Brussels / 4 & 5 February 2023

schedule

K.4.601


Day Start End Track(s)
Saturday 10:30 18:55 Collaboration and Content Management, Graph Systems and Algorithms
Sunday 09:00 17:00 Confidential Computing, RISC-V
09 10 11 12 13 14 15 16 17 18
Saturday TEDective
Opening up European Public Procurement Data
On the HashGNN node embedding algorithm
A new algorithm in GDS 2.3
ipysigma: a Jupyter widget for interactive visual network analysis A case for DAG databases
Correlating revision history with CI results
Visualization paradigm that will (potentially) replace force layouts
Visualization paradigm that allows an effective arrangement of the graph, through the use of AI
Graph Stream Zoomer
A window-based graph stream grouping system based on Apache Flink
The LDBC Social Network Benchmark Gephi towards v1.0: the codebase, and the rest Collaborating with Collabora Online
How to re-use Collabora in your work or project
Migrating from proprietary to Open-Source knowledge management tools Deploy an enterprise search server with Fess
Search GitLab, Redmine, and repositories with a single query
Optimizing your core application for integration
Learnings from integrating OpenProject with Nextcloud
Nextcloud Numbers and Hubs
Our traditional yearly overview of what's new in Nextcloud
The Relentless March of Markdown
And its arrival in Tiki 25
Privacy and Collaboration
How CryptPad lets you have both
Transparent, asynchronous, efficient communication
How the Zulip open-source team chat application addresses the needs of open-source and research communities
Sunday Self-Hosting (Almost) All The Way Down
A FPGA-based Fedora-capable computer that can rebuild its own bitstream
QtRVSim—Education from Assembly to Pipeline, Cache Performance, and C Level Programming Porting RISC-V to GNU Guix
A year in review
Linux on RISC-V
Status and progress of RISC-V support in Gentoo Linux and other Linux distributions
How to add an GCC builtin to the RISC-V compiler Bringing up the OpenHW Group RISC-V tool chains We need a Let’s Encrypt movement for Confidential Computing
The importance of protecting data in use
LSKV: Democratising Confidential Computing from the Core Keeping safety-critical programs alive when Linux isn’t able to
Using OP-TEE to deliver availability to applications in a Trusted Execution Environment.
Open Source Confidential Computing with RISC-V Introduction to Secure Execution for s390x
KVM confidential VMs on IBM Z
Tilting a Pyramid
Confidentiality in a Cloud Native Environment
Salmiac: Running unmodified container images in Nitro Enclaves Autonomous Confidential Kubernetes
How to securely manage K8s from within K8s
Devroom closing and goodbye

Events

Title Track Start End

Saturday

  TEDective
Opening up European Public Procurement Data
Graph Systems and Algorithms 10:30 10:55
  On the HashGNN node embedding algorithm
A new algorithm in GDS 2.3
Graph Systems and Algorithms 11:00 11:25
  ipysigma: a Jupyter widget for interactive visual network analysis Graph Systems and Algorithms 11:30 11:55
  A case for DAG databases
Correlating revision history with CI results
Graph Systems and Algorithms 12:00 12:25
  Visualization paradigm that will (potentially) replace force layouts
Visualization paradigm that allows an effective arrangement of the graph, through the use of AI
Graph Systems and Algorithms 12:30 12:55
  Graph Stream Zoomer
A window-based graph stream grouping system based on Apache Flink
Graph Systems and Algorithms 13:00 13:25
  The LDBC Social Network Benchmark Graph Systems and Algorithms 13:30 13:55
  Gephi towards v1.0: the codebase, and the rest Graph Systems and Algorithms 14:00 14:25
  Collaborating with Collabora Online
How to re-use Collabora in your work or project
Collaboration and Content Management 15:00 15:25
  Migrating from proprietary to Open-Source knowledge management tools Collaboration and Content Management 15:30 15:55
  Deploy an enterprise search server with Fess
Search GitLab, Redmine, and repositories with a single query
Collaboration and Content Management 16:00 16:25
  Optimizing your core application for integration
Learnings from integrating OpenProject with Nextcloud
Collaboration and Content Management 16:30 16:55
  Nextcloud Numbers and Hubs
Our traditional yearly overview of what's new in Nextcloud
Collaboration and Content Management 17:00 17:25
  The Relentless March of Markdown
And its arrival in Tiki 25
Collaboration and Content Management 17:30 17:55
  Privacy and Collaboration
How CryptPad lets you have both
Collaboration and Content Management 18:00 18:25
  Transparent, asynchronous, efficient communication
How the Zulip open-source team chat application addresses the needs of open-source and research communities
Collaboration and Content Management 18:30 18:55

Sunday

  Self-Hosting (Almost) All The Way Down
A FPGA-based Fedora-capable computer that can rebuild its own bitstream
RISC-V 09:00 09:40
  QtRVSim—Education from Assembly to Pipeline, Cache Performance, and C Level Programming RISC-V 09:40 10:20
  Porting RISC-V to GNU Guix
A year in review
RISC-V 10:20 11:00
  Linux on RISC-V
Status and progress of RISC-V support in Gentoo Linux and other Linux distributions
RISC-V 11:00 11:40
  How to add an GCC builtin to the RISC-V compiler RISC-V 11:40 12:20
  Bringing up the OpenHW Group RISC-V tool chains RISC-V 12:20 13:00
  We need a Let’s Encrypt movement for Confidential Computing
The importance of protecting data in use
Confidential Computing 13:10 13:30
  LSKV: Democratising Confidential Computing from the Core Confidential Computing 13:30 13:50
  Keeping safety-critical programs alive when Linux isn’t able to
Using OP-TEE to deliver availability to applications in a Trusted Execution Environment.
Confidential Computing 13:50 14:10
  Open Source Confidential Computing with RISC-V Confidential Computing 14:20 14:45
  Introduction to Secure Execution for s390x
KVM confidential VMs on IBM Z
Confidential Computing 14:50 15:15
  Tilting a Pyramid
Confidentiality in a Cloud Native Environment
Confidential Computing 15:30 15:55
  Salmiac: Running unmodified container images in Nitro Enclaves Confidential Computing 16:00 16:25
  Autonomous Confidential Kubernetes
How to securely manage K8s from within K8s
Confidential Computing 16:30 16:55
  Devroom closing and goodbye Confidential Computing 16:55 17:00