this post was submitted on 28 Sep 2024
39 points (100.0% liked)

RPGMemes

14347 readers
576 users here now

Humor, jokes, memes about TTRPGs

founded 2 years ago
MODERATORS
 

Image transcription:

Computer science terms that sound like fantasy RPG abilities

I'll start:

  • Firewall
  • Virtual Memory
  • Single source of truth
  • Lossless Compression (this one sounds really powerful for some reason)

Your turn

Hard mode: Try not to include closer to domain-specific things like javascript library names

(page 3) 14 comments
sorted by: hot top controversial new old
[–] outstanding_bond@mander.xyz 1 points 1 year ago (1 children)
  • rowhammer
  • rainbow table
  • global interpreter lock
  • race condition (atrocity?)
  • core dump
load more comments (1 replies)
[–] intensely_human@lemm.ee 0 points 1 year ago (2 children)
load more comments (2 replies)
[–] papalonian@lemmy.world 0 points 1 year ago (1 children)

Not necessarily PC related, but:

Uninterrupted Power Supply

load more comments (1 replies)
[–] jesuiscequejesuis@lemmy.world 0 points 1 year ago (1 children)
[–] pixelscript@lemm.ee 1 points 1 year ago

Easily my vote for the most unweildy named concept in software development.

It always reads like a typo of memorization. Not exactly an accident, of course. Memorize is memory + -ize, while memoize is memo + -ize, and memo is short for memorandum, which comes from memory. Both terms refer to some kind of storage and retreival of information. The similarities are deliberate.

My gripe with it is that memo in my head exclusively refers to a one-paragraph email sent to my company to notify me about something. Not remembering something. Definitely not the very specific case of linking input parameters to results of pure functions.

So we have this made-up word that looks suspiciously like an existing word that is related and means something related but is not the same thing, and the words it is actually adapted from don't mean the thing it's supposed to mean. Thanks, I hate it.

Really ought to call memoization what it what it really is. Lazy-loaded lookup tables.

[–] Forbo@lemmy.ml 0 points 1 year ago
  • Ring zero
  • Bootkit/Rootkit
  • Attacker in the middle
  • Intercepting proxy
  • Daemon
[–] Thyrian@ttrpg.network 0 points 1 year ago (1 children)
  • scroll snapping
  • unit tests
  • vulnerability
  • fastboot
  • root access
  • abstraction level
  • unity framework
[–] mindbleach@sh.itjust.works 0 points 1 year ago (2 children)

unit tests

You have the bard's attention.

load more comments (2 replies)
[–] Banichan@dormi.zone 0 points 1 year ago

CAT5e sounds like a fifth-edition ruleset

[–] psud@aussie.zone 0 points 1 year ago (2 children)

Ping of death

Bash

Vim (clearly a buff)

load more comments (2 replies)
[–] runjun@lemmy.world 0 points 1 year ago (1 children)

Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.

load more comments (1 replies)
[–] wizardbeard@lemmy.dbzer0.com 0 points 1 year ago (2 children)

Bounds execption: Allows larger objects to fit in smaller containers, ritual spell effective for 1 day, can be upcast to increase amount of "overfill", some check when retrieving the item for a chance of "corruption" (small chance to retrieve a different item, or have the "overfill" become something different like have the outer edge of a bar of gold be meat)

Paralellization: High level time magic, Allows the target multiple turns to be taken simultaneously, but an equivalent cooldown afterwards (waiting for all threads or jobs to return before being able to continue), so 3 turns at once means 2 turns the target can't do anything after.

Split brain configuration: Allows focusing on multiple concentration checks/spells at once. This could also be called paralellization, or multithreaded.

Pass By Reference enchantment: requires two identical items. Once enchanted, changes to one happen to both. Room for all sorts of shenanigans.

Private field: cast on an area to prevent entry/visibility into it by unauthorized entities. Sounds inside are not audible to unauthorized entities outside of it.

load more comments (2 replies)
load more comments
view more: ‹ prev next ›