dub dub dub
[common] Spoken-only shorthand for the "www" (double-u double-u double-u) in many web host names. Nothing to do with the style of reggae music called `dub'.
Duff's device n.
The most dramatic use yet seen of fall through in C, invented by Tom Duff when he was at Lucasfilm. Trying to bum all the instructions he could out of an inner loop that copied data serially onto an output port, he decided to unroll it. He then realized that the unrolled version could be implemented by interlacing the structures of a switch and a loop:
switch (count % 8)
{
case 0: do { *to = *from++;
case 7: *to = *from++;
case 6: *to = *from++;
case 5: *to = *from++;
case 4: *to = *from++;
case 3: *to = *from++;
case 2: *to = *from++;
case 1: *to = *from++;
} while (--n > 0);
}
Shocking though it appears to all who encounter it for the
first time, the device is actually perfectly valid, legal C. C's
default fall through in case
statements has long been its most controversial single feature;
Duff observed that "This code forms some sort of argument in that
debate, but I'm not sure whether it's for or against." Duff has
discussed the device in detail at http://www.lysator.liu.se/c/duffs-device.html.
Note that the omission of postfix ++
from
*to
was intentional (though confusing). Duff's
device can be used to implement memory copy, but the original aim
was to copy values serially into a magic IO register.
[For maximal obscurity, the outermost pair of braces above could actually be removed -- GLS]
dumb terminal n.
A terminal that is one step above a glass tty, having a minimally addressable cursor but no on-screen editing or other features normally supported by a smart terminal. Once upon a time, when glass ttys were common and addressable cursors were something special, what is now called a dumb terminal could pass for a smart terminal.
dumbass attack /duhm'as *-tak'/ n.
[Purdue] Notional cause of a novice's mistake made by the
experienced, especially one made while running as root under Unix, e.g., typing rm -r
*
or mkfs
on a mounted file system. Compare
adger.
dumbed down adj.
Simplified, with a strong connotation of oversimplified. Often, a marketroid will insist that the interfaces and documentation of software be dumbed down after the designer has burned untold gallons of midnight oil making it smart. This creates friction. See user-friendly.
dump n.
1. An undigested and voluminous mass of information about a problem or the state of a system, especially one routed to the slowest available output device (compare core dump), and most especially one consisting of hex or octal runes describing the byte-by-byte state of memory, mass storage, or some file. In elder days, debugging was generally done by `groveling over' a dump (see grovel); increasing use of high-level languages and interactive debuggers has made such tedium uncommon, and the term `dump' now has a faintly archaic flavor. 2. A backup. This usage is typical only at large timesharing installations.
dumpster diving /dump'-ster di:'-ving/ n.
1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information (`dumpster' is an Americanism for what is elsewhere called a `skip'). Back in AT&T's monopoly days, before paper shredders became common office equipment, phone phreaks (see phreaking) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT&T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets. 2. The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in some hacker's den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially useful) cruft.
dup killer /d[y]oop kill'r/ n.
[FidoNet] Software that is supposed to detect and delete duplicates of a message that may have reached the FidoNet system via different routes.
dup loop /d[y]oop loop/ (also `dupe loop') n.
[FidoNet] An infinite stream of duplicated, near-identical messages on a FidoNet echo, the only difference being unique or mangled identification information applied by a faulty or incorrectly configured system or network gateway, thus rendering dup killers ineffective. If such a duplicate message eventually reaches a system through which it has already passed (with the original identification information), all systems passed on the way back to that system are said to be involved in a dup loop.
dusty deck n.
Old software (especially applications) which one is obliged to remain compatible with, or to maintain (DP types call this `legacy code', a term hackers consider smarmy and excessively reverent). The term implies that the software in question is a holdover from card-punch days. Used esp. when referring to old scientific and number-crunching software, much of which was written in FORTRAN and very poorly documented but is believed to be too expensive to replace. See fossil; compare crawling horror.
DWIM /dwim/
[acronym, `Do What I Mean'] 1. adj. Able to guess, sometimes even correctly, the result intended when bogus input was provided. 2. n. obs. The BBNLISP/INTERLISP function that attempted to accomplish this feat by correcting many of the more common errors. See hairy. 3. Occasionally, an interjection hurled at a balky computer, esp. when one senses one might be tripping over legalisms (see legalese). 4. Of a person, someone whose directions are incomprehensible and vague, but who nevertheless has the expectation that you will solve the problem using the specific method he/she has in mind.
Warren Teitelman originally wrote DWIM to fix his typos and spelling errors, so it was somewhat idiosyncratic to his style, and would often make hash of anyone else's typos if they were stylistically different. Some victims of DWIM thus claimed that the acronym stood for `Damn Warren's Infernal Machine!'.
In one notorious incident, Warren added a DWIM feature to the
command interpreter used at Xerox PARC. One day another hacker
there typed delete *$
to free up some disk space.
(The editor there named backup files by appending $
to the original file name, so he was trying to delete any backup
files left over from old editing sessions.) It happened that
there weren't any editor backup files, so DWIM helpfully reported
*$ not found, assuming you meant 'delete *'.
It then
started to delete all the files on the disk! The hacker managed
to stop it with a Vulcan
nerve pinch after only a half dozen or so files were
lost.
The disgruntled victim later said he had been sorely tempted
to go to Warren's office, tie Warren down in his chair in front
of his workstation, and then type delete *$
twice.
DWIM is often suggested in jest as a desired feature for a complex program; it is also occasionally described as the single instruction the ideal computer would have. Back when proofs of program correctness were in vogue, there were also jokes about `DWIMC' (Do What I Mean, Correctly). A related term, more often seen as a verb, is DTRT (Do The Right Thing); see Right Thing.
dynner /din'r/ n.
32 bits, by analogy with nybble and byte. Usage: rare and extremely silly. See also playte, tayste, crumb. General discussion of such terms is under nybble.
= E =
- earthquake:
- Easter egg:
- Easter egging:
- eat flaming death:
- EBCDIC:
- echo:
- ECP:
- ed:
- egosurf:
- eighty-column mind:
- El Camino Bignum:
- elder days:
- elegant:
- elephantine:
- elevator controller:
- elite:
- ELIZA effect:
- elvish:
- EMACS:
- email:
- emoticon:
- EMP:
- empire:
- engine:
- English:
- enhancement:
- ENQ:
- EOF:
- EOL:
- EOU:
- epoch:
- epsilon:
- epsilon squared:
- era the:
- Eric Conspiracy:
- Eris:
- erotics:
- error 33:
- eurodemo:
- evil:
- evil and rude:
- Evil Empire:
- exa-:
- examining the entrails:
- EXCH:
- excl:
- EXE:
- exec:
- exercise left as an:
- Exon:
- Exploder:
- exploit:
- external memory:
- eye candy:
- eyeball search:
earthquake n.
[IBM] The ultimate real-world shock test for computer hardware. Hackish sources at IBM deny the rumor that the Bay Area quake of 1989 was initiated by the company to test quality-assurance procedures at its California plants.
Easter egg n.
[from the custom of the Easter Egg hunt observed in the U.S.
and many parts of Europe] 1. A message hidden in the object code
of a program as a joke, intended to be found by persons
disassembling or browsing the code. 2. A message, graphic, or
sound effect emitted by a program (or, on a PC, the BIOS ROM) in
response to some undocumented set of commands or keystrokes,
intended as a joke or to display program credits. One well-known
early Easter egg found in a couple of OSes caused them to respond
to the command make love
with not war?
.
Many personal computers have much more elaborate eggs hidden in
ROM, including lists of the developers' names, political
exhortations, snatches of music, and (in one case) graphics
images of the entire development team.
Easter egging n.
[IBM] The act of replacing unrelated components more or less at random in hopes that a malfunction will go away. Hackers consider this the normal operating mode of field circus techs and do not love them for it. See also the jokes under field circus. Compare shotgun debugging.
eat flaming death imp.
A construction popularized among hackers by the infamous CPU Wars comic; supposedly derive from a famously turgid line in a WWII-era anti-Nazi propaganda comic that ran "Eat flaming death, non-Aryan mongrels!" or something of the sort (however, it is also reported that the Firesign Theatre's 1975 album "In The Next World, You're On Your Own" a character won the right to scream "Eat flaming death, fascist media pigs" in the middle of Oscar night on a game show; this may have been an influence). Used in humorously overblown expressions of hostility. "Eat flaming death, EBCDIC users!"
EBCDIC /eb's*-dik/, /eb'see`dik/, or /eb'k*-dik/ n.
[abbreviation, Extended Binary Coded Decimal Interchange Code] An alleged character set used on IBM dinosaurs. It exists in at least six mutually incompatible versions, all featuring such delights as non-contiguous letter sequences and the absence of several ASCII punctuation characters fairly important for modern computer languages (exactly which characters are absent varies according to which version of EBCDIC you're looking at). IBM adapted EBCDIC from punched card code in the early 1960s and promulgated it as a customer-control tactic (see connector conspiracy), spurning the already established ASCII standard. Today, IBM claims to be an open-systems company, but IBM's own description of the EBCDIC variants and how to convert between them is still internally classified top-secret, burn-before-reading. Hackers blanch at the very name of EBCDIC and consider it a manifestation of purest evil. See also fear and loathing.
echo [FidoNet] n.
A topic group on FidoNet's echomail system. Compare newsgroup.
ECP /E-C-P/ n.
ed n.
"ed is the standard text editor." Line taken from original the Unix manual page on ed, an ancient line-oriented editor that is by now used only by a few Real Programmers, and even then only for batch operations. The original line is sometimes uttered near the beginning of an emacs vs. vi holy war on Usenet, with the (vain) hope to quench the discussion before it really takes off. Often followed by a standard text describing the many virtues of ed (such as the small memory footprint on a Timex Sinclair, and the consistent (because nearly non-existent) user interface).