Who is Women in HPC: Panel Discussion
June 30, 2020 2:30pm – 3:30pm
Who is Women in HPC?
Women in HPC at Purdue is going virtual! It's been a while since we've gotten together as community, and we want to reintroduce ourselves. We will be discussing career paths, what the job actually looks like, and opportunities in HPC. Most importantly, we want to talk what it means to be a woman in HPC (that's you!)
Please join us next Tuesday, June 30 from 2:30-3:30 PM online. Sign up for the meeting on Eventbright
Panel members and moderators include our co-chairs and members of our community:
Carol Song leads the Scientific Solutions group in developing advanced cyberinfrastructure to support scientific discovery and learning in. She has more than 20 years of experience in high-performance and distributed computing, and software development to connect domain scientists to advanced cyberinfrastructure technologies.
Lan Zhao is a research scientist in research computing. She has many years of experience with software development. She led the design and development of multiple geospatial-enabled cyberinfrastructure systems ranging from climate modeling, to hydrology, and isotope modeling.
Carolyn Ellis is a program manager with research computing at Purdue. Her primary focus is developing Purdue's federally regulated research data program. Her research involves developing a Controlled Unclassified Information end-to-end framework.
Tsai-wei Wu is a senior computation scientist with RCAC research support. She strives to help Purdue cluster users and advance women representations in the HPC environment. She has many interests including implementing numerical algorithms, optimizing distributed programs, visualizing scientific data or administering computing clusters.
Nicole Brewer is a software engineer in research computing. She joined WHPC when she was an undergraduate doing mathematics research enabled by the Halstead cluster. Today she develops science gateways: software and interfaces that enable researchers to better utilize their data, software, or cyberinfrastructure resources.