Female Role Models & The Early Days Of Computing

Everyone remembers the first computer they ever used. And Dr. Joyce Wheeler is no exception. But in her case the situation was a bit different. The first computer she used was one of the first computers anyone used. The machine was Edsac, the Electronic Delay Storage Automatic Calculator, (pictured) that ran for the first time in 1949 and was built to serve scientists at the University of Cambridge.

Joyce Wheeler was one of those scientists who, at the time, was working on her PhD under the supervision of renowned astronomer Fred Hoyle.

"My work was about the reactions inside stars," she said. "I was particularly interested in how long main sequence stars stay on their main sequence. "I wanted to know how long a star took to fade out," she explained.

The inner workings of the nuclear furnace that keep stars shining is an understandably knotty problem to solve. And, she said, the math’s describing that energetic process were formidable. "For stars, there's a rather nasty set of differential equations that describe their behaviour and composition," she added.

Completing those calculations manually was futile. "It was not possible to be really accurate doing it by hand," she said. "The errors just build up too much."

Enter Edsac, a machine created by Prof Maurice Wilkes to do exactly the kind of calculations Ms. Wheeler (nee Blackler) needed done to complete her advanced degree.

Thinking Time

First though, she had to learn to write the programs that would carry out the calculations.

Dr Wheeler started her PhD work at Cambridge in 1954 knowing about Edsac thanks to an earlier visit during which the machine had been shown off to her and others.

Keen to get on with her research she sat down with the slim booklet that described how to program it and, by working through the exercises in that pioneering programming manual, learned to code.

The little book was called WWG after its three authors Maurice Wilkes, David Wheeler and Stanley Gill.

It was through learning programming that Ms. Blackler got talking to David Wheeler because one of her programs helped to ensure Edsac was working well. They got to know each other, fell in love and married in 1957.

Now, more than 62 years on she is very matter of fact about that time, even though programmers, and especially women programmers, were rare.

Perhaps because of that novel situation, a new discipline and a pioneering machine, the atmosphere at Cambridge in the computer lab was not overwhelmingly masculine. "You could be regarded as a bit of an object, and occasionally it was a bit uncomfortable," she said, "But it was not quite a boys' brigade then in the way that it became later on."

It was an exciting time, she said, because of what the machine could do for her and her work. She took to programming quickly, she said, her strength with math’s helping her quickly master the syntax into which she had to translate those "nasty equations".

"But it was like math’s," she said, "it was one of those things that you knew you should not do for too long.

BBC

Artificial Intelligence: Myths, Facts and Future:   

The World's First Hack: the Telegraph and the Invention of Cyber Privacy:

 

 

« Are Terrorists Winning The Digital Arms Race?
YouTube Adds In-App Messaging »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

OnDefend

OnDefend

OnDefend delivers information security solutions that improve overall security posture, reduce risks and defend against continually evolving and persistent cyber adversaries.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.