Haigh, Thomas (Author)
Priestley, Mark (Author)
The Bletchley Park codebreaking center sits close to the heart of Britain’s collective sense of historical greatness. Historians view it as a highly successful but largely ad-hoc institutional response to novel cryptographic challenges, depicting both its reliance on elite mathematicians and a large labor force as ruptures with peacetime practice. In contrast, this article suggests that Bletchley Park’s success relied on institutional capabilities established in the prewar British state. It focuses on the celebrated “Colossus” electronic codebreaking devices as one element of a highly successful institutional collaboration between Bletchley Park, where they were used, and the Post Office research station at Dollis Hill, where they were designed and built. Correcting previous accounts, this article shows that this partnership was sponsored at the highest levels of government and supported by managers on both sides.
...More
Article
Foley, Jillian;
(March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations
(/isis/citation/CBB627277329/)
Book
Hodges, Andrew;
(2000)
Alan Turing: the Enigma
(/isis/citation/CBB000110152/)
Article
Moa Carlsson;
(April 2022)
Computing views, remodeling environments
(/isis/citation/CBB726932342/)
Book
Agar, Jon;
(2003)
The Government Machine: A Revolutionary History of the Computer
(/isis/citation/CBB000470719/)
Article
Clark, Martyn;
(2010)
State Support for the Expansion of UK University Computing in the 1950s
(/isis/citation/CBB001231741/)
Article
M. Hicks;
(2019)
Hacking the Cis-tem
(/isis/citation/CBB071329740/)
Book
Lavington, S. H.;
(2011)
Moving Targets: Elliott-Automation and the Dawn of the Computer Age in Britain, 1947--67
(/isis/citation/CBB001211151/)
Book
McKay, Sinclair;
(2010)
The Secret Life of Bletchley Park: The History of the Wartime Codebreaking Centre by the Men and Women Who Were There
(/isis/citation/CBB001212751/)
Book
Jaroslav Švelch;
(2018)
Gaming the Iron Curtain: how teenagers and amateurs in communist Czechoslovakia claimed the medium of computer games
(/isis/citation/CBB094976742/)
Chapter
Field, J. V.;
(2009)
British Cryptanalysis: The Breaking of “Fish” Traffic
(/isis/citation/CBB000960225/)
Article
Raley, David;
(2008)
The Origins of a Corporate Giant: Tennessee Gas and Transmission's Wartime Pipeline
(/isis/citation/CBB001211713/)
Book
Field, Alexander J;
(2011)
A Great Leap Forward: 1930s Depression and U.S. Economic Growth
(/isis/citation/CBB001421343/)
Essay Review
Martin Underwood;
(2015)
Graham Farmelo: Churchill’s Bomb: A History of Science, War and Politics
(/isis/citation/CBB730337978/)
Article
Wolverton, Mark;
(Winter 2020)
Female Computers, Unsung Heroes of World War II
(/isis/citation/CBB478109652/)
Book
Hughes, Agatha C.;
Hughes, Thomas P.;
(2000)
Systems, Experts, and Computers: The Systems Approach in Management and Engineering, World War II and After
(/isis/citation/CBB000110250/)
Book
Lennon, Brian;
(2018)
Passwords: philology, security, authentication
(/isis/citation/CBB427866448/)
Book
Joseph Fitsanakis;
(2020)
Redesigning Wiretapping: The Digitization of Communications Interception
(/isis/citation/CBB949296828/)
Article
Nicholas Paul Sheppard;
(March 2020)
Can Smart Contracts Learn from Digital Rights Management?
(/isis/citation/CBB343046132/)
Article
Vijay Sivaraman;
Hassan Habibi Gharakheili;
Clinton Fernandes;
Narelle Clark;
Tanya Karliychuk;
(June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications
(/isis/citation/CBB353680957/)
Article
Nishimura, Shigehiro;
(2012)
Patenting in the United Kingdom and Japan: Subsystems That Determined MNE's Patent Policy
(/isis/citation/CBB001211685/)
Be the first to comment!