Saturday |
|
TEDective Opening up European Public Procurement Data |
Graph Systems and Algorithms |
10:30 |
10:55 |
|
On the HashGNN node embedding algorithm A new algorithm in GDS 2.3 |
Graph Systems and Algorithms |
11:00 |
11:25 |
|
ipysigma: a Jupyter widget for interactive visual network analysis |
Graph Systems and Algorithms |
11:30 |
11:55 |
|
A case for DAG databases Correlating revision history with CI results |
Graph Systems and Algorithms |
12:00 |
12:25 |
|
Visualization paradigm that will (potentially) replace force layouts Visualization paradigm that allows an effective arrangement of the graph, through the use of AI |
Graph Systems and Algorithms |
12:30 |
12:55 |
|
Graph Stream Zoomer A window-based graph stream grouping system based on Apache Flink |
Graph Systems and Algorithms |
13:00 |
13:25 |
|
The LDBC Social Network Benchmark |
Graph Systems and Algorithms |
13:30 |
13:55 |
|
Gephi towards v1.0: the codebase, and the rest |
Graph Systems and Algorithms |
14:00 |
14:25 |
|
Collaborating with Collabora Online How to re-use Collabora in your work or project |
Collaboration and Content Management |
15:00 |
15:25 |
|
Migrating from proprietary to Open-Source knowledge management tools |
Collaboration and Content Management |
15:30 |
15:55 |
|
Deploy an enterprise search server with Fess Search GitLab, Redmine, and repositories with a single query |
Collaboration and Content Management |
16:00 |
16:25 |
|
Optimizing your core application for integration Learnings from integrating OpenProject with Nextcloud |
Collaboration and Content Management |
16:30 |
16:55 |
|
Nextcloud Numbers and Hubs Our traditional yearly overview of what's new in Nextcloud |
Collaboration and Content Management |
17:00 |
17:25 |
|
The Relentless March of Markdown And its arrival in Tiki 25 |
Collaboration and Content Management |
17:30 |
17:55 |
|
Privacy and Collaboration How CryptPad lets you have both |
Collaboration and Content Management |
18:00 |
18:25 |
|
Transparent, asynchronous, efficient communication How the Zulip open-source team chat application addresses the needs of open-source and research communities |
Collaboration and Content Management |
18:30 |
18:55 |
Sunday |
|
Self-Hosting (Almost) All The Way Down A FPGA-based Fedora-capable computer that can rebuild its own bitstream |
RISC-V |
09:00 |
09:40 |
|
QtRVSim—Education from Assembly to Pipeline, Cache Performance, and C Level Programming |
RISC-V |
09:40 |
10:20 |
|
Porting RISC-V to GNU Guix A year in review |
RISC-V |
10:20 |
11:00 |
|
Linux on RISC-V Status and progress of RISC-V support in Gentoo Linux and other Linux distributions |
RISC-V |
11:00 |
11:40 |
|
How to add an GCC builtin to the RISC-V compiler |
RISC-V |
11:40 |
12:20 |
|
Bringing up the OpenHW Group RISC-V tool chains |
RISC-V |
12:20 |
13:00 |
|
We need a Let’s Encrypt movement for Confidential Computing The importance of protecting data in use |
Confidential Computing |
13:10 |
13:30 |
|
LSKV: Democratising Confidential Computing from the Core |
Confidential Computing |
13:30 |
13:50 |
|
Keeping safety-critical programs alive when Linux isn’t able to Using OP-TEE to deliver availability to applications in a Trusted Execution Environment. |
Confidential Computing |
13:50 |
14:10 |
|
Open Source Confidential Computing with RISC-V |
Confidential Computing |
14:20 |
14:45 |
|
Introduction to Secure Execution for s390x KVM confidential VMs on IBM Z |
Confidential Computing |
14:50 |
15:15 |
|
Tilting a Pyramid Confidentiality in a Cloud Native Environment |
Confidential Computing |
15:30 |
15:55 |
|
Salmiac: Running unmodified container images in Nitro Enclaves |
Confidential Computing |
16:00 |
16:25 |
|
Autonomous Confidential Kubernetes How to securely manage K8s from within K8s |
Confidential Computing |
16:30 |
16:55 |
|
Devroom closing and goodbye |
Confidential Computing |
16:55 |
17:00 |