What Is This?

This is an HTML+RDFa representation of metadata describing this Web-addressable resource.

Why Is This Important?

The property (attributes and values pairs) links on this page unveil a different kind of link, one which enables the following on HTTP networks such as the Web:

  1. Unambiguous identity for entities (aka. strong identifiers)
  2. Implicit binding of an entity and its metadata via strong identifiers
  3. Multiple metadata representations that enable a variety of presentations
  4. High precision Search and Find queries that simply use the metadata documents (by referencing entity URIs) as the query's Data Source Name

How Do I Discover Alternative Metadata Representations?

This document exposes metadata in the following formats: (X)HTML+RDFa, Turtle, N3, RDF/JSON, or RDF/XML. In the most basic form, you can simply view the (X)HTML source markup of this page, and go directly to the <head/> section which contains a <link/> tag with relationship and type properties for each format.

In addition, you can also explicitly request a desired metadata representation for a given resource via HTTP GET requests that use the entity's strong identifier as the call target.

How Can I Expose My Web Resources In This Manner?

Simply include the following in the <head/> section of your (static or dynamically generated) (X)HTML page:

<link rel="alternate" title="My Data in RDF Linked Data form"
type="application/rdf+xml"
href="http://linkeddata.uriburner.com/about/id/<this-page-URL>/>"

How Is This Related To The Linked Data Meme?

As stated above, the links in this page expose strong identifiers for its primary topic, secondary topics, attributes, and some values. These links, via implicit association, act as conduits to their metadata-bearing documents, in a variety formats.

[OpenLink Software]

About: GitHub - dwmkerr/hacker-laws: 🧠 Laws, Theories, Principles and Patterns for developers and technologists.

An Entity of Type : Document, from Data Source : https://github.com/dwmkerr/hacker-laws, within Data Space : dev.restore.ovi.cnr.it:8890

  • References
  • Referenced By
content

Description
  • 🧠 Laws, Theories, Principles and Patterns for developers and technologists. - dwmkerr/hacker-laws
Title
  • GitHub - dwmkerr/hacker-laws: 🧠 Laws, Theories, Principles and Patterns for developers and technologists.
container of
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fa9741a1978
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fa974012a78
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f74f4b1c218
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f74f4b5acf8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f9f405940c8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f9f404b33e8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f46706c4c08
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f467025ec48
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f46703811a8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f46706994a8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f64480efc28
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f6448111b98
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f26046c9f68
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f26042e56e8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f0e1c219cc8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f0e1c8805d8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fa9c86d5d68
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fa9c86b7298
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fa9c9aa21d8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fa9c93350f8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f1ec4cee9f8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f1ec4cf72f8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f6b28348ce8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f6b2830d238
  • http://dev.restore.ovi.cnr.it:8890/abo....com/dwmkerr/hacker-laws#id0x3de79058
  • http://dev.restore.ovi.cnr.it:8890/abo....com/dwmkerr/hacker-laws#id0x39da4a78
  • http://dev.restore.ovi.cnr.it:8890/abo....com/dwmkerr/hacker-laws#id0x41331748
  • http://dev.restore.ovi.cnr.it:8890/abo....com/dwmkerr/hacker-laws#id0x3cf9a558
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f37783f1cb8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f37781d8f28
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f2600d22008
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f2600930a58
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f0e11b97698
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f0e11b04e88
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fe7784f07a8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7fe7784bd5c8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f6ded20f7d8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f6ded204f58
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f66901e3698
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f669025ad28
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f5f244e37a8
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f5f242e3b38
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f645079ee98
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f645030c338
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f8584520e78
  • http://dev.restore.ovi.cnr.it:8890/abo.../dwmkerr/hacker-laws#id0x7f858479f4b8
links to
  • https://en.wikipedia.org/wiki/Hanlon%27s_razor
  • https://en.wikipedia.org/wiki/Sun_Microsystems
  • https://github.com/topics/coding
  • https://en.wikipedia.org/wiki/Ninety%E2%80%93ninety_rule
  • https://en.wikipedia.org/wiki/Hofstadter%27s_law
  • https://en.wikipedia.org/wiki/Brooks%27s_law
  • https://en.wikipedia.org/wiki/James_Gosling
  • https://en.wikipedia.org/wiki/Peter_principle
  • https://en.wikipedia.org/wiki/Robustness_principle
  • https://en.wikipedia.org/wiki/Open%E2%80%93closed_principle
  • https://en.wikipedia.org/wiki/Liskov_substitution_principle
  • https://en.wikipedia.org/wiki/Interface_segregation_principle
  • https://en.wikipedia.org/wiki/Dependency_inversion_principle
  • https://en.wikipedia.org/wiki/Don%27t_repeat_yourself
  • https://en.wikipedia.org/wiki/KISS_principle
  • http://www.incompleteideas.net/IncIdeas/BitterLesson.html
  • https://en.wikipedia.org/wiki/The_Cathedral_and_the_Bazaar
  • https://en.wikipedia.org/wiki/G._K._Chesterton
  • https://twitter.com/spolsky
  • https://en.wikipedia.org/wiki/Quantum_tunnelling
  • https://en.wikipedia.org/wiki/Brian_Kernighan
  • https://en.wikipedia.org/wiki/Unix_philosophy
  • https://en.wikipedia.org/wiki/Functional_programming
  • https://en.wikipedia.org/wiki/Linus%27s_law
  • https://github.com/resources/whitepapers
  • https://en.wikipedia.org/wiki/Pareto_principle
  • https://en.wikipedia.org/wiki/Koomey%27s_law
  • https://en.wikipedia.org/wiki/Wikipedia:Chesterton%27s_fence
  • https://en.wikipedia.org/wiki/Performance_indicator
  • https://en.wikipedia.org/wiki/Dunbar%27s_number
  • https://en.wikipedia.org/wiki/Single_responsibility_principle
  • https://en.wikipedia.org/wiki/Dunning%E2%80%93Kruger_effect
  • https://en.wikipedia.org/wiki/Bill_Joy
  • https://en.wikipedia.org/wiki/Linus_Torvalds
  • https://en.wikipedia.org/wiki/The_Elements_of_Programming_Style
  • https://github.com/security/advanced-security
  • https://en.wikipedia.org/wiki/Moore%27s_law
  • https://en.wikipedia.org/wiki/Social_loafing
  • https://en.wikipedia.org/wiki/Illusory_superiority
  • https://en.wikipedia.org/wiki/L._Peter_Deutsch
  • https://en.wikipedia.org/wiki/John_Gall_(author)
  • https://github.com/topics/principles
  • https://github.com/
  • https://github.com/features/copilot
  • https://github.com/features/actions
  • https://github.com/features/codespaces
  • https://github.com/features/issues
  • https://github.com/features/code-review
  • https://github.com/features/discussions
  • https://github.com/features/code-search
  • https://github.com/features
  • https://docs.github.com
  • https://skills.github.com
  • https://github.blog
  • https://github.com/enterprise
  • https://github.com/team
  • https://github.com/enterprise/startups
  • https://github.com/solutions/industry/nonprofits
  • https://github.com/solutions/use-case/devsecops
  • https://github.com/solutions/use-case/devops
  • https://github.com/solutions/use-case/ci-cd
  • https://github.com/solutions/use-case
  • https://github.com/solutions/industry/healthcare
  • https://github.com/solutions/industry/financial-services
  • https://github.com/solutions/industry/manufacturing
  • https://github.com/solutions/industry/government
  • https://github.com/solutions/industry
  • https://github.com/solutions
  • https://github.com/resources/articles/ai
  • https://github.com/resources/articles/devops
  • https://github.com/resources/articles/security
  • https://github.com/resources/articles/software-development
  • https://github.com/resources/articles
  • https://resources.github.com/learn/pathways
  • https://resources.github.com
  • https://github.com/customer-stories
  • https://partner.github.com
  • https://github.com/solutions/executive-insights
  • https://github.com/sponsors
  • https://github.com/readme
  • https://github.com/topics
  • https://github.com/trending
  • https://github.com/collections
  • https://github.com/premium-support
  • https://github.com/pricing
  • https://docs.github.com/search-github/...derstanding-github-code-search-syntax
  • https://github.com
  • https://docs.github.com/site-policy/github-terms/github-terms-of-service
  • https://docs.github.com/site-policy/privacy-policies/github-privacy-statement
  • https://github.com/security
  • https://www.githubstatus.com/
  • https://docs.github.com/
  • https://support.github.com?tags=dotcom-footer
  • https://en.wikipedia.org/wiki/Amdahl%27s_law
  • https://en.wikipedia.org/wiki/Hype_cycle
  • https://en.wikipedia.org/wiki/Conway%27s_law
  • https://en.wikipedia.org/wiki/Principle_of_least_astonishment
  • https://github.com/why-github
  • https://en.wikipedia.org/wiki/Broken_windows_theory
  • https://en.wikipedia.org/wiki/No_Silver_Bullet
  • https://en.wikipedia.org/wiki/Law_of_triviality
  • https://xkcd.com/386/
  • https://en.wikipedia.org/wiki/1%25_rule_(Internet_culture)
  • https://github.com/apps/github-actions
  • https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle
  • https://en.wikipedia.org/wiki/Parkinson%27s_law
  • https://en.wikipedia.org/wiki/Hutber%27s_law
  • https://en.wikipedia.org/wiki/Murphy%27s_law
  • https://github.com/features/copilot/copilot-business
  • https://en.wikipedia.org/wiki/Dennard_scaling
  • https://en.wiktionary.org/wiki/yak_shaving
  • https://xkcd.com/1172/
  • https://en.wikipedia.org/wiki/The_Pragmatic_Programmer
  • https://en.wikipedia.org/wiki/Patrick_Hutber
  • https://en.wikipedia.org/wiki/Richard_S._Sutton
  • https://en.wikipedia.org/wiki/Edward_A._Murphy_Jr.
  • https://en.wikipedia.org/wiki/Law_of_the_instrument
  • https://en.wikipedia.org/wiki/Fallacies_of_distributed_computing
  • https://en.wikipedia.org/wiki/Law_of_Demeter
  • https://en.wikipedia.org/wiki/All_models_are_wrong
  • https://en.wikipedia.org/wiki/Fitts%27s_law
  • https://github.com/dwmkerr/hacker-laws#start-of-content
  • https://github.com/login?return_to=htt...%2Fgithub.com%2Fdwmkerr%2Fhacker-laws
  • https://github.com/signup?ref_cta=Sign...epo&source_repo=dwmkerr%2Fhacker-laws
  • http://hacker-laws.com/
  • https://github.com/dwmkerr/hacker-laws/blob/main/LICENSE
  • https://github.com/dwmkerr/hacker-laws/stargazers
  • https://github.com/dwmkerr/hacker-laws/forks
  • https://github.com/dwmkerr/hacker-laws/branches
  • https://github.com/dwmkerr/hacker-laws/tags
  • https://github.com/dwmkerr/hacker-laws/activity
  • https://github.com/dwmkerr/hacker-laws/actions
  • https://github.com/dwmkerr/hacker-laws/projects
  • https://github.com/dwmkerr/hacker-laws/security
  • https://github.com/dwmkerr/hacker-laws/pulse
  • https://github.com/dwmkerr/hacker-laws/commits/main/
  • https://github.com/dwmkerr/hacker-laws/tree/main/.github
  • https://github.com/dwmkerr/hacker-laws/tree/main/assets
  • https://github.com/dwmkerr/hacker-laws/tree/main/images
  • https://github.com/dwmkerr/hacker-laws/tree/main/scripts
  • https://github.com/dwmkerr/hacker-laws/tree/main/translations
  • https://github.com/dwmkerr/hacker-laws/blob/main/.gitignore
  • https://github.com/dwmkerr/hacker-laws/blob/main/README.md
  • https://github.com/dwmkerr/hacker-laws#
  • https://hacker-laws.com
  • https://github.com/dwmkerr/hacker-laws#hacker-laws
  • https://github.com/dwmkerr/hacker-laws...erns-for-developers-and-technologists
  • https://effective-shell.com
  • https://amzn.to/4ho0F91
  • https://github.com/dwmkerr/terminal-ai
  • https://github.com/sponsors/dwmkerr?frequency=one-time
  • https://changelog.com/podcast/403
  • https://github.com/dwmkerr/hacker-laws/releases/latest/download/hacker-laws.pdf
  • https://github.com/dwmkerr/hacker-laws#translations
  • https://github.com/dwmkerr/hacker-laws#introduction
  • https://github.com/dwmkerr/hacker-laws#laws
  • https://github.com/dwmkerr/hacker-laws#9091-principle-1-rule
  • https://github.com/dwmkerr/hacker-laws#9090-rule
  • https://github.com/dwmkerr/hacker-laws#amdahls-law
  • https://github.com/dwmkerr/hacker-laws#the-broken-windows-theory
  • https://github.com/dwmkerr/hacker-laws#brooks-law
  • https://github.com/dwmkerr/hacker-laws#cap-theorem-brewers-theorem
  • https://github.com/dwmkerr/hacker-laws#clarkes-three-laws
  • https://github.com/dwmkerr/hacker-laws#conways-law
  • https://github.com/dwmkerr/hacker-laws#cunninghams-law
  • https://github.com/dwmkerr/hacker-laws#dunbars-number
  • https://github.com/dwmkerr/hacker-laws#the-dunning-kruger-effect
  • https://github.com/dwmkerr/hacker-laws#fitts-law
  • https://github.com/dwmkerr/hacker-laws#galls-law
  • https://github.com/dwmkerr/hacker-laws#goodharts-law
  • https://github.com/dwmkerr/hacker-laws#hanlons-razor
  • https://github.com/dwmkerr/hacker-laws#hicks-law-hick-hyman-law
  • https://github.com/dwmkerr/hacker-laws#hofstadters-law
  • https://github.com/dwmkerr/hacker-laws#hutbers-law
  • https://github.com/dwmkerr/hacker-laws#the-hype-cycle--amaras-law
  • https://github.com/dwmkerr/hacker-laws#hyrums-law-the-law-of-implicit-interfaces
  • https://github.com/dwmkerr/hacker-laws#input-process-output-ipo
  • https://github.com/dwmkerr/hacker-laws#kernighans-law
  • https://github.com/dwmkerr/hacker-laws#koomeys-law
  • https://github.com/dwmkerr/hacker-laws#linuss-law
  • https://github.com/dwmkerr/hacker-laws#metcalfes-law
  • https://github.com/dwmkerr/hacker-laws#moores-law
  • https://github.com/dwmkerr/hacker-laws#murphys-law--sods-law
  • https://github.com/dwmkerr/hacker-laws#occams-razor
  • https://github.com/dwmkerr/hacker-laws#parkinsons-law
  • https://github.com/dwmkerr/hacker-laws#premature-optimization-effect
  • https://github.com/dwmkerr/hacker-laws#putts-law
  • https://github.com/dwmkerr/hacker-laws#reeds-law
  • https://github.com/dwmkerr/hacker-laws#the-bitter-lesson
  • https://github.com/dwmkerr/hacker-laws#the-ringelmann-effect
  • https://github.com/dwmkerr/hacker-laws...onservation-of-complexity-teslers-law
  • https://github.com/dwmkerr/hacker-laws#the-law-of-demeter
  • https://github.com/dwmkerr/hacker-laws#the-law-of-leaky-abstractions
  • https://github.com/dwmkerr/hacker-laws#the-law-of-the-instrument
  • https://github.com/dwmkerr/hacker-laws#the-law-of-triviality
  • https://github.com/dwmkerr/hacker-laws#the-unix-philosophy
  • https://github.com/dwmkerr/hacker-laws#the-scout-rule
  • https://github.com/dwmkerr/hacker-laws#the-spotify-model
  • https://github.com/dwmkerr/hacker-laws#the-two-pizza-rule
  • https://github.com/dwmkerr/hacker-laws#twymans-law
  • https://github.com/dwmkerr/hacker-laws#wadlers-law
  • https://github.com/dwmkerr/hacker-laws#wheatons-law
  • https://github.com/dwmkerr/hacker-laws#principles
  • https://github.com/dwmkerr/hacker-laws#all-models-are-wrong-george-boxs-law
  • https://github.com/dwmkerr/hacker-laws#chestertons-fence
  • https://github.com/dwmkerr/hacker-laws#kerckhoffss-principle
  • https://github.com/dwmkerr/hacker-laws#the-dead-sea-effect
  • https://github.com/dwmkerr/hacker-laws#the-dilbert-principle
  • https://github.com/dwmkerr/hacker-laws#the-pareto-principle-the-8020-rule
  • https://github.com/dwmkerr/hacker-laws#the-shirky-principle
  • https://github.com/dwmkerr/hacker-laws#the-peter-principle
  • https://github.com/dwmkerr/hacker-laws#the-robustness-principle-postels-law
  • https://github.com/dwmkerr/hacker-laws#solid
  • https://github.com/dwmkerr/hacker-laws#the-single-responsibility-principle
  • https://github.com/dwmkerr/hacker-laws#the-openclosed-principle
  • https://github.com/dwmkerr/hacker-laws#the-liskov-substitution-principle
  • https://github.com/dwmkerr/hacker-laws#the-interface-segregation-principle
  • https://github.com/dwmkerr/hacker-laws#the-dependency-inversion-principle
  • https://github.com/dwmkerr/hacker-laws#the-dry-principle
  • https://github.com/dwmkerr/hacker-laws#the-kiss-principle
  • https://github.com/dwmkerr/hacker-laws#yagni
  • https://github.com/dwmkerr/hacker-laws#the-fallacies-of-distributed-computing
  • https://github.com/dwmkerr/hacker-laws#the-principle-of-least-astonishment
  • https://github.com/dwmkerr/hacker-laws#reading-list
  • https://github.com/dwmkerr/hacker-laws#online-resources
  • https://github.com/dwmkerr/hacker-laws#pdf-ebook
  • https://github.com/dwmkerr/hacker-laws#podcast
  • https://github.com/dwmkerr/hacker-laws#TODO
  • https://flylib.com/books/en/1.315.1.15/1/
  • https://github.com/dwmkerr/hacker-laws#todo
  • https://en.wikipedia.org/wiki/Clarke's_three_laws
  • https://en.wikipedia.org/wiki/IPO_model
  • https://en.wikipedia.org/wiki/Ringelmann_effect
  • https://josemdev.com/avoiding-the-law-of-the-instrument/
  • https://archive.org/details/antipatternsrefa0000unse/page/111/mode/2up
  • https://www.oreilly.com/library/view/97-things-every/9780596809515/ch08.html
  • https://www.goodreads.com/book/show/3735293-clean-code
  • https://github.com/dwmkerr/hacker-laws#broken-windows-theory
  • https://www.amazon.sg/Clean-Code-Handbook-Software-Craftsmanship/dp/0132350882
  • https://en.wikipedia.org/wiki/Twyman%27s_law
  • https://queue.acm.org/detail.cfm?id=1999945
  • https://en.wikipedia.org/wiki/You_ain%27t_gonna_need_it
  • https://github.com/dwmkerr/hacker-laws/releases
  • https://github.com/dwmkerr/hacker-laws#readme-ov-file
  • https://github.com/dwmkerr/hacker-laws#CC-BY-SA-4.0-1-ov-file
  • https://github.com/dwmkerr/hacker-laws#coc-ov-file
  • https://github.com/dwmkerr/hacker-laws/watchers
  • https://github.com/contact/report-cont...hacker-laws&report=dwmkerr+%28user%29
  • https://github.com/dwmkerr/hacker-laws/releases/tag/v0.3.2
  • https://github.com/users/dwmkerr/packages?repo_name=hacker-laws
  • https://github.com/dwmkerr/hacker-laws/graphs/contributors
  • https://github.com/jlozovei
  • https://github.com/apps/gitlocalize-app
  • https://github.com/iegik
  • https://github.com/puremana
  • https://github.com/mt-gitlocalize
  • https://github.com/akashchandwani
  • https://github.com/DillonAd
  • https://github.com/uberbrady
  • https://github.com/rrix
  • https://github.com/mzeis
  • https://github.com/rogermarlow
  • https://github.com/dwmkerr/hacker-laws/search?l=html
  • https://github.com/dwmkerr/hacker-laws/search?l=shell
  • https://www.jmir.org/2014/2/e33/
  • https://blog.codinghorror.com/the-broken-window-theory/
  • https://opensourceforu.com/2011/05/joy-of-programming-broken-window-theory/
  • https://cloud.google.com/blog/products...ide-cloud-spanner-and-the-cap-theorem
  • https://en.wikipedia.org/wiki/Ward_Cunningham#Cunningham's_Law
  • https://en.wikipedia.org/wiki/David_Dunning
  • https://www.semanticscholar.org/paper/...c9fde5f1c411e4487658ac738dcf18d98ea8d
  • https://en.wikipedia.org/wiki/John_Gall_(author)#Gall's_law
  • https://en.wikipedia.org/wiki/Goodhart's_law
  • https://coffeeandjunk.com/goodharts-campbells-law/
  • https://dilbert.com/strip/1995-11-13
  • https://en.wikipedia.org/wiki/Hick%27s_law
  • https://www.sciencedirect.com/science/article/pii/S0022440599000369
  • http://www.hyrumslaw.com/
  • https://en.wikipedia.org/wiki/Metcalfe's_law
  • https://en.wikipedia.org/wiki/Occam's_razor
  • https://en.wikipedia.org/wiki/Lean_software_development#Eliminate_waste
  • http://wiki.c2.com/?PrematureOptimization
  • https://twitter.com/realdonaldknuth?lang=en
  • https://en.wikipedia.org/wiki/Putt%27s_Law_and_the_Successful_Technocrat
  • https://en.wikipedia.org/wiki/Reed's_law
  • https://www.joelonsoftware.com/2002/11/11/the-law-of-leaky-abstractions/
  • https://forums.adobe.com/thread/376152
  • https://labs.spotify.com/2014/03/27/spotify-engineering-culture-part-1/
  • https://wiki.haskell.org/Wadler's_Law
  • http://www.wheatonslaw.com/
  • https://dontbeadickday.com/
  • http://brucefwebster.com/2008/04/11/the-wetware-crisis-the-dead-sea-effect/
  • https://en.wikipedia.org/wiki/Dilbert_principle
  • https://www.crn.com/news/security/1882...applies-to-bugs-not-just-features.htm
  • https://kk.org/thetechnium/the-shirky-prin/
opl:providedBy
  • http://www.stackoverflow.com/#this
type
  • Document
described by
  • https://github.com/dwmkerr/hacker-laws
Subject
  • https://github.com/dwmkerr/hacker-laws
container of
  • https://github.com/dwmkerr/hacker-laws
primary topic
  • https://github.com/dwmkerr/hacker-laws
Alternative Linked Data Views: Facets | iSPARQL | ODE     Raw Linked Data formats: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD
This material is Open Knowledge   W3C Semantic Web Technology     This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3231, on Linux (x86_64-generic_glibc25-linux-gnu), Single Edition