The Life and Intelligence of Alan Turing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Edsger Dijkstra: the Man Who Carried Computer Science on His Shoulders
INFERENCE / Vol. 5, No. 3 Edsger Dijkstra The Man Who Carried Computer Science on His Shoulders Krzysztof Apt s it turned out, the train I had taken from dsger dijkstra was born in Rotterdam in 1930. Nijmegen to Eindhoven arrived late. To make He described his father, at one time the president matters worse, I was then unable to find the right of the Dutch Chemical Society, as “an excellent Aoffice in the university building. When I eventually arrived Echemist,” and his mother as “a brilliant mathematician for my appointment, I was more than half an hour behind who had no job.”1 In 1948, Dijkstra achieved remarkable schedule. The professor completely ignored my profuse results when he completed secondary school at the famous apologies and proceeded to take a full hour for the meet- Erasmiaans Gymnasium in Rotterdam. His school diploma ing. It was the first time I met Edsger Wybe Dijkstra. shows that he earned the highest possible grade in no less At the time of our meeting in 1975, Dijkstra was 45 than six out of thirteen subjects. He then enrolled at the years old. The most prestigious award in computer sci- University of Leiden to study physics. ence, the ACM Turing Award, had been conferred on In September 1951, Dijkstra’s father suggested he attend him three years earlier. Almost twenty years his junior, I a three-week course on programming in Cambridge. It knew very little about the field—I had only learned what turned out to be an idea with far-reaching consequences. a flowchart was a couple of weeks earlier. -
The Turing Approach Vs. Lovelace Approach
Connecting the Humanities and the Sciences: Part 2. Two Schools of Thought: The Turing Approach vs. The Lovelace Approach* Walter Isaacson, The Jefferson Lecture, National Endowment for the Humanities, May 12, 2014 That brings us to another historical figure, not nearly as famous, but perhaps she should be: Ada Byron, the Countess of Lovelace, often credited with being, in the 1840s, the first computer programmer. The only legitimate child of the poet Lord Byron, Ada inherited her father’s romantic spirit, a trait that her mother tried to temper by having her tutored in math, as if it were an antidote to poetic imagination. When Ada, at age five, showed a preference for geography, Lady Byron ordered that the subject be replaced by additional arithmetic lessons, and her governess soon proudly reported, “she adds up sums of five or six rows of figures with accuracy.” Despite these efforts, Ada developed some of her father’s propensities. She had an affair as a young teenager with one of her tutors, and when they were caught and the tutor banished, Ada tried to run away from home to be with him. She was a romantic as well as a rationalist. The resulting combination produced in Ada a love for what she took to calling “poetical science,” which linked her rebellious imagination to an enchantment with numbers. For many people, including her father, the rarefied sensibilities of the Romantic Era clashed with the technological excitement of the Industrial Revolution. Lord Byron was a Luddite. Seriously. In his maiden and only speech to the House of Lords, he defended the followers of Nedd Ludd who were rampaging against mechanical weaving machines that were putting artisans out of work. -
CODEBREAKING Suggested Reading List (Can Also Be Viewed Online at Good Reads)
MARSHALL LEGACY SERIES: CODEBREAKING Suggested Reading List (Can also be viewed online at Good Reads) NON-FICTION • Aldrich, Richard. Intelligence and the War against Japan. Cambridge: Cambridge University Press, 2000. • Allen, Robert. The Cryptogram Challenge: Over 150 Codes to Crack and Ciphers to Break. Philadelphia: Running Press, 2005 • Briggs, Asa. Secret Days Code-breaking in Bletchley Park. Barnsley: Frontline Books, 2011 • Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War Two. New York: Free Press, 2000. • Churchhouse, Robert. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge: Cambridge University Press, 2001. • Clark, Ronald W. The Man Who Broke Purple. London: Weidenfeld and Nicholson, 1977. • Drea, Edward J. MacArthur's Ultra: Codebreaking and the War Against Japan, 1942-1945. Kansas: University of Kansas Press, 1992. • Fisher-Alaniz, Karen. Breaking the Code: A Father's Secret, a Daughter's Journey, and the Question That Changed Everything. Naperville, IL: Sourcebooks, 2011. • Friedman, William and Elizebeth Friedman. The Shakespearian Ciphers Examined. Cambridge: Cambridge University Press, 1957. • Gannon, James. Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth century. Washington, D.C.: Potomac Books, 2001. • Garrett, Paul. Making, Breaking Codes: Introduction to Cryptology. London: Pearson, 2000. • Hinsley, F. H. and Alan Stripp. Codebreakers: the inside story of Bletchley Park. Oxford: Oxford University Press, 1993. • Hodges, Andrew. Alan Turing: The Enigma. New York: Walker and Company, 2000. • Kahn, David. Seizing The Enigma: The Race to Break the German U-boat Codes, 1939-1943. New York: Barnes and Noble Books, 2001. • Kahn, David. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. -
An Early Program Proof by Alan Turing F
An Early Program Proof by Alan Turing F. L. MORRIS AND C. B. JONES The paper reproduces, with typographical corrections and comments, a 7 949 paper by Alan Turing that foreshadows much subsequent work in program proving. Categories and Subject Descriptors: 0.2.4 [Software Engineeringj- correctness proofs; F.3.1 [Logics and Meanings of Programs]-assertions; K.2 [History of Computing]-software General Terms: Verification Additional Key Words and Phrases: A. M. Turing Introduction The standard references for work on program proofs b) have been omitted in the commentary, and ten attribute the early statement of direction to John other identifiers are written incorrectly. It would ap- McCarthy (e.g., McCarthy 1963); the first workable pear to be worth correcting these errors and com- methods to Peter Naur (1966) and Robert Floyd menting on the proof from the viewpoint of subse- (1967); and the provision of more formal systems to quent work on program proofs. C. A. R. Hoare (1969) and Edsger Dijkstra (1976). The Turing delivered this paper in June 1949, at the early papers of some of the computing pioneers, how- inaugural conference of the EDSAC, the computer at ever, show an awareness of the need for proofs of Cambridge University built under the direction of program correctness and even present workable meth- Maurice V. Wilkes. Turing had been writing programs ods (e.g., Goldstine and von Neumann 1947; Turing for an electronic computer since the end of 1945-at 1949). first for the proposed ACE, the computer project at the The 1949 paper by Alan M. -
Turing's Influence on Programming — Book Extract from “The Dawn of Software Engineering: from Turing to Dijkstra”
Turing's Influence on Programming | Book extract from \The Dawn of Software Engineering: from Turing to Dijkstra" Edgar G. Daylight∗ Eindhoven University of Technology, The Netherlands [email protected] Abstract Turing's involvement with computer building was popularized in the 1970s and later. Most notable are the books by Brian Randell (1973), Andrew Hodges (1983), and Martin Davis (2000). A central question is whether John von Neumann was influenced by Turing's 1936 paper when he helped build the EDVAC machine, even though he never cited Turing's work. This question remains unsettled up till this day. As remarked by Charles Petzold, one standard history barely mentions Turing, while the other, written by a logician, makes Turing a key player. Contrast these observations then with the fact that Turing's 1936 paper was cited and heavily discussed in 1959 among computer programmers. In 1966, the first Turing award was given to a programmer, not a computer builder, as were several subsequent Turing awards. An historical investigation of Turing's influence on computing, presented here, shows that Turing's 1936 notion of universality became increasingly relevant among programmers during the 1950s. The central thesis of this paper states that Turing's in- fluence was felt more in programming after his death than in computer building during the 1940s. 1 Introduction Many people today are led to believe that Turing is the father of the computer, the father of our digital society, as also the following praise for Martin Davis's bestseller The Universal Computer: The Road from Leibniz to Turing1 suggests: At last, a book about the origin of the computer that goes to the heart of the story: the human struggle for logic and truth. -
I3?O SUPPLEMENT to the LONDON GAZETTE, 23 MARCH, 1943
I3?o SUPPLEMENT TO THE LONDON GAZETTE, 23 MARCH, 1943 Stoker Petty Officer Robert Stanley Connor, Chief Engine .-.Room Artificer Francis Frederick P/KX.82526. '.','' -Claud Nelmes, D/M.628i. Engine Room Artificer Fourth Class Harry Chief Petty Officer Cook Frederick Bertram Lees, C/MX.92I23. • • Bowen, D/MX.46140. Engine Room Artificer Fourth Class Cecil Neill, , Acting Yeoman of Signals Frederick Sidney D/MX.73053. Street, ,D/SSX.204i3. Leading Steward Woodrow Craig Douglas, Marine John Joseph Cook, Ply/X.2746. D/LX.24527. Leading Stoker Ronald George '-\Vard, D/KX. • 85717. • ' ' , . For gallantry in air operations during the Leading Stoker Cyril Edwin Vickerstaff, P/ JX. passage of an important Convoy to Malta: 91812. ' The Distinguished Service Cross. Acting Leading Stok;er 'Robert Stanley Vines, D/KX.90328. Temporary Acting Sub-Lieutenant (A) Peter Leading Telegraphist George William Henry James Hutton, R.N.V.R. Wyatt, P/JX.I37938. Acting Leading Telegraphist Josiah Wilde, , Mention in Despatches (Posthumous). <P/JX.i7836i. : Temporary Sub-Lieutenant (A) Michael Able Seaman Henry 'Dunn, C/TD/X.2084- ; Hankey, R.N.V.R. Able Seaman Edwin George King, P/J. 101393. ; Telegraphist James Gordon Hibbert, D/SSX. i Mention in Despatches. ' 29430. Acting Sub-Lieutenant (A) Douglas John Stoker First Class Harry Palliaser, -C/KX. ! McDonald, Royal Navy. For skill and determination in action For distinguished services:' against enemy Submarines while serving in H.M. Ships Crocus and Fame: To be a Companion of the Distinguished Service Order: ' J The Distinguished Service Cross. Lieutenant-Commander Redvers Michael Prior, Temporary Lieutenant John Ferdinand Holm, D.S.C., Royal Navy. -
Naval Section – Hut 4
The Mansion. Photo: © the2xislesteam The Enigma cipher was the backbone of German military and intelligence communications. First invented in 1918, it was designed to secure banking communications where it achieved little success. However the German military were quick to see its potential, they thought it to be unbreakable, and not without good reason. Enigma's complexity was bewildering. The odds against anyone who did not know the settings being able to break Enigma were a staggering 150 million, million, million, to one. Back in 1932 the Poles had broken Enigma, at a time when the encoding machine was undergoing trials with the German Army., the Poles even managed to reconstruct a machine. At that time, the cipher altered every few months but with the advent of war it changed at least once a day effectively locking the Poles out. July 1939, the Poles had passed on their knowledge to the British and the French. This enabled the code-breakers to make critical progress in working out the order in which the keys were attached to the electrical circuits, a task that had been impossible without an Enigma machine in front of them. Armed with this knowledge, the code-breakers were then able to exploit a chink in Enigma's armour. A fundamental design flaw meant that no letter could ever be encrypted as itself; an A in the original message, for example, could never appear as an A in the code. This gave the code breakers a toehold. Errors in messages sent by tired, stressed or lazy German operators also gave clues. -
Intelligence Without Reason
Intelligence Without Reason Rodney A. Brooks MIT Artificial Intelligence Lab 545 Technology Square Cambridge, MA 02139, USA Abstract certain modus operandi over the years, which includes a particular set of conventions on how the inputs and out- Computers and Thought are the two categories puts to thought and reasoning are to be handled (e.g., that together define Artificial Intelligence as a the subfield of knowledge representation), and the sorts discipline. It is generally accepted that work in of things that thought and reasoning do (e.g,, planning, Artificial Intelligence over the last thirty years problem solving, etc.). 1 will argue that these conven has had a strong influence on aspects of com- tions cannot account for large aspects of what goes into puter architectures. In this paper we also make intelligence. Furthermore, without those aspects the va the converse claim; that the state of computer lidity of the traditional Artificial Intelligence approaches architecture has been a strong influence on our comes into question. I will also argue that much of the models of thought. The Von Neumann model of landmark work on thought has been influenced by the computation has lead Artificial Intelligence in technological constraints of the available computers, and particular directions. Intelligence in biological thereafter these consequences have often mistakenly be systems is completely different. Recent work in come enshrined as principles, long after the original im behavior-based Artificial Intelligence has pro petus has disappeared. duced new models of intelligence that are much closer in spirit to biological systems. The non- From an evolutionary stance, human level intelligence Von Neumann computational models they use did not suddenly leap onto the scene. -
OFFLINE GAMING VS CLOUD GAMING (ONLINE GAMING) Mr
ISSN: 0974-3308, VOL. 11, NO. 2 DECEMBER 2018 @ SRIMCA 99 OFFLINE GAMING VS CLOUD GAMING (ONLINE GAMING) Mr. Amit Khatri Abstract—Games has always been a major source of entertainment in every generation and so exiting their history is, because it has various factor involved like Video Games Industry and various generations of video games. Due to improvements in graphics, a revolution has occurred in computer games. Storage for Video Games has always been a problem whether it is a Gaming Console or a PC but has been resolved generation by generation. Games also attracted the uninterested audience. Offline Gaming has been very popular for a year but has various drawbacks. Cloud Gaming is the resolution against Offline Gaming. This paper talks about how Cloud Gaming is taking place of Offline Gaming with much powerful hardware systems and processes. Keywords—Gaming, Cloud Gaming, Gaming PC, Gaming Console, Video Games. I. GAMING AND ITS HISTORY Computerized game playing, whether it is over a personal computer, mobile phone or a video game console can be referred to as Gaming. An individual who plays video games is recognized as a gamer [1]. In every generation of technology evolution, graphics of the game have been improved. When we think the history of video games we usually think of games like Tic- tac-toe, Tetris, Pacman, pong and many more but now these games use graphics seems like reality. In the 1950s, People can’t think of playing card games such as Solitaire, Blackjack, Hearts, Spider Solitaire and so on, on tv or computer but now the stage has reached more ahead from that [1]. -
Enigma Machine and Its U-Boat Codes
U-559 - U-BOAT CODES ARE BROKEN 0. U-559 - U-BOAT CODES ARE BROKEN - Story Preface 1. THE UNBREAKABLE CODE 2. THE U-BOATS 3. U-110 IN TROUBLE 4. U-110 CAPTURED 5. U-110 SINKS 6. THE CODE IS BROKEN (TEMPORARILY) 7. U-559 - U-BOAT CODES ARE BROKEN 8. U-505 IN PERIL 9. THE CAPTURE OF U-505 10. ENIGMA TODAY Two young British seamen lost their lives when they boarded the German U-boat depicted in this image: U-559. What Lt. Tony Fasson, Able Seaman Colin Grazier and Canteen Assistant Tommy Brown recovered from the sinking vessel helped Alan Turing and his colleagues at Bletchley Park to turn the tide of WWII against Hitler. Even when Bletchley Park began to decipher encrypted Nazi messages, the U-boat version of Enigma proved much more difficult. Not until 1943, after British sailors drowned trying to recover current Enigma-code documents from a captured German vessel, were U-boat codes broken on a regular basis. It wasn't an easy chase on October 30, 1942. HMS HMS Petard and three other British destroyers were pursuing a Nazi sub in the Mediterranean Sea, not far from the Egyptian shore. U-559 was proving why U-boats were so dangerous. She was elusive. The chase lasted 16 hours before U-559's commander decided to scuttle his damaged submarine about 70 miles north of the Nile Delta. (Follow this link to a map where U-559 went down. Look in the lower right-hand corner.) Demonstrating courage that is hard to comprehend, three young sailors swam from Petard to U-559. -
Alan Turing's Automatic Computing Engine
5 Turing and the computer B. Jack Copeland and Diane Proudfoot The Turing machine In his first major publication, ‘On computable numbers, with an application to the Entscheidungsproblem’ (1936), Turing introduced his abstract Turing machines.1 (Turing referred to these simply as ‘computing machines’— the American logician Alonzo Church dubbed them ‘Turing machines’.2) ‘On Computable Numbers’ pioneered the idea essential to the modern computer—the concept of controlling a computing machine’s operations by means of a program of coded instructions stored in the machine’s memory. This work had a profound influence on the development in the 1940s of the electronic stored-program digital computer—an influence often neglected or denied by historians of the computer. A Turing machine is an abstract conceptual model. It consists of a scanner and a limitless memory-tape. The tape is divided into squares, each of which may be blank or may bear a single symbol (‘0’or‘1’, for example, or some other symbol taken from a finite alphabet). The scanner moves back and forth through the memory, examining one square at a time (the ‘scanned square’). It reads the symbols on the tape and writes further symbols. The tape is both the memory and the vehicle for input and output. The tape may also contain a program of instructions. (Although the tape itself is limitless—Turing’s aim was to show that there are tasks that Turing machines cannot perform, even given unlimited working memory and unlimited time—any input inscribed on the tape must consist of a finite number of symbols.) A Turing machine has a small repertoire of basic operations: move left one square, move right one square, print, and change state. -
Introduction to Gaming
IWKS 2300 Fall 2019 A (redacted) History of Computer Gaming John K. Bennett How many hours per week do you spend gaming? A: None B: Less than 5 C: 5 – 15 D: 15 – 30 E: More than 30 What has been the driving force behind almost all innovations in computer design in the last 50 years? A: defense & military B: health care C: commerce & banking D: gaming Games have been around for a long time… Senet, circa 3100 B.C. 麻將 (mahjong, ma-jiang), ~500 B.C. What is a “Digital Game”? • “a software program in which one or more players make decisions through the control of the game objects and resources in pursuit of a goal” (Dignan, 2010) 1.Goal 2.Rules 3.Feedback loop (extrinsic / intrinsic motivation) 4.Voluntary Participation McGonigal, J. (2011). Reality is Broken: Why Games Make Us Better and How They Can Change the World. Penguin Press Early Computer Games Alan Turning & Claude Shannon Early Chess-Playing Programs • In 1948, Turing and David Champernowne wrote “Turochamp”, a paper design of a chess-playing computer program. No computer of that era was powerful enough to host Turochamp. • In 1950, Shannon published a paper on computer chess entitled “Programming a Computer for Playing Chess”*. The same algorithm has also been used to play blackjack and the stock market (with considerable success). *Programming a Computer for Playing Chess Philosophical Magazine, Ser.7, Vol. 41, No. 314 - March 1950. OXO – Noughts and Crosses • PhD work of A.S. Douglas in 1952, University of Cambridge, UK • Tic-Tac-Toe game on EDSAC computer • Player used dial