Tech Industry Has Written Women Out Of History

Susie and her computer friend Sadie appeared in 1960s adverts to promote a now defunct UK computer company, accompanied by a young, attractive, nameless woman. 

Feminised adverts like these were a common ploy in Britain at the time, when male managers, uninitiated in the complexities of this new technology, viewed the machines as intimidating and opaque. “Computers were expensive and using women to advertise them gave the appearance to managers that jobs involving computers are easy and can be done with a cheap labour force,” explains technology historian Marie Hicks. 

They might have been on a typist’s salary, but women like the one who appears alongside Susie and Sadie were not typists, they were skilled computer programmers, minus the prestige or pay the modern equivalent might command. As Hicks’ book Programmed Inequality illustrates, women were the largest trained technical workforce of the computing industry during the second world war and through to the mid-sixties.

They operated the huge room-sized electro-mechanical computers that cracked codes, worked out military logistics and made ballistic calculations during the second world war. 

Later they went on to work for civil service departments, operating the computers needed for government to gather data and run properly. “It was viewed as unskilled, highly feminised work,” explains Hicks. “Women were seen as an easy, tractable labour force for jobs that were critical and yet simultaneously devalued.”

Managers perceived women to be ideal for the computing industry because they didn’t think they needed to be offered any sort of career ladder, explains Hicks. “Instead the expectation was that a woman’s career would be kept short because of marriage and children, which meant a workforce that didn’t get frustrated or demand promotions and higher wages.”
But by the 1970s, there was a change in mindset and women were no longer welcome in the workplace: the government and industry had grown wise to just how powerful computers were and wanted to integrate their use at a management level. “But they weren’t going to put women workers, seen as low level drones, in charge of computers,” explains Hicks. Women were systematically phased out and replaced by men who were paid more and had better job titles.

Discrimination Still Remains 
“Today, companies still perceive it as lucrative to treat women differently than men, to pay them less,” says Hicks. Facebook chief operating officer Sheryl Sandberg recently spoke out against the gender pay gap, prevalent in the tech space where giants like Google have been accused of systematically underpaying women. 
In May the company argued that it would be too much of a financial hassle to compile and hand over the salary records requested by the US Department of Labor. In August the Silicon Valley company was left facing legal action over the leak of a male software engineer’s 10-page manifesto criticising diversity initiatives and arguing that men occupy more leadership roles than women in tech due to “biological differences”.
“Even though companies like Google obviously weren’t around in that earlier period, they’re still benefiting from the same cultures that sidelined women,” says the author.

If women had continued to be a major force in computing, instead of being sidelined, the way the tech industry looks today would have been very different, she argues. “If women had been a more important part of the high tech industry all along, would so many platforms and apps have the same problems with rampant sexism and misogyny both in their workplaces and their products? Most likely not.”

The British computing industry lost its edge when it removed women – and ultimately, the move destroyed it, believes Hicks. “There were persistent labour shortages once women were thrown away – a lot of the young men who got trained to do these jobs soon decided to go and do something else because it was still seen as feminised work and there really wasn’t a career ladder at that point.” 

The Effect Of Sidelining Women 
If women had remained a part of the workforce, the scope and quality of computing products we have today, particularly software, would undoubtedly be better, says Hicks. She uses Dame Stephanie Shirley as an example of the sort of talent effectively written off by the mainstream industry at the time. In the face of repeated workplace discrimination, the 29-year-old went it alone in the 1960s and built up a thriving software business for female computer programmers.
In an interview with the Guardian earlier this year, Shirley said she knew her work at the Post Office’s prestigious Dollis Hill research station was good enough to get her promoted, but the promised promotion never materialised. 
“When I began to make it clear that I was pursuing a vigorous professional career, then it became a more entrenched position to keep me out,” she recalls. When the young computer programmer got married, it was expected that she would stop work immediately.
“Women continue to be weighed down with this sort of heteronormative cultural baggage,” says Hicks. “I think it’s clear that just relying on companies to do the right thing is not going to work and I think unions are going to have to become a major force again.”

It’s vital that the invisible female workforce that upheld the computing industry for more than 40 years isn’t forgotten. “It’s easy to write history just looking at the people who are really good self-promoters, it isn’t as sexy or exciting to focus on a broad swath of faceless workers, but historical change doesn’t come from one person doing one thing.” 

Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge In Computing was published by MIT Press in January 2017

Guardian:  

You Might Also Read:

Room At The Top For Women In Tech:

Very Few UK Girls Took Computing A-level:

 

« Cybersecurity Rules For Autonomous Vehicles
How Worried Should We Be About a Nuclear War With North Korea? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.