http://www.educatorstechnology.com/2013/05/a-simple-guide-on-use-of-hashtag-for.html?m=1
Resources
Assessment Magic! - Bridge Point Elementary Educational Technology Departme
http://www.educatorstechnology.com/2013/05/7-steps-to-grow-professionally-using.html?m=1
15 Ways to Make Your Voice Matter | Leadership Freak
Pathetic talkers - talk after listeners check out. Blabbing leaders have something to say and it doesn’t matter that people in the room have turned to bored,
The Truth About Great Leadership | LeadToday
There is simply a ton of stuff written about leadership. You can find it all over the web. There are sections in libraries and bookstores dedicated to the topic. I’m not sure we could even co…
Learning With Multiple Forms of Media
George Couros designs dynamic programs to infuse innovation into teaching and leadership, equipping educators with strategies for immediate impact and
Educational Leadership:Faces of Poverty:Put the "Personal" in Your PLN
21 Ways to Use Edmodo in your Classroom
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
How schools can protect student data | Faronics
Schools store a ton of confidential information about their students. They need to take steps to protect it. Read about essential data protection practices for schools, including developing a security plan, applying firewalls, using encryption, securing devices, and wiping unnecessary data.
Van Meter Library Voice: Stop. Look. Listen. To The 5th Graders Awesome Dig
A library and education blog and place to be heard through creating, technology, connecting, reading, collaborating and noise.
Silent Circle, The New Encryption App That Is Terrifying The Government
Silent Circle, The New Encryption App That Is Terrifying The Government
The idea is to “democratize encryption” by making it available to the non-tech-savvy w…
Pure Madness: U.S. Aims to Force Web Services to Compromise Message Encrypt
Are all telephone calls recorded and accessible to the US government? | Gle
Glenn Greenwald: A former FBI counterterrorism agent claims on CNN that this is the case
Twiterature – The Art Of Literature On Twitter
You can find Twitter users sharing their poetry, short stories, and even the work of famous writers, all in little bite-sized 140-character updates. If you're not sure where to start on your literary journey on Twitter, we've got a few tips to get you going - from who to follow, what hashtags to keep an eye on, and even how to get your Twitterary works out to a wider audience.
Stephen's Web
Commentary on Stephen's Web ~ Moocs and K12 Cloud: Privacy regulations and Risk Management by Stephen Downes. Online learning, e-learning, new media, connectivism, MOOCs, personal learning environments, new literacy, and more
Personal emails win privacy in Texas House vote
Texas considers banning employers from Facebook snooping
Texas could be the latest state to protect your right to hide your social media profiles from your boss.
Confronting Toxicity | Leadership Freak
INFOGRAPHIC: How Facebook’s Graph Search Affects Your Privacy
News and insights from our editors, reporters and columnists, including coverage of lead-based digital marketing that occurs when a brand or retailer pays a platform or publisher for a lead, click or sale via SEM, SEO, direct mail, commerce, mobile, email and chat messaging.
Results Coaching: The New Essential for School Leaders by Kathryn M. Kee |
Discover how RESULTS coaching can foster continuous growth and improvement in your entire staff!RESULTS coaching is a leadership model based on coaching relationships with staff members to help them grow as professionals. Built upon the International Coach Federation...
The Time-Tested Dos and Don’ts of Using Classroom Technology | Fluency21 –
Sitemizi sizleri en iyi iddaa bahis siteleriyle buluşturmak için açmış bulunmaktayız arkadaşlar. Burada Türkiye'nin seçilmiş kaliteli ve güvenilir bahis sitelerini bulabilirsiniz. Kayıt, üyelik, para yatırma, para çekme, canlı bahis, giriş veya mobil giriş gibi birçok konuya değinerek en ince ayrıntısına kadar sitelerin detaylarını sizlere sunmaktayız. Ayrıca bahis hakkında çok çeşitli bilgiler de bulma şansınız var.
SAGA Educators | Bring Your Own Device (BYOD) Technology Policies Need a Cl
Chinese Hackers Infiltrate US Army Database, Compromise Safety of Dams - Sl
coolnumbr12 writes "Chinese hackers have infiltrated a sensitive U.S. Army database that contains information about the vulnerabilities of thousands of dams located throughout the United States. The U.S. Army Corps of Engineers' National Inventory of Dams (NID) has raised concerns that information g...
5 Myths of Mobile Writing – from Beth on Edudemic
New Surveillance Laws Could Cripple Facebook, Google, US Innovation
Infographic: The True Cost of Full Disk Encryption
Infographic: What You Need To Know About Facebook and Privacy
27 Tips to Effectively Manage your Classroom
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
Apple's Privacy Record Sucks. Here's Why You Should Care
Official Google Enterprise Blog: Education On Air: Connecting teachers and
Posted by Tia Lendo, Google in Education Team Twelve years ago, in my first year teaching, I often felt very isolated. Not only was my fourt...