Exploring Meme Quote Generators

Memes can be ideas, values or behaviors that are contagious. There are many ways that these can be used in the classroom or to enhance publications, professional learning, etc. And, as such, I’m not going to list those here. 
Get ready for hours of fun….
Meme generators (none require an account) that tickle the funny bone:
Here are a few more that just combine your text with backgrounds:


Everything posted on Miguel Guhlin’s blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure

5 Video Annotation Tools for Your Class @mrs_johansen @letsrecap @edpuzzle @flipgrid

Are you an educator fascinated with creating videos that feature great content, are available on popular media sites (e.g. YouTube, Vimeo), and feature YOU as the chief learning strategist and interpreter? What’s more, new tools make it easy to annotate videos. Annotating videos involves layering text, links, and comment bubbles into an existing video.

Note: This is a shortened, improved version of the blog entry appearing here at TCEA.org/blog

5 Video Annotation Tools

Minion Meme Generator

Here are a few tools you can use as a teacher to enhance interactivity with video content:

  1. YouTube has built-in annotation tools, including speech bubbles, spotlight (highlighting areas in a video), adding text notes, titles, and labels.
  2. EdPuzzle makes it straightforward to add notes and assessments to videos from YouTube, Khan Academy, Learn Zillion and others. This enables understanding checks. There’s also an iOS app you and/or your students can use.
  3. VideoAnt, a web-based video annotation tool, also allows for annotations or comments to web-hosted videos.
  4. This online annotation tool, Swivl’s Recap, is a student response and reflection app. Teachers can prompt students to respond to questions and students respond in video via their mobile device of choice. Watch this overview of Recap via TeacherCast.
  5. Flipgrid works a little differently from the tools above, empowering you to create video-based discussion groups. The teacher posts videos and students respond to those. The “video group” can be passworded via a pin code, and then made accessible online via a web site.

3 Student VideoNotes Tools
Looking for tools that allow your students to take notes about videos? Check out this blog entry by Richard Byrne. In it, he highlights these tools:

  • VideoNot.es and TurboNote are two tools that allow you to take notes off to the side of the video.
  • Vialogues, not unlike Flipgrid, allows you to create conversations that revolve around a video.
How would you use these in your own classroom?


Everything posted on Miguel Guhlin’s blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure

Yahoo Data Breach – I told you so #privacy #edtech

“I told you so.” The words popped into my head as soon as I read the headline this morning on my phone. Those annoying 4 words are for everyone I told to switch from YahooMail to something else, anything else. Of course, I promptly flushed those words in the toilet. Who wants to hear they were wrong? I get it. We all cling to technologies that we’ve grown familiar with, that, perhaps, we began our digital journey with.

Still, after seeing several people have their Yahoo accounts hacked through no fault of their own, I realized that Yahoo was just a way for bad people to get access to your contact lists, your username, and password.

A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers…Yahoo believes that information associated with at least 500 million user accounts was stolen

Source: Yahoo 

You can check to see if you’ve been “hacked” or “pwned” online via this aptly named web site at https://haveibeenpwned.com/


Everything posted on Miguel Guhlin’s blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure

Google Enhancements! Multiple Columns

Engadget reports the following good news for GoogleDocs users:

the Drive team added a couple more often-requested features to the product today, including: autocorrect for misspelled search terms, the ability to split documents into multiple columns and an auto-save feature that creates a copy whenever importing and converting non-Google formats.

Sure enough, you can find it quite easily:

One neat feature is that you can highlight the content on the page and format it in two columns, as shown below:

Read this article

How long have you been waiting for GoogleDocs to include columns?


Everything posted on Miguel Guhlin’s blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure

Backup To and Transfer Between Cloud Storage @cloudhq_net @multcloud

Just two weeks ago, I helped a colleague migrate their Microsoft OneDrive data from a Microsoft-based OneDrive account (personal) to an Office 365-based OneDrive for Business account (work-related).
Adapted from this image from Budget

There are several ways to accomplish moving data, whether Google or Microsoft or something else:
  1. Use CloudHQ.net.  You can sync content back and forth between a variety of services, which makes it a pretty neat deal at $9.90 per month (if you need that level of redundancy).CloudHQ.net also offers the opportunity to have a 15-day free trial, which works well for staff who are leaving and may just need a one-time task. However, you can obtain additional days of usage by referring CloudHQ.net to friends and colleagues. Another benefit is that you can set ownership for documents that are transitioned to a new location. There is also a Chrome add-on, Gmail Label and Email sharing, worth investigating (watch video) when transitioning from one email system to another.
  2. Try MultCloud.com. Using MultCloud.net, you are able to “transfer, migrate, backup, sync, move, integrate, manage many cloud drives such as Google Drive, Dropbox, OneDrive, Box, MEGA, SugarSync, Amazon Cloud Drive, Amazon S3 as well as FTP, WebDav, etc. And, transfer files across different cloud drives, such as transfer data from Dropbox to Google Drive.” MultCloud.net has also created a Chrome add-on that you can use to easily move/copy content. 
Making backups of critical data is important. These these tools make accomplishing that easy!

Everything posted on Miguel Guhlin’s blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure

How to Capture TwitterChat History/Analytics #nisdedchat @TCEA #tcea @danabickley

Earlier this evening, during dinner in fact, friend and colleague Dana Bickley asked via Twitter:

At first, I thought, “Wow, why can’t you do this with IFTTT.com?” But then Dana clarified….this is a chat that took place in the past. I’ve often used IFTTT.com in combination with OneNote, Evernote, or GoogleSheets to capture tweets as they happened (I set it up ahead of a twitter chat).

What was interesting was how to capture tweets from a past twitter chat? One approach that I stumbled upon–after running into various services that wanted to charge me for the service –was Twitter Archiving Google Sheets (TAGS), which is completely free and runs as a GoogleSheets add-on. Watch this video tutorial.

As you might guess, I took advantage of the easy version (TAGS v6.1). And, to be honest, it was pretty easy. You can watch a video about TAGS:

Here are the steps I followed:

  1. Clicked on Get TAGS v6.1 – This will open up a copy of a GoogleSheet and add the TAGS scripts. In a moment, you’ll see it:
  2. Be sure to SETUP TWITTER ACCESS, add your hashtag search term (use the dropdown to select something different).
  3. Be sure to RUN NOW! and then add summary and dashboard…you’ll get awesome data like:
You can see the published GoogleSheet online here.
TAGS is pretty awesome! Thanks to mhawksey, TAGS creator!!!!
And, to think, none of this would have happened if @danabickley had not asked a question on Twitter!
Thanks!


Everything posted on Miguel Guhlin’s blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure

Five Anti-Malware Tips for Schools to Share with Staff

Every other week, I read or hear about  a school district that has suffered a phishing attack, an approach distributed by email designed to trick you into giving your email username and password to criminals. Dealing with ransomware (a form of software that infects your machine when you double-click on it and encrypts your files, then demands you pay them for decrypting them) can be embarrassing, since it may result in the district having to pay to get its data. Or lose the data and tell only the federal auditors coming to evaluate your records for the last five years. Oops!
Join the ongoing TCEA Microsoft Innovative Educator (MIE) Conversation Online! Explore and share concepts at the intersection of teaching, learning, leading and technology!
In addition, ransomware may also be distributed to district users via email. Several districts and Texas education service centers have allegedly faced some of these challenges (allegedly because ransomware infestations travel through word of mouth):
It’s…thrown a kink in the school district’s scheduled…exams…The crypto-ransomware “has affected the district’s entire operations from internal and external communications to its point-of-sale for school lunches. It also has prevented any students from taking the scheduled…exams, which are entirely computerized.” Source: Network World
Follow these tips to safeguard your hard work in computer documents and files on your computer:
  1. Look before you click! Avoid clicking on email attachments that come from people you do not know. Email attachments with “exe” and “zip” are suspicious. Also, do NOT go into your SPAM folder and click on the email attachments.
  2. Connect before opening. Ask yourself, “Was I expecting a file from this person?” If yes, connect with them via phone, social media, or email and ask, “Did you send me this file?” If the answer is “no,” then delete it.
  3. Avoid clicking on email attachments via your personal email on a work computer, especially if it’s a Yahoo email account. Multiple types of malware spread ads via that one service alone.
  4. Scan files before opening them. You can right-click a file, save it to your computer, and then choose to virus scan it before opening it.
  5. Backup your data to a cloud drive storage provider (e.g. OneDrive, Google Drive, Dropbox). Ransomware can spread via cloud storage where your files are automatically backed up when you place them in a certain folder (e.g. Dropbox), so be aware that ransomware WILL encrypt those files and the encrypted files will be backed up. Back up manually to the cloud and/or to external USB drives. Avoid leaving the latter connected to your computer.
Staff that succumb to phishing attacks open the organization’s virtual doors to a ransomware infestation. For example, in my inbox, I received an email purporting to be from a colleague sharing some files with me via Dropbox, but this looked like a phishing attack. Let’s go through the process I went through together. malware
Knowing that my colleague did not send this email, I opened up a fresh browser where I’m not logged into anything and tried the link: It didn’t work. That’s good! But if it had been a phishing scam, something like this would have popped up: When you examine the “Click here to view” link, you will find as I did that the link is to a non-Dropbox web site in the UK. That suggested to me that this link did NOT originate with Dropbox. As a result, I contacted my colleague via Twitter and asked, “Did you send me something via email that originated on Dropbox?” He responded after a short delay, “No, I didn’t.”
malware
Notice how the screen to the left offers you the opportunity to compromise your login and password for multiple email providers. This suggests that the goal is to steal ANY email account credentials you have. This can be potentially catastrophic since school district personnel often save student/staff confidential content in the cloud.
Actual Example: One principal was shocked when her Google Apps for Education account started sending out phishing attacks to all the email lists she was a member of, including the district-wide principals’ list, her campus staff list, and district-wide news list. And her shock turned into horror as colleagues clicked and were infected themselves. Horror shifted to shame as her colleagues grew angry, inquiring why she had inflicted them with this plague of phishing. And all the principal had done was fall prey to a phishing attack from a dear friend.
Fortunately, this can be avoided with the five tips above. Raise expectations for staff to take responsibility for their email communications, and their technologies.
Bonus Tips for Home Users 
While many of us have district-purchased software to protect us at work (although even that will not help you if you deliberately ignore the warnings), our home computers may not be so protected. Below are a few software tools that I use on my Windows and/or Mac computer(s) to protect against infestation. Note that this does not constitute a purchase recommendation since these tools are available for free, personal home use:
I have all of the following on my personal Windows computer and wouldn’t dream of using it without having them installed. In spite of the fact that Windows Defender comes standard on Windows 10 computers, it’s important to have anti-malware and antivirus software loaded and working.
Anti-Malware/AntiVirus
  • List of Mac AntiVirus Solutions
  • Windows Solutions:
    • Anti-Malware
      • Malware Bytes* – Great to use when you think your computer has been infected with malware/spyware and you need your computer “cleaned out.”
      • AntiRansomware – Although still in beta, Malware Bytes’ solution to ransomware offers real-time protection against ransomware, catching it before it can encrypt your files.
      • Spyware Blaster*– An easy to use “inoculation” program against spyware/malware.
      • Spybot Search and Destroy* – The best part of Spybot is the TeaTimer which protects your computer’s registry against contamination and immunizes your browsers (IE, Firefox) against malware.
    • AntiVirus
      • BitDefender Free – This free for home use antivirus works great and does not drive you crazy with advertisements.
      • Sophos Home Antivirus – This is another protection free for home use.

Everything posted on Miguel Guhlin’s blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure