Differences between revisions 10 and 11
Revision 10 as of 2008-03-25 14:14:26
Size: 1839
Editor: 85
Comment:
Revision 11 as of 2008-12-28 20:15:41
Size: 1840
Editor: localhost
Comment: converted to 1.6 markup
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
Complexity is evil. It leads to slow systems, convoluted processes, and buggy implementations. Yet today it is [:TrafficAudit: everywhere]. Complexity is evil. It leads to slow systems, convoluted processes, and buggy implementations. Yet today it is [[TrafficAudit| everywhere]].
Line 36: Line 36:
[[LinkedIn]] <<LinkedIn>>

Complexity

Complexity is evil. It leads to slow systems, convoluted processes, and buggy implementations. Yet today it is ?everywhere.

Snippets

Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it.

-Brian Kernighan

Dealing with complexity is an inefficient and unnecessary waste of time, attention and mental energy. There is never any justification for things being complex when they could be simple.

-Edward de Bono


Increasingly, people seem to misinterpret complexity as sophistication, which is baffling - the incomprehensible should cause suspicion rather than admiration. Possibly this trend results from a mistaken belief that using a somewhat mysterious device confers an aura of power on the user

-Niklaus Wirth


The belief that complex systems require armies of designers and programmers is wrong. A system that is not understood in its entirety, or at least to a significant degree of detail by a single individual, should probably not be built.

-Niklaus Wirth


Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.

-Antoine de Saint-Exupery (1900 - 1944)

Information Security Turned Against it's Creators

In essence, the complexities of the security solutions have provided greater opportunity for attackers to target the consumer - therefore bypassing the actual protection technologies. ... Perhaps the industry needs to spend some time thinking about the ergonomics of consumer security before adding yet another defense-in-depth barrier?

http://blogs.iss.net/archive/SecurityErgonomics.html


Linked in pages: Jani Kenttälä