Linux.conf.au 2010 kicks off in New Zealand
For the second time in its 11 year history, Linux Australia’s annual Linux technical conference – Linux.conf.au, or simply “LCA” – has headed across the Tasman Sea to New Zealand. The conference is in windy Wellington this week. See the Web site (http://www.lca2010.org.nz) for more details.
LCA is one of the little treasures of the Australian technology calendar. It’s not a big-budget IT conference like CeBit or Tech.Ed, but it consistently attracts the biggest names in Linux and open source from all around the world.
Linus Torvalds himself is known to attend – and was in Hobart for the first time last year – and multinational software companies like Google use LCA as a hunting ground for fresh talent.
Even if you’re not into Linux, I recommend getting along to a LCA to experience a well-organised community conference. Every year there is an open day (usually the last Saturday) where the public can attend free of charge and meet the organizers and community members.
I’ve had the pleasure of attending most LCAs since the first one in Sydney in 2001. [Note: the first Australian Linux conference was dubbed CALU (Conference of Australian Linux Users) and held in Melbourne in 1999. The modern Linux.conf.au format started in Sydney in 2001]
Unfortunately a combination of bad planning and work commitments has kept me away from this year’s event, but I intend to write some articles remotely.
You can also catch Computerworld’s coverage by following the linux.conf.au tag.
Best of luck to the Kiwis this year, I hope all goes well. I hope they announce where LCA 2011 will be held at the end of the event.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTIT Support EngineerNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDeliverability SpecialistNSW
Businesses and enterprises have quickly realised the power and efficiency of cloud computing, but migrating to the cloud can be a challenging process. This guide leads you through the three key steps you should take to assess your workload, select the most appropriate cloud model and ensure your cloud provider’s migration methodology stacks up.
- Telcos seek to strengthen NBN Co wholesale restrictions
- Kim Dotcom says he's set to get assets back
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- Sedgman unearths greater value for cost with ITSM switch
- Teen arrested in Heartbleed attack against Canadian tax site
- A look at the world's most powerful X-ray laser
- IBM profit falls on weak hardware sales, transition costs
- In Pictures: Ubuntu 14.04 LTS
- Google revenue jumps 19 per cent but still disappoints
- AT&T wearables to hit the smartwatch runway soon
- Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
- Automakers show off in-vehicle Wi-Fi, new smartphone interfaces
- US court rejects Lavabit appeal, cites improper procedural handling
- Connecting for Good wrestles Kansas City's digital divide
- Chrome users won't give up, keep pressing Google to restore old-style new tab page