home *** CD-ROM | disk | FTP | other *** search
- Path: herold.franken.de!jhd
- Date: 14 Mar 1996 21:23:00 +0100
- From: jhd@herold.franken.de (Joachim Durchholz)
- Newsgroups: comp.lang.eiffel,comp.lang.c,comp.lang.c++,comp.object,comp.software-eng
- Message-ID: <64ss5$3F3RB@herold.franken.de>
- References: <1995Jul3.034108.4193@rcmcon.com>
- <3taaha$p8j@ixnews3.ix.netcom.com> <3tap9h$qp3@saba.info.ucla.edu>
- <RMARTIN.96Mar13110714@rcm.oma.com> <4i862r$1evq@saba.info.ucla.edu>
- Subject: Re: Beware of "C" Hackers -- A rebuttal to Bertrand Meyer
- X-Newsreader: CrossPoint v3.1
-
- jmartin@cs.ucla.edu wrote 14.03.96 on Re: Beware of "C" Hackers -- A rebuttal to Bertrand Meyer:
-
- > No "hacking" is broader than that, it is writing poor code period. It
- > is writing low level or obscure code when it is unnecessary because
- > you think that its great.
-
- Your definition of hacking is much too narrow.
-
- Hacking is programming in an elegant way.
-
- Stuffing as much logic as possible into a single line of C is one possible
- variant elegance. Such elegance doesn't have any relevance to Software
- Engineering, of course. It is more related to crossword puzzles, Mensa
- riddles, the Obfuscated C Contest and all other sort of intellectual
- challenges. It has no useful purpose beyond itself, and should not be
- taken seriously for serious work. (It would be ridiculous to take this
- type of fun stuff seriously!)
-
- But don't confuse these intellectual games with the Real World.
-
- Yes, there are hackers that just cannot write clear code. But these
- hackers won't be too famous; either they will do many programs - then
- their reputation will soon break down because their programs don't work;
- or they will spend their time maintaining and adapting their single badly
- designed program, which doesn't allow them to gain much recognition.
-
-
- There is one trait among many hackers that will make method gurus uneasy -
- they don't like to be restricted.
- This makes C popular among hackers - it gives many benefits of discipline
- (many opportunities for the compiler to do type checking), but allows
- evading the restrictions whenever necessary (type casts).
-
- But don't make the mistake that hackers want to have absolute freedom. If
- they wanted that, they'd program in assembler.
- Oops, I forgot machine code. They'd use machine code and make use of the
- instruction encoding for the program's constants.
- And now look how many hackers actually do that. I think there are a few
- that do, but I don't know any of them personally, and I have never seen
- such code, so this type must be extremely rare.
-
- Why? Because hackers would trade freedom for programming efficiency any
- day.
-
- Remember the argument that subroutine calls slow down programs.
- Subroutines have won because they made programming much easier and faster.
-
- The same will hold for OO programming. If OO programming makes hackers
- program faster and better, they will use it. If it doesn't, they won't use
- it (and frankly, I think OO would deserve it - not that I think this will
- happen).
-
-
- I haven't said a word of design phase vs. programming phase. And my
- impression is indeed that a hacker doesn't want to waste time on design
- when he could use to build working programs. But that is more a question
- of the point of view; the hackers that build large systems do design in an
- informal way, and they usually don't document it. Nevertheless all larger
- programs done by hackers have a design.
- And on the design side, I have seen hours spent on design meetings, put
- the results into specifications - only to discover two weeks later that
- the specifications were utter sh*t. Such incidents don't exactly encourage
- hackers to spend time on design.
-
-
-
- -Joachim
-
- --
- Im speaking for myself here.
- ## CrossPoint v3.1 ##
-