[vox] [fwd] Newsletter from O'Reilly UG Program, December 16
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[vox] [fwd] Newsletter from O'Reilly UG Program, December 16
----- Forwarded message from Marsee Henon -----
Date: Fri, 16 Dec 2005 11:46:20 -0800
From: Marsee Henon
Subject: Newsletter from O'Reilly UG Program, December 16
O'Reilly News for User Group Members
December 16, 2005
-Head First HTML & CSS
-ASP.NET 2.0 Cookbook, Second Edition
-How to Cheat at Designing Security for a W2K3 Server Network
-XSLT Cookbook, Second Edition
-Zero Configuration Networking: The Definitive Guide
-Adobe Creative Suite 2 Workflow
-Insider Threat: Protecting the Enterprise from Sabotage, Spying,
-Windows Server 2003 Security Cookbook
-C in a Nutshell
-InDesign Production Cookbook
-Run Your Own Web Server Using Linux & Apache
-Linux Server Hacks, Volume Two
-OS X for Hackers at Heart
-Running LInux, 5 Ed.
-Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools
-Securing IM and P2P Applications for the Enterprise
-VB Express 2005: Now Playing
-Running Mac OS X Tiger
-Dreamweaver 8: The Missing Manual
-PCs: The Missing Manual
-Virtualization with VMware ESX Server
-Podcasting Pocket Guide
-Digital Video Production Cookbook
-Peter Krogh ("The DAM Book") Presents iView MediaPro Workshop,
Kensington, MD--January 5
-Peter Krogh ("The DAM Book") offers DAM for Working Photographers
Workshop, Kensington, MD--January 3
-Scott MacHaffie ("Palm and Treo Hacks") at Powell's Technical Books,
Portland, OR--January 7
-Tom Limoncelli ("Time Management for System Administrators") at
BBLISA, Boston, MA--JanuaryˇĀˇ 22
-Derrick Story ("Digital Photography Pocket Guide, 3rd Ed,"
iPhoto 5:The Missing Manual) at NCMUG, Rohnert Park, CA--FebruaryˇĀˇ 21
-ETech Registration is Open
-New 40% discount for ETel--Early Registration Pricing Ends January 9
-Reader Created Tagged Bibliography for "Ambient Findability"
-eBay Developer Challenge 2006
-Time Management on Google Video
-User Group Members receive a special 50% discount on Learning
Lab Courses--Ends December 31
-Through Project Looking Glass with Hideya Kawahara
-Managing TV with XMLTV
-MacVoices #515: Home Networking with Scott Lowe
-Managing MySQL on Mac OS X
-What Is Virtualization?
-Identifying Essential Windows Services: Part 2
-Work Around Word XP's AutoCorrect Change
-Turn a Client Site into Saleable Software
-How to choose a product for eCommerce
-You Have to Try This on Google
-Hibernate Class Generation Using hbm2java
-Lightweight O/R Mapping
-Five Fun Ways to Play with Audio Hijack Pro
-Introduction to the Variations Color Correction Tool in Photoshop
-Meet Your Fellow Makers
-Give the Gift of MAKE Magazine--Special Offer for UG Members
Did you know you can request a free book to review for your
group? Ask your group leader for more information.
For book review writing tips and suggestions, go to:
Don't forget, you can receive 30% off any O'Reilly, No Starch,
Paraglyph, PC Publishing, Pragmatic Bookshelf, SitePoint, or Syngress
book you purchase directly from O'Reilly.
Just use code DSUG when ordering online or by phone 800-998-9938.
***Free ground shipping is available for online orders of at
least $29.95 that go to a single address. This offer
applies to US delivery addresses in the 50 states and Puerto Rico.
For more details, go to:
***Head First HTML & CSS
Tired of reading HTML books that only make sense after you're an expert?
Then it's about time you picked up "Head First HTML with CSS & XHTML" and
really learn HTML. You want to learn HTML so you can finally create
those Web pages you've always wanted, so you can communicate more
effectively with friends, family, fans and fanatic customers. You also
want to do it right so you can actually maintain and expand your Web
pages over time, and so your Web pages work in all the browsers and
mobile devices out there. So what are you waiting for? Leave those other
dusty books behind and come join us in Webville. Your tour is about to
Chapter 8, "Adding a Little Style," is available online:
If you've heard about Skype--and who hasn't with all the recent media
attention devoted to Internet phone service--chances are you've been
mighty tempted to try it out. "Skype Hacks" tells you what all the Skype
hype is about, explains the basics, and shows you more than 100 clever
tips and tricks for tweaking and tuning Skype so you too can enjoy free
phone calls and services.
Sample Hacks such as "Make Calls from Your Web Browser," can be
This valuable guide offers both practical and fun PHP programming
techniques. Learn to develop more robust PHP applications by improving
your database design, automating application testing, and employing
design patterns in your PHP scripts and classes. Image and application
hacks explain how to create custom MP3 broadcasts, integrate with
iTunes, and generate PDFs. Designed for all PHP programmers, from
newcomers to experts.
Sample Hacks such as "Read RSS Feeds on Your PSP," can be
***ASP.NET 2.0 Cookbook, Second Edition
Completely revised for ASP.NET 2.0, this new edition of the best-selling
"ASP.NET Cookbook" has everything you need to go from beginning to
advanced Windows-based web site development using Microsoft's popular
Visual Studio 2005 and ASP.NET 2.0 developer tools. Written for the
impatient professional, "ASP.NET 2.0 Cookbook" contains more than 125
recipes for solving common and not-so-common problems you are likely to
encounter when building ASP.NET-based web applications. As with the
first edition, every solution is coded in both C# and Visual Basic 2005.
***How to Cheat at Designing Security for a W2K3 Server Network
When looking at an organization's security needs, you should begin with
any existing security policies or procedures that the organization might
already have in place. Examining existing security policies extends to
technical measures like analyzing security requirements for different
types of data, since some kinds of data might be subject to specific
security or retention policies, and some data is simply more
mission-critical or sensitive than others. As a network administrator,
you will need to balance the human and the technical in order to create
the best security design for your organization.
***XSLT Cookbook, Second Edition
"XSLT Cookbook, 2nd Ed." is a collection of detailed code recipes that
breaks down everyday XSLT problems into manageable chunks. Learn how to
transform XML documents into PDF files, SVG files, HTML documents, etc.
Other topics include numerical transformation, XPath, date/time
conversion, string manipulation, testing and debugging, and complex
sorting and linking. Updated to cover XSLT 2.0.
Chapter 9, "Querying XML," is available online:
***Zero Configuration Networking: The Definitive Guide
Offering a unique insider's perspective, "Zero Configuration Networking:
The Definitive Guide" takes the mystery out of networking electronic
devices, so you can enjoy maximum efficiency at work or home. Covers all
networking activities, including the sharing of files, music and photos,
and even Instant Messaging. It's the ultimate authority for developers
on any platform.
Chapter 7, "Using the C APIs," is available online:
***Adobe Creative Suite 2 Workflow
"Adobe Creative Suite 2 Workflow" can help you quickly learn how to take
advantage of all that CS2 has to offer. By following its concise
explanations and step-by-step exercises, you'll soon learn core skills
and techniques that will enable you to create an integrated workflow
that will not only save you lots of time, but will also give you more
flexibility to move between applications to make necessary tweaks, try
out new ideas, and create portable files for review.
Chapter 1, "Bridge and Version Cue: The Hub for Creative Suite 2," is
***Insider Threat: Protecting the Enterprise from Sabotage, Spying,
As network defense perimeters get stronger and stronger,IT, security,
law enforcement, and intelligence professionals are realizing that the
greatest threats to their networks are increasingly coming from within
their own organizations. These insiders, comprised of current and former
employees or contractors, can use their inside knowledge of a target
network to carry out acts of sabotage, espionage, and theft of data.
***Windows Server 2003 Security Cookbook
This handy problem-solver teaches you how to perform important security
tasks in the Windows Server 2003 OS using very specific recipes. Each
recipe features a brief description of the problem, a step-by-step
solution, and then a discussion of the technology at work. Also features
a detailed explanation of Microsoft's scripting support.
***C in a Nutshell
Covering the C programming language and C runtime library, this book is
destined to be a constant companion in your work. "C in a Nutshell"
covers virtually everything you need to program in C. Topics include
runtime library calls, common compiler options, and questions of C
syntax and usage. Not to be missed by C programmers of all levels.
Chapter 10, "Structures, Unions, and Bit-Fields," is available online:
This convenient guide is for anyone who wants to take his or her SQL
skills to the next level. Packed with over 200 recipes, the SQL Cookbook
helps you conquer common data query and manipulation problems, including
those related to window functions, data warehousing, and string
manipulation. Features an easy-to-grasp problem/solution discussion
***InDesign Production Cookbook
Whether you're an experienced designer or a desktop publisher new to
InDesign CS2, you'll find "InDesign Production Cookbook" chock-full of
useful information, with quick solutions to real-world layout
challenges. From handling typography and applying color and transparency
to building tables and multi-page documents, the unique combination of
concise explanations, expert tips, and practical recipes makes this the
ultimate, no-nonsense production guide for every InDesign user.
A sample excerpt, "Nested Styles, Working With Images and The Pen Tool,"
is available online:
***Run Your Own Web Server Using Linux & Apache
Learn to install Linux and Apache 2.0 on a home or office computer for
testing and development, and then learn how to perform dozens of common
administration, security and optimization tasks related to using Linux
for web hosting. Save thousands on expensive third party support and
***Linux Server Hacks, Volume Two
This handy reference offers 100 completely new server management tips
and techniques designed to improve your productivity and sharpen your
administrative skills. Each hack represents a clever way to accomplish a
specific task, saving you countless hours of searching for the right
answer. And you don't have to be a system administrator with hundreds of
boxes to get something useful from this book as many of the hacks apply
equally well to a single system or a home network. Whether they help you
recover lost data, collect information from distributed clients, or
synchronize administrative environments, the solutions found in "Linux
Server Hacks, Volume Two" will simplify your life as a system
Sample Hacks such as "Autostart VNC Servers on Demand," can be found
***OS X for Hackers at Heart
With sexy hardware, a powerful operating system, and easy to use
applications, Apple has made OS X the operating system of choice for
hackers everywhere. But as great as OS X is out of the box, hackers are
eager to push the boundaries by tweaking and tuning the software and
hardware in order to do the things that really excite them such as
penetration testing or software development. These modifications are
often sexy in their own right and drive the OS X community even deeper
into the realm of "elite." This book attempts to capture these
purpose-driven modifications and shows how the best and brightest use OS
X to do cutting edge research, development, and just plain fooling
***Running Linux, 5 Ed.
The fifth edition of "Running Linux" is greatly expanded, reflecting the
maturity of the operating system and the teeming wealth of software
available for it. Hot consumer topics such as audio and video playback
applications, groupware functionality, and spam filtering are covered,
along with the basics in configuration and management that always made
the book popular.
Chapter 6, "Electronic Mail Clients," is available online:
***Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools
Whether you work for a publicly traded or pre-IPO company or an IT
consultant, you are familiar with the daunting task of complying with
The Sarbanes-Oxley Act. You have no doubt seen the hour and dollar
estimates for compliance go up and up. Now, you can re-grain control.
This ground-breaking, fully integrated book and bootable, live CD
provide all of the information AND the open source tools required for
you to achieve SOX compliance the cheap and easy way.
***Securing IM and P2P Applications for the Enterprise
As an IT Professional, you know that the majority of the workstations on
your network now contain IM and P2P applications that you did not
select, test, install, or configure. As a result, malicious hackers, as
well as virus and worm writers are targeting these inadequately secured
applications for attack This book will teach you how to take back
control of your workstations and reap the benefits provided by these
applications while protecting your network from the inherent dangers.
Interested in saving money, increasing productivity, or just impressing
your friends? If so, then "VoIP Hacks" can show you how. This practical
guide offers dozens of clever tips, tricks, and techniques for working
with VoIP, the cool technology that makes phone service via the Internet
possible. Hack your way to the phone service of the future-today.
Sample Hacks such as "Wire Your House Phones for VoIP" can be found
***VB Express 2005: Now Playing
Publisher: No Starch Press
A true guide for beginners, "Now Playing: Visual Basic 2005 Express"
starts off with a short primer on how programming works, regardless of
the programming language used. Once readers understand the general
principles behind computer programming, the book then teaches readers
how to use the Visual Basic Express program itself and how to write
programs using the Visual Basic language.
***Running Mac OS X Tiger
"Running Mac OS X Tiger" is the ideal resource for power users and
system administrators who want to tweak Tiger to run faster, better, or
just differently. Easy to follow and intuitively organized, the book
helps you understand the inner workings of Mac OS X so you can know how
to get the most out of it and become master of your Mac.
***Dreamweaver 8: The Missing Manual
Macromedia's Dreamweaver 8 is a professional web design and development
program offering drag-and-drop simplicity, streamlined HTML coding
tools, and powerful database integration features. But Dreamweaver 8 is
missing one vital component: a printed manual. Enter "Dreamweaver 8: The
Missing Manual," the completely revised fourth edition of this
bestselling book by David McFarland. With crystal-clear writing and more
than 500 illustrations, it's the ultimate atlas for Dreamweaver 8.
Chapter 17, "Templates," is available online:
***PCs: The Missing Manual
"PCs: The Missing Manual" delivers everything you need to know about
PCs. From hooking everything up to configuring today's must-have digital
media devices; burning CDs and DVDs, setting up blogs and webcams;
networking several computers to accessing TV and radio online, there's
something for everyone.
***Virtualization with VMware ESX Server
This book provides the essential concepts as well as an advanced
understanding of VMware's ESX Server and explains what the virtual
evolution is and why it is important. This book gives you the requisite
knowledge to plan and execute a server consolidation project as well as
build both basic and advanced virtual machines and a virtual
***Podcasting Pocket Guide
Whether you're a listener or an aspiring podcaster, "Podcasting Pocket
Guide" is a non-technical guide for the non-geek who wants in on this
revolutionary new medium. This handy guide shows you how to tune into
unique and interesting podcasts and download them to your favorite
portable device and contains an introduction to creating, recording,
publishing, and finding an audience for your own, professional-quality
A sample excerpt, "Finding, Subscribing to, and Listening to Podcasts,"
is available online:
If you have ever received a phish, become a victim of a phish, or manage
the security of a major e-commerce or financial site, then you need to
read this book. The author of this book delivers the unconcealed
techniques of phishers including their evolving patterns, and how to
gain the upper hand against the ever-accelerating attacks they deploy.
Filled with elaborate and unprecedented forensics, "Phishing Exposed"
details techniques that system administrators, law enforcement, and
fraud investigators can exercise and learn more about their attacker and
their specific attack methods, enabling risk mitigation in many cases
before the attack occurs.
***Digital Video Production Cookbook
With clear, full-color, step-by-step instructions laid out in a
stunning, easy-to-follow format, "Digital Video Production Cookbook"
shows independent and amateur filmmakers how to create
sophisticated-looking visual effects, dramatic shots, and powerful
sequences using low-cost techniques adapted from high-end professional
practices. From shooting bluescreen effects and simulating weather
conditions to choreographing fistfights and chase scenes, this is the
ultimate, no-nonsense resource for every aspiring digital filmmaker.
A sample excerpt, "Particles of Light & Water Camera," is available
***For more events, please see:
***Peter Krogh ("The DAM Book") Presents iView MediaPro
Workshop, Kensington, MD--January 5
Peter offers a new program especially for digital photographers looking
to implement iView MediaPro in a professional photography workflow.
***Peter Krogh ("The DAM Book") offers DAM for Working Photographers
Workshop,Kensington, MD--January 3
Peter offer a hands-on program for digital photographers looking to
streamline their workflow with Adobe Bridge and Digital Asset Management
***Scott MacHaffie ("Palm and Treo Hacks") at Powell's Technical Books,
Portland, OR--January 7
Scott will sharing tips and tools that show you how to make the most of
your Palm and Treo.
***Tom Limoncelli ("Time Management for System Administrators") at
BBLISA, Boston, MA--JanˇĀˇ 22
Tom discusses techniques he's developed over the last 15 years including
how to find time to get projects done, the best way to manage
interruptions from users, open source tools for tracking requests, and
how to turn chaos into free time.
***Derrick Story ("Digital Photography Pocket Guide, 3rd Ed," "iPhoto 5:
The Missing Manual") at NCMUG, Rohnert Park, CA--FebˇĀˇ 21, 2006
Derrick presents "Dumb DigiPhoto Tricks" to the North Coast Mac Users
Group. There are so many serious things to do with you Mac that
sometimes we forget to play. Join Derrick as he shows you how to
entertain yourself (and friends) with digital photography toys and your
***ETech Registration is Open
We're five years into the O'Reilly Emerging Technology Conference and
the stuff of which it is made shows no sign of abating: bandwidth
continues to broaden, storage grows ever larger and cheaper, and content
keeps pouring from the firehose. How do we visualize all of this digital
data, filter it, remix it, and access it in meaningful ways? The coming
technical challenge is not about generating digital content-we have more
than enough already. It's time to do something with that data. It's time
to build The Attention Economy.
O'Reilly Emerging Technology Conference, March 6-9, 2006
Manchester Grand Hyatt, San Diego, CA
User Group members who register before January 16, 2006 get a double
discount. Use code "et06dsug" when you register, and receive 20% off
the early registration price.
To register for the conference, go to:
***New 40% discount for ETel--Early Registration Pricing Ends January 9
The early registration deadline for O'Reilly's Emerging Telephony
Conference (ETel) has been extended to January 9th. Join us on January
24-26 in San Francisco when telephony's key figures, like Jim Van
Meggelen, Peter Cochrane, Mark Spencer, Norman Lewis, and Clay Shirkey,
convene to provide a high-level perspective of the future of telephony.
And as a special offer to our friends, save an additional 40% when you
register using code etel06lms.
To register for the conference, go to:
News From O'Reilly & Beyond
***Reader Created Tagged Bibliography for "Ambient Findability"
Livia Labate has taken "Ambient Findability's" bibliography ("Ambient
Findability" is Peter Morville's highly readable and provocative book on,
well, findability), entered the URL of each entry into her page at
del.icio.us, and tagged each "ambientfindability," thus making the
bibliography entries more ambiently findable. For example, you'll notice
that 13 other people have bookmarked Gene Smith's "Beyond the Page,"
making it a good jumping off point to amble findably through related
works. [Tags: tagging taxonomy PeterMorville AmbientFindability
***eBay Developer Challenge 2006
eBay and O'Reilly are sponsoring a coding contest for applications built
on eBay web services: the eBay Developer Challenge 2006. This contest
encourages the development of great tools that the eBay community will
love. Winners will be announced at the O'Reilly Emerging Technology
Conference in San Diego in March.
Are you paying full attention to anything you do these days? Probably
not. Whether at work or at home, you probably are distracted by email,
IM, the telephone, the television, and countless other distractions. We
begin this podcast with Linda Stone talking about Continuous Partial
Attention from her SuperNova address "Your Attention Please." Paul
Graham compares amateurs and professionals in his OSCON keynote "What
Business Can Learn from Open Source." We respond to a listener comment
on a story we ran last week and conclude with Ernie Prabhakar on open
source from infancy to adulthood. (DTF 008 beta: 24 minutes, 30 seconds,
***Time Management on Google Video
Tom LimoncelliˇĀˇ recently produced a 45-minute video that highlights many
of the techniques in his new book, "Time Management for System
***User Group Members receive a special 50% discount on Learning
Lab Courses--Ends December 31
As an O'Reilly User Group member, you save on all the courses in the
following University of Illinois Certificate Series:
-Linux/Unix System Administration
-Open Source Programming
This offer ends December 31st, 2005. To redeem, use Promotion Code
"ORALL1" to save 50%. Each course comes with a free O'Reilly book and a
7-day money-back guarantee. Register online:
***Through Project Looking Glass with Hideya Kawahara
3D has taken over video gaming. When will it take over mundane computing
areas such as file managers, word processors, and desktop environments?
Maybe soon, if Hideya Kawahara and the Project Looking Glass team have
their way. John Littler explores the ideas, implementations, and
possibilities of 3D interfaces in this interview.
***Managing TV with XMLTV
XMLTV is a set of open source utilities for working with television
schedules. It's not just for people building their own PVRs,
though--with a little cleverness, you can build your own schedule
applications. Brian Murray shows how he manages his family's
***MacVoices #515: Home Networking with Scott Lowe
Scott Lowe, author of the "Home Networking: The Missing Manual" talks
with Chuck Joiner about the benefits and logistics of creating a home
network. Why would you want one? What are your options? What are the
pros and cons of each? Scott talks about wireless, Ethernet and
Powerline, how to choose, and what you can do with them once they are
***Managing MySQL on Mac OS X
There are myriad ways to control and manipulate information on a MySQL
server--some are stand-alone GUI apps, some are web-based, and of course
the venerable (and powerful) command-line option is always available.
Robert Daeley shows some of the most useful tools.
***What Is Virtualization?
Virtualization lets you have multiple "virtual machines," each with its
own operating system running in a sandbox, shielded from each other, all
in one physical machine. But why would you want to do this? Wei-Meng Lee
explains, and takes you on a tour of some of the most popular
virtualization software available: Microsoft Virtual PC 2004, VMware
Workstation 5.0, and Microsoft Virtual Server 2005.
***Identifying Essential Windows Services: Part 2
In Part 1 of this series, Mitch Tulloch, author of Windows Server Hacks,
showed you how to identify which basic server services are essential,
and which can be turned off. In this second part, he shows you
additional services for servers configured with specific roles.
***Work Around Word XP's AutoCorrect Change
THE ANNOYANCE: When I upgraded to Word 2002 a month ago, I found my
AutoCorrect entries stopped working. In Word 97 and Word 2000
AutoCorrect, typing an abbreviated form immediately after a period will
cause the long form to displayˇā€”but not in Word 2002.
I type many hundreds of measurements in millimeters and centimeters
every day, and have therefore created AutoCorrect entries to save
keystrokes. For example, in Word 2002, I type "1m" and "1 mm" displays,
"3c" and "3 cm" displays, saving me two keystrokes each time. Also I
type "1.5m" and "1.5 mm" displays, "3.25c" and "3.25 cm" displays.
***Turn a Client Site into Saleable Software Find out how to turn your
Web Design projects into software that you can sell again and again at
big profits with this in-depth guide.
***How to choose a product for eCommerce
Trying to decide what to sell on the Web? Chris Beasley offers some
handy guidelines on what to sell online.
***You Have to Try This on Google
Google offers a fantastic service which offers you an insider's glimpse
at how Google views your web site.
***Hibernate Class Generation Using hbm2java
Hibernate uses mapping files to express the mapping of Java classes to
database tables. In a complex project, keeping mappings in sync with
your Java code can be burdensome and error-prone. Fortunately, the
hbm2java tool can automate this by generating POJO classes from the
mapping files. John Ferguson Smart shows how to use hbm2java with Ant
and Maven, and how to customize the behavior of the generated classes.
***Lightweight O/R Mapping
O/R frameworks map Java classes to database tables and SQL code. While
popular, this approach is unpopular among DBAs, with the database at the
mercy of an external tool. Another approach is to go the other
direction: write tables and stored procedures and generate Java classes
from that. Norbert Ehreke introduces Amber, a framework that embodies
***Five Fun Ways to Play with Audio Hijack Pro
It's like a sound lab on your Mac--with Audio Hijack Pro you can
digitize legacy music, time-shift radio shows, and even repurpose your
legally purchased music. Erica Sadun shows you five of her favorite AHP
***Introduction to the Variations Color Correction Tool in Photoshop
Photoshop's Variations tool simplifies color correction by presenting
you with visual options in realtime. In this training video, Deke
McClelland shows you how perform simple color correction quickly.
***Meet Your Fellow Makers
Find and post events, exhibits, and more with Maker events listings:
The MAKE Flickr Group Pool has 656 members posting with over 1,142
photos of all sorts of projects and gear. MAKE's favorites:
LCD Photo frame:
Small, medium, and organic dogs:
***Give the Gift of MAKE Magazine--Special Offer for UG Members
Give the geek on your list a truly unique gift this holiday season--
their very own subscription to MAKE magazine. MAKE is the first magazine
devoted to digital projects, hardware hacks, and DIY inspiration. Each
issue brings the do-it-yourself mindset to all the technology in
You have a choice:
Give a gift subscription and save $5 off the regular gift subscription
rate--$29.95 (US), $34.95 (Canada), $44.95 (all other countries):
Or place your gift order at the regular price $34.95 (US), $39.95
$49.95 (all other countries)--and get a MAKE T-shirt free.
***Please note gift postcards and MAKE vol 4 will begin mailing on
12/9/05, orders received after 12/9/05 and non-US orders may not arrive
in time for the holiday season. Your recipient(s) will receive the
opportunity to add digital access to their subscription. All MAKE
T-shirts will ship to your billing address. To order multiple orders for
multiple countries, please contact customer service at 1-866-289-8847
(US & Canada), 1-818-487-2037 (all other countries) between the hours
of 5am and 5pm Pacific time or Email: MAKE@espcomp.com
This offer ends December 31, 2005.
>From Your Peers
***Don't forget to check out the O'Reilly UG wiki to see what user
groups around the globe are up to:
Until next time--
1005 Gravenstein Highway North
Sebastopol, CA 95472
----- End forwarded message -----
vox mailing list