Notes, References, and threads by section
Notes on nodes:
Values of Notes
Sources for Notes
Uses for Notes
Notes on Section 1: Living Data
Chapter 1.1 Beautiful Data
The theory that explains the history and ill effects that led to the CumuLinker Revolution is known as surveillance capitalism.
,
- Wikipedia Ada Lovelace and Wikipedia Charles Babbage
- Mathematical philosopher Stephen Wolfram untangles the Ada Lovelace story.
- FindingAda.com celebrates International Ada Lovelace Day on October 12.
- Oxford center of academic excellence for Ada Lovelace celebrated 200 years.
–::
Casey is influenced by the representation of data about living people as the currency of surveillance capitalism. She is awed by how well Lovelace and Babbage worked together as portrayed in her biographies.
- IBM 1620 description …
- Autobiographical note) Hours and hours and hours at the 1620 console at Ohio Wesleyan University in the 1960s launched this author into the computing field. Learning Fortran and assembly code was one capability gained, but the lingering lesson was how to get through the period of muddled code while re-engineering a compiler. Every computing student should experience this practical growth and learn from failure and exhaustion as a foundation for team programming, software process, verification/validation, documentation, and other skills taught as “Software Engineering”. Coding is an athletic activity that reveals strengths and weaknesses and preferences and affinity with machines.
In memory of Robert L. Wilson, Mathematics Department Chair, Ohio Wesleyan University, Delaware Ohio.
.
- Wikipedia on the Go To statement
- “considered harmful” gained status as a cliched describing other technical problems.
“Wikipedia on ‘considered harmful’ - Casey faces a dilemma explaining antiquated programming concepts that nevertheless incited creative networked computing experiments. GOTO-infested programs using the BASIC language developed at Dartmouth spawned an early social network of contributing “computing citizens”, according to Joy Rankin book “Peoples History of Computing in the US”. Unfortunately, a male-dominated institution led to (FutureTense) origins of tech bros cultures. See also Section 6 about phases of history of computing as viewed by characters in this novel.
Disrespectful references to the Trickster are intended and a meaningful way to explain the fragile society before and during the 2017 CumuLinker Reformation, with after-effects to be seen.
- Terminology this novel tries to follow (from New Media Dictionary:
- A “threat” is An indication of impending danger or harm, also “to inflict” or the agent for harm”.
- “risk” means the possibility of suffering harm or loss.
- a “hazard” is a source or situation with potential for harm.
- Read threads about risks and software failures(protected) .
- “Threat-caster” is a professional and personal characteristic often associated with the mythological “Cassandra” which is protagonist Casey’s root name. ‘book ‘Warnings’ by Richard Clarke describes incidents of threat-casting.
Chapter 1.2Casual Algorithms
Chapter 1.3 Colorful times
- Learn more about Accessibility” and “synthetic speech” in Threads (protected) and in podcast in Chapters 6.3 and 6.5.
Chapter 1.4 Seeing Things Differently
“As Your World Changes blog.
AppleVis.com tutorials and tips on using iPhones with VoiceOver speech and magnification
(autobiographical) Or, so, it seemed to this reviewer until 2010. Funding for social, possibly negative, consequences had separate sources including nonprofit’s and other foundations.
- “Endless frontier” described by Vannevar Bush defined a long-term approach to science research.
- “As We May Think” (Atlantic magazine, 1945) portrays a dream machine, Memex, for well structured research management yet to be achieved.
Chapter 1.5 Lessons Learning
- Casey may have adopted the practice of writing trip reports from eminent computer scientists EHdsger W Dijkstra archive at U Texas.
- See especially enjoyed EWD on early software conference ideas and papers.
Notes on Section 2 “Threats Get Real”
Chapter 2.1 Risky Speaking
- British predictions for “vocal terrorism” alerted security worldwide.
- Terrorism using modern text to speech TBD
- synthetic speech (Wikipedia) matured from text-to-speech applications as assistive technology alternative to reading by eyesight.
- Note that speech recognition (Wikipedia) is a different technology problem that includes translation from speech to text and also voice recognition. Listen closely when you interact with a voiced system to tell whether it is human or synthetic and how you react to its instructions.
- Read threads about text-to-speech use in “Accessibility (protected).
Chapter 2.2 Internet Down!
- The experience of lengthy Internet outage that disrupted transportation and commerce is described in the Northern Arizona outage in 2015.
Chapter 2.3
Consequential Reasoning
- Read more about Consequential Reasoning.
- ParaLog is a coined name for a (Wikipedia) logic programming class of programming languages in contrast to object-oriented languages.
- (Wikipedia) Prolog was a popular 1980s logic programming language. Prolog lost its constituency due to programming paradigm and international industrial competition as the Japanese Fifth Generation movement faltered. ParaLog remains viable for applications suitable for CumuLinker if programmers thought differently.
- Blog “A Programmer’s Place” is a great history of programming languages.
Notes for Section 3 “Another Chance”
Chapter 3.1 Whisperers Meetup
Chapter 3.2 Lives Unfold
(Autobiographical) Benefactor , inventor of core memory, founder of Wang Labs, Doctor An Wang. was the most prolific, generous, idealistic, and fun executive I encountered in the computing industry. Ditto for the students, especially Elizabeth Shanahan, later President of the Society of Women Engineers and Dan Liggett, software cost entrepreneur.
Chapter 3.3 Mature Branching
, but it’s fun.
Notes for Section 4 “Nuclear Shadows”
Chapter 4.1 Getting Acquainted
Chapter 4.2 Dining On History
Marilyn aspires to a role like
Parnas analysis of Reagan missile defense started discussion of software responsibility.
Scott Rosenberg commentary explains the context.
Browsers give warnings and privacy errors here…
Babbage Institute CPSR oral history by Severo Ornstein.
Notes on Section 4.3 “Team 3G Forms”
/OL>
Notes, References, and threads by section
Notes on nodes:
Values of Notes
Sources for Notes
Uses for Notes
Notes on Section 1: Living Data
Chapter 1.1 Beautiful Data
The theory that explains the history and ill effects that led to the CumuLinker Revolution is known as surveillance capitalism.
,
- Wikipedia Ada Lovelace and Wikipedia Charles Babbage
- Mathematical philosopher Stephen Wolfram untangles the Ada Lovelace story.
- FindingAda.com celebrates International Ada Lovelace Day on October 12.
- Oxford center of academic excellence for Ada Lovelace celebrated 200 years.
–::
Casey is influenced by the representation of data about living people as the currency of surveillance capitalism. She is awed by how well Lovelace and Babbage worked together as portrayed in her biographies.
- IBM 1620 description …
- Autobiographical note) Hours and hours and hours at the 1620 console at Ohio Wesleyan University in the 1960s launched this author into the computing field. Learning Fortran and assembly code was one capability gained, but the lingering lesson was how to get through the period of muddled code while re-engineering a compiler. Every computing student should experience this practical growth and learn from failure and exhaustion as a foundation for team programming, software process, verification/validation, documentation, and other skills taught as “Software Engineering”. Coding is an athletic activity that reveals strengths and weaknesses and preferences and affinity with machines.
In memory of Robert L. Wilson, Mathematics Department Chair, Ohio Wesleyan University, Delaware Ohio.
.
- Wikipedia on the Go To statement
- “considered harmful” gained status as a cliched describing other technical problems.
“Wikipedia on ‘considered harmful’ - Casey faces a dilemma explaining antiquated programming concepts that nevertheless incited creative networked computing experiments. GOTO-infested programs using the BASIC language developed at Dartmouth spawned an early social network of contributing “computing citizens”, according to Joy Rankin book “Peoples History of Computing in the US”. Unfortunately, a male-dominated institution led to (FutureTense) origins of tech bros cultures. See also Section 6 about phases of history of computing as viewed by characters in this novel.
Disrespectful references to the Trickster are intended and a meaningful way to explain the fragile society before and during the 2017 CumuLinker Reformation, with after-effects to be seen.
- Terminology this novel tries to follow (from New Media Dictionary:
- A “threat” is An indication of impending danger or harm, also “to inflict” or the agent for harm”.
- “risk” means the possibility of suffering harm or loss.
- a “hazard” is a source or situation with potential for harm.
- Read threads about risks and software failures(protected) .
- “Threat-caster” is a professional and personal characteristic often associated with the mythological “Cassandra” which is protagonist Casey’s root name. ‘book ‘Warnings’ by Richard Clarke describes incidents of threat-casting.
Chapter 1.2Casual Algorithms
Chapter 1.3 Colorful times
- Learn more about Accessibility” and “synthetic speech” in Threads (protected) and in podcast in Chapters 6.3 and 6.5.
Chapter 1.4 Seeing Things Differently
“As Your World Changes blog.
AppleVis.com tutorials and tips on using iPhones with VoiceOver speech and magnification
(autobiographical) Or, so, it seemed to this reviewer until 2010. Funding for social, possibly negative, consequences had separate sources including nonprofit’s and other foundations.
- “Endless frontier” described by Vannevar Bush defined a long-term approach to science research.
- “As We May Think” (Atlantic magazine, 1945) portrays a dream machine, Memex, for well structured research management yet to be achieved.
Chapter 1.5 Lessons Learning
- Casey may have adopted the practice of writing trip reports from eminent computer scientists EHdsger W Dijkstra archive at U Texas.
- See especially enjoyed EWD on early software conference ideas and papers.
Notes on Section 2 “Threats Get Real”
Chapter 2.1 Risky Speaking
- British predictions for “vocal terrorism” alerted security worldwide.
- Terrorism using modern text to speech TBD
- synthetic speech (Wikipedia) matured from text-to-speech applications as assistive technology alternative to reading by eyesight.
- Note that speech recognition (Wikipedia) is a different technology problem that includes translation from speech to text and also voice recognition. Listen closely when you interact with a voiced system to tell whether it is human or synthetic and how you react to its instructions.
- Read threads about text-to-speech use in “Accessibility (protected).
Chapter 2.2 Internet Down!
- The experience of lengthy Internet outage that disrupted transportation and commerce is described in the Northern Arizona outage in 2015.
Chapter 2.3
Consequential Reasoning
- Read more about Consequential Reasoning.
- ParaLog is a coined name for a (Wikipedia) logic programming class of programming languages in contrast to object-oriented languages.
- (Wikipedia) Prolog was a popular 1980s logic programming language. Prolog lost its constituency due to programming paradigm and international industrial competition as the Japanese Fifth Generation movement faltered. ParaLog remains viable for applications suitable for CumuLinker if programmers thought differently.
- Blog “A Programmer’s Place” is a great history of programming languages.
Notes for Section 3 “Another Chance”
Chapter 3.1 Whisperers Meetup
Chapter 3.2 Lives Unfold
(Autobiographical) Benefactor , inventor of core memory, founder of Wang Labs, Doctor An Wang. was the most prolific, generous, idealistic, and fun executive I encountered in the computing industry. Ditto for the students, especially Elizabeth Shanahan, later President of the Society of Women Engineers and Dan Liggett, software cost entrepreneur.
Chapter 3.3 Mature Branching
, but it’s fun.
Notes for Section 4 “Nuclear Shadows”
Chapter 4.1 Getting Acquainted
Chapter 4.2 Dining On History
Marilyn aspires to a role like
Parnas analysis of Reagan missile defense started discussion of software responsibility.
Scott Rosenberg commentary explains the context.
Browsers give warnings and privacy errors here…
Babbage Institute CPSR oral history by Severo Ornstein.
Notes on Section 4.3 “Team 3G Forms”
/OL>
Notes, References, and threads by section
Notes on nodes:
Values of Notes
- One theme of this novel is that students and professionals often have not studied much, if anything, in the history of computing. Well, there’s a lot of history, going back to the Victorian era and wars aplenty. Here, we focus mainly away from Silicon Valley.
- Most notes here point to an explanation of an historical moment or a technology. Others are autobiographical. Some explain the novel’s hypothetical transformation and its ramifications.
- Several topics have expanded explanations we call “threads”: Accessibility including synthetic speech; Risks including failures; Reasoning, the logic paradigm and 1980s competition; and Tidbits of history, mostly wars.
Sources for Notes
- Wikipedia is usually a solid resource but occasionally suffers from gender or national biases.
- Links are made only to sources likely to remain public. Members of IEEE and ACM have digital libraries. This author is a lapsed IEEE and ACM former editor and writer.
- Alas, excellent course notes often do not persist as programs and faculty come and go. Also some links are so long that truncation occurs.
- Searches for references usually started with DuckDuckGo in browsers to avoid advertising and tracking then sometimes used a specialized Google search tool we give away.
- Google Scholar provides a valuable context for important references, including citations, related articles, sources for text versions. Thanks, Google. Example: Google Scholar for ‘test data selection’.
- Podcasts that contain hours of historical interviews are: “History of Computing”; “Internet History”; “CommandLine Heroes”; and “Cyber”. Find these using a podcasts app, such as Icatcher for Apple IOS.
Uses for Notes
- Computer science textbooks often have lengthy technical history that mentions founders and ideas that build the subject. But, these fail to capture the impacts and personalities that did the real work, had the fun, and suffered the losses. Many notes here could be offered as “odd moments” interjections during classroom discussions to complement faculty personal experiences. The web site will have a section for historical contributions of our readers.
- Some notes are autobiographical confessions for events and characters implanted in the story.
- Following are theme of “risks”,
- the wonderful world of social media led to the avarice of capitalism;
- synthetic speech used by people with vision loss is also a harbinger of terrorism;
- accessibility pinpoints web vulnerabilities ;
- “Consequential Reasoning” suggests a lost branch of computing, blamed on international competition, also unsuited to how modern students think, but maybe a cause for complexity and harm;
Notes on Section 1: Living Data
Chapter 1.1 Beautiful Data
- (Fiction) ( The 2017 CumuLinker Reformation changed the Web to 1) protect private living data and (2) improve the mood of the country. The wearable Whisperer is new CumuLinker technology under evaluation in 2019. C-A-L-M (for “Conversation As Language Moderation” is a set of practices that introduce and accelerate productive interactions. The theory that explains the history and ill effects that led to the CumuLinker Revolution is known as surveillance capitalism.
- Read more in Thread on CumuLinker Reformation (protected) .
- Surveillance capitalism theory by Shoshana Zuboff examines economic and social issues since the Dawn of the Web. a must listen or read!
- Ada Byron Lovelace inspires modern women in computing with her Victorian era deed thinking. She lived a short life interacting technically and socially with famous industrialist Charles Babbage. Often hyped as “the first programmer”, her thinking employs “representation” that foreshadows modern computing and mathematical knowledge that stimulated Babbage’s experiments. Her detailed analysis of Babbage’s Analytic Engine was written at age 26 while maintaining a growing family and without any acknowledged professional status.–:: Casey is influenced by the representation of data about living people as the currency of surveillance capitalism. She is awed by how well Lovelace and Babbage worked together as portrayed in her biographies.
- The IBM 1620 computer was simple enough to trust to an undergraduate for mathematical exploration and IT administration.
- IBM 1620 description …
- Autobiographical note) Hours and hours and hours at the 1620 console at Ohio Wesleyan University in the 1960s launched this author into the computing field. Learning Fortran and assembly code was one capability gained, but the lingering lesson was how to get through the period of muddled code while re-engineering a compiler. Every computing student should experience this practical growth and learn from failure and exhaustion as a foundation for team programming, software process, verification/validation, documentation, and other skills taught as “Software Engineering”. Coding is an athletic activity that reveals strengths and weaknesses and preferences and affinity with machines. In memory of Robert L. Wilson, Mathematics Department Chair, Ohio Wesleyan University, Delaware Ohio.
- “Spaghetti code” describes programs troubled by languages that forced control flow into and out of statements, making it hard to understand programs.
- Wikipedia on the Go To statement
- “considered harmful” gained status as a cliched describing other technical problems. “Wikipedia on ‘considered harmful’
- Casey faces a dilemma explaining antiquated programming concepts that nevertheless incited creative networked computing experiments. GOTO-infested programs using the BASIC language developed at Dartmouth spawned an early social network of contributing “computing citizens”, according to Joy Rankin book “Peoples History of Computing in the US”. Unfortunately, a male-dominated institution led to (FutureTense) origins of tech bros cultures. See also Section 6 about phases of history of computing as viewed by characters in this novel.
- The Trickster mythological figure describes the US elected leader in the period of this novel in 2019.Disrespectful references to the Trickster are intended and a meaningful way to explain the fragile society before and during the 2017 CumuLinker Reformation, with after-effects to be seen.
- ‘Risk’ Is a theme of the novel and a central force in computing, as well as life in general.
- Terminology this novel tries to follow (from New Media Dictionary:
- A “threat” is An indication of impending danger or harm, also “to inflict” or the agent for harm”.
- “risk” means the possibility of suffering harm or loss.
- a “hazard” is a source or situation with potential for harm.
- Read threads about risks and software failures(protected) .
- “Threat-caster” is a professional and personal characteristic often associated with the mythological “Cassandra” which is protagonist Casey’s root name. ‘book ‘Warnings’ by Richard Clarke describes incidents of threat-casting.
- Terminology this novel tries to follow (from New Media Dictionary:
Chapter 1.2Casual Algorithms
- (Fiction) CumuLinker does Life Replay” using purloined private data plus public available information to produce a chronology that reads as if written by a journalist. Events might focus on geography, profession, family, health, or other stories that fit the occasion. Life Replay can also be used for personal introspection, e.g. professional review or interactions with another specific person.
- Algorithmic cruelty” occurred in reality in 2014 when Facebook surprised a parent with his recently deceased child’s picture. Inc Facebook incident of algorithmic cruelty Facebook apologized for algorithmic cruelty.
Chapter 1.3 Colorful times
- Text contrast is an important aspect of accessibility for people with low vision. It applies to all visual readers controlled by settings usually embedded in schemes operating as CSS for (Cascading Style Sheets) in Browsers. The readability factors for text contrast are specified and can be validated according to Web standards. This vulnerability is an example of a messy Web and a culture of complexity that supports an industry of developers, now expanded by penetration testers and bug bounty handlers.
- Learn more about Accessibility” and “synthetic speech” in Threads (protected) and in podcast in Chapters 6.3 and 6.5.
Chapter 1.4 Seeing Things Differently
- Sally and Casey became acquainted at a (Wikipedia) Fifth Generation conference in Japan. Learn more in Thread Reasoning about Fifth Generation and Prolog.
- (Autobiographical) Sally’s loss of vision leads to standard practices learned as “vision rehabilitation”. She has written a manifesto for accessibility and maintains a blog remarkably like this author’s early experience. “As Your World Changes blog.
- The Apple iPhone is the primary communication, reading, gaming, and translating instrument for many people with low vision and enough $$$. AppleVis.com tutorials and tips on using iPhones with VoiceOver speech and magnification
- (Fiction) Casey has been invited for a special role under the Science Frontiers funding program. This is modeled after the National Science Foundation where a dozen researchers discuss, rate, and summarize submitted proposals and budgets. “Scientific Merit” and “Social contribution” and “Diversity” are traditional criteria. It is assumed that killer problems will be solved eventually or cast into a different scientific program. Negativity, as in “should never be used” or “cannot be verified” or “will introduce hazards” or “was done 20 years ago” are not included in recommendations that might reduce overall funding among competitive programs. Risks and threats could be assimilated into the review process. (autobiographical) Or, so, it seemed to this reviewer until 2010. Funding for social, possibly negative, consequences had separate sources including nonprofit’s and other foundations.
- A counter-example to threat aversion is NSF-funded CyberPhysical Systems about (Wikipedia) on Cyber-physical system.
- “Endless frontier” described by Vannevar Bush defined a long-term approach to science research.
- “As We May Think” (Atlantic magazine, 1945) portrays a dream machine, Memex, for well structured research management yet to be achieved.
- (Fiction) Speculate about the Pink Page Rampage in Threads on CuuLinker (protected)and Section 6 through podcast-style interviews. CumuLinker Reformation riled up beneficiaries of surveillance capitalism, especially Silicon Valley employees. A protest is organized through the dark side of software and a specific vulnerability in web page design.
Chapter 1.5 Lessons Learning
- Here is a summary of preceding Chapters and the protagonist’s planning for the following journey.
- Casey may have adopted the practice of writing trip reports from eminent computer scientists EHdsger W Dijkstra archive at U Texas.
- See especially enjoyed EWD on early software conference ideas and papers.
Notes on Section 2 “Threats Get Real”
Chapter 2.1 Risky Speaking
- “Vocal terrorism” was predicted openly in 2007. Incidents have yet to be reported in 2022.
- British predictions for “vocal terrorism” alerted security worldwide.
- Terrorism using modern text to speech TBD
- Speech technology is a mature industry with millions of users.
- synthetic speech (Wikipedia) matured from text-to-speech applications as assistive technology alternative to reading by eyesight.
- Note that speech recognition (Wikipedia) is a different technology problem that includes translation from speech to text and also voice recognition. Listen closely when you interact with a voiced system to tell whether it is human or synthetic and how you react to its instructions.
- Read threads about text-to-speech use in “Accessibility (protected).
Chapter 2.2 Internet Down!
- Internet outages are common but not cohesively described.
- The experience of lengthy Internet outage that disrupted transportation and commerce is described in the Northern Arizona outage in 2015.
- An Internet outage map
- Code Red nationally manages emergency notification for regions and cities. not to be confused with sugary drinks or cyber alerts. …
Chapter 2.3 Consequential Reasoning
- “Consequential Reasoning” is a coined term for using logic as the basis for computation within a process of documentation and analysis that drives the logic into programs then actions that make sense to humans.
- Read more about Consequential Reasoning.
- ParaLog is a coined name for a (Wikipedia) logic programming class of programming languages in contrast to object-oriented languages.
- (Wikipedia) Prolog was a popular 1980s logic programming language. Prolog lost its constituency due to programming paradigm and international industrial competition as the Japanese Fifth Generation movement faltered. ParaLog remains viable for applications suitable for CumuLinker if programmers thought differently.
- Blog “A Programmer’s Place” is a great history of programming languages.
Notes for Section 3 “Another Chance”
Chapter 3.1 Whisperers Meetup
- Whisperers contain private data inter-connected with another person’s data in the physical sphere of a CumuLinker CALM moment. For example, CumuLinker recognizes that Gavin is a person Casey has tracked by Google search upon occasions. A body reader can sense attention vectors that amplify the personal historical connection with some type of haptic motion. CumuLinker can strengthen that attention-getting signal with settings that relate to time and place or community membership or family connectivity.
- The CumuLinker vault of private data accumulated over history is rich in connectivity that amplifies human memory. Casey has tracked Gavin by his books and institutional affiliations. Gavin may have tracked Casey by location or hearsay about her interactions in their peer learning community.
- The (Wikipedia) “Quantified Self” aka Personal Quantification Movementillustrates motives that are now realized in mobile devices.
Chapter 3.2 Lives Unfold
- The location and institution are modeled after the Wang Institute of Graduate Studies, 1982-1987, Tyngsboro Massachusetts. Its Software Engineering Master Degree curriculum migrated to to Carnegie-Mellon Software Engineering Institute.
- The “Massachusetts Miracle” period produced the mini-computer generation from companies: Wang, Digital, Apollo, Data General,These companies also had a cadre of part-time students in a gradually organizing discipline called “software engineering”. The culture of the time is displayed in Tracy Kidder’s “Soul of a New Machine”. …
(Autobiographical) Benefactor , inventor of core memory, founder of Wang Labs, Doctor An Wang. was the most prolific, generous, idealistic, and fun executive I encountered in the computing industry. Ditto for the students, especially Elizabeth Shanahan, later President of the Society of Women Engineers and Dan Liggett, software cost entrepreneur.
Chapter 3.3 Mature Branching
- A premiere Lifelong Learning Institute (OLLI) peer learning networkhas many models for peer learning.
- “Saging and Aging” directs attention to opportunities that build on life experience and courses on any topic someone knows about.
- Carolyn Heilbrun, Columbia University professor and author of Kate Fansler mysteries sums up aging in “book Last Gift of Time”.
- Bumper Sticker Computer Science — I forgot why I use this lin , but it’s fun.
Notes for Section 4 “Nuclear Shadows”
Chapter 4.1 Getting Acquainted
- Los Alamos National Laboratory was site for visit and fictional tour.
- Wildfires 2011 threaten LANL.
- Example of a Wildfire app
Chapter 4.2 Dining On History
- security journalists Julia Angwin, now the Markup, author of “Dragnet Nation”.
- IBM Watson Success on Jeopardy used logic programming.
- “Mathematics Written on Sand” by W Kahan motivated floating point standards after exhibiting errors in scientific calculators.
- Parnas analysis of Reagan missile defense started discussion of software responsibility. Scott Rosenberg commentary explains the context.
- Risks digest of failures in computing starting in 1981 continues documentation and discussion.
- Usenet was the primary discussion support network before Web Time and later migrated into Google groups.
- Computer Professionals for Software Responsibility (CPSR) had advocated for social and military causes starting in the 1980s as described in Browsers give warnings and privacy errors here… Babbage Institute CPSR oral history by Severo Ornstein.
- Lynn Conway engineering research, and academic careers followed a transsexual path and contributed to VLSI Revolution (Wikipedia).
- Hopper on Letterman explaining her nanosecond and Navy tours of duty working on COBOL.
- women educator oral histories . Women and the Future of Computing, video by Anita Borghelped originate goals and institutes for women in computing, including the annual Grace Hopper event.
- Sputnik and the Eisenhower Administration and Sputnik beeps from JPL
- Televised software safety case, Therac 25, radiation deaths initiated the “software safety” field from Google Scholar.
- “Total information awareness” reaction to 9-11
- Bug bounty programs, such as Fire Fox offered new career opportunities. Computer History Museum Oxbridge
- unsure