RubyConf*MI, OSCON, and "Ruby for Rails"
Coming off of a big week at OSCon it's time to announce RubyConf*MI, the first regional Ruby conference. It's being held in Grand Rapids Michigan on Aug 26th. It looks like a good conference, David Black will be speaking (the word is he'll be presenting a day of training through Ruby Power and Light ahead of the conference as well). I'm going to be speaking there too, along with several local Ruby hackers. You can see the speaker list or register for the conference at their website.
If you missed OSCon, there are a lot of places that you can find good coverage. Some of my favorite talks included:
- Jim Weirich — on Test First and Design by Contract
- Avi Bryant — on Seaside and 'web heresies'
- Amy Hoy — on user interface design
- Karl Fogel — on developer community tools that we really need
- FOSCon — not really a talk, but it was awesome
Outside of conference news, I also wanted to tell you about a great Ruby book. I just picked up a printed copy of Ruby For Rails (I've been working from a PDF up to this point). I can't say enough good things about it. While it's meant mostly for Rails hackers, to help them build up their Ruby skills, it also works well for plain Ruby hackers. At this point, it's one of three books that I think belong on every Rails hacker's desk (it's also one of a different three I'd recommend to every Ruby hacker).
Ruby for Rails looks at how Ruby works, building up objects from scratch, explaining inheritence and mixins, and exploring how a thorough knowledge of Ruby will make your Rails code better (or your Ruby code for that matter). One of my favorite chapters is the last one, Techniques for Exploring the Rails Source Code, which looks at reading the Rails source code as a way to improve your knowledge of both Rails and Ruby. This is a technique that can be expanded to many other collections of Ruby source.
If you're doing Ruby or Rails Hacking (or just getting started), and you don't own this book, go buy a copy now!
-- -pate http://on-ruby.blogspot.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Varnish Software's Hitch
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide