Edutech for Teachers » Blog Archive » Why We Should All Learn Coding
Resources
TechNotes Blog - TCEA
Control Alt Achieve: 4 Fantastic Rubric Tools for Google Docs
On the 4th day of Tech-Mas my true love gave to me… four rubric writers. Note : This post is part of my " 12 Days of Tech-Mas " series f...
MS Office Goes Chrome, er, Android - TechNotes Blog - TCEA
Running MS Office on a Chromebook can be problematic. This blog offers two possible solutions to let you have your Chrome and Office it, too. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
How to Encrypt Your Texts, Calls, Emails, and Data
Want to keep outsiders from listening in on your chats, phone calls, and more? Encrypt them. All of them.
Creating a Matching Activity with Google Slides #edtech #GAFE | Micah Shipp
Visit the post for more.
Virtual Classrooms are the Future of Teacher Education - The Tech Edvocate
Spread the lovePreparing education students to become classroom teachers is a challenging task. There are lots of skills that are easy to teach—how to write a lesson plan, or the best method for teaching basic reading skills, for example. But there are just as many skills that are nearly impossible to teach in the classroom. How can a professor teach future educators how to manage a classroom of behavioral challenges or keep their cool when a student challenges their authority? The answer may lie in the virtual classroom. The virtual classroom is a brand new technology that’s quickly spreading to […]
HyperDocs are AWESOME! - Teaching with Technology
The HyperDocs Handbook is AWESOME! Check out how you can use this great idea in your classroom to create a more student-centered environment!
EdTech in My Classroom: Google Cast for Education - Teaching with Technolog
Google Cast for Education is a fantastic extension that allows me to share information with my students from anywhere in my room!
11 Tips to Prevent Customer Data Breaches
To help your business avoid the damages and costs of a data breach we interviewed experts to glean their best tips on keeping your customer's data safe.
Equifax to Uber: Biggest data breaches and leaks that rocked the world in 2017
From Anthem and Chipotle to Equifax and Uber, this year saw several data breaches and leaks.
Kimberly Buck on Twitter: "Writers draft their #literaryessays by putting t
Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?
Cybersecurity has expanded far beyond its traditional domain of external threats, typified by external hackers attacking network vulnerabilities. It now includes insider threats, which are much more complex and difficult to manage. The nature of insider threats can be categorized into malicious, accidental, or negligent, and account for a combined 39% of all data breaches according to recent research. But by employing a modern breed of analytics that enables organizations to analyze documents for sensitive content, review user actions, and track the flow of data across the enterprise, cybersecurity stakeholders can now identify many common indicators of negligent or malicious activity, including accessing, moving, or deleting large volumes of sensitive content; inappropriately creating, storing, or sending sensitive content; or expressing extreme negative sentiment towards the organization in messages. Increasingly, technology and improved practices can help you identify those employees who are most at risk of exposing your company to a cyberattack – before it becomes a major problem.
News Reports – EdTech Strategies
Makin' It Merry - TechNotes Blog - TCEA
Looking for a few making projects to celebrate the holiday season? Check out these merry finds to add some holiday cheer. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
Miguel Guhlin on Twitter: "RT #EdTech Appreciation Day is coming up fast! N
What happens after one of the largest government data breaches in US history?
More than two years after OPM was hacked — twice — ripple effects are still felt across U.S. agencies and the third parties they associate with.
PD, Planning and Tech Investment Are Integral to Blended Learning Success |
A new report finds teachers are more successful at changing classrooms when they have support from schools and districts.
STEM Sparkles for Student Learners - TechNotes Blog - TCEA
Make learning sparkle for your students with these STEM resources, activities, and apps. Try them with your students for exhilirating merriment! Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
YOU Belong in STEM
YOU Belong in STEM is an initiative designed to strengthen and increase science, technology, engineering and mathematics (STEM) education nationwide.
Ed Tech Hero
BYOT Archives - TechNotes Blog - TCEA
Explore posts tagged with BYOT on TCEA TechNotes Blog. Discover resources, tips, and strategies for educators and digital learning.
http://www.tcea.org/blog/guarding-student-privacy/
Safeguarding Student and School Privacy – TCEA TechNotes Blog
Ensuring that your network and student privacy are guarded can be a difficult task. TCEA's Leadership Summit has resources to help you be successful. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
Encryption: Friend or Foe for Texas Schools?
Recent attacks on data in schools points to a lack of knowledge in basic security practices like encryption. This blog offers advice on how to stay safe. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
Surviving a Leadership Transition – TCEA TechNotes Blog
How can you survive and excel when there is a leadership transition in your district? This blog offers seven critical tips to help you. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
Strategizing Your BYOT Implementation, Part 4 - TechNotes Blog - TCEA
This is the fourth post in a continuing series on how to best strategize your BYOT implementation for complete success for students and staff. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
Strategizing Your BYOT Implementation, Part 3 - TechNotes Blog - TCEA
https://www.tcea.org/blog/strategizing-byot-part-2/
https://www.tcea.org/blog/strategizing-byot-part-1/