Skip to main content
  1. Blog
  2. Article

Alan Pope
on 1 September 2017

Ubuntu Rally in NYC


The Ubuntu Rally, taking place in New York City September 25th-29th, is a forward-thinking five day software hackathon attended by major software vendors, Ubuntu developers working at every level of the stack, and community contributors.

There are a limited number of non-sponsored slots remaining. If you’re local to New York or can arrange for your own travel and accommodation, send us a mail to snap-advocacy@canonical.com briefly outlining what you’d like to work on during the sprint.

Some examples:

  • Language ecosystem developers who want to support outputting Snaps
  • Application developers who want to publish in the Snap Store and share feedback
  • Linux distribution maintainers who want to add Snap support to their storefront
  • GNOME developers who want to help improve the Ubuntu Desktop
  • IoT device manufacturers who want to enable their hardware with Ubuntu Core
  • PC OEMs who want to to help set the direction of Ubuntu or enable Ubuntu on their hardware
  • Active & passionate community contributors

Proposals will be reviewed and invites sent on Sept 13th.

Related posts


ilvipero
6 May 2026

Three weeks to go: A sneak peek of the Ubuntu Summit 26.04 experience

Ubuntu Article

The countdown to the Ubuntu Summit is officially on! We are just three weeks away from Ubuntu Summit 26.04, and the orange energy levels in our community channels are peaking. We’ve been reviewing the talk submissions, and have been blown away by the passion and creativity of our circle of friends. Once again, the schedule ...


Rajan Patel
4 May 2026

How to use Ubuntu on Windows

Ubuntu Article

Why run Ubuntu on Windows? It’s about getting the best of both worlds. ...


Luci Stanescu
30 April 2026

Fixes available for CVE-2026-31431 (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on April 29, 2026. The vulnerability has been assigned CVE ID CVE-2026-31431 and is referred to as Copy Fail. The affected component is a kernel module that provides hardware-accelerated cryptographic functions: algif_aead. The vulnerab ...