arrow_back View All Dates
06:45 CEST
08:00 CEST
09:00 CEST
09:50 CEST
10:10 CEST
10:30 CEST
11:00 CEST
Secure and Encrypted Boot in Zephyr RTOS - Parthiban N, Linumiz Hall M1 (Level 1)
Green Tech, Lean Budgets: A Journey to Saving Money (and the Planet) with Kubernetes - Timo Derstappen, Giant Swarm Room 2.15 (Level 2)
Contain Your Excitement: A Developer's Guide to Containerized Brilliance - Ekansh Gupta, Zeta & Anuj Bansal, Microsoft Hall M2 (Level 2)
Sponsored Session: Solving for the Cloud Native Security Paradox - Robert Sirchia, SUSE Room 1.31-1.32 (Level 1)
Testing Your Yocto Project - from Ptest and Testimage to LAVA - Clara Kowalsky & Florian Bezdeka, Siemens Room 0.14 (Level 0)
The Case for an SoC Power Management Driver - Stephen Boyd, Google Room 0.11-0.12 (Level 0)
How to Generate Test-Cases and Data Mocks for Microservices at Kernel Using eBPF - Neha Gupta & Animesh Pathak, Keploy Room 1.61 & Room 1.62 (Level 1)
Rusty Swapping: Rewriting a Zswap Backend in Rust - Vitaly Wool, Konsulko AB Room 0.49 - 0.50 (Level 0)
Generative Conversational AI Interoperability - Diego Gosmar, Open Voice Interoperability, LF AI&DATA Hall B (Level 2)
Panel Discussion: Bring Your Product Manager to the Open Source Party - Nithya Ruff, Amazon; Jeffrey Borek, IBM; and Mary (Meixia) Wang, Volvo Car Corporation Hall C (Level 2)
The Challenges of Public Code - Building an Open Source Culture at the BBC - Tom Sadler & David Buckhurst, BBC Room 0.94-0.95 (Level 0)
Panel Discussion: Improving the Software Supply Chain Security - Arnaud Le Hors, IBM; Isaac Hepworth, Google; Michael Lieberman, Kusari; and Marina Moore, Independent Room 0.96-0.97 (Level 0)
Unconference: Sign Up Onsite Room 1.33 (Level 1)
Unconference: Sign Up Onsite Room 1.34 (Level 1)
Tutorial: How to Win Friends & Influence LLMs (with Prompt Engineering) - Rafael Vasquez & James Busche, IBM Room 2.31 (Level 2)
11:20 CEST
11:55 CEST
Lightning Talk: The CFU: Custom Hardware with RISCV and Zephyr - Mohammed Billoo, MAB Labs Embedded Solutions Hall M1 (Level 1)
Dude, Where’s My Error?: How OpenTelemetry Records Errors, and Why It Does It Like That - Adriana Villela, ServiceNow Cloud Observability & Reese Lee, New Relic Room 2.15 (Level 2)
Understanding the OCI Spec: Peeling Through the Layers - Akhil Mohan, VMware by Broadcom Hall M2 (Level 2)
Building and Maintaining Binary Distributions with Yocto - Michael Opdenacker, Independent Room 0.11-0.12 (Level 0)
Eight Years of Farming; Is Everybo(Ar)Dy Happy? - Geert Uytterhoeven, Glider bv Room 0.14 (Level 0)
Linux Sandboxing with Landlock - Mickaël Salaün, Microsoft Room 0.49 - 0.50 (Level 0)
Optimized String Processing in RISC-V: How Toolchain Improvements Can Boost Performance - Christoph Müllner, VRULL GmbH Room 1.61 & Room 1.62 (Level 1)
Simplifying Generative AI App Development: Why Standards Matter - Katherine Druckman & Ezequiel Lanza, Intel Hall B (Level 2)
Bridging the Gap: Incorporating Open Source Into Product Managers' Toolbox - Philipp Ahmann, Robert Bosch GmbH Hall C (Level 2)
Dependency Risk Management: A Guide for OSPOs - Ashley Wolf, GitHub Room 0.94-0.95 (Level 0)
Policing Open-Source Projects at Scale - Thomas Neidhart, Eclipse Foundation Room 0.96-0.97 (Level 0)
Unconference: Sign Up Onsite Room 1.33 (Level 1)
Unconference: Sign Up Onsite Room 1.34 (Level 1)
12:05 CEST
12:15 CEST
12:25 CEST
12:35 CEST
13:00 CEST
14:00 CEST
Developing Wildlife Camera Traps with Zephyr RTOS - Alex Bucknall, Arribada Initiative Hall M1 (Level 1)
Evolving GitOps: Harnessing Kubernetes Resource Model for 5G Core - Ashan Senevirathne & Joel Studler, Swisscom Room 2.15 (Level 2)
Let Them Eat CAKES: A Sweet Dive Into a Modern Cloud Networking Stack. - Christian Posta, Solo.io Hall M2 (Level 2)
Are You Ready For Scarthgap? Best Practices For The Latest Yocto Project LTS Release - Tim Orling, Konsulko Group Room 0.11-0.12 (Level 0)
Inspecting and Optimizing Memory Usage in Linux - João Marcos Costa, Bootlin Room 0.14 (Level 0)
Surviving 19 Jan 2038 on 32 Bit Platforms: Lessons Learned and Common Problems - Alexander Kanavin, Linutronix Room 1.61 & Room 1.62 (Level 1)
Milvus: Scaling Vector Data Solutions with Gen AI - Stephen Batifol, Zilliz Hall B (Level 2)
What Can Open Source Project Health Metrics Reveal About Project Users? - Sophia Vargas, Google & Georg Link, Bitergia Hall C (Level 2)
From Vision to Action: PagoPA's Journey Towards Open Source Leadership - Leonardo Favario, PagoPA S.p.A. Room 0.94-0.95 (Level 0)
Planning for Retirement: How Can We Prepare for Software’s End-of-Life/End-of-Support Date? - Victoria Ontiveros, CISA & Justin Murphy, DHS/CISA Room 0.96-0.97 (Level 0)
Unconference: Sign Up Onsite Room 1.34 (Level 1)
Unconference: Sign Up Onsite Room 1.33 (Level 1)
Tutorial: Securing Access to and from Remote Systems with WireGuard and Linux - Alex Feiszli, Netmaker, Inc. Room 0.49 - 0.50 (Level 0)
Tutorial: Build AI-Supercharged RAG Apps with a Vector Database - JP Hwang, Weaviate Room 2.31 (Level 2)
14:20 CEST
14:55 CEST
Lightning Talk: Open Source Fleet Management in Zephyr - Maciej Sobkowski, Antmicro Hall M1 (Level 1)
Panel Discussion: Do One Thing, and Do It Well: Special Purpose OSes Apply the Unix App Philosophy to the Whole OS - Danielle Tal, Microsoft; Mauro Morales, Spectro Cloud; Felipe Huici, Unikraft GmbH; and Richard... Room 2.15 (Level 2)
Deep Dive Into Traefik 3.0 - Emile Vauge, Traefik Labs Hall M2 (Level 2)
Embedded Linux Security: Dr. Jekyll and Mr. Hyde - Richard Weinberger, sigma star gmbh Room 0.14 (Level 0)
Licensing Support by Build Systems - and What Remains To Be Done - Jan Altenberg, Open Source Automation Development Lab (OSADL) eG Room 0.11-0.12 (Level 0)
Messing up Your NUMA Topology with CXL - Hannes Reinecke, SUSE Linux Room 1.61 & Room 1.62 (Level 1)
Towards Industrial AI Governance Inspired by OSPO: A Primer - Zoran Jovanovic, Volvo Car Corporation Hall B (Level 2)
Panel Discussion: Measuring the Health of Open Source Projects in Public Health - Cynthia Lo, GitHub and World Health Organization; Samuel Mbuthia, World Health Organization; Liliana Torres Sanchez, GitHub; Ian... Hall C (Level 2)
Panel Discussion: The Automotive OSPO - Masato Endo, Toyota Motor Corporation; Ana Jiménez Santamaría, Linux Foundation, TODO Group; Mary (Meixia) Wang, Volvo Car Corporation; and Wolfgang Gehring, Mercedes-Benz... Room 0.94-0.95 (Level 0)
VSCorode: Inside Your IDE, Inside Your Git Repository - Kevin Ward & Fabian Kammel, ControlPlane Room 0.96-0.97 (Level 0)
Unconference: Sign Up Onsite Room 1.34 (Level 1)
Unconference: Sign Up Onsite Room 1.33 (Level 1)
15:05 CEST
15:15 CEST
15:25 CEST
15:35 CEST
16:00 CEST
Cloud Native Threat Intelligence for Everyone - James Callaghan, ControlPlane & Constanze Roedig, Technische Universität Wien Room 2.15 (Level 2)
DevSecOps Transformation at Speed and Scale Using Tekton - Caroline Cameron & Tony Higham, IBM Hall M2 (Level 2)
A New Era of Interrupt Handling: Multiple Interrupt Controllers in a Multi-chiplet Design - Priyadarsini G, Samsung Semiconductor India Research Room 0.14 (Level 0)
Advanced System Profiling, Tracing and Trace Analysis with Perfetto in Android and Yocto - Anna-Lena Marx & Stefan Lengfeld, inovex GmbH Room 0.11-0.12 (Level 0)
Panel Discussion: Outreachy Linux Kernel Internship Report - Julia Lawall, Inria; Hans Verkuil, Cisco Systems Norway; Tahera Fahimi, University of Calgary; Khadija Kamran; and Dorcas Litunya, Jomo Kenyatta Univ... Room 1.61 & Room 1.62 (Level 1)
The Cyber Resilience Act: Navigating Its Impact on Yocto-Based Products - Julien Bernet, Witekio Room 0.49 - 0.50 (Level 0)
Design Thinking: Generative AI Style - Martin Hickey & Donal Madden, IBM Hall B (Level 2)
Navigating the Open Source Observability Landscape - Dotan Horovits, Logz.io, CNCF Ambassador Room 2.31 (Level 2)
You Never Know When You Need a Fork - Madelyn Olson, AWS & Viktor Söderqvist, Ericsson Hall C (Level 2)
From Data Tsunami to Actionable Insights - Dawn Foster, CHAOSS & Cali Dolfi, Red Hat Room 0.94-0.95 (Level 0)
"Here Is a Clean Section of the Beach" - Proactively Auditing Open Source Dependencies and Letting E - Munawar Hafiz, OpenRefactory & Michael Winser, Alpha-Omega Room 0.96-0.97 (Level 0)
Preparing Zephyr for Safety Element out of Context Certification - Nicole Pappler, AlektoMetis.com Hall M1 (Level 1)
16:55 CEST
MicroCeph: Simplifying Storage from Laptop to Data Center - Peter Sabaini, Canonical Room 2.15 (Level 2)
SCA for Containers: The Good, the Bad, and the Truth - Arun Azhakesan, Siemens Healthineers & Philippe Ombredanne, AboutCode Hall M2 (Level 2)
Taming DMA: Tales Wrestling Memory Corruption - Ahmad Fatoum, Pengutronix Room 0.14 (Level 0)
Using Yocto to Debug Embedded Device Crashes - Etienne Cordonnier, Snap Inc Room 0.11-0.12 (Level 0)
Testing, a Journey from Testing Kernels to Testing Debian and Yocto - Sudip Mukherjee, Codethink Ltd Room 0.49 - 0.50 (Level 0)
Reducing Bias in AI with Open Source - Abubakar Siddiq Ango, GitLab Hall B (Level 2)
Who Broke the Build? — Using Kuttl to Improve E2E Testing and Release Faster - Ram Mohan Rao Chukka, JFrog Room 2.31 (Level 2)
Panel Discussion: The Next Phase in OSS (Ideate, Design and Build) - Samson Goddy, Open Source Community Africa; Oluebube Princess Egbuna, Drogo AI; and Edidiong Asikpo, Zuplo Hall C (Level 2)
Principles of Authentic Participation for Corporate Contributors - Cornelius Schumacher, DB Systel GmbH Room 0.94-0.95 (Level 0)
Level Up Your Embedded Testing Game: FRETish, Robot, and Twister: A Dream Team - Christian Schlotter, Carl Zeiss Meditec AG & Tobias Kästner, TiaC Systems Hall M1 (Level 1)
17:45 CEST
18:00 CEST