Summer is coming, and so is Tech Training! Join me with a great group of professionals (who will quickly become your best online friends) for three weeks of intensive training on tech topics you want to learn about. All the details are below.
Note: Early Bird special for those who sign up by May 31st. Use coupon code SUMMERPD to get 10% off!
Sign up now–
- it’s all online, but a lot of 1:1 assistance, so space is limited.
- you get lots of the materials as soon as you sign up. Take from now until June 22nd to review them, use them in your end-of-year and next-year planning
More Summer Learning:
Summer Tech Camp (run by you!)
11 Take-aways from Summer PD (2014)
Jacqui Murray has been teaching K-8 technology for 15 years. She is the editor/author of dozens of tech ed resources including a K-8 technology curriculum, K-8 keyboard curriculum, K-8 Digital Citizenship curriculum. She is webmaster for six blogs, CSG Master Teacher, adjunct professor, an Amazon Vine Voice book reviewer, Editorial Review Board member for Journal for Computing Teachers, CAEP reviewer, CSTA presentation reviewer, freelance journalist on tech ed topics, a tech ed columnist for Examiner.com, and a weekly contributor to TeachHUB. You can find her resources at Structured Learning
Jacqui Murray is the author of the popular Building a Midshipman, the story of her daughter’s journey from high school to United States Naval Academy, and the thriller, To Hunt a Sub. She is also the author/editor of over a hundred books on integrating tech into education, adjunct professor of technology in education, webmaster for four blogs, an Amazon Vine Voice book reviewer, a columnist for TeachHUB, monthly contributor to Today’s Author and a freelance journalist on tech ed topics. You can find her books at her publisher’s website, Structured Learning. The sequel to To Hunt a Sub, Twenty-four Days, will be out this summer. This is the "wpengine" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.