The Hacker's Dictionary - - (the best novels to read .txt) 📗
- Author: -
- Performer: 0262680920
Book online «The Hacker's Dictionary - - (the best novels to read .txt) 📗». Author -
It is a particular pleasure to acknowledge the major contributions of Mark Brader msb@sq.com to the final manuscript; he read and reread many drafts, checked facts, caught typos, submitted an amazing number of thoughtful comments, and did yeoman service in catching typos and minor usage bobbles. Mr. Brader's rare combination of enthusiasm, persistence, wide-ranging technical knowledge, and precisionism in matters of language made his help invaluable, and the sustained volume and quality of his input over many months only allowed him to escape co-editor credit by the slimmest of margins.
Finally, George V. Reilly gvr@cs.brown.edu helped with TeX arcana and painstakingly proofread some 2.7 and 2.8 versions; Steve Summit scs@adam.mit.edu contributed a number of excellent new entries and many small improvements to 2.9.10; and Eric Tiedemann est@thyrsus.com
contributed sage advice throughout on rhetoric, amphigory, and philosophunculism.
:How Jargon Works:
:Jargon Construction:
=====================
There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and John McCarthy's original crew of LISPers. These include the following: :Verb Doubling: --------------- A standard construction in English is to double a verb and use it as an exclamation, such as "Bang, bang!" or "Quack, quack!". Most of these are names for noises. Hackers also double verbs as a concise, sometimes sarcastic comment on what the implied subject does. Also, a doubled verb is often used to terminate a conversation, in the process remarking on the current state of affairs or what the speaker intends to do next. Typical examples involve {win}, {lose}, {hack}, {flame}, {barf}, {chomp}: "The disk heads just crashed." "Lose, lose."
"Mostly he talked about his latest crock. Flame, flame." "Boy, what a bagbiter! Chomp, chomp!"Some verb-doubled constructions have special meanings not immediately obvious from the verb. These have their own listings in the lexicon.
The USENET culture has one tripling convention unrelated to this; the names of `joke' topic groups often have a tripled last element. The first and paradigmatic example was alt.swedish.chef.bork.bork.bork (a "Muppet Show" reference); other classics include alt.french.captain.borg.borg.borg, alt.wesley.crusher.die.die.die, comp.unix.internals.system.calls.brk.brk.brk, sci.physics.edward.teller.boom.boom.boom, and alt.sadistic.dentists.drill.drill.drill.
:Soundalike slang: ------------------ Hackers will often make rhymes or puns in order to convert an ordinary word or phrase into something more interesting. It is considered particularly {flavorful} if the phrase is bent so as to include some other jargon word; thus the computer hobbyist magazine Dr. Dobb's Journal' is almost always referred to among hackers asDr. Frob's Journal' or simply `Dr. Frob's'. Terms of this kind that have been in fairly wide use include names for newspapers: Boston Herald => Horrid (or Harried) Boston Globe => Boston Glob
Houston (or San Francisco) Chronicle => the Crocknicle (or the Comical) New York Times => New York SlimeHowever, terms like these are often made up on the spur of the moment.
Standard examples include:
Data General => Dirty Genitals IBM 360 => IBM Three-Sickly Government Property --- Do Not Duplicate (on keys) => Government Duplicity --- Do Not Propagate for historical reasons => for hysterical raisins Margaret Jacks Hall (the CS building at Stanford) => Marginal Hacks HallThis is not really similar to the Cockney rhyming slang it has been compared to in the past, because Cockney substitutions are opaque whereas hacker punning jargon is intentionally transparent.
:The -P' convention: --------------------- Turning a word into a question by appending the syllableP'; from the LISP convention of appending the letter `P' to denote a predicate (a boolean-valued function). The question should expect a yes/no answer, though it needn't. (See {T} and {NIL}.)
At dinnertime: Q: "Foodp?" A: "Yeah, I'm pretty hungry." or "T!" At any time: Q: "State-of-the-world-P?" A: (Straight) "I'm about to go home." A: (Humorous) "Yes, the world has a state." On the phone to Florida: Q: "State-p Florida?" A: "Been reading JARGON.TXT again, eh?"[One of the best of these is a {Gosperism}. Once, when we were at a Chinese restaurant, Bill Gosper wanted to know whether someone would like to share with him a two-person-sized bowl of soup. His inquiry was: "Split-p soup?" --- GLS]
:Overgeneralization: -------------------- A very conspicuous feature of jargon is the frequency with which techspeak items such as names of program tools, command language primitives, and even assembler opcodes are applied to contexts outside of computing wherever hackers find amusing analogies to them. Thus (to cite one of the best-known examples) UNIX hackers often {grep} for things rather than searching for them. Many of the lexicon entries are generalizations of exactly this kind.
Hackers enjoy overgeneralization on the grammatical level as well. Many hackers love to take various words and add the wrong endings to them to make nouns and verbs, often by extending a standard rule to nonuniform cases (or vice versa). For example, because porous => porosity
generous => generosityhackers happily generalize:
mysterious => mysteriosity ferrous => ferrosity obvious => obviosity dubious => dubiosityAlso, note that all nouns can be verbed. E.g.: "All nouns can be verbed", "I'll mouse it up", "Hang on while I clipboard it over", "I'm grepping the files". English as a whole is already heading in this direction (towards pure-positional grammar like Chinese); hackers are simply a bit ahead of the curve.
However, note that hackers avoid the unimaginative verb-making techniques characteristic of marketroids, bean-counters, and the Pentagon; a hacker would never, for example, productize',prioritize', or `securitize' things. Hackers have a strong aversion to bureaucratic bafflegab and regard those who use it with contempt.
Similarly, all verbs can be nouned. This is only a slight overgeneralization in modern English; in hackish, however, it is good form to mark them in some standard nonstandard way. Thus: win => winnitude, winnage
disgust => disgustitude hack => hackificationFurther, note the prevalence of certain kinds of nonstandard plural forms. Some of these go back quite a ways; the TMRC Dictionary noted that the defined plural of caboose' iscabeese', and includes an entry which implies that the plural of mouse' is {meeces}. On a similarly Anglo-Saxon note, almost anything ending inx' may form plurals in -xen' (see {VAXen} and {boxen} in the main text). Even words ending in phonetic /k/ alone are sometimes treated this way; e.g.,soxen' for a bunch of socks. Other funny plurals are frobbotzim' for the plural offrobbozz' (see {frobnitz}) and Unices' andTwenices' (rather than Unixes' andTwenexes'; see {UNIX}, {TWENEX} in main text). But note that Unixen' andTwenexen' are never used; it has been suggested that this is because -ix' and-ex' are Latin singular endings that attract a Latinate plural. Finally, it has been suggested to general approval that the plural of mongoose' ought to bepolygoose'.
The pattern here, as with other hackish grammatical quirks, is generalization of an inflectional rule that in English is either an import or a fossil (such as the Hebrew plural ending -im', or the Anglo-Saxon plural suffix-en') to cases where it isn't normally considered to apply.
This is not `poor grammar', as hackers are generally quite well aware of what they are doing when they distort the language. It is grammatical creativity, a form of playfulness. It is done not to impress but to amuse, and never at the expense of clarity.
:Spoken inarticulations: ------------------------ Words such as mumble',sigh', and `groan' are spoken in places where their referent might more naturally be used. It has been suggested that this usage derives from the impossibility of representing such noises on a comm link or in electronic mail (interestingly, the same sorts of constructions have been showing up with increasing frequency in comic strips). Another expression sometimes heard is "Complain!", meaning "I have a complaint!"
:Anthromorphization: -------------------- Semantically, one rich source of jargon constructions is the hackish tendency to anthropomorphize hardware and software. This isn't done in a na"ive way; hackers don't personalize their stuff in the sense of feeling empathy with it, nor do they mystically believe that the things they work on every day are alive'. What *is* common is to hear hardware or software talked about as though it has homunculi talking to each other inside it, with intentions and desires. Thus, one hears "The protocol handler got confused", or that programs "are trying" to do things, or one may say of a routine that "its goal in life is to X". One even hears explanations like "... and its poor little brain couldn't understand X, and it died." Sometimes modelling things this way actually seems to make them easier to understand, perhaps because it's instinctively natural to think of anything with a really complex behavioral repertoire aslike a person' rather than `like a thing'.
Of the six listed constructions, verb doubling, peculiar noun formations, anthromorphization, and (especially) spoken inarticulations have become quite general; but punning jargon is still largely confined to MIT and other large universities, and the `-P' convention is found only where LISPers flourish.
Finally, note that many words in hacker jargon have to be understood as members of sets of comparatives. This is especially true of the adjectives and nouns used to describe the beauty and functional quality of code. Here is an approximately correct spectrum: monstrosity brain-damage screw bug lose misfeature crock kluge hack win feature elegance perfection The last is spoken of as a mythical absolute, approximated but never actually attained. Another similar scale is used for describing the reliability of software:
broken flaky dodgy fragile brittle solid robust bulletproof armor-plated Note, however, that `dodgy' is primarily Commonwealth hackish (it is rare in the U.S.) and may change places with `flaky' for some speakers.Coinages for describing {lossage} seem to call forth the very finest in hackish linguistic inventiveness; it has been truly said that hackers have even more words for equipment failures than Yiddish has for obnoxious people.
:Hacker Writing Style:
======================
We've already seen that hackers often coin jargon by overgeneralizing grammatical rules. This is one aspect of a more general fondness for form-versus-content language jokes that shows up particularly in hackish writing. One correspondent reports that he consistently misspells wrong' asworng'. Others have been known to criticize glitches in Jargon File drafts by observing (in the mode of Douglas Hofstadter) "This sentence no verb", or "Bad speling", or "Incorrectspa cing."
Similarly, intentional spoonerisms are often made of phrases relating to confusion or things that are confusing; dain bramage' forbrain damage' is perhaps the most common (similarly, a hacker would be likely to write "Excuse me, I'm cixelsyd today", rather than "I'm dyslexic today"). This sort of thing is quite common and is enjoyed by all concerned.
Hackers tend to use
Comments (0)