Amethyst

 view release on metacpan or  search on metacpan

factpacks/Linux.fact  view on Meta::CPAN

leak => <reply> $who, Simple sysadm shell script for finding which process is leaking memory.. URL: http://www.galstar.com/~jmccorm/leak
LeakTracer => <reply> $who, Trace memory leaks in C++ programs. URL: http://www.andreasen.org/LeakTracer/
Leaky => <reply> $who, a memory leak tracer. URL: http://lxr.mozilla.org/mozilla/source/tools/leaky/leaky.html
LeanWeb => <reply> $who, HTTP proxy for removing user-defined parts from Web pages.. URL: http://www.clasohm.com/leanweb/
LEAP RDBMS => <reply> $who, A free Relational Database Management System. URL: http://www.xnot.com/leap/
LED Counter => <reply> $who, All purpose counter. URL: http://gehtnix.fernuni-hagen.de/LED-Counter/index.html
Ledsm => <reply> $who, System monitor that displays CPU load and free memory using the keyboard leds. URL: http://personal5.iddeo.es/jajs/ledsm.html
Leech => <reply> $who, Recursive download automation tool. URL: http://nostamp.dynip.com/kars/phplib/projects/leech.phtml
Legato Networker => <reply> $who, Linux client to commercial backup server. URL: http://feral.com/NetWorker.html
legdoc => <reply> $who, C source code documentor. URL: http://www.moodfarm.demon.co.uk/download/index.html#legdoc
Legend => <reply> $who, A Swedish BBS/MUD system. URL: http://www.legend.se.eu.org/
LEM => <reply> $who, A small Linux/X11 distribution for embedding apps.. URL: http://linux-embedded.com
Lemon => <reply> $who, Modern parser generator. URL: http://www.hwaci.com/sw/lemon/index.html
LeoCAD => <reply> $who, CAD application that uses plastic bricks. URL: http://www.geocities.com/Colosseum/3479/leocad.htm
less => <reply> $who, . URL: http://www.flash.net/~marknu/less/
Lesstif => <reply> $who, LGPL'd re-implementation of Motif. URL: http://www.lesstif.org/
LexiMUD => <reply> $who, C++ MUD Codebase for Sci-fi MUDs, based on CircleMUD. URL: http://avp.dhs.org/leximud/
Lexmark 1100 driver for Linux => <reply> $who, Converts raw ppm files to the Lexmark 1100 printer protocol.. URL: http://209.233.17.85/lexmark/
Lexmark 2070 B/W Linux Driver => <reply> $who, B/W 300dpi printer driver (filter) for the Lexmark 2070 inkjet printer. URL: http://www.studet.fh-muenster.de/~kornblum/Lexmark2070.html
Lexmark 5700/7000 Printer Driver => <reply> $who, Lexmark 5700/7000 Colorjet Printer Driver for Linux. URL: http://bimbo.fjfi.cvut.cz/~paluch/l7kdriver/
Lexmark2070 driver => <reply> $who, Driver for Lexmark 2070 Inkjet Printer. URL: http://www.studet.fh-muenster.de/~kornblum/Lexmark2070.html

factpacks/jargon-split.fact  view on Meta::CPAN

bit bang is  n. Transmission of data on a serial line, when   accomplished by rapidly tweaking a single output bit at the   appropriate times.  The technique is a simple   loop with eight OUT and SHIFT instruction pairs for each byte.   Input is more...
bit bang2 is  and output   at the same time) is one way to separate the real hackers from the   {wannabee}s.   Bit bang was used on certain early models of Prime computers,   presumably when UARTs were too expensive, and on archaic Z80 micros   with ...
bit bang3 is  instance of the   {cycle of reincarnation}, this technique is now (1991) coming   back into use on some RISC architectures because it consumes such   an infinitesimal part of the processor that it actually makes sense   not to have a UA...
bit bashing is  n. (alt. `bit diddling' or {bit twiddling}) Term   used to describe any of several kinds of low-level programming   characterized by manipulation of {bit}, {flag}, {nybble},   and other smaller-than-character-sized pieces of data; the...
bit bashing2 is  encryption algorithms, checksum   and error-correcting codes, hash functions, some flavors of   graphics programming (see {bitblt}), and assembler/compiler code   generation.  May connote either tedium or a real technical   challenge...
bit bashing3 is  decoding for   the new tape driver looks pretty solid but the bit-bashing for the   control registers still has bugs."  See also {bit bang},   {mode bit}. 
bit bucket is  n. 1. The universal data sink (originally, the   mythical receptacle used to catch bits when they fall off the end   of a register during a shift instruction).  Discarded, lost, or   destroyed data is said to have `gone to the bit buck...
bit bucket2 is  {/dev/null}.  Sometimes amplified as `the Great   Bit Bucket in the Sky'.  2. The place where all lost mail and news   messages eventually go.  The selection is performed according to   {Finagle's Law}; important mail is much more lik...
bit bucket3 is  mail, which has an almost 100% probability   of getting delivered.  Routing to the bit bucket is automatically   performed by mail-transfer agents, news systems, and the lower   layers of the network.  3. The ideal location for all un...
bit bucket4 is  article to the bit bucket."   Such a request is guaranteed to overflow one's mailbox with flames.   4. Excuse for all mail that has not been sent.  "I mailed you   those figures last week; they must have ended in the bit bucket."   Co...
bit bucket5 is  in jest.  It is based on the fanciful   notion that bits are objects that are not destroyed but only   misplaced.  This appears to have been a mutation of an earlier term   `bit box', about which the same legend was current; old-time ...
bit bucket6 is  told that when the CPU   stored bits into memory it was actually pulling them `out of the   bit box'.  See also {chad box}.   Another variant of this legend has it that, as a consequence of the   `parity preservation law', the number ...
bit bucket7 is  equal the number of 0 bits.  Any imbalance results in   bits filling up the bit bucket.  A qualified computer technician   can empty a full bit bucket as part of scheduled maintenance. 
bit decay is  n. See {bit rot}.  People with a physics background   tend to prefer this one for the analogy with particle decay.  See   also {computron}, {quantum bogodynamics}.
bit rot is  n. Also {bit decay}.  Hypothetical disease the existence   of which has been deduced from the observation that unused programs   or features will often stop working after sufficient time has   passed, even if `nothing has changed'.  The t...
bit rot2 is  were radioactive.  As time passes, the   contents of a file or the code in a program will become   increasingly garbled.   There actually are physical processes that produce such effects   (alpha particles generated by trace radionuclide...
bit rot3 is  change the contents of a computer memory   unpredictably, and various kinds of subtle media failures can   corrupt files in mass storage), but they are quite rare (and   computers are built with error-detecting circuitry to compensate   ...
bit rot4 is  hackers that cosmic   rays are among the causes of such events turns out to be a myth;   see the {cosmic rays} entry for details.   The term {software rot} is almost synonymous.  Software rot is   the effect, bit rot the notional cause. 
bit twiddling is  n. 1. (pejorative) An exercise in {tuning} in   which incredible amounts of time and effort go to produce little   noticeable improvement, often with the result that the code has   become incomprehensible.  2. Aimless small modifica...
bit twiddling2 is  goal.  3. Approx. syn. for {bit   bashing}; esp. used for the act of frobbing the device control   register of a peripheral in an attempt to get it back to a known   state. 
bit-paired keyboard is  n. obs. (alt. `bit-shift keyboard') A   non-standard keyboard layout that seems to have originated with   the Teletype ASR-33 and remained common for several years on early   computer equipment.  The ASR-33 was a mechanical de...
bit-paired keyboard2 is  generate the character codes from   keystrokes was by some physical linkage.  The design of the ASR-33   assigned each character key a basic pattern that could be modified   by flipping bits if the SHIFT or the CTRL key was p...

factpacks/jargon-split.fact  view on Meta::CPAN

crank is  [from automotive slang] vt. Verb used to describe the   performance of a machine, especially sustained performance.  "This   box cranks (or, cranks at) about 6 {megaflops}, with a burst mode   of twice that on vectorized operations."
crash is  1. n. A sudden, usually drastic failure.  Most often said   of the {system} (q.v., sense 1), sometimes of magnetic disk   drives.  "Three {luser}s lost their files in last night's disk   crash."  A disk crash that involves the read/write he...
crash2 is  and scraping off the oxide may also   be referred to as a `head crash', whereas the term `system   crash' usually, though not always, implies that the operating   system or other software was at fault.  2. v. To fail suddenly.   "Has the s...
crash3 is  OS!" See   {down}.  Also used transitively to indicate the cause of the   crash (usually a person or a program, or both).  "Those idiots   playing {SPACEWAR} crashed the system." 3. vi. Sometimes said   of people hitting the sack after a l...
crash and burn is  vi.,n. A spectacular crash, in the mode of the   conclusion of the car-chase scene in the movie "Bullitt" and   many subsequent imitators.  Sun-3 monitors losing the flyback   transformer and lightning strikes on VAX-11/780 backpla...
crash and burn2 is  The construction   `crash-and-burn machine' is reported for a computer used   exclusively for alpha or {beta} testing, or reproducing bugs   (i.e., not for development).  The implication is that it wouldn't   be such a disaster if...
crash and burn3 is  would be inconvenienced. 
crawling horror is  n. Ancient crufty hardware or software that is   kept obstinately alive by forces beyond the control of the hackers   at a site.  Like {dusty deck} or {gonkulator}, but connotes   that the thing described is not just an irritation...
crawling horror2 is  "Mostly we code new stuff in C, but   they pay us to maintain one big FORTRAN II application from   nineteen-sixty-X that's a real crawling horror...."  Compare   {WOMBAT}. 
cray is  /kray/ n. 1. (properly, capitalized) One of the line of   supercomputers designed by Cray Research.  2. Any supercomputer at   all.  3. The {canonical} {number-crunching} machine.   The term is actually the lowercased last name of Seymour Cr...
cray2 is  co-founder of the company.  Numerous   vivid legends surround him, some true and some admittedly invented   by Cray Research brass to shape their corporate culture and image. 
cray instability is  n. A shortcoming of a program or algorithm that   manifests itself only when a large problem is being run on a powerful   machine (see {cray}).  Generally more subtle than bugs that can   be detected in smaller problems running o...
crayola is  /kray-oh'l*/ n. A super-mini or -micro computer that   provides some reasonable percentage of supercomputer performance   for an unreasonably low price.  Might also be a {killer micro}.
crayon is  n. 1. Someone who works on Cray supercomputers.  More   specifically, it implies a programmer, probably of the CDC ilk,   probably male, and almost certainly wearing a tie (irrespective of   gender).  Systems types who have a UNIX backgrou...
crayon2 is  A {computron} (sense 2) that   participates only in {number-crunching}.  3. A unit of   computational power equal to that of a single Cray-1.  There is a   standard joke about this that derives from an old Crayola crayon   promotional gim...
creationism is  n. The (false) belief that large, innovative designs   can be completely specified in advance and then painlessly magicked   out of the void by the normal efforts of a team of normally   talented programmers.  In fact, experience has ...
creationism2 is  only from evolutionary, exploratory   interaction between one (or at most a small handful of)   exceptionally able designer(s) and an active user population ---   and that the first try at a big new idea is always wrong.   Unfortunat...
creationism3 is  planning models   beloved of {management}, they are generally ignored. 
creeping elegance is  n. Describes a tendency for parts of a design to   become {elegant} past the point of diminishing return.  This   often happens at the expense of the less interesting parts of the   design, the schedule, and other things deemed ...
creeping elegance2 is  {creeping featurism}, {second-system   effect}, {tense}. 
creeping featurism is  /kree'ping fee'chr-izm/ n. 1. Describes a   systematic tendency to load more {chrome} and {feature}s onto   systems at the expense of whatever elegance they may have possessed   when originally designed.  See also {feeping crea...

factpacks/jargon-split.fact  view on Meta::CPAN

flame2 is  people.  4. n. An instance of   flaming.  When a discussion degenerates into useless controversy,   one might tell the participants "Now you're just flaming" or   "Stop all that flamage!" to try to get them to cool down (so to   speak).   ...
flame3 is  to 1976, adds "I   am 99% certain that the use of `flame' originated at WPI.  Those   who made a nuisance of themselves insisting that they needed to use   a TTY for `real work' came to be known as `flaming asshole lusers'.   Other particu...
flame4 is  ravers',   which shortened to `flaming ravers', and ultimately `flamers'.  I   remember someone picking up on the Human Torch pun, but I don't   think `flame on/off' was ever much used at WPI."  See also   {asbestos}.   The term may have b...
flame5 is    places; it is also reported that `flaming' was in use to mean   something like `interminably drawn-out semi-serious discussions'   (late-night bull sessions) at Carleton College during 1968--1971. 
flame bait is  n. A posting intended to trigger a {flame war}, or one   that invites flames in reply.
flame on is  vi.,interj.  1. To begin to {flame}.  The punning   reference to Marvel Comics's Human Torch is no longer widely   recognized.  2. To continue to flame.  See {rave}, {burble}.
flame war is  n. (var. `flamewar') An acrimonious dispute,   especially when conducted on a public electronic forum such as   {USENET}.
flamer is  n. One who habitually {flame}s.  Said esp. of obnoxious   {USENET} personalities.
flap is  vt. 1. To unload a DECtape (so it goes flap, flap,   flap...).  Old-time hackers at MIT tell of the days when the   disk was device 0 and {microtape}s were 1, 2,... and   attempting to flap device 0 would instead start a motor banging   insi...
flap2 is  to unload any   magnetic tape.  See also {macrotape}.  Modern cartridge tapes no   longer actually flap, but the usage has remained. 
flarp is  /flarp/ [Rutgers University] n. Yet another metasyntactic   variable (see {foo}).  Among those who use it, it is associated   with a legend that any program not containing the word `flarp'   somewhere will not work.  The legend is discreetl...
flarp2 is  which *do* contain the magic word. 
flat is  adj. 1. Lacking any complex internal structure.  "That   {bitty box} has only a flat filesystem, not a hierarchical   one."  The verb form is {flatten}.  2. Said of a memory   architecture (like that of the VAX or 680x0) that is one big line...
flat2 is  possible value of a processor   register corresponding to a unique core address), as opposed to a   `segmented' architecture (like that of the 80x86) in which   addresses are composed from a base-register/offset pair (segmented   designs ar...
flat-ASCII is  adj. Said of a text file that contains only 7-bit ASCII   characters and uses only ASCII-standard control characters (that   is, has no embedded codes specific to a particular text formatter   or markup language, and no {meta}-characte...
flat-file is  adj. A {flatten}ed representation of some database or   tree or network structure as a single file from which the   structure could implicitly be rebuilt, esp. one in {flat-ASCII}   form.
flatten is  vt. To remove structural information, esp. to filter   something with an implicit tree structure into a simple sequence of   leaves; also tends to imply mapping to {flat-ASCII}.  "This code   flattens an expression with parentheses into a...
flavor is  n. 1. Variety, type, kind.  "DDT commands come in two   flavors."  "These lights come in two flavors, big red ones and   small green ones."  See {vanilla}.  2. The attribute that causes   something to be {flavorful}.  Usually used in the p...
flavor2 is  convention yields additional flavor by   allowing one to print text either right-side-up or upside-down."   See {vanilla}.  This usage was certainly reinforced by the   terminology of quantum chromodynamics, in which quarks (the   constit...
flavor3 is  (up, down,   strange, charm, top, bottom) and three colors (red, blue, green)   --- however, hackish use of `flavor' at MIT predated QCD.  3. The   term for `class' (in the object-oriented sense) in the LISP Machine   Flavors system.  Tho...
flavor4 is  (notably by the Common LISP CLOS facility), the term `flavor' is   still used as a general synonym for `class' by some LISP hackers. 

factpacks/jargon-split.fact  view on Meta::CPAN

fold case is  v. See {smash case}.  This term tends to be used   more by people who don't mind that their tools smash case.  It also   connotes that case is ignored but case distinctions in data   processed by the tool in question aren't destroyed.
followup is  n. On USENET, a {posting} generated in response to   another posting (as opposed to a {reply}, which goes by email   rather than being broadcast).  Followups include the ID of the   {parent message} in their headers; smart news-readers c...
followup2 is  news in `conversation' sequence   rather than order-of-arrival.  See {thread}. 
foo is  /foo/ 1. interj. Term of disgust.  2. Used very generally   as a sample name for absolutely anything, esp. programs and files   (esp. scratch files).  3. First on the standard list of   metasyntactic variables used in syntax examples.  See al...
foo2 is  {grault},   {garply}, {waldo}, {fred}, {plugh}, {xyzzy},   {thud}.   {foo} is the {canonical} example of a `metasyntactic   variable' --- a name used in examples and understood to stand for   whatever thing is under discussion, or any random...
foo3 is  discussion.  To avoid confusion, hackers never use   `foo' or other words like it as permanent names for anything.  In   filenames, a common convention is that any filename beginning   `foo' is a scratch file that may be deleted at any time....
foo4 is  When used in   connection with `bar' it is generally traced to the WWII-era Army   slang acronym FUBAR (`Fucked Up Beyond All Recognition'), later   bowdlerized to {foobar}.  (See also {FUBAR}).   However, the use of the word `foo' itself ha...
foo5 is  long history in comic strips and cartoons.   The old "Smokey Stover" comic strips by Bill Holman often   included the word `FOO', in particular on license plates of cars;   allegedly, `FOO' and `BAR' also occurred in Walt Kelly's   "Pogo" st...
foo6 is   early version of Daffy Duck holds up a sign saying "SILENCE IS   FOO!"; oddly, this seems to refer to some approving or positive   affirmative use of foo.  It is even possible that hacker usage   actually springs from `FOO, Lampoons and Par...
foo7 is  in September 1958; the byline read   `C. Crumb' but this may well have been a sort-of pseudonym for   noted weird-comix artist Robert Crumb.  The title FOO was featured   in large letters on the front cover.   An old-time member reports that...
foo8 is  Language', compiled at {TMRC} there was an entry that went   something like this        FOO The first syllable of the sacred chant phrase "FOO MANE PADME        HUM."  Our first obligation is to keep the foo counters turning.   For more abou...
foo9 is  Almost   the entire AI staff was involved with TMRC, so it is not clear   which group introduced the other to the word FOO.   Very probably, hackish `foo' had no single origin and derives   through all these channels from Yiddish `feh' and/o...
foobar is  n. Another common metasyntactic variable; see {foo}.   Hackers do *not* generally use this to mean {FUBAR} in   either the slang or jargon sense.
fool is  n. As used by hackers, specifically describes a person who   habitually reasons from obviously or demonstrably incorrect   premises and cannot be persuaded by evidence to do otherwise; it is   not generally used in its other senses, i.e., to...
fool2 is  to reason correctly, or a clown.  Indeed,   in hackish experience many fools are capable of reasoning all too   effectively in executing their errors.  See also {cretin},   {loser}, {fool file, the}. 
fool file, the is  [USENET] n. A notional repository of all the most   dramatically and abysmally stupid utterances ever.  There is a   subgenre of {sig block}s that consists of the header "From the   fool file" followed by some quote the poster wish...
fool file, the2 is  dimwittery; for this to be really effective,   the quote has to be so obviously wrong as to be laughable.  More   than one USENETter has achieved an unwanted notoriety by being   quoted in this way. 
Foonly is  n. 1. The {PDP-10} successor that was to have been built by   the Super Foonly project at the Stanford Artificial Intelligence   Laboratory along with a new operating system.  The intention was to   leapfrog from the old DEC timesharing sy...
Foonly2 is  bypassing TENEX which at that time was the ARPANET   standard.  ARPA funding for both the Super Foonly and the new   operating system was cut in 1974.  Most of the design team went to   DEC and contributed greatly to the design of the PDP...
Foonly3 is  formed by Dave Poole, one of the   principal Super Foonly designers, and one of hackerdom's more   colorful personalities.  Many people remember the parrot which sat   on Poole's shoulder and was a regular companion.  3. Any of the   mach...
Foonly4 is  the F-1 (a.k.a.   Super Foonly), which was the computational engine used to create   the graphics in the movie "TRON".  The F-1 was the fastest   PDP-10 ever built, but only one was ever made.  The effort drained   Foonly of its financial...
Foonly5 is  smaller, slower, and much less expensive machines.  Unfortunately,   these ran not the popular {TOPS-20} but a TENEX varient called   Foonex; this seriously limited their market.  Also, the machines   shipped were actually wire-wrapped en...
Foonly6 is  attention from more than usually competent site   personnel, and thus had significant reliability problems.  Poole's   legendary temper and unwillingness to suffer fools gladly did not   help matters.  By the time of the Jupiter project c...
Foonly7 is  build another F-1 was eclipsed by the   {Mars}, and the company never quite recovered.  See the   {Mars} entry for the continuation and moral of this story. 
footprint is  n. 1. The floor or desk area taken up by a piece of   hardware.  2. [IBM] The audit trail (if any) left by a crashed   program (often in plural, `footprints').  See also   {toeprint}.
for free is  adj. Said of a capability of a programming language or   hardware equipment that is available by its design without needing   cleverness to implement "In APL, we get the matrix operations for   free."  "And owing to the way revisions are...
for free2 is  trees for free."  Usually it refers to a   serendipitous feature of doing things a certain way (compare   {big win}), but it may refer to an intentional but secondary   feature. 
for the rest of us is  [from the Mac slogan "The computer for the   rest of us"] adj. 1. Used to describe a {spiffy} product whose   affordability shames other comparable products, or (more often)   used sarcastically to describe {spiffy} but very ov...
for the rest of us2 is  with a limited interface,   deliberately limited capabilities, non-orthogonality, inability to   compose primitives, or any other limitation designed to not   `confuse' a na"ive user.  This places an upper bound on how far tha...
for the rest of us3 is  get in the way of the task   instead of helping accomplish it.  Used in reference to Macintosh   software which doesn't provide obvious capabilities because it is   thought that the poor lusers might not be able to handle them...
for the rest of us4 is  third-party   reference; thus, "Yes, it is an attractive program, but it's   designed for The Rest Of Them" means a program that superficially   looks neat but has no depth beyond the surface flash.  See also   {WIMP environme...
fora is  pl.n. Plural of {forum}.
foreground is  [UNIX] vt. To foreground a task is to bring it to   the top of one's {stack} for immediate processing, and hackers   often use it in this sense for non-computer tasks. "If your   presentation is due next week, I guess I'd better foregr...

factpacks/jargon-split.fact  view on Meta::CPAN

Hacking X for Y is  [ITS] n. The information ITS made publicly   available about each user (the INQUIR record) was a sort of form in   which the user could fill out fields.  On display, two of these   fields were combined into a project description o...
Hacking X for Y2 is  `"Hacking perceptrons for   Minsky"').  This form of description became traditional and has   since been carried over to other systems with more general   facilities for self-advertisement (such as UNIX {plan file}s). 
Hackintosh is  n. 1. An Apple Lisa that has been hacked into emulating a   Macintosh (also called a `Mac XL').  2. A Macintosh assembled   from parts theoretically belonging to different models in the line.
hackish is  /hak'ish/ adj. (also {hackishness} n.) 1. Said of   something that is or involves a hack.  2. Of or pertaining to   hackers or the hacker subculture.  See also {true-hacker}.
hackishness is  n. The quality of being or involving a hack.  This   term is considered mildly silly.  Syn.  {hackitude}.
hackitude is  n. Syn. {hackishness}; this word is considered sillier.
hair is  [back-formation from {hairy}] n. The complications that   make something hairy.  "Decoding {TECO} commands requires a   certain amount of hair."  Often seen in the phrase `infinite   hair', which connotes extreme complexity.  Also in `hairif...
hair2 is  "GNUMACS Elisp encourages lusers   to write complex editing modes."  "Yeah, it's pretty hairiferous   all right." (or just "Hair squared!") 
hairy is  adj. 1. Annoyingly complicated.  "{DWIM} is incredibly   hairy."  2. Incomprehensible.  "{DWIM} is incredibly hairy."   3. Of people, high-powered, authoritative, rare, expert, and/or   incomprehensible.  Hard to explain except in context "...
hairy2 is  nothing to worry about."  See   also {hirsute}. 
HAKMEM is  /hak'mem/ n. MIT AI Memo 239 (February 1972).  A   legendary collection of neat mathematical and programming hacks   contributed by many people at MIT and elsewhere.  (The title of the   memo really is "HAKMEM", which is a 6-letterism for ...
HAKMEM2 is  techniques, powerful   theorems, or interesting unsolved problems, but most fall into the   category of mathematical and computer trivia.  Here is a sampling   of the entries (with authors), slightly paraphrased   Item 41 (Gene Salamin) T...
HAKMEM3 is  than 2^18.   Item 46 (Rich Schroeppel) The most *probable* suit   distribution in bridge hands is 4-4-3-2, as compared to 4-3-3-3,   which is the most *evenly* distributed.  This is because the   world likes to have unequal numbers a ther...
HAKMEM4 is  the state of lowest energy, but in the state   of lowest disordered energy.   Item 81 (Rich Schroeppel) Count the magic squares of order 5   (that is, all the 5-by-5 arrangements of the numbers from 1 to 25   such that all rows, columns, ...
HAKMEM5 is  There are about 320 million, not counting those that   differ only by rotation and reflection.   Item 154 (Bill Gosper) The myth that any given programming language is   machine independent is easily exploded by computing the sum of   pow...
HAKMEM6 is  with   sign +, you are on a sign-magnitude machine.  If the result   loops with period = 1 at -1, you are on a   twos-complement machine.  If the result loops with period greater   than 1, including the beginning, you are on a ones-comple...
HAKMEM7 is  period greater than 1, not   including the beginning, your machine isn't binary --- the pattern   should tell you the base.  If you run out of memory, you are on a   string or bignum system.  If arithmetic overflow is a fatal error,   som...
HAKMEM8 is  to enforce machine   independence.  But the very ability to trap overflow is machine   dependent.  By this strategy, consider the universe, or, more   precisely, algebra Let X = the sum of many powers of 2 =   ...111111.  Now add X to its...
HAKMEM9 is  X = -1.  Therefore algebra is run on a machine (the   universe) that is two's-complement.   Item 174 (Bill Gosper and Stuart Nelson) 21963283741 is the only   number such that if you represent it on the {PDP-10} as both an   integer and a...
HAKMEM10 is  two   representations are identical.   Item 176 (Gosper) The "banana phenomenon" was encountered when   processing a character string by taking the last 3 letters typed   out, searching for a random occurrence of that sequence in the   t...
HAKMEM11 is  occurrence, typing it out,   and iterating.  This ensures that every 4-letter string output   occurs in the original.  The program typed BANANANANANANANA....  We   note an ambiguity in the phrase, "the Nth occurrence of."  In one   sense...

factpacks/jargon-split.fact  view on Meta::CPAN

mode bit is  n. A {flag}, usually in hardware, that selects between   two (usually quite different) modes of operation.  The connotations   are different from {flag} bit in that mode bits are mainly   written during a boot or set-up phase, are seldom...
mode bit2 is  lifetime of an ordinary program.  The   classic example was the EBCDIC-vs.-ASCII bit (#12) of the Program   Status Word of the IBM 360.  Another was the bit on a PDP-12 that   controlled whether it ran the PDP-8 or the LINC instruction ...
modulo is  /mo'dyu-loh/ prep. Except for.  From mathematical   terminology; one can consider saying that 4 = 22 except for   the 9s (4 = 22 mod 9).  "Well, LISP seems to work okay now,   modulo that {GC} bug."  "I feel fine today modulo a slight   he...
molly-guard is  /mol'ee-gard/ [University of Illinois] n. A shield   to prevent tripping of some {Big Red Switch} by clumsy or   ignorant hands.  Originally used of some plexiglass covers   improvised for the BRS on an IBM 4341 after a programmer's t...
molly-guard2 is  twice in one day.  Later   generalized to covers over stop/reset switches on disk drives and   networking equipment. 
Mongolian Hordes technique is  n. Development by {gang bang}   (poss. from the Sixties counterculture expression `Mongolian   clusterfuck' for a public orgy).  Implies that large numbers of   inexperienced programmers are being put on a job better pe...
Mongolian Hordes technique2 is  `Chinese Army technique';   see also {Brooks's Law}. 
monkey up is  vt. To hack together hardware for a particular task,   especially a one-shot job.  Connotes an extremely {crufty} and   consciously temporary solution.  Compare {hack up}, {kluge up},   {cruft together}, {cruft together}.
monkey, scratch is  n.  See {scratch monkey}.
monstrosity is  1. n. A ridiculously {elephantine} program or system,   esp. one that is buggy or only marginally functional.  2. The   quality of being monstrous (see `Overgeneralization' in the discussion   of jargonification).  See also {baroque}.
Moof is  /moof/ [MAC users] n. The Moof or `dogcow' is a   semi-legendary creature that lurks in the depths of the Macintosh   Technical Notes Hypercard stack V3.1; specifically, the full story   of the dogcow is told in technical note #31 (the parti...
Moof2 is  `Clarus').  Option-shift-click will   cause it to emit a characteristic `Moof!' or `!fooM' sound.   *Getting* to tech note 31 is the hard part; to discover how   to do that, one must needs examine the stack script with a hackerly   eye.  Cl...
Moof3 is  if you   choose `Page Setup...' with a LaserWriter selected and click on   the `Options' button. 
Moore's Law is  /morz law/ prov. The observation that the logic   density of silicon integrated circuits has closely followed the   curve (bits per square inch)  = 2^{(n - 1962)}; that is, the   amount of information storable in one square inch of si...
Moore's Law2 is  since the technology was   invented.  See also {Parkinson's Law of Data}. 
moria is  /mor'ee-*/ n. Like {nethack} and {rogue}, one of the   large PD Dungeons-and-Dragons-like simulation games, available for   a wide range of machines and operating systems.  Extremely   addictive and a major consumer of time better used for ...
MOTAS is  /moh-toz/ [USENET: Member Of The Appropriate Sex, after   {MOTOS} and {MOTSS}] n. A potential or (less often) actual sex   partner.  See also {SO}.
MOTOS is  /moh-tohs/ [acronym from the 1970 U.S. census forms via   USENET: Member Of The Opposite Sex] n. A potential or (less often)   actual sex partner.  See {MOTAS}, {MOTSS}, {SO}.  Less   common than MOTSS or {MOTAS}, which have largely displac...
MOTSS is  /mots/ or /M-O-T-S-S/ [from the 1970 U.S. census forms   via USENET, Member Of The Same Sex] n. Esp. one considered as a   possible sexual partner.  The gay-issues newsgroup on USENET is   called soc.motss.  See {MOTOS} and {MOTAS}, which d...
mouse ahead is  vi. Point-and-click analog of `type ahead'.  To   manipulate a computer's pointing device (almost always a mouse in   this usage, but not necessarily) and its selection or command   buttons before a computer program is ready to accept...
mouse ahead2 is  accepting the input.  Handling this   properly is rare, but it can help make a {WIMP environment} much   more usable, assuming the users are familiar with the behavior of the   user interface. 

factpacks/jargon-split.fact  view on Meta::CPAN

phase4 is  to get into a different phase.  3. `change phase   the easy way' To stay asleep, etc.  However, some claim that   either staying awake longer or sleeping longer is easy, and that it   is *shortening* your day or night that's hard (see {wra...
phase5 is  travelers who cross many   time-zone boundaries may be attributed to two distinct causes the   strain of travel per se, and the strain of changing phase.  Hackers   who suddenly find that they must change phase drastically in a   short per...
phase6 is  experience   something very like jet lag without traveling. 
phase of the moon is  n. Used humorously as a random parameter on which   something is said to depend.  Sometimes implies unreliability of   whatever is dependent, or that reliability seems to be dependent on   conditions nobody has been able to dete...
phase of the moon2 is  channel open in mumble mode, having the foo   switch set, and on the phase of the moon."   True story Once upon a time there was a bug that really did depend   on the phase of the moon.  There is a little subroutine that had   ...
phase of the moon3 is  MIT to calculate an   approximation to the moon's true phase.  GLS incorporated this   routine into a LISP program that, when it wrote out a file, would   print a timestamp line almost 80 characters long.  Very   occasionally t...
phase of the moon4 is  and   would overflow onto the next line, and when the file was later read   back in the program would {barf}.  The length of the first line   depended on both the precise date and time and the length of the   phase specificatio...
phase of the moon5 is  bug   literally depended on the phase of the moon!   The first paper edition of the Jargon File (Steele-1983) included   an example of one of the timestamp lines that exhibited this bug, but   the typesetter `corrected' it.  Th...
phreaking is  [from `phone phreak'] n. 1. The art and science of   cracking the phone network (so as, for example, to make free   long-distance calls).  2. By extension, security-cracking in any   other context (especially, but not exclusively, on co...
phreaking2 is  phreaking was a semi-respectable activity among   hackers; there was a gentleman's agreement that phreaking as an   intellectual game and a form of exploration was OK, but serious   theft of services was taboo.  There was significant c...
phreaking3 is  hard-core phone phreaks who   ran semi-underground networks of their own through such media as   the legendary `TAP Newsletter'.  This ethos began to break   down in the mid-1980s as wider dissemination of the techniques put   them in ...
phreaking4 is  the same   time, changes in the phone network made old-style technical   ingenuity less effective as a way of hacking it, so phreaking came   to depend more on overtly criminal acts such as stealing phone-card   numbers.  The crimes an...
phreaking5 is  turned that game very ugly.  A few old-time hackers still phreak   casually just to keep their hand in, but most these days have   hardly even heard of `blue boxes' or any of the other   paraphernalia of the great phreaks of yore. 
pico- is  [SI a quantifier   meaning * 10^-12]   pref. Smaller than {nano-}; used in the same rather loose   connotative way as {nano-} and {micro-}.  This usage is not yet   common in the way {nano-} and {micro-} are, but should be   instantly recog...
pico-2 is  {{quantifiers}},   {micro-}. 
run like a pig is  v. To run very slowly on given hardware, said of   software.  Distinct from {hog}.
pilot error is  [Sun from aviation] n. A user's misconfiguration or   misuse of a piece of software, producing apparently buglike results   (compare {UBD}).  "Joe Luser reported a bug in sendmail that   causes it to generate bogus headers."  "That's ...
ping is  [from the TCP/IP acronym `Packet INternet Groper', prob.   originally contrived to match the submariners' term for a sonar   pulse] 1. n.  Slang term for a small network message (ICMP ECHO)   sent by a computer to check for the presence and ...
ping2 is  a phone greeting.  See {ACK},   also {ENQ}.  2. vt. To verify the presence of.  3. vt. To get   the attention of.  From the UNIX command `ping(1)' that sends   an ICMP ECHO packet to another host.  4. vt. To send a message to   all members ...
ping3 is  order   to verify that everybody's addresses are reachable).  "We haven't   heard much of anything from Geoff, but he did respond with an ACK   both times I pinged jargon-friends."   The funniest use of `ping' to date was described in Janua...
ping4 is  comp.sys.next.  He was trying   to isolate a faulty cable segment on a TCP/IP Ethernet hooked up to   a NeXT machine, and got tired of having to run back to his console   after each cabling tweak to see if the ping packets were getting   th...

