article thumbnail

Phonathons: The Fundraiser’s Ultimate Guide & 15+ Top Tips

Double the Donation

Create a standardized script. Include matching gifts in call scripts. To illustrate our point, take a look at two possible phonathon script introductions: Phonathon Script Introduction #1: “I’m calling on behalf of University X to raise money for our annual phonathon campaign. Create a standardized script.

Guide 98
article thumbnail

Recruiting Geeks for Human Rights!

Beneblog: Technology Meets Society

What we do: Benetech's Human Rights Data Analysis Group (HRDAG) develops database software, data collection strategies, and statistical techniques to measure human rights atrocities. We're Benetech's Human Rights Data Analysis Group, and we're hiring right now ! Perform a little bit of GNU/Linux system administration.

Analysis 150
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NTEN Leading Change Summit #14lcs: Reflection

Beth's Blog: How Nonprofits Can Use Social Media

The event also included plenary speakers, including a provocative talk about data methods from Alexandra Samuels and cross-track sessions from traditional panels to unconference. The culmination of these two and half very intense days was an Idea Accelerator Lab. Do you have a preferred method? Defining Roles.

article thumbnail

What TechSoupers Are Doing to Ensure Their Online Security: Part 1

Tech Soup

" Other Password Security Techniques. "One method is to add the first three letters of a website URL to the end of the root for each website, which makes it much easier to remember your password. Anna Jaeger , CTO of Caravan Studios, invented her own technique. Please log in to tell us your technique.

Online 52
article thumbnail

Hub-bub

Michael Stein's Non-profit Technology Blog

mHub is eHub for developers - instead of serving up applications, Max leads us to sites that offer usable scripts, snippets, widgets, or techniques for our development efforts. Max is Emily's partner in Ideacodes , their web consultancy and design firm. In other words, its a candy store for programmers.

AJAX 40
article thumbnail

Who's Knocking at My Firewall Door? Simple Security for the Nonprofit IT Professional

NTEN

Ro)bots (or spiders) are scripts or applications that search out information on the web. Search engines constantly scour the web for information using this method -- but bots are also used by those nasty folks on the web that like to steal your information or trash your website.

article thumbnail

10 Lessons Learned For Success From A Fundraising Trainer

Bloomerang

This doesn’t necessarily require following a word-for-word script, but the participants should clearly understand who is going to say what, when, and most importantly, who is going to make the ask. And, research indicates that these unexpected calls often result in recipients making increased gifts. Rehearse, rehearse, rehearse.

Lesson 94