Ken Thompson - Quotes

There are 31 quotes by Ken Thompson at Find your favorite quotations and top quotes by Ken Thompson from this hand-picked collection . Feel free to share these quotes and sayings on Facebook, Pinterest, Tumblr & Twitter or any of your favorite social networking sites.

When in doubt, use brute force. ---->>>

One of my most productive days was throwing away 1,000 lines of code. ---->>>

I wanted to separate data from programs, because data and instructions are very different. ---->>>

I think the major good idea in Unix was its clean and simple interface: open, close, read, and write. ---->>>

I wanted to have virtual memory, at least as it's coupled with file systems. ---->>>

In college, before video games, we would amuse ourselves by posing programming exercises. ---->>>

In fact, we started off with two or three different shells and the shell had life of its own. ---->>>

I am a programmer. ---->>>

I wanted to avoid, special IO for terminals. ---->>>

We have persistant objects, they're called files. ---->>>

It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution. ---->>>

If you want to go somewhere, goto is the best way to get there. ---->>>

You can't trust code that you did not totally create yourself. ---->>>

I also have an idea for a book on biodiversity, and why and how we should be conserving it. ---->>>

No amount of source-level verification or scrutiny will protect you from using untrusted code. ---->>>

That brings me to Dennis Ritchie. Our collaboration has been a thing of beauty. ---->>>

The average gardener probably knows little about what is going on in his or her garden. ---->>>

The X server has to be the biggest program I've ever seen that doesn't do anything for you. ---->>>

It's always good to take an orthogonal view of something. It develops ideas. ---->>>

On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids. ---->>>

I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening. ---->>>

I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week. ---->>>

There's a lot of power in executing data - generating data and executing data. ---->>>

Grant, if we edited Fortran, I assume that you'd put a column thing in there. ---->>>

I am a very bottom-up thinker. ---->>>

A well installed microcode bug will be almost impossible to detect. ---->>>

One is that the perfect garden can be created overnight, which it can't. ---->>>

So maybe I can go back to being a Gardeners' World addict again. ---->>>

There are no projects per se in the Computing Sciences Research Center. ---->>>

Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress. ---->>>

We tried to avoid, you know, records. We were told over and over that was probably the most serious mistake and the reason was the system would never catch on, because we didn't have records. ---->>>


Nationality: American
Born: 02-04, 1943
Occupation: Scientist

Kenneth Lane "Ken" Thompson (born February 4, 1943), commonly referred to as ken in hacker circles, is an American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating systems (wikipedia)