{"id":76997,"date":"2018-03-28T14:21:34","date_gmt":"2018-03-28T14:21:34","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/applications-now-open-hackathonais\/"},"modified":"2025-10-28T13:45:26","modified_gmt":"2025-10-28T13:45:26","slug":"applications-now-open-hackathonais","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/applications-now-open-hackathonais\/","title":{"rendered":"Les applications pour Hackathon sont maintenant ouvertes @ AIS"},"content":{"rendered":"<p>Le processus de demande pour le Hackathon @ AIS est maintenant ouvert. Le Hackathon @ AIS est un \u00e9v\u00e9nement visant \u00e0 exposer les ing\u00e9nieurs de la r\u00e9gion africaine au d\u00e9veloppement des standards Internet ouverts et est co-organis\u00e9 par l&rsquo;Internet Society et l&rsquo;AFRINIC. Ce sera le deuxi\u00e8me \u00e9v\u00e9nement de la s\u00e9rie suite <a href=\"https:\/\/www.internetsociety.org\/blog\/2017\/05\/isoc-and-afrinic-launch-inaugural-hackathon-ais\/\">\u00e0 un \u00e9v\u00e9nement r\u00e9ussi qui s&rsquo;est tenu \u00e0 Nairobi<\/a> l&rsquo;ann\u00e9e derni\u00e8re pendant le Sommet de l&rsquo;Internet en Afrique.<\/p>\n<p>Une liste des sujets qui seront <a href=\"https:\/\/hackathon.internetsummitafrica.org\/\">couverts cette ann\u00e9e peut \u00eatre trouv\u00e9e ici<\/a>.<\/p>\n<p>Les ing\u00e9nieurs r\u00e9seau \/ syst\u00e8mes, les d\u00e9veloppeurs de logiciels et les \u00e9tudiants en informatique sont encourag\u00e9s \u00e0 postuler, car l&rsquo;engagement dans le d\u00e9veloppement de normes Internet ouvertes peut aider \u00e0 poursuivre leur carri\u00e8re.<\/p>\n<p>L&rsquo;\u00e9v\u00e9nement aura lieu les 9 et 10 mai 2018 \u00e0 Dakar au S\u00e9n\u00e9gal. Si vous \u00eates int\u00e9ress\u00e9 \u00e0 participer ET que vous pouvez vous engager \u00e0 \u00eatre disponible pendant les 2 jours, veuillez remplir le formulaire de demande. L&rsquo;espace est limit\u00e9 et les candidats retenus seront inform\u00e9s et ensuite \u00eatre inscrits \u00e0 diverses sessions de formation en ligne dans la construction de l&rsquo;\u00e9v\u00e9nement.<\/p>\n<p>Des bourses seront attribu\u00e9es \u00e0 des candidats forts si possible.<\/p>\n<p><strong>Les inscriptions se terminent le 8 avril 2018.<\/strong><\/p>\n<p><a href=\"https:\/\/hackathon.internetsummitafrica.org\/\">Soumettez vos applications ici !<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le processus de demande pour le Hackathon @ AIS est maintenant ouvert. Le Hackathon @ AIS est un \u00e9v\u00e9nement visant \u00e0 exposer les ing\u00e9nieurs de la r\u00e9gion africaine au d\u00e9veloppement des standards Internet ouverts et est co-organis\u00e9 par l&rsquo;Internet Society et l&rsquo;AFRINIC. Ce sera le deuxi\u00e8me \u00e9v\u00e9nement de la s\u00e9rie suite \u00e0 un \u00e9v\u00e9nement r\u00e9ussi [&hellip;]<\/p>\n","protected":false},"author":216,"featured_media":76777,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[189,169],"tags":[3463,6215,3464],"region_news_regions":[113],"content_category":[6101],"ppma_author":[4147],"class_list":["post-76997","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evenements","category-les-normes-internet-ouvertes","tag-african-internet-summit-fr","tag-evenements","tag-hackathon-fr","region_news_regions-afrique","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais.jpg",976,651,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais-768x512.jpg",768,512,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais.jpg",976,651,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais.jpg",976,651,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais.jpg",976,651,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hackathon-ais.jpg",600,400,false]},"uagb_author_info":{"display_name":"Betel Hailu","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/hailu\/"},"uagb_comment_info":0,"uagb_excerpt":"Le processus de demande pour le Hackathon @ AIS est maintenant ouvert. Le Hackathon @ AIS est un \u00e9v\u00e9nement visant \u00e0 exposer les ing\u00e9nieurs de la r\u00e9gion africaine au d\u00e9veloppement des standards Internet ouverts et est co-organis\u00e9 par l&rsquo;Internet Society et l&rsquo;AFRINIC. Ce sera le deuxi\u00e8me \u00e9v\u00e9nement de la s\u00e9rie suite \u00e0 un \u00e9v\u00e9nement r\u00e9ussi\u2026","authors":[{"term_id":4147,"user_id":216,"is_guest":0,"slug":"hailu","display_name":"Betel Hailu","avatar_url":{"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url2x":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g2x"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/76997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/216"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=76997"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/76997\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/76777"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=76997"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=76997"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=76997"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=76997"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=76997"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=76997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}