A is for Ada. And Assertive.
ROSE Blog: Rikki's Open Source Exchange
Over the past two years, two months, and two days, I've blogged regularly about the achievements of women in technology and science, particularly women in open source. More recently, I've interviewed more than two-dozen inspiring women. Today I get to kick back and enjoy stories from other folks about the women who inspire them.
In the spirit of Ada Lovelace Day, I'd like to honor women in technology who assert themselves, including all the women who have yet to do so.
Being assertive doesn't mean being fearless – it means you do it anyway. If you have yet to assert yourself by speaking up in a meeting, proposing or writing an article for publication, participating in or attending your first industry event, submitting a talk, joining an IRC conversation, or anything else you've thought about doing, I encourage you to do so as soon as possible. In fact, you can start today by posting a blog in honor of Ada Lovelace Day, or leave a comment on someone else's blog to share your thoughts.
And how about this for an idea: you can add your name to the growing list of diverse and inspiring women I've interviewed for this blog. Shoot me an email so we can get started.
Happy Ada Lovelace Day!
If you or someone you know would like to contribute to this interview series, please send your responses to the following questions to me at rkite AT linuxpromagazine DOT com:
- Who are you?
- What do you currently do in open source? What do you love about it?
- You're speaking to a group of women from other fields who are considering switching careers. Why should they consider moving into an open source-related career? What should they know about the open source environment to prepare them for the transition from a different field?
- You're speaking to a group of high school students (male and female). Why should they consider exploring career options in open source?
- What question do you wish I'd asked? And how would you answer it?
Read previous interviews:
ROSE Blog Interviews You (includes interviews with assertive women: S.P.Zeidler, Amber Graner, and Dru Lavigne)
comments powered by Disqus
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm