Remove spaces

This commit is contained in:
Bob Mottram 2018-10-15 19:54:35 +01:00
parent 4e850da551
commit c1257f5339
34 changed files with 48 additions and 77 deletions

View File

@ -1,6 +1,6 @@
B1FF
/bif/ , BIFF , n. The most famous pseudo , and the prototypical newbie.
/bif/ , BIFF , n. The most famous pseudo, and the prototypical newbie.
Articles from B1FF feature all uppercase letters sprinkled liberally with
bangs, typos, cute misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ KL DOOD AN
HE RITES REEL AWESUM THINGZ IN CAPITULL LETTRS LIKE THIS!!!), use (and often
@ -11,8 +11,7 @@ to come from a variety of sites. However, BITNET seems to be the most
frequent origin. The theory that B1FF is a denizen of BITNET is supported by
B1FF's (unfortunately invalid) electronic mail address: B1FF@BIT.NET. [1993:
Now It Can Be Told! My spies inform me that B1FF was originally created by
Joe Talmadge jat@cup.hp.com , also the author of the infamous and
Joe Talmadge jat@cup.hp.com, also the author of the infamous and
much-plagiarized Flamer's Bible. The BIFF filter he wrote was later passed
to Richard Sexton, who posted BIFFisms much more widely. Versions have since
been posted for the amusement of the net at large. See also Jeff K.

View File

@ -1,5 +1,4 @@
B5
// [common] Abbreviation for Babylon 5 , a science-fiction TV series as
// [common] Abbreviation for Babylon 5, a science-fiction TV series as
revered among hackers as was the original Star Trek.

View File

@ -1,6 +1,6 @@
BCPL
// , n. [abbreviation, Basic Combined Programming Language ) A programming
// , n. [abbreviation, Basic Combined Programming Language) A programming
language developed by Martin Richards in Cambridge in 1967. It is remarkable
for its rich syntax, small size of compiler (it can be run in 16k) and
extreme portability. It reached break-even point at a very early stage, and
@ -10,4 +10,3 @@ having lost count. It has only one data type (a machine word) which can be
used as an integer, a character, a floating point number, a pointer, or
almost anything else, depending on context. BCPL was a precursor of C, which
inherited some of its features.

View File

@ -1,8 +1,7 @@
BDFL
Benevolent Dictator For Life. Guido , considered in his role as the project
Benevolent Dictator For Life. Guido, considered in his role as the project
leader of Python. People who are feeling temporarily cheesed off by one of
his decisions sometimes leave off the B. The mental image that goes with
this, of a cigar-chomping caudillo in gold braid and sunglasses, is
extremely funny to anyone who has ever met Guido in person.

View File

@ -1,9 +1,8 @@
BFI
/BFI/ , n. See brute force and ignorance. Also encountered in the variants
BFMI , brute force and massive ignorance and BFBI brute force and bloody
BFMI, brute force and massive ignorance and BFBI brute force and bloody
ignorance. In some parts of the U.S. this abbreviation was probably
reinforced by a company called Browning-Ferris Industries in the
waste-management business; a large BFI logo in white-on-blue could be seen
on the sides of garbage trucks.

View File

@ -6,10 +6,10 @@ metasyntactic notation used to specify the syntax of programming languages,
command sets, and the like. Widely used for language descriptions but seldom
documented anywhere, so that it must usually be learned by osmosis from
other hackers. Consider this BNF for a U.S. postal address: postal-address
::= name-part street-address zip-part personal-part ::= name | initial .
name-part ::= personal-part last-name [ jr-part ] EOL | personal-part
::= name-part street-address zip-part personal-part ::= name | initial .
name-part ::= personal-part last-name [ jr-part ] EOL | personal-part
name-part street-address ::=[ apt ] house-num street-name EOL zip-part
::= town-name , state-code ZIP-code EOL This translates into English as:
::= town-name, state-code ZIP-code EOL This translates into English as:
A postal-address consists of a name-part, followed by a street-address part,
followed by a zip-code part. A personal-part consists of either a first name
or an initial followed by a dot. A name-part consists of either: a
@ -26,9 +26,8 @@ unspecified. These are presumed to be obvious from context or detailed
somewhere nearby. See also parse. 2. Any of a number of variants and
extensions of BNF proper, possibly containing some or all of the regexp
wildcards such as * or +. In fact the example above isn't the pure form
invented for the Algol-60 report; it uses [] , which was introduced a few
invented for the Algol-60 report; it uses [], which was introduced a few
years later in IBM's PL/I definition but is now universally recognized. 3.
In science-fiction fandom , a Big-Name Fan (someone famous or notorious).
Years ago a fan started handing out black-on-green BNF buttons at SF
conventions; this confused the hacker contingent terribly.

View File

@ -1,6 +1,6 @@
BSD
/BSD/ , n. [abbreviation for Berkeley Software Distribution ] a family of
/BSD/ , n. [abbreviation for Berkeley Software Distribution] a family of
Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at
Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP
networking enhancements, and many other features. The BSD versions (4.1,

View File

@ -1,10 +1,9 @@
BUAF
// , n. [abbreviation, from alt.fan.warlord ] Big Ugly ASCII Font a special
// , n. [abbreviation, from alt.fan.warlord] Big Ugly ASCII Font a special
form of ASCII art. Various programs exist for rendering text strings into
block, bloob, and pseudo-script fonts in cells between four and six
character cells on a side; this is smaller than the letters generated by
older banner (sense 2) programs. These are sometimes used to render one's
name in a sig block , and are critically referred to as BUAF s. See
name in a sig block, and are critically referred to as BUAF s. See
warlording.

View File

@ -1,7 +1,6 @@
BUAG
// , n. [abbreviation, from alt.fan.warlord ] Big Ugly ASCII Graphic.
Pejorative term for ugly ASCII art , especially as found in sig block s. For
// , n. [abbreviation, from alt.fan.warlord] Big Ugly ASCII Graphic.
Pejorative term for ugly ASCII art, especially as found in sig blocks. For
some reason, mutations of the head of Bart Simpson are particularly common
in the least imaginative sig block s. See warlording.
in the least imaginative sig blocks. See warlording.

View File

@ -1,7 +1,7 @@
Bad Thing
n. [very common; always pronounced as if capitalized. Orig. fr. the 1930
Sellar Yeatman parody of British history 1066 And All That , but
Sellar Yeatman parody of British history 1066 And All That, but
well-established among hackers in the U.S. as well.] Something that can't
possibly result in improvement of the subject. This term is always
capitalized, as in Replacing all of the DSL links with bicycle couriers
@ -11,4 +11,3 @@ come from the book referenced in the etymology, which discusses rulers who
were Good Kings but Bad Things. This has apparently created a mainstream
idiom on the British side of the pond. It is very common among American
hackers, but not in mainstream usage in the U.S. Compare Bad and Wrong.

View File

@ -8,7 +8,6 @@ and (rare praise) Good and Right. These terms entered common use at Durham
c.1994 and may have been imported from elsewhere; they are also in use at
Oxford, and the emphatic form Evil and Bad and Wrong (abbreviated EBW) is
reported from there. There are standard abbreviations: they start with B R,
a typo for Bad and Wrong. Consequently, B W is actually Bad and Right , G R
= Good and Wrong , and G W = Good and Right. Compare evil and rude , Good
Thing , Bad Thing.
a typo for Bad and Wrong. Consequently, B W is actually Bad and Right, G R
= Good and Wrong , and G W = Good and Right. Compare evil and rude, Good
Thing, Bad Thing.

View File

@ -6,6 +6,5 @@ night to solve some unique problem. It usually has nonexistent, incomplete,
or incorrect documentation, has been tested on at least two examples, and
core dumps when anyone else attempts to use it. This term was frequently
applied to early versions of the dbx (1) debugger. See also Berzerkeley.
Note to British and Commonwealth readers: that's /berklee/ , not /barklee/
Note to British and Commonwealth readers: that's /berklee/, not /barklee/
as in British Received Pronunciation.

View File

@ -3,7 +3,6 @@ Berzerkeley
/b@rzerklee/ , n. [from berserk , via the name of a now-deceased record
label; poss. originated by famed columnist Herb Caen] Humorous distortion of
Berkeley used esp. to refer to the practices or products of the BSD Unix
hackers. See software bloat , Berkeley Quality Software. Mainstream use of
hackers. See software bloat, Berkeley Quality Software. Mainstream use of
this term in reference to the cultural and political peculiarities of UC
Berkeley as a whole has been reported from as far back as the 1960s.

View File

@ -1,8 +1,7 @@
BiCapitalization
n. The act said to have been performed on trademarks (such as PostScript ,
NeXT, NeWS , VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been
n. The act said to have been performed on trademarks (such as PostScript,
NeXT, NeWS, VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been
raised above the ruck of common coinage by nonstandard capitalization. Too
many marketroid types think this sort of thing is really cute, even the
2,317th time they do it. Compare studlycaps , InterCaps.
2,317th time they do it. Compare studlycaps, InterCaps.

View File

@ -10,5 +10,4 @@ switch on an IBM 360/91 actually fired a non-conducting bolt into the main
power feed; the BRSes on more recent mainframes physically drop a block into
place so that they can't be pushed back in. People get fired for pulling
them, especially inappropriately (see also molly-guard ). Compare power
cycle , three-finger salute ; see also scram switch.
cycle, three-finger salute; see also scram switch.

View File

@ -4,6 +4,5 @@ Black Screen of Death
A failure mode of Microsloth Windows. On an attempt to launch a DOS box, a
networked Windows system not uncommonly blanks the screen and locks up the
PC so hard that it requires a cold boot to recover. This unhappy phenomenon
is known as The Black Screen of Death. See also Blue Screen of Death , which
is known as The Black Screen of Death. See also Blue Screen of Death, which
has become rather more common.

View File

@ -6,7 +6,6 @@ extreme fragility and bugginess of Microsoft Windows, misbehaving
applications can readily crash the OS (and the OS sometimes crashes itself
spontaneously). The Blue Screen of Death, sometimes decorated with hex error
codes, is what you get when this happens. (Commonly abbreviated BSOD. ) The
following entry from the Salon Haiku Contest , seems to have predated
following entry from the Salon Haiku Contest, seems to have predated
popular use of the term: WindowsNTcrashed. IamtheBlueScreenofDeath
Noonehearsyourscreams.

View File

@ -1,6 +1,5 @@
Bohr bug
/bohr buhg/ , n. [from quantum physics] A repeatable bug ; one that
/bohr buhg/ , n. [from quantum physics] A repeatable bug; one that
manifests reliably under a possibly unknown but well-defined set of
conditions. Antonym of heisenbug ; see also mandelbug , schroedinbug.
conditions. Antonym of heisenbug; see also mandelbug, schroedinbug.

View File

@ -3,16 +3,15 @@ Borg
n. In Star Trek: The Next Generation the Borg is a species of cyborg that
ruthlessly seeks to incorporate all sentient life into itself; their slogan
is You will be assimilated. Resistance is futile. In hacker parlance, the
Borg is usually Microsoft , which is thought to be trying just as ruthlessly
Borg is usually Microsoft, which is thought to be trying just as ruthlessly
to assimilate all computers and the entire Internet to itself (there is a
widely circulated image of Bill Gates as a Borg). Being forced to use
Windows or NT is often referred to as being Borged. Interestingly, the
Halloween Documents reveal that this jargon is live within Microsoft itself.
See also Evil Empire , Internet Exploiter. Other companies, notably Intel
See also Evil Empire, Internet Exploiter. Other companies, notably Intel
and UUNet, have also occasionally been equated to the Borg. In IETF circles,
where direct pressure from Microsoft is not a daily reality, the Borg is
sometimes Cisco. This usage commemorates their tendency to pay any price to
hire talent away from their competitors. In fact, at the Spring 1997 IETF, a
large number of ex-Cisco employees, all former members of Routing Geeks,
showed up with t-shirts printed with Recovering Borg.

View File

@ -11,5 +11,4 @@ book on software engineering. The myth in question has been most tersely
expressed as Programmer time is fungible and Brooks established conclusively
that it is not. Hackers have never forgotten his advice (though it's not the
whole story; see bazaar ); too often, management still does. See also
creationism , second-system effect , optimism.
creationism, second-system effect, optimism.

View File

@ -2,10 +2,9 @@ Bzzzt! Wrong.
/bzt rong/ , excl. [common; Usenet/Internet; punctuation varies] From a
Robin Williams routine in the movie Dead Poets Society spoofing radio or TV
quiz programs, such as Truth or Consequences , where an incorrect answer
quiz programs, such as Truth or Consequences, where an incorrect answer
earns one a blast from the buzzer and condolences from the interlocutor. A
way of expressing mock-rude disagreement, usually immediately following an
included quote from another poster. The less abbreviated *Bzzzzt*, wrong,
but thank you for playing is also common; capitalization and emphasis of the
buzzer sound varies.

View File

@ -1,7 +1,7 @@
C++
/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT&T Bell Labs as a
successor to C. Now one of the languages of choice , although many hackers
successor to C. Now one of the languages of choice, although many hackers
still grumble that it is the successor to either Algol 68 or Ada (depending
on generation), and a prime example of second-system effect. Almost anything
that can be done in any language can be done in C++, but it requires a

View File

@ -1,6 +1,6 @@
CDA
/CDA/ The Communications Decency Act , passed as section 502 of a major
/CDA/ The Communications Decency Act, passed as section 502 of a major
telecommunications reform bill on February 8th, 1996 ( Black Thursday ). The
CDA made it a federal crime in the USA to send a communication which is
obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse,

View File

@ -1,6 +1,5 @@
CI$
// , n. Hackerism for CIS , CompuServe Information Service. The dollar sign
// , n. Hackerism for CIS, CompuServe Information Service. The dollar sign
refers to CompuServe's rather steep line charges. Often used in sig block s
just before a CompuServe address. Syn. Compu$erve.

View File

@ -2,6 +2,5 @@ COBOL fingers
/kohbol finggrz/ , n. Reported from Sweden, a (hypothetical) disease one
might get from coding in COBOL. The language requires code verbose beyond
all reason (see candygrammar ); thus it is alleged that programming too much
all reason (see candygrammar); thus it is alleged that programming too much
in COBOL causes one's fingers to wear down to stubs by the endless typing.

View File

@ -9,4 +9,4 @@ without ritual expressions of disgust or horror. One popular one is Edsger
W. Dijkstra's famous observation that The use of COBOL cripples the mind;
its teaching should, therefore, be regarded as a criminal offense. (from
Selected Writings on Computing: A Personal Perspective ) See also fear and
loathing , software rot.
loathing, software rot.

View File

@ -5,7 +5,7 @@ would cause the referenced label to act as a sort of trapdoor, so that if
the program ever reached it control would quietly and automagically be
transferred to the statement following the COME FROM. COME FROM was first
proposed in R. Lawrence Clark's A Linguistic Contribution to GOTO-less
programming , which appeared in a 1973 Datamation issue (and was reprinted
programming, which appeared in a 1973 Datamation issue (and was reprinted
in the April 1984 issue of Communications of the ACM ). This parodied the
then-raging structured programming holy wars (see considered harmful ).
Mythically, some variants are the assigned COME FROM and the computed COME
@ -31,6 +31,5 @@ promised to anyone so deranged as to use it in production code. More
horrible things had already been perpetrated in production languages,
however; doubters need only contemplate the ALTER verb in COBOL. COME FROM
was supported under its own name for the first time 15 years later, in
C-INTERCAL (see INTERCAL , retrocomputing ); knowledgeable observers are
C-INTERCAL (see INTERCAL, retrocomputing ); knowledgeable observers are
still reeling from the shock.

View File

@ -10,6 +10,5 @@ enjoying the perfect flying weather in his private plane (another variant
has it that Gary's wife was much more interested in packing her suitcases
for an upcoming vacation than in clinching a deal with IBM). Many of CP/M's
features and conventions strongly resemble those of early DEC operating
systems such as TOPS-10 , OS/8, RSTS, and RSX-11. See MS-DOS , operating
systems such as TOPS-10, OS/8, RSTS, and RSX-11. See MS-DOS, operating
system.

View File

@ -1,6 +1,6 @@
CPU Wars
/CPU worz/ , n. A 1979 large-format comic by Chas Andres chronicling the
/CPU worz/, n. A 1979 large-format comic by Chas Andres chronicling the
attempts of the brainwashed androids of IPM (Impossible to Program Machines)
to conquer and destroy the peaceful denizens of HEC (Human Engineered
Computers). This rather transparent allegory featured many references to
@ -11,4 +11,3 @@ letter of appreciation on IBM company stationery from the head of IBM's
Thomas J. Watson Research Laboratories (at that time one of the few islands
of true hackerdom in the IBM archipelago). The lower loop of the B in the
IBM logo, it is said, had been carefully whited out. See eat flaming death.

View File

@ -2,7 +2,7 @@ CRC handbook
Any of the editions of the Chemical Rubber Company Handbook of Chemistry and
Physics ; there are other CRC handbooks, such as the CRC Standard
Mathematical Tables and Formulae , but the is the chemistry and physics
Mathematical Tables and Formulae, but the is the chemistry and physics
reference. It is massive tome full of mathematical tables, physical
constants of thousands of alloys and chemical compounds, dielectric
strengths, vapor pressure, resistivity, and the like. Hackers have
@ -12,4 +12,3 @@ and would feel vaguely bereft if they couldn't look up the magnetic
susceptibility of potassium permanganate at a moment's notice. On hackers'
bookshelves, the is rather likely to keep company with an unabridged Oxford
English Dictionary and a good atlas.

View File

@ -2,8 +2,7 @@ CTSS
/CTSS/ , n. Compatible Time-Sharing System. An early (1963) experiment in
the design of interactive timesharing operating systems, ancestral to
Multics , Unix , and ITS. The name ITS (Incompatible Time-sharing System)
Multics, Unix, and ITS. The name ITS (Incompatible Time-sharing System)
was a hack on CTSS, meant both as a joke and to express some basic
differences in philosophy about the way I/O services should be presented to
user programs.

View File

@ -1,5 +1,5 @@
Camel Book
n. Universally recognized nickname for the book Programming Perl , by Larry
n. Universally recognized nickname for the book Programming Perl, by Larry
Wall and Randal L. Schwartz, O'Reilly and Associates 1991.
The definitive reference on Perl.

View File

@ -2,7 +2,7 @@ Cancelmoose[tm]
/kanselmoos/ [Usenet] The archetype and model of all good spam -fighters.
Once upon a time, the 'Moose would send out spam-cancels and then post
notice anonymously to news.admin.policy , news.admin.misc , and
notice anonymously to news.admin.policy, news.admin.misc, and
alt.current-events.net-abuse. The 'Moose stepped to the fore on its own
initiative, at a time (mid-1994) when spam-cancels were irregular and
disorganized, and behaved altogether admirably fair, even-handed, and quick
@ -15,4 +15,3 @@ http://www.cm.org/. ) By early 1995, others had stepped into the spam-cancel
business, and appeared to be comporting themselves well, after the 'Moose's
manner. The 'Moose has now gotten out of the business, and is more
interested in ending spam (and cancels) entirely.

View File

@ -1,9 +1,8 @@
Chernobyl packet
/chernohb@l pak'@t/ , n. A network packet that induces a broadcast storm
and/or network meltdown , in memory of the April 1986 nuclear accident at
and/or network meltdown, in memory of the April 1986 nuclear accident at
Chernobyl in Ukraine. The typical scenario involves an IP Ethernet datagram
that passes through a gateway with both source and destination Ether and IP
address set as the respective broadcast addresses for the subnetworks being
gated between. Compare Christmas tree packet.