Event Details

OSCON

Time: July 20, 2015 to July 24, 2015
Location: Portland
City/Town: Portland, OR
Website or Map: http://www.oscon.com/open-sou…
Event Type: conference
Organized By: O'Reilly Press
Latest Activity: Mar 10, 2015

Export to Outlook or iCal (.ics)

Event Description

OSCON celebrates, defines, and demonstrates the power of open source in the world today. From small businesses to the enterprise, open source is the first choice of IT everywhere.

OSCON, the open source community's annual gathering

Open source is now found everywhere--from the bottom of the programming stack to the very top--so we're changing the way we organize these stories at OSCON. We've adopted a more holistic approach, focusing on the following topics as a means to consider and solve critical, real-world problems:

  • Identity – An emerging and nuanced facet in the digital age and an exciting cross-functional track at OSCON 2015.
  • Security – We'll explore security from top to bottom, offering frameworks and libraries, strategies for testing, and field reports of both security failure and success.
  • Privacy – Computers remember our interactions at a level of detail the physical world never has. Do we want to be remembered, and for how long?
  • Performance – From compilation and interpreter time to DOM manipulation, browser responsiveness, and network latency, we'll explore performance in all its facets.
  • Mobility – We'll look at what it means to have a successful mobile game plan, from wearables to native apps.
  • People – Making projects work requires communications, collaboration, and respect; we'll look at the ways a new generation of tools and approaches can help you work.
  • Architecture – Software architecture is a massive multidisciplinary subject, covering many roles and responsibilities--and a key position in the success of any business.
  • Scale – You’ve created a great web interface that is well designed, secure, and works well in a beta with 100 consumers, but how about 10,000, 1,000,000, or more?
  • Storage – Find your way among the myriad choices for storing data and optimizing your systems for stability, distribution, convenience, and performance.
  • Teaching – You want to share your best practices, projects, and tools with the world, but how do you go about sharing this knowledge? We'll examine learning theory and methods of teaching.
  • Design – It's critical for success; learn how to incorporate design best practices from the very beginning of your project and all the way through.
  • Solve – Harness the power of math to manipulate, secure, and create data.
  • Data – Let's tackle data’s continued, growing influence over the entire business world and how you can make it work for you.
  • Foundations – A strong foundation in computational thinking, problem solving, and programming best practices makes for a successful programmer.

Stay tuned. We'll unveil the preliminary program and open registration in March.

Important Dates

  • All proposers notified - By March 2015
  • Program Announced and Registration Opens - March 2015

Comment Wall

Comment

RSVP for OSCON to add comments!

Join Codetown

Attending (1)

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Designing a Multi-Agent System for Engineering Support at Scale: A Case Study From Grab

Grab’s Central Data Team built a multi-agent AI system to automate repetitive engineering support tasks across its data warehouse platform. The system separates investigation and enhancement workflows using specialized agents coordinated via an orchestration layer. It reduces operational load, improves resolution speed, and shifts engineering effort from firefighting to platform engineering work.

By Leela Kumili

Presentation: The AI Gateway: Scaling Centralized Inference Across Decentralized Teams

Meryem Arik discusses why modern engineering teams face "inference chaos" and how AI model gateways provide a critical control layer. She explains the balance between empowering decentralized teams to choose the best models and maintaining centralized oversight for security, RBAC, and cost control. Explore open-source solutions like LiteLLM and Doubleword to streamline your AI infra.

By Meryem Arik

OpenAI Outlines WebRTC Architecture for Low-Latency Voice AI at Scale

OpenAI recently outlined how it adapted WebRTC for low-latency voice AI at global scale. The new architecture replaced a conventional media termination model with a relay-transceiver design better suited to Kubernetes and cloud load balancers. It keeps WebRTC session state in a dedicated transceiver layer while using relays to reduce public UDP exposure and keep media routing close to users.

By Eran Stiller

Pip 26.1 Ships Dependency Cooldowns and Experimental Lockfile Support to Combat Supply Chain Attacks

Pip 26.1 ships dependency cooldowns that enforce a waiting period before newly published packages can be installed, and experimental pylock.toml lockfile support from PEP 751. Research shows a 7-day cooldown would have prevented 8 out of 10 analyzed supply chain attacks from reaching end users.

By Steef-Jan Wiggers

Anthropic Introduces MCP Tunnels for Private Agent Access to Internal Systems

Anthropic has expanded its Claude Managed Agents platform with two enterprise-focused capabilities: self-hosted sandboxes and MCP tunnels. The release aims to address a recurring challenge in enterprise AI deployments, where organizations want to use autonomous agents but cannot allow execution environments or internal systems to leave their security perimeter.

By Robert Krzaczyński

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service