Feeds

Novell kicks off Hackweek

Sends its SUSE Linux developers on a seven-day busman's holiday

Internet Security Threat Report 2014

Open source developers at Novell are spending this week on a 'working holiday' that the company calls Hackweek.

Almost all of Novell's 300 SUSE Linux and open source developers around the world - plus a few guests - have been given the week to work on whatever open source projects they want to support. That's 1500 developer-days, pointed out Novell's CTO for open source, Nat Friedman, as he kicked off the week at SUSE's offices in Germany.

Some are working on existing (non-SUSE) projects, others have started new ones - the Hackweek website includes an idea-pool, where developers can suggest projects and also request help with them. Hackweek is running across seven Novell sites, in Beijing, Bangalore, Prague, Nuremberg, Boston, Provo, and Portland.

"Yahoo! does a hack-day, but this is a bit more ambitious," Friedman said. "This is the first one we've done - though we opened the idea-pool site two weeks ago, because people needed time to think about what to work on - and we're offering awards at the end of the week for the best projects."

Allocating five days gives programmers the chance to get a lot done, he added. They could even complete a project, especially if it's adapting a code-base that they already know.

For example, Novell programmer Jakub Steiner plans to spend Hackweek working on how Gnome themes are maintained. "I'd like to finally break away from the painful way we maintain our themes. Currently it's more like creating 4 different icons rather than just tweaking an icon for a particular resolution," he said on the Planet Gnome blog.

Friedman added that Novell will in future allow developers to spend up to 10 percent of their time on "working holidays" of this kind - for example, to continue working on a Hackweek project.

He said that the company plans to run Hackweek again, and hopes to involve more guests in the future as well.

Beginner's guide to SSL certificates

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.