| ID | conf | Start | End |
| 15122 |
137 |
|
|
Facebook, Dynamite, Uber, Bombs, and You |
| 15123 |
1 |
|
|
Snek: A Python-Inspired Language for Tiny Embedded Computers |
| 15124 |
2 |
|
|
From bits to legs to locomotion: Building a hexapod from the ground up |
| 15125 |
3 |
|
|
We know when you are sleeping: The Rise of Energy Smart Meters |
| 15126 |
4 |
|
|
Automated acceptance tests for terminal applications |
| 15127 |
5 |
|
|
Building a zero downtime Kubernetes cluster |
| 15128 |
11 |
|
|
An introduction to Penetration Testing using Kali Linux |
| 15129 |
34 |
|
|
When Jargon Becomes Gibberish |
| 15130 |
35 |
|
|
Compiling Your Story: Using Techniques from Compiler Design to Check Your Narrative |
| 15131 |
36 |
|
|
Decoding battery management data - back in the old school |
| 15132 |
37 |
|
|
Engineer tested, manager approved: Migrating Windows/.NET services to Linux |
| 15133 |
38 |
|
|
Musings of an Accidental Chair - change from the inside out |
| 15134 |
43 |
|
|
A B C of 3D : Introduction to making 3D art using blender |
| 15135 |
64 |
|
|
TPM based attestation - how can we use it for good? |
| 15136 |
65 |
|
|
Zero Trust SSH |
| 15137 |
66 |
|
|
The Fight to Keep the Watchers at Bay |
| 15138 |
72 |
|
|
Behind the scenes of an ELK system |
| 15139 |
100 |
|
|
Everything you know is wrong: why using big words can made you sound stupid |
| 15140 |
101 |
|
|
The magical fantasy land of Linux kernel testing |
| 15141 |
155 |
|
|
Evolution of Linux Containers to Container Native Storage... |
| 15142 |
151 |
|
|
The Internet: Protecting Our Democratic Lifeline |
| 15143 |
6 |
|
|
I Was Wrong |
| 15144 |
7 |
|
|
Everything Awesome about GPU Drivers |
| 15145 |
8 |
|
|
Verified seL4 on secure RISC-V processors |
| 15146 |
9 |
|
|
Like, Share and Subscribe: Effective Communication of Security Advice |
| 15147 |
10 |
|
|
Piku: git push deployments to your own servers |
| 15148 |
39 |
|
|
Behind (and under) the scenes of the Meson build system |
| 15149 |
40 |
|
|
NTFS really isn't that bad |
| 15150 |
41 |
|
|
Collecting information with care |
| 15151 |
42 |
|
|
In-depth technical story: Fixing I/O performance for Windows guests in OpenStack Ceph clouds |
| 15152 |
99 |
|
|
VM block error injection, a novel approach for testing Linux storage |
| 15153 |
67 |
|
|
Affordable Custom Input Devices |
| 15154 |
68 |
|
|
RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection |
| 15155 |
69 |
|
|
Privacy, Security, Convenience; when it comes to home automation, can we pick all three? |
| 15156 |
70 |
|
|
Securing firmware: Secure and Trusted boot in OpenBMC |
| 15157 |
71 |
|
|
Building a Compiler for Quantum Computers |
| 15158 |
156 |
|
|
Dynamic Workloads need Dynamic Storage - using rook-ceph with k8s |
| 15159 |
138 |
|
|
Privacy and Transparency in VPN industry |
| 15160 |
141 |
|
|
OCIv2: Container Images Considered Harmful |
| 15161 |
12 |
|
|
The Linux network stack extension for DDoS mitigation and web security |
| 15162 |
13 |
|
|
What UNIX Cost Us |
| 15163 |
14 |
|
|
What Makes Decentralisation Hard? And How Do We Overcome This? |
| 15164 |
15 |
|
|
Good, better, breast: Building a sensing mastectomy prosthetic with open hardware |
| 15165 |
16 |
|
|
Panfrost: Open Source meets Arm Mali GPUs |
| 15166 |
22 |
|
|
Velociraptor - Dig Deeper |
| 15167 |
44 |
|
|
ROS on your robot: the tale of an inside, an outside robot and 2 arms |
| 15168 |
45 |
|
|
Building an ethical data infrastructure |
| 15169 |
46 |
|
|
Privacy Preserving IoT |
| 15170 |
47 |
|
|
Portable, Attested, Secure Execution with Enarx |
| 15171 |
48 |
|
|
How to capture 100G Ethernet traffic at wire speed to local disk |
| 15172 |
54 |
|
|
Introduction to Rust (for people who have never used a compiler) |
| 15173 |
73 |
|
|
"Write a single library to handle all input devices, it'll be easy" they said... |
| 15174 |
74 |
|
|
The life of open source spatial with QGIS - From hobby to grown up, with bonus growing pains |
| 15175 |
75 |
|
|
Transpile anything to everything! |
| 15176 |
81 |
|
|
Professional quality layout design with Scribus |
| 15177 |
102 |
|
|
Betrusted: Better Security Through Physical Partitioning |
| 15178 |
103 |
|
|
smbcmp: A new tool to diff network captures |
| 15179 |
152 |
|
|
Authentication Afterlife: the dark side of making lost password recovery harder |
| 15180 |
157 |
|
|
Kubernetes Developer Workflows in Visual Studio Code |
| 15181 |
17 |
|
|
Planning for and handling failures from open hardware, aviation, to production at Google |
| 15182 |
18 |
|
|
Securing Container Runtimes -- How Hard Can It Be? |
| 15183 |
19 |
|
|
Privacy is not Binary: A discussion of data systems, ethics, and human rights |
| 15184 |
20 |
|
|
How internet congestion control actually works in the bufferbloat age |
| 15185 |
21 |
|
|
Clevis and Tang: securing your secrets at rest |
| 15186 |
49 |
|
|
The EU Says The Laws of Mathematics Apply in Australia |
| 15187 |
50 |
|
|
KUnit - Unit Testing for the Linux Kernel |
| 15188 |
51 |
|
|
The Secret Life of Routers |
| 15189 |
52 |
|
|
The Ops in the Serverless |
| 15190 |
76 |
|
|
Tensorflow on open source GPUs |
| 15191 |
77 |
|
|
Privacy and Decentralisation with Multicast |
| 15192 |
78 |
|
|
New Phone, Who Dis?: Human Authentication in the Digital Age |
| 15193 |
79 |
|
|
Senseless - environmental sensing without additional hardware |
| 15194 |
80 |
|
|
How to make kernel and user space CI for input devices? |
| 15195 |
153 |
|
|
You Shall Not Pass |
| 15196 |
139 |
|
|
An intro to improving the security of your code with free analysis tools |
| 15197 |
142 |
|
|
The future of the desktop is on hypervisor powered containers |
| 15198 |
23 |
|
|
Control Flow Integrity in the Linux Kernel |
| 15199 |
24 |
|
|
Open collaborations: leadership succession and leadership success |
| 15200 |
25 |
|
|
Desktop Linux, without a keyboard, mouse or desk |
| 15201 |
26 |
|
|
Electronics from your Kitchen Drawer |
| 15202 |
27 |
|
|
It's All About Timing |
| 15203 |
33 |
|
|
Kicad for software developers |
| 15204 |
55 |
|
|
Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS activists |
| 15205 |
56 |
|
|
Room scale VR tracking with OpenHMD |
| 15206 |
57 |
|
|
How to Write a Retro Arcade Emulator |
| 15207 |
63 |
|
|
Macro Security for your Microservices |
| 15208 |
97 |
|
|
Using WhatsApp as a Command Line ( Breaking out of the walled Garden) |
| 15209 |
98 |
|
|
Playable Ads: What REALLY are they? |
| 15210 |
154 |
|
|
The Psychology of Multi-Factor Authentication |
| 15211 |
28 |
|
|
Open Source Citizenship |
| 15212 |
29 |
|
|
Open AND High Performance Computing |
| 15213 |
30 |
|
|
Linux in the Cloud, on Prem, or... on a Mainframe? |
| 15214 |
31 |
|
|
The Story of PulseAudio and Compress Offload |
| 15215 |
32 |
|
|
No Docs? No Problem! From Zero to Full Documentation in Less Time than You Think |
| 15216 |
58 |
|
|
Large Pages in Linux |
| 15217 |
59 |
|
|
What Lies Beneath: What are they really tracking and how? |
| 15218 |
60 |
|
|
Advanced Stream Processing on the Edge |
| 15219 |
61 |
|
|
eChronos Lyrae: A 64-bit multi-core RTOS kernel for ARM and RISC-V |
| 15220 |
62 |
|
|
Practical Ethics: building it better in 2020 and beyond |
| 15221 |
159 |
|
|
Every Image Has A Purpose |