Ken Thompson Quotes
-
We have persistent objects, they're called files.
→ -
In fact, we started off with two or three different shells and the shell had life of its own.
→ -
In college, before video games, we would amuse ourselves by posing programming exercises.
→ -
That brings me to Dennis Ritchie. Our collaboration has been a thing of beauty.
→ -
For most of that time, I've also been a keen gardener, but for many years I failed to make the connection between gardening and science.
→ -
One of my most productive days was throwing away 1,000 lines of code.
→ -
SCCS, the source motel! Programs check in and never check out!
→ -
I wanted to separate data from programs, because data and instructions are very different.
→ -
I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening.
→ -
It's always good to take an orthogonal view of something. It develops ideas.
→ -
A well installed microcode bug will be almost impossible to detect.
→ -
I am a very bottom-up thinker.
→ -
I wanted to avoid, special IO for terminals.
→ -
Just think, IBM and DEC in the same room, and we did it.
→ -
I view Linux as something that's not Microsoft - a backlash against Microsoft, no more and no less.
→ -
So maybe I can go back to being a Gardeners' World addict again.
→ -
You can't trust code that you did not totally create yourself.
→ -
FORTRAN was the language of choice for the same reason that three-legged races are popular.
→ -
If you want to go somewhere, goto is the best way to get there.
→ -
The steady state of disks is full.
→ -
I also enjoy writing my regular column for Organic Gardening magazine, so I may do more of that sort of thing in the future, if anybody wants it!
→ -
The average gardener probably knows little about what is going on in his or her garden.
→ -
On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids.
→ -
I don't think there are many people up in research who have strong ideas about things that they haven't really had experience with.
→ -
When in doubt, use brute force.
→ -
I wanted to have virtual memory, at least as it's coupled with file systems.
→ -
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
→ -
No amount of source-level verification or scrutiny will protect you from using untrusted code.
→ -
The X server has to be the biggest program I've ever seen that doesn't do anything for you.
→ -
There's a lot of power in executing data - generating data and executing data.
→