Language Is A Virus

Ken Thompson Quotes

Ken Thompson Quotes & Quotations
Ken Thompson
Birth day:
Birth year:

  • 1
    For most of that time, I've also been a keen gardener, but for many years I failed to make the connection between gardening and science. Ken_ThompsonKen Thompson
  • 2
    Grant, if we edited Fortran, I assume that you'd put a column thing in there. Ken_ThompsonKen Thompson
  • 3
    I also enjoy writing my regular column for Organic Gardening magazine, so I may do more of that sort of thing in the future, if anybody wants it! Ken_ThompsonKen Thompson
  • 4
    I also have an idea for a book on biodiversity, and why and how we should be conserving it. Ken_ThompsonKen Thompson
  • 5
    I am a programmer. Ken_ThompsonKen Thompson
  • 6
    I don't think there are many people up in research who have strong ideas about things that they haven't really had experience with. Ken_ThompsonKen Thompson
  • 7
    I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening. Ken_ThompsonKen Thompson
  • 8
    I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week. Ken_ThompsonKen Thompson
  • 9
    I think the major good idea in Unix was its clean and simple interface: open, close, read, and write. Ken_ThompsonKen Thompson
  • 10
    I wanted to avoid, special IO for terminals. Ken_ThompsonKen Thompson
  • 11
    I wanted to have virtual memory, at least as it's coupled with file systems. Ken_ThompsonKen Thompson
  • 12
    In college, before video games, we would amuse ourselves by posing programming exercises. Ken_ThompsonKen Thompson
  • 13
    In fact, we started off with two or three different shells and the shell had life of its own. Ken_ThompsonKen Thompson
  • 14
    It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution. Ken_ThompsonKen Thompson
  • 15
    More precisely stated, the problem is to write a source program that, when compiled and executed, will produce as output an exact copy of its source. Ken_ThompsonKen Thompson
  • 16
    No amount of source-level verification or scrutiny will protect you from using untrusted code. Ken_ThompsonKen Thompson
  • 17
    On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids. Ken_ThompsonKen Thompson
  • 18
    One is that the perfect garden can be created overnight, which it can't. Ken_ThompsonKen Thompson
  • 19
    One of my most productive days was throwing away 1000 lines of code. Ken_ThompsonKen Thompson
  • 20
    So maybe I can go back to being a Gardeners' World addict again. Ken_ThompsonKen Thompson
  • 21
    The average gardener probably knows little about what is going on in his or her garden. Ken_Thompson/21.php">Ken Thompson
  • 22
    The X server has to be the biggest program I've ever seen that doesn't do anything for you. Ken_Thompson/22.php">Ken Thompson
  • 23
    There's a lot of power in executing data - generating data and executing data. Ken_Thompson/23.php">Ken Thompson
  • 24
    Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress. Ken_Thompson/24.php">Ken Thompson
  • 25
    We have persistant objects, they're called files. Ken_Thompson/25.php">Ken Thompson
  • 26
    We tried to avoid, you know, records. We were told over and over that was probably the most serious mistake and the reason was the system would never catch on, because we didn't have records. Ken_Thompson/26.php">Ken Thompson
  • 27
    When in doubt, use brute force. Ken_Thompson/27.php">Ken Thompson
  • 28
    You can't trust code that you did not totally create yourself. Ken_Thompson/28.php">Ken Thompson