article thumbnail

10 Popular #Hashtags for Nonprofits

Nonprofit Tech for Good

There is such a thing as hashtag spamming. nptech : This hashtag stands for nonprofit technology and can be used in any Tweets relevant to how nonprofits are use technology and social media. Example Tweet: Nominate your favorite nonprofit for the “Best Non-Profit Use of Social Media&# [link] || #nptech. A final note.

Nonprofit 197
article thumbnail

You're an Accidental Spammer: What Do You Do When You've Been Hacked? (Digital Dispatches from the desk of Gavin Clabaugh)

NTEN

Gavin Claubaugh, Vice President and Chief Information Officer, Charles Stewart Mott Foundation Effective IT management is more about wetware than it is about hardware and software: it's all about managing the intersection of technology and these rather strange things called people. Scenario: Spam, spam, spam, spam, spam, bacon and spam.

Spam 79
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Things We Like (January 2009)

NTEN

Idealware's timely article, " Selecting Software on a Shoestring ". The SpamTrap , "an interactive installation piece that prints, shreds and blacklists spam email". Tags: NPTech NTEN Newsletter Things We Like. That's gotta feel good. The Capitol News Connection has one that lets you " Ask Your Lawmaker ".

Germany 44
article thumbnail

Website Assessment, Mobile Broadband Modem, and a Twitter Painting: Get 'Em Now!

NTEN

It went into my spam filter, FYI.) Sprint mobile broadband data plan and Sprint SmartView software required. Here's what you need to do: Create an account at our auction site. You must use our link to register: [link]. The system will send you a confirmation email you must respond to before you can log in for the first time.

Mobile 56
article thumbnail

Seven Tips to Optimize Your Twitter Page

NTEN

If the numbers are out of proportion, potential followers might think you're a spam account. He uses those skills at thedatabank in supporting and training clients on all aspects of their software and helping them to implement best practices. Follower ratio - Try to keep it balanced.

Twitter 66
article thumbnail

Ten Useful Examples of the Real-Time Web in Action

NTEN

Most real-time search companies believe that's not enough to power a full index and rely on other sources of additional links to look at, often from the click-streams of users who have downloaded their software and opted-in to exposing their online behavior anonymously. These services are fun and useful.

Web 73
article thumbnail

More office cleanup reading.

Michael Stein's Non-profit Technology Blog

Simply put, the Internet has no inherent security architecture -- nothing to stop viruses or spam or anything else. Protections like firewalls and antispam software are add-ons, security patches in a digital arms race. Tags: nptech , security , identity Closely related to security is Identity Management.

Spam 40