diff --git a/docs/jargon-org.txt b/docs/jargon-org.txt index eedfd5a..9f0c018 100644 --- a/docs/jargon-org.txt +++ b/docs/jargon-org.txt @@ -19,7 +19,7 @@ Free Documentation License". * Generated -This file last generated Monday, 15 October 2018 12:29PM UTC +This file last generated Monday, 15 October 2018 01:46PM UTC * Glossary ** ( @@ -33,7 +33,7 @@ Combining form denoting expert practice of a skill. That's going to take some se *** -oid 1. Used as in mainstream slang English to indicate a poor imitation, a counterfeit, or some otherwise slightly bogus resemblance. Hackers will happily use it with all sorts of non-Greco/Latin stem words that wouldn't keep company with it in mainstream English. For example, He's a nerdoid means that he superficially resembles a nerd but can't make the grade; a modemoid might be a 300-baud box (Real Modems run at 28.8 or up); a computeroid might be any bitty box. The word keyboid could be used to describe a chiclet keyboard , but would have to be written; spoken, it would confuse the listener as to the speaker's city of origin. -2. More specifically, an indicator for resembling an android which in the past has been confined to science-fiction fans and hackers. It too has recently (in 1991) started to go mainstream (most notably in the term trendoid for victims of terminal hipness). This is probably traceable to the popularization of the term droid in Star Wars and its sequels. (See also windoid. ) Coinages in both forms have been common in science fiction for at least fifty years, and hackers (who are often SF fans) have probably been making -oid jargon for almost that long [though GLS and I can personally confirm only that they were already common in the mid-1970s ESR]. +2. More specifically, an indicator for resembling an android which in the past has been confined to science-fiction fans and hackers. It too has recently (in 1991) started to go mainstream (most notably in the term trendoid for victims of terminal hipness). This is probably traceable to the popularization of the term droid in Star Wars and its sequels. (See also windoid. ) Coinages in both forms have been common in science fiction for at least fifty years, and hackers (who are often SF fans) have probably been making -oid jargon for almost that long. *** -ware suff. [from software ] Commonly used to form jargon terms for classes of software. For examples, see annoyware , careware , crippleware , crudware , freeware , fritterware , guiltware , liveware , meatware , payware , psychedelicware , shareware , shelfware , vaporware , wetware , spyware , adware. @@ -173,7 +173,7 @@ n. [linux-kernel mailing list] The archetypal non-technical user, one's elderly /BAD/ , adj. [IBM: acronym, Broken As Designed ] Said of a program that is bogus because of bad design and misfeatures rather than because of bugginess. See working as designed. *** BASIC -/bay'sic/ , n. A programming language, originally designed for Dartmouth's experimental timesharing system in the early 1960s, which for many years was the leading cause of brain damage in proto-hackers. Edsger W. Dijkstra observed in Selected Writings on Computing: A Personal Perspective that It is practically impossible to teach good programming style to students that have had prior exposure to BASIC: as potential programmers they are mentally mutilated beyond hope of regeneration. This is another case (like Pascal ) of the cascading lossage that happens when a language deliberately designed as an educational toy gets taken too seriously. A novice can write short BASIC programs (on the order of 10-20 lines) very easily; writing anything longer (a) is very painful, and (b) encourages bad habits that will make it harder to use more powerful languages well. This wouldn't be so bad if historical accidents hadn't made BASIC so common on low-end micros in the 1980s. As it is, it probably ruined tens of thousands of potential wizards. [1995: Some languages called BASIC aren't quite this nasty any more, having acquired Pascal- and C-like procedures and control structures and shed their line numbers. ESR] BASIC stands for Beginner's All-purpose Symbolic Instruction Code. Earlier versions of this entry claiming this was a later backronym were incorrect. +/bay'sic/ , n. A programming language, originally designed for Dartmouth's experimental timesharing system in the early 1960s, which for many years was the leading cause of brain damage in proto-hackers. Edsger W. Dijkstra observed in Selected Writings on Computing: A Personal Perspective that It is practically impossible to teach good programming style to students that have had prior exposure to BASIC: as potential programmers they are mentally mutilated beyond hope of regeneration. This is another case (like Pascal ) of the cascading lossage that happens when a language deliberately designed as an educational toy gets taken too seriously. A novice can write short BASIC programs (on the order of 10-20 lines) very easily; writing anything longer (a) is very painful, and (b) encourages bad habits that will make it harder to use more powerful languages well. This wouldn't be so bad if historical accidents hadn't made BASIC so common on low-end micros in the 1980s. As it is, it probably ruined tens of thousands of potential wizards. BASIC stands for Beginner's All-purpose Symbolic Instruction Code. Earlier versions of this entry claiming this was a later backronym were incorrect. *** BBS /BBS/ , n. [common; abbreviation, Bulletin Board System ] An electronic bulletin board system; that is, a message database where people can log in and leave broadcast messages for others grouped (typically) into topic group s. The term was especially applied to the thousands of local BBS systems that operated during the pre-Internet microcomputer era of roughly 1980 to 1995, typically run by amateurs for fun out of their homes on MS-DOS boxes with a single modem line each. Fans of Usenet and Internet or the big commercial timesharing bboards such as CompuServe and GEnie tended to consider local BBSes the low-rent district of the hacker culture, but they served a valuable function by knitting together lots of hackers and users in the personal-micro world who would otherwise have been unable to exchange code at all. Post-Internet, BBSs are likely to be local newsgroups on an ISP; efficiency has increased but a certain flavor has been lost. See also bboard. @@ -296,7 +296,7 @@ prov. Adding manpower to a late software project makes it later a result of the n. The tendency of the undisciplined C programmer to set arbitrary but supposedly generous static limits on table sizes (defined, if you're lucky, by constants in header files) rather than taking the trouble to do proper dynamic storage allocation. If an application user later needs to put 68 elements into a table of size 50, the afflicted programmer reasons that he or she can easily reset the table size to 68 (or even as much as 70, to allow for future expansion) and recompile. This gives the programmer the comfortable feeling of having made the effort to satisfy the user's (unreasonable) demands, and often affords the user multiple opportunities to explore the marvelous consequences of fandango on core. In severe cases of the disease, the programmer cannot comprehend why each fix of this kind seems only to further disgruntle the user. *** C++ -/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. [Many hackers would now add Yes, and it's called Java ESR] Nowadays we say this of C++. +/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. Nowadays we say this of C++. *** CDA /CDA/ The Communications Decency Act , passed as section 502 of a major telecommunications reform bill on February 8th, 1996 ( Black Thursday ). The CDA made it a federal crime in the USA to send a communication which is obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse, threaten, or harass another person. It also threatened with imprisonment anyone who knowingly makes accessible to minors any message that describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs. While the CDA was sold as a measure to protect minors from the putative evils of pornography, the repressive political aims of the bill were laid bare by the Hyde amendment, which intended to outlaw discussion of abortion on the Internet. To say that this direct attack on First Amendment free-speech rights was not well received on the Internet would be putting it mildly. A firestorm of protest followed, including a February 29th 1996 mass demonstration by thousands of netters who turned their home pages black for 48 hours. Several civil-rights groups and computing/telecommunications companies mounted a constitutional challenge. The CDA was demolished by a strongly-worded decision handed down in 8th-circuit Federal court and subsequently affirmed by the U.S. Supreme Court on 26 June 1997 ( White Thursday ). See also Exon. @@ -408,7 +408,7 @@ n. A game between assembler programs in a machine or machine simulator, where th /dek/ , n. n. Commonly used abbreviation for Digital Equipment Corporation, later deprecated by DEC itself in favor of Digital and now entirely obsolete following the buyout by Compaq. Before the killer micro revolution of the late 1980s, hackerdom was closely symbiotic with DEC's pioneering timesharing machines. The first of the group of cultures described by this lexicon nucleated around the PDP-1 (see TMRC ). Subsequently, the PDP-6, PDP-10 , PDP-20 , PDP-11 and VAX were all foci of large and important hackerdoms, and DEC machines long dominated the ARPANET and Internet machine population. DEC was the technological leader of the minicomputer era (roughly 1967 to 1987), but its failure to embrace microcomputers and Unix early cost it heavily in profits and prestige after silicon got cheap. Nevertheless, the microprocessor design tradition owes a major debt to the PDP-11 instruction set, and every one of the major general-purpose microcomputer OSs so far (CP/M, MS-DOS, Unix, OS/2, Windows NT) was either genetically descended from a DEC OS, or incubated on DEC hardware, or both. Accordingly, DEC was for many years still regarded with a certain wry affection even among many hackers too young to have grown up on DEC machines. *** DEC Wars -n. A 1983 Usenet posting by Alan Hastings and Steve Tarr spoofing the Star Wars movies in hackish terms. Some years later, ESR (disappointed by Hastings and Tarr's failure to exploit a great premise more thoroughly) posted a 3-times-longer complete rewrite called Unix WARS ; the two are often confused. +n. A 1983 Usenet posting by Alan Hastings and Steve Tarr spoofing the Star Wars movies in hackish terms. *** DED /DED/ , n. Dark-Emitting Diode (that is, a burned-out LED). Compare SED , LER , write-only memory. In the early 1970s both Signetics and Texas instruments released DED spec sheets as AFJs (suggested uses included as a power-off indicator ). @@ -542,7 +542,7 @@ n. [IBM] The act of replacing unrelated components more or less at random in hop Nearly all hackers past their teens are either college-degreed or self-educated to an equivalent level. The self-taught hacker is often considered (at least by other hackers) to be better-motivated, and may be more respected, than his school-shaped counterpart. Academic areas from which people often gravitate into hackerdom include (besides the obvious computer science and electrical engineering) physics, mathematics, linguistics, and philosophy. *** El Camino Bignum -/el k@meenoh bignuhm/ , n. The road mundanely called El Camino Real, running along San Francisco peninsula. It originally extended all the way down to Mexico City; many portions of the old road are still intact. Navigation on the San Francisco peninsula is usually done relative to El Camino Real, which defines logical north and south even though it isn't really north-south in many places. El Camino Real runs right past Stanford University and so is familiar to hackers. The Spanish word real (which has two syllables: /rayahl/ ) means royal ; El Camino Real is the royal road. In the FORTRAN language, a real quantity is a number typically precise to seven significant digits, and a double precision quantity is a larger floating-point number, precise to perhaps fourteen significant digits (other languages have similar real types). When a hacker from MIT visited Stanford in 1976, he remarked what a long road El Camino Real was. Making a pun on real , he started calling it El Camino Double Precision but when the hacker was told that the road was hundreds of miles long, he renamed it El Camino Bignum , and that name has stuck. (See bignum. ) [GLS has since let slip that the unnamed hacker in this story was in fact himself ESR] In the early 1990s, the synonym El Camino Virtual was been reported as an alternate at IBM and Amdahl sites in the Valley. Mathematically literate hackers in the Valley have also been heard to refer to some major cross-street intersecting El Camino Real as El Camino Imaginary. One popular theory is that the intersection is located near Moffett Field where they keep all those complex planes. +/el k@meenoh bignuhm/ , n. The road mundanely called El Camino Real, running along San Francisco peninsula. It originally extended all the way down to Mexico City; many portions of the old road are still intact. Navigation on the San Francisco peninsula is usually done relative to El Camino Real, which defines logical north and south even though it isn't really north-south in many places. El Camino Real runs right past Stanford University and so is familiar to hackers. The Spanish word real (which has two syllables: /rayahl/ ) means royal ; El Camino Real is the royal road. In the FORTRAN language, a real quantity is a number typically precise to seven significant digits, and a double precision quantity is a larger floating-point number, precise to perhaps fourteen significant digits (other languages have similar real types). When a hacker from MIT visited Stanford in 1976, he remarked what a long road El Camino Real was. Making a pun on real , he started calling it El Camino Double Precision but when the hacker was told that the road was hundreds of miles long, he renamed it El Camino Bignum , and that name has stuck. (See bignum. ) In the early 1990s, the synonym El Camino Virtual was been reported as an alternate at IBM and Amdahl sites in the Valley. Mathematically literate hackers in the Valley have also been heard to refer to some major cross-street intersecting El Camino Real as El Camino Imaginary. One popular theory is that the intersection is located near Moffett Field where they keep all those complex planes. *** English 1. n. obs. The source code for a program, which may be in any language, as opposed to the linkable or executable binary produced from it by a compiler. The idea behind the term is that to a real hacker, a program written in his favorite programming language is at least as readable as. Usage: mostly by old-time hackers, though recognizable in context. Today the preferred shorthand is simply source. @@ -562,7 +562,7 @@ n. [from Ronald Reagan's famous characterization of the communist Soviet Union] /ekson/ , excl. A generic obscenity that quickly entered wide use on the Internet and Usenet after the passage of the Communications Decency Act. From the last name of Senator James Exon (Democrat-Nebraska), primary author of the CDA. This usage outlasted the CDA itself, which was quashed a little over a year later by one of the most acerbic pro-free-speech opinions ever uttered by the Supreme Court. The campaign against it was led by an alliance of hackers and civil libertarians, and was the first effective political mobilization of the hacker culture. Use of Exon's name as an expletive outlived the CDA controversy itself. *** Exploder -n. Used within Microsoft to refer to the Windows Explorer, the web-interface component of Windows 95 and WinNT 4. Our spies report that most of the heavy guns at MS came from a Unix background and use command line utilities; even they are scornful of the over-gingerbreaded WIMP environments that they have been called upon to create. +n. Used within Microsoft to refer to the Windows Explorer, the web-interface component of Windows. ** F *** FAQ @@ -1489,7 +1489,7 @@ Hackerdom easily tolerates a much wider range of sexual and lifestyle variation 2. The motto of the complaints division of Sirius Cybernetics Corporation (the ultimate gaggle of incompetent suit s) in Douglas Adams's Hitch Hiker's Guide to the Galaxy. The irony of using this as a cultural recognition signal appeals to hackers. *** Shub-Internet -/shuhb int@rnet/ , n. [MUD: from H. P. Lovecraft's evil fictional deity Shub-Niggurath, the Black Goat with a Thousand Young] The harsh personification of the Internet: Beast of a Thousand Processes, Eater of Characters, Avatar of Line Noise, and Imp of Call Waiting; the hideous multi-tendriled entity formed of all the manifold connections of the net. A sect of MUDders worships Shub-Internet, sacrificing objects and praying for good connections. To no avail its purpose is malign and evil, and it is the cause of all network slowdown. Often heard as in Freela casts a tac nuke at Shub-Internet for slowing her down. (A forged response often follows along the lines of: Shub-Internet gulps down the tac nuke and burps happily. ) Also cursed by users of the Web, FTP and telnet when the network lags. The dread name of Shub-Internet is seldom spoken aloud, as it is said that repeating it three times will cause the being to wake, deep within its lair beneath the Pentagon. Compare Random Number God. [January 1996: It develops that one of the computer administrators in the basement of the Pentagon read this entry and fell over laughing. As a result, you too can now poke Shub-Internet by ping ing shub-internet.ims.disa.mil. Compare kremvax. ESR] [April 1999: shub-internet.ims.disa.mil is no more, alas. But Shub-Internet lives, and even has a home page. +/shuhb int@rnet/ , n. [MUD: from H. P. Lovecraft's evil fictional deity Shub-Niggurath, the Black Goat with a Thousand Young] The harsh personification of the Internet: Beast of a Thousand Processes, Eater of Characters, Avatar of Line Noise, and Imp of Call Waiting; the hideous multi-tendriled entity formed of all the manifold connections of the net. A sect of MUDders worships Shub-Internet, sacrificing objects and praying for good connections. To no avail its purpose is malign and evil, and it is the cause of all network slowdown. Often heard as in Freela casts a tac nuke at Shub-Internet for slowing her down. (A forged response often follows along the lines of: Shub-Internet gulps down the tac nuke and burps happily. ) Also cursed by users of the Web, FTP and telnet when the network lags. The dread name of Shub-Internet is seldom spoken aloud, as it is said that repeating it three times will cause the being to wake, deep within its lair beneath the Pentagon. Compare Random Number God. *** Slowlaris /slo'lahris/ , n. [Usenet; poss. from the variety of prosimian called a slow loris. The variant Slowlartus is also common, related to LART ] Common hackish term for Solaris, Sun's System VR4 version of Unix that came out of the standardization wars of the early 1990s. So named because especially on older hardware, responsiveness was much less crisp than under the preceding SunOS. Early releases of Solaris (that is, Solaris 2, as some marketroid s at Sun retroactively rechristened SunOS as Solaris 1) were quite buggy, and Sun was forced by customer demand to support SunOS for quite some time. Newer versions are acknowledged to be among the best commercial Unix variants in 1998, but still lose single-processor benchmarks to Sparc Linux. Compare HP-SUX , sun-stools. @@ -2153,7 +2153,9 @@ n. Common term for the curve (resembling an end-to-end section of one of those c 3. Occasionally appended to foo to produce foobaz. Earlier versions of this lexicon derived baz as a Stanford corruption of bar. However, Pete Samson (compiler of the TMRC lexicon) reports it was already current when he joined TMRC in 1958. He says It came from Pogo. Albert the Alligator, when vexed or outraged, would shout Bazz Fazz! or Rowrbazzle! The club layout was said to model the (mythical) New England counties of Rowrfolk and Bassex (Rowrbazzle mingled with (Norfolk/Suffolk/Middlesex/Essex). *** bazaar -n.,adj. In 1997, after meditating on the success of Linux for three years, the Jargon File's own editor ESR wrote an analytical paper on hacker culture and development models titled The Cathedral and the Bazaar. The main argument of the paper was that Brooks's Law is not the whole story; given the right social machinery, debugging can be efficiently parallelized across large numbers of programmers. The title metaphor caught on (see also cathedral ), and the style of development typical in the Linux community is now often referred to as the bazaar mode. Its characteristics include releasing code early and often, and actively seeking the largest possible pool of peer reviewers. After 1998, the evident success of this way of doing things became one of the strongest arguments for open source. +1. Analogy of software development methodology. Software developed in public according to normative FOSS praxis is said more like the chaotic and more organic trading style of a bazaar than the pristine top-down architecture of a cathedral created by visionary engineers. The analogy is made in a 1999 book by Eric Raymond, called The Cathedral and the Bazaar. Characteristics of bazaar style development include releasing code early and often, treating users as co-developers and making extensive use of internet for project communications and interaction with code repositories. + +2. A version control system created by Canonical in 2005 for development of the Ubuntu GNU/Linux distro and related tools. *** bboard 1. Any electronic bulletin board; esp. used of BBS systems running on personal micros, less frequently of a Usenet newsgroup (in fact, use of this term for a newsgroup generally marks one either as a newbie fresh in from the BBS world or as a real old-timer predating Usenet). @@ -2647,7 +2649,7 @@ n. Shorter and ruder syn. for buffer overflow. n. What happens when you try to stuff more data into a buffer (holding area) than it can handle. This problem is commonly exploited by crackers to get arbitrary commands executed by a program running with root permissions. This may be due to a mismatch in the processing rates of the producing and consuming processes (see overrun and firehose syndrome ), or because the buffer is simply too small to hold all the data that must accumulate before a piece of it can be processed. For example, in a text-processing tool that crunch es a line at a time, a short line buffer can result in lossage as input from a long line overflows the buffer and trashes data beyond it. Good defensive programming would check for overflow on each character and stop accepting data when the buffer is full up. The term is used of and by humans in a metaphorical sense. What time did I agree to meet you? My buffer must have overflowed. Or If I answer that phone my buffer is going to overflow. See also spam , overrun screw. *** bug -n. An unwanted and unintended property of a program or piece of hardware, esp. one that causes it to malfunction. Antonym of feature. Examples: There's a bug in the editor: it writes things out backwards. The system crashed because of a hardware bug. Fred is a winner, but he has a few bugs (i.e., Fred is a good guy, but he has a few personality problems). Historical note: Admiral Grace Hopper (an early computing pioneer better known for inventing COBOL ) liked to tell a story in which a technician solved a glitch in the Harvard Mark II machine by pulling an actual insect out from between the contacts of one of its relays, and she subsequently promulgated bug in its hackish sense as a joke about the incident (though, as she was careful to admit, she was not there when it happened). For many years the logbook associated with the incident and the actual bug in question (a moth) sat in a display case at the Naval Surface Warfare Center (NSWC). The entire story, with a picture of the logbook and the moth taped into it, is recorded in the Annals of the History of Computing , Vol. 3, No. 3 (July 1981), pp. 285--286. The text of the log entry (from September 9, 1947), reads 1545 Relay #70 Panel F (moth) in relay. First actual case of bug being found. This wording establishes that the term was already in use at the time in its current specific sense and Hopper herself reports that the term bug was regularly applied to problems in radar electronics during WWII. The original bug (the caption date is incorrect) Indeed, the use of bug to mean an industrial defect was already established in Thomas Edison's time, and a more specific and rather modern use can be found in an electrical handbook from 1896 ( Hawkin's New Catechism of Electricity , Theo. Audel Co.) which says: The term bug is used to a limited extent to designate any fault or trouble in the connections or working of electric apparatus. It further notes that the term is said to have originated in quadruplex telegraphy and have been transferred to all electric apparatus. The latter observation may explain a common folk etymology of the term; that it came from telephone company usage, in which bugs in a telephone cable were blamed for noisy lines. Though this derivation seems to be mistaken, it may well be a distorted memory of a joke first current among telegraph operators more than a century ago! Or perhaps not a joke. Historians of the field inform us that the term bug was regularly used in the early days of telegraphy to refer to a variety of semi-automatic telegraphy keyers that would send a string of dots if you held them down. In fact, the Vibroplex keyers (which were among the most common of this type) even had a graphic of a beetle on them (and still do)! While the ability to send repeated dots automatically was very useful for professional morse code operators, these were also significantly trickier to use than the older manual keyers, and it could take some practice to ensure one didn't introduce extraneous dots into the code by holding the key down a fraction too long. In the hands of an inexperienced operator, a Vibroplex bug on the line could mean that a lot of garbled Morse would soon be coming your way. Further, the term bug has long been used among radio technicians to describe a device that converts electromagnetic field variations into acoustic signals. It is used to trace radio interference and look for dangerous radio emissions. Radio community usage derives from the roach-like shape of the first versions used by 19th century physicists. The first versions consisted of a coil of wire (roach body), with the two wire ends sticking out and bent back to nearly touch forming a spark gap (roach antennae). The bug is to the radio technician what the stethoscope is to the stereotypical medical doctor. This sense is almost certainly ancestral to modern use of bug for a covert monitoring device, but may also have contributed to the use of bug for the effects of radio interference itself. Actually, use of bug in the general sense of a disruptive event goes back to Shakespeare! (Henry VI, part III - Act V, Scene II: King Edward: So, lie thou there. Die thou; and die our fear; For Warwick was a bug that fear'd us all. ) In the first edition of Samuel Johnson's dictionary one meaning of bug is A frightful object; a walking spectre ; this is traced to bugbear , a Welsh term for a variety of mythological monster which (to complete the circle) has recently been reintroduced into the popular lexicon through fantasy role-playing games. In any case, in jargon the word almost never refers to insects. Here is a plausible conversation that never actually happened: There is a bug in this ant farm! What do you mean? I don't see any ants in it. That's the bug. A careful discussion of the etymological issues can be found in a paper by Fred R. Shapiro, 1987, Entomology of the Computer Bug: History and Folklore , American Speech 62(4):376-378. [There has been a widespread myth that the original bug was moved to the Smithsonian, and an earlier version of this entry so asserted. A correspondent who thought to check discovered that the bug was not there. While investigating this in late 1990, your editor discovered that the NSWC still had the bug, but had unsuccessfully tried to get the Smithsonian to accept it and that the present curator of their History of American Technology Museum didn't know this and agreed that it would make a worthwhile exhibit. It was moved to the Smithsonian in mid-1991, but due to space and money constraints was not actually exhibited for years afterwards. Thus, the process of investigating the original-computer-bug bug fixed it in an entirely unexpected way, by making the myth true! ESR] It helps to remember that this dates from 1973. (The next cartoon in the Crunchly saga is 73-10-31. The previous cartoon was 73-07-24. +n. An unwanted and unintended property of a program or piece of hardware, esp. one that causes it to malfunction. Antonym of feature. Examples: There's a bug in the editor: it writes things out backwards. The system crashed because of a hardware bug. Fred is a winner, but he has a few bugs (i.e., Fred is a good guy, but he has a few personality problems). Historical note: Admiral Grace Hopper (an early computing pioneer better known for inventing COBOL ) liked to tell a story in which a technician solved a glitch in the Harvard Mark II machine by pulling an actual insect out from between the contacts of one of its relays, and she subsequently promulgated bug in its hackish sense as a joke about the incident (though, as she was careful to admit, she was not there when it happened). For many years the logbook associated with the incident and the actual bug in question (a moth) sat in a display case at the Naval Surface Warfare Center (NSWC). The entire story, with a picture of the logbook and the moth taped into it, is recorded in the Annals of the History of Computing , Vol. 3, No. 3 (July 1981), pp. 285--286. The text of the log entry (from September 9, 1947), reads 1545 Relay #70 Panel F (moth) in relay. First actual case of bug being found. This wording establishes that the term was already in use at the time in its current specific sense and Hopper herself reports that the term bug was regularly applied to problems in radar electronics during WWII. The original bug (the caption date is incorrect) Indeed, the use of bug to mean an industrial defect was already established in Thomas Edison's time, and a more specific and rather modern use can be found in an electrical handbook from 1896 ( Hawkin's New Catechism of Electricity , Theo. Audel Co.) which says: The term bug is used to a limited extent to designate any fault or trouble in the connections or working of electric apparatus. It further notes that the term is said to have originated in quadruplex telegraphy and have been transferred to all electric apparatus. The latter observation may explain a common folk etymology of the term; that it came from telephone company usage, in which bugs in a telephone cable were blamed for noisy lines. Though this derivation seems to be mistaken, it may well be a distorted memory of a joke first current among telegraph operators more than a century ago! Or perhaps not a joke. Historians of the field inform us that the term bug was regularly used in the early days of telegraphy to refer to a variety of semi-automatic telegraphy keyers that would send a string of dots if you held them down. In fact, the Vibroplex keyers (which were among the most common of this type) even had a graphic of a beetle on them (and still do)! While the ability to send repeated dots automatically was very useful for professional morse code operators, these were also significantly trickier to use than the older manual keyers, and it could take some practice to ensure one didn't introduce extraneous dots into the code by holding the key down a fraction too long. In the hands of an inexperienced operator, a Vibroplex bug on the line could mean that a lot of garbled Morse would soon be coming your way. Further, the term bug has long been used among radio technicians to describe a device that converts electromagnetic field variations into acoustic signals. It is used to trace radio interference and look for dangerous radio emissions. Radio community usage derives from the roach-like shape of the first versions used by 19th century physicists. The first versions consisted of a coil of wire (roach body), with the two wire ends sticking out and bent back to nearly touch forming a spark gap (roach antennae). The bug is to the radio technician what the stethoscope is to the stereotypical medical doctor. This sense is almost certainly ancestral to modern use of bug for a covert monitoring device, but may also have contributed to the use of bug for the effects of radio interference itself. Actually, use of bug in the general sense of a disruptive event goes back to Shakespeare! (Henry VI, part III - Act V, Scene II: King Edward: So, lie thou there. Die thou; and die our fear; For Warwick was a bug that fear'd us all. ) In the first edition of Samuel Johnson's dictionary one meaning of bug is A frightful object; a walking spectre ; this is traced to bugbear , a Welsh term for a variety of mythological monster which (to complete the circle) has recently been reintroduced into the popular lexicon through fantasy role-playing games. In any case, in jargon the word almost never refers to insects. Here is a plausible conversation that never actually happened: There is a bug in this ant farm! What do you mean? I don't see any ants in it. That's the bug. A careful discussion of the etymological issues can be found in a paper by Fred R. Shapiro, 1987, Entomology of the Computer Bug: History and Folklore , American Speech 62(4):376-378. It helps to remember that this dates from 1973. (The next cartoon in the Crunchly saga is 73-10-31. The previous cartoon was 73-07-24. *** bug door n. [common] A hole in the security of a system deliberately left in place by designers or maintainers, implemented in the form of a deliberate but subtle and thus hard to spot bug. This can be implemented as a slightly mis-spelled variable, a typo, extra or missing parentheses or a confusing regex. If the bug door is subsequently found then it can be plausibly denied as a simple programming mistake. Also see back door. @@ -2740,7 +2742,7 @@ The traditional program comment for code executed under a condition that should 2. In reality, most cancelbots are manually operated by being fed lists of spam message IDs. *** candygrammar -n. A programming-language grammar that is mostly syntactic sugar ; the term is also a play on candygram. COBOL , Apple's Hypertalk language, and a lot of the so-called 4GL database languages share this property. The usual intent of such designs is that they be as English-like as possible, on the theory that they will then be easier for unskilled people to program. This intention comes to grief on the reality that syntax isn't what makes programming hard; it's the mental effort and organization required to specify an algorithm precisely that costs. Thus the invariable result is that candygrammar languages are just as difficult to program in as terser ones, and far more painful for the experienced hacker. [The overtones from the old Chevy Chase skit on Saturday Night Live should not be overlooked. This was a Jaws parody. Someone lurking outside an apartment door tries all kinds of bogus ways to get the occupant to open up, while ominous music plays in the background. The last attempt is a half-hearted Candygram! When the door is opened, a shark bursts in and chomps the poor occupant. [There is a similar gag in Blazing Saddles ESR] There is a moral here for those attracted to candygrammars. Note that, in many circles, pretty much the same ones who remember Monty Python sketches, all it takes is the word Candygram! , suitably timed, to get people rolling on the floor. +n. A programming-language grammar that is mostly syntactic sugar ; the term is also a play on candygram. COBOL , Apple's Hypertalk language, and a lot of the so-called 4GL database languages share this property. The usual intent of such designs is that they be as English-like as possible, on the theory that they will then be easier for unskilled people to program. This intention comes to grief on the reality that syntax isn't what makes programming hard; it's the mental effort and organization required to specify an algorithm precisely that costs. Thus the invariable result is that candygrammar languages are just as difficult to program in as terser ones, and far more painful for the experienced hacker. [The overtones from the old Chevy Chase skit on Saturday Night Live should not be overlooked. This was a Jaws parody. Someone lurking outside an apartment door tries all kinds of bogus ways to get the occupant to open up, while ominous music plays in the background. The last attempt is a half-hearted Candygram! When the door is opened, a shark bursts in and chomps the poor occupant. There is a moral here for those attracted to candygrammars. Note that, in many circles, pretty much the same ones who remember Monty Python sketches, all it takes is the word Candygram!, suitably timed, to get people rolling on the floor. *** canonical adj. [very common; historically, according to religious law ] The usual or standard state or manner of something. This word has a somewhat more technical meaning in mathematics. Two formulas such as 9 + x and x + 9 are said to be equivalent because they mean the same thing, but the second one is in canonical form because it is written in the usual way, with the highest power of x first. Usually there are fixed rules you can use to decide whether something is in canonical form. The jargon meaning, a relaxation of the technical meaning, acquired its present loading in computer-science culture largely through its prominence in Alonzo Church's work in computation theory and mathematical logic (see Knights of the Lambda Calculus ). Compare vanilla. Non-technical academics do not use the adjective canonical in any of the senses defined above with any regularity; they do however use the nouns canon and canonicity (not **canonicalness or **canonicality). The canon of a given author is the complete body of authentic works by that author (this usage is familiar to Sherlock Holmes fans as well as to literary scholars). The canon is the body of works in a given field (e.g., works of literature, or of art, or of music) deemed worthwhile for students to study and for scholars to investigate. The word canon has an interesting history. It derives ultimately from the Greek (akin to the English cane ) referring to a reed. Reeds were used for measurement, and in Latin and later Greek the word canon meant a rule or a standard. The establishment of a canon of scriptures within Christianity was meant to define a standard or a rule for the religion. The above non-techspeak academic usages stem from this instance of a defined and accepted body of work. Alongside this usage was the promulgation of canons ( rules ) for the government of the Catholic Church. The techspeak usages ( according to religious law ) derive from this use of the Latin canon. Hackers invest this term with a playfulness that makes an ironic contrast with its historical meaning. A true story: One Bob Sjoberg, new at the MIT AI Lab, expressed some annoyance at the incessant use of jargon. Over his loud objections, GLS and RMS made a point of using as much of it as possible in his presence, and eventually it began to sink in. Finally, in one conversation, he used the word canonical in jargon-like fashion without thinking. Steele: Aha! We've finally got you talking jargon too! Stallman: What did he say? Steele: Bob just used canonical in the canonical way. Of course, canonicality depends on context, but it is implicitly defined as the way hackers normally expect things to be. Thus, a hacker may claim with a straight face that according to religious law is not the canonical meaning of canonical. @@ -2843,9 +2845,6 @@ n. [spamfighters] Derogatory term for a spammer. The image that goes with it is *** chiclet keyboard n. A keyboard with a small, flat rectangular or lozenge-shaped rubber or plastic keys that look like pieces of chewing gum. (Chiclets is the brand name of a variety of chewing gum that does in fact resemble the keys of chiclet keyboards.) Used esp. to describe the original IBM PCjr keyboard. Vendors unanimously liked these because they were cheap, and a lot of early portable and laptop products got launched using them. Customers rejected the idea with almost equal unanimity, and chiclets are not often seen on anything larger than a digital watch any more. -*** choad -/chohd/ , n. Synonym for penis used in alt.tasteless and popularized by the denizens thereof. They say: We think maybe it's from Middle English but we're all too damned lazy to check the OED. [I'm not. It isn't. ESR] This term is alleged to have been inherited through 1960s underground comics, and to have been recently sighted in the Beavis and Butthead cartoons. Speakers of the Hindi, Bengali and Gujarati languages have confirmed that choad is in fact an Indian vernacular word equivalent to fuck ; it is therefore likely to have entered English slang via the British Raj. - *** choke v. [common] To reject input, often ungracefully. NULs make System V's lpr (1) choke. I tried building an EMACS binary to use X , but cpp (1) choked on all those #define s. See barf , vi. @@ -3771,7 +3770,7 @@ n. An archetypal dumb embedded-systems application, like toaster (which supersed 2. By extension, any odd or unreadable typeface produced by a graphics device. -3. The typeface mundanely called Bcklin , an art-Noveau display font. +3. The typeface mundanely called Bcklin, an art-Noveau display font. *** email 1. n. Electronic mail automatically passed through computer networks and/or via modems over common-carrier lines. Contrast snail-mail , paper-net , voice-net. See network address. @@ -3785,7 +3784,9 @@ n. An archetypal dumb embedded-systems application, like toaster (which supersed n. Any of a family of military simulations derived from a game written by Peter Langston many years ago. A number of multi-player variants of varying degrees of sophistication exist, and one single-player version implemented for both Unix and VMS; the latter is even available as MS-DOS/Windows freeware. All are notoriously addictive. Of various commercial derivatives the best known is probably Empire Deluxe on PCs and Amigas. Modern empire is a real-time wargame played over the internet by up to 120 players. Typical games last from 24 hours (blitz) to a couple of months (long term). The amount of sleep you can get while playing is a function of the rate at which updates occur and the number of co-rulers of your country. Empire server software is available for Unix-like machines, and clients for Unix and other platforms. A comprehensive history of the game is available at http://www.empire.cx/infopages/History.html. The Empire resource site is at http://www.empire.cx/. *** engine -n. 1. A piece of hardware that encapsulates some function but can't be used without some kind of front end. +1. n. A piece of hardware that encapsulates some function but can't be used without some kind of front end. + +2. Software with a dedicated and typically low level purpose, such as rendering graphics. *** enhancement n. Common marketroid -speak for a bug fix. This abuse of language is a popular and time-tested way to turn incompetence into increased revenue. A hacker being ironic would instead call the fix a feature or perhaps save some effort by declaring the bug itself to be a feature. @@ -3860,7 +3861,9 @@ n.,v. To look for something in a mass of code or data with one's own native opti ** F *** face time -n. [common] Time spent interacting with somebody face-to-face (as opposed to via electronic links). Oh, yeah, I spent some face time with him at the last Usenix. +1. n. [common] Time spent interacting with somebody face-to-face (as opposed to via electronic links). Oh, yeah, I spent some face time with him at the last FOSDEM. + +2. A proprietary videoconferencing system made by Apple. *** factor n. See coefficient of X. @@ -3869,7 +3872,7 @@ n. See coefficient of X. Is the capability for a secondary system to take over when the main system fails. For example if server A crashes then mirrored server B automatically takes over, or if the main internet connection fails then mobile broadband might automatically be enabled. *** fairings -n. , /feringz/ [FreeBSD; orig. a typo for fairness ] A term thrown out in discussion whenever a completely and transparently nonsensical argument in one's favor(?) seems called for, e,g. at the end of a really long thread for which the outcome is no longer even cared about since everyone is now so sick of it; or in rebuttal to another nonsensical argument ( Change the loader to look for /kernel. +n. , /feringz/ [FreeBSD; orig. a typo for fairness ] A term thrown out in discussion whenever a completely and transparently nonsensical argument in one's favor(?) seems called for, e,g. at the end of a really long thread for which the outcome is no longer even cared about since everyone is now so sick of it; or in rebuttal to another nonsensical argument. *** fall over vi. [IBM] Yet another synonym for crash or lose. Fall over hard equates to crash and burn. @@ -3885,24 +3888,21 @@ vi. [IBM] Yet another synonym for crash or lose. Fall over hard equates to crash n. Without qualification, indicates a fan of science fiction, especially one who goes to cons and tends to hang out with other fans. Many hackers are fans, so this term has been imported from fannish slang; however, unlike much fannish slang it is recognized by most non-fannish hackers. Among SF fans the plural is correctly fen , but this usage is not automatic to hackers. Laura reads the stuff occasionally but isn't really a fan. *** fandango on core -n. [Unix/C hackers, from the Iberian dance] In C, a wild pointer that runs out of bounds, causing a core dump , or corrupts the malloc (3) arena in such a way as to cause mysterious failures later on, is sometimes said to have done a fandango on core. On low-end personal machines without an MMU (or Windows boxes, which have an MMU but use it incompetently), this can corrupt the OS itself, causing massive lossage. Other frenetic dances, such as the cha-cha or the watusi, may be substituted. See aliasing bug , precedence lossage , smash the stack , memory leak , memory smash , overrun screw , core. +n. [Unix/C hackers, from the Iberian dance] In C, a wild pointer that runs out of bounds, causing a core dump, or corrupts the malloc arena in such a way as to cause mysterious failures later on, is sometimes said to have done a fandango on core. On low-end personal machines without an MMU (or Windows boxes, which have an MMU but use it incompetently), this can corrupt the OS itself, causing massive lossage. Other frenetic dances, such as the cha-cha or the watusi, may be substituted. See aliasing bug, precedence lossage, smash the stack, memory leak, memory smash, overrun screw, core. *** faradize -/far'@di:z/ , v. [US Geological Survey] To start any hyper-addictive process or trend, or to continue adding current to such a trend. Telling one user about a new octo-tetris game you compiled would be a faradizing act in two weeks you might find your entire department playing the faradic game. - -*** farkled -/farkld/ , adj. [DeVry Institute of Technology, Atlanta] Syn. hosed. Poss. owes something to Yiddish farblondjet and/or the Farkle Family skits on Rowan and Martin's Laugh-In , a popular comedy show of the late 1960s. +/far'@di:z/ , v. [US Geological Survey] To start any hyper-addictive process or trend, or to continue adding current to such a trend. Telling one user about a new octo-tetris game you compiled would be a faradizing act in two weeks you might find your entire department playing the faradic game. Also known as virality or "going viral". *** farm n. A group of machines, especially a large group of near-identical machines running load-balancing software, dedicated to a single task. Historically the term server farm , used especially for a group of web servers, seems to have been coined by analogy with earlier disk farm in the early 1990s; generalization began with render farm for a group of machines dedicated to rendering computer animations (this term appears to have been popularized by publicity about the pioneering Linux render farm used to produce the movie Titanic ). By 2001 other combinations such as compile farm and compute farm were increasingly common, and arguably borderline techspeak. More jargon uses seem likely to arise (and be absorbed into techspeak over time) as new uses are discovered for networked machine clusters. Compare link farm. *** fascist -1. [common] Said of a computer system with excessive or annoying security barriers, usage limits, or access policies. The implication is that said policies are preventing hackers from getting interesting work done. The variant fascistic seems to have been preferred at MIT, poss. by analogy with touristic (see tourist or under the influence of German/Yiddish faschistisch ). +1. [common] Said of a computer system with excessive or annoying security barriers, usage limits, or access policies. The implication is that said policies are preventing hackers from getting interesting work done. -2. In the design of languages and other software tools, the fascist alternative is the most restrictive and structured way of capturing a particular function; the implication is that this may be desirable in order to simplify the implementation or provide tighter error checking. Compare bondage-and-discipline language , although that term is global rather than local. Fascist security strikes again. (The next cartoon in the Crunchly saga is 73-05-28. The previous one is 73-05-20. +2. In the design of languages and other software tools, the fascist alternative is the most restrictive and structured way of capturing a particular function; the implication is that this may be desirable in order to simplify the implementation or provide tighter error checking. *** fat electrons -n. Old-time hacker David Cargill's theory on the causation of computer glitches. Your typical electric utility draws its line current out of the big generators with a pair of coil taps located near the top of the dynamo. When the normal tap brushes get dirty, they take them off line to clean them up, and use special auxiliary taps on the bottom of the coil. Now, this is a problem, because when they do that they get not ordinary or thin electrons, but the fat'n'sloppy electrons that are heavier and so settle to the bottom of the generator. These flow down ordinary wires just fine, but when they have to turn a sharp corner (as in an integrated-circuit via), they're apt to get stuck. This is what causes computer glitches. [Fascinating. Obviously, fat electrons must gain mass by bogon absorption ESR] Compare bogon , magic smoke. +n. Old-time hacker David Cargill's theory on the causation of computer glitches. Your typical electric utility draws its line current out of the big generators with a pair of coil taps located near the top of the dynamo. When the normal tap brushes get dirty, they take them off line to clean them up, and use special auxiliary taps on the bottom of the coil. Now, this is a problem, because when they do that they get not ordinary or thin electrons, but the fat'n'sloppy electrons that are heavier and so settle to the bottom of the generator. These flow down ordinary wires just fine, but when they have to turn a sharp corner (as in an integrated-circuit via), they're apt to get stuck. This is what causes computer glitches. Compare bogon , magic smoke. *** fat pipe A high-bandwidth connection to the Internet. When the term gained currency in the mid-1990s, a T-1 (at 1.5 Mbits/second) was considered a fat pipe, but the standard has risen. Now it suggests multiple T3s. @@ -4546,7 +4546,7 @@ n. [obs.] A type of Internet service first floated around 1991 and obsolesced ar 2. [Amateur Packet Radio] The terrestrial analog of a wormhole (sense 2), from which this term was coined. A gopher hole links two amateur packet relays through some non-ham radio medium. *** gorets -/gorets/ , n. The unknown ur-noun, fill in your own meaning. Found esp. on the Usenet newsgroup alt.gorets , which seems to be a running contest to redefine the word by implication in the funniest and most peculiar way, with the understanding that no definition is ever final. [A correspondent from the former Soviet Union informs me that gorets is Russian for mountain dweller. Another from France informs me that goret is archaic French for a young pig ESR] Compare frink. +/gorets/ , n. The unknown ur-noun, fill in your own meaning. Found esp. on the Usenet newsgroup alt.gorets , which seems to be a running contest to redefine the word by implication in the funniest and most peculiar way, with the understanding that no definition is ever final. Compare frink. *** gorilla arm n. The side-effect that destroyed touch-screens as a mainstream input technology despite a promising start in the early 1980s. It seems the designers of all those spiffy touch-menu systems failed to notice that humans aren't designed to hold their arms in front of their faces making small motions. After more than a very few selections, the arm begins to feel sore, cramped, and oversized the operator looks like a gorilla while using the touch screen and feels like one afterwards. This is now considered a classic cautionary tale to human-factors designers; Remember the gorilla arm! is shorthand for How is this going to fly in real use?. @@ -4877,7 +4877,7 @@ adj. Common hacker construction for is an X , used for humorous emphasis. Anyone n. A notional receptacle, a set of which might be used to apportion data items for sorting or lookup purposes. When you look up a name in the phone book (for example), you typically hash it by extracting its first letter; the hash buckets are the alphabetically ordered letter sections. This term is used as techspeak with respect to code that uses actual hash functions; in jargon, it is used for human associative memory as well. Thus, two things in the same hash bucket are more difficult to discriminate, and may be confused. If you hash English words only by length, you get too many common grammar words in the first couple of hash buckets. Compare hash collision. *** hash collision -n. [from the techspeak] (var.: hash clash ) When used of people, signifies a confusion in associative memory or imagination, especially a persistent one (see thinko ). True story: One of us [ESR] was once on the phone with a friend about to move out to Berkeley. When asked what he expected Berkeley to be like, the friend replied: Well, I have this mental picture of naked women throwing Molotov cocktails, but I think that's just a collision in my hash tables. Compare hash bucket. +n. [from the techspeak] (var.: hash clash ) When used of people, signifies a confusion in associative memory or imagination, especially a persistent one (see thinko ). Compare hash bucket. *** hat n. Common (spoken) name for the circumflex ( ^ , ASCII 1011110) character. See ASCII for other synonyms. @@ -5279,7 +5279,7 @@ A crock that works. (A long-ago Datamation article by Jackson Granholme similarl 4. vt. To insert a kluge into a program. I've kluged this routine to get around that weird bug, but there's probably a better way. -5. [WPI] n. A feature that is implemented in a rude manner. Nowadays this term is often encountered in the variant spelling kludge. Reports from old farts are consistent that kluge was the original spelling, reported around computers as far back as the mid-1950s and, at that time, used exclusively of hardware kluges. In 1947, the New York Folklore Quarterly reported a classic shaggy-dog story Murgatroyd the Kluge Maker then current in the Armed Forces, in which a kluge was a complex and puzzling artifact with a trivial function. Other sources report that kluge was common Navy slang in the WWII era for any piece of electronics that worked well on shore but consistently failed at sea. However, there is reason to believe this slang use may be a decade older. Several respondents have connected it to the brand name of a device called a Kluge paper feeder , an adjunct to mechanical printing presses. Legend has it that the Kluge feeder was designed before small, cheap electric motors and control electronics; it relied on a fiendishly complex assortment of cams, belts, and linkages to both power and synchronize all its operations from one motive driveshaft. It was accordingly temperamental, subject to frequent breakdowns, and devilishly difficult to repair but oh, so clever! People who tell this story also aver that Kluge was the name of a design engineer. There is in fact a Brandtjen Kluge Inc., an old family business that manufactures printing equipment interestingly, their name is pronounced /kloogee/ ! Henry Brandtjen, president of the firm, told me (ESR, 1994) that his company was co-founded by his father and an engineer named Kluge /kloogee/ , who built and co-designed the original Kluge automatic feeder in 1919. Mr. Brandtjen claims, however, that this was a simple device (with only four cams); he says he has no idea how the myth of its complexity took hold. Other correspondents differ with Mr. Brandtjen's history of the device and his allegation that it was a simple rather than complex one, but agree that the Kluge automatic feeder was the most likely source of the folklore. TMRC and the MIT hacker culture of the early '60s seems to have developed in a milieu that remembered and still used some WWII military slang (see also foobar ). It seems likely that kluge came to MIT via alumni of the many military electronics projects that had been located in Cambridge (many in MIT's venerable Building 20, in which TMRC is also located) during the war. The variant kludge was apparently popularized by the Datamation article mentioned under kludge ; it was titled How to Design a Kludge (February 1962, pp. 30, 31). This spelling was probably imported from Great Britain, where kludge has an independent history (though this fact was largely unknown to hackers on either side of the Atlantic before a mid-1993 debate in the Usenet group alt.folklore.computers over the First and Second Edition versions of this entry; everybody used to think kludge was just a mutation of kluge ). It now appears that the British, having forgotten the etymology of their own kludge when kluge crossed the Atlantic, repaid the U.S. by lobbing the kludge orthography in the other direction and confusing their American cousins' spelling! The result of this history is a tangle. Many younger U.S. hackers pronounce the word as /klooj/ but spell it, incorrectly for its meaning and pronunciation, as kludge. (Phonetically, consider huge, refuge, centrifuge, and deluge as opposed to sludge, judge, budge, and fudge. Whatever its failings in other areas, English spelling is perfectly consistent about this distinction.) British hackers mostly learned /kluhj/ orally, use it in a restricted negative sense and are at least consistent. European hackers have mostly learned the word from written American sources and tend to pronounce it /kluhj/ but use the wider American meaning! Some observers consider this mess appropriate in view of the word's meaning. +5. [WPI] n. A feature that is implemented in a rude manner. Nowadays this term is often encountered in the variant spelling kludge. *** kluge around vt. To avoid a bug or difficult condition by inserting a kluge. Compare workaround. @@ -5302,7 +5302,7 @@ pl.n. Configurable options, even in software and even those you can't adjust in Term used to describe a regular poster who continually posts messages with no apparent grounding in reality. Different from a troll , which implies a sort of sly wink on the part of a poster who knows better, kooks really believe what they write, to the extent that they believe anything. The kook trademark is paranoia and grandiosity. Kooks will often build up elaborate imaginary support structures, fake corporations and the like, and continue to act as if those things are real even after their falsity has been documented in public. While they may appear harmless, and are usually filtered out by the other regular participants in a newsgroup of mailing list, they can still cause problems because the necessity for these measures is not immediately apparent to newcomers; there are several instances on record, for example, of journalists writing stories with quotes from kooks who caught them unaware. An entertaining web page chronicling the activities of many notable kooks can be found at http://www.crank.net/usenet.html. *** kremvax -/kremvaks/ , n. [from the then-large number of Usenet VAXen with names of the form foovax ] Originally, a fictitious Usenet site at the Kremlin, announced on April 1, 1984 in a posting ostensibly originated there by Soviet leader Konstantin Chernenko. The posting was actually forged by Piet Beertema as an April Fool's joke. Other fictitious sites mentioned in the hoax were moskvax and kgbvax. This was probably the funniest of the many April Fool's forgeries perpetrated on Usenet (which has negligible security against them), because the notion that Usenet might ever penetrate the Iron Curtain seemed so totally absurd at the time. In fact, it was only six years later that the first genuine site in Moscow, demos.su , joined Usenet. Some readers needed convincing that the postings from it weren't just another prank. Vadim Antonov, senior programmer at Demos and the major poster from there up to mid-1991, was quite aware of all this, referred to it frequently in his own postings, and at one point twitted some credulous readers by blandly asserting that he was a hoax! Eventually he even arranged to have the domain's gateway site named kremvax , thus neatly turning fiction into fact and demonstrating that the hackish sense of humor transcends cultural barriers. [Mr. Antonov also contributed the Russian-language material for this lexicon. ESR] In an even more ironic historical footnote, kremvax became an electronic center of the anti-communist resistance during the bungled hard-line coup of August 1991. During those three days the Soviet UUCP network centered on kremvax became the only trustworthy news source for many places within the USSR. Though the sysops were concentrating on internal communications, cross-border postings included immediate transliterations of Boris Yeltsin's decrees condemning the coup and eyewitness reports of the demonstrations in Moscow's streets. In those hours, years of speculation that totalitarianism would prove unable to maintain its grip on politically-loaded information in the age of computer networking were proved devastatingly accurate and the original kremvax joke became a reality as Yeltsin and the new Russian revolutionaries of glasnost and perestroika made kremvax one of the timeliest means of their outreach to the West. +/kremvaks/ , n. [from the then-large number of Usenet VAXen with names of the form foovax ] Originally, a fictitious Usenet site at the Kremlin, announced on April 1, 1984 in a posting ostensibly originated there by Soviet leader Konstantin Chernenko. The posting was actually forged by Piet Beertema as an April Fool's joke. *** kudos patching The practice of submitting patches to a project simply for the purpose of gaming the participation statistics and being able to say: "I have N patches in the well known and important project Foo". Kudos patches are usually trivial re-alignments which could be done automatically by any respectable text editor, changing the sequence of variable declarations or function arguments and so on. @@ -6931,7 +6931,7 @@ n. A bug or design error that limits a program's capabilities, and which is suff *** retcon 1. n. The common situation in pulp fiction (esp. comics or soap operas) where a new story reveals things about events in previous stories, usually leaving the facts the same (thus preserving continuity) while completely changing their interpretation. For example, revealing that a whole season of Dallas was a dream was a retcon. -2. vt. To write such a story about a character or fictitious object. Byrne has retconned Superman's cape so that it is no longer unbreakable. Marvelman's old adventures were retconned into synthetic dreams. Swamp Thing was retconned from a transformed person into a sentient vegetable. [This term is included because it is a good example of hackish linguistic innovation in a field completely unrelated to computers. The word retcon will probably spread through comics fandom and lose its association with hackerdom within a couple of years; for the record, it started here. ESR] [1993 update: some comics fans on the net now claim that retcon was independently in use in comics fandom before rec.arts.comics , and have citations from around 1981. In lexicography, nothing is ever simple. +2. vt. To write such a story about a character or fictitious object. Byrne has retconned Superman's cape so that it is no longer unbreakable. Marvelman's old adventures were retconned into synthetic dreams. Swamp Thing was retconned from a transformed person into a sentient vegetable. *** retrocomputing /ret'rohk@mpyooting/ , n. Refers to emulations of way-behind-the-state-of-the-art hardware or software, or implementations of never-was-state-of-the-art; esp. if such implementations are elaborate practical jokes and/or parodies, written mostly for hack value , of more serious designs. Perhaps the most widely distributed retrocomputing utility was the pnch (6) or bcd (6) program on V7 and other early Unix versions, which would accept up to 80 characters of text argument and display the corresponding pattern in punched card code. Other well-known retrocomputing hacks have included the programming language INTERCAL , a JCL -emulating shell for Unix, the card-punch-emulating editor named 029, and various elaborate PDP-11 hardware emulators and RT-11 OS emulators written just to keep an old, sourceless Zork binary running. A tasty selection of retrocomputing programs are made available at the Retrocomputing Museum, http://www.catb.org/retro/. @@ -7019,9 +7019,6 @@ n. [Amateur Packet Radio] Any very noisy network medium, in which the packets ar *** sacred adj. Reserved for the exclusive use of something (an extension of the standard meaning). Often means that anyone may look at the sacred object, but clobbering it will screw whatever it is sacred to. The comment Register 7 is sacred to the interrupt handler appearing in a program would be interpreted by a hacker to mean that if any other part of the program changes the contents of register 7, dire consequences are likely to ensue. -*** saga -n. [WPI] A cuspy but bogus raving story about N random broken people. Here is a classic example of the saga form, as told by Guy L. Steele: Jon L. White (login name JONL) and I (GLS) were office mates at MIT for many years. One April, we both flew from Boston to California for a week on research business, to consult face-to-face with some people at Stanford, particularly our mutual friend Richard P. Gabriel (RPG). RPG picked us up at the San Francisco airport and drove us back to Palo Alto (going logical south on route 101, parallel to El Camino Bignum ). Palo Alto is adjacent to Stanford University and about 40 miles south of San Francisco. We ate at The Good Earth, a health food restaurant, very popular, the sort whose milkshakes all contain honey and protein powder. JONL ordered such a shake the waitress claimed the flavor of the day was lalaberry. I still have no idea what that might be, but it became a running joke. It was the color of raspberry, and JONL said it tasted rather bitter. I ate a better tostada there than I have ever had in a Mexican restaurant. After this we went to the local Uncle Gaylord's Old Fashioned Ice Cream Parlor. They make ice cream fresh daily, in a variety of intriguing flavors. It's a chain, and they have a slogan: If you don't live near an Uncle Gaylord's MOVE! Also, Uncle Gaylord (a real person) wages a constant battle to force big-name ice cream makers to print their ingredients on the package (like air and plastic and other non-natural garbage). JONL and I had first discovered Uncle Gaylord's the previous August, when we had flown to a computer-science conference in Berkeley, California, the first time either of us had been on the West Coast. When not in the conference sessions, we had spent our time wandering the length of Telegraph Avenue, which (like Harvard Square in Cambridge) was lined with picturesque street vendors and interesting little shops. On that street we discovered Uncle Gaylord's Berkeley store. The ice cream there was very good. During that August visit JONL went absolutely bananas (so to speak) over one particular flavor, ginger honey. Therefore, after eating at The Good Earth indeed, after every lunch and dinner and before bed during our April visit a trip to Uncle Gaylord's (the one in Palo Alto) was mandatory. We had arrived on a Wednesday, and by Thursday evening we had been there at least four times. Each time, JONL would get ginger honey ice cream, and proclaim to all bystanders that Ginger was the spice that drove the Europeans mad! That's why they sought a route to the East! They used it to preserve their otherwise off-taste meat. After the third or fourth repetition RPG and I were getting a little tired of this spiel, and began to paraphrase him: Wow! Ginger! The spice that makes rotten meat taste good! Say! Why don't we find some dog that's been run over and sat in the sun for a week and put some ginger on it for dinner?! Right! With a lalaberry shake! And so on. This failed to faze JONL; he took it in good humor, as long as we kept returning to Uncle Gaylord's. He loves ginger honey ice cream. Now RPG and his then-wife KBT (Kathy Tracy) were putting us up (putting up with us?) in their home for our visit, so to thank them JONL and I took them out to a nice French restaurant of their choosing. I unadventurously chose the filet mignon, and KBT had je ne sais quoi du jour , but RPG and JONL had lapin (rabbit). (Waitress: Oui , we have fresh rabbit, fresh today. RPG: Well, JONL, I guess we won't need any ginger ! ) We finished the meal late, about 11PM, which is 2AM Boston time, so JONL and I were rather droopy. But it wasn't yet midnight. Off to Uncle Gaylord's! Now the French restaurant was in Redwood City, north of Palo Alto. In leaving Redwood City, we somehow got onto route 101 going north instead of south. JONL and I wouldn't have known the difference had RPG not mentioned it. We still knew very little of the local geography. I did figure out, however, that we were headed in the direction of Berkeley, and half-jokingly suggested that we continue north and go to Uncle Gaylord's in Berkeley. RPG said Fine! and we drove on for a while and talked. I was drowsy, and JONL actually dropped off to sleep for 5 minutes. When he awoke, RPG said, Gee, JONL, you must have slept all the way over the bridge! , referring to the one spanning San Francisco Bay. Just then we came to a sign that said University Avenue. I mumbled something about working our way over to Telegraph Avenue; RPG said Right! and maneuvered some more. Eventually we pulled up in front of an Uncle Gaylord's. Now, I hadn't really been paying attention because I was so sleepy, and I didn't really understand what was happening until RPG let me in on it a few moments later, but I was just alert enough to notice that we had somehow come to the Palo Alto Uncle Gaylord's after all. JONL noticed the resemblance to the Palo Alto store, but hadn't caught on. (The place is lit with red and yellow lights at night, and looks much different from the way it does in daylight.) He said, This isn't the Uncle Gaylord's I went to in Berkeley! It looked like a barn! But this place looks just like the one back in Palo Alto! RPG deadpanned, Well, this is the one I always come to when I'm in Berkeley. They've got two in San Francisco, too. Remember, they're a chain. JONL accepted this bit of wisdom. And he was not totally ignorant he knew perfectly well that University Avenue was in Berkeley, not far from Telegraph Avenue. What he didn't know was that there is a completely different University Avenue in Palo Alto. JONL went up to the counter and asked for ginger honey. The guy at the counter asked whether JONL would like to taste it first, evidently their standard procedure with that flavor, as not too many people like it. JONL said, I'm sure I like it. Just give me a cone. The guy behind the counter insisted that JONL try just a taste first. Some people think it tastes like soap. JONL insisted, Look, I love ginger. I eat Chinese food. I eat raw ginger roots. I already went through this hassle with the guy back in Palo Alto. I know I like that flavor! At the words back in Palo Alto the guy behind the counter got a very strange look on his face, but said nothing. KBT caught his eye and winked. Through my stupor I still hadn't quite grasped what was going on, and thought RPG was rolling on the floor laughing and clutching his stomach just because JONL had launched into his spiel ( makes rotten meat a dish for princes ) for the forty-third time. At this point, RPG clued me in fully. RPG, KBT, and I retreated to a table, trying to stifle our chuckles. JONL remained at the counter, talking about ice cream with the guy b.t.c., comparing Uncle Gaylord's to other ice cream shops and generally having a good old time. At length the g.b.t.c.: said, How's the ginger honey? JONL said, Fine! I wonder what exactly is in it? Now Uncle Gaylord publishes all his recipes and even teaches classes on how to make his ice cream at home. So the g.b.t.c.: got out the recipe, and he and JONL pored over it for a while. But the g.b.t.c.: could contain his curiosity no longer, and asked again, You really like that stuff, huh? JONL said, Yeah, I've been eating it constantly back in Palo Alto for the past two days. In fact, I think this batch is about as good as the cones I got back in Palo Alto! G.b.t.c.: looked him straight in the eye and said, You're in Palo Alto! JONL turned slowly around, and saw the three of us collapse in a fit of giggles. He clapped a hand to his forehead and exclaimed, I've been hacked! [My spies on the West Coast inform me that there is a close relative of the raspberry found out there called an ollalieberry ESR] [Ironic footnote: the meme about ginger vs. rotting meat is an urban legend. It's not borne out by an examination of medieval recipes or period purchase records for spices, and appears full-blown in the works of Samuel Pegge, a gourmand and notorious flake case who originated numerous food myths. The truth seems to be that ginger was used to cover not rot but the extreme salt taste of meat packed in brine, which was the best method available before refrigeration. - *** sagan /saygn/ , n. [from Carl Sagan's TV series Cosmos ; think billions and billions ] A large quantity of anything. There's a sagan different ways to tweak EMACS. The U.S. Government spends sagans on bombs and welfare hard to say which is more destructive. @@ -7397,7 +7394,7 @@ v. To replace a pointer to a pointer with a direct pointer; to replace an old ad 4. Syn. for slurp. This program starts by snarfing the entire database into core, then.... -5. [GEnie] To spray food or programming fluids due to laughing at the wrong moment. I was drinking coffee, and when I read your post I snarfed all over my desk. If I keep reading this topic, I think I'll have to snarf-proof my computer with a keyboard condom. [This sense appears to be widespread among mundane teenagers ESR] The sound of snarfing is splork!. +5. [GEnie] To spray food or programming fluids due to laughing at the wrong moment. I was drinking coffee, and when I read your post I snarfed all over my desk. If I keep reading this topic, I think I'll have to snarf-proof my computer with a keyboard condom. The sound of snarfing is splork!. *** snarf down v. To snarf , with the connotation of absorbing, processing, or understanding. I'll snarf down the latest version of the nethack user's guide it's been a while since I played last and I don't know what's changed recently. @@ -8342,6 +8339,9 @@ n. Historically, an Amiga fitted with a particular line of special video effects *** videotex n. obs. An electronic service offering people the privilege of paying to read the weather on their television screens instead of having somebody read it to them for free while they brush their teeth. The idea bombed everywhere it wasn't government-subsidized, because by the time videotex was practical the installed base of personal computers could hook up to timesharing services and do the things for which videotex might have been worthwhile better and cheaper. Videotex planners badly overestimated both the appeal of getting information from a computer and the cost of local intelligence at the user's end. Like the gorilla arm effect, this has been a cautionary tale to hackers ever since. See also vannevar. +*** viral +Also see faradize. The use of a particular system is said to have "gone viral" if a large number of people begin using it within a short space of time. The term most likely originates from the Dawkins idea of a meme as a "mind virus" able to spread at an exponential rate. + *** virgin adj. Unused; pristine; in a known initial state. Let's bring up a virgin system and see if it crashes again. (Esp.: useful after contracting a virus through SEX. ) Also, by extension, buffers and the like within a program that have not yet been used. @@ -8804,7 +8804,7 @@ n. [IBM] A person with a closed mind. *** zorch 1. [TMRC] v. To attack with an inverse heat sink. -2. [TMRC] v. To travel, with v approaching c [that is, with velocity approaching lightspeed ESR]. +2. [TMRC] v. To travel, with velocity approaching light speed. 3. [MIT] v. To propel something very quickly. The new comm software is very fast; it really zorches files through the network. diff --git a/docs/jargon.1.gz b/docs/jargon.1.gz index 7c992aa..c17fdda 100644 Binary files a/docs/jargon.1.gz and b/docs/jargon.1.gz differ diff --git a/docs/jargon.html b/docs/jargon.html index 86c9470..ecc96a7 100644 --- a/docs/jargon.html +++ b/docs/jargon.html @@ -18,7 +18,7 @@ Free Documentation License".

Generated

-This file last generated Monday, 15 October 2018 12:29PM UTC +This file last generated Monday, 15 October 2018 01:46PM UTC

Glossary

@@ -35,7 +35,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

-oid

1. Used as in mainstream slang English to indicate a poor imitation, a counterfeit, or some otherwise slightly bogus resemblance. Hackers will happily use it with all sorts of non-Greco/Latin stem words that wouldn't keep company with it in mainstream English. For example, He's a nerdoid means that he superficially resembles a nerd but can't make the grade; a modemoid might be a 300-baud box (Real Modems run at 28.8 or up); a computeroid might be any bitty box. The word keyboid could be used to describe a chiclet keyboard , but would have to be written; spoken, it would confuse the listener as to the speaker's city of origin.

-

2. More specifically, an indicator for resembling an android which in the past has been confined to science-fiction fans and hackers. It too has recently (in 1991) started to go mainstream (most notably in the term trendoid for victims of terminal hipness). This is probably traceable to the popularization of the term droid in Star Wars and its sequels. (See also windoid. ) Coinages in both forms have been common in science fiction for at least fifty years, and hackers (who are often SF fans) have probably been making -oid jargon for almost that long [though GLS and I can personally confirm only that they were already common in the mid-1970s ESR].

+

2. More specifically, an indicator for resembling an android which in the past has been confined to science-fiction fans and hackers. It too has recently (in 1991) started to go mainstream (most notably in the term trendoid for victims of terminal hipness). This is probably traceable to the popularization of the term droid in Star Wars and its sequels. (See also windoid. ) Coinages in both forms have been common in science fiction for at least fifty years, and hackers (who are often SF fans) have probably been making -oid jargon for almost that long.

-ware

suff. [from software ] Commonly used to form jargon terms for classes of software. For examples, see annoyware , careware , crippleware , crudware , freeware , fritterware , guiltware , liveware , meatware , payware , psychedelicware , shareware , shelfware , vaporware , wetware , spyware , adware. @@ -209,7 +209,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

BASIC

- /bay'sic/ , n. A programming language, originally designed for Dartmouth's experimental timesharing system in the early 1960s, which for many years was the leading cause of brain damage in proto-hackers. Edsger W. Dijkstra observed in Selected Writings on Computing: A Personal Perspective that It is practically impossible to teach good programming style to students that have had prior exposure to BASIC: as potential programmers they are mentally mutilated beyond hope of regeneration. This is another case (like Pascal ) of the cascading lossage that happens when a language deliberately designed as an educational toy gets taken too seriously. A novice can write short BASIC programs (on the order of 10-20 lines) very easily; writing anything longer (a) is very painful, and (b) encourages bad habits that will make it harder to use more powerful languages well. This wouldn't be so bad if historical accidents hadn't made BASIC so common on low-end micros in the 1980s. As it is, it probably ruined tens of thousands of potential wizards. [1995: Some languages called BASIC aren't quite this nasty any more, having acquired Pascal- and C-like procedures and control structures and shed their line numbers. ESR] BASIC stands for Beginner's All-purpose Symbolic Instruction Code. Earlier versions of this entry claiming this was a later backronym were incorrect. + /bay'sic/ , n. A programming language, originally designed for Dartmouth's experimental timesharing system in the early 1960s, which for many years was the leading cause of brain damage in proto-hackers. Edsger W. Dijkstra observed in Selected Writings on Computing: A Personal Perspective that It is practically impossible to teach good programming style to students that have had prior exposure to BASIC: as potential programmers they are mentally mutilated beyond hope of regeneration. This is another case (like Pascal ) of the cascading lossage that happens when a language deliberately designed as an educational toy gets taken too seriously. A novice can write short BASIC programs (on the order of 10-20 lines) very easily; writing anything longer (a) is very painful, and (b) encourages bad habits that will make it harder to use more powerful languages well. This wouldn't be so bad if historical accidents hadn't made BASIC so common on low-end micros in the 1980s. As it is, it probably ruined tens of thousands of potential wizards. BASIC stands for Beginner's All-purpose Symbolic Instruction Code. Earlier versions of this entry claiming this was a later backronym were incorrect.

BBS

@@ -364,7 +364,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

C++

- /C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. [Many hackers would now add Yes, and it's called Java ESR] Nowadays we say this of C++. + /C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. Nowadays we say this of C++.

CDA

@@ -507,7 +507,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

DEC Wars

- n. A 1983 Usenet posting by Alan Hastings and Steve Tarr spoofing the Star Wars movies in hackish terms. Some years later, ESR (disappointed by Hastings and Tarr's failure to exploit a great premise more thoroughly) posted a 3-times-longer complete rewrite called Unix WARS ; the two are often confused. + n. A 1983 Usenet posting by Alan Hastings and Steve Tarr spoofing the Star Wars movies in hackish terms.

DED

@@ -670,7 +670,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

El Camino Bignum

- /el k@meenoh bignuhm/ , n. The road mundanely called El Camino Real, running along San Francisco peninsula. It originally extended all the way down to Mexico City; many portions of the old road are still intact. Navigation on the San Francisco peninsula is usually done relative to El Camino Real, which defines logical north and south even though it isn't really north-south in many places. El Camino Real runs right past Stanford University and so is familiar to hackers. The Spanish word real (which has two syllables: /rayahl/ ) means royal ; El Camino Real is the royal road. In the FORTRAN language, a real quantity is a number typically precise to seven significant digits, and a double precision quantity is a larger floating-point number, precise to perhaps fourteen significant digits (other languages have similar real types). When a hacker from MIT visited Stanford in 1976, he remarked what a long road El Camino Real was. Making a pun on real , he started calling it El Camino Double Precision but when the hacker was told that the road was hundreds of miles long, he renamed it El Camino Bignum , and that name has stuck. (See bignum. ) [GLS has since let slip that the unnamed hacker in this story was in fact himself ESR] In the early 1990s, the synonym El Camino Virtual was been reported as an alternate at IBM and Amdahl sites in the Valley. Mathematically literate hackers in the Valley have also been heard to refer to some major cross-street intersecting El Camino Real as El Camino Imaginary. One popular theory is that the intersection is located near Moffett Field where they keep all those complex planes. + /el k@meenoh bignuhm/ , n. The road mundanely called El Camino Real, running along San Francisco peninsula. It originally extended all the way down to Mexico City; many portions of the old road are still intact. Navigation on the San Francisco peninsula is usually done relative to El Camino Real, which defines logical north and south even though it isn't really north-south in many places. El Camino Real runs right past Stanford University and so is familiar to hackers. The Spanish word real (which has two syllables: /rayahl/ ) means royal ; El Camino Real is the royal road. In the FORTRAN language, a real quantity is a number typically precise to seven significant digits, and a double precision quantity is a larger floating-point number, precise to perhaps fourteen significant digits (other languages have similar real types). When a hacker from MIT visited Stanford in 1976, he remarked what a long road El Camino Real was. Making a pun on real , he started calling it El Camino Double Precision but when the hacker was told that the road was hundreds of miles long, he renamed it El Camino Bignum , and that name has stuck. (See bignum. ) In the early 1990s, the synonym El Camino Virtual was been reported as an alternate at IBM and Amdahl sites in the Valley. Mathematically literate hackers in the Valley have also been heard to refer to some major cross-street intersecting El Camino Real as El Camino Imaginary. One popular theory is that the intersection is located near Moffett Field where they keep all those complex planes.

English

1. n. obs. The source code for a program, which may be in any language, as opposed to the linkable or executable binary produced from it by a compiler. The idea behind the term is that to a real hacker, a program written in his favorite programming language is at least as readable as. Usage: mostly by old-time hackers, though recognizable in context. Today the preferred shorthand is simply source.

@@ -694,7 +694,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

Exploder

- n. Used within Microsoft to refer to the Windows Explorer, the web-interface component of Windows 95 and WinNT 4. Our spies report that most of the heavy guns at MS came from a Unix background and use command line utilities; even they are scornful of the over-gingerbreaded WIMP environments that they have been called upon to create. + n. Used within Microsoft to refer to the Windows Explorer, the web-interface component of Windows.

F

FAQ

@@ -1814,7 +1814,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

2. The motto of the complaints division of Sirius Cybernetics Corporation (the ultimate gaggle of incompetent suit s) in Douglas Adams's Hitch Hiker's Guide to the Galaxy. The irony of using this as a cultural recognition signal appeals to hackers.

