- Day Three

The glorious weather that had punctuated the first two days of the conference held, heralding in the third day in a blaze of sunshine. The conference proper was introduced by a keynote by Benjamin Mako Hill on Antifeatures: Why your software works against you and why software freedom offers hope of a better future. Mako explored the concept of anti-features as deliberately included functionality or a lack of functionality that users hate so much they will pay to have them removed. Some classic examples included the gator spyware that was included with free version of p2p software on the windows platform - with a spyware-free version available for a fee.

Mako took the audience through why anti-features exist to further profits, and showed how in an environment dominated by free and open software they would be unable to survive.


Fowllowing the keynote session, Jonathan Corbet gave his traditional Kernel Report, covering major milestones in kernel development since last year's conference, and addressing the challenges the kernel development team face in the year to time. Those of us with massively parallel-processing netbooks will be pleased to know the Linux kernel now scales to 4096 cpus.

Matthew Carretts talk on social Success in (and for) the Linux community covered many of the reasons that the Linux community can be a hostile and toxic place for new contributers to enter. He covered how aggressive and confrontational behaviour is rewarded and how as a community Linux will need to learn to welcome and retain new members.

As comic relief I caught Paul Fenwick's engaging presentation on the World's Worst Inventions. Covering such gems as cocaine cough-drop marketed to children and the recent children's bead product that metabolised to GHB when ingested, Paul went through a few hundred years of misguided and downright dangerous inventions.

The fourth day of the conference will feature a keynote by Glyn Moody, provocatively titled 'Hackers at the End of the World', and also the Professional Delegates Networking session.


static const char *usblp_messages[] = { "ok", "out of paper", "off-line", "on fire" };

Previously known as Jes Hall (

One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix