arrow_back View All Dates
07:30 JST
09:00 JST
10:25 JST
11:10 JST
Monsters in the Deps: How to Protect Your AI/ML Systems from Supply Chain Attacks - Erin Glass & Patrick Smyth, Chainguard Hall B (4)
Deep-Dive in VirtIO: Virtualized AGL with VirtIO to Achieve Cloud-Native Environment Parity - Kazuki Kuzu, Panasonic Automotive Systems Co., Ltd. Hall B (3)
Exploring Best Practice for Implementing Authn and Authz in a Cloud-Native Environment - Yoshiyuki Tabata, Hitachi Hall A (3)
Revolutionizing Cross-Platform AI in Containers: The Future with WebGPU - Aditya Soni, Forrester & Seema Saharan, Autodesk Hall A (2)
Desktop Linux War Stories - Anna Aitchison, Callcare Hall A (4)
Surviving Project Abandonment: Meteor.js Case Study - Jan Dvorak, Literary Universe Hall A (1)
What's Happening in Japan? The Current Situation of SBOM - Ayumi Watanabe, Hitachi Solutions, Ltd. Main Hall
12:00 JST
12:40 JST
14:00 JST
Building a Thriving Open-Source AI Community with LF AI & Data Foundation - Vini Jaiswal, TikTok Hall B (4)
Possibility of Dynamic Rebalance in Multi-node HPC Vehicle Environment for SDV - Bucci Kawabuchi, EPAM Hall B (3)
Careless Use of Memory-Backed Ephemeral Disks in Kubernetes Can Result in Node Crashes - Shu Muto, NEC Solution Innovators, Ltd. Hall A (3)
Dynamic Scaling of GPUs for Container Apps with Composable Disaggregated Infrastructure for AI Era - Jin Hase & Lei Zhang, Fsas Technologies Inc. Hall A (2)
Lessons Learned on Following Security Best Practices in Zephyr - Kate Stewart, The Linux Foundation Meeting Room 1
The Year in Open Source Security - Marta Rybczynska, Ygreky Hall A (4)
Empowering Growth: The Community-Driven Roadmap for Open Source Companies - Khushboo Verma, Appwrite Hall A (1)
Analysis of and Lessons from the Xz-Utils Vulnerability – What Might Come Next? - Taku Shimosawa & Atsuya Kato, Hitachi, Ltd. Main Hall
14:50 JST
15:30 JST
15:50 JST
Data Contracts Are Good for AI - Jean-Georges Perrin, Bitol / AbeaData Hall B (4)
Meeting Software License Compliance Policies During the Inbound Process: A Practical Approach - Julian Coccia, SCANOSS Hall B (3)
Security for AI and Multi-Party Collaboration with Confidential Computing (Oh, and Web3!) - Mike Bursell, Confidential Computing Consortium Hall A (3)
Build a Container Image from Scratch - Danish Prakash, SUSE Hall A (2)
Secure and Efficient Sensing Applications with Wasm: Sony's Edge Virtualization Platform (EVP) - Dan Mihai Dumitriu, Midokura (Sony Group) Meeting Room 1
Advancing Device Passthrough in Linux: A Deep Dive Into VFIO, IOMMU, and PCI Enhancements - Afzal Hasan, Samsung Semiconductor India Research Hall A (4)
What I Learned from Participating in the Kubernetes Upstream Community - Akihito Inou, NEC Solution Innovators, Ltd. Hall A (1)
The Dark Side of AI: The Hidden Risks in Open-Source AI Models - Tal Folkman, Checkmarx Main Hall
16:40 JST