Session Slides Attached:
Yes [
clear filter ]
11:10am CDT
OSPOCon Keynote: F5’s Open Source Journey - Christine Abernathy, F5, Inc. Room 301/302 (Level 3)
How to Inject Faults into Common HTTP(S) Clients and Services - Chenxi Li, PingCAP Room 303/304 (Level 3)
K8s in a Submarine: Optimizing Delivery for Some of the Hardest-to-reach Systems on Earth - Jeff McCoy, Defense Unicorns Lone Star H (Level 3)
"Did You Miss My Comment or What?": Understanding Toxicity in Open Source Discussions - Courtney Miller, Carnegie Mellon University Room 201/202 (Level 2)
Introduction to Presto: The SQL Engine for Data Platform Teams - Rohan Pednekar, Ahana Cloud, Inc. & Philip Bell, Meta Room 211/212 (Level 2)
Hacking for Developers - Jarmo Lahtiranta, Insta Group Lone Star F (Level 3)
Automating Airflow Backfills with Marquez - Willy Lulciuc, Astronomer Room 408/409 (Level 4)
A CNCF Landscape Pitch Meeting - Carson Anderson, Weave Lone Star G (Level 3)
Reproducible Builds: Unexpected Benefits and Problems - Bernhard M. Wiedemann, SUSE Brazos (Level 2)
12:00pm CDT
Key Lessons Learned from Building a Wealth Management Portal Using Cloud Native Architecture - Ankur Kumar, Publicis Sapient Room 303/304 (Level 3)
Sponsored Session: Introducing OpenCost - Webb Brown, Kubecost Room 310/311 (Level 3)
From Monolith to Microservices: A Journey into the Mesh - Yolanda Robla Mota, Miro Lone Star H (Level 3)
Yes There Are Differences But We Are All Human Right? - David Bevan, Collabora Room 201/202 (Level 2)
How to Leverage an Open Update Protocol to Drive Your Embedded Devices from Any Cloud OTA Provider - Anibal Portero, Pantacor Room 205 (Level 2)
Ag-Rec: Modernizing A Century-old, Agriculture Recommendations Platform Through the Agstack Open-source Consortium - Gaurav Ramakrishna & Brandy S. Byrd, IBM Room 211/212 (Level 2)
Openbytes Builds Open Dataset Standards and Schema Aiming to Bring Transformational Changes to AI by Making Open Datasets More Available and Accessible - Edward Cui, GRAVITI Room 408/409 (Level 4)
Security as Code: A DevSecOps Approach - Joseph Katsioloudes, GitHub Lone Star G (Level 3)
Addressing Cybersecurity Challenges in Open Source Software - Stephen Hendrick, The Linux Foundation & Matt Jarvis, Snyk Brazos (Level 2)
Assessing the Risk of Open-source Components Using OpenSSF's Scorecard - Laurent Simon, Google & Naveen Srinivasan, Endor Labs Room 203/204 (Level 2)
2:05pm CDT
Sponsored Session: Time Series Tech Stack for the IoT Edge - Zoe Steinkamp, InfluxData Room 310/311 (Level 3)
Image Layout: Stop Putting Everything in Registries - Brandon Mitchell, BoxBoat, an IBM Company Lone Star H (Level 3)
An Open Source Exploration of a Semantic Structure for Climate Accounting - Dr. Christiaan Johannes Pauw, Nova Institute & Marcus Alex-Ivan Howard Room 211/212 (Level 2)
Discovering Toolchains in 2022 - Victor Rodriguez, Intel Lone Star F (Level 3)
Building ML Pipelines in JupyterLab Using Elyra - Without the Need to Write Code - Patrick Titzler, IBM Room 408/409 (Level 4)
Managing Your Serverless Servers, Again! - Amy Arambulo Negrette, DigitalOcean Lone Star G (Level 3)
Does Your OSPO Help or Hinder Contributions? - Dawn Foster, VMware Room 301/302 (Level 3)
Lessons Learned from Automating SLSA-Compliance Evaluation - Daniel Nebenzahl, Scribe-security Brazos (Level 2)
SBOM Ingestion and Analysis at New York-Presbyterian Hospital - Katie Bratman & Adam Kojak, NewYork-Presbyterian Hospital Room 203/204 (Level 2)
2:55pm CDT
Peta Scale Telemetry Backend with Opentelemetry - Kranti Vikram Anugola & Weian Deng, Walmart Global Tech Room 303/304 (Level 3)
Keeping the Faith: Your Team Can Benefit from Interfaith Inclusion and Diversity - Jason Davis, Cisco Systems Room 201/202 (Level 2)
Uncovering Software Provenance in Embedded Systems - Ricardo Mendoza, Pantacor Room 205 (Level 2)
Panel Discussion: Aruba’s Decentralized Solution for Covid Drives Air Travel Transformation - Heather Dahl, Indicio; Yuri Feliciano, Government of Aruba & Adrien Sanglier, SITA Lab Room 211/212 (Level 2)
From Linux CFS Scheduler to Goroutine Scheduler: How CFS Algorithm Could Be Used in Goroutine Scheduling - Sen Han, PingCAP Lone Star F (Level 3)
Computer Vision to Secure Your Surroundings with AI/ML Solution Built Using Open Source Tools at the Edge - Samantha Coyle & Neethu Elizabeth Simon, Intel Corporation Room 408/409 (Level 4)
The Challenge to Build a Distributed OSPO - Norio Kobota, Sony Group Corporation Room 301/302 (Level 3)
Maslow's Hierarchy of Supply Chain Needs - Josh Bressers, Anchore Room 203/204 (Level 2)
Road to SLSA3: Non-falsifiable Provenance in Tekton with SPIFFE/SPIRE - Parth Patel, IBM & Brandon Lum, Google Brazos (Level 2)
4:05pm CDT
4:55pm CDT
Scale Kubernetes to Manage 60K Nodes Through Architectural Extension - Ying Huang & Ying Xiong, Futurewei Technologies Room 303/304 (Level 3)
Sustainability the Container Native Way - Huamin Chen, Red Hat & Chen Wang, IBM Lone Star H (Level 3)
Building a Standards-based Open Ecosystem for DPU/IPU Technologies - Kris Murphy, Red Hat; Dan Daly, Intel & Paul Pindell, F5 Networking Room 211/212 (Level 2)
Democratizing Deep Learning at Scale with Horovod - Nicolas Castet, Nvidia & Travis Addair, Predibase Room 408/409 (Level 4)
What Makes A Build Reproducible? - Rose Judge & Joshua Lock, VMware Room 203/204 (Level 2)
Tutorial: Building an EBPF Swiss Knife from OSS - Val Pliskin & Amit Slavin, Seekret Lone Star F (Level 3)
11:00am CDT
Beyond the Monkeys: Chaos Engineering on the Cloud - Bella Wiseman & Sindhuja Durai, Goldman Sachs Room 310/311 (Level 3)
Server-side Wasm Applications: Replacing Docker with WASI - Colin Murphy, Adobe Room 303/304 (Level 3)
Keeping Your Open Source Community Accessible to All - Treva Williams, Open Infrastructure Foundation Room 205 (Level 2)
All About That BoM, ‘bout That BoM - Melba Lopez, IBM Room 211/212 (Level 2)
Status of Embedded Linux - Tim Bird, Sony Corporation Griffin Hall (Level 2)
Krepair: Automatically Repairing .config Files to Cover Patches - Paul Gazzillo & Necip Yildiran, University of Central Florida Lone Star F (Level 3)
Dear Security, Compliance, and Auditors, We’re Sorry. Love, DevOps. - Bill Bensing, Red Hat Room 203/204 (Level 2)
Sponsored Session: Malicious Package Trends Compared With Malware Evolution - Daniel Elkabes, MEND Brazos (Level 2)
Tutorial: Cloud Native Building Blocks: An Interactive Envoy Proxy Workshop - Jim Barton & Adam Sayah, solo.io Lone Star G (Level 3)
11:50am CDT
Cloud Native My Camel: from Low Code to Pro Code, inject Serverless and Cloud Native Goodness Into Your App Dev with Apache Camel - Michael Costello, Red Hat Room 310/311 (Level 3)
Your Own Little HA Cloud at the Edge (or at Home) - Stephane Graber, Canonical Ltd. Room 303/304 (Level 3)
Remote Doesn’t Mean Distant - Managing Teams Effectively from Different Geographies - David Bevan, Collabora Room 205 (Level 2)
Containers Security Layers and How Not to Break them - Aviv Sasson, Palo Alto Networks Lone Star H (Level 3)
Automotive Ethernet: Future of Connected Vehicles - Ravi Dineshbhai Patel & Sriranjani P, Samsung Semiconductor India R&D Griffin Hall (Level 2)
Shhh - Stop Sharing Secrets, a Secure Mindset for Embedded Development - Andy Doan & Ricardo Salveti, Foundries.io Room 201/202 (Level 2)
Lightning Fast Java Application Startup Using Checkpoint/Restore with Eclipse OpenJ9 - Thomas Watson, IBM Lone Star F (Level 3)
Evolution of Milvus Cloud-Scalable Vector Database - Charles Xie & Frank Liu, Zilliz Room 408/409 (Level 4)
The TRUE Cost of Open Source - Suzanne Ambiel, VMware Room 301/302 (Level 3)
Going Beyond Metadata: Why We Need to Think of Adopting Static Analysis in Dependency Tools - Joseph Hejderup, TU Delft | Endor Labs Room 203/204 (Level 2)
How Do We Rank Project Risk? - Jacques Chester, Shopify Brazos (Level 2)
1:45pm CDT
Creating an Open Source Fraud Risk Management System in Order to Close the Financial Inclusion Gap - Greg McCormick, Sybrin Systems (PTY) Ltd., Mojaloop Foundation Room 310/311 (Level 3)
Personnel Chaos Engineering and Building a Resilient Organizational Structure - Jennifer D Bergstrom, Parsons Room 205 (Level 2)
Kubernetes is Your Cloud Control Plane - Josh Gavant, Red Hat Lone Star H (Level 3)
Lessons Learned Supporting Nearly 200,000 IoT Devices - Marc Pous, Balena.io Room 201/202 (Level 2)
Tools and Techniques to Debug an Embedded Linux System - Sergio Prado, Embedded Labworks Griffin Hall (Level 2)
Postmortem Analysis with Kexec/kdump and Ftrace - Steven Rostedt, Google Lone Star F (Level 3)
The SPDX License List: What, Why and How - Steve Winslow, Boston Technology Law Room 301/302 (Level 3)
2:35pm CDT
Delving into the Linux Boot Process for an ARM SoC - Ajay Kumar & Thiagu Ramalingam, Samsung Griffin Hall (Level 2)
How to Choose a Software Update Mechanism for Embedded Linux Devices - Leon Anavi, Konsulko Group Room 201/202 (Level 2)
Kubernetes Network Policy Enforcement in XDP without IP Translation - Hong Chang, Futurewei Technologies, Inc & Xiaoning Ding, ByteDance (Tiktok) Lone Star F (Level 3)
Table Formats Change Everything (By Not Changing Anything) - Ismaël Mejía, Microsoft Room 408/409 (Level 4)
Open Source Licenses: Why they Matter and Why You Should Care - Jeff Shapiro, The Linux Foundation Lone Star G (Level 3)
Using OpenSSF's Allstar to Secure Your Organizations GitHub Repositories - Jeff Mendoza, Google Room 301/302 (Level 3)
Managing Application Level SBOMs with Ortelius - Tracy Ragan, DeployHub Room 203/204 (Level 2)
What Role Do Package Registries Have in Securing the Supply Chain? - Justin Colannino & Margaret Tucker, GitHub Brazos (Level 2)
3:45pm CDT
Open Source BPM Comparison - Andrew Bonham, Capital One Room 310/311 (Level 3)
Application AutoScaling Through Elastic Kubernetes POD - Cathy Zhang & Theresa Shan, Intel Lone Star H (Level 3)
Finding the Path from Embedded to Edge using Product Lines - Steffen Evers, Bosch.IO & Philipp Ahmann, Robert Bosch GmBH Griffin Hall (Level 2)
What's New in Buildroot? - Thomas Petazzoni, Bootlin Room 201/202 (Level 2)
Lessons Learned Creating A Robust, Hardened, Kernel Driver for A Hardware Device - Fiona Trahe & Adam Guerin, Intel Corp. Lone Star F (Level 3)
Building an Open Source Community from the Ground Up: Red Hat’s Game Industry Community of Practice - Ruth Suehle, Red Hat Room 301/302 (Level 3)
Purl and Vers: The Mostly Universal Package URL and Version Ranges Identifiers for Dependencies and Vulnerabilities - Philippe Ombredanne, AboutCode and NexB & Hritik Vijay, Independent Room 203/204 (Level 2)
Sponsored Session: Because Security Matters: Securing Your Open Source Supply Chain - Aaron Conklin & Don Vosburg, SUSE Brazos (Level 2)
4:35pm CDT
Sponsored Session: I Deleted 78% of my Redis Containers, and they Still Run! - Rajeev Thakur & Vinod Gupta, RapidFort Lone Star H (Level 3)
Protect Your Application, Not the Network. Add Zero Trust Superpowers to Your Critical Applications and Systems - Clint Dovholuk, NetFoundry Room 211/212 (Level 2)
Case Study: Switching from Asymmetric to Symmetric Software Updates - Jeff Pautler, NI Griffin Hall (Level 2)
Tips, Tricks, and Gotchas for Linux Real-Time Tuning - Gratian Crisan, NI Room 201/202 (Level 2)
Keylime: Bootstrap and Maintain Trust on the Edge, Cloud, and IoT - Lily Sturmann & Michael Peters, Red Hat Lone Star F (Level 3)
Delta Lake: Diving into Data Lakes Without the Downsides - Kelly O'Malley, Databricks Room 408/409 (Level 4)
The Culture of DevOps for Secure Environments - Rob Slaughter, Defense Unicorns Lone Star G (Level 3)
Github Actions Security Landscape - Alex Ilgayev & Ronen Slavin, Cycode Brazos (Level 2)
Google SLSA & NIST SSDF: Emerging Software Supply Chain Security Best Practices - Tony Loehr, Cycode Room 203/204 (Level 2)
11:10am CDT
Welcome & Opening Remarks - Brandon Lum, Google Brazos (Level 2)
Carbyne Stack - Cloud Native Computing on Encrypted Data - Sven Trieflinger, Robert Bosch GmbH Room 310/311 (Level 3)
Managing Containerized Software on Edge Computers with Open Horizon - Glen Darling, IBM Lone Star G (Level 3)
Codes of Conduct in Action: Navigating the Challenges of Incident Resolution - Joanna Lee, Gesmer Updegrove LLLP Room 211/212 (Level 2)
If (oops) { Do_not_panic(); } - Lucky Tyagi, Samsung Semiconductor India R&D Center Griffin Hall (Level 2)
OSFCI - Extensible Open-source CI for Firmware with Real Hardware Execution - Arun Darlie Koshy & Jean-Marie Verdun, Hewlett Packard Enterprise (HPE) Room 201/202 (Level 2)
SSDFS: Flash-friendly File System with Highly Minimized GC Activity, Diff-on-write, and Deduplication - Viacheslav Dubeyko, ByteDance Room 203/204 (Level 2)
Searching for the Right Words: Bringing NLP to Apache solr through ONNX and OpenNLP - Jeff Zemerick, Opensource Connections Room 303/304 (Level 3)
12:00pm CDT
The Value of Community Building. And why you Should Invest in Building One - Jacqueline Salinas, Freelancer Room 408/409 (Level 4)
Debugging at Scale in Production - Deep into Your Containers with Kubectl Debug, KoolKits and Continuous Observability - Shai Almog, Lightrun Lone Star G (Level 3)
Be Part of the Solution: Cultivating Inclusion in Open Source - Radha Jhatakia & Mike Bufano, Google Room 211/212 (Level 2)
Even More Board Farm Goodness - An Update on the REST API for Automated Testing - Tim Bird, Sony Corporation & Harish Bansal, TimeSys Griffin Hall (Level 2)
Porting Linux to a Baseboard Management Controller Asic, Feedbacks and Perspectives - Jean-Marie Verdun & Luis Luciani, HPE Room 201/202 (Level 2)
System Device Tree and Lopper: Concrete Examples - Bruce Ashfield & Stefano Stabellini, AMD Room 203/204 (Level 2)
Open Source Runs the World, Why Not Vulnerability Identifiers? - Josh Bressers, Anchore & Josh Buker, Cloud Security Alliance Brazos (Level 2)
Tracing on Page Table - YuHsiang Tseng & ChinEn Lin, National Taiwan Ocean University Lone Star F (Level 3)
2:05pm CDT
2:55pm CDT
You're Doing it Wrong: OSPO Disasters - Van Lindberg, OSPOCO Room 301/302 (Level 3)
Improving CI/CD Process for Cloud Native Python Applications with PyPI Cloud - Jaehyun Sim, Ikigai Labs Room 310/311 (Level 3)
Velero - The Cloud Native Backup for Kubernetes - Orlin Vasilev, VMware & Scott Seago, Red Hat Lone Star G (Level 3)
Teaching Collaboration to the Next Generation of Open Source Contributors - Ruth Suehle, Red Hat Room 211/212 (Level 2)
Edge Computing with RISC-V Platforms Running XIP Linux - Vitaly Vul & Maria Vul, Konsulko AB Room 201/202 (Level 2)
Yocto Project Autobuilders and the SWAT Team - Alexandre Belloni, Bootlin Griffin Hall (Level 2)
Understanding OSS Risk Beyond Code Vulnerabilities - Shripad Nadgowda & Caroline Lee, IBM Room 205 (Level 2)
Vulntology - A Methodology to Characterize Vulnerabilities While Providing A Granular and Intuitive Structure - Christopher Turner, National institute of Standards and Technology Brazos (Level 2)
Memory Folios - Matthew Wilcox, Oracle Lone Star F (Level 3)
Labeling Tools are Great, but What About Quality Checks? - Marcus Edel & Jakub Piotr Cłapa, Collabora Ltd. Room 303/304 (Level 3)
4:05pm CDT
A Social Model of Open Source: Moving Beyond the License - Julia Ferraioli, Independent Room 408/409 (Level 4)
API Testing Without Writing Test Cases and Mocks - Neha Gupta & Shubham Jain, Keploy Inc Lone Star G (Level 3)
Fast and Easy Traffic Mirroring and SLO Validation with Iter8 - Alan Cha, IBM Lone Star H (Level 3)
Women's Participation in Open Source - Bianca Trinkenreich, Northern Arizona University Room 211/212 (Level 2)
Lessons Learned: Migrating a Production Platform to Yocto - Mitch Gaines, Farmblox Griffin Hall (Level 2)
Towards PREEMPT_RT for the Full Task Isolation - Jim Huang, BiiLabs Co., Ltd. & Oscar Shiang, National Cheng Kung University Room 201/202 (Level 2)
A Vulnerability Database Should Not Be About Vulnerabilities! - Hritik Vijay, Independent & Tushar Goel, AboutCode.org and nexB Inc. Brazos (Level 2)
Managing Audits for Critical Open Source Projects - Amir Montazery, Open Source Technology Improvement Fund, Inc (OSTIF) Room 205 (Level 2)
Supply Chain Security, SBOMs and How OSPOs Can Play An Important Role Going Forward - An Ecosystem and Compliance Update - Jeffrey Borek, IBM Room 301/302 (Level 3)
4:55pm CDT
Lightning Talk: A Component Registry for Kubeflow Pipelines - Christian Kadner, IBM Room 303/304 (Level 3)
Uncovering Community and Project Insights Through Data Driven Methods - Oindrilla Chatterjee & Karanraj Chauhan, Red Hat Room 408/409 (Level 4)
Network Traffic Quality of Service (QoS) Classes for Containers & Pods Via EBPF/XDP - Vinay Kulkarni & Phu Tran, Futurewei Technologies Lone Star G (Level 3)
Finding a Niche in Open Source Contributions - AmyJune Hineline, Red Hat Room 211/212 (Level 2)
From UART to PCIe and DMA: Selecting Connectivity for Your FPGA-based Subsystem - Alexander Wirthmueller, MPSI Technologies GmbH Room 201/202 (Level 2)
Software Bill of Materials and Supply Chain with the Yocto Project - Joshua Watt, Garmin Griffin Hall (Level 2)
An Econometric Examination of Cybersecurity Vulnerabilities in Open Source Software Comprising Critical Internet Infrastructure - Bryan Boots, PhD Student Room 205 (Level 2)
Future of CVE - Art Manion, Carnegie Mellon University Software Engineering Institute Brazos (Level 2)
The Linux Performance Counter API, Made Easy - Jackson Garrett Huff, Independent Lone Star F (Level 3)
5:05pm CDT
5:15pm CDT
5:25pm CDT
5:45pm CDT
5:55pm CDT
6:05pm CDT
11:10am CDT
12:00pm CDT
2:00pm CDT
2:10pm CDT
2:30pm CDT
2:50pm CDT
4:15pm CDT