Hacking Software’s Rule of 40