Node:
dub dub dub
, Next:
Duff's device
, Previous:
drunk mouse syndrome
, Up:
= D =
dub dub dub
[common] Spoken-only shorthand for the "www" (double-u double-u double-u) in many web host names. Nothing to do with the style of reggae music called `dub'.
Node:
Duff's device
, Next:
dumb terminal
, Previous:
dub dub dub
, Up:
= D =
Duff's devicen.
The most dramatic use yet seen offall throughin C, invented by Tom Duff when he was at Lucasfilm. Trying tobumall the instructions he could out of an inner loop that copied data serially onto an output port, he decided to unroll it. He then realized that the unrolled version could be implemented byinterlacingthe structures of a switch and a loop:
register n = (count + 7) / 8; /* count > 0 assumed */switch (count % 8){case 0: do { *to = *from++;case 7: *to = *from++;case 6: *to = *from++;case 5: *to = *from++;case 4: *to = *from++;case 3: *to = *from++;case 2: *to = *from++;case 1: *to = *from++;} while (--n > 0);}
Shocking though it appears to all who encounter it for the first time, the device is actually perfectly valid, legal C. C's defaultfall throughin case statements has long been its most controversial single feature; Duff observed that "This code forms some sort of argument in that debate, but I'm not sure whether it's for or against." Duff has discussed the device in detail at http://www.lysator.liu.se/c/duffs-device.html. Note that the omission of postfix++from*towas intentional (though confusing). Duff's device can be used to implement memory copy, but the original aim was to copy values serially into a magic IO register.
[For maximal obscurity, the outermost pair of braces above could actually be removed -- GLS]
Node:
dumb terminal
, Next:
dumbass attack
, Previous:
Duff's device
, Up:
= D =
dumb terminaln.
A terminal that is one step above aglass tty, having a minimally addressable cursor but no on-screen editing or other features normally supported by asmart terminal. Once upon a time, when glass ttys were common and addressable cursors were something special, what is now called a dumb terminal could pass for a smart terminal.
Node:
dumbass attack
, Next:
dumbed down
, Previous:
dumb terminal
, Up:
= D =
dumbass attack/duhm'as *-tak'/ n.
[Purdue] Notional cause of a novice's mistake made by the experienced, especially one made while running asrootunder Unix, e.g., typingrm -r *ormkfson a mounted file system. Compareadger.
Node:
dumbed down
, Next:
dump
, Previous:
dumbass attack
, Up:
= D =
dumbed downadj.
Simplified, with a strong connotation ofoversimplified. Often, amarketroidwill insist that the interfaces and documentation of software be dumbed down after the designer has burned untold gallons of midnight oil making it smart. This creates friction. Seeuser-friendly.
Node:
dump
, Next:
dumpster diving
, Previous:
dumbed down
, Up:
= D =
dumpn.
1. An undigested and voluminous mass of information about a problem or the state of a system, especially one routed to the slowest available output device (comparecore dump), and most especially one consisting of hex or octalrunesdescribing the byte-by-byte state of memory, mass storage, or some file. Inelder days, debugging was generally done by `groveling over' a dump (seegrovel); increasing use of high-level languages and interactive debuggers has made such tedium uncommon, and the term `dump' now has a faintly archaic flavor. 2. A backup. This usage is typical only at large timesharing installations.
Node:
dumpster diving
, Next:
dup killer
, Previous:
dump
, Up:
= D =
dumpster diving/dump'-ster di:'-ving/ n.
1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information (`dumpster' is an Americanism for what is elsewhere called a `skip'). Back in AT&T's monopoly days, before paper shredders became common office equipment, phone phreaks (seephreaking) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT&T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets. 2. The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in some hacker's den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially useful)cruft.
Node:
dup killer
, Next:
dup loop
, Previous:
dumpster diving
, Up:
= D =
dup killer/d[y]oop kill'r/ n.
[FidoNet] Software that is supposed to detect and delete duplicates of a message that may have reached the FidoNet system via different routes.
Node:
dup loop
, Next:
dusty deck
, Previous:
dup killer
, Up:
= D =
dup loop/d[y]oop loop/ (also `dupe loop') n.
[FidoNet] An infinite stream of duplicated, near-identical messages on a FidoNetecho, the only difference being unique or mangled identification information applied by a faulty or incorrectly configured system or network gateway, thus renderingdup killers ineffective. If such a duplicate message eventually reaches a system through which it has already passed (with the original identification information), all systems passed on the way back to that system are said to be involved in adup loop.
Node:
dusty deck
, Next:
DWIM
, Previous:
dup loop
, Up:
= D =
dusty deckn.
Old software (especially applications) which one is obliged to remain compatible with, or to maintain (DPtypes call this `legacy code', a term hackers consider smarmy and excessively reverent). The term implies that the software in question is a holdover from card-punch days. Used esp. when referring to old scientific andnumber-crunchingsoftware, much of which was written in FORTRAN and very poorly documented but is believed to be too expensive to replace. Seefossil; comparecrawling horror.
Node:
DWIM
, Next:
dynner
, Previous:
dusty deck
, Up:
= D =
DWIM/dwim/
[acronym, `Do What I Mean'] 1. adj. Able to guess, sometimes even correctly, the result intended when bogus input was provided. 2. n. obs. The BBNLISP/INTERLISP function that attempted to accomplish this feat by correcting many of the more common errors. Seehairy. 3. Occasionally, an interjection hurled at a balky computer, esp. when one senses one might be tripping over legalisms (seelegalese). 4. Of a person, someone whose directions are incomprehensible and vague, but who nevertheless has the expectation that you will solve the problem using the specific method he/she has in mind.
Warren Teitelman originally wrote DWIM to fix his typos and spelling errors, so it was somewhat idiosyncratic to his style, and would often make hash of anyone else's typos if they were stylistically different. Some victims of DWIM thus claimed that the acronym stood for `Damn Warren's Infernal Machine!'.
In one notorious incident, Warren added a DWIM feature to the command interpreter used at Xerox PARC. One day another hacker there typeddelete *$to free up some disk space. (The editor there named backup files by appending$to the original file name, so he was trying to delete any backup files left over from old editing sessions.) It happened that there weren't any editor backup files, so DWIM helpfully reported*$ not found, assuming you meant 'delete *'.It then started to delete all the files on the disk! The hacker managed to stop it with aVulcan nerve pinchafter only a half dozen or so files were lost.
The disgruntled victim later said he had been sorely tempted to go to Warren's office, tie Warren down in his chair in front of his workstation, and then typedelete *$twice.
DWIM is often suggested in jest as a desired feature for a complex program; it is also occasionally described as the single instruction the ideal computer would have. Back when proofs of program correctness were in vogue, there were also jokes about `DWIMC' (Do What I Mean, Correctly). A related term, more often seen as a verb, is DTRT (Do The Right Thing); seeRight Thing.
Node:
dynner
, Next:
earthquake
, Previous:
DWIM
, Up:
= D =
dynner/din'r/ n.
32 bits, by analogy withnybbleandbyte. Usage: rare and extremely silly. See alsoplayte,tayste,crumb. General discussion of such terms is undernybble.
Node:
= E =
, Next:
= F =
, Previous:
= D =
, Up:
The Jargon Lexicon
Node:
earthquake
, Next:
Easter egg
, Previous:
dynner
, Up:
= E =
earthquaken.
[IBM] The ultimate real-world shock test for computer hardware. Hackish sources at IBM deny the rumor that the Bay Area quake of 1989 was initiated by the company to test quality-assurance procedures at its California plants.
Node:
Easter egg
, Next:
Easter egging
, Previous:
earthquake
, Up:
= E =
Easter eggn.
[from the custom of the Easter Egg hunt observed in the U.S. and many parts of Europe] 1. A message hidden in the object code of a program as a joke, intended to be found by persons disassembling or browsing the code. 2. A message, graphic, or sound effect emitted by a program (or, on a PC, the BIOS ROM) in response to some undocumented set of commands or keystrokes, intended as a joke or to display program credits. One well-known early Easter egg found in a couple of OSes caused them to respond to the commandmake lovewithnot war?. Many personal computers have much more elaborate eggs hidden in ROM, including lists of the developers' names, political exhortations, snatches of music, and (in one case) graphics images of the entire development team.
Node:
Easter egging
, Next:
eat flaming death
, Previous:
Easter egg
, Up:
= E =
Easter eggingn.
[IBM] The act of replacing unrelated components more or less at random in hopes that a malfunction will go away. Hackers consider this the normal operating mode offield circustechs and do not love them for it. See also the jokes underfield circus. Compareshotgun debugging.
Node:
eat flaming death
, Next:
EBCDIC
, Previous:
Easter egging
, Up:
= E =
eat flaming deathimp.
A construction popularized among hackers by the infamousCPU Warscomic; supposedly derive from a famously turgid line in a WWII-era anti-Nazi propaganda comic that ran "Eat flaming death, non-Aryan mongrels!" or something of the sort (however, it is also reported that the Firesign Theatre's 1975 album "In The Next World, You're On Your Own" a character won the right to scream "Eat flaming death, fascist media pigs" in the middle of Oscar night on a game show; this may have been an influence). Used in humorously overblown expressions of hostility. "Eat flaming death,EBCDICusers!"
Node:
EBCDIC
, Next:
echo
, Previous:
eat flaming death
, Up:
= E =
EBCDIC/eb's*-dik/, /eb'see`dik/, or /eb'k*-dik/ n.
[abbreviation, Extended Binary Coded Decimal Interchange Code] An alleged character set used on IBMdinosaurs. It exists in at least six mutually incompatible versions, all featuring such delights as non-contiguous letter sequences and the absence of several ASCII punctuation characters fairly important for modern computer languages (exactly which characters are absent varies according to which version of EBCDIC you're looking at). IBM adapted EBCDIC frompunched cardcode in the early 1960s and promulgated it as a customer-control tactic (seeconnector conspiracy), spurning the already established ASCII standard. Today, IBM claims to be an open-systems company, but IBM's own description of the EBCDIC variants and how to convert between them is still internally classified top-secret, burn-before-reading. Hackers blanch at the verynameof EBCDIC and consider it a manifestation of purestevil. See alsofear and loathing.
Node:
echo
, Next:
ECP
, Previous:
EBCDIC
, Up:
= E =
echo[FidoNet] n.
Atopic grouponFidoNet's echomail system. Comparenewsgroup.
Node:
ECP
, Next:
ed
, Previous:
echo
, Up:
= E =
ECP/E-C-P/ n.
Seespamandvelveeta.
Node:
ed
, Next:
egosurf
, Previous:
ECP
, Up:
= E =
edn.
"ed is the standard text editor." Line taken from original theUnixmanual page on ed, an ancient line-oriented editor that is by now used only by a fewReal Programmers, and even then only for batch operations. The original line is sometimes uttered near the beginning of an emacs vs. vi holy war onUsenet, with the (vain) hope to quench the discussion before it really takes off. Often followed by a standard text describing the many virtues of ed (such as the small memoryfootprinton a Timex Sinclair, and the consistent (because nearly non-existent) user interface).