We have hosted the application hacker laws in order to run this application in our online workstations with Wine or directly.
Quick description about hacker laws:
Laws, Theories, Principles and Patterns that developers will find useful. There are lots of laws which people discuss when talking about development. This repository is a reference and overview of some of the most common ones. Principles and laws to follow such as: If a program is made up of two parts, part A, which must be executed by a single processor, and part B, which can be parallelised, then we see that adding multiple processors to the system executing the program can only have a limited benefit. It can potentially greatly improve the speed of part B - but the speed of part A will remain unchanged. Also, theories like The Broken Windows Theory, which suggests that visible signs of crime (or lack of care of an environment) lead to further and more serious crimes (or further deterioration of the environment). Conway's Law suggests that the technical boundaries of a system will reflect the structure of the organisation. These among others, are featured in this project.Features:
- Laws, theories, principles and patterns for developers and hackers
- The project is available as a PDF eBook
- A new version of the eBook is created automatically when a new version tag is pushed
- Reference and overview of some of the most common principles
- Explanation of some laws, principles and patterns, but does not advocate for any of them
- Hacker Laws is available in a number of languages
Programming Language: Unix Shell.
Categories:
©2024. Winfy. All Rights Reserved.
By OD Group OU – Registry code: 1609791 -VAT number: EE102345621.