Ken Thompson Quotes

I am a very bottom-up thinker... view

By: Ken Thompson

I wanted to avoid, special IO for terminals... view

By: Ken Thompson

I think the major good idea in Unix was its clean and simple interface: open, close, read, and write... view

By: Ken Thompson

I still have a full-time day job, which is why it took me five years to write An Ear to the Ground, and why I won't have another book finished by next week... view

By: Ken Thompson

I have to keep up with the scientific literature as part of my job, but increasingly I found myself reading things that weren't really relevant to my academic work, but were relevant to gardening... view

By: Ken Thompson

I am a programmer... view

By: Ken Thompson

So maybe I can go back to being a Gardeners' World addict again... view

By: Ken Thompson

I also have an idea for a book on biodiversity, and why and how we should be conserving it... view

By: Ken Thompson

I wanted to have virtual memory, at least as it's coupled with file systems... view

By: Ken Thompson

A well installed microcode bug will be almost impossible to detect... view

By: Ken Thompson

Grant, if we edited Fortran, I assume that you'd put a column thing in there... view

By: Ken Thompson

There are no projects per se in the Computing Sciences Research Center... view

By: Ken Thompson

I wanted to separate data from programs, because data and instructions are very different... view

By: Ken Thompson

One is that the perfect garden can be created overnight, which it can't... view

By: Ken Thompson

You can't trust code that you did not totally create yourself... view

By: Ken Thompson

When in doubt, use brute force... view

By: Ken Thompson

We tried to avoid, you know, records. We were told over and over that was probably the most serious mistake and the reason was the system would never catch on, because we didn't have records... view

By: Ken Thompson

We have persistant objects, they're called files... view

By: Ken Thompson

There's a lot of power in executing data - generating data and executing data... view

By: Ken Thompson

The X server has to be the biggest program I've ever seen that doesn't do anything for you... view

By: Ken Thompson

The average gardener probably knows little about what is going on in his or her garden... view

By: Ken Thompson

It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution... view

By: Ken Thompson

If you want to go somewhere, goto is the best way to get there... view

By: Ken Thompson

In college, before video games, we would amuse ourselves by posing programming exercises... view

By: Ken Thompson

Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress... view

By: Ken Thompson

In fact, we started off with two or three different shells and the shell had life of its own... view

By: Ken Thompson

That brings me to Dennis Ritchie. Our collaboration has been a thing of beauty... view

By: Ken Thompson

It's always good to take an orthogonal view of something. It develops ideas... view

By: Ken Thompson

No amount of source-level verification or scrutiny will protect you from using untrusted code... view

By: Ken Thompson

On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids... view

By: Ken Thompson

One of my most productive days was throwing away 1000 lines of code... view

By: Ken Thompson