Sunday, March 19, 2017
Sources of technical debt
Wednesday, February 08, 2017
Monday, January 16, 2017
In praise of kafka
Cool unhyped languages
Monday, October 10, 2016
Easier git squash
That way involves a lot of merging work, one merge for each commit.
You can avoid all of that work by instead using the git checkout branch -- file usage.
E.g. you'd like to merge feature/foo onto master using a single commit:
git fetch origin master
git checkout -b feature/foo-squashed origin/master
rm -rf *
git checkout feature/foo -- .
git commit -a
git push origin feature/foo-squashed:feature/foo
Monday, July 04, 2016
Release workflow
- master - This branch lives forever, and all changes are eventually merged to it.
- release branches - These are branched from master for each major release candidate.
Master
Release Branches
Example
Tracking Bugfixes
Cherry picking
Hotfix Branches
Example
Advanced Topics
Gitflow and ProdFlow
We branch tag 1.2 to hotfix/1.2-LN.
We branch hotfix/1.2-LN to bugfix/777...
Deserializing Merges
Example
Conclusion
Wednesday, November 18, 2015
Sunday, December 28, 2014
Extensible Software and Dependency Injection
Supporting change is a big challenge in programming. We want to make the most likely kinds of change quick and easy. How do we do that with Dependency Injection?
So if you have code that does five things that all have the same pattern, you'd like to be able to easily add a sixth. Common examples are programs pulling from multiple sources of data, and programs performing multiple validations. The technical name for this kind of thing is the Open Closed Principle.
If your five things are complicated, their code might organically spread out over your system...
setup();
doWork();
cleanup();
void setup() {
setupForDataSourceA();
setupForDataSourceB();
...
}
void doWork() {
workForDataSourceA();
workForDataSourceB();
...
}
...
The idiomatic way to handle this in java is with interfaces:
interface DataSource {
void setup();
void doWork();
void cleanup();
}
So each data source implements the interface, and many parts of the general code loop over a set of instances of the interface.
for (DataSource datasource : datasources) {
datasource.setup();
}
for (DataSource datasource : datasources) {
datasource.doWork();
}
...
If you're using Guice for your dependency injection, when you hear the word "set" you might be tempted to use multibindings.Or you might think, "wouldn't it be cool to add a new datasource without having to change any existing code". You could write a whiz bang code generation framework that automatically wires up implementations, either purely because they implement the interface or when they are additionally annotated.
Keep it simple sweety! Remember the original goal: making software easy to change. When the software is too clever, it becomes harder to change over time, especially as multiple programmers work on it.
There's a simple way to do it in Guice:
@Singleton
class DataSources {
Set datasources = new HashSet();
public Set getDataSources() {
return Colletions.unmodifiableSet(set);
}
@Inject void setDataSourceA(DataSourceA datasource) {
datasources.add(datasource);
}
@Inject void setDataSourceB(DataSourceB datasource) {
datasources.add(datasource);
}
...
}
This works without any additional binding configuration, using Guice's JustInTimeBindings support for eligible constructors.This wiring is vanilla java, and surprisingly not Guice's embedded domain specific language. These implementations aren't typical injected dependencies, because the design of the application requires that you run lots of them.
Don't be scared by the idea of a concrete class, because the framework code still only ever relies on the interface. The DataSources class above has the same testing burden as Guice modules. If you don't unit test your Guice modules, don't unit these classes either.
In addition to being more simple than multibindings, this pattern is much more explicit because the full configuration is in one place. Multibindings allow multiple Guice modules to add to the one binding.
It's one of the few cases where setter injection is best, though it works fine with field and constructor injection too. Setter injection enables you to add new instances by editing a single location in the composing class. It also allows you to simply subclass in order to compose an additional group of instances.
Thursday, December 26, 2013
That way, when the application functionality is still incomplete the actual failing test will not break the build. When the functionality is ready, the inverted test will start breaking the build, so that you don't forget to enable it.
import org.junit.rules.TestRule;
import org.junit.runner.Description;
import org.junit.runners.model.Statement;
import java.lang.annotation.*;
/*
* To use in a testcase, include a line:
*
@Rule
public NotImplemented.MustFail notImplementedRule = new NotImplemented.MustFail();
*
* and annotate individual test methods:
*
@NotImplemented @Test
public void someTest() {
...
}
*
*/
@Retention(RetentionPolicy.RUNTIME)
@Target(ElementType.METHOD)
public @interface NotImplemented {
String value() default ""; //to enable grouping tests; doesn't affect tests
boolean invertTest() default true;
public static class MustFail implements TestRule {
@Override
public Statement apply(final Statement base, Description description) {
NotImplemented annotation = description.getAnnotation(NotImplemented.class);
if (annotation == null || !annotation.invertTest()) {
return base;
} else {
return new Statement() {
@Override
public void evaluate() throws Throwable {
try {
base.evaluate();
} catch (AssertionError e) {
return;
}
throw new AssertionError();
}
};
}
}
}
}
Sunday, July 18, 2010
Limited video for kids
Parents that use linux can easily have their computer play just one movie with the following script:
if [ "$1" ]
then
totem --fullscreen "$@" &
fi
xtrlock
It starts playing the video(s) you want, but then prevents the kids from playing other videos or engaging in other unsupervised fiddling with the computer.
xtrlock needs to be installed, easily for example from the standard Ubuntu Software Center in Ubuntu 10.04.
You can create a Launcher in the panel for this script and a %F paramter, and drag videos to it from the File Browser.
Sunday, July 05, 2009
Google Strategy
Google has login-based services, like Gmail. These are most like other companies' internet services. They also have the most lock-in effect, though Google expends some effort to reduce it (for example allowing downloading and forwarding away email messages). These services enrich Google search data with user identity data.
Google has internet growth services, like Chrome, Android, and News. In general, companies would like to reduce "substitutes" and increase "complements". Since Google has dominant marketshare of internet search, anything that increases internet use is a complement. Google can run ads on all of these services, and to varying degrees their users are more likely to be Google search users. Developing these services is also a little like Military Keynesianism. It gives Google engineers fun projects to work on, helping Google to get and keep top engineers, who help it to maintain its internet search dominance.
Google has the internet. Since Google is the king of search, it will vigorously defend the internet against closed competing networks like the new social networks Facebook, LinkedIn, and Twitter. At least three distinct Google projects, though they also occupy the second category, attempt to open up the social software world: Social Graph API, Open Social, and Wave. This makes Google "the good guys," because they'll always try to bring the fight to the open web, where they have the competitive advantage. Now, if Google didn't have a challenger, it might just release something into the first category (Orkut for example), but when they do have a competitor, everyone will end up being a lot better off. Wave promises to be a wonderful open technology, though it will put a lot of social software companies out of business.
Thursday, July 26, 2007
Temporal and Bitemporal in One Sentence
Tuesday, June 19, 2007
Distributed Revision Control Yields Centralized Advantages
DRCS make code review much easier. Instead of using an entirely different system for managing the code review process, developers can check all of their un-reviewed changes into a branch, and merge changes as they get reviewed.
DRCS can support graduated continuous integration. In sufficiently large projects, continuous integration can cause frequent build breakage. Instead of having a single, volatile HEAD, subprojects can have their own independent integration branches, which they merge to the superproject integration branch at longer intervals.
DRCS support "lines of development", or working on multiple independent features. With traditional RCS, once a feature is committed it becomes part of the blob, and may not easily be dealt with as a separate identity.
The original motivation for DRCS was empowering decoupled open source contributors, so it's mildly ironic that this functionality should be so valuable for BigCo development as well.
Wednesday, May 30, 2007
Libertarian OS
It'd need:
- A security framework
- A dependency framework
- No extra baggage
- request reading or writing an existing file, selected by the user
- request writing a new file
- suggest a url to visit (optionally with post data).
For dependencies, programs should specify urls (possibly self-certifying) of code that they depend on. All code could be cached locally or downloaded anew as desired. This is in the spirit of package management approaches without "side effects", like Nix and Zero Install.
Once there's a sufficiently powerful dependency framework, we need not hard code any dependency on "standard software" like programming languages or gui toolkits. Programs could be transported in llvm bytecode.
Implicitly trusted programs could be subject to phishing attacks just as websites currently are, so it would be desirable to have some sort of petnames scheme, as well as a spoof-resistant UI for distinguishing programs.
Monday, March 20, 2006
Dinosaurs
Me: No.
My daughter: Not even little purple ones?
Monday, February 13, 2006
"Model" in MVC
Think of a text box that accepts date values. When the user types "2006-" and then pauses, the application doesn't yet have a date, so it doesn't have anything to put in its data model. The string "2006-" isn't stored somewhere in the view; it's stored in the model that backs the UI.
To integrate your UI and your data model, you've got to use data binding code, like the jgoodies derived data binding code. It would seem that MVC is more about UI framework implementation than interface.
This explains why it's so cumbersome to switch between GUI widgets that would appear to represent the same data, like a select box and a group of radio buttons. It'd actually be against the MVC philosophy to support this, because it'd put artificial constraints on the respective widget models.
Monday, November 28, 2005
Consistent Types
The problem is that extension classes aren't really subtypes of extended classes anymore. They violate the Liskov Substitution Principle.
Interfaces for encapsulation don't have this problem.
(Though it'd be great if all languages had something like c#'s "override" keyword :).)
UPDATE: I was mistaken. Different methods are called on an object in different static "contexts". For example:
((ArtisticCowboy)joe).draw()
runs one method, and((Cowboy)joe).draw()
runs another.This is what C# does, but I don't know if it's wise.
Thursday, November 17, 2005
Future Refactoring UI
Really, automatic refactoring means the computer automatically makes all appropriate changes to accompany your change. It's all about moving and renaming. The tools should get rid of their complicated interfaces, and just support a mode "don't let me introduce any errors."
Simple changes are easy to spot, but moves need to be done with Cut&Paste. For example, cutting from one place and pasting to another should fix up the pasted code to work in the new location. It should also fix up callers to the code at the original location so that they now call to the new location. The user shouldn't have to specify what type of code is moving, or what type of move it's making.
If this could be made fast enough, programmers might want to always work this way. They'd just have to get in the habit of defining before using, and deleting usages before deleting definitions.
Wednesday, November 16, 2005
Everyone is Like Me, and bad UI
Users do not care about programs. They think, "Just do it," and, "Get out of my face." Programmers love their programs, so they think everyone else does too. For example, they even write programs that hassle users to make implementation decisions.
In general, every person thinks that everyone is just like himself. Worse, every person thinks that everyone is like himself right now. In the linked example, even the developers won't care about the implementation a year after they've coded.
There is a word for this, though it seems seldom used: automorphism
Sunday, October 30, 2005
Interfaces for Encapsulation
With sufficiently good refactoring support, encapsulation decisions don't affect code evolution.
Especially according to the XP design principle of collective code ownership, it's easy to change callers of an interface when the interface changes. Though people reading the code will need to understand the changes, that's far more efficient than making artificial barriers to reuse. Encapsulation is powerful; forced encapsulation is onerous.
This is true for a single organization, no matter how large its code base. Once code is "published" however, all bets are off. Code obviously can't be refactored across administrative boundaries. That being the case, we should care about "published" instead of "public".
For encapsulation of published code, separate interfaces are much more useful than visibility keywords. A class with a single public method is better represented by a separate interface containing a single method. When that interface is published, it never changes. In Java for example, the old interface could be kept in a separate jar file, which clients can continue using even after extended versions become available.
More originally, we should allow extending code through an interface. Extending through an interface means that new code will never downcall to a method that isn't in the interface. This is an elegant solution to the fragile base class problem. (Someone recently showed me the cute new c# modifiers "new" and "override". They protect against accidental downcalls, but they don't protect against replacment of methods called by collaborating classes.)
Extending through an interface might also help with downcalling into unrelated methods with mixins and multiple inheritance. For example, to create an "artistic cowboy" with multiple inheritance, we'll inherit from "artist" and "cowboy". Though we want his artistic nature to be dominant, we don't want the cowboy method "drawAndShoot()" to downcall into the artist method "draw()". We can achieve this by extending artist through an interface that excludes "draw()".
Monday, October 10, 2005
DRM and the Little Guy
A general purpose DRM system can have a significant impact on society. If we're going to allow our computers to enter into contracts for us, we need some safeguards to avoid creating an information dystopia. The restrictions that we allow publishers to place on consumers should themselves be restricted. Generally, it shouldn't be possible for publishers to artbitrarily revoke access to their work. The set of digitally managed "rights" should be standard, easy to understand, and when possible, it should not require an ongoing relationship with the publisher.
This task is more difficult from the technology standpoint, and it'll detract from the generality of the full DRM dream, but it could work.
Friday, October 07, 2005
Templates for Environments
Manually switching code from one environment to another is tedious and error-prone, but not all tools can make it completely automatic in all cases (for example, enabling stored procedures to run against differently named databases). Theoretically, templates are also be useful for unifying environment configuration across languages, but they're really essential for languages that don't support the necessary abstraction.
Even on platforms that have the necessary support, environment management can get gnarly. For example, java has a great configuration mechanism in the form of "properties" and the improved "preferences". If different sets of property files are used, however, it's easy for the non-production property sets to get out-of-date. The solution is to ensure that only a small fraction of properties are environment specific, and put only those in a separate file.
Templates generally break tools for live editing. For example, you can't "alter table" in a test database and easily have that change apply to your template. Or use a gui wizard to maintain templatized xml files for your application servers. We'd like to be able to "round-trip" templates, to be able to automatically generate templates from live files, as well as generate live files from templates. For this to be easy, the templates must meet two requirements:
- there must be a one-to-one correspondence between template variables and the values in the environment used to generate templates.
- template values must be unique.
An example of #2 is that a machine can't be named "foo" because substituting a template variable like "@FOO_MACHINE@" will also substitute "buffoon" and "foot".
Otherwise, the template generation will have to get complicated.
Tuesday, August 09, 2005
Google Maps
It should also support taking the union of the sets of locations created by different API sites.
Wednesday, August 03, 2005
Mixin Requirements
- never down-calling into unrelated mixins
- a mechanism for disambiguating constructor parameters
class artist:
def draw(self): ...
class cowboy:
def draw(self): ...
def drawAndShoot(): self.draw() ...
artisticCowboy = mixin(artist, cowboy)()
artisticCowboy.draw()
should call artist.draw
,but
artisticCowboy.drawAndShoot()
should call cowboy.draw
,without needing to be explicitly specified
Example 2:
class file:
def __init__(self, root): ...
class plant:
def __init__(self, root): ...
we need some mechanism for specifying plant
's and file
's constructor parameters independentlyUPDATE: Silly me, number one would be great for multiple inheritance also.
Tuesday, August 02, 2005
Improving the GUI Editor 2
It would solve the biggest problems with current GUI builders: round-trip-ability and lockin.
It would enable a single builder to easily support GUIs that run with different languages and widget sets, including HTML.
The standard should specify the least common denominator, as well as extra features and their fall-backs. It shouldn't specify bindings or fancy template support, but it should specify how builders maintain information for features that they don't handle.
Monday, July 25, 2005
Mixins instead of Traits
import copy
def mixin(*classes):
c=copy.copy(classes[0])
if len(classes) > 1:
c.__bases__ += classes[1:]
return c()
class a:
def f(self): return "a.f"
def g(self): return "a.g"
class b:
def f(self): return "b.f"
def g(self): return "b.g"
class c:
def g(self): return a.g(self)
obj=mixin(c, b, a)
assert(obj.f() == "b.f")
assert(obj.g() == "a.g")
Friday, July 22, 2005
Improve the GUI Editor
Just like with html, users usually won't care about the api for manipulating their presentation, but that's OK. (The favored api for html is the javascript dom.)
Monday, July 18, 2005
Python Shell
Windowing systems obsolesce job control, leaving tab completion, history, and prompting as the important shell functionality. Python's readline bindings can handle the first two.
LazyPython and IPython both allow ommitting parantheses, commas, and quotes around function parameters. They use standard python's sys.excepthook, so that they only extend python syntax that would've illegal anyway.
This has two problems. First, there are cases that don't work, like calling a method without parameters. Second and more importantly, excepthook still throws an exception, and so discards context. That means you can't do:
for i in range(n): some_convenient_method i
.So in order to do it right, we'll have to hack the interpreter, and while we're at it, we could even support working directly with the input. For example, you type
some_convenient_method
and then a space, and the interpreter inserts a paranthesis. You always have legal python code. IPython prints the legal python code after you hit return, which isn't as nice.Incidentally, until we have interfaces or inference, tab completion can only work with already instantiated objects. (For example you can't complete
list().a
to list().append
.)
Wednesday, July 13, 2005
Electronic Paper
Highlights: as easy-to-read as paper, extremely low-power, flexible, color. Product to be available between one and two years (April 2006 to March 2007).
Friday, June 24, 2005
Is It You?
if you have a bad experience with someone, it's just him.
if you have a bad experience with everyone, it's you.
Tuesday, June 21, 2005
Oppressive Corporate Firewalls
Putty supports SSL tunnelling via SSL out-of-the-box:
- on your server, add "Port 443" to your sshd_config
- in putty new session, specify 443 in the port box, and
- in its Connection/Proxy category, check HTTP and specify your proxy info
Monday, June 20, 2005
Perl Best Practices (for corporate coders)
Perl code should be as simple as possible. That means:
- Use as few language features as possible.
- Use as few lines as possible, as long as they're readable.
- Don't overdesign.
- Don't try to write perl that looks like java.
Separate functionality out into multiple small scripts, the smallest meaningful rerunnable units. For example, have one script handle generating a report and another script handle distributing it.
Always "use strict".
Avoid using $_ in loops except for regular expressions.
Avoid reversed flow control operators except for error handling ("doSomething or die()").
Avoid redundant comments.
Avoid overloading on context. (e.g. sub fu { wantarray() ? X() : Y() })
Avoid special symbol variables. Use the long versions and "use English" (e.g. "$INPUT_RECORD_SEPARATOR" instead of $/). Comment appropriately.
Avoid using shell tools (e.g "awk", "grep", and even "date" and "cp"). If perl can do it, do it in perl.
Prefer "my" over "local".
Put "my" declarations in the tightest possible scope.
Have users of modules explicitly import the tokens that they want (e.g. "use SomeModule qw( SomeFunc $SomVar )").
Avoid writing huge modules with lots of independent functionality; people are afraid to change them.
Avoid writing modules altogether, unless you're absolutely sure that your code will be reused.
If you're using references, have the first character of the expression reflect the type of the expression (e.g. use "$somearrayref->[3]" instead of "@$somearrayref[3]").
If your "configuration" is sufficiently complex (or unchanging) just define at the top of your script.
Wednesday, June 08, 2005
Next Generation Web
Of all the desirable features for a development platform, one of the most desirable is the ability to write and deploy code quickly and easily. This is how people explain the success of the web and web applications like the google suite.
The next generation web will protect users even from malicious code without requiring much greater responsibility. The new security will have to support three classes of features:
- manage state
- allow the code from one site to affect the user's experience of other sites (like greasemonkey for example)
- clearly determine what site is responsible for a given interaction (to combat phishing for example)
Thursday, May 26, 2005
Another Solution to the Fragile Base Class Problem
class sgd(type):
def __init__(cls, name, bases, dct):
overridden_bases = [ base for attr in dct.keys() for base in cls.__mro__ if hasattr(base, attr) and not attr.startswith('__') ]
required_methods = [ (base,m) for base in overridden_bases for m in base.__dict__ if m not in cls.__dict__ and not m.startswith('__') ]
if required_methods:
raise "unimplemented methods:", required_methods
super(sgd, cls).__init__(name, bases, dct)
class sgd_class(object):
__metaclass__ = sgd
and then:
>>> class a(sgd_class):
... def f(self): pass
... def g(self): pass
...
>>> class b(a): pass
...
>>> class c(a):
... def f(self): pass
... def g(self): pass
...
>>> class d(a):
... def f(self): pass
...
Traceback (most recent call last):
File "<stdin>", line 1, in ?
File "x.py", line 12, in __init__
if required_methods: raise "unimplemented methods:", required_methods
unimplemented methods:: [(<class '__main__.a'>, 'g')]
>>>
Monday, May 16, 2005
People Don't Read, and What To Do About It
Not reading is a lot more prevalent than you think. Most people don't enjoy reading. Even those who do have too little time to read everything they'd like.
The solution is to write your emails in order of decreasing importance. Don't write in chronological order, or even in logical order. Employ the journalistic technique of "heads, decks, and leads" or headlines, sub-headlines, and leading paragraphs.
This is most important for messages to groups of people, and for documentation messages. In other situations, there isn't so much motivation to write more text than will be read.
(This is ironic as a blog post; those who see this post presumably do read. But this advice is for you! You don't realize how unusual you are.)
Friday, May 13, 2005
Exceptions Are Good For You
Consider:
#read user password without displaying on screen
os.system("stty -echo")
print "Password:",
password = raw_input()
os.system("stty echo")
print
What happens if the user changes her mind, and kills the program? All subsequent typing in the shell will be invisible! Checking for errors won't help here.The only difference in modern languages is that the rest of a program may continue to run even after a function has been interrupted. This creates a new kind of obligation, but not a big one:
- you already have to worry about external state without exceptions (above example)
- you don't have to worry about local function state, because the exception causes it to be thrown out
- you do now have to worry about non-local state
An effects system would at least catch the omission; it'd flag a function that makes multiple write calls to objects not mentioned in a
finally
cleanup block.In languages without exceptions, you have to use a signal handler in the above example; in languages with exceptions, you can use a
finally
clause for the stty echo
.(In the spirit of the recent exception buzz (Joel Spolsky's popularization of Raymond Chen's rant, and GvR's "resource allocation" work)
Friday, May 06, 2005
Click For Each Page: ACM Queue
To get around this, you can often click their button "Print This Article" or equivalent.
For some sites, you may have to visit the last section and then click "Print This Article" there. Cute, eh? This is how I read ACM Queue.
Capacity For Self Deception
Someone should start a broad catalog of memes, not just pop-culture memes. Google book search shows our "capacity for self deception" going back to the 19th century.
Though it's easier to demonstrate this for criminals, it also applies to the best of us.
Friday, April 29, 2005
We Need Core Data
The hierarchical filesystem is not meeting our needs. For all of our documents, we want:
- easy persistence
- undo and redo
- gui prototyping
- revision control
- transactions
- search
- annotation
This new API can't handle behavior and stay language/platform independent. That is, it can't support the object oriented approach of only allowing access to state through member functions.
On the other hand, it would be nice to use regular oop languages to specify the model.
Thursday, April 21, 2005
Justification of Python Sequence Subscripts
myseq[ m : n ]
myseq[ m : n+1 ]
myseq[ m-1 : n ]
myseq[ m-1 : n+1 ]
myseq[m]
.Perl uses #1, which is wrong because you can't iterate down to an empty subsequence with
myseq[m:m]
. Representing this with myseq[m:m-1]
is clearly evil, and it breaks completely for m = 0.The rationale for indices starting from 0 instead of 1 isn't as strong: that representing the whole list as
myseq[0:len(myseq)]
is "nicer" than representing it as myseq[1:len(myseq)+1]
. Perl doesn't even have this rationale :).Ironically, reverse indices in python do go from 1 to n+1, or rather from -1 to -(n+1). This is fortuitous, because representing reversed(myseq) with myseq[-1::-1] is nicer than representing it with myseq[0::-1].
inspired by a note from Dykstra
Wednesday, April 20, 2005
Type, Effect, and Inference
If you're wondering how to convince people to create even more code annotation, don't worry; we'll be able to infer effect information from the code itself, just as we can infer type information from the code itself.
Even with perfect inference, explicit annotation will be useful for external data and for specifying contracts.
Thursday, April 07, 2005
RDF and the WWW
They're both edge-labelled directed graphs.
Though people generally aren't so careful with their link texts, these are just like RDF predicates. The linking page is the subject, and the linked page is the object.
Tomboy and the Future
It looks like a simple implementation of post-it notes, but it has a few features which make it wonderful:
- automatic save
- ability to easily link any text to a new note (sort of like a wiki)
- fast full search
- clickable web links
- "who links to me?" button
- ability to list nodes that are linked to by all of a set of nodes
- ability to open a node by path, with autocompletion
- "publish" button, for a single node or for a group of nodes
- ability to manage the graph graphically
#3 would replace bookmarks.
#4 would implement a blog authoring tool.
#5 would give you a mindmap.
This stuff shouldn't be in a particular application, but should be available to the whole system. It'll be great if this notes application demonstrates of the power of the approach, and motivates people to implement it more widely.
Monday, April 04, 2005
Corporate Personhood
Corporations are disproportionately powerful, because they concentrate huge amounts of money and therefore political influence. Is this good or bad? On the one hand, "what's good for GE is good for America." On the other hand, corporations by law must pursue no objective over maximizing shareholder value. This means externalizing costs whenever possible. For example, a corporation sells 100,000,000 widgets whose use will kill 100 people. That corporation may not legally settle for a smaller profit in order to make its widgets safer, and thereby save the 100 people. (The "what's good for GE" proponents may counter that the public sector makes such cold-hearted calculations all the time, and that the economic activity of the widgets is part of the "rising tide that lifts all boats," making the whole society wealthier and safer.)
What does this have to do with "corporate personhood?" Corporations concentrate huge amounts of capital, but they defuse almost all responsibility. When a corporation makes a million dollars, that money is shared by all its owners. When a corporation kills a person, that guilt is claimed by no one.
Though a corporation is fundamentally no more than a financial partnership, the existence of the corporate entity insulates its officers from morality and from the law. A bad action could spring from the combined actions of many members of a corporation, though none of the individual actions is bad. Even when a single member performs a bad action on behalf of the corporation, it's difficult to detect and prosecute. This insulation itself encourages bad behavior, because members' responsibility to the corporation is more pressing than their responsibility to the society and its laws.
Basing the rights of the corporation on the rights of the person gives corporations additional power. The law gives individuals various rights to protect them from the power of the state (e.g. the Bill of Rights). Sharing these rights with corporations gives them even more power. Treating people and corporations the same allows using a rhetoric of "freedom" to weaken and eliminate regulation, when regulation is the best tool for making corporations consider important externalities, and the only way to correct market failures.
Friday, April 01, 2005
Emulating maxdepth for Solaris find
GNU find can do this with "-maxdepth 1", but Solaris find can't. To get the same functionality for Solaris find, you can use this hack:
find /some/path/. \( -type d -a \! -name . -prune \) -o -type f -print
That is, first prune all directories that aren't named ".", then print the names of the remaining files. It's important that the path be "/some/path/." instead of "/some/path", because that's what enables special treatment for the top level directory.
Thursday, March 31, 2005
Partial Replacing Lambda?
partial(operator.add, 1)
isn't such an attractive substitute for lambda x: x+1
, but that's more about operator
than it is about partial()
.Maybe
partial()+1
should be supported using operator overloading. It'd be especially nice to be able to do partial()+x+y
instead of partial(operator.add, x+y)
This form should probably be a differently named built-in, but built-ins aren't cheap, and the no argument constructor isn't otherwise meangingful.
Wednesday, March 23, 2005
Humble and Smart
This isn't just philosophy; when people know nothing about a thing, they assume that there's "nothing to it". Then they confidently make decisions based on incomplete information. (It could be because interesting elements exploit the interplay of the simple and the complex. Or it could just be because small details aren't visible at a distance.)
Paradoxically, bright people are more susceptible to this thinking. Bright people are accustomed to quickly understanding ideas outside of their field of expertise, and this understanding is often superior to experts'. A bright person can start to believe (subconsciously) that much of the work in a field is characterized by lack of understanding.
This has ramifications for religious leadership. That religious leaders have insight into issues not technically within the sphere of religious practice is a doctrine of Judaism, and probably other religions as well. It's only logical; following Judaism is about living wisely, and someone with a deeper understanding of Judaism should have attained greater wisdom. In order to be truly wise, however, a person must be aware of his limitations. Maybe this awareness can be achieved by encountering sufficiently dramatic examples (for example the abuse cases involving religious leaders in recent years), or maybe it requires learning a little bit about alot of different things.
(It is troubling to think that G-d confers special wisdom in a way that is completely independent of the natural working of the world. For one thing, thinking that you've got supernatural aid from G-d certainly exacerbates the problem described above. For another, there is no good way to tell when you got it, and when you don't. "Trust in God, but steer away from the rocks", applies here as well.
At any rate, I don't think Judaism encourages completely ignoring the rules of the physical world. There's a gemara in niddah that gives advice about achieving various goals; in each case the gemara advises both acting according to natural way of the world, and also praying for success. In this era characterized by hester panim ("G-d hiding His face"), we certainly shouldn't abdicate the responsibility to do our hishtadlus (effort), especially where other people are involved.)
Friday, March 18, 2005
Idiomatic Python
The idiomatic style of python is beautiful.
Here's an example. You'd like to allow categorizing emails using their subjects, by prefixing the normal subject with the category and a colon. So for a message with subject "game on tuesday", you could use subject "sports: game on tuesday". If no category is specified, you'd like to use "misc". Here's the Pythonic way to do it:
try:
category, subject = headers['Subject'].split(':')
except:
category, subject = 'misc', headers['Subject']
There are a few different features at work here:
- "It's easier to ask forgiveness than permission"
- Exceptions are used heavily
- Language support for collections is simple and easy
Friday, March 11, 2005
"Startups" and Small Businesses
It could be that when Graham says "startup", he means a company that would rather flop than settle for staying small. Only talking about these startups is strange for a few reasons. Many companies consider themselves successful without making a public stock offering, or being bought out for piles of cash. How about creating a successful small company first, on the way to becoming an industry giant later? And which ideas and strategies are appropriate for which goal? These questions are a lot more relevant today than how to handle a Venture Capitalist imposed CEO.
After all, though more people are employed by big companies, there are many more small companies than big ones.
Wednesday, March 09, 2005
Note to Future Self
Hopefully when I'm older I'll look back at this note and realize that I'm not going senile.
Tuesday, March 08, 2005
Ipod Shuffle for Lectures
The IPod Shuffle should remember the current "song" after it's turned off.
So apparently this is supported for purchases from ITunes and Audible. In order to get it to work with anything else, you have to use faac to create .m4b files.
UPDATE: It works great. If you're using linux, get gnupod, mpg321, and faac. Then you can do something like:
mkdir /mnt/ipod 2>/dev/nullIncidentally, it would be great if gnupod would expose a filesystem-type api to the ipod using fuse.
mount /dev/sda1 /mnt/ipod
for mp3 in *.mp3
do
m4b=${mp3%.*}.m4b
mpg321 -w $mp3 | faac -b 10 -c 3500 - -o $m4b
gnupod_addsong.pl -m /mnt/ipod $m4b
done
mktunes.pl -m /mnt/ipod
umount /mnt/ipod
UPDATE#2: Don't use gnupod; use the iPod shuffle Database Builder.
Thursday, March 03, 2005
Warn of Unsaved Changes Javascript
<body onLoad="lookForChanges()" onBeforeUnload="return warnOfUnsavedChanges()">
<form>
<select name=a multiple>
<option value=1>1
<option value=2>2
<option value=3>3
</select>
<input name=b value=123>
<input type=submit>
</form>
<script>
var changed = 0;
function recordChange() {
changed = 1;
}
function recordChangeIfChangeKey(myevent) {
if (myevent.which && !myevent.ctrlKey && !myevent.ctrlKey)
recordChange(myevent);
}
function ignoreChange() {
changed = 0;
}
function lookForChanges() {
var origfunc;
for (i = 0; i < document.forms.length; i++) {
for (j = 0; j < document.forms[i].elements.length; j++) {
var formField=document.forms[i].elements[j];
var formFieldType=formField.type.toLowerCase();
if (formFieldType == 'checkbox' || formFieldType == 'radio') {
addHandler(formField, 'click', recordChange);
} else if (formFieldType == 'text' || formFieldType == 'textarea') {
if (formField.attachEvent) {
addHandler(formField, 'keypress', recordChange);
} else {
addHandler(formField, 'keypress', recordChangeIfChangeKey);
}
} else if (formFieldType == 'select-multiple' || formFieldType == 'select-one') {
addHandler(formField, 'change', recordChange);
}
}
addHandler(document.forms[i], 'submit', ignoreChange);
}
}
function warnOfUnsavedChanges() {
if (changed) {
if ("event" in window) //ie
event.returnValue = 'You have unsaved changes on this page, which will be discarded if you leave now. Click "Cancel" in order to save them first.';
else //netscape
return false;
}
}
function addHandler(target, eventName, handler) {
if (target.attachEvent) {
target.attachEvent('on'+eventName, handler);
} else {
target.addEventListener(eventName, handler, false);
}
}
</script>
Wednesday, March 02, 2005
Telephone Shell Javascript Widget
<form>
phone #<input onkeypress="return phone_only(event)">
</form>
<script>
function phone_only(myevent) {
mykey = myevent.keyCode || myevent.which; //ie||netscape
myfield = myevent.srcElement || myevent.target; //ie||netscape
if (mykey == 8) //backspace (netscape only)
return true;
f = myfield.value;
g = myfield.value;
ndigits = f.replace(/-/,'').length;
ngroupdigits = g.replace(/.*-/,'').length;
if (ndigits == 0) {
if (50 <= mykey && mykey <= 57) { //2-9, can't start with 0 or 1
return true;
} else {
return false;
}
} else if (ndigits <= 7) { //only need 2 hyphens: 123-456-7
if (32 <= mykey && mykey <= 47 && ngroupdigits != 0) { //punctuation
myfield.value += "-";
return false;
} else if (48 <= mykey && mykey <= 57) { //0-9
if ((ngroupdigits % 4) == 3) {
myfield.value += "-";
}
return true;
} else {
return false;
}
} else {
return true;
}
}
</script>
Tuesday, March 01, 2005
Forms Support in Javascript, not Template
Here's an example form, followed by the code. You should be able to copy into a file and try it.
<form>
<input name=a>
<input name=b type=checkbox value=x1>
<input name=b type=checkbox value=y1>
<input name=b type=checkbox value=z1>
<select name=c multiple>
<option value=x2>X2
<option value=y2>Y2
<option value=z2>Z2
</select>
<button onClick="populateForm(this.form, {'a':'x0',b:['x1','z1'],'c':['x2','z2']}); return false">Populate</button>
<input type=reset>
</form>
<script>
function populateForm(myForm,myHash) {
for (var k in myForm) {
if (!(k in myForm) || !(k in myHash)) continue;
if (typeof myHash[k] == 'string')
myHash[k] = [myHash[k]];
if (myForm[k].type == 'text') {
myForm[k].value = myHash[k][0];
} else {
var field = 'type' in myForm[k] && myForm[k].type.match('^select') ? 'selected' : 'checked';
var selected = Array();
for (var i=0; i<myHash[k].length; i++)
selected[myHash[k][i]] = 1;
for (var i=0; i<myForm[k].length; i++)
myForm[k][i][field] = myForm[k][i].value in selected;
}
}
}
</script>
Tuesday, February 22, 2005
Even More On Presentation Done Right
Templates are neither necessary nor sufficient for separating model and view (presentation). Not necessary because the separation is really accomplished by the model/view protocol, and not sufficient because presentation code can always seep into the model code. In fact, the StringTemplate approach requires complex views to be implemented in the model code.
A great m/v separation may be achieved by just having separate code for model and for view, even in the same language. The only requirements are on the data passed from the model to the view:
- it should be available before the view code runs
- it should consist only of lists of lists, and lists of opaque objects
It's probably worth noting explicitly that the view depends on the model and not vice versa.
Recent javascript interfaces from google seem to contradict requirement number one, but really they just use a lazy loaded model. The view treats the model as if it's present, but because of the model's prohibitive size, each piece is loaded only just before it's needed.
The StringTemplates author acknowledges that his solution is insufficient to keep view logic out of the model code. The model code could pass data like "the color red" to the view layer. Since StringTemplates is such a simple language, more complex view features must be implemented with the help of model code. Any possible document may be generated, but only with the help of the model code.
So if m/v separation isn't the point of templates, what is? Separation of roles. The roles of programmer and designer aren't necessarily performed by different people, but they do require different approaches. The designer role includes everything that can be done in a WYSIWYG editor, with all visible elements, "includes", and conditionals. As document formats evolve, this could become part of the normative editor functionality. CSS visibility could be hacked to support conditionals, and XInclude takes care of the rest.
Sunday, February 20, 2005
Google Maps and Free Source
A yet un-remarked-upon feature of these "network applications" is how similar they are to free source. Though the intellectual property restrictions of google and of free source are just as strict as those of the most proprietary software vendor, the implementations of both google maps and GPL'ed code are available for anyone to poke at. GPL developers have so much faith in their model that they don't worry about commercial competitors, and google developers apparently have so much confidence in their own skills that they don't worry.
You already have free access to both the google maps client software and the map data. Without too much difficulty, you could extend either. For example, you could use the google client to view your own map data, you could run your own software on the map data (which is already cached on your pc), and people are already hacking new features onto the whole google maps solution.
The major change in these new applications is that the interface is exposed. With regular google search, you either have to use the Google Web APIs or else screenscrape the html pages. With a little reverse engineering of the new applications, you can access the same interface that's used as part of their normal functioning.
(The Google Web APIs limit developers to 1000 queries a day, and presumably a higher volume of screenscraping or access to the new APIs would get shut down by Google.)
The Internet Changing Everything
- Traditional categories of media become irrelevant
Does a given piece of information belong in a book, an academic paper, a weekly magazine article, an editorial, a letter to the editor? The internet makes the distinctions increasingly irrelevant.
- The description of an idea may be canonicalized
A web page is an expression of an idea that is universally available (at least theoretically). It's easy to refer to, and easy to maintain. The internet will one day provide a distributed wikipedia, in which every idea has a URI and page(s) containing all public human knowledge of that idea.
- The context of an idea may be completely specified
Traditional bibliographies are klunky in comparison. It will be possible to link a given piece of information with every other piece of information on which it relies. That metadata will itself be data, subject to easy analysis.
Thursday, February 17, 2005
URL Features
"URL" means both local and remote. I should have a full history of every file I've opened (explicitly), even if it wasn't using the browser. Another operation that I want recorded is when I change files, and when I post forms.
I should get a smarter handling of "cached" and downloaded files. Browsers already have caches, so why I should have to manually make copies of files for speed or reliable access?
Thursday, February 10, 2005
Perl Problems
1 Obscure Features
The core language has so many features that even the greatest perl wizard does not know them all. Find a wizard and ask him how many of the following features from the core language he understands (without consulting the manual).
split(' ') vs split(/ /) vs split('') vs split(//)
$x{'a', 'b'} vs @x{'a', 'b'}
$[ = 3
[{foo => 1, bar => 2}, "FOO", "BAR"]
And here's a realistic example of idiomatic perl:
sub with_gs_acct_check_digit{"$_[0]-".substr(10-(map$_[2]+=$_,map/\d/?$_[1]++%2?split'',$_*2:$_:0,split'',$_[0])[-1]%10,-1)}
Since these features usually address a real need, they can be very tempting to use. Even if someone were to do the work to specify a sane perl subset, there is no tool to enforce its use. Often a perl expert isn't aware that the language features that he uses are obscure or difficult for the nonexpert to understand.
Perl's fast feature accretion is a direct result of its core design philosophy, "There's More Than One Way To Do It".
2 Few Errors are Caught by the Compiler
Since every new feature is encoded using a fixed set of operators, very few errors actually cause a compiler error.
print "Strings are equal\n" if "abba" == "baba";
2.1 Context Confusion
Every perl expression has several entirely different results depending on its "context", the code in which the expression occurs. The following example will trip up even experienced perl coders:
sub myPrint($) {
my $arg = @_;
print "the first argument is $arg ?\n";
}
3 Unsafe Features
Many commonly used features are unsafe. The "use strict" directive only catches the most blatant.
3.1 $_
For example, one of perl's major conveniences is the $_ short-hand for referring to the current index of a loop. The following is great way to print upper-cased versions of some strings.
@t = qw( ibm dell msft );
for (@t) {
print uc "$_\n"
}
However, if you want to instead use a different function in place of "uc", this code may fail in mysterious ways. Functions called in the body of the loop can alter what the $_ reference refers to, and neither the caller nor the callee may realize the danger.
3.2 Exceptions
Exception support is inconsistent and dangerous. When most function fail, they just return false and sometimes an error code. Other functions expect to be called in "eval blocks", and will otherwise cause the entire program to terminate (e.g. mkpath from File::Path)
3.3 Auto-vivification
Another example is auto-vivification, or the on-the-fly creation of datastructures. For the following data structure:
use strict;
my %myhash1=( "a"=>1, "b"=>2 );
my %myhash2 =( "myhash1"=>\%myhash1, "c"=>3, "d"=>4 );
Perl will properly catch the error:
$myhash3{c}++; # %myhash3 is not defined
But will happily allow:
$myhash2{myhash3}{c}++; # a new hash will be created!
4 Data Structures
Nested data structures in perl are unwieldy. They require using references, and most people are confused by references.
Wednesday, February 09, 2005
Reusing Software
There are still a few impediments to reuse in popular platforms. The following is a small collection of research into these impediments.
There mustn't be conflicts between new symbols added to the base code and the extensions. It wouldn't be difficult for languages to support this better.
The non-private call graph of public and protected methods in the parent mustn't change.
There must be a way to better encapsulate objects.
There must be a way to encapsulate and compose concurrent access to state.
Thursday, January 27, 2005
Software Commodification
A commodity is any product which meets some agreed upon criteria, such that any instance of that commodity may be substituted for any other. A quart of milk from any supplier will satisfy your cupcake recipe, no matter who produces it, so milk is a commodity. A necktie, however, is subject to all sorts of weird style criteria, so it is not a commodity. It might not even be your color.
All software programs are commodities in essence. Programs follow logical rules and perform to a specification, but we can't say a given program is a commodity before it has an actual substitute. So commodity nature is revealed when a given piece of software acquires competing alternatives.
Most software alternatives are not perfect substitutes in the sense that you can switch implementations and barely notice. Usually switching requires retraining the people that use the product and porting the software that uses the product. Vendors obviously want to keep switching as difficult as possible, and techniques for doing so are called "lock-in". By definition, strong lock-in hurts the consumer, but it also usually hurts the consumer by creating an inferior product. A product with strong lock-in will generally be monothilic, have complicated interfaces, and have hidden dependencies.
Given a choice, anyone (whether selling software or anything else) would prefer to have their product not to be a commodity. This is because markets are especially efficient at setting commodity prices, and this means suppliers will have stiff competition.
It's worse to have your software product become a commodity. This is because of the nature of software (and any non-physical product). The first copy of your software will cost you $2,000,000 but every subsequent copy will cost you only $2. This means that when someone enters your market, they've already done the hard part, and there's no incentive to leave. More importantly, the price of a software product is completely arbitrary. A price war could bring prices all the way down to zero.
Free competitors may be particularly formidable. Only with software is free competition realistic, because with physical products, revenue must reliably exceed costs. Free software makes it particularly easy to pool contributions from disparate sources, with very little administrative overhead, and very little reliance on a single controlling entity. (If a maintainer isn't doing a sufficiently good job, then someone may "fork" the development effort.) Free efforts also generally aren't motivated to lock-in.
All things being equal, it's desirable for software vendors to have the other software that they depend on to be commodified. This is for a few reasons: your dependencies have power over your product, and when your dependencies are cheaper, your overall product solution will be cheaper. There'll be a larger market for your product.
So if free software is so easy and desirable, how can a commercial software vendor stay in business? By presenting a moving target. Any given software release may be straightforwardly commodified, but the release process may not be. No entity or group of entities will have external incentive to track a series of upgrades. This is partially why "tying" is so important to a large software vendor, because tying is the only way for a mature product to escape commodification.
Ironically, the vendor is really in the business of selling timely upgrades, a service business which uses the base software product as merely a barrier to entry.
Wednesday, January 26, 2005
Intuitive Interfaces
- It works like other similar interfaces that the user has seen. (Green means "go".)
- It's logical. (Cars' signalling interface correspond to the way that you turn the wheel.)
- It's internally consistent. (The same abstraction works the same way in different contexts.)
- It has a shallow learning curve.
- It has helpful pointers, ideally inobtrusive. (Examples are popup help bubbles and pie menus)
- It allows safe experimentation. (You can "undo" any operation.)
- It's simple. :)
Python Evolution and AOP
For a while, python has had metaclasses, which allow customizing the behavior of whole classes of classes :). These metaclasses allow running code on class creation, and routinely involve customizing object creation.
In order to obviate java's setter/getter pattern, python has the ability to run code on getting an attribute or setting an attribute or both.
Recently, python attained a decorator feature, which allows running code on function/method creation. This feature was originally motivated by wanting to specify things like a method being "static".
Now there's talk about implementing type-checking use adaption of function/method arguments and return values.
This trend could seem a lot like Aspect Oriented Programming, but it has the important difference that the path to the hook code is always evident at the hooked code. A main point of AOP is perfect "obliviousness", according to which you can alter the behavior of foreign code without making any modification to it. In python, the main code body can be oblivious of the hook, but it's always preceded by an explicit reference to the hook, almost like an annotation.
In python, each of these hooking mechanisms has a different syntax, presumably tailored to its primary use case. These features are mostly made possible by python's easy introspection support, and by its uniform "object" treatment of all of these abstractions.
Monday, January 24, 2005
Managing Change
Obviously, don't remove public and protected methods, or change their semantics. For protected methods, this includes having them continue to call other nonprivate methods under the same conditions.
Less obviously, if you're creating new public or protected methods, you should move your code to an entirely new class! Someone may have extended your class with a method that has the same signature that you've just added, causing a needless conflict. Under the old class, create proxy classes that delegate every method to the new code. You don't have to worry about the maintenance overhead, because these proxies represent the legacy interface; you shouldn't have to change them later.
This hints at the fact that your library should be very careful about calling its own nonprivate methods. Calling internal nonprivate methods should be reserved for supported abstractions, because your library will down-call into extensions of these methods. If you don't want to support the abstraction, move the implementation into a private method. Have your internal code call the private method, and have your public method just be a wrapper for clients.
This approach is not so elegant because it requires code changes in order to support unchanging function. Maybe languages should support using interfaces for encapsulation, so that any symbols not present in the specified interface(s) would be completely hidden. However, all the recent python typechecking and adaption thinking seems to be focused on method calls, not base class specification.
Thursday, January 06, 2005
Minimum Curriculum
Even if this makes sense for ideas, it certainly makes no sense for art. The survey courses in dance, art history, music history, and world literature probably can't be meaningfully condensed any further. But no one should miss out on the major ideas of the introductory courses in math, astronomy, physics, chemistry, biology, psychology, economics, computer science, philosophy, political science, philosophy, and history. Some ideas fall through the cracks of all of these intro courses. (For example, what about the central points of The Death and Life of Great American Cities?) Some ideas are also too new to make it into conventional courses. For many ideas, only a few minutes explanation would be sufficient.
Many survey courses take the historical approach, but in this context it would waste too much time. To make it more interesting, the course (and more importantly the reading list) could touch on the limits of human knowledge and current work.
I originally had this idea in yeshiva, in a spirit of parochialism: "take this course, and then forget about the rest." Ironically, the course would probably not be popular with the insular (even if it were to omit evolution). This idea came back to me recently, thinking about John Rawls. I realized that neither my college survey in humanities nor intro to philosophy mentioned him.
The following are the ideas that I could come with quickly; please suggest more.
big bang, scale and elements of the universe, basic probability, limits, idea of calculus, newton's laws, four forces, electricity, nature of light, relativity, phases of matter, entropy, periodic table, cells, virii, bacteria, dna, systems of the body, evolution, milgram study, the unconscious, supply and demand, how a computer works and what a program looks like, urls, kant's categorical imperative, veil of ignorance, a myriad of -isms: utilitarianism, facism/socialism/capitalism(democracy), world religions, epistemology, problem of induction, logic and godel for dummies, mixed-use cities, human history in 30 minutes :), how toilets work
Wednesday, January 05, 2005
G-d Exists, so I could be Wrong
David Myers
Psychologist, Hope College; author, "Intuition"
As a Christian monotheist, I start with two unproven axioms:
1. There is a God.
2. It's not me (and it's also not you).
Together, these axioms imply my surest conviction: that some of my beliefs (and yours) contain error. We are, from dust to dust, finite and fallible. We have dignity but not deity.
And that is why I further believe that we should
a) hold all our unproven beliefs with a certain tentativeness (except for this one!),
b) assess others' ideas with open-minded skepticism, and
c) freely pursue truth aided by observation and experiment.
This mix of faith-based humility and skepticism helped fuel the beginnings of modern science, and it has informed my own research and science writing. The whole truth cannot be found merely by searching our own minds, for there is not enough there. So we also put our ideas to the test. If they survive, so much the better for them; if not, so much the worse.
Tuesday, January 04, 2005
Core Assumptions
Wouldn't it be great if all disagreements could be reduced to conflicting core assumptions? If the parties could agree on this reduction, then maybe the assumptions themselves could be meaningfully discussed and compared.
Of course, I'm thinking of the electoral split of recent times. Could it be that conservatives simply don't accept the idea of the Veil of Ignorance?
Beating Java on Its Own Turf
This is exciting because it promises to achieve the safety of java with the simplicity of python. Safety is one of the three technical reasons that people still use java instead of python. The other two are performance and enterprise software. Performance is being addressed by the newly funded PyPy. Python already has much of the java enterprise technology, just not in the form of ballyhooed specifications. (For the remaining technologies, it's not clear that the "enterprise solution" achieves better reliability or scalibility than folks' nonstandard solutions.)
That the business community seems to care more about these specifications than about the actual technology may be for the same reason that it doesn't greatly prefer Sun's specifying Java over Microsoft's owning .NET. (Without a patent grant, the incomplete .NET standards work is almost worthless.) One would think that having one company write specifications for which many companies can build implementations would be much safer, and would create much more open software. That the wholely proprietary .NET is even considered a contender implies that people only care about the company that writes the interfaces.