mirror of
https://github.com/dwmkerr/hacker-laws.git
synced 2025-12-18 13:14:55 +01:00
chore: add link to joel's profile
This commit is contained in:
@@ -249,7 +249,7 @@ One interesting element to this law is the suggestion that even by simplifying t
|
|||||||
|
|
||||||
> All non-trivial abstractions, to some degree, are leaky.
|
> All non-trivial abstractions, to some degree, are leaky.
|
||||||
>
|
>
|
||||||
> (Joel Spolsky)
|
> [(Joel Spolsky)](https://twitter.com/spolsky)
|
||||||
|
|
||||||
This law states that abstractions, which are generally used in computing to simplify working with complicated systems, will in certain situations 'leak' elements of the underlying system, this making the abstraction behave in an unexpected way.
|
This law states that abstractions, which are generally used in computing to simplify working with complicated systems, will in certain situations 'leak' elements of the underlying system, this making the abstraction behave in an unexpected way.
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user