Uncomplicated IT Logo

WOMEN IN TECH: MARGARET HAMILTON

Megan Poljacik • December 19, 2024

Picture this: You're witnessing the culmination of years of hard work as the first humans are about to land on the moon's surface. Suddenly, the moment is shattered by blaring alarms. This exact scenario unfolded during Apollo 11's momentous moon landing. Luckily, Margaret Hamilton and her accomplished team of NASA engineers had meticulously readied themselves for any imaginable situation.

 

Margaret Hamilton is best known for her work on the Apollo moon missions. In the 1960s, she was the lead software engineer for the Apollo Guidance Computer, which was the specialized computer that was responsible for guiding the Apollo spacecraft to the moon. Her job was to make sure the system was reliable, efficient, and could handle the complex calculations needed for space travel.

 

During the Apollo 11 mission, Margaret Hamilton's team faced a critical situation where the computer system on the lunar module experienced an overload during the landing. This overload was caused by an unexpected increase in processing demands as the computer tried to do numerous tasks at the same time.



To understand how Margaret Hamilton and her team solved this problem, it's important to first know a bit about the Apollo Guidance Computer (AGC) that she helped develop. At the time, the AGC was a cutting-edge computer designed specifically to steer the Apollo spaceship as it traveled to the moon. It had limited memory and processing power compared to today's computers, but it needed to handle complex calculations for navigating and landing on the moon.


When the overload occurred during the Apollo 11 moon landing, the computer received multiple simultaneous requests, quickly overwhelming it. The computer had to decide how to handle these simultaneous tasks while also maintaining critical operations. It was a challenging situation because the overload could have potentially caused the entire computer to crash, putting the mission in jeopardy.


Fortunately, Margaret Hamilton's team had specifically designed and extensively tested the software to ensure it could handle such situations. They had simulated scenarios where the computer would be overloaded to understand how it would react and put in place measures to protect against crashes. Instead of crashing or freezing, the computer's software would identify which tasks were essential for the safe landing and prioritize them. Less critical tasks were temporarily put on hold or delayed until the main tasks were completed. This allowed the computer to allocate its limited resources efficiently and prevent a catastrophic failure.


Thanks to the careful planning, testing, and an innovative design by Margaret Hamilton and her team, the Apollo Guidance Computer successfully managed the overload issue. It continued to carry out the critical calculations needed for landing the spacecraft, ensuring the safety of the astronauts onboard and the successful completion of the historic Apollo 11 lunar landing.


Margaret Hamilton's work for the Apollo missions led to the development of safety- critical systems that are still used today. She designed new methods for error detection and recovery in computer systems, making them more reliable and resilient. Her work has had a lasting impact on the field of computer science and our understanding of how to build dependable software.


Margaret Hamilton's story is an inspiration to everyone, especially young women interested in computer science!



Uncomplicate IT News Blog

By Megan Poljacik December 19, 2024
Imagine a virus infecting over 85 million Android phones without anyone catching on. Believe it or not, this really happened in 2016! How could a virus be so easily distributed without human intervention? The HummingBad virus was a persistence rootkit, which is a very smart and nasty virus. It is difficult to find and even more difficult to remove. They embed themselves within the system without the users knowledge and they are designed to hide themselves and their activities, even from security software. A rootkit will take over an infected system on its own, or if it cannot gain root access, it will push a fake update prompt, tricking the user into installing. Once the malware has control of the device, it begins downloading and installing apps, and the lucrative business of conning users begins. The HummingBad virus was designed to click on the ads within the apps to generate advertising revenue. This inflated ad click and view counts, allowing the attackers to earn more revenue without actual user engagement. The malware also promoted and installed additional malicious
By Megan Poljacik December 19, 2024
In the headquarters of Cloudfare, a California based tech company, there is a most wonderous wall of mystery. Towering over the entrance, lies wall of around 100 brightly colored lava lamps. While they may be enticing to the eye, these lava lamps actually have a very important job in the security department. Cloudflare provides content delivery network services and DDoS mitigation, and they are known for using lava lamps in their offices as part of its encryption process. The concept is based on a method called "entropy source," which helps generate truly random numbers for encryption keys. Entropy sources are used in cryptography to generate randomness for various security-related processes, such as encryption key generation and secure communication protocols. Entropy, in this context, refers to the unpredictability and randomness of data, which is crucial for ensuring security and preventing cryptographic attacks.
By Megan Poljacik December 19, 2024
Earlier this month a peculiar story began circling the internet: a Denial of Service attack was being implemented at the hands of millions of Smart Toothbrushes. This turned out to be false information, but could it actually happen? During a Distributed Denial of Service (DDoS) attack, a large number of compromised or infected devices, often referred to as bots or zombies, are used to flood a targeted website, server, or network with an overwhelming amount of traffic. This flood of traffic is intended to interrupt the target's normal operation, making it inaccessible to legitimate users. The threat actor can use literally any device with an internet connection – so yes, a smart toothbrush could contribute to taking down the internet! These attacks can take years of effort on the hackers part before they come to fruition. The hacker gains control of hundreds if not thousands of devices over time. They connect them to create a botnet, and use specialized software or scripts to instruct the botnet to send a large volume of fake traffic to the target. This surge in traffic can overpower the target's bandwidth, server capacity, or other resources, causing it to be
More Posts
Share by: