[Main Conference] [clear filter]
Tuesday, October 27

2:00pm JST

What Should I Know About?
The success of containers through Docker has created a new operational flow and ecosystem far more reaching than anyone initially expected. Both as a project and a model that unifies, improves, and enforces consistent deployments, while empowering application with near-native performance in a highly-decoupled microservice approach, Docker has created a movement for the next wave of the Internet.

In doing so, numerous projects & products have spiraled out to capture a piece of the industry that facilities the adoption and usage of containers even further. Lost in all the noise of announcements, blog posts and articles is the core of what we all as technologists really care about: what are my actual viable options and what should I know about them?

In this talk, I will walk through the R&D work and market analysis that I’ve done in the container ecosystem and educate you on what technologies are worth tracking and incorporating into your stack including, but not limited to: Kubernetes, Swarm, CoreOS, Flocker and Hyper.

Tuesday October 27, 2015 2:00pm - 2:40pm JST

3:40pm JST

The Containers Ecosystem, the OpenStack Magnum Project, the Open Container Initiative, and You!

The technology industry has been abuzz about cloud workload containerization since the open source Docker project became a phenomenon in early 2014. 

Meanwhile, an OpenStack Containers Team was formed and the Magnum project launched to provide users with a convenient Containers-as-a-Service solution for OpenStack environments. 

As the potential of both technologies emerged, many wanted to see shared governance over the baseline container specification and runtime technology to ensure an open cloud ecosystem. 

This past June, a new group was formed with a goal of creating open, industry standards around container formats and runtimes, called the Open Container Initiative (http://www.opencontainers.org).

So how will OpenStack Magnum influence - and be influenced by - the new OCI group? Why is the OCI under the stewardship of the Linux Foundation? What is the scope of the OCI effort? What project goals and/or principles will guide their work? 

Attend this session to learn the following: 

  • A brief history of the open container ecosystem and the major benefits that containerization provides
  • An overview of the Magnum CaaS plugin architecture and design goals
  • Insider details on the the progress of the Linux Foundation Open Container Initiative (and the related Cloud Native Computing Foundation)
  • What it all means for deploying container orchestration engines on your cloud with OpenStack Magnum

avatar for Megan Kostick

Megan Kostick

Software Engineer
Megan Kostick is a Software Engineer for the IBM Cloud and Open Source Technologies team working in the Seattle area. She focuses on IBM cloud solutions leveraging the OpenStack, Cloud Foundry, and Docker open source projects. Her previous roles include work in virtualization software... Read More →
avatar for Daniel Krook

Daniel Krook

Senior Director of Developer Experience, CNCF
Daniel Krook is the Senior Director of Developer Experience at the Cloud Native Computing Foundation (a part of the Linux Foundation). He is focused on better serving the maintainers, contributors, and users in the community of 150+ open source projects hosted by the CNCF. Founding... Read More →

Tuesday October 27, 2015 3:40pm - 4:20pm JST

4:40pm JST

Connecting the Dots with Neutron: Unifying Network Virtualization Between Containers and VMs
Neutron has established a simple, and now broadly accepted, northbound API for network virtualization. In this talk, we will explore the use of Neutron for supporting multi-host and multi-tenant networking for Docker containers as well as OpenStack VMs. In particular, we use the new Docker plugin architecture along with the recently announced networking framework, libnetwork. We show how the libnetwork remote driver can be used to utilize Neutron as the networking backend and will discuss pros and cons of using Neutron in this role.

We will discuss performance comparisons between the use of Neutron with that of the built-in overlay driver, as well as other network drivers being developed for Docker. This talk will give attendees a clear picture of how Neutron can be the unifying networking engine for VMs and containers.

avatar for Mohammad Banikazemi

Mohammad Banikazemi

Research Staff Member, IBM Research
Mohammad is a research staff member at the IBM T.J. Watson Research Center. His research interests include cloud computing and software-defined networking. He is a senior member of the ACM and the IEEE and an active contributior to Neutron. Mohammad lives with his family in NYC.
avatar for Phil Estes

Phil Estes

Principal Engineer, AWS
Phil is a Principal Engineer for Amazon Web Services (AWS), focused on core container technologies that power AWS container offerings like Fargate, EKS, and ECS.Phil is currently an active contributor and maintainer for the CNCF containerd runtime project, and participates in the... Read More →

Tuesday October 27, 2015 4:40pm - 5:20pm JST

5:30pm JST

Containers Are Hot, but How Do They Network? Moderated by Eric Hanselman, 451 Research
While containers have been around for decades, they are only now becoming the rage for developers and DevOps practitioners alike. Indeed, they have seen a sudden surge in popularity and are rapidly becoming the standard for developing, packaging and deploying applications. What’s behind this?

As more and more companies adopt microservices architecture, encouraging rapid prototyping and frequent change, there may be implications for networking in general as traditional networks haven’t been designed for agility. What are they?

This panel moderated by Eric Hanselman, Chief Analyst, 415 Research will cover the inside scoop on the answers to these questions and more from the leading vendors and nimble startups involved with containerizing networking. We’ll also consider how vendors are able to help organizations operationalize their networks and eliminate the IT silos, given the  “don’t touch the network” attitude. Be prepared to hear about all about the emerging trends in containerized networking.  

avatar for Mike Cohen

Mike Cohen

Director, Product Management, Cisco Systems
Mike Cohen is Director of Product Management at Cisco Systems.  Mike began his career as an early engineer on VMware's hypervisor team and subsequently worked in infrastructure product management on Google and Big Switch Networks.  Mike holds a BSE in Electrical Engineering from... Read More →
avatar for Dan Mihai Dumitriu

Dan Mihai Dumitriu

CTO and Co-Founder, Midokura
Dan leads the product and technology strategy at Midokura. Dan has extensive experience building fault tolerant distributed systems in a variety of industries, including e-commerce, financial services, and enterprise infrastructure. He is a co-author of multiple research papers, holds... Read More →
avatar for Eric Hanselman

Eric Hanselman

Chief Analyst, 451 Research
Eric is the Chief Analyst at 451 Research and coordinates industry analysis across the broad portfolio of 451 research disciplines, with an extensive, hands-on understanding of a range of subject areas, including networks, virtualization, security and semiconductors and their intersection... Read More →
avatar for Daneyon Hansen

Daneyon Hansen

Software Engineer, Solo.io
As a Software Engineer at Solo.io, Daneyon has a wide range of technical responsibilities. He has contributed to several CNCF projects and was a maintainer of Contour, Envoy Gateway, and Gateway API before joining Solo.io. Daneyon is currently focused on adding Gateway API support... Read More →
avatar for Scott Sneddon

Scott Sneddon

Senior Director, SDN and Virtualization,, Juniper Networks
Scott Sneddon is Senior Director, SDN and Virtualization at Juniper Networks where he spends most of his time evangelizing the benefits of Network Virtualization and Software Defined Networking. Previous experience includes Principle Solutions Architect at Nuage Networks, Chief... Read More →

Tuesday October 27, 2015 5:30pm - 6:10pm JST
Wednesday, October 28

4:40pm JST

OpenStack Magnum - Containers-as-a-Service
OpenStack Magnum is a multi-tenant Containers-as-a-Service that combines OpenStack, Docker Swarm, Kubernetes, Mesos, and Flannel to produce a containers solution that works like other OpenStack services. In this session, we will detail and demonstrate Magnum to show you the features and capabilities, and explain why you should choose Magnum as the foundation for your containers strategy, regardless of what container orchestration software your users prefer.

avatar for Adrian Otto

Adrian Otto

Distinguished Architect, Rackspace
Adrian serves as a Distinguished Architect at Rackspace. He is an active technical contributor to OpenStack, the chair of the OpenStack Containers Team, and PTL of OpenStack Magnum. Adrian frequently appears at speaking engagements and is active within the standards community developing... Read More →

Wednesday October 28, 2015 4:40pm - 5:20pm JST

5:30pm JST

Monitoring Docker Container and Dockerized Applications
Monitoring Docker Container and Dockerized Applications
Authors: Meenakshi, Satya, Rahul and Ananth

Container technology has been in existence for a long time in the form of LXC. It combines kernel control groups to isolate a process’s resource and support isolated namespaces. Docker came up with multiple added advantages over LXC,Some of them are listed below.

  • Portable deployment across machines. Docker defines a format for bundling an application and all its dependencies into a single object which can be transferred to any docker-enabled machine, and executed there with the guarantee that the environment exposed to the application will be the same

  • Application-centric. Docker is optimized for the deployment of applications,as opposed to machines. This is reflected in its API, user interface, designphilosophy and documentation

  • Automatic build. Docker includes a tool for developers to automatically assemble a container from their source code, with full control over application dependencies, build tools, packaging etc.

  • Versioning. Docker includes git-like capabilities for tracking successive versions of a container.

  • Component re-use. Any container can be used as a "base image" to create more specialized components.

  • Sharing. Docker has access to a public registry.

  • Tool ecosystem. Docker defines an API for automating and customizing the creation and deployment of containers. There are a huge number of toolsintegrating with docker to extend its capabilities.


  • But don’t we need to monitor our system, containers, Applications running for our production system?

  • How can we monitor such a distributed system, containers and distributed applications?

There could be three approaches for monitoring and remedy:

1. Reactive:
This kind of monitoring can be achived by the orchestration engine updates the monitoring system.
Puppet: if any changes to configuration happens it revert back to the actual configuration which management config needs

This kind of monitoring can be achived by adding precautionary measures for the known issues, where, if the issue occurs it immidiately starts the precaution to eradicate the fault.

This is better suited for monitoring a frequently changing system like docker containers, as it can adapt itself to the micro services that get intorduced into the containers. Now the question is “Is the adaptive montoring a full solution to the abovementioned challenges?"
- Answer is “NO”
- We need solutions at different levels

Different levels need to be monitored

The cluster manager:
The cluster manager manages the life cycle of a cluster of containers, few present day options are kubernetes and docker swarm

What needs monitoring ?

  • Checking if the cluster manager is up and running and in ahealthy state

  • Are nodes connected as per the correct expected configuration ?

The cluster nodes:
The cluster nodes contains the compute nodes or the VMs over which the containers would be provisioned.

What needs monitoring ?

  • CPU utilization

  • Memory utilization

  • Swap space used

  • Disk space used

The docker runs a demon on each docker node we need to ensure the docker daemon is healthy and running

The Container: 
The containers runs the micro services of the application so we need to ensure that the container is up and running and the vital points we need to look are:

  • CPU utilization

  • Memory utilization

  • Disk space used

  • Network I/O

This is the most critical part to monitor and the complex part also as the applications are moving towards the distributed applications.

Container Advisor(cAdvisor) provides resource uses and performance characterstics of the running containers . cAdvisor has native support for docker containers.

The Application(micro service):
While monitoring the application, we need something which can be adaptive to the system and quickly adjust to the changes in the new enviornment and be able to take control and sustain itself Which means, one needs to take care of app status, app messages, appinstance failure management, health manager detects and advises, new app instance deployed, routing tables etc.,


Meenakshi Sundaram Lakshmanan

Manager - Cloud Systems development, Cisco Systems
Been in the openstack and virtualization business for several years, enthusiastic to understand and learn new technologies. Have managed and delivered several projects around Openstack and cloud technologies.
avatar for CB Anantha Padmanabhan

CB Anantha Padmanabhan

Engineer - Cloud Systems development, Cisco System
I am an Open source enthusiast who loves new technologies and always on the lookout for areas to innovate. I have been working in virtualization and cloud based technologies for the past sever years. Previously worked on various components of Openstack such as Compute, Neutron... Read More →
avatar for Satya Routray

Satya Routray

Engineer - Cloud Systems development, Cisco System
Open-source enthusiast who loves new technologies and lookout for areas to innovate. Been working in virtualization and cloud based technologies for the past several years. Previously worked on various components of Openstack such as Compute, Neutron, Cinder, Swift, Docker. Currently... Read More →

Rahul Upadhaya

Engineer - Cloud Systems development, Cisco System
Has have been working in virtualization and cloud based technologies for the past four years. Previously worked on various components of Openstack such as Compute, Neutron, Scheduler, Cinder and Ceph. Currently working on cloud and network solutions for Cisco Systems. Have been... Read More →

Wednesday October 28, 2015 5:30pm - 6:10pm JST
Thursday, October 29

9:00am JST

SaaS Experience: Building OpenStack on OpenStack CI With SDN and Containers
Workday as a SaaS leader in human resources management and finances has faced a number of challenges in adopting and deploying open-source technologies such as OpenStack and OpenContrail. One of these challenges was to find a quick way to evaluate and validate Open source technologies in development environment before considering those for production. Another was to integrate these solutions within the framework of existing company application deployment processes. 

In this session, we will talk about how we addressed these challenges by developing an multi-node Openstack CI framework using containers and virtual machines. The topics will cover: 

  • Challenges we faced in developing and testing open source Openstack deployment tools

  • Drivers for adopting Docker for development environment

  • Benefits and challenges of using Docker

  • How we built a CI system on Docker for quick validation of community developed Openstack deployment solution

  • How (we or) operators can develop a transition path for deploying Openstack in production

avatar for Imtiaz Chowdhury

Imtiaz Chowdhury

Senior Cloud Engineer, Workday
Imtiaz is a Senior Cloud Engineer at Workday. Imtiaz comes with over 16 years of experience in developing enterprise and network management applications. At Workday, Imtiaz has been involved with building an Openstack based private cloud and developing solutions for migrating existing... Read More →
avatar for Edgar Magana

Edgar Magana

Software architect, Salesforce
Edgar is an emerging leader who has specialized in Cloud Computing, Network Virtualization, Software-defined Networking (SDN), Network Functions Virtualization (NFV), OpenFlow and OpenStack. He has developed excellent software development skills and outstanding customer and business... Read More →

Thursday October 29, 2015 9:00am - 9:40am JST

9:50am JST

Exploring Magnum and Senlin Integration for Autoscaling Containers
Magnum provides container as a service, and Senlin provides clustering as a service to support autoscaling; therefore, to achieve autoscaling for container, it seems straightforward to simply integrate the two services. However, on closer inspection, many issues become apparent.  For example, an administrator would be concerned with scaling the host cluster, while a user would think about scaling the containers.  The different policies from the two levels of scaling may interact in unexpected ways.  Monitoring data for containers and load balancing to containers may require additional support.  Some container managers such as Kubernetes may offer native support to autoscale containers, while other managers such as Swarm may not and require external autoscaling support.  Users may want to autoscale with or without heat template.
To explore these issues and look for best practices, we conduct a POC in integrating Magnum and Senlin.  In this talk we present the results of our POC effort and the new features and enhancements for both projects that we have identified as part of this integration effort.  

avatar for Hongbin Lu

Hongbin Lu

Software Engineer, Huawei Technologies
Hongbin is currently a Software Engineer in Huawei Technologies. He is an active contributor of OpenStack, developer/core reviewer of OpenStack Magnum project. He has implemented several key features for Magnum Liberty release, including Mesos integration, HA kubernetes bay, metric... Read More →
avatar for Ton Ngo

Ton Ngo

Senior Developer, IBM
Ton Ngo is a senior developer at the IBM Silicon Valley Lab, building cloud solution for customers for the past 8 years using IBM cloud orchestration products. Since the OpenStack Summit in Hong Kong, he has been working on Heat, focusing on improving support for template troubleshooting... Read More →
avatar for Julio Ruano

Julio Ruano

Senior Software Engineer, IBM
Julio Ruano is a Senior Software Engineer in the IBM Cloud Architecture and Technology organization. In his current role, Julio is responsible for contributing to OpenStack around technologies that are focused on cloud management and orchestration. He is an active contributor to the... Read More →
avatar for Qiming Teng

Qiming Teng

CTO, Sangfor
I have been working on virtualization technologies since 2005, though this is the first time I get myself involved in an open community. It has been an exciting experience so far where I can work with so many talents around the globe, all with different backgrounds, interests, ex... Read More →

Thursday October 29, 2015 9:50am - 10:30am JST

11:00am JST

Why Reinvent the Wheel? ­ Using Murano, Heat, Container Clustering and Ceilometer to Provide Auto-­scaling and Enforce Self­Healing Best Practices in Applications
Many applications still in use today were constructed before web­scale IT designs were more prevalent and therefore lack the features and flexibility of cloud­developed applications.

Traditionally, these applications would need to be completely re­written or redesigned to incorporate modern auto­scaling and self­healing functionality into the application service itself.

In this talk, we will look at:

  • Taking advantage of current capabilities founded on available OpenStack orchestration, modularization, and monitoring and alerting tools to provide scale without rewriting the application

  • Relying on Murano orchestration combined with OpenStack layout to enforce best practice self­healing rules in deployment

  • Simplifying delivery of auto­scaling and self­healing from the service catalog

By attending this presentation you will understand how to apply key features of Murano, Kubernetes, Docker, and Ceilometer to incorporate auto­scaling into existing application frameworks. You will be able to establish your own specific OpenStack availability zones, host groups, flavors and images to enforce resilient application service best practices and incorporate the use of these features and capabilities in conjunction with currently used deployment mechanisms.

avatar for Bruce Mathews

Bruce Mathews

Senior Solution architect, Mirantis
Bruce has been a Senior Solutions Architect in the computer industry for forty-one years, working at multiple technology companies including Mirantis, HP, Sun and Symbolics. Bruce has been involved with the Open Source community since 2000. Bruce was a member of Hewlett-Packard’s... Read More →

Thursday October 29, 2015 11:00am - 11:40am JST

11:50am JST

Decomposing Lithium's monolith With Kubernetes and OpenStack
Application developers are rapidly moving to container-based models for dynamic service delivery and efficient cluster management.  In this session, we will discuss a OpenStack production environment that is rapidly evolving to leverage a hybrid cloud platform to deliver containerized micro services in a SaaS Development/Continuous Integration environment.  Kubernetes is being used to simplify and automate the service delivery model across the public/private (OpenStack, AWS, GCE) environments and is being introduced in a way that eliminates extra overhead and engineering effort.  Lithium is actively contributing to key open source upstream projects and working closely with its engineering/development teams to optimize software efficiency with an elastic cloud architecture that delivers on the benefits of cloud automation.

avatar for Lachlan Evenson

Lachlan Evenson

Team Lead, Cloud Platform Engineering
Resident network sage building scalable multi­tenant service provider networks that span the globe. Pushing networking boundaries in a public/private SaaS environment. Passionate about infrastructure automation, architecture and cloud deployment strategy. As a believer in open... Read More →

Thursday October 29, 2015 11:50am - 12:30pm JST

1:50pm JST

Kolla: Ansible Deployment + OpenStack in Docker Containers = Operator Bliss
Be prepared to have your mind blown away by witnessing the power of Kolla. Kolla uses Ansible for deployment automation and Docker for containerizing OpenStack services to deliver Operator nirvana.

Learn why Kolla is like Willy Wonka's Chocolate Factory for OpenStack Operators. We will tell the story of the Kolla project and the community best practices used to build it. Do you want simple and reliable upgrades? Experience how Kolla makes that a snap through Docker image-based deployments. Tired of inflexible deployment solutions? Experience how Kolla provides uber flexibility. Want to deploy from source or packages with choice of distribution? See how Kolla provides choice in operating system and OpenStack distribution.  Do you want to run OpenStack as micro-services instead of a slew of individually managed packages? Experience how Kolla transforms the OpenStack Big Tent into a micro-service architecture.  Curious what happens when a disk error corrupts your docker containers volume? Experience how Kolla can quickly repair the containers and get the OpenStack deployment into a non-degraded operational state.

Get an insider view of our diverse community's project and understand why Kolla is your golden ticket to deploying OpenStack clouds.

avatar for Steven Dake

Steven Dake

Principal Engineer, Cisco Systems, Inc.
Steven Dake currently serves as an elected Individual Director of the OpenStack Foundation where he is focused on making multicloud computing a reality. Steve is also actively involved in bridging communities between adjacent open source communities.Additionally, Steve currently... Read More →
avatar for Daneyon Hansen

Daneyon Hansen

Software Engineer, Solo.io
As a Software Engineer at Solo.io, Daneyon has a wide range of technical responsibilities. He has contributed to several CNCF projects and was a maintainer of Contour, Envoy Gateway, and Gateway API before joining Solo.io. Daneyon is currently focused on adding Gateway API support... Read More →
avatar for Sam Yaple

Sam Yaple

Senior DevOps Engineer, Servosity
I am the Senior DevOps Engineer with Servosity. I have been working with OpenStack and Docker since 2013 and have a strong focus on using containers to simplify OpenStack deployment. I have also been tinkering with ways to make OpenStack "from-source" deployments easy and accessible... Read More →

Thursday October 29, 2015 1:50pm - 2:30pm JST

3:30pm JST

In a World of Ephemeral Containers, How Do We Keep Track of Things?
This talk is on trends for keeping state in clusters of ephemeral containers. Containers are a popular new way to deploy applications. Containers give you benefits like standard container formats, resource isolation, and easy to use deployment tools. However, there are a number of caveats to using containers. One caveat is that many benefits require you to be careful about how you store application state.

Containers are normally managed in such a way that they can be started and stopped easily in order to provide higher availability and better utilize cluster resources. However, this methodoligy has it's tradeoffs. One tradeoff is that each container is generally started in the same state each time. This makes it difficult to save data such as databases or caches in containers.

I will present a number of challenges regarding storing state.

  1. Allowing data to survive restarts

  2. Allowing data to be moved between hosts

  3. Managing storage solutions

I will then present a number of strategies that can be used to meet these challenges.

  1. Storing data via mounts to the host machine

  2. Storing data in external services (CloudSQL, RDS, S3, Object Storage, Cloud Datastore, etc.)

  3. Storing data in cluster native database apps (Cassandra, Riak, etc.) 

I will present these strategies in the context of running Kubernetes on OpenStack. Kubernetes is a tool created by Google for managing clusters of containers and has support for OpenStack.

I believe this talk will help attendees visualize how they can map their current problems and workloads to containers. This should make it easier for them to make the leap to using containers for their deployments.

avatar for Ian Lewis

Ian Lewis

Developer Relations Engineer, Google
Ian is an engineer at Google working on Supply Chain Security. Ian has been living in Tokyo since 2006 and has had various developer and operations roles throughout his career while staying active in the open-source developer community. Ian is a contributor to the SLSA framework and... Read More →

Thursday October 29, 2015 3:30pm - 4:10pm JST

4:30pm JST

Beginners Guide to Containers Technology and How it Actually Works
Containers are a much talked about, much hyped technology, but what exactly are they and how do they work?  What is the different between an Application Container and an Operating System container? This talk will try and take the technically adept beginner through the details of what containers on Linux are, how they're brought up, where the component technologies, like Cgroups and Namespaces fit in and how and why containers differ from hypervisors.

We'll begin by covering ancient history: the BSD chroot() system call and why this lead to the first idea of containing service based applications (and how this lead to the mount namespace), followed by a brief digression into IBM DPAR and Solaris Zones, Moving on to the Parallel developments of beancounters and cgroups and finally describing the unified container interface in Linux today consisting of the current set of Cgroups and Namespaces.  Along the way, we'll describe how container guests can directly interact with the host operating system and vice versa and why this is important for application containers.  How operating system containers effectively run different versions of Linux (like running ubuntu on RHEL) and why they differ from application containers.  Finally, for completeness, we'll look at applications which are themselves integrated with container technology and what they do with it to enhance their own functions.

avatar for James Bottomley

James Bottomley

CTO, Virtualization, Odin
James Bottomley is CTO of Virtualisation at Odin where he works onVirtualization including container technology for Linux and Windows. He isalso Linux Kernel maintainer of the SCSI subsystem. He has been a Director onthe Board of the Linux Foundation and Chair of its Technical AdvisoryBoard... Read More →

Thursday October 29, 2015 4:30pm - 5:10pm JST

5:20pm JST

Trusted and Secure Containers for Enterprise Deployment
Container technologies offer the exciting prospect of rapidly scaling applications and services without the large overhead of traditional virtualization environments. However, container technologies bring security vulnerabilities that a skilled intruder running inside a container can exploit to infiltrate other containers and eventually take over a cloud environment.

In this talk, Intel’s security, virtualization and Linux technologists collaborate to show how a trusted container environment can be deployed in an OpenStack environment that will:

  • Ensure a root of trust for the platform on which a containerized app is deployed through trusted platform modules

  • Encrypt the containerized workload and manage the key exchange process so it can only be decrypted and deployed on the targeted server as a trusted container

  • Rapidly launch the trusted container in a fraction of the time it would take to launch a traditional VM

  • Protect each container from other potentially rogue containers through isolation technologies already present in Intel® Architecture servers

This capability opens the door to a variety of Enterprise usages for OpenStack, which will be outlined

avatar for Abhishek Gupta

Abhishek Gupta

Software Architect, Intel Corp., Intel Corporation
Dr. Abhishek Gupta is a Cloud Security Architect at Intel Corp, USA. In this role, he performs research and development of solutions for cloud security. He received his Ph.D. from the Department of Computer Science at the University of Illinois at Urbana-Champaign. His PhD thesis... Read More →

Arjan van de Ven

Principal Engineer

Raghu Yeluri

Sr. Principal Engineer, Intel
Raghu Yeluri is a Sr. Principal Engineer and lead Security Architect in the Data Center Group at Intel Corporation with focus on confidential compute in cloud native, containerized deployments leveraging hardware-based security. In this role, he drives security solution architecture... Read More →

Thursday October 29, 2015 5:20pm - 6:00pm JST

Filter sessions
Apply filters to sessions.