<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
  xmlns:content="http://purl.org/rss/1.0/modules/content/"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/">
  <channel>
    <title>Chaos Computer Club - openSUSE Conference 2022 (low quality mp4)</title>
    <link>https://media.ccc.de/c/osc22</link>
    <description> This feed contains all events from osc22 as mp4</description>
    <copyright>see video outro</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 18:42:42 -0000</lastBuildDate>
    <image>
      <url>https://static.media.ccc.de/media/events/osc/2022/oSC22icon.png</url>
      <title>Chaos Computer Club - openSUSE Conference 2022 (low quality mp4)</title>
      <link>https://media.ccc.de/c/osc22</link>
    </image>
    <item>
      <title>Authenticating open source cloud applications with LDAP (osc22)</title>
      <link>https://media.ccc.de/v/3686-authenticating-open-source-cloud-applications-with-ldap</link>
      <description>It is very common for businesses with small teams to use cloud services to synchronise their work, stay in touch etc. All of these can also be achieved using open source software. However, making the different open source applications to authenticate through a single mechanism is somewhat challenging.

In this presentation, I will cover the use of LDAP to authenticate cloud services like Nextcloud and Rocket.Chat. 

I&#39;ll cover 389 Directory Server to provide the LDAP service.

It is very common for businesses with small teams to use cloud services to synchronise their work, stay in touch etc. All of these can also be achieved using open source software. However, making the different open source applications to authenticate through a single mechanism is somewhat challenging.

In this presentation, I will cover the use of LDAP to authenticate cloud services like Nextcloud and Rocket.Chat. 

I&#39;ll cover 389 Directory Server to provide the LDAP service.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3686-eng-Authenticating_open_source_cloud_applications_with_LDAP_sd.mp4"
        length="29360128"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 16:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3686-eng-Authenticating_open_source_cloud_applications_with_LDAP_sd.mp4?1687411609</guid>
      <dc:identifier>Jvyqi8y7VYb23UjLQEQ8IA</dc:identifier>
      <dc:date>2022-06-04T16:30:00+02:00</dc:date>
      <itunes:author>Ish Sookun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3686, 2022, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>Featuring Nextcloud &amp; Rocket.Chat</itunes:subtitle>
      <itunes:summary>It is very common for businesses with small teams to use cloud services to synchronise their work, stay in touch etc. All of these can also be achieved using open source software. However, making the different open source applications to authenticate through a single mechanism is somewhat challenging.

In this presentation, I will cover the use of LDAP to authenticate cloud services like Nextcloud and Rocket.Chat. 

I&#39;ll cover 389 Directory Server to provide the LDAP service.

It is very common for businesses with small teams to use cloud services to synchronise their work, stay in touch etc. All of these can also be achieved using open source software. However, making the different open source applications to authenticate through a single mechanism is somewhat challenging.

In this presentation, I will cover the use of LDAP to authenticate cloud services like Nextcloud and Rocket.Chat. 

I&#39;ll cover 389 Directory Server to provide the LDAP service.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:19</itunes:duration>
    </item>
    <item>
      <title>ALP Community WG: Recommended ways to communicate with the community (osc22)</title>
      <link>https://media.ccc.de/v/3902-alp-community-wg-recommended-ways-to-communicate-with-the-community</link>
      <description>This talk focuses on effective communication with the openSUSE community.

Many workgroups have formed around the new Adaptable Linux Platform. However, not all of them are reporting the public yet.

[ALP Community Work Group ](https://en.opensuse.org/openSUSE:ALP/Workgroups/Community)would like to encourage workgroup drivers to increase transparency by sharing our recommendations on how to communicate with the openSUSE community.

This talk focuses on effective communication with the openSUSE community.

Many workgroups have formed around the new Adaptable Linux Platform. However, not all of them are reporting the public yet.

[ALP Community Work Group ](https://en.opensuse.org/openSUSE:ALP/Workgroups/Community)would like to encourage workgroup drivers to increase transparency by sharing our recommendations on how to communicate with the openSUSE community.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3902-eng-ALP_Community_WG_Recommended_ways_to_communicate_with_the_community_sd.mp4"
        length="94371840"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 15:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3902-eng-ALP_Community_WG_Recommended_ways_to_communicate_with_the_community_sd.mp4?1687407346</guid>
      <dc:identifier>Lm8IXtKCjRogsZzA9UAsEw</dc:identifier>
      <dc:date>2022-06-04T15:30:00+02:00</dc:date>
      <itunes:author>Lubos Kocman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3902, 2022, openSUSE</itunes:keywords>
      <itunes:summary>This talk focuses on effective communication with the openSUSE community.

Many workgroups have formed around the new Adaptable Linux Platform. However, not all of them are reporting the public yet.

[ALP Community Work Group ](https://en.opensuse.org/openSUSE:ALP/Workgroups/Community)would like to encourage workgroup drivers to increase transparency by sharing our recommendations on how to communicate with the openSUSE community.

This talk focuses on effective communication with the openSUSE community.

Many workgroups have formed around the new Adaptable Linux Platform. However, not all of them are reporting the public yet.

[ALP Community Work Group ](https://en.opensuse.org/openSUSE:ALP/Workgroups/Community)would like to encourage workgroup drivers to increase transparency by sharing our recommendations on how to communicate with the openSUSE community.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:15</itunes:duration>
    </item>
    <item>
      <title>Org mode: Manage your life in plain text (osc22)</title>
      <link>https://media.ccc.de/v/3713-org-mode-manage-your-life-in-plain-text</link>
      <description>Org mode is an extension to the Emacs text editor. The talk will introduce a trusted system to manage your daily life and keep track of all the stuff that matters to you.
 
The mein difference to other personal productivity apps is: 

- **You** have control over your files.
- Files are in plain text, you can even read them without org mode.
- The application is Open Source, so no risk that is discontinued because the business plan didnt work.
- The user can customize it for his own needs and is not forced to adapt to the needs of  a tool. 

**About me:** Software Engineer, 25+ years on Linux, using Org mode daily for at least 12 years now. 

Org mode is an extension to the Emacs text editor. The talk will introduce a trusted system to manage your daily life and keep track of all the stuff that matters to you.
 
The mein difference to other personal productivity apps is: 

- **You** have control over your files.
- Files are in plain text, you can even read them without org mode.
- The application is Open Source, so no risk that is discontinued because the business plan didnt work.
- The user can customize it for his own needs and is not forced to adapt to the needs of  a tool. 

**About me:** Software Engineer, 25+ years on Linux, using Org mode daily for at least 12 years now. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3713-eng-Org_mode_Manage_your_life_in_plain_text_sd.mp4"
        length="69206016"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 15:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3713-eng-Org_mode_Manage_your_life_in_plain_text_sd.mp4?1687401066</guid>
      <dc:identifier>l1FCqp9C8ztQgYKpgXF8yg</dc:identifier>
      <dc:date>2022-06-04T15:30:00+02:00</dc:date>
      <itunes:author>rainerkoenig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3713, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>Use Open Source to make your life easier</itunes:subtitle>
      <itunes:summary>Org mode is an extension to the Emacs text editor. The talk will introduce a trusted system to manage your daily life and keep track of all the stuff that matters to you.
 
The mein difference to other personal productivity apps is: 

- **You** have control over your files.
- Files are in plain text, you can even read them without org mode.
- The application is Open Source, so no risk that is discontinued because the business plan didnt work.
- The user can customize it for his own needs and is not forced to adapt to the needs of  a tool. 

**About me:** Software Engineer, 25+ years on Linux, using Org mode daily for at least 12 years now. 

Org mode is an extension to the Emacs text editor. The talk will introduce a trusted system to manage your daily life and keep track of all the stuff that matters to you.
 
The mein difference to other personal productivity apps is: 

- **You** have control over your files.
- Files are in plain text, you can even read them without org mode.
- The application is Open Source, so no risk that is discontinued because the business plan didnt work.
- The user can customize it for his own needs and is not forced to adapt to the needs of  a tool. 

**About me:** Software Engineer, 25+ years on Linux, using Org mode daily for at least 12 years now. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:43:41</itunes:duration>
    </item>
    <item>
      <title>simpledrm - a kernel fbdev replacement (osc22)</title>
      <link>https://media.ccc.de/v/3908-simpledrm-a-kernel-fbdev-replacement</link>
      <description>simpledrm is a fbdev replacement implemented in the DRM kernel subsystem.
It allows for smoother handover from the early boot phase to when a &quot;real&quot; DRM driver is loaded.
In addition it allows for Wayland support on simple display adapters that do not have their own DRM driver. It has already been mainlined for a while but is not in active use by major linux distributions.

In this talk I will briefly introduce you to the project and show you how you can test it on your machines. I have recently learned about this effort and started looking at DRM. This talk is held by a kernel newbie.

simpledrm is a fbdev replacement implemented in the DRM kernel subsystem.
It allows for smoother handover from the early boot phase to when a &quot;real&quot; DRM driver is loaded.
In addition it allows for Wayland support on simple display adapters that do not have their own DRM driver. It has already been mainlined for a while but is not in active use by major linux distributions.

In this talk I will briefly introduce you to the project and show you how you can test it on your machines. I have recently learned about this effort and started looking at DRM. This talk is held by a kernel newbie.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3908-eng-simpledrm_-_a_kernel_fbdev_replacement_sd.mp4"
        length="28311552"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 14:10:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3908-eng-simpledrm_-_a_kernel_fbdev_replacement_sd.mp4?1687400125</guid>
      <dc:identifier>NlTipzjKUIaVWY8VWoyxVg</dc:identifier>
      <dc:date>2022-06-04T14:10:00+02:00</dc:date>
      <itunes:author>tschmitz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3908, 2022, Open Source</itunes:keywords>
      <itunes:summary>simpledrm is a fbdev replacement implemented in the DRM kernel subsystem.
It allows for smoother handover from the early boot phase to when a &quot;real&quot; DRM driver is loaded.
In addition it allows for Wayland support on simple display adapters that do not have their own DRM driver. It has already been mainlined for a while but is not in active use by major linux distributions.

In this talk I will briefly introduce you to the project and show you how you can test it on your machines. I have recently learned about this effort and started looking at DRM. This talk is held by a kernel newbie.

simpledrm is a fbdev replacement implemented in the DRM kernel subsystem.
It allows for smoother handover from the early boot phase to when a &quot;real&quot; DRM driver is loaded.
In addition it allows for Wayland support on simple display adapters that do not have their own DRM driver. It has already been mainlined for a while but is not in active use by major linux distributions.

In this talk I will briefly introduce you to the project and show you how you can test it on your machines. I have recently learned about this effort and started looking at DRM. This talk is held by a kernel newbie.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:14:42</itunes:duration>
    </item>
    <item>
      <title>RAD, cybersecurity, medical grade regulatory compliance and open source go hand in hand! (osc22)</title>
      <link>https://media.ccc.de/v/3776-rad-cybersecurity-medical-grade-regulatory-compliance-and-open-source-go-hand-in-hand</link>
      <description>Business processes evolve continuously, customer expectations and requirements change even faster. Process management and workflow support systems have a tendency to grow organically into fearsomely complex monolithic beasts while piling up technical debt in the process. 

Data migrations come at high cost, changing systems almost always require data to be converted into the new systems particular data model, which makes doing data migration verification both complex as well as costly.  

Using the open source/free software SQL database engine PostgreSQL, one of the leading Relational Database Management Systems, and in recent years the most popular database engine used in startups and scaleups, takes away the concern of future accessibility and integrity of the data itself. 
A middleware layer/REST API built with Symfony framework and a ReactJS based frontend ensure a fully responsive modern UX. Furthermore we use GitLab and Ansible for project management and automating our CI/CD environment.

At OpenNovations we’ve created a solution called Aranei built with standard open source tools which generates a state of the art, open web standards based, user interface on top of any existing SQL data structure. Keep the same schema/structure between source system and archiving solution, or to use the notion of a controlled copy, is a much less cumbersome approach, as a one on one data verification can be performed. 

Not just the UI components themselves are generated by the metadata app modeling engine, also automated test scripts and a data dictionary are generated as part of the data verification process. 

Business processes evolve continuously, customer expectations and requirements change even faster. Process management and workflow support systems have a tendency to grow organically into fearsomely complex monolithic beasts while piling up technical debt in the process. 

Data migrations come at high cost, changing systems almost always require data to be converted into the new systems particular data model, which makes doing data migration verification both complex as well as costly.  

Using the open source/free software SQL database engine PostgreSQL, one of the leading Relational Database Management Systems, and in recent years the most popular database engine used in startups and scaleups, takes away the concern of future accessibility and integrity of the data itself. 
A middleware layer/REST API built with Symfony framework and a ReactJS based frontend ensure a fully responsive modern UX. Furthermore we use GitLab and Ansible for project management and automating our CI/CD environment.

At OpenNovations we’ve created a solution called Aranei built with standard open source tools which generates a state of the art, open web standards based, user interface on top of any existing SQL data structure. Keep the same schema/structure between source system and archiving solution, or to use the notion of a controlled copy, is a much less cumbersome approach, as a one on one data verification can be performed. 

Not just the UI components themselves are generated by the metadata app modeling engine, also automated test scripts and a data dictionary are generated as part of the data verification process. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3776-eng-RAD_cybersecurity_medical_grade_regulatory_compliance_and_open_source_go_hand_in_hand_sd.mp4"
        length="59768832"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 13:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3776-eng-RAD_cybersecurity_medical_grade_regulatory_compliance_and_open_source_go_hand_in_hand_sd.mp4?1687396864</guid>
      <dc:identifier>jBOgz9Lll4CH6GlDDjCzwA</dc:identifier>
      <dc:date>2022-06-04T13:00:00+02:00</dc:date>
      <itunes:author>Hans de Raad</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3776, 2022, Open Source</itunes:keywords>
      <itunes:summary>Business processes evolve continuously, customer expectations and requirements change even faster. Process management and workflow support systems have a tendency to grow organically into fearsomely complex monolithic beasts while piling up technical debt in the process. 

Data migrations come at high cost, changing systems almost always require data to be converted into the new systems particular data model, which makes doing data migration verification both complex as well as costly.  

Using the open source/free software SQL database engine PostgreSQL, one of the leading Relational Database Management Systems, and in recent years the most popular database engine used in startups and scaleups, takes away the concern of future accessibility and integrity of the data itself. 
A middleware layer/REST API built with Symfony framework and a ReactJS based frontend ensure a fully responsive modern UX. Furthermore we use GitLab and Ansible for project management and automating our CI/CD environment.

At OpenNovations we’ve created a solution called Aranei built with standard open source tools which generates a state of the art, open web standards based, user interface on top of any existing SQL data structure. Keep the same schema/structure between source system and archiving solution, or to use the notion of a controlled copy, is a much less cumbersome approach, as a one on one data verification can be performed. 

Not just the UI components themselves are generated by the metadata app modeling engine, also automated test scripts and a data dictionary are generated as part of the data verification process. 

Business processes evolve continuously, customer expectations and requirements change even faster. Process management and workflow support systems have a tendency to grow organically into fearsomely complex monolithic beasts while piling up technical debt in the process. 

Data migrations come at high cost, changing systems almost always require data to be converted into the new systems particular data model, which makes doing data migration verification both complex as well as costly.  

Using the open source/free software SQL database engine PostgreSQL, one of the leading Relational Database Management Systems, and in recent years the most popular database engine used in startups and scaleups, takes away the concern of future accessibility and integrity of the data itself. 
A middleware layer/REST API built with Symfony framework and a ReactJS based frontend ensure a fully responsive modern UX. Furthermore we use GitLab and Ansible for project management and automating our CI/CD environment.

At OpenNovations we’ve created a solution called Aranei built with standard open source tools which generates a state of the art, open web standards based, user interface on top of any existing SQL data structure. Keep the same schema/structure between source system and archiving solution, or to use the notion of a controlled copy, is a much less cumbersome approach, as a one on one data verification can be performed. 

Not just the UI components themselves are generated by the metadata app modeling engine, also automated test scripts and a data dictionary are generated as part of the data verification process. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:42:44</itunes:duration>
    </item>
    <item>
      <title>Sourcery: a multi-architecture root file system that is mostly source (osc22)</title>
      <link>https://media.ccc.de/v/3781-sourcery-a-multi-architecture-root-file-system-that-is-mostly-source</link>
      <description>Sourcery is a program that builds root file systems consisting mostly of Go
source code: of the 90,000 files in a typical sourcery root, there are
only 12 or so programs.  Other programs are compiled on demand to a
ramfs-backed file system. Compilation takes a fraction of a second
for most programs, and never more than 2 seconds.  Once the program is
compiled to a statically-linked, tmpfs-based binary, invocation is
instantaneous.

Because these images are mostly source, they can also be
multi-architecture. Binaries present on boot have a path formed from
the target os and architecture, e.g. /$OS_$ARCH/bin/init for
init. Dynamically compiled binaries are placed in the tmpfs-backed
/bin, since these binaries vanish on boot, the path can be simpler.

The file system includes the full Go toolchain as well as all
source code. Constructing the root file system, including the git
clone steps and Go toolchain build, takes under 4 minutes; each
additional architecture takes another 90 seconds (to ensure
reproducible builds, the Go toolchain builds itself 3 times).

Sourcery root file systems are designed for VFAT, a standard for
firmware for x86, ARM, and RISC-V.  A typical USB stick for sourcery
would include a syslinux bootstrap for x86, required for those
platforms; a kernel Image file for ARM; and a kernel file for RISC-V: the
firmware for ARM and RISC-V is able to find boot kernels
without using an on-stick bootstrap.

Sourcery may be found at github.com:u-root/sourcery. 

Sourcery is a program that builds root file systems consisting mostly of Go
source code: of the 90,000 files in a typical sourcery root, there are
only 12 or so programs.  Other programs are compiled on demand to a
ramfs-backed file system. Compilation takes a fraction of a second
for most programs, and never more than 2 seconds.  Once the program is
compiled to a statically-linked, tmpfs-based binary, invocation is
instantaneous.

Because these images are mostly source, they can also be
multi-architecture. Binaries present on boot have a path formed from
the target os and architecture, e.g. /$OS_$ARCH/bin/init for
init. Dynamically compiled binaries are placed in the tmpfs-backed
/bin, since these binaries vanish on boot, the path can be simpler.

The file system includes the full Go toolchain as well as all
source code. Constructing the root file system, including the git
clone steps and Go toolchain build, takes under 4 minutes; each
additional architecture takes another 90 seconds (to ensure
reproducible builds, the Go toolchain builds itself 3 times).

Sourcery root file systems are designed for VFAT, a standard for
firmware for x86, ARM, and RISC-V.  A typical USB stick for sourcery
would include a syslinux bootstrap for x86, required for those
platforms; a kernel Image file for ARM; and a kernel file for RISC-V: the
firmware for ARM and RISC-V is able to find boot kernels
without using an on-stick bootstrap.

Sourcery may be found at github.com:u-root/sourcery. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3781-eng-Sourcery_a_multi-architecture_root_file_system_that_is_mostly_source_sd.mp4"
        length="49283072"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 12:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3781-eng-Sourcery_a_multi-architecture_root_file_system_that_is_mostly_source_sd.mp4?1687392844</guid>
      <dc:identifier>K5c800uHrlYDh4OqWxcJpQ</dc:identifier>
      <dc:date>2022-06-04T12:00:00+02:00</dc:date>
      <itunes:author>rminnich</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3781, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>Build images that boot on multiple architectures, and that include *working* source code for commands, that compile on demand in less than a second, written in Go. </itunes:subtitle>
      <itunes:summary>Sourcery is a program that builds root file systems consisting mostly of Go
source code: of the 90,000 files in a typical sourcery root, there are
only 12 or so programs.  Other programs are compiled on demand to a
ramfs-backed file system. Compilation takes a fraction of a second
for most programs, and never more than 2 seconds.  Once the program is
compiled to a statically-linked, tmpfs-based binary, invocation is
instantaneous.

Because these images are mostly source, they can also be
multi-architecture. Binaries present on boot have a path formed from
the target os and architecture, e.g. /$OS_$ARCH/bin/init for
init. Dynamically compiled binaries are placed in the tmpfs-backed
/bin, since these binaries vanish on boot, the path can be simpler.

The file system includes the full Go toolchain as well as all
source code. Constructing the root file system, including the git
clone steps and Go toolchain build, takes under 4 minutes; each
additional architecture takes another 90 seconds (to ensure
reproducible builds, the Go toolchain builds itself 3 times).

Sourcery root file systems are designed for VFAT, a standard for
firmware for x86, ARM, and RISC-V.  A typical USB stick for sourcery
would include a syslinux bootstrap for x86, required for those
platforms; a kernel Image file for ARM; and a kernel file for RISC-V: the
firmware for ARM and RISC-V is able to find boot kernels
without using an on-stick bootstrap.

Sourcery may be found at github.com:u-root/sourcery. 

Sourcery is a program that builds root file systems consisting mostly of Go
source code: of the 90,000 files in a typical sourcery root, there are
only 12 or so programs.  Other programs are compiled on demand to a
ramfs-backed file system. Compilation takes a fraction of a second
for most programs, and never more than 2 seconds.  Once the program is
compiled to a statically-linked, tmpfs-based binary, invocation is
instantaneous.

Because these images are mostly source, they can also be
multi-architecture. Binaries present on boot have a path formed from
the target os and architecture, e.g. /$OS_$ARCH/bin/init for
init. Dynamically compiled binaries are placed in the tmpfs-backed
/bin, since these binaries vanish on boot, the path can be simpler.

The file system includes the full Go toolchain as well as all
source code. Constructing the root file system, including the git
clone steps and Go toolchain build, takes under 4 minutes; each
additional architecture takes another 90 seconds (to ensure
reproducible builds, the Go toolchain builds itself 3 times).

Sourcery root file systems are designed for VFAT, a standard for
firmware for x86, ARM, and RISC-V.  A typical USB stick for sourcery
would include a syslinux bootstrap for x86, required for those
platforms; a kernel Image file for ARM; and a kernel file for RISC-V: the
firmware for ARM and RISC-V is able to find boot kernels
without using an on-stick bootstrap.

Sourcery may be found at github.com:u-root/sourcery. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:30:29</itunes:duration>
    </item>
    <item>
      <title>openSUSE Board: Intro, Presentation &amp; Discussion (osc22)</title>
      <link>https://media.ccc.de/v/3673-opensuse-board-intro-presentation-discussion</link>
      <description>Meet the Board, ask questions, discuss topics, have fun

Meet the Board, ask questions, discuss topics, have fun
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3673-eng-openSUSE_Board_Intro_Presentation_Discussion_sd.mp4"
        length="75497472"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 17:45:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3673-eng-openSUSE_Board_Intro_Presentation_Discussion_sd.mp4?1687321408</guid>
      <dc:identifier>J7j7GlkJLmNHtpSgc_tcxg</dc:identifier>
      <dc:date>2022-06-04T17:45:00+02:00</dc:date>
      <itunes:author>Axel Braun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3673, 2022, openSUSE</itunes:keywords>
      <itunes:summary>Meet the Board, ask questions, discuss topics, have fun

Meet the Board, ask questions, discuss topics, have fun
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:41:20</itunes:duration>
    </item>
    <item>
      <title>Meeting with Jitsi: State of the Union (osc22)</title>
      <link>https://media.ccc.de/v/3874-meeting-with-jitsi-state-of-the-union</link>
      <description>	
In this talk Emil will go over some of Jitsi&#39;s History, what use cases and larger forces drive its development and where it is headed.

Looking forward to seeing you there!

	
In this talk Emil will go over some of Jitsi&#39;s History, what use cases and larger forces drive its development and where it is headed.

Looking forward to seeing you there!
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3874-eng-Meeting_with_Jitsi_State_of_the_Union_sd.mp4"
        length="80740352"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 18:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3874-eng-Meeting_with_Jitsi_State_of_the_Union_sd.mp4?1687075943</guid>
      <dc:identifier>eEV-YZtl6ZUbpGaRi8PfYQ</dc:identifier>
      <dc:date>2022-06-03T18:00:00+02:00</dc:date>
      <itunes:author>emcho</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3874, 2022, Keynote</itunes:keywords>
      <itunes:summary>	
In this talk Emil will go over some of Jitsi&#39;s History, what use cases and larger forces drive its development and where it is headed.

Looking forward to seeing you there!

	
In this talk Emil will go over some of Jitsi&#39;s History, what use cases and larger forces drive its development and where it is headed.

Looking forward to seeing you there!
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:28:15</itunes:duration>
    </item>
    <item>
      <title>A &quot;Box&quot; Full of Tools and Distros (osc22)</title>
      <link>https://media.ccc.de/v/3829-a-box-full-of-tools-and-distros</link>
      <description>It&#39;s no news or secret that containers are good at providing multiple and different testing environments, or at offering a way of deploying apps and services that are completely decoupled from the host OS. E.g., spin up a distro X container, check if code compiles there (and dispose of it).

How about the opposite? I.e., having one (or more!) stateful and persistent environment(s), tightly coupled with the host and sharing as much information and configuration as possible with it. Why? Well for running that one app, which is only available for another distro, with just a click on a desktop launcher icon. Or for doing all kind of experiments, inside our development environment, without risking the stability and the consistency of the system. Well, yes, containers can do these things too. And in openSUSE, we have both toolbox and distrobox, that can make these examples, just reality!

In this talk, we&#39;ll explain what they are and how to use them for spawning development and application environments, based either on the same distro you have on the host or on different ones, and inside of which you still have all your file. A working space that, despite being containerized, you can access seamlessly from within GNOME Builder or open new terminals directly inside of it and create launcher icons for apps installed in there.

We&#39;ll offer (more) examples and show how this can be very useful, both on immutable (like MicroOS) and on &quot;traditional&quot; (like Tumbleweed) systems.

It&#39;s no news or secret that containers are good at providing multiple and different testing environments, or at offering a way of deploying apps and services that are completely decoupled from the host OS. E.g., spin up a distro X container, check if code compiles there (and dispose of it).

How about the opposite? I.e., having one (or more!) stateful and persistent environment(s), tightly coupled with the host and sharing as much information and configuration as possible with it. Why? Well for running that one app, which is only available for another distro, with just a click on a desktop launcher icon. Or for doing all kind of experiments, inside our development environment, without risking the stability and the consistency of the system. Well, yes, containers can do these things too. And in openSUSE, we have both toolbox and distrobox, that can make these examples, just reality!

In this talk, we&#39;ll explain what they are and how to use them for spawning development and application environments, based either on the same distro you have on the host or on different ones, and inside of which you still have all your file. A working space that, despite being containerized, you can access seamlessly from within GNOME Builder or open new terminals directly inside of it and create launcher icons for apps installed in there.

We&#39;ll offer (more) examples and show how this can be very useful, both on immutable (like MicroOS) and on &quot;traditional&quot; (like Tumbleweed) systems.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3829-eng-A_Box_Full_of_Tools_and_Distros_sd.mp4"
        length="54525952"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 15:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3829-eng-A_Box_Full_of_Tools_and_Distros_sd.mp4?1687045384</guid>
      <dc:identifier>GHWPltWw8l0tMzQjnTU-QQ</dc:identifier>
      <dc:date>2022-06-03T15:30:00+02:00</dc:date>
      <itunes:author>Dario Faggioli</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3829, 2022, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>Toolbox and Distrobox on openSUSE MicroOS &amp; Tumbleweed</itunes:subtitle>
      <itunes:summary>It&#39;s no news or secret that containers are good at providing multiple and different testing environments, or at offering a way of deploying apps and services that are completely decoupled from the host OS. E.g., spin up a distro X container, check if code compiles there (and dispose of it).

How about the opposite? I.e., having one (or more!) stateful and persistent environment(s), tightly coupled with the host and sharing as much information and configuration as possible with it. Why? Well for running that one app, which is only available for another distro, with just a click on a desktop launcher icon. Or for doing all kind of experiments, inside our development environment, without risking the stability and the consistency of the system. Well, yes, containers can do these things too. And in openSUSE, we have both toolbox and distrobox, that can make these examples, just reality!

In this talk, we&#39;ll explain what they are and how to use them for spawning development and application environments, based either on the same distro you have on the host or on different ones, and inside of which you still have all your file. A working space that, despite being containerized, you can access seamlessly from within GNOME Builder or open new terminals directly inside of it and create launcher icons for apps installed in there.

We&#39;ll offer (more) examples and show how this can be very useful, both on immutable (like MicroOS) and on &quot;traditional&quot; (like Tumbleweed) systems.

It&#39;s no news or secret that containers are good at providing multiple and different testing environments, or at offering a way of deploying apps and services that are completely decoupled from the host OS. E.g., spin up a distro X container, check if code compiles there (and dispose of it).

How about the opposite? I.e., having one (or more!) stateful and persistent environment(s), tightly coupled with the host and sharing as much information and configuration as possible with it. Why? Well for running that one app, which is only available for another distro, with just a click on a desktop launcher icon. Or for doing all kind of experiments, inside our development environment, without risking the stability and the consistency of the system. Well, yes, containers can do these things too. And in openSUSE, we have both toolbox and distrobox, that can make these examples, just reality!

In this talk, we&#39;ll explain what they are and how to use them for spawning development and application environments, based either on the same distro you have on the host or on different ones, and inside of which you still have all your file. A working space that, despite being containerized, you can access seamlessly from within GNOME Builder or open new terminals directly inside of it and create launcher icons for apps installed in there.

We&#39;ll offer (more) examples and show how this can be very useful, both on immutable (like MicroOS) and on &quot;traditional&quot; (like Tumbleweed) systems.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:35:37</itunes:duration>
    </item>
    <item>
      <title>Digital School ABC (osc22)</title>
      <link>https://media.ccc.de/v/3779-digital-school-abc</link>
      <description>In this talk I&#39;m gonna talk about how we use self hosted and open source solutions at school. 

In this talk I&#39;m gonna talk about how we use self hosted and open source solutions at school. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3779-eng-Digital_School_ABC_sd.mp4"
        length="27262976"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 19:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3779-eng-Digital_School_ABC_sd.mp4?1687043306</guid>
      <dc:identifier>Hpi5lJgQkGSyCA7sdhBFGg</dc:identifier>
      <dc:date>2022-06-02T19:00:00+02:00</dc:date>
      <itunes:author>KaratekHD</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3779, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>All but cloud</itunes:subtitle>
      <itunes:summary>In this talk I&#39;m gonna talk about how we use self hosted and open source solutions at school. 

In this talk I&#39;m gonna talk about how we use self hosted and open source solutions at school. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:49</itunes:duration>
    </item>
    <item>
      <title>Enhancing TensorFlow Security: Secure Software Development practices for developing a secure ML framework (osc22)</title>
      <link>https://media.ccc.de/v/3796-enhancing-tensorflow-security-secure-software-development-practices-for-developing-a-secure-ml-framework</link>
      <description>As the world moves to using machine learning more and more, a question arises of how to prevent cyber criminals from attacking systems using ML frameworks. In this talk, we will cover  why machine learning needs security practices and how we develop TensorFlow to be secure. We will discuss topics such as fuzzing and code transformations for secure software development with a focus on how these are applied within TensorFlow ecosystem. 

As the world moves to using machine learning more and more, a question arises of how to prevent cyber criminals from attacking systems using ML frameworks. In this talk, we will cover  why machine learning needs security practices and how we develop TensorFlow to be secure. We will discuss topics such as fuzzing and code transformations for secure software development with a focus on how these are applied within TensorFlow ecosystem. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3796-eng-Enhancing_TensorFlow_Security_Secure_Software_Development_practices_for_developing_a_secure_ML_framework_sd.mp4"
        length="44040192"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 18:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3796-eng-Enhancing_TensorFlow_Security_Secure_Software_Development_practices_for_developing_a_secure_ML_framework_sd.mp4?1687040559</guid>
      <dc:identifier>k4OK0R20jPXjkP_blOxaQA</dc:identifier>
      <dc:date>2022-06-02T18:00:00+02:00</dc:date>
      <itunes:author>mihaimaruseac</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3796, 2022, Keynote</itunes:keywords>
      <itunes:summary>As the world moves to using machine learning more and more, a question arises of how to prevent cyber criminals from attacking systems using ML frameworks. In this talk, we will cover  why machine learning needs security practices and how we develop TensorFlow to be secure. We will discuss topics such as fuzzing and code transformations for secure software development with a focus on how these are applied within TensorFlow ecosystem. 

As the world moves to using machine learning more and more, a question arises of how to prevent cyber criminals from attacking systems using ML frameworks. In this talk, we will cover  why machine learning needs security practices and how we develop TensorFlow to be secure. We will discuss topics such as fuzzing and code transformations for secure software development with a focus on how these are applied within TensorFlow ecosystem. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:35:18</itunes:duration>
    </item>
    <item>
      <title>openSUSE on Arm (osc22)</title>
      <link>https://media.ccc.de/v/3758-opensuse-on-arm</link>
      <description>This talk is the annual review of openSUSE on Arm, mainly focused on AArch64, but it will also cover armv7 and armv6. At the end, we will have a quick look at the future and where the community could help. 

This talk is the annual review of openSUSE on Arm, mainly focused on AArch64, but it will also cover armv7 and armv6. At the end, we will have a quick look at the future and where the community could help. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3758-eng-openSUSE_on_Arm_sd.mp4"
        length="20971520"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 13:15:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3758-eng-openSUSE_on_Arm_sd.mp4?1687039023</guid>
      <dc:identifier>6kQQjjcOp-NX-80yhnJ9bA</dc:identifier>
      <dc:date>2022-06-02T13:15:00+02:00</dc:date>
      <itunes:author>Guillaume Gardet</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3758, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>The annual review</itunes:subtitle>
      <itunes:summary>This talk is the annual review of openSUSE on Arm, mainly focused on AArch64, but it will also cover armv7 and armv6. At the end, we will have a quick look at the future and where the community could help. 

This talk is the annual review of openSUSE on Arm, mainly focused on AArch64, but it will also cover armv7 and armv6. At the end, we will have a quick look at the future and where the community could help. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:15:50</itunes:duration>
    </item>
    <item>
      <title>D-Installer Project: Carving a Modern Installer (osc22)</title>
      <link>https://media.ccc.de/v/3805-d-installer-project-carving-a-modern-installer</link>
      <description>D-Installer is the code-name of a experimental project for creating a new YAST-based installer designed to offer reusability, better integration with third-party tools and the possibility of building rich user interfaces over it. In this talk, we will explain the motivation of the YaST Team for creating a new installer and what possibilities this new idea brings. There will be time for diving into some technical details about the project architecture and we will show a live demo! You will hear about D-Bus, web interfaces, YaST and Cockpit. If you are interested in how all those pieces play together, do not hesitate to join us. 

D-Installer is the code-name of a experimental project for creating a new YAST-based installer designed to offer reusability, better integration with third-party tools and the possibility of building rich user interfaces over it. In this talk, we will explain the motivation of the YaST Team for creating a new installer and what possibilities this new idea brings. There will be time for diving into some technical details about the project architecture and we will show a live demo! You will hear about D-Bus, web interfaces, YaST and Cockpit. If you are interested in how all those pieces play together, do not hesitate to join us. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3805-eng-D-Installer_Project_Carving_a_Modern_Installer_sd.mp4"
        length="33554432"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 12:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3805-eng-D-Installer_Project_Carving_a_Modern_Installer_sd.mp4?1687016069</guid>
      <dc:identifier>SsgbEXP-aImiJ95DvgSwxA</dc:identifier>
      <dc:date>2022-06-04T12:30:00+02:00</dc:date>
      <itunes:author>José Iván López González</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3805, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>A new installer based on D-Bus, YaST, Cockpit and web interfaces</itunes:subtitle>
      <itunes:summary>D-Installer is the code-name of a experimental project for creating a new YAST-based installer designed to offer reusability, better integration with third-party tools and the possibility of building rich user interfaces over it. In this talk, we will explain the motivation of the YaST Team for creating a new installer and what possibilities this new idea brings. There will be time for diving into some technical details about the project architecture and we will show a live demo! You will hear about D-Bus, web interfaces, YaST and Cockpit. If you are interested in how all those pieces play together, do not hesitate to join us. 

D-Installer is the code-name of a experimental project for creating a new YAST-based installer designed to offer reusability, better integration with third-party tools and the possibility of building rich user interfaces over it. In this talk, we will explain the motivation of the YaST Team for creating a new installer and what possibilities this new idea brings. There will be time for diving into some technical details about the project architecture and we will show a live demo! You will hear about D-Bus, web interfaces, YaST and Cockpit. If you are interested in how all those pieces play together, do not hesitate to join us. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:17</itunes:duration>
    </item>
    <item>
      <title>The Art of the Linux Desktop (osc22)</title>
      <link>https://media.ccc.de/v/3850-the-art-of-the-linux-desktop</link>
      <description>Pretty much everything that has ever been designed is some form of balance between form and function, from modified car&#39;s to architecture to clothes and even user interfaces. In the modern age of material design, Visual Design Group&#39;s and Human Interface Guidelines this balance has very much shifted to be in favor of function over form, an interface that looks good is still important but looks always seem to play a distant second to usability.

The purpose of this talk is to explore what happens when you flip that idea and rather then focusing on creating user interfaces that are primarily usable instead focus on creating user interfaces that are works of art with a lesser regard as to how easy they are to use.

Fortunately this idea is nothing new, in the late 90&#39;s Raster founded the enlightenment desktop inspired by the artistic user interfaces of the games he played growing up, he brought these concepts to the desktop.

The advancement of graphics hardware in the mid two thousands lead us to the world of fish tanks inside cubes, wobbly windows and painting fire on the screen. Not because there was any real need or use but because someone could. Sadly since then the world of the Linux desktop has tried to go all professional and many of the fun interesting things have been lost.

Pretty much everything that has ever been designed is some form of balance between form and function, from modified car&#39;s to architecture to clothes and even user interfaces. In the modern age of material design, Visual Design Group&#39;s and Human Interface Guidelines this balance has very much shifted to be in favor of function over form, an interface that looks good is still important but looks always seem to play a distant second to usability.

The purpose of this talk is to explore what happens when you flip that idea and rather then focusing on creating user interfaces that are primarily usable instead focus on creating user interfaces that are works of art with a lesser regard as to how easy they are to use.

Fortunately this idea is nothing new, in the late 90&#39;s Raster founded the enlightenment desktop inspired by the artistic user interfaces of the games he played growing up, he brought these concepts to the desktop.

The advancement of graphics hardware in the mid two thousands lead us to the world of fish tanks inside cubes, wobbly windows and painting fire on the screen. Not because there was any real need or use but because someone could. Sadly since then the world of the Linux desktop has tried to go all professional and many of the fun interesting things have been lost.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3850-eng-The_Art_of_the_Linux_Desktop_sd.mp4"
        length="41943040"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 11:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3850-eng-The_Art_of_the_Linux_Desktop_sd.mp4?1687007404</guid>
      <dc:identifier>9lm_nZ84LRRn2-fKqpT0mw</dc:identifier>
      <dc:date>2022-06-04T11:30:00+02:00</dc:date>
      <itunes:author>Simon Lees</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3850, 2022, Open Source</itunes:keywords>
      <itunes:summary>Pretty much everything that has ever been designed is some form of balance between form and function, from modified car&#39;s to architecture to clothes and even user interfaces. In the modern age of material design, Visual Design Group&#39;s and Human Interface Guidelines this balance has very much shifted to be in favor of function over form, an interface that looks good is still important but looks always seem to play a distant second to usability.

The purpose of this talk is to explore what happens when you flip that idea and rather then focusing on creating user interfaces that are primarily usable instead focus on creating user interfaces that are works of art with a lesser regard as to how easy they are to use.

Fortunately this idea is nothing new, in the late 90&#39;s Raster founded the enlightenment desktop inspired by the artistic user interfaces of the games he played growing up, he brought these concepts to the desktop.

The advancement of graphics hardware in the mid two thousands lead us to the world of fish tanks inside cubes, wobbly windows and painting fire on the screen. Not because there was any real need or use but because someone could. Sadly since then the world of the Linux desktop has tried to go all professional and many of the fun interesting things have been lost.

Pretty much everything that has ever been designed is some form of balance between form and function, from modified car&#39;s to architecture to clothes and even user interfaces. In the modern age of material design, Visual Design Group&#39;s and Human Interface Guidelines this balance has very much shifted to be in favor of function over form, an interface that looks good is still important but looks always seem to play a distant second to usability.

The purpose of this talk is to explore what happens when you flip that idea and rather then focusing on creating user interfaces that are primarily usable instead focus on creating user interfaces that are works of art with a lesser regard as to how easy they are to use.

Fortunately this idea is nothing new, in the late 90&#39;s Raster founded the enlightenment desktop inspired by the artistic user interfaces of the games he played growing up, he brought these concepts to the desktop.

The advancement of graphics hardware in the mid two thousands lead us to the world of fish tanks inside cubes, wobbly windows and painting fire on the screen. Not because there was any real need or use but because someone could. Sadly since then the world of the Linux desktop has tried to go all professional and many of the fun interesting things have been lost.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:53</itunes:duration>
    </item>
    <item>
      <title>Still not Superheroes (osc22)</title>
      <link>https://media.ccc.de/v/3808-still-not-superheroes</link>
      <description>During the last years, the openSUSE infrastructure was improved a lot. But is it perfect now? Of course not - otherwise the Heroes would be bored, and I could not give this talk. And of course, where people work, funny[tm] things happen - please bring your own popcorn ;-)     

During the last years, the openSUSE infrastructure was improved a lot. But is it perfect now? Of course not - otherwise the Heroes would be bored, and I could not give this talk. And of course, where people work, funny[tm] things happen - please bring your own popcorn ;-)     
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3808-eng-Still_not_Superheroes_sd.mp4"
        length="29360128"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 19:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3808-eng-Still_not_Superheroes_sd.mp4?1687004688</guid>
      <dc:identifier>-n98lnxwSZyaE0JIWEo4WA</dc:identifier>
      <dc:date>2022-06-03T19:30:00+02:00</dc:date>
      <itunes:author>Christian Boltz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3808, 2022, openSUSE</itunes:keywords>
      <itunes:summary>During the last years, the openSUSE infrastructure was improved a lot. But is it perfect now? Of course not - otherwise the Heroes would be bored, and I could not give this talk. And of course, where people work, funny[tm] things happen - please bring your own popcorn ;-)     

During the last years, the openSUSE infrastructure was improved a lot. But is it perfect now? Of course not - otherwise the Heroes would be bored, and I could not give this talk. And of course, where people work, funny[tm] things happen - please bring your own popcorn ;-)     
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:39</itunes:duration>
    </item>
    <item>
      <title>Web asset security (osc22)</title>
      <link>https://media.ccc.de/v/3841-web-asset-security</link>
      <description>Before downloading a software release, we all know to verify the GPG signature before even trying to unpack that tarball. And when such a signature is not available, we all know to chastise the developer for not taking security seriously. But what happens with deployed web resources? How can these be verified before we trust them with our secure data? 

I would like to show a proof-of-concept of using out-of-band verification (aka, DNS) of web content (.js, .html, .jpeg, etc) prior to allowing it to execute and trusting it with our data.


Before downloading a software release, we all know to verify the GPG signature before even trying to unpack that tarball. And when such a signature is not available, we all know to chastise the developer for not taking security seriously. But what happens with deployed web resources? How can these be verified before we trust them with our secure data? 

I would like to show a proof-of-concept of using out-of-band verification (aka, DNS) of web content (.js, .html, .jpeg, etc) prior to allowing it to execute and trusting it with our data.

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3841-eng-Web_asset_security_sd.mp4"
        length="33554432"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 19:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3841-eng-Web_asset_security_sd.mp4?1687003952</guid>
      <dc:identifier>DaQkPrKgN4jHNKuBQBessg</dc:identifier>
      <dc:date>2022-06-03T19:30:00+02:00</dc:date>
      <itunes:author>Adam Majer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3841, 2022, New Technologies</itunes:keywords>
      <itunes:subtitle>and how to verify that Javascript before you trust your data to it</itunes:subtitle>
      <itunes:summary>Before downloading a software release, we all know to verify the GPG signature before even trying to unpack that tarball. And when such a signature is not available, we all know to chastise the developer for not taking security seriously. But what happens with deployed web resources? How can these be verified before we trust them with our secure data? 

I would like to show a proof-of-concept of using out-of-band verification (aka, DNS) of web content (.js, .html, .jpeg, etc) prior to allowing it to execute and trusting it with our data.


Before downloading a software release, we all know to verify the GPG signature before even trying to unpack that tarball. And when such a signature is not available, we all know to chastise the developer for not taking security seriously. But what happens with deployed web resources? How can these be verified before we trust them with our secure data? 

I would like to show a proof-of-concept of using out-of-band verification (aka, DNS) of web content (.js, .html, .jpeg, etc) prior to allowing it to execute and trusting it with our data.

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:34</itunes:duration>
    </item>
    <item>
      <title>Uyuni Saltboot - automated image deployment and lifecycle with Uyuni (osc22)</title>
      <link>https://media.ccc.de/v/3826-uyuni-saltboot-automated-image-deployment-and-lifecycle-with-uyuni</link>
      <description>Deploying images is ever evolving topic. Although much of the deployments today are concerned with containers, base systems for container host are somehow needed to be deployed as well.

Let me present Saltboot, part of Uyuni stack. Saltboot is building on SaltStack to make image deployment secure and together with Uyuni provides complete image lifecycle and management - from image building, staging to deployment on target machines.

Deploying images is ever evolving topic. Although much of the deployments today are concerned with containers, base systems for container host are somehow needed to be deployed as well.

Let me present Saltboot, part of Uyuni stack. Saltboot is building on SaltStack to make image deployment secure and together with Uyuni provides complete image lifecycle and management - from image building, staging to deployment on target machines.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3826-eng-Uyuni_Saltboot_-_automated_image_deployment_and_lifecycle_with_Uyuni_sd.mp4"
        length="61865984"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 18:45:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3826-eng-Uyuni_Saltboot_-_automated_image_deployment_and_lifecycle_with_Uyuni_sd.mp4?1687000181</guid>
      <dc:identifier>9Y4jy24KZGBC7J3ltwTs2A</dc:identifier>
      <dc:date>2022-06-03T18:45:00+02:00</dc:date>
      <itunes:author>Ondrej Holecek</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3826, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>Deploying filesystem images on real hardware or VMs securely and with complete control</itunes:subtitle>
      <itunes:summary>Deploying images is ever evolving topic. Although much of the deployments today are concerned with containers, base systems for container host are somehow needed to be deployed as well.

Let me present Saltboot, part of Uyuni stack. Saltboot is building on SaltStack to make image deployment secure and together with Uyuni provides complete image lifecycle and management - from image building, staging to deployment on target machines.

Deploying images is ever evolving topic. Although much of the deployments today are concerned with containers, base systems for container host are somehow needed to be deployed as well.

Let me present Saltboot, part of Uyuni stack. Saltboot is building on SaltStack to make image deployment secure and together with Uyuni provides complete image lifecycle and management - from image building, staging to deployment on target machines.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:45:41</itunes:duration>
    </item>
    <item>
      <title>State of transactional-update (osc22)</title>
      <link>https://media.ccc.de/v/3859-state-of-transactional-update</link>
      <description>**transactional-update** is the openSUSE way of a **Transactional Operating System update** and a core component of _openSUSE MicroOS_ / _Kubic_ and _SLE Micro_, making sure updates can be applied safely without affecting the currently running system. It&#39;s also supposed to play an important component in the future ALP.

At lot of things have changed internally since the last talk at oSC19: The core functionality has been **rewritten in C++** (formerly Bash), including a **C++ and C API** and a **D-Bus interface**. From a user&#39;s perspective the transactional-update command line interface still looks the same, but we now have **Cockpit** and **dnf integration**.

This talk will

- give a **short overview of transactional-update** for those new to the concept.
- introduce `tukit`, the command line interface for the API functionality.
- present the new **Cockpit** interface for transactional-update.
- present the **dnf** integration.
- give an overview over other changes (SELinux support, Kernel Live Patching).
- and we should also have some minutes left for questions and discussions.

**transactional-update** is the openSUSE way of a **Transactional Operating System update** and a core component of _openSUSE MicroOS_ / _Kubic_ and _SLE Micro_, making sure updates can be applied safely without affecting the currently running system. It&#39;s also supposed to play an important component in the future ALP.

At lot of things have changed internally since the last talk at oSC19: The core functionality has been **rewritten in C++** (formerly Bash), including a **C++ and C API** and a **D-Bus interface**. From a user&#39;s perspective the transactional-update command line interface still looks the same, but we now have **Cockpit** and **dnf integration**.

This talk will

- give a **short overview of transactional-update** for those new to the concept.
- introduce `tukit`, the command line interface for the API functionality.
- present the new **Cockpit** interface for transactional-update.
- present the **dnf** integration.
- give an overview over other changes (SELinux support, Kernel Live Patching).
- and we should also have some minutes left for questions and discussions.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3859-eng-State_of_transactional-update_sd.mp4"
        length="41943040"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 12:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3859-eng-State_of_transactional-update_sd.mp4?1687012378</guid>
      <dc:identifier>2mCtUN8KA579-f4OICsiqQ</dc:identifier>
      <dc:date>2022-06-04T12:00:00+02:00</dc:date>
      <itunes:author>Ignaz Forster</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3859, 2022, openSUSE</itunes:keywords>
      <itunes:summary>**transactional-update** is the openSUSE way of a **Transactional Operating System update** and a core component of _openSUSE MicroOS_ / _Kubic_ and _SLE Micro_, making sure updates can be applied safely without affecting the currently running system. It&#39;s also supposed to play an important component in the future ALP.

At lot of things have changed internally since the last talk at oSC19: The core functionality has been **rewritten in C++** (formerly Bash), including a **C++ and C API** and a **D-Bus interface**. From a user&#39;s perspective the transactional-update command line interface still looks the same, but we now have **Cockpit** and **dnf integration**.

This talk will

- give a **short overview of transactional-update** for those new to the concept.
- introduce `tukit`, the command line interface for the API functionality.
- present the new **Cockpit** interface for transactional-update.
- present the **dnf** integration.
- give an overview over other changes (SELinux support, Kernel Live Patching).
- and we should also have some minutes left for questions and discussions.

**transactional-update** is the openSUSE way of a **Transactional Operating System update** and a core component of _openSUSE MicroOS_ / _Kubic_ and _SLE Micro_, making sure updates can be applied safely without affecting the currently running system. It&#39;s also supposed to play an important component in the future ALP.

At lot of things have changed internally since the last talk at oSC19: The core functionality has been **rewritten in C++** (formerly Bash), including a **C++ and C API** and a **D-Bus interface**. From a user&#39;s perspective the transactional-update command line interface still looks the same, but we now have **Cockpit** and **dnf integration**.

This talk will

- give a **short overview of transactional-update** for those new to the concept.
- introduce `tukit`, the command line interface for the API functionality.
- present the new **Cockpit** interface for transactional-update.
- present the **dnf** integration.
- give an overview over other changes (SELinux support, Kernel Live Patching).
- and we should also have some minutes left for questions and discussions.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:27:29</itunes:duration>
    </item>
    <item>
      <title>Learning to Package in openSUSE (osc22)</title>
      <link>https://media.ccc.de/v/3814-learning-to-package-in-opensuse</link>
      <description>My experiences over the last 2-4 months learning to update packages in openSUSE. Starting around the middle of March 2022, I began learning to update packages with OBS. This lightening talk with highlight my experiences since then learning to package. 

My experiences over the last 2-4 months learning to update packages in openSUSE. Starting around the middle of March 2022, I began learning to update packages with OBS. This lightening talk with highlight my experiences since then learning to package. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3814-eng-Learning_to_Package_in_openSUSE_sd.mp4"
        length="11534336"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 13:50:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3814-eng-Learning_to_Package_in_openSUSE_sd.mp4?1686992331</guid>
      <dc:identifier>0i5-rNfnL8l4cruMOHloRg</dc:identifier>
      <dc:date>2022-06-03T13:50:00+02:00</dc:date>
      <itunes:author>Emily Gonyer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3814, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>in OBS </itunes:subtitle>
      <itunes:summary>My experiences over the last 2-4 months learning to update packages in openSUSE. Starting around the middle of March 2022, I began learning to update packages with OBS. This lightening talk with highlight my experiences since then learning to package. 

My experiences over the last 2-4 months learning to update packages in openSUSE. Starting around the middle of March 2022, I began learning to update packages with OBS. This lightening talk with highlight my experiences since then learning to package. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:07:59</itunes:duration>
    </item>
    <item>
      <title>MicroOS TIU (osc22)</title>
      <link>https://media.ccc.de/v/3749-microos-tiu</link>
      <description>We have several ways to install and update openSUSE distributions, standard with zypper, atomic with transactional-update or using disk images created with kiwi or similar tools. But this are all RPM based. 
In some scenarios, it would be good to have an image based installation and update mechanism (image means /usr, not a full disk image).
A PoC is MicroOS TIU (https://github.com/thkukuk/tiu), which allows to use either btrfs snapshots or several partitions (usrAB) for installation and update.
This talk will give some insight into it. The current status, the problems, what it means for packaging, etc.

We have several ways to install and update openSUSE distributions, standard with zypper, atomic with transactional-update or using disk images created with kiwi or similar tools. But this are all RPM based. 
In some scenarios, it would be good to have an image based installation and update mechanism (image means /usr, not a full disk image).
A PoC is MicroOS TIU (https://github.com/thkukuk/tiu), which allows to use either btrfs snapshots or several partitions (usrAB) for installation and update.
This talk will give some insight into it. The current status, the problems, what it means for packaging, etc.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3749-eng-MicroOS_TIU_sd.mp4"
        length="56623104"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 13:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3749-eng-MicroOS_TIU_sd.mp4?1687019327</guid>
      <dc:identifier>EO0Vot3wVKWlF7KS9chEvQ</dc:identifier>
      <dc:date>2022-06-04T13:00:00+02:00</dc:date>
      <itunes:author>Thorsten Kukuk</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3749, 2022, New Technologies</itunes:keywords>
      <itunes:subtitle>Transactional Image Update</itunes:subtitle>
      <itunes:summary>We have several ways to install and update openSUSE distributions, standard with zypper, atomic with transactional-update or using disk images created with kiwi or similar tools. But this are all RPM based. 
In some scenarios, it would be good to have an image based installation and update mechanism (image means /usr, not a full disk image).
A PoC is MicroOS TIU (https://github.com/thkukuk/tiu), which allows to use either btrfs snapshots or several partitions (usrAB) for installation and update.
This talk will give some insight into it. The current status, the problems, what it means for packaging, etc.

We have several ways to install and update openSUSE distributions, standard with zypper, atomic with transactional-update or using disk images created with kiwi or similar tools. But this are all RPM based. 
In some scenarios, it would be good to have an image based installation and update mechanism (image means /usr, not a full disk image).
A PoC is MicroOS TIU (https://github.com/thkukuk/tiu), which allows to use either btrfs snapshots or several partitions (usrAB) for installation and update.
This talk will give some insight into it. The current status, the problems, what it means for packaging, etc.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:40:46</itunes:duration>
    </item>
    <item>
      <title>Getting the most of AutoYaST in 2022 (osc22)</title>
      <link>https://media.ccc.de/v/3799-getting-the-most-of-autoyast-in-2022</link>
      <description>AutoYaST is the main method for installing openSUSE Linux in enterprise environments. Although it is usual for AutoYaST to get new features and fixes with every minor release,  openSUSE Leap 15.3 was special in that regard. Thanks to the &quot;Modernizing AutoYaST&quot; initiative, we introduced relevant features like ERB templates, better validation tools, etc. 

However, we have found that many of these features remain unknown to our users, and the openSUSE Conference offers an excellent chance to present them.

AutoYaST is the main method for installing openSUSE Linux in enterprise environments. Although it is usual for AutoYaST to get new features and fixes with every minor release,  openSUSE Leap 15.3 was special in that regard. Thanks to the &quot;Modernizing AutoYaST&quot; initiative, we introduced relevant features like ERB templates, better validation tools, etc. 

However, we have found that many of these features remain unknown to our users, and the openSUSE Conference offers an excellent chance to present them.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3799-eng-Getting_the_most_of_AutoYaST_in_2022_sd.mp4"
        length="36700160"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 15:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3799-eng-Getting_the_most_of_AutoYaST_in_2022_sd.mp4?1686990063</guid>
      <dc:identifier>V8534QrV6XXOAR3mAEfIEw</dc:identifier>
      <dc:date>2022-06-03T15:00:00+02:00</dc:date>
      <itunes:author>Imobach González Sosa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3799, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>Presenting some recent features you may have missed</itunes:subtitle>
      <itunes:summary>AutoYaST is the main method for installing openSUSE Linux in enterprise environments. Although it is usual for AutoYaST to get new features and fixes with every minor release,  openSUSE Leap 15.3 was special in that regard. Thanks to the &quot;Modernizing AutoYaST&quot; initiative, we introduced relevant features like ERB templates, better validation tools, etc. 

However, we have found that many of these features remain unknown to our users, and the openSUSE Conference offers an excellent chance to present them.

AutoYaST is the main method for installing openSUSE Linux in enterprise environments. Although it is usual for AutoYaST to get new features and fixes with every minor release,  openSUSE Leap 15.3 was special in that regard. Thanks to the &quot;Modernizing AutoYaST&quot; initiative, we introduced relevant features like ERB templates, better validation tools, etc. 

However, we have found that many of these features remain unknown to our users, and the openSUSE Conference offers an excellent chance to present them.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:24:36</itunes:duration>
    </item>
    <item>
      <title>making a switch from docker to podman in development environment (osc22)</title>
      <link>https://media.ccc.de/v/3790-making-a-switch-from-docker-to-podman-in-development-environment</link>
      <description>On an example of PMM (Percona Monitoring and Management) opensource project I would like to show how to use podman instead of docker in software development process.
We would go throw the basic (how to configure it) and discuss the changes required in build scripts, environment and etc.
This will cover docker (run, build), docker-compose and briefly minikube to be replaced or use podman. 

[presentation slides](https://denisok.github.io/oSC/switch_docker_podman_dev_env.html)

On an example of PMM (Percona Monitoring and Management) opensource project I would like to show how to use podman instead of docker in software development process.
We would go throw the basic (how to configure it) and discuss the changes required in build scripts, environment and etc.
This will cover docker (run, build), docker-compose and briefly minikube to be replaced or use podman. 

[presentation slides](https://denisok.github.io/oSC/switch_docker_podman_dev_env.html)
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3790-eng-making_a_switch_from_docker_to_podman_in_development_environment_sd.mp4"
        length="41943040"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 16:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3790-eng-making_a_switch_from_docker_to_podman_in_development_environment_sd.mp4?1686992224</guid>
      <dc:identifier>aTbwzAQf2_92HOscr3VlVQ</dc:identifier>
      <dc:date>2022-06-03T16:30:00+02:00</dc:date>
      <itunes:author>Denys Kondratenko</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3790, 2022, Cloud and Containers</itunes:keywords>
      <itunes:subtitle>how to configure env to use podman</itunes:subtitle>
      <itunes:summary>On an example of PMM (Percona Monitoring and Management) opensource project I would like to show how to use podman instead of docker in software development process.
We would go throw the basic (how to configure it) and discuss the changes required in build scripts, environment and etc.
This will cover docker (run, build), docker-compose and briefly minikube to be replaced or use podman. 

[presentation slides](https://denisok.github.io/oSC/switch_docker_podman_dev_env.html)

On an example of PMM (Percona Monitoring and Management) opensource project I would like to show how to use podman instead of docker in software development process.
We would go throw the basic (how to configure it) and discuss the changes required in build scripts, environment and etc.
This will cover docker (run, build), docker-compose and briefly minikube to be replaced or use podman. 

[presentation slides](https://denisok.github.io/oSC/switch_docker_podman_dev_env.html)
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:27:58</itunes:duration>
    </item>
    <item>
      <title>usrmerge and beyond (osc22)</title>
      <link>https://media.ccc.de/v/3844-usrmerge-and-beyond</link>
      <description>A traditional Linux file system tree in the root file system has quite a number of directories with special purpose, documented in the Filesystem Hierarchy Standard (FHS). An operating system installation by default populates most of those directories with different kinds of files, e.g. by means of a package manager. When looking closer this theoretical order is quite a mess in practice. Alternative approaches to manage and update software components of the operating system such as MicroOS reveal the inconsistencies and require stricter separation of different types of files. This talk analyzes where we&#39;re coming from, how the tree looks today and where we&#39;re heading. 

The talk will be based on https://lnussel.github.io/2020/12/16/fslayout/


A traditional Linux file system tree in the root file system has quite a number of directories with special purpose, documented in the Filesystem Hierarchy Standard (FHS). An operating system installation by default populates most of those directories with different kinds of files, e.g. by means of a package manager. When looking closer this theoretical order is quite a mess in practice. Alternative approaches to manage and update software components of the operating system such as MicroOS reveal the inconsistencies and require stricter separation of different types of files. This talk analyzes where we&#39;re coming from, how the tree looks today and where we&#39;re heading. 

The talk will be based on https://lnussel.github.io/2020/12/16/fslayout/

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3844-eng-usrmerge_and_beyond_sd.mp4"
        length="26214400"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 15:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3844-eng-usrmerge_and_beyond_sd.mp4?1686967383</guid>
      <dc:identifier>YzCKCiMKUgEMbQSAZYK1KQ</dc:identifier>
      <dc:date>2022-06-04T15:00:00+02:00</dc:date>
      <itunes:author>Ludwig Nussel</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3844, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>what&#39;s happening to the file system layout?</itunes:subtitle>
      <itunes:summary>A traditional Linux file system tree in the root file system has quite a number of directories with special purpose, documented in the Filesystem Hierarchy Standard (FHS). An operating system installation by default populates most of those directories with different kinds of files, e.g. by means of a package manager. When looking closer this theoretical order is quite a mess in practice. Alternative approaches to manage and update software components of the operating system such as MicroOS reveal the inconsistencies and require stricter separation of different types of files. This talk analyzes where we&#39;re coming from, how the tree looks today and where we&#39;re heading. 

The talk will be based on https://lnussel.github.io/2020/12/16/fslayout/


A traditional Linux file system tree in the root file system has quite a number of directories with special purpose, documented in the Filesystem Hierarchy Standard (FHS). An operating system installation by default populates most of those directories with different kinds of files, e.g. by means of a package manager. When looking closer this theoretical order is quite a mess in practice. Alternative approaches to manage and update software components of the operating system such as MicroOS reveal the inconsistencies and require stricter separation of different types of files. This talk analyzes where we&#39;re coming from, how the tree looks today and where we&#39;re heading. 

The talk will be based on https://lnussel.github.io/2020/12/16/fslayout/

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:17:18</itunes:duration>
    </item>
    <item>
      <title>(opensource == secure)? Yes, if you audit it! (osc22)</title>
      <link>https://media.ccc.de/v/3770-opensource-secure-yes-if-you-audit-it</link>
      <description>Tales in a life of a product security engineer making Open Source software more secure one bit at time. 
In this session, I will talk about what does it mean to be a product security engineer and how SUSE security team audits can help Open Source community in having a better security posture.

Tales in a life of a product security engineer making Open Source software more secure one bit at time. 
In this session, I will talk about what does it mean to be a product security engineer and how SUSE security team audits can help Open Source community in having a better security posture.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3770-eng-opensource_secure_Yes_if_you_audit_it_sd.mp4"
        length="27262976"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 20:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3770-eng-opensource_secure_Yes_if_you_audit_it_sd.mp4?1686965176</guid>
      <dc:identifier>JbvqnSD51Rr7cWYjDakvuQ</dc:identifier>
      <dc:date>2022-06-03T20:00:00+02:00</dc:date>
      <itunes:author>Paolo Perego</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3770, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>Tales in a life of a product security engineer making opensource software more secure one bit at time. </itunes:subtitle>
      <itunes:summary>Tales in a life of a product security engineer making Open Source software more secure one bit at time. 
In this session, I will talk about what does it mean to be a product security engineer and how SUSE security team audits can help Open Source community in having a better security posture.

Tales in a life of a product security engineer making Open Source software more secure one bit at time. 
In this session, I will talk about what does it mean to be a product security engineer and how SUSE security team audits can help Open Source community in having a better security posture.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:18:53</itunes:duration>
    </item>
    <item>
      <title>Almost Two Years of YaST News (osc22)</title>
      <link>https://media.ccc.de/v/3734-almost-two-years-of-yast-news</link>
      <description>YaST, the flagship installer and configuration tool of openSUSE is in
constant development. Just as its unattended companion AutoYaST. 

Although the YaST Team at SUSE tries to communicate progress as often as
possible in the YaST Blog, it has been almost two years since we
presented the &quot;Top 25 New Features in (Auto)YaST&quot; at openSUSE Conference
2020. So it&#39;s time for another live update!

We will recap the main changes and new features that are already
integrated into openSUSE Tumbleweed and that will be included at
openSUSE Leap 15.4, to be released just a couple of days after the talk.

We will also take a look to some ideas for future development... and we
really need the feedback of the whole openSUSE community for that. So
please join us and speak up!

YaST, the flagship installer and configuration tool of openSUSE is in
constant development. Just as its unattended companion AutoYaST. 

Although the YaST Team at SUSE tries to communicate progress as often as
possible in the YaST Blog, it has been almost two years since we
presented the &quot;Top 25 New Features in (Auto)YaST&quot; at openSUSE Conference
2020. So it&#39;s time for another live update!

We will recap the main changes and new features that are already
integrated into openSUSE Tumbleweed and that will be included at
openSUSE Leap 15.4, to be released just a couple of days after the talk.

We will also take a look to some ideas for future development... and we
really need the feedback of the whole openSUSE community for that. So
please join us and speak up!
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3734-eng-Almost_Two_Years_of_YaST_News_sd.mp4"
        length="51380224"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 15:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3734-eng-Almost_Two_Years_of_YaST_News_sd.mp4?1686957235</guid>
      <dc:identifier>55H2q1hx8bvlUWvHx798lg</dc:identifier>
      <dc:date>2022-06-03T15:30:00+02:00</dc:date>
      <itunes:author>Ancor González Sosa</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3734, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>Recent changes and future plans at YaSTland</itunes:subtitle>
      <itunes:summary>YaST, the flagship installer and configuration tool of openSUSE is in
constant development. Just as its unattended companion AutoYaST. 

Although the YaST Team at SUSE tries to communicate progress as often as
possible in the YaST Blog, it has been almost two years since we
presented the &quot;Top 25 New Features in (Auto)YaST&quot; at openSUSE Conference
2020. So it&#39;s time for another live update!

We will recap the main changes and new features that are already
integrated into openSUSE Tumbleweed and that will be included at
openSUSE Leap 15.4, to be released just a couple of days after the talk.

We will also take a look to some ideas for future development... and we
really need the feedback of the whole openSUSE community for that. So
please join us and speak up!

YaST, the flagship installer and configuration tool of openSUSE is in
constant development. Just as its unattended companion AutoYaST. 

Although the YaST Team at SUSE tries to communicate progress as often as
possible in the YaST Blog, it has been almost two years since we
presented the &quot;Top 25 New Features in (Auto)YaST&quot; at openSUSE Conference
2020. So it&#39;s time for another live update!

We will recap the main changes and new features that are already
integrated into openSUSE Tumbleweed and that will be included at
openSUSE Leap 15.4, to be released just a couple of days after the talk.

We will also take a look to some ideas for future development... and we
really need the feedback of the whole openSUSE community for that. So
please join us and speak up!
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:37:06</itunes:duration>
    </item>
    <item>
      <title>Sudo 1.9+ (osc22)</title>
      <link>https://media.ccc.de/v/3691-sudo-1-9</link>
      <description>Sudo is used by millions to control and log administrator access to systems, but using only the default configuration, there are plenty of blind spots. Using the latest features in sudo lets you watch some functions that previously were blind spots and you can also control access to them. There were several minor and major changes since the 1.9.0 release that I discussed in my previous FOSDEM talks.

Sudo is used by millions to control and log administrator access to systems, but using only the default configuration, there are plenty of blind spots. Using the latest features in sudo lets you watch some functions that previously were blind spots and you can also control access to them. There were several minor and major changes since the 1.9.0 release that I discussed in my previous FOSDEM talks.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3691-eng-Sudo_19_sd.mp4"
        length="45088768"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 18:45:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3691-eng-Sudo_19_sd.mp4?1686963883</guid>
      <dc:identifier>uRuRimsstzbfLI-QF06YIA</dc:identifier>
      <dc:date>2022-06-03T18:45:00+02:00</dc:date>
      <itunes:author>Peter Czanik</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3691, 2022, New Technologies</itunes:keywords>
      <itunes:subtitle>watch and control your blind spots</itunes:subtitle>
      <itunes:summary>Sudo is used by millions to control and log administrator access to systems, but using only the default configuration, there are plenty of blind spots. Using the latest features in sudo lets you watch some functions that previously were blind spots and you can also control access to them. There were several minor and major changes since the 1.9.0 release that I discussed in my previous FOSDEM talks.

Sudo is used by millions to control and log administrator access to systems, but using only the default configuration, there are plenty of blind spots. Using the latest features in sudo lets you watch some functions that previously were blind spots and you can also control access to them. There were several minor and major changes since the 1.9.0 release that I discussed in my previous FOSDEM talks.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:30:51</itunes:duration>
    </item>
    <item>
      <title>New git based workflow for Factory packages? (osc22)</title>
      <link>https://media.ccc.de/v/3905-new-git-based-workflow-for-factory-packages</link>
      <description>The Open Build Service has new support to allow developing packages directly in git repositories. This means that entire source management would be handed over to some pagure, gitlab or gerrit instance as origin of trust.

The talk will describe possible setups, workflows and development scenarios. Including an open discussion what should we aim for our main distributions.

The Open Build Service has new support to allow developing packages directly in git repositories. This means that entire source management would be handed over to some pagure, gitlab or gerrit instance as origin of trust.

The talk will describe possible setups, workflows and development scenarios. Including an open discussion what should we aim for our main distributions.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3905-eng-New_git_based_workflow_for_Factory_packages_sd.mp4"
        length="53477376"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 17:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3905-eng-New_git_based_workflow_for_Factory_packages_sd.mp4?1686960184</guid>
      <dc:identifier>tXqoR1-UIS9PKBiPNkN92A</dc:identifier>
      <dc:date>2022-06-03T17:30:00+02:00</dc:date>
      <itunes:author>Adrian Schröter</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3905, 2022, Open Source</itunes:keywords>
      <itunes:summary>The Open Build Service has new support to allow developing packages directly in git repositories. This means that entire source management would be handed over to some pagure, gitlab or gerrit instance as origin of trust.

The talk will describe possible setups, workflows and development scenarios. Including an open discussion what should we aim for our main distributions.

The Open Build Service has new support to allow developing packages directly in git repositories. This means that entire source management would be handed over to some pagure, gitlab or gerrit instance as origin of trust.

The talk will describe possible setups, workflows and development scenarios. Including an open discussion what should we aim for our main distributions.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:39:49</itunes:duration>
    </item>
    <item>
      <title>The openSUSE Bar Story (osc22)</title>
      <link>https://media.ccc.de/v/3895-the-opensuse-bar-story</link>
      <description>This talk will go over the history of the openSUSE Bar. How it started and what it has done.

This talk will go over the history of the openSUSE Bar. How it started and what it has done.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3895-eng-The_openSUSE_Bar_Story_sd.mp4"
        length="30408704"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 13:55:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3895-eng-The_openSUSE_Bar_Story_sd.mp4?1686930987</guid>
      <dc:identifier>or2BZLy6Y1wCKA7w5jTB8w</dc:identifier>
      <dc:date>2022-06-04T13:55:00+02:00</dc:date>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3895, 2022, Community</itunes:keywords>
      <itunes:summary>This talk will go over the history of the openSUSE Bar. How it started and what it has done.

This talk will go over the history of the openSUSE Bar. How it started and what it has done.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:12:33</itunes:duration>
    </item>
    <item>
      <title>Collaboration instead of Competition (osc22)</title>
      <link>https://media.ccc.de/v/3700-collaboration-instead-of-competition</link>
      <description>Default community distributions are running in the same issues for special architectures. Every Linux distribution has got mostly separate maintainers and hardware distributors are handling these communities really often disconnected. That has been identified also for the architecture s390x. Therefore, openSUSE, Fedora, Debian, SUSE, Canonical (Ubuntu) and Red Hat have established together with IBM a Linux Distributions Working Group for a better collaboration together and with the goal to achieve better support. In this presentation, you should receive an overview of a good collaboration between Linux distributions and what you can achieve together with such a Working Group.  

Default community distributions are running in the same issues for special architectures. Every Linux distribution has got mostly separate maintainers and hardware distributors are handling these communities really often disconnected. That has been identified also for the architecture s390x. Therefore, openSUSE, Fedora, Debian, SUSE, Canonical (Ubuntu) and Red Hat have established together with IBM a Linux Distributions Working Group for a better collaboration together and with the goal to achieve better support. In this presentation, you should receive an overview of a good collaboration between Linux distributions and what you can achieve together with such a Working Group.  
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3700-eng-Collaboration_instead_of_Competition_sd.mp4"
        length="40894464"
        type="video/mp4"/>
      <pubDate>Sat, 04 Jun 2022 12:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3700-eng-Collaboration_instead_of_Competition_sd.mp4?1686929186</guid>
      <dc:identifier>trECigpijYwzw86SSzcfXg</dc:identifier>
      <dc:date>2022-06-04T12:30:00+02:00</dc:date>
      <itunes:author>Sarah Julia Kriesch</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3700, 2022, Community</itunes:keywords>
      <itunes:subtitle>The Linux Distributions Working Group at the Open Mainframe Project</itunes:subtitle>
      <itunes:summary>Default community distributions are running in the same issues for special architectures. Every Linux distribution has got mostly separate maintainers and hardware distributors are handling these communities really often disconnected. That has been identified also for the architecture s390x. Therefore, openSUSE, Fedora, Debian, SUSE, Canonical (Ubuntu) and Red Hat have established together with IBM a Linux Distributions Working Group for a better collaboration together and with the goal to achieve better support. In this presentation, you should receive an overview of a good collaboration between Linux distributions and what you can achieve together with such a Working Group.  

Default community distributions are running in the same issues for special architectures. Every Linux distribution has got mostly separate maintainers and hardware distributors are handling these communities really often disconnected. That has been identified also for the architecture s390x. Therefore, openSUSE, Fedora, Debian, SUSE, Canonical (Ubuntu) and Red Hat have established together with IBM a Linux Distributions Working Group for a better collaboration together and with the goal to achieve better support. In this presentation, you should receive an overview of a good collaboration between Linux distributions and what you can achieve together with such a Working Group.  
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:28:49</itunes:duration>
    </item>
    <item>
      <title>A new distribution openSUSE Leap Micro (osc22)</title>
      <link>https://media.ccc.de/v/3694-a-new-distribution-opensuse-leap-micro</link>
      <description>openSUSE Leap Micro is a new distribution based on SUSE Linux Enterprise Micro with the main purpose to be a host-os with minimal footprint which fits well the app-centric world.  

A small foot print, focus on the EDGE as well as data center, containerization and virtual machines, whatever flies your app. Leap Micro has a 6 months release cycle with support lasting until the next release or up to 4 years of support with a migration to SLE Micro. 

openSUSE Leap Micro is a new distribution based on SUSE Linux Enterprise Micro with the main purpose to be a host-os with minimal footprint which fits well the app-centric world.  

A small foot print, focus on the EDGE as well as data center, containerization and virtual machines, whatever flies your app. Leap Micro has a 6 months release cycle with support lasting until the next release or up to 4 years of support with a migration to SLE Micro. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3694-eng-A_new_distribution_openSUSE_Leap_Micro_sd.mp4"
        length="28311552"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 17:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3694-eng-A_new_distribution_openSUSE_Leap_Micro_sd.mp4?1686899491</guid>
      <dc:identifier>gmJclEgp0JCL8YmrV-gusw</dc:identifier>
      <dc:date>2022-06-03T17:00:00+02:00</dc:date>
      <itunes:author>Lubos Kocman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3694, 2022, openSUSE</itunes:keywords>
      <itunes:summary>openSUSE Leap Micro is a new distribution based on SUSE Linux Enterprise Micro with the main purpose to be a host-os with minimal footprint which fits well the app-centric world.  

A small foot print, focus on the EDGE as well as data center, containerization and virtual machines, whatever flies your app. Leap Micro has a 6 months release cycle with support lasting until the next release or up to 4 years of support with a migration to SLE Micro. 

openSUSE Leap Micro is a new distribution based on SUSE Linux Enterprise Micro with the main purpose to be a host-os with minimal footprint which fits well the app-centric world.  

A small foot print, focus on the EDGE as well as data center, containerization and virtual machines, whatever flies your app. Leap Micro has a 6 months release cycle with support lasting until the next release or up to 4 years of support with a migration to SLE Micro. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:18:52</itunes:duration>
    </item>
    <item>
      <title>ALP Roast - An open discussion with the ALP Steering Committee (osc22)</title>
      <link>https://media.ccc.de/v/3883-alp-roast-an-open-discussion-with-the-alp-steering-committee</link>
      <description>Ask your questions about the new Adaptable Linux Platform. This will be a discussion format with the ALP steering committee. Get all the answers about the next generation product line in this open format discussion.

Ask your questions about the new Adaptable Linux Platform. This will be a discussion format with the ALP steering committee. Get all the answers about the next generation product line in this open format discussion.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3883-eng-ALP_Roast_-_An_open_discussion_with_the_ALP_Steering_Committee_sd.mp4"
        length="111149056"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 13:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3883-eng-ALP_Roast_-_An_open_discussion_with_the_ALP_Steering_Committee_sd.mp4?1686894305</guid>
      <dc:identifier>N16ULuPQGSmFHpxN0YWyKQ</dc:identifier>
      <dc:date>2022-06-03T13:00:00+02:00</dc:date>
      <itunes:author>Douglas DeMaio</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3883, 2022, openSUSE</itunes:keywords>
      <itunes:summary>Ask your questions about the new Adaptable Linux Platform. This will be a discussion format with the ALP steering committee. Get all the answers about the next generation product line in this open format discussion.

Ask your questions about the new Adaptable Linux Platform. This will be a discussion format with the ALP steering committee. Get all the answers about the next generation product line in this open format discussion.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:40:49</itunes:duration>
    </item>
    <item>
      <title>Speedy Distro Porting via the cpu Command (osc22)</title>
      <link>https://media.ccc.de/v/3802-speedy-distro-porting-via-the-cpu-command</link>
      <description>Last year, I ported [oreboot](https://github.com/oreboot) to the Allwinner D1
SoC that is found on the Nezha SBC and many other boards now. For a boot loader
environment, I chose to embed [LinuxBoot](https://linuxboot.org), and then
partitioned an SD card with two root filesystems for testing: OpenWrt, which is
small and just ran right away, and openSUSE, which required some extra effort.
I was happy to see a new D1 board advertised with openSUSE support, though the
process of getting there was tedious enough that I wanted to find an improvement
to the workflow.

In this talk, I will recap how I modified the openSUSE RISC-V root filesystem,
moving an SD card back and forth, and showcase a faster approach instead by
leveraging the [`cpu`](https://github.com/u-root/cpu) command that lets us do
that iteration over the network. Eventually, we will see how that can be
leveraged to continuously test Tumbleweed on real hardware through OpenQA and a
corresponding setup, which can also be applied to other hardware, such as ARM. 

Last year, I ported [oreboot](https://github.com/oreboot) to the Allwinner D1
SoC that is found on the Nezha SBC and many other boards now. For a boot loader
environment, I chose to embed [LinuxBoot](https://linuxboot.org), and then
partitioned an SD card with two root filesystems for testing: OpenWrt, which is
small and just ran right away, and openSUSE, which required some extra effort.
I was happy to see a new D1 board advertised with openSUSE support, though the
process of getting there was tedious enough that I wanted to find an improvement
to the workflow.

In this talk, I will recap how I modified the openSUSE RISC-V root filesystem,
moving an SD card back and forth, and showcase a faster approach instead by
leveraging the [`cpu`](https://github.com/u-root/cpu) command that lets us do
that iteration over the network. Eventually, we will see how that can be
leveraged to continuously test Tumbleweed on real hardware through OpenQA and a
corresponding setup, which can also be applied to other hardware, such as ARM. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3802-eng-Speedy_Distro_Porting_via_the_cpu_Command_sd.mp4"
        length="30408704"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 12:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3802-eng-Speedy_Distro_Porting_via_the_cpu_Command_sd.mp4?1686883863</guid>
      <dc:identifier>twjaYLfC9k1rsdz-QRm1SQ</dc:identifier>
      <dc:date>2022-06-03T12:30:00+02:00</dc:date>
      <itunes:author>Daniel Maslowski</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3802, 2022, New Technologies</itunes:keywords>
      <itunes:summary>Last year, I ported [oreboot](https://github.com/oreboot) to the Allwinner D1
SoC that is found on the Nezha SBC and many other boards now. For a boot loader
environment, I chose to embed [LinuxBoot](https://linuxboot.org), and then
partitioned an SD card with two root filesystems for testing: OpenWrt, which is
small and just ran right away, and openSUSE, which required some extra effort.
I was happy to see a new D1 board advertised with openSUSE support, though the
process of getting there was tedious enough that I wanted to find an improvement
to the workflow.

In this talk, I will recap how I modified the openSUSE RISC-V root filesystem,
moving an SD card back and forth, and showcase a faster approach instead by
leveraging the [`cpu`](https://github.com/u-root/cpu) command that lets us do
that iteration over the network. Eventually, we will see how that can be
leveraged to continuously test Tumbleweed on real hardware through OpenQA and a
corresponding setup, which can also be applied to other hardware, such as ARM. 

Last year, I ported [oreboot](https://github.com/oreboot) to the Allwinner D1
SoC that is found on the Nezha SBC and many other boards now. For a boot loader
environment, I chose to embed [LinuxBoot](https://linuxboot.org), and then
partitioned an SD card with two root filesystems for testing: OpenWrt, which is
small and just ran right away, and openSUSE, which required some extra effort.
I was happy to see a new D1 board advertised with openSUSE support, though the
process of getting there was tedious enough that I wanted to find an improvement
to the workflow.

In this talk, I will recap how I modified the openSUSE RISC-V root filesystem,
moving an SD card back and forth, and showcase a faster approach instead by
leveraging the [`cpu`](https://github.com/u-root/cpu) command that lets us do
that iteration over the network. Eventually, we will see how that can be
leveraged to continuously test Tumbleweed on real hardware through OpenQA and a
corresponding setup, which can also be applied to other hardware, such as ARM. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:38</itunes:duration>
    </item>
    <item>
      <title>Leap is dead - We need a new development model (osc22)</title>
      <link>https://media.ccc.de/v/3773-leap-is-dead-we-need-a-new-development-model</link>
      <description>The development model for the classic release distribution of openSUSE - Leap - has changed several times. Currently it shares the binaries with SUSE SLE.
This has advantages, but as well limitations.
The talk explains how the development model has evolved and its current pitfalls. In the second part we will introduce the Adaptable Linux Platform (ALP) and discuss the current state of development

The development model for the classic release distribution of openSUSE - Leap - has changed several times. Currently it shares the binaries with SUSE SLE.
This has advantages, but as well limitations.
The talk explains how the development model has evolved and its current pitfalls. In the second part we will introduce the Adaptable Linux Platform (ALP) and discuss the current state of development
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3773-eng-Leap_is_dead_-_We_need_a_new_development_model_sd.mp4"
        length="39845888"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 12:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3773-eng-Leap_is_dead_-_We_need_a_new_development_model_sd.mp4?1686884523</guid>
      <dc:identifier>iIVPisduwdbUIo0tVahrxA</dc:identifier>
      <dc:date>2022-06-03T12:30:00+02:00</dc:date>
      <itunes:author>Axel Braun</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3773, 2022, openSUSE</itunes:keywords>
      <itunes:summary>The development model for the classic release distribution of openSUSE - Leap - has changed several times. Currently it shares the binaries with SUSE SLE.
This has advantages, but as well limitations.
The talk explains how the development model has evolved and its current pitfalls. In the second part we will introduce the Adaptable Linux Platform (ALP) and discuss the current state of development

The development model for the classic release distribution of openSUSE - Leap - has changed several times. Currently it shares the binaries with SUSE SLE.
This has advantages, but as well limitations.
The talk explains how the development model has evolved and its current pitfalls. In the second part we will introduce the Adaptable Linux Platform (ALP) and discuss the current state of development
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:27:09</itunes:duration>
    </item>
    <item>
      <title>Put all your IoT boot management in one place -- the centre (osc22)</title>
      <link>https://media.ccc.de/v/3764-put-all-your-iot-boot-management-in-one-place-the-centre</link>
      <description>centre is a simple Go program (github.com/https://github.com/Harvey-OS/go/tree/main/cmd/centre), which runs as a daemon or interactive program and lets you manage all your IoT devices with one file -- formatted like /etc/hosts.  centre was originally written for Plan 9 networks, but is becoming widely used for many other Oses.  

Like many of us,  I have a house full of IoT and server systems, some running Plan 9, some Linux, and all of which need DHCP, TFTP, HTTP, and 9P boot services. Over the years, I&#39;ve had my fun with various DHCP daemons, TFTP and HTTP boot servers, and 9p servers for Plan 9. All of these needed configuration files in all kinds of formats, and all had lots of ways to fail with each new upgrade. 

centre removes these headaches. With just one program, one directory, and one configuration file, all the services you need are managed by the centre. In this talk, I&#39;ll go over what it is, how to set it up, and how it works.

centre is a simple Go program (github.com/https://github.com/Harvey-OS/go/tree/main/cmd/centre), which runs as a daemon or interactive program and lets you manage all your IoT devices with one file -- formatted like /etc/hosts.  centre was originally written for Plan 9 networks, but is becoming widely used for many other Oses.  

Like many of us,  I have a house full of IoT and server systems, some running Plan 9, some Linux, and all of which need DHCP, TFTP, HTTP, and 9P boot services. Over the years, I&#39;ve had my fun with various DHCP daemons, TFTP and HTTP boot servers, and 9p servers for Plan 9. All of these needed configuration files in all kinds of formats, and all had lots of ways to fail with each new upgrade. 

centre removes these headaches. With just one program, one directory, and one configuration file, all the services you need are managed by the centre. In this talk, I&#39;ll go over what it is, how to set it up, and how it works.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3764-eng-Put_all_your_IoT_boot_management_in_one_place_--_the_centre_sd.mp4"
        length="28311552"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 12:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3764-eng-Put_all_your_IoT_boot_management_in_one_place_--_the_centre_sd.mp4?1686879552</guid>
      <dc:identifier>moZXQzDw63pSo4eXGuprJA</dc:identifier>
      <dc:date>2022-06-03T12:00:00+02:00</dc:date>
      <itunes:author>rminnich</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3764, 2022, Embedded Systems and Edge Computing</itunes:keywords>
      <itunes:subtitle>Are you sick of editing 8 files, and loading 5 daemons, for your network boots? Do you not care what a DHCP lease is? This one program can manage all aspects of IoT.</itunes:subtitle>
      <itunes:summary>centre is a simple Go program (github.com/https://github.com/Harvey-OS/go/tree/main/cmd/centre), which runs as a daemon or interactive program and lets you manage all your IoT devices with one file -- formatted like /etc/hosts.  centre was originally written for Plan 9 networks, but is becoming widely used for many other Oses.  

Like many of us,  I have a house full of IoT and server systems, some running Plan 9, some Linux, and all of which need DHCP, TFTP, HTTP, and 9P boot services. Over the years, I&#39;ve had my fun with various DHCP daemons, TFTP and HTTP boot servers, and 9p servers for Plan 9. All of these needed configuration files in all kinds of formats, and all had lots of ways to fail with each new upgrade. 

centre removes these headaches. With just one program, one directory, and one configuration file, all the services you need are managed by the centre. In this talk, I&#39;ll go over what it is, how to set it up, and how it works.

centre is a simple Go program (github.com/https://github.com/Harvey-OS/go/tree/main/cmd/centre), which runs as a daemon or interactive program and lets you manage all your IoT devices with one file -- formatted like /etc/hosts.  centre was originally written for Plan 9 networks, but is becoming widely used for many other Oses.  

Like many of us,  I have a house full of IoT and server systems, some running Plan 9, some Linux, and all of which need DHCP, TFTP, HTTP, and 9P boot services. Over the years, I&#39;ve had my fun with various DHCP daemons, TFTP and HTTP boot servers, and 9p servers for Plan 9. All of these needed configuration files in all kinds of formats, and all had lots of ways to fail with each new upgrade. 

centre removes these headaches. With just one program, one directory, and one configuration file, all the services you need are managed by the centre. In this talk, I&#39;ll go over what it is, how to set it up, and how it works.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:49</itunes:duration>
    </item>
    <item>
      <title>DNS (osc22)</title>
      <link>https://media.ccc.de/v/3862-dns</link>
      <description>DNS is at the heart of the network. Without it, we are hopelessly lost. We can&#39;t even google for it. It allows us humans to map the network into the human domain and vice-versa. Yet we ignore it as unimportant part of network security fabric and allow individual unnamed corporation to control over 20% the internet lookups, because they are not evil. 

This presentation should serve as a quick survey of DNS technologies from basic overview of how DNS works, to DoT, DoH, and DNScrypt. Finally we cover DNSSEC and reasons we should stop ignoring it if we want a trustworthy and resilient infrastructure. Finally we will cover why running your own DNS server should be the first thing you do to secure your own networks.

Fun Fact: pdns-recursor in openSUSE is DNSSEC validating by default for half a decade already


DNS is at the heart of the network. Without it, we are hopelessly lost. We can&#39;t even google for it. It allows us humans to map the network into the human domain and vice-versa. Yet we ignore it as unimportant part of network security fabric and allow individual unnamed corporation to control over 20% the internet lookups, because they are not evil. 

This presentation should serve as a quick survey of DNS technologies from basic overview of how DNS works, to DoT, DoH, and DNScrypt. Finally we cover DNSSEC and reasons we should stop ignoring it if we want a trustworthy and resilient infrastructure. Finally we will cover why running your own DNS server should be the first thing you do to secure your own networks.

Fun Fact: pdns-recursor in openSUSE is DNSSEC validating by default for half a decade already

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3862-eng-DNS_sd.mp4"
        length="35651584"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 12:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3862-eng-DNS_sd.mp4?1686877935</guid>
      <dc:identifier>KsipWzrDRfKlylRITwMPSg</dc:identifier>
      <dc:date>2022-06-03T12:00:00+02:00</dc:date>
      <itunes:author>Adam Majer</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3862, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>A distributed directory that runs the Internet </itunes:subtitle>
      <itunes:summary>DNS is at the heart of the network. Without it, we are hopelessly lost. We can&#39;t even google for it. It allows us humans to map the network into the human domain and vice-versa. Yet we ignore it as unimportant part of network security fabric and allow individual unnamed corporation to control over 20% the internet lookups, because they are not evil. 

This presentation should serve as a quick survey of DNS technologies from basic overview of how DNS works, to DoT, DoH, and DNScrypt. Finally we cover DNSSEC and reasons we should stop ignoring it if we want a trustworthy and resilient infrastructure. Finally we will cover why running your own DNS server should be the first thing you do to secure your own networks.

Fun Fact: pdns-recursor in openSUSE is DNSSEC validating by default for half a decade already


DNS is at the heart of the network. Without it, we are hopelessly lost. We can&#39;t even google for it. It allows us humans to map the network into the human domain and vice-versa. Yet we ignore it as unimportant part of network security fabric and allow individual unnamed corporation to control over 20% the internet lookups, because they are not evil. 

This presentation should serve as a quick survey of DNS technologies from basic overview of how DNS works, to DoT, DoH, and DNScrypt. Finally we cover DNSSEC and reasons we should stop ignoring it if we want a trustworthy and resilient infrastructure. Finally we will cover why running your own DNS server should be the first thing you do to secure your own networks.

Fun Fact: pdns-recursor in openSUSE is DNSSEC validating by default for half a decade already

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:36</itunes:duration>
    </item>
    <item>
      <title>Will my hardware work with openSUSE? (osc22)</title>
      <link>https://media.ccc.de/v/3719-will-my-hardware-work-with-opensuse</link>
      <description>You&#39;re shopping for new hardware, but you&#39;re not sure if it will be supported by openSUSE?

This talk explains some basics on how hardware support works and what ways you have to find out if your hardware is supported or not. After 17 years of Linux hardware compatibility testing and hardware certification I can tell some good advice.  


You&#39;re shopping for new hardware, but you&#39;re not sure if it will be supported by openSUSE?

This talk explains some basics on how hardware support works and what ways you have to find out if your hardware is supported or not. After 17 years of Linux hardware compatibility testing and hardware certification I can tell some good advice.  

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3719-eng-Will_my_hardware_work_with_openSUSE_sd.mp4"
        length="46137344"
        type="video/mp4"/>
      <pubDate>Fri, 03 Jun 2022 11:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3719-eng-Will_my_hardware_work_with_openSUSE_sd.mp4?1686874465</guid>
      <dc:identifier>jIxzW8zqRMmTzOy4IYH42g</dc:identifier>
      <dc:date>2022-06-03T11:30:00+02:00</dc:date>
      <itunes:author>rainerkoenig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3719, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>Don&#39;t be afraid of the kernel </itunes:subtitle>
      <itunes:summary>You&#39;re shopping for new hardware, but you&#39;re not sure if it will be supported by openSUSE?

This talk explains some basics on how hardware support works and what ways you have to find out if your hardware is supported or not. After 17 years of Linux hardware compatibility testing and hardware certification I can tell some good advice.  


You&#39;re shopping for new hardware, but you&#39;re not sure if it will be supported by openSUSE?

This talk explains some basics on how hardware support works and what ways you have to find out if your hardware is supported or not. After 17 years of Linux hardware compatibility testing and hardware certification I can tell some good advice.  

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:31:45</itunes:duration>
    </item>
    <item>
      <title>Shortening the feedback loops between R&amp;D and the real world with openSUSE and openQA (osc22)</title>
      <link>https://media.ccc.de/v/3820-shortening-the-feedback-loops-between-r-d-and-the-real-world-with-opensuse-and-openqa</link>
      <description>At SUSE, and openSUSE we have short feedback loops to ensure compliance with a range of certifications, but our tools can have real world impact beyond the physical barriers, I will talk about how openQA can support operations in Healthcare, Manufacturing, Automotive, Edge, Transportation, and Elections.


At SUSE, and openSUSE we have short feedback loops to ensure compliance with a range of certifications, but our tools can have real world impact beyond the physical barriers, I will talk about how openQA can support operations in Healthcare, Manufacturing, Automotive, Edge, Transportation, and Elections.

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3820-eng-Shortening_the_feedback_loops_between_R_D_and_the_real_world_with_openSUSE_and_openQA_sd.mp4"
        length="68157440"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 20:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3820-eng-Shortening_the_feedback_loops_between_R_D_and_the_real_world_with_openSUSE_and_openQA_sd.mp4?1686869281</guid>
      <dc:identifier>WdqH-rMTs__Kjx2DuoP3NA</dc:identifier>
      <dc:date>2022-06-02T20:00:00+02:00</dc:date>
      <itunes:author>Santiago Zarate</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3820, 2022, Open Source</itunes:keywords>
      <itunes:summary>At SUSE, and openSUSE we have short feedback loops to ensure compliance with a range of certifications, but our tools can have real world impact beyond the physical barriers, I will talk about how openQA can support operations in Healthcare, Manufacturing, Automotive, Edge, Transportation, and Elections.


At SUSE, and openSUSE we have short feedback loops to ensure compliance with a range of certifications, but our tools can have real world impact beyond the physical barriers, I will talk about how openQA can support operations in Healthcare, Manufacturing, Automotive, Edge, Transportation, and Elections.

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:49</itunes:duration>
    </item>
    <item>
      <title>(open)SUSE Product security (osc22)</title>
      <link>https://media.ccc.de/v/3838-open-suse-product-security</link>
      <description>This talk will introduce the SUSE Product Security team, who handles the
software security processes for openSUSE and also SUSE Linux Enterprise.

The SUSE Product Security work is split into &quot;reactive&quot; and &quot;proactive&quot;
areas and engineering groups these days. 

Reactive work refering to what is traditionally known as &quot;security
incident response&quot;, while proactive refers to security audits, design
reviews and related areas of secure software development.

The talk will focus on the reactive side, giving statistics, and talk
about some highlights from the last year.

Also bringing a small overview over how closing the leap gap changes
affects the openSUSE Maintenance process.

This talk will introduce the SUSE Product Security team, who handles the
software security processes for openSUSE and also SUSE Linux Enterprise.

The SUSE Product Security work is split into &quot;reactive&quot; and &quot;proactive&quot;
areas and engineering groups these days. 

Reactive work refering to what is traditionally known as &quot;security
incident response&quot;, while proactive refers to security audits, design
reviews and related areas of secure software development.

The talk will focus on the reactive side, giving statistics, and talk
about some highlights from the last year.

Also bringing a small overview over how closing the leap gap changes
affects the openSUSE Maintenance process.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3838-eng-open_SUSE_Product_security_sd.mp4"
        length="50331648"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 17:15:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3838-eng-open_SUSE_Product_security_sd.mp4?1686864401</guid>
      <dc:identifier>mnZ81NZMB4i3k2XBpojqRg</dc:identifier>
      <dc:date>2022-06-02T17:15:00+02:00</dc:date>
      <itunes:author>Marcus Meissner</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3838, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>a short overview</itunes:subtitle>
      <itunes:summary>This talk will introduce the SUSE Product Security team, who handles the
software security processes for openSUSE and also SUSE Linux Enterprise.

The SUSE Product Security work is split into &quot;reactive&quot; and &quot;proactive&quot;
areas and engineering groups these days. 

Reactive work refering to what is traditionally known as &quot;security
incident response&quot;, while proactive refers to security audits, design
reviews and related areas of secure software development.

The talk will focus on the reactive side, giving statistics, and talk
about some highlights from the last year.

Also bringing a small overview over how closing the leap gap changes
affects the openSUSE Maintenance process.

This talk will introduce the SUSE Product Security team, who handles the
software security processes for openSUSE and also SUSE Linux Enterprise.

The SUSE Product Security work is split into &quot;reactive&quot; and &quot;proactive&quot;
areas and engineering groups these days. 

Reactive work refering to what is traditionally known as &quot;security
incident response&quot;, while proactive refers to security audits, design
reviews and related areas of secure software development.

The talk will focus on the reactive side, giving statistics, and talk
about some highlights from the last year.

Also bringing a small overview over how closing the leap gap changes
affects the openSUSE Maintenance process.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:34:03</itunes:duration>
    </item>
    <item>
      <title>HPC deployment with warewulf4 (osc22)</title>
      <link>https://media.ccc.de/v/3784-hpc-deployment-with-warewulf4</link>
      <description>warewulf4 is a rewrite of the well known warewulf cluster management tool in golang. With this new iteration its possible to leverage the possibilities which emerged with broad use of containers. The origins of warewulf4 is the hpcng community which is/was also behind projects like Apptainer (former known as Singularity), Centos and Rocky linux.
A basic setup of a HPC cluster and the key concept of the configuration mechanism of warewulf4 are covered in this talk. 

warewulf4 is a rewrite of the well known warewulf cluster management tool in golang. With this new iteration its possible to leverage the possibilities which emerged with broad use of containers. The origins of warewulf4 is the hpcng community which is/was also behind projects like Apptainer (former known as Singularity), Centos and Rocky linux.
A basic setup of a HPC cluster and the key concept of the configuration mechanism of warewulf4 are covered in this talk. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3784-eng-HPC_deployment_with_warewulf4_sd.mp4"
        length="27262976"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 17:15:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3784-eng-HPC_deployment_with_warewulf4_sd.mp4?1686864504</guid>
      <dc:identifier>8dTtPUa_5axEFzrkTXLCFg</dc:identifier>
      <dc:date>2022-06-02T17:15:00+02:00</dc:date>
      <itunes:author>mslacken</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3784, 2022, New Technologies</itunes:keywords>
      <itunes:subtitle>Get HPC cluster installed in minutes</itunes:subtitle>
      <itunes:summary>warewulf4 is a rewrite of the well known warewulf cluster management tool in golang. With this new iteration its possible to leverage the possibilities which emerged with broad use of containers. The origins of warewulf4 is the hpcng community which is/was also behind projects like Apptainer (former known as Singularity), Centos and Rocky linux.
A basic setup of a HPC cluster and the key concept of the configuration mechanism of warewulf4 are covered in this talk. 

warewulf4 is a rewrite of the well known warewulf cluster management tool in golang. With this new iteration its possible to leverage the possibilities which emerged with broad use of containers. The origins of warewulf4 is the hpcng community which is/was also behind projects like Apptainer (former known as Singularity), Centos and Rocky linux.
A basic setup of a HPC cluster and the key concept of the configuration mechanism of warewulf4 are covered in this talk. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:17:49</itunes:duration>
    </item>
    <item>
      <title>Remote Attestation in MicroOS (osc22)</title>
      <link>https://media.ccc.de/v/3710-remote-attestation-in-microos</link>
      <description>Recently MicroOS can be installed with remote attestation, using the TPM as a root of trust and Keylime as a service to report and verify the status of our systems.

In this talk we will see what is a TPM, how Keylime can be installed in MicroOS and used to monitor the health of our system in production and what to do when we detect a compromised system.

Recently MicroOS can be installed with remote attestation, using the TPM as a root of trust and Keylime as a service to report and verify the status of our systems.

In this talk we will see what is a TPM, how Keylime can be installed in MicroOS and used to monitor the health of our system in production and what to do when we detect a compromised system.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3710-eng-Remote_Attestation_in_MicroOS_sd.mp4"
        length="50331648"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 16:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3710-eng-Remote_Attestation_in_MicroOS_sd.mp4?1686862112</guid>
      <dc:identifier>bNE2PlcQ8OoE86-MbviU_Q</dc:identifier>
      <dc:date>2022-06-02T16:30:00+02:00</dc:date>
      <itunes:author>Alberto Planas</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3710, 2022, New Technologies</itunes:keywords>
      <itunes:subtitle>Measuring the health of our system with a TPM</itunes:subtitle>
      <itunes:summary>Recently MicroOS can be installed with remote attestation, using the TPM as a root of trust and Keylime as a service to report and verify the status of our systems.

In this talk we will see what is a TPM, how Keylime can be installed in MicroOS and used to monitor the health of our system in production and what to do when we detect a compromised system.

Recently MicroOS can be installed with remote attestation, using the TPM as a root of trust and Keylime as a service to report and verify the status of our systems.

In this talk we will see what is a TPM, how Keylime can be installed in MicroOS and used to monitor the health of our system in production and what to do when we detect a compromised system.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:35:08</itunes:duration>
    </item>
    <item>
      <title>The SUSE QE Tools team - Who we are and what we do (osc22)</title>
      <link>https://media.ccc.de/v/3752-the-suse-qe-tools-team-who-we-are-and-what-we-do</link>
      <description>The SUSE QE Tools Team - Who we are and what we are doing.

This talk will give an overview of who is the SUSE QE Tools team, what is in our responsibility, what we did in the past time and what we do. The products that we care about will be presented and the workflows of the team will be shown. Opportunities for contributions will be discussed.

https://v.gd/okurz_osc22

The SUSE QE Tools Team - Who we are and what we are doing.

This talk will give an overview of who is the SUSE QE Tools team, what is in our responsibility, what we did in the past time and what we do. The products that we care about will be presented and the workflows of the team will be shown. Opportunities for contributions will be discussed.

https://v.gd/okurz_osc22
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3752-eng-The_SUSE_QE_Tools_team_-_Who_we_are_and_what_we_do_sd.mp4"
        length="32505856"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 15:45:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3752-eng-The_SUSE_QE_Tools_team_-_Who_we_are_and_what_we_do_sd.mp4?1686855931</guid>
      <dc:identifier>wb7mK5IEl8920hEMxiMfYA</dc:identifier>
      <dc:date>2022-06-02T15:45:00+02:00</dc:date>
      <itunes:author>Oliver Kurz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3752, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>https://v.gd/okurz_osc22</itunes:subtitle>
      <itunes:summary>The SUSE QE Tools Team - Who we are and what we are doing.

This talk will give an overview of who is the SUSE QE Tools team, what is in our responsibility, what we did in the past time and what we do. The products that we care about will be presented and the workflows of the team will be shown. Opportunities for contributions will be discussed.

https://v.gd/okurz_osc22

The SUSE QE Tools Team - Who we are and what we are doing.

This talk will give an overview of who is the SUSE QE Tools team, what is in our responsibility, what we did in the past time and what we do. The products that we care about will be presented and the workflows of the team will be shown. Opportunities for contributions will be discussed.

https://v.gd/okurz_osc22
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:21:39</itunes:duration>
    </item>
    <item>
      <title>SLE BCI: Container Images for development and production (osc22)</title>
      <link>https://media.ccc.de/v/3688-sle-bci-container-images-for-development-and-production</link>
      <description>The SLE Base Container Images (BCI) want to create a flexible developer experience that provides, integrates with, and supports language native tools and workflows by offering a self-contained environment targeting a specific version of any given programming language ecosystem to facilitate software development, testing and deployment.​ These images are meant to run on any Linux and K8s distributions, are freely redistributable and come with a pre-configured repository offering the same enterprise grade packages shipped by SUSE flagship product SUSE Linux Enterprise Server. The freely available repository offers a lighter set of packages carefully cherry-picked from the official SLES repositories, however it is possible to push an already purchased SLES subscription to these images hence having access to the full universe of packages available. 


The SLE Base Container Images (BCI) want to create a flexible developer experience that provides, integrates with, and supports language native tools and workflows by offering a self-contained environment targeting a specific version of any given programming language ecosystem to facilitate software development, testing and deployment.​ These images are meant to run on any Linux and K8s distributions, are freely redistributable and come with a pre-configured repository offering the same enterprise grade packages shipped by SUSE flagship product SUSE Linux Enterprise Server. The freely available repository offers a lighter set of packages carefully cherry-picked from the official SLES repositories, however it is possible to push an already purchased SLES subscription to these images hence having access to the full universe of packages available. 

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3688-eng-SLE_BCI_Container_Images_for_development_and_production_sd.mp4"
        length="45088768"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 15:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3688-eng-SLE_BCI_Container_Images_for_development_and_production_sd.mp4?1686853126</guid>
      <dc:identifier>7143itZrfkOD8BYi4Vh2dg</dc:identifier>
      <dc:date>2022-06-02T15:30:00+02:00</dc:date>
      <itunes:author>Alexander Herzig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3688, 2022, Cloud and Containers</itunes:keywords>
      <itunes:summary>The SLE Base Container Images (BCI) want to create a flexible developer experience that provides, integrates with, and supports language native tools and workflows by offering a self-contained environment targeting a specific version of any given programming language ecosystem to facilitate software development, testing and deployment.​ These images are meant to run on any Linux and K8s distributions, are freely redistributable and come with a pre-configured repository offering the same enterprise grade packages shipped by SUSE flagship product SUSE Linux Enterprise Server. The freely available repository offers a lighter set of packages carefully cherry-picked from the official SLES repositories, however it is possible to push an already purchased SLES subscription to these images hence having access to the full universe of packages available. 


The SLE Base Container Images (BCI) want to create a flexible developer experience that provides, integrates with, and supports language native tools and workflows by offering a self-contained environment targeting a specific version of any given programming language ecosystem to facilitate software development, testing and deployment.​ These images are meant to run on any Linux and K8s distributions, are freely redistributable and come with a pre-configured repository offering the same enterprise grade packages shipped by SUSE flagship product SUSE Linux Enterprise Server. The freely available repository offers a lighter set of packages carefully cherry-picked from the official SLES repositories, however it is possible to push an already purchased SLES subscription to these images hence having access to the full universe of packages available. 

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:32:09</itunes:duration>
    </item>
    <item>
      <title>Security for (not only openSUSE) developers (osc22)</title>
      <link>https://media.ccc.de/v/3728-security-for-not-only-opensuse-developers</link>
      <description>General security recommendations for openSUSE developers. This includes specific recommendations on how to package software in a more secure ways and how to create a developer setup that is secure. For this we will shed some light on the specific challenges and quirks of the tool chains we use and how they relate to security. 


General security recommendations for openSUSE developers. This includes specific recommendations on how to package software in a more secure ways and how to create a developer setup that is secure. For this we will shed some light on the specific challenges and quirks of the tool chains we use and how they relate to security. 

about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3728-eng-Security_for_not_only_openSUSE_developers_sd.mp4"
        length="50331648"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 15:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3728-eng-Security_for_not_only_openSUSE_developers_sd.mp4?1686849154</guid>
      <dc:identifier>tWbuwzulrFQ9-t8aSkIgbQ</dc:identifier>
      <dc:date>2022-06-02T15:00:00+02:00</dc:date>
      <itunes:author>Johannes Segitz</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3728, 2022, Open Source</itunes:keywords>
      <itunes:summary>General security recommendations for openSUSE developers. This includes specific recommendations on how to package software in a more secure ways and how to create a developer setup that is secure. For this we will shed some light on the specific challenges and quirks of the tool chains we use and how they relate to security. 


