ExamplesUndocumented features of software or hardware that a vendor uses to manage its platform or provide remote support.---Trade secrets that a firm purposely keeps to a select few employees.---Complex code in areas such as scientific computing that is widely used but is only understood by experts in a particular area.
ImplicationsDeep magic may expose security vulnerabilities as secretive code tends to lack hardening. It can also be a concern that programmers commonly use libraries they don't understand.
|Overview: Deep Magic|
|Definition (1)||Critical code that isn't widely understood due to complexity or efforts to keep it secret.|
|Definition (2)||Code that few people understand but is nonetheless widely used.|
|Related Concepts||CodingInformation SecurityTechnology CultureAlgorithms|