Presented by: Andrew Clay Shafer
Everything you never wanted to know about Brewer's CAP theorem interspersed with random musings that you probably won't like or understand.
Presented by: Evan 'Rabble' Henshaw-Plath
The airlines, fares, and frequent flyer programs a complicated semi-opaque rules based system. Systems are hackable. This talk will show examples of how to hack and manipulate. It'll include how to fly around the world, in first class, for free. How to get free upgrades, and why somebody would do a mile run.
Presented by: Piers Cawley
We've all got photos of ourselves on badges that look dreadful. This talk covers a few simple things that you can do when someone points a camera at you that'll help you look good.
Presented by: Sarah Novotny
i've been trying to hire female DBAs into my company for 10 years. i'd like to share some of the reasons i think women who chose alternate careers might be smarter than i am.
it's hard to sell operations to anyone. on the other hand, many women I know are the fantastic at logistics. should the new slogan for IT operations be "it's nursing for the future trans-humanists"?
Presented by: James Turner
Print journalism is dead, at least according to the conventional wisdom. Companies are struggling to find a business model in the age of Free that can generate news product without going broke. Citizen journalism may be part of the answer, foundation-founded reporting as well. Or will the iPad and Kindle bring back the newspaper, in a new form? There's lots of questions, but are there answers?
Presented by: Paul Fenwick
Imagine travelling 'round the world
In search of new ideas.
Try things you've never done before
And face up to your fears.
Now let's mix in some open source;
Its great community.
You'll have the most amazing time
From folk who value free.
So gather round, and hear a tale
Of lessons that I know
And maybe give your own ideas
Of living 2.0
Presented by: Mark Atwood
Cloud computing, from 14,000 feet to ground level. A fast and furious overview through the mist. Will there be rainbows, or hailstones?
Presented by: Todd Ouska
This presentation goes through the story of adding security to the memcache code base. An overview of how it works will be given. Performance profiling of a secure versus an insecure memcache installation will be covered. Who should use encrypted memcache and why they should use it will be covered.
Presented by: Brian Fitzpatrick
Software is people! Writing software is rarely a solitary endeavor, especially if it's something that you do for a living. While your compiler may be your best friend because it has the stupid consistency of a ticking clock, being able to work with other people is vital to success. By means of a series of quick anecdotes, I'll share patterns and antipatterns for working with other people.
Presented by: Josh Berkus
You've seen them: the speakers who really know how to suck on stage. Don't you which you could be as bad as they are? Josh Berkus, vetran presenter, will teach you the Seven Habits so that you can be extremely mediocre too!
Presented by: Brian Lavender
This presentation will review the techniques for using a Genetic Algorithm for the development of rules for use in a network intrusion detection system and the integration of these rules into the monitoring tool, nProbe written by Luca Deri.
Presented by: John Scott
12 months ago I was going through the same infinite do-loop exercise routine: upper body, lower body, run, rinse, repeat. Bored out of my skull, with little to nothing to show for it. No more, I was recently introduced to Crossfit, which shares a number of the same characteristics of OSS: atomic units of source exercises, open participation, recombination of source exercises, competitions, DIY.