Honestly, why wouldn't GitHub build a PWA version so the offline experience is fantastic. In fact, that's how Linus built Git. The saga is building app after app is getting ridiculous. It also frees developers to focus on building server-side functionality rather than 3x client app effort (web, iOS, android).
I hear a lot of complaints about serverless for performance and cost but I think this is exactly what Serverless is meant to do - Reduce upfront cost for low traffic and remove the barrier of managing infrastructure.
Many app welcome the benefits despite the tradeoffs.
* Designed the programming of world's first commercial computer (Ferranti Mark 1)
* Devised Turing Test, to test whether computer is capable of thinking like a huamn
* Got an OBE for his wartime services
* Inventor of Turing Machine. To this day, all stored-programme digital computers are modelled on this invention
* Built the machine that helped in the breaking of the Enigma code used by the German forces. This was used to decode 2 messages per minutes
* His work shortened the WW2 by atleast 2 years.
* Alan was a member of the team which decoded the 'Fish' cipher, which was used towards the end of the war by the German High Command to transmit messages between Hitler and senior officers in the field.
A few years before the Ferranti Mark 1, Turing was involved with the programs for the Mark 1's predecessor: Baby (1948) [1], the worlds first stored-program computer, which as you mentioned was based on his Turing Machine (1936).
I learned about Turing as part of Baby's and the Mark 1s history first before any wartime efforts as I did my BSc at the University of Manchester. Also only later would I realise the honour of Tom Kilburn handing me my degree when I graduated and having nice chat with as well.
Would they have? I don’t pretend to be an expert on plausible alternative history, but as the USSR reached Berlin before the UK/USA/French forces, I can easily imagine that without Turing’s work the Iron Curtain would’ve been either through the English Channel or along the Rhine, while the Pacific war would’ve gone the same way.
The primary difference that Enigma made was shipping to Russia and the UK. It’s likely it would have hurt both, but once the escort carriers started showing up in the Atlantic, the ability to operate subs would have gone away anyways.
In the pacific, not a chance. The soviets rolled the Kwantung army at the end of the war, but that’s because it was stripped of all it’s assets well before the soviets showed up, as the Japanese desperately tried to re-enforce islands that the Americans later isolated and island hopped and starved into submission by virtue of the “Big Blue Fleet”. The atomic bombs may not have ended the war, but ending the war with a invasion or a starvation blockade required a massive naval armada, and the Soviets had nothing. The Brits barely were able to operate in theater.
Engima’s impact on the battlefield was much more muted then the submarine war especially compared to Purple / Hypo / Market Garden and The battle of the Bulge where both lulled into disaster by the lack of enigma intelligence. It did play a positive role in Africa and on D-day (where it was most useful in revealing fortifications on the beaches), but it was not decisive there.
Engima never made it’s way to the pacific. In the pacific, Corel Sea, Midway and the assassination of Yamamoto where all predicated on decrypted secrets, but this was a completely separate effort from Bletchley Park.
No, it was just ordinary police and a court conviction that did that. The intelligence agencies likely knew about his orientation long before and did nothing about it - if anything, it was something that could be used to control him.
Modern computers aren't really based on the Turing machine idea any more than they're based on the Lambda calculus, and I think it's questionable that the early computers were intentionally modelled on it.
What can be even more dangerous is the role of "foreign agencies" funding violent protests and systemic training to naxels.
What springs to mind is the "Arab springs" of how great nations were turned to hell holes.
There is no Hindu/Modi agenda, especially no ruling govt wants instability in the country.
The real problem is the pseudo-liberal dishonesty that turns every crime into a hate crime.
The gang of arm-chair pseudo - socialists, communists, liberals and seculars, are the ones who are spreading the hate, fear and distrust. They who are uncomfortable with the sudden change in the status quo.
I wonder which numbers he demonstrated. All straight vertical lines are strongly marked 8 for me and all very 2 looking curves with a straight line at the bottom are clearly "3".
Thank you for your comment on the usefulness of the multi-kernel setup of SoS Notebook. Please feel free to try SoS Notebook on our live SoS server (click the rocket button on the top right corner of the SoS homepage).
The architecture of the SoS kernel, if we ignore the SoS workflow engine part, is just a Python3 kernel that sits between Jupyter and all other kernels. The SoS kernel starts the subkernels, collect user inputs (interpolate them if needed), send them to the subkernels, and collect and display outputs from the subkernels. Data exchange between subkernels are implemented by executing hidden statements in SoS and subkernels, with assistance from SoS language modules for supported languages. This simple setup introduces minimal changes to Jupyter users: they can use multiple languages in a SoS notebook but can also use the SoS kernel as a wrapper to their kernel for an improved frontend, and they can enjoy all the tools that Jupyter provides (e.g. JupyterHub, template, conversion tools) with SoS Notebook.
Finally, the name SoS Notebook comes from the fact that it is a frontend to the SoS (Script of Scripts) workflow engine. We know it does not sound great and places SoS well behind the real "SOS" in a google search, but let us just hope that some day SoS would appear in the first page when you search for SoS. :-)
[sic]He found that by entering the username "root", leaving the password field blank, and hitting "enter" a few times, he would be granted unrestricted access to the target machine.
...
...
a member of Apple's support forums had posted details of the flaw more than two weeks ago, though the tone of his message appeared to suggest he saw the vulnerability as a useful feature for troubleshooting rather than a critical security threat.[/sic]