and thesis work to participants. The
main appeal of the event was the opportunity to work with experts in the
field, learning from and networking
Commenting on the event, Tran
says she finds that big companies are
interested in creating gender-equal
teams, with equal numbers of men
and women. They thus signed up female experts to attend the workshop
and lead some of the projects, looking
to introduce more female role models
and form gender-equal teams. Having both male and female team leaders would basically help challenge
the idea that only men are capable of
being leaders, helping alter participants’ preconceptions about gender
roles in computer science.
The workshop followed the tradition of ACM womENcourage (https://
important scientific event, the second of which was organized at Uppsala University in 2015 to enable
networking and exploration of career
opportunities for women. The 2016
event was viewed as particularly bold
and effective when Fayiq Alghamdi,
an Uppsala Ph.D. student, presented
a paper, “Women in Computing in
Saudi Arabia,” analyzing the notably large number of women studying
computer science in Saudi Arabia.
Given how well these events worked
out, UU ACM-W now plans to organize
a small student conference of its own.
“In the future,” says Tran, “we would
like to continue organizing events that
are both supporting the students’ fu-
ture careers and promoting gender
equality in computer science.”
— Anshuman Majumdar
Despite their negative connotations, crisis situations
entail two things—a threat and an opportunity for
growth. Inventions like drones, the GPS system, and
cloud storage are all outcomes of crisis troubleshooting
agendas, regardless of domain, whether finance, politics,
or IT. Here, we explore milestones in crisis management.
191 5 The foundation of the first air traffic control system was laid, aiming to eliminate the
total isolation of aircraft from ground control.
198 2 The THERAC- 25 medical radiation therapy machine was devised, resulting
in several cases of massive radiation overdose to
patients. In response, the IEC 62304 standard introduced
development life cycle standards for medical-device
software and specific guidance on using soft ware of
198 5 The crash of Delta Airlines Flight 191 on its way from Fort Lauderdale to
Los Angeles due to its inability to detect microbursts
during a thunderstorm prompted a seven-year NASA/
FAA research effort. Following an FAA mandate, the
resulting airborne wind-shear detection and alert system
was installed on many commercial airliners in the U.S.
198 9 The oil tanker Exxon Valdez spilled 11 million to 38 million gallons of
crude oil over several days when it struck Prince
William Sound’s Bligh Reef, adversely affecting
the environment and related marine species. One
result was development of a new spill-detecting
technology and improved vessel-navigation system.
201 2 A vulnerability, called Heartbleed, allowing unauthorized access to the
system memory of any Internet user was accidently
introduced into the OpenSSL cryptographic software
library. In 2014, Bodo Moeller and Adam Langley of
Google prepared a patch to fix OpenSSL’s version-control
system, releasing the first fixed version, known as 1.0.1g.
The National Earthquake Information Center
developed an algorithm that detects earthquakes
by analyzing tweets; in some areas the algorithm is
twice as fast as conventional seismic instruments.