Open Source Summit Japan
A man and a woman smiling with microphones addressing attendees.

Call For Proposals (CFP)

Overview

October 28-29 | Tokyo, Japan

The premier event for open source developers, technologists, and community leaders to collaborate, share information, solve problems, and gain knowledge, furthering open source innovation and ensuring a sustainable open source ecosystem. It is the gathering place for open source code and community contributors. 

Open Source Summit is a conference umbrella composed of a collection of events covering the most important technologies, topics, and issues affecting open source today.


Please be aware that the Linux Foundation will now be utilizing Sessionize for CFP submissions
Sessionize is a cloud-based event content management software designed to be intuitive and user-friendly. If you need guidance, please review how to submit your session for an event to see step-by-step instructions and helpful screenshots.

dates to remember

  • CFP Closes: Sunday, July 7, 12:00 AM PDT (UTC-7) / 1600 JST (UTC+9)
  • CFP Notifications: Wednesday, August 21
  • Schedule Announcement: Wednesday, August 28
  • Event Dates: Monday, October 28 – Tuesday, October 29, 2024

Open Source Summit JAPAN 2024 Microconference Events & Suggested Topics

Automotive Linux Summit logo

Gathering attendees from the global companies leading and accelerating the development and adoption of a fully open software stack for the connected car.

  • Advanced Driver Assistance Systems (ADAS)
  • AGL Distribution and Design Considerations
  • AGL Application Design, Application Framework
  • AGL Instrument Cluster Applications
  • AGL Security
  • AGL Tools
  • AGL Long-team Support and Maintenance
  • AI and Machine Learning
  • Augmented Reality, Heads-Up Display
  • Autonomous Driving and Advanced Driver Assistance Systems (ADAS)
  • Connected Car Technologies
  • Delivering Live Content and Updates to Vehicles in Motion
  • Flutter for Automotive
  • Software Defined Vehicles
  • Functional Safety and Open Source Software
  • In-vehicle Infotainment (IVI)
  • Legal and Compliance Issues
  • Mobility Services
  • Navigation and Mapping
  • Non-AGL Technical Projects (e.g. Smart Roads, Self-driving Vehicles)
CloudOpen logo

CloudOpen provides valuable content across cloud native and cloud infrastructure technologies. It is where cloud developers, engineers and operations teams can discover new tools, projects, platforms and technologies across cloud native and cloud infrastructure.

  • Open Cloud Infrastructure
  • Hybrid & Multicloud
  • Edge Cloud Computing
  • Container-Native Virtualization
  • Container and Infrastructure Security
  • Cloud Native Storage
  • Infrastructure-as-Code
  • CI/CD, Configuration Management
  • Cloud-native Application Development
    • Architectures and Architectural Patterns
    • APIs
    • Testing
    • WebAssembly
  • Cloud-native Developer and Operator Experience
  • Confidential Computing
  • Observability: Metrics, Logging, Tracing, Service Mesh
  • Serverless and Functions-as-a-Service
  • Security, Authentication, and Compliance
    • Policy Agents
    • Supply Chain Management
  • Data Flow Management
ContainerCon logo

Containers are revolutionizing the way workloads are automated, deployed and scaled, and ContainerCon is where teams can learn more about why and how to adopt containerization to further automation, portability and efficiency.

  • Container Runtimes, Management and Orchestration
  • Container Images and Registries
  • CI/CD, Configuration Management, Automation, GitOps
  • Observability: Metrics, Logging, Tracing, Service Mesh
  • Security/Authentication
  • Storage and Databases
  • APIs, SDKs, Frameworks and Libraries
  • Migration and Refactoring
  • Remote and Cloud-based Developer Environments
  • Reproducible Builds and Environments
  • Debugging
Critical Software Summit Logo

As open source is found more and more in safety-critical products and infrastructure, the need to ensure dependability and reliability has increased. This event gathers developers focused on solving these issues, to figure out how we can increase the confidence of using OS projects in safety, mission, and business-critical applications.

  • Testing and Hardening
    • Testability and Stability of Products based on Open Source Projects
    • Best Practices for Verification for Dependability
    • Best Practices for Update Policies and Practices
    • Maintainability of Products based on Open Source Projects
    • Automated Regressions and Management of Test Evidence
  • Cyber Security Considerations
    • Best Practices for Improving Software Transparency with SBOMs
    • Best Practices for Vulnerability Classification, Exploitability Assessment, and Mitigations
    • Best Practices for Vulnerability Detection and Reporting
    • Best Practices for Managing Security Incident Responses (PSIRT teams, etc.)
  • Safety-Critical Considerations
    • Safety Considerations when Developing Products based on Open Source Projects
    • Sandboxing and Code Isolation Techniques
    • Management of Security Issues in Safety-critical Applications
    • Best Practices for Working with Certification Authorities
    • Traceability between Requirements, Source, and Testing Evidence
Embedded IOT Summit logo

The Embedded IoT Summit is where system architects, firmware developers and software developers working on resource constrained embedded and IoT products can learn and collaborate for increased development velocity and maximum innovation.

  • Best Practices working with Resource Constraints
    • Code Footprint Minimization
    • Sensor Interaction
    • Power Usage
    • Open Hardware Support
    • Hardware/Software tradeoffs for acceleration technologies
  • Cybersecurity & Safety Considerations for Systems not based on Linux
    • Best Practices for Handling Vulnerabilities in Open Source Projects
    • Secure Bootloaders and Trusted Update Support
    • Secure Communication to the Edge
    • Considerations for Use in Sandboxes and Non-Linux Virtualization
    • Best Practices for Determining the Scope of Edge Autonomy
  • Outside World Meets IoT RTOSes
    • NTP and Synchronization
    • Connected Sensors
    • EMF/RFI Impact
    • Real-Time considerations
    • Communication technologies
LinuxCon logo

LinuxCon is an event for maintainers, developers and project leads in the Linux community to gather for updates, education, collaboration, and problem-solving to further the Linux ecosystem.

  • Filesystems and Storage
  • Linux Kernel Development (Advanced & Beginner)
  • Mission-Critical, Real-Time, and Long Life Systems (Scientific & Medical)
  • Programming Languages and Toolchains
  • io_uring
  • Tracing
  • Scheduler
  • VFIO/IOMMU/PCI
  • Kernel Dependability (static analysis, kcov, kcov triggered fuzzing testing, fuzzing, kmsan, kcsan, kubsan, etc.)
  • System Boot
  • Security
  • Live Patching
  • eBPF
  • RDMA
  • Power Management 
  • Containers
  • Checkpoint/Restart
  • Distribution Kernels & Distros Considerations for Servers, Desktops, etc.
  • Linux on the Desktop
  • Virtualization
  • Networking
  • Performance & Benchmarks
  • Rust
Open Source Leadership Summit logo

Open Source Leadership Summit fosters innovation, growth and partnerships among the leading projects and corporations working in open technology development. It is a must-attend for business and technical leaders looking to advance open source strategy, implementation and investment.

  • Best Practices in Open Source Development / Lessons Learned
  • Growing, Managing & Sustaining Open Source Projects
  • Security and Risk Management
  • Open Source Governance and Models
  • Certifying Open Source Projects & Compliance
  • Leveraging Open Source Technology, Incentivization and Engagement
  • Software Development Methodologies and Platforms
  • Building Internal Innersource Communities
  • Remote Team Management and Methods
  • Bug/Issue Management and Triage
  • Communication Platforms and Methods; Content Management and Social Media
  • Mentoring and Training
  • Culture, Community Management, Advocacy and Evangelism
Operations Management Summit logo

The Operations Management Summit (OMS) is designed to bridge the intricacies of open source consumption, compliance, and management. Designed for organizations aiming to streamline software processes, OMS confronts the challenges of discoverability and understanding in Process-related open projects.

Delve into comprehensive discussions that reveal the ties between compliance, community involvement, and enterprise open source management. Whether your focus is on licensing, a Software Bill of Materials (SBOM), or unique management structures, OMS offers insights to fit every organizational mold.

  • CxO Strategy Management
  • Internal Stakeholder Engagement & Partnerships
  • Organization Risk Management
  • Adherence to Government Requirements
  • Leveraging Standards for Process Management
  • Applying best practices for procurement
  • Applying Best Practices for and M&As & Divestments
  • Remediation Strategy
  • Sustainability Strategy
  • Managing Customer Expectations & Contractual Requirements with Regards to OS
  • Working with Legal to Reduce Risk
  • Working with Outside Legal Counsel on Open Source Matters
  • Tooling and Shareable Processes for All of the Above
OspoCon logo

An event for those working in open source program offices (OSPOs) in organizations that rely on open source technologies to learn and share best practices, experiences, and tooling to overcome challenges they face.

  • OSPO Lessons Learned
  • OSPO Compliance and Legal
  • OSPOs and Engineering Effectiveness
  • OSPOs and Supply Chain Security
  • Developer Advocacy and Ecosystem Participation
  • Hosting Projects and Communities
  • OSPOs in Academia and Government
SupplyChainSecurityCon logo

Cybersecurity incidents are among the greatest threats facing organizations today. This event, held in partnership with OpenSSF and CNCF, gathers security practitioners, open source developers, and others interested in software supply chain security to; explore the security threats affecting the software supply chain, share best practices and mitigation tactics and Increase knowledge about how to best secure open source software.

  • Measuring Risk of Potential & Already-included OSS
  • Countering Source Code Level Problems
    • Reducing the Likelihood of Vulnerabilities (e.g., eliminating entire classes)
    • Countering Subverted Source Code Control Systems
  • Countering Build Threats
    • Simplifying Verified Reproducible Builds
    • Ensuring Safe Transition from Source Code Control to Build System
    • Countering Compromised Build System
    • Countering Bypassed CI/CD
    • Countering Subverted Package Repository
    • Countering use of Bad Package
  • Countering Dependency Threats
    • Countering use of a Bad Dependency (e.g., Typosquatting and Dependency Confusion)
    • Detecting malicious reused software
  • Ensuring users Know, with Confidence, what Software Components (at all tiers) are Included.

submission types

  • Session Presentation (typically 30-40 minutes in length)
  • Panel Discussion (typically 30-40 minutes in length)
  • Lightning Talk (5-10 minutes in length)
  • Birds of a Feather (typically 45 minutes to one hour in length)
  • Tutorial/Hands-on Lab (typically 1.5 hours in length)

important notes

  • All speakers are required to adhere to our Code of Conduct. We also highly recommend that speakers take our online Inclusive Speaker Orientation Course.
  • Panel submissions must include the names of all participants in the initial submission to be considered. In addition, The Linux Foundation does not accept submissions with all-male panels in an effort to increase speaker diversity.
  • Complimentary Passes For Speakers – One complimentary pass for the event will be provided for the accepted speaker(s) per submission.
  • Avoid sales or marketing pitches and discussing unlicensed or potentially closed-source technologies when preparing your proposal; these talks are almost always rejected due to the fact that they take away from the integrity of our events, and are rarely well-received by conference attendees.
  • All accepted speakers are required to submit their slides prior to the event.

preparing to submit your proposal

While it is not our intention to provide you with strict instructions on how to prepare your proposal, we hope you will take a moment to review the following guidelines that we have put together to help you prepare the best submission possible. To get started, here are three things that you should consider before submitting your proposal:

  1. What are you hoping to get from your presentation?
  2. What do you expect the audience to gain from your presentation?
  3. How will your presentation help better the ecosystem?

There are plenty of ways to give a presentation about projects and technologies without focusing on company-specific efforts. Remember the things to consider that we mentioned above when writing your proposal and think of ways to make it interesting for attendees while still letting you share your experiences, educate the community about an issue, or generate interest in a project.

How to Give a Great Talk

We want to make sure submitters receive resources to help put together a great submission and if accepted, give the best presentation possible. To help do this, we recommend viewing seasoned speaker Dawn Foster’s in-depth session titled Overcoming Imposter Syndrome to Become a Conference Speaker!.

Have More Questions? First Time Submitting? Don’t Feel Intimidated

Linux Foundation events are an excellent way to get to know the community and share your ideas and the work that you are doing and we strongly encourage first-time speakers to submit talks for our events. In the instance that you aren’t sure about your abstract, reach out to us and we will be more than happy to work with you on your proposal.

code of conduct

The Linux Foundation is dedicated to providing a harassment-free experience for participants at all of our events. We encourage all submitters to review our complete Code of Conduct.

Sponsors

Silver

Bronze