Remove Community Remove Disaster Remove Laptop Remove Phone
article thumbnail

Networking Your Nonprofit: Security and Telephony

Tech Soup

Next, look to protect your donor, client, and project information across your entire network of "endpoints" (desktops, laptops, and servers) with Symantec's donated enterprise-level security software. They enable unified communications, which is essentially the ability to send and receive messages from any device.

Network 47
article thumbnail

Why Celebrity iCloud Hacking Should Matter to Your Nonprofit

Tech Soup

If you pay attention to the news, you may have recently heard about a major Internet hacking of celebrity phones and devices , in which hundreds of photos were leaked to the wider Internet. Their iCloud online storage was targeted, and hackers stole personal data and photos from their mobile phones and iPads.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How To Make A Back Channel Light Up Like Clark Griswald's House

Beth's Blog: How Nonprofits Can Use Social Media

On Tuesday, I had the opportunity to do a Webinar called " Social Media for Trainers: A Bag of Tricks " over at the Engage 365 Online Community site. But what's even better is that this wasn't an isolated training, it was part of an new online community called Engage365 which runs on a platform called " Conference 2.0 ". Know of any?

Channel 87
article thumbnail

The Networked NGO in Pakistan

Beth's Blog: How Nonprofits Can Use Social Media

I selected the latter because all participants are on Facebook and can access it on their mobile phones. 4. Design To Build A Community of Practice. We had wifi in the room and participants brought their laptops – this give us the opportunity for open lab time or what I call “shoulder to shoulder” learning.

Pakistan 113
article thumbnail

10 Ways Nonprofits Can Use Blogs and Bloggers to Support Their Cause

Have Fun - Do Good

Use Your Nonprofit Blog to Create Your Own Media Coverage When the men accused of murdering Gwen Araujo, a woman they beat, bound and strangled after they discovered that she was biologically male, went to trial, the Community United Against Violence decided to use a blog to document the trial.

Blogger 41
article thumbnail

Katrina IT Musings

Beneblog: Technology Meets Society

They remind me a lot of Rod Beckstrom's ideas that I posted earlier about IT support following a disaster. Hi Jim, I think you phrased an interesting question about the IT community's role in helping. The IT community would be more with the "U' part of this from my perspective. and there are probably more.

Hurricane 100
article thumbnail

Tech Policies for Virtual Teams: A Leader’s Responsibility

Non Profit Quarterly

I’ve been in community with you now for actually two years around that, through the webinar program, and I’m just really glad to welcome you back, if you are a Leading Edge member. And I said, well, what if somebody wants to watch Netflix on their company laptop? But welcome back, and a special hello to Leading Edge members.

Policy 102