{"version":"1.0","provider_name":"CHM","provider_url":"https:\/\/computerhistory.org","author_name":"hhackford","author_url":"https:\/\/computerhistory.org\/blog\/author\/hhackford\/","title":"Math Whizzes and Computing Pros","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zSJm4WNoQ0\"><a href=\"https:\/\/computerhistory.org\/stories\/math-whizzes-and-computing-pros\/\">Math Whizzes and Computing Pros<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/computerhistory.org\/stories\/math-whizzes-and-computing-pros\/embed\/#?secret=zSJm4WNoQ0\" width=\"600\" height=\"338\" title=\"&#8220;Math Whizzes and Computing Pros&#8221; &#8212; CHM\" data-secret=\"zSJm4WNoQ0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/computerhistory.org\/wp-content\/uploads\/2022\/08\/Elecom-102646271-03-02-acc.jpg","thumbnail_width":1,"thumbnail_height":1,"description":"Far from being \u201chidden figures,\u201d women have been working in computing since the earliest days of the new field. They\u2019ve often faced gender bias and discrimination in their own families, schools, and the workplace when pursuing their interest in mathematics, science, engineering, and technology. But they\u2019ve always been there, in plain sight, for those who look for them. Meet some amazing women in tech."}