<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - openSUSE Conference 2019 (opus)</title>
    <link>https://media.ccc.de/c/osc19</link>
    <description> This feed contains all events from osc19 as opus</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:42:58 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/events/osc/2019/osc19_logo.png</url>
      <title>Chaos Computer Club - openSUSE Conference 2019 (opus)</title>
      <link>https://media.ccc.de/c/osc19</link>
    </image>
    <item>
      <title>Identity in OpenStack: the Challenge of Multitenancy (osc19)</title>
      <link>https://media.ccc.de/v/2525-identity-in-openstack-the-challenge-of-multitenancy</link>
      <description>Keystone is the OpenStack component responsible for identity management and
user authentication and authorization, which has unique challenges in
cloud-like environments where secure sharing of resources is an essential
requirement and yet is fundamental to the core idea of collaborative
computing. This introductory talk will give an overview of the keystone
project, including:

* The many ways users and applications can securely authenticate with
  keystone, including SAML2.0, OpenID Connect, X.509 and Kerberos
* The implications for authorization in a multitenant environment and how
  role-based access control is designed in keystone
* How keystone relates to projects outside of the OpenStack ecosystem such as
  Kubernetes

Keystone is the OpenStack component responsible for identity management and
user authentication and authorization, which has unique challenges in
cloud-like environments where secure sharing of resources is an essential
requirement and yet is fundamental to the core idea of collaborative
computing. This introductory talk will give an overview of the keystone
project, including:

* The many ways users and applications can securely authenticate with
  keystone, including SAML2.0, OpenID Connect, X.509 and Kerberos
* The implications for authorization in a multitenant environment and how
  role-based access control is designed in keystone
* How keystone relates to projects outside of the OpenStack ecosystem such as
  Kubernetes
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2525-eng-Identity_in_OpenStack_the_Challenge_of_Multitenancy_opus.opus"
        length="18874368"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2525-eng-Identity_in_OpenStack_the_Challenge_of_Multitenancy_opus.opus?1558878424</guid>
      <dc:identifier>-CVvXbWXJE9qM7F5NaSGGQ</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Colleen Murphy</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2525, Cloud and Containers</itunes:keywords>
      <itunes:summary>Keystone is the OpenStack component responsible for identity management and
user authentication and authorization, which has unique challenges in
cloud-like environments where secure sharing of resources is an essential
requirement and yet is fundamental to the core idea of collaborative
computing. This introductory talk will give an overview of the keystone
project, including:

* The many ways users and applications can securely authenticate with
  keystone, including SAML2.0, OpenID Connect, X.509 and Kerberos
* The implications for authorization in a multitenant environment and how
  role-based access control is designed in keystone
* How keystone relates to projects outside of the OpenStack ecosystem such as
  Kubernetes

Keystone is the OpenStack component responsible for identity management and
user authentication and authorization, which has unique challenges in
cloud-like environments where secure sharing of resources is an essential
requirement and yet is fundamental to the core idea of collaborative
computing. This introductory talk will give an overview of the keystone
project, including:

* The many ways users and applications can securely authenticate with
  keystone, including SAML2.0, OpenID Connect, X.509 and Kerberos
* The implications for authorization in a multitenant environment and how
  role-based access control is designed in keystone
* How keystone relates to projects outside of the OpenStack ecosystem such as
  Kubernetes
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:25</itunes:duration>
    </item>
    <item>
      <title>Æ-DIR -- Authorized Entitites Directory (osc19)</title>
      <link>https://media.ccc.de/v/2240-ae-dir-authorized-entitites-directory</link>
      <description>This talk will present a concept and real-world implementation of an identity and access management system (IAM) purely based on OpenLDAP.

The main goal of Æ-DIR (besides challenging Unicode handling in various software with its name) is to follow the delegation, need-to-know and least-privilege principles as strictly as possible. The visibility of user, group, sudoers, etc. is limited by OpenLDAP’s set-based ACLs. All systems and services, no exception(!), have to individually authenticate to be authorized to access Æ-DIR.

The talk will give some additional information about the secure base configuration of OpenLDAP and a special NSS/PAM caching demon developed for lower resource usage.

This talk will present a concept and real-world implementation of an identity and access management system (IAM) purely based on OpenLDAP.

The main goal of Æ-DIR (besides challenging Unicode handling in various software with its name) is to follow the delegation, need-to-know and least-privilege principles as strictly as possible. The visibility of user, group, sudoers, etc. is limited by OpenLDAP’s set-based ACLs. All systems and services, no exception(!), have to individually authenticate to be authorized to access Æ-DIR.

The talk will give some additional information about the secure base configuration of OpenLDAP and a special NSS/PAM caching demon developed for lower resource usage.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2240-eng-AE-DIR_--_Authorized_Entitites_Directory_opus.opus"
        length="26214400"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2240-eng-AE-DIR_--_Authorized_Entitites_Directory_opus.opus?1558878294</guid>
      <dc:identifier>dVYz0GFKsKPfIUQDmTJmqQ</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>stroeder</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2240, Open Source</itunes:keywords>
      <itunes:subtitle>Identity and Access Management with OpenLDAP</itunes:subtitle>
      <itunes:summary>This talk will present a concept and real-world implementation of an identity and access management system (IAM) purely based on OpenLDAP.

The main goal of Æ-DIR (besides challenging Unicode handling in various software with its name) is to follow the delegation, need-to-know and least-privilege principles as strictly as possible. The visibility of user, group, sudoers, etc. is limited by OpenLDAP’s set-based ACLs. All systems and services, no exception(!), have to individually authenticate to be authorized to access Æ-DIR.

The talk will give some additional information about the secure base configuration of OpenLDAP and a special NSS/PAM caching demon developed for lower resource usage.

This talk will present a concept and real-world implementation of an identity and access management system (IAM) purely based on OpenLDAP.

The main goal of Æ-DIR (besides challenging Unicode handling in various software with its name) is to follow the delegation, need-to-know and least-privilege principles as strictly as possible. The visibility of user, group, sudoers, etc. is limited by OpenLDAP’s set-based ACLs. All systems and services, no exception(!), have to individually authenticate to be authorized to access Æ-DIR.

The talk will give some additional information about the secure base configuration of OpenLDAP and a special NSS/PAM caching demon developed for lower resource usage.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:44:28</itunes:duration>
    </item>
    <item>
      <title>Business Applications as Free Software - Demystifying FUD (osc19)</title>
      <link>https://media.ccc.de/v/2282-business-applications-as-free-software-demystifying-fud</link>
      <description>Everyone knows that Free Software such as Linux, Apache or PostgreSQL are the backbone of many data centers (DC) and cloud offerings. The Internet as we know it today would not exist without Free &amp; OpenSource Software (FOSS)
But the more Free Software leaves the DC and gets closer to the &#39;Enduser&#39;, the more myth are build around FOSS. 
Linux on a Desktop? GIMP Instead of Photoshop? Running your business on a Free ERP-System? Fear, Uncertainty and Doubts (FUD) are spread to protect market share for proprietary solutions.
In this talk I will take a look at some FUD, and share some thoughts about answers to the myths.

Everyone knows that Free Software such as Linux, Apache or PostgreSQL are the backbone of many data centers (DC) and cloud offerings. The Internet as we know it today would not exist without Free &amp; OpenSource Software (FOSS)
But the more Free Software leaves the DC and gets closer to the &#39;Enduser&#39;, the more myth are build around FOSS. 
Linux on a Desktop? GIMP Instead of Photoshop? Running your business on a Free ERP-System? Fear, Uncertainty and Doubts (FUD) are spread to protect market share for proprietary solutions.
In this talk I will take a look at some FUD, and share some thoughts about answers to the myths.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2282-eng-Business_Applications_as_Free_Software_-_Demystifying_FUD_opus.opus"
        length="25165824"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2282-eng-Business_Applications_as_Free_Software_-_Demystifying_FUD_opus.opus?1558878034</guid>
      <dc:identifier>lzk3pJgMkSKPXG8vHMiwjg</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Axel Braun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2282, Open Source</itunes:keywords>
      <itunes:subtitle>You should not believe everything that Big Money tells you.....</itunes:subtitle>
      <itunes:summary>Everyone knows that Free Software such as Linux, Apache or PostgreSQL are the backbone of many data centers (DC) and cloud offerings. The Internet as we know it today would not exist without Free &amp; OpenSource Software (FOSS)
But the more Free Software leaves the DC and gets closer to the &#39;Enduser&#39;, the more myth are build around FOSS. 
Linux on a Desktop? GIMP Instead of Photoshop? Running your business on a Free ERP-System? Fear, Uncertainty and Doubts (FUD) are spread to protect market share for proprietary solutions.
In this talk I will take a look at some FUD, and share some thoughts about answers to the myths.

Everyone knows that Free Software such as Linux, Apache or PostgreSQL are the backbone of many data centers (DC) and cloud offerings. The Internet as we know it today would not exist without Free &amp; OpenSource Software (FOSS)
But the more Free Software leaves the DC and gets closer to the &#39;Enduser&#39;, the more myth are build around FOSS. 
Linux on a Desktop? GIMP Instead of Photoshop? Running your business on a Free ERP-System? Fear, Uncertainty and Doubts (FUD) are spread to protect market share for proprietary solutions.
In this talk I will take a look at some FUD, and share some thoughts about answers to the myths.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:42</itunes:duration>
    </item>
    <item>
      <title>Annual Discussion with openSUSE Board (osc19)</title>
      <link>https://media.ccc.de/v/2378-annual-discussion-with-opensuse-board</link>
      <description>The openSUSE Board will present the outcome of their last F2F meeting, where they started driving its collective agenda for the next year.

After that, everybody is welcome to ask questions, give feedback, make suggestions and present ideas.

The openSUSE Board will present the outcome of their last F2F meeting, where they started driving its collective agenda for the next year.

After that, everybody is welcome to ask questions, give feedback, make suggestions and present ideas.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2378-eng-Annual_Discussion_with_openSUSE_Board_opus.opus"
        length="28311552"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2378-eng-Annual_Discussion_with_openSUSE_Board_opus.opus?1558877584</guid>
      <dc:identifier>Fr3C_NhVihzg-YFJoESUxw</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Douglas DeMaio</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2378, openSUSE</itunes:keywords>
      <itunes:summary>The openSUSE Board will present the outcome of their last F2F meeting, where they started driving its collective agenda for the next year.

After that, everybody is welcome to ask questions, give feedback, make suggestions and present ideas.

The openSUSE Board will present the outcome of their last F2F meeting, where they started driving its collective agenda for the next year.

After that, everybody is welcome to ask questions, give feedback, make suggestions and present ideas.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:46:14</itunes:duration>
    </item>
    <item>
      <title>The Art of Advocacy with Linux (osc19)</title>
      <link>https://media.ccc.de/v/2405-the-art-of-advocacy-with-linux</link>
      <description>Through this Lighting Talk I&#39;d like to share some thoughts on the importance of Advocacy for the use of Linux distributions by various actors, starting with students or home users, to continue with Universities, Public Institutions and Governments. Educating the new generation to use Linux is something that should be seen of high importance. 

As there is a lot of progress done today with different Linux distros being massively used, a lot of improvements made in terms of the interface, security etc more efforts can be put in Advocacy. If today, as experienced users of Free Software, we understand our potential in getting more people to use Linux and we invest a little bit of our time in advocating it, we will definitely bring new users, some of which will definitely become new contributors.

Awareness of Linux, and FOSS is spread largely by word of mouth, using grass roots movements and social media. You can teach others how to use it, run a workshop in a school, teach a student how to install Linux, show different environments and tools. Another step, which requires more efforts and planning, can be to bring Linux in the Government as well. This is something we cannot do alone, but you can try to support organizations and communities who do a lot of work in this direction. We keep hearing on migrations to various FLOSS projects by different governments, yours can be the next one, and you can be part of that great change.

Through this Lighting Talk I&#39;d like to share some thoughts on the importance of Advocacy for the use of Linux distributions by various actors, starting with students or home users, to continue with Universities, Public Institutions and Governments. Educating the new generation to use Linux is something that should be seen of high importance. 

As there is a lot of progress done today with different Linux distros being massively used, a lot of improvements made in terms of the interface, security etc more efforts can be put in Advocacy. If today, as experienced users of Free Software, we understand our potential in getting more people to use Linux and we invest a little bit of our time in advocating it, we will definitely bring new users, some of which will definitely become new contributors.

Awareness of Linux, and FOSS is spread largely by word of mouth, using grass roots movements and social media. You can teach others how to use it, run a workshop in a school, teach a student how to install Linux, show different environments and tools. Another step, which requires more efforts and planning, can be to bring Linux in the Government as well. This is something we cannot do alone, but you can try to support organizations and communities who do a lot of work in this direction. We keep hearing on migrations to various FLOSS projects by different governments, yours can be the next one, and you can be part of that great change.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2405-eng-The_Art_of_Advocacy_with_Linux_opus.opus"
        length="12582912"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2405-eng-The_Art_of_Advocacy_with_Linux_opus.opus?1558871074</guid>
      <dc:identifier>tcqG0x1tb0cojdtR4-QsFw</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Redon Skikuli</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2405, Open Source</itunes:keywords>
      <itunes:subtitle>Advocacy tricks </itunes:subtitle>
      <itunes:summary>Through this Lighting Talk I&#39;d like to share some thoughts on the importance of Advocacy for the use of Linux distributions by various actors, starting with students or home users, to continue with Universities, Public Institutions and Governments. Educating the new generation to use Linux is something that should be seen of high importance. 

As there is a lot of progress done today with different Linux distros being massively used, a lot of improvements made in terms of the interface, security etc more efforts can be put in Advocacy. If today, as experienced users of Free Software, we understand our potential in getting more people to use Linux and we invest a little bit of our time in advocating it, we will definitely bring new users, some of which will definitely become new contributors.

Awareness of Linux, and FOSS is spread largely by word of mouth, using grass roots movements and social media. You can teach others how to use it, run a workshop in a school, teach a student how to install Linux, show different environments and tools. Another step, which requires more efforts and planning, can be to bring Linux in the Government as well. This is something we cannot do alone, but you can try to support organizations and communities who do a lot of work in this direction. We keep hearing on migrations to various FLOSS projects by different governments, yours can be the next one, and you can be part of that great change.

Through this Lighting Talk I&#39;d like to share some thoughts on the importance of Advocacy for the use of Linux distributions by various actors, starting with students or home users, to continue with Universities, Public Institutions and Governments. Educating the new generation to use Linux is something that should be seen of high importance. 

As there is a lot of progress done today with different Linux distros being massively used, a lot of improvements made in terms of the interface, security etc more efforts can be put in Advocacy. If today, as experienced users of Free Software, we understand our potential in getting more people to use Linux and we invest a little bit of our time in advocating it, we will definitely bring new users, some of which will definitely become new contributors.

Awareness of Linux, and FOSS is spread largely by word of mouth, using grass roots movements and social media. You can teach others how to use it, run a workshop in a school, teach a student how to install Linux, show different environments and tools. Another step, which requires more efforts and planning, can be to bring Linux in the Government as well. This is something we cannot do alone, but you can try to support organizations and communities who do a lot of work in this direction. We keep hearing on migrations to various FLOSS projects by different governments, yours can be the next one, and you can be part of that great change.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:22:48</itunes:duration>
    </item>
    <item>
      <title>What can you do with a self-hosted alternative to Office365, Google Apps and others (osc19)</title>
      <link>https://media.ccc.de/v/2219-what-can-you-do-with-a-self-hosted-alternative-to-office365-google-apps-and-others</link>
      <description>Nextcloud is by far the easiest way to get a complete, 100% open source, fully self-hosted solution that can replace Office 365 or Google Apps. From file sync and collaborative document editing to chat &amp; video calls, mail, calendar and password management, you can do almost anything with the apps on our expansive app store.

In this lightning talk I&#39;ll quickly present #nextcloud and what it can do for you! One example: create a document, share it with your team, discuss it in the comments, add it to a video chat session &amp; edit it together during a call.
And did you know you can create a poll with Nextcloud?
That there&#39;s a Kanban app?
GPX tracker? Sensor logger? Radio player?

Join the talk to hear more!

Nextcloud is by far the easiest way to get a complete, 100% open source, fully self-hosted solution that can replace Office 365 or Google Apps. From file sync and collaborative document editing to chat &amp; video calls, mail, calendar and password management, you can do almost anything with the apps on our expansive app store.

In this lightning talk I&#39;ll quickly present #nextcloud and what it can do for you! One example: create a document, share it with your team, discuss it in the comments, add it to a video chat session &amp; edit it together during a call.
And did you know you can create a poll with Nextcloud?
That there&#39;s a Kanban app?
GPX tracker? Sensor logger? Radio player?

Join the talk to hear more!
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2219-eng-What_can_you_do_with_a_self-hosted_alternative_to_Office365_Google_Apps_and_others_opus.opus"
        length="10485760"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2219-eng-What_can_you_do_with_a_self-hosted_alternative_to_Office365_Google_Apps_and_others_opus.opus?1558870980</guid>
      <dc:identifier>xEWoNyjCI4ExTDHTer-QWw</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Frank Karlitschek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2219, Desktop and Applications</itunes:keywords>
      <itunes:subtitle>A small selection of the nearly 200 apps for Nextcloud</itunes:subtitle>
      <itunes:summary>Nextcloud is by far the easiest way to get a complete, 100% open source, fully self-hosted solution that can replace Office 365 or Google Apps. From file sync and collaborative document editing to chat &amp; video calls, mail, calendar and password management, you can do almost anything with the apps on our expansive app store.

In this lightning talk I&#39;ll quickly present #nextcloud and what it can do for you! One example: create a document, share it with your team, discuss it in the comments, add it to a video chat session &amp; edit it together during a call.
And did you know you can create a poll with Nextcloud?
That there&#39;s a Kanban app?
GPX tracker? Sensor logger? Radio player?

Join the talk to hear more!

Nextcloud is by far the easiest way to get a complete, 100% open source, fully self-hosted solution that can replace Office 365 or Google Apps. From file sync and collaborative document editing to chat &amp; video calls, mail, calendar and password management, you can do almost anything with the apps on our expansive app store.

In this lightning talk I&#39;ll quickly present #nextcloud and what it can do for you! One example: create a document, share it with your team, discuss it in the comments, add it to a video chat session &amp; edit it together during a call.
And did you know you can create a poll with Nextcloud?
That there&#39;s a Kanban app?
GPX tracker? Sensor logger? Radio player?

Join the talk to hear more!
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:16:36</itunes:duration>
    </item>
    <item>
      <title>State of Ceph (osc19)</title>
      <link>https://media.ccc.de/v/2237-state-of-ceph</link>
      <description>What&#39;s new in Nautilus and what&#39;s coming next? This talk focuses on the new features and implementations of Ceph Nautilus and also includes an outlook about what&#39;s planned and coming next. 
If you want to learn what&#39;s new in Nautilus and also learn about new features within Ceph, this is the right talk for you. 

What&#39;s new in Nautilus and what&#39;s coming next? This talk focuses on the new features and implementations of Ceph Nautilus and also includes an outlook about what&#39;s planned and coming next. 
If you want to learn what&#39;s new in Nautilus and also learn about new features within Ceph, this is the right talk for you. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2237-eng-State_of_Ceph_opus.opus"
        length="28311552"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2237-eng-State_of_Ceph_opus.opus?1558870686</guid>
      <dc:identifier>xeLK3Ot8S1TKYGID6y2eIQ</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Kai Wagner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2237, Open Source</itunes:keywords>
      <itunes:subtitle>What&#39;s new in Nautilus and what&#39;s coming next?</itunes:subtitle>
      <itunes:summary>What&#39;s new in Nautilus and what&#39;s coming next? This talk focuses on the new features and implementations of Ceph Nautilus and also includes an outlook about what&#39;s planned and coming next. 
If you want to learn what&#39;s new in Nautilus and also learn about new features within Ceph, this is the right talk for you. 

What&#39;s new in Nautilus and what&#39;s coming next? This talk focuses on the new features and implementations of Ceph Nautilus and also includes an outlook about what&#39;s planned and coming next. 
If you want to learn what&#39;s new in Nautilus and also learn about new features within Ceph, this is the right talk for you. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:36</itunes:duration>
    </item>
    <item>
      <title>openSUSE Artwork, Branding, UI and UX (osc19)</title>
      <link>https://media.ccc.de/v/2336-opensuse-artwork-branding-ui-and-ux</link>
      <description>openSUSE&#39;s brand image and software have been evolving for a long time, and in that time a lot of stuff was defined. There is YaST, there is geeko, both are industry standard, both function as a way to differentiate the distribution. However not everything that is openSUSE is great, in many cases, there are some serious omissions in terms of how openSUSE is sold through the eyes of potential users. This talk would function as a way to highlight some of the issues that will require further development in upcoming years, to support future devices, use cases for the distribution, ease of use, as well what we should improve in terms of presentation of the brand itself.

openSUSE&#39;s brand image and software have been evolving for a long time, and in that time a lot of stuff was defined. There is YaST, there is geeko, both are industry standard, both function as a way to differentiate the distribution. However not everything that is openSUSE is great, in many cases, there are some serious omissions in terms of how openSUSE is sold through the eyes of potential users. This talk would function as a way to highlight some of the issues that will require further development in upcoming years, to support future devices, use cases for the distribution, ease of use, as well what we should improve in terms of presentation of the brand itself.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2336-eng-openSUSE_Artwork_Branding_UI_and_UX_opus.opus"
        length="19922944"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2336-eng-openSUSE_Artwork_Branding_UI_and_UX_opus.opus?1558870431</guid>
      <dc:identifier>OB5O-mYv6r9yEGLa77x8nw</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Stasiek Michalski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2336, openSUSE</itunes:keywords>
      <itunes:subtitle>What&#39;s wrong and what could be better</itunes:subtitle>
      <itunes:summary>openSUSE&#39;s brand image and software have been evolving for a long time, and in that time a lot of stuff was defined. There is YaST, there is geeko, both are industry standard, both function as a way to differentiate the distribution. However not everything that is openSUSE is great, in many cases, there are some serious omissions in terms of how openSUSE is sold through the eyes of potential users. This talk would function as a way to highlight some of the issues that will require further development in upcoming years, to support future devices, use cases for the distribution, ease of use, as well what we should improve in terms of presentation of the brand itself.

openSUSE&#39;s brand image and software have been evolving for a long time, and in that time a lot of stuff was defined. There is YaST, there is geeko, both are industry standard, both function as a way to differentiate the distribution. However not everything that is openSUSE is great, in many cases, there are some serious omissions in terms of how openSUSE is sold through the eyes of potential users. This talk would function as a way to highlight some of the issues that will require further development in upcoming years, to support future devices, use cases for the distribution, ease of use, as well what we should improve in terms of presentation of the brand itself.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:35:41</itunes:duration>
    </item>
    <item>
      <title>openSUSE Leap 15.x Kernels: Status Quo (osc19)</title>
      <link>https://media.ccc.de/v/2486-opensuse-leap-15-x-kernels-status-quo</link>
      <description>The saga continues: after the legendary Leap 42.3 trilogy, we entered a new era of Leap 15.x.

This talk will look over the past Leap 15.0 kernel  and the ongoing Leap 15.1 kernel development, which new feature are armed, how they are managed and how they are processed.


The saga continues: after the legendary Leap 42.3 trilogy, we entered a new era of Leap 15.x.

This talk will look over the past Leap 15.0 kernel  and the ongoing Leap 15.1 kernel development, which new feature are armed, how they are managed and how they are processed.

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2486-eng-openSUSE_Leap_15x_Kernels_Status_Quo_opus.opus"
        length="17825792"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2486-eng-openSUSE_Leap_15x_Kernels_Status_Quo_opus.opus?1558864923</guid>
      <dc:identifier>N7AvGCS9c4IOGEHCNEGeqA</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Takashi Iwai</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2486</itunes:keywords>
      <itunes:summary>The saga continues: after the legendary Leap 42.3 trilogy, we entered a new era of Leap 15.x.

This talk will look over the past Leap 15.0 kernel  and the ongoing Leap 15.1 kernel development, which new feature are armed, how they are managed and how they are processed.


The saga continues: after the legendary Leap 42.3 trilogy, we entered a new era of Leap 15.x.

This talk will look over the past Leap 15.0 kernel  and the ongoing Leap 15.1 kernel development, which new feature are armed, how they are managed and how they are processed.

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:28:13</itunes:duration>
    </item>
    <item>
      <title>Rust packaging: Cross-distro collaboration done right (osc19)</title>
      <link>https://media.ccc.de/v/2489-rust-packaging-cross-distro-collaboration-done-right</link>
      <description>When you are looking on the distribution and how they package things, they do it in so much different way. Even between RPM-based distributions, there are different macro, different package names and so on. People inside distributions tend to just write something what suit their needs and start using it.

With Rust we&#39;ve taken different approach: we&#39;ve designed prototype in Fedora and then before officially using it, showed to other people (openSUSE, Mageia, Debian), asked for feedback, worked with them to suit their needs and only after that went and started using it in Fedora. It didn&#39;t work out fully with Debian because the ecosystem is too different, but even there we&#39;ve made agreement on the filesystem paths and basic principles.

When you are looking on the distribution and how they package things, they do it in so much different way. Even between RPM-based distributions, there are different macro, different package names and so on. People inside distributions tend to just write something what suit their needs and start using it.

With Rust we&#39;ve taken different approach: we&#39;ve designed prototype in Fedora and then before officially using it, showed to other people (openSUSE, Mageia, Debian), asked for feedback, worked with them to suit their needs and only after that went and started using it in Fedora. It didn&#39;t work out fully with Debian because the ecosystem is too different, but even there we&#39;ve made agreement on the filesystem paths and basic principles.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2489-eng-Rust_packaging_Cross-distro_collaboration_done_right_opus.opus"
        length="12582912"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2489-eng-Rust_packaging_Cross-distro_collaboration_done_right_opus.opus?1558864795</guid>
      <dc:identifier>XiMGzrAdPuzVluYhoPCNzA</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Igor Gnatenko</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2489, openSUSE</itunes:keywords>
      <itunes:subtitle>Yes, distros can work together!</itunes:subtitle>
      <itunes:summary>When you are looking on the distribution and how they package things, they do it in so much different way. Even between RPM-based distributions, there are different macro, different package names and so on. People inside distributions tend to just write something what suit their needs and start using it.

With Rust we&#39;ve taken different approach: we&#39;ve designed prototype in Fedora and then before officially using it, showed to other people (openSUSE, Mageia, Debian), asked for feedback, worked with them to suit their needs and only after that went and started using it in Fedora. It didn&#39;t work out fully with Debian because the ecosystem is too different, but even there we&#39;ve made agreement on the filesystem paths and basic principles.

When you are looking on the distribution and how they package things, they do it in so much different way. Even between RPM-based distributions, there are different macro, different package names and so on. People inside distributions tend to just write something what suit their needs and start using it.

With Rust we&#39;ve taken different approach: we&#39;ve designed prototype in Fedora and then before officially using it, showed to other people (openSUSE, Mageia, Debian), asked for feedback, worked with them to suit their needs and only after that went and started using it in Fedora. It didn&#39;t work out fully with Debian because the ecosystem is too different, but even there we&#39;ve made agreement on the filesystem paths and basic principles.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:54</itunes:duration>
    </item>
    <item>
      <title>Atomic Updates - and /etc? (osc19)</title>
      <link>https://media.ccc.de/v/2372-atomic-updates-and-etc</link>
      <description>The great thing on atomic updates as used e.g. with transactional-update is, that your system is always in a defined state. But what happens with changes in /etc? With normal updates, changes are done immediately to /etc during the updates. With atomic updates, they are only visible with the next reboot. Which means, changes between update and reboot to /etc can create a conflict.
There are several strategies by other distributions, like three-way-diff and patching, symlinks, ignoring the problem, etc.
In this talk I will mention the biggest challenges we see, which solutions do exist, what are the advantages and what the disadvantages and which impact this will have on normal distributions like openSUSE Tumbleweed. This talk is to create awareness for the problem and as base for discussions, it will not provide a solution for every problem.
It&#39;s targeting application developers and distribution developers, as this are the areas were changes would be necessary.

The great thing on atomic updates as used e.g. with transactional-update is, that your system is always in a defined state. But what happens with changes in /etc? With normal updates, changes are done immediately to /etc during the updates. With atomic updates, they are only visible with the next reboot. Which means, changes between update and reboot to /etc can create a conflict.
There are several strategies by other distributions, like three-way-diff and patching, symlinks, ignoring the problem, etc.
In this talk I will mention the biggest challenges we see, which solutions do exist, what are the advantages and what the disadvantages and which impact this will have on normal distributions like openSUSE Tumbleweed. This talk is to create awareness for the problem and as base for discussions, it will not provide a solution for every problem.
It&#39;s targeting application developers and distribution developers, as this are the areas were changes would be necessary.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2372-eng-Atomic_Updates_-_and_etc_opus.opus"
        length="16777216"
        type="audio/opus"/>
      <pubDate>Sun, 26 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2372-eng-Atomic_Updates_-_and_etc_opus.opus?1558864864</guid>
      <dc:identifier>a7hHbtzQv9BpGrrF0B_HGQ</dc:identifier>
      <dc:date>2019-05-26T00:00:00+02:00</dc:date>
      <itunes:author>Thorsten Kukuk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2372, openSUSE</itunes:keywords>
      <itunes:subtitle>How to handle updates of config files in /etc</itunes:subtitle>
      <itunes:summary>The great thing on atomic updates as used e.g. with transactional-update is, that your system is always in a defined state. But what happens with changes in /etc? With normal updates, changes are done immediately to /etc during the updates. With atomic updates, they are only visible with the next reboot. Which means, changes between update and reboot to /etc can create a conflict.
There are several strategies by other distributions, like three-way-diff and patching, symlinks, ignoring the problem, etc.
In this talk I will mention the biggest challenges we see, which solutions do exist, what are the advantages and what the disadvantages and which impact this will have on normal distributions like openSUSE Tumbleweed. This talk is to create awareness for the problem and as base for discussions, it will not provide a solution for every problem.
It&#39;s targeting application developers and distribution developers, as this are the areas were changes would be necessary.

The great thing on atomic updates as used e.g. with transactional-update is, that your system is always in a defined state. But what happens with changes in /etc? With normal updates, changes are done immediately to /etc during the updates. With atomic updates, they are only visible with the next reboot. Which means, changes between update and reboot to /etc can create a conflict.
There are several strategies by other distributions, like three-way-diff and patching, symlinks, ignoring the problem, etc.
In this talk I will mention the biggest challenges we see, which solutions do exist, what are the advantages and what the disadvantages and which impact this will have on normal distributions like openSUSE Tumbleweed. This talk is to create awareness for the problem and as base for discussions, it will not provide a solution for every problem.
It&#39;s targeting application developers and distribution developers, as this are the areas were changes would be necessary.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:29:58</itunes:duration>
    </item>
    <item>
      <title>Open Build Service (OBS) development has increased exponentially (osc19)</title>
      <link>https://media.ccc.de/v/2519-open-build-service-obs-development-has-increased-exponentially</link>
      <description>OBS Team will briefly explain the evolution of the OBS in the last year, and also some of the impressive features that have been included recently.

We will introduce the advances of OBS, not only the Frontend but also those related with the Backend and OSC (command line tool).

We will also give some hints about the upcoming features we have in mind for the future of OBS.

Sounds interesting, right?

Don&#39;t miss this talk and take advantage of knowing all the improvements that can make your work easier using OBS.

OBS Team will briefly explain the evolution of the OBS in the last year, and also some of the impressive features that have been included recently.

We will introduce the advances of OBS, not only the Frontend but also those related with the Backend and OSC (command line tool).

We will also give some hints about the upcoming features we have in mind for the future of OBS.

Sounds interesting, right?

Don&#39;t miss this talk and take advantage of knowing all the improvements that can make your work easier using OBS.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2519-eng-Open_Build_Service_OBS_development_has_increased_exponentially_opus.opus"
        length="14680064"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2519-eng-Open_Build_Service_OBS_development_has_increased_exponentially_opus.opus?1558807714</guid>
      <dc:identifier>B7oXBmGX9R-A-86GuvS6YQ</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>David Kang</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2519</itunes:keywords>
      <itunes:summary>OBS Team will briefly explain the evolution of the OBS in the last year, and also some of the impressive features that have been included recently.

We will introduce the advances of OBS, not only the Frontend but also those related with the Backend and OSC (command line tool).

We will also give some hints about the upcoming features we have in mind for the future of OBS.

Sounds interesting, right?

Don&#39;t miss this talk and take advantage of knowing all the improvements that can make your work easier using OBS.

OBS Team will briefly explain the evolution of the OBS in the last year, and also some of the impressive features that have been included recently.

We will introduce the advances of OBS, not only the Frontend but also those related with the Backend and OSC (command line tool).

We will also give some hints about the upcoming features we have in mind for the future of OBS.

Sounds interesting, right?

Don&#39;t miss this talk and take advantage of knowing all the improvements that can make your work easier using OBS.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:05</itunes:duration>
    </item>
    <item>
      <title>SUSE Security retrospective for last year (osc19)</title>
      <link>https://media.ccc.de/v/2507-suse-security-retrospective-for-last-year</link>
      <description>Another year - another security retrospective.

The talk will introduce the SUSE security team and its members, our areas of work
and responsibilities.

The talk will show some statistics and interesting details of last year security issues, and go in detail on some of the specific codenamed ones.

A special focus will be on updated classification and overview of last years Meltdown and Spectre like CPU issues, describing them and the mitigations that SUSE has been deployed.

As the SUSE security team has grown in the last year, we also increased our work in both proactive security and related areas, which the talk will briefly highlight

Another year - another security retrospective.

The talk will introduce the SUSE security team and its members, our areas of work
and responsibilities.

The talk will show some statistics and interesting details of last year security issues, and go in detail on some of the specific codenamed ones.

A special focus will be on updated classification and overview of last years Meltdown and Spectre like CPU issues, describing them and the mitigations that SUSE has been deployed.

As the SUSE security team has grown in the last year, we also increased our work in both proactive security and related areas, which the talk will briefly highlight
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2507-eng-SUSE_Security_retrospective_for_last_year_opus.opus"
        length="25165824"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2507-eng-SUSE_Security_retrospective_for_last_year_opus.opus?1558807683</guid>
      <dc:identifier>jot9JzhThXaI-bg4lHKeIQ</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Marcus Meissner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2507, openSUSE</itunes:keywords>
      <itunes:subtitle>Situation normal - all fine</itunes:subtitle>
      <itunes:summary>Another year - another security retrospective.

The talk will introduce the SUSE security team and its members, our areas of work
and responsibilities.

The talk will show some statistics and interesting details of last year security issues, and go in detail on some of the specific codenamed ones.

A special focus will be on updated classification and overview of last years Meltdown and Spectre like CPU issues, describing them and the mitigations that SUSE has been deployed.

As the SUSE security team has grown in the last year, we also increased our work in both proactive security and related areas, which the talk will briefly highlight

Another year - another security retrospective.

The talk will introduce the SUSE security team and its members, our areas of work
and responsibilities.

The talk will show some statistics and interesting details of last year security issues, and go in detail on some of the specific codenamed ones.

A special focus will be on updated classification and overview of last years Meltdown and Spectre like CPU issues, describing them and the mitigations that SUSE has been deployed.

As the SUSE security team has grown in the last year, we also increased our work in both proactive security and related areas, which the talk will briefly highlight
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:56</itunes:duration>
    </item>
    <item>
      <title>openSUSE testing - an overview (osc19)</title>
      <link>https://media.ccc.de/v/2396-opensuse-testing-an-overview</link>
      <description>How is software within the openSUSE ecosystem tested? What kind of tests exist? Who is doing what?

This talk will try to present an overview of how &quot;testing&quot; is done for software developed in the openSUSE ecosystem. The workflow of software contributions to the openSUSE distributions will be shown from testing perspective from upstream source code repos to feedback from users in the released products. Used tools will be mentioned, the testing approaches as well as the people involved. The relation to SLE testing will be described. As this &quot;overview&quot; will not be able to cover all approaches used by the community feedback by the audience in the Q&amp;A part of the talk will be appreciated. Of course, openQA will be included but it is certainly not the only solution to be mentioned ;)

How is software within the openSUSE ecosystem tested? What kind of tests exist? Who is doing what?

This talk will try to present an overview of how &quot;testing&quot; is done for software developed in the openSUSE ecosystem. The workflow of software contributions to the openSUSE distributions will be shown from testing perspective from upstream source code repos to feedback from users in the released products. Used tools will be mentioned, the testing approaches as well as the people involved. The relation to SLE testing will be described. As this &quot;overview&quot; will not be able to cover all approaches used by the community feedback by the audience in the Q&amp;A part of the talk will be appreciated. Of course, openQA will be included but it is certainly not the only solution to be mentioned ;)
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2396-eng-openSUSE_testing_-_an_overview_opus.opus"
        length="18874368"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2396-eng-openSUSE_testing_-_an_overview_opus.opus?1558807323</guid>
      <dc:identifier>V5TLukgwdAbRwzDYdJDPMg</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Oliver Kurz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2396, openSUSE</itunes:keywords>
      <itunes:summary>How is software within the openSUSE ecosystem tested? What kind of tests exist? Who is doing what?

This talk will try to present an overview of how &quot;testing&quot; is done for software developed in the openSUSE ecosystem. The workflow of software contributions to the openSUSE distributions will be shown from testing perspective from upstream source code repos to feedback from users in the released products. Used tools will be mentioned, the testing approaches as well as the people involved. The relation to SLE testing will be described. As this &quot;overview&quot; will not be able to cover all approaches used by the community feedback by the audience in the Q&amp;A part of the talk will be appreciated. Of course, openQA will be included but it is certainly not the only solution to be mentioned ;)

How is software within the openSUSE ecosystem tested? What kind of tests exist? Who is doing what?

This talk will try to present an overview of how &quot;testing&quot; is done for software developed in the openSUSE ecosystem. The workflow of software contributions to the openSUSE distributions will be shown from testing perspective from upstream source code repos to feedback from users in the released products. Used tools will be mentioned, the testing approaches as well as the people involved. The relation to SLE testing will be described. As this &quot;overview&quot; will not be able to cover all approaches used by the community feedback by the audience in the Q&amp;A part of the talk will be appreciated. Of course, openQA will be included but it is certainly not the only solution to be mentioned ;)
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:31:50</itunes:duration>
    </item>
    <item>
      <title>Installing openSUSE only with SaltStack (osc19)</title>
      <link>https://media.ccc.de/v/2357-installing-opensuse-only-with-saltstack</link>
      <description>When we want to install openSUSE in out laptop we will use YaST. It will take care of all the details required for a correct partitioning, bootloader installation, time zone selection, network configuration, software selection, etc, etc. But when we want to install 100 nodes in our cloud, each one with a different hardware profile and a different role in our infrastructure, we need something different.

AutoYaST can help with this, but there are some limitations, as we need to provide XMLs adjusted for those hardware profiles and roles, and we need a different tool to orchestrate those multiple installations. Can be done, but we can do better.

SaltStack is a tool used to manage configuration and provisioning of machines, and we propose use this tool to drive the installation of openSUSE for big deployments. I want to show a WIP installer based on Salt, that can be naturally integrated in any other Salt-based solution, and I would like to talk about the ways that we can improve it in the future.

When we want to install openSUSE in out laptop we will use YaST. It will take care of all the details required for a correct partitioning, bootloader installation, time zone selection, network configuration, software selection, etc, etc. But when we want to install 100 nodes in our cloud, each one with a different hardware profile and a different role in our infrastructure, we need something different.

AutoYaST can help with this, but there are some limitations, as we need to provide XMLs adjusted for those hardware profiles and roles, and we need a different tool to orchestrate those multiple installations. Can be done, but we can do better.

SaltStack is a tool used to manage configuration and provisioning of machines, and we propose use this tool to drive the installation of openSUSE for big deployments. I want to show a WIP installer based on Salt, that can be naturally integrated in any other Salt-based solution, and I would like to talk about the ways that we can improve it in the future.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2357-eng-Installing_openSUSE_only_with_SaltStack_opus.opus"
        length="32505856"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2357-eng-Installing_openSUSE_only_with_SaltStack_opus.opus?1558806934</guid>
      <dc:identifier>G-fbiDSrJ6ifAOEPW1PmZA</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Alberto Planas</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2357, openSUSE</itunes:keywords>
      <itunes:subtitle>Using Salt as an alternative to AutoYaST</itunes:subtitle>
      <itunes:summary>When we want to install openSUSE in out laptop we will use YaST. It will take care of all the details required for a correct partitioning, bootloader installation, time zone selection, network configuration, software selection, etc, etc. But when we want to install 100 nodes in our cloud, each one with a different hardware profile and a different role in our infrastructure, we need something different.

AutoYaST can help with this, but there are some limitations, as we need to provide XMLs adjusted for those hardware profiles and roles, and we need a different tool to orchestrate those multiple installations. Can be done, but we can do better.

SaltStack is a tool used to manage configuration and provisioning of machines, and we propose use this tool to drive the installation of openSUSE for big deployments. I want to show a WIP installer based on Salt, that can be naturally integrated in any other Salt-based solution, and I would like to talk about the ways that we can improve it in the future.

When we want to install openSUSE in out laptop we will use YaST. It will take care of all the details required for a correct partitioning, bootloader installation, time zone selection, network configuration, software selection, etc, etc. But when we want to install 100 nodes in our cloud, each one with a different hardware profile and a different role in our infrastructure, we need something different.

AutoYaST can help with this, but there are some limitations, as we need to provide XMLs adjusted for those hardware profiles and roles, and we need a different tool to orchestrate those multiple installations. Can be done, but we can do better.

SaltStack is a tool used to manage configuration and provisioning of machines, and we propose use this tool to drive the installation of openSUSE for big deployments. I want to show a WIP installer based on Salt, that can be naturally integrated in any other Salt-based solution, and I would like to talk about the ways that we can improve it in the future.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:58:12</itunes:duration>
    </item>
    <item>
      <title>Introducing Pagure (osc19)</title>
      <link>https://media.ccc.de/v/2432-introducing-pagure</link>
      <description>Pagure is a new, full-featured Git repository service for the web, written in Python. It is similar to other popular Git-based forges, allowing developers and contributors to share and collaborate on code and content. It also has some unique features not found in any other Git forge providing the basis for decentralized, federated software code hosting and development.

It&#39;s fully free and open source software, and it&#39;s included in openSUSE Leap 15.1 and openSUSE Tumbleweed!

The agenda of the presentation:
- What is Pagure
- History of Pagure
- Current state and features of Pagure
- Current ecosystem around Pagure
- Plans for the future of Pagure
- Demo of Pagure on openSUSE

Pagure is a new, full-featured Git repository service for the web, written in Python. It is similar to other popular Git-based forges, allowing developers and contributors to share and collaborate on code and content. It also has some unique features not found in any other Git forge providing the basis for decentralized, federated software code hosting and development.

It&#39;s fully free and open source software, and it&#39;s included in openSUSE Leap 15.1 and openSUSE Tumbleweed!

The agenda of the presentation:
- What is Pagure
- History of Pagure
- Current state and features of Pagure
- Current ecosystem around Pagure
- Plans for the future of Pagure
- Demo of Pagure on openSUSE
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2432-eng-Introducing_Pagure_opus.opus"
        length="23068672"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2432-eng-Introducing_Pagure_opus.opus?1558801324</guid>
      <dc:identifier>UXkaWhL6nt_30m-UEalVMQ</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>pingou</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2432, Open Source</itunes:keywords>
      <itunes:subtitle>A new lightweight and powerful Git-centered forge, now in openSUSE!</itunes:subtitle>
      <itunes:summary>Pagure is a new, full-featured Git repository service for the web, written in Python. It is similar to other popular Git-based forges, allowing developers and contributors to share and collaborate on code and content. It also has some unique features not found in any other Git forge providing the basis for decentralized, federated software code hosting and development.

It&#39;s fully free and open source software, and it&#39;s included in openSUSE Leap 15.1 and openSUSE Tumbleweed!

The agenda of the presentation:
- What is Pagure
- History of Pagure
- Current state and features of Pagure
- Current ecosystem around Pagure
- Plans for the future of Pagure
- Demo of Pagure on openSUSE

Pagure is a new, full-featured Git repository service for the web, written in Python. It is similar to other popular Git-based forges, allowing developers and contributors to share and collaborate on code and content. It also has some unique features not found in any other Git forge providing the basis for decentralized, federated software code hosting and development.

It&#39;s fully free and open source software, and it&#39;s included in openSUSE Leap 15.1 and openSUSE Tumbleweed!

The agenda of the presentation:
- What is Pagure
- History of Pagure
- Current state and features of Pagure
- Current ecosystem around Pagure
- Plans for the future of Pagure
- Demo of Pagure on openSUSE
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:51</itunes:duration>
    </item>
    <item>
      <title>Open Source Firmware (osc19)</title>
      <link>https://media.ccc.de/v/2450-open-source-firmware</link>
      <description>Firmware is found in all computing devices, including PCs, laptops, networking equipment, printers, embedded devices such as IoT and industrial controllers, mobile phones, tablets, and more. The community around open source firmware has grown over the last years, allowing for more exchange in the development and granting freedom to end users. Prominent projects like U-Boot, Tianocore, coreboot and others teach how firmware works and welcome contributions. This talk provides a brief introduction into firmware, an overview of the general build process, a perception of the current state of development on two platforms, an end user report, and a summary of the first Open Source Firmware Conference, which was supported by the openSUSE project.

Firmware is found in all computing devices, including PCs, laptops, networking equipment, printers, embedded devices such as IoT and industrial controllers, mobile phones, tablets, and more. The community around open source firmware has grown over the last years, allowing for more exchange in the development and granting freedom to end users. Prominent projects like U-Boot, Tianocore, coreboot and others teach how firmware works and welcome contributions. This talk provides a brief introduction into firmware, an overview of the general build process, a perception of the current state of development on two platforms, an end user report, and a summary of the first Open Source Firmware Conference, which was supported by the openSUSE project.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2450-eng-Open_Source_Firmware_opus.opus"
        length="26214400"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2450-eng-Open_Source_Firmware_opus.opus?1558800843</guid>
      <dc:identifier>-TfWXwLFMvJx2yy1UQ6iTg</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Daniel Maslowski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2450, Open Source</itunes:keywords>
      <itunes:subtitle>... and I finally had my personal bootsplash screen :)</itunes:subtitle>
      <itunes:summary>Firmware is found in all computing devices, including PCs, laptops, networking equipment, printers, embedded devices such as IoT and industrial controllers, mobile phones, tablets, and more. The community around open source firmware has grown over the last years, allowing for more exchange in the development and granting freedom to end users. Prominent projects like U-Boot, Tianocore, coreboot and others teach how firmware works and welcome contributions. This talk provides a brief introduction into firmware, an overview of the general build process, a perception of the current state of development on two platforms, an end user report, and a summary of the first Open Source Firmware Conference, which was supported by the openSUSE project.

Firmware is found in all computing devices, including PCs, laptops, networking equipment, printers, embedded devices such as IoT and industrial controllers, mobile phones, tablets, and more. The community around open source firmware has grown over the last years, allowing for more exchange in the development and granting freedom to end users. Prominent projects like U-Boot, Tianocore, coreboot and others teach how firmware works and welcome contributions. This talk provides a brief introduction into firmware, an overview of the general build process, a perception of the current state of development on two platforms, an end user report, and a summary of the first Open Source Firmware Conference, which was supported by the openSUSE project.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:45:07</itunes:duration>
    </item>
    <item>
      <title>IoT programming with openSUSE (osc19)</title>
      <link>https://media.ccc.de/v/2390-iot-programming-with-opensuse</link>
      <description>Small networked devices, commonly named Internet of Things (IoT), lead the next revolution in information technology. This talk will present the software and tools available on openSUSE to participate in this revolution. We will especially look at the &#39;Arduino&#39; IDE to program Arduino, ESP8266, Wemos, ESP32, and similar devices.

Small networked devices, commonly named Internet of Things (IoT), lead the next revolution in information technology. This talk will present the software and tools available on openSUSE to participate in this revolution. We will especially look at the &#39;Arduino&#39; IDE to program Arduino, ESP8266, Wemos, ESP32, and similar devices.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2390-eng-IoT_programming_with_openSUSE_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2390-eng-IoT_programming_with_openSUSE_opus.opus?1558792234</guid>
      <dc:identifier>caBUDXeLXE4J3RhUXoULhQ</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Klaus Kämpf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2390</itunes:keywords>
      <itunes:subtitle>.</itunes:subtitle>
      <itunes:summary>Small networked devices, commonly named Internet of Things (IoT), lead the next revolution in information technology. This talk will present the software and tools available on openSUSE to participate in this revolution. We will especially look at the &#39;Arduino&#39; IDE to program Arduino, ESP8266, Wemos, ESP32, and similar devices.

Small networked devices, commonly named Internet of Things (IoT), lead the next revolution in information technology. This talk will present the software and tools available on openSUSE to participate in this revolution. We will especially look at the &#39;Arduino&#39; IDE to program Arduino, ESP8266, Wemos, ESP32, and similar devices.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:39:37</itunes:duration>
    </item>
    <item>
      <title>SUSE DEVELOPER PROGRAM (osc19)</title>
      <link>https://media.ccc.de/v/2570-suse-developer-program</link>
      <description>LEARN WHAT SUSE IS DOING TO HELP THE DEVELOPERS COMMUNITY
CREATING APPLICATIONS AND SOLUTIONS IN AN EASIER AND QUICKER WAY AND HOW
YOU CAN CONTRIBUTE TO THAT EFFORT!

LEARN WHAT SUSE IS DOING TO HELP THE DEVELOPERS COMMUNITY
CREATING APPLICATIONS AND SOLUTIONS IN AN EASIER AND QUICKER WAY AND HOW
YOU CAN CONTRIBUTE TO THAT EFFORT!
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2570-eng-SUSE_DEVELOPER_PROGRAM_opus.opus"
        length="11534336"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2570-eng-SUSE_DEVELOPER_PROGRAM_opus.opus?1558789744</guid>
      <dc:identifier>3cC2qVMvq6bZ76LgeVzM-A</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Marco Varlese, FSzekely, timirnich</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2570, Open Source</itunes:keywords>
      <itunes:summary>LEARN WHAT SUSE IS DOING TO HELP THE DEVELOPERS COMMUNITY
CREATING APPLICATIONS AND SOLUTIONS IN AN EASIER AND QUICKER WAY AND HOW
YOU CAN CONTRIBUTE TO THAT EFFORT!

LEARN WHAT SUSE IS DOING TO HELP THE DEVELOPERS COMMUNITY
CREATING APPLICATIONS AND SOLUTIONS IN AN EASIER AND QUICKER WAY AND HOW
YOU CAN CONTRIBUTE TO THAT EFFORT!
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:18:47</itunes:duration>
    </item>
    <item>
      <title>LoRa for the kernel (osc19)</title>
      <link>https://media.ccc.de/v/2345-lora-for-the-kernel</link>
      <description>At ELCE 2018 I presented a project to implement Linux kernel drivers for LoRa Low-Power Wide Area Network (LPWAN) wireless technology. The project is since evolving to cover more chipsets and other technologies. This is a brief overview of what is being worked on and how to participate. It will also explain how openSUSE Tumbleweed aarch64 has been used as base for most of the kernel development.

At ELCE 2018 I presented a project to implement Linux kernel drivers for LoRa Low-Power Wide Area Network (LPWAN) wireless technology. The project is since evolving to cover more chipsets and other technologies. This is a brief overview of what is being worked on and how to participate. It will also explain how openSUSE Tumbleweed aarch64 has been used as base for most of the kernel development.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2345-eng-LoRa_for_the_kernel_opus.opus"
        length="25165824"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2345-eng-LoRa_for_the_kernel_opus.opus?1558789654</guid>
      <dc:identifier>xO0S5vz0kq5ATcAd2Y-0aw</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Andreas Färber</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2345, Open Source</itunes:keywords>
      <itunes:subtitle>Adding support for LPWA wireless technologies</itunes:subtitle>
      <itunes:summary>At ELCE 2018 I presented a project to implement Linux kernel drivers for LoRa Low-Power Wide Area Network (LPWAN) wireless technology. The project is since evolving to cover more chipsets and other technologies. This is a brief overview of what is being worked on and how to participate. It will also explain how openSUSE Tumbleweed aarch64 has been used as base for most of the kernel development.

At ELCE 2018 I presented a project to implement Linux kernel drivers for LoRa Low-Power Wide Area Network (LPWAN) wireless technology. The project is since evolving to cover more chipsets and other technologies. This is a brief overview of what is being worked on and how to participate. It will also explain how openSUSE Tumbleweed aarch64 has been used as base for most of the kernel development.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:42:43</itunes:duration>
    </item>
    <item>
      <title>State of transactional-update (osc19)</title>
      <link>https://media.ccc.de/v/2537-state-of-transactional-update</link>
      <description>You may have heard about transactional updates already - that thing that will force you to reboot your system just like on Windows. Well, it still does, but it also provides a huge benefit compared to your regular updates: It won&#39;t break your currently running system.

transactional-update is the default update mechanism on openSUSE Kubic and when using the &quot;Transactional Server&quot; role in openSUSE Leap or Tumbleweed. This talk is intended for both existing users and newcomers and will feature the following contents:

- Give an overview of the design
- Highlight the most important changes since last year, including the all-new _/etc_ handling
- Give a general overview of the file system layout

You may have heard about transactional updates already - that thing that will force you to reboot your system just like on Windows. Well, it still does, but it also provides a huge benefit compared to your regular updates: It won&#39;t break your currently running system.

transactional-update is the default update mechanism on openSUSE Kubic and when using the &quot;Transactional Server&quot; role in openSUSE Leap or Tumbleweed. This talk is intended for both existing users and newcomers and will feature the following contents:

- Give an overview of the design
- Highlight the most important changes since last year, including the all-new _/etc_ handling
- Give a general overview of the file system layout
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2537-eng-State_of_transactional-update_opus.opus"
        length="9437184"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2537-eng-State_of_transactional-update_opus.opus?1558787932</guid>
      <dc:identifier>8xulM32JRt4IMza2mCbdtQ</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Ignaz Forster</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2537, openSUSE</itunes:keywords>
      <itunes:subtitle>News &amp; file system layout anatomy</itunes:subtitle>
      <itunes:summary>You may have heard about transactional updates already - that thing that will force you to reboot your system just like on Windows. Well, it still does, but it also provides a huge benefit compared to your regular updates: It won&#39;t break your currently running system.

transactional-update is the default update mechanism on openSUSE Kubic and when using the &quot;Transactional Server&quot; role in openSUSE Leap or Tumbleweed. This talk is intended for both existing users and newcomers and will feature the following contents:

- Give an overview of the design
- Highlight the most important changes since last year, including the all-new _/etc_ handling
- Give a general overview of the file system layout

You may have heard about transactional updates already - that thing that will force you to reboot your system just like on Windows. Well, it still does, but it also provides a huge benefit compared to your regular updates: It won&#39;t break your currently running system.

transactional-update is the default update mechanism on openSUSE Kubic and when using the &quot;Transactional Server&quot; role in openSUSE Leap or Tumbleweed. This talk is intended for both existing users and newcomers and will feature the following contents:

- Give an overview of the design
- Highlight the most important changes since last year, including the all-new _/etc_ handling
- Give a general overview of the file system layout
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:16:48</itunes:duration>
    </item>
    <item>
      <title>openSUSE on ARM (osc19)</title>
      <link>https://media.ccc.de/v/2351-opensuse-on-arm</link>
      <description>This talk will give an overview of what happens since about a year for openSUSE on ARM. What is the current status and what is on the TODO list.

This talk will give an overview of what happens since about a year for openSUSE on ARM. What is the current status and what is on the TODO list.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2351-eng-openSUSE_on_ARM_opus.opus"
        length="14680064"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2351-eng-openSUSE_on_ARM_opus.opus?1558787373</guid>
      <dc:identifier>W1PdrH0zlNpL1dKwmW1KLg</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Guillaume Gardet</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2351, openSUSE</itunes:keywords>
      <itunes:subtitle>What happened since a year</itunes:subtitle>
      <itunes:summary>This talk will give an overview of what happens since about a year for openSUSE on ARM. What is the current status and what is on the TODO list.

This talk will give an overview of what happens since about a year for openSUSE on ARM. What is the current status and what is on the TODO list.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:43</itunes:duration>
    </item>
    <item>
      <title>Why you should choose openSUSE Kubic? (osc19)</title>
      <link>https://media.ccc.de/v/2498-why-you-should-choose-opensuse-kubic</link>
      <description>In the past few years, the development of container application technology has advanced by leaps and bounds. But for people who want to enter a containers word still hard for them. Most of people stop at the first step that use Kubernetes to setup environment. As a opsnSUSE user I’m glad we have openSUSE Kubic. I would like to share people who frustrated to build container. All they should do are use openSUSE Kubic. They need new tools that make them easy to set up cluster and maintain. OpenSUSE Kubic is great platform to run containers and to learn how to containerize. 
Hope through my experience of use Kubic can share it for people who want to join open source and containers word. There always have a best way to help you management your IT infrastructure and work smart.


In the past few years, the development of container application technology has advanced by leaps and bounds. But for people who want to enter a containers word still hard for them. Most of people stop at the first step that use Kubernetes to setup environment. As a opsnSUSE user I’m glad we have openSUSE Kubic. I would like to share people who frustrated to build container. All they should do are use openSUSE Kubic. They need new tools that make them easy to set up cluster and maintain. OpenSUSE Kubic is great platform to run containers and to learn how to containerize. 
Hope through my experience of use Kubic can share it for people who want to join open source and containers word. There always have a best way to help you management your IT infrastructure and work smart.

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2498-eng-Why_you_should_choose_openSUSE_Kubic_opus.opus"
        length="5242880"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2498-eng-Why_you_should_choose_openSUSE_Kubic_opus.opus?1558786923</guid>
      <dc:identifier>mWKUN7nGXvyiGK9jC3zBVw</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>kimlin</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2498, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>openSUSE Kubic is really fun!</itunes:subtitle>
      <itunes:summary>In the past few years, the development of container application technology has advanced by leaps and bounds. But for people who want to enter a containers word still hard for them. Most of people stop at the first step that use Kubernetes to setup environment. As a opsnSUSE user I’m glad we have openSUSE Kubic. I would like to share people who frustrated to build container. All they should do are use openSUSE Kubic. They need new tools that make them easy to set up cluster and maintain. OpenSUSE Kubic is great platform to run containers and to learn how to containerize. 
Hope through my experience of use Kubic can share it for people who want to join open source and containers word. There always have a best way to help you management your IT infrastructure and work smart.


In the past few years, the development of container application technology has advanced by leaps and bounds. But for people who want to enter a containers word still hard for them. Most of people stop at the first step that use Kubernetes to setup environment. As a opsnSUSE user I’m glad we have openSUSE Kubic. I would like to share people who frustrated to build container. All they should do are use openSUSE Kubic. They need new tools that make them easy to set up cluster and maintain. OpenSUSE Kubic is great platform to run containers and to learn how to containerize. 
Hope through my experience of use Kubic can share it for people who want to join open source and containers word. There always have a best way to help you management your IT infrastructure and work smart.

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:08:32</itunes:duration>
    </item>
    <item>
      <title>Cilium &amp; BPF - The Future of Linux Networking and Security (Keynote Thomas Graf, Cilium) (osc19)</title>
      <link>https://media.ccc.de/v/2555-cilium-bpf-the-future-of-linux-networking-and-security-keynote-thomas-graf-cilium</link>
      <description>Linux is the dominant platform to run microservices using cloud-native architectures. These modern architectures impose new challenges on the platform serving the applications. We&#39;ll take a peek at BPF and Cilium and how it revolutionizes both networking and security to enable platforms built on top of it to fully utilize the benefits of cloud-native architectures. 

Thomas Graf is Co-Founder &amp; CTO at Isovalent and creator of the Cilium project. Before this, Thomas has been a Linux kernel developer at RedHat for many years.


Linux is the dominant platform to run microservices using cloud-native architectures. These modern architectures impose new challenges on the platform serving the applications. We&#39;ll take a peek at BPF and Cilium and how it revolutionizes both networking and security to enable platforms built on top of it to fully utilize the benefits of cloud-native architectures. 

Thomas Graf is Co-Founder &amp; CTO at Isovalent and creator of the Cilium project. Before this, Thomas has been a Linux kernel developer at RedHat for many years.

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2555-eng-Cilium_BPF_-_The_Future_of_Linux_Networking_and_Security_Keynote_Thomas_Graf_Cilium_opus.opus"
        length="16777216"
        type="audio/opus"/>
      <pubDate>Sat, 25 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2555-eng-Cilium_BPF_-_The_Future_of_Linux_Networking_and_Security_Keynote_Thomas_Graf_Cilium_opus.opus?1558786834</guid>
      <dc:identifier>csrcGQ7hEYgCTrb3f58vSQ</dc:identifier>
      <dc:date>2019-05-25T00:00:00+02:00</dc:date>
      <itunes:author>Thomas Graf</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2555, Keynote</itunes:keywords>
      <itunes:summary>Linux is the dominant platform to run microservices using cloud-native architectures. These modern architectures impose new challenges on the platform serving the applications. We&#39;ll take a peek at BPF and Cilium and how it revolutionizes both networking and security to enable platforms built on top of it to fully utilize the benefits of cloud-native architectures. 

Thomas Graf is Co-Founder &amp; CTO at Isovalent and creator of the Cilium project. Before this, Thomas has been a Linux kernel developer at RedHat for many years.


Linux is the dominant platform to run microservices using cloud-native architectures. These modern architectures impose new challenges on the platform serving the applications. We&#39;ll take a peek at BPF and Cilium and how it revolutionizes both networking and security to enable platforms built on top of it to fully utilize the benefits of cloud-native architectures. 

Thomas Graf is Co-Founder &amp; CTO at Isovalent and creator of the Cilium project. Before this, Thomas has been a Linux kernel developer at RedHat for many years.

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:29:08</itunes:duration>
    </item>
    <item>
      <title>Re-Thinking Spec Files (osc19)</title>
      <link>https://media.ccc.de/v/2501-re-thinking-spec-files</link>
      <description>Right now many RPM spec files contain large parts of boiler plate code. In the current development cycle of RPM we try to help reducing this clutter. We hope we can make packaging easier by providing means to have pre-arranged building blocks and offer more control over larger sets of packages. This will also change the relation between RPM as a multipurpose tool and the single package/packager by adding a layer in between take will take care of common tasks.
This talk  will give a overview of the changes already done and still planned and will allow for discussion and feed back.

Right now many RPM spec files contain large parts of boiler plate code. In the current development cycle of RPM we try to help reducing this clutter. We hope we can make packaging easier by providing means to have pre-arranged building blocks and offer more control over larger sets of packages. This will also change the relation between RPM as a multipurpose tool and the single package/packager by adding a layer in between take will take care of common tasks.
This talk  will give a overview of the changes already done and still planned and will allow for discussion and feed back.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2501-eng-Re-Thinking_Spec_Files_opus.opus"
        length="32505856"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2501-eng-Re-Thinking_Spec_Files_opus.opus?1558722634</guid>
      <dc:identifier>IEyjOV2OETpd153wvMALIA</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Florian Festi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2501, openSUSE</itunes:keywords>
      <itunes:subtitle>New features for rpmbuild</itunes:subtitle>
      <itunes:summary>Right now many RPM spec files contain large parts of boiler plate code. In the current development cycle of RPM we try to help reducing this clutter. We hope we can make packaging easier by providing means to have pre-arranged building blocks and offer more control over larger sets of packages. This will also change the relation between RPM as a multipurpose tool and the single package/packager by adding a layer in between take will take care of common tasks.
This talk  will give a overview of the changes already done and still planned and will allow for discussion and feed back.

Right now many RPM spec files contain large parts of boiler plate code. In the current development cycle of RPM we try to help reducing this clutter. We hope we can make packaging easier by providing means to have pre-arranged building blocks and offer more control over larger sets of packages. This will also change the relation between RPM as a multipurpose tool and the single package/packager by adding a layer in between take will take care of common tasks.
This talk  will give a overview of the changes already done and still planned and will allow for discussion and feed back.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:45:57</itunes:duration>
    </item>
    <item>
      <title>Building large health networks GNU Health Federation and openSUSE (osc19)</title>
      <link>https://media.ccc.de/v/2513-building-large-health-networks-gnu-health-federation-and-opensuse</link>
      <description>GNU Health is the Free/Libre Health and Hospital Information System that is included in openSUSE.

GNU Health combines the socioeconomic determinants of health with state-of-the-art technology in bioinformatics and clinical genetics. It provides holistic picture of the person, from the biological and molecular basis of disease to the environmental determinants of health. In addition, it manages the internal processes of a health institution, such as financial management, billing, stock management, pharmacies or labs (LIMS)

The GNU Health Federation introduced in 3.4 series allows to build nationwide federated networks with thousands of heterogeneous nodes. The GNU Health federation is revolutionary, and will allow the community, the health practitioners, the research institutions and the ministries of health to have much better perspective and precise information on the individuals and their context.

