"There's a lot of power in executing data - generating data and executing data"
About this Quote
In Thompson's clunky, almost tautological phrasing is a very programmerly truth: power doesn't live in the abstract noun "data" so much as in the verbs around it. "Generating" and "executing" are doing-words, and the repetition reads like someone thinking out loud about the real leverage points in computing. Collecting information is only half the trick; the other half is turning it into action, at scale, repeatedly, without asking permission each time.
The subtext is that data is not neutral. Once you can generate it, you can define what counts as reality in a system: what gets measured, logged, surfaced, ignored. Once you can execute it, you can make that reality operative - automate decisions, trigger behaviors, shape environments. In software terms, "executing data" hints at the blurry boundary between data and code: configuration files that behave like programs, inputs that become commands, models that don't just describe the world but drive it. That's where both innovation and vulnerability live, from elegant pipelines to injection attacks and "the model decided" accountability gaps.
Context matters because Thompson is one of the foundational figures of modern computing (Unix, C, the security parable of "trusting trust"). He's speaking from a lineage that treats systems as instruments of control: whoever owns the pipeline owns the outcomes. The line lands today as an accidental critique of surveillance capitalism and algorithmic governance: the scary part isn't that we have data. It's that we can run it.
The subtext is that data is not neutral. Once you can generate it, you can define what counts as reality in a system: what gets measured, logged, surfaced, ignored. Once you can execute it, you can make that reality operative - automate decisions, trigger behaviors, shape environments. In software terms, "executing data" hints at the blurry boundary between data and code: configuration files that behave like programs, inputs that become commands, models that don't just describe the world but drive it. That's where both innovation and vulnerability live, from elegant pipelines to injection attacks and "the model decided" accountability gaps.
Context matters because Thompson is one of the foundational figures of modern computing (Unix, C, the security parable of "trusting trust"). He's speaking from a lineage that treats systems as instruments of control: whoever owns the pipeline owns the outcomes. The line lands today as an accidental critique of surveillance capitalism and algorithmic governance: the scary part isn't that we have data. It's that we can run it.
Quote Details
| Topic | Coding & Programming |
|---|---|
| Source | Help us find the source |
More Quotes by Ken
Add to List








