Loading…
Attending this event?
September 16-18, 2024
Vienna, Austria
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Open Source Summit Europe 2024 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Central European Summer Time (UTC/GMT +2). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."

IMPORTANT NOTE: Timing of sessions and room locations are subject to change.

arrow_back View All Dates
Tuesday, September 17
 

06:45 CEST

08:00 CEST

09:00 CEST

09:50 CEST

10:10 CEST

10:30 CEST

11:00 CEST

Secure and Encrypted Boot in Zephyr RTOS - Parthiban N, Linumiz Hall M1 (Level 1) Green Tech, Lean Budgets: A Journey to Saving Money (and the Planet) with Kubernetes - Timo Derstappen, Giant Swarm Room 2.15 (Level 2) Contain Your Excitement: A Developer's Guide to Containerized Brilliance - Ekansh Gupta, Zeta & Anuj Bansal, Microsoft Hall M2 (Level 2) Sponsored Session: Solving for the Cloud Native Security Paradox - Robert Sirchia, SUSE Room 1.31-1.32 (Level 1) Testing Your Yocto Project - from Ptest and Testimage to LAVA - Clara Kowalsky & Florian Bezdeka, Siemens Room 0.14 (Level 0) The Case for an SoC Power Management Driver - Stephen Boyd, Google Room 0.11-0.12 (Level 0) How to Generate Test-Cases and Data Mocks for Microservices at Kernel Using eBPF - Neha Gupta & Animesh Pathak, Keploy Room 1.61 & Room 1.62 (Level 1) Rusty Swapping: Rewriting a Zswap Backend in Rust - Vitaly Wool, Konsulko AB Room 0.49 - 0.50 (Level 0) Generative Conversational AI Interoperability - Diego Gosmar, Open Voice Interoperability, LF AI&DATA Hall B (Level 2) Panel Discussion: Bring Your Product Manager to the Open Source Party - Nithya Ruff, Amazon; Jeffrey Borek, IBM; and Mary (Meixia) Wang, Volvo Car Corporation Hall C (Level 2) The Challenges of Public Code - Building an Open Source Culture at the BBC - Tom Sadler & David Buckhurst, BBC Room 0.94-0.95 (Level 0) Panel Discussion: Improving the Software Supply Chain Security - Arnaud Le Hors, IBM; Isaac Hepworth, Google; Michael Lieberman, Kusari; and Marina Moore, Independent Room 0.96-0.97 (Level 0) Unconference: Sign Up Onsite Room 1.33 (Level 1) Unconference: Sign Up Onsite Room 1.34 (Level 1) Tutorial: How to Win Friends & Influence LLMs (with Prompt Engineering) - Rafael Vasquez & James Busche, IBM Room 2.31 (Level 2)

11:20 CEST

11:55 CEST

12:05 CEST

12:15 CEST

12:25 CEST

12:35 CEST

13:00 CEST

14:00 CEST

Developing Wildlife Camera Traps with Zephyr RTOS - Alex Bucknall, Arribada Initiative Hall M1 (Level 1) Evolving GitOps: Harnessing Kubernetes Resource Model for 5G Core - Ashan Senevirathne & Joel Studler, Swisscom Room 2.15 (Level 2) Let Them Eat CAKES: A Sweet Dive Into a Modern Cloud Networking Stack. - Christian Posta, Solo.io Hall M2 (Level 2) Are You Ready For Scarthgap? Best Practices For The Latest Yocto Project LTS Release - Tim Orling, Konsulko Group Room 0.11-0.12 (Level 0) Inspecting and Optimizing Memory Usage in Linux - João Marcos Costa, Bootlin Room 0.14 (Level 0) Surviving 19 Jan 2038 on 32 Bit Platforms: Lessons Learned and Common Problems - Alexander Kanavin, Linutronix Room 1.61 & Room 1.62 (Level 1) Milvus: Scaling Vector Data Solutions with Gen AI - Stephen Batifol, Zilliz Hall B (Level 2) What Can Open Source Project Health Metrics Reveal About Project Users? - Sophia Vargas, Google & Georg Link, Bitergia Hall C (Level 2) From Vision to Action: PagoPA's Journey Towards Open Source Leadership - Leonardo Favario, PagoPA S.p.A. Room 0.94-0.95 (Level 0) Planning for Retirement: How Can We Prepare for Software’s End-of-Life/End-of-Support Date? - Victoria Ontiveros, CISA & Justin Murphy, DHS/CISA Room 0.96-0.97 (Level 0) Unconference: Sign Up Onsite Room 1.34 (Level 1) Unconference: Sign Up Onsite Room 1.33 (Level 1) Tutorial: Securing Access to and from Remote Systems with WireGuard and Linux - Alex Feiszli, Netmaker, Inc. Room 0.49 - 0.50 (Level 0) Tutorial: Build AI-Supercharged RAG Apps with a Vector Database - JP Hwang, Weaviate Room 2.31 (Level 2)

14:20 CEST

14:55 CEST

Lightning Talk: Open Source Fleet Management in Zephyr - Maciej Sobkowski, Antmicro Hall M1 (Level 1) Panel Discussion: Do One Thing, and Do It Well: Special Purpose OSes Apply the Unix App Philosophy to the Whole OS - Danielle Tal, Microsoft; Mauro Morales, Spectro Cloud; Felipe Huici, Unikraft GmbH; and Richard... Room 2.15 (Level 2) Deep Dive Into Traefik 3.0 - Emile Vauge, Traefik Labs Hall M2 (Level 2) Embedded Linux Security: Dr. Jekyll and Mr. Hyde - Richard Weinberger, sigma star gmbh Room 0.14 (Level 0) Licensing Support by Build Systems - and What Remains To Be Done - Jan Altenberg, Open Source Automation Development Lab (OSADL) eG Room 0.11-0.12 (Level 0) Messing up Your NUMA Topology with CXL - Hannes Reinecke, SUSE Linux Room 1.61 & Room 1.62 (Level 1) Towards Industrial AI Governance Inspired by OSPO: A Primer - Zoran Jovanovic, Volvo Car Corporation Hall B (Level 2) Panel Discussion: Measuring the Health of Open Source Projects in Public Health - Cynthia Lo, GitHub and World Health Organization; Samuel Mbuthia, World Health Organization; Liliana Torres Sanchez, GitHub; Ian... Hall C (Level 2) Panel Discussion: The Automotive OSPO - Masato Endo, Toyota Motor Corporation; Ana Jiménez Santamaría, Linux Foundation, TODO Group; Mary (Meixia) Wang, Volvo Car Corporation; and Wolfgang Gehring, Mercedes-Benz... Room 0.94-0.95 (Level 0) VSCorode: Inside Your IDE, Inside Your Git Repository - Kevin Ward & Fabian Kammel, ControlPlane Room 0.96-0.97 (Level 0) Unconference: Sign Up Onsite Room 1.34 (Level 1) Unconference: Sign Up Onsite Room 1.33 (Level 1)

15:05 CEST

15:15 CEST

15:25 CEST

15:35 CEST

16:00 CEST

Cloud Native Threat Intelligence for Everyone - James Callaghan, ControlPlane & Constanze Roedig, Technische Universität Wien Room 2.15 (Level 2) DevSecOps Transformation at Speed and Scale Using Tekton - Caroline Cameron & Tony Higham, IBM Hall M2 (Level 2) A New Era of Interrupt Handling: Multiple Interrupt Controllers in a Multi-chiplet Design - Priyadarsini G, Samsung Semiconductor India Research Room 0.14 (Level 0) Advanced System Profiling, Tracing and Trace Analysis with Perfetto in Android and Yocto - Anna-Lena Marx & Stefan Lengfeld, inovex GmbH Room 0.11-0.12 (Level 0) Panel Discussion: Outreachy Linux Kernel Internship Report - Julia Lawall, Inria; Hans Verkuil, Cisco Systems Norway; Tahera Fahimi, University of Calgary; Khadija Kamran; and Dorcas Litunya, Jomo Kenyatta Univ... Room 1.61 & Room 1.62 (Level 1) The Cyber Resilience Act: Navigating Its Impact on Yocto-Based Products - Julien Bernet, Witekio Room 0.49 - 0.50 (Level 0) Design Thinking: Generative AI Style - Martin Hickey & Donal Madden, IBM Hall B (Level 2) Navigating the Open Source Observability Landscape - Dotan Horovits, Logz.io, CNCF Ambassador Room 2.31 (Level 2) You Never Know When You Need a Fork - Madelyn Olson, AWS & Viktor Söderqvist, Ericsson Hall C (Level 2) From Data Tsunami to Actionable Insights - Dawn Foster, CHAOSS & Cali Dolfi, Red Hat Room 0.94-0.95 (Level 0) "Here Is a Clean Section of the Beach" - Proactively Auditing Open Source Dependencies and Letting E - Munawar Hafiz, OpenRefactory & Michael Winser, Alpha-Omega Room 0.96-0.97 (Level 0) Preparing Zephyr for Safety Element out of Context Certification - Nicole Pappler, AlektoMetis.com Hall M1 (Level 1)

16:55 CEST

17:45 CEST

18:00 CEST

 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Audience Level
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -