Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

While good software design sets clear boundaries between various layers, this is often not the case in real life. The upper layers will incorporate knowledge of the underlying subsystem and may either program around deficiencies or exploit undocumented features. This can make it much harder to rip out V1 with V2 seamlessly. Perhaps focus first on identifying all the places where this kind of thing crosses those boundaries and figure out how to deal with them.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: