<!DOCTYPE html><html><head><title></title><style type="text/css">#qt p.qt-MsoNormal{margin-top:0in;margin-right:0in;margin-left:0in;margin-bottom:0.0001pt;font-size:11pt;font-family:"Calibri", sans-serif;}
#qt a:link{color:blue;text-decoration-line:underline;text-decoration-style:solid;text-decoration-color:currentcolor;text-decoration-thickness:auto;}

p.MsoNormal,p.MsoNoSpacing{margin:0}</style></head><body><div style="font-family:Arial;">Nick.<br></div><div style="font-family:Arial;"><br></div><div style="font-family:Arial;">if you are talking about my paper, here is the link I posted to Gary that you might not have seen.<br></div><div dir="auto"><br></div><div dir="auto"><a href="https://objectguild.com/papers/westProgrammingHard2019.pdf" rel="noopener noreferrer">https://objectguild.com/papers/westProgrammingHard2019.pdf</a><br></div><div dir="auto"><br></div><div dir="auto">davew<br></div><div style="font-family:Arial;"><br></div><div style="font-family:Arial;"><br></div><div>On Sat, Feb 8, 2020, at 6:02 PM, thompnickson2@gmail.com wrote:<br></div><blockquote type="cite" id="qt"><div class="qt-WordSection1"><p class="qt-MsoNormal">Here!  Here!  The Paper, the Paper!!!<br></p><p class="qt-MsoNormal"> <br></p><p class="qt-MsoNormal">Nicholas Thompson<br></p><p class="qt-MsoNormal">Emeritus Professor of Ethology and Psychology<br></p><p class="qt-MsoNormal">Clark University<br></p><p class="qt-MsoNormal"><a href="mailto:ThompNickSon2@gmail.com"><span style="color:rgb(5, 99, 193);">ThompNickSon2@gmail.com</span></a><br></p><p class="qt-MsoNormal"><a href="https://wordpress.clarku.edu/nthompson/"><span style="color:rgb(5, 99, 193);">https://wordpress.clarku.edu/nthompson/</span></a><br></p><p class="qt-MsoNormal"><br></p><p class="qt-MsoNormal"> <br></p><p class="qt-MsoNormal"> <br></p><p class="qt-MsoNormal"></p><div><b>From:</b> Friam <friam-bounces@redfish.com> <b>On Behalf Of </b>Gary Schiltz<br></div><div><b>Sent:</b> Saturday, February 8, 2020 6:41 AM<br></div><div><b>To:</b> The Friday Morning Applied Complexity Coffee Group <friam@redfish.com><br></div><div><b>Subject:</b> Re: [FRIAM] Curmudgeons Unite!<br></div><p></p><p class="qt-MsoNormal"> <br></p><div><div><p class="qt-MsoNormal">Please post a link to your paper. I for one would love to read it. <br></p></div></div><div><p class="qt-MsoNormal"> <br></p><div><div><p class="qt-MsoNormal">On Sat, Feb 8, 2020 at 3:45 AM Prof David West <<a href="mailto:profwest@fastmail.fm">profwest@fastmail.fm</a>> wrote:<br></p></div><blockquote style="border-top-color:currentcolor;border-top-style:none;border-top-width:medium;border-right-color:currentcolor;border-right-style:none;border-right-width:medium;border-bottom-color:currentcolor;border-bottom-style:none;border-bottom-width:medium;border-image-outset:0;border-image-repeat:stretch;border-image-slice:100%;border-image-source:none;border-image-width:1;border-left-color:rgb(204, 204, 204);border-left-style:solid;border-left-width:1pt;padding-top:0in;padding-right:0in;padding-bottom:0in;padding-left:6pt;margin-left:4.8pt;margin-right:0in;"><div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">Jon,</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">As an observer of software "engineering" since its inception in 1968 (my first job as a programmer was that fall, and that spring/summer is when the NATO conference first coined the phrase), I can and will (braggadocio here) state that most software CANNOT be engineered, precision or otherwise, and all that we have learned in the past 52 years in both computer science and software engineering is essentially irrelevant to the production of application level software.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">The protocols that ensure cat photos are scattered into packets traversing vast segments of the Internet to be reassembled and presented on you phone in real time, is an example of the minority of software that can be engineered. The vote counting app <u>could not have been</u>.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">The difference is that the first replicates, in software, a deterministic machine with limited variables, all of which can be known and quantified, limited relations among variables, all of which can be known and stated; and the second one is a complex system where variables and relations are highly dynamic, idiosyncratic, and, often, quite literally unknowable.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">I just completed a sixty-page essay on this subject "Why Programming is Hard and Software Development is (Mostly) Impossible" that addresses this issue. If you would like to read, let me know and I will send you a link or the paper.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">Making things worse is the superstructure around software development — all the methodologies, all the frameworks, all the management levels, all the practices that supposedly guide/govern the process of developing software.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">Icing on the cake, is attitude. Those that contract for software EXPECT that the project will fail and/or that what they get will be a pale imitation of what they wanted, full of bugs and inconsistencies. The development team also EXPECTS the project to fail, for different reasons, but fail nevertheless.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">And roughly 90-percent of the time both sides have their expectations realized. (60-65 % of projects started are abandoned without any delivery, the other 20-25 percent are those pale imitations over budget and taking twice the time.)</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">One more factor - the game is rigged. Those that might actually be able to deliver reasonable software applications are not allowed to play in the game. Acronym and Shadow came into existence because people in Hillary Clinton's campaign thought they saw a way to make money and used their connections to get established and make contracts. The "bid" process was laughable, the specs being written such that no one but Shadow could comply and in a time frame that Microsoft, et. al. were not able to respond adequately.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">Half a billion dollars were spent on the Obamacare website and another half-billion to get it to work after the initial failure. A startup team of Web-developers built the site with full functionality, including calculating subsidies (supposedly the hard part) in a week. Their site was demoed on Sixty Minutes. But they would never have been allowed to bid on the original project because they did not meet Federal procurement guidelines which were rigged to very large companies  most of whom have a remarkably long history of spectacular failures on past projects.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">Frothing at the mouth so much, am at risk of dehydration.</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font">dave</span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div><div><p class="qt-MsoNormal">On Fri, Feb 7, 2020, at 8:54 PM, Jon Zingale wrote:<br></p></div><blockquote id="qt-m_8367617606106231852qt" style="margin-top:5pt;margin-bottom:5pt;"><div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">My intention in drawing attention to critical application</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">development is an attempt to deepen the discussion</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">around 'apps' and rhetoric. In the discussions around</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">app usage in the democratic primaries, the target appears</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">to be the vulnerability which exists today because</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">programmers today are a bunch of python hacks who</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">never read Knuth. Yet, not a single Friam mother-church</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">meeting passes without a discussion of the precision</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">engineering embodied in our Porches, Teslas, or iphones.</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size"> </span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">Of particular interest to me in directing this rhetorical frame</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">are the so-called-on-wikipedia <a href="https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute">FBI-Apple encryption dispute</a></span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">and the <a href="https://arxiv.org/pdf/1701.04940.pdf">Target corp data breach</a> of 2013. In the first case,</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">the federal government is confronted by the reality that a</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">phone manufacturer <i>can</i> in fact make cryptographically</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">challenging hand held devices. Further we can use this</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">powerful technology for sending our family cat pictures</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">which arrive at their target destinations almost without</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">fail and near instantaneously. There is a sense of <i>justified</i></span></span><br></p></div><div><p class="qt-MsoNormal"><i><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">indignation</span></span></i><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size"> when the cat photo takes more than a second</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">to be delivered. The state-of-the-art is such that we <i>can</i></span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">have nice things.</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size"> </span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">In the second case, a data breach is exploited in the POS system</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">of big box corporation which sells mostly useless things. Next,</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">a public rhetoric emerges similar to the rhetoric I am witnessing</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">here with the democratic primaries. Instead of pointing out that</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">Target corp doesn't consider our privacy a critical concern, we</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">speak of how impossible it is to have privacy and how vulnerable</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">we feel because Target corp is a critical institution.</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size"> </span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size">Jon</span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size"> </span></span><br></p></div><div><p class="qt-MsoNormal"><span style="font-family:"Garamond", serif" class="font"><span style="font-size:12pt" class="size"> </span></span><br></p></div></div><div><p class="qt-MsoNormal">============================================================<br></p></div><div><p class="qt-MsoNormal">FRIAM Applied Complexity Group listserv<br></p></div><div><p class="qt-MsoNormal">Meets Fridays 9a-11:30 at cafe at St. John's College<br></p></div><div><p class="qt-MsoNormal">to unsubscribe <a href="http://redfish.com/mailman/listinfo/friam_redfish.com">http://redfish.com/mailman/listinfo/friam_redfish.com</a><br></p></div><div><p class="qt-MsoNormal">archives back to 2003: <a href="http://friam.471366.n2.nabble.com/">http://friam.471366.n2.nabble.com/</a><br></p></div><div><p class="qt-MsoNormal">FRIAM-COMIC <a href="http://friam-comic.blogspot.com/">http://friam-comic.blogspot.com/</a> by Dr. Strangelove<br></p></div><div><p class="qt-MsoNormal"> <br></p></div></blockquote><div><p class="qt-MsoNormal"><span style="font-family:"Arial", sans-serif" class="font"> </span><br></p></div></div><p class="qt-MsoNormal"></p><div>============================================================<br></div><div>FRIAM Applied Complexity Group listserv<br></div><div>Meets Fridays 9a-11:30 at cafe at St. John's College<br></div><div>to unsubscribe <a href="http://redfish.com/mailman/listinfo/friam_redfish.com">http://redfish.com/mailman/listinfo/friam_redfish.com</a><br></div><div>archives back to 2003: <a href="http://friam.471366.n2.nabble.com/">http://friam.471366.n2.nabble.com/</a><br></div><div>FRIAM-COMIC <a href="http://friam-comic.blogspot.com/">http://friam-comic.blogspot.com/</a> by Dr. Strangelove<br></div><p></p></blockquote></div></div></div><div>============================================================<br></div><div>FRIAM Applied Complexity Group listserv<br></div><div>Meets Fridays 9a-11:30 at cafe at St. John's College<br></div><div>to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com<br></div><div>archives back to 2003: http://friam.471366.n2.nabble.com/<br></div><div>FRIAM-COMIC http://friam-comic.blogspot.com/ by Dr. Strangelove<br></div><div><br></div></blockquote><div style="font-family:Arial;"><br></div></body></html>