tune Filter sessions
Session Type:
In-person Speaker(s) [
clear filter ]
9:15am CDT
11:10am CDT
OSPOCon Keynote: F5’s Open Source Journey - Christine Abernathy, F5, Inc. Room 301/302 (Level 3)
Cloud Native Application Development with MicroProfile and Open Liberty - Emily Jiang, IBM Room 310/311 (Level 3)
K8s in a Submarine: Optimizing Delivery for Some of the Hardest-to-reach Systems on Earth - Jeff McCoy, Defense Unicorns Lone Star H (Level 3)
"Did You Miss My Comment or What?": Understanding Toxicity in Open Source Discussions - Courtney Miller, Carnegie Mellon University Room 201/202 (Level 2)
Automating Airflow Backfills with Marquez - Willy Lulciuc, Astronomer Room 408/409 (Level 4)
A CNCF Landscape Pitch Meeting - Carson Anderson, Weave Lone Star G (Level 3)
Panel Discussion: How the Business Community is Working to Make the Open Source Software Supply Chain More Secure by Default - Jory Burson, Linux Foundation; Rao Lakkakula, JP Morgan Chase; Andrew Aitken, WiPro... Room 203/204 (Level 2)
12:00pm CDT
Sponsored Session: Introducing OpenCost - Webb Brown, Kubecost Room 310/311 (Level 3)
Yes There Are Differences But We Are All Human Right? - David Bevan, Collabora Room 201/202 (Level 2)
How to Leverage an Open Update Protocol to Drive Your Embedded Devices from Any Cloud OTA Provider - Anibal Portero, Pantacor Room 205 (Level 2)
Ag-Rec: Modernizing A Century-old, Agriculture Recommendations Platform Through the Agstack Open-source Consortium - Gaurav Ramakrishna & Brandy S. Byrd, IBM Room 211/212 (Level 2)
Build, Run, and Share Your First EBPF Program in 5 Minutes - Lin Sun, solo.io Lone Star F (Level 3)
Panel Discussion: A How-to Guide for Contributing to Open Source as an Employee - Alyssa P Wright, Bloomberg; Duane O’Brien, Indeed; Josep Prat, Aiven; Deb Nicholson, Python Software Foundation; Richard Littauer... Room 301/302 (Level 3)
Addressing Cybersecurity Challenges in Open Source Software - Stephen Hendrick, The Linux Foundation & Matt Jarvis, Snyk Brazos (Level 2)
Assessing the Risk of Open-source Components Using OpenSSF's Scorecard - Laurent Simon, Google & Naveen Srinivasan, Endor Labs Room 203/204 (Level 2)
1:15pm CDT
1:40pm CDT
2:05pm CDT
OS-Climate & SIG-SRE: Benefiting from the Operate First Community Cloud - Karsten Wade & Marcel Hild, Red Hat Room 303/304 (Level 3)
Sponsored Session: Time Series Tech Stack for the IoT Edge - Zoe Steinkamp, InfluxData Room 310/311 (Level 3)
Image Layout: Stop Putting Everything in Registries - Brandon Mitchell, BoxBoat, an IBM Company Lone Star H (Level 3)
Intersectionality: Effectively Paving the Path Forward for DEI Communities by Partnering Together - Jennifer Madriaga, Red Hat Room 201/202 (Level 2)
A 'Smart Boombox' with Open Source Hardware and Software - Michael Macisaac, Individual Room 205 (Level 2)
BoF: Where Did You Come From, Where Did You Go? CVD and Open Source Security Research - Dr. Trey Herr & Stewart Scott, Atlantic Council Room 207 (Level 2)
Discovering Toolchains in 2022 - Victor Rodriguez, Intel Lone Star F (Level 3)
Building ML Pipelines in JupyterLab Using Elyra - Without the Need to Write Code - Patrick Titzler, IBM Room 408/409 (Level 4)
Managing Your Serverless Servers, Again! - Amy Arambulo Negrette, DigitalOcean Lone Star G (Level 3)
Does Your OSPO Help or Hinder Contributions? - Dawn Foster, VMware Room 301/302 (Level 3)
Lessons Learned from Automating SLSA-Compliance Evaluation - Daniel Nebenzahl, Scribe-security Brazos (Level 2)
SBOM Ingestion and Analysis at New York-Presbyterian Hospital - Katie Bratman & Adam Kojak, NewYork-Presbyterian Hospital Room 203/204 (Level 2)
2:55pm CDT
4:05pm CDT
Adding OpenTelemetry to Production Apps: Lessons Learned - Dave McAllister, NGINX Room 310/311 (Level 3)
Throw Away Your Passwords: Trusting Workload Identity - Andrew Martin, ControlPlane Room 303/304 (Level 3)
Secure Containers Deployments: Time for Refresh - Ariel Shuper, Cisco Lone Star H (Level 3)
Strategies for Appropriate Social Interaction - Carmen McClelland, Mod I Solutions Room 201/202 (Level 2)
Sponsored Session: Automating the IoT with BPMN - David G. Simmons, Camunda Room 205 (Level 2)
Build a More Sustainable World Through "Call for Code with the Linux Foundation" Open Source Projects - Daniel Krook & Charles Johnson, IBM Room 211/212 (Level 2)
Real-Time Analytics: Going Beyond Stream Processing with Apache Pinot - Rong Rong & Karin Wolok, StarTree Room 408/409 (Level 4)
Authenticating Supply-chain Metadata: Building Remote Code Attestations on GitHub - Asra Ali & Laurent Simon, Google Room 203/204 (Level 2)
GitBOM: Repurposing Git’s Graph for Supply Chain Security & Transparency - Aeva Black, Microsoft & Ed Warnicke, Cisco Systems Brazos (Level 2)
Tutorial: Getting Started with Kubernetes - Kim Schlesinger & Mason Egger, DigitalOcean Lone Star G (Level 3)
4:55pm CDT
Scale Kubernetes to Manage 60K Nodes Through Architectural Extension - Ying Huang & Ying Xiong, Futurewei Technologies Room 303/304 (Level 3)
Sustainability the Container Native Way - Huamin Chen, Red Hat & Chen Wang, IBM Lone Star H (Level 3)
BoF: Advancing Diversity and Inclusion: The Open Source Way - Demetris Cheatham, GitHub & Hilary Carter, The Linux Foundation Room 201/202 (Level 2)
Level-Up Embedded Development with WebAssembly - Gerred Dillion, Mycelial Room 205 (Level 2)
Building a Standards-based Open Ecosystem for DPU/IPU Technologies - Kris Murphy, Red Hat; Dan Daly, Intel & Paul Pindell, F5 Networking Room 211/212 (Level 2)
Democratizing Deep Learning at Scale with Horovod - Nicolas Castet, Nvidia & Travis Addair, Predibase Room 408/409 (Level 4)
Sponsored Session: Software Supply Chain Threat Landscapes: A Moving Target - Brian Fox, Sonatype Brazos (Level 2)
Tutorial: Building an EBPF Swiss Knife from OSS - Val Pliskin & Amit Slavin, Seekret Lone Star F (Level 3)
11:00am CDT
Server-side Wasm Applications: Replacing Docker with WASI - Colin Murphy, Adobe Room 303/304 (Level 3)
Keeping Your Open Source Community Accessible to All - Treva Williams, Open Infrastructure Foundation Room 205 (Level 2)
Powering Observability with Simple, Sharable, EBPF Programs - Lin Sun, solo.io Lone Star H (Level 3)
All About That BoM, ‘bout That BoM - Melba Lopez, IBM Room 211/212 (Level 2)
Status of Embedded Linux - Tim Bird, Sony Corporation Griffin Hall (Level 2)
ETL - Extract Trino Load - A Case for Trino as a Batch Processing Engine - Andrii Rosa, Starburst Data Room 408/409 (Level 4)
Dear Security, Compliance, and Auditors, We’re Sorry. Love, DevOps. - Bill Bensing, Red Hat Room 203/204 (Level 2)
Sponsored Session: Malicious Package Trends Compared With Malware Evolution - Daniel Elkabes, MEND Brazos (Level 2)
Tutorial: Cloud Native Building Blocks: An Interactive Envoy Proxy Workshop - Jim Barton & Adam Sayah, solo.io Lone Star G (Level 3)
11:50am CDT
Cloud Native My Camel: from Low Code to Pro Code, inject Serverless and Cloud Native Goodness Into Your App Dev with Apache Camel - Michael Costello, Red Hat Room 310/311 (Level 3)
Your Own Little HA Cloud at the Edge (or at Home) - Stephane Graber, Canonical Ltd. Room 303/304 (Level 3)
Remote Doesn’t Mean Distant - Managing Teams Effectively from Different Geographies - David Bevan, Collabora Room 205 (Level 2)
Containers Security Layers and How Not to Break them - Aviv Sasson, Palo Alto Networks Lone Star H (Level 3)
Shhh - Stop Sharing Secrets, a Secure Mindset for Embedded Development - Andy Doan & Ricardo Salveti, Foundries.io Room 201/202 (Level 2)
Lightning Fast Java Application Startup Using Checkpoint/Restore with Eclipse OpenJ9 - Thomas Watson, IBM Lone Star F (Level 3)
Evolution of Milvus Cloud-Scalable Vector Database - Charles Xie & Frank Liu, Zilliz Room 408/409 (Level 4)
The TRUE Cost of Open Source - Suzanne Ambiel, VMware Room 301/302 (Level 3)
Going Beyond Metadata: Why We Need to Think of Adopting Static Analysis in Dependency Tools - Joseph Hejderup, TU Delft | Endor Labs Room 203/204 (Level 2)
1:45pm CDT
Personnel Chaos Engineering and Building a Resilient Organizational Structure - Jennifer D Bergstrom, Parsons Room 205 (Level 2)
Kubernetes is Your Cloud Control Plane - Josh Gavant, Red Hat Lone Star H (Level 3)
Tools and Techniques to Debug an Embedded Linux System - Sergio Prado, Embedded Labworks Griffin Hall (Level 2)
Postmortem Analysis with Kexec/kdump and Ftrace - Steven Rostedt, Google Lone Star F (Level 3)
Mitigating Bias in Models with SHAP and Fairlearn - Sean Owen, Databricks Room 408/409 (Level 4)
Sponsored Session: Consumers to Contributors - Open Source as a Competitive Advantage - Brendan O'Leary, GitLab Lone Star G (Level 3)
The SPDX License List: What, Why and How - Steve Winslow, Boston Technology Law Room 301/302 (Level 3)
Kubernetes Risk Assessment: Time to Go One Level Deeper - Ariel Shuper, Cisco Room 203/204 (Level 2)
Sponsored Session: The Simple, Yet Lethal, Anatomy of a Software Supply Chain Attack - Jossef Harush Kadouri, Checkmarx Brazos (Level 2)
2:35pm CDT
Deep Dive on Real World Use Case in Capitalone on Serverless and How It Enables Its Partner's Redemption Capability - Gokul Prabagaren & Nagesh Kumar Vinnakota, Capital One Room 310/311 (Level 3)
Turning Users Into Advocates, at Scale - Karin Wolok, StarTree Room 205 (Level 2)
Sharing is NOT Caring: Stop Sharing Your Kubernetes Cluster Credentials - Leigh Capili & Nigel Brown, VMware Lone Star H (Level 3)
Kubernetes Network Policy Enforcement in XDP without IP Translation - Hong Chang, Futurewei Technologies, Inc & Xiaoning Ding, ByteDance (Tiktok) Lone Star F (Level 3)
Table Formats Change Everything (By Not Changing Anything) - Ismaël Mejía, Microsoft Room 408/409 (Level 4)
Open Source Licenses: Why they Matter and Why You Should Care - Jeff Shapiro, The Linux Foundation Lone Star G (Level 3)
Using OpenSSF's Allstar to Secure Your Organizations GitHub Repositories - Jeff Mendoza, Google Room 301/302 (Level 3)
Managing Application Level SBOMs with Ortelius - Tracy Ragan, DeployHub Room 203/204 (Level 2)
Panel Discussion: Summing Up the Summit: OpenSSF’s May 2022 Gathering and Action Plan - Dr. Trey Herr & Amelie Koran, Atlantic Council; Brian Behlendorf & David Wheeler, OpenSSF Room 303/304 (Level 3)
What Role Do Package Registries Have in Securing the Supply Chain? - Justin Colannino & Margaret Tucker, GitHub Brazos (Level 2)
3:45pm CDT
Open Source BPM Comparison - Andrew Bonham, Capital One Room 310/311 (Level 3)
Panel Discussion: Marketing is Essential (and Not Sleazy) for Open Source Projects - Emily Omier, Emily Omier Consulting, LLC; Jana Iris, PlanetScale; Matt Yonkovit, Percona; Nithya Ruff, Amazon Room 205 (Level 2)
Finding the Path from Embedded to Edge using Product Lines - Steffen Evers, Bosch.IO & Philipp Ahmann, Robert Bosch GmBH Griffin Hall (Level 2)
What's New in Buildroot? - Thomas Petazzoni, Bootlin Room 201/202 (Level 2)
