As we celebrate Pride Month, its worth taking some time to think about some of the prominent members of the LGBTQ+ community who have not only made great strides in technology, but also advocated for recognition and equality. From the mid-20th century to today, LGBTQ+ technologists continue to push the industry forward in new and exciting ways. The following is just a small sampling of these technologists:
An English mathematician helped pioneer computer science and artificial intelligence (A.I.)., Turing is perhaps most famous for his work at Bletchley Park, the center of the U.K.s code-breaking efforts during World War II, where he figured out the statistical techniques that allowed the Allies to break Nazi cryptography.
For his wartime efforts, Turing was appointed an officer of the Order of the British Empire. Following the War, he designed an Automatic Computing Engine, basically a computer with electronic memory (a fully functioning example of the ACE wasnt actually something built in his lifetime, however). He also theorized quite a bit about artificial intelligence (one of his core concepts,the Turing test, is still regarded as a benchmark for testing a machines intelligent behavior).
Turing was prosecuted by the British government for his sexual relationship with another man, Arnold Murray. Found guilty, he was chemically castrated and stripped of his security clearance, which prevented him from working for Britains signals-intelligence efforts. A little over two years later, in 1954, he was found dead of cyanide poisoning, and whether it was suicide or an accident has preoccupied historians for decades.
In 1999,Timelisted Turing among the100 Most Important People of the 20thCentury. Five years later, the British government officially pardoned his conviction.
A technology manager for IBM as well as an LGBTQ+ activist, Edith Edie Windsor was lead plaintiff inUnited States v. Windsor(550 U.S. 744), a landmark U.S. Supreme Court case that found that a crucial portion of the Defense of Marriage Act (DOMA) violated the due process clause of the Fifth Amendment. The ruling helped legalize same-sex marriage (along with a later case,Obergefell v. Hodges).
At IBM, Windsor worked on projects related to operating systems and natural-language processing. After leaving IBM in 1975, she started a consulting firm. In 2016, Lesbians Who Tech, an organization for lesbian and queer women in tech,set up the Edie Windsor Coding Scholarship, with 40 people selected for its inaugural year of giving.
As a computer scientist at IBM in the 1960s, Lynn Conway helped make pioneering advances in computer architecture. One of her projects, ACS (Advanced Computing Systems), essentially became the foundation of the modern high-performance microprocessor. However, IBM fired her when it discovered that she was undergoing gender transition.
Undeterred, Conway moved on to Xerox PARC, where she worked on still more innovative projects, including the ability to put multiple circuit designs on one chip. She was also key in advancing chip design and fabrication. After her stint at Xerox, she moved to DARPA, and from there to the University of Michigan, where she became a professor of electrical engineering and computer science.
At the turn of the century, Conway began to work more in transgender activism. In addition coming out to friends and colleagues, she also used her webpage to describeher personal history(followed up, much later, by a memoir published in 2012). In 2014, she also successfully pushed for the prominent Institute of Electrical and Electronics (IEEE) Board of Directors toinclude trans-specific protections in its Code of Ethics.
Jon maddog Hall has been the Board Chair of the Linux Professional Institute (the certification body for free and open-source software professionals) since 2015. In addition, hes executive director of the industry group Linux International, as well as an author with Linux Pro Magazine.
In a 2012 column in Linux Magazine, Hall came out as gay, citing Alan Turing as a hero and an inspiration.In fact, computer science was a haven for homosexuals, trans-sexuals and a lot of other sexuals, mostly because the history of the science called for fairly intelligent, modern-thinking people, he wrote. Many computer companies were the first to enact diversity programs, and the USENIX organization had a special interest group that was made up of LGBT people. He also became an advocate of marriage equality.
In 2012, Leanne Pittsford founded Lesbians Who Tech, which claims its the largest LGBTQ community of technologists in the world (with 40+ city chapters and 60,000 members). Lesbians Who Tech hosts an annual San Francisco Summit attended by as many as 5,000 women and non-binary people, and it provides mentoring and leadership programs as well as the aforementioned Edie Windsor Coding Scholarship Fund.
Pittsford is also the founder of include.io, which connects underrepresented technologists with companies and technical mentors. In 2016, she also organizedthe third annual LGBTQ Tech and Innovation Summit at the White House.
The third Chief Technology Officer of the United States (U.S. CTO) under President Barack Obama, Megan Smith also served as a vice president at Google. As U.S. CTO, she spearheaded a number of initiatives, including the recruitment of tech talent for national service. She also recognized the need to build up the governments capabilities in data science, open data, and digital policy.
Smith is currently the CEO and co-founder of shift7, which works collaboratively on systemic social, environmental and economic problems. She is also a life member of the board of MIT, as well as a member of the Council on Foreign Relations and the National Academy of Engineering.
Widely considered the first chief executive officer of a Fortune 500 company to come out as gay, Apple CEO Tim Cooktold CNNback in 2014 that he went public in order to show gay children that they could be gay and still go on and do some big jobs in life.
Cook, who once said that being gay is Gods greatest gift to me, joined Apple as a senior vice president in 1998, during some of its leanest years. He quickly solidified his reputation as a peerless operations executive, refining the companys supply and manufacturing chains. As Apple rose to new corporate heights on the strength of its iPod, iPhone, and iPad sales, this supply-chain refinement ensured that millions of devices reached users hands.Cook was promoted to chief operating officer, and stepped in to temporarily head the company when CEO Steve Jobs fell sick with cancer.
Following the death of Jobs in 2011, Cook took the CEO reins and restructured the executive team, with a renewed focus on creating a culture of teamwork and collaboration. He oversaw the launch of the Apple Watch and the AirPods, moving Apple in the long-predicted direction of wearables, and began to shift the companys focus from hardware to cloud-based services such as music and gaming.
Membership has its benefits. Sign up for a free Dice profile, add your resume, discover great career insights and set your tech career in motion. Register now
More here:
7 Prominent LGBTQ+ Technologists, Past and Present - Dice Insights
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]