Almost any IT system of any age has accumulated a lot of leaky abstractions, workarounds, odd and inconsistent implementations, missing docs and weird stuff you could generally terrifying people really easily. But at the same time it represents cumulative knowledge of the domain it's edge cases.

Comments