[Imported from Trac: page TahoeLAFSWeeklyNews, version 34]

marlowe 2012-05-19 18:09:05 +00:00
parent c412c77f40
commit 759424cafe

@ -3,6 +3,7 @@ Subscribe to [the tahoe-lafs-weekly-news mailing list](http://tahoe-lafs.org/cgi
<table border="1px solid black" border-collapse="collapse"> <table border="1px solid black" border-collapse="collapse">
<tr><th>Edition</th><th>date</th><th>headlines</th></tr> <tr><th>Edition</th><th>date</th><th>headlines</th></tr>
<tr><td><a href="<https://tahoe-lafs.org/~marlowe/TWN31.html>">issue number 31</a></td><td>May 19, 2012</td><td>Roadmaps Announced, Redundant Array of Independent Clouds, Glowing Quotes, Tahoe-LAFS on Twitter, End of Support for Python 2.4, Authenticated Data Structures, New User Documentation and Use the Source.</td></tr>
<tr><td><a href="<https://tahoe-lafs.org/~marlowe/TWN30.html>">issue number 30</a></td><td>May 12, 2012</td><td>Happy Birthday to David Sarah, Multiple Introducers, Cryto Coding Collective Tahoe-LAFS Grid and Zooko's Klog is Back</td></tr> <tr><td><a href="<https://tahoe-lafs.org/~marlowe/TWN30.html>">issue number 30</a></td><td>May 12, 2012</td><td>Happy Birthday to David Sarah, Multiple Introducers, Cryto Coding Collective Tahoe-LAFS Grid and Zooko's Klog is Back</td></tr>
<tr><td><a href="<https://tahoe-lafs.org/~marlowe/TWN29.html>">issue number 29</a></td><td>May 05, 2012</td><td>Bounty for Speeding Up Unit Tests (update) and Tahoe-LAFS on Twitter</td></tr> <tr><td><a href="<https://tahoe-lafs.org/~marlowe/TWN29.html>">issue number 29</a></td><td>May 05, 2012</td><td>Bounty for Speeding Up Unit Tests (update) and Tahoe-LAFS on Twitter</td></tr>
<tr><td><a href="<https://tahoe-lafs.org/~marlowe/TWN28.html>">issue number 28</a></td><td>April 28, 2012</td><td>Bounty for Speeding Up Unit Tests and On the Limits of the Use Cases for Authenticated Encryption</td></tr> <tr><td><a href="<https://tahoe-lafs.org/~marlowe/TWN28.html>">issue number 28</a></td><td>April 28, 2012</td><td>Bounty for Speeding Up Unit Tests and On the Limits of the Use Cases for Authenticated Encryption</td></tr>