We're Linux, Again
The Linux Foundation is always on the move, looking for new ways to promote Linux and Open Source adoption. From Linux.com to credit cards bearing a smiling Tux, there is always something new on at Foundation HQ. At the moment, it's the return of a good idea, as last year's Linux advertising contest turns up for Round II.
The Linux Foundation announced its inaugural "We're Linux" video competition this time last year, capitalizing on the then-popular "I'm a Mac/I'm a PC" ads from Apple. The contest challenged Linux users to show "just what Linux means to those who use it, and hopefully [inspire] many to try it."
Over a hundred entries poured in, and were whittled down to five finalists, further trimmed to three winners aptly representing the global Linux community. Amitay Tweeto, the ultimate winner, received free hotel accommodations, airfare, and conference registration for the Linux Foundation's 2009 Japan Linux Symposium.
Those who missed the 2009 competition now have a second chance, as the Foundation announced last week that the contest will return this year to seek out "The Linux Super Bowl Ad."
What if the Linux community had its own ad running during the Super Bowl? How would you convey the power of Linux in a 30 – 60 video spot that would air during the big game?
Just as last year, the videos will be submitted to the community for review and (advisory) voting, though a panel of judges will have the final say, and will look for "originality, clarity of message and how much it inspires others to use Linux." Individuals may submit multiple entries, and submissions can be as simple or elaborate as desired. Groups (companies, organizations, projects, etc.) are permitted to enter, but only individuals can win — the individual submitting the video on behalf of the group becomes a "designated winner" of sorts. Entries must be received by April 4th at midnight (Pacific), with winners announced April 14th.
And, of course, not to forget what's up for grabs: The victorious filmographer will pick up a free trip to Boston, Massachusetts in August for LinuxCon, including hotel and airfare, and a brand new laptop — loaded with Linux, of course. The winning entry itself will be revealed during April's Collaboration Summit in San Francisco, California.
More information about the contest is available from the Linux Foundation's "We're Linux" page. The general disclaimers apply: you must be eighteen to play, copyrights and the Foundation's terms of service must be respected, any and all decision(s) of the judges and/or the Foundation are final, void where prohibited, no purchase necessary, etc.
Justin Ryan is a Contributing Editor for Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide