Registration
Opening
Hacking Consumer Experiences
Hacking Consumer Experiences - how to digital + physical technology is the new frontier
Peter CorbettReproducible builds
Whilst anyone can inspect the source code of free software for malicious flaws, most Linux distributions provide binary (or "compiled") packages to end users. The motivation behind "reproducible" builds is to allow verification that no flaws have been introduced during this compilation process by promising identical binary packages are always generated from a given source. This prevents against the installation of backdoor-introducing malware on developers' machines - an attacker would need to simultaneously infect all developers attempting to reproduce the build. Currently only a handful of standalone projects advertise as being reproducible. Whilst admirable, expanding this to an entire operating system is necessary to avoid the underlying system becoming the weak link in the chain. Furthermore, a reproducible build has a wide variety technical advantages, including implicitly removing non-deterministic or unsafe behaviour (such as downloading third-party code from the internet), detecting corrupted build environments, reducing time-to-detection of a build host compromise, as well as numerous other debugging and testing advantages.
Chris LambNext generation Free Software Marketing
Freedom is in your binaries and your manuals, but what about your marketing? Free Software companies require cutting-edge tools for growth hacking, and a new generation of Free Software apps are ready to serve. Witness a modern marketing stack of interconnected CRM, campaign management, analytics and more, with freedom included. Witness a digital marketing pipeline including the following integrated applications: Piwik, Mautic, phpList, SuiteCRM, Campaign Chain, & Wordpress. Learn how to sell Free Software, using Free Software
Sam TukeOpen Source related International Consultancy Services
The aim of presentation is to clearly define elementary bricks of consulting services related to Open Source Strategy and Enterprise Architecture and Design
Ádám PodolcsákLunch Break (on us)
Hacking the tenders data: the quest for public spending patterns
We are trying to uncover relationships and pattern hidden in the public procurement data using, abusing and crafting free software. This is the story of how we are investigating the amazing journey of money, from the state treasury to the chosen suppliers, and the bumpy roads of Open Data.
Victor NițuWhat Ikea Instructions and Board Game manuals taught me about technical writing
Outside of my technical writing work for software projects I have been creating a board game. A board game also requires mechanics to function and players to clearly understand how these mechanics work to use and appreciate fully.
As part of my research for writing game manuals I looked at manuals for furniture, electronics, and cars to see how they explain to users how to setup and use their products.
In this presentation I will look at how the technical writing skills of different industries can learn from each other.
This will include:
- Game Manuals and tutorials
- Assembly instructions (e.g. those wonderful Ikea inserts)
- Service Manuals for electronics
And as part of looking at these case studies, the presentation will cover:
- Iconography vs Text
- The limitations of updating print manuals
- Reducing language and cultural colloquialisms
- Identifying what needs to be said and what doesn't
And by the end of the presentation I hope that everyone will have learnt a lot from each other and realize that we're all trying to achieve the same thing(s).
Chris WardThe Language of Regular Expressions. So You Think You Can Speak It?
They are everywhere, they are magical and their knowledge can help you stand out from the crowd. They are also fast and can save time. Lots of time. Do you want to understand and learn to use them properly? In this talk, we will be taking a deeper dive into regular expressions, their use, and practical examples. We will start with a short intro to the mysterious world of regexes and brush up on our knowledge before continuing on to more advanced topics. We will also be looking into how even seemingly simple regexes can be prone to errors, and how regexes might not be suitable for some, even simple, tasks. An interactive presentation with demos.
Rustam MehmandarovDevelopment-free Custom Apps for Newsrooms
Push App is an open-source, fully native, mobile app platform for publishers to generate and deliver their newsroom its own customized app with practically no coding expertise required.
Christopher GuessCoffee Break
Secure and privacy-preserving identity management
Using cryptography, next-generation identity technologies that respect users' privacy have advanced in a number of European projects. Known as anonymous credentials or Privacy-enhancing attribute based-credentials, they guarantee unlinkability, untraceability, minimal disclosure, and a number of advanced features. A common architecture with fixed API has been defined and openly made available on Github, waiting for adoption and extension with new libraries. In this talk, I will present the cool aspects of these technologies hoping to raise the awareness about the availability of such technologies, some of the challenges to reach to this point, and what could be further improved.
Fatbardh VeseliImportance of user-centered design in open source Software
Why can't open source software gain large audiences? What could developers do to build more captivating software? Open source software often seems great with lot of functionalities, but in reality, it is usually crude tools with rough design. Those unappealing interfaces with hard-to-find functions are unintuitive and frustrating to users who, in the end, decide to pay for a better user experience. Developers, in all their brilliancy, don't know their end users, don't test with target user groups and generally build software without giving much thought to design. So much effort is being made to create great solutions for free, but in the end, we fail by not asking users what they want. It is time for developers to accept the importance of design, come forward and ask designers to join them in creating better user-centered software.
Ozren MuicThe why, what and how of owning your own data
The Cloud makes life easier and more fun. But the way we currently use it also exposes our data to almost everybody - from governments to companies to criminals. The internet was designed to be a place where data was everywhere, not on just centralized on a few servers. We need to go back to that model and build federated solutions to get our privacy back, bring our data home! The Nextcloud community is building a federated and distributed network. Everyone can run an Nextcloud server at home or somewhere on the internet and collaborate and share with everyone else. Nextcloud can already be used to provide file access, syncing, sharing, calendar, contacts, music and video streaming, RSS reader and all kinds of other services in a distributed way.
Jos PoortvlietThings of Internet
Yes, you read that correctly. During this talk we will be looking at things from another perspective. The Internet of Things is being built today: all gadgets, devices, sensor are going online, talking to eachother. Soon, you will be able to receive a text message from your vacuum cleaner reminding you to restock your vacuum cleaner bags as you walk past the store. You can receive an email from your washing machine telling you that your laundry is washed and ready. While this may have sounded like something out of a sci-fi movie only a few years ago, it could soon be reality! And that's fine! But what about using these items together with the data that is already online, and combine it all in various ways? What if computers could understand the meaning and context of data without any help from us? How can this data make items you already own, or can easily get from the Internet, bring more valuable to you? We will be looking at semantic technologies, open linked data and how these can be used to enrich our everyday lives, our data and our gadgets.
Rustam Mehmandarov