Feeds

Bletchley Park flogs Alan Turing first day covers

Enigma codebreaker puts his stamp on 2012

High performance access to file storage

Computing pioneer and Enigma codebreaker Alan Turing is to be commemorated next month in a series of limited edition first day covers for stamps designed to celebrate the centenary of his birth and help raise some more funds for the renovation of Bletchley Park.

The covers, essentially snazzy envelopes specifically designed to carry a new set of stamps on their first day of issue, will be released on 23 February in four different designs.

Restricted to 500 copies each, the covers are going for £9.99 each and can be previewed here.

The first is a design created by Rebecca Peacock of Firecatcher Design which features a portrait of Turing himself. The other three are paintings by artists Steve Williams depicting the buildings which Turing and his fellow codebreakers lived in during the Second World War.

All four covers will also feature a first-class stamp depicting the Turing Bombe – the machine built to decipher the German Engima code – as well as a first day of issue postmark illustrating one of the bombe’s 36 rotor wheels.

The stamp-related tribute is all part of the centenary year of mathematical genius Turing, who has been credited with pioneering the development of everything from artificial intelligence to the modern computer.

More importantly, his work with colleagues at Bletchley unpicking Enigma and other German and Japanese codes is believed to have shortened the war by as many as two years.

Turing was also famously persecuted by the British government, and even forced to undergo chemical castration after being convicted of homosexuality in 1952. He committed suicide two years later, aged just 41.

In 2009, then Prime Minister Gordon Brown finally broke the establishment’s silence over Turing’s treatment, with a public apology for the “appalling” persecution he had suffered in the years following the war.

The money raised from the stamp sale will go straight into the coffers of Bletchley Park, which received an early Christmas present last month when Google pledged £500,000 to help restore the site. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.