When Sarah Flannery was 16 in 1999, she won Ireland's Young Scientist of the Year award for her work in Internet cryptography. Although she is described in a recent book, The Hacker Ethic, as "a 16-year-old hacker," Flannery, now 19 and studying computer science at Cambridge University, isn't quite sure how to feel about that description.
"I haven't read the book," she said in a phone interview. "I've been a bit confused about what a hacker really is."
She is not alone. The word "hacker" calls to mind two stereotypes. The first is that hackers are bad guys. Among those who call themselves hackers, a "hacker" is generally defined as someone who loves to write precise programming code and takes joy in exploring the nooks and crannies of the Net -- including places that some would prefer they not explore. The second is that hackers are guys.
PHOTO: NY TIMES
In fact, women who consider themselves hackers, as well as women like Flannery who just plain enjoy math and technology, have been part of the computer world for decades. Some are prominent for their accomplishments; all tend to stand out in their field because they are women.
Flannery, who was obviously never given a "Math is hard!" talking Barbie as a child, has written about her adventures as a young mathematician and cryptographer in In Code: A Mathematical Journey, a book written with her father, David Flannery, and published this month in the US by Workman Publishing.
In her book, Flannery writes of her experiences in Dublin during a stint at Baltimore Technologies, where she began to work seriously on what became her prize-winning Cayley-Purser algorithm -- named after a mathematician and a cryptographer -- which could be used for faster encryption of information on the Internet. In the spirit of the hacker ethic that information should be free, she declined to patent her algorithm, so that it would be available to anyone.
Most of her work with the company was, not surprisingly, alongside men. "The women tended to be managers and secretaries and not to be involved in the technical side of things," Flannery recalled. "I wasn't treated any differently for it, though."
But women with longer tenure in technology say that for better or worse, it is still hard to avoid being a curiosity. "The assumptions made about you when you get into a technical field are that you're either a feminist," said Carole Fennelly, 39, a Unix programmer since 1980, "or you're trying to make a statement, or you're some sort of supergenius.
"I'm in technology because I happen to like it. I'm not trying to make a statement and I don't want to be treated differently. Technology is about facts and has nothing to do with gender."
Fennelly is a partner in the Wizard's Keys Corp, a computer-security consulting firm in Tinton Falls, New Jersey, that she founded with her husband in 1992.
Jude Milhon is a longtime programmer who taught herself the Fortran computer language from a library book in the 1960s. Although she was told to fetch the coffee for a room full of men at her first professional programming job, but spilled it so deftly on the table that her boss wisely opted to have somebody else bring it for future meetings, Milhon went on to work as a programmer and was an editor at Mondo 2000, a cyberculture magazine published in the early 1990s.
"As soon as I got away from businessmen," she said in an e-mail message, "the world was different: respect for geekliness, double points for female." Female programmers are cherished, she said, explaining, "You're still a rarity: a blue rose, a precious freak."
In addition to being an author and a programmer, Milhon, who is widely known by her online name, St. Jude, has been cited as one of the first known female hackers by Steven Levy in his 1984 book, Hackers: Heroes of the Computer Revolution.
"My own definition of hacking," Milhon said, "is the clever circumvention of imposed limits, whether imposed by your government, your own skills or the laws of physics."
Of the women who hack, most learn their skills in places where they are outnumbered by men: in the rough-and-tumble online enclaves that hackers frequent or at hacker conventions. A spokesman for Defcon, the annual hacker gathering in Las Vegas, estimated that the event drew eight men for every woman.
An Australian hacker in her early 30s who goes by the online handle Blueberry has similar memories of her early days on Internet Relay Channel chat areas, which she compares to a men's smoking room.
"You throw open the door and everything stops," she wrote by e-mail, "all eyes are turned in your direction, and you could hear a pin drop." However she persisted in her pursuit of arcane hacker knowledge, learning the computer inside and out with help from male hackers online.
Blueberry, who like many hackers chooses to be known simply by her online name for reasons of personal privacy and security, said women could silence derogatory comments from older hackers by proving their technical prowess on the PC. "You have to earn the respect," she said. But a female technophile may have to overcome the perception that she hangs out in online areas dominated by men so she can meet men with the potential for hefty stock options -- not because she is really interested in computers. The quality of her hacking may also be questioned and she is likely to draw chauvinistic comments.
"I hate to talk in generalities, but a lot of times, younger guys just aren't experienced with women, and they're still kind of focused on that whole thing. There is more sexism in a younger atmosphere. That said, there are a lot of hacker guys who are great," said Fennelly, the computer-security consultant.
In her years in the industry, Fennelly has had plenty of time to observe differences in the workplace. While women write programs just as nimbly as men, but other skills also become evident, she said. "Social engineering is a big deal in the computer field -- manipulating people to do things," she said. "Women can understand that pretty well."
The Ministry of Transportation and Communications yesterday inaugurated the Danjiang Bridge across the Tamsui River in New Taipei City, saying that the structure would be an architectural icon and traffic artery for Taiwan. Feted as a major engineering achievement, the Danjiang Bridge is 920m long, 211m tall at the top of its pylon, and is the longest single-pylon asymmetric cable-stayed bridge in the world, the government’s Web site for the structure said. It was designed by late Iraqi-British architect Zaha Hadid. The structure, with a maximum deck of 70m, accommodates road and light rail traffic, and affords a 200m navigation channel for boats,
PRECISION STRIKES: The most significant reason to deploy HIMARS to outlying islands is to establish a ‘dead zone’ that the PLA would not dare enter, a source said A High Mobility Artillery Rocket System (HIMARS) would be deployed to Penghu County and Dongyin Island (東引) in Lienchiang County (Matsu) to force the Chinese military to retreat at least 100km from the coastline, a military source said yesterday. Taiwan has been procuring HIMARS and Army Tactical Missile Systems (ATACMS) from the US in batches. Once all batches have been delivered, Taiwan would possess 111 HIMARS units and 504 ATACMS, which have a range of 300km. Considering that “offense is the best defense,” the military plans to forward-deploy the systems to outlying islands such as Penghu and Dongyin so that
WHAT WAS ALL THAT FOR? Jaw Shaw-kong said that Cheng Li-wen had pushed for more drastic cuts and attacked him, just for the outcome to be nearly identical to his bill The legislature yesterday passed a supplementary budget bill to fund the purchase of separate packages of US military equipment, with the combined amount of spending capped at NT$780 billion (US$24.8 billion). The Chinese Nationalist Party (KMT) and Taiwan People’s Party (TPP) used their legislative majority to pass the bill, which runs until 2033 and has two main funding provisions. One was for NT$300 billion of arms sales already approved by the US for Taiwan on Dec. 17 last year, the other was for NT$480 billion for another arms package expected to be announced by Washington. The bill, which fell short of the NT$1.25
‘CLEAR MESSAGE’: The bill would set up an interagency ‘tiger team’ to review sanctions tools and other economic options to help deter any Chinese aggression toward Taiwan US Representative Young Kim has introduced a bill to deter Chinese aggression against Taiwan, calling for an interagency “tiger team” to preplan coordinated sanctions and economic measures in response to possible Chinese military or political action against Taiwan. “[Chinese President] Xi Jinping [習近平] has directed the People’s Liberation Army to be ready to invade Taiwan by 2027. China has a plan. America should have one too,” Kim said in a news release on Thursday last week. She introduced the “Deter PRC [People’s Republic of China] aggression against Taiwan act” to “ensure the US has a coordinated sanctions strategy ready should