system syndrome') When one is designing the successor to a relatively small, elegant, and successful system, there is a tendency to become grandiose in one's success and design ...
second-system effect2 is The term was first used by Fred Brooks in his classic `The Mythical Man-Month Essays on Software Engineering' (Addison-Wesley, 1975; ISBN 0-201-00650-2). It described the jump from a set of nice, simple operating sy...
second-system effect3 is 360 series. A similar effect can also happen in an evolving system; see {Brooks's Law}, {creeping elegance}, {creeping featurism}. See also {{Multics}}, {OS/2}, {X}, {software bloat}. This version of the jargon lex...
second-system effect4 is much truth for comfort) as an example of second-system effect run amok on jargon-1....
secondary damage is n. When a fatal error occurs (esp. a {segfault}) the immediate cause may be that a pointer has been trashed due to a previous {fandango on core}. However, this fandango may have been due to an *earlier* fandango, so no a...
secondary damage2 is the damage occurred. "The data structure was clobbered, but it was secondary damage." By extension, the corruption resulting from N cascaded fandangoes on core is `Nth-level damage'. There is at least one case on record...
secondary damage3 is actually dug up the underlying bug behind an instance of seventh-level damage! The hacker who accomplished this near-superhuman feat was presented with an award by his fellows.
security through obscurity is n. A name applied by hackers to most OS vendors' favorite way of coping with security holes --- namely, ignoring them and not documenting them and trusting that nobody will find out about them and that people who ...
security through obscurity2 is This never works for long and occasionally sets the world up for debacles like the {RTM} worm of 1988, but once the brief moments of panic created by such events subside most vendors are all too willing to turn o...
security through obscurity3 is fixing the bugs would siphon off the resources needed to implement the next user-interface frill on marketing's wish list --- and besides, if they started fixing security bugs customers might begin to *expect* it...
security through obscurity4 is merchantability gave them some sort of *right* to a system with fewer holes in it than a shotgunned Swiss cheese, and then where would we be? Historical note It is claimed (with dissent from {{ITS}} fans who sa...
security through obscurity5 is in a positive sense) that this term was first used in the USENET newsgroup in comp.sys.apollo during a campaign to get HP/Apollo to fix security problems in its UNIX-{clone} Aegis/DomainOS. They didn't change ...
SED is [TMRC, from `Light-Emitting Diode'] /S-E-D/ n. Smoke-emitting diode. A {friode} that lost the war. See {LER}.
segfault is n.,vi. Syn. {segment}, {seggie}.
seggie is /seg'ee/ [UNIX] n. Shorthand for {segmentation fault} reported from Britain.
segment is /seg'ment/ vi. To experience a {segmentation fault}. Confusingly, this is often pronounced more like the noun `segment' than like mainstream v. segment; this is because it is actually a noun shorthand that has been verbed.
segmentation fault is n. [UNIX] 1. An error in which a running program attempts to access memory not allocated to it and {core dump}s with a segmentation violation error. 2. To lose a train of thought or a line of reasoning. Also uttered as ...
segv is /seg'vee/ n.,vi. Yet another synonym for {segmentation fault} (actually, in this case, `segmentation violation').
self-reference is n. See {self-reference}.
selvage is /sel'v*j/ [from sewing] n. See {chad} (sense 1).
semi is /se'mee/ or /se'mi/ 1. n. Abbreviation for `semicolon', when speaking. "Commands to {grind} are prefixed by semi-semi-star" means that the prefix is `;;*', not 1/4 of a star. 2. A prefix used with words such as `immediately' as a q...
semi2 is "Semi-immediately." (That is, maybe not for an hour.) "We did consider that possibility semi-seriously." See also {infinite}.
semi-infinite is n. See {infinite}.
factpacks/jargon-split.fact view on Meta::CPAN
time T3 is hasnt been decided on yet), you can meet half an hour later at Louies than you could on campus and end up eating at the same time. See also {since time T equals minus infinity}.
times-or-divided-by is [by analogy with `plus-or-minus] quant. Term occasionally used when describing the uncertainty associated with a scheduling estimate, for either humorous or brutally honest effect. For a software project, the factor is u...
tinycrud is /tinee-kruhd/ n. A pejorative used by habitues of older game-oriented {MUD} versions for TinyMUDs and other user-extensible {MUD} variants; esp. common among users of the rather violent and competitive AberMUD and MIST systems. Th...
tinycrud2 is how (allegedly) inconsistent and lacking in genuine atmosphere the scenarios generated in user extensible MUDs can be. Other common knocks on them are that they feature little overall plot, bad game topology, little competitive...
tinycrud3 is alleged horrors of the TinyMUD code itself. This dispute is one of the MUD worlds hardiest perennial {holy wars}.
tip of the ice-cube is [IBM] n. The visible part of something small and insignificant. Used as an ironic comment in situations where `tip of the iceberg might be appropriate if the subject were actually nontrivial.
tired iron is [IBM] n. Hardware that is perfectly functional but far enough behind the state of the art to have been superseded by new products, presumably with sufficient improvement in bang-per-buck that the old stuff is starting to look a b...
tits on a keyboard is n. Small bumps on certain keycaps to keep touch-typists registered (usually on the `5 of a numeric keypad, and on the `F and `J of a QWERTY keyboard).
TLA is /T-L-A/ [Three-Letter Acronym] n. 1. Self-describing acronym for a species with which computing terminology is infested. 2. Any confusing acronym. Examples include MCA, FTP, SNA, CPU, MMU, SCCS, DMU, FPU, NNTP, TLA. People who like th...
TLA2 is three letters, just as not all four-letter words have four letters. One also hears of `ETLA (Extended Three-Letter Acronym, pronounced /ee tee el ay/) being used to describe four-letter acronyms. The term `SFLA (Stupid Four-Letter ...
TLA3 is {YABA}. The self-effacing phrase "TDM TLA" (Too Damn Many...) is often used to bemoan the plethora of TLAs in use. In 1989, a random of the journalistic persuasion asked hacker Paul Boutin "What do you think will be the biggest prob...
TLA4 is straight-faced response "There are only 17,000 three-letter acronyms." (To be exact, there are 26^3 = 17,576.)
TMRC is /tmerk/ n. The Tech Model Railroad Club at MIT, one of the wellsprings of hacker culture. The 1959 `Dictionary of the TMRC Language compiled by Peter Samson included several terms which became basics of the hackish vocabulary (see esp...
TMRC2 is legendary layout was already a marvel of complexity. The control system alone featured about 1200 relays. There were {scram switch}es located at numerous places around the room that could be pressed if something undesirable was about...
TMRC3 is an obstruction. Another feature of the system was a digital clock on the dispatch board. Normally it ran at some multiple of real time, but if someone hit a scram switch the clock stopped and the display was replaced with the word ...
TMRC4 is the Bibliography), gives a stimulating account of those early years. TMRCs Power and Signals group included most of the early PDP-1 hackers and the people who later bacame the core of the MIT AI Lab staff. Thirty years later that ...
TMRC5 is lexicon accordingly includes a number of entries from a recent revision of the TMRC Dictionary.
to a first approximation is 1. [techspeak] When one is doing certain numerical computations, an approximate solution may be computed by any of several heuristic methods, then refined to a final value. By using the starting point of a first app...
to a first approximation2 is algorithm that converges more quickly to the correct result. 2. In jargon, a preface to any comment that indicates that the comment is only approximately true. The remark "To a first approximation, I feel good" m...
to a first approximation3 is reveal that not all is perfect (e.g., a nagging cough still remains after an illness).
to a zeroth approximation is [from `to a first approximation] A *really* sloppy approximation; a wild guess. Compare {social science number}.
toast is 1. n. Any completely inoperable system or component, esp. one that has just crashed and burned "Uh, oh ... I think the serial board is toast." 2. vt. To cause a system to crash accidentally, especially in a manner that requires manua...
toast2 is {firewall machine} again."
toaster is n. 1. The archetypal really stupid application for an embedded microprocessor controller; often used in comments that imply that a scheme is inappropriate technology (but see {elevator controller}). "{DWIM} for an assembler? Thatd...
toaster2 is toaster!" 2. A very, very dumb computer. "You could run this program on any dumb toaster." See {bitty box}, {Get a real computer!}, {toy}, {beige toaster}. 3. A Macintosh, esp. the Classic Mac. Some hold that this is implied b...
toaster3 is my box without toasters, but since then Ive added two boards and a second disk drive."
toeprint is n. A {footprint} of especially small size.
toggle is vt. To change a {bit} from whatever state it is in to the other state; to change from 1 to 0 or from 0 to 1. This comes from `toggle switches, such as standard light switches, though the word `toggle actually refers to the mechanism...
toggle2 is which it is flipped rather than to the fact that the switch has two positions. There are four things you can do to a bit set it (force it to be 1), clear (or zero) it, leave it alone, or toggle it. (Mathematically, one would say t...
toggle3 is functions of one boolean argument, but saying that is much less fun than talking about toggling bits.)
tool is 1. n. A program used primarily to create, manipulate, modify, or analyze other programs, such as a compiler or an editor or a cross-referencing program. Oppose {app}, {operating system}. 2. [UNIX] An application program with a simple,...
tool2 is interface designed specifically to be used in programmed combination with other tools (see {filter}). 3. [MIT general to students there] vi. To work; to study (connotes tedium). The TMRC Dictionary defined this as "to set ones brain ...
tool3 is A student who studies too much and hacks too little. (MITs student humor magazine rejoices in the name `Tool and Die.)
toolsmith is n. The software equivalent of a tool-and-die specialist; one who specializes in making the {tool}s with which other programmers create applications. See also {uninteresting}.
topic drift is n. Term used on GEnie, USENET and other electronic fora to describe the tendency of a {thread} to drift away from the original subject of discussion (and thus, from the Subject header of the originating message), or the results ...
topic drift2 is reminders that the discussion has strayed off any useful track. "I think we started with a question about Nivens last book, but weve ended up discussing the sexual habits of the common marmoset. Now *thats* topic drift!"
topic group is n. Syn. {forum}.
TOPS-10 is /tops-ten/ n. DECs proprietary OS for the fabled {PDP-10} machines, long a favorite of hackers but now effectively extinct. A fountain of hacker folklore; see appendix A. See also {{ITS}}, {{TOPS-20}}, {{TWENEX}}, {VMS}, {operating...
TOPS-102 is BOTS-10 (from `bottoms-ten) as a comment on the inappropriateness of describing it as the top of anything.
TOPS-20 is /tops-twentee/ n. See {{TWENEX}}.
toto is /tohtoh/ n. This is reported to be the default scratch file name among French-speaking programmers --- in other words, a francophone {foo}.
tourist is [ITS] n. A guest on the system, especially one who generally logs in over a network from a remote location for {comm mode}, email, games, and other trivial purposes. One step below {luser}. Hackers often spell this {turist}, perha...
tourist2 is {luser} (this also expresses the ITS cultures penchant for six-letterisms). Compare {twink}, {read-only user}.
tourist information is n. Information in an on-line display that is not immediately useful, but contributes to a viewers gestalt of whats going on with the software or hardware behind it. Whether a given piece of info falls in this category d...
tourist information2 is for at any given time. The `bytes free information at the bottom of an MS-DOS `dir display is tourist information; so (most of the time) is the TIME information in a UNIX `ps(1) display.
touristic is adj. Having the quality of a {tourist}. Often used as a pejorative, as in `losing touristic scum. Often spelled `turistic or `turistik, so that phrase might be more properly rendered `lusing turistic scum.
toy is n. A computer system; always used with qualifiers. 1. `nice toy One that supports the speakers hacking style adequately. 2. `just a toy A machine that yields insufficient {computron}s for the speakers preferred uses. This is not con...
toy2 is least be fun. It is also strongly conditioned by ones expectations; Cray XMP users sometimes consider the Cray-1 a `toy, and certainly all RISC boxes and mainframes are toys by their standards. See also {Get a real computer!}.
toy language is n. A language useful for instructional purposes or as a proof-of-concept for some aspect of computer-science theory, but inadequate for general-purpose programming. {Bad Thing}s can result when a toy language is promoted as a ...
toy language2 is (see {bondage-and-discipline language}); the classic example is {{Pascal}}. Several moderately well-known formalisms for conceptual tasks such as programming Turing machines also qualify as toy languages in a less negative se...
toy problem is [AI] n. A deliberately oversimplified case of a challenging problem used to investigate, prototype, or test algorithms for a real problem. Sometimes used pejoratively. See also {gedanken}, {toy program}.
toy program is n. 1. One that can be readily comprehended; hence, a trivial program (compare {noddy}). 2. One for which the effort of initial coding dominates the costs through its life cycle. See also {noddy}.
trampoline is n. An incredibly {hairy} technique, found in some {HLL} and program-overlay implementations (e.g., on the Macintosh), that involves on-the-fly generation of small executable (and, likely as not, self-modifying) code objects to do...
trampoline2 is pieces of {live data} are called `trampolines. Trampolines are notoriously difficult to understand in action; in fact, it is said by those who use this term that the trampoline that doesnt bend your brain is not the true tram...
trap is 1. n. A program interrupt, usually an interrupt caused by some exceptional situation in the user program. In most cases, the OS performs some action, then returns control to the program. 2. vi. To cause a trap. "These instructions tr...
trap2 is to indicate the cause of the trap. "The monitor traps all input/output instructions." This term is associated with assembler programming (`interrupt or `exception is more common among {HLL} programmers) and appears to be fading int...
trap3 is assembler continues to shrink. However, it is still important to computer architects and systems hackers (see {system}, sense 1), who use it to distinguish deterministically repeatable exceptions from timing-dependent ones (such as I...
trap door is alt. `trapdoor n. 1. Syn. {back door}. 2. [techspeak] A `trap-door function is one which is easy to compute but very difficult to compute the inverse of. Such functions have important applications in cryptography, specifically ...
trash is vt. To destroy the contents of (said of a data structure). The most common of the family of near-synonyms including {mung}, {mangle}, and {scribble}.
tree-killer is [Sun] n. 1. A printer. 2. A person who wastes paper. This should be interpreted in a broad sense; `wasting paper includes the production of {spiffy} but {content-free} documents. Thus, most {suit}s are tree-killers.
trit is /trit/ [by analogy with `bit] n. One base-3 digit; the amount of information conveyed by a selection among one of three equally likely outcomes (see also {bit}). These arise, for example, in the context of a {flag} that should actuall...
trit2 is as yes, no, or unknown. Trits are sometimes jokingly called `3-state bits. A trit may be semi-seriously referred to as `a bit and a half, although it is linearly equivalent to 1.5849625 bits (that is, log2(3) bits).
trivial is adj. 1. Too simple to bother detailing. 2. Not worth the speakers time. 3. Complex, but solvable by methods so well known that anyone not utterly {cretinous} would have thought of them already. 4. Any problem one has already solv...
trivial2 is evaluates to `Ive seen it before). Hackers notions of triviality may be quite at variance with those of non-hackers. See {nontrivial}, {uninteresting}.
troglodyte is [Commodore] n. 1. A hacker who never leaves his cubicle. The term `Gnoll (from Dungeons & Dragons) is also reported. 2. A curmudgeon attached to an obsolescent computing environment. The combination `ITS troglodyte was flung a...
troglodyte2 is wringle-wrangle attending the 2.x.x revision of the Jargon File; at least one of the people it was intended to describe adopted it with pride.
troglodyte mode is [Rice University] n. Programming with the lights turned off, sunglasses on, and the terminal inverted (black on white) because youve been up for so many days straight that your eyes hurt (see {raster burn}). Loud music blar...
troglodyte mode2 is optional but recommended. See {larval stage}, {hack mode}.
Trojan horse is [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 ...
Trojan horse2 is destroy viruses! See {back door}, {virus}, {worm}.
true-hacker is [analogy with `trufan from SF fandom] n. One who exemplifies the primary values of hacker culture, esp. competence and helpfulness to other hackers. A high compliment. "He spent 6 hours helping me bring up UUCP and netnews on ...
true-hacker2 is act of a true-hacker." Compare {demigod}, oppose {munchkin}.
tty is /T-T-Y/ [UNIX], /titee/ [ITS, but some UNIX people say it this way as well; this pronunciation is not considered to have sexual undertones] n. 1. A terminal of the teletype variety, characterized by a noisy mechanical printer, a very li...
tty2 is Usage antiquated (like the TTYs themselves). See also {bit-paired keyboard}. 2. [especially UNIX] Any terminal at all; sometimes used to refer to the particular terminal controlling a given job.
tube is 1. n. A CRT terminal. Never used in the mainstream sense of TV; real hackers dont watch TV, except for Loony Toons, Rocky & Bullwinkle, Trek Classic, the Simpsons, and the occasional cheesy old swashbuckler movie (see appendix B). 2....
tube2 is someone elses terminal. "Tube me that note?"
tube time is n. Time spent at a terminal or console. More inclusive than hacking time; commonly used in discussions of what parts of ones environment one uses most heavily. "I find Im spending too much of my tube time reading mail since I st...
tunafish is n. In hackish lore, refers to the mutated punchline of an age-old joke to be found at the bottom of the manual pages of `tunefs(8) in the original {BSD} 4.2 distribution. The joke was removed in later releases once commercial site...
tunafish2 is to the `tuning of file-system parameters for optimum performance, and at the bottom of a few pages of wizardly inscriptions was a `BUGS section consisting of the line "You can tune a file system, but you cant tunafish". Variant...
tunafish3 is though it has been excised from some versions by humorless management {droid}s. The [nt]roff source for SunOS 4.1.1 contains a comment apparently designed to prevent this "Take this out and a Unix Demon will dog your steps from n...
tune is [from automotive or musical usage] vt. To optimize a program or system for a particular environment, esp. by adjusting numerical parameters designed as {hook}s for tuning, e.g., by changing `#define lines in C. One may `tune for time ...
tune2 is memory use), or `tune for configuration (most efficient use of hardware). See {bum}, {hot spot}, {hand-hacking}.
turbo nerd is n. See {computer geek}.
turist is /toorist/ n. Var. sp. of {tourist}, q.v. Also in adjectival form, `turistic. Poss. influenced by {luser} and `Turing.
tweak is vt. 1. To change slightly, usually in reference to a value. Also used synonymously with {twiddle}. If a program is almost correct, rather than figure out the precise problem you might just keep tweaking it until it works. See {frobn...
tweak2 is debugging}. 2. To {tune} or {bum} a program; preferred usage in the U.K.
TWENEX is /tweneks/ n. The TOPS-20 operating system by DEC --- the second proprietary OS for the PDP-10 --- preferred by most PDP-10 hackers over TOPS-10 (that is, by those who were not {{ITS}} or {{WAITS}} partisans). TOPS-20 began in 1969 a...
TWENEX2 is system using special paging hardware. By the early 1970s, almost all of the systems on the ARPANET ran TENEX. DEC purchased the rights to TENEX from BBN and began work to make it their own. The first in-house code name for the ...
TWENEX3 is Operating System); when customers started asking questions, the name was changed to SNARK so DEC could truthfully deny that there was any project called VIROS. When the name SNARK became known, the name was briefly reversed to be...
TWENEX4 is it was discovered that `krans meant `funeral shroud in Swedish. Ultimately DEC picked TOPS-20 as the name of the operating system, and it was as TOPS-20 that it was marketed. The hacker community, mindful of its origins, quickly d...
TWENEX5 is TENEX), even though by this point very little of the original TENEX code remained (analogously to the differences between AT&T V6 UNIX and BSD). DEC people cringed when they heard "TWENEX", but the term caught on nevertheless (th...
TWENEX6 is TWENEX was successful and very popular; in fact, there was a period in the early 1980s when it commanded as fervent a culture of partisans as UNIX or ITS --- but DECs decision to scrap all the internal rivals to the VAX architecture...
TWENEX7 is DEC-20 and put a sad end to TWENEXs brief day in the sun. DEC attempted to convince TOPS-20 hackers to convert to {VMS}, but instead, by the late 1980s, most of the TOPS-20 hackers had migrated to UNIX.
twiddle is n. 1. Tilde (ASCII 1111110, `~). Also called `squiggle, `sqiggle (sic --- pronounced /skigl/), and `twaddle, but twiddle is the most common term. 2. A small and insignificant change to a program. Usually fixes one bug and gener...
twiddle2 is something in a small way. Bits, for example, are often twiddled. Twiddling a switch or knob implies much less sense of purpose than toggling or tweaking it; see {frobnicate}. To speak of twiddling a bit connotes aimlessness, a...
twiddle3 is the bit; `toggling a bit has a more specific meaning (see {bit twiddling}, {toggle}).
twink is /twink/ [UCSC] n. Equivalent to {read-only user}. Also reported on the USENET group soc.motss; may derive from gay slang for a cute young thing with nothing upstairs.
two pi is quant. The number of years it takes to finish ones thesis. Occurs in stories in the following form "He started on his thesis; 2 pi years later..."
two-to-the-N is quant. An amount much larger than {N} but smaller than {infinity}. "I have 2-to-the-N things to do before I can go out for lunch" means you probably wont show up.
twonkie is /twonkee/ n. The software equivalent of a Twinkie (a variety of sugar-loaded junk food, or (in gay slang) the male equivalent of `chick); a useless `feature added to look sexy and placate a {marketroid} (compare {Saturday-night sp...
twonkie2 is Twonky", title menace of a classic SF short story by Lewis Padgett (Henry Kuttner and C. L. Moore), first published in the September 1942 `Astounding Science Fiction and subsequently much anthologized.*UBD /U-B-D/ [abbreviation f...
twonkie3 is to close out trouble reports obviously due to utter cluelessness on the user's part. Compare {pilot error}; oppose {PBD}; see also {brain-damaged}.
UN*X is n. Used to refer to the UNIX operating system (a trademark of AT&T) in writing, but avoiding the need for the ugly {(TM)} typography. Also used to refer to any or all varieties of Unixoid operating systems. Ironically, lawyers now s...
UN*X2 is TM-postfix has no legal force, but the asterisk usage is entrenched anyhow. It has been suggested that there may be a psychological connection to practice in certain religions (especially Judaism) in which the name of the deity is ne...
UN*X3 is `G--d' is used. See also {glob}.
undefined external reference is excl. [UNIX] A message from UNIX's linker. Used in speech to flag loose ends or dangling references in an argument or discussion.
under the hood is prep. [hot-rodder talk] 1. Used to introduce the underlying implementation of a product (hardware, software, or idea). Implies that the implementation is not intuitively obvious from the appearance, but the speaker is about ...
under the hood2 is now look under the hood to see how ...." 2. Can also imply that the implementation is much simpler than the appearance would indicate "Under the hood, we are just fork/execing the shell." 3. Inside a chassis, as in "Under...
undocumented feature is n. See {feature}.
uninteresting is adj. 1. Said of a problem that, although {nontrivial}, can be solved simply by throwing sufficient resources at it. 2. Also said of problems for which a solution would neither advance the state of the art nor be fun to design...
uninteresting2 is problems as intolerable wastes of time, to be solved (if at all) by lesser mortals. *Real* hackers (see {toolsmith}) generalize uninteresting problems enough to make them interesting and solve them --- thus solving the ori...
uninteresting3 is {SMOP}; compare {toy problem}, oppose {interesting}.
UNIX is /yoo'niks/ [In the authors' words, "A weak pun on Multics"] n. (also `Unix') An interactive time-sharing system originally invented in 1969 by Ken Thompson after Bell Labs left the Multics project, originally so he could play games on ...
UNIX2 is inventor of C, is considered a co-author of the system. The turning point in UNIX's history came when it was reimplemented almost entirely in C during 1972--1974, making it the first source-portable OS. UNIX subsequently underwent...
UNIX3 is many different people, resulting in a uniquely flexible and developer-friendly environment. In 1991, UNIX is the most widely used multiuser general-purpose operating system in the world. Many people consider this the most important ...
UNIX4 is opposition (but see {UNIX weenie} and {UNIX conspiracy} for an opposing point of view). See {Version 7}, {BSD}, {USG UNIX}.
UNIX brain damage is n. Something that has to be done to break a network program (typically a mailer) on a non-UNIX system so that it will interoperate with UNIX systems. The hack may qualify as `UNIX brain damage' if the program conforms to...
UNIX brain damage2 is question does not. UNIX brain damage happens because it is much easier for other (minority) systems to change their ways to match non-conforming behavior than it is to change all the hundreds of thousands of UNIX systems...
UNIX brain damage3 is is a {kluge} in a mail server to recognize bare line feed (the UNIX newline) as an equivalent form to the Internet standard newline, which is a carriage return followed by a line feed. Such things can make even a harden...
UNIX conspiracy is [ITS] n. According to a conspiracy theory long popular among {{ITS}} and {{TOPS-20}} fans, UNIX's growth is the result of a plot, hatched during the 1970s at Bell Labs, whose intent was to hobble AT&T's competitors by making...
UNIX conspiracy2 is evolution was to be under AT&T's control. This would be accomplished by disseminating an operating system that is apparently inexpensive and easily portable, but also relatively unreliable and insecure (so as to require co...
( run in 2.811 seconds using v1.01-cache-2.11-cpan-5837b0d9d2c )