glenncastillano.blogspot.com
glenn
http://glenncastillano.blogspot.com/2009/01/video-hands-on-with-new-sony-vaio-p.html
CLICK HERE FOR BLOGGER TEMPLATES. Tuesday, January 27, 2009. Video: Hands on with new Sony VAIO P Series netbook / laptop. It's been a good few weeks since we learnt that Sony was entering the netbook arena, with their latest flagship laptop the VAIO P Series. Latest gadgets: Hydro powered clock will run forever. 26 Jan 2009 No Comment. Basically, it is eco friendly as it needs no batteries, completely harmless to the environment and will run forever and ever and ever and ever! Alivio, Teresa Grate.
glenncastillano.blogspot.com
glenn: glenn
http://glenncastillano.blogspot.com/2009/01/glenn.html
CLICK HERE FOR BLOGGER TEMPLATES. Friday, January 16, 2009. Glitterfy.com - *Glitter Photos*]. Subscribe to: Post Comments (Atom). Website in Latest Technologies. Http:/ blog.gadgetlite.com/. Math Algebra Tutorial Websites. Http:/ math.about.com. Http:/ tutorial.math.lamar.edu. Http:/ www.mathpower.com. Http:/ www.purplemath.com. Http:/ www.wtamu.edu. Alivio, Teresa Grate. Espera, Marlee Mae. Kitchon, Gegilia Natasha. Ramirez, Charmie Dale. Tan, Brien Lee. Tilacas, Haydee Jade. View my complete profile.
glenncastillano.blogspot.com
glenn: gLenn
http://glenncastillano.blogspot.com/2008/11/glenn.html
CLICK HERE FOR BLOGGER TEMPLATES. Saturday, November 29, 2008. Glitterfy.com - *Glitter Photos*]. Subscribe to: Post Comments (Atom). Website in Latest Technologies. Http:/ blog.gadgetlite.com/. Math Algebra Tutorial Websites. Http:/ math.about.com. Http:/ tutorial.math.lamar.edu. Http:/ www.mathpower.com. Http:/ www.purplemath.com. Http:/ www.wtamu.edu. Alivio, Teresa Grate. Espera, Marlee Mae. Kitchon, Gegilia Natasha. Ramirez, Charmie Dale. Tan, Brien Lee. Tilacas, Haydee Jade. View my complete profile.
glenncastillano.blogspot.com
glenn: Tonight
http://glenncastillano.blogspot.com/2009/01/tonight.html
CLICK HERE FOR BLOGGER TEMPLATES. Saturday, January 17, 2009. Tonight - Fm Static Music Code. Subscribe to: Post Comments (Atom). Website in Latest Technologies. Http:/ blog.gadgetlite.com/. Math Algebra Tutorial Websites. Http:/ math.about.com. Http:/ tutorial.math.lamar.edu. Http:/ www.mathpower.com. Http:/ www.purplemath.com. Http:/ www.wtamu.edu. Alivio, Teresa Grate. Espera, Marlee Mae. Kitchon, Gegilia Natasha. Ramirez, Charmie Dale. Tan, Brien Lee. Tilacas, Haydee Jade. View my complete profile.
glenncastillano.blogspot.com
glenn: The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute.
http://glenncastillano.blogspot.com/2009/01/ten-commandments-of-computer-ethics_25.html
CLICK HERE FOR BLOGGER TEMPLATES. Sunday, January 25, 2009. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. 1) Thou shalt not use a computer to harm other people:. If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. The Internet...
glenncastillano.blogspot.com
glenn: "Computer Ethics"
http://glenncastillano.blogspot.com/2009/01/computer-ethics_25.html
CLICK HERE FOR BLOGGER TEMPLATES. Sunday, January 25, 2009. Is a branch of practical philosophy. Which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner. In the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics. Alivio, Teresa Grate.
glenncastillano.blogspot.com
glenn: "About Computer Ethics"
http://glenncastillano.blogspot.com/2009/01/about-computer-ethics.html
CLICK HERE FOR BLOGGER TEMPLATES. Sunday, January 25, 2009. The computer security professional needs both to understand and to influence the behavior of everyday computer users. Traditionally, security managers have concentrated on building security into the system hardware and software, on developing procedures, and on educating end users about procedures and acceptable behavior. Now, the computer professional must also help develop the meaning of ethical computing and help influence computer en...