Don’t Miss Out - Register Today for Just US$50!
Open Source Summit Europe

Call For Proposals (CFP)


The Open Source Summit + Embedded Linux Conference Europe
Call for Proposals is now closed.

Dates to Remember

  • CFP Closes: 11:59 PM PST on Sunday, July 26
  • CFP Notifications: Monday, August 31
  • Schedule Announcement: Thursday, September 3
  • Slide Due Date: Wednesday, October 21
  • Event Dates: Monday, October 26 – Wednesday, October 28

Suggested Topics

Linux Systems

  • Filesystems And Storage
  • Linux Kernel Development (Advanced & Beginner)
  • Mission-Critical, Real-Time Operating Systems, Real-Time, and Long Life Systems, Scientific & Medical
  • Programming Languages and Toolchains
  • Networking
  • RISC-V
  • Tracing
  • Scheduler
  • Testing & Fuzzing
  • System Boot and Security
  • Live Patching
  • BPF
  • RDMA
  • Power Management 
  • Containers and Checkpoint/Restore
  • Distribution Kernels & Distros considerations for servers, desktops, etc
  • Linux On The Desktop

Open Source Databases

  • Deployment strategies in enterprise environments
  • Open source databases in microservice architectures
  • Federating queries across external sources
  • Migrating from proprietary to open source databases
  • SQL vs. No-SQL vs. Graph Databases
  • Database as a service
  • Disaster recovery
  • High Availability & Replication
  • Backup and Restore
  • Scale out architectures – horizontal scalability
  • HTAP:  Operational and analytic convergence.
  • SQL for data science
  • High performance databases

Open Source Dependability

  • Safety Considerations when Developing Products Based on Open Source
  • Handling Security Issues in Safety-Critical Applications
  • Certifications – Lessons Learned Applying to Open Source Projects 
  • Hardening and Maintainability of Products Based on Open Source Software
  • Testability and Stability of Products Based on Open Source
  • Best Practices for Handling Vulnerabilities in Open Source Projects
  • Security Vulnerability Scanning Techniques 
  • Vulnerability Classification and Mitigations
  • Sandboxing and Code Isolation


  • Machine and Deep Learning (Framework, Libraries, Platform, Tools)
  • Reinforcement Learning 
  • Natural Language Processing
  • AI on the Edge
  • Model (Benchmarking, Training, Parameter, Format, Marketplace, Workflow, Inference, Tools)
  • Notebook Environments 
  • Data (Versioning, Format, Pipeline Management, Stream Processing, SQL Engines, Feature Engineering, Visualization, Governance, Labeling)
  • Security and Privacy
  • Trusted and Responsible AI (Explainability, Adversarial, Bias, Fairness)

Diversity Empowerment Summit (Sunday, October 25)

  • Strategies for Inclusiveness
  • Diversity Research & Metrics
  • Team Dynamics & Case Studies of Positive Outcomes from Diverse Teams
  • How to be an Ally
  • Mentorship
  • Retaining Diverse Talent

Leadership & Management

  • Community & Business Leadership
    • Incentivization and Engagement
    • Software Development Methodologies and Platforms
    • Building Internal Innersource Communities
    • Remote Team Management and Methods
    • Bug/Issue Management and Triage
    • Communication Platforms and Methods
    • Open Source Governance and Models
    • Mentoring and Training
    • Event Strategy
    • Content Management and Social Media
    • DevOps Culture
    • Community Management
    • Advocacy and Evangelism
  • Open Source Program Office Management
    • Creation and Best Practices of Open Source Program Offices (OSPOs)
    • Consuming and Contributing to Open Source
    • Managing Competing Corporate Interests While Driving Coherent Communities
    • How to Vet the Viability of OS Projects
    • Open Source + Startup Business Models
    • Internal vs External Developer Adoption
    • Handling License Obligations in Organizations

Embedded Linux Conference (ELC)

  • Audio, Video, Streaming Media and Graphics
  • System Size
  • Boot Speed
  • Real-Time Linux – Performance, Tuning and Mainlining
  • SDKs for Embedded Products
  • Flash Memory Devices and Filesystems
  • Build Systems, Embedded Distributions and Development Tools
  • Linux in Devices such as Mobile Phones, DVRs, TV, Cameras, etc
  • Use of Linux in Automotive
  • Drones and Robots
  • Linux in the Internet of Things and Edge Computing
  • Practical Experiences and War Stories
  • Standards
  • Public Infrastructure
  • Industrial Automation
  • Security


  • Outside World Meets IoT RTOSes
    • NTP and Synchronization
    • Sensor Interaction
    • Connected Sensors
    • EMF/RFI Impact
    • Power and Other Resource Constraints 
    • Code Footprint Minimization
  • Open Source Firmware
    • Secure Bootloaders & Firmware
    • Trusted Update Support
    • Open Hardware Support
  • Power, Footprint & Configuration management
  • Communication technologies and secure communication to the Edge
  • Considerations for use in Sandboxes and Non Linux virtualization
  • Edge Computing Considerations

Cloud Infrastructure

  • Open Cloud Infrastructure
  • Multi Cloud
  • Containers and Distributed Edge
  • Virtualization
  • Container and Infrastructure Security

Cloud App Developer Experience

  • CI/CD, Configuration Management
  • Cloud-native Application Development
  • Cloud-native Developer and Operator Experience
  • Observability: Metrics, Logging, Tracing, Service Mesh
  • Serverless and Functions-as-a-Service

Introductory/101 Level Technical Training

  • Embedded Essentials
    • Kernel Basics
    • Working with Bootloaders
    • Driver Models & Device Trees
    • Embedded Drivers
    • GDB Debugging
    • Root Filesystem Builders
    • Embedded User Spaces
    • Introduction to IoT
  • Linux Administration Essentials
    • Introduction to Working with Open Source Software
    • Achieving Bash Mastery
    • Troubleshooting the Network
    • Monitoring Your System 
    • Tracing
    • Networking Basics
    • Understanding Linux Security
    • Overcoming Scaling Challenges
  • Cloud Administration Essentials
    • Cloud Infrastructure 101
    • Cloud-native App Developer 101
    • Serverless 101
    • Introduction to Xen
    • Introduction to KVM
    • Introduction to LXD and System Containers
    • Introduction to Docker containers
    • Introduction to Kubernetes
    • Introduction to Software Defined Networking
    • Introduction to Cloud Foundry 


  • Open Source Project Updates
  • WebAssembly (Wasm)
  • Emerging Platforms (Software & Hardware)
  • Networking & Orchestration
  • Blockchain
  • Open Hardware

Submission Types

  • Session Presentation (40-50 minutes in length)
  • Panel Discussion (40-50 minutes in length)
  • Birds of a Feather Session (BoFs are typically held in the evenings, from 45 minutes – and up to 1 hour in length)
  • Tutorial (1.5 – 2 hours in length)
  • Lightning Talk (5-10 minutes in length)

Important Notes

  • All speakers are required to adhere to our Code of Conduct. We also highly recommend that speakers take our online Inclusive Speaker Orientation Course.
  • When submitting a talk, you will be asked to select the Key Topic Area in which you’d like to submit. You may only submit for One Key Topic Area so please review all carefully before making your selection. We understand that some proposals could potentially fit into multiple topic areas. Don’t worry, our program chairs are working together to move proposals to other areas as needed for additional review.
  • Panel submissions must include the names of all participants in the initial submission to be considered. In addition, The Linux Foundation does not accept submissions with all-male panels in an effort to increase speaker diversity.
  • Complimentary Passes For Speakers – One complimentary pass for the event will be provided for the accepted primary speaker per submission, and a substantially discounted pass will be available for co-speakers. For panel sessions, all panelists will receive a complimentary pass. 
  • Avoid sales or marketing pitches and discussing unlicensed or potentially closed-source technologies when preparing your proposal; these talks are almost always rejected due to the fact that they take away from the integrity of our events, and are rarely well-received by conference attendees
  • All accepted speakers are required to submit their slides prior to the event

Preparing to Submit Your Proposal

While it is not our intention to provide you with strict instructions on how to prepare your proposal, we hope you will take a moment to review the following guidelines that we have put together to help you prepare the best submission possible. To get started, here are three things that you should consider before submitting your proposal:

  1. What are you hoping to get from your presentation?
  2. What do you expect the audience to gain from your presentation?
  3. How will your presentation help better the ecosystem?

There are plenty of ways to give a presentation about projects and technologies without focusing on company-specific efforts. Remember the things to consider that we mentioned above when writing your proposal and think of ways to make it interesting for attendees while still letting you share your experiences, educate the community about an issue, or generate interest in a project.

First Time Submitting? Don’t Feel Intimidated

Linux Foundation events are an excellent way to get to know the community and share your ideas and the work that you are doing and we strongly encourage first-time speakers to submit talks for our events. In the instance that you aren’t sure about your abstract, reach out to us and we will be more than happy to work with you on your proposal.

How To Give a Great Tech Talk

In the instance that your talk is accepted, we want to make sure that you give the best presentation possible. To do this, we enlisted the help of seasoned conference speaker Josh Berkus who has prepared an in-depth tutorial on “How to Give a Great Tech Talk”.

Part 1:

Part 2:

Code of Conduct

The Linux Foundation is dedicated to providing a harassment-free experience for participants at all of our events. We encourage all submitters to review our complete Code of Conduct.