Blog



How to protect yourself against the Chinese Google hack – Computerworld Blogs By now you probably have heard about the “Google Hack”.  If not, here’s a recap.  Earlier in the week, Google announced on their blog that they were hacked in November (along with other companies in the Financial, Technology, […]

How to protect yourself against the Chinese Google hack – ...


This entry is part 15 of 22 in the series Learning to ProgramOk so we’ve covered the first three stages (defining the “problem” with IPO charts and PAC charts, flowcharting the program, and pseudocode and/or UML diagrams for the program).  Now we’re on to actually coding the program in the […]

Learning to Program – (Stage 4) Coding





This entry is part 13 of 22 in the series Learning to ProgramIn today’s post I will discuss methods and classes, and describe how to use them in pseudocode.  Methods and classes are inherently the same thing, but there are differences between them.  Especially when you get to actual programming […]

Learning to Program – Stage 3: Pseudocode—Methods