Skip to main content

Brave Girls in ICT: Inspiring Stories and Endless Possibilities



In a world where opportunities for women in technology were scarce, a trailblazing heroine named Ada Lovelace emerged. Born in the 19th century, Ada defied societal norms and dared to explore the computing world. Working alongside Charles Babbage, she crafted the world's first computer program, setting the stage for the future digital revolution.

In the next chapter of this inspiring saga, we meet the indomitable Grace Hopper, a woman who held her ground in a male-dominated field. A United States Navy rear admiral and computer scientist, Grace developed the first compiler and significantly contributed to the COBOL programming language. Her perseverance and dedication continue to inspire women in computer science to this day.

As the story unfolds, we encounter the remarkable Dr Erna Schneider Hoover, who revolutionized telecommunications with her groundbreaking invention of the computerized telephone switching system. Her innovative spirit and determination paved the way for the modern telecommunications systems we rely on today.

Our narrative would not be complete without the tale of Margaret Hamilton, who led the team that developed the onboard flight software for NASA's Apollo missions. Her outstanding work ensured the success of the historic Apollo 11 moon landing and laid the foundation for modern software engineering practices.

These brave women have shown us that girls in ICT can make a significant difference in the world. They serve as shining examples for the next generation of girls, proving that anything is possible if they are willing to break through barriers and pursue their dreams.

The world needs more girls in ICT, not only to promote diversity and inclusion but also to contribute to ICT. ICT offers flexibility and the chance to make a meaningful impact on society through technological advancements.

So, on International Girls in ICT Day, we celebrate the brave girls who have come before us and encourage those who are just beginning their journey. Remember that your courage, determination, and passion for technology can lead to a bright future in ICT. Embrace your potential and know that the world is waiting for the incredible contributions you can make. 

Together, let's continue to write the story of girls in ICT, one inspiring chapter at a time. I salute all the girls in ICT who are making an impact in this world through the most obvious superpower humans have come to know. Yes, technology is like a superpower. We are the only generation who can click a button and impact billions. 

Comments

Popular posts from this blog

Dhivehi to English translation with Microsoft translator

  The Dhivehi language translation feature included in Microsoft translator and Microsoft 365 lets you press a button and translate written Dhivehi into English. Though there are a few hiccups here and there, the service is great and provides an understanding of the overall document. This is more than what we see from any existing models. I was amazed to see a link in one of my outlook web emails, it says “translate message to: English” which could mean nothing usually, however, when I saw the next sentence which said “Never translate from: Divehi”, I thought why would it says Divehi specifically if it doesn’t understand that the entire email was written in Dhivehi? Out of curiosity, I pressed the button, and to my surprise, it was quite good. The essence of the message was retained very well. For example, something like އިޙްތިރާމް ޤަބޫލުކުރެއްވުން އެދެން could be translated as “ I would like to respect you ”, which is ok in terms of translation, but what it meant was greeti...

Fortifying Cybersecurity: A NIST CSF Perspective on Zero Trust and Passkeys

Cybersecurity is like protecting a fortress from invaders. Traditionally, we built strong walls around our castle, trusting those inside and keeping potential threats outside. But in today's digital world, threats can come from within and outside, making traditional defences inadequate. This is where the concept of zero trust comes in. What is Zero Trust? Imagine your home. You don't blindly trust everyone who walks in, right? You might ask for identification or make sure they have a reason to be there. Zero trust is similar. It means not automatically trusting anyone or anything trying to access your digital "home" (like your network or data). Instead, it's about constantly verifying and monitoring every access attempt, regardless of where it comes from. Why Zero Trust Matters: Zero trust addresses three key goals in cybersecurity, often called the CIA triad: Confidentiality : Just like you wouldn't want strangers snooping through your person...

Why Understanding Your Risks is Your Best Cyber Defence

  In today's digital age, headlines blare about "unprecedented data breaches" and "nation-state cyberattacks." It's easy to feel overwhelmed by the ever-evolving cyber threat landscape, where sophisticated zero-day exploits can bypass even the most fortified defences. But amidst this complexity, a fundamental truth remains: effective cybersecurity starts with understanding your risks. As Bruce Schneier stated, "Security is not a product, but a process." Just as a military commander wouldn't enter battle without understanding the terrain and potential threats, organizations must grasp the digital landscape in which they operate. Imagine a battlefield shrouded in thick fog. You wouldn't blindly charge ahead, would you? Risk assessment is akin to possessing a high-powered thermal sight, piercing the fog to reveal the hidden dangers lurking in the digital landscape. It's a systematic process of identifying your organization's critical a...