A Quote by Jonathan Zittrain

The crucial legacy of the personal computer is that anyone can write code for it and give or sell that code to you - and the vendors of the PC and its operating system have no more to say about it than your phone company does about which answering machine you decide to buy.
The genetic code is not a binary code as in computers, nor an eight-level code as in some telephone systems, but a quaternary code with four symbols. The machine code of the genes is uncannily computerlike.
The word 'code' turns out to be a really important word for my book, 'The Information.' The genetic code is just one example. We talk now about coders, coding. Computer guys are coders. The stuff they write is code.
There's a definite sense this morning on the part of the Kerry voters that perhaps this is code, 'moral values,' is code for something else. It's code for taking a different position about gays in America, an exclusionary position, a code about abortion, code about imposing Christianity over other faiths.
I think it's a really admirable thing to be very sure of your own moral code and not waver from that. If you're sure of your moral code, your moral code is personal. Something that I admire about my TV character is being unapologetic and knowing who she is. That was empowering to play.
It was a rather extraordinary conversation if you think about it -- both of us speaking in code. But not military code, not Intelligence or Resistance code -- just feminine code.
Perhaps we could write code to optimize code, then run that code through the code optimizer?
The tax code is very inefficient. Both the personal tax code and the corporate tax code. By closing loopholes and lowering rates, you could increase the efficiency of the tax code and create more incentives for people to invest.
Code wants to be simple... I had to give up the idea that I had the perfect vision of the system to which the system had to conform. Instead, I had to accept that I was only the vehicle for the system expressing its own desire for simplicity. My vision could shape initial direction, and my attention to the desires of the code could affect how quickly and how well the system found its desired shape, but the system is riding me much more than I am riding the system.
There is nothing more personal than your values. What you will and won't do to get ahead, the lines you will and won't cross to win, whom you will and won't step on for personal gain, are at the very core of your code of honor. And your code of honor determines your character. And your character is who you are. Behind closed doors. When nobody is watching.
We're not talking about insignificant amounts of code. It's substantial System V code showing up in Linux.
I personally - if I were designing the tax code - would have a tax code in which Mitt Romney paid more than 13 percent, given what I know about the kind of investments he made money from.
We really believe that we can bring about changes in the tax code that will make America more attractive for investment and job creation and business. But the president has also made it very clear that he wants to put - he wants to put new elements in the tax code that are going to have companies pay a price if they decide to take jobs out of the country and then sell their goods back into the United States.
Always think about how a piece of code should be used: good interfaces are the essence of good code. You can hide all kinds of clever and dirty code behind a good interface if you really need such code.
Any fool can write code that a computer can understand. Good programmers write code that humans can understand.
As the head of the public company, you can't say you can't sell, because then you're telling your shareholders that your own personal feelings about your assets are more important than their money. And they won't invest with you if you do that.
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
This site uses cookies to ensure you get the best experience. More info...
Got it!