2021 年中国 Open Source Summit 提案征集(CFP)现已启动。我们建议您通读左侧菜单的每个选项卡,获取有关要求及提案提交方式的信息。准备提交提案时,请点击下方按钮。
如果尚未使用 CFP 系统,则需注册并创建帐户后才可提交。
首次提交前,请创建您的帐户[1]。顺祝商祺!
提交提案[2]
Overview
The Open Source Summit China 2021 Call for Proposals (CFP) is now open. We encourage you to read through each tab from the menu to the left for information on requirements and how to submit a proposal. When you are ready to submit a proposal, please click on the button below.
If you have not yet used the CFP system, you will be required to register and create an account before submitting.
Please CREATE YOUR ACCOUNT[3] before submitting for the first time. Thank you!
SUBMIT A PROPOSAL[4]
PART TWO
重要信息
提案征集截止日期:太平洋标准时间 2021 年 8 月 15 日晚上 11:59
提案征集通知日期:2021 年 9 月 15 日,星期三
会议日程通告日期:2021 年 9 月 27 日,星期一
会议活动举办日期:2021 年 12 月 9 日 (星期四)至 12 月 10 日(星期五)
Dates to Remember
CFP Close: Sunday, August 15, 2021 at 11:59pm PDT
CFP Notifications: Wednesday, September 15, 2021
Schedule Announced: Monday, September 27, 2021
Event Dates: Thursday, December 9 – Friday, December 10
Tracks & Suggested Topics
Submissions must be in English, however, if your talk is accepted you may give it in English or Chinese.
Please check back soon as topic suggestions will be added for each track.
Linux Systems
Filesystems and Storage
Linux Kernel Development (Advanced & Beginner)
Mission-Critical, Real-Time, and Long Life Systems (Scientific & Medical)
Distribution Kernels & Distros Considerations for Servers, Desktops, etc.
Linux on the Desktop
Virtualization
Networking
Open Source Dependability
Testing and Hardening
Testability and stability of products based on open source projects
Best practices for verification for dependability
Best practices for update policies and practices
Maintainability of products based on open source projects
Automated regressions and management of test evidence
Cyber Security Considerations
Best practices for improving software transparency with SBOMs
Best practices for vulnerability classification, exploitability assessment, and mitigations
Best practices for vulnerability detection and reporting
Best practices for managing security incident responses (PSIRT teams, etc.)
Safety-Critical Considerations
Safety considerations when developing products based on open source projects
Sandboxing and Code Isolation techniques
Management of security issues in safety-critical applications
Best practices for working with certification authorities
Traceability between requirements, source, and testing evidence
AI & Data
Machine and Deep Learning (Framework, Libraries, Platform, Tools)
Reinforcement Learning
Natural Language Processing
AI on the Edge
Model (Benchmarking, Training, Parameter, Format, Marketplace, Workflow, Inference, Tools)
Notebook Environments
Data (Versioning, Format, Pipeline Management, Stream Processing, SQL Engines, Feature Engineering, Visualization, Governance, Labeling)
Security and Privacy
Trusted and Responsible AI (Explainability, Adversarial, Bias, Fairness)
Embedded & IoT
Audio, Video, Streaming Media and Graphics
System Size
Boot Speed
Embedded StorageTechnologies
Real-Time Linux – Performance, Tuning, and Mainlining
SDKs for Embedded Products
Flash Memory Devices and Filesystems
Build Systems, Embedded Distributions and Development Tools
Linux in Devices such as Mobile Phones, DVRs, TV, Cameras, etc.
