Scaling Telephony Systems: Lessons from 100 to 10,000 Calls with ASTPP
Scaling a telephony platform to handle tens of thousands of concurrent calls is a complex challenge for any deployment. This session shares real-world experiences from ASTPP, an open source billing and routing platform, highlighting strategies for high concurrency, load balancing, monitoring, and maintaining resilience under heavy traffic. Attendees will walk away with practical, transferable insights that can be applied to Asterisk, FreePBX, or other open source telephony platforms.
Second Life Meets Open Source: Unlocking the Virtual World(s)
You may well have heard of Second Life at some point, the virtual world that launched to the public in mid-2003, but you might be surprised to learn that it's still around, more than two decades later. As a longtime SL Resident, I think that its staying power can be attributed at least partially to the open sourcing of its viewer code (the client software) back in early 2007.
In this presentation, I'll take you through a concise history of Second Life and how it evolved, from its beginnings to the open-sourcing of the viewer and finally to more recent efforts to simplify contributions, with a look at the role of the "third-party viewers" as well (one of these, Firestorm, is vastly more popular these days than the company's official viewer). We'll also examine some of the lessons that Second Life's development might have for other virtual world platforms, starting with related projects like OpenSimulator (and LibreMetaverse) and expanding outward to include the so-called metaverse more broadly.
Secure Boot: Getting to know your frenemy
Secure boot has been around for many years now, having been introduced into the UEFI spec in 2006. It is one of those things that tends to be turned off when installing Linux. There are different opinions around secure boot and whether it solves a problem or not. It is becoming more common for environments to require keeping secure boot turned on. Secure boot is not going away in the near future. It is now being used in the cloud. We need to get to know our frenemy.
Secure Prompt Engineering at Scale
Millions of financial events. Zero room for error. Learn how template-driven prompt engineering turns noisy cloud transaction streams into explainable, policy-safe automation, faster incident triage, smarter anomaly detection, instant schema-drift recovery, and audit-ready trails.
Software Distribution Now And Then: Why And How The Internet Changed Everything
Imagine transferring data and software from one computer to another in the 1970s, before the Internet. What media could one use, and how did transfers occur? This talk provides a glimpse into the technology of that world, and highlights how it affected the process of software transfer.
The advent of the Internet completely changed software transfer and enabled the open source movement. The increased speed of transfer only forms part of the story. The talk will outline significant advances that the Internet introduced, and describe how they enable the efficient software distribution scheme that we now enjoy.
Solving Pre-silicon Kernel Upstream for RISC-V First Ever
In this session, we will share the methodology, toolchains, and collaborative workflows that make this possible, including the use of simulation platforms, pre-silicon verification environments, and CI/CD integration for early kernel testing. Attendees will learn how these efforts accelerate software-hardware co-design, reduce bring-up cycles, and ensure that by the time silicon arrives, the kernel is already upstream-ready.
Sovereignty begins with Open Source
Many cloud products have security as an afterthought. What if you put security first? From hand-held to stored data? And did it all with Open Source? And made it quantum proof?
Speeedy IoT dev w/ Agentic TUI
Set up an agentic loop to program the firmware in a microcontroller or SBC. Shorten the research and development cycle by extending your basic electronics knowledge to solve real world problems. Concepts demonstrated with Gemini-CLI, RAG, MCP, but applies to many stacks.
Sponsored Workshop: Hands-On Tailscale - Secure Connectivity and Networking on AWS
Ever want to dig into Tailscale but haven't had time? If that's you, then join us in this workshop where you will learn the basics of Tailscale and get some hands-on experience deploying Tailscale into cloud resources on AWS. Participants will learn how to deploy Tailscale locally and into an AWS environment using infrastructure-as-code (Terraform, OpenTofu, etc.). You will also learn how to configure Tailscale for various use cases like Subnet Routing and Exit Nodes, as well as implement fine-grained access controls with Tailscale ACLs and Grants, and lastly learn how to integrate Tailscale with AWS services (like RDS databases) for secure private access over the public internet by leveraging WireGuard under the hood, powered by Tailscale.
Steering the Future of NixOS: Governance, Growth, and Community
As NixOS evolves from a passionate community project into a globally adopted platform, strong governance and clear vision are essential. Join leaders from the NixOS Foundation and the Steering Committee for an insider’s look at how we’re:
Structuring for Sustainability
Scaling Collaboration
Thinking through the future of security
Taxonomy for Agent Systems (T4AS)
“Taxonomy for Agent Systems (T4AS)” introduces a simple but powerful way to tame today’s chaotic landscape of AI agents. Steve Vitka presents T4AS as a reference architecture that cleanly separates three roles: the Agent (“strategist” that plans but never acts), the Workflow (“general” that orchestrates tools), and the Workspace (“battlefield” where certified tools and APIs actually run). By enforcing these boundaries, T4AS turns ad‑hoc agent stacks into secure, auditable, and composable systems rather than brittle prompt‑spaghetti.
Tectonix: The bedrock of Shopify's Monorepo
Get a tour of the build system we're building for Shopify's "World" Monorepo. Tectonix is Nix plumbing that assembles git sparse-checkouts, the NixOS module system, and a whole pile of supplemental tools into a working Nix-based monorepo.
The -ization of Containerization
The recent open sourcing of Apple Containerization Framework and container Tooling projects enable developers to create and run Linux container images directly on their Mac in a way that focuses on security and privacy. In this talk we’ll talk about the container CLI tool and how it utilizes Containerization to provide simple yet powerful functionality to build, run and deploy Linux containers on Mac. We’ll talk about the architecture, why we wrote the framework and tool in Swift, what future development looks like for Kubernetes use cases, and how the community can get involved.
The changing American PSTN core
As recently as 2015, Alex Balashov was on record saying that SS7 and TDM steadfastly remain as the essential building blocks of a reliable PSTN, and that the triumphant proclamations of IP peering were something of a laughingstock, or at least premature. Well, the much-vaunted move to IP peering in the core of the PSTN itself has finally happened, and has been rapidly gaining steam in the last 5-10 years. The ILEC tandems do not play the role they once did, and the landscape is shifting rapidly.
The Giant Immutable LEGO Set: Demystifying the Nix Store
Ever looked inside /nix/store and felt immediate confusion? You aren't alone. For many, the "magic" of Nix is hidden behind cryptic hashes and the mysterious "derivation." This talk strips away the jargon to explain how Nix actually works using a simple metaphor: a giant, immutable LEGO set. We’ll explore how Nix builds software in total isolation, why your system can’t "break" like traditional distros, and how every package is just a recipe waiting to be snapped into place.
The Hidden Lives of Temp Tables: Unraveling MySQL Internal Management
Ever wondered how MySQL and MariaDB handle the myriad internal temporary tables they create to process your queries? This session pulls back the curtain on this often-overlooked aspect of database performance.
Prepare to have your assumptions challenged as we delve into the baffling behavior of MySQL's TempTable storage engine. We'll analyze the key configuration variables and internal mechanisms that influence this crucial decision.
Through practical examples and insightful explanations, you'll gain a deeper understanding of:
- When are internal temporary tables used
- How MySQL and MariaDB choose the storage engine
- The specific triggers and thresholds that cause MySQL engine to move data to disk and the performance impact
- Practical tips and configuration adjustments to optimize temporary table usage and avoid unexpected disk I/O.
Whether you're a seasoned DBA, a curious developer, or anyone interested in the inner workings of MySQL and MariaDB, this session will equip you with valuable knowledge to better understand and optimize your database performance.
The History and Future of Censorship Evasion
Attendees will learn about the history of censorship evasion throughout the development of the internet, the current state of internet censorship and evasion tactics around the world, and the future of evasion methods to protect the free and open Internet.
The intersectionality of Human Psychology, Security and The Era of AI and Misinformation.
“If it were measured as a country, then cybercrime — which is predicted to inflict damages totaling $6 trillion USD globally in 2021 — would be the world’s third-largest economy after the U.S. and China.” – Steve Morgan, Editor-in-Chief of Cybercrime magazine
On average, companies experience about 21 to 24 days of downtime after a ransomware attack, highlighting the significant impact of such incidents on business operations. Everyday technology is advancing at a faster rate than we can educate the general population. If a HongKong bank can be convinced to wire transfer 35 million dollars by a deep fake how do we protect grandma? Most people under 35 get their news and information from TikTok and social media platforms. How do we educate and safe guard the future?
The Missing Part of Nix (and where to find it)
Nix gives you all the primitives you need to have robust and scalable builds, except the actual build distribution piece. In this talk we will cover what Nix does right for distributed builds, what options you have to implement build distribution, and how the project could fill this gap.
The Path to Robust deAGI
“The Path to Robust deAGI” asks what it would take to build artificial general intelligence that is both powerful and structurally aligned with human flourishing—not just steered by after‑the‑fact safety patches. Ben Goertzel, CEO of SingularityNET and a founding member of the Artificial Superintelligence (ASI) Alliance, will outline how a decentralized, token‑coordinated ecosystem—combining ASI:Chain, Hyperon AGI, and community‑owned GPU clouds—can prevent AGI from being captured by any single corporation or state.
The Ralph Wiggum Loop: How Autonomous AI Loops Built My Serverless SaaS While I Slept
I got tired of babysitting my AI coding assistant. Every five minutes: "Should I continue?" So I built the "Ralph Wiggum Loop," named after a Simpsons character. It's a loop that feeds a PROMPT.md file to Claude Code until everything works as defined. Failure becomes feedback. Each crash teaches the next iteration.
Using this technique, I built a complete serverless URL shortener on AWS by letting AI iterate against Pulumi's pass/fail deployment criteria.
I'll share how this autonomous loops work and how you can use it too.
The Role of Open Source in Generative AI
There has been a lot of confusion about the role of open source in generative AI, as the focus has been mainly on Large Language Models (LLMs) and whether or not those models meet the definition of "open source".
But like most emerging technology in the past twenty years, open source software will form the basis for getting the most value out of generative AI. From vector databases to inference engines to the "chunking" of data for consumption by Retrieval Augmented Generation (RAG), the role of open source can not be overstated.
This talk will present some interesting open source projects that exist in tandem with LLMs to extract the most value from LLMs and giving users greater control over their data.
The Sound of Your Secrets: Teaching Your Model to Spy, So You Can Learn to Defend
AI can now listen to your keyboard and guess what you're typing. This session shows how deep learning models can reconstruct text from keystroke sounds, then breaks down how these attacks work and how to defend against them. It's a live, hands-on look at the thin line between innovation and exploitation in modern AI security. Bring your curiosity and maybe a little paranoia.
The State of Immutable Linux
Linux has evolved a lot over the past 30 years. Distributions were created as opinionated starting points for general usage, but the advent of containers changed what was required and expected. CoreOS pushed the limits of what a server distribution should be, and those limits continue to be refined with more special purpose options.
While many of these next generation distros have similar characteristics they're not all the same. Justin will provide an overview of the current landscape of immutable distributions and what sets each one apart, and what they have in common.
The Tip of the Iceberg
A deep dive into the Iceberg open table format, examining the rationale for its creation, internal mechanics, and advanced capabilities. Drawing from years of production experience, this talk offers both theoretical foundations and practical insights for engineers considering adopting Iceberg.




