Saturday |
|
Automated Implementation of PCI-DSS compliant solution using open-source tools Meet business (PCI DSS) requirements in instant time |
Security |
10:30 |
10:55 |
|
Identity Management with midPoint |
Security |
11:00 |
11:25 |
|
Security in IoT; more a cultural chock than a technical challenge How to create secured IoT device without increasing developement complexity |
Security |
11:30 |
11:55 |
|
Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara |
Security |
12:00 |
12:25 |
|
IoT meets Security |
Security |
12:30 |
12:55 |
|
Tizen 3.0 platform security model Security framework for constraining applications' privileges |
Security |
13:00 |
13:25 |
|
USBGuard Take control over your USB devices |
Security |
13:30 |
13:55 |
|
Can we run C code and be safe? A Linux system protected with Address Sanitizer |
Security |
14:00 |
14:25 |
|
Lessons learned running SSL at scale How to run large, nuanced SSL deployments effectively |
Security |
14:30 |
14:55 |
|
An overview openconnect VPN |
Security |
15:00 |
15:25 |
|
Xen Project Security Response War Stories War stories from the XenProject security response process |
Security |
15:30 |
15:55 |
|
Ramping up Security at an open-source startup: Lessons learned. |
Security |
16:00 |
16:25 |
|
F-Droid: building the private, unblockable app store your app store does not need to know who you are |
Security |
16:30 |
16:55 |
|
Testing Cryptography in WolfSSL |
Security |
17:00 |
17:25 |
Sunday |
|
Unified Framework for Big Data Foreign Data Wrappers (FDW) |
PostgreSQL |
11:00 |
11:50 |
|
Improving Postgres' Buffer Manager |
PostgreSQL |
12:00 |
12:50 |
|
JSON By Example |
PostgreSQL |
13:00 |
13:50 |
|
Explaining the Postgres Query Optimizer |
PostgreSQL |
14:00 |
14:50 |
|
UPSERT use cases |
PostgreSQL |
15:00 |
15:50 |
|
Using PostgreSQL for Bibliographic Data |
PostgreSQL |
16:00 |
16:50 |