Presentations

Paul Yu
Audience: Everyone
Topic: Cloud Native

In today's rapidly evolving technology landscape, container security is paramount. Join me in exploring the cutting-edge solutions that are revolutionizing container security and strengthening the secure supply chain. In this presentation, I will delve into Project Copacetic, the CNCF sandbox project Eraser, and the CNCF graduated project FluxCD, demonstrating how these technologies can automate container scanning, patching, and deployment, creating a robust and secure container supply chain workflow.

Tom Bereknyei
Audience: Intermediate
Topic: NixCon

Low barrier of entry methods to use Nix caching and substituters

Frédéric Harper
Audience: Intermediate
Topic: Cloud Native

If you want to be successful in your cloud native journey, a good Kubernetes-native continuous deployment (CD) tool is indispensable. There are some interesting choices out there, Argo CD being one of the best. In this talk, let’s surf the sync waves together, and learn the intrinsic parts of using Argo CD to deploy, and manage applications on your clusters. We’ll explore the insightful web UI, but also play with the CLI for terminal lovers. You’ll also end up with a broader comprehension of GitOps through the lenses of Argo CD while improving your application lifecycle management (ALM)

Corey Quinn
Audience: Everyone

In the spirit of the presenter's previous "Terrible Ideas in Git" talk at SCaLE14x, Corey once again takes to the stage to demonstrate an increasingly prevalent technology via counterexample. There's no better way to learn a technology than to implement it hilariously incorrectly–and thanks to this this talk, you don't even have to do it in your own production environment by mistake.

Rob Weber
Audience: Everyone

Embedded devices are some of the most complex computer systems one might encounter. Each system is a balance of various inputs, outputs, and communication channels that are coordinated by embedded software. Testing these systems to guarantee they work is a complex task that's often overlooked. This session will explore techniques for integration testing of embedded systems, including identifying integration points where testing is needed, simulating and testing hardware I/O, and testing wireless communication and APIs, while highlighting open source tools to help get the job done.

Nick Meyer
Audience: Everyone
Topic: PostgreSQL

It is often said that "an untested backup is not a backup" but how can we turn that saying into something more actionable? And in an organization with limited engineering bandwidth, what are the most important action items to prioritize?

In this presentation, I aim to provide a practical guide on what I believe will give the greatest "bang for buck" with backup testing, and how to fold it into your operations, modeled after how we test our PostgreSQL backups at Academia.edu.

Pankaj Kedia
Topic: Kwaai Summit

We have had a front row seat as computing has evolved over the last 3 decades – from the desktop PCs to laptop PCs, from tablets to smartphones, and from single-function devices to a plethora of smart devices and wearables. With AI going pervasive on a global scale, we are at the cusp of the next personalized computing revolution – where use cases will truly be optimized for 1:1 experiences.

Samir Rashid, Anthony Tarbinian
Audience: Beginner
Topic: NixCon

Why is Nix a good choice for a home server? Learn how Nix enables maintenance free, secure, and reproducible home servers. The talk will cover why Nix is a powerful choice compared to other technologies like Docker or Ansible. It will also showcase how Nix makes it easy to get up and running with server applications such as Nginx, Wireguard, Jellyfin, Samba, and more.

David Southwell
Audience: Everyone
Topic: DevOpsDay LA

Fear sells and lately I've noticed some observability vendors using this to their advantage.  But, what's the cost of this fear?  In this lightning talk I'll discuss why you should try to avoid procuring an observability vendor for your stack and how running your own metrics stack can be reliable, fun and wise.

Jamie Coleman
Audience: Everyone
Topic: Security

Managing components and ensuring their security is crucial to prevent successful attacks. This session will take you to a galaxy far far away, to look at what went wrong in the Empire's supply chain to cause such a vulnerability to be introduced. By understanding the risks and using the right tools, we can avoid a catastrophe like the Death Star’s destruction and put a stop to any rebel scum.