SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Women in Tech Trivia
Compiled by Sarah Dutkiewicz
sarah@cletechconsulting.com
Who gets credited with having found the first
bug?
Grace Murray Hopper
This happened in 1947. However, she was quick to
point out that she was not present when the bug
was actually found.
- Source: “Amazing Grace” Murray Hopper
Who was the first female to receive a PhD in
computer science?
Sister Mary
Kenneth Keller
She helped develop the computer
language BASIC. Her dissertation
was on “Inductive Interference on
Computer Generated Patterns”. In
1965, she was awarded her PhD in
Computer Science.
- Source: Mental Floss
Which woman in tech held a patent on a secret
communication system?
Hedy Kiesler Markey
Her Secret Communication System is
Patent No. 2,292, 387, granted in 1942 to
Hedy and composer George Antheil. This
system reduced danger of detection and
jamming of torpedo systems.
- Source: Invent.org
Which woman in tech helped form gaming
company Sierra On-Line?
Roberta Williams
Along with her husband Ken,
Roberta Williams helped find gaming
legend Sierra On-Line. She is
known for her work on the King’s
Quest series.
- Sources: Sierragamers.com;
Wikipedia
Which woman in tech developed the algorithm
behind the Spanning Tree Protocol?
Radia Perlman
Her contributions appear in
computer science and networking.
She also gets attributed as The
Mother of the Internet, although she
doesn’t approve of that attribution.
- Source: The Atlantic
Which woman in tech is known for her
hardware work in augmented reality?
Jeri Ellsworth
From hardware to emulate home
computers if the 1980s to
developing an augmented reality
project called castAR, Ellsworth
is known for her work in the
hardware space.
- Source: Wikipedia
Making programming easier and more accessible
http://eniacprogrammers.org
What’s the name of the movie about the ladies
computing in World War II?
Top Secret Rosies: The
Female ‘Computers’ of
WWII
This documentary talks about the
women who were responsible for the
ballistics tables in World War II and
their role with the ENIAC.
- Source: IMDB
Which woman was the lead software engineer
on Project Apollo?
Margaret Hamilton
She designed software robust
enough to handle buffer overflows
and cycle-stealing, which was
instrumental in the Apollo 11 lunar
module landing on the moon.
- Source: Medium.com
Which female video game designer
worked on River Raid and Super
Breakout?
Carol Shaw
Her official title was Microprocessor
Software Engineer. She worked on
the algorithms to create continuous,
non-random landscape.
- Source: Women24
Which lady co-founded Apache Mahout, a
platform for scalable machine learning and
data mining?
Isabel Drost-Fromm
In addition to committing to Apache Mahout, she also speaks
at conferences on things such as free software, Lucene, and
Hadoop.
- Source: O’Reilly
ABI is a social enterprise founded on the belief that
women are vital to building technology that the world
needs.
http://anitaborg.org

Weitere ähnliche Inhalte

Was ist angesagt?

[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...
[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...
[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...DataScienceConferenc1
 
Applications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & FutureApplications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & FutureJamie Gannon
 
Generative AI and ChatGPT - Scope of AI and advance Generative AI
Generative AI and ChatGPT - Scope of AI and advance Generative AIGenerative AI and ChatGPT - Scope of AI and advance Generative AI
Generative AI and ChatGPT - Scope of AI and advance Generative AIKumaresan K
 
The evolution of computers
The evolution of computersThe evolution of computers
The evolution of computersSharat Chandu
 
Babbage and his machines - Carlo Randone
Babbage and his machines - Carlo RandoneBabbage and his machines - Carlo Randone
Babbage and his machines - Carlo RandoneCarlo Randone
 
Increase Productivity with ChatGPT
Increase Productivity with ChatGPTIncrease Productivity with ChatGPT
Increase Productivity with ChatGPTPrinceGarg95
 
Unlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdfUnlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdfPremNaraindas1
 
Capstone PowerPoint Presentation: Effective Guide
Capstone PowerPoint Presentation: Effective GuideCapstone PowerPoint Presentation: Effective Guide
Capstone PowerPoint Presentation: Effective GuideCapstone Project
 
History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - ModernDamian T. Gordon
 
Networking Tips via Keith Ferrazzi Book "Never Eat Alone"
Networking Tips via Keith Ferrazzi Book "Never Eat Alone"Networking Tips via Keith Ferrazzi Book "Never Eat Alone"
Networking Tips via Keith Ferrazzi Book "Never Eat Alone"LinkedIn Riches
 
AUDIENCE - 4 Keys to the Future of Mobile Video
AUDIENCE - 4 Keys to the Future of Mobile Video AUDIENCE - 4 Keys to the Future of Mobile Video
AUDIENCE - 4 Keys to the Future of Mobile Video Liam Boogar-Azoulay
 
Machine Learning: A Fast Review
Machine Learning: A Fast ReviewMachine Learning: A Fast Review
Machine Learning: A Fast ReviewAhmad Ali Abin
 
Evolution / history of Computer
Evolution / history of ComputerEvolution / history of Computer
Evolution / history of ComputerAAKASH KUMAR
 

Was ist angesagt? (20)

How to Chat Gpt Works?
How to Chat Gpt Works?How to Chat Gpt Works?
How to Chat Gpt Works?
 
Evolution & History of Computers
Evolution & History of ComputersEvolution & History of Computers
Evolution & History of Computers
 
[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...
[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...
[DSC DACH 23] ChatGPT and Beyond: How generative AI is Changing the way peopl...
 
Applications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & FutureApplications of Artificial Intelligence-Past, Present & Future
Applications of Artificial Intelligence-Past, Present & Future
 
Generative AI and ChatGPT - Scope of AI and advance Generative AI
Generative AI and ChatGPT - Scope of AI and advance Generative AIGenerative AI and ChatGPT - Scope of AI and advance Generative AI
Generative AI and ChatGPT - Scope of AI and advance Generative AI
 
Evolution of computers
Evolution  of computersEvolution  of computers
Evolution of computers
 
The evolution of computers
The evolution of computersThe evolution of computers
The evolution of computers
 
Babbage and his machines - Carlo Randone
Babbage and his machines - Carlo RandoneBabbage and his machines - Carlo Randone
Babbage and his machines - Carlo Randone
 
Increase Productivity with ChatGPT
Increase Productivity with ChatGPTIncrease Productivity with ChatGPT
Increase Productivity with ChatGPT
 
Let's Talk Success
Let's Talk SuccessLet's Talk Success
Let's Talk Success
 
Unlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdfUnlocking the Power of Generative AI An Executive's Guide.pdf
Unlocking the Power of Generative AI An Executive's Guide.pdf
 
Capstone PowerPoint Presentation: Effective Guide
Capstone PowerPoint Presentation: Effective GuideCapstone PowerPoint Presentation: Effective Guide
Capstone PowerPoint Presentation: Effective Guide
 
History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - Modern
 
Networking Tips via Keith Ferrazzi Book "Never Eat Alone"
Networking Tips via Keith Ferrazzi Book "Never Eat Alone"Networking Tips via Keith Ferrazzi Book "Never Eat Alone"
Networking Tips via Keith Ferrazzi Book "Never Eat Alone"
 
Personality at work
Personality at workPersonality at work
Personality at work
 
Andy Roy - Conversational AI - Why We Must Build.pdf
Andy Roy - Conversational AI - Why We Must Build.pdfAndy Roy - Conversational AI - Why We Must Build.pdf
Andy Roy - Conversational AI - Why We Must Build.pdf
 
AUDIENCE - 4 Keys to the Future of Mobile Video
AUDIENCE - 4 Keys to the Future of Mobile Video AUDIENCE - 4 Keys to the Future of Mobile Video
AUDIENCE - 4 Keys to the Future of Mobile Video
 
Machine Learning: A Fast Review
Machine Learning: A Fast ReviewMachine Learning: A Fast Review
Machine Learning: A Fast Review
 
ChatGPT Content Creation Master Class - Leah Faul, 15000 Cubits
ChatGPT Content Creation Master Class - Leah Faul, 15000 CubitsChatGPT Content Creation Master Class - Leah Faul, 15000 Cubits
ChatGPT Content Creation Master Class - Leah Faul, 15000 Cubits
 
Evolution / history of Computer
Evolution / history of ComputerEvolution / history of Computer
Evolution / history of Computer
 

Andere mochten auch

Unstoppable Course Final Presentation
Unstoppable Course Final PresentationUnstoppable Course Final Presentation
Unstoppable Course Final PresentationSarah Dutkiewicz
 
(Computer) Pixar Trivia
(Computer) Pixar Trivia(Computer) Pixar Trivia
(Computer) Pixar Triviajustinesolano
 
Technology Trivia Quiz
Technology Trivia QuizTechnology Trivia Quiz
Technology Trivia Quizdlashe
 
Welcome to czech republic
Welcome to czech republicWelcome to czech republic
Welcome to czech republicfirstcentre
 
Presentation of the Czech Republic
Presentation of the Czech RepublicPresentation of the Czech Republic
Presentation of the Czech RepublicKateřina Pelánová
 
Czech Republic
Czech RepublicCzech Republic
Czech RepublicJH4
 
czech republic
czech republicczech republic
czech republichonzam
 
Global monitoring's forgotten history: typewriter to smartphone in five decades
Global monitoring's forgotten history: typewriter to smartphone in five decadesGlobal monitoring's forgotten history: typewriter to smartphone in five decades
Global monitoring's forgotten history: typewriter to smartphone in five decadesIRC
 
Czech Republic presentation
Czech Republic presentationCzech Republic presentation
Czech Republic presentationantonindanek
 
Rizal Report Chapter 11
Rizal Report Chapter 11Rizal Report Chapter 11
Rizal Report Chapter 11Liljomonster
 
An Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s DayAn Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s DayKaitlin McAndrews
 
A History of the Typewriter
A History of the TypewriterA History of the Typewriter
A History of the TypewriterScribendi
 
Czech Republic Powerpoint Country
Czech Republic Powerpoint CountryCzech Republic Powerpoint Country
Czech Republic Powerpoint CountryAndrew Schwartz
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Andere mochten auch (20)

Unstoppable Course Final Presentation
Unstoppable Course Final PresentationUnstoppable Course Final Presentation
Unstoppable Course Final Presentation
 
IT trivia
IT triviaIT trivia
IT trivia
 
(Computer) Pixar Trivia
(Computer) Pixar Trivia(Computer) Pixar Trivia
(Computer) Pixar Trivia
 
ASSESSMENT TRIVIA
ASSESSMENT TRIVIAASSESSMENT TRIVIA
ASSESSMENT TRIVIA
 
Technology Trivia Quiz
Technology Trivia QuizTechnology Trivia Quiz
Technology Trivia Quiz
 
THE CZECH REPUBLIC
THE CZECH REPUBLICTHE CZECH REPUBLIC
THE CZECH REPUBLIC
 
Welcome to czech republic
Welcome to czech republicWelcome to czech republic
Welcome to czech republic
 
Presentation of the Czech Republic
Presentation of the Czech RepublicPresentation of the Czech Republic
Presentation of the Czech Republic
 
Czech Republic
Czech RepublicCzech Republic
Czech Republic
 
czech republic
czech republicczech republic
czech republic
 
Global monitoring's forgotten history: typewriter to smartphone in five decades
Global monitoring's forgotten history: typewriter to smartphone in five decadesGlobal monitoring's forgotten history: typewriter to smartphone in five decades
Global monitoring's forgotten history: typewriter to smartphone in five decades
 
Egyptian literature
Egyptian literatureEgyptian literature
Egyptian literature
 
Czech Republic presentation
Czech Republic presentationCzech Republic presentation
Czech Republic presentation
 
Rizal Report Chapter 11
Rizal Report Chapter 11Rizal Report Chapter 11
Rizal Report Chapter 11
 
An Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s DayAn Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s Day
 
A History of the Typewriter
A History of the TypewriterA History of the Typewriter
A History of the Typewriter
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Tech Quiz Finals
Tech Quiz FinalsTech Quiz Finals
Tech Quiz Finals
 
Czech Republic Powerpoint Country
Czech Republic Powerpoint CountryCzech Republic Powerpoint Country
Czech Republic Powerpoint Country
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Ähnlich wie History of Women in Tech - Trivia

Invotra's History of Cyber Security
Invotra's History of Cyber SecurityInvotra's History of Cyber Security
Invotra's History of Cyber SecurityInvotra
 
Computer history vixens
Computer history vixensComputer history vixens
Computer history vixenswhiteholly317
 
Computer history vixens
Computer history vixensComputer history vixens
Computer history vixenswhiteholly317
 
A History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareA History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareBob Mayer
 
History of software engineering
History of software engineeringHistory of software engineering
History of software engineeringFarazChohan2
 
Women in computer_science
Women in computer_scienceWomen in computer_science
Women in computer_scienceCodemás
 
Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330Stacy Gillett
 
Top 10 Women in the History of Tech
Top 10 Women in the History of TechTop 10 Women in the History of Tech
Top 10 Women in the History of TechiFactory Digital
 
Artificial intelligence and open source
Artificial intelligence and open sourceArtificial intelligence and open source
Artificial intelligence and open sourceCarlos Toxtli
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
12 inventions by women that changed the world
12 inventions by women that changed the world12 inventions by women that changed the world
12 inventions by women that changed the worldPatricia de Assis
 
AI Washington
AI Washington AI Washington
AI Washington OmGujar4
 
Gitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in codingGitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in codinglaslorma
 
Elements of AI Luxembourg - session 2
Elements of AI Luxembourg - session 2Elements of AI Luxembourg - session 2
Elements of AI Luxembourg - session 2Jeremie Dauphin
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
Women and Computer Science
Women and Computer ScienceWomen and Computer Science
Women and Computer ScienceBrittany_Lane
 

Ähnlich wie History of Women in Tech - Trivia (20)

Invotra's History of Cyber Security
Invotra's History of Cyber SecurityInvotra's History of Cyber Security
Invotra's History of Cyber Security
 
Computer history vixens
Computer history vixensComputer history vixens
Computer history vixens
 
Computer history vixens
Computer history vixensComputer history vixens
Computer history vixens
 
A History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareA History of Computer and Cyber Warfare
A History of Computer and Cyber Warfare
 
History of software engineering
History of software engineeringHistory of software engineering
History of software engineering
 
Women in computer_science
Women in computer_scienceWomen in computer_science
Women in computer_science
 
Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
Top 10 Women in the History of Tech
Top 10 Women in the History of TechTop 10 Women in the History of Tech
Top 10 Women in the History of Tech
 
140characters
140characters140characters
140characters
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Artificial intelligence and open source
Artificial intelligence and open sourceArtificial intelligence and open source
Artificial intelligence and open source
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Thewww
ThewwwThewww
Thewww
 
12 inventions by women that changed the world
12 inventions by women that changed the world12 inventions by women that changed the world
12 inventions by women that changed the world
 
AI Washington
AI Washington AI Washington
AI Washington
 
Gitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in codingGitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in coding
 
Elements of AI Luxembourg - session 2
Elements of AI Luxembourg - session 2Elements of AI Luxembourg - session 2
Elements of AI Luxembourg - session 2
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Women and Computer Science
Women and Computer ScienceWomen and Computer Science
Women and Computer Science
 

Mehr von Sarah Dutkiewicz

Passwordless Development using Azure Identity
Passwordless Development using Azure IdentityPasswordless Development using Azure Identity
Passwordless Development using Azure IdentitySarah Dutkiewicz
 
Predicting Flights with Azure Databricks
Predicting Flights with Azure DatabricksPredicting Flights with Azure Databricks
Predicting Flights with Azure DatabricksSarah Dutkiewicz
 
Azure DevOps for Developers
Azure DevOps for DevelopersAzure DevOps for Developers
Azure DevOps for DevelopersSarah Dutkiewicz
 
Azure DevOps for JavaScript Developers
Azure DevOps for JavaScript DevelopersAzure DevOps for JavaScript Developers
Azure DevOps for JavaScript DevelopersSarah Dutkiewicz
 
Azure DevOps for the Data Professional
Azure DevOps for the Data ProfessionalAzure DevOps for the Data Professional
Azure DevOps for the Data ProfessionalSarah Dutkiewicz
 
Noodling with Data in Jupyter Notebook
Noodling with Data in Jupyter NotebookNoodling with Data in Jupyter Notebook
Noodling with Data in Jupyter NotebookSarah Dutkiewicz
 
Intro to Python for C# Developers
Intro to Python for C# DevelopersIntro to Python for C# Developers
Intro to Python for C# DevelopersSarah Dutkiewicz
 
Introduction to Testing and TDD
Introduction to Testing and TDDIntroduction to Testing and TDD
Introduction to Testing and TDDSarah Dutkiewicz
 
Becoming a Servant Leader, Leading from the Trenches
Becoming a Servant Leader, Leading from the TrenchesBecoming a Servant Leader, Leading from the Trenches
Becoming a Servant Leader, Leading from the TrenchesSarah Dutkiewicz
 
NEOISF - On Mentoring Future Techies
NEOISF - On Mentoring Future TechiesNEOISF - On Mentoring Future Techies
NEOISF - On Mentoring Future TechiesSarah Dutkiewicz
 
The Polyglot Data Scientist - Exploring R, Python, and SQL Server
The Polyglot Data Scientist - Exploring R, Python, and SQL ServerThe Polyglot Data Scientist - Exploring R, Python, and SQL Server
The Polyglot Data Scientist - Exploring R, Python, and SQL ServerSarah Dutkiewicz
 
The importance of UX for Developers
The importance of UX for DevelopersThe importance of UX for Developers
The importance of UX for DevelopersSarah Dutkiewicz
 
The Impact of Women Trailblazers in Tech
The Impact of Women Trailblazers in TechThe Impact of Women Trailblazers in Tech
The Impact of Women Trailblazers in TechSarah Dutkiewicz
 
Even More Tools for the Developer's UX Toolbelt
Even More Tools for the Developer's UX ToolbeltEven More Tools for the Developer's UX Toolbelt
Even More Tools for the Developer's UX ToolbeltSarah Dutkiewicz
 
The UX Toolbelt for Developers
The UX Toolbelt for DevelopersThe UX Toolbelt for Developers
The UX Toolbelt for DevelopersSarah Dutkiewicz
 
World Usability Day 2014 - UX Toolbelt for Developers
World Usability Day 2014 - UX Toolbelt for DevelopersWorld Usability Day 2014 - UX Toolbelt for Developers
World Usability Day 2014 - UX Toolbelt for DevelopersSarah Dutkiewicz
 
The UX Toolbelt for Developers
The UX Toolbelt for DevelopersThe UX Toolbelt for Developers
The UX Toolbelt for DevelopersSarah Dutkiewicz
 
The Case for the UX Developer
The Case for the UX DeveloperThe Case for the UX Developer
The Case for the UX DeveloperSarah Dutkiewicz
 

Mehr von Sarah Dutkiewicz (20)

Passwordless Development using Azure Identity
Passwordless Development using Azure IdentityPasswordless Development using Azure Identity
Passwordless Development using Azure Identity
 
Predicting Flights with Azure Databricks
Predicting Flights with Azure DatabricksPredicting Flights with Azure Databricks
Predicting Flights with Azure Databricks
 
Azure DevOps for Developers
Azure DevOps for DevelopersAzure DevOps for Developers
Azure DevOps for Developers
 
Azure DevOps for JavaScript Developers
Azure DevOps for JavaScript DevelopersAzure DevOps for JavaScript Developers
Azure DevOps for JavaScript Developers
 
Azure DevOps for the Data Professional
Azure DevOps for the Data ProfessionalAzure DevOps for the Data Professional
Azure DevOps for the Data Professional
 
Noodling with Data in Jupyter Notebook
Noodling with Data in Jupyter NotebookNoodling with Data in Jupyter Notebook
Noodling with Data in Jupyter Notebook
 
Pairing and mobbing
Pairing and mobbingPairing and mobbing
Pairing and mobbing
 
Intro to Python for C# Developers
Intro to Python for C# DevelopersIntro to Python for C# Developers
Intro to Python for C# Developers
 
Introduction to Testing and TDD
Introduction to Testing and TDDIntroduction to Testing and TDD
Introduction to Testing and TDD
 
Becoming a Servant Leader, Leading from the Trenches
Becoming a Servant Leader, Leading from the TrenchesBecoming a Servant Leader, Leading from the Trenches
Becoming a Servant Leader, Leading from the Trenches
 
NEOISF - On Mentoring Future Techies
NEOISF - On Mentoring Future TechiesNEOISF - On Mentoring Future Techies
NEOISF - On Mentoring Future Techies
 
Becoming a Servant Leader
Becoming a Servant LeaderBecoming a Servant Leader
Becoming a Servant Leader
 
The Polyglot Data Scientist - Exploring R, Python, and SQL Server
The Polyglot Data Scientist - Exploring R, Python, and SQL ServerThe Polyglot Data Scientist - Exploring R, Python, and SQL Server
The Polyglot Data Scientist - Exploring R, Python, and SQL Server
 
The importance of UX for Developers
The importance of UX for DevelopersThe importance of UX for Developers
The importance of UX for Developers
 
The Impact of Women Trailblazers in Tech
The Impact of Women Trailblazers in TechThe Impact of Women Trailblazers in Tech
The Impact of Women Trailblazers in Tech
 
Even More Tools for the Developer's UX Toolbelt
Even More Tools for the Developer's UX ToolbeltEven More Tools for the Developer's UX Toolbelt
Even More Tools for the Developer's UX Toolbelt
 
The UX Toolbelt for Developers
The UX Toolbelt for DevelopersThe UX Toolbelt for Developers
The UX Toolbelt for Developers
 
World Usability Day 2014 - UX Toolbelt for Developers
World Usability Day 2014 - UX Toolbelt for DevelopersWorld Usability Day 2014 - UX Toolbelt for Developers
World Usability Day 2014 - UX Toolbelt for Developers
 
The UX Toolbelt for Developers
The UX Toolbelt for DevelopersThe UX Toolbelt for Developers
The UX Toolbelt for Developers
 
The Case for the UX Developer
The Case for the UX DeveloperThe Case for the UX Developer
The Case for the UX Developer
 

Kürzlich hochgeladen

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Kürzlich hochgeladen (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

History of Women in Tech - Trivia

  • 1. Women in Tech Trivia Compiled by Sarah Dutkiewicz sarah@cletechconsulting.com
  • 2. Who gets credited with having found the first bug?
  • 3. Grace Murray Hopper This happened in 1947. However, she was quick to point out that she was not present when the bug was actually found. - Source: “Amazing Grace” Murray Hopper
  • 4. Who was the first female to receive a PhD in computer science?
  • 5. Sister Mary Kenneth Keller She helped develop the computer language BASIC. Her dissertation was on “Inductive Interference on Computer Generated Patterns”. In 1965, she was awarded her PhD in Computer Science. - Source: Mental Floss
  • 6. Which woman in tech held a patent on a secret communication system?
  • 7. Hedy Kiesler Markey Her Secret Communication System is Patent No. 2,292, 387, granted in 1942 to Hedy and composer George Antheil. This system reduced danger of detection and jamming of torpedo systems. - Source: Invent.org
  • 8. Which woman in tech helped form gaming company Sierra On-Line?
  • 9. Roberta Williams Along with her husband Ken, Roberta Williams helped find gaming legend Sierra On-Line. She is known for her work on the King’s Quest series. - Sources: Sierragamers.com; Wikipedia
  • 10. Which woman in tech developed the algorithm behind the Spanning Tree Protocol?
  • 11. Radia Perlman Her contributions appear in computer science and networking. She also gets attributed as The Mother of the Internet, although she doesn’t approve of that attribution. - Source: The Atlantic
  • 12. Which woman in tech is known for her hardware work in augmented reality?
  • 13. Jeri Ellsworth From hardware to emulate home computers if the 1980s to developing an augmented reality project called castAR, Ellsworth is known for her work in the hardware space. - Source: Wikipedia
  • 14. Making programming easier and more accessible http://eniacprogrammers.org
  • 15. What’s the name of the movie about the ladies computing in World War II?
  • 16. Top Secret Rosies: The Female ‘Computers’ of WWII This documentary talks about the women who were responsible for the ballistics tables in World War II and their role with the ENIAC. - Source: IMDB
  • 17. Which woman was the lead software engineer on Project Apollo?
  • 18. Margaret Hamilton She designed software robust enough to handle buffer overflows and cycle-stealing, which was instrumental in the Apollo 11 lunar module landing on the moon. - Source: Medium.com
  • 19. Which female video game designer worked on River Raid and Super Breakout?
  • 20. Carol Shaw Her official title was Microprocessor Software Engineer. She worked on the algorithms to create continuous, non-random landscape. - Source: Women24
  • 21. Which lady co-founded Apache Mahout, a platform for scalable machine learning and data mining?
  • 22. Isabel Drost-Fromm In addition to committing to Apache Mahout, she also speaks at conferences on things such as free software, Lucene, and Hadoop. - Source: O’Reilly
  • 23. ABI is a social enterprise founded on the belief that women are vital to building technology that the world needs. http://anitaborg.org

Hinweis der Redaktion

  1. Image taken from http://wvegter.hivemind.net/abacus/CyberHeroes/Hopper.htm
  2. Also known as the famous actress named Hedy Lamarr
  3. Image taken from the Photo Gallery at Sierragamers.com
  4. Image taken from Wikipedia: http://en.wikipedia.org/wiki/Radia_Perlman
  5. Image taken from Wikipedia: http://en.wikipedia.org/wiki/Radia_Perlman
  6. Image taken from Wikipedia: http://en.wikipedia.org/wiki/Radia_Perlman
  7. Image taken from Wikipedia: http://en.wikipedia.org/wiki/Radia_Perlman
  8. Image taken from Wikipedia: http://en.wikipedia.org/wiki/Radia_Perlman
  9. Image taken from Wikipedia: http://en.wikipedia.org/wiki/Radia_Perlman