Electoral Reform Society (ERS) got creative to make its Twitter links informative and personal. Here, ERS’s Digital Communications Officer shares the step-by-step process so any organisation can follow its lead.
Nonprofits are proud of their massive email lists, and rightly so. However, we all know that the quality of one’s supporters is more important than the quantity. The New Year is the perfect time to do some house [file] keeping and ditch the junk. We’ve outlined five tips to get you on your way.
We collaborated with the bright minds at Zuri Group to bring you a state-of-the art system that capitalizes on the fundraising potential of your supporters’ life events. This P2P fundraising platform is easy for you – and your supporters – to manage, but also offers the robust reporting and exceptional tech support that you’ve come to expect from Engaging Networks.
In October 2015, more than 140 clients, partners and Engaging Networks’ staff gathered at The American Institute of Architects in Washington, D.C. to share best practices, discover new and hidden features of the system and learn what we’ve got in store for next year. We’re now happy to share the videos we captured during the 2-day event.
Conversations around data capture need to take place at the project’s beginning; there’s no point planning a visually brilliant campaign only to discover that you’re missing out on vital pieces of supporter information. And once you collect the data, be sure to anaylse it for proper evaluation and to learn any lessons.
JMG Solutions built a “Super Importer and Exporter,” also known as the “SIE.” This Raiser’s Edge plug-in allows for one-click access to your Engaging Networks information via an application programming interface, or “API,” that Engaging Networks makes available.
To raise maximum funds or get the most signatures for your petition, you need to know how to use email most effectively. So what are the characteristics of effective emails? We are sharing 5 tips from what we’ve learned from our research and our clients’ experience over the years.
We set up a form field that is invisible to human users, who will therefore never populate it. But the field is visible to spambots, which will populate it. This gives us a way to differentiate between human users and spambots. We also just added a custom validator to the form field; one that checks that it is still empty when the form is submitted. If the field isn’t left empty, then our software smells a rat (detects a spambot) and blocks the submission!