Ken Thompson Quotes

Kenneth Lane Thompson is an American pioneer of computer science. Thompson worked at Bell Labs for most of his career where he designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating system. Since 2006, Thompson has worked at Google, where he co-invented the Go programming language.

Other notable contributions included his work on regular expressions and early computer text editors QED and ed, the definition of the UTF-8 encoding, his work on computer chess that included creation of endgame tablebases and the chess machine Belle.



Wikipedia  

✵ 4. February 1943
Ken Thompson photo
Ken Thompson: 28   quotes 2   likes

Famous Ken Thompson Quotes

“When in doubt, use brute force.”

Source: http://wiki.c2.com/?BruteForce

“Ken Thompson was once asked what he would do differently if he were redesigning the UNIX system. His reply: "I'd spell creat with an e."”

[The UNIX programming environment, Kernighan, Brian W., Brian Kernighan, Pike, Rob, w:Rob Pike, Prentice-Hall, 1984, 10269821, 0139376992], p. 204 http://books.google.com/books?id=poFQAAAAMAAJ&q=%22spell+creat+with+an+e%22&dq=%22spell+creat+with+an+e%22.

“The X server has to be the biggest program I've ever seen that doesn't do anything for you.”

Thompson later followed up: "I now realize that X was just miles ahead in its programming style." http://www.google.com/moderator/#15/e=7f3&t=7f3.44
Plan 9 fortune file (1992)

“We have persistent objects, they're called files.”

Plan 9 fortune file (1992)

Ken Thompson Quotes about thinking

“I think the open software movement (and Linux in particular) is laudable.”

"Ken Thompson clarifies matters", 1999

“I think the major good idea in Unix was its clean and simple interface: open, close, read, and write.”

"Unix and Beyond: An Interview with Ken Thompson," 1999

Ken Thompson Quotes

“The press, television, and movies make heroes of vandals by calling them whiz kids.”

"Reflections on Trusting Trust" http://cm.bell-labs.com/who/ken/trust.html, 1983 Turing Award Lecture http://cm.bell-labs.com/who/ken/trust.html,Communications of the ACM 27 (8), August 1984, pp. 761-763.
Context: The press, television, and movies make heroes of vandals by calling them whiz kids.... There is obviously a cultural gap. The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor's house. It should not matter that the neighbor's door is unlocked.

“In Plan 9, the key abstraction is the file system—anything you can read and write and select by names in a hierarchy—and the protocol exports that abstraction to remote channels to enable distribution.”

"Unix and Beyond: An Interview with Ken Thompson," 1999
Context: In Plan 9 and Inferno, the key ideas are the protocol for communicating between components and the simplification and extension of particular concepts. In Plan 9, the key abstraction is the file system—anything you can read and write and select by names in a hierarchy—and the protocol exports that abstraction to remote channels to enable distribution. Inferno works similarly, but it has a layer of language interaction above it through the Limbo language interface—which is like Java, but cleaner I think.

“You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.)”

"Reflections on Trusting Trust" http://cm.bell-labs.com/who/ken/trust.html, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
Context: You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.

“Unix was small, and you could go through it line by line and understand exactly how it worked. That was the origin of the so-called Unix culture.”

"Unix and Beyond: An Interview with Ken Thompson," 1999
Context: Unix was a very small, understandable OS, so people could change it at their will. It would run itself—you could type "go" and in a few minutes it would recompile itself. You had total control over the whole system. So it was very beneficial to a lot of people, especially at universities, because it was very hard to teach computing from an IBM end-user point of view. Unix was small, and you could go through it line by line and understand exactly how it worked. That was the origin of the so-called Unix culture.

“When the three of us [Thompson, Rob Pike, and Robert Griesemer] got started, it was pure research. The three of us got together and decided that we hated C++. [laughter] … [Returning to Go, ] we started off with the idea that all three of us had to be talked into every feature in the language, so there was no extraneous garbage put into the language for any reason.”

Ken Thompson, talking about the origins of the Go programming language
Dr. Dobb's: Interview with Ken Thompson, 18 May 2011, 7 February 2014 http://www.drdobbs.com/open-source/interview-with-ken-thompson/229502480,
"Interview with Ken Thompson", 2011

“It does everything Unix does only less reliably.”

In response to the question, "Can you sum up plan 9 in layman's terms?"
Plan 9 fortune file (1992)

“grep was a private command of mine for quite a while before i made it public.”

Source: The history of grep, the 40 years old Unix command, Benjamin Rualthanzauva, 5 Feb 2014 https://medium.com/@rualthanzauva/grep-was-a-private-command-of-mine-for-quite-a-while-before-i-made-it-public-ken-thompson-a40e24a5ef48,

“Hi, this is Ken. What's the root password?”

Plan 9 fortune file (1992)

“There's going to be no serious problem after this.”

Plan 9 fortune file (1992)

“If you want to go somewhere, goto is the best way to get there.”

Plan 9 fortune file (1992)

“I've seen [visual] editors like that, but I don't feel a need for them. I don't want to see the state of the file when I'm editing.”

Thompson on the superiority of <tt>ed</tt> to editors such as today's <tt>vi</tt> or <tt>emacs</tt>, as summarized by Peter Salus in A Quarter Century of UNIX (Addison-Wesley, 1994). http://web.archive.org/web/20080103071208/http://www.dcs.qmul.ac.uk/~george/history/

“Gigabit' seems to mean 600 megabits. It's a VAX gigabit.”

Plan 9 fortune file (1992)

“You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.”

"Reflections on Trusting Trust" http://delivery.acm.org/10.1145/360000/358210/reflections.pdf, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.

Similar authors

Herbert A. Simon photo
Herbert A. Simon 58
American political scientist, economist, sociologist, and p…
Steve Jobs photo
Steve Jobs 150
American entrepreneur and co-founder of Apple Inc.
Martin Lewis Perl photo
Martin Lewis Perl 9
American scientist
Jerome Isaac Friedman photo
Jerome Isaac Friedman 6
American physicist
Richard Feynman photo
Richard Feynman 181
American theoretical physicist
Noam Chomsky photo
Noam Chomsky 334
american linguist, philosopher and activist
Robert T. Kiyosaki photo
Robert T. Kiyosaki 151
American finance author , investor
Jacque Fresco photo
Jacque Fresco 52
American futurist and self-described social engineer
Hans Bethe photo
Hans Bethe 2
German-American nuclear physicist
Ayn Rand photo
Ayn Rand 322
Russian-American novelist and philosopher