:RTI: /R-T-I/ /interj./ The mnemonic for the `return from interrupt' instruction on many computers including the 6502 and 6800. The variant `RETI' is found among former Z80 hackers (almost nobody programs these things in assembler anymore). Equivalent to "Now, where was I?" or used to end a conversational digression. See {pop}; see also {POPJ}.
:RTM: /R-T-M/ [Usenet: abbreviation for `Read The Manual'] 1. Politer variant of {RTFM}. 2. Robert T. Morris, perpetrator of the great Internet worm of 1988 (see {Great Worm, the}); villain to many, naive hacker gone wrong to a few. Morris claimed that the worm that brought the Internet to its knees was a benign experiment that got out of control as the result of a coding error. After the storm of negative publicity that followed this blunder, Morris's username on ITS was hacked from RTM to {RTFM}.
:RTS: /R-T-S/ /imp./ Acronym for `Read The Screen'. Mainly used by hackers in the microcomputer world. Refers to what one would like to tell the {suit} one is forced to explain an extremely simple application to. Particularly appropriate when the suit failed to notice the `Press any key to continue' prompt, and wishes to know `why won't it do anything'. Also seen as `RTFS' in especially deserving cases.
:rude: [WPI] /adj./ 1. (of a program) Badly written. 2. Functionally poor, e.g., a program that is very difficult to use because of gratuitously poor (random?) design decisions. Oppose {cuspy}. 3. Anything that manipulates a shared resource without regard for its other users in such a way as to cause a (non-fatal) problem. Examples: programs that change tty modes without resetting them on exit, or windowing programs that keep forcing themselves to the top of the window stack. Compare {all-elbows}.
:runes: /pl.n./ 1. Anything that requires {heavy wizardry} or {black art} to {parse}: core dumps, JCL commands, APL, or code in a language you haven't a clue how to read. Not quite as bad as {line noise}, but close. Compare {casting the runes}, {Great Runes}. 2. Special display characters (for example, the high-half graphics on an IBM PC). 3. [borderline techspeak] 16-bit characters from the Unicode multilingual character set.
:runic: /adj./ Syn. {obscure}. VMS fans sometimes refer to Unix as `Runix'; Unix fans return the compliment by expanding VMS to `Very Messy Syntax' or `Vachement Mauvais Syst`eme' (French idiom, "Hugely Bad System").
:rusty iron: /n./ Syn. {tired iron}. It has been claimed that this is the inevitable fate of {water MIPS}.
:rusty memory: /n./ Mass-storage that uses iron-oxide-based magnetic media (esp. tape and the pre-Winchester removable disk packs used in {washing machine}s). Compare {donuts}.
:rusty wire: /n./ [Amateur Packet Radio] Any very noisy network medium, in which the packets are subject to frequent corruption. Most prevalent in reference to wireless links subject to all the vagaries of RF noise and marginal propagation conditions. "Yes, but how good is your whizbang new protocol on really rusty wire?".
= S = =====
:S/N ratio: // /n./ (also `s/n ratio', `s:n ratio').Syn. {signal-to-noise ratio}. Often abbreviated `SNR'.
:sacred: /adj./ Reserved for the exclusive use of something (an extension of the standard meaning). Often means that anyone may look at the sacred object, but clobbering it will screw whatever it is sacred to. The comment "Register 7 is sacred to the interrupt handler" appearing in a program would be interpreted by a hacker to mean that if any *other* part of the program changes the contents of register 7, dire consequences are likely to ensue.
:saga: /n./ [WPI] A cuspy but bogus raving story about Nrandom broken people.
Here is a classic example of the saga form, as told by Guy L.Steele:
Jon L. White (login name JONL) and I (GLS) were office mates at MIT for many years. One April, we both flew from Boston to California for a week on research business, to consult face-to-face with some people at Stanford, particularly our mutual friend Richard P. Gabriel (RPG; see {gabriel}).
RPG picked us up at the San Francisco airport and drove us back to Palo Alto (going {logical} south on route 101, parallel to {El Camino Bignum}). Palo Alto is adjacent to Stanford University and about 40 miles south of San Francisco. We ate at The Good Earth, a `health food' restaurant, very popular, the sort whose milkshakes all contain honey and protein powder. JONL ordered such a shake — the waitress claimed the flavor of the day was "lalaberry". I still have no idea what that might be, but it became a running joke. It was the color of raspberry, and JONL said it tasted rather bitter. I ate a better tostada there than I have ever had in a Mexican restaurant.
After this we went to the local Uncle Gaylord's Old Fashioned Ice Cream Parlor. They make ice cream fresh daily, in a variety of intriguing flavors. It's a chain, and they have a slogan: "If you don't live near an Uncle Gaylord's — MOVE!" Also, Uncle Gaylord (a real person) wages a constant battle to force big-name ice cream makers to print their ingredients on the package (like air and plastic and other non-natural garbage). JONL and I had first discovered Uncle Gaylord's the previous August, when we had flown to a computer-science conference in Berkeley, California, the first time either of us had been on the West Coast. When not in the conference sessions, we had spent our time wandering the length of Telegraph Avenue, which (like Harvard Square in Cambridge) was lined with picturesque street vendors and interesting little shops. On that street we discovered Uncle Gaylord's Berkeley store. The ice cream there was very good. During that August visit JONL went absolutely bananas (so to speak) over one particular flavor, ginger honey.
Therefore, after eating at The Good Earth — indeed, after every lunch and dinner and before bed during our April visit — a trip to Uncle Gaylord's (the one in Palo Alto) was mandatory. We had arrived on a Wednesday, and by Thursday evening we had been there at least four times. Each time, JONL would get ginger honey ice cream, and proclaim to all bystanders that "Ginger was the spice that drove the Europeans mad! That's why they sought a route to the East! They used it to preserve their otherwise off-taste meat." After the third or fourth repetition RPG and I were getting a little tired of this spiel, and began to paraphrase him: "Wow! Ginger! The spice that makes rotten meat taste good!" "Say! Why don't we find some dog that's been run over and sat in the sun for a week and put some *ginger* on it for dinner?!" "Right! With a lalaberry shake!" And so on. This failed to faze JONL; he took it in good humor, as long as we kept returning to Uncle Gaylord's. He loves ginger honey ice cream.
Now RPG and his then-wife KBT (Kathy Tracy) were putting us up (putting up with us?) in their home for our visit, so to thank them JONL and I took them out to a nice French restaurant of their choosing. I unadventurously chose the filet mignon, and KBT had je ne sais quoi du jour, but RPG and JONL had lapin (rabbit). (Waitress: "Oui, we have fresh rabbit, fresh today." RPG: "Well, JONL, I guess we won't need any *ginger*!")
We finished the meal late, about 11 P.M., which is 2 A.M Boston time, so JONL and I were rather droopy. But it wasn't yet midnight. Off to Uncle Gaylord's!
