Female Role Models & The Early Days Of Computing

Everyone remembers the first computer they ever used. And Dr. Joyce Wheeler is no exception. But in her case the situation was a bit different. The first computer she used was one of the first computers anyone used. The machine was Edsac, the Electronic Delay Storage Automatic Calculator, (pictured) that ran for the first time in 1949 and was built to serve scientists at the University of Cambridge.

Joyce Wheeler was one of those scientists who, at the time, was working on her PhD under the supervision of renowned astronomer Fred Hoyle.

"My work was about the reactions inside stars," she said. "I was particularly interested in how long main sequence stars stay on their main sequence. "I wanted to know how long a star took to fade out," she explained.

The inner workings of the nuclear furnace that keep stars shining is an understandably knotty problem to solve. And, she said, the math’s describing that energetic process were formidable. "For stars, there's a rather nasty set of differential equations that describe their behaviour and composition," she added.

Completing those calculations manually was futile. "It was not possible to be really accurate doing it by hand," she said. "The errors just build up too much."

Enter Edsac, a machine created by Prof Maurice Wilkes to do exactly the kind of calculations Ms. Wheeler (nee Blackler) needed done to complete her advanced degree.

Thinking Time

First though, she had to learn to write the programs that would carry out the calculations.

Dr Wheeler started her PhD work at Cambridge in 1954 knowing about Edsac thanks to an earlier visit during which the machine had been shown off to her and others.

Keen to get on with her research she sat down with the slim booklet that described how to program it and, by working through the exercises in that pioneering programming manual, learned to code.

The little book was called WWG after its three authors Maurice Wilkes, David Wheeler and Stanley Gill.

It was through learning programming that Ms. Blackler got talking to David Wheeler because one of her programs helped to ensure Edsac was working well. They got to know each other, fell in love and married in 1957.

Now, more than 62 years on she is very matter of fact about that time, even though programmers, and especially women programmers, were rare.

Perhaps because of that novel situation, a new discipline and a pioneering machine, the atmosphere at Cambridge in the computer lab was not overwhelmingly masculine. "You could be regarded as a bit of an object, and occasionally it was a bit uncomfortable," she said, "But it was not quite a boys' brigade then in the way that it became later on."

It was an exciting time, she said, because of what the machine could do for her and her work. She took to programming quickly, she said, her strength with math’s helping her quickly master the syntax into which she had to translate those "nasty equations".

"But it was like math’s," she said, "it was one of those things that you knew you should not do for too long.

BBC

Artificial Intelligence: Myths, Facts and Future:   

The World's First Hack: the Telegraph and the Invention of Cyber Privacy:

 

 

« Are Terrorists Winning The Digital Arms Race?
YouTube Adds In-App Messaging »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC is a cyber security research and development and training centre

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.