SlideShare una empresa de Scribd logo
1 de 28
Warning:
Don’t do CS
tim@menzies.us
wvu, lane cs&ee
Oct 30, 2013
CS majors
They get jobs, everywhere

3
Interesting jobs,
in far flung places

4
5
Computer science
is a dangerous business
• If you want knowledge: bite the apple.
– Welcome to responsibility and shame.

• Make a choice
– Take charge? Study ideas?
– Leave paradise?

• Would you want it any other way?
–
–
–
–
–

If Eden then no sex
no anesthetics (anyone you know had a baby? had a tooth pulled?)
no air travel (no spring break in Miami)
no space program (we landed on Mars? wow)
no internet, no smart phones, no Xbox
6
Case study 1
How computers killed
people in WW-II
Convoys, sunk by U-boats

The enigma
machine

8
Enter computers
• Bletchley Park,
England
• Massive banks
of computers
– looking for
patterns in
German radio
signals

• Massive kludgey machines
– run by an army of 10,000 woman
– Winston Churchill: “The geese that laid the golden eggs
- but never cackled.”
9
The programmer
• Alan Turing:
mathematical genius
– Defined what it means
to be computable.

• By the way, he was gay
– we’ll get back to that.

10
The curse of information
The power
• Thanks to Turing,
– the allies knew the location of
the U-boats

• But they had to be careful
– If the Germans knew they
knew, they change the codes
– Take years to break the new
ones

The shame
• So they had to let (some)
boats get sunk and (some)
bombs fall on England
– In order to mount the
invasion and win the war

• Dead sailors
• Dead civilians
• Bletchley Park hastily
dismantled post-WW2,
records quickly forgotten
11
Case study #2
Computers and hydrogen bombs
were developed by the same people
at the same time for same reason
How to build a thermo-nuclear bomb
(don’t try this at home)
1.

separation of stages into a
triggering "primary" explosive and
a much more powerful

2.

"secondary" explosive, compression
of the secondary by X-rays coming
from nuclear fission in the primary,
a process called the "radiation
implosion" of the secondary,

3.

heating of the secondary, after cold
compression, by a second fission
explosion inside the secondary.

Btw,
All in a microsecond

13
Enter computers
• To design "radiation
implosion"
– Need massive simulations

• Enter the king of
the shock wave
– John Von Neumann

• Built computers at Princeton
– using Turing’s designs
– Ran the sims
– Built the bombs

14
His favorite computer programmer
• His wife, Klara von Neumann
– Famous ballerina
– Bored by her first husband (a banker)
– Left him for Johnny, moved to
America

• Gifted
– While Johnny wined and dined the
generals
– She ran the clunky computers back at
Princeton

• Did not do well when Johnny died
15
The curse of information
The power
• Thanks to Von Nuemann,
– American got the h-bomb
first

• Which leads to the arms
race and the cold war

The shame
• Global annihilation
• Nuclear proliferation
• In this case, it is not true that
– “someone would have done
it”

• Von Neumann’s Princeton
team was … unique

16
Case study #3
Turing’s “reward”
Alan Turing won the war
• Taught Von Neumann how to build computers
• His theories are the basis of all modern computers

• And his reward?
–
–
–
–

Persecuted to death
Homophobic rejection in the 1950s
Security clearance revoked
driven to suicide … by apple (sprinkled with arsenic)

18
2009: A public apology
in Parliament
• British Prime Minister Gordon Brown
– issued a public apology for the British
government's "appalling" actions,
– after an online petition seeking the same gained
30,000 signatures and international recognition.
– “The debt of gratitude he is owed makes it all the
more horrifying, therefore, that he was treated so
inhumanely.”
19
And what is the future?
Turing’s challenge to us all:
• Be responsible.
• Leave the shame behind us.
• Build a different future.

21
CS = building blocks
• In times past, computers were very expensive
– Tools for the military
– For code breaking and designing bombs

• Computers today are cheap
– $30 for Raspberry Pi
– Now, computers are tools
for everybody
– What will do with that?
22
Alan Turing:
We do more if we do it together
• Alan Turing, 1939:
– “The well-known theorem of Gödel (1931) shows that every system of logic
is in a certain sense incomplete, but at the same time it indicates means
whereby from a system L of logic a more complete system L′ may be
obtained. By repeating the process we get a sequence
L, L1 = L′, L2 = L1, ...

– each more complete than the proceeding. A logic Lω may then be
constructed in which the provable theorems are the totality of theorems
provable with the help of logics L, L1, L2...” .

• Translation
– We are all incomplete
– We all know part of the answer
– We know more if we work together
23
Teams, working together
• Linus Torvalds
– a guy sitting on his Mum's lounge room floor
– invented a way to build software
– that now powers the internet.

24
Groups, interacting
• Mark Zuckerberg
– Some guy in his dorm room at Harvard
– created a web site used daily by a billion people.

25
Welcome to Science 2.0

26
Computer Science = ideas
Ideas are powerful.
You up for it?

Más contenido relacionado

Similar a Warning: don't do CS

History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - ModernDamian T. Gordon
 
AI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docxAI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docxoreo10
 
Artificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality CheckArtificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality Checkpiero scaruffi
 
Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?Hariharan Ganesan
 
Can computers think
Can computers thinkCan computers think
Can computers thinkGTClub
 
A (very) Brief History of the Computer
A (very) Brief History of the ComputerA (very) Brief History of the Computer
A (very) Brief History of the ComputerDavid Mackey
 
A History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareA History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareBob Mayer
 
Nerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in techNerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in techHilary Stohs-Krause
 
History of software engineering
History of software engineeringHistory of software engineering
History of software engineeringFarazChohan2
 
Debating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeDebating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeMathias Klang
 
Inventions
 Inventions Inventions
InventionsSusana
 
MATHEMATICS_IN_THE_MODERN_WORLD.pptx
MATHEMATICS_IN_THE_MODERN_WORLD.pptxMATHEMATICS_IN_THE_MODERN_WORLD.pptx
MATHEMATICS_IN_THE_MODERN_WORLD.pptxAnalynPasto
 
I Robot, You Unemployed.
I Robot, You Unemployed.I Robot, You Unemployed.
I Robot, You Unemployed.LearnLiberty
 

Similar a Warning: don't do CS (15)

History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - Modern
 
AI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docxAI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docx
 
Artificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality CheckArtificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality Check
 
Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?
 
Can computers think
Can computers thinkCan computers think
Can computers think
 
A (very) Brief History of the Computer
A (very) Brief History of the ComputerA (very) Brief History of the Computer
A (very) Brief History of the Computer
 
A History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareA History of Computer and Cyber Warfare
A History of Computer and Cyber Warfare
 
Nerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in techNerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in tech
 
History of software engineering
History of software engineeringHistory of software engineering
History of software engineering
 
Debating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeDebating the networked society: technical roots of social change
Debating the networked society: technical roots of social change
 
Inventions
 Inventions Inventions
Inventions
 
MATHEMATICS_IN_THE_MODERN_WORLD.pptx
MATHEMATICS_IN_THE_MODERN_WORLD.pptxMATHEMATICS_IN_THE_MODERN_WORLD.pptx
MATHEMATICS_IN_THE_MODERN_WORLD.pptx
 
Ai long forseminar
Ai long forseminarAi long forseminar
Ai long forseminar
 
I Robot, You Unemployed.
I Robot, You Unemployed.I Robot, You Unemployed.
I Robot, You Unemployed.
 
Paradigms
ParadigmsParadigms
Paradigms
 

Más de CS, NcState

Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdecCS, NcState
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringCS, NcState
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest linkCS, NcState
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...CS, NcState
 
Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9CS, NcState
 
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).CS, NcState
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceCS, NcState
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits CS, NcState
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab templateCS, NcState
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUCS, NcState
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements EngineeringCS, NcState
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginiaCS, NcState
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software EngineeringCS, NcState
 
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)CS, NcState
 
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceTim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceCS, NcState
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1CS, NcState
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataCS, NcState
 

Más de CS, NcState (20)

Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdec
 
Future se oct15
Future se oct15Future se oct15
Future se oct15
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software Engineering
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest link
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9
 
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data Science
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab template
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSU
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software Engineering
 
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)
 
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceTim Menzies, directions in Data Science
Tim Menzies, directions in Data Science
 
Goldrush
GoldrushGoldrush
Goldrush
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
 
Know thy tools
Know thy toolsKnow thy tools
Know thy tools
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software Data
 

Último

DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 

Último (20)

DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 

Warning: don't do CS

  • 2.
  • 4. They get jobs, everywhere 3
  • 5. Interesting jobs, in far flung places 4
  • 6. 5
  • 7. Computer science is a dangerous business • If you want knowledge: bite the apple. – Welcome to responsibility and shame. • Make a choice – Take charge? Study ideas? – Leave paradise? • Would you want it any other way? – – – – – If Eden then no sex no anesthetics (anyone you know had a baby? had a tooth pulled?) no air travel (no spring break in Miami) no space program (we landed on Mars? wow) no internet, no smart phones, no Xbox 6
  • 8. Case study 1 How computers killed people in WW-II
  • 9. Convoys, sunk by U-boats The enigma machine 8
  • 10. Enter computers • Bletchley Park, England • Massive banks of computers – looking for patterns in German radio signals • Massive kludgey machines – run by an army of 10,000 woman – Winston Churchill: “The geese that laid the golden eggs - but never cackled.” 9
  • 11. The programmer • Alan Turing: mathematical genius – Defined what it means to be computable. • By the way, he was gay – we’ll get back to that. 10
  • 12. The curse of information The power • Thanks to Turing, – the allies knew the location of the U-boats • But they had to be careful – If the Germans knew they knew, they change the codes – Take years to break the new ones The shame • So they had to let (some) boats get sunk and (some) bombs fall on England – In order to mount the invasion and win the war • Dead sailors • Dead civilians • Bletchley Park hastily dismantled post-WW2, records quickly forgotten 11
  • 13. Case study #2 Computers and hydrogen bombs were developed by the same people at the same time for same reason
  • 14. How to build a thermo-nuclear bomb (don’t try this at home) 1. separation of stages into a triggering "primary" explosive and a much more powerful 2. "secondary" explosive, compression of the secondary by X-rays coming from nuclear fission in the primary, a process called the "radiation implosion" of the secondary, 3. heating of the secondary, after cold compression, by a second fission explosion inside the secondary. Btw, All in a microsecond 13
  • 15. Enter computers • To design "radiation implosion" – Need massive simulations • Enter the king of the shock wave – John Von Neumann • Built computers at Princeton – using Turing’s designs – Ran the sims – Built the bombs 14
  • 16. His favorite computer programmer • His wife, Klara von Neumann – Famous ballerina – Bored by her first husband (a banker) – Left him for Johnny, moved to America • Gifted – While Johnny wined and dined the generals – She ran the clunky computers back at Princeton • Did not do well when Johnny died 15
  • 17. The curse of information The power • Thanks to Von Nuemann, – American got the h-bomb first • Which leads to the arms race and the cold war The shame • Global annihilation • Nuclear proliferation • In this case, it is not true that – “someone would have done it” • Von Neumann’s Princeton team was … unique 16
  • 18. Case study #3 Turing’s “reward”
  • 19. Alan Turing won the war • Taught Von Neumann how to build computers • His theories are the basis of all modern computers • And his reward? – – – – Persecuted to death Homophobic rejection in the 1950s Security clearance revoked driven to suicide … by apple (sprinkled with arsenic) 18
  • 20. 2009: A public apology in Parliament • British Prime Minister Gordon Brown – issued a public apology for the British government's "appalling" actions, – after an online petition seeking the same gained 30,000 signatures and international recognition. – “The debt of gratitude he is owed makes it all the more horrifying, therefore, that he was treated so inhumanely.” 19
  • 21. And what is the future?
  • 22. Turing’s challenge to us all: • Be responsible. • Leave the shame behind us. • Build a different future. 21
  • 23. CS = building blocks • In times past, computers were very expensive – Tools for the military – For code breaking and designing bombs • Computers today are cheap – $30 for Raspberry Pi – Now, computers are tools for everybody – What will do with that? 22
  • 24. Alan Turing: We do more if we do it together • Alan Turing, 1939: – “The well-known theorem of Gödel (1931) shows that every system of logic is in a certain sense incomplete, but at the same time it indicates means whereby from a system L of logic a more complete system L′ may be obtained. By repeating the process we get a sequence L, L1 = L′, L2 = L1, ... – each more complete than the proceeding. A logic Lω may then be constructed in which the provable theorems are the totality of theorems provable with the help of logics L, L1, L2...” . • Translation – We are all incomplete – We all know part of the answer – We know more if we work together 23
  • 25. Teams, working together • Linus Torvalds – a guy sitting on his Mum's lounge room floor – invented a way to build software – that now powers the internet. 24
  • 26. Groups, interacting • Mark Zuckerberg – Some guy in his dorm room at Harvard – created a web site used daily by a billion people. 25
  • 28. Computer Science = ideas Ideas are powerful. You up for it?