Speakers and Talks

Jimmy Ahlberg
Jimmy Ahlberg
Talking tech to legal: part 2
The speakers have long experience in talking tech to legal and legal to tech. In this talk we will present common mistakes, misconceptions and present an easy strategy to ease the communication between your legal team and your engineers.

TBD
Costa Alexoglou
Costa Alexoglou
Building a pair-programming app in public with Rust
This talk explores what it takes to build an open-source remote pair-programming desktop app. While building Hopp, we learned valuable lessons; from measuring video latency to understanding WebRTC internals and encoders.
We'll also discuss the attention economy and how pair-programming can help combat our fragmented attention spans.

An Engineer at Grafana Labs, he is passionate about crafting the future of observability.
Also one of the main maintainers of Hopp, the best OSS remote pair-programming app.
Alexandra Betouni
Alexandra Betouni
Building Open Source Embedded UIs with Qt & Slint
Qt and Slint both offer powerful open-source paths for creating embedded user interfaces, each with different focuses, strengths, and licensing models. In this talk, we’ll walk through practical examples of building basic UI components in both frameworks and explore the key considerations when adopting them in embedded products. We’ll look at architecture differences, performance implications, development experience, open-source availability, and build-time/runtime footprints. The goal is to help developers understand where each framework fits best in real-world scenarios, so they can make informed decisions aligned with their device constraints and product goals.

Alexandra is the CEO of Extenly, a UI software consultancy specializing in embedded user interfaces and an official partner for both Qt and Slint. With over a decade of experience in Qt development, she began her career building award-winning UI applications for BlackBerry 10 OS and medical devices. Her journey later took her into the automotive world, where she contributed to Mercedes-Benz’s MBUX system and played a key role in creating Neptune 3 UI, the reference interface for the Qt Automotive Suite.
A passionate advocate for elegant and maintainable UIs, Alexandra has authored Qt/QML online courses and was recognized as a Qt Champion in 2024 for her contributions to the community. Today, she leads her team in helping companies deliver beautiful, high-performance UIs across automotive, industrial, and IoT sectors.
Gerhard de Clercq
Gerhard de Clercq
Litterbox: Somewhat Isolated Development Environments
This presentation will introduce litterbox.work, a new open source utility for more secure software development inside sandboxes. Litterbox leverages Podman to easily create and manage sandboxes which provide some isolation between a host and a development environment. The goal here is to minimise damage in the event of a supply chain attack or similar.
The presentation will cover the motivation for and inner workings of Litterbox alongside a discussion of how its developer currently uses it for their own development work.

Gerhard currently works as an Embedded and Digital Systems Engineer at LNF in Gothenburg. He has a broad background in electronics spanning both software and hardware domains. However, he is most passionate about the intersection between these domains.
Ludovic Dubost
Ludovic Dubost
CryptPad: End to End encrypted collaboration can be easy to use
CryptPad is a collaborative office-suite that is end-to-end encrypted and fully open-source.
The project has been operating for over 10 years and has:
  • more than 2000 instances installed in the World
  • a flagship instance with free and paying usage at CryptPad.fr with more than 3M pads open per month by more than 300k users
  • many NGO using CryptPad to protect their forms thanks to the e2ee CryptPad Forms
In this talk we will introduce the product and its suite of applications. We will highlight some important aspects of CryptPad:
  • privacy is important and end to end encryption is key to achieve it
  • end-to-end encrypted collaboration can have a familiar UI/UX
  • end-to-end encrypted collaboration can be easy to use
We will also present the recent achievements of the project, the financial situation of the project and our plans looking ahead.

Creator of XWiki and CEO of XWiki SAS, I'm the gentle organizer of the XWiki SAS company for now 20 years, and lead the business side of the CryptPad project.
XWiki SAS, a European company based in France and Romania, only building free & open-source software leads the development of the XWiki Software used by thousands of organizations and helps companies and organizations all over the world organize, share, and collaborate on content. XWiki also leads the development of CryptPad, the E2EE Real-time Collaborative Suite, including Simple pads, Office document Editors, Drive, Online Forms and more.
A graduate of Ecole Polytechnique (X90) and Telecom Paris (95), I started my career as a software architect for Netscape Communications Europe. After being a CTO of an Internet usage analysis startup during the Internet Bubble and understanding how it works, I joined the FOSS movement.
I've been a speaker at various events including Paris Open Source Experience, FOSDEM, OW2 Conference, JDLL, Capitole du Libre, speaking about Collaboration Software, Financing FLOSS software and Privacy Solutions.
I'm also member of the OpenFoodFacts board.
Harald Eilertsen
Harald Eilertsen
The Duke and the Beastie - Improving OpenJDK support for FreeBSD
The OpenJDK BSD port has been slumbering in an out-of-tree existence for years. About a year and a half ago I was contracted by the FreeBSD Foundation to improve the port on FreeBSD, and ultimately try to get our changes accepted upstream.
In this talk I will present the current state of the project, and a bit about how we got here – but also some lessons learned from taking on such a big project and trying to upstream it.

Harald Eilertsen is software developer and information security professional. He has been programming computers since the early 1980's, and has worked for companies like Tandberg, Cisco, Modirum and Automattic. He is currently self employed and working as a contractor for the FreeBSD Foundation and others.
He is a core contributor to the Hubzilla open source project and a FreeBSD ports committer.
Evilham
Evilham
Running a FOSS associative ISP
Whether neighbourhood mesh networks, Fiber To The Home or Data Center services: eXO.cat, a Barcelona-based associative ISP, offers these as a volunteer-run entity with a decision-making process marked by general assemblies and consensus amongst smaller workgroups.
We would like to share how we operate with FOSS, community, transparency and openness as core values, leading to a stable entity that helps promote other software and community projects.

Evilham does computer things professionally and for fun things like pottery, swimming, singing, dancing or learning Euskara. As the current treasurer of eXO.cat, Evilham helps with many things behind the scenes as well as other more “traditionally technical” tasks.
Jeremiah Foster
Jeremiah Foster
Modern Email
IETF's charter says: "Internet Messaging (“email”) is one of the oldest applications still supported by the IETF. It consists of numerous layers and extensions that support the robust construction, transport, retrieval, and interpretation of messages."
Email is foundational to the modern internet but has not changed much until recently. With the growing interest in self-hosting and sovereignty, there is a renewed effort around email both from organizations like ICANN and the IETF, as well as new open source and Free Software for serving, sending, and reading email.
Collaboration tools are also expected by email clients as well so email servers have to support much more than "just" email, they have to support logging in to distributed systems, encryption, files, calendars, contacts, and even arbitrary blobs.
The underlying technologies and protocols for email are changing too. SMTP and IMAP are complex, showing their age, and scale poorly. The new JMAP standard shows promise and will hopefully remove some cruft. Even mbox and Maildir are on their way out as email servers scale to billions and adopt object storage, key/value stores, and more modern databases. Even PGP has a new implementation in Rust called Sequoia which improves security of email via memory safety. Spam fighting is key to modern email and there are new techniques and tools like Rspamd.
We'll do a quick survey of what's available in terms of Mail Transfer Agents (MTAs) and Mail User Agents (MUAs) including Webmail. We'll briefly touch on Collaboration servers as well.
Lastly, we'll take a look at some of the things the future might bring and point to some RFCs so that one can create one's own tools.

TBD
Magnus Hagander
Magnus Hagander
PostgreSQL Don'ts and Dos.
PostgreSQL continues to be one of the most popular choices to back applications today. And in this, a lot of people end up running with unadjusted defaults or bringing over both application and database tuning from experiences with other systems. In this presentation we'll go over some of the more common mistakes or suboptimisations I've come across when working with many different clients over the past couple of years, and what to do to adjust them. I twill be covered with a mix of developer and DBA perspectives, as these often go hand in hand.

TBD
Ishan Jain
Ishan Jain
What did AI just do? Making LLMs Observable with OpenTelemetry
AI systems don’t crash; they misbehave. And when they do, logs and metrics alone won't tell you why. Whether you're building with GPT, open-weight models, or RAG pipelines, one question keeps coming up in production: “What did the AI just do?”, “Why did it respond that way?”, “Why is this prompt slower than before?”, “Why did our bill triple overnight?”
This talk is about making AI systems observable, not just at the infrastructure layer, but at the model behavior layer. Using OpenTelemetry and open-source tooling like Jaeger and Prometheus, we’ll walk through how to trace prompts, monitor costs, detect drift, and correlate weird model behavior with your application flow. If you're deploying AI into real systems and want visibility that goes beyond “Something went wrong”, this talk will give you the frameworks and tools to stop guessing and start understanding.

An ex-rocket science student turned SRE and now a Developer Experience Engineer at Grafana Labs, I am a core maintainer for the Grafana Ansible Collection and the Grafana Operator, with over 2 million downloads combined.
Olle E. Johansson
Olle E. Johansson
SBOM today: What is the state of SBOMs?
The EU Cyber Resilience Act is built around supply chain security with an SBOM in the middle of it all. What is an SBOM? What's the problem it is trying to solve and what is the status of the world of SBOMs?
Olle will take you through what the expectations are and where the reality is today, and give some practical examples on open source tools to use.

Olle is active in OWASP, OpenSSF, ORCWG and in his own garden during summer. He is also co-founder of the SBOM Europe project
James Lowden
James Lowden
The Once and Future COBOL
GCC 15 for the first time included COBOL among the languages it compiles.
The reader may well wonder why a small company would devote years of development to produce a product they don't own and can't sell. The reader might also wonder why GCC decided to include COBOL. In short, what use is COBOL?
To those questions and more, we have answers.
As Mark Twain said of himself, news of COBOL's demise is much exaggerated. Industry studies show billions of lines of COBOL still in production. With a probability of 95%, your last ATM transaction went through a COBOL application. Not for nothing did nearly every large firm pull out all the stops 30 years ago to add two digits to the date, to adapt their critical software to the 21st century. They didn't do that to throw it all away. It still chugs along.
COBOL remains useful because it was specifically designed for its problem domain. No language is better suited for nuts-and-bolts unglamorous data processing. For example, COBOL defines an I/O model, numerical precision, 8 forms of rounding, and over 100 runtime exceptions.
Programming languages often have shallow, undeserved reputations. Lisp has too many parentheses, COBOL too many words, Perl is write-only. Let's talk about why COBOL remains viable and vital, and why it's now part of GCC.

James spent most of his career on Wall Street in quantitative research systems and databases. Today he's leads the GCC COBOL project, building a ladder to let companies escape their walled gardens.
James lives on the seacoast of Maine now, where he works from home and spends his free time in the summer, never enough, sailing the Penobscot Bay.
Jose E. Marchesi
Jose E. Marchesi
The GNU Algol 68 Project
Back in 2011, during a FSCONS in Gotheborg, I threatened to bring Algol 68 back to life, speculating that the world may be finally ready for it. Fourteen years later, the time has finally come.
Algol 68 was designed by the Working Group 2.1 of the International Federation for Information Processing (IFIP) during the late 1960s and early 1970s, leaded by Adriaan van Wijngaarden. The goal of the working group was to provide a programming language suitable to communicate algorithms, to execute them efficiently on a variety of different computers, and to aid in teaching them to students. The resulting language was in principle expected to be an evolved version of Algol 60, known shortcomings addressed, and generally improved. However, what was initially supposed to be an improved version of Algol 60 turned out to be something very different: an extremely powerful programming language, more modern and more expressive than most programming languages today, whose design exercised almost to the limit the newly invented notion of orthogonality in programming languages. Algol 68 is not like Algol 60, an important but old fashioned programming language superseded in almost every aspect by its successors, only relevant nowadays as a historical curiosity. Despite of many people claiming otherwise, Algol 68 has no successors.
The GNU Algol 68 Working Group is a group of hackers whose purpose is to bring Algol 68 back to the first line of programming where it belongs, to provide modern implementations of the language well integrated in today's operating systems and computers (like the GCC Algol 68 front-end), to produce documentation to help people to learn this fascinating language, and to explore extensions and evolve the language with the rigor, respect and seriousness that it deserves and demands.
In this talk we will introduce the GNU Algol 68 Working Group, who we are and what we are up to. The talk will mainly focus on the GCC Algol 68 Front-End, but we will also briefly look at some of the other projects we do, such as the Algol 68 support in the autotools, the a68 Emacs mode, the Algol 68 Jargon File, etc, as time allows.

GNU hacker and maintainer. Currently employed by Oracle as their Technical Lead of the Compilers and Toolchain team.
Bassem Nomany
Bassem Nomany
Using FOSS to Protect Embedded Systems Data in Transit
Modern embedded systems are no longer isolated devices sitting quietly on a PCB. They are connected systems. They talk to the cloud. They talk to each other. They talk to mobile apps, gateways, factory networks, vehicle ECUs, and backend services.
FOSS does not make your system secure automatically. It gives you tools. Security only exists if you configure, integrate, and maintain those tools correctly.
In this talk, we’re going to explore how to use FOSS stacks in both Zephyr and Linux-based embedded platforms to protect data in transit across multiple networking layers with defense in depth.
We’ll look at different protection strategies at each layer of the stack, including application layer encryption with TLS and mTLS, network-layer protection with IPSec, link-layer security with MACSec, and segmentation and policy enforcement through firewall strategies — and how to choose the right combination using threat analysis and risk assessment.

Bassem has 13+ years of experience in embedded HW/SW development and has served as team Lead & Architect for Daimler's next-gen Infotainment platform and been a lead SW architect in several Auto OEM projects. He understands the power of free open source projects to make awesome products and contribute back.
He specializes in: Resource constrained IoT devices and RTOS. Rich UX Rich information and media systems.
Tobias Olausson
Tobias Olausson
Closing foss-north 2026
A summary of the conference and a quick wrap-up

Tobias is head of the organizing committee for foss-north
Francisco Picolini
Francisco Picolini
Multi-Cloud Without the Myth: What Actually Works in Practice
“Multi-cloud” is often sold as a silver bullet—but in practice, it’s complex, expensive, and frequently misunderstood. This talk cuts through the hype and focuses on what actually works. We’ll break down real multi-cloud and hybrid patterns that succeed, why others fail, and how open-source platforms like OpenNebula enable interoperability without duplicating complexity. If you’ve been promised multi-cloud freedom and delivered operational pain, this session will resonate.

Madrilenian with an Argentinian accent. Open Source advocate, currently working on promoting sovereign cloud technologies. With extensive experience in developer relations and community building, he has held leadership roles at Mozilla and Codemotion (Italy), driving initiatives that connect technology, innovation, and people.
Francisco Picolini
Francisco Picolini
Cloud Sovereignty Is Not a Feature… It’s an Architecture
Cloud sovereignty is often marketed as a checkbox feature. In reality, it’s an architectural discipline. This talk explains why sovereignty cannot be retrofitted onto proprietary platforms—and how open-source cloud stacks allow organizations to design sovereignty by default. We’ll cover data locality, identity control, auditability, and interoperability, showing how architectural choices directly affect legal and operational autonomy.
Drawing from real deployments, including initiatives aligned with European digital strategy, we’ll demonstrate how OpenNebula enables sovereign-by-design cloud architectures that remain competitive, scalable, and future-proof.

Madrilenian with an Argentinian accent. Open Source advocate, currently working on promoting sovereign cloud technologies. With extensive experience in developer relations and community building, he has held leadership roles at Mozilla and Codemotion (Italy), driving initiatives that connect technology, innovation, and people.
David Runge
David Runge
Signing distribution artifacts with Signstar
Digital signatures are used in many contexts to guarantee the authenticity of a specific artifact, that is provided by a Linux distribution. Artifacts of distributions may be package files, repository metadata, installation media, or verified boot loader components for UEFI.
When issuing digital signatures, it is pivotal to secure the private key material and ensure, that no unauthorized entities gain access to it. Community-driven distributions, similar to other small-scale social groups in software development, are usually funded by donations and are organized in a decentralized manner. For artifact signing this often leads to using cost effective, centralized approaches (subjective to vendor lock-in), or fully automated, but unsafe approaches (which may expose private key material), and/or relying on single individuals to do the task (semi-)manually.
The Signstar project provides Rust-based tooling for creating a custom, image-based operating system, that is used for the secure signing of artifacts. Based on modern cryptographic standards, cost effective HSM backends and the avoidance of central authority, it allows also small-scale development groups to create safe signing environments for their particular needs.
This talk will provide a high level overview of the Signstar project, its various components and in what contexts it can be used.
This talk is aimed at members of Linux distributions, as well as small-scale software development groups, that have a need for digital signing of their artifacts.

I am a self-employed software developer, that works on projects related to Arch Linux. Here, my field of interest is package management, as well as cryptographic signing and verification.
Henrik Sandklef
Henrik Sandklef
License Compliance 101
In this talk I will go through copyright, license, FOSS licenses compliance, compatibility, common mistakes
The talk will serve as an introduction to beginners but also as a heads-up for non-beginners that there be are dragons here

Born. Then grew up. Then got older
Eeshaan Sawant
Eeshaan Sawant
Europe is breaking up with MS Office: Here's What's Actually Working
EU is moving away from proprietary software at an unprecedented scale, and office suites rank at the top of the list. The shift is real, and it is accelerating. But here is what no one talks about: the open-source document editing experience still has gaps — low fidelity between editors, broken formatting, outdated UI, poor AI integrations, and real-time collaboration that feels bolted on and not built in.
This talk is an honest look at what's still missing in open-source document editors and how ONLYOFFICE is solving it with native OOXML support, provider-agnostic AI support across all editors, real-time co-editing at its core, and a vast integration ecosystem which adds support for various platforms.
Key Takeaways for attendees:
  • The forces driving Europe's open-source migration
  • The gaps that still hold open-source editors back
  • The importance of AI in document editors
  • How ONLYOFFICE approaches format fidelity and collaboration differently with OOXML based document architecture

Eeshaan is a DevRel Engineer at ONLYOFFICE and a CNCF maintainer with four years deep in open source and cloud native. His job? Making technical things a little less technical – or at least, a little less painful
A seasoned speaker, he's shared stages at APIDays Australia, GNOME Summit Japan, Write the Docs Australia, UbuCon Asia, KubeCon Amsterdam and many more FOSS events across the globe.
Eeshaan loves sharing what he learns, especially around open source. His continuous contributions to the greater open source community have earned him the Dan Kohn Scholarship twice, the LiFT Scholarship, and much more.
Based in India, he spends his off-hours hitting the gym and brewing good coffee. ☕️
Bogomil Shopov
Bogomil Shopov
Disobey: FOSS tools to fight back and their adoption.
Everyone is trying to control your communication. The reasons vary from simple curiosity to pure commercial interest, all the way to using it to control one's thoughts.
Are there any ways to fight back, and why are free software and open-source tools a good alternative to the ones you use?
As cypherpunks, do we have the obligation to help people be ready for the worst, or should we only take care of ourselves? As a FOSS community do we do enough for the adoption of those protection mechanisms with our friends, family and the rest of the world?
In this talk, I will cover my experience with fighting back against #chatcontrol - what I have learned and what happened after I decided to give up. (a very short overview). Instead of losing my dignity and time with politicians, I decided to teach people how to fight back!
  • The first part of my talk covers terms like zerotrust and what decentralization is.
  • The second contains smart words and foss tools to protect your communication.
  • The third leads you through a journey to fight the smartphone zombies by using alternative services.
  • The fourth part will share some learning I had for trying people to adopt those protection mechanisms.
Take a notebook on paper to write some of it down.

Human. Artist. Hacker. Metalhead.
I’ve spent 20+ years in technology and 50+ in being human. I care deeply about free and open-source software, cybersecurity, ethical design, privacy, and tech that serves people. Through heavy metal and technology, I inspire others to become better humans, and remind creators to build tech that’s kind to us.
I fosstribute to Firefox, Thunderbird and OpenStreetMap. I do not represent any company! Bulgarian living in Prague. I run a Creative Commons-licensed theater show that encourages people to change the world.
Daniel Stenberg
Daniel Stenberg
The state of AI, slop and security
TBD, but will follow-up on the keynote Daniel gave at FOSDEM 2026

Daniel Stenberg is the founder and lead developer of the curl project. He has worked on HTTP implementations for over twenty years. He has been involved in the IETF for twelve years and he worked on the HTTP stack in Firefox for several years at Mozilla. He participates in the QUIC working group and is the author of the widely read documents "HTTP2 explained" and "HTTP/3 explained". Employed by wolfSSL.
Gry M. Tveten
Gry M. Tveten
Open source tools for the power sector
The Shyft Open Source project originated in the need for a new framework for doing hydrological forecasts for the power industry in Norway. Later, it was expanded to include tools to help orchestrate power market modeling in an operational context. PyPSA is an open source project that provides everything you need to model power markets and much else related to power markets, except hydrological forecasting and orchestration.
Combining the two has potential for allowing for fully open source power market modeling with the operational reliability required by industry. This talk will present an example of how you can combine the two frameworks, the challenges related and further development needed

TBD
Jelina Unger
Jelina Unger
Hybrid Multi Factor Authentication: Balancing On‑Premise Control and Cloud Integration with privacyIDEA
Passwords get compromised every day, and reports of hacked accounts are increasingly prevalent. Clearly, multi-factor authentication (MFA) is the answer to enhancing security for both individuals and organizations. However, the challenges of setting up and managing second-factor authentication across multiple applications can be burdensome for IT departments, consuming valuable resources and time.
This talk introduces privacyIDEA, a robust MFA management system that centralizes the management of tokens across various applications, allowing for seamless reuse across different logins. This unified approach not only reduces the management overhead for IT departments but also significantly enhances the user experience.
privacyIDEA is designed for versatility, accommodating a broad spectrum of system requirements, which allows configurations to be tailored to meet specific organizational needs. As a deliberately on-premise solution, it empowers organizations to retain control over their data and systems. Meanwhile, the increasing shift towards cloud-based systems raises critical questions regarding the continued relevance of on-premise solutions.
In contrast to our talk from last year, we will explore in this talk the ongoing importance of on-premise solutions alongside the significance of cloud systems. We will discuss the challenges of integrating these two environments, illustrating our approach with EntraID as an example to demonstrate how privacyIDEA maintains flexibility, allowing for both an on-premise-only authentication system and hybrid environments.

Jelina is a software engineer who has been working on the open-source multi-factor authentication management system, privacyIDEA, for nearly two years. She holds both a bachelor's and a master's degree in medical engineering with a focus on computer science. Her interest in cybersecurity grew during her studies and led her to contribute to the privacyIDEA project.
Lars Wirzenius
Lars Wirzenius
Distributed CI with Radicle and Ambient
Centralized systems are either vulnerable or tools of oppression. GitHub, for example, has closed accounts of people from countries the US doesn't like, or removed specific repositories Microsoft or their business partners don't like. When GitHub is down, software development around the world slows down. This has severe consequences for the impacted people, because GitHub is the expected location of much of the world's open source software. It is time to break this dependency on GitHub.
Radicle is an open-source, peer-to-peer collaboration system for software development built on top of Git. It does not require any centralized system. Radicle CI builds on top of Radicle to offer continuous integration, even distributed CI, again without centralized servers. Distributed CI means that anyone can run CI for any public project they choose and projects can choose to trust specific CI nodes. Nobody has to use a specific single server for CI. At the same time, it's easy to provide CI capacity for specific projects that need it.
This talk explains the concepts of Radicle and its CI support using the Ambient CI engine. Ambient is designed to make it safe and secure to run CI on other people's code, without having to trust the authors of that code or any of the dependencies they use.
This talk will give the audience a high level understanding of Radicle, Radicle CI, and Ambient. There will be a live demonstration. The talk will contain a project status update ("How do you compete with Microsoft's billions sponsoring 'free-for-open-source' to create vendor lock-in?") and near future plans.
This talk is aimed at all open source developers who are curious about decentralized Git.

Lars has been programming for over forty years, mostly open source. He has code running on all continents on Earth and on Mars. He contributed to the Linux kernel before it was called that. He was part of the Debian project for a very long time. He now works on Radicle, the distributed Git forge, and its CI support. In his free time he drinks too much tea and obsesses about minute details about implementing backup software.
Eirik Øverby
Eirik Øverby
Dirty Tricks: Using nginx and Lua to thwart bots and skript kiddies
(Or: Fighting denial-of-service for fun and profit.)
For fun
I want to run a BBS on an old 386 machine, but exposing it to the Internet via Telnet will turn any drive-by portscan into a potential DoS (not DOS). I'm sure we've all been there. Right?
For profit
Someone realises that throwing hundreds of thousands of TLS handshakes per second at us is worth it, and I don't have more CPU to throw at the problem. That's what we get for placing ourselves in the line of fire, I guess?
Dirty tricks
So what can be done about this? Well it turns out that with Lua and Nginx, I can solve both problems. Join me for a brief excursion into the world of retro-BBSes, an introduction to some Internet Scumbags and their shenanigans, and some possible solutions to these problems.
I'm not an active Lua coder, and I don't know nginx nearly well enough despite having used it for 15 years. So here's fair warning: Anyone who actually knows these things may catch a bout of nausea.

Model '77, Slackware-gone-BSD in the early 00s, escaped the dying world of OS/2 to be doomed to death by Netcraft for another decade. Now managing jailed (but not dead!) systems for a living and as a hobby.
Mid-life crisis topic: Retro PCs.
~ love over gold ~