Amethyst

 view release on metacpan or  search on metacpan

factpacks/jargon-split.fact  view on Meta::CPAN

accumulator is  n. 1. Archaic term for a register.  On-line use of it   as a synonym for `register' is a fairly reliable indication that   the user has been around for quite a while and/or that the   architecture under discussion is quite old.  The t...
accumulator2 is  microprocessor registers, for example, though   symbolic names for arithmetic registers beginning in `A' derive   from historical use of the term `accumulator' (and not, actually,   from `arithmetic').  Confusingly, though, an `A' re...
accumulator3 is  `address', as for example on the   Motorola 680x0 family.  2. A register being used for arithmetic or   logic (as opposed to addressing or a loop index), especially one   being used to accumulate a sum or count of many items.  This u...
accumulator4 is  stretch of code.  "The   FOOBAZ routine uses A3 as an accumulator."  3. One's in-basket   (esp. among old-timers who might use sense 1).  "You want this   reviewed?  Sure, just put it in the accumulator."  (See {stack}.) 
ACK is  /ak/ interj. 1. [from the ASCII mnemonic for 0000110]   Acknowledge.  Used to register one's presence (compare mainstream   *Yo!*).  An appropriate response to {ping} or {ENQ}.   2. [from the comic strip "Bloom County"] An exclamation of   su...
ACK2 is  Semi-humorous.   Generally this sense is not spelled in caps (ACK) and is   distinguished by a following exclamation point.  3. Used to   politely interrupt someone to tell them you understand their point   (see {NAK}).  Thus, for example, y...
ACK3 is  with "Ack.  Ack.  Ack.  I get it now".   There is also a usage "ACK?" (from sense 1) meaning "Are you   there?", often used in email when earlier mail has produced no   reply, or during a lull in {talk mode} to see if the person has   gone a...
ACK4 is  course {NAK}   (sense 2), i.e., "I'm not here"). 
ad-hockery is  /ad-hok'*r-ee/ [Purdue] n. 1. Gratuitous assumptions   made inside certain programs, esp. expert systems, which lead to   the appearance of semi-intelligent behavior but are in fact   entirely arbitrary.  For example, fuzzy-matching in...
ad-hockery2 is  against a symbol table can make it look as   though a program knows how to spell.  2. Special-case code to cope   with some awkward input that would otherwise cause a program to   {choke}, presuming normal inputs are dealt with in som...
ad-hockery3 is  `ad-hackery', `ad-hocity'   (/ad-hos'*-tee/).  See also {ELIZA effect}. 
Ada is  n. A {{Pascal}}-descended language that has been made   mandatory for Department of Defense software projects by the   Pentagon.  Hackers are nearly unanimous in observing that,   technically, it is precisely what one might expect given that ...
Ada2 is  committee, crockish, difficult   to use, and overall a disastrous, multi-billion-dollar boondoggle   (one common description is "The PL/I of the 1980s").  Hackers   find Ada's exception-handling and inter-process communication   features par...
Ada3 is  daughter of   Lord Byron who became the world's first programmer while   cooperating with Charles Babbage on the design of his mechanical   computing engines in the mid-1800s) would almost certainly blanch   at the use to which her name has ...
Ada4 is  been said about it is that there is probably a good   small language screaming to get out from inside its vast,   {elephantine} bulk. 
adger is  /aj'r/ [UCLA] vt. To make a bonehead move with consequences   that could have been foreseen with a slight amount of mental   effort.  E.g., "He started removing files and promptly adgered the   whole project".  Compare {dumbass attack}.
admin is  /ad-min'/ n. Short for `administrator'; very commonly   used in speech or on-line to refer to the systems person in charge   on a computer.  Common constructions on this include `sysadmin'   and `site admin' (emphasizing the administrator's...
admin2 is  or `newsadmin' (focusing specifically   on news).  Compare {postmaster}, {sysop}, {system   mangler}. 
ADVENT is  /ad'vent/ n. The prototypical computer adventure game, first   implemented on the {PDP-10} by Will Crowther as an attempt at   computer-refereed fantasy gaming, and expanded into a   puzzle-oriented game by Don Woods.  Now better known as ...
ADVENT2 is  system permitted only 6-letter   filenames.  See also {vadding}.   This game defined the terse, dryly humorous style now expected in   text adventure games, and popularized several tag lines that have   become fixtures of hacker-speak  "A...
ADVENT3 is  see no X here" (for some noun X).  "You are in a   maze of twisty little passages, all alike."  "You are in a little   maze of twisty passages, all different."  The `magic words'   {xyzzy} and {plugh} also derive from this game.   Crowthe...
ADVENT4 is  of the   Mammoth & Flint Ridge cave system; it actually *has* a   `Colossal Cave' and a `Bedquilt' as in the game, and the `Y2' that   also turns up is cavers' jargon for a map reference to a secondary   entrance. 
AI-complete is  /A-I k*m-pleet'/ [MIT, Stanford by analogy with   `NP-complete' (see {NP-})] adj. Used to describe problems or   subproblems in AI, to indicate that the solution presupposes a   solution to the `strong AI problem' (that is, the synthe...
AI-complete2 is  problem that is AI-complete is, in   other words, just too hard.   Examples of AI-complete problems are `The Vision Problem'   (building a system that can see as well as a human) and `The   Natural Language Problem' (building a syste...
AI-complete3 is  language as well as a human).  These may appear   to be modular, but all attempts so far (1991) to solve them have   foundered on the amount of context information and `intelligence'   they seem to require. See also {gedanken}. 
AI koans is  /A-I koh'anz/ pl.n. A series of pastiches of Zen   teaching riddles created by Danny Hillis at the MIT AI Lab around   various major figures of the Lab's culture (several are included in   appendix A).  See also {ha ha only serious}, {mu...
AIDS is  /aydz/ n. Short for A* Infected Disk Syndrome (`A*' is a   {glob} pattern that matches, but is not limited to, Apple),   this condition is quite often the result of practicing unsafe   {SEX}.  See {virus}, {worm}, {Trojan horse},   {virgin}.
airplane rule is  n. "Complexity increases the possibility of   failure; a twin-engine airplane has twice as many engine problems   as a single-engine airplane."  By analogy, in both software and   electronics, the rule that simplicity increases robu...
airplane rule2 is  correspondingly argued that the   right way to build reliable systems is to put all your eggs in one   basket, after making sure that you've built a really *good*   basket. 
aliasing bug is  n. A class of subtle programming errors that can   arise in code that does dynamic allocation, esp. via   `malloc(3)' or equivalent.  If more than one pointer addresses   (`aliases for') a given hunk of storage, it may happen that th...
aliasing bug2 is  then referenced through   another, which may lead to subtle (and possibly intermittent) lossage   depending on the state and the allocation history of the malloc   {arena}.  Avoidable by use of allocation strategies that never   ali...
aliasing bug3 is  higher-level   languages, such as {LISP}, which employ a garbage collector   (see {GC}).  Also called a {stale pointer bug}.  See also   {precedence lossage}, {smash the stack}, {fandango on core},   {memory leak}, {overrun screw}, ...
aliasing bug4 is  nowadays associated with   C programming, it was already in use in a very similar sense in the   Algol-60 and FORTRAN communities in the 1960s. 
all-elbows is  adj. Of a TSR (terminate-and-stay-resident) IBM PC   program, such as the N pop-up calendar and calculator utilities   that circulate on {BBS} systems unsociable.  Used to describe a   program that rudely steals the resources that it n...
all-elbows2 is  also be resident.  One particularly   common form of rudeness is lock-up due to programs fighting over   the keyboard interrupt.  See also {mess-dos}. 
alpha particles is  n. See {bit rot}.
ALT is  /awlt/ 1. n. The ALT shift key on an IBM PC or {clone}.   2. [possibly lowercased] n. The `clover' or `Command' key on a   Macintosh; use of this term usually reveals that the speaker hacked   PCs before coming to the Mac (see also {command k...
ALT2 is  reserve `ALT' for the Option key.  3. n.obs.   [PDP-10] Alternate name for the ASCII ESC character (ASCII   0011011), after the keycap labeling on some older terminals.  Also   `ALTMODE' (/awlt'mohd/).  This character was almost never   pron...
ALT3 is  under   TOPS-10 --- always ALT, as in "Type ALT ALT to end a TECO   command" or "ALT U onto the system" (for "log onto the [ITS]   system").  This was probably because ALT is more convenient to say   than `escape', especially when followed b...
ALT4 is  *and* a character, for that matter). 
alt bit is  /awlt bit/ [from alternate] adj. See {meta bit}.
Aluminum Book is  [MIT] n. `Common LISP The Language', by   Guy L.  Steele Jr. (Digital Press, first edition 1984, second   edition 1990).  Note that due to a technical screwup some printings   of the second edition are actually of a color the author...
Aluminum Book2 is  also {{book titles}}. 
amoeba is  n. Humorous term for the Commodore Amiga personal computer.
amp off is  [Purdue] vt. To run in {background}.  From the UNIX shell `&'   operator.
amper is  n. Common abbreviation for the name of the ampersand (`&',   ASCII 0100110) character.  See {ASCII} for other synonyms.
angle brackets is  n. Either of the characters `<' (ASCII   0111100) and `>' (ASCII 0111110) (ASCII less-than or   greater-than signs).  The {Real World} angle brackets used by   typographers are actually taller than a less-than or greater-than   sig...
angry fruit salad is  n. A bad visual-interface design that uses too   many colors.  This derives, of course, from the bizarre day-glo   colors found in canned fruit salad.  Too often one sees similar   affects from interface designers using color wi...
angry fruit salad2 is  tendency to create displays that are flashy and   attention-getting but uncomfortable for long-term use. 
AOS is  1. /aws/ (East Coast), /ay-os/ (West Coast) [based on a   PDP-10 increment instruction] vt.,obs. To increase the amount of   something.  "AOS the campfire."  Usage considered silly, and now   obsolete.  Now largely supplanted by {bump}.  See ...
AOS2 is  supported at one time by Data General.  This   was pronounced /A-O-S/ or /A-os/.  A spoof of the standard   AOS system administrator's manual (`How to load and generate   your AOS system') was created, issued a part number, and circulated   ...
AOS3 is  goad and   levitate your chaos system'.  3. Algebraic Operating System, in   reference to those calculators which use infix instead of postfix   (reverse Polish) notation.   Historical note AOS in sense 1 was the name of a {PDP-10}   instruc...
AOS4 is  computer and added   1 to it; AOS meant `Add One and do not Skip'.  Why, you may ask,   does the `S' stand for `do not Skip' rather than for `Skip'?  Ah,   here was a beloved piece of PDP-10 folklore.  There were eight such   instructions AO...
AOS5 is  instruction   if the result was Equal to zero; AOSG added 1 and then skipped if   the result was Greater than 0; AOSN added 1 and then skipped   if the result was Not 0; AOSA added 1 and then skipped Always;   and so on.  Just plain AOS didn...
AOS6 is  For similar reasons, AOJ meant `Add One and do not Jump'.  Even   more bizarre, SKIP meant `do not SKIP'!  If you wanted to skip the   next instruction, you had to say `SKIPA'.  Likewise, JUMP meant   `do not JUMP'; the unconditional form wa...
AOS7 is  By some quirk of the 10's design, the {JRST}   (Jump and ReSTore flag with no flag specified) was actually faster   and so was invariably used.  Such were the perverse mysteries of   assembler programming. 
app is  /ap/ n. Short for `application program', as opposed to a   systems program.  What systems vendors are forever chasing   developers to create for their environments so they can sell more   boxes.  Hackers tend not to think of the things they t...
app2 is  parlance the term excludes compilers,   program editors, games, and messaging systems, though a user would   consider all those to be apps.  Oppose {tool}, {operating   system}. 
arc is  [primarily MSDOS] vt. To create a compressed {archive} from a   group of files using SEA ARC, PKWare PKARC, or a compatible   program.  Rapidly becoming obsolete as the ARC compression method   is falling into disuse, having been replaced by ...
arc2 is  feather}, {zip}. 
arc wars is  [primarily MSDOS] n. {holy wars} over which archiving   program one should use.  The first arc war was sparked when System   Enhancement Associates (SEA) sued PKWare for copyright and   trademark infringement on its ARC program.  PKWare'...
arc wars2 is  and speed while largely   retaining compatibility (it introduced a new compression type that   could be disabled for backward-compatibility).  PKWare settled out   of court to avoid enormous legal costs (both SEA and PKWare are   small ...
arc wars3 is  of PKARC was   changed to PKPAK.  The public backlash against SEA for bringing   suit helped to hasten the demise of ARC as a standard when PKWare   and others introduced new, incompatible archivers with better   compression algorithms....
archive is  n. 1. A collection of several files bundled into one file   by a program such as `ar(1)', `tar(1)', `cpio(1)',   or {arc} for shipment or archiving (sense 2).  See also {tar   and feather}.  2. A collection of files or archives (sense 1) ...

factpacks/jargon-split.fact  view on Meta::CPAN

Bad Thing3 is  mainstream idiom on the   British side of the pond. 
bag on the side is  n. An extension to an established hack that is   supposed to add some functionality to the original.  Usually   derogatory, implying that the original was being overextended and   should have been thrown away, and the new product ...
bag on the side2 is  phrase, `to hang a bag on the side   [of]'.  "C++?  That's just a bag on the side of C ...." "They   want me to hang a bag on the side of the accounting system." 
bagbiter is  /bag'bit-*r/ n. 1. Something, such as a program or a   computer, that fails to work, or works in a remarkably clumsy   manner.  "This text editor won't let me make a file with a line   longer than 80 characters!  What a bagbiter!"  2. A ...
bagbiter2 is  inadvertently or otherwise, typically by   failing to program the computer properly.  Synonyms {loser},   {cretin}, {chomper}.  3. adj. `bagbiting' Having the   quality of a bagbiter.  "This bagbiting system won't let me   compute the f...
bagbiter3 is  {losing},   {cretinous}, {bletcherous}, `barfucious' (under   {barfulous}) and `chomping' (under {chomp}).  4. `bite   the bag' vi. To fail in some manner.  "The computer keeps crashing   every 5 minutes."  "Yes, the disk controller is ...
bagbiter4 is  of these terms was almost undoubtedly   obscene, possibly referring to the scrotum, but in their current   usage they have become almost completely sanitized.   A program called Lexiphage on the old MIT AI PDP-10 would draw on   a selec...
bagbiter5 is  BAG" in   ornate letters, and then a pair of jaws biting pieces of it off.   This is the first and to date only known example of a program   *intended* to be a bagbiter. 
bamf is  /bamf/ 1. [from old X-Men comics] interj. Notional sound made   by a person or object teleporting in or out of the hearer's   vicinity.  Often used in {virtual reality} (esp. {MUD})   electronic {fora} when a character wishes to make a drama...
bamf2 is  magical transformation, used in virtual   reality {fora} like sense 1.  3. [from `Don Washington's   Survival Guide'] n. Acronym for `Bad-Ass Mother Fucker', used to   refer to one of the handful of nastiest monsters on an LPMUD or   other ...
banana label is  n. The labels often used on the sides of {macrotape}   reels, so called because they are shaped roughly like blunt-ended   bananas.  This term, like macrotapes themselves, is still current   but visibly headed for obsolescence.
banana problem is  n. [from the story of the little girl who said "I   know how to spell `banana', but I don't know when to stop"].  Not   knowing where or when to bring a production to a close (compare   {fencepost error}).  One may say `there is a ...
banana problem2 is  defined or incorrect termination conditions,   or in discussing the evolution of a design that may be succumbing   to featuritis (see also {creeping elegance}, {creeping   featuritis}).  See item 176 under {HAKMEM}, which describe...
banana problem3 is  implementation.bandwidth n. 1. Used by hackers in a generalization of its   technical meaning as the volume of information per unit time that a   computer, person, or transmission medium can handle.  "Those are   amazing graphics,...
banana problem4 is    bandwidth, I guess."  Compare {low-bandwidth}.  2. Attention   span.  3. On {USENET}, a measure of network capacity that is   often wasted by people complaining about how items posted by others   are a waste of bandwidth. 
bang is  1. n. Common spoken name for `!' (ASCII 0100001),   especially when used in pronouncing a {bang path} in spoken   hackish.  In {elder days} this was considered a CMUish usage,   with MIT and Stanford hackers preferring {excl} or {shriek};   ...
bang2 is  it (esp. via the   term {bang path}) and it is now certainly the most common spoken   name for `!'.  Note that it is used exclusively for   non-emphatic written `!'; one would not say "Congratulations   bang" (except possibly for humorous p...
bang3 is  exact characters `foo!' one would speak "Eff oh oh   bang".  See {shriek}, {{ASCII}}.  2. interj. An exclamation   signifying roughly "I have achieved enlightenment!", or "The   dynamite has cleared out my brain!"  Often used to acknowledge...
bang4 is  immediately after one has   been called on it. 
bang on is  vt. To stress-test a piece of hardware or software "I   banged on the new version of the simulator all day yesterday and it   didn't crash once.  I guess it is ready to release."  The term   {pound on} is synonymous.
