One blog, One year, a lot of Women
ROSE Blog: Rikki's Open Source Exchange
Happy Anniversary to my humble blog!
When I look back over my past year of blogging, I have to wonder whether the FLOSSPOLS research indicating that the FLOSS community is composed of only 1.5% women is still accurate.
Over the course of the past year, I've learned about individuals, groups, meetings, webinars, resources, books, dinners, organizations, mailing lists, interviews, articles, websites, and events that are by, about, or of interest to women in open source. I've also noticed a growing interest in the future of women in open source and how to help girls (or, as I like to think of them, "women-in-open-source-to-be"s) become more involved with technology.
In honor of this anniversary, I thought it was appropriate to get back to basics: Mentors.
Cheers and Happy Mentoring!
Thank you for mentioning Jo Miller's ColumnDear Rikki
Thank you so much for referencing Jo Miller's Column on the Anita Borg Institute Website. Our newsletter, which is publishing tomorrow morning, has a host of information on mentoring including links to our Fast Company blog and our own ABI blog. Please let me know if you would like me to send you a copy of the newsletter. My email is email@example.com.
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.