article thumbnail

Harnessing generative AI for good

Candid

The unfulfilled promises of blockchain to advance social good, a proliferation of mobile apps in developing countries that failed to garner adoption , and cheap laptops that were going to change the world are just a few examples. But training and running large language models is expensive.

article thumbnail

E-Mediat Day 3: Digital Activism

Beth's Blog: How Nonprofits Can Use Social Media

I’m the lead for Zoetica where my role is to deliver training, advise on the curriculum and coaching methods, model transparency, and serve as meta network weaver. I have the honor of co-training with some of the best folks doing work in this part of the world. (Here’s the posts from Day 1 and Day 2 ).

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tips for Remote Presenting

Beth's Blog: How Nonprofits Can Use Social Media

For the audio, we use a phone line that was fed into the AV system and wireless mic. When you’re live and in the room, you can observe body language and adjust accordingly. I thought we could use the chat back channel but since there was only laptop in the room we needed another system for backchannel communication.

Skype 97
article thumbnail

E-Mediat: Reflections from the Conference in Fez, Morocco

Beth's Blog: How Nonprofits Can Use Social Media

Both conference marked the end of an 18-month capacity building program that trained more than 220 NGOs in Jordan, Lebanon, Morocco and Tunisia on how to use social media effectively to advance civil society goals. See the above video, created by team in Tunisia, which summarizes the program.) Workshop Handouts work in Arabic and French.

Morocco 100
article thumbnail

Best Practices for Securing Data in Humanitarian Crisis Situations

Saleforce Nonprofit

This could be identified through the roles of individuals, contact addresses, names of provinces, language, or currency, as examples. This security can depend on the nature of the data you’re working with, but this quick training covers different ways to control access. This is object, field or file access.

Practice 120
article thumbnail

Tata Consultancy Services in Mumbai

Beneblog: Technology Meets Society

Citing a lack of trained teachers, TCS had built a PC-based curriculum for teaching reading in 40 hours. The program focuses on mainly teaching a core vocabulary of sight words in the the desired language, so that adults are able read the local newspaper. As we pulled into the outsourcing zone, my laptop was registered at the gate.

article thumbnail

Bay Area Teens Share the Love of Coding (Part 1)

Tech Soup

And they're doing this using the programming language Java on their laptops. It has trained more than 470 students seventh grade and up in 13 libraries throughout Silicon Valley. Students bring their own laptops to a public library, and receive instruction from high school-aged instructors.

Teen 36