Browse Definitions:
Definition

baklava code

Contributor(s): Ivy Wigmore

Baklava code is programming that is unnecessarily complicated by the inclusion of too many abstraction layers.

The term is a reference to the flaky and extravagantly layered Middle-Eastern pastry and a variation on other programming slang included in the Pasta Theory of Programming, which likens programming models to the structures of pasta dishes. Spaghetti code, for example, refers to procedural programming, whose lack of structure can make it hard to follow or update. Lasagna code, on the other hand, is like structured programming, which is easier to follow but whose monolithic structure can make it difficult to modify. According to Raymond Tubey, who formulated the Pasta Theory, object-oriented programming (OOP), likened to ravioli, is the model to follow because it is made up of small, separate, and loosely coupled objects that can be individually modified without affecting the other components or the structure as a whole.

John D. Cook claims to have coined the term baklava code. Here's how he explains the analogy:

Baklava is a delicious pastry make with many paper-thin layers of phyllo dough. While thin layers are fine for a pastry, thin software layers don’t add much value, especially when you have many such layers piled on each other. Each layer has to be pushed onto your mental stack as you dive into the code. Furthermore, the layers of phyllo dough are permeable, allowing the honey to soak through. But software abstractions are best when they don’t leak. When you pile layer on top of layer in software, the layers are bound to leak.

This was last updated in April 2016

Continue Reading About baklava code

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

For some that could mean job security. IF you write code so complicated that nobody else can figure out what is going on you may get to keep your job. As a side note, many years ago, the days of punched cards, I had a boss who wrote code simple, and I mean simple. It had the same confusing effect on the programmers. How?? His program fields, variables and such were 1 or 2 chars.. For the payroll program you might  see code like (a-c-f)*(b1+b2)=n... Damned if I new what he was doing.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of ...

  • polymorphic virus

    A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

SearchHealthIT

  • accountable care organization (ACO)

    An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

  • patient engagement

    Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in...

  • personal health record (PHR)

    A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual ...

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics (NVMe-oF) is a technology specification designed to enable nonvolatile memory express message-based commands to...

  • cloud object storage

    Cloud object storage is a format for storing unstructured data in the cloud.

  • parallel file system

    A parallel file system is a software component designed to store data across multiple networked servers and to facilitate ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close