eric@snark.thyrsus.com (Eric S. Raymond) (11/29/90)
========= THIS IS THE JARGON FILE, VERSION 2.1.5 28 NOV 1990 ================= INTRODUCTION This `jargon file' is a collection of slang terms used by various subcultures of computer hackers. The original `jargon file' was a collection of hacker slang from technical cultures including 1) the MIT AI Lab, 2) the Stanford AI lab, 3) the old ARPANET AI/LISP/PDP-10 communities, 3) Carnegie- Mellon University, 4) Worcester Polytechnic Institute. Some entries dated back to the early 1970s. This version was published as _The_ Hacker's_Dictionary_ in 1983. This new version casts a wider net than the old jargon file; its aim is to cover not just AI but all the technical computing cultures wherein the true hacker-nature is manifested. More than half of the entries now derive from USENET and the C and UNIX communities. The present maintainers of the jargon file are Guy L. Steele (gls@think.com) and Eric S. Raymond (eric@snark.thyrsus.com). Send all additions, corrections and correspondence relating to the jargon file to jargon@think.com. CREDITS The original jargon file was compiled by Guy L. Steele Jr., Raphael Finkel, Don Woods, and Mark Crispin, with assistance from the MIT and Stanford AI communities and Worcester Polytechnic Institute. Some contributions were submitted via the ARPAnet from miscellaneous sites. The `old' jargon file was last revised in 1983; its revisions are all un-numbered and may be collectively considered `Version 1'. Version 2.1: the jargon file reorganization and massive additions were by Eric S. Raymond, approved by Guy Steele. Many items of UNIX, C, USENET and microcomputer-based slang were added at that time (as well as Appendix A, The Untimely Demise of Mabel The Monkey). Some obsolescent usages (mostly PDP-10 derived) were moved to appendix B. The bibliography (Appendix C) was also consed on. Our thanks to all the USENETters who contributed entries and encouragement. Special thanks to our Scandinavian correspondent Per Lindberg (per@front.se), author of the remarkable Swedish language 'zine _Hackerbladet_, for bring FOO! comics to our attention and smuggling the IBM hacker underground's own baby jargon file out to us. Also, much gratitude to ace hacker/linguist Joe Keane (jkg@osc.osc.com) for helping us improve the pronunciation guides; and to Maarten Litmath for generously allowing the inclusion of the ASCII prononunciation guide he maintains. FORMAT FOR NEW ENTRIES Try to conform to the format already being used -- 70 character lines, 3-character indentations, pronunciations in parentheses, etymologies in brackets, single-space after def'n numbers and word classes, etc. Stick to the standard ASCII character set. We are looking to expand the file's range of technical specialties covered. There are doubtless rich veins of jargon yet untapped in the scientific computing, graphics, and networking hacker communities; also in numerical analysis, computer architectures and VLSI design, language design, and many other related fields. Send us your slang! We are *not* interested in straight technical terms explained by textbooks or technical dictionaries unless an entry illuminates ``underground'' meanings or aspects not covered by official histories. We are also not interested in ``joke'' entries -- there is a lot of humor in the file but it must flow naturally out of the explanations of what hackers do and how they think. It is OK to submit items of slang you have originated if they have spread to the point of being used by people who are not personally acquainted with you. We prefer items to be attested by independent submission from two different sites. The slang file will be regularly maintained and re-posted from now on and will include a version number. Read it, pass it around, contribute -- this is *your* monument! NOTES ON JARGON CONSTRUCTION There are some standard methods of jargonification which became established quite early (i.e before 1970), spreading from such sources as the MIT Model Railroad Club, the PDP-1 SPACEWAR hackers and John McCarthy's original crew of LISPers. These include: Verb doubling: a standard construction is to double a verb and use it as a comment on what the implied subject does. Often used to terminate a conversation. Typical examples involve WIN, LOSE, HACK, FLAME, BARF, CHOMP: ``The disk heads just crashed.'' ``Lose, lose.'' ``Mostly he just talked about his @#!!$% crock. Flame, flame.'' ``Boy, what a bagbiter! Chomp, chomp!'' Soundalike slang: similar to Cockney rhyming slang. Often made up on the spur of the moment. Standard examples: Boston Globe => Boston Glob Herald American => Horrid (Harried) American New York Times => New York Slime Prime Time => Slime Time government property - do not duplicate (seen on keys) => government duplicity - do not propagate Often the substitution will be made in such a way as to slip in a standard jargon word: Dr. Dobb's Journal => Dr. Frob's Journal Margaret Jacks Hall => Marginal Hacks Hall Data General => Dirty Genitals The -P convention: turning a word into a question by appending the syllable ``P''; from the LISP convention of appending the letter ``P'' to denote a predicate (a Boolean-valued function). The question should expect a yes/no answer, though it needn't. (See T and NIL.) At dinnertime: ``Foodp?'' ``Yeah, I'm pretty hungry.'' or ``T!'' ``State-of-the-world-P?'' (Straight) ``I'm about to go home.'' (Humorous) ``Yes, the world has a state.'' [One of the best of these is a Gosperism (i.e., due to Bill Gosper). When we were at a Chinese restaurant, he wanted to know whether someone would like to share with him a two-person-sized bowl of soup. His inquiry was: ``Split-p soup?'' --GLS] Peculiar nouns: MIT AI hackers love to take various words and add the wrong endings to them to make nouns and verbs, often by extending a standard rule to nonuniform cases. Examples: porous => porosity generous => generosity Ergo: mysterious => mysteriosity ferrous => ferrocity Other examples: winnitude, disgustitude, hackification. Also, note that all nouns can be verbed. eg: ``All nouns can be verbed'', ``I'll mouse it up'', ``Hang on while I clipboard it over'', ``I'm grepping the files''. English as a whole is already heading in this direction (towards pure-positional grammar like Chinese); hackers are simply a bit ahead of the curve. Spoken inarticulations: Words such as ``mumble'', ``sigh'', and ``groan'' are spoken in places where their referent might more naturally be used. It has been suggested that this usage derives from the impossibility of representing such noises in a com link. Another expression sometimes heard is ``complain!'', meaning ``I have a complaint!'' Hacker speech style: Features extremely precise diction, careful word choice, a relatively large working vocabulary, and relatively little use of contractions or ``street slang''. Dry humor, irony, puns, and a mildly flippant attitude are highly valued -- but an underlying seriousness and intelligence is essential. One should use just enough jargon to communicate precisely and identify oneself as ``in the culture''; overuse and a breathless, excessively gung-ho attitude are considered tacky and the mark of a loser. This speech style (a variety of the precisionist English normally spoken by scientists, design engineers, and academics in technical fields) is fairly constant everywhere. Of the five listed constructions, verb doubling, peculiar noun formations, and (especially!) spoken inarticulations have become quite general; but rhyming slang is still largely confined to MIT and other large universities, and the P convention is found only where LISPers flourish. One final note. Many words in hacker jargon have to be understood as members of sets of comparatives. This is especially true of the adjectives and nouns used to describe the beauty and functional quality of code. Here is an approximately correct spectrum: MONSTROSITY BRAIN-DAMAGE BUG SCREW LOSE MISFEATURE CROCK KLUGE HACK WIN FEATURE ELEGANCE PERFECTION The last is never actually attained. PRONUNCIATION GUIDE Pronunciation keys are provided in the jargon listing for all entries which are neither dictionary words pronounced as in standard English nor obvious compounds of same. These guides use the following simple system: 1) Syllables are hyphen-separated, except that an apostrophe or back-apostrophe follows each accented syllable (the back apostrophe marks a secondary accent in some words of four or more syllables). 2) Consonants are pronounced as in American English. The letter ``g'' is always hard (as in ``got'' rather than ``giant''); ``ch'' is soft ("church'' rather than ``chemist"). The letter ``j'' is the sound that occurs twice in ``judge''. The letter ``s'' is always as in ``pass'', never a z sound (but it is sometimes doubled at the end of syllables to emphasize this). The digraph `dh' is the th of `these clothes', not of `thick'. 3) Vowels are represented as follows: a back, that ah father, palm ar far, mark aw flaw, caught ay bake, rain e less, men ee easy, ski eir their, software i trip, hit ie life, sky o cot, top oh flow, sew oo loot, through or more, door ow out, how oy boy, coin uh but, some u put, foot y yet yoo few [y]oo oo with optional fronting as in `news' (noos or nyoos) An at-sign is used for the ``schwa'' sound of unstressed or occluded vowels (the one that is often written with an upside-down ``e"). The schwa vowel is omitted in syllables containing vocalic r, l, m or n; that is, ``kitten'' and ``color'' would be rendered ``kit'n'' and ``kul'r''. UNIX CONVENTIONS References such as `malloc(3)' and `patch(1)' are to UNIX facilities (some of which, such as patch(1), are actually freeware distributed over USENET). The UNIX manuals use `foo(n)' to refer to item foo in section n) of the manual, where n=1 is utilities, n=2 is system calls, n=3 is C library routines, n=4 is file formats, n=5 is a miscellany, n=6 is games, n=7 is device drivers, and n=8 is system administration tools. THE JARGON ITSELF = = @BEGIN [primarily CMU] with @End, used humorously in writing to indicate a context or to remark on the surrounded text. From the SCRIBE command of the same name. For example: @Begin(Flame) Predicate logic is the only good programming language. Anyone who would use anything else is an idiot. Also, computers should be tredecimal instead of binary. @End(Flame) On USENET, this construct would more frequently be rendered as <FLAME ON> and <FLAME OFF>. /DEV/NULL [from the UNIX null device, used as a data sink] n. A notional `black hole' in any information space being discussed, used or referred to. A controversial posting, for example, might end ``Kudos to rasputin@kremlin.org, flames to /dev/null/''. See BIT BUCKET. = A = ABEND (ab'end) n. Abnormal termination (of software); crash; lossage. Derives from an error message on the IBM 360, but has passed into more general use, esp. at mainframe shops. ACK (ak) interj. 1. [from the ASCII mnemonic for 000110] Acknowledge. Used to register one's presence (compare mainstream ``Yo!''). An appropriate response to PING. 2. [prob. from _Bloom_County_] An exclamation of surprised disgust, esp. in ``Oop ack!''. Semi-humorous. Also in the form ACK? meaning ``Are you there?'', often used in email when earlier mail has produced no reply, or during a lull in TALK MODE to see if the person has gone away (the standard humorous response is of course NAK, i.e. ``I'm not here''). ADGER (adj'r) [UCLA] v. To make a bonehead move that could have been foreseen with a slight amount of mental effort. E.g., ``He started removing files and promptly adgered the whole project.'' AD-HOCKERY (ad-hok'@r-ee) [Purdue] n. Gratuitous assumptions made inside certain programs, esp. expert systems, which lead to the appearance of semi-intelligent behavior, but are in fact entirely arbitrary. ADVENT (ad'vent) n. The prototypical computer adventure game, first implemented on the PDP-10 by Will Crowther as an attempt at computer-refereed fantasy gaming, and expanded into a puzzle-oriented game by Don Woods. Now better known as Adventure, but the TOPS-10 operating system only permitted 6-letter filenames. This game defined the terse, dryly humorous style now expected in text adventure games, and popularized several tag lines that have become fixtures of hacker-speak. ``A huge green fierce snake bars the way!'' ``I see no X here.'' (for X some noun). ``You are in a maze of twisty little passages, all alike''. The ``magic words'' XYZZY and PLUGH also derive from this game. Crowther, by the way, participated in the exploration of the Mammoth/Flint Ridge cave system; it actually *has* a `Colossal Cave' and a `Bedquilt' as in the game, and the `Y2' that also turns up is cavers' jargon for a map reference to a secondary entrance. ALIASING BUG [C programmers] n. A class of subtle programming errors which can arise in code that does dynamic allocation via malloc(3). If more than one pointer addresses (`aliases for') a given hunk of storage, it may happen that the storage is freed through one alias and then referenced through another, leading to subtle (and possibly intermittent) lossage depending on the state and the allocation history of the malloc ARENA. Avoidable by use of allocation strategies that never alias allocated core. Also called a STALE POINTER BUG. See also PRECEDENCE LOSSAGE, SMASH THE STACK, FANDANGO ON CORE, MEMORY LEAK, OVERRUN SCREW. ALT BIT (ahlt bit) [from alternate?] adj. See META BIT. ANGLE BRACKETS [primarily MIT] n. Either of the characters ``<'' and ``>''. See BROKET. APP (ap) n. Short for `application program', as opposed to a systems program. What systems vendors are forever chasing developers to do for their environments so they can sell more boxes. Hackers tend not to think of the things they themselves run as apps; thus, in hacker parlance the term excludes compilers, program editors, games, and messaging systems, though a user would consider all those apps. Oppose TOOL, OPERATING SYSTEM. ARENA [UNIX] n. The area of memory attached to a process by brk(2) and sbrk(2) and used by malloc(3) as dynamic storage. So named from a semi-mythical ``malloc: corrupt arena'' message supposedly emitted when some early versions became terminally confused. See OVERRUN SCREW, ALIASING BUG, MEMORY LEAK, SMASH THE STACK. ARG (arg) n. Abbreviation for ``argument'' (to a function), used so