Feeds

Vote, vote, vote for Barbie the computer engineer

Life in Plastic. It's fantastic

Secure remote control for conventional and virtual desktops

Our friends at insideHPC pushed this story recently, but there hasn’t been an accompanying groundswell of buzz, so I’m bringing it to The Register’s audience in an attempt to get the ball rolling.

Mattel, purveyor of the iconic Barbie doll, is running a contest to decide Barbie’s next career. She has quite a wide range of choices for her new job, including surgeon, architect, environmentalist, news anchor, and computer engineer.

Barbie’s engineering specialty isn’t specified; we’re not sure if she’ll be outfitted as an ASIC designer, I/O specialist, or systems architect, to name a few options. I’m betting that, if asked what kind of computer engineer Barbie might be, Mattel would respond, “A cute and stylish one, with long legs and an enormous chest.”

Much of the profit in the Barbie biz is in the accessories, not in the doll itself. So what kind of kit would there be? This is where “Computer Engineer Barbie” needs the most help.

It’s easy to imagine a whole set of clothing and other gear that could be sold alongside “News Anchor Barbie” and “Doctor Barbie.” Even “Environmentalist Barbie” could have various shovels, rakes, tiny protest signs, and even tinier markers for writing slogans on the signs.

But what would you sell with “Computer Engineer Barbie?” On the clothing front, not that much. But if we use our imaginations, we can construct an entire exciting environment that could be peddled for big bucks...Barbie’s cubicle, complete with a worn-out chair, a PC, and various types of cube litter, like candy wrappers and empty cans of Red Bull. Or perhaps her own compute cluster, with a pink paint job and heart stickers. Upgrades would include adding more nodes, of course – and, over time, increasing the network bandwidth. Pretty exciting and compelling stuff, right?

To make Computer Engineer Barbie a reality, we need to vote, people. Of all the career choices listed, I’d argue that computer engineers have brought about more positive change than any of the alternatives on the ballot. Computer engineers deserve to have their own Barbie. Make it happen: vote here. The winning occupation is announced on February 12.

Internet Security Threat Report 2014

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.