Remove spaces
This commit is contained in:
parent
4e850da551
commit
c1257f5339
@ -1,6 +1,6 @@
|
|||||||
B1FF
|
B1FF
|
||||||
|
|
||||||
/bif/ , BIFF , n. The most famous pseudo , and the prototypical newbie.
|
/bif/ , BIFF , n. The most famous pseudo, and the prototypical newbie.
|
||||||
Articles from B1FF feature all uppercase letters sprinkled liberally with
|
Articles from B1FF feature all uppercase letters sprinkled liberally with
|
||||||
bangs, typos, cute misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ KL DOOD AN
|
bangs, typos, cute misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ KL DOOD AN
|
||||||
HE RITES REEL AWESUM THINGZ IN CAPITULL LETTRS LIKE THIS!!!), use (and often
|
HE RITES REEL AWESUM THINGZ IN CAPITULL LETTRS LIKE THIS!!!), use (and often
|
||||||
@ -11,8 +11,7 @@ to come from a variety of sites. However, BITNET seems to be the most
|
|||||||
frequent origin. The theory that B1FF is a denizen of BITNET is supported by
|
frequent origin. The theory that B1FF is a denizen of BITNET is supported by
|
||||||
B1FF's (unfortunately invalid) electronic mail address: B1FF@BIT.NET. [1993:
|
B1FF's (unfortunately invalid) electronic mail address: B1FF@BIT.NET. [1993:
|
||||||
Now It Can Be Told! My spies inform me that B1FF was originally created by
|
Now It Can Be Told! My spies inform me that B1FF was originally created by
|
||||||
Joe Talmadge jat@cup.hp.com , also the author of the infamous and
|
Joe Talmadge jat@cup.hp.com, also the author of the infamous and
|
||||||
much-plagiarized Flamer's Bible. The BIFF filter he wrote was later passed
|
much-plagiarized Flamer's Bible. The BIFF filter he wrote was later passed
|
||||||
to Richard Sexton, who posted BIFFisms much more widely. Versions have since
|
to Richard Sexton, who posted BIFFisms much more widely. Versions have since
|
||||||
been posted for the amusement of the net at large. See also Jeff K.
|
been posted for the amusement of the net at large. See also Jeff K.
|
||||||
|
|
||||||
|
@ -1,5 +1,4 @@
|
|||||||
B5
|
B5
|
||||||
|
|
||||||
// [common] Abbreviation for Babylon 5 , a science-fiction TV series as
|
// [common] Abbreviation for Babylon 5, a science-fiction TV series as
|
||||||
revered among hackers as was the original Star Trek.
|
revered among hackers as was the original Star Trek.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
BCPL
|
BCPL
|
||||||
|
|
||||||
// , n. [abbreviation, Basic Combined Programming Language ) A programming
|
// , n. [abbreviation, Basic Combined Programming Language) A programming
|
||||||
language developed by Martin Richards in Cambridge in 1967. It is remarkable
|
language developed by Martin Richards in Cambridge in 1967. It is remarkable
|
||||||
for its rich syntax, small size of compiler (it can be run in 16k) and
|
for its rich syntax, small size of compiler (it can be run in 16k) and
|
||||||
extreme portability. It reached break-even point at a very early stage, and
|
extreme portability. It reached break-even point at a very early stage, and
|
||||||
@ -10,4 +10,3 @@ having lost count. It has only one data type (a machine word) which can be
|
|||||||
used as an integer, a character, a floating point number, a pointer, or
|
used as an integer, a character, a floating point number, a pointer, or
|
||||||
almost anything else, depending on context. BCPL was a precursor of C, which
|
almost anything else, depending on context. BCPL was a precursor of C, which
|
||||||
inherited some of its features.
|
inherited some of its features.
|
||||||
|
|
||||||
|
@ -1,8 +1,7 @@
|
|||||||
BDFL
|
BDFL
|
||||||
|
|
||||||
Benevolent Dictator For Life. Guido , considered in his role as the project
|
Benevolent Dictator For Life. Guido, considered in his role as the project
|
||||||
leader of Python. People who are feeling temporarily cheesed off by one of
|
leader of Python. People who are feeling temporarily cheesed off by one of
|
||||||
his decisions sometimes leave off the B. The mental image that goes with
|
his decisions sometimes leave off the B. The mental image that goes with
|
||||||
this, of a cigar-chomping caudillo in gold braid and sunglasses, is
|
this, of a cigar-chomping caudillo in gold braid and sunglasses, is
|
||||||
extremely funny to anyone who has ever met Guido in person.
|
extremely funny to anyone who has ever met Guido in person.
|
||||||
|
|
||||||
|
@ -1,9 +1,8 @@
|
|||||||
BFI
|
BFI
|
||||||
|
|
||||||
/BFI/ , n. See brute force and ignorance. Also encountered in the variants
|
/BFI/ , n. See brute force and ignorance. Also encountered in the variants
|
||||||
BFMI , brute force and massive ignorance and BFBI brute force and bloody
|
BFMI, brute force and massive ignorance and BFBI brute force and bloody
|
||||||
ignorance. In some parts of the U.S. this abbreviation was probably
|
ignorance. In some parts of the U.S. this abbreviation was probably
|
||||||
reinforced by a company called Browning-Ferris Industries in the
|
reinforced by a company called Browning-Ferris Industries in the
|
||||||
waste-management business; a large BFI logo in white-on-blue could be seen
|
waste-management business; a large BFI logo in white-on-blue could be seen
|
||||||
on the sides of garbage trucks.
|
on the sides of garbage trucks.
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@ other hackers. Consider this BNF for a U.S. postal address: postal-address
|
|||||||
::= name-part street-address zip-part personal-part ::= name | initial .
|
::= name-part street-address zip-part personal-part ::= name | initial .
|
||||||
name-part ::= personal-part last-name [ jr-part ] EOL | personal-part
|
name-part ::= personal-part last-name [ jr-part ] EOL | personal-part
|
||||||
name-part street-address ::=[ apt ] house-num street-name EOL zip-part
|
name-part street-address ::=[ apt ] house-num street-name EOL zip-part
|
||||||
::= town-name , state-code ZIP-code EOL This translates into English as:
|
::= town-name, state-code ZIP-code EOL This translates into English as:
|
||||||
A postal-address consists of a name-part, followed by a street-address part,
|
A postal-address consists of a name-part, followed by a street-address part,
|
||||||
followed by a zip-code part. A personal-part consists of either a first name
|
followed by a zip-code part. A personal-part consists of either a first name
|
||||||
or an initial followed by a dot. A name-part consists of either: a
|
or an initial followed by a dot. A name-part consists of either: a
|
||||||
@ -26,9 +26,8 @@ unspecified. These are presumed to be obvious from context or detailed
|
|||||||
somewhere nearby. See also parse. 2. Any of a number of variants and
|
somewhere nearby. See also parse. 2. Any of a number of variants and
|
||||||
extensions of BNF proper, possibly containing some or all of the regexp
|
extensions of BNF proper, possibly containing some or all of the regexp
|
||||||
wildcards such as * or +. In fact the example above isn't the pure form
|
wildcards such as * or +. In fact the example above isn't the pure form
|
||||||
invented for the Algol-60 report; it uses [] , which was introduced a few
|
invented for the Algol-60 report; it uses [], which was introduced a few
|
||||||
years later in IBM's PL/I definition but is now universally recognized. 3.
|
years later in IBM's PL/I definition but is now universally recognized. 3.
|
||||||
In science-fiction fandom , a Big-Name Fan (someone famous or notorious).
|
In science-fiction fandom , a Big-Name Fan (someone famous or notorious).
|
||||||
Years ago a fan started handing out black-on-green BNF buttons at SF
|
Years ago a fan started handing out black-on-green BNF buttons at SF
|
||||||
conventions; this confused the hacker contingent terribly.
|
conventions; this confused the hacker contingent terribly.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
BSD
|
BSD
|
||||||
|
|
||||||
/BSD/ , n. [abbreviation for Berkeley Software Distribution ] a family of
|
/BSD/ , n. [abbreviation for Berkeley Software Distribution] a family of
|
||||||
Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at
|
Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at
|
||||||
Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP
|
Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP
|
||||||
networking enhancements, and many other features. The BSD versions (4.1,
|
networking enhancements, and many other features. The BSD versions (4.1,
|
||||||
|
@ -1,10 +1,9 @@
|
|||||||
BUAF
|
BUAF
|
||||||
|
|
||||||
// , n. [abbreviation, from alt.fan.warlord ] Big Ugly ASCII Font a special
|
// , n. [abbreviation, from alt.fan.warlord] Big Ugly ASCII Font a special
|
||||||
form of ASCII art. Various programs exist for rendering text strings into
|
form of ASCII art. Various programs exist for rendering text strings into
|
||||||
block, bloob, and pseudo-script fonts in cells between four and six
|
block, bloob, and pseudo-script fonts in cells between four and six
|
||||||
character cells on a side; this is smaller than the letters generated by
|
character cells on a side; this is smaller than the letters generated by
|
||||||
older banner (sense 2) programs. These are sometimes used to render one's
|
older banner (sense 2) programs. These are sometimes used to render one's
|
||||||
name in a sig block , and are critically referred to as BUAF s. See
|
name in a sig block, and are critically referred to as BUAF s. See
|
||||||
warlording.
|
warlording.
|
||||||
|
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
BUAG
|
BUAG
|
||||||
|
|
||||||
// , n. [abbreviation, from alt.fan.warlord ] Big Ugly ASCII Graphic.
|
// , n. [abbreviation, from alt.fan.warlord] Big Ugly ASCII Graphic.
|
||||||
Pejorative term for ugly ASCII art , especially as found in sig block s. For
|
Pejorative term for ugly ASCII art, especially as found in sig blocks. For
|
||||||
some reason, mutations of the head of Bart Simpson are particularly common
|
some reason, mutations of the head of Bart Simpson are particularly common
|
||||||
in the least imaginative sig block s. See warlording.
|
in the least imaginative sig blocks. See warlording.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
Bad Thing
|
Bad Thing
|
||||||
|
|
||||||
n. [very common; always pronounced as if capitalized. Orig. fr. the 1930
|
n. [very common; always pronounced as if capitalized. Orig. fr. the 1930
|
||||||
Sellar Yeatman parody of British history 1066 And All That , but
|
Sellar Yeatman parody of British history 1066 And All That, but
|
||||||
well-established among hackers in the U.S. as well.] Something that can't
|
well-established among hackers in the U.S. as well.] Something that can't
|
||||||
possibly result in improvement of the subject. This term is always
|
possibly result in improvement of the subject. This term is always
|
||||||
capitalized, as in Replacing all of the DSL links with bicycle couriers
|
capitalized, as in Replacing all of the DSL links with bicycle couriers
|
||||||
@ -11,4 +11,3 @@ come from the book referenced in the etymology, which discusses rulers who
|
|||||||
were Good Kings but Bad Things. This has apparently created a mainstream
|
were Good Kings but Bad Things. This has apparently created a mainstream
|
||||||
idiom on the British side of the pond. It is very common among American
|
idiom on the British side of the pond. It is very common among American
|
||||||
hackers, but not in mainstream usage in the U.S. Compare Bad and Wrong.
|
hackers, but not in mainstream usage in the U.S. Compare Bad and Wrong.
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ and (rare praise) Good and Right. These terms entered common use at Durham
|
|||||||
c.1994 and may have been imported from elsewhere; they are also in use at
|
c.1994 and may have been imported from elsewhere; they are also in use at
|
||||||
Oxford, and the emphatic form Evil and Bad and Wrong (abbreviated EBW) is
|
Oxford, and the emphatic form Evil and Bad and Wrong (abbreviated EBW) is
|
||||||
reported from there. There are standard abbreviations: they start with B R,
|
reported from there. There are standard abbreviations: they start with B R,
|
||||||
a typo for Bad and Wrong. Consequently, B W is actually Bad and Right , G R
|
a typo for Bad and Wrong. Consequently, B W is actually Bad and Right, G R
|
||||||
= Good and Wrong , and G W = Good and Right. Compare evil and rude , Good
|
= Good and Wrong , and G W = Good and Right. Compare evil and rude, Good
|
||||||
Thing , Bad Thing.
|
Thing, Bad Thing.
|
||||||
|
|
||||||
|
@ -6,6 +6,5 @@ night to solve some unique problem. It usually has nonexistent, incomplete,
|
|||||||
or incorrect documentation, has been tested on at least two examples, and
|
or incorrect documentation, has been tested on at least two examples, and
|
||||||
core dumps when anyone else attempts to use it. This term was frequently
|
core dumps when anyone else attempts to use it. This term was frequently
|
||||||
applied to early versions of the dbx (1) debugger. See also Berzerkeley.
|
applied to early versions of the dbx (1) debugger. See also Berzerkeley.
|
||||||
Note to British and Commonwealth readers: that's /berklee/ , not /barklee/
|
Note to British and Commonwealth readers: that's /berklee/, not /barklee/
|
||||||
as in British Received Pronunciation.
|
as in British Received Pronunciation.
|
||||||
|
|
||||||
|
@ -3,7 +3,6 @@ Berzerkeley
|
|||||||
/b@rzerklee/ , n. [from berserk , via the name of a now-deceased record
|
/b@rzerklee/ , n. [from berserk , via the name of a now-deceased record
|
||||||
label; poss. originated by famed columnist Herb Caen] Humorous distortion of
|
label; poss. originated by famed columnist Herb Caen] Humorous distortion of
|
||||||
Berkeley used esp. to refer to the practices or products of the BSD Unix
|
Berkeley used esp. to refer to the practices or products of the BSD Unix
|
||||||
hackers. See software bloat , Berkeley Quality Software. Mainstream use of
|
hackers. See software bloat, Berkeley Quality Software. Mainstream use of
|
||||||
this term in reference to the cultural and political peculiarities of UC
|
this term in reference to the cultural and political peculiarities of UC
|
||||||
Berkeley as a whole has been reported from as far back as the 1960s.
|
Berkeley as a whole has been reported from as far back as the 1960s.
|
||||||
|
|
||||||
|
@ -1,8 +1,7 @@
|
|||||||
BiCapitalization
|
BiCapitalization
|
||||||
|
|
||||||
n. The act said to have been performed on trademarks (such as PostScript ,
|
n. The act said to have been performed on trademarks (such as PostScript,
|
||||||
NeXT, NeWS , VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been
|
NeXT, NeWS, VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been
|
||||||
raised above the ruck of common coinage by nonstandard capitalization. Too
|
raised above the ruck of common coinage by nonstandard capitalization. Too
|
||||||
many marketroid types think this sort of thing is really cute, even the
|
many marketroid types think this sort of thing is really cute, even the
|
||||||
2,317th time they do it. Compare studlycaps , InterCaps.
|
2,317th time they do it. Compare studlycaps, InterCaps.
|
||||||
|
|
||||||
|
@ -10,5 +10,4 @@ switch on an IBM 360/91 actually fired a non-conducting bolt into the main
|
|||||||
power feed; the BRSes on more recent mainframes physically drop a block into
|
power feed; the BRSes on more recent mainframes physically drop a block into
|
||||||
place so that they can't be pushed back in. People get fired for pulling
|
place so that they can't be pushed back in. People get fired for pulling
|
||||||
them, especially inappropriately (see also molly-guard ). Compare power
|
them, especially inappropriately (see also molly-guard ). Compare power
|
||||||
cycle , three-finger salute ; see also scram switch.
|
cycle, three-finger salute; see also scram switch.
|
||||||
|
|
||||||
|
@ -4,6 +4,5 @@ Black Screen of Death
|
|||||||
A failure mode of Microsloth Windows. On an attempt to launch a DOS box, a
|
A failure mode of Microsloth Windows. On an attempt to launch a DOS box, a
|
||||||
networked Windows system not uncommonly blanks the screen and locks up the
|
networked Windows system not uncommonly blanks the screen and locks up the
|
||||||
PC so hard that it requires a cold boot to recover. This unhappy phenomenon
|
PC so hard that it requires a cold boot to recover. This unhappy phenomenon
|
||||||
is known as The Black Screen of Death. See also Blue Screen of Death , which
|
is known as The Black Screen of Death. See also Blue Screen of Death, which
|
||||||
has become rather more common.
|
has become rather more common.
|
||||||
|
|
||||||
|
@ -6,7 +6,6 @@ extreme fragility and bugginess of Microsoft Windows, misbehaving
|
|||||||
applications can readily crash the OS (and the OS sometimes crashes itself
|
applications can readily crash the OS (and the OS sometimes crashes itself
|
||||||
spontaneously). The Blue Screen of Death, sometimes decorated with hex error
|
spontaneously). The Blue Screen of Death, sometimes decorated with hex error
|
||||||
codes, is what you get when this happens. (Commonly abbreviated BSOD. ) The
|
codes, is what you get when this happens. (Commonly abbreviated BSOD. ) The
|
||||||
following entry from the Salon Haiku Contest , seems to have predated
|
following entry from the Salon Haiku Contest, seems to have predated
|
||||||
popular use of the term: WindowsNTcrashed. IamtheBlueScreenofDeath
|
popular use of the term: WindowsNTcrashed. IamtheBlueScreenofDeath
|
||||||
Noonehearsyourscreams.
|
Noonehearsyourscreams.
|
||||||
|
|
||||||
|
@ -1,6 +1,5 @@
|
|||||||
Bohr bug
|
Bohr bug
|
||||||
|
|
||||||
/bohr buhg/ , n. [from quantum physics] A repeatable bug ; one that
|
/bohr buhg/ , n. [from quantum physics] A repeatable bug; one that
|
||||||
manifests reliably under a possibly unknown but well-defined set of
|
manifests reliably under a possibly unknown but well-defined set of
|
||||||
conditions. Antonym of heisenbug ; see also mandelbug , schroedinbug.
|
conditions. Antonym of heisenbug; see also mandelbug, schroedinbug.
|
||||||
|
|
||||||
|
@ -3,16 +3,15 @@ Borg
|
|||||||
n. In Star Trek: The Next Generation the Borg is a species of cyborg that
|
n. In Star Trek: The Next Generation the Borg is a species of cyborg that
|
||||||
ruthlessly seeks to incorporate all sentient life into itself; their slogan
|
ruthlessly seeks to incorporate all sentient life into itself; their slogan
|
||||||
is You will be assimilated. Resistance is futile. In hacker parlance, the
|
is You will be assimilated. Resistance is futile. In hacker parlance, the
|
||||||
Borg is usually Microsoft , which is thought to be trying just as ruthlessly
|
Borg is usually Microsoft, which is thought to be trying just as ruthlessly
|
||||||
to assimilate all computers and the entire Internet to itself (there is a
|
to assimilate all computers and the entire Internet to itself (there is a
|
||||||
widely circulated image of Bill Gates as a Borg). Being forced to use
|
widely circulated image of Bill Gates as a Borg). Being forced to use
|
||||||
Windows or NT is often referred to as being Borged. Interestingly, the
|
Windows or NT is often referred to as being Borged. Interestingly, the
|
||||||
Halloween Documents reveal that this jargon is live within Microsoft itself.
|
Halloween Documents reveal that this jargon is live within Microsoft itself.
|
||||||
See also Evil Empire , Internet Exploiter. Other companies, notably Intel
|
See also Evil Empire, Internet Exploiter. Other companies, notably Intel
|
||||||
and UUNet, have also occasionally been equated to the Borg. In IETF circles,
|
and UUNet, have also occasionally been equated to the Borg. In IETF circles,
|
||||||
where direct pressure from Microsoft is not a daily reality, the Borg is
|
where direct pressure from Microsoft is not a daily reality, the Borg is
|
||||||
sometimes Cisco. This usage commemorates their tendency to pay any price to
|
sometimes Cisco. This usage commemorates their tendency to pay any price to
|
||||||
hire talent away from their competitors. In fact, at the Spring 1997 IETF, a
|
hire talent away from their competitors. In fact, at the Spring 1997 IETF, a
|
||||||
large number of ex-Cisco employees, all former members of Routing Geeks,
|
large number of ex-Cisco employees, all former members of Routing Geeks,
|
||||||
showed up with t-shirts printed with Recovering Borg.
|
showed up with t-shirts printed with Recovering Borg.
|
||||||
|
|
||||||
|
@ -11,5 +11,4 @@ book on software engineering. The myth in question has been most tersely
|
|||||||
expressed as Programmer time is fungible and Brooks established conclusively
|
expressed as Programmer time is fungible and Brooks established conclusively
|
||||||
that it is not. Hackers have never forgotten his advice (though it's not the
|
that it is not. Hackers have never forgotten his advice (though it's not the
|
||||||
whole story; see bazaar ); too often, management still does. See also
|
whole story; see bazaar ); too often, management still does. See also
|
||||||
creationism , second-system effect , optimism.
|
creationism, second-system effect, optimism.
|
||||||
|
|
||||||
|
@ -2,10 +2,9 @@ Bzzzt! Wrong.
|
|||||||
|
|
||||||
/bzt rong/ , excl. [common; Usenet/Internet; punctuation varies] From a
|
/bzt rong/ , excl. [common; Usenet/Internet; punctuation varies] From a
|
||||||
Robin Williams routine in the movie Dead Poets Society spoofing radio or TV
|
Robin Williams routine in the movie Dead Poets Society spoofing radio or TV
|
||||||
quiz programs, such as Truth or Consequences , where an incorrect answer
|
quiz programs, such as Truth or Consequences, where an incorrect answer
|
||||||
earns one a blast from the buzzer and condolences from the interlocutor. A
|
earns one a blast from the buzzer and condolences from the interlocutor. A
|
||||||
way of expressing mock-rude disagreement, usually immediately following an
|
way of expressing mock-rude disagreement, usually immediately following an
|
||||||
included quote from another poster. The less abbreviated *Bzzzzt*, wrong,
|
included quote from another poster. The less abbreviated *Bzzzzt*, wrong,
|
||||||
but thank you for playing is also common; capitalization and emphasis of the
|
but thank you for playing is also common; capitalization and emphasis of the
|
||||||
buzzer sound varies.
|
buzzer sound varies.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
C++
|
C++
|
||||||
|
|
||||||
/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT&T Bell Labs as a
|
/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT&T Bell Labs as a
|
||||||
successor to C. Now one of the languages of choice , although many hackers
|
successor to C. Now one of the languages of choice, although many hackers
|
||||||
still grumble that it is the successor to either Algol 68 or Ada (depending
|
still grumble that it is the successor to either Algol 68 or Ada (depending
|
||||||
on generation), and a prime example of second-system effect. Almost anything
|
on generation), and a prime example of second-system effect. Almost anything
|
||||||
that can be done in any language can be done in C++, but it requires a
|
that can be done in any language can be done in C++, but it requires a
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
CDA
|
CDA
|
||||||
|
|
||||||
/CDA/ The Communications Decency Act , passed as section 502 of a major
|
/CDA/ The Communications Decency Act, passed as section 502 of a major
|
||||||
telecommunications reform bill on February 8th, 1996 ( Black Thursday ). The
|
telecommunications reform bill on February 8th, 1996 ( Black Thursday ). The
|
||||||
CDA made it a federal crime in the USA to send a communication which is
|
CDA made it a federal crime in the USA to send a communication which is
|
||||||
obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse,
|
obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse,
|
||||||
|
@ -1,6 +1,5 @@
|
|||||||
CI$
|
CI$
|
||||||
|
|
||||||
// , n. Hackerism for CIS , CompuServe Information Service. The dollar sign
|
// , n. Hackerism for CIS, CompuServe Information Service. The dollar sign
|
||||||
refers to CompuServe's rather steep line charges. Often used in sig block s
|
refers to CompuServe's rather steep line charges. Often used in sig block s
|
||||||
just before a CompuServe address. Syn. Compu$erve.
|
just before a CompuServe address. Syn. Compu$erve.
|
||||||
|
|
||||||
|
@ -2,6 +2,5 @@ COBOL fingers
|
|||||||
|
|
||||||
/kohbol finggrz/ , n. Reported from Sweden, a (hypothetical) disease one
|
/kohbol finggrz/ , n. Reported from Sweden, a (hypothetical) disease one
|
||||||
might get from coding in COBOL. The language requires code verbose beyond
|
might get from coding in COBOL. The language requires code verbose beyond
|
||||||
all reason (see candygrammar ); thus it is alleged that programming too much
|
all reason (see candygrammar); thus it is alleged that programming too much
|
||||||
in COBOL causes one's fingers to wear down to stubs by the endless typing.
|
in COBOL causes one's fingers to wear down to stubs by the endless typing.
|
||||||
|
|
||||||
|
@ -9,4 +9,4 @@ without ritual expressions of disgust or horror. One popular one is Edsger
|
|||||||
W. Dijkstra's famous observation that The use of COBOL cripples the mind;
|
W. Dijkstra's famous observation that The use of COBOL cripples the mind;
|
||||||
its teaching should, therefore, be regarded as a criminal offense. (from
|
its teaching should, therefore, be regarded as a criminal offense. (from
|
||||||
Selected Writings on Computing: A Personal Perspective ) See also fear and
|
Selected Writings on Computing: A Personal Perspective ) See also fear and
|
||||||
loathing , software rot.
|
loathing, software rot.
|
||||||
|
@ -5,7 +5,7 @@ would cause the referenced label to act as a sort of trapdoor, so that if
|
|||||||
the program ever reached it control would quietly and automagically be
|
the program ever reached it control would quietly and automagically be
|
||||||
transferred to the statement following the COME FROM. COME FROM was first
|
transferred to the statement following the COME FROM. COME FROM was first
|
||||||
proposed in R. Lawrence Clark's A Linguistic Contribution to GOTO-less
|
proposed in R. Lawrence Clark's A Linguistic Contribution to GOTO-less
|
||||||
programming , which appeared in a 1973 Datamation issue (and was reprinted
|
programming, which appeared in a 1973 Datamation issue (and was reprinted
|
||||||
in the April 1984 issue of Communications of the ACM ). This parodied the
|
in the April 1984 issue of Communications of the ACM ). This parodied the
|
||||||
then-raging structured programming holy wars (see considered harmful ).
