Presentations
The number of free-software fonts has exploded, thanks to CSS webfont services like Google Fonts and Open Font Library. But open fonts have yet to make gains in document-creation systems beyond web pages: print-on-demand publishing, print-on-demand merchandise, eReaders and EPUB generation, games, and bundled with FOSS applications. This talk will look at the obstacles, bottlenecks, and disconnects behind this situation and explain what needs to happen next in order to move forward.
HiDPI screens are now very common in laptops. But our software is still catching up. There are very popular apps that can't switch from HiDPI to LoDPI, that can't scale at all, or have very sensitive performance requirements. Add to this all the LoDPI monitors people need to use with their HiDPI laptops every day. We now have the means to make what was once an awkward experience smooth and natural. Modern apps, Legacy apps, real-time graphics, and HiDPI and LoDPI displays are are all brought together seamlessly. Come join us as we demo this great new capability!
The IT industry is moving in a fast pace. We may be doing software development comfortably for the last 10 years but to keep ourselves relevant and stay employed, we need to move out of our comfort zone and learn new things.åÊ This session will focus on the latest trend of the DevOps movement as well as some soft skills that a developer should have to make ourselves marketable and/or stay employed.
The syslog-ng BoF is a possibility to talk to fellow syslog-ng users, share your experiences and hear others stories. You can also ask questions and share your features ideas with the syslog-ng evangelist.
In this day and age, technology is implemented in every aspect of life. However, the benefits of new advances in technology come with costs, such as the pressing issue of cyber security. Both hackers and security experts employ a wide variety of tools to test systems in order to combat possible threats. John the Ripper, or John, is an open source password decryption software used for both beneficial and corrupt intentions. By being able to understand and apply John in education, students will be able to prevent hackers from taking advantage of the common citizen.
Hashicorp's Terraform allows for the management of infrastructure as code. In this talk, Nathan Handler will discuss how Yelp utilizes Terraform to create and manage AWS ec2 resources, DNS, CDN, and SignalFx charts and dashboards (using their recently open sourced SignalForm).
Ubuntu's always been a leader in desktop usability, even when it meant making tough decisions. In 2004, that meant picking only one default office suite and web browser instead of twenty. In 2010, it meant starting the design of a new interface called Unity. In 2017, it meant re-adopting GNOME Shell and making it familiar to Ubuntu users. Nathan will take you through the story behind these decisions, and show you what you'll find in Ubuntu 18.04 LTS and beyond.
In DevSecOps, the motivation is to embed security patterns and practices into existing DevOps capabilities thereby creating a similar equilibria with increased organizational performance. In this session we are going to observe the IT security practices over the past 10 years that one might suggest have had a metaphorically “felonious” narrative based on the resultant outcomes.
The story of #badgelife, the hardware demoscene of custom electronic conference badges. This talk will include the risks and perils of small-scale hardware manufacturing on an extremely constrained timetable and virtually no budget. This talk will also cover the last frontier of PCB art -- full-color circuit board art, from custom soldermask and silkscreen to novel processes that have not been seen in production.
Whether running Postgres on premise or in the Cloud, on Docker, in Kubernetes pods, or anywhere else you can imagine, the principles of replication remain the same. Let's discuss PostgreSQL's streaming and logical replication methods - what options there are and what they mean, how to set them, and how to keep it all running. We'll discuss the term High Availability in the context of a database, and compare this with Recoverability. We'll discuss advantages and caveats of both replication methods, and we'll discuss in which situations they are each useful.