Women Who Tech: 2nd Annual Telesummit
ROSE Blog: Rikki's Open Source Exchange
Mark your calendars for May 12, the date of the 2nd Annual Women Who Tech Telesummit, which will be held via phone and web.
Registration opens in April. The 2009 Women Who Tech Panels are:
- Launching Your Own Start-Up: Rashmi Sinha, SlideShare and Amy Muller, Get Satisfaction
- Women and Open Source: Michelle Murrain, NOSI and Amy De Groff, Howard County Library
- Breaking Through the Digital Ceiling: Allyson Kapin, Rad Campaign and Women Who Tech
- Feminine Mystique: Holly Ross, NTEN
- Social Networks and Diversity Barriers: Shireen Mitchell, Digital Sistas
- Video Activism: Ramya Raghavan, YouTube and Yvette Alberdingk Thijm, Witness
- What Shirky Didn’t Tell Us: Deanna Zandt, Consultant
- Innovation and Tech Career Reinvention: Dee McCrorey, Risktaking for Success, LLC
- Social Media ROI: Monique Elwell, Conversify and Heather Holdridge, Care2
- Tech Marketing in a Recession: Rachel Marshall, Vantage Communications
- Tools Galore in Online Communications: Laura Quinn, Idealware. Rebecca Moore, Google Earth, Katrin Verclas, MobileActive
- Democratizing Data and Watch-Dogging the Government: Nancy Watzman, Sunlight Foundation
To listen to the 2008 podcasts, visit: http://www.womenwhotech.com/podcasts
You can follow Women Who Tech on Twitter at: http://twitter.com/womenwhotechcomments powered by Disqus
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm