Ken Thompson Quotes
Quotations and aphorisms by Ken Thompson:
Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress.
~Ken Thompson
Link:
I also have an idea for a book on biodiversity, and why and how we should be conserving it.
~Ken Thompson
Link:
In fact, we started off with two or three different shells and the shell had life of its own.
~Ken Thompson
Link:
The X server has to be the biggest program I've ever seen that doesn't do anything for you.
~Ken Thompson
Link:
Grant, if we edited Fortran, I assume that you'd put a column thing in there.
~Ken Thompson
Link:
There's a lot of power in executing data - generating data and executing data.
~Ken Thompson
Link:
It's always good to take an orthogonal view of something. It develops ideas.
~Ken Thompson
Link:
We have persistant objects, they're called files.
~Ken Thompson
Link:
I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening.
~Ken Thompson
Link:
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
~Ken Thompson
Link:
I am a very bottom-up thinker.
~Ken Thompson
Link:
I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week.
~Ken Thompson
Link:
When in doubt, use brute force.
~Ken Thompson
Link:
A well installed microcode bug will be almost impossible to detect.
~Ken Thompson
Link:
We tried to avoid, you know, records. We were told over and over that was probably the most serious mistake and the reason was the system would never catch on, because we didn't have records.
~Ken Thompson
Link:
That brings me to Dennis Ritchie. Our collaboration has been a thing of beauty.
~Ken Thompson
Link:
I think the major good idea in Unix was its clean and simple interface: open, close, read, and write.
~Ken Thompson
Link:
I wanted to have virtual memory, at least as it's coupled with file systems.
~Ken Thompson
Link:
I am a programmer.
~Ken Thompson
Link:
No amount of source-level verification or scrutiny will protect you from using untrusted code.
~Ken Thompson
Link:
So maybe I can go back to being a Gardeners' World addict again.
~Ken Thompson
Link:
There are no projects per se in the Computing Sciences Research Center.
~Ken Thompson
Link:
One of my most productive days was throwing away 1,000 lines of code.
~Ken Thompson
Link:
I wanted to avoid, special IO for terminals.
~Ken Thompson
Link:
You can't trust code that you did not totally create yourself.
~Ken Thompson
Link:
If you want to go somewhere, goto is the best way to get there.
~Ken Thompson
Link:
In college, before video games, we would amuse ourselves by posing programming exercises.
~Ken Thompson
Link:
On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids.
~Ken Thompson
Link:
One is that the perfect garden can be created overnight, which it can't.
~Ken Thompson
Link:
I wanted to separate data from programs, because data and instructions are very different.
~Ken Thompson
Link:
The average gardener probably knows little about what is going on in his or her garden.
~Ken Thompson
Link:
Share:
Permalink:
Browse: