Red Hat Announces Agenda For Open Your World Forum
Day-long virtual forum finalizes its itinerary.
Red Hat and opensource.com announced the Open Your World Forum agenda today. The virtual event will be hosted by Red Hat's Michael Tiemann. Open Your World features 10 presentations that discuss tenants of open source that address social and political problems that extend beyond technology. Participation and collaboration will be major themes of the forum.
The times and speakers for the May 27 event are as follows:
8:45 a.m.: Michael Tiemann, Vice President, Open Source Affairs, Red Hat
9:00 a.m.: Dr. David Upton, Chair of Operations Management, Oxford University
9:45 a.m.: Karsten Gerloff, President, Free Software Foundation Europe andGraham Taylor, Chief Executive, OpenForum Europe
10:45 a.m.: Matt Jadud, Assistant Professor of Computer Science, Allegheny College
11:30 a.m.: Eugene Eric Kim, Cofounder and Principal, Blue Oxen Associates
12:30 p.m.: Daniel James, Director, 64 Studio Ltd.
1:15 p.m.: Dr. John Halamka, CIO of Beth Israel Deaconess Medical Center and Harvard Medical School; Chair of the US Healthcare Information Technology Standards Panel
2:15 p.m.: Michael Tiemann, Vice President, Open Source Affairs, Red Hat
3 p.m.: Richard Fontana, Open Source Licensing and Patent Counsel, Red Hat
4 p.m.: Open Source for America Panel featuring Jeremy Allison, Linux Evangelist, Google
4:45 p.m.: Karsten Wade, Senior Community Architect, Red Hat
The event is free to watch. Register here.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.