Language Selection

English French German Italian Portuguese Spanish

Beyond FUDCon with Robyn Bergeron, Fedora Program Manager

Filed under

"I personally would love to see more folks getting involved in areas that don't necessarily require coding skills. I think that there is enormous room for growth and contribution in these areas, and there are plenty of Linux enthusiasts out there who have the skills and imagination to make great contributions in these places." ~ Robyn Bergeron

Linux Pro Magazine: How did you first get involved with F/LOSS? When? What was your first Linux distribution? When? What do you use now?

Robyn Bergeron: I've been a Linux user for a long time, though it hasn't always been my primary OS. I remember running Slackware back in 1995, 1996, and was an on-again, off-again tinkerer through the early 2000s. My first real involvement with contributing to F/LOSS was a few years ago, when I volunteered to help out with editing papers and compiling the proceedings for the Ottawa Linux Symposium, which I did for two years before becoming involved with Fedora.

LPM: Could you please introduce yourself and tell me a little about what your role at Red Hat is and what you do for the Fedora Project?

rest here

More in Tux Machines

Using open source principles to build better engineering teams

We become better software developers by observing how some of the best software in the world is being written. Open source has changed and will continue to change the way the world builds software, not only by creating high-quality reusable components, but by giving us a model for how to produce better software. Open source gives us complete transparency into that process. Read more

LinuxCon Europe and Embedded Linux Conference Europe

How Xen Manages Security Disclosure

When security vulnerabilities are found in any piece of software, the ideal way to fix them is before the general public or attackers are made aware of bugs. Kurth explained that the traditional wisdom in security is to keep any type of predisclosure list for security as small as possible. In Xen's case, the project went through multiple iterations of its security disclosure process, in an attempt to keep things fair for both large and small vendors. Read more

IBM and Servers