22:
934:
The unbridled use of the go to statement has as an immediate consequence that it becomes terribly hard to find a meaningful set of coordinates in which to describe the process progress. ... The go to statement as it stands is just too primitive, it is too much an invitation to make a mess of one's
436:
2003. Twenty-second Annual Joint
Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428). Vol. 2. pp. 1312β1321 vol.2.
62:
was already a journalistic clichΓ© used in headlines, well before the
Dijkstra article, as in, for example, the headline over a letter published in 1949 in
697:
555:
742:
847:
572:
1059:
643:
Alexander
Sotirov; Marc Stevens; Jacob Appelbaum; Arjen Lenstra; David Molnar; Dag Arne Osvik; Benne de Weger (December 2008).
459:
239:-related software. (Rob Pike was a main figure in the creation of Plan 9 and wrote extensively on bad designs found in UNIX.)
784:
100:
instead. The original title of the letter, as submitted to CACM, was "A Case
Against the Goto Statement", but CACM editor
377:
81:
673:
582:
A Mishra; V Shrivastava; S Banerjee; W Arbaugh (June 2006). "Partially
Overlapped Channels Not Considered Harmful".
115:
Frank Rubin published a criticism of
Dijkstra's letter in the March 1987 CACM where it appeared under the title
147:
547:
1204:
1161:
1005:
959:
808:
538:
1214:
1167:
1011:
965:
26:
802:
564:
826:
631:
596:
478:
442:
719:
877:
1219:
902:
734:
89:
1108:
772:
591:
437:
97:
851:
759:
1090:
522:
236:
1106:
93:
1107:
Donald Moore; Chuck
Musciano; Michael J. Liebhaber; Steven F. Lott; Lee Starr (May 1987).
8:
1209:
1152:
996:
642:
950:
1149:
1131:
1082:
1041:
993:
947:
925:
794:
691:
679:
512:
465:
343:
295:
173:
64:
651:
669:
455:
347:
68:: "Rent Control Controversy / Enacting Now of Hasty Legislation Considered Harmful".
1135:
929:
683:
299:
122:. The May 1987 CACM printed further replies, both for and against, under the title
104:
changed the title to "Goto
Statement Considered Harmful". Regarding this new title,
1123:
1086:
1074:
1033:
917:
661:
618:
601:
516:
504:
495:
469:
447:
335:
312:
285:
258:
177:
163:
44:
36:
1045:
420:
246:
47:
and related disciplines. Its use in this context originated with a 1968 letter by
21:
898:
730:
653:
209:
75:
48:
451:
389:
309:
RFC 1627: Network 10 Considered
Harmful (Some Practices Shouldn't be Codified)
235:, which maintains a directory of "considered harmful" articles and hosts some
1198:
1024:
Kanada, Yasumasa (2005), "Events and
Sightings: An obituary of Eiichi Goto",
873:
306:
101:
665:
644:
605:
508:
78:'s letter "Go To Statement Considered Harmful", published in the March 1968
433:
143:
105:
1078:
979:
921:
816:
658:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
339:
290:
273:
168:
151:
1127:
1037:
263:
109:
622:
581:
356:
617:. 2006 13th Working Conference on Reverse Engineering. pp. 19β28.
490:
197:
185:
Bruce A. Martin (November 15β19, 1976). "Letter O Considered Harmful".
326:
CA Kent; JC Mogul (January 1995). "Fragmentation Considered Harmful".
1109:"" 'GOTO Considered Harmful' Considered Harmful" Considered Harmful?"
704:
652:
Andy Crabtree; Tom Rodden; Peter Tolmie; Graham Button (April 2009).
317:
40:
398:
205:
196:(Full proposal text was included in post-meeting distribution; see
530:
213:
411:
369:
307:
Eliot Lear; Erik Fair; Dave Crocker; Thomas Kessler (July 1994).
190:
127:"GOTO Considered Harmful" Considered Harmful' Considered Harmful?
645:"MD5 considered harmful today - Creating a rogue CA certificate"
43:
have been used in the titles of at least 65 critical essays in
204:
112:
cheerfully complained that he was always being eliminated."
25:"Achievements considered harmful?" presentation at the 2010
723:
706:
86:
142:
493:(July 2005). "Human-centered design considered harmful".
129:. Dijkstra's own response to this controversy was titled
998:
What led to "Notes on Structured Programming" (EWD-1308)
476:
189:. Brookhaven National Laboratory, Upton, NY: X3J3: ANSI
85:(CACM), in which he criticized the excessive use of the
1160:. E.W. Dijkstra Archive. Center for American History,
1004:. E.W. Dijkstra Archive. Center for American History,
958:. E.W. Dijkstra Archive. Center for American History,
479:"IPv4-Mapped Addresses on the Wire Considered Harmful"
1154:
On a Somewhat Disappointing Correspondence (EWD-1009)
1181:"Cat-v.org Random Contrarian Insurgent Organization"
1180:
980:"Goto Statement Considered Harmful: A Retrospective"
51:published as "Go To Statement Considered Harmful".
613:Kapser, Cory; Godfrey, Michael W. (October 2006).
427:
396:
233:Cat-v.org Random Contrarian Insurgent Organization
247:"Networks Considered Harmful for Electronic Mail"
1196:
977:
770:
489:
421:""Considered Harmful" Essays Considered Harmful"
354:
271:
897:
782:
729:
615:"Cloning Considered Harmful" Considered Harmful
412:"Sending XHTML as text/html Considered Harmful"
325:
184:
1060:""GOTO Considered Harmful" Considered Harmful"
814:
872:
612:
418:
244:
74:was popularized among computer scientists by
800:
757:
696:: CS1 maint: multiple names: authors list (
584:ACM SIGMETRICS Performance Evaluation Review
375:
1057:
891:
785:"Commandname Extensions Considered Harmful"
705:Rich Felker (a.k.a. 'dalias') (July 2013).
409:
120:GOTO Considered Harmful' Considered Harmful
1051:
629:
545:
214:"UNIX Style, or cat -v Considered Harmful"
131:On a Somewhat Disappointing Correspondence
595:
562:
477:Jun-ichiro itojun Hagino (October 2003).
441:
328:ACM SIGCOMM Computer Communication Review
316:
289:
262:
167:
1100:
39:"X considered harmful". As of 2009, its
20:
1142:
1026:IEEE Annals of the History of Computing
866:
745:from the original on September 18, 2019
575:from the original on December 27, 2023.
16:Phrase used in titles of critical texts
1197:
1023:
558:from the original on November 8, 2023.
546:Batchelder, Ned (September 29, 2007).
541:from the original on November 8, 2023.
940:
548:"Python's super (considered harmful)"
428:J Yoon; M Liu; B Noble (April 2003).
1148:
992:
946:
903:"Go To Statement Considered Harmful"
848:"Miscellaneous - Considered Harmful"
565:"Python's super() considered super!"
397:Jonathan Amsterdam (February 2002).
357:"Csh Programming Considered Harmful"
152:"Global Variable Considered Harmful"
563:Hettinger, Raymond (May 26, 2011).
531:"Python's Super Considered Harmful"
378:"Recursive Make Considered Harmful"
187:proposal considered by X3J3 members
13:
978:David R. Tribble (February 2005).
878:"Language Log: Considered harmful"
528:
430:Random waypoint considered harmful
231:This article is the namesake of a
14:
1231:
771:Joanna Rutkowska (October 2015).
355:Tom Christiansen (October 1996).
274:"Polymorphism considered harmful"
783:Alex North-Keys (January 2016).
654:"Ethnography considered harmful"
1173:
815:Alexander Rush (January 2019).
419:Eric A. Meyer (December 2002).
399:"Java's new Considered Harmful"
245:John McCarthy (December 1989).
1017:
986:
971:
840:
801:Drew DeVault (November 2016).
773:"Intel x86 considered harmful"
760:"Star Trek Considered Harmful"
410:Ian Hickson (September 2002).
1:
1162:University of Texas at Austin
1006:University of Texas at Austin
960:University of Texas at Austin
833:
809:Electron (software framework)
803:"Electron considered Harmful"
764:National Air and Space Museum
726:, which the author maintains.
403:Software Development Magazine
136:
630:Howard Chu (February 2008).
7:
817:"Tensor Considered Harmful"
632:"GnuTLS Considered Harmful"
452:10.1109/INFCOM.2003.1208967
272:C. Ponder; B. Bush (1992).
10:
1236:
1058:Frank Rubin (March 1987).
758:Paul Ceruzzi (June 2015).
388:(1): 14β25. Archived from
311:(Technical report). IETF.
54:
27:Game Developers Conference
1116:Communications of the ACM
1067:Communications of the ACM
910:Communications of the ACM
827:Tensor (machine learning)
735:"mdoc considered harmful"
707:"NULL considered harmful"
251:Communications of the ACM
96:of the day and advocated
720:C (programming language)
666:10.1145/1518701.1518835
606:10.1145/1140103.1140286
509:10.1145/1070960.1070976
98:structured programming
80:Communications of the
29:
1079:10.1145/214748.315722
922:10.1145/362929.362947
523:Human-centered design
376:Peter Miller (1998).
340:10.1145/205447.205456
291:10.1145/130981.130991
169:10.1145/953353.953355
94:programming languages
24:
1205:History of computing
1128:10.1145/22899.315729
1038:10.1109/MAHC.2005.37
660:. pp. 879β888.
264:10.1145/76380.316015
193:Standards Committee.
1150:Dijkstra, Edsger W.
994:Dijkstra, Edsger W.
948:Dijkstra, Edsger W.
623:10.1109/WCRE.2006.1
483:IETF Internet-Draft
278:ACM SIGPLAN Notices
156:ACM SIGPLAN Notices
1215:Edsger W. Dijkstra
1096:on March 20, 2009.
795:Filename extension
739:Groff Mailing List
392:on March 30, 2015.
72:Considered harmful
65:The New York Times
60:Considered harmful
33:Considered harmful
30:
876:(April 8, 2008).
733:(March 7, 2014).
636:LDAP Mailing List
552:nedbatchelder.com
461:978-0-7803-7752-3
257:(12): 1389β1390.
150:(February 1973).
1227:
1189:
1188:
1177:
1171:
1165:
1159:
1146:
1140:
1139:
1113:
1104:
1098:
1097:
1095:
1089:. Archived from
1064:
1055:
1049:
1048:
1021:
1015:
1009:
1003:
990:
984:
983:
975:
969:
963:
957:
944:
938:
937:
907:
895:
889:
888:
886:
884:
870:
864:
863:
861:
859:
850:. Archived from
844:
824:
806:
792:
779:
777:
767:
754:
752:
750:
717:
715:
713:
701:
695:
687:
648:
639:
626:
609:
599:
576:
559:
542:
520:
491:Donald A. Norman
486:
473:
445:
424:
415:
406:
393:
367:
365:
363:
351:
322:
320:
318:10.17487/rfc1627
303:
293:
268:
266:
228:
226:
224:
194:
181:
171:
126:
119:
45:computer science
37:phrasal template
1235:
1234:
1230:
1229:
1228:
1226:
1225:
1224:
1195:
1194:
1193:
1192:
1179:
1178:
1174:
1157:
1147:
1143:
1111:
1105:
1101:
1093:
1062:
1056:
1052:
1022:
1018:
1001:
991:
987:
976:
972:
955:
945:
941:
905:
899:Edsger Dijkstra
896:
892:
882:
880:
871:
867:
857:
855:
846:
845:
841:
836:
775:
748:
746:
731:Eric S. Raymond
711:
709:
689:
688:
676:
597:10.1.1.115.9060
529:Knight, James.
462:
443:10.1.1.129.5604
361:
359:
222:
220:
210:Brian Kernighan
139:
124:
117:
76:Edsger Dijkstra
57:
49:Edsger Dijkstra
35:is a part of a
17:
12:
11:
5:
1233:
1223:
1222:
1220:Computer humor
1217:
1212:
1207:
1191:
1190:
1172:
1141:
1122:(5): 351β355.
1099:
1073:(3): 195β196.
1050:
1016:
1014:) (June, 2001)
985:
970:
939:
916:(3): 147β148.
901:(March 1968).
890:
865:
854:on May 3, 2009
838:
837:
835:
832:
831:
830:
812:
798:
780:
768:
755:
727:
702:
674:
649:
640:
627:
610:
579:
578:
577:
560:
526:
487:
474:
460:
425:
416:
407:
394:
373:
352:
323:
304:
269:
242:
241:
240:
202:
182:
138:
135:
108:quipped that "
56:
53:
15:
9:
6:
4:
3:
2:
1232:
1221:
1218:
1216:
1213:
1211:
1208:
1206:
1203:
1202:
1200:
1186:
1182:
1176:
1170:) (May, 1987)
1169:
1168:transcription
1163:
1156:
1155:
1151:
1145:
1137:
1133:
1129:
1125:
1121:
1117:
1110:
1103:
1092:
1088:
1084:
1080:
1076:
1072:
1068:
1061:
1054:
1047:
1043:
1039:
1035:
1031:
1027:
1020:
1013:
1012:transcription
1007:
1000:
999:
995:
989:
981:
974:
967:
966:transcription
961:
954:
953:
949:
943:
936:
931:
927:
923:
919:
915:
911:
904:
900:
894:
879:
875:
874:Mark Liberman
869:
853:
849:
843:
839:
828:
822:
818:
813:
810:
804:
799:
796:
790:
786:
781:
774:
769:
765:
761:
756:
744:
740:
736:
732:
728:
725:
721:
708:
703:
699:
693:
685:
681:
677:
675:9781605582467
671:
667:
663:
659:
655:
650:
646:
641:
637:
633:
628:
624:
620:
616:
611:
607:
603:
598:
593:
589:
585:
580:
574:
570:
569:Deep Thoughts
566:
561:
557:
553:
549:
544:
543:
540:
536:
532:
527:
524:
518:
514:
510:
506:
502:
498:
497:
492:
488:
484:
480:
475:
471:
467:
463:
457:
453:
449:
444:
439:
435:
431:
426:
422:
417:
413:
408:
404:
400:
395:
391:
387:
383:
379:
374:
371:
358:
353:
349:
345:
341:
337:
333:
329:
324:
319:
314:
310:
305:
301:
297:
292:
287:
283:
279:
275:
270:
265:
260:
256:
252:
248:
243:
238:
234:
230:
229:
219:
215:
211:
207:
203:
201:
199:
192:
188:
183:
179:
175:
170:
165:
161:
157:
153:
149:
145:
141:
140:
134:
132:
128:
121:
113:
111:
107:
103:
102:Niklaus Wirth
99:
95:
91:
88:
84:
83:
77:
73:
69:
67:
66:
61:
52:
50:
46:
42:
38:
34:
28:
23:
19:
1184:
1175:
1153:
1144:
1119:
1115:
1102:
1091:the original
1070:
1066:
1053:
1029:
1025:
1019:
997:
988:
973:
951:
942:
933:
913:
909:
893:
881:. Retrieved
868:
856:. Retrieved
852:the original
842:
820:
789:talisman.org
788:
763:
747:. Retrieved
738:
710:. Retrieved
657:
635:
614:
587:
583:
568:
551:
534:
503:(4): 14β19.
500:
496:Interactions
494:
482:
434:IEEE INFOCOM
429:
402:
390:the original
385:
381:
360:. Retrieved
331:
327:
308:
284:(6): 76β79.
281:
277:
254:
250:
232:
221:. Retrieved
217:
195:
186:
162:(2): 28β34.
159:
155:
144:William Wulf
130:
123:
116:
114:
106:Donald Knuth
79:
71:
70:
63:
59:
58:
32:
31:
18:
821:Harvard NLP
712:January 25,
362:January 25,
223:January 25,
1210:Snowclones
1199:Categories
883:August 17,
858:August 17,
834:References
749:October 4,
137:Snowclones
41:snowclones
1185:cat-v.org
1032:(3): 92,
692:cite book
592:CiteSeerX
590:: 63β74.
438:CiteSeerX
348:207997774
334:: 75β87.
148:Mary Shaw
90:statement
1136:42951740
935:program.
930:17469809
743:Archived
684:13646185
573:Archived
556:Archived
539:Archived
535:fuhm.net
300:21140034
212:(1983).
206:Rob Pike
110:Dr. Goto
1087:6853038
952:EWD-215
517:1698853
470:3779394
370:C shell
198:summary
191:Fortran
178:2388792
55:History
1134:
1085:
1046:675701
1044:
928:
682:
672:
594:
515:
468:
458:
440:
346:
298:
237:Plan 9
218:USENIX
176:
1158:(PDF)
1132:S2CID
1112:(PDF)
1094:(PDF)
1083:S2CID
1063:(PDF)
1042:S2CID
1002:(PDF)
956:(PDF)
926:S2CID
906:(PDF)
776:(PDF)
680:S2CID
513:S2CID
466:S2CID
382:AUUGN
344:S2CID
296:S2CID
174:S2CID
118:'
885:2009
860:2009
825:See
807:See
793:See
751:2020
724:musl
722:and
718:See
714:2020
698:link
670:ISBN
521:See
456:ISBN
368:See
364:2020
225:2020
208:and
146:and
87:GOTO
1124:doi
1075:doi
1034:doi
918:doi
662:doi
619:doi
602:doi
505:doi
448:doi
336:doi
313:doi
286:doi
259:doi
164:doi
92:in
82:ACM
1201::
1183:.
1130:.
1120:30
1118:.
1114:.
1081:.
1071:30
1069:.
1065:.
1040:,
1030:27
1028:,
932:.
924:.
914:11
912:.
908:.
819:.
787:.
762:.
741:.
737:.
694:}}
690:{{
678:.
668:.
656:.
634:.
600:.
588:34
586:.
571:.
567:.
554:.
550:.
537:.
533:.
511:.
501:12
499:.
481:.
464:.
454:.
446:.
432:.
401:.
386:19
384:.
380:.
342:.
332:25
330:.
294:.
282:27
280:.
276:.
255:32
253:.
249:.
216:.
200:.)
172:.
158:.
154:.
133:.
1187:.
1166:(
1164:.
1138:.
1126::
1077::
1036::
1010:(
1008:.
982:.
968:)
964:(
962:.
920::
887:.
862:.
829:.
823:.
811:.
805:.
797:.
791:.
778:.
766:.
753:.
716:.
700:)
686:.
664::
647:.
638:.
625:.
621::
608:.
604::
525:.
519:.
507::
485:.
472:.
450::
423:.
414:.
405:.
372:.
366:.
350:.
338::
321:.
315::
302:.
288::
267:.
261::
227:.
180:.
166::
160:8
125:'
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.