Ken Thompson

Ken Thompson
Kenneth Lane "Ken" Thompson, commonly referred to as ken in hacker circles, is an American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating systems. Since 2006, Thompson has worked at Google, where he co-invented the Go...
NationalityAmerican
ProfessionScientist
Date of Birth4 February 1943
CountryUnited States of America
UBS, City National Bank and First-Citizens are all unique banking franchises with different market strategies, but all recognize the value of being owners of The Clearing House. For companies with global operations or regional institutions focused in the U.S., The Clearing House provides the industry leadership and innovation that delivers a competitive advantage to institutions.
We are seeing the problems across the board. The fungus took advantage of the rain quicker than the grass.
We're proud of our record fourth-quarter results and fourth consecutive year of double-digit earnings increases despite rising funding costs and related industry-wide pressure on margins.
Tom is one of the most astute financial professionals I have ever known. We are incredibly fortunate to have an individual with Tom's talents assume the responsibilities of CFO for Wachovia.
One of my most productive days was throwing away 1,000 lines of code.
I think the major good idea in Unix was its clean and simple interface: open, close, read, and write.
The X server has to be the biggest program I've ever seen that doesn't do anything for you.
It's always good to take an orthogonal view of something. It develops ideas.
We have persistent objects, they're called files.
In fact, we started off with two or three different shells and the shell had life of its own.
SCCS, the source motel! Programs check in and never check out!
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
I am a very bottom-up thinker.
A well installed microcode bug will be almost impossible to detect.