and
This commit is contained in:
parent
e01e994d9f
commit
a687a88900
@ -5,9 +5,8 @@ Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at
|
|||||||
Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP
|
Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP
|
||||||
networking enhancements, and many other features. The BSD versions (4.1,
|
networking enhancements, and many other features. The BSD versions (4.1,
|
||||||
4.2, and 4.3) and the commercial versions derived from them (SunOS, ULTRIX,
|
4.2, and 4.3) and the commercial versions derived from them (SunOS, ULTRIX,
|
||||||
and Mt. Xinu) held the technical lead in the Unix world until AT T's
|
and Mt. Xinu) held the technical lead in the Unix world until AT&T's
|
||||||
successful standardization efforts after about 1986; descendants including
|
successful standardization efforts after about 1986; descendants including
|
||||||
Free/Open/NetBSD, BSD/OS and MacOS X are still widely popular. Note that BSD
|
Free/Open/NetBSD, BSD/OS and MacOS X are still widely popular. Note that BSD
|
||||||
versions going back to 2.9 are often referred to by their version numbers
|
versions going back to 2.9 are often referred to by their version numbers
|
||||||
alone, without the BSD prefix. See also Unix.
|
alone, without the BSD prefix. See also Unix.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
C++
|
C++
|
||||||
|
|
||||||
/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT T Bell Labs as a
|
/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT&T Bell Labs as a
|
||||||
successor to C. Now one of the languages of choice , although many hackers
|
successor to C. Now one of the languages of choice , although many hackers
|
||||||
still grumble that it is the successor to either Algol 68 or Ada (depending
|
still grumble that it is the successor to either Algol 68 or Ada (depending
|
||||||
on generation), and a prime example of second-system effect. Almost anything
|
on generation), and a prime example of second-system effect. Almost anything
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
Death Square
|
Death Square
|
||||||
|
|
||||||
n. The corporate logo of Novell, the people who acquired USL after AT T let
|
n. The corporate logo of Novell, the people who acquired USL after AT&T let
|
||||||
go of it (Novell eventually sold the Unix group to SCO). Coined by analogy
|
go of it (Novell eventually sold the Unix group to SCO). Coined by analogy
|
||||||
with Death Star , because many people believed Novell was bungling the lead
|
with Death Star , because many people believed Novell was bungling the lead
|
||||||
in Unix systems exactly as AT T did for many years.
|
in Unix systems exactly as AT&T did for many years.
|
||||||
|
|
||||||
|
@ -1,12 +1,11 @@
|
|||||||
Death Star
|
Death Star
|
||||||
|
|
||||||
n. [from the movie Star Wars ] 1. The AT T corporate logo, which bears an
|
n. [from the movie Star Wars ] 1. The AT&T corporate logo, which bears an
|
||||||
uncanny resemblance to the Death Star in the Star Wars movies. This usage
|
uncanny resemblance to the Death Star in the Star Wars movies. This usage
|
||||||
was particularly common among partisans of BSD Unix in the 1980s, who tended
|
was particularly common among partisans of BSD Unix in the 1980s, who tended
|
||||||
to regard the AT T versions as inferior and AT T as a bad guy. Copies still
|
to regard the AT&T versions as inferior and AT&T as a bad guy. Copies still
|
||||||
circulate of a poster printed by Mt. Xinu showing a starscape with a space
|
circulate of a poster printed by Mt. Xinu showing a starscape with a space
|
||||||
fighter labeled 4.2 BSD streaking away from a broken AT T logo wreathed in
|
fighter labeled 4.2 BSD streaking away from a broken AT&T logo wreathed in
|
||||||
flames. 2. AT T's internal magazine, Focus , uses death star to describe an
|
flames. 2. AT&T's internal magazine, Focus , uses death star to describe an
|
||||||
incorrectly done AT T logo in which the inner circle in the top left is dark
|
incorrectly done AT&T logo in which the inner circle in the top left is dark
|
||||||
instead of light a frequent result of dark-on-light logo images.
|
instead of light a frequent result of dark-on-light logo images.
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@ apocryphal). Ultimately DEC picked TOPS-20 as the name of the operating
|
|||||||
system, and it was as TOPS-20 that it was marketed. The hacker community,
|
system, and it was as TOPS-20 that it was marketed. The hacker community,
|
||||||
mindful of its origins, quickly dubbed it TWENEX (a contraction of twenty
|
mindful of its origins, quickly dubbed it TWENEX (a contraction of twenty
|
||||||
TENEX ), even though by this point very little of the original TENEX code
|
TENEX ), even though by this point very little of the original TENEX code
|
||||||
remained (analogously to the differences between AT T V6 Unix and BSD). DEC
|
remained (analogously to the differences between AT&T V6 Unix and BSD). DEC
|
||||||
people cringed when they heard TWENEX , but the term caught on nevertheless
|
people cringed when they heard TWENEX , but the term caught on nevertheless
|
||||||
(the written abbreviation 20x was also used). TWENEX was successful and very
|
(the written abbreviation 20x was also used). TWENEX was successful and very
|
||||||
popular; in fact, there was a period in the early 1980s when it commanded as
|
popular; in fact, there was a period in the early 1980s when it commanded as
|
||||||
@ -27,4 +27,3 @@ VMS OS killed the DEC-20 and put a sad end to TWENEX's brief day in the sun.
|
|||||||
DEC attempted to convince TOPS-20 users to convert to VMS , but instead, by
|
DEC attempted to convince TOPS-20 users to convert to VMS , but instead, by
|
||||||
the late 1980s, most of the TOPS-20 hackers had migrated to Unix. There is a
|
the late 1980s, most of the TOPS-20 hackers had migrated to Unix. There is a
|
||||||
TOPS-20 home page.
|
TOPS-20 home page.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
UN*X
|
UN*X
|
||||||
|
|
||||||
n. Used to refer to the Unix operating system (a trademark of AT T, then of
|
n. Used to refer to the Unix operating system (a trademark of AT&T, then of
|
||||||
Novell, then of Unix Systems Laboratories, then of the Open Group; the
|
Novell, then of Unix Systems Laboratories, then of the Open Group; the
|
||||||
source code parted company with it after Novell and was owned by SCO, which
|
source code parted company with it after Novell and was owned by SCO, which
|
||||||
was acquired by Caldera) in writing, but avoiding the need for the ugly
|
was acquired by Caldera) in writing, but avoiding the need for the ugly
|
||||||
@ -11,4 +11,3 @@ entrenched anyhow. It has been suggested that there may be a psychological
|
|||||||
connection to practice in certain religions (especially Judaism) in which
|
connection to practice in certain religions (especially Judaism) in which
|
||||||
the name of the deity is never written out in full, e.g., YHWH or G--d is
|
the name of the deity is never written out in full, e.g., YHWH or G--d is
|
||||||
used. See also glob and splat out.
|
used. See also glob and splat out.
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ better off reading the source code that supports whatever feature is causing
|
|||||||
confusion, rather than making yet another futile pass through the manuals,
|
confusion, rather than making yet another futile pass through the manuals,
|
||||||
or broadcasting questions on Usenet that haven't attracted wizards to
|
or broadcasting questions on Usenet that haven't attracted wizards to
|
||||||
answer them. Once upon a time in elder days , everyone running Unix had
|
answer them. Once upon a time in elder days , everyone running Unix had
|
||||||
source. After 1978, AT T's policy tightened up, so this objurgation was in
|
source. After 1978, AT&T's policy tightened up, so this objurgation was in
|
||||||
theory appropriately directed only at associates of some outfit with a Unix
|
theory appropriately directed only at associates of some outfit with a Unix
|
||||||
source license. In practice, bootlegs of Unix source code (made precisely
|
source license. In practice, bootlegs of Unix source code (made precisely
|
||||||
for reference purposes) were so ubiquitous that one could utter it at almost
|
for reference purposes) were so ubiquitous that one could utter it at almost
|
||||||
|
@ -2,11 +2,11 @@ Unix conspiracy
|
|||||||
|
|
||||||
n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20
|
n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20
|
||||||
fans, Unix's growth is the result of a plot, hatched during the 1970s at
|
fans, Unix's growth is the result of a plot, hatched during the 1970s at
|
||||||
Bell Labs, whose intent was to hobble AT T's competitors by making them
|
Bell Labs, whose intent was to hobble AT&T's competitors by making them
|
||||||
dependent upon a system whose future evolution was to be under AT T's
|
dependent upon a system whose future evolution was to be under AT&T's
|
||||||
control. This would be accomplished by disseminating an operating system
|
control. This would be accomplished by disseminating an operating system
|
||||||
that is apparently inexpensive and easily portable, but also relatively
|
that is apparently inexpensive and easily portable, but also relatively
|
||||||
unreliable and insecure (so as to require continuing upgrades from AT T).
|
unreliable and insecure (so as to require continuing upgrades from AT&T).
|
||||||
This theory was lent a substantial impetus in 1984 by the paper referenced
|
This theory was lent a substantial impetus in 1984 by the paper referenced
|
||||||
in the back door entry. In this view, Unix was designed to be one of the
|
in the back door entry. In this view, Unix was designed to be one of the
|
||||||
first computer viruses (see virus ) but a virus spread to computers
|
first computer viruses (see virus ) but a virus spread to computers
|
||||||
@ -16,6 +16,5 @@ the well-known quotation Unix is snake oil was uttered by DEC president
|
|||||||
Kenneth Olsen shortly before DEC began actively promoting its own family of
|
Kenneth Olsen shortly before DEC began actively promoting its own family of
|
||||||
Unix workstations. (Olsen now claims to have been misquoted.) If there was
|
Unix workstations. (Olsen now claims to have been misquoted.) If there was
|
||||||
ever such a conspiracy, it got thoroughly out of the plotters' control after
|
ever such a conspiracy, it got thoroughly out of the plotters' control after
|
||||||
1990. AT T sold its Unix operation to Novell around the same time Linux and
|
1990. AT&T sold its Unix operation to Novell around the same time Linux and
|
||||||
other free-Unix distributions were beginning to make noise.
|
other free-Unix distributions were beginning to make noise.
|
||||||
|
|
||||||
|
@ -3,10 +3,10 @@ dumpster diving
|
|||||||
/dump'ster di:ving/ , n. 1. The practice of sifting refuse from an office or
|
/dump'ster di:ving/ , n. 1. The practice of sifting refuse from an office or
|
||||||
technical installation to extract confidential data, especially
|
technical installation to extract confidential data, especially
|
||||||
security-compromising information ( dumpster is an Americanism for what is
|
security-compromising information ( dumpster is an Americanism for what is
|
||||||
elsewhere called a skip ). Back in AT T's monopoly days, before paper
|
elsewhere called a skip ). Back in AT&T's monopoly days, before paper
|
||||||
shredders became common office equipment, phone phreaks (see phreaking )
|
shredders became common office equipment, phone phreaks (see phreaking )
|
||||||
used to organize regular dumpster runs against phone company plants and
|
used to organize regular dumpster runs against phone company plants and
|
||||||
offices. Discarded and damaged copies of AT T internal manuals taught them
|
offices. Discarded and damaged copies of AT&T internal manuals taught them
|
||||||
much. The technique is still rumored to be a favorite of crackers operating
|
much. The technique is still rumored to be a favorite of crackers operating
|
||||||
against careless targets. 2. The practice of raiding the dumpsters behind
|
against careless targets. 2. The practice of raiding the dumpsters behind
|
||||||
buildings where producers and/or consumers of high-tech equipment are
|
buildings where producers and/or consumers of high-tech equipment are
|
||||||
@ -14,4 +14,3 @@ located, with the expectation (usually justified) of finding discarded but
|
|||||||
still-valuable equipment to be nursed back to health in some hacker's den.
|
still-valuable equipment to be nursed back to health in some hacker's den.
|
||||||
Experienced dumpster-divers not infrequently accumulate basements full of
|
Experienced dumpster-divers not infrequently accumulate basements full of
|
||||||
moldering (but still potentially useful) cruft.
|
moldering (but still potentially useful) cruft.
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ and CTSS program RUNOFF by Jerome Saltzer ( that name came from the
|
|||||||
expression to run off a copy ). A companion program, nroff , formats output
|
expression to run off a copy ). A companion program, nroff , formats output
|
||||||
for terminals and line printers. In 1979, Brian Kernighan modified troff so
|
for terminals and line printers. In 1979, Brian Kernighan modified troff so
|
||||||
that it could drive phototypesetters other than the Graphic Systems CAT. His
|
that it could drive phototypesetters other than the Graphic Systems CAT. His
|
||||||
paper describing that work ( A Typesetter-independent troff, AT T CSTR #97)
|
paper describing that work (A Typesetter-independent troff, AT&T CSTR #97)
|
||||||
explains troff's durability. After discussing the program's obvious
|
explains troff's durability. After discussing the program's obvious
|
||||||
deficiencies a rebarbative input syntax, mysterious and undocumented
|
deficiencies a rebarbative input syntax, mysterious and undocumented
|
||||||
properties in some areas, and a voracious appetite for computer resources
|
properties in some areas, and a voracious appetite for computer resources
|
||||||
@ -22,4 +22,3 @@ systems have reduced troff 's relative importance, but this tribute
|
|||||||
perfectly captures the strengths that secured troff a place in hacker
|
perfectly captures the strengths that secured troff a place in hacker
|
||||||
folklore; indeed, it could be taken more generally as an indication of those
|
folklore; indeed, it could be taken more generally as an indication of those
|
||||||
qualities of good programs that, in the long run, hackers most admire.
|
qualities of good programs that, in the long run, hackers most admire.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user