Stories about using social media, mobile, and big data to fight crime abound these days. I started to type that “this might seem a little sci-fi to the average 70 year old grandma,” but the truth is: my septuagenarian grandma owns an iPhone, an iPad, a laptop, and...
Typhoon Haiyan/Yolanda, which recently ravaged the Philippines, has inspired us at engageSPARK to spend even more time thinking about how to built great SMS and Voice tools that can be used for disaster awareness and disaster relief efforts. The GSMA has been...
At engageSPARK, we are strong proponents of using Voice for Mobile and ICT Development projects, so it’s great to see large organizations such as the GSMA putting their support behind Voice as a mobile development service method. GSMA focuses on voice in its article,...
Mobile privacy and data security have become a big topic as more and more NGOs use mobile phones as a way to disseminate information and engage their clients. Jenny Adlem discussed these issues in her blog post addressing the potential benefits and pitfalls of big...
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.