Feeds

Malware infects Merriam-Webster

Fanboys drop dirty bomb on collegiate dictionary

Seven Steps to Software Security

Worshippers at the altar of Jobs rejoice: Merriam-Webster's latest edition of its Collegiate Dictionary has embraced fanboys among more than 100 new entries gracing its updated pages.

Interestingly, Merriam-Webster has identified the first fanboy in an English language publication as far back as 1919, albeit in the sense of "boy who is an enthusiastic devotee, such as of comics or movies".

IT and the interweb have also given us "malware" (first clocked in 1990), "netroots" (2003) and the repulsive "webinar" (1998).

Out in the real world, meanwhile, Merriam-Webster tips its hat to "air quotes" (1989 - "gesture made by raising and flexing the index and middle fingers of both hands, used to call attention to a spoken word or expression"), "dark energy" (1998), "dirty bomb" (1956), "kiteboarding" (1996), "norovirus" (2002), "pretexting" (1992) and "subprime" (1995).

In case you're wondering why it's taken a while for some of these to achieve official recognition, Merriam-Webster editor-at-large Peter Sokolowski explained to AP: "As soon as we see the word used without explanation or translation or gloss, we consider it a naturalized citizen of the English language.

"If somebody is using it to convey a specific idea and that idea is successfully conveyed in that word, it's ready to go in the dictionary."

Sokolowski's personal fave is "mondegreen" - "a word or phrase that results from a mishearing of something said or sung" - coined back in 1954 by author Syvia Green. As a lass, Green misheard a line from The Bonny Earl of Moray, and confessed when she first heard the lyric "they had slain the Earl of Moray and had laid him on the green", she felt "terribly sorry for the poor Lady Mondegreen".

Merriam-Webster offers a few examples of classic mondegreens, including "There’s a bathroom on the right" = "There’s a bad moon on the rise", from Credence Clearwater Revival's Bad Moon Rising, and is inviting mondegreenists to submit their own examples. ®

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.