Female Role Models & The Early Days Of Computing

Everyone remembers the first computer they ever used. And Dr. Joyce Wheeler is no exception. But in her case the situation was a bit different. The first computer she used was one of the first computers anyone used. The machine was Edsac, the Electronic Delay Storage Automatic Calculator, (pictured) that ran for the first time in 1949 and was built to serve scientists at the University of Cambridge.

Joyce Wheeler was one of those scientists who, at the time, was working on her PhD under the supervision of renowned astronomer Fred Hoyle.

"My work was about the reactions inside stars," she said. "I was particularly interested in how long main sequence stars stay on their main sequence. "I wanted to know how long a star took to fade out," she explained.

The inner workings of the nuclear furnace that keep stars shining is an understandably knotty problem to solve. And, she said, the math’s describing that energetic process were formidable. "For stars, there's a rather nasty set of differential equations that describe their behaviour and composition," she added.

Completing those calculations manually was futile. "It was not possible to be really accurate doing it by hand," she said. "The errors just build up too much."

Enter Edsac, a machine created by Prof Maurice Wilkes to do exactly the kind of calculations Ms. Wheeler (nee Blackler) needed done to complete her advanced degree.

Thinking Time

First though, she had to learn to write the programs that would carry out the calculations.

Dr Wheeler started her PhD work at Cambridge in 1954 knowing about Edsac thanks to an earlier visit during which the machine had been shown off to her and others.

Keen to get on with her research she sat down with the slim booklet that described how to program it and, by working through the exercises in that pioneering programming manual, learned to code.

The little book was called WWG after its three authors Maurice Wilkes, David Wheeler and Stanley Gill.

It was through learning programming that Ms. Blackler got talking to David Wheeler because one of her programs helped to ensure Edsac was working well. They got to know each other, fell in love and married in 1957.

Now, more than 62 years on she is very matter of fact about that time, even though programmers, and especially women programmers, were rare.

Perhaps because of that novel situation, a new discipline and a pioneering machine, the atmosphere at Cambridge in the computer lab was not overwhelmingly masculine. "You could be regarded as a bit of an object, and occasionally it was a bit uncomfortable," she said, "But it was not quite a boys' brigade then in the way that it became later on."

It was an exciting time, she said, because of what the machine could do for her and her work. She took to programming quickly, she said, her strength with math’s helping her quickly master the syntax into which she had to translate those "nasty equations".

"But it was like math’s," she said, "it was one of those things that you knew you should not do for too long.

BBC

Artificial Intelligence: Myths, Facts and Future:   

The World's First Hack: the Telegraph and the Invention of Cyber Privacy:

 

 

« Are Terrorists Winning The Digital Arms Race?
YouTube Adds In-App Messaging »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Data Privacy Office (DPO)

Data Privacy Office (DPO)

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

Alertot

Alertot

Hackers attack minutes after a new vulnerability is published. Alertot helps to decrease exposure time in organizations by notifying new issues when they are disclosed.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

SoConnect

SoConnect

SoConnect provides safe, secured, and taken care of IT, with infrastructure built around you and your business.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.