home *** CD-ROM | disk | FTP | other *** search
- Path: access1.digex.net!not-for-mail
- From: ell@access1.digex.net (Ell)
- Newsgroups: comp.lang.c++,comp.lang.eiffel,comp.lang.c,comp.object,comp.software-eng
- Subject: Re: Beware of "C" Hackers -- A rebuttal to Bertrand Meyer
- Followup-To: comp.lang.c++,comp.lang.eiffel,comp.lang.c,comp.object,comp.software-eng
- Date: 18 Mar 1996 01:11:22 GMT
- Organization: The Universe
- Message-ID: <4iid7r$50m@news4.digex.net>
- References: <1995Jul3.034108.4193@rcmcon.com> <4i682p$40go@info4.rus.uni-stuttgart.de> <1996Mar13.172859.88220@ucl.ac.uk> <4i9toj$suk@news.xs4all.nl> <4icbo4INN7fb@gambier.ugrad.cs.ubc.ca> <4ieue9$ldb@news4.digex.net> <4ihia0$qh0@newsie.dmc.com>
- NNTP-Posting-Host: access1.digex.net
- X-Newsreader: TIN [UNIX 1.3 950824BETA PL0]
-
- gregg jennings (prozac@cape.com) wrote:
- : In article <4ieue9$ldb@news4.digex.net>, ell@access4.digex.net┌ says...
- : >While agree with Meyer on this point, it's important to note that not all
- : >C programmers are bad hackers. Due to the low level aspects of C it is
- : >going to attract those who place project implementation above its logical
- : >side, those whom worship the computer, etc. But it also attracts
- : >programmers who practice good and even greaat analysis, design and
- : >implementation.
-
- :...
- : The "Hacker ethic" is as old as technology itself although the
- : word is a modern one. The hacker in computer terms derived,
- : I think, from the early days a MIT. Read the book "Hackers"
- : by Steven Levy, 1984. Later references to hackers and hacking
- : have changed the meaning. Bruce Sterling says in his book
- : "The Hacker Crackdown" (1992); "This book ... has little to
- : say about `hacking' in it's finer, original sense."
-
- Right, there are good and bad hackers. like most other designations.
-
- :...
- : Here are some great "hackers" of history:
- :
- : Leonardo da Vinci
- : Benjamin Franklin
- : Thomas Edison
- : Nikola Tesla
- : Alan Turing
- :
- : There are thousands more.
- :
- : Here's an example (based on the book "Appointment on the Moon"
- : by Richard S. Lewis):
- :...
- : It was again successful and launched a satellite. The telemetry
- : was late in coming in. When Von Braun was given the news when it
- : did come in, he looked at his watch, and said in a flat voice,
- : "She is eight minutes late. Interesting." Hacker mentality to the
- : end.
-
- Trying things out, searching for new things and getting to the
- nitty-gritty are necessary and honorable things. But I'm sure that many
- of the above followed plans, and feedback to changed plans on many
- projects. There is a proper time and place for most things. When the
- only basis of a project is mainly try this, try that without a plan, what
- is good about hacking becomes a fetter. At times we can only proceed by
- trying out this or that, but in a large or complex project, even that
- should be done in the context of a plan.
-
- Elliott
-