SlideShare a Scribd company logo
Programming in the real world
A bit of history...
Ada Countess of Lovelace 
"enchantress! of numbers" 
! 
- b. 1815 
- algorithm for Bernoulli numbers 
!
The women of ENIAC 
- ENIAC = first digital computer (1945) 
- programmed using ~3000 switches
Radia Perlman 
"the mother of the internet" 
! 
- spanning tree protocol (1985)
3 reasons
You already know how to program 
- alarm clock, thermostat, TV
"Women lead in tech adoption" 
! 
- internet usage 
- mobile phone usage 
- every social network (except LinkedIn) 
- e-readers 
- health-care devices 
- GPS 
source: Intel research
It's not a guy's thing 
- it's a cultural thing 
"Programming requires patience and the ability to handle detail. 
Women are 'naturals' at programming"
It's not a guy's thing
It's not a guy's thing 
"Men were interested in building, the hardware, doing 
the circuits, figuring out the machinery. And women 
were very good mathematicians back then."
Best way to learn 
- find something you like to make 
- keep looking for that feeling

More Related Content

Viewers also liked

GNAT Pro User Day: Ada at Ansaldo STS
GNAT Pro User Day: Ada at Ansaldo STSGNAT Pro User Day: Ada at Ansaldo STS
GNAT Pro User Day: Ada at Ansaldo STS
AdaCore
 
GNAT Pro User Day: Ada Factory
GNAT Pro User Day: Ada FactoryGNAT Pro User Day: Ada Factory
GNAT Pro User Day: Ada Factory
AdaCore
 
GNAT Pro User Day: GNATdoc: Automatic Documentation Generator
GNAT Pro User Day: GNATdoc: Automatic Documentation GeneratorGNAT Pro User Day: GNATdoc: Automatic Documentation Generator
GNAT Pro User Day: GNATdoc: Automatic Documentation Generator
AdaCore
 
Ada Seminar — An Introduction to Ada
Ada Seminar — An Introduction to AdaAda Seminar — An Introduction to Ada
Ada Seminar — An Introduction to Ada
Adrian Hoe
 
Ada 2012
Ada 2012Ada 2012
Ada 2012
AdaCore
 
Euclid and his contribution in development of math
Euclid and his contribution in development of mathEuclid and his contribution in development of math
Euclid and his contribution in development of math
Akshay Kumar
 
Evolution of Programming Languages
Evolution of Programming LanguagesEvolution of Programming Languages
Evolution of Programming Languages
Sayanee Basu
 
Ada 2012
Ada 2012Ada 2012
Euclid project
Euclid projectEuclid project
Euclid project
Sreeja Santhosh
 
History of computer language
History of computer languageHistory of computer language
History of computer languageClaire Punkcor
 

Viewers also liked (11)

GNAT Pro User Day: Ada at Ansaldo STS
GNAT Pro User Day: Ada at Ansaldo STSGNAT Pro User Day: Ada at Ansaldo STS
GNAT Pro User Day: Ada at Ansaldo STS
 
GNAT Pro User Day: Ada Factory
GNAT Pro User Day: Ada FactoryGNAT Pro User Day: Ada Factory
GNAT Pro User Day: Ada Factory
 
GNAT Pro User Day: GNATdoc: Automatic Documentation Generator
GNAT Pro User Day: GNATdoc: Automatic Documentation GeneratorGNAT Pro User Day: GNATdoc: Automatic Documentation Generator
GNAT Pro User Day: GNATdoc: Automatic Documentation Generator
 
Ada Seminar — An Introduction to Ada
Ada Seminar — An Introduction to AdaAda Seminar — An Introduction to Ada
Ada Seminar — An Introduction to Ada
 
Ada 2012
Ada 2012Ada 2012
Ada 2012
 
Euclid and his contribution in development of math
Euclid and his contribution in development of mathEuclid and his contribution in development of math
Euclid and his contribution in development of math
 
High performance fibres
High performance fibresHigh performance fibres
High performance fibres
 
Evolution of Programming Languages
Evolution of Programming LanguagesEvolution of Programming Languages
Evolution of Programming Languages
 
Ada 2012
Ada 2012Ada 2012
Ada 2012
 
Euclid project
Euclid projectEuclid project
Euclid project
 
History of computer language
History of computer languageHistory of computer language
History of computer language
 

Similar to Rails Girls Cluj: Programming in the real world

Gitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in codingGitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in coding
laslorma
 
An Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s DayAn Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s Day
Kaitlin McAndrews
 
Intro IT.pdf
Intro IT.pdfIntro IT.pdf
Intro IT.pdf
ssuser536c36
 
Nerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in techNerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in tech
Hilary Stohs-Krause
 
L A1 I C Twk1
L A1  I C Twk1L A1  I C Twk1
L A1 I C Twk1Cma Mohd
 
Forgotten women in tech history.
Forgotten women in tech history.Forgotten women in tech history.
Forgotten women in tech history.
Domo
 
Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330
Stacy Gillett
 
Introduction to Machine Learning.pptx
Introduction to Machine Learning.pptxIntroduction to Machine Learning.pptx
Introduction to Machine Learning.pptx
sahimqazi
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
umardanjumamaiwada
 
lecture 1
lecture 1lecture 1
introduction to Computer system
introduction to Computer systemintroduction to Computer system
introduction to Computer system
umardanjumamaiwada
 
introduction to computer science
introduction to computer science introduction to computer science
introduction to computer science
umardanjumamaiwada
 
Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...
Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...
Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...
Farhan210146
 
History of IT
History of ITHistory of IT
Internet Literacy Project
Internet Literacy ProjectInternet Literacy Project
Internet Literacy ProjectBrennan Griffin
 
A History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareA History of Computer and Cyber Warfare
A History of Computer and Cyber Warfare
Bob Mayer
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
Froilan Cantillo
 
Lecture 1(Introduction to computer & History-Part1).ppt
Lecture 1(Introduction to computer & History-Part1).pptLecture 1(Introduction to computer & History-Part1).ppt
Lecture 1(Introduction to computer & History-Part1).ppt
EngrAbdusSamadKhan
 

Similar to Rails Girls Cluj: Programming in the real world (19)

Gitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in codingGitech 2019 the secret history of women in coding
Gitech 2019 the secret history of women in coding
 
An Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s DayAn Ode to the Leading Ladies of Technology, on International Women’s Day
An Ode to the Leading Ladies of Technology, on International Women’s Day
 
Intro IT.pdf
Intro IT.pdfIntro IT.pdf
Intro IT.pdf
 
Nerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in techNerd Nite Madison: The secret history of women and nonbinary folks in tech
Nerd Nite Madison: The secret history of women and nonbinary folks in tech
 
L A1 I C Twk1
L A1  I C Twk1L A1  I C Twk1
L A1 I C Twk1
 
Forgotten women in tech history.
Forgotten women in tech history.Forgotten women in tech history.
Forgotten women in tech history.
 
Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330Forgottenwomenintech slideshare-160223212330
Forgottenwomenintech slideshare-160223212330
 
Introduction to Machine Learning.pptx
Introduction to Machine Learning.pptxIntroduction to Machine Learning.pptx
Introduction to Machine Learning.pptx
 
Introduction to computer science
Introduction to computer scienceIntroduction to computer science
Introduction to computer science
 
lecture 1
lecture 1lecture 1
lecture 1
 
introduction to Computer system
introduction to Computer systemintroduction to Computer system
introduction to Computer system
 
introduction to computer science
introduction to computer science introduction to computer science
introduction to computer science
 
Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...
Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...
Earn unlimited with the help of IT Essentials and Data Recovery for Online Bu...
 
History of IT
History of ITHistory of IT
History of IT
 
Internet Literacy Project
Internet Literacy ProjectInternet Literacy Project
Internet Literacy Project
 
My lectures
My lecturesMy lectures
My lectures
 
A History of Computer and Cyber Warfare
A History of Computer and Cyber WarfareA History of Computer and Cyber Warfare
A History of Computer and Cyber Warfare
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
 
Lecture 1(Introduction to computer & History-Part1).ppt
Lecture 1(Introduction to computer & History-Part1).pptLecture 1(Introduction to computer & History-Part1).ppt
Lecture 1(Introduction to computer & History-Part1).ppt
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Rails Girls Cluj: Programming in the real world

  • 1. Programming in the real world
  • 2. A bit of history...
  • 3. Ada Countess of Lovelace "enchantress! of numbers" ! - b. 1815 - algorithm for Bernoulli numbers !
  • 4. The women of ENIAC - ENIAC = first digital computer (1945) - programmed using ~3000 switches
  • 5. Radia Perlman "the mother of the internet" ! - spanning tree protocol (1985)
  • 7. You already know how to program - alarm clock, thermostat, TV
  • 8. "Women lead in tech adoption" ! - internet usage - mobile phone usage - every social network (except LinkedIn) - e-readers - health-care devices - GPS source: Intel research
  • 9. It's not a guy's thing - it's a cultural thing "Programming requires patience and the ability to handle detail. Women are 'naturals' at programming"
  • 10. It's not a guy's thing
  • 11. It's not a guy's thing "Men were interested in building, the hardware, doing the circuits, figuring out the machinery. And women were very good mathematicians back then."
  • 12. Best way to learn - find something you like to make - keep looking for that feeling