bang path is  n. An old-style UUCP electronic-mail address specifying   hops to get from some assumed-reachable location to the addressee,   so called because each {hop} is signified by a {bang} sign.   Thus, for example, the path ...!bigsite!foovax!...
bang path2 is  to machine bigsite (presumably   a well-known location accessible to everybody) and from there   through the machine foovax to the account of user me on   barbox.   In the bad old days of not so long ago, before autorouting mailers   b...
bang path3 is  compound bang addresses   using the { } convention (see {glob}) to give paths from   *several* big machines, in the hopes that one's correspondent   might be able to get mail to one of them reliably (example   ...!{seismo, ut-sally, ih...
bang path4 is  10 hops were not uncommon in 1981.  Late-night dial-up   UUCP links would cause week-long transmission times.  Bang paths   were often selected by both transmission time and reliability, as   messages would often get lost.  See {{Inter...
banner is  n. 1. The title page added to printouts by most print   spoolers (see {spool}).  Typically includes user or account ID   information in very large character-graphics capitals.  Also called   a `burst page', because it indicates where to bu...
banner2 is  one user's printout from the next.  2. A   similar printout generated (typically on multiple pages of fan-fold   paper) from user-specified text, e.g., by a program such as UNIX's   `banner({1,6})'.  3. On interactive software, a first sc...
banner3 is  and/or a copyright notice. 
bar is  /bar/ n. 1. The second metasyntactic variable, after {foo}   and before {baz}.  "Suppose we have two functions FOO and BAR.   FOO calls BAR...."  2. Often appended to {foo} to produce   {foobar}.
bare metal is  n. 1. New computer hardware, unadorned with such   snares and delusions as an {operating system}, an {HLL}, or   even assembler.  Commonly used in the phrase `programming on the   bare metal', which refers to the arduous work of {bit b...
bare metal2 is  for a new machine.  Real   bare-metal programming involves things like building boot proms and   BIOS chips, implementing basic monitors used to test device   drivers, and writing the assemblers that will be used to write the   compil...
bare metal3 is  real   development environment.  2. `Programming on the bare metal' is   also used to describe a style of {hand-hacking} that relies on   bit-level peculiarities of a particular hardware design, esp.   tricks for speed and space optim...
bare metal4 is  overlapping instructions (or, as in the famous case described in   appendix A, interleaving of opcodes on a magnetic drum to minimize   fetch delays due to the device's rotational latency).  This sort of   thing has become less common...
bare metal5 is  and machine resources have changed, but is still found in   heavily constrained environments such as industrial embedded systems.   See {real programmer}.   In the world of personal computing, bare metal programming (especially   in s...
bare metal6 is  considered a   {Good Thing}, or at least a necessary thing (because these   machines have often been sufficiently slow and poorly designed   to make it necessary; see {ill-behaved}).  There, the term   usually refers to bypassing the ...
bare metal7 is  application to directly access device registers and machine   addresses.  "To get 19.2 kilobaud on the serial port, you need to   get down to the bare metal."  People who can do this sort of thing   are held in high regard. 
barf is  /barf/ [from mainstream slang meaning `vomit']   1. interj.  Term of disgust.  This is the closest hackish   equivalent of the Val\-speak "gag me with a spoon". (Like, euwww!)   See {bletch}.  2. vi. To say "Barf!" or emit some similar   exp...
barf2 is  hack and he   barfed" means only that he complained about it, not that he   literally vomited.  3. vi. To fail to work because of unacceptable   input.  May mean to give an error message.  Examples "The   division operation barfs if you try...
barf3 is  operation checks for an attempt to divide by zero, and   if one is encountered it causes the operation to fail in some   unspecified, but generally obvious, manner.) "The text editor   barfs if you try to read in a new file before writing o...
barf4 is  Commonwealth hackish,   `barf' is generally replaced by `puke' or `vom'.  {barf}   is sometimes also used as a metasyntactic variable, like {foo} or   {bar}. 
barfulation is  /bar`fyoo-lay'sh*n/ interj. Variation of {barf}   used around the Stanford area.  An exclamation, expressing disgust.   On seeing some particularly bad code one might exclaim,   "Barfulation!  Who wrote this, Quux?"
barfulous is  /bar'fyoo-l*s/ adj. (alt. `barfucious',   /bar-fyoo-sh*s/) Said of something that would make anyone barf,   if only for esthetic reasons.
baroque is  adj. Feature-encrusted; complex; gaudy; verging on   excessive.  Said of hardware or (esp.) software designs, this has   many of the connotations of {elephantine} or {monstrosity} but is   less extreme and not pejorative in itself.  "Meta...
baroque2 is  variations to its letterform output.   Now *that* is baroque!"  See also {rococo}. 
BartleMUD is  /bar'tl-muhd/ n. Any of the MUDs derived from the   original MUD game by Richard Bartle (see {MUD}).  BartleMUDs are   noted for their (usually slightly offbeat) humor, dry but friendly   syntax, and lack of adjectives in object descrip...
BartleMUD2 is  `brand172', for instance (see {brand   brand brand}).  Some MUDders intensely dislike Bartle and this   term, and prefer to speak of `MUD-1'. 
BASIC is  n. A programming language, originally designed for   Dartmouth's experimental timesharing system in the   early 1960s, which has since become the leading cause of   brain-damage in proto-hackers.  This is another case (like   {Pascal}) of t...
BASIC2 is  deliberately designed as an educational toy gets taken too   seriously.  A novice can write short BASIC programs (on the order of   10--20 lines) very easily; writing anything longer is (a) very   painful, and (b) encourages bad habits tha...
BASIC3 is  hack in a real language.  This wouldn't be so   bad if historical accidents hadn't made BASIC so common on low-end   micros.  As it is, it ruins thousands of potential wizards a year. 
batch is  adj. 1. Non-interactive.  Hackers use this somewhat more   loosely than the traditional technical definitions justify; in   particular, switches on a normally interactive program that prepare   it to receive non-interactive command input ar...
batch2 is  switches.  A `batch file' is a series of   instructions written to be handed to an interactive program running   in batch mode.  2. Performance of dreary tasks all at one sitting.   "I finally sat down in batch mode and wrote out checks fo...
batch3 is  electricity back on next   week..." 3. Accumulation of a number of small tasks that can be   lumped together for greater efficiency.  "I'm batching up those   letters to send sometime" "I'm batching up bottles to take to the   recycling ce...
bathtub curve is  n. Common term for the curve (resembling an   end-to-end section of one of those claw-footed antique bathtubs)   that describes the expected failure rate of electronics with time   initially high, dropping to near 0 for most of the ...
bathtub curve2 is  `tires out'.  See also {burn-in   period}, {infant mortality}. 
baud is  /bawd/ [simplified from its technical meaning] n. Bits per   second.  Hence kilobaud or Kbaud, thousands of bits per second.   The technical meaning is `level transitions per second'; this   coincides with bps only for two-level modulation w...
baud2 is  are aware of these nuances but blithely   ignore them. 
baud barf is  /bawd barf/ n. The garbage one gets on the monitor   when using a modem connection with some protocol setting (esp.   line speed) incorrect, or when someone picks up a voice extension   on the same line, or when really bad line noise di...
baud barf2 is  completely {random}, by the way;   hackers with a lot of serial-line experience can usually tell   whether the device at the other end is expecting a higher or lower   speed than the terminal is set to.  *Really* experienced ones   can...
baz is  /baz/ [Stanford corruption of {bar}] n. 1. The third   metasyntactic variable, after {foo} and {bar} and before   {quux} (or, occasionally, `qux'; or local idiosyncracies like   `rag', `zowie', etc.).  "Suppose we have three functions FOO,BAR...
baz2 is  BAZ...."   2. interj. A term of mild annoyance.  In this usage the term is   often drawn out for 2 or 3 seconds, producing an effect not unlike   the bleating of a sheep; /baaaaaaz/.  3. Occasionally appended to   {foo} to produce `foobaz'. 
bboard is  /bee'bord/ [contraction of `bulletin board'] n.   1. Any electronic bulletin board; esp. used of {BBS} systems   running on personal micros, less frequently of a USENET   {newsgroup} (in fact, use of the term for a newsgroup generally   ma...
bboard2 is  BBS world or as   a real old-timer predating USENET).  2. At CMU and other colleges   with similar facilities, refers to campus-wide electronic bulletin   boards.  3. The term `physical bboard' is sometimes used to   refer to a old-fashio...
bboard3 is  it refers to a particular one outside the CS Lounge.   In either of senses 1 or 2, the term is usually prefixed by the   name of the intended board (`the Moonlight Casino bboard' or   `market bboard'); however, if the context is clear, th...
bboard4 is  name alone, as in (at CMU) "Don't   post for-sale ads on general". 
BBS is  /B-B-S/ [acronym, `Bulletin Board System'] n. An electronic   bulletin board system; that is, a message database where people can   log in and leave broadcast messages for others grouped (typically)   into {topic group}s.  Thousands of local ...
BBS2 is  U.S., typically run by amateurs for fun   out of their homes on MS-DOS boxes with a single modem line each.   Fans of USENET and Internet or the big commercial timesharing   bboards such as CompuServe and GEnie tend to consider local BBSes  ...
BBS3 is  but they serve a   valuable function by knitting together lots of hackers and users in   the personal-micro world who would otherwise be unable to exchange   code at all. 
beam is  [from Star Trek Classic's "Beam me up, Scotty!"] vt. To   transfer {softcopy} of a file electronically; most often in   combining forms such as `beam me a copy' or `beam that over to   his site'.  Compare {blast}, {snarf}, {BLT}.
beanie key is  [Mac users] n. See {command key}.
beep is  n.,v. Syn. {feep}.  This term seems to be preferred among micro   hobbyists.
beige toaster is  n. A Macintosh. See {toaster}; compare   {Macintrash}, {maggotbox}.
bells and whistles is  [by analogy with the toyboxes on theater   organs] n. Features added to a program or system to make it more   {flavorful} from a hacker's point of view, without necessarily   adding to its utility for its primary function.  Dis...
bells and whistles2 is  to attract users.  "Now that we've   got the basic program working, let's go back and add some bells and   whistles."  No one seems to know what distinguishes a bell from a   whistle. 
bells, whistles, and gongs is  n. A standard elaborated form of   {bells and whistles}; typically said with a pronounced and ironic   accent on the `gongs'.
benchmark is  [techspeak] n. An inaccurate measure of computer   performance.  "In the computer industry, there are three kinds of   lies lies, damn lies, and benchmarks."  Well-known ones include   Whetstone, Dhrystone, Rhealstone (see {h}), the Gab...
benchmark2 is  SPECmark suite, and LINPACK.  See   also {machoflops}, {MIPS}. 
Berkeley Quality Software is  adj. (often abbreviated `BQS') Term used   in a pejorative sense to refer to software that was apparently   created by rather spaced-out hackers late at night to solve some   unique problem.  It usually has nonexistent, ...
Berkeley Quality Software2 is  been tested on at least two examples,   and core dumps when anyone else attempts to use it.  This term was   frequently applied to early versions of the `dbx(1)' debugger.   See also {Berzerkeley}. 
berklix is  /berk'liks/ n.,adj. [contraction of `Berkeley UNIX'] See   {BSD}.  Not used at Berkeley itself.  May be more common among   {suit}s attempting to sound like cognoscenti than among hackers,   who usually just say `BSD'.
berserking is  vi. A {MUD} term meaning to gain points *only*   by killing other players and mobiles (non-player characters).   Hence, a Berserker-Wizard is a player character that has achieved   enough points to become a wizard, but only by killing ...
berserking2 is  frowned upon because of its   inherently antisocial nature, but some MUDs have a `berserker   mode' in which a player becomes *permanently* berserk, can   never flee from a fight, cannot use magic, gets no score for   treasure, but do...
berserking3 is  wizards can seriously damage your elf!" 
Berzerkeley is  /b*r-zer'klee/ [from `berserk', via the name of a   now-deceased record label] n. Humorous distortion of `Berkeley'   used esp. to refer to the practices or products of the   {BSD} UNIX hackers.  See {software bloat}, {Missed'em-five}...
Berzerkeley2 is  use of this term in reference to the cultural and   political peculiarities of UC Berkeley as a whole has been reported   from as far back as the 1960s. 
beta is  /bay't*/, /be't*/ or (Commonwealth) /bee't*/ n. 1. In   the {Real World}, software often goes through two stages of   testing Alpha (in-house) and Beta (out-house?).  Software is said   to be `in beta'.  2. Anything that is new and experimen...
beta2 is  means that he is still testing   for compatibility and reserving judgment.  3. Beta software is   notoriously buggy, so `in beta' connotes flakiness.   Historical note More formally, to beta-test is to test a   pre-release (potentially unre...
beta3 is  making it available to selected customers and users.  This term   derives from early 1960s terminology for product cycle checkpoints,   first used at IBM but later standard throughout the industry.   `Alpha Test' was the unit, module, or co...
beta4 is  system test.  These themselves came from earlier   A- and B-tests for hardware.  The A-test was a feasibility and   manufacturability evaluation done before any commitment to design   and development.  The B-test was a demonstration that th...
beta5 is  The C-test   (corresponding to today's beta) was the B-test performed on early   samples of the production design. 
BFI is  /B-F-I/ n. See {brute force and ignorance}.  Also   encountered in the variant `BFMI', `brute force and   *massive* ignorance'.
bible is  n. 1. One of a small number of fundamental source books   such as {Knuth} and {K&R}.  2. The most detailed and   authoritative reference for a particular language, operating   system, or other complex software system.
BiCapitalization is  n. The act said to have been performed on   trademarks (such as NeXT, {NeWS}, VisiCalc, FrameMaker,   TK!solver, EasyWriter) that have been raised above the ruck of   common coinage by nonstandard capitalization.  Too many   {mar...
BiCapitalization2 is  really cute, even   the 2,317th time they do it.  Compare {studlycaps}. 
BIFF is  /bif/ [USENET] n. The most famous {pseudo}, and the   prototypical {newbie}.  Articles from BIFF are characterized by   all uppercase letters sprinkled liberally with bangs, typos,   `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ HE"S...
BIFF2 is  IN CAPITULL LETTRS LIKE   THIS!!!), use (and often misuse) of fragments of {talk mode}   abbreviations, a long {sig block} (sometimes even a {doubled   sig}), and unbounded na"ivet'e.  BIFF posts articles using his elder   brother's VIC-20....
BIFF3 is    appear to come from a variety of sites.  However, {BITNET} seems to   be the most frequent origin.  The theory that BIFF is a denizen of   BITNET is supported by BIFF's (unfortunately invalid) electronic   mail address BIFF@BIT.NET. 
biff is  /bif/ vt. To notify someone of incoming mail.  From the   BSD utility `biff(1)', which was in turn named after the   implementor's dog (it barked whenever the mailman came).  No   relation to {BIFF}.
Big Gray Wall is  n. What faces a {VMS} user searching for   documentation.  A full VMS kit comes on a pallet, the documentation   taking up around 15 feet of shelf space before the addition of layered   products such as compilers, databases, multive...
Big Gray Wall2 is  Recent (since VMS version 5) DEC   documentation comes with gray binders; under VMS version 4 the   binders were orange (`big orange wall'), and under version 3   they were blue.  See {VMS}. 
big iron is  n. Large, expensive, ultra-fast computers.  Used generally   of {number-crunching} supercomputers such as Crays, but can include   more conventional big commercial IBMish mainframes.  Term of   approval; compare {heavy metal}, oppose {di...
Big Red Switch is  [IBM] n. The power switch on a computer, esp. the   `Emergency Pull' switch on an IBM {mainframe} or the power switch   on an IBM PC where it really is large and red.  "This !@%$%   {bitty box} is hung again; time to hit the Big Re...
Big Red Switch2 is  tune with the company's passion for   {TLA}s, this is often acronymized as `BRS' (this has also   become established on FidoNet and in the PC {clone} world).  It   is alleged that the emergency pull switch on an IBM 360/91 actuall...
Big Red Switch3 is  power feed; the BRSes on   more recent machines physically drop a block into place so that   they can't be pushed back in.  People get fired for pulling them,   especially inappropriately (see also {molly-guard}).  Compare   {powe...
the Big Room is  n. The extremely large room with the blue ceiling   and intensely bright light (during the day) or black ceiling with   lots of tiny night-lights (during the night) found outside all   computer installations.  "He can't come to the p...
big win is  n. Serendipity.  "Yes, those two physicists discovered   high-temperature superconductivity in a batch of ceramic that had   been prepared incorrectly according to their experimental schedule.   Small mistake; big win!" See {win big}.
big-endian is  [From Swift's `Gulliver's Travels' via the famous   paper `On Holy Wars and a Plea for Peace' by Danny Cohen,   USC/ISI IEN 137, dated April 1, 1980] adj. 1. Describes a computer   architecture in which, within a given multi-byte numer...
big-endian2 is  has the lowest address   (the word is stored `big-end-first').  Most processors, including   the IBM 370 family, the {PDP-10}, the Motorola microprocessor   families, and most of the various RISC designs current in mid-1991,   are big...
big-endian3 is  {NUXI   problem}.  2. An {{Internet address}} the wrong way round.  Most   of the world follows the Internet standard and writes email   addresses starting with the name of the computer and ending up with   the name of the country.  I...
big-endian4 is  decided to do it the other way round before the Internet domain   standard was established; e.g., me@uk.ac.wigan.cs.  Most gateway   sites have {ad-hockery} in their mailers to handle this, but can   still be confused.  In particular,...
big-endian5 is  (domain uk) or Czechoslovakia (domain cs). 
bignum is  /big'nuhm/ [orig. from MIT MacLISP] n. 1. [techspeak] A   multiple-precision computer representation for very large integers.   More generally, any very large number.  "Have you ever looked at   the United States Budget?  There's bignums f...
bignum2 is  numbers on the dice are called   `bignums', especially a roll of double fives or double sixes   (compare {moby}, sense 4).  See also {El Camino Bignum}.   Sense 1 may require some explanation.  Most computer languages   provide a kind of ...
bignum3 is  integers are usually very limited in size; usually they must be   smaller than than 2^{31} (2,147,483,648) or (on a losing   {bitty box}) 2^{15} (32,768).  If you want to work with   numbers larger than that, you have to use floating-poin...
bignum4 is  six or seven decimal places.   Computer languages that provide bignums can perform exact   calculations on very large numbers, such as 1000!  (the factorial   of 1000, which is 1000 times 999 times 998 times ... times 2   times 1). 
bigot is  n. A person who is religiously attached to a particular   computer, language, operating system, editor, or other tool (see   {religious issues}).  Usually found with a specifier; thus,   `cray bigot', {ITS bigot}, `APL bigot', `VMS bigot', ...
bigot2 is  distinguished from mere   partisans or zealots by the fact that they refuse to learn   alternatives even when the march of time and/or technology is   threatening to obsolete the favored tool.  It is said "You can   tell a bigot, but you c...
bit is  [from the mainstream meaning and `Binary digIT'] n.   1. [techspeak] The unit of information; the amount of information   obtained by asking a yes-or-no question for which the two outcomes   are equally probable.  2. [techspeak] A computation...
bit2 is  values, such as true and false or 0 and 1.   3. A mental flag a reminder that something should be done   eventually.  "I have a bit set for you."  (I haven't seen you for   a while, and I'm supposed to tell or ask you something.)  4. More   ...
bit3 is  of belief.  "I have   a bit set that says that you were the last guy to hack on EMACS."   (Meaning "I think you were the last guy to hack on EMACS, and what   I am about to say is predicated on this, so please stop me if this   isn't true.")...
bit4 is  way of indicating that   you intend only a short interruption for a question that can   presumably be answered yes or no.   A bit is said to be `set' if its value is true or 1, and   `reset' or `clear' if its value is false or 0.  One   spea...
bit5 is  or   `invert' a bit is to change it, either from 0 to 1 or from   1 to 0.  See also {flag}, {trit}, {mode bit}. 
bit bang is  n. Transmission of data on a serial line, when   accomplished by rapidly tweaking a single output bit at the   appropriate times.  The technique is a simple   loop with eight OUT and SHIFT instruction pairs for each byte.   Input is more...

factpacks/jargon-split.fact  view on Meta::CPAN

hang2 is  a character."  Compare {block}.   3. To attach a peripheral device, esp. in the construction `hang   off'  "We're going to hang another tape drive off the file   server."  Implies a device attached with cables, rather than   something that ...
Hanlon's Razor is  prov. A corollary of {Finagle's Law}, similar to   Occam's Razor, that reads "Never attribute to malice that which can   be adequately explained by stupidity."  The derivation of the   common title Hanlon's Razor is unknown; a simi...
Hanlon's Razor2 is  James.  Quoted here because it seems to be a   particular favorite of hackers, often showing up in {fortune   cookie} files and the login banners of BBS systems and commercial   networks.  This probably reflects the hacker's daily...
Hanlon's Razor3 is  well-intentioned but short-sighted people. 
happily is  adv.  Of software, used to emphasize that a program is   unaware of some important fact about its environment, either   because it has been fooled into believing a lie, or because it   doesn't care.  The sense of `happy' here is not that ...
happily2 is  ignorance.  "The program continues to   run, happily unaware that its output is going to /dev/null." 
hard boot is  n. See {boot}.
hardcoded is  adj. 1. Said of data inserted directly into a program,   where it cannot be easily modified, as opposed to data in some   {profile}, resource (see {de-rezz} sense 2), or environment   variable that a {user} or hacker can easily modify. ...
hardcoded2 is  literal instead of a   `#define' macro (see {magic number}). 
hardwarily is  /hard-weir'*-lee/ adv. In a way pertaining to   hardware.  "The system is hardwarily unreliable."  The adjective   `hardwary' is *not* traditionally used, though it has recently   been reported from the U.K.  See {softwarily}.
hardwired is  adj. 1. In software, syn. for {hardcoded}.  2. By   extension, anything that is not modifiable, especially in the sense   of customizable to one's particular needs or tastes.
has the X nature is  [seems to derive from Zen Buddhist koans of the   form "Does an X have the Buddha-nature?"] adj. Common hacker   construction for `is an X', used for humorous emphasis.  "Anyone   who can't even use a program with on-screen help ...
has the X nature2 is  nature!"  See also {the X that can be Y   is not the true X}. 
hash bucket is  n. A notional receptacle into which more than one   thing accessed by the same key or short code might be dropped.   When you look up a name in the phone book (for example), you   typically hash it by extracting its first letter; the ...
hash bucket2 is  letter sections.  This is used as   techspeak with respect to code that uses actual hash functions; in   jargon, it is used for human associative memory as well.  Thus, two   things `in the same hash bucket' may be confused with each...
hash bucket3 is  length, you get too many common   grammar words in the first couple of hash buckets." Compare {hash   collision}. 
hash collision is  [from the technical usage] n. (var. `hash   clash') When used of people, signifies a confusion in associative   memory or imagination, especially a persistent one (see   {thinko}).  True story One of us [ESR] was once on the phone ...
hash collision2 is   When asked what he   expected Berkeley to be like, the friend replied "Well, I have   this mental picture of naked women throwing Molotov cocktails, but   I think that's just a collision in my hash tables."  Compare   {hash bucke...
hat is  n. Common (spoken) name for the circumflex (`^', ASCII   1011110) character.  See {ASCII} for other synonyms.
HCF is  /H-C-F/ n. Mnemonic for `Halt and Catch Fire', any of   several undocumented and semi-mythical machine instructions with   destructive side-effects, supposedly included for test purposes on   several well-known architectures going as far back...
HCF2 is  was the first for which the HCF opcode   became widely known.  This instruction caused the processor to   {toggle} a subset of the bus lines as rapidly as it could; in   some configurations this can actually cause lines to burn   up. 
heads down is  [Sun] adj. Concentrating, usually so heavily and for so   long that everything outside the focus area is missed.  See also   {hack mode} and {larval stage}, although it is not confined to   fledgling hackers.
heartbeat is  n. 1. The signal emitted by a Level 2 Ethernet   transceiver at the end of every packet to show that the   collision-detection circuit is still connected.  2. A periodic   synchronization signal used by software or hardware, such as a b...
heartbeat2 is  `natural' oscillation   frequency of a computer's clock crystal, before frequency division   down to the machine's clock rate.  4. A signal emitted at regular   intervals by software to demonstrate that it is still alive.   Sometimes h...
heartbeat3 is  stops   hearing a heartbeat.  See also {breath-of-life packet}. 
heavy metal is  [Cambridge] n. Syn. {big iron}.
heavy wizardry is  n. Code or designs that trade on a particularly   intimate knowledge or experience of a particular operating system   or language or complex application interface.  Distinguished from   {deep magic}, which trades more on arcane *th...
heavy wizardry2 is  drivers is heavy wizardry; so is   interfacing to {X} (sense 2) without a toolkit.  Esp. found in   comments similar to "Heavy wizardry begins here ...".  Compare   {voodoo programming}. 
heavyweight is  adj. High-overhead; {baroque}; code-intensive;   featureful, but costly.  Esp. used of communication protocols,   language designs, and any sort of implementation in which maximum   generality and/or ease of implementation has been pu...
heavyweight2 is  considerations such as speed, memory utilization,   and startup time.  {EMACS} is a heavyweight editor; {X} is an   *extremely* heavyweight window system.  This term isn't   pejorative, but one man's heavyweight is another's {elephan...
heisenbug is  /hi'zen-buhg/ [from Heisenberg's Uncertainty   Principle in quantum physics] n. A bug that disappears or alters   its behavior when one attempts to probe or isolate it.  Antonym of   {Bohr bug}; see also {mandelbug}.  In C, nine out of ...
heisenbug2 is  on core} phenomena (esp. lossage   related to corruption of the malloc {arena}) or errors that   {smash the stack}. 
Helen Keller mode is  n. State of a hardware or software system that   is deaf, dumb, and blind, i.e., accepting no input and generating no   output, usually due to an infinite loop or some other excursion   into {deep space}.  (Unfair to the real He...
Helen Keller mode2 is  was triumphant.)  See also   {go flatline}, {catatonic}. 
hello, sailor! is  interj. Occasional West Coast equivalent of   {hello, world}; seems to have originated at SAIL, later   associated with the game {Zork} (which also included "hello,   aviator" and "hello, implementor").  Originally from the   tradi...
hello, sailor!2 is  off the boat, of   course. 
hello, wall! is  excl. See {wall}.
hello, world is  interj. 1. The canonical minimal test message in the   C/UNIX universe.  2. Any of the minimal programs that emit this   message.  Traditionally, the first program a C coder is supposed to   write in a new environment is one that jus...
hello, world2 is  (and indeed it is the first example program   in {K&R}).  Environments that generate an unreasonably large   executable for this trivial test or which require a {hairy}   compiler-linker invocation to generate it are considered to  ...
hello, world3 is  hacker making an   entrance or requesting information from anyone present.  "Hello,   world!  Is the {VAX} back up yet?" 
hex is  n. 1. Short for {{hexadecimal}}, base 16.  2. A 6-pack   of anything (compare {quad}, sense 2).  Neither usage has   anything to do with {magic} or {black art}, though the pun is   appreciated and occasionally used by hackers.  True story As ...
hex2 is  surplus ICs for sale to be   worn as protective amulets against hostile magic.  The chips were,   of course, hex inverters. 
hexadecimal is  n. Base 16.  Coined in the early 1960s to replace   earlier `sexadecimal', which was too racy and amusing for stuffy   IBM, and later adopted by the rest of the industry.   Actually, neither term is etymologically pure.  If we take `b...
hexadecimal2 is  etymologically correct term for   base 10, for example, is `denary', which   comes from `deni' (ten at a time, ten each), a Latin `distributive'   number; the corresponding term for base-16 would be something like   `sendenary'.  `De...
hexadecimal3 is  corresponding prefix for 6 would imply something like   `sextidecimal'.  The `sexa-' prefix is Latin but incorrect in this   context, and `hexa-' is Greek.  The word `octal' is similarly   incorrect; a correct form would be `octaval'...
hexadecimal4 is  with binary).  If anyone ever implements a   base-3 computer, computer scientists will be faced with the   unprecedented dilemma of a choice between two *correct* forms;   both `ternary' and `trinary' have a claim to this throne. 
hexit is  /hek'sit/ n. A hexadecimal digit (0--9, and A--F or a--f).   Used by people who claim that there are only *ten* digits,   dammit; sixteen-fingered human beings are rather rare, despite what   some keyboard designs might seem to imply (see {...
hidden flag is  [scientific computation] n. An extra option added to a   routine without changing the calling sequence.  For example,   instead of adding an explicit input variable to instruct a routine   to give extra diagnostic output, the programm...
hidden flag2 is  meaningless feature of the existing inputs,   such as a negative mass.  Liberal use of hidden flags can make a   program very hard to debug and understand. 
high bit is  [from `high-order bit'] n. 1. The most significant   bit in a byte.  2. By extension, the most significant part of   something other than a data byte "Spare me the whole {saga},   just give me the high bit."  See also {meta bit}, {hobbit...
high bit2 is  mainstream slang   `bottom line'. 
high moby is  /hi' mohb'ee/ n. The high half of a 512K {PDP-10}'s   physical address space; the other half was of course the low moby.  This   usage has been generalized in a way that has outlasted the   {PDP-10}; for example, at the 1990 Washington ...
high moby2 is  (Disclave), when a miscommunication resulted in two   separate wakes being held in commemoration of the shutdown of MIT's   last {{ITS}} machines, the one on the upper floor was dubbed the   `high moby' and the other the `low moby'.  A...
highly is  [scientific computation] adv. The preferred modifier for   overstating an understatement.  As in `highly nonoptimal', the   worst possible way to do something; `highly nontrivial', either   impossible or requiring a major research project;...
highly2 is  unpredictable; `highly   nontechnical', drivel written for {luser}s, oversimplified to the   point of being misleading or incorrect (compare {drool-proof   paper}).  In other computing cultures, postfixing of {in the   extreme} might be p...
hirsute is  adj. Occasionally used humorously as a synonym for {hairy}.
HLL is  /H-L-L/ n. [High-Level Language (as opposed to assembler)]   Found primarily in email and news rather than speech.  Rarely, the   variants `VHLL' and `MLL' are found.  VHLL stands for `Very-High-Level   Language' and is used to describe a {bo...
HLL2 is  speaker happens to like; Prolog and Backus's FP   are often called VHLLs.  `MLL' stands for `Medium-Level Language' and is   sometimes used half-jokingly to describe {C}, alluding to its   `structured-assembler' image.  See also {languages o...
hobbit is  n. 1. The High Order Bit of a byte; same as the {meta   bit} or {high bit}.  2. The non-ITS name of vad@ai.mit.edu   (*Hobbit*), master of lasers.
hog is  n.,vt. 1. Favored term to describe programs or hardware that   seem to eat far more than their share of a system's resources,   esp. those which noticeably degrade interactive response.   *Not* used of programs that are simply extremely large...
hog2 is  slow themselves (see {pig,   run like a}).  More often than not encountered in qualified forms,   e.g., `memory hog', `core hog', `hog the processor', `hog   the disk'.  "A controller that never gives up the I/O bus   gets killed after the b...
hog3 is  *people* who use more than their fair share of resources   (particularly disk, where it seems that 10% of the people use 90%   of the disk, no matter how big the disk is or how many people use   it).  Of course, once disk hogs fill up one fi...
hog4 is  one to infect, claiming to the   sysadmin that they have an important new project to complete. 
holy wars is  [from {USENET}, but may predate it] n. {flame   war}s over {religious issues}.  The paper by Danny Cohen that   popularized the terms {big-endian} and {little-endian} in   connection with the LSB-first/MSB-first controversy was entitled...
holy wars2 is  perennial Holy   Wars have included {EMACS} vs. {vi}, my personal computer vs.   everyone else's personal computer, {{ITS}} vs. {{UNIX}},   {{UNIX}} vs. {VMS}, {BSD} UNIX vs. {USG UNIX}, {C} vs.   {{Pascal}}, {C} vs. {LISP}, etc., ad n...
holy wars3 is  distinguishes {holy wars} from normal   technical disputes is that in a holy wars most of the participants   spend their time trying to pass off personal value choices and   cultural attachments as objective technical evaluations. See ...
home box is  n. A hacker's personal machine, especially one he or she   owns.  "Yeah?  Well, *my* home box runs a full 4.2 BSD, so   there!"
hook is  n. A software or hardware feature included in order to   simplify later additions or changes by a user.  For example,   a simple program that prints numbers might always print them in   base 10, but a more flexible version would let a variab...
hook2 is  variable to 5 would make   the program print numbers in base 5.  The variable is a simple   hook.  An even more flexible program might examine the variable   and treat a value of 16 or less as the base to use, but treat any   other number a...
hook3 is  printing   a number.  This is a {hairy} but powerful hook; one can then write a   routine to print numbers as Roman numerals, say, or as Hebrew   characters, and plug it into the program through the hook.  Often   the difference between a g...
hook4 is  latter has useful hooks in judiciously chosen places.  Both may do   the original job about equally well, but the one with the hooks is   much more flexible for future expansion of capabilities ({EMACS},   for example, is *all* hooks).  The...
hook5 is  formal and less hackish. 
hop is  n. One file transmission in a series required to get a file   from point A to point B on a store-and-forward network.  On such   networks (including {UUCPNET} and {FidoNet}), the important   inter-machine metric is the number of hops in the s...
hop2 is  geographical separation.  See   {bang path}. 
hose is  1. vt. To make non-functional or greatly degraded in   performance.  "That big ray-tracing program really hoses the   system."  See {hosed}.  2. n. A narrow channel through which   data flows under pressure.  Generally denotes data paths tha...
hose2 is  Cabling, especially   thick Ethernet cable.  This is sometimes called `bit hose' or   `hosery' (play on `hosiery') or `etherhose'.  See also   {washing machine}. 
hosed is  adj. Same as {down}.  Used primarily by UNIX hackers.   Humorous also implies a condition thought to be relatively easy to   reverse.  Probably derived from the Canadian slang `hoser'   popularized by the Bob and Doug Mackenzie skits on SCT...
hosed2 is  people in the mainstream sense   of `in an extremely unfortunate situation'.   Once upon a time, a Cray that had been experiencing periodic   difficulties crashed, and it was announced to have been hosed.   It was discovered that the crash...
hosed3 is  hoses.  The problem was corrected, and users were then   assured that everything was OK because the system had been rehosed.   See also {dehose}. 
hot spot is  n. 1. [primarily used by C/UNIX programmers, but   spreading] It is received wisdom that in most programs, less than   10% of the code eats 90% of the execution time; if one were to   graph instruction visits versus code addresses, one w...
hot spot2 is  a lot of low-level noise.  Such spikes   are called `hot spots' and are good candidates for heavy   optimization or {hand-hacking}.  The term is especially used of   tight loops and recursions in the code's central algorithm, as   oppos...
hot spot3 is  infrequent I/O   operations.  See {tune}, {bum}, {hand-hacking}.  2. The   active location of a cursor on a bit-map display.  "Put the   mouse's hot spot on the `ON' widget and click the left button."   3. In a massively parallel comput...
hot spot4 is  all 10,000 processors are trying to read or   write at once (perhaps because they are all doing a {busy-wait}   on the same lock). 
house wizard is  [prob. from ad-agency lingo, `house freak'] n. A   hacker occupying a technical-specialist, R&D, or systems position   at a commercial shop.  A really effective house wizard can have   influence out of all proportion to his/her osten...
house wizard2 is  suit.  Used esp. of UNIX wizards.  The   term `house guru' is equivalent. 
HP-SUX is  /H-P suhks/ n. Unflattering hackerism for HP-UX,   Hewlett-Packard's UNIX port.  Features some truly unique bogosities   in the filesystem internals and elsewhere which occasionally create   portability problems.  HP-UX is often referred t...
HP-SUX2 is  respondent claims that the proper pronunciation   is /H-P ukkkhhhh/ as though one were about to spit.  Another such   alternate spelling and pronunciation is "H-PUX" /H-puhks/.   Hackers at HP/Apollo (the former Apollo Computers which was...
HP-SUX3 is  complain that Mr. Packard should   have pushed to have his name first, if for no other reason than the   greater eloquence of the resulting acronym.  Compare {buglix}.   See also {Telerat}, {sun-stools}, {terminak}. 
huff is  v. To compress data using a Huffman code.  Various programs   that use such methods have been called `HUFF' or some variant   thereof.  Oppose {puff}.  Compare {crunch}, {compress}.
humma is  // excl. A filler word used on various `chat' and   `talk' programs when you had nothing to say but felt that it was   important to say something.  The word apparently originated (at   least with this definition) on the MECC Timeshare Syste...
humma2 is  time-sharing system running in Minnesota   during the 1970s and the early 1980s) but was later sighted on   early UNIX systems. 
Humor, Hacker is  n. A distinctive style of shared intellectual humor   found among hackers, having the following distinctive   characteristics   1. Fascination with form-vs.-content jokes, paradoxes, and humor   having to do with confusion of metale...
Humor, Hacker2 is  laugh hold a red index card in front of him/her   with "GREEN" written on it, or vice-versa (note, however, that   this is funny only the first time).   2. Elaborate deadpan parodies of large intellectual constructs, such   as spec...
Humor, Hacker3 is  documents,   language descriptions (see {INTERCAL}), and even entire scientific   theories (see {quantum bogodynamics}, {computron}).   3. Jokes that involve screwily precise reasoning from bizarre,   ludicrous, or just grossly cou...
Humor, Hacker4 is  puns and wordplay.   5. A fondness for apparently mindless humor with subversive   currents of intelligence in it --- for example, old Warner Brothers   and Rocky & Bullwinkle cartoons, the Marx brothers, the early   B-52s, and Mon...
Humor, Hacker5 is  this   trait with elements of high camp and slapstick is especially   favored.   6. References to the symbol-object antinomies and associated ideas   in Zen Buddhism and (less often) Taoism.  See {has the X nature},   {Discordianis...
Humor, Hacker6 is  See also {filk}, {retrocomputing}, and appendix B.  If you have an   itchy feeling that all 6 of these traits are really aspects of   one thing that is incredibly difficult to talk about exactly, you   are (a) correct and (b) respo...
Humor, Hacker7 is  recognizable (though in a less marked form) throughout   {{science-fiction fandom}}. 
hung is  [from `hung up'] adj. Equivalent to {wedged}, but more   common at UNIX/C sites.  Not generally used of people.  Syn. with   {locked up}, {wedged}; compare {hosed}.  See also {hang}.   A hung state is distinguished from {crash}ed or {down}, ...
hung2 is  but because it is not running   rather than because it is waiting for something.  However, the   recovery from both situations is often the same. 
hungry puppy is  n. Syn. {slopsucker}.
hungus is  /huhng'g*s/ [perhaps related to slang `humongous'] adj.   Large, unwieldy, usually unmanageable.  "TCP is a hungus piece of   code."  "This is a hungus set of modifications."
hyperspace is  /hi'per-spays/ n. A memory location that is *far*   away from where the program counter should be pointing, often   inaccessible because it is not even mapped in.  "Another core   dump --- looks like the program jumped off to hyperspac...
hyperspace2 is  never-never land}.)  This   usage is from the SF notion of a spaceship jumping `into   hyperspace', that is, taking a shortcut through higher-dimensional   space --- in other words, bypassing this universe.  The variant   `east hypers...
hyperspace3 is  hackers.*I didn't change anything! interj. An aggrieved cry often heard as   bugs manifest during a regression test.  The {canonical} reply to   this assertion is "Then it works just the same as it did before,   doesn't it?"  See also...
hyperspace4 is  applications programmers trying to blame an obvious applications   problem on an unrelated systems software change, for example a   divide-by-0 fault after terminals were added to a network.   Usually, their statement is found to be f...
hyperspace5 is  admit some major restructuring of the   program that shouldn't have broken anything, in their opinion,   but which actually {hosed} the code completely. 
I see no X here. is  Hackers (and the interactive computer games they   write) traditionally favor this slightly marked usage over other   possible equivalents such as "There's no X here!" or "X is   missing."  or "Where's the X?".  This goes back to...
I see no X here.2 is  respond in this wise if you asked   it to do something involving an object not present at your location   in the game. 
i14y is  // n. Abbrev. for `interoperability', with the `14'   replacing fourteen letters.  Used in the {X} (windows)   community.  Refers to portability and compatibility of data formats   (even binary ones) between different programs or implementat...
i18n is  // n. Abbrev. for `internationali{z,s}ation', with the 18   replacing 18 letters.  Used in the {X} (windows) community.
IBM is  /I-B-M/ Inferior But Marketable; It's Better Manually;   Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel   Movement; and a near-{infinite} number of even less complimentary   expansions, including `International Business Ma...
IBM2 is  illustrate the considerable   antipathy most hackers have long felt toward the `industry leader'   (see {fear and loathing}).   What galls hackers about most IBM machines above the PC level isn't   so much that they are underpowered and over...
IBM3 is  but that the designs are incredibly archaic,   {crufty}, and {elephantine} ... and you can't *fix* them   --- source code is locked up tight, and programming tools are   expensive, hard to find, and bletcherous to use once you've found   the...
IBM4 is  family this may have   begun to change --- but then, we thought that when the PC-RT came   out, too.   In the spirit of universal peace and brotherhood, this lexicon now   includes a number of entries attributed to `IBM'; these derive from s...
IBM5 is  circulated within IBM's own   beleaguered hacker underground. 
IBM discount is  n. A price increase.  Outside IBM, this derives from   the common perception that IBM products are generally overpriced   (see {clone}); inside, it is said to spring from a belief that   large numbers of IBM employees living in an ar...
ice is  [coined by USENETter Tom Maddox, popularized by William   Gibson's cyberpunk SF novels acronym for `Intrusion   Countermeasure Electronics'] Security software (in Gibson's novels,   software that responds to intrusion by attempting to literal...
ice2 is  program designed for   cracking security on a system.  Neither term is in serious use yet   as of mid-1991, but many hackers find the metaphor attractive, and   each may develop a denotation in the future. 
ifdef out is  /if'def owt/ v. Syn. for {condition out}, specific   to {C}.
ill-behaved is  adj. 1. [numerical analysis] Said of an algorithm or   computational method that tends to blow up because of accumulated   roundoff error or poor convergence properties.  2. Software that   bypasses the defined {OS} interfaces to do t...
ill-behaved2 is  itself, often in a way that depends on the   hardware of the machine it is running on or which is nonportable or   incompatible with other pieces of software.  In the IBM PC/MS-DOS   world, there is a folk theorem (nearly true) to th...
ill-behaved3 is  and performance penalties in the OS   interface) all interesting applications are ill-behaved.  See also   {bare metal}. Oppose {well-behaved}, compare {PC-ism}.  See   {mess-dos}. 
IMHO is  // [from SF fandom via USENET; acronym for `In My Humble   Opinion']  "IMHO, mixed-case C names should be avoided, as   mistyping something in the wrong case can cause hard-to-detect   errors --- and they look too Pascalish anyhow."  Also se...
IMHO2 is  Not-So-Humble Opinion) and IMAO   (In My Arrogant Opinion). 
in the extreme is  adj. A preferred superlative suffix for many hackish   terms.  See, for example, `obscure in the extreme' under {obscure},   and compare {highly}.
incantation is  n. Any particularly arbitrary or obscure command that   one must mutter at a system to attain a desired result.  Not used   of passwords or other explicit security features.  Especially used   of tricks that are so poorly documented t...
incantation2 is  compiler normally locates initialized data   in the data segment, but if you {mutter} the right incantation they   will be forced into text space." 
include is  vt. [USENET] 1. To duplicate a portion (or whole) of   another's message (typically with attribution to the source) in a   reply or followup, for clarifying the context of one's response.   See the the discussion of inclusion styles under...
include2 is  `#include <disclaimer.h>'   has appeared in {sig block}s to refer to a notional `standard   disclaimer file'. 
include war is  n. Excessive multi-leveled including within a   discussion {thread}, a practice that tends to annoy readers.  In   a forum with high-traffic newsgroups, such as USENET, this can lead   to {flame}s and the urge to start a {kill file}.
indent style is  [C programmers] n. The rules one uses to indent code   in a readable fashion; a subject of {holy wars}.  There are four   major C indent styles, described below; all have the aim of   making it easier for the reader to visually track...
indent style2 is  significant variable is the placement of   `{' and `}' with respect to the statement(s) they   enclose and the guard or controlling statement (`if',   `else', `for', `while', or `do') on the block,   if any.   `K&R style' --- Named ...
indent style3 is  examples in {K&R} are formatted this way.  Also called `kernel   style' because the UNIX kernel is written in it, and the `One True   Brace Style' (abbrev. 1TBS) by its partisans.  The basic indent   shown here is eight spaces (or o...
indent style4 is  seen, but are much less common.     if (cond) {             <body>     }   `Allman style' --- Named for Eric Allman, a Berkeley hacker who   wrote a lot of the BSD utilities in it (it is sometimes called   `BSD style').  Resembles n...
indent style5 is  indent per level shown here is eight spaces, but four is just   as common (esp. in C++ code).     if (cond)     {             <body>     }   `Whitesmiths style' --- popularized by the examples that came   with Whitesmiths C, an earl...
indent style6 is  level shown here is eight spaces, but four is occasionally seen.     if (cond)             {             <body>             }   `GNU style' --- Used throughout GNU EMACS and the Free Software   Foundation code, and just about nowher...
indent style7 is  level, with `{' and `}' halfway between the   outer and inner indent levels.     if (cond)       {         <body>       }   Surveys have shown the Allman and Whitesmiths styles to be the most   common, with about equal mind shares. ...
indent style8 is  now much less common (the opening brace tends to   get lost against the right paren of the guard part in an `if'   or `while', which is a {Bad Thing}).  Defenders of 1TBS   argue that any putative gain in readability is less importa...
indent style9 is  vertical space, which enables   one to see more code on one's screen at once.  Doubtless these   issues will continue to be the subject of {holy wars}. 
index is  n. See {coefficient}.
infant mortality is  n. It is common lore among hackers that the   chances of sudden hardware failure drop off exponentially with a   machine's time since power-up (that is, until the relatively   distant time at which enough mechanical wear in I/O d...
infant mortality2 is  components has accumulated for the   machine to start going senile).  Up to half of all chip and wire   failures happen within a new system's first few weeks; such   failures are often referred to as `infant mortality' problems ...
infant mortality3 is  syndrome').  See   {bathtub curve}, {burn-in period}. 
infinite is  adj. Consisting of a large number of objects; extreme.   Used very loosely as in "This program produces infinite   garbage."  "He is an infinite loser."  The word most likely to   follow `infinite', though, is {hair} (it has been pointed...
infinite2 is  of infinite hair).  These   uses are abuses of the word's mathematical meaning.  The term   `semi-infinite', denoting an immoderately large amount of some   resource, is also heard.  "This compiler is taking a semi-infinite   amount of ...
infinite loop is  n. One that never terminates (that is, the machine   {spin}s or {buzz}es forever; the usual symptom is   {catatonia}).  There is a standard joke that has been made about   each generation's exemplar of the ultra-fast machine "The Cr...
infinite loop2 is  loop in under 2 seconds!" 
infinity is  n. 1. The largest value that can be represented in a   particular type of variable (register, memory location, data type,   whatever).  2. `minus infinity' The smallest such value, not   necessarily or even usually the simple negation of...
infinity2 is  arithmetic, infinity is   2^{N-1} - 1 but minus infinity is - (2^{N-1}),   not -(2^{N-1} - 1).  Note also that this is different from   "time T equals minus infinity", which is closer to a   mathematician's usage of infinity. 
insanely great is  adj. [Mac community, from Steve Jobs; also BSD UNIX   people via Bill Joy] Something so incredibly {elegant} that it is   imaginable only to someone possessing the most puissant of   {hacker}-natures.
INTERCAL is  /in't*r-kal/ [said by the authors to stand for   `Compiler Language With No Pronounceable Acronym'] n. A   computer language designed by Don Woods and James Lyon in 1972.   INTERCAL is purposely different from all other computer   langua...
INTERCAL2 is  written language,   being totally unspeakable.  An excerpt from the INTERCAL Reference   Manual will make the style of the language clear        It is a well-known and oft-demonstrated fact that a person whose        work is incomprehen...
INTERCAL3 is        one were to state that the simplest way to store a value of 65536        in a 32-bit INTERCAL variable is          DO 1 <- #0$#256        any sensible programmer would say that that was absurd.  Since this        is indeed the sim...
INTERCAL4 is  look        foolish in front of his boss, who would of course have happened to        turn up, as bosses are wont to do.  The effect would be no less        devastating for the programmer having been correct.   INTERCAL has many other p...
INTERCAL5 is  more unspeakable.  The Woods-Lyons implementation was actually used   by many (well, at least several) people at Princeton.  The language   has been recently reimplemented as C-INTERCAL and is consequently   enjoying an unprecedented le...
INTERCAL6 is  alt.lang.intercal newsgroup devoted to the study and ...   appreciation of the language on USENET. 
interesting is  adj. In hacker parlance, this word has strong   connotations of `annoying', or `difficult', or both.  Hackers   relish a challenge, and enjoy wringing all the irony possible out   of the ancient Chinese curse "May you live in interest...
Internet address is  n. 1. [techspeak] An absolute network address of   the form foo@bar.baz, where foo is a user name, bar is a   {sitename}, and baz is a `domain' name, possibly including   periods itself.  Contrast with {bang path}; see also {netw...
Internet address2 is  Internet machines and most UUCP   sites can now resolve these addresses, thanks to a large amount of   behind-the-scenes magic and PD software written since 1980 or so.   See also {bang path}, {domainist}.  2. More loosely, any ...
Internet address3 is  this includes {bang   path} addresses and some internal corporate and government   networks.   Reading Internet addresses is something of an art.  Here are the   four most important top-level functional Internet domains followed...
Internet address4 is  com          commercial organizations     edu          educational institutions     gov          U.S. government civilian sites     mil          U.S. military sites   Note that most of the sites in the com and edu domains are in...
Internet address5 is  the U.S. outside the functional domains     su          sites in the Soviet Union (see {kremvax}).     uk          sites in the United Kingdom   Within the us domain, there are subdomains for the fifty   states, each generally w...
Internet address6 is  abbreviation.  Within the uk domain, there is an ac subdomain for   academic sites and a co domain for commercial ones.  Other   top-level domains may be divided up in similar ways. 
interrupt is  1. [techspeak] n. On a computer, an event that   interrupts normal processing and temporarily diverts   flow-of-control through an "interrupt handler" routine.  See also   {trap}.  2. interj. A request for attention from a hacker.   Oft...
interrupt2 is  seen Joe   recently?"  See {priority interrupt}.  3. Under MS-DOS, the   term `interrupt' is nearly synonymous with `system call', because   the OS and BIOS routines are both called using the INT instruction   (see {{interrupt list, th...
interrupt3 is  bypass the OS (going directly to a BIOS interrupt) to get   reasonable performance. 
interrupt list, the is  [MS-DOS] n. The list of all known software   interrupt calls (both documented and undocumented) for IBM PCs and   compatibles, maintained and made available for free redistribution   by Ralf Brown (ralf@cs.cmu.edu).  As of ear...
interrupts locked out is  When someone is ignoring you.  In a   restaurant, after several fruitless attempts to get the waitress's   attention, a hacker might well observe "She must have interrupts   locked out".  The synonym `interrupts disabled' is...
interrupts locked out2 is  have one's interrupt mask bit set"   or "interrupts masked out" is also heard.  See also {spl}. 
iron is  n. Hardware, especially older and larger hardware of   {mainframe} class with big metal cabinets housing relatively   low-density electronics (but the term is also used of modern   supercomputers).  Often in the phrase {big iron}.  Oppose   ...
Iron Age is  n. In the history of computing, 1961--1971 --- the   formative era of commercial {mainframe} technology, when {big   iron} {dinosaur}s ruled the earth.  These began with the delivery   of the first PDP-1, coincided with the dominance of ...
Iron Age2 is  introduction of the first commercial   microprocessor (the Intel 4004) in 1971.  See also {Stone Age};   compare {elder days}. 
iron box is  [UNIX/Internet] n. A special environment set up to trap   a {cracker} logging in over remote connections long enough to be   traced.  May include a modified {shell} restricting the hacker's   movements in unobvious ways, and `bait' files...
iron box2 is  on.  See also {back door}, {firewall   machine}, {Venus flytrap}, and Clifford Stoll's account in   `The Cuckoo's Egg' of how he made and used one (see   the Bibliography).  Compare {padded cell}. 
ironmonger is  [IBM] n. Derogatory.  A hardware specialist.  Compare   {sandbender}, {polygon pusher}.
ITS is  /I-T-S/ n. 1. Incompatible Time-sharing System, an   influential but highly idiosyncratic operating system written for   PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab.  Much   AI-hacker jargon derives from ITS folklore, and to hav...
ITS2 is  instantly as an old-timer of the most   venerable sort.  ITS pioneered many important innovations,   including transparent file sharing between machines and   terminal-independent I/O.  After about 1982, most actual work was   shifted to new...
ITS3 is  essentially as a hobby and service to the hacker community.  The   shutdown of the lab's last ITS machine in May 1990 marked the end   of an era and sent old-time hackers into mourning nationwide (see   {high moby}).  The Royal Institute of ...
ITS4 is  `live' ITS site at its computer museum (right next   to the only TOPS-10 system still on the Internet), so ITS is still   alleged to hold the record for OS in longest continuous use   (however, {{WAITS}} is a credible rival for this palm).  ...
ITS5 is  operating-system perfection   worshiped by a bizarre, fervent retro-cult of old-time hackers and   ex-users (see {troglodyte}, sense 2).  ITS worshipers manage   somehow to continue believing that an OS maintained by   assembly-language hand...
ITS6 is  6-character filenames in one directory per account remains superior   to today's state of commercial art (their venom against UNIX is   particularly intense).  See also {holy wars},   {Weenix}. 
IWBNI is  // [acronym] `It Would Be Nice If'.  Compare {WIBNI}.
IYFEG is  // [USENET] Abbreviation for `Insert Your Favorite Ethnic   Group'.  Used as a meta-name when telling racist jokes on the net to   avoid offending anyone.  See {JEDR}.*J. Random /J rand'm/ n. [generalized from {J. Random Hacker}]   Arbitrar...
IYFEG2 is  often   prefixed to a noun to make a name out of it.  It means roughly   `some particular' or `any specific one'.  "Would you let   J. Random Loser marry your daughter?"  The most common uses are   `J. Random Hacker', `J. Random Loser', an...
IYFEG3 is  be allowed to {gun} down other   people?"), but it can be used simply as an elaborate version of   {random} in any sense. 
J. Random Hacker is  [MIT] /J rand'm hak'r/ n. A mythical figure   like the Unknown Soldier; the archetypal hacker nerd.  See   {random}, {Suzie COBOL}.  This may originally have been   inspired or influenced by `J. Fred Muggs', a show-biz chimpanzee...
jaggies is  /jag'eez/ n. The `stairstep' effect observable when an   edge (esp. a linear edge of very shallow or steep slope) is   rendered on a pixel device (as opposed to a vector display).
JCL is  /J-C-L/ n. 1. IBM's supremely {rude} Job Control   Language.  JCL is the script language used to control the execution   of programs in IBM's batch systems.  JCL has a very {fascist}   syntax, and some versions will, for example, {barf} if tw...
JCL2 is  programmers confronted   with JCL simply copy a working file (or card deck), changing the   file names.  Someone who actually understands and generates unique   JCL is regarded with the mixed respect one gives to someone who   memorizes the ...
JCL3 is    itself sometimes sing "Who's the breeder of the crud that mangles   you and me?  I-B-M, J-C-L, M-o-u-s-e" to the tune of the   "Mickey Mouse Club" theme to express their opinion of the   beast.  2. A comparative for any very {rude} softwar...
JCL4 is  as bad as JCL."  As with   {COBOL}, JCL is often used as an archetype of ugliness even by   those who haven't experienced it.  See also {IBM}, {fear and   loathing}. 
JEDR is  // n. Synonymous with {IYFEG}.  At one time, people in   the USENET newsgroup rec.humor.funny tended to use `JEDR'   instead of {IYFEG} or `<ethnic>'; this stemmed from a public   attempt to suppress the group once made by a loser with initi...
JEDR2 is  joke posted there.  (The   practice was {retcon}ned by the expanding these initials as   `Joke Ethnic/Denomination/Race'.)  After much sound and fury JEDR   faded away; this term appears to be doing likewise.  JEDR's only   permanent effect...
JEDR3 is  `sensitivity' arguments for censorship so thoroughly that more   recent attempts to raise them have met with immediate and   near-universal rejection. 
JFCL is  /jif'kl/, /jaf'kl/, /j*-fi'kl/ vt., obs. (alt.   `jfcl') To cancel or annul something.  "Why don't you jfcl that   out?"  The fastest do-nothing instruction on older models of the   PDP-10 happened to be JFCL, which stands for "Jump if Flag ...
JFCL2 is  something useful, but is a very   fast no-operation if no flag is specified.  Geoff Goodfellow, one   of the jargon-1 co-authors, has long had JFCL on the license plate   of his BMW.  Usage rare except among old-time PDP-10 hackers. 
jiffy is  n. 1. The duration of one tick of the system clock on the   computer (see {tick}).  Often one AC cycle time (1/60 second in   the U.S. and Canada, 1/50 most other places), but more recently   1/100 sec has become common.  "The swapper runs ...
jiffy2 is  memory management routine is executed once for   every 6 ticks of the clock, or about ten times a second.   2. Confusingly, the term is sometimes also used for a 1-millisecond   {wall time} interval.  3. Indeterminate time from a few secon...
jiffy3 is  certainly not now and   possibly never.  This is a bit contrary to the more widespread use   of the word.  Oppose {nano}. See also {Real Soon Now}. 
job security is  n. When some piece of code is written in a   particularly {obscure} fashion, and no good reason (such as time   or space optimization) can be discovered, it is often said that the   programmer was attempting to increase his job secur...
job security2 is  for maintenance).  This sour joke   seldom has to be said in full; if two hackers are looking over some   code together and one points at a section and says "job security",   the other one may just nod. 
jock is  n. 1. A programmer who is characterized by large and somewhat   brute-force programs.  See {brute force}.  2. When modified by   another noun, describes a specialist in some particular computing   area.  The compounds `compiler jock' and `sy...
jock2 is  examples of this. 
joe code is  /joh' kohd`/ n. 1. Code that is overly {tense} and   unmaintainable.  "{Perl} may be a handy program, but if you look   at the source, it's complete joe code."  2. Badly written,   possibly buggy code.   Correspondents wishing to remain ...
joe code2 is  the Lawrence Berkeley Laboratory and observed   that usage has drifted slightly; the original sobriquet `Joe code'   was intended in sense 1. 
JR[LN] is  /J-R-L/, /J-R-N/ n. The names JRL and JRN   were sometimes used as example names when discussing a kind of user   ID used under {{TOPS-10}}; they were understood to be the initials   of (fictitious) programmers named `J. Random Loser' and ...
JR[LN]2 is  example, if one said "To log   in, type log one comma jay are en" (that is, "log 1,JRN"), the   listener would have understood that he should use his own computer   ID in place of `JRN'. 
JRST is  /jerst/ [based on the PDP-10 jump instruction] v.,obs. To   suddenly change subjects, with no intention of returning to the   previous topic.  Usage rather rare except among PDP-10 diehards, and   considered silly.  See also {AOS}.
juggling eggs is  vi. Keeping a lot of {state} in your head while   modifying a program.  "Don't bother me now, I'm juggling eggs",   means that an interrupt is likely to result in the program's being   scrambled.  In the classic first-contact SF nov...
juggling eggs2 is  and Jerry Pournelle, an alien describes a   very difficult task by saying "We juggle priceless eggs in   variable gravity."  That is a very hackish use of language.  See   also {hack mode}. 
jump off into never-never land is  [from J. M. Barrie's `Peter   Pan'] v. Same as {branch to Fishkill}, but more common in   technical cultures associated with non-IBM computers that use the   term `jump' rather than `branch'.  Compare {hyperspace}.*...
jump off into never-never land2 is  used both as a   spoken word and a written suffix (like {meg} and {gig} for   megabyte and gigabyte).  See {{quantifiers}}. 
K&R is  [Kernighan and Ritchie] n. Brian Kernighan and Dennis Ritchie's   book `The C Programming Language', esp. the classic and influential   first edition (Prentice-Hall 1978; ISBN 0-113-110163-3).  Syn.   {White Book}, {Old Testament}.  See also ...
kahuna is  /k*-hoo'nuh/ [IBM from the Hawaiian title for a shaman] n.   Synonym for {wizard}, {guru}.
kamikaze packet is  n. The `official' jargon for what is more commonly   called a {Christmas tree packet}. RFC-1025, `TCP and IP Bake Off'   says     10 points for correctly being able to process a "Kamikaze"     packet (AKA nastygram, christmas tree...
kamikaze packet2 is  is, correctly handle a segment with the     maximum combination of features at once (e.g., a SYN URG PUSH     FIN segment with options and data).   See also {Chernobyl packet}. 
kangaroo code is  n. Syn. {spaghetti code}.
ken is  /ken/ n. 1. [UNIX] Ken Thompson, principal inventor of   UNIX.  In the early days he used to hand-cut distribution tapes,   often with a note that read "Love, ken".  Old-timers still use   his first name (sometimes uncapitalized, because it's...
ken2 is  third-person reference; it is widely   understood (on USENET, in particular) that without a last name   `Ken' refers only to Ken Thompson.  Similarly, Dennis without last   name means Dennis Ritchie (and he is often known as dmr).  See   als...
ken3 is  This was   originated by the Software Support group at Symbolics because the   two greatest flamers in the user community were both named Ken. 
kgbvax is  /K-G-B'vaks/ n. See {kremvax}.
kill file is  [USENET] n. (alt. `KILL file') Per-user file(s) used   by some {USENET} reading programs (originally Larry Wall's   `rn(1)') to discard summarily (without presenting for reading)   articles matching some particularly uninteresting (or u...
kill file2 is  other header lines.  Thus to add   a person (or subject) to one's kill file is to arrange for that   person to be ignored by one's newsreader in future.  By extension,   it may be used for a decision to ignore the person or subject in ...
killer micro is  [popularized by Eugene Brooks] n. A   microprocessor-based machine that infringes on mini, mainframe, or   supercomputer performance turf.  Often heard in "No one will   survive the attack of the killer micros!", the battle cry of th...
killer micro2 is  architectures.   The popularity of the phrase `attack of the killer micros' is   doubtless reinforced by the movie title "Attack Of The Killer   Tomatoes" (one of the {canonical} examples of   so-bad-it's-wonderful among hackers).  ...
killer micro3 is  micros have gone on the offensive not just   individually (in workstations) but in hordes (within massively   parallel computers). 
killer poke is  n. A recipe for inducing hardware damage on a machine   via insertion of invalid values (see {poke}) in a memory-mapped   control register; used esp. of various fairly well-known tricks   on {bitty box}es without hardware memory manag...
killer poke2 is  that can overload and trash analog   electronics in the monitor.  See also {HCF}. 
kilo- is  [SI] pref. See {{quantifiers}}.
KIPS is  /kips/ [acronym, by analogy with {MIPS} using {K}] n.   Thousands (*not* 1024s) of Instructions Per Second.  Usage   rare.
KISS Principle is  /kis' prin'si-pl/ n. "Keep It Simple, Stupid".   A maxim often invoked when discussing design to fend off   {creeping featurism} and control development complexity.   Possibly related to the {marketroid} maxim on sales   presentati...
kit is  [USENET] n. A source software distribution that has been   packaged in such a way that it can (theoretically) be unpacked and   installed according to a series of steps using only standard UNIX   tools, and entirely documented by some reasona...
kit2 is  {README file}.  The more general   term {distribution} may imply that special tools or more   stringent conditions on the host environment are required. 
klone is  /klohn/ n. See {clone}, sense 4.
kludge is  /kluhj/ n. Common (but incorrect) variant of {kluge}, q.v.
kluge is  /klooj/ [from the German `klug', clever] 1. n.  A Rube   Goldberg (or Heath Robinson) device, whether in hardware or   software.  (A long-ago `Datamation' article by Jackson Granholme   said "An ill-assorted collection of poorly matching pa...
kluge2 is  clever programming trick   intended to solve a particular nasty case in an expedient, if not   clear, manner.  Often used to repair bugs.  Often involves   {ad-hockery} and verges on being a {crock}.  In fact, the   TMRC Dictionary defined...
kluge3 is  Something that works for the wrong reason.  4. vt. To insert a   kluge into a program.  "I've kluged this routine to get around   that weird bug, but there's probably a better way."  5. [WPI] n. A   feature that is implemented in a {rude} ...
kluge4 is  encountered in the variant spelling   `kludge'.  Reports from {old fart}s are consistent that `kluge'   was the original spelling, and that `kludge' arose by mutation   sometime in the early 1970s.  Some people who encountered the word   f...
kluge5 is  reasonable but incorrect   conclusion that the word should be pronounced /kluhj/ (rhyming   with `sludge').  The result of this tangled history is a mess; in   1991, many (perhaps even most) hackers pronounce the word correctly   as /klooj...
kluge6 is  the   pronunciation drift of {mung}).  Some observers consider this   appropriate in view of its meaning. 
kluge around is  vt. To avoid a bug or difficult condition by   inserting a {kluge}.  Compare {workaround}.
kluge up is  vt. To lash together a quick hack to perform a task; this   is milder than {cruft together} and has some of the connotations   of {hack up} (note, however, that the construction `kluge on'   corresponding to {hack on} is never used).  "I...
kluge up2 is  buffer contents to a safe place." 
Knights of the Lambda Calculus is  n. A semi-mythical organization of   wizardly LISP and Scheme hackers.  The name refers to a   mathematical formalism invented by Alonzo Church, with which LISP is   intimately connected.  There is no enrollment lis...
Knights of the Lambda Calculus2 is  unclear, but one well-known LISPer has been known   to give out buttons and, in general, the *members* know who   they are.... 
