Female Role Models & The Early Days Of Computing

Everyone remembers the first computer they ever used. And Dr. Joyce Wheeler is no exception. But in her case the situation was a bit different. The first computer she used was one of the first computers anyone used. The machine was Edsac, the Electronic Delay Storage Automatic Calculator, (pictured) that ran for the first time in 1949 and was built to serve scientists at the University of Cambridge.

Joyce Wheeler was one of those scientists who, at the time, was working on her PhD under the supervision of renowned astronomer Fred Hoyle.

"My work was about the reactions inside stars," she said. "I was particularly interested in how long main sequence stars stay on their main sequence. "I wanted to know how long a star took to fade out," she explained.

The inner workings of the nuclear furnace that keep stars shining is an understandably knotty problem to solve. And, she said, the math’s describing that energetic process were formidable. "For stars, there's a rather nasty set of differential equations that describe their behaviour and composition," she added.

Completing those calculations manually was futile. "It was not possible to be really accurate doing it by hand," she said. "The errors just build up too much."

Enter Edsac, a machine created by Prof Maurice Wilkes to do exactly the kind of calculations Ms. Wheeler (nee Blackler) needed done to complete her advanced degree.

Thinking Time

First though, she had to learn to write the programs that would carry out the calculations.

Dr Wheeler started her PhD work at Cambridge in 1954 knowing about Edsac thanks to an earlier visit during which the machine had been shown off to her and others.

Keen to get on with her research she sat down with the slim booklet that described how to program it and, by working through the exercises in that pioneering programming manual, learned to code.

The little book was called WWG after its three authors Maurice Wilkes, David Wheeler and Stanley Gill.

It was through learning programming that Ms. Blackler got talking to David Wheeler because one of her programs helped to ensure Edsac was working well. They got to know each other, fell in love and married in 1957.

Now, more than 62 years on she is very matter of fact about that time, even though programmers, and especially women programmers, were rare.

Perhaps because of that novel situation, a new discipline and a pioneering machine, the atmosphere at Cambridge in the computer lab was not overwhelmingly masculine. "You could be regarded as a bit of an object, and occasionally it was a bit uncomfortable," she said, "But it was not quite a boys' brigade then in the way that it became later on."

It was an exciting time, she said, because of what the machine could do for her and her work. She took to programming quickly, she said, her strength with math’s helping her quickly master the syntax into which she had to translate those "nasty equations".

"But it was like math’s," she said, "it was one of those things that you knew you should not do for too long.

BBC

Artificial Intelligence: Myths, Facts and Future:   

The World's First Hack: the Telegraph and the Invention of Cyber Privacy:

 

 

« Are Terrorists Winning The Digital Arms Race?
YouTube Adds In-App Messaging »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.