Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Ahhh, one of my pet peeves in IT:

"best practices" ... what proof do they offer that these are the best? Is there a detailed deconstruction of why these are the best, and what practices they are superior to? A multifaceted analysis that may show other practices to be better under some circumstances?

Oh, you mean "recommended practices".



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: