Difference between revisions of "NGO workflows and how to choose your tools"
Jump to navigation
Jump to search
Willowbl00 (talk | contribs) |
Willowbl00 (talk | contribs) |
||
Line 64: | Line 64: | ||
* How many people need access? | * How many people need access? | ||
− | [[Category: 2016]] [[Category: Tools]] [[Category: Workflows]] | + | [[Category: 2016]] [[Category: Tools]] [[Category: Workflows]][[Category: Operations]] |
Latest revision as of 20:09, 22 November 2016
Introduction
Review of the work done in the Mapping_out_NGO_Workflows session on Day 2
Overview of key workflows emerged from discussions about technology infrastructure for NGOs
- Share a file internally with trusted colleagues
- Share a file externally with known organizations and allies
- Share a file publicly
- Set up a conference call
- Set up a 1:1 call
- Set up a webinar
- Set up an in person meeting
- Send an end-of-the-year donation-drive newsletter
- Author a grant proposal
- Compile the end of the year budget
Session Notes
Workflows taken as reference
- Share a file internally with trusted colleagues
- Share a file externally with known organizations and allies
- Share a file publicly
Steps included in these workflows:
- Coordinate document sharing
- Annotate/ comment on document
What are folks current using?
- Dropbox, Box.net
- Asana
- Trello
- Skype
- Slack messages
- Basecamp
- Google Drive
- GitHub
Values identified
- Privacy
- Security
- Anonymity
- Resiliency
- Sustainability
- Usability
- Accessibility
- Openness
Brainstorming: What questions should we ask?
- What is the tech literacy of participants?
- Who are the actual adversaries?
- Where are the files?
- What path do the files take?
- How do we manage usability and security?
- Who is watching?
- Is there a "fear factor" in adopting new technology? e.g. fear of learning new? e.g. fear of the tech itself?
- How do we determine/ maintain data integrity?
- What is the server configuration?
- What is the level of security culture (of the org)?
- What is the path to adoption (within an organization)?
- What factions are we dealing with?
- What belief structures are embedded in existing ways of working?
- What is the budget/ resources of the org?
- What is the level of security culture of the provider?
- What is the timeline/ time restraints?
- What is the bandwidth?
- Who needs what permissions?
- How many people need access?