{"id":5386,"date":"2011-04-14T23:07:39","date_gmt":"2011-04-15T07:07:39","guid":{"rendered":"http:\/\/www.horace.org\/blog\/?p=5386"},"modified":"2011-04-15T10:21:20","modified_gmt":"2011-04-15T18:21:20","slug":"the-terror-of-code-in-the-wrong-hands","status":"publish","type":"post","link":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/","title":{"rendered":"The Terror of Code in the Wrong Hands"},"content":{"rendered":"<blockquote><p>\nHere is a new term, software terrorist, who brings negative productivity to the team.  I can attest that catching bug in poorly written code waste a lot more time than rewriting the code myself from scratch.\n<\/p><\/blockquote>\n<p>By Allen Holub, May 2005, SD Times<\/p>\n<p>The 20-to-1 productivity rule says that 5 percent of programmers are 20 times more productive than the remaining 95 percent, but what about the 5 percent at the other end of the bell curve? Consider the software terrorist: the guy who stays up all night, unwittingly but systematically destroying the entire team\u2019s last month\u2019s work while \u201cimproving\u201d the code. He doesn\u2019t tell anybody what he\u2019s done, and he never tests. He\u2019s created a ticking time bomb that won\u2019t be discovered for six months.<\/p>\n<p>When the bomb goes off, you can\u2019t roll back six months of work by the whole team, and it takes three weeks of your best programmer\u2019s effort to undo the damage. Meanwhile, our terrorist gets a raise because he stays late so often, working so hard. The brilliant guy who cleans up the debris gets a bad performance review because his schedule has slipped, so he quits.<\/p>\n<p>Valuable tools in the hands of experts become dangerous weapons in the hands of terrorists. The terrorist doesn\u2019t understand how to use generics, templates and casts, and so with a single click on the \u201crefactor\u201d button he destroys the program\u2019s carefully crafted typing system. That single-click refactor is a real time saver for the expert. Scripting languages, which in the right hands save time, become a means for creating write-only code that has to be scrapped after you\u2019ve spent two months trying to figure out why it doesn\u2019t work.<\/p>\n<p>Terrorist scripts can be so central to the app, and so hard to understand, that they sometimes remain in the program, doubling the time required for all maintenance efforts. Terrorist documentation is a font of misinformation. Terrorist tests systematically destroy the database every time they\u2019re run.<\/p>\n<p>Terrorist work isn\u2019t just nonproductive, it\u2019s anti-productive. A terrorist reduces your team\u2019s productivity by at least an order of magnitude. It takes a lot longer to find a bug than to create one. None of the terrorist code ends up in the final program because it all has to be rewritten. You pay the terrorists, and you also pay 10 times more to the people who have to track down and fix their bugs. <\/p>\n<p>Given the difficulty that most organizations have in firing (or even identifying) incompetent people, the only way to solve this problem is not to hire terrorists at all; but the terrorists are masters of disguise, particularly in job interviews. They talk a good game, they have lots of experience, and they have great references because they work so hard.<\/p>\n<p>Since the bottom 5 percent is indistinguishable from the rest of the bottom 95 percent, the only way to avoid hiring terrorists is to avoid hiring from the remaining 95 percent altogether.<\/p>\n<p>The compelling reason for this strategy is that the 20-to-1 rule applies only when elite programmers work exclusively with other elite programmers. Single elite programmers who interact with 10 average programmers waste most of their time explaining and helping rather than working. Two elite programmers raise the productivity of a 20-programmer group by 10 percent. It\u2019s like getting two programmers for free. Two elite programmers working only with each other do the work of at least 20 average programmers. It\u2019s like getting 18 programmers for free. If you pay them twice the going salary (and you should if you want to keep them), you\u2019re still saving vast amounts of money.<\/p>\n<p>Unfortunately, it\u2019s possible for a software terrorist to masquerade as an elite programmer, but this disguise is easier to detect. Programmers who insist on working in isolation (especially the ones who come to work at 4:00 p.m. and stay all night), the prima donnas who have fits when they don\u2019t get their way, the programmers who never explain what they\u2019re doing in a way that anyone else can understand and don\u2019t document their code, the ones that reject new technologies or methodologies out of hand rather than showing genuine curiosity\u2014these are the terrorists.<\/p>\n<p>Avoid them no matter how many years of experience they have.<\/p>\n<p>Software terrorism is on the upswing. I used to quote the standard rule that the top 10 percent were 10 times more productive. The hiring practices prevalent since the dot-com explosion\u2014which seem to reject the elite programmers by design\u2014have lowered the general skill level of the profession, however. <\/p>\n<p>As the number of elite programmers gets smaller, their relative productivity gets higher. The only long-term solution to this problem is to change our hiring practices and our attitudes toward training. The cynic in me has a hard time believing that either will happen, but we can always hope for the best. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is a new term, software terrorist, who brings negative productivity to the team. I can attest that catching bug in poorly written code waste a lot more time than rewriting the code myself from scratch. By Allen Holub, May 2005, SD Times The 20-to-1 productivity rule says that 5 percent of programmers are 20 &hellip; <a href=\"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The Terror of Code in the Wrong Hands<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"lc_iscn_info":[],"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[15],"tags":[261],"class_list":["post-5386","post","type-post","status-publish","format-standard","hentry","category-_newsclips","tag-programming"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Terror of Code in the Wrong Hands - \u54f2\u5b50\u6232 Philosophist\u2019s Camp<\/title>\n<meta name=\"description\" content=\"Here is a new term, software terrorist, who brings negative productivity to the team. I can attest that catching bug in poorly written code waste a lot\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Terror of Code in the Wrong Hands - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"og:description\" content=\"Here is a new term, software terrorist, who brings negative productivity to the team. I can attest that catching bug in poorly written code waste a lot\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/\" \/>\n<meta property=\"og:site_name\" content=\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/horace.org\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/horace.org\" \/>\n<meta property=\"article:published_time\" content=\"2011-04-15T07:07:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-04-15T18:21:20+00:00\" \/>\n<meta name=\"author\" content=\"hevangel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@horaceorg\" \/>\n<meta name=\"twitter:site\" content=\"@horaceorg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hevangel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/\"},\"author\":{\"name\":\"hevangel\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"headline\":\"The Terror of Code in the Wrong Hands\",\"datePublished\":\"2011-04-15T07:07:39+00:00\",\"dateModified\":\"2011-04-15T18:21:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/\"},\"wordCount\":826,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"keywords\":[\"programming\"],\"articleSection\":[\"News Clips\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/\",\"name\":\"The Terror of Code in the Wrong Hands - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\"},\"datePublished\":\"2011-04-15T07:07:39+00:00\",\"dateModified\":\"2011-04-15T18:21:20+00:00\",\"description\":\"Here is a new term, software terrorist, who brings negative productivity to the team. I can attest that catching bug in poorly written code waste a lot\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2011\\\/04\\\/14\\\/the-terror-of-code-in-the-wrong-hands\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Terror of Code in the Wrong Hands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\",\"name\":\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"description\":\"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\",\"name\":\"hevangel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"width\":1313,\"height\":1259,\"caption\":\"hevangel\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.horace.org\",\"https:\\\/\\\/www.facebook.com\\\/horace.org\"],\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/author\\\/hevangel-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Terror of Code in the Wrong Hands - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"Here is a new term, software terrorist, who brings negative productivity to the team. I can attest that catching bug in poorly written code waste a lot","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/","og_locale":"en_US","og_type":"article","og_title":"The Terror of Code in the Wrong Hands - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","og_description":"Here is a new term, software terrorist, who brings negative productivity to the team. I can attest that catching bug in poorly written code waste a lot","og_url":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/","og_site_name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","article_publisher":"https:\/\/www.facebook.com\/horace.org","article_author":"https:\/\/www.facebook.com\/horace.org","article_published_time":"2011-04-15T07:07:39+00:00","article_modified_time":"2011-04-15T18:21:20+00:00","author":"hevangel","twitter_card":"summary_large_image","twitter_creator":"@horaceorg","twitter_site":"@horaceorg","twitter_misc":{"Written by":"hevangel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/#article","isPartOf":{"@id":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/"},"author":{"name":"hevangel","@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"headline":"The Terror of Code in the Wrong Hands","datePublished":"2011-04-15T07:07:39+00:00","dateModified":"2011-04-15T18:21:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/"},"wordCount":826,"commentCount":0,"publisher":{"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"keywords":["programming"],"articleSection":["News Clips"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/","url":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/","name":"The Terror of Code in the Wrong Hands - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","isPartOf":{"@id":"https:\/\/www.horace.org\/blog\/#website"},"datePublished":"2011-04-15T07:07:39+00:00","dateModified":"2011-04-15T18:21:20+00:00","description":"Here is a new term, software terrorist, who brings negative productivity to the team. I can attest that catching bug in poorly written code waste a lot","breadcrumb":{"@id":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.horace.org\/blog\/2011\/04\/14\/the-terror-of-code-in-the-wrong-hands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.horace.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The Terror of Code in the Wrong Hands"}]},{"@type":"WebSite","@id":"https:\/\/www.horace.org\/blog\/#website","url":"https:\/\/www.horace.org\/blog\/","name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18","publisher":{"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.horace.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":["Person","Organization"],"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c","name":"hevangel","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","url":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","width":1313,"height":1259,"caption":"hevangel"},"logo":{"@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1"},"sameAs":["http:\/\/www.horace.org","https:\/\/www.facebook.com\/horace.org"],"url":"https:\/\/www.horace.org\/blog\/author\/hevangel-2\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pwn21-1oS","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1932,"url":"https:\/\/www.horace.org\/blog\/2008\/07\/28\/bangalore-bombing\/","url_meta":{"origin":5386,"position":0},"title":"Bangalore bombing","author":"hevangel","date":"July 28, 2008","format":false,"excerpt":"Last Friday, 9 bombs set off in Bangalore, killed two people and wounded over twenty people.\u00a0 I never feel so close to terrorist attack.\u00a0 I worked in Bangalore for two months.\u00a0 My colleagues took over my tasks are still working in Bangalore.\u00a0 According to the news, one of the bomb\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1707,"url":"https:\/\/www.horace.org\/blog\/2008\/02\/12\/workplace-leech\/","url_meta":{"origin":5386,"position":1},"title":"Workplace Leech","author":"hevangel","date":"February 12, 2008","format":false,"excerpt":"There is someone act like a leech at work. Like a real leech, he sucks on other people's blood to survive. In fact, he is worst than a lazy bone with zero productivity. He has negative productivity because others have to spent time to deal with him. Unfortunately, I have\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4203,"url":"https:\/\/www.horace.org\/blog\/2010\/04\/01\/chief-programmer-team\/","url_meta":{"origin":5386,"position":2},"title":"Chief Programmer Team","author":"hevangel","date":"April 1, 2010","format":false,"excerpt":"In software development, there are many different models in how to organize the team structure. I have read the Chief Programmer Team model in Rapid Software Development and Mythical Man Month and I always wanted to try it. The Chief Programmer Team model is base on the fact that the\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2092,"url":"https:\/\/www.horace.org\/blog\/2008\/11\/26\/mumbai-rampage\/","url_meta":{"origin":5386,"position":3},"title":"Mumbai rampage","author":"hevangel","date":"November 26, 2008","format":false,"excerpt":"The Mumbai gunmen rampage catch the headline of the news today. It also catch the attention of everyone in the office. Our company outsource to India and many in the team had traveled to India, so any news in India has great interest among us. Today some Muslim extremist launch\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":494,"url":"https:\/\/www.horace.org\/blog\/2006\/08\/31\/bank-time\/","url_meta":{"origin":5386,"position":4},"title":"Bank time","author":"hevangel","date":"August 31, 2006","format":false,"excerpt":"This morning I took my car to service. It turn out the problem I had is software bug in the transmission control system. The service center download a new firmware to my energy and the problem is fixed. I am surprised an auto have bugs causing the system to hang\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":390,"url":"https:\/\/www.horace.org\/blog\/2006\/05\/01\/software-as-a-service\/","url_meta":{"origin":5386,"position":5},"title":"Software as a service","author":"hevangel","date":"May 1, 2006","format":false,"excerpt":"Today I read a news article about Bill Gate's comment on the future of software. He claim that in the future, all software will be sold as services instead of shrink wrap applications in a box. I am surprise this kind of nonsense come out from the person who once\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":false,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/5386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/comments?post=5386"}],"version-history":[{"count":2,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/5386\/revisions"}],"predecessor-version":[{"id":5388,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/5386\/revisions\/5388"}],"wp:attachment":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/media?parent=5386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/categories?post=5386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/tags?post=5386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}