IBM Jargon and General Computing Dictionary Tenth Edition

Total Page:16

File Type:pdf, Size:1020Kb

IBM Jargon and General Computing Dictionary Tenth Edition IBM Jargon and General Computing Dictionary Tenth Edition Preface This is the Tenth Edition of the IBM Jargon and General Computing Dictionary, dated May 1990. This edition follows the markup and format of the last (Ninth) edition, and has more than one hundred and seventy new entries (bringing the total to over fourteen hundred entries). This is not only the tenth edition of the dictionary, but is also its tenth year; the first edition was compiled and distributed in 1980. At that time the use of jargon was on the increase, but I now observe that the quantity and use of jargon appears to be decreasing − perhaps as computing becomes less of a specialist discipline. Not only does this make my task as editor of the dictionary a little easier, but it might also imply that the computing industry is at last getting better at communi- cating with its customers! As usual, I am indebted to the content and management reviewers for this edition: Geoff Bartlett, Ian Brackenbury, Peter Capek, Philip Cohen, Bertrand Denoix, Truly Donovan, Forrest Garnett, and Ray Mansell. Any errors that remain are, of course, entirely my responsibility. I should also like to thank the hundreds of people who have contributed words or definitions to this dictionary. I have been especially encouraged by the diversity of the contributors, who come from more than forty countries and from all divisions of IBM. Newcomers to IBM have proved to be the most sensitive to jargon, and the old-timers (some from very high levels in the Corporation) have provided most of the history and anecdotes. Without the encouragement from readers, and, of course, the VNET communications network, this document would never have been created. The Content of the Dictionary The items in this dictionary have been selected from the huge vocabulary of computer-related terms used in IBM. To be included here, a word or phrase must either have originated in IBM, or (more commonly) its meaning or usage in IBM must be different from the usual. Acronyms and abbrevi- ations are not included except where they are necessary for cross-references, or are used as true words in their own right (for example, “APAR”). The origin of a usage is often obscure, so a few words may have slipped in under false colours. Do please send me any corrections or background material which will improve the accuracy of this collection. You are also encouraged to send possible additions to this dictionary − words and phrases, new or old, English or not. All contributions are most welcome. If possible, please include the source and date of any usage you quote. This dictionary is intended both to inform and to entertain. Each entry has a definition, which is usually supplemented by an explanation and an example of usage. Formal etymologies are not included, since in most cases the etymology is either unknown or disputed. In many cases, a meaning or usage is so subtle or bizarre that a light treatment is more appropriate (and conveys the sense better) than an attempt to define the term formally. As a result, this compilation is not just a source of information but is also a window on the IBM culture, as reflected in its language. Tenth Edition 1 Dictionary of IBM Jargon This dictionary is perhaps most useful to people new to the vocabulary of IBM. For this reason, the document in printed form is unclassified. It contains no material proprietary to IBM. The material is, however, substantially novel and is therefore protected by copyright. Producing printed copies of this document within IBM, or copying in printed form for private use is allowed, provided that reproduction is done without alteration. Permission for any other form of publication must be obtained from the editor, together with appropriate management and legal approvals. The Format of the Items The structure of the dictionary is formalised by the use of a generic markup language, which conforms (except for commentary) to the reference syntax of the Standard Generalized Markup Language (SGML, ISO standard 8879). Each item in the dictionary starts with a headword, which can be a single word or a phrase. Headwords are shown in lower case, except when they are always used in a particular upper or mixed case. The headword is followed by a pronunciation where not obvious (or where different from normal English). Every headword is followed by one or more senses. A sense starts with a part of speech, where appro- priate, which is followed by a definition − normally a single sentence. The definition is usually followed by an explanation, which may include quotations illustrating the use of the headword. These quotations are of actual usage (with occasional minor editorial elucidations) unless introduced by the word “usage”, in which case the quotation is illustrative. Within a definition or explanation, cross-references to words or phrases defined elsewhere in the dictionary are shown in an oblique sans serif font, thus (or are identified by some other typographic convention, depending on the SCRIPT processor and printer used). Subsidiary headwords, defined within an item, are shown in the same font as the headwords at the start of items. A number of abbreviations are used. Parts of speech may be shown as one of n., v., adj., and adv., which refer to noun, verb, adjective, and adverb respectively (these are often not the usual part of speech for the word or phrase!). Elsewhere, cf. stands for confer, compare with; e.g. for exempli gratia, for example; etc. for et cetera, and so on; i.e. for id est, that is; and q.v. for quod vide, which see. The items that are new in the current (Tenth) edition are marked with a bar in the left margin, and the items that were new in the last (Ninth) edition are marked by dots in the left margin. Editorial asides are bracketed, [thus]. In general, British spelling and punctuation are used, though for headwords, quotations, and the expansion of abbreviations the original form (often from the USA) will be found. Mike Cowlishaw (MFC at VENTA) IBM UK Laboratories, Hursley Park, Winchester, UK Tenth Edition 2 Dictionary of IBM Jargon ABEND all hands meeting ABEND (ab-end) 1. n. The undesirable termination address v. To talk about. Used when a speaker of a program (or system). From “ABnormal cannot answer a question, as in: “I shall address ENDing”. Invariably due to human error at some that subject another time” (this implies that, of point that the system was unable to overcome or course, the speaker has considered the subject in ignore. Typically results in catch-all error messages great depth, but sadly has not enough time now to (e.g., “syntax error”) that rarely help determine the give it the treatment it deserves). See offline. cause. 2. v. To end abnormally. See also crash. adjective v. To use a word as an adjective modifying . A-Box n. A primary storage unit: the one closest to some other word which in fact modifies the adjec- . the controller. Most 370 storage peripherals come tived word. This avoids the normal use of prep- . in two flavours. The A-Box (also called head of ositions and dependent clauses, as in “user effects” . string,orModel A) either houses the controller (e.g., (instead of “effects on users” or “effects caused by . 3422), is the controller (e.g., 3480), or connects to users”). Another example is “That is a documenta- . the controller. The B-Box (Model B) is used for tion hit” (rather than “That is a hit on the . extending the string. Some strings can be connected documentation”). See also verb. to the controller at both ends, in which case the unit administrivia n. Any kind of bureaucratic red tape . at the end of the string is usually a Model D. or paperwork, IBM or not, that hinders accomplish- . accept n. A purchased and (usually) installed prod- ment of one’s objectives or goals. Often, anything . uct, most often used in the plural. As in: “The with a routing slip attached. demand number is the marketing estimate of adtech n. Advanced Technology. Time put aside for . customer accepts...”. a risky project, not necessarily directly related to a account situation n. Circumstances at a customer product. May mean: a) Play time (when someone installation which could lead to IBM losing revenue else is doing it), or b) Exciting, innovative system or reputation. A “red alert” state for a branch design with no product deadlines (when speaker is office. See also critical situation. doing it). acronym n. A word formed from the (or some) aeroplane rule, airplane rule 1. n. “When you are . initial letters of other words and often printed in lost, climb and confess”. 2. n. Complexity . uppercase. Strictly speaking, if it can only be increases the possibility of failure; a twin-engine . pronounced letter-by-letter then it is merely an aeroplane is more expensive and has twice as many . abbreviation. An example of an acronym: “Acro- engine problems as a single engine aeroplane. nyms: A Convenient Reduction Of Nomenclature When applied to large computing systems, the anal- . Yielding Mnemonic Syllables”. acronym is, in itself, ogy is that two power supplies (even though running . not an IBM word, but acronyms are a way of life in at overrated current output) driving two boards of . the computer business; there are so many acronyms logic are much more reliable than four power . and abbreviations in use in IBM, and so many are supplies of correct value with each pair driving each . coined each day, that this dictionary cannot attempt of two logic boards.
Recommended publications
  • City Zoning & Subdivision Ordinances
    Printed via Website Updated 1/3/20 CITY ZONING & SUBDIVISION ORDINANCES (Updated: January 3, 2020) Printed via Website Updated 1/3/20 CITY ZONING & SUBDIVISION ORDINANCE INDEX Updated: January 3, 2020 SECTION 1. Title and Application Subd. 1. Title ..................................................................................... 1-1 Subd. 2. Intent and Purpose .............................................................. 1-1 Subd. 3. Relation to Comprehensive Municipal Plan ....................... 1-1 Subd. 4. Standard, Requirement ....................................................... 1-1 Subd. 5. Interpretations and Application .......................................... 1-1 Subd. 6. Conformity .......................................................................... 1-1 Subd. 7. Building Permit Conformity ............................................... 1-2 Subd. 8. Uses Not Provided For Within Zoning Districts ................ 1-2 Subd. 9. Authority ............................................................................. 1-2 Subd. 10. Separability ....................................................................... 1-2 Subd. 11. Rules ................................................................................. 1-2 SECTION 2. Definitions Subd. 1-197. .......................................................................... 2-1 – 2-24 SECTION 3. General Provisions Subd. 1. Nonconforming Buildings, Structures and Uses ................ 3-1 Subd. 2. General Building and Performance Requirements ............. 3-9 Subd.
