
"Reflections on Trusting Trust" http://delivery.acm.org/10.1145/360000/358210/reflections.pdf, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
Source: Code Name Verity
"Reflections on Trusting Trust" http://delivery.acm.org/10.1145/360000/358210/reflections.pdf, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
“It's, uh, pseudo code. Yeah, that's the ticket…[…]And 'unicode' is pseudo code for $encoding.”
[199808071717.KAA12628@wall.org, 1998]
Usenet postings, 1998
Source: Structured design: fundamentals of a discipline of computer program and systems design (1979), p. 109; as cited in " Design http://swansonsoftware.com/acme/default.asp" at swansonsoftware.com Draft Version 0.9, December 3 2005.
Source: A spiral model of software development and enhancement. (1988), p. 61-62
“When code and comments disagree, both are probably wrong.”
More Programming Pearls: Confessions of a Coder, Column 6: Bumper-Sticker Computer Science. http://www.softwarequotes.com/ShowQuotes.asp?ID=660&Name=Schryer%20,_Norm&Type=Q
“Why are you violating that code and”
2014, "Narendra Modi on the Role of NDTV during the 2002 Riots", 2014
Context: Since Rajdeep Sardesai was among the leading reporters covering the disturbances, I phoned him to say, "I will have to put a temporary ban on your channel if you continue with the provocative coverage. There is a well-established regulation that media should not name communities during communal riots nor identify a damaged place[s] as a mandir or masjid. Why are you violating that code and [established] protocol about not naming communities or identifying places [... ] of worship? You are going against established norms."
"Reflections on Trusting Trust" http://cm.bell-labs.com/who/ken/trust.html, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
Context: You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.