Articles

    1. Ultra revisited, a tale of two contributors 2017

      Welchman, Gordon

      Intelligence And National Security, Vol. 32, Issue 2, p. 244.

      Gordon Welchman was a Cambridge mathematician, who arrived at Bletchley Park (BP) on 4 September 1939 and worked there throughout World War Two. His remarkable contribution to BP's wartime success ... Read more

      Gordon Welchman was a Cambridge mathematician, who arrived at Bletchley Park (BP) on 4 September 1939 and worked there throughout World War Two. His remarkable contribution to BP's wartime success was achieved without any previous experience of cryptography or signals intelligence. He was in fact, a lecturer in algebraic geometry and Dean at Sidney Sussex College, Cambridge. In 1938, he was approached by Alastair Denniston, the head of the Foreign Office's cryptography section, the Government Code and Cypher School (GC&CS). He accepted Denniston's request that in the event of war, he make himself available for intelligence work and in March 1939, attended a brief course on the principles of cryptography. In the early years of World War Two he was transformed into a key figure in the triumph of BP. Within two months of his arrival, he had independently reinvented a key part of the pre-war work of Polish cryptographers and also laid the foundations for SIXTA (Hut 6 traffic analysis), a fusion of signals intelligence and cryptography. After a further month he had made three fundamental contributions to the ultimate success of BP: he was one of the first to recognise the need for a rapid expansion of BP's infrastructure for the decryption and analysis of intercepted Enigma traffic; he drew up an organisational plan which would enable BP to achieve such an expansion; he invented a device which would transform Alan Turing's design for the Bombe into a workable machine. Along with Turing, he had in effect developed a radically new production-orientated approach to machine cryptanalysis. BP then turned to Welchman to put his organisational plan in place and he took on the leadership of the group which would ultimately decrypt over one million German Air Force and Army signals. Read less

      Journal Article

    2. The commercial use of codes 1965

      Lefevre, Harold

      Bankers' Magazine, Vol. 199, pp. 275 - 278.

      Journal Article

    3. Versatile passkey to communication: business equipment manufactures already are gambling that a... 1963

      Bloomberg Businessweek (Online), p. 128.

      Magazine Article

    See all 28 article results

    Books & Media

    1. Cipher code

      Federal Deposit Insurance Corporation.

      TRLN Shared Print Collection | Book

    2. Surface synoptic codes.

      Hunt C 1.8/4:2/5 | Book

    3. Surface synoptic codes : effective January 1, 1984.

      Hunt C 1.8/4:2/4 | Book

    See all 20 books & media results


    Other Ways to Find Articles

    Journals

    1. Alton telegraph and Democratic review

    2. Journal of the Society of Telegraph Engineers and of Electricians

    See all 30,590 journal results

    Databases

    1. Underground and independent comics, comix, and graphic novels

    2. Eighteenth century journals. IV, Newspapers and periodicals 1708-1820, from Chetham's Library,...

    3. Japan and the United States : diplomatic, security, and economic relations, 1960-1976

    Browse databases by name or subject

    Databases by Subject

    1. Computer Science

    2. Electrical & Computer Engineering

    3. Industrial Engineering

    Browse databases by name or subject


    1. Java Cheat Codes: Most Popular Functions

      Learn how to use Java functions to write cleaner, more concise code and solve common programming tasks.

      Learn how to use Java functions to write cleaner, more concise code and solve common programming tasks. Read less

    2. Revit: Detailing to European Codes

      Learn techniques to create architectural files in Revit that are specific to topography, climate, and regulations.

      Learn techniques to create architectural files in Revit that are specific to topography, climate, and regulations. Read less

    See all LinkedIn Learning results

    Get Help

    We didn't find any staff who match your query, but know that we're here to help.

    Ask Us (chat, text, email)

    Search the Libraries' Staff Directory

    Information About the Libraries

    Our Website

    1. Formats & Data Organization

      that other users will understand the structure of your file names and any abbreviations or codes you might use. Consider creating a file inventory (aka manifest) for each folder

      that other users will understand the structure of your file names and any abbreviations or codes you might use. Consider creating a file inventory (aka manifest) for each folder Read less

    2. 10 Textbook Program FAQs from Students and Faculty

      publishers' e-learning platforms.    FAQs from instructors: Can the Libraries provide students with access codes to e-learning platforms? The Libraries cannot provide individual

      publishers' e-learning platforms.    FAQs from instructors: Can the Libraries provide students with access codes to e-learning platforms? The Libraries cannot provide individual Read less

    3. NC State University Campus-Specific Records Retention and Disposition Schedule, August 2017

      committees. minutes, agendas, reports, photographs, faculty and staff code, meeting notices, organization election records Permanent faculty and staff codes, minutes, agendas

      committees. minutes, agendas, reports, photographs, faculty and staff code, meeting notices, organization election records Permanent faculty and staff codes, minutes, agendas Read less

    See 3 website results