Y’all might be interested in the book series by Charles Stross starting with The Atrocity Archives.
RPGMemes
Humor, jokes, memes about TTRPGs
- Cache miss
- Bubble Sort
- Vectorization
spawn daemon
Null pointer – sends the victim on a quest they can never fulfill.
This one’s not quite CS but oh well. Spell check - After a series of unfortunate accidents at the magical university, all novel spells must be submitted to the administration in writing to ensure their safety before first casting.
Root access - Access to the Underdark druid communication network, which is transmitted through a continent-wide system of interconnected tree roots.
Command: Line - A creative use of the command spell that forces an affected creature to spend their turn forming or waiting in an orderly line.
Neural net - The system of control used by an elder brain to control and coordinate illithids under its influence.
Force Merge
Power word: Infinite Recursion
Spoofing
Cryptojacking
Bluetooth sounds like a negative effect. Similar to using Bluetooth in real life.
- Master / Slave
- Gatekeeper
- Anti virus
- Force push
- Bug
- Forever loop
- Break condition
- Real time operating system
- Blockchain
- Agility measurement index (not really an ability, but sounds like it could be art of an RPG mechanic)
Authentication tokens - Some heirloom jewelry or letter of permission from the local royal family used to prove you are on their mission.
Gap analysis - when your party finds a crevasse or pit and determines if they can jump across.
Buffer - party member who casts buffs, usually a bard.
Microservices - when you barter with gnomes to repair your gear.
Hyperconvergence or hypervisor.
Private Void NULL
Null pointer sounds like a powerful spell
- Knapsack problem
- Pushdown automata
- Zero-knowledge proof
- Late binding
- Borrow checker
- Channel coding
- Tail recursion
- Camel case
- Double float
- Red-black trees
- Quaternions
Lossy compression feels like cheating:
- Block prediction
- Motion compensation
- Chroma subsampling
- Frequency space
- Time domain
- Semaphore
- Spanning tree
- Spinlock
- Recursive function
Silicium Bug = A insect creature made of quartz.
Gate Array = An ancient holy temple with partially defunct portals of unknown origin.
Mail storm
Perhaps not that deep "cs" but still :D
- scroll snapping
- unit tests
- vulnerability
- fastboot
- root access
- abstraction level
- unity framework
Lossless Compression isn't actually powerful, its just an improved Lossy Compression which is admittedly terrifying to use in many cases.
So you're saying if I use it... they'll be squished and lose random pieces of themselves?
I always found "The Perceptron" to have such a badass name…. 😅 (Math part was annoying though…)
Bounds execption: Allows larger objects to fit in smaller containers, ritual spell effective for 1 day, can be upcast to increase amount of "overfill", some check when retrieving the item for a chance of "corruption" (small chance to retrieve a different item, or have the "overfill" become something different like have the outer edge of a bar of gold be meat)
Paralellization: High level time magic, Allows the target multiple turns to be taken simultaneously, but an equivalent cooldown afterwards (waiting for all threads or jobs to return before being able to continue), so 3 turns at once means 2 turns the target can't do anything after.
Split brain configuration: Allows focusing on multiple concentration checks/spells at once. This could also be called paralellization, or multithreaded.
Pass By Reference enchantment: requires two identical items. Once enchanted, changes to one happen to both. Room for all sorts of shenanigans.
Private field: cast on an area to prevent entry/visibility into it by unauthorized entities. Sounds inside are not audible to unauthorized entities outside of it.
- Higher order function
- Rijndael cypher
- Serpent cypher
Binary search
Check bit
Control character
Sentinal value
Escape sequence
EDIT:
Git bisect (not sure if this one counts as computer sciency enough though)
- 28k modem connection sounds *
Shielded Twisted Wire rootkit worm recursive loop MAC address( kinda like a true name i guess) Administrator control
- kernelspace
- make all
- upstream and downstream