The premier event for open source developers, technologists, and community leaders to collaborate, share information, solve problems, and gain knowledge, furthering open source innovation and ensuring a sustainable open source ecosystem. It is the gathering place for open source code and community contributors.
Open Source Summit is a conference umbrella composed of a collection of events covering the most important technologies, topics, and issues affecting open source today.
Please be aware that the Linux Foundation will now be utilizing Sessionize for CFP submissions. Sessionize is a cloud-basedevent content management software designed to be intuitive and user-friendly. If you need guidance, please review how to submit your session for an event to see step-by-step instructions and helpful screenshots.
dates to remember
CFP Closes: Sunday, July 7, 12:00 AM PDT (UTC-7) / 1600 JST (UTC+9)
CFP Notifications: Wednesday, August 21
Schedule Announcement: Wednesday, August 28
Event Dates: Monday, October 28 – Tuesday, October 29, 2024
Open Source Summit JAPAN 2024 Microconference Events & Suggested Topics
Gathering attendees from the global companies leading and accelerating the development and adoption of a fully open software stack for the connected car.
Advanced Driver Assistance Systems (ADAS)
AGL Distribution and Design Considerations
AGL Application Design, Application Framework
AGL Instrument Cluster Applications
AGL Security
AGL Tools
AGL Long-team Support and Maintenance
AI and Machine Learning
Augmented Reality, Heads-Up Display
Autonomous Driving and Advanced Driver Assistance Systems (ADAS)
Connected Car Technologies
Delivering Live Content and Updates to Vehicles in Motion
CloudOpen provides valuable content across cloud native and cloud infrastructure technologies. It is where cloud developers, engineers and operations teams can discover new tools, projects, platforms and technologies across cloud native and cloud infrastructure.
Open Cloud Infrastructure
Hybrid & Multicloud
Edge Cloud Computing
Container-Native Virtualization
Container and Infrastructure Security
Cloud Native Storage
Infrastructure-as-Code
CI/CD, Configuration Management
Cloud-native Application Development
Architectures and Architectural Patterns
APIs
Testing
WebAssembly
Cloud-native Developer and Operator Experience
Confidential Computing
Observability: Metrics, Logging, Tracing, Service Mesh
Serverless and Functions-as-a-Service
Security, Authentication, and Compliance
Policy Agents
Supply Chain Management
Data Flow Management
Containers are revolutionizing the way workloads are automated, deployed and scaled, and ContainerCon is where teams can learn more about why and how to adopt containerization to further automation, portability and efficiency.
Observability: Metrics, Logging, Tracing, Service Mesh
Security/Authentication
Storage and Databases
APIs, SDKs, Frameworks and Libraries
Migration and Refactoring
Remote and Cloud-based Developer Environments
Reproducible Builds and Environments
Debugging
As open source is found more and more in safety-critical products and infrastructure, the need to ensure dependability and reliability has increased. This event gathers developers focused on solving these issues, to figure out how we can increase the confidence of using OS projects in safety, mission, and business-critical applications.
Testing and Hardening
Testability and Stability of Products based on Open Source Projects
Best Practices for Verification for Dependability
Best Practices for Update Policies and Practices
Maintainability of Products based on Open Source Projects
Automated Regressions and Management of Test Evidence
Cyber Security Considerations
Best Practices for Improving Software Transparency with SBOMs
Best Practices for Vulnerability Classification, Exploitability Assessment, and Mitigations
Best Practices for Vulnerability Detection and Reporting
Best Practices for Managing Security Incident Responses (PSIRT teams, etc.)
Safety-Critical Considerations
Safety Considerations when Developing Products based on Open Source Projects
Sandboxing and Code Isolation Techniques
Management of Security Issues in Safety-critical Applications
Best Practices for Working with Certification Authorities
Traceability between Requirements, Source, and Testing Evidence
The Embedded IoT Summit is where system architects, firmware developers and software developers working on resource constrained embedded and IoT products can learn and collaborate for increased development velocity and maximum innovation.
Best Practices working with Resource Constraints
Code Footprint Minimization
Sensor Interaction
Power Usage
Open Hardware Support
Hardware/Software tradeoffs for acceleration technologies
Cybersecurity & Safety Considerations for Systems not based on Linux
Best Practices for Handling Vulnerabilities in Open Source Projects
Secure Bootloaders and Trusted Update Support
Secure Communication to the Edge
Considerations for Use in Sandboxes and Non-Linux Virtualization
Best Practices for Determining the Scope of Edge Autonomy
Outside World Meets IoT RTOSes
NTP and Synchronization
Connected Sensors
EMF/RFI Impact
Real-Time considerations
Communication technologies
LinuxCon is an event for maintainers, developers and project leads in the Linux community to gather for updates, education, collaboration, and problem-solving to further the Linux ecosystem.
Filesystems and Storage
Linux Kernel Development (Advanced & Beginner)
Mission-Critical, Real-Time, and Long Life Systems (Scientific & Medical)
Distribution Kernels & Distros Considerations for Servers, Desktops, etc.
Linux on the Desktop
Virtualization
Networking
Performance & Benchmarks
Rust
Open Source Leadership Summit fosters innovation, growth and partnerships among the leading projects and corporations working in open technology development. It is a must-attend for business and technical leaders looking to advance open source strategy, implementation and investment.
Best Practices in Open Source Development / Lessons Learned
Growing, Managing & Sustaining Open Source Projects
Security and Risk Management
Open Source Governance and Models
Certifying Open Source Projects & Compliance
Leveraging Open Source Technology, Incentivization and Engagement
Software Development Methodologies and Platforms
Building Internal Innersource Communities
Remote Team Management and Methods
Bug/Issue Management and Triage
Communication Platforms and Methods; Content Management and Social Media
Mentoring and Training
Culture, Community Management, Advocacy and Evangelism
The Operations Management Summit (OMS) is designed to bridge the intricacies of open source consumption, compliance, and management. Designed for organizations aiming to streamline software processes, OMS confronts the challenges of discoverability and understanding in Process-related open projects.
Delve into comprehensive discussions that reveal the ties between compliance, community involvement, and enterprise open source management. Whether your focus is on licensing, a Software Bill of Materials (SBOM), or unique management structures, OMS offers insights to fit every organizational mold.
CxO Strategy Management
Internal Stakeholder Engagement & Partnerships
Organization Risk Management
Adherence to Government Requirements
Leveraging Standards for Process Management
Applying best practices for procurement
Applying Best Practices for and M&As & Divestments
Remediation Strategy
Sustainability Strategy
Managing Customer Expectations & Contractual Requirements with Regards to OS
Working with Legal to Reduce Risk
Working with Outside Legal Counsel on Open Source Matters
Tooling and Shareable Processes for All of the Above
An event for those working in open source program offices (OSPOs) in organizations that rely on open source technologies to learn and share best practices, experiences, and tooling to overcome challenges they face.
OSPO Lessons Learned
OSPO Compliance and Legal
OSPOs and Engineering Effectiveness
OSPOs and Supply Chain Security
Developer Advocacy and Ecosystem Participation
Hosting Projects and Communities
OSPOs in Academia and Government
Cybersecurity incidents are among the greatest threats facing organizations today. This event, held in partnership with OpenSSF and CNCF, gathers security practitioners, open source developers, and others interested in software supply chain security to; explore the security threats affecting the software supply chain, share best practices and mitigation tactics and Increase knowledge about how to best secure open source software.
Measuring Risk of Potential & Already-included OSS
Countering Source Code Level Problems
Reducing the Likelihood of Vulnerabilities (e.g., eliminating entire classes)
Countering Subverted Source Code Control Systems
Countering Build Threats
Simplifying Verified Reproducible Builds
Ensuring Safe Transition from Source Code Control to Build System
Countering Compromised Build System
Countering Bypassed CI/CD
Countering Subverted Package Repository
Countering use of Bad Package
Countering Dependency Threats
Countering use of a Bad Dependency (e.g., Typosquatting and Dependency Confusion)
Detecting malicious reused software
Ensuring users Know, with Confidence, what Software Components (at all tiers) are Included.
submission types
Session Presentation (typically 30-40 minutes in length)
Panel Discussion (typically 30-40 minutes in length)
Lightning Talk (5-10 minutes in length)
Birds of a Feather (typically 45 minutes to one hour in length)
Tutorial/Hands-on Lab (typically 1.5 hours in length)
Panel submissions must include the names of all participants in the initial submission to be considered. In addition, The Linux Foundation does not accept submissions with all-male panels in an effort to increase speaker diversity.
Complimentary Passes For Speakers – One complimentary pass for the event will be provided for the accepted speaker(s) per submission.
Avoid sales or marketing pitches and discussing unlicensed or potentially closed-source technologies when preparing your proposal; these talks are almost always rejected due to the fact that they take away from the integrity of our events, and are rarely well-received by conference attendees.
All accepted speakers are required to submit their slides prior to the event.
preparing to submit your proposal
While it is not our intention to provide you with strict instructions on how to prepare your proposal, we hope you will take a moment to review the following guidelines that we have put together to help you prepare the best submission possible. To get started, here are three things that you should consider before submitting your proposal:
What are you hoping to get from your presentation?
What do you expect the audience to gain from your presentation?
How will your presentation help better the ecosystem?
There are plenty of ways to give a presentation about projects and technologies without focusing on company-specific efforts. Remember the things to consider that we mentioned above when writing your proposal and think of ways to make it interesting for attendees while still letting you share your experiences, educate the community about an issue, or generate interest in a project.
How to Give a Great Talk
We want to make sure submitters receive resources to help put together a great submission and if accepted, give the best presentation possible. To help do this, we recommend viewing seasoned speaker Dawn Foster’s in-depth session titled Overcoming Imposter Syndrome to Become a Conference Speaker!.
Have More Questions?First Time Submitting? Don’t Feel Intimidated
Linux Foundation events are an excellent way to get to know the community and share your ideas and the work that you are doing and we strongly encourage first-time speakers to submit talks for our events. In the instance that you aren’t sure about your abstract, reach out to us and we will be more than happy to work with you on your proposal.
code of conduct
The Linux Foundation is dedicated to providing a harassment-free experience for participants at all of our events. We encourage all submitters to review our complete Code of Conduct.