Shub-Internet

- /shuhb int@rnet/ , n. [MUD: from H. P. Lovecraft's evil fictional deity Shub-Niggurath, the Black Goat with a Thousand Young] The harsh personification of the Internet: Beast of a Thousand Processes, Eater of Characters, Avatar of Line Noise, and Imp of Call Waiting; the hideous multi-tendriled entity formed of all the manifold connections of the net. A sect of MUDders worships Shub-Internet, sacrificing objects and praying for good connections. To no avail its purpose is malign and evil, and it is the cause of all network slowdown. Often heard as in Freela casts a tac nuke at Shub-Internet for slowing her down. (A forged response often follows along the lines of: Shub-Internet gulps down the tac nuke and burps happily. ) Also cursed by users of the Web, FTP and telnet when the network lags. The dread name of Shub-Internet is seldom spoken aloud, as it is said that repeating it three times will cause the being to wake, deep within its lair beneath the Pentagon. Compare Random Number God. [January 1996: It develops that one of the computer administrators in the basement of the Pentagon read this entry and fell over laughing. As a result, you too can now poke Shub-Internet by ping ing shub-internet.ims.disa.mil. Compare kremvax. ESR] [April 1999: shub-internet.ims.disa.mil is no more, alas. But Shub-Internet lives, and even has a home page. + /shuhb int@rnet/ , n. [MUD: from H. P. Lovecraft's evil fictional deity Shub-Niggurath, the Black Goat with a Thousand Young] The harsh personification of the Internet: Beast of a Thousand Processes, Eater of Characters, Avatar of Line Noise, and Imp of Call Waiting; the hideous multi-tendriled entity formed of all the manifold connections of the net. A sect of MUDders worships Shub-Internet, sacrificing objects and praying for good connections. To no avail its purpose is malign and evil, and it is the cause of all network slowdown. Often heard as in Freela casts a tac nuke at Shub-Internet for slowing her down. (A forged response often follows along the lines of: Shub-Internet gulps down the tac nuke and burps happily. ) Also cursed by users of the Web, FTP and telnet when the network lags. The dread name of Shub-Internet is seldom spoken aloud, as it is said that repeating it three times will cause the being to wake, deep within its lair beneath the Pentagon. Compare Random Number God.

Slowlaris

@@ -2601,9 +2601,9 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

3. Occasionally appended to foo to produce foobaz. Earlier versions of this lexicon derived baz as a Stanford corruption of bar. However, Pete Samson (compiler of the TMRC lexicon) reports it was already current when he joined TMRC in 1958. He says It came from Pogo. Albert the Alligator, when vexed or outraged, would shout Bazz Fazz! or Rowrbazzle! The club layout was said to model the (mythical) New England counties of Rowrfolk and Bassex (Rowrbazzle mingled with (Norfolk/Suffolk/Middlesex/Essex).

bazaar

-

- n.,adj. In 1997, after meditating on the success of Linux for three years, the Jargon File's own editor ESR wrote an analytical paper on hacker culture and development models titled The Cathedral and the Bazaar. The main argument of the paper was that Brooks's Law is not the whole story; given the right social machinery, debugging can be efficiently parallelized across large numbers of programmers. The title metaphor caught on (see also cathedral ), and the style of development typical in the Linux community is now often referred to as the bazaar mode. Its characteristics include releasing code early and often, and actively seeking the largest possible pool of peer reviewers. After 1998, the evident success of this way of doing things became one of the strongest arguments for open source. -

+

1. Analogy of software development methodology. Software developed in public according to normative FOSS praxis is said more like the chaotic and more organic trading style of a bazaar than the pristine top-down architecture of a cathedral created by visionary engineers. The analogy is made in a 1999 book by Eric Raymond, called The Cathedral and the Bazaar. Characteristics of bazaar style development include releasing code early and often, treating users as co-developers and making extensive use of internet for project communications and interaction with code repositories.

+ +

2. A version control system created by Canonical in 2005 for development of the Ubuntu GNU/Linux distro and related tools.

bboard

1. Any electronic bulletin board; esp. used of BBS systems running on personal micros, less frequently of a Usenet newsgroup (in fact, use of this term for a newsgroup generally marks one either as a newbie fresh in from the BBS world or as a real old-timer predating Usenet).

@@ -3156,7 +3156,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

bug

- n. An unwanted and unintended property of a program or piece of hardware, esp. one that causes it to malfunction. Antonym of feature. Examples: There's a bug in the editor: it writes things out backwards. The system crashed because of a hardware bug. Fred is a winner, but he has a few bugs (i.e., Fred is a good guy, but he has a few personality problems). Historical note: Admiral Grace Hopper (an early computing pioneer better known for inventing COBOL ) liked to tell a story in which a technician solved a glitch in the Harvard Mark II machine by pulling an actual insect out from between the contacts of one of its relays, and she subsequently promulgated bug in its hackish sense as a joke about the incident (though, as she was careful to admit, she was not there when it happened). For many years the logbook associated with the incident and the actual bug in question (a moth) sat in a display case at the Naval Surface Warfare Center (NSWC). The entire story, with a picture of the logbook and the moth taped into it, is recorded in the Annals of the History of Computing , Vol. 3, No. 3 (July 1981), pp. 285--286. The text of the log entry (from September 9, 1947), reads 1545 Relay #70 Panel F (moth) in relay. First actual case of bug being found. This wording establishes that the term was already in use at the time in its current specific sense and Hopper herself reports that the term bug was regularly applied to problems in radar electronics during WWII. The original bug (the caption date is incorrect) Indeed, the use of bug to mean an industrial defect was already established in Thomas Edison's time, and a more specific and rather modern use can be found in an electrical handbook from 1896 ( Hawkin's New Catechism of Electricity , Theo. Audel Co.) which says: The term bug is used to a limited extent to designate any fault or trouble in the connections or working of electric apparatus. It further notes that the term is said to have originated in quadruplex telegraphy and have been transferred to all electric apparatus. The latter observation may explain a common folk etymology of the term; that it came from telephone company usage, in which bugs in a telephone cable were blamed for noisy lines. Though this derivation seems to be mistaken, it may well be a distorted memory of a joke first current among telegraph operators more than a century ago! Or perhaps not a joke. Historians of the field inform us that the term bug was regularly used in the early days of telegraphy to refer to a variety of semi-automatic telegraphy keyers that would send a string of dots if you held them down. In fact, the Vibroplex keyers (which were among the most common of this type) even had a graphic of a beetle on them (and still do)! While the ability to send repeated dots automatically was very useful for professional morse code operators, these were also significantly trickier to use than the older manual keyers, and it could take some practice to ensure one didn't introduce extraneous dots into the code by holding the key down a fraction too long. In the hands of an inexperienced operator, a Vibroplex bug on the line could mean that a lot of garbled Morse would soon be coming your way. Further, the term bug has long been used among radio technicians to describe a device that converts electromagnetic field variations into acoustic signals. It is used to trace radio interference and look for dangerous radio emissions. Radio community usage derives from the roach-like shape of the first versions used by 19th century physicists. The first versions consisted of a coil of wire (roach body), with the two wire ends sticking out and bent back to nearly touch forming a spark gap (roach antennae). The bug is to the radio technician what the stethoscope is to the stereotypical medical doctor. This sense is almost certainly ancestral to modern use of bug for a covert monitoring device, but may also have contributed to the use of bug for the effects of radio interference itself. Actually, use of bug in the general sense of a disruptive event goes back to Shakespeare! (Henry VI, part III - Act V, Scene II: King Edward: So, lie thou there. Die thou; and die our fear; For Warwick was a bug that fear'd us all. ) In the first edition of Samuel Johnson's dictionary one meaning of bug is A frightful object; a walking spectre ; this is traced to bugbear , a Welsh term for a variety of mythological monster which (to complete the circle) has recently been reintroduced into the popular lexicon through fantasy role-playing games. In any case, in jargon the word almost never refers to insects. Here is a plausible conversation that never actually happened: There is a bug in this ant farm! What do you mean? I don't see any ants in it. That's the bug. A careful discussion of the etymological issues can be found in a paper by Fred R. Shapiro, 1987, Entomology of the Computer Bug: History and Folklore , American Speech 62(4):376-378. [There has been a widespread myth that the original bug was moved to the Smithsonian, and an earlier version of this entry so asserted. A correspondent who thought to check discovered that the bug was not there. While investigating this in late 1990, your editor discovered that the NSWC still had the bug, but had unsuccessfully tried to get the Smithsonian to accept it and that the present curator of their History of American Technology Museum didn't know this and agreed that it would make a worthwhile exhibit. It was moved to the Smithsonian in mid-1991, but due to space and money constraints was not actually exhibited for years afterwards. Thus, the process of investigating the original-computer-bug bug fixed it in an entirely unexpected way, by making the myth true! ESR] It helps to remember that this dates from 1973. (The next cartoon in the Crunchly saga is 73-10-31. The previous cartoon was 73-07-24. + n. An unwanted and unintended property of a program or piece of hardware, esp. one that causes it to malfunction. Antonym of feature. Examples: There's a bug in the editor: it writes things out backwards. The system crashed because of a hardware bug. Fred is a winner, but he has a few bugs (i.e., Fred is a good guy, but he has a few personality problems). Historical note: Admiral Grace Hopper (an early computing pioneer better known for inventing COBOL ) liked to tell a story in which a technician solved a glitch in the Harvard Mark II machine by pulling an actual insect out from between the contacts of one of its relays, and she subsequently promulgated bug in its hackish sense as a joke about the incident (though, as she was careful to admit, she was not there when it happened). For many years the logbook associated with the incident and the actual bug in question (a moth) sat in a display case at the Naval Surface Warfare Center (NSWC). The entire story, with a picture of the logbook and the moth taped into it, is recorded in the Annals of the History of Computing , Vol. 3, No. 3 (July 1981), pp. 285--286. The text of the log entry (from September 9, 1947), reads 1545 Relay #70 Panel F (moth) in relay. First actual case of bug being found. This wording establishes that the term was already in use at the time in its current specific sense and Hopper herself reports that the term bug was regularly applied to problems in radar electronics during WWII. The original bug (the caption date is incorrect) Indeed, the use of bug to mean an industrial defect was already established in Thomas Edison's time, and a more specific and rather modern use can be found in an electrical handbook from 1896 ( Hawkin's New Catechism of Electricity , Theo. Audel Co.) which says: The term bug is used to a limited extent to designate any fault or trouble in the connections or working of electric apparatus. It further notes that the term is said to have originated in quadruplex telegraphy and have been transferred to all electric apparatus. The latter observation may explain a common folk etymology of the term; that it came from telephone company usage, in which bugs in a telephone cable were blamed for noisy lines. Though this derivation seems to be mistaken, it may well be a distorted memory of a joke first current among telegraph operators more than a century ago! Or perhaps not a joke. Historians of the field inform us that the term bug was regularly used in the early days of telegraphy to refer to a variety of semi-automatic telegraphy keyers that would send a string of dots if you held them down. In fact, the Vibroplex keyers (which were among the most common of this type) even had a graphic of a beetle on them (and still do)! While the ability to send repeated dots automatically was very useful for professional morse code operators, these were also significantly trickier to use than the older manual keyers, and it could take some practice to ensure one didn't introduce extraneous dots into the code by holding the key down a fraction too long. In the hands of an inexperienced operator, a Vibroplex bug on the line could mean that a lot of garbled Morse would soon be coming your way. Further, the term bug has long been used among radio technicians to describe a device that converts electromagnetic field variations into acoustic signals. It is used to trace radio interference and look for dangerous radio emissions. Radio community usage derives from the roach-like shape of the first versions used by 19th century physicists. The first versions consisted of a coil of wire (roach body), with the two wire ends sticking out and bent back to nearly touch forming a spark gap (roach antennae). The bug is to the radio technician what the stethoscope is to the stereotypical medical doctor. This sense is almost certainly ancestral to modern use of bug for a covert monitoring device, but may also have contributed to the use of bug for the effects of radio interference itself. Actually, use of bug in the general sense of a disruptive event goes back to Shakespeare! (Henry VI, part III - Act V, Scene II: King Edward: So, lie thou there. Die thou; and die our fear; For Warwick was a bug that fear'd us all. ) In the first edition of Samuel Johnson's dictionary one meaning of bug is A frightful object; a walking spectre ; this is traced to bugbear , a Welsh term for a variety of mythological monster which (to complete the circle) has recently been reintroduced into the popular lexicon through fantasy role-playing games. In any case, in jargon the word almost never refers to insects. Here is a plausible conversation that never actually happened: There is a bug in this ant farm! What do you mean? I don't see any ants in it. That's the bug. A careful discussion of the etymological issues can be found in a paper by Fred R. Shapiro, 1987, Entomology of the Computer Bug: History and Folklore , American Speech 62(4):376-378. It helps to remember that this dates from 1973. (The next cartoon in the Crunchly saga is 73-10-31. The previous cartoon was 73-07-24.

bug door

@@ -3267,7 +3267,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

2. In reality, most cancelbots are manually operated by being fed lists of spam message IDs.

candygrammar

- n. A programming-language grammar that is mostly syntactic sugar ; the term is also a play on candygram. COBOL , Apple's Hypertalk language, and a lot of the so-called 4GL database languages share this property. The usual intent of such designs is that they be as English-like as possible, on the theory that they will then be easier for unskilled people to program. This intention comes to grief on the reality that syntax isn't what makes programming hard; it's the mental effort and organization required to specify an algorithm precisely that costs. Thus the invariable result is that candygrammar languages are just as difficult to program in as terser ones, and far more painful for the experienced hacker. [The overtones from the old Chevy Chase skit on Saturday Night Live should not be overlooked. This was a Jaws parody. Someone lurking outside an apartment door tries all kinds of bogus ways to get the occupant to open up, while ominous music plays in the background. The last attempt is a half-hearted Candygram! When the door is opened, a shark bursts in and chomps the poor occupant. [There is a similar gag in Blazing Saddles ESR] There is a moral here for those attracted to candygrammars. Note that, in many circles, pretty much the same ones who remember Monty Python sketches, all it takes is the word Candygram! , suitably timed, to get people rolling on the floor. + n. A programming-language grammar that is mostly syntactic sugar ; the term is also a play on candygram. COBOL , Apple's Hypertalk language, and a lot of the so-called 4GL database languages share this property. The usual intent of such designs is that they be as English-like as possible, on the theory that they will then be easier for unskilled people to program. This intention comes to grief on the reality that syntax isn't what makes programming hard; it's the mental effort and organization required to specify an algorithm precisely that costs. Thus the invariable result is that candygrammar languages are just as difficult to program in as terser ones, and far more painful for the experienced hacker. [The overtones from the old Chevy Chase skit on Saturday Night Live should not be overlooked. This was a Jaws parody. Someone lurking outside an apartment door tries all kinds of bogus ways to get the occupant to open up, while ominous music plays in the background. The last attempt is a half-hearted Candygram! When the door is opened, a shark bursts in and chomps the poor occupant. There is a moral here for those attracted to candygrammars. Note that, in many circles, pretty much the same ones who remember Monty Python sketches, all it takes is the word Candygram!, suitably timed, to get people rolling on the floor.

canonical

@@ -3393,10 +3393,6 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

n. A keyboard with a small, flat rectangular or lozenge-shaped rubber or plastic keys that look like pieces of chewing gum. (Chiclets is the brand name of a variety of chewing gum that does in fact resemble the keys of chiclet keyboards.) Used esp. to describe the original IBM PCjr keyboard. Vendors unanimously liked these because they were cheap, and a lot of early portable and laptop products got launched using them. Customers rejected the idea with almost equal unanimity, and chiclets are not often seen on anything larger than a digital watch any more.

-

choad

-

- /chohd/ , n. Synonym for penis used in alt.tasteless and popularized by the denizens thereof. They say: We think maybe it's from Middle English but we're all too damned lazy to check the OED. [I'm not. It isn't. ESR] This term is alleged to have been inherited through 1960s underground comics, and to have been recently sighted in the Beavis and Butthead cartoons. Speakers of the Hindi, Bengali and Gujarati languages have confirmed that choad is in fact an Indian vernacular word equivalent to fuck ; it is therefore likely to have entered English slang via the British Raj. -

choke

v. [common] To reject input, often ungracefully. NULs make System V's lpr (1) choke. I tried building an EMACS binary to use X , but cpp (1) choked on all those #define s. See barf , vi. @@ -4466,7 +4462,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

2. By extension, any odd or unreadable typeface produced by a graphics device.

-

3. The typeface mundanely called Bcklin , an art-Noveau display font.

+

3. The typeface mundanely called Bcklin, an art-Noveau display font.

email

1. n. Electronic mail automatically passed through computer networks and/or via modems over common-carrier lines. Contrast snail-mail , paper-net , voice-net. See network address.

@@ -4480,9 +4476,9 @@ This file last generated Monday, 15 October 2018 12:29PM UTC n. Any of a family of military simulations derived from a game written by Peter Langston many years ago. A number of multi-player variants of varying degrees of sophistication exist, and one single-player version implemented for both Unix and VMS; the latter is even available as MS-DOS/Windows freeware. All are notoriously addictive. Of various commercial derivatives the best known is probably Empire Deluxe on PCs and Amigas. Modern empire is a real-time wargame played over the internet by up to 120 players. Typical games last from 24 hours (blitz) to a couple of months (long term). The amount of sleep you can get while playing is a function of the rate at which updates occur and the number of co-rulers of your country. Empire server software is available for Unix-like machines, and clients for Unix and other platforms. A comprehensive history of the game is available at http://www.empire.cx/infopages/History.html. The Empire resource site is at http://www.empire.cx/.

engine

-

- n. 1. A piece of hardware that encapsulates some function but can't be used without some kind of front end. -

+

1. n. A piece of hardware that encapsulates some function but can't be used without some kind of front end.

+ +

2. Software with a dedicated and typically low level purpose, such as rendering graphics.

enhancement

n. Common marketroid -speak for a bug fix. This abuse of language is a popular and time-tested way to turn incompetence into increased revenue. A hacker being ironic would instead call the fix a feature or perhaps save some effort by declaring the bug itself to be a feature. @@ -4571,9 +4567,9 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

F

face time

-

- n. [common] Time spent interacting with somebody face-to-face (as opposed to via electronic links). Oh, yeah, I spent some face time with him at the last Usenix. -

+

1. n. [common] Time spent interacting with somebody face-to-face (as opposed to via electronic links). Oh, yeah, I spent some face time with him at the last FOSDEM.

+ +

2. A proprietary videoconferencing system made by Apple.

factor

n. See coefficient of X. @@ -4584,7 +4580,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

fairings

- n. , /feringz/ [FreeBSD; orig. a typo for fairness ] A term thrown out in discussion whenever a completely and transparently nonsensical argument in one's favor(?) seems called for, e,g. at the end of a really long thread for which the outcome is no longer even cared about since everyone is now so sick of it; or in rebuttal to another nonsensical argument ( Change the loader to look for /kernel. + n. , /feringz/ [FreeBSD; orig. a typo for fairness ] A term thrown out in discussion whenever a completely and transparently nonsensical argument in one's favor(?) seems called for, e,g. at the end of a really long thread for which the outcome is no longer even cared about since everyone is now so sick of it; or in rebuttal to another nonsensical argument.

fall over

@@ -4602,27 +4598,23 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

fandango on core

- n. [Unix/C hackers, from the Iberian dance] In C, a wild pointer that runs out of bounds, causing a core dump , or corrupts the malloc (3) arena in such a way as to cause mysterious failures later on, is sometimes said to have done a fandango on core. On low-end personal machines without an MMU (or Windows boxes, which have an MMU but use it incompetently), this can corrupt the OS itself, causing massive lossage. Other frenetic dances, such as the cha-cha or the watusi, may be substituted. See aliasing bug , precedence lossage , smash the stack , memory leak , memory smash , overrun screw , core. + n. [Unix/C hackers, from the Iberian dance] In C, a wild pointer that runs out of bounds, causing a core dump, or corrupts the malloc arena in such a way as to cause mysterious failures later on, is sometimes said to have done a fandango on core. On low-end personal machines without an MMU (or Windows boxes, which have an MMU but use it incompetently), this can corrupt the OS itself, causing massive lossage. Other frenetic dances, such as the cha-cha or the watusi, may be substituted. See aliasing bug, precedence lossage, smash the stack, memory leak, memory smash, overrun screw, core.

faradize

- /far'@di:z/ , v. [US Geological Survey] To start any hyper-addictive process or trend, or to continue adding current to such a trend. Telling one user about a new octo-tetris game you compiled would be a faradizing act in two weeks you might find your entire department playing the faradic game. -

-

farkled

-

- /farkld/ , adj. [DeVry Institute of Technology, Atlanta] Syn. hosed. Poss. owes something to Yiddish farblondjet and/or the Farkle Family skits on Rowan and Martin's Laugh-In , a popular comedy show of the late 1960s. + /far'@di:z/ , v. [US Geological Survey] To start any hyper-addictive process or trend, or to continue adding current to such a trend. Telling one user about a new octo-tetris game you compiled would be a faradizing act in two weeks you might find your entire department playing the faradic game. Also known as virality or "going viral".

farm

n. A group of machines, especially a large group of near-identical machines running load-balancing software, dedicated to a single task. Historically the term server farm , used especially for a group of web servers, seems to have been coined by analogy with earlier disk farm in the early 1990s; generalization began with render farm for a group of machines dedicated to rendering computer animations (this term appears to have been popularized by publicity about the pioneering Linux render farm used to produce the movie Titanic ). By 2001 other combinations such as compile farm and compute farm were increasingly common, and arguably borderline techspeak. More jargon uses seem likely to arise (and be absorbed into techspeak over time) as new uses are discovered for networked machine clusters. Compare link farm.

fascist

-

1. [common] Said of a computer system with excessive or annoying security barriers, usage limits, or access policies. The implication is that said policies are preventing hackers from getting interesting work done. The variant fascistic seems to have been preferred at MIT, poss. by analogy with touristic (see tourist or under the influence of German/Yiddish faschistisch ).

+

1. [common] Said of a computer system with excessive or annoying security barriers, usage limits, or access policies. The implication is that said policies are preventing hackers from getting interesting work done.

-

2. In the design of languages and other software tools, the fascist alternative is the most restrictive and structured way of capturing a particular function; the implication is that this may be desirable in order to simplify the implementation or provide tighter error checking. Compare bondage-and-discipline language , although that term is global rather than local. Fascist security strikes again. (The next cartoon in the Crunchly saga is 73-05-28. The previous one is 73-05-20.

+

2. In the design of languages and other software tools, the fascist alternative is the most restrictive and structured way of capturing a particular function; the implication is that this may be desirable in order to simplify the implementation or provide tighter error checking.

fat electrons

- n. Old-time hacker David Cargill's theory on the causation of computer glitches. Your typical electric utility draws its line current out of the big generators with a pair of coil taps located near the top of the dynamo. When the normal tap brushes get dirty, they take them off line to clean them up, and use special auxiliary taps on the bottom of the coil. Now, this is a problem, because when they do that they get not ordinary or thin electrons, but the fat'n'sloppy electrons that are heavier and so settle to the bottom of the generator. These flow down ordinary wires just fine, but when they have to turn a sharp corner (as in an integrated-circuit via), they're apt to get stuck. This is what causes computer glitches. [Fascinating. Obviously, fat electrons must gain mass by bogon absorption ESR] Compare bogon , magic smoke. + n. Old-time hacker David Cargill's theory on the causation of computer glitches. Your typical electric utility draws its line current out of the big generators with a pair of coil taps located near the top of the dynamo. When the normal tap brushes get dirty, they take them off line to clean them up, and use special auxiliary taps on the bottom of the coil. Now, this is a problem, because when they do that they get not ordinary or thin electrons, but the fat'n'sloppy electrons that are heavier and so settle to the bottom of the generator. These flow down ordinary wires just fine, but when they have to turn a sharp corner (as in an integrated-circuit via), they're apt to get stuck. This is what causes computer glitches. Compare bogon , magic smoke.

fat pipe

@@ -5339,7 +5331,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

2. [Amateur Packet Radio] The terrestrial analog of a wormhole (sense 2), from which this term was coined. A gopher hole links two amateur packet relays through some non-ham radio medium.

gorets

- /gorets/ , n. The unknown ur-noun, fill in your own meaning. Found esp. on the Usenet newsgroup alt.gorets , which seems to be a running contest to redefine the word by implication in the funniest and most peculiar way, with the understanding that no definition is ever final. [A correspondent from the former Soviet Union informs me that gorets is Russian for mountain dweller. Another from France informs me that goret is archaic French for a young pig ESR] Compare frink. + /gorets/ , n. The unknown ur-noun, fill in your own meaning. Found esp. on the Usenet newsgroup alt.gorets , which seems to be a running contest to redefine the word by implication in the funniest and most peculiar way, with the understanding that no definition is ever final. Compare frink.

gorilla arm

@@ -5690,7 +5682,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

hash collision

- n. [from the techspeak] (var.: hash clash ) When used of people, signifies a confusion in associative memory or imagination, especially a persistent one (see thinko ). True story: One of us [ESR] was once on the phone with a friend about to move out to Berkeley. When asked what he expected Berkeley to be like, the friend replied: Well, I have this mental picture of naked women throwing Molotov cocktails, but I think that's just a collision in my hash tables. Compare hash bucket. + n. [from the techspeak] (var.: hash clash ) When used of people, signifies a confusion in associative memory or imagination, especially a persistent one (see thinko ). Compare hash bucket.

hat

@@ -6170,7 +6162,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

4. vt. To insert a kluge into a program. I've kluged this routine to get around that weird bug, but there's probably a better way.

-

5. [WPI] n. A feature that is implemented in a rude manner. Nowadays this term is often encountered in the variant spelling kludge. Reports from old farts are consistent that kluge was the original spelling, reported around computers as far back as the mid-1950s and, at that time, used exclusively of hardware kluges. In 1947, the New York Folklore Quarterly reported a classic shaggy-dog story Murgatroyd the Kluge Maker then current in the Armed Forces, in which a kluge was a complex and puzzling artifact with a trivial function. Other sources report that kluge was common Navy slang in the WWII era for any piece of electronics that worked well on shore but consistently failed at sea. However, there is reason to believe this slang use may be a decade older. Several respondents have connected it to the brand name of a device called a Kluge paper feeder , an adjunct to mechanical printing presses. Legend has it that the Kluge feeder was designed before small, cheap electric motors and control electronics; it relied on a fiendishly complex assortment of cams, belts, and linkages to both power and synchronize all its operations from one motive driveshaft. It was accordingly temperamental, subject to frequent breakdowns, and devilishly difficult to repair but oh, so clever! People who tell this story also aver that Kluge was the name of a design engineer. There is in fact a Brandtjen Kluge Inc., an old family business that manufactures printing equipment interestingly, their name is pronounced /kloogee/ ! Henry Brandtjen, president of the firm, told me (ESR, 1994) that his company was co-founded by his father and an engineer named Kluge /kloogee/ , who built and co-designed the original Kluge automatic feeder in 1919. Mr. Brandtjen claims, however, that this was a simple device (with only four cams); he says he has no idea how the myth of its complexity took hold. Other correspondents differ with Mr. Brandtjen's history of the device and his allegation that it was a simple rather than complex one, but agree that the Kluge automatic feeder was the most likely source of the folklore. TMRC and the MIT hacker culture of the early '60s seems to have developed in a milieu that remembered and still used some WWII military slang (see also foobar ). It seems likely that kluge came to MIT via alumni of the many military electronics projects that had been located in Cambridge (many in MIT's venerable Building 20, in which TMRC is also located) during the war. The variant kludge was apparently popularized by the Datamation article mentioned under kludge ; it was titled How to Design a Kludge (February 1962, pp. 30, 31). This spelling was probably imported from Great Britain, where kludge has an independent history (though this fact was largely unknown to hackers on either side of the Atlantic before a mid-1993 debate in the Usenet group alt.folklore.computers over the First and Second Edition versions of this entry; everybody used to think kludge was just a mutation of kluge ). It now appears that the British, having forgotten the etymology of their own kludge when kluge crossed the Atlantic, repaid the U.S. by lobbing the kludge orthography in the other direction and confusing their American cousins' spelling! The result of this history is a tangle. Many younger U.S. hackers pronounce the word as /klooj/ but spell it, incorrectly for its meaning and pronunciation, as kludge. (Phonetically, consider huge, refuge, centrifuge, and deluge as opposed to sludge, judge, budge, and fudge. Whatever its failings in other areas, English spelling is perfectly consistent about this distinction.) British hackers mostly learned /kluhj/ orally, use it in a restricted negative sense and are at least consistent. European hackers have mostly learned the word from written American sources and tend to pronounce it /kluhj/ but use the wider American meaning! Some observers consider this mess appropriate in view of the word's meaning.

