Additional meanings of crunch
This commit is contained in:
parent
b9f64c7d3c
commit
5f2cc33bf9
|
@ -19,7 +19,7 @@ Free Documentation License".
|
|||
|
||||
* Generated
|
||||
|
||||
This file last generated Sunday, 12 February 2017 11:30AM UTC
|
||||
This file last generated Sunday, 12 February 2017 11:50AM UTC
|
||||
|
||||
* Glossary
|
||||
** (
|
||||
|
@ -3239,7 +3239,11 @@ n. Two binary digits; a quad. Larger than a bit , smaller than a nybble. Conside
|
|||
|
||||
3. n. The character #. Used at XEROX and CMU, among other places. See ASCII.
|
||||
|
||||
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.
|
||||
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.
|
||||
|
||||
5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking.
|
||||
|
||||
6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
|
||||
|
||||
*** cryppie
|
||||
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
||||
|
|
BIN
docs/jargon.1.gz
BIN
docs/jargon.1.gz
Binary file not shown.
|
@ -18,7 +18,7 @@ Free Documentation License".
|
|||
</p>
|
||||
<H2>Generated</H2>
|
||||
<p>
|
||||
This file last generated Sunday, 12 February 2017 11:30AM UTC
|
||||
This file last generated Sunday, 12 February 2017 11:50AM UTC
|
||||
|
||||
</p>
|
||||
<H2>Glossary</H2>
|
||||
|
@ -3854,7 +3854,11 @@ This file last generated Sunday, 12 February 2017 11:30AM UTC
|
|||
|
||||
<p>3. n. The character #. Used at XEROX and CMU, among other places. See ASCII. </p>
|
||||
|
||||
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.</p>
|
||||
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. </p>
|
||||
|
||||
<p>5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking. </p>
|
||||
|
||||
<p>6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
|
||||
<H4>cryppie</H4>
|
||||
<p>
|
||||
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
||||
|
|
|
@ -17,5 +17,10 @@ compile or execute. The term came into being specifically for a famous
|
|||
program on the BBC micro that ed BASIC source in order to make it run more
|
||||
quickly (it was a wholly interpretive BASIC, so the number of characters
|
||||
mattered). Obfuscated C Contest entries are often ed; see the first example
|
||||
under that entry.
|
||||
|
||||
under that entry. 5. Pseudonym of John Draper, an early hacker and phreaker.
|
||||
See phreaking. 6. Lowest common denominator intensification of labor
|
||||
strategy. A phase of (typically though not exclusively) commercial software
|
||||
development when hackers are threatened by their project managers in order
|
||||
to work additional unpaid hours to meet some arbitrary deadline decided by
|
||||
a suit on a golf course. "I won't be at the hackspace tonight because
|
||||
there's a crunch on at work".
|
||||
|
|
Loading…
Reference in New Issue
Block a user