hamburger menuopenquotes logo

Quotations and aphorisms by :

Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress.
~Ken Thompson


Link:

I also have an idea for a book on biodiversity, and why and how we should be conserving it.
~Ken Thompson


Link:

In fact, we started off with two or three different shells and the shell had life of its own.
~Ken Thompson


Link:

The X server has to be the biggest program I've ever seen that doesn't do anything for you.
~Ken Thompson


Link:

Grant, if we edited Fortran, I assume that you'd put a column thing in there.
~Ken Thompson


Link:

There's a lot of power in executing data - generating data and executing data.
~Ken Thompson


Link:

Find Ken Thompson on Ebay!

It's always good to take an orthogonal view of something. It develops ideas.
~Ken Thompson


Link:

We have persistant objects, they're called files.
~Ken Thompson


Link:

I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening.
~Ken Thompson


Link:

It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
~Ken Thompson


Link:

I am a very bottom-up thinker.
~Ken Thompson


Link:

I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week.
~Ken Thompson


Link:

When in doubt, use brute force.
~Ken Thompson


Link:

A well installed microcode bug will be almost impossible to detect.
~Ken Thompson


Link:

We tried to avoid, you know, records. We were told over and over that was probably the most serious mistake and the reason was the system would never catch on, because we didn't have records.
~Ken Thompson


Link:

That brings me to Dennis Ritchie. Our collaboration has been a thing of beauty.
~Ken Thompson


Link:

Find Ken Thompson on Ebay!

I think the major good idea in Unix was its clean and simple interface: open, close, read, and write.
~Ken Thompson


Link:

I wanted to have virtual memory, at least as it's coupled with file systems.
~Ken Thompson


Link:

I am a programmer.
~Ken Thompson


Link:

No amount of source-level verification or scrutiny will protect you from using untrusted code.
~Ken Thompson


Link:

So maybe I can go back to being a Gardeners' World addict again.
~Ken Thompson


Link:

There are no projects per se in the Computing Sciences Research Center.
~Ken Thompson


Link:

One of my most productive days was throwing away 1,000 lines of code.
~Ken Thompson


Link:

I wanted to avoid, special IO for terminals.
~Ken Thompson


Link:

You can't trust code that you did not totally create yourself.
~Ken Thompson


Link:

If you want to go somewhere, goto is the best way to get there.
~Ken Thompson


Link:

Find Ken Thompson on Ebay!

In college, before video games, we would amuse ourselves by posing programming exercises.
~Ken Thompson


Link:

On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids.
~Ken Thompson


Link:

One is that the perfect garden can be created overnight, which it can't.
~Ken Thompson


Link:

I wanted to separate data from programs, because data and instructions are very different.
~Ken Thompson


Link:

The average gardener probably knows little about what is going on in his or her garden.
~Ken Thompson


Link:

 

Ken Thompson quotes

Find Ken Thompson on Ebay!

 

Share:

twitter share icongoogle+ share iconfacebook share icontumblr share icon

stumbleupon share iconreddit share iconlinkedin share iconflipboard share icon

vkontakte share iconwhatsapp share iconemail share iconpinterest share icon

Permalink:

 

Browse:

Random author

Authors