Now the French restaurant was in Redwood City, north of Palo Alto. In leaving Redwood City, we somehow got onto route 101 going north instead of south. JONL and I wouldn't have known the difference had RPG not mentioned it. We still knew very little of the local geography. I did figure out, however, that we were headed in the direction of Berkeley, and half-jokingly suggested that we continue north and go to Uncle Gaylord's in Berkeley.
RPG said "Fine!" and we drove on for a while and talked. I wasdrowsy, and JONL actually dropped off to sleep for 5 minutes.When he awoke, RPG said, "Gee, JONL, you must have slept all theway over the bridge!", referring to the one spanning SanFrancisco Bay. Just then we came to a sign that said "UniversityAvenue". I mumbled something about working our way over toTelegraph Avenue; RPG said "Right!" and maneuvered some more.Eventually we pulled up in front of an Uncle Gaylord's.
Now, I hadn't really been paying attention because I was so sleepy, and I didn't really understand what was happening until RPG let me in on it a few moments later, but I was just alert enough to notice that we had somehow come to the Palo Alto Uncle Gaylord's after all.
JONL noticed the resemblance to the Palo Alto store, but hadn't caught on. (The place is lit with red and yellow lights at night, and looks much different from the way it does in daylight.) He said, "This isn't the Uncle Gaylord's I went to in Berkeley! It looked like a barn! But this place looks *just like* the one back in Palo Alto!"
RPG deadpanned, "Well, this is the one *I* always come to whenI'm in Berkeley. They've got two in San Francisco, too.Remember, they're a chain."
JONL accepted this bit of wisdom. And he was not totally ignorant—- he knew perfectly well that University Avenue was in Berkeley,not far from Telegraph Avenue. What he didn't know was thatthere is a completely different University Avenue in Palo Alto.
JONL went up to the counter and asked for ginger honey. The guy at the counter asked whether JONL would like to taste it first, evidently their standard procedure with that flavor, as not too many people like it.
JONL said, "I'm sure I like it. Just give me a cone." The guy behind the counter insisted that JONL try just a taste first. "Some people think it tastes like soap." JONL insisted, "Look, I *love* ginger. I eat Chinese food. I eat raw ginger roots. I already went through this hassle with the guy back in Palo Alto. I *know* I like that flavor!"
At the words "back in Palo Alto" the guy behind the counter got a very strange look on his face, but said nothing. KBT caught his eye and winked. Through my stupor I still hadn't quite grasped what was going on, and thought RPG was rolling on the floor laughing and clutching his stomach just because JONL had launched into his spiel ("makes rotten meat a dish for princes") for the forty-third time. At this point, RPG clued me in fully.
RPG, KBT, and I retreated to a table, trying to stifle our chuckles. JONL remained at the counter, talking about ice cream with the guy b.t.c., comparing Uncle Gaylord's to other ice cream shops and generally having a good old time.
At length the g.b.t.c. said, "How's the ginger honey?" JONL said, "Fine! I wonder what exactly is in it?" Now Uncle Gaylord publishes all his recipes and even teaches classes on how to make his ice cream at home. So the g.b.t.c. got out the recipe, and he and JONL pored over it for a while. But the g.b.t.c. could contain his curiosity no longer, and asked again, "You really like that stuff, huh?" JONL said, "Yeah, I've been eating it constantly back in Palo Alto for the past two days. In fact, I think this batch is about as good as the cones I got back in Palo Alto!"
G.b.t.c. looked him straight in the eye and said, "You're *in* Palo Alto!"
JONL turned slowly around, and saw the three of us collapse in afit of giggles. He clapped a hand to his forehead and exclaimed,"I've been hacked!"
[My spies on the West Coast inform me that there is a closerelative of the raspberry found out there called an `ollalieberry'—ESR]
[Ironic footnote: it appears that the {meme} about ginger vs. rotting meat may be an urban legend. It's not borne out by an examination of medieval recipes or period purchase records for spices, and appears full-blown in the works of Samuel Pegge, a gourmand and notorious flake case who originated numerous food myths. —ESR]
:sagan: /say'gn/ /n./ [from Carl Sagan's TV series "Cosmos"; think "billions and billions"] A large quantity of anything. "There's a sagan different ways to tweak EMACS." "The U.S. Government spends sagans on bombs and welfare — hard to say which is more destructive."
:SAIL:: /sayl/, not /S-A-I-L/ /n./ 1. The Stanford Artificial Intelligence Lab. An important site in the early development of LISP; with the MIT AI Lab, BBN, CMU, XEROX PARC, and the Unix community, one of the major wellsprings of technical innovation and hacker-culture traditions (see the {{WAITS}} entry for details). The SAIL machines were shut down in late May 1990, scant weeks after the MIT AI Lab's ITS cluster was officially decommissioned. 2. The Stanford Artificial Intelligence Language used at SAIL (sense 1). It was an Algol-60 derivative with a coroutining facility and some new data types intended for building search trees and association lists.
:salescritter: /sayls'kri`tr/ /n./ Pejorative hackerism for a computer salesperson. Hackers tell the following joke:
Q. What's the difference between a used-car dealer and acomputer salesman?A. The used-car dealer knows he's lying. [Some versions add:…and probably knows how to drive.]
This reflects the widespread hacker belief that salescritters are self-selected for stupidity (after all, if they had brains and the inclination to use them, they'd be in programming). The terms `salesthing' and `salesdroid' are also common. Compare {marketroid}, {suit}, {droid}.
:salt: /n./ A tiny bit of near-random data inserted where too much regularity would be undesirable; a data {frob} (sense 1). For example, the Unix crypt(3) man page mentions that "the salt string is used to perturb the DES algorithm in one of 4096 different ways."
:salt mines: /n./ Dense quarters housing large numbers of programmers working long hours on grungy projects, with some hope of seeing the end of the tunnel in N years. Noted for their absence of sunshine. Compare {playpen}, {sandbox}.
:salt substrate: /n./ [MIT] Collective noun used to refer topotato chips, pretzels, saltines, or any other form of snack fooddesigned primarily as a carrier for sodium chloride. Also`sodium substrate'. From the technical term `chip substrate',used to refer to the silicon on the top of which the active partsof integrated circuits are deposited.
:same-day service: /n./ Ironic term used to describe longresponse time, particularly with respect to {{MS-DOS}} systemcalls (which ought to require only a tiny fraction of a second toexecute). Such response time is a major incentive for programmersto write programs that are not {well-behaved}. See also{PC-ism}.
:samizdat: /sahm-iz-daht/ /n./ [Russian, literally "self publishing"] The process of disseminating documentation via underground channels. Originally referred to underground duplication and distribution of banned books in the Soviet Union; now refers by obvious extension to any less-than-official promulgation of textual material, esp. rare, obsolete, or never-formally-published computer documentation. Samizdat is obviously much easier when one has access to high-bandwidth networks and high-quality laser printers. Note that samizdat is properly used only with respect to documents which contain needed information (see also {hacker ethic}) but which are for some reason otherwise unavailable, but *not* in the context of documents which are available through normal channels, for which unauthorized duplication would be unethical copyright violation. See {Lions Book} for a historical example.
:samurai: /n./ A hacker who hires out for legal cracking jobs, snooping for factions in corporate political fights, lawyers pursuing privacy-rights and First Amendment cases, and other parties with legitimate reasons to need an electronic locksmith. In 1991, mainstream media reported the existence of a loose-knit culture of samurai that meets electronically on BBS systems, mostly bright teenagers with personal micros; they have modeled themselves explicitly on the historical samurai of Japan and on the "net cowboys" of William Gibson's {cyberpunk} novels. Those interviewed claim to adhere to a rigid ethic of loyalty to their employers and to disdain the vandalism and theft practiced by criminal crackers as beneath them and contrary to the hacker ethic; some quote Miyamoto Musashi's "Book of Five Rings", a classic of historical samurai doctrine, in support of these principles. See also {sneaker}, {Stupids}, {social engineering}, {cracker}, {hacker ethic}, and {dark-side hacker}.
:sandbender: /n./ [IBM] A person involved with silicon lithography and the physical design of chips. Compare {ironmonger}, {polygon pusher}.
:sandbox: /n./ 1. (also `sandbox, the') Common term for the R&D department at many software and computer companies (where hackers in commercial environments are likely to be found). Half-derisive, but reflects the truth that research is a form of creative play. Compare {playpen}. 2. Syn. {link farm}.
:sanity check: /n./ 1. The act of checking a piece of code (or anything else, e.g., a Usenet posting) for completely stupid mistakes. Implies that the check is to make sure the author was sane when it was written; e.g., if a piece of scientific software relied on a particular formula and was giving unexpected results, one might first look at the nesting of parentheses or the coding of the formula, as a `sanity check', before looking at the more complex I/O or data structure manipulation routines, much less the algorithm itself. Compare {reality check}. 2. A run-time test, either validating input or ensuring that the program hasn't screwed up internally (producing an inconsistent value or state).
:Saturday-night special: /n./ [from police slang for a cheap handgun] A {quick-and-dirty} program or feature kluged together during off hours, under a deadline, and in response to pressure from a {salescritter}. Such hacks are dangerously unreliable, but all too often sneak into a production release after insufficient review.
:say: /vt./ 1. To type to a terminal. "To list a directory verbosely, you have to say `ls -l'." Tends to imply a {newline}-terminated command (a `sentence'). 2. A computer may also be said to `say' things to you, even if it doesn't have a speech synthesizer, by displaying them on a terminal in response to your commands. Hackers find it odd that this usage confuses {mundane}s.
:scag: /vt./ To destroy the data on a disk, either bycorrupting thefilesystem or by causing media damage. "That last power hit scaggedthe system disk." Compare {scrog}, {roach}.
:scanno: /skan'oh/ /n./ An error in a document caused by a scanner glitch, analogous to a typo or {thinko}.
:schroedinbug: /shroh'din-buhg/ /n./ [MIT: from the Schroedinger's Cat thought-experiment in quantum physics] A design or implementation bug in a program that doesn't manifest until someone reading source or using the program in an unusual way notices that it never should have worked, at which point the program promptly stops working for everybody until fixed. Though (like {bit rot}) this sounds impossible, it happens; some programs have harbored latent schroedinbugs for years. Compare {heisenbug}, {Bohr bug}, {mandelbug}.
:science-fiction fandom:: /n./ Another voluntary subculture having a very heavy overlap with hackerdom; most hackers read SF and/or fantasy fiction avidly, and many go to `cons' (SF conventions) or are involved in fandom-connected activities such as the Society for Creative Anachronism. Some hacker jargon originated in SF fandom; see {defenestration}, {great-wall}, {cyberpunk}, {h}, {ha ha only serious}, {IMHO}, {mundane}, {neep-neep}, {Real Soon Now}. Additionally, the jargon terms {cowboy}, {cyberspace}, {de-rezz}, {go flatline}, {ice}, {phage}, {virus}, {wetware}, {wirehead}, and {worm} originated in SF stories.
:scram switch: /n./ [from the nuclear power industry] An emergency-power-off switch (see {Big Red Switch}), esp. one positioned to be easily hit by evacuating personnel. In general, this is *not* something you {frob} lightly; these often initiate expensive events (such as Halon dumps) and are installed in a {dinosaur pen} for use in case of electrical fire or in case some luckless {field servoid} should put 120 volts across himself while {Easter egging}. (See also {molly-guard}, {TMRC}.)
:scratch: 1. [from `scratchpad'] /adj./ Describes a data structure or recording medium attached to a machine for testing or temporary-use purposes; one that can be {scribble}d on without loss. Usually in the combining forms `scratch memory', `scratch register', `scratch disk', `scratch tape', `scratch volume'. See also {scratch monkey}. 2. [primarily IBM] /vt./ To delete (as in a file).
:scratch monkey: /n./ As in "Before testing or reconfiguring, always mount a {scratch monkey}", a proverb used to advise caution when dealing with irreplaceable data or devices. Used to refer to any scratch volume hooked to a computer during any risky operation as a replacement for some precious resource or data that might otherwise get trashed.
This term preserves the memory of Mabel, the Swimming Wonder Monkey, star of a biological research program at the University of Toronto. Mabel was not (so the legend goes) your ordinary monkey; the university had spent years teaching her how to swim, breathing through a regulator, in order to study the effects of different gas mixtures on her physiology. Mabel suffered an untimely demise one day when a DEC engineer troubleshooting a crash on the program's VAX inadvertently interfered with some custom hardware that was wired to Mabel.
It is reported that, after calming down an understandably irate customer sufficiently to ascertain the facts of the matter, a DEC troubleshooter called up the {field circus} manager responsible and asked him sweetly, "Can you swim?"
Not all the consequences to humans were so amusing; the sysop of the machine in question was nearly thrown in jail at the behest of certain clueless {droid}s at the local `humane' society. The moral is clear: When in doubt, always mount a scratch monkey.
[The actual incident occured in 1979 or 1980. There is a version of this story, complete with reported dialogue between one of the project people and DEC field service, that has been circulating on Internet since 1986. It is hilarious and mythic, but gets some facts wrong. For example, it reports the machine as a PDP-11 and alleges that Mabel's demise occurred when DEC {PM}ed the machine. Earlier versions of this entry were based on that story; this one has been corrected from an interview with the hapless sysop. —ESR]
:scream and die: /v./ Syn. {cough and die}, but connotes that an error message was printed or displayed before the program crashed.
:screaming tty: /n./ [Unix] A terminal line which spews an infinite number of random characters at the operating system. This can happen if the terminal is either disconnected or connected to a powered-off terminal but still enabled for login; misconfiguration, misimplementation, or simple bad luck can start such a terminal screaming. A screaming tty or two can seriously degrade the performance of a vanilla Unix system; the arriving "characters" are treated as userid/password pairs and tested as such. The Unix password encryption algorithm is designed to be computationally intensive in order to foil brute-force crack attacks, so although none of the logins succeeds; the overhead of rejecting them all can be substantial.
:screw: /n./ [MIT] A {lose}, usually in software.Especially used for user-visible misbehavior caused by a bug ormisfeature. This use has become quite widespread outside MIT.
:screwage: /skroo'*j/ /n./ Like {lossage} but connotesthat the failure is due to a designed-in misfeature rather than asimple inadequacy or a mere bug.
:scribble: /n./ To modify a data structure in a random and unintentionally destructive way. "Bletch! Somebody's disk-compactor program went berserk and scribbled on the i-node table." "It was working fine until one of the allocation routines scribbled on low core." Synonymous with {trash}; compare {mung}, which conveys a bit more intention, and {mangle}, which is more violent and final.
:scrog: /skrog/ /vt./ [Bell Labs] To damage, trash, or corrupt a data structure. "The list header got scrogged." Also reported as `skrog', and ascribed to the comic strip "The Wizard of Id". Compare {scag}; possibly the two are related. Equivalent to {scribble} or {mangle}.
:scrool: /skrool/ /n./ [from the pioneering Roundtable chat system in Houston ca. 1984; prob. originated as a typo for `scroll'] The log of old messages, available for later perusal or to help one get back in synch with the conversation. It was originally called the `scrool monster', because an early version of the roundtable software had a bug where it would dump all 8K of scrool on a user's terminal.
:scrozzle: /skroz'l/ /vt./ Used when a self-modifying code segment runs incorrectly and corrupts the running program or vital data. "The damn compiler scrozzled itself again!"
:scruffies: /n./ See {neats vs. scruffies}.
:SCSI: /n./ [Small Computer System Interface] A bus-independentstandard for system-level interfacing between a computer andintelligent devices. Typically annotated in literature with`sexy' (/sek'see/), `sissy' (/sis'ee/), and `scuzzy'(/skuh'zee/) as pronunciation guides — the last being theoverwhelmingly predominant form, much to the dismay of thedesigners and their marketing people. One can usually assume thata person who pronounces it /S-C-S-I/ is clueless.
:ScumOS: /skuhm'os/ or /skuhm'O-S/ /n./ Unflatteringhackerism for SunOS, the BSD Unix variant supported on SunMicrosystems's Unix workstations (see also {sun-stools}), andcompare {AIDX}, {Macintrash}, {Nominal Semidestructor},{Open DeathTrap}, {HP-SUX}. Despite what this term mightsuggest, Sun was founded by hackers and still enjoys excellentrelations with hackerdom; usage is more often in exasperation thanoutright loathing.
:search-and-destroy mode: /n./ Hackerism for a noninteractive search-and-replace facility in an editor, so called because an incautiously chosen match pattern can cause {infinite} damage.
:second-system effect: /n./ (sometimes, more euphoniously, `second-system syndrome') When one is designing the successor to a relatively small, elegant, and successful system, there is a tendency to become grandiose in one's success and design an {elephantine} feature-laden monstrosity. The term was first used by Fred Brooks in his classic "The Mythical Man-Month: Essays on Software Engineering" (Addison-Wesley, 1975; ISBN 0-201-00650-2). It described the jump from a set of nice, simple operating systems on the IBM 70xx series to OS/360 on the 360 series. A similar effect can also happen in an evolving system; see {Brooks's Law}, {creeping elegance}, {creeping featurism}. See also {{Multics}}, {OS/2}, {X}, {software bloat}.
This version of the jargon lexicon has been described (with altogether too much truth for comfort) as an example of second-system effect run amok on jargon-1….
:secondary damage: /n./ When a fatal error occurs (esp. a {segfault}) the immediate cause may be that a pointer has been trashed due to a previous {fandango on core}. However, this fandango may have been due to an *earlier* fandango, so no amount of analysis will reveal (directly) how the damage occurred. "The data structure was clobbered, but it was secondary damage."
By extension, the corruption resulting from N cascaded fandangoes on core is `Nth-level damage'. There is at least one case on record in which 17 hours of {grovel}ling with `adb' actually dug up the underlying bug behind an instance of seventh-level damage! The hacker who accomplished this near-superhuman feat was presented with an award by his fellows.
:security through obscurity: (alt. `security by obscurity') A term applied by hackers to most OS vendors' favorite way of coping with security holes — namely, ignoring them, documenting neither any known holes nor the underlying security algorithms, trusting that nobody will find out about them and that people who do find out about them won't exploit them. This "strategy" never works for long and occasionally sets the world up for debacles like the {RTM} worm of 1988 (see {Great Worm, the}), but once the brief moments of panic created by such events subside most vendors are all too willing to turn over and go back to sleep. After all, actually fixing the bugs would siphon off the resources needed to implement the next user-interface frill on marketing's wish list — and besides, if they started fixing security bugs customers might begin to *expect* it and imagine that their warranties of merchantability gave them some sort of *right* to a system with fewer holes in it than a shotgunned Swiss cheese, and *then* where would we be?
Historical note: There are conflicting stories about the origin of this term. It has been claimed that it was first used in the Usenet newsgroup in comp.sys.apollo during a campaign to get HP/Apollo to fix security problems in its Unix-{clone} Aegis/DomainOS (they didn't change a thing). {ITS} fans, on the other hand, say it was coined years earlier in opposition to the incredibly paranoid {Multics} people down the hall, for whom security was everything. In the ITS culture it referred to (1) the fact that by the time a tourist figured out how to make trouble he'd generally gotten over the urge to make it, because he felt part of the community; and (2) (self-mockingly) the poor coverage of the documentation and obscurity of many commands. One instance of *deliberate* security through obscurity is recorded; the command to allow patching the running ITS system ({altmode} altmode control-R) echoed as $$^D. If you actually typed alt alt ^D, that set a flag that would prevent patching the system even if you later got it right.
:SED: /S-E-D/ /n./ [TMRC, from `Light-Emitting Diode']Smoke-emitting diode. A {friode} that lost the war. See also{LER}.
:segfault: /n.,vi./ Syn. {segment}, {segmentation fault}.
:seggie: /seg'ee/ /n./ [Unix] Shorthand for {segmentation fault} reported from Britain.
:segment: /seg'ment/ /vi./ To experience a {segmentation fault}. Confusingly, this is often pronounced more like the noun `segment' than like mainstream /v./ segment; this is because it is actually a noun shorthand that has been verbed.
:segmentation fault: /n./ [Unix] 1. An error in which a running program attempts to access memory not allocated to it and {core dump}s with a segmentation violation error. 2. To lose a train of thought or a line of reasoning. Also uttered as an exclamation at the point of befuddlement.
:segv: /seg'vee/ /n.,vi./ Yet another synonym for {segmentation fault} (actually, in this case, `segmentation violation').
:self-reference: /n./ See {self-reference}.
:selvage: /sel'v*j/ /n./ [from sewing and weaving] See {chad} (sense 1).
:semi: /se'mee/ or /se'mi:/ 1. /n./ Abbreviation for `semicolon', when speaking. "Commands to {grind} are prefixed by semi-semi-star" means that the prefix is `;;*', not 1/4 of a star. 2. A prefix used with words such as `immediately' as a qualifier. "When is the system coming up?" "Semi-immediately." (That is, maybe not for an hour.) "We did consider that possibility semi-seriously." See also {infinite}.
:semi-infinite: /n./ See {infinite}.
:senior bit: /n./ [IBM] Syn. {meta bit}.
:server: /n./ A kind of {daemon} that performs a service for the requester and which often runs on a computer other than the one on which the server runs. A particularly common term on the Internet, which is rife with `web servers', `name servers', `domain servers', `news servers', `finger servers', and the like.
:SEX: /seks/ [Sun Users' Group & elsewhere] /n./ 1. Software EXchange. A technique invented by the blue-green algae hundreds of millions of years ago to speed up their evolution, which had been terribly slow up until then. Today, SEX parties are popular among hackers and others (of course, these are no longer limited to exchanges of genetic software). In general, SEX parties are a {Good Thing}, but unprotected SEX can propagate a {virus}. See also {pubic directory}. 2. The rather Freudian mnemonic often used for Sign EXtend, a machine instruction found in the PDP-11 and many other architectures. The RCA 1802 chip used in the early Elf and SuperElf personal computers had a `SEt X register' SEX instruction, but this seems to have had little folkloric impact.
DEC's engineers nearly got a PDP-11 assembler that used the `SEX' mnemonic out the door at one time, but (for once) marketing wasn't asleep and forced a change. That wasn't the last time this happened, either. The author of "The Intel 8086 Primer", who was one of the original designers of the 8086, noted that there was originally a `SEX' instruction on that processor, too. He says that Intel management got cold feet and decreed that it be changed, and thus the instruction was renamed `CBW' and `CWD' (depending on what was being extended). Amusingly, the Intel 8048 (the microcontroller used in IBM PC keyboards) is also missing straight `SEX' but has logical-or and logical-and instructions `ORL' and `ANL'.
The Motorola 6809, used in the U.K.'s `Dragon 32' personal computer, actually had an official `SEX' instruction; the 6502 in the Apple II with which it competed did not. British hackers thought this made perfect mythic sense; after all, it was commonly observed, you could (on some theoretical level) have sex with a dragon, but you can't have sex with an apple.
:sex changer: /n./ Syn. {gender mender}.
:shambolic link: /sham-bol'ik link/ /n./ A Unix symbolic link, particularly when it confuses you, points to nothing at all, or results in your ending up in some completely unexpected part of the filesystem….
:shar file: /shar' fi:l/ /n./ Syn. {sharchive}.
:sharchive: /shar'ki:v/ /n./ [Unix and Usenet; from /bin/sh archive] A {flatten}ed representation of a set of one or more files, with the unique property that it can be unflattened (the original files restored) by feeding it through a standard Unix shell; thus, a sharchive can be distributed to anyone running Unix, and no special unpacking software is required. Sharchives are also intriguing in that they are typically created by shell scripts; the script that produces sharchives is thus a script which produces self-unpacking scripts, which may themselves contain scripts. (The downsides of sharchives are that they are an ideal venue for {Trojan horse} attacks and that, for recipients not running Unix, no simple un-sharchiving program is possible; sharchives can and do make use of arbitrarily-powerful shell features.) Sharchives are also commonly referred to as `shar files' after the name of the most common program for generating them.
:Share and enjoy!: /imp./ 1. Commonly found at the end of software release announcements and {README file}s, this phrase indicates allegiance to the hacker ethic of free information sharing (see {hacker ethic}, sense 1). 2. The motto of the Sirius Cybernetics Corporation (the ultimate gaggle of incompetent {suit}s) in Douglas Adams's "Hitch Hiker's Guide to the Galaxy". The irony of using this as a cultural recognition signal appeals to freeware hackers.
:shareware: /sheir'weir/ /n./ A kind of {freeware} (sense 1) for which the author requests some payment, usually in the accompanying documentation files or in an announcement made by the software itself. Such payment may or may not buy additional support or functionality. See also {careware}, {charityware}, {crippleware}, {FRS}, {guiltware}, {postcardware}, and {-ware}; compare {payware}.
:shelfware: /shelf'weir/ /n./ Software purchased on a whim (by an individual user) or in accordance with policy (by a corporation or government agency), but not actually required for any particular use. Therefore, it often ends up on some shelf.
:shell: [orig. {{Multics}} /n./ techspeak, widely propagated via Unix] 1. [techspeak] The command interpreter used to pass commands to an operating system; so called because it is the part of the operating system that interfaces with the outside world. 2. More generally, any interface program that mediates access to a special resource or {server} for convenience, efficiency, or security reasons; for this meaning, the usage is usually `a shell around' whatever. This sort of program is also called a `wrapper'. 3. A skeleton program, created by hand or by another program (like, say, a parser generator), which provides the necessary {incantation}s to set up some task and the control flow to drive it (the term {driver} is sometimes used synonymously). The user is meant to fill in whatever code is needed to get real work done. This usage is common in the AI and Microsoft Windows worlds, and confuses Unix hackers.
Historical note: Apparently, the original Multics shell (sense 1) was so called because it was a shell (sense 3); it ran user programs not by starting up separate processes, but by dynamically linking the programs into its own code, calling them as subroutines, and then dynamically de-linking them on return. The VMS command interpreter still does something very like this.
:shell out: /n./ [Unix] To spawn an interactive subshell from within a program (e.g., a mailer or editor). "Bang foo runs foo in a subshell, while bang alone shells out."
:shift left (or right) logical: [from any of various machines' instruction sets] 1. /vi./ To move oneself to the left (right). To move out of the way. 2. imper. "Get out of that (my) seat! You can shift to that empty one to the left (right)." Often used without the `logical', or as `left shift' instead of `shift left'. Sometimes heard as LSH /lish/, from the {PDP-10} instruction set. See {Programmer's Cheer}.
:shim: /n./ A small piece of data inserted in order to achieve a desired memory alignment or other addressing property. For example, the PDP-11 Unix linker, in split I&D (instructions and data) mode, inserts a two-byte shim at location 0 in data space so that no data object will have an address of 0 (and be confused with the C null pointer). See also {loose bytes}.
:shitogram: /shit'oh-gram/ /n./ A *really* nasty piece of email. Compare {nastygram}, {flame}.
:short card: /n./ A half-length IBM XT expansion card oradapter that will fit in one of the two short slots located towardsthe right rear of a standard chassis (tucked behind the floppy diskdrives). See also {tall card}.
:shotgun debugging: /n./ The software equivalent of {Easteregging}; the making of relatively undirected changes to software inthe hope that a bug will be perturbed out of existence. Thisalmost never works, and usually introduces more bugs.
:shovelware: /shuh'v*l-weir`/ /n./ Extra software dumped ontoa CD-ROM or tape to fill up the remaining space on the medium afterthe software distribution it's intended to carry, but notintegrated with the distribution.
:showstopper: /n./ A hardware or (especially) software bug that makes an implementation effectively unusable; one that absolutely has to be fixed before development can go on. Opposite in connotation from its original theatrical use, which refers to something stunningly *good*.
:shriek: /n./ See {excl}. Occasional CMU usage, also in common use among APL fans and mathematicians, especially category theorists.
:Shub-Internet: /shuhb' in't*r-net/ /n./ [MUD: from H. P. Lovecraft's evil fictional deity Shub-Niggurath, the Black Goat with a Thousand Young] The harsh personification of the Internet, Beast of a Thousand Processes, Eater of Characters, Avatar of Line Noise, and Imp of Call Waiting; the hideous multi-tendriled entity formed of all the manifold connections of the net. A sect of MUDders worships Shub-Internet, sacrificing objects and praying for good connections. To no avail — its purpose is malign and evil, and is the cause of all network slowdown. Often heard as in "Freela casts a tac nuke at Shub-Internet for slowing her down." (A forged response often follows along the lines of: "Shub-Internet gulps down the tac nuke and burps happily.") Also cursed by users of the Web, {FTP} and {TELNET} when the system slows down. The dread name of Shub-Internet is seldom spoken aloud, as it is said that repeating it three times will cause the being to wake, deep within its lair beneath the Pentagon.
[January 1996: It develops that one of the computer administrators in the basement of the Pentagon read this entry and fell over laughing. As a result, you too can now poke Shub-Internet by {ping}ing shub-internet.ims.disa.mil. See also {kremvax}. — ESR]
:sidecar: /n./ 1. Syn. {slap on the side}. Esp. used of add-ons for the late and unlamented IBM PCjr. 2. The IBM PC compatibility box that could be bolted onto the side of an Amiga. Designed and produced by Commodore, it broke all of the company's own design rules. If it worked with any other peripherals, it was by {magic}. 3. More generally, any of various devices designed to be connected to the expansion slot on the left side of the Amiga 500 (and later, 600 & 1200), which included a hard drive controller, a hard drive, and additional memory.
:SIG: /sig/ /n./ (also common as a prefix in combining forms)A Special Interest Group, in one of several technical areas,sponsored by the Association for Computing Machinery; well-knownones include SIGPLAN (the Special Interest Group on ProgrammingLanguages), SIGARCH (the Special Interest Group for ComputerArchitecture) and SIGGRAPH (the Special Interest Group for ComputerGraphics). Hackers, not surprisingly, like to overextend thisnaming convention to less formal associations like SIGBEER (at ACMconferences) and SIGFOOD (at University of Illinois).
:sig block: /sig blok/ /n./ [Unix; often written `.sig' there] Short for `signature', used specifically to refer to the electronic signature block that most Unix mail- and news-posting software will {automagically} append to outgoing mail and news. The composition of one's sig can be quite an art form, including an ASCII logo or one's choice of witty sayings (see {sig quote}, {fool file, the}); but many consider large sigs a waste of {bandwidth}, and it has been observed that the size of one's sig block is usually inversely proportional to one's longevity and level of prestige on the net. See also {doubled sig}.
:sig quote: /sig kwoht/ /n./ [Usenet] A maxim, quote, proverb, joke, or slogan embedded in one's {sig block} and intended to convey something of one's philosophical stance, pet peeves, or sense of humor. "Calm down, it's only ones and zeroes."
:sig virus: /n./ A parasitic {meme} embedded in a {sigblock}. There was a {meme plague} or fad for these on Usenet inlate 1991. Most were equivalents of "I am a .sig virus. Pleasereproduce me in your .sig block.". Of course, the .sig virus'smemetic hook is the giggle value of going along with the gag; this,however, was a self-limiting phenomenon as more and more peoplepicked up on the idea. There were creative variants on it; somepeople stuck `sig virus antibody' texts in their sigs, and therewas at least one instance of a sig virus eater.
:signal-to-noise ratio: [from analog electronics] /n./ Used byhackers in a generalization of its technical meaning. `Signal'refers to useful information conveyed by some communicationsmedium, and `noise' to anything else on that medium. Hence a lowratio implies that it is not worth paying attention to the mediumin question. Figures for such metaphorical ratios are never given.The term is most often applied to {Usenet} newsgroups during{flame war}s. Compare {bandwidth}. See also {coefficientof X}, {lost in the noise}.
:silicon: /n./ Hardware, esp. ICs or microprocessor-based computer systems (compare {iron}). Contrasted with software. See also {sandbender}.
:silly walk: /vi./ [from Monty Python's Flying Circus] 1. Aridiculous procedure required to accomplish a task. Like{grovel}, but more {random} and humorous. "I had tosilly-walk through half the /usr directories to find the mapsfile." 2. Syn. {fandango on core}.
:silo: /n./ The FIFO input-character buffer in an RS-232 linecard. So called from DEC terminology used on DH and DZ line cardsfor the VAX and PDP-11, presumably because it was a storage spacefor fungible stuff that went in at the top and came out at thebottom.
:Silver Book: /n./ Jensen and Wirth's infamous "PascalUser Manual and Report", so called because of the silver cover ofthe widely distributed Springer-Verlag second edition of 1978 (ISBN0-387-90144-2). See {{book titles}}, {Pascal}.
:since time T equals minus infinity: /adv./ A long time ago;for as long as anyone can remember; at the time that someparticular frob was first designed. Usually the word `time' isomitted. See also {time T}; contrast {epoch}.
:sitename: /si:t'naym/ /n./ [Unix/Internet] The unique electronic name of a computer system, used to identify it in UUCP mail, Usenet, or other forms of electronic information interchange. The folklore interest of sitenames stems from the creativity and humor they often display. Interpreting a sitename is not unlike interpreting a vanity license plate; one has to mentally unpack it, allowing for mono-case and length restrictions and the lack of whitespace. Hacker tradition deprecates dull, institutional-sounding names in favor of punchy, humorous, and clever coinages (except that it is considered appropriate for the official public gateway machine of an organization to bear the organization's name or acronym). Mythological references, cartoon characters, animal names, and allusions to SF or fantasy literature are probably the most popular sources for sitenames (in roughly descending order). The obligatory comment when discussing these is Harris's Lament: "All the good ones are taken!" See also {network address}.
:skrog: /v./ Syn. {scrog}.
:skulker: /n./ Syn. {prowler}.
:slab: [Apple] 1. /n./ A continuous horizontal line of pixels, all with the same color. 2. /vi./ To paint a slab on an output device. Apple's QuickDraw, like most other professional-level graphics systems, renders polygons and lines not with Bresenham's algorithm, but by calculating `slab points' for each scan line on the screen in succession, and then slabbing in the actual image pixels.
:slack: /n./ 1. Space allocated to a disk file but not actually used to store useful information. The techspeak equivalent is `internal fragmentation'. Antonym: {hole}. 2. In the theology of the {Church of the SubGenius}, a mystical substance or quality that is the prerequisite of all human happiness.
Since Unix files are stored compactly, except for the unavoidable wastage in the last block or fragment, it might be said that "Unix has no slack". See {ha ha only serious}.
:slap on the side: /n./ (also called a {sidecar}, or abbreviated `SOTS'.) A type of external expansion hardware marketed by computer manufacturers (e.g., Commodore for the Amiga 500/1000 series and IBM for the hideous failure called `PCjr'). Various SOTS boxes provided necessities such as memory, hard drive controllers, and conventional expansion slots.
:slash: /n./ Common name for the slant (`/', ASCII 0101111) character. See {ASCII} for other synonyms.
:sleep: /vi./ 1. [techspeak] To relinquish a claim (of a process on a multitasking system) for service; to indicate to the scheduler that a process may be deactivated until some given event occurs or a specified time delay elapses. 2. In jargon, used very similarly to /v./ {block}; also in `sleep on', syn. with `block on'. Often used to indicate that the speaker has relinquished a demand for resources until some (possibly unspecified) external event: "They can't get the fix I've been asking for into the next release, so I'm going to sleep on it until the release, then start hassling them again."
:slim: /n./ A small, derivative change (e.g., to code).
:slop: /n./ 1. A one-sided {fudge factor}, that is, an allowance for error but in only one of two directions. For example, if you need a piece of wire 10 feet long and have to guess when you cut it, you make very sure to cut it too long, by a large amount if necessary, rather than too short by even a little bit, because you can always cut off the slop but you can't paste it back on again. When discrete quantities are involved, slop is often introduced to avoid the possibility of being on the losing side of a {fencepost error}. 2. The percentage of `extra' code generated by a compiler over the size of equivalent assembler code produced by {hand-hacking}; i.e., the space (or maybe time) you lose because you didn't do it yourself. This number is often used as a measure of the goodness of a compiler; slop below 5% is very good, and 10% is usually acceptable. With modern compiler technology, esp. on RISC machines, the compiler's slop may actually be *negative*; that is, humans may be unable to generate code as good. This is one of the reasons assembler programming is no longer common.
:slopsucker: /slop'suhk-r/ /n./ A lowest-priority task that waits around until everything else has `had its fill' of machine resources. Only when the machine would otherwise be idle is the task allowed to `suck up the slop'. Also called a `hungry puppy' or `bottom feeder'. One common variety of slopsucker hunts for large prime numbers. Compare {background}.
:slurp: /vt./ To read a large data file entirely into {core} before working on it. This may be contrasted with the strategy of reading a small piece at a time, processing it, and then reading the next piece. "This program slurps in a 1K-by-1K matrix and does an FFT." See also {sponge}.
:smart: /adj./ Said of a program that does the {Right Thing} in a wide variety of complicated circumstances. There is a difference between calling a program smart and calling it intelligent; in particular, there do not exist any intelligent programs (yet — see {AI-complete}). Compare {robust} (smart programs can be {brittle}).
:smart terminal: /n./ 1. A terminal that has enough computing capability to render graphics or to offload some kind of front-end processing from the computer it talks to. The development of workstations and personal computers has made this term and the product it describes semi-obsolescent, but one may still hear variants of the phrase `act like a smart terminal' used to describe the behavior of workstations or PCs with respect to programs that execute almost entirely out of a remote {server}'s storage, using local devices as displays. 2. obs. Any terminal with an addressable cursor; the opposite of a {glass tty}. Today, a terminal with merely an addressable cursor, but with none of the more-powerful features mentioned in sense 1, is called a {dumb terminal}.
There is a classic quote from Rob Pike (inventor of the {blit} terminal): "A smart terminal is not a smart*ass* terminal, but rather a terminal you can educate." This illustrates a common design problem: The attempt to make peripherals (or anything else) intelligent sometimes results in finicky, rigid `special features' that become just so much dead weight if you try to use the device in any way the designer didn't anticipate. Flexibility and programmability, on the other hand, are *really* smart. Compare {hook}.
:smash case: /vi./ To lose or obliterate the uppercase/lowercase distinction in text input. "MS-DOS will automatically smash case in the names of all the files you create." Compare {fold case}.
:smash the stack: /n./ [C programming] To corrupt the execution stack by writing past the end of a local array or other data structure. Code that smashes the stack can cause a return from the routine to jump to a random address, resulting in some of the most insidious data-dependent bugs known to mankind. Variants include `trash' the stack, {scribble} the stack, {mangle} the stack; the term **{mung} the stack is not used, as this is never done intentionally. See {spam}; see also {aliasing bug}, {fandango on core}, {memory leak}, {memory smash}, {precedence lossage}, {overrun screw}.
:smiley: /n./ See {emoticon}.
:smoke: /vi./ 1. To {crash} or blow up, usually spectacularly. "The new version smoked, just like the last one." Used for both hardware (where it often describes an actual physical event), and software (where it's merely colorful). 2. [from automotive slang] To be conspicuously fast. "That processor really smokes." Compare {magic smoke}.
:smoke and mirrors: /n./ Marketing deceptions. The term is mainstream in this general sense. Among hackers it's strongly associated with bogus demos and crocked {benchmark}s (see also {MIPS}, {machoflops}). "They claim their new box cranks 50 MIPS for under $5000, but didn't specify the instruction mix —- sounds like smoke and mirrors to me." The phrase, popularized by newspaper columnist Jimmy Breslin c.1975, has been said to derive from carnie slang for magic acts and `freak show' displays that depend on `trompe l'oeil' effects, but also calls to mind the fierce Aztec god Tezcatlipoca (lit. "Smoking Mirror") for whom the hearts of huge numbers of human sacrificial victims were regularly cut out. Upon hearing about a rigged demo or yet another round of fantasy-based marketing promises, hackers often feel analogously disheartened. See also {stealth manager}.
:smoke test: /n./ 1. A rudimentary form of testing applied to electronic equipment following repair or reconfiguration, in which power is applied and the tester checks for sparks, smoke, or other dramatic signs of fundamental failure. See {magic smoke}. 2. By extension, the first run of a piece of software after construction or a critical change. See and compare {reality check}.
There is an interesting semi-parallel to this term among typographers and printers: When new typefaces are being punch-cut by hand, a `smoke test' (hold the letter in candle smoke, then press it onto paper) is used to check out new dies.
:smoking clover: /n./ [ITS] A {display hack} originally due to Bill Gosper. Many convergent lines are drawn on a color monitor in {AOS} mode (so that every pixel struck has its color incremented). The lines all have one endpoint in the middle of the screen; the other endpoints are spaced one pixel apart around the perimeter of a large square. The color map is then repeatedly rotated. This results in a striking, rainbow-hued, shimmering four-leaf clover. Gosper joked about keeping it hidden from the FDA (the U.S.'s Food and Drug Administration) lest its hallucinogenic properties cause it to be banned.
:SMOP: /S-M-O-P/ /n./ [Simple (or Small) Matter of Programming] 1. A piece of code, not yet written, whose anticipated length is significantly greater than its complexity. Used to refer to a program that could obviously be written, but is not worth the trouble. Also used ironically to imply that a difficult problem can be easily solved because a program can be written to do it; the irony is that it is very clear that writing such a program will be a great deal of work. "It's easy to enhance a FORTRAN compiler to compile COBOL as well; it's just an SMOP." 2. Often used ironically by the intended victim when a suggestion for a program is made which seems easy to the suggester, but is obviously (to the victim) a lot of work.
:smurf: /smerf/ /n./ [from the soc.motss newsgroup on Usenet, after some obnoxiously gooey cartoon characters] A newsgroup regular with a habitual style that is irreverent, silly, and cute. Like many other hackish terms for people, this one may be praise or insult depending on who uses it. In general, being referred to as a smurf is probably not going to make your day unless you've previously adopted the label yourself in a spirit of irony. Compare {old fart}.
:SNAFU principle: /sna'foo prin'si-pl/ /n./ [from a WWII Army acronym for `Situation Normal, All Fucked Up'] "True communication is possible only between equals, because inferiors are more consistently rewarded for telling their superiors pleasant lies than for telling the truth." — a central tenet of {Discordianism}, often invoked by hackers to explain why authoritarian hierarchies screw up so reliably and systematically. The effect of the SNAFU principle is a progressive disconnection of decision-makers from reality. This lightly adapted version of a fable dating back to the early 1960s illustrates the phenomenon perfectly:
In the beginning was the plan,and then the specification;And the plan was without form,and the specification was void.
And darknesswas on the faces of the implementors thereof;And they spake unto their leader,saying:"It is a crock of shit,and smells as of a sewer."
And the leader took pity on them,and spoke to the project leader:"It is a crock of excrement,and none may abide the odor thereof."
And the project leaderspake unto his section head, saying:"It is a container of excrement,and it is very strong, such that none may abide it."
The section head then hurried to his department manager,and informed him thus:"It is a vessel of fertilizer,and none may abide its strength."
The department manager carried these wordsto his general manager,and spoke unto himsaying:"It containeth that which aideth the growth of plants,and it is very strong."
And so it was that the general manager rejoicedand delivered the good news unto the Vice President."It promoteth growth,and it is very powerful."
The Vice President rushed to the President's side,and joyously exclaimed:"This powerful new software productwill promote the growth of the company!"
And the President looked upon the product,and saw that it was very good.
After the subsequent and inevitable disaster, the {suit}s protect themselves by saying "I was misinformed!", and the implementors are demoted or fired.
:snail: /vt./ To {snail-mail} something. "Snail me a copy of those graphics, will you?"
:snail-mail: /n./ Paper mail, as opposed to electronic. Sometimes written as the single word `SnailMail'. One's postal address is, correspondingly, a `snail address'. Derives from earlier coinage `USnail' (from `U.S. Mail'), for which there have even been parody posters and stamps made. Also (less commonly) called `P-mail', from `paper mail' or `physical mail'. Oppose {email}.
:snap: /v./ To replace a pointer to a pointer with a direct pointer; to replace an old address with the forwarding address found there. If you telephone the main number for an institution and ask for a particular person by name, the operator may tell you that person's extension before connecting you, in the hopes that you will `snap your pointer' and dial direct next time. The underlying metaphor may be that of a rubber band stretched through a number of intermediate points; if you remove all the thumbtacks in the middle, it snaps into a straight line from first to last. See {chase pointers}.
Often, the behavior of a {trampoline} is to perform an error check once and then snap the pointer that invoked it so as henceforth to bypass the trampoline (and its one-shot error check). In this context one also speaks of `snapping links'. For example, in a LISP implementation, a function interface trampoline might check to make sure that the caller is passing the correct number of arguments; if it is, and if the caller and the callee are both compiled, then snapping the link allows that particular path to use a direct procedure-call instruction with no further overhead.
:snarf: /snarf/ /vt./ 1. To grab, esp. to grab a large document or file for the purpose of using it with or without the author's permission. See also {BLT}. 2. [in the Unix community] To fetch a file or set of files across a network. See also {blast}. This term was mainstream in the late 1960s, meaning `to eat piggishly'. It may still have this connotation in context. "He's in the snarfing phase of hacking — {FTP}ing megs of stuff a day." 3. To acquire, with little concern for legal forms or politesse (but not quite by stealing). "They were giving away samples, so I snarfed a bunch of them." 4. Syn. for {slurp}. "This program starts by snarfing the entire database into core, then…." 5. [GEnie] To spray food or {programming fluid}s due to laughing at the wrong moment. "I was drinking coffee, and when I read your post I snarfed all over my desk." "If I keep reading this topic, I think I'll have to snarf-proof my computer with a keyboard {condom}." [This sense appears to be widespread among mundane teenagers —ESR]
:snarf & barf: /snarf'n-barf`/ /n./ Under a {WIMP environment}, the act of grabbing a region of text and then stuffing the contents of that region into another region (or the same one) to avoid retyping a command line. In the late 1960s, this was a mainstream expression for an `eat now, regret it later' cheap-restaurant expedition.
:snarf down: /v./ To {snarf}, with the connotation of absorbing, processing, or understanding. "I'll snarf down the latest version of the {nethack} user's guide — it's been a while since I played last and I don't know what's changed recently."
:snark: /n./ [Lewis Carroll, via the Michigan Terminal System] 1. A system failure. When a user's process bombed, the operator would get the message "Help, Help, Snark in MTS!" 2. More generally, any kind of unexplained or threatening event on a computer (especially if it might be a boojum). Often used to refer to an event or a log file entry that might indicate an attempted security violation. See {snivitz}. 3. UUCP name of snark.thyrsus.com, home site of the Jargon File versions from 2.*.* on (i.e., this lexicon).
:sneaker: /n./ An individual hired to break into places in order to test their security; analogous to {tiger team}. Compare {samurai}.