Computer programmers write, revise, test, debug, and maintain the programs that instruct computers how to carry out certain tasks. Programmers write these instructions in coding languages like Java or C++, which computers can then follow. The job of a programmer may involve of a great deal of coding to very little coding in the case of some management positions.
Database Engineers develop, implement, manage and maintain databases that enable you to find a friend's profile on your favorite social media network or find an article in an online library. These professionals define all of the parameters needed to store, retrieve, and delete data. Database engineers monitor, test, troubleshoot, and enhance databases as they grow and change.
Desktop support technicians provide technical assistance to an organization's end-users. They solve problems, answer questions, and provide instructions on how to use technology. These professionals may be part of an organization's IT department or hired on a contracting basis.
Have you ever had a computer problem and wished there was someone to call? Helpdesk support professionals help end-users or customers by diagnosing and assisting with technical problems. These professionals communicate with users in-person, via phone or electronically to address technical hardware and software issues.
IT operations manager
IT operations managers keep the gears of an organization's technical operations running smoothly. They oversee day-to-day processes including performance management, monitoring and evaluation, measuring success, IT purchasing, compliance with policies, infrastructure improvements, and resource maintenance.
IT training professionals ensure that employees and end-users remain technologically savvy through the design, delivery and assessment of training programs. Training topics may include desktop applications, internet browsers, or company specific applications. They might also cover IT professional skills such as project management, security protocols, or programming languages.
Network engineers care for an organization's technological "nervous system" by ensuring that communication networks operate smoothly and efficiently for users and customers. They install, maintain, and support IT systems such as T1 lines, routers and firewalls. These professionals may be part of the IT department or be brought in as part of an IT consultancy.
Have you ever wondered how the next version of your favorite phone or tablet gets released so quickly? Project managers strive to keep the projects that turn ideas into reality on time, on task and on budget. They marry technical knowledge with supervisory skills to lead a team and ensure that projects are completed efficiently and effectively.
Quality assurance analysts ensure that technical products, processes, and equipment receive the gold seal of approval before being released to the customer or end user. They are responsible for establishing quality assurance measures and test plans for IT products or processes. They ensure products work effectively and are in compliance with policies, procedures, and specifications.
Have you ever used a technological product or service that was truly designed with you, the user in mind? Thank a requirements analyst. Requirements or architecture analysts find out what end-users need with regards to a technological product, platform or system. They then work closely with the development team to ensure that those needs are met in the finished product.
Sales analysts connect clients and customers with technological products and services to meet their business needs. They may demonstrate products for customers to help them understand their features. Sales analysts also negotiate sales and follow-up with customers after the sale to ensure satisfaction, identify any problems, maximize usage, and recommend training.
Have you ever wondered how your credit card information is kept safe from hackers when you make an online purchase? Security analysts safeguard and protect an organization's technology and systems from intrusion or harm. They monitor current systems, assess potential threats, and put measures in place to ensure that files are neither deliberately or accidentally changed, damaged, deleted or even stolen.
Software designers create software for an organization or its external clients and customers. They often see a project from inception to completion, taking into consideration the needs of clients or stakeholders. Software designers assess the requirements of the software, and ensure that they are met. They may or may not perform the actual coding for the project.
Software developers research, design, develop, and test software and systems found in technologies ranging from automobiles, to gaming systems, to life saving medical equipment. A software developer can be involved in many different aspects of a project ranging from coding, to design, to project management.
Software is all around us. It is used in smart phones, GPS systems, and digital cameras. Software engineers are responsible for designing, testing, and evaluating the software that we use every day.
Software maintenance engineers are responsible for the care and feeding of software programs and applications. These professionals are tasked with updating, debugging, conforming, and enhancing existing software. Software maintenance engineers ensure that software continues performing without problems and meets the changing needs of users or customers.
Software testers evaluate software from the perspective of the end-users or customers who will be using it. They must test software from all angles to ensure that there are no existing bugs or problems. If issues are found, software testers must document them and communicate them to the development team so they can be corrected.
Technical authors communicate written technical information in a way that is easy for people to understand. Technical authors might create materials such as training manuals, user guides, reference guides, or operating manuals, or even multimedia demos or tutorials.
Web/internet engineers develop web pages and interfaces for an organization's external or internal websites. Responsibilities may include building web sites, internet applications, social media networks, and e-commerce applications through code. They may also include configuring web servers and network security, server-side or client-side scripting, web design and content development.
Video games immerse users in a world of high tech thrills, stunning visuals, unique challenges, and interactivity. They enable users to become a warrior princess or a gruesome ghoul, create a virtual persona, or even develop worlds that other gamers can play on. But before the games of today became reality, they were the dreams of a few innovative individuals.
Roberta Williams is considered one of the pioneers of gaming as we know it today. During the 80’s and 90’s along with husband Ken Williams through their company On-Line Systems, she developed some of the first graphical adventure games. These included such titles as Mystery House, Wizard and the Princess and the popular King’s Quest series. Williams also helped introduce more girls and women to the world of gaming by bringing games developed from a woman’s perspective to mainstream market.
Gordon Bell is a pioneering computer designer with an influential career in industry, academia and government. He graduated from MIT with a degree in electrical engineering. From 1960, at Digital Equipment Corporation (DEC), he designed the first mini- and time-sharing computers and was responsible for DEC's VAX as Vice President of R&D, with a 6 year sabbatical at Carnegie Mellon University. In 1987, as NSF’s first, Ass't Director for Computing (CISE), he led the National Research Network panel that became the Internet. Bell maintains three interests: computing, lifelogging, and startup companies—advising over 100 companies. He is a Fellow of the, Association of Computing Machinery, Institute of Electrical and Electronic Engineers, and four academies. He received The 1991 National Medal of Technology. He is a founding trustee of the Computer History Museum, Mountain View, CA. and is an Researcher Emeritus at Microsoft. His 3 word descriptor: Computing my life; computing, my life.
Have you ever wondered how computers can execute complex commands in mere seconds? John Hennessy is a pioneer of reduced instruction set computing (RISC) architecture which employs small, highly-optimized sets of instructions to greatly enhance computer performance. He was instrumental in transferring the technology, specifically MIPS RISC architecture, to industry. He co-founded MIPS Technologies and co-authored the classic textbook with David A. Patterson, on Computer Architecture.
As Stanford faculty he rose to be the Chairman of the Computer Science Department, Dean of the School of Engineering, then Provost and finally the President of Stanford in 2000 (and till date). Hennessy holds a Master’s and Ph.D. in Computer Science from SUNY Stony Brook. He is an IEEE Fellow and was selected to receive the IEEE Medal of Honor in 2012. Hennessey also launched significant activities that helped to foster interdisciplinary research in the biosciences and bioengineering at Stanford.
It is difficult to imagine a time when computers were not capable of sharing information and resources with great ease. Sandra Lerner pushed the boundaries of network computing as one of the co-founders of Cisco Systems, which introduced one of the first commercially viable routers. The router was born while Sandra was working at Stanford University in the 1980’s after earning her Master’s degree there in Computer Science. To avoid the tedious task of transferring information between computers using floppy disks, she and co-founder of Cisco, Leonard Bosack, created a local area network, or LAN, between their campus offices using a multiprotocol router that Bosack developed. Shortly thereafter the pair started Cisco Systems, and began selling the router which was a success, because it could work with so many different types of computers. After Leaving Cisco in 1990, Lerner started the trendy cosmetics company Urban Decay and became a philanthropist and avid activist for animal rights.
Did you know that computing has been used in military espionage and has even influenced the outcome of major wars? Alan Mathison Turing designed the code breaking machine that enabled the deciphering of German communications during WWII. As per the words of Winston Churchill, this would remain the single largest contribution to victory. In addition, he laid the groundwork for visionary fields such as automatic computing engines, artificial intelligence and morphogenesis. Despite his influential work in the field of computing, Turing experienced extreme prejudice during his lifetime regarding his sexual orientation. There is no doubt that computers are ubiquitously part of our lives due to the infusion of Turing’s contributions.