Loading…
June 21-24, 2022
Austin, Texas, USA + Virtual
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Open Source Summit North America 2022 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Central Daylight Time (UTC -5). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."

IMPORTANT NOTE: Timing of sessions and room locations are subject to change.


Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Sunday, June 19
 

3:00pm CDT

 
Monday, June 20
 

7:30am CDT

9:00am CDT

12:00pm CDT

2:00pm CDT

2:30pm CDT

4:30pm CDT

6:30pm CDT

 
Tuesday, June 21
 

7:00am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:15am CDT

9:30am CDT

10:05am CDT

10:20am CDT

10:40am CDT

11:10am CDT

11:30am CDT

12:00pm CDT

Key Lessons Learned from Building a Wealth Management Portal Using Cloud Native Architecture - Ankur Kumar, Publicis Sapient Room 303/304 (Level 3) Sponsored Session: Introducing OpenCost - Webb Brown, Kubecost Room 310/311 (Level 3) From Monolith to Microservices: A Journey into the Mesh - Yolanda Robla Mota, Miro Lone Star H (Level 3) Yes There Are Differences But We Are All Human Right? - David Bevan, Collabora Room 201/202 (Level 2) How to Leverage an Open Update Protocol to Drive Your Embedded Devices from Any Cloud OTA Provider - Anibal Portero, Pantacor Room 205 (Level 2) Ag-Rec: Modernizing A Century-old, Agriculture Recommendations Platform Through the Agstack Open-source Consortium - Gaurav Ramakrishna & Brandy S. Byrd, IBM Room 211/212 (Level 2) Build, Run, and Share Your First EBPF Program in 5 Minutes - Lin Sun, solo.io Lone Star F (Level 3) Openbytes Builds Open Dataset Standards and Schema Aiming to Bring Transformational Changes to AI by Making Open Datasets More Available and Accessible - Edward Cui, GRAVITI Room 408/409 (Level 4) Security as Code: A DevSecOps Approach - Joseph Katsioloudes, GitHub Lone Star G (Level 3) Panel Discussion: A How-to Guide for Contributing to Open Source as an Employee - Alyssa P Wright, Bloomberg; Duane O’Brien, Indeed; Josep Prat, Aiven; Deb Nicholson, Python Software Foundation; Richard Littauer... Room 301/302 (Level 3) Addressing Cybersecurity Challenges in Open Source Software - Stephen Hendrick, The Linux Foundation & Matt Jarvis, Snyk Brazos (Level 2) Assessing the Risk of Open-source Components Using OpenSSF's Scorecard - Laurent Simon, Google & Naveen Srinivasan, Endor Labs Room 203/204 (Level 2)

12:40pm CDT

1:15pm CDT

1:40pm CDT

2:05pm CDT

OS-Climate & SIG-SRE: Benefiting from the Operate First Community Cloud - Karsten Wade & Marcel Hild, Red Hat Room 303/304 (Level 3) Sponsored Session: Time Series Tech Stack for the IoT Edge - Zoe Steinkamp, InfluxData Room 310/311 (Level 3) Image Layout: Stop Putting Everything in Registries - Brandon Mitchell, BoxBoat, an IBM Company Lone Star H (Level 3) Intersectionality: Effectively Paving the Path Forward for DEI Communities by Partnering Together - Jennifer Madriaga, Red Hat Room 201/202 (Level 2) A 'Smart Boombox' with Open Source Hardware and Software - Michael Macisaac, Individual Room 205 (Level 2) An Open Source Exploration of a Semantic Structure for Climate Accounting - Dr. Christiaan Johannes Pauw, Nova Institute & Marcus Alex-Ivan Howard Room 211/212 (Level 2) BoF: Where Did You Come From, Where Did You Go? CVD and Open Source Security Research - Dr. Trey Herr & Stewart Scott, Atlantic Council Room 207 (Level 2) Discovering Toolchains in 2022 - Victor Rodriguez, Intel Lone Star F (Level 3) Building ML Pipelines in JupyterLab Using Elyra - Without the Need to Write Code - Patrick Titzler, IBM Room 408/409 (Level 4) Managing Your Serverless Servers, Again! - Amy Arambulo Negrette, DigitalOcean Lone Star G (Level 3) Does Your OSPO Help or Hinder Contributions? - Dawn Foster, VMware Room 301/302 (Level 3) Lessons Learned from Automating SLSA-Compliance Evaluation - Daniel Nebenzahl, Scribe-security Brazos (Level 2) SBOM Ingestion and Analysis at New York-Presbyterian Hospital - Katie Bratman & Adam Kojak, NewYork-Presbyterian Hospital Room 203/204 (Level 2)

2:55pm CDT

Accelerating Application Development with GraphQL Data Mesh - Tanmai Gopal, Hasura Room 310/311 (Level 3) Peta Scale Telemetry Backend with Opentelemetry - Kranti Vikram Anugola & Weian Deng, Walmart Global Tech Room 303/304 (Level 3) Sponsored Session: Open Source Cloud Native Storage Solutions for Stateful Applications from Dell Technologies - Rahul Sharma, Dell Technologies Lone Star H (Level 3) Keeping the Faith: Your Team Can Benefit from Interfaith Inclusion and Diversity - Jason Davis, Cisco Systems Room 201/202 (Level 2) Uncovering Software Provenance in Embedded Systems - Ricardo Mendoza, Pantacor Room 205 (Level 2) Panel Discussion: Aruba’s Decentralized Solution for Covid Drives Air Travel Transformation - Heather Dahl, Indicio; Yuri Feliciano, Government of Aruba & Adrien Sanglier, SITA Lab Room 211/212 (Level 2) From Linux CFS Scheduler to Goroutine Scheduler: How CFS Algorithm Could Be Used in Goroutine Scheduling - Sen Han, PingCAP Lone Star F (Level 3) Computer Vision to Secure Your Surroundings with AI/ML Solution Built Using Open Source Tools at the Edge - Samantha Coyle & Neethu Elizabeth Simon, Intel Corporation Room 408/409 (Level 4) Sponsored Session: Securing your Cloud Native Stack with Policy-as-Code and OPA - Peter ONeill, Styra Lone Star G (Level 3) The Challenge to Build a Distributed OSPO - Norio Kobota, Sony Group Corporation Room 301/302 (Level 3) Maslow's Hierarchy of Supply Chain Needs - Josh Bressers, Anchore Room 203/204 (Level 2) Road to SLSA3: Non-falsifiable Provenance in Tekton with SPIFFE/SPIRE - Parth Patel, IBM & Brandon Lum, Google Brazos (Level 2)

3:35pm CDT

4:05pm CDT

4:55pm CDT

6:00pm CDT

 
Wednesday, June 22
 

6:45am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:45am CDT

10:05am CDT

10:10am CDT

10:30am CDT

11:00am CDT

11:50am CDT

12:30pm CDT

1:45pm CDT

Creating an Open Source Fraud Risk Management System in Order to Close the Financial Inclusion Gap - Greg McCormick, Sybrin Systems (PTY) Ltd., Mojaloop Foundation Room 310/311 (Level 3) OpenSearch Helps You to Adopt a Friend - Laysa Uchoa, Aiven Room 303/304 (Level 3) Personnel Chaos Engineering and Building a Resilient Organizational Structure - Jennifer D Bergstrom, Parsons Room 205 (Level 2) Kubernetes is Your Cloud Control Plane - Josh Gavant, Red Hat Lone Star H (Level 3) Panel Discussion: Enabling Linux in Safety Applications - Jeffrey Osier-Mixon & Gabriele Paoloni, Red Hat; Kate Stewart, The Linux Foundation; Elana Copperman, Mobileye; Philipp Ahmann, Robert Bosch GmbH; Paul Albertella... Room 211/212 (Level 2) Lessons Learned Supporting Nearly 200,000 IoT Devices - Marc Pous, Balena.io Room 201/202 (Level 2) Tools and Techniques to Debug an Embedded Linux System - Sergio Prado, Embedded Labworks Griffin Hall (Level 2) Postmortem Analysis with Kexec/kdump and Ftrace - Steven Rostedt, Google Lone Star F (Level 3) Mitigating Bias in Models with SHAP and Fairlearn - Sean Owen, Databricks Room 408/409 (Level 4) Sponsored Session: Consumers to Contributors - Open Source as a Competitive Advantage - Brendan O'Leary, GitLab Lone Star G (Level 3) The SPDX License List: What, Why and How - Steve Winslow, Boston Technology Law Room 301/302 (Level 3) Kubernetes Risk Assessment: Time to Go One Level Deeper - Ariel Shuper, Cisco Room 203/204 (Level 2) Sponsored Session: The Simple, Yet Lethal, Anatomy of a Software Supply Chain Attack - Jossef Harush Kadouri, Checkmarx Brazos (Level 2)

2:00pm CDT

2:35pm CDT

Deep Dive on Real World Use Case in Capitalone on Serverless and How It Enables Its Partner's Redemption Capability - Gokul Prabagaren & Nagesh Kumar Vinnakota, Capital One Room 310/311 (Level 3) Turning Users Into Advocates, at Scale - Karin Wolok, StarTree Room 205 (Level 2) Sharing is NOT Caring: Stop Sharing Your Kubernetes Cluster Credentials - Leigh Capili & Nigel Brown, VMware Lone Star H (Level 3) Using FOSS as Part of a System Safety Mechanism - Paul Albertella, Codethink Room 211/212 (Level 2) Delving into the Linux Boot Process for an ARM SoC - Ajay Kumar & Thiagu Ramalingam, Samsung Griffin Hall (Level 2) How to Choose a Software Update Mechanism for Embedded Linux Devices - Leon Anavi, Konsulko Group Room 201/202 (Level 2) Kubernetes Network Policy Enforcement in XDP without IP Translation - Hong Chang, Futurewei Technologies, Inc & Xiaoning Ding, ByteDance (Tiktok) Lone Star F (Level 3) Table Formats Change Everything (By Not Changing Anything) - Ismaël Mejía, Microsoft Room 408/409 (Level 4) Open Source Licenses: Why they Matter and Why You Should Care - Jeff Shapiro, The Linux Foundation Lone Star G (Level 3) Using OpenSSF's Allstar to Secure Your Organizations GitHub Repositories - Jeff Mendoza, Google Room 301/302 (Level 3) Managing Application Level SBOMs with Ortelius - Tracy Ragan, DeployHub Room 203/204 (Level 2) Panel Discussion: Summing Up the Summit: OpenSSF’s May 2022 Gathering and Action Plan - Dr. Trey Herr & Amelie Koran, Atlantic Council; Brian Behlendorf & David Wheeler, OpenSSF Room 303/304 (Level 3) What Role Do Package Registries Have in Securing the Supply Chain? - Justin Colannino & Margaret Tucker, GitHub Brazos (Level 2)

3:15pm CDT

3:45pm CDT

Open Source BPM Comparison - Andrew Bonham, Capital One Room 310/311 (Level 3) Panel Discussion: Marketing is Essential (and Not Sleazy) for Open Source Projects - Emily Omier, Emily Omier Consulting, LLC; Jana Iris, PlanetScale; Matt Yonkovit, Percona; Nithya Ruff, Amazon Room 205 (Level 2) Application AutoScaling Through Elastic Kubernetes POD - Cathy Zhang & Theresa Shan, Intel Lone Star H (Level 3) Xen in Safety-Critical Systems - Stefano Stabellini, AMD & Bertrand Marquis, Arm Room 211/212 (Level 2) Finding the Path from Embedded to Edge using Product Lines - Steffen Evers, Bosch.IO & Philipp Ahmann, Robert Bosch GmBH Griffin Hall (Level 2) What's New in Buildroot? - Thomas Petazzoni, Bootlin Room 201/202 (Level 2) Lessons Learned Creating A Robust, Hardened, Kernel Driver for A Hardware Device - Fiona Trahe & Adam Guerin, Intel Corp. Lone Star F (Level 3) Panel Discussion: How Open Source Helps DataOps - David Radley & Cheranellore Vasudevan, IBM; Mandy Chessell, Egeria; Dan Wolfson, Pragmatic Data Research Ltd. Room 408/409 (Level 4) Peeling Back the Layers of Storage - John Hawley, VMware Lone Star G (Level 3) Building an Open Source Community from the Ground Up: Red Hat’s Game Industry Community of Practice - Ruth Suehle, Red Hat Room 301/302 (Level 3) Purl and Vers: The Mostly Universal Package URL and Version Ranges Identifiers for Dependencies and Vulnerabilities - Philippe Ombredanne, AboutCode and NexB & Hritik Vijay, Independent Room 203/204 (Level 2) Sponsored Session: Because Security Matters: Securing Your Open Source Supply Chain - Aaron Conklin & Don Vosburg, SUSE Brazos (Level 2)

4:35pm CDT

5:15pm CDT

6:30pm CDT

 
Thursday, June 23
 

6:45am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:25am CDT

9:45am CDT

9:55am CDT

10:00am CDT

11:10am CDT

11:20am CDT

11:35am CDT

12:00pm CDT

Sponsored Session: Your Next Workstation Is In The Cloud - Ketan Gangatirkar, Coder Room 310/311 (Level 3) The Value of Community Building. And why you Should Invest in Building One - Jacqueline Salinas, Freelancer Room 408/409 (Level 4) Debugging at Scale in Production - Deep into Your Containers with Kubectl Debug, KoolKits and Continuous Observability - Shai Almog, Lightrun Lone Star G (Level 3) Be Part of the Solution: Cultivating Inclusion in Open Source - Radha Jhatakia & Mike Bufano, Google Room 211/212 (Level 2) Even More Board Farm Goodness - An Update on the REST API for Automated Testing - Tim Bird, Sony Corporation & Harish Bansal, TimeSys Griffin Hall (Level 2) Porting Linux to a Baseboard Management Controller Asic, Feedbacks and Perspectives - Jean-Marie Verdun & Luis Luciani, HPE Room 201/202 (Level 2) System Device Tree and Lopper: Concrete Examples - Bruce Ashfield & Stefano Stabellini, AMD Room 203/204 (Level 2) Open Source Runs the World, Why Not Vulnerability Identifiers? - Josh Bressers, Anchore & Josh Buker, Cloud Security Alliance Brazos (Level 2) Tracing on Page Table - YuHsiang Tseng & ChinEn Lin, National Taiwan Ocean University Lone Star F (Level 3) The Unlimited Potential of Neural Search to Unlock the New Way of Data Comprehension - Bing HE, Jina AI Room 303/304 (Level 3) A Walk through the OSPO Five-stage Model and Personas - Ana Jimenez Santamaria, TODO Group Room 301/302 (Level 3) Meet the Community Behind the Open Programmable Infrastructure Project - Anh Thu Vo, Marvell Technology; Venkat Pullela, Keysight Technologies; Yan Fisher & Kris Murphy, Red Hat; Garth Fruge, NVIDIA Lone Star H (Level 3)

12:40pm CDT

1:15pm CDT

2:05pm CDT

Design Patterns for OPA and Cloud Native Authorization - Tim Hinrichs, Styra Room 310/311 (Level 3) Scaling Your Community From a Few Hundred to Tens of Thousands - Anna Filippova, dbt Labs Room 408/409 (Level 4) From Laptop to Cloud: Developing Cloud Native Applications with Containerized Databases - Nicolas Vermande, Ondat Lone Star G (Level 3) Overcoming Imposter Syndrome to Become a Conference Speaker! - Dawn Foster, VMware Room 211/212 (Level 2) BOF: SBOMs for Embedded Systems: What's Working, What's Not? - Kate Stewart, Linux Foundation Room 201/202 (Level 2) Configuring and Building a Heterogenous System Using the Yocto Project - Mark Hatle, AMD Griffin Hall (Level 2) V4L2 M2M as the Driver Framework for Video Processing IP - Karthik Poduval, Amazon Lab126 Room 203/204 (Level 2) Hidden Vulnerabilities in Open Source - Sharon Benzeev & Shaul Ben Hai, Palo Alto Networks Room 205 (Level 2) Securing Open Source Software - End-to-End, at Massive Scale, Together - Christopher R Robinson, Intel & Anne Bertucio, Google Brazos (Level 2) Lower Response Time of Fork by Extending Copy-on-write to the Page Table - Chih-En Lin, National Taiwan Ocean University Lone Star F (Level 3) Integrating High Performance Feature Stores with KServe Model Serving - Ted Chang & Chin Huang, IBM Room 303/304 (Level 3) Lessons Learned After 1 Year Running an OSPO in Bancolombia (LATAM) - Daniel Estiven Rico Posada, Bancolombia Room 301/302 (Level 3) Tutorial: Introduction to Supply Chain Choreography with Cartographer - Cora Iberkleid & Corby Page, VMware Lone Star H (Level 3)

2:55pm CDT

3:35pm CDT

4:05pm CDT

A Social Model of Open Source: Moving Beyond the License - Julia Ferraioli, Independent Room 408/409 (Level 4) API Testing Without Writing Test Cases and Mocks - Neha Gupta & Shubham Jain, Keploy Inc Lone Star G (Level 3) Fast and Easy Traffic Mirroring and SLO Validation with Iter8 - Alan Cha, IBM Lone Star H (Level 3) Women's Participation in Open Source - Bianca Trinkenreich, Northern Arizona University Room 211/212 (Level 2) Evolving ROS for Safety Critical Systems - Tully Foote, Open Robotics Room 203/204 (Level 2) Lessons Learned: Migrating a Production Platform to Yocto - Mitch Gaines, Farmblox Griffin Hall (Level 2) Towards PREEMPT_RT for the Full Task Isolation - Jim Huang, BiiLabs Co., Ltd. & Oscar Shiang, National Cheng Kung University Room 201/202 (Level 2) A Vulnerability Database Should Not Be About Vulnerabilities! - Hritik Vijay, Independent & Tushar Goel, AboutCode.org and nexB Inc. Brazos (Level 2) Managing Audits for Critical Open Source Projects - Amir Montazery, Open Source Technology Improvement Fund, Inc (OSTIF) Room 205 (Level 2) Rust for Linux: Status Update - Miguel Ojeda, Rust Maintainer & Wedson Almeida Filho, Google Lone Star F (Level 3) Flagging *and* Fixing Bias in ML - Bhaktipriya Radharapu, Google Room 303/304 (Level 3) Supply Chain Security, SBOMs and How OSPOs Can Play An Important Role Going Forward - An Ecosystem and Compliance Update - Jeffrey Borek, IBM Room 301/302 (Level 3) Tutorial: Create Your First EBPF Program to Monitor Your System Using Bumblebee - Adam Sayah, solo.io Room 310/311 (Level 3)

4:55pm CDT

5:05pm CDT

5:15pm CDT

5:25pm CDT

5:45pm CDT

5:55pm CDT

6:05pm CDT

7:00pm CDT

9:00pm CDT

 
Friday, June 24
 

6:45am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:25am CDT

9:35am CDT

9:45am CDT

10:00am CDT

10:30am CDT

11:10am CDT

12:00pm CDT

12:40pm CDT

2:00pm CDT

Lightning Talk: Building a Community Funnel - John Coghlan, GitLab Room 408/409 (Level 4) Practical Strategies for Centering DEI in Your Open Source Event - Elizabeth Barron, CHAOSS Room 310/311 (Level 3) With WasmEdge to New Shores - Max Körbächer, Liquid Reply Lone Star H (Level 3) BOF: Corporate Use of Embedded Linux - Tim Bird, Sony Corporation Room 203/204 (Level 2) V4L2 Controls - From Perspective of Video Capture Devices - Sathyakam Medavaram, Samsung Semiconductor India R&D Center Griffin Hall (Level 2) Wi-Fi 6 (Formerly IEEE 802.11ax) Deep Dive - Marcel Ziswiler, Toradex AG Room 201/202 (Level 2) How Open Source Software and Digital Public Goods Enabled Quick Pandemic Responses in Sri Lanka and Larger Digital Cooperation - Prajakta Kuwalekar & Nathan Baleeta, Digital Public Goods Alliance Lone Star G (Level 3) Sponsored Session: Rising Threat: Securing Your Open-Source Pipeline - Hassam Mian, Anaconda Brazos (Level 2) The Cry Wolf Vulnerability Paradox: The Problem of FALSE Alerts in Vulnerability Scanners - Emil Wåreus, Debricked Room 205 (Level 2) VDUSE - Supporting VDPA Devices in Userspace - Robert Eshleman, ByteDance Lone Star F (Level 3) Using CHAOSS Metrics, Models, and Software to Identify the Most Significant At-Risk Dependencies in Your Portfolio - Sean Goggins, CHAOSS Project and the University of Missouri - Columbia Room 301/302 (Level 3) Building and Running a Diversity-focused Pre-internship Program for SRE - Andrew Ryan, Meta Room 303/304 (Level 3)

2:10pm CDT

2:30pm CDT

2:50pm CDT

3:30pm CDT

4:00pm CDT

4:15pm CDT

7:00pm CDT

 

Filter sessions
Apply filters to sessions.
  • CloudOpen
  • Community Leadership Conference
  • ContainerCon
  • Critical Software Summit
  • Diversity Empowerment Summit
  • Embedded IoT
  • Embedded Linux Conference (ELC)
  • Emerging OS Forum
  • Global Security Vulnerability Summit (GSVS)
  • Keynote Sessions
  • LinuxCon
  • Open AI & Data Forum
  • Open Source On-Ramp
  • OSPOCon
  • Project Mini-Summits / Co-located Events
  • Special Events / Exhibits / Breaks
  • SupplyChainSecurityCon
  • Wildcard