General security recommendations for openSUSE developers. This includes specific recommendations on how to package software in a more secure ways and how to create a developer setup that is secure. For this we will shed some light on the specific challenges and quirks of the tool chains we use and how they relate to security. 

about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:34:56</itunes:duration>
    </item>
    <item>
      <title>Reporting bugs for openSUSE Leap (osc22)</title>
      <link>https://media.ccc.de/v/3761-reporting-bugs-for-opensuse-leap</link>
      <description>The way how we build openSUSE Leap has changed, so did the way how we report issues against it. This lightning talk will show you how to correctly report bugs for openSUSE Leap.

https://en.opensuse.org/openSUSE:Submitting_bug_reports 

The way how we build openSUSE Leap has changed, so did the way how we report issues against it. This lightning talk will show you how to correctly report bugs for openSUSE Leap.

https://en.opensuse.org/openSUSE:Submitting_bug_reports 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3761-eng-Reporting_bugs_for_openSUSE_Leap_sd.mp4"
        length="14680064"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 14:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3761-eng-Reporting_bugs_for_openSUSE_Leap_sd.mp4?1686847073</guid>
      <dc:identifier>8HtHgjhfa8B0WsiS3Dic-w</dc:identifier>
      <dc:date>2022-06-02T14:00:00+02:00</dc:date>
      <itunes:author>Lubos Kocman</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3761, 2022, openSUSE</itunes:keywords>
      <itunes:summary>The way how we build openSUSE Leap has changed, so did the way how we report issues against it. This lightning talk will show you how to correctly report bugs for openSUSE Leap.

https://en.opensuse.org/openSUSE:Submitting_bug_reports 

The way how we build openSUSE Leap has changed, so did the way how we report issues against it. This lightning talk will show you how to correctly report bugs for openSUSE Leap.

https://en.opensuse.org/openSUSE:Submitting_bug_reports 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:10:03</itunes:duration>
    </item>
    <item>
      <title>openSUSEway status, running other platforms (osc22)</title>
      <link>https://media.ccc.de/v/3793-opensuseway-status-running-other-platforms</link>
      <description>Whats up with openSUSEway? Current status.  
Sharing the results of running openSUSEway/sway on openSUSE MicroOS Desktop and Fedora. 

https://denisok.github.io/oSC/oSC22-openSUSEway.html

Whats up with openSUSEway? Current status.  
Sharing the results of running openSUSEway/sway on openSUSE MicroOS Desktop and Fedora. 

https://denisok.github.io/oSC/oSC22-openSUSEway.html
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3793-eng-openSUSEway_status_running_other_platforms_sd.mp4"
        length="16777216"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 13:50:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3793-eng-openSUSEway_status_running_other_platforms_sd.mp4?1686847019</guid>
      <dc:identifier>uSCesvyU3X11HmXkv5GlVQ</dc:identifier>
      <dc:date>2022-06-02T13:50:00+02:00</dc:date>
      <itunes:author>Denys Kondratenko</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3793, 2022, openSUSE</itunes:keywords>
      <itunes:subtitle>sway tilling window manager</itunes:subtitle>
      <itunes:summary>Whats up with openSUSEway? Current status.  
Sharing the results of running openSUSEway/sway on openSUSE MicroOS Desktop and Fedora. 

https://denisok.github.io/oSC/oSC22-openSUSEway.html

Whats up with openSUSEway? Current status.  
Sharing the results of running openSUSEway/sway on openSUSE MicroOS Desktop and Fedora. 

https://denisok.github.io/oSC/oSC22-openSUSEway.html
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:11:20</itunes:duration>
    </item>
    <item>
      <title>The year of the Linux desktop (osc22)</title>
      <link>https://media.ccc.de/v/3716-the-year-of-the-linux-desktop</link>
      <description>Since long every year is announced to be the &quot;year of the Linux desktop&quot;, and every year there is no real breakthrough.  

In this talk I will look at some reasons why there is no breakthrough yet. 

**About me:** Software developer, 25+ years Linux. I was the person responsible for Linux on the Desktop at the last European PC manufacturer (Fujtsu) for 17 years and can tell from my own experience why Linux on the desktop is an ongoing struggle. 

Since long every year is announced to be the &quot;year of the Linux desktop&quot;, and every year there is no real breakthrough.  

In this talk I will look at some reasons why there is no breakthrough yet. 

**About me:** Software developer, 25+ years Linux. I was the person responsible for Linux on the Desktop at the last European PC manufacturer (Fujtsu) for 17 years and can tell from my own experience why Linux on the desktop is an ongoing struggle. 
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3716-eng-The_year_of_the_Linux_desktop_sd.mp4"
        length="55574528"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 13:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3716-eng-The_year_of_the_Linux_desktop_sd.mp4?1686842325</guid>
      <dc:identifier>ZBzc32enRQV86YjW2tfNTw</dc:identifier>
      <dc:date>2022-06-02T13:00:00+02:00</dc:date>
      <itunes:author>rainerkoenig</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3716, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>Why are we still waiting for the breakthrough?</itunes:subtitle>
      <itunes:summary>Since long every year is announced to be the &quot;year of the Linux desktop&quot;, and every year there is no real breakthrough.  

In this talk I will look at some reasons why there is no breakthrough yet. 

**About me:** Software developer, 25+ years Linux. I was the person responsible for Linux on the Desktop at the last European PC manufacturer (Fujtsu) for 17 years and can tell from my own experience why Linux on the desktop is an ongoing struggle. 

Since long every year is announced to be the &quot;year of the Linux desktop&quot;, and every year there is no real breakthrough.  

In this talk I will look at some reasons why there is no breakthrough yet. 

**About me:** Software developer, 25+ years Linux. I was the person responsible for Linux on the Desktop at the last European PC manufacturer (Fujtsu) for 17 years and can tell from my own experience why Linux on the desktop is an ongoing struggle. 
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:38:33</itunes:duration>
    </item>
    <item>
      <title>A Fork in the Road by openSUSE Board (osc22)</title>
      <link>https://media.ccc.de/v/3886-a-fork-in-the-road-by-opensuse-board</link>
      <description>The board will kick off the conference and give some options important to be discussed throughout the event.

The board will kick off the conference and give some options important to be discussed throughout the event.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3886-eng-A_Fork_in_the_Road_by_openSUSE_Board_sd.mp4"
        length="56623104"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 11:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3886-eng-A_Fork_in_the_Road_by_openSUSE_Board_sd.mp4?1654533892</guid>
      <dc:identifier>-Xv3vXybsjB9cpvTksN4-A</dc:identifier>
      <dc:date>2022-06-02T11:30:00+02:00</dc:date>
      <itunes:author>Douglas DeMaio</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3886, 2022</itunes:keywords>
      <itunes:summary>The board will kick off the conference and give some options important to be discussed throughout the event.

The board will kick off the conference and give some options important to be discussed throughout the event.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:23:30</itunes:duration>
    </item>
    <item>
      <title>As I was saying.... (osc22)</title>
      <link>https://media.ccc.de/v/3877-as-i-was-saying</link>
      <description>** Required Magic&#39;s Carpet: How we designed a mass deployment system for Linux. **

In 2014 we started working with a major Irish bank to help them with a project to upgrade 7,500 Linux workstations across all of their branches. Over the next two years we completed that task - not just once - but on a weekly basis, across 900 locations - with just **two** people, and **zero** site visits. 

Our discoveries of their systems and techniques led us to build &quot;Carpet&quot; (formally known as &quot;Snoopea&quot;), a tool to rapidly roll out - and maintain - Linux systems across a wide area network.

The systems don&#39;t have to be desktop based either - so long as the devices are network connected, Carpet can deploy IOT, Server and virtual machines too.

This high level talk is an overview of the the journey to take the original CLI based system to a modern, web based tool - including how we used Kiwi (and image builder), and Nuitka (a python compiler) to build certain components.

We&#39;ll start from the beginning for those that missed the first part in 2019! 



** Required Magic&#39;s Carpet: How we designed a mass deployment system for Linux. **

In 2014 we started working with a major Irish bank to help them with a project to upgrade 7,500 Linux workstations across all of their branches. Over the next two years we completed that task - not just once - but on a weekly basis, across 900 locations - with just **two** people, and **zero** site visits. 

Our discoveries of their systems and techniques led us to build &quot;Carpet&quot; (formally known as &quot;Snoopea&quot;), a tool to rapidly roll out - and maintain - Linux systems across a wide area network.

The systems don&#39;t have to be desktop based either - so long as the devices are network connected, Carpet can deploy IOT, Server and virtual machines too.

This high level talk is an overview of the the journey to take the original CLI based system to a modern, web based tool - including how we used Kiwi (and image builder), and Nuitka (a python compiler) to build certain components.

We&#39;ll start from the beginning for those that missed the first part in 2019! 


about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3877-eng-As_I_was_saying_sd.mp4"
        length="52428800"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 12:30:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3877-eng-As_I_was_saying_sd.mp4?1654539981</guid>
      <dc:identifier>BB7wKI00Ff4PLdFjJ1LspA</dc:identifier>
      <dc:date>2022-06-02T12:30:00+02:00</dc:date>
      <itunes:author>Patrick Fitzgerald</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3877, 2022, Open Source</itunes:keywords>
      <itunes:subtitle>Using Kiwi-ng in production (Part 2)</itunes:subtitle>
      <itunes:summary>** Required Magic&#39;s Carpet: How we designed a mass deployment system for Linux. **

In 2014 we started working with a major Irish bank to help them with a project to upgrade 7,500 Linux workstations across all of their branches. Over the next two years we completed that task - not just once - but on a weekly basis, across 900 locations - with just **two** people, and **zero** site visits. 

Our discoveries of their systems and techniques led us to build &quot;Carpet&quot; (formally known as &quot;Snoopea&quot;), a tool to rapidly roll out - and maintain - Linux systems across a wide area network.

The systems don&#39;t have to be desktop based either - so long as the devices are network connected, Carpet can deploy IOT, Server and virtual machines too.

This high level talk is an overview of the the journey to take the original CLI based system to a modern, web based tool - including how we used Kiwi (and image builder), and Nuitka (a python compiler) to build certain components.

We&#39;ll start from the beginning for those that missed the first part in 2019! 



** Required Magic&#39;s Carpet: How we designed a mass deployment system for Linux. **

In 2014 we started working with a major Irish bank to help them with a project to upgrade 7,500 Linux workstations across all of their branches. Over the next two years we completed that task - not just once - but on a weekly basis, across 900 locations - with just **two** people, and **zero** site visits. 

Our discoveries of their systems and techniques led us to build &quot;Carpet&quot; (formally known as &quot;Snoopea&quot;), a tool to rapidly roll out - and maintain - Linux systems across a wide area network.

The systems don&#39;t have to be desktop based either - so long as the devices are network connected, Carpet can deploy IOT, Server and virtual machines too.

This high level talk is an overview of the the journey to take the original CLI based system to a modern, web based tool - including how we used Kiwi (and image builder), and Nuitka (a python compiler) to build certain components.

We&#39;ll start from the beginning for those that missed the first part in 2019! 


about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:36:03</itunes:duration>
    </item>
    <item>
      <title>A Better way to make Enlightenment themes (osc22)</title>
      <link>https://media.ccc.de/v/3856-a-better-way-to-make-enlightenment-themes</link>
      <description>A New Way to Create Enlightenment Themes.

Enlightenment Themes are very large and complex, this makes them immensely flexible but also means the amount of effort to create a new Theme is huge. To try and find some middle ground here I have been working on a new theme engine that is much less flexible but means you can create a new theme just by changing images and a couple of files. One of the first examples of this is the new default theme for openSUSE Leap 15.4.

In this talk I&#39;ll walk through the process of making a new theme with this engine as well as showing a few examples. I&#39;ll also show you how to make GTK and KDE apps play nicely together.

But because everyone is not interested in Enlightenment i&#39;ll spend a fair section of time explaining how gtk and kde themes work and how you can or can&#39;t easily make your own versions of them.

A New Way to Create Enlightenment Themes.

Enlightenment Themes are very large and complex, this makes them immensely flexible but also means the amount of effort to create a new Theme is huge. To try and find some middle ground here I have been working on a new theme engine that is much less flexible but means you can create a new theme just by changing images and a couple of files. One of the first examples of this is the new default theme for openSUSE Leap 15.4.

In this talk I&#39;ll walk through the process of making a new theme with this engine as well as showing a few examples. I&#39;ll also show you how to make GTK and KDE apps play nicely together.

But because everyone is not interested in Enlightenment i&#39;ll spend a fair section of time explaining how gtk and kde themes work and how you can or can&#39;t easily make your own versions of them.
about this event: https://c3voc.de
</description>
      <enclosure url="https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3856-eng-A_Better_way_to_make_Enlightenment_themes_sd.mp4"
        length="45088768"
        type="video/mp4"/>
      <pubDate>Thu, 02 Jun 2022 12:00:00 +0200</pubDate>
      <guid isPermaLink="true">https://cdn.media.ccc.de/events/osc/2022/h264-sd/osc22-3856-eng-A_Better_way_to_make_Enlightenment_themes_sd.mp4?1654536886</guid>
      <dc:identifier>fjxQOn-hTB9s9DYqOF7wiw</dc:identifier>
      <dc:date>2022-06-02T12:00:00+02:00</dc:date>
      <itunes:author>Simon Lees</itunes:author>
      <itunes:explicit>No</itunes:explicit>
      <itunes:keywords>osc22, 3856, 2022, Open Source</itunes:keywords>
      <itunes:summary>A New Way to Create Enlightenment Themes.

Enlightenment Themes are very large and complex, this makes them immensely flexible but also means the amount of effort to create a new Theme is huge. To try and find some middle ground here I have been working on a new theme engine that is much less flexible but means you can create a new theme just by changing images and a couple of files. One of the first examples of this is the new default theme for openSUSE Leap 15.4.

In this talk I&#39;ll walk through the process of making a new theme with this engine as well as showing a few examples. I&#39;ll also show you how to make GTK and KDE apps play nicely together.

But because everyone is not interested in Enlightenment i&#39;ll spend a fair section of time explaining how gtk and kde themes work and how you can or can&#39;t easily make your own versions of them.

A New Way to Create Enlightenment Themes.

Enlightenment Themes are very large and complex, this makes them immensely flexible but also means the amount of effort to create a new Theme is huge. To try and find some middle ground here I have been working on a new theme engine that is much less flexible but means you can create a new theme just by changing images and a couple of files. One of the first examples of this is the new default theme for openSUSE Leap 15.4.

In this talk I&#39;ll walk through the process of making a new theme with this engine as well as showing a few examples. I&#39;ll also show you how to make GTK and KDE apps play nicely together.

But because everyone is not interested in Enlightenment i&#39;ll spend a fair section of time explaining how gtk and kde themes work and how you can or can&#39;t easily make your own versions of them.
about this event: https://c3voc.de
</itunes:summary>
      <itunes:duration>00:26:20</itunes:duration>
    </item>
    <generator>media.ccc.de / RSS 0.3.1</generator>
    <itunes:category text="Technology"/>
    <itunes:image href="https://static.media.ccc.de/media/events/osc/2022/oSC22icon.png"/>
    <itunes:owner>
      <itunes:name>CCC media team</itunes:name>
      <itunes:email>media@c3voc.de</itunes:email>
    </itunes:owner>
    <itunes:author>CCC media team</itunes:author>
    <itunes:explicit>No</itunes:explicit>
    <itunes:keywords>CCC Congress Hacking Security Netzpolitik</itunes:keywords>
    <itunes:subtitle>A wide variety of video material distributed by the CCC. All content is taken from cdn.media.ccc.de and media.ccc.de</itunes:subtitle>
    <itunes:summary>A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from osc22 as mp4</itunes:summary>
  </channel>
</rss>