“It was a rather extraordinary conversation if you think about it -- both of us speaking in code. But not military code, not Intelligence or Resistance code -- just feminine code.”

Source: Code Name Verity

Last update June 3, 2021. History

Help us to complete the source, original and additional information

Do you have more details about the quote "It was a rather extraordinary conversation if you think about it -- both of us speaking in code. But not military code,…" by Elizabeth Wein?
Elizabeth Wein photo
Elizabeth Wein 34
American children's writer 1964

Related quotes

Ken Thompson photo

“You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.”

Ken Thompson (1943) American computer scientist, creator of the Unix operating system

"Reflections on Trusting Trust" http://delivery.acm.org/10.1145/360000/358210/reflections.pdf, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.

Albert Camus photo
Larry Wall photo

“It's, uh, pseudo code. Yeah, that's the ticket…[…]And 'unicode' is pseudo code for $encoding.”

Larry Wall (1954) American computer programmer and author, creator of Perl

[199808071717.KAA12628@wall.org, 1998]
Usenet postings, 1998

Ed Yourdon photo

“Elements (lines of code) in a coincidentally-cohesive module have no relationship. Typically occurs as the result of modularizing existing code, to separate out redundant code.”

Ed Yourdon (1944–2016) American software engineer and pioneer in the software engineering methodology

Source: Structured design: fundamentals of a discipline of computer program and systems design (1979), p. 109; as cited in " Design http://swansonsoftware.com/acme/default.asp" at swansonsoftware.com Draft Version 0.9, December 3 2005.

Barry Boehm photo

“When code and comments disagree, both are probably wrong.”

More Programming Pearls: Confessions of a Coder, Column 6: Bumper-Sticker Computer Science. http://www.softwarequotes.com/ShowQuotes.asp?ID=660&Name=Schryer%20,_Norm&Type=Q

Narendra Modi photo

“Why are you violating that code and”

Narendra Modi (1950) Prime Minister of India

2014, "Narendra Modi on the Role of NDTV during the 2002 Riots", 2014
Context: Since Rajdeep Sardesai was among the leading reporters covering the disturbances, I phoned him to say, "I will have to put a temporary ban on your channel if you continue with the provocative coverage. There is a well-established regulation that media should not name communities during communal riots nor identify a damaged place[s] as a mandir or masjid. Why are you violating that code and [established] protocol about not naming communities or identifying places [... ] of worship? You are going against established norms."

Ram Dass photo
Ken Thompson photo

“You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.)”

Ken Thompson (1943) American computer scientist, creator of the Unix operating system

"Reflections on Trusting Trust" http://cm.bell-labs.com/who/ken/trust.html, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
Context: You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.

Newton Lee photo

Related topics