Laws, Theories, Principles and Patterns that developers will find useful. There are lots of laws which people discuss when talking about development. This repository is a reference and overview of some of the most common ones. Principles and laws to follow such as: If a program is made up of two parts, part A, which must be executed by a single processor, and part B, which can be parallelised, then we see that adding multiple processors to the system executing the program can only have a limited benefit. It can potentially greatly improve the speed of part B - but the speed of part A will remain unchanged. Also, theories like The Broken Windows Theory, which suggests that visible signs of crime (or lack of care of an environment) lead to further and more serious crimes (or further deterioration of the environment). Conway's Law suggests that the technical boundaries of a system will reflect the structure of the organisation. These among others, are featured in this project.

Features

  • Laws, theories, principles and patterns for developers and hackers
  • The project is available as a PDF eBook
  • A new version of the eBook is created automatically when a new version tag is pushed
  • Reference and overview of some of the most common principles
  • Explanation of some laws, principles and patterns, but does not advocate for any of them
  • Hacker Laws is available in a number of languages

Project Samples

Project Activity

See All Activity >

Categories

Libraries, Research

License

Creative Commons Attribution License

Follow Hacker Laws

Hacker Laws Web Site

Other Useful Business Software
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Hacker Laws!

Additional Project Details

Operating Systems

Linux, Windows

Programming Language

Unix Shell

Related Categories

Unix Shell Libraries, Unix Shell Research Software

Registered

2021-03-11