Additional meanings of crunch

This commit is contained in:
Bob Mottram 2017-02-12 11:50:33 +00:00
parent b9f64c7d3c
commit 5f2cc33bf9
4 changed files with 19 additions and 6 deletions

View File

@ -19,7 +19,7 @@ Free Documentation License".
* Generated
This file last generated Sunday, 12 February 2017 11:30AM UTC
This file last generated Sunday, 12 February 2017 11:50AM UTC
* Glossary
** (
@ -3239,7 +3239,11 @@ n. Two binary digits; a quad. Larger than a bit , smaller than a nybble. Conside
3. n. The character #. Used at XEROX and CMU, among other places. See ASCII.
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.
5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking.
6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
*** cryppie
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.

Binary file not shown.

View File

@ -18,7 +18,7 @@ Free Documentation License".
</p>
<H2>Generated</H2>
<p>
This file last generated Sunday, 12 February 2017 11:30AM UTC
This file last generated Sunday, 12 February 2017 11:50AM UTC
</p>
<H2>Glossary</H2>
@ -3854,7 +3854,11 @@ This file last generated Sunday, 12 February 2017 11:30AM UTC
<p>3. n. The character #. Used at XEROX and CMU, among other places. See ASCII. </p>
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.</p>
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. </p>
<p>5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking. </p>
<p>6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
<H4>cryppie</H4>
<p>
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.

View File

@ -17,5 +17,10 @@ compile or execute. The term came into being specifically for a famous
program on the BBC micro that ed BASIC source in order to make it run more
quickly (it was a wholly interpretive BASIC, so the number of characters
mattered). Obfuscated C Contest entries are often ed; see the first example
under that entry.
under that entry. 5. Pseudonym of John Draper, an early hacker and phreaker.
See phreaking. 6. Lowest common denominator intensification of labor
strategy. A phase of (typically though not exclusively) commercial software
development when hackers are threatened by their project managers in order
to work additional unpaid hours to meet some arbitrary deadline decided by
a suit on a golf course. "I won't be at the hackspace tonight because
there's a crunch on at work".