Fact-checked by Grok 2 weeks ago

Hash

Hash may refer to several distinct concepts across various fields:

Hashish

Etymology and history

The term "" derives from the word ḥašiš (حَشِيش), meaning "hay," "dry grass," or "dried herb," reflecting its original association with plant material. This etymology entered European languages in the late , with the English word first recorded around 1598 as a reference to the psychoactive derived from . The in English is typically /həˈʃiːʃ/, preserving the Arabic phonetic structure. The earliest attested historical reference to hashish appears in a polemical pamphlet published in Cairo in 1123 CE, where the Fatimid caliph al-Āmir bi-Aḥkām Allāh accused the Nizari Ismaili Muslims—later known in the West as the Assassins—of being "hashish-eaters" (ḥašišiyyīn), linking the substance to their reputed use for inducing trance-like states before missions. This association, though likely propagandistic, marks the term's emergence in written records amid sectarian conflicts in the Islamic world. Hashish's origins trace back to Central Asia, where cannabis cultivation began millennia ago, before spreading southward to regions including modern-day Afghanistan and India by the early centuries CE through trade and migration routes. In South Asia, particularly along the Himalayan foothills, indigenous Cannabis indica strains were harvested for resin, with hashish production documented in Indian texts by the 11th century. From there, it extended westward to Afghanistan, becoming a staple in local traditions, and eventually to North Africa, including Morocco, where resin processing techniques evolved by the medieval period. Hashish reached in the 18th century via Orientalist scholarship and travel accounts, with the first scientific documentation provided by German botanist Johann Friedrich Gmelin in his 1777 work Allgemeine Geschichte der Pflanzengifte, describing its use in Eastern contexts for intoxicating effects. Its medicinal application peaked in and the from approximately 1880 to 1900, when it was prescribed for conditions such as pain, migraines, , and , supported by over 100 scientific publications exploring its therapeutic potential. This era of acceptance ended with increasing regulatory pressures, culminating in international prohibition under the 1961 , which classified resin—including hashish—as a Schedule I substance subject to strict controls on production, trade, and non-medical use.

Production and composition

Hashish is primarily produced through mechanical separation of the resinous trichomes from the , followed by compression into a solid form. Traditional techniques include dry sifting, where dried flowers are rubbed or beaten over fine or metal screens to collect the powdery —loose trichomes that are then pressed into blocks using and . This method, common in regions like for producing kif varieties, yields a product with potency depending on the quality of the starting material and sieving fineness. Another approach is ice-water , also known as bubble hash production, in which material is agitated in ice-cold water to detach trichomes, which are subsequently filtered through micron screens, dried, and pressed; this solventless process preserves the full spectrum of compounds but requires careful handling to avoid . Chemical extraction methods employ solvents to isolate cannabinoids and more efficiently, though they introduce potential residues if not properly purged. Butane hash oil (BHO), for instance, involves passing liquid through cannabis-packed tubes to dissolve resins, followed by of the solvent to yield a viscous that can be further processed into shatter, , or other forms; this technique allows for higher yields and potencies but poses safety risks due to the flammable nature of butane. Modern solvent extractions have enabled the production of highly concentrated variants, contrasting with historical hand-rubbed from , where resin is manually collected by rubbing fresh plants. Major production regions have historically included and . In , pre-2023 cultivation spanned 10,000–24,000 hectares, yielding 1,500–3,500 metric tons of annually around 2009 via hand-rubbing techniques for charas-style hash known for its dark, sticky and high content from indica-dominant strains; however, following the Taliban's nationwide ban on in March 2023, production has significantly declined. remains a key supplier to , with illicit production estimated at 700–800 metric tons of in 2023 across clandestine areas in the Mountains, primarily using dry sifting for kif varieties that are compressed into blond or red hashes. legalized medical and industrial under Law 13-21 in 2021, leading to a surge in legal production (nearly 4,200 tonnes in 2024), though illicit hashish output persists for export markets. These regions have accounted for significant shares of global illicit production, though recent policy changes have shifted dynamics. The composition of hashish centers on compounds extracted from cannabis glandular trichomes, including primary cannabinoids such as Δ⁹-tetrahydrocannabinol (THC), cannabidiol (CBD), and cannabinol (CBN), alongside terpenes like myrcene and limonene that contribute to aroma and viscosity. THC levels vary widely by production method, strain, and region: confiscated samples in Europe averaged 3–15% THC in 2011, though modern extracts can exceed this due to selective breeding and advanced processing. For instance, high-potency Afghan varieties have reached up to 65% THC in premium black hash forms. CBD and CBN typically comprise smaller fractions (under 5% combined in most samples), while terpenes and waxes make up 20–50% of the mass, influencing texture and stability. Purity is higher in mechanical methods that avoid solvents, but contemporary hashish is generally more potent than historical forms, with THC concentrations doubling in some markets since the early 2000s due to improved cultivation and extraction.

Effects and uses

Hashish, a concentrated derived from the plant, primarily exerts its effects through delta-9-tetrahydrocannabinol (THC), the main psychoactive compound responsible for its pharmacological actions. The psychoactive effects of typically include , relaxation, and altered of time and sensory experiences. These effects arise from THC's interaction with cannabinoid receptors in the , leading to a sense of and heightened sensory . When smoked, onset occurs within approximately 5 to 15 minutes, with peak effects shortly thereafter, while ingestion delays onset to 30 to due to slower absorption through the digestive system. Historically, in the , hashish and extracts were employed in Western medicine for pain relief and to treat , often as tinctures or medicines. These applications leveraged the and properties attributed to cannabinoids. In modern contexts, is used recreationally for its euphoric and relaxing effects, while therapeutic applications focus on symptom management for conditions like and , though evidence remains mixed and primarily drawn from broader research. Common consumption methods for hashish include , often via or joints to heat the directly; vaporizing, which heats it to release active compounds without ; and incorporation into edibles for oral . Each method influences the intensity and duration of effects, with and vaporizing providing faster onset compared to edibles. Compared to marijuana, which consists of dried flowers and leaves, hashish is a more concentrated form of with higher density, particularly THC levels that can exceed those in herbal by several fold. This results in similar psychoactive effects—, relaxation, and altered perception—but often more intensified due to the elevated potency, potentially leading to stronger subjective experiences at equivalent doses. In traditional cultural practices, has been used in Middle Eastern rituals, notably among Sufi sects like the Qalandars in historical , where it facilitated spiritual introspection and communal bonding. In , resins akin to (such as ) hold religious significance in Hindu rituals, consumed during festivals to enhance and . Hashish, as a concentrated form of resin, is classified internationally under the 1961 United Nations , where and its resin are listed in Schedule I, subjecting it to strict controls on production, trade, and use for non- purposes. Until 2020, it was also included in Schedule IV, which reserved the most severe restrictions, but the Commission on Narcotic Drugs removed from this schedule following a review that acknowledged its potential while maintaining prohibitions on recreational use. This framework has been ratified by over 180 countries, requiring signatories to limit to and scientific applications and criminalize non-authorized activities. Recent developments include Germany's of recreational in 2024, allowing possession and home cultivation, alongside similar reforms in (2023) and (2021). Regionally, hashish remains illegal for recreational use in most countries, with possession, production, and distribution punishable by severe penalties, including imprisonment. However, variations exist: legalized , including products, for recreational and medical use nationwide on October 17, 2018, under the , which regulates production, sale, and consumption through licensed frameworks. In the United States, while federal law classifies —including —as a I substance under the , 24 states had legalized recreational by 2025, often encompassing concentrates like , alongside broader medical access in 40 states. These divergences have sparked tensions with international obligations, as some jurisdictions permit uses that challenge the UN convention's prohibitions. As of November 2025, federal rescheduling efforts to move to III remain ongoing but unresolved. Culturally, hashish has been intertwined with countercultural movements, notably the 1960s hippie era, where it symbolized rebellion against societal norms and was embraced as a tool for spiritual exploration and communal bonding during events like Woodstock. Earlier influences trace to the Beat Generation of the 1950s, whose writers, including Jack Kerouac and Allen Ginsberg, incorporated hashish experiences into literature that critiqued materialism and promoted altered consciousness, paving the way for broader psychedelic influences in music by artists like The Beatles and Bob Dylan. This association extended to literature and art, fostering a legacy of hashish as a emblem of nonconformity and creative inspiration in Western counterculture. Economically, hashish drives a significant , with remaining a primary producer, accounting for a substantial portion of global illicit supply through clandestine cultivation in the Mountains, fueling exports primarily to . In 2023, the consumed approximately 1,013 tonnes of cannabis resin, with the illicit market valued at €7.7–12 billion annually. These figures underscore the scale of illicit trade, though recent bans (e.g., 2023) and legalizations (e.g., 2021) have influenced supply chains and underground revenue. Modern trends reflect growing debates, with increasingly integrated into the regulated in permissive regions, where it is processed into edibles, oils, and other products amid calls for rescheduling to align with evidence of lower harm profiles compared to other substances. By 2025, public support for reform, including variants, reached about 90% in the U.S. for some form of , influencing policy shifts toward and economic opportunities in emerging markets.

The hash symbol

Names and origins

The symbol # is known by a variety of names across different regions and contexts, including the , (especially in ), hash, , , sharp, square, and hex. These appellations reflect its multifaceted roles in notation, , and technology, with "pound sign" deriving from its historical association with weight and "number sign" from its use to denote numerals. The origins of the # symbol trace back to the 14th century, when it evolved as a scribal abbreviation for the Latin phrase libra pondo (℔), referring to the Roman unit of weight equivalent to a pound. Over time, the ligature of "l" and "b" from libra simplified into the crossed lines of the modern #, appearing in medieval European manuscripts for accounting and measurement purposes. In typographic history, the symbol gained prominence with its inclusion on the keyboard of the Remington Standard typewriter around 1886, marking one of its earliest mechanical implementations. It was later formalized in the American Standard Code for Information Interchange (ASCII) in 1963, where it was designated as one of the 95 printable characters to support and communication standards. The symbol's adoption in telephony occurred in 1968, when incorporated it on the bottom right of touch-tone keypads as a non-numeric to facilitate advanced signaling in their dual-tone multi-frequency system. This placement expanded its utility beyond printing to interactive electronic interfaces. The term "octothorpe" was coined in the 1960s by Bell Labs engineer Don Macpherson to describe the symbol during training sessions for the new touch-tone system; it combines the Greek prefix octo- (eight), referencing the symbol's eightfold radial points, with "thorpe," possibly a playful nod to athlete or an arbitrary suffix for memorability. This emerged among engineers as a humorous alternative to existing names and spread within technical communities. In contemporary usage, the name "" gained widespread recognition in 2007 when it was repurposed on platforms like for categorizing content.

Uses in notation and writing

In , particularly in the United States and , the hash symbol (#) is widely used as a to abbreviate "number" before a , as in "#2 " to denote a "number two ." This informal convention appears in everyday writing, product labeling, and technical specifications, where it replaces the spelled-out word for brevity. The symbol also denotes units of weight in pounds when placed after a numeral, such as "5# bag" indicating a five-pound bag, a usage rooted in its historical ties to measurement abbreviations. This application is common in commercial contexts like packaging and retail but is distinctly North American. In proofreading and manuscript editing, the # mark is inserted between letters or words to signal the insertion of a space, ensuring proper separation in typeset text; for example, "word#word" instructs the typesetter to add spacing. This standard symbol dates to traditional print production practices and remains in use among editors. Although the proper musical sharp symbol is ♯, the hash # often substitutes in typed or informal notation to indicate a note raised by a , such as for ; however, professional scores favor the distinct ♯ to avoid confusion with other meanings. In and , the # denotes sequence in headings and bulleted lists, as in "#1 tip" for the primary recommendation, and serves as a for numerical references, such as in outlines or indexes. Press releases commonly end with "###" centered to mark the conclusion of the main content. Outside , especially in non-English-speaking regions, this numbering role is rarer, with alternatives like "No." or "Nr." preferred.

Uses in technology

In , the hash symbol serves as the "pound key" on touch-tone keypads, introduced by in 1968 as part of the dual-tone multi-frequency (DTMF) signaling system for (IVR) menus. This key enables users to navigate automated systems by entering codes for options, such as selecting menu items or confirming inputs; for instance, in some U.S. states like , dialing #77 connects mobile users to highway emergency dispatch services. In , the hash symbol denotes single-line comments in scripting languages, where everything following it on a line is ignored by the interpreter. For example, in , lines beginning with # are used for explanatory notes, as specified in the language's . Similarly, in shell scripts, # initiates comments to document code without affecting execution. It also appears in programming contexts like , where # acts as a delimiter in macro definitions, allowing arguments to be passed and substituted within commands. On the web, the hash symbol identifies fragments, or points, enabling direct to specific sections of a page, as defined in the generic syntax standard. For instance, appending #section to a jumps to the element with id="section" in documents. Additionally, in web technologies like CSS, # prefixes color codes, such as #FF0000 for , providing a compact notation for specifying colors in stylesheets. The symbol has been part of the ASCII character set since its standardization in , with code 35 (0x23). In , the hash symbol prefixes hashtags for content categorization and discovery, a convention proposed by in a 2007 blog post to group messages by topic without native tagging features. This practice, initially manual, was later natively supported by platforms like (now X), enabling trend tracking and searchability across posts.

Hash marks

In sports

In sports, hash marks refer to short, perpendicular lines painted on playing fields or courts to assist officials, players, and coaches with precise measurements, positioning, and gameplay enforcement. These markings ensure consistent play by delineating key distances and boundaries, such as yardage intervals or player placement zones, thereby facilitating fair competition and accurate officiating across various athletic disciplines. In , hash marks are prominent short lines, typically 24 inches long and spaced every five yards along the length of between the goal lines. They mark yardage intervals from the sidelines and define the inbounds area where the must be spotted for the start of each play, preventing setups too close to the boundary and allowing balanced offensive options to either side. This placement influences strategy, as the 's position relative to the hashes affects kicking angles and running lanes. In the (NFL), these marks have been standardized at 18 feet 6 inches apart—70 feet 9 inches from each sideline—since 1972, a change implemented to widen the effective playing area, promote more dynamic offense, and align with post positioning for field goals. In soccer (), hash marks appear as optional one-yard lines drawn perpendicular to the goal line, located 11 yards from each corner flag and extending one yard beyond the goal line outside the field of play. Their primary role is to enforce the 10-yard minimum distance that opposing players must maintain from the ball during corner kicks, helping referees quickly verify compliance and maintain order during set pieces. These markings, while not mandatory under laws, are commonly used in professional and collegiate games to enhance precision in restarts. Other sports employ similar hash marks for lane starts and player alignment. In , small hash marks or scratch lines—often 0.05 meters wide and colored for visibility—mark starting positions in individual lanes for sprint and events, ensuring runners begin from accurate stagger points to compensate for distances and guiding handoffs. In , hash marks on the court include sets parallel to the near the free throw circle (13 feet from the and 3 feet from lane lines, 6 inches long) to designate standing positions for non-shooters during s, as well as perpendicular marks near the to outline the lower defensive for foul restrictions. These features collectively support officials in enforcing rules and players in maintaining proper spacing during critical moments.

In measurement and other visual contexts

In measurement tools such as rulers and tape measures, hash marks refer to the small lines that indicate fractional increments between major scale divisions. For instance, on a standard inch , longer lines denote whole inches, while progressively shorter hash marks represent halves, quarters, eighths, and sixteenths of an inch, enabling precise linear measurements. In engineering drawings, hash marks form hatching patterns, consisting of closely spaced parallel lines used to shade cross-sections and represent cut surfaces or materials. These lines are typically drawn at a 45-degree to the drawing's principal lines, with spacing adjusted based on the size—narrower for small areas (about 1.5 mm) and wider for larger ones (up to 3 mm)—to distinguish different components without overlapping. In and , hash marks appear as short alignment lines in tables, charts, and diagrams to guide visual structure and denote scales or divisions. They also form the grid in the game of (known as noughts and crosses in some regions), where intersecting horizontal and vertical lines create nine cells for player marks, influencing the design of the hash symbol (#). In military uniforms, hash marks—also called service stripes—are diagonal embroidered lines worn on the lower to denote years of honorable service, with one mark awarded for every three years in the U.S. Army or four years in the U.S. Navy, Marine Corps, and . These marks, typically 3/8 inch wide and colored gold or silver depending on the branch and uniform, accumulate to reflect cumulative or reserve time. In , hash marks serve as grid lines, scale indicators, or hachures on maps to represent spatial references and features. Horizontal or angled hash patterns fill polygons to indicate or , while short tick-like marks on lines (hachures) point downslope to show changes and , with denser spacing denoting steeper gradients.

Computing and

Hash functions

A is a mathematical that maps of arbitrary size to a fixed-size output, typically represented as an or bit known as a hash code, hash value, or digest. This mapping enables efficient indexing and storage by transforming variable-length inputs, such as strings or files, into compact representations suitable for computational use. Key properties of hash functions include , ensuring that identical inputs always produce the same output; rapid , often linear in the input length to support applications; uniform of outputs across the possible range to avoid clustering; and minimal collisions, where distinct inputs map to the same output with low probability. These characteristics make hash functions foundational for balancing speed and reliability in data processing tasks. Hash functions are broadly classified into non-cryptographic and cryptographic types. Non-cryptographic hash functions prioritize efficiency and low collision rates for general-purpose indexing, exemplified by , a family of functions introduced by Carter and Wegman in 1979, where for any two distinct keys, the probability of collision is at most 1 over the table size, providing a theoretical guarantee of even distribution. In contrast, cryptographic hash functions incorporate additional security properties, such as preimage resistance—making it computationally infeasible to reverse the output to find the original input—second preimage resistance, , and the , where a minor input change (e.g., one bit) alters roughly half the output bits unpredictably. These security features, as defined by NIST for approved algorithms, ensure resistance to adversarial attacks. Applications of hash functions include data indexing to facilitate quick lookups, such as in hash tables where they enable average O(1) time complexity for insertions and retrievals, and checksums for verifying data integrity by detecting alterations or errors in transmission.

Hash tables

A hash table is a data structure that implements an associative array, mapping keys to values by using a hash function to compute an index into an array of buckets or slots, from which the corresponding value can be retrieved. This approach allows for efficient storage and access of key-value pairs, assuming the hash function distributes keys uniformly across the available slots. The primary operations supported by hash tables are insertion, deletion, and search (or lookup), each achieving an average time complexity of Θ(1) under the assumption of simple uniform hashing, where the hash function ideally places each key in a unique slot. In the worst case, performance can degrade to Θ(n) if all keys collide, but probabilistic analysis shows that with a good hash function, the expected time remains constant. Deletion typically requires locating the key and removing it, potentially involving adjustments to maintain structural integrity, such as updating links in collision chains. Collisions arise when distinct keys hash to the same slot, a common occurrence given the finite number of slots. One resolution method is separate chaining, where each bucket contains a (or other structure) of all keys hashing to that slot; insertions append to the list, and searches traverse it linearly. An alternative is , where all elements are stored directly in the array, and collisions are resolved by probing for the next available slot using strategies like (h(k, i) = (h'(k) + i) mod m), (h(k, i) = (h'(k) + c₁i + c₂i²) mod m), or (h(k, i) = (h₁(k) + i · h₂(k)) mod m), with h' as the primary , i as the probe number, and m as the table size. Separate chaining is simpler to implement and handles higher load factors gracefully, while open addressing offers better locality but requires careful probe sequence design to avoid clustering. The load factor α, defined as the ratio of the number of stored elements n to the number of slots m (α = n/m), critically affects performance; as α increases, collision probability rises, potentially lengthening search chains or probe sequences. To maintain efficiency, hash tables are dynamically resized—typically by doubling the size and rehashing all elements—when α exceeds a threshold, often around 0.7 for to minimize clustering, or 1.0 for . Resizing ensures amortized constant-time operations, though it incurs occasional O(n) cost during rehashing. Hash tables offer advantages over balanced binary search trees in average-case scenarios, providing constant-time operations without the logarithmic overhead of tree traversals, making them ideal for applications like database indexing and CPU caches where fast lookups predominate. Their simplicity and space efficiency further contribute to widespread adoption in symbol tables and runtime environments.

Cryptographic applications

Cryptographic hash functions are mathematical algorithms that map data of arbitrary size to a fixed-size output, known as a hash value or digest, serving as a unique digital fingerprint for the input. These functions are designed to be computationally efficient while providing essential security properties, including preimage resistance (difficulty in finding an input that produces a specific output, ensuring one-wayness), second preimage resistance (hard to find a different input yielding the same output as a given input), and (computationally infeasible to find two distinct inputs with identical outputs). A prominent example is SHA-256, part of the Secure Hash Algorithm 2 () family, which generates a 256-bit digest and is standardized by the National Institute of Standards and Technology (NIST) for secure applications. These functions underpin numerous security protocols. In digital signatures, a message is hashed, and the sender signs the compact hash using asymmetric cryptography, allowing efficient verification of authenticity and integrity without processing the entire message. Message authentication codes (MACs) employ keyed hashing, such as HMAC (Hash-based Message Authentication Code), where a secret key is combined with the message via the hash function to produce a tag that verifies both integrity and origin, resistant to forgery without the key. For password storage, hashes are computed with added random salts to prevent rainbow table attacks, ensuring that even identical passwords yield unique outputs and thwarting bulk cracking attempts. In blockchain systems, like Bitcoin, Merkle trees organize transaction data using pairwise hashing to form a root hash, enabling efficient verification of large datasets and ensuring tamper-evident integrity across distributed ledgers. Key security features include the , where a minor change in the input (e.g., flipping one bit) results in a drastically altered output, typically changing about half the bits in the digest to enhance resistance against differential attacks. further strengthens unkeyed hashes by incorporating a key, making it suitable for protocols requiring authentication without exposing the key. Practical examples include file integrity checks, where hashes like SHA-256 verify that downloaded software or data remains unaltered during transmission, detecting corruption or tampering. In certificate authorities, hashes secure certificates by binding public keys to identities, allowing browsers and systems to confirm the legitimacy of websites and prevent man-in-the-middle attacks. Despite their robustness, vulnerabilities have emerged in older algorithms. The hash function, once widely used, saw early weaknesses when a collision in its compression function was announced in 1996 by Hans Dobbertin, demonstrating that finding matching inputs was theoretically feasible under certain conditions, which eroded trust and led to its deprecation for cryptographic purposes.

Other computing uses

In Unix shells such as and Korn shell, the hash command maintains an internal of the full paths to executable files found in the directories listed in the PATH environment variable, enabling faster subsequent lookups by avoiding repeated searches through the path directories each time a command is invoked. This caching mechanism improves shell performance during repeated executions of the same commands. Additionally, the # symbol in shell scripts denotes the start of a comment line, allowing developers to annotate code without affecting execution, a convention standardized across POSIX-compliant shells. In programming languages, hash maps provide efficient key-value storage and retrieval, underlying data structures like Python's built-in dict and Java's HashMap class. Python dictionaries implement hash tables to support average O(1) time complexity for insertions, deletions, and lookups, making them suitable for applications requiring rapid access to associated data. Similarly, Java's HashMap uses a hash table to implement the Map interface, permitting null keys and values while ensuring constant-time operations on average for basic mappings. String hashing techniques further enable deduplication in data processing pipelines, where identical strings produce the same hash value, allowing quick identification and elimination of duplicates in collections such as logs or datasets without full string comparisons. Databases leverage hashing for indexing to accelerate exact-match queries, where a hash index applies a to key values and stores pointers in buckets corresponding to the hash outputs, enabling direct access without scanning entire tables. Bloom filters, a probabilistic structure for membership testing, employ multiple independent s to map elements to bit positions in a compact , supporting efficient checks for set inclusion with a tunable but no false negatives, as originally proposed for space-efficient set representation. This approach is particularly useful in databases for approximating the presence of keys in large sets, such as query result caches, while minimizing memory usage. In caching systems, content-based addressing uses hashes to uniquely identify and store objects, as seen in Git's model, where each file, commit, or tree is named by the hash of its content, ensuring immutability and efficient deduplication across repositories by referencing identical content via the same hash. For , consistent hashing distributes requests across servers by mapping keys to a circular hash space, minimizing remapping disruptions when servers are added or removed, a method that balances load while preserving most existing assignments. In spell-checking software, hash sets store dictionary words for O(1) average-time lookups, allowing rapid validation of input strings against a vocabulary and enabling corrections via similarity metrics on non-matches.

Culinary uses

Definition and history

Hash is a culinary consisting of chopped meat, potatoes, and onions fried together, often using to create a simple, hearty meal. The term derives from the verb hacher, meaning "to chop," which entered English in the mid-17th century as a noun referring to a of meat cut into small pieces. This etymology reflects the dish's origins in , where it served as a practical method for and repurposing scraps into an edible form. In , hash has been a staple since the , with recipes appearing in colonial cookbooks that utilized remnants from dinners featuring , potatoes, and onions. specifically became prominent in hash recipes in the late , introduced by Ashkenazi Jewish immigrants from . By the mid-19th century, inexpensive eateries known as "hash houses" proliferated in the United States, offering hash as an affordable option for working-class patrons in urban areas. The dish gained popularity in the United States after , driven by food rationing and the availability of canned as a convenient protein source during economic hardship. Culturally, hash embodies traditions, evoking the casual atmosphere of American diners and hash houses where it remains a breakfast favorite for its straightforward, nourishing appeal.

Varieties and preparation

Corned beef hash originated in as a way to utilize leftovers from a boiled dinner, typically consisting of chopped , potatoes, onions, and that are fried together. It is commonly served with fried or poached eggs for . September 27 is recognized as National Corned Beef Hash Day . A variation known as red flannel hash incorporates cooked beets into the traditional corned beef hash mixture, giving it a distinctive pinkish-red color. This specialty maintains the diced and fried preparation but highlights the earthy sweetness of beets alongside the savory meat and potatoes. Internationally, hash appears in diverse forms adapted to local ingredients and traditions. hash is a hearty featuring browned , onions, green peppers, , tomatoes, and , often baked as a one-skillet . In , biksemad combines diced leftover or with potatoes, onions, and sometimes , fried until crisp and topped with a . Sweden's , or "small pieces in the pan," mixes diced potatoes, onions, and meats like or , fried and served with pickled beets and eggs. The dish hachis Parmentier resembles a , layering seasoned ground with mashed potatoes and cheese before baking until golden. Modern variations of hash extend beyond traditional meats to include vegetarian options, such as a vegan hash made with potatoes, , bell peppers, mushrooms, and beans for added protein. Fish-based hashes, like those using or leftover with potatoes and onions, offer a seafood twist. hash incorporates diced with potatoes, peppers, and onions for a hearty, gamey flavor. represent a potato-focused variation, shredded or diced potatoes fried until crispy, often seasoned simply with salt and pepper. Preparation of hash generally involves dicing ingredients like potatoes, , and into uniform small pieces to ensure even cooking. These are then fried in a skillet with or over medium heat, stirring occasionally to develop a crispy exterior while keeping the interiors tender. Hashes are often made from pantry staples and leftovers, such as canned beans, , or preserved meats, making them a versatile, economical dish.

Other uses

As a verb

In English, the verb "hash" primarily denotes the action of chopping or mincing food into small pieces, a usage originating from the French hacher, meaning "to chop," which derives from Old French hache ("axe"). This culinary sense first appeared in the late 16th century, with the earliest recorded evidence dating to around 1591–2 in the poem Rob Stene's Dream, where it describes cutting meat finely for preparation. By the 17th century, the term had become standard in English cookery texts for techniques like hashing potatoes or beef into uniform fragments before frying or stewing, reflecting its roots in food processing rather than the later noun form denoting the resulting dish. The verb extended metaphorically in the to non-culinary contexts, particularly idioms involving discussion or disarray, drawing on the idea of breaking something down into fragments. "To hash out" or "hash over" means to discuss something thoroughly, often to resolve differences, as if dissecting an into manageable parts; this phrasal usage emerged around the mid-1700s from the core sense of chopping into a . For instance, negotiators might "hash out" a by debating its clauses in detail. Similarly, "to make a hash of" something, of origin and attested by 1833, signifies bungling or confusing a task, implying it has been chopped up into an incoherent mess. These expressions highlight the verb's from physical cutting in 16th-century food preparation to figurative thoroughness or muddle by the .

Miscellaneous

In originating in the , a "hash house" denotes a cheap or specializing in simple, affordable fare such as hash and other short-order dishes. This term, first attested in 1865, reflected the modest establishments popular among working-class patrons in urban and roadside settings during the late 1800s and early 1900s. The word "hash" has also entered to describe poor-quality or haphazardly prepared food, often evoking a messy of ; for instance, "slumgullion" refers to a thin, watery or hash made from whatever ingredients are available, implying something cheap and unappetizing. Relatedly, "rehash" describes the act of repeating or reworking old material without significant change, drawing from the culinary sense of chopping and remixing food scraps. As a verb, "hash" generally means to chop or mince something into small pieces, a usage tied to food preparation but applicable more broadly.

References

  1. [1]
    Hash Functions | CSRC - NIST Computer Security Resource Center
    Jan 4, 2017 · A hash algorithm is used to map a message of arbitrary length to a fixed-length message digest. Approved hash algorithms for generating a condensed ...NIST Policy · News & Updates · Events · SHA-3 Standardization
  2. [2]
    What is hashing and how does it work? | Definition from TechTarget
    May 17, 2024 · Hashing is the process of transforming any given key or a string of characters into another value. This is usually represented by a shorter, fixed-length value ...
  3. [3]
    Hash Functions and Types of Hash functions - GeeksforGeeks
    Jul 23, 2025 · Key Properties of Hash Functions. Deterministic: A hash function must consistently produce the same output for the same input. Fixed Output ...
  4. [4]
    hashing - Glossary | CSRC - NIST Computer Security Resource Center
    Definitions: The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data. Sources:
  5. [5]
    What Is Hashing in Cybersecurity? - CrowdStrike
    Jan 16, 2024 · Hashing is a one-way mathematical function that turns data into a string of nondescript text that cannot be reversed or decoded.
  6. [6]
    Cryptographic hash functions | IBM Quantum Learning
    A cryptographic hash function takes an input (or message) of arbitrary length and returns a fixed-size string of n-bits as output.
  7. [7]
    Hashish - Etymology, Origin & Meaning
    Also, originating in the 1590s from Arabic hashīsh meaning "powdered hemp," also extends to "herbage, dry herb, rough grass, hay" in meaning.Missing: ḥašiš | Show results with:ḥašiš
  8. [8]
    War/Empire (Chapter 3) - The Invention of Race in the European ...
    The sobriquet first appears in a polemical epistle in 1123 by the Fatimid caliph, Al-Amir, leader of the Mustalian Ismailis, who, in refuting Nizari claims ...
  9. [9]
    The Myth of 'Afghan Black' (1): A cultural history of cannabis ...
    Jan 7, 2019 · The cannabis plant is indigenous to the region of which Afghanistan is a part. Throughout human history, almost every part of the plant has ...
  10. [10]
    A Review of Historical Context and Current Research on Cannabis ...
    The history of cannabis use is rooted in the Asian subcontinent. The indigenous strain of Cannabis indica has been growing freely along the Himalayan foothills ...
  11. [11]
    Brief history of hashish - Alchimia
    Oct 23, 2016 · Two main factors affected the spread of hashish during the 17th and 18th centuries: on one hand, the introduction of tobacco in Europe and then ...
  12. [12]
    [PDF] EMCDDA MONOGRAPHS - EUDA
    example, Gmelin wrote in 1777 of the Eastern use of bhang for stupefying ('etwas. Betaeubendes'), mind-clouding ('Benebelung des Verstandes') and ...Missing: Johann | Show results with:Johann
  13. [13]
    What is the history of cannabis as a medicine from a global ...
    Nov 1, 2017 · During the second half of the 19th century over a 100 scientific articles were published on the medical use of cannabis in Europe and the U.S. ...Missing: hashish USA
  14. [14]
    [PDF] Single Convention on Narcotic Drugs, 1961
    2. The United Nations Conference for the Adoption of a Single Convention on Narcotic Drugs met at United Nations Headquarters from 24 January to 25 March 1961.Missing: peak Europe 1880-1900
  15. [15]
    Processing and extraction methods of medicinal cannabis - NIH
    Jul 19, 2021 · This review analyses various drying and extraction processes to guide the selection of suitable methods for various types of cannabis products and applications.Missing: credible | Show results with:credible
  16. [16]
    [PDF] 2.4 Cannabis - United Nations Office on Drugs and Crime
    This is principally due to the high resin yields measured in. Afghanistan (145 kg/ha), which are four times higher than in Morocco (36 kg/ha measured in 2005), ...Missing: hashish content
  17. [17]
    [PDF] 1.5 Cannabis market - United Nations Office on Drugs and Crime
    One can assume, however, that the strong decline of cannabis resin production by some 1700 metric tons in Morocco has had an impact on global cannabis ...
  18. [18]
    Cannabinoids, Phenolics, Terpenes and Alkaloids of Cannabis - PMC
    May 8, 2021 · Cannabis contains cannabinoids, non-cannabinoid phenols, flavonoids, terpenes, and alkaloids, among other secondary metabolites.
  19. [19]
    Increasing potency and price of cannabis in Europe, 2006–16 - PMC
    The authors reported a substantial increase in resin potency starting in 2011, driven by the emergence of a new type of resin exceeding 20% THC. Increases in ...
  20. [20]
    Chemistry, Metabolism, and Toxicology of Cannabis: Clinical ... - NIH
    Cannabis is known to have behavioral and physiological effects (27–29).Behavioral effects include feeling of euphoria, relaxation, altered time perception, lack ...
  21. [21]
    The Health Effects of Cannabis and Cannabinoids - NCBI Bookshelf
    The consumption of cannabis causes a particular combination of relaxation and euphoria, commonly referred to as a “high.” When cannabis is smoked, Δ9-THC ...
  22. [22]
    First, Do No Harm: Consequences of Marijuana Use and Abuse - NCBI
    The peak effect of smoked marijuana is usually felt within minutes and declines sharply after 30 minutes68,95; the peak effect of oral THC is usually not felt ...
  23. [23]
    Pharmacodynamic dose effects of oral cannabis ingestion in healthy ...
    Mar 21, 2020 · For all active doses, pharmacodynamic effects did not manifest until 30 – 60 min after ingestion, and peak effects occurred 1.5 – 3 h post- ...
  24. [24]
    The Therapeutic Potential of Cannabis and Cannabinoids - PMC
    In Europe, they were used at the end of the 19th century to treat pain, spasms, asthma, sleep disorders, depression, and loss of appetite.Missing: insomnia | Show results with:insomnia
  25. [25]
    Herbal Cannabis and Depression: A Review of Findings Published ...
    Beyond becoming a widespread recreational drug, cannabis was also used to treat insomnia, pain, and asthma. In addition, it was consumed to treat several other ...
  26. [26]
    Therapeutic Effects of Cannabis and Cannabinoids - NCBI - NIH
    Cannabis may also have effects on sleep latency, decreasing time to sleep onset at low doses and increasing time to sleep onset at higher doses (Garcia and ...
  27. [27]
    Understanding emerging forms of cannabis use through an online ...
    Although smoking of dried cannabis flowers or resin is the most traditional and common method of cannabis use, other methods include inhaling vaporized dried ...Missing: hashish | Show results with:hashish
  28. [28]
    Cannabis: Effects of consumption on health - NCBI Bookshelf
    A pronounced variation in Δ9-THC concentrations is observed in the herb (mixture of leaves, stems, and flower heads) and also in the resin ("hashish") in ...
  29. [29]
    The Problem with the Current High Potency THC Marijuana ... - NIH
    We now have concentrated THC products such as oil, shatter, dab, and edibles that have been able to get the THC concentration upwards of 95%. There is ...Missing: intensified | Show results with:intensified
  30. [30]
    Islam and cannabis: Legalisation and religious debate in Iran - PMC
    Therefore, in the medical practice of Muslim societies, especially in Iran, cannabis has historically been used as analgesic, appetite inductor, euphoric and ...
  31. [31]
    UN commission reclassifies cannabis, yet still considered harmful
    Dec 2, 2020 · The Commission on Narcotic Drugs (CND) zeroed-in on the decision to remove cannabis from Schedule IV of the 1961 Single Convention on Narcotic Drugs.Missing: prohibition | Show results with:prohibition
  32. [32]
    Cannabis Legalization and Regulation
    Jul 7, 2021 · The Cannabis Act creates a strict legal framework for controlling the production, distribution, sale and possession of cannabis across Canada.Missing: states | Show results with:states
  33. [33]
    Marijuana Legality by State 2025 | Where Is Weed Legal? - DISA
    This marijuana legalization map clearly defines the laws in each state and remains up-to-date with the latest changes on a monthly basis.
  34. [34]
    The Counterculture Hippie Movement of the 1960s and 1970s
    Sep 15, 2022 · The beat movement was the foundation of the counterculture movement that emerged in the late 1960s. Beat poetry began in New York City in the ...
  35. [35]
    The Mighty Mezz, Marijuana, and the Beat Generation
    The Beats were the first generation of writers for whom cannabis was central, both to the experiences they recounted and to the prose style in ...<|separator|>
  36. [36]
    Cannabis in American Literature: From Fitz Hugh Ludlow to the Beats
    Apr 22, 2025 · Almost a century after the publication of The Hasheesh Eater, the proto-hippie literary movement called the Beat Generation would return ...
  37. [37]
    Morocco - State.gov
    Morocco ranks second to Afghanistan in the cultivation and production of cannabis resin (hashish), according to the UN Office on Drugs and Crime (UNODC).
  38. [38]
    [PDF] Changes in Europe's cannabis resin market - EUDA
    The EMCDDA has estimated that in 2013 about 647 tonnes of cannabis herb and 641 tonnes of hashish were consumed in the EU and the retail market had an overall ...
  39. [39]
    9 facts about Americans and marijuana - Pew Research Center
    Jul 8, 2025 · The vast majority of Americans support legalizing marijuana in some way, according to a January-February 2025 Center survey. Around nine-in-ten ...Missing: industry | Show results with:industry
  40. [40]
    2025 Cannabis Policy Reform Legislation and Voter Measures
    See below for this year's bills to legalize cannabis for adults, to decriminalize cannabis (i.e., issuing a fine-only ticket for simple possession), and to ...
  41. [41]
    Number Sign - Rules and Examples - Grammarist
    In American English, the # sign stands for “number” and is used as a replacement for the word in informal writing situations. It's also used on a telephone ...
  42. [42]
    Number Sign - Rules and Examples - Really Learn English!
    In the American English, the # symbol is read as "number" when it comes before a number. We mostly use the number sign in informal writing, such as emails, ...Missing: precedes | Show results with:precedes
  43. [43]
    POUND SIGN Definition & Meaning | Dictionary.com
    Pound sign definition: a symbol (£) for “pound” or “pounds” as a monetary unit of the United Kingdom ... a symbol (#) for “pound” or “pounds” as a unit of weight ...
  44. [44]
    Copy Editing Marks – University Style Guide - Chico State
    A straight line between letters or characters means to add one space. A space mark (#) means the same thing. add one space copyediting mark. insert hyphen ...Missing: source | Show results with:source
  45. [45]
    The Sharp Sign - Piano-Keyboard-Guide.com
    Let's learn about the sharp sign. This is the actual symbol: ♯. However in type, it is often written like this: # (same symbol as pound, number sign or hash ...
  46. [46]
    What does ### mean at the end of a press release? - The Halo Group
    Three number signs/pound symbols (###), centered directly above the boilerplate or underneath the body copy in a press release, indicating to media that there ...
  47. [47]
    Number sign | Meaning & Symbol | Britannica
    Oct 31, 2025 · Though the symbol is technically called an octothorpe, it has also long been known as the “number sign” or “pound sign.” With the advent of ...
  48. [48]
    Wireless 911 Service | Federal Communications Commission
    Aug 8, 2023 · For example, "#77" is the number used for highway accidents in Virginia. Consider creating a contact in your wireless phone with the name "ICE" ...
  49. [49]
    PEP 8 – Style Guide for Python Code | peps.python.org
    Apr 4, 2025 · Inline comments should be separated by at least two spaces from the statement. They should start with a # and a single space. Inline comments ...PEP 20 – The Zen of Python · PEP 257 · PEP 7 – Style Guide for C Code
  50. [50]
    RFC 3986: Uniform Resource Identifier (URI): Generic Syntax
    This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security ...
  51. [51]
  52. [52]
    # - number sign - ASCII Code
    The symbol # is known variously in English-speaking regions as the number sign, hash, or pound sign.
  53. [53]
    Groups for Twitter; or A Proposal for Twitter Tag Channels
    Aug 25, 2007 · Chris Messina is a designer, writer, avid Twitterer, and speaker who's known for inventing the hashtag. He is a product guy, friend to startups, ...
  54. [54]
    Pro Football Hall of Fame Archives NFL history gridiron hash marks
    Jan 24, 2021 · The hash mark is one of the most important lines on a football field. The marking determines ball placement throughout a game.
  55. [55]
    How Football Became Football: The History of Hash Marks
    Feb 9, 2018 · (Today, the NFL hash marks align with the goal posts at 70 feet and 9 inches infield; college hash marks are 60 feet infield; and high school ...
  56. [56]
    Yard Lines, Goals, Hash Marks & the End Zone - American Football
    Hash marks are located 70 feet and nine inches from each of the sidelines, which has been the case since 1972. Each five-yard line is marked with a two-foot ...
  57. [57]
    How the NFL's hash marks help defenses disguise pressure more ...
    Sep 7, 2019 · In the NFL, the hash marks are 70 feet and 9 inches away from the nearest sideline. The distance between the two rows of hash marks is 18 feet ...
  58. [58]
    [PDF] Basic Soccer Field Diagram and Nomenclature
    Basic Soccer Field Diagram and Nomenclature. A. A. B. C. D. LEGEND: A ... M: Hash Mark – Line one yard in length drawn perpendicular to the goal line ...
  59. [59]
    Soccer Field Dimensions and Layout Tool for All Ages
    A hash mark one yard (.914m) situated six inches beyond the field of play and 11 yards (10.05m) from the touch line will be marked perpendicular to the goal ...
  60. [60]
    [PDF] 2024-2025 NCAA Men's and Women's Soccer Rules Book
    1.7 CORNER AREA, HASH MARK. From each corner, a quarter circle, having a radius of 1 yard, shall be drawn inside the field of play In addition, a hash mark 1 ...<|control11|><|separator|>
  61. [61]
    None
    ### Summary of Hash Marks or Small Perpendicular Lines for Lane Starts
  62. [62]
    [PDF] Painting a Double Waterfall Starting Line
    It is also recommended to paint green hash marks on the dividing line between lanes 4/5 every 10-12' up to the cut line so runners know they must remain in ...
  63. [63]
    RULE NO. 1: Court Dimensions – Equipment - NBA Official
    Four hash marks shall be drawn (2” wide) parallel to the baseline on each side of the free throw circle. These hash marks shall be 13' from the baseline and 3' ...
  64. [64]
    How Do You Ensure That a Tape Measure Is Accurate? | NIST
    Mar 27, 2025 · Some manufacturers use highly accurate reference tape measures to print their familiar hash marks on the tape. Some are printed using ...
  65. [65]
    How to Read a Tape Measure - Johnson Level
    As the increments decrease, so does the length of the mark. For example, ½" has a bigger mark than ¼" which has a bigger mark than ⅛", and so on. · Read 1 inch.
  66. [66]
    Sectioning Technique | Engineering Design - McGill University
    Section lines, or hatching, that represent the cut surface usually consist of thin parallel lines, as shown below, drawn at an angle of approximately 45° to the ...
  67. [67]
    [PDF] Engineering Working Drawings Basics
    The hatching lines spacing vary from 1.5mm for small sections to 3mm for large sections. • In some cases, the hatching may be used to indicate the material.
  68. [68]
    Crimes of Typography: The Worst Things You Can Do - The Futur
    Crime #6: Inappropriate Use of Hatch Marks (or Prime Marks). Hatch marks (or prime marks when we're talkin' 'bout measurement), also called 'dumb quotes' are ...Missing: hash | Show results with:hash
  69. [69]
    Learn Tic-Tac-Toe Game Rules With Variants - The Spruce Crafts
    May 12, 2020 · " The game's grid markings have been found chalked all over Roman ruins. Evidence of the game was also found in ancient Egyptian ruins. The ...
  70. [70]
    4231 - Service Stripes - MyNavy HR
    All personnel wear one stripe for each four years of active duty service or reserve service in an active status in any of the armed services. 4232. GOLD RATING ...
  71. [71]
    U.S. Army Service Stripes (Dress Blue) - Male - USAMM
    Rating 4.9 (32) The United States Army awards each stripe for three years of honorable service. Army Service Uniform Service Stripes are gold-colored rayon or a goldenlite ...
  72. [72]
    9.3 Symbology – Geographic Information Systems and Cartography
    For instance, points, lines, and polygons can be filled with horizontal hash marks. The closer these hash marks are spaced within the feature symbol, the more ...
  73. [73]
    Reading: Maps | Geology - Lumen Learning
    (The short lines sticking out of the contour lines are called hachures, hatch marks, or tick marks.) Contour lines on standard US Geological Survey topographic ...
  74. [74]
    [PDF] Hash Functions - Cornell: Computer Science
    Jan 9, 2021 · A hash function is a function that maps data of arbitrary size to an integer of some fixed size. Example: Java's class Object declares ...
  75. [75]
    [PDF] Chapter 6 Hash Functions - cs.wisc.edu
    A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary ...
  76. [76]
    [PDF] Hashing
    Mar 12, 2016 · A hash function takes a key and a max value, returning a number between 0 and max. It must be consistent and have few collisions.
  77. [77]
    Universal classes of hash functions - ScienceDirect.com
    This paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a random choice of hash function.
  78. [78]
    [PDF] Cryptographic Hash-Function Basics: Definitions, Implications, and ...
    Feb 12, 2004 · Here we give formal definitions for seven notions of hash-function security. The definitions fall under the general categories of preimage- ...
  79. [79]
    3.4 Hash Tables - Algorithms, 4th Edition
    Choose k independent hash functions from 0 to N-1. CRC-32. Another application of hashing is computing checksums to verify the integrity of some data file.
  80. [80]
    Cryptographic hash function - Glossary | CSRC
    A cryptographic hash function is a function on bit strings that maps arbitrary length to a fixed length, acting as a fingerprint of a file or message.Missing: SHA- 256
  81. [81]
    [PDF] fips pub 180-4 - federal information processing standards publication
    Aug 4, 2015 · 6.2.2 SHA-256 Hash Computation. The SHA-256 hash computation uses functions and constants previously defined in Sec. 4.1.2 and Sec. 4.2.2 ...
  82. [82]
    VU#836068 - MD5 vulnerable to collision attacks
    Dec 31, 2008 · Cryptanalytic research published in 1996 described a weakness in the MD5 algorithm that could result in collision attacks, at least in principle ...Description · Impact · SolutionMissing: discovery | Show results with:discovery
  83. [83]
    5. Data Structures — Python 3.14.0 documentation
    dict). Dictionaries are sometimes found in other languages as “associative ...5. Data Structures · 5.1. More On Lists · 5.3. Tuples And Sequences
  84. [84]
    HashMap (Java Platform SE 8 ) - Oracle Help Center
    HashMap is a hash table based implementation of the Map interface, providing all optional map operations, and permits null values and keys.Frames · Uses of Class java.util.HashMap · Map.Entry · AbstractMap
  85. [85]
    String Hashing - Algorithms for Competitive Programming
    Jul 4, 2024 · The idea behind the string hashing is the following: we map each string into an integer and compare those instead of the strings.
  86. [86]
    10.3.9 Comparison of B-Tree and Hash Indexes
    Understanding the B-tree and hash data structures can help predict how different queries perform on different storage engines that use these data structures ...10.3.6 Multiple-Column Indexes · 12 Character Sets, Collations... · Documentation
  87. [87]
    hash-function-transition Documentation - Git
    At its core, the Git version control system is a content addressable filesystem. It uses the SHA-1 hash function to name content. For example, files ...
  88. [88]
    [PDF] Consistent Hashing and Random Trees: Distributed Caching ...
    Plaxton and Rajaraman [9] show how to balance the load among all caches by using randomization and hashing. In partic- ular, they use a hierarchy of ...
  89. [89]
    Lab 3 - Hash Table Spell Checking - andrew.cmu.ed
    Feb 8, 2023 · One straight-forward way to implement a fast spell checker is to use a hash table. If a word is found, it is assumed to be spelled correctly ...
  90. [90]
    Hash - Etymology, Origin & Meaning
    From 1650s French hacher "to chop," hash means chopped stew, mix, or mess; also short for hashish (1959) and cryptographic use (1979). Origin ties to Old ...
  91. [91]
    FOOD HOLIDAY: The History Of Corned Beef Hash For National ...
    Sep 27, 2020 · Hash made with a variety of ingredients has been part of the American diet since at least colonial times, as 18th-century recipes attest [source] ...
  92. [92]
    Hash house lingo - Restaurant-ing through history
    Jul 12, 2021 · Odd – often humorous – names for simple restaurant orders were long associated with cheap eating places such as hash houses, beaneries, and lunch wagons.
  93. [93]
  94. [94]
    National Corned Beef Hash Day (September 27th) | Days Of The Year
    This is a meal that became popular throughout and after the Second World War. Because of the rationing that occurred during these years, fresh meat was very ...
  95. [95]
    A Culture Revealed Through Comfort Food - NPR
    Sep 17, 2005 · An 1889 edition of the Walla Walla Union of Washington State describes a hash house where patrons learned their choices from a barker who ...
  96. [96]
    Do you know how corned beef hash became to be? It's origins are ...
    May 1, 2025 · It's origins are New England, and it was created as a way to use up the leftover boiled dinner ingredients beef, cabbage, potatoes and onions.
  97. [97]
    Leftover Corned Beef Hash - Irish American Mom
    Rating 4.8 (8) · 20 minMar 18, 2021 · Leftover Corned Beef Hash is made with chopped up corned beef, cooked potatoes, cabbage and carrots with some freshly fried onions. Topped with eggs
  98. [98]
    NATIONAL CORNED BEEF HASH DAY | September 27
    September 27 means we are adding flavor to every meal while cleaning out the fridge, because it's National Corned Beef Hash Day!
  99. [99]
    Red Flannel Hash - Simply Recipes
    25 minNew England red flannel hash is made with cooked potatoes, beets, corned beef that are all fried up with onions and butter. It's ready in 25 minutes.
  100. [100]
    Classic New England Red Flannel Hash Recipe - Yankee Magazine
    Made with leftover corned beef, potatoes, and beets, Red Flannel Hash puts a New England twist on this classic breakfast favorite.
  101. [101]
    Texas Hash Casserole Recipe | Tastes of Lizzy T
    Rating 4.5 (57) · 1 hrMar 14, 2022 · Looking for an easy dinner? Try this Texas Hash with ground beef, rice, tomatoes and pepper. Starts on the stovetop and bakes in the oven.
  102. [102]
    Danish Biksemad Recipe: Easy and Authentic Comfort Food
    40 minLearn how to make authentic Danish Biksemad with crispy potatoes, leftover pork & onions. A quick, hearty meal with tons of flavor!
  103. [103]
    Pytt i Panna Swedish Hash Recipe - The Spruce Eats
    Rating 4.4 (33) · 40 minJul 30, 2025 · Ingredients · 6 slices bacon · 6 to 8 cooked potatoes, peeled and diced into uniform pieces · 2 tablespoons butter · 1 medium onion, diced into ...
  104. [104]
    Hachis Parmentier (French Shepherd's Pie) - Vanilla Bean Cuisine
    Rating 4.9 (87) · 1 hr 20 minMar 11, 2021 · Hachis Parmentier is a classic French dish that features a savory ground beef mixture covered by fluffy, cheesy mashed potatoes.Why Make This Recipe · 🥗 Ingredients · 🥣 Instructions · 🧐 Recipe FAQs
  105. [105]
    Easy Vegan Breakfast Hash with Veggies and Beans
    Rating 4.8 (127) · 50 minMar 12, 2021 · This easy vegan breakfast hash recipe is full of potatoes, zucchini, bell peppers, paprika, garlic powder, and beans for a high-protein ...
  106. [106]
    Smoked Salmon Hash - Simply Recipes
    Rating 5.0 (1) · 35 minSmoked salmon hash includes hash brown potatoes, hot smoked salmon, onions, sour cream, horseradish, mustard, chives, and parsley. Potatoes are fried, then ...
  107. [107]
    Breakfast Venison Hash with Vegetables - Forager | Chef
    Rating 5.0 (1) · 25 minMar 7, 2020 · Tender, crispy pieces of venison hash with your choice of vegetables tossed with a touch of garlic and cumin is a great recipe for ...Missing: fish | Show results with:fish
  108. [108]
    Homemade Crispy Hash Browns Recipe - Allrecipes
    Rating 4.5 (1,269) · 35 minOct 10, 2024 · Shred and dry potatoes, mix with flour and egg, form patties, and pan-fry in sizzling oil until crispy, using starchy potatoes for best crisp.
  109. [109]
    Potato Hash Recipe (Diner-Style Crispy Skillet Potatoes) - The Kitchn
    Rating 5.0 (4) Aug 24, 2021 · The foolproof method for potatoes with a creamy center and crispy exterior is to cook the potatoes in a separate pot first. This helps to avoid ...
  110. [110]
    Crispy Hash Browns Recipe (Diner-Style!)
    Rating 5.0 (17) · 20 minThere's just one secret to the crispiest hash browns: remove as much moisture as possible before frying. Our recipe shows you exactly how to do it to ...
  111. [111]
    Easy one-skillet white bean hash with eggs recipe uses up pantry ...
    Mar 24, 2020 · You can use any beans in your pantry to make chef Geoffrey Zakarian's white bean hash and eggs recipe.
  112. [112]
    hash, v. meanings, etymology and more - Oxford English Dictionary
    The earliest known use of the verb hash is in the late 1500s. OED's earliest evidence for hash is from around 1591–2, in Rob Stene's Dream.Missing: dish | Show results with:dish
  113. [113]
    Definition of HASH
    ### Summary of "Hash" as a Verb from Merriam-Webster
  114. [114]
    “Make a hash” - Not One-Off Britishisms
    Oct 7, 2012 · The expression was coined in the British Isles, probably not long before 1833, when Cardinal Newman wrote in a letter: “Froude writes up to me ...
  115. [115]
    HASH HOUSE Definition & Meaning - Dictionary.com
    Slang. an inexpensive restaurant, diner, or the like, that serves a limited number of short-order dishes. We stopped for lunch at a roadside hash house.Missing: 19th | Show results with:19th
  116. [116]
    Slumgullion - WorldWideWords.org
    May 23, 2009 · A slang dictionary two years later defined slumgullion as “any cheap, nasty, washy beverage”. Another, roughly contemporary, memory is this: The ...Missing: poor | Show results with:poor
  117. [117]
    REHASH Definition & Meaning - Merriam-Webster
    Nov 1, 2025 · 1. to talk over or discuss again 2. to present or use again in another form without substantial change or improvementMissing: repetition | Show results with:repetition
  118. [118]
    The history of the hash symbol - New Statesman
    Tic-tac-toe. Pig-pen. The host of names the “#” symbol has had over the centuries only just outnumbers the plethora of functions it has fulfilled.