L Names: Famous People in Technology

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Index

L

Lerner, Sandy

Co-founded Cisco Systems Inc. In 1984, Lerner and Len Bosack developed the first commercially successful network router — a device that enables once-incompatible computers in far-off computer networks to communicate — while they were managers of two computer networks at Stanford University. The router enabled the two networks to share data. Lerner and Bosack founded Cisco System using their new technology. Lerner left Cisco after the company went public in 1990 and is currently the CEO of Urban Decay, a cosmetics company.

Licklider, J.C.R.

1915(b.)-1990(d.) Psychologist, psychoacoustitician and computer scientist. He was the first director of ARPA’s Information Processing Techniques Office and was a leader in developing time-sharing and interactive computing systems. His program at ARPA supported the development of computer science PhD programs at four of the first universities to offer graduate degrees in computer science.

Lovelace, Ada Byron

1815(b.)-1852(d.) Daughter of Lord Byron. Considered to be the world’s first programmer. In 1843, she published an article based on the work of Charles Babbage in which she predicted that a calculating engine proposed by Babbage could be used to compose complex music, to produce graphics, and would be used for both practical and scientific use. She suggested to Babbage writing a plan for how the engine might calculate Bernoulli numbers. This plan is now regarded as the first “computer program.” A software language developed by the U.S. Department of Defense was named Ada in her honor in 1979.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Index

This article was originally published on June 24, 2010

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...

IT Due Diligence

Information technology (IT) due diligence is the process of investigating and understanding a...

IT Support Specialist

In the world of digital transformation, organizations are being compelled to integrate technology...