factpacks/jargon-split.fact  view on Meta::CPAN

say is  vt. 1. To type to a terminal.  "To list a directory   verbosely, you have to say `ls -l'."  Tends to imply a   {newline}-terminated command (a `sentence').  2. A computer   may also be said to `say' things to you, even if it doesn't have   a ...
say2 is  terminal in response   to your commands.  Hackers find it odd that this usage confuses   {mundane}s. 
science-fiction fandom is  n. Another voluntary subculture having a   very heavy overlap with hackerdom; most hackers read SF and/or   fantasy fiction avidly, and many go to `cons' (SF conventions) or   are involved in fandom-connected activities suc...
science-fiction fandom2 is  Some hacker jargon originated in SF fandom;   see {defenestration}, {great-wall}, {cyberpunk}, {h}, {ha ha   only serious}, {IMHO}, {mundane}, {neep-neep}, {Real   Soon Now}.  Additionally, the jargon terms {cowboy},   {cy...
science-fiction fandom3 is  {virus},   {wetware}, {wirehead}, and {worm} originated in SF   stories. 
scram switch is  [from the nuclear power industry] n. An   emergency-power-off switch (see {Big Red Switch}), esp. one   positioned to be easily hit by evacuating personnel.  In general,   this is *not* something you {frob} lightly; these often   ini...
scram switch2 is  and are installed   in a {dinosaur pen} for use in case of electrical fire or in   case some luckless {field servoid} should put 120 volts across   himself while {Easter egging}. 
scratch is  1. [from `scratchpad'] adj. Describes a data   structure or recording medium attached to a machine for testing or   temporary-use purposes; one that can be {scribble}d on without   loss.  Usually in the combining forms `scratch memory',  ...
scratch2 is  tape',   `scratch volume'.  See {scratch monkey}.  2. [primarily   IBM] vt. To delete (as in a file). 
scratch monkey is  n. As in "Before testing or reconfiguring, always   mount a {scratch monkey}", a proverb used to advise caution when   dealing with irreplaceable data or devices.  Used to refer to any   scratch volume hooked to a computer during a...
scratch monkey2 is  precious resource or data that might otherwise get   trashed.   This term preserves the memory of Mabel, the Swimming Wonder   Monkey, star of a biological research program at the University of   Toronto ca. 1986.  Mabel was not (...
scratch monkey3 is  university had spent years teaching her how to swim,   breathing through a regulator, in order to study the effects of   different gas mixtures on her physiology.  Mabel suffered an   untimely demise one day when DEC {PM}ed the PD...
scratch monkey4 is  {provocative maintainance}).   It is recorded that, after calming down an understandably irate   customer sufficiently to ascertain the facts of the matter, a DEC   troubleshooter called up the {field circus} manager responsible  ...
scratch monkey5 is  all the consequences to humans were so amusing; the sysop of   the machine in question was nearly thrown in jail at the behest of   certain clueless droids at the local `humane' society.  The moral   is clear When in doubt, always...
screw is  [MIT] n. A {lose}, usually in software.  Especially used for   user-visible misbehavior caused by a bug or misfeature.  This use   has become quite widespread outside MIT.
screwage is  /skroo'*j/ n. Like {lossage} but connotes that the   failure is due to a designed-in misfeature rather than a simple   inadequacy or a mere bug.
scribble is  n. To modify a data structure in a random and   unintentionally destructive way.  "Bletch! Somebody's   disk-compactor program went berserk and scribbled on the i-node   table."  "It was working fine until one of the allocation routines ...
scribble2 is  {trash}; compare {mung},   which conveys a bit more intention, and {mangle}, which is more   violent and final. 
scrog is  /skrog/ [Bell Labs] vt. To damage, trash, or corrupt a   data structure.  "The list header got scrogged."  Also reported   as `skrog', and ascribed to the comic strip "The Wizard of   Id".  Equivalent to {scribble} or {mangle}.
scrool is  /skrool/ [from the pioneering Roundtable chat system in   Houston ca. 1984; prob. originated as a typo for `scroll'] n. The   log of old messages, available for later perusal or to help one get   back in synch with the conversation. It was...
scrool2 is  because an early version of the roundtable   software had a bug where it would dump all 8K of scrool on a user's   terminal. 

factpacks/jargon-split.fact  view on Meta::CPAN

software rot8 is  day, and corrected appropriately.   Compare {bit rot}. 
softwarily is  /soft-weir'i-lee/ adv. In a way pertaining to software.   "The system is softwarily unreliable."  The adjective   `softwary' is *not* used.  See {hardwarily}.
softy is  [IBM] n. Hardware hackers' term for a software expert who   is largely ignorant of the mysteries of hardware.
some random X is  adj. Used to indicate a member of class X, with the   implication that Xs are interchangeable.  "I think some random   cracker tripped over the guest timeout last night."  See also   {J. Random}.
sorcerer's apprentice mode is  [from the film "Fantasia"] n. A bug in a   protocol where, under some circumstances, the receipt of a message   causes multiple messages to be sent, each of which, when   received, triggers the same bug.  Used esp. of s...
sorcerer's apprentice mode2 is  loops in {email} software.  Compare   {broadcast storm}, {network meltdown}. 
SOS is  n.,obs. /S-O-S/ 1. An infamously {losing} text editor.   Once, back in the 1960s, when a text editor was needed for the   PDP-6, a hacker crufted together a {quick-and-dirty} `stopgap   editor' to be used until a better one was written.  Unfo...
SOS2 is  discarded when new ones (in   particular, {TECO}) came along.  SOS is a descendant (`Son of   Stopgap') of that editor, and many PDP-10 users gained the dubious   pleasure of its acquaintance.  Since then other programs similar in   style to...
SOS3 is  editor BILOS   /bye'lohs/, the Brother-In-Law Of Stopgap (the alternate expansion   `Bastard Issue, Loins of Stopgap' has been proposed).  2. /sos/   n. To decrease; inverse of {AOS}, from the PDP-10 instruction   set. 
source of all good bits is  n. A person from whom (or a place from   which) useful information may be obtained.  If you need to know   about a program, a {guru} might be the source of all good bits.   The title is often applied to a particularly comp...
space-cadet keyboard is  n. The Knight keyboard, a now-legendary device   used on MIT LISP machines, which inspired several still-current   jargon terms and influenced the design of {EMACS}.  It was inspired   by the Stanford keyboard and equipped wi...
space-cadet keyboard2 is  keys for {bucky bits} (`control',   `meta', `hyper', and `super') and three like regular shift keys,   called `shift', `top', and `front'.  Many keys had three symbols   on them a letter and a symbol on the top, and a Greek ...
space-cadet keyboard3 is  key had an `L' and a two-way   arrow on the top, and the Greek letter lambda on the front.   And of course each of these might also be typed with any   combination of the control, meta, hyper, and super keys.  On this   keyb...
space-cadet keyboard4 is  characters!  This   allowed the user to type very complicated mathematical text, and   also to have thousands of single-character commands at his   disposal.  Many hackers were actually willing to memorize the   command mean...
space-cadet keyboard5 is  typing time   (this attitude obviously shaped the interface of EMACS).  Other   hackers, however, thought having that many bucky bits was overkill,   and objected that such a keyboard can require three or four hands   to ope...
space-cadet keyboard6 is  bucky},   {meta bit}, {quadruple bucky}. 
SPACEWAR is  n. A space-combat simulation game, inspired by   E. E. "Doc" Smith's "Lensman" books, in which two spaceships   duel around a central sun, shooting torpedoes at each other and   jumping through hyperspace.  This game was first implemente...
SPACEWAR2 is  aficionados formed the core of   the early hacker culture at MIT.  Nine years later, a descendant   of the game motivated Ken Thompson to build, in his spare time on a   scavenged PDP-7, the operating system that became {{UNIX}}.  Less ...
SPACEWAR3 is  commercialized as one of   the first video games; descendants are still {feep}ing in video   arcades everywhere. 
spaghetti code is  n. Code with a complex and tangled control   structure, esp. one using many GOTOs, exceptions, or other   `unstructured' branching constructs.  Pejorative.  The synonym   `kangaroo code' has been reported, doubtless because such co...
spaghetti inheritance is  n. [encountered among users of object-oriented   languages that use inheritance, such as Smalltalk] A convoluted   class-subclass graph, often resulting from carelessly deriving   subclasses from other classes just for the s...

factpacks/jargon-split.fact  view on Meta::CPAN

tinycrud2 is  how (allegedly)   inconsistent and lacking in genuine atmosphere the scenarios   generated in user extensible MUDs can be.  Other common knocks on   them are that they feature little overall plot, bad game topology,   little competitive...
tinycrud3 is  alleged   horrors of the TinyMUD code itself.  This dispute is one of the MUD   worlds hardiest perennial {holy wars}. 
tip of the ice-cube is  [IBM] n. The visible part of something small and   insignificant.  Used as an ironic comment in situations where `tip   of the iceberg might be appropriate if the subject were actually   nontrivial.
tired iron is  [IBM] n. Hardware that is perfectly functional but   far enough behind the state of the art to have been superseded by new   products, presumably with sufficient improvement in bang-per-buck that   the old stuff is starting to look a b...
tits on a keyboard is  n. Small bumps on certain keycaps to keep   touch-typists registered (usually on the `5 of a numeric keypad,   and on the `F and `J of a QWERTY keyboard).
TLA is  /T-L-A/ [Three-Letter Acronym] n. 1. Self-describing   acronym for a species with which computing terminology is infested.   2. Any confusing acronym.  Examples include MCA, FTP, SNA, CPU,   MMU, SCCS, DMU, FPU, NNTP, TLA.  People who like th...
TLA2 is  three letters, just as not all four-letter   words have four letters.  One also hears of `ETLA (Extended   Three-Letter Acronym, pronounced /ee tee el ay/) being used to   describe four-letter acronyms.  The term `SFLA (Stupid Four-Letter   ...
TLA3 is  {YABA}.   The self-effacing phrase "TDM TLA" (Too Damn Many...) is   often used to bemoan the plethora of TLAs in use.  In 1989, a   random of the journalistic persuasion asked hacker Paul Boutin   "What do you think will be the biggest prob...
TLA4 is  straight-faced response "There are only   17,000 three-letter acronyms." (To be exact, there are 26^3   = 17,576.) 
TMRC is  /tmerk/ n. The Tech Model Railroad Club at MIT, one of   the wellsprings of hacker culture.  The 1959 `Dictionary of   the TMRC Language compiled by Peter Samson included several terms   which became basics of the hackish vocabulary (see esp...
TMRC2 is  legendary layout was already a marvel of   complexity.  The control system alone featured about 1200 relays.   There were {scram switch}es located at numerous places around   the room that could be pressed if something undesirable was about...
TMRC3 is  an obstruction.   Another feature of the system was a digital clock on the dispatch   board.  Normally it ran at some multiple of real time, but if   someone hit a scram switch the clock stopped and the display was   replaced with the word ...
TMRC4 is  the Bibliography), gives a   stimulating account of those early years.  TMRCs Power and Signals   group included most of the early PDP-1 hackers and the people who   later bacame the core of the MIT AI Lab staff.  Thirty years later   that ...
TMRC5 is  lexicon   accordingly includes a number of entries from a recent revision of   the TMRC Dictionary. 
to a first approximation is  1. [techspeak] When one is doing certain   numerical computations, an approximate solution may be computed by   any of several heuristic methods, then refined to a final value.   By using the starting point of a first app...
to a first approximation2 is  algorithm that converges more quickly to the   correct result.  2. In jargon, a preface to any comment that   indicates that the comment is only approximately true.  The remark   "To a first approximation, I feel good" m...
to a first approximation3 is  reveal that not all is perfect (e.g., a   nagging cough still remains after an illness). 
to a zeroth approximation is  [from `to a first approximation] A   *really* sloppy approximation; a wild guess.  Compare   {social science number}.
toast is  1. n. Any completely inoperable system or component, esp.   one that has just crashed and burned "Uh, oh ... I think the   serial board is toast."  2. vt. To cause a system to crash   accidentally, especially in a manner that requires manua...
toast2 is  {firewall machine} again." 
toaster is  n. 1. The archetypal really stupid application for an   embedded microprocessor controller; often used in comments that   imply that a scheme is inappropriate technology (but see   {elevator controller}).  "{DWIM} for an assembler?  Thatd...

factpacks/jargon-split.fact  view on Meta::CPAN

VMS2 is  this makes VMS fans furious.  One major   hacker gripe with VMS concerns its slowness --- thus the following   limerick        There once was a system called VMS        Of cycles by no means abstemious.             It's chock-full of hacks  ...
VMS3 is  my poor stomach all squeamious.                                         --- The Great Quux   See also {VAX}, {{TOPS-10}}, {{TOPS-20}}, {{UNIX}}, {runic}. 
voice is  vt. To phone someone, as opposed to emailing them or   connecting in talk mode.  "I'm busy now; I'll voice you later."
voice-net is  n. Hackish way of referring to the telephone system,   analogizing it to a digital network.  USENET {sig block}s not   uncommonly include the sender's phone next to a "Voice" or   "Voice-Net" header; common variants of this are "Voicene...
voodoo programming is  [from George Bush's "voodoo economics"] n.   The use by guess or cookbook of an {obscure} or {hairy} system,   feature, or algorithm that one does not truly understand.  The   implication is that the technique may not work, and...
voodoo programming2 is  Almost synonymous with {black magic},   except that black magic typically isn't documented and   *nobody* understands it.  Compare {magic}, {deep magic},   {heavy wizardry}, {rain dance}, {cargo cult programming},   {wave a de...
VR is  // [MUD] n. On-line abbrev for {virtual reality}, as   opposed to {RL}.
Vulcan nerve pinch is  n. [from the old "Star Trek" TV series via   Commodore Amiga hackers] The keyboard combination that forces a   soft-boot or jump to ROM monitor (on machines that support such a   feature).  On many micros this is Ctrl-Alt-Del; ...
Vulcan nerve pinch2 is  <Cmd>-<Power switch>!  Also called   {three-finger salute}.  Compare {quadruple bucky}. 
vulture capitalist is  n. Pejorative hackerism for `venture   capitalist', deriving from the common practice of pushing contracts   that deprive inventors of control over their own innovations and   most of the money they ought to have made from them...
vulture capitalist2 is  Fudd's immortal   line "You wascawwy wabbit!"] n. 1. A legendary early hack   reported on a System/360 at RPI and elsewhere around 1978.  The   program would make two copies of itself every time it was run,   eventually crashi...
vulture capitalist3 is   includes infinite self-replication but is not a {virus} or   {worm}.  See also {cookie monster}. 
WAITS is  /wayts/ n. The mutant cousin of {{TOPS-10}} used on a   handful of systems at {{SAIL}} up to 1990.  There was never an   `official' expansion of WAITS (the name itself having been arrived   at by a rather sideways process), but it was frequ...
WAITS2 is  ITS'.  Though WAITS was less visible   than ITS, there was frequent exchange of people and ideas between   the two communities, and innovations pioneered at WAITS exerted   enormous indirect influence.  The early screen modes of {EMACS},  ...
WAITS3 is  `E' editor --- one   of a family of editors that were the first to do `real-time   editing', in which the editing commands were invisible and where   one typed text at the point of insertion/overwriting.  The modern   style of multi-region...
WAITS4 is  and WAITS alumni at XEROX PARC and elsewhere played major roles in   the developments that led to the XEROX Star, the Macintosh, and the   Sun workstations.  {Bucky bits} were also invented there ---   thus, the ALT key on every IBM PC is ...
WAITS5 is  seldom duplicated elsewhere was a news-wire interface   that allowed WAITS hackers to read, store, and filter AP and UPI   dispatches from their terminals; the system also featured a   still-unusual level of support for what is now called ...
WAITS6 is  and video signals to be switched   to programming terminals. 
waldo is  /wol'doh/ [From Robert A. Heinlein's story "Waldo"]   1. A mechanical agent, such as a gripper arm, controlled by a human   limb.  When these were developed for the nuclear industry in the   mid-1940s they were named after the invention des...
waldo2 is  wrote in 1942.  Now known by the more   generic term `telefactoring', this technology is of intense   interest to NASA for tasks like space station maintenance.  2. At   Harvard (particularly by Tom Cheatham and students), this is used   i...
waldo3 is  and general   nonsense word.  See {foo}, {bar}, {foobar}, {quux}. 
walk is  n.,vt. Traversal of a data structure, especially an array or   linked-list data structure in {core}.  See also {codewalker},   {silly walk}, {clobber}.
walk off the end of is  vt. To run past the end of an array, list, or      medium after stepping through it --- a good way to land in trouble.   Often the result of an {off-by-one error}.  Compare   {clobber}, {roach}, {smash the stack}.
walking drives is  n. An occasional failure mode of magnetic-disk   drives back in the days when they were huge, clunky {washing   machine}s.  Those old {dinosaur} parts carried terrific angular   momentum; the combination of a misaligned spindle or ...
walking drives2 is  with the floor could cause them to   `walk' across a room, lurching alternate corners forward a couple   of millimeters at a time.  There is a legend about a drive that   walked over to the only door to the computer room and jamme...
walking drives3 is  wall in order to get at   it!  Walking could also be induced by certain patterns of drive   access (a fast seek across the whole width of the disk, followed by   a slow seek in the other direction).  Some bands of old-time   hacke...
walking drives4 is  patterns that   would do this to particular drive models and held disk-drive races. 
wall is  [WPI] interj. 1. An indication of confusion, usually spoken   with a quizzical tone  "Wall??"  2. A request for further   explication.  Compare {octal forty}.   It is said that "Wall?" really came from `like talking to a   blank wall'.  It w...
wall2 is  you   had carefully answered a question, the questioner stared at you   blankly, clearly having understood nothing that was explained.  You   would then throw out a "Hello, wall?" to elicit some sort of   response from the questioner.  Late...
wall3 is  themselves. 
wall follower is  n. A person or algorithm that compensates for lack   of sophistication or native stupidity by efficiently following some   simple procedure shown to have been effective in the past.  Used of   an algorithm, this is not necessarily p...
wall follower2 is  the winning robot in an early AI contest   (named, of course, after the cocktail).  Harvey successfully solved   mazes by keeping a `finger' on one wall and running till it came   out the other end.  This was inelegant, but it was ...
wall follower3 is  simply-connected mazes --- and, in fact,   Harvey outperformed more sophisticated robots that tried to   `learn' each maze by building an internal representation of it.   Used of humans, the term *is* pejorative and implies an   un...
wall follower4 is  See also {code   grinder}, {droid}. 
wall time is  n. (also `wall clock time') 1. `Real world' time (what   the clock on the wall shows), as opposed to the system clock's idea   of time.  2. The real running time of a program, as opposed to the   number of {clocks} required to execute i...

factpacks/jargon.fact  view on Meta::CPAN

bit bang => n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesti...
bit bang2 => and output at the same time) is one way to separate the real hackers from the wannabees. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO b...
bit bang3 => instance of the {cycle of reincarnation}, this technique is now (1991) coming back into use on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART. 
bit bashing => n. (alt. `bit diddling' or {bit twiddling}) Term used to describe any of several kinds of low-level programming characterized by manipulation of bit, flag, nybble, and other smaller-than-character-sized pieces of data; these include lo...
bit bashing2 => encryption algorithms, checksum and error-correcting codes, hash functions, some flavors of graphics programming (see bitblt), and assembler/compiler code generation. May connote either tedium or a real technical challenge (more usual...
bit bashing3 => decoding for the new tape driver looks pretty solid but the bit-bashing for the control registers still has bugs." See also {bit bang}, {mode bit}. 
bit bucket => n. 1. The universal data sink (originally, the mythical receptacle used to catch bits when they fall off the end of a register during a shift instruction). Discarded, lost, or destroyed data is said to have `gone to the bit bucket'. On ...
bit bucket2 => /dev/null. Sometimes amplified as `the Great Bit Bucket in the Sky'. 2. The place where all lost mail and news messages eventually go. The selection is performed according to {Finagle's Law}; important mail is much more likely to end u...
bit bucket3 => mail, which has an almost 100% probability of getting delivered. Routing to the bit bucket is automatically performed by mail-transfer agents, news systems, and the lower layers of the network. 3. The ideal location for all unwanted ma...
bit bucket4 => article to the bit bucket." Such a request is guaranteed to overflow one's mailbox with flames. 4. Excuse for all mail that has not been sent. "I mailed you those figures last week; they must have ended in the bit bucket." Compare {bla...
bit bucket5 => in jest. It is based on the fanciful notion that bits are objects that are not destroyed but only misplaced. This appears to have been a mutation of an earlier term `bit box', about which the same legend was current; old-time hackers a...
bit bucket6 => told that when the CPU stored bits into memory it was actually pulling them `out of the bit box'. See also {chad box}. Another variant of this legend has it that, as a consequence of the `parity preservation law', the number of 1 bits ...
bit bucket7 => equal the number of 0 bits. Any imbalance results in bits filling up the bit bucket. A qualified computer technician can empty a full bit bucket as part of scheduled maintenance. 
bit decay => n. See {bit rot}. People with a physics background tend to prefer this one for the analogy with particle decay. See also computron, {quantum bogodynamics}.
bit rot => n. Also {bit decay}. Hypothetical disease the existence of which has been deduced from the observation that unused programs or features will often stop working after sufficient time has passed, even if `nothing has changed'. The theory exp...
bit rot2 => were radioactive. As time passes, the contents of a file or the code in a program will become increasingly garbled. There actually are physical processes that produce such effects (alpha particles generated by trace radionuclides in ceram...
bit rot3 => change the contents of a computer memory unpredictably, and various kinds of subtle media failures can corrupt files in mass storage), but they are quite rare (and computers are built with error-detecting circuitry to compensate for them)...
bit rot4 => hackers that cosmic rays are among the causes of such events turns out to be a myth; see the {cosmic rays} entry for details. The term {software rot} is almost synonymous. Software rot is the effect, bit rot the notional cause. 
bit twiddling => n. 1. (pejorative) An exercise in tuning in which incredible amounts of time and effort go to produce little noticeable improvement, often with the result that the code has become incomprehensible. 2. Aimless small modification to a ...
bit twiddling2 => goal. 3. Approx. syn. for {bit bashing}; esp. used for the act of frobbing the device control register of a peripheral in an attempt to get it back to a known state. 
bit-paired keyboard => n. obs. (alt. `bit-shift keyboard') A non-standard keyboard layout that seems to have originated with the Teletype ASR-33 and remained common for several years on early computer equipment. The ASR-33 was a mechanical device (se...
bit-paired keyboard2 => generate the character codes from keystrokes was by some physical linkage. The design of the ASR-33 assigned each character key a basic pattern that could be modified by flipping bits if the SHIFT or the CTRL key was pressed. ...

factpacks/jargon.fact  view on Meta::CPAN

CPU Wars2 => many references to ADVENT and the immortal line "Eat flaming death, minicomputer mongrels!" (uttered, of course, by an IPM stormtrooper). It is alleged that the author subsequently received a letter of appreciation on IBM company station...
CPU Wars3 => J. Watson Research Laboratories (then, as now, one of the few islands of true hackerdom in the IBM archipelago). The lower loop of the B in the IBM logo, it is said, had been carefully whited out. See {eat flaming death}. 
cracker => n. One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of hacker (q.v., sense 8). An earlier attempt to establish `worm' in this sense around 1981--82 on USENET was largely a failure.
crank => [from automotive slang] vt. Verb used to describe the performance of a machine, especially sustained performance. "This box cranks (or, cranks at) about 6 megaflops, with a burst mode of twice that on vectorized operations."
crash => 1. n. A sudden, usually drastic failure. Most often said of the system (q.v., sense 1), sometimes of magnetic disk drives. "Three lusers lost their files in last night's disk crash." A disk crash that involves the read/write heads dropping o...
crash and burn => vi.,n. A spectacular crash, in the mode of the conclusion of the car-chase scene in the movie "Bullitt" and many subsequent imitators. Sun-3 monitors losing the flyback transformer and lightning strikes on VAX-11/780 backplanes are ...
crash and burn2 => The construction `crash-and-burn machine' is reported for a computer used exclusively for alpha or beta testing, or reproducing bugs (i.e., not for development). The implication is that it wouldn't be such a disaster if that machin...
crash and burn3 => would be inconvenienced. 
crawling horror => n. Ancient crufty hardware or software that is kept obstinately alive by forces beyond the control of the hackers at a site. Like {dusty deck} or gonkulator, but connotes that the thing described is not just an irritation but an ac...
crawling horror2 => "Mostly we code new stuff in C, but they pay us to maintain one big FORTRAN II application from nineteen-sixty-X that's a real crawling horror...." Compare WOMBAT. 
cray => /kray/ n. 1. (properly, capitalized) One of the line of supercomputers designed by Cray Research. 2. Any supercomputer at all. 3. The canonical number-crunching machine. The term is actually the lowercased last name of Seymour Cray, a noted c...
cray instability => n. A shortcoming of a program or algorithm that manifests itself only when a large problem is being run on a powerful machine (see cray). Generally more subtle than bugs that can be detected in smaller problems running on a workst...
crayola => /kray-oh'l*/ n. A super-mini or -micro computer that provides some reasonable percentage of supercomputer performance for an unreasonably low price. Might also be a {killer micro}.
crayon => n. 1. Someone who works on Cray supercomputers. More specifically, it implies a programmer, probably of the CDC ilk, probably male, and almost certainly wearing a tie (irrespective of gender). Systems types who have a UNIX background tend n...
creationism => n. The (false) belief that large, innovative designs can be completely specified in advance and then painlessly magicked out of the void by the normal efforts of a team of normally talented programmers. In fact, experience has shown re...
creeping elegance => n. Describes a tendency for parts of a design to become elegant past the point of diminishing return. This often happens at the expense of the less interesting parts of the design, the schedule, and other things deemed important ...
creeping elegance2 => {creeping featurism}, {second-system effect}, tense. 
creeping featurism => /kree'ping fee'chr-izm/ n. 1. Describes a systematic tendency to load more chrome and features onto systems at the expense of whatever elegance they may have possessed when originally designed. See also {feeping creaturism}. "Yo...
creeping featurism2 => BSD UNIX has always been creeping featurism." 2. More generally, the tendency for anything complicated to become even more complicated because people keep saying "Gee, it would be even better if it had this feature too". (See f...
creeping featurism3 => a patchwork because it grew one ad-hoc step at a time, rather than being planned. Planning is a lot of work, but it's easy to add just one extra little feature to help someone ... and then another ... and another.... When creep...
creeping featurism4 => like a cancer. Usually this term is used to describe computer programs, but it could also be said of the federal government, the IRS 1040 form, and new cars. A similar phenomenon sometimes afflicts conscious redesigns; see {sec...

factpacks/jargon.fact  view on Meta::CPAN

flag day => n. A software change that is neither forward- nor backward-compatible, and which is costly to make and costly to reverse. "Can we install that without causing a flag day for all users?" This term has nothing to do with the use of the word...
flag day2 => two values. It came into use when a massive change was made to the {Multics} timesharing system to convert from the old ASCII code to the new one; this was scheduled for Flag Day (a U.S. holiday), June 14, 1966. See also {backward combat...
flaky => adj. (var sp. `flakey') Subject to frequent lossage. This use is of course related to the common slang use of the word to describe a person as eccentric, crazy, or just unreliable. A system that is flaky is working, sort of --- enough that y...
flamage => /flay'm*j/ n. Flaming verbiage, esp. high-noise, low-signal postings to USENET or other electronic fora. Often in the phrase `the usual flamage'. `Flaming' is the act itself; `flamage' the content; a `flame' is a single flaming message. Se...
flame => 1. vi. To post an email message intended to insult and provoke. 2. vi. To speak incessantly and/or rabidly on some relatively uninteresting subject or with a patently ridiculous attitude. 3. vt. Either of senses 1 or 2, directed with hostili...
flame bait => n. A posting intended to trigger a {flame war}, or one that invites flames in reply.
flame on => vi.,interj. 1. To begin to flame. The punning reference to Marvel Comics's Human Torch is no longer widely recognized. 2. To continue to flame. See rave, burble.
flame war => n. (var. `flamewar') An acrimonious dispute, especially when conducted on a public electronic forum such as USENET.
flamer => n. One who habitually flames. Said esp. of obnoxious USENET personalities.
flap => vt. 1. To unload a DECtape (so it goes flap, flap, flap...). Old-time hackers at MIT tell of the days when the disk was device 0 and microtapes were 1, 2,... and attempting to flap device 0 would instead start a motor banging inside a cabinet...
flarp => /flarp/ [Rutgers University] n. Yet another metasyntactic variable (see foo). Among those who use it, it is associated with a legend that any program not containing the word `flarp' somewhere will not work. The legend is discreetly silent on...
flat => adj. 1. Lacking any complex internal structure. "That {bitty box} has only a flat filesystem, not a hierarchical one." The verb form is flatten. 2. Said of a memory architecture (like that of the VAX or 680x0) that is one big linear address s...
flat-ASCII => adj. Said of a text file that contains only 7-bit ASCII characters and uses only ASCII-standard control characters (that is, has no embedded codes specific to a particular text formatter or markup language, and no meta-characters). Syn....
flat-file => adj. A flattened representation of some database or tree or network structure as a single file from which the structure could implicitly be rebuilt, esp. one in flat-ASCII form.
flatten => vt. To remove structural information, esp. to filter something with an implicit tree structure into a simple sequence of leaves; also tends to imply mapping to flat-ASCII. "This code flattens an expression with parentheses into an equivale...
flavor => n. 1. Variety, type, kind. "DDT commands come in two flavors." "These lights come in two flavors, big red ones and small green ones." See vanilla. 2. The attribute that causes something to be flavorful. Usually used in the phrase "yields ad...
flavorful => adj. Full of flavor; esthetically pleasing. See random and losing for antonyms. See also the entries for taste and elegant.
flippy => /flip'ee/ n. A single-sided floppy disk altered for double-sided use by addition of a second write-notch, so called because it must be flipped over for the second side to be accessible. No longer common.
flowchart => [techspeak] n. An archaic form of visual control-flow specification employing arrows and `speech balloons' of various shapes. Hackers never use flowcharts, consider them extremely silly, and associate them with COBOL programmers, {card w...
flower key => [Mac users] n. See {command key}.
flush => v. 1. To delete something, usually superfluous, or to abort an operation. "All that nonsense has been flushed." 2. [UNIX/C] To force buffered I/O to disk, as with an `fflush(3)' call. This is *not* an abort or deletion as in sense 1, but a d...
Flyspeck 3 => n. Standard name for any font that is so tiny as to be unreadable (by analogy with such names as `Helvetica 10' for 10-point Helvetica). Legal boilerplate is usually printed in Flyspeck 3.
flytrap => n. See {firewall machine}.
FOAF => // [USENET] n. Acronym for `Friend Of A Friend'. The source of an unverified, possibly untrue story. This was not originated by hackers (it is used in Jan Brunvand's books on urban folklore), but is much better recognized on USENET and elsewh...
FOD => /fod/ v. [Abbreviation for `Finger of Death', originally a spell-name from fantasy gaming] To terminate with extreme prejudice and with no regard for other people. From MUDs where the wizard command `FOD <player>' results in the immediate and ...
fold case => v. See {smash case}. This term tends to be used more by people who don't mind that their tools smash case. It also connotes that case is ignored but case distinctions in data processed by the tool in question aren't destroyed.
followup => n. On USENET, a posting generated in response to another posting (as opposed to a reply, which goes by email rather than being broadcast). Followups include the ID of the {parent message} in their headers; smart news-readers can use this ...
foo => /foo/ 1. interj. Term of disgust. 2. Used very generally as a sample name for absolutely anything, esp. programs and files (esp. scratch files). 3. First on the standard list of metasyntactic variables used in syntax examples. See also bar, ba...
foobar => n. Another common metasyntactic variable; see foo. Hackers do *not* generally use this to mean FUBAR in either the slang or jargon sense.
fool => n. As used by hackers, specifically describes a person who habitually reasons from obviously or demonstrably incorrect premises and cannot be persuaded by evidence to do otherwise; it is not generally used in its other senses, i.e., to descri...
fool file, the => [USENET] n. A notional repository of all the most dramatically and abysmally stupid utterances ever. There is a subgenre of {sig block}s that consists of the header "From the fool file" followed by some quote the poster wishes to re...
fool file, the2 => dimwittery; for this to be really effective, the quote has to be so obviously wrong as to be laughable. More than one USENETter has achieved an unwanted notoriety by being quoted in this way. 
Foonly => n. 1. The PDP-10 successor that was to have been built by the Super Foonly project at the Stanford Artificial Intelligence Laboratory along with a new operating system. The intention was to leapfrog from the old DEC timesharing system SAIL ...
footprint => n. 1. The floor or desk area taken up by a piece of hardware. 2. [IBM] The audit trail (if any) left by a crashed program (often in plural, `footprints'). See also toeprint.
for free => adj. Said of a capability of a programming language or hardware equipment that is available by its design without needing cleverness to implement "In APL, we get the matrix operations for free." "And owing to the way revisions are stored ...
for free2 => trees for free." Usually it refers to a serendipitous feature of doing things a certain way (compare {big win}), but it may refer to an intentional but secondary feature. 
for the rest of us => [from the Mac slogan "The computer for the rest of us"] adj. 1. Used to describe a spiffy product whose affordability shames other comparable products, or (more often) used sarcastically to describe spiffy but very overpriced pr...
for the rest of us2 => with a limited interface, deliberately limited capabilities, non-orthogonality, inability to compose primitives, or any other limitation designed to not `confuse' a na"ive user. This places an upper bound on how far that user c...
for the rest of us3 => get in the way of the task instead of helping accomplish it. Used in reference to Macintosh software which doesn't provide obvious capabilities because it is thought that the poor lusers might not be able to handle them. Become...
for the rest of us4 => third-party reference; thus, "Yes, it is an attractive program, but it's designed for The Rest Of Them" means a program that superficially looks neat but has no depth beyond the surface flash. See also {WIMP environment}, Macin...
fora => pl.n. Plural of forum.
foreground => [UNIX] vt. To foreground a task is to bring it to the top of one's stack for immediate processing, and hackers often use it in this sense for non-computer tasks. "If your presentation is due next week, I guess I'd better foreground writ...
forked => [UNIX; prob. influenced by a mainstream expletive] adj. Terminally slow, or dead. Originated when one system slowed to incredibly bad speeds because of a process recursively spawning copies of itself (using the UNIX system call `fork(2)') a...

factpacks/jargon.fact  view on Meta::CPAN

hacker => [originally, someone who makes furniture with an axe] n. 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2...
hacking run => [analogy with `bombing run' or `speed run'] n. A hack session extended long outside normal working times, especially one longer than 12 hours. May cause you to `change phase the hard way' (see phase).
Hacking X for Y => [ITS] n. The information ITS made publicly available about each user (the INQUIR record) was a sort of form in which the user could fill out fields. On display, two of these fields were combined into a project description of the fo...
Hacking X for Y2 => `"Hacking perceptrons for Minsky"'). This form of description became traditional and has since been carried over to other systems with more general facilities for self-advertisement (such as UNIX {plan file}s). 
Hackintosh => n. 1. An Apple Lisa that has been hacked into emulating a Macintosh (also called a `Mac XL'). 2. A Macintosh assembled from parts theoretically belonging to different models in the line.
hackish => /hak'ish/ adj. (also hackishness n.) 1. Said of something that is or involves a hack. 2. Of or pertaining to hackers or the hacker subculture. See also true-hacker.
hackishness => n. The quality of being or involving a hack. This term is considered mildly silly. Syn. hackitude.
hackitude => n. Syn. hackishness; this word is considered sillier.
hair => [back-formation from hairy] n. The complications that make something hairy. "Decoding TECO commands requires a certain amount of hair." Often seen in the phrase `infinite hair', which connotes extreme complexity. Also in `hairiferous' (tendin...
hairy => adj. 1. Annoyingly complicated. "DWIM is incredibly hairy." 2. Incomprehensible. "DWIM is incredibly hairy." 3. Of people, high-powered, authoritative, rare, expert, and/or incomprehensible. Hard to explain except in context "He knows this h...
HAKMEM => /hak'mem/ n. MIT AI Memo 239 (February 1972). A legendary collection of neat mathematical and programming hacks contributed by many people at MIT and elsewhere. (The title of the memo really is "HAKMEM", which is a 6-letterism for `hacks me...
hakspek => /hak'speek/ n. A shorthand method of spelling found on many British academic bulletin boards and {talker system}s. Syllables and whole words in a sentence are replaced by single ASCII characters the names of which are phonetically similar ...
hamster => n. 1. [Fairchild] A particularly slick little piece of code that does one thing well; a small, self-contained hack. The image is of a hamster happily spinning its exercise wheel. 2. [UK] Any item of hardware made by Amstrad, a company famo...
hand-hacking => n. 1. The practice of translating {hot spot}s from an HLL into hand-tuned assembler, as opposed to trying to coerce the compiler into generating better code. Both the term and the practice are becoming uncommon. See tune, bum, {by han...
handshaking => n. Hardware or software activity designed to start or keep two machines or programs in synchronization as they {do protocol}. Often applied to human activity; thus, a hacker might watch two people in conversation nodding their heads to...
handwave => [poss. from gestures characteristic of stage magicians] 1. v. To gloss over a complex point; to distract a listener; to support a (possibly actually valid) point with blatantly faulty logic. 2. n. The act of handwaving. "Boy, what a handw...
hang => v. 1. To wait for an event that will never occur. "The system is hanging because it can't read from the crashed drive". See wedged, hung. 2. To wait for some event to occur; to hang around until something happens. "The program displays a menu...
Hanlon's Razor => prov. A corollary of {Finagle's Law}, similar to Occam's Razor, that reads "Never attribute to malice that which can be adequately explained by stupidity." The derivation of the common title Hanlon's Razor is unknown; a similar epig...
Hanlon's Razor2 => James. Quoted here because it seems to be a particular favorite of hackers, often showing up in {fortune cookie} files and the login banners of BBS systems and commercial networks. This probably reflects the hacker's daily experien...
Hanlon's Razor3 => well-intentioned but short-sighted people. 
happily => adv. Of software, used to emphasize that a program is unaware of some important fact about its environment, either because it has been fooled into believing a lie, or because it doesn't care. The sense of `happy' here is not that of elatio...

factpacks/jargon.fact  view on Meta::CPAN

mode => n. A general state, usually used with an adjective describing the state. Use of the word `mode' rather than `state' implies that the state is extended over time, and probably also that some activity characteristic of that state is being carri...
mode bit => n. A flag, usually in hardware, that selects between two (usually quite different) modes of operation. The connotations are different from flag bit in that mode bits are mainly written during a boot or set-up phase, are seldom explicitly ...
mode bit2 => lifetime of an ordinary program. The classic example was the EBCDIC-vs.-ASCII bit (#12) of the Program Status Word of the IBM 360. Another was the bit on a PDP-12 that controlled whether it ran the PDP-8 or the LINC instruction set. 
modulo => /mo'dyu-loh/ prep. Except for. From mathematical terminology; one can consider saying that 4 = 22 except for the 9s (4 = 22 mod 9). "Well, LISP seems to work okay now, modulo that GC bug." "I feel fine today modulo a slight headache."
molly-guard => /mol'ee-gard/ [University of Illinois] n. A shield to prevent tripping of some {Big Red Switch} by clumsy or ignorant hands. Originally used of some plexiglass covers improvised for the BRS on an IBM 4341 after a programmer's toddler d...
Mongolian Hordes technique => n. Development by {gang bang} (poss. from the Sixties counterculture expression `Mongolian clusterfuck' for a public orgy). Implies that large numbers of inexperienced programmers are being put on a job better performed ...
Mongolian Hordes technique2 => `Chinese Army technique'; see also {Brooks's Law}. 
monkey up => vt. To hack together hardware for a particular task, especially a one-shot job. Connotes an extremely crufty and consciously temporary solution. Compare {hack up}, {kluge up}, {cruft together}, {cruft together}.
monkey, scratch => n. See {scratch monkey}.
monstrosity => 1. n. A ridiculously elephantine program or system, esp. one that is buggy or only marginally functional. 2. The quality of being monstrous (see `Overgeneralization' in the discussion of jargonification). See also baroque.
Moof => /moof/ [MAC users] n. The Moof or `dogcow' is a semi-legendary creature that lurks in the depths of the Macintosh Technical Notes Hypercard stack V3.1; specifically, the full story of the dogcow is told in technical note #31 (the particular M...
Moore's Law => /morz law/ prov. The observation that the logic density of silicon integrated circuits has closely followed the curve (bits per square inch) = 2^{(n - 1962)}; that is, the amount of information storable in one square inch of silicon ha...
Moore's Law2 => since the technology was invented. See also {Parkinson's Law of Data}. 
moria => /mor'ee-*/ n. Like nethack and rogue, one of the large PD Dungeons-and-Dragons-like simulation games, available for a wide range of machines and operating systems. Extremely addictive and a major consumer of time better used for hacking.
MOTAS => /moh-toz/ [USENET: Member Of The Appropriate Sex, after MOTOS and MOTSS] n. A potential or (less often) actual sex partner. See also SO.
MOTOS => /moh-tohs/ [acronym from the 1970 U.S. census forms via USENET: Member Of The Opposite Sex] n. A potential or (less often) actual sex partner. See MOTAS, MOTSS, SO. Less common than MOTSS or MOTAS, which have largely displaced it.
MOTSS => /mots/ or /M-O-T-S-S/ [from the 1970 U.S. census forms via USENET, Member Of The Same Sex] n. Esp. one considered as a possible sexual partner. The gay-issues newsgroup on USENET is called soc.motss. See MOTOS and MOTAS, which derive from it...
mouse ahead => vi. Point-and-click analog of `type ahead'. To manipulate a computer's pointing device (almost always a mouse in this usage, but not necessarily) and its selection or command buttons before a computer program is ready to accept such in...
mouse ahead2 => accepting the input. Handling this properly is rare, but it can help make a {WIMP environment} much more usable, assuming the users are familiar with the behavior of the user interface. 
mouse around => vi. To explore public portions of a large system, esp. a network such as Internet via FTP or TELNET, looking for interesting stuff to snarf.
mouse belt => n. See {rat belt}.

factpacks/jargon.fact  view on Meta::CPAN

pessimizing compiler => /pes'*-miz`ing k*m-pil'r/ [antonym of `optimizing compiler'] n. A compiler that produces object code that is worse than the straightforward or obvious hand translation. The implication is that the compiler is actually trying t...
pessimizing compiler2 => excessive cleverness is doing the opposite. A few pessimizing compilers have been written on purpose, however, as pranks or burlesques. 
peta- => /pe't*/ [SI] pref. See {quantifiers}.
PETSCII => /pet'skee/ [abbreviation of PET ASCII] n. The variation (many would say perversion) of the {ASCII} character set used by the Commodore Business Machines PET series of personal computers and the later Commodore C64, C16, and C128 machines. ...
phase => 1. n. The phase of one's waking-sleeping schedule with respect to the standard 24-hour cycle. This is a useful concept among people who often work at night and/or according to no fixed schedule. It is not uncommon to change one's phase by as...
phase of the moon => n. Used humorously as a random parameter on which something is said to depend. Sometimes implies unreliability of whatever is dependent, or that reliability seems to be dependent on conditions nobody has been able to determine. "...
phase of the moon2 => channel open in mumble mode, having the foo switch set, and on the phase of the moon." True story Once upon a time there was a bug that really did depend on the phase of the moon. There is a little subroutine that had traditiona...
phase of the moon3 => MIT to calculate an approximation to the moon's true phase. GLS incorporated this routine into a LISP program that, when it wrote out a file, would print a timestamp line almost 80 characters long. Very occasionally the first li...
phase of the moon4 => and would overflow onto the next line, and when the file was later read back in the program would barf. The length of the first line depended on both the precise date and time and the length of the phase specification when the t...
phase of the moon5 => bug literally depended on the phase of the moon! The first paper edition of the Jargon File (Steele-1983) included an example of one of the timestamp lines that exhibited this bug, but the typesetter `corrected' it. This has sin...
phreaking => [from `phone phreak'] n. 1. The art and science of cracking the phone network (so as, for example, to make free long-distance calls). 2. By extension, security-cracking in any other context (especially, but not exclusively, on communicat...
pico- => [SI a quantifier meaning * 10^-12] pref. Smaller than nano-; used in the same rather loose connotative way as nano- and micro-. This usage is not yet common in the way nano- and micro- are, but should be instantly recognizable to any hacker....
run like a pig => v. To run very slowly on given hardware, said of software. Distinct from hog.
pilot error => [Sun from aviation] n. A user's misconfiguration or misuse of a piece of software, producing apparently buglike results (compare UBD). "Joe Luser reported a bug in sendmail that causes it to generate bogus headers." "That's not a bug, ...
ping => [from the TCP/IP acronym `Packet INternet Groper', prob. originally contrived to match the submariners' term for a sonar pulse] 1. n. Slang term for a small network message (ICMP ECHO) sent by a computer to check for the presence and alivenes...
Pink-Shirt Book => `The Peter Norton Programmer's Guide to the IBM PC'. The original cover featured a picture of Peter Norton with a silly smirk on his face, wearing a pink shirt. Perhaps in recognition of this usage, the current edition has a differ...
Pink-Shirt Book2 => pink shirt. See also {{book titles}}. 
PIP => /pip/ [Peripheral Interchange Program] vt.,obs. To copy; from the program PIP on CP/M, RSX-11, RSTS/E, and OS/8 (derived from a utility on the PDP-6) that was used for file copying (and in OS/8 and RT-11 for just about every other file operati...
pistol => [IBM] n. A tool that makes it all too easy for you to shoot yourself in the foot. "UNIX `rm *' makes such a nice pistol!"
pizza box => [Sun] n. The largish thin box housing the electronics in (especially Sun) desktop workstations, so named because of its size and shape and the dimpled pattern that looks like air holes. Two meg single-platter removable disk packs used to...
pizza box2 => they were stuck into was referred to as a pizza oven. It's an index of progress that in the old days just the disk was pizza-sized, while now the entire computer is. 

factpacks/jargon.fact  view on Meta::CPAN

sanity check3 => 2. A run-time test, either validating input or ensuring that the program hasn't screwed up internally (producing an inconsistent value or state). 
Saturday night special => [from police slang for a cheap handgun] n. A program or feature kluged together during off hours, under a deadline, and in response to pressure from a salescritter. Such hacks are dangerously unreliable, but all too often sn...
say => vt. 1. To type to a terminal. "To list a directory verbosely, you have to say `ls -l'." Tends to imply a newline-terminated command (a `sentence'). 2. A computer may also be said to `say' things to you, even if it doesn't have a speech synthes...
science-fiction fandom => n. Another voluntary subculture having a very heavy overlap with hackerdom; most hackers read SF and/or fantasy fiction avidly, and many go to `cons' (SF conventions) or are involved in fandom-connected activities such as th...
science-fiction fandom2 => Some hacker jargon originated in SF fandom; see defenestration, great-wall, cyberpunk, h, {ha ha only serious}, IMHO, mundane, neep-neep, {Real Soon Now}. Additionally, the jargon terms cowboy, cyberspace, de-rezz, {go flat...
science-fiction fandom3 => virus, wetware, wirehead, and worm originated in SF stories. 
scram switch => [from the nuclear power industry] n. An emergency-power-off switch (see {Big Red Switch}), esp. one positioned to be easily hit by evacuating personnel. In general, this is *not* something you frob lightly; these often initiate expens...
scram switch2 => and are installed in a {dinosaur pen} for use in case of electrical fire or in case some luckless {field servoid} should put 120 volts across himself while {Easter egging}. 
scratch => 1. [from `scratchpad'] adj. Describes a data structure or recording medium attached to a machine for testing or temporary-use purposes; one that can be scribbled on without loss. Usually in the combining forms `scratch memory', `scratch re...
scratch monkey => n. As in "Before testing or reconfiguring, always mount a {scratch monkey}", a proverb used to advise caution when dealing with irreplaceable data or devices. Used to refer to any scratch volume hooked to a computer during any risky...
scratch monkey2 => precious resource or data that might otherwise get trashed. This term preserves the memory of Mabel, the Swimming Wonder Monkey, star of a biological research program at the University of Toronto ca. 1986. Mabel was not (so the leg...
scratch monkey3 => university had spent years teaching her how to swim, breathing through a regulator, in order to study the effects of different gas mixtures on her physiology. Mabel suffered an untimely demise one day when DEC PMed the PDP-11 contr...
scratch monkey4 => {provocative maintainance}). It is recorded that, after calming down an understandably irate customer sufficiently to ascertain the facts of the matter, a DEC troubleshooter called up the {field circus} manager responsible and aske...
scratch monkey5 => all the consequences to humans were so amusing; the sysop of the machine in question was nearly thrown in jail at the behest of certain clueless droids at the local `humane' society. The moral is clear When in doubt, always mount a...
screw => [MIT] n. A lose, usually in software. Especially used for user-visible misbehavior caused by a bug or misfeature. This use has become quite widespread outside MIT.
screwage => /skroo'*j/ n. Like lossage but connotes that the failure is due to a designed-in misfeature rather than a simple inadequacy or a mere bug.
scribble => n. To modify a data structure in a random and unintentionally destructive way. "Bletch! Somebody's disk-compactor program went berserk and scribbled on the i-node table." "It was working fine until one of the allocation routines scribbled...
scrog => /skrog/ [Bell Labs] vt. To damage, trash, or corrupt a data structure. "The list header got scrogged." Also reported as `skrog', and ascribed to the comic strip "The Wizard of Id". Equivalent to scribble or mangle.
scrool => /skrool/ [from the pioneering Roundtable chat system in Houston ca. 1984; prob. originated as a typo for `scroll'] n. The log of old messages, available for later perusal or to help one get back in synch with the conversation. It was origin...
scrozzle => /skroz'l/ vt. Used when a self-modifying code segment runs incorrectly and corrupts the running program or vital data. "The damn compiler scrozzled itself again!"
SCSI => [Small Computer System Interface] n. A bus-independent standard for system-level interfacing between a computer and intelligent devices. Typically annotated in literature with `sexy' (/sek'see/), `sissy' (/sis'ee/), and `scuzzy' (/skuh'zee/) ...

