May 12th: Women Who Tech TeleSummit
ROSE Blog: Rikki's Open Source Exchange
Feminine Mystique - 11AM EDT
Women and Open Source - 11AM EDT
Breaking Through the Digital Ceiling - 12PM EDT
Tech Marketing in a Recession - 12PM EDT
Social Networks and Diversity Barriers - 1PM EDT
Tools Galore in Online Communications -1PM EDT
Innovation and Tech Career Reinvention - 3PM EDT
Launching Your Own Startup - 3PM EDT
What Shirky Didn't Tell Us - 4PM EDT
Video Activism - 4PM EDT
Transparency and Government 2.0 - 5PM EDT
Social Media ROI - 5PM EDT
Check out the 2008 TeleSummit podcasts: http://www.womenwhotech.com/podcasts
Happy TeleSummitting!comments powered by Disqus
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems