ID | conf | Start | End |
15122 |
137 |
|
|
Facebook, Dynamite, Uber, Bombs, and You |
15123 |
1 |
|
|
Snek: A Python-Inspired Language for Tiny Embedded Computers |
15124 |
2 |
|
|
From bits to legs to locomotion: Building a hexapod from the ground up |
15125 |
3 |
|
|
We know when you are sleeping: The Rise of Energy Smart Meters |
15126 |
4 |
|
|
Automated acceptance tests for terminal applications |
15127 |
5 |
|
|
Building a zero downtime Kubernetes cluster |
15128 |
11 |
|
|
An introduction to Penetration Testing using Kali Linux |
15129 |
34 |
|
|
When Jargon Becomes Gibberish |
15130 |
35 |
|
|
Compiling Your Story: Using Techniques from Compiler Design to Check Your Narrative |
15131 |
36 |
|
|
Decoding battery management data - back in the old school |
15132 |
37 |
|
|
Engineer tested, manager approved: Migrating Windows/.NET services to Linux |
15133 |
38 |
|
|
Musings of an Accidental Chair - change from the inside out |
15134 |
43 |
|
|
A B C of 3D : Introduction to making 3D art using blender |
15135 |
64 |
|
|
TPM based attestation - how can we use it for good? |
15136 |
65 |
|
|
Zero Trust SSH |
15137 |
66 |
|
|
The Fight to Keep the Watchers at Bay |
15138 |
72 |
|
|
Behind the scenes of an ELK system |
15139 |
100 |
|
|
Everything you know is wrong: why using big words can made you sound stupid |
15140 |
101 |
|
|
The magical fantasy land of Linux kernel testing |
15141 |
155 |
|
|
Evolution of Linux Containers to Container Native Storage... |
15142 |
151 |
|
|
The Internet: Protecting Our Democratic Lifeline |
15143 |
6 |
|
|
I Was Wrong |
15144 |
7 |
|
|
Everything Awesome about GPU Drivers |
15145 |
8 |
|
|
Verified seL4 on secure RISC-V processors |
15146 |
9 |
|
|
Like, Share and Subscribe: Effective Communication of Security Advice |
15147 |
10 |
|
|
Piku: git push deployments to your own servers |
15148 |
39 |
|
|
Behind (and under) the scenes of the Meson build system |
15149 |
40 |
|
|
NTFS really isn't that bad |
15150 |
41 |
|
|
Collecting information with care |
15151 |
42 |
|
|
In-depth technical story: Fixing I/O performance for Windows guests in OpenStack Ceph clouds |
15152 |
99 |
|
|
VM block error injection, a novel approach for testing Linux storage |
15153 |
67 |
|
|
Affordable Custom Input Devices |
15154 |
68 |
|
|
RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection |
15155 |
69 |
|
|
Privacy, Security, Convenience; when it comes to home automation, can we pick all three? |
15156 |
70 |
|
|
Securing firmware: Secure and Trusted boot in OpenBMC |
15157 |
71 |
|
|
Building a Compiler for Quantum Computers |
15158 |
156 |
|
|
Dynamic Workloads need Dynamic Storage - using rook-ceph with k8s |
15159 |
138 |
|
|
Privacy and Transparency in VPN industry |
15160 |
141 |
|
|
OCIv2: Container Images Considered Harmful |
15161 |
12 |
|
|
The Linux network stack extension for DDoS mitigation and web security |
15162 |
13 |
|
|
What UNIX Cost Us |
15163 |
14 |
|
|
What Makes Decentralisation Hard? And How Do We Overcome This? |
15164 |
15 |
|
|
Good, better, breast: Building a sensing mastectomy prosthetic with open hardware |
15165 |
16 |
|
|
Panfrost: Open Source meets Arm Mali GPUs |
15166 |
22 |
|
|
Velociraptor - Dig Deeper |
15167 |
44 |
|
|
ROS on your robot: the tale of an inside, an outside robot and 2 arms |
15168 |
45 |
|
|
Building an ethical data infrastructure |
15169 |
46 |
|
|
Privacy Preserving IoT |
15170 |
47 |
|
|
Portable, Attested, Secure Execution with Enarx |
15171 |
48 |
|
|
How to capture 100G Ethernet traffic at wire speed to local disk |
15172 |
54 |
|
|
Introduction to Rust (for people who have never used a compiler) |
15173 |
73 |
|
|
"Write a single library to handle all input devices, it'll be easy" they said... |
15174 |
74 |
|
|
The life of open source spatial with QGIS - From hobby to grown up, with bonus growing pains |
15175 |
75 |
|
|
Transpile anything to everything! |
15176 |
81 |
|
|
Professional quality layout design with Scribus |
15177 |
102 |
|
|
Betrusted: Better Security Through Physical Partitioning |
15178 |
103 |
|
|
smbcmp: A new tool to diff network captures |
15179 |
152 |
|
|
Authentication Afterlife: the dark side of making lost password recovery harder |
15180 |
157 |
|
|
Kubernetes Developer Workflows in Visual Studio Code |
15181 |
17 |
|
|
Planning for and handling failures from open hardware, aviation, to production at Google |
15182 |
18 |
|
|
Securing Container Runtimes -- How Hard Can It Be? |
15183 |
19 |
|
|
Privacy is not Binary: A discussion of data systems, ethics, and human rights |
15184 |
20 |
|
|
How internet congestion control actually works in the bufferbloat age |
15185 |
21 |
|
|
Clevis and Tang: securing your secrets at rest |
15186 |
49 |
|
|
The EU Says The Laws of Mathematics Apply in Australia |
15187 |
50 |
|
|
KUnit - Unit Testing for the Linux Kernel |
15188 |
51 |
|
|
The Secret Life of Routers |
15189 |
52 |
|
|
The Ops in the Serverless |
15190 |
76 |
|
|
Tensorflow on open source GPUs |
15191 |
77 |
|
|
Privacy and Decentralisation with Multicast |
15192 |
78 |
|
|
New Phone, Who Dis?: Human Authentication in the Digital Age |
15193 |
79 |
|
|
Senseless - environmental sensing without additional hardware |
15194 |
80 |
|
|
How to make kernel and user space CI for input devices? |
15195 |
153 |
|
|
You Shall Not Pass |
15196 |
139 |
|
|
An intro to improving the security of your code with free analysis tools |
15197 |
142 |
|
|
The future of the desktop is on hypervisor powered containers |
15198 |
23 |
|
|
Control Flow Integrity in the Linux Kernel |
15199 |
24 |
|
|
Open collaborations: leadership succession and leadership success |
15200 |
25 |
|
|
Desktop Linux, without a keyboard, mouse or desk |
15201 |
26 |
|
|
Electronics from your Kitchen Drawer |
15202 |
27 |
|
|
It's All About Timing |
15203 |
33 |
|
|
Kicad for software developers |
15204 |
55 |
|
|
Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS activists |
15205 |
56 |
|
|
Room scale VR tracking with OpenHMD |
15206 |
57 |
|
|
How to Write a Retro Arcade Emulator |
15207 |
63 |
|
|
Macro Security for your Microservices |
15208 |
97 |
|
|
Using WhatsApp as a Command Line ( Breaking out of the walled Garden) |
15209 |
98 |
|
|
Playable Ads: What REALLY are they? |
15210 |
154 |
|
|
The Psychology of Multi-Factor Authentication |
15211 |
28 |
|
|
Open Source Citizenship |
15212 |
29 |
|
|
Open AND High Performance Computing |
15213 |
30 |
|
|
Linux in the Cloud, on Prem, or... on a Mainframe? |
15214 |
31 |
|
|
The Story of PulseAudio and Compress Offload |
15215 |
32 |
|
|
No Docs? No Problem! From Zero to Full Documentation in Less Time than You Think |
15216 |
58 |
|
|
Large Pages in Linux |
15217 |
59 |
|
|
What Lies Beneath: What are they really tracking and how? |
15218 |
60 |
|
|
Advanced Stream Processing on the Edge |
15219 |
61 |
|
|
eChronos Lyrae: A 64-bit multi-core RTOS kernel for ARM and RISC-V |
15220 |
62 |
|
|
Practical Ethics: building it better in 2020 and beyond |
15221 |
159 |
|
|
Every Image Has A Purpose |