= D =

Node:

cryppie

, Next:

CTSS

, Previous:

crunch

, Up:

= C =

cryppie/krip'ee/ n.

A cryptographer. One who hacks or implements cryptographic software or hardware.

Node:

CTSS

, Next:

cube

, Previous:

cryppie

, Up:

= C =

CTSS/C-T-S-S/ n.

Compatible Time-Sharing System. An early (1963) experiment in the design of interactive time-sharing operating systems, ancestral toMultics,Unix, andITS. The nameITS(Incompatible Time-sharing System) was a hack on CTSS, meant both as a joke and to express some basic differences in philosophy about the way I/O services should be presented to user programs.

Node:

cube

, Next:

cubing

, Previous:

CTSS

, Up:

= C =

cuben.

1. [short for `cubicle'] A module in the open-plan offices used at many programming shops. "I've got the manuals in my cube." 2. A NeXT machine (which resembles a matte-black cube).

Node:

cubing

, Next:

cup holder

, Previous:

cube

, Up:

= C =

cubingvi.

[parallel with `tubing'] 1. Hacking on an IPSC (Intel Personal SuperComputer) hypercube. "Louella's gone cubingagain!!" 2. Hacking Rubik's Cube or related puzzles, either physically or mathematically. 3. An indescribable form of self-torture (see sense 1 or 2).

Node:

cup holder

, Next:

cursor dipped in X

, Previous:

cubing

, Up:

= C =

cup holdern.

The tray of a CD-ROM drive, or by extension the CD drive itself. So called because of a common tech support legend about the idiot who called to complain that the cup holder on his computer broke. A joke program was once distributed around the net called "cupholder.exe", which when run simply extended the CD drive tray. The humor of this was of course lost on people whose drive had a slot or a caddy instead.

Node:

cursor dipped in X

, Next:

cuspy

, Previous:

cup holder

, Up:

= C =

cursor dipped in Xn.

There are a couple of metaphors in English of the form `pen dipped in X' (perhaps the most common values of X are `acid', `bile', and `vitriol'). These map over neatly to this hackish usage (the cursor being what moves, leaving letters behind, when one is composing on-line). "Talk about anastygram! He must've had his cursor dipped in acid when he wrote that one!"

Node:

cuspy

, Next:

cut a tape

, Previous:

cursor dipped in X

, Up:

= C =

cuspy/kuhs'pee/ adj.

[WPI: from theDECabbreviation CUSP, for `Commonly Used System Program', i.e., a utility program used by many people] 1. (of a program) Well-written. 2. Functionally excellent. A program that performs well and interfaces well to users is cuspy. Seerude. 3. [NYU] Said of an attractive woman, especially one regarded as available. Implies a certain curvaceousness.

Node:

cut a tape

, Next:

cybercrud

, Previous:

cuspy

, Up:

= C =

cut a tapevi.

To write a software or document distribution on magnetic tape for shipment. Has nothing to do with physically cutting the medium! Early versions of this lexicon claimed that one never analogously speaks of `cutting a disk', but this has since been reported as live usage. Related slang usages are mainstream business's `cut a check', the recording industry's `cut a record', and the military's `cut an order'.

All of these usages reflect physical processes in obsolete recording and duplication technologies. The first stage in manufacturing an old-style vinyl record involved cutting grooves in a stamping die with a precision lathe. More mundanely, the dominant technology for mass duplication of paper documents in pre-photocopying days involved "cutting a stencil", punching away portions of the wax overlay on a silk screen. More directly, paper tape with holes punched in it was an important early storage medium.

Node:

cybercrud

, Next:

cyberpunk

, Previous:

cut a tape

, Up:

= C =

cybercrud/si:'ber-kruhd/ n.

1. [coined by Ted Nelson] Obfuscatory tech-talk. Verbiage with a highMEGOfactor. The computer equivalent of bureaucratese. 2. Incomprehensible stuff embedded in email. First there were the "Received" headers that show how mail flows through systems, then MIME (Multi-purpose Internet Mail Extensions) headers and part boundaries, and now huge blocks of radix-64 for PEM (Privacy Enhanced Mail) or PGP (Pretty Good Privacy) digital signatures and certificates of authenticity. This stuff all services a purpose and good user interfaces should hide it, but all too often users are forced to wade through it.

Node:

cyberpunk

, Next:

cyberspace

, Previous:

cybercrud

, Up:

= C =

cyberpunk/si:'ber-puhnk/ n.,adj.

[orig. by SF writer Bruce Bethke and/or editor Gardner Dozois] A subgenre of SF launched in 1982 by William Gibson's epoch-making novel "Neuromancer" (though its roots go back through Vernor Vinge's "True Names" (see theBibliographyin Appendix C) to John Brunner's 1975 novel "The Shockwave Rider"). Gibson's near-total ignorance of computers and the present-day hacker culture enabled him to speculate about the role of computers and hackers in the future in ways hackers have since found both irritatingly naïve and tremendously stimulating. Gibson's work was widely imitated, in particular by the short-lived but innovative "Max Headroom" TV series. Seecyberspace,ice,jack in,go flatline.

Since 1990 or so, popular culture has included a movement or fashion trend that calls itself `cyberpunk', associated especially with the rave/techno subculture. Hackers have mixed feelings about this. On the one hand, self-described cyberpunks too often seem to be shallow trendoids in black leather who have substituted enthusiastic blathering about technology for actually learning anddoingit. Attitude is no substitute for competence. On the other hand, at least cyberpunks are excited about the right things and properly respectful of hacking talent in those who have it. The general consensus is to tolerate them politely in hopes that they'll attract people who grow into being true hackers.

Node:

cyberspace

, Next:

cycle

, Previous:

cyberpunk

, Up:

= C =

cyberspace/si:'br-spays`/ n.

1. Notional `information-space' loaded with visual cues and navigable with brain-computer interfaces called `cyberspace decks'; a characteristic prop ofcyberpunkSF. Serious efforts to constructvirtual realityinterfaces modeled explicitly on Gibsonian cyberspace are under way, using more conventional devices such as glove sensors and binocular TV headsets. Few hackers are prepared to deny outright the possibility of a cyberspace someday evolving out of the network (seethe network). 2. The Internet orMatrix(sense #2) as a whole, considered as a crude cyberspace (sense 1). Although this usage became widely popular in the mainstream press during 1994 when the Internet exploded into public awareness, it is strongly deprecated among hackers because the Internet does not meet the high, SF-inspired standards they have for true cyberspace technology. Thus, this use of the term usually tags awannabeeor outsider. Opposemeatspace. 3. Occasionally, the metaphoric location of the mind of a person inhack mode. Some hackers report experiencing strong eidetic imagery when in hack mode; interestingly, independent reports from multiple sources suggest that there are common features to the experience. In particular, the dominant colors of this subjective `cyberspace' are often gray and silver, and the imagery often involves constellations of marching dots, elaborate shifting patterns of lines and angles, or moire patterns.

Node:

cycle

, Next:

cycle crunch

, Previous:

cyberspace

, Up:

= C =

cycle

1. n. The basic unit of computation. What every hacker wants more of (noted hacker Bill Gosper described himself as a "cycle junkie"). One can describe an instruction as taking so many `clock cycles'. Often the computer can access its memory once on every clock cycle, and so one speaks also of `memory cycles'. These are technical meanings ofcycle. The jargon meaning comes from the observation that there are only so many cycles per second, and when you are sharing a computer the cycles get divided up among the users. The more cycles the computer spends working on your program rather than someone else's, the faster your program will run. That's why every hacker wants more cycles: so he can spend less time waiting for the computer to respond. 2. By extension, a notional unit ofhumanthought power, emphasizing that lots of things compete for the typical hacker's think time. "I refused to get involved with the Rubik's Cube back when it was big. Knew I'd burn too many cycles on it if I let myself." 3. vt. Syn.bounce(sense 4),120 reset; from the phrase `cycle power'. "Cycle the machine again, that serial port's still hung."

Node:

cycle crunch

, Next:

cycle drought

, Previous:

cycle

, Up:

= C =

cycle crunchn.,obs.

A situation wherein the number of people trying to use a computer simultaneously has reached the point where no one can get enough cycles because they are spread too thin and the system has probably begun tothrash. This scenario is an inevitable result of Parkinson's Law applied to timesharing. Usually the only solution is to buy more computer. Happily, this has rapidly become easier since the mid-1980s, so much so that the very term `cycle crunch' now has a faintly archaic flavor; most hackers now use workstations or personal computers as opposed to traditional timesharing systems, and are far more likely to complain of `bandwidth crunch' on their shared networks rather than cycle crunch.

Node:

cycle drought

, Next:

cycle of reincarnation

, Previous:

cycle crunch

, Up:

= C =

cycle droughtn.

A scarcity of cycles. It may be due to acycle crunch, but it could also occur because part of the computer is temporarily not working, leaving fewer cycles to go around. "Thehigh mobyisdown, so we're running with only half the usual amount of memory. There will be a cycle drought until it's fixed."

Node:

cycle of reincarnation

, Next:

cycle server

, Previous:

cycle drought

, Up:

= C =

cycle of reincarnationn.

Seewheel of reincarnation.

Node:

cycle server

, Next:

cypherpunk

, Previous:

cycle of reincarnation

, Up:

= C =

cycle servern.

A powerful machine that exists primarily for running large compute-, disk-, or memory-intensive jobs (more formally called a `compute server'). Implies that interactive tasks such as editing are done on other machines on the network, such as workstations.

Node:

cypherpunk

, Next:

C|N>K

, Previous:

cycle server

, Up:

= C =

cypherpunkn.

[fromcyberpunk] Someone interested in the uses of encryption via electronic ciphers for enhancing personal privacy and guarding against tyranny by centralized, authoritarian power structures, especially government. There is an active cypherpunks mailing list at cypherpunks-request@toad.com coordinating work on public-key encryption freeware, privacy, and digital cash. See alsotentacle.

Node:

C|N>K

, Next:

D. C. Power Lab

, Previous:

cypherpunk

, Up:

= C =

C|N>Kn.

[Usenet] Coffee through Nose to Keyboard; that is, "I laughed so hard Isnarfed my coffee onto my keyboard.". Common onalt.fan.pratchettandscary devil monastery; recognized elsewhere. The Acronymphomania FAQ onalt.fan.pratchettrecognizes variants such as T|N>K = `Tea through Nose to Keyboard' and C|N>S = `Coffee through Nose to Screen'.

Node:

= D =

, Next:

= E =

, Previous:

= C =

, Up:

The Jargon Lexicon


Back to IndexNext