Apple's Patriot-Act-detecting "warrant canary" dies
It's been less than a day since the company published its new, excellent privacy policy — but Gigaom has noticed that the latest Apple transparency report, covering Jan 1-Jun 30…
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Forget iPads, Education Needs a Whole New Framework
The biggest problem with our educational system is that it's big business. And the education-technology revolution, while claiming to be the answer to our outdated system, only fuels the money machine, providing zero incentive to make changes that will truly help our children.
Leadership Day Challenge: Connect, Curate and Contribute
The Challenge: Connect, Curate and Contribute! I’m very excited to take part in Leadership Day 2014! I feel it is important to consider all types of educational leaders, from classroom to campus level, from campus level to district level, and everyone in between. Our number one goal as educators should always be our students, and finding ways to support, engage, improve and transform the learning experience. Below are three challenges I have have for educational leaders.
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t \[…\]
Feds haven’t reached out about massive password cache – IT firms struggle t
IT firms struggle to fix busted Web padlock — Black Hat’s big idea: U.S. should buy zero days — Beijing says it won’t buy Apple products
So Google scans email for dodgy images - should we be worried about scannin
You could be forgiven for not having heard of John Henry Skillern. The 41 year old is facing charges of possession and promotion of child pornography after Google detected images of child abuse on …
How to recover files from a CryptoLocker attack, without paying!
Boffins have created a free service to help anyone has fallen foul of the notorious CryptoLocker ransomware that encrypts computer files and demands a ransom be paid for the decryption key.
Technology SAMR Model for Administrators Part 4: Classroom Evaluations
Through the SAMR (Substitution, Augmentation, Modification, and Redefinition) model of technology, administrators can bypass the distractions and interruptions that often interfere with classroom evaluations.