[4667] in cryptography@c2.net mail archive
Re: How to donate a clue to a lawyer?
daemon@ATHENA.MIT.EDU (Ted Lemon)
Mon May 10 00:12:12 1999
To: EKR <ekr@rtfm.com>
Cc: Carl Ellison <cme@acm.org>, Cryptography List <cryptography@c2.net>
In-Reply-To: Your message of "08 May 1999 23:54:03 PDT."
<kj4slmg2d0.fsf@romeo.rtfm.com>
Date: Sun, 09 May 1999 19:03:39 -0400
From: Ted Lemon <mellon@isc.org>
> You're just asserting this again. The fact that people get paid for
> making pigs dance and not primarily for making their code readable
> suggests that the purpose of the exercise is to make the computer
> do stuff, despite your assertion to the contrary.
I get paid by the ISC to write code that is readable and can be
understood. That's what a reference implementation is. I don't
actually claim to have succeeded at this, but I've done my best, and
readability is indeed one of the primary goals of my code. Another
is the codification of knowledge about the various little edge cases
in the DHCP protocol - if you look through my code, you'll find a
great deal of code and written comments that document such things.
Your disdain for the fruit of your labor is depressing, sir. I
encourage you to think of it more highly.
_MelloN_