Skip to main content

Blink: Computer programmers used to be women

Computer programmers used to be women until a report in the 1960s changed everything.

What does a typical computer programmer look like? The first image that comes to mind is probably a nerdy-looking man who’s terrible in social situations but excellent at dealing with numbers. This stereotype, however, is in massive contrast to the reality of the early days of computing.

During the first part of the twentieth century, working with computers was considered a clerical job – like typing or operating a switchboard – and thus deemed “women’s work.” In other words, the first computer programmers were women.

In fact, the first program for a computer was written by Ada Lovelace in 1840.

It should come as no surprise to learn that women programmed the first computer for the US Army during WWII. Or that rear admiral Grace Hopper – who held a PhD in mathematics – programmed Mark I, a computer at Harvard University which helped in the development of the atomic bombs that would be dropped on Japan in 1945.

Another thing that many people don’t know is that astronaut John Glenn’s successful orbit of the earth in 1962 was made possible by the work of three female NASA mathematicians. The lack of recognition for their contribution inspired the 2016 film Hidden Figures.

Then, in 1967, an article titled “The Computer Girls” was published in Cosmopolitan magazine. The piece contained an interview with Hopper, who compared programming to organizing a dinner party. She said that women made good programmers because of their patience and attention to detail.

But sometime in the 1960s came a report that claimed men were better suited to programming.

Unsurprisingly, the report was written by two men, psychologists William Cannon and Dallis Perry, who were hired by a software company to characterize the perfect computer programmer. Of the 1,378 programmers they interviewed, only 186 were female. After their research, Cannon and Perry concluded one key trait was that they “didn’t like people.” By connecting good programming skills with antisocial behavior and introversion, the ideal employee was more likely to be male on account of men being three times more likely to receive the diagnosis of antisocial personality disorder.

Since the release of that report, the industry was persuaded to hire antisocial men. Their dominance in the field has led to the false assumption that the majority of programmers should be men.

__
Snippet taken from a book named "Brotopia" by Emily Chang

Comments

Popular posts from this blog

Unlock protected blocks in Siemens SIMATIC Step 7

Recently I'd been called by Hindalco's Fabrication Plant division to unlock the protected blocks in Siemens SIMATIC Step 7. They were in need to unlock those blocks since an year because of 1 million Rupees of loss per month. They want to re-program those blocks but it was locked by the man who'd done the setup. From the people working in that department, I came to know that they were trying to call that man (someone from Italy) right here but he's not coming. Actually, what he'd done was that he'd locked some of the blocks and deleted the source file. And Siemens didn't provide any feature to unlock. Department people also told me that even the people working in Siemens don't know how to do it. Being a software engineer I know that any thing can be reverse engineered. So I took up the challenge. How did I unlocked the blocks? The first thing I'd done was searched about this software at Google and read about what is this software all about. Aft...

Launching a Jupyter Notebook with TensorFlow using Docker

This article will walk you through setting up a Jupyter Notebook environment with TensorFlow pre-installed using Docker. Docker allows you to run isolated containerized applications, providing a consistent environment regardless of your underlying operating system. Prerequisites: Docker: Ensure you have Docker installed and running on your system. You can download and install it from the official Docker website ( https://www.docker.com/ ). Steps: Start Docker: Open your Docker application (Docker Desktop for Windows/macOS or the command line if using Linux). Run the Jupyter Notebook container: For macOS/Linux: Open your terminal application and run the following command: docker run -it --rm -p 8888:8888 -v "${PWD}":/home/jovyan/work jupyter/tensorflow-notebook For Windows: Open your Command Prompt application and run the following command: docker run -it --rm -p 8888:8888 -v "%CD%":/home/jovyan/work jupyter/tensorflow-notebook Explanation of the command flags: -...

JS: The complete code example of Crypto.js (DES)

For one of the project I was trying to use crypto.js but I found that the Quick-start Guide have some deficiency in terms of library usage. So I am writing it here as a useful note for memory recap. <script src="http://crypto-js.googlecode.com/svn/tags/3.1.2/build/rollups/tripledes.js"></script> <script> var encrypted = CryptoJS.DES.encrypt("The secret message", "secret_key"); var e_msg = encrypted.toString(); console.log(e_msg); var decrypted = CryptoJS.DES.decrypt(e_msg, "secret_key"); var d_msg = decrypted.toString(CryptoJS.enc.Utf8); console.log(d_msg); </script>