The hacker types mentioned in this article are typical hacker types. All these types of hackers are talented, but they have obviously different styles. Which of the following are you familiar?
0. The Unicorn
The Unicorn is translated as a "Unicorn", known as a hacker for its perfect developer, they were once thought to be coded like a code stamp and designed with a discerning eye. When they choose to use ps or fireworks, it is as easy and comfortable as they choose to use text editing. None of them are incompatible with pixels, and there cannot be any incompatible methods. One of the limitations of unicorns is that they are forced to use an operating system that supports Adobe products.
[Favorite technologies/languages: sass, stylus, coffeescript, JavaScript]
1. The metaprogrammer
"MacroProgrammer", MacroProgramMembers are developed for other developers. They have their own unique insights on Ruby extensions and secretly hope that Smalltalk will be accepted by the world. The definition of this prototype is not limited to text meta-programming, but also includes some people obsessed with defining normative conventions, so that other developers can work more easily and conveniently.
[Favorite technologies/languages: Lisp, Ruby, and Ember. Any configuration better than the Conventions]
2. The brogrammer
The brogrammer is translated as a "programmer". brogrammer has mastered the Balmer peak art and reaches its peak. It is combined with the latest Employment Convention, enabling brogrammer to efficiently reach a higher level. Brogrammers like to play beer pong games with cups. The cup arrangement usually uses a certain data structure.
[Favorite technologies/languages: Django, Ror, express]
3. The lost soul
Translate the lost soul into "lost soul", which has been in the stacks of some specific enterprises for many years. It has developed a kind of engineering trend, with the aim of putting engineering and wareters working in a defined framework that does not support dependency injection and reverse control. Maybe this is reasonable, but like most projects, he regularly handles those complex programs and software.
[Favorite technologies/languages: Java, spring, hibernate,. net, Eclipse, Visual Studio]
4. The [mad] scientist
"Crazy scientist" is a smart scientist in his own field and is dedicated to solving Scientific Problems in computer hardware. It is the latest computer learning method so far, and it can quickly tell you how to perform double-digit multiplication.Algorithm. However, in practice, scientists tend to over-analyze and be closer to the basic problems of natural engineering.
[Favorite technologies/languages: C/C ++, Python, Java, F #]
5. The effecect
Architects indulge in solving problems at hand with the best technology, but the plan is often larger than the practical scale and serves as the most stubborn prototype, it is more willing to notify you about stack issues.
[Favorite technologies/languages: redis, MongoDB, couchdb, Riak, hadoop, Cassandra, and Web sockets]
6. the bare-metal programmer
"Bare metal programmers" like to live in areas with hardware and software interfaces, so they are far away from advanced languages and abstractions. As a low-level Optimization Expert, he can quickly resolve the inverse square root from Quake III arena and similar optimization.
[Favorite technologies/languages: C/C ++, assembly, and shading languages]
7. The Lambda programmer
This hacker knows that y-Combinator is not just a famous incubator, but also can get it from the language you choose. Although it refuses to accept basic technical models, it can still obtain core functional concepts, such as monads, battery, and tail recursion.
[Favorite technologies/languages: Haskell, lisp, Erlang, Scala, F #]
8. The neck beard
In these lists, this hacker is most likely to use his own mouse, including using lynx or w3m to browse the Web site. Use a dot file to configure the system and fight against complex large software engineering. In the free-development source code movement, we firmly believe that the neck beard will go beyond its scope of use to develop and disseminate open-source software.
[Favorite technologies/languages: C/C ++, POSIX, Kde, anything GPL]
9. The hustler
ForCode"Scammers" do not need to be confused. "scammers" hackers are keen to observe users and have the ability to meet customers' requirements. It is the initiator of spoof apps and makes a fortune after the App Store is launched. These "scammers" are motivated by users, not just some technical options, because none of these "scammers" are secure.
[Favorite technology/language: PHP, Perl, anything that gets the job done]
A. The [fanatical] Tester
In the ideal world, testers would rather see code segments written in pseudo-English. He believes in the latest BDD testing technology, he also regularly writes tests to other tests with poor infrastructure. Bugs have become a thing of the past. Testers suspect that stable software cannot be written without similar testing levels.
[Favorite technologies/languages: cucumber, rspec, rcov, capy133, anything BDD]
B. The [re] inventor
I would rather write more than a dozen different tiny frameworks than use a single framework for the same purpose. In order not to be confused by the naked programmers, the inventors use abstract things and they are separated from the conventions.
[Favorite technologies/languages: zepto, backbone, Sinatra, node]