Oral History of Captain Grace Hopper
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Boston International Antiquarian Book Fair 2019
BOSTON INTERNATIONAL ANTIQUARIAN BOOK FAIR november 15–17, 2019 | hynes convention center | booth 410 friday, 4pm–8pm | saturday, noon–7pm | sunday, noon–5pm Anthony Bell AFTALION, Albert. Les Crises périodiques de ANTHONY, Susan B. History of Woman Suffrage. surproduction. Paris: Marcel Rivière, 1913 Rochester: Susan B. Anthony, 1886 & 1902 first edition, very scarce: one of the earliest statements of first editions, presentation copies of volumes III and IV the acceleration principle. 2 vols., modern blue cloth, preserving of the “bible” of the women’s suffrage campaign, the only two original paper wrappers and spines. volumes published by Anthony herself; inscribed in both by the $7,500 [135866] author on the occasion of her 85th birthday to her cousin Joshua. 2 vols., original maroon cloth; an excellent set. $15,750 [132954] BELL, Jocelyn; et al. Observation of a Rapidly Pulsating Radio Source. [Offprint from:] Nature, Vol. 217, No. 5130, pp. 709–713, February 24, 1968. London: Macmillan, 1968 first edition, the extremely rare offprint, of the landmark paper which announced the discovery of pulsars, co-authored by British astrophysicist Jocelyn Bell, her thesis supervisor Antony Hewish, and three others. 4to, original blue printed stiff wrappers. Bound with 18 other offprints in contemporary red cloth, all fine or near-fine. $9,800 [131009] Anthony Cather Dickens, The Posthumous Papers of the Pickwick Club BORGES, Jorge Luis. Luna de enfrente. Buenos Aires: DARWIN, Charles. On the Origin of Species. London: Editorial Proa, 1925 John Murray, 1860 first edition, first printing, one of 300 copies of Jorge Luis second edition, the usual issue correctly dated 1860 on the Borges’s scarce second collection of poetry. -
Women in Computing History
Women in Computing History Denise Gfirer ACM-W0) Co-Chair EMD Consulting Scotts Valley, California 95066 USA <[email protected]> Introduction Exciting inventions, innovative technology, human interac- tion, and intriguing politics fill computing history. However, the recorded history is mainly composed of male achieve- ments and involvements, even though women have played substantial roles. This situation is not unusual. Most science fields are notorious for excluding, undervaluing, or over- looking the accomplishments of their female scientists [1, 16, 17, 22]. As J.A.N. Lee points out, it is up to the histori- ans and others to remedy this imbalance (see this issue [14]). Some steps have been taken towards this goal through pub- lishing biographies on women in technology [2, 5, 6, 8, 10, 12, 13, 18, 20, 21, 23, 24], also see this issue [7], and through honoring the pioneers with various awards such as the GHC'97 Pioneering Awards(z) (Figure 1), the WITI Hall of Fame(3), and the AWC Lovelace Award(n). A few online sites Figure 1: Computer Science Pioneer Celebration, at the Grace Hopper contain biographies of women in technology, shown in Table Celebration of Women in Computing '97. Left to right: (Fran Allen, Ruzena Bajcsy, Adele Mildred Koss, Denise Gtirer, Anita Borg, Jean 1 below. However, even with these resources, many women Jennings Bartik, Judy Levenson Clapp, Thelma Estrin, Joyce Currie Little who have contributed significantly to computer science are (Courtesy Institute for Women in Technology, Palo Alto, California) still to be discovered. preprogrammed software for needed tasks (in particular word processing, email, and database access). -
Deanna Kosaraju Founder and CEO, Global Tech Women
Deanna Kosaraju Founder and CEO, Global Tech Women Deanna has worked with thousands of technical women around the world over the last several years. Her vision is to create a global network of technical women around the world who are inspired, connected and self-actualized. Deanna started Global Tech Women because she believes no matter what corner of the globe you live, you deserve access to the latest technical information, inspiration and local and global support to help you achieve your definition of success both personally and professionally. This is our commitment to you and we ask you to join this community because together we can make it a reality. Prior to starting this new initiative Deanna was the Vice President of Programs at the Anita Borg Institute for Women and Technology (ABI). Her role was to direct and manage all of ABIs programs. Deanna ran ABIs flagship program, the Grace Hopper Celebration for Women in Computing North America from 2006 through November 2011 where attendance grew 375% in 5 years through the worst recession since the great depression. In 2011 alone the conference grew 40%. Through her own initiative, Deanna took the Anita Borg Institute internationally as founder of a technical women's community and Grace Hopper Celebration Conference for Women in Computing in India as the VP of Strategic Initiatives. Deanna has been working between India and the US flying to India on a quarterly basis since 2008 spending 3-4 months per year in India. Deanna was involved in the launch of TechWomen, a project partnering with IIE and the U.S. -
Women in Computing
History of Computing CSE P590A (UW) PP190/290-3 (UCB) CSE 290 291 (D00) Women in Computing Katherine Deibel University of Washington [email protected] 1 An Amazing Photo Philadelphia Inquirer, "Your Neighbors" article, 8/13/1957 2 Diversity Crisis in Computer Science Percentage of CS/IS Bachelor Degrees Awarded to Women National Center for Education Statistics, 2001 3 Goals of this talk ! Highlight the many accomplishments made by women in the computing field ! Learn their stories, both good and bad 4 Augusta Ada King, Countess of Lovelace ! Translated and extended Menabrea’s article on Babbage’s Analytical Engine ! Predicted computers could be used for music and graphics ! Wrote the first algorithm— how to compute Bernoulli numbers ! Developed notions of looping and subroutines 5 Garbage In, Garbage Out The Analytical Engine has no pretensions whatever to originate anything. It can do whatever we know how to order it to perform. It can follow analysis; but it has no power of anticipating any analytical relations or truths. — Ada Lovelace, Note G 6 On her genius and insight If you are as fastidious about the acts of your friendship as you are about those of your pen, I much fear I shall equally lose your friendship and your Notes. I am very reluctant to return your admirable & philosophic 'Note A.' Pray do not alter it… All this was impossible for you to know by intuition and the more I read your notes the more surprised I am at them and regret not having earlier explored so rich a vein of the noblest metal. -
Know About These Women Scientists?
Know About These Women Scientists? SHOILI PAL 1. How many women have 7. Jane Goodall is the got the Nobel Prize till world’s leading Knowledge date? expert on which a) 24 animal? b) 3 4 a) Crabs c) 44 b) Chimpanzees d) 54 c) Storks d) Ants 2. In what branch of science did Nobel Laureate Barbara McClintock work? a) Astrophysics b) Genetics 8. Who is considered to be Test Your Test c) Inorganic Chemistry d) Neurology the world’s first computer programmer? 3. Caroline a) George Stibitz Herschel b) Grace Hopper was the c) Charles Babbage first woman d) Augusta Ada King to find which heavenly object? 9. Who developed the first a) A planet compiler for a computer b) A satellite programming language, c) A galaxy instrumental for d) A comet developing COBOL? a) Grace Hopper b) Charles Babbage c) Augusta Ada King d) George Stibitz 4. Who was the first woman in space? a) Kathryn D. Sullivan 10. Ada Yonath is known for her b) Svetlana Savitskaya work on which of the c) Sally Ride following? d) Valentina Tereshkova a) Ribosomes b) Telescopes c) Semiconductors 5. Who was the first civilian d) Animal Conservation in space? a) Judith Resnik b) Valentina Tereshkova c) Yuri Gagarin 11.Which of the d) Neil Armstrong following children’s authors was also an expert on fungi? 6. Who was the first woman a) Beatrix Potter to be granted a patent by b) J.K. Rowling the USPTA? c) Holly Black a) Ellen Ochoa d) Enid Blyton b) Grace Hopper c) Mary Kies d) Sarah Boone SCIENCE REPORTER, JANUARY 2012 24 Point Counterpoint 17. -
You Got This
You got this: words of wisdom from techies, for techies for techies, from wisdom of words this: got You Editor’s 2 Fig. note For many years, Palantir has hosted a booth at the Grace Hopper Celebration for Women in Computing. We leave every year feeling inspired and energized by the speakers we hear and fellow technologists we meet. You got this: words of wisdom from techies, for techies for techies, from wisdom of words this: got You I love Grace Hopper because it doesn’t feel like a dreaded “networking event,” but truly — as its name implies — a celebration of community. The conversations I have at Grace Hopper are illuminating and encouraging. I feel that we’re all making a good faith attempt to engage and learn from one another in pursuit of a shared goal: Now, a year later, that book note Editor’s building a future we want to live in. 1 Fig. is in your hands. I personally read every submission, and it was Editor’s note Editor’s The mementos we take away from Grace Hopper — my difficult task to select the ones T-shirts and water bottles and lip balms — don’t we included. capture that spirit. Worse, they often get thrown away. So in 2017, we decided to try something different. Reading the cards was moving We printed notecards and asked attendees to write in the way that attending Grace down some words of wisdom for future technologists, Hopper is moving: I felt the spirit with the idea that we’d collect them into a book. -
Distributing Liability: the Legal and Political Battles of Y2K LSE Research Online URL for This Paper: Version: Accepted Version
Distributing liability: the legal and political battles of Y2K LSE Research Online URL for this paper: http://eprints.lse.ac.uk/103330/ Version: Accepted Version Article: Mulvin, Dylan (2020) Distributing liability: the legal and political battles of Y2K. IEEE Annals of the History of Computing. ISSN 1058-6180 Reuse Items deposited in LSE Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the LSE Research Online record for the item. [email protected] https://eprints.lse.ac.uk/ Distributing Liability The legal and political battles of Y2K Dylan Mulvin* • Dylan Mulvin is an Assistant Professor in the Department of Media and Communications at the London School of Economics and Political Science – London, UK WC2A 2AE. E-mail: [email protected]. Abstract In 1999 the United States Congress passed the Y2K Act, a major—but temporary— effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This paper excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology. -
Oral History Interview with Frances E. Holberton
An Interview with FRANCES E. HOLBERTON OH 50 Conducted by James Ross on 14 April 1983 Charles Babbage Institute Center for the History of Information Processing University of Minnesota, Minneapolis Copyright, Charles Babbage Institute 1 Frances E. Holberton Interview 14 April 1983 Abstract Holberton discusses her education from 1940 through the 1960s and her experiences in the computing field. These include work with the Eckert-Mauchly Computer Corporation, David Taylor Model Basin, and the National Bureau of Standards. She discusses her perceptions of cooperation and competition between members of these organizations and the difficulties she encountered as a woman. She recounts her work on ENIAC and LARC, her design of operating systems, and her applications programming. 2 FRANCES E. HOLBERTON INTERVIEW DATE: April 14, 1983 INTERVIEWER: James Ross LOCATION: Potomac, Maryland ROSS: This is a tape-recorded interview with Betty Holberton in her home conducted by the Charles Babbage Institute and I'm Jim Ross. Betty, how did you get into information processing, and how well did your previous education prepare you for what you found? HOLBERTON: Well, information processing was not even conceived of as a discipline actually at the time I got into it. Originally, my family were scientis ts and teachers--mathematics, physics, astronomy. I was fortunate enough to go to a very good prep school, George School, which is a coeducational Friends boarding school in Bucks County and got a good founding in essentially the thinking process. I received a scholarship in the University of Pennsylvania and looked for a job. However, when I was in college I was told to major in mathematics. -
Distributing Liability: the Legal and Political Battles of Y2K
Theme Article: Computing and Capitalism Distributing Liability: The Legal and Political Battles of Y2K Dylan Mulvin London School of Economics and Political Science Abstract—In 1999 the United States Congress passed the Y2K Act, a major—but temporary—effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This article excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology. & It’s almost a betrayal. After being told for The United States’ “Y2K Act” of 1999 took years that technology is the path to a highly drastic steps to protect American companies evolved future, it’s come as something of a shock to discover that a computer system is from lawsuits related to the Year 2000 Problem not a shining city on a hill - perfect and ever (the “Y2K bug”).3 Among other changes, the new - but something more akin to an old Act gave all companies ninety days to solve any farmhouse built bit by bit over decades by Y2K malfunctions, capped punitive damages, and non-union carpenters.1 stipulated that legal and financial responsibility –– Ellen Ullman, “The Myth of Order” Wired, would have to be distributed proportionately April 1999 among any liable companies. -
Control Characters in ASCII and Unicode
Control characters in ASCII and Unicode Tens of odd control characters appear in ASCII charts. The same characters have found their way to Unicode as well. CR, LF, ESC, CAN... what are all these codes for? Should I care about them? This is an in-depth look into control characters in ASCII and its descendants, including Unicode, ANSI and ISO standards. When ASCII first appeared in the 1960s, control characters were an essential part of the new character set. Since then, many new character sets and standards have been published. Computing is not the same either. What happened to the control characters? Are they still used and if yes, for what? This article looks back at the history of character sets while keeping an eye on modern use. The information is based on a number of standards released by ANSI, ISO, ECMA and The Unicode Consortium, as well as industry practice. In many cases, the standards define one use for a character, but common practice is different. Some characters are used contrary to the standards. In addition, certain characters were originally defined in an ambiguous or loose way, which has resulted in confusion in their use. Contents Groups of control characters Control characters in standards o ASCII control characters o C1 control characters o ISO 8859 special characters NBSP and SHY o Control characters in Unicode Control characters in modern applications Character list o ASCII o C1 o ISO 8859 Categories Translations Character index Sources This article starts by looking at the history of control characters in standards. We then move to modern times. -
The ENIAC: the Grandfather of All Computers
The ENIAC: The Grandfather of all Computers Brian L. Stuart Drexel University The ENIAC 1 What Is ENIAC? • Large-scale computing system • Built during WWII • Dedicated February 15, 1946 • Converted to sequential instruction execution in 1948 • Retired 1955 • Used for: – Atomic bomb development – Ballistics trajectories – Number theory – Supersonic air flow – Weather prediction – and more 2 Common Statistics • 40 racks, each 8’ by 2’ • About 18,000 tubes • 100KHz basic clock • 200µS addition time • About 150KW of power 3 Key People 4 Key People Herman Goldstine Arthur Burks Harry Huskey 5 Key People • Kay Mauchly (Kathleen McNulty Mauchly Antonelli) • Fran Bilas (Frances Bilas Spence) • Jean Bartik (Betty Jean Jennings Bartik) • Betty Holberton (Frances Elizabeth Snyder Holberton) • Ruth Lichterman (Ruth Lichterman Teitelbaum) • Marlyn Wescoff (Marlyn Wescoff Meltzer) • Adele Goldstine (Adele Katz Goldstine) 6 Key People Kay Mauchly Fran Bilas Jean Bartik 7 Key People Betty Holberton Ruth Lichterman Marlyn Wescoff 8 Key People 9 Basic Architecture • Initiating unit • Cycling unit • Two-panel master programmer • 20 Accumulator units • Multiplying unit • Divider/Square rooter unit • 3 Function table units • Constant transmitter/card reader unit • Card punch unit 10 Moore School Layout 11 Unusual Characteristics • No bulk writeable memory • No separation between storage and computation • Divider/square rooter not always exact • Initially programmed with wires and switches • Feels like a dataflow architecture 12 Accumulator • 10 digits + sign (P -
Making Programming Masculine 6
Making Programming Masculine 6 NATHAN ENSMENGER I n the April 1967 issue of Cosmopolitan magazine, sandwiched between “ The Bachelor Girls of Japan ” and “ A Dog Speaks: Why a Girl Should Own a Pooch, ” there appeared a curious little essay entitled simply “ The Computer Girls.” As the article explained, these were the female “ computer programmers ” who taught the dazzling new “ miracle machines” called computers “ what to do and how to do it. ” There were already more than 20,000 women working as com- puter programmers in the United States, argued the article ’ s author, Lois Mandel, and there was an immediate demand for 20,000 more. Not only could a talented “ computer girl” command as much $20,000 a year, but the opportunities for women in computing were effectively “ unlimited. ” The rapid expansion of the computer industry meant that “ sex discrimination in hiring ” was unheard of, Mandel confi dently declared, and anyone with aptitude — male or female, college educated or not — could succeed in the fi eld. And not only were women in computing treated as equals, but they actually had many advantages over their male colleagues. Programming was “ just like planning a dinner, ” Mandel quoted the noted computer scientist Dr. Grace Hopper as saying, “ You have to plan ahead and schedule everything so it ’ s ready when you need it. Programming requires patience and the ability to handle detail. Women are ‘ naturals ’ at computer programming ” [1] . It would be easy to dismiss “ The Computer Girls ” as a fl uff piece, a half - hearted attempt by Cosmopolitan to capitalize on contemporary interest in the computer revolution.