Uncategorized pages

Jump to navigation Jump to search

Showing below up to 50 results in range #301 to #350.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Digital Mapping
  2. Digital privacy 101 for activists
  3. Digital public infrastructure
  4. Digital security for organizations
  5. Direct action
  6. Disaster tech support for NGOs
  7. Discerning when to centralize and when to decentralize
  8. Discord Leaks and how to research and use information against fascism
  9. Disinformation and what to do about it
  10. Distraction: How does it work and how we can stay focused
  11. Distributed Teams
  12. Distributed Version Control with Git
  13. Distributing and decentralizing data
  14. Diversity and inclusion in hiring
  15. Diversity in system administration
  16. Diversity in technology & white privilege
  17. Do We Need a Data Dictionary for Public Data Sets?
  18. Don't Get (Your Data) Caught!
  19. Donor Metadata -- What is The Most Important Information You Can Get About a Donor?
  20. Doxxing and how to protech against it
  21. Drupal 101
  22. Drupal Best Practices for Small Organizations and Small Budgets
  23. Drupal Sewing Circle
  24. Drupal for Joomlanauts and Joomla for Drupalistos
  25. Drupal support group
  26. Dweb - decentralized social media / web - how people are building decentralized protocols
  27. Dynamic Movements
  28. Education and pedagogy
  29. Effective Localism
  30. Effective communication and Listening
  31. Effective project management practices
  32. Electoral reform
  33. Electronic Frontier Foundation: Annual update
  34. Email Templating: Disaster of the Century
  35. Email Templating: Disaster of the Century 2009
  36. Emergency Comms with Ham Radio
  37. Empowering Clients Through Consulting
  38. Empowering pathways for learning
  39. Encrypting your Communication
  40. Envisioning the Perfect eAdvocacy Platform
  41. Ergonomics
  42. Ethical Consulting 2024
  43. Ethical Consulting for Nonprofit Tech
  44. Ethical consulting and freelancing
  45. Ethical hiring
  46. Ethically hiring and working with contractors
  47. Evaluating security risks when working with high-risk constituents
  48. Evaluting Tech Projects
  49. Event Agenda Guidelines
  50. Evolving approaches to organizational digital security as part of larger movements for community safety

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)