#police radio encryption algorithm
Explore tagged Tumblr posts
mudwerks · 2 years ago
Photo
Tumblr media
(via Researchers find deliberate backdoor in police radio encryption algorithm | Ars Technica)
why you don’t have security in tech if you have a backdoor 
[attn: lawmakers]
12 notes · View notes
unclegrumbles · 14 days ago
Text
Tumblr media
ULTIMATE DANNY PHANTOM
TUCKER FOLEY
Tucker had his nose buried in his phone before it was cool. Beyond gaming, he loves tinkering with his many gadgets to find new and creative ways to optimize them. Having access to the spare parts bin from the Fentons' laboratory grants Tucker a veritable buffet of tech to play with. Using their old tech, Tucker created his beloved PDA. Hidden beneath its standard functions is an encryption-cracking algorithm Tucker developed himself, capable of hacking into the most secure computers in town. Once Danny got his powers, Tucker began upgrading a special backpack with even more FentonWorks tech to aid in ghost hunting. Tucker's "Battlepack" contains a powerful, compact radio receiver linked to his PDA which allows him to tap into police radio comms and the FentonWorks' satnav ghost radar. It also includes a link port compatible with Fenton Thermoses, allowing Danny and the team to inspect certain traits of captured ghosts. An integrated Fenton powerbank can charge up all manner of devices, from phones to Fenton Thermoses and beyond. While Tucker takes pride in his role as the team's tech guy, he harbors some jealousy over Danny getting superpowers. That doesn't stop him from being Danny's closest, most reliable and loyal friend.
Powers and Abilities
Multitasking: Heavy is the head that wears the crown. As the self-described brains of the operation, Tucker is thusly saddled with the responsibility to handle more of the complex strategizing that comes with ghost hunting. After all, one does not simply hunt a ghost on a school night. Tucker takes on the task of checking weather, traffic, security, and even variables like public transportation and community events while coordinating with the rest of Team Phantom during a hunt. Tucker's obsession with data and details often prevents him from seeing the bigger picture.
PDA: While Tucker is too insecure to realize or admit it, the PDA he created is practically a superpower of its own. The encryption-cracking algorithm he created is based on a primitive program found in a discarded FentonWorks hard drive, but Tucker's skill with tech advanced the program far beyond its original state. By plugging into any computer linked to a network, Tucker can gain full access to all of its protected files. At the time of its creation, WiFi was still in its infancy. Regardless, Tucker integrated state-of-the-art WiFi tech into his PDA, allowing it to remotely interface with networked devices. Tucker can coordinate nearly all of Team Phantom's operations from the little machine.
Gamerℱ: Tucker, like Danny, is a proud member of the PC master race. Tucker has one of the best rigs in town, built with his own two hands, and has poured countless hours into late nights playing DOOMED with Danny. Once word slipped that Sam was one of the best gamers in their group, Tucker made it his life's mission to beat her high score in Superman 64, or die trying.
Confidence: Despite his very nerdy interests, Tucker oozes self-confidence. That translates well when talking to peers and adults alike. When Danny needs a pep-talk (that doesn't involve screaming from Sam), he goes to Tucker for wise words of encouragement.
---
Tucker is immensely proud of this encryption-cracking algorithm, but recently it's given him cause for concern. During routine maintenance he'll sometimes discover lines of code that he didn't write. Other times the algorithm diagnostic log shows encryption-cracking attempts that he didn't initiate. It's almost as if the algorithm has taken on a life of its own...
12 notes · View notes
ctrl-salt-delete · 2 years ago
Text
honestly extremely funny for cops (who have, as a group, been clamoring for a backdoor into encrypted communications) to have their encryption intentionally weakened
4 notes · View notes
cyber-sec · 2 years ago
Text
Researchers find deliberate backdoor in police radio encryption algorithm
Tumblr media
Source: https://arstechnica.com/security/2023/07/researchers-find-deliberate-backdoor-in-police-radio-encryption-algorithm/
More info: https://www.tetraburst.com/
2 notes · View notes
kenresearch2023 · 2 years ago
Text
The US Two-Way Radio Market responds to the growth curve with a CAGR of 7% by 2028: Ken Research
Buy Now
The US Two-Way Radio Market is a heavily segmented market, divided among type, end-user industry, frequency level and geographic region. This industry provides the communication sectors in check in heavy duty companies.
STORY OUTLINE
With the intent of enhancing industrial and public safety, the US Two-Way Radio market strives to improve its performance.
With the advent of technological improvement and remote work adaptation, it became the driving pace for the US two-way radio market.
The rise in critical threats is greatly influenced the two-way radio market in US to strengthen themselves.
Military and ‘Natural disaster prevention’ investments are paving the growth of the market. With the intent of enhancing industrial and public safety, the US Two-Way Radio market strives for better performance.
Tumblr media
Top Captive Players in US Two-Ways Radio Market
1. With the intent of enhancing industrial and public safety, the US Two-Way Radio market strives for better performance.
Tumblr media
Interested to Know More about this Report, Request for a sample report
The two-way radio market is making its infrastructure with better software and hardware experts to improve their designs.
The improved version is already in use with the advent of making high-end radios, for seamless audio transmission for security purposes.
5G chips are being installed in the improved version, which would lower their latency, increase data-rates and improve their coverage.
With focus on public safety, two-way radio is increased in connections, making them connect to multiple sources.
According to Ken Research, the US Two-Way Radio Market is an important market for various vital uses ranging from general awareness to Natural Disasters. With the improvements in technologies, high-end transmitters and receivers make these radios more useful by reducing latency and increasing coverage, providing audio transmission in a streamline fashion. This market is forwarding its growth steadily and gradually, with a projected CAGR of ~7% by the year 2028.
2. With the advent of technological improvement and remote work-adaptation, it became the driving pace for the US two-way radio market.
Visit this Link :- Request for custom report
The two-way radios at present are fitted with enhanced speakers and transmitters, to enhance their coverage and give a 30% rise in quality sound.
“Enhanced noise cancellation” from well-built speakers allows for the correct information to be conveyed, saving many from peril.
A modulated transmitter and an updated trans-receiver allow for an increase in high-quality audio to be transmitted and received.
With harder body, two-way radios are able to withstand harsh environment (cold or heat) leading to an increase in coverage even in unsuitable places.
3. The rise in critical threats is greatly influenced the two-way radio market in US to strengthen themselves.
Request a Call with Expert to know more about the business model
The Terrestrial Trunked Radio (TETRA) is the strongest police radio communication, being used over 100 nations globally.
Critical and high threats such as CVE-2022-24401 and CVE-2022-24404 respectively, posed a threat in loss of authenticity and personal details.
Improvement in the TETRA Authentication Algorithm (TAA1) and TETRA Encryption Algorithm (TEA1), has minimized the threats persisting earlier.
The threats were discovered by MIDNIGHT BLUES, funded by the NLnet as the EU NGIO PET fund, using reverse engineering the TAA1 and TEA1.
4. Military and Natural disaster prevention investments are paving the growth of the market.
Tumblr media
Motorola Solutions Inc. Market Share
The Land Mobile Radio, a Motorola initiative, is essentially for mission critical areas, preventing loss of information and better military communication.
With Motorola Over the Air Programming (OATP), the two-way radios are easily being accessed and updated remotely in a fluid manner.
With streamline long distance communication, Very High Frequency (VHF)/Ultra High Frequency (UHF) two-way radios are used for Natural Disaster preparedness, emitting faster audio transmission.
Since operating on separate battery, power outage cannot stop this kind of two-way radios, making them able to transmit even in a blackout.
With high encryption as security, and basic user-friendly database, this allows common people to use them as well during a disaster.
CONCLUSION
The US Two-Way Radio Market is an important division for the regions, as it handles most of the transmissions going on for multiple purposes, leading to further proceeding of various processes. Mostly Government and Military services are required in this sector, but due to the sudden global change, a keen observation on Natural disasters are to be kept as well. With long distance and short distance radios now operational the US two-way radios market is striving with improved potential.
0 notes
yessadirichards · 5 years ago
Photo
Tumblr media
The U.S. vs. China: Who Is Winning the Key Technology Battles?
China leads in 5G, but the U.S. has an edge in other crucial niches—for now
In a world where geopolitical power is increasingly linked to technological advancement, the U.S. has long led its rivals. American companies make some of the world's fastest computers, deadliest jet fighters and most capable robots.
But China's growing economy--now the world's second largest--and huge government investments in technologies are eating away at that edge like never before.
Such progress has spurred President Trump's all-out trade and economic battle with Beijing, encompassing tariffs, export controls and a crackdown on Chinese scientists allegedly stealing American companies' secrets.
It's not clear yet how the economic devastation wrought by the coronavirus will change the rivalry, but one thing is certain: The disease hasn't done much to cool tensions. The Trump administration is weighing new curbs designed to hamper China's ability to make leading-edge semiconductors, according to people familiar with the matter. The chairman of Chinese telecom giant Huawei Technologies Co. warned last month that Beijing would impose its own restrictions if the U.S. moves forward with that plan.
The most visible technological battle has been over 5G, the superfast cellular networks that promise to be the foundation for tomorrow's technologies. The U.S. government has taken extraordinary measures to try to thwart Huawei, the cellular-technology leader that Washington considers a cybersecurity threat.
The battle has also extended to other technologies that, like 5G, are not life-altering today but could transform how we live, work and fight wars in the not-so-distant future. Artificial intelligence is often touted as the linchpin of a new industrial revolution, with applications such as augmented reality and remote surgery. Quantum computing could help discover new drugs and decipher encrypted data once thought uncrackable. Autonomous vehicles could fundamentally revamp our transportation systems and infrastructure and the way we all get around. Advanced computer chips act as digital brains that orchestrate it all.
Here is how the technology battle between the U.S. and China is shaping up in some of the most important areas of innovation.
5G
Attorney General William Barr made it clear where the U.S. stood in 5G in February by suggesting that Washington and its allies should consider taking a financial interest in Huawei rivals Nokia Corp. and Ericsson AB. Both are based in Europe.
The White House later dismissed the idea of buying either company, but Mr. Barr's remarks still emphasized how there is no American giant to challenge Huawei, the world's biggest maker of telecom equipment, such as the radio hardware that hangs on cellular towers.
After bad bets, what remained of onetime American champions Lucent and Motorola were acquired by Finland's Nokia and Sweden's Ericsson. They in turn have gone through layoffs and unprofitability while competing with Huawei, which gained nearly the combined market share of its European rivals via its cutting-edge products and low prices.
The U.S. has some 5G players. Cisco Systems Inc. is the largest maker of the behind-the-scenes routers and switches that connect to cellular equipment. Qualcomm Inc. and InterDigital Inc. are leading intellectual-property companies earning royalties for cellular-technology patents.
But those markets are comparatively small, and Huawei is a player in both. And more than 60% of a wireless carrier's 5G capital expenditures could go to cellular equipment, such as radios, a market Huawei leads. "All the money is in radio," says Dimitris Mavrakis, 5G research director at market-advisory firm ABI Research.
Huawei's technologically advanced cellular equipment, and its ability to churn it out quickly, helped China quickly roll out 5G, turning much of the nation into a potential lab for 5G-dependent technology, such as self-driving cars. Meanwhile, airwave restrictions have slowed the construction of U.S. 5G networks.
Still, it would be premature to declare China the winner in the 5G race, especially since Washington has further tools to slow Huawei's dominance in both the cellular-equipment industry and smartphone business, in which it is also a global leader.
"Federal agencies in Washington are currently debating whether and how to tighten sanctions on Huawei," says Dan Wang, a Beijing-based technology analyst at research firm Gavekal Dragonomics. "If they do, then Huawei's operations will be disrupted in major ways, such that it may have difficulty making smartphones and 5G equipment."
Edge goes to: China
Artificial intelligence
Three years ago, Beijing declared its intention to be the world leader in AI by 2030, envisioning a domestic industry alone worth some $150 billion.
China's publicly traded tech giants, including Alibaba Group Holding Ltd. and Baidu Inc., have plowed billions of dollars into AI research and set up labs in China and Silicon Valley, taking advantage of the latter's openness. That has made them juggernauts, outshining global rivals in areas including e-commerce algorithms and facial recognition. China's huge population, surveillance infrastructure and more lax attitude on privacy rights generate huge volumes of data, which produces ever-smarter AI.
But while China may contribute more AI research and be ahead in some important subsets of AI, like facial recognition, it's not ahead in all of them. And when it comes to research into artificial general intelligence, or AI with broader, humanlike thinking abilities, the large U.S. companies-- Microsoft Corp., Alphabet Inc.'s Google and others--are clearly leading, says Paul Triolo, an analyst at political-risk consulting firm Eurasia Group. American tech giants have untold amounts of money to spend on AI, which they're using in recommendation engines, targeted advertising and automatic filtering of obscene or otherwise banned pictures and videos, among other areas. Some also sell AI services, letting companies, governments and police departments tap into the power of their algorithms.
The U.S. produces some of the world's best AI research and talent because of its combination of leading universities, deep-pocketed tech companies and an openness to ideas and people from across the globe--areas where the U.S. has a sustainable advantage, at least in the medium term. Not shutting down academic and commercial exchanges with Canadian, European, Israeli and even Chinese experts is crucial for the U.S. to maintain the advantages it has, Mr. Triolo says.
"In some sense the AI industry is still in its infancy, and many are contributing to its growth and maturity," he says. "This may be more important than the level of funding in determining the success of U.S. companies in leveraging AI in new and important sectors like autonomous driving and health care."
Edge goes to: U.S., but it's close.
Quantum Computing
Unlike today's computers, which use streams of ones and zeros to encode data, quantum computers use atom-scale quirks that allow particles to exist in more than two states. That added complexity gives them the ability to process more information more quickly, potentially far exceeding the power of supercomputers.
Harnessing that potential will probably take a decade or more. Today's quantum computers have a relatively small number of quantum bits, or qubits, with which to make calculations. It will not be easy to get to the point where there's enough of them to perform hard calculations quickly.
Because quantum computers eventually could be powerful enough to defeat current methods of encryption and run complex simulations to discover new drugs, the field has attracted a groundswell of investment from private capital sources and governments.
The U.S. is the clear world leader in the construction of quantum computers. Google last year claimed its 54-qubit machine, which excels at measuring probabilities in randomly outputted numbers, achieved "quantum supremacy," making a calculation that wasn't possible--or, at least, not practical--on a classical computer. International Business Machines Corp., another American company that has a quantum computer rivaling Google's, disputed that result, saying the calculation actually could be performed with a supercomputer in a reasonable amount of time. Chinese scientists have built quantum computers, but analysts say they're years behind the U.S.
Quantum technology, however, goes beyond computers and extends into using quantum properties to communicate quickly and securely. That's where China may have the advantage. Led by Pan Jian-Wei, dubbed China's "father of quantum," the country has pushed the envelope in quantum communications, sensors and radar--all areas with possible military applications. The country in 2016 launched a satellite, called Micius, that uses photon beams in a quantum state that makes transmissions impervious to interception. It's building a huge quantum-information-sciences lab in east China, a project with a $10 billion price tag.
So the scorecard is split: The U.S. leads in quantum computing, and China leads in quantum communications and encryption. The future is hard to forecast because advances that will shape the field are likely still decades off, says Elsa Kania, a researcher at the Center for a New American Security, a think tank based in Washington, D.C.
"We're at a relatively early stage of what I think can be more accurately characterized as a marathon," she says.
Edge goes to: U.S. in quantum computing, China in quantum communications
Semiconductors
China has spent tens of billions of dollars over decades trying to get a leg up in semiconductors, essential ingredients in the race for faster computers and smartphones and more-sophisticated weaponry. Statistics from the Semiconductor Industry Association, based in Washington, D.C., suggest U.S. exports of chips to China have stayed around the same level for years, and that Chinese companies haven't gained tremendous market share, even domestically. About 47.5% of chips sold in China were American as of 2018, according to SIA figures.
China's neighbors have made a prominent place for themselves in the global semiconductor supply chain, with South Korea's Samsung Electronics Co. becoming a dominant smartphone and chip supplier and Taiwan Semiconductor Manufacturing Co. becoming the world's largest contract chip manufacturer.
That's a model that China could never seem to replicate. The country's leading chip maker, Semiconductor Manufacturing International Corp., isn't able to produce the most cutting-edge chips with the smallest transistors. Some estimates suggest China is five to seven years behind the U.S. and Taiwan on chip technology, but it may take longer for China to catch up because cutting-edge chips are a moving target. By the time China is able to make chips that compete with the best available today, the rest of the industry will likely have taken another leap ahead.
That said, China has surprised U.S. officials by replacing American chips in many of its companies' electronic devices with a combination of domestic chips and ones sourced from non-U.S. companies. Huawei's newest phablets, launched last year, didn't include any U.S. chips, according to a teardown of the devices commissioned by the investment bank UBS.
For the short term, China's semiconductor strategy is focused on reducing reliance on the U.S., which often means finding other non-Chinese substitutes. In the long term, though, many industry observers think it's a matter of when, not if, China's huge investments in chip making finally pay off.
"If you're willing to spend billions of dollars for dozens of years, eventually you'll get there," says Jim Lewis, a senior vice president at the Center for Strategic and International Studies, a Washington, D.C., think tank.
Edge goes to: U.S.
Autonomous vehicles
Silicon Valley businesses such as Google's Waymo and General Motors Co.'s Cruise got a head start on testing driverless-car technology, helping give U.S. companies the early lead in sensor hardware, such as the cameras and radar needed to detect obstacles on the road. And the U.S. dominance of the semiconductor industry gives American companies the edge in making the chips that will essentially be the brains of such vehicles.
Chinese companies were two to three years behind international rivals in the important capabilities needed for self-driving cars, McKinsey & Co. said in a report last year.
But in the long term, China is poised to come out ahead. It is already the world's biggest car market, and the country's regulatory environment--such as restrictions on accessing maps on national-security grounds, as well as requiring foreign companies to partner with local ones--favors domestic champions trying to win the market there, which include Baidu, Didi Chuxing Technology Co. and Pony.ai. "It will be difficult for American companies to be competitive," says Nikolaj Herskind, of Scandinavian consulting firm Qvartz.
China's huge population will give Chinese companies more data they can use to refine autonomous-vehicle technology. It also helps that the Chinese are more willing to try self-driving cars. While 48% of Americans said in a 2020 Deloitte survey that they thought autonomous vehicles were unsafe, only 35% of Chinese respondents thought the same thing.
China's lead in 5G infrastructure means its car companies can test, in real-world conditions, how the wireless technology can be used to beam map and traffic data to cars, or even remotely control vehicles in some situations.
But given how governments intensely regulate self-driving car tests and technology, says Andrey Berdichevskiy, director of Deloitte's Future of Mobility Solution Center, the most likely outcome of the autonomous-vehicle technology race is a bifurcated world--similar to how the U.S. and China are developing their own ecosystems for other hardware and software.
"I expect U.S. and Chinese players to first become successful in their home markets, but regulations and consumer perception makes it harder for either side to flourish on the other's territory without a local partner," Mr. Berdichevskiy says.
The edge goes to: U.S., for now.
0 notes
neptunecreek · 5 years ago
Text
Researchers Targeting AI Bias, Sex Worker Advocate, and Global Internet Freedom Community Honored at EFF’s Pioneer Award Ceremony
Virtual Ceremony October 15 to Honor Joy Buolamwini, Dr. Timnit Gebru, and Deborah Raji; Danielle Blunt; and the Open Technology Fund (OTF) Community
San Francisco – The Electronic Frontier Foundation (EFF) is honored to announce the 2020 Barlow recipients at its Pioneer Award Ceremony: artificial intelligence and racial bias experts Joy Buolamwini, Dr. Timnit Gebru, and Deborah Raji; sex worker activist and tech policy and content moderation researcher Danielle Blunt; and the global Internet freedom organization Open Technology Fund (OTF) and its community.
The virtual ceremony will be held October 15 from 5:30 pm to 7 pm PT. The keynote speaker for this year’s ceremony will be Cyrus Farivar, a longtime technology investigative reporter, author, and radio producer. The event will stream live and free on Twitch, YouTube, Facebook, and Twitter, and audience members are encouraged to give a $10 suggested donation. EFF is supported by small donors around the world and you can become an official member at https://eff.org/PAC-join.
Joy Buolamwini, Dr. Timit Gebru, and Deborah Raji’s trailblazing academic research on race and gender bias in facial analysis technology laid the groundwork for a national movement—and a growing number of legislative victories—aimed at banning law enforcement’s use of flawed and overbroad face surveillance in American cities. The trio collaborated on the Gender Shades series of papers based on Buolamwini’s MIT thesis, revealing alarming bias in AI services from companies like Microsoft, IBM, and Amazon. Their subsequent internal and external advocacy spans Stanford, University of Toronto, Black in AI, Project Include, and the Algorithmic Justice League. Buolamwini, Gebru, and Raji are bringing light to the profound impact of face recognition technologies on communities of color, personal privacy and free expression, and the fundamental freedom to go about our lives without having our movements and associations covertly monitored and analyzed.
Danielle Blunt is one of the co-founders of Hacking//Hustling, a collective of sex workers and accomplices working at the intersection of tech and social justice to interrupt state surveillance and violence facilitated by technology. A professional NYC-based Femdom and Dominatrix, Blunt researches sex work and equitable access to technology from a public health perspective. She is one of the lead researchers of Hacking//Hustling's “Erased: The Impact of FOSTA-SESTA and the Removal of Backpage” and “Posting to the Void: CDA 230, Censorship, and Content Moderation,” studying the impact of content moderation on the movement work of sex workers and activists. She is also leading organizing efforts around sex worker opposition to the EARN IT Act, which threatens access to encrypted communications, a tool that many in the sex industry rely on for harm reduction, and would also increase platform policing of sex workers and queer and trans youth. Blunt is on the advisory board of Berkman Klein's Initiative for a Representative First Amendment (IfRFA) and the Surveillance Technology Oversight Project in NYC. She enjoys redistributing money from institutions, watching her community thrive, and “making men cry.”
The Open Technology Fund (OTF) has fostered a global community and provided support—both monetary and in-kind—to more than 400 projects that seek to combat censorship and repressive surveillance. The OTF community has helped more than two billion people in over 60 countries access the open Internet more safely and advocate for democracy. OTF earned trust and built community through its open source ethos, transparency, and a commitment to independence from its funder, the U.S. Agency for Global Media (USAGM), and helped fund several technical projects at EFF. However, President Trump recently installed a new CEO for USAGM, who immediately sought to replace OTF's leadership and board and to freeze the organization's funds—threatening to leave many well-established global freedom tools, their users, and their developers in the lurch. Since then, OTF has made some progress in regaining control, but it remains at risk and, as of this writing, USAGM is still withholding critical funding. With this award, EFF is honoring the entire OTF community for their hard work and dedication to global Internet freedom and recognizing the need to protect this community and ensure its survival despite the current political attacks.
“One of EFF’s guiding principles is that technology should enhance our rights and freedoms instead of undermining them,” said EFF Executive Director Cindy Cohn. “All our honorees this year are on the front lines if this important work—striving to ensure that no matter where you are from, what you look like, or what you do for a living, the technology you rely on makes your life better and not worse. While most technology is here to stay, a technological dystopia is not inevitable. Used thoughtfully, and supported by the right laws and policies, technology can and will make the world better. We are so proud that all of our honorees are joining us to fight for this together.”
Awarded every year since 1992, EFF’s Pioneer Award Ceremony recognize the leaders who are extending freedom and innovation on the electronic frontier. Previous honorees have included Malkia Cyril, William Gibson, danah boyd, Aaron Swartz, and Chelsea Manning. Sponsors of the 2020 Pioneer Award ceremony include Dropbox; Ridder, Costa, and Johnstone LLP; and Ron Reed.
To attend the virtual Pioneer Awards ceremony: https://eff.org/PAC-register For more on the Pioneer Award ceremony: https://www.eff.org/awards/pioneer/2020
Contact: 
Rebecca
Jeschke
Media Relations Director and Digital Rights Analyst
from Deeplinks https://ift.tt/3khJiKc
0 notes
mcdouglecompany-blog · 6 years ago
Text
The Left’s Leadership Infiltrates Big Tech, Stealing the Next Election, U.S. Social Credit, Hong Kong Battles Big Brother and The Healthcare CURE that Works!
The Left’s Leadership Infiltrates Big Tech, Stealing the Next Election, U.S. Social Credit, Hong Kong Battles Big Brother and The Healthcare CURE that Works!
  Here's how big tech and progressive Democrats are working together to sway the next election.
GOODBYE FREEDOM: Silicon Valley, big tech wants social credit system in US.
Hong Kong Protesters Combat the Surveillance State
Author Sean Flynn and The Healthcare CURE that Works!
  Here's how big tech and progressive Democrats are working together to sway the next election.
https://youtu.be/H17xnHxLDZY
Glenn Beck
Have you noticed how the DNC doesn't seem at all concerned about the 2020 election, even though the Democratic candidates are pushing policies that are even too radical for the left? Why would they do that if they're trying to win the hearts and minds of Americans? A website called Spinquark just released a chilling article that reveals exactly how many people who are directly connected to the progressive political machine are now working for big tech to control our conversations online — and they're unquestionably interfering with the 2020 election. â–ș Click HERE to subscribe to Glenn Beck https://bit.ly/2UVLqhL â–ș Click HERE to subscribe to BlazeTV: https://www.blazetv.com/glenn Connect with Glenn on Social Media: http://twitter.com/glennbeck http://instagram.com/glennbeck http://facebook.com/glennbeck
    GOODBYE FREEDOM: Silicon Valley, big tech wants social credit system in US.
https://youtu.be/Ct13zVU2oGM
Glenn Beck
Glenn reads a white paper report from Penn State professor Larry Backer, showing exactly why leaders and scientists in Silicon Valley support socialism. The report details why the Western world needs to create a "narrative" that shifts law away from the Constitution and towards human algorithms, all with a social credit system as the end goal. Big tech wants you to give up any privacy you currently have, and it's already started with the Google Homes, Apple Watch, and more.
 â–ș Click HERE to subscribe to Glenn Beck https://bit.ly/2UVLqhL â–șClick HERE to subscribe to BlazeTV: https://www.blazetv.com/glenn Connect with Glenn on Social Media: http://twitter.com/glennbeck http://instagram.com/glennbeck http://facebook.com/glennbeck
    Hong Kong Protesters Combat the Surveillance State
https://youtu.be/VXog6t4kNyc
ReasonTV
Encryption, other privacy measures, and decentralization have made the protest movement possible. ------------------ A major priority of the protest movement that has consumed Hong Kong for the past three and a half months has been to thwart the surveillance apparatus that's virtually everywhere. Demonstrators have felled camera poles with chainsaws, spray-painted security camera lenses, used green lasers to destroy sensors, and shielded themselves with umbrellas while marching through the streets. "I think there a growing concern [in Hong Kong] about surveillance, and this [is] totally understandable because there's a total lack of trust in the government with this whole saga over the last several months," says Charles Mok, a legislator representing the city's technology sector. Though Hong Kong is politically autonomous under the "one country, two systems" model, local authorities have wired up the city, enabling them to keep an eye on every corner of public life—and protesters suspect they may be sharing that information with the Chinese government. Hong Kong officials deny that cameras on the top of the city's so-called Smart Lampposts  feed location or facial recognition data to Beijing, but that may be a lie. Activists with the political organization Demosisto analyzed the internal components of one of these cameras and found an ethernet switch that could conceivably connect to the mainland's surveillance network. They also found components inside that were manufactured by a known supplier of surveillance technology to the Chinese government. Many demonstrators use virtual private networks, or VPNs, to access the internet, and they communicate through Telegram, which fully encrypts their messages. "Without safe communication, I don't think this revolution [could] last for that long," says Wincent Hung, founder of Genesis Block, a Hong Kong–based cryptocurrency exchange. "The government [could] track down everybody very, very easily if there [were] no encryption in this revolution." Demonstrators are also refraining from using their credit cards or the digital payments system Octopus, which is an option in Hong Kong's public transit system and most stores. "People are quite wary about cybersecurity and their digital footprints," says Amon Liu, an activist with Demosisto. "All their personal information [have been used] for past prosecutions by the police. So that's why they use cash this time." To discuss strategy, demonstrators use LIHKG, a social media site that allows anonymous posting and is known as the Reddit of Hong Kong. They've also created decentralized networks for sharing information through AirDrop, a function on the iPhone that transfers data directly to another person via Bluetooth without a third-party intermediary. "This is a movement that is totally leaderless and decentralized," says Denise Ho, a Hong Kong–based singer and pro-democracy activist. "[Youth activists] have used
the tools on the Internet to really find a newer way to organize this sort of movement and to really sustain it in the longer term."  The protest movement's unofficial motto is "be water," a Bruce Lee phrase that's meant to convey that in battle, a more fluid and malleable adversary is harder to stop. A major factor motivating the protesters in their fight to maintain autonomy from mainland China is the surveillance apparatus that the Beijing government imposes on its own citizens. Under the "social credit system," for example, individuals are rated for good behavior and a bad score can impede their ability to travel, attend the best schools, or get hired for the best jobs. The Hong Kong government has stopped answering protesters' demands, and the conflict grew more acrimonious on October 1, after a police officer shot and injured an 18-year-old demonstrator who had attempted to hit him with a rod. Last week, the government announced a ban on wearing face masks in the streets. "It has escalated to a point where people are realizing what we need is a political reform in the whole Hong Kong legislative system," says Ho. "And also, of course, the communist government is not backing down either. So we are preparing ourselves for an even longer fight." Subscribe to our YouTube channel: http://youtube.com/reasontv Like us on Facebook: https://www.facebook.com/Reason.Magaz... Follow us on Twitter: https://twitter.com/reason Subscribe to our podcast at Apple Podcasts: https://goo.gl/az3a7a Reason is the planet's leading source of news, politics, and culture from a libertarian perspective. Go to reason.com for a point of view you won't get from legacy media and old left-right opinion magazines.
