http://www.writersdigest.com/editor-blogs/guide-to-literary-agents/john-verdon-gc-knowing-and-loving-the-reader
Resources
Succeeding in Emotionally Charged Situations - Leadership Freak
The only progress you can make in emotionally charged situations is dealing with emotions.
Where Are Your Encryption Keys?
Businesses that do not encrypt their information risk losing it. Legal professionals risk private and confidential client information when they do not take steps to secure it properly. Your operating system has encryption built in, through Windows Bitlocker or Mac File Vault II. If you are one of those lawyers on an older version of […]
Pepper Spray Drones
Coming soon to a protest near you: drones that fire pepper spray bullets. Desert Wolf’s website states that its Skunk octacopter drone is fitted with four high-capacity paintball barrels, each capable of firing up to 20 bullets per second. In addition to pepper-spray ammunition, the firm says it can also be armed with dye-marker balls and solid plastic balls. The machine can carry up to 4,000 bullets at a time as well as “blinding lasers” and on-board speakers that can communicate warnings to a crowd.
More on Hacking Team's Government Spying Software
Hacking Team is an Italian malware company that sells exploit tools to governments. Both Kaspersky Lab and Citizen Lab have published detailed reports on its capabilities against Android, iOS, Windows Mobile, and BlackBerry smart phones. They allow, for example, for covert collection of emails, text messages, call history and address books, and they can be used to log keystrokes and obtain search history data. They can take screenshots, record audio from the phones to monitor calls or ambient conversations, hijack the phone’s camera to snap pictures or piggyback on the phone’s GPS system to monitor the user’s location. The Android version can also enable the phone’s Wi-Fi function to siphon data from the phone wirelessly instead of using the cell network to transmit it. The latter would incur data charges and raise the phone owner’s suspicion...
Role reversal: Writing Workshop with Linda Rief at the Boothbay Literacy Retreat
As a writing teacher, I know that I must write – and I do: blog posts, book reviews, a Slice of Life every Tuesday, letters to my students in the reading journals and writer’s notebooks, les…
Meet Onionshare, the File Sharing App the Next Snowden Will Use
A small software app called Onionshare offers the most secure file sharing available. So why hasn't anyone heard of it? Well, mostly because it was
Facebook tinkered with users’ feeds for a massive psychology experiment
The A.V. Club digs deep into film, TV, music, games, books and more.
3 Minute Teaching With Tech Tutorial – Using TedEd for Flipped or Blended L
Which VPN Services Take Your Anonymity Seriously? 2014 Edition
German government to drop Verizon because of U.S. spying
‘Illegal Spying Below’ blimp flies above NSA data center
Anti-surveillance activists flew a blimp above the National Security Agency’s massive, $1.5 billion data center in Bluffdale, Utah on Friday as an act of protest against the NSA’s contentious collection of vast amounts of the world’s digital data.
Telegram - Chrome Web Store
Telegram Web App.
More info & source code here: https://github.com/zhukov/webogram
Flash-Drafting Leads to Large-Scale Revision
Flash-drafting helps get thoughts down on the page quickly so writers are open to large-scale revisions.
Telegram Desktop
Experience Telegram on your computer in a swift and seamless way.
http://mobile.theverge.com/2014/2/25/5445864/telegram-messenger-hottest-app-in-the-world
Telegram – a new era of messaging
Fast. Secure. Powerful.
Educational Technology Is Making Achievement Gaps Even Bigger
The local name for the Philadelphia neighborhood of Kensington is “the Badlands,” and with good reason. Pockmarked with empty lots and burned-out row...
This Site Shows Who Is Hacking Who Right Now
The U.S. was far and away the most popular hacking target in the world.
Supreme Court Says Phones Can’t Be Searched Without a Warrant
In a unanimous decision, the Supreme Court ruled that the vast amount of data contained on modern cellphones must be protected from routine inspection.
Tocsin Data
We find Everything.
Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones
Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently \[…\]
What Technology Does What: An #edtech Chart For Teachers
What technology does what? This edtech chart collects examples of edtech tools in a range of categories for teaching and learning.
Setting Up Your Google Classroom
Thoughts, ideas, and comments on educational technology by author and speaker John Sowash
EFF and 31 Other Organizations Call for Privacy Assessment of FBI's Biometr
The FBI plans to roll out the face recognition component of its massive Next Generation Identification (NGI) biometrics database this summer—but the Bureau has six years of catching up to do in explaining to Americans exactly how it plans to collect, use and protect this data. Today we called on...
Supreme Court holds that privacy rights apply to cellphones, police need a
How an Attacker Could Crack Your Wireless Network Security
It's important to secure your wireless network with WPA2 encryption and a strong passphrase.
The Ultimate Guides About VPNs, Data Privacy & Restrictions
VPN Guides and technical articles covering online security, how and where to use VPNs, online security guides, identity protection...
The paranoid computer user's guide to privacy, security and encryption
An update to the Globe and Mail Guide to Safer Computing
Why I Built OwnCloud and Made It Open Source