To 12 types of hackers, which one have you ever met?

Source: Internet
Author: User

The hacker types mentioned in this article are typical hacker types. All these types of hackers are talented, but they have obviously different styles. Which of the following are you familiar?

0. The Unicorn

The Unicorn is translated as a "Unicorn", known as a hacker for its perfect developer, they were once thought to be coded like a code stamp and designed with a discerning eye. When they choose to use ps or fireworks, it is as easy and comfortable as they choose to use text editing. None of them are incompatible with pixels, and there cannot be any incompatible methods. One of the limitations of unicorns is that they are forced to use an operating system that supports Adobe products.

[Favorite technologies/languages: sass, stylus, coffeescript, JavaScript]

 

1. The metaprogrammer

"MacroProgrammer", MacroProgramMembers are developed for other developers. They have their own unique insights on Ruby extensions and secretly hope that Smalltalk will be accepted by the world. The definition of this prototype is not limited to text meta-programming, but also includes some people obsessed with defining normative conventions, so that other developers can work more easily and conveniently.

[Favorite technologies/languages: Lisp, Ruby, and Ember. Any configuration better than the Conventions]

 

2. The brogrammer

The brogrammer is translated as a "programmer". brogrammer has mastered the Balmer peak art and reaches its peak. It is combined with the latest Employment Convention, enabling brogrammer to efficiently reach a higher level. Brogrammers like to play beer pong games with cups. The cup arrangement usually uses a certain data structure.

[Favorite technologies/languages: Django, Ror, express]

 

3. The lost soul

Translate the lost soul into "lost soul", which has been in the stacks of some specific enterprises for many years. It has developed a kind of engineering trend, with the aim of putting engineering and wareters working in a defined framework that does not support dependency injection and reverse control. Maybe this is reasonable, but like most projects, he regularly handles those complex programs and software.

[Favorite technologies/languages: Java, spring, hibernate,. net, Eclipse, Visual Studio]

 

4. The [mad] scientist

"Crazy scientist" is a smart scientist in his own field and is dedicated to solving Scientific Problems in computer hardware. It is the latest computer learning method so far, and it can quickly tell you how to perform double-digit multiplication.Algorithm. However, in practice, scientists tend to over-analyze and be closer to the basic problems of natural engineering.

[Favorite technologies/languages: C/C ++, Python, Java, F #]

 

5. The effecect

Architects indulge in solving problems at hand with the best technology, but the plan is often larger than the practical scale and serves as the most stubborn prototype, it is more willing to notify you about stack issues.

[Favorite technologies/languages: redis, MongoDB, couchdb, Riak, hadoop, Cassandra, and Web sockets]

 

6. the bare-metal programmer

"Bare metal programmers" like to live in areas with hardware and software interfaces, so they are far away from advanced languages and abstractions. As a low-level Optimization Expert, he can quickly resolve the inverse square root from Quake III arena and similar optimization.

[Favorite technologies/languages: C/C ++, assembly, and shading languages]

 

7. The Lambda programmer

This hacker knows that y-Combinator is not just a famous incubator, but also can get it from the language you choose. Although it refuses to accept basic technical models, it can still obtain core functional concepts, such as monads, battery, and tail recursion.

[Favorite technologies/languages: Haskell, lisp, Erlang, Scala, F #]

 

8. The neck beard

In these lists, this hacker is most likely to use his own mouse, including using lynx or w3m to browse the Web site. Use a dot file to configure the system and fight against complex large software engineering. In the free-development source code movement, we firmly believe that the neck beard will go beyond its scope of use to develop and disseminate open-source software.

[Favorite technologies/languages: C/C ++, POSIX, Kde, anything GPL]

 

9. The hustler

ForCode"Scammers" do not need to be confused. "scammers" hackers are keen to observe users and have the ability to meet customers' requirements. It is the initiator of spoof apps and makes a fortune after the App Store is launched. These "scammers" are motivated by users, not just some technical options, because none of these "scammers" are secure.

[Favorite technology/language: PHP, Perl, anything that gets the job done]

 

A. The [fanatical] Tester

In the ideal world, testers would rather see code segments written in pseudo-English. He believes in the latest BDD testing technology, he also regularly writes tests to other tests with poor infrastructure. Bugs have become a thing of the past. Testers suspect that stable software cannot be written without similar testing levels.

[Favorite technologies/languages: cucumber, rspec, rcov, capy133, anything BDD]

 

B. The [re] inventor

I would rather write more than a dozen different tiny frameworks than use a single framework for the same purpose. In order not to be confused by the naked programmers, the inventors use abstract things and they are separated from the conventions.

[Favorite technologies/languages: zepto, backbone, Sinatra, node]

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.