From owner-freebsd-advocacy@FreeBSD.ORG Tue Mar 15 15:38:55 2005 Return-Path: Delivered-To: freebsd-advocacy@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0FC4216A4CE for ; Tue, 15 Mar 2005 15:38:55 +0000 (GMT) Received: from tomts20-srv.bellnexxia.net (tomts20.bellnexxia.net [209.226.175.74]) by mx1.FreeBSD.org (Postfix) with ESMTP id 36C3E43D39 for ; Tue, 15 Mar 2005 15:38:54 +0000 (GMT) (envelope-from dlavigne6@sympatico.ca) Received: from [192.168.2.87] ([67.70.71.184]) by tomts20-srv.bellnexxia.netESMTP <20050315153853.LQBJ2034.tomts20-srv.bellnexxia.net@[192.168.2.87]> for ; Tue, 15 Mar 2005 10:38:53 -0500 Date: Tue, 15 Mar 2005 10:46:02 -0500 (EST) From: Dru X-X-Sender: dlavigne6@dru.domain.org To: freebsd-advocacy@freebsd.org Message-ID: <20050315104454.W574@dru.domain.org> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Subject: BSD Certification Group press release X-BeenThere: freebsd-advocacy@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: FreeBSD Evangelism List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Mar 2005 15:38:55 -0000 -----BEGIN PGP SIGNED MESSAGE----- Greetings, Below is the first press release regarding the BSD Certification Group. We will be developing the new BSD Certification initiative throughout the coming months. As more news on this certification becomes available we will provide you with the details. I will be happy to provide further background on the BSD Certification Group. Please indicate a request for interview in the subject line. Please distribute through your normal channels. Thanks and Kind Regards, Dru Lavigne dru@isecom.org - --------------------------------------------------------------------------- March 15, 2005 BSD Certification Group Takes Initiative Today, the BSD Certification Group officially announces their website and group focused in the creation of BSD certification. The public website is at http://www.bsdcertification.org/. A number of BSD developers, systems administrators and advocates have come together to begin the first steps in the creation of a standard BSD certification. Today marks the official launch of their public website at http://www.bsdcertification.org/. The BSDs, including FreeBSD, NetBSD, OpenBSD and DragonflyBSD, are mature operating systems based on the original Unix developed at University of Berkeley, California. BSD powers global Internet service provider infrastructures, and BSD userland applications are familiar to those running Apple's OS X operating system. BSD tools like OpenSSH are used to securely access remote systems, and many TCP/IP stacks are derived from BSD. "While some may feel that a BSD certification would just replicate the problems that other certifications have created, namely lack of experience masked by a piece of paper, the committee is convinced that with the proper preparation and testing criteria, a tiered BSD certification process can demonstrate real-world proficiency as well as provide a goal for those just beginning their systems and network administration career," said Dru Lavigne, networking and Unix instructor and the chair for the group. The BSD Certification Group looks to bring together the BSD projects, important vendors, educational institutions and beyond to work to make this project a success. The group invites all who are interested to subscribe to the public BSD certification mailing list at http://lists.nycbug.org/mailman/listinfo/bsdcert. - --------------------------------------------------------------------------- - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP 6.5.8 mQENA0I27w4AAAEIALaARCYGJEiyVmEwd94Bw4YRRBDqK7WFwcETjBLj1NWSAVWa 7byLDz7Tg31+ur4kagzbuLvvLgn9At/2fcOKc3qbVKwzmFiVdC9pNRMWRGMD/57k 7915g7rOV34+19eBWs1e1MubSLzBoL7nYiz8tZLe3eSfFPTA1VRT5y/tfTuZ8ejP FeYzB6l1lRdRRkUK0lySf8q6r7D+l8Bl/P4Cr2FF0DPLPeB6uUuH8t0lDJN3gLjD qDxaPxj41iw4o6JoV5oBSMBQS0GmGWDh8QMLELYVgOQfDliuSW0vpwZkR5QekhOu LEzir5zVk9gAcq002aseCfFILtdi/3G6FahG3MkABRG0HERydSBMYXZpZ25lIDxk cnVAaXNlY29tLm9yZz6JARUDBRBCNu8O/3G6FahG3MkBAWn3B/4rWmi18/XYynlI idwjKCG+MxVGjum/BMnlWCXUBSOFk08M7t2UK/kQXeFwxY6gfPO3UFt6T+qr1JNf 8IEFFSHsPaEjYYnGvkz6hPCSCT7ZHFGA/WpkJPCugGR7+j9SpOPr3qIHa5Zjg/vn lMAFmWG1o29wAXNFBFf9GNmKUyYZgTygliTXK8Hi9HZHOaCmP+DLPCDSaDs87dBH VrWHXZ/xHNcEDD6gJ9mLfosxOmwC1cNHnFaZYBVuBJyrpwLu+DcYubMOuxS+Sxa7 lGZxsrmxVK5clYgJHNEW9Mc9zY5/4ekGg2JPQNr5T813GwArkuoNq4RA0hdnWSPV nJYo2Lbl =KPQv - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 iQEVAwUBQjcDRP9xuhWoRtzJAQHoqwf/Q3pJ3tWR77naAd+JYtuaw8L4F9q/WCdJ jA9G2sSFzk1Lmdt5cuBzCebTsjrrO5M5gfKhzvvIp61LQpq6M7j+vBCEEqwxn0Vk nxRSeSnfJn7NQcvYvPigLsQw50vYz83F7ov4GDludeB2ds4NhJSR+oHqS1K0TNYC vRQfSbtAfXrL35RVeW/dDzEKJX7rzpGvVwJbOHV/IAwsXKgRF4TjB++B2m9RXIvd 4fbAs41ZuJGFd5xaNOVmKhm/8RYScpepEFEQZBmRFAC4eJj5vYK8sEdBuB5a3Anx DaHzsyMq98r3mRsqGbJA4xRqOEESdnell0Ebs91KKhmOG1iOvaLgog== =cj0v -----END PGP SIGNATURE-----