Peer Learning Handbook | Peeragogy.org
30c3: To Protect And Infect, Part 2 - YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
a-e8a5874f-0001-0001-0000-000000941262
iPad As Trojan Mouse – From Justin on EdTechResearcher
EdTechTeacher takes a deep dive into with iPad As Trojan Mouse - From Justin on EdTechResearcher
What Didn’t Happen in Edtech in 2013
Four CEOs share thoughts on what we can do better in 2014
10 Ways to Win at Office Politics - Leadership Freak
Lack of leadership invites backstabbing, gossip, sabotage, game-playing, and foot-dragging. But, don’t expect a savior on a white horse to rescue you after
Putting expensive technology classrooms recipe disaster
Criminals Use Social Media Too
What Are Some Encryption Options for iPhone?
You can encrypt email on an iPhone with your standard Mail app or with apps from the App Store, no jailbreaking required. The Apple experts at Stack
Amazing Facts about Teachers Technology Use in The classroom
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
2013 Blew Apart Our Notions Of Privacy
Anti-Snooping Apps For When Everybody's Watching You
edit Future of Work Sustainable Innovation: Redefining Profit Through Circular Economies Our current way of doing things, where we take resources, make stuff, and then just throw it away, is causing big problems. We’re running out of resources, and the environment… By Jeff Baumgart June 23, 2025 edit Future of Work How Smart Cities Are […]
How to Crack a Wi-Fi Network's WEP Password with BackTrack
You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know
Note Taking Template
Note Taking Template | Take better notes in your next meeting with this free 3 column notes template based on the Cornell system. | Increase your meeting retention | Take action quickly when you get back to your desk. | Stop forgetting important items. | Note taking template for Word included.
Great iPad Responsible Use Posters for Your Cllass
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Quick to Judge | The Principal of Change
George Couros designs dynamic programs to infuse innovation into teaching and leadership, equipping educators with strategies for immediate impact and
Building Technology Fluency: Preparing Students to be Digital Learners
Edutopia blogger Beth Holland reminds us that we're preparing students for a future that has yet to be invented as she defines technology fluency and offers three strategies for building it into curriculum.
Penetration Testing with Kali Linux – Online Course Update
Annual Credit Report.com - Home Page
ACR Home Page
Identity Theft | Consumer Information
Important Notice: unauthorized access to payment card data in U.S. stores
Target says 40 million accounts hit by security breach | Toronto Star
No Canadian stores affected, company says.
Target Hacked, Credit Cards and Private Data for 40 Million Stolen
Earlier this week, word came out that Target was the victim of a massive hack that exposed the credit card numbers and other personal, private data
Planning the Tech PD: Why Aren’t “Reluctant” Teachers Attending Training? |
Protecting Student Privacy In The Data Age
Is Student Data Safe?
Don’t Let Unclear Leadership Go NUCLEAR
iPads in the classroom: embedding technology in the primary curriculum
iPads and iPods are influencing all areas of learning in David Andrews' classroom. He reveals how he's using technology to teach writing, reading, maths and science
6 Mac Chrome Apps Teachers Should Have
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
800,000 in danger of ID theft after laptop theft
Dallas Morning News