![]() I can sit there and see primitives and recognize their power to build structures a half mile high, if only I had just one more to make it functionally complete. If you give me the right kind of Tinker Toys, I can imagine the building. "Unix and Beyond: An Interview with Ken Thompson", Computer 32 (5), May 1999, pp. "Unix and Beyond: An Interview with Ken Thompson," 1999 (In response to the question, "Can you sum up plan 9 in layman's terms?").It does everything Unix does only less reliably.There's going to be no serious problem after this.Thompson later followed up: "I now realize that X was just miles ahead in its programming style.".The X server has to be the biggest program I've ever seen that doesn't do anything for you.If you want to go somewhere, goto is the best way to get there.We have persistent objects, they're called files.Plan 9 fortune file (1992) Quotations from the fortune command included with the Plan 9 operating system (1992) That's where I learned a lot of this kind of logic. I used to play pinball machines, and I would pick the lock in the back of pinball machines. I was always into games, games was my thing. I didn't build it as an operating system for other people, I built it to do games, and to do my stuff. grep was a private command of mine for quite a while before i made it public.Ken Thompson was once asked what he would do differently if he were redesigning the UNIX system.Thompson on the superiority of ed to editors such as today's vi or emacs, as summarized by Peter Salus in A Quarter Century of UNIX (Addison-Wesley, 1994).I don't want to see the state of the file when I'm editing." "I've seen editors like that, but I don't feel a need for them.It should not matter that the neighbor's door is unlocked. ![]() The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor's house. The press, television, and movies make heroes of vandals by calling them whiz kids."Reflections on Trusting Trust", 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp.(Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. You can't trust code that you did not totally create yourself.1.5 "Interview with Ken Thompson", 2011.1.3 "Ken Thompson clarifies matters", 1999.1.2 "Unix and Beyond: An Interview with Ken Thompson," 1999.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |