Other
Read books online » Other » The Hacker's Dictionary by - (romantic novels to read TXT) 📖
  • Author: -
  • Performer: 0262680920

Book online «The Hacker's Dictionary by - (romantic novels to read TXT) 📖». Author -



1 ... 42 43 44 45 46 47 48 49 50 ... 111
Go to page:
San Francisco, when it was learned that the defendant Dan White (a politician who had supported Proposition 7) would get the gas chamber under Proposition 7 if convicted of first-degree murder (he was eventually convicted of manslaughter).

:GC: /G-C/ [from LISP terminology; `Garbage Collect']

vt. To clean up and throw away useless things. "I think I'll GC the top of my desk today." When said of files, this is equivalent to {GFR}. 2. vt. To recycle, reclaim, or put to another use. 3. n. An instantiation of the garbage collector process.

`Garbage collection' is computer-science jargon for a particular class of strategies for dynamically reallocating computer memory.

One such strategy involves periodically scanning all the data in memory and determining what is no longer accessible; useless data items are then discarded so that the memory they occupy can be recycled and used for another purpose. Implementations of the LISP

language usually use garbage collection.

In jargon, the full phrase is sometimes heard but the {abbrev} is more frequently used because it is shorter. Note that there is an ambiguity in usage that has to be resolved by context: "I'm going to garbage-collect my desk" usually means to clean out the drawers, but it could also mean to throw away or recycle the desk itself.

:GCOS:: /jee'kohs/ n. A {quick-and-dirty} {clone} of System/360 DOS that emerged from GE around 1970; originally called GECOS (the General Electric Comprehensive Operating System). Later kluged to support primitive timesharing and transaction processing.

After the buyout of GE's computer division by Honeywell, the name was changed to General Comprehensive Operating System (GCOS).

Other OS groups at Honeywell began referring to it as `God's Chosen Operating System', allegedly in reaction to the GCOS crowd's uninformed and snotty attitude about the superiority of their product. All this might be of zero interest, except for two facts: (1) The GCOS people won the political war, and this led in the orphaning and eventual death of Honeywell {{Multics}}, and (2) GECOS/GCOS left one permanent mark on UNIX. Some early UNIX

systems at Bell Labs used GCOS machines for print spooling and various other services; the field added to /etc/passwd' to carry GCOS ID information was called theGECOS field' and survives today as the `pw_gecos' member used for the user's full name and other human-ID information. GCOS later played a major role in keeping Honeywell a dismal also-ran in the mainframe market, and was itself ditched for UNIX in the late 1980s when Honeywell retired its aging {big iron} designs.

:GECOS:: /jee'kohs/ n. See {{GCOS}}.

:gedanken: /g*-don'kn/ adj. Ungrounded; impractical; not well-thought-out; untried; untested. Gedanken' is a German word forthought'. A thought experiment is one you carry out in your head. In physics, the term `gedanken experiment' is used to refer to an experiment that is impractical to carry out, but useful to consider because you can reason about it theoretically. (A classic gedanken experiment of relativity theory involves thinking about a man in an elevator accelerating through space.) Gedanken experiments are very useful in physics, but you have to be careful.

It's too easy to idealize away some important aspect of the real world in contructing your `apparatus'.

Among hackers, accordingly, the word has a pejorative connotation.

It is said of a project, especially one in artificial intelligence research, that is written up in grand detail (typically as a Ph.D.

thesis) without ever being implemented to any great extent. Such a project is usually perpetrated by people who aren't very good hackers or find programming distasteful or are just in a hurry. A `gedanken thesis' is usually marked by an obvious lack of intuition about what is programmable and what is not, and about what does and does not constitute a clear specification of an algorithm. See also {AI-complete}, {DWIM}.

:geef: v. [ostensibly from `gefingerpoken'] vt. Syn. {mung}. See also {blinkenlights}.

:geek out: vi. To temporarily enter techno-nerd mode while in a non-hackish context, for example at parties held near computer equipment. Especially used when you need to do something highly technical and don't have time to explain: "Pardon me while I geek out for a moment." See {computer geek}.

:gen: /jen/ n.,v. Short for {generate}, used frequently in both spoken and written contexts.

:gender mender: n. A cable connector shell with either two male or two female connectors on it, used to correct the mismatches that result when some {loser} didn't understand the RS232C specification and the distinction between DTE and DCE. Used esp. for RS-232C

parts in either the original D-25 or the IBM PC's bogus D-9 format.

Also called gender bender',gender blender', sex changer', and evenhomosexual adapter'; however, there appears to be some confusion as to whether a `male homosexual adapter' has pins on both sides (is male) or sockets on both sides (connects two males).

:General Public Virus: n. Pejorative name for some versions of the {GNU} project {copyleft} or General Public License (GPL), which requires that any tools or {app}s incorporating copylefted code must be source-distributed on the same counter-commercial terms as GNU stuff. Thus it is alleged that the copyleft infects' software generated with GNU tools, which may in turn infect other software that reuses any of its code. The Free Software Foundation's official position as of January 1991 is that copyright law limits the scope of the GPL to "programs textually incorporating significant amounts of GNU code", and that theinfection' is not passed on to third parties unless actual GNU source is transmitted (as in, for example, use of the Bison parser skeleton).

Nevertheless, widespread suspicion that the {copyleft} language is `boobytrapped' has caused many developers to avoid using GNU

tools and the GPL. Recent (July 1991) changes in the language of the version 2.00 license may eliminate this problem.

:generate: vt. To produce something according to an algorithm or program or set of rules, or as a (possibly unintended) side effect of the execution of an algorithm or program. The opposite of {parse}. This term retains its mechanistic connotations (though often humorously) when used of human behavior. "The guy is rational most of the time, but mention nuclear energy around him and he'll generate {infinite} flamage."

:gensym: /jen'sim/ [from MacLISP for `generated symbol'] 1. v.

To invent a new name for something temporary, in such a way that the name is almost certainly not in conflict with one already in use. 2. n. The resulting name. The canonical form of a gensym is `Gnnnn' where nnnn represents a number; any LISP hacker would recognize G0093 (for example) as a gensym. 3. A freshly generated data structure with a gensymmed name. These are useful for storing or uniquely identifying crufties (see {cruft}).

:Get a life!: imp. Hacker-standard way of suggesting that the person to whom you are speaking has succumbed to terminal geekdom (see {computer geek}). Often heard on {USENET}, esp. as a way of suggesting that the target is taking some obscure issue of {theology} too seriously. This exhortation was popularized by William Shatner on a "Saturday Night Live" episode in a speech that ended "Get a life!", but some respondents believe it to have been in use before then. It was certainly in wide use among hackers for at least five years before achieving mainstream currency around early 1992.

:Get a real computer!: imp. Typical hacker response to news that somebody is having trouble getting work done on a system that (a) is single-tasking, (b) has no hard disk, or (c) has an address space smaller than 4 megabytes. This is as of mid-1991; note that the threshold for real computer' rises with time, and it may well be (for example) that machines with character-only displays will be generally consideredunreal' in a few years (GLS points out that they already are in some circles). See {essentials}, {bitty box}, and {toy}.

:GFR: /G-F-R/ vt. [ITS] From `Grim File Reaper', an ITS and Lisp Machine utility. To remove a file or files according to some program-automated or semi-automatic manual procedure, especially one designed to reclaim mass storage space or reduce name-space clutter (the original GFR actually moved files to tape). Often generalized to pieces of data below file level. "I used to have his phone number, but I guess I {GFR}ed it." See also {prowler}, {reaper}. Compare {GC}, which discards only provably worthless stuff.

:gig: /jig/ or /gig/ [SI] n. See {{quantifiers}}.

:giga-: /ji'ga/ or /gi'ga/ [SI] pref. See {{quantifiers}}.

:GIGO: /gi:'goh/ [acronym] 1. `Garbage In, Garbage Out' ---

usually said in response to {luser}s who complain that a program didn't complain about faulty data. Also commonly used to describe failures in human decision making due to faulty, incomplete, or imprecise data. 2. Garbage In, Gospel Out': this more recent expansion is a sardonic comment on the tendency human beings have to put excessive trust incomputerized' data.

:gilley: [USENET] n. The unit of analogical bogosity. According to its originator, the standard for one gilley was "the act of bogotoficiously comparing the shutting down of 1000 machines for a day with the killing of one person". The milligilley has been found to suffice for most normal conversational exchanges.

:gillion: /gil'yn/ or /jil'yn/ [formed from {giga-} by analogy with mega/million and tera/trillion] n. 10^9. Same as an American billion or a British milliard'. How one pronounces this depends on whether one speaks {giga-} with a hard or softg'.

:GIPS: /gips/ or /jips/ [analogy with {MIPS}] n.

Giga-Instructions per

1 ... 42 43 44 45 46 47 48 49 50 ... 111
Go to page:

Free ebook «The Hacker's Dictionary by - (romantic novels to read TXT) 📖» - read online now

Comments (0)

There are no comments yet. You can be the first!
Add a comment