Resources

3173 bookmarks
Newest
Google Forms for Teachers- A Must Read Guide
Google Forms for Teachers- A Must Read Guide
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
·educatorstechnology.com·
Google Forms for Teachers- A Must Read Guide
9 Starter Tips for Teachers Who Just Got A New iPad
9 Starter Tips for Teachers Who Just Got A New iPad
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
·educatorstechnology.com·
9 Starter Tips for Teachers Who Just Got A New iPad
Educators Technology
Educators Technology
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
·educatorstechnology.com·
Educators Technology
Chrome’s insane password security strategy
Chrome’s insane password security strategy
Chrome does something interesting when you first run it. The other day, I was using Chrome in development for an Ember.js app. I use Safari for day-to-day browsing, but it has a habit of aggressively caching files when I least expect it, so from... | Elliott Kember | Drone developer, software pilot.
·blog.elliottkember.com·
Chrome’s insane password security strategy
Using Metadata to find Paul Revere - Kieran Healy
Using Metadata to find Paul Revere - Kieran Healy
London, 1772. I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner.
·kieranhealy.org·
Using Metadata to find Paul Revere - Kieran Healy