often as to have become a new word (like ``piano'' from ``pianoforte''). ``The sine function takes one arg, but the arc-tangent function can take either one or two args''. Compare PARAM, VAR. ASBESTOS LONGJOHNS, UNDIES (uhn'dees), or OVERCOAT n. Metaphoric garments often donned by USENET posters just before emitting a remark they expect will elicit FLAMAGE. ASCII (as'kee) Common slang names for ASCII characters are collected here. See individual entries for BANG, CLOSE, EXCL, OPEN, QUES, SEMI, SHRIEK, SPLAT, TWIDDLE, WHAT, WOW, and YIU-SHIANG WHOLE FISH. This list derives from revision 2.2 of the USENET ASCII pronunciation guide. Single characters are listed in ASCII order, character pairs are sorted in by first member. For each character, ``official'' names appear first, then others in order of popularity (more or less). ! exclamation point, exclamation, bang, factorial, excl, ball-bat, smash, shriek, cuss, wow, hey " double quote, quote, dirk, literal mark, rabbit ears # pound sign, number sign, sharp, crunch, mesh, hex, hash, flash, grid, pig-pen, tictactoe, scratchmark, octothorp (from Bell System) $ dollar sign, currency symbol, buck, cash, string (from BASIC), escape (from TOPS-10), ding, big-money % percent sign, percent, mod, double-oh-seven & ampersand, amper, and, address (from C), andpersand ' apostrophe, single quote, quote, prime, tick, irk, pop, spark () open/close parenthesis, left/right parenthesis, paren/thesis, lparen/rparen, parenthisey, unparenthisey, open/close round bracket, ears, so/already, wax/wane * asterisk, star, splat, wildcard, gear, dingle, mult + plus sign, plus, add, cross, intersection , comma, tail - hyphen, dash, minus sign, worm . period, dot, decimal point, radix point, point, full stop, spot / virgule, slash, stroke, slant, diagonal, solidus, over, slat : colon, two-spot ; semicolon, semi, hybrid <> angle brackets, brokets, left/right angle, less/greater than, read from/write to, from/into, from/toward, in/out, comesfrom/ gozinta (all from UNIX), funnel, crunch/zap, suck/blow = equal sign, equals, quadrathorp, gets, half-mesh ? question mark, whatmark, what, wildchar, ques, huh, quark @ at sign, at, each, vortex, whorl, whirlpool, cyclone, snail, ape, cat V vee, book [] square brackets, left/right bracket, bracket/unbracket, bra/ket, square/unsquare, U turns \ reversed virgule, backslash, bash, backslant, backwhack, backslat, escape (from UNIX) ^ circumflex, caret, uparrow, hat, chevron, sharkfin, to ("to the power of"), fang _ underscore, underline, underbar, under, score, backarrow, flatworm ` grave accent, grave, backquote, left quote, open quote, backprime, unapostrophe, backspark, birk, blugle, back tick, push {} open/close brace, left/right brace, brace/unbrace, curly bracket, curly/uncurly, leftit/rytit, embrace/bracelet | vertical bar, bar, or, v-bar, spike, pipe, gozinta, thru, pipesinta (last four from UNIX) ~ tilde, squiggle, approx, wiggle, twiddle, swung dash, enyay ASSEMBLER 1. A program translator that allows human beings to generate machine code using mnemonics and symbolic names for memory locations rather than raw binary; distinguished from an HLL (q.v.) by the fact that a single assembler step generally maps to a single machine instruction (see also LANGUAGES OF CHOICE). 2. A NANOBOT which is a physical REPLICATOR (This is the ``official'' term, coined by Eric Drexler; see NANOTECHNOLOGY). AUTOMAGICALLY (aw-toh-maj'i-klee, aw-toh-maj'i-kl-ee) adv. Automatically, but in a way which, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining to you. See MAGIC. Example: The C-INTERCAL compiler generates C, then automagically invokes cc to produce an executable. = B = BACKBONE CABAL n. Semi-mythical group of large-site administrators who pushed through the GREAT RENAMING and reined in the chaos of USENET during most of the 1980s. The cabal mailing list disbanded in late 1988 after a bitter internal catfight, but the net hardly noticed. BACK DOOR n. A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field service or the vendor's maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The famous RTM worm of late 1988, for example, used a back door in the BSD UNIX sendmail(1) utility. See also IRON BOX, CRACKER, WORM, LOGIC BOMB. BACKGROUND v.,adj. A task running in background is detached from the terminal where it was started and running at a lower priority (oppose FOREGROUND). Nowadays this term is primarily associated with UNIX, but it was appears first to have been used in this sense on OS/360. By extension, to do a task ``in background'' is to do it whenever FOREGROUND matters are not claiming your undivided attention, and ``to background'' something means to relegate it to a lower priority. Compare SLOPSUCKER. BAD THING n. Something which can't possibly result in improvement of the subject. This term is always capitalized, as in ``Replacing all of the 9600 baud modems with bicycle couriers would be a Bad Thing.'' Oppose GOOD THING. One correspondent suggests that BAD THING and GOOD THING (and prob. therefore RIGHT THING and WRONG THING) come from the book ``1066 and All That'', which discusses rulers who were Good Kings, but Bad Things. BAGBITER (bag'biet-@r) n. 1. Something, such as a program or a computer, that fails to work, or works in a remarkably clumsy manner. Example: ``This text editor won't let me make a file with a line longer than 80 characters! What a bagbiter!'' 2. A person who has caused you some trouble, inadvertently or otherwise, typically by failing to program the computer properly. Synonyms: LOSER, CRETIN, CHOMPER. 3. Also in the form BAGBITING adj. Having the quality of a bagbiter. `This bagbiting system won't let me compute the factorial of a negative number.' Compare LOSING, CRETINOUS, BLETCHEROUS, BARFUCIOUS and CHOMPING; and BITE THE BAG v. To fail in some manner. ``The computer keeps crashing every five minutes.'' ``Yes, the disk controller is really biting the bag.'' The original loading of these terms was almost undoubtedly obscene, probably referring to the scrotum, but in their current usage they have become almost completely sanitized. BAMF (bamf) [from comix] interj. Notional sound made by a person or object teleporting in or out of the hearer's vicinity. Often used in VIRTUAL REALITY (q.v.) electronic fora when a character wishes to make a dramatic entrance or exit. BANG 1. n. Common spoken name for `!' (ASCII 33), especially when used in pronouncing a BANG PATH (q.v.) in spoken hackish. In elder days this was considered a CMUish usage, with MIT and Stanford hackers preferring EXCL or SHRIEK; but the spread of UNIX has carried BANG with it and it is now certainly the most common spoken name for `!'. Note that it is used exclusively for non-emphatic written `!'; one would not say ``Congratulationa bang.'', but if one wanted to specify the exact characters ``FOO!'', one would speak ``Eff oh oh bang''. See SHRIEK, ASCII. 2. interj. An exclamation signifying roughly ``I have achieved enlightenment!'' or ``The dynamite has cleared out my brain!''