home *** CD-ROM | disk | FTP | other *** search
- From: eric@snark.thyrsus.com (Eric S. Raymond)
- Newsgroups: alt.folklore.computers,alt.sources,misc.misc
- Subject: The Jargon File v, part 1 of 17
- Message-ID: <1ZdTrJ#5bSRfY9cxTd02Jj4bB6vzWRw=eric@snark.thyrsus.com>
- Date: 2 Mar 91 18:14:01 GMT
-
- Submitted-by: jargon@thyrsus.com
- Archive-name: jargon/part01
-
- ---- Cut Here and feed the following to sh ----
- #!/bin/sh
- # This is jargon, a shell archive (produced by shar 3.49)
- # To extract the files from this archive, save it to a file, remove
- # everything above the "!/bin/sh" line above, and type "sh file_name".
- #
- # made 03/02/1991 17:29 UTC by jargon@thyrsus.com
- # Source directory /usr2/eric/jargon
- #
- # existing files will NOT be overwritten unless -c is specified
- #
- # This is part 1 of a multipart archive
- # do not concatenate these parts, unpack them in order with /bin/sh
- #
- # This shar contains:
- # length mode name
- # ------ ---------- ------------------------------------------
- # 831872 -rw-r--r-- jargon.ascii
- #
- if test -r _shar_seq_.tmp; then
- echo 'Must unpack archives in sequence!'
- echo Please unpack part `cat _shar_seq_.tmp` next
- exit 1
- fi
- # ============= jargon.ascii ==============
- if test -f 'jargon.ascii' -a X"$1" != X"-c"; then
- echo 'x - skipping jargon.ascii (File already exists)'
- rm -f _shar_wnt_.tmp
- else
- > _shar_wnt_.tmp
- sed 's/^X//' << 'SHAR_EOF' > 'jargon.ascii' &&
- X============ THIS IS THE JARGON FILE, VERSION 2.7.1, 1 MAR 1991 ============
- X
- XIntroduction
- X************
- X
- XThis document is a collection of slang terms used by various
- Xsubcultures of computer hackers. Though some technical material is
- Xincluded for background and flavor, it is not a technical dictionary;
- Xwhat we describe here is the language hackers use among themselves for
- Xfun, social communication, and technical debate within their communities.
- X
- XThe `hacker culture' is actually a loosely networked collection of
- Xsubcultures that is nevertheless conscious of some important shared
- Xexperiences, shared roots, and shared values. It has its own myths,
- Xheroes, villains, folk epics, in-jokes, taboos, and dreams. Because
- Xhackers as a group are particularly creative people who define
- Xthemselves partly by rejection of `normal' values and working habits,
- Xit has unusually rich and conscious traditions for an intentional
- Xculture less than thirty-five years old.
- X
- XAs usual with slang, the special vocabulary of hackers helps hold
- Xtheir culture together --- it helps hackers recognize each other's
- Xplaces in the community and expresses shared values and experiences.
- XAlso as usual, *not* knowing the slang (or using it
- Xinappropriately) defines one as an outsider, a mundane, or (worst of
- Xall in hackish vocabulary) possibly even a *suit*. All human
- Xcultures use slang in this threefold way --- as a tool of
- Xcommunication, and of inclusion, and of exclusion.
- X
- XAmong hackers, though, slang has a subtler aspect paralleled perhaps
- Xin the slang of jazz musicians and some kinds of fine artists but hard
- Xto detect in most technical or scientific cultures; parts of it are
- Xcode for shared states of *consciousness*. There is a whole range
- Xof altered states and problem-solving mental stances basic to
- Xhigh-level hacking which don't fit into conventional linguistic
- Xreality any better than a Coltrane solo or one of Maurits Escher's
- Xtrick-the-eye paintings (Escher is a favorite of hackers), and hacker
- Xslang encodes these subtleties in many unobvious ways. Take the
- Xdistinction between a {kluge} and an {elegant} solution, and the
- Xdiffering connotations attached to each, as a simple example. The
- Xdistinction is not only of engineering significance; it reaches right
- Xback into the nature of the generative processes in program design and
- Xasserts something important about two different kinds of relationship
- Xbetween the hacker and the hack. Hacker slang is unusually rich in
- Ximplications of this kind, of overtones and undertones that illuminate
- Xthe hackish psyche.
- X
- XBut there is more. Hackers, as a rule, love word-play and are very
- Xconscious and inventive in their use of language. These traits are
- Xcommon in children, but the conformity-enforcing machine we are
- Xpleased to call an educational system bludgeons them out of most of us
- Xbefore adolescence. Thus, linguistic invention in most subcultures of
- Xours is a halting and largely unconscious process. Hackers, by
- Xcontrast, regard slang formation and use as a game to be played for
- Xconscious pleasure. Their inventions thus display an almost unique
- Xcombination of the neotenous enjoyment of language-play with the
- Xdiscrimination of educated and powerful intelligence. Further, the
- Xelectronic media which knit them together are fluid, `hot'
- Xconnections, well adapted to both the dissemination of new slang and
- Xthe ruthless culling of weak and superannuated specimens. The results
- Xof this process give us perhaps a uniquely intense ans accelerated
- Xview of linguistic evolution in action.
- X
- XThe intensity and consciousness of hackish invention makes a
- Xcompilation of hacker slang a particularly effective window into the
- Xsurrounding culture --- and, in fact, this one is the latest version
- Xof an evolving compilation called the `Jargon File' maintained by
- Xhackers themselves for over fifteen years. This one (like its
- Xancestors) is primarily a lexicon, but also includes `topic entries'
- Xwhich collect background or sidelight information on hacker culture
- Xthat would be awkward to try to subsume under individual entries.
- X
- XThough the format is that of a reference, it is also intended that the
- Xmaterial be enjoyable to browse or read straight through. Even a
- Xcomplete outsider should find at least a chuckle on nearly every page,
- Xand much that is amusingly thought-provoking. But it is also true
- Xthat hackers use humorous word-play to make strong, sometime combative
- Xstatements about what they feel. Some of these entries reflect the
- Xviews of opposing sides in disputes that have been genuinely
- Xpassionate; this is deliberate. We have not tried to moderate or
- Xpretty up these disputes; rather we have attempted to ensure that
- X*everyone's* sacred cows get gored, impartially. Compromise is
- Xnot particularly a hackish virtue, but the honest presentation of
- Xdivergent viewpoints is.
- X
- XThe reader with minimal computer background who finds some references
- Xincomprehensibly technical can safely ignore them. We have not felt
- Xit either necessary or desirable to eliminate all such; they, too,
- Xcontribute flavor, and one of this document's major intended audiences
- X(fledgling hackers already partway inside the culture) will benefit
- Xfrom them.
- X
- XA selection of longer items of hacker folklore and humor are included
- Xin Appendix A. The `outside' reader's attention is particularly
- Xdirected to Appendix B, the Portrait of J. Random Hacker. Appendix C
- Xis a bibliography of non-technical works which have either influenced
- Xor described the hacker culture.
- X
- XBecause hackerdom is an intentional culture (one each individual must
- Xchoose by action to join), one should not be surprised that the line
- Xbetween description and influence can become more than a little
- Xblurred. Earlier Jargon File versions have played a central role in
- Xspreading hacker language and the culture that goes with it to
- Xsuccessively larger populations, and we hope and expect that this one
- Xwill do likewise.
- X
- XOf Slang, Jargon, and Techspeak
- X===============================
- X
- XLinguists usually refer to informal language as `slang' and reserve
- Xthe term `jargon' for the technical vocabularies of various
- Xoccupations. However, the ancestor of this collection was called the
- X`Jargon File' and hackish slang is traditionally `the jargon'. When
- Xtalking about the jargon there is therefore no convenient way to
- Xdistinguish what a *linguist* would call hackers' jargon --- the
- Xformal vocabulary they learn from textbooks, technical papers, and
- Xmanuals.
- X
- XTo make a confused situation worse, the line between hackish slang and
- Xtechnical programming and computer science vocabulary is fuzzy, and
- Xshifts over time. Further, this technical vocabulary is shared with a
- Xwider technical culture of programmers, many of whom are not hackers
- Xand do not speak or recognize hackish slang.
- X
- XAccordingly, this lexicon will try to be as precise as the facts of
- Xusage permit about the distinctions between three categories:
- X
- X * `slang': informal language from mainstream English or non-techical
- X subcultures (bikers, rock fans, surfers, etc.).
- X * `jargon': without qualifier, denotes informal `slangy' language
- X peculiar to hackers --- the subject of this lexicon.
- X * `techspeak': the formal technical vocabulary of programming,
- X computer science, electronics, and other fields connected to hacking.
- X
- XThis terminology will be consistently used throughout the remainder of
- Xthis lexicon.
- X
- XThe jargon/techspeak distinction is the delicate one. A lot of
- Xtechspeak originated as jargon, and there is a steady continuing
- Xuptake of jargon into techspeak. On the other hand, a lot of jargon
- Xarises from overgeneralization of techspeak terms (there is more about
- Xthis in the `Jargon Construction' section below).
- X
- XIn general, we have considered techspeak any term which communicates
- Xprimarily by a denotation well established in textbooks, technical
- Xdictionaries, or standards documents.
- X
- XA few obviously techspeak terms (names of operating systems, languages
- Xor documents) are listed when they are tied to hacker folklore that
- Xisn't covered in formal sources, or sometimes to convey critical
- Xhistorical background necessary to understand other entries to which
- Xthey are cross-referenced. Some other techspeak senses of jargon
- Xwords have been listed in order to make the jargon senses clear; where
- Xthe text does not specify that a straight technical sense is under
- Xdiscussion, these are marked with `[techspeak]' as an etymology. Many
- Xentries have a sense #1 marked this way, with subsequent jargon
- Xmeanings explained in terms of it.
- X
- XRevision History
- X================
- X
- XThe original Jargon File was a collection of hacker jargon from
- Xtechnical cultures including the MIT AI Lab, the Stanford AI lab
- X(SAIL), the old ARPANET AI/LISP/PDP-10 communities, Bolt Beranek and
- XNewman (BBN), Carnegie-Mellon University (CMU), and Worcester
- XPolytechnic Institute (WPI).
- X
- XThe Jargon File (hereafter referred to as `jargon-1' or `the File')
- Xwas begun by Raphael Finkel at Stanford in 1975, though some terms in
- Xit date back considerably earlier ({frob} and some senses of
- X{moby}, for instance, go back to the Tech Model Railroad Club and
- XMIT and are believed to date at least back to the early 1960s). The
- Xrevisions of jargon-1 were all unnumbered and may be collectively
- Xconsidered `Version 1'.
- X
- XIn 1976, Mark Crispin brought the File to MIT; he and Guy Steele then
- Xadded a first wave of new entries. Raphael Finkel dropped out of
- Xactive participation shortly thereafter, and Don Woods became the SAIL
- Xcontact for the File (which was subsequently kept in duplicate at SAIL
- Xand MIT, with periodic re-synchronizations).
- X
- XThe File expanded by fits and starts until about 1983; Richard
- XStallman was prominent among the contributors, adding many MIT and
- XITS-related coinages.
- X
- XA late version of jargon-1, expanded with commentary for the mass
- Xmarket, was edited by Guy L. Steele into a book published in 1983 as
- X`The Hacker's Dictionary' (Harper & Row CN 1082, ISBN
- X0-06-091082-8). The other jargon-1 editors (Raphael Finkel, Don
- XWoods, and Mark Crispin) contributed to the revision, as did Richard
- XM. Stallman and Geoff Goodfellow. This book is hereafter referred to
- Xas `Steele-1983'. It is now out of print.
- X
- XShortly after the publication of Steele-1983, the File effectively
- Xstopped growing and changing. The PDP-10-centered cultures that had
- Xoriginally nourished it were dealt a serious blow by the cancellation
- Xof the Jupiter project at DEC; at the same time, the commercialization
- Xof AI technology lured some of their best and brightest away to
- Xstartups along the Route 128 strip in Massachusetts and in Silicon
- XValley. The AI-Lab culture died and its members dispersed; the File's
- Xcompilers moved on to other things.
- X
- XBy the mid-1980s the File's content was dated, but the legend that had
- Xgrown up around it never quite died out. The book, and softcopies
- Xobtained off the ARPANET, circulated even in cultures far removed from
- XMIT's and Stanford's; the content exerted a strong and continuing
- Xinfluence on hackish language and humor. Even as the advent of the
- Xmicrocomputer and other trends fueled a tremendous expansion of
- Xhackerdom, the File (and related materials like the AI Koans in
- XAppendix A) came to be seen as a sort of sacred epic, a hacker-culture
- XMatter of Britain chronicling the heroic exploits of the Knights of
- Xthe Lab. The pace of change in hackerdom at large accelerated
- Xtremendously, but the Jargon File passed from living document to icon
- Xand remained essentially untouched for seven years.
- X
- XThis revision contains nearly the entire text of a late version of
- Xjargon-1 (a few obsolete PDP-10-related entries have been dropped
- Xfollowing careful consultation with the editors of Steele-1983). It
- Xmerges in about about 80% of the Steele-1983 text, omitting some
- Xframing material and a very few entries introduced in Steele-1983
- Xwhich are now also obsolete.
- X
- XThis new version casts a wider net than the old jargon file; its aim
- Xis to cover not just AI but all the technical computing cultures
- Xwherein the true hacker-nature is manifested. More than half of the
- Xentries now derive from USENET and represent jargon now current in the
- XC and UNIX communities, but special efforts have been made to collect
- Xjargon from other cultures including IBM-PC programmers, Mac
- Xenthusiasts, and even the IBM mainframe world.
- X
- XWhere a term can be attributed to a particular subculture or is known
- Xto have originated there, we have tried to so indicate. Here is a
- Xlist of abbreviations used in etymologies:
- X
- XBerkeley
- X University of California at Berkeley
- XCambridge
- X The university in England (*not* the city in Massachusetts where
- X MIT happens to be located!)
- XBBN
- X Bolt, Beranek & Newman
- XCMU
- X Carnegie-Mellon University
- XCommodore
- X Commodore Business Machines
- XFidonet
- X See the {Fidonet} entry.
- XIBM
- X International Business Machines
- XMIT
- X Massachusetts Institute of Technology; esp. the legendary MIT AI Lab
- X culture of roughly 1971 to 1983. Some MITisms go back as far as the
- X Tech Model Railroad Club (TMRC) at MIT c.1960.
- XNYU
- X New York University
- XPurdue
- X Purdue University
- XSAIL
- X Stanford Artificial Intelligence Laboratory
- XStanford
- X Stanford University
- XSun
- X Sun Microsystems
- XUCLA
- X University of California at Los Angeles
- XUSENET
- X See the {USENET} entry.
- XWPI
- X Worcester Polytechnic Institute, site of a very active community of
- X PDP-10 hackers during the Seventies.
- XXerox PARC
- X Xerox's Palo Alto Research Center, site of much pioneering research in
- X user interface design and networking.
- XYale
- X Yale University
- X
- XSome other etymology abbreviations such as {UNIX}, {PDP-10}, etc.
- Xrefer to technical cultures surrounding specific operating systems,
- Xprocessors, or other environments. Note: the fact that a term is
- Xlabelled with any of these abbreviations does not necessarily mean its
- Xuse is confined to that culture. In particular, many terms labelled
- X`MIT' and `Stanford' are in quite general use. We have tried to give
- Xsome indication of speaker distribution in the usage notes.
- X
- XEric S. Raymond (eric@snark.thyrsus.com) maintains the new File with
- Xassistance from Guy L. Steele (gls@think.com); these are the persons
- Xprimarily reflected in the File's editorial `we', though we take
- Xpleasure in acknowledging the special contribution of the other
- Xcoauthors of Steele-1983. Please email all additions, corrections and
- Xcorrespondence relating to the jargon file to jargon@thyrsus.com
- X(UUCP-only sites without connections to an autorouting smart site can
- Xuse ...!uunet!snark!jargon).
- X
- X(Warning: other email addresses appear in this file *but are not
- Xguaranteed to be correct* later than the revision date on the first
- Xline. *Don't* email us if an attempt to reach your idol bounces
- X--- we have no magic way of checking addresses or looking up people)
- X
- XSome snapshot of this on-line version will become the main text of a
- X`New Hacker's Dictionary', to be published by MIT Press possibly as
- Xearly as Summer 1991. The maintainers are committed to updating the
- Xon-line version of the jargon file through and beyond paper
- Xpublication, and will continue to make it available to archives and
- Xpublic-access sites as a trust of the hacker community.
- X
- XHere is a chronology of the recent on-line revisions:
- X
- XVersion 2.1.1, Jun 12 1990: the jargon file comes alive again after a
- Xseven-year hiatus. Reorganization and massive additions were by Eric
- XS. Raymond, approved by Guy Steele. Many items of UNIX, C, USENET, and
- Xmicrocomputer-based jargon were added at that time (as well as The
- XUntimely Demise of Mabel The Monkey). Some obsolete usages (mostly
- XPDP-10 derived) were moved to Appendix B.
- X
- XVersion 2.1.5, Nov 28 1990: changes and additions by ESR in response to
- Xnumerous USENET submissions and comment from the First Edition co-authors.
- XThe bibliography (Appendix C) was also appended.
- X
- XVersion 2.2.1, Dec 15 1990: most of the contents of the 1983 paper
- Xedition edited by Guy Steele was merged in. Many more USENET
- Xsubmissions added, including the International Style and the material
- Xon Commonwealth Hackish. This version had 9394 lines, 75954 words,
- X490501 characters, and 1046 entries.
- X
- XVersion 2.3.1, Jan 03 1991: the great format change --- case is no
- Xlonger smashed in lexicon keys and cross-references. A very few
- Xentries from jargon-1 which were basically straight tech-speak were
- Xdeleted; this enabled the rest of Appendix B to be merged back into
- Xmain text and the appendix replaced with the Portrait of J. Random
- XHacker. More USENET submissions were added. This version had 10728
- Xlines, 85070 words, 558261 characters, and 1138 entries.
- X
- XVersion 2.4.1, Jan 14 1991: the Story of Mel and many more USENET
- Xsubmissions merged in. More material on hackish writing habits added.
- XNumerous typo fixes. This version had 12362 lines, 97819 words,
- X642899 characters, and 1239 entries.
- X
- XVersion 2.5.1, Jan 29 1991: many new entries merged in. Discussion of
- Xinclusion styles added. This version had 14145 lines, 111904 words,
- X734285 characters, and 1425 entries.
- X
- XVersion 2.6.1, Feb 13 1991: second great format change; no more <>
- Xaround headwords or references. Merged in results of serious
- Xcopy-editing passes by Guy Steele, Mark Brader. Still more entries
- Xadded. This version had 15011 lines, 118277 words, 774942 characters,
- Xand 1485 entries.
- X
- XVersion 2.7.1, Mar 1 1991: new section on slang/jargon/techspeak
- Xadded. Results of Guy's 2nd edit pass merged in. This version had
- X16087 lines, 126885 words, 831872 characters, and 1533 entries.
- X
- XVersion numbering: Read versions as major.minor.revision.
- XMajor version 1 is reserved for the `old' (ITS) Jargon File, jargon-1.
- XMajor version 2 encompasses revisions by ESR (Eric S. Raymond) with
- Xassistance from GLS (Guy Steele). Someday, the next maintainer will
- Xtake over and spawn `version 3'. Usually later versions will either
- Xcompletely supersede or incorporate earlier versions, so there is
- Xgenerally no point in keeping old versions around.
- X
- XOur thanks to the other co-authors of Steele-1983 for oversight and
- Xassistance; also to all the USENETters who contributed entries and
- Xencouragement. Special thanks go to our Scandinavian correspondent
- XPer Lindberg (per@front.se), author of the remarkable Swedish
- Xlanguage 'zine `Hackerbladet', for bringing FOO! comics to our
- Xattention and smuggling one of the IBM hacker underground's own baby
- Xjargon files out to us. Also, much gratitude to ace hacker/linguist
- XJoe Keane (jkg@osc.osc.com) for helping us improve the pronunciation
- Xguides; and to Maarten Litmaath for generously allowing the inclusion
- Xof the ASCII pronunciation guide he formerly maintained. Finally,
- XMark Brader (msb@sq.com) submitted many thoughtful comments and did
- Xyeoman service in catching typos and minor usage bobbles, and Eric
- XTiedemann (est@thyrsus.com) contributed sage advice on rhetoric,
- Xamphigory, and philosophunculism.
- X
- XFormat For New Entries
- X======================
- X
- XTry to conform to the format already being used --- head-words
- Xseparated from text by a colon (double colon for topic entries),
- Xcross-references in curly brackets (doubled for topic entries),
- Xpronunciations in slashes, etymologies in square brackets,
- Xsingle-space after definition numbers and word classes, etc. Stick to
- Xthe standard ASCII character set (no high-half characters or
- X[nt]roff/TeX/Scribe escapes), as one of the versions generated from
- Xthe master file is an info document that has to be viewable on a
- Xcharacter tty.
- X
- XWe are looking to expand the file's range of technical specialties covered.
- XThere are doubtless rich veins of jargon yet untapped in the scientific
- Xcomputing, graphics, and networking hacker communities; also in numerical
- Xanalysis, computer architectures and VLSI design, language design, and many
- Xother related fields. Send us your jargon!
- X
- XWe are *not* interested in straight technical terms explained by
- Xtextbooks or technical dictionaries unless an entry illuminates
- X`underground' meanings or aspects not covered by official histories.
- XWe are also not interested in `joke' entries --- there is a lot of
- Xhumor in the file but it must flow naturally out of the explanations
- Xof what hackers do and how they think.
- X
- XIt is OK to submit items of jargon you have originated if they have spread
- Xto the point of being used by people who are not personally acquainted with
- Xyou. We prefer items to be attested by independent submission from two
- Xdifferent sites.
- X
- XA few new definitions attached to entries are marked [proposed].
- XThese are usually generalizations suggested by editors or USENET
- Xrespondents in the process of commenting on previous definitions of
- Xthose entries. These are *not* represented as established
- Xjargon.
- X
- XThe jargon file will be regularly maintained and re-posted from now on and
- Xwill include a version number. Read it, pass it around, contribute --- this
- Xis *your* monument!
- X
- XJargon Construction
- X===================
- X
- XThere are some standard methods of jargonification which became
- Xestablished quite early (i.e. before 1970), spreading from such
- Xsources as the MIT Model Railroad Club, the PDP-1 SPACEWAR hackers,
- Xand John McCarthy's original crew of LISPers. These include:
- X
- XVerb doubling: A standard construction in English is to double a verb
- Xand use it as an exclamation, such as "Bang, bang!" or "Quack,
- Xquack!". Most of these are names for noises. Hackers also double
- Xverbs as a concise, sometimes sarcastic comment on what the implied
- Xsubject does. Also, a doubled verb is often used to terminate a
- Xconversation, in the process remarking on the current state of affairs
- Xor what the speaker intends to do next. Typical examples involve
- X{win}, {lose}, {hack}, {flame}, {barf}, {chomp}:
- X
- X "The disk heads just crashed." "Lose, lose."
- X "Mostly he talked about his latest crock. Flame, flame."
- X "Boy, what a bagbiter! Chomp, chomp!"
- X
- XSome verb-doubled constructions have special meanings not immediately
- Xobvious from the verb. These have their own listings in the lexicon.
- X
- XSoundalike slang: Hackers will often make rhymes or puns in order to
- Xconvert an ordinary word or phrase into something more interesting.
- XIt is considered particularly {flavorful} if the phrase is bent so
- Xas to include some other jargon word; thus the computer hobbyist
- Xmagazine `Dr. Dobb's Journal' is almost always referred to among
- Xhackers as `Dr. Frob's Journal' or simply `Dr. Frob's'. Terms of
- Xthis kind that have been in fairly wide use include names for
- Xnewspapers:
- X
- X Boston Herald American => Horrid (or Harried) American
- X Boston Globe => Boston Glob
- X Houston (or San Francisco) Chronicle => the Crocknicle
- X New York Times => New York Slime
- X
- XHowever, terms like these are often made up on the spur of the moment.
- XStandard examples include:
- X
- X Prime Time => Slime Time
- X Data General => Dirty Genitals
- X IBM 360 => IBM Three-Sickly
- X Government Property -- Do Not Duplicate (seen on keys)
- X => Government Duplicity -- Do Not Propagate
- X for historical reasons => for hysterical raisins
- X Margaret Jacks Hall => Marginal Hacks Hall
- X
- XThis is not really similar to the Cockney rhyming slang it has been
- Xcompared to in the past, because Cockney substitutions are opaque
- Xwhereas hacker punning jargon is intentionally transparent.
- X
- XThe -P convention: turning a word into a question by appending the
- Xsyllable `P'; from the LISP convention of appending the letter `P'
- Xto denote a predicate (a Boolean-valued function). The question
- Xshould expect a yes/no answer, though it needn't. (See T and NIL.)
- X
- X At dinnertime:
- X Q: "Foodp?"
- X A: "Yeah, I'm pretty hungry." or "T!"
- X
- X Q: "State-of-the-world-P?"
- X A: (Straight) "I'm about to go home."
- X A: (Humorous) "Yes, the world has a state."
- X
- X On the phone to Florida:
- X Q: "State-p Florida?"
- X A: "Been reading JARGON.TXT again, eh?"
- X
- X[One of the best of these is a {Gosperism} Once, when we were at a
- XChinese restaurant, Bill Gosper wanted to know whether someone would
- Xlike to share with him a two-person-sized bowl of soup. His inquiry
- Xwas: "Split-p soup?" ---GLS]
- X
- XOvergeneralization: A very conspicuous feature of jargon is the
- Xfrequency with which techspeak items like names of program tools,
- Xcommand language primitives, and even assembler opcodes are applied to
- Xcontexts outside of computing wherever hackers find amusing analogies
- Xto them. Thus, (to cite one of the best-known examples) UNIX hackers
- Xoften {grep} for things rather than searching for them. Many of the
- Xlexicon entries are generalizations of exactly this kind.
- X
- XHackers enjoy overgeneralization on the grammatical level as well.
- XMany hackers love to take various words and add the wrong endings to
- Xthem to make nouns and verbs, often by extending a standard rule to
- Xnonuniform cases (or vice versa). For example, because
- X
- X porous => porosity
- X generous => generosity
- X
- Xhackers happily generalize:
- X
- X mysterious => mysteriosity
- X ferrous => ferrosity
- X obvious => obviosity
- X dubious => dubiosity
- X
- XAlso, note that all nouns can be verbed. E.g.: "All nouns can be
- Xverbed", "I'll mouse it up", "Hang on while I clipboard it over",
- X"I'm grepping the files". English as a whole is already heading in
- Xthis direction (towards pure-positional grammar like Chinese);
- Xhackers are simply a bit ahead of the curve.
- X
- XSimilarly, all verbs can be nouned. Thus:
- X
- X win => winnitude, winnage
- X disgust => disgustitude
- X hack => hackification
- X
- XFinally, note the prevalence of certain kinds of nonstandard plural
- Xforms. Almost anything ending in `x' may form plurals in -xen (see
- X{VAXen} and {boxen} in the main text). Even words ending in
- Xphonetic /k/ alone are sometimes treated this way; e.g. `soxen' for a
- Xbunch of socks. Other funny plurals are `frobbotzim' for the plural
- Xof {frobboz} (see main text) and `Unices' and `Tenices' (rather than
- X`Unixes' and `Tenexes'; see {UNIX}, {TENEX} in main text). But
- Xnote that `Unixen' and `Tenexen' are *never* used; it has been
- Xsuggested that this is because `-ix' and `-ex' are Latin singular
- Xendings that attract a Latinate plural.
- X
- XThe pattern here, as with other hackish grammatical quirks, is
- Xgeneralization of an inflectional rule which (in English) is either
- Xan import or a fossil (such as Hebrew plural in `-im', or the
- XAnglo-Saxon plural in `en') to cases where it isn't normally
- Xconsidered to apply.
- X
- XThis is not `poor grammar', as hackers are generally quite well
- Xaware of what they are doing when they distort the language. It is
- Xgrammatical creativity, a form of playfulness.
- X
- XSpoken inarticulations: Words such as `mumble', `sigh', and
- X`groan' are spoken in places where their referent might more
- Xnaturally be used. It has been suggested that this usage derives from
- Xthe impossibility of representing such noises on a comm link or in
- Xemail. Another expression sometimes heard is "Complain!", meaning
- X"I have a complaint!"
- X
- XOf the five listed constructions, verb doubling, peculiar noun
- Xformations, and (especially!) spoken inarticulations have become quite
- Xgeneral; but punning jargon is still largely confined to MIT and other
- Xlarge universities, and the -P convention is found only where LISPers
- Xflourish.
- X
- XFinally, note that many words in hacker jargon have to be
- Xunderstood as members of sets of comparatives. This is especially
- Xtrue of the adjectives and nouns used to describe the beauty and
- Xfunctional quality of code. Here is an approximately correct
- Xspectrum:
- X
- X MONSTROSITY BRAIN-DAMAGE SCREW BUG LOSE MISFEATURE
- X CROCK KLUGE HACK WIN FEATURE ELEGANCE PERFECTION
- X
- XThe last is spoken of as a mythical absolute, approximated but never
- Xactually attained. Coinages for describing {lossage} seem to call
- Xforth the very finest in hackish linguistic inventiveness; it has been
- Xtruly said that "{Computer geeks} have more words for equipment
- Xfailures than Inuit have for snow", or than Yiddish has for obnoxious
- Xpeople.
- X
- XHacker Speech Style
- X===================
- X
- XThis features extremely precise diction, careful word choice, a
- Xrelatively large working vocabulary, and relatively little use of
- Xcontractions or `street slang'. Dry humor, irony, puns, and a
- Xmildly flippant attitude are highly valued --- but an underlying
- Xseriousness and intelligence is essential. One should use just
- Xenough jargon to communicate precisely and identify oneself as `in
- Xthe culture'; overuse of jargon or a breathless, excessively
- Xgung-ho attitude are considered tacky and the mark of a loser.
- X
- XThis speech style is a variety of the precisionist English normally
- Xspoken by scientists, design engineers, and academics in technical
- Xfields. Unlike the jargon construction methods, it is fairly constant
- Xthroughout hackerdom.
- X
- XIt has been observed that many hackers are confused by negative
- Xquestions --- or, at least, the people they're talking to are often
- Xconfused by the sense of their answers. The problem is that they've
- Xdone so much coding that distinguishes between
- X
- X if (going) {
- X
- Xand
- X
- X if (!going) {
- X
- Xthat when they parse the question "Aren't you going?" it seems to be
- Xasking the opposite question from "Are you going?", and so merits an
- Xanswer in the opposite sense. This confuses English-speaking
- Xnon-hackers because they were taught to answer as though the negative
- Xpart weren't there. In some other languages (including Russian,
- XChinese and Japanese) the hackish interpretation is standard and the
- Xproblem wouldn't arise. Hackers often find themselves wishing for a
- Xword like French `si' or German `doch' with which one could
- Xunambiguously answer `yes' to a negative question.
- X
- XFor similar reasons, English-speaking hackers almost never use a
- Xdouble negative even if they live in a region where colloquial usage
- Xallows it. The thought of uttering something that logically ought to
- Xbe an affirmative knowing it will be mis-parsed as a negative tends to
- Xdisturb them.
- X
- XHacker Writing Style
- X====================
- X
- XHackers tend to use quotes as balanced delimiters like parentheses,
- Xmuch to the dismay of American editors. Thus, if "Jim is going" is
- Xa phrase, and so is "Bill runs" and "Spock groks", then hackers
- Xgenerally prefer to write: "Jim is going", "Bill runs", and
- X"Spock groks". This is incorrect according to standard American
- Xusage (which would put the continuation commas and the final period
- Xinside the string quotes) but it is counter-intuitive to hackers to
- Xmutilate literal strings with characters that don't belong in them.
- XGiven the sorts of examples that can come up in discussing
- Xprogramming, American-style quoting can even be grossly misleading.
- XWhen communicating command lines or small pieces of code, extra
- Xcharacters can be a real pain in the neck. For example:
- X
- X First do "foo -acrZ tempo | bar -," then ...
- X
- Xis different from
- X
- X First do "foo -acrZ tempo | bar -", then ...
- X
- Xfrom a computer's point of view. While the first is correct according
- Xto the stylebooks and would probably be parsed correctly by the a
- Xhuman recipient, the second is unambiguous. The Jargon File follows
- Xhackish usage consistently throughout.
- X
- XInterestingly, a similar style is now preferred practice in Great
- XBritain, though the older style (which became established for
- Xtypographical reasons having to do with the aesthetics of comma and
- Xquotes in typeset text) is still accepted there. Hart's Rules and the
- XOxford Dictionary for Writers and Editors call the hacker-like style
- X`new' or `logical' style quoting.
- X
- XAnother hacker quirk about quoting style is a tendency to distinguish
- Xbetween `scare' quotes and `speech' quotes; that is, to use
- XBritish-style single quotes for marking and reserve American-style
- Xdouble quotes for actual reports of speech or text included from
- Xelsewhere. Interestingly, some authorities describe this as correct
- Xgeneral usage, but mainstream American English has gone to using
- Xdouble-quotes thoroughly enough that hacker usage appears marked [and,
- Xin fact, I thought this was a personal quirk of mine until I checked
- Xwith USENET --- ESR]. One further permutation that is definitely
- X*not* standard is a hackish tendency to do marking quotes by
- Xusing apostrophes in pairs; that is, 'like this'. This is modelled on
- Xstring and character literal syntax in some programming languages
- X(reinforced by the fact that many character-only terminals display a
- Xvertical single quote).
- X
- XThere seems to be a meta-rule behind these nonstandard hackerisms to
- Xthe effect that precision of expression is more important than
- Xconformance to traditional rules; where the latter create ambiguity or
- Xlose information they can be discarded without a second thought. It
- Xis notable in this respect that other hackish inventions (for example,
- Xin vocabulary) also tend to carry very precise shades of meaning even
- Xwhen constructed to appear slangy and loose. In fact, to a hacker,
- Xthe contrast between `loose' form and `tight' content in jargon is a
- Xsubstantial part of its humor!
- X
- XThere is another respect in which hackish usage often parallels
- XBritish usage; it tends to choose British spellings whenever these
- Xseem more phonetically consistent than the American ones.
- X
- XHackers have also developed a number of punctuation and emphasis
- Xconventions adapted to single-font all-ASCII communications links, and
- Xthese are occasionally carried over into written documents even when
- Xnormal means of font changes, underlining, and the like are available.
- X
- XOne of these is that TEXT IN ALL CAPS IS INTERPRETED AS `LOUD', and
- Xthis becomes such an ingrained synesthetic reflex that a person who
- Xgoes to caps-lock while in {talk mode} may be asked to "stop
- Xshouting, please, you're hurting my ears!".
- X
- XAlso, it is common to use bracketing with asterisks to signify
- Xemphasis, as in "What the *hell*?" (note that this interferes with
- Xthe common use of asterisk suffix as a footnote mark). An alternative
- Xform uses paired slash and backslash: "What the \hell/?". The
- Xlatter is never used in text documents, as many formatters treat
- Xbackslash as an escape and may do inappropriate things with the
- Xfollowing text. Also note that there is a semantic difference between
- X*emphasis like this*, (which emphasizes the phrase as a whole) and
- X*emphasis* *like* *this* (which suggests the writer speaking very
- Xslowly and distinctly, as if to a very young child or mentally
- Ximpaired person).
- X
- XIn a formula, `*' signifies multiplication but two asterisks in a
- Xrow are a shorthand for exponentiation (this derives from FORTRAN).
- XThus, one might write `2 ** 8 = 256'.
- X
- XAnother notation for exponentiation one sees more frequently uses the
- Xcaret (^, ASCII 1011110); one might write instead `2 ^ 8 = 256'.
- XThis goes all the way back to Algol-60, which used the archaic ASCII
- X`up-arrow' that later became caret; this was picked up by Kemeny &
- XKurtz's original BASIC, which in turn influenced the design of the
- Xbc(1) and dc(1) UNIX tools that have probably done most to reinforce
- Xthe convention on USENET. The notation is mildly confusing to C
- Xprogrammers, because `^' means logical {XOR} in C. Despite
- Xthis, it was favored 3:1 over ** in a late-1990 snapshot of USENET.
- XIt is used consistently in this text.
- X
- XAnother on-line convention, used especially for very large or very small
- Xnumbers, is taken from C (which derived it from FORTRAN). This is a
- Xform of `scientific notation' using `e' to replace `*10^'; for example,
- Xone year is about 3e7 seconds long .
- X
- XThe tilde (`~') is commonly used in a quantifying sense of
- X`approximately'; that is, `~50' means `about fifty'.
- X
- XUnderlining is often suggested by substituting underscores for spaces
- Xand prepending and appending one underscore to the underlined phrase.
- XExample: "It is often alleged that Haldeman wrote _The_Forever_War_
- Xin response to Robert Heinlein's earlier _Starship_Troopers_."
- XOccasionally this underline indication is used for emphasis, like the
- Xpaired asterisks.
- X
- XThere is also an accepted convention for `writing under erasure'; the
- Xtext
- X
- X Be nice to this fool^H^H^H^Hgentleman, he's in from corporate HQ.
- X
- Xwould be read as "Be nice to this fool, I mean this gentleman...".
- XThis comes from the fact that the digraph ^H is often used as a print
- Xrepresentation for a backspace. It parallels (and may have been
- Xinfluenced by) the ironic use of `slashouts' in SF fanzines.
- X
- XOn USENET and in the {MUD} world, common C boolean, logical, and
- Xrelational operators such as (`|', `&', `!', `==', `!=', `>', and `<')
- Xare often combined with English. The Pascal not-equals, `<>', is also
- Xrecognized. The use of prefix `!' as a loose synonym for `not-' or
- X`no-' is particularly common; thus, `!clue' is read `no-clue' or
- X`clueless'.
- X
- XAnother habit is that of using angle-bracket enclosure to genericize a
- Xterm; this derives from conventions used in {BNF}. Uses like the
- Xfollowing are common:
- X
- X So this <ethnic> walks into a bar one day, and...
- X
- XOne quirk that shows up frequently in the {email} style of UNIX
- Xhackers in particular is a tendency for some things which are normally
- Xall-lowercase (including usernames and the names of commands and C
- Xroutines) to remain uncapitalized even when they occur at the
- Xbeginning of sentences. It is clear that, for many hackers, the case
- Xof such identifiers becomes a part of their internal representation
- X(the `spelling') and cannot be overridden without mental effort (an
- Xappropriate reflex because UNIX and C both distinguish cases and
- Xconfusing them can lead to lossage). A way of escaping this dilemma
- Xis simply to avoid using these constructions at the beginning of
- Xsentences.
- X
- XHackers also mix letters and numbers more freely than in mainstream
- Xusage. In particular, it is good hackish style to write a digit
- Xsequence where you intend the reader to understand the text string
- Xthat names that number in English. So, hackers write "1970s" rather
- Xthan "nineteen-seventies" or "1970's" (the later looks like a
- Xpossessive).
- X
- XFinally, it should be noted that hackers exhibit much less reluctance
- Xto use multiply nested parentheses than is normal in English. Partly
- Xthis is almost certainly due to influence from LISP ((which uses
- Xdeeply nested parentheses (like this) in its syntax) (a lot (see?))),
- Xbut it has also been suggested that a more basic hacker trait of
- Xenjoying playing with complexity and pushing systems to their limits
- Xis in operation.
- X
- XOne area where hackish conventions for on-line writing are still in
- Xsome flux is the marking of included material from earlier messages
- X--- what would be called `block quotations' in ordinary English. From
- Xthe usual typographic convention employed for these (smaller font at
- Xan extra indent), there derived the notation of included text being
- Xindented by one ASCII TAB (0001001) character, which under UNIX and
- Xmany other environments gives the appearance of an 8-space indent.
- X
- XEarly mail and netnews readers had no facility for including messages
- Xthis way, so people had to paste in copy manually. BSD `Mail(1)'
- Xwas the first message agent to support inclusion, and early USENETters
- Xemulated its style. But the TAB character tended to push included
- Xtext too far to the right (especially in multiply nested inclusions),
- Xleading to ugly wraparounds. After a brief period of confusion
- X(during which an inclusion leader consisting of three or four spaces
- Xbecame established in EMACS and a few mailers), the use of leading ">"
- Xor "> " became standard, perhaps because the character suggests
- Xmovement to the right (alternatively, it may derive from the ">" that
- Xsome V7 UNIX mailers use to quote leading instances of "From" in
- Xtext). Inclusions within inclusions keep their ">" leaders, so the
- X`nesting level' of a quotation is visually apparent.
- X
- XA few other idiosyncratic quoting styles survive because they're
- Xautomatically generated. One particularly ugly one looks like this:
- X
- X /* Written hh:mm pm Mmm dd, yyyy by user@site in local:group */
- X /* ---------- "Subject of article chopped to 35 ch" ---------- */
- X <<quoted text>>
- X /* End of text from local:group */
- X
- XIt's generated by an elderly, variant news-reading system called
- X`notesfiles'. The overall trend, however, is definitely away from
- Xsuch verbosity.
- X
- XThe practice of including text helped solve what had been a major
- Xnuisance on USENET: the fact that articles do not arrive at different
- Xsites in the same order. Careless posters used to post articles that
- Xwould begin with, or even consist entirely of, "No, that's wrong",
- Xor "I agree" or the like. It was hard to see who was responding to
- Xwhat. Consequently, in about 1984, new news-posting software was
- Xcreated with a facility to automatically include the text of a
- Xprevious article, marked with "> " or whatever the poster chose. The
- Xposter was expected to delete all but the relevant lines. The result
- Xhas been that, now, careless posters post articles containing the
- X*entire* text of a preceding article, *followed* only by
- X"No, that's wrong" or "I agree".
- X
- XMany people feel that this cure is worse than the original disease,
- Xand there soon appeared newsreader software designed to let the reader
- Xskip over included text if desired. Today, some posting software
- Xrejects articles containing too high a proportion of lines beginning
- Xwith ">", but this too has led to undesirable workarounds such as the
- Xdeliberate inclusion of zero-content filler lines which aren't quoted
- Xand thus pull the message below the rejection threshold.
- X
- XBecause the default mailers supplied with UNIX and other operating
- Xsystems haven't evolved as quickly as human usage, the older
- Xconventions using a leading TAB or three or four spaces are still
- Xalive; however, >-inclusion is now clearly the prevalent form in both
- Xnetnews and mail.
- X
- XPractice is still evolving, and disputes over the `correct' inclusion
- Xstyle occasionally leads to {holy wars}. One variant style reported
- Xuses the citation character `|' in place of `>' for extended
- Xquotations where original variations in indentation are being
- Xretained. One also sees different styles of quoting a number of
- Xauthors in the same message: one (deprecated because it loses
- Xinformation) uses a leader of "> " for everyone, another (the most
- Xcommon) is "> > > > ", "> > > ", etc. (or ">>>> ", ">>> ", etc.,
- Xdepending on line length and nesting depth) reflecting the original
- Xorder of messages, and yet another is to use a different citation
- Xleader for each author, say "> ", ": ", "| ", "} " (preserving
- Xnesting so that the inclusion order of messages is still apparent, or
- Xtagging the inclusions with authors' names). Yet *another* style
- Xis to use each poster's initials (or login name) as a citation leader
- Xfor that poster. Occasionally one sees a "# " leader used for
- Xquotations from *authoritative* sources such as standards
- Xdocuments; the intended allusion is to the root prompt (the special
- XUNIX command prompt issued when one is running as the privileged
- Xsuper-user).
- X
- XFinally, it is worth mentioning that many studies of on-line
- Xcommunication have shown that electronic links have a de-inhibiting
- Xeffect on people. Deprived of the body-language cues through which
- Xemotional state is expressed, people tend to forget everything about
- Xother parties except what is presented over that ASCII link. This has
- Xboth good and bad effects. The good one is that it encourages
- Xhonesty and tends to break down hierarchical authority relationships;
- Xthe bad is that it may encourage depersonalization and gratuitous
- Xrudeness.
- X
- XPerhaps in response to this, experienced netters often display a sort
- Xof conscious formal politesse in their writing that has passed out of
- Xfashion in other spoken and written media (for example, the phrase
- X"Well said, sir!" is not uncommon).
- X
- XMany introverted hackers who are next to inarticulate in person
- Xcommunicate with considerable fluency over the net, perhaps precisely
- Xbecause they can forget on an unconscious level that they are dealing
- Xwith people and thus don't feel stressed and anxious as they would
- Xface to face.
- X
- XThough it is considered gauche to publicly criticize posters for poor
- Xspelling or grammar, the network definitely places a premium on
- Xliteracy and clarity of expression. It may well be that future
- Xhistorians of literature will see in it a revival of the great
- Xtradition of personal letters as art.
- X
- XInternational Style
- X===================
- X
- XAlthough the Jargon File remains primarily a lexicon of hacker usage
- Xin American English, we have made some effort to get input from
- Xabroad. Though the hacker-speak of other languages often uses
- Xtranslations of jargon from English (often as transmitted to them by
- Xearlier Jargon File versions!), the local variations are interesting,
- Xand knowledge of them may be of some use to travelling hackers.
- X
- XThere are some references herein to `Commonwealth English'. These are
- Xintended to describe some variations in hacker usage as reported in
- Xthe English spoken in Great Britain and the Commonwealth (Canada,
- XAustralia, India, etc., though Canada is heavily influenced by
- XAmerican usage). There is also an entry on {{Commonwealth Hackish}}
- Xreporting some general phonetic and vocabulary differences from U.S.
- Xhackish.
- X
- XHackers in Western Europe and (especially) Scandinavia are reported
- Xto often use a mixture of English and their native languages for
- Xtechnical conversation. Occasionally they develop idioms in their
- XEnglish usage which are influenced by their native-language styles.
- XSome of these are reported here.
- X
- XA note or two on hackish usages in Russian have been added where they
- Xare parallel with English idioms and thus comprehensible to
- XEnglish-speakers.
- X
- XPronunciation Guide
- X===================
- X
- XPronunciation keys are provided in the jargon listing for all
- Xentries that are neither dictionary words pronounced as in standard
- XEnglish nor obvious compounds of same. Slashes bracket a phonetic
- Xpronunciation to be interpreted using the following conventions:
- X
- X 1. Syllables are hyphen-separated, except that an apostrophe
- X or back-apostrophe follows each accented syllable (the
- X back apostrophe marks a secondary accent in some words of
- X four or more syllables).
- X
- X 2. Consonants are pronounced as in American English. The letter `g' is
- X always hard (as in "got" rather than "giant"); `ch' is soft
- X ("church" rather than "chemist"). The letter `j' is the sound
- X that occurs twice in "judge". The letter `s' is always as in
- X "pass", never a z sound (but it is sometimes doubled at the end of
- X syllables to emphasize this).
- X The digraph `kh' is the guttural of "loch" or "l'chaim".
- X
- X 3. Vowels are represented as follows:
- X
- X a back, that
- X ah father, palm
- X ar far, mark
- X aw flaw, caught
- X ay bake, rain
- X e less, men
- X ee easy, ski
- X eir their, software
- X i trip, hit
- X ie life, sky
- X o cot, top
- X oh flow, sew
- X oo loot, through
- X or more, door
- X ow out, how
- X oy boy, coin
- X uh but, some
- X u put, foot
- X y yet
- X yoo few
- X [y]oo /oo/ with optional fronting as in `news' (/nooz/ or /nyooz/)
- X
- XAn at-sign is used for the `schwa' sound of unstressed or occluded
- Xvowels (the one that is often written with an upside-down `e'). The
- Xschwa vowel is omitted in syllables containing vocalic r, l, m or n;
- Xthat is, `kitten' and `color' would be rendered /kit'n/ and /kuhl'r/,
- Xnot /kit'@n/ and /kuhl'@r/.
- X
- XOther Lexicon Conventions
- X=========================
- X
- XEntries are sorted in case-blind ASCII collation order (rather than
- Xthe letter-by-letter order ignoring interword spacing common in
- Xmainstream dictionaries), except that all entries beginning with
- Xnonalphabetic characters are sorted to the beginning. The
- Xcase-blindness is a feature, not a bug.
- X
- XThe `OED' referred to in several entries is, of course, the Oxford
- XEnglish Dictionary.
- X
- XIn pure ASCII renderings of the Jargon File, you will see {} used
- Xto bracket words which themselves have entries in the File. This
- Xisn't done all the time for every such word, but it is done everywhere
- Xthat a reminder seems useful that the term has a jargon meaning and one
- Xmight wish to refer to its entry.
- X
- XIn this all-ASCII version, headwords for topic entries are
- Xdistinguished from those for ordinary entries by being followed by
- SHAR_EOF
- true || echo 'restore of jargon.ascii failed'
- fi
- echo 'End of part 1, continue with part 2'
- echo 2 > _shar_seq_.tmp
- exit 0
-