Your browser failed to load CSS style sheets. Your browser or web proxy might not support elliptic-curve TLS

Building network automation solutions

9 module online course

Start now!
back to overview

More on Leaky Abstractions

When I was writing the Back to Basics blog post I reread the Law of Leaky Abstractions masterpiece. You’ll love it – the first example Joel uses is TCP.

However, what really caught my eye was this bit:

The law of leaky abstractions means that whenever somebody comes up with a wizzy new code-generation tool that is supposed to make us all ever-so-efficient, you hear a lot of people saying “learn how to do it manually first, then use the wizzy tool to save time.”

You should apply the same wisdom to shiny new gizmos launched by network virtualization vendors… oh wait, you can’t, they are mostly undocumented black boxes. Good luck ;)

Sadly, the Law of Leaky Abstractions blog post was written in 2002… and nothing changed in the meantime, at least not for the better.

Please read our Blog Commenting Policy before writing a comment.

1 comment:

  1. Examples of leaky abstractions.
    1. Intent based networking
    2. Encrypted Traffic analysis. If true,our bank accounts should be wiped out :)
    3. CAPWAP for wireless, promoted by large companies.
    4. ISSU/HA implementation
    Machine learning is getting started , instead of concentrating on basic insight analysis.


Constructive courteous comments are most welcome. Anonymous trolling will be removed with prejudice.