Feeds

Coding: 'Suitable for exceptionally dull weirdos'

Niche, mechanical skill, a bit like plumbing or car repair

Internet Security Threat Report 2014

Readers' corner Teaching all children to code software is daft and pointless to The Telegraph blogger Willard Foxton. In an article attacking the UK government’s plans to update the ICT curriculum, the “investigative journalist and television producer", writes:

The new rules expect five to seven year-olds to understand the definition of an algorithm years before they are due to be taught algebra, as well as being able to "create and debug simple computer programs". Once they've grasped this, seven to 11 year-olds will have to code programs "in at least two programming languages".

Willard acknowledges that the current ICT curriculum is broken:

For the last decade or so, computing lessons have been dreadful. ICT has become one of those pathetic subjects like Religious Education: taught by the runts of the teaching litter and seen as pointless by pupils.

Ouch. But teaching everyone how to become programmers is not the answer. Why?

I'm all for people to learning to code – I wrote a piece arguing we should teach it in prisons earlier this year – but I think we need to be aware of its limitations. Coding is a niche, mechanical skill, a bit like plumbing or car repair.

As a subject, it only appeals to a limited set of people – the aforementioned dull weirdos. There’s a reason most startup co-founders are “the charming ideas guy” paired with “the tech genius”. It’s because if you leave the tech genius on his own he’ll start muttering to himself.

Sounds like fighting talk in these parts.

Reg readers, what do you make of this? Head this way to the forums. ®

Remote control for virtualized desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.