Planning the Tech PD: Why Aren’t “Reluctant” Teachers Attending Training? |
Resources
Protecting Student Privacy In The Data Age
Is Student Data Safe?
Don’t Let Unclear Leadership Go NUCLEAR
iPads in the classroom: embedding technology in the primary curriculum
iPads and iPods are influencing all areas of learning in David Andrews' classroom. He reveals how he's using technology to teach writing, reading, maths and science
6 Mac Chrome Apps Teachers Should Have
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
800,000 in danger of ID theft after laptop theft
Dallas Morning News
20 Ways to Integrate iPad in Your PBL Classroom
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Encryption is coming FAST… so don’t wait
Confessions of a ONCE Paperless Principal
Practical tips, leadership strategies, and professional development for school principals.
World's leading authors: state surveillance of personal data is theft
500 signatories including Günter Grass, Margaret Atwood and Martin Amis demand 'digital bill of rights' to curb state abuses
http://www.educatorstechnology.com/2013/12/easily-organize-your-dropbox-files-with.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+educatorstechnology/pDkK+(Educational+Technology+and+Mobile+Learning)&m=1
http://dmlcentral.net/blog/s-craig-watkins/rethinking-‘race-between-education-and-technology’-thesis?utm_content=buffer431fe&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
How To Encrypt Your Android Smartphone or Tablet
Encrypting an Android device is a good idea if there's sensitive data stored on it locally. Encrypting it is easy, but there's a few things to keep in mind.
JP Morgan Chase owns up to data breach: 465,000 customers at risk
encrypted messages for Android
Almost 2 million Facebook, Google, Twitter and Yahoo accounts compromised i
Seven Ways to Defeat Hopelessness - Leadership Freak
Hope is a way of thinking when things are uncertain.
iPad Cases
Preserving the essence of age-old techniques, our USA-based artisans skillfully handcraft iPad cases, covers, and sleeves that effortlessly blend tradition and technology to meet modern needs. Available in all iPad, Air, Mini and Pro models and with a wide selection of materials and styles.
The Government’s Secret Plan to Shut Off Cellphones and the Internet, Explained
Everything you need to know about the 'Internet kill-switch.'
Avoiding “Unmitigated Disasters”
Redefining the Writing Process with iPads
Beth Holland of EdTechTeacher introduces the concept of Writing 3.0, which is what happens when we redefine the writing process with iPads.
Classroom Flipping: Jump Over The Hurdles
When technology boomed inside the territories of the global hemisphere, all aspects of human life were vastly affected. Especially, the educational sector brought in huge wonders. Students were shoved off the heavy burden of following the same boring
Six Steps to Make Staff Development Sticky
New Interesting Chart on Growth Vs Fixed Mindsets
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Death and the NSA: Motherboard Meets Bruce Schneier
Encryption ethics: are email providers responsible for privacy?
Ex-National Security Agency (NSA) employee Edward Snowden’s various leaks – the most recent being a slide showing that the NSA infected 50,000 of computer networks with remote-controlled spyware – confirm…
Edit your Evernote notes in real-time with others!
LiveMinutes is a very cool app that integrates with Evernote (my all time favorite and most used app) and allows you to work on the sa...
Prey: reliable device tracking and security tool
Prey offers a decade of experience in device tracking and security tools to protect laptop, phones, and tablets across multiple OS.
A Primer for EdTech: Tools for K-12 and Higher Ed. Teachers