Language Selection

English French German Italian Portuguese Spanish

Beyond FUDCon with Robyn Bergeron, Fedora Program Manager

Filed under
Linux
Interviews

"I personally would love to see more folks getting involved in areas that don't necessarily require coding skills. I think that there is enormous room for growth and contribution in these areas, and there are plenty of Linux enthusiasts out there who have the skills and imagination to make great contributions in these places." ~ Robyn Bergeron

Linux Pro Magazine: How did you first get involved with F/LOSS? When? What was your first Linux distribution? When? What do you use now?

Robyn Bergeron: I've been a Linux user for a long time, though it hasn't always been my primary OS. I remember running Slackware back in 1995, 1996, and was an on-again, off-again tinkerer through the early 2000s. My first real involvement with contributing to F/LOSS was a few years ago, when I volunteered to help out with editing papers and compiling the proceedings for the Ottawa Linux Symposium, which I did for two years before becoming involved with Fedora.

LPM: Could you please introduce yourself and tell me a little about what your role at Red Hat is and what you do for the Fedora Project?

rest here




More in Tux Machines

Android Leftovers

Huawei P Smart review

With a decent 18:9 screen, the P Smart is a fine Android phone that should appeal to anyone looking for a cheap contract phone. However, the fact it’s so similar to the Honor 9 Lite (which costs £100 less when bought SIM-free) makes it hard to recommend, especially as the Honor has a couple of extra features – dual SIM and a second front camera – which the Huawei lacks. Read more

​Bogus Linux vulnerability gets publicity

I am so sick and tired of crap security news about Android and Linux. In the latest example, GoSecure claims it's discovered Chaos: a Stolen Backdoor Rising Again. Yeah. Right. Let's look closer. First, we have a neat name. Can't have a security bug these days without giving it a sexy name. But, what is it really? Well, it requires the attacker to break into the target system by "brute-forcing SSH credentials". Wait. What? To get this you need someone to log in to your server!? Read more

The best Linux web hosting services of 2018

Linux hosting is everywhere. Whether you're looking for a simple shared hosting account or a powerful dedicated server, the chances are that you'll be offered a Linux-based option first. In many cases, you might not care. If your hosting needs are simple, you'll probably choose an account based on the allocated web space, bandwidth and similar features – the operating system is so far down most people's priority list that often it's not even mentioned in comparison tables. Read more