A few thoughts on the new phone system…

As you know, we are currently installing a new phone system. This is a massive project that is nearing completion. There are a couple of reasons why we needed to install a new phone system.

  • Our previous system was no longer supported
  • The phones from our previous system were breaking at a rapid clip. These were getting extremely difficult to replace
  • Michigan passed e911 legislation

e911

Michigan has passed e911 legislation. This essentially says that we need to be able to send first responders (police officers, EMS, fire, etc) directly to a room, not just a building. Under our old current system, only a building address is sent. With the new system, we will be able to send those first responders to the exact room that called. This could literally save a life. However, this also means that we need to know exactly which room every phone is in. I will be providing our first responders with a list of phone numbers, rooms and floor plans. This will allow our first responders to know which room to go to when 911 is called. The first responders will be able to review the building map on the way to the emergency.

Mobility Extension

We will no longer be offering mobility extension. This is due to the e911 legislation above. Mobility extension allows for a phone number to “travel” to different phones. Obviously, this would cause great confusion to our first responders. Not only could they go to the wrong room, but they could go to the wrong building.

However, we do understand that we have phone numbers that are assigned to people and not places. So, we will be assigning those “extension mobility” numbers as a second (or third, fourth, fifth) number on a phone in a room. This means that a phone may ring in multiple buildings.

Voicemail

Once we have just one phone system running, we will be able to turn on Gmail sync. This will allow for all users to listen to their voicemail right in their email. Once it is marked as listened to in email, it will also be marked as listened to in the phone system. If the voicemail is deleted in email, it will also be deleted in the phone system.

Currently, voicemails are delivered to email, but the sync is not yet active.

Main office personnel are set up as “delegates” for the main number and attendance number for their school. This allows them to easily check the main line and attendance line voicemails on their computer. Plus, the messages stay “in sync” for all members of the office.

Phone placement

We are mounting most phones. There are two reasons for this:

  • To comply with e911 laws
  • To reduce/prevent breakage

Phones are being mounted in most classrooms. This helps to make sure that phones remain where we placed them. Remember, for 911, we will provide a spreadsheet to the 911 call center with phone numbers and room numbers. This list won’t regularly change. It needs to be relied upon for life saving decision making.

As a side benefit, phones that are mounted suffer much less breakage.

Please remember that individuals move from room to room. Additionally, some teachers like to “change it up” in terms of the room layout and decor (that would be me in the classroom). However, we can’t regularly move phones due to individual preference. Thus, we established as much of a standard as possible.

Tips

To help new users, we have created a Classroom and Office Phone Basics Page. This page is still under development. It was the intent from the beginning to select a phone system that is easy to use. We didn’t want to be in a situation where users needed a ton of training.

Free EduPaths courses.

Interested in earning 20+ FREE SCECHs? Join our MOOC!

What is a MOOC? A MOOC is a Massively Open Online Course. This course connects you with educators around the state as you discuss Technology Integration Models, participate in EduPaths courses, and put your new skills to work in your classroom or with staff.20+ SCECHs available for FREE! That equals 1 graduate credit!! Click the link below to learn more.

Register for the MOOC 2018-19.

Courses in the Arts, Health/PE & World Language/ELs

Every summer, EduPaths works with educators around the state to develop courses in certain target areas. Summer 2018 our target areas were the Arts, Health/PE & World Languages/ELs.If you have colleagues who are looking for support in these content areas, share these resources with them.

The Arts

The list below are approved courses and have been, or are waiting to be, published. The linked titles are published courses. The remaining list will be published through early Spring 2019. Use the live links below to get started!

Still to be published in 2018-19 – tentative dates listed:

  • Technology in the Music Classroom – Part 1 (mid December 2018)
  • Technology in the Music Classroom – Part 2 (mid December 2018)
  • The MAEIA Arts Assessment Tools for Arts Educators – Part 1 (mid December 2018)
  • The MAEIA Arts Assessment Tools for Arts Educators – Part 2 (mid December 2018)
  • The MAEIA Arts Assessment Tools for Arts Educators – Part 3 (end of January 2019)
  • The MAEIA Arts Assessment Tools for Arts Educators – Part 4 (end of January 2019)
  • Using Visual Arts to Showcase Student Research is Important for Student Growth (end of January 2019)
  • Using Stop Motion and Green Screens to Showcase Student Research (end of January 2019)
  • Authentic Assessment in the Arts – Part 1 (end of March 2019)
  • Authentic Assessment in the Arts – Part 2 (end of March 2019)

Health & P.E. Courses

The list below are approved courses and have been, or are waiting to be, published. The linked titles are published courses. The remaining list will be published through early Spring 2019. Use the live links below to get started!

Still to be published in 2018-19 – tentative dates listed:

  • Introduction to Lifelong Physical Activities (mid December 2018)
  • Teaching Lifelong Physical Activities (mid December 2018)
  • The Physically Literate Elementary Classroom – Part 1 (mid December 2018)
  • The Physically Literate Elementary Classroom – Part 2 (mid December 2018)
  • Fuel Your Tank with Premium: Making healthy choices to keep your body running at it’s best – Part 1 (end of January 2019)
  • Fuel Your Tank with Premium: Making healthy choices to keep your body running at it’s best – Part 2 (end of January 2019)
  • Everyday Games in Physical Education – Part 1 (end of January 2019)
  • Everyday Games in Physical Education – Part 2 (end of January 2019)
  • Teaching Intersectionality in Health Education – Part 1 (end of February 2019)
  • Teaching Intersectionality in Health Education – Part 2 (end of February 2019)
  • Effective Lesson Structure in P.E. – Part 1 (end of March 2019)
  • Effective Lesson Structure in P.E. – Part 2 (end of March 2019)

World Language & English Learners

The list below are approved courses and have been, or are waiting to be, published. The linked titles are published courses. The remaining list will be published through early Spring 2019. Use the live links below to get started!

Still to be published in 2018-19 – tentative dates listed:

  • Teaching English as a Second Language – Part 1 (end of January 2018)
  • Teaching English as a Second Language – Part 2 (end of January 2018)
  • Effective Technology in the World Language Classroom – Part 1 (end of February 2019)
  • Effective Technology in the World Language Classroom – Part 2 (end of February 2019)
  • Technology in the World Language Classroom: Working Toward Proficiency – Part 1 (end of March 2019)
  • Technology in the World Language Classroom: Working Toward Proficiency – Part 2 (end of March 2019)

 

Help Needed?

Looking for tips? How about some tricks?

We have a variety of Help Sheets posted. The latest ones include Interactive Projector tips. Many of these fall into the “one minute” category (meaning they take about one minute to read and implement).

Here are a couple of examples:

Password Management

You may have heard of the recent Facebook account compromised. Maybe you’ve received an email stating that your webcam shows….(we’ve had several people received these). That email may also list your user name and a password that you’ve actually used.

What does this mean to me?

Password management is an important issue and skill that you need to develop. Since there are people out there who would like to use this for their own gain (which can be stealing money, stealing your identity, or just making things difficult for you), you should proactively protect yourself.

What should I do?

In short, use a different password at every single site that you visit.

How do I do that?

There is no way that you could realistically remember that many different, complex passwords. I advise that you get a password manager.

What’s a Password manager?

A password manager is a program that, well, manages your password.

What are my options?

Here are a few choices (that I’ve used):

Other options (I don’t have any experience with these):

Which one should I get?

That’s really a personal preference. Most of these are a paid option/program. Some offer free options. (This is one of those things that I’m definitely willing to pay for.) You should check to make sure that your choice supports all the devices that you use. You should also check your use case. For example, some have free plans if you only use one device. (Personally, I use 1Password. I have paid for and used it for many years. Other team members use Passpack, Dashlane and Lastpass). The best ones allow you to enter your password in a browser extension and that fills in your password.

What about saving passwords in the browser?

We strongly advise AGAINST doing this. Saved passwords in a browser lack almost any security at all. The security standards aren’t nearly as robust for web browsers. If anyone gets any access to your computer while you are signed in, they would have access to everything.

Anything else I should do?

Yes, turn on 2 factor authentication wherever you can. Google offers 2 step authentication. So does Apple.

Gmail Interface

According to the latest schedule, as of October 16th, 2018, any users who’ve opted out of the new Gmail will be automatically migrated to the new experience.

They won’t be able to opt out after that date. Users who’ve already transitioned to the new Gmail will lose the ability to opt out as well.

I’m reminded of the adage that the only one who likes change is a wet baby.

So, why is Gmail changing?

  1. Increased security
  2. Updated code
  3. Better integration with other tools

Personally, I like the new interface. It provides some good tools to increase efficiency. However, I understand that not everyone feels the same way. Increasing security is an extremely important consideration at this point of the Internet development. You can choose to switch back and forth between the versions until October 16th. Then, the decision on which to use will be easy smile.png.

Bookmarking in Google Chrome

One of the basic computer skills that everyone should have is the ability to “bookmark” sites. This can be especially handy for forms that are needed to be completed. Forms such as the Response to Bullying Behavior, lunch counts (for some schools), or intervention plans should be handy.

We’ve prepared a Bookmarking Help Sheet to assist.

Gmail Interface

Google has “helpfully” switched everyone over to the new Gmail interface. While we really, really like the new interface, we understand that some may prefer the older interface. At this point, you can still switch back by using the setting menu. According to the release calendar, as of October 16th, everyone will be switched to the new interface permanently.

Some of the features that we really like about the new interface:

  • access to Calendar on a side panel
  • access to Tasks on a side panel
  • Smart replies
  • cleaner interface
  • Display density (more control over how much space email takes up)
  • Follow up reminder

 

WordPress App

For a long time, we’ve noted how nice it is to use the WordPress app to post to blogs. Sadly, because of bad actors and security concerns, we can no longer use the app. There is an issue in how the WordPress app integrates with a WordPress web site that allows for massive attacks.

So, for now, we have to block the WordPress app integration.

We hope that with updates, WordPress app integration can be restored. If it is, we will certainly let you know.

For now, all users will need to sign in through a browser in order to post to iBlog.

BOB’S BACK!

It is with great joy that we celebrate the return of Bob Harrison his role as a Tech Coach. Bob brings such great gifts the teaching and learning process. He has reached so many students through his Tech Coach role. Now, he’s back. One of the tenets of our team is try things out. If absolutely everything works out easily, we aren’t stretching enough. This is hard for all. I am extremely thrived that I get the opportunity to work with someone like Bob. He has stretched and found one thing that isn’t for him. (You can head over his Tech Coach Blog post to read his perspective).

Bob brings his passion, skills, gifts, and drive back to the Tech Coach role. Join us in a happy dance! Join us in our celebration! Join us in our Joy! Most of all, join us in challenging Bob to help students learn.

Phishing Season

Happy ALMOST Back to School.
​We (and other school districts) are seeing an increase in phishing ​activity.
Phishing is the practice of sending out emails that purport to be from a legitimate, reputable company in order to get users to reveal sensitive information (such as passwords and credit card numbers). 
​We recently deleted a couple of emails received by thousands of Dearborn Public Schools members that were phishing attacks. Unfortunately, a couple of users clicked on the links and entered their information.
Protecting your user name and password is critical to the security and safety of our district. Many users have access to very sensitive data.

Tips for spotting a phishing attack:

  • Do you know the sender? Although it is easy to fake the return email address, you should still check to see if you know the account.
  • Does the language seem appropriate for the person?
  • Does something just seem “funny” about the email?
  • Hover your mouse (if on a computer) over the link without clicking on it. It should reveal the URL of where it is actually going. (So, if it supposed to be sending you to Apple, but the URL is https://apple.scammer.com, that isn’t right).
  • Be wary of links in emails: Type links into the Location bar in your browser instead of clicking on the link in an email.
  • There is some kind of threat or urgent request in the message.

Here is a Phishing Flyer with tips (reposted from a couple years ago).

Securing your accounts

There are several things that you can do to make your account more secure:

  • Be careful on clicking links in email
  • Use a passphrase manager – (this allows you to have a unique password for every site you visit) (Note that most of these are not free). 
  • Turn on 2 Factor Authentication – this will require you to receive a text message or use a known device as an extra step to log in. This means that if someone does know your passphrase, they still can’t sign into your account without that device. 
  • Be very cautious about where you are entering your user name and passphrase.
*This impacts personal as well as work email.
So, how do PHISHERS get your email? There are a couple of ways:
  • from the address book of someone who has had their account phished
  • from breaches of online services
Please note that there have been many breaches of information. Here are a few:
  • Facebook
  • EquiFax – one of the sites that provides credit reports
  • Macy’s
  • Addidas
  • Sears
  • Kmart
  • Delta
  • Best Buy
  • Saks Fifth Avenue
  • Lord & Taylor
  • MyFitnessPal App
  • Panera
  • Forever 21
  • Sonic
  • Whole Foods
  • PumpUp (Fitness App)
  • And more….
Your user name and password to a variety of sites may be available to people with bad intent. The breaches above may have revealed not only your email address (which can be used in future attempts), but also your password to that account. Since many people use the same password over and over, this means that bad guys may have access to other accounts. For example, if someone@somewhere.com uses the password mydogsname for their MyFitnessPal app (which was previously hacked), they may also use that same combination for Amazon. Bad guys will attempt to use that combination on Amazon. Now the bad guys can order from Amazon and someone@somewhere.com will receive the bills.
How can you tell if your email has been breached?
Have I been pwned is a web site where you can enter an email address to see if it is available to phishers.

Follow this blog

Get every new post delivered right to your inbox.