|
then-raging structured programming holy wars (see considered harmful ).
|
||||||
Mythically, some variants are the assigned COME FROM and the computed COME
|
Mythically, some variants are the assigned COME FROM and the computed COME
|
||||||
@ -31,6 +31,5 @@ promised to anyone so deranged as to use it in production code. More
|
|||||||
horrible things had already been perpetrated in production languages,
|
horrible things had already been perpetrated in production languages,
|
||||||
however; doubters need only contemplate the ALTER verb in COBOL. COME FROM
|
however; doubters need only contemplate the ALTER verb in COBOL. COME FROM
|
||||||
was supported under its own name for the first time 15 years later, in
|
was supported under its own name for the first time 15 years later, in
|
||||||
C-INTERCAL (see INTERCAL , retrocomputing ); knowledgeable observers are
|
C-INTERCAL (see INTERCAL, retrocomputing ); knowledgeable observers are
|
||||||
still reeling from the shock.
|
still reeling from the shock.
|
||||||
|
|
||||||
|
@ -10,6 +10,5 @@ enjoying the perfect flying weather in his private plane (another variant
|
|||||||
has it that Gary's wife was much more interested in packing her suitcases
|
has it that Gary's wife was much more interested in packing her suitcases
|
||||||
for an upcoming vacation than in clinching a deal with IBM). Many of CP/M's
|
for an upcoming vacation than in clinching a deal with IBM). Many of CP/M's
|
||||||
features and conventions strongly resemble those of early DEC operating
|
features and conventions strongly resemble those of early DEC operating
|
||||||
systems such as TOPS-10 , OS/8, RSTS, and RSX-11. See MS-DOS , operating
|
systems such as TOPS-10, OS/8, RSTS, and RSX-11. See MS-DOS, operating
|
||||||
system.
|
system.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
CPU Wars
|
CPU Wars
|
||||||
|
|
||||||
/CPU worz/ , n. A 1979 large-format comic by Chas Andres chronicling the
|
/CPU worz/, n. A 1979 large-format comic by Chas Andres chronicling the
|
||||||
attempts of the brainwashed androids of IPM (Impossible to Program Machines)
|
attempts of the brainwashed androids of IPM (Impossible to Program Machines)
|
||||||
to conquer and destroy the peaceful denizens of HEC (Human Engineered
|
to conquer and destroy the peaceful denizens of HEC (Human Engineered
|
||||||
Computers). This rather transparent allegory featured many references to
|
Computers). This rather transparent allegory featured many references to
|
||||||
@ -11,4 +11,3 @@ letter of appreciation on IBM company stationery from the head of IBM's
|
|||||||
Thomas J. Watson Research Laboratories (at that time one of the few islands
|
Thomas J. Watson Research Laboratories (at that time one of the few islands
|
||||||
of true hackerdom in the IBM archipelago). The lower loop of the B in the
|
of true hackerdom in the IBM archipelago). The lower loop of the B in the
|
||||||
IBM logo, it is said, had been carefully whited out. See eat flaming death.
|
IBM logo, it is said, had been carefully whited out. See eat flaming death.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@ CRC handbook
|
|||||||
|
|
||||||
Any of the editions of the Chemical Rubber Company Handbook of Chemistry and
|
Any of the editions of the Chemical Rubber Company Handbook of Chemistry and
|
||||||
Physics ; there are other CRC handbooks, such as the CRC Standard
|
Physics ; there are other CRC handbooks, such as the CRC Standard
|
||||||
Mathematical Tables and Formulae , but the is the chemistry and physics
|
Mathematical Tables and Formulae, but the is the chemistry and physics
|
||||||
reference. It is massive tome full of mathematical tables, physical
|
reference. It is massive tome full of mathematical tables, physical
|
||||||
constants of thousands of alloys and chemical compounds, dielectric
|
constants of thousands of alloys and chemical compounds, dielectric
|
||||||
strengths, vapor pressure, resistivity, and the like. Hackers have
|
strengths, vapor pressure, resistivity, and the like. Hackers have
|
||||||
@ -12,4 +12,3 @@ and would feel vaguely bereft if they couldn't look up the magnetic
|
|||||||
susceptibility of potassium permanganate at a moment's notice. On hackers'
|
susceptibility of potassium permanganate at a moment's notice. On hackers'
|
||||||
bookshelves, the is rather likely to keep company with an unabridged Oxford
|
bookshelves, the is rather likely to keep company with an unabridged Oxford
|
||||||
English Dictionary and a good atlas.
|
English Dictionary and a good atlas.
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@ CTSS
|
|||||||
|
|
||||||
/CTSS/ , n. Compatible Time-Sharing System. An early (1963) experiment in
|
/CTSS/ , n. Compatible Time-Sharing System. An early (1963) experiment in
|
||||||
the design of interactive timesharing operating systems, ancestral to
|
the design of interactive timesharing operating systems, ancestral to
|
||||||
Multics , Unix , and ITS. The name ITS (Incompatible Time-sharing System)
|
Multics, Unix, and ITS. The name ITS (Incompatible Time-sharing System)
|
||||||
was a hack on CTSS, meant both as a joke and to express some basic
|
was a hack on CTSS, meant both as a joke and to express some basic
|
||||||
differences in philosophy about the way I/O services should be presented to
|
differences in philosophy about the way I/O services should be presented to
|
||||||
user programs.
|
user programs.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
Camel Book
|
Camel Book
|
||||||
|
|
||||||
n. Universally recognized nickname for the book Programming Perl , by Larry
|
n. Universally recognized nickname for the book Programming Perl, by Larry
|
||||||
Wall and Randal L. Schwartz, O'Reilly and Associates 1991.
|
Wall and Randal L. Schwartz, O'Reilly and Associates 1991.
|
||||||
The definitive reference on Perl.
|
The definitive reference on Perl.
|
||||||
|
@ -2,7 +2,7 @@ Cancelmoose[tm]
|
|||||||
|
|
||||||
/kanselmoos/ [Usenet] The archetype and model of all good spam -fighters.
|
/kanselmoos/ [Usenet] The archetype and model of all good spam -fighters.
|
||||||
Once upon a time, the 'Moose would send out spam-cancels and then post
|
Once upon a time, the 'Moose would send out spam-cancels and then post
|
||||||
notice anonymously to news.admin.policy , news.admin.misc , and
|
notice anonymously to news.admin.policy, news.admin.misc, and
|
||||||
alt.current-events.net-abuse. The 'Moose stepped to the fore on its own
|
alt.current-events.net-abuse. The 'Moose stepped to the fore on its own
|
||||||
initiative, at a time (mid-1994) when spam-cancels were irregular and
|
initiative, at a time (mid-1994) when spam-cancels were irregular and
|
||||||
disorganized, and behaved altogether admirably fair, even-handed, and quick
|
disorganized, and behaved altogether admirably fair, even-handed, and quick
|
||||||
@ -15,4 +15,3 @@ http://www.cm.org/. ) By early 1995, others had stepped into the spam-cancel
|
|||||||
business, and appeared to be comporting themselves well, after the 'Moose's
|
business, and appeared to be comporting themselves well, after the 'Moose's
|
||||||
manner. The 'Moose has now gotten out of the business, and is more
|
manner. The 'Moose has now gotten out of the business, and is more
|
||||||
interested in ending spam (and cancels) entirely.
|
interested in ending spam (and cancels) entirely.
|
||||||
|
|
||||||
|
@ -1,9 +1,8 @@
|
|||||||
Chernobyl packet
|
Chernobyl packet
|
||||||
|
|
||||||
/chernohb@l pak'@t/ , n. A network packet that induces a broadcast storm
|
/chernohb@l pak'@t/ , n. A network packet that induces a broadcast storm
|
||||||
and/or network meltdown , in memory of the April 1986 nuclear accident at
|
and/or network meltdown, in memory of the April 1986 nuclear accident at
|
||||||
Chernobyl in Ukraine. The typical scenario involves an IP Ethernet datagram
|
Chernobyl in Ukraine. The typical scenario involves an IP Ethernet datagram
|
||||||
that passes through a gateway with both source and destination Ether and IP
|
that passes through a gateway with both source and destination Ether and IP
|
||||||
address set as the respective broadcast addresses for the subnetworks being
|
address set as the respective broadcast addresses for the subnetworks being
|
||||||
gated between. Compare Christmas tree packet.
|
gated between. Compare Christmas tree packet.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user