Hacker Laws
# Laws, Theories, Principles and Patterns that developers will find useful.
> it's defining this _laws, theories, principles and patterns_ that allow to express the driving values throughout the reached final results. Without it, you'll get what AI is today providing: bland and tasteless generic outcomes. The one listed here, well apply to software engineering as well as anything else one aim to create.
> Think and plan about it accordingly, before starting your next gig.
# TOC
* * *
* [Introduction](
* [Laws](
* [90–9–1 Principle (1% Rule)](
* [90–90 Rule](
* [Amdahl's Law](
* [The Broken Windows Theory](
* [Brooks' Law](
* [CAP Theorem (Brewer's Theorem)](
* [Clarke's three laws](
* [Conway's Law](
* [Cunningham's Law](
* [Dunbar's Number](
* [The Dunning-Kruger Effect](
* [Fitts' Law](
* [Gall's Law](
* [Goodhart's Law](
* [Hanlon's Razor](
* [Hick's Law (Hick-Hyman Law)](
* [Hofstadter's Law](
* [Hutber's Law](
* [The Hype Cycle & Amara's Law](
* [Hyrum's Law (The Law of Implicit Interfaces)](
* [Input-Process-Output (IPO)](
* [Kernighan's Law](
* [Koomey's Law](
* [Linus's Law](
* [Metcalfe's Law](
* [Moore's Law](
* [Murphy's Law / Sod's Law](
* [Occam's Razor](
* [Parkinson's Law](
* [Premature Optimization Effect](
* [Putt's Law](
* [Reed's Law](
* [The Bitter Lesson](
* [The Ringelmann Effect](
* [The Law of Conservation of Complexity (Tesler's Law)](
* [The Law of Demeter](
* [The Law of Leaky Abstractions](
* [The Law of the Instrument](
* [The Law of Triviality](
* [The Unix Philosophy](
* [The Scout Rule](
* [The Spotify Model](
* [The Two Pizza Rule](
* [Twyman's law](
* [Wadler's Law](
* [Wheaton's Law](
* [Principles](
* [All Models Are Wrong (George Box's Law)](
* [Chesterton's Fence](
* [Kerckhoffs's principle](
* [The Dead Sea Effect](
* [The Dilbert Principle](
* [The Pareto Principle (The 80/20 Rule)](
* [The Shirky Principle](
* [The Peter Principle](
* [The Robustness Principle (Postel's Law)](
* [SOLID](
* [The Single Responsibility Principle](
* [The Open/Closed Principle](
* [The Liskov Substitution Principle](
* [The Interface Segregation Principle](
* [The Dependency Inversion Principle](
* [The DRY Principle](
* [The KISS principle](
* [YAGNI](
* [The Fallacies of Distributed Computing](
* [The Principle of Least Astonishment](
* [Reading List](
* [Online Resources](
* [PDF eBook](
* [Podcast](
* * *

Stacker News
Hacker Laws \ stacker news
Laws, Theories, Principles and Patterns that developers will find useful. it's defining this laws, theories, principles and patterns that allow to ...