[misc.misc] The Jargon File v, part 1 of 17

eric@snark.thyrsus.com (Eric S. Raymond) (03/03/91)

Submitted-by: jargon@thyrsus.com
Archive-name: jargon/part01

---- Cut Here and feed the following to sh ----
#!/bin/sh
# This is jargon, a shell archive (produced by shar 3.49)
# To extract the files from this archive, save it to a file, remove
# everything above the "!/bin/sh" line above, and type "sh file_name".
#
# made 03/02/1991 17:29 UTC by jargon@thyrsus.com
# Source directory /usr2/eric/jargon
#
# existing files will NOT be overwritten unless -c is specified
#
# This is part 1 of a multipart archive                                    
# do not concatenate these parts, unpack them in order with /bin/sh        
#
# This shar contains:
# length  mode       name
# ------ ---------- ------------------------------------------
# 831872 -rw-r--r-- jargon.ascii
#
if test -r _shar_seq_.tmp; then
	echo 'Must unpack archives in sequence!'
	echo Please unpack part `cat _shar_seq_.tmp` next
	exit 1
fi
# ============= jargon.ascii ==============
if test -f 'jargon.ascii' -a X"$1" != X"-c"; then
	echo 'x - skipping jargon.ascii (File already exists)'
	rm -f _shar_wnt_.tmp
else
> _shar_wnt_.tmp
sed 's/^X//' << 'SHAR_EOF' > 'jargon.ascii' &&
X============ THIS IS THE JARGON FILE, VERSION 2.7.1, 1 MAR 1991  ============
X
XIntroduction
X************
X
XThis document is a collection of slang terms used by various
Xsubcultures of computer hackers.  Though some technical material is
Xincluded for background and flavor, it is not a technical dictionary;
Xwhat we describe here is the language hackers use among themselves for
Xfun, social communication, and technical debate within their communities.
X
XThe `hacker culture' is actually a loosely networked collection of
Xsubcultures that is nevertheless conscious of some important shared
Xexperiences, shared roots, and shared values.  It has its own myths,
Xheroes, villains, folk epics, in-jokes, taboos, and dreams.  Because
Xhackers as a group are particularly creative people who define
Xthemselves partly by rejection of `normal' values and working habits,
Xit has unusually rich and conscious traditions for an intentional
Xculture less than thirty-five years old.
X
XAs usual with slang, the special vocabulary of hackers helps hold
Xtheir culture together --- it helps hackers recognize each other's
Xplaces in the community and expresses shared values and experiences.
XAlso as usual, *not* knowing the slang (or using it
Xinappropriately) defines one as an outsider, a mundane, or (worst of
Xall in hackish vocabulary) possibly even a *suit*.  All human
Xcultures use slang in this threefold way --- as a tool of
Xcommunication, and of inclusion, and of exclusion.
X
XAmong hackers, though, slang has a subtler aspect paralleled perhaps
Xin the slang of jazz musicians and some kinds of fine artists but hard
Xto detect in most technical or scientific cultures; parts of it are
Xcode for shared states of *consciousness*.  There is a whole range
Xof altered states and problem-solving mental stances basic to
Xhigh-level hacking which don't fit into conventional linguistic
Xreality any better than a Coltrane solo or one of Maurits Escher's
Xtrick-the-eye paintings (Escher is a favorite of hackers), and hacker
Xslang encodes these subtleties in many unobvious ways.  Take the
Xdistinction between a {kluge} and an {elegant} solution, and the
Xdiffering connotations attached to each, as a simple example.  The
Xdistinction is not only of engineering significance; it reaches right
Xback into the nature of the generative processes in program design and
Xasserts something important about two different kinds of relationship
Xbetween the hacker and the hack.  Hacker slang is unusually rich in
Ximplications of this kind, of overtones and undertones that illuminate
Xthe hackish psyche.
X
XBut there is more.  Hackers, as a rule, love word-play and are very
Xconscious and inventive in their use of language.  These traits are
Xcommon in children, but the conformity-enforcing machine we are
Xpleased to call an educational system bludgeons them out of most of us
Xbefore adolescence.  Thus, linguistic invention in most subcultures of
Xours is a halting and largely unconscious process.  Hackers, by
Xcontrast, regard slang formation and use as a game to be played for
Xconscious pleasure.  Their inventions thus display an almost unique
Xcombination of the neotenous enjoyment of language-play with the
Xdiscrimination of educated and powerful intelligence.  Further, the
Xelectronic media which knit them together are fluid, `hot'
Xconnections, well adapted to both the dissemination of new slang and
Xthe ruthless culling of weak and superannuated specimens.  The results
Xof this process give us perhaps a uniquely intense ans accelerated
Xview of linguistic evolution in action.
X
XThe intensity and consciousness of hackish invention makes a
Xcompilation of hacker slang a particularly effective window into the
Xsurrounding culture --- and, in fact, this one is the latest version
Xof an evolving compilation called the `Jargon File' maintained by
Xhackers themselves for over fifteen years.  This one (like its
Xancestors) is primarily a lexicon, but also includes `topic entries'
Xwhich collect background or sidelight information on hacker culture
Xthat would be awkward to try to subsume under individual entries.
X
XThough the format is that of a reference, it is also intended that the
Xmaterial be enjoyable to browse or read straight through.  Even a
Xcomplete outsider should find at least a chuckle on nearly every page,
Xand much that is amusingly thought-provoking.  But it is also true
Xthat hackers use humorous word-play to make strong, sometime combative
Xstatements about what they feel.  Some of these entries reflect the
Xviews of opposing sides in disputes that have been genuinely
Xpassionate; this is deliberate.  We have not tried to moderate or
Xpretty up these disputes; rather we have attempted to ensure that
X*everyone's* sacred cows get gored, impartially.  Compromise is
Xnot particularly a hackish virtue, but the honest presentation of
Xdivergent viewpoints is.
X
XThe reader with minimal computer background who finds some references
Xincomprehensibly technical can safely ignore them.  We have not felt
Xit either necessary or desirable to eliminate all such; they, too,
Xcontribute flavor, and one of this document's major intended audiences
X(fledgling hackers already partway inside the culture) will benefit
Xfrom them.
X
XA selection of longer items of hacker folklore and humor are included
Xin Appendix A.  The `outside' reader's attention is particularly
Xdirected to Appendix B, the Portrait of J. Random Hacker.  Appendix C
Xis a bibliography of non-technical works which have either influenced
Xor described the hacker culture.
X
XBecause hackerdom is an intentional culture (one each individual must
Xchoose by action to join), one should not be surprised that the line
Xbetween description and influence can become more than a little
Xblurred.  Earlier Jargon File versions have played a central role in
Xspreading hacker language and the culture that goes with it to
Xsuccessively larger populations, and we hope and expect that this one
Xwill do likewise.
X
XOf Slang, Jargon, and Techspeak
X===============================
X
XLinguists usually refer to informal language as `slang' and reserve
Xthe term `jargon' for the technical vocabularies of various
Xoccupations.  However, the ancestor of this collection was called the
X`Jargon File' and hackish slang is traditionally `the jargon'.  When
Xtalking about the jargon there is therefore no convenient way to
Xdistinguish what a *linguist* would call hackers' jargon --- the
Xformal vocabulary they learn from textbooks, technical papers, and
Xmanuals.
X
XTo make a confused situation worse, the line between hackish slang and
Xtechnical programming and computer science vocabulary is fuzzy, and
Xshifts over time.  Further, this technical vocabulary is shared with a
Xwider technical culture of programmers, many of whom are not hackers
Xand do not speak or recognize hackish slang.
X
XAccordingly, this lexicon will try to be as precise as the facts of
Xusage permit about the distinctions between three categories:
X
X   * `slang': informal language from mainstream English or non-techical
X     subcultures (bikers, rock fans, surfers, etc.).
X   * `jargon': without qualifier, denotes informal `slangy' language
X     peculiar to hackers --- the subject of this lexicon.
X   * `techspeak': the formal technical vocabulary of programming,
X     computer science, electronics, and other fields connected to hacking.
X
XThis terminology will be consistently used throughout the remainder of
Xthis lexicon.
X
XThe jargon/techspeak distinction is the delicate one.  A lot of
Xtechspeak originated as jargon, and there is a steady continuing
Xuptake of jargon into techspeak.  On the other hand, a lot of jargon
Xarises from overgeneralization of techspeak terms (there is more about
Xthis in the `Jargon Construction' section below).
X
XIn general, we have considered techspeak any term which communicates
Xprimarily by a denotation well established in textbooks, technical
Xdictionaries, or standards documents.
X
XA few obviously techspeak terms (names of operating systems, languages
Xor documents) are listed when they are tied to hacker folklore that
Xisn't covered in formal sources, or sometimes to convey critical
Xhistorical background necessary to understand other entries to which
Xthey are cross-referenced.  Some other techspeak senses of jargon
Xwords have been listed in order to make the jargon senses clear; where
Xthe text does not specify that a straight technical sense is under
Xdiscussion, these are marked with `[techspeak]' as an etymology.  Many
Xentries have a sense #1 marked this way, with subsequent jargon
Xmeanings explained in terms of it.
X
XRevision History
X================
X
XThe original Jargon File was a collection of hacker jargon from
Xtechnical cultures including the MIT AI Lab, the Stanford AI lab
X(SAIL), the old ARPANET AI/LISP/PDP-10 communities, Bolt Beranek and
XNewman (BBN), Carnegie-Mellon University (CMU), and Worcester
XPolytechnic Institute (WPI).
X
XThe Jargon File (hereafter referred to as `jargon-1' or `the File')
Xwas begun by Raphael Finkel at Stanford in 1975, though some terms in
Xit date back considerably earlier ({frob} and some senses of
X{moby}, for instance, go back to the Tech Model Railroad Club and
XMIT and are believed to date at least back to the early 1960s).  The
Xrevisions of jargon-1 were all unnumbered and may be collectively
Xconsidered `Version 1'.
X
XIn 1976, Mark Crispin brought the File to MIT; he and Guy Steele then
Xadded a first wave of new entries.  Raphael Finkel dropped out of
Xactive participation shortly thereafter, and Don Woods became the SAIL
Xcontact for the File (which was subsequently kept in duplicate at SAIL
Xand MIT, with periodic re-synchronizations).
X
XThe File expanded by fits and starts until about 1983; Richard
XStallman was prominent among the contributors, adding many MIT and
XITS-related coinages.
X
XA late version of jargon-1, expanded with commentary for the mass
Xmarket, was edited by Guy L. Steele into a book published in 1983 as
X`The Hacker's Dictionary' (Harper & Row CN 1082, ISBN
X0-06-091082-8).  The other jargon-1 editors (Raphael Finkel, Don
XWoods, and Mark Crispin) contributed to the revision, as did Richard
XM. Stallman and Geoff Goodfellow.  This book is hereafter referred to
Xas `Steele-1983'.  It is now out of print.
X
XShortly after the publication of Steele-1983, the File effectively
Xstopped growing and changing.  The PDP-10-centered cultures that had
Xoriginally nourished it were dealt a serious blow by the cancellation
Xof the Jupiter project at DEC; at the same time, the commercialization
Xof AI technology lured some of their best and brightest away to
Xstartups along the Route 128 strip in Massachusetts and in Silicon
XValley.  The AI-Lab culture died and its members dispersed; the File's
Xcompilers moved on to other things.
X
XBy the mid-1980s the File's content was dated, but the legend that had
Xgrown up around it never quite died out.  The book, and softcopies
Xobtained off the ARPANET, circulated even in cultures far removed from
XMIT's and Stanford's; the content exerted a strong and continuing
Xinfluence on hackish language and humor.  Even as the advent of the
Xmicrocomputer and other trends fueled a tremendous expansion of
Xhackerdom, the File (and related materials like the AI Koans in
XAppendix A) came to be seen as a sort of sacred epic, a hacker-culture
XMatter of Britain chronicling the heroic exploits of the Knights of
Xthe Lab.  The pace of change in hackerdom at large accelerated
Xtremendously, but the Jargon File passed from living document to icon
Xand remained essentially untouched for seven years.
X
XThis revision contains nearly the entire text of a late version of
Xjargon-1 (a few obsolete PDP-10-related entries have been dropped
Xfollowing careful consultation with the editors of Steele-1983).  It
Xmerges in about about 80% of the Steele-1983 text, omitting some
Xframing material and a very few entries introduced in Steele-1983
Xwhich are now also obsolete.
X
XThis new version casts a wider net than the old jargon file; its aim
Xis to cover not just AI but all the technical computing cultures
Xwherein the true hacker-nature is manifested.  More than half of the
Xentries now derive from USENET and represent jargon now current in the
XC and UNIX communities, but special efforts have been made to collect
Xjargon from other cultures including IBM-PC programmers, Mac
Xenthusiasts, and even the IBM mainframe world.
X
XWhere a term can be attributed to a particular subculture or is known
Xto have originated there, we have tried to so indicate.  Here is a
Xlist of abbreviations used in etymologies:
X
XBerkeley
X     University of California at Berkeley
XCambridge
X     The university in England (*not* the city in Massachusetts where
X     MIT happens to be located!)
XBBN
X     Bolt, Beranek & Newman
XCMU
X     Carnegie-Mellon University
XCommodore
X     Commodore Business Machines
XFidonet
X     See the {Fidonet} entry.
XIBM
X     International Business Machines
XMIT
X     Massachusetts Institute of Technology; esp. the legendary MIT AI Lab
X     culture of roughly 1971 to 1983.  Some MITisms go back as far as the
X     Tech Model Railroad Club (TMRC) at MIT c.1960.
XNYU
X     New York University
XPurdue
X     Purdue University
XSAIL
X     Stanford Artificial Intelligence Laboratory
XStanford
X     Stanford University
XSun
X     Sun Microsystems
XUCLA
X     University of California at Los Angeles
XUSENET
X     See the {USENET} entry.
XWPI
X     Worcester Polytechnic Institute, site of a very active community of
X     PDP-10 hackers during the Seventies.
XXerox PARC
X     Xerox's Palo Alto Research Center, site of much pioneering research in
X     user interface design and networking.
XYale
X     Yale University
X
XSome other etymology abbreviations such as {UNIX}, {PDP-10}, etc.
Xrefer to technical cultures surrounding specific operating systems,
Xprocessors, or other environments.  Note: the fact that a term is
Xlabelled with any of these abbreviations does not necessarily mean its
Xuse is confined to that culture.  In particular, many terms labelled
X`MIT' and `Stanford' are in quite general use.  We have tried to give
Xsome indication of speaker distribution in the usage notes.
X
XEric S. Raymond (eric@snark.thyrsus.com) maintains the new File with
Xassistance from Guy L. Steele (gls@think.com); these are the persons
Xprimarily reflected in the File's editorial `we', though we take
Xpleasure in acknowledging the special contribution of the other
Xcoauthors of Steele-1983.  Please email all additions, corrections and
Xcorrespondence relating to the jargon file to jargon@thyrsus.com
X(UUCP-only sites without connections to an autorouting smart site can
Xuse ...!uunet!snark!jargon).
X
X(Warning: other email addresses appear in this file *but are not
Xguaranteed to be correct* later than the revision date on the first
Xline.  *Don't* email us if an attempt to reach your idol bounces
X--- we have no magic way of checking addresses or looking up people)
X
XSome snapshot of this on-line version will become the main text of a
X`New Hacker's Dictionary', to be published by MIT Press possibly as
Xearly as Summer 1991.  The maintainers are committed to updating the
Xon-line version of the jargon file through and beyond paper
Xpublication, and will continue to make it available to archives and
Xpublic-access sites as a trust of the hacker community.
X
XHere is a chronology of the recent on-line revisions:
X
XVersion 2.1.1, Jun 12 1990: the jargon file comes alive again after a
Xseven-year hiatus.  Reorganization and massive additions were by Eric
XS. Raymond, approved by Guy Steele.  Many items of UNIX, C, USENET, and
Xmicrocomputer-based jargon were added at that time (as well as The
XUntimely Demise of Mabel The Monkey).  Some obsolete usages (mostly
XPDP-10 derived) were moved to Appendix B.
X
XVersion 2.1.5, Nov 28 1990: changes and additions by ESR in response to
Xnumerous USENET submissions and comment from the First Edition co-authors.
XThe bibliography (Appendix C) was also appended.  
X
XVersion 2.2.1, Dec 15 1990: most of the contents of the 1983 paper
Xedition edited by Guy Steele was merged in.  Many more USENET
Xsubmissions added, including the International Style and the material
Xon Commonwealth Hackish.  This version had 9394 lines, 75954 words,
X490501 characters, and 1046 entries.
X
XVersion 2.3.1, Jan 03 1991: the great format change --- case is no
Xlonger smashed in lexicon keys and cross-references.  A very few
Xentries from jargon-1 which were basically straight tech-speak were
Xdeleted; this enabled the rest of Appendix B to be merged back into
Xmain text and the appendix replaced with the Portrait of J. Random
XHacker.  More USENET submissions were added.  This version had 10728
Xlines, 85070 words, 558261 characters, and 1138 entries.
X
XVersion 2.4.1, Jan 14 1991: the Story of Mel and many more USENET
Xsubmissions merged in.  More material on hackish writing habits added.
XNumerous typo fixes.  This version had 12362 lines, 97819 words,
X642899 characters, and 1239 entries.
X
XVersion 2.5.1, Jan 29 1991: many new entries merged in.  Discussion of
Xinclusion styles added.  This version had 14145 lines, 111904 words,
X734285 characters, and 1425 entries.
X
XVersion 2.6.1, Feb 13 1991: second great format change; no more <>
Xaround headwords or references.  Merged in results of serious
Xcopy-editing passes by Guy Steele, Mark Brader.  Still more entries
Xadded.  This version had 15011 lines, 118277 words, 774942 characters,
Xand 1485 entries.
X
XVersion 2.7.1, Mar 1 1991: new section on slang/jargon/techspeak
Xadded.  Results of Guy's 2nd edit pass merged in.  This version had
X16087 lines, 126885 words, 831872 characters, and 1533 entries.
X
XVersion numbering: Read versions as major.minor.revision.
XMajor version 1 is reserved for the `old' (ITS) Jargon File, jargon-1.
XMajor version 2 encompasses revisions by ESR (Eric S. Raymond) with
Xassistance from GLS (Guy Steele).  Someday, the next maintainer will
Xtake over and spawn `version 3'.  Usually later versions will either
Xcompletely supersede or incorporate earlier versions, so there is
Xgenerally no point in keeping old versions around.
X
XOur thanks to the other co-authors of Steele-1983 for oversight and
Xassistance; also to all the USENETters who contributed entries and
Xencouragement.  Special thanks go to our Scandinavian correspondent
XPer Lindberg (per@front.se), author of the remarkable Swedish
Xlanguage 'zine `Hackerbladet', for bringing FOO! comics to our
Xattention and smuggling one of the IBM hacker underground's own baby
Xjargon files out to us.  Also, much gratitude to ace hacker/linguist
XJoe Keane (jkg@osc.osc.com) for helping us improve the pronunciation
Xguides; and to Maarten Litmaath for generously allowing the inclusion
Xof the ASCII pronunciation guide he formerly maintained.  Finally,
XMark Brader (msb@sq.com) submitted many thoughtful comments and did
Xyeoman service in catching typos and minor usage bobbles, and Eric
XTiedemann (est@thyrsus.com) contributed sage advice on rhetoric,
Xamphigory, and philosophunculism.
X
XFormat For New Entries
X======================
X
XTry to conform to the format already being used --- head-words
Xseparated from text by a colon (double colon for topic entries),
Xcross-references in curly brackets (doubled for topic entries),
Xpronunciations in slashes, etymologies in square brackets,
Xsingle-space after definition numbers and word classes, etc.  Stick to
Xthe standard ASCII character set (no high-half characters or
X[nt]roff/TeX/Scribe escapes), as one of the versions generated from
Xthe master file is an info document that has to be viewable on a
Xcharacter tty.
X
XWe are looking to expand the file's range of technical specialties covered.
XThere are doubtless rich veins of jargon yet untapped in the scientific
Xcomputing, graphics, and networking hacker communities; also in numerical
Xanalysis, computer architectures and VLSI design, language design, and many
Xother related fields.  Send us your jargon!
X
XWe are *not* interested in straight technical terms explained by
Xtextbooks or technical dictionaries unless an entry illuminates
X`underground' meanings or aspects not covered by official histories.
XWe are also not interested in `joke' entries --- there is a lot of
Xhumor in the file but it must flow naturally out of the explanations
Xof what hackers do and how they think.
X
XIt is OK to submit items of jargon you have originated if they have spread
Xto the point of being used by people who are not personally acquainted with
Xyou.  We prefer items to be attested by independent submission from two
Xdifferent sites.
X
XA few new definitions attached to entries are marked [proposed].
XThese are usually generalizations suggested by editors or USENET
Xrespondents in the process of commenting on previous definitions of
Xthose entries.  These are *not* represented as established
Xjargon.
X
XThe jargon file will be regularly maintained and re-posted from now on and
Xwill include a version number.  Read it, pass it around, contribute --- this
Xis *your* monument!
X
XJargon Construction
X===================
X
XThere are some standard methods of jargonification which became
Xestablished quite early (i.e. before 1970), spreading from such
Xsources as the MIT Model Railroad Club, the PDP-1 SPACEWAR hackers,
Xand John McCarthy's original crew of LISPers.  These include:
X
XVerb doubling: A standard construction in English is to double a verb
Xand use it as an exclamation, such as "Bang, bang!" or "Quack,
Xquack!".  Most of these are names for noises.  Hackers also double
Xverbs as a concise, sometimes sarcastic comment on what the implied
Xsubject does.  Also, a doubled verb is often used to terminate a
Xconversation, in the process remarking on the current state of affairs
Xor what the speaker intends to do next.  Typical examples involve
X{win}, {lose}, {hack}, {flame}, {barf}, {chomp}:
X
X     "The disk heads just crashed."  "Lose, lose."
X     "Mostly he talked about his latest crock.  Flame, flame."
X     "Boy, what a bagbiter!  Chomp, chomp!"
X
XSome verb-doubled constructions have special meanings not immediately
Xobvious from the verb.  These have their own listings in the lexicon.
X
XSoundalike slang: Hackers will often make rhymes or puns in order to
Xconvert an ordinary word or phrase into something more interesting.
XIt is considered particularly {flavorful} if the phrase is bent so
Xas to include some other jargon word; thus the computer hobbyist
Xmagazine `Dr. Dobb's Journal' is almost always referred to among
Xhackers as `Dr. Frob's Journal' or simply `Dr. Frob's'.  Terms of
Xthis kind that have been in fairly wide use include names for
Xnewspapers:
X
X     Boston Herald American => Horrid (or Harried) American
X     Boston Globe => Boston Glob
X     Houston (or San Francisco) Chronicle => the Crocknicle
X     New York Times => New York Slime
X
XHowever, terms like these are often made up on the spur of the moment.
XStandard examples include:
X
X     Prime Time => Slime Time
X     Data General => Dirty Genitals
X     IBM 360 => IBM Three-Sickly
X     Government Property -- Do Not Duplicate (seen on keys)
X             => Government Duplicity -- Do Not Propagate
X     for historical reasons => for hysterical raisins
X     Margaret Jacks Hall => Marginal Hacks Hall
X
XThis is not really similar to the Cockney rhyming slang it has been
Xcompared to in the past, because Cockney substitutions are opaque
Xwhereas hacker punning jargon is intentionally transparent. 
X
XThe -P convention: turning a word into a question by appending the
Xsyllable `P'; from the LISP convention of appending the letter `P'
Xto denote a predicate (a Boolean-valued function).  The question
Xshould expect a yes/no answer, though it needn't.  (See T and NIL.)
X
X     At dinnertime:
X            Q: "Foodp?"
X            A: "Yeah, I'm pretty hungry." or "T!"
X
X            Q: "State-of-the-world-P?"
X            A: (Straight) "I'm about to go home."
X            A: (Humorous) "Yes, the world has a state."
X
X     On the phone to Florida:
X            Q: "State-p Florida?"
X            A: "Been reading JARGON.TXT again, eh?"
X
X[One of the best of these is a {Gosperism} Once, when we were at a
XChinese restaurant, Bill Gosper wanted to know whether someone would
Xlike to share with him a two-person-sized bowl of soup.  His inquiry
Xwas: "Split-p soup?" ---GLS]
X
XOvergeneralization: A very conspicuous feature of jargon is the
Xfrequency with which techspeak items like names of program tools,
Xcommand language primitives, and even assembler opcodes are applied to
Xcontexts outside of computing wherever hackers find amusing analogies
Xto them.  Thus, (to cite one of the best-known examples) UNIX hackers
Xoften {grep} for things rather than searching for them.  Many of the
Xlexicon entries are generalizations of exactly this kind.
X
XHackers enjoy overgeneralization on the grammatical level as well.
XMany hackers love to take various words and add the wrong endings to
Xthem to make nouns and verbs, often by extending a standard rule to
Xnonuniform cases (or vice versa).  For example, because
X
X     porous => porosity
X     generous => generosity
X
Xhackers happily generalize:
X
X     mysterious => mysteriosity
X     ferrous => ferrosity
X     obvious => obviosity
X     dubious => dubiosity
X
XAlso, note that all nouns can be verbed.  E.g.: "All nouns can be
Xverbed", "I'll mouse it up", "Hang on while I clipboard it over",
X"I'm grepping the files".  English as a whole is already heading in
Xthis direction (towards pure-positional grammar like Chinese);
Xhackers are simply a bit ahead of the curve.
X
XSimilarly, all verbs can be nouned.  Thus:
X
X     win => winnitude, winnage
X     disgust => disgustitude
X     hack => hackification
X
XFinally, note the prevalence of certain kinds of nonstandard plural
Xforms.  Almost anything ending in `x' may form plurals in -xen (see
X{VAXen} and {boxen} in the main text).  Even words ending in
Xphonetic /k/ alone are sometimes treated this way; e.g. `soxen' for a
Xbunch of socks.  Other funny plurals are `frobbotzim' for the plural
Xof {frobboz} (see main text) and `Unices' and `Tenices' (rather than
X`Unixes' and `Tenexes'; see {UNIX}, {TENEX} in main text).  But
Xnote that `Unixen' and `Tenexen' are *never* used; it has been
Xsuggested that this is because `-ix' and `-ex' are Latin singular
Xendings that attract a Latinate plural.
X
XThe pattern here, as with other hackish grammatical quirks, is
Xgeneralization of an inflectional rule which (in English) is either
Xan import or a fossil (such as Hebrew plural in `-im', or the
XAnglo-Saxon plural in `en') to cases where it isn't normally
Xconsidered to apply.
X
XThis is not `poor grammar', as hackers are generally quite well
Xaware of what they are doing when they distort the language.  It is
Xgrammatical creativity, a form of playfulness.
X
XSpoken inarticulations: Words such as `mumble', `sigh', and
X`groan' are spoken in places where their referent might more
Xnaturally be used.  It has been suggested that this usage derives from
Xthe impossibility of representing such noises on a comm link or in
Xemail.  Another expression sometimes heard is "Complain!", meaning
X"I have a complaint!"
X
XOf the five listed constructions, verb doubling, peculiar noun
Xformations, and (especially!) spoken inarticulations have become quite
Xgeneral; but punning jargon is still largely confined to MIT and other
Xlarge universities, and the -P convention is found only where LISPers
Xflourish.
X
XFinally, note that many words in hacker jargon have to be
Xunderstood as members of sets of comparatives.  This is especially
Xtrue of the adjectives and nouns used to describe the beauty and
Xfunctional quality of code.  Here is an approximately correct
Xspectrum:
X
X     MONSTROSITY BRAIN-DAMAGE  SCREW  BUG  LOSE  MISFEATURE
X     CROCK  KLUGE  HACK  WIN  FEATURE  ELEGANCE PERFECTION
X
XThe last is spoken of as a mythical absolute, approximated but never
Xactually attained.  Coinages for describing {lossage} seem to call
Xforth the very finest in hackish linguistic inventiveness; it has been
Xtruly said that "{Computer geeks} have more words for equipment
Xfailures than Inuit have for snow", or than Yiddish has for obnoxious
Xpeople.
X
XHacker Speech Style
X===================
X
XThis features extremely precise diction, careful word choice, a
Xrelatively large working vocabulary, and relatively little use of
Xcontractions or `street slang'.  Dry humor, irony, puns, and a
Xmildly flippant attitude are highly valued --- but an underlying
Xseriousness and intelligence is essential.  One should use just
Xenough jargon to communicate precisely and identify oneself as `in
Xthe culture'; overuse of jargon or a breathless, excessively
Xgung-ho attitude are considered tacky and the mark of a loser.
X
XThis speech style is a variety of the precisionist English normally
Xspoken by scientists, design engineers, and academics in technical
Xfields.  Unlike the jargon construction methods, it is fairly constant
Xthroughout hackerdom.
X
XIt has been observed that many hackers are confused by negative
Xquestions --- or, at least, the people they're talking to are often
Xconfused by the sense of their answers.  The problem is that they've
Xdone so much coding that distinguishes between
X
X     if (going) {
X
Xand
X
X     if (!going) {
X
Xthat when they parse the question "Aren't you going?" it seems to be
Xasking the opposite question from "Are you going?", and so merits an
Xanswer in the opposite sense.  This confuses English-speaking
Xnon-hackers because they were taught to answer as though the negative
Xpart weren't there.  In some other languages (including Russian,
XChinese and Japanese) the hackish interpretation is standard and the
Xproblem wouldn't arise.  Hackers often find themselves wishing for a
Xword like French `si' or German `doch' with which one could
Xunambiguously answer `yes' to a negative question.
X
XFor similar reasons, English-speaking hackers almost never use a
Xdouble negative even if they live in a region where colloquial usage
Xallows it.  The thought of uttering something that logically ought to
Xbe an affirmative knowing it will be mis-parsed as a negative tends to
Xdisturb them. 
X
XHacker Writing Style
X====================
X
XHackers tend to use quotes as balanced delimiters like parentheses,
Xmuch to the dismay of American editors.  Thus, if "Jim is going" is
Xa phrase, and so is "Bill runs" and "Spock groks", then hackers
Xgenerally prefer to write: "Jim is going", "Bill runs", and
X"Spock groks".  This is incorrect according to standard American
Xusage (which would put the continuation commas and the final period
Xinside the string quotes) but it is counter-intuitive to hackers to
Xmutilate literal strings with characters that don't belong in them.
XGiven the sorts of examples that can come up in discussing
Xprogramming, American-style quoting can even be grossly misleading.
XWhen communicating command lines or small pieces of code, extra
Xcharacters can be a real pain in the neck.  For example:
X
X     First do "foo -acrZ tempo | bar -," then ...
X
Xis different from
X
X     First do "foo -acrZ tempo | bar -", then ...
X
Xfrom a computer's point of view.  While the first is correct according
Xto the stylebooks and would probably be parsed correctly by the a
Xhuman recipient, the second is unambiguous.  The Jargon File follows
Xhackish usage consistently throughout.
X
XInterestingly, a similar style is now preferred practice in Great
XBritain, though the older style (which became established for
Xtypographical reasons having to do with the aesthetics of comma and
Xquotes in typeset text) is still accepted there.  Hart's Rules and the
XOxford Dictionary for Writers and Editors call the hacker-like style
X`new' or `logical' style quoting.
X
XAnother hacker quirk about quoting style is a tendency to distinguish
Xbetween `scare' quotes and `speech' quotes; that is, to use
XBritish-style single quotes for marking and reserve American-style
Xdouble quotes for actual reports of speech or text included from
Xelsewhere.  Interestingly, some authorities describe this as correct
Xgeneral usage, but mainstream American English has gone to using
Xdouble-quotes thoroughly enough that hacker usage appears marked [and,
Xin fact, I thought this was a personal quirk of mine until I checked
Xwith USENET --- ESR].  One further permutation that is definitely
X*not* standard is a hackish tendency to do marking quotes by
Xusing apostrophes in pairs; that is, 'like this'.  This is modelled on
Xstring and character literal syntax in some programming languages
X(reinforced by the fact that many character-only terminals display a
Xvertical single quote).
X
XThere seems to be a meta-rule behind these nonstandard hackerisms to
Xthe effect that precision of expression is more important than
Xconformance to traditional rules; where the latter create ambiguity or
Xlose information they can be discarded without a second thought.  It
Xis notable in this respect that other hackish inventions (for example,
Xin vocabulary) also tend to carry very precise shades of meaning even
Xwhen constructed to appear slangy and loose.  In fact, to a hacker,
Xthe contrast between `loose' form and `tight' content in jargon is a
Xsubstantial part of its humor!
X
XThere is another respect in which hackish usage often parallels
XBritish usage; it tends to choose British spellings whenever these
Xseem more phonetically consistent than the American ones.
X
XHackers have also developed a number of punctuation and emphasis
Xconventions adapted to single-font all-ASCII communications links, and
Xthese are occasionally carried over into written documents even when
Xnormal means of font changes, underlining, and the like are available.
X
XOne of these is that TEXT IN ALL CAPS IS INTERPRETED AS `LOUD', and
Xthis becomes such an ingrained synesthetic reflex that a person who
Xgoes to caps-lock while in {talk mode} may be asked to "stop
Xshouting, please, you're hurting my ears!".
X
XAlso, it is common to use bracketing with asterisks to signify
Xemphasis, as in "What the *hell*?" (note that this interferes with
Xthe common use of asterisk suffix as a footnote mark).  An alternative
Xform uses paired slash and backslash: "What the \hell/?".  The
Xlatter is never used in text documents, as many formatters treat
Xbackslash as an escape and may do inappropriate things with the
Xfollowing text.  Also note that there is a semantic difference between
X*emphasis like this*, (which emphasizes the phrase as a whole) and
X*emphasis* *like* *this* (which suggests the writer speaking very
Xslowly and distinctly, as if to a very young child or mentally
Ximpaired person).
X
XIn a formula, `*' signifies multiplication but two asterisks in a
Xrow are a shorthand for exponentiation (this derives from FORTRAN).
XThus, one might write `2 ** 8 = 256'.
X
XAnother notation for exponentiation one sees more frequently uses the
Xcaret (^, ASCII 1011110); one might write instead `2 ^ 8 = 256'.
XThis goes all the way back to Algol-60, which used the archaic ASCII
X`up-arrow' that later became caret; this was picked up by Kemeny &
XKurtz's original BASIC, which in turn influenced the design of the
Xbc(1) and dc(1) UNIX tools that have probably done most to reinforce
Xthe convention on USENET.  The notation is mildly confusing to C
Xprogrammers, because `^' means logical {XOR} in C.  Despite
Xthis, it was favored 3:1 over ** in a late-1990 snapshot of USENET.
XIt is used consistently in this text.
X
XAnother on-line convention, used especially for very large or very small
Xnumbers, is taken from C (which derived it from FORTRAN).  This is a
Xform of `scientific notation' using `e' to replace `*10^'; for example,
Xone year is about 3e7 seconds long .
X
XThe tilde (`~') is commonly used in a quantifying sense of
X`approximately'; that is, `~50' means `about fifty'.
X
XUnderlining is often suggested by substituting underscores for spaces
Xand prepending and appending one underscore to the underlined phrase.