Having the GNU Health Federation in openSUSE (available both for Tumbleweed and Leap) not only provides the development environment, but the server stability to deploy it in hospitals and large heterogeneous health networks across a country. 

GNU Health is the Free/Libre Health and Hospital Information System that is included in openSUSE.

GNU Health combines the socioeconomic determinants of health with state-of-the-art technology in bioinformatics and clinical genetics. It provides holistic picture of the person, from the biological and molecular basis of disease to the environmental determinants of health. In addition, it manages the internal processes of a health institution, such as financial management, billing, stock management, pharmacies or labs (LIMS)

The GNU Health Federation introduced in 3.4 series allows to build nationwide federated networks with thousands of heterogeneous nodes. The GNU Health federation is revolutionary, and will allow the community, the health practitioners, the research institutions and the ministries of health to have much better perspective and precise information on the individuals and their context.

Having the GNU Health Federation in openSUSE (available both for Tumbleweed and Leap) not only provides the development environment, but the server stability to deploy it in hospitals and large heterogeneous health networks across a country. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2513-eng-Building_large_health_networks_GNU_Health_Federation_and_openSUSE_opus.opus"
        length="29360128"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2513-eng-Building_large_health_networks_GNU_Health_Federation_and_openSUSE_opus.opus?1558722476</guid>
      <dc:identifier>cp8jUfTm9BjicPO2BYu7ZQ</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Luis Falcon</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2513, openSUSE</itunes:keywords>
      <itunes:subtitle>10 years of Freedom and Equity in Healthcare</itunes:subtitle>
      <itunes:summary>GNU Health is the Free/Libre Health and Hospital Information System that is included in openSUSE.

GNU Health combines the socioeconomic determinants of health with state-of-the-art technology in bioinformatics and clinical genetics. It provides holistic picture of the person, from the biological and molecular basis of disease to the environmental determinants of health. In addition, it manages the internal processes of a health institution, such as financial management, billing, stock management, pharmacies or labs (LIMS)

The GNU Health Federation introduced in 3.4 series allows to build nationwide federated networks with thousands of heterogeneous nodes. The GNU Health federation is revolutionary, and will allow the community, the health practitioners, the research institutions and the ministries of health to have much better perspective and precise information on the individuals and their context.

Having the GNU Health Federation in openSUSE (available both for Tumbleweed and Leap) not only provides the development environment, but the server stability to deploy it in hospitals and large heterogeneous health networks across a country. 

GNU Health is the Free/Libre Health and Hospital Information System that is included in openSUSE.

GNU Health combines the socioeconomic determinants of health with state-of-the-art technology in bioinformatics and clinical genetics. It provides holistic picture of the person, from the biological and molecular basis of disease to the environmental determinants of health. In addition, it manages the internal processes of a health institution, such as financial management, billing, stock management, pharmacies or labs (LIMS)

The GNU Health Federation introduced in 3.4 series allows to build nationwide federated networks with thousands of heterogeneous nodes. The GNU Health federation is revolutionary, and will allow the community, the health practitioners, the research institutions and the ministries of health to have much better perspective and precise information on the individuals and their context.

Having the GNU Health Federation in openSUSE (available both for Tumbleweed and Leap) not only provides the development environment, but the server stability to deploy it in hospitals and large heterogeneous health networks across a country. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:42:55</itunes:duration>
    </item>
    <item>
      <title>Geeko Magazine: A Technical Magazine on openSUSE, edited on openSUSE (osc19)</title>
      <link>https://media.ccc.de/v/2465-geeko-magazine-a-technical-magazine-on-opensuse-edited-on-opensuse</link>
      <description>Japan openSUSE User Group publishes a technical magazine every half year. The title of the magazine is Geeko Magazine. It consists of technical articles on openSUSE and applications running on openSUSE. For example, the latest issue of the magazine contains articles like &quot;Launching Kubernetes Cluster with Kubic in 10 minutes&quot;, &quot;Accessing to Google Drive from openSUSE&quot;, and &quot;How to enable HTTPS with Let&#39;s Encrypt.&quot; Since 2014, we have published 9 issues of Geeko Magazine.

In this talk, after explaining the culture of self-publishing in Japan, I will talk about the process from calling articles from the user group until distributing Geeko Magazine.

Another topic is our challenge: editing the magazine on openSUSE. Thereby, we cannot use popular desktop publishing (DTP) applications like Adobe InDesign. Instead of such applications, we have been using Scribus, an OSS DTP application to edit Geeko Magazine. It supports CMYK color and DTP data such as trim marks and bleed areas, required by print shops.  However, in 2014, Scribus was not adequate for writing a Japanese document. This is because typesetting rules are much different from English etc.  To publish Geeko Magazine, we went OSS way; we have improved Scribus one by one at every issue of the magazine in cooperation with the upstream community. I will talk about a brief summary of those problems we have resolved.

Japan openSUSE User Group publishes a technical magazine every half year. The title of the magazine is Geeko Magazine. It consists of technical articles on openSUSE and applications running on openSUSE. For example, the latest issue of the magazine contains articles like &quot;Launching Kubernetes Cluster with Kubic in 10 minutes&quot;, &quot;Accessing to Google Drive from openSUSE&quot;, and &quot;How to enable HTTPS with Let&#39;s Encrypt.&quot; Since 2014, we have published 9 issues of Geeko Magazine.

In this talk, after explaining the culture of self-publishing in Japan, I will talk about the process from calling articles from the user group until distributing Geeko Magazine.

Another topic is our challenge: editing the magazine on openSUSE. Thereby, we cannot use popular desktop publishing (DTP) applications like Adobe InDesign. Instead of such applications, we have been using Scribus, an OSS DTP application to edit Geeko Magazine. It supports CMYK color and DTP data such as trim marks and bleed areas, required by print shops.  However, in 2014, Scribus was not adequate for writing a Japanese document. This is because typesetting rules are much different from English etc.  To publish Geeko Magazine, we went OSS way; we have improved Scribus one by one at every issue of the magazine in cooperation with the upstream community. I will talk about a brief summary of those problems we have resolved.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2465-eng-Geeko_Magazine_A_Technical_Magazine_on_openSUSE_edited_on_openSUSE_opus.opus"
        length="28311552"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2465-eng-Geeko_Magazine_A_Technical_Magazine_on_openSUSE_edited_on_openSUSE_opus.opus?1558720985</guid>
      <dc:identifier>VYFvdxaeH_SfczvkUMPjMw</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Fuminobu  Takeyama</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2465, openSUSE</itunes:keywords>
      <itunes:summary>Japan openSUSE User Group publishes a technical magazine every half year. The title of the magazine is Geeko Magazine. It consists of technical articles on openSUSE and applications running on openSUSE. For example, the latest issue of the magazine contains articles like &quot;Launching Kubernetes Cluster with Kubic in 10 minutes&quot;, &quot;Accessing to Google Drive from openSUSE&quot;, and &quot;How to enable HTTPS with Let&#39;s Encrypt.&quot; Since 2014, we have published 9 issues of Geeko Magazine.

In this talk, after explaining the culture of self-publishing in Japan, I will talk about the process from calling articles from the user group until distributing Geeko Magazine.

Another topic is our challenge: editing the magazine on openSUSE. Thereby, we cannot use popular desktop publishing (DTP) applications like Adobe InDesign. Instead of such applications, we have been using Scribus, an OSS DTP application to edit Geeko Magazine. It supports CMYK color and DTP data such as trim marks and bleed areas, required by print shops.  However, in 2014, Scribus was not adequate for writing a Japanese document. This is because typesetting rules are much different from English etc.  To publish Geeko Magazine, we went OSS way; we have improved Scribus one by one at every issue of the magazine in cooperation with the upstream community. I will talk about a brief summary of those problems we have resolved.

Japan openSUSE User Group publishes a technical magazine every half year. The title of the magazine is Geeko Magazine. It consists of technical articles on openSUSE and applications running on openSUSE. For example, the latest issue of the magazine contains articles like &quot;Launching Kubernetes Cluster with Kubic in 10 minutes&quot;, &quot;Accessing to Google Drive from openSUSE&quot;, and &quot;How to enable HTTPS with Let&#39;s Encrypt.&quot; Since 2014, we have published 9 issues of Geeko Magazine.

In this talk, after explaining the culture of self-publishing in Japan, I will talk about the process from calling articles from the user group until distributing Geeko Magazine.

Another topic is our challenge: editing the magazine on openSUSE. Thereby, we cannot use popular desktop publishing (DTP) applications like Adobe InDesign. Instead of such applications, we have been using Scribus, an OSS DTP application to edit Geeko Magazine. It supports CMYK color and DTP data such as trim marks and bleed areas, required by print shops.  However, in 2014, Scribus was not adequate for writing a Japanese document. This is because typesetting rules are much different from English etc.  To publish Geeko Magazine, we went OSS way; we have improved Scribus one by one at every issue of the magazine in cooperation with the upstream community. I will talk about a brief summary of those problems we have resolved.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:43:28</itunes:duration>
    </item>
    <item>
      <title>SUSE Package Hub - From Community to Enterprise (osc19)</title>
      <link>https://media.ccc.de/v/2492-suse-package-hub-from-community-to-enterprise</link>
      <description>SUSE Package Hub provides open source packages from the Community to SUSE Linux Enterprise Users.
This talk shows the current state, explains how to contribute and also gives some insights in the live of Package Hub.

SUSE Package Hub provides open source packages from the Community to SUSE Linux Enterprise Users.
This talk shows the current state, explains how to contribute and also gives some insights in the live of Package Hub.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2492-eng-SUSE_Package_Hub_-_From_Community_to_Enterprise_opus.opus"
        length="12582912"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2492-eng-SUSE_Package_Hub_-_From_Community_to_Enterprise_opus.opus?1558719094</guid>
      <dc:identifier>bmP7L6IcODD0pR1J8n-A-A</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Wolfgang Engel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2492, openSUSE</itunes:keywords>
      <itunes:summary>SUSE Package Hub provides open source packages from the Community to SUSE Linux Enterprise Users.
This talk shows the current state, explains how to contribute and also gives some insights in the live of Package Hub.

SUSE Package Hub provides open source packages from the Community to SUSE Linux Enterprise Users.
This talk shows the current state, explains how to contribute and also gives some insights in the live of Package Hub.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:18:53</itunes:duration>
    </item>
    <item>
      <title>Introduction to YubiKeys (in openSUSE) (osc19)</title>
      <link>https://media.ccc.de/v/2435-introduction-to-yubikeys-in-opensuse</link>
      <description>YubiKeys are handy little USB tokens that allow for hardware-based cryptography, which are becoming ever more prevalent. They provide support for a great variety of cryptographic protocols and standards, and offer several modes of operations. While this makes them very versatile, it can also be somewhat confusing, especially when you are only getting in touch with them for the first time.

This talk is an introduction to YubiKeys. It will explain what multifactor authentication is about, what kind of problems the YubiKey is addressing, and how the different modes of operation can be used to improve computer security.

In this talk two new emerging authentication standards will also be touched upon, namely WebAuthn and FIDO2. These are related to the YubiKey and in combination will make authentication throughout the Internet substantially more secure. More importantly, however, it is very easy to use - even by non-technical people!

A live demonstration will show you how a typical workflow looks like. Some advice and good practice, along with a Q&amp;A session will conclude the talk. 

Recently some effort has been put into packaging and updating the software stack for YubiKeys within openSUSE, so that everything (including the latest generation of YubiKeys) are supported out-of-the box.

For this talk no prior knowledge about the topic is required and/or expected. Any cryptographic concepts that are needed for explanation will be introduced on a high-level during the talk. Having basic cryptographic knowledge will definitely make it easier to follow along on some details, though.

YubiKeys are handy little USB tokens that allow for hardware-based cryptography, which are becoming ever more prevalent. They provide support for a great variety of cryptographic protocols and standards, and offer several modes of operations. While this makes them very versatile, it can also be somewhat confusing, especially when you are only getting in touch with them for the first time.

This talk is an introduction to YubiKeys. It will explain what multifactor authentication is about, what kind of problems the YubiKey is addressing, and how the different modes of operation can be used to improve computer security.

In this talk two new emerging authentication standards will also be touched upon, namely WebAuthn and FIDO2. These are related to the YubiKey and in combination will make authentication throughout the Internet substantially more secure. More importantly, however, it is very easy to use - even by non-technical people!

A live demonstration will show you how a typical workflow looks like. Some advice and good practice, along with a Q&amp;A session will conclude the talk. 

Recently some effort has been put into packaging and updating the software stack for YubiKeys within openSUSE, so that everything (including the latest generation of YubiKeys) are supported out-of-the box.

For this talk no prior knowledge about the topic is required and/or expected. Any cryptographic concepts that are needed for explanation will be introduced on a high-level during the talk. Having basic cryptographic knowledge will definitely make it easier to follow along on some details, though.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2435-eng-Introduction_to_YubiKeys_in_openSUSE_opus.opus"
        length="30408704"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2435-eng-Introduction_to_YubiKeys_in_openSUSE_opus.opus?1558718554</guid>
      <dc:identifier>B7CBSq7u1UrdIoJSOaMcUQ</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>kbabioch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2435, Desktop and Applications</itunes:keywords>
      <itunes:subtitle>Everything you should know about YubiKey</itunes:subtitle>
      <itunes:summary>YubiKeys are handy little USB tokens that allow for hardware-based cryptography, which are becoming ever more prevalent. They provide support for a great variety of cryptographic protocols and standards, and offer several modes of operations. While this makes them very versatile, it can also be somewhat confusing, especially when you are only getting in touch with them for the first time.

This talk is an introduction to YubiKeys. It will explain what multifactor authentication is about, what kind of problems the YubiKey is addressing, and how the different modes of operation can be used to improve computer security.

In this talk two new emerging authentication standards will also be touched upon, namely WebAuthn and FIDO2. These are related to the YubiKey and in combination will make authentication throughout the Internet substantially more secure. More importantly, however, it is very easy to use - even by non-technical people!

A live demonstration will show you how a typical workflow looks like. Some advice and good practice, along with a Q&amp;A session will conclude the talk. 

Recently some effort has been put into packaging and updating the software stack for YubiKeys within openSUSE, so that everything (including the latest generation of YubiKeys) are supported out-of-the box.

For this talk no prior knowledge about the topic is required and/or expected. Any cryptographic concepts that are needed for explanation will be introduced on a high-level during the talk. Having basic cryptographic knowledge will definitely make it easier to follow along on some details, though.

YubiKeys are handy little USB tokens that allow for hardware-based cryptography, which are becoming ever more prevalent. They provide support for a great variety of cryptographic protocols and standards, and offer several modes of operations. While this makes them very versatile, it can also be somewhat confusing, especially when you are only getting in touch with them for the first time.

This talk is an introduction to YubiKeys. It will explain what multifactor authentication is about, what kind of problems the YubiKey is addressing, and how the different modes of operation can be used to improve computer security.

In this talk two new emerging authentication standards will also be touched upon, namely WebAuthn and FIDO2. These are related to the YubiKey and in combination will make authentication throughout the Internet substantially more secure. More importantly, however, it is very easy to use - even by non-technical people!

A live demonstration will show you how a typical workflow looks like. Some advice and good practice, along with a Q&amp;A session will conclude the talk. 

Recently some effort has been put into packaging and updating the software stack for YubiKeys within openSUSE, so that everything (including the latest generation of YubiKeys) are supported out-of-the box.

For this talk no prior knowledge about the topic is required and/or expected. Any cryptographic concepts that are needed for explanation will be introduced on a high-level during the talk. Having basic cryptographic knowledge will definitely make it easier to follow along on some details, though.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:46:22</itunes:duration>
    </item>
    <item>
      <title>Kubic with OpenSDS (osc19)</title>
      <link>https://media.ccc.de/v/2393-kubic-with-opensds</link>
      <description>I introduce OpenSDS that is an open source community working to address storage integration challenges. I remark technology. OpenSDS can manage LVM, Ceph, Cinder, and more as a software defined storage. and We can use OpenSDS in Kubernetes through CSI, Flexvolume, and Service Catalog. therefore, Kubernetes can use software defined storage by OpenSDS. I draw overview of Kubernetes - OpenSDS - storage relationship and explain one case of to build on Kubic.

This strategy bring us these benefits:
- If Administrator create PodPreset at SDS, Application developer don&#39;t need to prepare storage.
- If Administrator create storage pool, He don&#39;t need to create volume each request.

And I explain potential of replication with DRBD.

Participant can learn SDS strategy on Kubernetes with OpenSDS. and How to build on Kubic.


I introduce OpenSDS that is an open source community working to address storage integration challenges. I remark technology. OpenSDS can manage LVM, Ceph, Cinder, and more as a software defined storage. and We can use OpenSDS in Kubernetes through CSI, Flexvolume, and Service Catalog. therefore, Kubernetes can use software defined storage by OpenSDS. I draw overview of Kubernetes - OpenSDS - storage relationship and explain one case of to build on Kubic.

This strategy bring us these benefits:
- If Administrator create PodPreset at SDS, Application developer don&#39;t need to prepare storage.
- If Administrator create storage pool, He don&#39;t need to create volume each request.

And I explain potential of replication with DRBD.

Participant can learn SDS strategy on Kubernetes with OpenSDS. and How to build on Kubic.

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2393-eng-Kubic_with_OpenSDS_opus.opus"
        length="15728640"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2393-eng-Kubic_with_OpenSDS_opus.opus?1558716568</guid>
      <dc:identifier>gdfI-Glbwx3op1MmYFwC9A</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>hashimotosyuta</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2393, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>Flexible software defined storage management</itunes:subtitle>
      <itunes:summary>I introduce OpenSDS that is an open source community working to address storage integration challenges. I remark technology. OpenSDS can manage LVM, Ceph, Cinder, and more as a software defined storage. and We can use OpenSDS in Kubernetes through CSI, Flexvolume, and Service Catalog. therefore, Kubernetes can use software defined storage by OpenSDS. I draw overview of Kubernetes - OpenSDS - storage relationship and explain one case of to build on Kubic.

This strategy bring us these benefits:
- If Administrator create PodPreset at SDS, Application developer don&#39;t need to prepare storage.
- If Administrator create storage pool, He don&#39;t need to create volume each request.

And I explain potential of replication with DRBD.

Participant can learn SDS strategy on Kubernetes with OpenSDS. and How to build on Kubic.


I introduce OpenSDS that is an open source community working to address storage integration challenges. I remark technology. OpenSDS can manage LVM, Ceph, Cinder, and more as a software defined storage. and We can use OpenSDS in Kubernetes through CSI, Flexvolume, and Service Catalog. therefore, Kubernetes can use software defined storage by OpenSDS. I draw overview of Kubernetes - OpenSDS - storage relationship and explain one case of to build on Kubic.

This strategy bring us these benefits:
- If Administrator create PodPreset at SDS, Application developer don&#39;t need to prepare storage.
- If Administrator create storage pool, He don&#39;t need to create volume each request.

And I explain potential of replication with DRBD.

Participant can learn SDS strategy on Kubernetes with OpenSDS. and How to build on Kubic.

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:27:38</itunes:duration>
    </item>
    <item>
      <title>Deploying Ceph with Rook on Kubic k8s cluster (osc19)</title>
      <link>https://media.ccc.de/v/2468-deploying-ceph-with-rook-on-kubic-k8s-cluster</link>
      <description>In this talk we could see how easy it is to deploy and configure Ceph ready k8s cluster on top of Kubic. And setup Ceph on top of it with Rook (rook.io).
We would see couple of examples for Openstack and Vagrant to run such clusters for your CI and development environments.

In this talk we could see how easy it is to deploy and configure Ceph ready k8s cluster on top of Kubic. And setup Ceph on top of it with Rook (rook.io).
We would see couple of examples for Openstack and Vagrant to run such clusters for your CI and development environments.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2468-eng-Deploying_Ceph_with_Rook_on_Kubic_k8s_cluster_opus.opus"
        length="15728640"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2468-eng-Deploying_Ceph_with_Rook_on_Kubic_k8s_cluster_opus.opus?1558714623</guid>
      <dc:identifier>XUovULBhNMilNEB3Jj5YuA</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Denis Kondratenko</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2468, Cloud and Containers</itunes:keywords>
      <itunes:summary>In this talk we could see how easy it is to deploy and configure Ceph ready k8s cluster on top of Kubic. And setup Ceph on top of it with Rook (rook.io).
We would see couple of examples for Openstack and Vagrant to run such clusters for your CI and development environments.

In this talk we could see how easy it is to deploy and configure Ceph ready k8s cluster on top of Kubic. And setup Ceph on top of it with Rook (rook.io).
We would see couple of examples for Openstack and Vagrant to run such clusters for your CI and development environments.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:30:15</itunes:duration>
    </item>
    <item>
      <title>Thinking About openSUSE HCL (osc19)</title>
      <link>https://media.ccc.de/v/2495-thinking-about-opensuse-hcl</link>
      <description>I have been a part of the Taiwan openSUSE community for almost a year. During this time, I was a volunteer at the openSUSE Asia Summit 2018, and I attended monthly openSUSE meet-ups. It feels great to have a group of people with whom to study and share knowledge.

In the new year, I am curious about how I can contribute to the community with my expertise as an OS certification technical manager in the server hardware industry. My job is to ensure the hardware product we make is compatible with as many operating systems as possible. 

Therefore, the first option I have looked into is the Hardware Compatibility List (HCL).
Why does the HCL matter? There are four reasons:
1. For some users, an HCL is mandatory before ordering can be started. 
2. It increases the user base; by having an updated HCL, people can easily start to use it.
3. Providing a hardware compatibility process to hardware vendors so they can display openSUSE as a compatible OS to their customers could be a chance to increase visibility to users.
4. Establishing an easy-to-follow hardware testing policy may increase the number of hardware vendors and users available to do the test and to report more bugs, and it will make openSUSE more reliable.

The good news is that openSUSE already has an HCL on its wiki page, but we are still facing some challenges. Here, I listed four major problems:
1. The data are entirely outdated.
2. There is much inconsistent information.
3. There is a lack of real data from the real system.
4. Anyone can edit the existing HCL, which could make the data unreliable.

To solve the problems, I herein propose three approaches to improve the HCL:
1. Develop a simple test kit to record the hardware information from the testing hardware system and provide the result to the HCL by submitting logs.
2. Leverage the SUSE Yes Certification Program’s result, listing the SUSE-certified servers in the openSUSE HCL.
3. Expand the HCL source from users to hardware vendors to collect HCL data from the source that are more reliable.

Ultimately, the HCL could develop into a hardware certification program, which can create more value. Adding more test cases can provide more compatibility between the hardware and openSUSE. In addition, we can create more policies to guide the hardware vendor, and we can even design a logo to prove compatibility in the market.

In the end, I will talk about the call to action.
If the audiences are interested in the idea, the HCL needs more people to become involved to:
1. Develop a test suite to collect the HW data; it must be expandable for adding more test cases in the future.
2. Create a basic guideline for the people who want to test their hardware and submit the logs to the openSUSE HCL.
3. Form a team/committee to oversee the process of submitting the HCL.


I have been a part of the Taiwan openSUSE community for almost a year. During this time, I was a volunteer at the openSUSE Asia Summit 2018, and I attended monthly openSUSE meet-ups. It feels great to have a group of people with whom to study and share knowledge.

In the new year, I am curious about how I can contribute to the community with my expertise as an OS certification technical manager in the server hardware industry. My job is to ensure the hardware product we make is compatible with as many operating systems as possible. 

Therefore, the first option I have looked into is the Hardware Compatibility List (HCL).
Why does the HCL matter? There are four reasons:
1. For some users, an HCL is mandatory before ordering can be started. 
2. It increases the user base; by having an updated HCL, people can easily start to use it.
3. Providing a hardware compatibility process to hardware vendors so they can display openSUSE as a compatible OS to their customers could be a chance to increase visibility to users.
4. Establishing an easy-to-follow hardware testing policy may increase the number of hardware vendors and users available to do the test and to report more bugs, and it will make openSUSE more reliable.

The good news is that openSUSE already has an HCL on its wiki page, but we are still facing some challenges. Here, I listed four major problems:
1. The data are entirely outdated.
2. There is much inconsistent information.
3. There is a lack of real data from the real system.
4. Anyone can edit the existing HCL, which could make the data unreliable.

To solve the problems, I herein propose three approaches to improve the HCL:
1. Develop a simple test kit to record the hardware information from the testing hardware system and provide the result to the HCL by submitting logs.
2. Leverage the SUSE Yes Certification Program’s result, listing the SUSE-certified servers in the openSUSE HCL.
3. Expand the HCL source from users to hardware vendors to collect HCL data from the source that are more reliable.

Ultimately, the HCL could develop into a hardware certification program, which can create more value. Adding more test cases can provide more compatibility between the hardware and openSUSE. In addition, we can create more policies to guide the hardware vendor, and we can even design a logo to prove compatibility in the market.

In the end, I will talk about the call to action.
If the audiences are interested in the idea, the HCL needs more people to become involved to:
1. Develop a test suite to collect the HW data; it must be expandable for adding more test cases in the future.
2. Create a basic guideline for the people who want to test their hardware and submit the logs to the openSUSE HCL.
3. Form a team/committee to oversee the process of submitting the HCL.

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2495-eng-Thinking_About_openSUSE_HCL_opus.opus"
        length="18874368"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2495-eng-Thinking_About_openSUSE_HCL_opus.opus?1558714564</guid>
      <dc:identifier>R_xgbDbjKckw1D_7uNzUVQ</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Joshsi</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2495, openSUSE</itunes:keywords>
      <itunes:subtitle>Let&#39;s Keep HCL Updated</itunes:subtitle>
      <itunes:summary>I have been a part of the Taiwan openSUSE community for almost a year. During this time, I was a volunteer at the openSUSE Asia Summit 2018, and I attended monthly openSUSE meet-ups. It feels great to have a group of people with whom to study and share knowledge.

In the new year, I am curious about how I can contribute to the community with my expertise as an OS certification technical manager in the server hardware industry. My job is to ensure the hardware product we make is compatible with as many operating systems as possible. 

Therefore, the first option I have looked into is the Hardware Compatibility List (HCL).
Why does the HCL matter? There are four reasons:
1. For some users, an HCL is mandatory before ordering can be started. 
2. It increases the user base; by having an updated HCL, people can easily start to use it.
3. Providing a hardware compatibility process to hardware vendors so they can display openSUSE as a compatible OS to their customers could be a chance to increase visibility to users.
4. Establishing an easy-to-follow hardware testing policy may increase the number of hardware vendors and users available to do the test and to report more bugs, and it will make openSUSE more reliable.

The good news is that openSUSE already has an HCL on its wiki page, but we are still facing some challenges. Here, I listed four major problems:
1. The data are entirely outdated.
2. There is much inconsistent information.
3. There is a lack of real data from the real system.
4. Anyone can edit the existing HCL, which could make the data unreliable.

To solve the problems, I herein propose three approaches to improve the HCL:
1. Develop a simple test kit to record the hardware information from the testing hardware system and provide the result to the HCL by submitting logs.
2. Leverage the SUSE Yes Certification Program’s result, listing the SUSE-certified servers in the openSUSE HCL.
3. Expand the HCL source from users to hardware vendors to collect HCL data from the source that are more reliable.

Ultimately, the HCL could develop into a hardware certification program, which can create more value. Adding more test cases can provide more compatibility between the hardware and openSUSE. In addition, we can create more policies to guide the hardware vendor, and we can even design a logo to prove compatibility in the market.

In the end, I will talk about the call to action.
If the audiences are interested in the idea, the HCL needs more people to become involved to:
1. Develop a test suite to collect the HW data; it must be expandable for adding more test cases in the future.
2. Create a basic guideline for the people who want to test their hardware and submit the logs to the openSUSE HCL.
3. Form a team/committee to oversee the process of submitting the HCL.


I have been a part of the Taiwan openSUSE community for almost a year. During this time, I was a volunteer at the openSUSE Asia Summit 2018, and I attended monthly openSUSE meet-ups. It feels great to have a group of people with whom to study and share knowledge.

In the new year, I am curious about how I can contribute to the community with my expertise as an OS certification technical manager in the server hardware industry. My job is to ensure the hardware product we make is compatible with as many operating systems as possible. 

Therefore, the first option I have looked into is the Hardware Compatibility List (HCL).
Why does the HCL matter? There are four reasons:
1. For some users, an HCL is mandatory before ordering can be started. 
2. It increases the user base; by having an updated HCL, people can easily start to use it.
3. Providing a hardware compatibility process to hardware vendors so they can display openSUSE as a compatible OS to their customers could be a chance to increase visibility to users.
4. Establishing an easy-to-follow hardware testing policy may increase the number of hardware vendors and users available to do the test and to report more bugs, and it will make openSUSE more reliable.

The good news is that openSUSE already has an HCL on its wiki page, but we are still facing some challenges. Here, I listed four major problems:
1. The data are entirely outdated.
2. There is much inconsistent information.
3. There is a lack of real data from the real system.
4. Anyone can edit the existing HCL, which could make the data unreliable.

To solve the problems, I herein propose three approaches to improve the HCL:
1. Develop a simple test kit to record the hardware information from the testing hardware system and provide the result to the HCL by submitting logs.
2. Leverage the SUSE Yes Certification Program’s result, listing the SUSE-certified servers in the openSUSE HCL.
3. Expand the HCL source from users to hardware vendors to collect HCL data from the source that are more reliable.

Ultimately, the HCL could develop into a hardware certification program, which can create more value. Adding more test cases can provide more compatibility between the hardware and openSUSE. In addition, we can create more policies to guide the hardware vendor, and we can even design a logo to prove compatibility in the market.

In the end, I will talk about the call to action.
If the audiences are interested in the idea, the HCL needs more people to become involved to:
1. Develop a test suite to collect the HW data; it must be expandable for adding more test cases in the future.
2. Create a basic guideline for the people who want to test their hardware and submit the logs to the openSUSE HCL.
3. Form a team/committee to oversee the process of submitting the HCL.

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:29:22</itunes:duration>
    </item>
    <item>
      <title>openSUSE MicroOS Desktop (osc19)</title>
      <link>https://media.ccc.de/v/2531-opensuse-microos-desktop</link>
      <description>Kubic with its MicroOS core is an exciting distribution that takes much of the cool stuff we&#39;re doing in Tumbleweed, adds solutions to the problems of updating a running system, and is becoming the perfect base system for running containers.

But in openSUSE, running server stuff is only half the fun.

Why should servers be the only platform enjoying automatic, atomic, &quot;auto-rollbackable&quot; system updates?

Surely desktop users want to be lazy like server admins also?

Can the tools and approaches implemented in MicroOS help create the desktop distribution of the future?

Let&#39;s find out!

This talk will introduce the concept of &#39;openSUSE MicroOS Desktop&#39;, a desktop focused variant of MicroOS based on Tumbleweed.

Various ideas will be discussed, prototypes will be shown, and feedback will be expected from the audience to help shape this potentially exciting take on the future of openSUSE on Desktops.

Kubic with its MicroOS core is an exciting distribution that takes much of the cool stuff we&#39;re doing in Tumbleweed, adds solutions to the problems of updating a running system, and is becoming the perfect base system for running containers.

But in openSUSE, running server stuff is only half the fun.

Why should servers be the only platform enjoying automatic, atomic, &quot;auto-rollbackable&quot; system updates?

Surely desktop users want to be lazy like server admins also?

Can the tools and approaches implemented in MicroOS help create the desktop distribution of the future?

Let&#39;s find out!

This talk will introduce the concept of &#39;openSUSE MicroOS Desktop&#39;, a desktop focused variant of MicroOS based on Tumbleweed.

Various ideas will be discussed, prototypes will be shown, and feedback will be expected from the audience to help shape this potentially exciting take on the future of openSUSE on Desktops.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2531-eng-openSUSE_MicroOS_Desktop_opus.opus"
        length="23068672"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2531-eng-openSUSE_MicroOS_Desktop_opus.opus?1558712643</guid>
      <dc:identifier>FYZNn_oSKwNj28O6WUViuw</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Richard Brown</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2531, Desktop and Applications</itunes:keywords>
      <itunes:subtitle>A New openSUSE Desktop Distribution?</itunes:subtitle>
      <itunes:summary>Kubic with its MicroOS core is an exciting distribution that takes much of the cool stuff we&#39;re doing in Tumbleweed, adds solutions to the problems of updating a running system, and is becoming the perfect base system for running containers.

But in openSUSE, running server stuff is only half the fun.

Why should servers be the only platform enjoying automatic, atomic, &quot;auto-rollbackable&quot; system updates?

Surely desktop users want to be lazy like server admins also?

Can the tools and approaches implemented in MicroOS help create the desktop distribution of the future?

Let&#39;s find out!

This talk will introduce the concept of &#39;openSUSE MicroOS Desktop&#39;, a desktop focused variant of MicroOS based on Tumbleweed.

Various ideas will be discussed, prototypes will be shown, and feedback will be expected from the audience to help shape this potentially exciting take on the future of openSUSE on Desktops.

Kubic with its MicroOS core is an exciting distribution that takes much of the cool stuff we&#39;re doing in Tumbleweed, adds solutions to the problems of updating a running system, and is becoming the perfect base system for running containers.

But in openSUSE, running server stuff is only half the fun.

Why should servers be the only platform enjoying automatic, atomic, &quot;auto-rollbackable&quot; system updates?

Surely desktop users want to be lazy like server admins also?

Can the tools and approaches implemented in MicroOS help create the desktop distribution of the future?

Let&#39;s find out!

This talk will introduce the concept of &#39;openSUSE MicroOS Desktop&#39;, a desktop focused variant of MicroOS based on Tumbleweed.

Various ideas will be discussed, prototypes will be shown, and feedback will be expected from the audience to help shape this potentially exciting take on the future of openSUSE on Desktops.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:39</itunes:duration>
    </item>
    <item>
      <title>openSUSE MicroOS in Production (osc19)</title>
      <link>https://media.ccc.de/v/2444-opensuse-microos-in-production</link>
      <description>This talk will be about deploying comment business applications on openSUSE MicroOS It will have a 15 mins presentation about the challenges that we face at our company La Sentinelle, Mauritius (https://www.lasentinelle.mu) and how we used openSUSE MicroOS to address those. The presentation will follow by a 30 mins technical demo deploying a business application on MicroOSp. Finally, there will be 15 mins to address questions pertaining to the technical demo and any other business.

This talk will be about deploying comment business applications on openSUSE MicroOS It will have a 15 mins presentation about the challenges that we face at our company La Sentinelle, Mauritius (https://www.lasentinelle.mu) and how we used openSUSE MicroOS to address those. The presentation will follow by a 30 mins technical demo deploying a business application on MicroOSp. Finally, there will be 15 mins to address questions pertaining to the technical demo and any other business.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2444-eng-openSUSE_MicroOS_in_Production_opus.opus"
        length="9437184"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2444-eng-openSUSE_MicroOS_in_Production_opus.opus?1558712524</guid>
      <dc:identifier>JT01r0-bwd2t4iKNoCLBVg</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Ish Sookun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2444, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>Deploying apps using Podman</itunes:subtitle>
      <itunes:summary>This talk will be about deploying comment business applications on openSUSE MicroOS It will have a 15 mins presentation about the challenges that we face at our company La Sentinelle, Mauritius (https://www.lasentinelle.mu) and how we used openSUSE MicroOS to address those. The presentation will follow by a 30 mins technical demo deploying a business application on MicroOSp. Finally, there will be 15 mins to address questions pertaining to the technical demo and any other business.

This talk will be about deploying comment business applications on openSUSE MicroOS It will have a 15 mins presentation about the challenges that we face at our company La Sentinelle, Mauritius (https://www.lasentinelle.mu) and how we used openSUSE MicroOS to address those. The presentation will follow by a 30 mins technical demo deploying a business application on MicroOSp. Finally, there will be 15 mins to address questions pertaining to the technical demo and any other business.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:16:22</itunes:duration>
    </item>
    <item>
      <title>&quot;Kubernetes The Hard Way&quot; on openSUSE Cloud environment (osc19)</title>
      <link>https://media.ccc.de/v/2456-kubernetes-the-hard-way-on-opensuse-cloud-environment</link>
      <description>&quot;Kubernetes&quot; is one of the most popular and famous container orchestration open source software. And now, there are so many Kubernetes environments and deployment tools such as SUSE CaaS Platform, minikube, kubeadm, Rancher, GKE/AKS/EKS, etc. So, we can use or build a Kubernetes cluster with them very easily. However, it also prevents opportunities to understand Kubernetes technologies themselves from people who want to know the architecture itself. Therefore, if a Kubernetes cluster gets something wrong, it would be tough challenge to resolve it without such knowledge. For such a situation, here is a very good exercise document - &quot;Kubernetes The Hard Way[0]&quot; which is a tutorial for setting up Kubernetes the hard way on Google Cloud Platform(GCP). People can learn internal architecture of Kubernetes from that.

In this session, attendees will get an opportunity to know how to set up a Kubernetes cluster on not only GCP but also an openSUSE OpenStack cloud based on the tutorial, and, will get to know its technology deeply.
&quot;Kubernetes The Hard Way&quot;[0] has 14 chapters right now. And it&#39;s written for the GCP basically. However, it works on the other clouds (e.g. openSUSE OpenStack Cloud) with some modifications.

[0] https://github.com/kelseyhightower/kubernetes-the-hard-way
Kubernetes The Hard Way outlines::
1. Prerequisites
2. Installing the Client Tools
3. Provisioning Compute Resources
4. Provisioning a CA and Generating TLS Certificates
5. Generating Kubernetes Configuration Files for Authentication
6. Generating the Data Encryption Config and Key
7. Bootstrapping the etcd Cluster
8. Bootstrapping the Kubernetes Control Plane
9. Bootstrapping the Kubernetes Worker Nodes
10. Configuring kubectl for Remote Access
11. Provisioning Pod Network Routes
12. Deploying the DNS Cluster Add-on
13. Smoke Test
14. Cleaning Up

&quot;Kubernetes&quot; is one of the most popular and famous container orchestration open source software. And now, there are so many Kubernetes environments and deployment tools such as SUSE CaaS Platform, minikube, kubeadm, Rancher, GKE/AKS/EKS, etc. So, we can use or build a Kubernetes cluster with them very easily. However, it also prevents opportunities to understand Kubernetes technologies themselves from people who want to know the architecture itself. Therefore, if a Kubernetes cluster gets something wrong, it would be tough challenge to resolve it without such knowledge. For such a situation, here is a very good exercise document - &quot;Kubernetes The Hard Way[0]&quot; which is a tutorial for setting up Kubernetes the hard way on Google Cloud Platform(GCP). People can learn internal architecture of Kubernetes from that.

In this session, attendees will get an opportunity to know how to set up a Kubernetes cluster on not only GCP but also an openSUSE OpenStack cloud based on the tutorial, and, will get to know its technology deeply.
&quot;Kubernetes The Hard Way&quot;[0] has 14 chapters right now. And it&#39;s written for the GCP basically. However, it works on the other clouds (e.g. openSUSE OpenStack Cloud) with some modifications.

[0] https://github.com/kelseyhightower/kubernetes-the-hard-way
Kubernetes The Hard Way outlines::
1. Prerequisites
2. Installing the Client Tools
3. Provisioning Compute Resources
4. Provisioning a CA and Generating TLS Certificates
5. Generating Kubernetes Configuration Files for Authentication
6. Generating the Data Encryption Config and Key
7. Bootstrapping the etcd Cluster
8. Bootstrapping the Kubernetes Control Plane
9. Bootstrapping the Kubernetes Worker Nodes
10. Configuring kubectl for Remote Access
11. Provisioning Pod Network Routes
12. Deploying the DNS Cluster Add-on
13. Smoke Test
14. Cleaning Up
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2456-eng-Kubernetes_The_Hard_Way_on_openSUSE_Cloud_environment_opus.opus"
        length="13631488"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2456-eng-Kubernetes_The_Hard_Way_on_openSUSE_Cloud_environment_opus.opus?1558712044</guid>
      <dc:identifier>7_UawP-ER0fSbXRipXqR-g</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Masayuki Igawa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2456, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>Let&#39;s build your own cloud</itunes:subtitle>
      <itunes:summary>&quot;Kubernetes&quot; is one of the most popular and famous container orchestration open source software. And now, there are so many Kubernetes environments and deployment tools such as SUSE CaaS Platform, minikube, kubeadm, Rancher, GKE/AKS/EKS, etc. So, we can use or build a Kubernetes cluster with them very easily. However, it also prevents opportunities to understand Kubernetes technologies themselves from people who want to know the architecture itself. Therefore, if a Kubernetes cluster gets something wrong, it would be tough challenge to resolve it without such knowledge. For such a situation, here is a very good exercise document - &quot;Kubernetes The Hard Way[0]&quot; which is a tutorial for setting up Kubernetes the hard way on Google Cloud Platform(GCP). People can learn internal architecture of Kubernetes from that.

In this session, attendees will get an opportunity to know how to set up a Kubernetes cluster on not only GCP but also an openSUSE OpenStack cloud based on the tutorial, and, will get to know its technology deeply.
&quot;Kubernetes The Hard Way&quot;[0] has 14 chapters right now. And it&#39;s written for the GCP basically. However, it works on the other clouds (e.g. openSUSE OpenStack Cloud) with some modifications.

[0] https://github.com/kelseyhightower/kubernetes-the-hard-way
Kubernetes The Hard Way outlines::
1. Prerequisites
2. Installing the Client Tools
3. Provisioning Compute Resources
4. Provisioning a CA and Generating TLS Certificates
5. Generating Kubernetes Configuration Files for Authentication
6. Generating the Data Encryption Config and Key
7. Bootstrapping the etcd Cluster
8. Bootstrapping the Kubernetes Control Plane
9. Bootstrapping the Kubernetes Worker Nodes
10. Configuring kubectl for Remote Access
11. Provisioning Pod Network Routes
12. Deploying the DNS Cluster Add-on
13. Smoke Test
14. Cleaning Up

&quot;Kubernetes&quot; is one of the most popular and famous container orchestration open source software. And now, there are so many Kubernetes environments and deployment tools such as SUSE CaaS Platform, minikube, kubeadm, Rancher, GKE/AKS/EKS, etc. So, we can use or build a Kubernetes cluster with them very easily. However, it also prevents opportunities to understand Kubernetes technologies themselves from people who want to know the architecture itself. Therefore, if a Kubernetes cluster gets something wrong, it would be tough challenge to resolve it without such knowledge. For such a situation, here is a very good exercise document - &quot;Kubernetes The Hard Way[0]&quot; which is a tutorial for setting up Kubernetes the hard way on Google Cloud Platform(GCP). People can learn internal architecture of Kubernetes from that.

In this session, attendees will get an opportunity to know how to set up a Kubernetes cluster on not only GCP but also an openSUSE OpenStack cloud based on the tutorial, and, will get to know its technology deeply.
&quot;Kubernetes The Hard Way&quot;[0] has 14 chapters right now. And it&#39;s written for the GCP basically. However, it works on the other clouds (e.g. openSUSE OpenStack Cloud) with some modifications.

[0] https://github.com/kelseyhightower/kubernetes-the-hard-way
Kubernetes The Hard Way outlines::
1. Prerequisites
2. Installing the Client Tools
3. Provisioning Compute Resources
4. Provisioning a CA and Generating TLS Certificates
5. Generating Kubernetes Configuration Files for Authentication
6. Generating the Data Encryption Config and Key
7. Bootstrapping the etcd Cluster
8. Bootstrapping the Kubernetes Control Plane
9. Bootstrapping the Kubernetes Worker Nodes
10. Configuring kubectl for Remote Access
11. Provisioning Pod Network Routes
12. Deploying the DNS Cluster Add-on
13. Smoke Test
14. Cleaning Up
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:25:49</itunes:duration>
    </item>
    <item>
      <title>openSUSE MicroOS (osc19)</title>
      <link>https://media.ccc.de/v/2528-opensuse-microos</link>
      <description>As the world moves more and more towards containerised solutions, a number of real questions start to appear. - What is the perfect platform for running containers atop? - How to use this platform as part of a flexible, scalable, highly available infrastructure fabric? - How to minimize the maintenance and administration of this platform at scale? 

Many of these problems are well answered in enterprise container offerings, but for developers more interested in the state of containers &amp; kubernetes upstream, new issues start to appear. With such fast moving upstreams, developers and enthusiasts need a platform that can keep up and is closely involved with those upstream developments. This platform needs to not only be able to run containers at scale, but also on single machine, all the while preserving the attributes of low maintenance so the focus can be on the containers, not the base system beneath them. 

And then the question becomes &quot;What is so special about containers anyway?&quot; - in more and more cases, people are deploying Linux VMs, Cloud instances, or bare metal to do &#39;just one job&#39;, with other jobs being handled by other machines. Can we simplify the Operating System and make it easier to live with if we optimise it for these &#39;single-purpose&#39; deployments?

This talk introduces openSUSE MicroOS, and explains how it addresses the above, being the perfect distribution for this modern age. The session will explore in some detail how MicroOS is developed in lockstep with the Tumbleweed rolling release and can be used for a wide variety of single-purpose systems.

This talk will also discuss openSUSE Kubic, the MicroOS variant focused on containers. The talk will share how Kubic collaborates with various upstreams including kubeadm and CRI-O. Transactional Updates, Kubic&#39;s system update stack will be demonstrated and the benefits from such an atomic update approach discussed in some detail.

Finally the kubictl Kubernetes cluster boostrapping tool will be discussed and some future plans shared for consideration and feedback.

As the world moves more and more towards containerised solutions, a number of real questions start to appear. - What is the perfect platform for running containers atop? - How to use this platform as part of a flexible, scalable, highly available infrastructure fabric? - How to minimize the maintenance and administration of this platform at scale? 

Many of these problems are well answered in enterprise container offerings, but for developers more interested in the state of containers &amp; kubernetes upstream, new issues start to appear. With such fast moving upstreams, developers and enthusiasts need a platform that can keep up and is closely involved with those upstream developments. This platform needs to not only be able to run containers at scale, but also on single machine, all the while preserving the attributes of low maintenance so the focus can be on the containers, not the base system beneath them. 

And then the question becomes &quot;What is so special about containers anyway?&quot; - in more and more cases, people are deploying Linux VMs, Cloud instances, or bare metal to do &#39;just one job&#39;, with other jobs being handled by other machines. Can we simplify the Operating System and make it easier to live with if we optimise it for these &#39;single-purpose&#39; deployments?

This talk introduces openSUSE MicroOS, and explains how it addresses the above, being the perfect distribution for this modern age. The session will explore in some detail how MicroOS is developed in lockstep with the Tumbleweed rolling release and can be used for a wide variety of single-purpose systems.

This talk will also discuss openSUSE Kubic, the MicroOS variant focused on containers. The talk will share how Kubic collaborates with various upstreams including kubeadm and CRI-O. Transactional Updates, Kubic&#39;s system update stack will be demonstrated and the benefits from such an atomic update approach discussed in some detail.

Finally the kubictl Kubernetes cluster boostrapping tool will be discussed and some future plans shared for consideration and feedback.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2528-eng-openSUSE_MicroOS_opus.opus"
        length="25165824"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2528-eng-openSUSE_MicroOS_opus.opus?1558711804</guid>
      <dc:identifier>drBsJm1OspmodxlcUlVZoA</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Richard Brown</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2528, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>A new distro for a new age</itunes:subtitle>
      <itunes:summary>As the world moves more and more towards containerised solutions, a number of real questions start to appear. - What is the perfect platform for running containers atop? - How to use this platform as part of a flexible, scalable, highly available infrastructure fabric? - How to minimize the maintenance and administration of this platform at scale? 

Many of these problems are well answered in enterprise container offerings, but for developers more interested in the state of containers &amp; kubernetes upstream, new issues start to appear. With such fast moving upstreams, developers and enthusiasts need a platform that can keep up and is closely involved with those upstream developments. This platform needs to not only be able to run containers at scale, but also on single machine, all the while preserving the attributes of low maintenance so the focus can be on the containers, not the base system beneath them. 

And then the question becomes &quot;What is so special about containers anyway?&quot; - in more and more cases, people are deploying Linux VMs, Cloud instances, or bare metal to do &#39;just one job&#39;, with other jobs being handled by other machines. Can we simplify the Operating System and make it easier to live with if we optimise it for these &#39;single-purpose&#39; deployments?

This talk introduces openSUSE MicroOS, and explains how it addresses the above, being the perfect distribution for this modern age. The session will explore in some detail how MicroOS is developed in lockstep with the Tumbleweed rolling release and can be used for a wide variety of single-purpose systems.

This talk will also discuss openSUSE Kubic, the MicroOS variant focused on containers. The talk will share how Kubic collaborates with various upstreams including kubeadm and CRI-O. Transactional Updates, Kubic&#39;s system update stack will be demonstrated and the benefits from such an atomic update approach discussed in some detail.

Finally the kubictl Kubernetes cluster boostrapping tool will be discussed and some future plans shared for consideration and feedback.

As the world moves more and more towards containerised solutions, a number of real questions start to appear. - What is the perfect platform for running containers atop? - How to use this platform as part of a flexible, scalable, highly available infrastructure fabric? - How to minimize the maintenance and administration of this platform at scale? 

Many of these problems are well answered in enterprise container offerings, but for developers more interested in the state of containers &amp; kubernetes upstream, new issues start to appear. With such fast moving upstreams, developers and enthusiasts need a platform that can keep up and is closely involved with those upstream developments. This platform needs to not only be able to run containers at scale, but also on single machine, all the while preserving the attributes of low maintenance so the focus can be on the containers, not the base system beneath them. 

And then the question becomes &quot;What is so special about containers anyway?&quot; - in more and more cases, people are deploying Linux VMs, Cloud instances, or bare metal to do &#39;just one job&#39;, with other jobs being handled by other machines. Can we simplify the Operating System and make it easier to live with if we optimise it for these &#39;single-purpose&#39; deployments?

This talk introduces openSUSE MicroOS, and explains how it addresses the above, being the perfect distribution for this modern age. The session will explore in some detail how MicroOS is developed in lockstep with the Tumbleweed rolling release and can be used for a wide variety of single-purpose systems.

This talk will also discuss openSUSE Kubic, the MicroOS variant focused on containers. The talk will share how Kubic collaborates with various upstreams including kubeadm and CRI-O. Transactional Updates, Kubic&#39;s system update stack will be demonstrated and the benefits from such an atomic update approach discussed in some detail.

Finally the kubictl Kubernetes cluster boostrapping tool will be discussed and some future plans shared for consideration and feedback.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:42:56</itunes:duration>
    </item>
    <item>
      <title>DNF vs ZYpp: Fight! (osc19)</title>
      <link>https://media.ccc.de/v/2480-dnf-vs-zypp-fight</link>
      <description>In one corner, we have Zypper: the successor to the motley of package management options from Ximian and SuSE. Created after the merger of the Ximian and YaST package manager teams, it was a pioneer in using the SAT solver for package management and proved that it worked well at scale in a large and popular Linux distribution platform (SUSE Linux). It spawned the development of libsatsolver, which became libsolv. Considered by many to be the most advanced and fastest package manager, it is created a class of package managers all on its own. It is used in openSUSE, but is also available in Fedora and other RPM-based Linux distributions.

In the other corner, we have DNF: the anointed successor to YUM (Yellowdog Updater, Modified). DNF (Dandified YUM) was forked from YUM to rework the internals to leverage libsolv and offer a saner, more maintainable API. Forged from the blood, sweat, and tears of many package manager developers from Red Hat and others, DNF is built with the lessons in mind from the last decade of software and systems management experiences. A new up and comer, it is used in Fedora, Mageia, OpenMandriva, Yocto, and others. It is also available in openSUSE.

How do these two package managers compare? Are they more similar than different? Has DNF made YUM no longer a trash heap? Does ZYpp still rule the roost? This talk explores both package managers and compares them from a technical, usability, and ecosystem perspective. Who knows? Perhaps there are lessons to still be learned for evolving both package managers.

In one corner, we have Zypper: the successor to the motley of package management options from Ximian and SuSE. Created after the merger of the Ximian and YaST package manager teams, it was a pioneer in using the SAT solver for package management and proved that it worked well at scale in a large and popular Linux distribution platform (SUSE Linux). It spawned the development of libsatsolver, which became libsolv. Considered by many to be the most advanced and fastest package manager, it is created a class of package managers all on its own. It is used in openSUSE, but is also available in Fedora and other RPM-based Linux distributions.

In the other corner, we have DNF: the anointed successor to YUM (Yellowdog Updater, Modified). DNF (Dandified YUM) was forked from YUM to rework the internals to leverage libsolv and offer a saner, more maintainable API. Forged from the blood, sweat, and tears of many package manager developers from Red Hat and others, DNF is built with the lessons in mind from the last decade of software and systems management experiences. A new up and comer, it is used in Fedora, Mageia, OpenMandriva, Yocto, and others. It is also available in openSUSE.

How do these two package managers compare? Are they more similar than different? Has DNF made YUM no longer a trash heap? Does ZYpp still rule the roost? This talk explores both package managers and compares them from a technical, usability, and ecosystem perspective. Who knows? Perhaps there are lessons to still be learned for evolving both package managers.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2480-eng-DNF_vs_ZYpp_Fight_opus.opus"
        length="20971520"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2480-eng-DNF_vs_ZYpp_Fight_opus.opus?1558711534</guid>
      <dc:identifier>6Vz-zO0BBM9WondOan6bJw</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Neal Gompa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2480, Open Source</itunes:keywords>
      <itunes:subtitle>A comparison of the two major RPM package managers</itunes:subtitle>
      <itunes:summary>In one corner, we have Zypper: the successor to the motley of package management options from Ximian and SuSE. Created after the merger of the Ximian and YaST package manager teams, it was a pioneer in using the SAT solver for package management and proved that it worked well at scale in a large and popular Linux distribution platform (SUSE Linux). It spawned the development of libsatsolver, which became libsolv. Considered by many to be the most advanced and fastest package manager, it is created a class of package managers all on its own. It is used in openSUSE, but is also available in Fedora and other RPM-based Linux distributions.

In the other corner, we have DNF: the anointed successor to YUM (Yellowdog Updater, Modified). DNF (Dandified YUM) was forked from YUM to rework the internals to leverage libsolv and offer a saner, more maintainable API. Forged from the blood, sweat, and tears of many package manager developers from Red Hat and others, DNF is built with the lessons in mind from the last decade of software and systems management experiences. A new up and comer, it is used in Fedora, Mageia, OpenMandriva, Yocto, and others. It is also available in openSUSE.

How do these two package managers compare? Are they more similar than different? Has DNF made YUM no longer a trash heap? Does ZYpp still rule the roost? This talk explores both package managers and compares them from a technical, usability, and ecosystem perspective. Who knows? Perhaps there are lessons to still be learned for evolving both package managers.

In one corner, we have Zypper: the successor to the motley of package management options from Ximian and SuSE. Created after the merger of the Ximian and YaST package manager teams, it was a pioneer in using the SAT solver for package management and proved that it worked well at scale in a large and popular Linux distribution platform (SUSE Linux). It spawned the development of libsatsolver, which became libsolv. Considered by many to be the most advanced and fastest package manager, it is created a class of package managers all on its own. It is used in openSUSE, but is also available in Fedora and other RPM-based Linux distributions.

In the other corner, we have DNF: the anointed successor to YUM (Yellowdog Updater, Modified). DNF (Dandified YUM) was forked from YUM to rework the internals to leverage libsolv and offer a saner, more maintainable API. Forged from the blood, sweat, and tears of many package manager developers from Red Hat and others, DNF is built with the lessons in mind from the last decade of software and systems management experiences. A new up and comer, it is used in Fedora, Mageia, OpenMandriva, Yocto, and others. It is also available in openSUSE.

How do these two package managers compare? Are they more similar than different? Has DNF made YUM no longer a trash heap? Does ZYpp still rule the roost? This talk explores both package managers and compares them from a technical, usability, and ecosystem perspective. Who knows? Perhaps there are lessons to still be learned for evolving both package managers.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:32:21</itunes:duration>
    </item>
    <item>
      <title>EOS Design System (osc19)</title>
      <link>https://media.ccc.de/v/2429-eos-design-system</link>
      <description>In the past UX design was a commodity in the paid consumer world, where companies like Facebook, Google, Uber would invest millions on. Today the gap is closing. Enterprise and Open Source applications are in need of better UX too.

On the other hand, many companies of all different sizes struggle with today&#39;s IT agendas: bleeding edge software, agile development, short time-to-market, etc., and this &quot;new&quot; (and really not so) kid on the block is not making it any easier for developers and designers to keep up: UX design. 
Companies struggling in this scenario will eventually suffer from a big level of inconsistency in their products portfolio, and sometimes even in one same product.

Design Systems can help solve this problem, and a few more. Design Systems serve as a centralized source of information for UX, UI, and other brand-related guidelines that help not only developers find the UI element or component they need, but also designers to build faster prototypes while streamlining the collaboration between the two.

But, building a Design System can take a very long time and be very expensive, this is why we&#39;re building EOS: an Open Source and customizable Design System. 
In this presentation, we will talk more about the problem Design Systems solve, how we are building EOS, and how it can be of great benefit to your company or project.

More about EOS:

http://eosdesignsystem.com

In the past UX design was a commodity in the paid consumer world, where companies like Facebook, Google, Uber would invest millions on. Today the gap is closing. Enterprise and Open Source applications are in need of better UX too.

On the other hand, many companies of all different sizes struggle with today&#39;s IT agendas: bleeding edge software, agile development, short time-to-market, etc., and this &quot;new&quot; (and really not so) kid on the block is not making it any easier for developers and designers to keep up: UX design. 
Companies struggling in this scenario will eventually suffer from a big level of inconsistency in their products portfolio, and sometimes even in one same product.

Design Systems can help solve this problem, and a few more. Design Systems serve as a centralized source of information for UX, UI, and other brand-related guidelines that help not only developers find the UI element or component they need, but also designers to build faster prototypes while streamlining the collaboration between the two.

But, building a Design System can take a very long time and be very expensive, this is why we&#39;re building EOS: an Open Source and customizable Design System. 
In this presentation, we will talk more about the problem Design Systems solve, how we are building EOS, and how it can be of great benefit to your company or project.

More about EOS:

http://eosdesignsystem.com
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2429-eng-EOS_Design_System_opus.opus"
        length="17825792"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2429-eng-EOS_Design_System_opus.opus?1558711503</guid>
      <dc:identifier>7_nXG696JFYWmpcdiNjxjg</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>csanchez@suse.de, Jesus Herman-Marina</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2429, Open Source</itunes:keywords>
      <itunes:subtitle>The solution to bring good UX to all OSS</itunes:subtitle>
      <itunes:summary>In the past UX design was a commodity in the paid consumer world, where companies like Facebook, Google, Uber would invest millions on. Today the gap is closing. Enterprise and Open Source applications are in need of better UX too.

On the other hand, many companies of all different sizes struggle with today&#39;s IT agendas: bleeding edge software, agile development, short time-to-market, etc., and this &quot;new&quot; (and really not so) kid on the block is not making it any easier for developers and designers to keep up: UX design. 
Companies struggling in this scenario will eventually suffer from a big level of inconsistency in their products portfolio, and sometimes even in one same product.

Design Systems can help solve this problem, and a few more. Design Systems serve as a centralized source of information for UX, UI, and other brand-related guidelines that help not only developers find the UI element or component they need, but also designers to build faster prototypes while streamlining the collaboration between the two.

But, building a Design System can take a very long time and be very expensive, this is why we&#39;re building EOS: an Open Source and customizable Design System. 
In this presentation, we will talk more about the problem Design Systems solve, how we are building EOS, and how it can be of great benefit to your company or project.

More about EOS:

http://eosdesignsystem.com

In the past UX design was a commodity in the paid consumer world, where companies like Facebook, Google, Uber would invest millions on. Today the gap is closing. Enterprise and Open Source applications are in need of better UX too.

On the other hand, many companies of all different sizes struggle with today&#39;s IT agendas: bleeding edge software, agile development, short time-to-market, etc., and this &quot;new&quot; (and really not so) kid on the block is not making it any easier for developers and designers to keep up: UX design. 
Companies struggling in this scenario will eventually suffer from a big level of inconsistency in their products portfolio, and sometimes even in one same product.

Design Systems can help solve this problem, and a few more. Design Systems serve as a centralized source of information for UX, UI, and other brand-related guidelines that help not only developers find the UI element or component they need, but also designers to build faster prototypes while streamlining the collaboration between the two.

But, building a Design System can take a very long time and be very expensive, this is why we&#39;re building EOS: an Open Source and customizable Design System. 
In this presentation, we will talk more about the problem Design Systems solve, how we are building EOS, and how it can be of great benefit to your company or project.

More about EOS:

http://eosdesignsystem.com
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:30:32</itunes:duration>
    </item>
    <item>
      <title>YaST – Yet another SUSE Talk? (osc19)</title>
      <link>https://media.ccc.de/v/2522-yast-yet-another-suse-talk</link>
      <description>Presenter: Thomas Di Giacomo

In this session we will first briefly describe how the openSUSE community and SUSE have been historically (well since Leap/Tumbleweed, not going back to the days before) collaborating together, e.g. Gnome and SUSE Linux Desktop, KDE and packagehub, then look at some of the more recent activities around MicroOS, container engines and tools, container networking such as Cilium, container management, etc. with respect to Kubic and SUSE CaaS Platform.

As this is not only about a company and a community per se but a lot more primarily about people doing things, about contributors and developers, we’ll highlight a few specific example individuals in such a collaboration context, , and then share what we think are the aspects that work and ones where we could improve for both to benefit from.

Presenter: Thomas Di Giacomo

In this session we will first briefly describe how the openSUSE community and SUSE have been historically (well since Leap/Tumbleweed, not going back to the days before) collaborating together, e.g. Gnome and SUSE Linux Desktop, KDE and packagehub, then look at some of the more recent activities around MicroOS, container engines and tools, container networking such as Cilium, container management, etc. with respect to Kubic and SUSE CaaS Platform.

As this is not only about a company and a community per se but a lot more primarily about people doing things, about contributors and developers, we’ll highlight a few specific example individuals in such a collaboration context, , and then share what we think are the aspects that work and ones where we could improve for both to benefit from.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2522-eng-YaST_-_Yet_another_SUSE_Talk_opus.opus"
        length="10485760"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2522-eng-YaST_-_Yet_another_SUSE_Talk_opus.opus?1558711353</guid>
      <dc:identifier>las4wWdhvRQ8OBVwjCJf-w</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>Thomas Di Giacomo</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2522, Keynote</itunes:keywords>
      <itunes:subtitle>Or how are SUSE and the openSUSE community interacting together in 2019</itunes:subtitle>
      <itunes:summary>Presenter: Thomas Di Giacomo

In this session we will first briefly describe how the openSUSE community and SUSE have been historically (well since Leap/Tumbleweed, not going back to the days before) collaborating together, e.g. Gnome and SUSE Linux Desktop, KDE and packagehub, then look at some of the more recent activities around MicroOS, container engines and tools, container networking such as Cilium, container management, etc. with respect to Kubic and SUSE CaaS Platform.

As this is not only about a company and a community per se but a lot more primarily about people doing things, about contributors and developers, we’ll highlight a few specific example individuals in such a collaboration context, , and then share what we think are the aspects that work and ones where we could improve for both to benefit from.

Presenter: Thomas Di Giacomo

In this session we will first briefly describe how the openSUSE community and SUSE have been historically (well since Leap/Tumbleweed, not going back to the days before) collaborating together, e.g. Gnome and SUSE Linux Desktop, KDE and packagehub, then look at some of the more recent activities around MicroOS, container engines and tools, container networking such as Cilium, container management, etc. with respect to Kubic and SUSE CaaS Platform.

As this is not only about a company and a community per se but a lot more primarily about people doing things, about contributors and developers, we’ll highlight a few specific example individuals in such a collaboration context, , and then share what we think are the aspects that work and ones where we could improve for both to benefit from.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:18:38</itunes:duration>
    </item>
    <item>
      <title>Building containers and images in and for openSUSE (osc19)</title>
      <link>https://media.ccc.de/v/2534-building-containers-and-images-in-and-for-opensuse</link>
      <description>In this talk I explain how containers based on openSUSE Leap and Tumbleweed should be built and how the process for building and submitting official images works.

In this talk I explain how containers based on openSUSE Leap and Tumbleweed should be built and how the process for building and submitting official images works.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2534-eng-Building_containers_and_images_in_and_for_openSUSE_opus.opus"
        length="16777216"
        type="audio/opus"/>
      <pubDate>Fri, 24 May 2019 00:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2019/opus/osc19-2534-eng-Building_containers_and_images_in_and_for_openSUSE_opus.opus?1558711743</guid>
      <dc:identifier>IvBZOa9uoXagwKyAqjiVkw</dc:identifier>
      <dc:date>2019-05-24T00:00:00+02:00</dc:date>
      <itunes:author>favogt</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc19, 2534</itunes:keywords>
      <itunes:summary>In this talk I explain how containers based on openSUSE Leap and Tumbleweed should be built and how the process for building and submitting official images works.

In this talk I explain how containers based on openSUSE Leap and Tumbleweed should be built and how the process for building and submitting official images works.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:28:00</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/events/osc/2019/osc19_logo.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from osc19 as opus</itunes:summary>
  </channel>
</rss>