The Hacker's Dictionary - - (the best novels to read .txt) 📗
- Author: -
- Performer: 0262680920
Book online «The Hacker's Dictionary - - (the best novels to read .txt) 📗». Author -
:cruftsmanship: /kruhfts'm*n-ship / n. [from {cruft}] The antithesis of craftsmanship.
:crufty: /kruhf'tee/ [origin unknown; poss. from crusty' orcruddy'] adj. 1. Poorly built, possibly over-complex. The {canonical} example is "This is standard old crufty DEC
software". In fact, one fanciful theory of the origin of crufty' holds that was originally a mutation ofcrusty'
applied to DEC software so old that the s' characters were tall and skinny, looking more likef' characters. 2. Unpleasant, especially to the touch, often with encrusted junk. Like spilled coffee smeared with peanut butter and catsup. 3. Generally unpleasant. 4. (sometimes spelled `cruftie') n. A small crufty object (see {frob}); often one that doesn't fit well into the scheme of things. "A LISP property list is a good place to store crufties (or, collectively, {random} cruft)."
:crumb: n. Two binary digits; a {quad}. Larger than a {bit}, smaller than a {nybble}. Considered silly. Syn. {tayste}.
:crunch: 1. vi. To process, usually in a time-consuming or complicated way. Connotes an essentially trivial operation that is nonetheless painful to perform. The pain may be due to the triviality's being embedded in a loop from 1 to 1,000,000,000.
"FORTRAN programs do mostly {number-crunching}." 2. vt. To reduce the size of a file by a complicated scheme that produces bit configurations completely unrelated to the original data, such as by a Huffman code. (The file ends up looking like a paper document would if somebody crunched the paper into a wad.) Since such compression usually takes more computations than simpler methods such as run-length encoding, the term is doubly appropriate. (This meaning is usually used in the construction `file crunch(ing)' to distinguish it from {number-crunching}.) See {compress}.
n. The character `#'. Used at XEROX and CMU, among other places. See {{ASCII}}. 4. vt. To squeeze program source into a minimum-size representation that will still compile or execute.The term came into being specifically for a famous program on the BBC micro that crunched BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). {Obfuscated C Contest} entries are often crunched; see the first example under that entry.
:cruncha cruncha cruncha: /kruhn'ch kruhn'ch kruhn'ch*/ interj.
An encouragement sometimes muttered to a machine bogged down in a serious {grovel}. Also describes a notional sound made by groveling hardware. See {wugga wugga}, {grind} (sense 3).
:cryppie: /krip'ee/ n. A cryptographer. One who hacks or implements cryptographic software or hardware.
:CTSS: /C-T-S-S/ n. Compatible Time-Sharing System. An early (1963) experiment in the design of interactive time-sharing operating systems, ancestral to {{Multics}}, {{UNIX}}, and {{ITS}}. The name {{ITS}} (Incompatible Time-sharing System) was a hack on CTSS, meant both as a joke and to express some basic differences in philosophy about the way I/O services should be presented to user programs.
:CTY: /sit'ee/ or /C-T-Y/ n. [MIT] The terminal physically associated with a computer's system {{console}}. The term is a contraction of Console {tty}', that is,Console TeleTYpe'.
This {{ITS}}- and {{TOPS-10}}-associated term has become less common, as most UNIX hackers simply refer to the CTY as `the console'.
:cube: n. 1. [short for `cubicle'] A module in the open-plan offices used at many programming shops. "I've got the manuals in my cube." 2. A NeXT machine (which resembles a matte-black cube).
:cubing: [parallel with `tubing'] vi. 1. Hacking on an IPSC (Intel Personal SuperComputer) hypercube. "Louella's gone cubing again!!" 2. Hacking Rubik's Cube or related puzzles, either physically or mathematically. 3. An indescribable form of self-torture (see sense 1 or 2).
:cursor dipped in X: n. There are a couple of metaphors in English of the form `pen dipped in X' (perhaps the most common values of X
are acid',bile', and `vitriol'). These map over neatly to this hackish usage (the cursor being what moves, leaving letters behind, when one is composing on-line). "Talk about a {nastygram}! He must've had his cursor dipped in acid when he wrote that one!"
:cuspy: /kuhs'pee/ [WPI: from the DEC abbreviation CUSP, for `Commonly Used System Program', i.e., a utility program used by many people]
adj. 1. (of a program) Well-written. 2. Functionally excellent. A program that performs well and interfaces well to users is cuspy.
See {rude}. 3. [NYU] Said of an attractive woman, especially one regarded as available. Implies a certain curvaceousness.
:cut a tape: vi. To write a software or document distribution on magnetic tape for shipment. Has nothing to do with physically cutting the medium! Early versions of this lexicon claimed that one never analogously speaks of cutting a disk', but this has since been reported as live usage. Related slang usages are mainstream business'scut a check', the recording industry's cut a record', and the military'scut an order'.
All of these usages reflect physical processes in obsolete recording and duplication technologies. The first stage in manufacturing an old-style vinyl record involved cutting grooves in a stamping die with a precision lathe. More mundanely, the dominant technology for mass duplication of paper documents in pre-photocopying days involved "cutting a stencil", punching away portions of the wax overlay on a silk screen. More directly, paper tape with holes punched in it was an inportant early storage medium.
:cybercrud: /si:'ber-kruhd/ [coined by Ted Nelson] n. Obfuscatory tech-talk. Verbiage with a high {MEGO} factor. The computer equivalent of bureaucratese.
:cyberpunk: /si:'ber-puhnk/ [orig. by SF writer Bruce Bethke and/or editor Gardner Dozois] n.,adj. A subgenre of SF launched in 1982 by William Gibson's epoch-making novel `Neuromancer'
(though its roots go back through Vernor Vinge's `True Names'
(see "{True Names ... and Other Dangers}" in appendix C) to John Brunner's 1975 novel `The Shockwave Rider'). Gibson's near-total ignorance of computers and the present-day hacker culture enabled him to speculate about the role of computers and hackers in the future in ways hackers have since found both irritatingly na"ive and tremendously stimulating.
Gibson's work was widely imitated, in particular by the short-lived but innovative "Max Headroom" TV series. See {cyberspace}, {ice}, {jack in}, {go flatline}.
:cyberspace: /si:'ber-spays/ n. 1. Notional `information-space'
loaded with visual cues and navigable with brain-computer interfaces called cyberspace decks'; a characteristic prop of {cyberpunk} SF. At the time of this writing (mid-1991), serious efforts to construct {virtual reality} interfaces modeled explicitly on Gibsonian cyberspace are already under way, using more conventional devices such as glove sensors and binocular TV headsets. Few hackers are prepared to deny outright the possibility of a cyberspace someday evolving out of the network (see {network, the}). 2. Occasionally, the metaphoric location of the mind of a person in {hack mode}. Some hackers report experiencing strong eidetic imagery when in hack mode; interestingly, independent reports from multiple sources suggest that there are common features to the experience. In particular, the dominant colors of this subjectivecyberspace' are often gray and silver, and the imagery often involves constellations of marching dots, elaborate shifting patterns of lines and angles, or moire patterns.
:cycle: 1. n. The basic unit of computation. What every hacker wants more of (noted hacker Bill Gosper describes himself as a "cycle junkie"). One can describe an instruction as taking so many clock cycles'. Often the computer can access its memory once on every clock cycle, and so one speaks also ofmemory cycles'. These are technical meanings of {cycle}. The jargon meaning comes from the observation that there are only so many cycles per second, and when you are sharing a computer the cycles get divided up among the users. The more cycles the computer spends working on your program rather than someone else's, the faster your program will run. That's why every hacker wants more cycles: so he can spend less time waiting for the computer to respond. 2. By extension, a notional unit of human thought power, emphasizing that lots of things compete for the typical hacker's think time. "I refused to get involved with the Rubik's Cube back when it was big. Knew I'd burn too many cycles on it if I let myself." 3. vt. Syn. {bounce}, {120 reset}; from the phrase `cycle power'. "Cycle the machine again, that serial port's still hung."
:cycle crunch: n. A situation where the number of people trying to use the computer simultaneously has reached the point where no one can get enough cycles because they are spread too thin and the system has probably begun to {thrash}. This is an inevitable result of Parkinson's Law applied to timesharing. Usually the only solution is to buy more computer. Happily, this has rapidly become easier in recent years, so much so that the very term `cycle crunch' now has a faintly archaic flavor; most hackers now use workstations or personal computers as opposed to traditional timesharing systems.
:cycle drought: n. A scarcity of cycles. It may be due to a {cycle crunch}, but it could also occur because part of the computer is temporarily not working, leaving fewer cycles to go around.
"The {high moby} is {down}, so we're running with only half
Comments (0)