[comp.misc] Computer folklore: a study

byrd@husc7.HARVARD.EDU (John "The Squid" Byrd) (01/18/90)

----------------cut here--------------cut here-------------------------------















                 Computer Folklore: An Introduction and Survey
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
                                                             John Byrd
         
                                                       Oral Literature
         
                                                    TF: Janet Campbell
         
                                                              90 Jan 7
















         
         
         
         
         
         
         
         
             This is the Information Age.  We live in a Brave New World

      of computer-controlled bookkeeping, war-making (or peace-keeping),

      weather predicting, junk-mailing, dating.  A computer on my wrist

      ticks off the seconds of the day while I stare into a computer

      monitor, attempting to write a paper so my grade can be tabulated

      and entered onto a computerized form and mailed to my home via a

      computerized cross-reference.  Computers are omnipresent and

      insidious; one can understand E.E. Cummings's disheartened

      soliloquy: "Progress is a comfortable disease ..."

             But let's face it: computers did not build themselves.

      They are ours; we made them.  As a computer scientist and a human

      being, I think of the huge number of electronic devices we've

      made--the product of our logic and intellects--and wonder if there

      aren't tiny electronic souls embodied in them.  They deduce; they

      derive; they decide.  See how they run.1  Are computers our

      inventions, or our mind-children?

             Regardless, and for better or worse, one of the prime uses

      of the computer is to communicate.  Sprint, a long-distance

      telephone company, brags about its fiber-optic digital (read that

      computerized) network of phone lines.  When I call home on

      Sprint's network, a female computer-digitized voice tells me:

      "Please enter your phonecard number now."  An automatic telling

      machine accepts my white bankcard and calls my West Virginia

      bank's computer via a network, informing my bank that I withdrew











                                                                          3

      twenty dollars.  Moreover, I plan to submit this paper to

      interested people all over the world via a computer network.

             The point is that a computers can facilitate communication

      between machines and machines, between people and machines, and

      between people and people; however, in this paper I will try to

      examine the ways people utilize computers to communicate.  I hope

      to show, with examples and argument, that computer-communicated

      information is in some instances be valid as folklore and

      therefore be worth taxonomy and study as such.

             Before I begin my argument, I should define some computer

      terms that will be used throughout this paper, as I hope to write

      from a folklorist's point of view rather than a computer

      scientist's.

             "Unlike supermarket bulletin boards, the electronic version

      joins total strangers in distant cities."2  A computerized

      bulletin board system, or BBS, allows a phone caller to use his

      personal computer to "post" and "read" electronic messages,

      articles, and programs to any of the persons who regularly call

      the BBS.  The caller's computer and the BBS communicate over the

      phone lines with a fast series of high-pitched bleeps and whines.

      Many businesses and electronic hobbyists operate their own BBSs;

      all that is required is a personal computer, an appropriate BBS

      program to run on it, and a device to let the computer answer the

      phone called a modem.  Since the cost of maintaining phone lines

      by a BBS owner can be prohibiting, BBSs usually have only one

      phone line from the outside world.  Many BBSs are topical; that

      is, messages can be required to be of a scientific, poetic,











                                                                          4

      insulting, or even romantic nature.

             The next step up in the hierarchy of computer-controlled

      communication is the computer network.  These are large,

      expensive, privately-owned systems of massive computers connected

      twenty-four hours a day by modems.  A typical computer network,

      geographically mapped out, looks like a bizarre and haphazard web

      of phone lines with computers at the points of connection.  It is

      possible to see how, with proper routing instructions, a network

      can deliver information to distant locations quickly.  There are

      networks connecting universities (Internet, Usenet, Bitnet);

      businesses (TRW); and hobbyists and laypersons (Quantum Link,

      PeopleLink, CompuServe).  Stuart Bennett wrote about the

      difference between BBSs and network communication: "On BBSs there

      may be hours or days between message and reply, so the emphasis is

      on careful expression, not snappy one-liners; some romantics

      compose elegant letters, others write poetry.  But with online

      dialogue, a lag of only a few seconds separates question and

      response."3

             Bennet is referring to what is now commonly called computer

      CB, or citizen's band.  The term is meaningless in the context; it

      is a holdover from the personal radio transmitter craze of the

      197O's.  With a personal computer and a modem it is possible to

      hook up with a computer network and engage in typed dialogues with

      people in Savannah, San Francisco, and Poughkeepsie

      simultaneously.  On CompuServe, the CB program runs constantly; on

      the busiest "channels" of communication there is a happy, random,

      constant babble of people typing through their computers at one











                                                                          5

      another.  Quantum Link and PeopleLink have similar

      group-discussion CB-type programs.

             It is clear, from Alan Dundes's definition of the term,

      that users of a computer network or BBS constitute a "folk."  The

      term, says Dundes, "can refer to any group of people whatsoever

      who share at least one common factor."4  Dundes further

      strengthens this hypothesis thus: "A member of the group may not

      know all other members, but he will probably the common core of

      traditions belonging to the group, traditions which help the group

      have a sense of group identity."5  Patricia Phelps, who goes by

      the name "LooLoo" on CompuServe's CB, says of the network: "Many

      of us who might not have given each other the time of day had we

      met first in person have become genuine good friends ... We have

      communicated mind-to-mind and found that we like what we have

      learned about one another."

             Over the computerized pathways, people communicate, in

      pairs and in groups.  From these networks and from my friends I

      have collected samples of hundreds of unattributed, "public

      domain" computer articles, games, pictures, songs, "utilities"

      (computer-housekeeping programs), jokes, and other assorted

      esoteric computer data.  I submit that much of this information is

      folklore--as colorful, indefinite, quirkish and visceral as any

      other form of lore.

             A text file is what computer scientists call any text which

      is stored in a computer-processable format.  Stories and jokes can

      be text files.  Messages are text files.  This paper is a text

      file because the word processor I am using to write it stores my











                                                                          6

      document on a magnetic disk for later retrieval.  I have spent

      much of the past three months collecting text files from a

      computer network called Internet which connects many major

      colleges and universities around the world, and I now have several

      dozen unattributed articles, jokes, and stories, and series of

      messages.  I distributed some of the more interesting and humorous

      files I've discovered, via electronic and paperless "mail" over

      the networks, only to find that some of my friends "have seen it

      [the file] before."  Moreover, I've found examples of copying and

      referencing, verbatim and otherwise, in these text files.  I'll

      give an example now to demonstrate my meaning, but the bulk of my

      collected data will come later.

             Here are several excerpts from a thread of messages on

      Internet, each with its author's Internet computer mailbox name,

      along with the writer's real name if I could trace the mailbox

      name to a real name.  A "thread" is a sequence of messages that

      are designated as being related to one another.  The excerpts were

      taken from messages in chronological order.

      
                From bannonb@fai.UUCP:
                
                "Q.  What's the difference between a chorus
                line of girls and a magician?
                "A.  A magician has a cunning array of
                stunts."
                
                From aindiana@osiris.cso.uiuc.edu:
                
                "Q. What's the difference between the
                counerfeit dollar and the skinny woman?
                "A. One is a phony buck."
                














                                                                          7

                From lowj?ltd@uhura.cc.rochester.edu (John
                Alan "Travis" Low):
                
                "Q. What's the difference between a clever
                midget and a venereal disease?"
                "A. One is a cunning runt."
                
                From ee5391@hydra.unm.edu (Duke McMullan):
                
                "Q: What's the difference between a jewel
                thief and a peeping tom?
                "A: A jewel thief snatches watches...."
                
                 From chrisc@astroatc.UUCP (Chris Czerwinski):
                
                "Q. What's the difference between a queer and
                a refrigerator?
                "A. A refrigerator doesn't fart when you pull
                the meat out."
                
                From 880126b@aucs.uucp (Chris Butler):
                
                "One of my favorite spooners [sic] is when
                Neil Armstrong said:
                "'This is one small step for man, one giant
                step [sic] for mankind'
                "He didn't make a spoonerism, he spake a
                moonerism."
                
                From jswanson@reed.UUCP:
                
                "I heard that the whole Spoonerism [sic] went
                as follows:
                "'You hissed all of my mystery lectures.  You
                have tasted the whole worm.  You must leave by
                the first town drain.'
                "He was reprimanding a student."
                
                From dkrause@orion.oac.uci.edu (Doug Krause):
                
                "[A] few months ago I was watching a movie
                with a friend, had a couple too many beers and
                said that maybe I ought 'to have my pomach
                stumped.'"
                



















                                                                          8

                From emoffatt@cognos.UUCP (Eric Moffatt):
                
                "Q. What's the difference between a pickpocket
                and a peeping-tom ?
                A. A pickpocket snatches watches.
                
                Q. What's the difference between 69 and a
                hit-and-run accident?
                A. At least in 69 you get to see the c*nt
                coming." [elision his]
                
      
             In-depth analysis is beyond the scope of this paper, but

      here are some interesting points: the punchline pattern of

      alternating the first phonemes is first broken by Czerwinski, in

      which case the humor is (supposedly) supplied by the inclusion of

      the taboo words "queer" and "fart," along with the meat/penis

      reference; however, Czerwinski keeps the "what's the difference

      ..." formulaic beginning intact.  The pattern is further degraded

      by the elimination of the "Q." and "A." phrases in Butler's and J.

      Swanson's samples.  Krause offers us a real-life event plus the

      nonsense phrase "pomach stumped," and his lead is not followed.

      Moffatt quotes a variation of an already-published joke; in fact,

      the latest reference in his article is to John Low and his

      spoonerism.  We see the pattern coalesce and degrade once again in

      his second joke, relying on the mention of "69" and "c*nt" for

      humor.  Moffatt keeps the "what's the difference" formula in his

      second joke. It is clear that in this particular instance of

      threaded messages the simple formulaic beginning of "what's the

      difference ...?" is more enduring than the more complex formula

      for the spooneristic punchline, although a spoonerism was the

      inspiration for the thread called "Spoonerisms."6

             On computer networks, computer-specific programs are traded











                                                                          9

      as well as text files.  These programs are as diverse as the

      computers and users which run them, so I will concentrate on

      programs of a definite genre: demonstration programs for the

      Commodore 64 computer, or "demos" as the users of the computer

      tend to call them.

      
             The Commodore 64, manufactured by Commodore Business

      Machines and first released in 1982, was and is an inexpensive

      computer in a world of expensive computers; it costed $5OO when

      released, and now it can be picked up at garage sales and via

      mail-order for under $1OO.  It has reasonable capabilities for

      generating sound and pictures, and handles most standard

      processing tasks.  (However, I've had to split my word-processing

      file, this paper, into four separate parts for lack of computer

      memory.)  There are 10,000,000 Commodore 64 computers extant in

      the United States, according to a private communication from John

      Hughes.

             From 1983 to the computer shakeout in 1986, kids around the

      world got Commodores, and learned to program them.  Technical

      manuals were photocopied, Commodore-supported "user groups"

      formed, and programming tricks and tips were traded.  The term

      "copy party" was coined; it describes a day-long gathering where

      computer programs and text files were communally traded.  Computer

      "hack" groups coalesced around the world, each group declaring its

      own super-futuristic title: Triad, The Judges, Light Force, NASA,

      National Pirates Network, Rezz, Worlds of Madness, SoedeSoft,

      Dutch-USA Team, Digitized-Design Group, TOPPS Triangle, Enigma.

      Each group tried to comprise the best programmers and computer










                                                                         10

      artists.  As a result, there are many free demo programs designed

      for the Commodore 64 on computer networks which are

      un-copyrighted, self-advertising works of art.

             The typical demo program, when run, shows a detailed

      picture on the computer's TV screen and plays appropriate computer

      music.  Often there is a "scrolling text," or a message to other

      hack groups, that slides slowly by on the screen, in the style of

      a stock-exchange report.  Makers of demos attempt to outdo each

      other in terms of programming and artistic elegance; the best

      programmers achieve glory for their hacking group as their work is

      copied and distributed along networks.  Although most demos

      utilize the basic formula of song, picture, and scrolling text,

      there is nonetheless considerable diversity in demos.  A demo from

      Light Force spins pictures of molecules to the beat of a rich

      computerized score.  A demo from Worlds of Madness shows the

      inside of a movie theater; as the song progresses, a mini-movie

      takes place in the theater.  A demo from SoedeSoft shows a tape

      player on the screen that the person watching the demo can control

      via the computer's "joystick," allowing the onlooker to select a

      particular "tape" to play.

             There are interesting, if not enlightening, parallels

      between the types of computer lore I've just discussed and

      privately-owned, commercial programs versus standard folklore and

      commercial literature.  Although demos and text files are free and

      uncopyrighted, commercial programs are copyrighted and generally

      require some type of fee to be legally used.  Demos and text

      files, as often as not, are unattributed, and thus have uncertain











                                                                         11

      ancestries.  Commercial programs always include either authors'

      names or the name of the owning corporation.  Similar dichotomies

      may be noticed between common folklore and commercial literature.

      
             Computers are verbatim.  Given a text file to be sent to a

      distant location, the computer will transmit that file word for

      word, letter for letter, without so much as a comma or a space

      misplaced.  However, permanency and reliability of data is solely

      a literate phenomenon.  The idea that computers copy correctly is

      detrimental to my thesis that computers can transmit folklore,

      since folklore is by definition plastic and continuously changing

      through time.  Therefore, it is incumbent upon me to show why the

      meticulous duplication that computers perform through networks

      does not seriously affect my thesis.

             Computers do not decide what kind of information to

      transmit or to mail.  Humans do.  The ambiguous quality of data

      explains why its verbatim transference does not diminish its value

      as folklore.  Computers do not understand the content of the mails

      and messages they send over the networks: "What's the difference

      between a chorus line of girls and a magician?" and "Fksj&y rwl

      spghxsdewd eoifhse s djfjed ejfe id aleof cme s wpfjrovr#" are

      both perfectly valid communications on CB.  Only a human being can

      recognize one message as a sentence and another as gibberish.7  A

      computer, asked to transfer both phrases, will faithfully

      reproduce both.  A human would need to use literate means (e.g.

      writing) to reproduce the gibberish because it has no meaning of

      its own.

             Each human can see a piece of information differently.  I










                                                                         12

      think the chorus-line-and-magician joke is gross; I don't plan to

      remember it and bring it up at dinnertime, nor do I plan to send

      it to my friends on the network.  You, however, may love it and

      wish to send all your acquaintances a copy.  Each mail sender and

      receiver on a network makes a personal decision what to read and

      what not to read; what to reproduce and what not to reproduce.

      Personal sympathy and antipathy to data can help explain its

      flourish or demise as folklore.

             Furthermore, people often do not let computers furnish

      perfect copies of what the people have received.  A text file,

      mailed electronically to a friend, will usually not be a perfect

      copy of the original.  Generally the new file will include a

      heading telling the name of the computer mailing the file, the

      date and time, and other information. Often the mailed file will

      contain a message from the mailing person like this one, from one

      my text files: "I can't believe this! Have you seen it all

      before?"  It is possible to edit this extraneous information out

      of the text file, but the editing takes time and effort.  Often

      the text file is re-mailed, with the previous mailer's name and

      computer embedded in the text file.  In this way a text file,

      transmitted from friends to friends, can expand, taking on new

      names and addresses as it is mailed and re-mailed.  There is an

      interesting analogy between this process and of the

      nineteenth-century zoological theory that "ontogeny recapitulates

      phylogeny," propounded by Ernst Haeckel and presented in Stephen

      Gould's A Mismeasure of Man.  "[A]n individual," writes Gould, "in

      its own growth, passes through a series of stages representing











                                                                         13

      adult ancestral forms in their correct order ..."8  The comparison

      between generations of organisms and generations of text files is

      accurate, though not extremely useful.

             One might argue, then, that information that traces its own

      history of transmission is not folklore; after all, most folklore

      studies examine stories and sayings whose original author or

      authors are unknown.  However, the bulk of text files I have

      examined have neither the "original" author nor the history of

      transmission intact anywhere in them.  The ancestry of a text file

      is unimportant to its bearers, and thus it is usually expunged, or

      deleted.  Geneaological information is often considered extraneous

      to the "essence" of the text file.

             Indeed, information and ideas are distilled from files and

      programs as often as they are added.  Commodore 64 hackers dissect

      demos and remove interesting or original computer code for use in

      their own demos; they call this process "ripping."  Pictures and

      songs appearing in one demo may appear, adulterated slightly or

      not at all, in other demos.  Generally ripping is considered to be

      taboo in hacker circles.  More acceptable is the ripping of

      programming techniques, rather than of computer code itself; the

      ability to create a demo, with scrolling text and a stationary

      picture on the screen, is the hackers' equivalent of making the

      team.

             Another example of the common condensation of information

      is the "followup" command avaliable on many computer networks,

      like Internet and Usenet.  A person who reads a message and wishes

      to respond to the general network community regarding the article











                                                                         14

      will utilize the followup command.  This enables the responder to

      quote some or all of the message to which he is replying.  Usenet

      requests, during the followup process, that you "trim the quoted

      article as much as possible" to save on network transmission

      costs.

      
             A spoken word contains more information than its written

      counterpart.  Inflection, facial expressions, and gesticulation

      all contribute to the meaning of an oral event.  Deborah Tannen

      maps out a short oral interaction in "The Oral/Literate Continuum

      in Discourse," in which she uses a fairly complex notation to

      describe vocal intonation and rhythm.9  Ong noted in his book

      Orality and Literacy that oral communication is more than just the

      speaking of words:

      
                It is impossible to speak a word orally
                without any intonation.  In a text punctuation
                can signal tone minimally: a question mark or
                comma, for example, generally calls for the
                voice to be raised a bit.  Literate tradition,
                adopted and adapted by skilled critics, can
                also supply some extratextual clues for
                intonations, but not complete ones.10
                
                
             The bearers of computer folklore have developed an

      interesting way of communicating facial expressions and emotions

      in the cold, textual environment of the computer network.

      Apparently standard punctuation does not suffice to tell emotion

      in networks.  Thus, an informal system of drawing faces with

      punctuation marks has spontaneously developed for use in CB and

      text files.  Tilt your head to the left and read the following

      examples and comments, quoted from a text file (author again











                                                                         15

      unknown) from slambo@ucrmath:

      
         :-)    Your basic smilie. This smilie is used to
                inflect a sarcastic or joking statement since
                we can't hear voice inflection over Unix [a
                computer operating system, sometimes used for
                CB].
         ;-)    Winky smilie. User just made a flirtatious
                and/or sarcastic remark. More of a "don't hit
                me for what I just said" smile.
         :-(    Frowning smilie. User did not like that last
                statement or is upset or depressed about
                something.
         :-I    Indifferent smilie. Better than a Frowning
                smilie but not quite as good as a happy smilie
         :->    User just made a really biting arcastic
                remark. Worse than a :-).
         >:-)   User just made a really devilish remark.
         >;-)   Winky and devil combined. A very lewd remark
                was just made.
         
         :-P    Sticking out tongue.
         []     Hugs. [Arms, perhaps?]
         
      
             Computer folklore is neither oral nor literate.  It is not

      transmitted vocally, and therefore not oral. It is interactive,

      fast, fluid, and indefinite, and therefore not literate.  This

      non-literate, non-oral type of folklore may require that standard

      folklore terms and ideas be adjusted to the networked "terrain,"

      as it were.  Hypotheses regarding the transmission of folklore

      must take into account the inability to correlate geographical

      distance to network distance.  The time for a message to travel

      from sender to receiver via a network is proportional to the

      number of computers in the chain that handle the message, as well

      as the speed of particulate transmission of those computers.

      Information theory, a relatively new science of communication, may

      be of use in developing hypotheses regarding computer folklore

      transmission.











                                                                         16

      
             A computer virus is a tiny computer program that discreetly

      attaches itself to other computer programs when they are run, thus

      "infecting" them.  By attaching themselves to other programs,

      viruses spread quickly through collections of computer programs

      and over networks.  Some viruses only replicate, causing no ill

      effects (Scores and INIT 29 viruses); some viruses replicate and

      later "wake up" and delete important program information (Israeli

      virus); some viruses cause a computer program to beep at odd times

      or to otherwise act strangely (nVIR and AIDS viruses).  The

      popular media has implied that viruses "develop" through some sort

      of bizarre electronic natural selection; actually, viruses are

      designed and written by disgruntled programmers and hackers.  In

      some instances individual viruses can "mate" before reproducing

      and thus create new viruses comprising qualities of both its

      parents.  I pose a fascinating question: viruses, which are bits

      of information created by people, are spread and mutated by

      computer users without their knowledge.  Is information,

      transmitted and changed without a person's conscious knowledge,

      valid as folklore?

      
             ---

      
             Researching this topic has been extremely taxing.

      Apparently either no one has noticed this topic, or no one has

      cared to write about it.  I have in my room a large pile of books

      which were singularly useless in developing my thoughts for this

      paper.  It seems that articles and books which describe the topic

      of "Computers And Society" tend to present an ethical examination










                                                                         17

      of networks, rather than a folkloristic study.  Books that are

      about "Computers And Civilization" express the impact (usually

      destructive and anti-socializing) of computers on society.  An

      interesting collection of studies, compiled by Sara Kiesler and

      Lee Sproul, is prefaced thus:

      
                Many people have strong feelings about
                computers.  For some, they symbolize progress,
                productivity, and innovation.  For others,
                they symbolize isolation and depersonalization
                of human relations.  Often missing in
                discussions about the arguments and effects of
                computers are factual data.11
                
      
             Even Theodore Roszak's book with the promising title, The

      Cult of Information: The Folklore of Computers and the True Art of

      Thinking, covers only the field from a rather one-sided view of

      cybernetics and the "politics of information" to an overemotional

      argument against "the chimera of computer literacy:"

      
                [The computer's] benefits supposedly reach to
                intellectual values at the highest level,
                nothing less than the radical transformation
                of educational methods and goals ... Without
                leaving their dorms, students will be able to
                access the library card catalog; they will be
                able to log on to a student bulletin board to
                exchange advice, gossip, make dates ... When
                enthusiasts come up with artificial uses like
                these for the computer, they are really doing
                nothing more than teaching another lesson in
                technological dependence, a vice already
                ingrained in our culture.12
                
                
             This kind of material is fine reading when one is

      developing a personal opinion regarding computers and computer

      networks; however, future folkloristic students of this topic

      should take note that books of subject types similar to "Computers











                                                                         18

      And People" or "Computers And Society" generally tend to make an

      ethical, personal statement regarding man's interaction with

      computers, and do not usually contain Kiesler's and Sproul's brand

      of "factual data."

      
             I will close this paper by presenting two collections of

      computer folklore.  One collection, which is of children's rhymes

      of the type beginning with "Great green gobs of greasy grimy

      gopher guts," is folklore which was spread actively outside of the

      Internet network and collected through the network.  The second

      collection, that of the "cows" genre, is a collection of folklore

      that is of a text file nature and thus could not have developed

      outside of a computer network.

             It is my hope that these items I have collected, along with

      my arguments and ideas, serve to stimulate interest in the

      academic community regarding the topic of computer folklore.


































                                                                         19

      
             All these messages were taken from the newsgroup

      "rec.humor" on Internet over a two-week period.  Quotation marks,

      spacing, and capitalization were copied closely.

      
      1. From rg@uunet!unhd (Roger Gonzalez):
      
      "Great green gobs of greasy grimy gopher guts
      marinated monkey feet
      chopped up baby parakeet
      ...?"
      
      
      2. From schriste@uceng.UC.EDU (Steven V. Christensen):
      
      "Girls are made of greasy grimy gopher guts
      french fried eye-balls,
      chopped up parakete,
      marinated monkey meat,
      Gee I'm glad I'm a Boy!!       :->  "
      
      
      3. From ee5391aa@hydra.unm.edu (Duke McMullan n5gax):
      
      "Great green gobs of greasy, grimy, gopher guts,
      Mutilated monkey meat,
      Itty bitty birdie feet!
      
      "Great green gobs of greasy, grimy, gopher guts,
      And me without a spoon!"
      
      
      4. From izen@amelia.nas.nasa.gov (Steven H. Izen):
      
      "Girls are made of greasy grimy gopher guts,
      mutilated monkey meat,
      little birdies dirty feet.
      All these things are very very good to eat,
      but we don't have spoons,
      we have straws."
      
      
      5. From mmg@creare.UUCP:
      
      "Great green gobs of greasy grimy gopher guts
      Mutilated monkey meats
      Little birdies bloody feets
      One quart can of all-purpose porpoise pus
      Swimming in a pink lemonade
      
      "...and I forgot my spoooooon."










                                                                         20

      
      
      6. From max@lgc.lgc.com (Max Heffler @ Landmark Graphics):
      
      "Gobs and gobs of greasy, grimy, gopher guts
      mutilated monkey's meat
      little birdy dirty feet
      French-fried eyeballs swimming in a pool of blood
      that's what we had for lunch, and for supper..."
      
      
      7. From davidje@sco.COM (Le Chevalier Blanc):
      
      "Great green gobs of greasy grimy gopher guts
      Mutilated Monkey meat
      Itty bitty birdy's feet
      
      "Piles and piles of ************* pus (a line I don't remember)
      And me without a spoon....."
      
      
      8. From hankins@cs.swarthmore.edu (Jonathan Broadfield):
      
      "great green globs of greasy grimy gopher guts
      mutilated monkey meat
      chopped-up little feet
      all washed down with [i come to this point and realise i don't
      remember it all..]
      
      " oops! i forgot my spoon
         (i'll use a straw...:) "
      
      
      9. From campbell@ug.cs.dal.ca (Scott Campbell):
      
      "Green grimy gopher guts,
      Mixed with monkey meat,
      French fried eyes,
      Swimming in a pool of blood.
      Gee, I wish I had a straw!
      
      
      1O. From bayliss@skat.usc.edu (Drew Bayliss):
      
      "Great green gobs of greasy, grimy gopher guts,
      Medicated monkey meat,
      Little tiny baby feet,
      French fried eyeballs floating in a pool of blood,
      
      "That's what I had for lunch!
      <Too bad I forgot my spoon>
      (please can I have some more)"
      
      










                                                                         21

      11. From ioiaa08@discg1.UUCP (ann schrage):
      
      "Great green gobs of greasy grimy gopher guts
      Mutilated monkey meat
      Birdies little dirty feet
      One full quart of all purpose porpoise pus
      And I forgot my spoon
      But I have a straw!!!"
      
      
      12. From attcc.UUCP!hlw (Howard Wilson):
      
      " The ONLY two parts I can remember are:
      
      "Deep Fried Eyeballs dipped in kerosene,
      what I eat is not very clean.
      
      "Apparently a dinner song."
      
      13. From attcc.UUCP!ksg:
      
      "Great big gobs of greasy grimy gopher guts
      mutilated monkey nuts...
      
      "I can't think of anything else but that line-sorry"
      
      
      
      
      


































                                                                         22

     
     
                                  NOTE PAGE
     
     
      1 Quote from "Lady Madonna" and "I Am the Walrus," two songs by
        John Lennon and Paul McCartney.
     
      2 Gannes, Stuart, "New Medium for Messages," Discover, 84 May, pp.
        80-82.
     
      3 Bennet, Stuart, "The Data Game," The New Republic, 200:20-2, 13
        Feb 89.
     
      4 Dundes, Alan, "What Is Folklore?" from The Study of Folklore,
        Prentice-Hall, Inc., c. 1965, p. 2.
     
      5 Ibid.
     
      6 The term "spoonerism" was coined after W.A. Spooner (1844-193O),
        an English clergyman noted for this type of phonemic inversion.
        (From The American Heritage Dictionary, publishing information
        unavailable due to missing pages)
     
      7 This is not true for some sentences.  Computers can interpret
        semantic and syntactic order, and check it against correct
        examples of sentence semantics.  The problem with this (and
        artificial intelligence programmers are searching diligently for
        tractable methods around this glitch) is that most English
        parsing programs will blithely accept meaningless esoterica such
        as "The water is on fire."  Computers do not yet understand the
        world around them in any but the most rudimentary senses.
     
      8 Gould, Stephen Jay, The Mismeasure of Man, W.W. Norton & Co., c.
        1981, p. 114.
     
      9 Tannen, Deborah, "The Oral/Literate Continuum in Discourse,"
        from Spoken and Written Language: Exploring Orality and
        Literacy, Ablex Publishing Corp., c. 1982, p. 10.
     
     10 Ong, Walter J., Orality and Literacy: The Technologizing of the
        Word, Methuen, Inc., c. 1982, p. 102.
     
     11 Kiesler, Sara and Sproul, Lee, ed. Computing and Change on
        Campus, Cambridge University Press, c. 1987. p. viii.
     
     12 Roszak, Theodore, The Cult of Information: The Folklore of
        Computers and the True Art of Thinking, Pantheon Books, c. 1986,
        pp. 60-61.
     





----

If anyone is truly interested, mail me and I'll send a compressed version
of the cow file discussed in the article (it's over 200K).


-------------------------------------------------------------------------------
John Byrd              ! 
byrd@husc7.harvard.edu !        "Uh, could you repeat the question?" 
Q-Link: John Byrd      !                         - Sid Vicious
CompuServe: 74506,3612 !
-------------------------------------------------------------------------------