Knuth is  [Donald E. Knuth's `The Art of Computer Programming']   n. Mythically, the reference that answers all questions about data   structures or algorithms.  A safe answer when you do not know   "I think you can find that in Knuth."  Contrast {li...
kremvax is  /krem-vaks/ [from the then large number of {USENET}   {VAXen} with names of the form foovax] n. Originally, a   fictitious USENET site at the Kremlin, announced on April 1, 1984   in a posting ostensibly originated there by Soviet leader ...
kremvax2 is  actually forged by Piet   Beertema as an April Fool's joke.  Other fictitious sites mentioned in the   hoax were moskvax and {kgbvax}, which now seems to be the one by   which it is remembered.  This was probably the funniest of the many...
kremvax3 is  (which has negligible   security against them), because the notion that USENET might ever   penetrate the Iron Curtain seemed so totally absurd at the time.   In fact, it was only six years later that the first genuine site in   Moscow, ...
kremvax4 is  convincing that the postings from it weren't just another prank.   Vadim Antonov (avg@hq.demos.su), the major poster from there   up to at least the end of 1990, was quite aware of all this,   referred to it frequently in his own posting...
kremvax5 is  readers by blandly asserting that he   *was* a hoax!   Eventually he even arranged to have the domain's gateway site   *named* kremvax, thus neatly turning fiction into truth   and demonstrating that the hackish sense of humor transcends...
kremvax6 is  contributed the   Russian-language material for this lexicon. --- ESR]*lace card n. obs. A {{punched card}} with all holes punched (also   called a `whoopee card').  Card readers jammed when they got to   one of these, as the resulting c...
kremvax7 is  avoid buckling inside the mechanism.  Card punches   could also jam trying to produce these things owing to power-supply   problems.  When some practical joker fed a lace card through the   reader, you needed to clear the jam with a `car...
language lawyer is  n. A person, usually an experienced or senior   software engineer, who is intimately familiar with many or most of   the numerous restrictions and features (both useful and esoteric)   applicable to one or more computer programmin...
language lawyer2 is  distinguished by the ability to show you the   five sentences scattered through a 200-plus-page manual that   together imply the answer to your question "if only you had   thought to look there".  Compare {wizard}, {legal},   {le...
languages of choice is  n. {C} and {LISP}.  Nearly every hacker   knows one of these, and most good ones are fluent in both.  Smalltalk   and Prolog are also popular in small but influential communities.   There is also a rapidly dwindling category o...
languages of choice2 is  assembler, as their language of choice.  They   often prefer to be known as {real programmer}s, and other hackers   consider them a bit odd (see "The Story of Mel, a Real Programmer"   in appendix A).  Assembler is generally ...
languages of choice3 is  appropriate for anything but {HLL} implementation,   {glue}, and a few time-critical and hardware-specific uses in systems   programs.  FORTRAN occupies a shrinking niche in scientific   programming.   Most hackers tend to fr...
languages of choice4 is  which don't give them the near-total freedom considered   necessary for hacking (see {bondage-and-discipline language}), and   to regard everything that's even remotely connected with {COBOL}   or other traditional {card wall...
larval stage is  n. Describes a period of monomaniacal concentration   on coding apparently passed through by all fledgling hackers.   Common symptoms include the perpetration of more than one 36-hour   {hacking run} in a given week; neglect of all o...
larval stage2 is  food, sleep, and personal hygiene; and   a chronic case of advanced bleary-eye.  Can last from 6 months to 2   years, the apparent median being around 18 months.  A few so   afflicted never resume a more `normal' life, but the ordea...
larval stage3 is  wizardly (as opposed to   merely competent) programmers.  See also {wannabee}.  A less   protracted and intense version of larval stage (typically lasting   about a month) may recur when one is learning a new {OS} or   programming l...
lase is  /layz/ vt. To print a given document via a laser printer.   "OK, let's lase that sucker and see if all those graphics-macro   calls did the right things."
laser chicken is  n. Kung Pao Chicken, a standard Chinese dish   containing chicken, peanuts, and hot red peppers in a spicy   pepper-oil sauce.  Many hackers call it `laser chicken' for   two reasons It can {zap} you just like a laser, and the   sau...
laser chicken2 is  beams.   In a variation on this theme, it is reported that some Australian   hackers have redesignated the common dish `lemon chicken' as   `Chernobyl Chicken'.  The name is derived from the color of the   sauce, which is considere...
laser chicken3 is  mythically, do some of the inhabitants of Chernobyl). 
laundromat is  n. Syn. {disk farm}; see {washing machine}.
LDB is  /l*'d*b/ [from the PDP-10 instruction set] vt. To extract   from the middle.  "LDB me a slice of cake, please." This usage   has been kept alive by Common LISP's function of the same name.   Considered silly.  See also {DPB}.
leaf site is  n. A machine that merely originates and reads USENET   news or mail, and does not relay any third-party traffic.  Often   uttered in a critical tone; when the ratio of leaf sites to   backbone, rib, and other relay sites gets too high, ...
leaf site2 is  Compare {backbone site}, {rib   site}. 
leak is  n. With qualifier, one of a class of resource-management bugs   that occur when resources are not freed properly after operations   on them are finished, so they effectively disappear (leak out).   This leads to eventual exhaustion as new al...
leak2 is  and {fd leak} have their own entries; one   might also refer, to, say, a `window handle leak' in a window   system. 
leaky heap is  [Cambridge] n. An {arena} with a {memory leak}.
legal is  adj. Loosely used to mean `in accordance with all the   relevant rules', esp. in connection with some set of constraints   defined by software.  "The older =+ alternate for += is no longer   legal syntax in ANSI C."  "This parser processes ...
legal2 is  the trailing linefeed."  Hackers   often model their work as a sort of game played with the   environment in which the objective is to maneuver through the   thicket of `natural laws' to achieve a desired objective.  Their   use of `legal'...
legal3 is  as by   the more conventional one having to do with courts and lawyers.   Compare {language lawyer}, {legalese}. 
legalese is  n. Dense, pedantic verbiage in a language description,   product specification, or interface standard; text that seems   designed to obfuscate and requires a {language lawyer} to   {parse} it.  Though hackers are not afraid of high infor...

factpacks/jargon-split.fact  view on Meta::CPAN

overrun2 is  machine takes longer than 2 msec to get to   service the interrupt, at least one character will be lost.  2. Also   applied to non-serial-I/O communications. "I forgot to pay my   electric bill due to mail overrun." "Sorry, I got four ph...
overrun3 is  your message to   overrun."  When {thrash}ing at tasks, the next person to make a   request might be told "Overrun!"  3. More loosely, may refer to a   {buffer overflow} not necessarily related to processing time (as   in {overrun screw}...
overrun screw is  [C programming] n. A variety of {fandango on core}   produced by scribbling past the end of an array (C has no checks   for this).  This is relatively benign and easy to spot if the array   is static; if it is auto, the result may b...
overrun screw2 is  in {heisenbug}s of the most diabolical   subtlety.  The term `overrun screw' is used esp. of scribbles   beyond the end of arrays allocated with `malloc(3)'; this   typically trashes the allocation header for the next block in the ...
overrun screw3 is  malloc and often   a core dump on the next operation to use `stdio(3)' or   `malloc(3)' itself.  See {spam}, {overrun}; see also   {memory leak}, {aliasing bug}, {precedence lossage},   {fandango on core}, {secondary damage}.*P.O.D...
overrun screw4 is  opposed to a   code section). Usage pedantic and rare.  See also {pod}. 
padded cell is  n. Where you put {luser}s so they can't hurt   anything.  A program that limits a luser to a carefully restricted   subset of the capabilities of the host system (for example, the   `rsh(1)' utility on USG UNIX).  Note that this is di...
padded cell2 is  overt and not aimed at   enforcing security so much as protecting others (and the luser)   from the consequences of the luser's boundless na"ivet'e (see   {na"ive}).  Also `padded cell environment'. 
page in is  [MIT] vi. 1. To become aware of one's surroundings again after   having paged out (see {page out}).  Usually confined to the sarcastic   comment "Eric pages in.  Film at 11."  See {film at 11}.   2. Syn. `swap in'; see {swap}.
page out is  [MIT] vi. 1. To become unaware of one's surroundings   temporarily, due to daydreaming or preoccupation.  "Can you repeat   that?  I paged out for a minute."  See {page in}.  Compare   {glitch}, {thinko}.  2. Syn. `swap out'; see {swap}.
pain in the net is  n. A {flamer}.
paper-net is  n. Hackish way of referring to the postal service,   analogizing it to a very slow, low-reliability network.  USENET   {sig block}s not uncommonly include a "Paper-Net" header just   before the sender's postal address; common variants o...
paper-net2 is  {voice-net}, {snail-mail}. 
param is  /p*-ram'/ n. Shorthand for `parameter'.  See also   {parm}; Compare {arg}, {var}.
parent message is  n. See {followup}.
parity errors is  pl.n. Little lapses of attention or (in more severe   cases) consciousness, usually brought on by having spent all night   and most of the next day hacking.  "I need to go home and crash;   I'm starting to get a lot of parity errors...
parity errors2 is  nearly always correctable transient error in   RAM hardware. 
Parkinson's Law of Data is  prov. "Data expands to fill the space   available for storage"; buying more memory encourages the use of   more memory-intensive techniques.  It has been observed over the   last 10 years that the memory usage of evolving ...
Parkinson's Law of Data2 is  18 months.  Fortunately, memory density   available for constant dollars tends to double about once every   12 months (see {Moore's Law}); unfortunately, the laws of   physics guarantee that the latter cannot continue ind...
parm is  /parm/ n. Further-compressed form of {param}.  This term   is an IBMism, and written use is almost unknown outside IBM   shops; spoken /parm/ is more widely distributed, but the synonym   {arg} is favored among hackers.  Compare {arg}, {var}...
parse is  [from linguistic terminology] vt. 1. To determine the   syntactic structure of a sentence or other utterance (close to the   standard English meaning).  "That was the one I saw you."  "I   can't parse that."  2. More generally, to understan...
parse2 is  just kretch the glims and then   aos the zotz."  "I can't parse that."  3. Of fish, to have to   remove the bones yourself.  "I object to parsing fish", means "I   don't want to get a whole fish, but a sliced one is okay".  A   `parsed fis...
parse3 is  over   whether `unparsed' should mean `bony', or also mean   `deboned'. 
Pascal is  n. An Algol-descended language designed by Niklaus Wirth   on the CDC 6600 around 1967--68 as an instructional tool for   elementary programming.  This language, designed primarily to keep   students from shooting themselves in the foot an...
Pascal2 is  general-purpose-programming point of view, was   later promoted as a general-purpose tool and, in fact, became the   ancestor of a large family of languages including Modula-2 and   {{Ada}} (see also {bondage-and-discipline language}).  T...
Pascal3 is  probably best summed up by a   devastating (and, in its deadpan way, screamingly funny) 1981 paper   by Brian Kernighan (of {K&R} fame) entitled "Why Pascal is   Not My Favorite Programming Language", which was never formally   published ...
Pascal4 is  Part of his   discussion is worth repeating here, because its criticisms are   still apposite to Pascal itself after ten years of improvement and   could also stand as an indictment of many other   bondage-and-discipline languages.  At th...
Pascal5 is  Pascal, Kernighan wrote     9. There is no escape     This last point is perhaps the most important.  The language is     inadequate but circumscribed, because there is no way to escape its     limitations.  There are no casts to disable ...
Pascal6 is  no way to replace the defective run-time     environment with a sensible one, unless one controls the compiler that     defines the "standard procedures".  The language is closed.      People who use Pascal for serious programming fall in...
Pascal7 is  impotent, it must be extended.  But each group     extends Pascal in its own direction, to make it look like whatever     language they really want.  Extensions for separate compilation,     FORTRAN-like COMMON, string data types, interna...
Pascal8 is  numbers, bit operators, etc., all add to the     utility of the language for one group but destroy its portability to     others.     I feel that it is a mistake to use Pascal for anything much beyond its     original target.  In its pure...
Pascal9 is  for teaching but not for real programming.   Pascal has since been almost entirely displaced (by {C}) from the   niches it had acquired in serious applications and systems   programming, but retains some popularity as a hobbyist language ...
patch is  1. n. A temporary addition to a piece of code, usually as a   {quick-and-dirty} remedy to an existing bug or misfeature.  A   patch may or may not work, and may or may not eventually be   incorporated permanently into the program.  Distingu...
patch2 is  that a patch is generated by more   primitive means than the rest of the program; the classical   examples are instructions modified by using the front panel   switches, and changes made directly to the binary executable of a   program ori...
patch3 is    fix}.  2. vt. To insert a patch into a piece of code.  3. [in the   UNIX world] n. A {diff} (sense 2).  4. A set of modifications to   binaries to be applied by a patching program.  IBM operating   systems often receive updates to the op...
patch4 is  hexadecimal patches.  If you have modified your OS, you   have to disassemble these back to the source.  The patches might   later be corrected by other patches on top of them (patches were   said to "grow scar tissue").  The result was of...
patch5 is  galore.   There is a classic story of a {tiger team} penetrating a secure   military computer that illustrates the danger inherent in binary   patches (or, indeed, any that you can't --- or don't --- inspect   and examine before installing...
patch6 is  any way to penetrate security of IBM's OS, so they made a   site visit to an IBM office (remember, these were official military   types who were purportedly on official business), swiped some IBM   stationery, and created a fake patch.  Th...
patch7 is  needed.  The patch was distributed at about the right   time for an IBM patch, had official stationery and all accompanying   documentation, and was dutifully installed.  The installation   manager very shortly thereafter learned something...
patch space is  n. An unused block of bits left in a binary so that   it can later be modified by insertion of machine-language   instructions there (typically, the patch space is modified to   contain new code, and the superseded code is patched to ...
patch space2 is  The widening use of HLLs has   made this term rare; it is now primarily historical outside IBM   shops.  See {patch} (sense 4), {zap} (sense 4), {hook}. 
path is  n. 1. A {bang path} or explicitly routed {{Internet   address}}; a node-by-node specification of a link between two   machines.  2. [UNIX] A filename, fully specified relative to the   root directory (as opposed to relative to the current di...
path2 is  `relative path'). This is also   called a `pathname'.  3. [UNIX and MS-DOS] The `search   path', an environment variable specifying the directories in which   the {shell} (COMMAND.COM, under MS-DOS) should look for commands.   Other, simila...
path3 is  the   C preprocessor has a `search path' it uses in looking for   `#include' files). 
pathological is  adj. 1. [scientific computation] Used of a data set   that is grossly atypical of normal expected input, esp. one that   exposes a weakness or bug in whatever algorithm one is using.  An   algorithm that can be broken by pathological...
pathological2 is  are very unlikely to occur in practice.   2. When used of test input, implies that it was purposefully   engineered as a worst case.  The implication in both senses is that   the data is spectacularly ill-conditioned or that someone...
pathological3 is  algorithm in order to come up with   such a crazy example.  3. Also said of an unlikely collection of   circumstances.  "If the network is down and comes up halfway   through the execution of that command by root, the system may   j...
pathological4 is  case."  Often used   to dismiss the case from discussion, with the implication that the   consequences are acceptable since that they will happen so   infrequently (if at all) that there is no justification for   going to extra trou...
payware is  /pay'weir/ n. Commercial software.  Oppose {shareware}   or {freeware}.
PBD is  /P-B-D/ [abbrev. of `Programmer Brain Damage'] n.  Applied   to bug reports revealing places where the program was obviously   broken by an incompetent or short-sighted programmer.  Compare   {UBD}; see also {brain-damaged}.
PC-ism is  /P-C-izm/ n. A piece of code or coding technique that   takes advantage of the unprotected single-tasking environment in   IBM PCs and the like, e.g., by busy-waiting on a hardware register,   direct diddling of screen memory, or using har...
PC-ism2 is  {vaxism}, {unixism}.  Also,   `PC-ware' n., a program full of PC-isms on a machine with a more   capable operating system.  Pejorative. 
PD is  /P-D/ adj. Common abbreviation for `public domain', applied   to software distributed over {USENET} and from Internet archive   sites.  Much of this software is not in fact public domain in   the legal sense but travels under various copyright...
PD2 is  anyone who can {snarf} a copy.  See   {copyleft}. 
pdl is  /pid'l/ or /puhd'l/ [acronym for `Push Down List'] 1. In   ITS days, the preferred MITism for {stack}.  2. Dave Lebling, one   of the co-authors of {Zork}; (his {network address} on the ITS   machines was at one time pdl@dms).  3. `Program De...
pdl2 is  formal and profoundly useless   pseudo-languages in which {management} forces one to design   programs.  {Management} often expects it to be maintained in   parallel with the code.  See also {{flowchart}}.  4. To design   using a program des...
pdl3 is  eyes won't focus beyond 2 feet." 
PDP-10 is  [Programmed Data Processor model 10] n. The machine that   made timesharing real.  It looms large in hacker folklore because   of its adoption in the mid-1970s by many university computing   facilities and research labs, including the MIT ...
PDP-102 is  the instruction set (most notably the   bit-field instructions) are still considered unsurpassed.  The 10   was eventually eclipsed by the VAX machines (descendants of the   PDP-11) when DEC recognized that the 10 and VAX product lines we...
PDP-103 is  concentrate its software   development effort on the more profitable VAX.  The machine was   finally dropped from DEC's line in 1983, following the failure of   the Jupiter Project at DEC to build a viable new model. (Some   attempts by o...
PDP-104 is  nothing; see   {Foonly}) This event spelled the doom of {{ITS}} and the   technical cultures that had spawned the original Jargon File, but   by mid-1991 it had become something of a badge of honorable   old-timerhood among hackers to hav...
PDP-105 is  {{TOPS-10}}, {{ITS}}, {AOS}, {BLT}, {DDT}, {DPB},   {EXCH}, {HAKMEM}, {JFCL}, {LDB}, {pop}, {push},   appendix A. 
PDP-20 is  n. The most famous computer that never was.  {PDP-10}   computers running the {{TOPS-10}} operating system were labeled   `DECsystem-10' as a way of differentiating them from the PDP-11.   Later on, those systems running {TOPS-20} were lab...
PDP-202 is  being the result of a lawsuit   brought against DEC by Singer, which once made a computer called   `system-10'), but contrary to popular lore there was never a   `PDP-20'; the only difference between a 10 and a 20 was the   operating syst...
PDP-203 is  all)   machines sold to run TOPS-10 were painted `Basil Blue', whereas   most TOPS-20 machines were painted `Chinese Red' (often mistakenly   called orange). 
peek is  n.,vt. (and {poke}) The commands in most microcomputer   BASICs for directly accessing memory contents at an absolute   address; often extended to mean the corresponding constructs in any   {HLL} (peek reads memory, poke modifies it).  Much ...
peek2 is  {peek}ing around memory, more   or less at random, to find the location where the system keeps   interesting stuff.  Long (and variably accurate) lists of such   addresses for various computers circulate (see {{interrupt list,   the}}).  Th...
peek3 is  highly   useful, mildly amusing, useless but neat, or (most likely) total   {lossage} (see {killer poke}). 
pencil and paper is  n. An archaic information storage and   transmission device that works by depositing smears of graphite on   bleached wood pulp.  More recent developments in paper-based   technology include improved `write-once' update devices w...
pencil and paper2 is  balls to deposit colored   pigment.  All these devices require an operator skilled at   so-called `handwriting' technique.  These technologies are   ubiquitous outside hackerdom, but nearly forgotten inside it.  Most   hackers h...
pencil and paper3 is  years of   keyboarding tend to have encouraged it to degrade further.  Perhaps   for this reason, hackers deprecate pencil-and-paper technology and   often resist using it in any but the most trivial contexts.  See   also append...
peon is  n. A person with no special ({root} or {wheel})   privileges on a computer system.  "I can't create an account on   *foovax* for you; I'm only a peon there."
percent-S is  /per-sent' es'/ [From the code in C's `printf(3)'   library function used to insert an arbitrary string argument] n. An   unspecified person or object.  "I was just talking to some   percent-s in administration."  Compare {random}.
perf is  /perf/ n. See {chad} (sense 1).  The term `perfory'   /per'f*-ree/ is also heard.
perfect programmer syndrome is  n. Arrogance; the egotistical   conviction that one is above normal human error.  Most frequently   found among programmers of some native ability but relatively   little experience (especially new graduates; their per...
perfect programmer syndrome2 is  excellent performance at solving {toy   problem}s).  "Of course my program is correct, there is no need to   test it."  "Yes, I can see there may be a problem here, but   *I'll* never type `rm -r /' while in {root}." 
Perl is  /perl/ [Practical Extraction and Report Language, a.k.a   Pathologically Eclectic Rubbish Lister] n. An interpreted language   developed by Larry Wall (lwall@jpl.nasa.gov, author of   `patch(1)' and `rn(1)') and distributed over USENET.   Su...
Perl2 is  hairier (see   {awk}).  UNIX sysadmins, who are almost always incorrigible   hackers, increasingly consider it one of the {languages of   choice}.  Perl has been described, in a parody of a famous remark   about `lex(1)', as the "Swiss-Army...
pessimal is  /pes'im-l/ [Latin-based antonym for `optimal'] adj.   Maximally bad.  "This is a pessimal situation."  Also `pessimize'   vt. To make as bad as possible.  These words are the obvious   Latin-based antonyms for `optimal' and `optimize', b...
pessimal2 is  most English dictionaries, although   `pessimize' is listed in the OED. 
pessimizing compiler is  /pes'*-miz`ing k*m-pil'r/ [antonym of   `optimizing compiler'] n. A compiler that produces object code that   is worse than the straightforward or obvious hand translation.  The   implication is that the compiler is actually ...
pessimizing compiler2 is  excessive cleverness is doing the opposite.  A   few pessimizing compilers have been written on purpose, however, as   pranks or burlesques. 
peta- is  /pe't*/ [SI] pref. See {{quantifiers}}.
PETSCII is  /pet'skee/ [abbreviation of PET ASCII] n. The variation   (many would say perversion) of the {{ASCII}} character set used by   the Commodore Business Machines PET series of personal computers   and the later Commodore C64, C16, and C128 m...
PETSCII2 is  and up-arrow (as in old-style ASCII) instead of   underscore and caret, placed the unshifted alphabet at positions   65--90, put the shifted alphabet at positions 193--218, and added   graphics characters. 
phase is  1. n. The phase of one's waking-sleeping schedule with   respect to the standard 24-hour cycle.  This is a useful concept   among people who often work at night and/or according to no fixed   schedule.  It is not uncommon to change one's ph...
phase2 is  regular basis.  "What's your phase?"  "I've   been getting in about 8 P.M. lately, but I'm going to {wrap   around} to the day schedule by Friday."  A person who is roughly   12 hours out of phase is sometimes said to be in `night mode'.  ...
phase3 is  frequently) used, meaning   you're working 9 to 5 (or, more likely, 10 to 6).)  The act of   altering one's cycle is called `changing phase'; `phase   shifting' has also been recently reported from Caltech.   2. `change phase the hard way'...
phase4 is  to get into a different phase.  3. `change phase   the easy way' To stay asleep, etc.  However, some claim that   either staying awake longer or sleeping longer is easy, and that it   is *shortening* your day or night that's hard (see {wra...
phase5 is  travelers who cross many   time-zone boundaries may be attributed to two distinct causes the   strain of travel per se, and the strain of changing phase.  Hackers   who suddenly find that they must change phase drastically in a   short per...
phase6 is  experience   something very like jet lag without traveling. 
phase of the moon is  n. Used humorously as a random parameter on which   something is said to depend.  Sometimes implies unreliability of   whatever is dependent, or that reliability seems to be dependent on   conditions nobody has been able to dete...
phase of the moon2 is  channel open in mumble mode, having the foo   switch set, and on the phase of the moon."   True story Once upon a time there was a bug that really did depend   on the phase of the moon.  There is a little subroutine that had   ...
phase of the moon3 is  MIT to calculate an   approximation to the moon's true phase.  GLS incorporated this   routine into a LISP program that, when it wrote out a file, would   print a timestamp line almost 80 characters long.  Very   occasionally t...
phase of the moon4 is  and   would overflow onto the next line, and when the file was later read   back in the program would {barf}.  The length of the first line   depended on both the precise date and time and the length of the   phase specificatio...
phase of the moon5 is  bug   literally depended on the phase of the moon!   The first paper edition of the Jargon File (Steele-1983) included   an example of one of the timestamp lines that exhibited this bug, but   the typesetter `corrected' it.  Th...
phreaking is  [from `phone phreak'] n. 1. The art and science of   cracking the phone network (so as, for example, to make free   long-distance calls).  2. By extension, security-cracking in any   other context (especially, but not exclusively, on co...
phreaking2 is  phreaking was a semi-respectable activity among   hackers; there was a gentleman's agreement that phreaking as an   intellectual game and a form of exploration was OK, but serious   theft of services was taboo.  There was significant c...
phreaking3 is  hard-core phone phreaks who   ran semi-underground networks of their own through such media as   the legendary `TAP Newsletter'.  This ethos began to break   down in the mid-1980s as wider dissemination of the techniques put   them in ...
phreaking4 is  the same   time, changes in the phone network made old-style technical   ingenuity less effective as a way of hacking it, so phreaking came   to depend more on overtly criminal acts such as stealing phone-card   numbers.  The crimes an...
phreaking5 is  turned that game very ugly.  A few old-time hackers still phreak   casually just to keep their hand in, but most these days have   hardly even heard of `blue boxes' or any of the other   paraphernalia of the great phreaks of yore. 
pico- is  [SI a quantifier   meaning * 10^-12]   pref. Smaller than {nano-}; used in the same rather loose   connotative way as {nano-} and {micro-}.  This usage is not yet   common in the way {nano-} and {micro-} are, but should be   instantly recog...
pico-2 is  {{quantifiers}},   {micro-}. 
run like a pig is  v. To run very slowly on given hardware, said of   software.  Distinct from {hog}.
pilot error is  [Sun from aviation] n. A user's misconfiguration or   misuse of a piece of software, producing apparently buglike results   (compare {UBD}).  "Joe Luser reported a bug in sendmail that   causes it to generate bogus headers."  "That's ...
ping is  [from the TCP/IP acronym `Packet INternet Groper', prob.   originally contrived to match the submariners' term for a sonar   pulse] 1. n.  Slang term for a small network message (ICMP ECHO)   sent by a computer to check for the presence and ...
ping2 is  a phone greeting.  See {ACK},   also {ENQ}.  2. vt. To verify the presence of.  3. vt. To get   the attention of.  From the UNIX command `ping(1)' that sends   an ICMP ECHO packet to another host.  4. vt. To send a message to   all members ...
ping3 is  order   to verify that everybody's addresses are reachable).  "We haven't   heard much of anything from Geoff, but he did respond with an ACK   both times I pinged jargon-friends."   The funniest use of `ping' to date was described in Janua...
ping4 is  comp.sys.next.  He was trying   to isolate a faulty cable segment on a TCP/IP Ethernet hooked up to   a NeXT machine, and got tired of having to run back to his console   after each cabling tweak to see if the ping packets were getting   th...
ping5 is  on the NeXT, then   wrote a script that repeatedly invoked `ping(8)', listened for   an echo, and played back the recording on each returned packet.   Result?  A program that caused the machine to repeat, over and   over, "Ping ... ping ......
ping6 is  turned the volume to maximum, ferreted through   the building with one ear cocked, and found a faulty tee connector   in no time. 
Pink-Shirt Book is  `The Peter Norton Programmer's Guide to the IBM   PC'.  The original cover featured a picture of Peter Norton with a   silly smirk on his face, wearing a pink shirt.  Perhaps in   recognition of this usage, the current edition has...
Pink-Shirt Book2 is  pink shirt.  See also {{book titles}}. 
PIP is  /pip/ [Peripheral Interchange Program] vt.,obs. To copy; from   the program PIP on CP/M, RSX-11, RSTS/E, and OS/8 (derived from a   utility on the PDP-6) that was used for file copying (and in OS/8   and RT-11 for just about every other file ...
PIP2 is  that when the program was originated, during the   development of the PDP-6 in 1963, it was called ATLATL (`Anything,   Lord, to Anything, Lord'). 
pistol is  [IBM] n. A tool that makes it all too easy for you to   shoot yourself in the foot.  "UNIX `rm *' makes such a nice   pistol!"
pizza box is  [Sun] n. The largish thin box housing the electronics   in (especially Sun) desktop workstations, so named because of its   size and shape and the dimpled pattern that looks like air holes.   Two meg single-platter removable disk packs ...
pizza box2 is  they were stuck into was referred to as a pizza   oven.  It's an index of progress that in the old days just the disk   was pizza-sized, while now the entire computer is. 
ANSI standard pizza is  /an'see stan'd*rd peet'z*/ [CMU] Pepperoni   and mushroom pizza.  Coined allegedly because most pizzas ordered   by CMU hackers during some period leading up to mid-1990 were of   that flavor.  See also {rotary debugger}; comp...
plain-ASCII is  /playn-as'kee/ Syn. {flat-ASCII}.
plan file is  [UNIX] n. On systems that support {finger}, the   `.plan' file in a user's home directory is displayed when the user   is fingered.  This feature was originally intended to be used to   keep potential fingerers apprised of one's locatio...

factpacks/jargon-split.fact  view on Meta::CPAN

unixism3 is  assumption that freshly allocated memory is zeroed; and the assumption   that fragmentation problems won't arise from never `free()'ing   memory.  Compare {vaxocentrism}; see also {New Jersey}. 
unswizzle is  v. See {swizzle}.
unwind the stack is  vi. 1. [techspeak] During the execution of a   procedural language, one is said to `unwind the stack' from a   called procedure up to a caller when one discards the stack frame   and any number of frames above it, popping back up...
unwind the stack2 is  this is done with   `longjmp'/`setjmp', in LISP with `throw/catch'.   See also {smash the stack}.  2. People can unwind the stack as   well, by quickly dealing with a bunch of problems "Oh heck, let's   do lunch.  Just a second ...
unwind-protect is  [MIT from the name of a LISP operator] n. A task you   must remember to perform before you leave a place or finish a   project.  "I have an unwind-protect to call my advisor."
up is  adj. 1. Working, in order.  "The down escalator is up."   Oppose {down}.  2. `bring up' vt. To create a working   version and start it.  "They brought up a down system."    3. `come up' vi. To become ready for production use.
upload is  /uhp'lohd/ v. 1. [techspeak] To transfer programs or data   over a digital communications link from a smaller or peripheral   `client' system to a larger or central `host' one.  A transfer in   the other direction is, of course, called a {...
upload2 is  ground-to-space comm under that entry).   2. [speculatively] To move the essential patterns and algorithms   that make up one's mind from one's brain into a computer.  Only   those who are convinced that such patterns and algorithms captu...
upload3 is  prospect with   gusto. 
upthread is  adv. Earlier in the discussion (see {thread}), i.e.,   `above'. "As Joe pointed out upthread, ..."  See also   {followup}.
urchin is  n. See {munchkin}.
USENET is  /yoos'net/ or /yooz'net/ [from `Users' Network'] n.   A distributed {bboard} (bulletin board) system supported mainly   by UNIX machines.  Originally implemented in 1979-1980 by Steve   Bellovin, Jim Ellis, Tom Truscott, and Steve Daniel a...
USENET2 is  become international in scope   and is now probably the largest decentralized information utility   in existence.  As of early 1991, it hosts well over   700 {newsgroup}s and an average of 16 megabytes (the equivalent   of several thousan...
USENET3 is    discussion, chatter, and {flamage} every day. 
user is  n. 1. Someone doing `real work' with the computer, using   it as a means rather than an end.  Someone who pays to use a   computer.  See {real user}.  2. A programmer who will believe   anything you tell him.  One who asks silly questions.  ...
user2 is  is true that users ask   questions (of necessity).  Sometimes they are thoughtful or deep.   Very often they are annoying or downright stupid, apparently   because the user failed to think for two seconds or look in the   documentation befo...
user3 is  3. Someone who uses a program from the outside, however skillfully,   without getting into the internals of the program.  One who reports   bugs instead of just going ahead and fixing them.   The general theory behind this term is that ther...
user4 is  program there are implementors (hackers)   and {luser}s.  The users are looked down on by hackers to a mild   degree because they don't understand the full ramifications of the   system in all its glory.  (The few users who do are known as ...
user5 is  a skilled hacker   may be a user with respect to some program he himself does not   hack.  A LISP hacker might be one who maintains LISP or one who   uses LISP (but with the skill of a hacker).  A LISP user is one who   uses LISP, whether s...
user6 is  between the two terms; the subtle distinctions must be resolved by   context. 
user-friendly is  adj. Programmer-hostile.  Generally used by hackers in   a critical tone, to describe systems that hold the user's hand so   obsessively that they make it painful for the more experienced and   knowledgeable to get any work done.  S...
user-friendly2 is  {Macintrash}, {user-obsequious}. 
user-obsequious is  adj. Emphatic form of {user-friendly}.  Connotes   a system so verbose, inflexible, and determinedly simple-minded   that it is nearly unusable.  "Design a system any fool can use and   only a fool will want to use it."  See {WIMP...
USG UNIX is  /U-S-G yoo'niks/ n. Refers to AT&T UNIX   commercial versions after {Version 7}, especially System III and   System V releases 1, 2, and 3.  So called because during most of   the life-span of those versions AT&T's support crew was calle...
UTSL is  // [UNIX] n. On-line acronym for `Use the Source, Luke' (a   pun on Obi-Wan Kenobi's "Use the Force, Luke!" in `Star   Wars') --- analogous to {RTFM} but more polite.  This is a   common way of suggesting that someone would be best off readi...
UTSL2 is  feature is causing confusion,   rather than making yet another futile pass through the manuals or   broadcasting questions that haven't attracted {wizard}s to   answer them.  In theory, this is appropriately directed only at   associates of...
UTSL3 is  practice,   bootlegs of UNIX source code (made precisely for reference   purposes) are so ubiquitous that one may utter this at almost   anyone on {the network} without concern.  In the near future   (this written in 1991) source licenses m...
UTSL4 is  recent release of the Mach 3.0 microkernal,   given the continuing efforts of the {GNU} project, and with the   4.4BSD release on the horizon, complete free source code for   UNIX-clone toolsets and kernels should soon be widely available. 
UUCPNET is  n. The store-and-forward network consisting of all the   world's connected UNIX machines (and others running some clone of   the UUCP (UNIX-to-UNIX CoPy) software).  Any machine reachable only   via a {bang path} is on UUCPNET.  See {netw...
UUCPNET2 is  permutation of ADV (i.e.,   {ADVENT}), used to avoid a particular {admin}'s continual   search-and-destroy sweeps for the game] n. A leisure-time activity   of certain hackers involving the covert exploration of the `secret'   parts of l...
UUCPNET3 is  elevators,   maintenance crawlways, steam tunnels, and the like.  A few go so   far as to learn locksmithing in order to synthesize vadding keys.   The verb is `to vad' (compare {phreaking}).   The most extreme and dangerous form of vadd...
UUCPNET4 is  surfing', a sport played by wrasslin'   down a thousand-pound elevator car with a 3-foot piece of   string, and then exploiting this mastery in various stimulating   ways (such as elevator hopping, shaft exploration, rat-racing, and   th...
UUCPNET5 is  try this at home!    See also {hobbit} (sense 2). 
vanilla is  [from the default flavor of ice cream in the U.S.] adj.   Ordinary {flavor}, standard.  When used of food, very often does   not mean that the food is flavored with vanilla extract!  For   example, `vanilla wonton soup' means ordinary won...
vanilla2 is  soup.  Applied to hardware and   software, as in "Vanilla Version 7 UNIX can't run on a   vanilla 11/34."  Also used to orthogonalize chip nomenclature; for   instance, a 74V00 means what TI calls a 7400, as distinct from   a 74LS00, etc...
vanilla3 is  the   latter means `default', whereas vanilla simply means `ordinary'.   For example, when hackers go on a {great-wall}, hot-and-sour   wonton soup is the {canonical} wonton soup to get (because that   is what most of them usually order)...
vannevar is  /van'*-var/ n. A bogus technological prediction or   a foredoomed engineering concept, esp. one that fails by   implicitly assuming that technologies develop linearly,   incrementally, and in isolation from one another when in fact the  ...
vannevar2 is  revolutions are   common, and competition is the rule.  The prototype was Vannevar   Bush's prediction of `electronic brains' the size of the Empire   State Building with a Niagara-Falls-equivalent cooling system for   their tubes and r...
vannevar3 is  effect had   already been demonstrated.  Other famous vannevars have included   magnetic-bubble memory, LISP machines, {videotex}, and a paper from   the late 1970s that computed a purported ultimate limit on areal   density for ICs tha...
vannevar4 is  of 5 years later. 
vaporware is  /vay'pr-weir/ n. Products announced far in advance of   any release (which may or may not actually take place).
var is  /veir/ or /var/ n. Short for `variable'.  Compare {arg},   {param}.
VAX is  /vaks/ n. 1. [from Virtual Address eXtension] The most   successful minicomputer design in industry history, possibly   excepting its immediate ancestor, the PDP-11.  Between its release   in 1978 and its eclipse by {killer micro}s after abou...
VAX2 is  favorite machine of them all, esp.   after the 1982 release of 4.2 BSD UNIX (see {BSD}).  Esp.   noted for its large, assembler-programmer-friendly instruction set   --- an asset that became a liability after the RISC revolution.   2. A majo...
VAX3 is  here because   its alleged sales pitch, "Nothing sucks like a VAX!" became a   sort of battle-cry of RISC partisans.  Ironically, the slogan was   *not* actually used by the Vax vacuum-cleaner people, but was   actually that of a rival brand...
VAX4 is  an...").  It is claimed, however, that DEC actually   entered a cross-licensing deal with the vacuum-Vax people that   allowed them to market VAX computers in the U.K. in return for not   challenging the vacuum cleaner trademark in the U.S. 
VAXectomy is  /vak-sek't*-mee/ [by analogy with `vasectomy'] n. A   VAX removal.  DEC's Microvaxen, especially, are much slower than   newer RISC-based workstations such as the SPARC.  Thus, if one knows   one has a replacement coming, VAX removal ca...
VAXen is  /vak'sn/ [from `oxen', perhaps influenced by `vixen'] n.   (alt. `vaxen') The plural canonically used among hackers for the   DEC VAX computers.  "Our installation has four PDP-10s and twenty   vaxen."  See {boxen}.
vaxherd is  n. /vaks'herd/ [from `oxherd'] A VAX operator.
vaxism is  /vak'sizm/ n. A piece of code that exhibits   {vaxocentrism} in critical areas.  Compare {PC-ism},   {unixism}.
vaxocentrism is  /vak`soh-sen'trizm/ [analogy with   `ethnocentrism'] n. A notional disease said to afflict   C programmers who persist in coding according to certain assumptions that are    valid (esp. under UNIX) on {VAXen} but false elsewhere. Amo...
vaxocentrism2 is  validly be accused of vaxocentrism   even if he or she has never seen a VAX.  Some of these assumptions   (esp. 2--5) were valid on the PDP-11, the original C machine, and   became endemic years before the VAX.  The terms `vaxocentr...
vaxocentrism3 is  have been used synonymously. 
vdiff is  /vee'dif/ v.,n. Visual diff.  The operation of finding   differences between two files by {eyeball search}.  The term   `optical diff' has also been reported.  See {diff}.
veeblefester is  /vee'b*l-fes`tr/ [from the "Born Loser"   comix via Commodore; prob. originally from `Mad' Magazine's   `Veeblefeetzer' parodies ca. 1960] n. Any obnoxious person engaged   in the (alleged) professions of marketing or management.  An...
Venus flytrap is  [after the insect-eating plant] n. See {firewall   machine}.
verbage is  /ver'b*j/ n. A deliberate misspelling and mispronunciation of   {verbiage} that assimilates it to the word `garbage'.  Compare   {content-free}.  More pejorative than `verbiage'.
verbiage is  n. When the context involves a software or hardware   system, this refers to {{documentation}}.  This term borrows the   connotations of mainstream `verbiage' to suggest that the   documentation is of marginal utility and that the motive...
verbiage2 is  with the ostensible subject. 
Version 7 is  alt. V7 /vee' se'vn/ n. The 1978 unsupported release of   {{UNIX}} ancestral to all current commercial versions.  Before   the release of the POSIX/SVID standards, V7's features were often   treated as a UNIX portability baseline.  See ...
Version 72 is  old-timers impatient with commercialization and   kernel bloat still maintain that V7 was the Last True UNIX. 
vgrep is  /vee'grep/ v.,n. Visual grep.  The operation of finding   patterns in a file optically rather than digitally.  See {grep};   compare {vdiff}.
vi is  /V-I/, *not* /vi/ and *never* /siks/ [from   `Visual Interface'] n. A screen editor crufted together by Bill Joy   for an early {BSD} version.  Became the de facto standard UNIX   editor and a nearly undisputed hacker favorite until the rise o...
vi2 is  frustrate new users no end,   as it will neither take commands while expecting input text nor   vice versa, and the default setup provides no indication of which   mode one is in (one correspondent accordingly reports that he has   often hear...
vi3 is  Nevertheless it   is still widely used (about half the respondents in a 1991 USENET   poll preferred it), and even EMACS fans often resort to it as a   mail editor and for small editing jobs (mainly because it starts up   faster than bulky EM...
videotex is  n. obs. An electronic service offering people the   privilege of paying to read the weather on their television screens   instead of having somebody read it to them for free while they   brush their teeth.  The idea bombed everywhere it ...
videotex2 is  time videotex was practical   the installed base of personal computers could hook up to   timesharing services and do the things for which videotex might   have been worthwhile better and cheaper.  Videotex planners badly   overestimate...
videotex3 is    computer and the cost of local intelligence at the user's end.   Like the {gorilla arm} effect, this has been a cautionary tale   to hackers ever since.  See also {vannevar}. 
virgin is  adj. Unused; pristine; in a known initial state.  "Let's   bring up a virgin system and see if it crashes again."  (Esp.   useful after contracting a {virus} through {SEX}.)  Also, by   extension, buffers and the like within a program that...
virtual is  [via the technical term `virtual memory', prob. from the   term `virtual image' in optics] adj. 1. Common alternative to   {logical}.  2. Simulated; performing the functions of something   that isn't really there.  An imaginative child's ...
virtual Friday is  n. The last day before an extended weekend, if   that day is not a `real' Friday.  For example, the U.S. holiday   Thanksgiving is always on a Thursday.  The next day is often also   a holiday or taken as an extra day off, in which...
virtual Friday2 is  Friday (and Thursday is a virtual Saturday,   as is Friday).  There are also `virtual Mondays' that are   actually Tuesdays, after the three-day weekends associated with many   national holidays in the U.S. 
virtual reality is  n. 1. Computer simulations that use 3-D graphics   and devices such as the Dataglove to allow the user to interact   with the simulation.  See {cyberspace}.  2. A form of network   interaction incorporating aspects of role-playing...
virtual reality2 is  comedy, and `true confessions'   magazines.  In a virtual reality forum (such as USENET's   alt.callahans newsgroup or the {MUD} experiments on Internet),   interaction between the participants is written like a shared novel   co...
virtual reality3 is  that may be   personae utterly unlike the people who write them, and common   `background characters' manipulable by all parties.  The one   iron law is that you may not write irreversible changes to a   character without the con...
virtual reality4 is  anything goes.  See {bamf}, {cyberspace}. 
virus is  [from the obvious analogy with biological viruses, via SF]   n. A cracker program that searches out other programs and `infects'   them by embedding a copy of itself in them, so that they become   {Trojan Horse}s.  When these programs are e...
virus2 is  thus propagating the `infection'.  This   normally happens invisibly to the user.  Unlike a {worm}, a   virus cannot infect other computers without assistance.  It is   propagated by vectors such as humans trading programs with their   fri...
virus3 is  propagate   itself and then allow the program to run normally.  Usually,   however, after propagating silently for a while, it starts doing   things like writing cute messages on the terminal or playing   strange tricks with your display (...
virus4 is  Many nasty viruses, written by particularly   perversely minded {cracker}s, do irreversible damage, like   nuking all the user's files.   In the 1990s, viruses have become a serious problem, especially   among IBM PC and Macintosh users (t...
virus5 is  viruses to spread easily, even infecting the   operating system).  The production of special anti-virus software   has become an industry, and a number of exaggerated media reports   have caused outbreaks of near hysteria among users; many...
virus6 is  doesn't work as   they had expected on virus attacks.  Accordingly, this sense of   `virus' has passed not only into techspeak but into also popular   usage (where it is often incorrectly used to denote a {worm} or   even a {Trojan horse})...
visionary is  n. 1. One who hacks vision, in the sense of an   Artificial Intelligence researcher working on the problem of   getting computers to `see' things using TV cameras.  (There isn't   any problem in sending information from a TV camera to a...
visionary2 is  computer be programmed to make use of   the camera information?  See {SMOP}, {AI-complete}.)  2. [IBM]   One who reads the outside literature.  At IBM, apparently, such a   penchant is viewed with awe and wonder. 
VMS is  /V-M-S/ n. DEC's proprietary operating system for its VAX   minicomputer; one of the seven or so environments that loom largest   in hacker folklore.  Many UNIX fans generously concede that VMS   would probably be the hacker's favorite commer...
VMS2 is  this makes VMS fans furious.  One major   hacker gripe with VMS concerns its slowness --- thus the following   limerick        There once was a system called VMS        Of cycles by no means abstemious.             It's chock-full of hacks  ...
VMS3 is  my poor stomach all squeamious.                                         --- The Great Quux   See also {VAX}, {{TOPS-10}}, {{TOPS-20}}, {{UNIX}}, {runic}. 
voice is  vt. To phone someone, as opposed to emailing them or   connecting in talk mode.  "I'm busy now; I'll voice you later."
voice-net is  n. Hackish way of referring to the telephone system,   analogizing it to a digital network.  USENET {sig block}s not   uncommonly include the sender's phone next to a "Voice" or   "Voice-Net" header; common variants of this are "Voicene...
voodoo programming is  [from George Bush's "voodoo economics"] n.   The use by guess or cookbook of an {obscure} or {hairy} system,   feature, or algorithm that one does not truly understand.  The   implication is that the technique may not work, and...
voodoo programming2 is  Almost synonymous with {black magic},   except that black magic typically isn't documented and   *nobody* understands it.  Compare {magic}, {deep magic},   {heavy wizardry}, {rain dance}, {cargo cult programming},   {wave a de...
VR is  // [MUD] n. On-line abbrev for {virtual reality}, as   opposed to {RL}.
Vulcan nerve pinch is  n. [from the old "Star Trek" TV series via   Commodore Amiga hackers] The keyboard combination that forces a   soft-boot or jump to ROM monitor (on machines that support such a   feature).  On many micros this is Ctrl-Alt-Del; ...
Vulcan nerve pinch2 is  <Cmd>-<Power switch>!  Also called   {three-finger salute}.  Compare {quadruple bucky}. 
vulture capitalist is  n. Pejorative hackerism for `venture   capitalist', deriving from the common practice of pushing contracts   that deprive inventors of control over their own innovations and   most of the money they ought to have made from them...
vulture capitalist2 is  Fudd's immortal   line "You wascawwy wabbit!"] n. 1. A legendary early hack   reported on a System/360 at RPI and elsewhere around 1978.  The   program would make two copies of itself every time it was run,   eventually crashi...
vulture capitalist3 is   includes infinite self-replication but is not a {virus} or   {worm}.  See also {cookie monster}. 
WAITS is  /wayts/ n. The mutant cousin of {{TOPS-10}} used on a   handful of systems at {{SAIL}} up to 1990.  There was never an   `official' expansion of WAITS (the name itself having been arrived   at by a rather sideways process), but it was frequ...
WAITS2 is  ITS'.  Though WAITS was less visible   than ITS, there was frequent exchange of people and ideas between   the two communities, and innovations pioneered at WAITS exerted   enormous indirect influence.  The early screen modes of {EMACS},  ...
WAITS3 is  `E' editor --- one   of a family of editors that were the first to do `real-time   editing', in which the editing commands were invisible and where   one typed text at the point of insertion/overwriting.  The modern   style of multi-region...
WAITS4 is  and WAITS alumni at XEROX PARC and elsewhere played major roles in   the developments that led to the XEROX Star, the Macintosh, and the   Sun workstations.  {Bucky bits} were also invented there ---   thus, the ALT key on every IBM PC is ...
WAITS5 is  seldom duplicated elsewhere was a news-wire interface   that allowed WAITS hackers to read, store, and filter AP and UPI   dispatches from their terminals; the system also featured a   still-unusual level of support for what is now called ...
WAITS6 is  and video signals to be switched   to programming terminals. 
waldo is  /wol'doh/ [From Robert A. Heinlein's story "Waldo"]   1. A mechanical agent, such as a gripper arm, controlled by a human   limb.  When these were developed for the nuclear industry in the   mid-1940s they were named after the invention des...
waldo2 is  wrote in 1942.  Now known by the more   generic term `telefactoring', this technology is of intense   interest to NASA for tasks like space station maintenance.  2. At   Harvard (particularly by Tom Cheatham and students), this is used   i...
waldo3 is  and general   nonsense word.  See {foo}, {bar}, {foobar}, {quux}. 
walk is  n.,vt. Traversal of a data structure, especially an array or   linked-list data structure in {core}.  See also {codewalker},   {silly walk}, {clobber}.
walk off the end of is  vt. To run past the end of an array, list, or      medium after stepping through it --- a good way to land in trouble.   Often the result of an {off-by-one error}.  Compare   {clobber}, {roach}, {smash the stack}.
walking drives is  n. An occasional failure mode of magnetic-disk   drives back in the days when they were huge, clunky {washing   machine}s.  Those old {dinosaur} parts carried terrific angular   momentum; the combination of a misaligned spindle or ...
walking drives2 is  with the floor could cause them to   `walk' across a room, lurching alternate corners forward a couple   of millimeters at a time.  There is a legend about a drive that   walked over to the only door to the computer room and jamme...
walking drives3 is  wall in order to get at   it!  Walking could also be induced by certain patterns of drive   access (a fast seek across the whole width of the disk, followed by   a slow seek in the other direction).  Some bands of old-time   hacke...
walking drives4 is  patterns that   would do this to particular drive models and held disk-drive races. 
wall is  [WPI] interj. 1. An indication of confusion, usually spoken   with a quizzical tone  "Wall??"  2. A request for further   explication.  Compare {octal forty}.   It is said that "Wall?" really came from `like talking to a   blank wall'.  It w...
wall2 is  you   had carefully answered a question, the questioner stared at you   blankly, clearly having understood nothing that was explained.  You   would then throw out a "Hello, wall?" to elicit some sort of   response from the questioner.  Late...
wall3 is  themselves. 
wall follower is  n. A person or algorithm that compensates for lack   of sophistication or native stupidity by efficiently following some   simple procedure shown to have been effective in the past.  Used of   an algorithm, this is not necessarily p...
wall follower2 is  the winning robot in an early AI contest   (named, of course, after the cocktail).  Harvey successfully solved   mazes by keeping a `finger' on one wall and running till it came   out the other end.  This was inelegant, but it was ...
wall follower3 is  simply-connected mazes --- and, in fact,   Harvey outperformed more sophisticated robots that tried to   `learn' each maze by building an internal representation of it.   Used of humans, the term *is* pejorative and implies an   un...
wall follower4 is  See also {code   grinder}, {droid}. 
wall time is  n. (also `wall clock time') 1. `Real world' time (what   the clock on the wall shows), as opposed to the system clock's idea   of time.  2. The real running time of a program, as opposed to the   number of {clocks} required to execute i...
wall time2 is  differ, as no one program gets all the   {clocks}, and on multiprocessor systems with good thread support   one may get more processor clocks than real-time clocks). 



( run in 2.156 seconds using v1.01-cache-2.11-cpan-39bf76dae61 )