Linux Conf Australia 報告

Total Page:16

File Type:pdf, Size:1020Kb

Linux Conf Australia 報告 Linux Conf Australia 報告 http://lca2007.linux.org.au/ 須崎有康 Linux 3大カンファレンスの一つ • Ottawa Linux Symposium – http://www.linuxsymposium.org • LinuxKongress – www.linux-kongress.org • 歴史 – Melbourne, 1999 (known as CALU) http://www.linux.org.au/conf/1999/ – Sydney, 2001 http://www.linux.org.au/conf/2001/ – Brisbane, 2002 http://www.linux.org.au/conf/2002/ – Perth, 2003 http://www.linux.org.au/conf/2003/ – Adelaide, 2004 http://www.linux.org.au/conf/2004/ – Canberra, 2005 http://www.linux.org.au/conf/2005/ – Dunedin, 2006 New Zealand http://www.linux.org.au/conf/2006/ – Sydney, 2007http://lca2007.linux.org.au スケジュール • 2007/01/15-16 Mini Conf Debian GNOME Education Embedded Virtualization MySQL Research Debian GNOME Education Gaming Kernel PostGresS OpenOffice. LinuxChix QL org • 2007/01/17-19 Linux Conf Australia 本会議 – 会場:Univ New South Wales (Sydney) – 参加者 1,000人ぐらい? – 有名人:Linux Torvalds, Andrew S. Tanenbaum (招待講演), Andrew Morton, Ted Ts’o, Rusty Russell, Andrew Tridgell –NTT藤田さん、筑波大 表さん、VA Linux Simon さん、AIST 八木、須崎、 • メジャーな人(Linus, Morton)は来ているが、Ottawa Linux Symposiumのような北米(IBM, Intel, RedHat )の組織的な参加がない。日本も無い。 MiniConf – 私が主に出たトラック – Virtualization (Sponsor HP) • http://virtminiconf.linux.hp.com/program • 予想外にメジャーなものがない。LCA本会議のほうが メジャーな発表あり。CFP(2006/12)の関係? –Kernel • http://lca2007.linux.org.au/Miniconfs/Kernel • Linus, Andrew Morton が参加。 MiniConf Virtualization • 1100-1140 Xen Image Manager - Jonathan Oxer – Local storage ではなく、external storage のマネージャ (build, demolish, propagete) – Node, VM, Image 毎の Config (Memory, Disk, CPU) – http://jon.oxer.com.au/xim/ – スライド資料 http://jon.oxer.com.au/talks/id/52 • 1150-1230 Xen and the Art of Portability - Jes Sorensen – SGI Altix (IA64 NUMA)へのXen移植の話 –EFIのmem mapはベンダに依存。Xenのbootmemはlinear bitmapを仮定しているため、起動に時間が 掛かる。Yamahataの PCI Domain Support 使って解決。 • 1400-1440 UML, kvm, and Hardare Virtualization - Jeff Dike – KVM (by Avi Kivity) 2.6.20-rc4 • /dev/kvm を提供して CPU の仮想環境を利用できるようにする – UMLでptrace の変わりにKVMを使う (By Mikhail Kharitonov, Gennady Sharapov) – 解説記事 http://opentechpress.jp/print.pl?sid=07/01/19/0032218 • 1450-1530 OS Circulation Environment "Trusted HTTP-FUSE Xenoppix" - Kuniyasu Suzaki –??? 解説記事 http://opentechpress.jp/opensource/07/01/18/0136240.shtml • 1600-1640 Monitoring Linux Guests in a Virtualized Environment - Randy Levensalor – Intrusion detection にVMを使う話。 • 1650-1730 Case Study: Demo Hosting with Virtual Machines - Jason Nicholls MiniConf kernel • http://lca2007.linux.org.au/Miniconfs/Kernel • Linus, Andrew Moton など主要メンバーが参加 • 1100-1140 IA64 のシステムユーティティの話Peter Chubb (UNSW, National ICT Australia ) – http://www.gelato.unsw.edu.au/ – カーネルソースの参照関係を表示 cscope, kbild script, SCMの話。デバックのツール • 1150-1230 Reverse map scalability for anonymous pages - Lee Schermerhorn – AIM7 Benchmark suite • 1400-1440 – PS3 Linux - Ben Herrenschmidt - IBM Ozlabs – Nokie N800 - Daniel Stone - Nokia • 1450-1530 Lightning Updates (スライド無し。辛い。) – Per-page shrinking of slab caches - Jorn Engel – Superpages - Ian Wienand – PCI Slots - Matthew Wilcox • 1600-1640 Panel Discussion – Dave Jones - Fedora Kernel Maintainer - Redhat – Andi Kleen - x86-64 (and some x86) Maintainer - SuSE – Paul Mackerras - PPC maintainers - IBM Ozlabs – Christoph Hellwig - Style and Personality Maintainer and some filesystems – Dave Miller - Sparc + Networking • 仮想化の話が半分ぐらい。進行役が止めても質問が続く。 • 1650-1730 Suspend & Resume to RAM repair workshop LCA 本会議1日目 • Keynote “How to desgin a reliable Operating System“Andrew S. Tanenbaum • 1100-1140 “The Kernel Report” Jonathan Corbet – http://lwn.net/talks/lca2007/ • 1150-1230 ”Linux on the Cell Broadband Engine Architecture” Arnd Bergmann – SPU 用のFile Sytem /spu を通してデータやり取り。lbspe ()の話。 – ストリーム処理も可能。 • 1400-1440 “Fixing suspend for fun and profit” Matthew Garrett – Suspendの問題はドライバが対応していないのがほとんど。 • 1450-1530 “Making Sausage: How the OLPC Machine Was Designed” Jim Gettys – Adhoc ネットワーク Meshnet • 1600-1640 “Darbat: Virtualising a UNIX Kernel” by Charles Gray –L4 上でDarwin (MacOS kernel)を動かす話。DarwinはもともとBSD on Mach なのでL4に置き換えるの は楽? – http://www.ertos.nicta.com.au/software/darbat/ – L4上のLinuxはWonbat と呼ばれるもの • http://www.ertos.nicta.com.au/software/kenge/wombat/latest/ • 1650-1730 “Why does my machine take so long to boot?” by Matthew Wilcox – HP SuperDome (IOチャネル16×16スロットPCI-x )での起動高速化 – PCI parallel Prove などを使って90minから数分へ LCA 本会議2日目 • 0900-0940 • 0950-1030 “Kexec: Soft-Reboot and Crash-Dump Analysis for Linux and Xen” Simon Horman • 1100-1140 • 1150-1230 ” vNUMA: Virtual Multiprocessors on Clusters of Workstations”Matthew Chapman – USENIX’05 Implementing Transparent Shared Memory on Clusters Using Virtual Machines • http://www.usenix.org/event/usenix05/tech/general/full_papers/short_papers/chapman/chapm an_html/index.html • 1400-1440 “ • 1450-1530 “ • 1600-1640 “ • 1650-1730 “kboot - A Boot Loader Based on Kexec” by Werner Almesberger LCA 本会議3日目 • 0900-0940 • 0950-1030 • 1100-1140 “HTTP-FUSE CLOOP with Software RAID and DNS-Balance for Embedded Linux” Jun Kanai • 1150-1230 ” Ext4: The next generation of ext2/3” Theodore Ts'o – Ext3でもOnline resizeができる。 – Ext4ではextendにより連続領域のmultiple block allocationができる。 • 256byte inodeによりnano second のtime stamp が可能。Lustre, nfsv4互換。 • Meta Data check sumにより検証可能。Wisconsin大のIron FSが似ている。 • 1400-1440 “Writing an x86 hypervisor: all the cool kids are doing it!” • Zachary Amsden (VMware) BMI • Jeremy Fitzhardinge (XenSource) • Rusty Russell (IBM) lguest (was lhype) Rusty Visor と呼ばれてる • Chris Wright(RedHat) – スクラッチからhypervisorを作る手順 • 1450-1530 “(Para)virtualisation without pain”Peter Chubb –IA64のXen para-virtualizaionのカーネルパッチを挿入減らすAfterburing技術。 • 関連論文 Afterburning and the Accomplishment of Virtualization • http://l4ka.org/projects/virtualization/afterburn/whitepaper.pdf.
Recommended publications
  • Australian Open Source Industry & Community Report 2008
    The Australian Open Source Industry & Community Report 2008 Sponsors & Industry Community Map of Education & Supporters Respondents Skills 5 9 11 12 15 Careers & Innovation The Market Business Opinion Employment Development 17 19 19 21 23 Methodology. The Australian Open Source Industry & Community Report was Promotion commissioned and executed by Waugh Partners, with the financial support of sponsors, NICTA, IBM and Fujitsu. The Census was directly promoted through a national roadshow which traveled to every capital city, on several mailing lists including Linux We worked closely with psychometricians and statisticians provided by Australia, Open Source Industry Australia and user groups around the NICTA, our primary research partner, to ensure the end-to-end quality country, and through direct contact with Open Source community of the research. While our sponsors and supporters provided feedback members and companies. Indirect promotion included blogging, media at numerous points throughout the project lifecycle, this report is the coverage, and notification to members of the Australia Computer result of independent analysis by Waugh Partners. It is based on data Society, AIIA, OzZope and numerous other organisations. collected through a pair of online surveys held between October and December 2007. Projections Community We have been very careful to make conservative projections, particularly related to industry revenue. The community survey was aimed at “individuals who contribute to Open Source projects and communities in any capacity, not just Our projected industry and export revenue figures are based upon software development”, and received 315 complete and legitimate the projected industry size and spread of companies compared to the responses, with 66 incomplete.
    [Show full text]
  • Securing Linux
    466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iii How to Cheat at Securing Linux Mohan Krishnamurthy Eric S. Seagren Raven Alder Aaron W. Bayles Josh Burke Skip Carter Eli Faskha 466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iv Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. PUBLISHED BY Syngress Publishing, Inc.
    [Show full text]
  • Why Are There So Few Women in Linux? Women Stay Gramme That Runs a Computer
    ict section HOWTO Encourage Women in Linux By Val Henson The Operating System or OS is the most important pro Why are there so few women in Linux? Women stay gramme that runs a computer. Computers must have an out of Linux for many of the same reasons they operating system to run or manage other programmes. The stay out of computing in general, plus a few rea OS performs basic tasks such as handling input and out sons specific to Linux. Many excellent books and research put to and from attached hardware devices. It keeps track papers have investigated this topic in depth, but we can offiles and directories on the disk and controls peripheral only summarise the top reasons why women avoid comput devices such as disk drives and printers. The OS also en ing as a whole. We'll also debunk some common theories sures that different programmes and users running at the about why women stay out of computing in general. same time do not interfere with each other and that unau thorised users do not access the system. Let's start by examining two of the most common expla nations why there are so few women in computing:"Women Currently, almost everyone in the entire computing just aren't interested in computers," and 'Women aren't as world uses Windows OS, Mac OS, UnixOS and other pro smart as men." The problem with the statement'Women just prietary softwares developed by IT conglomerates such as aren't interested in computers" is that it doesn't actually say Microsoft, Apple, and Sun Microsystems.
    [Show full text]
  • Digital Anthropology
    Digital Anthropology Digital Anthropology Edited by Heather A. Horst and Daniel Miller London • New York English edition First published in 2012 by Berg Editorial offi ces: 50 Bedford Square, London WC1B 3DP, UK 175 Fifth Avenue, New York, NY 10010, USA © Heather A. Horst & Daniel Miller 2012 All rights reserved. No part of this publication may be reproduced in any form or by any means without the written permission of Berg. Berg is an imprint of Bloomsbury Publishing Plc. Library of Congress Cataloging-in-Publication Data A catalogue record for this book is available from the Library of Congress. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN 978 0 85785 291 5 (Cloth) 978 0 85785 290 8 (Paper) e-ISBN 978 0 85785 292 2 (institutional) 978 0 85785 293 9 (individual) www.bergpublishers.com Contents Notes on Contributors vii PART I. INTRODUCTION 1. The Digital and the Human: A Prospectus for Digital Anthropology 3 Daniel Miller and Heather A. Horst PART II. POSITIONING DIGITAL ANTHROPOLOGY 2. Rethinking Digital Anthropology 39 Tom Boellstorff 3. New Media Technologies in Everyday Life 61 Heather A. Horst 4. Geomedia: The Reassertion of Space within Digital Culture 80 Lane DeNicola PART III. SOCIALIZING DIGITAL ANTHROPOLOGY 5. Disability in the Digital Age 101 Faye Ginsburg 6. Approaches to Personal Communication 127 Stefana Broadbent 7. Social Networking Sites 146 Daniel Miller PART IV. POLITICIZING DIGITAL ANTHROPOLOGY 8. Digital Politics and Political Engagement 165 John Postill – v – vi • Contents 9. Free Software and the Politics of Sharing 185 Jelena Karanović 10.
    [Show full text]
  • SUBMIDIALOGIAS Peixe Morto
    SUBMIDIALOGIAS Peixe Morto Estimulamos que este livro seja livre para ser copiado, modificado e distribuiído, sem a necessidade de permissao prévia, desde que não sirva para nenhum fim comercial, e desde que seja mantidos os nomes dos autores originais. Obras derivadas devem manter esta mesma licença ou outra com base na filosofia do comum. Toda utilização com objetivos artísticos, educacionais e submidiáticos é incentivada, assim como a adaptação para outras midias e formatos, como canções, videos, audiobooks, pinturas, programas de rádio ou TV. Este livro foi produzido por: Produção Gráfica: Roger Borges Organização do livro: Fabiane Morais Borges Capa: George Sanders Realização: Submidialogias Este livro foi produzido com a colaboração dos autores participantes da lista de discussão Submidialogias e alguns parceiros de redes convergentes. Foi diagramado inteiramente com softwares e fontes livres. Livro Submidialogia 3 Índice 5 - Introdução Fabiane Borges 7 - Manifesto Errorista Internacional Errorista 1 5 - Ciência Serena Maira Begalli & Amanda Wanderley 1 7 - Inovação e tecnologias livres Felipe Fonseca 29 - Copyright, Copyleft e Creative Anti-Commons Anna Nimus 59 - Dos abusos da lingua Morgana Gomes & Caio Resende 65 - Submidialogias - entre a mão e a contramão Ricardo Ruiz 85 - Quase infinito e/ou apodrece e vira adubo submidiático Vitoria Mario 94 - Decrystallization Jonathan Kemp 97 - Descristalização Jonathan Kemp 1 01 - Um corpo Grupo Empreza Mariana Marcassa 1 05 - A body Grupo Empreza Mariana Marcassa 1 1 1 - Sexo pela internet
    [Show full text]
  • Gender Dimensions of Free and Open Source Development
    THE MAKING OF LABORER SUBJECTIVITY AND KNOWLEDGE IN THE INFORMATION INDUSTRY: GENDER DIMENSIONS OF FREE AND OPEN SOURCE DEVELOPMENT Yeon Ju Oh A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2013 Committee: Radhika Gajjala, Advisor Deborah G. Wooldridge Graduate Faculty Representative Oliver Boyd-Barrett Victoria S. Ekstrand ii ABSTRACT Radhika Gajjala, Advisor This study examines female software developers as knowledge laborers with a special emphasis on free and open source software (FOSS) development. In examining female developers as knowledge laborers, this study focuses on both labor and knowledge. Women’s low participation in FOSS development is not an issue of recent years, but a consequence of women’s overall status in the computing field over the last three decades. In order to explicate women’s low participation in FOSS development, a broader historical and economic analysis is needed. Thus, this study explores the historical context of computer science education and industry in the 1980s since this is when the groundwork for FOSS development was laid. Furthermore, the power of cultural discourses that maintain and reinforce the gendered construction of FOSS development is discussed to unpack how the gendered construction is interrelated with the labor relations in the knowledge industry. In addition to the labor relations in FOSS development, this study attends to the knowledge produced by FOSS development. Knowledge gains importance as a sum of values of the knowledge producers. Source codes written by software developers turn into products that engage users with certain utility.
    [Show full text]
  • Free for All How Linux and the Free Software Move- Ment Undercut the High-Tech Titans
    Free for All How Linux and the Free Software Move- ment Undercut the High-Tech Titans by Peter Wayner This is the free electronic version of the book originally published by HarperCollins. The book is still protected by copyright and bound by a license granting you the limited rights to make complete copies for non-commercial purposes.You’re welcome to read it in electronic form subject to these conditions: 1) You may not make derivative works. You must reproduce the work in its entirety. 2) You may not sell versions. 3) You refer everyone receiving a copy to the website where they may get the latest corrected version. (http://www.wayner.org/books/ffa/). A full license developed by the Creative Commons (www.creativecommons.org) will be forth- coming. Please write ([email protected]) if you have any questions or suggestions. Disappearing Cryptography, 2nd Edition Information Hiding: Steganography & Watermarking by Peter Wayner ISBN 1-55860-769-2 $44.95 To order, visit: http://www.wayner.org/books/discrypt2/ Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be sub- merged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition “Disappearing Cryptography is a witty and enter- describes a number of different techniques to hide taining look at the world of information hiding.
    [Show full text]
  • Sistem Operasi: Konsep & Membuat Linux, Openwrt Dan ROM Android
    Sistem Operasi: Konsep & Membuat Linux, OpenWRT dan ROM Android Onno W. Purbo OnnoCenter 2017 DAFTAR ISI DEDIKASI...........................................................................................................................................9 KATA PENGANTAR.........................................................................................................................10 BAB 1: PENDAHULUAN.................................................................................................................11 Overview Buku..............................................................................................................................11 Sistem Operasi...............................................................................................................................12 Tipe Sistem Operasi.......................................................................................................................12 Real-time...................................................................................................................................12 Multi-user..................................................................................................................................12 Multi-tasking vs. single-tasking................................................................................................12 Sistem Terdistribusi...................................................................................................................13 Sistem Embedded......................................................................................................................13
    [Show full text]
  • GNU/Linux Command-Line Tools Summary
    GNU/Linux Command-Line Tools Summary Gareth Anderson somecsstudent(at)gmail.com Conversion from LyX to DocBook SGML, Index generation Chris Karakas GNU/Linux Command-Line Tools Summary by and Gareth Anderson Conversion from LyX to DocBook SGML, Index generation Chris Karakas This document is an attempt to provide a summary of useful command-line tools available to a GNU/Linux based operating system, the tools listed are designed to benefit the majority of users and have being chosen at the authors discretion. This document is not a comprehensive list of every existent tool available to a GNU/Linux based system, nor does it have in-depth explanations of how things work. It is a summary which can be used to learn about and how to use many of the tools available to a GNU/Linux based operating system. Revision History Revision 1.1 28th February 2006 Revised by: CK Corrected typos, generated new index (9000 index entries!). Revision 1.0 6th February 2006 Revised by: GA Major restructuring, now in a docbook book format. Removed large chunks of content and revised other parts (removed chapters and sectioned some areas more). This is likely the final release by the author, I hope that someone finds this guide useful as I do not intend to continue work on this guide. Revision 0.7.1 25th February 2005 Revised by: CK Set special characters in math mode, produced PDF and PS with Computer Modern fonts in OT1 encoding and created correct SGML for key combinations. Revision 0.7 5th December 2004 Revised by: GA Updated document with new grammatical review.
    [Show full text]
  • Full Circle Magazine Is Not Affiliate1d with Or Endorsed by Canonical Ltd
    Issue #16 - August 2008 full circle JAMIE STRANDBOGE THE INDEPENDENT MAGAZINE FOR THE UBUNTU COMMUNITY GIMP PART 5 GNOME-LOOK GUIDE CREATE YOUR OWN UBUNTU CREATE YOUR OWN SERVER 8 CREATE YOUR UBUNTU CREATE AND MOVE FILES CREATE A PERFECT INSTALL AND BURN IT TO CD. MMMM?? DDPPII?? SSIIZZEE IISS EEVVEERRYYTTHHIINNGG IINN:: UUSSIINNGG GGIIMMPP PPAARRTT 55 Full Circle magazine is not affiliate1d with or endorsed by Canonical Ltd. p.04 Creating And Moving Files p.06 Create Your Own Ubuntu p.08 Server Series - Part 8 p.12 GIMP - Part 5 p.15 full circle GNOME-Look Guide p.18 w w w . f u l l c i r c l e m a g a z i n e . o r g Out With The New... p.24 Ubuntu And Kubuntu Themes p.26 : Jamie Strandboge p.27 p.29 p.30 06 p.32 08 12 P. P. P. p.33 : Twitter Clients p.35 p.37 27 .35 P.15 P..18 P. P The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: You must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('full circle magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under the same, similar or a compatible license.
    [Show full text]
  • Perspective in Africa
    Report on: FLOSSWorld Africa Regional Workshop Venue, Safari Park Hotel, Nairobi, 23 to 25 February 2006 Organised by University of the Western Cape & Meraka Institute (CSIR, South Africa) in association with Idlelo Report by Enver Ravat (UWC) ([email protected]) and Kim Tucker (CSIR) ([email protected]) with input from various participants. CSIR Contact: Pumla Gqola – [email protected] FLOSSWorld Africa FLOSSWorld FLOSSWorld Participating Institutions: 1 UM NL: University of Maastricht ± MERIT/Infonomics) 2 OII UK: University of Oxford ± Oxford Internet Institute) 3 FUND ES: Government of Extremadura ±FUNDECYT 4 URJC ES: Universidad Rey Juan Carlos, Madrid 5 USUA Argentina: USUARIA 6 FVL Argentina: Fundacion via libre 7 ISOCBG Bulgaria: Internet Society Bulgaria 8 CERNET China: China Education Research Network 9 CS2S China: China Standard Software Co., Ltd 10 CDAC India: Centre for Development of Advanced Computing 11 MIMOS Malaysia: MIMOS Bhd 12 CSIR South Africa: Council for Scientific and Industrial Research 13 UWC South Africa: University of the Western Cape 14 MI2 Croatia: Multimedia Institute MI2 15 CARNET Croatia: Croatian Academic Research Network 16 ITI Brazil: ITI 17 CAMP Brazil: University of Campinas FLOSSWorld Africa Regional Agenda 2 FLOSSWorld Africa FLOSSWorld Table of Contents 1 Introduction.......................................................................................................................4 2 FlossWorld @ Idlelo2.......................................................................................................5
    [Show full text]
  • Unix/Linux Catalog (Ver 4)
    Addison-WesleyAddison-Wesley && PrenticePrentice HallHall PTRPTR 2005 Inside Switch to Linux ....................1 Expand your open source skills ......................2 Explore the issues ....................4 The revolution ............6 Have some fun ........................9 Protect your systems ................10 KEEPKEEP UPUP TOTO DATEDATE WITHWITH AW & PH PTR ONLINE Here’s a bit of what you’ll find when you stop by www.awprofessional.com and www.phptr.com: WHAT’S NEW: We don’t just publish books for the professional community; we’re a part of it. Check out our convention schedule, keep up with your favorite authors, and get the lat- est reviews and press releases on topics of interest to you. SPECIAL INTEREST AREAS: View our latest books, book series, features of the month, related links, and other useful information to help you get the job done. DOWNLOAD FREE SAMPLE CHAPTERS: You’ll also have access to product information including table of contents and author biographies. USER GROUPS: Our user group programs help volunteer, not-for-profit user groups provide their members with training and information about cutting-edge technology. COMPANION WEBSITES: Our Companion Websites provide valuable solutions beyond the book. Here you can download source code, get updates and corrections, chat with other users and authors about the books, and discover links to other websites. SUBSCRIBE TODAY: Join our monthly email newsletters to be kept up-to-date on your area of interest. We’ll also keep you informed of the latest products, promotions,
    [Show full text]