Unleashed by the Book
If you browse in the computer-book section of any well-stocked bookstore, you will usually come across two or three books titled “Xxx Unleashed” where xxx is something to do with software. Developers can choose from titles like Java 2 Unleashed, JavaScript Unleashed, or PHP Unleashed. For system administrators there are titles like Windows Server 2012 Unleashed. (If I was a company’s IT manager, I’m not sure if I would want my sys admins, with their digital powers and privileges, to be really unleashed.) And if you want to take a break from screen and keyboard for a few minutes, there’s Doodles Unleashed to help you goof off productively.
I have a bit of a contrarian streak, so I thought to myself that it would be amusing for someone to publish a “leased” book. What might you learn from a book called Java 2 Leashed if it existed? (It turns out there are some “leashed” books but they are found in the romance and fantasy sections and have covers that would discourage anyone from reading them on public transit which may explain why most are available only for e-readers.)
What is an Unleashed Programmer? Two Views
However, having observed software being developed by professionals, I am starting to think that there might be something serious with this contrarian idea. Perhaps production software could benefit from developers choosing to have a “leashed” mindset. Let me explain.
The term unleashed brings to mind two separate meanings:
- Able to roam anywhere. This unleashed dog in the park roams to any corner of the park and snuffles around wherever it likes. Similarly, an unleashed programmer can roam to any corner of the documentation, understand it, and figure out how to use any feature that the programming system offers.
- Able to act without restraint. This unleashed dog does whatever it wants in the park: jumping up on adults, knocking over little kids, and leaving doggy doo surprises. Similarly, an unleashed programmer can use whatever programming tricks, copy-pasted program snippets, or code hacks he can think of until his code passes the documented test cases. Continue reading