The Hacker's Dictionary - - (the best novels to read .txt) 📗
- Author: -
- Performer: 0262680920
Book online «The Hacker's Dictionary - - (the best novels to read .txt) 📗». Author -
:EBCDIC:: /eb's-dik/, /eb'see`dik/, or /eb'k-dik/ [abbreviation, Extended Binary Coded Decimal Interchange Code] n. An alleged character set used on IBM {dinosaur}s. It exists in at least six mutually incompatible versions, all featuring such delights as non-contiguous letter sequences and the absence of several ASCII punctuation characters fairly important for modern computer languages (exactly which characters are absent varies according to which version of EBCDIC you're looking at). IBM adapted EBCDIC
from {{punched card}} code in the early 1960s and promulgated it as a customer-control tactic (see {connector conspiracy}), spurning the already established ASCII standard. Today, IBM claims to be an open-systems company, but IBM's own description of the EBCDIC variants and how to convert between them is still internally classified top-secret, burn-before-reading. Hackers blanch at the very name of EBCDIC and consider it a manifestation of purest {evil}. See also {fear and loathing}.
:echo: [FidoNet] n. A {topic group} on {FidoNet}'s echomail system. Compare {newsgroup}.
:eighty-column mind: [IBM] n. The sort said to be possessed by persons for whom the transition from {punched card} to tape was traumatic (nobody has dared tell them about disks yet). It is said that these people, including (according to an old joke) the founder of IBM, will be buried `face down, 9-edge first' (the 9-edge being the bottom of the card). This directive is inscribed on IBM's 1402 and 1622 card readers and is referenced in a famous bit of doggerel called "The Last Bug", the climactic lines of which are as follows:
He died at the console Of hunger and thirst. Next day he was buried, Face down, 9-edge first.The eighty-column mind is thought by most hackers to dominate IBM's customer base and its thinking. See {IBM}, {fear and loathing}, {card walloper}.
:El Camino Bignum: /el' k*-mee'noh big'nuhm/ n. The road mundanely called El Camino Real, a road through the San Francisco peninsula that originally extended all the way down to Mexico City and many portions of which are still intact. Navigation on the San Francisco peninsula is usually done relative to El Camino Real, which defines {logical} north and south even though it isn't really north-south many places. El Camino Real runs right past Stanford University and so is familiar to hackers.
The Spanish word real' (which has two syllables: /ray-ahl'/) meansroyal'; El Camino Real is `the royal road'. In the FORTRAN
language, a `real' quantity is a number typically precise to 7
significant digits, and a double precision' quantity is a larger floating-point number, precise to perhaps fourteen significant digits (other languages have similarreal' types).
When a hacker from MIT visited Stanford in 1976, he remarked what a long road El Camino Real was. Making a pun on real', he started calling itEl Camino Double Precision' --- but when the hacker was told that the road was hundreds of miles long, he renamed it El Camino Bignum', and that name has stuck. (See {bignum}.) :elder days: n. The heroic age of hackerdom (roughly, pre-1980); the era of the {PDP-10}, {TECO}, {{ITS}}, and the ARPANET. This term has been rather consciously adopted from J. R. R. Tolkien's fantasy epicThe Lord of the Rings'. Compare {Iron Age}; see also {elvish}.
:elegant: [from mathematical usage] adj. Combining simplicity, power, and a certain ineffable grace of design. Higher praise than clever',winning', or even {cuspy}.
:elephantine: adj. Used of programs or systems that are both conspicuous {hog}s (owing perhaps to poor design founded on {brute force and ignorance}) and exceedingly {hairy} in source form. An elephantine program may be functional and even friendly, but (as in the old joke about being in bed with an elephant) it's tough to have around all the same (and, like a pachyderm, difficult to maintain). In extreme cases, hackers have been known to make trumpeting sounds or perform expressive proboscatory mime at the mention of the offending program. Usage: semi-humorous. Compare `has the elephant nature' and the somewhat more pejorative {monstrosity}. See also {second-system effect} and {baroque}.
:elevator controller: n. Another archetypal dumb embedded-systems application, like {toaster} (which superseded it). During one period (1983--84) in the deliberations of ANSI X3J11 (the C standardization committee) this was the canonical example of a really stupid, memory-limited computation environment. "You can't require `printf(3)' to be part of the default runtime library --- what if you're targeting an elevator controller?" Elevator controllers became important rhetorical weapons on both sides of several {holy wars}.
:ELIZA effect: /-li:'z *-fekt'/ [AI community] n. The tendency of humans to attach associations to terms from prior experience.
For example, there is nothing magic about the symbol +' that makes it well-suited to indicate addition; it's just that people associate it with addition. Using+' or `plus' to mean addition in a computer language is taking advantage of the ELIZA effect.
This term comes from the famous ELIZA program by Joseph Weizenbaum, which simulated a Rogerian psychoanalyst by rephrasing many of the patient's statements as questions and posing them to the patient.
It worked by simple pattern recognition and substitution of key words into canned phrases. It was so convincing, however, that there are many anecdotes about people becoming very emotionally caught up in dealing with ELIZA. All this was due to people's tendency to attach to words meanings which the computer never put there. The ELIZA effect is a {Good Thing} when writing a programming language, but it can blind you to serious shortcomings when analyzing an Artificial Intelligence system. Compare {ad-hockery}; see also {AI-complete}.
:elvish: n. 1. The Tengwar of Feanor, a table of letterforms resembling the beautiful Celtic half-uncial hand of the Book of Kells'. Invented and described by J. R. R. Tolkien inThe Lord of The Rings' as an orthography for his fictional elvish' languages, this system (which is both visually and phonetically elegant) has long fascinated hackers (who tend to be interested by artificial languages in general). It is traditional for graphics printers, plotters, window systems, and the like to support a Feanorian typeface as one of their demo items. See also {elder days}. 2. By extension, any odd or unreadable typeface produced by a graphics device. 3. The typeface mundanely calledB"ocklin', an art-decoish display font.
:EMACS: /ee'maks/ [from Editing MACroS] n. The ne plus ultra of hacker editors, a programmable text editor with an entire LISP
system inside it. It was originally written by Richard Stallman in {TECO} under {{ITS}} at the MIT AI lab; AI Memo 554 described it as "an advanced, self-documenting, customizable, extensible real-time display editor". It has since been reimplemented any number of times, by various hackers, and versions exist which run under most major operating systems. Perhaps the most widely used version, also written by Stallman and now called "{GNU} EMACS"
or {GNUMACS}, runs principally under UNIX. It includes facilities to run compilation subprocesses and send and receive mail; many hackers spend up to 80% of their {tube time} inside it. Other variants include {GOSMACS}, CCA EMACS, UniPress EMACS, Montgomery EMACS, jove, epsilon, and MicroEMACS.
Some EMACS versions running under window managers iconify as an overflowing kitchen sink, perhaps to suggest the one feature the editor does not (yet) include. Indeed, some hackers find EMACS too heavyweight and {baroque} for their taste, and expand the name as Escape Meta Alt Control Shift' to spoof its heavy reliance on keystrokes decorated with {bucky bits}. Other spoof expansions includeEight Megabytes And Constantly Swapping', Eventuallymalloc()'s All Computer Storage', and `EMACS Makes A Computer Slow' (see {{recursive acronym}}). See also {vi}.
:email: /ee'mayl/ 1. n. Electronic mail automatically passed through computer networks and/or via modems over common-carrier lines. Contrast {snail-mail}, {paper-net}, {voice-net}. See {network address}. 2. vt. To send electronic mail.
Oddly enough, the word `emailed' is actually listed in the OED; it means "embossed (with a raised pattern) or arranged in a net work".
A use from 1480 is given. The word is derived from French `emmailleure', network.
:emoticon: /ee-moh'ti-kon/ n. An ASCII glyph used to indicate an emotional state in email or news. Although originally intended mostly as jokes, emoticons (or some other explicit humor indication) are virtually required under certain circumstances in high-volume text-only communication forums such as USENET; the lack of verbal and visual cues can otherwise cause what were intended to be humorous, sarcastic, ironic, or otherwise non-100%-serious comments to be badly misinterpreted (not always even by {newbie}s), resulting in arguments and {flame war}s.
Hundreds of emoticons have been proposed, but only a few are in common use. These include:
:-) `smiley face' (for humor, laughter, friendliness, occasionally sarcasm) :-( `frowney face' (for sadness, anger, or upset) ;-) `half-smiley' ({ha ha only serious}); also known as `semi-smiley' or `winkey face'. :-/ `wry face'(These may become more comprehensible if you tilt your head sideways, to the left.)
The first two listed are by far the most frequently encountered.
Hyphenless forms of them are common on CompuServe, GEnie, and BIX; see also {bixie}. On {USENET}, `smiley' is often used as a generic term synonymous with {emoticon}, as well
Comments (0)