Computer Programming Code Of Ethics
This article attempts to enumerate the key points of proper conduct for Computer Programmers. Much of this is based on the Code Of Ethics of the now defunct International Programmers Guild.
40 Secret iPhone Features and Shortcuts | iPhone.AppStorm
There are lots of things that you can do with your iPhone, sure, but we’re willing to be that there are a few more that you either don’t know about or haven’t used before, particularly with all of the additions in iOS 5. Did you know you can put in typing shortcuts similar to Text Expander? Or that you can make custom vibrations for each person? If you didn’t — or just want to brush up on your iOS trivia — hit the jump and find 40 top secret, ultra-cool tips for the iPhone.
The Teacher Report: 5 Components of a Great Lesso… – WeAreTeachers
Last month, we sat down with a panel of teachers to learn more about their best lesson ideas. Since then, we’ve read through hundreds of lessons and talked to dozens of teachers to help narrow down exactly what makes a lesson great. And, while there is no one factor that makes a tried-and-true lesson work, we did find five commonalities that seemed to be woven through all of our panelist’s favorite lessons.
50 new tech tools you should know about – CNN.com
New mobile apps, services, social networks and other digital tools pop up so frequently that keeping up with them is a nearly impossible task. Just when you think you’re up to date, something newer and hipper comes along.
Microsoft researchers find new type of stealth malware – 26 Jan 2012 – Computing News
Security researchers have uncovered a new type of malware that appears to be benign as it is downloaded, potentially fooling security software, but which morphs into malicious software once it is on a user’s compute
Posted from Diigo. The rest of my favorite links are here.