A Brief History of Computer Science and Computing

Similar documents
Smart Cities. SESSION I : Lecture 2: Turing s s Legacy. Michael

Overview: The works of Alan Turing ( )

Chapter 1 An Introduction to Computer Science. INVITATION TO Computer Science 1

a. Mechanical procedure for doing different computing: system b. Organon, codify logical deduction with rules of inference (syllogisms)

Title? Alan Turing and the Theoretical Foundation of the Information Age

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.

From Turing Machines to Building a Brain

Alan Turing and the Enigma of Computability

Alan Turing: Codebreaker

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

10/4/10. An overview using Alan Turing s Forgotten Ideas in Computer Science as well as sources listed on last slide.

The National Curriculum and the Centre for Computing History

A BIT OF. Machines that learn. Make me invisible! The robot painter. Spies like us. Computer Science for Fun Issue 1

EMINENT & ENIGMATIC. 10 aspects of Alan Turing

Halting Problem. Implement HALT? Today. Halt does not exist. Halt and Turing. Another view of proof: diagonalization. P - program I - input.

Evoking Claude Shannon. José Francisco Rodrigues (CMAF&IO_F Ciências_U Lisboa) Amílcar Sernadas (CMAF&IO_I S Técnico_U Lisboa)

DIGITAL LOGIC CIRCUITS

Artificial Intelligence

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Books. Foundations of Computer Science, 2 nd edition, Behrouz Forouzan and Firouz Mosha rraf, Thomson Learning, UK, ( 歐亞書局,(02) )

Part 1: Unit Overview. Unit Aims. Unit Abstract. Unit Outcomes. Unit Outcomes

Arithmetic, bones and counting

In this lecture: Lecture 3: Basic Logic Gates & Boolean Expressions

IDK0310 AUTOMATED AND SYSTEMATISED LEGAL PROCESS. Ermo Täks

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

mywbut.com Introduction to AI

COMP9414/ 9814/ 3411: Artificial Intelligence. Overview. UNSW c Alan Blair,

Foundations of Computing and Communication Lecture 4. The Mechanical Age

Some Cryptanalysis of the Block Cipher BCMPQ

Turing Centenary Celebration

A celebration of Alan Turing s achievements in the year of his centenary

History Progression Skills 2014 Key Stage 1 Nursery Reception Rec/Yr1

Women in Computer Science

A Brief History of Computing

Main article: History of computer science. From Wikipedia, the free encyclopedia. 1 of 8 05/02/ :04 AM

The History of Women in Tech

Code Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography

Dr Rong Qu History of AI

Chapter 7 Information Redux

Intelligent Systems. Lecture 1 - Introduction

CSCE 315: Programming Studio

Weaving Cognition, Technology, Culture 3rd Annual Embodied Cognition Workshop April 5-8, 2017 Columbia University in the City of New York

Weaving Cognition, Technology, Culture 3rd Annual Embodied Cognition Workshop April 5-8, 2017 Columbia University in the City of New York

R&D Meets Production: The Dark Side

Association of Europe (ASD) Overview

Introduction. Reading: Chapter 1. Courtesy of Dr. Dansereau, Dr. Brown, Dr. Vranesic, Dr. Harris, and Dr. Choi.

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Introduction to Artificial Intelligence

CS1800 Discrete Structures Fall 2016 Profs. Aslam, Gold, Ossowski, Pavlu, & Sprague 7 November, CS1800 Discrete Structures Midterm Version C

RICHARD FLETCHER, Secretary, the Bill Tutte Memorial Fund

Basic Technology. Question No. 02 In which decade was the SPICE simulator introduced? (A) 1950s (B) 1960s (C) 1970s (D) 1980s Answer: Option C

We promote moral development

COMP9414/ 9814/ 3411: Artificial Intelligence. Week 1: Foundations. UNSW c Alan Blair,

CSC 550: Introduction to Artificial Intelligence. Fall 2004

DUBLIN CITY UNIVERSITY

To control, or to be controlled

Gates and Circuits 1

Logic diagram: a graphical representation of a circuit

CANDOER News. Volume 8 Number 2 Inside this issue

True Treasure A story about Team 2014P Sandpiper Pirates

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER

Language of Instruction Course Level Short Cycle ( ) First Cycle (x) Second Cycle ( ) Third Cycle ( ) Term Local Credit ECTS Credit Fall 3 5

Actually 3 objectives of AI:[ Winston & Prendergast ] Make machines smarter Understand what intelligence is Make machines more useful

Den femte digitaliseringsbølgen - fra data til innsikt!

Block Ciphers Security of block ciphers. Symmetric Ciphers

Quick work: Memory allocation

Digital Logic Circuits

Automated Analysis and Synthesis of Block-Cipher Modes of Operation

Exploring Technology 8 th Grade Prof Crudele

CITS2211 Discrete Structures Turing Machines

CSE 473 Artificial Intelligence (AI)

Artificial Intelligence 人工智慧. Lecture 1 February 22, 2012 洪國寶

Introduction. BME208 Logic Circuits Yalçın İŞLER

CS 380: ARTIFICIAL INTELLIGENCE INTRODUCTION. Santiago Ontañón

Computer Science Colloquium

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Paper 2 - The Business of Fibonacci. Leonardo of Pisa, who went by the nickname Fibonacci, was born in Pisa, Italy in 1170

Computer Science 160 Course Standards

The Three Laws of Artificial Intelligence

Computation. Philosophical Issues. Instructor: Viola Schiaffonati. March, 26 th 2018

Introduction & Statement of the Problem

AI: The New Electricity

ECE 124 Digital Circuits and Systems Winter 2011 Introduction Calendar Description:

Bellringer. Identify the century for the following years:

Lissajus Curves: an Experiment in Creative Coding

Human Rights Advocacy Devote a weekend to exploring issues that are at the heart of many ongoing human rights debates. Related Grade: 8, 9, 10, 11

Voting Systems, Mass Murder, and the Enigma Machine

Study of 3D Barcode with Steganography for Data Hiding

Electrical, Computer and Software Engineering - a historical perspective -

= (2 3 ) = c LAMC Beginners Circle September 29, Oleg Gleizer. Warm-up

Introduction to Computer Science

1-1 Alternate Methods for Representing Numbers. Origins of Representation of numbers

Udacity CS101: Building a Search Engine Unit 7: Fun Field Trips

Awareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose

From a Ball Game to Incompleteness

Electrical, Computer and Software Engineering - a historical perspective -

CS5331: Concepts in Artificial Intelligence & Machine Learning systems. Rattikorn Hewett

Transcription:

A Brief History of Computer Science and Computing Tim Capes April 4, 2011

Administrative Announcements Midterms are returned today, A4 is scheduled to go out on thursday.

Early Computing First computing device: The Abacus 2400 BCE in Ancient Babylon. 2000 years before Greek Methods of calculation.

Early Computing First computing device: The Abacus 2400 BCE in Ancient Babylon. 2000 years before Greek Methods of calculation. Invention of Algorithms: First algorithms invented by Brahmagupta in 628 AD in India

Early Computing First computing device: The Abacus 2400 BCE in Ancient Babylon. 2000 years before Greek Methods of calculation. Invention of Algorithms: First algorithms invented by Brahmagupta in 628 AD in India Spread of Algorithms: Persian Mathematician Al-Khwarizmi writes On Calculation with the Hindu Numerals a work largely responsible for spreading Algorithms to the west in 825 AD. The word Algorithm is an anglicized version of the name Al-Khwarizmi.

Binary Logic and Number Representation Binary Number System Originated by Indian Mathematician Pingala (3rd century BCE)

Binary Logic and Number Representation Binary Number System Originated by Indian Mathematician Pingala (3rd century BCE) Formal Logic Using Binary developed by Leibnitz (1703)

Binary Logic and Number Representation Binary Number System Originated by Indian Mathematician Pingala (3rd century BCE) Formal Logic Using Binary developed by Leibnitz (1703) Boolean Algebra developed by Boole (1854): Algebra for representing computational processes.

Charles Babbage Originated the concept of a programmable computer (1820 s)

Charles Babbage Originated the concept of a programmable computer (1820 s) His idea worked, and was implemented in London in 1991.

Ada Lovelace Ada Lovelace was the daughter of the well known British Poet Lord Byron

Ada Lovelace Ada Lovelace was the daughter of the well known British Poet Lord Byron Worked on developing programs for Babbage s difference engine.

Ada Lovelace Ada Lovelace was the daughter of the well known British Poet Lord Byron Worked on developing programs for Babbage s difference engine. She is considered to be the World s first computer programmer.

The 1930 s: Development of Mathematical Framework 1931: Godel s Incompleteness Theorem

The 1930 s: Development of Mathematical Framework 1931: Godel s Incompleteness Theorem 1936: Church-Turing Thesis: Formalizing what can and cannot be computed.

The 1930 s: Development of Mathematical Framework 1931: Godel s Incompleteness Theorem 1936: Church-Turing Thesis: Formalizing what can and cannot be computed. 1937: First formal logic for circuit analysis (Shannon)

The 1940 s: Practical Applications Development mainly focused around the war effort

The 1940 s: Practical Applications Development mainly focused around the war effort Machines for encrypting and decrypting

The 1940 s: Practical Applications Development mainly focused around the war effort Machines for encrypting and decrypting Most famous of the machines was the German Enigma Cipher Machine (WW2).

The 1940 s: Practical Applications Development mainly focused around the war effort Machines for encrypting and decrypting Most famous of the machines was the German Enigma Cipher Machine (WW2). Much of the work took place in Britain at Bletchley Park which is considered the birthplace of the modern computer.

The 1950 s and 1960 s 1953: Ada Lovelace s work is republished including the first algorithm specifically tailored for a computer.

The 1950 s and 1960 s 1953: Ada Lovelace s work is republished including the first algorithm specifically tailored for a computer. 1960 s: In this decade symbolic computation progresses to the point where a computer can do well in a first-year university calculus class

The 1950 s and 1960 s 1953: Ada Lovelace s work is republished including the first algorithm specifically tailored for a computer. 1960 s: In this decade symbolic computation progresses to the point where a computer can do well in a first-year university calculus class 1964: First computer mouse is developed

The 1950 s and 1960 s 1953: Ada Lovelace s work is republished including the first algorithm specifically tailored for a computer. 1960 s: In this decade symbolic computation progresses to the point where a computer can do well in a first-year university calculus class 1964: First computer mouse is developed 1968: First tablet PC (Dynabook) conceptualized by Alan Kay.

The 1950 s and 1960 s 1953: Ada Lovelace s work is republished including the first algorithm specifically tailored for a computer. 1960 s: In this decade symbolic computation progresses to the point where a computer can do well in a first-year university calculus class 1964: First computer mouse is developed 1968: First tablet PC (Dynabook) conceptualized by Alan Kay. 1969: Unix First written

The 1970 s 1973: Unix translated almost entirely into C (from assembly code)

The 1970 s 1973: Unix translated almost entirely into C (from assembly code) 1969-1973: C programming language developed at Bell Labs (still popular today, easily the most influential programming language of all time)

The 1970 s 1973: Unix translated almost entirely into C (from assembly code) 1969-1973: C programming language developed at Bell Labs (still popular today, easily the most influential programming language of all time) C is complicated and confusing for beginners due to manual memory declaration

1980 s to present Most interesting and life-altering development was the invention of the internet

1980 s to present Most interesting and life-altering development was the invention of the internet We ve covered this previously so I m not going into detail

1980 s to present Most interesting and life-altering development was the invention of the internet We ve covered this previously so I m not going into detail Something to consider, is how fast information travels in the modern era. News makes it around the world in minutes. At the beginning of computer science it took hundreds of years for ideas to spread.

Midterms Returned, Marking Questions Midterms will be returned now. Please take time to go over them and see me if you have questions.