Valerie Parham-Thompson
Lead Database Consultant with Pythian
Find more by Valerie Parham-Thompson: https://speakerdeck.com/dataindataout
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Advanced MySql Data-at-Rest Encryption in Percona ServerSeveralnines
Iwo Panowicz - Percona & Bart Oles - Severalnines AB
The purpose of the talk is to present data-at-rest encryption implementation in Percona Server for MySQL.
Differences between Oracle's MySQL and MariaDB implementation.
- How it is implemented?
- What is encrypted:
- Tablespaces?
- General tablespace?
- Double write buffer/parallel double write buffer?
- Temporary tablespaces? (KEY BLOCKS)
- Binlogs?
- Slow/general/error logs?
- MyISAM? MyRocks? X?
- Performance overhead.
- Backups?
- Transportable tablespaces. Transfer key.
- Plugins
- Keyrings in general
- Key rotation?
- General-Purpose Keyring Key-Management Functions
- Keyring_file
- Is useful? How to make it profitable?
- Keyring Vault
- How does it work?
- How to make a transition from keyring_file
This document provides an overview of Apache ActiveMQ, an open-source messaging server. It discusses ActiveMQ's features such as high performance, high availability, multiple protocols and transports. It also covers tools for benchmarking and performance tuning ActiveMQ brokers, including the ActiveMQ Performance Module, jms-benchmark, JMSTester, JMeter and OS monitoring tools. The document is intended to help understand how to approach performance tuning of ActiveMQ brokers.
Barack Obama became the first African American president in 2008. He has implemented policies to stimulate the economy, improve education, and promote clean energy. While some criticize the increased taxes under his administration, Obama remains popular and has the potential for a lasting legacy, though his presidency is still ongoing.
Overview of HBase cluster replication feature, covering implementation details as well as monitoring tools and tips for troubleshooting and support of Replication deployments.
SymfonyCon 2019: Head first into Symfony Cache, Redis & Redis ClusterAndré Rømcke
Symfony Cache has been around for a few releases. But what is happening behind the scenes? Talk focuses on how is it working, down to detail level on Redis for things like datatypes, Redis Cluster sharding logic, how it differs from Memcached and more.
Hopefully you’ll learn how you can make sure to get optimal performance, what opportunities exists, and which pitfalls to try to avoid.
https://amsterdam2019.symfony.com/speakers
NOTE: This talk is recorded and available on SymfonyCasts, in the future it will also be uploaded to youtube.
PGConf APAC 2018 - PostgreSQL HA with Pgpool-II and whats been happening in P...PGConf APAC
Speaker: Muhammad Usama
Pgpool-II has been around to complement PostgreSQL over a decade and provides many features like connection pooling, failover, query caching, load balancing, and HA. High Availability (HA) is very critical to most enterprise application, the clients needs the ability to automatically reconnect with a secondary node when the master nodes goes down.
This is where Pgpool-II watchdog feature comes in, the core feature of Pgpool-II provides HA by eliminating the SPOF is the Watchdog. This watchdog feature has been around for a while but it went through major overhauling and enhancements in recent releases. This talk aims to explain the watchdog feature, the recent enhancements went into the watchdog and describe how it can be used to provide PostgreSQL HA and automatic failover.
Their is rising trend of enterprise deployment shifting to cloud based environment, Pgpool II can be used in the cloud without any issues. In this talk we will give some ideas how Pgpool-II is used to provide PostgreSQL HA in cloud environment.
Finally we will summarise the major features that have been added in the recent major release of Pgpool II and whats in the pipeline for the next major release.
The document discusses transparent data encryption in PostgreSQL. It describes threats to unencrypted database servers like privilege abuse and SQL injections. It then covers using buffer-level encryption in PostgreSQL to encrypt data in shared memory and at rest on disk. This provides encryption with less performance overhead than per-query encryption. The document proposes encrypting WAL files, system catalogs, and temporary files in addition to table data for stronger security. It also discusses key management with a two-tier architecture involving master and tablespace keys.
Open Source 101 2022 - MySQL Indexes and HistogramsFrederic Descamps
Nobody complains that the database is too fast. But when things slow down, the complaints come quickly. The two most popular approaches to speeding up queries are indexes and histograms. But there are so many options and types on indexes that it can get confusing. Histograms are fairly new to MySQL but they do not work for all types of data. This talk covers how indexes and histograms work and show you how to test just how effective they are so you can measure the performance of your queries.
How to Manage Scale-Out Environments with MariaDB MaxScaleMariaDB plc
MaxScale is a database proxy that provides load balancing, connection pooling, and replication capabilities for MariaDB and MySQL databases. It can be used to scale databases horizontally across multiple servers for increased performance and availability. The document provides an overview of MaxScale concepts and capabilities such as routing, filtering, security features, and how it can be used for operational tasks like query caching, logging, and data streaming. It also includes instructions on setting up MaxScale with a basic example of configuring read/write splitting between a master and slave database servers.
The document discusses two MySQL high availability solutions: MySQL InnoDB Cluster and MySQL NDB Cluster. MySQL InnoDB Cluster provides easy high availability built into MySQL with write consistency, read scalability, and application failover using MySQL Router. MySQL NDB Cluster is an in-memory database that provides automatic sharding, native access via several APIs, read/write consistency, and read/write scalability using the NDB storage engine. The document compares the two solutions and discusses their architectures and key features.
MySQL has multiple timeouts variables to control its operations. This presentation focus on the purpose of each timeout variables and how it can be used.
11 Understanding and Influencing the PL/SQL Compilarrehaniltifat
This document discusses normalization of a sales tax invoice database. It begins by showing an initial sales tax invoice table that is not normalized. It then shows the tables after normalization into first normal form (1NF), second normal form (2NF), and third normal form (3NF). The normalized tables separate the data into tables for the invoice, buyer, product, tax, and price details.
Cursores en Oracle PL/SQL, en esta presentación se encuentra información sobre que son, cuando se debe usar, su creación, invocación y también su eliminación.
MySQL Database Monitoring: Must, Good and Nice to HaveSveta Smirnova
It is very easy to find if a database installation is having issues. You only need to enable Operating System monitoring. A disk, memory, or CPU usage change will alert you about the problems. But they would not show *why* the trouble happens. You need the help of database-specific monitoring tools.
As a Support Engineer, I am always very upset when handling complaints about the database behavior lacking specific database monitoring data because I cannot help!
There are two reasons database and system administrators do not enable necessary instrumentation. The first is a natural or expected performance impact. Second is the lack of knowledge on what needs to be on to resolve a particular issue.
In this talk, I will cover both concerns.
I will show which monitoring instruments will give information on what causes disk, memory, or CPU problems.
I will teach you how to use them.
I will uncover which performance impact these instruments have.
I will use both MySQL command-line client and open-source graphical instrument Percona Monitoring and Management (PMM) for the examples.
MariaDB MaxScale is a database proxy that provides scalability, high availability, and data streaming capabilities for MariaDB and MySQL databases. It acts as a load balancer and router to distribute queries across database servers. MaxScale supports services like read/write splitting, query caching, and security features like selective data masking. It can monitor replication lag and route queries accordingly. MaxScale uses a plugin architecture and its core remains stateless to provide flexibility and high performance.
Mark Mzyk
Engineering Manager with Chef
Find more by Mark Mzyk: https://speakerdeck.com/mmzyk
All Things Open
October 26-27, 2016
Raleigh, North Carolina
The document discusses Rachel Andrew's career journey from dancer to front-end developer and her contributions to advancing web standards. She encourages attendees to contribute to specifications, raise browser bugs, and help others to strengthen the open web platform. Contributing back helps future-proof one's skills and gives back to the community.
Scaling Your Logging Infrastructure With Syslog-NGAll Things Open
This document provides a summary of scaling logging infrastructure with syslog-ng. It discusses the main roles of syslog-ng including data collection, processing, filtering, and storage. It also covers topics like message parsing, anonymization, configuration, and community involvement. The document is intended to explain how syslog-ng can be used to build a scalable centralized logging solution.
Van Wilson
Senior Consultant with Cardinal Solutions
Find more by Van Wilson: https://speakerdeck.com/vjwilson
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Student Pipeline to Open Source Communities using HFOSSAll Things Open
Heidi Ellis
Professor at Western New England University
Gregory Hislop
Professor at Drexel University
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Building a Distributed & Automated Open Source Program at NetflixAll Things Open
Andrew Spyker
Senior Software Engineer for Netflix
Find more by Andrew Spyker: http://www.slideshare.net/aspyker
All Things Open
October 26-27, 2016
Raleigh, North Carolina
BFFs: UX & SEO Partnering to Design Successful ProductsAll Things Open
Hillary Pitts
Product Strategist for Smashing Boxes
Find more by Hillary Pitts: http://www.slideshare.net/HillaryPitts
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Rachel Andrew
Co-founder of Perch CMS
Find more by Rachel Andrew: http://www.slideshare.net/rachelandrew
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Open Source 101 2022 - MySQL Indexes and HistogramsFrederic Descamps
Nobody complains that the database is too fast. But when things slow down, the complaints come quickly. The two most popular approaches to speeding up queries are indexes and histograms. But there are so many options and types on indexes that it can get confusing. Histograms are fairly new to MySQL but they do not work for all types of data. This talk covers how indexes and histograms work and show you how to test just how effective they are so you can measure the performance of your queries.
How to Manage Scale-Out Environments with MariaDB MaxScaleMariaDB plc
MaxScale is a database proxy that provides load balancing, connection pooling, and replication capabilities for MariaDB and MySQL databases. It can be used to scale databases horizontally across multiple servers for increased performance and availability. The document provides an overview of MaxScale concepts and capabilities such as routing, filtering, security features, and how it can be used for operational tasks like query caching, logging, and data streaming. It also includes instructions on setting up MaxScale with a basic example of configuring read/write splitting between a master and slave database servers.
The document discusses two MySQL high availability solutions: MySQL InnoDB Cluster and MySQL NDB Cluster. MySQL InnoDB Cluster provides easy high availability built into MySQL with write consistency, read scalability, and application failover using MySQL Router. MySQL NDB Cluster is an in-memory database that provides automatic sharding, native access via several APIs, read/write consistency, and read/write scalability using the NDB storage engine. The document compares the two solutions and discusses their architectures and key features.
MySQL has multiple timeouts variables to control its operations. This presentation focus on the purpose of each timeout variables and how it can be used.
11 Understanding and Influencing the PL/SQL Compilarrehaniltifat
This document discusses normalization of a sales tax invoice database. It begins by showing an initial sales tax invoice table that is not normalized. It then shows the tables after normalization into first normal form (1NF), second normal form (2NF), and third normal form (3NF). The normalized tables separate the data into tables for the invoice, buyer, product, tax, and price details.
Cursores en Oracle PL/SQL, en esta presentación se encuentra información sobre que son, cuando se debe usar, su creación, invocación y también su eliminación.
MySQL Database Monitoring: Must, Good and Nice to HaveSveta Smirnova
It is very easy to find if a database installation is having issues. You only need to enable Operating System monitoring. A disk, memory, or CPU usage change will alert you about the problems. But they would not show *why* the trouble happens. You need the help of database-specific monitoring tools.
As a Support Engineer, I am always very upset when handling complaints about the database behavior lacking specific database monitoring data because I cannot help!
There are two reasons database and system administrators do not enable necessary instrumentation. The first is a natural or expected performance impact. Second is the lack of knowledge on what needs to be on to resolve a particular issue.
In this talk, I will cover both concerns.
I will show which monitoring instruments will give information on what causes disk, memory, or CPU problems.
I will teach you how to use them.
I will uncover which performance impact these instruments have.
I will use both MySQL command-line client and open-source graphical instrument Percona Monitoring and Management (PMM) for the examples.
MariaDB MaxScale is a database proxy that provides scalability, high availability, and data streaming capabilities for MariaDB and MySQL databases. It acts as a load balancer and router to distribute queries across database servers. MaxScale supports services like read/write splitting, query caching, and security features like selective data masking. It can monitor replication lag and route queries accordingly. MaxScale uses a plugin architecture and its core remains stateless to provide flexibility and high performance.
Mark Mzyk
Engineering Manager with Chef
Find more by Mark Mzyk: https://speakerdeck.com/mmzyk
All Things Open
October 26-27, 2016
Raleigh, North Carolina
The document discusses Rachel Andrew's career journey from dancer to front-end developer and her contributions to advancing web standards. She encourages attendees to contribute to specifications, raise browser bugs, and help others to strengthen the open web platform. Contributing back helps future-proof one's skills and gives back to the community.
Scaling Your Logging Infrastructure With Syslog-NGAll Things Open
This document provides a summary of scaling logging infrastructure with syslog-ng. It discusses the main roles of syslog-ng including data collection, processing, filtering, and storage. It also covers topics like message parsing, anonymization, configuration, and community involvement. The document is intended to explain how syslog-ng can be used to build a scalable centralized logging solution.
Van Wilson
Senior Consultant with Cardinal Solutions
Find more by Van Wilson: https://speakerdeck.com/vjwilson
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Student Pipeline to Open Source Communities using HFOSSAll Things Open
Heidi Ellis
Professor at Western New England University
Gregory Hislop
Professor at Drexel University
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Building a Distributed & Automated Open Source Program at NetflixAll Things Open
Andrew Spyker
Senior Software Engineer for Netflix
Find more by Andrew Spyker: http://www.slideshare.net/aspyker
All Things Open
October 26-27, 2016
Raleigh, North Carolina
BFFs: UX & SEO Partnering to Design Successful ProductsAll Things Open
Hillary Pitts
Product Strategist for Smashing Boxes
Find more by Hillary Pitts: http://www.slideshare.net/HillaryPitts
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Rachel Andrew
Co-founder of Perch CMS
Find more by Rachel Andrew: http://www.slideshare.net/rachelandrew
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Andrew Spyker
Senior Software Engineer for Netflix
Find more by Andrew Spyker: http://www.slideshare.net/aspyker
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Cross-platform Mobile Development on Open SourceAll Things Open
This document provides an overview of cross-platform mobile development using open source tools. It discusses hybrid mobile frameworks like Apache Cordova that allow building mobile apps with web technologies that are deployed to native app stores. While early hybrid apps had performance issues, newer frameworks discussed like React Native and NativeScript claim to generate truly native apps with high code reuse across platforms using JavaScript. The document also covers adjacent native frameworks like Xamarin that compile to native apps from C# instead of web technologies. Overall it introduces a variety of open source options for cross-platform mobile development.
This document discusses InnoDB tablespace encryption in MySQL. It begins with prerequisites for encryption like having MySQL 5.7 installed and the keyring plugin configured. It then covers how to encrypt existing and new tables. The architecture uses a two-tier encryption model with a master key and tablespace keys. Key rotation only re-encrypts tablespace keys. Exporting encrypted tables requires additional files. Replication requires different keyring files on master and slave. MySQL Enterprise Edition supports transparent data encryption using the Oracle Key Vault for strong key protection and management.
MySQL security is critical to ensure data security. Destruction, falsification or simply unwanted publication are the most serious threat that wait in the dark the first faux-pas of any administrator. During this session, we'll review the common vulnerabilities, the intrusion techniques, MySQL security features, and configurations.
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...ScyllaDB
Scylla includes multiple features that collectively provide a robust security model. Most recently we announced support for encryption-at-rest in Scylla Enterprise. This enables you to lock-down your data even in multi-tenant and hybrid deployments of Scylla. Join Tzach and Dejan for an overview of security in Scylla and to see how you can approach it holistically using the array of Scylla capabilities. He will review Scylla Security features, from basic to more advanced, including:
Reducing your attack surface
Authorization & Authentication
Role-Based Access Control
Encryption at Transit
Encryption at Rest, in 2019.1.1 and beyond
LDAP authentication is a common requirement for any enterprise software. It gives users consistent login procedures across multiple components of the IT infrastructure, while centralizing the control of access rights. Scylla Enterprise now supports authentication via LDAP. We will look into how to configure Scylla Enterprise for LDAP interaction and how to fine-tune access control through it.
This document provides information about installing and using the Firebird RDBMS, including:
- The two main types of Firebird servers and how to start/stop the Superserver.
- Default username and password for administration, and how to add/modify user accounts.
- Using the isql tool to connect to databases and execute SQL statements.
- Basic troubleshooting for common errors.
- Security measures like logging login attempts and restricting access after failed logins.
- Using the GBAK tool to backup and restore entire Firebird databases.
This document provides an overview of Always Encrypted in Microsoft SQL Server 2016, which allows customers to securely store sensitive data outside of their trust boundary while protecting data from highly privileged users. Key capabilities of Always Encrypted include client-side encryption of sensitive data using keys never provided to the database system and support for queries on encrypted data, with minimal application changes required.
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
In this presentation from her webinar, renowned cybersecurity expert Paula Januszkiewicz delves into what a truly holistic vulnerability management program should look like. When all parts are correctly established and working together, organizations can dramatically dial down their risk exposure. This presentation covers:
- The key phases and activities of the vulnerability management lifecycle
- The tools you need for an effective vulnerability management program
- How to prioritize your VM needs
- How an effective VM program can help you measurably reduce risk and meet compliance objectives
You can watch the full webinar here: https://www.beyondtrust.com/resources/webinar/tips-remediate-vulnerability-management-program
ProxySQL and the Tricks Up Its Sleeve - Percona Live 2022.pdfJesmar Cannao'
ProxySQL is a MySQL protocol proxy that provides high availability, scalability, and security for MySQL database systems. It allows clients to connect to ProxySQL, which then evaluates requests and performs actions like routing queries to backend databases, caching reads, connection pooling, and load balancing across servers. ProxySQL's main features include query routing, firewalling, real-time statistics, monitoring, and management of large numbers of backend servers. The presentation discusses using ProxySQL's query routing and rewriting capabilities to mask sensitive data when replicating databases for development environments. It also covers using the REST API and Prometheus integration to configure ProxySQL and monitor metrics without direct SQL access.
This document provides information about PHP configuration on a Windows system. It includes details like the PHP version, extensions enabled, Apache version, PHP settings and their values, environment variables, and more. It appears to be the output of running phpinfo() to display configuration and environment details.
Organizational compliance and security SQL 2012-2019 by George WaltersGeorge Walters
The compliance and security aspects of SQL Server, and the greater platform, are covered here. This goes through CTP 2.3 of SQL 2019. I start with the history of security in SQL Server, from the changes with SQL 2005, then into SQL 2008, 2008r2, 2012, 2014, 2016, 2017. We cover the requirement for installation, auditing, encryption, compliance, and so forth.
Hashdays Conference (29th Oct. 2011)
SAP (in)security:
Scrubbing SAP clean with SOAP
----------
Abstract:
----------
At the heart of any large enterprise, lies a platform misunderstood and feared by all but the bravest systems administrators. Home to a wealth of information, and key to infinite wisdom. This platform is SAP. For years this system has been amongst the many "red pen" items on penetration tests and audits alike... but no more! We will no longer accept the cries of "Business critical, out-of-scope". The time for SAP has come, the cross-hairs of attackers are firmly focused on the soft underbelly that is ERM, and it's our duty to follow suit. Join me as we take the first steps into exploring SAP, extracting information and popping shells. Leave your Nessus license at the door! It's time to scrub this SAP system clean with SOAP!
----------
Positive Technologies - S4 - Scada under x-raysqqlan
This document summarizes a presentation given by Sergey Gordeychik, Gleb Gritsai, and Denis Baranov on analyzing the security of WinCC SCADA software. It introduces the presenters and their backgrounds in industrial control system security research. They discuss common vulnerabilities found in WinCC like SQL injection, XSS, and password disclosure. The researchers provide an overview of the WinCC architecture and its various components. They analyze vulnerabilities in the WinCC project files and communication protocols. The presentation aims to bring more attention to automating security assessments of industrial control systems.
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from
database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Paula Januszkiewicz
Encryption is based on three principals: algorithm, key length, and storage. It has also become more popular and it is more often built into databases, networks, config files, OS, and users’ secrets. Is DPAPI and DPAPI-NG enough for us? Unfortunately there are many slip-ups that can be made. Come and learn if ‘encrypted’ = or != ‘safe’ and when! Tools included.
Oracle OpenWorld 2013 - HOL9737 MySQL Replication Best PracticesSven Sandberg
This document provides an overview and best practices for MySQL replication. It begins with the basics of replication including the binary log, replication components and architecture. It then covers crash-safe slaves using replication metadata in system tables, online data verification with replication event checksums, tuning row-based replication, improving slave scalability with multi-threaded slaves, and automated failover using global transaction IDs. Hands-on examples are also provided to demonstrate setting up replication between a master and slave server.
SAP strikes back Your SAP server now counter attacks.Dmitry Iudin
In this presentation, we will demonstrate how attackers can compromise all SAP clients and gain private information from their machines by using the SAP server.
SecZone 2011 - Cali, Colombia
(29th Nov. 2011)
SAP (in)security:
Scrubbing SAP clean with SOAP
------
Note
------
This is a slightly updated version of my Hashdays 2011 talk.
----------
Abstract:
----------
At the heart of any large enterprise, lies a platform misunderstood and feared by all but the bravest systems administrators. Home to a wealth of information, and key to infinite wisdom. This platform is SAP. For years this system has been amongst the many "red pen" items on penetration tests and audits alike... but no more! We will no longer accept the cries of "Business critical, out-of-scope". The time for SAP has come, the cross-hairs of attackers are firmly focused on the soft underbelly that is ERM, and it's our duty to follow suit. Join me as we take the first steps into exploring SAP, extracting information and popping shells. Leave your Nessus license at the door! It's time to scrub this SAP system clean with SOAP!
----------
The document discusses setting up MySQL high availability using InnoDB Cluster. It provides instructions for installing MySQL 8.0, configuring three MySQL instances for the cluster, creating the cluster, and running the MySQL Router for load balancing and failover. The Router is configured to route reads from two read-only slaves, while writes go to a single read-write master. Connections are tested from each instance to verify the Router is load balancing correctly.
This document discusses various profiling tools that can be used to analyze MySQL performance, including Oprofile, perf, pt-pmp, and the MySQL Performance Schema. It provides examples of how these tools have been used to identify and resolve specific MySQL performance bugs. While the Performance Schema is useful, it does not always provide sufficient detail and other system-wide profilers like Oprofile and perf are still needed in some cases to pinpoint performance issues.
Let's Create a GitHub Copilot Extension! - Nick Taylor, PomeriumAll Things Open
Presented at All Things Open AI 2025
Presented by Nick Taylor - Pomerium
Title: Let's Create a GitHub Copilot Extension!
Abstract: Get hands-on in this talk where we'll create a GitHub Copilot Extension from scratch.
We'll use the Copilot Extensions SDK, https://github.com/copilot-extensions/preview-sdk.js, and Hono.js, covering best practices like payload validation and progress notifications and error handling.
We'll also go through how to set up a dev environment for debugging, including port forwarding to expose your extension during development as well as the Node.js debugger.
By the end, we'll have a working Copilot extension that the audience can try out live.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Leveraging Pre-Trained Transformer Models for Protein Function Prediction - T...All Things Open
Presented at All Things Open AI 2025
Presented by Tia Pope - North Carolina A&T
Title: Leveraging Pre-Trained Transformer Models for Protein Function Prediction
Abstract: Transformer-based models, such as ProtGPT2 and ESM, are revolutionizing protein sequence analysis by enabling detailed embeddings and advanced function prediction. This talk provides a hands-on introduction to using pre-trained open-source transformer models for generating protein embeddings and leveraging them for classification tasks. Attendees will learn to tokenize sequences, extract embeddings, and implement machine-learning pipelines for protein function annotation based on Gene Ontology (GO) or Enzyme Commission (EC) numbers. This session will showcase how pre-trained transformers can democratize access to advanced protein analysis techniques while addressing scalability and explainability challenges. After the talk, the speaker will provide a notebook to test basic functionality, enabling participants to explore the concepts discussed.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Gen AI: AI Agents - Making LLMs work together in an organized way - Brent Las...All Things Open
Presented at All Things Open AI 2025
Presented by Brent Laster - Tech Skills Transformations
Title: Gen AI: AI Agents - Making LLMs work together in an organized way
Abstract: AI Agents are combinations of LLMs, tools, and custom roles that can autonomously perform tasks and make decisions based on context and user input. Multiple agents can be managed together to cooperatively handle individual tasks that are part of a larger project to accomplish an overall goal.
By combining capabilities like tool access, multi-step reasoning, and real-time adjustments, agents can construct and complete complex workflows and intelligent solutions. In this presentation, we'll look at what AI agents are, how they work, and how you can create and put them to work.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
You Don't Need an AI Strategy, But You Do Need to Be Strategic About AI - Jes...All Things Open
Presented at All Things Open AI 2025
Presented by Jessica Hall - Hallway Studio
Title: You Don't Need an AI Strategy, But You Do Need to Be Strategic About AI
Abstract: There’s so much noise about creating an “AI strategy,” it’s easy to feel like you’re already behind. But here’s the thing: you don’t need an AI strategy or a data strategy. Those things need to serve your business strategy and that requires strategic thinking.
Here’s what you’ll get:
A clear understanding of why AI is a means to an end—not the end itself—and how to use it to solve problems traditional methods can’t touch.
How to align AI with strategy using questions like “Where do we play? How do we win?” from Roger L. Martin and A.G. Lafley.
What successful AI initiatives have in common: clear value, smart use of unique data, and meaningful business impact.
A checklist to evaluate AI opportunities—covering metrics, workflows, and the human factors that make or break AI efforts.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
DON’T PANIC: AI IS COMING – The Hitchhiker’s Guide to AI - Mark Hinkle, Perip...All Things Open
Presented at All Things Open AI 2025
Presented by Mark Hinkle - Peripety Labs
Title: DON’T PANIC: AI IS COMING – The Hitchhiker’s Guide to AI
Abstract: AI is coming of age, and much like discovering intergalactic travel, it’s equal parts thrilling and terrifying. Fears of job loss, doomsday scenarios, and bureaucratic AI overlords dominate the conversation—but I think the reality is far less apocalyptic and far more exciting. With the right guide, you can navigate this new universe, adapt, and even thrive. That’s what AllThingsOpen.AI is all about—building a community where people and businesses don’t just survive AI’s rise but flourish in it. So grab your towel, keep an open mind, and let’s explore the future—without the panic. Listen to Conference Co-Producer and publisher of the Artificially Intelligent Enterprise, Mark Hinkle, provide a vision on how AI will play out in our lives.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Fine-Tuning Large Language Models with Declarative ML Orchestration - Shivay ...All Things Open
Presented at All Things Open AI 2025
Presented by Shivay Lamba - Couchbase
Title: Fine-Tuning Large Language Models with Declarative ML Orchestration
Abstract: Large Language Models used in tools like ChatGPT are everywhere; however, only a few organisations with massive computing resources are capable of training such large models. While eager to fine-tune these models for specific applications, the broader ML community often grapples with significant infrastructure challenges.
In the session, the audience will understand how open-source ML tooling like Flyte (a Linux Foundation open-source orchestration platform) can be used to provide a declarative specification for the infrastructure required for a wide array of ML workloads, including the fine-tuning of LLMs, even with limited resources. Thus the attendee will learn how to leverage open-source ML toolings like Flyte's capabilities to streamline their ML workflows, overcome infrastructure constraints, reduce cost and unlock the full potential of LLMs in their specific use case. Thus making it easier for a larger audience to leverage and train LLMs.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Leveraging Knowledge Graphs for RAG: A Smarter Approach to Contextual AI Appl...All Things Open
Presented at All Things Open AI 2025
Presented by David vonThenen - DigitalOcean
Title: Leveraging Knowledge Graphs for RAG: A Smarter Approach to Contextual AI Applications
Abstract: In the ever-evolving field of AI, retrieval-augmented generation (RAG) systems have become critical for delivering high-quality, contextually relevant answers in applications powered by large language models (LLMs). While vector databases have traditionally dominated RAG applications, graph databases, specifically knowledge graphs, offer a transformative approach to contextual AI that’s often overlooked. This approach provides unique advantages for applications requiring deep insights, intelligent search, and reasoning over both structured and unstructured sources, making it ideal for complex business scenarios.
Attendees will leave with an understanding of how to build a RAG system using a graph database and practical skills for data querying and insights retrieval. By comparing graph and vector database approaches, we’ll highlight when and why graph databases may offer superior benefits for managing complex data relationships. The session will provide concrete examples and advanced techniques, empowering participants to incorporate knowledge graphs into their AI systems for better data-driven outcomes and improved LLM performance. This discussion will conclude with a live demo showcasing key techniques and insights covered in this talk.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Artificial Intelligence Needs Community Intelligence - Sriram Raghavan, IBM R...All Things Open
Presented at All Things Open AI 2025
Presented by Sriram Raghavan - IBM Research AI
Title: Artificial Intelligence Needs Community Intelligence
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Don't just talk to AI, do more with AI: how to improve productivity with AI a...All Things Open
Presented at All Things Open AI 2025
Presented by Sheng Liang - Acorn Labs
Title: Don't just talk to AI, do more with AI: how to improve productivity with AI agents
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Open-Source GenAI vs. Enterprise GenAI: Navigating the Future of AI Innovatio...All Things Open
Presented at All Things Open AI 2025
Presented by Dr. Ruth Akintunde - SAS Institute Inc.
Title: Open-Source GenAI vs. Enterprise GenAI: Navigating the Future of AI Innovation
Abstract: This talk explores the critical differences between Open-Source Generative AI and Enterprise Generative AI, highlighting their respective strengths and challenges. Open-Source GenAI fosters innovation through community collaboration, accessibility, and adaptability, while Enterprise GenAI prioritizes security, scalability, and reliability. Key aspects such as cost, ethical considerations, and long-term sustainability are examined to understand their impact on AI development and deployment. Ultimately, the talk advocates for a hybrid approach, leveraging the best of both worlds to drive AI innovation forward.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
The Death of the Browser - Rachel-Lee Nabors, AgentQLAll Things Open
Presented at All Things Open AI 2025
Presented by Rachel-Lee Nabors - AgentQL
Title: The Death of the Browser
Abstract: In ten years, Internet Browsers may be a nostalgic memory. As enterprises face mounting API costs and integration headaches, a new paradigm is emerging. The internet's evolution from an open highway into a maze of walled gardens and monetized APIs has created significant challenges for businesses—but it has also set the stage for accessing and organizing the world’s information.
This lightning talk traces our journey from the invention of the browser to the arms race of scraping for data and access to it to the dawn of AI agents, showing how the challenges of today opened the door to tomorrow. See how technologies refined by the web scraping community are combining with large language models to create practical alternatives to costly API integrations.
From the rise of platform monopolies to the emergence of AI agents, this timeline-based exploration will help you understand where we've been, where we are, and where we're heading. Join us for a glimpse of how AI agents are enabling a return to the era of free information with the web as the API.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
Bluesky: https://bsky.app/profile/allthingsopen.bsky.social
2025 conference: https://2025.allthingsopen.org/
Making Operating System updates fast, easy, and safeAll Things Open
Presented at All Things Open 2024
Monday, October 28th, 2024
Presented by Matt Micene, Red Hat
Title: Making OS updates fast, easy, and safe
Abstract: What if I told you that:
* OS updates are less scary
* Changes move across environments quicker
* Consistency across systems is easier
and you only need to learn a few new things?
Maybe you think about your build process daily. Maybe 8 years ago, you found a way that works and try to never touch it (xkcd 2347 anyone?). In this session, you'll learn how to combine the container skills you already have with a few new tools to rethink your standard Linux builds.
Bootable containers combine lessons from several projects with years of production experience to build, deliver, and maintain your familiar Linux environment in a new way. Some of the things we think are 'just the way it is' turn out to be less concrete with this new perspective.
Applying container principles to these builds lets us change the way we think about custom versus shared components, how to track changes and make them visible, and how we can use tools that already exist to address a lot of the toil and trouble associated with building, testing, delivering, and updating gold images.
Reshaping the landscape of belonging to transform communityAll Things Open
Presented at All Things Open 2024
Presented by Winstina Hughes - Support Inclusion in Tech
Title: Reshaping the landscape of belonging to transform community
Abstract: The years leading up to being a Fellow on President Barack Obama’s 2012 campaign honed my advocacy skills, teaching me to speak up for myself and my community. Within the WordPress community, I found both refuge and purpose, learning the power of collaboration and global connection. These experiences, like threads woven together, prepared me for an audacious achievement: sending underrepresented speakers from five continents to WordCamps through strategic partnerships. This initiative isn't just about sending speakers; it is about sharing diverse voices, expanding perspectives on leadership, and weaving a more vibrant, interconnected thread throughout the WordPress ecosystem and tech. Join me as I share tools for change that transformed my fear of outsider status into an innovative solution for global connection and inclusivity.
This talk is for anyone who has ever felt like they didn't quite belong, whether in an open source conference, slack channel, or within their own skin. By the end of this talk you will have insight on how to reshape belonging in your community to help any member find their true voice even while hiding from it.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
The Unseen, Underappreciated Security Work Your Maintainers May (or may not) ...All Things Open
Presented at All Things Open 2024
Presented by Seth Michael Larson - Python Software Foundation & Lauren Hanford - Tidelift
Title: The Unseen, Underappreciated Security Work Your Maintainers May (or may not) Already Be Doing
Abstract: urllib3 is a mission critical, 15-year-old python package. From a security perspective, urllib3 continues to lead the pack for Python packages in terms of implementing security standards like OpenSSF Scorecard, SLSA, and Trusted Publishers — adopting this new feature days after it was announced during PyCon US 2023. The team remediated two moderate-severity vulnerabilities in 2023 and made the fixes available in both the new v2.0 and security-fix only v1.26.x release streams.
Join the lead maintainer of urllib3 Seth Larson and Tidelift VP of product Lauren Hanford to discuss all of the security work happening in the best maintained projects that you can’t observe or measure, including avoiding leaked environment variables from their toolchain, limiting API token access, streamlining automated release processes, and more. Audience members will learn how they can do their part to ensure the projects they rely on follow these top practices.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
Integrating Diversity, Equity, and Inclusion into Product DesignAll Things Open
Presented at All Things Open 2024
Presented by Denitresse Ferrell - Culture Refinery
Title: Integrating Diversity, Equity, and Inclusion into Product Design
Abstract: How do you define diversity in product development? How do you ensure feedback from traditionally marginalized customer groups is not only heard, but acted upon? How do you balance between the needs of diverse subsets of users with those of the larger audience?
This keynote presentation dives deep into the critical role diversity plays in crafting successful products that resonate with everyone in your audience. With decades of multifaceted leadership experience in Fortune 100 companies, "Culture Whisperer" Denitresse Ferrell will take the All Things Open community on an exploration of the various dimensions of diversity in product development, from building inclusive teams to gathering and implementing diverse customer feedback.
At the conclusion of this session, the participants will be able to:
🔹Demystify Diversity: Unpack the concept of diversity in product development, going beyond race and gender to encompass a wide range of perspectives.
🔹Avoid Stereotypes at Scale: Learn how to safeguard against perpetuating stereotypes while personalizing user experiences.
🔹Harness the Power of ERGs: Consider how Employee Resource Groups (ERGs) can be leveraged to champion diversity within products and services.
🔹Move from Feedback to Action: Apply actionable strategies for ensuring diverse customer voices are heard, valued, and reflected in the final product.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
The Open Source Ecosystem for eBPF in KubernetesAll Things Open
Presented at All Things Open 2024
Presented by Andre Fredette, Ph.D. & Billy McFall - Red Hat
Title: The Open Source Ecosystem for eBPF in Kubernetes
Abstract: Kubernetes has become the de facto open source solution for orchestrating containerized applications. However, as the complexity and scale of deployments grow, traditional tools often fall short of providing the granularity and efficiency required by advanced applications. To meet the demand, applications are increasingly leveraging eBPF (extended Berkeley Packet Filters) due to the revolutionary kernel capabilities it enables.
This talk will explore the integration of the eBPF ecosystem with Kubernetes, highlighting its potential to transform how operators and developers observe, secure, and troubleshoot their deployments. We will start by introducing eBPF and its core concepts, including its architecture, programming model, and key benefits such as minimal overhead, improved visibility, and dynamic tracing capabilities. We will then review real-world examples of open source tools which leverage eBPF for networking, security, and observability in Kubernetes environments. We will also explore an open source project called bpfman (https://bpfman.io), an eBPF Manager focusing on simplifying the deployment, administration and visibility of eBPF programs in Kubernetes clusters.
This presentation is designed for Kubernetes operators, security professionals, and developers seeking to deepen their understanding of eBPF and its applications in cloud-native environments. No prior knowledge of eBPF is required, but familiarity with Kubernetes concepts and architecture will be beneficial.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
Open Source Privacy-Preserving Metrics - Sarah Gran & Brandon PitmanAll Things Open
Presented at All Things Open 2024
Presented by Sarah Gran & Brandon Pitman - Divvi Up
Title: Open Source Privacy-Preserving Metrics
Abstract: Telemetry and metrics collection can provide an enormous amount of useful information about applications and their users. From time-on-site to tracking software versions in crash reports, metrics enable informed engineering and business decisions. This type of information can also be used to feed AI and ML Large Language Models. But all that data sitting around can also be a liability when it can be pieced together to develop an increasingly robust understanding of an individual user. In today’s world that is rife with data thievery and data-driven bias, it’s time to explore how to have your cake and eat it too when it comes to metrics collection. We'll introduce you to set of novel privacy-preserving metrics collection protocols that are being developed in the IETF and deployed in Open Source repos at Divvi Up.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
Presented at All Things Open 2024
Presented by Craig St. Jean - Xebia
Title: Open-Source Low-Code
Abstract: As Low-Code becomes more and more prevalent, how does Open-Source fit into a world of proprietary Low-Code platforms? Are Low-Code and Open-Source completely incompatible, or are there synergies that we can adopt?
In this talk, I will discuss:
- The current Low-Code landscape
- Open-Source projects and communities built on Low-Code platforms
- How Low-Code and Open-Source benefit each other
At the end of this talk, you will better understand how Low-Code can fit into an Open-Source ecosystem, and how to get started!
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
How I Learned to Stop Worrying about my Infrastructure and Love [Open]TofuAll Things Open
Presented at All Things Open 2024
Presented by Douglas Flagg - Fidelity Investments
Title: How I Learned to Stop Worrying about my Infrastructure and Love [Open]Tofu
Abstract: Every developer is worried about something breaking in their tech toolchain, so let Infrastructure as Code (IaC) be one thing you can stop worrying about and start to love again. Join us to learn about how you can focus more on consuming IaC APIs (and less on the ingredients that make them tasty) by cooking your infrastructure with Tofu. Douglas will demonstrate how to use OpenTofu from the simplest configurations to more complex deployments. And he’ll show how you can test that your Tofu IaC works as intended through the native testing language feature.
In this session you can expect to learn:
- The advantages of adopting OpenTofu
- How to use OpenTofu to manage IaC
- How to test that your Tofu configuration works as intended
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
The Developers' Framework for Content CreationAll Things Open
Presented at All Things Open 2024
Presented by Gabriel L. Manor - Permit.io
Title: The Developers' Framework for Content Creation
Abstract: Content creation is an appealing task for developers, whether it's a blog, video, tutorial, or talk. Developers genuinely enjoy producing content. However, there are common challenges that often arise, such as: "What should I create?" and "When do you have time for it?"
Fortunately, the answer is not as complex as it may seem.
In this talk, I will share a clear and accessible framework designed for developers who aspire to embark on their content creation journey. I won't just provide theoretical words; I'll also share from my personal journey into content creation and developer marketing roles.
Find more info about All Things Open:
On the web: https://www.allthingsopen.org/
Twitter: https://twitter.com/AllThingsOpen
LinkedIn: https://www.linkedin.com/company/all-things-open/
Instagram: https://www.instagram.com/allthingsopen/
Facebook: https://www.facebook.com/AllThingsOpen
Mastodon: https://mastodon.social/@allthingsopen
Threads: https://www.threads.net/@allthingsopen
2024 conference: https://2024.allthingsopen.org/
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
We’re bringing the TDX energy to our community with 2 power-packed sessions:
🛠️ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
📄 Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
3. OVERVIEW
PROTECTING DATA
It has been possible to protect data in transit
(moving over the network), and proper
authentication can be used to protect data in
use (being used by an application), but data at
rest (sitting on a file system) has been an area
of risk in MySQL/MariaDB.
4. OVERVIEW
WHAT ISTHE RISK?
Without encryption of data at rest, a bad actor
with access to the file system supporting the
database can view data even without proper
database-level permissions.
Having root access to the file system is very common!
5. OVERVIEW
WHAT IS SENSITIVE DATA?
PCI: credit card data
PII: names, drivers license, financial data, social
security number
HIPAA: medical, health insurance data
See: https://en.wikipedia.org/wiki/California_S.B._1386
7. EXPOSED!
DATA FILES
[root@encr_maria ~]# ls -al /var/lib/mysql/
allthingsopen/
total 108
drwx------. 2 mysql mysql 45 Oct 19 15:09 .
drwxr-xr-x. 6 mysql mysql 4096 Oct 19 15:07 ..
-rw-rw----. 1 mysql mysql 65 Oct 19 15:07 db.opt
-rw-rw----. 1 mysql mysql 932 Oct 19 15:09 t1.frm
-rw-rw----. 1 mysql mysql 98304 Oct 19 15:09 t1.ibd
[root@encr_maria ~]# strings /var/lib/mysql/
allthingsopen/t1.ibd
...
mysecret123-45-6789
9. EXPOSED!
REDO LOG
[root@encr_maria ~]# yum install vim-common
...
[root@encr_maria ~]# xxd /var/lib/mysql/ib_logfile0 | grep -v
"0000"
...
018a580: 0110 8000 0001 8000 0002 6d79 7365 6372 ..........mysecr
018a590: 6574 3132 332d 3435 2d36 3738 3982 0081 et123-45-6789...
[root@encr_comm ~]# xxd /var/lib/mysql/ib_logfile0 | grep -v
“0000"
...
0269ec0: 011b 0110 8000 0001 8000 0002 6d79 7365 ............myse
0269ed0: 6372 6574 3132 332d 3435 2d36 3738 3937 cret123-45-67897
(xxd is another command-line tool that allows you to see
text within binary files. Install vim-common to use it.)
10. BUT FIRST… SOME ALTERNATIVES
OVERVIEW
ALTERNATIVESYES, DEAR
KEY ROTATION
KEY STORAGE
THIRD-PARTYTOOLS
BACKUPS
PERFORMANCE
SUMMARY
11. ALTERNATIVES
OVERVIEW
• Don’t store sensitive data.
• Encrypt data from the application.
• Use column-level encryption.
• Encrypt the file system.
12. ALTERNATIVE
DON’T DO IT
• Outsource data storage.
• Don’t store data if you don’t have a legitimate
need for it.
• Regularly archive data from departed users or
data that has aged out.
13. ALTERNATIVE: ENCRYPT FROM APP
EXAMPLE OF ENCRYPTED DATA
MariaDB [allthingsopen]> select * from t1G
intcol1: 1
intcol2: 2
charcol1: my
charcol2: secret
charcol3: “?????-{??S@?/@%?>??????9?
14. ALTERNATIVE: ENCRYPT FROM APP
NOTVISIBLE IN DATA FILES
[root@encr_maria ~]# strings /var/lib/mysql/
allthingsopen/t1.ibd
...
mysecret"?????-{??S@?/
%?>???
???9?
26. YES, DEaR, MARIADB
ENCRYPTION CONFIGS ON
MariaDB [(none)]> show global variables like '%encr%';
+------------------------------------------+---------+
| Variable_name | Value |
+------------------------------------------+---------+
| aria_encrypt_tables | OFF |
| encrypt_binlog | ON |
| encrypt_tmp_disk_tables | ON |
| encrypt_tmp_files | ON |
| file_key_management_encryption_algorithm | aes_cbc |
| innodb_default_encryption_key_id | 1 |
| innodb_encrypt_log | ON |
| innodb_encrypt_tables | ON |
| innodb_encryption_rotate_key_age | 1 |
| innodb_encryption_rotation_iops | 100 |
| innodb_encryption_threads | 4 |
+------------------------------------------+---------+
27. YES, DEaR, MARIADB
ENCRYPTION METHODS
There are three ways to encrypt table data in MariaDB 10.1:
• innodb_encrypt_tables in the my.cnf will encrypt all tables (unless
specified as “encrypted=no”).
• innodb_encrypt_tables=FORCE in the my.cnf will encrypt all new
tables created, and will prevent table creation with “encrypted=no.”
• If the configuration innodb_encrypt_tables is not in the my.cnf, but
the plugin is present, you can explicitly encrypt a table by including
“encrypted=yes” in the table creation statement.
(If innodb_encryption_threads is set higher than 0, then existing
tables will be encrypted in the background.)
28. YES, DEaR, MARIADB
INNODB_ENCRYPTION_THREADS=4
[root@encr_maria ~]# tail -f /var/lib/mysql/
encr_maria.err
...
2016-10-19 19:44:31 140629860751488 [Note] InnoDB:
Creating #1 thread id 140629124273920 total threads 4.
2016-10-19 19:44:31 140629860751488 [Note] InnoDB:
Creating #2 thread id 140629115881216 total threads 4.
2016-10-19 19:44:31 140629860751488 [Note] InnoDB:
Creating #3 thread id 140629107488512 total threads 4.
2016-10-19 19:44:31 140629860751488 [Note] InnoDB:
Creating #4 thread id 140629099095808 total threads 4.
...
29. YES, DEaR, MARIADB
EFFECTS OF BACKGROUNDTHREADS
MariaDB [(none)]> select name from
information_schema.innodb_tablespaces_encryption where
encryption_scheme=1;
Empty set (0.00 sec)
MariaDB [(none)]> select name from
information_schema.innodb_tablespaces_encryption where
encryption_scheme=1;
+--------------------------+
| name |
+--------------------------+
...
| allthingsopen/t1 |
+--------------------------+
5 rows in set (0.00 sec)
35. YES, DEaR, MARIADB
REMAINING EXPOSURES
Not all data on disk is encrypted:
• slow log
• error log
• general log
• audit log
• relay logs on unencrypted slaves
36. YES, DEaR, MARIADB
VISIBLE IN SLOW LOG
MariaDB [allthingsopen]> set global slow_query_log=on;
MariaDB [allthingsopen]> set global long_query_time=0;
MariaDB [(none)]> update allthingsopen.t2 set
charcol3='456-78-9123' where intcol1>1;
# Time: 161019 20:55:33
# User@Host: root[root] @ localhost []
# Thread_id: 6 Schema: QC_hit: No
# Query_time: 0.003517 Lock_time: 0.000118 Rows_sent: 0
Rows_examined: 1
# Rows_affected: 0
SET timestamp=1476924933;
update allthingsopen.t2 set charcol3='456-78-9123' where
intcol1>1;
See: https://jira.mariadb.org/browse/MDEV-9639
37. YES, DEaR, MARIADB
VISIBLE IN ERROR LOG
MariaDB [(none)]> set global log_warnings=2;
MariaDB [(none)]> insert into allthingsopen.t2 (select * from
allthingsopen.t1 where charcol3 like '123-45-6789' limit 1);
Query OK, 0 rows affected, 1 warning (0.00 sec)
Records: 0 Duplicates: 0 Warnings: 1
[root@encr_maria ~]# less /var/lib/mysql/encr_maria.err
...
2016-10-19 20:58:53 140158235900672 [Warning] Unsafe statement
written to the binary log using statement format since
BINLOG_FORMAT = STATEMENT. The statement is unsafe because it
uses a LIMIT clause. This is unsafe because the set of rows
included cannot be predicted. Statement: insert into
allthingsopen.t2 (select * from allthingsopen.t1 where charcol3
like '123-45-6789' limit 1)
38. YES, DEaR, MARIADB
VISIBLE IN GENERAL LOG
MariaDB [(none)]> set global general_log=on;
MariaDB [(none)]> insert into allthingsopen.t2 values
(5, 6, 'my', 'secret', '987-65-4321');
[root@encr_maria ~]# less /var/lib/mysql/encr_maria.log
/usr/sbin/mysqld, Version: 10.1.18-MariaDB (MariaDB
Server). started with:
Tcp port: 3306 Unix socket: /var/lib/mysql/mysql.sock
Time Id Command Argument
161019 21:00:42 6 Query insert into
allthingsopen.t2 values (5, 6, 'my', 'secret',
'987-65-4321')
39. YES, DEaR, MARIADB
VISIBLE IN AUDIT LOG
MariaDB [(none)]> INSTALL PLUGIN server_audit SONAME
‘server_audit.so';
MariaDB [(none)]> set global server_audit_mode=1;
MariaDB [(none)]> SET GLOBAL
server_audit_events=‘CONNECT,QUERY,TABLE';
MariaDB [(none)]> SET GLOBAL server_audit_logging=ON;
MariaDB [(none)]> insert into allthingsopen.t1 values
(6, 6, 'my', 'secret', ‘777-77-7777');
[root@encr_maria ~]# tail -f /var/lib/mysql/
server_audit.log
20161019 21:12:30,encr_maria,root,localhost,
7,6,QUERY,allthingsopen,'insert into allthingsopen.t1
values (6, 6, 'my', 'secret', '777-77-7777')',0
40. YES, DEaR, MARIADB
VISIBLE IN RELAY LOGS
[root@encr_maria_slave ~]# xxd /var/lib/mysql/
encr_maria_slave-relay-bin.000002
...
0000300: 0008 0061 6c6c 7468 696e 6773 6f70 656e ...allthingsopen
0000310: 0069 6e73 6572 7420 696e 746f 2074 3320 .insert into t3
0000320: 7661 6c75 6573 2028 342c 2035 2c20 276d values (4, 5, 'm
0000330: 7927 2c20 2773 6563 7265 7427 2c20 2731 y', 'secret', '1
0000340: 3233 2d34 352d 3637 3839 2729 f513 0858 23-45-6789')...X
...
encrypt_binlog will encrypt both binlogs and relay logs on the
configured server, but relay logs on any attached slaves are not
encrypted without configuration on those slaves. Watch those
database permissions!
41. YES, DEaR, MARIADB
DISABLING ENCRYPTION
MariaDB [(none)]> set global innodb_encryption_threads=0;
MariaDB [(none)]> select name from
information_schema.innodb_tablespaces_encryption where
encryption_scheme=1;
| test/sbtest1 |
MariaDB [allthingsopen]> alter table t2 encrypted=‘no';
MariaDB [allthingsopen]> select name from
information_schema.innodb_tablespaces_encryption where
encryption_scheme=1;
Empty set (0.00 sec)
# remove encryption configs from configurationn files
[root@centosbase ~]# sudo systemctl restart mariadb
42. YES, DEaR, ORACLE
EDIT MY.CNFTO INSTALL PLUGIN
[mysqld]
early-plugin-load=keyring_file.so
keyring_file_data=/var/lib/mysql/mysql-keyring/keyring
[root@encr_percona ~]# service mysql start
mysql> SELECT PLUGIN_NAME, PLUGIN_STATUS FROM
INFORMATION_SCHEMA.PLUGINS WHERE PLUGIN_NAME LIKE 'keyring%';
+--------------+---------------+
| PLUGIN_NAME | PLUGIN_STATUS |
+--------------+---------------+
| keyring_file | ACTIVE |
+--------------+---------------+
mysql> show global variables like '%keyring%';
+-------------------+--------------------------------------+
| Variable_name | Value |
+-------------------+--------------------------------------+
| keyring_file_data | /var/lib/mysql/mysql-keyring/keyring |
+-------------------+--------------------------------------+
Store your key outside the data directory.
48. YES, DEaR, ORACLE
REMAINING EXPOSURES
Only the tablespace is encrypted, leaving the following
exposed:
• binlogs
• redo log
• relay logs on unencrypted slaves
• slow log
• error log
• general log
• audit log
49. YES, DEaR, ORACLE
DON’T LOSETHE MASTER KEY
[root@encr_percona ~]# ls -l /var/lib/mysql/mysql-
keyring/
total 0
-rw-r-----. 1 mysql mysql 0 Oct 19 16:18 keyring
mysql> select * from t2;
ERROR 3185 (HY000): Can't find master key from
keyring, please check keyring plugin is loaded.
Special note for Xtrabackup later.
51. KEY ROTATION: ORACLE
ROTATINGTHE MASTER KEY
[root@encr_percona ~]# ls -al /var/lib/mysql/mysql-
keyring/keyring
-rw-r-----. 1 mysql mysql 795 Oct 19 20:31 /var/
lib/mysql/mysql-keyring/keyring
[root@encr_percona ~]# mysql -e'alter instance
rotate innodb master key’;
[root@encr_percona ~]# ls -al /var/lib/mysql/mysql-
keyring/keyring
-rw-r-----. 1 mysql mysql 923 Oct 19 20:58 /var/
lib/mysql/mysql-keyring/keyring
52. KEY ROTATION: ORACLE
ROTATINGTHE HEADER KEY
[root@encr_percona ~]# ls -al /var/lib/mysql/
allthingsopen/t2.ibd
-rw-r-----. 1 mysql mysql 98304 Oct 19 21:08 /var/
lib/mysql/allthingsopen/t2.ibd
[root@encr_percona ~]# mysql -e'alter instance
rotate innodb master key’;
[root@encr_percona ~]# ls -al /var/lib/mysql/
allthingsopen/t2.ibd
-rw-r-----. 1 mysql mysql 98304 Oct 19 21:09 /var/
lib/mysql/allthingsopen/t2.ibd
Try at home: look at the header contents of the .ibd file.
53. KEY ROTATION: MARIADB
SOME ALTERNATIVES
Default encryption plugin: no rotation
Key rotation available with:
• Amazon Web Services (AWS) Key Management
Services (KMS) (https://mariadb.com/kb/en/mariadb/
aws-key-management-encryption-plugin/)
• eperi Gateway for Databases (http://eperi.de/mariadb)
54. KEY ROTATION: MARIADB
MAINTENANCE: DECRYPT
# decrypt
MariaDB [(none)]> set global innodb_encryption_threads=0;
MariaDB [(none)]> select name from
information_schema.innodb_tablespaces_encryption where
encryption_scheme=1;
| test/sbtest1 |
MariaDB [allthingsopen]> alter table t2 encrypted=‘no';
MariaDB [allthingsopen]> select name from
information_schema.innodb_tablespaces_encryption where
encryption_scheme=1;
Empty set (0.00 sec)
55. KEY ROTATION: MARIADB
MAINTENANCE: RE-ENCRYPT
[root@centosbase mysql]# mv keys.txt keys.bak
# comment out encryption configs from my.cnf
[root@centosbase ~]# sudo systemctl restart mariadb
# re-encrypt; create new keys.txt and uncomment encryption
configs in my.cnf
[root@centosbase ~]# sudo systemctl restart mariadb
MariaDB [(none)]> alter table allthingsopen.t2 encrypted='yes';
56. DON’T PUT YOUR KEY AT THE FRONT DOOR
OVERVIEW
ALTERNATIVES
YES, DEAR
KEY ROTATION
KEY STORAGETHIRD-PARTYTOOLS
BACKUPS
PERFORMANCE
SUMMARY
57. KEY STORAGE
CAN ENCRYPT KEYFILE
[root@maria101 mysql]# openssl enc -aes-256-cbc -md
sha1 -k mypassword -in /var/lib/mysql/keys.txt -out /
var/lib/mysql/keys.enc
[root@maria101 mysql]# cat /etc/my.cnf | grep key-
management
file-key-management-filename = /var/lib/mysql/keys.enc
file-key-management-filekey = mypassword
…but of course, the password is exposed in the my.cnf on disk
58. KEY STORAGE
CLEVER IDEAS
Store the keyfile on a USB stick.
Store the keyfile on a directory mounted only during
database startup.
Your clever idea!
60. WHAT TOOLS CAN STREAM DATA OR
LOGS FROM YOUR SERVER?
OVERVIEW
ALTERNATIVES
YES, DEAR
KEY ROTATION
KEY STORAGE
THIRD-PARTY TOOLS
BACKUPS
PERFORMANCE
SUMMARY