Remove Accessibility Remove Contest Remove International Remove Student
article thumbnail

Pottsboro Area Library: The Winner of TechSoup’s February Success Story Digital Connector Challenge

Tech Soup

section of TechSoup.org we launched a contest last month for great digital inclusion stories. Both children and older patrons avidly use the library’s public access computers with current Microsoft applications. Several people use the public access computers to fill out job applications. Pottsboro Area Library in Texas.

Library 54
article thumbnail

And the Winner is. Jaffe's Join the Conversation Book Giveaway and How To Do A Giveaway Contest on Your Blog

Beth's Blog: How Nonprofits Can Use Social Media

Robin Yap left a comment that he was leaving for Manila to teach social media to educational technology students, so I decided to part with my cherished copy of Dave Warlock 's Classroom Blogging. He attended the Cambodian Blogging Summit and received the digital audio recorder to create language lessons for his students (offline podcasts!)

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Hype Homecoming Using Social Media

Connection Cafe

Students, alumni, parents, and friends are living life’s biggest moments online. Run contests to encourage people to share pictures or publish posts. Use your video and livestreaming capabilities to make the excitement of the live event accessible to people at home. Do you need a social media strategy for homecoming? Absolutely!

Hype 22
article thumbnail

Spring Fundraising Events: How to Plan a Fresh, Exciting Event

Qgiv

They combine putting and chipping contests with silent and live auctions, dinner, an open bar, and the opportunity to win a ton of fun prizes, all while raising money for their mission. It’s certainly a riff on a traditional golf tournament, but it’s one that makes the event more accessible to a wider group of people!

article thumbnail

Best Practices for Protecting Your K–12 School from Cybersecurity Threats

sgEngage

In private K–12 schools, foreign cybercriminals, school vendors, employees, and even students have perpetrated recent cyberattacks. Business email compromise (BEC) typically occurs when an employee clicks on a phishing email and, by doing so, unknowingly provides access. Software vendors have access to a great deal of your information.

Practice 116
article thumbnail

Best Practices for Protecting Your K–12 School from Cybersecurity Threats

sgEngage

In private K–12 schools, foreign cybercriminals, school vendors, employees, and even students have perpetrated recent cyberattacks. Most Common Threats to K–12 Cybersecurity Business email compromise (BEC) typically occurs when an employee clicks on a phishing email and, by doing so, unknowingly provides access.

article thumbnail

Forum One Staff Share OpenGov Ideas

Forum One

The Department of State should develop a Young Diplomats Program which would provide students with the opportunity to advance their understanding of the core topics and issues relevant to the foreign service. The program would run for the entire academic school year and rely on long-term engagement with students. Vote for this Idea].

Ideas 47