Event Details

OSCON

Time: May 16, 2016 to May 19, 2016
Location: Austin
City/Town: Austin
Website or Map: http://conferences.oreilly.co…
Event Type: conference
Organized By: Oreilly Media
Latest Activity: Dec 8, 2015

Export to Outlook or iCal (.ics)

Event Description

Once considered a radical upstart, open source has moved from disruption to default. Its methods and culture commoditized the technologies that drove the Internet revolution and transformed the practice of software development. Collaborative and transparent, open source has become modus operandi, powering the next wave of innovation in cloud, data, and mobile technologies.

OSCON is where all of the pieces come together: developers, innovators, businesspeople, and investors. In the early days, this trailblazing O'Reilly event was focused on changing mainstream business thinking and practices; today OSCON is about real-world practices and how to successfully implement open source in your workflow or projects. While the open source community has always been viewed as building the future—that future is here, and it's everywhere you look. Since 1999, OSCON has been the best place on the planet to experience the open source ecosystem. At OSCON, you'll find everything open source: languages, communities, best practices, products and services. Rather than focus on a single language or aspect, such as cloud computing, OSCON allows you to learn about and practice the entire range of open source technologies.

In keeping with its O'Reilly heritage, OSCON is a unique gathering where participants find inspiration, confront new challenges, share their expertise, renew bonds to community, make significant connections, and find ways to give back to the open source movement. The event has also become one of the most important venues to announce groundbreaking open source projects and products.

"For those who have not been to OSCON, it's a great technical conference covering the whole spectrum of open source, including Linux, MySQL, the LAMP stack, Perl, Python, Ruby on Rails, middleware, applications, cloud computing, and more. OSCON always has great keynotes, tutorials, and evening Birds-of-a-Feather sessions. As with many conferences, a lot of the meat takes place in hallway conversations and impromptu sessions." —Zack Urlocker, InfoWorld

Experience OSCON

OSCON 2016 will educate, provoke, and inspire, with:

  • Hundreds of sessions covering the full range of open source languages and platforms
  • Practical tutorials that go deep into technical skills, new features and applications, and best practices
  • Inspirational (and relevant) keynote presentations
  • Over 4,000 open source developers, hackers, experts, vendors, and users of all levels—many of whom share your interests
  • An Expo Hall packed with an impressive array of open source projects and products
  • A vibrant "hallway track" where attendees, speakers, journalists, and vendors debate and discuss important issues
  • Fun evening events and receptions, Birds of a Feather sessions, awards ceremonies, late night parties, OSCON activities around town, and plenty of networking opportunities for everyone

Comment Wall

Comment

RSVP for OSCON to add comments!

Join Codetown

Attending (1)

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

European Initiative for Data Sovereignty Released a Trust Framework

The Danube release of the Gaia-X trust framework provides mechanisms for the automation of compliance and supports interoperability across sectors and geographies to ensure trusted data transactions and service interactions. The Gaia-X Summit 2025 hosted facilitated discussions on AI and data sovereignty, and presented data space solutions that support innovation across Europe and beyond.

By Ben Linders

AWS Launches European Sovereign Cloud Amid Questions About U.S. Legal Jurisdiction

AWS has launched its European Sovereign Cloud with a €7.8 billion investment, designed to meet EU regulatory demands and address data privacy concerns amid geopolitical tensions. Despite its operational separation from global regions, questions linger about legal protections against U.S. data access. Competitors like Microsoft and local providers may present stronger sovereignty options.

By Steef-Jan Wiggers

Presentation: How to Unlock Insights and Enable Discovery Within Petabytes of Autonomous Driving Data

Kyra Mozley discusses the evolution of autonomous vehicle perception, moving beyond expensive manual labeling to an embedding-first architecture. She explains how to leverage foundation models like CLIP and SAM for auto-labeling, RAG-inspired search, and few-shot adapters. This talk provides engineering leaders a blueprint for building modular, scalable vision systems that thrive on edge cases.

By Kyra Mozley

Article Series - AI Assisted Development: Real World Patterns, Pitfalls, and Production Readiness

In this series, we examine what happens after the proof of concept and how AI becomes part of the software delivery pipeline. As AI transitions from proof of concept to production, teams are discovering that the challenge extends beyond model performance to include architecture, process, and accountability. This transition is redefining what constitutes good software engineering.

By Arthur Casals

How CyberArk Protects AI Agents with Instruction Detectors and History-Aware Validation

To prevent agents from obeying malicious instructions hidden in external data, all text entering an agent's context must be treated as untrusted, says Niv Rabin, principal software architect at AI-security firm CyberArk. His team developed an approach based on instruction detection and history-aware validation to protect against both malicious input data and context-history poisoning.

By Sergio De Simone

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service