Remove Digital Remove Files Remove Internet Remove Laptop
article thumbnail

The world gets smaller with digital magazines

Judi Sohn

I’ve long been a fan of digital magazines. For example, if I download a magazine to my iMac, I can’t read the same file from my laptop. If I want to revisit an old article, Zinio’s site has a copy of every digital magazine I’ve ever received, all 532 of them so far, going back to August 2003.

Digital 100
article thumbnail

Nonprofit Technology News: 2013 Year in Review

Tech Soup

2013 was the year of an ever-widening NSA spying scandal with its revelations of how little digital privacy we really have – even heads of state. Tablet sales are up 53% while laptop and desktop computers are down 11% from the previous year. gear up to administer standardized tests digitally next year. What this means?

News 62
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Computerless

Zen and the Art of Nonprofit Technology

Home About Me Subscribe Zen and the Art of Nonprofit Technology Thoughtful and sometimes snarky perspectives on nonprofit technology Computerless February 20, 2007 My laptop is in the shop. It’s a lucky thing my partner has a laptop I can beg and borrow (stealing might cause issues.) I’ll spare you the details. Be Helpful.

Laptop 100
article thumbnail

The Disposable Computer

Tech Soup

You may have recognized the trend: computing (crunching numbers and running programs) is moving away from your computer and is now being delivered as a service over the Internet. Most of us will not need much more than a really good Internet connection and a nice screen to do our work. These laptops are priced between $200 and $500.

Laptop 44
article thumbnail

Top Cybersecurity Interview Questions

Connection Cafe

Increasingly using technology, the internet, digitization of the assets, and data pose security risks and threats to every business. It is used mainly on the internet-facing network. Linux Edit the file /etc/resolv.conf. Hashing is used to secure a file or data such as a password. Why is a VPN required?

article thumbnail

Cloud Integration Solutions – What’s the Deal?

Connection Cafe

Rather, the entire suite of hardware, data, and software is managed by external service providers and made available to end-users over the internet. Probably the most pervasive example is Microsoft Office 365, in which application software and data (ie, content) is all worked on, saved, stored, shared, and otherwise managed over the internet.

article thumbnail

Goodbye Microsoft…

Zen and the Art of Nonprofit Technology

Home About Me Subscribe Zen and the Art of Nonprofit Technology Thoughtful and sometimes snarky perspectives on nonprofit technology Goodbye Microsoft… March 29, 2007 Just today, I received in the mail some Sony Vaio Picturebook laptops, courtesy of Gavin’s regular potlatch program. Debian comes to the rescue. Be Helpful.

Ubuntu 100