Knowledge

Considered harmful

Source πŸ“

22: 934:
The unbridled use of the go to statement has as an immediate consequence that it becomes terribly hard to find a meaningful set of coordinates in which to describe the process progress. ... The go to statement as it stands is just too primitive, it is too much an invitation to make a mess of one's
436:
2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428). Vol. 2. pp. 1312–1321 vol.2.
62:
was already a journalistic clichΓ© used in headlines, well before the Dijkstra article, as in, for example, the headline over a letter published in 1949 in
697: 555: 742: 847: 572: 1059: 643:
Alexander Sotirov; Marc Stevens; Jacob Appelbaum; Arjen Lenstra; David Molnar; Dag Arne Osvik; Benne de Weger (December 2008).
459: 239:-related software. (Rob Pike was a main figure in the creation of Plan 9 and wrote extensively on bad designs found in UNIX.) 784: 100:
instead. The original title of the letter, as submitted to CACM, was "A Case Against the Goto Statement", but CACM editor
377: 81: 673: 582:
A Mishra; V Shrivastava; S Banerjee; W Arbaugh (June 2006). "Partially Overlapped Channels Not Considered Harmful".
115:
Frank Rubin published a criticism of Dijkstra's letter in the March 1987 CACM where it appeared under the title
147: 547: 1204: 1161: 1005: 959: 808: 538: 1214: 1167: 1011: 965: 26: 802: 564: 826: 631: 596: 478: 442: 719: 877: 1219: 902: 734: 89: 1108: 772: 591: 437: 97: 851: 759: 1090: 522: 236: 1106: 93: 1107:
Donald Moore; Chuck Musciano; Michael J. Liebhaber; Steven F. Lott; Lee Starr (May 1987).
8: 1209: 1152: 996: 642: 950: 1149: 1131: 1082: 1041: 993: 947: 925: 794: 691: 679: 512: 465: 343: 295: 173: 64: 651: 669: 455: 347: 68:: "Rent Control Controversy / Enacting Now of Hasty Legislation Considered Harmful". 1135: 929: 683: 299: 122:. The May 1987 CACM printed further replies, both for and against, under the title 104:
changed the title to "Goto Statement Considered Harmful". Regarding this new title,
1123: 1086: 1074: 1033: 917: 661: 618: 601: 516: 504: 495: 469: 447: 335: 312: 285: 258: 177: 163: 44: 36: 1045: 420: 246: 47:
and related disciplines. Its use in this context originated with a 1968 letter by
21: 898: 730: 653: 209: 75: 48: 451: 389: 309:
RFC 1627: Network 10 Considered Harmful (Some Practices Shouldn't be Codified)
235:, which maintains a directory of "considered harmful" articles and hosts some 1198: 1024:
Kanada, Yasumasa (2005), "Events and Sightings: An obituary of Eiichi Goto",
873: 306: 101: 665: 644: 605: 508: 78:'s letter "Go To Statement Considered Harmful", published in the March 1968 433: 143: 105: 1078: 979: 921: 816: 658:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
339: 290: 273: 168: 151: 1127: 1037: 263: 109: 622: 581: 356: 617:. 2006 13th Working Conference on Reverse Engineering. pp. 19–28. 490: 197: 185:
Bruce A. Martin (November 15–19, 1976). "Letter O Considered Harmful".
326:
CA Kent; JC Mogul (January 1995). "Fragmentation Considered Harmful".
1109:"" 'GOTO Considered Harmful' Considered Harmful" Considered Harmful?" 704: 652:
Andy Crabtree; Tom Rodden; Peter Tolmie; Graham Button (April 2009).
317: 40: 398: 205: 196:(Full proposal text was included in post-meeting distribution; see 530: 213: 411: 369: 307:
Eliot Lear; Erik Fair; Dave Crocker; Thomas Kessler (July 1994).
190: 127:"GOTO Considered Harmful" Considered Harmful' Considered Harmful? 645:"MD5 considered harmful today - Creating a rogue CA certificate" 43:
have been used in the titles of at least 65 critical essays in
204: 112:
cheerfully complained that he was always being eliminated."
25:"Achievements considered harmful?" presentation at the 2010 723: 706: 86: 142: 493:(July 2005). "Human-centered design considered harmful". 129:. Dijkstra's own response to this controversy was titled 998:
What led to "Notes on Structured Programming" (EWD-1308)
476: 189:. Brookhaven National Laboratory, Upton, NY: X3J3: ANSI 85:(CACM), in which he criticized the excessive use of the 1160:. E.W. Dijkstra Archive. Center for American History, 1004:. E.W. Dijkstra Archive. Center for American History, 958:. E.W. Dijkstra Archive. Center for American History, 479:"IPv4-Mapped Addresses on the Wire Considered Harmful" 1154:
On a Somewhat Disappointing Correspondence (EWD-1009)
1181:"Cat-v.org Random Contrarian Insurgent Organization" 1180: 980:"Goto Statement Considered Harmful: A Retrospective" 51:published as "Go To Statement Considered Harmful". 613:Kapser, Cory; Godfrey, Michael W. (October 2006). 427: 396: 233:Cat-v.org Random Contrarian Insurgent Organization 247:"Networks Considered Harmful for Electronic Mail" 1196: 977: 770: 489: 421:""Considered Harmful" Essays Considered Harmful" 354: 271: 897: 782: 729: 615:"Cloning Considered Harmful" Considered Harmful 412:"Sending XHTML as text/html Considered Harmful" 325: 184: 1060:""GOTO Considered Harmful" Considered Harmful" 814: 872: 612: 418: 244: 74:was popularized among computer scientists by 800: 757: 696:: CS1 maint: multiple names: authors list ( 584:ACM SIGMETRICS Performance Evaluation Review 375: 1057: 891: 785:"Commandname Extensions Considered Harmful" 705:Rich Felker (a.k.a. 'dalias') (July 2013). 409: 120:GOTO Considered Harmful' Considered Harmful 1051: 629: 545: 214:"UNIX Style, or cat -v Considered Harmful" 131:On a Somewhat Disappointing Correspondence 595: 562: 477:Jun-ichiro itojun Hagino (October 2003). 441: 328:ACM SIGCOMM Computer Communication Review 316: 289: 262: 167: 1100: 39:"X considered harmful". As of 2009, its 20: 1142: 1026:IEEE Annals of the History of Computing 866: 745:from the original on September 18, 2019 575:from the original on December 27, 2023. 16:Phrase used in titles of critical texts 1197: 1023: 558:from the original on November 8, 2023. 546:Batchelder, Ned (September 29, 2007). 541:from the original on November 8, 2023. 940: 548:"Python's super (considered harmful)" 428:J Yoon; M Liu; B Noble (April 2003). 1148: 992: 946: 903:"Go To Statement Considered Harmful" 848:"Miscellaneous - Considered Harmful" 565:"Python's super() considered super!" 397:Jonathan Amsterdam (February 2002). 357:"Csh Programming Considered Harmful" 152:"Global Variable Considered Harmful" 563:Hettinger, Raymond (May 26, 2011). 531:"Python's Super Considered Harmful" 378:"Recursive Make Considered Harmful" 187:proposal considered by X3J3 members 13: 978:David R. Tribble (February 2005). 878:"Language Log: Considered harmful" 528: 430:Random waypoint considered harmful 231:This article is the namesake of a 14: 1231: 771:Joanna Rutkowska (October 2015). 355:Tom Christiansen (October 1996). 274:"Polymorphism considered harmful" 783:Alex North-Keys (January 2016). 654:"Ethnography considered harmful" 1173: 815:Alexander Rush (January 2019). 419:Eric A. Meyer (December 2002). 399:"Java's new Considered Harmful" 245:John McCarthy (December 1989). 1017: 986: 971: 840: 801:Drew DeVault (November 2016). 773:"Intel x86 considered harmful" 760:"Star Trek Considered Harmful" 410:Ian Hickson (September 2002). 1: 1162:University of Texas at Austin 1006:University of Texas at Austin 960:University of Texas at Austin 833: 809:Electron (software framework) 803:"Electron considered Harmful" 764:National Air and Space Museum 726:, which the author maintains. 403:Software Development Magazine 136: 630:Howard Chu (February 2008). 7: 817:"Tensor Considered Harmful" 632:"GnuTLS Considered Harmful" 452:10.1109/INFCOM.2003.1208967 272:C. Ponder; B. Bush (1992). 10: 1236: 1058:Frank Rubin (March 1987). 758:Paul Ceruzzi (June 2015). 388:(1): 14–25. Archived from 311:(Technical report). IETF. 54: 27:Game Developers Conference 1116:Communications of the ACM 1067:Communications of the ACM 910:Communications of the ACM 827:Tensor (machine learning) 735:"mdoc considered harmful" 707:"NULL considered harmful" 251:Communications of the ACM 96:of the day and advocated 720:C (programming language) 666:10.1145/1518701.1518835 606:10.1145/1140103.1140286 509:10.1145/1070960.1070976 98:structured programming 80:Communications of the 29: 1079:10.1145/214748.315722 922:10.1145/362929.362947 523:Human-centered design 376:Peter Miller (1998). 340:10.1145/205447.205456 291:10.1145/130981.130991 169:10.1145/953353.953355 94:programming languages 24: 1205:History of computing 1128:10.1145/22899.315729 1038:10.1109/MAHC.2005.37 660:. pp. 879–888. 264:10.1145/76380.316015 193:Standards Committee. 1150:Dijkstra, Edsger W. 994:Dijkstra, Edsger W. 948:Dijkstra, Edsger W. 623:10.1109/WCRE.2006.1 483:IETF Internet-Draft 278:ACM SIGPLAN Notices 156:ACM SIGPLAN Notices 1215:Edsger W. Dijkstra 1096:on March 20, 2009. 795:Filename extension 739:Groff Mailing List 392:on March 30, 2015. 72:Considered harmful 65:The New York Times 60:Considered harmful 33:Considered harmful 30: 876:(April 8, 2008). 733:(March 7, 2014). 636:LDAP Mailing List 552:nedbatchelder.com 461:978-0-7803-7752-3 257:(12): 1389–1390. 150:(February 1973). 1227: 1189: 1188: 1177: 1171: 1165: 1159: 1146: 1140: 1139: 1113: 1104: 1098: 1097: 1095: 1089:. Archived from 1064: 1055: 1049: 1048: 1021: 1015: 1009: 1003: 990: 984: 983: 975: 969: 963: 957: 944: 938: 937: 907: 895: 889: 888: 886: 884: 870: 864: 863: 861: 859: 850:. Archived from 844: 824: 806: 792: 779: 777: 767: 754: 752: 750: 717: 715: 713: 701: 695: 687: 648: 639: 626: 609: 599: 576: 559: 542: 520: 491:Donald A. Norman 486: 473: 445: 424: 415: 406: 393: 367: 365: 363: 351: 322: 320: 318:10.17487/rfc1627 303: 293: 268: 266: 228: 226: 224: 194: 181: 171: 126: 119: 45:computer science 37:phrasal template 1235: 1234: 1230: 1229: 1228: 1226: 1225: 1224: 1195: 1194: 1193: 1192: 1179: 1178: 1174: 1157: 1147: 1143: 1111: 1105: 1101: 1093: 1062: 1056: 1052: 1022: 1018: 1001: 991: 987: 976: 972: 955: 945: 941: 905: 899:Edsger Dijkstra 896: 892: 882: 880: 871: 867: 857: 855: 846: 845: 841: 836: 775: 748: 746: 731:Eric S. Raymond 711: 709: 689: 688: 676: 597:10.1.1.115.9060 529:Knight, James. 462: 443:10.1.1.129.5604 361: 359: 222: 220: 210:Brian Kernighan 139: 124: 117: 76:Edsger Dijkstra 57: 49:Edsger Dijkstra 35:is a part of a 17: 12: 11: 5: 1233: 1223: 1222: 1220:Computer humor 1217: 1212: 1207: 1191: 1190: 1172: 1141: 1122:(5): 351–355. 1099: 1073:(3): 195–196. 1050: 1016: 1014:) (June, 2001) 985: 970: 939: 916:(3): 147–148. 901:(March 1968). 890: 865: 854:on May 3, 2009 838: 837: 835: 832: 831: 830: 812: 798: 780: 768: 755: 727: 702: 674: 649: 640: 627: 610: 579: 578: 577: 560: 526: 487: 474: 460: 425: 416: 407: 394: 373: 352: 323: 304: 269: 242: 241: 240: 202: 182: 138: 135: 108:quipped that " 56: 53: 15: 9: 6: 4: 3: 2: 1232: 1221: 1218: 1216: 1213: 1211: 1208: 1206: 1203: 1202: 1200: 1186: 1182: 1176: 1170:) (May, 1987) 1169: 1168:transcription 1163: 1156: 1155: 1151: 1145: 1137: 1133: 1129: 1125: 1121: 1117: 1110: 1103: 1092: 1088: 1084: 1080: 1076: 1072: 1068: 1061: 1054: 1047: 1043: 1039: 1035: 1031: 1027: 1020: 1013: 1012:transcription 1007: 1000: 999: 995: 989: 981: 974: 967: 966:transcription 961: 954: 953: 949: 943: 936: 931: 927: 923: 919: 915: 911: 904: 900: 894: 879: 875: 874:Mark Liberman 869: 853: 849: 843: 839: 828: 822: 818: 813: 810: 804: 799: 796: 790: 786: 781: 774: 769: 765: 761: 756: 744: 740: 736: 732: 728: 725: 721: 708: 703: 699: 693: 685: 681: 677: 675:9781605582467 671: 667: 663: 659: 655: 650: 646: 641: 637: 633: 628: 624: 620: 616: 611: 607: 603: 598: 593: 589: 585: 580: 574: 570: 569:Deep Thoughts 566: 561: 557: 553: 549: 544: 543: 540: 536: 532: 527: 524: 518: 514: 510: 506: 502: 498: 497: 492: 488: 484: 480: 475: 471: 467: 463: 457: 453: 449: 444: 439: 435: 431: 426: 422: 417: 413: 408: 404: 400: 395: 391: 387: 383: 379: 374: 371: 358: 353: 349: 345: 341: 337: 333: 329: 324: 319: 314: 310: 305: 301: 297: 292: 287: 283: 279: 275: 270: 265: 260: 256: 252: 248: 243: 238: 234: 230: 229: 219: 215: 211: 207: 203: 201: 199: 192: 188: 183: 179: 175: 170: 165: 161: 157: 153: 149: 145: 141: 140: 134: 132: 128: 121: 113: 111: 107: 103: 102:Niklaus Wirth 99: 95: 91: 88: 84: 83: 77: 73: 69: 67: 66: 61: 52: 50: 46: 42: 38: 34: 28: 23: 19: 1184: 1175: 1153: 1144: 1119: 1115: 1102: 1091:the original 1070: 1066: 1053: 1029: 1025: 1019: 997: 988: 973: 951: 942: 933: 913: 909: 893: 881:. Retrieved 868: 856:. Retrieved 852:the original 842: 820: 789:talisman.org 788: 763: 747:. Retrieved 738: 710:. Retrieved 657: 635: 614: 587: 583: 568: 551: 534: 503:(4): 14–19. 500: 496:Interactions 494: 482: 434:IEEE INFOCOM 429: 402: 390:the original 385: 381: 360:. Retrieved 331: 327: 308: 284:(6): 76–79. 281: 277: 254: 250: 232: 221:. Retrieved 217: 195: 186: 162:(2): 28–34. 159: 155: 144:William Wulf 130: 123: 116: 114: 106:Donald Knuth 79: 71: 70: 63: 59: 58: 32: 31: 18: 821:Harvard NLP 712:January 25, 362:January 25, 223:January 25, 1210:Snowclones 1199:Categories 883:August 17, 858:August 17, 834:References 749:October 4, 137:Snowclones 41:snowclones 1185:cat-v.org 1032:(3): 92, 692:cite book 592:CiteSeerX 590:: 63–74. 438:CiteSeerX 348:207997774 334:: 75–87. 148:Mary Shaw 90:statement 1136:42951740 935:program. 930:17469809 743:Archived 684:13646185 573:Archived 556:Archived 539:Archived 535:fuhm.net 300:21140034 212:(1983). 206:Rob Pike 110:Dr. Goto 1087:6853038 952:EWD-215 517:1698853 470:3779394 370:C shell 198:summary 191:Fortran 178:2388792 55:History 1134:  1085:  1046:675701 1044:  928:  682:  672:  594:  515:  468:  458:  440:  346:  298:  237:Plan 9 218:USENIX 176:  1158:(PDF) 1132:S2CID 1112:(PDF) 1094:(PDF) 1083:S2CID 1063:(PDF) 1042:S2CID 1002:(PDF) 956:(PDF) 926:S2CID 906:(PDF) 776:(PDF) 680:S2CID 513:S2CID 466:S2CID 382:AUUGN 344:S2CID 296:S2CID 174:S2CID 118:' 885:2009 860:2009 825:See 807:See 793:See 751:2020 724:musl 722:and 718:See 714:2020 698:link 670:ISBN 521:See 456:ISBN 368:See 364:2020 225:2020 208:and 146:and 87:GOTO 1124:doi 1075:doi 1034:doi 918:doi 662:doi 619:doi 602:doi 505:doi 448:doi 336:doi 313:doi 286:doi 259:doi 164:doi 92:in 82:ACM 1201:: 1183:. 1130:. 1120:30 1118:. 1114:. 1081:. 1071:30 1069:. 1065:. 1040:, 1030:27 1028:, 932:. 924:. 914:11 912:. 908:. 819:. 787:. 762:. 741:. 737:. 694:}} 690:{{ 678:. 668:. 656:. 634:. 600:. 588:34 586:. 571:. 567:. 554:. 550:. 537:. 533:. 511:. 501:12 499:. 481:. 464:. 454:. 446:. 432:. 401:. 386:19 384:. 380:. 342:. 332:25 330:. 294:. 282:27 280:. 276:. 255:32 253:. 249:. 216:. 200:.) 172:. 158:. 154:. 133:. 1187:. 1166:( 1164:. 1138:. 1126:: 1077:: 1036:: 1010:( 1008:. 982:. 968:) 964:( 962:. 920:: 887:. 862:. 829:. 823:. 811:. 805:. 797:. 791:. 778:. 766:. 753:. 716:. 700:) 686:. 664:: 647:. 638:. 625:. 621:: 608:. 604:: 525:. 519:. 507:: 485:. 472:. 450:: 423:. 414:. 405:. 372:. 366:. 350:. 338:: 321:. 315:: 302:. 288:: 267:. 261:: 227:. 180:. 166:: 160:8 125:'

Index


Game Developers Conference
phrasal template
snowclones
computer science
Edsger Dijkstra
The New York Times
Edsger Dijkstra
ACM
GOTO
statement
programming languages
structured programming
Niklaus Wirth
Donald Knuth
Dr. Goto
William Wulf
Mary Shaw
"Global Variable Considered Harmful"
doi
10.1145/953353.953355
S2CID
2388792
Fortran
summary
Rob Pike
Brian Kernighan
"UNIX Style, or cat -v Considered Harmful"
Plan 9
"Networks Considered Harmful for Electronic Mail"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