Saturday |
| |
Automated Implementation of PCI-DSS compliant solution using open-source tools Meet business (PCI DSS) requirements in instant time |
Security |
10:30 |
10:55 |
| |
Identity Management with midPoint |
Security |
11:00 |
11:25 |
| |
Security in IoT; more a cultural chock than a technical challenge How to create secured IoT device without increasing developement complexity |
Security |
11:30 |
11:55 |
| |
Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara |
Security |
12:00 |
12:25 |
| |
IoT meets Security |
Security |
12:30 |
12:55 |
| |
Tizen 3.0 platform security model Security framework for constraining applications' privileges |
Security |
13:00 |
13:25 |
| |
USBGuard Take control over your USB devices |
Security |
13:30 |
13:55 |
| |
Can we run C code and be safe? A Linux system protected with Address Sanitizer |
Security |
14:00 |
14:25 |
| |
Lessons learned running SSL at scale How to run large, nuanced SSL deployments effectively |
Security |
14:30 |
14:55 |
| |
An overview openconnect VPN |
Security |
15:00 |
15:25 |
| |
Xen Project Security Response War Stories War stories from the XenProject security response process |
Security |
15:30 |
15:55 |
| |
Ramping up Security at an open-source startup: Lessons learned. |
Security |
16:00 |
16:25 |
| |
F-Droid: building the private, unblockable app store your app store does not need to know who you are |
Security |
16:30 |
16:55 |
| |
Testing Cryptography in WolfSSL |
Security |
17:00 |
17:25 |
Sunday |
| |
Unified Framework for Big Data Foreign Data Wrappers (FDW) |
PostgreSQL |
11:00 |
11:50 |
| |
Improving Postgres' Buffer Manager |
PostgreSQL |
12:00 |
12:50 |
| |
JSON By Example |
PostgreSQL |
13:00 |
13:50 |
| |
Explaining the Postgres Query Optimizer |
PostgreSQL |
14:00 |
14:50 |
| |
UPSERT use cases |
PostgreSQL |
15:00 |
15:50 |
| |
Using PostgreSQL for Bibliographic Data |
PostgreSQL |
16:00 |
16:50 |