Long pages

Jump to navigation Jump to search

Showing below up to 50 results in range #1,351 to #1,400.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎DevSummit07:Towards an Open Source Grants Management Platform ‎[1,641 bytes]
  2. (hist) ‎NPTech things I learend from Sex Workers ‎[1,641 bytes]
  3. (hist) ‎How to talk about activism and security in a non scary way ‎[1,629 bytes]
  4. (hist) ‎Online Communities and tools ‎[1,625 bytes]
  5. (hist) ‎Using Ægir ‎[1,618 bytes]
  6. (hist) ‎Responsive Design for your Website ‎[1,613 bytes]
  7. (hist) ‎Running a Tech Cooperative ‎[1,606 bytes]
  8. (hist) ‎The Collective Power Playbook ‎[1,604 bytes]
  9. (hist) ‎Worker Owned Cooperatives ‎[1,597 bytes]
  10. (hist) ‎Using Power Analysis to Identify Tech Tactics for Social Justice Campaign Strategies ‎[1,574 bytes]
  11. (hist) ‎Tech to policy change pipeline ‎[1,560 bytes]
  12. (hist) ‎Solving hard infrastructure problems ‎[1,556 bytes]
  13. (hist) ‎Regular Expression ‎[1,543 bytes]
  14. (hist) ‎Smashing Corporate Power with a Database ‎[1,528 bytes]
  15. (hist) ‎SpeedGeeking ‎[1,526 bytes]
  16. (hist) ‎Effective communication and Listening ‎[1,509 bytes]
  17. (hist) ‎Requests for proposal: How to ‎[1,499 bytes]
  18. (hist) ‎Designers, Developers, & Clients Working Together ‎[1,492 bytes]
  19. (hist) ‎Drupal Introduction ‎[1,475 bytes]
  20. (hist) ‎Successful Consulting Engagement ‎[1,467 bytes]
  21. (hist) ‎Security practitioners solidarity circle ‎[1,464 bytes]
  22. (hist) ‎Best Practices in Tech Capacity Building Trainings ‎[1,459 bytes]
  23. (hist) ‎Using Jenkins to Manage Scripts ‎[1,453 bytes]
  24. (hist) ‎DevSummit07:Free Software and Open Source: How can the nonprofit sector do it better? ‎[1,450 bytes]
  25. (hist) ‎Emergency Comms with Ham Radio ‎[1,438 bytes]
  26. (hist) ‎Becoming and Being a Digital Security Worker ‎[1,437 bytes]
  27. (hist) ‎Using social media to connect and have conversations in red states ‎[1,429 bytes]
  28. (hist) ‎Open Source Tools for Internal Collaboration ‎[1,428 bytes]
  29. (hist) ‎Fundraising: How foundations think ‎[1,424 bytes]
  30. (hist) ‎Evaluating security risks when working with high-risk constituents ‎[1,424 bytes]
  31. (hist) ‎Maplight technology, data, webtools ‎[1,424 bytes]
  32. (hist) ‎Restaurant Resource ‎[1,420 bytes]
  33. (hist) ‎How can we co-promote projects and agendas? ‎[1,417 bytes]
  34. (hist) ‎Lifecycles of websites ‎[1,406 bytes]
  35. (hist) ‎Open Source Community Management ‎[1,399 bytes]
  36. (hist) ‎Principles of Collaboration Between Unlikely Allies ‎[1,377 bytes]
  37. (hist) ‎Taking Advantage of the Cloud ‎[1,364 bytes]
  38. (hist) ‎Developing and Using Low-End Mobile Tools, Including SMS, SIM Toolkit, and Simple Apps ‎[1,340 bytes]
  39. (hist) ‎DevSummit07:Peer-to-Peer Trainings and Skillshares ‎[1,336 bytes]
  40. (hist) ‎Intro to Plone ‎[1,313 bytes]
  41. (hist) ‎DevSummit07:Usability, part 2 ‎[1,309 bytes]
  42. (hist) ‎Working with Non Allies ‎[1,285 bytes]
  43. (hist) ‎Best Practices for Plone Performance ‎[1,280 bytes]
  44. (hist) ‎How We Designed and Built Fluxx ‎[1,273 bytes]
  45. (hist) ‎Scaling of data portability: what is possible? ‎[1,270 bytes]
  46. (hist) ‎Community Wireless Round Table: Where Are We Now? ‎[1,267 bytes]
  47. (hist) ‎Membership management with Plone and Salesforce ‎[1,265 bytes]
  48. (hist) ‎Science fair topics ‎[1,261 bytes]
  49. (hist) ‎Why plenarys and panels suck ‎[1,239 bytes]
  50. (hist) ‎Tips for the aspiring Open Source Project ‎[1,236 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)