Call for Proposals (CFP)

If you have not yet used the CFP system, you will be required to register and create an account before submitting.
Please CREATE YOUR ACCOUNT before submitting for the first time. Thank you!

Submit a Proposal

Dates to Remember

  • CFP Opens: Tuesday, January 15, 2019 
  • CFP Closes: Sunday, June 16 at 11:59 PM PST 
  • CFP Notifications: Friday, July 5, 2019
  • Schedule Announcement: Wednesday, July 10, 2019
  • Slide Due Date: Monday, September 16, 2019
  • Event Dates: Monday, September 23 – Wednesday, September 25, 2019

Tracks & Suggested Topics

Track 1: Artificial Intelligence (AI) & Machine Learning (ML)

  • Technology Building Blocks: Deep Learning Algorithms, AI/ML, Intent-based, Data Sharing, Autonomous Networks, Self Driving Networks, Analytics, Closed Loop Control…
  • AI/ML Use Cases Applied to Networking (Telecom, Enterprise and Cloud Networking)
  • How can AI & ML be used at Network Edge/Edge Cloud & IOT
  • Closed Loop Control, Analytics and AI in Network Operations

Track 2: IoT & Edge

  • Connected Devices, IOT, Edge Cloud, Telco, Enterprise, Cloud/OTT
  • New Killer Apps for Edge
  • Open Source Projects & Edge (Connected Cars/Automotive Grade Linux, LF Energy, CNCF/Edge Cloud, Edge & AI/ML/DL…)
  • Securely Communicating from Device to Cloud
  • Authentication and Update of Devices Connected to the Edge

Track 3: Cloud Native Networking 

  • VNF-> CNF (Virtual Network Functions to Cloud-Native Network Functions)
  • Container Evolution
  • CNCF/Kubernetes and Telecom (Service Mesh, Cross Cloud CI, Scaling)
  • Enterprise Apps
  • Scaling – Public, Private
  • Issues to Fix & Address – Remaining Challenges
  • Cloud Network Interface
  • Kubernetes
  • Lessons Learned and Requirements from Cloud Networking

Track 4: 5G, Network Automation & DevOps

  • Getting ready for 5G
  • O-RAN and Access Technologies
  • Edge Cloud for Telecom
  • VNF Onboarding
  • Next Gen Transport and Software-Defined Optical technologies
  • Core Open Source Networking Stack for Global Telecom (Automation/Zero Touch) Orchestration/MANO, Control
  • Hybrid Clouds/On Prem
  • Skills for Network Admins
  • Operation and Deployment of Open Networking
  • NextGen OSS/BSS
  • Architecture: Innovation, Trends, Business and Process Innovation
  • Standards (SDO) and Open Source Software
  • Open Hardware and Open Software Security
  • Bringing Adjacent Open Source Projects and Networking Together in 2019

Track 5: Enterprise IT 

  • Next Gen Workloads
  • Data Center Networking
  • Software Defined Apps
  • Hybrid IT & DevOps
  • Cloud Foundry/App Development, Modern Business Apps Requirements on IT, Digital Transformation
  • 5G Impacts on Enterprise Verticals (Automotive, Retail, Health, Utilities, Manufacturing, etc.)

Session Types

You will need to choose a session type when submitting:

  • Session Presentation – Typically 30-40 minutes in length
  • Panel Discussion – Typically 30-40 minutes in length. Again, all panelist names must be included in the submission, and all-male panels will not be considered.
  • Lightning Talk – Typically 5-10 minutes


  • This is your chance to *sell* your talk to the program committee, so do your best to highlight the problem/contribution/work that you are addressing in your presentation. The technical details are still important, but the relevance of what you are presenting will help the program committee during the selection process.
  • This is the abstract that will be posted on the website schedule, so please ensure that it is in complete sentences (and not just bullet points) and that it is written in the third person (use your name instead of I).

Example: Kernel Weather Report (Jon Corbet, – The Linux kernel is at the core of any Linux system; the performance and capabilities of the kernel will, in the end, place an upper bound on what the system can do as a whole. In this presentation, Jon Corbet will review recent events in the kernel development community, discuss the current state of the kernel, the challenges it faces, and look forward to how the kernel may address those challenges.

Audience – Describe who the audience is and what you expect them to gain from your presentation.

Example: Kernel Weather Report (Jon Corbet, – The audience is anyone interested in Linux kernel development. Attendees can expect a detailed update on the upcoming kernel release, including recent release history, highlighted features, active employer statistics and much more.

Why Should the Audience Attend and/or Care – Tell us why the audience should care about your proposal and/or why they would attend this session (and please limit to 3 bullet points).

We realize that this can be a difficult question to answer, but as with the abstract, the relevance of your presentation is just as important as the content.

Example: 1. This presentation will help existing and new kernel developers better understand the state of the Linux kernel 2. It will hopefully encourage them, and the companies that they work for, to participate more in upstream kernel development.

Experience LevelSelect the experience level (Beginner, Intermediate, Advanced, Any) of those who should attend this session.

Code of Conduct

The Linux Foundation and its project communities are dedicated to providing a harassment-free experience for participants at all of our events. Linux Foundation events are working conferences intended for professional networking and collaboration within the open source community. They exist to encourage the open exchange of ideas and expression and require an environment that recognizes the inherent worth of every person and group. While at Linux Foundation events or related ancillary or social events, any participants, including members, speakers, attendees, volunteers, sponsors, exhibitors, booth staff and anyone else, should not engage in harassment in any form.

This Code of Conduct may be revised at any time by The Linux Foundation and the terms are non-negotiable. Your registration for or attendance at any Linux Foundation event indicates your agreement to abide by this policy and its terms.


All event participants are expected to behave in accordance with professional standards, with both this Code of Conduct as well as their respective employer’s policies governing appropriate workplace behavior and applicable laws.


Harassment will not be tolerated in any form, including, but not limited to, harassment based on gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion or any other status protected by laws in which the conference or program is being held. Harassment includes the use of abusive, offensive or degrading language, intimidation, stalking, harassing photography or recording, inappropriate physical contact, sexual imagery and unwelcome sexual advances or requests for sexual favors. Any report of harassment at one of our events will be addressed immediately. Participants asked to stop any harassing behavior are expected to comply immediately. Anyone who witnesses or is subjected to unacceptable behavior should notify a conference organizer at once.

Exhibitors should not use sexualized images, activities, or other material in their booths and must refrain from the use of sexualized clothing, uniforms, costumes, or otherwise creating a sexualized environment. Speakers should not use sexual language, images, or any language or images that would constitute harassment as defined above in their talks.

Individuals who participate (or plan to participate) in Linux Foundation events should conduct themselves at all times in a manner that comports with both the letter and spirit of this policy prohibiting harassment and abusive behavior, whether before, during or after the event.  This includes statements made in social media postings, online publications, text messages, and all other forms of electronic communication.


If a participant engages in harassing behavior, the conference organizers may take any action they deem appropriate depending on the circumstances, ranging from the issuance of a warning to the offending individual to expulsion from the conference with no refund. The Linux Foundation reserves the right to exclude any participant found to be engaging in harassing behavior from participating in any further Linux Foundation events, training or other activities.

If a participant (or individual wishing to participate in a Linux Foundation event), through postings on social media or other online publications or another form of electronic communication, engages in conduct that violates this policy, whether before, during or after a Linux Foundation event, the Linux Foundation may take appropriate corrective action, which could include imposing a temporary or permanent ban on an individual’s participation in future Linux Foundation events.


If you are being harassed, notice that someone else is being harassed, or have any other concerns relating to harassment, please contact a member of conference staff immediately. Conference staff can be identified by t-shirts/staff badges onsite, and an organizer can be found at the event registration counter at any time. You are also encouraged to contact Angela Brown, General Manager, Events at angela (at) linuxfoundation (dot) org.


Our staff has had incident response training and responds to harassment reports and does so in accordance with the process recommended by the Ada Initiative. As referenced above, if a participant engages in harassing behavior, the conference organizers may take any action they deem appropriate, ranging from the issuance of a warning to the offending individual to expulsion from the conference with no refund, depending on the circumstances. The Linux Foundation reserves the right to exclude any participant found to be engaging in harassing behavior from participating in any further Linux Foundation events, training or other activities.

Conference staff will also provide support to victims, including, but not limited to:

  • Providing an escort
  • Contacting hotel/venue security or local law enforcement
  • Briefing key event staff to for response/victim assistance
  • And otherwise assisting those experiencing harassment to ensure that they feel safe for the duration of the conference.


If you are planning to attend an upcoming event and have concerns regarding another individual who may be present, please contact Angela Brown at angela (at) linuxfoundation (dot) org. Precautions will be taken to ensure your comfort and safety, including, but not limited to: providing an escort, prepping onsite event staff, keeping victim and harasser from attending the same talks/social events and providing onsite contact cell phone numbers for immediate contact.

Preparing To Submit Your Proposal

While it is not our intention to provide you with strict instructions on how to prepare your proposal, we hope you will take a moment to review the following guidelines that we have put together to help you prepare the best submission possible. To get started, here are three things that you should consider before submitting your proposal:

  1. What are you hoping to get from your presentation?
  2. What do you expect the audience to gain from your presentation?
  3. How will your presentation help better the ecosystem?

There are plenty of ways to give a presentation about projects and technologies without focusing on company-specific efforts. Remember the things to consider that we mentioned above when writing your proposal and think of ways to make it interesting for attendees while still letting you share your experiences, educate the community about an issue, or generate interest in a project.

First Time Submitting? Don’t Feel Intimidated

Linux Foundation events are an excellent way to get to know the community and share your ideas and the work that you are doing and we strongly encourage first-time speakers to submit talks for our events. In the instance that you aren’t sure about your abstract, reach out to us and we will be more than happy to work with you on your proposal.

How To Give a Great Tech Talk

In the instance that your talk is accepted, we want to make sure that you give the best presentation possible. To do this, we enlisted the help of seasoned conference speaker Josh Berkus who has prepared an in-depth tutorial on “How to Give a Great Tech Talk”.

Part 1:

Part 2:

Please see below for a high-level view of the selection criteria for Open Networking Summit Europe 2019.

  1. Coverage of all layers of architecture and all 5 tracks is important. Abstracts should be clear and relevant to the track submitted (eg Tech or business)
  2. Similar topics (including opposing views) could also be grouped into a joint presentation/panel to make it interesting.
  3. Product Pitches are not well received and get lower ratings/scores.
  4. Open Source + Open Networking usage/reference including deployment examples are rated higher.
  5. Speaker qualification is important to tailor to the audience based on the track (eg no marketing speakers in a tech track).
  6. End Users get a higher priority all things being equal.
  7. Future/forward-looking topics get a slight advantage along with actual deployment examples based on projects. (Note to project submissions: Any submission that simply re-iterates project content is not rated highly. Eg what is ONAP or ONAP Beijing Architecture or OPNFV Upcoming Release or Container Networking etc. This information can be obtained through TSC calls and Wiki. The goal is to show usage OR forward-looking ideas of how projects impact adjacent areas. Also, very specific open source tools for debugging or use in single vendor/user network are rated lower.
  8. The diversity of speakers & organizations is important.
  9. In a case of “conflict” (eg company submission, personal submission etc.) reviewers are asked to please use professional judgment and refrain from rating their submissions or their own company’s submissions.
  10. All scheduled content is confidential until the schedule comes out.

Important Notes

  • All speakers are required to adhere to our Code of Conduct. We also highly recommend that speakers take our online Inclusive Speaker Orientation Course.
  • Panel submissions must include the names of all participants in the initial submission to be considered. In addition, The Linux Foundation does not accept submissions with all-male panels in an effort to increase speaker diversity.
  • Complimentary Passes For Speakers – One complimentary pass for the event will be provided per submission. In the instance that a submission has a co-speaker, they will receive a 40% discount off the all-access attendee registration price. For accepted panel discussions, up to 4 panelists, + 1 moderator will receive a complimentary event pass; additional panelists will receive a 40% discount off the all-access attendee registration price
  • Avoid sales or marketing pitches and discussing unlicensed or potentially closed-source technologies when preparing your proposal; these talks are almost always rejected due to the fact that they take away from the integrity of our events, and are rarely well-received by conference attendees
  • All accepted speakers are required to submit their slides prior to the event