Browse Definitions :
Definition

FUBAR

FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair." This is often softened to "fouled up beyond all repair" in reference to hardware. The programming and documentation equivalent is "fouled up beyond all recognition." Sometimes the last word is "recovery" or "reconciliation" or "reason."

In a Virtual Address Extension (VAX), the acronym FUBAR has been adapted to refer to the words "failed UniBus address register." Some programmers apparently managed to sneak this by humorless higher-ups, and the term stuck.

F.U.B.A.R. International is the name of a film company founded in 1989 by several businessmen seeking adventure. They went on location to film natural disasters. Some of the disasters were artificially created, especially avalanches, which could be triggered by explosives. Company executives vacation in Vail, Colorado every year, and have become local celebrities. These days, F.U.B.A.R. International markets clothing and novelty items.

Because foo , an unrelated term, appears phonetically in FUBAR, programmers have taken to using both foo and bar as metasyntactic variables when two such variables are needed.

This was last updated in October 2007

Continue Reading About FUBAR

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close