Presentations

Vinit Dhatrak
Audience: Everyone
Topic: Career Day

Cracking the FAANG interviews. 

 

This session would cover coding, system design, and behavioral, such as leveraging previous work experiences and life experiences to demonstrate qualities that most of these companies seek.

 

I'd provide samples from my own interviewing experience at companies like Google, Amazong, Netflix, Microsoft, etc. 

Jared Bernard
Audience: Everyone
Topic: General

Graphical interfaces are bloated and bog down your system. Free yourself from the GUI by liberating yourself at the CLI. Learn how to do all the things you thought you needed a GUI for in the terminal, such as watching Youtube videos, reading and editing MS Office documents and replacing MS Word, Excel and Powerpoint, listening to music, browse the modern Internet including images, staying up-to-date and interact on social media, check your email, play games and so much more. Keep your New Year's resolution by dumping that GUI weight and run lean and mean in the CLI. 

Nick Johnstone
Topic: PlanetNix

I have a confession: I love Nix. So much so, that I want to use it to build all my software. But there's a catch - why is Nix so slow? My search for answers began with a bash loop run amok, and ends with Fantail - a new frontend development server powered by Nix and Haskell, with builds 5x faster than the Nix CLI. If you've ever looked up at the sky and wondered if it's possible to use the Nix C++ interface to cache Flake inputs in-memory, this is the talk for you. If not, come along anyway!

Tom Lechner
Audience: Beginner
Topic: LibreGraphics

When plants move around in video games, it adds atmosphere, wether a gentle breeze or gale force winds. We will walk through some methods to create and animate grass and trees, using all open source software such as the Godot game engine, Blender, Gimp, and Krita. In this workshop, there will be a bit of texturing, a bit of simple mesh modeling, and a bit of mostly simple shader coding!

Max vonBlankenburg
Topic: SunSecCon

For anyone that has ever had a job in vulnerability management, sifting through endless amounts of poorly written, ambiguous, misleading vulnerability advisories has never been a fun part of the job. Information is often withheld or left out, their descriptions are hard to understand, and sometimes they are unfortunately just plain wrong. For a long time, vulnerability databases like the NVD have been heralded as a single source of truth when they, like all things, are fallible. My aim is to bring attention to this problem, and to help security researchers.

Adriana Villela, Ana Margarita Medina
Audience: Beginner
Topic: Cloud Native

Infrastructure-as-Code (IaC) allows engineers to manage infrastructure through code, ensuring a safe, consistent, and repeatable process. As IaC gains popularity, various tools have emerged to support it.

In this session, aimed at DevOps, SRE, and Platform Engineering professionals, Adriana and Ana will explore and compare three open-source IaC tools: Pulumi, Crossplane, and OpenTofu, helping attendees understand the capabilities of these tools and choose the one that best fits their needs.

Daniel Baker
Topic: PlanetNix

Curious about the Nix module system but don’t know where to start? This talk introduces the core concepts and basics of the Nix module system, designed for those new to Nix. We’ll break down how it works, why it’s so powerful for declarative configuration, and how you can start using it for your own projects. No prior experience is required—just a willingness to explore and learn!

Michal Nasiadka, Bartosz Bezak
Audience: Everyone

This talk will highlight the ongoing challenges with implementing OpenStack Neutron ML2/OVN and Ironic/SR-IOV external ports.

Nuri Halperin
Audience: Intermediate

Is the term "AI" obfuscating every practical conversation about everything? Can we cut through the noise and ride this wave by understanding, designing, and deploying a new breed of search, fully integrated with your existing data and database? Yes, yes, we can!
This talk will dig into the weeds of vector search. We'll explore both the core math of the technology, as well as the applicability to a wide variety of use cases. We'll differentiate it from preceding search technologies and find how it fits within an overall data retrieval strategy.

Paul Yu
Audience: Everyone
Topic: Cloud Native

In Kubernetes 1.30 authentication just got a whole lot hotter! Join us as we explore Kubernetes Structured Authentication Configuration, including support for multiple JWT authenticators and policy-based access control with CEL. Drop the command line argument - we’ll show you how to navigate the centralized config file approach.