Virtualization: The Revolution in Server Management and Why You Should Adopt It

Virtualization: The Revolution in Server Management and Why You Should Adopt It

This article was co-written by Matt Eshleman of Community IT Innovators and first published on the NTEN Blog in June.

Do Nonprofits Spam?

Do Nonprofits Spam?

This article was first published on the Idealware Blog in March of 2011. NPTech maven Deborah Elizabeth Finn started a.

Accidental Technology

Accidental Technology

This article was originally published on the Idealware Blog in February of 2011. There’s been a ton of talk over.

Succession Planning

Succession Planning

Idealware's blog is not the best place for me to talk about my kid. There's Facebook and Flickr for that sort of thing. But I want to talk about him anyway, and open a discussion, if possible, about children and the nptech community.

Word or Wiki?

Word or Wiki?

An award-winning friend of mine at NTEN referred me to this article, by Jeremy Reimer, suggesting that Word, the ubiquitous Microsoft text manipulation application, has gone the way of the dinosaur. The "boil it down" quote:

"Word was designed in a different era, for a very specific purpose. We don't work that way anymore."

Pop Quiz: PCI Compliance

Pop Quiz: PCI Compliance

The credit card industry is doing the right thing by consumers and enforcing proper security measures regarding the handling of credit card information. You might have heard about this - a number of the popular vendors of donor databases are recommending upgrades based on their compliance with these regulations. The "Payment Card Industry Data Security Standard", commonly known as PCIDSS, is a set of guidelines for securely handling credit card information. The standard has been around for about four years, but early enforcement efforts focused on companies with a high volume of credit card transactions. Now that they're all in compliance, they've set their sites on smaller businesses and nonprofits. So, what does this mean?

Why SharePoint Scares Me

Why SharePoint Scares Me

For the past four years or so, at two different organizations, I've been evaluating Microsoft's Sharepoint 2007 as a Portal/Intranet/Business Process Management solution. It's a hard thing to ignore, for numerous reasons:

Does Your Data have a Bad Reputation?

Does Your Data have a Bad Reputation?

As you probably know, the U.S. Congress has been having a big debate about what went on behind closed door briefings on the treatment of detainees in the war on terrorism. At issue is whether House Leader Nancy Pelosi was told about the use of harsh interrogation tactics, which many of us define as torture, in 2002 and 2003 briefings, when the tactics were actually in use. Rep. Pelosi maintains that they weren't discussed; The CIA, responsible for the briefings, maintains that they were, but neither of them has yet provided documentation that might settle the matter. Meanwhile, Rep. Pelosi's Democratic colleague, Rep. Bob Graham, who, as head of the Senate Intelligence Committee, was also to be briefed on such actions, reports that the CIA's assertions are in error. Dates that they claim he was in briefings on the subject are wrong. His his meticulous notes, which he has traditionally been kidded about keeping, establish that only one of four CIA-alleged meetings actually occurred, and, in it, the harsh interrogation tactics weren't discussed.

The Road to Shared Outcomes

The Road to Shared Outcomes

At the recent Nonprofit Technology Conference, I attended a somewhat misleadingly titled session called "Cloud Computing: More than just IT plumbing in the sky". The cloud computing issues discussed were nothing like the things we blog about here (see Michelle's and my recent "SaaS Smackdown" posts). Instead, this session was really a dive into the challenges and benefits of publishing aggregated nonprofit metrics. Steve Wright of the Salesforce Foundation led the panel, along with Lucy Bernholz and Lalitha Vaidyanathan. The session was video-recorded; you can watch it here.

The Silo Situation

The Silo Situation

The technology trend that defines this decade is the movement towards open, pervasive computing. The Internet is at our jobs, in our homes, on our phones, TVs, gaming devices. We email and message everyone from our partners to our clients to our vendors to our kids. For technology managers, the real challenges are less in deploying the systems and software than they are in managing the overlap, be it the security issues all of this openness engenders, or the limitations of our legacy systems that don't interact well enough. But the toughest integration is not one between software or hardware systems, but, instead, the intersection of strategic computing and organizational culture.