SlideShare a Scribd company logo
1 of 20
 is a Unix-like.
 computer operating system (OS)
 assembled under the model of free and
open-source software
 The defining component of Linux is
the Linux kernel.
 It is an operating system kernel first released
on 5 October 1991 by Linus Torvalds.
The development of Linux is one
of the most prominent examples
of free and open-source
software collaboration
 Everything is a file. ( Including hardware )
 Small, single-purpose programs.
 Ability to chain programs together to
perform complex tasks.
 Avoid captive user interfaces.
 Configuration data stored in text.
 UNIX systems have many powerful utilities
designed to create and manipulate files. The
UNIX security model is based around the
security of files.
 By treating everything as a file, a
consistency emerges. You can secure access
to hardware in the same way as you secure
access to a document.
 UNIX provides many small utilities that
perform one task very well.
 When new functionality is required, the
general philosophy is to create a separate
program – rather than to extend an existing
utility with new features.
 A core design feature of UNIX is that the
output of one program can be the input for
another. This gives the user the flexibility to
combine many small programs together to
perform a larger, more complex task.
 Interactive commands are rare in UNIX. Most
commands expect their options and
arguments to be typed on the command line
when the command is launched.
 The command completes normally, possibly
producing output, or generates an error
message and quits. Interactivity is reserved
for programs where it makes sense, for
example, text editors (of course, there are
non-interactive text editors too.)
 Text is a universal interface, and many UNIX
utilities exist to manipulate text. Storing
configuration in text allows an administrator
to move a configuration from one machine to
another easily.
 There are several revision control applications
that enable an administrator to track which
change was made on a particular day, and
provide the ability to roll back a system
configuration to a particular date and time.
 Each of the commands that make up this
command line program is a filter.
 That is each command will take an input,
usually from Standard Input, and “filters”
the data stream by making some change to
it, then sends the resulting data stream to
Standard Output.
 Standard Input and Standard Output are
known collectively as STDIO.
 The who command generates an initial
stream of data.
 Each following command changes that data
stream in some manner, taking the Standard
Input and sending the modified data to
Standard Output for the next command to
manipulate.
 Each of the commands in this program is
fairly small, and each performs a specific
task.
 The sort command, for example does only
one thing. It sorts the data stream sent to it
via Standard Input and sends the results to
Standard Output.
 It can perform numeric, alphabetic and
alphanumeric sorts in forward and reverse
order.
 But it does nothing else. It only sorts but it is
very, very good at that. Because it is very
small, having only 2614 lines of code as
shown in the table below, it is also very fast.
 The portability of shell scripts can be far
more efficient in the long run than the
perceived efficiency of writing a program in a
compiled language—not even considering the
time required to compile and test such a
program—because they can run on many
otherwise incompatible systems.
 it means that by using four command line
commands, we are leveraging the work of
the programmers who created those
commands with over 7,000 lines of C code.
 That is code that we do not have to create.
We are leveraging the efforts of those other,
under-appreciated programmers to
accomplish the task we have set for
ourselves.
 Another aspect of software leverage is that
good programmers write good code and great
programmers borrow good code. Never
rewrite code that has already been written.

More Related Content

What's hot

Linker and Loader Explained
Linker and Loader  ExplainedLinker and Loader  Explained
Linker and Loader ExplainedAdarsh Kr Sinha
 
LINUX INTERVIEW QUESTIONS AND ANSWERS 2021
LINUX INTERVIEW QUESTIONS AND ANSWERS 2021LINUX INTERVIEW QUESTIONS AND ANSWERS 2021
LINUX INTERVIEW QUESTIONS AND ANSWERS 2021Sprintzeal
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating SystemKunalKewat1
 
Purpose of command interpreter
Purpose of command interpreterPurpose of command interpreter
Purpose of command interpreterSumant Diwakar
 
Useful Tools For Windows Xp
Useful Tools For Windows XpUseful Tools For Windows Xp
Useful Tools For Windows Xpbstil
 
Linux operating system
Linux operating systemLinux operating system
Linux operating systemITz_1
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationAvinash Kumar
 
CNIT 124 Ch 13: Post Exploitation (Part 1)
CNIT 124 Ch 13: Post Exploitation (Part 1)CNIT 124 Ch 13: Post Exploitation (Part 1)
CNIT 124 Ch 13: Post Exploitation (Part 1)Sam Bowne
 
CNIT 127: 8: Windows overflows (Part 2)
CNIT 127: 8: Windows overflows (Part 2)CNIT 127: 8: Windows overflows (Part 2)
CNIT 127: 8: Windows overflows (Part 2)Sam Bowne
 
Syntergy upgrade open text content server with replicator - 7-3-2016
Syntergy   upgrade open text content server with replicator - 7-3-2016Syntergy   upgrade open text content server with replicator - 7-3-2016
Syntergy upgrade open text content server with replicator - 7-3-2016Vijay Sharma
 

What's hot (20)

Codeinjection
CodeinjectionCodeinjection
Codeinjection
 
Ch01
Ch01Ch01
Ch01
 
Linker and Loader Explained
Linker and Loader  ExplainedLinker and Loader  Explained
Linker and Loader Explained
 
LINUX INTERVIEW QUESTIONS AND ANSWERS 2021
LINUX INTERVIEW QUESTIONS AND ANSWERS 2021LINUX INTERVIEW QUESTIONS AND ANSWERS 2021
LINUX INTERVIEW QUESTIONS AND ANSWERS 2021
 
OLM to PST
OLM to PSTOLM to PST
OLM to PST
 
Projects
ProjectsProjects
Projects
 
pracfinal
pracfinalpracfinal
pracfinal
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Purpose of command interpreter
Purpose of command interpreterPurpose of command interpreter
Purpose of command interpreter
 
Nsf to pst converter ppt
Nsf to pst converter pptNsf to pst converter ppt
Nsf to pst converter ppt
 
System software
System softwareSystem software
System software
 
Useful Tools For Windows Xp
Useful Tools For Windows XpUseful Tools For Windows Xp
Useful Tools For Windows Xp
 
Subversion
SubversionSubversion
Subversion
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server Administration
 
CNIT 124 Ch 13: Post Exploitation (Part 1)
CNIT 124 Ch 13: Post Exploitation (Part 1)CNIT 124 Ch 13: Post Exploitation (Part 1)
CNIT 124 Ch 13: Post Exploitation (Part 1)
 
Linex
LinexLinex
Linex
 
CNIT 127: 8: Windows overflows (Part 2)
CNIT 127: 8: Windows overflows (Part 2)CNIT 127: 8: Windows overflows (Part 2)
CNIT 127: 8: Windows overflows (Part 2)
 
How-to Guide: ES explorer
How-to Guide: ES explorerHow-to Guide: ES explorer
How-to Guide: ES explorer
 
Syntergy upgrade open text content server with replicator - 7-3-2016
Syntergy   upgrade open text content server with replicator - 7-3-2016Syntergy   upgrade open text content server with replicator - 7-3-2016
Syntergy upgrade open text content server with replicator - 7-3-2016
 

Similar to Linux principles and philosophy

Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophyaliabintouq
 
Unix operating system
Unix operating systemUnix operating system
Unix operating systemmidhunjose4u
 
Program design in the UNIX environment
Program design in the UNIX environmentProgram design in the UNIX environment
Program design in the UNIX environmentmustafa sarac
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating SystemMahakKasliwal
 
Insight into progam execution ppt
Insight into progam execution pptInsight into progam execution ppt
Insight into progam execution pptKeerty Smile
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt onu9
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 
Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophyfatimarashid66
 
system software and application software
system software and application softwaresystem software and application software
system software and application softwareTallat Satti
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)SURBHI SAROHA
 
Lec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptxLec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptxShabanaShafi3
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingJérôme Kehrli
 

Similar to Linux principles and philosophy (20)

Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophy
 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
 
Program design in the UNIX environment
Program design in the UNIX environmentProgram design in the UNIX environment
Program design in the UNIX environment
 
Unix final
Unix finalUnix final
Unix final
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
operating system lecture notes
operating system lecture notesoperating system lecture notes
operating system lecture notes
 
UNIX_Module 1.pdf
UNIX_Module 1.pdfUNIX_Module 1.pdf
UNIX_Module 1.pdf
 
Insight into progam execution ppt
Insight into progam execution pptInsight into progam execution ppt
Insight into progam execution ppt
 
System structure
System structureSystem structure
System structure
 
Richa garg itm
Richa garg itmRicha garg itm
Richa garg itm
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophy
 
system software and application software
system software and application softwaresystem software and application software
system software and application software
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
 
Lec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptxLec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptx
 
Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and Troubleshooting
 
Intro tounix
Intro tounixIntro tounix
Intro tounix
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Linux principles and philosophy

  • 1.
  • 2.  is a Unix-like.  computer operating system (OS)  assembled under the model of free and open-source software
  • 3.  The defining component of Linux is the Linux kernel.  It is an operating system kernel first released on 5 October 1991 by Linus Torvalds.
  • 4. The development of Linux is one of the most prominent examples of free and open-source software collaboration
  • 5.  Everything is a file. ( Including hardware )  Small, single-purpose programs.  Ability to chain programs together to perform complex tasks.  Avoid captive user interfaces.  Configuration data stored in text.
  • 6.  UNIX systems have many powerful utilities designed to create and manipulate files. The UNIX security model is based around the security of files.  By treating everything as a file, a consistency emerges. You can secure access to hardware in the same way as you secure access to a document.
  • 7.  UNIX provides many small utilities that perform one task very well.  When new functionality is required, the general philosophy is to create a separate program – rather than to extend an existing utility with new features.
  • 8.  A core design feature of UNIX is that the output of one program can be the input for another. This gives the user the flexibility to combine many small programs together to perform a larger, more complex task.
  • 9.  Interactive commands are rare in UNIX. Most commands expect their options and arguments to be typed on the command line when the command is launched.
  • 10.  The command completes normally, possibly producing output, or generates an error message and quits. Interactivity is reserved for programs where it makes sense, for example, text editors (of course, there are non-interactive text editors too.)
  • 11.  Text is a universal interface, and many UNIX utilities exist to manipulate text. Storing configuration in text allows an administrator to move a configuration from one machine to another easily.
  • 12.  There are several revision control applications that enable an administrator to track which change was made on a particular day, and provide the ability to roll back a system configuration to a particular date and time.
  • 13.  Each of the commands that make up this command line program is a filter.  That is each command will take an input, usually from Standard Input, and “filters” the data stream by making some change to it, then sends the resulting data stream to Standard Output.
  • 14.  Standard Input and Standard Output are known collectively as STDIO.  The who command generates an initial stream of data.  Each following command changes that data stream in some manner, taking the Standard Input and sending the modified data to Standard Output for the next command to manipulate.
  • 15.  Each of the commands in this program is fairly small, and each performs a specific task.  The sort command, for example does only one thing. It sorts the data stream sent to it via Standard Input and sends the results to Standard Output.
  • 16.  It can perform numeric, alphabetic and alphanumeric sorts in forward and reverse order.  But it does nothing else. It only sorts but it is very, very good at that. Because it is very small, having only 2614 lines of code as shown in the table below, it is also very fast.
  • 17.  The portability of shell scripts can be far more efficient in the long run than the perceived efficiency of writing a program in a compiled language—not even considering the time required to compile and test such a program—because they can run on many otherwise incompatible systems.
  • 18.  it means that by using four command line commands, we are leveraging the work of the programmers who created those commands with over 7,000 lines of C code.
  • 19.  That is code that we do not have to create. We are leveraging the efforts of those other, under-appreciated programmers to accomplish the task we have set for ourselves.
  • 20.  Another aspect of software leverage is that good programmers write good code and great programmers borrow good code. Never rewrite code that has already been written.