    Author Sean Flynn and The Healthcare CURE that Works!
https://youtu.be/UAqrsAWVe-c
The Zandbergen Report
Source: https://www.podbean.com/eau/pb-x9mzx-... Letitia Berbaum was back in the studio with a very special guest, Sean Flynn. Sean is the author of the best selling book, Economics for Dummies, and is also an Economics Professor at Scripps College. Sean's candid take on our nation's healthcare state, combined with his extensive economic background set the stage for a lively conversation complete with facts, figures and policy truths that will have you saying, that can't be true!  In the episode you'll gain access to: -Current statistics relating to our national healthcare system and the impact they have on our finances -An understanding of how other countries like Singapore approach healthcare and how they see benefits from it -How a company like Whole Foods can create an enhanced culture and have a great impact on their employees through their unique approach to employee healthcare benefits. Sean Flynn just released his latest book, The Cure That Works, which dives deeper into the above topics. His book can be found on Amazon here. The Zandbergen Report, where wealth strategies and investment wisdom collide, is led by host Bart Zandbergen, and is LIVE every Tuesday at 2pm on OC Talk Radio. The show is also available on iTunes, iHeartRadio, Spotify and Stitcher. Interested in being a guest on The Zandbergen Report? Email [email protected]. Learn more about Bart by visiting www.BartZandbergen.com
  -------------------------------------------------------------------- 
HELP ACU SPREAD THE WORD!
Please send to friends, post on Facebook, twitter, etc

Over 3,000 commercial free archived shows are available on our podcast site here.  
  Ways to subscribe to the American Conservative University Podcast
Click here to subscribe via iTunes
Click here to subscribe via RSS
You can also subscribe via Stitcher
You can also subscribe via SoundCloud
If you like this episode head on over to iTunes and kindly leave us a rating, a review and subscribe! People find us through our good reviews.
  FEEDBACK + PROMOTION
You can ask your questions, make comments, submit ideas for shows and lots more. Let your voice be heard.
Download our FREE iOS App.
Download our FREE Android App.
Email us at americanconservativeuniversity@americanconservativeuniversity.com
Note- ACU Students and Alumni are asked to commit to donating Platelets.  Make an Appointment Today! Call The Red Cross at 1-800-733-2767
Click here to download the episode
0 notes
perlalucy · 8 years ago
Text
Women in Technology: Blazing Trails in a Male-Dominated Industry
Throughout history, boys have been encouraged to enter technical fields, and girls directed toward the arts because some have felt girls aren’t as competent as boys in those fields. What a misconception! Although this stereotype of women has permeated the work force for years, corporate leaders—especially those in technology —are rethinking that unfair classification.
According to NCWIT’s Women in IT, women in technology are making strides, but the numbers are not there yet. In the computing workforce, only 26 percent are women; just 7 percent are minority women. Only 20 percent of Fortune 100 companies are led by female CIOs. Even though women do the work, they are not getting the compensation they deserve.
On average, women must work 15.5 months to reach the salary a man earns in 12. Salesforce CEO Marc Benioff is one of those leaders who is trying to close the gender gap, hoping for a change that will bring equality to the work force and put more women in technology. Many Silicon Valley tech firms—Apple, IBM, Microsoft, Dropbox, Facebook and LinkedIn—are following suit. Last year, they signed the White House Equal Pay Pledge, promising to conduct an annual gender pay analysis and review hiring practices to check for biases.
Although there are still some roadblocks to overcome, there are opportunities. LinkedIn reports that the rate of female technical new hires rose 24.4 percent between 2008 and 2016. That’s promising—especially for women contemplating studying information technology. MTI College is the place to start. MTI’s IT program prepares you for an entry-level position as a technical support specialist.
Women have made tremendous achievements in the field of technology. Perhaps one day you will make your mark in the world as these women did with their breakthrough discoveries in computing, communications and gaming.
First computer programmer, a 19th century royal
Ada Byron, Duchess of Lovelace, could have followed in the footsteps of her famous father, poet Lord Byron. Instead, she chose mathematics—unusual for a female born in 1815. She helped document notes on the “Analytical Engine” that her boss, Charles Babbage, invented in 1843. Ada’s algorithm to help Babbage’s machine count Bernoulli numbers earned her recognition as the first computer programmer. Sadly, Babbage was unable to secure funding, and his “computer” never came to fruition.
Rear admiral at the forefront of programming
Grace Hopper was a rear admiral in the U.S. Navy during World War II, but her other titles included “Queen of Software” and “Grandma COBOL.” She was known for developing English-language programming language, including FLOW=MATIC language that Common Business-Oriented Language (COBOL) was based on. In the 1950s, she was senior mathematician for a company that developed UNIVAC, the second commercial computer produced in the United States. At the same time, she created the “A compiler,” a program that translates source code from one computer language to another. Curiously, Hopper was the first to coin the word “bug” to describe a computer glitch after she discovered a real moth that got into her computer and caused a problem. To honor her legacy, the largest conference of women in technology, Grace Hopper Celebration of Women in Computing, is named after her.
From Golden Age of Hollywood screen sensation to Wi-Fi pioneer
In the 1920s, Hedy Lamarr dazzled Hollywood as a beautiful screen star, but during World War II she used her talents to fight the Nazis. She and her co-inventor, George Anthiel, developed spread spectrum technology, an early form of encryption technology. They manipulated radio signals to control torpedoes remotely, forming an unbreakable code to prevent the interception of classified messages by the enemy. The technology was first used on naval ships during the Cuban Missile Crisis, and years later was the foundation for Bluetooth technology, Wi-Fi and Code Division Multiple Access (CDMI).
“Necessity is the mother of invention”
Police were slow to respond to emergencies in Marie Van Brittan Brown’s crime-riddled Queens, New York neighborhood. She took matters into her own hands to keep her home and family safe and secured a patent in 1966 for a home security system that featured peepholes, a camera, a monitor, a two-way microphone and an alarm button that reached the police. Her system was the basis for modern CCTV systems used for home security and police work today.
Bell Labs employees make strides in communications
Talk about multitasking! Dr. Erna Schneider Hoover worked in the technology department at Bell Laboratories during a time that they had an excessive volume of incoming calls. While she was in the hospital after giving birth to her second daughter, Dr. Hoover developed a telephony switching computer program that kept phones functioning during periods of heavy call volume without dropping calls. Her patent in 1971 was one of the first software patents issued.
Another Bell employee, Dr. Shirley Jackson, a theoretical physicist and the first African-American woman to earn a PhD from MIT, conducted breakthrough scientific research that enabled others to go on to invent the portable fax, the touchtone telephone, fiber optic cables and the technology behind Caller ID and Call Waiting.
Contributing toward a big slice of the Apple pie
Back when Steve Jobs was creating the Apple computer, graphic designer Susan Kare worked alongside him as the artist who, in a way, humanized the Mac. She crafted many of the now-standard pixelized interface elements, like the Mac smile, the trash can icon, the invaluable command icon and more. When Jobs left Apple in the mid-1980s, Kare followed. She worked for Microsoft, making Windows 3.0 user friendly, and then went on to do work for Facebook and PayPal.
Small screens and big dreams
Mary Lou Jepsen is an innovative technical executive and industry leader in screen display and imaging. At Facebook, she worked with Virtual Reality. At Google X, she created Google Lego TV. And as founder and former CEO of Pixel Qi in Taiwan, she helped develop low-power, sunlight-readable screens for mobile devices. Jepsen had a dream, however, to provide a computer to every child. She produced the XO, a low-power, low-cost notebook prototype for the nonprofit she co-founded: One Laptop Per Child. Her latest endeavor is Openwater, a company she founded with the goal of using a high-resolution 3D camera to see far into the body with explicit detail.
Fun and games that pay off
A pioneer and visionary in the graphic adventure games industry, Roberta Williams is best known for her PC adventure game series King’s Quest, which has had seven sequels. She and her husband, Ken Williams, founded Sierra On-Line Systems (later known as Sierra On-Line). Roberta popularized the gaming industry with her games’ intricate storylines and complex puzzles that enticed players to fight their way to victory.
Technology’s potential is limitless, and job growth looks good. According to the Bureau of Labor Statistics, employment for technical support specialists is expected to grow faster than average for all occupations. Industry leaders continue to acknowledge the importance of female workers and are vowing to employ more women. If you would like to be among the growing list, MTI College can help prepare you for a career in technology.
The post Women in Technology: Blazing Trails in a Male-Dominated Industry appeared first on MTI College.
from https://www.mticollege.edu/women-technology-blazing-trails-male-dominated-industry/
from MTI College - Blog http://mticolleges.weebly.com/blog/women-in-technology-blazing-trails-in-a-male-dominated-industry
0 notes
niaalisa · 8 years ago
Text
Women in Technology: Blazing Trails in a Male-Dominated Industry
Throughout history, boys have been encouraged to enter technical fields, and girls directed toward the arts because some have felt girls aren’t as competent as boys in those fields. What a misconception! Although this stereotype of women has permeated the work force for years, corporate leaders—especially those in technology —are rethinking that unfair classification.
According to NCWIT’s Women in IT, women in technology are making strides, but the numbers are not there yet. In the computing workforce, only 26 percent are women; just 7 percent are minority women. Only 20 percent of Fortune 100 companies are led by female CIOs. Even though women do the work, they are not getting the compensation they deserve.
On average, women must work 15.5 months to reach the salary a man earns in 12. Salesforce CEO Marc Benioff is one of those leaders who is trying to close the gender gap, hoping for a change that will bring equality to the work force and put more women in technology. Many Silicon Valley tech firms—Apple, IBM, Microsoft, Dropbox, Facebook and LinkedIn—are following suit. Last year, they signed the White House Equal Pay Pledge, promising to conduct an annual gender pay analysis and review hiring practices to check for biases.
Although there are still some roadblocks to overcome, there are opportunities. LinkedIn reports that the rate of female technical new hires rose 24.4 percent between 2008 and 2016. That’s promising—especially for women contemplating studying information technology. MTI College is the place to start. MTI’s IT program prepares you for an entry-level position as a technical support specialist.
Women have made tremendous achievements in the field of technology. Perhaps one day you will make your mark in the world as these women did with their breakthrough discoveries in computing, communications and gaming.
First computer programmer, a 19th century royal
Ada Byron, Duchess of Lovelace, could have followed in the footsteps of her famous father, poet Lord Byron. Instead, she chose mathematics—unusual for a female born in 1815. She helped document notes on the “Analytical Engine” that her boss, Charles Babbage, invented in 1843. Ada’s algorithm to help Babbage’s machine count Bernoulli numbers earned her recognition as the first computer programmer. Sadly, Babbage was unable to secure funding, and his “computer” never came to fruition.
Rear admiral at the forefront of programming
Grace Hopper was a rear admiral in the U.S. Navy during World War II, but her other titles included “Queen of Software” and “Grandma COBOL.” She was known for developing English-language programming language, including FLOW=MATIC language that Common Business-Oriented Language (COBOL) was based on. In the 1950s, she was senior mathematician for a company that developed UNIVAC, the second commercial computer produced in the United States. At the same time, she created the “A compiler,” a program that translates source code from one computer language to another. Curiously, Hopper was the first to coin the word “bug” to describe a computer glitch after she discovered a real moth that got into her computer and caused a problem. To honor her legacy, the largest conference of women in technology, Grace Hopper Celebration of Women in Computing, is named after her.
From Golden Age of Hollywood screen sensation to Wi-Fi pioneer
In the 1920s, Hedy Lamarr dazzled Hollywood as a beautiful screen star, but during World War II she used her talents to fight the Nazis. She and her co-inventor, George Anthiel, developed spread spectrum technology, an early form of encryption technology. They manipulated radio signals to control torpedoes remotely, forming an unbreakable code to prevent the interception of classified messages by the enemy. The technology was first used on naval ships during the Cuban Missile Crisis, and years later was the foundation for Bluetooth technology, Wi-Fi and Code Division Multiple Access (CDMI).
“Necessity is the mother of invention”
Police were slow to respond to emergencies in Marie Van Brittan Brown’s crime-riddled Queens, New York neighborhood. She took matters into her own hands to keep her home and family safe and secured a patent in 1966 for a home security system that featured peepholes, a camera, a monitor, a two-way microphone and an alarm button that reached the police. Her system was the basis for modern CCTV systems used for home security and police work today.
Bell Labs employees make strides in communications
Talk about multitasking! Dr. Erna Schneider Hoover worked in the technology department at Bell Laboratories during a time that they had an excessive volume of incoming calls. While she was in the hospital after giving birth to her second daughter, Dr. Hoover developed a telephony switching computer program that kept phones functioning during periods of heavy call volume without dropping calls. Her patent in 1971 was one of the first software patents issued.
Another Bell employee, Dr. Shirley Jackson, a theoretical physicist and the first African-American woman to earn a PhD from MIT, conducted breakthrough scientific research that enabled others to go on to invent the portable fax, the touchtone telephone, fiber optic cables and the technology behind Caller ID and Call Waiting.
Contributing toward a big slice of the Apple pie
Back when Steve Jobs was creating the Apple computer, graphic designer Susan Kare worked alongside him as the artist who, in a way, humanized the Mac. She crafted many of the now-standard pixelized interface elements, like the Mac smile, the trash can icon, the invaluable command icon and more. When Jobs left Apple in the mid-1980s, Kare followed. She worked for Microsoft, making Windows 3.0 user friendly, and then went on to do work for Facebook and PayPal.
Small screens and big dreams
Mary Lou Jepsen is an innovative technical executive and industry leader in screen display and imaging. At Facebook, she worked with Virtual Reality. At Google X, she created Google Lego TV. And as founder and former CEO of Pixel Qi in Taiwan, she helped develop low-power, sunlight-readable screens for mobile devices. Jepsen had a dream, however, to provide a computer to every child. She produced the XO, a low-power, low-cost notebook prototype for the nonprofit she co-founded: One Laptop Per Child. Her latest endeavor is Openwater, a company she founded with the goal of using a high-resolution 3D camera to see far into the body with explicit detail.
Fun and games that pay off
A pioneer and visionary in the graphic adventure games industry, Roberta Williams is best known for her PC adventure game series King’s Quest, which has had seven sequels. She and her husband, Ken Williams, founded Sierra On-Line Systems (later known as Sierra On-Line). Roberta popularized the gaming industry with her games’ intricate storylines and complex puzzles that enticed players to fight their way to victory.
Technology’s potential is limitless, and job growth looks good. According to the Bureau of Labor Statistics, employment for technical support specialists is expected to grow faster than average for all occupations. Industry leaders continue to acknowledge the importance of female workers and are vowing to employ more women. If you would like to be among the growing list, MTI College can help prepare you for a career in technology.
The post Women in Technology: Blazing Trails in a Male-Dominated Industry appeared first on MTI College.
from MTI College https://www.mticollege.edu/women-technology-blazing-trails-male-dominated-industry/ from MTI College https://mticolleges.tumblr.com/post/165604822848
0 notes
macyjoy3 · 8 years ago
Text
Women in Technology: Blazing Trails in a Male-Dominated Industry
Throughout history, boys have been encouraged to enter technical fields, and girls directed toward the arts because some have felt girls aren’t as competent as boys in those fields. What a misconception! Although this stereotype of women has permeated the work force for years, corporate leaders—especially those in technology —are rethinking that unfair classification.
According to NCWIT’s Women in IT, women in technology are making strides, but the numbers are not there yet. In the computing workforce, only 26 percent are women; just 7 percent are minority women. Only 20 percent of Fortune 100 companies are led by female CIOs. Even though women do the work, they are not getting the compensation they deserve.
On average, women must work 15.5 months to reach the salary a man earns in 12. Salesforce CEO Marc Benioff is one of those leaders who is trying to close the gender gap, hoping for a change that will bring equality to the work force and put more women in technology. Many Silicon Valley tech firms—Apple, IBM, Microsoft, Dropbox, Facebook and LinkedIn—are following suit. Last year, they signed the White House Equal Pay Pledge, promising to conduct an annual gender pay analysis and review hiring practices to check for biases.
Although there are still some roadblocks to overcome, there are opportunities. LinkedIn reports that the rate of female technical new hires rose 24.4 percent between 2008 and 2016. That’s promising—especially for women contemplating studying information technology. MTI College is the place to start. MTI’s IT program prepares you for an entry-level position as a technical support specialist.
Women have made tremendous achievements in the field of technology. Perhaps one day you will make your mark in the world as these women did with their breakthrough discoveries in computing, communications and gaming.
First computer programmer, a 19th century royal
Ada Byron, Duchess of Lovelace, could have followed in the footsteps of her famous father, poet Lord Byron. Instead, she chose mathematics—unusual for a female born in 1815. She helped document notes on the “Analytical Engine” that her boss, Charles Babbage, invented in 1843. Ada’s algorithm to help Babbage’s machine count Bernoulli numbers earned her recognition as the first computer programmer. Sadly, Babbage was unable to secure funding, and his “computer” never came to fruition.
Rear admiral at the forefront of programming
Grace Hopper was a rear admiral in the U.S. Navy during World War II, but her other titles included “Queen of Software” and “Grandma COBOL.” She was known for developing English-language programming language, including FLOW=MATIC language that Common Business-Oriented Language (COBOL) was based on. In the 1950s, she was senior mathematician for a company that developed UNIVAC, the second commercial computer produced in the United States. At the same time, she created the “A compiler,” a program that translates source code from one computer language to another. Curiously, Hopper was the first to coin the word “bug” to describe a computer glitch after she discovered a real moth that got into her computer and caused a problem. To honor her legacy, the largest conference of women in technology, Grace Hopper Celebration of Women in Computing, is named after her.
From Golden Age of Hollywood screen sensation to Wi-Fi pioneer
In the 1920s, Hedy Lamarr dazzled Hollywood as a beautiful screen star, but during World War II she used her talents to fight the Nazis. She and her co-inventor, George Anthiel, developed spread spectrum technology, an early form of encryption technology. They manipulated radio signals to control torpedoes remotely, forming an unbreakable code to prevent the interception of classified messages by the enemy. The technology was first used on naval ships during the Cuban Missile Crisis, and years later was the foundation for Bluetooth technology, Wi-Fi and Code Division Multiple Access (CDMI).
“Necessity is the mother of invention”
Police were slow to respond to emergencies in Marie Van Brittan Brown’s crime-riddled Queens, New York neighborhood. She took matters into her own hands to keep her home and family safe and secured a patent in 1966 for a home security system that featured peepholes, a camera, a monitor, a two-way microphone and an alarm button that reached the police. Her system was the basis for modern CCTV systems used for home security and police work today.
Bell Labs employees make strides in communications
Talk about multitasking! Dr. Erna Schneider Hoover worked in the technology department at Bell Laboratories during a time that they had an excessive volume of incoming calls. While she was in the hospital after giving birth to her second daughter, Dr. Hoover developed a telephony switching computer program that kept phones functioning during periods of heavy call volume without dropping calls. Her patent in 1971 was one of the first software patents issued.
Another Bell employee, Dr. Shirley Jackson, a theoretical physicist and the first African-American woman to earn a PhD from MIT, conducted breakthrough scientific research that enabled others to go on to invent the portable fax, the touchtone telephone, fiber optic cables and the technology behind Caller ID and Call Waiting.
Contributing toward a big slice of the Apple pie
Back when Steve Jobs was creating the Apple computer, graphic designer Susan Kare worked alongside him as the artist who, in a way, humanized the Mac. She crafted many of the now-standard pixelized interface elements, like the Mac smile, the trash can icon, the invaluable command icon and more. When Jobs left Apple in the mid-1980s, Kare followed. She worked for Microsoft, making Windows 3.0 user friendly, and then went on to do work for Facebook and PayPal.
Small screens and big dreams
Mary Lou Jepsen is an innovative technical executive and industry leader in screen display and imaging. At Facebook, she worked with Virtual Reality. At Google X, she created Google Lego TV. And as founder and former CEO of Pixel Qi in Taiwan, she helped develop low-power, sunlight-readable screens for mobile devices. Jepsen had a dream, however, to provide a computer to every child. She produced the XO, a low-power, low-cost notebook prototype for the nonprofit she co-founded: One Laptop Per Child. Her latest endeavor is Openwater, a company she founded with the goal of using a high-resolution 3D camera to see far into the body with explicit detail.
Fun and games that pay off
A pioneer and visionary in the graphic adventure games industry, Roberta Williams is best known for her PC adventure game series King’s Quest, which has had seven sequels. She and her husband, Ken Williams, founded Sierra On-Line Systems (later known as Sierra On-Line). Roberta popularized the gaming industry with her games’ intricate storylines and complex puzzles that enticed players to fight their way to victory.
Technology’s potential is limitless, and job growth looks good. According to the Bureau of Labor Statistics, employment for technical support specialists is expected to grow faster than average for all occupations. Industry leaders continue to acknowledge the importance of female workers and are vowing to employ more women. If you would like to be among the growing list, MTI College can help prepare you for a career in technology.
The post Women in Technology: Blazing Trails in a Male-Dominated Industry appeared first on MTI College.
from https://www.mticollege.edu/women-technology-blazing-trails-male-dominated-industry/ from MTI College http://mticolleges.blogspot.com/2017/09/women-in-technology-blazing-trails-in.html
0 notes
mticolleges · 8 years ago
Text
Women in Technology: Blazing Trails in a Male-Dominated Industry
Throughout history, boys have been encouraged to enter technical fields, and girls directed toward the arts because some have felt girls aren’t as competent as boys in those fields. What a misconception! Although this stereotype of women has permeated the work force for years, corporate leaders—especially those in technology —are rethinking that unfair classification.
According to NCWIT’s Women in IT, women in technology are making strides, but the numbers are not there yet. In the computing workforce, only 26 percent are women; just 7 percent are minority women. Only 20 percent of Fortune 100 companies are led by female CIOs. Even though women do the work, they are not getting the compensation they deserve.
On average, women must work 15.5 months to reach the salary a man earns in 12. Salesforce CEO Marc Benioff is one of those leaders who is trying to close the gender gap, hoping for a change that will bring equality to the work force and put more women in technology. Many Silicon Valley tech firms—Apple, IBM, Microsoft, Dropbox, Facebook and LinkedIn—are following suit. Last year, they signed the White House Equal Pay Pledge, promising to conduct an annual gender pay analysis and review hiring practices to check for biases.
Although there are still some roadblocks to overcome, there are opportunities. LinkedIn reports that the rate of female technical new hires rose 24.4 percent between 2008 and 2016. That’s promising—especially for women contemplating studying information technology. MTI College is the place to start. MTI’s IT program prepares you for an entry-level position as a technical support specialist.
Women have made tremendous achievements in the field of technology. Perhaps one day you will make your mark in the world as these women did with their breakthrough discoveries in computing, communications and gaming.
First computer programmer, a 19th century royal
Ada Byron, Duchess of Lovelace, could have followed in the footsteps of her famous father, poet Lord Byron. Instead, she chose mathematics—unusual for a female born in 1815. She helped document notes on the “Analytical Engine” that her boss, Charles Babbage, invented in 1843. Ada’s algorithm to help Babbage’s machine count Bernoulli numbers earned her recognition as the first computer programmer. Sadly, Babbage was unable to secure funding, and his “computer” never came to fruition.
Rear admiral at the forefront of programming
Grace Hopper was a rear admiral in the U.S. Navy during World War II, but her other titles included “Queen of Software” and “Grandma COBOL.” She was known for developing English-language programming language, including FLOW=MATIC language that Common Business-Oriented Language (COBOL) was based on. In the 1950s, she was senior mathematician for a company that developed UNIVAC, the second commercial computer produced in the United States. At the same time, she created the “A compiler,” a program that translates source code from one computer language to another. Curiously, Hopper was the first to coin the word “bug” to describe a computer glitch after she discovered a real moth that got into her computer and caused a problem. To honor her legacy, the largest conference of women in technology, Grace Hopper Celebration of Women in Computing, is named after her.
From Golden Age of Hollywood screen sensation to Wi-Fi pioneer
In the 1920s, Hedy Lamarr dazzled Hollywood as a beautiful screen star, but during World War II she used her talents to fight the Nazis. She and her co-inventor, George Anthiel, developed spread spectrum technology, an early form of encryption technology. They manipulated radio signals to control torpedoes remotely, forming an unbreakable code to prevent the interception of classified messages by the enemy. The technology was first used on naval ships during the Cuban Missile Crisis, and years later was the foundation for Bluetooth technology, Wi-Fi and Code Division Multiple Access (CDMI).
“Necessity is the mother of invention”
Police were slow to respond to emergencies in Marie Van Brittan Brown’s crime-riddled Queens, New York neighborhood. She took matters into her own hands to keep her home and family safe and secured a patent in 1966 for a home security system that featured peepholes, a camera, a monitor, a two-way microphone and an alarm button that reached the police. Her system was the basis for modern CCTV systems used for home security and police work today.
Bell Labs employees make strides in communications
Talk about multitasking! Dr. Erna Schneider Hoover worked in the technology department at Bell Laboratories during a time that they had an excessive volume of incoming calls. While she was in the hospital after giving birth to her second daughter, Dr. Hoover developed a telephony switching computer program that kept phones functioning during periods of heavy call volume without dropping calls. Her patent in 1971 was one of the first software patents issued.
Another Bell employee, Dr. Shirley Jackson, a theoretical physicist and the first African-American woman to earn a PhD from MIT, conducted breakthrough scientific research that enabled others to go on to invent the portable fax, the touchtone telephone, fiber optic cables and the technology behind Caller ID and Call Waiting.
Contributing toward a big slice of the Apple pie
Back when Steve Jobs was creating the Apple computer, graphic designer Susan Kare worked alongside him as the artist who, in a way, humanized the Mac. She crafted many of the now-standard pixelized interface elements, like the Mac smile, the trash can icon, the invaluable command icon and more. When Jobs left Apple in the mid-1980s, Kare followed. She worked for Microsoft, making Windows 3.0 user friendly, and then went on to do work for Facebook and PayPal.
Small screens and big dreams
Mary Lou Jepsen is an innovative technical executive and industry leader in screen display and imaging. At Facebook, she worked with Virtual Reality. At Google X, she created Google Lego TV. And as founder and former CEO of Pixel Qi in Taiwan, she helped develop low-power, sunlight-readable screens for mobile devices. Jepsen had a dream, however, to provide a computer to every child. She produced the XO, a low-power, low-cost notebook prototype for the nonprofit she co-founded: One Laptop Per Child. Her latest endeavor is Openwater, a company she founded with the goal of using a high-resolution 3D camera to see far into the body with explicit detail.
Fun and games that pay off
A pioneer and visionary in the graphic adventure games industry, Roberta Williams is best known for her PC adventure game series King’s Quest, which has had seven sequels. She and her husband, Ken Williams, founded Sierra On-Line Systems (later known as Sierra On-Line). Roberta popularized the gaming industry with her games’ intricate storylines and complex puzzles that enticed players to fight their way to victory.
Technology’s potential is limitless, and job growth looks good. According to the Bureau of Labor Statistics, employment for technical support specialists is expected to grow faster than average for all occupations. Industry leaders continue to acknowledge the importance of female workers and are vowing to employ more women. If you would like to be among the growing list, MTI College can help prepare you for a career in technology.
The post Women in Technology: Blazing Trails in a Male-Dominated Industry appeared first on MTI College.
from MTI College https://www.mticollege.edu/women-technology-blazing-trails-male-dominated-industry/
0 notes