BroadcastingThe number of social media users has increased exponentially. By livestreaming your meeting on social media, you can scale your outreach.

Author/s: ConfTech,
Source: Future of Meetings Library

ConfTech LabThe number of events shifting from physical to online venues is increasing every day. Diplo's Conference Tech Lab is monitoring closely to identify new trends.

Author/s: ConfTech,
Source: Future of Meetings Library

Human resourcesHuman resources is a common issue among event organisers. The size of your organising team depends on the size of your event (and your budget). 

Author/s: ConfTech,
Source: Future of Meetings Library

ConfTech LabThere is a wide range of terms used to describe the use of electronic tools for meetings. Here's what we're observing.

Author/s: ConfTech,
Source: Future of Meetings Library

ConfTech LabZoom's ease-of-use has earned it a top spot among the world's most popular online platforms. In this beginners' guide for hosts, we will show you how to use it.

Author/s: ConfTech,
Source: Future of Meetings Library

ConfTech LabShould I encourage participants to use video? How long should the Q&A be? Oh, and do I allow speakers to use PPTs?

Author/s: ConfTech,
Source: Future of Meetings Library

ConfTech LabContext is the main victim in online events. With your light-hearted hat on, watch the 'incidents' captured on video.

Author/s: ConfTech,
Source: Future of Meetings Library

ConfTech LabThe online world has some unwritten but recommended rules of (good) behaviour. Keep them in mind when you're attending an online meeting or event.

Author/s: ConfTech,
Source: Future of Meetings Library

This publication presents the thematic approach, methodology, achievements and lessons learned from a capacity development initiative on e-commerce jointly offered in 2017/2018 by DiploFoundation, CUTS International Geneva, the International Trade Centre (ITC), the Geneva Internet Platform(GIP),

Author/s: Marilia Maciel, Roxana Radu, Hannah Slavik,
Source: Other

The comic brings a worrying, yet realistic and educative story that follows a life of a cyber vulnerability, from its inception to its deployment for an actual cyberattack.

Author/s: Vladimir Radunovic, Vladimir Veljasevic,
Source: Cybersecurity Library