Presentations

Tom Lechner
Audience: Beginner
Topic: LibreGraphics

When plants move around in video games, it adds atmosphere, wether a gentle breeze or gale force winds. We will walk through some methods to create and animate grass and trees, using all open source software such as the Godot game engine, Blender, Gimp, and Krita. In this workshop, there will be a bit of texturing, a bit of simple mesh modeling, and a bit of mostly simple shader coding!

Fatima Khalid
Audience: Developer

Explore of world of AI models through the story of training your dragon. Using the narrative metaphor in parallel, we will cover the fundamentals of collecting and preparing data, testing and validating data, tuning models, and decision-making with machine learning. The metaphor will help make the learnings memorable.

Adriana Villela, Ana Margarita Medina
Audience: Beginner
Topic: Cloud Native

Infrastructure-as-Code (IaC) allows engineers to manage infrastructure through code, ensuring a safe, consistent, and repeatable process. As IaC gains popularity, various tools have emerged to support it.

In this session, aimed at DevOps, SRE, and Platform Engineering professionals, Adriana and Ana will explore and compare three open-source IaC tools: Pulumi, Crossplane, and OpenTofu, helping attendees understand the capabilities of these tools and choose the one that best fits their needs.

Daniel Baker
Topic: PlanetNix

Curious about the Nix module system but don’t know where to start? This talk introduces the core concepts and basics of the Nix module system, designed for those new to Nix. We’ll break down how it works, why it’s so powerful for declarative configuration, and how you can start using it for your own projects. No prior experience is required—just a willingness to explore and learn!

Michal Nasiadka, Bartosz Bezak
Audience: Everyone

This talk will highlight the ongoing challenges with implementing OpenStack Neutron ML2/OVN and Ironic/SR-IOV external ports.

Nuri Halperin
Audience: Intermediate

Is the term "AI" obfuscating every practical conversation about everything? Can we cut through the noise and ride this wave by understanding, designing, and deploying a new breed of search, fully integrated with your existing data and database? Yes, yes, we can!
This talk will dig into the weeds of vector search. We'll explore both the core math of the technology, as well as the applicability to a wide variety of use cases. We'll differentiate it from preceding search technologies and find how it fits within an overall data retrieval strategy.

Paul Yu
Audience: Everyone
Topic: Cloud Native

In Kubernetes 1.30 authentication just got a whole lot hotter! Join us as we explore Kubernetes Structured Authentication Configuration, including support for multiple JWT authenticators and policy-based access control with CEL. Drop the command line argument - we’ll show you how to navigate the centralized config file approach.

Daniil Fedotov
Audience: Intermediate
Topic: Cloud Native

Modern cloud applications and platforms make it easy to use multiple data services and tools resulting in wide range of deployments, services and data stores within an organization.
This poses a challenge for data protection and disaster recovery because all those tools have their own mechanisms, datastores and recommendations for backup and restore.
In this talk we're going to learn how to use K8s tools to organize data protection processes and make day2 operations easier using CNCF project Kanister.

Patrick BEAUCAMP
Audience: Everyone

This session introduce a Dashboard-AI architecture running on Kata container

The platform is powered by LLM image to provide services such as data analysis, data forecast and dashboard generation

Usage of kata container allows us to scale and monitor a cluster of secured images

Ildiko Vancsa
Audience: Beginner

Get a technology overview of how Kata Containers, an open source, secure container runtime project, utilizes virtualization technology to overcome the biggest gap in traditional containers, the lack of isolation. The project is running in production in large public clouds, financial institutions, and being utilized for machine learning use cases to ensure data privacy. For an additional layer of protection Kata can be integrated with the Confidential Containers (CoCo) project, which brings confidential computing mechanisms into the container space.