archive-org.com » ORG » N » NO-COPY.ORG

Total: 839

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • bit twiddling
    go to produce little noticeable improvement often with the result that the code becomes incomprehensible 2 Aimless small modification to a program esp for some pointless goal 3 Approx syn for bit bashing esp used for the act of frobbing

    Original URL path: http://www.no-copy.org/jargonfile/html/B/bit-twiddling.html (2016-02-09)
    Open archived version from archive


  • bit-paired keyboard
    high low bits bits 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 010 011 0 1 2 3 4 5 6 7 8 9 This is why the characters appear where they do on a Teletype thankfully they didn t use shift 0 for space The Teletype Model 33 was actually designed before ASCII existed and was originally intended to use a code that contained these two rows low bits high 0000 0010 0100 0110 1000 1010 1100 1110 bits 0001 0011 0101 0111 1001 1011 1101 1111 10 bel wru 11 0 1 2 3 4 5 6 7 8 9 esc del The result would have been something closer to a normal keyboard But as it happened Teletype had to use a lot of persuasion just to keep ASCII and the Model 33 keyboard from looking like this instead 0 1 2 3 4 5 6 7 8 9 Teletype s was not the weirdest variant of the QWERTY layout widely seen by the way that prize should probably go to one of several differing arrangements on IBM s even clunkier 026 and 029 card punches When electronic terminals became popular in the early 1970s there was no agreement in the industry over how the keyboards should be laid out Some vendors opted to emulate the Teletype keyboard while others used the flexibility of electronic circuitry to make their product look like an office typewriter Either choice was supported by the ANSI computer keyboard standard X4 14 1971 which referred to the alternatives as logical bit pairing and typewriter pairing These alternatives became known as bit paired and typewriter paired keyboards To a hacker the bit paired keyboard seemed far more logical and because most hackers in those days had never learned to touch type there

    Original URL path: http://www.no-copy.org/jargonfile/html/B/bit-paired-keyboard.html (2016-02-09)
    Open archived version from archive

  • bitblt
    and copying rectangles of bits between main and display memory on a bit mapped device or between two areas of either main or display memory the requirement to do the Right Thing in the case of overlapping source and destination

    Original URL path: http://www.no-copy.org/jargonfile/html/B/bitblt.html (2016-02-09)
    Open archived version from archive

  • bits
    need to know about file formats Compare core dump sense 4 2 Machine readable representation of a document specifically as contrasted with paper I have only a photocopy of the Jargon File does anyone know where I can get the

    Original URL path: http://www.no-copy.org/jargonfile/html/B/bits.html (2016-02-09)
    Open archived version from archive

  • bitty box
    hacker acute claustrophobia at the thought of developing software on or for it Especially used of small obsolescent single tasking only personal machines such as the Atari 800 Osborne Sinclair VIC 20 TRS 80 or IBM PC 2 Pejorative More

    Original URL path: http://www.no-copy.org/jargonfile/html/B/bitty-box.html (2016-02-09)
    Open archived version from archive

  • bixie
    the BIX Information eXchange the term survived the demise of BIX itself The most common smiley bixie is representing two cartoon eyes and a mouth These were originally invented in an SF fanzine called APA L and imported to BIX

    Original URL path: http://www.no-copy.org/jargonfile/html/B/bixie.html (2016-02-09)
    Open archived version from archive

  • black art
    developed for a particular application or systems area compare black magic VLSI design and compiler code optimization were in their beginnings considered classic examples of black art as theory developed they became deep magic and once standard textbooks had been written became merely heavy wizardry The huge proliferation of formal and informal channels for spreading around new computer related technologies during the last twenty years has made both the term

    Original URL path: http://www.no-copy.org/jargonfile/html/B/black-art.html (2016-02-09)
    Open archived version from archive

  • black hat
    All three terms derive from the dress code of formulaic Westerns in which bad guys wore black hats and good guys white ones 2 spamfighters Black hat white hat and gray hat are also used to denote the spam friendliness of ISPs a black hat ISP harbors spammers and doesn t terminate them a white hat ISP terminates upon the first LART and gray hat ISPs terminate only reluctantly and

    Original URL path: http://www.no-copy.org/jargonfile/html/B/black-hat.html (2016-02-09)
    Open archived version from archive



  •