50 Education Technology Tools Every Teacher Should Know About Technology and education are pretty intertwined these days and nearly every teacher has a few favorite tech tools that make doing his or her job and connecting with students a little bit easier and more fun for all involved. Yet as with anything related to technology, new tools are hitting the market constantly and older ones rising to prominence, broadening their scope, or just adding new features that make them better matches for education, which can make it hard to keep up with the newest and most useful tools even for the most tech-savvy teachers. Here, we’ve compiled a list of some of the tech tools, including some that are becoming increasingly popular and widely used, that should be part of any teacher’s tech tool arsenal this year, whether for their own personal use or as educational aids in the classroom. Social Learning These tools use the power of social media to help students learn and teachers connect. Learning
Personal and Professional vs. Public and Private cc licensed ( BY ) flickr photo shared by AlphaTangoBravo / Adam Baker During my time over in Australia, there was a lot of talk about the notion of having both a “personal” and “professional” identity on social media. The “personal” account would be one that is used with friends and family, where as the “professional” account would be one that is used with the work that you do in school. Although I understand the notion behind what is being said here, I don’t know if this is what I would really be focusing on when working with students or educators. We should really be focusing on the notion of “public and private” and how that works in our world. This is not to say that you can’t have separate accounts.
[INFOGRAPHIC] Individual is Better Than Exclusive: Why Luxury Brands Should Embrace Social Media The terms “Luxury” and “Exclusivity” are often used, if not interchangeably, then at least with a high degree of overlap. Social networks, on the other hand, are all about openness and sharing. Shouldn’t luxury brands shun social marketing? The experience of luxury brands like Tiffany & Co and Burberry suggest otherwise: social and mobile marketing have paid enormous dividends for both of those brands, so why the apparent contradiction? In a white paper – The Luxury Marketing Myth: Exclusivity is critical to maintaining luxury’s allure – Pam Danziger explains that the tight coupling between luxury and exclusivity is “an old-European myth.”
Posts by spaf I’ve been delayed in posting this as I have been caught up in travel, teaching, and the other exigencies of my “day job,” including our 15th annual CERIAS Symposium. That means this posting is a little stale, but maybe it is also a little more complete. I try to attend the RSA Conference every year. The talks are not usually that useful, but the RSAC is the best event to see what is new in the market, and to catch up with many of my colleagues (new and old), touch base with some organizations, see CERIAS alumni, sample both some exotic cuisines and questionable hors d'oeuvres, and replenish my T-shirt supply. It is a very concentrated set of activities that, when properly managed, fits in a huge set of conversations.
Combine Webtools to Create Interactive Online Environment Written by Mark Brumley I love to merge various web 2.0 sites to build creative combinations. My latest discovery is a blend of several favorite sites to enhance face to face and/or online learning. This combination will feature and interactive online space and incorporate a backchannel. I need a base platform and one of my favorites is Twiddla.com. It features an online whiteboard, which I use the most, as well as other excellent tools such as EtherPad for collaborative text editing.
10 Free Web 2.0 Tools And How To Easily Use Them In Your Classroom Earlier this week I had the opportunity to attend the first Ozarks Education Research Initiative (OERI) Teacher Technology Conference at Willard High School (MO). The learning sessions I attended were all very good and I am going to share 10 of the FREE tools I learned about below. I will be incorporating them into how I teach and hopefully by using these tools during faculty meetings, PD sessions, and other opportunities as they arise, this will help us all to find ways to incorporate them into the classroom to engage our students even more. This quote from last week has stuck with me ever since it was spoken – “Date the tool.
Presentation Materials - Leading Change in Changing Times: EdTechTeacher iPad Summit USA Here you can find almost all of the presentation materials from the Keynotes, Featured Presenters, and Concurrent Sessions from the November 7-8. 2012 Summit at Harvard University. They are listed alphabetically by schedule. Wednesday, November 7th – 9:45am Session iLessons (on the iPad) for Higher Order Thinking Skills – Sue GormanPDF File (10 MB) Flipped iPad ClassroomGoogle Presentation With 3D camera and depth sensors, any object can be touch-enabled Gain instant and exclusive access to over 5,000 of the most creative ideas, innovations and startups on our database and use our smart filters to take you direct to those that are most relevant to your industry and your needs. Not interested? You can still browse articles published in the last 30 days from our homepage and receive your daily and weekly fix of entrepreneurial ideas through our free newsletters.
What the 2013 Verizon Data Breach Report tells us about phishing When I was a kid I’d thumb through my parents’ Newsweek magazines for cool graphics that explained a complex geopolitical or economic issue. If you saw my post about the Phishpocalypse, you might have guessed that I love infographics. As usual the RISK team over at Verizon did a fantastic job crunching, analyzing, and reporting on a mountain of data from 19 different contributors. This year ThreatSim was invited to contribute data to the report. The ThreatSim team extracted some highlights from the report and illustrated it in the graphic below. Let’s look at what the data tells about about the state of data breaches and phishing:
Nine Tools for Collaboratively Creating Mind Maps Mind maps or graphic organizers can be invaluable tools for visual thinkers and visual learners. The process of creating a mind map can help students gain an overview perspective on complex, multifaceted concepts. Mind maps can also help students outline an essay or story they're planning to write. The following list contains nine tools that can be used by students to create mind maps independently or collaboratively. Wise Mapping is a free collaborative mind mapping tool. Wise Mapping has fairly easy to use editing and sharing functions.
The Hat - Random Name Generator Current version: 126.96.36.199License: Freeware "I'm first!" "No I'm first!"" Teachers find new ways to engage students with games, tech PARKERSBURG - Area educators are using electronic games both as a teaching tool and as a source of motivation for students. Judy Johnson, director of curriculum and instruction for Wood County Schools, said educators are using more and more technology in classrooms, including video games, to better engage students academically. "One of our focus points in raising student engagement," she said. "Children today are used to technology at home. That is what draws them in.
LaLa Lunchbox LaLa Lunchbox is a brandnew iphone app that lets your kids plan their own lunches and teaches them to make smarter food choices! Kids get to personalize and design their lunchboxes with fun monsters and colors, and then plan their lunches for a whole week at a time. They simply swipe their choices into their lunchbox from a large selection of fruits, vegetables, proteins, and snacks. Along the way, they learn that a balanced lunch includes items from each category.
Researchers uncover Tor-powered Skynet botnet Rapid7 researchers have recently unearthed an unusual piece of malware that turned out to be crucial to the formation of an elusive botnet - dubbed Skynet by the researchers - whose existence has been documented in a very popular Reddit "I Am A" thread. The Trojan in question has DDoS and Bitcoin-mining capabilities, but it's main function is to steal banking credentials. The botnet operator spreads the malware via the Usenet discussion forum, which is also a popular platform for distributing pirated content.