Browse Definitions :

Hofstadter's law

Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.” In other words, time estimates for how long anything will take to accomplish always fall short of the actual time required -- even when the time allotment is increased to compensate for the human tendency to underestimate it. The non-specificity of the reference (it) reflects that the law is broadly applicable in any situation where the task is complex. Hofstadter’s law is frequently evoked in IT contexts and is particularly relevant to time management, productivity, project management and software development.

Douglas Hofstadter, a cognitive scientist and author, introduced the law in his 1979  book Gödel, Escher, Bach: An Eternal Golden Braid. The system under discussion was chess-playing computers, which had been predicted to beat humans within 10 years. However, ten years after that prediction, humans were still winning. Hoftstadter wrote that the inablility for machines to triumph by that time was "just one more piece of evidence for the rather recursive Hofstadter's Law." (In fact, it wasn’t until 1996 that IBM’s Deep Blue computer beat the reigning world champion Garry Kasparov.)

Hofstadter’s law illustrates one element of optimism bias, which leads people to overestimate the benefits of some proposed system and underestimate the drawbacks, as well as the time required for completion. It’s also closely related to the ninety-ninety rule proposed by Tom Cargill of Bell Labs: The first 90 percent of the code accounts for the first 90 percent of the development time. The remaining 10 percent of the code accounts for the other 90 percent of the development time.

See a presentation on why everything takes longer than you think it will:

This was last updated in October 2016

Continue Reading About Hofstadter's law

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

  • cloud NAS (cloud network attached storage)

    Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.

  • Terabyte (TB)

    A terabyte (TB) is a unit of digital data that is equal to about 1 trillion bytes.

  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...