Tuesday, May 29, 2007

Adventures of a Programmer: You're a Programmer!?!

When I tell people that I am a programmer, I usually get "the look". Programmers know the one I mean. The look that reflects the uninitiated's memory of The Matrix, Hackers, Bait, and Swordfish. They have no concept of what either a hacker or a programmer is. To them, they are the same thing: people typing arcane incantations on the screen that makes the computer do stuff.

Following "the look", I get "the question". Again, programmers (and hackers) know the one I mean. "Can you hack into (insert insane and illegal request here) for me?"
The answer I always give:"No, that would be illegal and I don't know how to do that."

Let's explore the differences between hackers and programmers.

Definition:


  • Hacker: A person who enjoys exploring the details of computers and how to stretch their capabilities. A malicious or inquisitive meddler who tries to discover information by poking around. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn on the minimum necessary. (http://www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html)

  • Programmer: A programmer is a person who masters software engineering and writes source code in the course of software development. In language-oriented development, the programmer has to learn the details of the domain to be able to write a direct solution. In domain-oriented development, the programmer writes code for a generator instead of a direct solution. (http://intentsoft.com/technology/glossary.html)


  • Computer languages:

  • Real hackers usually learn several very different languages, mostly open source.

  • Programmers usually specialize in one or two related languages. These languages can be open source or proprietary.


  • Intent :

  • Hackers want freedom of information. They use their skills to find information and make it public stating a right to know.

  • Programmers are about protecting their information from hackers. They use the best security methods at their disposal to protect a client's information from unauthorized access.


  • Diet: No difference. Mountain Dew, coffee, Pop-tarts, and pizza.

    Views on "suits": No difference. Both view upper management with a degree of contempt.