. Often used to acknowledge that one has perpetrated a THINKO immediately after one has been called on it. BANG PATH n. An old-style UUCP electronic-mail address specifying hops to get from some assumed-reachable location to the addressee, so called because each hop is signified by a BANG sign. Thus the path ``...!bigsite!foovax!barbox!me'' directs correspondents to route their mail to machine bigsite (presumably a well-known location accessible to everybody) and from there through the machine ``foovax'' to the account of user ``me'' on ``barbox''. See INTERNET ADDRESS and NETWORK. BAR (bar) 1. The second metasyntactic variable, after FOO and before BAZ. ``Suppose we have two functions FOO and BAR. FOO calls BAR...'' 2. Often appended to FOO to produce FOOBAR. BARF (barf) [from mainstream slang meaning ``vomit''] 1. interj. Term of disgust. See BLETCH. 2. To say ``Barf!'' or emit some similar expression of disgust. 3. v. To fail to work because of unacceptable input. May mean to give an error message. Examples: ``The division operation barfs if you try to divide by zero.'' (that is, division by zero fails in some unspecified spectacular way) ``The text editor barfs if you try to read in a new file before writing out the old one.'' 4. Also BARFULOUS, BARFUCIOUS: adj. Said of something which would make anyone barf, if only for aesthetic reasons. See CHOKE, GAG. BAUD BARF (bawd barf) n. The garbage one gets on the monitor when using a modem connection with some protocol setting (esp. line speed) incorrect, or when someone picks up a voice extension on the same line, or when really bad line noise disrupts the connection. BAZ (baz) 1. The third metasyntactic variable, after FOO and BAR and before QUX. ``Suppose we have three functions FOO, BAR, and BAZ. FOO calls BAR, which calls BAZ...'' 2. interj. Term of mild annoyance. In this usage the term is often drawn out for two or three seconds, producing an effect not unlike the bleating of a sheep; ``Baaaaaaz!'' 3. Occasionally appended to FOO to produce FOOBAZ. BEAM [from ``Beam me up, Scotty!''] v. To transfer SOFTCOPY of a file electronically; most often in combining forms such as ``beam me a copy'' or ``beam that over to his site''. Compare BLAST, SNARF, BLT. BELLS AND WHISTLES [by analogy with locomotives] n. Features added to a program or system to make it more FLAVORFUL from a hacker's point of view, without necessarily adding to its utility for its primary function. Distinguished from CHROME which is intended to attract users. BENCHMARK n. An inaccurate measure of computer performance. ``In the computer industry, there are three kinds of lies: lies, damn lies, and benchmarks.'' See also MIPS. BERKLIX (ber'kliks) n.,adj. Contraction of Berkeley UNIX. See BSD. Not used at Berkeley itself. [This one, in my experience, is more common among suit-wearers attempting to sound ``hip'' than hackers -- ESR] BERZERKELY (b@r-zer'klee) [from the name of a now-deceased record label] n. Humorous, often-used distortion of ``Berkeley'' used esp. to refer to the practices or products of the BSD UNIX hackers. BIG-ENDIAN [From Swift's ``Gulliver's Travels'' via a famous 1980 paper by Danny Cohen] adj. Describes a computer architecture in which, within a given 16- or 32-bit word, lower byte addresses have higher significance (the word is stored `big-end-first'). Most processors including the IBM 370 family and the PDP-10 and Motorola microprocessor families and most of the various RISC designs current in 1990 are big-endian. See LITTLE-ENDIAN, MIDDLE-ENDIAN. BIG IRON n. Large, expensive, ultra-fast computers. Used generally of number crunching supercomputers such as Crays, but can include more conventional big commercial IBMish mainframes. Term of approval, oppose DINOSAUR. BIGNUM (big'num) n. A multiple-precision computer representation for very large integers. More generally, any very large number. ``Have you ever looked at the United States Budget? There's bignums for you!'' When playing backgammon, large numbers on the dice, especially a roll of double fives or double sixes. Most computer languages provide a kind of data called ``integer'', but such computer integers are usually very limited in size; usually they must be smaller than 2 ^ 31 (2147483648) or (on losing BITTY BOXES) 2 ^ 16 (32767). If you want to work with numbers larger than that, you have to use floating-point numbers, which are usually only accurate to six or seven decimal places. Computer languages that provide bignums can perform exact calculations on very large numbers, such as 1000! (the factorial of 1000, which is 1000 times 999 times 998 times ... times 2 times 1) exactly. For example, this value for 1000! was computed by the MACLISP system using bignums: 4023872600770937735437024339230039857193748642107146325437999104 2993851239862902059204420848696940480047998861019719605863166687 2994808558901323829669944590997424504087073759918823627727188732 5197795059509952761208749754624970436014182780946464962910563938 8743788648733711918104582578364784997701247663288983595573543251 3185323958463075557409114262417474349347553428646576611667797396 6688202912073791438537195882498081268678383745597317461360853795 3452422158659320192809087829730843139284440328123155861103697680 1357304216168747609675871348312025478589320767169132448426236131 4125087802080002616831510273418279777047846358681701643650241536 9139828126481021309276124489635992870511496497541990934222156683 2572080821333186116811553615836546984046708975602900950537616475 8477284218896796462449451607653534081989013854424879849599533191 0172335555660213945039973628075013783761530712776192684903435262 5200015888535147331611702103968175921510907788019393178114194545 2572238655414610628921879602238389714760885062768629671466746975 6291123408243920816015378088989396451826324367161676217916890977 9911903754031274622289988005195444414282012187361745992642956581 7466283029555702990243241531816172104658320367869061172601587835 2075151628422554026517048330422614397428693306169089796848259012 5458327168226458066526769958652682272807075781391858178889652208 1643483448259932660433676601769996128318607883861502794659551311 5655203609398818061213855860030143569452722420634463179746059468 2573103790084024432438465657245014402821885252470935190620929023 1364932734975655139587205596542287497740114133469627154228458623 7738753823048386568897646192738381490014076731044664025989949022 2221765904339901886018566526485061799702356193897017860040811889 7299183110211712298459016419210688843871218556461249607987229085 1929681937238864261483965738229112312502418664935314397013742853 1926649875337218940694281434118520158014123344828015051399694290 1534830776445690990731524332782882698646027898643211390835062170 9500259738986355427719674282224875758676575234422020757363056949 8825087968928162753848863396909959826280956121450994871701244516 4612603790293091208890869420285106401821543994571568059418727489 9809425474217358240106367740459574178516082923013535808184009699 6372524230560855903700624271243416909004153690105933983835777939 4109700277534720000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000 00000000. The MACLISP language was not the first computer system to calculate very large integers, but it was @c[MACLISP] that provided the name ``bignum''.] BIG RED SWITCH [IBM] n. The power switch on a computer, esp. on an IBM-PC where it really is large and red. ``This !@%$% BITTY BOX is hung again, time to hit the big red switch.'' Sources at IBM report that, in tune with the company's passion for TLAs (q.v.) this is often acronymized as ``BRS''. BIGNUMS [from Macsyma] n. 1. In backgammon, large numbers on the dice. 2. Multiple-precision (sometimes infinitely extendable) integers and, through analogy, any very large numbers. 3. EL CAMINO BIGNUM: El Camino Real, a street through the San Francisco peninsula that originally extended (and still appears in places) all the way to Mexico City. It was termed ``El Camino Double Precision'' when someone noted it was a very long street, and then ``El Camino Bignum'' when it was pointed out that it was hundreds of miles long. BINARY n. The object code for a program. BIT [from the unit of information] n. A mental flag: a reminder that something should be done eventually. Example: ``I have a bit set for you.'' (I haven't seen you for a while, and I'm supposed to tell or ask you something.) BIT BANG n. Transmission of data on a serial line accomplished by rapidly tweaking a single output bit at the appropriate times (popular on certain early models of PRIME computers, presumably when UARTs were too expensive; and on archaic Z-80 micros with a Zilog PIO but no SIO). The technique is a simple loop with eight OUT, SHIFT, OUT etc for each byte. Input is more interesting. And full duplex (doing input and output at the same time) is one way to separate the real hackers from the wannabees. BIT BUCKET n. The great data sink in the sky. Data that is discarded is said to ``go to the bit bucket''. On UNIX, often used for /DEV/NULL (q.v.). Sometimes amplified as THE GREAT BIT BUCKET IN THE SKY. BIT DECAY n. See SOFTWARE ROT. People with a physics background tend to prefer this one for the analogy with particle decay. BIT ROT n. See SOFTWARE ROT. BITBLT (bit'blit, bit'belt) n. [from BLT, q.v.] 1. One of a closely related family of algorithms for moving and copying rectangles of bits between main and display memory on a bit-mapped device, or between two areas of either main or display memory (the requirement to do the right thing in the case of overlapping source and destination rectangles is what makes BitBlt tricky). 2. An early experimental bit-mapped terminal at Bell Labs, later commercialized as the AT&T 5620. BITS n. Machine-readable representation of a document, specifically as contrasted with paper. ``I only have a photocopy of the Jargon File; does anyone know where I can get the bits?''. See SOFTCOPY. BITTY BOX (bit'ee boks) n. 1. A computer sufficiently small, primitive or incapable as to cause a hacker acute claustrophobia at the thought of developing for it. Especially used of small, obsolescent, single-tasking-only personal machines like the Atari 800X, Osborne, Sinclair, VIC-20, or TRS-80. 2. More generally, the opposite of `real computer' (see GET A REAL COMPUTER). Pejorative. See also MESS-DOS, TOASTER, and TOY. BIXIE (biks'ee) n. Synonym for EMOTICON used on BIX (the Byte Information Exchange); BIXers believe (probably incorrectly) the emoticon was invented there. BLAST v.,n. Synonym for BLT (q.v.), used esp. for large data sends over a network or comm line. Opposite of SNARF. Usage: uncommon. BLAZER n. Nickname for the Telebit Trailblazer, an expensive but extremely reliable and effective high-speed modem, popular at UNIX sites that pass large volumes of EMAIL and USENET news. BLETCH (blech) [from Yiddish/German ``brechen'', to vomit] 1. interj. Term of disgust. 2. BLETCHEROUS: adj. Disgusting in design or function. ``This keyboard is bletcherous!'' Usage: slightly comic. BLINKENLIGHTS (blink'@n-lietz) n. Front-panel diagnostic lights on a mainframe CPU. Derives from the last word of the famous blackletter-Gothic ``ACHTUNG! ALLES LOOKENSPEEPERS!'' notice in mangled pseudo-German that once graced about half the computer rooms in the English-speaking world. The following text ran: ``Das computermachine ist nicht fur gefingerpoken und mittengrabben. Ist easy schnappen der springenwerk, blowenfusen und poppencorken mit spitzensparken. Ist nicht fur gewerken bei das dumpkopfen. Das rubbernecken sichtseeren keepen hans in das pockets muss; relaxen und watch das blinkenlichten.'' This silliness dates back at least as far as the London University ATLAS site in the 1960s, but (judging by the idioms) was probably composed by an American at some still-earlier date. BLIT (blit) v. To transfer a large contiguous package of information from one place to another. This usage has outlasted the PDP-10 BLock Transfer instruction for which it derives. See BITBLT, BLT, DD, CAT, BLAST, SNARF, Appendix B. BLOCK [From computer science usage] 1. vi. To delay while waiting for something. ``We're blocking until everyone gets here.'' 2. in BLOCK ON vt. To block, waiting for (something). ``Lunch is blocked on Phil's arrival.'' BLOCK TRANSFER COMPUTATIONS n. From the Dr. Who television series: in the show, it referred to computations so fiendishly subtle and complex that they could not be performed by machines. Used to refer to any task that should be expressible as an algorithm in theory, but isn't. BLOW AWAY v. To remove files and directories from permanant storage with extreme prejudice, generally by accident. Oppose NUKE. BLOW OUT v. Of software, to fail spectacularly; almost as serious as CRASH AND BURN. See BLOW PAST. BLOW PAST v. To BLOW OUT despite a safeguard. ``The server blew past the 5K reserve buffer.'' BLT (bee ell tee, [rarely] belt) n.,v. Synonym for BLIT. This form is older but now less common. BLUE BOOK n. Informal name for one of the three standard references on PostScript; the others are known as the GREEN BOOK and RED BOOK. BLUE GLUE [IBM] n. IBM's SNA (Systems Network Architecture) an incredibly losing and bletcherous protocol suite widely favored at commercial shops that don't know any better. See FEAR AND LOATHING. BLUE GOO n. Term for ``police'' NANOBOTS intended to prevent GRAY GOO (q.v.), denature hazardous waste, destroy pollution, put ozone back into the stratosphere, prevent halitosis, and to promote truth, justice, and the American way, etc., etc. See NANOTECHNOLOGY. BNF (bee-en-ef) n. Hacker acronym for `Backus-Naur Form', a metasyntactic notation used to specify the syntax of programming languages, command sets and the like. Widely used for language descriptions but seldom documented anywhere, so that it must usually be learned by osmosis from other hackers. Consider this BNF for a postal address: <postal-address> ::= <name-part> <street-address> <zip-part> <name-part> ::= <first-name> [<middle-part>] <last-name> <middle-part> ::= <middle-name> | <middle-initial> "." <street-address> ::= [<apt>] <street-number> <street-name> <zip-part> ::= <town-name> "," <state-code> <zip-code> This translates into English as: A postal-address consists of a name-part, followed by a street-address part, followed by a zip-code part. A name-part consists of a first-name followed by an optional middle-part followed by a last-name. A middle-part consists of either a middle name or a middle initial followed by a dot. A street address consists of an optional apartment specifier followed by a street number, followed by a street name. A zip-part consts of a town-name, followed by a state code, followed by a zip code. Note that many things such as the format of a first-name, apartment specifier or zip-code are left unspecified. These are presumed to be obvious from context or detailed in another part of the specification the BNF is part of. BOA [IBM] n. Any one of the fat cables that lurk under the floor in DINOSAUR PENS. It is rumored within IBM that 370 channel cables are limited to 200 feet because beyond that length the boas get dangerous... BOAT ANCHOR n. Like DOORSTOP (q.v.) but more severe, implies that the offending hardware is irreversibly dead or useless. BOGOMETER (boh-goh'm@-tr) n. An instrument to measure BOGOSITY, generally a conversational device, as in ``my bogometer is reading in the red on that idea'' or ``I think you just bent the needle on my bogometer''. BOGON (bo'gon) [by analogy with proton/electron/neutron, but doubtless reinforced after 1980 by the similarity to ``Vogon''] n. 1. The elementary particle of bogosity (see QUANTUM BOGODYNAMICS). For instance, ``the ethernet is emitting bogons again,'' meaning that it is broken or acting in an erratic or bogus fashion. 2. A query packet sent from a TCP/IP domain resolver to a root server, having the reply bit set instead of the query bit. 3. Any bogus or incorrectly formed packet sent on a network. 4. By extension, used to refer metasyntactically to any bogus thing, as in ``I'd like to go to lunch with you but I've got to go to the weekly staff bogon.'' BOGON FILTER (bo'gon fil'tr) n. Any device, software or hardware, which limits or suppresses the flow and/or emission of bogons. Example: ``Engineering hacked a bogon filter between the Cray and the VAXen and now we're getting fewer dropped packets.'' BOGOSITY (boh-gos-@-tee) n. 1. The degree to which something is BOGUS (q.v.). At CMU, bogosity is measured with a BOGOMETER; typical use: in a seminar, when a speaker says something bogus, a listener might raise his hand and say, ``My bogometer just triggered.'' The agreed-upon unit of bogosity is the microLenat (uL). 2. The potential field generated by a bogon flux; see QUANTUM BOGODYNAMICS. BOGUS [WPI, Yale, Stanford] adj. 1. Non-functional. ``Your patches are bogus.'' 2. Useless. ``OPCON is a bogus program.'' 3. False. ``Your arguments are bogus.'' 4. Incorrect. ``That algorithm is bogus.'' 5. Silly. ``Stop writing those bogus sagas.'' (This word seems to have some, but not all, of the connotations of RANDOM.) [Etymological note from Lehman/Reid at CMU: ``Bogus'' was originally used (in this sense) at Princeton, in the late 60s. It was used not particularly in the CS department, but all over campus. It came to Yale, where one of us (Lehman) was an undergraduate, and (we assume) elsewhere through the efforts of Princeton alumni who brought the word with them from their alma mater. In the Yale case, the alumnus is Michael Shamos, who was a graduate student at Yale and is now a faculty member here. A glossary of bogus words was compiled at Yale when the word was first popularized (e.g., autobogophobia: the fear of becoming bogotified).] BOHR BUG (bor buhg) [from quantum physics] n. A repeatable BUG; one which manifests reliably under a possibly unknown but well-defined set of conditions. Antonym of HEISENBUG. BOINK (boynk) [USENET] 1. To have sex with; compare BOUNCE, sense #3. 2. After the original Peter Korn ``Boinkcon'' USENET parties, used for almost any net social gathering, e.g. Miniboink, a small boink held by Nancy Gillett in 1988; Minniboink, a Boinkcon in Minnesota in 1989; Humpdayboinks, Wednesday get-togethers held in the San Francisco Bay Area. BONDAGE-AND-DISCIPLINE LANGUAGE A language such as Pascal, APL, or Prolog that, though ostensibly general-purpose, is designed so as to enforce an author's theory of ``right programming'' even though said theory is demonstrably inadequate for systems or even vanilla general-purpose programming. See LANGUAGES OF CHOICE. BOOT [from ``by one's bootstraps''] v.,n. To load and initialize the operating system on a machine. This usage is no longer slang (having become jargon in the strict sense), but it is sometimes used of human thought processes, as in the following exchange: ``You've lost me.'' ``O.K., reboot. Here's the theory...''. Also found in the variants COLD BOOT (from power-off condition) and WARM BOOT (with the CPU and all devices already powered up, as after a hardware reset or software crash). BOTTLENECKED adj. 1. Used by hackers specifically to describe hardware under which performance is usually limited by contention for one particular resource (such as disk, memory or processor CLOCKS); see BALANCED. 2. Less often, applied to the software analogue of sense #1, a slow code section or algorithm through which all computation must pass (see also HOT SPOT). BOUNCE v. 1. [UNIX] An electronic mail message which is undeliverable and returns an error notification to the sender is said to `bounce'. See also BOUNCE MESSAGE. 2. [Stanford] To play volleyball. ``Bounce, bounce! Stop wasting time on the computer and get out to the court!'' 3. To engage in sexual intercourse; prob. fr. the expression ``bouncing the mattress'', but influenced by Piglet's psychosexually-loaded ``Bounce on me too, Tigger!'' from the Winnie the Pooh books. BOUNCE MESSAGE [UNIX] n. Notification message returned to sender by a site unable to relay EMAIL to the intended INTERNET ADDRESS recipient or the next link in a BANG PATH (see BOUNCE). Reasons might include a nonexistent or misspelled username or a down relay site. Bounce messages can themselves fail, with occasionally ugly results; see SORCERER'S APPRENTICE MODE. BOXEN (bok'sn) pl n. [back-formation from VAXEN] Fanciful plural of `box' often encountered in the phrase `UNIX boxen', used to describe commodity UNIX hardware. The implication is that any two UNIX boxen are interchangeable. BRAIN-DAMAGED [generalization of ``Honeywell Brain Damage'' (HBD), a theoretical disease invented to explain certain utter cretinisms in MULTICS] adj. Obviously wrong; CRETINOUS; DEMENTED. There is an implication that the person responsible must have suffered brain damage, because he should have known better. Calling something brain-damaged is really bad; it also implies it is unusable. BRANCH TO FISHKILL [IBM, from the location of one of their facilities] n. Any unexpected jump in a program that produces catastrophic or just plain weird results. See HYPERSPACE. BREAK v. 1. To cause to be broken (in any sense). ``Your latest patch to the system broke the TELNET server.'' 2. (of a program) To stop temporarily, so that it may be examined for debugging purposes. The place where it stops is a BREAKPOINT. BREAKAGE [IBM] n. The extra people that must be added to an organization because its master plan has changed; used esp. of software and hardware development teams. BRITTLE adj. Said of software that's functional but easily broken by changes in operating environment or configuration. Often describes the results of a research effort that were never intended to be robust, but can be applied to commercially developed software. BROADCAST STORM n. An incorrect packet broadcast on a network that causes most hosts to respond all at once, typically with wrong answers that start the process over again. Also called NETWORK MELTDOWN. See also CHERNOBYL PACKET. BROKEN adj. 1. Not working properly (of programs). 2. Behaving strangely; especially (of people), exhibiting extreme depression. BROKET (broh'k@t, broh'ket) [by analogy with ``bracket": a ``broken bracket"] (primarily Stanford) n. Either of the characters ``<'' and ``>''. (At MIT, and apparently in THE REAL WORLD (q.v.) as well, these are usually called ANGLE BRACKETS.) BRUTE FORCE AND IGNORANCE n. A popular design technique at many software houses. Dogmatic adherence to design methodologies tends to encourage it. Characteristic of early LARVAL STAGE programming; unfortunately, many never outgrow it. Often abbreviated BFI, as in: ``Gak, they used a bubble sort! That's strictly from BFI.'' Compare BOGOSITY. BSD (bee-ess-dee) n. [acronym for Berkeley System Distribution] a family of UNIX versions for the DEC VAX developed by Bill Joy and others at UC Berkeley starting around 1980, incorporating TCP/IP networking enhancements and many other features. The BSD versions (4.1, 4.2, and 4.3) and commercial versions derived from them (SunOS and Mt. Xinu) held the technical lead in the UNIX world until AT&T's successful standardization efforts after about 1986, and are still widely popular. See UNIX, USG UNIX. BUCKY BITS (buh'kee bits) [primarily Stanford] n. The bits produced by the CTRL and META shift keys on a Stanford (or Knight) keyboard. It is rumored that these were in fact named for Buckminster Fuller during a period when he was consulting at Stanford. Unfortunately, legend also has it that ``Bucky'' was Niklaus Wirth's nickname when *he* was consulting at Stanford and that he first suggested the idea of the meta key, so its bit was named after him. DOUBLE BUCKY: adj. Using both the CTRL and META keys. ``The command to burn all LEDs is double bucky F.'' See also META BIT, COKEBOTTLE. BUFFER OVERFLOW n. What typically happens when an OS or application is fed data faster than it can buffer and process it. Used metaphorically of human mental processes. ``Sorry, I got four phone calls in three minutes last night and lost your message to a buffer overflow.'' BUG [from telephone terminology, ``bugs in a telephone cable'', blamed for noisy lines] n. An unwanted and unintended property of a program, esp. one which causes it to malfunction. See FEATURE. BULLETPROOF adj. Used of an algorithm or implementation considered extremely robust; lossage-resistant; capable of correctly recovering from any imaginable exception condition. This is a rare and valued quality. BUM 1. v. To make highly efficient, either in time or space, often at the expense of clarity. ``I managed to bum three more instructions.'' 2. n. A small change to an algorithm to make it more efficient. Usage: somewhat rare. See TUNE. BUMP v. Synonym for increment. Has the same meaning as C's ++ operator. Used esp. of counter variables, pointers (see POINTER ARITHMETIC) and index dummies in for, while, and do-until loops. BURBLE v. Like FLAME, but connotes that the source is truly clueless and ineffectual (mere flamers can be competent). A term of deep contempt. BUSY-WAIT v. To wait on an event by SPINning through a tight or timed-delay loop that polls for the event on each pass, as opposed to setting up an interrupt handler and continuing execution on another part of the task. A wasteful technique, best avoided on time-sharing systems where a busy-waiting program may hog the processor. BUZZ v. 1. To run in a very tight loop, perhaps without guarantee of getting out. See SPIN. 2. [ETA Systems] To test a wire or PCB trace for continuity by applying an AC signal as opposed to applying a DC signal. Some wire faults will pass DC tests but fail a BUZZ test. BWQ [bee duhb'l-yoo kyoo) [IBM] n. Buzz Word Quotient. Usually roughly proportional to BOGOSITY. See TLA. BYTESEXUAL (biet-seks'u-@l) adj. Said of hardware, denotes willingness to compute or pass data in either BIG ENDIAN or LITTLE ENDIAN format (depending, presumably, on a mode bit somewhere).
mayoff@cs.utexas.edu (Robert Mayoff) (11/30/90)
In article <1YbxCV#0YFHYG9zh4Tw3Ytjsy4ddrOM=eric@snark.thyrsus.com> eric@snark.thyrsus.com (Eric S. Raymond) writes: >UNIX CONVENTIONS > References such as `malloc(3)' and `patch(1)' are to UNIX >facilities (some of which, such as patch(1), are actually freeware >distributed over USENET). The UNIX manuals use `foo(n)' to refer to >item foo in section n) of the manual, where n=1 is utilities, n=2 is >system calls, n=3 is C library routines, n=4 is file formats, n=5 is >a miscellany, n=6 is games, n=7 is device drivers, and n=8 is system >administration tools. I'm offended. This is just plain wrong. The correct order is 1 User Commands, 2 System Calls, 3 Subroutines, 4 Devices, 5 File Formats, 6 Games & Demos, 7 Miscellaneous, and 8 Maintenance Commands. -- /_ rob <mayoff@cs.utexas.edu> /_ Fun things to do with UNIX (#118 in a series): / tail -f super.grow | cat /etc/motd - >> super.grow
eric@snark.thyrsus.com (Eric S. Raymond) (11/30/90)
In <1000@langtry.cs.utexas.edu> Robert Mayoff wrote: > [flaming me] > I'm offended. This is just plain wrong. The correct order is 1 User > Commands, 2 System Calls, 3 Subroutines, 4 Devices, 5 File Formats, 6 Games > & Demos, 7 Miscellaneous, and 8 Maintenance Commands. I dunno what weird UNIX you're using, but if you'll look at a stock AT&T SVr3.2 manual set you'll find the sections to be as I described them. Did it occur to you that we might *both* be right before you hit the send key? <sigh> Two-valued logic is such a bummer sometimes. I'll add a note that sections 4 and 5 and 7 have been known to get swapped around. -- Eric S. Raymond = eric@snark.thyrsus.com (mad mastermind of TMN-Netnews)
paul@frcs.UUCP (Paul Nash) (12/03/90)
Thus spake eric@snark.thyrsus.com (Eric S. Raymond): > BUG [from telephone terminology, ``bugs in a telephone cable'', blamed > for noisy lines] n. An unwanted and unintended property of a > program, esp. one which causes it to malfunction. See FEATURE. I have heard this attributed to Rear Admiral (retd) Grace Hopper, who had a malfunctioning program. The cause was traced to a fried moth in the back of the computer. ---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=--- Paul Nash Flagship Wide Area Networks (Pty) Ltd paul@frcs.UUCP ...!uunet!ddsw1!proxima!frcs!paul
imp@marvin.Solbourne.COM (Warner Losh) (12/05/90)
In article <207@frcs.UUCP> paul@frcs.UUCP (Paul Nash) writes: >I have heard this attributed to Rear Admiral (retd) Grace Hopper, who >had a malfunctioning program. The cause was traced to a fried moth in >the back of the computer. While this is true, the use of bug goes back much farther. There was a long thread on this topic somewhere a while back. People posted enimilogies from the OED (Oxford English Dictionary) that show that the usage dates back much farther than the 1940's. If someone has the discussion archived, then would they be so kind as to post it. Warner -- Warner Losh imp@Solbourne.COM We sing about Beauty and we sing about Truth at $10,000 a show.
mitchell (Bill Mitchell) (12/05/90)
In article <207@frcs.UUCP> paul@frcs.UUCP (Paul Nash) writes: >Thus spake eric@snark.thyrsus.com (Eric S. Raymond): > >> BUG [from telephone terminology, ``bugs in a telephone cable'', blamed >> for noisy lines] n. An unwanted and unintended property of a >> program, esp. one which causes it to malfunction. See FEATURE. > >I have heard this attributed to Rear Admiral (retd) Grace Hopper, who >had a malfunctioning program. The cause was traced to a fried moth in >the back of the computer. > Somewhere in the back of a dusty file drawer I have a xerox of a mazine article which printed a photo of Grace Hopper's logbook entry about the bug - with the bug itself (beaten to death by relay contacts) taped to the page. -- mitchell@mdi.com (Bill Mitchell)
de5@ornl.gov (Dave Sill) (12/05/90)
In article <1990Dec5.024705.10989@mdivax1.uucp>, mitchell@mdi.com (Bill Mitchell) writes: > >Somewhere in the back of a dusty file drawer I have a xerox of a >mazine article which printed a photo of Grace Hopper's logbook entry about >the bug - with the bug itself (beaten to death by relay contacts) >taped to the page. Up until a year or so ago, this log book was in a small display case, along with some pieces of core memory and other artifacts, at the Naval Surface Warfare Center (relay.nswc.navy.mil) in Dahlgren, Virginia. I don't remember seeing Adm. Hopper's name anywhere on the page, though. I *did* hear that she was responsible for the log book being there. Apparently, someone asked her where it should be kept, and she recommended "the computer museum at Dahlgren". Yeah, that 2'x3' display case with two shelves... Also, it was clear from the wording of the log message that the term "bug" was already in common usage at the time. It said something like "First real computer `bug'." (Sue me if that's not exact.) Finally, I have no idea where they moved it to. -- Dave Sill (de5@ornl.gov) Martin Marietta Energy Systems Workstation Support
tewok@tove.cs.umd.edu (Uncle Wayne) (12/06/90)
In article <1990Dec5.024705.10989@mdivax1.uucp> mdivax1!mdisea!mitchell (Bill Mitchell) writes: > >Somewhere in the back of a dusty file drawer I have a xerox of a >mazine article which printed a photo of Grace Hopper's logbook entry about >the bug - with the bug itself (beaten to death by relay contacts) >taped to the page. > >-- Unfortunately, Grace Hopper's logbook entry about the bug is yet another piece of folklore. My father-in-law works at Dahlgren Naval Surface Warfare Center, the place where the bug entered history. He has seen the logbook referring to the bug and our friend Grace wasn't on duty or in the building when the bug was found. I imagine she came in later and found the bug in the logbook, but she wasn't there when the bug was found. I've heard from the net that She went on to promote the bug and herself. Yet another piece of folklore debunked -- that is, if you trust my father-in-law and me. Wayne Morrison
hunt@dg-rtp.rtp.dg.com (Greg Hunt) (12/06/90)
In article <28349@mimsy.umd.edu>, tewok@tove.cs.umd.edu (Uncle Wayne) writes: > > Unfortunately, Grace Hopper's logbook entry about the bug is yet > another piece of folklore. My father-in-law works at Dahlgren Naval > Surface Warfare Center, the place where the bug entered history. He > has seen the logbook referring to the bug and our friend Grace wasn't > on duty or in the building when the bug was found. I imagine she came > in later and found the bug in the logbook, but she wasn't there when > the bug was found. I've heard from the net that She went on to promote > the bug and herself. Yet another piece of folklore debunked -- that > is, if you trust my father-in-law and me. > Well, I for one don't believe your father-in-law. I heard Grace Hopper speak once while I was working in Massachusetts, and she told the story exactly as related here by other folks. I have no reason to doubt her. She's an extraordinary lady. -- Greg Hunt Internet: hunt@dg-rtp.rtp.dg.com DG/UX Kernel Development UUCP: {world}!mcnc!rti!dg-rtp!hunt Data General Corporation Research Triangle Park, NC, USA These opinions are mine, not DG's.
jcmorris@mwunix.mitre.org (Joe Morris) (12/06/90)
In a recent article tewok@tove.cs.umd.edu (Uncle Wayne) writes: >Unfortunately, Grace Hopper's logbook entry about the bug is yet >another piece of folklore. My father-in-law works at Dahlgren Naval >Surface Warfare Center, the place where the bug entered history. He >has seen the logbook referring to the bug and our friend Grace wasn't >on duty or in the building when the bug was found. I imagine she came >in later and found the bug in the logbook, but she wasn't there when >the bug was found. I've heard from the net that She went on to promote >the bug and herself. FWIW, I've never heard Grace actually claim to be the person who actually found the bug, and I'm not sure she ever even claimed to be on duty at the time it was found. Certainly she has appropriated the story as one of her staple items for any talk she gives, but I don't think she crossed the line between "this is something that happened where I was once employed" and "this is something which happened to me".
tomr@ashtate (Tom Rombouts) (12/07/90)
In article <207@frcs.UUCP> paul@frcs.UUCP (Paul Nash) writes: >Thus spake eric@snark.thyrsus.com (Eric S. Raymond): > >> BUG [from telephone terminology, ``bugs in a telephone cable'', blamed >> for noisy lines] n. An unwanted and unintended property of a >> program, esp. one which causes it to malfunction. See FEATURE. > >I have heard this attributed to Rear Admiral (retd) Grace Hopper, who >had a malfunctioning program. The cause was traced to a fried moth in >the back of the computer. As many people may know, this is covered in "The Devouring Fungus" on page 64 and 65 of "The Cybernetic Gods" chapter. I don't want to spoil it for people who have not yet read the book, but essentially "bug" to mean a problem or snag has an older linguistic heritage than one might expect! Tom Rombouts Torrance Techie tomr@ashate.A-T.com V:(213)538-7108
janm@puckstang (Jan Mattson) (12/10/90)
In <207@frcs.UUCP> paul@frcs.UUCP (Paul Nash) writes: >Thus spake eric@snark.thyrsus.com (Eric S. Raymond): >> BUG [from telephone terminology, ``bugs in a telephone cable'', blamed >> for noisy lines] n. An unwanted and unintended property of a >> program, esp. one which causes it to malfunction. See FEATURE. >I have heard this attributed to Rear Admiral (retd) Grace Hopper, who >had a malfunctioning program. The cause was traced to a fried moth in >the back of the computer. The use of the word "bug" to describe "unwanted and unintended" behavior is much older than computers. Edison used it, and perhaps it's even older than that. -- Jan Mattsson Computer Science student, Uppsala University, Sweden Email: D88.Jan-Mattsson@carmen.docs.uu.se or janm@zorn.csd.uu.se