CLICK HERE FOR BLOGGER TEMPLATES AND MYSPACE LAYOUTS »

Sunday, May 17, 2020

The OWASP Foundation Has Selected The Technical Writer For Google Season Of Docs

The OWASP Foundation has selected the technical writer for Google Season of Docs by Fabio Cerullo


The OWASP Foundation has been accepted as the organization for the Google Seasons of Docs, a project whose goals are to give technical writers an opportunity to gain experience in contributing to open source projects and to give open-source projects an opportunity to engage the technical writing community.

During the program, technical writers spend a few months working closely with an open-source community. They bring their technical writing expertise to the project's documentation, and at the same time learn about open source and new technologies.

The open-source projects work with the technical writers to improve the project's documentation and processes. Together they may choose to build a new documentation set, or redesign the existing docs, or improve and document the open-source community's contribution procedures and onboarding experience. Together, we raise public awareness of open source docs, of technical writing, and of how we can work together to the benefit of the global open source community.

After a careful review and selection process, the OWASP Foundation has picked the primary technical writer who will work along the OWASP ZAP Team for the next 3 months to create the API documentation of this flagship project.

Congratulations to Nirojan Selvanathan!

Please refer to the linked document where you could look at the deliverables and work execution plan.



Related links

  1. Body Hacking
  2. Growth Hacking Que Es
  3. Rom Hacking Pokemon
  4. Un Hacker
  5. Definicion De Hacker
  6. Paginas De Hacking
  7. Hacker Blanco
  8. Kali Hacking
  9. Hacking Con Buscadores Pdf
  10. Hacking Libro
  11. Aprender Seguridad Informatica
  12. Experto En Seguridad Informática
  13. Curso De Ciberseguridad Y Hacking Ético
  14. Penetration Testing A Hands-On Introduction To Hacking
  15. Hardware Hacking
  16. Rom Hacking Pokemon

0 comments: