About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
GNU/Linux Summit was a success
Friday, 5 March 2004 22:03 EST

GNU/Linux Summit 2004 -event attracted a record number of visitors to the Finlandia Hall last week on Thursday and Friday 26-27.2.2004. All together 560 visitors participated in the seminar and lectures.


The most popular speakers in GNU/Linux Summit were GNU- and Linux-gurus Jon "Maddog" Hall and Richard Stallman. These respected and perhaps even disputed personalities presented them selves first time at the same seminar in Helsinki. Richard Stallman is the founder of the GNU Project and president of the Free Software Foundation. Jon "Maddog" Hall is known as the Executive Director of Linux International.


Linux Standard Base application specialist Mats Wichmann was also speaking at the Summit. Furthermore

Summit presented speakers such as the member of EU Parliament Piia-Noora Kauppi and several other representatives of companies and public administration, which exploit opensource systems.


- We are very pleased about the number of Summit visitors. This year the Summit offered a lot of information and knowledge about the possibilities of opensource software and freeware. Based on the visitor feedback especially case examples from public and corporate world were very successful, comments the Finnish Chamber of Commerce area 5's manager JJ Lihr.


The plan for the next year's Summit is to concentrate even more to the practical examples.

- The field has amazing Linux and GNU experts, whose knowledge we want to share in the coming Summits. It is time to bring out these new professionals, says Lihr.


Next year's GNU/Linux Summit will be held in February and it shall continue the high level of the Summits.


Additional information:

GNU/Linux Summit: http://www.linuxsummit.org/ Junior Chamber Finland: http://www.jcfin.fi/



Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter