Sorry, you need to enable JavaScript to visit this website.

Open Source Summit North America, Vancouver, Canada

Vancouver, Canada
Aug 29, 2018 (All day) to Aug 31, 2018 (All day)
Add to Calendar

Intel is excited to be a diamond sponsor at this year's Open Source Summit in Vancouver, British Columbia, Aug 29-31, 2018! 

Open Source Summitis the gathering place of the technologists and community leaders driving open source innovation. Featuring 250+ sessions, tutorials, labs and workshops on the most important technologies and topics in open source, attendees join together to learn, collaborate and share information towards the goal of building, sustaining and innovating open source technologies.

Intel @ Open Source Summit

  • Come visit us in Booth #302 to check out a variety of 9 different Open Source demos! 
  • Join us on Wednesday @ 9:55AM for the keynote, Follow your Heart: The Story of Building a Modern OS, from Imad Sousou, Corporate Vice President in the Software and Services Group at Intel Corporation and General Manager of the Intel Open Source Technology Center.
  • Come see one or more of our 15 sessions (listed below).


Project ACRN*
Project ACRN* is a flexible, lightweight reference Hypervisor, built with real-time and safety-criticality in mind, optimized to streamline embedded development through an open source platform. 
Clear Linux* Project Clear Linux is an industry blueprint of a modern OS for implementing Intel features from edge to cloud.  It is a security-driven OS providing scalability for customers to differentiate. It is optimized for Intel architecture across the entire OS stack, delivering performance-tuned Intel features on Linux.  
Kata* Containers Kata Containers is a new open source project building extremely lightweight virtual machines that seamlessly plug into the containers ecosystem.
AI Cloud on Intel® Platform This demo will show a Scalable Artificial Intelligence (AI) Cloud build, which is highly optimized on Intel Architecture, orchestrated by OpenStack and Kubernetes (K8s), highlighting Intel end-to-end AI cloud solution, from hardware (Xeon, OPA, SSD) to optimized AI framework (Intel Caffe, Tensorflow, MKL-DNN), from cloud (OpenStack, Kubernetes, Ceph, GlusterFS) to AI edge device (Movidius).
Intel® SGX
Intel Software Guard Extensions (SGX) is a feature of the Intel SOCs to provide CPU protected memory areas to secure applications code and data. SGX adds extra level of security for the platform.  Security is one the key requirement of the systems deployed today. Most of the system are “always-connected-to-internet”, and are constantly exposed to threat of malwares and hackers. Intel SGX can be used to protect critical data of Chromebook users with hardware level protection for added security.   Saving user’s critical data in Operating system protected memory might not be the best way to protect them. Intel Software Guard Extensions (SGX) adds solid security to protect critical apps and confidential user data. Proposed use cases may be securing data like user’s saved password (e.g. Google smart Lock), fingerprint minutiae for biometric authentication, credit card information, digital rights management (DRM) data, financial/confidential records or any personal information, cryptographic keys, Block chain related states/hashes etc.  Intel SGX is an extension to Intel architecture which adds new CPU instructions and platform enhancements, which allows capable applications to create private areas in main memory to protect sensitive information. Sensitive information is protected even when attackers has full control of the platform.  The protection is achieved through the creation and utilization of an enclave. An enclave is a section of an application created from the virtual address space of the application but located in a secure part of physical memory referred to as Enclave Page Cache (EPC). Skylake (in big cores) and GeminiLake (in small cores) onwards microarchitecture includes the necessary instructions and hardware to support Intel SGX. 
Sound Open Firmware* Intel platforms are a front runner of a new paradigm for audio processing development using digital signal processors (DSP) that offers low latency real-time processing with low power. Nearly all the products categories in automotive, internet of things, and consumer electronics have audio features. The always-on and audio sensing applications require low power to be compliant with the environmental targets. Traditionally the DSP systems have been proprietary, required proprietary tools and suffered from vendor lock-in. That has caused difficulties for the Codec Vendors and the equipment manufacturers to develop the firmware features they need. As a cure the Intel originated ALSA Sound Open Firmware (SOF) project allows the DSP firmware development to happen efficiently, for cross DSP platform, reuse the open processing libraries and components, and choose a working model for one's needs from fully open to closed. This demo showcases Chromebook enabling all the audio use cases using the SOF on Audio DSP.
OpenHPC* Deployment Automation OpenHPC provides a reference collection of open source HPC software components and best practices, lowering barriers to deployment, administration, and use of modern HPC methods and tools. A validated recipe script has always been provided with the OHPC install guide, but it lacks the features one would expect from a true installer. This demo will present motivation for the problem of configuration management, demonstrate an implementation of deploying OpenHPC with ansible, and discuss other customizations and advanced usage.
StarlingX: Edge Infrastructure StarlingX is a new open source edge infrastructure project hosted by the OpenStack Foundation. StarlingX aims to create an open source software stack to improve the state of edge cloud infrastructure for carrier, provider, and IoT networks. Intel and Wind River® are releasing the source code for Titanium Cloud Release 5 as the initial “seed” code for StarlingX. This demo is an early preview of StarlingX system launching, creating VMs and VMs network connection.
Ceph* Tracing Tool This demo highlights performance of Intel storage devices and an interactive, visual, collective open source tool to identify the bottlenecks in a Ceph system.



Introducing Cache Pseudo-Locking to Reduce Memory Access Latency Reinette Chatre Wednesday, 8/29 11:10AM
Room 109
Moderator: Nicole Huesman
Wednesday, 8/29 11:10AM Room 121
Bringing Bluetooth Mesh to Linux Marcel Holtmann Wednesday, 8/29 3:00PM
Room 109
ACRN Hypervisor for Embedded & IoT Anthony Xu Wednesday, 8/29 3:00PM Room 114/115
Accelerating NVMe I/Os in Virtual Mac hine via SPDK vhost* Solution Ziye Yang, Changpeng Liu Wednesday, 8/29 4:00PM
Room 114/115
Make Change Work: Strategies for Navigating the STEM/Engineering Landscape through Transitions Ashma Sethi Wednesday, 8/29 4:50PM
Room 121
The New Wi-Fi Experience for Linux Marcel Holtmann Wednesday, 8/29 4:50PM Room 109
BoF: ACRN - The Little Hypervisor for IoT Development
Diana Aung
Wednesday, 8/29 5:40PM
Room 109
Keynote (Title TBD) Window Snyder (Chief Software Security Officer) Thursday, 8/30 9:45AM West Ballroom A/B
Panel Discussion: Diversity & Inclusion: Innovating to Create a Consistent Definition, Data, and Metrics Moderator: Nicole Huesman Thursday, 8/30 11:50AM
Room 121
Does Making the Kernel Harder Make Making the Kernel Harder?
Casey Schaufler
Thursday, 8/30 11:50AM Room 110
Advances in CPU Idle Time Management
Rafael Wysocki
Thursday, 8/30 2:00PM
Room 110
Launching Open Source Projects
Jeffrey 'Jefro' Osier-Mixon
Thursday, 8/30 4:50PM
Room 213
Accelerating I/O in Big Data - A Data Driven Approach and Case Studies Yinggqi (Lucy) Lu Friday, 8/31 11:00AM Room 119/120
Panel Discussion: Diversity & Inclusion: Transforming Insight into Action
Moderator: Nicole Huesman
Friday, 8/31 11:50AM
Room 121