When writing gateway software of any kind, take pains to disturb the data stream as little as possible - and never throw away information unless the recipient forces you to!
Grovelling is not a substitute for doing your homework.
When you lose interest in a program, your last duty to it is to hand it off to a competent successor.
Complexity control is the central problem of writing software in the real world
Software is largely a service industry operating under the persistent but unfounded delusion that it is a manufacturing industry
Programmer time is expensive; conserve it in preference to machine time
Microsoft is not the problem. Microsoft is the symptom.
The iPhone brand is in worse shape than I thought was even possible. And the implications of that are huge... The iPhone is in deep trouble.
Ugly programs are like ugly suspension bridges: they're much more liable to collapse than pretty ones, because the way humans (especially engineer-humans) perceive beauty is intimately related to our ability to process and understand complexity. A language that makes it hard to write elegant code makes it hard to write good code.
And for any agents or proxy of the regime interested in asking me questions face to face, I've got some bullets slathered in pork fat to make you feel extra special welcome.
Berkeley hackers liked to see themselves as rebels against soulless corporate empires.
Release early. Release often. And listen to your customers.
I believe, but cannot prove, that global “AIDS” is a whole cluster of unrelated diseases all of which have been swept under a single rug for essentially political reasons, and that the identification of HIV as the sole pathogen is likely to go down as one of the most colossal blunders in the history of medicine.
Lisp was far more powerful and flexible than any other language of its day; in fact, it is still a better design than most languages of today, twenty-five years later. Lisp freed ITS's hackers to think in unusual and creative ways. It was a major factor in their successes, and remains one of hackerdom's favorite languages.
The combination of threads, remote-procedure-call interfaces, and heavyweight object-oriented design is especially dangerous... if you are ever invited onto a project that is supposed to feature all three, fleeing in terror might well be an appropriate reaction.
If you treat your beta-testers as if they're your most valuable resource, they will respond by becoming your most valuable resource.
Being able to break security doesn't make you a hacker anymore than being able to hotwire cars makes you an automotive engineer.
The beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1.
Today I am one of the senior technical cadre that makes the Internet work, and a core Linux and open-source developer.
Linux evolved in a completely different way. From nearly the beginning, it was rather casually hacked on by huge numbers of volunteers coordinating only through the Internet.
The workstation-class machines built by Sun and others opened up new worlds for hackers.
The ARPAnet was the first transcontinental, high-speed computer network.
In early 1993, a hostile observer might have had grounds for thinking that the Unix story was almost played out, and with it the fortunes of the hacker tribe.
A security system is only as secure as its secret. Beware of pseudo-secrets.
When your language is nowhere near Turing-complete, syntactic sugar can be your friend.
Follow AzQuotes on Facebook, Twitter and Google+. Every day we present the best quotes! Improve yourself, find your inspiration, share with friends
or simply: