Hi user
Admin Login:
status grid processes pipeline recording_sheets.pdf today's t+1 Reschedule schedule talk_intro.pdf title slides anomalies
client admin show admin episodes admin image_file admin play_list

Episode Count: 100
id loc name startend duration state episode.name episode.authors e/r cmt rel img rf host index
15122 Room 6 Tue 14 10:45 11:35 0:50:0 1 Facebook, Dynamite, Uber, Bombs, and You Lana Brindley y Y
15141 Room 7 Tue 14 11:05 11:50 0:45:0 1 Evolution of Linux Containers to Container Native Storage... sameer kandarkar y Y
15142 Room 6 Tue 14 11:35 12:25 0:50:0 1 The Internet: Protecting Our Democratic Lifeline Brett Sheffield y Y
15158 Room 7 Tue 14 12:00 12:25 0:25:0 1 Dynamic Workloads need Dynamic Storage - using rook-ceph with k8s Steven Ellis y Y
15159 Room 6 Tue 14 13:30 14:05 0:35:0 1 Privacy and Transparency in VPN industry Ruben Rubio Rey y Y
15160 Room 7 Tue 14 13:30 14:20 0:50:0 1 OCIv2: Container Images Considered Harmful Aleksa Sarai y Y
15179 Room 6 Tue 14 14:05 14:40 0:35:0 1 Authentication Afterlife: the dark side of making lost password recovery harder Ewen McNeill y Y
15180 Room 7 Tue 14 14:20 15:10 0:50:0 1 Kubernetes Developer Workflows in Visual Studio Code Ivan Towlson y Y
15195 Room 6 Tue 14 14:40 15:10 0:30:0 1 You Shall Not Pass Peter Burnett y Y
15196 Room 6 Tue 14 15:45 16:35 0:50:0 1 An intro to improving the security of your code with free analysis tools Jason C Cohen y Y
15197 Room 7 Tue 14 15:45 16:20 0:35:0 1 The future of the desktop is on hypervisor powered containers Alex Sharp, Anuj Dhavalikar y Y
15210 Room 6 Tue 14 16:35 17:25 0:50:0 1 The Psychology of Multi-Factor Authentication William Brown y Y
15221 Room 7 Tue 14 16:55 17:20 0:25:0 1 Every Image Has A Purpose Allan Shone y Y
15128 Room 9 Wed 15 10:45 12:25 0:100:0 1 An introduction to Penetration Testing using Kali Linux Marcus Herstik y Y
15126 Room 7 Wed 15 10:45 11:30 0:45:0 1 Automated acceptance tests for terminal applications Roman Joost y Y
15125 Room 6 Wed 15 10:45 11:30 0:45:0 1 We know when you are sleeping: The Rise of Energy Smart Meters Rachel Bunder y Y
15124 Room 5 Wed 15 10:45 11:30 0:45:0 1 From bits to legs to locomotion: Building a hexapod from the ground up Daniel McCarthy y Y
15123 Arena Wed 15 10:45 11:30 0:45:0 1 Snek: A Python-Inspired Language for Tiny Embedded Computers Keith Packard y Y
15127 Room 8 Wed 15 10:45 11:30 0:45:0 1 Building a zero downtime Kubernetes cluster Feilong Wang y Y
15147 Room 8 Wed 15 11:40 12:25 0:45:0 1 Piku: git push deployments to your own servers Chris McCormick y Y
15143 Arena Wed 15 11:40 12:25 0:45:0 1 I Was Wrong Karen Sandler y Y
15144 Room 5 Wed 15 11:40 12:25 0:45:0 1 Everything Awesome about GPU Drivers Daniel Vetter y Y
15145 Room 6 Wed 15 11:40 12:25 0:45:0 1 Verified seL4 on secure RISC-V processors Gernot Heiser y Y
15146 Room 7 Wed 15 11:40 12:25 0:45:0 1 Like, Share and Subscribe: Effective Communication of Security Advice Serena Chen y Y
15164 Room 7 Wed 15 13:30 14:15 0:45:0 1 Good, better, breast: Building a sensing mastectomy prosthetic with open hardware Kathy Reid y Y
15163 Room 6 Wed 15 13:30 14:15 0:45:0 1 What Makes Decentralisation Hard? And How Do We Overcome This? Martin Krafft y Y
15161 Arena Wed 15 13:30 14:15 0:45:0 1 The Linux network stack extension for DDoS mitigation and web security Alexander Krizhanovsky y Y
15166 Room 9 Wed 15 13:30 15:10 0:100:0 1 Velociraptor - Dig Deeper Mike Cohen y Y
15162 Room 5 Wed 15 13:30 14:15 0:45:0 1 What UNIX Cost Us Benno Rice y Y
15165 Room 8 Wed 15 13:30 14:15 0:45:0 1 Panfrost: Open Source meets Arm Mali GPUs Robert Foss y Y
15181 Arena Wed 15 14:25 15:10 0:45:0 1 Planning for and handling failures from open hardware, aviation, to production at Google Marc MERLIN y Y
15182 Room 5 Wed 15 14:25 15:10 0:45:0 1 Securing Container Runtimes -- How Hard Can It Be? Aleksa Sarai y Y
15183 Room 6 Wed 15 14:25 15:10 0:45:0 1 Privacy is not Binary: A discussion of data systems, ethics, and human rights Elizabeth Alpert, Amelia Radke y Y
15184 Room 7 Wed 15 14:25 15:10 0:45:0 1 How internet congestion control actually works in the bufferbloat age Dave Taht y Y
15185 Room 8 Wed 15 14:25 15:10 0:45:0 1 Clevis and Tang: securing your secrets at rest Fraser Tweedale y Y
15203 Room 9 Wed 15 15:45 17:25 0:100:0 1 Kicad for software developers David Tulloh y Y
15198 Arena Wed 15 15:45 16:30 0:45:0 1 Control Flow Integrity in the Linux Kernel Kees Cook y Y
15199 Room 5 Wed 15 15:45 16:30 0:45:0 1 Open collaborations: leadership succession and leadership success Ann Smith, Myk Dowling y Y
15200 Room 6 Wed 15 15:45 16:30 0:45:0 1 Desktop Linux, without a keyboard, mouse or desk Shervin Emami y Y
15201 Room 7 Wed 15 15:45 16:30 0:45:0 1 Electronics from your Kitchen Drawer Peter Chubb y Y
15202 Room 8 Wed 15 15:45 16:30 0:45:0 1 It's All About Timing Dave Chinner y Y
15211 Arena Wed 15 16:40 17:25 0:45:0 1 Open Source Citizenship Josh Simmons y Y
15212 Room 5 Wed 15 16:40 17:25 0:45:0 1 Open AND High Performance Computing Hugh Blemings y Y
15215 Room 8 Wed 15 16:40 17:25 0:45:0 1 No Docs? No Problem! From Zero to Full Documentation in Less Time than You Think Nathan Willis y Y
15214 Room 7 Wed 15 16:40 17:25 0:45:0 1 The Story of PulseAudio and Compress Offload Arun Raghavan y Y
15213 Room 6 Wed 15 16:40 17:25 0:45:0 1 Linux in the Cloud, on Prem, or... on a Mainframe? Elizabeth K. Joseph y Y
15131 Room 6 Thu 16 10:45 11:30 0:45:0 1 Decoding battery management data - back in the old school Paul Wayper y Y
15132 Room 7 Thu 16 10:45 11:30 0:45:0 1 Engineer tested, manager approved: Migrating Windows/.NET services to Linux Katie Bell y Y
15129 Arena Thu 16 10:45 11:30 0:45:0 1 When Jargon Becomes Gibberish Casey Schaufler y Y
