Remove Collaboration Remove Content management systems Remove Metadata Remove Resources
article thumbnail

Building a New Kind of Cruise Community

Waxing UnLyrical

So we spent months creating an entirely new CMS (content management system) from scratch – WordPress didn’t have the firepower. We’re not an online sales brochure, we’re a resource to help people make informed decisions. Know anyone in the travel space we should be collaborating with? Out of our minds?

article thumbnail

eLearning & Deliberative Moments: The present and future of Personal Learning Environments (PLE)

Buzz Marketing for Technology

The artefacts operated upon through PLEs include the digital resources and references with which individuals wish to engage presently and perhaps recall in the future. Resources include not only static text and media but also dynamic services and their artefacts, such as instant messaging, online forum and weblog conversations.

Web 2.0 165
article thumbnail

Computer Security for NGOs

Little Web Giants

If you are working with activists from countries with repressive regimes, this could lead to serious consequences for your collaborators. However, resources are often also scarce, and administrative tasks tend to be shared or undertaken partly by volunteers. This opens up additional risks and potential for security breaches.

article thumbnail

Computer Security for NGOs

Little Web Giants

If you are working with activists from countries with repressive regimes, this could lead to serious consequences for your collaborators. However, resources are often also scarce, and administrative tasks tend to be shared or undertaken partly by volunteers. This opens up additional risks and potential for security breaches.

article thumbnail

Computer Security for NGOs

Little Web Giants

If you are working with activists from countries with repressive regimes, this could lead to serious consequences for your collaborators. However, resources are often also scarce, and administrative tasks tend to be shared or undertaken partly by volunteers. This opens up additional risks and potential for security breaches.