= J =

Node:

ironmonger

, Next:

ISO standard cup of tea

, Previous:

iron box

, Up:

= I =

ironmongern.

[IBM] A hardware specialist (derogatory). Comparesandbender,polygon pusher.

Node:

ISO standard cup of tea

, Next:

ISP

, Previous:

ironmonger

, Up:

= I =

ISO standard cup of tean.

[South Africa] A cup of tea with milk and one teaspoon of sugar, where the milk is poured into the cup before the tea. Variations are ISO 0, with no sugar; ISO 2, with two spoons of sugar; and so on. This may derive from the "NATO standard" cup of coffee and tea (milk and two sugars), military slang going back to the late 1950s and parodying NATO's relentless bureacratic drive to standardize parts across European and U.S. militaries.

Like many ISO standards, this one has a faintly alien ring in North America, where hackers generally shun the decadent British practice of adulterating perfectly good tea with dairy products and prefer instead to add a wedge of lemon, if anything. If one were feeling extremely silly, one might hypothesize an analogous `ANSI standard cup of tea' and wind up with a political situation distressingly similar to several that arise in much more serious technical contexts. (Milk and lemon don't mix very well.)

[2000 update: There is now, in fact, a `British Standard BS6008: How to make a standard cup of tea.' - ESR]

Node:

ISP

, Next:

ITS

, Previous:

ISO standard cup of tea

, Up:

= I =

ISP/I-S-P/

Common abbreviation for Internet Service Provider, a kind of company that barely existed before 1993. ISPs sell Internet access to the mass market. While the big nationwide commercial BBSs with Internet access (like America Online, CompuServe, GEnie, Netcom, etc.) are technically ISPs, the term is usually reserved for local or regional small providers (often run by hackers turned entrepreneurs) who resell Internet access cheaply without themselves being information providers or selling advertising. CompareNSP.

Node:

ITS

, Next:

IWBNI

, Previous:

ISP

, Up:

= I =

ITS/I-T-S/ n.

1. Incompatible Time-sharing System, an influential though highly idiosyncratic operating system written for PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab. Much AI-hacker jargon derives from ITS folklore, and to have been `an ITS hacker' qualifies one instantly as an old-timer of the most venerable sort. ITS pioneered many important innovations, including transparent file sharing between machines and terminal-independent I/O. After about 1982, most actual work was shifted to newer machines, with the remaining ITS boxes run essentially as a hobby and service to the hacker community. The shutdown of the lab's last ITS machine in May 1990 marked the end of an era and sent old-time hackers into mourning nationwide (seehigh moby). 2. A mythical image of operating-system perfection worshiped by a bizarre, fervent retro-cult of old-time hackers and ex-users (seetroglodyte, sense 2). ITS worshipers manage somehow to continue believing that an OS maintained by assembly-language hand-hacking that supported only monocase 6-character filenames in one directory per account remains superior to today's state of commercial art (their venom againstUnixis particularly intense). See alsoholy wars,Weenix.

Node:

IWBNI

, Next:

IYFEG

, Previous:

ITS

, Up:

= I =

IWBNI//

Abbreviation for `It Would Be Nice If'. CompareWIBNI.

Node:

IYFEG

, Next:

J. Random

, Previous:

IWBNI

, Up:

= I =

IYFEG//

[Usenet] Abbreviation for `Insert Your Favorite Ethnic Group'. Used as a meta-name when telling ethnic jokes on the net to avoid offending anyone. SeeJEDR.

Node:

= J =

, Next:

= K =

, Previous:

= I =

, Up:

The Jargon Lexicon

Node:

J. Random

, Next:

J. Random Hacker

, Previous:

IYFEG

, Up:

= J =

J. Random/J rand'm/ n.

[common; generalized fromJ. Random Hacker] Arbitrary; ordinary; any one; any old. `J. Random' is often prefixed to a noun to make a name out of it. It means roughly `some particular' or `any specific one'. "Would you let J. Random Loser marry your daughter?" The most common uses are `J. Random Hacker', `J. Random Loser', and `J. Random Nerd' ("Should J. Random Loser be allowed togundown other people?"), but it can be used simply as an elaborate version ofrandomin any sense.

Node:

J. Random Hacker

, Next:

jack in

, Previous:

J. Random

, Up:

= J =

J. Random Hacker/J rand'm hak'r/ n.

[very common] A mythical figure like the Unknown Soldier; the archetypal hacker nerd. This term is one of the oldest in the jargon, apparently going back to MIT in the 1960s. Seerandom,Suzie COBOL. This may originally have been inspired by `J. Fred Muggs', a show-biz chimpanzee whose name was a household word back in the early days ofTMRC, and was probably influenced by `J. Presper Eckert' (one of the co-inventors of the electronic computer). See alsoFred Foobar.

Node:

jack in

, Next:

jaggies

, Previous:

J. Random Hacker

, Up:

= J =

jack inv.

To log on to a machine or connect to a network orBBS, esp. for purposes of entering avirtual realitysimulation such as aMUDorIRC(leaving is "jacking out"). This term derives fromcyberpunkSF, in which it was used for the act of plugging an electrode set into neural sockets in order to interface the brain directly to a virtual reality. It is primarily used by MUD and IRC fans and younger hackers on BBS systems.

Node:

jaggies

, Next:

Java

, Previous:

jack in

, Up:

= J =

jaggies/jag'eez/ n.

The `stairstep' effect observable when an edge (esp. a linear edge of very shallow or steep slope) is rendered on a pixel device (as opposed to a vector display).

Node:

Java

, Next:

JCL

, Previous:

jaggies

, Up:

= J =

Java

An object-oriented language originally developed at Sun by James Gosling (and known by the name "Oak") with the intention of being the successor toC++(the project was however originally sold to Sun as an embedded language for use in set-top boxes). After the great Internet explosion of 1993-1994, Java was hacked into a byte-interpreted language and became the focus of a relentless hype campaign by Sun, which touted it as the new language of choice for distributed applications.

Java is indeed a stronger and cleaner design than C++ and has been embraced by many in the hacker community - but it has been a considerable source of frustration to many others, for reasons ranging from uneven support on different Web browser platforms, performance issues, and some notorious deficiencies of some of the standard toolkits (AWT in particular).Microsoft's determined attempts to corrupt the language (which it rightly sees as a threat to its OS monopoly) have not helped. As of 1999, these issues are still in the process of being resolved.

Despite many attractive features and a good design, it is difficult to find people willing to praise Java who have tried to implement a complex, real-world system with it (but to be fair it is early days yet, and no other language has ever been forced to spend its childhood under the limelight the way Java has). On the other hand, Java has already been a bigwinin academic circles, where it has taken the place ofPascalas the preferred tool for teaching the basics of good programming to the next generation of hackers.

Node:

JCL

, Next:

JEDR

, Previous:

Java

, Up:

= J =

JCL/J-C-L/ n.

1. IBM's supremelyrudeJob Control Language. JCL is the script language used to control the execution of programs in IBM's batch systems. JCL has a veryfascistsyntax, and some versions will, for example,barfif two spaces appear where it expects one. Most programmers confronted with JCL simply copy a working file (or card deck), changing the file names. Someone who actually understands and generates unique JCL is regarded with the mixed respect one gives to someone who memorizes the phone book. It is reported that hackers at IBM itself sometimes sing "Who's the breeder of the crud that mangles you and me? I-B-M, J-C-L, M-o-u-s-e" to the tune of the "Mickey Mouse Club" theme to express their opinion of the beast. 2. A comparative for any veryrudesoftware that a hacker is expected to use. "That's as bad as JCL." As withCOBOL, JCL is often used as an archetype of ugliness even by those who haven't experienced it. See alsoIBM,fear and loathing.

A (poorly documented, naturally) shell simulating JCL syntax is available at the Retrocomputing Museum http://www.ccil.org/retro.

Node:

JEDR

, Next:

Jeff K.

, Previous:

JCL

, Up:

= J =

JEDR// n.

Synonymous withIYFEG. At one time, people in the Usenet newsgrouprec.humor.funnytended to use `JEDR' instead ofIYFEGor `'; this stemmed from a public attempt to suppress the group once made by a loser with initials JEDR after he was offended by an ethnic joke posted there. (The practice wasretconned by the expanding these initials as `Joke Ethnic/Denomination/Race'.) After much sound and fury JEDR faded away; this term appears to be doing likewise. JEDR's only permanent effect on the net.culture was to discredit `sensitivity' arguments for censorship so thoroughly that more recent attempts to raise them have met with immediate and near-universal rejection.

Node:

Jeff K.

, Next:

jello

, Previous:

JEDR

, Up:

= J =

Jeff K.

The spiritual successor toB1FFand the archetype ofscript kiddies. Jeff K. is a sixteen-year-old suburbanite who fancies himself a "l33t haX0r", although his knowledge of computers seems to be limited to the procedure for getting Quake up and running. His Web page http://www.somethingawful.com/jeffk features a number of hopelessly naive articles, essays, and rants, all filled with the kind of misspellings,studlycaps, and number-for-letter substitutions endemic to the script kiddie andwarez d00dzcommunities. Jeff's offerings, among other things, include hardware advice (such as "AMD VERSIS PENTIUM" and "HOW TO OVARCLOAK YOUR COMPUTAR"), his own Quake clan (Clan 40 OUNSCE), and his own comic strip (Wacky Fun Computar Comic Jokes).

Like B1FF, Jeff K. is (fortunately) a hoax. Jeff K. was created by internet game journalist Richard "Lowtax" Kyanka, whose web site Something Awful (http://www.somethingawful.com) highlights unintentionally humorous news items and Web sites, as a parody of the kind of teenageluserwho infests Quake servers, chat rooms, and other places where computer enthusiasts congregate. He is well-recognized in the PC game community and his influence has spread to hackerforalike Slashdot as well.

Node:

jello

, Next:

jiffy

, Previous:

Jeff K.

, Up:

= J =

jellon.

[Usenet: by analogy withspam] A message that is both excessively cross-posted and too frequently posted, as opposed tospam(which is merely too frequently posted) orvelveeta(which is merely excessively cross-posted). This term is widely recognized but not commonly used; most people refer to both kinds of abuse or their combination as spam.

Node:

jiffy

, Next:

job security

, Previous:

jello

, Up:

= J =

jiffyn.

1. The duration of one tick of the system clock on your computer (seetick). Often one AC cycle time (1/60 second in the U.S. and Canada, 1/50 most other places), but more recently 1/100 sec has become common. "The swapper runs every 6 jiffies" means that the virtual memory management routine is executed once for every 6 ticks of the clock, or about ten times a second. 2. Confusingly, the term is sometimes also used for a 1-millisecondwall timeinterval. 3. Even more confusingly, physicists semi-jokingly use `jiffy' to mean the time required for light to travel one foot in a vacuum, which turns out to be close to onenanosecond. 4. Indeterminate time from a few seconds to forever. "I'll do it in a jiffy" means certainly not now and possibly never. This is a bit contrary to the more widespread use of the word. Opposenano. See alsoReal Soon Now.

Node:

job security

, Next:

jock

, Previous:

jiffy

, Up:

= J =

job securityn.

When some piece of code is written in a particularlyobscurefashion, and no good reason (such as time or space optimization) can be discovered, it is often said that the programmer was attempting to increase his job security (i.e., by making himself indispensable for maintenance). This sour joke seldom has to be said in full; if two hackers are looking over some code together and one points at a section and says "job security", the other one may just nod.

Node:

jock

, Next:

joe code

, Previous:

job security

, Up:

= J =

jockn.

1. A programmer who is characterized by large and somewhat brute-force programs. Seebrute force. 2. When modified by another noun, describes a specialist in some particular computing area. The compounds `compiler jock' and `systems jock' seem to be the best-established examples.

Node:

joe code

, Next:

jolix

, Previous:

jock

, Up:

= J =

joe code/joh' kohd`/ n.

1. Code that is overlytenseand unmaintainable. "Perlmay be a handy program, but if you look at the source, it's complete joe code." 2. Badly written, possibly buggy code.

Correspondents wishing to remain anonymous have fingered a particular Joe at the Lawrence Berkeley Laboratory and observed that usage has drifted slightly; the original sobriquet `Joe code' was intended in sense 1.

1994 update: This term has now generalized to ` code', used to designate code with distinct characteristics traceable to its author. "This section doesn't check for a NULL return from malloc()! Oh. No wonder! It's Ed code!". Used most often with a programmer who has left the shop and thus is a convenient scapegoat for anything that is wrong with the project.

Node:

jolix

, Next:

juggling eggs

, Previous:

joe code

, Up:

= J =

jolix/joh'liks/ n.,adj.

386BSD, the freeware port of the BSD Net/2 release to the Intel i386 architecture by Bill Jolitz, Lynne Greer Jolitz, and friends. Used to differentiate from BSDI's port based on the same source tape, which used to be called BSD/386 and is now BSD/OS. SeeBSD.

Node:

juggling eggs

, Next:

jump off into never-never land

, Previous:

jolix

, Up:

= J =

juggling eggsvi.

Keeping a lot ofstatein your head while modifying a program. "Don't bother me now, I'm juggling eggs", means that an interrupt is likely to result in the program's being scrambled. In the classic 1975 first-contact SF novel "The Mote in God's Eye", by Larry Niven and Jerry Pournelle, an alien describes a very difficult task by saying "We juggle priceless eggs in variable gravity." See alsohack modeandon the gripping hand.

Node:

jump off into never-never land

, Next:

jupiter

, Previous:

juggling eggs

, Up:

= J =

jump off into never-never landv.

[from J. M. Barrie's "Peter Pan"] Same asbranch to Fishkill, but more common in technical cultures associated with non-IBM computers that use the term `jump' rather than `branch'. Comparehyperspace.

Node:

jupiter

, Next:


Back to IndexNext