< previous page page_340 next page >

Page 340

Here is a field-tested ooblick recipe contributed by GLS:
1 cup cornstarch
1 cup baking soda
¾ cup water
N drops of food coloring
This recipe isn't quite as non-Newtonian as a pure cornstarch ooblick, but has an appropriately slimy feel.
Some, however, insist that the notion of an ooblick recipe is far too mechanical, and that it is best to add the water in small increments so that the various mixed states the cornstarch goes through as it becomes ooblick can be grokked in fullness by many hands. For optional ingredients of this experience, see the "Ceremonial Chemicals" section of Appendix B.
op /op/ n. 1. In England and Ireland, common verbal abbreviation for 'operator', as in system operator. Less common in the U.S., where sysop seems to be preferred. 2. [IRC] Someone who is endowed with privileges on IRC, not limited to a particular channel. These are generally people who are in charge of the IRC server at their particular site. Sometimes used interchangeably with CHOP. Compare sysop.
open n. Abbreviation for 'open (or left) parenthesis' used when necessary to eliminate oral ambiguity. To read aloud the LISP form (DEFUN FOO (X) (PLUS X 1)) one might say: "Open defun foo, open eks close, open, plus eks one, close close."
Open DeathTrap n. Abusive hackerism for the Santa Cruz Operation's 'Open DeskTop' product, a Motif-based graphical interface over their Unix. The funniest part is that this was coined by SCO's own developers. Compare AIDX, Macintrash Nominal Semidestructor, ScumOS, sunstools, HP-SUX.
open switch n. [IBM: probably from railroading] An unresolved question, issue, or problem.
operating system n. [techspeak] (Often abbreviated 'OS') The foundation software of a machine, of course; that which schedules tasks, allocates storage, and presents a default interface to the user between applications. The facilities an operating system provides and its general design philosophy exert an extremely strong influence on programming style and on the technical cultures that grow up around its host machines. Hacker folklore has been shaped primarily by the Unix, ITS, TOPS-10, TOPS-20/TWENEX,

 
< previous page page_340 next page >

If you like this book, buy it!