Platform Developer Documentation
Search
⌃K
👋
Welcome | README
Code of Conduct
Contributing | Getting Involved
Frequently Asked Questions
Join the Ushahidi community
Contributors ✨
🛣️ The Ushahidi Platform Roadmap
Privacy and security best practices
Security as a user
Security for deployment admins
Security for deployment hosts
Development & Code
Development: Overview
How to get the source code
Setup Guides
Add code to Ushahidi
Development process
Coding Standards
Track and submit issues in Github
Upgrading Ushahidi
⚙️ Installation Helper
Tech Stack
API Documentation
Third party app development
Database | Tables overview
Database | Database Schema Diagram
Database | Table details
📐
Architecture
Use case internals
QA & Testing
The QA process
How to run QA tests
Defect Management
How to write QA test scripts
Hotfixes
Front-end development
Changing UI styles: introduction to the pattern library
Design
🎨
Design: overview
'Best practice' design
Ushahidi Platform 'Sticker Sheet'
User testing process
User testing script examples
Synthesising user testing results examples
Open Source Design
Documentation
Documentation
Contributing docs via GitHub
Translation
Localization and Translation
The Ushahidi Platform Facebook bot
The Facebook bot
Hackathon and events
Installathon, May 2019
Write/Speak/Code 2019
Open Design: Bangalore
Open Design: Taipei
📑
Google season of docs
Enhancement Proposals
Exchange Format
Importing data from previous versions
Powered By
GitBook
Privacy and security best practices
Small things that go a long way towards improving your security
Here are the articles in this section:
Security as a user
Security for deployment admins
Security for deployment hosts
Previous
V2-V3+ Migration tool
Next
Security as a user
Last modified
2yr ago