Amethyst

 view release on metacpan or  search on metacpan

factpacks/jargon-split.fact  view on Meta::CPAN

blast2 is  Blast them (y/n)?' would   appear in the command window upon logout. 
blat is  n. 1. Syn. {blast}, sense 1.  2. See {thud}.
bletch is  /blech/ [from Yiddish/German `brechen', to vomit, poss.   via comic-strip exclamation `blech'] interj.  Term of disgust.   Often used in "Ugh, bletch".  Compare {barf}.
bletcherous is  /blech'*-r*s/ adj. Disgusting in design or function;   esthetically unappealing.  This word is seldom used of people.   "This keyboard is bletcherous!" (Perhaps the keys don't work very   well, or are misplaced.)  See {losing}, {creti...
bletcherous2 is  The term {bletcherous}   applies to the esthetics of the thing so described; similarly for   {cretinous}.  By contrast, something that is `losing' or   `bagbiting' may be failing to meet objective criteria.  See also   {bogus} and {r...
bletcherous3 is  meaning than any of the above. 
blinkenlights is  /blink'*n-litz/ n. Front-panel diagnostic lights   on a computer, esp. a {dinosaur}.  Derives from the last word of   the famous   blackletter-Gothic   sign in mangled pseudo-German that once graced about half the   computer rooms i...
blinkenlights2 is  in   its entirety as follows                   ACHTUNG!  ALLES LOOKENSPEEPERS!        Das computermachine ist nicht fuer gefingerpoken und mittengrabben.        Ist easy schnappen der springenwerk, blowenfusen und poppencorken     ...
blinkenlights3 is  bei das dumpkopfen.        Das rubbernecken sichtseeren keepen das cotten-pickenen hans in das        pockets muss; relaxen und watchen das blinkenlichten.   This silliness dates back at least as far as 1959 at Stanford   Universit...
blinkenlights4 is  early 1960s,   when it was reported at London University's ATLAS computing site.   There are several variants of it in circulation, some of which   actually do end with the word `blinkenlights'.   In an amusing example of turnabout...
blinkenlights5 is  their own versions of the blinkenlights poster in   fractured English, one of which is reproduced here                               ATTENTION        This room is fullfilled mit special electronische equippment.        Fingergrabbi...
blinkenlights6 is  computers is        allowed for die experts only!  So all the "lefthanders" stay away        and do not disturben the brainstorming von here working        intelligencies.  Otherwise you will be out thrown and kicked        andersw...
blinkenlights7 is  astaunished        the blinkenlights.   See also {geef}. 
blit is  /blit/ vt. 1. To copy a large array of bits from one part   of a computer's memory to another part, particularly when the   memory is being used to determine what is shown on a display   screen.  "The storage allocator picks through the tabl...
blit2 is  memory, and then blits it all back   down again."  See {bitblt}, {BLT}, {dd}, {cat},   {blast}, {snarf}.  More generally, to perform some operation   (such as toggling) on a large array of bits while moving them.   2. All-capitalized as `BL...
blit3 is  designed by Rob Pike at Bell Labs, later commercialized as   the AT&T 5620.  (The folk etymology from `Bell Labs Intelligent   Terminal' is incorrect.) 
blitter is  /blit'r/ n. A special-purpose chip or hardware system   built to perform {blit} operations, esp. used for fast   implementation of bit-mapped graphics.  The Commodore Amiga and a   few other micros have these, but in 1991 the trend is awa...
blitter2 is  reincarnation}).  Syn. {raster   blaster}. 
blivet is  /bliv'*t/ [allegedly from a World War II military term   meaning "ten pounds of manure in a five-pound bag"] n. 1. An   intractable problem.  2. A crucial piece of hardware that can't be   fixed or replaced if it breaks.  3. A tool that ha...
blivet2 is  programmers that it has become an   unmaintainable tissue of hacks.  4. An out-of-control but   unkillable development effort.  5. An embarrassing bug that pops up   during a customer demo.   This term has other meanings in other technica...
blivet3 is  hardware engineers of various kinds it   seems to mean any random object of unknown purpose (similar to   hackish use of {frob}).  It has also been used to describe an   amusing trick-the-eye drawing resembling a three-pronged fork that  ...
blivet4 is  until one realizes that   the parts fit together in an impossible way. 
block is  [from process scheduling terminology in OS theory] 1. vi.   To delay or sit idle while waiting for something.  "We're blocking   until everyone gets here."  Compare {busy-wait}.  2. `block   on' vt. To block, waiting for (something).  "Lunc...
block transfer computations is  n. From the television series   "Dr. Who", in which it referred to computations so fiendishly   subtle and complex that they could not be performed by machines.   Used to refer to any task that should be expressible as...
blow an EPROM is  /bloh *n ee'prom/ v. (alt. `blast an EPROM',   `burn an EPROM') To program a read-only memory, e.g. for use   with an embedded system.  This term arises because the programming   process for the Programmable Read-Only Memories (PROM...
blow an EPROM2 is  Programmable Read-Only Memories   (EPROMs) involved intentionally blowing tiny electrical fuses on   the chip.  Thus, one was said to `blow' (or `blast') a PROM, and   the terminology carried over even though the write process on  ...
blow away is  vt. To remove (files and directories) from permanent   storage, generally by accident.  "He reformatted the wrong   partition and blew away last night's netnews."  Oppose {nuke}.
blow out is  vi. Of software, to fail spectacularly; almost as serious   as {crash and burn}.  See {blow past}, {blow up}.
blow past is  vt. To {blow out} despite a safeguard.  "The server blew   past the 5K reserve buffer."
blow up is  vi. 1. [scientific computation] To become unstable.  Suggests   that the computation is diverging so rapidly that it will soon   overflow or at least go {nonlinear}.  2.  Syn. {blow out}.
BLT is  /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. Synonym for   {blit}.  This is the original form of {blit} and the ancestor   of {bitblt}.  It referred to any large bit-field copy or move   operation (one resource-intensive memory-shuffling operati...
BLT2 is  and TOPS-10 was sardonically   referred to as `The Big BLT').  The jargon usage has outlasted the   {PDP-10} BLock Transfer instruction from which {BLT} derives;   nowadays, the assembler mnemonic {BLT} almost always means   `Branch if Less ...
Blue Book is  n. 1. Informal name for one of the three standard   references on the page-layout and graphics-control language   PostScript (`PostScript Language Tutorial and Cookbook', Adobe   Systems, Addison-Wesley 1985, QA76.73.P67P68, ISBN 0-201-...
Blue Book2 is  known as the {Green Book} and   {Red Book}.  2. Informal name for one of the three standard   references on Smalltalk `Smalltalk-80 The Language and its   Implementation', David Robson, Addison-Wesley 1983, QA76.8.S635G64,   ISBN 0-201...
Blue Book3 is  and red   books).  3. Any of the 1988 standards issued by the CCITT's   ninth plenary assembly.  Until now, they have changed color each review   cycle (1984 was {Red Book}, 1992 would be {Green Book}); however,   it is rumored that th...
Blue Book4 is  1992.   These include, among other things, the X.400 email spec and   the Group 1 through 4 fax standards.  See also {{book titles}}. 
Blue Glue is  [IBM] n. IBM's SNA (Systems Network Architecture), an   incredibly {losing} and {bletcherous} communications protocol   widely favored at commercial shops that don't know any better.  The   official IBM definition is "that which binds b...
Blue Glue2 is  loathing}.  It may not be irrelevant   that {Blue Glue} is the trade name of a 3M product that is   commonly used to hold down the carpet squares to the removable   panel floors common in {dinosaur pens}.  A correspondent at   U. Minn....
Blue Glue3 is  80 bottles   of the stuff hanging about, so they often refer to any messy work   to be done as `using the blue glue'. 
blue goo is  n. Term for `police' {nanobot}s intended to prevent   {gray goo}, denature hazardous waste, destroy pollution, put   ozone back into the stratosphere, prevent halitosis, and promote   truth, justice, and the American way, etc.  See   {{n...
BNF is  /B-N-F/ n. 1. [techspeak] Acronym for `Backus-Naur Form', a   metasyntactic notation used to specify the syntax of programming   languages, command sets, and the like.  Widely used for language   descriptions but seldom documented anywhere, s...
BNF2 is  from other hackers.  2. In   {{science-fiction fandom}}, BNF means `Big-Name Fan'   (someone famous or notorious).  Years ago a fan started handing out   black-on-green BNF buttons at SF conventions; this confused the   hacker contingent ter...
boa is  [IBM] n. Any one of the fat cables that lurk under the floor   in a {dinosaur pen}.  Possibly so called because they display a   ferocious life of their own when you try to lay them straight and   flat after they have been coiled for some tim...
boa2 is  cables for the 370 are limited to 200 feet   because beyond that length the boas get dangerous --- and it is   worth noting that one of the major cable makers uses the trademark   `Anaconda'. 
board is  n. 1. In-context synonym for {bboard}; sometimes used   even for USENET newsgroups.  2. An electronic circuit board   (compare {card}).
boat anchor is  n. 1. Like {doorstop} but more severe; implies that   the offending hardware is irreversibly dead or useless.  "That was   a working motherboard once.  One lightning strike later, instant   boat anchor!"  2. A person who just takes up...
bogo-sort is  /boh`goh-sort'/ n. (var. `stupid-sort') The   archetypical perversely awful algorithm (as opposed to {bubble   sort}, which is merely the generic *bad* algorithm).   Bogo-sort is equivalent to repeatedly throwing a deck of cards in   th...
bogo-sort2 is  testing whether they   are in order.  It serves as a sort of canonical example of   awfulness.  Looking at a program and seeing a dumb algorithm, one   might say "Oh, I see, this program uses bogo-sort."  Compare   {bogus}, {brute forc...
bogometer is  /boh-gom'-*t-er/ n. See {bogosity}.  Compare the   `wankometer' described in the {wank} entry; see also   {bogus}.
bogon is  /boh'gon/ [by analogy with proton/electron/neutron, but   doubtless reinforced after 1980 by the similarity to Douglas   Adams's `Vogons'; see the Bibliography] n. 1. The elementary particle of   bogosity (see {quantum bogodynamics}).  For ...
bogon2 is  again" means that it is broken or   acting in an erratic or bogus fashion.  2. A query packet sent from   a TCP/IP domain resolver to a root server, having the reply bit set   instead of the query bit.  3. Any bogus or incorrectly formed  ...
bogon3 is  used to refer to any   bogus thing, as in "I'd like to go to lunch with you but I've got   to go to the weekly staff bogon".  5. A person who is bogus or who   says bogus things.  This was historically the original usage, but   has been ov...
bogon4 is  also {bogosity}, {bogus}; compare {psyton}. 
bogon filter is  /boh'gon fil'tr/ n. Any device, software or hardware,   that limits or suppresses the flow and/or emission of bogons.   "Engineering hacked a bogon filter between the Cray and   the VAXen, and now we're getting fewer dropped packets....
bogon flux is  /boh'gon fluhks/ n. A measure of a supposed field of   {bogosity} emitted by a speaker, measured by a {bogometer};   as a speaker starts to wander into increasing bogosity a listener   might say "Warning, warning, bogon flux is rising"...
bogosity is  /boh-go's*-tee/ n. 1. The degree to which something is   {bogus}.  At CMU, bogosity is measured with a {bogometer}; in   a seminar, when a speaker says something bogus, a listener might   raise his hand and say "My bogometer just trigger...
bogosity2 is  bogometer"  means you just said   or did something so outrageously bogus that it is off the scale,   pinning the bogometer needle at the highest possible reading (one   might also say "You just redlined my bogometer").  The   agreed-upo...
bogosity3 is  /mik`roh-len'*t/   (uL).   The consensus is that this is the largest unit practical   for everyday use.  2. The potential field generated by a {bogon   flux}; see {quantum bogodynamics}.  See also {bogon flux},   {bogon filter}, {bogus}...
bogosity4 is  as a attack against   noted computer scientist Doug Lenat by a {tenured graduate   student}.  Doug had failed the student on an important exam for   giving only "AI is bogus" as his answer to the questions.  The   slur is generally cons...
bogosity5 is  gag nevertheless.  Some of Doug's friends argue that *of   course* a microLenat is bogus, since it is only one millionth of a   Lenat.  Others have suggested that the unit should be redesignated   after the grad student, as the microRei...
bogotify is  /boh-go't*-fi/ vt. To make or become bogus.  A   program that has been changed so many times as to become completely   disorganized has become bogotified.  If you tighten a nut too hard   and strip the threads on the bolt, the bolt has b...
bogotify2 is  it any more.  This coinage led to the   notional `autobogotiphobia' defined as `the fear of becoming   bogotified'; but is not clear that the latter has ever been   `live' jargon rather than a self-conscious joke in jargon about   jargo...
bogue out is  /bohg owt/ vi. To become bogus, suddenly and   unexpectedly.  "His talk was relatively sane until somebody asked   him a trick question; then he bogued out and did nothing but   {flame} afterwards."  See also {bogosity}, {bogus}.
bogus is  adj. 1. Non-functional.  "Your patches are bogus."   2. Useless.  "OPCON is a bogus program."  3. False.  "Your   arguments are bogus."  4. Incorrect.  "That algorithm is bogus."   5. Unbelievable.  "You claim to have solved the halting pro...
bogus2 is  bogus."  6. Silly.  "Stop   writing those bogus sagas."   Astrology is bogus.  So is a bolt that is obviously about to break.   So is someone who makes blatantly false claims to have solved a   scientific problem.  (This word seems to have...
bogus3 is  {random} --- mostly the negative ones.)   It is claimed that `bogus' was originally used in the hackish sense   at Princeton in the late 1960s.  It was spread to CMU and Yale by   Michael Shamos, a migratory Princeton alumnus.  A glossary ...
bogus4 is  word was first popularized (see   {autobogotiphobia} under {bogotify}). The word spread into   hackerdom from CMU and MIT.  By the early 1980s it was also   current in something like the hackish sense in West Coast teen   slang, and it had...
bogus5 is    Cambridge reports, by contrast, that these uses of `bogus' grate on   British nerves; in Britain the word means, rather specifically,   `counterfeit', as in "a bogus 10-pound note". 
Bohr bug is  /bohr buhg/ [from quantum physics] n. A repeatable   {bug}; one that manifests reliably under a possibly unknown but   well-defined set of conditions.  Antonym of {heisenbug}; see also   {mandelbug}.
boink is  /boynk/ [USENET ascribed there to the TV series   "Cheers" and "Moonlighting"] 1. To have sex with;   compare {bounce}, sense 3. (This is mainstream slang.) In   Commonwealth hackish the variant `bonk' is more common.  2. After   the origin...
boink2 is  for   almost any net social gathering, e.g., Miniboink, a small boink   held by Nancy Gillett in 1988; Minniboink, a Boinkcon in Minnesota   in 1989; Humpdayboinks, Wednesday get-togethers held in the San   Francisco Bay Area.  Compare {@-...
bomb is  1. v. General synonym for {crash} (sense 1) except that it   is not used as a noun; esp. used of software or OS failures.   "Don't run Empire with less than 32K stack, it'll bomb."   2. n.,v. Atari ST and Macintosh equivalents of a UNIX `pan...
bomb2 is  of little black-powder bombs   or mushroom clouds are displayed, indicating that the system has died.   On the Mac, this may be accompanied by a decimal (or occasionally   hexadecimal) number indicating what went wrong, similar to the   Ami...
bomb3 is  {{MS-DOS}} machines   tend to get {locked up} in this situation. 
bondage-and-discipline language is  A language (such as Pascal, Ada,   APL, or Prolog) that, though ostensibly general-purpose, is designed   so as to enforce an author's theory of `right programming' even   though said theory is demonstrably inadequ...
bondage-and-discipline language2 is  general-purpose programming.  Often abbreviated   `B&D'; thus, one may speak of things "having the B&D nature".   See {{Pascal}}; oppose {languages of choice}. 
bonk/oif is  /bonk/, /oyf/ interj. In the {MUD} community, it has   become traditional to express pique or censure by `bonking' the   offending person.  There is a convention that one should   acknowledge a bonk by saying `oif!' and a myth to the eff...
bonk/oif2 is  bonk/oif balance, causing much   trouble in the universe.  Some MUDs have implemented special   commands for bonking and oifing.  See also {talk mode},   {posing}. 
book titles is  There is a tradition in hackerdom of informally   tagging important textbooks and standards documents with the   dominant color of their covers or with some other conspicuous   feature of the cover.  Many of these are described in thi...
book titles2 is  {Aluminum Book}, {Blue Book},   {Cinderella Book}, {Devil Book}, {Dragon Book}, {Green   Book}, {Orange Book}, {Pink-Shirt Book}, {Purple Book},   {Red Book}, {Silver Book}, {White Book}, {Wizard Book},   {Yellow Book}, and {bible}.b...
book titles3 is  v.,n. To load and   initialize the operating system on a machine.  This usage is no   longer jargon (having passed into techspeak) but has given rise to   some derivatives that are still jargon.   The derivative `reboot' implies that...
book titles4 is  that the boot is a {bounce} intended to clear   some state of {wedgitude}.  This is sometimes used of human   thought processes, as in the following exchange "You've lost   me." "OK, reboot.  Here's the theory...."   This term is als...
book titles5 is  power-off condition) and `warm boot' (with the CPU and all   devices already powered up, as after a hardware reset or software   crash).   Another variant `soft boot', reinitialization of only part of a   system, under control of oth...
book titles6 is  the {mess-dos} emulator, control-alt-insert will   cause a soft-boot of the emulator, while leaving the rest of the   system running."   Opposed to this there is `hard boot', which connotes hostility   towards or frustration with the...
book titles7 is  hard-boot this losing Sun." "I recommend booting it hard."   Historical note this term derives from `bootstrap loader', a short   program that was read in from cards or paper tape, or toggled in   from the front panel switches.  This...
book titles8 is  were expended on making it short in order to   minimize the labor and chance of error involved in toggling it in),   but was just smart enough to read in a slightly more complex   program (usually from a card or paper tape reader), t...
book titles9 is  turn was smart enough to read the   application or operating system from a magnetic tape drive or disk   drive.  Thus, in successive steps, the computer `pulled itself up   by its bootstraps' to a useful operating state.  Nowadays th...
book titles10 is  and reads the first   stage in from a fixed location on the disk, called the `boot   block'.  When this program gains control, it is powerful enough to   load the actual OS and hand control over to it. 
bottom-up implementation is  n. Hackish opposite of the techspeak term   `top-down design'.  It is now received wisdom in most   programming cultures that it is best to design from higher levels   of abstraction down to lower, specifying sequences of...
bottom-up implementation2 is  to actual code.  Hackers often find   (especially in exploratory designs that cannot be closely   specified in advance) that it works best to *build* things in   the opposite order, by writing and testing a clean set of ...
bounce is  v. 1. [perhaps from the image of a thrown ball bouncing   off a wall] An electronic mail message that is undeliverable and   returns an error notification to the sender is said to `bounce'.   See also {bounce message}.  2. [Stanford] To pl...
bounce2 is  Power Lab} building used by the   Stanford AI Lab in the 1970s, there was a volleyball court on the   front lawn.  From 5 P.M. to 7 P.M. was the scheduled   maintenance time for the computer, so every afternoon at 5 the   computer would b...
bounce3 is  voice   would cry, "Now hear this bounce, bounce!" followed by Brian   McCune loudly bouncing a volleyball on the floor outside the   offices of known volleyballers.  3. To engage in sexual   intercourse; prob. from the expression `bounci...
bounce4 is  psychosexually loaded "Bounce on me   too, Tigger!" from the "Winnie-the-Pooh" books.  Compare   {boink}.  4. To casually reboot a system in order to clear up a   transient problem.  Reported primarily among {VMS} users.   5. [IBM] To {po...
bounce message is  [UNIX] n. Notification message returned to sender by   a site unable to relay {email} to the intended {{Internet address}}   recipient or the next link in a {bang path} (see {bounce}).   Reasons might include a nonexistent or missp...
bounce message2 is  Bounce messages can themselves fail, with   occasionally ugly results; see {sorcerer's apprentice mode}.   The term `bounce mail' is also common. 
box is  n. 1. A computer; esp. in the construction `foo box'   where foo is some functional qualifier, like `graphics', or   the name of an OS (thus, `UNIX box', `MS-DOS box', etc.)  "We   preprocess the data on UNIX boxes before handing it up to the...
box2 is  qualification but within an   SNA-using site, this refers specifically to an IBM front-end   processor or FEP /F-E-P/.  An FEP is a small computer necessary   to enable an IBM {mainframe} to communicate beyond the limits of   the {dinosaur p...
box3 is  cry   that goes up when an SNA network goes down "Looks like the   {box} has fallen over." (See {fall over}.) See also   {IBM}, {fear and loathing}, {fepped out}, {Blue   Glue}. 
boxed comments is  n. Comments (explanatory notes attached to program   instructions) that occupy several lines by themselves; so called   because in assembler and C code they are often surrounded by a box   in a style something like this   Common va...
boxed comments2 is  column 2 or add   a matching row of asterisks closing the right side of the box.  The   sparest variant omits all but the comment delimiters themselves;   the `box' is implied.  Oppose {winged comments}. 
boxen is  /bok'sn/ [by analogy with {VAXen}] pl.n. Fanciful   plural of {box} often encountered in the phrase `UNIX boxen',   used to describe commodity {{UNIX}} hardware.  The connotation is   that any two UNIX boxen are interchangeable.
boxology is  /bok-sol'*-jee/ n. Syn. {ASCII art}.  This term   implies a more restricted domain, that of box-and-arrow drawings.   "His report has a lot of boxology in it."  Compare   {macrology}.
bozotic is  /boh-zoh'tik/ or /boh-zo'tik/ [from the name of a TV   clown even more losing than Ronald McDonald] adj. Resembling or   having the quality of a bozo; that is, clownish, ludicrously wrong,   unintentionally humorous.  Compare {wonky}, {de...
bozotic2 is  in slang, but the mainstream   adjectival form would be `bozo-like' or (in New England)   `bozoish'. 
BQS is  /B-Q-S/ adj. Syn. {Berkeley Quality Software}.
brain dump is  n. The act of telling someone everything one knows   about a particular topic or project.  Typically used when someone   is going to let a new party maintain a piece of code.  Conceptually   analogous to an operating system {core dump}...
brain dump2 is  before an exit.  "You'll have to   give me a brain dump on FOOBAR before you start your new job at   HackerCorp."  See {core dump} (sense 4).  At Sun, this is also   known as `TOI' (transfer of information). 
brain-damaged is  1. [generalization of `Honeywell Brain Damage'   (HBD), a theoretical disease invented to explain certain utter   cretinisms in Honeywell {{Multics}}] adj. Obviously wrong;   {cretinous}; {demented}.  There is an implication that th...
brain-damaged2 is  brain damage, because he   should have known better.  Calling something brain-damaged is   really bad; it also implies it is unusable, and that its failure to   work is due to poor design rather than some accident.  "Only six   mon...
brain-damaged3 is  brain-damaged!"  2. [esp. in the Mac world] May refer to free   demonstration software that has been deliberately crippled in some   way so as not to compete with the commercial product it is   intended to sell.  Syn.  {crippleware...
brain-dead is  adj. Brain-damaged in the extreme.  It tends to imply   terminal design failure rather than malfunction or simple   stupidity.  "This comm program doesn't know how to send a break   --- how brain-dead!"
braino is  /bray'no/ n. Syn. for {thinko}.
branch to Fishkill is  [IBM from the location of one of the   corporation's facilities] n. Any unexpected jump in a program that   produces catastrophic or just plain weird results.  See {jump   off into never-never land}, {hyperspace}.
brand brand brand is  n. Humorous catch-phrase from {BartleMUD}s, in   which players were described carrying a list of objects, the most   common of which would usually be a brand.  Often used as a joke in   {talk mode} as in "Fred the wizard is here...
brand brand brand2 is  kettle broadsword flamethrower".  A brand is a   torch, of course; one burns up a lot of those exploring dungeons.   Prob. influenced by the famous Monty Python "Spam" skit. 
break is  1. vt. To cause to be broken (in any sense).  "Your latest   patch to the editor broke the paragraph commands."  2. v.  (of a   program) To stop temporarily, so that it may debugged.  The place   where it stops is a `breakpoint'.  3. [techs...
break2 is  of line high) over a serial comm line.   4. [UNIX] vi. To strike whatever key currently causes the tty   driver to send SIGINT to the current process.  Normally, break   (sense 3) or delete does this.  5. `break break' may be said to   int...
break3 is  verb doubling). 
breath-of-life packet is  [XEROX PARC] n. An Ethernet packet that   contained bootstrap (see {boot}) code, periodically sent out   from a working computer to infuse the `breath of life' into any   computer on the network that had happened to crash.  ...
breath-of-life packet2 is  would wait for such a packet after a   catastrophic error. 

factpacks/jargon-split.fact  view on Meta::CPAN

firefighting is  n. 1. What sysadmins have to do to correct sudden   operational problems.  An opposite of hacking.  "Been hacking your   new newsreader?"  "No, a power glitch hosed the network and I spent   the whole afternoon fighting fires."  2. T...
firefighting2 is  nights at a project, esp. to get it out   before deadline.  See also {gang bang}, {Mongolian Hordes   technique}; however, the term `firefighting' connotes that the   effort is going into chasing bugs rather than adding features. 
firewall code is  n. The code you put in a system (say, a telephone   switch) to make sure that the users can't do any damage. Since   users always want to be able to do everything but never want to   suffer for any mistakes, the construction of a fi...
firewall code2 is  coding but also of interface   presentation, so that users don't even get curious about those   corners of a system where they can burn themselves. 
firewall machine is  n. A dedicated gateway machine with special   security precautions on it, used to service outside network   connections and dial-in lines.  The idea is to protect a cluster of   more loosely administered machines hidden behind it...
firewall machine2 is  an inexpensive micro-based   UNIX box kept clean of critical data, with a bunch of modems and   public network ports on it but just one carefully watched   connection back to the rest of the cluster.  The special   precautions m...
firewall machine3 is  even a   complete {iron box} keyable to particular incoming IDs or   activity patterns.  Syn. {flytrap}, {Venus flytrap}. 
fireworks mode is  n. The mode a machine is sometimes said to be in when   it is performing a {crash and burn} operation.
firmy is  /fer'mee/ Syn. {stiffy} (a 3.5-inch floppy disk).
fish is  [Adelaide University, Australia] n. 1. Another metasyntactic   variable.  See {foo}.  Derived originally from the Monty Python   skit in the middle of "The Meaning of Life" entitled "Find the   Fish".  2. A pun for `microfiche'.  A microfich...
FISH queue is  [acronym, by analogy with FIFO (First In, First Out)]   n. `First In, Still Here'.  A joking way of pointing out that   processing of a particular sequence of events or requests has   stopped dead.  Also `FISH mode' and `FISHnet'; the ...
FISH queue2 is  running really slowly or   exhibiting extreme flakiness. 
fix is  n.,v. What one does when a problem has been reported too many   times to be ignored.
flag is  n. A variable or quantity that can take on one of two   values; a bit, particularly one that is used to indicate one of two   outcomes or is used to control which of two things is to be done.   "This flag controls whether to clear the screen...
flag2 is  status word contains several flag   bits."  Used of humans analogously to {bit}.  See also   {hidden flag}, {mode bit}. 
flag day is  n. A software change that is neither forward- nor   backward-compatible, and which is costly to make and costly to   reverse.  "Can we install that without causing a flag day for all   users?"  This term has nothing to do with the use of...
flag day2 is  two values.  It came into use   when a massive change was made to the {{Multics}} timesharing   system to convert from the old ASCII code to the new one; this was   scheduled for Flag Day (a U.S. holiday), June 14, 1966.  See also   {ba...
flaky is  adj. (var sp. `flakey') Subject to frequent {lossage}.   This use is of course related to the common slang use of the word   to describe a person as eccentric, crazy, or just unreliable.  A   system that is flaky is working, sort of --- eno...
flaky2 is  --- but fails frequently enough that the   odds in favor of finishing what you start are low.  Commonwealth   hackish prefers {dodgy} or {wonky}. 
flamage is  /flay'm*j/ n. Flaming verbiage, esp. high-noise,   low-signal postings to {USENET} or other electronic {fora}.   Often in the phrase `the usual flamage'.  `Flaming' is the act   itself; `flamage' the content; a `flame' is a single flaming...
flame is  1. vi. To post an email message intended to insult and   provoke.  2. vi. To speak incessantly and/or rabidly on some   relatively uninteresting subject or with a patently ridiculous   attitude.  3. vt. Either of senses 1 or 2, directed wit...
flame2 is  people.  4. n. An instance of   flaming.  When a discussion degenerates into useless controversy,   one might tell the participants "Now you're just flaming" or   "Stop all that flamage!" to try to get them to cool down (so to   speak).   ...
flame3 is  to 1976, adds "I   am 99% certain that the use of `flame' originated at WPI.  Those   who made a nuisance of themselves insisting that they needed to use   a TTY for `real work' came to be known as `flaming asshole lusers'.   Other particu...
flame4 is  ravers',   which shortened to `flaming ravers', and ultimately `flamers'.  I   remember someone picking up on the Human Torch pun, but I don't   think `flame on/off' was ever much used at WPI."  See also   {asbestos}.   The term may have b...
flame5 is    places; it is also reported that `flaming' was in use to mean   something like `interminably drawn-out semi-serious discussions'   (late-night bull sessions) at Carleton College during 1968--1971. 
flame bait is  n. A posting intended to trigger a {flame war}, or one   that invites flames in reply.
flame on is  vi.,interj.  1. To begin to {flame}.  The punning   reference to Marvel Comics's Human Torch is no longer widely   recognized.  2. To continue to flame.  See {rave}, {burble}.
flame war is  n. (var. `flamewar') An acrimonious dispute,   especially when conducted on a public electronic forum such as   {USENET}.
flamer is  n. One who habitually {flame}s.  Said esp. of obnoxious   {USENET} personalities.
flap is  vt. 1. To unload a DECtape (so it goes flap, flap,   flap...).  Old-time hackers at MIT tell of the days when the   disk was device 0 and {microtape}s were 1, 2,... and   attempting to flap device 0 would instead start a motor banging   insi...
flap2 is  to unload any   magnetic tape.  See also {macrotape}.  Modern cartridge tapes no   longer actually flap, but the usage has remained. 
flarp is  /flarp/ [Rutgers University] n. Yet another metasyntactic   variable (see {foo}).  Among those who use it, it is associated   with a legend that any program not containing the word `flarp'   somewhere will not work.  The legend is discreetl...
flarp2 is  which *do* contain the magic word. 
flat is  adj. 1. Lacking any complex internal structure.  "That   {bitty box} has only a flat filesystem, not a hierarchical   one."  The verb form is {flatten}.  2. Said of a memory   architecture (like that of the VAX or 680x0) that is one big line...
flat2 is  possible value of a processor   register corresponding to a unique core address), as opposed to a   `segmented' architecture (like that of the 80x86) in which   addresses are composed from a base-register/offset pair (segmented   designs ar...
flat-ASCII is  adj. Said of a text file that contains only 7-bit ASCII   characters and uses only ASCII-standard control characters (that   is, has no embedded codes specific to a particular text formatter   or markup language, and no {meta}-characte...
flat-file is  adj. A {flatten}ed representation of some database or   tree or network structure as a single file from which the   structure could implicitly be rebuilt, esp. one in {flat-ASCII}   form.
flatten is  vt. To remove structural information, esp. to filter   something with an implicit tree structure into a simple sequence of   leaves; also tends to imply mapping to {flat-ASCII}.  "This code   flattens an expression with parentheses into a...
flavor is  n. 1. Variety, type, kind.  "DDT commands come in two   flavors."  "These lights come in two flavors, big red ones and   small green ones."  See {vanilla}.  2. The attribute that causes   something to be {flavorful}.  Usually used in the p...
flavor2 is  convention yields additional flavor by   allowing one to print text either right-side-up or upside-down."   See {vanilla}.  This usage was certainly reinforced by the   terminology of quantum chromodynamics, in which quarks (the   constit...
flavor3 is  (up, down,   strange, charm, top, bottom) and three colors (red, blue, green)   --- however, hackish use of `flavor' at MIT predated QCD.  3. The   term for `class' (in the object-oriented sense) in the LISP Machine   Flavors system.  Tho...
flavor4 is  (notably by the Common LISP CLOS facility), the term `flavor' is   still used as a general synonym for `class' by some LISP hackers. 
flavorful is  adj. Full of {flavor}; esthetically pleasing.  See   {random} and {losing} for antonyms.  See also the entries for   {taste} and {elegant}.
flippy is  /flip'ee/ n. A single-sided floppy disk altered for   double-sided use by addition of a second write-notch, so called   because it must be flipped over for the second side to be   accessible.  No longer common.
flowchart is  [techspeak] n. An archaic form of visual control-flow   specification employing arrows and `speech balloons' of various   shapes.  Hackers never use flowcharts, consider them extremely   silly, and associate them with {COBOL} programmer...
flowchart2 is  of life.  This is because (from a   hacker's point of view) they are no easier to read than code, are   less precise, and tend to fall out of sync with the code (so that   they either obfuscate it rather than explaining it or require  ...
flowchart3 is  the code).  See also   {pdl}, sense 3. 
flower key is  [Mac users] n. See {command key}.
flush is  v. 1. To delete something, usually superfluous, or to abort   an operation.  "All that nonsense has been flushed."  2. [UNIX/C]   To force buffered I/O to disk, as with an `fflush(3)' call.   This is *not* an abort or deletion as in sense 1...
flush2 is  leave at the end of a day's   work (as opposed to leaving for a meal).  "I'm going to flush   now."  "Time to flush."  4. To exclude someone from an activity,   or to ignore a person.   `Flush' was standard ITS terminology for aborting an ...
flush3 is  would have been printed, but   was not, as having been flushed.  It is speculated that this term   arose from a vivid image of flushing unwanted characters by hosing   down the internal output buffer, washing the characters away before   t...
flush4 is  other hand, was   propagated by the `fflush(3)' call in C's standard I/O library   (though it is reported to have been in use among BLISS programmers   at DEC and on Honeywell and IBM machines as far back as 1965).   UNIX/C hackers find th...
Flyspeck 3 is  n. Standard name for any font that is so tiny as to be   unreadable (by analogy with such names as `Helvetica 10' for   10-point Helvetica).  Legal boilerplate is usually printed in   Flyspeck 3.
flytrap is  n. See {firewall machine}.
FOAF is  // [USENET] n. Acronym for `Friend Of A Friend'.  The   source of an unverified, possibly untrue story.  This was not   originated by hackers (it is used in Jan Brunvand's books on urban   folklore), but is much better recognized on USENET a...
FOD is  /fod/ v. [Abbreviation for `Finger of Death', originally a   spell-name from fantasy gaming] To terminate with extreme prejudice   and with no regard for other people.  From {MUD}s where the   wizard command `FOD <player>' results in the imme...
FOD2 is  as punishment for obnoxious behavior.   This migrated to other circumstances, such as "I'm going to fod   the process that is burning all the cycles."  Compare {gun}.   In aviation, FOD means Foreign Object Damage, e.g., what happens   when ...
FOD3 is  bird in   flight.  Finger of Death is a distressingly apt description of   what this does to the engine. 
fold case is  v. See {smash case}.  This term tends to be used   more by people who don't mind that their tools smash case.  It also   connotes that case is ignored but case distinctions in data   processed by the tool in question aren't destroyed.
followup is  n. On USENET, a {posting} generated in response to   another posting (as opposed to a {reply}, which goes by email   rather than being broadcast).  Followups include the ID of the   {parent message} in their headers; smart news-readers c...
followup2 is  news in `conversation' sequence   rather than order-of-arrival.  See {thread}. 
foo is  /foo/ 1. interj. Term of disgust.  2. Used very generally   as a sample name for absolutely anything, esp. programs and files   (esp. scratch files).  3. First on the standard list of   metasyntactic variables used in syntax examples.  See al...
foo2 is  {grault},   {garply}, {waldo}, {fred}, {plugh}, {xyzzy},   {thud}.   {foo} is the {canonical} example of a `metasyntactic   variable' --- a name used in examples and understood to stand for   whatever thing is under discussion, or any random...
foo3 is  discussion.  To avoid confusion, hackers never use   `foo' or other words like it as permanent names for anything.  In   filenames, a common convention is that any filename beginning   `foo' is a scratch file that may be deleted at any time....
foo4 is  When used in   connection with `bar' it is generally traced to the WWII-era Army   slang acronym FUBAR (`Fucked Up Beyond All Recognition'), later   bowdlerized to {foobar}.  (See also {FUBAR}).   However, the use of the word `foo' itself ha...
foo5 is  long history in comic strips and cartoons.   The old "Smokey Stover" comic strips by Bill Holman often   included the word `FOO', in particular on license plates of cars;   allegedly, `FOO' and `BAR' also occurred in Walt Kelly's   "Pogo" st...
foo6 is   early version of Daffy Duck holds up a sign saying "SILENCE IS   FOO!"; oddly, this seems to refer to some approving or positive   affirmative use of foo.  It is even possible that hacker usage   actually springs from `FOO, Lampoons and Par...
foo7 is  in September 1958; the byline read   `C. Crumb' but this may well have been a sort-of pseudonym for   noted weird-comix artist Robert Crumb.  The title FOO was featured   in large letters on the front cover.   An old-time member reports that...
foo8 is  Language', compiled at {TMRC} there was an entry that went   something like this        FOO The first syllable of the sacred chant phrase "FOO MANE PADME        HUM."  Our first obligation is to keep the foo counters turning.   For more abou...
foo9 is  Almost   the entire AI staff was involved with TMRC, so it is not clear   which group introduced the other to the word FOO.   Very probably, hackish `foo' had no single origin and derives   through all these channels from Yiddish `feh' and/o...
foobar is  n. Another common metasyntactic variable; see {foo}.   Hackers do *not* generally use this to mean {FUBAR} in   either the slang or jargon sense.
fool is  n. As used by hackers, specifically describes a person who   habitually reasons from obviously or demonstrably incorrect   premises and cannot be persuaded by evidence to do otherwise; it is   not generally used in its other senses, i.e., to...
fool2 is  to reason correctly, or a clown.  Indeed,   in hackish experience many fools are capable of reasoning all too   effectively in executing their errors.  See also {cretin},   {loser}, {fool file, the}. 
fool file, the is  [USENET] n. A notional repository of all the most   dramatically and abysmally stupid utterances ever.  There is a   subgenre of {sig block}s that consists of the header "From the   fool file" followed by some quote the poster wish...
fool file, the2 is  dimwittery; for this to be really effective,   the quote has to be so obviously wrong as to be laughable.  More   than one USENETter has achieved an unwanted notoriety by being   quoted in this way. 
Foonly is  n. 1. The {PDP-10} successor that was to have been built by   the Super Foonly project at the Stanford Artificial Intelligence   Laboratory along with a new operating system.  The intention was to   leapfrog from the old DEC timesharing sy...
Foonly2 is  bypassing TENEX which at that time was the ARPANET   standard.  ARPA funding for both the Super Foonly and the new   operating system was cut in 1974.  Most of the design team went to   DEC and contributed greatly to the design of the PDP...
Foonly3 is  formed by Dave Poole, one of the   principal Super Foonly designers, and one of hackerdom's more   colorful personalities.  Many people remember the parrot which sat   on Poole's shoulder and was a regular companion.  3. Any of the   mach...
Foonly4 is  the F-1 (a.k.a.   Super Foonly), which was the computational engine used to create   the graphics in the movie "TRON".  The F-1 was the fastest   PDP-10 ever built, but only one was ever made.  The effort drained   Foonly of its financial...
Foonly5 is  smaller, slower, and much less expensive machines.  Unfortunately,   these ran not the popular {TOPS-20} but a TENEX varient called   Foonex; this seriously limited their market.  Also, the machines   shipped were actually wire-wrapped en...
Foonly6 is  attention from more than usually competent site   personnel, and thus had significant reliability problems.  Poole's   legendary temper and unwillingness to suffer fools gladly did not   help matters.  By the time of the Jupiter project c...
Foonly7 is  build another F-1 was eclipsed by the   {Mars}, and the company never quite recovered.  See the   {Mars} entry for the continuation and moral of this story. 
footprint is  n. 1. The floor or desk area taken up by a piece of   hardware.  2. [IBM] The audit trail (if any) left by a crashed   program (often in plural, `footprints').  See also   {toeprint}.
for free is  adj. Said of a capability of a programming language or   hardware equipment that is available by its design without needing   cleverness to implement "In APL, we get the matrix operations for   free."  "And owing to the way revisions are...
for free2 is  trees for free."  Usually it refers to a   serendipitous feature of doing things a certain way (compare   {big win}), but it may refer to an intentional but secondary   feature. 
for the rest of us is  [from the Mac slogan "The computer for the   rest of us"] adj. 1. Used to describe a {spiffy} product whose   affordability shames other comparable products, or (more often)   used sarcastically to describe {spiffy} but very ov...
for the rest of us2 is  with a limited interface,   deliberately limited capabilities, non-orthogonality, inability to   compose primitives, or any other limitation designed to not   `confuse' a na"ive user.  This places an upper bound on how far tha...
for the rest of us3 is  get in the way of the task   instead of helping accomplish it.  Used in reference to Macintosh   software which doesn't provide obvious capabilities because it is   thought that the poor lusers might not be able to handle them...
for the rest of us4 is  third-party   reference; thus, "Yes, it is an attractive program, but it's   designed for The Rest Of Them" means a program that superficially   looks neat but has no depth beyond the surface flash.  See also   {WIMP environme...
fora is  pl.n. Plural of {forum}.
foreground is  [UNIX] vt. To foreground a task is to bring it to   the top of one's {stack} for immediate processing, and hackers   often use it in this sense for non-computer tasks. "If your   presentation is due next week, I guess I'd better foregr...
foreground2 is  Technically, on a time-sharing system, a task executing in   foreground is one able to accept input from and return output to   the user; oppose {background}.  Nowadays this term is primarily   associated with {{UNIX}}, but it appears...
foreground3 is  OS/360.  Normally, there is only one foreground   task per terminal (or terminal window); having multiple processes   simultaneously reading the keyboard is a good way to {lose}. 
forked is  [UNIX; prob. influenced by a mainstream expletive] adj.   Terminally slow, or dead.  Originated when one system slowed to   incredibly bad speeds because of a process recursively spawning copies   of itself (using the UNIX system call `for...
Fortrash is  /for'trash/ n. Hackerism for the FORTRAN language,   referring to its primitive design, gross and irregular syntax,   limited control constructs, and slippery, exception-filled   semantics.
fortune cookie is  [UNIX] n. A random quote, item of trivia, joke, or   maxim printed to the user's tty at login time or (less commonly) at   logout time.  Items from this lexicon have often been used as   fortune cookies.  See {cookie file}.
forum is  n. [USENET, GEnie CI$; pl. `fora' or `forums'] Any   discussion group accessible through a dial-in {BBS}, a   {mailing list}, or a {newsgroup} (see {network, the}).  A   forum functions much like a bulletin board; users submit   {posting}s ...
forum2 is  Contrast   real-time chat via {talk mode} or point-to-point personal   {email}. 
fossil is  n. 1. In software, a misfeature that becomes understandable   only in historical context, as a remnant of times past retained so   as not to break compatibility.  Example the retention of octal as   default base for string escapes in {C}, ...
fossil2 is  to ASCII and modern byte-addressable   architectures.  See {dusty deck}.  2. More restrictively, a   feature with past but no present utility.  Example the   force-all-caps (LCASE) bits in the V7 and {BSD} UNIX tty driver,   designed for ...
fossil3 is  of the   usual backward-compatibility goal, this functionality has actually   been expanded and renamed in some later {USG UNIX} releases as   the IUCLC and OLCUC bits.  3. The FOSSIL (Fido/Opus/Seadog   Standard Interface Level) driver s...
fossil4 is  replace the {brain-dead} routines in the IBM PC ROMs.   Fossils are used by most MS-DOS {BBS} software in lieu of   programming the {bare metal} of the serial ports, as the ROM   routines do not support interrupt-driven operation or setti...
fossil5 is  specification allows   additional functionality to be hooked in, drivers that use the   {hook} but do not provide serial-port access themselves are named   with a modifier, as in `video fossil'. 
four-color glossies is  1. Literature created by {marketroid}s   that allegedly containing technical specs but which is in fact as   superficial as possible without being totally {content-free}.   "Forget the four-color glossies, give me the tech ref...
four-color glossies2 is  superficiality even when the   material is printed on ordinary paper in black and white.   Four-color-glossy manuals are *never* useful for finding a   problem.  2. [rare] Applied by extension to manual pages that don't   con...
four-color glossies3 is  program doesn't   produce the expected or desired output. 
fragile is  adj. Syn {brittle}.
fred is  n. 1. The personal name most frequently used as a   metasyntactic variable (see {foo}).  Allegedly popular because   it's easy for a non-touch-typist to type on a standard QWERTY   keyboard.  Unlike {J. Random Hacker} or `J. Random Loser',  ...
fred2 is  (but see {Mbogo,   Dr. Fred}).  2. An acronym for `Flipping Ridiculous Electronic   Device'; other F-verbs may be substituted for `flipping'. 
frednet is  /fred'net/ n. Used to refer to some {random} and   uncommon protocol encountered on a network.  "We're implementing   bridging in our router to solve the frednet problem."
freeware is  n. Free software, often written by enthusiasts and   distributed by users' groups, or via electronic mail, local   bulletin boards, {USENET}, or other electronic media.  At one   time, `freeware' was a trademark of Andrew Fluegelman, the...
freeware2 is  program PC-TALK III.  It wasn't   enforced after his mysterious disappearance and presumed death   in 1984.  See {shareware}. 
freeze is  v. To lock an evolving software distribution or document   against changes so it can be released with some hope of stability.   Carries the strong implication that the item in question will   `unfreeze' at some future date.  "OK, fix that ...
freeze2 is  are more specific constructions on this.  A `feature freeze',   for example, locks out modifications intended to introduce new   features; a `code freeze' connotes no more changes at all.   At Sun Microsystems and elsewhere, one may also ...
freeze3 is  an almost-but-not-quite frozen state. 
fried is  adj. 1. Non-working due to hardware failure; burnt out.   Especially used of hardware brought down by a `power glitch' (see   {glitch}), {drop-outs}, a short, or some other electrical   event.  (Sometimes this literally happens to electroni...
fried2 is  burn out and transformers can melt   down, emitting noxious smoke.  However, this term is also used   metaphorically.)  Compare {frotzed}.  2. Of people, exhausted.   Said particularly of those who continue to work in such a state.   Often...
fried3 is  know that fix   destroyed the file system, but I was fried when I put it in."   Esp. common in conjunction with `brain' "My brain is fried   today, I'm very short on sleep." 
friode is  /fri'ohd/ [TMRC] n. A reversible (that is, fused or   blown) diode.  Compare {fried}.
fritterware is  n. An excess of capability that serves no productive   end.  The canonical example is font-diddling software on the Mac   (see {macdink}); the term describes anything that eats huge   amounts of time for quite marginal gains in functi...
frob is  /frob/ 1. n. [MIT] The {TMRC} definition was "FROB = a   protruding arm or trunnion"; by metaphoric extension, a `frob' is   any random small thing; an object that you can comfortably hold in   one hand; something you can frob.  See {frobnit...

factpacks/jargon-split.fact  view on Meta::CPAN

hook4 is  latter has useful hooks in judiciously chosen places.  Both may do   the original job about equally well, but the one with the hooks is   much more flexible for future expansion of capabilities ({EMACS},   for example, is *all* hooks).  The...
hook5 is  formal and less hackish. 
hop is  n. One file transmission in a series required to get a file   from point A to point B on a store-and-forward network.  On such   networks (including {UUCPNET} and {FidoNet}), the important   inter-machine metric is the number of hops in the s...
hop2 is  geographical separation.  See   {bang path}. 
hose is  1. vt. To make non-functional or greatly degraded in   performance.  "That big ray-tracing program really hoses the   system."  See {hosed}.  2. n. A narrow channel through which   data flows under pressure.  Generally denotes data paths tha...
hose2 is  Cabling, especially   thick Ethernet cable.  This is sometimes called `bit hose' or   `hosery' (play on `hosiery') or `etherhose'.  See also   {washing machine}. 
hosed is  adj. Same as {down}.  Used primarily by UNIX hackers.   Humorous also implies a condition thought to be relatively easy to   reverse.  Probably derived from the Canadian slang `hoser'   popularized by the Bob and Doug Mackenzie skits on SCT...
hosed2 is  people in the mainstream sense   of `in an extremely unfortunate situation'.   Once upon a time, a Cray that had been experiencing periodic   difficulties crashed, and it was announced to have been hosed.   It was discovered that the crash...
hosed3 is  hoses.  The problem was corrected, and users were then   assured that everything was OK because the system had been rehosed.   See also {dehose}. 
hot spot is  n. 1. [primarily used by C/UNIX programmers, but   spreading] It is received wisdom that in most programs, less than   10% of the code eats 90% of the execution time; if one were to   graph instruction visits versus code addresses, one w...
hot spot2 is  a lot of low-level noise.  Such spikes   are called `hot spots' and are good candidates for heavy   optimization or {hand-hacking}.  The term is especially used of   tight loops and recursions in the code's central algorithm, as   oppos...
hot spot3 is  infrequent I/O   operations.  See {tune}, {bum}, {hand-hacking}.  2. The   active location of a cursor on a bit-map display.  "Put the   mouse's hot spot on the `ON' widget and click the left button."   3. In a massively parallel comput...
hot spot4 is  all 10,000 processors are trying to read or   write at once (perhaps because they are all doing a {busy-wait}   on the same lock). 
house wizard is  [prob. from ad-agency lingo, `house freak'] n. A   hacker occupying a technical-specialist, R&D, or systems position   at a commercial shop.  A really effective house wizard can have   influence out of all proportion to his/her osten...
house wizard2 is  suit.  Used esp. of UNIX wizards.  The   term `house guru' is equivalent. 
HP-SUX is  /H-P suhks/ n. Unflattering hackerism for HP-UX,   Hewlett-Packard's UNIX port.  Features some truly unique bogosities   in the filesystem internals and elsewhere which occasionally create   portability problems.  HP-UX is often referred t...
HP-SUX2 is  respondent claims that the proper pronunciation   is /H-P ukkkhhhh/ as though one were about to spit.  Another such   alternate spelling and pronunciation is "H-PUX" /H-puhks/.   Hackers at HP/Apollo (the former Apollo Computers which was...
HP-SUX3 is  complain that Mr. Packard should   have pushed to have his name first, if for no other reason than the   greater eloquence of the resulting acronym.  Compare {buglix}.   See also {Telerat}, {sun-stools}, {terminak}. 
huff is  v. To compress data using a Huffman code.  Various programs   that use such methods have been called `HUFF' or some variant   thereof.  Oppose {puff}.  Compare {crunch}, {compress}.
humma is  // excl. A filler word used on various `chat' and   `talk' programs when you had nothing to say but felt that it was   important to say something.  The word apparently originated (at   least with this definition) on the MECC Timeshare Syste...
humma2 is  time-sharing system running in Minnesota   during the 1970s and the early 1980s) but was later sighted on   early UNIX systems. 
Humor, Hacker is  n. A distinctive style of shared intellectual humor   found among hackers, having the following distinctive   characteristics   1. Fascination with form-vs.-content jokes, paradoxes, and humor   having to do with confusion of metale...
Humor, Hacker2 is  laugh hold a red index card in front of him/her   with "GREEN" written on it, or vice-versa (note, however, that   this is funny only the first time).   2. Elaborate deadpan parodies of large intellectual constructs, such   as spec...
Humor, Hacker3 is  documents,   language descriptions (see {INTERCAL}), and even entire scientific   theories (see {quantum bogodynamics}, {computron}).   3. Jokes that involve screwily precise reasoning from bizarre,   ludicrous, or just grossly cou...
Humor, Hacker4 is  puns and wordplay.   5. A fondness for apparently mindless humor with subversive   currents of intelligence in it --- for example, old Warner Brothers   and Rocky & Bullwinkle cartoons, the Marx brothers, the early   B-52s, and Mon...
Humor, Hacker5 is  this   trait with elements of high camp and slapstick is especially   favored.   6. References to the symbol-object antinomies and associated ideas   in Zen Buddhism and (less often) Taoism.  See {has the X nature},   {Discordianis...
Humor, Hacker6 is  See also {filk}, {retrocomputing}, and appendix B.  If you have an   itchy feeling that all 6 of these traits are really aspects of   one thing that is incredibly difficult to talk about exactly, you   are (a) correct and (b) respo...
Humor, Hacker7 is  recognizable (though in a less marked form) throughout   {{science-fiction fandom}}. 
hung is  [from `hung up'] adj. Equivalent to {wedged}, but more   common at UNIX/C sites.  Not generally used of people.  Syn. with   {locked up}, {wedged}; compare {hosed}.  See also {hang}.   A hung state is distinguished from {crash}ed or {down}, ...
hung2 is  but because it is not running   rather than because it is waiting for something.  However, the   recovery from both situations is often the same. 
hungry puppy is  n. Syn. {slopsucker}.
hungus is  /huhng'g*s/ [perhaps related to slang `humongous'] adj.   Large, unwieldy, usually unmanageable.  "TCP is a hungus piece of   code."  "This is a hungus set of modifications."
hyperspace is  /hi'per-spays/ n. A memory location that is *far*   away from where the program counter should be pointing, often   inaccessible because it is not even mapped in.  "Another core   dump --- looks like the program jumped off to hyperspac...
hyperspace2 is  never-never land}.)  This   usage is from the SF notion of a spaceship jumping `into   hyperspace', that is, taking a shortcut through higher-dimensional   space --- in other words, bypassing this universe.  The variant   `east hypers...
hyperspace3 is  hackers.*I didn't change anything! interj. An aggrieved cry often heard as   bugs manifest during a regression test.  The {canonical} reply to   this assertion is "Then it works just the same as it did before,   doesn't it?"  See also...
hyperspace4 is  applications programmers trying to blame an obvious applications   problem on an unrelated systems software change, for example a   divide-by-0 fault after terminals were added to a network.   Usually, their statement is found to be f...
hyperspace5 is  admit some major restructuring of the   program that shouldn't have broken anything, in their opinion,   but which actually {hosed} the code completely. 
I see no X here. is  Hackers (and the interactive computer games they   write) traditionally favor this slightly marked usage over other   possible equivalents such as "There's no X here!" or "X is   missing."  or "Where's the X?".  This goes back to...
I see no X here.2 is  respond in this wise if you asked   it to do something involving an object not present at your location   in the game. 
i14y is  // n. Abbrev. for `interoperability', with the `14'   replacing fourteen letters.  Used in the {X} (windows)   community.  Refers to portability and compatibility of data formats   (even binary ones) between different programs or implementat...
i18n is  // n. Abbrev. for `internationali{z,s}ation', with the 18   replacing 18 letters.  Used in the {X} (windows) community.
IBM is  /I-B-M/ Inferior But Marketable; It's Better Manually;   Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel   Movement; and a near-{infinite} number of even less complimentary   expansions, including `International Business Ma...
IBM2 is  illustrate the considerable   antipathy most hackers have long felt toward the `industry leader'   (see {fear and loathing}).   What galls hackers about most IBM machines above the PC level isn't   so much that they are underpowered and over...
IBM3 is  but that the designs are incredibly archaic,   {crufty}, and {elephantine} ... and you can't *fix* them   --- source code is locked up tight, and programming tools are   expensive, hard to find, and bletcherous to use once you've found   the...
IBM4 is  family this may have   begun to change --- but then, we thought that when the PC-RT came   out, too.   In the spirit of universal peace and brotherhood, this lexicon now   includes a number of entries attributed to `IBM'; these derive from s...
IBM5 is  circulated within IBM's own   beleaguered hacker underground. 
IBM discount is  n. A price increase.  Outside IBM, this derives from   the common perception that IBM products are generally overpriced   (see {clone}); inside, it is said to spring from a belief that   large numbers of IBM employees living in an ar...
ice is  [coined by USENETter Tom Maddox, popularized by William   Gibson's cyberpunk SF novels acronym for `Intrusion   Countermeasure Electronics'] Security software (in Gibson's novels,   software that responds to intrusion by attempting to literal...
ice2 is  program designed for   cracking security on a system.  Neither term is in serious use yet   as of mid-1991, but many hackers find the metaphor attractive, and   each may develop a denotation in the future. 
ifdef out is  /if'def owt/ v. Syn. for {condition out}, specific   to {C}.
ill-behaved is  adj. 1. [numerical analysis] Said of an algorithm or   computational method that tends to blow up because of accumulated   roundoff error or poor convergence properties.  2. Software that   bypasses the defined {OS} interfaces to do t...
ill-behaved2 is  itself, often in a way that depends on the   hardware of the machine it is running on or which is nonportable or   incompatible with other pieces of software.  In the IBM PC/MS-DOS   world, there is a folk theorem (nearly true) to th...
ill-behaved3 is  and performance penalties in the OS   interface) all interesting applications are ill-behaved.  See also   {bare metal}. Oppose {well-behaved}, compare {PC-ism}.  See   {mess-dos}. 
IMHO is  // [from SF fandom via USENET; acronym for `In My Humble   Opinion']  "IMHO, mixed-case C names should be avoided, as   mistyping something in the wrong case can cause hard-to-detect   errors --- and they look too Pascalish anyhow."  Also se...
IMHO2 is  Not-So-Humble Opinion) and IMAO   (In My Arrogant Opinion). 
in the extreme is  adj. A preferred superlative suffix for many hackish   terms.  See, for example, `obscure in the extreme' under {obscure},   and compare {highly}.
incantation is  n. Any particularly arbitrary or obscure command that   one must mutter at a system to attain a desired result.  Not used   of passwords or other explicit security features.  Especially used   of tricks that are so poorly documented t...
incantation2 is  compiler normally locates initialized data   in the data segment, but if you {mutter} the right incantation they   will be forced into text space." 
include is  vt. [USENET] 1. To duplicate a portion (or whole) of   another's message (typically with attribution to the source) in a   reply or followup, for clarifying the context of one's response.   See the the discussion of inclusion styles under...
include2 is  `#include <disclaimer.h>'   has appeared in {sig block}s to refer to a notional `standard   disclaimer file'. 
include war is  n. Excessive multi-leveled including within a   discussion {thread}, a practice that tends to annoy readers.  In   a forum with high-traffic newsgroups, such as USENET, this can lead   to {flame}s and the urge to start a {kill file}.
indent style is  [C programmers] n. The rules one uses to indent code   in a readable fashion; a subject of {holy wars}.  There are four   major C indent styles, described below; all have the aim of   making it easier for the reader to visually track...
indent style2 is  significant variable is the placement of   `{' and `}' with respect to the statement(s) they   enclose and the guard or controlling statement (`if',   `else', `for', `while', or `do') on the block,   if any.   `K&R style' --- Named ...
indent style3 is  examples in {K&R} are formatted this way.  Also called `kernel   style' because the UNIX kernel is written in it, and the `One True   Brace Style' (abbrev. 1TBS) by its partisans.  The basic indent   shown here is eight spaces (or o...
indent style4 is  seen, but are much less common.     if (cond) {             <body>     }   `Allman style' --- Named for Eric Allman, a Berkeley hacker who   wrote a lot of the BSD utilities in it (it is sometimes called   `BSD style').  Resembles n...
indent style5 is  indent per level shown here is eight spaces, but four is just   as common (esp. in C++ code).     if (cond)     {             <body>     }   `Whitesmiths style' --- popularized by the examples that came   with Whitesmiths C, an earl...
indent style6 is  level shown here is eight spaces, but four is occasionally seen.     if (cond)             {             <body>             }   `GNU style' --- Used throughout GNU EMACS and the Free Software   Foundation code, and just about nowher...
indent style7 is  level, with `{' and `}' halfway between the   outer and inner indent levels.     if (cond)       {         <body>       }   Surveys have shown the Allman and Whitesmiths styles to be the most   common, with about equal mind shares. ...
indent style8 is  now much less common (the opening brace tends to   get lost against the right paren of the guard part in an `if'   or `while', which is a {Bad Thing}).  Defenders of 1TBS   argue that any putative gain in readability is less importa...
indent style9 is  vertical space, which enables   one to see more code on one's screen at once.  Doubtless these   issues will continue to be the subject of {holy wars}. 
index is  n. See {coefficient}.
infant mortality is  n. It is common lore among hackers that the   chances of sudden hardware failure drop off exponentially with a   machine's time since power-up (that is, until the relatively   distant time at which enough mechanical wear in I/O d...
infant mortality2 is  components has accumulated for the   machine to start going senile).  Up to half of all chip and wire   failures happen within a new system's first few weeks; such   failures are often referred to as `infant mortality' problems ...
infant mortality3 is  syndrome').  See   {bathtub curve}, {burn-in period}. 
infinite is  adj. Consisting of a large number of objects; extreme.   Used very loosely as in "This program produces infinite   garbage."  "He is an infinite loser."  The word most likely to   follow `infinite', though, is {hair} (it has been pointed...
infinite2 is  of infinite hair).  These   uses are abuses of the word's mathematical meaning.  The term   `semi-infinite', denoting an immoderately large amount of some   resource, is also heard.  "This compiler is taking a semi-infinite   amount of ...
infinite loop is  n. One that never terminates (that is, the machine   {spin}s or {buzz}es forever; the usual symptom is   {catatonia}).  There is a standard joke that has been made about   each generation's exemplar of the ultra-fast machine "The Cr...
infinite loop2 is  loop in under 2 seconds!" 
infinity is  n. 1. The largest value that can be represented in a   particular type of variable (register, memory location, data type,   whatever).  2. `minus infinity' The smallest such value, not   necessarily or even usually the simple negation of...
infinity2 is  arithmetic, infinity is   2^{N-1} - 1 but minus infinity is - (2^{N-1}),   not -(2^{N-1} - 1).  Note also that this is different from   "time T equals minus infinity", which is closer to a   mathematician's usage of infinity. 
insanely great is  adj. [Mac community, from Steve Jobs; also BSD UNIX   people via Bill Joy] Something so incredibly {elegant} that it is   imaginable only to someone possessing the most puissant of   {hacker}-natures.
INTERCAL is  /in't*r-kal/ [said by the authors to stand for   `Compiler Language With No Pronounceable Acronym'] n. A   computer language designed by Don Woods and James Lyon in 1972.   INTERCAL is purposely different from all other computer   langua...
INTERCAL2 is  written language,   being totally unspeakable.  An excerpt from the INTERCAL Reference   Manual will make the style of the language clear        It is a well-known and oft-demonstrated fact that a person whose        work is incomprehen...
INTERCAL3 is        one were to state that the simplest way to store a value of 65536        in a 32-bit INTERCAL variable is          DO 1 <- #0$#256        any sensible programmer would say that that was absurd.  Since this        is indeed the sim...
INTERCAL4 is  look        foolish in front of his boss, who would of course have happened to        turn up, as bosses are wont to do.  The effect would be no less        devastating for the programmer having been correct.   INTERCAL has many other p...
INTERCAL5 is  more unspeakable.  The Woods-Lyons implementation was actually used   by many (well, at least several) people at Princeton.  The language   has been recently reimplemented as C-INTERCAL and is consequently   enjoying an unprecedented le...
INTERCAL6 is  alt.lang.intercal newsgroup devoted to the study and ...   appreciation of the language on USENET. 
interesting is  adj. In hacker parlance, this word has strong   connotations of `annoying', or `difficult', or both.  Hackers   relish a challenge, and enjoy wringing all the irony possible out   of the ancient Chinese curse "May you live in interest...
Internet address is  n. 1. [techspeak] An absolute network address of   the form foo@bar.baz, where foo is a user name, bar is a   {sitename}, and baz is a `domain' name, possibly including   periods itself.  Contrast with {bang path}; see also {netw...
Internet address2 is  Internet machines and most UUCP   sites can now resolve these addresses, thanks to a large amount of   behind-the-scenes magic and PD software written since 1980 or so.   See also {bang path}, {domainist}.  2. More loosely, any ...
Internet address3 is  this includes {bang   path} addresses and some internal corporate and government   networks.   Reading Internet addresses is something of an art.  Here are the   four most important top-level functional Internet domains followed...
Internet address4 is  com          commercial organizations     edu          educational institutions     gov          U.S. government civilian sites     mil          U.S. military sites   Note that most of the sites in the com and edu domains are in...
Internet address5 is  the U.S. outside the functional domains     su          sites in the Soviet Union (see {kremvax}).     uk          sites in the United Kingdom   Within the us domain, there are subdomains for the fifty   states, each generally w...
Internet address6 is  abbreviation.  Within the uk domain, there is an ac subdomain for   academic sites and a co domain for commercial ones.  Other   top-level domains may be divided up in similar ways. 
interrupt is  1. [techspeak] n. On a computer, an event that   interrupts normal processing and temporarily diverts   flow-of-control through an "interrupt handler" routine.  See also   {trap}.  2. interj. A request for attention from a hacker.   Oft...
interrupt2 is  seen Joe   recently?"  See {priority interrupt}.  3. Under MS-DOS, the   term `interrupt' is nearly synonymous with `system call', because   the OS and BIOS routines are both called using the INT instruction   (see {{interrupt list, th...
interrupt3 is  bypass the OS (going directly to a BIOS interrupt) to get   reasonable performance. 
interrupt list, the is  [MS-DOS] n. The list of all known software   interrupt calls (both documented and undocumented) for IBM PCs and   compatibles, maintained and made available for free redistribution   by Ralf Brown (ralf@cs.cmu.edu).  As of ear...
interrupts locked out is  When someone is ignoring you.  In a   restaurant, after several fruitless attempts to get the waitress's   attention, a hacker might well observe "She must have interrupts   locked out".  The synonym `interrupts disabled' is...
interrupts locked out2 is  have one's interrupt mask bit set"   or "interrupts masked out" is also heard.  See also {spl}. 
iron is  n. Hardware, especially older and larger hardware of   {mainframe} class with big metal cabinets housing relatively   low-density electronics (but the term is also used of modern   supercomputers).  Often in the phrase {big iron}.  Oppose   ...
Iron Age is  n. In the history of computing, 1961--1971 --- the   formative era of commercial {mainframe} technology, when {big   iron} {dinosaur}s ruled the earth.  These began with the delivery   of the first PDP-1, coincided with the dominance of ...
Iron Age2 is  introduction of the first commercial   microprocessor (the Intel 4004) in 1971.  See also {Stone Age};   compare {elder days}. 
iron box is  [UNIX/Internet] n. A special environment set up to trap   a {cracker} logging in over remote connections long enough to be   traced.  May include a modified {shell} restricting the hacker's   movements in unobvious ways, and `bait' files...
iron box2 is  on.  See also {back door}, {firewall   machine}, {Venus flytrap}, and Clifford Stoll's account in   `The Cuckoo's Egg' of how he made and used one (see   the Bibliography).  Compare {padded cell}. 
ironmonger is  [IBM] n. Derogatory.  A hardware specialist.  Compare   {sandbender}, {polygon pusher}.
ITS is  /I-T-S/ n. 1. Incompatible Time-sharing System, an   influential but highly idiosyncratic operating system written for   PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab.  Much   AI-hacker jargon derives from ITS folklore, and to hav...
ITS2 is  instantly as an old-timer of the most   venerable sort.  ITS pioneered many important innovations,   including transparent file sharing between machines and   terminal-independent I/O.  After about 1982, most actual work was   shifted to new...
ITS3 is  essentially as a hobby and service to the hacker community.  The   shutdown of the lab's last ITS machine in May 1990 marked the end   of an era and sent old-time hackers into mourning nationwide (see   {high moby}).  The Royal Institute of ...
ITS4 is  `live' ITS site at its computer museum (right next   to the only TOPS-10 system still on the Internet), so ITS is still   alleged to hold the record for OS in longest continuous use   (however, {{WAITS}} is a credible rival for this palm).  ...
ITS5 is  operating-system perfection   worshiped by a bizarre, fervent retro-cult of old-time hackers and   ex-users (see {troglodyte}, sense 2).  ITS worshipers manage   somehow to continue believing that an OS maintained by   assembly-language hand...
ITS6 is  6-character filenames in one directory per account remains superior   to today's state of commercial art (their venom against UNIX is   particularly intense).  See also {holy wars},   {Weenix}. 
IWBNI is  // [acronym] `It Would Be Nice If'.  Compare {WIBNI}.
IYFEG is  // [USENET] Abbreviation for `Insert Your Favorite Ethnic   Group'.  Used as a meta-name when telling racist jokes on the net to   avoid offending anyone.  See {JEDR}.*J. Random /J rand'm/ n. [generalized from {J. Random Hacker}]   Arbitrar...
IYFEG2 is  often   prefixed to a noun to make a name out of it.  It means roughly   `some particular' or `any specific one'.  "Would you let   J. Random Loser marry your daughter?"  The most common uses are   `J. Random Hacker', `J. Random Loser', an...
IYFEG3 is  be allowed to {gun} down other   people?"), but it can be used simply as an elaborate version of   {random} in any sense. 
J. Random Hacker is  [MIT] /J rand'm hak'r/ n. A mythical figure   like the Unknown Soldier; the archetypal hacker nerd.  See   {random}, {Suzie COBOL}.  This may originally have been   inspired or influenced by `J. Fred Muggs', a show-biz chimpanzee...
jaggies is  /jag'eez/ n. The `stairstep' effect observable when an   edge (esp. a linear edge of very shallow or steep slope) is   rendered on a pixel device (as opposed to a vector display).
JCL is  /J-C-L/ n. 1. IBM's supremely {rude} Job Control   Language.  JCL is the script language used to control the execution   of programs in IBM's batch systems.  JCL has a very {fascist}   syntax, and some versions will, for example, {barf} if tw...
JCL2 is  programmers confronted   with JCL simply copy a working file (or card deck), changing the   file names.  Someone who actually understands and generates unique   JCL is regarded with the mixed respect one gives to someone who   memorizes the ...
JCL3 is    itself sometimes sing "Who's the breeder of the crud that mangles   you and me?  I-B-M, J-C-L, M-o-u-s-e" to the tune of the   "Mickey Mouse Club" theme to express their opinion of the   beast.  2. A comparative for any very {rude} softwar...

factpacks/jargon-split.fact  view on Meta::CPAN

tar and feather2 is  an airplane   propeller to decrease wind resistance, or with an oar to reduce   water resistance; smaller files, after all, slip through comm links   more easily. 
taste is  [primarily MIT] n. 1. The quality in a program that tends   to be inversely proportional to the number of features, hacks, and   kluges programmed into it.  Also `tasty, `tasteful,   `tastefulness.  "This feature comes in N tasty flavors." ...
taste2 is  essentially   synonyms, `taste and {flavor} are not.  Taste refers to   sound judgment on the part of the creator; a program or feature   can *exhibit* taste but cannot {have} taste.  On the other   hand, a feature can have {flavor}.  Also...
taste3 is  `kind or `variety not shared by   `taste.  {Flavor} is a more popular word than `taste,   though both are used.  See also {elegant}.  2. Alt. sp. of   {tayste}. 
tayste is  /tayst/ n. Two bits; also as {taste}.  Syn. {crumb},   {quarter}.  Compare {{byte}}, {dynner}, {playte},   {nybble}, {quad}.
TCB is  /T-C-B/ [IBM] n. 1. Trouble Came Back.  An intermittent or   difficult-to-reproduce problem that has failed to respond to   neglect.  Compare {heisenbug}.  Not to be confused with   2. Trusted Computing Base, an `official jargon term from the...
ISO standard cup of tea is  [South Africa] n. A cup of tea with milk   and one teaspoon of sugar, where the milk is poured into the cup   before the tea.  Variations are ISO 0, with no sugar; ISO 2, with   two spoons of sugar; and so on.   Like many ...
ISO standard cup of tea2 is  ring in North   America, where hackers generally shun the decadent British practice   of adulterating perfectly good tea with dairy products and   prefer instead to add a wedge of lemon, if anything.  If one were   feelin...
ISO standard cup of tea3 is  analogous `ANSI   standard cup of tea and wind up with a political situation   distressingly similar to several that arise in much more serious   technical contexts.  Milk and lemon dont mix very well. 
TechRef is  /tekref/ [MS-DOS] n. The original `IBM PC   Technical Reference Manual, including the BIOS listing and   complete schematics for the PC.  The only PC documentation in the   issue package thats considered serious by real hackers.
TECO is  /teekoh/ obs. 1. vt. Originally, to edit using the TECO   editor in one of its infinite variations (see below).  2. vt.,obs.   To edit even when TECO is *not* the editor being used!  This   usage is rare and now primarily historical.  2. [or...
TECO2 is  and COrrector; later, `Text   Editor and COrrector] n. A text editor developed at MIT and   modified by just about everybody.  With all the dialects included,   TECO might have been the most prolific editor in use before   {EMACS}, to which...
TECO3 is  powerful programming-language-like features and its unspeakably   hairy syntax.  It is literally the case that every string of   characters is a valid TECO program (though probably not a useful   one); one common hacker game used to be ment...
TECO4 is  corresponding to human names did.  As an example   of TECOs obscurity, here is a TECO program that takes a list of   names such as     Loser, J. Random     Quux, The Great     Dick, Moby   sorts them alphabetically according to surname, and...
TECO5 is  comma, to produce the following     Moby Dick     J. Random Loser     The Great Quux   The program is     [1 J^P$L$$     J <.-Z; .,(S,$ -D .)FX1 @F^B $K L I $ G1 L>$$   (where ^B means `Control-B (ASCII 0000010) and $ is actually   an {ALT}...
TECO6 is  fact, this very program was used to produce the second, sorted   list from the first list.  The first hack at it had a {bug} GLS   (the author) had accidentally omitted the `@ in front   of `F^B, which as anyone can see is clearly the {Wron...
TECO7 is  There is no space to describe all the   features of TECO, but it may be of interest that `^P means   `sort and `J<.-Z; ... L> is an idiomatic series of commands   for `do once for every line.   In mid-1991, TECO is pretty much one with the ...
TECO8 is  affections of hackerdom by {EMACS}.   Descendants of an early (and somewhat lobotomized) version adopted   by DEC can still be found lurking on VMS and a couple of crufty   PDP-11 operating systems, however, and ports of the more advanced  ...
TECO9 is  antiquarian interest.  See   also {retrocomputing}, {write-only language}. 
tee is  n.,vt. [Purdue] A carbon copy of an electronic transmission.   "Oh, youre sending him the {bits} to that?  Slap on a tee for   me."  From the UNIX command `tee(1), itself named after a   pipe fitting (see {plumbing}).  Can also mean `save one...
Telerat is  /tel*-rat/ n. Unflattering hackerism for `Teleray, a   line of extremely losing terminals.  See also {terminak},   {sun-stools}, {HP-SUX}.
TELNET is  /telnet/ vt. To communicate with another Internet host   using the {TELNET} program.  TOPS-10 people used the word   IMPCOM, since that was the program name for them.  Sometimes   abbreviated to TN /T-N/.  "I usually TN over to SAIL just t...
ten-finger interface is  n. The interface between two networks that   cannot be directly connected for security reasons; refers to the   practice of placing two terminals side by side and having an   operator read from one and type into the other.
tense is  adj. Of programs, very clever and efficient.  A tense piece   of code often got that way because it was highly {bum}med, but   sometimes it was just based on a great idea.  A comment in a clever   routine by Mike Kazar, once a grad-student ...
tense2 is  will bring tears to your eyes."  A tense   programmer is one who produces tense code. 
tenured graduate student is  n. One who has been in graduate school   for 10 years (the usual maximum is 5 or 6) a `ten-yeared   student (get it?).  Actually, this term may be used of any grad   student beginning in his seventh year.  Students dont r...
tenured graduate student2 is  professors do, but a tenth-year graduate   student has probably been around the university longer than any   untenured professor. 
tera- is  /ter*/ [SI] pref. See {{quantifiers}}.
teraflop club is  /ter*-flop kluhb/ [FLOP = Floating Point   Operation] n. A mythical association of people who consume outrageous   amounts of computer time in order to produce a few simple pictures   of glass balls with intricate ray-tracing techni...
teraflop club2 is  said to have been the founder. 
terminak is  /termi-nak`/ [Caltech, ca. 1979] n. Any malfunctioning   computer terminal.  A common failure mode of Lear-Siegler ADM 3a   terminals caused the `L key to produce the `K code instead;   complaints about this tended to look like "Terminak...
terminak2 is  {sun-stools}, {Telerat},   {HP-SUX}. 
terminal brain death is  n. The extreme form of {terminal illness}   (sense 1).  What someone who has obviously been hacking   continuously for far too long is said to be suffering from.
terminal illness is  n. 1. Syn. {raster burn}.  2. The `burn-in   condition your CRT tends to get if you dont have a screen saver.
terminal junkie is  [UK] n. A {wannabee} or early   {larval stage} hacker who spends most of his or her time wandering   the directory tree and writing {noddy} programs just to get   a fix of computer time.  Variants include `terminal   jockey, `cons...
terminal junkie2 is  `console jockey seems to imply more expertise than the other   three (possibly because of the exalted status of the {{console}}   relative to an ordinary terminal).  See also {twink},   {read-only user}. 
terpri is  /terpree/ [from LISP 1.5 (and later, MacLISP)] vi. To   output a {newline}.  Now rare as jargon, though still used as   techspeak in Common LISP.  It is a contraction of `TERminate PRInt   line, named for the fact that, on early OSes, no c...
terpri2 is  line was formed, so this operation   terminated the line and emitted the output. 
test is  n. 1. Real users bashing on a prototype long enough to get   thoroughly acquainted with it, with careful monitoring and followup   of the results.  2. Some bored random user trying a couple of the   simpler features with a developer looking ...
test2 is  mistakes.  Judging by the quality of most   software, the second definition is far more prevalent.  See also   {demo}. 
TeX is  /tekh/ n. An extremely powerful {macro}-based   text formatter written by Donald E. Knuth, very popular in the   computer-science community (it is good enough to have displaced   UNIX `troff(1), the other favored formatter, even at many   UNI...
TeX2 is  correct (guttural)   pronunciation, and the correct spelling (all caps, squished   together, with the E depressed below the baseline; the   mixed-case `TeX is considered an acceptable kluge on ASCII-only   devices).  Fans like to proliferate...
TeX3 is  TeXnician (TeX user), TeXhacker (TeX   programmer), TeXmaster (competent TeX programmer), TeXhax,   and TeXnique.   Knuth began TeX because he had become annoyed at the declining   quality of the typesetting in volumes I--III of his monument...
TeX4 is  {bible}).  In a   manifestation of the typical hackish urge to solve the problem at   hand once and for all, he began to design his own typesetting   language.  He thought he would finish it on his sabbatical in 1978;   he was wrong by only ...
TeX5 is  frozen around 1985, but volume IV of `The Art of Computer   Programming has yet to appear as of mid-1991.  The impact and   influence of TeXs design has been such that nobody minds this   very much.  Many grand hackish projects have started ...
TeX6 is  something else; Knuths diversion was   simply on a grander scale than most. 
text is  n. 1. [techspeak] Executable code, esp. a `pure code   portion shared between multiple instances of a program running in a   multitasking OS (compare {English}).  2. Textual material in the   mainstream sense; data in ordinary {{ASCII}} or {...
text2 is   "Those are text files;   you can review them using the editor."  These two contradictory   senses confuse hackers, too. 
thanks in advance is  [USENET] Conventional net.politeness ending a   posted request for information or assistance.  Sometimes written   `advTHANKSance or `aTdHvAaNnKcSe or abbreviated `TIA.  See   {net.-}, {netiquette}.
the X that can be Y is not the true X is  Yet another instance of   hackerdoms peculiar attraction to mystical references --- a common   humorous way of making exclusive statements about a class of   things.  The template is from the `Tao te Ching "T...
the X that can be Y is not the true X2 is  true Tao."  The implication   is often that the X is a mystery accessible only to the   enlightened.  See the {trampoline} entry for an example, and   compare {has the X nature}. 
theology is  n. 1. Ironically or humorously used to refer to   {religious issues}.  2. Technical fine points of an abstruse   nature, esp. those where the resolution is of theoretical   interest but is relatively {marginal} with respect to actual use...
theology2 is  software issues with a   heavy AI or language-design component, such as the smart-data vs.   smart-programs dispute in AI. 
theory is  n. The consensus, idea, plan, story, or set of rules that   is currently being used to inform a behavior.  This is a   generalization and abuse of the technical meaning.  "Whats the   theory on fixing this TECO loss?"  "Whats the theory on...
theory2 is  "Whats the current theory   on letting lusers on during the day?"  "The theory behind this   change is to fix the following well-known screw...." 
thinko is  /thingkoh/ [by analogy with `typo] n. A momentary,   correctable glitch in mental processing, especially one involving   recall of information learned by rote; a bubble in the stream of   consciousness.  Syn. {braino}.  Compare {mouso}.
This time, for sure! is  excl. Ritual affirmation frequently uttered   during protracted debugging sessions involving numerous small   obstacles (e.g., attempts to bring up a UUCP connection).  For the   proper effect, this must be uttered in a fruit...
This time, for sure!2 is  heard "Hey, Rocky!  Watch me pull a   rabbit out of my hat!"  The {canonical} response is, of course,   "But that trick *never* works!"  See {{Humor, Hacker}}. 
thrash is  vi. To move wildly or violently, without accomplishing   anything useful.  Paging or swapping systems that are overloaded   waste most of their time moving data into and out of core (rather   than performing useful computation) and are the...
thrash2 is  changing his mind (esp. about what to   work on next) is said to be thrashing.  A person frantically trying   to execute too many tasks at once (and not spending enough time on   any single task) may also be described as thrashing.  Compa...
thread is  n. [USENET, GEnie, CompuServe] Common abbreviation of   `topic thread, a more or less continuous chain of postings on a   single topic.
three-finger salute is  n. Syn. {Vulcan nerve pinch}.
thud is  n. 1. Yet another meta-syntactic variable (see {foo}).   It is reported that at CMU from the mid-1970s the canonical series of   these was `foo, `bar, `thud, `blat.  2. Rare term   for the hash character, `# (ASCII 0100011).  See {ASCII} for...
thunk is  /thuhnk/ n. 1. "A piece of coding which provides an   address", according to P. Z. Ingerman, who invented thunks   in 1961 as a way of binding actual parameters to their formal   definitions in Algol-60 procedure calls.  If a procedure is c...
thunk2 is  formal parameter, the compiler   generates a {thunk} to compute the expression and leave the   address of the result in some standard location.  2. Later   generalized into an expression, frozen together with its   environment, for later e...
thunk3 is  in techspeak is called a `closure).  The process of   unfreezing these thunks is called `forcing.  3. A   {stubroutine}, in an overlay programming environment, that loads   and jumps to the correct overlay.  Compare {trampoline}.   4. Peop...
thunk4 is  manner.  "It   occurred to me the other day that I am rather accurately modeled by   a thunk --- I frequently need to be forced to completion." ---   paraphrased from a {plan file}.   Historical note There are a couple of onomatopoeic myth...
thunk5 is  The most common is that   it is the sound made by data hitting the stack; another holds that   the sound is that of the data hitting an accumulator.  Yet another   holds that it is the sound of the expression being unfrozen at   argument-e...
thunk6 is  inventors, it   was coined after they realized (in the wee hours after hours of   discussion) that the type of an argument in Algol-60 could be   figured out in advance with a little compile-time thought,   simplifying the evaluation machi...
thunk7 is  thought of; thus it was christened a `thunk,   which is "the past tense of `think at two in the morning". 
tick is  n. 1. A {jiffy} (sense 1).  2. In simulations, the   discrete unit of time that passes between iterations of the   simulation mechanism.  In AI applications, this amount of time is   often left unspecified, since the only constraint of inter...
tick2 is  AI simulation is often   pejoratively referred to as `tick-tick-tick simulation,   especially when the issue of simultaneity of events with long,   independent chains of causes is {handwave}d. 3. In the FORTH   language, a single quote char...
tick-list features is  [Acorn Computers] n. Features in software or   hardware that customers insist on but never use (calculators in   desktop TSRs and that sort of thing).  The American equivalent   would be `checklist features, but this jargon sen...
tickle a bug is  vt. To cause a normally hidden bug to manifest   through some known series of inputs or operations.  "You can   tickle the bug in the Paradise VGA cards highlight handling by   trying to set bright yellow reverse video."
tiger team is  [U.S. military jargon] n. A team whose purpose is to   penetrate security, and thus test security measures.  These people   are paid professionals who do hacker-type tricks, e.g., leave   cardboard signs saying "bomb" in critical defen...
tiger team2 is  "Your codebooks have been stolen"   (they usually havent been) inside safes, etc.  After a successful   penetration, some high-ranking security type shows up the next   morning for a `security review and finds the sign, note, etc.,   ...
tiger team3 is  of tiger teams   sometimes lead to early retirement for base commanders and security   officers (see the {patch} entry for an example).   A subset of tiger teams are professional {cracker}s, testing the   security of military computer...
tiger team4 is  via networks or supposedly `secure comm channels.  Some of   their escapades, if declassified, would probably rank among the   greatest hacks of all times.  The term has been adopted in   commercial computer-security circles in this m...
time sink is  [poss. by analogy with `heat sink or `current sink] n.   A project that consumes unbounded amounts of time.
time T is  /tim T/ n. 1. An unspecified but usually well-understood   time, often used in conjunction with a later time T+1.   "Well meet on campus at time T or at Louies at   time T+1" means, in the context of going out for dinner   "We can meet on ...
time T2 is  Louies   itself a bit later."  (Louies is a Chinese restaurant in Palo Alto   that is a favorite with hackers.)  Had the number 30 been used instead   of the number 1, it would have implied that the travel time from   campus to Louies is ...
time T3 is  hasnt been decided on yet), you can meet half an hour later at   Louies than you could on campus and end up eating at the same time.   See also {since time T equals minus infinity}. 
times-or-divided-by is  [by analogy with `plus-or-minus] quant. Term   occasionally used when describing the uncertainty associated with a   scheduling estimate, for either humorous or brutally honest effect.   For a software project, the factor is u...
tinycrud is  /tinee-kruhd/ n. A pejorative used by habitues of older   game-oriented {MUD} versions for TinyMUDs and other   user-extensible {MUD} variants; esp. common among users of the   rather violent and competitive AberMUD and MIST systems.  Th...
tinycrud2 is  how (allegedly)   inconsistent and lacking in genuine atmosphere the scenarios   generated in user extensible MUDs can be.  Other common knocks on   them are that they feature little overall plot, bad game topology,   little competitive...
tinycrud3 is  alleged   horrors of the TinyMUD code itself.  This dispute is one of the MUD   worlds hardiest perennial {holy wars}. 
tip of the ice-cube is  [IBM] n. The visible part of something small and   insignificant.  Used as an ironic comment in situations where `tip   of the iceberg might be appropriate if the subject were actually   nontrivial.
tired iron is  [IBM] n. Hardware that is perfectly functional but   far enough behind the state of the art to have been superseded by new   products, presumably with sufficient improvement in bang-per-buck that   the old stuff is starting to look a b...
tits on a keyboard is  n. Small bumps on certain keycaps to keep   touch-typists registered (usually on the `5 of a numeric keypad,   and on the `F and `J of a QWERTY keyboard).
TLA is  /T-L-A/ [Three-Letter Acronym] n. 1. Self-describing   acronym for a species with which computing terminology is infested.   2. Any confusing acronym.  Examples include MCA, FTP, SNA, CPU,   MMU, SCCS, DMU, FPU, NNTP, TLA.  People who like th...
TLA2 is  three letters, just as not all four-letter   words have four letters.  One also hears of `ETLA (Extended   Three-Letter Acronym, pronounced /ee tee el ay/) being used to   describe four-letter acronyms.  The term `SFLA (Stupid Four-Letter   ...
TLA3 is  {YABA}.   The self-effacing phrase "TDM TLA" (Too Damn Many...) is   often used to bemoan the plethora of TLAs in use.  In 1989, a   random of the journalistic persuasion asked hacker Paul Boutin   "What do you think will be the biggest prob...
TLA4 is  straight-faced response "There are only   17,000 three-letter acronyms." (To be exact, there are 26^3   = 17,576.) 
TMRC is  /tmerk/ n. The Tech Model Railroad Club at MIT, one of   the wellsprings of hacker culture.  The 1959 `Dictionary of   the TMRC Language compiled by Peter Samson included several terms   which became basics of the hackish vocabulary (see esp...
TMRC2 is  legendary layout was already a marvel of   complexity.  The control system alone featured about 1200 relays.   There were {scram switch}es located at numerous places around   the room that could be pressed if something undesirable was about...
TMRC3 is  an obstruction.   Another feature of the system was a digital clock on the dispatch   board.  Normally it ran at some multiple of real time, but if   someone hit a scram switch the clock stopped and the display was   replaced with the word ...
TMRC4 is  the Bibliography), gives a   stimulating account of those early years.  TMRCs Power and Signals   group included most of the early PDP-1 hackers and the people who   later bacame the core of the MIT AI Lab staff.  Thirty years later   that ...
TMRC5 is  lexicon   accordingly includes a number of entries from a recent revision of   the TMRC Dictionary. 
to a first approximation is  1. [techspeak] When one is doing certain   numerical computations, an approximate solution may be computed by   any of several heuristic methods, then refined to a final value.   By using the starting point of a first app...
to a first approximation2 is  algorithm that converges more quickly to the   correct result.  2. In jargon, a preface to any comment that   indicates that the comment is only approximately true.  The remark   "To a first approximation, I feel good" m...
to a first approximation3 is  reveal that not all is perfect (e.g., a   nagging cough still remains after an illness). 
to a zeroth approximation is  [from `to a first approximation] A   *really* sloppy approximation; a wild guess.  Compare   {social science number}.
toast is  1. n. Any completely inoperable system or component, esp.   one that has just crashed and burned "Uh, oh ... I think the   serial board is toast."  2. vt. To cause a system to crash   accidentally, especially in a manner that requires manua...
toast2 is  {firewall machine} again." 
toaster is  n. 1. The archetypal really stupid application for an   embedded microprocessor controller; often used in comments that   imply that a scheme is inappropriate technology (but see   {elevator controller}).  "{DWIM} for an assembler?  Thatd...
toaster2 is  toaster!"  2. A very, very dumb   computer. "You could run this program on any dumb toaster."  See   {bitty box}, {Get a real computer!}, {toy}, {beige toaster}.   3. A Macintosh, esp. the Classic Mac.  Some hold that this is   implied b...
toaster3 is  my box   without toasters, but since then Ive added two boards and a second   disk drive." 
toeprint is  n. A {footprint} of especially small size.
toggle is  vt. To change a {bit} from whatever state it is in to the   other state; to change from 1 to 0 or from 0 to 1.  This comes from   `toggle switches, such as standard light switches, though the   word `toggle actually refers to the mechanism...
toggle2 is  which it is flipped rather than to the   fact that the switch has two positions.  There are four things you   can do to a bit set it (force it to be 1), clear (or zero) it,   leave it alone, or toggle it.  (Mathematically, one would say t...
toggle3 is  functions of one boolean   argument, but saying that is much less fun than talking about   toggling bits.) 
tool is  1. n. A program used primarily to create, manipulate, modify,   or analyze other programs, such as a compiler or an editor or a   cross-referencing program.  Oppose {app}, {operating system}.   2. [UNIX] An application program with a simple,...
tool2 is  interface designed specifically to be used   in programmed combination with other tools (see {filter}).   3. [MIT general to students there] vi. To work; to study (connotes   tedium).  The TMRC Dictionary defined this as "to set ones brain ...
tool3 is  A student who   studies too much and hacks too little.  (MITs student humor   magazine rejoices in the name `Tool and Die.) 
toolsmith is  n. The software equivalent of a tool-and-die specialist;   one who specializes in making the {tool}s with which other   programmers create applications.  See also {uninteresting}.
topic drift is  n. Term used on GEnie, USENET and other electronic   fora to describe the tendency of a {thread} to drift away from   the original subject of discussion (and thus, from the Subject   header of the originating message), or the results ...
topic drift2 is  reminders that the discussion has   strayed off any useful track.  "I think we started with a question   about Nivens last book, but weve ended up discussing the sexual   habits of the common marmoset.  Now *thats* topic drift!" 
topic group is  n. Syn. {forum}.
TOPS-10 is  /tops-ten/ n. DECs proprietary OS for the fabled {PDP-10}   machines, long a favorite of hackers but now effectively extinct.   A fountain of hacker folklore; see appendix A.  See also {{ITS}},   {{TOPS-20}}, {{TWENEX}}, {VMS}, {operating...
TOPS-102 is  BOTS-10 (from `bottoms-ten) as a comment on the   inappropriateness of describing it as the top of anything. 
TOPS-20 is  /tops-twentee/ n. See {{TWENEX}}.
toto is  /tohtoh/ n. This is reported to be the default scratch   file name among French-speaking programmers --- in other words, a   francophone {foo}.
tourist is  [ITS] n. A guest on the system, especially one who   generally logs in over a network from a remote location for {comm   mode}, email, games, and other trivial purposes.  One step below   {luser}.  Hackers often spell this {turist}, perha...
tourist2 is  {luser} (this also expresses the   ITS cultures penchant for six-letterisms).  Compare {twink},   {read-only user}. 
tourist information is  n. Information in an on-line display that is   not immediately useful, but contributes to a viewers gestalt of   whats going on with the software or hardware behind it.  Whether a   given piece of info falls in this category d...
tourist information2 is  for at any given time.  The `bytes free   information at the bottom of an MS-DOS `dir display is   tourist information; so (most of the time) is the TIME information   in a UNIX `ps(1) display. 
touristic is  adj. Having the quality of a {tourist}.  Often used   as a pejorative, as in `losing touristic scum.  Often spelled   `turistic or `turistik, so that phrase might be more properly   rendered `lusing turistic scum.
toy is  n. A computer system; always used with qualifiers.   1. `nice toy One that supports the speakers hacking style   adequately.  2. `just a toy A machine that yields   insufficient {computron}s for the speakers preferred uses.  This   is not con...
toy2 is  least be fun.   It is also strongly conditioned by ones expectations; Cray XMP   users sometimes consider the Cray-1 a `toy, and certainly all RISC   boxes and mainframes are toys by their standards.  See also {Get   a real computer!}. 
toy language is  n. A language useful for instructional purposes or   as a proof-of-concept for some aspect of computer-science theory,   but inadequate for general-purpose programming.  {Bad Thing}s   can result when a toy language is promoted as a ...
toy language2 is  (see {bondage-and-discipline   language}); the classic example is {{Pascal}}.  Several moderately   well-known formalisms for conceptual tasks such as programming Turing   machines also qualify as toy languages in a less negative se...
toy problem is  [AI] n. A deliberately oversimplified case of a   challenging problem used to investigate, prototype, or test   algorithms for a real problem.  Sometimes used pejoratively.  See   also {gedanken}, {toy program}.
toy program is  n. 1. One that can be readily comprehended; hence, a   trivial program (compare {noddy}).  2. One for which the effort   of initial coding dominates the costs through its life cycle.   See also {noddy}.
trampoline is  n. An incredibly {hairy} technique, found in some   {HLL} and program-overlay implementations (e.g., on the   Macintosh), that involves on-the-fly generation of small executable   (and, likely as not, self-modifying) code objects to do...
trampoline2 is  pieces of {live data} are called   `trampolines.  Trampolines are notoriously difficult to understand   in action; in fact, it is said by those who use this term that the   trampoline that doesnt bend your brain is not the true   tram...
trap is  1. n. A program interrupt, usually an interrupt caused by   some exceptional situation in the user program.  In most cases, the   OS performs some action, then returns control to the program.   2. vi. To cause a trap.  "These instructions tr...
trap2 is  to indicate the cause of the   trap.  "The monitor traps all input/output instructions."   This term is associated with assembler programming (`interrupt   or `exception is more common among {HLL} programmers) and   appears to be fading int...
trap3 is  assembler continues to shrink.  However, it is still important to   computer architects and systems hackers (see {system},   sense 1), who use it to distinguish deterministically repeatable   exceptions from timing-dependent ones (such as I...
trap door is  alt. `trapdoor n. 1. Syn. {back door}.   2. [techspeak] A `trap-door function is one which is easy to   compute but very difficult to compute the inverse of.  Such   functions have important applications in cryptography, specifically   ...
trash is  vt. To destroy the contents of (said of a data structure).   The most common of the family of near-synonyms including {mung},   {mangle}, and {scribble}.
tree-killer is  [Sun] n. 1. A printer.  2. A person who wastes paper.   This should be interpreted in a broad sense; `wasting paper   includes the production of {spiffy} but {content-free} documents.   Thus, most {suit}s are tree-killers.
trit is  /trit/ [by analogy with `bit] n. One base-3 digit; the   amount of information conveyed by a selection among one of three   equally likely outcomes (see also {bit}).  These arise, for   example, in the context of a {flag} that should actuall...
trit2 is  as yes, no, or unknown.  Trits are   sometimes jokingly called `3-state bits.  A trit may be   semi-seriously referred to as `a bit and a half, although it is   linearly equivalent to 1.5849625 bits (that is,   log2(3)   bits). 
trivial is  adj. 1. Too simple to bother detailing.  2. Not worth the   speakers time.  3. Complex, but solvable by methods so well known   that anyone not utterly {cretinous} would have thought of them   already.  4. Any problem one has already solv...
trivial2 is  evaluates to `Ive seen it before).   Hackers notions of triviality may be quite at variance with those   of non-hackers.  See {nontrivial}, {uninteresting}. 
troglodyte is  [Commodore] n. 1. A hacker who never leaves his   cubicle.  The term `Gnoll (from Dungeons & Dragons) is also   reported.  2. A curmudgeon attached to an obsolescent computing   environment.  The combination `ITS troglodyte was flung a...
troglodyte2 is  wringle-wrangle attending the   2.x.x revision of the Jargon File; at least one of the people it   was intended to describe adopted it with pride. 
troglodyte mode is  [Rice University] n. Programming with the lights   turned off, sunglasses on, and the terminal inverted (black on   white) because youve been up for so many days straight that your   eyes hurt (see {raster burn}).  Loud music blar...
troglodyte mode2 is  optional but recommended.  See {larval   stage}, {hack mode}. 
Trojan horse is  [coined by MIT-hacker-turned-NSA-spook Dan Edwards]   n. A program designed to break security or damage a system that is   disguised as something else benign, such as a directory lister,   archiver, a game, or (in one notorious 1990 ...
Trojan horse2 is  destroy viruses!  See {back door}, {virus},   {worm}. 
true-hacker is  [analogy with `trufan from SF fandom] n. One who   exemplifies the primary values of hacker culture, esp. competence   and helpfulness to other hackers.  A high compliment.  "He spent   6 hours helping me bring up UUCP and netnews on ...
true-hacker2 is  act of a true-hacker."  Compare   {demigod}, oppose {munchkin}. 
tty is  /T-T-Y/ [UNIX], /titee/ [ITS, but some UNIX people say it   this way as well; this pronunciation is not considered to have   sexual undertones] n. 1. A terminal of the teletype variety,   characterized by a noisy mechanical printer, a very li...
tty2 is   Usage antiquated (like the   TTYs themselves).  See also {bit-paired keyboard}.   2. [especially UNIX] Any terminal at all; sometimes used to refer   to the particular terminal controlling a given job. 
tube is  1. n. A CRT terminal.  Never used in the mainstream sense of   TV; real hackers dont watch TV, except for Loony Toons, Rocky &   Bullwinkle, Trek Classic, the Simpsons, and the occasional cheesy   old swashbuckler movie (see appendix B).  2....
tube2 is  someone elses terminal.  "Tube me that   note?" 
tube time is  n. Time spent at a terminal or console.  More inclusive   than hacking time; commonly used in discussions of what parts of   ones environment one uses most heavily.  "I find Im spending too   much of my tube time reading mail since I st...
tunafish is  n. In hackish lore, refers to the mutated punchline of   an age-old joke to be found at the bottom of the manual pages of   `tunefs(8) in the original {BSD} 4.2 distribution.  The   joke was removed in later releases once commercial site...
tunafish2 is  to the `tuning of   file-system parameters for optimum performance, and at the bottom   of a few pages of wizardly inscriptions was a `BUGS section   consisting of the line "You can tune a file system, but you cant   tunafish".  Variant...
tunafish3 is  though it has been excised from some versions by humorless   management {droid}s.  The [nt]roff source for SunOS 4.1.1   contains a comment apparently designed to prevent this "Take this   out and a Unix Demon will dog your steps from n...
tune is  [from automotive or musical usage] vt. To optimize a program   or system for a particular environment, esp. by adjusting numerical   parameters designed as {hook}s for tuning, e.g., by changing   `#define lines in C.  One may `tune for time ...
tune2 is  memory use), or   `tune for configuration (most efficient use of hardware).  See   {bum}, {hot spot}, {hand-hacking}. 
turbo nerd is  n. See {computer geek}.
turist is  /toorist/ n. Var. sp. of {tourist}, q.v.  Also in   adjectival form, `turistic.  Poss. influenced by {luser} and   `Turing.
tweak is  vt. 1. To change slightly, usually in reference to a value.   Also used synonymously with {twiddle}.  If a program is almost   correct, rather than figure out the precise problem you might   just keep tweaking it until it works.  See {frobn...
tweak2 is  debugging}.  2. To {tune}   or {bum} a program; preferred usage in the U.K. 
TWENEX is  /tweneks/ n. The TOPS-20 operating system by DEC ---   the second proprietary OS for the PDP-10 --- preferred by most   PDP-10 hackers over TOPS-10 (that is, by those who were not   {{ITS}} or {{WAITS}} partisans).  TOPS-20 began in 1969 a...
TWENEX2 is  system using special paging   hardware.  By the early 1970s, almost all of the systems on the   ARPANET ran TENEX.  DEC purchased the rights to TENEX from BBN and   began work to make it their own.  The first in-house code name for   the ...
TWENEX3 is  Operating System);   when customers started asking questions, the name was changed to   SNARK so DEC could truthfully deny that there was any project   called VIROS.  When the name SNARK became known, the name was   briefly reversed to be...
TWENEX4 is  it was discovered that `krans meant `funeral shroud in   Swedish.  Ultimately DEC picked TOPS-20 as the name of the   operating system, and it was as TOPS-20 that it was marketed.  The   hacker community, mindful of its origins, quickly d...
TWENEX5 is  TENEX), even though by this   point very little of the original TENEX code remained (analogously   to the differences between AT&T V6 UNIX and BSD).  DEC people   cringed when they heard "TWENEX", but the term caught on   nevertheless (th...
TWENEX6 is  TWENEX was successful and very popular; in fact, there was a period   in the early 1980s when it commanded as fervent a culture of   partisans as UNIX or ITS --- but DECs decision to scrap all the   internal rivals to the VAX architecture...
TWENEX7 is  DEC-20 and put a sad end to TWENEXs brief day in   the sun.  DEC attempted to convince TOPS-20 hackers to convert to   {VMS}, but instead, by the late 1980s, most of the TOPS-20   hackers had migrated to UNIX. 
twiddle is  n. 1. Tilde (ASCII 1111110, `~).  Also   called `squiggle, `sqiggle (sic --- pronounced /skigl/),   and `twaddle, but twiddle is the most common term.  2. A small   and insignificant change to a program.  Usually fixes one bug and   gener...
twiddle2 is  something in a small   way.  Bits, for example, are often twiddled.  Twiddling a switch or   knob implies much less sense of purpose than toggling or tweaking   it; see {frobnicate}.  To speak of twiddling a bit connotes   aimlessness, a...
twiddle3 is  the   bit; `toggling a bit has a more specific meaning (see {bit   twiddling}, {toggle}). 
twink is  /twink/ [UCSC] n. Equivalent to {read-only user}.  Also   reported on the USENET group soc.motss; may derive from gay   slang for a cute young thing with nothing upstairs.
two pi is  quant. The number of years it takes to finish ones   thesis.  Occurs in stories in the following form "He started on   his thesis; 2 pi years later..."
two-to-the-N is  quant. An amount much larger than {N} but smaller   than {infinity}.  "I have 2-to-the-N things to do before I can   go out for lunch" means you probably wont show up.
twonkie is  /twonkee/ n. The software equivalent of a Twinkie (a   variety of sugar-loaded junk food, or (in gay slang) the male   equivalent of `chick); a useless `feature added to look sexy   and placate a {marketroid} (compare {Saturday-night   sp...
twonkie2 is  Twonky", title menace   of a classic SF short story by Lewis Padgett (Henry Kuttner and   C. L. Moore), first published in the September 1942   `Astounding Science Fiction and subsequently much   anthologized.*UBD /U-B-D/ [abbreviation f...
twonkie3 is  to close out trouble reports obviously due to   utter cluelessness on the user's part.  Compare {pilot error};   oppose {PBD}; see also {brain-damaged}. 
UN*X is  n. Used to refer to the UNIX operating system (a trademark of   AT&T) in writing, but avoiding the need for the ugly   {(TM)} typography.   Also used to refer to any or all varieties of Unixoid operating   systems.  Ironically, lawyers now s...
UN*X2 is  TM-postfix has no legal force, but the asterisk usage   is entrenched anyhow.  It has been suggested that there may be a   psychological connection to practice in certain religions   (especially Judaism) in which the name of the deity is ne...
UN*X3 is  `G--d' is used.  See also   {glob}. 
undefined external reference is  excl. [UNIX] A message from UNIX's   linker.  Used in speech to flag loose ends or dangling references   in an argument or discussion.
under the hood is  prep. [hot-rodder talk] 1. Used to introduce the   underlying implementation of a product (hardware, software, or   idea).  Implies that the implementation is not intuitively obvious   from the appearance, but the speaker is about ...
under the hood2 is  now look under the hood to see   how ...." 2. Can also imply that the implementation is much   simpler than the appearance would indicate "Under the hood, we   are just fork/execing the shell."  3. Inside a chassis, as in   "Under...
undocumented feature is  n. See {feature}.
uninteresting is  adj. 1. Said of a problem that, although   {nontrivial}, can be solved simply by throwing sufficient   resources at it.  2. Also said of problems for which a solution   would neither advance the state of the art nor be fun to design...
uninteresting2 is  problems as intolerable wastes of   time, to be solved (if at all) by lesser mortals.  *Real*   hackers (see {toolsmith}) generalize uninteresting problems   enough to make them interesting and solve them --- thus solving the   ori...
uninteresting3 is  {SMOP};   compare {toy problem}, oppose {interesting}. 
UNIX is  /yoo'niks/ [In the authors' words, "A weak pun on   Multics"] n. (also `Unix') An interactive time-sharing system   originally invented in 1969 by Ken Thompson after Bell Labs left   the Multics project, originally so he could play games on ...
UNIX2 is  inventor of C, is considered   a co-author of the system.  The turning point in UNIX's history   came when it was reimplemented almost entirely in C during   1972--1974, making it the first source-portable OS.  UNIX   subsequently underwent...
UNIX3 is  many different people, resulting in a uniquely flexible and   developer-friendly environment.  In 1991, UNIX is the most widely   used multiuser general-purpose operating system in the world.  Many   people consider this the most important ...
UNIX4 is  opposition (but see {UNIX weenie} and {UNIX   conspiracy} for an opposing point of view).  See {Version 7},   {BSD}, {USG UNIX}. 
UNIX brain damage is  n. Something that has to be done to break a     network program (typically a mailer) on a non-UNIX system so that   it will interoperate with UNIX systems. The hack may qualify as   `UNIX brain damage' if the program conforms to...
UNIX brain damage2 is  question does not.  UNIX brain damage   happens because it is much easier for other (minority) systems to   change their ways to match non-conforming behavior than it is to   change all the hundreds of thousands of UNIX systems...
UNIX brain damage3 is  is a {kluge} in a mail server to    recognize bare line feed (the UNIX newline) as an equivalent form   to the Internet standard newline, which is a carriage return   followed by a line feed.  Such things can make even a harden...
UNIX conspiracy is  [ITS] n. According to a conspiracy theory long   popular among {{ITS}} and {{TOPS-20}} fans, UNIX's growth is the   result of a plot, hatched during the 1970s at Bell Labs, whose   intent was to hobble AT&T's competitors by making...
UNIX conspiracy2 is  evolution was to be under AT&T's   control.  This would be accomplished by disseminating an operating   system that is apparently inexpensive and easily portable, but also   relatively unreliable and insecure (so as to require co...
UNIX conspiracy3 is  was lent a substantial impetus   in 1984 by the paper referenced in the {back door} entry.   In this view, UNIX was designed to be one of the first computer   viruses (see {virus}) --- but a virus spread to computers indirectly  ...
UNIX conspiracy4 is  directly through disks and   networks.  Adherents of this `UNIX virus' theory like to cite the   fact that the well-known quotation "UNIX is snake oil" was   uttered by DEC president Kenneth Olsen shortly before DEC began   activ...
UNIX conspiracy5 is  workstations.  (Olsen now   claims to have been misquoted.) 
UNIX weenie is  [ITS] n. 1. A derogatory play on `UNIX wizard', common   among hackers who use UNIX by necessity but would prefer   alternatives.  The implication is that although the person in question   may consider mastery of UNIX arcana to be a w...
UNIX weenie2 is  is the ability to tolerate (and the bad   taste to wallow in) the incoherence and needless complexity that is   alleged to infest many UNIX programs.  "This shell script tries to   parse its arguments in 69 bletcherous ways.  It must...
UNIX weenie3 is  2. A derogatory term for anyone   who engages in uncritical praise of UNIX.  Often appearing in the   context "stupid UNIX weenie".  See {Weenix}, {UNIX   conspiracy}.  See also {weenie}. 
unixism is  n. A piece of code or a coding technique that depends on the   protected multi-tasking environment with relatively low   process-spawn overhead that exists on virtual-memory UNIX systems.   Common {unixism}s include gratuitous use of `for...
unixism2 is  undocumented but well-known features of   UNIX libraries such as `stdio(3)' are supported elsewhere;   reliance on {obscure} side-effects of system calls (use of   `sleep(2)' with a 0 argument to clue the scheduler that   you're willing ...
unixism3 is  assumption that freshly allocated memory is zeroed; and the assumption   that fragmentation problems won't arise from never `free()'ing   memory.  Compare {vaxocentrism}; see also {New Jersey}. 
unswizzle is  v. See {swizzle}.
unwind the stack is  vi. 1. [techspeak] During the execution of a   procedural language, one is said to `unwind the stack' from a   called procedure up to a caller when one discards the stack frame   and any number of frames above it, popping back up...
unwind the stack2 is  this is done with   `longjmp'/`setjmp', in LISP with `throw/catch'.   See also {smash the stack}.  2. People can unwind the stack as   well, by quickly dealing with a bunch of problems "Oh heck, let's   do lunch.  Just a second ...
unwind-protect is  [MIT from the name of a LISP operator] n. A task you   must remember to perform before you leave a place or finish a   project.  "I have an unwind-protect to call my advisor."
up is  adj. 1. Working, in order.  "The down escalator is up."   Oppose {down}.  2. `bring up' vt. To create a working   version and start it.  "They brought up a down system."    3. `come up' vi. To become ready for production use.
upload is  /uhp'lohd/ v. 1. [techspeak] To transfer programs or data   over a digital communications link from a smaller or peripheral   `client' system to a larger or central `host' one.  A transfer in   the other direction is, of course, called a {...
upload2 is  ground-to-space comm under that entry).   2. [speculatively] To move the essential patterns and algorithms   that make up one's mind from one's brain into a computer.  Only   those who are convinced that such patterns and algorithms captu...
upload3 is  prospect with   gusto. 
upthread is  adv. Earlier in the discussion (see {thread}), i.e.,   `above'. "As Joe pointed out upthread, ..."  See also   {followup}.
urchin is  n. See {munchkin}.
USENET is  /yoos'net/ or /yooz'net/ [from `Users' Network'] n.   A distributed {bboard} (bulletin board) system supported mainly   by UNIX machines.  Originally implemented in 1979-1980 by Steve   Bellovin, Jim Ellis, Tom Truscott, and Steve Daniel a...
USENET2 is  become international in scope   and is now probably the largest decentralized information utility   in existence.  As of early 1991, it hosts well over   700 {newsgroup}s and an average of 16 megabytes (the equivalent   of several thousan...
USENET3 is    discussion, chatter, and {flamage} every day. 
user is  n. 1. Someone doing `real work' with the computer, using   it as a means rather than an end.  Someone who pays to use a   computer.  See {real user}.  2. A programmer who will believe   anything you tell him.  One who asks silly questions.  ...
user2 is  is true that users ask   questions (of necessity).  Sometimes they are thoughtful or deep.   Very often they are annoying or downright stupid, apparently   because the user failed to think for two seconds or look in the   documentation befo...
user3 is  3. Someone who uses a program from the outside, however skillfully,   without getting into the internals of the program.  One who reports   bugs instead of just going ahead and fixing them.   The general theory behind this term is that ther...
user4 is  program there are implementors (hackers)   and {luser}s.  The users are looked down on by hackers to a mild   degree because they don't understand the full ramifications of the   system in all its glory.  (The few users who do are known as ...
user5 is  a skilled hacker   may be a user with respect to some program he himself does not   hack.  A LISP hacker might be one who maintains LISP or one who   uses LISP (but with the skill of a hacker).  A LISP user is one who   uses LISP, whether s...
user6 is  between the two terms; the subtle distinctions must be resolved by   context. 
user-friendly is  adj. Programmer-hostile.  Generally used by hackers in   a critical tone, to describe systems that hold the user's hand so   obsessively that they make it painful for the more experienced and   knowledgeable to get any work done.  S...
user-friendly2 is  {Macintrash}, {user-obsequious}. 
user-obsequious is  adj. Emphatic form of {user-friendly}.  Connotes   a system so verbose, inflexible, and determinedly simple-minded   that it is nearly unusable.  "Design a system any fool can use and   only a fool will want to use it."  See {WIMP...
USG UNIX is  /U-S-G yoo'niks/ n. Refers to AT&T UNIX   commercial versions after {Version 7}, especially System III and   System V releases 1, 2, and 3.  So called because during most of   the life-span of those versions AT&T's support crew was calle...
UTSL is  // [UNIX] n. On-line acronym for `Use the Source, Luke' (a   pun on Obi-Wan Kenobi's "Use the Force, Luke!" in `Star   Wars') --- analogous to {RTFM} but more polite.  This is a   common way of suggesting that someone would be best off readi...
UTSL2 is  feature is causing confusion,   rather than making yet another futile pass through the manuals or   broadcasting questions that haven't attracted {wizard}s to   answer them.  In theory, this is appropriately directed only at   associates of...
UTSL3 is  practice,   bootlegs of UNIX source code (made precisely for reference   purposes) are so ubiquitous that one may utter this at almost   anyone on {the network} without concern.  In the near future   (this written in 1991) source licenses m...
UTSL4 is  recent release of the Mach 3.0 microkernal,   given the continuing efforts of the {GNU} project, and with the   4.4BSD release on the horizon, complete free source code for   UNIX-clone toolsets and kernels should soon be widely available. 
UUCPNET is  n. The store-and-forward network consisting of all the   world's connected UNIX machines (and others running some clone of   the UUCP (UNIX-to-UNIX CoPy) software).  Any machine reachable only   via a {bang path} is on UUCPNET.  See {netw...
UUCPNET2 is  permutation of ADV (i.e.,   {ADVENT}), used to avoid a particular {admin}'s continual   search-and-destroy sweeps for the game] n. A leisure-time activity   of certain hackers involving the covert exploration of the `secret'   parts of l...
UUCPNET3 is  elevators,   maintenance crawlways, steam tunnels, and the like.  A few go so   far as to learn locksmithing in order to synthesize vadding keys.   The verb is `to vad' (compare {phreaking}).   The most extreme and dangerous form of vadd...
UUCPNET4 is  surfing', a sport played by wrasslin'   down a thousand-pound elevator car with a 3-foot piece of   string, and then exploiting this mastery in various stimulating   ways (such as elevator hopping, shaft exploration, rat-racing, and   th...
UUCPNET5 is  try this at home!    See also {hobbit} (sense 2). 
vanilla is  [from the default flavor of ice cream in the U.S.] adj.   Ordinary {flavor}, standard.  When used of food, very often does   not mean that the food is flavored with vanilla extract!  For   example, `vanilla wonton soup' means ordinary won...
vanilla2 is  soup.  Applied to hardware and   software, as in "Vanilla Version 7 UNIX can't run on a   vanilla 11/34."  Also used to orthogonalize chip nomenclature; for   instance, a 74V00 means what TI calls a 7400, as distinct from   a 74LS00, etc...
vanilla3 is  the   latter means `default', whereas vanilla simply means `ordinary'.   For example, when hackers go on a {great-wall}, hot-and-sour   wonton soup is the {canonical} wonton soup to get (because that   is what most of them usually order)...
vannevar is  /van'*-var/ n. A bogus technological prediction or   a foredoomed engineering concept, esp. one that fails by   implicitly assuming that technologies develop linearly,   incrementally, and in isolation from one another when in fact the  ...
vannevar2 is  revolutions are   common, and competition is the rule.  The prototype was Vannevar   Bush's prediction of `electronic brains' the size of the Empire   State Building with a Niagara-Falls-equivalent cooling system for   their tubes and r...
vannevar3 is  effect had   already been demonstrated.  Other famous vannevars have included   magnetic-bubble memory, LISP machines, {videotex}, and a paper from   the late 1970s that computed a purported ultimate limit on areal   density for ICs tha...
vannevar4 is  of 5 years later. 
vaporware is  /vay'pr-weir/ n. Products announced far in advance of   any release (which may or may not actually take place).
var is  /veir/ or /var/ n. Short for `variable'.  Compare {arg},   {param}.
VAX is  /vaks/ n. 1. [from Virtual Address eXtension] The most   successful minicomputer design in industry history, possibly   excepting its immediate ancestor, the PDP-11.  Between its release   in 1978 and its eclipse by {killer micro}s after abou...
VAX2 is  favorite machine of them all, esp.   after the 1982 release of 4.2 BSD UNIX (see {BSD}).  Esp.   noted for its large, assembler-programmer-friendly instruction set   --- an asset that became a liability after the RISC revolution.   2. A majo...
VAX3 is  here because   its alleged sales pitch, "Nothing sucks like a VAX!" became a   sort of battle-cry of RISC partisans.  Ironically, the slogan was   *not* actually used by the Vax vacuum-cleaner people, but was   actually that of a rival brand...
VAX4 is  an...").  It is claimed, however, that DEC actually   entered a cross-licensing deal with the vacuum-Vax people that   allowed them to market VAX computers in the U.K. in return for not   challenging the vacuum cleaner trademark in the U.S. 
VAXectomy is  /vak-sek't*-mee/ [by analogy with `vasectomy'] n. A   VAX removal.  DEC's Microvaxen, especially, are much slower than   newer RISC-based workstations such as the SPARC.  Thus, if one knows   one has a replacement coming, VAX removal ca...
VAXen is  /vak'sn/ [from `oxen', perhaps influenced by `vixen'] n.   (alt. `vaxen') The plural canonically used among hackers for the   DEC VAX computers.  "Our installation has four PDP-10s and twenty   vaxen."  See {boxen}.
vaxherd is  n. /vaks'herd/ [from `oxherd'] A VAX operator.
vaxism is  /vak'sizm/ n. A piece of code that exhibits   {vaxocentrism} in critical areas.  Compare {PC-ism},   {unixism}.
vaxocentrism is  /vak`soh-sen'trizm/ [analogy with   `ethnocentrism'] n. A notional disease said to afflict   C programmers who persist in coding according to certain assumptions that are    valid (esp. under UNIX) on {VAXen} but false elsewhere. Amo...
vaxocentrism2 is  validly be accused of vaxocentrism   even if he or she has never seen a VAX.  Some of these assumptions   (esp. 2--5) were valid on the PDP-11, the original C machine, and   became endemic years before the VAX.  The terms `vaxocentr...
vaxocentrism3 is  have been used synonymously. 
vdiff is  /vee'dif/ v.,n. Visual diff.  The operation of finding   differences between two files by {eyeball search}.  The term   `optical diff' has also been reported.  See {diff}.
veeblefester is  /vee'b*l-fes`tr/ [from the "Born Loser"   comix via Commodore; prob. originally from `Mad' Magazine's   `Veeblefeetzer' parodies ca. 1960] n. Any obnoxious person engaged   in the (alleged) professions of marketing or management.  An...
Venus flytrap is  [after the insect-eating plant] n. See {firewall   machine}.
verbage is  /ver'b*j/ n. A deliberate misspelling and mispronunciation of   {verbiage} that assimilates it to the word `garbage'.  Compare   {content-free}.  More pejorative than `verbiage'.
verbiage is  n. When the context involves a software or hardware   system, this refers to {{documentation}}.  This term borrows the   connotations of mainstream `verbiage' to suggest that the   documentation is of marginal utility and that the motive...
verbiage2 is  with the ostensible subject. 
Version 7 is  alt. V7 /vee' se'vn/ n. The 1978 unsupported release of   {{UNIX}} ancestral to all current commercial versions.  Before   the release of the POSIX/SVID standards, V7's features were often   treated as a UNIX portability baseline.  See ...
Version 72 is  old-timers impatient with commercialization and   kernel bloat still maintain that V7 was the Last True UNIX. 
vgrep is  /vee'grep/ v.,n. Visual grep.  The operation of finding   patterns in a file optically rather than digitally.  See {grep};   compare {vdiff}.
vi is  /V-I/, *not* /vi/ and *never* /siks/ [from   `Visual Interface'] n. A screen editor crufted together by Bill Joy   for an early {BSD} version.  Became the de facto standard UNIX   editor and a nearly undisputed hacker favorite until the rise o...
vi2 is  frustrate new users no end,   as it will neither take commands while expecting input text nor   vice versa, and the default setup provides no indication of which   mode one is in (one correspondent accordingly reports that he has   often hear...
vi3 is  Nevertheless it   is still widely used (about half the respondents in a 1991 USENET   poll preferred it), and even EMACS fans often resort to it as a   mail editor and for small editing jobs (mainly because it starts up   faster than bulky EM...
videotex is  n. obs. An electronic service offering people the   privilege of paying to read the weather on their television screens   instead of having somebody read it to them for free while they   brush their teeth.  The idea bombed everywhere it ...
videotex2 is  time videotex was practical   the installed base of personal computers could hook up to   timesharing services and do the things for which videotex might   have been worthwhile better and cheaper.  Videotex planners badly   overestimate...
videotex3 is    computer and the cost of local intelligence at the user's end.   Like the {gorilla arm} effect, this has been a cautionary tale   to hackers ever since.  See also {vannevar}. 
virgin is  adj. Unused; pristine; in a known initial state.  "Let's   bring up a virgin system and see if it crashes again."  (Esp.   useful after contracting a {virus} through {SEX}.)  Also, by   extension, buffers and the like within a program that...
virtual is  [via the technical term `virtual memory', prob. from the   term `virtual image' in optics] adj. 1. Common alternative to   {logical}.  2. Simulated; performing the functions of something   that isn't really there.  An imaginative child's ...
virtual Friday is  n. The last day before an extended weekend, if   that day is not a `real' Friday.  For example, the U.S. holiday   Thanksgiving is always on a Thursday.  The next day is often also   a holiday or taken as an extra day off, in which...
virtual Friday2 is  Friday (and Thursday is a virtual Saturday,   as is Friday).  There are also `virtual Mondays' that are   actually Tuesdays, after the three-day weekends associated with many   national holidays in the U.S. 
virtual reality is  n. 1. Computer simulations that use 3-D graphics   and devices such as the Dataglove to allow the user to interact   with the simulation.  See {cyberspace}.  2. A form of network   interaction incorporating aspects of role-playing...
virtual reality2 is  comedy, and `true confessions'   magazines.  In a virtual reality forum (such as USENET's   alt.callahans newsgroup or the {MUD} experiments on Internet),   interaction between the participants is written like a shared novel   co...
virtual reality3 is  that may be   personae utterly unlike the people who write them, and common   `background characters' manipulable by all parties.  The one   iron law is that you may not write irreversible changes to a   character without the con...
virtual reality4 is  anything goes.  See {bamf}, {cyberspace}. 
virus is  [from the obvious analogy with biological viruses, via SF]   n. A cracker program that searches out other programs and `infects'   them by embedding a copy of itself in them, so that they become   {Trojan Horse}s.  When these programs are e...
virus2 is  thus propagating the `infection'.  This   normally happens invisibly to the user.  Unlike a {worm}, a   virus cannot infect other computers without assistance.  It is   propagated by vectors such as humans trading programs with their   fri...
virus3 is  propagate   itself and then allow the program to run normally.  Usually,   however, after propagating silently for a while, it starts doing   things like writing cute messages on the terminal or playing   strange tricks with your display (...
virus4 is  Many nasty viruses, written by particularly   perversely minded {cracker}s, do irreversible damage, like   nuking all the user's files.   In the 1990s, viruses have become a serious problem, especially   among IBM PC and Macintosh users (t...
virus5 is  viruses to spread easily, even infecting the   operating system).  The production of special anti-virus software   has become an industry, and a number of exaggerated media reports   have caused outbreaks of near hysteria among users; many...
virus6 is  doesn't work as   they had expected on virus attacks.  Accordingly, this sense of   `virus' has passed not only into techspeak but into also popular   usage (where it is often incorrectly used to denote a {worm} or   even a {Trojan horse})...
visionary is  n. 1. One who hacks vision, in the sense of an   Artificial Intelligence researcher working on the problem of   getting computers to `see' things using TV cameras.  (There isn't   any problem in sending information from a TV camera to a...
visionary2 is  computer be programmed to make use of   the camera information?  See {SMOP}, {AI-complete}.)  2. [IBM]   One who reads the outside literature.  At IBM, apparently, such a   penchant is viewed with awe and wonder. 
VMS is  /V-M-S/ n. DEC's proprietary operating system for its VAX   minicomputer; one of the seven or so environments that loom largest   in hacker folklore.  Many UNIX fans generously concede that VMS   would probably be the hacker's favorite commer...
VMS2 is  this makes VMS fans furious.  One major   hacker gripe with VMS concerns its slowness --- thus the following   limerick        There once was a system called VMS        Of cycles by no means abstemious.             It's chock-full of hacks  ...
VMS3 is  my poor stomach all squeamious.                                         --- The Great Quux   See also {VAX}, {{TOPS-10}}, {{TOPS-20}}, {{UNIX}}, {runic}. 
voice is  vt. To phone someone, as opposed to emailing them or   connecting in talk mode.  "I'm busy now; I'll voice you later."
voice-net is  n. Hackish way of referring to the telephone system,   analogizing it to a digital network.  USENET {sig block}s not   uncommonly include the sender's phone next to a "Voice" or   "Voice-Net" header; common variants of this are "Voicene...
voodoo programming is  [from George Bush's "voodoo economics"] n.   The use by guess or cookbook of an {obscure} or {hairy} system,   feature, or algorithm that one does not truly understand.  The   implication is that the technique may not work, and...
voodoo programming2 is  Almost synonymous with {black magic},   except that black magic typically isn't documented and   *nobody* understands it.  Compare {magic}, {deep magic},   {heavy wizardry}, {rain dance}, {cargo cult programming},   {wave a de...
VR is  // [MUD] n. On-line abbrev for {virtual reality}, as   opposed to {RL}.
Vulcan nerve pinch is  n. [from the old "Star Trek" TV series via   Commodore Amiga hackers] The keyboard combination that forces a   soft-boot or jump to ROM monitor (on machines that support such a   feature).  On many micros this is Ctrl-Alt-Del; ...
Vulcan nerve pinch2 is  <Cmd>-<Power switch>!  Also called   {three-finger salute}.  Compare {quadruple bucky}. 
vulture capitalist is  n. Pejorative hackerism for `venture   capitalist', deriving from the common practice of pushing contracts   that deprive inventors of control over their own innovations and   most of the money they ought to have made from them...
vulture capitalist2 is  Fudd's immortal   line "You wascawwy wabbit!"] n. 1. A legendary early hack   reported on a System/360 at RPI and elsewhere around 1978.  The   program would make two copies of itself every time it was run,   eventually crashi...
vulture capitalist3 is   includes infinite self-replication but is not a {virus} or   {worm}.  See also {cookie monster}. 
WAITS is  /wayts/ n. The mutant cousin of {{TOPS-10}} used on a   handful of systems at {{SAIL}} up to 1990.  There was never an   `official' expansion of WAITS (the name itself having been arrived   at by a rather sideways process), but it was frequ...
WAITS2 is  ITS'.  Though WAITS was less visible   than ITS, there was frequent exchange of people and ideas between   the two communities, and innovations pioneered at WAITS exerted   enormous indirect influence.  The early screen modes of {EMACS},  ...
WAITS3 is  `E' editor --- one   of a family of editors that were the first to do `real-time   editing', in which the editing commands were invisible and where   one typed text at the point of insertion/overwriting.  The modern   style of multi-region...
WAITS4 is  and WAITS alumni at XEROX PARC and elsewhere played major roles in   the developments that led to the XEROX Star, the Macintosh, and the   Sun workstations.  {Bucky bits} were also invented there ---   thus, the ALT key on every IBM PC is ...
WAITS5 is  seldom duplicated elsewhere was a news-wire interface   that allowed WAITS hackers to read, store, and filter AP and UPI   dispatches from their terminals; the system also featured a   still-unusual level of support for what is now called ...
WAITS6 is  and video signals to be switched   to programming terminals. 
waldo is  /wol'doh/ [From Robert A. Heinlein's story "Waldo"]   1. A mechanical agent, such as a gripper arm, controlled by a human   limb.  When these were developed for the nuclear industry in the   mid-1940s they were named after the invention des...
waldo2 is  wrote in 1942.  Now known by the more   generic term `telefactoring', this technology is of intense   interest to NASA for tasks like space station maintenance.  2. At   Harvard (particularly by Tom Cheatham and students), this is used   i...
waldo3 is  and general   nonsense word.  See {foo}, {bar}, {foobar}, {quux}. 
walk is  n.,vt. Traversal of a data structure, especially an array or   linked-list data structure in {core}.  See also {codewalker},   {silly walk}, {clobber}.
walk off the end of is  vt. To run past the end of an array, list, or      medium after stepping through it --- a good way to land in trouble.   Often the result of an {off-by-one error}.  Compare   {clobber}, {roach}, {smash the stack}.
walking drives is  n. An occasional failure mode of magnetic-disk   drives back in the days when they were huge, clunky {washing   machine}s.  Those old {dinosaur} parts carried terrific angular   momentum; the combination of a misaligned spindle or ...
walking drives2 is  with the floor could cause them to   `walk' across a room, lurching alternate corners forward a couple   of millimeters at a time.  There is a legend about a drive that   walked over to the only door to the computer room and jamme...
walking drives3 is  wall in order to get at   it!  Walking could also be induced by certain patterns of drive   access (a fast seek across the whole width of the disk, followed by   a slow seek in the other direction).  Some bands of old-time   hacke...
walking drives4 is  patterns that   would do this to particular drive models and held disk-drive races. 
wall is  [WPI] interj. 1. An indication of confusion, usually spoken   with a quizzical tone  "Wall??"  2. A request for further   explication.  Compare {octal forty}.   It is said that "Wall?" really came from `like talking to a   blank wall'.  It w...
wall2 is  you   had carefully answered a question, the questioner stared at you   blankly, clearly having understood nothing that was explained.  You   would then throw out a "Hello, wall?" to elicit some sort of   response from the questioner.  Late...
wall3 is  themselves. 
wall follower is  n. A person or algorithm that compensates for lack   of sophistication or native stupidity by efficiently following some   simple procedure shown to have been effective in the past.  Used of   an algorithm, this is not necessarily p...
wall follower2 is  the winning robot in an early AI contest   (named, of course, after the cocktail).  Harvey successfully solved   mazes by keeping a `finger' on one wall and running till it came   out the other end.  This was inelegant, but it was ...
wall follower3 is  simply-connected mazes --- and, in fact,   Harvey outperformed more sophisticated robots that tried to   `learn' each maze by building an internal representation of it.   Used of humans, the term *is* pejorative and implies an   un...
wall follower4 is  See also {code   grinder}, {droid}. 
wall time is  n. (also `wall clock time') 1. `Real world' time (what   the clock on the wall shows), as opposed to the system clock's idea   of time.  2. The real running time of a program, as opposed to the   number of {clocks} required to execute i...
wall time2 is  differ, as no one program gets all the   {clocks}, and on multiprocessor systems with good thread support   one may get more processor clocks than real-time clocks). 
wallpaper is  n. 1. A file containing a listing (e.g., assembly   listing) or a transcript, esp. a file containing a transcript of   all or part of a login session.  (The idea was that the paper for   such listings was essentially good only for wallp...
wallpaper2 is  used to cover windows.)  Now rare,   esp. since other systems have developed other terms for it (e.g.,   PHOTO on TWENEX).  However, the UNIX world doesn't have an   equivalent term, so perhaps {wallpaper} will take hold there.   The t...
wallpaper3 is  commands to begin   and end transcript files were `WALBEG' and `WALEND',   with default file `WALL PAPER' (the space was a path   delimiter).  2. The background pattern used on graphical   workstations (this is techspeak under the `Win...
wallpaper4 is  3. `wallpaper file' n. The file that   contains the wallpaper information before it is actually printed on   paper.  (Even if you don't intend ever to produce a real paper copy   of the file, it is still called a wallpaper file.) 
wango is  /wang'goh/ n. Random bit-level {grovel}ling going on in   a system during some unspecified operation.  Often used in   combination with {mumble}.  For example "You start with the `.o'   file, run it through this postprocessor that does mumb...
wango2 is  object-oriented executable." 
wank is  /wangk/ [Columbia University prob. by mutation from   Commonwealth slang v. `wank', to masturbate] n.,v. Used much as   {hack} is elsewhere, as a noun denoting a clever technique or   person or the result of such cleverness.  May describe (n...
wank2 is  sake ("Quit wanking, let's go get   supper!")  or (more positively) a {wizard}.  Adj.  `wanky'   describes something particularly clever (a person, program, or   algorithm).  Conversations can also get wanky when there are too   many wanks ...
wank3 is  by an   overload of the `wankometer' (compare {bogometer}).  When the   wankometer overloads, the conversation's subject must be changed,   or all non-wanks will leave.  Compare `neep-neeping' (under   {neep-neep}).  Usage U.S. only.  In Br...
wank4 is  *extremely* rude and is best avoided unless one   intends to give offense. 
wannabee is  /won'*-bee/ (also, more plausibly, spelled `wannabe')   [from a term recently used to describe Madonna fans who dress,   talk, and act like their idol; prob. originally from biker slang]   n. A would-be {hacker}.  The connotations of thi...
wannabee2 is  and exposure of the subject.  Used of   a person who is in or might be entering {larval stage}, it is   semi-approving; such wannabees can be annoying but most hackers   remember that they, too, were once such creatures.  When used of  ...
wannabee3 is  writer, or {suit}, it is   derogatory, implying that said person is trying to cuddle up to the   hacker mystique but doesn't, fundamentally, have a prayer of   understanding what it is all about.  Overuse of terms from this lexicon   is...
wannabee4 is  Compare   {newbie}.   Historical note The wannabee phenomenon has a slightly different   flavor now (1991) than it did ten or fifteen years ago.  When the   people who are now hackerdom's tribal elders were in {larval   stage}, the proc...
wannabee5 is  unconscious   and unaffected by models known in popular culture --- communities   formed spontaneously around people who, *as individuals*, felt   irresistibly drawn to do hackerly things, and what wannabees   experienced was a fairly p...
wannabee6 is  wizardly.  Those days of innocence are gone forever;   society's adaptation to the advent of the microcomputer after 1980   included the elevation of the hacker as a new kind of folk hero,   and the result is that some people semi-consc...
wannabee7 is  hackish prestige by fitting the   popular image of hackers.  Fortunately, to do this really well, one   has to actually become a wizard.  Nevertheless, old-time hackers   tend to share a poorly articulated disquiet about the change; amo...
wannabee8 is  about the effects of   public compendia of lore like this one. 
warm boot is  n. See {boot}.
wart is  n. A small, {crock}y {feature} that sticks out of an   otherwise {clean} design.  Something conspicuous for localized   ugliness, especially a special-case exception to a general rule.   For example, in some versions of `csh(1)', single quot...
wart2 is  except `!'.  In ANSI C,   the `??' syntax used obtaining ASCII characters in a foreign   environment is a wart.  See also {miswart}. 
washing machine is  n. Old-style 14-inch hard disks in floor-standing   cabinets.  So called because of the size of the cabinet and the   `top-loading' access to the media packs --- and, of course, they   were always set on `spin cycle'.  The washing...
washing machine2 is  it is even used in Russian hacker   jargon.  See also {walking drives}.  The thick channel cables   connecting these were called `bit hoses' (see {hose}). 
water MIPS is  n. (see {MIPS}, sense 2) Large, water-cooled   machines of either today's ECL-supercomputer flavor or yesterday's   traditional {mainframe} type.
wave a dead chicken is  v. To perform a ritual in the direction of   crashed software or hardware that one believes to be futile but   is nevertheless necessary so that others are satisfied that an   appropriate degree of effort has been expended.  "...
wave a dead chicken2 is  code, but I really think we've run into an   OS bug."  Compare {voodoo programming}, {rain dance}. 
weasel is  n. [Cambridge] A na"ive user, one who deliberately or   accidentally does things that are stupid or ill-advised.  Roughly   synonymous with {loser}.
wedged is  [from a common description of recto-cranial inversion] adj.   1. To be stuck, incapable of proceeding without help.  This is   different from having crashed.  If the system has crashed, then it   has become totally non-functioning.  If the...
wedged2 is  something but cannot make progress; it may be capable   of doing a few things, but not be fully operational.  For example,   a process may become wedged if it {deadlock}s with another (but   not all instances of wedging are deadlocks).  B...
wedged3 is  {hung}.  See also {gronk}, {locked   up}, {hosed}.  Describes a {deadlock}ed condition.  2. Often   refers to humans suffering misconceptions.  "He's totally wedged   --- he's convinced that he can levitate through meditation."   3. [UNIX...
wedged4 is  TTY left in   a losing state by abort of a screen-oriented program or one that   has messed with the line discipline in some obscure way. 
wedgie is  [Fairchild] n. A bug.  Prob. related to {wedged}.
wedgitude is  /wedj'i-t[y]ood/ n. The quality or state of being   {wedged}.
weeble is  /weeb'l/ [Cambridge] interj. Used to denote frustration,   usually at amazing stupidity.  "I stuck the disk in upside down."   "Weeble...." Compare {gurfle}.
weeds is  n. 1. Refers to development projects or algorithms that have   no possible relevance or practical application.  Comes from `off in   the weeds'.  Used in phrases like "lexical analysis for microcode   is serious weeds...."  2. At CDC/ETA be...
weeds2 is  weeds' was equivalent to IBM's {branch to   Fishkill} and mainstream hackerdom's {jump off into never-never   land}. 
weenie is  n. 1. When used with a qualifier (for example, as in   {UNIX weenie}, VMS weenie, IBM weenie) this can be either an   insult or a term of praise, depending on context, tone of voice,   and whether or not it is applied by a person who consi...
weenie2 is  weenie.  Implies that the weenie   has put a major investment of time, effort, and concentration into   the area indicated; whether this is positive or negative depends on   the hearer's judgment of how the speaker feels about that area. ...
weenie3 is  character, `;' (ASCII   0111011). 
Weenix is  /wee'niks/ [ITS] n. A derogatory term for {{UNIX}},   derived from {UNIX weenie}.  According to one noted ex-ITSer, it   is "the operating system preferred by Unix Weenies typified by   poor modularity, poor reliability, hard file deletion...
Weenix2 is  everywhere, and users who believe   that these are all advantages".  Some ITS fans behave as though   they believe UNIX stole a future that rightfully belonged to them.   See {{ITS}}, sense 2. 
well-behaved is  adj. 1. [primarily {{MS-DOS}}] Said of software   conforming to system interface guidelines and standards.   Well-behaved software uses the operating system to do chores such   as keyboard input, allocating memory and drawing graphic...
well-behaved2 is  does its job quietly and   without counterintuitive effects.  Esp. said of software having   an interface spec sufficiently simple and well-defined that it can   be used as a {tool} by other software. See {cat}. 
well-connected is  adj. Said of a computer installation, this means   that it has reliable email links with {the network} and/or that   it relays a large fraction of available {USENET} newsgroups.   `Well-known' can be almost synonymous, but also imp...
well-connected2 is  many (due perhaps to an archive service   or active USENET users). 
wetware is  /wet'weir/ [prob. from the novels of Rudy Rucker] n.   1. The human nervous system, as opposed to computer hardware or   software.  "Wetware has 7 plus or minus 2 temporary registers."   2. Human beings (programmers, operators, administra...
wetware2 is  opposed to the system's hardware or   software.  See {liveware}, {meatware}. 
whacker is  [University of Maryland from {hacker}] n. 1. A person,   similar to a {hacker}, who enjoys exploring the details of   programmable systems and how to stretch their capabilities.   Whereas a hacker tends to produce great hacks, a whacker o...
whacker2 is  in question.  Whackers are often   quite egotistical and eager to claim {wizard} status,   regardless of the views of their peers.  2. A person who is good at   programming quickly, though rather poorly and ineptly. 
whales is  n. See {like kicking dead whales down the beach}.
wheel is  [from slang `big wheel' for a powerful person] n. A   person who has an active a {wheel bit}.  "We need to find a   wheel to un{wedge} the hung tape drives."
wheel bit is  n. A privilege bit that allows the possessor to perform   some restricted operation on a timesharing system, such as read or   write any file on the system regardless of protections, change or   look at any address in the running monito...
wheel bit2 is  create jobs and user accounts.  The term was   invented on the TENEX operating system, and carried over to   TOPS-20, XEROX-IFS, and others.  The state of being in a privileged   logon is sometimes called `wheel mode'.  This term enter...
wheel bit3 is  mid-1980s and has been gaining   popularity there (esp. at university sites).  See also {root}. 
wheel wars is  [Stanford University] A period in {larval stage}   during which student hackers hassle each other by attempting to log   each other out of the system, delete each other's files, and   otherwise wreak havoc, usually at the expense of th...
White Book is  n. Syn. {K&R}.
whizzy is  [Sun] adj. (alt. `wizzy') Describes a {cuspy} program;   one that is feature-rich and well presented.
WIBNI is  // [Bell Labs Wouldn't It Be Nice If] n. What most   requirements documents and specifications consist entirely of.   Compare {IWBNI}.
widget is  n. 1. A meta-thing.  Used to stand for a real object in   didactic examples (especially database tutorials).  Legend has it   that the original widgets were holders for buggy whips.  "But   suppose the parts list for a widget has 52 entrie...
widget2 is  user interface object in   {X} graphical user interfaces. 



( run in 2.630 seconds using v1.01-cache-2.11-cpan-39bf76dae61 )