Audience: Developer
Topic: Embedded

RISC-V is a Free and Open RISC Instruction Set Architecture provided under BSD license, unleashing new means of processor innovation with open collaboration, delivering a new freedom of hardware and software design. It's filled with the potential to do what Linux started for the software ecosystem, some 25 years ago, i.e., lighting the open source movement, but for hardware and CPU design and influencing CPU innovation for rest of the 21st Century and beyond. We will talk about the RISC-V ecosystem, and the progress it has made thus far in a short span, from 2010 onwards.

Audience: Everyone
Topic: PostgreSQL

Curious about how to tune PostgreSQL and your Linux kernel to get the best performance out of your database? This talk focuses on the most important parameters to tune for optimal performance.

Audience: Everyone

Many organizations are using open source software without purposeful governance in place. These organizations need to establish processes and practices to govern the way in which they consume and contribute.

Audience: Developer
Topic: General

F Prime, developed at NASA’s Jet Propulsion Laboratory has been used to control cubesats, instruments, and other spaceborne systems at NASA. This talk will walk through the basics of F Prime, its architecture, and how it is used to develop embedded flight software. Attendees should expect to leave with an understanding of how F Prime can be used to further their own embedded software projects both in space and on Earth.





Audience: Developer
Topic: Developer
  •  How HTTP flood may make you HTTP parser the bottle neck
  • x86-64 and branch mispredictions, caching, unaligned memory access
  • C compiler optimizations for multi-branch statements and autovectorization
  • switch-driven FSM versus direct jumps
  • what makes HTTP strings special and why LIBC isn't good
  • strspn() and strcasecmp() algorithms for HTTP strings using SSE and AVX
  • efficient custom filtering to prevent injection attacks
  • the cost of FPU context switch and how the Linux kernel works with SIMD
Audience: Everyone
Topic: Mentoring

I will explain the background of fight, flight, and freeze, and how it applies to organizations. I will give examples and suggestions on how to identify your own organizational trauma and how to help heal it.

Audience: Advanced
Topic: Cloud

Many businesses need to have tighter controls over some of their big data, but the data needs to be stored with less sensitive data. File systems allow protections to be given at the file level, but not finer grain than that. By modifying the Apache ORC columnar file format, we are adding column encryption so that specific columns can be encrypted. This allows your personally identifiable information (PII) to be encrypted while the majority of your data is not.

Audience: Everyone
Topic: Security

There are many Security Frameworks to choose from: NIST, CIS, ISO, PCI, but only PCI is prescriptive in its controls. So if you are trying to start or measure your current security practices the PCI is a good framework to use. Because it is is prescriptive it is well understood how to meet the controls and it tells you what you need to put in place to pass the control test. But even then the PCI is hard to grasp for many because it is large and they don’t understand why a control was created. There is no “Why” answered in the control definition. In my presentation I try to answer, “Why"

Audience: Everyone
Topic: Open Data

PyTorch is an open source machine learning (ML) framework originally developed at Facebook AI Research, enabling high performance neural networks with strong GPU acceleration. Today, PyTorch is one of the fastest growing open source projects on GitHub, with contributors from academia and industry, and has established itself as the preferred ML toolkit in industrial labs at Uber, Salesforce and NVIDIA as well as academic labs at Oxford, Stanford, INRIA and others. This talk will present how PyTorch enables flexible ML applications in both research and production environments.

Audience: Developer

As you scale your use of containers, Kubernetes provides a simple centralized way to manage and orchestrate your containerized applications. But it also brings with it a new set of security challenges specific to the orchestration layer. In this talk, we'll outline the key steps necessary to get Kubernetes up and running securely - so you can deploy applications at scale with confidence.