cloud
This commit is contained in:
parent
b44cfb3de3
commit
6444609717
@ -19,7 +19,7 @@ Free Documentation License".
|
||||
|
||||
* Generated
|
||||
|
||||
This file last generated Tuesday, 16 October 2018 02:44PM UTC
|
||||
This file last generated Tuesday, 16 October 2018 03:07PM UTC
|
||||
|
||||
* Glossary
|
||||
** (
|
||||
@ -4553,9 +4553,6 @@ n. [obs.] A type of Internet service first floated around 1991 and obsolesced ar
|
||||
*** gorets
|
||||
/gorets/ , n. The unknown ur-noun, fill in your own meaning. Found esp. on the Usenet newsgroup alt.gorets , which seems to be a running contest to redefine the word by implication in the funniest and most peculiar way, with the understanding that no definition is ever final. Compare frink.
|
||||
|
||||
*** gorilla arm
|
||||
n. The side-effect that destroyed touch-screens as a mainstream input technology despite a promising start in the early 1980s. It seems the designers of all those spiffy touch-menu systems failed to notice that humans aren't designed to hold their arms in front of their faces making small motions. After more than a very few selections, the arm begins to feel sore, cramped, and oversized the operator looks like a gorilla while using the touch screen and feels like one afterwards. This is now considered a classic cautionary tale to human-factors designers; Remember the gorilla arm! is shorthand for How is this going to fly in real use?.
|
||||
|
||||
*** gorp
|
||||
/gorp/ , n. [CMU: perhaps from the canonical hiker's food, Good Old Raisins and Peanuts] Another metasyntactic variable , like foo and bar.
|
||||
|
||||
|
BIN
docs/jargon.1.gz
BIN
docs/jargon.1.gz
Binary file not shown.
@ -18,7 +18,7 @@ Free Documentation License".
|
||||
</p>
|
||||
<H2>Generated</H2>
|
||||
<p>
|
||||
This file last generated Tuesday, 16 October 2018 02:44PM UTC
|
||||
This file last generated Tuesday, 16 October 2018 03:07PM UTC
|
||||
|
||||
</p>
|
||||
<H2>Glossary</H2>
|
||||
@ -5345,10 +5345,6 @@ This file last generated Tuesday, 16 October 2018 02:44PM UTC
|
||||
<p>
|
||||
/gorets/ , n. The unknown ur-noun, fill in your own meaning. Found esp. on the Usenet newsgroup alt.gorets , which seems to be a running contest to redefine the word by implication in the funniest and most peculiar way, with the understanding that no definition is ever final. Compare frink.
|
||||
</p>
|
||||
<H4>gorilla arm</H4>
|
||||
<p>
|
||||
n. The side-effect that destroyed touch-screens as a mainstream input technology despite a promising start in the early 1980s. It seems the designers of all those spiffy touch-menu systems failed to notice that humans aren't designed to hold their arms in front of their faces making small motions. After more than a very few selections, the arm begins to feel sore, cramped, and oversized the operator looks like a gorilla while using the touch screen and feels like one afterwards. This is now considered a classic cautionary tale to human-factors designers; Remember the gorilla arm! is shorthand for How is this going to fly in real use?.
|
||||
</p>
|
||||
<H4>gorp</H4>
|
||||
<p>
|
||||
/gorp/ , n. [CMU: perhaps from the canonical hiker's food, Good Old Raisins and Peanuts] Another metasyntactic variable , like foo and bar.
|
||||
|
18
entries/cloud.txt
Normal file
18
entries/cloud.txt
Normal file
@ -0,0 +1,18 @@
|
||||
cloud
|
||||
|
||||
n. Somewhere you don't want to put your files. Insecure centralized location,
|
||||
usually administered by a megacorporation.
|
||||
|
||||
The term "cloud computing" became popular after about 2010 to refer to putting
|
||||
your files onto a centralized server system which you don't own and have no
|
||||
control over - thereby exposing your data to numerous threats and "third party
|
||||
doctrine" legal disputes.
|
||||
|
||||
The rise of cloud computing also eliminated many system administrator jobs
|
||||
within small companies, which had been a traditional source of income for many
|
||||
hackers. Companies could make their sysadmins redundant, but now a bigger
|
||||
megacorp controlled their asses.
|
||||
|
||||
When hackers use "the cloud" it's a server which they have root on, and client
|
||||
side encryption may be used to ensure that whoever is administering the
|
||||
server can't get access to the data.
|
Loading…
Reference in New Issue
Block a user