Presentations

Mohamed Elsakhawy
Audience: Advanced

Linux networking is multi-component, complex and hard to undestand. This session explains the internals of Linux networking by following the lifetime of a packet recieving and sending. The session will expain the fundamental concepts of Linux networking and will explains the role of the NIC drivers, packet buffers , IRQ handlers and how they interact with the Linux network stack and the userspace programs. The session aims to help Linux engineeers understand and make the right decisions with respect to Linux Networking

Lori Lorusso, Katherine Druckman
Audience: Everyone
Topic: Cloud Native

In this talk you will learn how to navigate the CNCF Landscape to find information about our projects. You will learn how to search by category & maturity, and understand how organizations use these projects in production. The goal is for you to be confident in your ability to traverse the landscape so the next time you "go to the website" you will find what you need.

Quentin Deslandes
Audience: Intermediate

What if your firewall could be faster while using fewer resources? Coupling widely available solutions (nftables, iptables) with bleeding-edge technologies (BPF), bpfilter aims to simplify firewalls and bring better performance to everyone.

Scott Bly
Audience: Everyone
Topic: DevOpsDay LA

DevOps tooling and CI/CD pipelines manage product release cycles while Dev Ops teams work well together. A DevSecOps transformation to Shift Left and test code security in pipelines has begun. But how do you integrate Security teams into DevOps to achieve true DevSecOps? Then, how do you integrate APIs, as they are behavior-based? Traditional AppSec can’t identify vulnerabilities in API consumption. Learn how to bring API testing into DevSecOps to improve MTTR and keep your teams happy!

Patrick Shuff
Audience: Advanced

In the rapidly evolving landscape of 2024, Site Reliability Engineering (SRE) continues to play a pivotal role in scaling and maintaining resilient, high-availability systems. This talk delves into the critical networking knowledge that every SRE should possess to effectively manage and debug large-scale internet facing infrastructure.

- Overview of Linux Networking
- Overview of LAN concepts
- Overview of DNS
- Overview of TCP/IP
- Overview of Internet Security
- Overview of Internet Routing
- Overview of Linux Network Debugging tools

Xe iaso
Audience: Developer

AI chatbots are cool, but they are O(money) expensive or potentially run on some provider’s hardware with no real agency as to how and when things change. Today we’re going to learn how to design your own personal AI agent without breaking the bank and while retaining control of every part of the stack.

Gulcin YildirimJelinek, Andrew Farries
Audience: Everyone
Topic: PostgreSQL

Understanding table-level locks in Postgres is a quite useful skill as almost all DDL operations require acquiring one of the different types of table-level locks on the object being manipulated. If not managed well, schema changes can result in downtime. In this talk we will explain fundamentals of table-level locking, covering how different types of locks are applied and queued during schema changes. Attendees will learn how to identify and manage lock conflicts to minimize downtime, avoid deadlocks, and maintain smooth database operations, even during high-concurrency schema changes.

Addison Hart
Audience: Beginner
Topic: Developer

Modern day APIs sometimes feel like demos for the main product, but it doesn't have to be that way. Developers continue to innovate by providing new sources of useful data that inspire creative new projects. In this talk, Addison Hart, a reverse engineer and data scientist with experience in geospatial, video game APIs and many others, will talk about what he has learned about making APIs, both from operating them and picking apart existing ones while reverse engineering. He will discuss API latency, quantity, coverage and quality and how these 4 aspects contribute to an APIs effectiveness.

Alexander Rubin
Audience: Intermediate
Topic: Security

Meet an attacking MySQL honepot which can “Attack the attackers”. With this atomic honeypot we were able to discover 2 new attacks against MySQL servers. Using arbitrary file read vulnerability in MySQL we were able to download and analyze the attackers' code and then execute an “attack against attackers” using a chain of exploits.

Autumn Nash
Audience: Developer
Topic: Developer

Barbie movie serves as a compelling analogy for understanding CI/CD in software development. Through a structured analysis of key plot points, attendees will gain a deeper understanding of CI/CD concepts and their practical applications in real-world scenarios.