15130 Room 5 Thu 16 10:45 11:30 0:45:0 1 Compiling Your Story: Using Techniques from Compiler Design to Check Your Narrative Jon Manning y Y
15134 Room 9 Thu 16 10:45 12:25 0:100:0 1 A B C of 3D : Introduction to making 3D art using blender sreenivas alapati y Y
15133 Room 8 Thu 16 10:45 11:30 0:45:0 1 Musings of an Accidental Chair - change from the inside out Lyndsey Jackson y Y
15150 Room 6 Thu 16 11:40 12:25 0:45:0 1 Collecting information with care Opal Symes y Y
15151 Room 7 Thu 16 11:40 12:25 0:45:0 1 In-depth technical story: Fixing I/O performance for Windows guests in OpenStack Ceph clouds Trent Lloyd y Y
15152 Room 8 Thu 16 11:40 12:25 0:45:0 1 VM block error injection, a novel approach for testing Linux storage Tony Asleson y Y
15148 Arena Thu 16 11:40 12:25 0:45:0 1 Behind (and under) the scenes of the Meson build system Jussi Pakkanen y Y
15149 Room 5 Thu 16 11:40 12:25 0:45:0 1 NTFS really isn't that bad Robert Collins y Y
15168 Room 5 Thu 16 13:30 14:15 0:45:0 1 Building an ethical data infrastructure Marissa Takahashi y Y
15172 Room 9 Thu 16 13:30 15:10 0:100:0 1 Introduction to Rust (for people who have never used a compiler) Tim McNamara y Y
15167 Arena Thu 16 13:30 14:15 0:45:0 1 ROS on your robot: the tale of an inside, an outside robot and 2 arms Ben Martin y Y
15169 Room 6 Thu 16 13:30 14:15 0:45:0 1 Privacy Preserving IoT Christopher J Biggs y Y
15170 Room 7 Thu 16 13:30 14:15 0:45:0 1 Portable, Attested, Secure Execution with Enarx Nathaniel McCallum y Y
15171 Room 8 Thu 16 13:30 14:15 0:45:0 1 How to capture 100G Ethernet traffic at wire speed to local disk Christoph Lameter y Y
15187 Room 5 Thu 16 14:25 15:10 0:45:0 1 KUnit - Unit Testing for the Linux Kernel Brendan Higgins y Y
15189 Room 7 Thu 16 14:25 15:10 0:45:0 1 The Ops in the Serverless Jennifer Davis y Y
15188 Room 6 Thu 16 14:25 15:10 0:45:0 1 The Secret Life of Routers Sachi King y Y
15186 Arena Thu 16 14:25 15:10 0:45:0 1 The EU Says The Laws of Mathematics Apply in Australia Dan Shearer y Y
15204 Arena Thu 16 15:45 16:30 0:45:0 1 Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS activists Bradley M. Kuhn, Karen Sandler y Y
15205 Room 6 Thu 16 15:45 16:30 0:45:0 1 Room scale VR tracking with OpenHMD Jan Schmidt y Y
15206 Room 8 Thu 16 15:45 16:30 0:45:0 1 How to Write a Retro Arcade Emulator Josh Bassett y Y
15207 Room 9 Thu 16 15:45 17:25 0:100:0 1 Macro Security for your Microservices Sreejith Anujan y Y
15208 Room 5 Thu 16 15:45 16:30 0:45:0 1 Using WhatsApp as a Command Line ( Breaking out of the walled Garden) Tishampati Dhar y Y
15209 Room 7 Thu 16 15:45 16:30 0:45:0 1 Playable Ads: What REALLY are they? Evan Kohilas y Y
15220 Room 8 Thu 16 16:40 17:25 0:45:0 1 Practical Ethics: building it better in 2020 and beyond Nicola Nye y Y
15219 Room 7 Thu 16 16:40 17:25 0:45:0 1 eChronos Lyrae: A 64-bit multi-core RTOS kernel for ARM and RISC-V Ben Leslie y Y
15217 Room 5 Thu 16 16:40 17:25 0:45:0 1 What Lies Beneath: What are they really tracking and how? Anne Jessel y Y
15216 Arena Thu 16 16:40 17:25 0:45:0 1 Large Pages in Linux Matthew Wilcox y Y
15218 Room 6 Thu 16 16:40 17:25 0:45:0 1 Advanced Stream Processing on the Edge Eduardo Silva y Y
15139 Room 6 Fri 17 10:45 11:30 0:45:0 1 Everything you know is wrong: why using big words can made you sound stupid Lana Brindley y Y
15137 Room 7 Fri 17 10:45 11:30 0:45:0 1 The Fight to Keep the Watchers at Bay Mark Nottingham y Y
15138 Room 9 Fri 17 10:45 12:25 0:100:0 1 Behind the scenes of an ELK system Rafael Martinez Guerrero y Y
15135 Arena Fri 17 10:45 11:30 0:45:0 1 TPM based attestation - how can we use it for good? Matthew Garrett y Y
15136 Room 5 Fri 17 10:45 11:30 0:45:0 1 Zero Trust SSH Jeremy Stott y Y
15140 Room 8 Fri 17 10:45 11:30 0:45:0 1 The magical fantasy land of Linux kernel testing Russell Currey y Y
15155 Room 6 Fri 17 11:40 12:25 0:45:0 1 Privacy, Security, Convenience; when it comes to home automation, can we pick all three? Ben Dechrai y Y
15156 Room 7 Fri 17 11:40 12:25 0:45:0 1 Securing firmware: Secure and Trusted boot in OpenBMC Joel Stanley y Y
15157 Room 8 Fri 17 11:40 12:25 0:45:0 1 Building a Compiler for Quantum Computers Matthew Treinish y Y
15153 Arena Fri 17 11:40 12:25 0:45:0 1 Affordable Custom Input Devices Jonathan Oxer, Chris Fryer y Y
15154 Room 5 Fri 17 11:40 12:25 0:45:0 1 RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection Esther Payne y Y
15178 Room 7 Fri 17 13:30 14:15 0:45:0 1 smbcmp: A new tool to diff network captures Aurélien Aptel y Y
15176 Room 9 Fri 17 13:30 15:10 0:100:0 1 Professional quality layout design with Scribus Kathy Reid y Y
15175 Room 8 Fri 17 13:30 14:15 0:45:0 1 Transpile anything to everything! Anna Herlihy y Y
15174 Room 6 Fri 17 13:30 14:15 0:45:0 1 The life of open source spatial with QGIS - From hobby to grown up, with bonus growing pains Nathan Woodrow y Y
15173 Room 5 Fri 17 13:30 14:15 0:45:0 1 "Write a single library to handle all input devices, it'll be easy" they said... Peter Hutterer y Y
15177 Arena Fri 17 13:30 14:15 0:45:0 1 Betrusted: Better Security Through Physical Partitioning bunnie, Sean "xobs" Cross, Tom Marble y Y
15193 Room 7 Fri 17 14:25 15:10 0:45:0 1 Senseless - environmental sensing without additional hardware Kim Burgess y Y
15190 Arena Fri 17 14:25 15:10 0:45:0 1 Tensorflow on open source GPUs David Airlie y Y
15191 Room 5 Fri 17 14:25 15:10 0:45:0 1 Privacy and Decentralisation with Multicast Brett Sheffield y Y
15192 Room 6 Fri 17 14:25 15:10 0:45:0 1 New Phone, Who Dis?: Human Authentication in the Digital Age Yaakov y Y
15194 Room 8 Fri 17 14:25 15:10 0:45:0 1 How to make kernel and user space CI for input devices? Benjamin Tissoires y Y

Veyepar Video Eyeball Processor and Review