Loading…
Sunday, June 19
 

3:00pm CDT

 
Monday, June 20
 

7:30am CDT

9:00am CDT

12:00pm CDT

2:00pm CDT

2:30pm CDT

4:30pm CDT

6:30pm CDT

 
Tuesday, June 21
 

7:00am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:15am CDT

9:30am CDT

10:05am CDT

10:20am CDT

10:40am CDT

11:10am CDT

11:30am CDT

12:00pm CDT

Key Lessons Learned from Building a Wealth Management Portal Using Cloud Native Architecture - Ankur Kumar, Publicis Sapient Room 303/304 (Level 3) Sponsored Session: Introducing OpenCost - Webb Brown, Kubecost Room 310/311 (Level 3) From Monolith to Microservices: A Journey into the Mesh - Yolanda Robla Mota, Miro Lone Star H (Level 3) Yes There Are Differences But We Are All Human Right? - David Bevan, Collabora Room 201/202 (Level 2) How to Leverage an Open Update Protocol to Drive Your Embedded Devices from Any Cloud OTA Provider - Anibal Portero, Pantacor Room 205 (Level 2) Ag-Rec: Modernizing A Century-old, Agriculture Recommendations Platform Through the Agstack Open-source Consortium - Gaurav Ramakrishna & Brandy S. Byrd, IBM Room 211/212 (Level 2) Build, Run, and Share Your First EBPF Program in 5 Minutes - Lin Sun, solo.io Lone Star F (Level 3) Openbytes Builds Open Dataset Standards and Schema Aiming to Bring Transformational Changes to AI by Making Open Datasets More Available and Accessible - Edward Cui, GRAVITI Room 408/409 (Level 4) Security as Code: A DevSecOps Approach - Joseph Katsioloudes, GitHub Lone Star G (Level 3) Panel Discussion: A How-to Guide for Contributing to Open Source as an Employee - Alyssa P Wright, Bloomberg; Duane O’Brien, Indeed; Josep Prat, Aiven; Deb Nicholson, Python Software Foundation; Richard Littauer... Room 301/302 (Level 3) Addressing Cybersecurity Challenges in Open Source Software - Stephen Hendrick, The Linux Foundation & Matt Jarvis, Snyk Brazos (Level 2) Assessing the Risk of Open-source Components Using OpenSSF's Scorecard - Laurent Simon, Google & Naveen Srinivasan, Endor Labs Room 203/204 (Level 2)

12:40pm CDT

1:15pm CDT

1:40pm CDT

2:05pm CDT

OS-Climate & SIG-SRE: Benefiting from the Operate First Community Cloud - Karsten Wade & Marcel Hild, Red Hat Room 303/304 (Level 3) Sponsored Session: Time Series Tech Stack for the IoT Edge - Zoe Steinkamp, InfluxData Room 310/311 (Level 3) Image Layout: Stop Putting Everything in Registries - Brandon Mitchell, BoxBoat, an IBM Company Lone Star H (Level 3) Intersectionality: Effectively Paving the Path Forward for DEI Communities by Partnering Together - Jennifer Madriaga, Red Hat Room 201/202 (Level 2) A 'Smart Boombox' with Open Source Hardware and Software - Michael Macisaac, Individual Room 205 (Level 2) An Open Source Exploration of a Semantic Structure for Climate Accounting - Dr. Christiaan Johannes Pauw, Nova Institute & Marcus Alex-Ivan Howard Room 211/212 (Level 2) BoF: Where Did You Come From, Where Did You Go? CVD and Open Source Security Research - Dr. Trey Herr & Stewart Scott, Atlantic Council Room 207 (Level 2) Discovering Toolchains in 2022 - Victor Rodriguez, Intel Lone Star F (Level 3) Building ML Pipelines in JupyterLab Using Elyra - Without the Need to Write Code - Patrick Titzler, IBM Room 408/409 (Level 4) Managing Your Serverless Servers, Again! - Amy Arambulo Negrette, DigitalOcean Lone Star G (Level 3) Does Your OSPO Help or Hinder Contributions? - Dawn Foster, VMware Room 301/302 (Level 3) Lessons Learned from Automating SLSA-Compliance Evaluation - Daniel Nebenzahl, Scribe-security Brazos (Level 2) SBOM Ingestion and Analysis at New York-Presbyterian Hospital - Katie Bratman & Adam Kojak, NewYork-Presbyterian Hospital Room 203/204 (Level 2)

2:55pm CDT

Accelerating Application Development with GraphQL Data Mesh - Tanmai Gopal, Hasura Room 310/311 (Level 3) Peta Scale Telemetry Backend with Opentelemetry - Kranti Vikram Anugola & Weian Deng, Walmart Global Tech Room 303/304 (Level 3) Sponsored Session: Open Source Cloud Native Storage Solutions for Stateful Applications from Dell Technologies - Rahul Sharma, Dell Technologies Lone Star H (Level 3) Keeping the Faith: Your Team Can Benefit from Interfaith Inclusion and Diversity - Jason Davis, Cisco Systems Room 201/202 (Level 2) Uncovering Software Provenance in Embedded Systems - Ricardo Mendoza, Pantacor Room 205 (Level 2) Panel Discussion: Aruba’s Decentralized Solution for Covid Drives Air Travel Transformation - Heather Dahl, Indicio; Yuri Feliciano, Government of Aruba & Adrien Sanglier, SITA Lab Room 211/212 (Level 2) From Linux CFS Scheduler to Goroutine Scheduler: How CFS Algorithm Could Be Used in Goroutine Scheduling - Sen Han, PingCAP Lone Star F (Level 3) Computer Vision to Secure Your Surroundings with AI/ML Solution Built Using Open Source Tools at the Edge - Samantha Coyle & Neethu Elizabeth Simon, Intel Corporation Room 408/409 (Level 4) Sponsored Session: Securing your Cloud Native Stack with Policy-as-Code and OPA - Peter ONeill, Styra Lone Star G (Level 3) The Challenge to Build a Distributed OSPO - Norio Kobota, Sony Group Corporation Room 301/302 (Level 3) Maslow's Hierarchy of Supply Chain Needs - Josh Bressers, Anchore Room 203/204 (Level 2) Road to SLSA3: Non-falsifiable Provenance in Tekton with SPIFFE/SPIRE - Parth Patel, IBM & Brandon Lum, Google Brazos (Level 2)

3:35pm CDT

4:05pm CDT

4:55pm CDT

6:00pm CDT

 
Wednesday, June 22
 

6:45am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:45am CDT

10:05am CDT

10:10am CDT

10:30am CDT

11:00am CDT

11:50am CDT

12:30pm CDT

1:45pm CDT

Creating an Open Source Fraud Risk Management System in Order to Close the Financial Inclusion Gap - Greg McCormick, Sybrin Systems (PTY) Ltd., Mojaloop Foundation Room 310/311 (Level 3) OpenSearch Helps You to Adopt a Friend - Laysa Uchoa, Aiven Room 303/304 (Level 3) Personnel Chaos Engineering and Building a Resilient Organizational Structure - Jennifer D Bergstrom, Parsons Room 205 (Level 2) Kubernetes is Your Cloud Control Plane - Josh Gavant, Red Hat Lone Star H (Level 3) Panel Discussion: Enabling Linux in Safety Applications - Jeffrey Osier-Mixon & Gabriele Paoloni, Red Hat; Kate Stewart, The Linux Foundation; Elana Copperman, Mobileye; Philipp Ahmann, Robert Bosch GmbH; Paul Albertella... Room 211/212 (Level 2) Lessons Learned Supporting Nearly 200,000 IoT Devices - Marc Pous, Balena.io Room 201/202 (Level 2) Tools and Techniques to Debug an Embedded Linux System - Sergio Prado, Embedded Labworks Griffin Hall (Level 2) Postmortem Analysis with Kexec/kdump and Ftrace - Steven Rostedt, Google Lone Star F (Level 3) Mitigating Bias in Models with SHAP and Fairlearn - Sean Owen, Databricks Room 408/409 (Level 4) Sponsored Session: Consumers to Contributors - Open Source as a Competitive Advantage - Brendan O'Leary, GitLab Lone Star G (Level 3) The SPDX License List: What, Why and How - Steve Winslow, Boston Technology Law Room 301/302 (Level 3) Kubernetes Risk Assessment: Time to Go One Level Deeper - Ariel Shuper, Cisco Room 203/204 (Level 2) Sponsored Session: The Simple, Yet Lethal, Anatomy of a Software Supply Chain Attack - Jossef Harush Kadouri, Checkmarx Brazos (Level 2)

2:00pm CDT

2:35pm CDT

Deep Dive on Real World Use Case in Capitalone on Serverless and How It Enables Its Partner's Redemption Capability - Gokul Prabagaren & Nagesh Kumar Vinnakota, Capital One Room 310/311 (Level 3) Turning Users Into Advocates, at Scale - Karin Wolok, StarTree Room 205 (Level 2) Sharing is NOT Caring: Stop Sharing Your Kubernetes Cluster Credentials - Leigh Capili & Nigel Brown, VMware Lone Star H (Level 3) Using FOSS as Part of a System Safety Mechanism - Paul Albertella, Codethink Room 211/212 (Level 2) Delving into the Linux Boot Process for an ARM SoC - Ajay Kumar & Thiagu Ramalingam, Samsung Griffin Hall (Level 2) How to Choose a Software Update Mechanism for Embedded Linux Devices - Leon Anavi, Konsulko Group Room 201/202 (Level 2) Kubernetes Network Policy Enforcement in XDP without IP Translation - Hong Chang, Futurewei Technologies, Inc & Xiaoning Ding, ByteDance (Tiktok) Lone Star F (Level 3) Table Formats Change Everything (By Not Changing Anything) - Ismaël Mejía, Microsoft Room 408/409 (Level 4) Open Source Licenses: Why they Matter and Why You Should Care - Jeff Shapiro, The Linux Foundation Lone Star G (Level 3) Using OpenSSF's Allstar to Secure Your Organizations GitHub Repositories - Jeff Mendoza, Google Room 301/302 (Level 3) Managing Application Level SBOMs with Ortelius - Tracy Ragan, DeployHub Room 203/204 (Level 2) Panel Discussion: Summing Up the Summit: OpenSSF’s May 2022 Gathering and Action Plan - Dr. Trey Herr & Amelie Koran, Atlantic Council; Brian Behlendorf & David Wheeler, OpenSSF Room 303/304 (Level 3) What Role Do Package Registries Have in Securing the Supply Chain? - Justin Colannino & Margaret Tucker, GitHub Brazos (Level 2)

3:15pm CDT

3:45pm CDT

Open Source BPM Comparison - Andrew Bonham, Capital One Room 310/311 (Level 3) Panel Discussion: Marketing is Essential (and Not Sleazy) for Open Source Projects - Emily Omier, Emily Omier Consulting, LLC; Jana Iris, PlanetScale; Matt Yonkovit, Percona; Nithya Ruff, Amazon Room 205 (Level 2) Application AutoScaling Through Elastic Kubernetes POD - Cathy Zhang & Theresa Shan, Intel Lone Star H (Level 3) Xen in Safety-Critical Systems - Stefano Stabellini, AMD & Bertrand Marquis, Arm Room 211/212 (Level 2) Finding the Path from Embedded to Edge using Product Lines - Steffen Evers, Bosch.IO & Philipp Ahmann, Robert Bosch GmBH Griffin Hall (Level 2) What's New in Buildroot? - Thomas Petazzoni, Bootlin Room 201/202 (Level 2) Lessons Learned Creating A Robust, Hardened, Kernel Driver for A Hardware Device - Fiona Trahe & Adam Guerin, Intel Corp. Lone Star F (Level 3) Panel Discussion: How Open Source Helps DataOps - David Radley & Cheranellore Vasudevan, IBM; Mandy Chessell, Egeria; Dan Wolfson, Pragmatic Data Research Ltd. Room 408/409 (Level 4) Peeling Back the Layers of Storage - John Hawley, VMware Lone Star G (Level 3) Building an Open Source Community from the Ground Up: Red Hat’s Game Industry Community of Practice - Ruth Suehle, Red Hat Room 301/302 (Level 3) Purl and Vers: The Mostly Universal Package URL and Version Ranges Identifiers for Dependencies and Vulnerabilities - Philippe Ombredanne, AboutCode and NexB & Hritik Vijay, Independent Room 203/204 (Level 2) Sponsored Session: Because Security Matters: Securing Your Open Source Supply Chain - Aaron Conklin & Don Vosburg, SUSE Brazos (Level 2)

4:35pm CDT

5:15pm CDT

6:30pm CDT

 
Thursday, June 23
 

6:45am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:25am CDT

9:45am CDT

9:55am CDT

10:00am CDT

11:10am CDT

11:20am CDT

11:35am CDT

12:00pm CDT

Sponsored Session: Your Next Workstation Is In The Cloud - Ketan Gangatirkar, Coder Room 310/311 (Level 3) The Value of Community Building. And why you Should Invest in Building One - Jacqueline Salinas, Freelancer Room 408/409 (Level 4) Debugging at Scale in Production - Deep into Your Containers with Kubectl Debug, KoolKits and Continuous Observability - Shai Almog, Lightrun Lone Star G (Level 3) Be Part of the Solution: Cultivating Inclusion in Open Source - Radha Jhatakia & Mike Bufano, Google Room 211/212 (Level 2) Even More Board Farm Goodness - An Update on the REST API for Automated Testing - Tim Bird, Sony Corporation & Harish Bansal, TimeSys Griffin Hall (Level 2) Porting Linux to a Baseboard Management Controller Asic, Feedbacks and Perspectives - Jean-Marie Verdun & Luis Luciani, HPE Room 201/202 (Level 2) System Device Tree and Lopper: Concrete Examples - Bruce Ashfield & Stefano Stabellini, AMD Room 203/204 (Level 2) Open Source Runs the World, Why Not Vulnerability Identifiers? - Josh Bressers, Anchore & Josh Buker, Cloud Security Alliance Brazos (Level 2) Tracing on Page Table - YuHsiang Tseng & ChinEn Lin, National Taiwan Ocean University Lone Star F (Level 3) The Unlimited Potential of Neural Search to Unlock the New Way of Data Comprehension - Bing HE, Jina AI Room 303/304 (Level 3) A Walk through the OSPO Five-stage Model and Personas - Ana Jimenez Santamaria, TODO Group Room 301/302 (Level 3) Meet the Community Behind the Open Programmable Infrastructure Project - Anh Thu Vo, Marvell Technology; Venkat Pullela, Keysight Technologies; Yan Fisher & Kris Murphy, Red Hat; Garth Fruge, NVIDIA Lone Star H (Level 3)

12:40pm CDT

1:15pm CDT

2:05pm CDT

Design Patterns for OPA and Cloud Native Authorization - Tim Hinrichs, Styra Room 310/311 (Level 3) Scaling Your Community From a Few Hundred to Tens of Thousands - Anna Filippova, dbt Labs Room 408/409 (Level 4) From Laptop to Cloud: Developing Cloud Native Applications with Containerized Databases - Nicolas Vermande, Ondat Lone Star G (Level 3) Overcoming Imposter Syndrome to Become a Conference Speaker! - Dawn Foster, VMware Room 211/212 (Level 2) BOF: SBOMs for Embedded Systems: What's Working, What's Not? - Kate Stewart, Linux Foundation Room 201/202 (Level 2) Configuring and Building a Heterogenous System Using the Yocto Project - Mark Hatle, AMD Griffin Hall (Level 2) V4L2 M2M as the Driver Framework for Video Processing IP - Karthik Poduval, Amazon Lab126 Room 203/204 (Level 2) Hidden Vulnerabilities in Open Source - Sharon Benzeev & Shaul Ben Hai, Palo Alto Networks Room 205 (Level 2) Securing Open Source Software - End-to-End, at Massive Scale, Together - Christopher R Robinson, Intel & Anne Bertucio, Google Brazos (Level 2) Lower Response Time of Fork by Extending Copy-on-write to the Page Table - Chih-En Lin, National Taiwan Ocean University Lone Star F (Level 3) Integrating High Performance Feature Stores with KServe Model Serving - Ted Chang & Chin Huang, IBM Room 303/304 (Level 3) Lessons Learned After 1 Year Running an OSPO in Bancolombia (LATAM) - Daniel Estiven Rico Posada, Bancolombia Room 301/302 (Level 3) Tutorial: Introduction to Supply Chain Choreography with Cartographer - Cora Iberkleid & Corby Page, VMware Lone Star H (Level 3)

2:55pm CDT

3:35pm CDT

4:05pm CDT

A Social Model of Open Source: Moving Beyond the License - Julia Ferraioli, Independent Room 408/409 (Level 4) API Testing Without Writing Test Cases and Mocks - Neha Gupta & Shubham Jain, Keploy Inc Lone Star G (Level 3) Fast and Easy Traffic Mirroring and SLO Validation with Iter8 - Alan Cha, IBM Lone Star H (Level 3) Women's Participation in Open Source - Bianca Trinkenreich, Northern Arizona University Room 211/212 (Level 2) Evolving ROS for Safety Critical Systems - Tully Foote, Open Robotics Room 203/204 (Level 2) Lessons Learned: Migrating a Production Platform to Yocto - Mitch Gaines, Farmblox Griffin Hall (Level 2) Towards PREEMPT_RT for the Full Task Isolation - Jim Huang, BiiLabs Co., Ltd. & Oscar Shiang, National Cheng Kung University Room 201/202 (Level 2) A Vulnerability Database Should Not Be About Vulnerabilities! - Hritik Vijay, Independent & Tushar Goel, AboutCode.org and nexB Inc. Brazos (Level 2) Managing Audits for Critical Open Source Projects - Amir Montazery, Open Source Technology Improvement Fund, Inc (OSTIF) Room 205 (Level 2) Rust for Linux: Status Update - Miguel Ojeda, Rust Maintainer & Wedson Almeida Filho, Google Lone Star F (Level 3) Flagging *and* Fixing Bias in ML - Bhaktipriya Radharapu, Google Room 303/304 (Level 3) Supply Chain Security, SBOMs and How OSPOs Can Play An Important Role Going Forward - An Ecosystem and Compliance Update - Jeffrey Borek, IBM Room 301/302 (Level 3) Tutorial: Create Your First EBPF Program to Monitor Your System Using Bumblebee - Adam Sayah, solo.io Room 310/311 (Level 3)

4:55pm CDT

5:05pm CDT

5:15pm CDT

5:25pm CDT

5:45pm CDT

5:55pm CDT

6:05pm CDT

7:00pm CDT

9:00pm CDT

 
Friday, June 24
 

6:45am CDT

7:30am CDT

8:00am CDT

9:00am CDT

9:25am CDT

9:35am CDT

9:45am CDT

10:00am CDT

10:30am CDT

11:10am CDT

12:00pm CDT

12:40pm CDT

2:00pm CDT

Lightning Talk: Building a Community Funnel - John Coghlan, GitLab Room 408/409 (Level 4) Practical Strategies for Centering DEI in Your Open Source Event - Elizabeth Barron, CHAOSS Room 310/311 (Level 3) With WasmEdge to New Shores - Max Körbächer, Liquid Reply Lone Star H (Level 3) BOF: Corporate Use of Embedded Linux - Tim Bird, Sony Corporation Room 203/204 (Level 2) V4L2 Controls - From Perspective of Video Capture Devices - Sathyakam Medavaram, Samsung Semiconductor India R&D Center Griffin Hall (Level 2) Wi-Fi 6 (Formerly IEEE 802.11ax) Deep Dive - Marcel Ziswiler, Toradex AG Room 201/202 (Level 2) How Open Source Software and Digital Public Goods Enabled Quick Pandemic Responses in Sri Lanka and Larger Digital Cooperation - Prajakta Kuwalekar & Nathan Baleeta, Digital Public Goods Alliance Lone Star G (Level 3) Sponsored Session: Rising Threat: Securing Your Open-Source Pipeline - Hassam Mian, Anaconda Brazos (Level 2) The Cry Wolf Vulnerability Paradox: The Problem of FALSE Alerts in Vulnerability Scanners - Emil Wåreus, Debricked Room 205 (Level 2) VDUSE - Supporting VDPA Devices in Userspace - Robert Eshleman, ByteDance Lone Star F (Level 3) Using CHAOSS Metrics, Models, and Software to Identify the Most Significant At-Risk Dependencies in Your Portfolio - Sean Goggins, CHAOSS Project and the University of Missouri - Columbia Room 301/302 (Level 3) Building and Running a Diversity-focused Pre-internship Program for SRE - Andrew Ryan, Meta Room 303/304 (Level 3)

2:10pm CDT

2:30pm CDT

2:50pm CDT

3:30pm CDT

4:00pm CDT

4:15pm CDT

7:00pm CDT

 

Filter sessions
Apply filters to sessions.
  • CloudOpen
  • Community Leadership Conference
  • ContainerCon
  • Critical Software Summit
  • Diversity Empowerment Summit
  • Embedded IoT
  • Embedded Linux Conference (ELC)
  • Emerging OS Forum
  • Global Security Vulnerability Summit (GSVS)
  • Keynote Sessions
  • LinuxCon
  • Open AI & Data Forum
  • Open Source On-Ramp
  • OSPOCon
  • Project Mini-Summits / Co-located Events
  • Special Events / Exhibits / Breaks
  • SupplyChainSecurityCon
  • Wildcard