id |
loc name |
start | end |
duration |
state |
episode.name |
episode.authors |
e/r |
cmt |
rel |
img |
rf |
host |
index |
15122 |
Room 6 |
Tue 14 10:45 |
11:35 |
0:50:0 |
1 |
Facebook, Dynamite, Uber, Bombs, and You |
Lana Brindley |
y |
|
Y |
|
|
|
|
15141 |
Room 7 |
Tue 14 11:05 |
11:50 |
0:45:0 |
1 |
Evolution of Linux Containers to Container Native Storage... |
sameer kandarkar |
y |
|
Y |
|
|
|
|
15142 |
Room 6 |
Tue 14 11:35 |
12:25 |
0:50:0 |
1 |
The Internet: Protecting Our Democratic Lifeline |
Brett Sheffield |
y |
|
Y |
|
|
|
|
15158 |
Room 7 |
Tue 14 12:00 |
12:25 |
0:25:0 |
1 |
Dynamic Workloads need Dynamic Storage - using rook-ceph with k8s |
Steven Ellis |
y |
|
Y |
|
|
|
|
15159 |
Room 6 |
Tue 14 13:30 |
14:05 |
0:35:0 |
1 |
Privacy and Transparency in VPN industry |
Ruben Rubio Rey |
y |
|
Y |
|
|
|
|
15160 |
Room 7 |
Tue 14 13:30 |
14:20 |
0:50:0 |
1 |
OCIv2: Container Images Considered Harmful |
Aleksa Sarai |
y |
|
Y |
|
|
|
|
15179 |
Room 6 |
Tue 14 14:05 |
14:40 |
0:35:0 |
1 |
Authentication Afterlife: the dark side of making lost password recovery harder |
Ewen McNeill |
y |
|
Y |
|
|
|
|
15180 |
Room 7 |
Tue 14 14:20 |
15:10 |
0:50:0 |
1 |
Kubernetes Developer Workflows in Visual Studio Code |
Ivan Towlson |
y |
|
Y |
|
|
|
|
15195 |
Room 6 |
Tue 14 14:40 |
15:10 |
0:30:0 |
1 |
You Shall Not Pass |
Peter Burnett |
y |
|
Y |
|
|
|
|
15196 |
Room 6 |
Tue 14 15:45 |
16:35 |
0:50:0 |
1 |
An intro to improving the security of your code with free analysis tools |
Jason C Cohen |
y |
|
Y |
|
|
|
|
15197 |
Room 7 |
Tue 14 15:45 |
16:20 |
0:35:0 |
1 |
The future of the desktop is on hypervisor powered containers |
Alex Sharp, Anuj Dhavalikar |
y |
|
Y |
|
|
|
|
15210 |
Room 6 |
Tue 14 16:35 |
17:25 |
0:50:0 |
1 |
The Psychology of Multi-Factor Authentication |
William Brown |
y |
|
Y |
|
|
|
|
15221 |
Room 7 |
Tue 14 16:55 |
17:20 |
0:25:0 |
1 |
Every Image Has A Purpose |
Allan Shone |
y |
|
Y |
|
|
|
|
15128 |
Room 9 |
Wed 15 10:45 |
12:25 |
0:100:0 |
1 |
An introduction to Penetration Testing using Kali Linux |
Marcus Herstik |
y |
|
Y |
|
|
|
|
15126 |
Room 7 |
Wed 15 10:45 |
11:30 |
0:45:0 |
1 |
Automated acceptance tests for terminal applications |
Roman Joost |
y |
|
Y |
|
|
|
|
15125 |
Room 6 |
Wed 15 10:45 |
11:30 |
0:45:0 |
1 |
We know when you are sleeping: The Rise of Energy Smart Meters |
Rachel Bunder |
y |
|
Y |
|
|
|
|
15124 |
Room 5 |
Wed 15 10:45 |
11:30 |
0:45:0 |
1 |
From bits to legs to locomotion: Building a hexapod from the ground up |
Daniel McCarthy |
y |
|
Y |
|
|
|
|
15123 |
Arena |
Wed 15 10:45 |
11:30 |
0:45:0 |
1 |
Snek: A Python-Inspired Language for Tiny Embedded Computers |
Keith Packard |
y |
|
Y |
|
|
|
|
15127 |
Room 8 |
Wed 15 10:45 |
11:30 |
0:45:0 |
1 |
Building a zero downtime Kubernetes cluster |
Feilong Wang |
y |
|
Y |
|
|
|
|
15147 |
Room 8 |
Wed 15 11:40 |
12:25 |
0:45:0 |
1 |
Piku: git push deployments to your own servers |
Chris McCormick |
y |
|
Y |
|
|
|
|
15143 |
Arena |
Wed 15 11:40 |
12:25 |
0:45:0 |
1 |
I Was Wrong |
Karen Sandler |
y |
|
Y |
|
|
|
|
15144 |
Room 5 |
Wed 15 11:40 |
12:25 |
0:45:0 |
1 |
Everything Awesome about GPU Drivers |
Daniel Vetter |
y |
|
Y |
|
|
|
|
15145 |
Room 6 |
Wed 15 11:40 |
12:25 |
0:45:0 |
1 |
Verified seL4 on secure RISC-V processors |
Gernot Heiser |
y |
|
Y |
|
|
|
|
15146 |
Room 7 |
Wed 15 11:40 |
12:25 |
0:45:0 |
1 |
Like, Share and Subscribe: Effective Communication of Security Advice |
Serena Chen |
y |
|
Y |
|
|
|
|
15164 |
Room 7 |
Wed 15 13:30 |
14:15 |
0:45:0 |
1 |
Good, better, breast: Building a sensing mastectomy prosthetic with open hardware |
Kathy Reid |
y |
|
Y |
|
|
|
|
15163 |
Room 6 |
Wed 15 13:30 |
14:15 |
0:45:0 |
1 |
What Makes Decentralisation Hard? And How Do We Overcome This? |
Martin Krafft |
y |
|
Y |
|
|
|
|
15161 |
Arena |
Wed 15 13:30 |
14:15 |
0:45:0 |
1 |
The Linux network stack extension for DDoS mitigation and web security |
Alexander Krizhanovsky |
y |
|
Y |
|
|
|
|
15166 |
Room 9 |
Wed 15 13:30 |
15:10 |
0:100:0 |
1 |
Velociraptor - Dig Deeper |
Mike Cohen |
y |
|
Y |
|
|
|
|
15162 |
Room 5 |
Wed 15 13:30 |
14:15 |
0:45:0 |
1 |
What UNIX Cost Us |
Benno Rice |
y |
|
Y |
|
|
|
|
15165 |
Room 8 |
Wed 15 13:30 |
14:15 |
0:45:0 |
1 |
Panfrost: Open Source meets Arm Mali GPUs |
Robert Foss |
y |
|
Y |
|
|
|
|
15181 |
Arena |
Wed 15 14:25 |
15:10 |
0:45:0 |
1 |
Planning for and handling failures from open hardware, aviation, to production at Google |
Marc MERLIN |
y |
|
Y |
|
|
|
|
15182 |
Room 5 |
Wed 15 14:25 |
15:10 |
0:45:0 |
1 |
Securing Container Runtimes -- How Hard Can It Be? |
Aleksa Sarai |
y |
|
Y |
|
|
|
|
15183 |
Room 6 |
Wed 15 14:25 |
15:10 |
0:45:0 |
1 |
Privacy is not Binary: A discussion of data systems, ethics, and human rights |
Elizabeth Alpert, Amelia Radke |
y |
|
Y |
|
|
|
|
15184 |
Room 7 |
Wed 15 14:25 |
15:10 |
0:45:0 |
1 |
How internet congestion control actually works in the bufferbloat age |
Dave Taht |
y |
|
Y |
|
|
|
|
15185 |
Room 8 |
Wed 15 14:25 |
15:10 |
0:45:0 |
1 |
Clevis and Tang: securing your secrets at rest |
Fraser Tweedale |
y |
|
Y |
|
|
|
|
15203 |
Room 9 |
Wed 15 15:45 |
17:25 |
0:100:0 |
1 |
Kicad for software developers |
David Tulloh |
y |
|
Y |
|
|
|
|
15198 |
Arena |
Wed 15 15:45 |
16:30 |
0:45:0 |
1 |
Control Flow Integrity in the Linux Kernel |
Kees Cook |
y |
|
Y |
|
|
|
|
15199 |
Room 5 |
Wed 15 15:45 |
16:30 |
0:45:0 |
1 |
Open collaborations: leadership succession and leadership success |
Ann Smith, Myk Dowling |
y |
|
Y |
|
|
|
|
15200 |
Room 6 |
Wed 15 15:45 |
16:30 |
0:45:0 |
1 |
Desktop Linux, without a keyboard, mouse or desk |
Shervin Emami |
y |
|
Y |
|
|
|
|
15201 |
Room 7 |
Wed 15 15:45 |
16:30 |
0:45:0 |
1 |
Electronics from your Kitchen Drawer |
Peter Chubb |
y |
|
Y |
|
|
|
|
15202 |
Room 8 |
Wed 15 15:45 |
16:30 |
0:45:0 |
1 |
It's All About Timing |
Dave Chinner |
y |
|
Y |
|
|
|
|
15211 |
Arena |
Wed 15 16:40 |
17:25 |
0:45:0 |
1 |
Open Source Citizenship |
Josh Simmons |
y |
|
Y |
|
|
|
|
15212 |
Room 5 |
Wed 15 16:40 |
17:25 |
0:45:0 |
1 |
Open AND High Performance Computing |
Hugh Blemings |
y |
|
Y |
|
|
|
|
15215 |
Room 8 |
Wed 15 16:40 |
17:25 |
0:45:0 |
1 |
No Docs? No Problem! From Zero to Full Documentation in Less Time than You Think |
Nathan Willis |
y |
|
Y |
|
|
|
|
15214 |
Room 7 |
Wed 15 16:40 |
17:25 |
0:45:0 |
1 |
The Story of PulseAudio and Compress Offload |
Arun Raghavan |
y |
|
Y |
|
|
|
|
15213 |
Room 6 |
Wed 15 16:40 |
17:25 |
0:45:0 |
1 |
Linux in the Cloud, on Prem, or... on a Mainframe? |
Elizabeth K. Joseph |
y |
|
Y |
|
|
|
|
15131 |
Room 6 |
Thu 16 10:45 |
11:30 |
0:45:0 |
1 |
Decoding battery management data - back in the old school |
Paul Wayper |
y |
|
Y |
|
|
|
|
15132 |
Room 7 |
Thu 16 10:45 |
11:30 |
0:45:0 |
1 |
Engineer tested, manager approved: Migrating Windows/.NET services to Linux |
Katie Bell |
y |
|
Y |
|
|
|
|
15129 |
Arena |
Thu 16 10:45 |
11:30 |
0:45:0 |
1 |
When Jargon Becomes Gibberish |
Casey Schaufler |
y |
|
Y |
|
|
|
|
15130 |
Room 5 |
Thu 16 10:45 |
11:30 |
0:45:0 |
1 |
Compiling Your Story: Using Techniques from Compiler Design to Check Your Narrative |
Jon Manning |
y |
|
Y |
|
|
|
|
15134 |
Room 9 |
Thu 16 10:45 |
12:25 |
0:100:0 |
1 |
A B C of 3D : Introduction to making 3D art using blender |
sreenivas alapati |
y |
|
Y |
|
|
|
|
15133 |
Room 8 |
Thu 16 10:45 |
11:30 |
0:45:0 |
1 |
Musings of an Accidental Chair - change from the inside out |
Lyndsey Jackson |
y |
|
Y |
|
|
|
|
15150 |
Room 6 |
Thu 16 11:40 |
12:25 |
0:45:0 |
1 |
Collecting information with care |
Opal Symes |
y |
|
Y |
|
|
|
|
15151 |
Room 7 |
Thu 16 11:40 |
12:25 |
0:45:0 |
1 |
In-depth technical story: Fixing I/O performance for Windows guests in OpenStack Ceph clouds |
Trent Lloyd |
y |
|
Y |
|
|
|
|
15152 |
Room 8 |
Thu 16 11:40 |
12:25 |
0:45:0 |
1 |
VM block error injection, a novel approach for testing Linux storage |
Tony Asleson |
y |
|
Y |
|
|
|
|
15148 |
Arena |
Thu 16 11:40 |
12:25 |
0:45:0 |
1 |
Behind (and under) the scenes of the Meson build system |
Jussi Pakkanen |
y |
|
Y |
|
|
|
|
15149 |
Room 5 |
Thu 16 11:40 |
12:25 |
0:45:0 |
1 |
NTFS really isn't that bad |
Robert Collins |
y |
|
Y |
|
|
|
|
15168 |
Room 5 |
Thu 16 13:30 |
14:15 |
0:45:0 |
1 |
Building an ethical data infrastructure |
Marissa Takahashi |
y |
|
Y |
|
|
|
|
15172 |
Room 9 |
Thu 16 13:30 |
15:10 |
0:100:0 |
1 |
Introduction to Rust (for people who have never used a compiler) |
Tim McNamara |
y |
|
Y |
|
|
|
|
15167 |
Arena |
Thu 16 13:30 |
14:15 |
0:45:0 |
1 |
ROS on your robot: the tale of an inside, an outside robot and 2 arms |
Ben Martin |
y |
|
Y |
|
|
|
|
15169 |
Room 6 |
Thu 16 13:30 |
14:15 |
0:45:0 |
1 |
Privacy Preserving IoT |
Christopher J Biggs |
y |
|
Y |
|
|
|
|
15170 |
Room 7 |
Thu 16 13:30 |
14:15 |
0:45:0 |
1 |
Portable, Attested, Secure Execution with Enarx |
Nathaniel McCallum |
y |
|
Y |
|
|
|
|
15171 |
Room 8 |
Thu 16 13:30 |
14:15 |
0:45:0 |
1 |
How to capture 100G Ethernet traffic at wire speed to local disk |
Christoph Lameter |
y |
|
Y |
|
|
|
|
15187 |
Room 5 |
Thu 16 14:25 |
15:10 |
0:45:0 |
1 |
KUnit - Unit Testing for the Linux Kernel |
Brendan Higgins |
y |
|
Y |
|
|
|
|
15189 |
Room 7 |
Thu 16 14:25 |
15:10 |
0:45:0 |
1 |
The Ops in the Serverless |
Jennifer Davis |
y |
|
Y |
|
|
|
|
15188 |
Room 6 |
Thu 16 14:25 |
15:10 |
0:45:0 |
1 |
The Secret Life of Routers |
Sachi King |
y |
|
Y |
|
|
|
|
15186 |
Arena |
Thu 16 14:25 |
15:10 |
0:45:0 |
1 |
The EU Says The Laws of Mathematics Apply in Australia |
Dan Shearer |
y |
|
Y |
|
|
|
|
15204 |
Arena |
Thu 16 15:45 |
16:30 |
0:45:0 |
1 |
Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS activists |
Bradley M. Kuhn, Karen Sandler |
y |
|
Y |
|
|
|
|
15205 |
Room 6 |
Thu 16 15:45 |
16:30 |
0:45:0 |
1 |
Room scale VR tracking with OpenHMD |
Jan Schmidt |
y |
|
Y |
|
|
|
|
15206 |
Room 8 |
Thu 16 15:45 |
16:30 |
0:45:0 |
1 |
How to Write a Retro Arcade Emulator |
Josh Bassett |
y |
|
Y |
|
|
|
|
15207 |
Room 9 |
Thu 16 15:45 |
17:25 |
0:100:0 |
1 |
Macro Security for your Microservices |
Sreejith Anujan |
y |
|
Y |
|
|
|
|
15208 |
Room 5 |
Thu 16 15:45 |
16:30 |
0:45:0 |
1 |
Using WhatsApp as a Command Line ( Breaking out of the walled Garden) |
Tishampati Dhar |
y |
|
Y |
|
|
|
|
15209 |
Room 7 |
Thu 16 15:45 |
16:30 |
0:45:0 |
1 |
Playable Ads: What REALLY are they? |
Evan Kohilas |
y |
|
Y |
|
|
|
|
15220 |
Room 8 |
Thu 16 16:40 |
17:25 |
0:45:0 |
1 |
Practical Ethics: building it better in 2020 and beyond |
Nicola Nye |
y |
|
Y |
|
|
|
|
15219 |
Room 7 |
Thu 16 16:40 |
17:25 |
0:45:0 |
1 |
eChronos Lyrae: A 64-bit multi-core RTOS kernel for ARM and RISC-V |
Ben Leslie |
y |
|
Y |
|
|
|
|
15217 |
Room 5 |
Thu 16 16:40 |
17:25 |
0:45:0 |
1 |
What Lies Beneath: What are they really tracking and how? |
Anne Jessel |
y |
|
Y |
|
|
|
|
15216 |
Arena |
Thu 16 16:40 |
17:25 |
0:45:0 |
1 |
Large Pages in Linux |
Matthew Wilcox |
y |
|
Y |
|
|
|
|
15218 |
Room 6 |
Thu 16 16:40 |
17:25 |
0:45:0 |
1 |
Advanced Stream Processing on the Edge |
Eduardo Silva |
y |
|
Y |
|
|
|
|
15139 |
Room 6 |
Fri 17 10:45 |
11:30 |
0:45:0 |
1 |
Everything you know is wrong: why using big words can made you sound stupid |
Lana Brindley |
y |
|
Y |
|
|
|
|
15137 |
Room 7 |
Fri 17 10:45 |
11:30 |
0:45:0 |
1 |
The Fight to Keep the Watchers at Bay |
Mark Nottingham |
y |
|
Y |
|
|
|
|
15138 |
Room 9 |
Fri 17 10:45 |
12:25 |
0:100:0 |
1 |
Behind the scenes of an ELK system |
Rafael Martinez Guerrero |
y |
|
Y |
|
|
|
|
15135 |
Arena |
Fri 17 10:45 |
11:30 |
0:45:0 |
1 |
TPM based attestation - how can we use it for good? |
Matthew Garrett |
y |
|
Y |
|
|
|
|
15136 |
Room 5 |
Fri 17 10:45 |
11:30 |
0:45:0 |
1 |
Zero Trust SSH |
Jeremy Stott |
y |
|
Y |
|
|
|
|
15140 |
Room 8 |
Fri 17 10:45 |
11:30 |
0:45:0 |
1 |
The magical fantasy land of Linux kernel testing |
Russell Currey |
y |
|
Y |
|
|
|
|
15155 |
Room 6 |
Fri 17 11:40 |
12:25 |
0:45:0 |
1 |
Privacy, Security, Convenience; when it comes to home automation, can we pick all three? |
Ben Dechrai |
y |
|
Y |
|
|
|
|
15156 |
Room 7 |
Fri 17 11:40 |
12:25 |
0:45:0 |
1 |
Securing firmware: Secure and Trusted boot in OpenBMC |
Joel Stanley |
y |
|
Y |
|
|
|
|
15157 |
Room 8 |
Fri 17 11:40 |
12:25 |
0:45:0 |
1 |
Building a Compiler for Quantum Computers |
Matthew Treinish |
y |
|
Y |
|
|
|
|
15153 |
Arena |
Fri 17 11:40 |
12:25 |
0:45:0 |
1 |
Affordable Custom Input Devices |
Jonathan Oxer, Chris Fryer |
y |
|
Y |
|
|
|
|
15154 |
Room 5 |
Fri 17 11:40 |
12:25 |
0:45:0 |
1 |
RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection |
Esther Payne |
y |
|
Y |
|
|
|
|
15178 |
Room 7 |
Fri 17 13:30 |
14:15 |
0:45:0 |
1 |
smbcmp: A new tool to diff network captures |
Aurélien Aptel |
y |
|
Y |
|
|
|
|
15176 |
Room 9 |
Fri 17 13:30 |
15:10 |
0:100:0 |
1 |
Professional quality layout design with Scribus |
Kathy Reid |
y |
|
Y |
|
|
|
|
15175 |
Room 8 |
Fri 17 13:30 |
14:15 |
0:45:0 |
1 |
Transpile anything to everything! |
Anna Herlihy |
y |
|
Y |
|
|
|
|
15174 |
Room 6 |
Fri 17 13:30 |
14:15 |
0:45:0 |
1 |
The life of open source spatial with QGIS - From hobby to grown up, with bonus growing pains |
Nathan Woodrow |
y |
|
Y |
|
|
|
|
15173 |
Room 5 |
Fri 17 13:30 |
14:15 |
0:45:0 |
1 |
"Write a single library to handle all input devices, it'll be easy" they said... |
Peter Hutterer |
y |
|
Y |
|
|
|
|
15177 |
Arena |
Fri 17 13:30 |
14:15 |
0:45:0 |
1 |
Betrusted: Better Security Through Physical Partitioning |
bunnie, Sean "xobs" Cross, Tom Marble |
y |
|
Y |
|
|
|
|
15193 |
Room 7 |
Fri 17 14:25 |
15:10 |
0:45:0 |
1 |
Senseless - environmental sensing without additional hardware |
Kim Burgess |
y |
|
Y |
|
|
|
|
15190 |
Arena |
Fri 17 14:25 |
15:10 |
0:45:0 |
1 |
Tensorflow on open source GPUs |
David Airlie |
y |
|
Y |
|
|
|
|
15191 |
Room 5 |
Fri 17 14:25 |
15:10 |
0:45:0 |
1 |
Privacy and Decentralisation with Multicast |
Brett Sheffield |
y |
|
Y |
|
|
|
|
15192 |
Room 6 |
Fri 17 14:25 |
15:10 |
0:45:0 |
1 |
New Phone, Who Dis?: Human Authentication in the Digital Age |
Yaakov |
y |
|
Y |
|
|
|
|
15194 |
Room 8 |
Fri 17 14:25 |
15:10 |
0:45:0 |
1 |
How to make kernel and user space CI for input devices? |
Benjamin Tissoires |
y |
|
Y |
|
|
|
|