Resources

2960 bookmarks
Newest
MS Office Goes Chrome, er, Android - TechNotes Blog - TCEA
MS Office Goes Chrome, er, Android - TechNotes Blog - TCEA
Running MS Office on a Chromebook can be problematic. This blog offers two possible solutions to let you have your Chrome and Office it, too. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
·tcea.org·
MS Office Goes Chrome, er, Android - TechNotes Blog - TCEA
Virtual Classrooms are the Future of Teacher Education - The Tech Edvocate
Virtual Classrooms are the Future of Teacher Education - The Tech Edvocate
Spread the lovePreparing education students to become classroom teachers is a challenging task. There are lots of skills that are easy to teach—how to write a lesson plan, or the best method for teaching basic reading skills, for example. But there are just as many skills that are nearly impossible to teach in the classroom. How can a professor teach future educators how to manage a classroom of behavioral challenges or keep their cool when a student challenges their authority? The answer may lie in the virtual classroom. The virtual classroom is a brand new technology that’s quickly spreading to […]
·thetechedvocate.org·
Virtual Classrooms are the Future of Teacher Education - The Tech Edvocate
HyperDocs are AWESOME! - Teaching with Technology
HyperDocs are AWESOME! - Teaching with Technology
The HyperDocs Handbook is AWESOME! Check out how you can use this great idea in your classroom to create a more student-centered environment!
·usingeducationaltechnology.com·
HyperDocs are AWESOME! - Teaching with Technology
Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?
Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?
Cybersecurity has expanded far beyond its traditional domain of external threats, typified by external hackers attacking network vulnerabilities. It now includes insider threats, which are much more complex and difficult to manage. The nature of insider threats can be categorized into malicious, accidental, or negligent, and account for a combined 39% of all data breaches according to recent research. But by employing a modern breed of analytics that enables organizations to analyze documents for sensitive content, review user actions, and track the flow of data across the enterprise, cybersecurity stakeholders can now identify many common indicators of negligent or malicious activity, including accessing, moving, or deleting large volumes of sensitive content; inappropriately creating, storing, or sending sensitive content; or expressing extreme negative sentiment towards the organization in messages. Increasingly, technology and improved practices can help you identify those employees who are most at risk of exposing your company to a cyberattack – before it becomes a major problem.
·flip.it·
Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?
Makin' It Merry - TechNotes Blog - TCEA
Makin' It Merry - TechNotes Blog - TCEA
Looking for a few making projects to celebrate the holiday season? Check out these merry finds to add some holiday cheer. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
·tcea.org·
Makin' It Merry - TechNotes Blog - TCEA
STEM Sparkles for Student Learners - TechNotes Blog - TCEA
STEM Sparkles for Student Learners - TechNotes Blog - TCEA
Make learning sparkle for your students with these STEM resources, activities, and apps. Try them with your students for exhilirating merriment! Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
·tcea.org·
STEM Sparkles for Student Learners - TechNotes Blog - TCEA
YOU Belong in STEM
YOU Belong in STEM
YOU Belong in STEM is an initiative designed to strengthen and increase science, technology, engineering and mathematics (STEM) education nationwide.
·ed.gov·
YOU Belong in STEM
Safeguarding Student and School Privacy – TCEA TechNotes Blog
Safeguarding Student and School Privacy – TCEA TechNotes Blog
Ensuring that your network and student privacy are guarded can be a difficult task. TCEA's Leadership Summit has resources to help you be successful. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
·tcea.org·
Safeguarding Student and School Privacy – TCEA TechNotes Blog
Encryption: Friend or Foe for Texas Schools?
Encryption: Friend or Foe for Texas Schools?
Recent attacks on data in schools points to a lack of knowledge in basic security practices like encryption. This blog offers advice on how to stay safe. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
·tcea.org·
Encryption: Friend or Foe for Texas Schools?
Surviving a Leadership Transition – TCEA TechNotes Blog
Surviving a Leadership Transition – TCEA TechNotes Blog
How can you survive and excel when there is a leadership transition in your district? This blog offers seven critical tips to help you. Explore this and more at TCEA TechNotes Blog, your go-to source for educational technology and teaching innovation.
·tcea.org·
Surviving a Leadership Transition – TCEA TechNotes Blog