Why Are There So Few Women in Linux? Women Stay Gramme That Runs a Computer

Total Page:16

File Type:pdf, Size:1020Kb

Why Are There So Few Women in Linux? Women Stay Gramme That Runs a Computer ict section HOWTO Encourage Women in Linux By Val Henson The Operating System or OS is the most important pro Why are there so few women in Linux? Women stay gramme that runs a computer. Computers must have an out of Linux for many of the same reasons they operating system to run or manage other programmes. The stay out of computing in general, plus a few rea OS performs basic tasks such as handling input and out sons specific to Linux. Many excellent books and research put to and from attached hardware devices. It keeps track papers have investigated this topic in depth, but we can offiles and directories on the disk and controls peripheral only summarise the top reasons why women avoid comput devices such as disk drives and printers. The OS also en ing as a whole. We'll also debunk some common theories sures that different programmes and users running at the about why women stay out of computing in general. same time do not interfere with each other and that unau thorised users do not access the system. Let's start by examining two of the most common expla nations why there are so few women in computing:"Women Currently, almost everyone in the entire computing just aren't interested in computers," and 'Women aren't as world uses Windows OS, Mac OS, UnixOS and other pro smart as men." The problem with the statement'Women just prietary softwares developed by IT conglomerates such as aren't interested in computers" is that it doesn't actually say Microsoft, Apple, and Sun Microsystems. This ensures anything. It is equivalent to answering the question "Why is profit to these companies to the tune of megabillion dol the sky blue?" with "The sky is just blue." The implicit argu lars. Needless to say, this set up also promotes consumer ment here is that women are genetically predetermined from conception to not be interested in computers. Very few people dependency on such companies who now have the digital are willing to say exactly that in so many words, but that is hegemony over all of us. the message behind the "just aren't" theory. If you are un willing to accept that women's lack of interest in computing For several years now, NGOs and other civil society is genetically predetermined, you need to start exploring what organisations involved in the promotion ofICT for advo cacy have been exploring the use ofopen source softwares environmental causes are involved. to counter digital hegemony. Open source refers to the us A more explicit version of this theory is that "Women ers'freedom to run a programme for any purpose; to study arent as smart as men," or any of the usual corollaries— how the programme works and adapt it to one's particular women aren't as good at some skill as men are, usually needs; to redistribute copies that will allow people to help mathematics, spatial reasoning, or logic. Newsweek regu each other; to improve the programme and share the im larly trumpets studies finding gender-related mental dif provements with the public. Isis promotes open source as ferences while ignoring the studies that find no difference at all. Frequently, other researchers are unable to duplicate an alternative to proprietary software amongst women's the results or find flaws in the original researchers' meth groups, women communicators and activist organisations ods, but those stories tend to get much less press. These in Asia and the Pacific region. studies also make no attempt to control for differences in me upbringing of men and women. For example, studies One such open source software is Linux that is a reli frequently show that women have better developed linguis able, secure, and cost-effective OS. Originally developed tic capability in some way. This is taken as proof, at least by by Linus Torvalds in 1991 at the University ofHelsinki in the press, that women are genetically predisposed to be more Finland, it is constantly developed by a team of volunteer verbal than men. But at the same time, studies also show programmers world wide and sold by several large soft t at young women are rewarded more than young men for ware companies. Its source code can be freely downloaded, verbalisation. The sheer existence of physical differences be modified and distributed by everyone. tween male and female brains is not in and of itself proof that men and women are bom with differences in mental capacity. We still need to separate what differences are This article is based on the experiences ofwomen Linux caused by genetics, and which are caused by the environ users!programmers in Australia, Britain, Canada, and ment. As a result, if you ask the experts, the only consensus the USA. on gender-related mental differences is that there is no con sensus. This is an area of ongoing research where results 44 women in action no. 1-2003 ict section edu/-gendergap/papers/ munity and then to fit in will continue to be hotly de When he later re-measured sigcse97/sigcse97.html>. with it. Many women who bated for decades or centu the skulls' volume with in leave the field would have ries. Something else to keep compressible lead shot, he For example, while 53 stayed if they had been in mind is that similar ar discovered that much of the male. guments have been made differences in volume be percent of the male compu about many other fields— tween the skulls disap ter science (CS) freshmM It is true that this is a from medical science to edu peared. He had been subcon rated themselves as highly prepared for their feedback loop:fewer women cation—when women first sciously stuffing the skulls in computing leads to fewer began joining them. For ex belonging to white males courses, zero percent of the women in computing. It is ample, women couldn't be with more linseed than the femalethemselves CS freshmansimilarly. Butrated at important to understand doctors because they skulls belonging to women or that this feedback loop weren't physically strong non-white men. Keep this the end of the year, six out causes women to leave com enough to set broken bones, story in mind when you read interviewedthe seven female had either students an A puting, who wouldn't have would faint at the sight of studies claiming to find that left if, all other things being blood, or didn't have the some brain structure is a dif or B average. Objective rat equal, they had been men. proper bedside manner. ferent size in men and ings don't agree with most This is important because Those arguments were women's self-estimation. 1 women. personally encountered this male classmates often as abandoned when women phenomenon: Despi e sume their female counter turned out to be just as good Now that we've ad plenty of objective evidence parts leave the field because doctors and teachers as dressed some common mis they "just aren't good men. Maybe men will turn conceptions about women to the contrary, including enough." Women's low self- out to be better at compu and computing, let's look at grades, time spent on as estimation contributes to ter science than women,but the real reasons why women signments, and high place this false impression. history does not support stay out of Linux and com ment in a programming con that hypothesis. puting. I personally believe test,myselftobeatthetopofmy I still didn't consider Women are Discour that the tendencies and aged from an Early Age A good reference for behaviors I'm about to de class in college. Looking Societal pressure for the general topic of measur scribe are the result of the back objectively, it seems women to avoid computing ing differences between hu way most women are raised: clear to me that I was per forming as well or better begins at an extremely early man groups and the moti in other words, they are the age. Preschoolers already vation behind those meas than many of the far more result of gender socialisa confident men in my class. have conceptions about urements is The tion. I'm not claiming that which jobs are men s, and Mismeasure of Man by women are bom less confi which are women's. An ex Women Have Fewer Steven Jay Gould. Scien dent, or anything else, I'm cellent review of studies tists have been "proving" just observing general ten Opportunities for documenting gender role differences in the brains dencies in women and point Friendship or Mentoring socialisation from an early and bodies of groups of hu- ing out how Linux culture Like any other disci age can be found in Dr. Ellen mans for centuries, al discourages people with pline, computer science is Spertus's excellent"Why are though in hindsight, both those tendencies. Many of easier to learn when you There so Few Female Com their methods and their re the reasons I'm about to list have ftiends and mentors to puter Scientists?" paper: ^v sults were flawed. For ex also apply to other under- ask questions from and form ample, Stephen Jay Gould represented groups in com a community with. How reviews the methods of one puting or science. ever, for various reasons, scientist measuring skull men usually tend to mentor capacity in men and women Women are Less and become friends with of different races (and by Confident other men.When the gender implication, brain size and Women severely under imbalance is as large as it is intelligence).
Recommended publications
  • Australian Open Source Industry & Community Report 2008
    The Australian Open Source Industry & Community Report 2008 Sponsors & Industry Community Map of Education & Supporters Respondents Skills 5 9 11 12 15 Careers & Innovation The Market Business Opinion Employment Development 17 19 19 21 23 Methodology. The Australian Open Source Industry & Community Report was Promotion commissioned and executed by Waugh Partners, with the financial support of sponsors, NICTA, IBM and Fujitsu. The Census was directly promoted through a national roadshow which traveled to every capital city, on several mailing lists including Linux We worked closely with psychometricians and statisticians provided by Australia, Open Source Industry Australia and user groups around the NICTA, our primary research partner, to ensure the end-to-end quality country, and through direct contact with Open Source community of the research. While our sponsors and supporters provided feedback members and companies. Indirect promotion included blogging, media at numerous points throughout the project lifecycle, this report is the coverage, and notification to members of the Australia Computer result of independent analysis by Waugh Partners. It is based on data Society, AIIA, OzZope and numerous other organisations. collected through a pair of online surveys held between October and December 2007. Projections Community We have been very careful to make conservative projections, particularly related to industry revenue. The community survey was aimed at “individuals who contribute to Open Source projects and communities in any capacity, not just Our projected industry and export revenue figures are based upon software development”, and received 315 complete and legitimate the projected industry size and spread of companies compared to the responses, with 66 incomplete.
    [Show full text]
  • Securing Linux
    466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iii How to Cheat at Securing Linux Mohan Krishnamurthy Eric S. Seagren Raven Alder Aaron W. Bayles Josh Burke Skip Carter Eli Faskha 466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iv Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. PUBLISHED BY Syngress Publishing, Inc.
    [Show full text]
  • Linux Conf Australia 報告
    Linux Conf Australia 報告 http://lca2007.linux.org.au/ 須崎有康 Linux 3大カンファレンスの一つ • Ottawa Linux Symposium – http://www.linuxsymposium.org • LinuxKongress – www.linux-kongress.org • 歴史 – Melbourne, 1999 (known as CALU) http://www.linux.org.au/conf/1999/ – Sydney, 2001 http://www.linux.org.au/conf/2001/ – Brisbane, 2002 http://www.linux.org.au/conf/2002/ – Perth, 2003 http://www.linux.org.au/conf/2003/ – Adelaide, 2004 http://www.linux.org.au/conf/2004/ – Canberra, 2005 http://www.linux.org.au/conf/2005/ – Dunedin, 2006 New Zealand http://www.linux.org.au/conf/2006/ – Sydney, 2007http://lca2007.linux.org.au スケジュール • 2007/01/15-16 Mini Conf Debian GNOME Education Embedded Virtualization MySQL Research Debian GNOME Education Gaming Kernel PostGresS OpenOffice. LinuxChix QL org • 2007/01/17-19 Linux Conf Australia 本会議 – 会場:Univ New South Wales (Sydney) – 参加者 1,000人ぐらい? – 有名人:Linux Torvalds, Andrew S. Tanenbaum (招待講演), Andrew Morton, Ted Ts’o, Rusty Russell, Andrew Tridgell –NTT藤田さん、筑波大 表さん、VA Linux Simon さん、AIST 八木、須崎、 • メジャーな人(Linus, Morton)は来ているが、Ottawa Linux Symposiumのような北米(IBM, Intel, RedHat )の組織的な参加がない。日本も無い。 MiniConf – 私が主に出たトラック – Virtualization (Sponsor HP) • http://virtminiconf.linux.hp.com/program • 予想外にメジャーなものがない。LCA本会議のほうが メジャーな発表あり。CFP(2006/12)の関係? –Kernel • http://lca2007.linux.org.au/Miniconfs/Kernel • Linus, Andrew Morton が参加。 MiniConf Virtualization • 1100-1140 Xen Image Manager - Jonathan Oxer – Local storage ではなく、external storage のマネージャ (build, demolish, propagete) – Node, VM, Image 毎の Config (Memory, Disk, CPU) – http://jon.oxer.com.au/xim/
    [Show full text]
  • Digital Anthropology
    Digital Anthropology Digital Anthropology Edited by Heather A. Horst and Daniel Miller London • New York English edition First published in 2012 by Berg Editorial offi ces: 50 Bedford Square, London WC1B 3DP, UK 175 Fifth Avenue, New York, NY 10010, USA © Heather A. Horst & Daniel Miller 2012 All rights reserved. No part of this publication may be reproduced in any form or by any means without the written permission of Berg. Berg is an imprint of Bloomsbury Publishing Plc. Library of Congress Cataloging-in-Publication Data A catalogue record for this book is available from the Library of Congress. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN 978 0 85785 291 5 (Cloth) 978 0 85785 290 8 (Paper) e-ISBN 978 0 85785 292 2 (institutional) 978 0 85785 293 9 (individual) www.bergpublishers.com Contents Notes on Contributors vii PART I. INTRODUCTION 1. The Digital and the Human: A Prospectus for Digital Anthropology 3 Daniel Miller and Heather A. Horst PART II. POSITIONING DIGITAL ANTHROPOLOGY 2. Rethinking Digital Anthropology 39 Tom Boellstorff 3. New Media Technologies in Everyday Life 61 Heather A. Horst 4. Geomedia: The Reassertion of Space within Digital Culture 80 Lane DeNicola PART III. SOCIALIZING DIGITAL ANTHROPOLOGY 5. Disability in the Digital Age 101 Faye Ginsburg 6. Approaches to Personal Communication 127 Stefana Broadbent 7. Social Networking Sites 146 Daniel Miller PART IV. POLITICIZING DIGITAL ANTHROPOLOGY 8. Digital Politics and Political Engagement 165 John Postill – v – vi • Contents 9. Free Software and the Politics of Sharing 185 Jelena Karanović 10.
    [Show full text]
  • SUBMIDIALOGIAS Peixe Morto
    SUBMIDIALOGIAS Peixe Morto Estimulamos que este livro seja livre para ser copiado, modificado e distribuiído, sem a necessidade de permissao prévia, desde que não sirva para nenhum fim comercial, e desde que seja mantidos os nomes dos autores originais. Obras derivadas devem manter esta mesma licença ou outra com base na filosofia do comum. Toda utilização com objetivos artísticos, educacionais e submidiáticos é incentivada, assim como a adaptação para outras midias e formatos, como canções, videos, audiobooks, pinturas, programas de rádio ou TV. Este livro foi produzido por: Produção Gráfica: Roger Borges Organização do livro: Fabiane Morais Borges Capa: George Sanders Realização: Submidialogias Este livro foi produzido com a colaboração dos autores participantes da lista de discussão Submidialogias e alguns parceiros de redes convergentes. Foi diagramado inteiramente com softwares e fontes livres. Livro Submidialogia 3 Índice 5 - Introdução Fabiane Borges 7 - Manifesto Errorista Internacional Errorista 1 5 - Ciência Serena Maira Begalli & Amanda Wanderley 1 7 - Inovação e tecnologias livres Felipe Fonseca 29 - Copyright, Copyleft e Creative Anti-Commons Anna Nimus 59 - Dos abusos da lingua Morgana Gomes & Caio Resende 65 - Submidialogias - entre a mão e a contramão Ricardo Ruiz 85 - Quase infinito e/ou apodrece e vira adubo submidiático Vitoria Mario 94 - Decrystallization Jonathan Kemp 97 - Descristalização Jonathan Kemp 1 01 - Um corpo Grupo Empreza Mariana Marcassa 1 05 - A body Grupo Empreza Mariana Marcassa 1 1 1 - Sexo pela internet
    [Show full text]
  • Gender Dimensions of Free and Open Source Development
    THE MAKING OF LABORER SUBJECTIVITY AND KNOWLEDGE IN THE INFORMATION INDUSTRY: GENDER DIMENSIONS OF FREE AND OPEN SOURCE DEVELOPMENT Yeon Ju Oh A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2013 Committee: Radhika Gajjala, Advisor Deborah G. Wooldridge Graduate Faculty Representative Oliver Boyd-Barrett Victoria S. Ekstrand ii ABSTRACT Radhika Gajjala, Advisor This study examines female software developers as knowledge laborers with a special emphasis on free and open source software (FOSS) development. In examining female developers as knowledge laborers, this study focuses on both labor and knowledge. Women’s low participation in FOSS development is not an issue of recent years, but a consequence of women’s overall status in the computing field over the last three decades. In order to explicate women’s low participation in FOSS development, a broader historical and economic analysis is needed. Thus, this study explores the historical context of computer science education and industry in the 1980s since this is when the groundwork for FOSS development was laid. Furthermore, the power of cultural discourses that maintain and reinforce the gendered construction of FOSS development is discussed to unpack how the gendered construction is interrelated with the labor relations in the knowledge industry. In addition to the labor relations in FOSS development, this study attends to the knowledge produced by FOSS development. Knowledge gains importance as a sum of values of the knowledge producers. Source codes written by software developers turn into products that engage users with certain utility.
    [Show full text]
  • Free for All How Linux and the Free Software Move- Ment Undercut the High-Tech Titans
    Free for All How Linux and the Free Software Move- ment Undercut the High-Tech Titans by Peter Wayner This is the free electronic version of the book originally published by HarperCollins. The book is still protected by copyright and bound by a license granting you the limited rights to make complete copies for non-commercial purposes.You’re welcome to read it in electronic form subject to these conditions: 1) You may not make derivative works. You must reproduce the work in its entirety. 2) You may not sell versions. 3) You refer everyone receiving a copy to the website where they may get the latest corrected version. (http://www.wayner.org/books/ffa/). A full license developed by the Creative Commons (www.creativecommons.org) will be forth- coming. Please write ([email protected]) if you have any questions or suggestions. Disappearing Cryptography, 2nd Edition Information Hiding: Steganography & Watermarking by Peter Wayner ISBN 1-55860-769-2 $44.95 To order, visit: http://www.wayner.org/books/discrypt2/ Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be sub- merged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition “Disappearing Cryptography is a witty and enter- describes a number of different techniques to hide taining look at the world of information hiding.
    [Show full text]
  • Sistem Operasi: Konsep & Membuat Linux, Openwrt Dan ROM Android
    Sistem Operasi: Konsep & Membuat Linux, OpenWRT dan ROM Android Onno W. Purbo OnnoCenter 2017 DAFTAR ISI DEDIKASI...........................................................................................................................................9 KATA PENGANTAR.........................................................................................................................10 BAB 1: PENDAHULUAN.................................................................................................................11 Overview Buku..............................................................................................................................11 Sistem Operasi...............................................................................................................................12 Tipe Sistem Operasi.......................................................................................................................12 Real-time...................................................................................................................................12 Multi-user..................................................................................................................................12 Multi-tasking vs. single-tasking................................................................................................12 Sistem Terdistribusi...................................................................................................................13 Sistem Embedded......................................................................................................................13
    [Show full text]
  • GNU/Linux Command-Line Tools Summary
    GNU/Linux Command-Line Tools Summary Gareth Anderson somecsstudent(at)gmail.com Conversion from LyX to DocBook SGML, Index generation Chris Karakas GNU/Linux Command-Line Tools Summary by and Gareth Anderson Conversion from LyX to DocBook SGML, Index generation Chris Karakas This document is an attempt to provide a summary of useful command-line tools available to a GNU/Linux based operating system, the tools listed are designed to benefit the majority of users and have being chosen at the authors discretion. This document is not a comprehensive list of every existent tool available to a GNU/Linux based system, nor does it have in-depth explanations of how things work. It is a summary which can be used to learn about and how to use many of the tools available to a GNU/Linux based operating system. Revision History Revision 1.1 28th February 2006 Revised by: CK Corrected typos, generated new index (9000 index entries!). Revision 1.0 6th February 2006 Revised by: GA Major restructuring, now in a docbook book format. Removed large chunks of content and revised other parts (removed chapters and sectioned some areas more). This is likely the final release by the author, I hope that someone finds this guide useful as I do not intend to continue work on this guide. Revision 0.7.1 25th February 2005 Revised by: CK Set special characters in math mode, produced PDF and PS with Computer Modern fonts in OT1 encoding and created correct SGML for key combinations. Revision 0.7 5th December 2004 Revised by: GA Updated document with new grammatical review.
    [Show full text]
  • Full Circle Magazine Is Not Affiliate1d with Or Endorsed by Canonical Ltd
    Issue #16 - August 2008 full circle JAMIE STRANDBOGE THE INDEPENDENT MAGAZINE FOR THE UBUNTU COMMUNITY GIMP PART 5 GNOME-LOOK GUIDE CREATE YOUR OWN UBUNTU CREATE YOUR OWN SERVER 8 CREATE YOUR UBUNTU CREATE AND MOVE FILES CREATE A PERFECT INSTALL AND BURN IT TO CD. MMMM?? DDPPII?? SSIIZZEE IISS EEVVEERRYYTTHHIINNGG IINN:: UUSSIINNGG GGIIMMPP PPAARRTT 55 Full Circle magazine is not affiliate1d with or endorsed by Canonical Ltd. p.04 Creating And Moving Files p.06 Create Your Own Ubuntu p.08 Server Series - Part 8 p.12 GIMP - Part 5 p.15 full circle GNOME-Look Guide p.18 w w w . f u l l c i r c l e m a g a z i n e . o r g Out With The New... p.24 Ubuntu And Kubuntu Themes p.26 : Jamie Strandboge p.27 p.29 p.30 06 p.32 08 12 P. P. P. p.33 : Twitter Clients p.35 p.37 27 .35 P.15 P..18 P. P The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: You must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('full circle magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under the same, similar or a compatible license.
    [Show full text]
  • Perspective in Africa
    Report on: FLOSSWorld Africa Regional Workshop Venue, Safari Park Hotel, Nairobi, 23 to 25 February 2006 Organised by University of the Western Cape & Meraka Institute (CSIR, South Africa) in association with Idlelo Report by Enver Ravat (UWC) ([email protected]) and Kim Tucker (CSIR) ([email protected]) with input from various participants. CSIR Contact: Pumla Gqola – [email protected] FLOSSWorld Africa FLOSSWorld FLOSSWorld Participating Institutions: 1 UM NL: University of Maastricht ± MERIT/Infonomics) 2 OII UK: University of Oxford ± Oxford Internet Institute) 3 FUND ES: Government of Extremadura ±FUNDECYT 4 URJC ES: Universidad Rey Juan Carlos, Madrid 5 USUA Argentina: USUARIA 6 FVL Argentina: Fundacion via libre 7 ISOCBG Bulgaria: Internet Society Bulgaria 8 CERNET China: China Education Research Network 9 CS2S China: China Standard Software Co., Ltd 10 CDAC India: Centre for Development of Advanced Computing 11 MIMOS Malaysia: MIMOS Bhd 12 CSIR South Africa: Council for Scientific and Industrial Research 13 UWC South Africa: University of the Western Cape 14 MI2 Croatia: Multimedia Institute MI2 15 CARNET Croatia: Croatian Academic Research Network 16 ITI Brazil: ITI 17 CAMP Brazil: University of Campinas FLOSSWorld Africa Regional Agenda 2 FLOSSWorld Africa FLOSSWorld Table of Contents 1 Introduction.......................................................................................................................4 2 FlossWorld @ Idlelo2.......................................................................................................5
    [Show full text]
  • Unix/Linux Catalog (Ver 4)
    Addison-WesleyAddison-Wesley && PrenticePrentice HallHall PTRPTR 2005 Inside Switch to Linux ....................1 Expand your open source skills ......................2 Explore the issues ....................4 The revolution ............6 Have some fun ........................9 Protect your systems ................10 KEEPKEEP UPUP TOTO DATEDATE WITHWITH AW & PH PTR ONLINE Here’s a bit of what you’ll find when you stop by www.awprofessional.com and www.phptr.com: WHAT’S NEW: We don’t just publish books for the professional community; we’re a part of it. Check out our convention schedule, keep up with your favorite authors, and get the lat- est reviews and press releases on topics of interest to you. SPECIAL INTEREST AREAS: View our latest books, book series, features of the month, related links, and other useful information to help you get the job done. DOWNLOAD FREE SAMPLE CHAPTERS: You’ll also have access to product information including table of contents and author biographies. USER GROUPS: Our user group programs help volunteer, not-for-profit user groups provide their members with training and information about cutting-edge technology. COMPANION WEBSITES: Our Companion Websites provide valuable solutions beyond the book. Here you can download source code, get updates and corrections, chat with other users and authors about the books, and discover links to other websites. SUBSCRIBE TODAY: Join our monthly email newsletters to be kept up-to-date on your area of interest. We’ll also keep you informed of the latest products, promotions,
    [Show full text]