home *** CD-ROM | disk | FTP | other *** search
- Path: news.wwa.com!rmartin
- From: rmartin@oma.com (Robert C. Martin)
- Newsgroups: comp.lang.c++,comp.lang.eiffel,comp.lang.c,comp.object,comp.software-eng
- Subject: Re: Beware of "C" Hackers -- A rebuttal to Bertrand Meyer
- Date: 15 Mar 1996 15:44:48 GMT
- Organization: Object Mentor
- Message-ID: <RMARTIN.96Mar15094448@rcm.oma.com>
- References: <1995Jul3.034108.4193@rcmcon.com> <3taaha$p8j@ixnews3.ix.netcom.com>
- <3taodp$859@saba.info.ucla.edu> <3tap9h$qp3@saba.info.ucla.edu>
- <314628F2.31C8@aud.alcatel.com> <RMARTIN.96Mar13110714@rcm.oma.com>
- <4i862r$1evq@saba.info.ucla.edu>
- NNTP-Posting-Host: rcm.oma.com
- In-reply-to: jmartin@cs.ucla.edu's message of 14 Mar 1996 04:07:55 GMT
-
- In article <4i862r$1evq@saba.info.ucla.edu> jmartin@cs.ucla.edu (Jay Martin) writes:
-
-
- Geez, when was this thread, a year ago? Well to recap ancient
- history it started when Robert Martin (below) called Bertrand Meyer a
- bigot for warning managers about C hacker types. Rewind thread!
-
- Lets not softpeddle this. Bertrand didn't just warn managers about C
- hacker types. In his otherwise excellent book "Object Success" He
- said this:
-
- -------------------------------------------------------------------------
- PRUDENT HIRING PRINCIPLE: Beware of C hackers.
-
- A "C hacker" is somewone who has had too much practice writing
- low-level C software and making use of all the special techniques and
- tricks permitted by that language.
-
- Why single out C? First, interestingly enough, one seldom hears about
- Pascal hackers, Ada hackers or Modula hackers. C, which since the
- late nineteen-seventies has spread rapidly throughought the computing
- community, especially in the USA, typifies a theology of computing
- where the Computer is the central deity and its altar reads
- Efficiency. Everything is sacrificed to low-level performance, and
- programs are built in terms of addresses, words, memory cells,
- pointers, manual memory allocation and deallocation, unsafe type
- conversions, signals and similar machine-oriented constructs. In this
- almost monotheist cult, where the Microsecond and the Kilobyte
- complete the trinity, there is little room for such idols of software
- engineering as Readability, Provability and Extendibility.
-
- Not surprisingly, former believers need a serious debriefing before
- they can rejoin the rest of the computing community and its progress
- towards more modern forms of software development.
-
- The above principle does not say "Stay away from C hackers", which
- would show lack of faith in the human aptitude to betterment. There
- have indeed been cases of former C hackers who became born-again O-O
- developers. But in general you should be cautious about including C
- hackers in your projects, as they are often the ones who have the most
- trouble adapting to the abstraction-based form of software development
- that object technology embodies.
- ----------------------------------------------------------------------
-
- To which I responded:
-
- There is only one word that can accurately describe these sentiments.
- That word is biggotry.
-
- (For the full text of my rebuttal, go to http://www.oma.com and select
- it from the list of freeware offerings.)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- --
- Robert Martin | Design Consulting | Training courses offered:
- Object Mentor Assoc.| rmartin@oma.com | OOA/D, C++, Advanced OO
- 14619 N. Somerset Cr| Tel: (847) 918-1004 | Mgt. Overview of OOT
- Green Oaks IL 60048 | Fax: (847) 918-1023 | http://www.oma.com
-
-