Open Source Summit North America, Vancouver, Canada
Intel is excited to be a diamond sponsor at this year's Open Source Summit in Vancouver, British Columbia, Aug 29-31, 2018!
Open Source Summitis the gathering place of the technologists and community leaders driving open source innovation. Featuring 250+ sessions, tutorials, labs and workshops on the most important technologies and topics in open source, attendees join together to learn, collaborate and share information towards the goal of building, sustaining and innovating open source technologies.
Intel @ Open Source Summit
- Come visit us in Booth #302 to check out a variety of 9 different Open Source demos!
- Join us on Wednesday @ 9:55AM for the keynote, Follow your Heart: The Story of Building a Modern OS, from Imad Sousou, Corporate Vice President in the Software and Services Group at Intel Corporation and General Manager of the Intel Open Source Technology Center.
- Come see one or more of our 15 sessions (listed below).
Project ACRN* is a flexible, lightweight reference Hypervisor, built with real-time and safety-criticality in mind, optimized to streamline embedded development through an open source platform.
|Clear Linux* Project||Clear Linux is an industry blueprint of a modern OS for implementing Intel features from edge to cloud. It is a security-driven OS providing scalability for customers to differentiate. It is optimized for Intel architecture across the entire OS stack, delivering performance-tuned Intel features on Linux.|
|Kata* Containers||Kata Containers is a new open source project building extremely lightweight virtual machines that seamlessly plug into the containers ecosystem.|
|AI Cloud on Intel® Platform||This demo will show a Scalable Artificial Intelligence (AI) Cloud build, which is highly optimized on Intel Architecture, orchestrated by OpenStack and Kubernetes (K8s), highlighting Intel end-to-end AI cloud solution, from hardware (Xeon, OPA, SSD) to optimized AI framework (Intel Caffe, Tensorflow, MKL-DNN), from cloud (OpenStack, Kubernetes, Ceph, GlusterFS) to AI edge device (Movidius).|
Intel Software Guard Extensions (SGX) is a feature of the Intel SOCs to provide CPU protected memory areas to secure applications code and data. SGX adds extra level of security for the platform. Security is one the key requirement of the systems deployed today. Most of the system are “always-connected-to-internet”, and are constantly exposed to threat of malwares and hackers. Intel SGX can be used to protect critical data of Chromebook users with hardware level protection for added security. Saving user’s critical data in Operating system protected memory might not be the best way to protect them. Intel Software Guard Extensions (SGX) adds solid security to protect critical apps and confidential user data. Proposed use cases may be securing data like user’s saved password (e.g. Google smart Lock), fingerprint minutiae for biometric authentication, credit card information, digital rights management (DRM) data, financial/confidential records or any personal information, cryptographic keys, Block chain related states/hashes etc. Intel SGX is an extension to Intel architecture which adds new CPU instructions and platform enhancements, which allows capable applications to create private areas in main memory to protect sensitive information. Sensitive information is protected even when attackers has full control of the platform. The protection is achieved through the creation and utilization of an enclave. An enclave is a section of an application created from the virtual address space of the application but located in a secure part of physical memory referred to as Enclave Page Cache (EPC). Skylake (in big cores) and GeminiLake (in small cores) onwards microarchitecture includes the necessary instructions and hardware to support Intel SGX.
|Sound Open Firmware*||Intel platforms are a front runner of a new paradigm for audio processing development using digital signal processors (DSP) that offers low latency real-time processing with low power. Nearly all the products categories in automotive, internet of things, and consumer electronics have audio features. The always-on and audio sensing applications require low power to be compliant with the environmental targets. Traditionally the DSP systems have been proprietary, required proprietary tools and suffered from vendor lock-in. That has caused difficulties for the Codec Vendors and the equipment manufacturers to develop the firmware features they need. As a cure the Intel originated ALSA Sound Open Firmware (SOF) project allows the DSP firmware development to happen efficiently, for cross DSP platform, reuse the open processing libraries and components, and choose a working model for one's needs from fully open to closed. This demo showcases Chromebook enabling all the audio use cases using the SOF on Audio DSP.|
|OpenHPC* Deployment Automation||OpenHPC provides a reference collection of open source HPC software components and best practices, lowering barriers to deployment, administration, and use of modern HPC methods and tools. A validated recipe script has always been provided with the OHPC install guide, but it lacks the features one would expect from a true installer. This demo will present motivation for the problem of configuration management, demonstrate an implementation of deploying OpenHPC with ansible, and discuss other customizations and advanced usage.|
|StarlingX: Edge Infrastructure||StarlingX is a new open source edge infrastructure project hosted by the OpenStack Foundation. StarlingX aims to create an open source software stack to improve the state of edge cloud infrastructure for carrier, provider, and IoT networks. Intel and Wind River® are releasing the source code for Titanium Cloud Release 5 as the initial “seed” code for StarlingX. This demo is an early preview of StarlingX system launching, creating VMs and VMs network connection.|
|Ceph* Tracing Tool||This demo highlights performance of Intel storage devices and an interactive, visual, collective open source tool to identify the bottlenecks in a Ceph system.|
|Introducing Cache Pseudo-Locking to Reduce Memory Access Latency||Reinette Chatre||Wednesday, 8/29||11:10AM||
Moderator: Nicole Huesman
|Wednesday, 8/29||11:10AM||Room 121|
|Bringing Bluetooth Mesh to Linux||Marcel Holtmann||Wednesday, 8/29||3:00PM||
|ACRN Hypervisor for Embedded & IoT||Anthony Xu||Wednesday, 8/29||3:00PM||Room 114/115|
|Accelerating NVMe I/Os in Virtual Mac hine via SPDK vhost* Solution||Ziye Yang, Changpeng Liu||Wednesday, 8/29||4:00PM||
|Make Change Work: Strategies for Navigating the STEM/Engineering Landscape through Transitions||Ashma Sethi||Wednesday, 8/29||4:50PM||
|The New Wi-Fi Experience for Linux||Marcel Holtmann||Wednesday, 8/29||4:50PM||Room 109|
|BoF: ACRN - The Little Hypervisor for IoT Development||
|Keynote (Title TBD)||Window Snyder (Chief Software Security Officer)||Thursday, 8/30||9:45AM||West Ballroom A/B|
|Panel Discussion: Diversity & Inclusion: Innovating to Create a Consistent Definition, Data, and Metrics||Moderator: Nicole Huesman||Thursday, 8/30||11:50AM||
|Does Making the Kernel Harder Make Making the Kernel Harder?||
|Thursday, 8/30||11:50AM||Room 110|
|Advances in CPU Idle Time Management||
|Launching Open Source Projects||
Jeffrey 'Jefro' Osier-Mixon
|Accelerating I/O in Big Data - A Data Driven Approach and Case Studies||Yinggqi (Lucy) Lu||Friday, 8/31||11:00AM||Room 119/120|
|Panel Discussion: Diversity & Inclusion: Transforming Insight into Action||
Moderator: Nicole Huesman