One of my most productive days was throwing away 1,000 lines of code.
Topics: Lines, Programming, Throwing, Computer Science, Computer Programming

It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
Topics: Criminals, Serious, Hackers, Prosecution
source: - "Unix and Beyond: An Interview with Ken Thompson". Computer 32 (5), (pp. 58-64), May 1999.
I view Linux as something that's not Microsoft - a backlash against Microsoft, no more and no less.
source: - "Unix and Beyond: An Interview with Ken Thompson". Computer 32 (5), (pp. 58-64), May 1999.
FORTRAN was the language of choice for the same reason that three-legged races are popular.
source: - 1983 Turing Award Lecture, "Communications of the ACM" 27 (8), (pp. 761-763), August 1984.
I am a very bottom-up thinker.
source: - "Unix and Beyond: An Interview with Ken Thompson". Computer 32 (5), (pp. 58-64), May 1999.
I wanted to separate data from programs, because data and instructions are very different.
Topics: Data, Different, Separation
The X server has to be the biggest program I've ever seen that doesn't do anything for you.
Topics: Program, Programming, Server
Topics: Jobs, Reading, Gardening, Academic Work
On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids.
You can't trust code that you did not totally create yourself.
source: - "Reflections on Trusting Trust". Communications of the ACM 27 (8), (pp. 761-763), August 1984.
Topics: Trust, Programming, Code, Self Trust
No amount of source-level verification or scrutiny will protect you from using untrusted code.
source: - "Reflections on Trusting Trust". Communications of the ACM 27 (8), (pp. 761-763), August 1984.
Topics: Levels, Scrutiny, Source, Verification