Hacker-event-theory -- Discussing design patterns for Hacker Events | |
|
|
About Hacker-event-theory | |
We're discussing the patterns common to Volunteer Run Hacker Events so that we can identify the key elements to successful events and pass these lessons on to tomorrow's hackers. To see the collection of prior postings to the list, visit the Hacker-event-theory Archives. |
|
Using Hacker-event-theory | |
To post a message to all the list members, send email to
hacker-event-theory@lists.hackerspaces.org.
You can subscribe to the list, or change your existing subscription, in the sections below. |
|
Subscribing to Hacker-event-theory | |
Subscribe to Hacker-event-theory by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. Once confirmation is received, your request will be held for approval by the list moderator. You will be notified of the moderator's decision by email. This is also a private list, which means that the list of members is not available to non-members. | |
Hacker-event-theory Subscribers | |
|
version 2.1.29 |