Presentations

Audience: Everyone
Topic: Youth

Caleb has traveled to rural Mexico with his mom, grandpa and friends helping to set up computer labs. At the age of 9, he is an experienced traveler having spent hours in the back of pickup trucks, in international airports and in broken down buses. He's learned the art of making friends without being able to speak their language - rhino beetles are appealing to boys in all languages - and he's shared his love for computers with them. In this talk, he'll share what a volunteer computer trip is like from the perspective of a kid. What it's really like and what you can expect.

Topic: Ubucon

Mark Shuttleworth's Opening Keynote

Audience: Everyone
Topic: Embedded

Marshmallow Entertainent System was born from a mix of Embedded Linux (via Buildroot) and the Marshmallow Game Engine. This talk will walk you through the different components used in the BSP (Board Support Package) for the Marshmallow Entertainment System and how peripherals tie into Marshmallow Game Engine. The presentation will be done using the prototype itself!

Audience: Developer
Topic: Ubucon

During the talk Alan & Stuart will detail why Marvin exists, how it was developed and how it can be used. There will also be discussion of future features, and an opportunity for questions.

Audience: Everyone
Topic: General

Unhealthy Open Source projects are doomed to fail. But how do you measure the health of a project? Whether you’re providing analysis for the company or taking a community-driven approach, you need methods, metrics, tactics to provide a clear picture of your project’s data. Duane O’Brien (Open Source Programs, PayPal) and Eva Gantz (Global Community, Stellar.org) will look at measuring project health through the lenses of both corporate sponsor and community cultivator. Duane and Eva will share cross-industry tools, providing specific recommendations for strategies to try and to avoid.

Audience: Intermediate
Topic: PostgreSQL

PostgreSQL 9.5 has a new feature called Row Level Security (RLS). Using RLS, a PostgreSQL extension called sepgsql (somewhat modified), and Security Enhanced Linux (SELinux) configured properly, it is possible to create a Multi-level Security database. This talk will describe how it can be done.

 

Audience: Advanced
Topic: PostgreSQL

Multi-Version Concurrency Control (MVCC) allows Postgres to offer high concurrency even during significant database read/write activity. MVCC specifically offers behavior where "readers never block writers, and writers never block readers". This talk explains how MVCC is implemented in Postgres and highlights optimizations which minimize the downsides of MVCC. This talk is for advanced users.

Audience: Developer
Topic: MySQL

MySQL 5.7 introduced a JSON data type that is fantastic, obviously, for JSON data.  But how do you use this new data type efficiently, what tools do you need to manipulate JSON data, when is it best to use a regular columns instead of JSON, and what magic new technology (generated columns) can you use to work with SQL indexes. So come learn how to use this new data type to become a rockstar developer.

Audience: Everyone
Topic: MySQL

MySQL query tuning is often more art than science and it can quickly eat up a lot of DBA and/or Developer time. This presentation given will outline a method for determining the best approach for tuning queries by utilizing the performance schema (specifically instrumented wait events and thread states), query execution plans and SQL diagramming techniques. Regardless of the complexity of the statement or your skill level, this quick, systematic approach will lead you down the correct tuning path with no guessing, saving countless hours tuning a query.

Audience: Intermediate
Topic: SysAdmin

System administration has recently taken great strides in both the use of configuration management and integration with development and operations. Unfortunately, network administration has not moved forward in the same way. This presentation will explain a method to standardize the configuration of thousands of network devices using the Trigger framework. At the end of this presentation, you should have the information required to use these techniques to manage your own network environment.