[In honor of whatever educational technology conference you next attend…] 30 fantastic free apps for pre-readers! 38 of the best elementary learning apps for students! 40 iPad apps for scienc…
Educators need learning advocacy, not technology advocacy | Dangerously Irr
Russ Goerend said in a recent comment at this blog: I’m asking for a simple change in mindset and approach: Ed tech advocate: We should use Skype! Learning advocate: We should connect our kid…
Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using
We all know that Edward Snowden insists on secure email, but he's also very picky about his operating systems, too. In fact, he uses a free, super-secure
Police Convict Chile Drug Trafficker After Discovering Secret Code - InSigh
Authorities in Chile have used a secret code belonging to drug dealers to convict a suspect, in a case showing that, while criminal methods are constantly evolving, the most basic techniques can still throw authorities off the trail.
Staying aware of things is always the best advice for anyone who connects her/his computer to the internet. We were really made aware of this over the past week with the announcement of the Heartb…
Drop Everything! Here's How to Secure Your Data After Heartbleed: The Worst
This time it's serious. Really. The largest web security vulnerability of all time went public on Monday, April 7th, 2014, resulting in widespread panic...
NSA monitors WiFi on US planes ‘in violation’ of privacy laws
Companies that provide WiFi on US domestic flights are handing over their data to the NSA, adapting their technology to allow security services new powers to spy on passengers. In doing so, they may be in violation of privacy laws.
I have met too many IT leaders that don’t get the urgency and importance of evolving past merely managing IT organizations to orchestrating strategically focused, business technology organizations. Making the distinction between traditional IT versus the concept of business technology has profound c
To Listen Without Consent – Abusing the HTML5 Speech
tl;dr; I found a bug in Google Chrome that allows an attacker to listen on the user speech without any consent from the user and without any indication. Even blocking any access to the microphone under chrome://settings/content will not remedy this flaw. Try the live demo… (Designed
17 Ways to Meet Tomorrow's Challenges - Leadership Freak
It’s Sunday afternoon. While others are relaxing, Monday weighs on your mind. You’re preparing to meet the problems, opportunities, issues, and challenges
One of the most touted benefits of a Chromebook is its security. But are there any steps that owners can take that will improve and enhance the current level of protection?