What if Things are Great? | The Heroic Stoic
!Cool Resources
A Closer View | The Principal of Change
George Couros designs dynamic programs to infuse innovation into teaching and leadership, equipping educators with strategies for immediate impact and
World's Biggest Data Breaches & Hacks | Information Is Beautiful
Distilling the world's data, information & knowledge into beautiful infographics & visualizations
Install Rootkit hunter on RHEL/CentOS, Fedora and Debian/Ubuntu | lintut.co
CryptoLocker: What is it? And how do you protect against it?
The UK and US authorities have issued alerts about the CryptoLocker ransomware, infecting Windows computers. Here’s what you need to know.
Around the Corner-MGuhlin.org: Open Source Encryption Tools to Protect #Pri
I was totally unprepared for today’s bombshell revelations describing the NSA’s efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be…
An Open Letter to the Texas Education Agency Education Technology Staff - H
To: John Lopez Managing Director of Instructional Materials and Educational Technology Dear John, Recently, I have had the opportunity to review some new textbooks that are up for adoption across...
30c3 - YouTube
Teacher to Teacher: 7 Steps for Integrating Technology - Getting Smart by A
You’ve attend district and campus staff development. You understand some of what the district’s chosen device can do. It’s time to get started.
NSA reportedly plants spy malware on laptops purchased online | Muktware
19 h svna
1he kr8t
Peer Learning Handbook | Peeragogy.org
30c3: To Protect And Infect, Part 2 - YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
a-e8a5874f-0001-0001-0000-000000941262
iPad As Trojan Mouse – From Justin on EdTechResearcher
EdTechTeacher takes a deep dive into with iPad As Trojan Mouse - From Justin on EdTechResearcher
What Didn’t Happen in Edtech in 2013
Four CEOs share thoughts on what we can do better in 2014
10 Ways to Win at Office Politics - Leadership Freak
Lack of leadership invites backstabbing, gossip, sabotage, game-playing, and foot-dragging. But, don’t expect a savior on a white horse to rescue you after
Putting expensive technology classrooms recipe disaster
Criminals Use Social Media Too
What Are Some Encryption Options for iPhone?
You can encrypt email on an iPhone with your standard Mail app or with apps from the App Store, no jailbreaking required. The Apple experts at Stack
Amazing Facts about Teachers Technology Use in The classroom
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
2013 Blew Apart Our Notions Of Privacy
Anti-Snooping Apps For When Everybody's Watching You
edit Future of Work Sustainable Innovation: Redefining Profit Through Circular Economies Our current way of doing things, where we take resources, make stuff, and then just throw it away, is causing big problems. We’re running out of resources, and the environment… By Jeff Baumgart June 23, 2025 edit Future of Work How Smart Cities Are […]
How to Crack a Wi-Fi Network's WEP Password with BackTrack
You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know
Great iPad Responsible Use Posters for Your Cllass
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Quick to Judge | The Principal of Change
George Couros designs dynamic programs to infuse innovation into teaching and leadership, equipping educators with strategies for immediate impact and
Building Technology Fluency: Preparing Students to be Digital Learners
Edutopia blogger Beth Holland reminds us that we're preparing students for a future that has yet to be invented as she defines technology fluency and offers three strategies for building it into curriculum.
Penetration Testing with Kali Linux – Online Course Update
Annual Credit Report.com - Home Page
ACR Home Page