Drones and Robots
Linux in the Internet of Things and Edge Computing
Practical Experiences and War Stories
Standards
Public Infrastructure
Outside World Meets IoT RTOSes
NTP and Synchronization
Connected Sensors
EMF/RFI Impact
Real-Time Considerations
Communication Technologies
Best practices Working with Resource Constraints
Code Footprint Minimization
Sensor Interaction
Power Usage
Open Hardware Support
Hardware/Software tradeoffs for Acceleration Technologies
Cybersecurity & Safety Considerations for Systems not Based on Linux
Cloud Infrastructure
Open Cloud Infrastructure
Hybrid & Multicloud
Edge Cloud Computing
Container-Native Virtualization
Container and Infrastructure Security
Cloud Native Storage
Infrastructure-as-Code
Cloud Native Development
CI/CD, Configuration Management
Cloud-native Application Development
Architectures and Architectural Patterns
APIs
Cloud-native Developer and Operator Experience
Observability: Metrics, Logging, Tracing, Service Mesh
Serverless and Functions-as-a-Service
Security/Authentication
Data Flow Management
Leadership & Management
Community & Business Leadership
Incentivization and Engagement
Software Development Methodologies and Platforms
Building Internal Innersource Communities
Remote Team Management and Methods
Bug/Issue Management and Triage
Communication Platforms and Methods
Open Source Governance and Models
Mentoring and Training
Event Strategy
Content Management and Social Media
DevOps Culture
Community Management
Advocacy and Evangelism
Open Source Program Office Management
Creation and Best Practices of Open Source Program Offices (OSPOs)
Consuming and Contributing to Open Source
Managing Competing Corporate Interests while Driving Coherent Communities
How to Vet the Viability of OS Projects
Open Source + Startup Business Models
Internal vs External Developer Adoption
Handling License Obligations in Organizations
Wildcard
WebAssembly (Wasm)
Emerging Platforms (Software & Hardware)
Networking
Blockchain
Public Health/COVID
Open Hardware
AR/VR with Cloud Native
Submission Types
Session Presentation (40-50 minutes in length)
Panel Discussion (40-50 minutes in length)
Birds of a Feather Session (BoFs are typically held in the evenings, from 45 minutes – and up to 1 hour in length)
Tutorial (1.5 – 2 hours in length)
Important Notes
When submitting a talk, you will be asked to select the Key Topic Area in which you’d like to submit. You may only submit for One Key Topic Area so please review all carefully before making your selection. We understand that some proposals could potentially fit into multiple topic areas. Don’t worry, our program chairs are working together to move proposals to other areas as needed for additional review.
Panel submissions must include the names of all participants in the initial submission to be considered. In addition, The Linux Foundation does not accept submissions with all-male panels in an effort to increase speaker diversity.
Complimentary Passes For Speakers – One complimentary pass for the event will be provided for the accepted primary speaker per submission, and a substantially discounted pass will be available for co-speakers. For panel sessions, all panelists will receive a complimentary pass.
Avoid sales or marketing pitches and discussing unlicensed or potentially closed-source technologies when preparing your proposal; these talks are almost always rejected due to the fact that they take away from the integrity of our events, and are rarely well-received by conference attendees.
All accepted speakers are required to submit their slides prior to the event.
Preparing to Submit Your Proposal
While it is not our intention to provide you with strict instructions on how to prepare your proposal, we hope you will take a moment to review the following guidelines that we have put together to help you prepare the best submission possible. To get started, here are three things that you should consider before submitting your proposal:
What are you hoping to get from your presentation?
What do you expect the audience to gain from your presentation?
How will your presentation help better the ecosystem?
There are plenty of ways to give a presentation about projects and technologies without focusing on company-specific efforts. Remember the things to consider that we mentioned above when writing your proposal and think of ways to make it interesting for attendees while still letting you share your experiences, educate the community about an issue, or generate interest in a project.
First Time Submitting? Don’t Feel Intimidated
Linux Foundation events are an excellent way to get to know the community and share your ideas and the work that you are doing and we strongly encourage first-time speakers to submit talks for our events. In the instance that you aren’t sure about your abstract, reach out to us and we will be more than happy to work with you on your proposal.
How To Give a Great Tech Talk
In the instance that your talk is accepted, we want to make sure that you give the best presentation possible. To do this, we enlisted the help of seasoned conference speaker Josh Berkus who has prepared an in-depth tutorial on “How to Give a Great Tech Talk”.
Part 1: http://www.youtube.com/watch?v=iE9y3gyF8Kw
Part 2: http://www.youtube.com/watch?v=gcOP4WQfJl4
PART THREE
行为准则
行为准则
Linux 基金会及其社区致力于为我们所有的参与者提供“零骚扰”的活动体验。我们建议所有申请人查看完整的行为准则[5],并在其提案使用文字和图片时严格遵守。
Code of Conduct
The Linux Foundation and its project communities are dedicated to providing a harassment-free experience for participants at all of our events. We encourage all submitters to review our complete Code of Conduct[6] and adhere to it in the words and images they use within their proposal.