Ken Thompson Quotes and Sayings
- 1
A well installed microcode bug will be almost impossible to detect. Ken Thompson | Refcard PDF ↑
- 2
Grant, if we edited Fortran, I assume that you'd put a column thing in there. Ken Thompson | Refcard PDF ↑
- 3
I also have an idea for a book on biodiversity, and why and how we should be conserving it. Ken Thompson | Refcard PDF ↑
- 4
I am a programmer. Ken Thompson | Refcard PDF ↑
- 5
I am a very bottom-up thinker. Ken Thompson | Refcard PDF ↑
- 6
I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening. Ken Thompson | Refcard PDF ↑
- 7
I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week. Ken Thompson | Refcard PDF ↑
- 8
I think the major good idea in Unix was its clean and simple interface: open, close, read, and write. Ken Thompson | Refcard PDF ↑
- 9
I wanted to avoid, special IO for terminals. Ken Thompson | Refcard PDF ↑
- 10
I wanted to have virtual memory, at least as it's coupled with file systems. Ken Thompson | Refcard PDF ↑
- 11
I wanted to separate data from programs, because data and instructions are very different. Ken Thompson | Refcard PDF ↑
- 12
If you want to go somewhere, goto is the best way to get there. Ken Thompson | Refcard PDF ↑
- 13
In college, before video games, we would amuse ourselves by posing programming exercises. Ken Thompson | Refcard PDF ↑
- 14
In fact, we started off with two or three different shells and the shell had life of its own. Ken Thompson | Refcard PDF ↑
- 15
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution. Ken Thompson | Refcard PDF ↑
- 16
It's always good to take an orthogonal view of something. It develops ideas. Ken Thompson | Refcard PDF ↑
- 17
No amount of source-level verification or scrutiny will protect you from using untrusted code. Ken Thompson | Refcard PDF ↑
- 18
On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids. Ken Thompson | Refcard PDF ↑
- 19
One is that the perfect garden can be created overnight, which it can't. Ken Thompson | Refcard PDF ↑
- 20
One of my most productive days was throwing away 1000 lines of code. Ken Thompson | Refcard PDF ↑
- 21
So maybe I can go back to being a Gardeners' World addict again. Ken Thompson | Refcard PDF ↑
- 22
That brings me to Dennis Ritchie. Our collaboration has been a thing of beauty. Ken Thompson | Refcard PDF ↑
- 23
The average gardener probably knows little about what is going on in his or her garden. Ken Thompson | Refcard PDF ↑
- 24
The X server has to be the biggest program I've ever seen that doesn't do anything for you. Ken Thompson | Refcard PDF ↑
- 25
There are no projects per se in the Computing Sciences Research Center. Ken Thompson | Refcard PDF ↑
- 26
There's a lot of power in executing data - generating data and executing data. Ken Thompson | Refcard PDF ↑
- 27
Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress. Ken Thompson | Refcard PDF ↑
- 28
We have persistant objects, they're called files. Ken Thompson | Refcard PDF ↑
- 29
We tried to avoid, you know, records. We were told over and over that was probably the most serious mistake and the reason was the system would never catch on, because we didn't have records. Ken Thompson | Refcard PDF ↑
- 30
When in doubt, use brute force. Ken Thompson | Refcard PDF ↑
- 31
You can't trust code that you did not totally create yourself. Ken Thompson | Refcard PDF ↑