-*- mode: outline; coding: utf-8 -*-* General discussion.See http://en.wikipedia.org/wiki/List_of_software_development_philosophies http://en.wikipedia.org/wiki/List_of_eponymous_laws* Principle of good enough (POGE).It favours quick-and-simple (but potentially extensible) designs overelaborate systems designed by committees.Once the quick-and-simple design is deployed, it can then evolve as needed,driven by user requirements.This kind of design is not appropriate in systems where it is not possible toevolve the system over time, or where the full functionality is required fromthe start.See http://en.wikipedia.org/wiki/Principle_of_good_enough* No Silver Bullet.There is no single development, in either technology or management technique,which by itself promises even one order of magnitude improvement within adecade in productivity, in reliability, in simplicity.See http://en.wikipedia.org/wiki/No_Silver_Bullet* Rule of thumb.A rule of thumb is a principle that postulate in some case use simpleprocedure wich produce approximate result instead use complex but exactproduce.See http://en.wikipedia.org/wiki/Rule_of_thumb* The Zero One or Infinity.The Zero One or Infinity (ZOI) rule is a rule of thumb in software design. Itsuggests that arbitrary limits on the number of instances of a particularentity should not be allowed. Specifically, that an entity should either beforbidden entirely, one should be allowed, or any number (presumably, to thelimit of available storage) of them should be allowed. It should not be thesoftware that puts a hard limit on the number of instances of the entity. http://en.wikipedia.org/wiki/Zero_One_Infinity* 80-20 rule (pareto principle).This rule postulate that roughly 80% of the effects come from 20% of thecauses.This rule applied to optimisation (most time spent by program only by littlepiece of code), functionality (80% of users use only 20% of programfunctionality); bugs (fixing the top 20% of most reported bugs solve 80% ofthe error and crashes).See http://en.wikipedia.org/wiki/80:20_rule* 1% rule.The 1% rule states that the number of people who create content on theinternet represents approximately 1% (or less) of the people actually viewingthat content.See http://en.wikipedia.org/wiki/1%25_rule_%28Internet_culture%29* Parkinson's Law.Work expands so as to fill the time available for its completion.Data expands to fill the space available for storage.See http://en.wikipedia.org/wiki/Parkinson%27s_law* Ninety-ninety rule.The first 90% of the code accounts for the first 10% of the development time.The remaining 10% of the code accounts for the other 90% of the developmenttime.See http://en.wikipedia.org/wiki/Ninety-ninety_rule* Wirth's law.Software is getting slower more rapidly than hardware becomes faster.See http://en.wikipedia.org/wiki/Wirth%27s_law* Student syndrome.Student syndrome refers to the phenomenon that many people will start to fullyapply themselves to a task just at the last possible moment before a deadline.The student syndrome is a form of procrastination ().See http://en.wikipedia.org/wiki/Student_syndrome* Conway's Law....organizations which design systems ... are constrained to produce designswhich are copies of the communication structures of these organizations.Example: Consider a two-person team of software engineers, A and B. Say Adesigns and codes a software class X. Later, the team discovers that class Xneeds some new features. If A adds the features, A is likely to simply expandX to include the new features. If B adds the new features, B may be afraid ofbreaking X, and so instead will create a new derived class X2 that inheritsX's features, and puts the new features in X2. So the final design is areflection of who implemented the functionality.A real life example: NASA's Mars Climate Orbiter crashed because one team usedUnited States customary units (e.g., inches, feet and pounds) while the otherused metric units for a key spacecraft operation.See http://en.wikipedia.org/wiki/Conway%27s_Law* Brooks's law.It takes some time for the people added to a project to become productive.Communication overheads increase as the number of people increases.Adding manpower to a late software project makes it later.See http://en.wikipedia.org/wiki/Brooks%27_law* Code bloat.Code bloat is the production of code that is perceived as unnecessarily long,slow, or otherwise wasteful of resources. Code bloat generally refers tosource code size but sometimes is used to refer to the generated code size oreven the binary file size. http://en.wikipedia.org/wiki/Code_bloat* Beerware.Beerware is term for software released under a very relaxed license. Itprovides the end user with the right to use a particular program.Should the user of the product meet the author and consider the softwareuseful, he is encouraged to buy the author a beer 'in return' (or, in somevariations, drink a beer in the author's honor)./* ---------------------------------------------------------------------------- * "THE BEER-WARE LICENSE" (Revision 42): * <phk@FreeBSD.ORG> wrote this file. As long as you retain this notice you * can do whatever you want with this stuff. If we meet some day, and you think * this stuff is worth it, you can buy me a beer in return Poul-Henning Kamp * ---------------------------------------------------------------------------- */ http://en.wikipedia.org/wiki/Beerware* Demoware.Demoware (also known as trialware) is commercial software released for free(shareware) in a version which is limited in one or more ways. http://en.wikipedia.org/wiki/Demoware* Crippleware.Crippleware is any product whose functions have been limited (or "crippled")with the sole purpose of encouraging or requiring the user to pay for thosefunctions (either by paying a one-time fee or an on-going subscription fee).Crippleware is also a term used to describe software that makes use of DigitalRights Management. http://en.wikipedia.org/wiki/Crippleware* Nagware.Nagware (also known as begware, annoyware or a nagscreen) is a type ofshareware that reminds (or nags) the user to register it by paying a fee. Itusually does this by popping up a message when the user starts the program, orintermittently while the user is using the application. These messages canappear as windows obscuring part of the screen or message boxes that canquickly be closed. Some nagware keeps the message up for a certain timeperiod, forcing the user to wait to continue to use the program. http://en.wikipedia.org/wiki/Nagware* Registerware.Registerware refers to computer software which requires the user to givepersonal information, e.g an email address, through registration in order todownload or use the program. http://en.wikipedia.org/wiki/Registerware* Scareware.Scareware comprises several classes of scam software, often with limited or nobenefit, sold to consumers via certain unethical marketing practices. http://en.wikipedia.org/wiki/Scareware* Donationware.Donationware is a licensing model that supplies fully operational software tothe user and pleads for an optional donation be paid to the programmer or athird-party beneficiary (usually a non-profit). The amount of the donation mayalso be stipulated by the author, or it may be left to the discretion of theuser, based on individual perceptions of the software's value. Sincedonationware comes fully operational (i.e. not crippleware) and payment isoptional, it is a type of freeware. http://en.wikipedia.org/wiki/Donationware* Freeware.Freeware is computer software that is available for use at no cost or for anoptional fee. http://en.wikipedia.org/wiki/Freeware* Shareware.Shareware is proprietary software that is provided to users without payment ona trial basis and is often limited by any combination of functionality,availability or convenience. Shareware is often offered as a download from anInternet website or as a compact disc included with a magazine.The rationale behind shareware is to give buyers the opportunity to use theprogram and judge its usefulness before purchasing a license for the fullversion of the software.The words "free trial" or "trial version" are indicative of shareware. http://en.wikipedia.org/wiki/Shareware* Software bloat.Software bloat is a term used to describe the tendency of newer computerprograms to have a larger installation footprint, or have many unnecessaryfeatures that are not used by end users, or just generally use more systemresources than necessary, while offering little or no benefit to its users.Comparison of Microsoft Windows minimum hardware requirements (for 32-bitversions):Windows version Processor Memory Hard diskWindows 95[4] 25 MHz 4 MB ~50 MBWindows 98[5] 66 MHz 16 MB ~200 MBWindows 2000[6] 133 MHz 32 MB 650 MBWindows XP[7] 233 MHz 64 MB 1.5 GBWindows Vista[8] 800 MHz 512 MB 15 GBWindows 7[9] 1 GHz 1 GB 16 GBEvery program attempts to expand until it can read mail. Those programs whichcannot so expand are replaced by ones which can. -- Jamie Zawinski** Foistware.Foistware, Bloatware, or Bundler is software bundled with completely unrelatedprograms. That means that there is no particular property in the software thatmakes it foistware, but rather the context in which it was installed. http://en.wikipedia.org/wiki/Foistware** Bloatware.Software bloat is a term used to describe the tendency of newer computerprograms to have a larger installation footprint, or have many unnecessaryfeatures that are not used by end users, or just generally use more systemresources than necessary, while offering little or no benefit to its users.Bloatware, or foistware, is also used to describe software that comespre-installed on a computer when it's bought, mostly consisting oftime-limited trials or feature-lacking basic or "beginner" versions. http://en.wikipedia.org/wiki/Bloatware** Shovelware.Shovelware is sometimes used to denote foistware which was chosen to fill upthe remaining space on a freely distributed CD-ROM. http://en.wikipedia.org/wiki/Shovelware* Second-system effect.In computing, the second-system effect or sometimes the second-system syndromerefers to the tendency, when following on from a relatively small, elegant,and successful system, to design the successor as an elephantine,feature-laden monstrosity. The term was first used by Fred Brooks in hisclassic The Mythical Man-Month.[1] It described the jump from a set of simpleoperating systems on the IBM 700/7000 series to OS/360 on the 360 series.* Inner-platform effect.The inner-platform effect is the tendency of software architects to create asystem so customizable as to become a replica, and often a poor replica, ofthe software development platform they are using.XXX read more http://thedailywtf.com/Articles/The_Inner-Platform_Effect.aspx http://en.wikipedia.org/wiki/Inner-platform_effect* Feature creep.Feature creep is the proliferation of features in a product such as computersoftware. Extra features go beyond the basic function of the product and socan result in baroque over-complication, or "featuritis", rather than simple,elegant design. http://en.wikipedia.org/wiki/Feature_creep* Bullet-point engineering.Bullet-point engineering is a software design anti-pattern where developersuse the features of competing software packages as checklists of features toimplement in their own product. These features are often implemented poorlyand haphazardly, without any real design, merely so they can be added to abulleted list of features in marketing material. Bullet point engineeringoften leads to feature creep and software bloat but may also simply result ina poorly designed imitative product. http://en.wikipedia.org/wiki/Bullet-point_engineering* KISSKeep it simple and stupid, or keep it simple, stupid!Instruction creep and function creep, two instances of creeping featuritis,are examples of failure to follow the KISS principle in software development. http://en.wikipedia.org/wiki/KISS_principle* Minimalism.In computing, minimalism refers to the application of minimalist philosophiesand principles in hardware and software design and usage. http://en.wikipedia.org/wiki/Minimalism_%28computing%29* Unix philosophy.** From Doug McIlroy."Do one thing and do it well.""Write programs that do one thing and do it well. Write programs to worktogether. Write programs to handle text streams, because that is a universalinterface."** From Pike: Notes on Programming in C. 1. You cannot tell where a program is going to spend its time. Bottlenecksoccur in surprising places, so do not try to second guess and put in a speedhack until you've proven that's where the bottleneck is. 2. Measure. Do not tune for speed until your performance analysis tool tellsyou which part of the code overwhelms the rest. 3. Fancy algorithms tend to run more slowly on small data sets than simplealgorithms. They tend to have a large constant factor in O(n) analysis, and nis usually small. So don't get fancy unless Rule 2 indicates that n is bigenough. 4. Simplify your algorithms and data structures wherever it makes sensebecause fancy algorithms are more difficult to implement without defects. Thedata structures in most programs can be built from array lists, linked lists,hash tables, and binary trees. 5. Data dominates. If you have chosen the right data structures and organizedthings well, the algorithms will almost always be self-evident. Datastructures, not algorithms, are central to programming.** From Mike Gancarz: The UNIX Philosophy. 1. Small is beautiful. 2. Make each program do one thing well. 3. Build a prototype as soon as possible. 4. Choose portability over efficiency. 5. Store data in flat text files. 6. Use software leverage to your advantage. 7. Use shell scripts to increase leverage and portability. 8. Avoid captive user interfaces. 9. Make every program a filter.With this not all agree: 1. Allow the user to tailor the environment. 2. Make operating system kernels small and lightweight. 3. Use lowercase and keep it short. 4. Save trees. 5. Silence is golden. 6. Think parallel. 7. The sum of the parts is greater than the whole. 8. Look for the 90-percent solution. 9. Worse is better. 10. Think hierarchically.** Misc."Unix is simple. It just takes a genius to understand its simplicity." -– Dennis Ritchie"Unix never says 'please'." -– Rob Pike http://en.wikipedia.org/wiki/Unix_philosophy* Worse is better.In the "Worse is better" design style, simplicity of both the interface andthe implementation is more important than any other attribute of the system —including correctness, consistency and completeness.Simplicity The design must be simple, both in implementation and interface. It is more important for the implementation to be simpler than the interface. Simplicity is the most important consideration in a design.Correctness The design must be correct in all observable aspects. It is slightly better to be simple than correct.Consistency The design must not be overly inconsistent. Consistency can be sacrificed for simplicity in some cases, but it is better to drop those parts of the design that deal with less common circumstances than to introduce either implementational complexity or inconsistency.Completeness The design must cover as many important situations as is practical. All reasonably expected cases should be covered. Completeness can be sacrificed in favor of any other quality. In fact, completeness must be sacrificed whenever implementation simplicity is jeopardized. Consistency can be sacrificed to achieve completeness if simplicity is retained; especially worthless is consistency of interface. http://dreamsongs.com/WIB.html Lisp: Good News, Bad News, How to Win Big* The right thing.The MIT approach (known as "The right thing"):Simplicity The design must be simple, both in implementation and interface. It is more important for the interface to be simpler than the implementation.Correctness The design must be correct in all observable aspects. Incorrectness is simply not allowed.Consistency The design must be consistent. A design is allowed to be slightly less simple and less complete to avoid inconsistency. Consistency is as important as correctness.Completeness The design must cover as many important situations as is practical. All reasonably expected cases must be covered. Simplicity is not allowed to overly reduce completeness. http://dreamsongs.com/WIB.html Lisp: Good News, Bad News, How to Win Big* YAGNI."You aren't gonna need it" (or YAGNI for short) is the principle in extremeprogramming that programmers should not add functionality until it isnecessary. http://en.wikipedia.org/wiki/You_ain%27t_gonna_need_it* DRY (DIE).Don't Repeat Yourself (DRY) or Duplication is Evil (DIE). * VCS allow multiple and diverging copies ("branches"). * Source code generation. http://en.wikipedia.org/wiki/Don%27t_repeat_yourself* Do it yourself (DIY).Do it yourself (or DIY) is a term used to describe building, modifying, orrepairing of something without the aid of experts or professionals.when tasklist longer then people life mutch easy use already written librariesthen wrote own. http://en.wikipedia.org/wiki/Do_it_yourself* Once and Only Once (OAOO).* MoSCoW Method.The capital letters in MoSCoW stand for: * M - MUST have this (included in the current delivery timebox in order for it to be a success). * S - SHOULD have this if at all possible (critical to the success of the project, but are not necessary for delivery in the current delivery timebox). * C - COULD have this if it does not affect anything else (nice to have). * W - WON'T have this time but WOULD like in the future. http://en.wikipedia.org/wiki/MoSCoW_Method* Abandonware.Abandonware is a term used to describe computer software that is no longersold or supported, or whose copyright ownership may be unclear for variousreasons. While the term has been applied largely to older games, utilitysoftware, etc. http://en.wikipedia.org/wiki/Abandonware* Separation of concerns.In computer science, separation of concerns (SoC) is the process of separatinga computer program into distinct features that overlap in functionality aslittle as possible. A concern is any piece of interest or focus in a program.Typically, concerns are synonymous with features or behaviors. Progresstowards SoC is traditionally achieved through modularity of programming andencapsulation (or "transparency" of operation), with the help of informationhiding. Layered designs in information systems are also often based onseparation of concerns (e.g., presentation layer, business logic layer, dataaccess layer, database layer).HyperText Markup Language (HTML) and cascading style sheets (CSS) arelanguages intended to separate style from content. http://en.wikipedia.org/wiki/Separation_of_concerns* Modular design.In systems engineering, modular design — or "modularity in design" — is anapproach that subdivides a system into smaller parts (modules) that can beindependently created and then used in different systems to drive multiplefunctionalities. http://en.wikipedia.org/wiki/Modular_design* Occam's razor."entia non sunt multiplicanda praeter necessitatem"Entities must not be multiplied beyond necessity.* Code and fix.Programmers immediately begin producing code. Bugs must be fixed before theproduct can be shipped. http://en.wikipedia.org/wiki/Code_and_fix* Cowboy coding.Cowboy coding is a term used to describe software development where thedevelopers have autonomy over the development process. This includes controlof the project's schedule, algorithms, tools, and coding style.A cowboy coder can be a lone developer or part of a group of developers witheither no external management or management that controls only non-developmentaspects of the project, such as its nature, scope, and feature set (the"what", but not the "how"). http://en.wikipedia.org/wiki/Cowboy_coding* Extreme Programming. http://en.wikipedia.org/wiki/Extreme_Programming* Hollywood Principle.In computer programming, the Hollywood Principle is stated as "don't call us,we'll call you." It has applications in software engineering; see alsoimplicit invocation for a related architectural principle. http://en.wikipedia.org/wiki/Hollywood_Principle* Inversion of control.Inversion of control, or IoC, is an abstract principle describing an aspect ofsome software architecture designs in which the flow of control of a system isinverted in comparison to procedural programming. http://en.wikipedia.org/wiki/Inversion_of_control* Literate programming. http://en.wikipedia.org/wiki/Literate_Programming* Model-driven architecture. http://en.wikipedia.org/wiki/Model-driven_architecture* Quick-and-dirty.Quick-and-dirty is a term used in reference to anything that is an easy way toimplement a workaround or "kludge." Its usage is popular among programmers,who use it to describe a crude solution or programming implementation that isimperfect, inelegant, or otherwise inadequate, but which solves or masks theproblem at hand, and is generally faster and easier to put in place than aproper solution. http://en.wikipedia.org/wiki/Quick-and-dirty* Release early, release often.Release early, release often (sometimes abbreviated RERO) is a softwaredevelopment philosophy that emphasizes the importance of early and frequentreleases in creating a tight feedback loop between developers and testers orusers. http://en.wikipedia.org/wiki/Release_early,_release_often* Test-driven development.Test-driven development (TDD) is a software development technique that relieson the repetition of a very short development cycle: First the developerwrites a failing automated test case that defines a desired improvement or newfunction, then produces code to pass that test and finally refactors the newcode to acceptable standards. http://en.wikipedia.org/wiki/Test-driven_development* Unified Process.The Unified Software Development Process or Unified Process is a populariterative and incremental software development process framework. Thebest-known and extensively documented refinement of the Unified Process is theRational Unified Process (RUP). http://en.wikipedia.org/wiki/Unified_Process* Waterfall model. 1. Requirements specification 2. Design 3. Construction (AKA implementation or coding) 4. Integration 5. Testing and debugging (AKA Validation) 6. Installation 7. Maintenance http://en.wikipedia.org/wiki/Waterfall_model* Do it yourself.