| Max Roeleveld and David Visscher - From Complexity to Simplicity: Our Cloud Infrastructure Redesign |
| Luuk van Drunen - How truly open is “open-source” AI in reality? |
| Kairo de Araujo - Securing the Software Supply Chain: Open Source for the SDLC |
| Jos Poortvliet - A different approach to AI |
| Jelle Raaijmakers - Ladybird - a new, independent browser and web engine |
| Daniël van Eeden - TiDB: under the hood |
| Marco Davids - Ooit nagedacht over je NTP-setup? Meet TimeNL! |
| Gábor Nyers - Documentation as code |
| NLUUG najaarsconferentie 2025 |
| Winfried de Heiden - OpenSSH public/private key login: risico’s en mitigatie |
| Sake Blok - Stratoshark: Wireshark for system calls |
| Nicole Wajer - IPv6: The Internet's Best Kept Secret |
| Michael Boelen - Application security: sandboxing features of the Linux kernel and systemd |
| Jessica Tran - Weg bij Big Tech |
| Jeroen Wijenbergh - ProxyGuard - WireGuard behind a reverse proxy |
| Geert-Jan Meewisse and Raoul Kramer - Presenting the FOSS stack for schools |
| Marijke Luttekes - Introduction to Django |
| Geoff Bennett - Artificial Intelligence: A High Level Perspective on Environmental Aspects |
| Ben Stewart - Observability is just Contextualized Monitoring. Change my mind. |
| Adrianus Warmenhoven - Get off my lawn! A curmudgeon of a proxy... |
| Kascontrolecommissie |
| Wouter van Rooij - Secure Development Lifecycle in open source projects |
| Willem Toorop - Het opzetten van een Resource Public Key Infrastructure (RPKI) baken |
| Robin Sommer - Spicy: Creating Robust Parsers for Dissecting Network Protocols |
| Mark Overmeer - Open Search with Skrodon |
| Jilles & Jurre Groenendijk - No, we won't fix your computer |
| Jeroen Baten - Open Source Enterprise Resource Planning (ERP) with Odoo |
| Erik van Zijst - Open Silicon |
| Emile Aben - The Internet in Ukraine (and what we can learn from it) |
| Brenno de Winter - Pandemie + Security != Kattepis |
| Benno Overeinder - Internet Standards: The IETF Process |
| Ariën Vijn - De techniek bij Freedom Internet |
| Sake Blok - LOG4SHELL: Getting to know your adversary |
| Rob Hulsebos - OT Cybersecurity Challenges |
| Riccardo ten Cate & Glenn ten Cate - Exploitation, automation, mitigation |
| Ondřej Caletka - Run your own networking lab with Vagrant and Ansible |
| Michiel Leenaars - NLnet and NGI Zero: Working for the internet |
| Marcel Kornegoor - Course as Code: the future of AT Computing's training courses |
| Lucinda Sterk - Talk nerdy to me |
| Kris Buytaert - Help My Datacenter is On Fire |
| Joyce Mellens - Caer: An IoT Firewall for consumers |
| Joost van Dijk - From passwords to passkeys: what's new with FIDO? |
| Andreas Hülsing - An update on NIST's PQC standardization process |
| Paul Möller en Jan Willem Brandenburg - Dissect: The open-source framework for large-scale host investigations |
| Maarten Aertsen - The EU regulating (open source) software: the proposed Cyber Resilience Act |
| Jesse Lourens - SBOM, an overview |
| Jan Ainali - Introduction to public code |
| Cristian Hesselman - Increasing Internet security by bridging research and operations |
| Arnoud Engelfriet - Open Minds, Open Source: Navigating AI in the New Frontier of Intellectual Property Law |
| Petr Pucil - Tools for analyzing binary formats |