Update general appearance
This commit is contained in:
parent
ed67bff584
commit
4b8933d6f4
@ -19,7 +19,7 @@ Free Documentation License".
|
|||||||
|
|
||||||
* Generated
|
* Generated
|
||||||
|
|
||||||
This file last generated Sunday, 12 February 2017 10:47AM UTC
|
This file last generated Sunday, 12 February 2017 11:03AM UTC
|
||||||
|
|
||||||
* Glossary
|
* Glossary
|
||||||
** (
|
** (
|
||||||
@ -717,7 +717,7 @@ The speed of software halves every 18 months. This oft-cited law is an ironic co
|
|||||||
Hackerdom is still predominantly male. However, the percentage of women is clearly higher than the low-single-digit range typical for technical professions, and female hackers are generally respected and dealt with as equals. In the U.S., hackerdom is predominantly Caucasian with strong minorities of Jews (East Coast) and Orientals (West Coast). The Jewish contingent has exerted a particularly pervasive cultural influence (see Food , above, and note that several common jargon terms are obviously mutated Yiddish). The ethnic distribution of hackers is understood by them to be a function of which ethnic groups tend to seek and value education. Racial and ethnic prejudice is notably uncommon and tends to be met with freezing contempt. When asked, hackers often ascribe their culture's gender- and color-blindness to a positive effect of text-only network channels, and this is doubtless a powerful influence. Also, the ties many hackers have to AI research and SF literature may have helped them to develop an idea of personhood that is inclusive rather than exclusive after all, if one's imagination readily grants full human rights to future AI programs, robots, dolphins, and extraterrestrial aliens, mere color and gender can't seem very important any more.
|
Hackerdom is still predominantly male. However, the percentage of women is clearly higher than the low-single-digit range typical for technical professions, and female hackers are generally respected and dealt with as equals. In the U.S., hackerdom is predominantly Caucasian with strong minorities of Jews (East Coast) and Orientals (West Coast). The Jewish contingent has exerted a particularly pervasive cultural influence (see Food , above, and note that several common jargon terms are obviously mutated Yiddish). The ethnic distribution of hackers is understood by them to be a function of which ethnic groups tend to seek and value education. Racial and ethnic prejudice is notably uncommon and tends to be met with freezing contempt. When asked, hackers often ascribe their culture's gender- and color-blindness to a positive effect of text-only network channels, and this is doubtless a powerful influence. Also, the ties many hackers have to AI research and SF literature may have helped them to develop an idea of personhood that is inclusive rather than exclusive after all, if one's imagination readily grants full human rights to future AI programs, robots, dolphins, and extraterrestrial aliens, mere color and gender can't seem very important any more.
|
||||||
|
|
||||||
*** General Appearance
|
*** General Appearance
|
||||||
Intelligent. Scruffy. Intense. Abstracted. Surprisingly for a sedentary profession, more hackers run to skinny than fat; both extremes are more common than elsewhere. Tans are rare. Prev Up Next AppendixB.A Portrait of J.
|
Although the mainstream media may believe otherwise, hackers do not have any particular uniform or appearance. Anyone you see in the supermarket could be a hacker. Since the majority of people are proletarians the typical hacker just looks like any other prole. Occasionally they may be distinguished by wearing T-shirts or hoodies with software/distro/conference logos on them. At the end of the 20th century hackers were mostly caucasian 20-something dudes from middle class families and living in Europe or the US, but as computing and knowledge became cheaper and more ubiquitous the initially privileged profile gave way to total generality. Today the main distinguishing feature of hackers is being interested in computers and tinkering with them, not any particular physical appearance or economic status.
|
||||||
|
|
||||||
*** General Public Virus
|
*** General Public Virus
|
||||||
n. Pejorative name for some versions of the GNU project copyleft or General Public License (GPL), which requires that any tools or apps incorporating copylefted code must be source-distributed on the same anti-proprietary terms as GNU stuff. Thus it is alleged that the copyleft infects software generated with GNU tools, which may in turn infect other software that reuses any of its code. The Free Software Foundation's official position is that copyright law limits the scope of the GPL to programs textually incorporating significant amounts of GNU code , and that the infection is not passed on to third parties unless actual GNU source is transmitted. Nevertheless, widespread suspicion that the copyleft language is boobytrapped has caused many developers to avoid using GNU tools and the GPL. Changes in the language of the version 2.0 GPL did not eliminate this problem.
|
n. Pejorative name for some versions of the GNU project copyleft or General Public License (GPL), which requires that any tools or apps incorporating copylefted code must be source-distributed on the same anti-proprietary terms as GNU stuff. Thus it is alleged that the copyleft infects software generated with GNU tools, which may in turn infect other software that reuses any of its code. The Free Software Foundation's official position is that copyright law limits the scope of the GPL to programs textually incorporating significant amounts of GNU code , and that the infection is not passed on to third parties unless actual GNU source is transmitted. Nevertheless, widespread suspicion that the copyleft language is boobytrapped has caused many developers to avoid using GNU tools and the GPL. Changes in the language of the version 2.0 GPL did not eliminate this problem.
|
||||||
|
BIN
docs/jargon.1.gz
BIN
docs/jargon.1.gz
Binary file not shown.
@ -18,7 +18,7 @@ Free Documentation License".
|
|||||||
</p>
|
</p>
|
||||||
<H2>Generated</H2>
|
<H2>Generated</H2>
|
||||||
<p>
|
<p>
|
||||||
This file last generated Sunday, 12 February 2017 10:47AM UTC
|
This file last generated Sunday, 12 February 2017 11:03AM UTC
|
||||||
|
|
||||||
</p>
|
</p>
|
||||||
<H2>Glossary</H2>
|
<H2>Glossary</H2>
|
||||||
@ -880,7 +880,7 @@ This file last generated Sunday, 12 February 2017 10:47AM UTC
|
|||||||
</p>
|
</p>
|
||||||
<H4>General Appearance</H4>
|
<H4>General Appearance</H4>
|
||||||
<p>
|
<p>
|
||||||
Intelligent. Scruffy. Intense. Abstracted. Surprisingly for a sedentary profession, more hackers run to skinny than fat; both extremes are more common than elsewhere. Tans are rare. Prev Up Next AppendixB.A Portrait of J.
|
Although the mainstream media may believe otherwise, hackers do not have any particular uniform or appearance. Anyone you see in the supermarket could be a hacker. Since the majority of people are proletarians the typical hacker just looks like any other prole. Occasionally they may be distinguished by wearing T-shirts or hoodies with software/distro/conference logos on them. At the end of the 20th century hackers were mostly caucasian 20-something dudes from middle class families and living in Europe or the US, but as computing and knowledge became cheaper and more ubiquitous the initially privileged profile gave way to total generality. Today the main distinguishing feature of hackers is being interested in computers and tinkering with them, not any particular physical appearance or economic status.
|
||||||
</p>
|
</p>
|
||||||
<H4>General Public Virus</H4>
|
<H4>General Public Virus</H4>
|
||||||
<p>
|
<p>
|
||||||
|
@ -1,7 +1,14 @@
|
|||||||
General Appearance
|
General Appearance
|
||||||
|
|
||||||
Intelligent. Scruffy. Intense. Abstracted. Surprisingly for a sedentary
|
Although the mainstream media may believe otherwise, hackers do not have any
|
||||||
profession, more hackers run to skinny than fat; both extremes are more
|
particular uniform or appearance. Anyone you see in the supermarket could be
|
||||||
common than elsewhere. Tans are rare. Prev Up Next AppendixB.A Portrait of
|
a hacker. Since the majority of people are proletarians the typical hacker
|
||||||
J.
|
just looks like any other prole. Occasionally they may be distinguished by
|
||||||
|
wearing T-shirts or hoodies with software/distro/conference logos on them.
|
||||||
|
|
||||||
|
At the end of the 20th century hackers were mostly caucasian 20-something
|
||||||
|
dudes from middle class families and living in Europe or the US, but as computing
|
||||||
|
and knowledge became cheaper and more ubiquitous the initially privileged
|
||||||
|
profile gave way to total generality. Today the main distinguishing feature
|
||||||
|
of hackers is being interested in computers and tinkering with them, not any
|
||||||
|
particular physical appearance or economic status.
|
Loading…
Reference in New Issue
Block a user