factpacks/jargon.fact  view on Meta::CPAN

software rot6 => We can snarf this opcode, right? No one uses it.") Another classic example of this sprang from the time an MIT hacker found a simple way to double the speed of the unconditional jump instruction on a PDP-6, so he patched the hardware...
software rot7 => fragile timing software in a music-playing program, throwing its output out of tune. This was fixed by adding a defensive initialization routine to compare the speed of a timing loop with the real-time clock; in other words, it figur...
software rot8 => day, and corrected appropriately. Compare {bit rot}. 
softwarily => /soft-weir'i-lee/ adv. In a way pertaining to software. "The system is softwarily unreliable." The adjective `softwary' is *not* used. See hardwarily.
softy => [IBM] n. Hardware hackers' term for a software expert who is largely ignorant of the mysteries of hardware.
some random X => adj. Used to indicate a member of class X, with the implication that Xs are interchangeable. "I think some random cracker tripped over the guest timeout last night." See also {J. Random}.
sorcerer's apprentice mode => [from the film "Fantasia"] n. A bug in a protocol where, under some circumstances, the receipt of a message causes multiple messages to be sent, each of which, when received, triggers the same bug. Used esp. of such beha...
sorcerer's apprentice mode2 => loops in email software. Compare {broadcast storm}, {network meltdown}. 
SOS => n.,obs. /S-O-S/ 1. An infamously losing text editor. Once, back in the 1960s, when a text editor was needed for the PDP-6, a hacker crufted together a quick-and-dirty `stopgap editor' to be used until a better one was written. Unfortunately, t...
source of all good bits => n. A person from whom (or a place from which) useful information may be obtained. If you need to know about a program, a guru might be the source of all good bits. The title is often applied to a particularly competent secr...
space-cadet keyboard => n. The Knight keyboard, a now-legendary device used on MIT LISP machines, which inspired several still-current jargon terms and influenced the design of EMACS. It was inspired by the Stanford keyboard and equipped with no fewe...
space-cadet keyboard2 => keys for {bucky bits} (`control', `meta', `hyper', and `super') and three like regular shift keys, called `shift', `top', and `front'. Many keys had three symbols on them a letter and a symbol on the top, and a Greek letter o...
space-cadet keyboard3 => key had an `L' and a two-way arrow on the top, and the Greek letter lambda on the front. And of course each of these might also be typed with any combination of the control, meta, hyper, and super keys. On this keyboard, you ...
space-cadet keyboard4 => characters! This allowed the user to type very complicated mathematical text, and also to have thousands of single-character commands at his disposal. Many hackers were actually willing to memorize the command meanings of tha...
space-cadet keyboard5 => typing time (this attitude obviously shaped the interface of EMACS). Other hackers, however, thought having that many bucky bits was overkill, and objected that such a keyboard can require three or four hands to operate. See ...
space-cadet keyboard6 => bucky}, {meta bit}, {quadruple bucky}. 
SPACEWAR => n. A space-combat simulation game, inspired by E. E. "Doc" Smith's "Lensman" books, in which two spaceships duel around a central sun, shooting torpedoes at each other and jumping through hyperspace. This game was first implemented on the...
spaghetti code => n. Code with a complex and tangled control structure, esp. one using many GOTOs, exceptions, or other `unstructured' branching constructs. Pejorative. The synonym `kangaroo code' has been reported, doubtless because such code has ma...
spaghetti inheritance => n. [encountered among users of object-oriented languages that use inheritance, such as Smalltalk] A convoluted class-subclass graph, often resulting from carelessly deriving subclasses from other classes just for the sake of ...
spaghetti inheritance2 => (successful) attempt to discourage such practice, through guilt-by-association with {spaghetti code}. 
spam => [from the MUD community] vt. To crash a program by overrunning a fixed-size buffer with excessively large input data. See also {buffer overflow}, {overrun screw}, {smash the stack}.

factpacks/jargon.fact  view on Meta::CPAN

time sink => [poss. by analogy with `heat sink or `current sink] n. A project that consumes unbounded amounts of time.
time T => /tim T/ n. 1. An unspecified but usually well-understood time, often used in conjunction with a later time T+1. "Well meet on campus at time T or at Louies at time T+1" means, in the context of going out for dinner "We can meet on campus an...
time T2 => Louies itself a bit later." (Louies is a Chinese restaurant in Palo Alto that is a favorite with hackers.) Had the number 30 been used instead of the number 1, it would have implied that the travel time from campus to Louies is 30 minutes;...
time T3 => hasnt been decided on yet), you can meet half an hour later at Louies than you could on campus and end up eating at the same time. See also {since time T equals minus infinity}. 
times-or-divided-by => [by analogy with `plus-or-minus] quant. Term occasionally used when describing the uncertainty associated with a scheduling estimate, for either humorous or brutally honest effect. For a software project, the factor is usually ...
tinycrud => /tinee-kruhd/ n. A pejorative used by habitues of older game-oriented MUD versions for TinyMUDs and other user-extensible MUD variants; esp. common among users of the rather violent and competitive AberMUD and MIST systems. These people j...
tip of the ice-cube => [IBM] n. The visible part of something small and insignificant. Used as an ironic comment in situations where `tip of the iceberg might be appropriate if the subject were actually nontrivial.
tired iron => [IBM] n. Hardware that is perfectly functional but far enough behind the state of the art to have been superseded by new products, presumably with sufficient improvement in bang-per-buck that the old stuff is starting to look a bit like...
tits on a keyboard => n. Small bumps on certain keycaps to keep touch-typists registered (usually on the `5 of a numeric keypad, and on the `F and `J of a QWERTY keyboard).
TLA => /T-L-A/ [Three-Letter Acronym] n. 1. Self-describing acronym for a species with which computing terminology is infested. 2. Any confusing acronym. Examples include MCA, FTP, SNA, CPU, MMU, SCCS, DMU, FPU, NNTP, TLA. People who like this looser...
TMRC => /tmerk/ n. The Tech Model Railroad Club at MIT, one of the wellsprings of hacker culture. The 1959 `Dictionary of the TMRC Language compiled by Peter Samson included several terms which became basics of the hackish vocabulary (see esp. foo an...
to a first approximation => 1. [techspeak] When one is doing certain numerical computations, an approximate solution may be computed by any of several heuristic methods, then refined to a final value. By using the starting point of a first approximat...
to a first approximation2 => algorithm that converges more quickly to the correct result. 2. In jargon, a preface to any comment that indicates that the comment is only approximately true. The remark "To a first approximation, I feel good" might indi...
to a first approximation3 => reveal that not all is perfect (e.g., a nagging cough still remains after an illness). 
to a zeroth approximation => [from `to a first approximation] A *really* sloppy approximation; a wild guess. Compare {social science number}.
toast => 1. n. Any completely inoperable system or component, esp. one that has just crashed and burned "Uh, oh ... I think the serial board is toast." 2. vt. To cause a system to crash accidentally, especially in a manner that requires manual reboot...
toaster => n. 1. The archetypal really stupid application for an embedded microprocessor controller; often used in comments that imply that a scheme is inappropriate technology (but see {elevator controller}). "DWIM for an assembler? Thatd be as sill...
toeprint => n. A footprint of especially small size.
toggle => vt. To change a bit from whatever state it is in to the other state; to change from 1 to 0 or from 0 to 1. This comes from `toggle switches, such as standard light switches, though the word `toggle actually refers to the mechanism that keep...
tool => 1. n. A program used primarily to create, manipulate, modify, or analyze other programs, such as a compiler or an editor or a cross-referencing program. Oppose app, {operating system}. 2. [UNIX] An application program with a simple, `transpar...
toolsmith => n. The software equivalent of a tool-and-die specialist; one who specializes in making the tools with which other programmers create applications. See also uninteresting.

factpacks/jargon.fact  view on Meta::CPAN

visionary => n. 1. One who hacks vision, in the sense of an Artificial Intelligence researcher working on the problem of getting computers to `see' things using TV cameras. (There isn't any problem in sending information from a TV camera to a compute...
VMS => /V-M-S/ n. DEC's proprietary operating system for its VAX minicomputer; one of the seven or so environments that loom largest in hacker folklore. Many UNIX fans generously concede that VMS would probably be the hacker's favorite commercial OS ...
voice => vt. To phone someone, as opposed to emailing them or connecting in talk mode. "I'm busy now; I'll voice you later."
voice-net => n. Hackish way of referring to the telephone system, analogizing it to a digital network. USENET {sig block}s not uncommonly include the sender's phone next to a "Voice" or "Voice-Net" header; common variants of this are "Voicenet" and "...
voodoo programming => [from George Bush's "voodoo economics"] n. The use by guess or cookbook of an obscure or hairy system, feature, or algorithm that one does not truly understand. The implication is that the technique may not work, and if it doesn...
voodoo programming2 => Almost synonymous with {black magic}, except that black magic typically isn't documented and *nobody* understands it. Compare magic, {deep magic}, {heavy wizardry}, {rain dance}, {cargo cult programming}, {wave a dead chicken}....
VR => // [MUD] n. On-line abbrev for {virtual reality}, as opposed to RL.
Vulcan nerve pinch => n. [from the old "Star Trek" TV series via Commodore Amiga hackers] The keyboard combination that forces a soft-boot or jump to ROM monitor (on machines that support such a feature). On many micros this is Ctrl-Alt-Del; on Suns,...
Vulcan nerve pinch2 => <Cmd>-<Power switch>! Also called {three-finger salute}. Compare {quadruple bucky}. 
vulture capitalist => n. Pejorative hackerism for `venture capitalist', deriving from the common practice of pushing contracts that deprive inventors of control over their own innovations and most of the money they ought to have made from them.*wabbi...
vulture capitalist2 => Fudd's immortal line "You wascawwy wabbit!"] n. 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978. The program would make two copies of itself every time it was run, eventually crashing the sys...
vulture capitalist3 => includes infinite self-replication but is not a virus or worm. See also {cookie monster}. 
WAITS => /wayts/ n. The mutant cousin of {TOPS-10} used on a handful of systems at {SAIL} up to 1990. There was never an `official' expansion of WAITS (the name itself having been arrived at by a rather sideways process), but it was frequently glosse...
waldo => /wol'doh/ [From Robert A. Heinlein's story "Waldo"] 1. A mechanical agent, such as a gripper arm, controlled by a human limb. When these were developed for the nuclear industry in the mid-1940s they were named after the invention described b...
walk => n.,vt. Traversal of a data structure, especially an array or linked-list data structure in core. See also codewalker, {silly walk}, clobber.
walk off the end of => vt. To run past the end of an array, list, or medium after stepping through it --- a good way to land in trouble. Often the result of an {off-by-one error}. Compare clobber, roach, {smash the stack}.
walking drives => n. An occasional failure mode of magnetic-disk drives back in the days when they were huge, clunky {washing machine}s. Those old dinosaur parts carried terrific angular momentum; the combination of a misaligned spindle or worn beari...
walking drives2 => with the floor could cause them to `walk' across a room, lurching alternate corners forward a couple of millimeters at a time. There is a legend about a drive that walked over to the only door to the computer room and jammed it shu...
walking drives3 => wall in order to get at it! Walking could also be induced by certain patterns of drive access (a fast seek across the whole width of the disk, followed by a slow seek in the other direction). Some bands of old-time hackers figured ...
walking drives4 => patterns that would do this to particular drive models and held disk-drive races. 
wall => [WPI] interj. 1. An indication of confusion, usually spoken with a quizzical tone "Wall??" 2. A request for further explication. Compare {octal forty}. It is said that "Wall?" really came from `like talking to a blank wall'. It was initially ...
wall follower => n. A person or algorithm that compensates for lack of sophistication or native stupidity by efficiently following some simple procedure shown to have been effective in the past. Used of an algorithm, this is not necessarily pejorativ...
wall follower2 => the winning robot in an early AI contest (named, of course, after the cocktail). Harvey successfully solved mazes by keeping a `finger' on one wall and running till it came out the other end. This was inelegant, but it was mathemati...
wall follower3 => simply-connected mazes --- and, in fact, Harvey outperformed more sophisticated robots that tried to `learn' each maze by building an internal representation of it. Used of humans, the term *is* pejorative and implies an uncreative,...
wall follower4 => See also {code grinder}, droid. 
wall time => n. (also `wall clock time') 1. `Real world' time (what the clock on the wall shows), as opposed to the system clock's idea of time. 2. The real running time of a program, as opposed to the number of clocks required to execute it (on a ti...
wall time2 => differ, as no one program gets all the clocks, and on multiprocessor systems with good thread support one may get more processor clocks than real-time clocks). 
wallpaper => n. 1. A file containing a listing (e.g., assembly listing) or a transcript, esp. a file containing a transcript of all or part of a login session. (The idea was that the paper for such listings was essentially good only for wallpaper, as...



( run in 0.469 second using v1.01-cache-2.11-cpan-49f99fa48dc )