Lessons Learned Creating A Robust, Hardened, Kernel Driver for A Hardware Device - Fiona Trahe & Adam Guerin, Intel Corp. Lone Star F (Level 3)
Sponsored Session: Because Security Matters: Securing Your Open Source Supply Chain - Aaron Conklin & Don Vosburg, SUSE Brazos (Level 2)
4:35pm CDT
5 Open Source Security Tools All Developers Should Know About - Ran Regenstreif, Jit Room 310/311 (Level 3)
JavaScript in WebAssembly? Why and How - Michael Yuan, WasmEdge Room 303/304 (Level 3)
Developer Experience: How to Conquer the Hearts of Developers - Elena Lape, Holographic Inc. Room 205 (Level 2)
Sponsored Session: I Deleted 78% of my Redis Containers, and they Still Run! - Rajeev Thakur & Vinod Gupta, RapidFort Lone Star H (Level 3)
Protect Your Application, Not the Network. Add Zero Trust Superpowers to Your Critical Applications and Systems - Clint Dovholuk, NetFoundry Room 211/212 (Level 2)
Case Study: Switching from Asymmetric to Symmetric Software Updates - Jeff Pautler, NI Griffin Hall (Level 2)
Tips, Tricks, and Gotchas for Linux Real-Time Tuning - Gratian Crisan, NI Room 201/202 (Level 2)
Keylime: Bootstrap and Maintain Trust on the Edge, Cloud, and IoT - Lily Sturmann & Michael Peters, Red Hat Lone Star F (Level 3)
Delta Lake: Diving into Data Lakes Without the Downsides - Kelly O'Malley, Databricks Room 408/409 (Level 4)
The Culture of DevOps for Secure Environments - Rob Slaughter, Defense Unicorns Lone Star G (Level 3)
Goldman Sachs' Open Source Program Office - One Year In - Robert Underwood, Goldman Sachs Room 301/302 (Level 3)
Github Actions Security Landscape - Alex Ilgayev & Ronen Slavin, Cycode Brazos (Level 2)
Google SLSA & NIST SSDF: Emerging Software Supply Chain Security Best Practices - Tony Loehr, Cycode Room 203/204 (Level 2)
11:10am CDT
11:20am CDT
11:35am CDT
12:00pm CDT
Sponsored Session: Your Next Workstation Is In The Cloud - Ketan Gangatirkar, Coder Room 310/311 (Level 3)
The Value of Community Building. And why you Should Invest in Building One - Jacqueline Salinas, Freelancer Room 408/409 (Level 4)
Be Part of the Solution: Cultivating Inclusion in Open Source - Radha Jhatakia & Mike Bufano, Google Room 211/212 (Level 2)
Porting Linux to a Baseboard Management Controller Asic, Feedbacks and Perspectives - Jean-Marie Verdun & Luis Luciani, HPE Room 201/202 (Level 2)
Open Source Runs the World, Why Not Vulnerability Identifiers? - Josh Bressers, Anchore & Josh Buker, Cloud Security Alliance Brazos (Level 2)
The Unlimited Potential of Neural Search to Unlock the New Way of Data Comprehension - Bing HE, Jina AI Room 303/304 (Level 3)
A Walk through the OSPO Five-stage Model and Personas - Ana Jimenez Santamaria, TODO Group Room 301/302 (Level 3)
Meet the Community Behind the Open Programmable Infrastructure Project - Anh Thu Vo, Marvell Technology; Venkat Pullela, Keysight Technologies; Yan Fisher & Kris Murphy, Red Hat; Garth Fruge, NVIDIA Lone Star H (Level 3)
1:15pm CDT
2:05pm CDT
Scaling Your Community From a Few Hundred to Tens of Thousands - Anna Filippova, dbt Labs Room 408/409 (Level 4)
From Laptop to Cloud: Developing Cloud Native Applications with Containerized Databases - Nicolas Vermande, Ondat Lone Star G (Level 3)
Overcoming Imposter Syndrome to Become a Conference Speaker! - Dawn Foster, VMware Room 211/212 (Level 2)
BOF: SBOMs for Embedded Systems: What's Working, What's Not? - Kate Stewart, Linux Foundation Room 201/202 (Level 2)
Configuring and Building a Heterogenous System Using the Yocto Project - Mark Hatle, AMD Griffin Hall (Level 2)
V4L2 M2M as the Driver Framework for Video Processing IP - Karthik Poduval, Amazon Lab126 Room 203/204 (Level 2)
Securing Open Source Software - End-to-End, at Massive Scale, Together - Christopher R Robinson, Intel & Anne Bertucio, Google Brazos (Level 2)
Lessons Learned After 1 Year Running an OSPO in Bancolombia (LATAM) - Daniel Estiven Rico Posada, Bancolombia Room 301/302 (Level 3)
Tutorial: Introduction to Supply Chain Choreography with Cartographer - Cora Iberkleid & Corby Page, VMware Lone Star H (Level 3)
2:55pm CDT
You're Doing it Wrong: OSPO Disasters - Van Lindberg, OSPOCO Room 301/302 (Level 3)
Improving CI/CD Process for Cloud Native Python Applications with PyPI Cloud - Jaehyun Sim, Ikigai Labs Room 310/311 (Level 3)
Why We Need Codes of Conduct, and Why They're Not Enough - Aeva Black, Microsoft Room 408/409 (Level 4)
Velero - The Cloud Native Backup for Kubernetes - Orlin Vasilev, VMware & Scott Seago, Red Hat Lone Star G (Level 3)
Edge Computing with RISC-V Platforms Running XIP Linux - Vitaly Vul & Maria Vul, Konsulko AB Room 201/202 (Level 2)
Yocto Project Autobuilders and the SWAT Team - Alexandre Belloni, Bootlin Griffin Hall (Level 2)
Understanding OSS Risk Beyond Code Vulnerabilities - Shripad Nadgowda & Caroline Lee, IBM Room 205 (Level 2)
Vulntology - A Methodology to Characterize Vulnerabilities While Providing A Granular and Intuitive Structure - Christopher Turner, National institute of Standards and Technology Brazos (Level 2)
Memory Folios - Matthew Wilcox, Oracle Lone Star F (Level 3)
Labeling Tools are Great, but What About Quality Checks? - Marcus Edel & Jakub Piotr Cłapa, Collabora Ltd. Room 303/304 (Level 3)
4:05pm CDT
A Social Model of Open Source: Moving Beyond the License - Julia Ferraioli, Independent Room 408/409 (Level 4)
API Testing Without Writing Test Cases and Mocks - Neha Gupta & Shubham Jain, Keploy Inc Lone Star G (Level 3)
Fast and Easy Traffic Mirroring and SLO Validation with Iter8 - Alan Cha, IBM Lone Star H (Level 3)
Women's Participation in Open Source - Bianca Trinkenreich, Northern Arizona University Room 211/212 (Level 2)
Evolving ROS for Safety Critical Systems - Tully Foote, Open Robotics Room 203/204 (Level 2)
Lessons Learned: Migrating a Production Platform to Yocto - Mitch Gaines, Farmblox Griffin Hall (Level 2)
Managing Audits for Critical Open Source Projects - Amir Montazery, Open Source Technology Improvement Fund, Inc (OSTIF) Room 205 (Level 2)
Flagging *and* Fixing Bias in ML - Bhaktipriya Radharapu, Google Room 303/304 (Level 3)
Supply Chain Security, SBOMs and How OSPOs Can Play An Important Role Going Forward - An Ecosystem and Compliance Update - Jeffrey Borek, IBM Room 301/302 (Level 3)
Tutorial: Create Your First EBPF Program to Monitor Your System Using Bumblebee - Adam Sayah, solo.io Room 310/311 (Level 3)
4:55pm CDT
5:25pm CDT
5:45pm CDT
Lightning Talk: Intro to Lens and Lens Extensions - Avinash Reddy Desireddy, Mirantis inc Lone Star G (Level 3)
Metrics All the Way: Data Driven Operations - Hema Veeradhi, Red Hat Room 310/311 (Level 3)
BoF: Community Health and Vulnerability Mitigation - Sean P. Goggins, CHAOSS Project and University of Missouri-Columbia Room 408/409 (Level 4)
BoF: The Power of Cohorts in Advancing Open Source Contribution - Demi Ajayi & JoAnn Hill, IBM Lone Star H (Level 3)
BoF: The Yocto Project and OpenEmbedded Organization - Philip Balister, OpenSDR Griffin Hall (Level 2)
RISC-V BoF - Stephano Cetola, RISC-V International Room 201/202 (Level 2)
BoF: OpenCost: An Open Source Tool for Your K8s Cost Management Problem - Webb Brown & Ajay Tripathy, Stackwatch Room 211/212 (Level 2)
GSVS BoF: See Session Description for Details Brazos (Level 2)
BoF: An Open Future for Conversational AI -- Why is it Important, and How Do We Get There? - Jon Stine & Oita Coleman, Open Voice Network Room 303/304 (Level 3)
Panel Discussion: Community Response to Non-Practicing Entity Patent Risk in OSS - Keith Bergelt, Open Invention Network; Sarah Novotny, Microsoft; Kevin Jakel, Unified Patents Lone Star F (Level 3)
5:55pm CDT
6:05pm CDT
11:10am CDT
Let Your Cloud Native Storage Save You from Ransomware! - Yuval Lifshitz & Huamin Chen, Red Hat Room 310/311 (Level 3)
Bootstrapping A Community Through Mentorship - Nick Vidal, Profian Room 408/409 (Level 4)
Rethinking Compliance in a Containerised World - Massimiliano Gori, Canonical Lone Star H (Level 3)
BoF: Realtime Linux - Steven Rostedt, Google Griffin Hall (Level 2)
Delivering on the Promise of Decentralization: Why Open Source Development is Essential for Blockchain - Hart Montgomery, The Linux Foundation Lone Star G (Level 3)
Scalable Management of Vulnerabilities in Open Source - Oliver Chang, Google & Kate Catlin, GitHub Brazos (Level 2)
Hardware Protections Against ROP Attacks - Mike Rapoport, IBM Lone Star F (Level 3)
Community Data: What to Measure and Why? - Cali Dolfi, Red Hat Room 301/302 (Level 3)
IT Talent is Built Not Bought - Clyde Seepersad, The Linux Foundation Room 303/304 (Level 3)
12:00pm CDT
2:00pm CDT
Lightning Talk: Building a Community Funnel - John Coghlan, GitLab Room 408/409 (Level 4)
Practical Strategies for Centering DEI in Your Open Source Event - Elizabeth Barron, CHAOSS Room 310/311 (Level 3)
BOF: Corporate Use of Embedded Linux - Tim Bird, Sony Corporation Room 203/204 (Level 2)
Wi-Fi 6 (Formerly IEEE 802.11ax) Deep Dive - Marcel Ziswiler, Toradex AG Room 201/202 (Level 2)
How Open Source Software and Digital Public Goods Enabled Quick Pandemic Responses in Sri Lanka and Larger Digital Cooperation - Prajakta Kuwalekar & Nathan Baleeta, Digital Public Goods Alliance Lone Star G (Level 3)
Sponsored Session: Rising Threat: Securing Your Open-Source Pipeline - Hassam Mian, Anaconda Brazos (Level 2)
The Cry Wolf Vulnerability Paradox: The Problem of FALSE Alerts in Vulnerability Scanners - Emil Wåreus, Debricked Room 205 (Level 2)
Using CHAOSS Metrics, Models, and Software to Identify the Most Significant At-Risk Dependencies in Your Portfolio - Sean Goggins, CHAOSS Project and the University of Missouri - Columbia Room 301/302 (Level 3)
Building and Running a Diversity-focused Pre-internship Program for SRE - Andrew Ryan, Meta Room 303/304 (Level 3)
2:10pm CDT
2:30pm CDT
2:50pm CDT
Building Super-Contributors in Alluxio Open Source Community - Bin Fan & Jasmine Wang, Alluxio Room 408/409 (Level 4)
Asymmetric/Heterogeneous MultiProcessing (AMP/HMP): Mainline Linux and Zephyr in Unison - Marcel Ziswiler, Toradex AG Griffin Hall (Level 2)
Libgpiod V2: New Major Release with a Ton of New Features - Bartosz Golaszewski, Uxlite Solutions Sarl Room 203/204 (Level 2)
Ethical Artificial Intelligence to Advance Welcoming Communities and Identify Potential Communication That Degrades Community Welcomingness - Sean Patrick Goggins, CHAOSS Project and the University of Missouri Lone Star G (Level 3)
The Pace of Innovation in Delta Lake - Vini Jaiswal, Delta Lakes Lone Star H (Level 3)
Effective Usage Analysis: Boosting Developer Productivity Via Innovative, Noise-reduced Vulnerability Analysis - Aharon Abadi, Ph.D, Mend Brazos (Level 2)
From Teacher to OSPO Technologist - Brittany Erica Istenes, Fannie Mae Room 301/302 (Level 3)
Open Source Community and Security Management Made Easy - Jessica Gonzalez, The Linux Foundation Room 303/304 (Level 3)
4:00pm CDT