    [Show full text]
  • Seeing the Queerness of Ec-Static Images
    Georgia State University ScholarWorks @ Georgia State University Communication Dissertations Department of Communication Fall 12-2013 Oblique Optics: Seeing the Queerness of Ec-static Images Kristopher L. Cannon Georgia State University Follow this and additional works at: https://scholarworks.gsu.edu/communication_diss Recommended Citation Cannon, Kristopher L., "Oblique Optics: Seeing the Queerness of Ec-static Images." Dissertation, Georgia State University, 2013. https://scholarworks.gsu.edu/communication_diss/48 This Dissertation is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. OBLIQUE OPTICS: SEEING THE QUEERNESS OF EC-STATIC IMAGES by KRISTOPHER L. CANNON Under the Direction of Alessandra Raengo ABSTRACT Oblique Optics contends that studies of visual culture must account for the queerness of images. This argument posits images as queer residents within visual culture by asking how and where the queerness of images becomes visible. These questions are interrogated by utilizing queer theories and methods to refigure how the image is conceptualized within traditional approaches to visual culture studies and media studies. Each chapter offers different approaches to see the queerness of images by torquing our vision to see "obliquely," whereby images are located beyond visible surfaces (like pictures or photographs) through ec-static movements within thresholds between bodies and beings. Chapter One rethinks how images are conceptualized through metaphorical language by exploring how images emerge from fantasies about will-be-born bodies in fetal photographs.
    [Show full text]
  • Introduction Making and Hacking
    Introduction Making and Hacking Annika Richterich and Karin Wenz “While hacking is a wonderful way of viewing the world, ‘making’ was a more positive framing for customizing and changing the world.” (DOUGHERTY 2014) In August 2014, hackerspaces in the Netherlands issued an open letter to the Dutch Public Prosecution Service (PPS): in this document, members of hacker communi- ties from Amsterdam, Heerlen, Utrecht and other cities called upon the govern- mental institution to revise the definition of ‘hacking’ as presented on its website (Walboer et al. 2014). While the PPS described it as “breaking into computers without permission”, the hackerspace members highlighted that hacking refers to citizens’ creative engagement with technologies. Opposing the reduction of hacking to illegal activities, they described hacking as exploration of technological possibilities and boundaries in unforeseen, innovative ways. Even though this particular initiative was started in the Netherlands, the letter echoes wider, historical as well as ongoing negotiations regarding the meanings and origins of hacking. It seems closely related to earlier requests such as an open letter to the Wall Street Journal which was written more than 20 years ago by Richard Stallman (presumably). In this letter, the founder of the Free Software Foundation states: There’s nothing shameful about the hacking I do. But when I tell people I am a hacker, people think I’m admitting something naughty – because newspapers such as yours misuse the word ‘hacker’, giving the impression that it means ‘security breaker’ and nothing else. You are giving hackers a bad name. (Raymond 1996: 532) While one cannot find any explicit reference to this letter on Stallman’s own website, similar statements were made in his article ‘On Hacking’ (n.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux
    Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux To cite this version: Frederic Dufaux. Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework. Mobile Multimedia/Image Processing, Security and Applications, SPIE, Apr 2011, Orlando, United States. hal-01436403 HAL Id: hal-01436403 https://hal.archives-ouvertes.fr/hal-01436403 Submitted on 10 Jan 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux Laboratoire de Traitement et Communication de l’Information – UMR 5141 CNRS Télécom ParisTech F-75634 Paris Cedex 13, France [email protected] ABSTRACT The issue of privacy in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we first review recent Privacy Enabling Technologies (PET). Next, we discuss pertinent evaluation criteria for effective privacy protection. We then put forward a framework to assess the capacity of PET solutions to hide distinguishing facial information and to conceal identity.
    [Show full text]
  • A User-Selectable Obscuration Framework to Censor Digital Videos for Children and Adolescents
    A User-selectable Obscuration Framework to Censor Digital Videos for Children and Adolescents Jiayan GUO, David LEONG, Jonathan SIANG, and Vikram BAHL School of Infocomm, Republic Polytechnic, Singapore ABSTRACT storyline of the film. Such harmful content is still accessible to the viewers. The children thus are exposed to There is an increasing concern from parents, educators a vast amount of inappropriate media content. and policy-makers about the negative influence that digital media exerts on children and adolescents. Such According to the Singapore Censorship Review concerns have fueled a growing need to effectively filter Committee 2010 report [2], parents are encouraged to take potentially harmful content. However, existing responsibility to protect their children against the negative technologies have limited ability in allowing users to aspects of media proliferation. In order to guide their adjust the filtering levels, or generating seamless cutting children on digital media consumption, parents have to be results. To tackle this limitation, we propose a framework empowered with effective tools to filter sex, violence and which empowers parents and teachers to censor movies profanity out of the digital media. However, existing tools and TV shows according to their level of acumen and have limited capabilities to effectively block potentially discretion. Such framework helps parents and teachers harmful content. Presently, ClearPlay and MovieMask are protect children and adolescents against obscene content. the two forefront computer programs that cleanse movies In particular, our framework enables parents and teachers containing offensive scenes. Their technologies are built to sanitize movies and TV shows by skipping over onto stand-alone DVD players and other video devices.
    [Show full text]
  • (NASACFZ-1S2/Ot
    (NASACFZ-1s2/ot (1'AS-C-121~fPRELIMAINARY STUDY FOR A NUMERICAL AERODYNAMIC SIMULATION FACILITy. N78-19052 PHASE 1: EXTENSION Control Data Corp., St. Paul, Minn.) 434 p HC A19/MF A01 CSCL 01A Unclas G3/02 08630 PRELIMINARY STUDY FOR A NUMERICAL AERODYNAMIC SIMULATION FACILITY SUMMARY REPORT - PHASE 1 EXTENSION By: N. R. Lincoln FEBRUARY, 1978 Distribution of this report is provided in the interest of information exchang'e. Responsibility for the contents resides in the authors or organization that prepared it. Prepared under Contract No. NAS2-9457 by: CONTROL DATA CORPORATION Research and Advanced Design Laboratory 4290 Fernwood Street St. Paul, Minnesota 55112 for AMES RESEARCH CENTER NATIONAL AERONAUTICS AND SPACE ADMINISTRATION R EPVED ItA SI FACULWM SUMMARY REPORT - PHASE I EXTENSION Phase I of the NASF study which was completed in October 1977 produced several conclusions about the feasibility of construction of a flow model simulation facility. A computer structure was proposed for the Navier-Stokes Solver (NSS), now called the Flow Model Processor (FMP), along with technological and system approaches. Before such a system can enter an intensive design investigation phase several tasks must be accomplished to establish uniformity and control over the remaining design steps, as well as clarifying and amplifying certain portions of the conclusions drawn in Phase 1. In order of priority these were seen as: 1. Establishing a structure and format for documenting the design and implementation of the FMP facility. 2. Developing 'a complete, practically engineered design that would perform as claimed in the Phase 1 report. 3. Creating a design verification tool for NASA analysts, using a computerized simulation system.
    [Show full text]
  • Thesis May Never Have Been Completed
    UvA-DARE (Digital Academic Repository) Digital Equipment Corporation (DEC): A case study of indecision, innovation and company failure Goodwin, D.T. Publication date 2016 Document Version Final published version Link to publication Citation for published version (APA): Goodwin, D. T. (2016). Digital Equipment Corporation (DEC): A case study of indecision, innovation and company failure. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:26 Sep 2021 Digital Equipment Corporation (DEC) (DEC) Corporation Digital Equipment David Thomas David Goodwin Digital Equipment Corporation (DEC): A Case Study of Indecision, Innovation and Company Failure David Thomas Goodwin Digital Equipment Corporation (DEC): A Case Study of Indecision, Innovation and Company Failure David Thomas Goodwin 1 Digital Equipment Corporation (DEC): A Case Study of Indecision, Innovation and Company Failure ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof.
    [Show full text]
  • Pirate Or Hackers Bible More Like Guidelines...= a = Abbrev: /*-Breev
    Pirate or Hackers Bible More like guidelines.... = A = abbrev: /*-breev'/, /*-brev'/ n. Common abbreviation for `abbreviation'. ABEND: [ABnormal END] /ah'bend/, /*-bend'/ n. Abnormal termination (of software); {crash}; {lossage}. Derives from an error message on the IBM 360; used jokingly by hackers but seriously mainly by {code grinder}s. Usually capitalized, but may appear as `abend'. Hackers will try to persuade you that ABEND is called `abend' because it is what system operators do to the machine late on Friday when they want to call it a day, and hence is from the German `Abend' = `Evening'. accumulator: n. 1. Archaic term for a register. On-line use of it as a synonym for `register' is a fairly reliable indication that the user has been around for quite a while and/or that the architecture under discussion is quite old. The term in full is almost never used of microprocessor registers, for example, though symbolic names for arithmetic registers beginning in `A' derive from historical use of the term `accumulator' (and not, actually, from `arithmetic'). Confusingly, though, an `A' register name prefix may also stand for `address', as for example on the Motorola 680x0 family. 2. A register being used for arithmetic or logic (as opposed to addressing or a loop index), especially one being used to accumulate a sum or count of many items. This use is in context of a particular routine or stretch of code. "The FOOBAZ routine uses A3 as an accumulator." 3. One's in-basket (esp. among old-timers who might use sense 1). "You want this reviewed? Sure, just put it in the accumulator." (See {stack}.) ACK: /ak/ interj.
    [Show full text]
  • Computers and Apollo
    COMPUTERS AND APOLLO > I. F. Grant G.R. Seymour J. H.K. Saxon O s Honeysuckle Creek Tracking Station, Canberra J \ \ r v November 25, 1970 1.1 Genera 1 The last, few days before1 a lunar mission Launch probably have a larger utilisation of' computers than any other- phase of the' mission. I'ho many fu n d i oils wi I I ha performed with increasing frequency and complexity, culminating in the vehicle liftoff from the pad, ACE (short for Automatic Checkout Equipment) is a large bank of computers situated at Cape Kennedy. This equipment is running continuous checks on all spacecraft systems, monitoring the loading of propellants and parameter trends, and performing check routines with the CMC, LGC, and LVDC, which are the computers situated in the CSM, LM, and SIVB 3rd stage of the launch vehicle. Some of A C E !s results are sent via high speed lines to Mission Control Center (MCC) at Houston, where they are processed and formatted for display by the IBM 360 computers which form the RTCC (Realtime Telemetry and Command Complex). The RTCC in turn is being used by the mission flight controllers to generate test digital command requests for transmission to the spacecraft via the Merritt Island tracking station situated at the Cape. r*\ The rest of the tracking network (l4 stations and one ship) is also being checked out by computers at MCC and Goddard Space Plight Center (GSFC) with a standard series of performance tests known as CADPISS (Computation and Data Plow Integrated Subsystems). These computers instruct the sites to perform tracking, telemetry processing, and command functions, monitor the outputs against pre-programmed standards, and inform the sites of the results.
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]
  • JS., SL, and LC V. Village Voice Media Holdings
    NOTICE: SLIP OPINION (not the court’s final written decision) The opinion that begins on the next page is a slip opinion. Slip opinions are the written opinions that are originally filed by the court. A slip opinion is not necessarily the court’s final written decision. Slip opinions can be changed by subsequent court orders. For example, a court may issue an order making substantive changes to a slip opinion or publishing for precedential purposes a previously “unpublished” opinion. Additionally, nonsubstantive edits (for style, grammar, citation, format, punctuation, etc.) are made before the opinions that have precedential value are published in the official reports of court decisions: the Washington Reports 2d and the Washington Appellate Reports. An opinion in the official reports replaces the slip opinion as the official opinion of the court. The slip opinion that begins on the next page is for a published opinion, and it has since been revised for publication in the printed official reports. The official text of the court’s opinion is found in the advance sheets and the bound volumes of the official reports. Also, an electronic version (intended to mirror the language found in the official reports) of the revised opinion can be found, free of charge, at this website: https://www.lexisnexis.com/clients/wareports. For more information about precedential (published) opinions, nonprecedential (unpublished) opinions, slip opinions, and the official reports, see https://www.courts.wa.gov/opinions and the information that is linked there. This opinion was fll~. r r~ /F·I-I:E\ at B tao fl1'Vl on ph ~~c ts- IN CLERKS OFFICE IUPReMe COURT, STATE OF W«\SSII«mltf DATE SEP 0 3 2Q15 .
    [Show full text]