Female Role Models & The Early Days Of Computing

Everyone remembers the first computer they ever used. And Dr. Joyce Wheeler is no exception. But in her case the situation was a bit different. The first computer she used was one of the first computers anyone used. The machine was Edsac, the Electronic Delay Storage Automatic Calculator, (pictured) that ran for the first time in 1949 and was built to serve scientists at the University of Cambridge.

Joyce Wheeler was one of those scientists who, at the time, was working on her PhD under the supervision of renowned astronomer Fred Hoyle.

"My work was about the reactions inside stars," she said. "I was particularly interested in how long main sequence stars stay on their main sequence. "I wanted to know how long a star took to fade out," she explained.

The inner workings of the nuclear furnace that keep stars shining is an understandably knotty problem to solve. And, she said, the math’s describing that energetic process were formidable. "For stars, there's a rather nasty set of differential equations that describe their behaviour and composition," she added.

Completing those calculations manually was futile. "It was not possible to be really accurate doing it by hand," she said. "The errors just build up too much."

Enter Edsac, a machine created by Prof Maurice Wilkes to do exactly the kind of calculations Ms. Wheeler (nee Blackler) needed done to complete her advanced degree.

Thinking Time

First though, she had to learn to write the programs that would carry out the calculations.

Dr Wheeler started her PhD work at Cambridge in 1954 knowing about Edsac thanks to an earlier visit during which the machine had been shown off to her and others.

Keen to get on with her research she sat down with the slim booklet that described how to program it and, by working through the exercises in that pioneering programming manual, learned to code.

The little book was called WWG after its three authors Maurice Wilkes, David Wheeler and Stanley Gill.

It was through learning programming that Ms. Blackler got talking to David Wheeler because one of her programs helped to ensure Edsac was working well. They got to know each other, fell in love and married in 1957.

Now, more than 62 years on she is very matter of fact about that time, even though programmers, and especially women programmers, were rare.

Perhaps because of that novel situation, a new discipline and a pioneering machine, the atmosphere at Cambridge in the computer lab was not overwhelmingly masculine. "You could be regarded as a bit of an object, and occasionally it was a bit uncomfortable," she said, "But it was not quite a boys' brigade then in the way that it became later on."

It was an exciting time, she said, because of what the machine could do for her and her work. She took to programming quickly, she said, her strength with math’s helping her quickly master the syntax into which she had to translate those "nasty equations".

"But it was like math’s," she said, "it was one of those things that you knew you should not do for too long.

BBC

Artificial Intelligence: Myths, Facts and Future:   

The World's First Hack: the Telegraph and the Invention of Cyber Privacy:

 

 

« Are Terrorists Winning The Digital Arms Race?
YouTube Adds In-App Messaging »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.