Tech Industry Has Written Women Out Of History

Susie and her computer friend Sadie appeared in 1960s adverts to promote a now defunct UK computer company, accompanied by a young, attractive, nameless woman. 

Feminised adverts like these were a common ploy in Britain at the time, when male managers, uninitiated in the complexities of this new technology, viewed the machines as intimidating and opaque. “Computers were expensive and using women to advertise them gave the appearance to managers that jobs involving computers are easy and can be done with a cheap labour force,” explains technology historian Marie Hicks. 

They might have been on a typist’s salary, but women like the one who appears alongside Susie and Sadie were not typists, they were skilled computer programmers, minus the prestige or pay the modern equivalent might command. As Hicks’ book Programmed Inequality illustrates, women were the largest trained technical workforce of the computing industry during the second world war and through to the mid-sixties.

They operated the huge room-sized electro-mechanical computers that cracked codes, worked out military logistics and made ballistic calculations during the second world war. 

Later they went on to work for civil service departments, operating the computers needed for government to gather data and run properly. “It was viewed as unskilled, highly feminised work,” explains Hicks. “Women were seen as an easy, tractable labour force for jobs that were critical and yet simultaneously devalued.”

Managers perceived women to be ideal for the computing industry because they didn’t think they needed to be offered any sort of career ladder, explains Hicks. “Instead the expectation was that a woman’s career would be kept short because of marriage and children, which meant a workforce that didn’t get frustrated or demand promotions and higher wages.”
But by the 1970s, there was a change in mindset and women were no longer welcome in the workplace: the government and industry had grown wise to just how powerful computers were and wanted to integrate their use at a management level. “But they weren’t going to put women workers, seen as low level drones, in charge of computers,” explains Hicks. Women were systematically phased out and replaced by men who were paid more and had better job titles.

Discrimination Still Remains 
“Today, companies still perceive it as lucrative to treat women differently than men, to pay them less,” says Hicks. Facebook chief operating officer Sheryl Sandberg recently spoke out against the gender pay gap, prevalent in the tech space where giants like Google have been accused of systematically underpaying women. 
In May the company argued that it would be too much of a financial hassle to compile and hand over the salary records requested by the US Department of Labor. In August the Silicon Valley company was left facing legal action over the leak of a male software engineer’s 10-page manifesto criticising diversity initiatives and arguing that men occupy more leadership roles than women in tech due to “biological differences”.
“Even though companies like Google obviously weren’t around in that earlier period, they’re still benefiting from the same cultures that sidelined women,” says the author.

If women had continued to be a major force in computing, instead of being sidelined, the way the tech industry looks today would have been very different, she argues. “If women had been a more important part of the high tech industry all along, would so many platforms and apps have the same problems with rampant sexism and misogyny both in their workplaces and their products? Most likely not.”

The British computing industry lost its edge when it removed women – and ultimately, the move destroyed it, believes Hicks. “There were persistent labour shortages once women were thrown away – a lot of the young men who got trained to do these jobs soon decided to go and do something else because it was still seen as feminised work and there really wasn’t a career ladder at that point.” 

The Effect Of Sidelining Women 
If women had remained a part of the workforce, the scope and quality of computing products we have today, particularly software, would undoubtedly be better, says Hicks. She uses Dame Stephanie Shirley as an example of the sort of talent effectively written off by the mainstream industry at the time. In the face of repeated workplace discrimination, the 29-year-old went it alone in the 1960s and built up a thriving software business for female computer programmers.
In an interview with the Guardian earlier this year, Shirley said she knew her work at the Post Office’s prestigious Dollis Hill research station was good enough to get her promoted, but the promised promotion never materialised. 
“When I began to make it clear that I was pursuing a vigorous professional career, then it became a more entrenched position to keep me out,” she recalls. When the young computer programmer got married, it was expected that she would stop work immediately.
“Women continue to be weighed down with this sort of heteronormative cultural baggage,” says Hicks. “I think it’s clear that just relying on companies to do the right thing is not going to work and I think unions are going to have to become a major force again.”

It’s vital that the invisible female workforce that upheld the computing industry for more than 40 years isn’t forgotten. “It’s easy to write history just looking at the people who are really good self-promoters, it isn’t as sexy or exciting to focus on a broad swath of faceless workers, but historical change doesn’t come from one person doing one thing.” 

Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge In Computing was published by MIT Press in January 2017

Guardian:  

You Might Also Read:

Room At The Top For Women In Tech:

Very Few UK Girls Took Computing A-level:

 

« Cybersecurity Rules For Autonomous Vehicles
How Worried Should We Be About a Nuclear War With North Korea? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.

Darwinium

Darwinium

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity.