You are hereHome › Blog
Yesterday we had a presentation on some of the core features of Google Analytics and talked about some of the best practices and common pitfalls in using it. If you missed it yesterday or are just curious to see what the big deal about analytics is check out the video below. In this video we focus on Google Analytics but the theory holds up no matter what analytics package you are using so it's well worth checking out.
This webinar was presented by Chris Tuttle of Idealware and Brain Rowe of LSNTAP.
If you watched the video please take a minute to fill out this survey and give us some feedback.
We have just put up video from the Google Docs webinar we hosted a little bit back. The webinar has been chopped into three parts, one each for Docs, Sheets, and Slides, and put into a play list along with our videos on GIS mapping which make use of Fusion Tables. If you missed the webinar or want a refresher on what we covered please check out that playlist.
What’s the benefit of a tech investment, and when it is worth the expense? What’s the best way to think about the return on investment of a technology project in quantitative terms? In this session, we’ll talk through the core concepts around how to consider and weigh the costs and benefits of technology projects. Then we’ll work together as a group to collaboratively identify some of the most effective and measurable elements you can use to predict the return on investment for innovative projects. You’ll leave with a clear framework to help you think through innovative technology investments at your own organization.
Laura Quinn of Idealware
John Greiner of Just Tech, LLC
Brian Rowe of LSNTAP
The slides for the presentation can be found here.
And please fill out this survey to help us continue to bring you these videos.
If you are using Skype and Dropbox for your personal use you may be ok but you may want to think twice about using them for things that you need to keep secure. The EFF has released a scorecard that rates over 40 different messaging services on seven point ranging from encryption to code audits. This scorecard was launched late 2014 but has been kept updated with the most recent change being 2016/3/13. Of the most commonly used applications FaceTime and iMessage are only popular messaging apps that are relatively secure, and there are quite a few apps that have been developed and been marketed as secure which score higher still.
For the full list follow this link. https://www.eff.org/secure-messaging-scorecard
In more recent news last friday at the ABA Techshow there was a panel called “Can They Hear Me Now? Practicing Law in an Age of Mass Surveillance” There is an excellent report that can be found here but there are several very import points that they cover but don't elaborate much on.
The main thing is that security is an ongoing process that requires work and you will never be perfect or done. Everything is the field is evolving and changing so even if you were secure a few months ago you may not be now. You should research the software you are using and see if they have a history of strong or weak security or if any new problems have been discovered, and when you are making changes and upgrades to software make security a priority. Often there are more secure alternatives to popular applications, a good example cited is SpiderOak as a good alternative to Dropbox.
In the wake of the 2016 LSC TIG Conference we now have some videos online. Not every video is up yet but we do have some good ones. One of the interesting talks we had was LSC's New Technical Projects, in this talk they went over what LSC has been doing, how they plan on sharing what they have been doing with grantees. and general tech discussion. Intermediate Information Security which covers a lot of interesting ground and is aimed at the people in charge of technology. It's more technical than presentations aimed at upper management and has a broader scope than one aimed at the individual user.