Presentations
How we empowered our modern development teams to find, fix and prevent vulnerabilities related to source code, open source libraries, secret management and cloud configuration by creating a continuous security integration server using a github web app, the Octokit library, and open source SAST repos. We are looking to give back to the community and make this project available through open source.

You have successfully installed Kubernetes. Heck! you even did it the hard way. Now what?
Backups are important! Everyone makes mistakes, bugs are easily overlooked, hardware will fail eventually. If you don't want to lose data when disaster strikes, your backups will be your savior.

Backups are important! Everyone makes mistakes, bugs are easily overlooked, hardware will fail eventually. If you don't want to lose data when disaster strikes, your backups will be your savior. In this talk I will guide you through some of the most common backup techniques for #MySQL that we use in 2022.

Nobody complains where the database is fast. But adding one index speeds things up. But the second index makes things worse? There is a lot of mythology about indexes in the MySQL area and this talk will show that getting performance out of an index is simple engineering and not magic. You will walk out of this session knowing how indexes are built, how to use them to provide better information to the query optimizer, and how to make sure that what you are doing is a positive change and not hurting your instance performance.

Regardless of the operational parameters and deployment models of the apps and services that power your organization, all modern applications depend on the network to deliver. The NetFlow family of protocols and their cloud equivalents play an important role in understanding how your workloads interact with the network, and how those interactions impact user experience. In this session we will dive into what flows are, how to interpret them to gain visibility, and how some real organizations have benefited from these insights by leveraging an entirely open-source monitoring stack.

"Don't break userspace" is one of Linux's core tenets. The rule allows distros to upgrade the kernel independently of userspace. What does the phrase actually mean in 2022? What parts of the kernel's interface are stable and safe for userspace code to rely on? Kernel contributors interpret the commandment to mean that no changes to kernel should trigger non-backward-compatible changes to the /sys filesystem. What about the dmesg log, devicetree, BPF, /dev files, command-line, tracepoints and filesystem metadata?

Nulls are a very useful but also very error-prone relational database feature. This talk is designed to help applications developers better manage their use of nulls. It covers the use of nulls in relational databases, with a focus on Postgres behaviour. It covers three-value logic, comparing nulls, mapping nulls to strings, indexing nulls, and aggregates.

Stop using the Microsoft Northwind Database Schema. Rolling your own is always a compromise. Quick-start your project with a fully baked FOSS Business Database Schema. All the TABLEs, VIEWs and PROCEDUREs you initially need have already been created. Come see a brief walk-through of just some of the included features. * People and Entity management * Double Entry Accounting * Inventory Movement * Email Subscribe Lists * Time Periods * and so much more.

The goal of this talk is to provide some resources to help everyone feel included and welcome as a conference speaker. Open source conferences are always striving to increase the diversity of their speakers by recruiting new speakers and encouraging people from underrepresented groups to submit talks. But how do you decide what topic to cover? What can you do to help your topic stand out? How do you prevent imposter syndrome from getting in the way of your success as a speaker?