Alan Turing: True to Himself
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Edsger Dijkstra: the Man Who Carried Computer Science on His Shoulders
INFERENCE / Vol. 5, No. 3 Edsger Dijkstra The Man Who Carried Computer Science on His Shoulders Krzysztof Apt s it turned out, the train I had taken from dsger dijkstra was born in Rotterdam in 1930. Nijmegen to Eindhoven arrived late. To make He described his father, at one time the president matters worse, I was then unable to find the right of the Dutch Chemical Society, as “an excellent Aoffice in the university building. When I eventually arrived Echemist,” and his mother as “a brilliant mathematician for my appointment, I was more than half an hour behind who had no job.”1 In 1948, Dijkstra achieved remarkable schedule. The professor completely ignored my profuse results when he completed secondary school at the famous apologies and proceeded to take a full hour for the meet- Erasmiaans Gymnasium in Rotterdam. His school diploma ing. It was the first time I met Edsger Wybe Dijkstra. shows that he earned the highest possible grade in no less At the time of our meeting in 1975, Dijkstra was 45 than six out of thirteen subjects. He then enrolled at the years old. The most prestigious award in computer sci- University of Leiden to study physics. ence, the ACM Turing Award, had been conferred on In September 1951, Dijkstra’s father suggested he attend him three years earlier. Almost twenty years his junior, I a three-week course on programming in Cambridge. It knew very little about the field—I had only learned what turned out to be an idea with far-reaching consequences. a flowchart was a couple of weeks earlier. -
The Turing Approach Vs. Lovelace Approach
Connecting the Humanities and the Sciences: Part 2. Two Schools of Thought: The Turing Approach vs. The Lovelace Approach* Walter Isaacson, The Jefferson Lecture, National Endowment for the Humanities, May 12, 2014 That brings us to another historical figure, not nearly as famous, but perhaps she should be: Ada Byron, the Countess of Lovelace, often credited with being, in the 1840s, the first computer programmer. The only legitimate child of the poet Lord Byron, Ada inherited her father’s romantic spirit, a trait that her mother tried to temper by having her tutored in math, as if it were an antidote to poetic imagination. When Ada, at age five, showed a preference for geography, Lady Byron ordered that the subject be replaced by additional arithmetic lessons, and her governess soon proudly reported, “she adds up sums of five or six rows of figures with accuracy.” Despite these efforts, Ada developed some of her father’s propensities. She had an affair as a young teenager with one of her tutors, and when they were caught and the tutor banished, Ada tried to run away from home to be with him. She was a romantic as well as a rationalist. The resulting combination produced in Ada a love for what she took to calling “poetical science,” which linked her rebellious imagination to an enchantment with numbers. For many people, including her father, the rarefied sensibilities of the Romantic Era clashed with the technological excitement of the Industrial Revolution. Lord Byron was a Luddite. Seriously. In his maiden and only speech to the House of Lords, he defended the followers of Nedd Ludd who were rampaging against mechanical weaving machines that were putting artisans out of work. -
CODEBREAKING Suggested Reading List (Can Also Be Viewed Online at Good Reads)
MARSHALL LEGACY SERIES: CODEBREAKING Suggested Reading List (Can also be viewed online at Good Reads) NON-FICTION • Aldrich, Richard. Intelligence and the War against Japan. Cambridge: Cambridge University Press, 2000. • Allen, Robert. The Cryptogram Challenge: Over 150 Codes to Crack and Ciphers to Break. Philadelphia: Running Press, 2005 • Briggs, Asa. Secret Days Code-breaking in Bletchley Park. Barnsley: Frontline Books, 2011 • Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War Two. New York: Free Press, 2000. • Churchhouse, Robert. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge: Cambridge University Press, 2001. • Clark, Ronald W. The Man Who Broke Purple. London: Weidenfeld and Nicholson, 1977. • Drea, Edward J. MacArthur's Ultra: Codebreaking and the War Against Japan, 1942-1945. Kansas: University of Kansas Press, 1992. • Fisher-Alaniz, Karen. Breaking the Code: A Father's Secret, a Daughter's Journey, and the Question That Changed Everything. Naperville, IL: Sourcebooks, 2011. • Friedman, William and Elizebeth Friedman. The Shakespearian Ciphers Examined. Cambridge: Cambridge University Press, 1957. • Gannon, James. Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth century. Washington, D.C.: Potomac Books, 2001. • Garrett, Paul. Making, Breaking Codes: Introduction to Cryptology. London: Pearson, 2000. • Hinsley, F. H. and Alan Stripp. Codebreakers: the inside story of Bletchley Park. Oxford: Oxford University Press, 1993. • Hodges, Andrew. Alan Turing: The Enigma. New York: Walker and Company, 2000. • Kahn, David. Seizing The Enigma: The Race to Break the German U-boat Codes, 1939-1943. New York: Barnes and Noble Books, 2001. • Kahn, David. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. -
An Early Program Proof by Alan Turing F
An Early Program Proof by Alan Turing F. L. MORRIS AND C. B. JONES The paper reproduces, with typographical corrections and comments, a 7 949 paper by Alan Turing that foreshadows much subsequent work in program proving. Categories and Subject Descriptors: 0.2.4 [Software Engineeringj- correctness proofs; F.3.1 [Logics and Meanings of Programs]-assertions; K.2 [History of Computing]-software General Terms: Verification Additional Key Words and Phrases: A. M. Turing Introduction The standard references for work on program proofs b) have been omitted in the commentary, and ten attribute the early statement of direction to John other identifiers are written incorrectly. It would ap- McCarthy (e.g., McCarthy 1963); the first workable pear to be worth correcting these errors and com- methods to Peter Naur (1966) and Robert Floyd menting on the proof from the viewpoint of subse- (1967); and the provision of more formal systems to quent work on program proofs. C. A. R. Hoare (1969) and Edsger Dijkstra (1976). The Turing delivered this paper in June 1949, at the early papers of some of the computing pioneers, how- inaugural conference of the EDSAC, the computer at ever, show an awareness of the need for proofs of Cambridge University built under the direction of program correctness and even present workable meth- Maurice V. Wilkes. Turing had been writing programs ods (e.g., Goldstine and von Neumann 1947; Turing for an electronic computer since the end of 1945-at 1949). first for the proposed ACE, the computer project at the The 1949 paper by Alan M. -
Vision for Change: Acceptance Without Exception for Trans People
A VISION FOR CHANGE Acceptance without exception for trans people 2017-2022 A VISION FOR CHANGE Acceptance without exception for trans people Produced by Stonewall Trans Advisory Group Published by Stonewall [email protected] www.stonewall.org.uk/trans A VISION FOR CHANGE Acceptance without exception for trans people 2017-2022 CONTENTS PAGE 5 INTRODUCTION FROM STONEWALL’S TRANS ADVISORY GROUP PAGE 6 INTRODUCTION FROM RUTH HUNT, CHIEF EXECUTIVE, STONEWALL PAGE 7 HOW TO READ THIS DOCUMENT PAGE 8 A NOTE ON LANGUAGE PAGE 9 EMPOWERING INDIVIDUALS: enabling full participation in everyday and public life by empowering trans people, changing hearts and minds, and creating a network of allies PAGE 9 −−THE CURRENT LANDSCAPE: o Role models o Representation of trans people in public life o Representation of trans people in media o Diversity of experiences o LGBT communities o Role of allies PAGE 11 −−VISION FOR CHANGE PAGE 12 −−STONEWALL’S RESPONSE PAGE 14 −−WHAT OTHERS CAN DO PAGE 16 TRANSFORMING INSTITUTIONS: improving services and workplaces for trans people PAGE 16 −−THE CURRENT LANDSCAPE: o Children, young people and education o Employment o Faith o Hate crime, the Criminal Justice System and support services o Health and social care o Sport PAGE 20 −−VISION FOR CHANGE PAGE 21 −−WHAT SERVICE PROVIDERS CAN DO PAGE 26 −−STONEWALL’S RESPONSE PAGE 28 −−WHAT OTHERS CAN DO PAGE 30 CHANGING LAWS: ensuring equal rights, responsibilities and legal protections for trans people PAGE 30 −−THE CURRENT LANDSCAPE: o The Gender Recognition Act o The Equality Act o Families and marriage o Sex by deception o Recording gender o Asylum PAGE 32 −−VISION FOR CHANGE PAGE 33 −−STONEWALL’S RESPONSE PAGE 34 −−WHAT OTHERS CAN DO PAGE 36 GETTING INVOLVED PAGE 38 GLOSSARY INTRODUCTION FROM STONEWALL’S TRANS ADVISORY GROUP The UK has played an While many of us benefited from the work to give a voice to all parts of trans successes of this time, many more communities, and we are determined important role in the did not. -
Turing's Influence on Programming — Book Extract from “The Dawn of Software Engineering: from Turing to Dijkstra”
Turing's Influence on Programming | Book extract from \The Dawn of Software Engineering: from Turing to Dijkstra" Edgar G. Daylight∗ Eindhoven University of Technology, The Netherlands [email protected] Abstract Turing's involvement with computer building was popularized in the 1970s and later. Most notable are the books by Brian Randell (1973), Andrew Hodges (1983), and Martin Davis (2000). A central question is whether John von Neumann was influenced by Turing's 1936 paper when he helped build the EDVAC machine, even though he never cited Turing's work. This question remains unsettled up till this day. As remarked by Charles Petzold, one standard history barely mentions Turing, while the other, written by a logician, makes Turing a key player. Contrast these observations then with the fact that Turing's 1936 paper was cited and heavily discussed in 1959 among computer programmers. In 1966, the first Turing award was given to a programmer, not a computer builder, as were several subsequent Turing awards. An historical investigation of Turing's influence on computing, presented here, shows that Turing's 1936 notion of universality became increasingly relevant among programmers during the 1950s. The central thesis of this paper states that Turing's in- fluence was felt more in programming after his death than in computer building during the 1940s. 1 Introduction Many people today are led to believe that Turing is the father of the computer, the father of our digital society, as also the following praise for Martin Davis's bestseller The Universal Computer: The Road from Leibniz to Turing1 suggests: At last, a book about the origin of the computer that goes to the heart of the story: the human struggle for logic and truth. -
The Corrosive Impact of Transgender Ideology
The Corrosive Impact of Transgender Ideology Joanna Williams The Corrosive Impact of Transgender Ideology The Corrosive Impact of Transgender Ideology Joanna Williams First published June 2020 © Civitas 2020 55 Tufton Street London SW1P 3QL email: [email protected] All rights reserved ISBN 978-1-912581-08-5 Independence: Civitas: Institute for the Study of Civil Society is a registered educational charity (No. 1085494) and a company limited by guarantee (No. 04023541). Civitas is financed from a variety of private sources to avoid over-reliance on any single or small group of donors. All the Institute’s publications seek to further its objective of promoting the advancement of learning. The views expressed are those of the authors, not of the Institute. Typeset by Typetechnique Printed in Great Britain by 4edge Limited, Essex iv Contents Author vi Summary vii Introduction 1 1. Changing attitudes towards sex and gender 3 2. The impact of transgender ideology 17 3. Ideological capture 64 Conclusions 86 Recommendations 88 Bibliography 89 Notes 97 v Author Joanna Williams is director of the Freedom, Democracy and Victimhood Project at Civitas. Previously she taught at the University of Kent where she was Director of the Centre for the Study of Higher Education. Joanna is the author of Women vs Feminism (2017), Academic Freedom in an Age of Conformity (2016) and Consuming Higher Education, Why Learning Can’t Be Bought (2012). She co-edited Why Academic Freedom Matters (2017) and has written numerous academic journal articles and book chapters exploring the marketization of higher education, the student as consumer and education as a public good. -
Report: Inclusion at Work: Perspectives on LGBT+ Working Lives
INCLUSION AT WORK Perspectives on LGBT+ working lives Research report February 2021 The CIPD is the professional body for HR and people development. The registered charity champions better work and working lives and has been setting the benchmark for excellence in people and organisation development for more than 100 years. It has more than 150,000 members across the world, provides thought leadership through independent research on the world of work, and offers professional training and accreditation for those working in HR and learning and development. Inclusion at work: perspectives on LGBT+ working lives Research report Inclusion at work: perspectives on LGBT+ working lives Contents Foreword 3 Introduction 4 Research findings:UK Working Lives analysis 7 Findings specific to the trans workers’ survey 20 What do the findings mean for people professionals? 29 How should policy-makers respond? 33 Further resources 34 Appendix 34 References 39 Acknowledgements This report was written by Dr Luke Fletcher, Associate Professor at University of Bath’s School of Management, Dr Jill Miller, Senior Public Policy Adviser for Diversity and Inclusion, CIPD, Mel Green, Research Adviser, CIPD, Jake Young, Research Associate, CIPD, and Abdul Wahab, Policy Adviser, CIPD. The project was initially commissioned when Dr Fletcher was affiliated with Aston Business School, Aston University. We are grateful to Dr Luke Fletcher for: • analysing the data from the CIPD’s UK Working Lives surveys 2018, 2019 and 2020 to examine LGB+ employees’ experiences of working life • developing two bespoke surveys for trans employees and to complement the UK Working Lives survey, examining their work experiences, and an additional trans allyship survey • conducting the descriptive analysis and multivariate testing of the above survey data • co-writing this report. -
The Essential Turing Reviewed by Andrew Hodges
Book Review The Essential Turing Reviewed by Andrew Hodges The Essential Turing the Second World War, with particular responsibility A. M. Turing, B. Jack Copeland, ed. for the German Enigma-enciphered naval commu- Oxford University Press, 2004 nications, though this work remained secret until US$29.95, 662 pages the 1970s and only in the 1990s were documents ISBN 0198250800 from the time made public. Many mathematicians would see Turing as a The Essential Turing is a selection of writings of the hero for the 1936 work alone. But he also makes a British mathematician Alan M. Turing (1912–1954). striking exemplar of mathematical achievement in Extended introductions and annotations are added his breadth of attack. He made no distinction be- by the editor, the New Zealand philosopher B. Jack tween “pure” and “applied” and tackled every kind Copeland, and there are some supplementary pa- of problem from group theory to biology, from ar- pers and commentaries by other authors. Alan Tur- guing with Wittgenstein to analysing electronic ing was the founder of the theory of computabil- component characteristics—a strategy diametri- ity, with his paper “On Computable numbers, with cally opposite to today’s narrow research training. an application to the Entscheidungsproblem” (Tur- The fact that few had ever heard of him when he ing 1936). This, a classic breakthrough of twenti- died mysteriously in 1954, and that his work in de- eth century mathematics, was written when he was feating Nazi Germany remained unknown for so twenty-three. In the course of this work in mathe- long, typifies the unsung creative power of math- matical logic, he defined the concept of the uni- ematics which the public—indeed our own stu- versal machine. -
The First BSUH LGBTQ+ Inclusion Conference 2019 Tuesday, 26Th February 2019 11.30 to 17.00 Brighton Racecourse the First BSUH LGBTQ+ Inclusion Conference 2019
The First BSUH LGBTQ+ Inclusion Conference 2019 Tuesday, 26th February 2019 11.30 to 17.00 Brighton Racecourse The first BSUH LGBTQ+ Inclusion Conference 2019 Agenda Doors Open / Registration 11.30 Stalls open – Networking, Knowledge & Inspiration Zone Vlogging with Ali Hannon – Premier Hall Lunch service begins (hot buffet) – Grandstand Hall 11.45 Coffee/tea – Networking, Knowledge & Inspiration Zone Conference Begins – Premier Hall 13.00 Welcome Alan McCarthy, BSUH Chair Opening Speech 13.15 ‘Leadership for Inclusion’ Dame Marianne Griffiths, BSUH CEO Keynote Address 13.40 Pete Mercer, Stonewall Q&A Session 14.15 Alan McCarthy, Marianne Griffiths, Pete Mercer Introduction to Workshop Session / LGBT History Month 14.30 Nick Groves, LGBTQ+ Network Convenor 14.50 Comfort break Workshop Session – Grandstand Hall 15.00 ‘Journey to True North: Follow the Yellow Brick Road’ 15.30 Tea/coffee service begins Reflections on the Workshop Session 16.15 Denise Farmer, BSUH Chief Workforce & OD Development Director ‘Ask Ali’ / Second Keynote Address 16.20 Ali Hannon, Communications Professional & Comedy Performer Closing Remarks and Next Steps 16.45 Marianne Griffiths, BSUH CEO Delegates Depart Don’t forget to hand in your: 17.00 • Conference Evaluations • ‘What can I do’ / The Fab Five: Big LGBTQ+ Anthems Quiz Cards – Prize Draw 2 The first BSUH LGBTQ+ Inclusion Conference 2019 Notes for Delegates Diverse Voices We’d also love to hear from delegates as part of the The LGBTQ+ umbrella includes many, diverse voices and vlogging and short video interviews during the day, perspectives. We have tried to reflect a range at today’s but these are of course voluntary. -
Filozofski Fakultet Sveučilišta U Zagrebu Odsjek Za Informacijske I Komunikacijske Znanosti 2017/2018
Filozofski fakultet Sveučilišta u Zagrebu Odsjek za informacijske i komunikacijske znanosti 2017/2018. Maja Mikac Kako je Colossusom razbijena Lorenzova šifra Završni rad Mentorica: dr. sc. Vjera Lopina Zagreb, 2018. Sadržaj Uvod ........................................................................................................................................... 4 1. Kratki presjek razvoja kriptografskih sustava ............................................................. 5 1.1. Kriptologija u Drugom svjetskom ratu ....................................................................... 8 2. Lorenz ................................................................................................................................ 9 2.1. Vernamova šifra ....................................................................................................... 11 2.2. Kriptoanaliza Lorenza .............................................................................................. 15 2.3. Logika stroja ............................................................................................................. 16 2.4. Turingery .................................................................................................................. 19 2.5. Testery ...................................................................................................................... 20 2.6. Newmanry ................................................................................................................ 21 3. Bletchley Park ................................................................................................................ -
World War II: Breaking the Code Breakout Created by Robyn Young, School Librarian, Avon, Indiana
World War II: Breaking the Code Breakout created by Robyn Young, School Librarian, Avon, Indiana. ©2020 World War II: Breaking the Code A breakout to help students understand: • The effect of World War II on American culture • Identify key events from World War II and understand their significance Developed by Robyn Young, School Librarian, Avon, Indiana ([email protected]) In this packet you’ll find: Overview of the breakout activity with the answer codes Page 3 Instruction cards for students Page 4 Congratulation cards for students Page 5 Activity Materials Key Lock: Date Which Will Live in Infamy Summary Page 6 Image Page 7 4-Digit Lock: Battle of Stalingrad Summary Page 8 QR Codes / Links for Students Page 9 Image Page 10 Quiz Page 11 Directional Lock: Axis and Allied Powers Map Summary Page 12 QR Codes / Links for Students Page 13 3-Digit Lock: Enigma Machine and Hiroshima Summary Page 14 Article 1 (Enigma Machine) Page 15 Article 2 (Bombing of Hiroshima) Page 16 Invisible ink illustration Page 17 Cipher sheet Page 18 Work Lock: Rationing Summary Page 19 Article (Rationing) Page 20 Chart Page 21 Ration book images Page 22-24 Invisible ink illustration Page 25 Additional materials needed: Invisible ink pen and flashlight Two boxes (large and small) Locks (3-digit, 4-digit, directional, word, key) USB drive World War II: Breaking the Code Breakout created by Robyn Young, School Librarian, Avon, Indiana. ©2020 World War II: Breaking the Code Type of Lock/Item Code Additional Information Small Box Key Lock on the box Flashlight and ABC Cipher inside Large Box Congratulations inside 3 Digit Lock 603 Hiroshima and enigma machine articles 4 Digit Lock 4645 Answers from the Battle of Stalingrad Quiz Word Lock SUGAR From ration book and chart in invisible ink Key Lock On Small Box On USB is image about date which will live in infamy USB Drive Image of date which will live in infamy This Breakout will take approximately 1 hour to complete.