menu Language Is A Virus

Ken Thompson Quotes

Ken Thompson Quotes & Quotations
Ken Thompson
Birth day:
Birth year:

  • 1
    For most of that time, I've also been a keen gardener, but for many years I failed to make the connection between gardening and science. Ken-ThompsonKen Thompson
  • 2
    Grant, if we edited Fortran, I assume that you'd put a column thing in there. Ken-ThompsonKen Thompson
  • 3
    I also enjoy writing my regular column for Organic Gardening magazine, so I may do more of that sort of thing in the future, if anybody wants it! Ken-ThompsonKen Thompson
  • 4
    I also have an idea for a book on biodiversity, and why and how we should be conserving it. Ken-ThompsonKen Thompson
  • 5
    I am a programmer. Ken-ThompsonKen Thompson
  • 6
    I don't think there are many people up in research who have strong ideas about things that they haven't really had experience with. Ken-ThompsonKen Thompson
  • 7
    I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening. Ken-ThompsonKen Thompson
  • 8
    I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week. Ken-ThompsonKen Thompson
  • 9
    I think the major good idea in Unix was its clean and simple interface: open, close, read, and write. Ken-ThompsonKen Thompson
  • 10
    I wanted to avoid, special IO for terminals. Ken-ThompsonKen Thompson
  • 11
    I wanted to have virtual memory, at least as it's coupled with file systems. Ken-ThompsonKen Thompson
  • 12
    In college, before video games, we would amuse ourselves by posing programming exercises. Ken-ThompsonKen Thompson
  • 13
    In fact, we started off with two or three different shells and the shell had life of its own. Ken-ThompsonKen Thompson
  • 14
    It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution. Ken-ThompsonKen Thompson
  • 15
    More precisely stated, the problem is to write a source program that, when compiled and executed, will produce as output an exact copy of its source. Ken-ThompsonKen Thompson
  • 16
    No amount of source-level verification or scrutiny will protect you from using untrusted code. Ken-ThompsonKen Thompson
  • 17
    On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids. Ken-ThompsonKen Thompson
  • 18
    One is that the perfect garden can be created overnight, which it can't. Ken-ThompsonKen Thompson
  • 19
    One of my most productive days was throwing away 1000 lines of code. Ken-ThompsonKen Thompson
  • 20
    So maybe I can go back to being a Gardeners' World addict again. Ken-ThompsonKen Thompson
  • 21
    The average gardener probably knows little about what is going on in his or her garden. Ken-Thompson/">Ken Thompson
  • 22
    The X server has to be the biggest program I've ever seen that doesn't do anything for you. Ken-Thompson/">Ken Thompson
  • 23
    There's a lot of power in executing data - generating data and executing data. Ken-Thompson/">Ken Thompson
  • 24
    Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress. Ken-Thompson/">Ken Thompson
  • 25
    We have persistant objects, they're called files. Ken-Thompson/">Ken Thompson
  • 26
    We tried to avoid, you know, records. We were told over and over that was probably the most serious mistake and the reason was the system would never catch on, because we didn't have records. Ken-Thompson/">Ken Thompson
  • 27
    When in doubt, use brute force. Ken-Thompson/">Ken Thompson
  • 28
    You can't trust code that you did not totally create yourself. Ken-Thompson/">Ken Thompson