List of computer term etymologies

This is a list of the origins of computer-related terms or terms used in the computing world (i.e., a list of computer term etymologies). It relates to both computer hardware and computer software.

Names of many computer terms, especially computer applications, often relate to the function they perform, e.g., a compiler is an application that compiles (programming language source code into the computer's machine language). However, there are other terms with less obvious origins, which are of etymological interest. This article lists such terms.

A

  • ABEND – originally from an IBM System/360 error message, short for "abnormal end". Jokingly reinterpreted as German Abend ("evening"), because "it is what system operators do to the machine late on Friday when they want to call it a day."[1]
  • Ada – named after Ada Lovelace, who is considered by many to be the first programmer.
  • Apache – originally chosen from respect for the Native American Indian tribe of Apache. It was suggested that the name was appropriate, as Apache began as a series of patches to code written for NCSA's HTTPd daemon. The result was "a patchy" server.[2]

B

The first case of an actual computer bug, a moth trapped in a relay of the Harvard Mark II
  • B – probably a contraction of "BCPL", reflecting Ken Thompson's efforts to implement a smaller BCPL in 8 KB of memory on a DEC PDP-7. Or, named after Bon.[4]
  • biff – named after a dog known by the developers at Berkeley, who – according to the UNIX manual page – died on 15 August 1993, at the age of 15, and belonged to a certain Heidi Stettner. Some sources[5][6] report that the dog would bark at the mail carrier, making it a natural choice for the name of a mail notification system. The Jargon File contradicts[7] this description, but confirms at least that the dog existed.
  • Bon – created by Ken Thompson and named either after his wife Bonnie, or else after "a religion whose rituals involve the murmuring of magic formulas" (a reference to the Tibetan native religion Bön).[4]
  • booting or bootstrapping – from the phrase "to pull oneself up by one's bootstraps", originally used as a metaphor for any self-initiating or self-sustaining process. Used in computing due to the apparent paradox that a computer must run code to load anything into memory, but code cannot be run until it is loaded.
  • bug – often (but erroneously) credited to Grace Hopper. In 1946, she joined the Harvard Faculty at the Computation Laboratory where she traced an error in the Harvard Mark II to a moth trapped in a relay. This bug was carefully removed and taped to the log book. However, use of the word 'bug' to describe defects in mechanical systems dates back to at least the 1870s, perhaps especially in Scotland. Thomas Edison, for one, used the term in his notebooks and letters.[10]
  • byte – coined by Werner Buchholz in June 1956 during the early design phase for the IBM Stretch computer.[11][12][13][14]

C

Computer room at Dryden Flight Research Center, 1949
  • C – a programming language.
Dennis Ritchie, having improved on the B language, named his creation New B. He later renamed it C. (See also D).
C++ creator Bjarne Stroustrup named his new language "C with Classes" and then "new C". The original language began to be called "old C" which was considered insulting to the C community. At this time Rick Mascitti suggested the name C++ as a successor to C. In C the '++' operator increments the value of the variable it is appended to, thus C++ would increment the value of C.
The term was coined by web browser programmer Lou Montulli after the term "magic cookies" used by Unix programmers. The term "magic cookie" in turn derives from "fortune cookie", a cookie with an embedded message.

D

  • D – a programming language.
Designed by Walter Bright as an improved C, avoiding many of the design problems of C (e.g., extensive pointer manipulation, unenforced array boundaries, etc.).
  • daemon – a process in an operating system that runs in the background.
It is not an acronym for Disk And Execution Monitor: according to the original team that introduced the concept, the use of the word daemon was inspired by the Maxwell's demon of physics and thermodynamics (an imaginary agent which helped sort molecules with differing velocities and worked tirelessly in the background)[15] The term was embraced, and possibly popularized, by the Unix operating systems which supported multiple background processes: various local (and later Internet) services were provided by daemons. This is exemplified by the BSD mascot, John Lasseter's drawing of a friendly imp.
A portmanteau of the names Ian Murdock, the Debian Project creator, and Debra Lynn, Ian's then girlfriend and future wife.[16][17]
  • default – an initial value for a variable or user setting.
The original meaning of the word 'default' is 'failure to fulfill an obligation'. The obligation here is to provide an input that is required by a program. In the early days of programming, if an input value was missing, or 'null', the program would almost certainly crash. This is often to do with variable 'typing' – for example, a simple calculation program would expect a number as an input: any other type of input such as a text string or even a null (no value), would make any mathematical operation such as multiplication impossible. In order to guard against this possibility, programmers defined initial values that would be used if the user *defaulted* or failed to fulfill the obligation of providing the correct input value. Over time, the term 'default' has come to refer to the initial value itself.

E

According to Robert Metcalfe (one of its initial developers), he devised the name in an early company memo as an endocentric compound of "luminiferous ether"—the "substance" that was widely believed to be the medium through which electromagnetic radiation propagated in the late 19th century—and "net", short for "network".[18] When the networking team would describe data flowing into the network infrastructure, they would routinely describe it as data packets going "up into the ether".[19]

F

  • fingerUnix command that provides information about users logged into a system.
Les Earnest wrote the finger program in 1971 to provide for users who wanted information about other users on a network or system. Before the finger program, the only way to get this information was with a who program that showed IDs and terminal line numbers for logged-in users; people used to run their fingers down the "who" list. Earnest named his program after this phenomenon.

G

Gentoo Linux is named after the penguin
Named after a variety of penguin, the universal Linux mascot.
Linus Torvalds, the creator of Git, is quoted to have said "I'm an egotistical bastard, and I name all my projects after myself. First 'Linux', now 'git'." The word is British English slang, roughly meaning silly, incompetent, annoying person.
The gnu is also a species of African antelope. The founder of the GNU project Richard Stallman liked the name because of the humour associated with its pronunciation, and was also influenced by The Gnu Song,[21] by Flanders and Swann, which is sung by a gnu. It is also an early example of a recursive acronym: "GNU's Not Unix".[22]
The name started as an exaggerated boast about the amount of information the search engine would be able to search. It was originally named 'Googol', a word for the number represented by 1 followed by 100 zeros. The word was originally invented by Milton Sirotta, nephew of mathematician Edward Kasner, in 1938 during a discussion of large numbers and exponential notation.
  • Gopher – an early distributed document search and retrieval network protocol on the Internet.
The source of the name is claimed to be three-fold: first, that it is used to "go-for" information; second, that it does so through a menu of links analogous to gopher holes; and third, that the mascot of the protocol authors' organization, the University of Minnesota, is Goldy the Gopher.
  • grep – a Unix command line utility
The name comes from a command in the Unix text editor ed that takes the form g/re/p meaning search globally for a regular expression and print lines where instances are found.[23] "Grep" like "Google" is often used as a verb, meaning "to search".

H

Founder Jack Smith got the idea of accessing e-mail via the web from a computer anywhere in the world. When Sabeer Bhatia came up with the business plan for the mail service, he tried all kinds of names ending in 'mail' and finally settled for Hotmail as it included the letters "HTML" – the markup language used to write web pages. It was initially referred to as HoTMaiL with selective upper casing.

I

  • i18n – short for "internationalization".
"18" is for the number of letters between the i and the n. Related, less common terms include l10n (for localization), g11n (for globalization) and a11y (for accessibility).
ICQ is not an initialism. It is a play on the phrase "I seek you" or "Internet seek you" (similar to CQ in ham radio usage).
  • ID10T – pronounced "ID ten T" – is a code frequently used by a customer service representative (CSR) to annotate their notes and identify the source of a problem as the person who is reporting the problem rather than the system being blamed. This is a thinly veiled reference to the CSR's opinion that the person reporting the problem is an IDIOT. Example: Problem reported caused by ID10T, no resolution possible. See also PEBKAC.

J

Jakarta was the name of the conference room at Sun where most of the meetings between Sun and Apache took place. The conference room was most likely named after Jakarta, the capital city of Indonesia, which is located on the northwest coast of the island of Java.
  • Java – a programming language.
Originally named "D", but with the connotation of a near-failing mark on a report card the language was renamed Oak by Java-creator James Gosling, from the tree that stood outside his window. The programming team at Sun had to look for a substitute name as there was already another programming language named Oak. "Java" was selected from a list of suggestions, primarily because it is a popular slang term for coffee, especially that grown on the island of Java. As the programmers drank a lot of coffee, this seemed an appropriate name. Many people mistakenly think that Java is an acronym and spell it JAVA. When one of the original Java programmers from Sun was asked to define JAVA he said it stood for nothing, but if it must stand for something: "Just Another Vague Acronym."

It was originally developed by Brendan Eich of Netscape under the name "Mocha", which was later renamed to "LiveScript", and finally to "JavaScript".[24] The change of name from LiveScript to JavaScript roughly coincided with Netscape adding support for Java technology in its Netscape Navigator web browser. JavaScript was first introduced and deployed in the Netscape browser version 2.0B3 in December 1995. The naming has caused confusion, giving the impression that the language is a spin-off of Java, and it has been characterized by many as a marketing ploy by Netscape to give JavaScript the cachet of what was then the hot new web-programming language.[25]

K

When created by programmers at MIT in the 1970s, they wanted a name that suggested high security for the project, so they named it after Kerberos, in Greek mythology the three-headed dog guarding the gates of Hades. The reference to Greek mythology is most likely because Kerberos was developed as part of Project Athena.

L

  • Linux – an operating system kernel, and the common name for many of the operating systems which use it.
Linux creator Linus Torvalds originally used the MINIX operating system on his computer, didn't like it, liked DOS less, and started a project to develop an operating system that would address the problems of MINIX. Hence the working name was Linux (Linus' Minix). Originally, however, Linus had planned to have it named Freax (free + freak + x). His friend Ari Lemmke encouraged Linus to upload it to a network so it could be easily downloaded. Ari gave Linus a directory named linux on his FTP server, as he did not like the name Freax.
Apple stated that Lisa was an acronym for Local Integrated Software Architecture; however, it is often inferred that the machine was originally named after the daughter of Apple co-founder Steve Jobs, and that this acronym was invented later to fit the name. Accordingly, two humorous suggestions for expanding the acronym included Let's Invent Some Acronyms, and Let's Invent Silly Acronyms.
A play on the terms "software" and "hardware". Coined in 1966, the word indicates that sometimes the computer problem is not with the computer itself, but with the user.

M

The original apple McIntosh
From McIntosh, a popular type of apple.

N

  • Nerd – A colloquial term for a computer person, especially an obsessive, singularly focused one. Originally created by Dr. Seuss from his book If I Ran the Zoo.

O

Larry Ellison, Ed Oates and Bob Miner were working on a consulting project for the CIA (Central Intelligence Agency). The code name for the project was Oracle (the CIA evidently saw this as a system that would give answers to all questions). The project was designed to use the newly written SQL database language from IBM. The project eventually was terminated but they decided to finish what they started and bring it to the world. They kept the name Oracle and created the RDBMS engine.

P

The term comes from paku paku which is a Japanese onomatopoeia used for noisy eating; similar to chomp chomp. The game was released in Japan with the name Puck-Man, and released in the US with the name Pac-Man, fearing that kids may deface a Puck-Man cabinet by changing the P to an F.
The Personal Computer Memory Card International Association is an international standards body that defines and promotes standards for expansion devices such as modems and external hard disk drives to be connected to notebook computers. Over time, the acronym PCMCIA has been used to refer to the PC card form factor used on notebook computers. A twist on the acronym is People Can't Memorize Computer Industry Acronyms.
  • PEBKAC – an acronym for "Problem Exists Between Keyboard And Chair", which is a code frequently used by a customer service representative (CSR) to annotate their notes and identify the source of a problem as the person who is reporting the problem rather than the system being blamed. This is a thinly veiled reference to the CSR's opinion that the person reporting the problem is the problem. Example: PEBKAC, no resolution possible. See also ID10T.
  • Pentium – a series of microprocessors from Intel.
The fifth microprocessor in the 80x86 series. It would have been named i586 or 80586, but Intel decided to name it Pentium (penta = five) after it lost a trademark infringement lawsuit against AMD due to a judgment that numbers like "286", "386", and "486" cannot be trademarked. According to Intel, Pentium conveys a meaning of strength, like titanium.
Since some early Pentium chips contained a mathematical precision error, it has been jokingly suggested that the reason for the chip being named Pentium rather than 586 was that Intel chips would calculate 486 + 100 = 585.99999948.
Perl was originally named Pearl, after the "pearl of great price" of Matthew 13:46. Larry Wall, the creator of Perl, wanted to give the language a short name with positive connotations and claims to have looked at (and rejected) every three- and four-letter word in the dictionary. He even thought of naming it after his wife Gloria. Before the language's official release Wall discovered that there was already a programming language named Pearl, and changed the spelling of the name. Although the original manuals suggested the backronyms "Practical Extraction and Report Language" and "Pathologically Eclectic Rubbish Lister", these were intended humorously.
Originally named "Personal Home Page Tools" by creator Rasmus Lerdorf, it was rewritten by developers Zeev Suraski and Andi Gutmans who gave it the recursive name "PHP Hypertext Preprocessor". Lerdorf currently insists the name should not be thought of as standing for anything, for he selected "Personal Home Page" as the name when he did not foresee PHP evolving into a general-purpose programming language.
Many people believe that Pine stands for "Pine Is Not Elm". However, one of its original authors, Laurence Lundblade, insists this was never the case and that it started off simply as a word and not an acronym; his first choice of a backronym for pine would be "Pine Is Nearly Elm". Over time it was changed to mean Program for Internet News and E-mail.[26]
  • ping – a computer network tool used to detect hosts.
The author of ping, Mike Muuss, named it after the pulses of sound made by a sonar called a "ping". Later Dave Mills provided the backronym "Packet Internet Groper".
Named after the television series Monty Python's Flying Circus.[27]

R

Radio buttons got their name from the preset buttons in radio receivers. When one used to select preset stations on a radio receiver physically instead of electronically, depressing one preset button would pop out whichever other button happened to be pushed in.
Company founder Marc Ewing was given the Cornell lacrosse team cap (with red and white stripes) by his grandfather while at college. People would turn to him to solve their problems, and he was referred to as "that guy in the red hat". He lost the cap and had to search for it desperately. The manual of the beta version of Red Hat Linux had an appeal to readers to return the hat if found by anyone.
Based on the surnames of the authors of this algorithm – Ron Rivest, Adi Shamir and Len Adleman.

S

The name samba comes from inserting two vowels into the name of the standard protocol that Microsoft Windows network file system use, named Server Message Block (SMB). The author searched a dictionary using grep for words containing S M and B in that order; the only matches were Samba and Salmonberry.
  • shareware – coined by Bob Wallace to describe his word processor PC-Write in early 1983. Before this Jim Knopf (also known as Jim Button) and Andrew Fluegelman called their distributed software "user supported software" and "freeware" respectively, but it was Wallace's terminology that prevailed.
  • spam – unwanted repetitious messages, such as unsolicited bulk e-mail.
The term spam is derived from the Monty Python SPAM sketch, set in a cafe where everything on the menu includes SPAM luncheon meat. While a customer plaintively asks for some kind of food without SPAM in it, the server reiterates the SPAM-filled menu. Soon, a chorus of Vikings join in with a song: "SPAM, SPAM, SPAM, SPAM, SPAM, lovely SPAM, wonderful SPAM", over and over again, drowning out all conversation.
  • SPIM – a simulator for a virtual machine closely resembling the instruction set of MIPS processors, is simply MIPS spelled backwards. In recent time, spim has also come to mean SPam sent over Instant Messaging.
  • Swing – a graphics library for Java.
Swing was the code-name of the project that developed the new graphic components (the successor of AWT). It was named after swing, a style of dance band jazz that was popularized in the 1930s and unexpectedly revived in the 1990s. Although an unofficial name for the components, it gained popular acceptance with the use of the word in the package names for the Swing API, which begin with javax.swing.

T

Tomcat was the code-name for the JSDK 2.1 project inside Sun. Tomcat started off as a servlet specification implementation by James Duncan Davidson who was a software architect at Sun. Davidson had initially hoped that the project would be made open-source, and since most open-source projects had O'Reilly books on them with an animal on the cover, he wanted to name the project after an animal. He came up with Tomcat since he reasoned the animal represented something that could take care of and fend for itself.
  • troff – a document processing system for Unix.
Troff stands for "typesetter roff", although many people have speculated that it actually means "Times roff" because of the use of the Times font family in troff by default. Troff has its origins from roff, an earlier formatting program, whose name is a contraction of "run off".
  • Trojan horse – a malicious program that is disguised as legitimate software.
The term is derived from the classical myth of the Trojan Horse. Analogously, a Trojan horse appears innocuous (or even to be a gift), but in fact is a vehicle for bypassing security.
  • Tux – The penguin now commonly regarded as the most famous logo of the Linux Kernel and its deviants.
The logo was originally created by Larry Ewing in 1996 as an entry in a Linux Logo competition. The creator of Linux, Linus Torvalds, was bitten by a little penguin during a visit to Canberra Zoo in 1993, which made the penguin his "favourite" animal. The word Tux apparently comes from "(T)orvalds (U)ni(X)".

U

Derived from ubuntu, a South African ideology.
When Bell Labs pulled out of the MULTiplexed Information and Computing System (MULTICS) project, which was originally a joint Bell Labs/GE/MIT project, Ken Thompson of Bell Labs, soon joined by Dennis Ritchie, wrote a simpler version of the operating system for a spare DEC minicomputer, allegedly found in a corridor. They needed an OS to run the game Space Travel, which had been compiled under MULTICS. The new OS was named UNICS – UNiplexed Information and Computing System by Brian Kernighan.

V

Initialism for visual, a command in the ex editor which helped users to switch to the visual mode from the ex mode. the first version was written by Bill Joy at UC Berkeley.
Acronym for Vi improved after Vim added several features over the vi editor. Vim however had started out as an imitation of Vi and was expanded as Vi imitation.
The term virus was first used as a technical computer science term by Fred Cohen in his 1984 paper "Computer Viruses Theory and Experiments", where he credits Len Adleman with coining it. Although Cohen's use of virus may have been the first academic use, it had been in the common parlance long before that. A mid-1970s science fiction novel by David Gerrold, When H.A.R.L.I.E. was One, includes a description of a fictional computer program named VIRUS that worked just like a virus (and was countered by a program named ANTIBODY). The term "computer virus" also appears in the comic book "Uncanny X-Men" No. 158, published in 1982. A computer virus's basic function is to insert its own executable code into that of other existing executable files, literally making it the electronic equivalent to the biological virus, the basic function of which is to insert its genetic information into that of the invaded cell, forcing the cell to reproduce the virus.

W

Coined by Ward Cunningham, the creator of the wiki concept, who named them for the "wiki wiki" or "quick" shuttle buses at Honolulu Airport. Wiki wiki was the first Hawaiian term he learned on his first visit to the islands. The airport counter agent directed him to take the wiki wiki bus between terminals.
The name 'worm' was taken from a 1970s science fiction novel by John Brunner entitled The Shockwave Rider. The book describes programs known as "tapeworms" which spread through a network for the purpose of deleting data. Researchers writing an early paper on experiments in distributed computing noted the similarities between their software and the program described by Brunner, and adopted that name.
  • WYSIWYG – describes a system in which content during editing appears very similar to the final product.
Acronym for What You See Is What You Get, the phrase was originated by a newsletter published by Arlene and Jose Ramos, named WYSIWYG. It was created for the emerging Pre-Press industry going electronic in the late 1970s.

X

X derives its name as a successor to a pre-1983 window system named the W Window System.

Y

Yahoo!'s history site says the name is an acronym for "Yet Another Hierarchical Officious Oracle", but some remember that in its early days (mid-1990s), when Yahoo! lived on a server named akebono.stanford.edu, it was glossed as "Yet Another Hierarchical Object Organizer." The word "Yahoo!" was originally invented by Jonathan Swift and used in his book Gulliver's Travels. It represents a person who is repulsive in appearance and action and is barely human. Yahoo! founders Jerry Yang and David Filo selected the name because they considered themselves yahoos.

Z

The file format was created by Phil Katz, and given the name by his friend Robert Mahoney. The compression tool Phil Katz created was named PKZIP. Zip means "speed", and they wanted to imply their product would be faster than ARC and other compression formats of the time.

See also

References

  1. The New Hacker's Dictionary. Compiled by Eric S. Raymond (Third ed.). 1996. p. 34. ISBN 978-0-262-18178-5.CS1 maint: others (link)
  2. "FAQ – Httpd Wiki". Retrieved 15 November 2012.
  3. Hamilton, Naomi (27 May 2008). "The A-Z of Programming Languages: AWK". ComputerWorld.com.au. Retrieved 15 November 2012.
  4. Dennis M. Ritchie (March 1993). "The Development of the C Language". ACM SIGPLAN Notices. 28 (3): 201–208. doi:10.1145/155360.155580. The B language's name most probably represents a contraction of BCPL, though an alternate theory holds that it derives from Bon [Thompson 69], an unrelated language created by Thompson during the Multics days. Bon in turn was named either after his wife Bonnie, or (according to an encyclopedia quotation in its manual), after a religion whose rituals involve the murmuring of magic formulas.
  5. Cooper, Eric. "biff: Did You Know?". Archived from the original on 13 November 2012. Retrieved 17 November 2012.
  6. "What does {some strange unix command name} stand for?". UNIXguide.net. Retrieved 17 November 2012.
  7. "Jargon File: biff". Retrieved 17 November 2012.
  8. Shannon, Claude E. (July 1948). "A Mathematical Theory of Communication". The Bell System Technical Journal. 27 (3): 379–423. doi:10.1002/j.1538-7305.1948.tb01338.x. hdl:10338.dmlcz/101429. Archived from the original on 1 October 2007. Retrieved 20 November 2012. The choice of a logarithmic base corresponds to the choice of a unit for measuring information. If the base 2 is used the resulting units may be called binary digits, or more briefly bits, a word suggested by J. W. Tukey.
  9. Dyson, George (29 March 2012). Darwin Among the Machines. p. 98. ISBN 9780718196950.
  10. Edison to Puskas, 13 November 1878, Edison papers, Edison National Laboratory, U.S. National Park Service, West Orange, N.J., cited in Thomas P. Hughes, American Genesis: A History of the American Genius for Invention, Penguin Books, 1989, ISBN 0-14-009741-4, on page 75.
  11. Bemer, Robert William (8 August 2000). "Why is a byte 8 bits? Or is it?". Computer History Vignettes. Archived from the original on 3 April 2017. Retrieved 3 April 2017. […] With IBM's STRETCH computer as background, handling 64-character words divisible into groups of 8 (I designed the character set for it, under the guidance of Dr. Werner Buchholz, the man who DID coin the term "byte" for an 8-bit grouping). […] The IBM 360 used 8-bit characters, although not ASCII directly. Thus Buchholz's "byte" caught on everywhere. I myself did not like the name for many reasons. […]
  12. Buchholz, Werner (11 June 1956). "7. The Shift Matrix" (PDF). The Link System. IBM. pp. 5–6. Stretch Memo No. 39G. Archived from the original (PDF) on 4 April 2017. Retrieved 4 April 2016. […] Most important, from the point of view of editing, will be the ability to handle any characters or digits, from 1 to 6 bits long […] the Shift Matrix to be used to convert a 60-bit word, coming from Memory in parallel, into characters, or "bytes" as we have called them, to be sent to the Adder serially. The 60 bits are dumped into magnetic cores on six different levels. Thus, if a 1 comes out of position 9, it appears in all six cores underneath. […] The Adder may accept all or only some of the bits. […] Assume that it is desired to operate on 4 bit decimal digits, starting at the right. The 0-diagonal is pulsed first, sending out the six bits 0 to 5, of which the Adder accepts only the first four (0-3). Bits 4 and 5 are ignored. Next, the 4 diagonal is pulsed. This sends out bits 4 to 9, of which the last two are again ignored, and so on. […] It is just as easy to use all six bits in alphanumeric work, or to handle bytes of only one bit for logical analysis, or to offset the bytes by any number of bits. […]
  13. Buchholz, Werner (February 1977). "The Word "Byte" Comes of Age..." Byte Magazine. 2 (2): 144. […] The first reference found in the files was contained in an internal memo written in June 1956 during the early days of developing Stretch. A byte was described as consisting of any number of parallel bits from one to six. Thus a byte was assumed to have a length appropriate for the occasion. Its first use was in the context of the input-output equipment of the 1950s, which handled six bits at a time. The possibility of going to 8 bit bytes was considered in August 1956 and incorporated in the design of Stretch shortly thereafter. The first published reference to the term occurred in 1959 in a paper "Processing Data in Bits and Pieces" by G A Blaauw, F P Brooks Jr and W Buchholz in the IRE Transactions on Electronic Computers, June 1959, page 121. The notions of that paper were elaborated in Chapter 4 of Planning a Computer System (Project Stretch), edited by W Buchholz, McGraw-Hill Book Company (1962). The rationale for coining the term was explained there on page 40 as follows:
    Byte denotes a group of bits used to encode a character, or the number of bits transmitted in parallel to and from input-output units. A term other than character is used here because a given character may be represented in different applications by more than one code, and different codes may use different numbers of bits (ie, different byte sizes). In input-output transmission the grouping of bits may be completely arbitrary and have no relation to actual characters. (The term is coined from bite, but respelled to avoid accidental mutation to bit.)
    System/360 took over many of the Stretch concepts, including the basic byte and word sizes, which are powers of 2. For economy, however, the byte size was fixed at the 8 bit maximum, and addressing at the bit level was replaced by byte addressing. […]
  14. Blaauw, Gerrit Anne; Brooks, Jr., Frederick Phillips; Buchholz, Werner (1962), "4: Natural Data Units" (PDF), in Buchholz, Werner (ed.), Planning a Computer System – Project Stretch, McGraw-Hill Book Company, Inc. / The Maple Press Company, York, PA., pp. 39–40, LCCN 61-10466, archived (PDF) from the original on 3 April 2017, retrieved 3 April 2017
  15. http://ei.cs.vt.edu/~history/Daemon.html
  16. Nixon, Robin (2010). Ubuntu: Up and Running. O'Reilly Media. p. 3. ISBN 978-0-596-80484-8.
  17. About Debian
  18. Cade Metz (13 March 2009). "Ethernet – a networking protocol name for the ages: Michelson, Morley, and Metcalfe". The Register. p. 2. Retrieved 4 March 2013.
  19. The History of Ethernet. NetEvents.tv. 2006. Retrieved 10 September 2011.
  20. Eastlake, D.; Manros, C.; Raymond, E. (1 April 2001). "RFC 3092 – Etymology of "Foo"". Retrieved 15 November 2012.
  21. The Gnu Song
  22. Stallman, Richard. "Initial Announcement of the GNU Project September 27, 1983". www.gnu.org. GNU.org. Retrieved 20 November 2013.
  23. "The Open Group Base Specifications Issue 7 IEEE Std 1003.1, 2013 Edition Copyright © 2001-2013 The IEEE and The Open Group". The Open Group. Retrieved 20 November 2013.
  24. Krill, Paul (23 June 2008). "JavaScript creator ponders past, future". InfoWorld. Retrieved 19 May 2009.
  25. "O'Reilly – Safari Books Online – 0596101996 – JavaScript: The Definitive Guide, 5th Edition". Safari.oreilly.com. Archived from the original on 8 December 2008. Retrieved 19 May 2009.
  26. Lundblade, Laurence. "Laurence's home page: Naming Pine". Archived from the original on 7 June 2011. Retrieved 17 November 2012.
  27. "General Python FAQ". Python.org. Python Software Foundation. Retrieved 4 June 2020.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.