Frases de Ken Thompson

Kenneth Lane Thompson , más conocido como Ken Thompson, es un pionero en las ciencias de la computación. Su trabajo con el lenguaje de programación B y el sistema operativo UNIX y Plan 9 para los laboratorios Bell. Se le adjudica a Thompson, junto a Dennis Ritchie, la creación de UNIX. Wikipedia  

✵ 4. febrero 1943
Ken Thompson Foto
Ken Thompson: 28   frases 0   Me gusta

Ken Thompson: Frases en inglés

“When in doubt, use brute force.”

Fuente: http://wiki.c2.com/?BruteForce

“Ken Thompson was once asked what he would do differently if he were redesigning the UNIX system. His reply: "I'd spell creat with an e."”

[The UNIX programming environment, Kernighan, Brian W., Brian Kernighan, Pike, Rob, w:Rob Pike, Prentice-Hall, 1984, 10269821, 0139376992], p. 204 http://books.google.com/books?id=poFQAAAAMAAJ&q=%22spell+creat+with+an+e%22&dq=%22spell+creat+with+an+e%22.

“The press, television, and movies make heroes of vandals by calling them whiz kids.”

"Reflections on Trusting Trust" http://cm.bell-labs.com/who/ken/trust.html, 1983 Turing Award Lecture http://cm.bell-labs.com/who/ken/trust.html,Communications of the ACM 27 (8), August 1984, pp. 761-763.
Contexto: The press, television, and movies make heroes of vandals by calling them whiz kids.... There is obviously a cultural gap. The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor's house. It should not matter that the neighbor's door is unlocked.

“In Plan 9, the key abstraction is the file system—anything you can read and write and select by names in a hierarchy—and the protocol exports that abstraction to remote channels to enable distribution.”

"Unix and Beyond: An Interview with Ken Thompson," 1999
Contexto: In Plan 9 and Inferno, the key ideas are the protocol for communicating between components and the simplification and extension of particular concepts. In Plan 9, the key abstraction is the file system—anything you can read and write and select by names in a hierarchy—and the protocol exports that abstraction to remote channels to enable distribution. Inferno works similarly, but it has a layer of language interaction above it through the Limbo language interface—which is like Java, but cleaner I think.

“You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.)”

"Reflections on Trusting Trust" http://cm.bell-labs.com/who/ken/trust.html, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
Contexto: You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.

“Unix was small, and you could go through it line by line and understand exactly how it worked. That was the origin of the so-called Unix culture.”

"Unix and Beyond: An Interview with Ken Thompson," 1999
Contexto: Unix was a very small, understandable OS, so people could change it at their will. It would run itself—you could type "go" and in a few minutes it would recompile itself. You had total control over the whole system. So it was very beneficial to a lot of people, especially at universities, because it was very hard to teach computing from an IBM end-user point of view. Unix was small, and you could go through it line by line and understand exactly how it worked. That was the origin of the so-called Unix culture.

“The X server has to be the biggest program I've ever seen that doesn't do anything for you.”

Thompson later followed up: "I now realize that X was just miles ahead in its programming style." http://www.google.com/moderator/#15/e=7f3&t=7f3.44
Plan 9 fortune file (1992)

“When the three of us [Thompson, Rob Pike, and Robert Griesemer] got started, it was pure research. The three of us got together and decided that we hated C++. [laughter] … [Returning to Go, ] we started off with the idea that all three of us had to be talked into every feature in the language, so there was no extraneous garbage put into the language for any reason.”

Ken Thompson, talking about the origins of the Go programming language
Dr. Dobb's: Interview with Ken Thompson, 18 May 2011, 7 February 2014 http://www.drdobbs.com/open-source/interview-with-ken-thompson/229502480,
"Interview with Ken Thompson", 2011

“It does everything Unix does only less reliably.”

In response to the question, "Can you sum up plan 9 in layman's terms?"
Plan 9 fortune file (1992)

“grep was a private command of mine for quite a while before i made it public.”

Fuente: The history of grep, the 40 years old Unix command, Benjamin Rualthanzauva, 5 Feb 2014 https://medium.com/@rualthanzauva/grep-was-a-private-command-of-mine-for-quite-a-while-before-i-made-it-public-ken-thompson-a40e24a5ef48,

“I've seen [visual] editors like that, but I don't feel a need for them. I don't want to see the state of the file when I'm editing.”

Thompson on the superiority of <tt>ed</tt> to editors such as today's <tt>vi</tt> or <tt>emacs</tt>, as summarized by Peter Salus in A Quarter Century of UNIX (Addison-Wesley, 1994). http://web.archive.org/web/20080103071208/http://www.dcs.qmul.ac.uk/~george/history/

“You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.”

"Reflections on Trusting Trust" http://delivery.acm.org/10.1145/360000/358210/reflections.pdf, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.