Presentations

Tom King
Topic: Workshops

Linux is a robust and secure operating system with a rich array of applications. SCALE is once again providing those who want to start using Linux an opportunity to learn how. SCALE will provide an installfest plus basic system administration class to help you hit the ground running with Linux. The class will be offered as an Installfest on Saturday, morning March 8, and a full day of training on Sunday 9th. Advanced registration is required.

Tom King
Topic: Workshops

Linux is a robust and secure operating system with a rich array of applications. SCALE is once again providing those who want to start using Linux an opportunity to learn how. SCALE will provide an installfest plus basic system administration class to help you hit the ground running with Linux. The class will be offered as an Installfest on Saturday, morning March 8, and a full day of training on Sunday 9th. Advanced registration is required.

Angelina Vu
Audience: Intermediate

With the number of Linux kernel vulnerabilities rising, prioritizing security is essential. While the kernel offers many built-in self protection mechanisms, some gaps remain. We propose Linux Virtualization Based Security (LVBS), a security feature that can a) harden the kernel and b) ensure that critical kernel resources remain untampered, even if the kernel gets compromised. VBS uses virtualization and the hypervisor to create a more privileged, isolated virtual environment, called Virtual Trust Level 1 (VTL1). VTL1 has its own kernel where a number of security solutions are hosted.

Noah Chelliah
Topic: Ubucon

Join us for a live recording of the AskNoah show where we'll be discussing all the things happening around the Ubuntu world!

Matt Ingenthron
Audience: Developer

You need your own data to be useful with AI and large language models (LLMs). How do you go about that? There has been a lot of focus on making applications intelligent using the power of AI with the help of (LLMs). We will cover how to add intelligence to existing applications with an overview of different techniques starting from prompt engineering, using vector stores to improve the results, and building intelligent agents to solve a problem.

You will learn about the techniques using open-source frameworks to build LLM-powered applications like LangChain & LlamaIndex.

Krista Burdine
Audience: Everyone
Topic: Career Day

Open source is known as the remarkable collaboration of passionate minds coming together to share tech ideas and solutions for the good of the world. Yet ideally the benefit of open source collaboration is a two-way street. Join us as we look at ways to translate what we do in open source into resume-worthy skills.

Topic: Kwaai Summit

State Space Models (SSMs) are emerging as a powerful alternative to the transformer-based architectures that dominate today's language models, offering greater efficiency and scalability for modern AI applications. This talk explores how SSMs are transforming AI by reducing computational overhead while maintaining strong performance. Attendees will gain insights into the fundamental principles of state space models, their real-world applications, and the cutting-edge research being conducted at Kwaai to further enhance their capabilities.

August Cho
Audience: Beginner

This October, I started following along with Linux from Scratch by Gerard Beekmans with the hopes of constructing my own Linux distribution. As with most things computer-related, the simple process I expected turned out to be a tedious, complex, and tiresome one, especially for a relatively inexperienced Linux user like myself. Join me as I tell the story of how I finally made my distribution and try to show the outstanding benefits "doing it yourself" can have with respect to computers and beyond.

Divya KK, Srirama Sharma
Audience: Intermediate
Topic: Security

Confidential Computing is a technology that enables processing of sensitive data in a secure enclave that is a Hardware based trusted execution environment (TEE). With this technology, data in use becomes inaccessible to even internal administrators, thus enabling technical assurance of data security instead of operational assurance. In this session, we will cover how OpenStack can be used as a cloud control plane to manage a Confidential Computing Infrastructure, its provisioning and life cycle management.

James Blair
Audience: Intermediate

The Zuul project gating system is used to test changes across multiple git repositories and code review systems before they merge.  For the past 12 years, it has relied on an external program called Nodepool to manage test resources and image builds.

A brief overview of Zuul for those who are new to the project, and share how to manage test nodes and images with Zuul's newest features.