Foo?

Last updated
foo?
Porno Graffitti - Foo.jpg
Studio album by
ReleasedFebruary 28, 2001
Recorded2000–2001
Genre J-pop
Length55:50
Label SME Records
Producer Porno Graffitti
Porno Graffitti chronology
Romantist Egoist
(2000)
foo?
(2001)
Kumo o mo Tsukamu Tami
(2002)
Singles from foo?
  1. "Music Hour"
    Released: 2000/7/12
  2. "Saudade"
    Released: 2000/9/13
  3. "Saboten"
    Released: 2000/12/6

"Foo?" (Stylized as foo?) is the second album by the Japanese rock band Porno Graffitti, it was released on February 28, 2001. [1]

Released almost a year after their last album, "Romantist Egoist", the album contains 12 tracks including three hit singles from 2000: "Music Hour", "Saudade" and "Saboten".

The album's title is a play on the words "Hi, Fu, Mi" (ひぃふぅみぃ/One, Two, Three) from the fact that it is their second album, and the English phrase "Who?". The cover photo is a pink square tile, and Akimitsu Honma revealed that the shadow on the tile is Tama. [2]

The album ranked #2 for weekly Oricon charts. [3]

Track listing

No.TitleLength
1."INNERVISIONS"4:34
2."Guava Juice" (グァバジュース)4:22
3."Saudade "D" tour style" (サウダージ "D" tour style)4:26
4."Ai Naki…" (愛なき… / Without Love…)5:17
5."Ore, Tenshi" (オレ、天使 / I am, Angel)3:58
6."Saboten" (サボテン / Cactus)4:54
7."Name is Man 〜Kimi no Mikata〜" (Name is man 〜君の味方〜 / Name is Man 〜Your Side〜)4:58
8."Draw #2 Harumitsu" (デッサン #2 春光)5:20
9."Music Hour Ver.164" (ミュージック・アワー Ver.164)4:39
10."Kūsō Kagaku Shōnen" (空想科学少年 / Science Fiction Boy)4:58
11."Report 21"5:17
12."Yoake Mae ni ha" (夜明けまえには / Before Dawn)4:40

Related Research Articles

<span class="mw-page-title-main">Eric S. Raymond</span> American computer programmer, author, and advocate for the open source movement

Eric Steven Raymond, often referred to as ESR, is an American software developer, open-source software advocate, and author of the 1997 essay and 1999 book The Cathedral and the Bazaar. He wrote a guidebook for the Roguelike game NetHack. In the 1990s, he edited and updated the Jargon File, published as The New Hacker's Dictionary.

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who achieves goals by non-standard means. The term has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them. In a positive connotation, though, hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Hacking and cyber-attacks are used extra-legally and illegally by law enforcement and security agencies, and employed by state actors as a weapon of legal and illegal warfare.

A metasyntactic variable is a specific word or set of words identified as a placeholder in computer science and specifically computer programming. These words are commonly found in source code and are intended to be modified or substituted before real-world usage. For example, foo and bar are used in over 330 Internet Engineering Task Force Requests for Comments, the documents which define foundational internet technologies like HTTP (web), TCP/IP, and email protocols.

In computing, a namespace is a set of signs (names) that are used to identify and refer to objects of various kinds. A namespace ensures that all of a given set of objects have unique names so that they can be easily identified.

"Fnord" is a word coined in 1965 by Kerry Thornley and Greg Hill in the Discordian religious text Principia Discordia. It entered into popular culture after appearing in The Illuminatus! Trilogy (1975) of novels written by Robert Shea and Robert Anton Wilson. Here, the interjection "fnord" is given hypnotic power over the unenlightened, and children in grade school are taught to be unable to see the word consciously. For the rest of their lives, every appearance of the word subconsciously generates a feeling of unease and confusion which prevents rational consideration of the text in which it appears.

Military slang is an array of colloquial terminology used commonly by military personnel, including slang which is unique to or originates with the armed forces. In English-speaking countries, it often takes the form of abbreviations/acronyms or derivations of the NATO Phonetic Alphabet, or otherwise incorporates aspects of formal military terms and concepts. Military slang is often used to reinforce or reflect interservice rivalries.

The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware, to achieve novel and clever outcomes. The act of engaging in activities in a spirit of playfulness and exploration is termed hacking. However, the defining characteristic of a hacker is not the activities performed themselves, but how it is done and whether it is exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including pranks at MIT done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous hacks at the Massachusetts Institute of Technology were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into R2-D2.

<span class="mw-page-title-main">Tech Model Railroad Club</span>

The Tech Model Railroad Club (TMRC) is a student organization at the Massachusetts Institute of Technology (MIT). Historically, it has been a wellspring of hacker culture and the oldest such hacking group in North America. Formed in 1946, its HO scale layout specializes in the automated operation of model trains.

Code completion is an autocompletion feature in many integrated development environments (IDEs) that speeds up the process of coding applications by fixing common mistakes and suggesting lines of code. This usually happens through popups while typing, querying parameters of functions, and query hints related to syntax errors. Modern code completion software typically uses generative artificial intelligence systems to predict lines of code. Code completion and related tools serve as documentation and disambiguation for variable names, functions, and methods, using static analysis.

In computer programming languages, TypeParameter is a generic label used in generic programming to reference an unknown data type, data structure, or class. TypeParameter is most frequently used in C++ templates and Java generics. TypeParameter is similar to a metasyntactic variable, but distinct. It is not the name of a generic type variable, but the name of a generic type of variable.

<span class="mw-page-title-main">Placeholder name</span> Name substituted for an unknown name

Placeholder names are intentionally overly generic and ambiguous terms referring to things, places, or people, the names of which or of whom do not actually exist; are temporarily forgotten, or are unimportant; or in order to avoid stigmatization, or because they are unknowable or unpredictable given the context of their discussion; to de-emphasize in which event the precise specification thereof is otherwise impossible, or to deliberately expunge.

<span class="mw-page-title-main">Hackathon</span> Event in which groups of software developers work at an accelerated pace

A hackathon is an event where people engage in rapid and collaborative engineering over a relatively short period of time such as 24 or 48 hours. They are often run using agile software development practices, such as sprint-like design wherein computer programmers and others involved in software development, including graphic designers, interface designers, product managers, project managers, domain experts, and others collaborate intensively on engineering projects, such as software engineering.

In object-oriented programming, a destructor is a method which is invoked mechanically just before the memory of the object is released. It can happen when its lifetime is bound to scope and the execution leaves the scope, when it is embedded in another object whose lifetime ends, or when it was allocated dynamically and is released explicitly. Its main purpose is to free the resources which were acquired by the object during its life and/or deregister from other entities which may keep references to it. Use of destructors is needed for the process of Resource Acquisition Is Initialization (RAII).

In computer programming, a temporary variable is a variable with short lifetime, usually to hold data that will soon be discarded, or before it can be placed at a more permanent memory location. Because it is short-lived, it is usually declared as a local variable, i.e., a variable with local scope. There is no formal definition of what makes a variable temporary, but it is an often-used term in programming.

Foo is a placeholder name in computer-related documentation.

<span class="mw-page-title-main">Alan Kotok</span> American computer scientist

Alan Kotok was an American computer scientist known for his work at Digital Equipment Corporation and at the World Wide Web Consortium (W3C). Steven Levy, in his book Hackers: Heroes of the Computer Revolution, describes Kotok and his classmates at the Massachusetts Institute of Technology (MIT) as the first true hackers.

Peter R. Samson is an American computer scientist, best known for creating pioneering computer software for the TX-0 and PDP-1.

In computer slang, J. Random Hacker is an arbitrary programmer (hacker).

A mythical figure like the Unknown Soldier; the archetypal hacker nerd. This term is one of the oldest in the hacker's jargon, apparently going back to MIT in the 1960s. may originally have been inspired by 'J. Fred Muggs', a show-biz chimpanzee whose name was a household word back in the early days of TMRC, and was probably influenced by 'J. Presper Eckert' ".

The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET AI/LISP/PDP-10 communities, including Bolt, Beranek and Newman, Carnegie Mellon University, and Worcester Polytechnic Institute. It was published in paperback form in 1983 as The Hacker's Dictionary, revised in 1991 as The New Hacker's Dictionary.

Robert Alan Saunders was an American computer scientist, most famous for his involvement with Spacewar. Saunders joined the Tech Model Railroad Club (TMRC) led by Alan Kotok, Peter Samson, and himself. They then met Marvin Minsky and other influential pioneers in what was then known as Artificial Intelligence.

References