Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Tech Industry

Linux.conf.au 2012

By ZDNet Australia January 24, 2012, 7:37 AM PST

Image
1
of 11

Linux.conf.au 2012

LCA 2012: Bruce Perens and fans

LCA 2012: Bruce Perens and fans

Open-source luminary Bruce Perens fails to escape after explaining the importance of open software for democracy.

n

ntImage credit: (Stilgherrian/ZDNet Australia)

n

nt 

Linux.conf.au 2012

LCA 2012: hacking all the things!

LCA 2012: hacking all the things!

ntHardware hacking seems increasingly popular. Your mission, should you choose to accept it, is to identify everything photographed here at the Arduino mini-conference at LCA2012.

n

ntImage credit: (Brett James “SuperRoach”, CC BY 1.0)

Linux.conf.au 2012

LCA 2012: hacking all the shirts!

LCA 2012: hacking all the shirts!

ntWell, this shirt, anyway. Jenna Downing turns one of the oversized LCA2012 T-shirts into a dress.

n

ntImage credit: (Brett James “SuperRoach”, CC BY 1.0)

Linux.conf.au 2012

LCA 2012: attack of the drones

LCA 2012: attack of the drones

ntAndrew Tridgell, best known for his role in developing the open-source Samba implementation of Microsoft’s networking protocols, launches his semi-autonomous unmanned aerial vehicle (UAV), one of the hardware-hacking highlights of LCA 2012.

n

ntImage credit: (Christopher Neugebauer “chrisjrn”, CC BY-SA 2.0)

Linux.conf.au 2012

LCA 2012: NASA it ain't, popular it is

LCA 2012: NASA it ain't, popular it is

ntImage credit: (Christopher Neugebauer “chrisjrn”, CC BY-SA 2.0)

Linux.conf.au 2012

LCA 2012: the dangers of flight

LCA 2012: the dangers of flight

ntCloser inspection reveals that this isn’t the first time Tridgell’s UAV has crashed.

n

nt

nttImage credit: (Stilgherrian/ZDNet Australia)

n

n

nt 

Linux.conf.au 2012

LCA 2012: preparing for lift-off

LCA 2012: preparing for lift-off

ntThe Project Horus team prepares to launch one of their high-altitude balloons from Linux.conf.au. This particular balloon was a 100-gram envelope carrying a 50-gram payload that included GPS receiver, temperature sensors, and a telemetry transmitter controlled by a miniature Linux computer. The balloon reached an altitude of around 22,500 metres, and a speed of nearly 150 kilometres per hour before bursting and eventually falling into Port Phillip Bay. It was never recovered.

n

ntImage credit: (Stilgherrian/ZDNet Australia)

Linux.conf.au 2012

LCA 2012: tl;dr

LCA 2012: tl;dr

ntSome LCA2112 sessions were technical. Very technical. Too technical for some.

n

ntImage credit: (Stilgherrian/ZDNet Australia)

Linux.conf.au 2012

LCA 2012: trust us; we're from the internet

LCA 2012: trust us; we're from the internet

ntThese chaps kept the LCA2012 Wi-Fi network running smoothly for the entire week, with support from AARNet. Later, they may have been seen drinking.

n

ntImage credit: (Brett James “SuperRoach”, CC BY 1.0)

Linux.conf.au 2012

LCA 2012: shorter Jacob Appelbaum

LCA 2012: shorter Jacob Appelbaum

ntOnce you’ve seen this picture, you can skip Appelbaum’s one-and-a-half-hour keynote presentation. Unless you want to, you know, learn anything.

n

ntImage credit: (Michael Davies “mrda”, CC BY-SA 2.0)

Linux.conf.au 2012

LCA 2012: organising team

LCA 2012: organising team

ntThe Linux.conf.au organising team receive a standing ovation in the conference’s final session. And a telescope each. Linux.conf.au 2013 will be at the Australian National University in Canberra from 28 January to 2 February.

n

ntImage credit: (Michael Davies “mrda”, CC BY-SA 2.0)

  • Tech Industry
  • Account Information

    Share with Your Friends

    Linux.conf.au 2012

    Your email has been sent

Share: Linux.conf.au 2012
Image of ZDNet Australia
By ZDNet Australia
  • Account Information

    Contact ZDNet Australia

    Your message has been sent

  • |
  • See all of ZDNet's content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    Download Now

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice