Search results

Jump to: navigation, search
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
 
  • This document contains lightly edited notes taken on-the-fly during a team meeting. * Lots of students working on HFOSS projects in collaboration with professionals
    10 KB (1,399 words) - 18:07, 12 December 2014
  • # Explain the purpose of a blog. ...d similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and
    7 KB (1,194 words) - 17:45, 8 March 2017
  • ...HFOSS and FOSS applications that could possibly support student projects. The projects are at various levels of maturity and have a range of complexity. ...s list. Use this page as a starting point, but conduct your own search of the Web as well. Using a Web search engine, and searching for projects in majo
    57 KB (8,277 words) - 12:16, 15 April 2022
  • This page contains pointers to projects that have something in common with the foss2serve effort to help students contribute to HFOSS. * [http://www.socialcoding4good.org/ Social Coding 4 Good] - Connected to Benetech. "Every day, there are thousands of people using technology to
    5 KB (726 words) - 11:54, 1 February 2017
  • ...on the benefits and rewards of working on humanitarian software projects. The labs also enhance student knowledge of open source software development too ...e design or development practices. This is the first time the majority of the students work in groups (3-4) on a software project.
    3 KB (490 words) - 19:44, 5 February 2017
  • ...ajor learning environment. These hands-on modules will educate students on the benefits and rewards of working on open source in general and humanitarian ...roup project and it is expected that some teams do their final projects in the direction of FOSSE.
    4 KB (602 words) - 19:40, 5 February 2017
  • Students interview members of the OpenMRS community to gather information for the security assessment. ... security design principles, database-specific security considerations and the risk assessment process. They also need an introductory knowledge of using
    10 KB (1,522 words) - 11:04, 8 September 2018
  • ... computing), and explain a timeline of how a requirement progressed across the life of a particular feature. Students should be familiar with:
    18 KB (2,786 words) - 11:55, 8 September 2018
  • === Course targeted for the activity === === Brief description of the activity ===
    2 KB (238 words) - 18:14, 20 June 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Personal tools
Namespaces
Variants
Views
Actions
Events
Learning Resources
HFOSS Projects
Evaluation
Navigation
Toolbox