XExample: "It is often alleged that Haldeman wrote _The_Forever_War_
Xin response to Robert Heinlein's earlier _Starship_Troopers_."
XOccasionally this underline indication is used for emphasis, like the
Xpaired asterisks.
X
XThere is also an accepted convention for `writing under erasure'; the
Xtext
X
X     Be nice to this fool^H^H^H^Hgentleman, he's in from corporate HQ.
X
Xwould be read as "Be nice to this fool, I mean this gentleman...".
XThis comes from the fact that the digraph ^H is often used as a print
Xrepresentation for a backspace.  It parallels (and may have been
Xinfluenced by) the ironic use of `slashouts' in SF fanzines.
X
XOn USENET and in the {MUD} world, common C boolean, logical, and
Xrelational operators such as (`|', `&', `!', `==', `!=', `>', and `<')
Xare often combined with English.  The Pascal not-equals, `<>', is also
Xrecognized.  The use of prefix `!' as a loose synonym for `not-' or
X`no-' is particularly common; thus, `!clue' is read `no-clue' or
X`clueless'.
X
XAnother habit is that of using angle-bracket enclosure to genericize a
Xterm; this derives from conventions used in {BNF}.  Uses like the
Xfollowing are common:
X
X     So this <ethnic> walks into a bar one day, and...
X
XOne quirk that shows up frequently in the {email} style of UNIX
Xhackers in particular is a tendency for some things which are normally
Xall-lowercase (including usernames and the names of commands and C
Xroutines) to remain uncapitalized even when they occur at the
Xbeginning of sentences.  It is clear that, for many hackers, the case
Xof such identifiers becomes a part of their internal representation
X(the `spelling') and cannot be overridden without mental effort (an
Xappropriate reflex because UNIX and C both distinguish cases and
Xconfusing them can lead to lossage).  A way of escaping this dilemma
Xis simply to avoid using these constructions at the beginning of
Xsentences.
X
XHackers also mix letters and numbers more freely than in mainstream
Xusage.  In particular, it is good hackish style to write a digit
Xsequence where you intend the reader to understand the text string
Xthat names that number in English.  So, hackers write "1970s" rather
Xthan "nineteen-seventies" or "1970's" (the later looks like a
Xpossessive).
X
XFinally, it should be noted that hackers exhibit much less reluctance
Xto use multiply nested parentheses than is normal in English.  Partly
Xthis is almost certainly due to influence from LISP ((which uses
Xdeeply nested parentheses (like this) in its syntax) (a lot (see?))),
Xbut it has also been suggested that a more basic hacker trait of
Xenjoying playing with complexity and pushing systems to their limits
Xis in operation.
X
XOne area where hackish conventions for on-line writing are still in
Xsome flux is the marking of included material from earlier messages
X--- what would be called `block quotations' in ordinary English.  From
Xthe usual typographic convention employed for these (smaller font at
Xan extra indent), there derived the notation of included text being
Xindented by one ASCII TAB (0001001) character, which under UNIX and
Xmany other environments gives the appearance of an 8-space indent.
X
XEarly mail and netnews readers had no facility for including messages
Xthis way, so people had to paste in copy manually.  BSD `Mail(1)'
Xwas the first message agent to support inclusion, and early USENETters
Xemulated its style.  But the TAB character tended to push included
Xtext too far to the right (especially in multiply nested inclusions),
Xleading to ugly wraparounds.  After a brief period of confusion
X(during which an inclusion leader consisting of three or four spaces
Xbecame established in EMACS and a few mailers), the use of leading ">"
Xor "> " became standard, perhaps because the character suggests
Xmovement to the right (alternatively, it may derive from the ">" that
Xsome V7 UNIX mailers use to quote leading instances of "From" in
Xtext).  Inclusions within inclusions keep their ">" leaders, so the
X`nesting level' of a quotation is visually apparent.
X
XA few other idiosyncratic quoting styles survive because they're
Xautomatically generated.  One particularly ugly one looks like this:
X
X     /* Written hh:mm pm  Mmm dd, yyyy by user@site in local:group */
X     /* ---------- "Subject of article chopped to 35 ch" ---------- */
X        <<quoted text>>
X     /* End of text from local:group */
X
XIt's generated by an elderly, variant news-reading system called
X`notesfiles'.  The overall trend, however, is definitely away from
Xsuch verbosity.
X
XThe practice of including text helped solve what had been a major
Xnuisance on USENET: the fact that articles do not arrive at different
Xsites in the same order.  Careless posters used to post articles that
Xwould begin with, or even consist entirely of, "No, that's wrong",
Xor "I agree" or the like.  It was hard to see who was responding to
Xwhat.  Consequently, in about 1984, new news-posting software was
Xcreated with a facility to automatically include the text of a
Xprevious article, marked with "> " or whatever the poster chose.  The
Xposter was expected to delete all but the relevant lines.  The result
Xhas been that, now, careless posters post articles containing the
X*entire* text of a preceding article, *followed* only by
X"No, that's wrong" or "I agree".
X
XMany people feel that this cure is worse than the original disease,
Xand there soon appeared newsreader software designed to let the reader
Xskip over included text if desired.  Today, some posting software
Xrejects articles containing too high a proportion of lines beginning
Xwith ">", but this too has led to undesirable workarounds such as the
Xdeliberate inclusion of zero-content filler lines which aren't quoted
Xand thus pull the message below the rejection threshold.
X
XBecause the default mailers supplied with UNIX and other operating
Xsystems haven't evolved as quickly as human usage, the older
Xconventions using a leading TAB or three or four spaces are still
Xalive; however, >-inclusion is now clearly the prevalent form in both
Xnetnews and mail.
X
XPractice is still evolving, and disputes over the `correct' inclusion
Xstyle occasionally leads to {holy wars}.  One variant style reported
Xuses the citation character `|' in place of `>' for extended
Xquotations where original variations in indentation are being
Xretained.  One also sees different styles of quoting a number of
Xauthors in the same message: one (deprecated because it loses
Xinformation) uses a leader of "> " for everyone, another (the most
Xcommon) is "> > > > ", "> > > ", etc. (or ">>>> ", ">>> ", etc.,
Xdepending on line length and nesting depth) reflecting the original
Xorder of messages, and yet another is to use a different citation
Xleader for each author, say "> ", ": ", "| ", "} " (preserving
Xnesting so that the inclusion order of messages is still apparent, or
Xtagging the inclusions with authors' names).  Yet *another* style
Xis to use each poster's initials (or login name) as a citation leader
Xfor that poster.  Occasionally one sees a "# " leader used for
Xquotations from *authoritative* sources such as standards
Xdocuments; the intended allusion is to the root prompt (the special
XUNIX command prompt issued when one is running as the privileged
Xsuper-user).
X
XFinally, it is worth mentioning that many studies of on-line
Xcommunication have shown that electronic links have a de-inhibiting
Xeffect on people.  Deprived of the body-language cues through which
Xemotional state is expressed, people tend to forget everything about
Xother parties except what is presented over that ASCII link.  This has
Xboth good and bad effects.  The good one is that it encourages
Xhonesty and tends to break down hierarchical authority relationships;
Xthe bad is that it may encourage depersonalization and gratuitous
Xrudeness. 
X
XPerhaps in response to this, experienced netters often display a sort
Xof conscious formal politesse in their writing that has passed out of
Xfashion in other spoken and written media (for example, the phrase
X"Well said, sir!" is not uncommon).
X
XMany introverted hackers who are next to inarticulate in person
Xcommunicate with considerable fluency over the net, perhaps precisely
Xbecause they can forget on an unconscious level that they are dealing
Xwith people and thus don't feel stressed and anxious as they would
Xface to face.
X
XThough it is considered gauche to publicly criticize posters for poor
Xspelling or grammar, the network definitely places a premium on
Xliteracy and clarity of expression.  It may well be that future
Xhistorians of literature will see in it a revival of the great
Xtradition of personal letters as art.
X
XInternational Style
X===================
X
XAlthough the Jargon File remains primarily a lexicon of hacker usage
Xin American English, we have made some effort to get input from
Xabroad.  Though the hacker-speak of other languages often uses
Xtranslations of jargon from English (often as transmitted to them by
Xearlier Jargon File versions!), the local variations are interesting,
Xand knowledge of them may be of some use to travelling hackers.
X
XThere are some references herein to `Commonwealth English'.  These are
Xintended to describe some variations in hacker usage as reported in
Xthe English spoken in Great Britain and the Commonwealth (Canada,
XAustralia, India, etc., though Canada is heavily influenced by
XAmerican usage).  There is also an entry on {{Commonwealth Hackish}}
Xreporting some general phonetic and vocabulary differences from U.S.
Xhackish.
X
XHackers in Western Europe and (especially) Scandinavia are reported
Xto often use a mixture of English and their native languages for
Xtechnical conversation.  Occasionally they develop idioms in their
XEnglish usage which are influenced by their native-language styles.
XSome of these are reported here.
X
XA note or two on hackish usages in Russian have been added where they
Xare parallel with English idioms and thus comprehensible to
XEnglish-speakers.
X
XPronunciation Guide
X===================
X
XPronunciation keys are provided in the jargon listing for all
Xentries that are neither dictionary words pronounced as in standard
XEnglish nor obvious compounds of same.  Slashes bracket a phonetic
Xpronunciation to be interpreted using the following conventions:
X
X  1. Syllables are hyphen-separated, except that an apostrophe
X     or back-apostrophe follows each accented syllable (the
X     back apostrophe marks a secondary accent in some words of
X     four or more syllables).
X
X  2. Consonants are pronounced as in American English.  The letter `g' is
X     always hard (as in "got" rather than "giant"); `ch' is soft
X     ("church" rather than "chemist").  The letter `j' is the sound
X     that occurs twice in "judge".  The letter `s' is always as in
X     "pass", never a z sound (but it is sometimes doubled at the end of
X     syllables to emphasize this).
X     The digraph `kh' is the guttural of "loch" or "l'chaim".
X
X  3. Vowels are represented as follows:
X
X          a	back, that
X          ah	father, palm
X          ar	far, mark
X          aw	flaw, caught
X          ay	bake, rain
X          e	less, men
X          ee	easy, ski
X          eir	their, software
X          i	trip, hit
X          ie	life, sky
X          o	cot, top
X          oh	flow, sew
X          oo	loot, through
X          or	more, door
X          ow	out, how
X          oy	boy, coin
X          uh	but, some
X          u	put, foot
X          y	yet
X          yoo	few
X          [y]oo	/oo/ with optional fronting as in `news' (/nooz/ or /nyooz/)
X
XAn at-sign is used for the `schwa' sound of unstressed or occluded
Xvowels (the one that is often written with an upside-down `e').  The
Xschwa vowel is omitted in syllables containing vocalic r, l, m or n;
Xthat is, `kitten' and `color' would be rendered /kit'n/ and /kuhl'r/,
Xnot /kit'@n/ and /kuhl'@r/.
X
XOther Lexicon Conventions
X=========================
X
XEntries are sorted in case-blind ASCII collation order (rather than
Xthe letter-by-letter order ignoring interword spacing common in
Xmainstream dictionaries), except that all entries beginning with
Xnonalphabetic characters are sorted to the beginning.  The
Xcase-blindness is a feature, not a bug.
X
XThe `OED' referred to in several entries is, of course, the Oxford
XEnglish Dictionary.
X
XIn pure ASCII renderings of the Jargon File, you will see {} used
Xto bracket words which themselves have entries in the File.  This
Xisn't done all the time for every such word, but it is done everywhere
Xthat a reminder seems useful that the term has a jargon meaning and one
Xmight wish to refer to its entry.
X
XIn this all-ASCII version, headwords for topic entries are
Xdistinguished from those for ordinary entries by being followed by
SHAR_EOF
true || echo 'restore of jargon.ascii failed'
fi
echo 'End of part 1, continue with part 2'
echo 2 > _shar_seq_.tmp
exit 0