Feeds

Cambridge launches mentor group for women tech researchers

Aiming to redress the balance

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The University of Cambridge has set up a mentoring group to support women in IT and computer science research. Women@CL, was officially launched last night at the Roger Needham Award lecture.

The project's goal is to restore balance to the number of men and women in leadership roles in the academic and industrial worlds. Women account for just one in 20 computing professors, one in eight researchers and one in four PhD students. Despite this, more women (33 per cent) than men (22 per cent) report a desire to take on a leadership role.

The group has devised a programme of career development activities including regional and national workshops, mentoring and networking. Later this month Women@CL is holding a meeting in London, where there will be a series of presentations from women engaged in computer science research.

Professor Ursula Martin, of Queen Mary University of London and director of women@CL, says there are plenty of initiatives to encourage more women to study IT at school and at university. But these peter out once you get into post-graduate or industrial research. She points to a "frosted glass ceiling" in the sector. She says that while it is far from unbreakable, it is sometimes hard to see through.

"The aim of our group is at least partially to fill that void: by celebrating, informing and supporting women in the UK who are, or plan to be, engaged in computing research or academic leadership," she said.

"The business case for having diverse teams to tackle these challenges is clear: diverse teams make better progress. But the opportunities for effective, diverse teams decrease when there are too few women in leadership positions."

The project is funded largely by the EPSRC (Engineering and Physical Sciences Research Council) but is also backed by Microsoft and Intel's research facilities in Cambridge. ®

Related stories

The case for women in the technology business
IT skills shortage threatens humanity
Schoolkids need science, says Royal Society prez

Next gen security for virtualised datacentres

More from The Register

next story
Gigantic toothless 'DRAGONS' dominated Earth's early skies
Gummy pterosaurs outlived toothy competitors
Vulture 2 takes a battering in 100km/h test run
Still in one piece, but we're going to need MORE POWER
TRIANGULAR orbits will help Rosetta to get up close with Comet 67P
Probe will be just 10km from Space Duck in October
Boffins ID freakish spine-smothered prehistoric critter: The CLAW gave it away
Bizarre-looking creature actually related to velvet worms
CRR-CRRRK, beep, beep: Mars space truck backs out of slippery sand trap
Curiosity finds new drilling target after course correction
'Leccy racer whacks petrols in Oz race
ELMOFO rakes in two wins in sanctioned race
What does a flashmob of 1,024 robots look like? Just like this
Sorry, Harvard, did you say kilobots or KILLER BOTS?
NASA's rock'n'roll shock: ROLLING STONE FOUND ON MARS
No sign of Ziggy Stardust and his band
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.