+

5. [WPI] n. A feature that is implemented in a rude manner. Nowadays this term is often encountered in the variant spelling kludge.

kluge around

vt. To avoid a bug or difficult condition by inserting a kluge. Compare workaround. @@ -6197,7 +6189,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

kremvax

- /kremvaks/ , n. [from the then-large number of Usenet VAXen with names of the form foovax ] Originally, a fictitious Usenet site at the Kremlin, announced on April 1, 1984 in a posting ostensibly originated there by Soviet leader Konstantin Chernenko. The posting was actually forged by Piet Beertema as an April Fool's joke. Other fictitious sites mentioned in the hoax were moskvax and kgbvax. This was probably the funniest of the many April Fool's forgeries perpetrated on Usenet (which has negligible security against them), because the notion that Usenet might ever penetrate the Iron Curtain seemed so totally absurd at the time. In fact, it was only six years later that the first genuine site in Moscow, demos.su , joined Usenet. Some readers needed convincing that the postings from it weren't just another prank. Vadim Antonov, senior programmer at Demos and the major poster from there up to mid-1991, was quite aware of all this, referred to it frequently in his own postings, and at one point twitted some credulous readers by blandly asserting that he was a hoax! Eventually he even arranged to have the domain's gateway site named kremvax , thus neatly turning fiction into fact and demonstrating that the hackish sense of humor transcends cultural barriers. [Mr. Antonov also contributed the Russian-language material for this lexicon. ESR] In an even more ironic historical footnote, kremvax became an electronic center of the anti-communist resistance during the bungled hard-line coup of August 1991. During those three days the Soviet UUCP network centered on kremvax became the only trustworthy news source for many places within the USSR. Though the sysops were concentrating on internal communications, cross-border postings included immediate transliterations of Boris Yeltsin's decrees condemning the coup and eyewitness reports of the demonstrations in Moscow's streets. In those hours, years of speculation that totalitarianism would prove unable to maintain its grip on politically-loaded information in the age of computer networking were proved devastatingly accurate and the original kremvax joke became a reality as Yeltsin and the new Russian revolutionaries of glasnost and perestroika made kremvax one of the timeliest means of their outreach to the West. + /kremvaks/ , n. [from the then-large number of Usenet VAXen with names of the form foovax ] Originally, a fictitious Usenet site at the Kremlin, announced on April 1, 1984 in a posting ostensibly originated there by Soviet leader Konstantin Chernenko. The posting was actually forged by Piet Beertema as an April Fool's joke.

kudos patching

@@ -8119,7 +8111,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

retcon

1. n. The common situation in pulp fiction (esp. comics or soap operas) where a new story reveals things about events in previous stories, usually leaving the facts the same (thus preserving continuity) while completely changing their interpretation. For example, revealing that a whole season of Dallas was a dream was a retcon.

-

2. vt. To write such a story about a character or fictitious object. Byrne has retconned Superman's cape so that it is no longer unbreakable. Marvelman's old adventures were retconned into synthetic dreams. Swamp Thing was retconned from a transformed person into a sentient vegetable. [This term is included because it is a good example of hackish linguistic innovation in a field completely unrelated to computers. The word retcon will probably spread through comics fandom and lose its association with hackerdom within a couple of years; for the record, it started here. ESR] [1993 update: some comics fans on the net now claim that retcon was independently in use in comics fandom before rec.arts.comics , and have citations from around 1981. In lexicography, nothing is ever simple.

+

2. vt. To write such a story about a character or fictitious object. Byrne has retconned Superman's cape so that it is no longer unbreakable. Marvelman's old adventures were retconned into synthetic dreams. Swamp Thing was retconned from a transformed person into a sentient vegetable.

retrocomputing

/ret'rohk@mpyooting/ , n. Refers to emulations of way-behind-the-state-of-the-art hardware or software, or implementations of never-was-state-of-the-art; esp. if such implementations are elaborate practical jokes and/or parodies, written mostly for hack value , of more serious designs. Perhaps the most widely distributed retrocomputing utility was the pnch (6) or bcd (6) program on V7 and other early Unix versions, which would accept up to 80 characters of text argument and display the corresponding pattern in punched card code. Other well-known retrocomputing hacks have included the programming language INTERCAL , a JCL -emulating shell for Unix, the card-punch-emulating editor named 029, and various elaborate PDP-11 hardware emulators and RT-11 OS emulators written just to keep an old, sourceless Zork binary running. A tasty selection of retrocomputing programs are made available at the Retrocomputing Museum, http://www.catb.org/retro/. @@ -8225,10 +8217,6 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

adj. Reserved for the exclusive use of something (an extension of the standard meaning). Often means that anyone may look at the sacred object, but clobbering it will screw whatever it is sacred to. The comment Register 7 is sacred to the interrupt handler appearing in a program would be interpreted by a hacker to mean that if any other part of the program changes the contents of register 7, dire consequences are likely to ensue.

-

saga

-

- n. [WPI] A cuspy but bogus raving story about N random broken people. Here is a classic example of the saga form, as told by Guy L. Steele: Jon L. White (login name JONL) and I (GLS) were office mates at MIT for many years. One April, we both flew from Boston to California for a week on research business, to consult face-to-face with some people at Stanford, particularly our mutual friend Richard P. Gabriel (RPG). RPG picked us up at the San Francisco airport and drove us back to Palo Alto (going logical south on route 101, parallel to El Camino Bignum ). Palo Alto is adjacent to Stanford University and about 40 miles south of San Francisco. We ate at The Good Earth, a health food restaurant, very popular, the sort whose milkshakes all contain honey and protein powder. JONL ordered such a shake the waitress claimed the flavor of the day was lalaberry. I still have no idea what that might be, but it became a running joke. It was the color of raspberry, and JONL said it tasted rather bitter. I ate a better tostada there than I have ever had in a Mexican restaurant. After this we went to the local Uncle Gaylord's Old Fashioned Ice Cream Parlor. They make ice cream fresh daily, in a variety of intriguing flavors. It's a chain, and they have a slogan: If you don't live near an Uncle Gaylord's MOVE! Also, Uncle Gaylord (a real person) wages a constant battle to force big-name ice cream makers to print their ingredients on the package (like air and plastic and other non-natural garbage). JONL and I had first discovered Uncle Gaylord's the previous August, when we had flown to a computer-science conference in Berkeley, California, the first time either of us had been on the West Coast. When not in the conference sessions, we had spent our time wandering the length of Telegraph Avenue, which (like Harvard Square in Cambridge) was lined with picturesque street vendors and interesting little shops. On that street we discovered Uncle Gaylord's Berkeley store. The ice cream there was very good. During that August visit JONL went absolutely bananas (so to speak) over one particular flavor, ginger honey. Therefore, after eating at The Good Earth indeed, after every lunch and dinner and before bed during our April visit a trip to Uncle Gaylord's (the one in Palo Alto) was mandatory. We had arrived on a Wednesday, and by Thursday evening we had been there at least four times. Each time, JONL would get ginger honey ice cream, and proclaim to all bystanders that Ginger was the spice that drove the Europeans mad! That's why they sought a route to the East! They used it to preserve their otherwise off-taste meat. After the third or fourth repetition RPG and I were getting a little tired of this spiel, and began to paraphrase him: Wow! Ginger! The spice that makes rotten meat taste good! Say! Why don't we find some dog that's been run over and sat in the sun for a week and put some ginger on it for dinner?! Right! With a lalaberry shake! And so on. This failed to faze JONL; he took it in good humor, as long as we kept returning to Uncle Gaylord's. He loves ginger honey ice cream. Now RPG and his then-wife KBT (Kathy Tracy) were putting us up (putting up with us?) in their home for our visit, so to thank them JONL and I took them out to a nice French restaurant of their choosing. I unadventurously chose the filet mignon, and KBT had je ne sais quoi du jour , but RPG and JONL had lapin (rabbit). (Waitress: Oui , we have fresh rabbit, fresh today. RPG: Well, JONL, I guess we won't need any ginger ! ) We finished the meal late, about 11PM, which is 2AM Boston time, so JONL and I were rather droopy. But it wasn't yet midnight. Off to Uncle Gaylord's! Now the French restaurant was in Redwood City, north of Palo Alto. In leaving Redwood City, we somehow got onto route 101 going north instead of south. JONL and I wouldn't have known the difference had RPG not mentioned it. We still knew very little of the local geography. I did figure out, however, that we were headed in the direction of Berkeley, and half-jokingly suggested that we continue north and go to Uncle Gaylord's in Berkeley. RPG said Fine! and we drove on for a while and talked. I was drowsy, and JONL actually dropped off to sleep for 5 minutes. When he awoke, RPG said, Gee, JONL, you must have slept all the way over the bridge! , referring to the one spanning San Francisco Bay. Just then we came to a sign that said University Avenue. I mumbled something about working our way over to Telegraph Avenue; RPG said Right! and maneuvered some more. Eventually we pulled up in front of an Uncle Gaylord's. Now, I hadn't really been paying attention because I was so sleepy, and I didn't really understand what was happening until RPG let me in on it a few moments later, but I was just alert enough to notice that we had somehow come to the Palo Alto Uncle Gaylord's after all. JONL noticed the resemblance to the Palo Alto store, but hadn't caught on. (The place is lit with red and yellow lights at night, and looks much different from the way it does in daylight.) He said, This isn't the Uncle Gaylord's I went to in Berkeley! It looked like a barn! But this place looks just like the one back in Palo Alto! RPG deadpanned, Well, this is the one I always come to when I'm in Berkeley. They've got two in San Francisco, too. Remember, they're a chain. JONL accepted this bit of wisdom. And he was not totally ignorant he knew perfectly well that University Avenue was in Berkeley, not far from Telegraph Avenue. What he didn't know was that there is a completely different University Avenue in Palo Alto. JONL went up to the counter and asked for ginger honey. The guy at the counter asked whether JONL would like to taste it first, evidently their standard procedure with that flavor, as not too many people like it. JONL said, I'm sure I like it. Just give me a cone. The guy behind the counter insisted that JONL try just a taste first. Some people think it tastes like soap. JONL insisted, Look, I love ginger. I eat Chinese food. I eat raw ginger roots. I already went through this hassle with the guy back in Palo Alto. I know I like that flavor! At the words back in Palo Alto the guy behind the counter got a very strange look on his face, but said nothing. KBT caught his eye and winked. Through my stupor I still hadn't quite grasped what was going on, and thought RPG was rolling on the floor laughing and clutching his stomach just because JONL had launched into his spiel ( makes rotten meat a dish for princes ) for the forty-third time. At this point, RPG clued me in fully. RPG, KBT, and I retreated to a table, trying to stifle our chuckles. JONL remained at the counter, talking about ice cream with the guy b.t.c., comparing Uncle Gaylord's to other ice cream shops and generally having a good old time. At length the g.b.t.c.: said, How's the ginger honey? JONL said, Fine! I wonder what exactly is in it? Now Uncle Gaylord publishes all his recipes and even teaches classes on how to make his ice cream at home. So the g.b.t.c.: got out the recipe, and he and JONL pored over it for a while. But the g.b.t.c.: could contain his curiosity no longer, and asked again, You really like that stuff, huh? JONL said, Yeah, I've been eating it constantly back in Palo Alto for the past two days. In fact, I think this batch is about as good as the cones I got back in Palo Alto! G.b.t.c.: looked him straight in the eye and said, You're in Palo Alto! JONL turned slowly around, and saw the three of us collapse in a fit of giggles. He clapped a hand to his forehead and exclaimed, I've been hacked! [My spies on the West Coast inform me that there is a close relative of the raspberry found out there called an ollalieberry ESR] [Ironic footnote: the meme about ginger vs. rotting meat is an urban legend. It's not borne out by an examination of medieval recipes or period purchase records for spices, and appears full-blown in the works of Samuel Pegge, a gourmand and notorious flake case who originated numerous food myths. The truth seems to be that ginger was used to cover not rot but the extreme salt taste of meat packed in brine, which was the best method available before refrigeration. -

sagan

/saygn/ , n. [from Carl Sagan's TV series Cosmos ; think billions and billions ] A large quantity of anything. There's a sagan different ways to tweak EMACS. The U.S. Government spends sagans on bombs and welfare hard to say which is more destructive. @@ -8664,7 +8652,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

4. Syn. for slurp. This program starts by snarfing the entire database into core, then....

-

5. [GEnie] To spray food or programming fluids due to laughing at the wrong moment. I was drinking coffee, and when I read your post I snarfed all over my desk. If I keep reading this topic, I think I'll have to snarf-proof my computer with a keyboard condom. [This sense appears to be widespread among mundane teenagers ESR] The sound of snarfing is splork!.

+

5. [GEnie] To spray food or programming fluids due to laughing at the wrong moment. I was drinking coffee, and when I read your post I snarfed all over my desk. If I keep reading this topic, I think I'll have to snarf-proof my computer with a keyboard condom. The sound of snarfing is splork!.

snarf down

v. To snarf , with the connotation of absorbing, processing, or understanding. I'll snarf down the latest version of the nethack user's guide it's been a while since I played last and I don't know what's changed recently. @@ -9772,6 +9760,10 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

n. obs. An electronic service offering people the privilege of paying to read the weather on their television screens instead of having somebody read it to them for free while they brush their teeth. The idea bombed everywhere it wasn't government-subsidized, because by the time videotex was practical the installed base of personal computers could hook up to timesharing services and do the things for which videotex might have been worthwhile better and cheaper. Videotex planners badly overestimated both the appeal of getting information from a computer and the cost of local intelligence at the user's end. Like the gorilla arm effect, this has been a cautionary tale to hackers ever since. See also vannevar.

+

viral

+

+ Also see faradize. The use of a particular system is said to have "gone viral" if a large number of people begin using it within a short space of time. The term most likely originates from the Dawkins idea of a meme as a "mind virus" able to spread at an exponential rate. +

virgin

adj. Unused; pristine; in a known initial state. Let's bring up a virgin system and see if it crashes again. (Esp.: useful after contracting a virus through SEX. ) Also, by extension, buffers and the like within a program that have not yet been used. @@ -10299,7 +10291,7 @@ This file last generated Monday, 15 October 2018 12:29PM UTC

zorch

1. [TMRC] v. To attack with an inverse heat sink.

-

2. [TMRC] v. To travel, with v approaching c [that is, with velocity approaching lightspeed ESR].

+

2. [TMRC] v. To travel, with velocity approaching light speed.

3. [MIT] v. To propel something very quickly. The new comm software is very fast; it really zorches files through the network.

diff --git a/entries/Eric Conspiracy.txt b/entries/Eric Conspiracy.txt index 0e2dd64..6956553 100644 --- a/entries/Eric Conspiracy.txt +++ b/entries/Eric Conspiracy.txt @@ -7,8 +7,4 @@ There do indeed seem to be considerably more mustachioed Erics in hackerdom than the frequency of these three traits can account for unless they are correlated in some arcane way. Well-known examples include Eric Allman (he of the Allman style described under indent style ) and Erik Fair (co-author -of NNTP); your editor has heard from more than a hundred others by email, -and the organization line Eric Conspiracy Secret Laboratories now emanates -regularly from more than one site. See the Eric Conspiracy Web Page at -http://www.catb.org/~esr/ecsl/ for full details. - +of NNTP).