Hidden Computers

نویسنده

  • Melinda Baldwin
چکیده

M ention the word “computer,” and most people conjure up the same image: a machine designed to turn binary code into LaTex documents and Facebook feeds. But in the 19th and early 20th centuries, the word would have evoked a very different image: a person employed to perform calculations. Even more intriguingly, this computer was likely to be a woman. One of the first places where female computers rose to prominence was in the Harvard College Observatory, where celebrated astronomer Edward Charles Pickering recruited a team of women to perform astronomical calculations, likely because he could pay them far less than he would have had to pay men. The first female computer in Pickering’s lab was his former maid, Williamina Fleming, who began at the HCO in 1881. In the 1940s, the US Army followed in Pickering’s footsteps, hiring dozens of female “ballistics computers” to perform calculations to improve the field weapon accuracy. Female computers were recently featured on the big screen in Hidden Figures, based on Margot Lee Shetterly’s book about three African-American women who worked as computers at NASA during the early years of the space race. Katherine Johnson, Dorothy Vaughan, and Mary Jackson contributed significant work to the calculations of Alan Shepard’s and John Glenn’s orbital flights around the Earth. In all these fields, female computers were assigned to perform calculations that required a high level of accuracy and mathematical skill even when repeated for the hundredth time that day. Many laboratory directors actually felt that women were ideal for this work—although the reasons were somewhat less than complimentary. It was commonly believed that women, even those with strong mathematical talents, were less intelligent than men and therefore didn’t grow bored with repetitive work as quickly. That belief hints at a common thread among the careers of the female computers: male scientists often felt that computing work was “mere” calculation, rather than a valuable contribution to science. It was also rare for a computer to be promoted to another area of her laboratory or receive public acknowledgment for important work. It was one thing to hire a woman to perform mathematical calculations; it was another entirely to have her as a coauthor on a scientific paper. Some computers managed to make names for themselves in scientific research. Fleming’s group at the HCO later expanded to include Henrietta Swan Leavitt and Annie Jump Cannon, both of whom made important contributions to our understanding of how to classify stars. Johnson, Vaughan, and Jackson went on to long careers at NASA. However, many other computers found that their path in science began and ended with repetitive calculating work. Opportunities for women were available, but they were far from infinite.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hidden Ideologies within Imported Language Teaching Series: This time the case of Four Corners and Impact Values Series

Extracting incompatible values in the best-sellers current in ELT markets is a real concern. In this study, the researchers tried to bring some claims/counterclaims for hidden ideologies regarding two imported English language teaching coursebooks-Four Corners and Impact Values Series, which are commonly taught within Iranian English language institutes. The main intention was that they might t...

متن کامل

On the two array mask hidden-line algorithm

This paper considers the Two Array Mask algorithm which enables rapid plotting of a continuous function F(x, y). After reexamining this method as a hidden-surface algorithm, its correctness and precision were analyzed for parallel and perspective projections; given that the method with perspective projections is, generally speaking, not exact, alternative solutions are proposed for this case.

متن کامل

ar X iv : q ua nt - p h / 03 04 09 0 v 4 1 9 Ju n 20 06 HIDDEN SYMMETRY DETECTION ON A QUANTUM COMPUTER

The fastest quantum algorithms (for the solution of classical computational tasks) known so far are basically variations of the hidden subgroup problem with f (U [x]) = f (x). Following a discussion regarding which tasks might be solved efficiently by quantum computers, it will be demonstrated by means of a simple example, that the detection of more general hidden (two-point) symmetries V {f (x...

متن کامل

A Comparison of Malware Detection Techniques Based on Hidden Markov Model

Malware is a software which is designed with an intent to damage a network or computer resources. Today, the emergence of malware is on boom letting the researchers develop novel techniques to protect computers and networks. The three major techniques used for malware detection are heuristic, signature-based, and behavior based. Among these, the most prevalent is the heuristic based malware det...

متن کامل

Hidden Subgroup States Are Almost Orthogonal

It is well known that quantum computers can eeciently nd a hidden subgroup H of a nite Abelian group G. This implies that after only a polynomial (in log jGj) number of calls to the oracle function, the states corresponding to diierent candidate subgroups have exponentially small inner product. We show that this is true for noncom-mutative groups also. We present a quantum algorithm which ident...

متن کامل

Quantum Computing and Hidden Variables

This paper initiates the study of hidden variables from a quantum computing perspective. For us, a hidden-variable theory is simply a way to convert a unitary matrix that maps one quantum state to another, into a stochastic matrix that maps the initial probability distribution to the final one in some fixed basis. We list five axioms that we might want such a theory to satisfy, and then investi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computing in Science and Engineering

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017