The screencast is from Douglas Napoleone of the Python Software Foundation, programming with the Django Framework.
For more than 36 episodes over the past 10 months, Trier and Rosner, the co-hosts of TWiD, have been weekly voices of the Django community – discussing big news, tracking trunk releases, covering community notes, and inviting the occasional guest to join the discussion. And this weekend, at the first ever DjangoCon, the TWiD crew gets its chance to broadcast live and uncut in front of all their peers – the community that powers the content driving TWiD each and every week.
PHPWomen.org recently held an article-writing contest on their Best Practices Forum. Authors of the two winning submissions each received copies of Zend Studio for Eclipse, a 1-year subscription to Linux Pro Magazine (which is called Linux Magazine outside North America), and the opportunity to feature their articles on the magazine websites. Congratulations goes to Rob Allen for his winning submission!
Some of the excitement, and much of the usual fanfare, were missing from the 2008 LinuxWorld event in San Francisco. Show-goers wondered whether they had ever seen a LinuxWorld with so little splash and flare. And yet, splash isn't everything. In the press rooms and business meetings, the industry seemed poised to launch a new era of appliances, netbooks, and virtual everything.
Five years and more than one-hundred episodes later, the popular LugRadio podcast has turned off the microphones. The 2008 LugRadio Live event in Wolverhampton, England, was set to be their last live show. Fortunately, and thanks to its very loyal community, the annual shenanigans will continue and LugRadio Live 2009 is already in the planning stages.
Some issues facing the open source community are difficult to explain to outsiders, but some are problems the whole world faces. One issue most people care about is the right to vote. What does the right to vote have to do with open source software?
PHPWomen.org recently held an article-writing contest on their Best Practices Forum. Authors of the two winning submissions each received copies of Zend Studio for Eclipse, a 1-year subscription to Linux Pro Magazine (which is called Linux Magazine outside North America), and the opportunity to feature their articles on the magazine websites. Congratulations goes to Gerard Sychay for his winning submission!
This article explains in four simple steps how you can use a home-based Windows PC to secure a notebook and circumvent systems such as the "Great Firewall of China". With OpenVPN, mobile users can surf without fear of the restrictions that might otherwise affect them on the local network to which they are connected, and can access all Internet content without danger of being bugged or censored.
Journalists at the 2008 Olympic Games in Beijing will not have unfettered access to the Internet. However, GPL software OpenVPN can be used to easily circumvent such censorship.
O'Reilly's annual OSCON event attracted a range of open source enthusiasts who were treated to impressive keynotes, a range of "lightening talks," and plenty of in-depth technical sessions.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.