Tech Industry Has Written Women Out Of History

Susie and her computer friend Sadie appeared in 1960s adverts to promote a now defunct UK computer company, accompanied by a young, attractive, nameless woman. 

Feminised adverts like these were a common ploy in Britain at the time, when male managers, uninitiated in the complexities of this new technology, viewed the machines as intimidating and opaque. “Computers were expensive and using women to advertise them gave the appearance to managers that jobs involving computers are easy and can be done with a cheap labour force,” explains technology historian Marie Hicks. 

They might have been on a typist’s salary, but women like the one who appears alongside Susie and Sadie were not typists, they were skilled computer programmers, minus the prestige or pay the modern equivalent might command. As Hicks’ book Programmed Inequality illustrates, women were the largest trained technical workforce of the computing industry during the second world war and through to the mid-sixties.

They operated the huge room-sized electro-mechanical computers that cracked codes, worked out military logistics and made ballistic calculations during the second world war. 

Later they went on to work for civil service departments, operating the computers needed for government to gather data and run properly. “It was viewed as unskilled, highly feminised work,” explains Hicks. “Women were seen as an easy, tractable labour force for jobs that were critical and yet simultaneously devalued.”

Managers perceived women to be ideal for the computing industry because they didn’t think they needed to be offered any sort of career ladder, explains Hicks. “Instead the expectation was that a woman’s career would be kept short because of marriage and children, which meant a workforce that didn’t get frustrated or demand promotions and higher wages.”
But by the 1970s, there was a change in mindset and women were no longer welcome in the workplace: the government and industry had grown wise to just how powerful computers were and wanted to integrate their use at a management level. “But they weren’t going to put women workers, seen as low level drones, in charge of computers,” explains Hicks. Women were systematically phased out and replaced by men who were paid more and had better job titles.

Discrimination Still Remains 
“Today, companies still perceive it as lucrative to treat women differently than men, to pay them less,” says Hicks. Facebook chief operating officer Sheryl Sandberg recently spoke out against the gender pay gap, prevalent in the tech space where giants like Google have been accused of systematically underpaying women. 
In May the company argued that it would be too much of a financial hassle to compile and hand over the salary records requested by the US Department of Labor. In August the Silicon Valley company was left facing legal action over the leak of a male software engineer’s 10-page manifesto criticising diversity initiatives and arguing that men occupy more leadership roles than women in tech due to “biological differences”.
“Even though companies like Google obviously weren’t around in that earlier period, they’re still benefiting from the same cultures that sidelined women,” says the author.

If women had continued to be a major force in computing, instead of being sidelined, the way the tech industry looks today would have been very different, she argues. “If women had been a more important part of the high tech industry all along, would so many platforms and apps have the same problems with rampant sexism and misogyny both in their workplaces and their products? Most likely not.”

The British computing industry lost its edge when it removed women – and ultimately, the move destroyed it, believes Hicks. “There were persistent labour shortages once women were thrown away – a lot of the young men who got trained to do these jobs soon decided to go and do something else because it was still seen as feminised work and there really wasn’t a career ladder at that point.” 

The Effect Of Sidelining Women 
If women had remained a part of the workforce, the scope and quality of computing products we have today, particularly software, would undoubtedly be better, says Hicks. She uses Dame Stephanie Shirley as an example of the sort of talent effectively written off by the mainstream industry at the time. In the face of repeated workplace discrimination, the 29-year-old went it alone in the 1960s and built up a thriving software business for female computer programmers.
In an interview with the Guardian earlier this year, Shirley said she knew her work at the Post Office’s prestigious Dollis Hill research station was good enough to get her promoted, but the promised promotion never materialised. 
“When I began to make it clear that I was pursuing a vigorous professional career, then it became a more entrenched position to keep me out,” she recalls. When the young computer programmer got married, it was expected that she would stop work immediately.
“Women continue to be weighed down with this sort of heteronormative cultural baggage,” says Hicks. “I think it’s clear that just relying on companies to do the right thing is not going to work and I think unions are going to have to become a major force again.”

It’s vital that the invisible female workforce that upheld the computing industry for more than 40 years isn’t forgotten. “It’s easy to write history just looking at the people who are really good self-promoters, it isn’t as sexy or exciting to focus on a broad swath of faceless workers, but historical change doesn’t come from one person doing one thing.” 

Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge In Computing was published by MIT Press in January 2017

Guardian:  

You Might Also Read:

Room At The Top For Women In Tech:

Very Few UK Girls Took Computing A-level:

 

« Cybersecurity Rules For Autonomous Vehicles
How Worried Should We Be About a Nuclear War With North Korea? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.