Feeds

IEEE names 28-year-old woman its new 'Face of Engineering'

'Energiser Bunny' is tech's answer to Megan Fox

Seven Steps to Software Security

Global engineering association the IEEE has chosen a woman described by her supervisors as "the 'Energizer Bunny'" as its designated "New Face of Engineering" for 2010.

Sanna Gaspard, New Face of Engineering 2010 as nominated by the IEEE. Credit: Carnegie Mellon

World Peace? Not specifically. But she does like helping children.

Sanna Gaspard is a PhD student at Carnegie Mellon uni in the States, and was picked as the new face of electronic and electrical engineering for developing technology which will improve the health of newborn babies.

"I was extremely excited about this accolade. I hope this award will encourage young engineers to explore the wealth of career options that exist for engineers. Specifically, I also hope that this award will encourage young women to pursue careers in the transformational field of engineering," said Gaspard, 28, from St Lucia in the Caribbean.

Gaspard's PhD advisor Todd Przybycien, biomedical engineering prof at Carnegie Mellon, praised her entrepreneurial spirit and energy.

"Sanna's unique mix of creativity, resourcefulness and drive coupled with her strong work ethic make me think of her as the 'Energizer Bunny' of biomedical engineering — she is particularly good at knocking down obstacles in the way of her research goals. She is poised to have a great impact in the biomedical device community," says the prof.

Being the new face of electrical and electronic engineering doesn't bring in cash in the same way as being the new face of Armani underwear (like Megan Fox) or Givenchy or whatever. But Gaspard has already created a startup company, TLneoCare LLC, to commercialise her original neonatal tech and is already at work on a medical instrument for detecting pressure ulcers.

The US National Engineers Week has also lately announced its other new faces of various different sorts of engineering like petroleum, civil, HVAC etc: details here. ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.