100:
In his book, McCarthy's rule #4 is "Don't Flip The Bozo Bit". His reasoning is that everyone has something to contribute – it's easy and tempting, when someone ticks a person off or is mistaken (or both), to simply disregard all their input in the future by setting the "bozo flag" to
76:
has a similar "no copy" bit in the subcode, but nearly all disc-copying software ignores it, and usually removes it on copies. Consumer-grade dedicated hardware audio disc copiers usually honor the bozo bit, and will refuse to copy a disc with the bit set. Professional disc copiers ignore the bozo
54:
Information Record, which described various file attributes. When the bit was set, the file could not be copied. It was called the bozo bit because it was copy protection so weak that only a
34:, the term "flipping the bozo bit" was later reused to describe a decision to ignore a person's input. It is a whimsical term, possibly derived from the classic children's comedy character,
101:
TRUE for that person. But by taking that lazy way out, the person poisons team interactions and cannot avail themselves of help from the "bozo" ever again.
185:
69:
feature a rudimentary copy protection mechanism where a file with a certain flag set cannot be loaded except to execute it.
324:
293:
195:
168:
143:
89:, which presented a series of rules about the political and interpersonal forces that drive software development,
382:
265:
367:
357:
62:
372:
50:, the "bozo bit" (also called the "no copy" flag in some documentation) was one of the flags in the
377:
227:
362:
90:
201:
8:
316:
310:
320:
289:
261:
255:
191:
164:
139:
51:
24:
110:
55:
47:
35:
31:
351:
73:
342:
28:
66:
115:
80:
308:
184:
Bray, Andrew C.; Dickens, Adrian C.; Holmes, Mark A. (1983).
58:
would think of it, and only a bozo would be deterred by it.
190:. Cambridge: Cambridge Microcomputer Centre. p. 347.
235:(1st ed.). Acorn Computers. August 1985. p. 32
136:
Macintosh
Revealed, Volume One: Unlocking the Toolbox
187:The advanced user guide for the BBC Microcomputer
183:
158:
349:
23:has been used in two contexts. Initially a weak
283:
81:Dismissing a person as not worth listening to
61:The cassette and ROM filing systems and the
302:
229:The Advanced Disc Filing System user guide
133:
97:notion to the realm of human interaction.
253:
309:Paul Glen and David H. Maister (2002).
279:
277:
41:
350:
343:Setting the Bozo Bit as an Antipattern
219:
138:. Indianapolis: Hayden Book Company.
286:Introduction to software engineering
274:
77:bit and will copy a protected disc.
13:
177:
14:
394:
336:
226:"5. The filing system commands".
315:. John Wiley and Sons. pp.
257:Dynamics of Software Development
87:Dynamics of Software Development
161:IBM PC and Macintosh networking
254:McCarthy, Jim (July 1, 1995).
247:
152:
127:
1:
288:. CRC Press. pp. 61–62.
121:
46:In early versions of Apple's
163:. Hayden Books. p. 10.
134:Chernicoff, Stephen (1987).
7:
104:
63:Advanced Disc Filing System
16:Term with multiple meanings
10:
399:
159:Stephen L. Michel (1988).
284:Ronald J. Leach (2000).
383:Technology neologisms
368:Proprietary software
42:Weak copy protection
27:system in the 1980s
358:Apple Inc. software
260:. Microsoft Press.
373:Computing culture
85:In his 1995 book
390:
331:
330:
306:
300:
299:
281:
272:
271:
251:
245:
244:
242:
240:
234:
223:
217:
216:
214:
212:
206:
200:. Archived from
181:
175:
174:
156:
150:
149:
131:
398:
397:
393:
392:
391:
389:
388:
387:
378:Copy protection
348:
347:
339:
334:
327:
307:
303:
296:
282:
275:
268:
252:
248:
238:
236:
232:
225:
224:
220:
210:
208:
204:
198:
182:
178:
171:
157:
153:
146:
132:
128:
124:
107:
83:
44:
25:copy protection
17:
12:
11:
5:
396:
386:
385:
380:
375:
370:
365:
363:Classic Mac OS
360:
346:
345:
338:
337:External links
335:
333:
332:
325:
301:
294:
273:
266:
246:
218:
196:
176:
169:
151:
144:
125:
123:
120:
119:
118:
113:
111:Bozo the Clown
106:
103:
82:
79:
48:classic Mac OS
43:
40:
36:Bozo the Clown
32:classic Mac OS
15:
9:
6:
4:
3:
2:
395:
384:
381:
379:
376:
374:
371:
369:
366:
364:
361:
359:
356:
355:
353:
344:
341:
340:
328:
326:9780787961480
322:
318:
314:
313:
312:Leading geeks
305:
297:
295:9780849314452
291:
287:
280:
278:
269:
263:
259:
258:
250:
231:
230:
222:
207:on 2006-01-14
203:
199:
197:0-946827-00-1
193:
189:
188:
180:
172:
170:9780672484056
166:
162:
155:
147:
145:0-672-48400-5
141:
137:
130:
126:
117:
114:
112:
109:
108:
102:
98:
96:
92:
88:
78:
75:
70:
68:
64:
59:
57:
53:
49:
39:
37:
33:
30:
26:
22:
311:
304:
285:
256:
249:
237:. Retrieved
228:
221:
209:. Retrieved
205:(zipped PDF)
202:the original
186:
179:
160:
154:
135:
129:
99:
94:
93:applied the
91:Jim McCarthy
86:
84:
74:Compact Disc
71:
60:
45:
20:
18:
352:Categories
267:1556158238
122:References
67:Acorn MOS
19:The term
239:19 April
211:19 April
116:Evil bit
105:See also
95:bozo bit
21:bozo bit
323:
292:
264:
194:
167:
142:
52:Finder
233:(PDF)
29:Apple
321:ISBN
290:ISBN
262:ISBN
241:2012
213:2012
192:ISBN
165:ISBN
140:ISBN
72:The
56:bozo
65:of
354::
319:.
317:37
276:^
38:.
329:.
298:.
270:.
243:.
215:.
173:.
148:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.